|
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
| 001. Learning objectives.mp4 |
4.81Мб |
| 001. Learning objectives.mp4 |
7.89Мб |
| 001. Learning objectives.mp4 |
4.01Мб |
| 001. Learning objectives.mp4 |
5.01Мб |
| 001. Learning objectives.mp4 |
3.54Мб |
| 001. Learning objectives.mp4 |
4.99Мб |
| 001. Learning objectives.mp4 |
4.14Мб |
| 001. Learning objectives.mp4 |
4.50Мб |
| 001. Learning objectives.mp4 |
3.78Мб |
| 001. Learning objectives.mp4 |
5.76Мб |
| 001. Learning objectives.mp4 |
4.33Мб |
| 001. Learning objectives.mp4 |
3.92Мб |
| 001. Learning objectives.mp4 |
6.43Мб |
| 001. Learning objectives.mp4 |
5.59Мб |
| 001. Learning objectives.mp4 |
3.78Мб |
| 001. Learning objectives en.srt |
605б |
| 001. Learning objectives en.srt |
959б |
| 001. Learning objectives en.srt |
538б |
| 001. Learning objectives en.srt |
643б |
| 001. Learning objectives en.srt |
430б |
| 001. Learning objectives en.srt |
616б |
| 001. Learning objectives en.srt |
465б |
| 001. Learning objectives en.srt |
593б |
| 001. Learning objectives en.srt |
523б |
| 001. Learning objectives en.srt |
786б |
| 001. Learning objectives en.srt |
521б |
| 001. Learning objectives en.srt |
450б |
| 001. Learning objectives en.srt |
788б |
| 001. Learning objectives en.srt |
673б |
| 001. Learning objectives en.srt |
378б |
| 001. Wireless Networks, IoT, and Mobile Devices Hacking Introduction.mp4 |
19.80Мб |
| 001. Wireless Networks, IoT, and Mobile Devices Hacking Introduction en.srt |
3.01Кб |
| 001. Wireless Networks, IoT, and Mobile Devices Hacking Summary.mp4 |
14.36Мб |
| 001. Wireless Networks, IoT, and Mobile Devices Hacking Summary en.srt |
1.99Кб |
| 002. 1.1 Introducing Wireless Hacking.mp4 |
33.11Мб |
| 002. 1.1 Introducing Wireless Hacking en.srt |
7.10Кб |
| 002. 10.1 Understanding NFC Vulnerabilities.mp4 |
11.43Мб |
| 002. 10.1 Understanding NFC Vulnerabilities en.srt |
4.82Кб |
| 002. 11.1 Understanding the Evolution of Wireless Defenses.mp4 |
24.19Мб |
| 002. 11.1 Understanding the Evolution of Wireless Defenses en.srt |
9.08Кб |
| 002. 12.1 Understanding IoT Fundamentals.mp4 |
54.10Мб |
| 002. 12.1 Understanding IoT Fundamentals en.srt |
7.56Кб |
| 002. 13.1 Understanding OWASP Mobile Device Vulnerabilities.mp4 |
27.27Мб |
| 002. 13.1 Understanding OWASP Mobile Device Vulnerabilities en.srt |
6.90Кб |
| 002. 14.1 Exploring The Android Security Model.mp4 |
80.72Мб |
| 002. 14.1 Exploring The Android Security Model en.srt |
23.00Кб |
| 002. 15.1 Introducing iOS Security.mp4 |
6.36Мб |
| 002. 15.1 Introducing iOS Security en.srt |
3.43Кб |
| 002. 2.1 Understanding Wireless Client Attacks and Their Motives.mp4 |
37.16Мб |
| 002. 2.1 Understanding Wireless Client Attacks and Their Motives en.srt |
9.35Кб |
| 002. 3.1 Understanding Wireless Antennas.mp4 |
22.54Мб |
| 002. 3.1 Understanding Wireless Antennas en.srt |
3.69Кб |
| 002. 4.1 Introducing the Aircrack-ng Suite.mp4 |
45.52Мб |
| 002. 4.1 Introducing the Aircrack-ng Suite en.srt |
8.07Кб |
| 002. 5.1 Understanding WEP Fundamentals.mp4 |
12.79Мб |
| 002. 5.1 Understanding WEP Fundamentals en.srt |
2.76Кб |
| 002. 6.1 Understanding WPA Fundamentals.mp4 |
16.06Мб |
| 002. 6.1 Understanding WPA Fundamentals en.srt |
3.17Кб |
| 002. 7.1 Using Kismet.mp4 |
21.97Мб |
| 002. 7.1 Using Kismet en.srt |
6.00Кб |
| 002. 8.1 Defining Evil Twin Attacks.mp4 |
13.52Мб |
| 002. 8.1 Defining Evil Twin Attacks en.srt |
2.10Кб |
| 002. 9.1 Understanding Bluetooth Vulnerabilities.mp4 |
6.42Мб |
| 002. 9.1 Understanding Bluetooth Vulnerabilities en.srt |
3.00Кб |
| 003. 1.2 Introducing Wireless Standards and Technologies.mp4 |
55.47Мб |
| 003. 1.2 Introducing Wireless Standards and Technologies en.srt |
13.27Кб |
| 003. 10.2 Exploring NFC Attacks and Case Studies.mp4 |
19.61Мб |
| 003. 10.2 Exploring NFC Attacks and Case Studies en.srt |
9.78Кб |
| 003. 11.2 Surveying Fast and Secure Roaming.mp4 |
43.72Мб |
| 003. 11.2 Surveying Fast and Secure Roaming en.srt |
20.18Кб |
| 003. 12.2 Exploring ZigBee and IEEE 802.15.4.mp4 |
20.48Мб |
| 003. 12.2 Exploring ZigBee and IEEE 802.15.4 en.srt |
7.57Кб |
| 003. 13.2 Wrestling with the BYOD Dilemma.mp4 |
25.05Мб |
| 003. 13.2 Wrestling with the BYOD Dilemma en.srt |
3.22Кб |
| 003. 14.2 Exploring Android Emulators and SDK.mp4 |
18.36Мб |
| 003. 14.2 Exploring Android Emulators and SDK en.srt |
5.56Кб |
| 003. 15.2 Exploring Jailbraking iOS.mp4 |
11.37Мб |
| 003. 15.2 Exploring Jailbraking iOS en.srt |
4.06Кб |
| 003. 2.2 Learning Packet Injection Attacks.mp4 |
9.21Мб |
| 003. 2.2 Learning Packet Injection Attacks en.srt |
2.88Кб |
| 003. 3.2 Surveying Wi-Fi Devices Like the Pinneaple.mp4 |
57.59Мб |
| 003. 3.2 Surveying Wi-Fi Devices Like the Pinneaple en.srt |
9.65Кб |
| 003. 4.2 Introducing Airmon-ng.mp4 |
10.43Мб |
| 003. 4.2 Introducing Airmon-ng en.srt |
2.27Кб |
| 003. 5.2 Learning How to Crack WEP.mp4 |
35.47Мб |
| 003. 5.2 Learning How to Crack WEP en.srt |
7.80Кб |
| 003. 6.2 Surveying Attacks Against WPA2-PSK Networks.mp4 |
27.06Мб |
| 003. 6.2 Surveying Attacks Against WPA2-PSK Networks en.srt |
5.57Кб |
| 003. 7.2 Using Wireshark.mp4 |
16.78Мб |
| 003. 7.2 Using Wireshark en.srt |
2.79Кб |
| 003. 8.2 Performing Evil Twin Attacks.mp4 |
72.49Мб |
| 003. 8.2 Performing Evil Twin Attacks en.srt |
11.93Кб |
| 003. 9.2 Surveying Tools for Bluetooth Monitoring.mp4 |
38.45Мб |
| 003. 9.2 Surveying Tools for Bluetooth Monitoring en.srt |
7.29Кб |
| 004. 1.3 Understanding the 802.11 Standard.mp4 |
46.26Мб |
| 004. 1.3 Understanding the 802.11 Standard en.srt |
17.91Кб |
| 004. 11.3 Understanding Wireless Intrusion Monitoring and Prevention.mp4 |
6.78Мб |
| 004. 11.3 Understanding Wireless Intrusion Monitoring and Prevention en.srt |
3.68Кб |
| 004. 12.3 Exploring INSTEON.mp4 |
18.04Мб |
| 004. 12.3 Exploring INSTEON en.srt |
7.37Кб |
| 004. 13.3 Understanding Mobile Device Management (MDM).mp4 |
26.87Мб |
| 004. 13.3 Understanding Mobile Device Management (MDM) en.srt |
3.30Кб |
| 004. 14.3 Understanding Android Hacking Tools and Methodologies.mp4 |
73.46Мб |
| 004. 14.3 Understanding Android Hacking Tools and Methodologies en.srt |
26.42Кб |
| 004. 15.3 Surveying Tools for Dissasembling iOS Applications.mp4 |
8.33Мб |
| 004. 15.3 Surveying Tools for Dissasembling iOS Applications en.srt |
2.08Кб |
| 004. 2.3 Eavesdropping and Manipulating Unencrypted Wi-Fi Communications.mp4 |
18.08Мб |
| 004. 2.3 Eavesdropping and Manipulating Unencrypted Wi-Fi Communications en.srt |
6.37Кб |
| 004. 3.3 Building Your Own Lab.mp4 |
31.07Мб |
| 004. 3.3 Building Your Own Lab en.srt |
4.42Кб |
| 004. 4.3 Understanding Airodump-ng.mp4 |
20.50Мб |
| 004. 4.3 Understanding Airodump-ng en.srt |
4.47Кб |
| 004. 6.3 Using coWPAtty.mp4 |
42.23Мб |
| 004. 6.3 Using coWPAtty en.srt |
8.03Кб |
| 004. 7.3 Learning How to Hack Default Configurations.mp4 |
15.23Мб |
| 004. 7.3 Learning How to Hack Default Configurations en.srt |
4.69Кб |
| 004. 8.3 Using Karmetasploit.mp4 |
24.33Мб |
| 004. 8.3 Using Karmetasploit en.srt |
4.63Кб |
| 005. 1.4 Understanding Bluetooth.mp4 |
38.22Мб |
| 005. 1.4 Understanding Bluetooth en.srt |
15.25Кб |
| 005. 11.4 Understanding Wireless Security Policies.mp4 |
9.56Мб |
| 005. 11.4 Understanding Wireless Security Policies en.srt |
5.97Кб |
| 005. 12.4 Exploring ZWave.mp4 |
67.83Мб |
| 005. 12.4 Exploring ZWave en.srt |
16.57Кб |
| 005. 13.4 Understanding Mobile Device Security Policies.mp4 |
20.86Мб |
| 005. 13.4 Understanding Mobile Device Security Policies en.srt |
2.86Кб |
| 005. 2.4 Attacking Publicly Secure Packet Forwarding (PSPF).mp4 |
10.33Мб |
| 005. 2.4 Attacking Publicly Secure Packet Forwarding (PSPF) en.srt |
5.21Кб |
| 005. 4.4 Introducing Aireplay-ng.mp4 |
24.49Мб |
| 005. 4.4 Introducing Aireplay-ng en.srt |
3.58Кб |
| 005. 6.4 Using Pyrit.mp4 |
23.07Мб |
| 005. 6.4 Using Pyrit en.srt |
3.71Кб |
| 005. 8.4 Exploring the WiFi Pineapple.mp4 |
62.08Мб |
| 005. 8.4 Exploring the WiFi Pineapple en.srt |
19.49Кб |
| 006. 1.5 Understanding NFC.mp4 |
40.01Мб |
| 006. 1.5 Understanding NFC en.srt |
18.21Кб |
| 006. 12.5 Exploring LoRA.mp4 |
22.44Мб |
| 006. 12.5 Exploring LoRA en.srt |
10.04Кб |
| 006. 2.5 Attacking the Preferred Network List (PNL).mp4 |
8.85Мб |
| 006. 2.5 Attacking the Preferred Network List (PNL) en.srt |
3.08Кб |
| 006. 4.5 Introducing Airdecap-ng.mp4 |
10.25Мб |
| 006. 4.5 Introducing Airdecap-ng en.srt |
2.23Кб |
| 006. 6.5 Exploring WPA Enterprise Hacking.mp4 |
13.85Мб |
| 006. 6.5 Exploring WPA Enterprise Hacking en.srt |
3.89Кб |
| 007. 1.6 Understanding 802.1x and Wireless Authentication Mechanisms.mp4 |
33.32Мб |
| 007. 1.6 Understanding 802.1x and Wireless Authentication Mechanisms en.srt |
15.93Кб |
| 007. 4.6 Introducing Airserv-ng.mp4 |
21.35Мб |
| 007. 4.6 Introducing Airserv-ng en.srt |
3.91Кб |
| 008. 4.7 Introducing Airtun-ng.mp4 |
13.47Мб |
| 008. 4.7 Introducing Airtun-ng en.srt |
2.11Кб |