TorBT - Torrents and Magnet Links Search Engine
[LiveLessons] The Complete Cybersecurity Bootcamp, 2nd Edition [En]
- Date: 2025-12-12
- Size: 6.0 GB
- Files: 290
File Name
Size
1.1 Describing the CIA Triad.mp4
6.4 MB
1.2 Comparing Security Deployments Network, Endpoint, and Application Security Systems.mp4
12 MB
1.3 Comparing Security Deployments Agentless and Agent-based Protections.mp4
11 MB
1.4 Comparing Security Deployments Legacy Antivirus and Antimalware.mp4
11 MB
1.5 Comparing Security Deployments SIEM, SOAR, and Log Management.mp4
34 MB
1.6 Defining Threat Intelligence.mp4
46 MB
1.7 Defining Threat Hunting.mp4
28 MB
1.8 Understanding Malware Analysis.mp4
28 MB
1.9 Interpreting the Output Report of a Malware Analysis Tool.mp4
9.5 MB
1.10 Understanding the Different Threat Actor Types.mp4
5.7 MB
1.11 Defining Run Book Automation (RBA).mp4
8.5 MB
1.12 Defining Reverse Engineering.mp4
9.6 MB
1.13 Understanding the Sliding Window Anomaly Detection.mp4
4.8 MB
2.1 Performing Risk Assessment.mp4
22 MB
2.2 Comparing Threats, Vulnerabilities, and Exploits.mp4
24 MB
2.3 Understanding Authentication, Authorization, and Accounting.mp4
7.6 MB
2.4 Examining the Access Control Process Terminology and Data Classification.mp4
9.9 MB
2.5 Examining the Access Control Process Data States and Policy Roles.mp4
10 MB
2.6 Examining the Access Control Process Security and Access Control Classification.mp4
20 MB
2.7 Understanding Discretionary Access Control.mp4
9.2 MB
2.8 Understanding Mandatory Access Control.mp4
11 MB
2.9 Understanding Role-based Access Control.mp4
7.9 MB
2.10 Understanding Attribute-based Access Control.mp4
6.3 MB
2.11 Understanding Rule-based Access Control.mp4
20 MB
2.12 Understanding Time-based Access Control.mp4
8.1 MB
3.1 Surveying Types of Vulnerabilities.mp4
34 MB
3.2 Understanding Passive Reconnaissance and Social Engineering.mp4
27 MB
3.3 Understanding Active Reconnaissance Port Scanning and Host Profiling.mp4
30 MB
3.4 Understanding Privilege Escalation and Code Execution Attacks.mp4
4.5 MB
3.5 Understanding Backdoors and Man-in-the-Middle Attacks.mp4
12 MB
3.6 Understanding Denial of Service Attacks.mp4
9.8 MB
3.7 Surveying Attack Methods for Data Exfiltration.mp4
6.9 MB
3.8 Understanding ARP Cache Poisoning and Route Manipulation Attacks.mp4
14 MB
3.9 Understanding Password Attacks.mp4
12 MB
3.10 Understanding Wireless Attacks.mp4
10 MB
3.11 Exploring Security Evasion Techniques.mp4
18 MB
3.12 Identifying the Challenges of Data Visibility in Detection.mp4
22 MB
3.13 Identifying Potential Data Loss from Provided Traffic Profiles.mp4
5.3 MB
3.14 Comparing Rule-based Detection vs. Behavioral and Statistical Detection.mp4
26 MB
4.1 Understanding the Basic Components of Cryptography.mp4
30 MB
4.2 Introducing Public Key Infrastructure.mp4
20 MB
4.3 Deciphering Encryption Algorithms.mp4
18 MB
4.4 Understanding Hashing Algorithms.mp4
35 MB
4.5 Examining Secure Socket Layer and Transport Layer Security.mp4
22 MB
4.6 Examining Digital Certificates.mp4
39 MB
5.1 Describing Concepts as Documented in NIST.SP800-86.mp4
44 MB
5.2 Mapping the Organization Stakeholders Against the NIST IR Categories.mp4
36 MB
5.3 Scoping the Incident Response Plan and Process.mp4
42 MB
5.4 Understanding Information Sharing and Coordination.mp4
9.7 MB
5.5 Identifying the Incident Response Team Structure.mp4
4.4 MB
5.6 Analyzing Computer Incident Response Teams (CSIRTs).mp4
65 MB
5.7 Analyzing Product Security Incident Response Teams (PSIRTs).mp4
35 MB
5.8 Surveying Coordination Centers.mp4
16 MB
5.9 Analyzing Managed Security Service Providers Incident Response Teams.mp4
10 MB
5.10 Introducing the Vocabulary for Event Recording and Incident Sharing (VERIS).mp4
8.4 MB
5.11 Applying the VERIS Schema to Incident Handling.mp4
18 MB
5.12 Surveying the VERIS Incident Recording Tool and Other Resources.mp4
5.2 MB
6.1 Describing Endpoint-based Attacks.mp4
33 MB
6.2 Understanding Data Normalization.mp4
7.5 MB
6.3 Deconstructing Universal Data Formats.mp4
10 MB
6.4 Understanding the 5-tuple Correlation.mp4
5.6 MB
6.5 Performing DNS Analysis.mp4
5.3 MB
6.6 Performing Web Log Analysis.mp4
16 MB
6.7 Performing Deterministic and Probabilistic Analysis.mp4
6.1 MB
6.8 Understanding Security Monitoring Fundamentals.mp4
7.5 MB
6.9 Surveying Security Monitoring Tools.mp4
7.0 MB
6.10 Grasping Security Monitoring Operational Challenges.mp4
35 MB
7.1 Identifying and Mitigating Reconnaissance.mp4
24 MB
7.2 Identifying and Mitigating Weaponization.mp4
11 MB
7.3 Identifying and Mitigating Delivery.mp4
7.2 MB
7.4 Identifying and Mitigating Exploitation.mp4
3.1 MB
7.5 Identifying and Mitigating Installation.mp4
9.0 MB
7.6 Identifying and Mitigating Command and Control.mp4
5.1 MB
7.7 Understanding Action on Objectives.mp4
6.1 MB
7.8 Understanding the MITRE ATT&CK Framework.mp4
63 MB
8.1 Examining Types of Evidence.mp4
21 MB
8.2 Understanding Chain of Custody.mp4
18 MB
8.3 Understanding Evidence Collection.mp4
54 MB
8.4 Handling Evidence.mp4
16 MB
8.5 Examining Asset and Threat Actor Attribution.mp4
14 MB
9.1 Examining Host-based Intrusion Detection.mp4
8.6 MB
9.2 Exploring Antimalware and Antivirus.mp4
15 MB
9.3 Understanding Host-based Firewalls.mp4
13 MB
9.4 Exploring Application-level AllowListsBlockLists.mp4
5.4 MB
9.5 Exploring Systems-based Sandboxing.mp4
15 MB
9.6 Understanding Windows Forensics Basics.mp4
37 MB
9.7 Surveying Windows Forensics Application Processes.mp4
11 MB
9.8 Surveying Windows Forensics Memory.mp4
16 MB
9.9 Surveying Windows Forensics The Windows Registry.mp4
20 MB
9.10 Surveying Windows Forensics Hard Drives, FAT, and NTFS.mp4
23 MB
9.11 Understanding Linux and MAC OS X Forensics Basics.mp4
33 MB
9.12 Examining Web Server Logs.mp4
21 MB
10.1 Introducing Intrusion Analysis Fundamentals.mp4
33 MB
10.2 Examining Packet Captures.mp4
28 MB
10.3 Examining Protocol Headers.mp4
8.4 MB
10.4 Analyzing Security Device Data.mp4
18 MB
10.5 Differentiating False Positives, False Negatives, True Positives, and True Negatives.mp4
7.6 MB
10.6 Comparing Inline Traffic Interrogation and Taps or Traffic Monitoring.mp4
16 MB
10.7 Extracting Files from a TCP Stream when Given a PCAP File and Wireshark.mp4
6.9 MB
10.8 Interpreting Common Artifact Elements from an Event to Identify an Alert.mp4
11 MB
11.1 Understanding Authentication.mp4
29 MB
11.2 Exploring the RADIUS Protocol.mp4
10 MB
11.3 Surveying the TACACS+ Protocol.mp4
6.9 MB
11.4 Understanding Authorization.mp4
7.2 MB
11.5 Surveying Authorization Models.mp4
14 MB
11.6 Defining Accounting.mp4
5.8 MB
11.7 Exploring Multifactor Authentication and Single Sign-On.mp4
24 MB
11.8 Exploring Examples of Multifactor and Single Sign-On.mp4
6.4 MB
12.1 Defining Network Visibility and Segmentation.mp4
5.9 MB
12.2 Introducing NetFlow and IPFIX.mp4
6.3 MB
12.3 Describing Flexible NetFlow Records.mp4
11 MB
12.4 Understanding NetFlow Deployment.mp4
10 MB
12.5 Introducing Network Segmentation.mp4
5.1 MB
12.6 Exploring Application-based Segmentation.mp4
5.6 MB
12.7 Describing Network Access with CoA.mp4
4.7 MB
13.1 Configuring and Verifying Network Segmentation Using VLANs and VRF-lite.mp4
13 MB
13.2 Configuring and Verifying Port Security.mp4
12 MB
13.3 Configuring and Verifying DHCP Snooping.mp4
11 MB
13.4 Configuring and Verifying Dynamic ARP Inspection.mp4
15 MB
13.5 Exploring and Mitigating Common Layer 2 Threats.mp4
15 MB
13.6 Understanding and Configuring BPDU Guard and Root Guard.mp4
6.4 MB
13.7 Understanding and Configuring CDPLLDP.mp4
8.7 MB
13.8 Understanding the Control Plane, Data Plane, and Management Plane.mp4
15 MB
13.9 Exploring How to Secure the Management Plane.mp4
14 MB
13.10 Exploring How to Secure the Control Plane.mp4
15 MB
13.11 Exploring How to Secure the Data Plane.mp4
11 MB
14.1 Introducing SDN.mp4
14 MB
14.2 Explaining North Bound and South Bound APIs in the SDN Architecture.mp4
9.4 MB
14.3 Introducing Cisco ACI.mp4
17 MB
14.4 Introducing Cisco DNA and Cisco DNA Center.mp4
28 MB
14.5 Understanding VXLAN and Network Overlays.mp4
9.8 MB
14.6 Understanding Microsegmentation.mp4
8.9 MB
14.7 Surveying Open Source SDN Solutions.mp4
9.8 MB
14.8 Understanding the Threats Against SDN Solutions.mp4
7.2 MB
14.9 Understanding the Security Benefits in SDN Solutions.mp4
6.7 MB
14.10 Introducing Network Programmability.mp4
31 MB
14.11 Exploring DevNet and DevNet Resources for Security Automation.mp4
3.7 MB
14.12 Introducing APIs, NETCONF, RESTCONF, and YANG.mp4
37 MB
14.13 A Brief Introduction to Git.mp4
25 MB
14.14 Exploring pxGrid.mp4
16 MB
14.15 Integrating and Automating Security Operations with Cisco Products.mp4
11 MB
15.1 Introducing Ethical Hacking and Pen Testing.mp4
21 MB
15.2 Exploring Penetration Testing Methodologies.mp4
21 MB
15.3 Explaining the Importance of the Planning and Preparation Phase.mp4
45 MB
15.4 Understanding the Legal Concepts of Penetration Testing.mp4
14 MB
15.5 Learning How to Scope a Penetration Testing Engagement Properly.mp4
15 MB
15.6 Learning the Key Aspects of Compliance-based Assessments.mp4
11 MB
16.1 Introducing Footprinting Concepts and Methodologies.mp4
26 MB
16.2 Performing Footprinting through Search Engines.mp4
19 MB
16.3 Performing Footprinting through Web Services.mp4
22 MB
16.4 Performing Footprinting through Social Networking Sites.mp4
7.3 MB
16.5 Understanding Website Footprinting.mp4
37 MB
16.6 Understanding Email Footprinting.mp4
12 MB
16.7 Understanding Whois Footprinting.mp4
21 MB
16.8 Understanding DNS Footprinting.mp4
26 MB
16.9 Understanding Network Footprinting.mp4
14 MB
16.10 Performing Footprinting through Social Engineering.mp4
56 MB
16.11 Surveying Footprinting Tools.mp4
7.4 MB
17.1 Surveying Network Scanning Concepts.mp4
13 MB
17.2 Exploiting Scanning Tools.mp4
35 MB
17.3 Understanding Host Discovery.mp4
66 MB
17.4 Understanding Port and Service Discovery.mp4
38 MB
17.5 Performing OS Discovery (Banner GrabbingOS Fingerprinting).mp4
40 MB
17.6 Scanning Beyond IDS and Firewall.mp4
65 MB
17.7 Creating Network Diagrams.mp4
25 MB
17.8 Introducing Enumeration Techniques.mp4
18 MB
17.9 Performing NetBIOS Enumeration.mp4
34 MB
17.10 Performing SNMP Enumeration.mp4
68 MB
17.11 Performing LDAP Enumeration.mp4
22 MB
17.12 Performing NTP and NFS Enumeration.mp4
59 MB
17.13 Performing SMTP and DNS Enumeration.mp4
76 MB
17.14 Conducting Additional Enumeration Techniques.mp4
72 MB
18.1 Introducing Web Server Concepts.mp4
25 MB
18.2 Exploring Web Server Attacks and Methodologies.mp4
15 MB
18.3 Surveying Web Server Attack Tools.mp4
40 MB
18.4 Understanding Patch Management.mp4
22 MB
18.5 Surveying Web Server Security Tools.mp4
8.0 MB
19.1 Introducing Web Application Concepts.mp4
26 MB
19.2 Understanding Web App Threats and Hacking Methodologies.mp4
39 MB
19.3 Footprinting Web Infrastructures.mp4
44 MB
19.4 Analyzing Web Applications.mp4
23 MB
19.5 Introducing the OWASP Top 10.mp4
20 MB
19.6 Attacking Authentication, Authorization, and Access Controls - Part 1.mp4
21 MB
19.7 Attacking Authentication, Authorization, and Access Controls - Part 2.mp4
44 MB
19.8 Performing Command Injection Attacks.mp4
14 MB
19.9 Exploiting DirectoryPath Traversal Vulnerabilities.mp4
10 MB
19.10 Input Validation and Sanitation.mp4
22 MB
19.11 Exploiting Cross-site Scripting (XSS) Vulnerabilities.mp4
45 MB
19.12 Exploiting XML External Entities.mp4
19 MB
19.13 Attacking Web Services, APIs, and Understanding Webhooks.mp4
45 MB
20.1 Introducing SQL Injection Concepts.mp4
20 MB
20.2 Understanding the Types of SQL Injection.mp4
12 MB
20.3 Exploring the SQL Injection Methodologies.mp4
16 MB
20.4 Exploring SQL Injection Tools.mp4
60 MB
20.5 Exploring Evasion Techniques.mp4
8.4 MB
20.6 Understanding SQL Injection Countermeasures.mp4
16 MB
21.1 Introducing Wireless Concepts.mp4
30 MB
21.2 Understanding Wireless Encryption.mp4
60 MB
21.3 Exploring Wireless Threats.mp4
75 MB
21.4 Understanding Wireless Hacking Methodologies.mp4
20 MB
21.5 Surveying Wireless Hacking Tools.mp4
47 MB
21.6 Hacking Bluetooth.mp4
50 MB
21.7 Introducing Wireless Countermeasures.mp4
35 MB
22.1 Understanding Wireless Client Attacks and Their Motives.mp4
30 MB
22.2 Learning Packet Injection Attacks.mp4
4.4 MB
22.3 Eavesdropping and Manipulating Unencrypted Wi-Fi Communications.mp4
11 MB
22.4 Attacking Publicly Secure Packet Forwarding (PSPF).mp4
6.6 MB
22.5 Attacking the Preferred Network List (PNL).mp4
4.6 MB
23.1 Understanding Wireless Antennas.mp4
18 MB
23.2 Surveying Wi-Fi Devices Like the Pinneaple.mp4
47 MB
23.3 Building Your Own Lab.mp4
28 MB
24.1 Introducing the Aircrack-ng Suite.mp4
25 MB
24.2 Introducing Airmon-ng.mp4
5.2 MB
24.3 Understanding Airodump-ng.mp4
12 MB
24.4 Introducing Aireplay-ng.mp4
12 MB
24.5 Introducing Airdecap-ng.mp4
6.2 MB
24.6 Introducing Airserv-ng.mp4
11 MB
24.7 Introducing Airtun-ng.mp4
6.9 MB
25.1 Understanding Buffer Overflows.mp4
22 MB
25.2 Exploiting Buffer Overflows.mp4
18 MB
25.3 Overcoming Defenses for Buffer Overflow Vulnerabilities.mp4
5.5 MB
25.4 Understanding Fuzzing.mp4
7.7 MB
25.5 Creating a Fuzzing Strategy.mp4
20 MB
25.6 Exploring Mutation-based, Generation-based, and Evolutionary Fuzzers.mp4
13 MB
25.7 Surveying Tools to Find and Exploit Buffer Overflows.mp4
24 MB
26.1 Maintaining Persistence After Compromising a System.mp4
30 MB
26.2 Understanding How to Perform Lateral Movement and Pivoting.mp4
13 MB
26.3 Understanding How to Cover Your Tracks and Clean up Systems After a Penetration Testing Engagement.mp4
6.4 MB
27.1 Understanding Authentication and Authorization Mechanisms.mp4
21 MB
27.2 Understanding Authentication and Authorization Attacks.mp4
15 MB
27.3 Exploring Password Storage Mechanisms.mp4
6.9 MB
27.4 Understanding Password Storage Vulnerability.mp4
11 MB
27.5 Cracking Passwords with John the Ripper.mp4
63 MB
27.6 Cracking Passwords with hashcat.mp4
39 MB
27.7 Improving Password Security.mp4
7.9 MB
28.1 Surveying Report Writing and Handling Best Practices.mp4
14 MB
28.2 Recommending Mitigation Strategies for the Discovered Vulnerabilities.mp4
8.6 MB
28.3 Explaining the Importance of Appropriate Communication.mp4
29 MB
29.1 Understanding Mobile Platform Attack Vectors.mp4
70 MB
29.2 Hacking iOS.mp4
83 MB
29.3 Hacking Android OS.mp4
61 MB
29.4 Understanding Mobile Device Management.mp4
36 MB
29.5 Surveying Mobile Security Guidelines and Tools.mp4
11 MB
30.1 Understanding OWASP Mobile Device Vulnerabilities.mp4
18 MB
30.2 Wrestling with the BYOD Dilemma.mp4
24 MB
30.3 Understanding Mobile Device Management (MDM).mp4
26 MB
30.4 Understanding Mobile Device Security Policies.mp4
20 MB
31.1 Hacking Android Devices.mp4
42 MB
31.2 Exploring Android Emulators and SDK.mp4
10 MB
31.3 Understanding Android Hacking Tools and Methodologies.mp4
48 MB
32.2 Exploring Jailbraking iOS.mp4
6.7 MB
32.3 Surveying Tools for Disassembling iOS Applications.mp4
4.8 MB
33.1 Introducing IoT Concepts.mp4
71 MB
33.2 Understanding IoT Attacks.mp4
73 MB
33.3 Understanding IoT Hacking Methodologies.mp4
28 MB
33.4 Surveying IoT Hacking Tools.mp4
38 MB
33.5 Understanding IoT Countermeasures.mp4
35 MB
33.6 Introducing OT Concepts.mp4
43 MB
33.7 Performing OT Attacks.mp4
31 MB
33.8 Understanding OT Hacking Methodologies.mp4
22 MB
33.9 Surveying OT Hacking Tools.mp4
36 MB
33.10 Understanding OT Countermeasures.mp4
46 MB
34.1 Surveying Tools for Dissasembling iOS Applications.mp4
48 MB
34.2 Exploring ZigBee and IEEE 802.15.4.mp4
11 MB
34.3 Exploring INSTEON.mp4
9.5 MB
34.4 Exploring ZWave.mp4
36 MB
34.5 Exploring LoRA.mp4
13 MB
35.1 Attacking Bluetooth.mp4
4.2 MB
35.2 Surveying Tools for Bluetooth Monitoring.mp4
24 MB
36.1 Understanding NFC Vulnerabilities.mp4
6.8 MB
36.2 Exploring NFC Attacks and Case Studies.mp4
13 MB
37.1 Introducing Cloud Computing Concepts.mp4
29 MB
37.2 Exploring Container Technology.mp4
20 MB
37.3 Understanding Serverless Computing.mp4
3.7 MB
37.4 Surveying Cloud Computing Threats.mp4
20 MB
37.5 Understanding Cloud Hacking and Cloud Security Implementations.mp4
20 MB
37.6 Introducing the Different Cloud Deployment and Service Models.mp4
11 MB
37.7 Surveying Patch Management in the Cloud.mp4
8.1 MB
37.8 Performing Security Assessments in Cloud Environments.mp4
11 MB
37.9 Introducing Agile, DevOps, and CICD Pipelines.mp4
22 MB
37.10 Understanding Container Orchestration and an Introduction to Kubernetes.mp4
5.4 MB
37.11 Exploring the Concepts of DevSecOps.mp4
12 MB
38.1 Introducing Social Engineering Concepts.mp4
14 MB
38.2 Exploring Social Engineering Techniques.mp4
23 MB
38.3 Understanding the Insider Threat.mp4
9.6 MB
38.4 Impersonation on Social Networking Sites.mp4
21 MB
38.5 Understanding Identity Theft.mp4
14 MB
38.6 Understanding Social Engineering Countermeasures.mp4
8.9 MB
The Complete Cybersecurity Bootcamp Introduction.mp4
17 MB
The Complete Cybersecurity Bootcamp Summary.mp4
6.9 MB