Torrent Info
Title [FreeCourseSite.com] Udemy - Complete Ethical Hacking Bootcamp 2023 Zero to Mastery
Category
Size 10.19GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
[CourseClub.Me].url 122B
[CourseClub.Me].url 122B
[CourseClub.Me].url 122B
[CourseClub.Me].url 122B
[FreeCourseSite.com].url 127B
[FreeCourseSite.com].url 127B
[FreeCourseSite.com].url 127B
[FreeCourseSite.com].url 127B
[GigaCourse.Com].url 49B
[GigaCourse.Com].url 49B
[GigaCourse.Com].url 49B
[GigaCourse.Com].url 49B
001 Android Hacking Theory_en.srt 6.02KB
001 Android Hacking Theory.mp4 10.67MB
001 Anonymity Theory_en.srt 6.26KB
001 Anonymity Theory.mp4 13.54MB
001 Become An Alumni.html 944B
001 Built-in-Exceptions.url 73B
001 Course Outline_en.srt 12.28KB
001 Course Outline.mp4 99.79MB
001 Creating 2 Programs_en.srt 2.78KB
001 Creating 2 Programs.mp4 5.43MB
001 Enumerating Active Directory_en.srt 29.95KB
001 Enumerating Active Directory.mp4 196.72MB
001 Errors in Python_en.srt 9.41KB
001 Errors in Python.mp4 37.12MB
001 Finding First Vulnerability With Nmap Scripts_en.srt 27.21KB
001 Finding First Vulnerability With Nmap Scripts.mp4 161.44MB
001 Generating Basic Payload With Msfvenom_en.srt 18.60KB
001 Generating Basic Payload With Msfvenom.mp4 84.91MB
001 Learning Python_en.srt 3.47KB
001 Learning Python.mp4 6.66MB
001 Navigating Through Linux System_en.srt 15.98KB
001 Navigating Through Linux System.mp4 59.02MB
001 Note Not Everything Will Work Smooth!.html 1.73KB
001 Post Exploitation Theory_en.srt 7.56KB
001 Post Exploitation Theory.mp4 13.77MB
001 Special Bonus Lecture.html 1.21KB
001 The 2 Paths.html 868B
001 Theory Behind Scanning_en.srt 11.54KB
001 Theory Behind Scanning.mp4 22.54MB
001 Theory - Man In The Middle Attack_en.srt 12.36KB
001 Theory - Man In The Middle Attack.mp4 24.84MB
001 Website Penetration Testing Theory_en.srt 18.75KB
001 Website Penetration Testing Theory.mp4 35.64MB
001 What Are We Creating_en.srt 4.55KB
001 What Are We Creating.mp4 8.55MB
001 What Is A Programming Language_en.srt 8.95KB
001 What Is A Programming Language.mp4 18.99MB
001 What is A Virtual Machine_en.srt 10.09KB
001 What is A Virtual Machine.mp4 86.82MB
001 What is Exploitation_en.srt 11.59KB
001 What is Exploitation.mp4 21.97MB
001 What is Information Gathering_en.srt 7.25KB
001 What is Information Gathering.mp4 14.17MB
001 Wireless Cracking Theory_en.srt 9.40KB
001 Wireless Cracking Theory.mp4 17.84MB
001 Working With Files In Python_en.srt 11.96KB
001 Working With Files In Python.mp4 39.30MB
002 Advance Msfvenom Usage Part 1_en.srt 15.89KB
002 Advance Msfvenom Usage Part 1.mp4 90.02MB
002 Android VM Install_en.srt 10.65KB
002 Android VM Install.mp4 29.53MB
002 Bettercap ARP Spoofing_en.srt 20.65KB
002 Bettercap ARP Spoofing.mp4 129.17MB
002 bruteforce.py 1.06KB
002 Bruteforcer In Python_en.srt 42.50KB
002 Bruteforcer In Python.mp4 160.30MB
002 Built-in-Exceptions.url 73B
002 Connecting Server And Backdoor_en.srt 17.68KB
002 Connecting Server And Backdoor.mp4 33.20MB
002 Creating Files & Managing Directories_en.srt 19.25KB
002 Creating Files & Managing Directories.mp4 82.28MB
002 Endorsements On LinkedIN.html 1.37KB
002 Error Handling_en.srt 11.58KB
002 Error Handling.mp4 41.24MB
002 Exploiting Active Directory_en.srt 22.68KB
002 Exploiting Active Directory.mp4 120.47MB
002 File Paths_en.srt 9.88KB
002 File Paths.mp4 51.80MB
002 HTTP Request & Response_en.srt 6.62KB
002 HTTP Request & Response.mp4 32.07MB
002 Join Our Online Classroom!_en.srt 6.97KB
002 Join Our Online Classroom!.mp4 77.54MB
002 Manual Vulnerability Analysis & Searchsploit_en.srt 13.05KB
002 Manual Vulnerability Analysis & Searchsploit.mp4 83.14MB
002 Meterpreter Basic Commands Part 1_en.srt 19.19KB
002 Note Do We Need To Learn Programming To Be An Ethical Hacker.html 1.48KB
002 Obtaining IP Address, Physical Address Using Whois Tool_en.srt 15.19KB
002 Obtaining IP Address, Physical Address Using Whois Tool.mp4 58.02MB
002 Pathlib.url 70B
002 Putting Wireless Card In Monitor Mode_en.srt 5.96KB
002 Putting Wireless Card In Monitor Mode.mp4 19.61MB
002 python.org.url 47B
002 Python Data Types_en.srt 6.78KB
002 Python Data Types.mp4 12.49MB
002 Python Interpreter_en.srt 10.71KB
002 Python Interpreter.mp4 74.04MB
002 Setting Up Vulnerable Windows 10_en.srt 14.01KB
002 Setting Up Vulnerable Windows 10.mp4 22.44MB
002 TCP & UDP_en.srt 7.30KB
002 TCP & UDP.mp4 13.55MB
002 Tor Browser_en.srt 12.79KB
002 Tor Browser.mp4 54.59MB
002 What is a Vulnerability_en.srt 9.08KB
002 What is a Vulnerability.mp4 16.67MB
002 Why Linux_en.srt 5.17KB
002 Why Linux.mp4 45.89MB
003 Advance Msfvenom Usage Part 2_en.srt 12.13KB
003 Advance Msfvenom Usage Part 2.mp4 82.10MB
003 Coding a Portscanner in Python 3_en.srt 39.48KB
003 Coding a Portscanner in Python 3.mp4 147.17MB
003 Crashing Windows 10 Machine Remotely_en.srt 10.82KB
003 Crashing Windows 10 Machine Remotely.mp4 44.88MB
003 Deauthenticating Devices & Grabbing Password_en.srt 19.41KB
003 Deauthenticating Devices & Grabbing Password.mp4 89.05MB
003 directories.py 474B
003 Error Handling 2_en.srt 8.19KB
003 Error Handling 2.mp4 28.67MB
003 Escalating Privileges on the Domain_en.srt 19.99KB
003 Escalating Privileges on the Domain.mp4 129.24MB
003 Ettercap Password Sniffing_en.srt 14.53KB
003 Ettercap Password Sniffing.mp4 32.50MB
003 Exercise Meet Your Classmates & Instructor.html 3.68KB
003 File IO Errors_en.srt 3.11KB
003 File IO Errors.mp4 10.71MB
003 Gaining Access With Android Meterpreter_en.srt 17.49KB
003 Gaining Access With Android Meterpreter.mp4 41.71MB
003 Glot.io.url 40B
003 Hidden Directory Discovery_en.srt 18.65KB
003 Hidden Directory Discovery.mp4 77.46MB
003 How To Run Python Code_en.srt 8.00KB
003 How To Run Python Code.mp4 37.23MB
003 How To Succeed.html 280B
003 Information Gathering & Dirb Tool_en.srt 13.38KB
003 Information Gathering & Dirb Tool.mp4 67.39MB
003 Meterpreter Basic Commands Part 2_en.srt 16.75KB
003 Meterpreter Basic Commands Part 2.mp4 92.53MB
003 Monthly Coding Challenges, Free Resources and Guides.html 1.58KB
003 Nessus Installation_en.srt 9.43KB
003 Nessus Installation.mp4 23.84MB
003 Network Commands & Sudo Privileges In Kali_en.srt 16.54KB
003 Network Commands & Sudo Privileges In Kali.mp4 82.00MB
003 Note Installing Vulnerable Machine.html 293B
003 portscanner.py 653B
003 Processing Instructional Commands_en.srt 11.56KB
003 Processing Instructional Commands.mp4 36.59MB
003 Proxychains With Nmap_en.srt 10.91KB
003 Proxychains With Nmap.mp4 56.97MB
003 Repl.it.url 40B
003 Reverse Shells, Bind Shells_en.srt 4.45KB
003 Reverse Shells, Bind Shells.mp4 8.29MB
003 What is Next_en.srt 4.04KB
003 What is Next.mp4 7.85MB
003 Whatweb Stealthy Scan_en.srt 14.39KB
003 Whatweb Stealthy Scan.mp4 96.78MB
004 Aggressive Website Technology Discovering on IP Range_en.srt 14.83KB
004 Aggressive Website Technology Discovering on IP Range.mp4 98.01MB
004 Aircrack Password Cracking_en.srt 11.26KB
004 Aircrack Password Cracking.mp4 19.55MB
004 Burpsuite Configuration_en.srt 13.47KB
004 Burpsuite Configuration.mp4 62.53MB
004 Discovering Vulnerabilities With Nessus_en.srt 26.98KB
004 Discovering Vulnerabilities With Nessus.mp4 58.26MB
004 Downloading Virtual Box & Kali Linux_en.srt 9.23KB
004 Downloading Virtual Box & Kali Linux.mp4 40.57MB
004 Elevating Privileges With Different Modules_en.srt 14.05KB
004 Elevating Privileges With Different Modules.mp4 104.29MB
004 Evil Droid_en.srt 12.56KB
004 Evil Droid.mp4 22.27MB
004 Exercises Error Handling_en.srt 7.58KB
004 Exploiting Windows 10 Machine Remotely_en.srt 23.98KB
004 Exploiting Windows 10 Machine Remotely.mp4 154.74MB
004 Floating-point-numbers.url 67B
004 Generating Powershell Payload Using Veil_en.srt 24.07KB
004 Generating Powershell Payload Using Veil.mp4 148.75MB
004 Installing VPN in Kali Linux_en.srt 8.41KB
004 Installing VPN in Kali Linux.mp4 44.52MB
004 Installing Vulnerable Virtual Machine_en.srt 10.10KB
004 Installing Vulnerable Virtual Machine.mp4 33.27MB
004 Learning Guideline.html 336B
004 Manually Poisoning Targets ARP Cache With Scapy_en.srt 20.30KB
004 Manually Poisoning Targets ARP Cache With Scapy.mp4 83.86MB
004 Metasploitable-Download.url 106B
004 Metasploit Framework Structure_en.srt 21.69KB
004 Metasploit Framework Structure.mp4 81.86MB
004 Note Linux File System & Additional Commands.html 1.11KB
004 Numbers_en.srt 14.23KB
004 Numbers.mp4 63.37MB
004 Our First Python Program_en.srt 10.89KB
004 Our First Python Program.mp4 37.35MB
004 Read, Write, Append_en.srt 11.36KB
004 Read, Write, Append.mp4 55.46MB
004 Sending and Receiving Data_en.srt 10.65KB
004 Sending and Receiving Data.mp4 16.56MB
004 What Is Ethical Hacking_en.srt 12.28KB
004 What Is Ethical Hacking.mp4 94.72MB
005 Course Resources + Guide.html 322B
005 Creating Persistence On The Target System_en.srt 13.24KB
005 Creating Persistence On The Target System.mp4 65.14MB
005 Endorsements On LinkedIN.html 1.37KB
005 Error Handling 3_en.srt 4.36KB
005 Error Handling 3.mp4 10.92MB
005 Executing Commands And Compiling The Program_en.srt 19.21KB
005 Executing Commands And Compiling The Program.mp4 100.56MB
005 Hashcat Password Cracking_en.srt 16.03KB
005 Hashcat Password Cracking.mp4 101.97MB
005 Is it Flappy Bird or Malware_en.srt 19.81KB
005 Is it Flappy Bird or Malware.mp4 93.99MB
005 Latest Version Of Python_en.srt 2.71KB
005 Latest Version Of Python.mp4 7.82MB
005 Math Functions_en.srt 7.22KB
005 Math Functions.mp4 26.63MB
005 Msfconsole Basic Commands_en.srt 28.70KB
005 Msfconsole Basic Commands.mp4 156.84MB
005 Netdiscover_en.srt 10.73KB
005 Netdiscover.mp4 38.85MB
005 Next Steps.html 834B
005 Note Kali Linux Updates All The Time!.html 1.38KB
005 Note Same Tools Different Results!.html 833B
005 Practice.html 625B
005 Scanning Windows 7 Machine With Nessus_en.srt 7.21KB
005 Scanning Windows 7 Machine With Nessus.mp4 14.91MB
005 ShellShock Exploitation_en.srt 26.37KB
005 ShellShock Exploitation.mp4 106.05MB
005 TheFatRat Payload Creation_en.srt 12.48KB
005 TheFatRat Payload Creation.mp4 79.57MB
005 WhoAmI Anonymity Tool_en.srt 12.37KB
005 WhoAmI Anonymity Tool.mp4 60.63MB
005 zerotomastery.io-Complete-Ethical-Hacking-Bootcamp-Zero-to-Mastery-Guide.pdf 119.19KB
006 Bug Bounty.html 670B
006 Changing Directory Inside Of Our Backdoor_en.srt 9.94KB
006 Changing Directory Inside Of Our Backdoor.mp4 42.35MB
006 Command Injection Exploitation_en.srt 19.18KB
006 Command Injection Exploitation.mp4 80.02MB
006 Creating Our First Virtual Machine_en.srt 15.05KB
006 Creating Our First Virtual Machine.mp4 30.84MB
006 DEVELOPER FUNDAMENTALS I_en.srt 6.69KB
006 DEVELOPER FUNDAMENTALS I.mp4 51.83MB
006 Exercise Translator_en.srt 15.01KB
006 Exercise Translator.mp4 84.27MB
006 Gathering Emails Using theHarvester & Hunter.io_en.srt 18.32KB
006 Gathering Emails Using theHarvester & Hunter.io.mp4 60.50MB
006 Hack Any Device On Any Network With Ngrok_en.srt 18.59KB
006 Hack Any Device On Any Network With Ngrok.mp4 51.10MB
006 Lets cool down for a bit!_en.srt 1.98KB
006 Lets cool down for a bit!.mp4 3.84MB
006 LinkedIn-Group.url 65B
006 Note My Payloads Are Getting Detected By An Antivirus!.html 2.38KB
006 Our First Exploit - vsftp 2.3.4 Exploitation_en.srt 15.33KB
006 Our First Exploit - vsftp 2.3.4 Exploitation.mp4 54.23MB
006 Performing First Nmap Scan_en.srt 14.20KB
006 Performing First Nmap Scan.mp4 78.39MB
006 Post Exploitation Modules_en.srt 13.80KB
006 Post Exploitation Modules.mp4 84.82MB
006 Python 2 vs Python 3_en.srt 10.19KB
006 Python 2 vs Python 3.mp4 75.41MB
006 Python-2-vs-Python-3.url 91B
006 Python-2-vs-Python-3-another-one.url 124B
006 The-Story-of-Python.url 67B
006 zerotomastery.io.url 49B
006 ZTM Resources_en.srt 7.51KB
006 ZTM Resources.mp4 43.84MB
006 ZTM-Youtube.url 62B
007 Coding For Hackers.html 901B
007 Different Nmap Scan Types_en.srt 17.66KB
007 Different Nmap Scan Types.mp4 95.94MB
007 Exercise How Does Python Work_en.srt 3.49KB
007 Exercise How Does Python Work.mp4 15.57MB
007 Exercise-Repl.url 69B
007 Exploitation Recap_en.srt 6.89KB
007 Exploitation Recap.mp4 12.30MB
007 Getting Meterpreter Shell With Command Execution_en.srt 14.35KB
007 Getting Meterpreter Shell With Command Execution.mp4 54.33MB
007 Hexeditor & Antiviruses_en.srt 11.53KB
007 Hexeditor & Antiviruses.mp4 33.95MB
007 How To Download Tools Online_en.srt 17.42KB
007 How To Download Tools Online.mp4 91.45MB
007 Installing Kali Linux Operating System_en.srt 20.14KB
007 Installing Kali Linux Operating System.mp4 48.08MB
007 Misconfigurations Happen - Bindshell Exploitation_en.srt 7.19KB
007 Misconfigurations Happen - Bindshell Exploitation.mp4 30.39MB
007 Operator Precedence_en.srt 4.34KB
007 Operator Precedence.mp4 5.94MB
007 Uploading & Downloading Files_en.srt 18.24KB
007 Uploading & Downloading Files.mp4 35.54MB
008 backdoor.py 1.58KB
008 Exercise Operator Precedence.html 704B
008 Exercise-Repl.url 69B
008 Exploit Development.html 1.07KB
008 Finding Usernames With Sherlock_en.srt 12.66KB
008 Finding Usernames With Sherlock.mp4 76.07MB
008 Information Disclosure - Telnet Exploit_en.srt 6.41KB
008 Information Disclosure - Telnet Exploit.mp4 18.34MB
008 Making Our Payload Open An Image_en.srt 13.97KB
008 Making Our Payload Open An Image.mp4 53.60MB
008 Reflected XSS & Cookie Stealing_en.srt 25.59KB
008 Reflected XSS & Cookie Stealing.mp4 113.82MB
008 server.py 1.27KB
008 Testing All The Commands_en.srt 14.66KB
008 Testing All The Commands.mp4 81.06MB
008 Update 1 - New & Old Versions of Kali Linux_en.srt 6.04KB
008 Update 1 - New & Old Versions of Kali Linux.mp4 12.29MB
008 ZTM Nmap Cheat Sheet.html 1.07KB
009 Base-Numbers.url 74B
009 Bonus - Email Scraper Tool In Python 3_en.srt 11.46KB
009 Bonus - Email Scraper Tool In Python 3.mp4 40.21MB
009 Discovering Target Operating System_en.srt 9.68KB
009 Discovering Target Operating System.mp4 47.83MB
009 email-scarper.py 1.42KB
009 Networking-101.pdf 404.04KB
009 Networking Basics.html 438B
009 Note You Can Continue Building Onto This Project!.html 1.23KB
009 Optional bin() and complex_en.srt 6.26KB
009 Optional bin() and complex.mp4 15.18MB
009 Python Monthly.html 917B
009 Software Vulnerability - Samba Exploitation_en.srt 14.65KB
009 Software Vulnerability - Samba Exploitation.mp4 95.43MB
009 Stored XSS_en.srt 13.48KB
009 Stored XSS.mp4 63.27MB
010 Attacking SSH - Bruteforce Attack_en.srt 18.87KB
010 Attacking SSH - Bruteforce Attack.mp4 113.86MB
010 Detecting Version Of Service Running On An Open Port_en.srt 12.01KB
010 Detecting Version Of Service Running On An Open Port.mp4 30.37MB
010 Full Screen Mode & Network Settings_en.srt 18.60KB
010 Full Screen Mode & Network Settings.mp4 89.32MB
010 HTML Injection_en.srt 11.22KB
010 HTML Injection.mp4 51.29MB
010 Note More About Information Gathering.html 1.41KB
010 Python-Keywords.url 80B
010 Variables_en.srt 20.22KB
010 Variables.mp4 58.96MB
011 Exploitation Challenge - 5 Different Exploits_en.srt 27.20KB
011 Exploitation Challenge - 5 Different Exploits.mp4 173.36MB
011 Expressions vs Statements_en.srt 2.21KB
011 Expressions vs Statements.mp4 3.24MB
011 Filtering Port Range & Output Of Scan Results_en.srt 19.33KB
011 Filtering Port Range & Output Of Scan Results.mp4 126.16MB
011 SQL Injection_en.srt 33.59KB
011 SQL Injection.mp4 165.44MB
011 Troubleshooting Network Connection in Kali Linux_en.srt 10.18KB
011 Troubleshooting Network Connection in Kali Linux.mp4 51.34MB
012 Augmented Assignment Operator_en.srt 4.11KB
012 Augmented Assignment Operator.mp4 5.77MB
012 CSRF Vulnerability_en.srt 19.78KB
012 CSRF Vulnerability.mp4 97.57MB
012 Exercise-Repl.url 79B
012 Explaining Windows 7 Setup_en.srt 14.76KB
012 Explaining Windows 7 Setup.mp4 59.10MB
012 Note Getting Familiar With Kali Linux!.html 1.01KB
012 What is a FirewallIDS_en.srt 3.97KB
012 What is a FirewallIDS.mp4 35.11MB
013 5 Stages Of A Penetration Test_en.srt 12.14KB
013 5 Stages Of A Penetration Test.mp4 23.38MB
013 Eternal Blue Attack - Windows 7 Exploitation_en.srt 22.17KB
013 Eternal Blue Attack - Windows 7 Exploitation.mp4 110.78MB
013 Hydra Bruteforce Attack Example 1_en.srt 18.43KB
013 Hydra Bruteforce Attack Example 1.mp4 22.66MB
013 Strings_en.srt 8.07KB
013 Strings.mp4 11.47MB
013 Using Decoys and Packet Fragmentation_en.srt 19.02KB
013 Using Decoys and Packet Fragmentation.mp4 92.22MB
014 DoublePulsar Attack - Windows Exploit_en.srt 23.26KB
014 DoublePulsar Attack - Windows Exploit.mp4 97.48MB
014 Hydra Bruteforce Attack Example 2_en.srt 12.01KB
014 Hydra Bruteforce Attack Example 2.mp4 63.33MB
014 Security Evasion Nmap Options_en.srt 8.83KB
014 Security Evasion Nmap Options.mp4 31.76MB
014 String Concatenation_en.srt 1.63KB
014 String Concatenation.mp4 2.54MB
015 BlueKeep Vulnerability - Windows Exploit_en.srt 15.50KB
015 BlueKeep Vulnerability - Windows Exploit.mp4 92.72MB
015 Burpsuite Intruder_en.srt 13.30KB
015 Burpsuite Intruder.mp4 37.37MB
015 Note Time To Switch Things Up!.html 1.17KB
015 Type Conversion_en.srt 3.87KB
015 Type Conversion.mp4 7.88MB
016 Escape Sequences_en.srt 6.10KB
016 Note We Can Also Target Routers!.html 605B
017 Exercise-Repl.url 75B
017 Formatted Strings_en.srt 11.02KB
017 Formatted Strings.mp4 22.56MB
017 Update 2 - Routersploit_en.srt 10.28KB
017 Update 2 - Routersploit.mp4 65.20MB
018 Exercise-Repl.url 64B
018 String Indexes_en.srt 13.31KB
018 String Indexes.mp4 17.79MB
018 Update 3 - Router Default Credentials_en.srt 12.87KB
018 Update 3 - Router Default Credentials.mp4 50.26MB
019 Exercise Imposter Syndrome_en.srt 5.26KB
019 Exercise Imposter Syndrome.mp4 27.30MB
019 Immutability_en.srt 4.61KB
019 Immutability.mp4 8.47MB
020 Built-In-Functions.url 72B
020 Built-In Functions + Methods_en.srt 13.60KB
020 Built-In Functions + Methods.mp4 54.99MB
020 String-Methods.url 78B
021 Booleans_en.srt 4.99KB
021 Booleans.mp4 11.64MB
022 Exercise Type Conversion_en.srt 11.04KB
022 Exercise Type Conversion.mp4 25.80MB
023 DEVELOPER FUNDAMENTALS II_en.srt 6.97KB
023 DEVELOPER FUNDAMENTALS II.mp4 19.50MB
023 Python-Comments-Best-Practices.url 69B
024 Exercise Password Checker_en.srt 9.69KB
024 Exercise Password Checker.mp4 25.35MB
025 Lists_en.srt 7.22KB
025 Lists.mp4 9.20MB
026 Exercise-Repl.url 55B
026 List Slicing_en.srt 10.60KB
026 List Slicing.mp4 18.03MB
027 Exercise-Repl.url 56B
027 Matrix_en.srt 5.34KB
027 Matrix.mp4 8.99MB
028 List Methods_en.srt 14.84KB
028 List Methods.mp4 42.28MB
028 List-Methods.url 76B
029 Exercise-Repl.url 65B
029 List Methods 2_en.srt 6.03KB
029 List Methods 2.mp4 18.48MB
029 Python-Keywords.url 80B
030 List Methods 3_en.srt 6.72KB
030 List Methods 3.mp4 19.23MB
031 Common List Patterns_en.srt 7.17KB
031 Common List Patterns.mp4 20.16MB
031 Exercise-Repl.url 57B
032 List Unpacking_en.srt 3.58KB
032 List Unpacking.mp4 6.43MB
033 None_en.srt 2.81KB
033 None.mp4 3.18MB
034 Dictionaries_en.srt 9.33KB
034 Dictionaries.mp4 12.90MB
035 DEVELOPER FUNDAMENTALS III_en.srt 4.50KB
035 DEVELOPER FUNDAMENTALS III.mp4 8.89MB
036 Dictionary Keys_en.srt 4.71KB
036 Dictionary Keys.mp4 8.12MB
037 Dictionary Methods_en.srt 6.55KB
037 Dictionary Methods.mp4 10.35MB
037 Dictionary-Methods.url 82B
038 Dictionary Methods 2_en.srt 9.43KB
038 Dictionary Methods 2.mp4 29.64MB
038 Exercise-Repl.url 60B
039 Tuples_en.srt 7.18KB
039 Tuples.mp4 10.35MB
040 Tuple-Methods.url 77B
040 Tuples 2_en.srt 4.13KB
040 Tuples 2.mp4 7.71MB
041 Sets_en.srt 10.11KB
041 Sets.mp4 13.98MB
042 Exercise-Repl.url 54B
042 Sets 2_en.srt 13.48KB
042 Sets 2.mp4 44.54MB
042 Sets-Methods.url 75B
043 Breaking The Flow_en.srt 3.80KB
043 Breaking The Flow.mp4 7.60MB
044 Conditional Logic_en.srt 18.66KB
044 Conditional Logic.mp4 59.51MB
045 Indentation In Python_en.srt 6.72KB
045 Indentation In Python.mp4 14.39MB
046 Truthy vs Falsey_en.srt 8.04KB
046 Truthy vs Falsey.mp4 43.33MB
046 Truthy-vs-Falsey-Stackoverflow.url 133B
047 Ternary Operator_en.srt 5.71KB
047 Ternary Operator.mp4 8.55MB
048 Short Circuiting_en.srt 5.72KB
048 Short Circuiting.mp4 8.39MB
049 Logical Operators_en.srt 10.11KB
049 Logical Operators.mp4 17.14MB
050 Exercise Logical Operators_en.srt 10.28KB
050 Exercise Logical Operators.mp4 24.34MB
051 is vs ==_en.srt 10.20KB
051 is vs ==.mp4 21.20MB
052 For Loops_en.srt 11.49KB
052 For Loops.mp4 17.00MB
053 Iterables_en.srt 8.90KB
053 Iterables.mp4 34.33MB
054 Exercise Tricky Counter_en.srt 4.91KB
054 Exercise Tricky Counter.mp4 9.55MB
054 Solution-Repl.url 55B
055 range()_en.srt 7.67KB
055 range().mp4 21.84MB
056 enumerate()_en.srt 5.96KB
056 enumerate().mp4 11.78MB
057 While Loops_en.srt 9.36KB
057 While Loops.mp4 14.35MB
058 While Loops 2_en.srt 7.96KB
058 While Loops 2.mp4 11.78MB
059 break, continue, pass_en.srt 6.44KB
059 break, continue, pass.mp4 9.55MB
060 Exercise-Repl.url 62B
060 Our First GUI_en.srt 12.16KB
060 Our First GUI.mp4 49.12MB
060 Solution-Repl.url 62B
061 DEVELOPER FUNDAMENTALS IV_en.srt 12.33KB
061 DEVELOPER FUNDAMENTALS IV.mp4 25.56MB
062 Exercise Find Duplicates_en.srt 5.21KB
062 Exercise Find Duplicates.mp4 10.65MB
062 Solution-Repl.url 65B
063 Functions_en.srt 11.16KB
063 Functions.mp4 21.82MB
064 Parameters and Arguments_en.srt 6.19KB
064 Parameters and Arguments.mp4 11.70MB
065 Default Parameters and Keyword Arguments_en.srt 7.66KB
065 Default Parameters and Keyword Arguments.mp4 18.61MB
066 return_en.srt 18.38KB
066 return.mp4 33.61MB
067 Methods vs Functions_en.srt 6.93KB
067 Methods vs Functions.mp4 30.78MB
068 Docstrings_en.srt 6.00KB
068 Docstrings.mp4 10.62MB
069 Clean Code_en.srt 7.30KB
069 Clean Code.mp4 9.04MB
070 args and kwargs_en.srt 9.84KB
070 args and kwargs.mp4 22.07MB
071 Exercise Functions_en.srt 5.92KB
071 Exercise Functions.mp4 23.21MB
071 Solution-Repl.url 71B
072 Scope_en.srt 5.56KB
072 Scope.mp4 8.27MB
073 Scope Rules_en.srt 10.44KB
073 Scope Rules.mp4 19.53MB
074 global Keyword_en.srt 9.00KB
074 global Keyword.mp4 22.05MB
075 nonlocal Keyword_en.srt 5.00KB
075 nonlocal Keyword.mp4 9.62MB
075 Solution-Repl.url 58B
076 Why Do We Need Scope_en.srt 5.92KB
076 Why Do We Need Scope.mp4 10.79MB
077 Modules in Python_en.srt 17.71KB
077 Modules in Python.mp4 73.08MB
078 Quick Note Upcoming Videos.html 479B
079 Optional PyCharm_en.srt 13.00KB
079 Optional PyCharm.mp4 38.28MB
080 Packages in Python_en.srt 15.09KB
080 Packages in Python.mp4 65.56MB
081 Different Ways To Import_en.srt 9.89KB
081 Different Ways To Import.mp4 24.71MB
external-links.txt 175B
external-links.txt 115B
external-links.txt 420B
external-links.txt 2.02KB
external-links.txt 156B
external-links.txt 63B