|
Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
| 001_Welcome to Machine Learning for Red Team Hackers!.mp4 |
21.31MB |
| 001 - Backup and Restore Part 1.mp4 |
63.25MB |
| 001 - Concise History of Linux.mp4 |
98.78MB |
| 001 - Introduction.mp4 |
193.27MB |
| 001 - Introduction.mp4 |
94.12MB |
| 001 - Introduction.mp4 |
23.10MB |
| 001 - Introduction to ITIL 4.mp4 |
25.33MB |
| 001 - Introduction to Linux Users.mp4 |
14.60MB |
| 001 - Introduction to Vulnerability Management.mp4 |
38.91MB |
| 001 - Introduction to x86 Assembly What are Computer Instruction Sets (ISA).mp4 |
24.65MB |
| 001 - Mobile Forensics a.mp4 |
139.30MB |
| 001 - Project Management Overview Part 1.mp4 |
200.54MB |
| 001 - Secure Software Design.mp4 |
83.81MB |
| 001 - Security Models Part 1.mp4 |
67.94MB |
| 001 - Welcome to Introduction to Cryptography!.mp4 |
32.52MB |
| 001 - Welcome to SIEM Architecture and Process.mp4 |
13.65MB |
| 001 - Welcome to the OWASP Top Ten Path!.mp4 |
29.75MB |
| 001 - Welcome to Web Server Protection!.mp4 |
50.41MB |
| 001 - What is the registry and why it is important.mp4 |
16.89MB |
| 002_Introduction to Machine Learning for Red Team Hackers.mp4 |
29.09MB |
| 002 - Analyzing an iOS App.mp4 |
111.61MB |
| 002 - Backup and Restore Part 2.mp4 |
55.14MB |
| 002 - Course Introduction.mp4 |
1.57MB |
| 002 - Exam Fundamentals.mp4 |
27.95MB |
| 002 - Governance Overview.mp4 |
42.66MB |
| 002 - Introduction to SIEM.mp4 |
33.24MB |
| 002 - Introduction to the Web.mp4 |
15.95MB |
| 002 - Mobile Forensics b.mp4 |
125.77MB |
| 002 - Project Management Overview Part 2.mp4 |
206.09MB |
| 002 - Risk One - Injection.mp4 |
60.84MB |
| 002 - Secure SDLC.mp4 |
66.50MB |
| 002 - Security Models Part 2.mp4 |
84.49MB |
| 002 - Setting FileGroup Permissions.mp4 |
16.31MB |
| 002 - Setting Up Your Environment.mp4 |
48.83MB |
| 002 - Structure of the Windows Registry.mp4 |
10.09MB |
| 002 - Tasks and Knowledge Statement.mp4 |
138.89MB |
| 002 - Virtual Box and Virtual Machines.mp4 |
6.68MB |
| 002 - x86 History History and Origin of the x86 Instruction Set.mp4 |
7.42MB |
| 003 - 4th Industrial Revolution.mp4 |
14.97MB |
| 003 - Binary Analysis.mp4 |
90.76MB |
| 003 - Business Goals and Objectives.mp4 |
47.18MB |
| 003 - Change Control.mp4 |
58.50MB |
| 003 - Client-Server Model.mp4 |
15.21MB |
| 003 - Downloading Virtual Box and Kali Linux.mp4 |
59.95MB |
| 003 - Injection Demo.mp4 |
7.93MB |
| 003 - Introduction to Cryptography.mp4 |
9.82MB |
| 003 - Mobile Forensics c.mp4 |
165.76MB |
| 003 - Project Management Overview Part 3.mp4 |
265.72MB |
| 003 - Security Models Part 3.mp4 |
70.57MB |
| 003 - Self-Assessment Questions.mp4 |
33.40MB |
| 003 - Special File Permissions and using 'sticky bit'.mp4 |
12.51MB |
| 003 - Tape Archive Files.mp4 |
78.42MB |
| 003 - The Adoption of SIEM.mp4 |
23.77MB |
| 003 - Vulnerability Management Process.mp4 |
16.24MB |
| 003 - x86 Usage How and Where x86 is Used.mp4 |
3.41MB |
| 004_CAPTCHA Breaking.mp4 |
1.98MB |
| 004_Security Modes.mp4 |
30.90MB |
| 004_Service Organizations.mp4 |
25.31MB |
| 004 - Assembly and Syntax What x86 Assembly Looks Like and the Syntax Used to Write It.mp4 |
8.74MB |
| 004 - Classifying Cryptosystems.mp4 |
13.73MB |
| 004 - Common Protocols.mp4 |
27.14MB |
| 004 - Configure Kali Linux in Virtual Box, Part 1.mp4 |
56.95MB |
| 004 - Develop a Plan.mp4 |
43.88MB |
| 004 - Mobile Forensics d.mp4 |
174.36MB |
| 004 - Overview.mp4 |
12.68MB |
| 004 - Project Management Overview Part 4.mp4 |
73.27MB |
| 004 - Risk Two - Broken Authentication.mp4 |
82.88MB |
| 004 - Scheduling Tasks.mp4 |
73.58MB |
| 004 - Setting Up the Device.mp4 |
61.03MB |
| 004 - SIEM Technologies.mp4 |
31.25MB |
| 004 - Special File Permissions and using SUID GUID.mp4 |
24.36MB |
| 004 - Threat Modeling.mp4 |
38.65MB |
| 005_Reconnaissance.mp4 |
16.08MB |
| 005_Roles and Responsibilities.mp4 |
64.60MB |
| 005 - Configure Kali Linux in Virtual Box, Part 2.mp4 |
219.04MB |
| 005 - Cron Command Part 1.mp4 |
65.84MB |
| 005 - Data Representation How Data is Represented in x86.mp4 |
26.64MB |
| 005 - Evaluation Models.mp4 |
52.42MB |
| 005 - iOS App Security Measures.mp4 |
106.80MB |
| 005 - Principles of Cryptography.mp4 |
15.96MB |
| 005 - Questions and Answers.mp4 |
16.16MB |
| 005 - Risk Identification Frameworks.mp4 |
167.62MB |
| 005 - Risk Three - Sensitive Data Exposure.mp4 |
81.74MB |
| 005 - Role of the Project Manager.mp4 |
69.50MB |
| 005 - Special File Permissions and using Sudo.mp4 |
20.91MB |
| 005 - TCPIP.mp4 |
24.64MB |
| 005 - Viewing the live registry with RegEdit.mp4 |
16.57MB |
| 005 - Vulnerability Analysis and Resolution.mp4 |
34.99MB |
| 006_Constructing a Dataset.mp4 |
29.57MB |
| 006 - Assessing and Improving.mp4 |
11.72MB |
| 006 - Cron Command Part 2.mp4 |
49.45MB |
| 006 - DNS.mp4 |
22.42MB |
| 006 - Initiating Process Group.mp4 |
21.10MB |
| 006 - Insecure Data Storage.mp4 |
26.27MB |
| 006 - Installing SIEM.mp4 |
20.58MB |
| 006 - Mathematics of Crpytography.mp4 |
12.04MB |
| 006 - Methods to Identify Risk.mp4 |
97.32MB |
| 006 - New Installation.mp4 |
24.49MB |
| 006 - Rainbow Series.mp4 |
27.31MB |
| 006 - Registers What Registers are Available on x86 and How are They Used.mp4 |
21.78MB |
| 006 - Risk Four - XXE.mp4 |
68.78MB |
| 006 - Risk Management and IS Roles and Responsibilities.mp4 |
30.99MB |
| 006 - Service Management.mp4 |
12.49MB |
| 006 - Software needed to examine the Registry.mp4 |
33.34MB |
| 006 - What is ssh and why is it so important to Linux.mp4 |
27.05MB |
| 007_Preprocessing the Dataset.mp4 |
54.48MB |
| 007 - Automated Vulnerability Scanners.mp4 |
27.70MB |
| 007 - Commands in Bash.mp4 |
5.62MB |
| 007 - Common Criteria.mp4 |
54.94MB |
| 007 - Develop Project Charter.mp4 |
122.42MB |
| 007 - HTTP.mp4 |
36.01MB |
| 007 - Locating the Registry Files within the Windows Filesystem.mp4 |
60.16MB |
| 007 - Memory Access How to Access Different Locations and Sizes of Memory.mp4 |
12.38MB |
| 007 - Performance Monitoring Part 1.mp4 |
47.54MB |
| 007 - Risk Five - Broken Access Control.mp4 |
63.00MB |
| 007 - Runtime Manipulation.mp4 |
127.62MB |
| 007 - SIEM Architecture.mp4 |
51.50MB |
| 007 - SSH is great, but how do we make it more secure.mp4 |
42.41MB |
| 007 - Structures of Cryptography.mp4 |
20.38MB |
| 007 - Third-Party Relationships.mp4 |
16.55MB |
| 007 - Threats and Vulnerabilities.mp4 |
170.22MB |
| 007 - Value.mp4 |
18.83MB |
| 008_Training a Deep Neural Network.mp4 |
31.76MB |
| 008 - Addressing Modes How to Address Memory, Data and Registers.mp4 |
16.75MB |
| 008 - Assets and Processes.mp4 |
147.49MB |
| 008 - Basic Linux Commands.mp4 |
528.07MB |
| 008 - Certification and Accreditation.mp4 |
29.89MB |
| 008 - Effective Metrics.mp4 |
87.81MB |
| 008 - Fundamentals of Symmetric Cryptography.mp4 |
8.30MB |
| 008 - HTTPS.mp4 |
32.11MB |
| 008 - Identify Stakeholders.mp4 |
105.21MB |
| 008 - Locating and Interpreting Registry Values.mp4 |
71.60MB |
| 008 - Navigating SIEM.mp4 |
52.95MB |
| 008 - OpenVAS Demonstration.mp4 |
29.94MB |
| 008 - Organizations and People.mp4 |
33.69MB |
| 008 - Performance Monitoring Part 2.mp4 |
52.47MB |
| 008 - Risk Six - Security Misconfiguration.mp4 |
68.57MB |
| 008 - TCP Wrappers.mp4 |
20.01MB |
| 008 - URL Schemes.mp4 |
72.87MB |
| 009_Building a CAPTCHA Breaking Bot.mp4 |
17.18MB |
| 009 - Block Ciphers.mp4 |
25.40MB |
| 009 - Data Collection.mp4 |
28.71MB |
| 009 - Firewalls.mp4 |
74.75MB |
| 009 - Grep.mp4 |
272.33MB |
| 009 - Hiding your SSH (or other daemons) with knockd.mp4 |
25.09MB |
| 009 - IT Risk Scenarios.mp4 |
122.63MB |
| 009 - Planning Process Group.mp4 |
18.63MB |
| 009 - Recent Docs.mp4 |
43.85MB |
| 009 - Risk Seven - XSS.mp4 |
72.32MB |
| 009 - Services and Products.mp4 |
26.06MB |
| 009 - Side Channel Data Leakage.mp4 |
39.88MB |
| 009 - Strategy Development.mp4 |
71.83MB |
| 009 - System Monitoring.mp4 |
50.86MB |
| 009 - Vulnerabilities.mp4 |
15.85MB |
| 009 - Web Servers.mp4 |
24.61MB |
| 009 - x86 Instructions Overview of the Most Common x86 Instructions.mp4 |
86.09MB |
| 010 - Analyzing Network Traffic.mp4 |
49.69MB |
| 010 - Develop Project Management Plan.mp4 |
79.73MB |
| 010 - DMZ.mp4 |
80.99MB |
| 010 - Linux Ports, Daemons and port scanning.mp4 |
10.63MB |
| 010 - Logging and Text File Commands Part 1.mp4 |
72.46MB |
| 010 - Manual Verification.mp4 |
67.37MB |
| 010 - My First Log.mp4 |
52.25MB |
| 010 - Ownership and Accountability.mp4 |
73.74MB |
| 010 - Risk Eight - Insecure Deserialization.mp4 |
53.12MB |
| 010 - Service Offerings.mp4 |
30.97MB |
| 010 - Strategy Goal, Objective and Desired State.mp4 |
129.30MB |
| 010 - Symbols and Characters.mp4 |
298.09MB |
| 010 - The Advanced Encryption Standard (AES).mp4 |
19.53MB |
| 010 - The Cloud.mp4 |
21.78MB |
| 010 - Typed URLs.mp4 |
25.89MB |
| 010 - Your First x86 Program How to Build Your First x86 Program.mp4 |
29.48MB |
| 011_What is Fuzzing.mp4 |
4.89MB |
| 011 - Broken Cryptography.mp4 |
13.02MB |
| 011 - CDN.mp4 |
23.06MB |
| 011 - Current State of Security.mp4 |
23.07MB |
| 011 - Data Processing.mp4 |
31.52MB |
| 011 - Honeypots.mp4 |
42.44MB |
| 011 - If Else Elif, Part 1.mp4 |
112.54MB |
| 011 - Input and Output x86 System Calls.mp4 |
31.09MB |
| 011 - Logging and Text File Commands Part 2.mp4 |
42.87MB |
| 011 - Manual Verification - Metasploit.mp4 |
80.63MB |
| 011 - More about ports on Linux.mp4 |
24.92MB |
| 011 - Plan Scope Management.mp4 |
65.98MB |
| 011 - Risk Capacity, Risk Appetite, Risk Tolerance and Risk Awareness.mp4 |
64.54MB |
| 011 - Risk Nine - Using Components with Known Vulnerabilities.mp4 |
60.03MB |
| 011 - Service Relationships.mp4 |
23.34MB |
| 011 - Stream Ciphers.mp4 |
10.56MB |
| 011 - UserAssist.mp4 |
151.88MB |
| 012_Basic Fuzzing and Code Coverage.mp4 |
23.86MB |
| 012 - Automated Testing.mp4 |
25.44MB |
| 012 - Collect Requirements.mp4 |
149.21MB |
| 012 - Data Processing - Hands On.mp4 |
55.48MB |
| 012 - Endpoint Security.mp4 |
24.66MB |
| 012 - If Else Elif, Part 2.mp4 |
164.72MB |
| 012 - LAB Hello World! Creating the Usual Hello World in x86.mp4 |
39.64MB |
| 012 - Outcomes.mp4 |
46.90MB |
| 012 - Prioritizing Vulnerabilities.mp4 |
24.42MB |
| 012 - Recent Apps.mp4 |
49.28MB |
| 012 - Risk Ten - Insufficient Logging and Monitoring.mp4 |
49.74MB |
| 012 - Rivest Cipher 4 (RC4).mp4 |
8.66MB |
| 012 - Strategy Elements.mp4 |
63.71MB |
| 012 - Tasks and Knowledge Statements.mp4 |
61.10MB |
| 012 - Text Manipulation Part 1.mp4 |
105.32MB |
| 012 - Web Server Security.mp4 |
35.02MB |
| 012 - What is SSL and what is it good for.mp4 |
11.59MB |
| 013_Mutation.mp4 |
27.07MB |
| 013 - Costs.mp4 |
12.72MB |
| 013 - Data Enrichment.mp4 |
20.46MB |
| 013 - Define Scope.mp4 |
64.57MB |
| 013 - Demo of HTTP vs. HTTPS.mp4 |
10.01MB |
| 013 - Elif Ladder.mp4 |
353.83MB |
| 013 - Firewalls.mp4 |
15.34MB |
| 013 - IDS.mp4 |
67.72MB |
| 013 - Introduction to Asymmetric Cryptography.mp4 |
22.23MB |
| 013 - IS Resources.mp4 |
114.02MB |
| 013 - OWASP Top Ten - Scenarios.mp4 |
17.08MB |
| 013 - Remediation.mp4 |
46.62MB |
| 013 - Risk Identification vs Risk Assessment.mp4 |
19.24MB |
| 013 - Run and Run Once.mp4 |
13.68MB |
| 013 - Secure Coding Guidelines.mp4 |
28.09MB |
| 013 - StringsASCII How to Work with Strings and ASCII in x86.mp4 |
13.54MB |
| 013 - Text Manipulation Part 2.mp4 |
81.81MB |
| 014_How to Write Your Own Evolutionary Fuzzer.mp4 |
56.76MB |
| 014 - Analyzing Risk Scenarios.mp4 |
144.16MB |
| 014 - Authentication Protocols.mp4 |
29.86MB |
| 014 - ComDIg32 Subkey.mp4 |
32.40MB |
| 014 - Condition Codes How x86 Handles Condition Codes Generated by the CPU and Why They Matter.mp4 |
44.50MB |
| 014 - Create WBS.mp4 |
103.47MB |
| 014 - Data Enrichment - Real Example.mp4 |
37.67MB |
| 014 - For Loops, Part 1.mp4 |
81.02MB |
| 014 - IS Constraints.mp4 |
68.28MB |
| 014 - Load Balancers.mp4 |
19.48MB |
| 014 - Risks.mp4 |
27.05MB |
| 014 - Rivest-Shamir-Adleman (RSA).mp4 |
9.51MB |
| 014 - Setting up the VM.mp4 |
20.33MB |
| 014 - Text Manipulation Part 3.mp4 |
61.04MB |
| 014 - TLS certs from Let’s Encrypt.mp4 |
23.77MB |
| 014 - Web Application Vulnerabilities.mp4 |
119.12MB |
| 015_Fuzzing with AFL.mp4 |
23.98MB |
| 015 - Current State of Controls.mp4 |
224.96MB |
| 015 - Data Indexing.mp4 |
27.59MB |
| 015 - Debugging Debugging Your First x86 Program with GDB.mp4 |
44.32MB |
| 015 - Diffie-Hellman Key Exchange.mp4 |
6.79MB |
| 015 - For Loops, Part 2.mp4 |
87.10MB |
| 015 - Frameworks.mp4 |
82.59MB |
| 015 - Implementation Action Plan Development.mp4 |
153.32MB |
| 015 - Lab 1 Local File Inclusion (LFI) walkthrough.mp4 |
204.94MB |
| 015 - Linux Overview Part 1.mp4 |
56.32MB |
| 015 - Plan Schedule Management.mp4 |
55.54MB |
| 015 - Run MRU Subkey.mp4 |
24.25MB |
| 015 - Setting up the Emulator.mp4 |
40.53MB |
| 015 - TLS self-signed cert.mp4 |
12.35MB |
| 015 - Utility and Warranty.mp4 |
21.50MB |
| 015 - VPN and VLAN.mp4 |
61.47MB |
| 015 - Web Application Firewall.mp4 |
44.37MB |
| 016_Assignment FuzzMe video.mp4 |
1.42MB |
| 016 - Define Activities.mp4 |
48.93MB |
| 016 - Digital Signatures.mp4 |
12.28MB |
| 016 - Firewalls for Linux (Layer 3).mp4 |
16.74MB |
| 016 - For Loops, Part 3.mp4 |
66.57MB |
| 016 - Four Dimensions of Service Management.mp4 |
5.34MB |
| 016 - Intrusion Detection and Prevention Systems (IDPS).mp4 |
44.25MB |
| 016 - IS Program Objectives.mp4 |
84.44MB |
| 016 - Lab 2 Secure Coding walkthrough.mp4 |
394.70MB |
| 016 - Linux Overview Part 2.mp4 |
58.36MB |
| 016 - ObjDump How to Use the Tool ObjDump with x86.mp4 |
5.50MB |
| 016 - Reversing Android Applications.mp4 |
94.78MB |
| 016 - Risk Analysis Methodologies.mp4 |
198.72MB |
| 016 - Typed Paths Subkey.mp4 |
22.37MB |
| 016 - Use Cases.mp4 |
27.26MB |
| 016 - Vulnerability Management Summary.mp4 |
134.46MB |
| 017 - Business-Related Risk, Enterprise Architecture and Data Management.mp4 |
111.42MB |
| 017 - Distributed and Cloud Computing.mp4 |
60.19MB |
| 017 - Elliptic Curve Cryptography.mp4 |
6.06MB |
| 017 - File Integrity Monitoring.mp4 |
16.31MB |
| 017 - For Loops, Part 4.mp4 |
106.07MB |
| 017 - Information and Technology.mp4 |
37.48MB |
| 017 - Installing Linux.mp4 |
59.41MB |
| 017 - Introduction to Drozer.mp4 |
52.25MB |
| 017 - Lab 3 Web Application Firewall (WAF) walkthrough.mp4 |
234.53MB |
| 017 - Microsoft Office Applications and the MRU Subkey.mp4 |
18.65MB |
| 017 - Risk Management Overview.mp4 |
39.06MB |
| 017 - Searching for Data.mp4 |
47.93MB |
| 017 - Segmentation Faults How to Diagnose and Locate Segmentation Faults in x86.mp4 |
7.38MB |
| 017 - Sequence Activities.mp4 |
125.48MB |
| 017 - WAF Firewall (Layer 7).mp4 |
16.49MB |
| 018_Evading Machine Learning Malware Classifiers Overview.mp4 |
5.97MB |
| 018 - Building Dashboards.mp4 |
22.76MB |
| 018 - Demo of Modescurity.mp4 |
16.03MB |
| 018 - Directory Organization Part 1.mp4 |
46.54MB |
| 018 - Estimate Activity Durations.mp4 |
153.77MB |
| 018 - Exploiting Android Components.mp4 |
134.32MB |
| 018 - Introduction to Hash Functions.mp4 |
5.45MB |
| 018 - LAB x86 Debugging Lab to Debug an x86 Program.mp4 |
14.30MB |
| 018 - Multitier Architecture.mp4 |
28.66MB |
| 018 - New Threats and Vulnerabilities, Emerging Technologies and Industry Trends.mp4 |
29.66MB |
| 018 - Partners and Suppliers.mp4 |
45.26MB |
| 018 - Strategy, Communication, and Risk Awareness.mp4 |
38.22MB |
| 018 - Virtualization.mp4 |
76.57MB |
| 018 - While Loops.mp4 |
270.70MB |
| 018 - Windows Search Function and the Wordwheel Query.mp4 |
36.13MB |
| 019_Meet a Machine Learning Classifier.mp4 |
21.86MB |
| 019 - Business Requirements.mp4 |
15.68MB |
| 019 - Collision Resistance.mp4 |
13.82MB |
| 019 - Control Flow How to Control the Flow of a Program in x86.mp4 |
30.32MB |
| 019 - Develop Schedule Part 1.mp4 |
196.58MB |
| 019 - Directory Organization Part 2.mp4 |
56.21MB |
| 019 - Effective Information Risk Management.mp4 |
28.97MB |
| 019 - Filtering Noise.mp4 |
32.14MB |
| 019 - Frida.mp4 |
49.61MB |
| 019 - Generating Passwords, Part 1.mp4 |
57.07MB |
| 019 - Host IDS with OSSEC.mp4 |
12.13MB |
| 019 - SAM File Overview.mp4 |
14.00MB |
| 019 - Third Party Management.mp4 |
49.01MB |
| 019 - Value Streams and Processes.mp4 |
24.23MB |
| 019 - Virtualized Networks.mp4 |
52.07MB |
| 020_Modifying PE Files the Easy Way.mp4 |
5.72MB |
| 020 - Basic Security Controls.mp4 |
55.66MB |
| 020 - Creating Reports.mp4 |
17.18MB |
| 020 - Demo of OSSEC.mp4 |
18.73MB |
| 020 - Develop Schedule Part 2.mp4 |
125.16MB |
| 020 - File Management.mp4 |
102.05MB |
| 020 - Generating Passwords, Part 2.mp4 |
86.35MB |
| 020 - Logic Constructs How to Implement Common Logic Constructs such as IfElseLoops in x86.mp4 |
44.93MB |
| 020 - PESTLE.mp4 |
15.93MB |
| 020 - Project and Program Management.mp4 |
48.17MB |
| 020 - Risk Management Concepts.mp4 |
80.57MB |
| 020 - Security Identifiers.mp4 |
14.05MB |
| 020 - The SHA Hash Family.mp4 |
7.17MB |
| 020 - Wireless Networks.mp4 |
105.04MB |
| 021_Evading a Machine Learning Malware Classifier.mp4 |
23.11MB |
| 021 - Alarms.mp4 |
29.17MB |
| 021 - Applying the Four Dimensions.mp4 |
24.56MB |
| 021 - Availability and Exception Management.mp4 |
48.28MB |
| 021 - Build From Scratch or Use Bundle.mp4 |
33.18MB |
| 021 - Host IPS with Fail2Ban.mp4 |
15.06MB |
| 021 - Implementing Risk Management.mp4 |
144.67MB |
| 021 - Introduction to PKI.mp4 |
21.42MB |
| 021 - LAB Programming Lab with x86 Program with Input, Output and Logic Flows.mp4 |
30.73MB |
| 021 - Mobile Systems.mp4 |
92.38MB |
| 021 - Plan Cost Management.mp4 |
63.36MB |
| 021 - Strings and Variables.mp4 |
404.20MB |
| 021 - User Accounts (RIDs).mp4 |
24.87MB |
| 021 - VI Editor.mp4 |
77.46MB |
| 022_Assignment EvadeMe video.mp4 |
2.34MB |
| 022 - Communicating IT Risk Assessment Results.mp4 |
66.54MB |
| 022 - Demo of Fail2Ban.mp4 |
15.31MB |
| 022 - Estimate Costs.mp4 |
116.81MB |
| 022 - If Then, Part 1.mp4 |
281.11MB |
| 022 - Links Part 1.mp4 |
61.26MB |
| 022 - Network Hardening.mp4 |
44.25MB |
| 022 - Password Hashes.mp4 |
7.31MB |
| 022 - Risk Assessment Overview.mp4 |
23.80MB |
| 022 - Security of the PKI Ecosystem.mp4 |
6.72MB |
| 022 - Service Value System.mp4 |
13.22MB |
| 022 - Summation.mp4 |
12.83MB |
| 022 - WAN Technologies.mp4 |
74.67MB |
| 023 - Aligning Risk Response with Business Objectives.mp4 |
11.51MB |
| 023 - Determine Budget.mp4 |
98.99MB |
| 023 - Host Hardening.mp4 |
54.06MB |
| 023 - If Then, Part 2.mp4 |
146.12MB |
| 023 - Introduction to TLSSSL.mp4 |
13.08MB |
| 023 - Links Part 2.mp4 |
73.30MB |
| 023 - Opportunity, Demand and Value.mp4 |
25.99MB |
| 023 - Other Types of User Accounts.mp4 |
42.56MB |
| 023 - Remote Access.mp4 |
61.03MB |
| 023 - Risk Assessment Methodology.mp4 |
332.15MB |
| 023 - What is PGPGPG and what is it good for.mp4 |
15.51MB |
| 024_Adversarial Machine Learning.mp4 |
13.19MB |
| 024 - Asset Classification Overview.mp4 |
37.69MB |
| 024 - Attacking TLSSSL.mp4 |
31.54MB |
| 024 - Choosing Risk Response Options.mp4 |
152.73MB |
| 024 - Demo of GPG.mp4 |
24.07MB |
| 024 - File Information Part 1.mp4 |
73.31MB |
| 024 - Governance.mp4 |
11.14MB |
| 024 - If Else Elif.mp4 |
435.20MB |
| 024 - Plan Quality Management.mp4 |
124.49MB |
| 024 - Secure Communication Protocols.mp4 |
81.76MB |
| 024 - Software File Subkeys of Interest.mp4 |
77.29MB |
| 024 - Web Server Configuration Hardening.mp4 |
38.49MB |
| 025_White-Box Attacks on Machine Learning.mp4 |
21.87MB |
| 025 - Applications Hardening.mp4 |
19.12MB |
| 025 - BIA Key Metrics.mp4 |
62.31MB |
| 025 - Developing a Risk Action Plan.mp4 |
84.74MB |
| 025 - File Information Part 2.mp4 |
51.76MB |
| 025 - Guiding Principles.mp4 |
16.24MB |
| 025 - Introduction and Demonstration of For Loops.mp4 |
212.23MB |
| 025 - Introduction to VPNs.mp4 |
17.27MB |
| 025 - Network List Subkey.mp4 |
28.81MB |
| 025 - Plan Resource Management.mp4 |
73.41MB |
| 025 - TCB.mp4 |
17.68MB |
| 025 - What is SELinux and what does it do.mp4 |
21.09MB |
| 026_Getting Started with Clarif.AI.mp4 |
22.12MB |
| 026 - Business Process Review.mp4 |
40.95MB |
| 026 - Computer Components.mp4 |
62.16MB |
| 026 - Connected Devices.mp4 |
20.35MB |
| 026 - Demo of SELinux.mp4 |
48.12MB |
| 026 - Estimate Activity Resources.mp4 |
80.11MB |
| 026 - Focus on Value.mp4 |
18.34MB |
| 026 - For Loop Demonstration, continued.mp4 |
282.66MB |
| 026 - Locating Files.mp4 |
77.32MB |
| 026 - Third Party Service Providers.mp4 |
42.95MB |
| 026 - VPN Limitations.mp4 |
11.11MB |
| 026 - Whitelisting.mp4 |
27.16MB |
| 027_Black-Box Attack on Clarif.AI.mp4 |
61.15MB |
| 027 - Inherent and Residual Risk.mp4 |
53.31MB |
| 027 - Integration with Life Cycle Processes.mp4 |
22.36MB |
| 027 - Introduction and Demonstration of While Loops.mp4 |
376.97MB |
| 027 - Introduction to Secure Credential Management.mp4 |
2.86MB |
| 027 - Logs.mp4 |
29.86MB |
| 027 - Plan Communications Management.mp4 |
125.73MB |
| 027 - Protection Mechanisms.mp4 |
67.60MB |
| 027 - Removable Storage Part 1.mp4 |
65.03MB |
| 027 - Start Where You Are.mp4 |
38.19MB |
| 027 - System File Subkeys of Interest.mp4 |
99.96MB |
| 027 - Using SCAP and STIGs on Linux.mp4 |
10.40MB |
| 028_Assignment TrickMe video.mp4 |
7.87MB |
| 028 - Common Architecture Flaws.mp4 |
86.93MB |
| 028 - Control Activities, Part 1.mp4 |
99.97MB |
| 028 - Demo of the STIG viewer on Linux.mp4 |
12.13MB |
| 028 - Log Formats.mp4 |
10.84MB |
| 028 - Plan Risk Management.mp4 |
141.01MB |
| 028 - Progress Iteratively with Feedback.mp4 |
32.69MB |
| 028 - Removable Storage Part 2.mp4 |
95.69MB |
| 028 - Securely Managing Credentials.mp4 |
25.12MB |
| 028 - Security Control Baselines.mp4 |
18.56MB |
| 028 - USB Device Forensics.mp4 |
56.64MB |
| 028 - User and Group Management, Part 1.mp4 |
192.67MB |
| 029 - AppCompat Cache and Background Activities Monitor.mp4 |
34.07MB |
| 029 - Case Studies in Poor Password Management.mp4 |
14.78MB |
| 029 - Collaborate and Promote Visibility.mp4 |
26.09MB |
| 029 - Control Activities, Part 2.mp4 |
162.00MB |
| 029 - Demo of the scap-workbench on Linux.mp4 |
16.42MB |
| 029 - Plan Stakeholder Engagement.mp4 |
52.51MB |
| 029 - Risk Monitoring Overview.mp4 |
48.20MB |
| 029 - User and Group Management, Part 2.mp4 |
142.77MB |
| 029 - Users and Groups.mp4 |
72.95MB |
| 029 - Using the Logs.mp4 |
21.48MB |
| 029 - Web-Based Vulnerabilities.mp4 |
69.51MB |
| 030_What is Deepfake.mp4 |
10.74MB |
| 030 - Apache Logs.mp4 |
29.91MB |
| 030 - Covert Channels.mp4 |
48.60MB |
| 030 - Emerging Technologies, Control Ownership, Procedures and Documentation.mp4 |
65.96MB |
| 030 - Identify Risks.mp4 |
94.85MB |
| 030 - Introduction to Full Disk Encryption.mp4 |
5.74MB |
| 030 - Privilege Escalation.mp4 |
57.57MB |
| 030 - ShellBags.mp4 |
34.64MB |
| 030 - Think and Work Holistically.mp4 |
25.82MB |
| 030 - Training and Awareness.mp4 |
23.30MB |
| 030 - User and Group Management, Part 3.mp4 |
95.42MB |
| 031 - Attacking Full Disk Encryption.mp4 |
9.01MB |
| 031 - Documentation.mp4 |
70.44MB |
| 031 - Embedded Systems.mp4 |
47.89MB |
| 031 - File Permission and Process, Part 1.mp4 |
67.45MB |
| 031 - Keep It Simple and Practical.mp4 |
16.19MB |
| 031 - Key Risk Indicators.mp4 |
133.08MB |
| 031 - MuiCache and Managed By App Sub-keys.mp4 |
36.28MB |
| 031 - NGINX Logs.mp4 |
13.85MB |
| 031 - Perform Qualitative Risk Analysis.mp4 |
71.21MB |
| 031 - User Accounts Part 1.mp4 |
53.89MB |
| 032_Deepfake Dry Run.mp4 |
54.77MB |
| 032 - AmCache Hive File Subkeys of Interest.mp4 |
38.31MB |
| 032 - Facility Design.mp4 |
63.75MB |
| 032 - File Permission and Process, Part 2.mp4 |
287.38MB |
| 032 - IIS Logs.mp4 |
17.25MB |
| 032 - Introduction to Blockchain.mp4 |
9.57MB |
| 032 - IS Program Development and Management Overview.mp4 |
81.67MB |
| 032 - Key Performance Indicators.mp4 |
29.03MB |
| 032 - Optimize and Automate.mp4 |
27.63MB |
| 032 - Perform Quantitative Risk Analysis.mp4 |
145.14MB |
| 032 - User Accounts Part 2.mp4 |
69.26MB |
| 033_Setting Up Your Deepfake Rig.mp4 |
37.77MB |
| 033 - AmCache Parser.exe demo.mp4 |
61.93MB |
| 033 - Blockchain and Asymmetric Cryptography.mp4 |
8.56MB |
| 033 - Data Collection and Extraction.mp4 |
61.81MB |
| 033 - Facility Construction.mp4 |
36.23MB |
| 033 - File Permission and Process, Part 3.mp4 |
290.69MB |
| 033 - IS Program Elements.mp4 |
39.52MB |
| 033 - Modifying Users.mp4 |
83.84MB |
| 033 - ModSecurity Logs.mp4 |
32.56MB |
| 033 - Plan Risk Responses.mp4 |
89.23MB |
| 033 - Service Value Chain.mp4 |
25.10MB |
| 034_Assignment Deepfake video.mp4 |
1.63MB |
| 034 - Blockchain and Hash Functions.mp4 |
19.40MB |
| 034 - Changes to IT Risk Profile.mp4 |
108.73MB |
| 034 - Creating, Modifying, and Deleting Groups.mp4 |
48.89MB |
| 034 - Defining IS Program Objectives.mp4 |
15.07MB |
| 034 - HAProxy Logs.mp4 |
13.22MB |
| 034 - Perimeter Defenses.mp4 |
100.98MB |
| 034 - Plan.mp4 |
20.31MB |
| 034 - Plan Procurement Management.mp4 |
184.41MB |
| 034 - VM Downloads.mp4 |
95.95MB |
| 035 - curl.mp4 |
17.54MB |
| 035 - Deleting and Disabling Accounts.mp4 |
42.73MB |
| 035 - Doors and Locks.mp4 |
70.68MB |
| 035 - Improve.mp4 |
19.36MB |
| 035 - Introduction to Cryptanalysis.mp4 |
12.68MB |
| 035 - Network Reconnaissance, Part 1.mp4 |
211.17MB |
| 035 - Planning Processes Summary.mp4 |
68.79MB |
| 035 - Technology Resources.mp4 |
48.55MB |
| 036_Model-Stealing Attacks on Machine Learning.mp4 |
11.71MB |
| 036 - Engage.mp4 |
39.45MB |
| 036 - Entropy Calculations.mp4 |
4.96MB |
| 036 - Executing Process Group.mp4 |
20.46MB |
| 036 - File Ownership Part 1.mp4 |
91.09MB |
| 036 - Internal Facilities Security.mp4 |
117.72MB |
| 036 - Network Reconnaissance, Part 2.mp4 |
47.19MB |
| 036 - OpenSSL.mp4 |
13.88MB |
| 036 - Scope and Charter.mp4 |
31.14MB |
| 037_Machine Learning Poisoning.mp4 |
21.89MB |
| 037 - Character Frequency Analysis.mp4 |
10.11MB |
| 037 - Design and Transition.mp4 |
24.04MB |
| 037 - Direct and Manage Project Work.mp4 |
78.63MB |
| 037 - File Ownership Part 2.mp4 |
94.77MB |
| 037 - grep and egrep.mp4 |
12.93MB |
| 037 - IS Management Framework.mp4 |
72.07MB |
| 037 - Network Reconnaissance, Part 3.mp4 |
296.62MB |
| 037 - Physical Intrusion Detection.mp4 |
107.72MB |
| 038_Backdoor Attacks on Machine Learning Assignment.mp4 |
8.77MB |
| 038 - awk.mp4 |
15.09MB |
| 038 - Encryption vs Encoding.mp4 |
13.14MB |
| 038 - File Ownership Part 3.mp4 |
108.82MB |
| 038 - IS Management Framework Components.mp4 |
61.83MB |
| 038 - Manage Project Knowledge.mp4 |
90.86MB |
| 038 - ObtainBuild.mp4 |
32.21MB |
| 038 - Personnel Safety.mp4 |
33.40MB |
| 039 - Breaking ROT Ciphers.mp4 |
6.63MB |
| 039 - Defining IS Program Road Map.mp4 |
28.45MB |
| 039 - Deliver and Support.mp4 |
23.41MB |
| 039 - jq.mp4 |
12.07MB |
| 039 - Manage Quality.mp4 |
89.13MB |
| 039 - Media Storage.mp4 |
33.24MB |
| 039 - Shell Configuration Part 1.mp4 |
77.78MB |
| 040 - Acquire Resources.mp4 |
55.47MB |
| 040 - Breaking Weak XOR Encryption.mp4 |
7.81MB |
| 040 - cut.mp4 |
8.36MB |
| 040 - IS Infrastructure and Architecture.mp4 |
45.92MB |
| 040 - Shell Configuration Part 2.mp4 |
70.79MB |
| 040 - Utilities and HVAC.mp4 |
95.57MB |
| 040 - Value Streams.mp4 |
9.01MB |
| 040 - Web Applications, Part 1.mp4 |
149.08MB |
| 041 - Architecture Implementation.mp4 |
13.32MB |
| 041 - Breaking Misused Stream Ciphers.mp4 |
6.50MB |
| 041 - Continual Improvement.mp4 |
32.94MB |
| 041 - Develop Team.mp4 |
84.36MB |
| 041 - Fire Safety.mp4 |
86.40MB |
| 041 - Shell Configuration Part 3.mp4 |
84.01MB |
| 041 - sort.mp4 |
12.54MB |
| 041 - Web Applications, Part 2.mp4 |
331.67MB |
| 042 - Change Control.mp4 |
58.50MB |
| 042 - Continual Improvement Model.mp4 |
8.12MB |
| 042 - GUI Configuration Part 1.mp4 |
84.55MB |
| 042 - Manage Team.mp4 |
33.03MB |
| 042 - Summarizing Events.mp4 |
29.14MB |
| 042 - TLS Decryption.mp4 |
19.86MB |
| 042 - Web Applications, Part 3.mp4 |
341.36MB |
| 043 - Decrypting Malware Command and Control.mp4 |
32.28MB |
| 043 - GUI Configuration Part 2.mp4 |
81.29MB |
| 043 - Manage Communications.mp4 |
43.67MB |
| 043 - Management and Administrative Activities.mp4 |
195.15MB |
| 043 - Software Testing.mp4 |
94.80MB |
| 043 - ss and netstat.mp4 |
9.12MB |
| 043 - Web Applications, Part 4.mp4 |
424.04MB |
| 043 - What is the Vision.mp4 |
13.11MB |
| 044 - Decrypting Downloaded Files.mp4 |
23.93MB |
| 044 - GUI Configuration Part 3.mp4 |
72.18MB |
| 044 - Implement Risk Responses.mp4 |
25.62MB |
| 044 - Services and Operational Activities.mp4 |
233.45MB |
| 044 - Software Environment.mp4 |
87.22MB |
| 044 - tcpdump.mp4 |
16.33MB |
| 044 - Where are We Now.mp4 |
10.21MB |
| 045 - Conduct Procurements.mp4 |
48.29MB |
| 045 - Controls and Countermeasures.mp4 |
109.81MB |
| 045 - Graphics Information.mp4 |
89.01MB |
| 045 - Object-Oriented Programming (OOP).mp4 |
45.58MB |
| 045 - Privilege Escalation.mp4 |
427.11MB |
| 045 - testssl.sh.mp4 |
9.01MB |
| 045 - Where Do We Want to Be.mp4 |
13.91MB |
| 046 - base64.mp4 |
12.76MB |
| 046 - Distributed Computing.mp4 |
38.25MB |
| 046 - How Do We Get There.mp4 |
6.81MB |
| 046 - Manage Stakeholder Engagement.mp4 |
56.70MB |
| 046 - Metrics and Monitoring.mp4 |
183.70MB |
| 046 - Package Management Part 1.mp4 |
81.36MB |
| 046 - Privilege Escalation - Git.mp4 |
33.84MB |
| 047 - hexdump and xxd.mp4 |
7.35MB |
| 047 - Mobile Code.mp4 |
48.24MB |
| 047 - Monitoring and Controlling Process Group.mp4 |
15.68MB |
| 047 - Package Management Part 2.mp4 |
74.94MB |
| 047 - Program Challenges.mp4 |
90.52MB |
| 047 - Take Action.mp4 |
5.98MB |
| 048 - Acquired Software.mp4 |
34.24MB |
| 048 - Did We Get There.mp4 |
6.84MB |
| 048 - gzip.mp4 |
21.56MB |
| 048 - Incident Management Introduction.mp4 |
53.18MB |
| 048 - Monitor and Control Project Work.mp4 |
55.08MB |
| 048 - Package Management Part 3.mp4 |
61.57MB |
| 049 - Application Attacks.mp4 |
80.68MB |
| 049 - CyberChef.mp4 |
14.98MB |
| 049 - How Do We Keep the Momentum Going.mp4 |
10.38MB |
| 049 - Incident Management Overview.mp4 |
38.48MB |
| 049 - Package Management Part 4.mp4 |
42.11MB |
| 049 - Perform integrated Change Control.mp4 |
79.74MB |
| 049 - Project Walkthrough.mp4 |
631.09MB |
| 050 - Continual Improvement and the Guiding Principles.mp4 |
17.72MB |
| 050 - Incident Response Procedures.mp4 |
64.84MB |
| 050 - Malware.mp4 |
44.80MB |
| 050 - Managing Libraries Part 1.mp4 |
79.44MB |
| 050 - Validate Scope.mp4 |
46.08MB |
| 050 - Web Application Firewalls for Compliance.mp4 |
18.80MB |
| 051 - Categories of Practices.mp4 |
11.52MB |
| 051 - Control Scope.mp4 |
31.94MB |
| 051 - Incident Management Organization.mp4 |
53.12MB |
| 051 - Managing Libraries Part 2.mp4 |
66.45MB |
| 051 - Recovery Strategy.mp4 |
100.81MB |
| 051 - Web Application Firewalls for Security.mp4 |
34.78MB |
| 052 - Control Schedule.mp4 |
83.09MB |
| 052 - Disk Management Part 1.mp4 |
95.93MB |
| 052 - Incident Management Resources.mp4 |
103.16MB |
| 052 - Management Practices.mp4 |
5.85MB |
| 052 - Recovery Process.mp4 |
129.30MB |
| 052 - Web Application Firewalls False Positives.mp4 |
11.41MB |
| 053 - Control Costs.mp4 |
230.40MB |
| 053 - Disaster Recovery Plan (DRP) Testing.mp4 |
49.52MB |
| 053 - Disk Management Part 2.mp4 |
69.60MB |
| 053 - Incident Management Objectives.mp4 |
33.38MB |
| 053 - Information Security Management.mp4 |
15.57MB |
| 053 - ModSecurity and OWASP CRS.mp4 |
46.45MB |
| 053 - Project Hints.mp4 |
94.80MB |
| 054 - Control Quality.mp4 |
96.53MB |
| 054 - Disk Management Part 3.mp4 |
80.91MB |
| 054 - Metrics and Indicators.mp4 |
30.64MB |
| 054 - ModSecurity Rules.mp4 |
60.54MB |
| 054 - RAID.mp4 |
42.68MB |
| 054 - Relationship Management.mp4 |
8.54MB |
| 055 - Backups.mp4 |
75.91MB |
| 055 - Control Resources.mp4 |
36.05MB |
| 055 - Defining Incident Management Procedures.mp4 |
78.61MB |
| 055 - Mounting File Systems Part 1.mp4 |
88.86MB |
| 055 - Supplier Management.mp4 |
7.50MB |
| 055 - Virtual Patching.mp4 |
11.27MB |
| 056 - Architecture Management.mp4 |
9.76MB |
| 056 - Current State of IR Capability.mp4 |
18.63MB |
| 056 - Log Life Cycle.mp4 |
28.29MB |
| 056 - Monitor Communications.mp4 |
38.61MB |
| 056 - Mounting File Systems Part 2.mp4 |
73.08MB |
| 056 - Network Redundancy.mp4 |
48.99MB |
| 057 - Collecting the Logs.mp4 |
28.52MB |
| 057 - Control Procurements.mp4 |
56.88MB |
| 057 - Developing an IR Plan.mp4 |
106.97MB |
| 057 - Incident Response Plan.mp4 |
83.99MB |
| 057 - Knowledge Management.mp4 |
9.83MB |
| 057 - Virtual File Systems.mp4 |
31.37MB |
| 058 - BC and DR Procedures.mp4 |
228.73MB |
| 058 - Business Impact Analysis (BIA).mp4 |
83.10MB |
| 058 - Disk Usage.mp4 |
107.75MB |
| 058 - Measurement and Reporting.mp4 |
6.58MB |
| 058 - Monitor Risks.mp4 |
42.11MB |
| 058 - Time Stamps.mp4 |
15.69MB |
| 059 - Disk Quotas.mp4 |
97.23MB |
| 059 - Monitor Stakeholder Engagement.mp4 |
44.70MB |
| 059 - Network Security Device Types.mp4 |
37.99MB |
| 059 - Organizational Change Management.mp4 |
6.97MB |
| 059 - Status Codes.mp4 |
22.81MB |
| 059 - Testing IR, BC and DR Plans.mp4 |
97.40MB |
| 060 - Close Project or Phase.mp4 |
64.26MB |
| 060 - Devices.mp4 |
95.78MB |
| 060 - Executing Response and Recovery Plans.mp4 |
19.56MB |
| 060 - Network Security Component Management.mp4 |
86.19MB |
| 060 - Portfolio Management.mp4 |
9.28MB |
| 060 - Profiling the Web Server.mp4 |
29.82MB |
| 061 - Analyze Network-Enabled Devices.mp4 |
97.22MB |
| 061 - Ethics.mp4 |
50.31MB |
| 061 - Post-Incident Activities and Investigation.mp4 |
106.69MB |
| 061 - Processes Part 1.mp4 |
62.35MB |
| 061 - Project Management.mp4 |
8.74MB |
| 061 - Security Onion.mp4 |
51.36MB |
| 062 - Analyze Advanced Network Design.mp4 |
77.26MB |
| 062 - Anomaly Detection.mp4 |
39.23MB |
| 062 - Preparing for the Exam.mp4 |
97.44MB |
| 062 - Processes Part 2.mp4 |
68.97MB |
| 062 - Risk Management.mp4 |
9.34MB |
| 063 - Alerting.mp4 |
19.77MB |
| 063 - Application Process.mp4 |
80.19MB |
| 063 - Network Security Control Topics.mp4 |
73.69MB |
| 063 - Processes Part 3.mp4 |
80.21MB |
| 063 - Service Financial Management.mp4 |
5.79MB |
| 064 - Configure Controls for Network Security.mp4 |
61.67MB |
| 064 - Processes Priority and Execution Part 1.mp4 |
59.26MB |
| 064 - Strategy Management.mp4 |
8.91MB |
| 064 - WebLabyrinth.mp4 |
29.87MB |
| 065 - fail2ban.mp4 |
15.88MB |
| 065 - Processes Priority and Execution Part 2.mp4 |
63.59MB |
| 065 - Select Host Hardware and Software.mp4 |
74.80MB |
| 065 - Workforce and Talent Management.mp4 |
7.68MB |
| 066 - Active Response with fail2ban.mp4 |
36.73MB |
| 066 - Harden Hosts.mp4 |
71.76MB |
| 066 - Kernels Part 1.mp4 |
94.66MB |
| 066 - Service Management Practices.mp4 |
5.20MB |
| 067 - Change Control.mp4 |
35.72MB |
| 067 - Kernels Part 2.mp4 |
91.16MB |
| 067 - Protect Boot Loaders.mp4 |
27.33MB |
| 068 - Incident Management.mp4 |
33.60MB |
| 068 - Networks Part 1.mp4 |
43.19MB |
| 068 - Storage Types.mp4 |
70.15MB |
| 069 - Networks Part 2.mp4 |
67.86MB |
| 069 - Problem Management.mp4 |
19.44MB |
| 069 - Storage Protocols.mp4 |
83.68MB |
| 070 - Addressing Part 1.mp4 |
70.33MB |
| 070 - Implement Secure Storage Controls.mp4 |
73.76MB |
| 070 - Service Desk.mp4 |
32.23MB |
| 071 - Addressing Part 2.mp4 |
61.36MB |
| 071 - Identify General Application Vulnerabilities.mp4 |
86.90MB |
| 071 - Service Level Management.mp4 |
24.40MB |
| 072 - Addressing Part 3.mp4 |
63.57MB |
| 072 - Identify Web Application Vulnerabilities.mp4 |
106.55MB |
| 072 - Service Request Management.mp4 |
30.46MB |
| 073 - Application Security Design.mp4 |
42.71MB |
| 073 - Character Based Names.mp4 |
80.89MB |
| 073 - IT Asset Management.mp4 |
9.05MB |
| 074 - Implement Application Security Controls.mp4 |
123.91MB |
| 074 - Monitoring and Event Management.mp4 |
14.91MB |
| 074 - Networking Services Part 1.mp4 |
74.80MB |
| 075 - General Security Principles.mp4 |
44.37MB |
| 075 - Networking Services Part 2.mp4 |
84.25MB |
| 075 - Release Management.mp4 |
4.25MB |
| 076 - Networking Services Part 3.mp4 |
95.22MB |
| 076 - Risk Management Principles.mp4 |
15.17MB |
| 076 - Service Configuration Management.mp4 |
8.72MB |
| 077 - Availability Management.mp4 |
7.66MB |
| 077 - System Resilience Principles.mp4 |
21.04MB |
| 077 - Time Zones Part 1.mp4 |
74.56MB |
| 078 - Business Analysis.mp4 |
6.63MB |
| 078 - Time Zones Part 2.mp4 |
56.35MB |
| 078 - Vulnerability Management Principles.mp4 |
25.64MB |
| 079 - Capacity and Performance Management.mp4 |
15.32MB |
| 079 - Domain Name Services Part 1.mp4 |
64.63MB |
| 079 - Risk Management Process.mp4 |
72.05MB |
| 080 - Domain Name Services Part 2.mp4 |
78.14MB |
| 080 - Operational Risk Management.mp4 |
57.86MB |
| 080 - Service Catalog Management.mp4 |
6.90MB |
| 081 - Domain Name Services Part 3.mp4 |
88.89MB |
| 081 - Service Continuity Management.mp4 |
10.05MB |
| 081 - Stakeholder Requirements Definition.mp4 |
29.75MB |
| 082 - Domain Name Services Part 4.mp4 |
50.70MB |
| 082 - Requirements Analysis.mp4 |
13.48MB |
| 082 - Service Design.mp4 |
10.96MB |
| 083 - Network File Resources Part 1.mp4 |
71.80MB |
| 083 - Service Validation and Testing.mp4 |
7.21MB |
| 083 - System Security Architecture and Design.mp4 |
23.70MB |
| 084 - Implementation, Integration, and Deployment of Systems or System Modifications.mp4 |
11.70MB |
| 084 - Network File Resources Part 2.mp4 |
68.07MB |
| 084 - Technical Management Practices.mp4 |
4.82MB |
| 085 - Deployment Management.mp4 |
6.49MB |
| 085 - Managing NFS.mp4 |
56.57MB |
| 085 - Verification and Validation of Systems or System Modifications.mp4 |
20.95MB |
| 086 - Infrastructure and Platform Management.mp4 |
6.72MB |
| 086 - Printing.mp4 |
69.40MB |
| 086 - Secure Operations.mp4 |
57.13MB |
| 087 - Accessibility.mp4 |
69.14MB |
| 087 - Secure Maintenance.mp4 |
25.75MB |
| 087 - Software Development and Management.mp4 |
4.58MB |
| 088 - Localization Part 1.mp4 |
84.87MB |
| 088 - Putting It All Together.mp4 |
27.48MB |
| 088 - Secure Disposal.mp4 |
15.05MB |
| 089 - Acquisition Process.mp4 |
32.52MB |
| 089 - Conclusion.mp4 |
11.92MB |
| 089 - Localization Part 2.mp4 |
79.63MB |
| 090 - ITIL Certification Path.mp4 |
13.27MB |
| 090 - System Development Methodologies.mp4 |
7.72MB |
| 090 - System Security Part 1.mp4 |
83.09MB |
| 091 - System Security Part 2.mp4 |
72.51MB |
| 091 - Technical Management Processes.mp4 |
64.92MB |
| 092 - Network Security Part 1.mp4 |
75.77MB |
| 093 - Network Security Part 2.mp4 |
93.18MB |
| 094 - Network Security Part 3.mp4 |
57.40MB |
| 095 - Network Security Part 4.mp4 |
77.26MB |
| 096 - Network Security Part 5.mp4 |
74.79MB |
| 097 - Network Security Part 6.mp4 |
82.29MB |
| 098 - Network Security Part 7.mp4 |
87.07MB |
| 099 - Web Services Part 1.mp4 |
78.13MB |
| 1.2_Code Repository.txt |
93B |
| 100 - Web Services Part 2.mp4 |
74.69MB |
| 101 - Web Services Part 3.mp4 |
66.80MB |
| 102 - MySQL.mp4 |
65.49MB |
| 103 - SQL Part 1.mp4 |
74.94MB |
| 104 - SQL Part 2.mp4 |
74.10MB |
| 105 - FTP Services Part 1.mp4 |
71.46MB |
| 106 - FTP Services Part 2.mp4 |
72.62MB |
| 107 - FTP Services Part 3.mp4 |
70.94MB |
| 108 - SSH Part 1.mp4 |
81.76MB |
| 109 - SSH Part 2.mp4 |
70.55MB |
| 110 - Configuring E-Mail Part 1.mp4 |
81.70MB |
| 111 - Configuring E-Mail Part 2.mp4 |
90.58MB |
| 112 - Booting Part 1.mp4 |
76.42MB |
| 113 - Booting Part 2.mp4 |
59.46MB |
| 114 - Run Levels Part 1.mp4 |
92.70MB |
| 115 - Run Levels Part 2.mp4 |
90.75MB |
| 116 - Network Troubleshooting Part 1.mp4 |
66.48MB |
| 117 - Network Troubleshooting Part 2.mp4 |
67.90MB |
| 118 - Scripting Part 1.mp4 |
73.25MB |
| 119 - Scripting Part 2.mp4 |
85.80MB |
| 120 - Scripting Part 3.mp4 |
81.31MB |
| 121 - Scripting Part 4.mp4 |
54.85MB |
| 122 - Text Stream Utilities.mp4 |
36.00MB |
| 123 - Graphical User Interfaces Part 1.mp4 |
60.72MB |
| 124 - Graphical User Interfaces Part 2.mp4 |
61.76MB |
| 125 - Command Line Linux Part 1.mp4 |
76.98MB |
| 126 - Command Line Linux Part 2.mp4 |
69.98MB |
| 127 - Command Line Linux Part 3.mp4 |
93.15MB |
| 128 - Getting Help.mp4 |
86.77MB |
| 6.2_DeepfakeCrime.txt |
251B |
| Challenge Questions Kioptrix2.pdf |
41.79KB |
| CISM Supplemental Materials - IR and BC Management.pdf |
116.09KB |
| CISM Supplemental Materials - IS Governance.pdf |
120.72KB |
| CISM Supplemental Materials - Security Program Architecture.pdf |
101.27KB |
| Course8 Payload links.pdf |
18.48KB |
| IPSec VPN.pdf |
78.69KB |
| IS Skills Purple Team Web App Security Project Solutions.pdf |
192.75KB |
| Kioptrix2 Challenge Questions with Answers.pdf |
54.33KB |
| ML Challenge #1_ CAPTCHA.docx |
6.37KB |
| ML Challenge #2_ FuzzMe.docx |
6.43KB |
| ML Challenge #3_ EvadeMe.docx |
6.43KB |
| ML Challenge #4_ TrickMe.docx |
6.51KB |
| ML Challenge #5_ DeepFake.docx |
6.29KB |
| ML Challenge #6_ Backdoor Attack.docx |
6.54KB |
| OBS Kioptrix Level 01.zip |
243.96MB |
| OBS Kioptrix Level 4.zip |
298.48MB |
| OBS Project KioptrixLevel2.zip |
539.49MB |
| OBS VulnhubVMlinks.pdf |
25.81KB |
| OBS Windows10 link.pdf |
16.38KB |
| Offensive Bash Kioptrix2 Resources.pdf |
37.62KB |
| Purple Team Web Application Security Project Files.zip |
5.14GB |
| Study Guide (ITIL 4 Foundation).pdf |
11.33MB |
| Windows Registry Forensics Class Tools.pdf |
13.85KB |
| Windows Registry Forensics VM.zip |
19.77GB |