Magnetic link has been copied to the cutting board

Name [FreeCoursesOnline.Me] [Pluralsight] Paths - Security for Hackers and Developers [FCO]

File Type package

Size 1.84GB

UpdateDate 2024-11-15

hash *****567495C3CABB54B93383A3C7B56626C98D

Hot 5

Files 01_Beginner/01_Security for Hackers and Developers - Overview/00. Course Overview/00. Course Overview.mp4 | 8.96MB 01_Beginner/01_Security for Hackers and Developers - Overview/00. Course Overview/00. Course Overview.srt | 2.64KB 01_Beginner/01_Security for Hackers and Developers - Overview/01. Introduction/00. Introduction.mp4 | 3.70MB 01_Beginner/01_Security for Hackers and Developers - Overview/01. Introduction/00. Introduction.srt | 5.68KB 01_Beginner/01_Security for Hackers and Developers - Overview/01. Introduction/01. Why Bugs Happen.mp4 | 4.97MB 01_Beginner/01_Security for Hackers and Developers - Overview/01. Introduction/01. Why Bugs Happen.srt | 9.08KB 01_Beginner/01_Security for Hackers and Developers - Overview/01. Introduction/02. Ongoing Considerations.mp4 | 7.98MB 01_Beginner/01_Security for Hackers and Developers - Overview/01. Introduction/02. Ongoing Considerations.srt | 13.67KB 01_Beginner/01_Security for Hackers and Developers - Overview/01. Introduction/03. Summary.mp4 | 286.80KB 01_Beginner/01_Security for Hackers and Developers - Overview/01. Introduction/03. Summary.srt | 411B 01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/00. Introduction.mp4 | 610.33KB 01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/00. Introduction.srt | 832B 01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/01. Raising Security IQ.mp4 | 5.54MB 01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/01. Raising Security IQ.srt | 8.63KB 01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/02. SDL.mp4 | 7.52MB 01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/02. SDL.srt | 5.89KB 01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/03. Push to the Left.mp4 | 426.78KB 01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/03. Push to the Left.srt | 497B 01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/04. Attack Surface Reduction.mp4 | 2.96MB 01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/04. Attack Surface Reduction.srt | 3.52KB 01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/05. Threat Modeling.mp4 | 5.60MB 01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/05. Threat Modeling.srt | 5.76KB 01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/06. Threat Model Demo.mp4 | 12.11MB 01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/06. Threat Model Demo.srt | 4.49KB 01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/07. Wrap-up.mp4 | 1.57MB 01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/07. Wrap-up.srt | 2.21KB 01_Beginner/01_Security for Hackers and Developers - Overview/03. Uncovering Security Bugs/00. Why Do Bugs Manifest - .mp4 | 5.61MB 01_Beginner/01_Security for Hackers and Developers - Overview/03. Uncovering Security Bugs/00. Why Do Bugs Manifest - .srt | 8.68KB 01_Beginner/01_Security for Hackers and Developers - Overview/03. Uncovering Security Bugs/01. Where Do Bugs Hide - .mp4 | 6.39MB 01_Beginner/01_Security for Hackers and Developers - Overview/03. Uncovering Security Bugs/01. Where Do Bugs Hide - .srt | 7.33KB 01_Beginner/01_Security for Hackers and Developers - Overview/03. Uncovering Security Bugs/02. How to Find Bugs - .mp4 | 2.70MB 01_Beginner/01_Security for Hackers and Developers - Overview/03. Uncovering Security Bugs/02. How to Find Bugs - .srt | 3.30KB 01_Beginner/01_Security for Hackers and Developers - Overview/04. Using Static Analysis/00. Introduce Automated Code Analysis.mp4 | 4.07MB 01_Beginner/01_Security for Hackers and Developers - Overview/04. Using Static Analysis/00. Introduce Automated Code Analysis.srt | 7.20KB 01_Beginner/01_Security for Hackers and Developers - Overview/04. Using Static Analysis/01. Applying the Static Analysis Review Cycle.mp4 | 5.37MB 01_Beginner/01_Security for Hackers and Developers - Overview/04. Using Static Analysis/01. Applying the Static Analysis Review Cycle.srt | 5.49KB 01_Beginner/01_Security for Hackers and Developers - Overview/04. Using Static Analysis/02. Understanding Basic Tool.mp4 | 9.41MB 01_Beginner/01_Security for Hackers and Developers - Overview/04. Using Static Analysis/02. Understanding Basic Tool.srt | 7.30KB 01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/00. Manual Analysis Process.mp4 | 3.53MB 01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/00. Manual Analysis Process.srt | 5.13KB 01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/01. Techniques.mp4 | 3.34MB 01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/01. Techniques.srt | 7.38KB 01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/02. Assess Threats.mp4 | 4.54MB 01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/02. Assess Threats.srt | 6.29KB 01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/03. Case Study.mp4 | 12.67MB 01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/03. Case Study.srt | 7.95KB 01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/04. Summarize Techniques and Course.mp4 | 5.97MB 01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/04. Summarize Techniques and Course.srt | 4.96KB 01_Beginner/01_Security for Hackers and Developers - Overview/Exercise Files/Exercise Files security-hackers-developers.zip | 1.68MB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/00. Course Overview/00. Course Overview.mp4 | 9.94MB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/00. Course Overview/00. Course Overview.srt | 2.38KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/01. Introduction/00. Introduction to Malware.mp4 | 1.94MB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/01. Introduction/00. Introduction to Malware.srt | 3.10KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/01. Introduction/01. Demo - Analyzing a Bromium Alert.mp4 | 27.29MB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/01. Introduction/01. Demo - Analyzing a Bromium Alert.srt | 16.60KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/01. Introduction/02. Security Tool Follow-up.mp4 | 7.58MB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/01. Introduction/02. Security Tool Follow-up.srt | 11.60KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/01. Introduction/03. First Malware Analysis Lab.mp4 | 698.52KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/01. Introduction/03. First Malware Analysis Lab.srt | 1.32KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/02. Recognizing the Exploit Vector/00. Recognizing Exploit Vector Intro.mp4 | 6.59MB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/02. Recognizing the Exploit Vector/00. Recognizing Exploit Vector Intro.srt | 7.05KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/02. Recognizing the Exploit Vector/01. How to Find the Exploit in a Malware Attack.mp4 | 20.98MB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/02. Recognizing the Exploit Vector/01. How to Find the Exploit in a Malware Attack.srt | 17.63KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/02. Recognizing the Exploit Vector/02. Exploit Finding Demo.mp4 | 18.41MB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/02. Recognizing the Exploit Vector/02. Exploit Finding Demo.srt | 4.92KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/02. Recognizing the Exploit Vector/03. Exploit Finding Lab 1.mp4 | 303.47KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/02. Recognizing the Exploit Vector/03. Exploit Finding Lab 1.srt | 510B 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/03. Unraveling Exploit Obfuscation/00. Intro and Why to Script.mp4 | 10.18MB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/03. Unraveling Exploit Obfuscation/00. Intro and Why to Script.srt | 8.55KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/03. Unraveling Exploit Obfuscation/01. Continued Deobfuscation.mp4 | 18.74MB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/03. Unraveling Exploit Obfuscation/01. Continued Deobfuscation.srt | 12.51KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/03. Unraveling Exploit Obfuscation/02. Deobfuscation Demo.mp4 | 14.25MB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/03. Unraveling Exploit Obfuscation/02. Deobfuscation Demo.srt | 4.76KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/03. Unraveling Exploit Obfuscation/03. Deobfuscation Lab 1.mp4 | 658.54KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/03. Unraveling Exploit Obfuscation/03. Deobfuscation Lab 1.srt | 954B 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/04. Circumventing Exploit Kit Encryption/00. Module Overview and Homework Review.mp4 | 3.86MB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/04. Circumventing Exploit Kit Encryption/00. Module Overview and Homework Review.srt | 3.47KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/04. Circumventing Exploit Kit Encryption/01. Exploit Kit Details.mp4 | 5.71MB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/04. Circumventing Exploit Kit Encryption/01. Exploit Kit Details.srt | 8.77KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/04. Circumventing Exploit Kit Encryption/02. Deobfuscation 2.mp4 | 7.73MB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/04. Circumventing Exploit Kit Encryption/02. Deobfuscation 2.srt | 7.58KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/04. Circumventing Exploit Kit Encryption/03. Deobfuscation Lab 2.mp4 | 644.22KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/04. Circumventing Exploit Kit Encryption/03. Deobfuscation Lab 2.srt | 1.09KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/05. Understanding Moving Target Communications/00. Module Goals and Assignment Review.mp4 | 3.89MB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/05. Understanding Moving Target Communications/00. Module Goals and Assignment Review.srt | 2.31KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/05. Understanding Moving Target Communications/01. DGAs and More.mp4 | 8.41MB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/05. Understanding Moving Target Communications/01. DGAs and More.srt | 5.99KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/05. Understanding Moving Target Communications/02. Non-DGA EKs.mp4 | 3.70MB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/05. Understanding Moving Target Communications/02. Non-DGA EKs.srt | 3.39KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/05. Understanding Moving Target Communications/03. Begining EK Detection Lab.mp4 | 1.78MB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/05. Understanding Moving Target Communications/03. Begining EK Detection Lab.srt | 3.45KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/06. Detecting Angler in the Wild/00. How to Find More Samples.mp4 | 2.25MB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/06. Detecting Angler in the Wild/00. How to Find More Samples.srt | 3.17KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/06. Detecting Angler in the Wild/01. Malware Detection.mp4 | 3.73MB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/06. Detecting Angler in the Wild/01. Malware Detection.srt | 3.91KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/06. Detecting Angler in the Wild/02. YARA.mp4 | 4.48MB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/06. Detecting Angler in the Wild/02. YARA.srt | 4.76KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/06. Detecting Angler in the Wild/03. YARA Examples and Lab.mp4 | 6.41MB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/06. Detecting Angler in the Wild/03. YARA Examples and Lab.srt | 5.74KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/07. Performing Safe Dynamic Analysis/00. Malware Analysis Goals.mp4 | 4.35MB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/07. Performing Safe Dynamic Analysis/00. Malware Analysis Goals.srt | 7.93KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/07. Performing Safe Dynamic Analysis/01. Another Sample.mp4 | 6.26MB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/07. Performing Safe Dynamic Analysis/01. Another Sample.srt | 6.18KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/07. Performing Safe Dynamic Analysis/02. Dynamic Analysis Walk-through.mp4 | 10.64MB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/07. Performing Safe Dynamic Analysis/02. Dynamic Analysis Walk-through.srt | 10.78KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/07. Performing Safe Dynamic Analysis/03. Sandbox Assignment.mp4 | 1.26MB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/07. Performing Safe Dynamic Analysis/03. Sandbox Assignment.srt | 2.64KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/08. Analyzing Files Statically/00. File Analysis Tools and Techniques.mp4 | 8.53MB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/08. Analyzing Files Statically/00. File Analysis Tools and Techniques.srt | 7.24KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/08. Analyzing Files Statically/01. Demo - How to Use the tools.mp4 | 19.40MB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/08. Analyzing Files Statically/01. Demo - How to Use the tools.srt | 8.13KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/08. Analyzing Files Statically/02. More Tool Details.mp4 | 8.19MB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/08. Analyzing Files Statically/02. More Tool Details.srt | 7.21KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/08. Analyzing Files Statically/03. Assignment - Run and Report.mp4 | 1.65MB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/08. Analyzing Files Statically/03. Assignment - Run and Report.srt | 2.12KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/09. Reversing Malware with Debugging Tools/00. Static or Dynamic Analysis - .mp4 | 986.86KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/09. Reversing Malware with Debugging Tools/00. Static or Dynamic Analysis - .srt | 1.78KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/09. Reversing Malware with Debugging Tools/01. Demo - Extract Malware with IDA Debugger.mp4 | 33.54MB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/09. Reversing Malware with Debugging Tools/01. Demo - Extract Malware with IDA Debugger.srt | 8.30KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/09. Reversing Malware with Debugging Tools/02. More on how to Choose an Approach.mp4 | 14.67MB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/09. Reversing Malware with Debugging Tools/02. More on how to Choose an Approach.srt | 10.30KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/09. Reversing Malware with Debugging Tools/03. Debug Details and Assignment.mp4 | 17.92MB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/09. Reversing Malware with Debugging Tools/03. Debug Details and Assignment.srt | 13.64KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/10. Reversing Malware with IDA pro/00. Demo and Lesson Plan.mp4 | 964.60KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/10. Reversing Malware with IDA pro/00. Demo and Lesson Plan.srt | 1.85KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/10. Reversing Malware with IDA pro/01. Reversing Demo.mp4 | 33.90MB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/10. Reversing Malware with IDA pro/01. Reversing Demo.srt | 13.34KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/10. Reversing Malware with IDA pro/02. Goals and Cyclic Recap.mp4 | 10.45MB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/10. Reversing Malware with IDA pro/02. Goals and Cyclic Recap.srt | 7.04KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/10. Reversing Malware with IDA pro/03. Reversing Details and Assignment.mp4 | 10.03MB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/10. Reversing Malware with IDA pro/03. Reversing Details and Assignment.srt | 9.15KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/11. Customizing Reports - From Researchers to CISOs/00. Intro and Recap.mp4 | 7.30MB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/11. Customizing Reports - From Researchers to CISOs/00. Intro and Recap.srt | 2.45KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/11. Customizing Reports - From Researchers to CISOs/01. How to Report Treat Data.mp4 | 12.99MB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/11. Customizing Reports - From Researchers to CISOs/01. How to Report Treat Data.srt | 12.52KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/11. Customizing Reports - From Researchers to CISOs/02. Summary and Assignment.mp4 | 987.81KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/11. Customizing Reports - From Researchers to CISOs/02. Summary and Assignment.srt | 1.02KB 03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/Exercise Files/Exercise Files malware-advanced-analysis-combating-exploit-kits.zip | 25.30MB 02_Intermediate/02_Security for Hackers and Developers - Code Auditing.zip | 283.12MB 02_Intermediate/03_Security for Hackers and Developers - Fuzzing.zip | 312.09MB 02_Intermediate/04_Security for Hackers and Developers - Reverse Engineering.zip | 309.35MB 02_Intermediate/05_Security for Hackers and Developers - Exploit Development.zip | 429.37MB 0. Websites you may like/1. (FreeTutorials.Us) Download Udemy Paid Courses For Free.url | 328B 0. Websites you may like/2. (FreeCoursesOnline.Me) Download Udacity, Masterclass, Lynda, PHLearn, Pluralsight Free.url | 286B 0. Websites you may like/3. (NulledPremium.com) Download Cracked Website Themes, Plugins, Scripts And Stock Images.url | 163B 0. Websites you may like/4. (FTUApps.com) Download Cracked Developers Applications For Free.url | 239B 0. Websites you may like/5. (Discuss.FTUForum.com) FTU Discussion Forum.url | 294B 0. Websites you may like/How you can help Team-FTU.txt | 237B

Recommend

Magnetic link has been copied to the cutting board