03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/02. Recognizing the Exploit Vector/01. How to Find the Exploit in a Malware Attack.mp4 21MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/08. Analyzing Files Statically/01. Demo - How to Use the tools.mp4 19MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/09. Reversing Malware with Debugging Tools/03. Debug Details and Assignment.mp4 18MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/09. Reversing Malware with Debugging Tools/02. More on how to Choose an Approach.mp4 15MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/11. Customizing Reports - From Researchers to CISOs/01. How to Report Treat Data.mp4 13MB
01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/03. Case Study.mp4 13MB
01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/06. Threat Model Demo.mp4 12MB
01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/04. Summarize Techniques and Course.mp4 6MB
01_Beginner/01_Security for Hackers and Developers - Overview/03. Uncovering Security Bugs/00. Why Do Bugs Manifest - .mp4 6MB
01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/05. Threat Modeling.mp4 6MB
01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/01. Raising Security IQ.mp4 6MB
01_Beginner/01_Security for Hackers and Developers - Overview/04. Using Static Analysis/01. Applying the Static Analysis Review Cycle.mp4 5MB
01_Beginner/01_Security for Hackers and Developers - Overview/01. Introduction/01. Why Bugs Happen.mp4 5MB
01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/02. Assess Threats.mp4 5MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/06. Detecting Angler in the Wild/02. YARA.mp4 4MB
01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/00. Manual Analysis Process.mp4 4MB
01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/01. Techniques.mp4 3MB
01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/04. Attack Surface Reduction.mp4 3MB
01_Beginner/01_Security for Hackers and Developers - Overview/03. Uncovering Security Bugs/02. How to Find Bugs - .mp4 3MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/06. Detecting Angler in the Wild/00. How to Find More Samples.mp4 2MB
01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/00. Introduction.mp4 610KB
01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/03. Push to the Left.mp4 427KB
01_Beginner/01_Security for Hackers and Developers - Overview/01. Introduction/03. Summary.mp4 287KB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/02. Recognizing the Exploit Vector/01. How to Find the Exploit in a Malware Attack.srt 18KB
01_Beginner/01_Security for Hackers and Developers - Overview/01. Introduction/02. Ongoing Considerations.srt 14KB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/09. Reversing Malware with Debugging Tools/03. Debug Details and Assignment.srt 14KB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/10. Reversing Malware with IDA pro/01. Reversing Demo.srt 13KB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/11. Customizing Reports - From Researchers to CISOs/01. How to Report Treat Data.srt 13KB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/09. Reversing Malware with Debugging Tools/02. More on how to Choose an Approach.srt 10KB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/10. Reversing Malware with IDA pro/03. Reversing Details and Assignment.srt 9KB
01_Beginner/01_Security for Hackers and Developers - Overview/01. Introduction/01. Why Bugs Happen.srt 9KB
01_Beginner/01_Security for Hackers and Developers - Overview/03. Uncovering Security Bugs/00. Why Do Bugs Manifest - .srt 9KB
01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/01. Raising Security IQ.srt 9KB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/03. Unraveling Exploit Obfuscation/00. Intro and Why to Script.srt 9KB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/09. Reversing Malware with Debugging Tools/01. Demo - Extract Malware with IDA Debugger.srt 8KB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/08. Analyzing Files Statically/01. Demo - How to Use the tools.srt 8KB
01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/03. Case Study.srt 8KB
01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/02. SDL.srt 6KB
01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/05. Threat Modeling.srt 6KB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/06. Detecting Angler in the Wild/03. YARA Examples and Lab.srt 6KB
01_Beginner/01_Security for Hackers and Developers - Overview/01. Introduction/00. Introduction.srt 6KB
01_Beginner/01_Security for Hackers and Developers - Overview/04. Using Static Analysis/01. Applying the Static Analysis Review Cycle.srt 5KB
01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/00. Manual Analysis Process.srt 5KB
01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/04. Summarize Techniques and Course.srt 5KB
01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/06. Threat Model Demo.srt 4KB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/06. Detecting Angler in the Wild/01. Malware Detection.srt 4KB
01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/04. Attack Surface Reduction.srt 4KB