TorBT - Torrents and Magnet Links Search Engine
[FreeCoursesOnline.Me] [Pluralsight] Paths - Security for Hackers and Developers [FCO]
- Date: 2026-03-27
- Size: 1.8 GB
- Files: 148
File Name
Size
01_Beginner/01_Security for Hackers and Developers - Overview/00. Course Overview/00. Course Overview.mp4
9.0 MB
01_Beginner/01_Security for Hackers and Developers - Overview/00. Course Overview/00. Course Overview.srt
2.6 kB
01_Beginner/01_Security for Hackers and Developers - Overview/01. Introduction/00. Introduction.mp4
3.7 MB
01_Beginner/01_Security for Hackers and Developers - Overview/01. Introduction/00. Introduction.srt
5.7 kB
01_Beginner/01_Security for Hackers and Developers - Overview/01. Introduction/01. Why Bugs Happen.mp4
5.0 MB
01_Beginner/01_Security for Hackers and Developers - Overview/01. Introduction/01. Why Bugs Happen.srt
9.1 kB
01_Beginner/01_Security for Hackers and Developers - Overview/01. Introduction/02. Ongoing Considerations.mp4
8.0 MB
01_Beginner/01_Security for Hackers and Developers - Overview/01. Introduction/02. Ongoing Considerations.srt
14 kB
01_Beginner/01_Security for Hackers and Developers - Overview/01. Introduction/03. Summary.mp4
287 kB
01_Beginner/01_Security for Hackers and Developers - Overview/01. Introduction/03. Summary.srt
411 B
01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/00. Introduction.mp4
610 kB
01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/00. Introduction.srt
832 B
01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/01. Raising Security IQ.mp4
5.5 MB
01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/01. Raising Security IQ.srt
8.6 kB
01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/02. SDL.mp4
7.5 MB
01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/02. SDL.srt
5.9 kB
01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/03. Push to the Left.mp4
427 kB
01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/03. Push to the Left.srt
497 B
01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/04. Attack Surface Reduction.mp4
3.0 MB
01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/04. Attack Surface Reduction.srt
3.5 kB
01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/05. Threat Modeling.mp4
5.6 MB
01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/05. Threat Modeling.srt
5.8 kB
01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/06. Threat Model Demo.mp4
12 MB
01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/06. Threat Model Demo.srt
4.5 kB
01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/07. Wrap-up.mp4
1.6 MB
01_Beginner/01_Security for Hackers and Developers - Overview/02. Understanding the Security Development Lifecycle - SDL/07. Wrap-up.srt
2.2 kB
01_Beginner/01_Security for Hackers and Developers - Overview/03. Uncovering Security Bugs/00. Why Do Bugs Manifest - .mp4
5.6 MB
01_Beginner/01_Security for Hackers and Developers - Overview/03. Uncovering Security Bugs/00. Why Do Bugs Manifest - .srt
8.7 kB
01_Beginner/01_Security for Hackers and Developers - Overview/03. Uncovering Security Bugs/01. Where Do Bugs Hide - .mp4
6.4 MB
01_Beginner/01_Security for Hackers and Developers - Overview/03. Uncovering Security Bugs/01. Where Do Bugs Hide - .srt
7.3 kB
01_Beginner/01_Security for Hackers and Developers - Overview/03. Uncovering Security Bugs/02. How to Find Bugs - .mp4
2.7 MB
01_Beginner/01_Security for Hackers and Developers - Overview/03. Uncovering Security Bugs/02. How to Find Bugs - .srt
3.3 kB
01_Beginner/01_Security for Hackers and Developers - Overview/04. Using Static Analysis/00. Introduce Automated Code Analysis.mp4
4.1 MB
01_Beginner/01_Security for Hackers and Developers - Overview/04. Using Static Analysis/00. Introduce Automated Code Analysis.srt
7.2 kB
01_Beginner/01_Security for Hackers and Developers - Overview/04. Using Static Analysis/01. Applying the Static Analysis Review Cycle.mp4
5.4 MB
01_Beginner/01_Security for Hackers and Developers - Overview/04. Using Static Analysis/01. Applying the Static Analysis Review Cycle.srt
5.5 kB
01_Beginner/01_Security for Hackers and Developers - Overview/04. Using Static Analysis/02. Understanding Basic Tool.mp4
9.4 MB
01_Beginner/01_Security for Hackers and Developers - Overview/04. Using Static Analysis/02. Understanding Basic Tool.srt
7.3 kB
01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/00. Manual Analysis Process.mp4
3.5 MB
01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/00. Manual Analysis Process.srt
5.1 kB
01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/01. Techniques.mp4
3.3 MB
01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/01. Techniques.srt
7.4 kB
01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/02. Assess Threats.mp4
4.5 MB
01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/02. Assess Threats.srt
6.3 kB
01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/03. Case Study.mp4
13 MB
01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/03. Case Study.srt
7.9 kB
01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/04. Summarize Techniques and Course.mp4
6.0 MB
01_Beginner/01_Security for Hackers and Developers - Overview/05. Pentesting Code - Learning from a Case Study/04. Summarize Techniques and Course.srt
5.0 kB
01_Beginner/01_Security for Hackers and Developers - Overview/Exercise Files/Exercise Files security-hackers-developers.zip
1.7 MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/00. Course Overview/00. Course Overview.mp4
9.9 MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/00. Course Overview/00. Course Overview.srt
2.4 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/01. Introduction/00. Introduction to Malware.mp4
1.9 MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/01. Introduction/00. Introduction to Malware.srt
3.1 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/01. Introduction/01. Demo - Analyzing a Bromium Alert.mp4
27 MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/01. Introduction/01. Demo - Analyzing a Bromium Alert.srt
17 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/01. Introduction/02. Security Tool Follow-up.mp4
7.6 MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/01. Introduction/02. Security Tool Follow-up.srt
12 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/01. Introduction/03. First Malware Analysis Lab.mp4
698 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/01. Introduction/03. First Malware Analysis Lab.srt
1.3 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/02. Recognizing the Exploit Vector/00. Recognizing Exploit Vector Intro.mp4
6.6 MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/02. Recognizing the Exploit Vector/00. Recognizing Exploit Vector Intro.srt
7.0 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/02. Recognizing the Exploit Vector/01. How to Find the Exploit in a Malware Attack.mp4
21 MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/02. Recognizing the Exploit Vector/01. How to Find the Exploit in a Malware Attack.srt
18 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/02. Recognizing the Exploit Vector/02. Exploit Finding Demo.mp4
18 MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/02. Recognizing the Exploit Vector/02. Exploit Finding Demo.srt
4.9 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/02. Recognizing the Exploit Vector/03. Exploit Finding Lab 1.mp4
304 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/02. Recognizing the Exploit Vector/03. Exploit Finding Lab 1.srt
510 B
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/03. Unraveling Exploit Obfuscation/00. Intro and Why to Script.mp4
10 MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/03. Unraveling Exploit Obfuscation/00. Intro and Why to Script.srt
8.5 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/03. Unraveling Exploit Obfuscation/01. Continued Deobfuscation.mp4
19 MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/03. Unraveling Exploit Obfuscation/01. Continued Deobfuscation.srt
12 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/03. Unraveling Exploit Obfuscation/02. Deobfuscation Demo.mp4
14 MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/03. Unraveling Exploit Obfuscation/02. Deobfuscation Demo.srt
4.8 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/03. Unraveling Exploit Obfuscation/03. Deobfuscation Lab 1.mp4
658 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/03. Unraveling Exploit Obfuscation/03. Deobfuscation Lab 1.srt
954 B
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/04. Circumventing Exploit Kit Encryption/00. Module Overview and Homework Review.mp4
3.9 MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/04. Circumventing Exploit Kit Encryption/00. Module Overview and Homework Review.srt
3.5 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/04. Circumventing Exploit Kit Encryption/01. Exploit Kit Details.mp4
5.7 MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/04. Circumventing Exploit Kit Encryption/01. Exploit Kit Details.srt
8.8 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/04. Circumventing Exploit Kit Encryption/02. Deobfuscation 2.mp4
7.7 MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/04. Circumventing Exploit Kit Encryption/02. Deobfuscation 2.srt
7.6 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/04. Circumventing Exploit Kit Encryption/03. Deobfuscation Lab 2.mp4
644 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/04. Circumventing Exploit Kit Encryption/03. Deobfuscation Lab 2.srt
1.1 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/05. Understanding Moving Target Communications/00. Module Goals and Assignment Review.mp4
3.9 MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/05. Understanding Moving Target Communications/00. Module Goals and Assignment Review.srt
2.3 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/05. Understanding Moving Target Communications/01. DGAs and More.mp4
8.4 MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/05. Understanding Moving Target Communications/01. DGAs and More.srt
6.0 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/05. Understanding Moving Target Communications/02. Non-DGA EKs.mp4
3.7 MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/05. Understanding Moving Target Communications/02. Non-DGA EKs.srt
3.4 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/05. Understanding Moving Target Communications/03. Begining EK Detection Lab.mp4
1.8 MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/05. Understanding Moving Target Communications/03. Begining EK Detection Lab.srt
3.5 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/06. Detecting Angler in the Wild/00. How to Find More Samples.mp4
2.2 MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/06. Detecting Angler in the Wild/00. How to Find More Samples.srt
3.2 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/06. Detecting Angler in the Wild/01. Malware Detection.mp4
3.7 MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/06. Detecting Angler in the Wild/01. Malware Detection.srt
3.9 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/06. Detecting Angler in the Wild/02. YARA.mp4
4.5 MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/06. Detecting Angler in the Wild/02. YARA.srt
4.8 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/06. Detecting Angler in the Wild/03. YARA Examples and Lab.mp4
6.4 MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/06. Detecting Angler in the Wild/03. YARA Examples and Lab.srt
5.7 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/07. Performing Safe Dynamic Analysis/00. Malware Analysis Goals.mp4
4.3 MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/07. Performing Safe Dynamic Analysis/00. Malware Analysis Goals.srt
7.9 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/07. Performing Safe Dynamic Analysis/01. Another Sample.mp4
6.3 MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/07. Performing Safe Dynamic Analysis/01. Another Sample.srt
6.2 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/07. Performing Safe Dynamic Analysis/02. Dynamic Analysis Walk-through.mp4
11 MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/07. Performing Safe Dynamic Analysis/02. Dynamic Analysis Walk-through.srt
11 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/07. Performing Safe Dynamic Analysis/03. Sandbox Assignment.mp4
1.3 MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/07. Performing Safe Dynamic Analysis/03. Sandbox Assignment.srt
2.6 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/08. Analyzing Files Statically/00. File Analysis Tools and Techniques.mp4
8.5 MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/08. Analyzing Files Statically/00. File Analysis Tools and Techniques.srt
7.2 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/08. Analyzing Files Statically/01. Demo - How to Use the tools.mp4
19 MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/08. Analyzing Files Statically/01. Demo - How to Use the tools.srt
8.1 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/08. Analyzing Files Statically/02. More Tool Details.mp4
8.2 MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/08. Analyzing Files Statically/02. More Tool Details.srt
7.2 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/08. Analyzing Files Statically/03. Assignment - Run and Report.mp4
1.7 MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/08. Analyzing Files Statically/03. Assignment - Run and Report.srt
2.1 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/09. Reversing Malware with Debugging Tools/00. Static or Dynamic Analysis - .mp4
987 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/09. Reversing Malware with Debugging Tools/00. Static or Dynamic Analysis - .srt
1.8 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/09. Reversing Malware with Debugging Tools/01. Demo - Extract Malware with IDA Debugger.mp4
34 MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/09. Reversing Malware with Debugging Tools/01. Demo - Extract Malware with IDA Debugger.srt
8.3 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/09. Reversing Malware with Debugging Tools/02. More on how to Choose an Approach.mp4
15 MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/09. Reversing Malware with Debugging Tools/02. More on how to Choose an Approach.srt
10 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/09. Reversing Malware with Debugging Tools/03. Debug Details and Assignment.mp4
18 MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/09. Reversing Malware with Debugging Tools/03. Debug Details and Assignment.srt
14 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/10. Reversing Malware with IDA pro/00. Demo and Lesson Plan.mp4
965 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/10. Reversing Malware with IDA pro/00. Demo and Lesson Plan.srt
1.9 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/10. Reversing Malware with IDA pro/01. Reversing Demo.mp4
34 MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/10. Reversing Malware with IDA pro/01. Reversing Demo.srt
13 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/10. Reversing Malware with IDA pro/02. Goals and Cyclic Recap.mp4
10 MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/10. Reversing Malware with IDA pro/02. Goals and Cyclic Recap.srt
7.0 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/10. Reversing Malware with IDA pro/03. Reversing Details and Assignment.mp4
10 MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/10. Reversing Malware with IDA pro/03. Reversing Details and Assignment.srt
9.2 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/11. Customizing Reports - From Researchers to CISOs/00. Intro and Recap.mp4
7.3 MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/11. Customizing Reports - From Researchers to CISOs/00. Intro and Recap.srt
2.5 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/11. Customizing Reports - From Researchers to CISOs/01. How to Report Treat Data.mp4
13 MB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/11. Customizing Reports - From Researchers to CISOs/01. How to Report Treat Data.srt
12 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/11. Customizing Reports - From Researchers to CISOs/02. Summary and Assignment.mp4
988 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/11. Customizing Reports - From Researchers to CISOs/02. Summary and Assignment.srt
1.0 kB
03_Advanced/06_Advanced Malware Analysis - Combating Exploit Kits/Exercise Files/Exercise Files malware-advanced-analysis-combating-exploit-kits.zip
25 MB
02_Intermediate/02_Security for Hackers and Developers - Code Auditing.zip
283 MB
02_Intermediate/03_Security for Hackers and Developers - Fuzzing.zip
312 MB
02_Intermediate/04_Security for Hackers and Developers - Reverse Engineering.zip
309 MB
02_Intermediate/05_Security for Hackers and Developers - Exploit Development.zip
429 MB
0. Websites you may like/1. (FreeTutorials.Us) Download Udemy Paid Courses For Free.url
328 B
0. Websites you may like/2. (FreeCoursesOnline.Me) Download Udacity, Masterclass, Lynda, PHLearn, Pluralsight Free.url
286 B
0. Websites you may like/3. (NulledPremium.com) Download Cracked Website Themes, Plugins, Scripts And Stock Images.url
163 B
0. Websites you may like/4. (FTUApps.com) Download Cracked Developers Applications For Free.url
239 B
0. Websites you may like/5. (Discuss.FTUForum.com) FTU Discussion Forum.url
294 B
0. Websites you may like/How you can help Team-FTU.txt
237 B