Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
001 - Access Control Basics.mp4 |
59.03MB |
001 - Application-based Vulnerabilities.mp4 |
64.32MB |
001 - Application Security Design.mp4 |
42.71MB |
001 - Architectural Concepts & Design Requirements.mp4 |
495.34MB |
001 - Computer Forensics as a Profession a.mp4 |
141.82MB |
001 - Cryptography Terminology.mp4 |
84.82MB |
001 - Cybersecurity Definitions.mp4 |
80.11MB |
001 - Enterprise Risk Management.mp4 |
38.80MB |
001 - Enterprise Risk Management.mp4 |
38.80MB |
001 - How to Use This Video Course.mp4 |
36.83MB |
001 - IaaS security roles and responsibilities.mp4 |
19.72MB |
001 - Intelligence Sources and Confidence Levels.mp4 |
60.17MB |
001 - Intelligence Sources and Confidence Levels.mp4 |
60.17MB |
001 - Introduction to Cyber Threat Hunting Techniques.mp4 |
26.54MB |
001 - Introduction to Information Security.mp4 |
21.93MB |
001 - Introduction to Network+.mp4 |
41.40MB |
001 - Introduction to PenTest+.mp4 |
6.35MB |
001 - Linux Overview.mp4 |
56.32MB |
001 - Mobile Operating Systems.mp4 |
65.52MB |
001 - Overview of Containers.mp4 |
248.04MB |
001 - Welcome to CompTIA Security+.mp4 |
90.03MB |
001 - Welcome to the CompTIA IT Fundamentals path!.mp4 |
33.05MB |
001 - What is a Model.mp4 |
14.91MB |
002 - Access Control Categories.mp4 |
74.25MB |
002 - AWS Introduction.mp4 |
9.32MB |
002 - Business Models and Risk.mp4 |
89.15MB |
002 - Computer Forensics as a Profession b.mp4 |
113.91MB |
002 - Cyber Threat Hunting - Experience Required, part 1.mp4 |
51.20MB |
002 - Digital Asset Protection.mp4 |
212.12MB |
002 - Docker vs rkt and Other Container Runtimes.mp4 |
159.14MB |
002 - Hashing.mp4 |
74.11MB |
002 - Implement Application Security Controls.mp4 |
123.91MB |
002 - Installing Linux.mp4 |
59.41MB |
002 - Introduction to IP Addressing.mp4 |
83.26MB |
002 - Legal and Compliance.mp4 |
228.25MB |
002 - Malware Types.mp4 |
57.90MB |
002 - PaaS security roles and responsibilities.mp4 |
13.06MB |
002 - Risk Mitigation.mp4 |
84.60MB |
002 - Securing Mobile Devices.mp4 |
43.68MB |
002 - The Case for Computer Literacy.mp4 |
23.21MB |
002 - The CIA of Security.mp4 |
74.88MB |
002 - Threat Indicators and Actors.mp4 |
49.56MB |
002 - Threat Indicators and Actors.mp4 |
49.56MB |
002 - Web Application Hacking.mp4 |
141.19MB |
002 - Welcome to the Course.mp4 |
7.95MB |
002 - What is a Model.mp4 |
14.91MB |
002 - What is the CompTIA A+.mp4 |
36.28MB |
003 - Attack Frameworks.mp4 |
28.66MB |
003 - Authentication.mp4 |
27.49MB |
003 - CIA Triad and Risk.mp4 |
40.17MB |
003 - Command Injection.mp4 |
9.40MB |
003 - Computer Forensics as a Profession c.mp4 |
89.61MB |
003 - Cryptographic Attacks.mp4 |
63.86MB |
003 - Cyber Threat Hunting - Experience Required, part 2.mp4 |
43.23MB |
003 - Docker vs Kubernetes.mp4 |
177.06MB |
003 - Exam Foundations.mp4 |
8.13MB |
003 - Features Common to Every Computing Device.mp4 |
20.75MB |
003 - Graphical User Interfaces.mp4 |
60.72MB |
003 - Lines of Defense.mp4 |
134.81MB |
003 - Mobile Device Synchronization.mp4 |
20.75MB |
003 - Operations.mp4 |
507.11MB |
003 - OSI Model vs. TCPIP Model.mp4 |
70.34MB |
003 - OSI Model vs TCPIP Model.mp4 |
70.34MB |
003 - Risk Assessment.mp4 |
72.29MB |
003 - SaaS security roles and responsibilities.mp4 |
17.64MB |
003 - Social Engineering.mp4 |
45.46MB |
003 - Testing Application Code.mp4 |
10.05MB |
003 - Threat Trends.mp4 |
21.57MB |
003 - What is Risk.mp4 |
258.12MB |
003 - Why Get A+ Certified.mp4 |
48.69MB |
004_Setting Up Your Playground and Tools.mp4 |
50.56MB |
004 - Audit's Role.mp4 |
91.05MB |
004 - Cloud Platform and Infrastructure Security.mp4 |
308.39MB |
004 - Command Injection Exploitation.mp4 |
7.23MB |
004 - Command Line Linux.mp4 |
76.98MB |
004 - Common Network Attacks.mp4 |
55.24MB |
004 - Compliance.mp4 |
5.52MB |
004 - Container Image Misconfigurations.mp4 |
268.74MB |
004 - Digital Evidence and Legal Issues b.mp4 |
163.11MB |
004 - Intelligence Cycle and ISACs.mp4 |
30.22MB |
004 - Networks, Part 1.mp4 |
83.00MB |
004 - Network Security Device Types.mp4 |
37.99MB |
004 - Networks of Computing Devices.mp4 |
57.42MB |
004 - Network Topologies.mp4 |
145.84MB |
004 - Policies and Procedures.mp4 |
127.94MB |
004 - Symmetric Cryptography.mp4 |
67.95MB |
004 - Threat Actors.mp4 |
176.53MB |
004 - Vulnerability Identification.mp4 |
40.66MB |
004 - Walking Through OSI and TCPIP.mp4 |
127.21MB |
004 - Web Application Vulnerability Scanning.mp4 |
10.81MB |
004 - What is on the CompTIA A+ Core 1 (220-1001) Exam.mp4 |
122.06MB |
005 - Account Management.mp4 |
52.85MB |
005 - Asymmetric Cryptography.mp4 |
74.74MB |
005 - Attack Frameworks.mp4 |
28.66MB |
005 - Cloud Data Security.mp4 |
286.83MB |
005 - Command Injection Demo.mp4 |
13.62MB |
005 - Compliance Hands-on.mp4 |
3.61MB |
005 - Digital Evidence and Legal Issues c.mp4 |
122.86MB |
005 - Getting Help.mp4 |
86.77MB |
005 - Host Hardening.mp4 |
71.76MB |
005 - Managing Risk.mp4 |
314.95MB |
005 - Meet the Frame.mp4 |
54.68MB |
005 - Networks, Part 2.mp4 |
71.71MB |
005 - Network Tools (PRTG, NTOP and More).mp4 |
303.13MB |
005 - Password Attacks and Countermeasures.mp4 |
41.18MB |
005 - Patch & Vulnerability Management.mp4 |
45.86MB |
005 - Planning and Scoping Introduction.mp4 |
2.50MB |
005 - Platform as a Service.mp4 |
56.89MB |
005 - Remotely-Accessed Computer Systems.mp4 |
42.18MB |
005 - Risk Mitigation.mp4 |
84.60MB |
005 - Roles and Responsibilities.mp4 |
79.00MB |
005 - Running Dockers and Persisting Data.mp4 |
298.37MB |
005 - Setting up AWS Walkthrough.mp4 |
96.01MB |
005 - Validation.mp4 |
25.41MB |
005 - What is on the CompTIA A+ Core 2 (220-1002) Exam.mp4 |
59.68MB |
006 - Application Vulnerabilities.mp4 |
86.90MB |
006 - AWS Security Course Overview.mp4 |
3.46MB |
006 - CIA Triad and Risk.mp4 |
40.17MB |
006 - Cloud Application Security.mp4 |
266.75MB |
006 - Digital Evidence and Legal Issues d.mp4 |
126.20MB |
006 - Directory Organization.mp4 |
46.54MB |
006 - Dockerfile Best Practices.mp4 |
368.24MB |
006 - Frameworks and Standards.mp4 |
184.40MB |
006 - How to Pass the A+ Exam.mp4 |
63.79MB |
006 - Hybrid Cryptography.mp4 |
41.54MB |
006 - Penetration Testing Methodology.mp4 |
5.22MB |
006 - Remediation and Mitigation.mp4 |
52.06MB |
006 - Secure Application Development.mp4 |
47.20MB |
006 - SIEM is a must. Logging choices are important!.mp4 |
600.85MB |
006 - Single Sign-On (SSO).mp4 |
49.41MB |
006 - Software as a Service.mp4 |
22.31MB |
006 - Specialized Computer Systems.mp4 |
27.75MB |
006 - SQL Injection Vulnerabilities.mp4 |
13.05MB |
006 - TCP IP.mp4 |
109.22MB |
006 - The MAC Address.mp4 |
62.77MB |
006 - Threat Research.mp4 |
54.86MB |
006 - Using Guides for Risk Assessment.mp4 |
166.65MB |
006 - Vulnerability, Threat, Risk.mp4 |
24.65MB |
007 - Assessment Methods.mp4 |
122.85MB |
007 - AWS Data Encryption.mp4 |
20.95MB |
007 - Broadcast vs. Unicast.mp4 |
39.49MB |
007 - Digital Evidence and Legal Issues e.mp4 |
162.89MB |
007 - Exploiting SQL Injection.mp4 |
10.98MB |
007 - File Management.mp4 |
102.05MB |
007 - How Security is Organized.mp4 |
69.57MB |
007 - Infrastructure as a Service.mp4 |
56.52MB |
007 - Metadata Walkthrough.mp4 |
107.47MB |
007 - Namespaces & Cgroups.mp4 |
156.90MB |
007 - Network Architecture and Asset Management.mp4 |
56.77MB |
007 - Network Devices.mp4 |
102.72MB |
007 - Planning a Penetration Test.mp4 |
13.21MB |
007 - Professional Communication (Part 1).mp4 |
111.31MB |
007 - Risk Scenarios and Response.mp4 |
57.44MB |
007 - Secure Application Development - Secure Coding Techniques.mp4 |
46.89MB |
007 - Security Assessment Tools and Techniques.mp4 |
59.25MB |
007 - Security Controls.mp4 |
158.47MB |
007 - Set Up Access.mp4 |
98.53MB |
007 - Specialty IO Devices.mp4 |
24.35MB |
007 - Threat Modeling and Intelligence Sharing.mp4 |
37.30MB |
008_Identification.mp4 |
23.95MB |
008 - AWS Data Encryption Hands-On.mp4 |
6.92MB |
008 - Ciphers.mp4 |
28.87MB |
008 - Command Injection Mitigation.mp4 |
17.18MB |
008 - CPUs.mp4 |
48.10MB |
008 - Digital Evidence and Legal Issues f.mp4 |
93.26MB |
008 - DoS Probes Visiting strange sites Normal activity.mp4 |
374.45MB |
008 - File Information.mp4 |
73.31MB |
008 - Firewalls.mp4 |
72.30MB |
008 - Identity and Access Management.mp4 |
84.38MB |
008 - Incident and Emergency Response Procedures.mp4 |
88.93MB |
008 - Interesting Security Controls.mp4 |
55.55MB |
008 - Introduction to IP Addressing.mp4 |
83.26MB |
008 - Introduction to Structured Cabling.mp4 |
43.83MB |
008 - Monitoring and Governance.mp4 |
32.35MB |
008 - Networking Tools.mp4 |
92.98MB |
008 - Policies and Standards for Cybersecurity.mp4 |
132.89MB |
008 - Professional Communication (Part 2).mp4 |
143.22MB |
008 - Rules of Engagement.mp4 |
9.13MB |
008 - Seccomp & Capabilities.mp4 |
255.04MB |
008 - SQL Injection Demo.mp4 |
18.10MB |
008 - Vulnerability Identification.mp4 |
40.66MB |
009 - Analyze Scenarios to Secure Enterprise.mp4 |
37.77MB |
009 - AWS DLP.mp4 |
6.09MB |
009 - Cybersecurity and the Legal Environment.mp4 |
92.67MB |
009 - Defense in Depth.mp4 |
131.23MB |
009 - Digital Evidence and Legal Issues g.mp4 |
164.33MB |
009 - Digital Signatures.mp4 |
81.06MB |
009 - Docker Networking.mp4 |
214.89MB |
009 - Encryption and Active Defense.mp4 |
59.61MB |
009 - Hubs vs Switches.mp4 |
181.19MB |
009 - Legal Concepts.mp4 |
18.27MB |
009 - Misconfiguration and EBS Walkthrough.mp4 |
321.09MB |
009 - Motherboards.mp4 |
102.34MB |
009 - Packets and Ports.mp4 |
48.65MB |
009 - Passive and Active Cooling.mp4 |
49.40MB |
009 - Physical Safety.mp4 |
112.09MB |
009 - Poor Credential Management.mp4 |
27.85MB |
009 - Remediate the Malware.mp4 |
59.41MB |
009 - Scanning Parameters and Criteria.mp4 |
45.36MB |
009 - Securing Network Devices.mp4 |
42.53MB |
009 - Security Standards.mp4 |
68.56MB |
009 - Something You Know.mp4 |
54.28MB |
009 - SQL Injection Mitigation.mp4 |
16.77MB |
009 - Users and Groups.mp4 |
72.95MB |
010 - Attack Simulators Explained.mp4 |
263.34MB |
010 - Authentication.mp4 |
27.49MB |
010 - AWS DLP Hands-On.mp4 |
8.69MB |
010 - Buffer Overflow Mitigation.mp4 |
26.56MB |
010 - Change and Configuration Management.mp4 |
33.07MB |
010 - Credential Management Exploitation.mp4 |
13.01MB |
010 - Digital Evidence and Legal Issues h.mp4 |
121.24MB |
010 - Inside the Container.mp4 |
231.52MB |
010 - IT Security Governance.mp4 |
213.47MB |
010 - Network Topologies.mp4 |
145.84MB |
010 - Notebook Hardware Components.mp4 |
100.26MB |
010 - Privilege Escalation.mp4 |
57.57MB |
010 - RAM and Active Memory.mp4 |
65.24MB |
010 - Review Existing Security.mp4 |
69.76MB |
010 - Scanning Special Considerations.mp4 |
37.62MB |
010 - Secure Software Development.mp4 |
37.91MB |
010 - Security Models Part 1.mp4 |
67.94MB |
010 - Something You Have.mp4 |
76.64MB |
010 - Tools of the Trade.mp4 |
121.13MB |
010 - Virtualization Basics.mp4 |
56.95MB |
010 - Why Asset Classification is Important.mp4 |
73.72MB |
011 - Authorization.mp4 |
43.46MB |
011 - AWS Cloud Storage.mp4 |
14.51MB |
011 - Coaxial Cabling.mp4 |
69.97MB |
011 - Credential Management Demo.mp4 |
16.57MB |
011 - Cross-Site Scripting Mitigation.mp4 |
9.42MB |
011 - Digital Evidence and Legal Issues i.mp4 |
122.40MB |
011 - Hardware Security.mp4 |
54.48MB |
011 - Industry Trends and Effects on Enterprise.mp4 |
53.78MB |
011 - Insurance for Cybersecurity.mp4 |
67.39MB |
011 - Motherboards.mp4 |
39.51MB |
011 - Network Cable and Connector Types.mp4 |
44.01MB |
011 - Network Troubleshooting Theory.mp4 |
64.93MB |
011 - OSINT against AWS Walkthrough.mp4 |
103.13MB |
011 - Outside the Container.mp4 |
250.88MB |
011 - Review Cyber Threat Hunting Techniques.mp4 |
14.46MB |
011 - Security Models Part 2.mp4 |
84.49MB |
011 - Security Policies.mp4 |
218.54MB |
011 - Something You Are (Biometrics).mp4 |
65.83MB |
011 - SSL and TLS.mp4 |
44.12MB |
011 - Testing Strategies.mp4 |
5.80MB |
011 - Troubleshooting Theory.mp4 |
187.21MB |
011 - Validation.mp4 |
25.41MB |
011 - Viewing File Permissions.mp4 |
26.67MB |
012 - AWS Cloud Storage Hands-On.mp4 |
7.75MB |
012 - Cross-Site Scripting Vulnerabilities.mp4 |
6.72MB |
012 - Cryptographic Concepts.mp4 |
29.46MB |
012 - Cyber Threat Hunting Project Walkthrough.mp4 |
38.18MB |
012 - Data Analysis.mp4 |
45.66MB |
012 - Digital Evidence and Legal Issues j.mp4 |
156.73MB |
012 - Frameworks.mp4 |
220.57MB |
012 - Handling Errors Properly.mp4 |
11.66MB |
012 - IA and Security Community.mp4 |
49.06MB |
012 - Introduction to Routers.mp4 |
155.35MB |
012 - Power Supplies.mp4 |
30.67MB |
012 - Primary PC Components.mp4 |
74.71MB |
012 - Remediation and Mitigation.mp4 |
52.06MB |
012 - Remote Access Security.mp4 |
54.89MB |
012 - Reproducible Builds.mp4 |
189.43MB |
012 - Risk Assessment.mp4 |
213.02MB |
012 - Security Models Part 3.mp4 |
70.57MB |
012 - Storage Devices.mp4 |
86.85MB |
012 - Twisted Pair Cabling.mp4 |
71.28MB |
012 - User Environment Configuration Overview.mp4 |
4.80MB |
012 - White Box Support Resources.mp4 |
11.53MB |
013 - Ask Me Anything about System Hardware.mp4 |
86.64MB |
013 - Authorization.mp4 |
43.46MB |
013 - AWS IAM.mp4 |
12.33MB |
013 - Cat Ratings.mp4 |
82.66MB |
013 - Change Management.mp4 |
53.88MB |
013 - Cross-Site Scripting Exploitation.mp4 |
12.58MB |
013 - Digital Evidence and Legal Issues k.mp4 |
138.91MB |
013 - External Connections.mp4 |
166.95MB |
013 - Graphics Information.mp4 |
89.01MB |
013 - Impact Analysis.mp4 |
32.85MB |
013 - Implement Security Activities Through the Technology Life Cycle.mp4 |
50.01MB |
013 - Industry Trends and Effects on Enterprise.mp4 |
53.78MB |
013 - Inhibitors to Remediation.mp4 |
48.74MB |
013 - Managing Credentials Properly.mp4 |
25.36MB |
013 - Public vs Internal Image Repositories.mp4 |
136.47MB |
013 - Quantitative Risk Calculations.mp4 |
156.42MB |
013 - Security Awareness Training for Cybersecurity.mp4 |
67.33MB |
013 - Security Modes.mp4 |
30.90MB |
013 - Standards and Best Practices.mp4 |
20.25MB |
013 - Teardown of Project Artifacts Walkthrough.mp4 |
86.61MB |
013 - Types of Assessments.mp4 |
9.74MB |
013 - Virtualization.mp4 |
80.19MB |
014 - AWS IAM Hands-On.mp4 |
9.09MB |
014 - Business Impact Analysis.mp4 |
312.31MB |
014 - Collective Tools.mp4 |
42.27MB |
014 - Contingency Planning.mp4 |
83.62MB |
014 - Cross-Site Scripting Demo.mp4 |
7.22MB |
014 - End to End Ownership.mp4 |
63.67MB |
014 - Evaluation Models.mp4 |
52.42MB |
014 - Fiber Optic Cabling.mp4 |
66.18MB |
014 - Hardening the Build Infrastructure.mp4 |
150.63MB |
014 - Inside the PC.mp4 |
166.93MB |
014 - Introduction to Azure.mp4 |
8.99MB |
014 - Investigations a.mp4 |
128.28MB |
014 - Package Management.mp4 |
81.36MB |
014 - Ports and Connectors.mp4 |
37.68MB |
014 - Risk and Control for Social Media.mp4 |
63.39MB |
014 - Secure Network Topologies.mp4 |
43.06MB |
014 - Security Activities Throughout the Technology Life Cycle.mp4 |
50.01MB |
014 - Session Management and Accountability.mp4 |
34.26MB |
014 - Threat Actors.mp4 |
13.11MB |
014 - Troubleshooting Methodology.mp4 |
88.68MB |
014 - Web App Scanners, Part 1.mp4 |
35.50MB |
015 - Assessing Third-Party Risk.mp4 |
165.27MB |
015 - AWS Infrastructure Security.mp4 |
12.26MB |
015 - Cyber Threat Hunting Hints.mp4 |
6.75MB |
015 - Facilitate Collaboration Across Business Units.mp4 |
82.51MB |
015 - Fire Ratings.mp4 |
78.99MB |
015 - General Use of IO Devices.mp4 |
48.53MB |
015 - Investigations b.mp4 |
136.65MB |
015 - Iron vs VM vs Cloud Providers.mp4 |
253.24MB |
015 - Managing Libraries.mp4 |
30.43MB |
015 - Organizing Data.mp4 |
262.50MB |
015 - Patch Management.mp4 |
24.46MB |
015 - Permissions.mp4 |
34.97MB |
015 - Poor Error Handling.mp4 |
12.91MB |
015 - Rainbow Series.mp4 |
27.31MB |
015 - System Monitoring.mp4 |
65.71MB |
015 - Target Selection.mp4 |
8.17MB |
015 - Troubleshooting Core System Elements.mp4 |
95.78MB |
015 - Web App Scanners, Part 2.mp4 |
16.56MB |
015 - What is a Computer.mp4 |
123.78MB |
015 - WLAN Authentication.mp4 |
92.98MB |
016 - Ask Me Anything About IO, Ports and Peripherals.mp4 |
93.36MB |
016 - AWS Infrastructure Security Hands-On.mp4 |
9.82MB |
016 - Common Criteria.mp4 |
54.94MB |
016 - Disk Usage.mp4 |
107.75MB |
016 - Exploiting Poor Error Handling.mp4 |
5.75MB |
016 - Host Hardening.mp4 |
61.91MB |
016 - Immutable Containers.mp4 |
226.59MB |
016 - Investigations c.mp4 |
146.62MB |
016 - Legacy Network Connections.mp4 |
93.26MB |
016 - Measuring Performance Controls.mp4 |
84.52MB |
016 - Network Security Device Types.mp4 |
37.99MB |
016 - Remote Authentication Services.mp4 |
41.08MB |
016 - Scanning.mp4 |
21.97MB |
016 - Security Training.mp4 |
204.78MB |
016 - Telnet and SSH.mp4 |
57.42MB |
016 - Threat Hunting and Hypothesis.mp4 |
46.61MB |
016 - Troubleshooting the Physical Network.mp4 |
88.95MB |
016 - What is an Operating System.mp4 |
115.45MB |
016 - Whitelisting and Other Scoping Considerations.mp4 |
12.00MB |
017 - Attacking Azure Targets walkthrough.mp4 |
240.09MB |
017 - AWS Network Security.mp4 |
13.15MB |
017 - Basics of Binary.mp4 |
41.84MB |
017 - Certification and Accreditation.mp4 |
29.89MB |
017 - Configuring and Executing Scans.mp4 |
23.90MB |
017 - Devices.mp4 |
95.78MB |
017 - Federated Identity.mp4 |
51.14MB |
017 - Investigations d.mp4 |
72.96MB |
017 - Live Scanning.mp4 |
135.09MB |
017 - Network Security Component Management.mp4 |
86.19MB |
017 - Poor Error Handling Demo.mp4 |
5.57MB |
017 - Security Operations Center (SOC) Definitions and Concepts.mp4 |
255.18MB |
017 - Standard Business Documentation.mp4 |
38.56MB |
017 - Third-Party Agreements.mp4 |
198.96MB |
017 - Troubleshooting the Logical Network.mp4 |
108.46MB |
017 - Users and Super Users.mp4 |
63.27MB |
017 - Virtualization Technologies.mp4 |
50.49MB |
017 - What is Ethernet.mp4 |
59.53MB |
017 - Workflow and Scripting.mp4 |
50.90MB |
018 - Analyze Network-Enabled Devices.mp4 |
97.22MB |
018 - AWS Network Security Hands-On.mp4 |
7.94MB |
018 - Baselines and Anomaly Detection.mp4 |
255.80MB |
018 - Cross-Site Request Forgery Vulnerabilities.mp4 |
7.56MB |
018 - Ethernet Frames.mp4 |
80.29MB |
018 - Incident Response Process.mp4 |
30.50MB |
018 - Integrating Identity Services.mp4 |
37.68MB |
018 - Introduction to Information Gathering and Vulnerability Identification.mp4 |
4.78MB |
018 - Investigations e.mp4 |
88.36MB |
018 - Management of Threats and Vulnerabilities.mp4 |
274.95MB |
018 - Preventative Tools, Part 1.mp4 |
87.59MB |
018 - Remote Connectivity.mp4 |
25.54MB |
018 - Secure SDLC.mp4 |
66.50MB |
018 - Static Environments.mp4 |
45.22MB |
018 - Storage Technologies.mp4 |
48.81MB |
018 - Virtual File Systems.mp4 |
31.37MB |
018 - Why Windows.mp4 |
90.91MB |
019 - Access Control Models.mp4 |
71.03MB |
019 - Analyze Advanced Network Design.mp4 |
77.26MB |
019 - AWS Application Security.mp4 |
8.24MB |
019 - Azure Run walkthrough.mp4 |
121.86MB |
019 - Cross-Site Request Forgery Exploitation.mp4 |
8.29MB |
019 - Cryptography Basics.mp4 |
442.99MB |
019 - Digital Forensics.mp4 |
48.93MB |
019 - Early Ethernet.mp4 |
76.45MB |
019 - Identity and Access Management.mp4 |
184.57MB |
019 - Information Gathering Techniques.mp4 |
19.47MB |
019 - Introduction to Kubernetes.mp4 |
321.74MB |
019 - Investigations f.mp4 |
132.57MB |
019 - Mass Storage Variation.mp4 |
35.43MB |
019 - Physical Security.mp4 |
75.51MB |
019 - Preventative Tools, Part 2.mp4 |
33.88MB |
019 - Processes.mp4 |
62.35MB |
019 - Software Development Models.mp4 |
107.93MB |
019 - Web Application Attacks and Countermeasures.mp4 |
86.19MB |
019 - Windows Editions and Versions.mp4 |
113.68MB |
020 - Access Control Techniques.mp4 |
48.12MB |
020 - Ask Me Anything About Data Storage and Sharing.mp4 |
85.17MB |
020 - Authentication, Authorization, and Accounting.mp4 |
51.37MB |
020 - AWS Disaster Recovery.mp4 |
5.16MB |
020 - Business Impact Analysis.mp4 |
34.76MB |
020 - Configuration Management and Asset Management.mp4 |
148.11MB |
020 - Contingecy Planning.mp4 |
68.55MB |
020 - Cross-Site Request Forgery Demo.mp4 |
5.40MB |
020 - Cryptographic Methods.mp4 |
195.56MB |
020 - Information Gathering Techniques Demonstration.mp4 |
35.29MB |
020 - Investigations g.mp4 |
152.85MB |
020 - Kubernetes Cluster, API and etcd.mp4 |
290.82MB |
020 - Maturity Models.mp4 |
56.79MB |
020 - Network Security Control Topics.mp4 |
73.69MB |
020 - Processes Priority and Execution.mp4 |
59.26MB |
020 - The Daddy of Ethernet 10BaseT.mp4 |
28.51MB |
020 - Touring the macOS.mp4 |
63.85MB |
020 - Vulnerability Scanning.mp4 |
40.50MB |
021 - Access Control Administration.mp4 |
29.50MB |
021 - Access Controls.mp4 |
51.36MB |
021 - AWS Security Summary.mp4 |
7.78MB |
021 - Change Control.mp4 |
58.50MB |
021 - Configure Controls for Network Security.mp4 |
61.67MB |
021 - Frameworks.mp4 |
39.00MB |
021 - Investigations h.mp4 |
122.49MB |
021 - Kernels.mp4 |
94.66MB |
021 - Kubernetes Nodes, Pods and kublet.mp4 |
213.86MB |
021 - Managing Change.mp4 |
120.89MB |
021 - Operating System Functions.mp4 |
44.72MB |
021 - OSINT against Azure walkthrough.mp4 |
79.25MB |
021 - Reverse Engineering.mp4 |
33.37MB |
021 - Scanning and Enumeration.mp4 |
9.08MB |
021 - Site Layout and Access Security.mp4 |
67.98MB |
021 - Symmetric Cryptosystems.mp4 |
300.73MB |
021 - Terminating Twisted Pair.mp4 |
197.29MB |
021 - Touring Linux.mp4 |
96.35MB |
022 - Access Control Attacks.mp4 |
54.84MB |
022 - AWS Project Walkthrough.mp4 |
6.52MB |
022 - Enumeration.mp4 |
30.98MB |
022 - Hubs vs. Switches.mp4 |
181.19MB |
022 - Indentification and Authentication.mp4 |
25.80MB |
022 - Investigations i.mp4 |
119.78MB |
022 - Kubernetes Services, Labes and Namespaces.mp4 |
261.91MB |
022 - Mitigating Network Threats.mp4 |
45.77MB |
022 - Operating System Interfaces.mp4 |
38.23MB |
022 - Patch Management.mp4 |
131.44MB |
022 - Policies and Procedures.mp4 |
33.15MB |
022 - Scanning and Enumeration Demonstration.mp4 |
36.77MB |
022 - Select Host Hardware and Software.mp4 |
74.80MB |
022 - Software Testing.mp4 |
94.80MB |
022 - Symmetric Block Modes.mp4 |
203.94MB |
022 - Tape Archive Files.mp4 |
78.42MB |
022 - What is a CPU.mp4 |
137.94MB |
023 - 100BaseT.mp4 |
69.30MB |
023 - Ask Me Anything About Understanding OSes.mp4 |
55.42MB |
023 - Authorization and Accounting.mp4 |
13.85MB |
023 - AWS Project Hint 1.mp4 |
4.07MB |
023 - Considerations for Network Security.mp4 |
280.13MB |
023 - CPU Speeds and Cores.mp4 |
133.63MB |
023 - Fingerprinting.mp4 |
8.33MB |
023 - Harden Hosts.mp4 |
71.76MB |
023 - Hardening Devices.mp4 |
179.86MB |
023 - Investigations j.mp4 |
105.50MB |
023 - Kubernetes and Networking.mp4 |
152.93MB |
023 - RSA Cryptosystems.mp4 |
271.95MB |
023 - Scheduling Tasks.mp4 |
73.58MB |
023 - Social Engineering.mp4 |
55.65MB |
023 - Software Environment.mp4 |
87.22MB |
023 - Teardown of Lab Environment walkthrough.mp4 |
28.76MB |
023 - Wireless Assessment Tools.mp4 |
32.69MB |
024 - Authentication Products and Protocols.mp4 |
38.73MB |
024 - AWS Project Hint 2.mp4 |
2.28MB |
024 - Building and Deploying a Secure Authorization Process.mp4 |
117.18MB |
024 - Caching.mp4 |
78.94MB |
024 - Circumventing Access Controls.mp4 |
23.39MB |
024 - Cloud Assessment Tools.mp4 |
16.40MB |
024 - Connecting Switches.mp4 |
57.05MB |
024 - Cryptographic Inspection.mp4 |
2.61MB |
024 - Diffie-Hellman.mp4 |
157.76MB |
024 - Investigations k.mp4 |
166.74MB |
024 - Kubernetes Security Design.mp4 |
188.11MB |
024 - Object-Oriented Programming (OOP).mp4 |
45.58MB |
024 - Preparing the Work Area.mp4 |
21.12MB |
024 - Protect Boot Loaders.mp4 |
27.33MB |
024 - SNMP.mp4 |
79.87MB |
024 - System Monitoring.mp4 |
50.86MB |
025 - 32-Bit vs. 64-Bit Processing.mp4 |
121.16MB |
025 - Access Provisioning.mp4 |
66.36MB |
025 - AWS Project Hint 3.mp4 |
3.32MB |
025 - Directory Services.mp4 |
31.37MB |
025 - Distributed Computing.mp4 |
38.25MB |
025 - Eavesdropping.mp4 |
5.80MB |
025 - Gigabit Ethernet and 10-Gigabit Ethernet.mp4 |
67.07MB |
025 - Investigations l.mp4 |
104.79MB |
025 - Kubernetes Authentication and Authorization.mp4 |
210.08MB |
025 - Managing Incidents.mp4 |
287.90MB |
025 - Mobile and IoT.mp4 |
67.22MB |
025 - PGPGPG.mp4 |
256.97MB |
025 - Setting up a Desktop PC.mp4 |
16.01MB |
025 - Storage Types.mp4 |
70.15MB |
025 - Troubleshooting Structured Cabling.mp4 |
35.79MB |
025 - Viewing and Using Ports.mp4 |
16.71MB |
026 - AWS Project Hint 4.mp4 |
1.25MB |
026 - Character Based Names.mp4 |
80.89MB |
026 - Completing PC Setup.mp4 |
25.66MB |
026 - CPU Sockets.mp4 |
187.51MB |
026 - Decompiling and Debugging.mp4 |
5.77MB |
026 - Embedded and Firmware Systems.mp4 |
61.87MB |
026 - Firewalls.mp4 |
74.75MB |
026 - Hashing.mp4 |
170.87MB |
026 - Investigations m.mp4 |
169.95MB |
026 - Kublet Security and Managing Secrets.mp4 |
241.26MB |
026 - Mobile Code.mp4 |
48.24MB |
026 - Predicting Hardware Failure.mp4 |
39.36MB |
026 - Privilege Policies.mp4 |
26.83MB |
026 - Protection for User Endpoints.mp4 |
56.73MB |
026 - Storage Protocols.mp4 |
83.68MB |
026 - Transcievers.mp4 |
94.27MB |
027 - Access and Vehicles Risk.mp4 |
53.80MB |
027 - Account Management.mp4 |
82.48MB |
027 - Acquired Software.mp4 |
34.24MB |
027 - Ask Me Anything About Setting up and Configuring a PC.mp4 |
92.97MB |
027 - Azure Security Course Overview.mp4 |
4.27MB |
027 - Computer Forensics Tools and Hardware.mp4 |
160.69MB |
027 - Connecting Ethernet Scenarios.mp4 |
198.18MB |
027 - DMZ.mp4 |
80.99MB |
027 - HMAC.mp4 |
99.53MB |
027 - Implement Secure Storage Controls.mp4 |
73.76MB |
027 - Installing a CPU.mp4 |
199.98MB |
027 - Introduction to Wireshark.mp4 |
93.90MB |
027 - Kubernetes Pod, Network Policies and 3rd Party Integrations.mp4 |
229.65MB |
027 - Networks.mp4 |
43.19MB |
027 - Open Source Intelligence.mp4 |
12.69MB |
027 - Security in Applications.mp4 |
192.26MB |
028 - Application Attacks.mp4 |
80.68MB |
028 - Aspects of Hard Drives a.mp4 |
140.26MB |
028 - Automation and Control Risk.mp4 |
70.36MB |
028 - Azure Data Encryption.mp4 |
12.49MB |
028 - BCM-DRP-BRP.mp4 |
86.92MB |
028 - Honeypots.mp4 |
42.44MB |
028 - Identify General Application Vulnerabilities.mp4 |
86.90MB |
028 - Introduction to Netstat.mp4 |
41.38MB |
028 - Introduction to Structured Cabling.mp4 |
43.83MB |
028 - Kubernetes Logging and Auditing.mp4 |
220.01MB |
028 - Liquid Cooling.mp4 |
24.37MB |
028 - Network File Resources.mp4 |
71.80MB |
028 - Personalizing a Tablet.mp4 |
79.61MB |
028 - Steganography.mp4 |
143.43MB |
028 - Types of Security Policies.mp4 |
56.87MB |
029 - Ask Me Anything About Mobile Devices Part 1.mp4 |
89.76MB |
029 - Aspects of Hard Drives b.mp4 |
122.27MB |
029 - Azure Data Encryption - Hands-On.mp4 |
17.02MB |
029 - Business Continuity Concepts.mp4 |
39.19MB |
029 - Certificates and Trust.mp4 |
373.80MB |
029 - Cloud Models.mp4 |
42.94MB |
029 - Compliance.mp4 |
115.30MB |
029 - Endpoint Security.mp4 |
24.66MB |
029 - Identify Web Application Vulnerabilities.mp4 |
106.55MB |
029 - Malware.mp4 |
44.80MB |
029 - Managing NFS.mp4 |
56.57MB |
029 - Preventing Resource Exhaustion.mp4 |
226.66MB |
029 - RAM Technology.mp4 |
133.61MB |
029 - Terminating Structured Cabling.mp4 |
112.69MB |
029 - Vulnerability Scanning.mp4 |
17.07MB |
030 - Accessibility.mp4 |
69.14MB |
030 - Application Security Design.mp4 |
42.71MB |
030 - Ask Me Anything About Mobile Devices Part 2.mp4 |
87.61MB |
030 - Aspects of Hard Drives c.mp4 |
120.69MB |
030 - Azure DLP.mp4 |
10.44MB |
030 - Cryptography.mp4 |
130.04MB |
030 - Equipment Room.mp4 |
87.85MB |
030 - Helm, and Application Deployment.mp4 |
266.98MB |
030 - IDS.mp4 |
67.72MB |
030 - Public Key Infrastructure.mp4 |
537.66MB |
030 - RAM Capacity.mp4 |
119.73MB |
030 - Remote Service Invocation (FaaS, IaC, API).mp4 |
44.67MB |
030 - Risk Assessment and Mitigation.mp4 |
54.87MB |
030 - Scanning Considerations.mp4 |
10.19MB |
030 - VPN and VLAN.mp4 |
61.47MB |
031 - Alternative Distribution Panels.mp4 |
67.63MB |
031 - Application and Container Scans.mp4 |
5.07MB |
031 - Aspects of Hard Drives d.mp4 |
188.86MB |
031 - Authentication Protocols.mp4 |
29.86MB |
031 - Azure Cloud Storage.mp4 |
7.73MB |
031 - Cloud Vulnerabilities.mp4 |
33.84MB |
031 - Cryptographic Attacks.mp4 |
625.86MB |
031 - File Management Tools.mp4 |
9.31MB |
031 - Firewall and Network Security.mp4 |
213.37MB |
031 - Implement Application Security Controls.mp4 |
123.91MB |
031 - Incident Response Procedures.mp4 |
62.76MB |
031 - Localization.mp4 |
84.87MB |
031 - Master Hardening.mp4 |
153.83MB |
031 - RAM Features.mp4 |
99.54MB |
032 - Analyzing Vulnerability Scans.mp4 |
13.05MB |
032 - Azure IAM.mp4 |
15.14MB |
032 - Distributed and Cloud Computing.mp4 |
60.19MB |
032 - File Manipulation.mp4 |
34.55MB |
032 - File Systems a.mp4 |
110.83MB |
032 - Forensic Procedures.mp4 |
46.10MB |
032 - Identification.mp4 |
334.26MB |
032 - Injection and Overflow Attacks.mp4 |
52.07MB |
032 - Installing RAM.mp4 |
116.94MB |
032 - Log Management Using SIEM.mp4 |
139.32MB |
032 - Node Hardening.mp4 |
186.40MB |
032 - OSI Protocols.mp4 |
70.69MB |
032 - Select Vulnerability Assessment Methods.mp4 |
122.85MB |
032 - System Security.mp4 |
83.09MB |
032 - Testing Cable.mp4 |
93.23MB |
033 - Authentication Attacks.mp4 |
44.24MB |
033 - Authorization Concepts.mp4 |
153.67MB |
033 - Azure IAM Hands-On.mp4 |
25.40MB |
033 - Backups.mp4 |
27.34MB |
033 - File Systems b.mp4 |
115.64MB |
033 - Network Security.mp4 |
75.77MB |
033 - Pod Security and Availability.mp4 |
242.92MB |
033 - Security Controls.mp4 |
34.19MB |
033 - Select Vulnerability Assessment Tools.mp4 |
57.42MB |
033 - Troubleshooting Structured Cabling (Part 1).mp4 |
35.79MB |
033 - Virtualization.mp4 |
76.57MB |
033 - Virtual Memory.mp4 |
52.56MB |
033 - Wireless Considerations.mp4 |
213.02MB |
034 - Access Control List.mp4 |
118.29MB |
034 - Ask Me Anything About Managing Files.mp4 |
89.97MB |
034 - Azure Disaster Recovery.mp4 |
21.58MB |
034 - Considerations for Cloud Computing.mp4 |
219.38MB |
034 - Data Handling.mp4 |
77.54MB |
034 - Design Systems to Facilitate Incident Response.mp4 |
51.14MB |
034 - Exploits.mp4 |
33.83MB |
034 - File Systems c.mp4 |
108.93MB |
034 - Leveraging Information for Exploit.mp4 |
6.49MB |
034 - Monitoring the Cluster for Attacks.mp4 |
200.77MB |
034 - OSI Layers.mp4 |
88.81MB |
034 - Troubleshooting Structured Cabling (Part 2).mp4 |
48.60MB |
034 - Virtualized Networks.mp4 |
52.07MB |
034 - Web Services.mp4 |
78.13MB |
034 - What is BIOS.mp4 |
85.54MB |
035 - Application Vulnerabilities, Part 1.mp4 |
52.24MB |
035 - Azure Disaster Recovery Hands-On.mp4 |
17.34MB |
035 - Common Attack Techniques.mp4 |
10.94MB |
035 - Conduct Incident and Emergency Responses.mp4 |
88.93MB |
035 - Facility Design.mp4 |
63.75MB |
035 - File Systems d.mp4 |
181.65MB |
035 - Mobile Computing Issues.mp4 |
218.58MB |
035 - MySQL.mp4 |
65.49MB |
035 - Password Security.mp4 |
239.48MB |
035 - POST.mp4 |
127.26MB |
035 - Securing the Cluster from the External Network.mp4 |
171.93MB |
035 - Symmetric Encryption.mp4 |
28.93MB |
035 - Using a Toner and Probe.mp4 |
25.63MB |
035 - Walking Survey of Applications.mp4 |
54.59MB |
036 - Application Vulnerabilities, Part 2.mp4 |
47.00MB |
036 - Asymmetric Encryption.mp4 |
41.78MB |
036 - Azure Infrastructure Security.mp4 |
10.46MB |
036 - Facility Construction.mp4 |
36.23MB |
036 - File and Operating System Forensics a.mp4 |
154.04MB |
036 - FTP Services.mp4 |
71.46MB |
036 - Implement Security Standards in the Enterprise.mp4 |
68.56MB |
036 - Integration with CICD Systems.mp4 |
225.20MB |
036 - IoT.mp4 |
125.88MB |
036 - Linux File Permissions.mp4 |
364.78MB |
036 - Managing Applications.mp4 |
27.00MB |
036 - System Setup.mp4 |
90.79MB |
036 - TCPIP Model.mp4 |
45.84MB |
036 - Weaknesses in Specialized Systems.mp4 |
17.59MB |
036 - Wired Connection Scenarios.mp4 |
135.99MB |
037 - Applications and Extensions.mp4 |
30.62MB |
037 - Azure Network Security.mp4 |
9.86MB |
037 - Configuring E-Mail.mp4 |
81.70MB |
037 - Cryptographic Hash Functions.mp4 |
20.94MB |
037 - File and Operating System Forensics b.mp4 |
134.78MB |
037 - Introduction to IP Addressing and Binary.mp4 |
134.74MB |
037 - Network Architecture and Asset Management.mp4 |
56.77MB |
037 - Network Devices.mp4 |
96.51MB |
037 - Perimeter Defenses.mp4 |
100.98MB |
037 - Secure the Design of the Enterprise Infrastructure.mp4 |
51.54MB |
037 - Troubleshooting Firmware.mp4 |
135.05MB |
037 - Virtualization.mp4 |
176.61MB |
037 - Windows File Permissions.mp4 |
353.79MB |
038 - Ask Me Anything About Working with Applications.mp4 |
79.58MB |
038 - Attacks and Exploits Overview.mp4 |
3.56MB |
038 - Azure Application Security.mp4 |
8.14MB |
038 - Doors and Locks.mp4 |
70.68MB |
038 - File and Operating System Forensics c.mp4 |
112.25MB |
038 - Form Factors.mp4 |
112.33MB |
038 - Industrial Control Systems.mp4 |
177.20MB |
038 - Introduction to ARP.mp4 |
26.49MB |
038 - Network Security.mp4 |
49.75MB |
038 - Network Troubleshooting.mp4 |
66.48MB |
038 - PKI and Certificates.mp4 |
44.15MB |
038 - Protecting Your Territory.mp4 |
27.61MB |
038 - Secure Enterprise Application Integration Enablers.mp4 |
122.23MB |
038 - User Account Management.mp4 |
177.95MB |
039 - AAA.mp4 |
212.57MB |
039 - Azure Security Summary.mp4 |
10.38MB |
039 - Chipsets.mp4 |
79.79MB |
039 - File and Operating System Forensics d.mp4 |
170.14MB |
039 - Identity and Access Management.mp4 |
84.38MB |
039 - Internal Facilities Security.mp4 |
117.72MB |
039 - IP Networking.mp4 |
116.81MB |
039 - PKI Architecture.mp4 |
32.34MB |
039 - Social Engineering Attack Methods.mp4 |
20.80MB |
039 - Subnet Masks.mp4 |
115.69MB |
039 - Text Stream Utilities.mp4 |
36.00MB |
039 - Virtualize Technologies.mp4 |
87.20MB |
039 - Wi-Fi Setup.mp4 |
24.52MB |
040 - Authentication Methods.mp4 |
258.88MB |
040 - Azure Project Walkthrough.mp4 |
8.48MB |
040 - Classful Addressing.mp4 |
90.96MB |
040 - Encryption and Active Defense.mp4 |
59.61MB |
040 - File and Operating System Forensics e.mp4 |
84.29MB |
040 - Going High Speed.mp4 |
31.02MB |
040 - Implement Cloud Augmented Security Services.mp4 |
47.70MB |
040 - Physical Intrusion Detection.mp4 |
107.72MB |
040 - Social Engineering Motivation Factors.mp4 |
11.43MB |
040 - Touring the Motherboard.mp4 |
248.63MB |
041 - Azure Hint 1.mp4 |
4.97MB |
041 - Deployment Models and the Cloud.mp4 |
74.47MB |
041 - DNS and DHCP.mp4 |
79.52MB |
041 - File and Operating System Forensics f.mp4 |
135.91MB |
041 - Personnel Safety.mp4 |
33.40MB |
041 - Physical Security Attacks.mp4 |
9.04MB |
041 - Platforms.mp4 |
52.11MB |
041 - Setting Up and Sharing Printers.mp4 |
31.57MB |
041 - Single Sign-On.mp4 |
263.12MB |
041 - Subnetting with CIDR.mp4 |
92.23MB |
041 - Touring the Case.mp4 |
101.20MB |
042 - ARP.mp4 |
32.60MB |
042 - Ask Me Anything About Networks and Internet Connectivity Part 1.mp4 |
84.14MB |
042 - Azure Hint 2.mp4 |
4.31MB |
042 - Deployment Models and Virtualization-segmentation.mp4 |
69.36MB |
042 - File and Operating System Forensics g.mp4 |
80.81MB |
042 - Installing a Motherboard.mp4 |
154.34MB |
042 - Media Storage.mp4 |
33.24MB |
042 - More CIDR Subnetting Practice.mp4 |
89.25MB |
042 - OS Utilities, Part 1.mp4 |
382.07MB |
042 - SOA and DevSecOps.mp4 |
65.70MB |
043 - Ask Me Anything About Networks and Internet Connectivity Part 2.mp4 |
56.27MB |
043 - Authentication.mp4 |
27.49MB |
043 - Azure Hint 3.mp4 |
5.25MB |
043 - Dynamic and Static IP Addressing.mp4 |
102.36MB |
043 - Multi-layer Protocols.mp4 |
44.73MB |
043 - Network-based Vulnerabilities.mp4 |
24.37MB |
043 - OS Utilities, Part 2.mp4 |
363.86MB |
043 - Secure Software Development.mp4 |
37.91MB |
043 - The Power Supply.mp4 |
149.51MB |
043 - Utilities and HVAC.mp4 |
95.57MB |
043 - Viruses and Malware.mp4 |
215.56MB |
044 - Authorization.mp4 |
43.46MB |
044 - Best Coding Practices.mp4 |
32.35MB |
044 - Converged Protocols.mp4 |
91.03MB |
044 - Email and Browser Forensics a.mp4 |
142.22MB |
044 - Fire Safety.mp4 |
86.40MB |
044 - GCP Security Course Overview.mp4 |
1.63MB |
044 - Mounting a Power Supply.mp4 |
143.11MB |
044 - Network Scanners.mp4 |
280.37MB |
044 - Physical Security.mp4 |
25.24MB |
044 - Rogue DHCP Servers.mp4 |
49.72MB |
044 - Wireless-based Vulnerabilities.mp4 |
15.72MB |
045 - Choosing a Power Supply.mp4 |
85.31MB |
045 - Dealing with Malware.mp4 |
24.49MB |
045 - Email and Browser Forensics b.mp4 |
102.14MB |
045 - GCP Data Encryption.mp4 |
17.65MB |
045 - Network Cabling and Topology.mp4 |
120.43MB |
045 - Network Security Device Types.mp4 |
37.99MB |
045 - Protocol Analyzers.mp4 |
282.64MB |
045 - Special IP Addresses.mp4 |
69.95MB |
045 - Trusted Hardware.mp4 |
71.37MB |
045 - Trust Models.mp4 |
71.13MB |
045 - Wireless Network Attack Demonstration.mp4 |
13.23MB |
046 - Application-based Vulnerabilities.mp4 |
64.32MB |
046 - Email and Browser Forensics c.mp4 |
154.56MB |
046 - GCP DLP.mp4 |
10.22MB |
046 - Hardware Encryption.mp4 |
32.54MB |
046 - Implement Advanced Identity Management.mp4 |
51.36MB |
046 - IP Addressing Scenarios.mp4 |
177.05MB |
046 - Network Security Component Management.mp4 |
86.19MB |
046 - Password Management.mp4 |
21.84MB |
046 - Power Protection.mp4 |
123.39MB |
046 - Signaling Types.mp4 |
40.90MB |
046 - SNMP.mp4 |
336.00MB |
047 - Analyze Network-Enabled Devices.mp4 |
97.22MB |
047 - Clickworthy.mp4 |
24.19MB |
047 - Cooling Your PC.mp4 |
166.34MB |
047 - Cryptographic Concepts.mp4 |
29.46MB |
047 - Email and Browser Forensics d.mp4 |
93.84MB |
047 - GCP Cloud Storage.mp4 |
1.51MB |
047 - Hardware Security.mp4 |
54.48MB |
047 - Introducing Routers.mp4 |
155.35MB |
047 - Logs.mp4 |
231.82MB |
047 - Network Attacks.mp4 |
100.89MB |
048 - Analyze Advanced Network Design.mp4 |
77.26MB |
048 - Data Analysis.mp4 |
45.66MB |
048 - Denial of Service.mp4 |
192.74MB |
048 - Email and Browser Forensics e.mp4 |
138.20MB |
048 - GCP IAM.mp4 |
10.58MB |
048 - Local Host Vulnerabilities.mp4 |
5.50MB |
048 - Perils of Public Internet.mp4 |
15.50MB |
048 - Switching.mp4 |
17.10MB |
048 - Troubleshooting Power Supplies.mp4 |
187.13MB |
048 - Trust in Cryptography.mp4 |
44.46MB |
048 - Understanding Ports.mp4 |
82.51MB |
049 - Ask Me Anything About IT Threat Mitigation Part 1.mp4 |
81.38MB |
049 - Cryptographic Design.mp4 |
49.48MB |
049 - Email and Browser Forensics f.mp4 |
136.48MB |
049 - Endpoint Security.mp4 |
54.15MB |
049 - GCP IAM Hands-On.mp4 |
10.55MB |
049 - Host Threats.mp4 |
237.23MB |
049 - Network Address Translation.mp4 |
70.02MB |
049 - Network Security Control Topics.mp4 |
73.69MB |
049 - Privilege Escalation (Linux).mp4 |
8.59MB |
049 - Troubleshooting Core Components.mp4 |
252.34MB |
049 - Wireless Networks.mp4 |
105.04MB |
050 - Ask Me Anything About IT Threat Mitigation Part 2.mp4 |
95.39MB |
050 - Configure Controls for Network Security.mp4 |
61.67MB |
050 - Cryptographic Techniques.mp4 |
41.87MB |
050 - Email and Browser Forensics g.mp4 |
161.72MB |
050 - GCP Infrastructure Security.mp4 |
25.49MB |
050 - Implementing NAT.mp4 |
15.32MB |
050 - Introduction to Mass Storage.mp4 |
127.84MB |
050 - Man-in-the-Middle.mp4 |
581.22MB |
050 - Mobile Systems.mp4 |
92.38MB |
050 - Privilege Escalation (Windows).mp4 |
20.66MB |
050 - Recon Results, Part 1.mp4 |
62.36MB |
051 - Digital Signatures and Code Signing.mp4 |
42.10MB |
051 - Email and Browser Forensics h.mp4 |
135.81MB |
051 - Forwarding Ports.mp4 |
185.60MB |
051 - GCP Infrastructure Security Hands-On.mp4 |
9.87MB |
051 - Magnetic Disk Drives.mp4 |
143.10MB |
051 - Power Management.mp4 |
7.40MB |
051 - Privilege Escalation Techniques.mp4 |
9.66MB |
051 - Recon Results, Part 2.mp4 |
26.50MB |
051 - Select Host Hardware and Software.mp4 |
74.80MB |
051 - System Resiliency.mp4 |
292.17MB |
051 - WAN Technologies.mp4 |
74.67MB |
052 - Choose Cryptographic Implementations.mp4 |
47.09MB |
052 - Cleaning and Maintaining Computers.mp4 |
27.62MB |
052 - Email and Browser Forensics i.mp4 |
97.35MB |
052 - GCP Network Security.mp4 |
14.28MB |
052 - Harden Hosts.mp4 |
71.76MB |
052 - Impact Analysis.mp4 |
32.85MB |
052 - Privilege Escalation Demo.mp4 |
28.28MB |
052 - RAID.mp4 |
250.11MB |
052 - Remote Access.mp4 |
61.03MB |
052 - Solid State Drives.mp4 |
123.61MB |
052 - Tour of a SOHO Router.mp4 |
61.21MB |
053 - Collective Tools.mp4 |
42.27MB |
053 - Email and Browser Forensics j.mp4 |
117.24MB |
053 - GCP Application Security.mp4 |
8.69MB |
053 - NAS and SAN.mp4 |
410.33MB |
053 - Protect Boot Loaders.mp4 |
27.33MB |
053 - SCSI.mp4 |
47.97MB |
053 - Secure Communication Protocols.mp4 |
81.76MB |
053 - SOHO vs. Enterprise.mp4 |
86.11MB |
053 - Trash it or Stash it.mp4 |
24.64MB |
054 - Ask Me Anything About Computer Maintenance and Management.mp4 |
128.99MB |
054 - Boot Order.mp4 |
72.37MB |
054 - GCP Disaster Recovery.mp4 |
6.87MB |
054 - Lateral Movement.mp4 |
17.96MB |
054 - Managing Data.mp4 |
100.95MB |
054 - OWASP Top Ten.mp4 |
257.95MB |
054 - Physical Hardening.mp4 |
194.29MB |
054 - Query Writing.mp4 |
41.00MB |
054 - Static Routes.mp4 |
123.00MB |
054 - Storage Types.mp4 |
70.15MB |
055 - Data Ownership.mp4 |
26.41MB |
055 - Dynamic Routing.mp4 |
107.17MB |
055 - E-mail Analysis, Part 1.mp4 |
60.87MB |
055 - GCP Security Summary.mp4 |
6.93MB |
055 - Network Forensics a.mp4 |
114.48MB |
055 - Persistence.mp4 |
12.23MB |
055 - RFI, EMI, and ESD.mp4 |
68.37MB |
055 - Storage Protocols.mp4 |
83.68MB |
055 - Troubleshooting 101.mp4 |
21.91MB |
055 - Understanding Partitioning.mp4 |
51.93MB |
056 - Ask Me Anything About Troubleshooting Computers Part 1.mp4 |
119.51MB |
056 - Covering Your Tracks.mp4 |
10.47MB |
056 - Data Security Controls.mp4 |
70.13MB |
056 - E-mail Analysis, Part 2.mp4 |
57.82MB |
056 - GCP Project Introduction.mp4 |
7.93MB |
056 - Host Hardening.mp4 |
424.00MB |
056 - Implement Secure Storage Controls.mp4 |
73.76MB |
056 - MBR Partitioning.mp4 |
98.76MB |
056 - Network Forensics b.mp4 |
136.80MB |
056 - RIP.mp4 |
38.82MB |
057 - Ask Me Anything About Troubleshooting Computers Part 2.mp4 |
118.68MB |
057 - Data and System Security.mp4 |
114.48MB |
057 - Data Remanence.mp4 |
57.99MB |
057 - GCP Project Hint 1.mp4 |
3.18MB |
057 - GPT Partitioning.mp4 |
69.36MB |
057 - Identify General Application Vulnerabilities.mp4 |
86.90MB |
057 - Network Forensics c.mp4 |
130.78MB |
057 - OSPF.mp4 |
32.50MB |
057 - Permissions.mp4 |
34.97MB |
057 - Persistence and Covering Tracks Demonstration.mp4 |
22.11MB |
058 - BGP.mp4 |
22.27MB |
058 - Data at Rest.mp4 |
89.29MB |
058 - Disk Encryption.mp4 |
176.94MB |
058 - Firewalls.mp4 |
38.80MB |
058 - GCP Project Hint 2.mp4 |
6.21MB |
058 - Identify Web Application Vulnerabilities.mp4 |
106.55MB |
058 - Introduction to Databases.mp4 |
39.92MB |
058 - Network Forensics d.mp4 |
133.57MB |
058 - Understanding File Systems.mp4 |
89.18MB |
059 - Application Security Design.mp4 |
42.71MB |
059 - Database Details.mp4 |
39.88MB |
059 - Data in Transit.mp4 |
66.77MB |
059 - GCP Project Hint 3.mp4 |
3.82MB |
059 - HardwareFirmware Security.mp4 |
242.64MB |
059 - Intrusion Prevention Rules.mp4 |
37.09MB |
059 - Network Forensics e.mp4 |
132.98MB |
059 - Pentesting Tools Introduction.mp4 |
4.88MB |
059 - Popular File Systems.mp4 |
99.54MB |
059 - TCP and UDP.mp4 |
76.54MB |
060 - Ask Me Anything about Databases.mp4 |
64.62MB |
060 - Classification.mp4 |
77.82MB |
060 - Cryptographic Hashing a.mp4 |
132.86MB |
060 - DLP and Endpoint Detection.mp4 |
36.78MB |
060 - Formatting in Action.mp4 |
79.26MB |
060 - ICMP and IGMP.mp4 |
61.33MB |
060 - Implement Application Security Controls.mp4 |
123.91MB |
060 - Nmap Usage.mp4 |
20.14MB |
060 - Secure OS Types.mp4 |
204.20MB |
061 - Architectural Concepts & Design Requirements.mp4 |
495.34MB |
061 - Cryptographic Hashing b.mp4 |
142.43MB |
061 - Dynamic Disks.mp4 |
87.40MB |
061 - Handy Tools.mp4 |
55.58MB |
061 - Introduction to Programming.mp4 |
35.13MB |
061 - Nmap Demonstration.mp4 |
165.39MB |
061 - Securing Peripherals.mp4 |
291.13MB |
061 - Security Assessment Goals.mp4 |
56.37MB |
061 - Threat Hunting and Hypothesis.mp4 |
46.61MB |
062 - Control Testing.mp4 |
69.54MB |
062 - Cryptographic Hashing c.mp4 |
133.84MB |
062 - Introduction to Wireshark.mp4 |
93.90MB |
062 - Legal and Compliance.mp4 |
228.25MB |
062 - Malware.mp4 |
268.65MB |
062 - New Installation - First Drive.mp4 |
44.67MB |
062 - Programming with a PBJ Sandwich.mp4 |
70.56MB |
062 - Threat Hunting Process.mp4 |
59.24MB |
063 - Analyzing Output.mp4 |
390.38MB |
063 - Ask Me Anything about Programming.mp4 |
38.36MB |
063 - Cryptographic Hashing d.mp4 |
111.50MB |
063 - Introduction to netstat.mp4 |
41.38MB |
063 - Operations.mp4 |
507.11MB |
063 - Penetration Testing.mp4 |
72.28MB |
063 - RAID.mp4 |
109.38MB |
063 - Results and Benefits.mp4 |
36.01MB |
063 - Use Cases for Tools.mp4 |
13.16MB |
064 - Cloud Platform and Infrastructure Security.mp4 |
308.39MB |
064 - Cryptographic Hashing e.mp4 |
120.33MB |
064 - Hardware RAID.mp4 |
46.46MB |
064 - IDS and IPS.mp4 |
118.22MB |
064 - Scanners.mp4 |
4.36MB |
064 - Security Management Processes.mp4 |
49.28MB |
064 - Web Servers.mp4 |
73.90MB |
064 - Workflow and Scripting.mp4 |
50.90MB |
065 - API and Malware Signature Creation.mp4 |
53.64MB |
065 - Automation Strategies.mp4 |
131.65MB |
065 - Cloud Data Security.mp4 |
286.83MB |
065 - Credential Testing Tools.mp4 |
14.77MB |
065 - Cryptographic Hashing f.mp4 |
137.31MB |
065 - FTP.mp4 |
60.36MB |
065 - Implement Security Standards in the Enterprise.mp4 |
68.56MB |
065 - Software RAID in Storage Spaces.mp4 |
80.07MB |
066 - Cloud Application Security.mp4 |
266.75MB |
066 - Cryptographic Hashing g.mp4 |
113.76MB |
066 - Data Destruction.mp4 |
128.87MB |
066 - Debuggers.mp4 |
6.33MB |
066 - Email Servers and Clients.mp4 |
62.10MB |
066 - Encrypting Mass Storage.mp4 |
94.48MB |
066 - Secure the Design of the Enterprise Infrastructure.mp4 |
51.54MB |
066 - Threat Feeds and Machine Learning.mp4 |
46.12MB |
067 - Anti-Forensics.mp4 |
241.35MB |
067 - LAN Review.mp4 |
203.21MB |
067 - Mass Storage Troubleshooting.mp4 |
104.57MB |
067 - Protocols, Standards, and Software Engineering.mp4 |
38.18MB |
067 - Secure Enterprise Application Integration Enablers.mp4 |
122.23MB |
067 - Securing Email.mp4 |
71.64MB |
067 - Software Assurance Tools.mp4 |
5.02MB |
068 - IR Roles and Responsibilities.mp4 |
21.35MB |
068 - Network Topologies Review.mp4 |
127.44MB |
068 - New and Emerging Technologies a.mp4 |
140.05MB |
068 - Optical Media.mp4 |
131.21MB |
068 - OSINT Tools.mp4 |
9.60MB |
068 - Telnet and SSH.mp4 |
57.42MB |
068 - Virtualize Technologies.mp4 |
87.20MB |
069 - Implement Cloud Augmented Security Services.mp4 |
47.70MB |
069 - IR Active Preparation.mp4 |
39.83MB |
069 - Network Time Protocol.mp4 |
13.35MB |
069 - Network Zone Review.mp4 |
238.72MB |
069 - New and Emerging Technologies b.mp4 |
137.50MB |
069 - USB Standards.mp4 |
147.95MB |
069 - Wireless Pentesting Tools.mp4 |
3.53MB |
070 - Deployment Models and the Cloud.mp4 |
74.47MB |
070 - Incident Response Process.mp4 |
30.50MB |
070 - Network Access Controls.mp4 |
251.76MB |
070 - Network Service Scenarios.mp4 |
112.17MB |
070 - New and Emerging Technologies c.mp4 |
110.37MB |
070 - Understanding USB.mp4 |
102.94MB |
070 - Web Proxies.mp4 |
3.19MB |
071 - Configuring USB.mp4 |
79.81MB |
071 - Deployment Models and Virtualization-segmentation.mp4 |
69.36MB |
071 - Network Symptoms.mp4 |
14.51MB |
071 - New and Emerging Technologies d.mp4 |
151.43MB |
071 - Social Engineering Tools.mp4 |
2.75MB |
071 - The Network Firewall.mp4 |
322.16MB |
071 - Understanding DNS.mp4 |
95.66MB |
072 - Applying DNS.mp4 |
193.29MB |
072 - Host Symptoms.mp4 |
32.22MB |
072 - New and Emerging Technologies e.mp4 |
114.44MB |
072 - Proxy Servers.mp4 |
330.06MB |
072 - Remote Access Tools.mp4 |
5.81MB |
072 - Thunder and Lightning.mp4 |
71.27MB |
072 - Trust Models.mp4 |
71.13MB |
073 - Application Symptoms.mp4 |
21.56MB |
073 - Honeypots.mp4 |
118.86MB |
073 - Implement Advanced Identity Management.mp4 |
51.36MB |
073 - Keyboards and Mice.mp4 |
109.34MB |
073 - Networking Tools.mp4 |
3.22MB |
073 - New and Emerging Technologies f.mp4 |
196.77MB |
073 - The HOSTs File.mp4 |
19.78MB |
074 - Cryptographic Concepts.mp4 |
29.46MB |
074 - Digital Forensics.mp4 |
48.93MB |
074 - Mobile Forensics a.mp4 |
139.30MB |
074 - Mobile Tools.mp4 |
4.13MB |
074 - Net Command.mp4 |
36.87MB |
074 - Sight and Sound.mp4 |
88.20MB |
074 - Virtual Private Networks.mp4 |
287.15MB |
075 - Exploitation Frameworks and Other Tools.mp4 |
10.25MB |
075 - IPSec.mp4 |
308.65MB |
075 - Mobile Forensics b.mp4 |
125.77MB |
075 - Readers and Scanners.mp4 |
99.40MB |
075 - Seizure and Acquisitions.mp4 |
21.61MB |
075 - Trust in Cryptography.mp4 |
44.46MB |
075 - Windows Name Resolution.mp4 |
82.73MB |
076 - Cryptographic Design.mp4 |
49.48MB |
076 - Dynamic DNS.mp4 |
39.31MB |
076 - Forensic Acquisition Tools.mp4 |
26.87MB |
076 - Mobile Forensics c.mp4 |
165.76MB |
076 - NIDSNIPS.mp4 |
158.51MB |
076 - Using Expansion Cards.mp4 |
99.31MB |
077 - Cryptographic Techniques.mp4 |
41.87MB |
077 - DNS Troubleshooting.mp4 |
85.31MB |
077 - Introduction to Programming.mp4 |
4.93MB |
077 - Mobile, Virtualization, and Cloud.mp4 |
42.73MB |
077 - Mobile Forensics d.mp4 |
174.36MB |
077 - SIEM (Security Information and Event Management).mp4 |
188.43MB |
077 - The Right PC for the Job.mp4 |
180.64MB |
078 - Boot from Everything.mp4 |
118.64MB |
078 - Digital Signatures and Code Signing.mp4 |
42.10MB |
078 - Forensics Analysis, Part 1.mp4 |
11.78MB |
078 - Making TCPIP Secure.mp4 |
53.55MB |
078 - Programming Concepts.mp4 |
38.74MB |
078 - Wireless Review.mp4 |
252.25MB |
079 - BASH Sample Script.mp4 |
7.15MB |
079 - Choose Cryptographic Implementations.mp4 |
47.09MB |
079 - Forensics Analysis, Part 2.mp4 |
27.22MB |
079 - Installing Windows.mp4 |
80.80MB |
079 - Living in Open Networks.mp4 |
254.40MB |
079 - Symmetric Encryption.mp4 |
45.32MB |
080 - Asymmetric Encryption.mp4 |
30.40MB |
080 - Enterprise Risk Management.mp4 |
38.80MB |
080 - Packet Capture.mp4 |
47.83MB |
080 - Post-Installation Tasks.mp4 |
103.18MB |
080 - Python Sample Script.mp4 |
6.48MB |
080 - Vulnerabilities with Wireless Access Points.mp4 |
185.10MB |
081 - Business Models and Risk.mp4 |
89.15MB |
081 - Cracking 802.11, WEP.mp4 |
314.28MB |
081 - Cryptographic Hashes.mp4 |
36.57MB |
081 - Data Privacy and Security.mp4 |
48.08MB |
081 - PowerShell Sample Script.mp4 |
7.12MB |
081 - Windows Installation Options.mp4 |
57.45MB |
082 - Cracking 802.11, WPA and WPA2.mp4 |
247.33MB |
082 - Identification.mp4 |
150.93MB |
082 - Nontechnical Controls.mp4 |
63.72MB |
082 - Risk Mitigation.mp4 |
84.60MB |
082 - Ruby Sample Script.mp4 |
7.00MB |
082 - What is the Registry.mp4 |
85.33MB |
083 - Access Control.mp4 |
32.12MB |
083 - CIA Triad and Risk.mp4 |
40.17MB |
083 - Cracking 802.11, WPS.mp4 |
256.00MB |
083 - Processes.mp4 |
61.94MB |
083 - Technical Controls.mp4 |
55.42MB |
084 - AAA.mp4 |
51.37MB |
084 - Business Impact Analysis.mp4 |
34.76MB |
084 - Introduction to Reporting and Communication.mp4 |
3.46MB |
084 - Risk Scenarios and Response.mp4 |
57.44MB |
084 - Services.mp4 |
27.45MB |
084 - Wireless Hardening.mp4 |
370.47MB |
085 - KerberosEAP.mp4 |
76.73MB |
085 - Monitoring and Governance.mp4 |
32.35MB |
085 - Pentest Communications.mp4 |
13.96MB |
085 - Risk Identification.mp4 |
38.63MB |
085 - Wireless Access Points.mp4 |
347.97MB |
085 - Your Windows Toolset.mp4 |
65.99MB |
086 - Analyze Scenarios to Secure Enterprise.mp4 |
37.77MB |
086 - Report Writing.mp4 |
13.18MB |
086 - Risk Calculation and Communication.mp4 |
32.95MB |
086 - Single Sign-On.mp4 |
87.72MB |
086 - Virtualization Basics.mp4 |
191.87MB |
086 - Windows 7 Task Manager.mp4 |
71.71MB |
087 - Certificates and Trust.mp4 |
126.48MB |
087 - Mitigation Strategies.mp4 |
12.76MB |
087 - Review Existing Security.mp4 |
69.76MB |
087 - Training.mp4 |
14.93MB |
087 - Virtual Security.mp4 |
390.63MB |
087 - Windows 10 Task Manager.mp4 |
41.84MB |
088 - Certificate Error Scenarios.mp4 |
54.40MB |
088 - Containers.mp4 |
279.64MB |
088 - Design Systems to Facilitate Incident Response.mp4 |
51.14MB |
088 - Information and Configuration Tools.mp4 |
88.10MB |
088 - Post-report Activities.mp4 |
7.13MB |
088 - Supply Chain Assessment.mp4 |
31.99MB |
089 - Conduct Incident and Emergency Responses.mp4 |
88.93MB |
089 - Frameworks.mp4 |
39.00MB |
089 - Infrastructure as a Service (IaaS).mp4 |
248.96MB |
089 - Performance Monitor.mp4 |
77.95MB |
089 - Understanding IP Tunneling.mp4 |
61.34MB |
090 - Conclusion.mp4 |
4.11MB |
090 - Event Viewer.mp4 |
66.70MB |
090 - Identify General Application Vulnerabilities.mp4 |
86.90MB |
090 - Platform as a Service (PaaS).mp4 |
229.67MB |
090 - Policies and Procedures.mp4 |
33.15MB |
090 - Virtual Private Networks (VPNs).mp4 |
93.84MB |
091 - Controls and Procedures.mp4 |
30.59MB |
091 - Creating Your Pentest Lab.mp4 |
172.58MB |
091 - Identify Web Application Vulnerabilities.mp4 |
106.55MB |
091 - Introduction to VLANs.mp4 |
72.15MB |
091 - Software as a Service (SaaS).mp4 |
71.26MB |
091 - Tools for Programmers.mp4 |
55.15MB |
092 - Application Security Design.mp4 |
42.71MB |
092 - Deployment Models.mp4 |
225.77MB |
092 - InterVLAN Routing.mp4 |
32.37MB |
092 - Introduction to Users and Groups.mp4 |
61.28MB |
092 - Verification.mp4 |
21.50MB |
093 - Implement Application Security Controls.mp4 |
123.91MB |
093 - Interfacing with Managed Switches.mp4 |
56.62MB |
093 - Managing Users and Groups.mp4 |
88.32MB |
093 - Static Hosts.mp4 |
197.85MB |
094 - Mobile Connectivity.mp4 |
317.52MB |
094 - NTFS Permissions.mp4 |
79.90MB |
094 - Select Vulnerability Assessment Methods.mp4 |
122.85MB |
094 - Switch Port Protection.mp4 |
83.36MB |
095 - Deploying Mobile Devices.mp4 |
131.51MB |
095 - Linux and macOS Permissions.mp4 |
38.45MB |
095 - Port Bonding.mp4 |
68.67MB |
095 - Select Vulnerability Assessment Tools.mp4 |
57.42MB |
096 - File Explorer.mp4 |
113.98MB |
096 - Mobile Enforcement.mp4 |
329.69MB |
096 - Port Mirroring.mp4 |
25.11MB |
097 - Mobile Device Management.mp4 |
213.32MB |
097 - Quality of Service.mp4 |
33.30MB |
097 - Sharing Resources.mp4 |
87.52MB |
098 - IDS vs. IPS.mp4 |
56.68MB |
098 - Physical Controls.mp4 |
229.77MB |
098 - Security Policies.mp4 |
68.95MB |
099 - HVAC.mp4 |
195.08MB |
099 - Patch Management.mp4 |
88.32MB |
099 - Proxy Servers.mp4 |
111.87MB |
100 - Fire Suppression.mp4 |
107.41MB |
100 - Load Balancing.mp4 |
105.50MB |
100 - Working with Disks.mp4 |
46.23MB |
101 - Device Placement Scenarios.mp4 |
174.29MB |
101 - Secure Encryption Applications and Protocols.mp4 |
283.64MB |
101 - Working with Applications.mp4 |
68.92MB |
102 - Intro to IPv6.mp4 |
121.24MB |
102 - Network Models.mp4 |
179.26MB |
102 - System Restore.mp4 |
39.21MB |
103 - Backing up Your Files.mp4 |
56.81MB |
103 - IPv6 Addressing.mp4 |
120.46MB |
103 - Know Your Protocols - TCPIP.mp4 |
161.83MB |
104 - IPv6 in Action.mp4 |
135.71MB |
104 - Know Your Protocols - Applications.mp4 |
120.43MB |
104 - Task Scheduler.mp4 |
32.42MB |
105 - IPv4 and IPv6 Tunneling.mp4 |
35.10MB |
105 - Transport Layer Security (TLS).mp4 |
314.76MB |
105 - Understanding the CLI.mp4 |
123.33MB |
106 - Internet Service Hardening.mp4 |
130.09MB |
106 - Navigating the CLI.mp4 |
105.90MB |
106 - Telephony Technologies.mp4 |
80.36MB |
107 - Optical Carriers.mp4 |
28.02MB |
107 - Protecting Your Servers.mp4 |
161.56MB |
107 - Working with Folders.mp4 |
59.35MB |
108 - Packet Switching.mp4 |
37.45MB |
108 - Secure Code Development.mp4 |
266.70MB |
108 - Working with Files.mp4 |
93.92MB |
109 - Connecting with Dial-Up.mp4 |
37.69MB |
109 - Secure Deployment Concepts.mp4 |
317.50MB |
109 - Working with Drives.mp4 |
117.11MB |
110 - Code Quality and Testing.mp4 |
133.08MB |
110 - Digital Subscriber Line.mp4 |
54.57MB |
110 - Super Copy Commands.mp4 |
91.22MB |
111 - Advanced Windows Command Line.mp4 |
68.34MB |
111 - Connecting with Cable Modems.mp4 |
33.46MB |
111 - Vulnerability Scanning Tools.mp4 |
243.77MB |
112 - Advanced Linux Commands.mp4 |
125.21MB |
112 - Connecting with Satellites.mp4 |
15.86MB |
112 - Vulnerability Scanning Assessment.mp4 |
125.29MB |
113 - Command-Line Permissions.mp4 |
52.04MB |
113 - ISDN and BPL.mp4 |
32.71MB |
113 - Social Engineering Principles.mp4 |
59.98MB |
114 - Introduction to Scripting.mp4 |
78.64MB |
114 - Remote Desktop Connectivity.mp4 |
25.54MB |
114 - Social Engineering Attacks.mp4 |
205.87MB |
115 - Advanced Remote Control Systems.mp4 |
50.99MB |
115 - Attacking Applications.mp4 |
283.67MB |
115 - Interpreted Languages.mp4 |
96.53MB |
116 - Attacking Web Sites.mp4 |
148.77MB |
116 - Introduction to 802.11.mp4 |
130.09MB |
116 - Windows Recovery Environment.mp4 |
45.59MB |
117 - 802.11 Standards.mp4 |
147.12MB |
117 - Advanced Windows Startup Problems.mp4 |
47.82MB |
117 - Exploiting a Target.mp4 |
280.27MB |
118 - Power Over Ethernet (PoE).mp4 |
39.48MB |
118 - Troubleshooting Boot Problems.mp4 |
114.79MB |
118 - Vulnerability Impact.mp4 |
263.76MB |
119 - Antennas.mp4 |
106.18MB |
119 - Incident Response.mp4 |
93.04MB |
119 - Troubleshooting at the GUI.mp4 |
122.66MB |
120 - Digital Forensics.mp4 |
266.54MB |
120 - Troubleshooting Applications.mp4 |
76.51MB |
120 - Wireless Security Standards.mp4 |
145.03MB |
121 - Contingency Planning.mp4 |
260.35MB |
121 - Implementing Wireless Security.mp4 |
35.54MB |
121 - Kernel Panic.mp4 |
68.09MB |
122 - Backups.mp4 |
145.05MB |
122 - Monitor Technologies.mp4 |
114.06MB |
122 - Threats to Your Wireless Network.mp4 |
66.28MB |
123 - LCD Breakdown.mp4 |
67.64MB |
123 - Retro Threats.mp4 |
102.53MB |
124 - Graphics Cards and Connections.mp4 |
206.71MB |
124 - Wi-Fi Protected Setup (WPS).mp4 |
45.95MB |
125 - Enterprise Wireless.mp4 |
47.12MB |
125 - Resolutions and Aspect Ratios.mp4 |
55.81MB |
126 - Installing a Graphics Card.mp4 |
104.47MB |
126 - Installing a Wireless Network.mp4 |
146.84MB |
127 - Multiple Monitors.mp4 |
32.74MB |
127 - Wireless Scenarios.mp4 |
39.32MB |
128 - More Wireless Scenarios.mp4 |
99.01MB |
128 - Projectors.mp4 |
59.19MB |
129 - Troubleshooting Monitors.mp4 |
76.46MB |
129 - Virtualization Basics.mp4 |
56.95MB |
130 - Cloud Ownership.mp4 |
5.71MB |
130 - Introduction to Networking.mp4 |
87.20MB |
131 - Cloud Implementation.mp4 |
98.62MB |
131 - Hubs vs. Switches.mp4 |
74.45MB |
132 - Hexadecimal.mp4 |
62.72MB |
132 - Your First Virtual Machine.mp4 |
41.25MB |
133 - NAS and SAN.mp4 |
135.59MB |
133 - WANs and Routers.mp4 |
69.22MB |
134 - Cables and Connectors.mp4 |
142.64MB |
134 - Platform as a Service (PaaS).mp4 |
56.89MB |
135 - Crimping Cables.mp4 |
131.55MB |
135 - Software as a Service (SaaS).mp4 |
22.31MB |
136 - Infrastructure as a Service (IaaS).mp4 |
56.52MB |
136 - Structured Cabling.mp4 |
170.73MB |
137 - Cellular Technologies.mp4 |
51.37MB |
137 - Network Card Troubleshooting.mp4 |
101.95MB |
138 - Introduction to TCPIP.mp4 |
131.66MB |
138 - Mobile Connectivity.mp4 |
79.13MB |
139 - Deploying Mobile Devices.mp4 |
42.78MB |
139 - Network IDs and Subnet Masks.mp4 |
28.10MB |
140 - Mobile Access Control.mp4 |
63.59MB |
140 - Special IP Addresses.mp4 |
74.68MB |
141 - NAT.mp4 |
58.43MB |
141 - Network Types.mp4 |
58.35MB |
142 - Dynamic IP Addressing.mp4 |
81.04MB |
142 - Network Design.mp4 |
109.26MB |
143 - IPv6.mp4 |
88.01MB |
143 - Power Management.mp4 |
67.40MB |
144 - Port Numbers.mp4 |
91.96MB |
144 - Unified Communications.mp4 |
45.65MB |
145 - Network Documentation.mp4 |
54.25MB |
145 - TCP, UDP and ICMP.mp4 |
78.22MB |
146 - Contingency Planning.mp4 |
83.62MB |
146 - Working with Connections.mp4 |
66.94MB |
147 - Predicting Hardware Failure.mp4 |
39.36MB |
147 - Understanding DNS.mp4 |
60.55MB |
148 - Backups.mp4 |
46.19MB |
148 - Working with DNS.mp4 |
54.51MB |
149 - What is Risk Management.mp4 |
70.47MB |
149 - Windows Naming.mp4 |
74.59MB |
150 - Security Policies.mp4 |
95.54MB |
150 - Working with Workgroups.mp4 |
63.87MB |
151 - Change Management.mp4 |
53.88MB |
151 - Working with Active Directory.mp4 |
91.58MB |
152 - User Training.mp4 |
25.65MB |
152 - Windows Sharing with Mac and Linux.mp4 |
62.89MB |
153 - Net Command.mp4 |
21.55MB |
153 - Standard Business Documentation.mp4 |
38.56MB |
154 - Mitigating Network Threats.mp4 |
45.77MB |
154 - Routers.mp4 |
125.92MB |
155 - Basic Router Configuration.mp4 |
79.84MB |
155 - High Availability.mp4 |
53.06MB |
156 - Denial of Service.mp4 |
50.00MB |
156 - Firewall Configuration.mp4 |
92.92MB |
157 - Malware.mp4 |
99.71MB |
157 - Windows Firewall.mp4 |
67.80MB |
158 - Port Forwarding.mp4 |
63.91MB |
158 - Social Engineering.mp4 |
32.40MB |
159 - Advanced Router Configuration.mp4 |
52.68MB |
159 - Man-in-the-Middle.mp4 |
171.11MB |
160 - Introduction to Firewalls.mp4 |
42.36MB |
160 - VLANs.mp4 |
74.42MB |
161 - Firewalls.mp4 |
66.18MB |
161 - Network Troubleshooting.mp4 |
73.19MB |
162 - DMZ.mp4 |
51.14MB |
162 - Wireless Network Hardware.mp4 |
162.24MB |
163 - Hardening Devices.mp4 |
179.86MB |
163 - Wi-Fi Standards.mp4 |
110.49MB |
164 - Basic WAP Setup.mp4 |
96.89MB |
164 - Physical Security Controls.mp4 |
75.51MB |
165 - Testing Network Security.mp4 |
58.16MB |
165 - Wireless Encryption.mp4 |
123.35MB |
166 - Connecting to a Wi-Fi Network.mp4 |
58.29MB |
166 - Network Protection Scenarios.mp4 |
161.25MB |
167 - It's a Huge Mesh.mp4 |
41.27MB |
167 - SNMP.mp4 |
79.87MB |
168 - Documenting Logs.mp4 |
53.31MB |
168 - Enterprise Wireless.mp4 |
157.78MB |
169 - Beyond Wi-Fi.mp4 |
91.29MB |
169 - System Monitoring.mp4 |
65.71MB |
170 - SIEM.mp4 |
69.27MB |
170 - Troubleshooting Wireless Connections.mp4 |
113.99MB |
171 - Beyond the LAN.mp4 |
23.36MB |
171 - Network Troubleshooting.mp4 |
64.93MB |
172 - Internet Tiers.mp4 |
67.35MB |
173 - Dial-up Connections.mp4 |
83.18MB |
174 - Broadband Connections.mp4 |
121.98MB |
175 - Firewalls and Servers.mp4 |
48.88MB |
176 - Telnet and SSH.mp4 |
62.44MB |
177 - Remote Desktop Connections.mp4 |
48.08MB |
178 - The World Wide Web.mp4 |
78.39MB |
179 - FTP.mp4 |
51.30MB |
180 - Email.mp4 |
68.03MB |
181 - Proxy Servers.mp4 |
65.67MB |
182 - Virtual Private Networks (VPNs).mp4 |
62.50MB |
183 - Internet of Things (IoT).mp4 |
44.71MB |
184 - Troubleshooting Internet Connections.mp4 |
70.31MB |
185 - Understanding Virtualization.mp4 |
97.34MB |
186 - Your First Virtual Machine.mp4 |
80.16MB |
187 - Advanced Virtualization Setup.mp4 |
69.45MB |
188 - Cloud Computing.mp4 |
119.23MB |
189 - Cloud Ownership.mp4 |
5.52MB |
190 - Cloud-Based Applications.mp4 |
61.86MB |
191 - Laptop Features.mp4 |
119.10MB |
192 - Laptop Hardware Troubleshooting - The Tools.mp4 |
50.96MB |
193 - Laptop Hardware - Core Hardware.mp4 |
62.64MB |
194 - Laptop Hardware - CPU and Motherboard.mp4 |
127.30MB |
195 - Touring Your Laptop Display.mp4 |
65.90MB |
196 - Power Management.mp4 |
113.11MB |
197 - What is a Mobile Device.mp4 |
106.79MB |
198 - Mobile Connections.mp4 |
112.01MB |
199 - Touring Android.mp4 |
88.08MB |
200 - Touring iOS.mp4 |
71.09MB |
201 - Virtual Reality.mp4 |
16.98MB |
202 - Maintaining Mobile Devices.mp4 |
120.83MB |
203 - Mobile Devices and Email.mp4 |
101.15MB |
204 - Mobile Synchronization.mp4 |
104.58MB |
205 - Mobile Device Security.mp4 |
78.14MB |
206 - Mobile Security Troubleshooting.mp4 |
84.53MB |
207 - Mobile Device Troubleshooting.mp4 |
133.66MB |
208 - Laser Printers.mp4 |
103.52MB |
209 - Inkjet Printers.mp4 |
68.87MB |
210 - Impact Printers.mp4 |
55.45MB |
211 - Thermal Printers.mp4 |
39.56MB |
212 - Installing a Local Printer.mp4 |
106.01MB |
213 - Sharing Printers.mp4 |
69.41MB |
214 - Installing Wireless and Cloud Printers.mp4 |
126.26MB |
215 - Troubleshooting Printers.mp4 |
151.28MB |
216 - 3D Printing.mp4 |
83.32MB |
217 - Threats.mp4 |
78.54MB |
218 - Dealing with Threats.mp4 |
69.89MB |
219 - Physical Security.mp4 |
94.92MB |
220 - Passwords and Authentication.mp4 |
144.31MB |
221 - Malware.mp4 |
154.06MB |
222 - Anti-Malware.mp4 |
109.38MB |
223 - Social Engineering.mp4 |
40.34MB |
224 - Licensing.mp4 |
104.79MB |
225 - Incident Response.mp4 |
47.60MB |
226 - Environmental Controls.mp4 |
75.06MB |
227 - Documents You Need to Know.mp4 |
120.48MB |
228 - Data You Need to Know.mp4 |
41.07MB |
229 - Change Management.mp4 |
78.44MB |
230 - The Zen of Backup.mp4 |
103.92MB |
231 - Recycling and Data Destruction.mp4 |
80.72MB |
Cloud Pentesting.zip |
3.74GB |
Common Ports.pdf |
94.00KB |
Cyber_Threat_Challenge_Answers.pdf |
50.82KB |
Cyber_Threat_Challenge_Questions.pdf |
35.45KB |
CyberThreat_traffic-analysis-exercise.zip |
6.01MB |
Encryption.pdf |
223.96KB |
IPSec VPN.pdf |
78.69KB |
Lab 1_ Setup.pdf |
507.33KB |
Lab 2_ Setting up AWS.pdf |
378.77KB |
Lab 2_ Setting up Azure.pdf |
287.04KB |
Lab 3_ Attacking Azure Targets.pdf |
70.62KB |
Lab 3_ Metadata Attacks.pdf |
224.17KB |
Lab 4_ Azure Run.pdf |
48.55KB |
Lab 4_ S3 Misconfigurations and EBS.pdf |
81.25KB |
Lab 5_ OSINT against AWS.pdf |
128.94KB |
Lab 5_ OSINT Against Azure.pdf |
134.45KB |
Lab 6_ Teardown of Lab Environment.pdf |
294.69KB |
Lab 6_ Teardown of Project Artifacts.pdf |
47.83KB |
Notes on Access Control.pdf |
173.12KB |
Notes on Biometrics.pdf |
204.37KB |
Notes on IPv4-IPv6.pdf |
3.13MB |
Notes on Kerberos.pdf |
603.08KB |
OSI Model.pdf |
100.17KB |
Security+ Domains.pdf |
57.50KB |