Magnetic link has been copied to the cutting board

Name The RedTeam Blueprint - A Unique Guide To Ethical Hacking

File Type video

Size 6.84GB

UpdateDate 2024-9-27

hash *****A1A2658E73AA65DF95203B562869798556

Hot 1

Files 19. Exploitation/11. SQL Injection _ SQLMap.mp4 | 133.65MB 1. Welcome! Who Is This Guy!/1. Introduction.srt | 2.29KB 2. The 3 Teams/1. Module Overview - The 3 Teams.mp4 | 3.54MB 2. The 3 Teams/1. Module Overview - The 3 Teams.srt | 1.79KB 2. The 3 Teams/1.1 The 3 Teams.pptx | 91.53KB 2. The 3 Teams/2. The Red Team.mp4 | 29.27MB 2. The 3 Teams/2. The Red Team.srt | 12.02KB 2. The 3 Teams/2.1 The Red Team.pptx | 97.41KB 2. The 3 Teams/3. The Blue Team.mp4 | 18.10MB 2. The 3 Teams/3. The Blue Team.srt | 7.10KB 2. The 3 Teams/3.1 The Blue Team.pptx | 97.42KB 2. The 3 Teams/4. The Purple Team.mp4 | 21.74MB 2. The 3 Teams/4. The Purple Team.srt | 9.52KB 2. The 3 Teams/4.1 The Purple Team.pptx | 96.95KB 3. Penetration Testing Process/1. Module Overview - Penetration Testing Process.mp4 | 8.44MB 3. Penetration Testing Process/1. Module Overview - Penetration Testing Process.srt | 4.75KB 3. Penetration Testing Process/1.1 Penetration Testing Process - Module Overview.pptx | 100.70KB 3. Penetration Testing Process/2. Penetration Testing Methodology.mp4 | 19.73MB 3. Penetration Testing Process/2. Penetration Testing Methodology.srt | 11.90KB 3. Penetration Testing Process/2.1 Penetration Testing Methodology.pptx | 106.42KB 3. Penetration Testing Process/3. Metrics _ Why They Are Important.mp4 | 37.34MB 3. Penetration Testing Process/3. Metrics _ Why They Are Important.srt | 15.41KB 3. Penetration Testing Process/3.1 Metrics.xlsx | 36.70KB 3. Penetration Testing Process/4. Routine Assessments Part 1 - What Are Routine Assessments.mp4 | 11.11MB 3. Penetration Testing Process/4. Routine Assessments Part 1 - What Are Routine Assessments.srt | 5.90KB 3. Penetration Testing Process/4.1 What Are Routine Assessments.pptx | 94.56KB 3. Penetration Testing Process/5. Routine Assessments Part 2 - Yearly Assessments.mp4 | 16.27MB 3. Penetration Testing Process/5. Routine Assessments Part 2 - Yearly Assessments.srt | 7.44KB 3. Penetration Testing Process/5.1 Yearly Assessments.pptx | 96.17KB 3. Penetration Testing Process/6. Routine Assessments Part 3 - Quarterly Assessments.mp4 | 25.72MB 3. Penetration Testing Process/6. Routine Assessments Part 3 - Quarterly Assessments.srt | 12.71KB 3. Penetration Testing Process/6.1 Quarterly Assessments.pptx | 109.07KB 3. Penetration Testing Process/7. Routine Assessments Part 4- Monthly Assessments.mp4 | 11.01MB 3. Penetration Testing Process/7. Routine Assessments Part 4- Monthly Assessments.srt | 6.28KB 3. Penetration Testing Process/7.1 Monthly Assessments.pptx | 96.08KB 3. Penetration Testing Process/8. Routine Assessments Part 5 - Constant Assessments.mp4 | 17.66MB 3. Penetration Testing Process/8. Routine Assessments Part 5 - Constant Assessments.srt | 12.02KB 3. Penetration Testing Process/8.1 Constant Assessments.pptx | 97.51KB 3. Penetration Testing Process/9. Routine Assessments Part 6 - Building an Assessment Plan.mp4 | 31.23MB 3. Penetration Testing Process/9. Routine Assessments Part 6 - Building an Assessment Plan.srt | 9.91KB 3. Penetration Testing Process/9.1 Assessment Template.xlsx | 24.38KB 3. Penetration Testing Process/10. Building _ Working with an Enterprise Budget.mp4 | 36.31MB 3. Penetration Testing Process/10. Building _ Working with an Enterprise Budget.srt | 17.14KB 3. Penetration Testing Process/10.1 Budget Sample.xlsx | 27.69KB 3. Penetration Testing Process/10.2 Budget Template.xlsx | 23.95KB 3. Penetration Testing Process/11. Specialties!.mp4 | 11.72MB 3. Penetration Testing Process/11. Specialties!.srt | 6.11KB 3. Penetration Testing Process/11.1 Specialties.pptx | 98.36KB 3. Penetration Testing Process/12. The CIA Triangle.mp4 | 9.58MB 3. Penetration Testing Process/12. The CIA Triangle.srt | 4.09KB 3. Penetration Testing Process/12.1 CIA Triangle.pptx | 98.61KB 4. The Windows Operating System/1. Installing _ Using VirtualBox for Lab Virtualization.mp4 | 49.53MB 4. The Windows Operating System/1. Installing _ Using VirtualBox for Lab Virtualization.srt | 13.02KB 4. The Windows Operating System/1.1 VirtualBox Download.html | 102B 4. The Windows Operating System/1.2 Windows Server 2016 ISO.html | 132B 4. The Windows Operating System/2. Windows at a Glance.mp4 | 104.39MB 4. The Windows Operating System/2. Windows at a Glance.srt | 29.02KB 4. The Windows Operating System/2.1 Windows Registry.html | 143B 4. The Windows Operating System/3. The Windows File System.mp4 | 41.70MB 4. The Windows Operating System/3. The Windows File System.srt | 15.91KB 4. The Windows Operating System/3.1 The Windows File System.pptx | 101.79KB 4. The Windows Operating System/3.2 NTFS Basics.html | 92B 4. The Windows Operating System/3.2 NTFS Cluster.html | 119B 4. The Windows Operating System/3.3 NTFS Cluster.html | 119B 4. The Windows Operating System/3.3 NTFS In More Detail.html | 127B 4. The Windows Operating System/3.4 Journaling File System.html | 113B 4. The Windows Operating System/3.4 NTFS In More Detail.html | 127B 4. The Windows Operating System/3.5 Journaling File System.html | 113B 4. The Windows Operating System/3.5 NTFS Basics.html | 92B 4. The Windows Operating System/4. Windows Logs.mp4 | 42.32MB 4. The Windows Operating System/4. Windows Logs.srt | 14.32KB 4. The Windows Operating System/5. Windows Internals - UAC.mp4 | 31.14MB 4. The Windows Operating System/5. Windows Internals - UAC.srt | 11.32KB 4. The Windows Operating System/5.1 UAC Microsoft Documents.html | 182B 4. The Windows Operating System/5.1 Windows UAC.pptx | 164.01KB 4. The Windows Operating System/5.2 UAC Microsoft Documents.html | 182B 4. The Windows Operating System/5.2 Windows UAC.pptx | 164.01KB 4. The Windows Operating System/6. Windows Internals - Permissions.mp4 | 62.41MB 4. The Windows Operating System/6. Windows Internals - Permissions.srt | 20.90KB 4. The Windows Operating System/7. Windows Internals - Alternate Data Streams.mp4 | 32.00MB 4. The Windows Operating System/7. Windows Internals - Alternate Data Streams.srt | 9.74KB 4. The Windows Operating System/7.1 File Streams.html | 129B 4. The Windows Operating System/8. Windows Internals - API Calls.mp4 | 53.14MB 4. The Windows Operating System/8. Windows Internals - API Calls.srt | 15.19KB 4. The Windows Operating System/8.1 Dependency Walker.html | 110B 4. The Windows Operating System/8.2 API Calls.pptx | 94.75KB 4. The Windows Operating System/9. Windows Internals - The SID.mp4 | 18.20MB 4. The Windows Operating System/9. Windows Internals - The SID.srt | 8.38KB 4. The Windows Operating System/9.1 SID.pptx | 135.51KB 4. The Windows Operating System/10. Windows Internals - Tokens.mp4 | 26.57MB 4. The Windows Operating System/10. Windows Internals - Tokens.srt | 10.20KB 4. The Windows Operating System/10.1 Tokens.pptx | 102.00KB 4. The Windows Operating System/11. Windows Internals - Named Pipes.mp4 | 20.15MB 4. The Windows Operating System/11. Windows Internals - Named Pipes.srt | 7.43KB 4. The Windows Operating System/11.1 Microsoft PipeList.html | 113B 4. The Windows Operating System/11.2 Windows Pipes.pptx | 100.05KB 4. The Windows Operating System/12. Windows Internals - PE Files _ DLLs.mp4 | 50.42MB 4. The Windows Operating System/12. Windows Internals - PE Files _ DLLs.srt | 21.15KB 4. The Windows Operating System/12.1 PE Explorer.html | 119B 4. The Windows Operating System/12.1 PE Files and DLLs.pptx | 118.26KB 4. The Windows Operating System/12.2 PE Explorer.html | 119B 4. The Windows Operating System/12.2 PE Files and DLLs.pptx | 118.26KB 4. The Windows Operating System/13. Windows Command Line - Accessing the Command Line.mp4 | 22.59MB 4. The Windows Operating System/13. Windows Command Line - Accessing the Command Line.srt | 6.51KB 4. The Windows Operating System/14. Windows Command Line - Navigation.mp4 | 32.12MB 4. The Windows Operating System/14. Windows Command Line - Navigation.srt | 9.33KB 4. The Windows Operating System/15. Windows Command Line - Working with Files and Directories.mp4 | 34.65MB 4. The Windows Operating System/15. Windows Command Line - Working with Files and Directories.srt | 9.45KB 4. The Windows Operating System/16. Windows Command Line - Working with Pipes.mp4 | 40.96MB 4. The Windows Operating System/16. Windows Command Line - Working with Pipes.srt | 11.42KB 4. The Windows Operating System/17. Windows Command Line - Standard IOE.mp4 | 16.63MB 4. The Windows Operating System/17. Windows Command Line - Standard IOE.srt | 5.64KB 4. The Windows Operating System/18. Windows Command Line - Managing Windows.mp4 | 41.09MB 4. The Windows Operating System/18. Windows Command Line - Managing Windows.srt | 16.95KB 5. The Linux Operating System/1. Where is the GUI!.mp4 | 10.24MB 5. The Linux Operating System/1. Where is the GUI!.srt | 5.56KB 5. The Linux Operating System/1.1 The GUI.pptx | 95.46KB 5. The Linux Operating System/1.2 Ubuntu ISO Updated.html | 96B 5. The Linux Operating System/2. The Linux File System.mp4 | 14.99MB 5. The Linux Operating System/2. The Linux File System.srt | 7.56KB 5. The Linux Operating System/2.1 EXT4 Info.html | 116B 5. The Linux Operating System/2.2 The Linux File System.pptx | 107.62KB 5. The Linux Operating System/3. Linux Command Line - Navigation.mp4 | 17.05MB 5. The Linux Operating System/3. Linux Command Line - Navigation.srt | 5.66KB 5. The Linux Operating System/4. Linux Command Line - Working with Files and Directories.mp4 | 38.82MB 5. The Linux Operating System/4. Linux Command Line - Working with Files and Directories.srt | 12.45KB 5. The Linux Operating System/5. Linux Command Line - Standard IOE Recap.mp4 | 16.22MB 5. The Linux Operating System/5. Linux Command Line - Standard IOE Recap.srt | 5.41KB 5. The Linux Operating System/6. Linux Command Line - Working with Data.mp4 | 56.47MB 5. The Linux Operating System/6. Linux Command Line - Working with Data.srt | 17.92KB 5. The Linux Operating System/7. Linux Command Line - Working with File Permissions.mp4 | 26.63MB 5. The Linux Operating System/7. Linux Command Line - Working with File Permissions.srt | 13.45KB 5. The Linux Operating System/7.1 Linux File Permissions.pptx | 134.07KB 5. The Linux Operating System/8. Linux Command Line - Man Pages.mp4 | 16.52MB 5. The Linux Operating System/8. Linux Command Line - Man Pages.srt | 4.90KB 5. The Linux Operating System/9. Linux Command Line - Base64.mp4 | 16.16MB 5. The Linux Operating System/9. Linux Command Line - Base64.srt | 3.19KB 5. The Linux Operating System/10. Linux Command Line - Hex.mp4 | 30.20MB 5. The Linux Operating System/10. Linux Command Line - Hex.srt | 7.45KB 5. The Linux Operating System/11. Linux Command Line - Network Connections Recap.mp4 | 21.50MB 5. The Linux Operating System/11. Linux Command Line - Network Connections Recap.srt | 5.39KB 5. The Linux Operating System/12. Linux Processes.mp4 | 54.14MB 5. The Linux Operating System/12. Linux Processes.srt | 16.73KB 5. The Linux Operating System/12.1 Process Info.html | 111B 5. The Linux Operating System/12.2 Processes.pptx | 117.11KB 5. The Linux Operating System/13. What are INodes.mp4 | 19.27MB 5. The Linux Operating System/13. What are INodes.srt | 5.64KB 5. The Linux Operating System/13.1 Inodes.pptx | 99.53KB 5. The Linux Operating System/14. Working with Open Files.mp4 | 33.10MB 5. The Linux Operating System/14. Working with Open Files.srt | 8.76KB 5. The Linux Operating System/14.1 Open FIles.pptx | 107.78KB 5. The Linux Operating System/15. Symbolic Links.mp4 | 22.62MB 5. The Linux Operating System/15. Symbolic Links.srt | 8.10KB 5. The Linux Operating System/15.1 Symbolic Links.pptx | 102.83KB 5. The Linux Operating System/16. The ID_s.mp4 | 14.09MB 5. The Linux Operating System/16. The ID_s.srt | 3.82KB 5. The Linux Operating System/17. Linux Pipes.mp4 | 14.52MB 5. The Linux Operating System/17. Linux Pipes.srt | 3.84KB 5. The Linux Operating System/18. Linux Run Levels.mp4 | 11.98MB 5. The Linux Operating System/18. Linux Run Levels.srt | 5.01KB 5. The Linux Operating System/18.1 Run Levels.pptx | 99.77KB 5. The Linux Operating System/19. Linux Logs.mp4 | 20.36MB 5. The Linux Operating System/19. Linux Logs.srt | 4.65KB 6. Operating System Internals/1. The Kernel.mp4 | 32.38MB 6. Operating System Internals/1. The Kernel.srt | 14.65KB 6. Operating System Internals/1.1 The Kernel.pptx | 119.78KB 6. Operating System Internals/2. One Ring to Rule Them All.mp4 | 17.72MB 6. Operating System Internals/2. One Ring to Rule Them All.srt | 7.64KB 6. Operating System Internals/2.1 One Ring to Rule Them All.pptx | 102.33KB 6. Operating System Internals/3. What is a CPU.mp4 | 9.16MB 6. Operating System Internals/3. What is a CPU.srt | 3.74KB 6. Operating System Internals/3.1 What is a CPU.pptx | 98.13KB 6. Operating System Internals/4. The CPU Registers.mp4 | 30.77MB 6. Operating System Internals/4. The CPU Registers.srt | 11.41KB 6. Operating System Internals/4.1 Registers.pptx | 119.52KB 6. Operating System Internals/5. The CPU Flags.mp4 | 7.57MB 6. Operating System Internals/5. The CPU Flags.srt | 3.22KB 6. Operating System Internals/5.1 Flags.pptx | 96.36KB 6. Operating System Internals/5.2 CPU Flags.html | 105B 6. Operating System Internals/6. What is Memory _ How does it work.mp4 | 10.84MB 6. Operating System Internals/6. What is Memory _ How does it work.srt | 4.78KB 6. Operating System Internals/6.1 Memory.pptx | 96.12KB 6. Operating System Internals/7. The Stack.mp4 | 19.52MB 6. Operating System Internals/7. The Stack.srt | 8.12KB 6. Operating System Internals/7.1 The Stack.pptx | 98.58KB 6. Operating System Internals/8. The Heap.mp4 | 11.08MB 6. Operating System Internals/8. The Heap.srt | 4.59KB 6. Operating System Internals/8.1 The Heap.pptx | 95.34KB 6. Operating System Internals/9. Extra information on Memory.mp4 | 13.84MB 6. Operating System Internals/9. Extra information on Memory.srt | 5.60KB 6. Operating System Internals/9.1 More on Memory.pptx | 101.64KB 6. Operating System Internals/10. Debuggers.mp4 | 20.53MB 6. Operating System Internals/10. Debuggers.srt | 7.14KB 6. Operating System Internals/10.1 Immunity Debugger.html | 107B 6. Operating System Internals/10.2 Debugger.pptx | 444.66KB 6. Operating System Internals/11. Taking a look at ASLR.mp4 | 8.75MB 6. Operating System Internals/11. Taking a look at ASLR.srt | 4.37KB 6. Operating System Internals/11.1 ASLR.pptx | 101.38KB 6. Operating System Internals/12. A Quick Word About AntiVirus.mp4 | 15.02MB 6. Operating System Internals/12. A Quick Word About AntiVirus.srt | 7.24KB 6. Operating System Internals/12.1 AntiVirus.pptx | 101.70KB 7. Active Directory/1. What is Active Directory.mp4 | 19.32MB 7. Active Directory/1. What is Active Directory.srt | 7.59KB 7. Active Directory/1.1 What is Active Directory.pptx | 95.09KB 7. Active Directory/2. Basic Windows Server Configuration.mp4 | 32.65MB 7. Active Directory/2. Basic Windows Server Configuration.srt | 9.41KB 7. Active Directory/3. Install AD DS.mp4 | 38.13MB 7. Active Directory/3. Install AD DS.srt | 12.90KB 7. Active Directory/4. The AD Tree.mp4 | 39.11MB 7. Active Directory/4. The AD Tree.srt | 12.96KB 7. Active Directory/5. OU_s and their Permissions.mp4 | 30.86MB 7. Active Directory/5. OU_s and their Permissions.srt | 8.21KB 7. Active Directory/6. Managing Users and Groups.mp4 | 20.32MB 7. Active Directory/6. Managing Users and Groups.srt | 6.36KB 7. Active Directory/7. Adding Machine to the Domain.mp4 | 36.51MB 7. Active Directory/7. Adding Machine to the Domain.srt | 8.83KB 7. Active Directory/7.1 Windows 10 ISO.html | 123B 7. Active Directory/8. Setting up Group Policies.mp4 | 54.47MB 7. Active Directory/8. Setting up Group Policies.srt | 16.56KB 7. Active Directory/9. Cached Credentials.mp4 | 14.34MB 7. Active Directory/9. Cached Credentials.srt | 3.74KB 8. Kerberos/1. What is Kerberos.mp4 | 10.48MB 8. Kerberos/1. What is Kerberos.srt | 4.93KB 8. Kerberos/1.1 What is Kerberos.pptx | 95.53KB 8. Kerberos/2. Kerberos Realms.mp4 | 4.52MB 8. Kerberos/2. Kerberos Realms.srt | 2.23KB 8. Kerberos/2.1 Kerberos Realm.pptx | 94.27KB 8. Kerberos/3. The Authentication Server.mp4 | 9.67MB 8. Kerberos/3. The Authentication Server.srt | 4.66KB 8. Kerberos/3.1 The Authentication Sever.pptx | 97.10KB 8. Kerberos/4. The Ticket Granting Server.mp4 | 21.14MB 8. Kerberos/4. The Ticket Granting Server.srt | 9.26KB 8. Kerberos/4.1 The Ticket Granting Server.pptx | 102.20KB 9. Data Manipulation/1. What is Encryption.mp4 | 10.50MB 9. Data Manipulation/1. What is Encryption.srt | 4.58KB 9. Data Manipulation/1.1 What is Encryption.pptx | 94.51KB 9. Data Manipulation/2. Symmetric Encryption.mp4 | 10.88MB 9. Data Manipulation/2. Symmetric Encryption.srt | 4.76KB 9. Data Manipulation/2.1 Symmetric Encryption.pptx | 96.89KB 9. Data Manipulation/3. Asymmetric Encryption.mp4 | 14.23MB 9. Data Manipulation/3. Asymmetric Encryption.srt | 7.32KB 9. Data Manipulation/3.1 Asymmetric Encryption.pptx | 101.44KB 9. Data Manipulation/4. RSA Encryption.mp4 | 6.17MB 9. Data Manipulation/4. RSA Encryption.srt | 2.81KB 9. Data Manipulation/4.1 RSA.html | 114B 9. Data Manipulation/4.2 RSA.pptx | 92.64KB 9. Data Manipulation/5. AES Encryption.mp4 | 5.48MB 9. Data Manipulation/5. AES Encryption.srt | 2.37KB 9. Data Manipulation/5.1 AES.html | 138B 9. Data Manipulation/5.2 AES.pptx | 92.60KB 9. Data Manipulation/6. What is Hashing.mp4 | 10.49MB 9. Data Manipulation/6. What is Hashing.srt | 4.41KB 9. Data Manipulation/6.1 What is Hashing.pptx | 94.25KB 9. Data Manipulation/7. MD5 Hashing.mp4 | 8.23MB 9. Data Manipulation/7. MD5 Hashing.srt | 3.38KB 9. Data Manipulation/7.1 MD5.html | 114B 9. Data Manipulation/7.2 MD5.pptx | 92.54KB 9. Data Manipulation/8. SHA Hashing.mp4 | 14.06MB 9. Data Manipulation/8. SHA Hashing.srt | 6.23KB 9. Data Manipulation/8.1 SHA.html | 114B 9. Data Manipulation/8.2 SHA.pptx | 92.63KB 9. Data Manipulation/9. What is Encoding.mp4 | 5.53MB 9. Data Manipulation/9. What is Encoding.srt | 2.83KB 9. Data Manipulation/9.1 What is Encoding.pptx | 94.32KB 9. Data Manipulation/10. Base64 Encoding.mp4 | 13.31MB 9. Data Manipulation/10. Base64 Encoding.srt | 5.83KB 9. Data Manipulation/10.1 Base64.html | 112B 9. Data Manipulation/10.2 Base64.pptx | 109.95KB 9. Data Manipulation/11. Hex Encoding.mp4 | 12.74MB 9. Data Manipulation/11. Hex Encoding.srt | 5.79KB 9. Data Manipulation/11.1 Hex.pptx | 95.68KB 9. Data Manipulation/11.2 Hex.html | 113B 9. Data Manipulation/12. URL Encoding.mp4 | 9.55MB 9. Data Manipulation/12. URL Encoding.srt | 4.03KB 9. Data Manipulation/12.1 URL.pptx | 94.28KB 9. Data Manipulation/12.2 URL.html | 110B 9. Data Manipulation/13. What is Compression.mp4 | 8.02MB 9. Data Manipulation/13. What is Compression.srt | 4.52KB 9. Data Manipulation/13.1 What is Compression.pptx | 96.19KB 9. Data Manipulation/14. Lossless vs Lossy Compression.mp4 | 10.73MB 9. Data Manipulation/14. Lossless vs Lossy Compression.srt | 4.29KB 9. Data Manipulation/14.1 Lossless vs Lossy.pptx | 93.74KB 9. Data Manipulation/15. LZ77 _ LZ78 Compression Algorithms.mp4 | 6.38MB 9. Data Manipulation/15. LZ77 _ LZ78 Compression Algorithms.srt | 2.86KB 9. Data Manipulation/15.1 LZ77 _ LZ78.html | 104B 9. Data Manipulation/15.2 LZ77 and LZ78.pptx | 93.35KB 9. Data Manipulation/16. Data Manipulation - Hands On.mp4 | 5.34MB 9. Data Manipulation/16. Data Manipulation - Hands On.srt | 2.37KB 9. Data Manipulation/16.1 Data Manipulation Hands On.pptx | 91.49KB 10. Networking/1. What is Networking.mp4 | 18.77MB 10. Networking/1. What is Networking.srt | 11.60KB 10. Networking/1.1 What is Networking.pptx | 107.54KB 10. Networking/2. The OSI Model.mp4 | 18.99MB 10. Networking/2. The OSI Model.srt | 7.38KB 10. Networking/2.1 OSI Model.pptx | 103.42KB 10. Networking/3. TCPIP.mp4 | 28.91MB 10. Networking/3. TCPIP.srt | 13.51KB 10. Networking/3.1 TCPIP.pptx | 100.32KB 10. Networking/4. UDP.mp4 | 10.19MB 10. Networking/4. UDP.srt | 3.56KB 10. Networking/4.1 UDP.pptx | 91.07KB 10. Networking/5. The Switch.mp4 | 12.57MB 10. Networking/5. The Switch.srt | 5.47KB 10. Networking/5.1 The Switch.pptx | 405.03KB 10. Networking/6. Routers _ Gateways.mp4 | 19.56MB 10. Networking/6. Routers _ Gateways.srt | 8.42KB 10. Networking/6.1 Routers and Gateways.pptx | 95.47KB 10. Networking/7. What is a Protocol.mp4 | 5.03MB 10. Networking/7. What is a Protocol.srt | 1.89KB 10. Networking/7.1 What is a Protocol.pptx | 91.51KB 10. Networking/8. ICMP.mp4 | 19.04MB 10. Networking/8. ICMP.srt | 8.37KB 10. Networking/8.1 ICMP.pptx | 95.83KB 10. Networking/9. DNS.mp4 | 26.74MB 10. Networking/9. DNS.srt | 10.98KB 10. Networking/9.1 DNS.pptx | 98.98KB 10. Networking/10. DHCP.mp4 | 18.29MB 10. Networking/10. DHCP.srt | 8.54KB 10. Networking/10.1 DHCP.pptx | 100.42KB 10. Networking/11. ARP.mp4 | 16.61MB 10. Networking/11. ARP.srt | 6.07KB 10. Networking/11.1 ARP.pptx | 95.83KB 10. Networking/12. What is an IDS.mp4 | 10.47MB 10. Networking/12. What is an IDS.srt | 4.70KB 10. Networking/12.1 What is an IDS.pptx | 95.57KB 10. Networking/13. What is an IPS.mp4 | 15.82MB 10. Networking/13. What is an IPS.srt | 6.47KB 10. Networking/13.1 What is an IPS.pptx | 95.77KB 10. Networking/14. What is HA.mp4 | 14.62MB 10. Networking/14. What is HA.srt | 6.62KB 10. Networking/14.1 What is HA.pptx | 94.01KB 10. Networking/15. Proxys.mp4 | 8.46MB 10. Networking/15. Proxys.srt | 4.93KB 10. Networking/15.1 Proxys.pptx | 92.74KB 10. Networking/16. The DMZ.mp4 | 7.84MB 10. Networking/16. The DMZ.srt | 3.42KB 10. Networking/16.1 DMZ.pptx | 91.19KB 10. Networking/17. Quick Talk on Databases.mp4 | 14.03MB 10. Networking/17. Quick Talk on Databases.srt | 5.81KB 10. Networking/17.1 Quick Talk on Databases.pptx | 95.96KB 10. Networking/17.2 SQL Tutorial.html | 96B 11. VPNs/1. What is a VPN.mp4 | 9.81MB 11. VPNs/1. What is a VPN.srt | 3.58KB 11. VPNs/1.1 What is a VPN.pptx | 92.54KB 11. VPNs/2. What is IPSEC.mp4 | 23.54MB 11. VPNs/2. What is IPSEC.srt | 12.02KB 11. VPNs/2.1 What is a IPSEC.pptx | 102.19KB 11. VPNs/3. What is IKE.mp4 | 18.63MB 11. VPNs/3. What is IKE.srt | 9.27KB 11. VPNs/3.1 What is a IKE.pptx | 100.87KB 12. Firewalls/1. What is a Firewall.mp4 | 15.03MB 12. Firewalls/1. What is a Firewall.srt | 5.89KB 12. Firewalls/1.1 What is a Firewall.pptx | 96.05KB 12. Firewalls/2. Packet Filtering Firewalls.mp4 | 3.34MB 12. Firewalls/2. Packet Filtering Firewalls.srt | 1.98KB 12. Firewalls/2.1 Packet Filtering Firewalls.pptx | 94.09KB 12. Firewalls/3. Stateful Inspecting Firewalls.mp4 | 7.48MB 12. Firewalls/3. Stateful Inspecting Firewalls.srt | 3.77KB 12. Firewalls/3.1 Stateful Inspection Firewalls.pptx | 94.57KB 12. Firewalls/4. Web Application Firewalls.mp4 | 6.01MB 12. Firewalls/4. Web Application Firewalls.srt | 3.09KB 12. Firewalls/4.1 Web Application Firewalls.pptx | 92.81KB 13. Configuring PFSense Firewalls/1. Installing PFSense.mp4 | 33.52MB 13. Configuring PFSense Firewalls/1. Installing PFSense.srt | 10.01KB 13. Configuring PFSense Firewalls/1.1 PFSense Installer.html | 94B 13. Configuring PFSense Firewalls/2. The Firewall UI.mp4 | 39.51MB 13. Configuring PFSense Firewalls/2. The Firewall UI.srt | 13.33KB 13. Configuring PFSense Firewalls/3. Configuring a DMZ.mp4 | 25.97MB 13. Configuring PFSense Firewalls/3. Configuring a DMZ.srt | 10.89KB 13. Configuring PFSense Firewalls/4. Configuring a VPN.mp4 | 24.55MB 13. Configuring PFSense Firewalls/4. Configuring a VPN.srt | 9.73KB 13. Configuring PFSense Firewalls/5. Backup _ Logging.mp4 | 18.70MB 13. Configuring PFSense Firewalls/5. Backup _ Logging.srt | 6.74KB 13. Configuring PFSense Firewalls/6. PFsense Hands On.mp4 | 5.37MB 13. Configuring PFSense Firewalls/6. PFsense Hands On.srt | 3.21KB 13. Configuring PFSense Firewalls/6.1 PFSense Hands On.pptx | 92.29KB 14. Program Theory/1. What is a Compiler.mp4 | 11.31MB 14. Program Theory/1. What is a Compiler.srt | 5.16KB 14. Program Theory/1.1 What is a Compiler.pptx | 96.02KB 14. Program Theory/2. What is a Linker.mp4 | 15.11MB 14. Program Theory/2. What is a Linker.srt | 6.33KB 14. Program Theory/2.1 What is a Linker.pptx | 94.23KB 15. Python Course/1. Why Python.mp4 | 10.39MB 15. Python Course/1. Why Python.srt | 5.65KB 15. Python Course/1.1 Why Python.pptx | 91.28KB 15. Python Course/2. Installing Python.mp4 | 14.59MB 15. Python Course/2. Installing Python.srt | 5.64KB 15. Python Course/2.1 Sublime IDE.html | 90B 15. Python Course/2.2 Python Installer.html | 94B 15. Python Course/3. Hello World.mp4 | 17.43MB 15. Python Course/3. Hello World.srt | 8.86KB 15. Python Course/3.1 HelloWorld.py | 583B 15. Python Course/4. Variables.mp4 | 17.49MB 15. Python Course/4. Variables.srt | 8.66KB 15. Python Course/4.1 Variables.py | 1.18KB 15. Python Course/5. Type Casting.mp4 | 11.65MB 15. Python Course/5. Type Casting.srt | 6.31KB 15. Python Course/5.1 TypeCasting.py | 1015B 15. Python Course/6. Operators.mp4 | 10.77MB 15. Python Course/6. Operators.srt | 5.99KB 15. Python Course/6.1 Operators.py | 2.32KB 15. Python Course/7. IfElse.mp4 | 34.15MB 15. Python Course/7. IfElse.srt | 16.24KB 15. Python Course/7.1 IfElse.py | 2.28KB 15. Python Course/8. Loops.mp4 | 20.12MB 15. Python Course/8. Loops.srt | 10.55KB 15. Python Course/8.1 Loops.py | 1.28KB 15. Python Course/9. The Dictionary.mp4 | 23.96MB 15. Python Course/9. The Dictionary.srt | 12.27KB 15. Python Course/9.1 Dictionary.py | 2.00KB 15. Python Course/10. Lists.mp4 | 26.37MB 15. Python Course/10. Lists.srt | 13.24KB 15. Python Course/10.1 Lists.py | 1.54KB 15. Python Course/11. Tuples.mp4 | 10.02MB 15. Python Course/11. Tuples.srt | 5.32KB 15. Python Course/11.1 Tuples.py | 1.14KB 15. Python Course/12. Modules.mp4 | 17.07MB 15. Python Course/12. Modules.srt | 8.31KB 15. Python Course/12.1 Modules.py | 810B 15. Python Course/13. Classes.mp4 | 27.17MB 15. Python Course/13. Classes.srt | 14.95KB 15. Python Course/13.1 Classes.py | 1.36KB 15. Python Course/13.2 Person.py | 878B 15. Python Course/14. Inheritance.mp4 | 48.55MB 15. Python Course/14. Inheritance.srt | 18.16KB 15. Python Course/14.1 Inheritance.py | 1.63KB 15. Python Course/14.2 CheckingAccount.py | 822B 15. Python Course/14.3 Account.py | 961B 15. Python Course/15. Configuration Files.mp4 | 12.70MB 15. Python Course/15. Configuration Files.srt | 5.99KB 15. Python Course/15.1 Configs.py | 1.24KB 15. Python Course/15.2 Configs.zip | 1.57KB 15. Python Course/16. Logging.mp4 | 15.17MB 15. Python Course/16. Logging.srt | 9.22KB 15. Python Course/16.1 Logging.py | 1.40KB 15. Python Course/17. Error Handling.mp4 | 20.60MB 15. Python Course/17. Error Handling.srt | 9.61KB 15. Python Course/17.1 ErrorHandling.py | 1.25KB 15. Python Course/18. Sockets.mp4 | 28.81MB 15. Python Course/18. Sockets.srt | 14.70KB 15. Python Course/18.1 SocketsClient.py | 929B 15. Python Course/18.2 SocketsServer.py | 1.17KB 15. Python Course/19. Threading.mp4 | 17.94MB 15. Python Course/19. Threading.srt | 9.50KB 15. Python Course/19.1 Threading.py | 845B 15. Python Course/20. Python Hands On.mp4 | 6.98MB 15. Python Course/20. Python Hands On.srt | 3.63KB 15. Python Course/20.1 Hands On Python.pptx | 93.65KB 16. Assembly Course/1. Why Assembly.mp4 | 5.15MB 16. Assembly Course/1. Why Assembly.srt | 2.76KB 16. Assembly Course/1.1 Why ASM.pptx | 92.61KB 16. Assembly Course/2. Hello World.mp4 | 59.66MB 16. Assembly Course/2. Hello World.srt | 21.13KB 16. Assembly Course/2.1 HelloWorld.asm.zip | 1.22KB 16. Assembly Course/3. Variables.mp4 | 21.66MB 16. Assembly Course/3. Variables.srt | 7.14KB 16. Assembly Course/3.1 DataTypes.asm.zip | 1.12KB 16. Assembly Course/4. Saving States.mp4 | 32.36MB 16. Assembly Course/4. Saving States.srt | 13.47KB 16. Assembly Course/4.1 SavingState.asm.zip | 1.39KB 16. Assembly Course/5. Arithmetic.mp4 | 77.42MB 16. Assembly Course/5. Arithmetic.srt | 24.07KB 16. Assembly Course/5.1 Arithmetic.asm.zip | 2.11KB 16. Assembly Course/6. Loops.mp4 | 15.76MB 16. Assembly Course/6. Loops.srt | 6.23KB 16. Assembly Course/6.1 Loops.asm.zip | 1.56KB 16. Assembly Course/7. Logic Control.mp4 | 38.67MB 16. Assembly Course/7. Logic Control.srt | 13.28KB 16. Assembly Course/7.1 Logic.asm.zip | 1.24KB 16. Assembly Course/8. Reading Files.mp4 | 45.84MB 16. Assembly Course/8. Reading Files.srt | 15.24KB 16. Assembly Course/8.1 ReadingFiles.asm.zip | 1.51KB 16. Assembly Course/9. Writing Files.mp4 | 22.77MB 16. Assembly Course/9. Writing Files.srt | 8.38KB 16. Assembly Course/9.1 WritingFiles.asm.zip | 1.40KB 16. Assembly Course/10. Op Code.mp4 | 23.64MB 16. Assembly Course/10. Op Code.srt | 8.61KB 16. Assembly Course/11. Bit Operators.mp4 | 8.97MB 16. Assembly Course/11. Bit Operators.srt | 4.44KB 16. Assembly Course/11.1 Bit Operators.pptx | 97.97KB 16. Assembly Course/12. Assembly Hands On.mp4 | 3.48MB 16. Assembly Course/12. Assembly Hands On.srt | 1.96KB 16. Assembly Course/12.1 Assembly Hands On.pptx | 92.21KB 17. Scope Identification/1. Goal _ Scope Identification.mp4 | 17.07MB 17. Scope Identification/1. Goal _ Scope Identification.srt | 8.95KB 17. Scope Identification/1.1 Goal and Scope Identification.pptx | 97.29KB 17. Scope Identification/2. Stability Considerations.mp4 | 19.97MB 17. Scope Identification/2. Stability Considerations.srt | 11.09KB 17. Scope Identification/2.1 Stability Considerations.pptx | 95.72KB 17. Scope Identification/3. Briefing Stake Holders.mp4 | 7.04MB 17. Scope Identification/3. Briefing Stake Holders.srt | 3.33KB 17. Scope Identification/3.1 Briefing Stake Holders.pptx | 93.99KB 17. Scope Identification/4. Prepping.mp4 | 9.98MB 17. Scope Identification/4. Prepping.srt | 4.83KB 17. Scope Identification/4.1 Assessment Document Template.docx | 33.93KB 17. Scope Identification/5. Scope Identification Hands On.mp4 | 5.55MB 17. Scope Identification/5. Scope Identification Hands On.srt | 3.48KB 17. Scope Identification/5.1 Scope Identification Hands On.pptx | 93.17KB 18. Reconnaissance/1. What is Reconnaissance.mp4 | 9.73MB 18. Reconnaissance/1. What is Reconnaissance.srt | 5.47KB 18. Reconnaissance/1.1 What is Recon.pptx | 93.50KB 18. Reconnaissance/2. Installing Kali.mp4 | 35.56MB 18. Reconnaissance/2. Installing Kali.srt | 8.41KB 18. Reconnaissance/2.1 Kali Iso Updated.html | 137B 18. Reconnaissance/3. Passive Recon - Google.mp4 | 47.80MB 18. Reconnaissance/3. Passive Recon - Google.srt | 13.12KB 18. Reconnaissance/3.1 Google Hacking Database.html | 111B 18. Reconnaissance/4. Passive Recon - Shodan.mp4 | 22.49MB 18. Reconnaissance/4. Passive Recon - Shodan.srt | 7.74KB 18. Reconnaissance/4.1 Shodan.html | 83B 18. Reconnaissance/5. Passive Recon - Whois.mp4 | 32.64MB 18. Reconnaissance/5. Passive Recon - Whois.srt | 9.67KB 18. Reconnaissance/5.1 Whois.html | 87B 18. Reconnaissance/6. Passive Recon - Netcraft.mp4 | 37.71MB 18. Reconnaissance/6. Passive Recon - Netcraft.srt | 10.04KB 18. Reconnaissance/6.1 Netcraft.html | 86B 18. Reconnaissance/7. Passive Recon - Job Posting.mp4 | 40.88MB 18. Reconnaissance/7. Passive Recon - Job Posting.srt | 10.97KB 18. Reconnaissance/8. Active Recon - Port Scanning.mp4 | 110.48MB 18. Reconnaissance/8. Active Recon - Port Scanning.srt | 28.28KB 18. Reconnaissance/9. Active Recon - DNS.mp4 | 42.90MB 18. Reconnaissance/9. Active Recon - DNS.srt | 10.46KB 18. Reconnaissance/10. Active Recon - Nikto.mp4 | 32.17MB 18. Reconnaissance/10. Active Recon - Nikto.srt | 8.39KB 18. Reconnaissance/11. Active Recon - Dirb.mp4 | 24.22MB 18. Reconnaissance/11. Active Recon - Dirb.srt | 6.78KB 18. Reconnaissance/12. Active Recon - Sparta.mp4 | 42.72MB 18. Reconnaissance/12. Active Recon - Sparta.srt | 12.13KB 18. Reconnaissance/13. Active Recon - Working with NC.mp4 | 67.62MB 18. Reconnaissance/13. Active Recon - Working with NC.srt | 16.79KB 18. Reconnaissance/13.1 NC For Windows.html | 109B 18. Reconnaissance/13.2 Pentest Monkey.html | 130B 18. Reconnaissance/14. Active Recon - Banner Grabbing.mp4 | 37.21MB 18. Reconnaissance/14. Active Recon - Banner Grabbing.srt | 11.03KB 18. Reconnaissance/15. Active Recon - Vulnerability Scanners.mp4 | 14.95MB 18. Reconnaissance/15. Active Recon - Vulnerability Scanners.srt | 6.93KB 18. Reconnaissance/15.1 Nessus Download.html | 101B 18. Reconnaissance/15.2 Vuln Scanners.pptx | 95.49KB 18. Reconnaissance/15.3 Nessus Tutorial.html | 161B 18. Reconnaissance/16. Active Recon - Browsing.mp4 | 31.93MB 18. Reconnaissance/16. Active Recon - Browsing.srt | 9.51KB 18. Reconnaissance/17. Active Recon - Manual vs Automated.mp4 | 22.81MB 18. Reconnaissance/17. Active Recon - Manual vs Automated.srt | 5.91KB 18. Reconnaissance/18. Reconnaissance Hands On.mp4 | 7.47MB 18. Reconnaissance/18. Reconnaissance Hands On.srt | 2.32KB 19. Exploitation/1. Finding Exploits.mp4 | 59.09MB 19. Exploitation/1. Finding Exploits.srt | 13.55KB 19. Exploitation/1.1 Exploit-DB.html | 102B 19. Exploitation/2. Misconfigurations.mp4 | 10.88MB 19. Exploitation/2. Misconfigurations.srt | 5.44KB 19. Exploitation/2.1 Misconfigurations.pptx | 94.79KB 19. Exploitation/3. Looking for 0 days.mp4 | 11.80MB 19. Exploitation/3. Looking for 0 days.srt | 6.14KB 19. Exploitation/3.1 0Days.pptx | 92.65KB 19. Exploitation/4. Metasploit - What is Metasploit.mp4 | 30.21MB 19. Exploitation/4. Metasploit - What is Metasploit.srt | 10.83KB 19. Exploitation/5. Metasploit - Exploits and Payloads.mp4 | 81.56MB 19. Exploitation/5. Metasploit - Exploits and Payloads.srt | 21.46KB 19. Exploitation/6. Metasploit - The Meterpreter.mp4 | 67.81MB 19. Exploitation/6. Metasploit - The Meterpreter.srt | 18.48KB 19. Exploitation/7. Metasploit - Adding an Exploit to Metasploit.mp4 | 42.22MB 19. Exploitation/7. Metasploit - Adding an Exploit to Metasploit.srt | 13.68KB 19. Exploitation/8. Metasploit - MSFVenom.mp4 | 44.99MB 19. Exploitation/8. Metasploit - MSFVenom.srt | 10.75KB 19. Exploitation/9. Metasploit - Hands On.mp4 | 8.95MB 19. Exploitation/9. Metasploit - Hands On.srt | 4.57KB 19. Exploitation/9.1 Metasploit Hands On.pptx | 92.53KB 19. Exploitation/10. The OWASP Top 10.mp4 | 50.10MB 19. Exploitation/10. The OWASP Top 10.srt | 10.89KB 19. Exploitation/10.1 CSRF.html | 139B 19. Exploitation/10.2 OWASP Top 10.html | 145B 1. Welcome! Who Is This Guy!/1. Introduction.mp4 | 9.28MB 19. Exploitation/11. SQL Injection _ SQLMap.srt | 39.47KB 19. Exploitation/11.1 Installing DVWA in Kali Linux.html | 179B 19. Exploitation/11.2 SQLInjection Tutorial.html | 108B 19. Exploitation/12. XSS.mp4 | 48.47MB 19. Exploitation/12. XSS.srt | 18.65KB 19. Exploitation/13. Insecure Direct Object Reference.mp4 | 17.35MB 19. Exploitation/13. Insecure Direct Object Reference.srt | 7.86KB 19. Exploitation/13.1 idor.txt | 496B 19. Exploitation/14. Local File Inclusion.mp4 | 73.75MB 19. Exploitation/14. Local File Inclusion.srt | 15.86KB 19. Exploitation/15. Remote File Inclusion.mp4 | 30.44MB 19. Exploitation/15. Remote File Inclusion.srt | 10.37KB 19. Exploitation/16. The Authenticated Unauthenticated Pages.mp4 | 18.65MB 19. Exploitation/16. The Authenticated Unauthenticated Pages.srt | 7.13KB 19. Exploitation/17. Broken Authentication and Session Management.mp4 | 25.18MB 19. Exploitation/17. Broken Authentication and Session Management.srt | 11.83KB 19. Exploitation/17.1 Broken Auth.pptx | 100.39KB 19. Exploitation/18. Faulty Redirects.mp4 | 8.79MB 19. Exploitation/18. Faulty Redirects.srt | 5.15KB 20. Post Exploitation/1. Stabilizing Shells.mp4 | 66.28MB 20. Post Exploitation/1. Stabilizing Shells.srt | 18.08KB 20. Post Exploitation/2. Breaking Out Of The Jail Shell.mp4 | 39.54MB 20. Post Exploitation/2. Breaking Out Of The Jail Shell.srt | 11.22KB 20. Post Exploitation/3. What is Persistence.mp4 | 6.61MB 20. Post Exploitation/3. What is Persistence.srt | 3.88KB 20. Post Exploitation/3.1 What is Persistence.pptx | 95.40KB 20. Post Exploitation/4. Windows Persistence.mp4 | 47.46MB 20. Post Exploitation/4. Windows Persistence.srt | 13.51KB 20. Post Exploitation/5. Linux Persistence.mp4 | 47.95MB 20. Post Exploitation/5. Linux Persistence.srt | 14.63KB 20. Post Exploitation/6. What is Privilege Escalation.mp4 | 24.70MB 20. Post Exploitation/6. What is Privilege Escalation.srt | 6.49KB 20. Post Exploitation/7. OS Version.mp4 | 59.02MB 20. Post Exploitation/7. OS Version.srt | 13.85KB 20. Post Exploitation/8. Common Configuration Issues.mp4 | 56.77MB 20. Post Exploitation/8. Common Configuration Issues.srt | 15.60KB 20. Post Exploitation/8.1 Windows Privilege Escalation Tutorial 1.html | 142B 20. Post Exploitation/8.2 Windows Privilege Escalation Tutorial 2.html | 107B 20. Post Exploitation/8.3 Linux Privilege Escalation Tutorial 2.html | 130B 20. Post Exploitation/8.4 Linux Privilege Escalation Tutorial 1.html | 127B 20. Post Exploitation/9. File Permissions.mp4 | 70.68MB 20. Post Exploitation/9. File Permissions.srt | 18.92KB 20. Post Exploitation/9.1 AccessCheck Tutorial.html | 107B 20. Post Exploitation/10. MySQL.mp4 | 68.81MB 20. Post Exploitation/10. MySQL.srt | 17.81KB 20. Post Exploitation/11. Sudo.mp4 | 44.63MB 20. Post Exploitation/11. Sudo.srt | 11.51KB 20. Post Exploitation/12. Relative Path Sudo Binary.mp4 | 46.68MB 20. Post Exploitation/12. Relative Path Sudo Binary.srt | 10.21KB 20. Post Exploitation/13. Unquoted Service Path.mp4 | 61.22MB 20. Post Exploitation/13. Unquoted Service Path.srt | 18.80KB 20. Post Exploitation/14. Service Misconfigurations.mp4 | 43.38MB 20. Post Exploitation/14. Service Misconfigurations.srt | 9.49KB 20. Post Exploitation/14.1 AccessCheck Windows XP.html | 147B 20. Post Exploitation/14.2 AccessCheck Windows Vista _ Up.html | 114B 20. Post Exploitation/15. LinuxPrivChecker.mp4 | 45.23MB 20. Post Exploitation/15. LinuxPrivChecker.srt | 9.81KB 20. Post Exploitation/15.1 LinuxPrivChecker.html | 118B 20. Post Exploitation/16. Im Root Now What.mp4 | 12.57MB 20. Post Exploitation/16. Im Root Now What.srt | 4.29KB 20. Post Exploitation/17. Pulling Hashes.mp4 | 47.31MB 20. Post Exploitation/17. Pulling Hashes.srt | 13.61KB 20. Post Exploitation/18. Pass The Hash.mp4 | 20.50MB 20. Post Exploitation/18. Pass The Hash.srt | 6.79KB 20. Post Exploitation/19. SSH Keys.mp4 | 25.30MB 20. Post Exploitation/19. SSH Keys.srt | 6.71KB 20. Post Exploitation/20. Checking Logs.mp4 | 9.85MB 20. Post Exploitation/20. Checking Logs.srt | 2.65KB 20. Post Exploitation/21. Duel Homed Machines.mp4 | 8.73MB 20. Post Exploitation/21. Duel Homed Machines.srt | 2.87KB 20. Post Exploitation/22. Network Traffic.mp4 | 39.86MB 20. Post Exploitation/22. Network Traffic.srt | 10.56KB 20. Post Exploitation/23. ARP Poisoning.mp4 | 35.32MB 20. Post Exploitation/23. ARP Poisoning.srt | 9.61KB 20. Post Exploitation/24. Web Servers.mp4 | 9.84MB 20. Post Exploitation/24. Web Servers.srt | 3.30KB 20. Post Exploitation/25. Account Directory Attacks.mp4 | 17.95MB 20. Post Exploitation/25. Account Directory Attacks.srt | 5.48KB 20. Post Exploitation/26. Password Spraying.mp4 | 25.39MB 20. Post Exploitation/26. Password Spraying.srt | 8.24KB 20. Post Exploitation/26.1 spray.py | 831B 20. Post Exploitation/27. SSH Tunneling.mp4 | 57.15MB 20. Post Exploitation/27. SSH Tunneling.srt | 15.18KB 20. Post Exploitation/28. Pivoting.mp4 | 64.52MB 20. Post Exploitation/28. Pivoting.srt | 17.88KB 21. Password Cracking/1. What is Password Cracking.mp4 | 13.99MB 21. Password Cracking/1. What is Password Cracking.srt | 6.88KB 21. Password Cracking/1.1 What is Password Cracking.pptx | 98.81KB 21. Password Cracking/2. John The Ripper.mp4 | 21.33MB 21. Password Cracking/2. John The Ripper.srt | 7.08KB 21. Password Cracking/2.1 John The Ripper Windows Tutorial.html | 135B 21. Password Cracking/2.2 John The Ripper Linux Tutorial.html | 162B 21. Password Cracking/3. Hashcat.mp4 | 28.43MB 21. Password Cracking/3. Hashcat.srt | 8.75KB 21. Password Cracking/4. Rainbow Tables.mp4 | 16.59MB 21. Password Cracking/4. Rainbow Tables.srt | 7.22KB 21. Password Cracking/4.1 Rainbow Tables.pptx | 99.36KB 21. Password Cracking/5. Password Cracking Hands On.mp4 | 3.76MB 21. Password Cracking/5. Password Cracking Hands On.srt | 2.18KB 21. Password Cracking/5.1 Password Cracking Hands On.pptx | 93.01KB 22. Covering Your Tracks/1. Why Cover Your Tracks.mp4 | 11.44MB 22. Covering Your Tracks/1. Why Cover Your Tracks.srt | 6.49KB 22. Covering Your Tracks/1.1 Why Cover Your Tracks.pptx | 96.82KB 22. Covering Your Tracks/2. Clearing Windows Logs.mp4 | 17.41MB 22. Covering Your Tracks/2. Clearing Windows Logs.srt | 4.61KB 22. Covering Your Tracks/3. Clearing Linux Logs.mp4 | 40.54MB 22. Covering Your Tracks/3. Clearing Linux Logs.srt | 7.71KB 22. Covering Your Tracks/4. Quick Talk on Logging.mp4 | 26.19MB 22. Covering Your Tracks/4. Quick Talk on Logging.srt | 7.44KB 22. Covering Your Tracks/5. Clearing Command History.mp4 | 35.80MB 22. Covering Your Tracks/5. Clearing Command History.srt | 11.27KB 22. Covering Your Tracks/6. Persistent Backdoors.mp4 | 15.83MB 22. Covering Your Tracks/6. Persistent Backdoors.srt | 4.46KB 22. Covering Your Tracks/7. The Clean Up.mp4 | 9.87MB 22. Covering Your Tracks/7. The Clean Up.srt | 4.50KB 22. Covering Your Tracks/8. Covering Your Tracks Hands On.mp4 | 2.04MB 22. Covering Your Tracks/8. Covering Your Tracks Hands On.srt | 1.52KB 23. Reporting/1. The Format.mp4 | 68.86MB 23. Reporting/1. The Format.srt | 21.10KB 23. Reporting/1.1 Report Template.docx | 111.92KB 23. Reporting/2. The Audience.mp4 | 11.57MB 23. Reporting/2. The Audience.srt | 6.01KB 23. Reporting/2.1 The Audience.pptx | 96.06KB 23. Reporting/3. Business Risks on Findings.mp4 | 14.38MB 23. Reporting/3. Business Risks on Findings.srt | 8.32KB 23. Reporting/3.1 Buisness Risk on Findings.pptx | 97.01KB 23. Reporting/4. Remediation Options.mp4 | 7.69MB 23. Reporting/4. Remediation Options.srt | 4.61KB 23. Reporting/4.1 Remediation Options.pptx | 92.46KB 23. Reporting/5. Working With The Blue Team.mp4 | 6.08MB 23. Reporting/5. Working With The Blue Team.srt | 3.10KB 23. Reporting/5.1 Working With The Blue Team.pptx | 92.95KB 24. Attacking Active Directory (Realistic Scenario)/1. Reconnaissance.mp4 | 12.60MB 24. Attacking Active Directory (Realistic Scenario)/1. Reconnaissance.srt | 4.07KB 24. Attacking Active Directory (Realistic Scenario)/2. Exploitation.mp4 | 17.78MB 24. Attacking Active Directory (Realistic Scenario)/2. Exploitation.srt | 4.99KB 24. Attacking Active Directory (Realistic Scenario)/3. Post Exploitation.mp4 | 18.38MB 24. Attacking Active Directory (Realistic Scenario)/3. Post Exploitation.srt | 4.46KB 24. Attacking Active Directory (Realistic Scenario)/4. Finding New Access.mp4 | 26.82MB 24. Attacking Active Directory (Realistic Scenario)/4. Finding New Access.srt | 8.92KB 24. Attacking Active Directory (Realistic Scenario)/5. Moving Up In The World!.mp4 | 21.77MB 24. Attacking Active Directory (Realistic Scenario)/5. Moving Up In The World!.srt | 4.85KB 24. Attacking Active Directory (Realistic Scenario)/6. Getting Domain Admin.mp4 | 36.18MB 24. Attacking Active Directory (Realistic Scenario)/6. Getting Domain Admin.srt | 10.17KB 25. Job Hunting/1. The Resume.mp4 | 47.65MB 25. Job Hunting/1. The Resume.srt | 11.38KB 25. Job Hunting/1.1 Resume.docx | 19.04KB 25. Job Hunting/2. Professional Email.mp4 | 14.66MB 25. Job Hunting/2. Professional Email.srt | 6.69KB 25. Job Hunting/3. Certifications.mp4 | 47.41MB 25. Job Hunting/3. Certifications.srt | 18.48KB 25. Job Hunting/4. Personal Brand.mp4 | 51.37MB 25. Job Hunting/4. Personal Brand.srt | 18.11KB 25. Job Hunting/5. Searching for the Job.mp4 | 56.26MB 25. Job Hunting/5. Searching for the Job.srt | 17.79KB 25. Job Hunting/6. Analyzing the Job Post.mp4 | 121.84MB 25. Job Hunting/6. Analyzing the Job Post.srt | 35.04KB 25. Job Hunting/7. Applying for the Job.mp4 | 22.75MB 25. Job Hunting/7. Applying for the Job.srt | 6.92KB 25. Job Hunting/8. The Future Company.mp4 | 42.80MB 25. Job Hunting/8. The Future Company.srt | 12.75KB 25. Job Hunting/9. Salary Requirements.mp4 | 46.98MB 25. Job Hunting/9. Salary Requirements.srt | 16.39KB 25. Job Hunting/10. The Interview Process - The Screening Call.mp4 | 19.06MB 25. Job Hunting/10. The Interview Process - The Screening Call.srt | 12.46KB 25. Job Hunting/10.1 The Screening Call.pptx | 95.05KB 25. Job Hunting/11. The Interview Process - Prepping for the Technical Interviews.srt | 356B 25. Job Hunting/12. The Interview Process - The Technical Screening Interview.srt | 356B 25. Job Hunting/13. The Interview Process - Prepping for the On Site Final Interview.srt | 356B 25. Job Hunting/13.1 Prepping for the on site Interview.pptx | 345B 25. Job Hunting/14. The Interview Process - The Onsite.srt | 356B 25. Job Hunting/14.1 Onsite Interview.pptx | 345B 25. Job Hunting/15. The Interview Process - The Offer.srt | 356B 25. Job Hunting/15.1 The Offer.pptx | 345B 25. Job Hunting/16. Congratulations!.srt | 356B

Recommend

Magnetic link has been copied to the cutting board