Torrent Info
Title [Infosec Institute] IT & Security Courses Collection Part 2 (2020) [En]
Category
Size 126.80GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
001 - Access Control Basics.mp4 59.03MB
001 - Application-based Vulnerabilities.mp4 64.32MB
001 - Application Security Design.mp4 42.71MB
001 - Architectural Concepts & Design Requirements.mp4 495.34MB
001 - Computer Forensics as a Profession a.mp4 141.82MB
001 - Cryptography Terminology.mp4 84.82MB
001 - Cybersecurity Definitions.mp4 80.11MB
001 - Enterprise Risk Management.mp4 38.80MB
001 - Enterprise Risk Management.mp4 38.80MB
001 - How to Use This Video Course.mp4 36.83MB
001 - IaaS security roles and responsibilities.mp4 19.72MB
001 - Intelligence Sources and Confidence Levels.mp4 60.17MB
001 - Intelligence Sources and Confidence Levels.mp4 60.17MB
001 - Introduction to Cyber Threat Hunting Techniques.mp4 26.54MB
001 - Introduction to Information Security.mp4 21.93MB
001 - Introduction to Network+.mp4 41.40MB
001 - Introduction to PenTest+.mp4 6.35MB
001 - Linux Overview.mp4 56.32MB
001 - Mobile Operating Systems.mp4 65.52MB
001 - Overview of Containers.mp4 248.04MB
001 - Welcome to CompTIA Security+.mp4 90.03MB
001 - Welcome to the CompTIA IT Fundamentals path!.mp4 33.05MB
001 - What is a Model.mp4 14.91MB
002 - Access Control Categories.mp4 74.25MB
002 - AWS Introduction.mp4 9.32MB
002 - Business Models and Risk.mp4 89.15MB
002 - Computer Forensics as a Profession b.mp4 113.91MB
002 - Cyber Threat Hunting - Experience Required, part 1.mp4 51.20MB
002 - Digital Asset Protection.mp4 212.12MB
002 - Docker vs rkt and Other Container Runtimes.mp4 159.14MB
002 - Hashing.mp4 74.11MB
002 - Implement Application Security Controls.mp4 123.91MB
002 - Installing Linux.mp4 59.41MB
002 - Introduction to IP Addressing.mp4 83.26MB
002 - Legal and Compliance.mp4 228.25MB
002 - Malware Types.mp4 57.90MB
002 - PaaS security roles and responsibilities.mp4 13.06MB
002 - Risk Mitigation.mp4 84.60MB
002 - Securing Mobile Devices.mp4 43.68MB
002 - The Case for Computer Literacy.mp4 23.21MB
002 - The CIA of Security.mp4 74.88MB
002 - Threat Indicators and Actors.mp4 49.56MB
002 - Threat Indicators and Actors.mp4 49.56MB
002 - Web Application Hacking.mp4 141.19MB
002 - Welcome to the Course.mp4 7.95MB
002 - What is a Model.mp4 14.91MB
002 - What is the CompTIA A+.mp4 36.28MB
003 - Attack Frameworks.mp4 28.66MB
003 - Authentication.mp4 27.49MB
003 - CIA Triad and Risk.mp4 40.17MB
003 - Command Injection.mp4 9.40MB
003 - Computer Forensics as a Profession c.mp4 89.61MB
003 - Cryptographic Attacks.mp4 63.86MB
003 - Cyber Threat Hunting - Experience Required, part 2.mp4 43.23MB
003 - Docker vs Kubernetes.mp4 177.06MB
003 - Exam Foundations.mp4 8.13MB
003 - Features Common to Every Computing Device.mp4 20.75MB
003 - Graphical User Interfaces.mp4 60.72MB
003 - Lines of Defense.mp4 134.81MB
003 - Mobile Device Synchronization.mp4 20.75MB
003 - Operations.mp4 507.11MB
003 - OSI Model vs. TCPIP Model.mp4 70.34MB
003 - OSI Model vs TCPIP Model.mp4 70.34MB
003 - Risk Assessment.mp4 72.29MB
003 - SaaS security roles and responsibilities.mp4 17.64MB
003 - Social Engineering.mp4 45.46MB
003 - Testing Application Code.mp4 10.05MB
003 - Threat Trends.mp4 21.57MB
003 - What is Risk.mp4 258.12MB
003 - Why Get A+ Certified.mp4 48.69MB
004_Setting Up Your Playground and Tools.mp4 50.56MB
004 - Audit's Role.mp4 91.05MB
004 - Cloud Platform and Infrastructure Security.mp4 308.39MB
004 - Command Injection Exploitation.mp4 7.23MB
004 - Command Line Linux.mp4 76.98MB
004 - Common Network Attacks.mp4 55.24MB
004 - Compliance.mp4 5.52MB
004 - Container Image Misconfigurations.mp4 268.74MB
004 - Digital Evidence and Legal Issues b.mp4 163.11MB
004 - Intelligence Cycle and ISACs.mp4 30.22MB
004 - Networks, Part 1.mp4 83.00MB
004 - Network Security Device Types.mp4 37.99MB
004 - Networks of Computing Devices.mp4 57.42MB
004 - Network Topologies.mp4 145.84MB
004 - Policies and Procedures.mp4 127.94MB
004 - Symmetric Cryptography.mp4 67.95MB
004 - Threat Actors.mp4 176.53MB
004 - Vulnerability Identification.mp4 40.66MB
004 - Walking Through OSI and TCPIP.mp4 127.21MB
004 - Web Application Vulnerability Scanning.mp4 10.81MB
004 - What is on the CompTIA A+ Core 1 (220-1001) Exam.mp4 122.06MB
005 - Account Management.mp4 52.85MB
005 - Asymmetric Cryptography.mp4 74.74MB
005 - Attack Frameworks.mp4 28.66MB
005 - Cloud Data Security.mp4 286.83MB
005 - Command Injection Demo.mp4 13.62MB
005 - Compliance Hands-on.mp4 3.61MB
005 - Digital Evidence and Legal Issues c.mp4 122.86MB
005 - Getting Help.mp4 86.77MB
005 - Host Hardening.mp4 71.76MB
005 - Managing Risk.mp4 314.95MB
005 - Meet the Frame.mp4 54.68MB
005 - Networks, Part 2.mp4 71.71MB
005 - Network Tools (PRTG, NTOP and More).mp4 303.13MB
005 - Password Attacks and Countermeasures.mp4 41.18MB
005 - Patch & Vulnerability Management.mp4 45.86MB
005 - Planning and Scoping Introduction.mp4 2.50MB
005 - Platform as a Service.mp4 56.89MB
005 - Remotely-Accessed Computer Systems.mp4 42.18MB
005 - Risk Mitigation.mp4 84.60MB
005 - Roles and Responsibilities.mp4 79.00MB
005 - Running Dockers and Persisting Data.mp4 298.37MB
005 - Setting up AWS Walkthrough.mp4 96.01MB
005 - Validation.mp4 25.41MB
005 - What is on the CompTIA A+ Core 2 (220-1002) Exam.mp4 59.68MB
006 - Application Vulnerabilities.mp4 86.90MB
006 - AWS Security Course Overview.mp4 3.46MB
006 - CIA Triad and Risk.mp4 40.17MB
006 - Cloud Application Security.mp4 266.75MB
006 - Digital Evidence and Legal Issues d.mp4 126.20MB
006 - Directory Organization.mp4 46.54MB
006 - Dockerfile Best Practices.mp4 368.24MB
006 - Frameworks and Standards.mp4 184.40MB
006 - How to Pass the A+ Exam.mp4 63.79MB
006 - Hybrid Cryptography.mp4 41.54MB
006 - Penetration Testing Methodology.mp4 5.22MB
006 - Remediation and Mitigation.mp4 52.06MB
006 - Secure Application Development.mp4 47.20MB
006 - SIEM is a must. Logging choices are important!.mp4 600.85MB
006 - Single Sign-On (SSO).mp4 49.41MB
006 - Software as a Service.mp4 22.31MB
006 - Specialized Computer Systems.mp4 27.75MB
006 - SQL Injection Vulnerabilities.mp4 13.05MB
006 - TCP IP.mp4 109.22MB
006 - The MAC Address.mp4 62.77MB
006 - Threat Research.mp4 54.86MB
006 - Using Guides for Risk Assessment.mp4 166.65MB
006 - Vulnerability, Threat, Risk.mp4 24.65MB
007 - Assessment Methods.mp4 122.85MB
007 - AWS Data Encryption.mp4 20.95MB
007 - Broadcast vs. Unicast.mp4 39.49MB
007 - Digital Evidence and Legal Issues e.mp4 162.89MB
007 - Exploiting SQL Injection.mp4 10.98MB
007 - File Management.mp4 102.05MB
007 - How Security is Organized.mp4 69.57MB
007 - Infrastructure as a Service.mp4 56.52MB
007 - Metadata Walkthrough.mp4 107.47MB
007 - Namespaces & Cgroups.mp4 156.90MB
007 - Network Architecture and Asset Management.mp4 56.77MB
007 - Network Devices.mp4 102.72MB
007 - Planning a Penetration Test.mp4 13.21MB
007 - Professional Communication (Part 1).mp4 111.31MB
007 - Risk Scenarios and Response.mp4 57.44MB
007 - Secure Application Development - Secure Coding Techniques.mp4 46.89MB
007 - Security Assessment Tools and Techniques.mp4 59.25MB
007 - Security Controls.mp4 158.47MB
007 - Set Up Access.mp4 98.53MB
007 - Specialty IO Devices.mp4 24.35MB
007 - Threat Modeling and Intelligence Sharing.mp4 37.30MB
008_Identification.mp4 23.95MB
008 - AWS Data Encryption Hands-On.mp4 6.92MB
008 - Ciphers.mp4 28.87MB
008 - Command Injection Mitigation.mp4 17.18MB
008 - CPUs.mp4 48.10MB
008 - Digital Evidence and Legal Issues f.mp4 93.26MB
008 - DoS Probes Visiting strange sites Normal activity.mp4 374.45MB
008 - File Information.mp4 73.31MB
008 - Firewalls.mp4 72.30MB
008 - Identity and Access Management.mp4 84.38MB
008 - Incident and Emergency Response Procedures.mp4 88.93MB
008 - Interesting Security Controls.mp4 55.55MB
008 - Introduction to IP Addressing.mp4 83.26MB
008 - Introduction to Structured Cabling.mp4 43.83MB
008 - Monitoring and Governance.mp4 32.35MB
008 - Networking Tools.mp4 92.98MB
008 - Policies and Standards for Cybersecurity.mp4 132.89MB
008 - Professional Communication (Part 2).mp4 143.22MB
008 - Rules of Engagement.mp4 9.13MB
008 - Seccomp & Capabilities.mp4 255.04MB
008 - SQL Injection Demo.mp4 18.10MB
008 - Vulnerability Identification.mp4 40.66MB
009 - Analyze Scenarios to Secure Enterprise.mp4 37.77MB
009 - AWS DLP.mp4 6.09MB
009 - Cybersecurity and the Legal Environment.mp4 92.67MB
009 - Defense in Depth.mp4 131.23MB
009 - Digital Evidence and Legal Issues g.mp4 164.33MB
009 - Digital Signatures.mp4 81.06MB
009 - Docker Networking.mp4 214.89MB
009 - Encryption and Active Defense.mp4 59.61MB
009 - Hubs vs Switches.mp4 181.19MB
009 - Legal Concepts.mp4 18.27MB
009 - Misconfiguration and EBS Walkthrough.mp4 321.09MB
009 - Motherboards.mp4 102.34MB
009 - Packets and Ports.mp4 48.65MB
009 - Passive and Active Cooling.mp4 49.40MB
009 - Physical Safety.mp4 112.09MB
009 - Poor Credential Management.mp4 27.85MB
009 - Remediate the Malware.mp4 59.41MB
009 - Scanning Parameters and Criteria.mp4 45.36MB
009 - Securing Network Devices.mp4 42.53MB
009 - Security Standards.mp4 68.56MB
009 - Something You Know.mp4 54.28MB
009 - SQL Injection Mitigation.mp4 16.77MB
009 - Users and Groups.mp4 72.95MB
010 - Attack Simulators Explained.mp4 263.34MB
010 - Authentication.mp4 27.49MB
010 - AWS DLP Hands-On.mp4 8.69MB
010 - Buffer Overflow Mitigation.mp4 26.56MB
010 - Change and Configuration Management.mp4 33.07MB
010 - Credential Management Exploitation.mp4 13.01MB
010 - Digital Evidence and Legal Issues h.mp4 121.24MB
010 - Inside the Container.mp4 231.52MB
010 - IT Security Governance.mp4 213.47MB
010 - Network Topologies.mp4 145.84MB
010 - Notebook Hardware Components.mp4 100.26MB
010 - Privilege Escalation.mp4 57.57MB
010 - RAM and Active Memory.mp4 65.24MB
010 - Review Existing Security.mp4 69.76MB
010 - Scanning Special Considerations.mp4 37.62MB
010 - Secure Software Development.mp4 37.91MB
010 - Security Models Part 1.mp4 67.94MB
010 - Something You Have.mp4 76.64MB
010 - Tools of the Trade.mp4 121.13MB
010 - Virtualization Basics.mp4 56.95MB
010 - Why Asset Classification is Important.mp4 73.72MB
011 - Authorization.mp4 43.46MB
011 - AWS Cloud Storage.mp4 14.51MB
011 - Coaxial Cabling.mp4 69.97MB
011 - Credential Management Demo.mp4 16.57MB
011 - Cross-Site Scripting Mitigation.mp4 9.42MB
011 - Digital Evidence and Legal Issues i.mp4 122.40MB
011 - Hardware Security.mp4 54.48MB
011 - Industry Trends and Effects on Enterprise.mp4 53.78MB
011 - Insurance for Cybersecurity.mp4 67.39MB
011 - Motherboards.mp4 39.51MB
011 - Network Cable and Connector Types.mp4 44.01MB
011 - Network Troubleshooting Theory.mp4 64.93MB
011 - OSINT against AWS Walkthrough.mp4 103.13MB
011 - Outside the Container.mp4 250.88MB
011 - Review Cyber Threat Hunting Techniques.mp4 14.46MB
011 - Security Models Part 2.mp4 84.49MB
011 - Security Policies.mp4 218.54MB
011 - Something You Are (Biometrics).mp4 65.83MB
011 - SSL and TLS.mp4 44.12MB
011 - Testing Strategies.mp4 5.80MB
011 - Troubleshooting Theory.mp4 187.21MB
011 - Validation.mp4 25.41MB
011 - Viewing File Permissions.mp4 26.67MB
012 - AWS Cloud Storage Hands-On.mp4 7.75MB
012 - Cross-Site Scripting Vulnerabilities.mp4 6.72MB
012 - Cryptographic Concepts.mp4 29.46MB
012 - Cyber Threat Hunting Project Walkthrough.mp4 38.18MB
012 - Data Analysis.mp4 45.66MB
012 - Digital Evidence and Legal Issues j.mp4 156.73MB
012 - Frameworks.mp4 220.57MB
012 - Handling Errors Properly.mp4 11.66MB
012 - IA and Security Community.mp4 49.06MB
012 - Introduction to Routers.mp4 155.35MB
012 - Power Supplies.mp4 30.67MB
012 - Primary PC Components.mp4 74.71MB
012 - Remediation and Mitigation.mp4 52.06MB
012 - Remote Access Security.mp4 54.89MB
012 - Reproducible Builds.mp4 189.43MB
012 - Risk Assessment.mp4 213.02MB
012 - Security Models Part 3.mp4 70.57MB
012 - Storage Devices.mp4 86.85MB
012 - Twisted Pair Cabling.mp4 71.28MB
012 - User Environment Configuration Overview.mp4 4.80MB
012 - White Box Support Resources.mp4 11.53MB
013 - Ask Me Anything about System Hardware.mp4 86.64MB
013 - Authorization.mp4 43.46MB
013 - AWS IAM.mp4 12.33MB
013 - Cat Ratings.mp4 82.66MB
013 - Change Management.mp4 53.88MB
013 - Cross-Site Scripting Exploitation.mp4 12.58MB
013 - Digital Evidence and Legal Issues k.mp4 138.91MB
013 - External Connections.mp4 166.95MB
013 - Graphics Information.mp4 89.01MB
013 - Impact Analysis.mp4 32.85MB
013 - Implement Security Activities Through the Technology Life Cycle.mp4 50.01MB
013 - Industry Trends and Effects on Enterprise.mp4 53.78MB
013 - Inhibitors to Remediation.mp4 48.74MB
013 - Managing Credentials Properly.mp4 25.36MB
013 - Public vs Internal Image Repositories.mp4 136.47MB
013 - Quantitative Risk Calculations.mp4 156.42MB
013 - Security Awareness Training for Cybersecurity.mp4 67.33MB
013 - Security Modes.mp4 30.90MB
013 - Standards and Best Practices.mp4 20.25MB
013 - Teardown of Project Artifacts Walkthrough.mp4 86.61MB
013 - Types of Assessments.mp4 9.74MB
013 - Virtualization.mp4 80.19MB
014 - AWS IAM Hands-On.mp4 9.09MB
014 - Business Impact Analysis.mp4 312.31MB
014 - Collective Tools.mp4 42.27MB
014 - Contingency Planning.mp4 83.62MB
014 - Cross-Site Scripting Demo.mp4 7.22MB
014 - End to End Ownership.mp4 63.67MB
014 - Evaluation Models.mp4 52.42MB
014 - Fiber Optic Cabling.mp4 66.18MB
014 - Hardening the Build Infrastructure.mp4 150.63MB
014 - Inside the PC.mp4 166.93MB
014 - Introduction to Azure.mp4 8.99MB
014 - Investigations a.mp4 128.28MB
014 - Package Management.mp4 81.36MB
014 - Ports and Connectors.mp4 37.68MB
014 - Risk and Control for Social Media.mp4 63.39MB
014 - Secure Network Topologies.mp4 43.06MB
014 - Security Activities Throughout the Technology Life Cycle.mp4 50.01MB
014 - Session Management and Accountability.mp4 34.26MB
014 - Threat Actors.mp4 13.11MB
014 - Troubleshooting Methodology.mp4 88.68MB
014 - Web App Scanners, Part 1.mp4 35.50MB
015 - Assessing Third-Party Risk.mp4 165.27MB
015 - AWS Infrastructure Security.mp4 12.26MB
015 - Cyber Threat Hunting Hints.mp4 6.75MB
015 - Facilitate Collaboration Across Business Units.mp4 82.51MB
015 - Fire Ratings.mp4 78.99MB
015 - General Use of IO Devices.mp4 48.53MB
015 - Investigations b.mp4 136.65MB
015 - Iron vs VM vs Cloud Providers.mp4 253.24MB
015 - Managing Libraries.mp4 30.43MB
015 - Organizing Data.mp4 262.50MB
015 - Patch Management.mp4 24.46MB
015 - Permissions.mp4 34.97MB
015 - Poor Error Handling.mp4 12.91MB
015 - Rainbow Series.mp4 27.31MB
015 - System Monitoring.mp4 65.71MB
015 - Target Selection.mp4 8.17MB
015 - Troubleshooting Core System Elements.mp4 95.78MB
015 - Web App Scanners, Part 2.mp4 16.56MB
015 - What is a Computer.mp4 123.78MB
015 - WLAN Authentication.mp4 92.98MB
016 - Ask Me Anything About IO, Ports and Peripherals.mp4 93.36MB
016 - AWS Infrastructure Security Hands-On.mp4 9.82MB
016 - Common Criteria.mp4 54.94MB
016 - Disk Usage.mp4 107.75MB
016 - Exploiting Poor Error Handling.mp4 5.75MB
016 - Host Hardening.mp4 61.91MB
016 - Immutable Containers.mp4 226.59MB
016 - Investigations c.mp4 146.62MB
016 - Legacy Network Connections.mp4 93.26MB
016 - Measuring Performance Controls.mp4 84.52MB
016 - Network Security Device Types.mp4 37.99MB
016 - Remote Authentication Services.mp4 41.08MB
016 - Scanning.mp4 21.97MB
016 - Security Training.mp4 204.78MB
016 - Telnet and SSH.mp4 57.42MB
016 - Threat Hunting and Hypothesis.mp4 46.61MB
016 - Troubleshooting the Physical Network.mp4 88.95MB
016 - What is an Operating System.mp4 115.45MB
016 - Whitelisting and Other Scoping Considerations.mp4 12.00MB
017 - Attacking Azure Targets walkthrough.mp4 240.09MB
017 - AWS Network Security.mp4 13.15MB
017 - Basics of Binary.mp4 41.84MB
017 - Certification and Accreditation.mp4 29.89MB
017 - Configuring and Executing Scans.mp4 23.90MB
017 - Devices.mp4 95.78MB
017 - Federated Identity.mp4 51.14MB
017 - Investigations d.mp4 72.96MB
017 - Live Scanning.mp4 135.09MB
017 - Network Security Component Management.mp4 86.19MB
017 - Poor Error Handling Demo.mp4 5.57MB
017 - Security Operations Center (SOC) Definitions and Concepts.mp4 255.18MB
017 - Standard Business Documentation.mp4 38.56MB
017 - Third-Party Agreements.mp4 198.96MB
017 - Troubleshooting the Logical Network.mp4 108.46MB
017 - Users and Super Users.mp4 63.27MB
017 - Virtualization Technologies.mp4 50.49MB
017 - What is Ethernet.mp4 59.53MB
017 - Workflow and Scripting.mp4 50.90MB
018 - Analyze Network-Enabled Devices.mp4 97.22MB
018 - AWS Network Security Hands-On.mp4 7.94MB
018 - Baselines and Anomaly Detection.mp4 255.80MB
018 - Cross-Site Request Forgery Vulnerabilities.mp4 7.56MB
018 - Ethernet Frames.mp4 80.29MB
018 - Incident Response Process.mp4 30.50MB
018 - Integrating Identity Services.mp4 37.68MB
018 - Introduction to Information Gathering and Vulnerability Identification.mp4 4.78MB
018 - Investigations e.mp4 88.36MB
018 - Management of Threats and Vulnerabilities.mp4 274.95MB
018 - Preventative Tools, Part 1.mp4 87.59MB
018 - Remote Connectivity.mp4 25.54MB
018 - Secure SDLC.mp4 66.50MB
018 - Static Environments.mp4 45.22MB
018 - Storage Technologies.mp4 48.81MB
018 - Virtual File Systems.mp4 31.37MB
018 - Why Windows.mp4 90.91MB
019 - Access Control Models.mp4 71.03MB
019 - Analyze Advanced Network Design.mp4 77.26MB
019 - AWS Application Security.mp4 8.24MB
019 - Azure Run walkthrough.mp4 121.86MB
019 - Cross-Site Request Forgery Exploitation.mp4 8.29MB
019 - Cryptography Basics.mp4 442.99MB
019 - Digital Forensics.mp4 48.93MB
019 - Early Ethernet.mp4 76.45MB
019 - Identity and Access Management.mp4 184.57MB
019 - Information Gathering Techniques.mp4 19.47MB
019 - Introduction to Kubernetes.mp4 321.74MB
019 - Investigations f.mp4 132.57MB
019 - Mass Storage Variation.mp4 35.43MB
019 - Physical Security.mp4 75.51MB
019 - Preventative Tools, Part 2.mp4 33.88MB
019 - Processes.mp4 62.35MB
019 - Software Development Models.mp4 107.93MB
019 - Web Application Attacks and Countermeasures.mp4 86.19MB
019 - Windows Editions and Versions.mp4 113.68MB
020 - Access Control Techniques.mp4 48.12MB
020 - Ask Me Anything About Data Storage and Sharing.mp4 85.17MB
020 - Authentication, Authorization, and Accounting.mp4 51.37MB
020 - AWS Disaster Recovery.mp4 5.16MB
020 - Business Impact Analysis.mp4 34.76MB
020 - Configuration Management and Asset Management.mp4 148.11MB
020 - Contingecy Planning.mp4 68.55MB
020 - Cross-Site Request Forgery Demo.mp4 5.40MB
020 - Cryptographic Methods.mp4 195.56MB
020 - Information Gathering Techniques Demonstration.mp4 35.29MB
020 - Investigations g.mp4 152.85MB
020 - Kubernetes Cluster, API and etcd.mp4 290.82MB
020 - Maturity Models.mp4 56.79MB
020 - Network Security Control Topics.mp4 73.69MB
020 - Processes Priority and Execution.mp4 59.26MB
020 - The Daddy of Ethernet 10BaseT.mp4 28.51MB
020 - Touring the macOS.mp4 63.85MB
020 - Vulnerability Scanning.mp4 40.50MB
021 - Access Control Administration.mp4 29.50MB
021 - Access Controls.mp4 51.36MB
021 - AWS Security Summary.mp4 7.78MB
021 - Change Control.mp4 58.50MB
021 - Configure Controls for Network Security.mp4 61.67MB
021 - Frameworks.mp4 39.00MB
021 - Investigations h.mp4 122.49MB
021 - Kernels.mp4 94.66MB
021 - Kubernetes Nodes, Pods and kublet.mp4 213.86MB
021 - Managing Change.mp4 120.89MB
021 - Operating System Functions.mp4 44.72MB
021 - OSINT against Azure walkthrough.mp4 79.25MB
021 - Reverse Engineering.mp4 33.37MB
021 - Scanning and Enumeration.mp4 9.08MB
021 - Site Layout and Access Security.mp4 67.98MB
021 - Symmetric Cryptosystems.mp4 300.73MB
021 - Terminating Twisted Pair.mp4 197.29MB
021 - Touring Linux.mp4 96.35MB
022 - Access Control Attacks.mp4 54.84MB
022 - AWS Project Walkthrough.mp4 6.52MB
022 - Enumeration.mp4 30.98MB
022 - Hubs vs. Switches.mp4 181.19MB
022 - Indentification and Authentication.mp4 25.80MB
022 - Investigations i.mp4 119.78MB
022 - Kubernetes Services, Labes and Namespaces.mp4 261.91MB
022 - Mitigating Network Threats.mp4 45.77MB
022 - Operating System Interfaces.mp4 38.23MB
022 - Patch Management.mp4 131.44MB
022 - Policies and Procedures.mp4 33.15MB
022 - Scanning and Enumeration Demonstration.mp4 36.77MB
022 - Select Host Hardware and Software.mp4 74.80MB
022 - Software Testing.mp4 94.80MB
022 - Symmetric Block Modes.mp4 203.94MB
022 - Tape Archive Files.mp4 78.42MB
022 - What is a CPU.mp4 137.94MB
023 - 100BaseT.mp4 69.30MB
023 - Ask Me Anything About Understanding OSes.mp4 55.42MB
023 - Authorization and Accounting.mp4 13.85MB
023 - AWS Project Hint 1.mp4 4.07MB
023 - Considerations for Network Security.mp4 280.13MB
023 - CPU Speeds and Cores.mp4 133.63MB
023 - Fingerprinting.mp4 8.33MB
023 - Harden Hosts.mp4 71.76MB
023 - Hardening Devices.mp4 179.86MB
023 - Investigations j.mp4 105.50MB
023 - Kubernetes and Networking.mp4 152.93MB
023 - RSA Cryptosystems.mp4 271.95MB
023 - Scheduling Tasks.mp4 73.58MB
023 - Social Engineering.mp4 55.65MB
023 - Software Environment.mp4 87.22MB
023 - Teardown of Lab Environment walkthrough.mp4 28.76MB
023 - Wireless Assessment Tools.mp4 32.69MB
024 - Authentication Products and Protocols.mp4 38.73MB
024 - AWS Project Hint 2.mp4 2.28MB
024 - Building and Deploying a Secure Authorization Process.mp4 117.18MB
024 - Caching.mp4 78.94MB
024 - Circumventing Access Controls.mp4 23.39MB
024 - Cloud Assessment Tools.mp4 16.40MB
024 - Connecting Switches.mp4 57.05MB
024 - Cryptographic Inspection.mp4 2.61MB
024 - Diffie-Hellman.mp4 157.76MB
024 - Investigations k.mp4 166.74MB
024 - Kubernetes Security Design.mp4 188.11MB
024 - Object-Oriented Programming (OOP).mp4 45.58MB
024 - Preparing the Work Area.mp4 21.12MB
024 - Protect Boot Loaders.mp4 27.33MB
024 - SNMP.mp4 79.87MB
024 - System Monitoring.mp4 50.86MB
025 - 32-Bit vs. 64-Bit Processing.mp4 121.16MB
025 - Access Provisioning.mp4 66.36MB
025 - AWS Project Hint 3.mp4 3.32MB
025 - Directory Services.mp4 31.37MB
025 - Distributed Computing.mp4 38.25MB
025 - Eavesdropping.mp4 5.80MB
025 - Gigabit Ethernet and 10-Gigabit Ethernet.mp4 67.07MB
025 - Investigations l.mp4 104.79MB
025 - Kubernetes Authentication and Authorization.mp4 210.08MB
025 - Managing Incidents.mp4 287.90MB
025 - Mobile and IoT.mp4 67.22MB
025 - PGPGPG.mp4 256.97MB
025 - Setting up a Desktop PC.mp4 16.01MB
025 - Storage Types.mp4 70.15MB
025 - Troubleshooting Structured Cabling.mp4 35.79MB
025 - Viewing and Using Ports.mp4 16.71MB
026 - AWS Project Hint 4.mp4 1.25MB
026 - Character Based Names.mp4 80.89MB
026 - Completing PC Setup.mp4 25.66MB
026 - CPU Sockets.mp4 187.51MB
026 - Decompiling and Debugging.mp4 5.77MB
026 - Embedded and Firmware Systems.mp4 61.87MB
026 - Firewalls.mp4 74.75MB
026 - Hashing.mp4 170.87MB
026 - Investigations m.mp4 169.95MB
026 - Kublet Security and Managing Secrets.mp4 241.26MB
026 - Mobile Code.mp4 48.24MB
026 - Predicting Hardware Failure.mp4 39.36MB
026 - Privilege Policies.mp4 26.83MB
026 - Protection for User Endpoints.mp4 56.73MB
026 - Storage Protocols.mp4 83.68MB
026 - Transcievers.mp4 94.27MB
027 - Access and Vehicles Risk.mp4 53.80MB
027 - Account Management.mp4 82.48MB
027 - Acquired Software.mp4 34.24MB
027 - Ask Me Anything About Setting up and Configuring a PC.mp4 92.97MB
027 - Azure Security Course Overview.mp4 4.27MB
027 - Computer Forensics Tools and Hardware.mp4 160.69MB
027 - Connecting Ethernet Scenarios.mp4 198.18MB
027 - DMZ.mp4 80.99MB
027 - HMAC.mp4 99.53MB
027 - Implement Secure Storage Controls.mp4 73.76MB
027 - Installing a CPU.mp4 199.98MB
027 - Introduction to Wireshark.mp4 93.90MB
027 - Kubernetes Pod, Network Policies and 3rd Party Integrations.mp4 229.65MB
027 - Networks.mp4 43.19MB
027 - Open Source Intelligence.mp4 12.69MB
027 - Security in Applications.mp4 192.26MB
028 - Application Attacks.mp4 80.68MB
028 - Aspects of Hard Drives a.mp4 140.26MB
028 - Automation and Control Risk.mp4 70.36MB
028 - Azure Data Encryption.mp4 12.49MB
028 - BCM-DRP-BRP.mp4 86.92MB
028 - Honeypots.mp4 42.44MB
028 - Identify General Application Vulnerabilities.mp4 86.90MB
028 - Introduction to Netstat.mp4 41.38MB
028 - Introduction to Structured Cabling.mp4 43.83MB
028 - Kubernetes Logging and Auditing.mp4 220.01MB
028 - Liquid Cooling.mp4 24.37MB
028 - Network File Resources.mp4 71.80MB
028 - Personalizing a Tablet.mp4 79.61MB
028 - Steganography.mp4 143.43MB
028 - Types of Security Policies.mp4 56.87MB
029 - Ask Me Anything About Mobile Devices Part 1.mp4 89.76MB
029 - Aspects of Hard Drives b.mp4 122.27MB
029 - Azure Data Encryption - Hands-On.mp4 17.02MB
029 - Business Continuity Concepts.mp4 39.19MB
029 - Certificates and Trust.mp4 373.80MB
029 - Cloud Models.mp4 42.94MB
029 - Compliance.mp4 115.30MB
029 - Endpoint Security.mp4 24.66MB
029 - Identify Web Application Vulnerabilities.mp4 106.55MB
029 - Malware.mp4 44.80MB
029 - Managing NFS.mp4 56.57MB
029 - Preventing Resource Exhaustion.mp4 226.66MB
029 - RAM Technology.mp4 133.61MB
029 - Terminating Structured Cabling.mp4 112.69MB
029 - Vulnerability Scanning.mp4 17.07MB
030 - Accessibility.mp4 69.14MB
030 - Application Security Design.mp4 42.71MB
030 - Ask Me Anything About Mobile Devices Part 2.mp4 87.61MB
030 - Aspects of Hard Drives c.mp4 120.69MB
030 - Azure DLP.mp4 10.44MB
030 - Cryptography.mp4 130.04MB
030 - Equipment Room.mp4 87.85MB
030 - Helm, and Application Deployment.mp4 266.98MB
030 - IDS.mp4 67.72MB
030 - Public Key Infrastructure.mp4 537.66MB
030 - RAM Capacity.mp4 119.73MB
030 - Remote Service Invocation (FaaS, IaC, API).mp4 44.67MB
030 - Risk Assessment and Mitigation.mp4 54.87MB
030 - Scanning Considerations.mp4 10.19MB
030 - VPN and VLAN.mp4 61.47MB
031 - Alternative Distribution Panels.mp4 67.63MB
031 - Application and Container Scans.mp4 5.07MB
031 - Aspects of Hard Drives d.mp4 188.86MB
031 - Authentication Protocols.mp4 29.86MB
031 - Azure Cloud Storage.mp4 7.73MB
031 - Cloud Vulnerabilities.mp4 33.84MB
031 - Cryptographic Attacks.mp4 625.86MB
031 - File Management Tools.mp4 9.31MB
031 - Firewall and Network Security.mp4 213.37MB
031 - Implement Application Security Controls.mp4 123.91MB
031 - Incident Response Procedures.mp4 62.76MB
031 - Localization.mp4 84.87MB
031 - Master Hardening.mp4 153.83MB
031 - RAM Features.mp4 99.54MB
032 - Analyzing Vulnerability Scans.mp4 13.05MB
032 - Azure IAM.mp4 15.14MB
032 - Distributed and Cloud Computing.mp4 60.19MB
032 - File Manipulation.mp4 34.55MB
032 - File Systems a.mp4 110.83MB
032 - Forensic Procedures.mp4 46.10MB
032 - Identification.mp4 334.26MB
032 - Injection and Overflow Attacks.mp4 52.07MB
032 - Installing RAM.mp4 116.94MB
032 - Log Management Using SIEM.mp4 139.32MB
032 - Node Hardening.mp4 186.40MB
032 - OSI Protocols.mp4 70.69MB
032 - Select Vulnerability Assessment Methods.mp4 122.85MB
032 - System Security.mp4 83.09MB
032 - Testing Cable.mp4 93.23MB
033 - Authentication Attacks.mp4 44.24MB
033 - Authorization Concepts.mp4 153.67MB
033 - Azure IAM Hands-On.mp4 25.40MB
033 - Backups.mp4 27.34MB
033 - File Systems b.mp4 115.64MB
033 - Network Security.mp4 75.77MB
033 - Pod Security and Availability.mp4 242.92MB
033 - Security Controls.mp4 34.19MB
033 - Select Vulnerability Assessment Tools.mp4 57.42MB
033 - Troubleshooting Structured Cabling (Part 1).mp4 35.79MB
033 - Virtualization.mp4 76.57MB
033 - Virtual Memory.mp4 52.56MB
033 - Wireless Considerations.mp4 213.02MB
034 - Access Control List.mp4 118.29MB
034 - Ask Me Anything About Managing Files.mp4 89.97MB
034 - Azure Disaster Recovery.mp4 21.58MB
034 - Considerations for Cloud Computing.mp4 219.38MB
034 - Data Handling.mp4 77.54MB
034 - Design Systems to Facilitate Incident Response.mp4 51.14MB
034 - Exploits.mp4 33.83MB
034 - File Systems c.mp4 108.93MB
034 - Leveraging Information for Exploit.mp4 6.49MB
034 - Monitoring the Cluster for Attacks.mp4 200.77MB
034 - OSI Layers.mp4 88.81MB
034 - Troubleshooting Structured Cabling (Part 2).mp4 48.60MB
034 - Virtualized Networks.mp4 52.07MB
034 - Web Services.mp4 78.13MB
034 - What is BIOS.mp4 85.54MB
035 - Application Vulnerabilities, Part 1.mp4 52.24MB
035 - Azure Disaster Recovery Hands-On.mp4 17.34MB
035 - Common Attack Techniques.mp4 10.94MB
035 - Conduct Incident and Emergency Responses.mp4 88.93MB
035 - Facility Design.mp4 63.75MB
035 - File Systems d.mp4 181.65MB
035 - Mobile Computing Issues.mp4 218.58MB
035 - MySQL.mp4 65.49MB
035 - Password Security.mp4 239.48MB
035 - POST.mp4 127.26MB
035 - Securing the Cluster from the External Network.mp4 171.93MB
035 - Symmetric Encryption.mp4 28.93MB
035 - Using a Toner and Probe.mp4 25.63MB
035 - Walking Survey of Applications.mp4 54.59MB
036 - Application Vulnerabilities, Part 2.mp4 47.00MB
036 - Asymmetric Encryption.mp4 41.78MB
036 - Azure Infrastructure Security.mp4 10.46MB
036 - Facility Construction.mp4 36.23MB
036 - File and Operating System Forensics a.mp4 154.04MB
036 - FTP Services.mp4 71.46MB
036 - Implement Security Standards in the Enterprise.mp4 68.56MB
036 - Integration with CICD Systems.mp4 225.20MB
036 - IoT.mp4 125.88MB
036 - Linux File Permissions.mp4 364.78MB
036 - Managing Applications.mp4 27.00MB
036 - System Setup.mp4 90.79MB
036 - TCPIP Model.mp4 45.84MB
036 - Weaknesses in Specialized Systems.mp4 17.59MB
036 - Wired Connection Scenarios.mp4 135.99MB
037 - Applications and Extensions.mp4 30.62MB
037 - Azure Network Security.mp4 9.86MB
037 - Configuring E-Mail.mp4 81.70MB
037 - Cryptographic Hash Functions.mp4 20.94MB
037 - File and Operating System Forensics b.mp4 134.78MB
037 - Introduction to IP Addressing and Binary.mp4 134.74MB
037 - Network Architecture and Asset Management.mp4 56.77MB
037 - Network Devices.mp4 96.51MB
037 - Perimeter Defenses.mp4 100.98MB
037 - Secure the Design of the Enterprise Infrastructure.mp4 51.54MB
037 - Troubleshooting Firmware.mp4 135.05MB
037 - Virtualization.mp4 176.61MB
037 - Windows File Permissions.mp4 353.79MB
038 - Ask Me Anything About Working with Applications.mp4 79.58MB
038 - Attacks and Exploits Overview.mp4 3.56MB
038 - Azure Application Security.mp4 8.14MB
038 - Doors and Locks.mp4 70.68MB
038 - File and Operating System Forensics c.mp4 112.25MB
038 - Form Factors.mp4 112.33MB
038 - Industrial Control Systems.mp4 177.20MB
038 - Introduction to ARP.mp4 26.49MB
038 - Network Security.mp4 49.75MB
038 - Network Troubleshooting.mp4 66.48MB
038 - PKI and Certificates.mp4 44.15MB
038 - Protecting Your Territory.mp4 27.61MB
038 - Secure Enterprise Application Integration Enablers.mp4 122.23MB
038 - User Account Management.mp4 177.95MB
039 - AAA.mp4 212.57MB
039 - Azure Security Summary.mp4 10.38MB
039 - Chipsets.mp4 79.79MB
039 - File and Operating System Forensics d.mp4 170.14MB
039 - Identity and Access Management.mp4 84.38MB
039 - Internal Facilities Security.mp4 117.72MB
039 - IP Networking.mp4 116.81MB
039 - PKI Architecture.mp4 32.34MB
039 - Social Engineering Attack Methods.mp4 20.80MB
039 - Subnet Masks.mp4 115.69MB
039 - Text Stream Utilities.mp4 36.00MB
039 - Virtualize Technologies.mp4 87.20MB
039 - Wi-Fi Setup.mp4 24.52MB
040 - Authentication Methods.mp4 258.88MB
040 - Azure Project Walkthrough.mp4 8.48MB
040 - Classful Addressing.mp4 90.96MB
040 - Encryption and Active Defense.mp4 59.61MB
040 - File and Operating System Forensics e.mp4 84.29MB
040 - Going High Speed.mp4 31.02MB
040 - Implement Cloud Augmented Security Services.mp4 47.70MB
040 - Physical Intrusion Detection.mp4 107.72MB
040 - Social Engineering Motivation Factors.mp4 11.43MB
040 - Touring the Motherboard.mp4 248.63MB
041 - Azure Hint 1.mp4 4.97MB
041 - Deployment Models and the Cloud.mp4 74.47MB
041 - DNS and DHCP.mp4 79.52MB
041 - File and Operating System Forensics f.mp4 135.91MB
041 - Personnel Safety.mp4 33.40MB
041 - Physical Security Attacks.mp4 9.04MB
041 - Platforms.mp4 52.11MB
041 - Setting Up and Sharing Printers.mp4 31.57MB
041 - Single Sign-On.mp4 263.12MB
041 - Subnetting with CIDR.mp4 92.23MB
041 - Touring the Case.mp4 101.20MB
042 - ARP.mp4 32.60MB
042 - Ask Me Anything About Networks and Internet Connectivity Part 1.mp4 84.14MB
042 - Azure Hint 2.mp4 4.31MB
042 - Deployment Models and Virtualization-segmentation.mp4 69.36MB
042 - File and Operating System Forensics g.mp4 80.81MB
042 - Installing a Motherboard.mp4 154.34MB
042 - Media Storage.mp4 33.24MB
042 - More CIDR Subnetting Practice.mp4 89.25MB
042 - OS Utilities, Part 1.mp4 382.07MB
042 - SOA and DevSecOps.mp4 65.70MB
043 - Ask Me Anything About Networks and Internet Connectivity Part 2.mp4 56.27MB
043 - Authentication.mp4 27.49MB
043 - Azure Hint 3.mp4 5.25MB
043 - Dynamic and Static IP Addressing.mp4 102.36MB
043 - Multi-layer Protocols.mp4 44.73MB
043 - Network-based Vulnerabilities.mp4 24.37MB
043 - OS Utilities, Part 2.mp4 363.86MB
043 - Secure Software Development.mp4 37.91MB
043 - The Power Supply.mp4 149.51MB
043 - Utilities and HVAC.mp4 95.57MB
043 - Viruses and Malware.mp4 215.56MB
044 - Authorization.mp4 43.46MB
044 - Best Coding Practices.mp4 32.35MB
044 - Converged Protocols.mp4 91.03MB
044 - Email and Browser Forensics a.mp4 142.22MB
044 - Fire Safety.mp4 86.40MB
044 - GCP Security Course Overview.mp4 1.63MB
044 - Mounting a Power Supply.mp4 143.11MB
044 - Network Scanners.mp4 280.37MB
044 - Physical Security.mp4 25.24MB
044 - Rogue DHCP Servers.mp4 49.72MB
044 - Wireless-based Vulnerabilities.mp4 15.72MB
045 - Choosing a Power Supply.mp4 85.31MB
045 - Dealing with Malware.mp4 24.49MB
045 - Email and Browser Forensics b.mp4 102.14MB
045 - GCP Data Encryption.mp4 17.65MB
045 - Network Cabling and Topology.mp4 120.43MB
045 - Network Security Device Types.mp4 37.99MB
045 - Protocol Analyzers.mp4 282.64MB
045 - Special IP Addresses.mp4 69.95MB
045 - Trusted Hardware.mp4 71.37MB
045 - Trust Models.mp4 71.13MB
045 - Wireless Network Attack Demonstration.mp4 13.23MB
046 - Application-based Vulnerabilities.mp4 64.32MB
046 - Email and Browser Forensics c.mp4 154.56MB
046 - GCP DLP.mp4 10.22MB
046 - Hardware Encryption.mp4 32.54MB
046 - Implement Advanced Identity Management.mp4 51.36MB
046 - IP Addressing Scenarios.mp4 177.05MB
046 - Network Security Component Management.mp4 86.19MB
046 - Password Management.mp4 21.84MB
046 - Power Protection.mp4 123.39MB
046 - Signaling Types.mp4 40.90MB
046 - SNMP.mp4 336.00MB
047 - Analyze Network-Enabled Devices.mp4 97.22MB
047 - Clickworthy.mp4 24.19MB
047 - Cooling Your PC.mp4 166.34MB
047 - Cryptographic Concepts.mp4 29.46MB
047 - Email and Browser Forensics d.mp4 93.84MB
047 - GCP Cloud Storage.mp4 1.51MB
047 - Hardware Security.mp4 54.48MB
047 - Introducing Routers.mp4 155.35MB
047 - Logs.mp4 231.82MB
047 - Network Attacks.mp4 100.89MB
048 - Analyze Advanced Network Design.mp4 77.26MB
048 - Data Analysis.mp4 45.66MB
048 - Denial of Service.mp4 192.74MB
048 - Email and Browser Forensics e.mp4 138.20MB
048 - GCP IAM.mp4 10.58MB
048 - Local Host Vulnerabilities.mp4 5.50MB
048 - Perils of Public Internet.mp4 15.50MB
048 - Switching.mp4 17.10MB
048 - Troubleshooting Power Supplies.mp4 187.13MB
048 - Trust in Cryptography.mp4 44.46MB
048 - Understanding Ports.mp4 82.51MB
049 - Ask Me Anything About IT Threat Mitigation Part 1.mp4 81.38MB
049 - Cryptographic Design.mp4 49.48MB
049 - Email and Browser Forensics f.mp4 136.48MB
049 - Endpoint Security.mp4 54.15MB
049 - GCP IAM Hands-On.mp4 10.55MB
049 - Host Threats.mp4 237.23MB
049 - Network Address Translation.mp4 70.02MB
049 - Network Security Control Topics.mp4 73.69MB
049 - Privilege Escalation (Linux).mp4 8.59MB
049 - Troubleshooting Core Components.mp4 252.34MB
049 - Wireless Networks.mp4 105.04MB
050 - Ask Me Anything About IT Threat Mitigation Part 2.mp4 95.39MB
050 - Configure Controls for Network Security.mp4 61.67MB
050 - Cryptographic Techniques.mp4 41.87MB
050 - Email and Browser Forensics g.mp4 161.72MB
050 - GCP Infrastructure Security.mp4 25.49MB
050 - Implementing NAT.mp4 15.32MB
050 - Introduction to Mass Storage.mp4 127.84MB
050 - Man-in-the-Middle.mp4 581.22MB
050 - Mobile Systems.mp4 92.38MB
050 - Privilege Escalation (Windows).mp4 20.66MB
050 - Recon Results, Part 1.mp4 62.36MB
051 - Digital Signatures and Code Signing.mp4 42.10MB
051 - Email and Browser Forensics h.mp4 135.81MB
051 - Forwarding Ports.mp4 185.60MB
051 - GCP Infrastructure Security Hands-On.mp4 9.87MB
051 - Magnetic Disk Drives.mp4 143.10MB
051 - Power Management.mp4 7.40MB
051 - Privilege Escalation Techniques.mp4 9.66MB
051 - Recon Results, Part 2.mp4 26.50MB
051 - Select Host Hardware and Software.mp4 74.80MB
051 - System Resiliency.mp4 292.17MB
051 - WAN Technologies.mp4 74.67MB
052 - Choose Cryptographic Implementations.mp4 47.09MB
052 - Cleaning and Maintaining Computers.mp4 27.62MB
052 - Email and Browser Forensics i.mp4 97.35MB
052 - GCP Network Security.mp4 14.28MB
052 - Harden Hosts.mp4 71.76MB
052 - Impact Analysis.mp4 32.85MB
052 - Privilege Escalation Demo.mp4 28.28MB
052 - RAID.mp4 250.11MB
052 - Remote Access.mp4 61.03MB
052 - Solid State Drives.mp4 123.61MB
052 - Tour of a SOHO Router.mp4 61.21MB
053 - Collective Tools.mp4 42.27MB
053 - Email and Browser Forensics j.mp4 117.24MB
053 - GCP Application Security.mp4 8.69MB
053 - NAS and SAN.mp4 410.33MB
053 - Protect Boot Loaders.mp4 27.33MB
053 - SCSI.mp4 47.97MB
053 - Secure Communication Protocols.mp4 81.76MB
053 - SOHO vs. Enterprise.mp4 86.11MB
053 - Trash it or Stash it.mp4 24.64MB
054 - Ask Me Anything About Computer Maintenance and Management.mp4 128.99MB
054 - Boot Order.mp4 72.37MB
054 - GCP Disaster Recovery.mp4 6.87MB
054 - Lateral Movement.mp4 17.96MB
054 - Managing Data.mp4 100.95MB
054 - OWASP Top Ten.mp4 257.95MB
054 - Physical Hardening.mp4 194.29MB
054 - Query Writing.mp4 41.00MB
054 - Static Routes.mp4 123.00MB
054 - Storage Types.mp4 70.15MB
055 - Data Ownership.mp4 26.41MB
055 - Dynamic Routing.mp4 107.17MB
055 - E-mail Analysis, Part 1.mp4 60.87MB
055 - GCP Security Summary.mp4 6.93MB
055 - Network Forensics a.mp4 114.48MB
055 - Persistence.mp4 12.23MB
055 - RFI, EMI, and ESD.mp4 68.37MB
055 - Storage Protocols.mp4 83.68MB
055 - Troubleshooting 101.mp4 21.91MB
055 - Understanding Partitioning.mp4 51.93MB
056 - Ask Me Anything About Troubleshooting Computers Part 1.mp4 119.51MB
056 - Covering Your Tracks.mp4 10.47MB
056 - Data Security Controls.mp4 70.13MB
056 - E-mail Analysis, Part 2.mp4 57.82MB
056 - GCP Project Introduction.mp4 7.93MB
056 - Host Hardening.mp4 424.00MB
056 - Implement Secure Storage Controls.mp4 73.76MB
056 - MBR Partitioning.mp4 98.76MB
056 - Network Forensics b.mp4 136.80MB
056 - RIP.mp4 38.82MB
057 - Ask Me Anything About Troubleshooting Computers Part 2.mp4 118.68MB
057 - Data and System Security.mp4 114.48MB
057 - Data Remanence.mp4 57.99MB
057 - GCP Project Hint 1.mp4 3.18MB
057 - GPT Partitioning.mp4 69.36MB
057 - Identify General Application Vulnerabilities.mp4 86.90MB
057 - Network Forensics c.mp4 130.78MB
057 - OSPF.mp4 32.50MB
057 - Permissions.mp4 34.97MB
057 - Persistence and Covering Tracks Demonstration.mp4 22.11MB
058 - BGP.mp4 22.27MB
058 - Data at Rest.mp4 89.29MB
058 - Disk Encryption.mp4 176.94MB
058 - Firewalls.mp4 38.80MB
058 - GCP Project Hint 2.mp4 6.21MB
058 - Identify Web Application Vulnerabilities.mp4 106.55MB
058 - Introduction to Databases.mp4 39.92MB
058 - Network Forensics d.mp4 133.57MB
058 - Understanding File Systems.mp4 89.18MB
059 - Application Security Design.mp4 42.71MB
059 - Database Details.mp4 39.88MB
059 - Data in Transit.mp4 66.77MB
059 - GCP Project Hint 3.mp4 3.82MB
059 - HardwareFirmware Security.mp4 242.64MB
059 - Intrusion Prevention Rules.mp4 37.09MB
059 - Network Forensics e.mp4 132.98MB
059 - Pentesting Tools Introduction.mp4 4.88MB
059 - Popular File Systems.mp4 99.54MB
059 - TCP and UDP.mp4 76.54MB
060 - Ask Me Anything about Databases.mp4 64.62MB
060 - Classification.mp4 77.82MB
060 - Cryptographic Hashing a.mp4 132.86MB
060 - DLP and Endpoint Detection.mp4 36.78MB
060 - Formatting in Action.mp4 79.26MB
060 - ICMP and IGMP.mp4 61.33MB
060 - Implement Application Security Controls.mp4 123.91MB
060 - Nmap Usage.mp4 20.14MB
060 - Secure OS Types.mp4 204.20MB
061 - Architectural Concepts & Design Requirements.mp4 495.34MB
061 - Cryptographic Hashing b.mp4 142.43MB
061 - Dynamic Disks.mp4 87.40MB
061 - Handy Tools.mp4 55.58MB
061 - Introduction to Programming.mp4 35.13MB
061 - Nmap Demonstration.mp4 165.39MB
061 - Securing Peripherals.mp4 291.13MB
061 - Security Assessment Goals.mp4 56.37MB
061 - Threat Hunting and Hypothesis.mp4 46.61MB
062 - Control Testing.mp4 69.54MB
062 - Cryptographic Hashing c.mp4 133.84MB
062 - Introduction to Wireshark.mp4 93.90MB
062 - Legal and Compliance.mp4 228.25MB
062 - Malware.mp4 268.65MB
062 - New Installation - First Drive.mp4 44.67MB
062 - Programming with a PBJ Sandwich.mp4 70.56MB
062 - Threat Hunting Process.mp4 59.24MB
063 - Analyzing Output.mp4 390.38MB
063 - Ask Me Anything about Programming.mp4 38.36MB
063 - Cryptographic Hashing d.mp4 111.50MB
063 - Introduction to netstat.mp4 41.38MB
063 - Operations.mp4 507.11MB
063 - Penetration Testing.mp4 72.28MB
063 - RAID.mp4 109.38MB
063 - Results and Benefits.mp4 36.01MB
063 - Use Cases for Tools.mp4 13.16MB
064 - Cloud Platform and Infrastructure Security.mp4 308.39MB
064 - Cryptographic Hashing e.mp4 120.33MB
064 - Hardware RAID.mp4 46.46MB
064 - IDS and IPS.mp4 118.22MB
064 - Scanners.mp4 4.36MB
064 - Security Management Processes.mp4 49.28MB
064 - Web Servers.mp4 73.90MB
064 - Workflow and Scripting.mp4 50.90MB
065 - API and Malware Signature Creation.mp4 53.64MB
065 - Automation Strategies.mp4 131.65MB
065 - Cloud Data Security.mp4 286.83MB
065 - Credential Testing Tools.mp4 14.77MB
065 - Cryptographic Hashing f.mp4 137.31MB
065 - FTP.mp4 60.36MB
065 - Implement Security Standards in the Enterprise.mp4 68.56MB
065 - Software RAID in Storage Spaces.mp4 80.07MB
066 - Cloud Application Security.mp4 266.75MB
066 - Cryptographic Hashing g.mp4 113.76MB
066 - Data Destruction.mp4 128.87MB
066 - Debuggers.mp4 6.33MB
066 - Email Servers and Clients.mp4 62.10MB
066 - Encrypting Mass Storage.mp4 94.48MB
066 - Secure the Design of the Enterprise Infrastructure.mp4 51.54MB
066 - Threat Feeds and Machine Learning.mp4 46.12MB
067 - Anti-Forensics.mp4 241.35MB
067 - LAN Review.mp4 203.21MB
067 - Mass Storage Troubleshooting.mp4 104.57MB
067 - Protocols, Standards, and Software Engineering.mp4 38.18MB
067 - Secure Enterprise Application Integration Enablers.mp4 122.23MB
067 - Securing Email.mp4 71.64MB
067 - Software Assurance Tools.mp4 5.02MB
068 - IR Roles and Responsibilities.mp4 21.35MB
068 - Network Topologies Review.mp4 127.44MB
068 - New and Emerging Technologies a.mp4 140.05MB
068 - Optical Media.mp4 131.21MB
068 - OSINT Tools.mp4 9.60MB
068 - Telnet and SSH.mp4 57.42MB
068 - Virtualize Technologies.mp4 87.20MB
069 - Implement Cloud Augmented Security Services.mp4 47.70MB
069 - IR Active Preparation.mp4 39.83MB
069 - Network Time Protocol.mp4 13.35MB
069 - Network Zone Review.mp4 238.72MB
069 - New and Emerging Technologies b.mp4 137.50MB
069 - USB Standards.mp4 147.95MB
069 - Wireless Pentesting Tools.mp4 3.53MB
070 - Deployment Models and the Cloud.mp4 74.47MB
070 - Incident Response Process.mp4 30.50MB
070 - Network Access Controls.mp4 251.76MB
070 - Network Service Scenarios.mp4 112.17MB
070 - New and Emerging Technologies c.mp4 110.37MB
070 - Understanding USB.mp4 102.94MB
070 - Web Proxies.mp4 3.19MB
071 - Configuring USB.mp4 79.81MB
071 - Deployment Models and Virtualization-segmentation.mp4 69.36MB
071 - Network Symptoms.mp4 14.51MB
071 - New and Emerging Technologies d.mp4 151.43MB
071 - Social Engineering Tools.mp4 2.75MB
071 - The Network Firewall.mp4 322.16MB
071 - Understanding DNS.mp4 95.66MB
072 - Applying DNS.mp4 193.29MB
072 - Host Symptoms.mp4 32.22MB
072 - New and Emerging Technologies e.mp4 114.44MB
072 - Proxy Servers.mp4 330.06MB
072 - Remote Access Tools.mp4 5.81MB
072 - Thunder and Lightning.mp4 71.27MB
072 - Trust Models.mp4 71.13MB
073 - Application Symptoms.mp4 21.56MB
073 - Honeypots.mp4 118.86MB
073 - Implement Advanced Identity Management.mp4 51.36MB
073 - Keyboards and Mice.mp4 109.34MB
073 - Networking Tools.mp4 3.22MB
073 - New and Emerging Technologies f.mp4 196.77MB
073 - The HOSTs File.mp4 19.78MB
074 - Cryptographic Concepts.mp4 29.46MB
074 - Digital Forensics.mp4 48.93MB
074 - Mobile Forensics a.mp4 139.30MB
074 - Mobile Tools.mp4 4.13MB
074 - Net Command.mp4 36.87MB
074 - Sight and Sound.mp4 88.20MB
074 - Virtual Private Networks.mp4 287.15MB
075 - Exploitation Frameworks and Other Tools.mp4 10.25MB
075 - IPSec.mp4 308.65MB
075 - Mobile Forensics b.mp4 125.77MB
075 - Readers and Scanners.mp4 99.40MB
075 - Seizure and Acquisitions.mp4 21.61MB
075 - Trust in Cryptography.mp4 44.46MB
075 - Windows Name Resolution.mp4 82.73MB
076 - Cryptographic Design.mp4 49.48MB
076 - Dynamic DNS.mp4 39.31MB
076 - Forensic Acquisition Tools.mp4 26.87MB
076 - Mobile Forensics c.mp4 165.76MB
076 - NIDSNIPS.mp4 158.51MB
076 - Using Expansion Cards.mp4 99.31MB
077 - Cryptographic Techniques.mp4 41.87MB
077 - DNS Troubleshooting.mp4 85.31MB
077 - Introduction to Programming.mp4 4.93MB
077 - Mobile, Virtualization, and Cloud.mp4 42.73MB
077 - Mobile Forensics d.mp4 174.36MB
077 - SIEM (Security Information and Event Management).mp4 188.43MB
077 - The Right PC for the Job.mp4 180.64MB
078 - Boot from Everything.mp4 118.64MB
078 - Digital Signatures and Code Signing.mp4 42.10MB
078 - Forensics Analysis, Part 1.mp4 11.78MB
078 - Making TCPIP Secure.mp4 53.55MB
078 - Programming Concepts.mp4 38.74MB
078 - Wireless Review.mp4 252.25MB
079 - BASH Sample Script.mp4 7.15MB
079 - Choose Cryptographic Implementations.mp4 47.09MB
079 - Forensics Analysis, Part 2.mp4 27.22MB
079 - Installing Windows.mp4 80.80MB
079 - Living in Open Networks.mp4 254.40MB
079 - Symmetric Encryption.mp4 45.32MB
080 - Asymmetric Encryption.mp4 30.40MB
080 - Enterprise Risk Management.mp4 38.80MB
080 - Packet Capture.mp4 47.83MB
080 - Post-Installation Tasks.mp4 103.18MB
080 - Python Sample Script.mp4 6.48MB
080 - Vulnerabilities with Wireless Access Points.mp4 185.10MB
081 - Business Models and Risk.mp4 89.15MB
081 - Cracking 802.11, WEP.mp4 314.28MB
081 - Cryptographic Hashes.mp4 36.57MB
081 - Data Privacy and Security.mp4 48.08MB
081 - PowerShell Sample Script.mp4 7.12MB
081 - Windows Installation Options.mp4 57.45MB
082 - Cracking 802.11, WPA and WPA2.mp4 247.33MB
082 - Identification.mp4 150.93MB
082 - Nontechnical Controls.mp4 63.72MB
082 - Risk Mitigation.mp4 84.60MB
082 - Ruby Sample Script.mp4 7.00MB
082 - What is the Registry.mp4 85.33MB
083 - Access Control.mp4 32.12MB
083 - CIA Triad and Risk.mp4 40.17MB
083 - Cracking 802.11, WPS.mp4 256.00MB
083 - Processes.mp4 61.94MB
083 - Technical Controls.mp4 55.42MB
084 - AAA.mp4 51.37MB
084 - Business Impact Analysis.mp4 34.76MB
084 - Introduction to Reporting and Communication.mp4 3.46MB
084 - Risk Scenarios and Response.mp4 57.44MB
084 - Services.mp4 27.45MB
084 - Wireless Hardening.mp4 370.47MB
085 - KerberosEAP.mp4 76.73MB
085 - Monitoring and Governance.mp4 32.35MB
085 - Pentest Communications.mp4 13.96MB
085 - Risk Identification.mp4 38.63MB
085 - Wireless Access Points.mp4 347.97MB
085 - Your Windows Toolset.mp4 65.99MB
086 - Analyze Scenarios to Secure Enterprise.mp4 37.77MB
086 - Report Writing.mp4 13.18MB
086 - Risk Calculation and Communication.mp4 32.95MB
086 - Single Sign-On.mp4 87.72MB
086 - Virtualization Basics.mp4 191.87MB
086 - Windows 7 Task Manager.mp4 71.71MB
087 - Certificates and Trust.mp4 126.48MB
087 - Mitigation Strategies.mp4 12.76MB
087 - Review Existing Security.mp4 69.76MB
087 - Training.mp4 14.93MB
087 - Virtual Security.mp4 390.63MB
087 - Windows 10 Task Manager.mp4 41.84MB
088 - Certificate Error Scenarios.mp4 54.40MB
088 - Containers.mp4 279.64MB
088 - Design Systems to Facilitate Incident Response.mp4 51.14MB
088 - Information and Configuration Tools.mp4 88.10MB
088 - Post-report Activities.mp4 7.13MB
088 - Supply Chain Assessment.mp4 31.99MB
089 - Conduct Incident and Emergency Responses.mp4 88.93MB
089 - Frameworks.mp4 39.00MB
089 - Infrastructure as a Service (IaaS).mp4 248.96MB
089 - Performance Monitor.mp4 77.95MB
089 - Understanding IP Tunneling.mp4 61.34MB
090 - Conclusion.mp4 4.11MB
090 - Event Viewer.mp4 66.70MB
090 - Identify General Application Vulnerabilities.mp4 86.90MB
090 - Platform as a Service (PaaS).mp4 229.67MB
090 - Policies and Procedures.mp4 33.15MB
090 - Virtual Private Networks (VPNs).mp4 93.84MB
091 - Controls and Procedures.mp4 30.59MB
091 - Creating Your Pentest Lab.mp4 172.58MB
091 - Identify Web Application Vulnerabilities.mp4 106.55MB
091 - Introduction to VLANs.mp4 72.15MB
091 - Software as a Service (SaaS).mp4 71.26MB
091 - Tools for Programmers.mp4 55.15MB
092 - Application Security Design.mp4 42.71MB
092 - Deployment Models.mp4 225.77MB
092 - InterVLAN Routing.mp4 32.37MB
092 - Introduction to Users and Groups.mp4 61.28MB
092 - Verification.mp4 21.50MB
093 - Implement Application Security Controls.mp4 123.91MB
093 - Interfacing with Managed Switches.mp4 56.62MB
093 - Managing Users and Groups.mp4 88.32MB
093 - Static Hosts.mp4 197.85MB
094 - Mobile Connectivity.mp4 317.52MB
094 - NTFS Permissions.mp4 79.90MB
094 - Select Vulnerability Assessment Methods.mp4 122.85MB
094 - Switch Port Protection.mp4 83.36MB
095 - Deploying Mobile Devices.mp4 131.51MB
095 - Linux and macOS Permissions.mp4 38.45MB
095 - Port Bonding.mp4 68.67MB
095 - Select Vulnerability Assessment Tools.mp4 57.42MB
096 - File Explorer.mp4 113.98MB
096 - Mobile Enforcement.mp4 329.69MB
096 - Port Mirroring.mp4 25.11MB
097 - Mobile Device Management.mp4 213.32MB
097 - Quality of Service.mp4 33.30MB
097 - Sharing Resources.mp4 87.52MB
098 - IDS vs. IPS.mp4 56.68MB
098 - Physical Controls.mp4 229.77MB
098 - Security Policies.mp4 68.95MB
099 - HVAC.mp4 195.08MB
099 - Patch Management.mp4 88.32MB
099 - Proxy Servers.mp4 111.87MB
100 - Fire Suppression.mp4 107.41MB
100 - Load Balancing.mp4 105.50MB
100 - Working with Disks.mp4 46.23MB
101 - Device Placement Scenarios.mp4 174.29MB
101 - Secure Encryption Applications and Protocols.mp4 283.64MB
101 - Working with Applications.mp4 68.92MB
102 - Intro to IPv6.mp4 121.24MB
102 - Network Models.mp4 179.26MB
102 - System Restore.mp4 39.21MB
103 - Backing up Your Files.mp4 56.81MB
103 - IPv6 Addressing.mp4 120.46MB
103 - Know Your Protocols - TCPIP.mp4 161.83MB
104 - IPv6 in Action.mp4 135.71MB
104 - Know Your Protocols - Applications.mp4 120.43MB
104 - Task Scheduler.mp4 32.42MB
105 - IPv4 and IPv6 Tunneling.mp4 35.10MB
105 - Transport Layer Security (TLS).mp4 314.76MB
105 - Understanding the CLI.mp4 123.33MB
106 - Internet Service Hardening.mp4 130.09MB
106 - Navigating the CLI.mp4 105.90MB
106 - Telephony Technologies.mp4 80.36MB
107 - Optical Carriers.mp4 28.02MB
107 - Protecting Your Servers.mp4 161.56MB
107 - Working with Folders.mp4 59.35MB
108 - Packet Switching.mp4 37.45MB
108 - Secure Code Development.mp4 266.70MB
108 - Working with Files.mp4 93.92MB
109 - Connecting with Dial-Up.mp4 37.69MB
109 - Secure Deployment Concepts.mp4 317.50MB
109 - Working with Drives.mp4 117.11MB
110 - Code Quality and Testing.mp4 133.08MB
110 - Digital Subscriber Line.mp4 54.57MB
110 - Super Copy Commands.mp4 91.22MB
111 - Advanced Windows Command Line.mp4 68.34MB
111 - Connecting with Cable Modems.mp4 33.46MB
111 - Vulnerability Scanning Tools.mp4 243.77MB
112 - Advanced Linux Commands.mp4 125.21MB
112 - Connecting with Satellites.mp4 15.86MB
112 - Vulnerability Scanning Assessment.mp4 125.29MB
113 - Command-Line Permissions.mp4 52.04MB
113 - ISDN and BPL.mp4 32.71MB
113 - Social Engineering Principles.mp4 59.98MB
114 - Introduction to Scripting.mp4 78.64MB
114 - Remote Desktop Connectivity.mp4 25.54MB
114 - Social Engineering Attacks.mp4 205.87MB
115 - Advanced Remote Control Systems.mp4 50.99MB
115 - Attacking Applications.mp4 283.67MB
115 - Interpreted Languages.mp4 96.53MB
116 - Attacking Web Sites.mp4 148.77MB
116 - Introduction to 802.11.mp4 130.09MB
116 - Windows Recovery Environment.mp4 45.59MB
117 - 802.11 Standards.mp4 147.12MB
117 - Advanced Windows Startup Problems.mp4 47.82MB
117 - Exploiting a Target.mp4 280.27MB
118 - Power Over Ethernet (PoE).mp4 39.48MB
118 - Troubleshooting Boot Problems.mp4 114.79MB
118 - Vulnerability Impact.mp4 263.76MB
119 - Antennas.mp4 106.18MB
119 - Incident Response.mp4 93.04MB
119 - Troubleshooting at the GUI.mp4 122.66MB
120 - Digital Forensics.mp4 266.54MB
120 - Troubleshooting Applications.mp4 76.51MB
120 - Wireless Security Standards.mp4 145.03MB
121 - Contingency Planning.mp4 260.35MB
121 - Implementing Wireless Security.mp4 35.54MB
121 - Kernel Panic.mp4 68.09MB
122 - Backups.mp4 145.05MB
122 - Monitor Technologies.mp4 114.06MB
122 - Threats to Your Wireless Network.mp4 66.28MB
123 - LCD Breakdown.mp4 67.64MB
123 - Retro Threats.mp4 102.53MB
124 - Graphics Cards and Connections.mp4 206.71MB
124 - Wi-Fi Protected Setup (WPS).mp4 45.95MB
125 - Enterprise Wireless.mp4 47.12MB
125 - Resolutions and Aspect Ratios.mp4 55.81MB
126 - Installing a Graphics Card.mp4 104.47MB
126 - Installing a Wireless Network.mp4 146.84MB
127 - Multiple Monitors.mp4 32.74MB
127 - Wireless Scenarios.mp4 39.32MB
128 - More Wireless Scenarios.mp4 99.01MB
128 - Projectors.mp4 59.19MB
129 - Troubleshooting Monitors.mp4 76.46MB
129 - Virtualization Basics.mp4 56.95MB
130 - Cloud Ownership.mp4 5.71MB
130 - Introduction to Networking.mp4 87.20MB
131 - Cloud Implementation.mp4 98.62MB
131 - Hubs vs. Switches.mp4 74.45MB
132 - Hexadecimal.mp4 62.72MB
132 - Your First Virtual Machine.mp4 41.25MB
133 - NAS and SAN.mp4 135.59MB
133 - WANs and Routers.mp4 69.22MB
134 - Cables and Connectors.mp4 142.64MB
134 - Platform as a Service (PaaS).mp4 56.89MB
135 - Crimping Cables.mp4 131.55MB
135 - Software as a Service (SaaS).mp4 22.31MB
136 - Infrastructure as a Service (IaaS).mp4 56.52MB
136 - Structured Cabling.mp4 170.73MB
137 - Cellular Technologies.mp4 51.37MB
137 - Network Card Troubleshooting.mp4 101.95MB
138 - Introduction to TCPIP.mp4 131.66MB
138 - Mobile Connectivity.mp4 79.13MB
139 - Deploying Mobile Devices.mp4 42.78MB
139 - Network IDs and Subnet Masks.mp4 28.10MB
140 - Mobile Access Control.mp4 63.59MB
140 - Special IP Addresses.mp4 74.68MB
141 - NAT.mp4 58.43MB
141 - Network Types.mp4 58.35MB
142 - Dynamic IP Addressing.mp4 81.04MB
142 - Network Design.mp4 109.26MB
143 - IPv6.mp4 88.01MB
143 - Power Management.mp4 67.40MB
144 - Port Numbers.mp4 91.96MB
144 - Unified Communications.mp4 45.65MB
145 - Network Documentation.mp4 54.25MB
145 - TCP, UDP and ICMP.mp4 78.22MB
146 - Contingency Planning.mp4 83.62MB
146 - Working with Connections.mp4 66.94MB
147 - Predicting Hardware Failure.mp4 39.36MB
147 - Understanding DNS.mp4 60.55MB
148 - Backups.mp4 46.19MB
148 - Working with DNS.mp4 54.51MB
149 - What is Risk Management.mp4 70.47MB
149 - Windows Naming.mp4 74.59MB
150 - Security Policies.mp4 95.54MB
150 - Working with Workgroups.mp4 63.87MB
151 - Change Management.mp4 53.88MB
151 - Working with Active Directory.mp4 91.58MB
152 - User Training.mp4 25.65MB
152 - Windows Sharing with Mac and Linux.mp4 62.89MB
153 - Net Command.mp4 21.55MB
153 - Standard Business Documentation.mp4 38.56MB
154 - Mitigating Network Threats.mp4 45.77MB
154 - Routers.mp4 125.92MB
155 - Basic Router Configuration.mp4 79.84MB
155 - High Availability.mp4 53.06MB
156 - Denial of Service.mp4 50.00MB
156 - Firewall Configuration.mp4 92.92MB
157 - Malware.mp4 99.71MB
157 - Windows Firewall.mp4 67.80MB
158 - Port Forwarding.mp4 63.91MB
158 - Social Engineering.mp4 32.40MB
159 - Advanced Router Configuration.mp4 52.68MB
159 - Man-in-the-Middle.mp4 171.11MB
160 - Introduction to Firewalls.mp4 42.36MB
160 - VLANs.mp4 74.42MB
161 - Firewalls.mp4 66.18MB
161 - Network Troubleshooting.mp4 73.19MB
162 - DMZ.mp4 51.14MB
162 - Wireless Network Hardware.mp4 162.24MB
163 - Hardening Devices.mp4 179.86MB
163 - Wi-Fi Standards.mp4 110.49MB
164 - Basic WAP Setup.mp4 96.89MB
164 - Physical Security Controls.mp4 75.51MB
165 - Testing Network Security.mp4 58.16MB
165 - Wireless Encryption.mp4 123.35MB
166 - Connecting to a Wi-Fi Network.mp4 58.29MB
166 - Network Protection Scenarios.mp4 161.25MB
167 - It's a Huge Mesh.mp4 41.27MB
167 - SNMP.mp4 79.87MB
168 - Documenting Logs.mp4 53.31MB
168 - Enterprise Wireless.mp4 157.78MB
169 - Beyond Wi-Fi.mp4 91.29MB
169 - System Monitoring.mp4 65.71MB
170 - SIEM.mp4 69.27MB
170 - Troubleshooting Wireless Connections.mp4 113.99MB
171 - Beyond the LAN.mp4 23.36MB
171 - Network Troubleshooting.mp4 64.93MB
172 - Internet Tiers.mp4 67.35MB
173 - Dial-up Connections.mp4 83.18MB
174 - Broadband Connections.mp4 121.98MB
175 - Firewalls and Servers.mp4 48.88MB
176 - Telnet and SSH.mp4 62.44MB
177 - Remote Desktop Connections.mp4 48.08MB
178 - The World Wide Web.mp4 78.39MB
179 - FTP.mp4 51.30MB
180 - Email.mp4 68.03MB
181 - Proxy Servers.mp4 65.67MB
182 - Virtual Private Networks (VPNs).mp4 62.50MB
183 - Internet of Things (IoT).mp4 44.71MB
184 - Troubleshooting Internet Connections.mp4 70.31MB
185 - Understanding Virtualization.mp4 97.34MB
186 - Your First Virtual Machine.mp4 80.16MB
187 - Advanced Virtualization Setup.mp4 69.45MB
188 - Cloud Computing.mp4 119.23MB
189 - Cloud Ownership.mp4 5.52MB
190 - Cloud-Based Applications.mp4 61.86MB
191 - Laptop Features.mp4 119.10MB
192 - Laptop Hardware Troubleshooting - The Tools.mp4 50.96MB
193 - Laptop Hardware - Core Hardware.mp4 62.64MB
194 - Laptop Hardware - CPU and Motherboard.mp4 127.30MB
195 - Touring Your Laptop Display.mp4 65.90MB
196 - Power Management.mp4 113.11MB
197 - What is a Mobile Device.mp4 106.79MB
198 - Mobile Connections.mp4 112.01MB
199 - Touring Android.mp4 88.08MB
200 - Touring iOS.mp4 71.09MB
201 - Virtual Reality.mp4 16.98MB
202 - Maintaining Mobile Devices.mp4 120.83MB
203 - Mobile Devices and Email.mp4 101.15MB
204 - Mobile Synchronization.mp4 104.58MB
205 - Mobile Device Security.mp4 78.14MB
206 - Mobile Security Troubleshooting.mp4 84.53MB
207 - Mobile Device Troubleshooting.mp4 133.66MB
208 - Laser Printers.mp4 103.52MB
209 - Inkjet Printers.mp4 68.87MB
210 - Impact Printers.mp4 55.45MB
211 - Thermal Printers.mp4 39.56MB
212 - Installing a Local Printer.mp4 106.01MB
213 - Sharing Printers.mp4 69.41MB
214 - Installing Wireless and Cloud Printers.mp4 126.26MB
215 - Troubleshooting Printers.mp4 151.28MB
216 - 3D Printing.mp4 83.32MB
217 - Threats.mp4 78.54MB
218 - Dealing with Threats.mp4 69.89MB
219 - Physical Security.mp4 94.92MB
220 - Passwords and Authentication.mp4 144.31MB
221 - Malware.mp4 154.06MB
222 - Anti-Malware.mp4 109.38MB
223 - Social Engineering.mp4 40.34MB
224 - Licensing.mp4 104.79MB
225 - Incident Response.mp4 47.60MB
226 - Environmental Controls.mp4 75.06MB
227 - Documents You Need to Know.mp4 120.48MB
228 - Data You Need to Know.mp4 41.07MB
229 - Change Management.mp4 78.44MB
230 - The Zen of Backup.mp4 103.92MB
231 - Recycling and Data Destruction.mp4 80.72MB
Cloud Pentesting.zip 3.74GB
Common Ports.pdf 94.00KB
Cyber_Threat_Challenge_Answers.pdf 50.82KB
Cyber_Threat_Challenge_Questions.pdf 35.45KB
CyberThreat_traffic-analysis-exercise.zip 6.01MB
Encryption.pdf 223.96KB
IPSec VPN.pdf 78.69KB
Lab 1_ Setup.pdf 507.33KB
Lab 2_ Setting up AWS.pdf 378.77KB
Lab 2_ Setting up Azure.pdf 287.04KB
Lab 3_ Attacking Azure Targets.pdf 70.62KB
Lab 3_ Metadata Attacks.pdf 224.17KB
Lab 4_ Azure Run.pdf 48.55KB
Lab 4_ S3 Misconfigurations and EBS.pdf 81.25KB
Lab 5_ OSINT against AWS.pdf 128.94KB
Lab 5_ OSINT Against Azure.pdf 134.45KB
Lab 6_ Teardown of Lab Environment.pdf 294.69KB
Lab 6_ Teardown of Project Artifacts.pdf 47.83KB
Notes on Access Control.pdf 173.12KB
Notes on Biometrics.pdf 204.37KB
Notes on IPv4-IPv6.pdf 3.13MB
Notes on Kerberos.pdf 603.08KB
OSI Model.pdf 100.17KB
Security+ Domains.pdf 57.50KB
Distribution statistics by country
Russia (RU) 5
Turkey (TR) 1
Total 6
IP List List of IP addresses which were distributed this torrent