589689.xyz

[] Pluralsight - Paths - Security for Hackers and Developers

  • 收录时间:2020-03-15 06:10:33
  • 文件大小:2GB
  • 下载次数:87
  • 最近下载:2021-01-20 20:09:09
  • 磁力链接:

文件列表

  1. 02_Intermediate/05_Security for Hackers and Developers - Exploit Development.zip 429MB
  2. 02_Intermediate/03_Security for Hackers and Developers - Fuzzing.zip 312MB
  3. 02_Intermediate/04_Security for Hackers and Developers - Reverse Engineering.zip 309MB
  4. 02_Intermediate/02_Security for Hackers and Developers - Code Auditing.zip 283MB
  5. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/10. Reversing Malware with IDA pro/01. Reversing Demo.mp4 34MB
  6. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/09. Reversing Malware with Debugging Tools/01. Demo - Extract Malware with IDA Debugger.mp4 34MB
  7. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/01. Introduction/01. Demo - Analyzing a Bromium Alert.mp4 27MB
  8. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/Exercise Files/Exercise Files malware-advanced-analysis-combating-exploit-kits.zip 25MB
  9. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/02. Recognizing the Exploit Vector/01. How to Find the Exploit in a Malware Attack.mp4 21MB
  10. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/08. Analyzing Files Statically/01. Demo - How to Use the tools.mp4 19MB
  11. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/03. Unraveling Exploit Obfuscation/01. Continued Deobfuscation.mp4 19MB
  12. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/02. Recognizing the Exploit Vector/02. Exploit Finding Demo.mp4 18MB
  13. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/09. Reversing Malware with Debugging Tools/03. Debug Details and Assignment.mp4 18MB
  14. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/09. Reversing Malware with Debugging Tools/02. More on how to Choose an Approach.mp4 15MB
  15. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/03. Unraveling Exploit Obfuscation/02. Deobfuscation Demo.mp4 14MB
  16. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/11. Customizing Reports - From Researchers to CISOs/01. How to Report Treat Data.mp4 13MB
  17. 01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/03. Case Study.mp4 13MB
  18. 01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/06. Threat Model Demo.mp4 12MB
  19. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/07. Performing Safe Dynamic Analysis/02. Dynamic Analysis Walk-through.mp4 11MB
  20. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/10. Reversing Malware with IDA pro/02. Goals and Cyclic Recap.mp4 10MB
  21. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/03. Unraveling Exploit Obfuscation/00. Intro and Why to Script.mp4 10MB
  22. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/10. Reversing Malware with IDA pro/03. Reversing Details and Assignment.mp4 10MB
  23. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/00. Course Overview/00. Course Overview.mp4 10MB
  24. 01_Beginner/01_Security for Hackers and Developers - Overview/04. Using Static Analysis/02. Understanding Basic Tool.mp4 9MB
  25. 01_Beginner/01_Security for Hackers and Developers - Overview/00. Course Overview/00. Course Overview.mp4 9MB
  26. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/08. Analyzing Files Statically/00. File Analysis Tools and Techniques.mp4 9MB
  27. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/05. Understanding Moving Target Communications/01. DGAs and More.mp4 8MB
  28. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/08. Analyzing Files Statically/02. More Tool Details.mp4 8MB
  29. 01_Beginner/01_Security for Hackers and Developers - Overview/01. Introduction/02. Ongoing Considerations.mp4 8MB
  30. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/04. Circumventing Exploit Kit Encryption/02. Deobfuscation 2.mp4 8MB
  31. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/01. Introduction/02. Security Tool Follow-up.mp4 8MB
  32. 01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/02. SDL.mp4 8MB
  33. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/11. Customizing Reports - From Researchers to CISOs/00. Intro and Recap.mp4 7MB
  34. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/02. Recognizing the Exploit Vector/00. Recognizing Exploit Vector Intro.mp4 7MB
  35. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/06. Detecting Angler in the Wild/03. YARA Examples and Lab.mp4 6MB
  36. 01_Beginner/01_Security for Hackers and Developers - Overview/03. Uncovering Security Bugs/01. Where Do Bugs Hide - .mp4 6MB
  37. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/07. Performing Safe Dynamic Analysis/01. Another Sample.mp4 6MB
  38. 01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/04. Summarize Techniques and Course.mp4 6MB
  39. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/04. Circumventing Exploit Kit Encryption/01. Exploit Kit Details.mp4 6MB
  40. 01_Beginner/01_Security for Hackers and Developers - Overview/03. Uncovering Security Bugs/00. Why Do Bugs Manifest - .mp4 6MB
  41. 01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/05. Threat Modeling.mp4 6MB
  42. 01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/01. Raising Security IQ.mp4 6MB
  43. 01_Beginner/01_Security for Hackers and Developers - Overview/04. Using Static Analysis/01. Applying the Static Analysis Review Cycle.mp4 5MB
  44. 01_Beginner/01_Security for Hackers and Developers - Overview/01. Introduction/01. Why Bugs Happen.mp4 5MB
  45. 01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/02. Assess Threats.mp4 5MB
  46. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/06. Detecting Angler in the Wild/02. YARA.mp4 4MB
  47. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/07. Performing Safe Dynamic Analysis/00. Malware Analysis Goals.mp4 4MB
  48. 01_Beginner/01_Security for Hackers and Developers - Overview/04. Using Static Analysis/00. Introduce Automated Code Analysis.mp4 4MB
  49. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/05. Understanding Moving Target Communications/00. Module Goals and Assignment Review.mp4 4MB
  50. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/04. Circumventing Exploit Kit Encryption/00. Module Overview and Homework Review.mp4 4MB
  51. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/06. Detecting Angler in the Wild/01. Malware Detection.mp4 4MB
  52. 01_Beginner/01_Security for Hackers and Developers - Overview/01. Introduction/00. Introduction.mp4 4MB
  53. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/05. Understanding Moving Target Communications/02. Non-DGA EKs.mp4 4MB
  54. 01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/00. Manual Analysis Process.mp4 4MB
  55. 01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/01. Techniques.mp4 3MB
  56. 01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/04. Attack Surface Reduction.mp4 3MB
  57. 01_Beginner/01_Security for Hackers and Developers - Overview/03. Uncovering Security Bugs/02. How to Find Bugs - .mp4 3MB
  58. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/06. Detecting Angler in the Wild/00. How to Find More Samples.mp4 2MB
  59. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/01. Introduction/00. Introduction to Malware.mp4 2MB
  60. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/05. Understanding Moving Target Communications/03. Begining EK Detection Lab.mp4 2MB
  61. 01_Beginner/01_Security for Hackers and Developers - Overview/Exercise Files/Exercise Files security-hackers-developers.zip 2MB
  62. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/08. Analyzing Files Statically/03. Assignment - Run and Report.mp4 2MB
  63. 01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/07. Wrap-up.mp4 2MB
  64. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/07. Performing Safe Dynamic Analysis/03. Sandbox Assignment.mp4 1MB
  65. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/11. Customizing Reports - From Researchers to CISOs/02. Summary and Assignment.mp4 988KB
  66. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/09. Reversing Malware with Debugging Tools/00. Static or Dynamic Analysis - .mp4 987KB
  67. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/10. Reversing Malware with IDA pro/00. Demo and Lesson Plan.mp4 965KB
  68. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/01. Introduction/03. First Malware Analysis Lab.mp4 699KB
  69. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/03. Unraveling Exploit Obfuscation/03. Deobfuscation Lab 1.mp4 659KB
  70. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/04. Circumventing Exploit Kit Encryption/03. Deobfuscation Lab 2.mp4 644KB
  71. 01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/00. Introduction.mp4 610KB
  72. 01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/03. Push to the Left.mp4 427KB
  73. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/02. Recognizing the Exploit Vector/03. Exploit Finding Lab 1.mp4 303KB
  74. 01_Beginner/01_Security for Hackers and Developers - Overview/01. Introduction/03. Summary.mp4 287KB
  75. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/02. Recognizing the Exploit Vector/01. How to Find the Exploit in a Malware Attack.srt 18KB
  76. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/01. Introduction/01. Demo - Analyzing a Bromium Alert.srt 17KB
  77. 01_Beginner/01_Security for Hackers and Developers - Overview/01. Introduction/02. Ongoing Considerations.srt 14KB
  78. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/09. Reversing Malware with Debugging Tools/03. Debug Details and Assignment.srt 14KB
  79. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/10. Reversing Malware with IDA pro/01. Reversing Demo.srt 13KB
  80. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/11. Customizing Reports - From Researchers to CISOs/01. How to Report Treat Data.srt 13KB
  81. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/03. Unraveling Exploit Obfuscation/01. Continued Deobfuscation.srt 13KB
  82. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/01. Introduction/02. Security Tool Follow-up.srt 12KB
  83. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/07. Performing Safe Dynamic Analysis/02. Dynamic Analysis Walk-through.srt 11KB
  84. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/09. Reversing Malware with Debugging Tools/02. More on how to Choose an Approach.srt 10KB
  85. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/10. Reversing Malware with IDA pro/03. Reversing Details and Assignment.srt 9KB
  86. 01_Beginner/01_Security for Hackers and Developers - Overview/01. Introduction/01. Why Bugs Happen.srt 9KB
  87. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/04. Circumventing Exploit Kit Encryption/01. Exploit Kit Details.srt 9KB
  88. 01_Beginner/01_Security for Hackers and Developers - Overview/03. Uncovering Security Bugs/00. Why Do Bugs Manifest - .srt 9KB
  89. 01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/01. Raising Security IQ.srt 9KB
  90. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/03. Unraveling Exploit Obfuscation/00. Intro and Why to Script.srt 9KB
  91. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/09. Reversing Malware with Debugging Tools/01. Demo - Extract Malware with IDA Debugger.srt 8KB
  92. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/08. Analyzing Files Statically/01. Demo - How to Use the tools.srt 8KB
  93. 01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/03. Case Study.srt 8KB
  94. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/07. Performing Safe Dynamic Analysis/00. Malware Analysis Goals.srt 8KB
  95. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/04. Circumventing Exploit Kit Encryption/02. Deobfuscation 2.srt 8KB
  96. 01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/01. Techniques.srt 7KB
  97. 01_Beginner/01_Security for Hackers and Developers - Overview/03. Uncovering Security Bugs/01. Where Do Bugs Hide - .srt 7KB
  98. 01_Beginner/01_Security for Hackers and Developers - Overview/04. Using Static Analysis/02. Understanding Basic Tool.srt 7KB
  99. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/08. Analyzing Files Statically/00. File Analysis Tools and Techniques.srt 7KB
  100. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/08. Analyzing Files Statically/02. More Tool Details.srt 7KB
  101. 01_Beginner/01_Security for Hackers and Developers - Overview/04. Using Static Analysis/00. Introduce Automated Code Analysis.srt 7KB
  102. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/02. Recognizing the Exploit Vector/00. Recognizing Exploit Vector Intro.srt 7KB
  103. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/10. Reversing Malware with IDA pro/02. Goals and Cyclic Recap.srt 7KB
  104. 01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/02. Assess Threats.srt 6KB
  105. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/07. Performing Safe Dynamic Analysis/01. Another Sample.srt 6KB
  106. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/05. Understanding Moving Target Communications/01. DGAs and More.srt 6KB
  107. 01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/02. SDL.srt 6KB
  108. 01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/05. Threat Modeling.srt 6KB
  109. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/06. Detecting Angler in the Wild/03. YARA Examples and Lab.srt 6KB
  110. 01_Beginner/01_Security for Hackers and Developers - Overview/01. Introduction/00. Introduction.srt 6KB
  111. 01_Beginner/01_Security for Hackers and Developers - Overview/04. Using Static Analysis/01. Applying the Static Analysis Review Cycle.srt 5KB
  112. 01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/00. Manual Analysis Process.srt 5KB
  113. 01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/04. Summarize Techniques and Course.srt 5KB
  114. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/02. Recognizing the Exploit Vector/02. Exploit Finding Demo.srt 5KB
  115. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/06. Detecting Angler in the Wild/02. YARA.srt 5KB
  116. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/03. Unraveling Exploit Obfuscation/02. Deobfuscation Demo.srt 5KB
  117. 01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/06. Threat Model Demo.srt 4KB
  118. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/06. Detecting Angler in the Wild/01. Malware Detection.srt 4KB
  119. 01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/04. Attack Surface Reduction.srt 4KB
  120. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/04. Circumventing Exploit Kit Encryption/00. Module Overview and Homework Review.srt 3KB
  121. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/05. Understanding Moving Target Communications/03. Begining EK Detection Lab.srt 3KB
  122. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/05. Understanding Moving Target Communications/02. Non-DGA EKs.srt 3KB
  123. 01_Beginner/01_Security for Hackers and Developers - Overview/03. Uncovering Security Bugs/02. How to Find Bugs - .srt 3KB
  124. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/06. Detecting Angler in the Wild/00. How to Find More Samples.srt 3KB
  125. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/01. Introduction/00. Introduction to Malware.srt 3KB
  126. 01_Beginner/01_Security for Hackers and Developers - Overview/00. Course Overview/00. Course Overview.srt 3KB
  127. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/07. Performing Safe Dynamic Analysis/03. Sandbox Assignment.srt 3KB
  128. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/11. Customizing Reports - From Researchers to CISOs/00. Intro and Recap.srt 2KB
  129. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/00. Course Overview/00. Course Overview.srt 2KB
  130. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/05. Understanding Moving Target Communications/00. Module Goals and Assignment Review.srt 2KB
  131. 01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/07. Wrap-up.srt 2KB
  132. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/08. Analyzing Files Statically/03. Assignment - Run and Report.srt 2KB
  133. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/10. Reversing Malware with IDA pro/00. Demo and Lesson Plan.srt 2KB
  134. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/09. Reversing Malware with Debugging Tools/00. Static or Dynamic Analysis - .srt 2KB
  135. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/01. Introduction/03. First Malware Analysis Lab.srt 1KB
  136. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/04. Circumventing Exploit Kit Encryption/03. Deobfuscation Lab 2.srt 1KB
  137. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/11. Customizing Reports - From Researchers to CISOs/02. Summary and Assignment.srt 1KB
  138. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/03. Unraveling Exploit Obfuscation/03. Deobfuscation Lab 1.srt 954B
  139. 01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/00. Introduction.srt 832B
  140. 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/02. Recognizing the Exploit Vector/03. Exploit Finding Lab 1.srt 510B
  141. 01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/03. Push to the Left.srt 497B
  142. 01_Beginner/01_Security for Hackers and Developers - Overview/01. Introduction/03. Summary.srt 411B
  143. [DesireCourse.Net].url 51B
  144. [CourseClub.Me].url 48B