Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
[FreeCoursesOnline.Us].txt |
138б |
[FreeCoursesOnline.Us].url |
123б |
[FreeTutorials.Us].txt |
75б |
[FreeTutorials.Us].url |
119б |
00.Overview.mp4 |
4.71Мб |
00.Overview.mp4 |
2.77Мб |
00.Overview.mp4 |
4.25Мб |
00.Overview.mp4 |
4.72Мб |
00.Overview.mp4 |
5.15Мб |
00.Overview.mp4 |
3.34Мб |
00.Overview.mp4.srt |
4.36Кб |
00.Overview.mp4.srt |
2.35Кб |
00.Overview.mp4.srt |
3.80Кб |
00.Overview.mp4.srt |
4.11Кб |
00.Overview.mp4.srt |
4.68Кб |
00.Overview.mp4.srt |
3.01Кб |
01.Case-Study-Cold-Call-Virus-Scams.mp4 |
14.66Мб |
01.Case-Study-Cold-Call-Virus-Scams.mp4.srt |
5.75Кб |
01.Defenses-in-the-Browser-and-Email-Clients.mp4 |
12.13Мб |
01.Defenses-in-the-Browser-and-Email-Clients.mp4.srt |
11.91Кб |
01.Social-Engineering-Through-the-Ages.mp4 |
27.20Мб |
01.Social-Engineering-Through-the-Ages.mp4.srt |
3.50Кб |
01.Teach-a-Man-to-Phish-and-Hell-Eat-for-a-Lifetime.mp4 |
21.55Мб |
01.Teach-a-Man-to-Phish-and-Hell-Eat-for-a-Lifetime.mp4.srt |
12.64Кб |
01.The-Impact-of-Identity-Theft.mp4 |
5.47Мб |
01.The-Impact-of-Identity-Theft.mp4.srt |
5.76Кб |
01.Understanding-OSINT.mp4 |
56.03Мб |
01.Understanding-OSINT.mp4.srt |
11.10Кб |
02.Call-Signs-of-a-Phishing-Email.mp4 |
18.55Мб |
02.Call-Signs-of-a-Phishing-Email.mp4.srt |
12.34Кб |
02.Establishing-Authority-and-Creating-Fear.mp4 |
10.02Мб |
02.Establishing-Authority-and-Creating-Fear.mp4.srt |
4.92Кб |
02.Identities-for-Sale.mp4 |
20.52Мб |
02.Identities-for-Sale.mp4.srt |
8.29Кб |
02.Organizational-Reconnaissance.mp4 |
8.05Мб |
02.Organizational-Reconnaissance.mp4.srt |
6.41Кб |
02.Record-Destruction.mp4 |
46.33Мб |
02.Record-Destruction.mp4.srt |
12.37Кб |
02.The-Soft-Center-That-Social-Engineering-Exploits.mp4 |
12.12Мб |
02.The-Soft-Center-That-Social-Engineering-Exploits.mp4.srt |
7.43Кб |
03.Call-Signs-of-a-Phishing-Page.mp4 |
14.43Мб |
03.Call-Signs-of-a-Phishing-Page.mp4.srt |
9.00Кб |
03.Executing-the-Social-Engineering-Attack.mp4 |
20.72Мб |
03.Executing-the-Social-Engineering-Attack.mp4.srt |
9.84Кб |
03.Human-Weaknesses-That-Enable-Social-Engineering.mp4 |
24.70Мб |
03.Human-Weaknesses-That-Enable-Social-Engineering.mp4.srt |
17.36Кб |
03.Identifying-Targets-Within-an-Organization.mp4 |
22.92Мб |
03.Identifying-Targets-Within-an-Organization.mp4.srt |
8.56Кб |
03.Physical-Security.mp4 |
19.80Мб |
03.Physical-Security.mp4.srt |
7.28Кб |
03.The-Mechanics-of-an-Identify-Theft-Attack.mp4 |
19.32Мб |
03.The-Mechanics-of-an-Identify-Theft-Attack.mp4.srt |
16.79Кб |
04.Computer-based-Versus-Human-based-Social-Engineering.mp4 |
4.79Мб |
04.Computer-based-Versus-Human-based-Social-Engineering.mp4.srt |
5.98Кб |
04.Demonstrating-Authenticity.mp4 |
31.73Мб |
04.Demonstrating-Authenticity.mp4.srt |
17.74Кб |
04.Identity-Reconnaissance-with-PiPL.mp4 |
6.52Мб |
04.Identity-Reconnaissance-with-PiPL.mp4.srt |
3.69Кб |
04.In-person-Human-based-Identity-Theft.mp4 |
11.84Мб |
04.In-person-Human-based-Identity-Theft.mp4.srt |
7.16Кб |
04.Separation-of-Duties-and-the-Principle-of-Least-Privilege.mp4 |
15.06Мб |
04.Separation-of-Duties-and-the-Principle-of-Least-Privilege.mp4.srt |
15.04Кб |
04.Understanding-Spearphishing.mp4 |
7.04Мб |
04.Understanding-Spearphishing.mp4.srt |
4.31Кб |
05.Creating-a-Debt.mp4 |
27.20Мб |
05.Creating-a-Debt.mp4.srt |
21.93Кб |
05.Enumeration-as-a-Verification-Vector.mp4 |
7.35Мб |
05.Enumeration-as-a-Verification-Vector.mp4.srt |
5.64Кб |
05.Impersonation.mp4 |
23.49Мб |
05.Impersonation.mp4.srt |
14.63Кб |
05.Multi-Step-and-Side-Channel-Identity-Verification.mp4 |
21.82Мб |
05.Multi-Step-and-Side-Channel-Identity-Verification.mp4.srt |
15.85Кб |
05.Shoulder-Surfing-Eavesdropping-and-Tailgating.mp4 |
21.67Мб |
05.Shoulder-Surfing-Eavesdropping-and-Tailgating.mp4.srt |
11.57Кб |
05.Social-Engineering-at-Home-and-in-Popular-Culture.mp4 |
15.90Мб |
05.Social-Engineering-at-Home-and-in-Popular-Culture.mp4.srt |
6.14Кб |
06.Dumpster-Diving-and-Mail-Theft.mp4 |
7.62Мб |
06.Dumpster-Diving-and-Mail-Theft.mp4.srt |
4.00Кб |
06.Filter-Evasion-and-Concealment-Techniques.mp4 |
23.27Мб |
06.Filter-Evasion-and-Concealment-Techniques.mp4.srt |
12.46Кб |
06.Logging-Auditing-and-Monitoring.mp4 |
7.57Мб |
06.Logging-Auditing-and-Monitoring.mp4.srt |
6.86Кб |
06.Monetizing-the-Scam.mp4 |
33.51Мб |
06.Monetizing-the-Scam.mp4.srt |
16.94Кб |
06.Social-Engineering-and-Impersonation-by-Example.mp4 |
23.01Мб |
06.Social-Engineering-and-Impersonation-by-Example.mp4.srt |
12.42Кб |
06.Summary.mp4 |
2.69Мб |
06.Summary.mp4.srt |
2.57Кб |
07.Data-Breaches.mp4 |
6.42Мб |
07.Data-Breaches.mp4.srt |
5.94Кб |
07.Identifying-Attacks-with-PhishTank.mp4 |
7.97Мб |
07.Identifying-Attacks-with-PhishTank.mp4.srt |
3.24Кб |
07.Identity-Monitoring.mp4 |
5.66Мб |
07.Identity-Monitoring.mp4.srt |
5.75Кб |
07.Summary.mp4 |
4.89Мб |
07.Summary.mp4 |
3.96Мб |
07.Summary.mp4.srt |
4.07Кб |
07.Summary.mp4.srt |
3.44Кб |
08.Conditioning-the-Humans.mp4 |
9.32Мб |
08.Conditioning-the-Humans.mp4.srt |
5.44Кб |
08.Phishing-with-BeEF.mp4 |
32.28Мб |
08.Phishing-with-BeEF.mp4.srt |
14.26Кб |
08.Summary.mp4 |
2.72Мб |
08.Summary.mp4.srt |
2.91Кб |
09.Mounting-Your-Own-Ethical-Phishing-Attack-with-Phish5.mp4 |
21.26Мб |
09.Mounting-Your-Own-Ethical-Phishing-Attack-with-Phish5.mp4.srt |
13.61Кб |
09.Summary.mp4 |
4.30Мб |
09.Summary.mp4.srt |
4.09Кб |
10.Summary.mp4 |
3.17Мб |
10.Summary.mp4.srt |
2.62Кб |
clips-info.json |
1.89Кб |
clips-info.json |
2.07Кб |
clips-info.json |
2.34Кб |
clips-info.json |
2.92Кб |
clips-info.json |
2.08Кб |
clips-info.json |
2.62Кб |
course-info.json |
1.87Кб |
image.jpg |
296.76Кб |
module-info.json |
343б |
module-info.json |
341б |
module-info.json |
301б |
module-info.json |
285б |
module-info.json |
317б |
module-info.json |
321б |