|
Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
| [FreeCoursesOnline.Us].txt |
138B |
| [FreeCoursesOnline.Us].url |
123B |
| [FreeTutorials.Us].txt |
75B |
| [FreeTutorials.Us].url |
119B |
| 00.Overview.mp4 |
4.71MB |
| 00.Overview.mp4 |
2.77MB |
| 00.Overview.mp4 |
4.25MB |
| 00.Overview.mp4 |
4.72MB |
| 00.Overview.mp4 |
5.15MB |
| 00.Overview.mp4 |
3.34MB |
| 00.Overview.mp4.srt |
4.36KB |
| 00.Overview.mp4.srt |
2.35KB |
| 00.Overview.mp4.srt |
3.80KB |
| 00.Overview.mp4.srt |
4.11KB |
| 00.Overview.mp4.srt |
4.68KB |
| 00.Overview.mp4.srt |
3.01KB |
| 01.Case-Study-Cold-Call-Virus-Scams.mp4 |
14.66MB |
| 01.Case-Study-Cold-Call-Virus-Scams.mp4.srt |
5.75KB |
| 01.Defenses-in-the-Browser-and-Email-Clients.mp4 |
12.13MB |
| 01.Defenses-in-the-Browser-and-Email-Clients.mp4.srt |
11.91KB |
| 01.Social-Engineering-Through-the-Ages.mp4 |
27.20MB |
| 01.Social-Engineering-Through-the-Ages.mp4.srt |
3.50KB |
| 01.Teach-a-Man-to-Phish-and-Hell-Eat-for-a-Lifetime.mp4 |
21.55MB |
| 01.Teach-a-Man-to-Phish-and-Hell-Eat-for-a-Lifetime.mp4.srt |
12.64KB |
| 01.The-Impact-of-Identity-Theft.mp4 |
5.47MB |
| 01.The-Impact-of-Identity-Theft.mp4.srt |
5.76KB |
| 01.Understanding-OSINT.mp4 |
56.03MB |
| 01.Understanding-OSINT.mp4.srt |
11.10KB |
| 02.Call-Signs-of-a-Phishing-Email.mp4 |
18.55MB |
| 02.Call-Signs-of-a-Phishing-Email.mp4.srt |
12.34KB |
| 02.Establishing-Authority-and-Creating-Fear.mp4 |
10.02MB |
| 02.Establishing-Authority-and-Creating-Fear.mp4.srt |
4.92KB |
| 02.Identities-for-Sale.mp4 |
20.52MB |
| 02.Identities-for-Sale.mp4.srt |
8.29KB |
| 02.Organizational-Reconnaissance.mp4 |
8.05MB |
| 02.Organizational-Reconnaissance.mp4.srt |
6.41KB |
| 02.Record-Destruction.mp4 |
46.33MB |
| 02.Record-Destruction.mp4.srt |
12.37KB |
| 02.The-Soft-Center-That-Social-Engineering-Exploits.mp4 |
12.12MB |
| 02.The-Soft-Center-That-Social-Engineering-Exploits.mp4.srt |
7.43KB |
| 03.Call-Signs-of-a-Phishing-Page.mp4 |
14.43MB |
| 03.Call-Signs-of-a-Phishing-Page.mp4.srt |
9.00KB |
| 03.Executing-the-Social-Engineering-Attack.mp4 |
20.72MB |
| 03.Executing-the-Social-Engineering-Attack.mp4.srt |
9.84KB |
| 03.Human-Weaknesses-That-Enable-Social-Engineering.mp4 |
24.70MB |
| 03.Human-Weaknesses-That-Enable-Social-Engineering.mp4.srt |
17.36KB |
| 03.Identifying-Targets-Within-an-Organization.mp4 |
22.92MB |
| 03.Identifying-Targets-Within-an-Organization.mp4.srt |
8.56KB |
| 03.Physical-Security.mp4 |
19.80MB |
| 03.Physical-Security.mp4.srt |
7.28KB |
| 03.The-Mechanics-of-an-Identify-Theft-Attack.mp4 |
19.32MB |
| 03.The-Mechanics-of-an-Identify-Theft-Attack.mp4.srt |
16.79KB |
| 04.Computer-based-Versus-Human-based-Social-Engineering.mp4 |
4.79MB |
| 04.Computer-based-Versus-Human-based-Social-Engineering.mp4.srt |
5.98KB |
| 04.Demonstrating-Authenticity.mp4 |
31.73MB |
| 04.Demonstrating-Authenticity.mp4.srt |
17.74KB |
| 04.Identity-Reconnaissance-with-PiPL.mp4 |
6.52MB |
| 04.Identity-Reconnaissance-with-PiPL.mp4.srt |
3.69KB |
| 04.In-person-Human-based-Identity-Theft.mp4 |
11.84MB |
| 04.In-person-Human-based-Identity-Theft.mp4.srt |
7.16KB |
| 04.Separation-of-Duties-and-the-Principle-of-Least-Privilege.mp4 |
15.06MB |
| 04.Separation-of-Duties-and-the-Principle-of-Least-Privilege.mp4.srt |
15.04KB |
| 04.Understanding-Spearphishing.mp4 |
7.04MB |
| 04.Understanding-Spearphishing.mp4.srt |
4.31KB |
| 05.Creating-a-Debt.mp4 |
27.20MB |
| 05.Creating-a-Debt.mp4.srt |
21.93KB |
| 05.Enumeration-as-a-Verification-Vector.mp4 |
7.35MB |
| 05.Enumeration-as-a-Verification-Vector.mp4.srt |
5.64KB |
| 05.Impersonation.mp4 |
23.49MB |
| 05.Impersonation.mp4.srt |
14.63KB |
| 05.Multi-Step-and-Side-Channel-Identity-Verification.mp4 |
21.82MB |
| 05.Multi-Step-and-Side-Channel-Identity-Verification.mp4.srt |
15.85KB |
| 05.Shoulder-Surfing-Eavesdropping-and-Tailgating.mp4 |
21.67MB |
| 05.Shoulder-Surfing-Eavesdropping-and-Tailgating.mp4.srt |
11.57KB |
| 05.Social-Engineering-at-Home-and-in-Popular-Culture.mp4 |
15.90MB |
| 05.Social-Engineering-at-Home-and-in-Popular-Culture.mp4.srt |
6.14KB |
| 06.Dumpster-Diving-and-Mail-Theft.mp4 |
7.62MB |
| 06.Dumpster-Diving-and-Mail-Theft.mp4.srt |
4.00KB |
| 06.Filter-Evasion-and-Concealment-Techniques.mp4 |
23.27MB |
| 06.Filter-Evasion-and-Concealment-Techniques.mp4.srt |
12.46KB |
| 06.Logging-Auditing-and-Monitoring.mp4 |
7.57MB |
| 06.Logging-Auditing-and-Monitoring.mp4.srt |
6.86KB |
| 06.Monetizing-the-Scam.mp4 |
33.51MB |
| 06.Monetizing-the-Scam.mp4.srt |
16.94KB |
| 06.Social-Engineering-and-Impersonation-by-Example.mp4 |
23.01MB |
| 06.Social-Engineering-and-Impersonation-by-Example.mp4.srt |
12.42KB |
| 06.Summary.mp4 |
2.69MB |
| 06.Summary.mp4.srt |
2.57KB |
| 07.Data-Breaches.mp4 |
6.42MB |
| 07.Data-Breaches.mp4.srt |
5.94KB |
| 07.Identifying-Attacks-with-PhishTank.mp4 |
7.97MB |
| 07.Identifying-Attacks-with-PhishTank.mp4.srt |
3.24KB |
| 07.Identity-Monitoring.mp4 |
5.66MB |
| 07.Identity-Monitoring.mp4.srt |
5.75KB |
| 07.Summary.mp4 |
4.89MB |
| 07.Summary.mp4 |
3.96MB |
| 07.Summary.mp4.srt |
4.07KB |
| 07.Summary.mp4.srt |
3.44KB |
| 08.Conditioning-the-Humans.mp4 |
9.32MB |
| 08.Conditioning-the-Humans.mp4.srt |
5.44KB |
| 08.Phishing-with-BeEF.mp4 |
32.28MB |
| 08.Phishing-with-BeEF.mp4.srt |
14.26KB |
| 08.Summary.mp4 |
2.72MB |
| 08.Summary.mp4.srt |
2.91KB |
| 09.Mounting-Your-Own-Ethical-Phishing-Attack-with-Phish5.mp4 |
21.26MB |
| 09.Mounting-Your-Own-Ethical-Phishing-Attack-with-Phish5.mp4.srt |
13.61KB |
| 09.Summary.mp4 |
4.30MB |
| 09.Summary.mp4.srt |
4.09KB |
| 10.Summary.mp4 |
3.17MB |
| 10.Summary.mp4.srt |
2.62KB |
| clips-info.json |
1.89KB |
| clips-info.json |
2.07KB |
| clips-info.json |
2.34KB |
| clips-info.json |
2.92KB |
| clips-info.json |
2.08KB |
| clips-info.json |
2.62KB |
| course-info.json |
1.87KB |
| image.jpg |
296.76KB |
| module-info.json |
343B |
| module-info.json |
341B |
| module-info.json |
301B |
| module-info.json |
285B |
| module-info.json |
317B |
| module-info.json |
321B |