|
Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
| 001 - Access Control Basics.mp4 |
59.03MB |
| 001 - Application-based Vulnerabilities.mp4 |
64.32MB |
| 001 - Application Security Design.mp4 |
42.71MB |
| 001 - Architectural Concepts & Design Requirements.mp4 |
495.34MB |
| 001 - Computer Forensics as a Profession a.mp4 |
141.82MB |
| 001 - Cryptography Terminology.mp4 |
84.82MB |
| 001 - Cybersecurity Definitions.mp4 |
80.11MB |
| 001 - Enterprise Risk Management.mp4 |
38.80MB |
| 001 - Enterprise Risk Management.mp4 |
38.80MB |
| 001 - How to Use This Video Course.mp4 |
36.83MB |
| 001 - IaaS security roles and responsibilities.mp4 |
19.72MB |
| 001 - Intelligence Sources and Confidence Levels.mp4 |
60.17MB |
| 001 - Intelligence Sources and Confidence Levels.mp4 |
60.17MB |
| 001 - Introduction to Cyber Threat Hunting Techniques.mp4 |
26.54MB |
| 001 - Introduction to Information Security.mp4 |
21.93MB |
| 001 - Introduction to Network+.mp4 |
41.40MB |
| 001 - Introduction to PenTest+.mp4 |
6.35MB |
| 001 - Linux Overview.mp4 |
56.32MB |
| 001 - Mobile Operating Systems.mp4 |
65.52MB |
| 001 - Overview of Containers.mp4 |
248.04MB |
| 001 - Welcome to CompTIA Security+.mp4 |
90.03MB |
| 001 - Welcome to the CompTIA IT Fundamentals path!.mp4 |
33.05MB |
| 001 - What is a Model.mp4 |
14.91MB |
| 002 - Access Control Categories.mp4 |
74.25MB |
| 002 - AWS Introduction.mp4 |
9.32MB |
| 002 - Business Models and Risk.mp4 |
89.15MB |
| 002 - Computer Forensics as a Profession b.mp4 |
113.91MB |
| 002 - Cyber Threat Hunting - Experience Required, part 1.mp4 |
51.20MB |
| 002 - Digital Asset Protection.mp4 |
212.12MB |
| 002 - Docker vs rkt and Other Container Runtimes.mp4 |
159.14MB |
| 002 - Hashing.mp4 |
74.11MB |
| 002 - Implement Application Security Controls.mp4 |
123.91MB |
| 002 - Installing Linux.mp4 |
59.41MB |
| 002 - Introduction to IP Addressing.mp4 |
83.26MB |
| 002 - Legal and Compliance.mp4 |
228.25MB |
| 002 - Malware Types.mp4 |
57.90MB |
| 002 - PaaS security roles and responsibilities.mp4 |
13.06MB |
| 002 - Risk Mitigation.mp4 |
84.60MB |
| 002 - Securing Mobile Devices.mp4 |
43.68MB |
| 002 - The Case for Computer Literacy.mp4 |
23.21MB |
| 002 - The CIA of Security.mp4 |
74.88MB |
| 002 - Threat Indicators and Actors.mp4 |
49.56MB |
| 002 - Threat Indicators and Actors.mp4 |
49.56MB |
| 002 - Web Application Hacking.mp4 |
141.19MB |
| 002 - Welcome to the Course.mp4 |
7.95MB |
| 002 - What is a Model.mp4 |
14.91MB |
| 002 - What is the CompTIA A+.mp4 |
36.28MB |
| 003 - Attack Frameworks.mp4 |
28.66MB |
| 003 - Authentication.mp4 |
27.49MB |
| 003 - CIA Triad and Risk.mp4 |
40.17MB |
| 003 - Command Injection.mp4 |
9.40MB |
| 003 - Computer Forensics as a Profession c.mp4 |
89.61MB |
| 003 - Cryptographic Attacks.mp4 |
63.86MB |
| 003 - Cyber Threat Hunting - Experience Required, part 2.mp4 |
43.23MB |
| 003 - Docker vs Kubernetes.mp4 |
177.06MB |
| 003 - Exam Foundations.mp4 |
8.13MB |
| 003 - Features Common to Every Computing Device.mp4 |
20.75MB |
| 003 - Graphical User Interfaces.mp4 |
60.72MB |
| 003 - Lines of Defense.mp4 |
134.81MB |
| 003 - Mobile Device Synchronization.mp4 |
20.75MB |
| 003 - Operations.mp4 |
507.11MB |
| 003 - OSI Model vs. TCPIP Model.mp4 |
70.34MB |
| 003 - OSI Model vs TCPIP Model.mp4 |
70.34MB |
| 003 - Risk Assessment.mp4 |
72.29MB |
| 003 - SaaS security roles and responsibilities.mp4 |
17.64MB |
| 003 - Social Engineering.mp4 |
45.46MB |
| 003 - Testing Application Code.mp4 |
10.05MB |
| 003 - Threat Trends.mp4 |
21.57MB |
| 003 - What is Risk.mp4 |
258.12MB |
| 003 - Why Get A+ Certified.mp4 |
48.69MB |
| 004_Setting Up Your Playground and Tools.mp4 |
50.56MB |
| 004 - Audit's Role.mp4 |
91.05MB |
| 004 - Cloud Platform and Infrastructure Security.mp4 |
308.39MB |
| 004 - Command Injection Exploitation.mp4 |
7.23MB |
| 004 - Command Line Linux.mp4 |
76.98MB |
| 004 - Common Network Attacks.mp4 |
55.24MB |
| 004 - Compliance.mp4 |
5.52MB |
| 004 - Container Image Misconfigurations.mp4 |
268.74MB |
| 004 - Digital Evidence and Legal Issues b.mp4 |
163.11MB |
| 004 - Intelligence Cycle and ISACs.mp4 |
30.22MB |
| 004 - Networks, Part 1.mp4 |
83.00MB |
| 004 - Network Security Device Types.mp4 |
37.99MB |
| 004 - Networks of Computing Devices.mp4 |
57.42MB |
| 004 - Network Topologies.mp4 |
145.84MB |
| 004 - Policies and Procedures.mp4 |
127.94MB |
| 004 - Symmetric Cryptography.mp4 |
67.95MB |
| 004 - Threat Actors.mp4 |
176.53MB |
| 004 - Vulnerability Identification.mp4 |
40.66MB |
| 004 - Walking Through OSI and TCPIP.mp4 |
127.21MB |
| 004 - Web Application Vulnerability Scanning.mp4 |
10.81MB |
| 004 - What is on the CompTIA A+ Core 1 (220-1001) Exam.mp4 |
122.06MB |
| 005 - Account Management.mp4 |
52.85MB |
| 005 - Asymmetric Cryptography.mp4 |
74.74MB |
| 005 - Attack Frameworks.mp4 |
28.66MB |
| 005 - Cloud Data Security.mp4 |
286.83MB |
| 005 - Command Injection Demo.mp4 |
13.62MB |
| 005 - Compliance Hands-on.mp4 |
3.61MB |
| 005 - Digital Evidence and Legal Issues c.mp4 |
122.86MB |
| 005 - Getting Help.mp4 |
86.77MB |
| 005 - Host Hardening.mp4 |
71.76MB |
| 005 - Managing Risk.mp4 |
314.95MB |
| 005 - Meet the Frame.mp4 |
54.68MB |
| 005 - Networks, Part 2.mp4 |
71.71MB |
| 005 - Network Tools (PRTG, NTOP and More).mp4 |
303.13MB |
| 005 - Password Attacks and Countermeasures.mp4 |
41.18MB |
| 005 - Patch & Vulnerability Management.mp4 |
45.86MB |
| 005 - Planning and Scoping Introduction.mp4 |
2.50MB |
| 005 - Platform as a Service.mp4 |
56.89MB |
| 005 - Remotely-Accessed Computer Systems.mp4 |
42.18MB |
| 005 - Risk Mitigation.mp4 |
84.60MB |
| 005 - Roles and Responsibilities.mp4 |
79.00MB |
| 005 - Running Dockers and Persisting Data.mp4 |
298.37MB |
| 005 - Setting up AWS Walkthrough.mp4 |
96.01MB |
| 005 - Validation.mp4 |
25.41MB |
| 005 - What is on the CompTIA A+ Core 2 (220-1002) Exam.mp4 |
59.68MB |
| 006 - Application Vulnerabilities.mp4 |
86.90MB |
| 006 - AWS Security Course Overview.mp4 |
3.46MB |
| 006 - CIA Triad and Risk.mp4 |
40.17MB |
| 006 - Cloud Application Security.mp4 |
266.75MB |
| 006 - Digital Evidence and Legal Issues d.mp4 |
126.20MB |
| 006 - Directory Organization.mp4 |
46.54MB |
| 006 - Dockerfile Best Practices.mp4 |
368.24MB |
| 006 - Frameworks and Standards.mp4 |
184.40MB |
| 006 - How to Pass the A+ Exam.mp4 |
63.79MB |
| 006 - Hybrid Cryptography.mp4 |
41.54MB |
| 006 - Penetration Testing Methodology.mp4 |
5.22MB |
| 006 - Remediation and Mitigation.mp4 |
52.06MB |
| 006 - Secure Application Development.mp4 |
47.20MB |
| 006 - SIEM is a must. Logging choices are important!.mp4 |
600.85MB |
| 006 - Single Sign-On (SSO).mp4 |
49.41MB |
| 006 - Software as a Service.mp4 |
22.31MB |
| 006 - Specialized Computer Systems.mp4 |
27.75MB |
| 006 - SQL Injection Vulnerabilities.mp4 |
13.05MB |
| 006 - TCP IP.mp4 |
109.22MB |
| 006 - The MAC Address.mp4 |
62.77MB |
| 006 - Threat Research.mp4 |
54.86MB |
| 006 - Using Guides for Risk Assessment.mp4 |
166.65MB |
| 006 - Vulnerability, Threat, Risk.mp4 |
24.65MB |
| 007 - Assessment Methods.mp4 |
122.85MB |
| 007 - AWS Data Encryption.mp4 |
20.95MB |
| 007 - Broadcast vs. Unicast.mp4 |
39.49MB |
| 007 - Digital Evidence and Legal Issues e.mp4 |
162.89MB |
| 007 - Exploiting SQL Injection.mp4 |
10.98MB |
| 007 - File Management.mp4 |
102.05MB |
| 007 - How Security is Organized.mp4 |
69.57MB |
| 007 - Infrastructure as a Service.mp4 |
56.52MB |
| 007 - Metadata Walkthrough.mp4 |
107.47MB |
| 007 - Namespaces & Cgroups.mp4 |
156.90MB |
| 007 - Network Architecture and Asset Management.mp4 |
56.77MB |
| 007 - Network Devices.mp4 |
102.72MB |
| 007 - Planning a Penetration Test.mp4 |
13.21MB |
| 007 - Professional Communication (Part 1).mp4 |
111.31MB |
| 007 - Risk Scenarios and Response.mp4 |
57.44MB |
| 007 - Secure Application Development - Secure Coding Techniques.mp4 |
46.89MB |
| 007 - Security Assessment Tools and Techniques.mp4 |
59.25MB |
| 007 - Security Controls.mp4 |
158.47MB |
| 007 - Set Up Access.mp4 |
98.53MB |
| 007 - Specialty IO Devices.mp4 |
24.35MB |
| 007 - Threat Modeling and Intelligence Sharing.mp4 |
37.30MB |
| 008_Identification.mp4 |
23.95MB |
| 008 - AWS Data Encryption Hands-On.mp4 |
6.92MB |
| 008 - Ciphers.mp4 |
28.87MB |
| 008 - Command Injection Mitigation.mp4 |
17.18MB |
| 008 - CPUs.mp4 |
48.10MB |
| 008 - Digital Evidence and Legal Issues f.mp4 |
93.26MB |
| 008 - DoS Probes Visiting strange sites Normal activity.mp4 |
374.45MB |
| 008 - File Information.mp4 |
73.31MB |
| 008 - Firewalls.mp4 |
72.30MB |
| 008 - Identity and Access Management.mp4 |
84.38MB |
| 008 - Incident and Emergency Response Procedures.mp4 |
88.93MB |
| 008 - Interesting Security Controls.mp4 |
55.55MB |
| 008 - Introduction to IP Addressing.mp4 |
83.26MB |
| 008 - Introduction to Structured Cabling.mp4 |
43.83MB |
| 008 - Monitoring and Governance.mp4 |
32.35MB |
| 008 - Networking Tools.mp4 |
92.98MB |
| 008 - Policies and Standards for Cybersecurity.mp4 |
132.89MB |
| 008 - Professional Communication (Part 2).mp4 |
143.22MB |
| 008 - Rules of Engagement.mp4 |
9.13MB |
| 008 - Seccomp & Capabilities.mp4 |
255.04MB |
| 008 - SQL Injection Demo.mp4 |
18.10MB |
| 008 - Vulnerability Identification.mp4 |
40.66MB |
| 009 - Analyze Scenarios to Secure Enterprise.mp4 |
37.77MB |
| 009 - AWS DLP.mp4 |
6.09MB |
| 009 - Cybersecurity and the Legal Environment.mp4 |
92.67MB |
| 009 - Defense in Depth.mp4 |
131.23MB |
| 009 - Digital Evidence and Legal Issues g.mp4 |
164.33MB |
| 009 - Digital Signatures.mp4 |
81.06MB |
| 009 - Docker Networking.mp4 |
214.89MB |
| 009 - Encryption and Active Defense.mp4 |
59.61MB |
| 009 - Hubs vs Switches.mp4 |
181.19MB |
| 009 - Legal Concepts.mp4 |
18.27MB |
| 009 - Misconfiguration and EBS Walkthrough.mp4 |
321.09MB |
| 009 - Motherboards.mp4 |
102.34MB |
| 009 - Packets and Ports.mp4 |
48.65MB |
| 009 - Passive and Active Cooling.mp4 |
49.40MB |
| 009 - Physical Safety.mp4 |
112.09MB |
| 009 - Poor Credential Management.mp4 |
27.85MB |
| 009 - Remediate the Malware.mp4 |
59.41MB |
| 009 - Scanning Parameters and Criteria.mp4 |
45.36MB |
| 009 - Securing Network Devices.mp4 |
42.53MB |
| 009 - Security Standards.mp4 |
68.56MB |
| 009 - Something You Know.mp4 |
54.28MB |
| 009 - SQL Injection Mitigation.mp4 |
16.77MB |
| 009 - Users and Groups.mp4 |
72.95MB |
| 010 - Attack Simulators Explained.mp4 |
263.34MB |
| 010 - Authentication.mp4 |
27.49MB |
| 010 - AWS DLP Hands-On.mp4 |
8.69MB |
| 010 - Buffer Overflow Mitigation.mp4 |
26.56MB |
| 010 - Change and Configuration Management.mp4 |
33.07MB |
| 010 - Credential Management Exploitation.mp4 |
13.01MB |
| 010 - Digital Evidence and Legal Issues h.mp4 |
121.24MB |
| 010 - Inside the Container.mp4 |
231.52MB |
| 010 - IT Security Governance.mp4 |
213.47MB |
| 010 - Network Topologies.mp4 |
145.84MB |
| 010 - Notebook Hardware Components.mp4 |
100.26MB |
| 010 - Privilege Escalation.mp4 |
57.57MB |
| 010 - RAM and Active Memory.mp4 |
65.24MB |
| 010 - Review Existing Security.mp4 |
69.76MB |
| 010 - Scanning Special Considerations.mp4 |
37.62MB |
| 010 - Secure Software Development.mp4 |
37.91MB |
| 010 - Security Models Part 1.mp4 |
67.94MB |
| 010 - Something You Have.mp4 |
76.64MB |
| 010 - Tools of the Trade.mp4 |
121.13MB |
| 010 - Virtualization Basics.mp4 |
56.95MB |
| 010 - Why Asset Classification is Important.mp4 |
73.72MB |
| 011 - Authorization.mp4 |
43.46MB |
| 011 - AWS Cloud Storage.mp4 |
14.51MB |
| 011 - Coaxial Cabling.mp4 |
69.97MB |
| 011 - Credential Management Demo.mp4 |
16.57MB |
| 011 - Cross-Site Scripting Mitigation.mp4 |
9.42MB |
| 011 - Digital Evidence and Legal Issues i.mp4 |
122.40MB |
| 011 - Hardware Security.mp4 |
54.48MB |
| 011 - Industry Trends and Effects on Enterprise.mp4 |
53.78MB |
| 011 - Insurance for Cybersecurity.mp4 |
67.39MB |
| 011 - Motherboards.mp4 |
39.51MB |
| 011 - Network Cable and Connector Types.mp4 |
44.01MB |
| 011 - Network Troubleshooting Theory.mp4 |
64.93MB |
| 011 - OSINT against AWS Walkthrough.mp4 |
103.13MB |
| 011 - Outside the Container.mp4 |
250.88MB |
| 011 - Review Cyber Threat Hunting Techniques.mp4 |
14.46MB |
| 011 - Security Models Part 2.mp4 |
84.49MB |
| 011 - Security Policies.mp4 |
218.54MB |
| 011 - Something You Are (Biometrics).mp4 |
65.83MB |
| 011 - SSL and TLS.mp4 |
44.12MB |
| 011 - Testing Strategies.mp4 |
5.80MB |
| 011 - Troubleshooting Theory.mp4 |
187.21MB |
| 011 - Validation.mp4 |
25.41MB |
| 011 - Viewing File Permissions.mp4 |
26.67MB |
| 012 - AWS Cloud Storage Hands-On.mp4 |
7.75MB |
| 012 - Cross-Site Scripting Vulnerabilities.mp4 |
6.72MB |
| 012 - Cryptographic Concepts.mp4 |
29.46MB |
| 012 - Cyber Threat Hunting Project Walkthrough.mp4 |
38.18MB |
| 012 - Data Analysis.mp4 |
45.66MB |
| 012 - Digital Evidence and Legal Issues j.mp4 |
156.73MB |
| 012 - Frameworks.mp4 |
220.57MB |
| 012 - Handling Errors Properly.mp4 |
11.66MB |
| 012 - IA and Security Community.mp4 |
49.06MB |
| 012 - Introduction to Routers.mp4 |
155.35MB |
| 012 - Power Supplies.mp4 |
30.67MB |
| 012 - Primary PC Components.mp4 |
74.71MB |
| 012 - Remediation and Mitigation.mp4 |
52.06MB |
| 012 - Remote Access Security.mp4 |
54.89MB |
| 012 - Reproducible Builds.mp4 |
189.43MB |
| 012 - Risk Assessment.mp4 |
213.02MB |
| 012 - Security Models Part 3.mp4 |
70.57MB |
| 012 - Storage Devices.mp4 |
86.85MB |
| 012 - Twisted Pair Cabling.mp4 |
71.28MB |
| 012 - User Environment Configuration Overview.mp4 |
4.80MB |
| 012 - White Box Support Resources.mp4 |
11.53MB |
| 013 - Ask Me Anything about System Hardware.mp4 |
86.64MB |
| 013 - Authorization.mp4 |
43.46MB |
| 013 - AWS IAM.mp4 |
12.33MB |
| 013 - Cat Ratings.mp4 |
82.66MB |
| 013 - Change Management.mp4 |
53.88MB |
| 013 - Cross-Site Scripting Exploitation.mp4 |
12.58MB |
| 013 - Digital Evidence and Legal Issues k.mp4 |
138.91MB |
| 013 - External Connections.mp4 |
166.95MB |
| 013 - Graphics Information.mp4 |
89.01MB |
| 013 - Impact Analysis.mp4 |
32.85MB |
| 013 - Implement Security Activities Through the Technology Life Cycle.mp4 |
50.01MB |
| 013 - Industry Trends and Effects on Enterprise.mp4 |
53.78MB |
| 013 - Inhibitors to Remediation.mp4 |
48.74MB |
| 013 - Managing Credentials Properly.mp4 |
25.36MB |
| 013 - Public vs Internal Image Repositories.mp4 |
136.47MB |
| 013 - Quantitative Risk Calculations.mp4 |
156.42MB |
| 013 - Security Awareness Training for Cybersecurity.mp4 |
67.33MB |
| 013 - Security Modes.mp4 |
30.90MB |
| 013 - Standards and Best Practices.mp4 |
20.25MB |
| 013 - Teardown of Project Artifacts Walkthrough.mp4 |
86.61MB |
| 013 - Types of Assessments.mp4 |
9.74MB |
| 013 - Virtualization.mp4 |
80.19MB |
| 014 - AWS IAM Hands-On.mp4 |
9.09MB |
| 014 - Business Impact Analysis.mp4 |
312.31MB |
| 014 - Collective Tools.mp4 |
42.27MB |
| 014 - Contingency Planning.mp4 |
83.62MB |
| 014 - Cross-Site Scripting Demo.mp4 |
7.22MB |
| 014 - End to End Ownership.mp4 |
63.67MB |
| 014 - Evaluation Models.mp4 |
52.42MB |
| 014 - Fiber Optic Cabling.mp4 |
66.18MB |
| 014 - Hardening the Build Infrastructure.mp4 |
150.63MB |
| 014 - Inside the PC.mp4 |
166.93MB |
| 014 - Introduction to Azure.mp4 |
8.99MB |
| 014 - Investigations a.mp4 |
128.28MB |
| 014 - Package Management.mp4 |
81.36MB |
| 014 - Ports and Connectors.mp4 |
37.68MB |
| 014 - Risk and Control for Social Media.mp4 |
63.39MB |
| 014 - Secure Network Topologies.mp4 |
43.06MB |
| 014 - Security Activities Throughout the Technology Life Cycle.mp4 |
50.01MB |
| 014 - Session Management and Accountability.mp4 |
34.26MB |
| 014 - Threat Actors.mp4 |
13.11MB |
| 014 - Troubleshooting Methodology.mp4 |
88.68MB |
| 014 - Web App Scanners, Part 1.mp4 |
35.50MB |
| 015 - Assessing Third-Party Risk.mp4 |
165.27MB |
| 015 - AWS Infrastructure Security.mp4 |
12.26MB |
| 015 - Cyber Threat Hunting Hints.mp4 |
6.75MB |
| 015 - Facilitate Collaboration Across Business Units.mp4 |
82.51MB |
| 015 - Fire Ratings.mp4 |
78.99MB |
| 015 - General Use of IO Devices.mp4 |
48.53MB |
| 015 - Investigations b.mp4 |
136.65MB |
| 015 - Iron vs VM vs Cloud Providers.mp4 |
253.24MB |
| 015 - Managing Libraries.mp4 |
30.43MB |
| 015 - Organizing Data.mp4 |
262.50MB |
| 015 - Patch Management.mp4 |
24.46MB |
| 015 - Permissions.mp4 |
34.97MB |
| 015 - Poor Error Handling.mp4 |
12.91MB |
| 015 - Rainbow Series.mp4 |
27.31MB |
| 015 - System Monitoring.mp4 |
65.71MB |
| 015 - Target Selection.mp4 |
8.17MB |
| 015 - Troubleshooting Core System Elements.mp4 |
95.78MB |
| 015 - Web App Scanners, Part 2.mp4 |
16.56MB |
| 015 - What is a Computer.mp4 |
123.78MB |
| 015 - WLAN Authentication.mp4 |
92.98MB |
| 016 - Ask Me Anything About IO, Ports and Peripherals.mp4 |
93.36MB |
| 016 - AWS Infrastructure Security Hands-On.mp4 |
9.82MB |
| 016 - Common Criteria.mp4 |
54.94MB |
| 016 - Disk Usage.mp4 |
107.75MB |
| 016 - Exploiting Poor Error Handling.mp4 |
5.75MB |
| 016 - Host Hardening.mp4 |
61.91MB |
| 016 - Immutable Containers.mp4 |
226.59MB |
| 016 - Investigations c.mp4 |
146.62MB |
| 016 - Legacy Network Connections.mp4 |
93.26MB |
| 016 - Measuring Performance Controls.mp4 |
84.52MB |
| 016 - Network Security Device Types.mp4 |
37.99MB |
| 016 - Remote Authentication Services.mp4 |
41.08MB |
| 016 - Scanning.mp4 |
21.97MB |
| 016 - Security Training.mp4 |
204.78MB |
| 016 - Telnet and SSH.mp4 |
57.42MB |
| 016 - Threat Hunting and Hypothesis.mp4 |
46.61MB |
| 016 - Troubleshooting the Physical Network.mp4 |
88.95MB |
| 016 - What is an Operating System.mp4 |
115.45MB |
| 016 - Whitelisting and Other Scoping Considerations.mp4 |
12.00MB |
| 017 - Attacking Azure Targets walkthrough.mp4 |
240.09MB |
| 017 - AWS Network Security.mp4 |
13.15MB |
| 017 - Basics of Binary.mp4 |
41.84MB |
| 017 - Certification and Accreditation.mp4 |
29.89MB |
| 017 - Configuring and Executing Scans.mp4 |
23.90MB |
| 017 - Devices.mp4 |
95.78MB |
| 017 - Federated Identity.mp4 |
51.14MB |
| 017 - Investigations d.mp4 |
72.96MB |
| 017 - Live Scanning.mp4 |
135.09MB |
| 017 - Network Security Component Management.mp4 |
86.19MB |
| 017 - Poor Error Handling Demo.mp4 |
5.57MB |
| 017 - Security Operations Center (SOC) Definitions and Concepts.mp4 |
255.18MB |
| 017 - Standard Business Documentation.mp4 |
38.56MB |
| 017 - Third-Party Agreements.mp4 |
198.96MB |
| 017 - Troubleshooting the Logical Network.mp4 |
108.46MB |
| 017 - Users and Super Users.mp4 |
63.27MB |
| 017 - Virtualization Technologies.mp4 |
50.49MB |
| 017 - What is Ethernet.mp4 |
59.53MB |
| 017 - Workflow and Scripting.mp4 |
50.90MB |
| 018 - Analyze Network-Enabled Devices.mp4 |
97.22MB |
| 018 - AWS Network Security Hands-On.mp4 |
7.94MB |
| 018 - Baselines and Anomaly Detection.mp4 |
255.80MB |
| 018 - Cross-Site Request Forgery Vulnerabilities.mp4 |
7.56MB |
| 018 - Ethernet Frames.mp4 |
80.29MB |
| 018 - Incident Response Process.mp4 |
30.50MB |
| 018 - Integrating Identity Services.mp4 |
37.68MB |
| 018 - Introduction to Information Gathering and Vulnerability Identification.mp4 |
4.78MB |
| 018 - Investigations e.mp4 |
88.36MB |
| 018 - Management of Threats and Vulnerabilities.mp4 |
274.95MB |
| 018 - Preventative Tools, Part 1.mp4 |
87.59MB |
| 018 - Remote Connectivity.mp4 |
25.54MB |
| 018 - Secure SDLC.mp4 |
66.50MB |
| 018 - Static Environments.mp4 |
45.22MB |
| 018 - Storage Technologies.mp4 |
48.81MB |
| 018 - Virtual File Systems.mp4 |
31.37MB |
| 018 - Why Windows.mp4 |
90.91MB |
| 019 - Access Control Models.mp4 |
71.03MB |
| 019 - Analyze Advanced Network Design.mp4 |
77.26MB |
| 019 - AWS Application Security.mp4 |
8.24MB |
| 019 - Azure Run walkthrough.mp4 |
121.86MB |
| 019 - Cross-Site Request Forgery Exploitation.mp4 |
8.29MB |
| 019 - Cryptography Basics.mp4 |
442.99MB |
| 019 - Digital Forensics.mp4 |
48.93MB |
| 019 - Early Ethernet.mp4 |
76.45MB |
| 019 - Identity and Access Management.mp4 |
184.57MB |
| 019 - Information Gathering Techniques.mp4 |
19.47MB |
| 019 - Introduction to Kubernetes.mp4 |
321.74MB |
| 019 - Investigations f.mp4 |
132.57MB |
| 019 - Mass Storage Variation.mp4 |
35.43MB |
| 019 - Physical Security.mp4 |
75.51MB |
| 019 - Preventative Tools, Part 2.mp4 |
33.88MB |
| 019 - Processes.mp4 |
62.35MB |
| 019 - Software Development Models.mp4 |
107.93MB |
| 019 - Web Application Attacks and Countermeasures.mp4 |
86.19MB |
| 019 - Windows Editions and Versions.mp4 |
113.68MB |
| 020 - Access Control Techniques.mp4 |
48.12MB |
| 020 - Ask Me Anything About Data Storage and Sharing.mp4 |
85.17MB |
| 020 - Authentication, Authorization, and Accounting.mp4 |
51.37MB |
| 020 - AWS Disaster Recovery.mp4 |
5.16MB |
| 020 - Business Impact Analysis.mp4 |
34.76MB |
| 020 - Configuration Management and Asset Management.mp4 |
148.11MB |
| 020 - Contingecy Planning.mp4 |
68.55MB |
| 020 - Cross-Site Request Forgery Demo.mp4 |
5.40MB |
| 020 - Cryptographic Methods.mp4 |
195.56MB |
| 020 - Information Gathering Techniques Demonstration.mp4 |
35.29MB |
| 020 - Investigations g.mp4 |
152.85MB |
| 020 - Kubernetes Cluster, API and etcd.mp4 |
290.82MB |
| 020 - Maturity Models.mp4 |
56.79MB |
| 020 - Network Security Control Topics.mp4 |
73.69MB |
| 020 - Processes Priority and Execution.mp4 |
59.26MB |
| 020 - The Daddy of Ethernet 10BaseT.mp4 |
28.51MB |
| 020 - Touring the macOS.mp4 |
63.85MB |
| 020 - Vulnerability Scanning.mp4 |
40.50MB |
| 021 - Access Control Administration.mp4 |
29.50MB |
| 021 - Access Controls.mp4 |
51.36MB |
| 021 - AWS Security Summary.mp4 |
7.78MB |
| 021 - Change Control.mp4 |
58.50MB |
| 021 - Configure Controls for Network Security.mp4 |
61.67MB |
| 021 - Frameworks.mp4 |
39.00MB |
| 021 - Investigations h.mp4 |
122.49MB |
| 021 - Kernels.mp4 |
94.66MB |
| 021 - Kubernetes Nodes, Pods and kublet.mp4 |
213.86MB |
| 021 - Managing Change.mp4 |
120.89MB |
| 021 - Operating System Functions.mp4 |
44.72MB |
| 021 - OSINT against Azure walkthrough.mp4 |
79.25MB |
| 021 - Reverse Engineering.mp4 |
33.37MB |
| 021 - Scanning and Enumeration.mp4 |
9.08MB |
| 021 - Site Layout and Access Security.mp4 |
67.98MB |
| 021 - Symmetric Cryptosystems.mp4 |
300.73MB |
| 021 - Terminating Twisted Pair.mp4 |
197.29MB |
| 021 - Touring Linux.mp4 |
96.35MB |
| 022 - Access Control Attacks.mp4 |
54.84MB |
| 022 - AWS Project Walkthrough.mp4 |
6.52MB |
| 022 - Enumeration.mp4 |
30.98MB |
| 022 - Hubs vs. Switches.mp4 |
181.19MB |
| 022 - Indentification and Authentication.mp4 |
25.80MB |
| 022 - Investigations i.mp4 |
119.78MB |
| 022 - Kubernetes Services, Labes and Namespaces.mp4 |
261.91MB |
| 022 - Mitigating Network Threats.mp4 |
45.77MB |
| 022 - Operating System Interfaces.mp4 |
38.23MB |
| 022 - Patch Management.mp4 |
131.44MB |
| 022 - Policies and Procedures.mp4 |
33.15MB |
| 022 - Scanning and Enumeration Demonstration.mp4 |
36.77MB |
| 022 - Select Host Hardware and Software.mp4 |
74.80MB |
| 022 - Software Testing.mp4 |
94.80MB |
| 022 - Symmetric Block Modes.mp4 |
203.94MB |
| 022 - Tape Archive Files.mp4 |
78.42MB |
| 022 - What is a CPU.mp4 |
137.94MB |
| 023 - 100BaseT.mp4 |
69.30MB |
| 023 - Ask Me Anything About Understanding OSes.mp4 |
55.42MB |
| 023 - Authorization and Accounting.mp4 |
13.85MB |
| 023 - AWS Project Hint 1.mp4 |
4.07MB |
| 023 - Considerations for Network Security.mp4 |
280.13MB |
| 023 - CPU Speeds and Cores.mp4 |
133.63MB |
| 023 - Fingerprinting.mp4 |
8.33MB |
| 023 - Harden Hosts.mp4 |
71.76MB |
| 023 - Hardening Devices.mp4 |
179.86MB |
| 023 - Investigations j.mp4 |
105.50MB |
| 023 - Kubernetes and Networking.mp4 |
152.93MB |
| 023 - RSA Cryptosystems.mp4 |
271.95MB |
| 023 - Scheduling Tasks.mp4 |
73.58MB |
| 023 - Social Engineering.mp4 |
55.65MB |
| 023 - Software Environment.mp4 |
87.22MB |
| 023 - Teardown of Lab Environment walkthrough.mp4 |
28.76MB |
| 023 - Wireless Assessment Tools.mp4 |
32.69MB |
| 024 - Authentication Products and Protocols.mp4 |
38.73MB |
| 024 - AWS Project Hint 2.mp4 |
2.28MB |
| 024 - Building and Deploying a Secure Authorization Process.mp4 |
117.18MB |
| 024 - Caching.mp4 |
78.94MB |
| 024 - Circumventing Access Controls.mp4 |
23.39MB |
| 024 - Cloud Assessment Tools.mp4 |
16.40MB |
| 024 - Connecting Switches.mp4 |
57.05MB |
| 024 - Cryptographic Inspection.mp4 |
2.61MB |
| 024 - Diffie-Hellman.mp4 |
157.76MB |
| 024 - Investigations k.mp4 |
166.74MB |
| 024 - Kubernetes Security Design.mp4 |
188.11MB |
| 024 - Object-Oriented Programming (OOP).mp4 |
45.58MB |
| 024 - Preparing the Work Area.mp4 |
21.12MB |
| 024 - Protect Boot Loaders.mp4 |
27.33MB |
| 024 - SNMP.mp4 |
79.87MB |
| 024 - System Monitoring.mp4 |
50.86MB |
| 025 - 32-Bit vs. 64-Bit Processing.mp4 |
121.16MB |
| 025 - Access Provisioning.mp4 |
66.36MB |
| 025 - AWS Project Hint 3.mp4 |
3.32MB |
| 025 - Directory Services.mp4 |
31.37MB |
| 025 - Distributed Computing.mp4 |
38.25MB |
| 025 - Eavesdropping.mp4 |
5.80MB |
| 025 - Gigabit Ethernet and 10-Gigabit Ethernet.mp4 |
67.07MB |
| 025 - Investigations l.mp4 |
104.79MB |
| 025 - Kubernetes Authentication and Authorization.mp4 |
210.08MB |
| 025 - Managing Incidents.mp4 |
287.90MB |
| 025 - Mobile and IoT.mp4 |
67.22MB |
| 025 - PGPGPG.mp4 |
256.97MB |
| 025 - Setting up a Desktop PC.mp4 |
16.01MB |
| 025 - Storage Types.mp4 |
70.15MB |
| 025 - Troubleshooting Structured Cabling.mp4 |
35.79MB |
| 025 - Viewing and Using Ports.mp4 |
16.71MB |
| 026 - AWS Project Hint 4.mp4 |
1.25MB |
| 026 - Character Based Names.mp4 |
80.89MB |
| 026 - Completing PC Setup.mp4 |
25.66MB |
| 026 - CPU Sockets.mp4 |
187.51MB |
| 026 - Decompiling and Debugging.mp4 |
5.77MB |
| 026 - Embedded and Firmware Systems.mp4 |
61.87MB |
| 026 - Firewalls.mp4 |
74.75MB |
| 026 - Hashing.mp4 |
170.87MB |
| 026 - Investigations m.mp4 |
169.95MB |
| 026 - Kublet Security and Managing Secrets.mp4 |
241.26MB |
| 026 - Mobile Code.mp4 |
48.24MB |
| 026 - Predicting Hardware Failure.mp4 |
39.36MB |
| 026 - Privilege Policies.mp4 |
26.83MB |
| 026 - Protection for User Endpoints.mp4 |
56.73MB |
| 026 - Storage Protocols.mp4 |
83.68MB |
| 026 - Transcievers.mp4 |
94.27MB |
| 027 - Access and Vehicles Risk.mp4 |
53.80MB |
| 027 - Account Management.mp4 |
82.48MB |
| 027 - Acquired Software.mp4 |
34.24MB |
| 027 - Ask Me Anything About Setting up and Configuring a PC.mp4 |
92.97MB |
| 027 - Azure Security Course Overview.mp4 |
4.27MB |
| 027 - Computer Forensics Tools and Hardware.mp4 |
160.69MB |
| 027 - Connecting Ethernet Scenarios.mp4 |
198.18MB |
| 027 - DMZ.mp4 |
80.99MB |
| 027 - HMAC.mp4 |
99.53MB |
| 027 - Implement Secure Storage Controls.mp4 |
73.76MB |
| 027 - Installing a CPU.mp4 |
199.98MB |
| 027 - Introduction to Wireshark.mp4 |
93.90MB |
| 027 - Kubernetes Pod, Network Policies and 3rd Party Integrations.mp4 |
229.65MB |
| 027 - Networks.mp4 |
43.19MB |
| 027 - Open Source Intelligence.mp4 |
12.69MB |
| 027 - Security in Applications.mp4 |
192.26MB |
| 028 - Application Attacks.mp4 |
80.68MB |
| 028 - Aspects of Hard Drives a.mp4 |
140.26MB |
| 028 - Automation and Control Risk.mp4 |
70.36MB |
| 028 - Azure Data Encryption.mp4 |
12.49MB |
| 028 - BCM-DRP-BRP.mp4 |
86.92MB |
| 028 - Honeypots.mp4 |
42.44MB |
| 028 - Identify General Application Vulnerabilities.mp4 |
86.90MB |
| 028 - Introduction to Netstat.mp4 |
41.38MB |
| 028 - Introduction to Structured Cabling.mp4 |
43.83MB |
| 028 - Kubernetes Logging and Auditing.mp4 |
220.01MB |
| 028 - Liquid Cooling.mp4 |
24.37MB |
| 028 - Network File Resources.mp4 |
71.80MB |
| 028 - Personalizing a Tablet.mp4 |
79.61MB |
| 028 - Steganography.mp4 |
143.43MB |
| 028 - Types of Security Policies.mp4 |
56.87MB |
| 029 - Ask Me Anything About Mobile Devices Part 1.mp4 |
89.76MB |
| 029 - Aspects of Hard Drives b.mp4 |
122.27MB |
| 029 - Azure Data Encryption - Hands-On.mp4 |
17.02MB |
| 029 - Business Continuity Concepts.mp4 |
39.19MB |
| 029 - Certificates and Trust.mp4 |
373.80MB |
| 029 - Cloud Models.mp4 |
42.94MB |
| 029 - Compliance.mp4 |
115.30MB |
| 029 - Endpoint Security.mp4 |
24.66MB |
| 029 - Identify Web Application Vulnerabilities.mp4 |
106.55MB |
| 029 - Malware.mp4 |
44.80MB |
| 029 - Managing NFS.mp4 |
56.57MB |
| 029 - Preventing Resource Exhaustion.mp4 |
226.66MB |
| 029 - RAM Technology.mp4 |
133.61MB |
| 029 - Terminating Structured Cabling.mp4 |
112.69MB |
| 029 - Vulnerability Scanning.mp4 |
17.07MB |
| 030 - Accessibility.mp4 |
69.14MB |
| 030 - Application Security Design.mp4 |
42.71MB |
| 030 - Ask Me Anything About Mobile Devices Part 2.mp4 |
87.61MB |
| 030 - Aspects of Hard Drives c.mp4 |
120.69MB |
| 030 - Azure DLP.mp4 |
10.44MB |
| 030 - Cryptography.mp4 |
130.04MB |
| 030 - Equipment Room.mp4 |
87.85MB |
| 030 - Helm, and Application Deployment.mp4 |
266.98MB |
| 030 - IDS.mp4 |
67.72MB |
| 030 - Public Key Infrastructure.mp4 |
537.66MB |
| 030 - RAM Capacity.mp4 |
119.73MB |
| 030 - Remote Service Invocation (FaaS, IaC, API).mp4 |
44.67MB |
| 030 - Risk Assessment and Mitigation.mp4 |
54.87MB |
| 030 - Scanning Considerations.mp4 |
10.19MB |
| 030 - VPN and VLAN.mp4 |
61.47MB |
| 031 - Alternative Distribution Panels.mp4 |
67.63MB |
| 031 - Application and Container Scans.mp4 |
5.07MB |
| 031 - Aspects of Hard Drives d.mp4 |
188.86MB |
| 031 - Authentication Protocols.mp4 |
29.86MB |
| 031 - Azure Cloud Storage.mp4 |
7.73MB |
| 031 - Cloud Vulnerabilities.mp4 |
33.84MB |
| 031 - Cryptographic Attacks.mp4 |
625.86MB |
| 031 - File Management Tools.mp4 |
9.31MB |
| 031 - Firewall and Network Security.mp4 |
213.37MB |
| 031 - Implement Application Security Controls.mp4 |
123.91MB |
| 031 - Incident Response Procedures.mp4 |
62.76MB |
| 031 - Localization.mp4 |
84.87MB |
| 031 - Master Hardening.mp4 |
153.83MB |
| 031 - RAM Features.mp4 |
99.54MB |
| 032 - Analyzing Vulnerability Scans.mp4 |
13.05MB |
| 032 - Azure IAM.mp4 |
15.14MB |
| 032 - Distributed and Cloud Computing.mp4 |
60.19MB |
| 032 - File Manipulation.mp4 |
34.55MB |
| 032 - File Systems a.mp4 |
110.83MB |
| 032 - Forensic Procedures.mp4 |
46.10MB |
| 032 - Identification.mp4 |
334.26MB |
| 032 - Injection and Overflow Attacks.mp4 |
52.07MB |
| 032 - Installing RAM.mp4 |
116.94MB |
| 032 - Log Management Using SIEM.mp4 |
139.32MB |
| 032 - Node Hardening.mp4 |
186.40MB |
| 032 - OSI Protocols.mp4 |
70.69MB |
| 032 - Select Vulnerability Assessment Methods.mp4 |
122.85MB |
| 032 - System Security.mp4 |
83.09MB |
| 032 - Testing Cable.mp4 |
93.23MB |
| 033 - Authentication Attacks.mp4 |
44.24MB |
| 033 - Authorization Concepts.mp4 |
153.67MB |
| 033 - Azure IAM Hands-On.mp4 |
25.40MB |
| 033 - Backups.mp4 |
27.34MB |
| 033 - File Systems b.mp4 |
115.64MB |
| 033 - Network Security.mp4 |
75.77MB |
| 033 - Pod Security and Availability.mp4 |
242.92MB |
| 033 - Security Controls.mp4 |
34.19MB |
| 033 - Select Vulnerability Assessment Tools.mp4 |
57.42MB |
| 033 - Troubleshooting Structured Cabling (Part 1).mp4 |
35.79MB |
| 033 - Virtualization.mp4 |
76.57MB |
| 033 - Virtual Memory.mp4 |
52.56MB |
| 033 - Wireless Considerations.mp4 |
213.02MB |
| 034 - Access Control List.mp4 |
118.29MB |
| 034 - Ask Me Anything About Managing Files.mp4 |
89.97MB |
| 034 - Azure Disaster Recovery.mp4 |
21.58MB |
| 034 - Considerations for Cloud Computing.mp4 |
219.38MB |
| 034 - Data Handling.mp4 |
77.54MB |
| 034 - Design Systems to Facilitate Incident Response.mp4 |
51.14MB |
| 034 - Exploits.mp4 |
33.83MB |
| 034 - File Systems c.mp4 |
108.93MB |
| 034 - Leveraging Information for Exploit.mp4 |
6.49MB |
| 034 - Monitoring the Cluster for Attacks.mp4 |
200.77MB |
| 034 - OSI Layers.mp4 |
88.81MB |
| 034 - Troubleshooting Structured Cabling (Part 2).mp4 |
48.60MB |
| 034 - Virtualized Networks.mp4 |
52.07MB |
| 034 - Web Services.mp4 |
78.13MB |
| 034 - What is BIOS.mp4 |
85.54MB |
| 035 - Application Vulnerabilities, Part 1.mp4 |
52.24MB |
| 035 - Azure Disaster Recovery Hands-On.mp4 |
17.34MB |
| 035 - Common Attack Techniques.mp4 |
10.94MB |
| 035 - Conduct Incident and Emergency Responses.mp4 |
88.93MB |
| 035 - Facility Design.mp4 |
63.75MB |
| 035 - File Systems d.mp4 |
181.65MB |
| 035 - Mobile Computing Issues.mp4 |
218.58MB |
| 035 - MySQL.mp4 |
65.49MB |
| 035 - Password Security.mp4 |
239.48MB |
| 035 - POST.mp4 |
127.26MB |
| 035 - Securing the Cluster from the External Network.mp4 |
171.93MB |
| 035 - Symmetric Encryption.mp4 |
28.93MB |
| 035 - Using a Toner and Probe.mp4 |
25.63MB |
| 035 - Walking Survey of Applications.mp4 |
54.59MB |
| 036 - Application Vulnerabilities, Part 2.mp4 |
47.00MB |
| 036 - Asymmetric Encryption.mp4 |
41.78MB |
| 036 - Azure Infrastructure Security.mp4 |
10.46MB |
| 036 - Facility Construction.mp4 |
36.23MB |
| 036 - File and Operating System Forensics a.mp4 |
154.04MB |
| 036 - FTP Services.mp4 |
71.46MB |
| 036 - Implement Security Standards in the Enterprise.mp4 |
68.56MB |
| 036 - Integration with CICD Systems.mp4 |
225.20MB |
| 036 - IoT.mp4 |
125.88MB |
| 036 - Linux File Permissions.mp4 |
364.78MB |
| 036 - Managing Applications.mp4 |
27.00MB |
| 036 - System Setup.mp4 |
90.79MB |
| 036 - TCPIP Model.mp4 |
45.84MB |
| 036 - Weaknesses in Specialized Systems.mp4 |
17.59MB |
| 036 - Wired Connection Scenarios.mp4 |
135.99MB |
| 037 - Applications and Extensions.mp4 |
30.62MB |
| 037 - Azure Network Security.mp4 |
9.86MB |
| 037 - Configuring E-Mail.mp4 |
81.70MB |
| 037 - Cryptographic Hash Functions.mp4 |
20.94MB |
| 037 - File and Operating System Forensics b.mp4 |
134.78MB |
| 037 - Introduction to IP Addressing and Binary.mp4 |
134.74MB |
| 037 - Network Architecture and Asset Management.mp4 |
56.77MB |
| 037 - Network Devices.mp4 |
96.51MB |
| 037 - Perimeter Defenses.mp4 |
100.98MB |
| 037 - Secure the Design of the Enterprise Infrastructure.mp4 |
51.54MB |
| 037 - Troubleshooting Firmware.mp4 |
135.05MB |
| 037 - Virtualization.mp4 |
176.61MB |
| 037 - Windows File Permissions.mp4 |
353.79MB |
| 038 - Ask Me Anything About Working with Applications.mp4 |
79.58MB |
| 038 - Attacks and Exploits Overview.mp4 |
3.56MB |
| 038 - Azure Application Security.mp4 |
8.14MB |
| 038 - Doors and Locks.mp4 |
70.68MB |
| 038 - File and Operating System Forensics c.mp4 |
112.25MB |
| 038 - Form Factors.mp4 |
112.33MB |
| 038 - Industrial Control Systems.mp4 |
177.20MB |
| 038 - Introduction to ARP.mp4 |
26.49MB |
| 038 - Network Security.mp4 |
49.75MB |
| 038 - Network Troubleshooting.mp4 |
66.48MB |
| 038 - PKI and Certificates.mp4 |
44.15MB |
| 038 - Protecting Your Territory.mp4 |
27.61MB |
| 038 - Secure Enterprise Application Integration Enablers.mp4 |
122.23MB |
| 038 - User Account Management.mp4 |
177.95MB |
| 039 - AAA.mp4 |
212.57MB |
| 039 - Azure Security Summary.mp4 |
10.38MB |
| 039 - Chipsets.mp4 |
79.79MB |
| 039 - File and Operating System Forensics d.mp4 |
170.14MB |
| 039 - Identity and Access Management.mp4 |
84.38MB |
| 039 - Internal Facilities Security.mp4 |
117.72MB |
| 039 - IP Networking.mp4 |
116.81MB |
| 039 - PKI Architecture.mp4 |
32.34MB |
| 039 - Social Engineering Attack Methods.mp4 |
20.80MB |
| 039 - Subnet Masks.mp4 |
115.69MB |
| 039 - Text Stream Utilities.mp4 |
36.00MB |
| 039 - Virtualize Technologies.mp4 |
87.20MB |
| 039 - Wi-Fi Setup.mp4 |
24.52MB |
| 040 - Authentication Methods.mp4 |
258.88MB |
| 040 - Azure Project Walkthrough.mp4 |
8.48MB |
| 040 - Classful Addressing.mp4 |
90.96MB |
| 040 - Encryption and Active Defense.mp4 |
59.61MB |
| 040 - File and Operating System Forensics e.mp4 |
84.29MB |
| 040 - Going High Speed.mp4 |
31.02MB |
| 040 - Implement Cloud Augmented Security Services.mp4 |
47.70MB |
| 040 - Physical Intrusion Detection.mp4 |
107.72MB |
| 040 - Social Engineering Motivation Factors.mp4 |
11.43MB |
| 040 - Touring the Motherboard.mp4 |
248.63MB |
| 041 - Azure Hint 1.mp4 |
4.97MB |
| 041 - Deployment Models and the Cloud.mp4 |
74.47MB |
| 041 - DNS and DHCP.mp4 |
79.52MB |
| 041 - File and Operating System Forensics f.mp4 |
135.91MB |
| 041 - Personnel Safety.mp4 |
33.40MB |
| 041 - Physical Security Attacks.mp4 |
9.04MB |
| 041 - Platforms.mp4 |
52.11MB |
| 041 - Setting Up and Sharing Printers.mp4 |
31.57MB |
| 041 - Single Sign-On.mp4 |
263.12MB |
| 041 - Subnetting with CIDR.mp4 |
92.23MB |
| 041 - Touring the Case.mp4 |
101.20MB |
| 042 - ARP.mp4 |
32.60MB |
| 042 - Ask Me Anything About Networks and Internet Connectivity Part 1.mp4 |
84.14MB |
| 042 - Azure Hint 2.mp4 |
4.31MB |
| 042 - Deployment Models and Virtualization-segmentation.mp4 |
69.36MB |
| 042 - File and Operating System Forensics g.mp4 |
80.81MB |
| 042 - Installing a Motherboard.mp4 |
154.34MB |
| 042 - Media Storage.mp4 |
33.24MB |
| 042 - More CIDR Subnetting Practice.mp4 |
89.25MB |
| 042 - OS Utilities, Part 1.mp4 |
382.07MB |
| 042 - SOA and DevSecOps.mp4 |
65.70MB |
| 043 - Ask Me Anything About Networks and Internet Connectivity Part 2.mp4 |
56.27MB |
| 043 - Authentication.mp4 |
27.49MB |
| 043 - Azure Hint 3.mp4 |
5.25MB |
| 043 - Dynamic and Static IP Addressing.mp4 |
102.36MB |
| 043 - Multi-layer Protocols.mp4 |
44.73MB |
| 043 - Network-based Vulnerabilities.mp4 |
24.37MB |
| 043 - OS Utilities, Part 2.mp4 |
363.86MB |
| 043 - Secure Software Development.mp4 |
37.91MB |
| 043 - The Power Supply.mp4 |
149.51MB |
| 043 - Utilities and HVAC.mp4 |
95.57MB |
| 043 - Viruses and Malware.mp4 |
215.56MB |
| 044 - Authorization.mp4 |
43.46MB |
| 044 - Best Coding Practices.mp4 |
32.35MB |
| 044 - Converged Protocols.mp4 |
91.03MB |
| 044 - Email and Browser Forensics a.mp4 |
142.22MB |
| 044 - Fire Safety.mp4 |
86.40MB |
| 044 - GCP Security Course Overview.mp4 |
1.63MB |
| 044 - Mounting a Power Supply.mp4 |
143.11MB |
| 044 - Network Scanners.mp4 |
280.37MB |
| 044 - Physical Security.mp4 |
25.24MB |
| 044 - Rogue DHCP Servers.mp4 |
49.72MB |
| 044 - Wireless-based Vulnerabilities.mp4 |
15.72MB |
| 045 - Choosing a Power Supply.mp4 |
85.31MB |
| 045 - Dealing with Malware.mp4 |
24.49MB |
| 045 - Email and Browser Forensics b.mp4 |
102.14MB |
| 045 - GCP Data Encryption.mp4 |
17.65MB |
| 045 - Network Cabling and Topology.mp4 |
120.43MB |
| 045 - Network Security Device Types.mp4 |
37.99MB |
| 045 - Protocol Analyzers.mp4 |
282.64MB |
| 045 - Special IP Addresses.mp4 |
69.95MB |
| 045 - Trusted Hardware.mp4 |
71.37MB |
| 045 - Trust Models.mp4 |
71.13MB |
| 045 - Wireless Network Attack Demonstration.mp4 |
13.23MB |
| 046 - Application-based Vulnerabilities.mp4 |
64.32MB |
| 046 - Email and Browser Forensics c.mp4 |
154.56MB |
| 046 - GCP DLP.mp4 |
10.22MB |
| 046 - Hardware Encryption.mp4 |
32.54MB |
| 046 - Implement Advanced Identity Management.mp4 |
51.36MB |
| 046 - IP Addressing Scenarios.mp4 |
177.05MB |
| 046 - Network Security Component Management.mp4 |
86.19MB |
| 046 - Password Management.mp4 |
21.84MB |
| 046 - Power Protection.mp4 |
123.39MB |
| 046 - Signaling Types.mp4 |
40.90MB |
| 046 - SNMP.mp4 |
336.00MB |
| 047 - Analyze Network-Enabled Devices.mp4 |
97.22MB |
| 047 - Clickworthy.mp4 |
24.19MB |
| 047 - Cooling Your PC.mp4 |
166.34MB |
| 047 - Cryptographic Concepts.mp4 |
29.46MB |
| 047 - Email and Browser Forensics d.mp4 |
93.84MB |
| 047 - GCP Cloud Storage.mp4 |
1.51MB |
| 047 - Hardware Security.mp4 |
54.48MB |
| 047 - Introducing Routers.mp4 |
155.35MB |
| 047 - Logs.mp4 |
231.82MB |
| 047 - Network Attacks.mp4 |
100.89MB |
| 048 - Analyze Advanced Network Design.mp4 |
77.26MB |
| 048 - Data Analysis.mp4 |
45.66MB |
| 048 - Denial of Service.mp4 |
192.74MB |
| 048 - Email and Browser Forensics e.mp4 |
138.20MB |
| 048 - GCP IAM.mp4 |
10.58MB |
| 048 - Local Host Vulnerabilities.mp4 |
5.50MB |
| 048 - Perils of Public Internet.mp4 |
15.50MB |
| 048 - Switching.mp4 |
17.10MB |
| 048 - Troubleshooting Power Supplies.mp4 |
187.13MB |
| 048 - Trust in Cryptography.mp4 |
44.46MB |
| 048 - Understanding Ports.mp4 |
82.51MB |
| 049 - Ask Me Anything About IT Threat Mitigation Part 1.mp4 |
81.38MB |
| 049 - Cryptographic Design.mp4 |
49.48MB |
| 049 - Email and Browser Forensics f.mp4 |
136.48MB |
| 049 - Endpoint Security.mp4 |
54.15MB |
| 049 - GCP IAM Hands-On.mp4 |
10.55MB |
| 049 - Host Threats.mp4 |
237.23MB |
| 049 - Network Address Translation.mp4 |
70.02MB |
| 049 - Network Security Control Topics.mp4 |
73.69MB |
| 049 - Privilege Escalation (Linux).mp4 |
8.59MB |
| 049 - Troubleshooting Core Components.mp4 |
252.34MB |
| 049 - Wireless Networks.mp4 |
105.04MB |
| 050 - Ask Me Anything About IT Threat Mitigation Part 2.mp4 |
95.39MB |
| 050 - Configure Controls for Network Security.mp4 |
61.67MB |
| 050 - Cryptographic Techniques.mp4 |
41.87MB |
| 050 - Email and Browser Forensics g.mp4 |
161.72MB |
| 050 - GCP Infrastructure Security.mp4 |
25.49MB |
| 050 - Implementing NAT.mp4 |
15.32MB |
| 050 - Introduction to Mass Storage.mp4 |
127.84MB |
| 050 - Man-in-the-Middle.mp4 |
581.22MB |
| 050 - Mobile Systems.mp4 |
92.38MB |
| 050 - Privilege Escalation (Windows).mp4 |
20.66MB |
| 050 - Recon Results, Part 1.mp4 |
62.36MB |
| 051 - Digital Signatures and Code Signing.mp4 |
42.10MB |
| 051 - Email and Browser Forensics h.mp4 |
135.81MB |
| 051 - Forwarding Ports.mp4 |
185.60MB |
| 051 - GCP Infrastructure Security Hands-On.mp4 |
9.87MB |
| 051 - Magnetic Disk Drives.mp4 |
143.10MB |
| 051 - Power Management.mp4 |
7.40MB |
| 051 - Privilege Escalation Techniques.mp4 |
9.66MB |
| 051 - Recon Results, Part 2.mp4 |
26.50MB |
| 051 - Select Host Hardware and Software.mp4 |
74.80MB |
| 051 - System Resiliency.mp4 |
292.17MB |
| 051 - WAN Technologies.mp4 |
74.67MB |
| 052 - Choose Cryptographic Implementations.mp4 |
47.09MB |
| 052 - Cleaning and Maintaining Computers.mp4 |
27.62MB |
| 052 - Email and Browser Forensics i.mp4 |
97.35MB |
| 052 - GCP Network Security.mp4 |
14.28MB |
| 052 - Harden Hosts.mp4 |
71.76MB |
| 052 - Impact Analysis.mp4 |
32.85MB |
| 052 - Privilege Escalation Demo.mp4 |
28.28MB |
| 052 - RAID.mp4 |
250.11MB |
| 052 - Remote Access.mp4 |
61.03MB |
| 052 - Solid State Drives.mp4 |
123.61MB |
| 052 - Tour of a SOHO Router.mp4 |
61.21MB |
| 053 - Collective Tools.mp4 |
42.27MB |
| 053 - Email and Browser Forensics j.mp4 |
117.24MB |
| 053 - GCP Application Security.mp4 |
8.69MB |
| 053 - NAS and SAN.mp4 |
410.33MB |
| 053 - Protect Boot Loaders.mp4 |
27.33MB |
| 053 - SCSI.mp4 |
47.97MB |
| 053 - Secure Communication Protocols.mp4 |
81.76MB |
| 053 - SOHO vs. Enterprise.mp4 |
86.11MB |
| 053 - Trash it or Stash it.mp4 |
24.64MB |
| 054 - Ask Me Anything About Computer Maintenance and Management.mp4 |
128.99MB |
| 054 - Boot Order.mp4 |
72.37MB |
| 054 - GCP Disaster Recovery.mp4 |
6.87MB |
| 054 - Lateral Movement.mp4 |
17.96MB |
| 054 - Managing Data.mp4 |
100.95MB |
| 054 - OWASP Top Ten.mp4 |
257.95MB |
| 054 - Physical Hardening.mp4 |
194.29MB |
| 054 - Query Writing.mp4 |
41.00MB |
| 054 - Static Routes.mp4 |
123.00MB |
| 054 - Storage Types.mp4 |
70.15MB |
| 055 - Data Ownership.mp4 |
26.41MB |
| 055 - Dynamic Routing.mp4 |
107.17MB |
| 055 - E-mail Analysis, Part 1.mp4 |
60.87MB |
| 055 - GCP Security Summary.mp4 |
6.93MB |
| 055 - Network Forensics a.mp4 |
114.48MB |
| 055 - Persistence.mp4 |
12.23MB |
| 055 - RFI, EMI, and ESD.mp4 |
68.37MB |
| 055 - Storage Protocols.mp4 |
83.68MB |
| 055 - Troubleshooting 101.mp4 |
21.91MB |
| 055 - Understanding Partitioning.mp4 |
51.93MB |
| 056 - Ask Me Anything About Troubleshooting Computers Part 1.mp4 |
119.51MB |
| 056 - Covering Your Tracks.mp4 |
10.47MB |
| 056 - Data Security Controls.mp4 |
70.13MB |
| 056 - E-mail Analysis, Part 2.mp4 |
57.82MB |
| 056 - GCP Project Introduction.mp4 |
7.93MB |
| 056 - Host Hardening.mp4 |
424.00MB |
| 056 - Implement Secure Storage Controls.mp4 |
73.76MB |
| 056 - MBR Partitioning.mp4 |
98.76MB |
| 056 - Network Forensics b.mp4 |
136.80MB |
| 056 - RIP.mp4 |
38.82MB |
| 057 - Ask Me Anything About Troubleshooting Computers Part 2.mp4 |
118.68MB |
| 057 - Data and System Security.mp4 |
114.48MB |
| 057 - Data Remanence.mp4 |
57.99MB |
| 057 - GCP Project Hint 1.mp4 |
3.18MB |
| 057 - GPT Partitioning.mp4 |
69.36MB |
| 057 - Identify General Application Vulnerabilities.mp4 |
86.90MB |
| 057 - Network Forensics c.mp4 |
130.78MB |
| 057 - OSPF.mp4 |
32.50MB |
| 057 - Permissions.mp4 |
34.97MB |
| 057 - Persistence and Covering Tracks Demonstration.mp4 |
22.11MB |
| 058 - BGP.mp4 |
22.27MB |
| 058 - Data at Rest.mp4 |
89.29MB |
| 058 - Disk Encryption.mp4 |
176.94MB |
| 058 - Firewalls.mp4 |
38.80MB |
| 058 - GCP Project Hint 2.mp4 |
6.21MB |
| 058 - Identify Web Application Vulnerabilities.mp4 |
106.55MB |
| 058 - Introduction to Databases.mp4 |
39.92MB |
| 058 - Network Forensics d.mp4 |
133.57MB |
| 058 - Understanding File Systems.mp4 |
89.18MB |
| 059 - Application Security Design.mp4 |
42.71MB |
| 059 - Database Details.mp4 |
39.88MB |
| 059 - Data in Transit.mp4 |
66.77MB |
| 059 - GCP Project Hint 3.mp4 |
3.82MB |
| 059 - HardwareFirmware Security.mp4 |
242.64MB |
| 059 - Intrusion Prevention Rules.mp4 |
37.09MB |
| 059 - Network Forensics e.mp4 |
132.98MB |
| 059 - Pentesting Tools Introduction.mp4 |
4.88MB |
| 059 - Popular File Systems.mp4 |
99.54MB |
| 059 - TCP and UDP.mp4 |
76.54MB |
| 060 - Ask Me Anything about Databases.mp4 |
64.62MB |
| 060 - Classification.mp4 |
77.82MB |
| 060 - Cryptographic Hashing a.mp4 |
132.86MB |
| 060 - DLP and Endpoint Detection.mp4 |
36.78MB |
| 060 - Formatting in Action.mp4 |
79.26MB |
| 060 - ICMP and IGMP.mp4 |
61.33MB |
| 060 - Implement Application Security Controls.mp4 |
123.91MB |
| 060 - Nmap Usage.mp4 |
20.14MB |
| 060 - Secure OS Types.mp4 |
204.20MB |
| 061 - Architectural Concepts & Design Requirements.mp4 |
495.34MB |
| 061 - Cryptographic Hashing b.mp4 |
142.43MB |
| 061 - Dynamic Disks.mp4 |
87.40MB |
| 061 - Handy Tools.mp4 |
55.58MB |
| 061 - Introduction to Programming.mp4 |
35.13MB |
| 061 - Nmap Demonstration.mp4 |
165.39MB |
| 061 - Securing Peripherals.mp4 |
291.13MB |
| 061 - Security Assessment Goals.mp4 |
56.37MB |
| 061 - Threat Hunting and Hypothesis.mp4 |
46.61MB |
| 062 - Control Testing.mp4 |
69.54MB |
| 062 - Cryptographic Hashing c.mp4 |
133.84MB |
| 062 - Introduction to Wireshark.mp4 |
93.90MB |
| 062 - Legal and Compliance.mp4 |
228.25MB |
| 062 - Malware.mp4 |
268.65MB |
| 062 - New Installation - First Drive.mp4 |
44.67MB |
| 062 - Programming with a PBJ Sandwich.mp4 |
70.56MB |
| 062 - Threat Hunting Process.mp4 |
59.24MB |
| 063 - Analyzing Output.mp4 |
390.38MB |
| 063 - Ask Me Anything about Programming.mp4 |
38.36MB |
| 063 - Cryptographic Hashing d.mp4 |
111.50MB |
| 063 - Introduction to netstat.mp4 |
41.38MB |
| 063 - Operations.mp4 |
507.11MB |
| 063 - Penetration Testing.mp4 |
72.28MB |
| 063 - RAID.mp4 |
109.38MB |
| 063 - Results and Benefits.mp4 |
36.01MB |
| 063 - Use Cases for Tools.mp4 |
13.16MB |
| 064 - Cloud Platform and Infrastructure Security.mp4 |
308.39MB |
| 064 - Cryptographic Hashing e.mp4 |
120.33MB |
| 064 - Hardware RAID.mp4 |
46.46MB |
| 064 - IDS and IPS.mp4 |
118.22MB |
| 064 - Scanners.mp4 |
4.36MB |
| 064 - Security Management Processes.mp4 |
49.28MB |
| 064 - Web Servers.mp4 |
73.90MB |
| 064 - Workflow and Scripting.mp4 |
50.90MB |
| 065 - API and Malware Signature Creation.mp4 |
53.64MB |
| 065 - Automation Strategies.mp4 |
131.65MB |
| 065 - Cloud Data Security.mp4 |
286.83MB |
| 065 - Credential Testing Tools.mp4 |
14.77MB |
| 065 - Cryptographic Hashing f.mp4 |
137.31MB |
| 065 - FTP.mp4 |
60.36MB |
| 065 - Implement Security Standards in the Enterprise.mp4 |
68.56MB |
| 065 - Software RAID in Storage Spaces.mp4 |
80.07MB |
| 066 - Cloud Application Security.mp4 |
266.75MB |
| 066 - Cryptographic Hashing g.mp4 |
113.76MB |
| 066 - Data Destruction.mp4 |
128.87MB |
| 066 - Debuggers.mp4 |
6.33MB |
| 066 - Email Servers and Clients.mp4 |
62.10MB |
| 066 - Encrypting Mass Storage.mp4 |
94.48MB |
| 066 - Secure the Design of the Enterprise Infrastructure.mp4 |
51.54MB |
| 066 - Threat Feeds and Machine Learning.mp4 |
46.12MB |
| 067 - Anti-Forensics.mp4 |
241.35MB |
| 067 - LAN Review.mp4 |
203.21MB |
| 067 - Mass Storage Troubleshooting.mp4 |
104.57MB |
| 067 - Protocols, Standards, and Software Engineering.mp4 |
38.18MB |
| 067 - Secure Enterprise Application Integration Enablers.mp4 |
122.23MB |
| 067 - Securing Email.mp4 |
71.64MB |
| 067 - Software Assurance Tools.mp4 |
5.02MB |
| 068 - IR Roles and Responsibilities.mp4 |
21.35MB |
| 068 - Network Topologies Review.mp4 |
127.44MB |
| 068 - New and Emerging Technologies a.mp4 |
140.05MB |
| 068 - Optical Media.mp4 |
131.21MB |
| 068 - OSINT Tools.mp4 |
9.60MB |
| 068 - Telnet and SSH.mp4 |
57.42MB |
| 068 - Virtualize Technologies.mp4 |
87.20MB |
| 069 - Implement Cloud Augmented Security Services.mp4 |
47.70MB |
| 069 - IR Active Preparation.mp4 |
39.83MB |
| 069 - Network Time Protocol.mp4 |
13.35MB |
| 069 - Network Zone Review.mp4 |
238.72MB |
| 069 - New and Emerging Technologies b.mp4 |
137.50MB |
| 069 - USB Standards.mp4 |
147.95MB |
| 069 - Wireless Pentesting Tools.mp4 |
3.53MB |
| 070 - Deployment Models and the Cloud.mp4 |
74.47MB |
| 070 - Incident Response Process.mp4 |
30.50MB |
| 070 - Network Access Controls.mp4 |
251.76MB |
| 070 - Network Service Scenarios.mp4 |
112.17MB |
| 070 - New and Emerging Technologies c.mp4 |
110.37MB |
| 070 - Understanding USB.mp4 |
102.94MB |
| 070 - Web Proxies.mp4 |
3.19MB |
| 071 - Configuring USB.mp4 |
79.81MB |
| 071 - Deployment Models and Virtualization-segmentation.mp4 |
69.36MB |
| 071 - Network Symptoms.mp4 |
14.51MB |
| 071 - New and Emerging Technologies d.mp4 |
151.43MB |
| 071 - Social Engineering Tools.mp4 |
2.75MB |
| 071 - The Network Firewall.mp4 |
322.16MB |
| 071 - Understanding DNS.mp4 |
95.66MB |
| 072 - Applying DNS.mp4 |
193.29MB |
| 072 - Host Symptoms.mp4 |
32.22MB |
| 072 - New and Emerging Technologies e.mp4 |
114.44MB |
| 072 - Proxy Servers.mp4 |
330.06MB |
| 072 - Remote Access Tools.mp4 |
5.81MB |
| 072 - Thunder and Lightning.mp4 |
71.27MB |
| 072 - Trust Models.mp4 |
71.13MB |
| 073 - Application Symptoms.mp4 |
21.56MB |
| 073 - Honeypots.mp4 |
118.86MB |
| 073 - Implement Advanced Identity Management.mp4 |
51.36MB |
| 073 - Keyboards and Mice.mp4 |
109.34MB |
| 073 - Networking Tools.mp4 |
3.22MB |
| 073 - New and Emerging Technologies f.mp4 |
196.77MB |
| 073 - The HOSTs File.mp4 |
19.78MB |
| 074 - Cryptographic Concepts.mp4 |
29.46MB |
| 074 - Digital Forensics.mp4 |
48.93MB |
| 074 - Mobile Forensics a.mp4 |
139.30MB |
| 074 - Mobile Tools.mp4 |
4.13MB |
| 074 - Net Command.mp4 |
36.87MB |
| 074 - Sight and Sound.mp4 |
88.20MB |
| 074 - Virtual Private Networks.mp4 |
287.15MB |
| 075 - Exploitation Frameworks and Other Tools.mp4 |
10.25MB |
| 075 - IPSec.mp4 |
308.65MB |
| 075 - Mobile Forensics b.mp4 |
125.77MB |
| 075 - Readers and Scanners.mp4 |
99.40MB |
| 075 - Seizure and Acquisitions.mp4 |
21.61MB |
| 075 - Trust in Cryptography.mp4 |
44.46MB |
| 075 - Windows Name Resolution.mp4 |
82.73MB |
| 076 - Cryptographic Design.mp4 |
49.48MB |
| 076 - Dynamic DNS.mp4 |
39.31MB |
| 076 - Forensic Acquisition Tools.mp4 |
26.87MB |
| 076 - Mobile Forensics c.mp4 |
165.76MB |
| 076 - NIDSNIPS.mp4 |
158.51MB |
| 076 - Using Expansion Cards.mp4 |
99.31MB |
| 077 - Cryptographic Techniques.mp4 |
41.87MB |
| 077 - DNS Troubleshooting.mp4 |
85.31MB |
| 077 - Introduction to Programming.mp4 |
4.93MB |
| 077 - Mobile, Virtualization, and Cloud.mp4 |
42.73MB |
| 077 - Mobile Forensics d.mp4 |
174.36MB |
| 077 - SIEM (Security Information and Event Management).mp4 |
188.43MB |
| 077 - The Right PC for the Job.mp4 |
180.64MB |
| 078 - Boot from Everything.mp4 |
118.64MB |
| 078 - Digital Signatures and Code Signing.mp4 |
42.10MB |
| 078 - Forensics Analysis, Part 1.mp4 |
11.78MB |
| 078 - Making TCPIP Secure.mp4 |
53.55MB |
| 078 - Programming Concepts.mp4 |
38.74MB |
| 078 - Wireless Review.mp4 |
252.25MB |
| 079 - BASH Sample Script.mp4 |
7.15MB |
| 079 - Choose Cryptographic Implementations.mp4 |
47.09MB |
| 079 - Forensics Analysis, Part 2.mp4 |
27.22MB |
| 079 - Installing Windows.mp4 |
80.80MB |
| 079 - Living in Open Networks.mp4 |
254.40MB |
| 079 - Symmetric Encryption.mp4 |
45.32MB |
| 080 - Asymmetric Encryption.mp4 |
30.40MB |
| 080 - Enterprise Risk Management.mp4 |
38.80MB |
| 080 - Packet Capture.mp4 |
47.83MB |
| 080 - Post-Installation Tasks.mp4 |
103.18MB |
| 080 - Python Sample Script.mp4 |
6.48MB |
| 080 - Vulnerabilities with Wireless Access Points.mp4 |
185.10MB |
| 081 - Business Models and Risk.mp4 |
89.15MB |
| 081 - Cracking 802.11, WEP.mp4 |
314.28MB |
| 081 - Cryptographic Hashes.mp4 |
36.57MB |
| 081 - Data Privacy and Security.mp4 |
48.08MB |
| 081 - PowerShell Sample Script.mp4 |
7.12MB |
| 081 - Windows Installation Options.mp4 |
57.45MB |
| 082 - Cracking 802.11, WPA and WPA2.mp4 |
247.33MB |
| 082 - Identification.mp4 |
150.93MB |
| 082 - Nontechnical Controls.mp4 |
63.72MB |
| 082 - Risk Mitigation.mp4 |
84.60MB |
| 082 - Ruby Sample Script.mp4 |
7.00MB |
| 082 - What is the Registry.mp4 |
85.33MB |
| 083 - Access Control.mp4 |
32.12MB |
| 083 - CIA Triad and Risk.mp4 |
40.17MB |
| 083 - Cracking 802.11, WPS.mp4 |
256.00MB |
| 083 - Processes.mp4 |
61.94MB |
| 083 - Technical Controls.mp4 |
55.42MB |
| 084 - AAA.mp4 |
51.37MB |
| 084 - Business Impact Analysis.mp4 |
34.76MB |
| 084 - Introduction to Reporting and Communication.mp4 |
3.46MB |
| 084 - Risk Scenarios and Response.mp4 |
57.44MB |
| 084 - Services.mp4 |
27.45MB |
| 084 - Wireless Hardening.mp4 |
370.47MB |
| 085 - KerberosEAP.mp4 |
76.73MB |
| 085 - Monitoring and Governance.mp4 |
32.35MB |
| 085 - Pentest Communications.mp4 |
13.96MB |
| 085 - Risk Identification.mp4 |
38.63MB |
| 085 - Wireless Access Points.mp4 |
347.97MB |
| 085 - Your Windows Toolset.mp4 |
65.99MB |
| 086 - Analyze Scenarios to Secure Enterprise.mp4 |
37.77MB |
| 086 - Report Writing.mp4 |
13.18MB |
| 086 - Risk Calculation and Communication.mp4 |
32.95MB |
| 086 - Single Sign-On.mp4 |
87.72MB |
| 086 - Virtualization Basics.mp4 |
191.87MB |
| 086 - Windows 7 Task Manager.mp4 |
71.71MB |
| 087 - Certificates and Trust.mp4 |
126.48MB |
| 087 - Mitigation Strategies.mp4 |
12.76MB |
| 087 - Review Existing Security.mp4 |
69.76MB |
| 087 - Training.mp4 |
14.93MB |
| 087 - Virtual Security.mp4 |
390.63MB |
| 087 - Windows 10 Task Manager.mp4 |
41.84MB |
| 088 - Certificate Error Scenarios.mp4 |
54.40MB |
| 088 - Containers.mp4 |
279.64MB |
| 088 - Design Systems to Facilitate Incident Response.mp4 |
51.14MB |
| 088 - Information and Configuration Tools.mp4 |
88.10MB |
| 088 - Post-report Activities.mp4 |
7.13MB |
| 088 - Supply Chain Assessment.mp4 |
31.99MB |
| 089 - Conduct Incident and Emergency Responses.mp4 |
88.93MB |
| 089 - Frameworks.mp4 |
39.00MB |
| 089 - Infrastructure as a Service (IaaS).mp4 |
248.96MB |
| 089 - Performance Monitor.mp4 |
77.95MB |
| 089 - Understanding IP Tunneling.mp4 |
61.34MB |
| 090 - Conclusion.mp4 |
4.11MB |
| 090 - Event Viewer.mp4 |
66.70MB |
| 090 - Identify General Application Vulnerabilities.mp4 |
86.90MB |
| 090 - Platform as a Service (PaaS).mp4 |
229.67MB |
| 090 - Policies and Procedures.mp4 |
33.15MB |
| 090 - Virtual Private Networks (VPNs).mp4 |
93.84MB |
| 091 - Controls and Procedures.mp4 |
30.59MB |
| 091 - Creating Your Pentest Lab.mp4 |
172.58MB |
| 091 - Identify Web Application Vulnerabilities.mp4 |
106.55MB |
| 091 - Introduction to VLANs.mp4 |
72.15MB |
| 091 - Software as a Service (SaaS).mp4 |
71.26MB |
| 091 - Tools for Programmers.mp4 |
55.15MB |
| 092 - Application Security Design.mp4 |
42.71MB |
| 092 - Deployment Models.mp4 |
225.77MB |
| 092 - InterVLAN Routing.mp4 |
32.37MB |
| 092 - Introduction to Users and Groups.mp4 |
61.28MB |
| 092 - Verification.mp4 |
21.50MB |
| 093 - Implement Application Security Controls.mp4 |
123.91MB |
| 093 - Interfacing with Managed Switches.mp4 |
56.62MB |
| 093 - Managing Users and Groups.mp4 |
88.32MB |
| 093 - Static Hosts.mp4 |
197.85MB |
| 094 - Mobile Connectivity.mp4 |
317.52MB |
| 094 - NTFS Permissions.mp4 |
79.90MB |
| 094 - Select Vulnerability Assessment Methods.mp4 |
122.85MB |
| 094 - Switch Port Protection.mp4 |
83.36MB |
| 095 - Deploying Mobile Devices.mp4 |
131.51MB |
| 095 - Linux and macOS Permissions.mp4 |
38.45MB |
| 095 - Port Bonding.mp4 |
68.67MB |
| 095 - Select Vulnerability Assessment Tools.mp4 |
57.42MB |
| 096 - File Explorer.mp4 |
113.98MB |
| 096 - Mobile Enforcement.mp4 |
329.69MB |
| 096 - Port Mirroring.mp4 |
25.11MB |
| 097 - Mobile Device Management.mp4 |
213.32MB |
| 097 - Quality of Service.mp4 |
33.30MB |
| 097 - Sharing Resources.mp4 |
87.52MB |
| 098 - IDS vs. IPS.mp4 |
56.68MB |
| 098 - Physical Controls.mp4 |
229.77MB |
| 098 - Security Policies.mp4 |
68.95MB |
| 099 - HVAC.mp4 |
195.08MB |
| 099 - Patch Management.mp4 |
88.32MB |
| 099 - Proxy Servers.mp4 |
111.87MB |
| 100 - Fire Suppression.mp4 |
107.41MB |
| 100 - Load Balancing.mp4 |
105.50MB |
| 100 - Working with Disks.mp4 |
46.23MB |
| 101 - Device Placement Scenarios.mp4 |
174.29MB |
| 101 - Secure Encryption Applications and Protocols.mp4 |
283.64MB |
| 101 - Working with Applications.mp4 |
68.92MB |
| 102 - Intro to IPv6.mp4 |
121.24MB |
| 102 - Network Models.mp4 |
179.26MB |
| 102 - System Restore.mp4 |
39.21MB |
| 103 - Backing up Your Files.mp4 |
56.81MB |
| 103 - IPv6 Addressing.mp4 |
120.46MB |
| 103 - Know Your Protocols - TCPIP.mp4 |
161.83MB |
| 104 - IPv6 in Action.mp4 |
135.71MB |
| 104 - Know Your Protocols - Applications.mp4 |
120.43MB |
| 104 - Task Scheduler.mp4 |
32.42MB |
| 105 - IPv4 and IPv6 Tunneling.mp4 |
35.10MB |
| 105 - Transport Layer Security (TLS).mp4 |
314.76MB |
| 105 - Understanding the CLI.mp4 |
123.33MB |
| 106 - Internet Service Hardening.mp4 |
130.09MB |
| 106 - Navigating the CLI.mp4 |
105.90MB |
| 106 - Telephony Technologies.mp4 |
80.36MB |
| 107 - Optical Carriers.mp4 |
28.02MB |
| 107 - Protecting Your Servers.mp4 |
161.56MB |
| 107 - Working with Folders.mp4 |
59.35MB |
| 108 - Packet Switching.mp4 |
37.45MB |
| 108 - Secure Code Development.mp4 |
266.70MB |
| 108 - Working with Files.mp4 |
93.92MB |
| 109 - Connecting with Dial-Up.mp4 |
37.69MB |
| 109 - Secure Deployment Concepts.mp4 |
317.50MB |
| 109 - Working with Drives.mp4 |
117.11MB |
| 110 - Code Quality and Testing.mp4 |
133.08MB |
| 110 - Digital Subscriber Line.mp4 |
54.57MB |
| 110 - Super Copy Commands.mp4 |
91.22MB |
| 111 - Advanced Windows Command Line.mp4 |
68.34MB |
| 111 - Connecting with Cable Modems.mp4 |
33.46MB |
| 111 - Vulnerability Scanning Tools.mp4 |
243.77MB |
| 112 - Advanced Linux Commands.mp4 |
125.21MB |
| 112 - Connecting with Satellites.mp4 |
15.86MB |
| 112 - Vulnerability Scanning Assessment.mp4 |
125.29MB |
| 113 - Command-Line Permissions.mp4 |
52.04MB |
| 113 - ISDN and BPL.mp4 |
32.71MB |
| 113 - Social Engineering Principles.mp4 |
59.98MB |
| 114 - Introduction to Scripting.mp4 |
78.64MB |
| 114 - Remote Desktop Connectivity.mp4 |
25.54MB |
| 114 - Social Engineering Attacks.mp4 |
205.87MB |
| 115 - Advanced Remote Control Systems.mp4 |
50.99MB |
| 115 - Attacking Applications.mp4 |
283.67MB |
| 115 - Interpreted Languages.mp4 |
96.53MB |
| 116 - Attacking Web Sites.mp4 |
148.77MB |
| 116 - Introduction to 802.11.mp4 |
130.09MB |
| 116 - Windows Recovery Environment.mp4 |
45.59MB |
| 117 - 802.11 Standards.mp4 |
147.12MB |
| 117 - Advanced Windows Startup Problems.mp4 |
47.82MB |
| 117 - Exploiting a Target.mp4 |
280.27MB |
| 118 - Power Over Ethernet (PoE).mp4 |
39.48MB |
| 118 - Troubleshooting Boot Problems.mp4 |
114.79MB |
| 118 - Vulnerability Impact.mp4 |
263.76MB |
| 119 - Antennas.mp4 |
106.18MB |
| 119 - Incident Response.mp4 |
93.04MB |
| 119 - Troubleshooting at the GUI.mp4 |
122.66MB |
| 120 - Digital Forensics.mp4 |
266.54MB |
| 120 - Troubleshooting Applications.mp4 |
76.51MB |
| 120 - Wireless Security Standards.mp4 |
145.03MB |
| 121 - Contingency Planning.mp4 |
260.35MB |
| 121 - Implementing Wireless Security.mp4 |
35.54MB |
| 121 - Kernel Panic.mp4 |
68.09MB |
| 122 - Backups.mp4 |
145.05MB |
| 122 - Monitor Technologies.mp4 |
114.06MB |
| 122 - Threats to Your Wireless Network.mp4 |
66.28MB |
| 123 - LCD Breakdown.mp4 |
67.64MB |
| 123 - Retro Threats.mp4 |
102.53MB |
| 124 - Graphics Cards and Connections.mp4 |
206.71MB |
| 124 - Wi-Fi Protected Setup (WPS).mp4 |
45.95MB |
| 125 - Enterprise Wireless.mp4 |
47.12MB |
| 125 - Resolutions and Aspect Ratios.mp4 |
55.81MB |
| 126 - Installing a Graphics Card.mp4 |
104.47MB |
| 126 - Installing a Wireless Network.mp4 |
146.84MB |
| 127 - Multiple Monitors.mp4 |
32.74MB |
| 127 - Wireless Scenarios.mp4 |
39.32MB |
| 128 - More Wireless Scenarios.mp4 |
99.01MB |
| 128 - Projectors.mp4 |
59.19MB |
| 129 - Troubleshooting Monitors.mp4 |
76.46MB |
| 129 - Virtualization Basics.mp4 |
56.95MB |
| 130 - Cloud Ownership.mp4 |
5.71MB |
| 130 - Introduction to Networking.mp4 |
87.20MB |
| 131 - Cloud Implementation.mp4 |
98.62MB |
| 131 - Hubs vs. Switches.mp4 |
74.45MB |
| 132 - Hexadecimal.mp4 |
62.72MB |
| 132 - Your First Virtual Machine.mp4 |
41.25MB |
| 133 - NAS and SAN.mp4 |
135.59MB |
| 133 - WANs and Routers.mp4 |
69.22MB |
| 134 - Cables and Connectors.mp4 |
142.64MB |
| 134 - Platform as a Service (PaaS).mp4 |
56.89MB |
| 135 - Crimping Cables.mp4 |
131.55MB |
| 135 - Software as a Service (SaaS).mp4 |
22.31MB |
| 136 - Infrastructure as a Service (IaaS).mp4 |
56.52MB |
| 136 - Structured Cabling.mp4 |
170.73MB |
| 137 - Cellular Technologies.mp4 |
51.37MB |
| 137 - Network Card Troubleshooting.mp4 |
101.95MB |
| 138 - Introduction to TCPIP.mp4 |
131.66MB |
| 138 - Mobile Connectivity.mp4 |
79.13MB |
| 139 - Deploying Mobile Devices.mp4 |
42.78MB |
| 139 - Network IDs and Subnet Masks.mp4 |
28.10MB |
| 140 - Mobile Access Control.mp4 |
63.59MB |
| 140 - Special IP Addresses.mp4 |
74.68MB |
| 141 - NAT.mp4 |
58.43MB |
| 141 - Network Types.mp4 |
58.35MB |
| 142 - Dynamic IP Addressing.mp4 |
81.04MB |
| 142 - Network Design.mp4 |
109.26MB |
| 143 - IPv6.mp4 |
88.01MB |
| 143 - Power Management.mp4 |
67.40MB |
| 144 - Port Numbers.mp4 |
91.96MB |
| 144 - Unified Communications.mp4 |
45.65MB |
| 145 - Network Documentation.mp4 |
54.25MB |
| 145 - TCP, UDP and ICMP.mp4 |
78.22MB |
| 146 - Contingency Planning.mp4 |
83.62MB |
| 146 - Working with Connections.mp4 |
66.94MB |
| 147 - Predicting Hardware Failure.mp4 |
39.36MB |
| 147 - Understanding DNS.mp4 |
60.55MB |
| 148 - Backups.mp4 |
46.19MB |
| 148 - Working with DNS.mp4 |
54.51MB |
| 149 - What is Risk Management.mp4 |
70.47MB |
| 149 - Windows Naming.mp4 |
74.59MB |
| 150 - Security Policies.mp4 |
95.54MB |
| 150 - Working with Workgroups.mp4 |
63.87MB |
| 151 - Change Management.mp4 |
53.88MB |
| 151 - Working with Active Directory.mp4 |
91.58MB |
| 152 - User Training.mp4 |
25.65MB |
| 152 - Windows Sharing with Mac and Linux.mp4 |
62.89MB |
| 153 - Net Command.mp4 |
21.55MB |
| 153 - Standard Business Documentation.mp4 |
38.56MB |
| 154 - Mitigating Network Threats.mp4 |
45.77MB |
| 154 - Routers.mp4 |
125.92MB |
| 155 - Basic Router Configuration.mp4 |
79.84MB |
| 155 - High Availability.mp4 |
53.06MB |
| 156 - Denial of Service.mp4 |
50.00MB |
| 156 - Firewall Configuration.mp4 |
92.92MB |
| 157 - Malware.mp4 |
99.71MB |
| 157 - Windows Firewall.mp4 |
67.80MB |
| 158 - Port Forwarding.mp4 |
63.91MB |
| 158 - Social Engineering.mp4 |
32.40MB |
| 159 - Advanced Router Configuration.mp4 |
52.68MB |
| 159 - Man-in-the-Middle.mp4 |
171.11MB |
| 160 - Introduction to Firewalls.mp4 |
42.36MB |
| 160 - VLANs.mp4 |
74.42MB |
| 161 - Firewalls.mp4 |
66.18MB |
| 161 - Network Troubleshooting.mp4 |
73.19MB |
| 162 - DMZ.mp4 |
51.14MB |
| 162 - Wireless Network Hardware.mp4 |
162.24MB |
| 163 - Hardening Devices.mp4 |
179.86MB |
| 163 - Wi-Fi Standards.mp4 |
110.49MB |
| 164 - Basic WAP Setup.mp4 |
96.89MB |
| 164 - Physical Security Controls.mp4 |
75.51MB |
| 165 - Testing Network Security.mp4 |
58.16MB |
| 165 - Wireless Encryption.mp4 |
123.35MB |
| 166 - Connecting to a Wi-Fi Network.mp4 |
58.29MB |
| 166 - Network Protection Scenarios.mp4 |
161.25MB |
| 167 - It's a Huge Mesh.mp4 |
41.27MB |
| 167 - SNMP.mp4 |
79.87MB |
| 168 - Documenting Logs.mp4 |
53.31MB |
| 168 - Enterprise Wireless.mp4 |
157.78MB |
| 169 - Beyond Wi-Fi.mp4 |
91.29MB |
| 169 - System Monitoring.mp4 |
65.71MB |
| 170 - SIEM.mp4 |
69.27MB |
| 170 - Troubleshooting Wireless Connections.mp4 |
113.99MB |
| 171 - Beyond the LAN.mp4 |
23.36MB |
| 171 - Network Troubleshooting.mp4 |
64.93MB |
| 172 - Internet Tiers.mp4 |
67.35MB |
| 173 - Dial-up Connections.mp4 |
83.18MB |
| 174 - Broadband Connections.mp4 |
121.98MB |
| 175 - Firewalls and Servers.mp4 |
48.88MB |
| 176 - Telnet and SSH.mp4 |
62.44MB |
| 177 - Remote Desktop Connections.mp4 |
48.08MB |
| 178 - The World Wide Web.mp4 |
78.39MB |
| 179 - FTP.mp4 |
51.30MB |
| 180 - Email.mp4 |
68.03MB |
| 181 - Proxy Servers.mp4 |
65.67MB |
| 182 - Virtual Private Networks (VPNs).mp4 |
62.50MB |
| 183 - Internet of Things (IoT).mp4 |
44.71MB |
| 184 - Troubleshooting Internet Connections.mp4 |
70.31MB |
| 185 - Understanding Virtualization.mp4 |
97.34MB |
| 186 - Your First Virtual Machine.mp4 |
80.16MB |
| 187 - Advanced Virtualization Setup.mp4 |
69.45MB |
| 188 - Cloud Computing.mp4 |
119.23MB |
| 189 - Cloud Ownership.mp4 |
5.52MB |
| 190 - Cloud-Based Applications.mp4 |
61.86MB |
| 191 - Laptop Features.mp4 |
119.10MB |
| 192 - Laptop Hardware Troubleshooting - The Tools.mp4 |
50.96MB |
| 193 - Laptop Hardware - Core Hardware.mp4 |
62.64MB |
| 194 - Laptop Hardware - CPU and Motherboard.mp4 |
127.30MB |
| 195 - Touring Your Laptop Display.mp4 |
65.90MB |
| 196 - Power Management.mp4 |
113.11MB |
| 197 - What is a Mobile Device.mp4 |
106.79MB |
| 198 - Mobile Connections.mp4 |
112.01MB |
| 199 - Touring Android.mp4 |
88.08MB |
| 200 - Touring iOS.mp4 |
71.09MB |
| 201 - Virtual Reality.mp4 |
16.98MB |
| 202 - Maintaining Mobile Devices.mp4 |
120.83MB |
| 203 - Mobile Devices and Email.mp4 |
101.15MB |
| 204 - Mobile Synchronization.mp4 |
104.58MB |
| 205 - Mobile Device Security.mp4 |
78.14MB |
| 206 - Mobile Security Troubleshooting.mp4 |
84.53MB |
| 207 - Mobile Device Troubleshooting.mp4 |
133.66MB |
| 208 - Laser Printers.mp4 |
103.52MB |
| 209 - Inkjet Printers.mp4 |
68.87MB |
| 210 - Impact Printers.mp4 |
55.45MB |
| 211 - Thermal Printers.mp4 |
39.56MB |
| 212 - Installing a Local Printer.mp4 |
106.01MB |
| 213 - Sharing Printers.mp4 |
69.41MB |
| 214 - Installing Wireless and Cloud Printers.mp4 |
126.26MB |
| 215 - Troubleshooting Printers.mp4 |
151.28MB |
| 216 - 3D Printing.mp4 |
83.32MB |
| 217 - Threats.mp4 |
78.54MB |
| 218 - Dealing with Threats.mp4 |
69.89MB |
| 219 - Physical Security.mp4 |
94.92MB |
| 220 - Passwords and Authentication.mp4 |
144.31MB |
| 221 - Malware.mp4 |
154.06MB |
| 222 - Anti-Malware.mp4 |
109.38MB |
| 223 - Social Engineering.mp4 |
40.34MB |
| 224 - Licensing.mp4 |
104.79MB |
| 225 - Incident Response.mp4 |
47.60MB |
| 226 - Environmental Controls.mp4 |
75.06MB |
| 227 - Documents You Need to Know.mp4 |
120.48MB |
| 228 - Data You Need to Know.mp4 |
41.07MB |
| 229 - Change Management.mp4 |
78.44MB |
| 230 - The Zen of Backup.mp4 |
103.92MB |
| 231 - Recycling and Data Destruction.mp4 |
80.72MB |
| Cloud Pentesting.zip |
3.74GB |
| Common Ports.pdf |
94.00KB |
| Cyber_Threat_Challenge_Answers.pdf |
50.82KB |
| Cyber_Threat_Challenge_Questions.pdf |
35.45KB |
| CyberThreat_traffic-analysis-exercise.zip |
6.01MB |
| Encryption.pdf |
223.96KB |
| IPSec VPN.pdf |
78.69KB |
| Lab 1_ Setup.pdf |
507.33KB |
| Lab 2_ Setting up AWS.pdf |
378.77KB |
| Lab 2_ Setting up Azure.pdf |
287.04KB |
| Lab 3_ Attacking Azure Targets.pdf |
70.62KB |
| Lab 3_ Metadata Attacks.pdf |
224.17KB |
| Lab 4_ Azure Run.pdf |
48.55KB |
| Lab 4_ S3 Misconfigurations and EBS.pdf |
81.25KB |
| Lab 5_ OSINT against AWS.pdf |
128.94KB |
| Lab 5_ OSINT Against Azure.pdf |
134.45KB |
| Lab 6_ Teardown of Lab Environment.pdf |
294.69KB |
| Lab 6_ Teardown of Project Artifacts.pdf |
47.83KB |
| Notes on Access Control.pdf |
173.12KB |
| Notes on Biometrics.pdf |
204.37KB |
| Notes on IPv4-IPv6.pdf |
3.13MB |
| Notes on Kerberos.pdf |
603.08KB |
| OSI Model.pdf |
100.17KB |
| Security+ Domains.pdf |
57.50KB |