TorBT - Torrents and Magnet Links Search Engine

The RedTeam Blueprint - A Unique Guide To Ethical Hacking

File Name
Size
19. Exploitation/11. SQL Injection _ SQLMap.mp4
134 MB
1. Welcome! Who Is This Guy!/1. Introduction.srt
2.3 kB
2. The 3 Teams/1. Module Overview - The 3 Teams.mp4
3.5 MB
2. The 3 Teams/1. Module Overview - The 3 Teams.srt
1.8 kB
2. The 3 Teams/1.1 The 3 Teams.pptx
92 kB
2. The 3 Teams/2. The Red Team.mp4
29 MB
2. The 3 Teams/2. The Red Team.srt
12 kB
2. The 3 Teams/2.1 The Red Team.pptx
97 kB
2. The 3 Teams/3. The Blue Team.mp4
18 MB
2. The 3 Teams/3. The Blue Team.srt
7.1 kB
2. The 3 Teams/3.1 The Blue Team.pptx
97 kB
2. The 3 Teams/4. The Purple Team.mp4
22 MB
2. The 3 Teams/4. The Purple Team.srt
9.5 kB
2. The 3 Teams/4.1 The Purple Team.pptx
97 kB
3. Penetration Testing Process/1. Module Overview - Penetration Testing Process.mp4
8.4 MB
3. Penetration Testing Process/1. Module Overview - Penetration Testing Process.srt
4.7 kB
3. Penetration Testing Process/1.1 Penetration Testing Process - Module Overview.pptx
101 kB
3. Penetration Testing Process/2. Penetration Testing Methodology.mp4
20 MB
3. Penetration Testing Process/2. Penetration Testing Methodology.srt
12 kB
3. Penetration Testing Process/2.1 Penetration Testing Methodology.pptx
106 kB
3. Penetration Testing Process/3. Metrics _ Why They Are Important.mp4
37 MB
3. Penetration Testing Process/3. Metrics _ Why They Are Important.srt
15 kB
3. Penetration Testing Process/3.1 Metrics.xlsx
37 kB
3. Penetration Testing Process/4. Routine Assessments Part 1 - What Are Routine Assessments.mp4
11 MB
3. Penetration Testing Process/4. Routine Assessments Part 1 - What Are Routine Assessments.srt
5.9 kB
3. Penetration Testing Process/4.1 What Are Routine Assessments.pptx
95 kB
3. Penetration Testing Process/5. Routine Assessments Part 2 - Yearly Assessments.mp4
16 MB
3. Penetration Testing Process/5. Routine Assessments Part 2 - Yearly Assessments.srt
7.4 kB
3. Penetration Testing Process/5.1 Yearly Assessments.pptx
96 kB
3. Penetration Testing Process/6. Routine Assessments Part 3 - Quarterly Assessments.mp4
26 MB
3. Penetration Testing Process/6. Routine Assessments Part 3 - Quarterly Assessments.srt
13 kB
3. Penetration Testing Process/6.1 Quarterly Assessments.pptx
109 kB
3. Penetration Testing Process/7. Routine Assessments Part 4- Monthly Assessments.mp4
11 MB
3. Penetration Testing Process/7. Routine Assessments Part 4- Monthly Assessments.srt
6.3 kB
3. Penetration Testing Process/7.1 Monthly Assessments.pptx
96 kB
3. Penetration Testing Process/8. Routine Assessments Part 5 - Constant Assessments.mp4
18 MB
3. Penetration Testing Process/8. Routine Assessments Part 5 - Constant Assessments.srt
12 kB
3. Penetration Testing Process/8.1 Constant Assessments.pptx
98 kB
3. Penetration Testing Process/9. Routine Assessments Part 6 - Building an Assessment Plan.mp4
31 MB
3. Penetration Testing Process/9. Routine Assessments Part 6 - Building an Assessment Plan.srt
9.9 kB
3. Penetration Testing Process/9.1 Assessment Template.xlsx
24 kB
3. Penetration Testing Process/10. Building _ Working with an Enterprise Budget.mp4
36 MB
3. Penetration Testing Process/10. Building _ Working with an Enterprise Budget.srt
17 kB
3. Penetration Testing Process/10.1 Budget Sample.xlsx
28 kB
3. Penetration Testing Process/10.2 Budget Template.xlsx
24 kB
3. Penetration Testing Process/11. Specialties!.mp4
12 MB
3. Penetration Testing Process/11. Specialties!.srt
6.1 kB
3. Penetration Testing Process/11.1 Specialties.pptx
98 kB
3. Penetration Testing Process/12. The CIA Triangle.mp4
9.6 MB
3. Penetration Testing Process/12. The CIA Triangle.srt
4.1 kB
3. Penetration Testing Process/12.1 CIA Triangle.pptx
99 kB
4. The Windows Operating System/1. Installing _ Using VirtualBox for Lab Virtualization.mp4
50 MB
4. The Windows Operating System/1. Installing _ Using VirtualBox for Lab Virtualization.srt
13 kB
4. The Windows Operating System/1.1 VirtualBox Download.html
102 B
4. The Windows Operating System/1.2 Windows Server 2016 ISO.html
132 B
4. The Windows Operating System/2. Windows at a Glance.mp4
104 MB
4. The Windows Operating System/2. Windows at a Glance.srt
29 kB
4. The Windows Operating System/2.1 Windows Registry.html
143 B
4. The Windows Operating System/3. The Windows File System.mp4
42 MB
4. The Windows Operating System/3. The Windows File System.srt
16 kB
4. The Windows Operating System/3.1 The Windows File System.pptx
102 kB
4. The Windows Operating System/3.2 NTFS Basics.html
92 B
4. The Windows Operating System/3.2 NTFS Cluster.html
119 B
4. The Windows Operating System/3.3 NTFS Cluster.html
119 B
4. The Windows Operating System/3.3 NTFS In More Detail.html
127 B
4. The Windows Operating System/3.4 Journaling File System.html
113 B
4. The Windows Operating System/3.4 NTFS In More Detail.html
127 B
4. The Windows Operating System/3.5 Journaling File System.html
113 B
4. The Windows Operating System/3.5 NTFS Basics.html
92 B
4. The Windows Operating System/4. Windows Logs.mp4
42 MB
4. The Windows Operating System/4. Windows Logs.srt
14 kB
4. The Windows Operating System/5. Windows Internals - UAC.mp4
31 MB
4. The Windows Operating System/5. Windows Internals - UAC.srt
11 kB
4. The Windows Operating System/5.1 UAC Microsoft Documents.html
182 B
4. The Windows Operating System/5.1 Windows UAC.pptx
164 kB
4. The Windows Operating System/5.2 UAC Microsoft Documents.html
182 B
4. The Windows Operating System/5.2 Windows UAC.pptx
164 kB
4. The Windows Operating System/6. Windows Internals - Permissions.mp4
62 MB
4. The Windows Operating System/6. Windows Internals - Permissions.srt
21 kB
4. The Windows Operating System/7. Windows Internals - Alternate Data Streams.mp4
32 MB
4. The Windows Operating System/7. Windows Internals - Alternate Data Streams.srt
9.7 kB
4. The Windows Operating System/7.1 File Streams.html
129 B
4. The Windows Operating System/8. Windows Internals - API Calls.mp4
53 MB
4. The Windows Operating System/8. Windows Internals - API Calls.srt
15 kB
4. The Windows Operating System/8.1 Dependency Walker.html
110 B
4. The Windows Operating System/8.2 API Calls.pptx
95 kB
4. The Windows Operating System/9. Windows Internals - The SID.mp4
18 MB
4. The Windows Operating System/9. Windows Internals - The SID.srt
8.4 kB
4. The Windows Operating System/9.1 SID.pptx
136 kB
4. The Windows Operating System/10. Windows Internals - Tokens.mp4
27 MB
4. The Windows Operating System/10. Windows Internals - Tokens.srt
10 kB
4. The Windows Operating System/10.1 Tokens.pptx
102 kB
4. The Windows Operating System/11. Windows Internals - Named Pipes.mp4
20 MB
4. The Windows Operating System/11. Windows Internals - Named Pipes.srt
7.4 kB
4. The Windows Operating System/11.1 Microsoft PipeList.html
113 B
4. The Windows Operating System/11.2 Windows Pipes.pptx
100 kB
4. The Windows Operating System/12. Windows Internals - PE Files _ DLLs.mp4
50 MB
4. The Windows Operating System/12. Windows Internals - PE Files _ DLLs.srt
21 kB
4. The Windows Operating System/12.1 PE Explorer.html
119 B
4. The Windows Operating System/12.1 PE Files and DLLs.pptx
118 kB
4. The Windows Operating System/12.2 PE Explorer.html
119 B
4. The Windows Operating System/12.2 PE Files and DLLs.pptx
118 kB
4. The Windows Operating System/13. Windows Command Line - Accessing the Command Line.mp4
23 MB
4. The Windows Operating System/13. Windows Command Line - Accessing the Command Line.srt
6.5 kB
4. The Windows Operating System/14. Windows Command Line - Navigation.mp4
32 MB
4. The Windows Operating System/14. Windows Command Line - Navigation.srt
9.3 kB
4. The Windows Operating System/15. Windows Command Line - Working with Files and Directories.mp4
35 MB
4. The Windows Operating System/15. Windows Command Line - Working with Files and Directories.srt
9.5 kB
4. The Windows Operating System/16. Windows Command Line - Working with Pipes.mp4
41 MB
4. The Windows Operating System/16. Windows Command Line - Working with Pipes.srt
11 kB
4. The Windows Operating System/17. Windows Command Line - Standard IOE.mp4
17 MB
4. The Windows Operating System/17. Windows Command Line - Standard IOE.srt
5.6 kB
4. The Windows Operating System/18. Windows Command Line - Managing Windows.mp4
41 MB
4. The Windows Operating System/18. Windows Command Line - Managing Windows.srt
17 kB
5. The Linux Operating System/1. Where is the GUI!.mp4
10 MB
5. The Linux Operating System/1. Where is the GUI!.srt
5.6 kB
5. The Linux Operating System/1.1 The GUI.pptx
96 kB
5. The Linux Operating System/1.2 Ubuntu ISO Updated.html
96 B
5. The Linux Operating System/2. The Linux File System.mp4
15 MB
5. The Linux Operating System/2. The Linux File System.srt
7.6 kB
5. The Linux Operating System/2.1 EXT4 Info.html
116 B
5. The Linux Operating System/2.2 The Linux File System.pptx
108 kB
5. The Linux Operating System/3. Linux Command Line - Navigation.mp4
17 MB
5. The Linux Operating System/3. Linux Command Line - Navigation.srt
5.7 kB
5. The Linux Operating System/4. Linux Command Line - Working with Files and Directories.mp4
39 MB
5. The Linux Operating System/4. Linux Command Line - Working with Files and Directories.srt
12 kB
5. The Linux Operating System/5. Linux Command Line - Standard IOE Recap.mp4
16 MB
5. The Linux Operating System/5. Linux Command Line - Standard IOE Recap.srt
5.4 kB
5. The Linux Operating System/6. Linux Command Line - Working with Data.mp4
56 MB
5. The Linux Operating System/6. Linux Command Line - Working with Data.srt
18 kB
5. The Linux Operating System/7. Linux Command Line - Working with File Permissions.mp4
27 MB
5. The Linux Operating System/7. Linux Command Line - Working with File Permissions.srt
13 kB
5. The Linux Operating System/7.1 Linux File Permissions.pptx
134 kB
5. The Linux Operating System/8. Linux Command Line - Man Pages.mp4
16 MB
5. The Linux Operating System/8. Linux Command Line - Man Pages.srt
4.9 kB
5. The Linux Operating System/9. Linux Command Line - Base64.mp4
16 MB
5. The Linux Operating System/9. Linux Command Line - Base64.srt
3.2 kB
5. The Linux Operating System/10. Linux Command Line - Hex.mp4
30 MB
5. The Linux Operating System/10. Linux Command Line - Hex.srt
7.5 kB
5. The Linux Operating System/11. Linux Command Line - Network Connections Recap.mp4
22 MB
5. The Linux Operating System/11. Linux Command Line - Network Connections Recap.srt
5.4 kB
5. The Linux Operating System/12. Linux Processes.mp4
54 MB
5. The Linux Operating System/12. Linux Processes.srt
17 kB
5. The Linux Operating System/12.1 Process Info.html
111 B
5. The Linux Operating System/12.2 Processes.pptx
117 kB
5. The Linux Operating System/13. What are INodes.mp4
19 MB
5. The Linux Operating System/13. What are INodes.srt
5.6 kB
5. The Linux Operating System/13.1 Inodes.pptx
100 kB
5. The Linux Operating System/14. Working with Open Files.mp4
33 MB
5. The Linux Operating System/14. Working with Open Files.srt
8.8 kB
5. The Linux Operating System/14.1 Open FIles.pptx
108 kB
5. The Linux Operating System/15. Symbolic Links.mp4
23 MB
5. The Linux Operating System/15. Symbolic Links.srt
8.1 kB
5. The Linux Operating System/15.1 Symbolic Links.pptx
103 kB
5. The Linux Operating System/16. The ID_s.mp4
14 MB
5. The Linux Operating System/16. The ID_s.srt
3.8 kB
5. The Linux Operating System/17. Linux Pipes.mp4
14 MB
5. The Linux Operating System/17. Linux Pipes.srt
3.8 kB
5. The Linux Operating System/18. Linux Run Levels.mp4
12 MB
5. The Linux Operating System/18. Linux Run Levels.srt
5.0 kB
5. The Linux Operating System/18.1 Run Levels.pptx
100 kB
5. The Linux Operating System/19. Linux Logs.mp4
20 MB
5. The Linux Operating System/19. Linux Logs.srt
4.6 kB
6. Operating System Internals/1. The Kernel.mp4
32 MB
6. Operating System Internals/1. The Kernel.srt
15 kB
6. Operating System Internals/1.1 The Kernel.pptx
120 kB
6. Operating System Internals/2. One Ring to Rule Them All.mp4
18 MB
6. Operating System Internals/2. One Ring to Rule Them All.srt
7.6 kB
6. Operating System Internals/2.1 One Ring to Rule Them All.pptx
102 kB
6. Operating System Internals/3. What is a CPU.mp4
9.2 MB
6. Operating System Internals/3. What is a CPU.srt
3.7 kB
6. Operating System Internals/3.1 What is a CPU.pptx
98 kB
6. Operating System Internals/4. The CPU Registers.mp4
31 MB
6. Operating System Internals/4. The CPU Registers.srt
11 kB
6. Operating System Internals/4.1 Registers.pptx
120 kB
6. Operating System Internals/5. The CPU Flags.mp4
7.6 MB
6. Operating System Internals/5. The CPU Flags.srt
3.2 kB
6. Operating System Internals/5.1 Flags.pptx
96 kB
6. Operating System Internals/5.2 CPU Flags.html
105 B
6. Operating System Internals/6. What is Memory _ How does it work.mp4
11 MB
6. Operating System Internals/6. What is Memory _ How does it work.srt
4.8 kB
6. Operating System Internals/6.1 Memory.pptx
96 kB
6. Operating System Internals/7. The Stack.mp4
20 MB
6. Operating System Internals/7. The Stack.srt
8.1 kB
6. Operating System Internals/7.1 The Stack.pptx
99 kB
6. Operating System Internals/8. The Heap.mp4
11 MB
6. Operating System Internals/8. The Heap.srt
4.6 kB
6. Operating System Internals/8.1 The Heap.pptx
95 kB
6. Operating System Internals/9. Extra information on Memory.mp4
14 MB
6. Operating System Internals/9. Extra information on Memory.srt
5.6 kB
6. Operating System Internals/9.1 More on Memory.pptx
102 kB
6. Operating System Internals/10. Debuggers.mp4
20 MB
6. Operating System Internals/10. Debuggers.srt
7.1 kB
6. Operating System Internals/10.1 Immunity Debugger.html
107 B
6. Operating System Internals/10.2 Debugger.pptx
445 kB
6. Operating System Internals/11. Taking a look at ASLR.mp4
8.7 MB
6. Operating System Internals/11. Taking a look at ASLR.srt
4.4 kB
6. Operating System Internals/11.1 ASLR.pptx
101 kB
6. Operating System Internals/12. A Quick Word About AntiVirus.mp4
15 MB
6. Operating System Internals/12. A Quick Word About AntiVirus.srt
7.2 kB
6. Operating System Internals/12.1 AntiVirus.pptx
102 kB
7. Active Directory/1. What is Active Directory.mp4
19 MB
7. Active Directory/1. What is Active Directory.srt
7.6 kB
7. Active Directory/1.1 What is Active Directory.pptx
95 kB
7. Active Directory/2. Basic Windows Server Configuration.mp4
33 MB
7. Active Directory/2. Basic Windows Server Configuration.srt
9.4 kB
7. Active Directory/3. Install AD DS.mp4
38 MB
7. Active Directory/3. Install AD DS.srt
13 kB
7. Active Directory/4. The AD Tree.mp4
39 MB
7. Active Directory/4. The AD Tree.srt
13 kB
7. Active Directory/5. OU_s and their Permissions.mp4
31 MB
7. Active Directory/5. OU_s and their Permissions.srt
8.2 kB
7. Active Directory/6. Managing Users and Groups.mp4
20 MB
7. Active Directory/6. Managing Users and Groups.srt
6.4 kB
7. Active Directory/7. Adding Machine to the Domain.mp4
36 MB
7. Active Directory/7. Adding Machine to the Domain.srt
8.8 kB
7. Active Directory/7.1 Windows 10 ISO.html
123 B
7. Active Directory/8. Setting up Group Policies.mp4
54 MB
7. Active Directory/8. Setting up Group Policies.srt
17 kB
7. Active Directory/9. Cached Credentials.mp4
14 MB
7. Active Directory/9. Cached Credentials.srt
3.7 kB
8. Kerberos/1. What is Kerberos.mp4
10 MB
8. Kerberos/1. What is Kerberos.srt
4.9 kB
8. Kerberos/1.1 What is Kerberos.pptx
96 kB
8. Kerberos/2. Kerberos Realms.mp4
4.5 MB
8. Kerberos/2. Kerberos Realms.srt
2.2 kB
8. Kerberos/2.1 Kerberos Realm.pptx
94 kB
8. Kerberos/3. The Authentication Server.mp4
9.7 MB
8. Kerberos/3. The Authentication Server.srt
4.7 kB
8. Kerberos/3.1 The Authentication Sever.pptx
97 kB
8. Kerberos/4. The Ticket Granting Server.mp4
21 MB
8. Kerberos/4. The Ticket Granting Server.srt
9.3 kB
8. Kerberos/4.1 The Ticket Granting Server.pptx
102 kB
9. Data Manipulation/1. What is Encryption.mp4
10 MB
9. Data Manipulation/1. What is Encryption.srt
4.6 kB
9. Data Manipulation/1.1 What is Encryption.pptx
94 kB
9. Data Manipulation/2. Symmetric Encryption.mp4
11 MB
9. Data Manipulation/2. Symmetric Encryption.srt
4.8 kB
9. Data Manipulation/2.1 Symmetric Encryption.pptx
97 kB
9. Data Manipulation/3. Asymmetric Encryption.mp4
14 MB
9. Data Manipulation/3. Asymmetric Encryption.srt
7.3 kB
9. Data Manipulation/3.1 Asymmetric Encryption.pptx
101 kB
9. Data Manipulation/4. RSA Encryption.mp4
6.2 MB
9. Data Manipulation/4. RSA Encryption.srt
2.8 kB
9. Data Manipulation/4.1 RSA.html
114 B
9. Data Manipulation/4.2 RSA.pptx
93 kB
9. Data Manipulation/5. AES Encryption.mp4
5.5 MB
9. Data Manipulation/5. AES Encryption.srt
2.4 kB
9. Data Manipulation/5.1 AES.html
138 B
9. Data Manipulation/5.2 AES.pptx
93 kB
9. Data Manipulation/6. What is Hashing.mp4
10 MB
9. Data Manipulation/6. What is Hashing.srt
4.4 kB
9. Data Manipulation/6.1 What is Hashing.pptx
94 kB
9. Data Manipulation/7. MD5 Hashing.mp4
8.2 MB
9. Data Manipulation/7. MD5 Hashing.srt
3.4 kB
9. Data Manipulation/7.1 MD5.html
114 B
9. Data Manipulation/7.2 MD5.pptx
92 kB
9. Data Manipulation/8. SHA Hashing.mp4
14 MB
9. Data Manipulation/8. SHA Hashing.srt
6.2 kB
9. Data Manipulation/8.1 SHA.html
114 B
9. Data Manipulation/8.2 SHA.pptx
93 kB
9. Data Manipulation/9. What is Encoding.mp4
5.5 MB
9. Data Manipulation/9. What is Encoding.srt
2.8 kB
9. Data Manipulation/9.1 What is Encoding.pptx
94 kB
9. Data Manipulation/10. Base64 Encoding.mp4
13 MB
9. Data Manipulation/10. Base64 Encoding.srt
5.8 kB
9. Data Manipulation/10.1 Base64.html
112 B
9. Data Manipulation/10.2 Base64.pptx
110 kB
9. Data Manipulation/11. Hex Encoding.mp4
13 MB
9. Data Manipulation/11. Hex Encoding.srt
5.8 kB
9. Data Manipulation/11.1 Hex.pptx
96 kB
9. Data Manipulation/11.2 Hex.html
113 B
9. Data Manipulation/12. URL Encoding.mp4
9.6 MB
9. Data Manipulation/12. URL Encoding.srt
4.0 kB
9. Data Manipulation/12.1 URL.pptx
94 kB
9. Data Manipulation/12.2 URL.html
110 B
9. Data Manipulation/13. What is Compression.mp4
8.0 MB
9. Data Manipulation/13. What is Compression.srt
4.5 kB
9. Data Manipulation/13.1 What is Compression.pptx
96 kB
9. Data Manipulation/14. Lossless vs Lossy Compression.mp4
11 MB
9. Data Manipulation/14. Lossless vs Lossy Compression.srt
4.3 kB
9. Data Manipulation/14.1 Lossless vs Lossy.pptx
94 kB
9. Data Manipulation/15. LZ77 _ LZ78 Compression Algorithms.mp4
6.4 MB
9. Data Manipulation/15. LZ77 _ LZ78 Compression Algorithms.srt
2.9 kB
9. Data Manipulation/15.1 LZ77 _ LZ78.html
104 B
9. Data Manipulation/15.2 LZ77 and LZ78.pptx
93 kB
9. Data Manipulation/16. Data Manipulation - Hands On.mp4
5.3 MB
9. Data Manipulation/16. Data Manipulation - Hands On.srt
2.4 kB
9. Data Manipulation/16.1 Data Manipulation Hands On.pptx
92 kB
10. Networking/1. What is Networking.mp4
19 MB
10. Networking/1. What is Networking.srt
12 kB
10. Networking/1.1 What is Networking.pptx
108 kB
10. Networking/2. The OSI Model.mp4
19 MB
10. Networking/2. The OSI Model.srt
7.4 kB
10. Networking/2.1 OSI Model.pptx
103 kB
10. Networking/3. TCPIP.mp4
29 MB
10. Networking/3. TCPIP.srt
14 kB
10. Networking/3.1 TCPIP.pptx
100 kB
10. Networking/4. UDP.mp4
10 MB
10. Networking/4. UDP.srt
3.6 kB
10. Networking/4.1 UDP.pptx
91 kB
10. Networking/5. The Switch.mp4
13 MB
10. Networking/5. The Switch.srt
5.5 kB
10. Networking/5.1 The Switch.pptx
405 kB
10. Networking/6. Routers _ Gateways.mp4
20 MB
10. Networking/6. Routers _ Gateways.srt
8.4 kB
10. Networking/6.1 Routers and Gateways.pptx
96 kB
10. Networking/7. What is a Protocol.mp4
5.0 MB
10. Networking/7. What is a Protocol.srt
1.9 kB
10. Networking/7.1 What is a Protocol.pptx
92 kB
10. Networking/8. ICMP.mp4
19 MB
10. Networking/8. ICMP.srt
8.4 kB
10. Networking/8.1 ICMP.pptx
96 kB
10. Networking/9. DNS.mp4
27 MB
10. Networking/9. DNS.srt
11 kB
10. Networking/9.1 DNS.pptx
99 kB
10. Networking/10. DHCP.mp4
18 MB
10. Networking/10. DHCP.srt
8.5 kB
10. Networking/10.1 DHCP.pptx
100 kB
10. Networking/11. ARP.mp4
17 MB
10. Networking/11. ARP.srt
6.1 kB
10. Networking/11.1 ARP.pptx
96 kB
10. Networking/12. What is an IDS.mp4
10 MB
10. Networking/12. What is an IDS.srt
4.7 kB
10. Networking/12.1 What is an IDS.pptx
96 kB
10. Networking/13. What is an IPS.mp4
16 MB
10. Networking/13. What is an IPS.srt
6.5 kB
10. Networking/13.1 What is an IPS.pptx
96 kB
10. Networking/14. What is HA.mp4
15 MB
10. Networking/14. What is HA.srt
6.6 kB
10. Networking/14.1 What is HA.pptx
94 kB
10. Networking/15. Proxys.mp4
8.5 MB
10. Networking/15. Proxys.srt
4.9 kB
10. Networking/15.1 Proxys.pptx
93 kB
10. Networking/16. The DMZ.mp4
7.8 MB
10. Networking/16. The DMZ.srt
3.4 kB
10. Networking/16.1 DMZ.pptx
91 kB
10. Networking/17. Quick Talk on Databases.mp4
14 MB
10. Networking/17. Quick Talk on Databases.srt
5.8 kB
10. Networking/17.1 Quick Talk on Databases.pptx
96 kB
10. Networking/17.2 SQL Tutorial.html
96 B
11. VPNs/1. What is a VPN.mp4
9.8 MB
11. VPNs/1. What is a VPN.srt
3.6 kB
11. VPNs/1.1 What is a VPN.pptx
92 kB
11. VPNs/2. What is IPSEC.mp4
24 MB
11. VPNs/2. What is IPSEC.srt
12 kB
11. VPNs/2.1 What is a IPSEC.pptx
102 kB
11. VPNs/3. What is IKE.mp4
19 MB
11. VPNs/3. What is IKE.srt
9.3 kB
11. VPNs/3.1 What is a IKE.pptx
101 kB
12. Firewalls/1. What is a Firewall.mp4
15 MB
12. Firewalls/1. What is a Firewall.srt
5.9 kB
12. Firewalls/1.1 What is a Firewall.pptx
96 kB
12. Firewalls/2. Packet Filtering Firewalls.mp4
3.3 MB
12. Firewalls/2. Packet Filtering Firewalls.srt
2.0 kB
12. Firewalls/2.1 Packet Filtering Firewalls.pptx
94 kB
12. Firewalls/3. Stateful Inspecting Firewalls.mp4
7.5 MB
12. Firewalls/3. Stateful Inspecting Firewalls.srt
3.8 kB
12. Firewalls/3.1 Stateful Inspection Firewalls.pptx
95 kB
12. Firewalls/4. Web Application Firewalls.mp4
6.0 MB
12. Firewalls/4. Web Application Firewalls.srt
3.1 kB
12. Firewalls/4.1 Web Application Firewalls.pptx
93 kB
13. Configuring PFSense Firewalls/1. Installing PFSense.mp4
34 MB
13. Configuring PFSense Firewalls/1. Installing PFSense.srt
10 kB
13. Configuring PFSense Firewalls/1.1 PFSense Installer.html
94 B
13. Configuring PFSense Firewalls/2. The Firewall UI.mp4
40 MB
13. Configuring PFSense Firewalls/2. The Firewall UI.srt
13 kB
13. Configuring PFSense Firewalls/3. Configuring a DMZ.mp4
26 MB
13. Configuring PFSense Firewalls/3. Configuring a DMZ.srt
11 kB
13. Configuring PFSense Firewalls/4. Configuring a VPN.mp4
25 MB
13. Configuring PFSense Firewalls/4. Configuring a VPN.srt
9.7 kB
13. Configuring PFSense Firewalls/5. Backup _ Logging.mp4
19 MB
13. Configuring PFSense Firewalls/5. Backup _ Logging.srt
6.7 kB
13. Configuring PFSense Firewalls/6. PFsense Hands On.mp4
5.4 MB
13. Configuring PFSense Firewalls/6. PFsense Hands On.srt
3.2 kB
13. Configuring PFSense Firewalls/6.1 PFSense Hands On.pptx
92 kB
14. Program Theory/1. What is a Compiler.mp4
11 MB
14. Program Theory/1. What is a Compiler.srt
5.2 kB
14. Program Theory/1.1 What is a Compiler.pptx
96 kB
14. Program Theory/2. What is a Linker.mp4
15 MB
14. Program Theory/2. What is a Linker.srt
6.3 kB
14. Program Theory/2.1 What is a Linker.pptx
94 kB
15. Python Course/1. Why Python.mp4
10 MB
15. Python Course/1. Why Python.srt
5.7 kB
15. Python Course/1.1 Why Python.pptx
91 kB
15. Python Course/2. Installing Python.mp4
15 MB
15. Python Course/2. Installing Python.srt
5.6 kB
15. Python Course/2.1 Sublime IDE.html
90 B
15. Python Course/2.2 Python Installer.html
94 B
15. Python Course/3. Hello World.mp4
17 MB
15. Python Course/3. Hello World.srt
8.9 kB
15. Python Course/3.1 HelloWorld.py
583 B
15. Python Course/4. Variables.mp4
18 MB
15. Python Course/4. Variables.srt
8.7 kB
15. Python Course/4.1 Variables.py
1.2 kB
15. Python Course/5. Type Casting.mp4
12 MB
15. Python Course/5. Type Casting.srt
6.3 kB
15. Python Course/5.1 TypeCasting.py
1015 B
15. Python Course/6. Operators.mp4
11 MB
15. Python Course/6. Operators.srt
6.0 kB
15. Python Course/6.1 Operators.py
2.3 kB
15. Python Course/7. IfElse.mp4
34 MB
15. Python Course/7. IfElse.srt
16 kB
15. Python Course/7.1 IfElse.py
2.3 kB
15. Python Course/8. Loops.mp4
20 MB
15. Python Course/8. Loops.srt
11 kB
15. Python Course/8.1 Loops.py
1.3 kB
15. Python Course/9. The Dictionary.mp4
24 MB
15. Python Course/9. The Dictionary.srt
12 kB
15. Python Course/9.1 Dictionary.py
2.0 kB
15. Python Course/10. Lists.mp4
26 MB
15. Python Course/10. Lists.srt
13 kB
15. Python Course/10.1 Lists.py
1.5 kB
15. Python Course/11. Tuples.mp4
10 MB
15. Python Course/11. Tuples.srt
5.3 kB
15. Python Course/11.1 Tuples.py
1.1 kB
15. Python Course/12. Modules.mp4
17 MB
15. Python Course/12. Modules.srt
8.3 kB
15. Python Course/12.1 Modules.py
810 B
15. Python Course/13. Classes.mp4
27 MB
15. Python Course/13. Classes.srt
15 kB
15. Python Course/13.1 Classes.py
1.4 kB
15. Python Course/13.2 Person.py
878 B
15. Python Course/14. Inheritance.mp4
48 MB
15. Python Course/14. Inheritance.srt
18 kB
15. Python Course/14.1 Inheritance.py
1.6 kB
15. Python Course/14.2 CheckingAccount.py
822 B
15. Python Course/14.3 Account.py
961 B
15. Python Course/15. Configuration Files.mp4
13 MB
15. Python Course/15. Configuration Files.srt
6.0 kB
15. Python Course/15.1 Configs.py
1.2 kB
15. Python Course/15.2 Configs.zip
1.6 kB
15. Python Course/16. Logging.mp4
15 MB
15. Python Course/16. Logging.srt
9.2 kB
15. Python Course/16.1 Logging.py
1.4 kB
15. Python Course/17. Error Handling.mp4
21 MB
15. Python Course/17. Error Handling.srt
9.6 kB
15. Python Course/17.1 ErrorHandling.py
1.3 kB
15. Python Course/18. Sockets.mp4
29 MB
15. Python Course/18. Sockets.srt
15 kB
15. Python Course/18.1 SocketsClient.py
929 B
15. Python Course/18.2 SocketsServer.py
1.2 kB
15. Python Course/19. Threading.mp4
18 MB
15. Python Course/19. Threading.srt
9.5 kB
15. Python Course/19.1 Threading.py
845 B
15. Python Course/20. Python Hands On.mp4
7.0 MB
15. Python Course/20. Python Hands On.srt
3.6 kB
15. Python Course/20.1 Hands On Python.pptx
94 kB
16. Assembly Course/1. Why Assembly.mp4
5.1 MB
16. Assembly Course/1. Why Assembly.srt
2.8 kB
16. Assembly Course/1.1 Why ASM.pptx
93 kB
16. Assembly Course/2. Hello World.mp4
60 MB
16. Assembly Course/2. Hello World.srt
21 kB
16. Assembly Course/2.1 HelloWorld.asm.zip
1.2 kB
16. Assembly Course/3. Variables.mp4
22 MB
16. Assembly Course/3. Variables.srt
7.1 kB
16. Assembly Course/3.1 DataTypes.asm.zip
1.1 kB
16. Assembly Course/4. Saving States.mp4
32 MB
16. Assembly Course/4. Saving States.srt
14 kB
16. Assembly Course/4.1 SavingState.asm.zip
1.4 kB
16. Assembly Course/5. Arithmetic.mp4
77 MB
16. Assembly Course/5. Arithmetic.srt
24 kB
16. Assembly Course/5.1 Arithmetic.asm.zip
2.1 kB
16. Assembly Course/6. Loops.mp4
16 MB
16. Assembly Course/6. Loops.srt
6.2 kB
16. Assembly Course/6.1 Loops.asm.zip
1.6 kB
16. Assembly Course/7. Logic Control.mp4
39 MB
16. Assembly Course/7. Logic Control.srt
13 kB
16. Assembly Course/7.1 Logic.asm.zip
1.2 kB
16. Assembly Course/8. Reading Files.mp4
46 MB
16. Assembly Course/8. Reading Files.srt
15 kB
16. Assembly Course/8.1 ReadingFiles.asm.zip
1.5 kB
16. Assembly Course/9. Writing Files.mp4
23 MB
16. Assembly Course/9. Writing Files.srt
8.4 kB
16. Assembly Course/9.1 WritingFiles.asm.zip
1.4 kB
16. Assembly Course/10. Op Code.mp4
24 MB
16. Assembly Course/10. Op Code.srt
8.6 kB
16. Assembly Course/11. Bit Operators.mp4
9.0 MB
16. Assembly Course/11. Bit Operators.srt
4.4 kB
16. Assembly Course/11.1 Bit Operators.pptx
98 kB
16. Assembly Course/12. Assembly Hands On.mp4
3.5 MB
16. Assembly Course/12. Assembly Hands On.srt
2.0 kB
16. Assembly Course/12.1 Assembly Hands On.pptx
92 kB
17. Scope Identification/1. Goal _ Scope Identification.mp4
17 MB
17. Scope Identification/1. Goal _ Scope Identification.srt
8.9 kB
17. Scope Identification/1.1 Goal and Scope Identification.pptx
97 kB
17. Scope Identification/2. Stability Considerations.mp4
20 MB
17. Scope Identification/2. Stability Considerations.srt
11 kB
17. Scope Identification/2.1 Stability Considerations.pptx
96 kB
17. Scope Identification/3. Briefing Stake Holders.mp4
7.0 MB
17. Scope Identification/3. Briefing Stake Holders.srt
3.3 kB
17. Scope Identification/3.1 Briefing Stake Holders.pptx
94 kB
17. Scope Identification/4. Prepping.mp4
10 MB
17. Scope Identification/4. Prepping.srt
4.8 kB
17. Scope Identification/4.1 Assessment Document Template.docx
34 kB
17. Scope Identification/5. Scope Identification Hands On.mp4
5.5 MB
17. Scope Identification/5. Scope Identification Hands On.srt
3.5 kB
17. Scope Identification/5.1 Scope Identification Hands On.pptx
93 kB
18. Reconnaissance/1. What is Reconnaissance.mp4
9.7 MB
18. Reconnaissance/1. What is Reconnaissance.srt
5.5 kB
18. Reconnaissance/1.1 What is Recon.pptx
94 kB
18. Reconnaissance/2. Installing Kali.mp4
36 MB
18. Reconnaissance/2. Installing Kali.srt
8.4 kB
18. Reconnaissance/2.1 Kali Iso Updated.html
137 B
18. Reconnaissance/3. Passive Recon - Google.mp4
48 MB
18. Reconnaissance/3. Passive Recon - Google.srt
13 kB
18. Reconnaissance/3.1 Google Hacking Database.html
111 B
18. Reconnaissance/4. Passive Recon - Shodan.mp4
22 MB
18. Reconnaissance/4. Passive Recon - Shodan.srt
7.7 kB
18. Reconnaissance/4.1 Shodan.html
83 B
18. Reconnaissance/5. Passive Recon - Whois.mp4
33 MB
18. Reconnaissance/5. Passive Recon - Whois.srt
9.7 kB
18. Reconnaissance/5.1 Whois.html
87 B
18. Reconnaissance/6. Passive Recon - Netcraft.mp4
38 MB
18. Reconnaissance/6. Passive Recon - Netcraft.srt
10 kB
18. Reconnaissance/6.1 Netcraft.html
86 B
18. Reconnaissance/7. Passive Recon - Job Posting.mp4
41 MB
18. Reconnaissance/7. Passive Recon - Job Posting.srt
11 kB
18. Reconnaissance/8. Active Recon - Port Scanning.mp4
110 MB
18. Reconnaissance/8. Active Recon - Port Scanning.srt
28 kB
18. Reconnaissance/9. Active Recon - DNS.mp4
43 MB
18. Reconnaissance/9. Active Recon - DNS.srt
10 kB
18. Reconnaissance/10. Active Recon - Nikto.mp4
32 MB
18. Reconnaissance/10. Active Recon - Nikto.srt
8.4 kB
18. Reconnaissance/11. Active Recon - Dirb.mp4
24 MB
18. Reconnaissance/11. Active Recon - Dirb.srt
6.8 kB
18. Reconnaissance/12. Active Recon - Sparta.mp4
43 MB
18. Reconnaissance/12. Active Recon - Sparta.srt
12 kB
18. Reconnaissance/13. Active Recon - Working with NC.mp4
68 MB
18. Reconnaissance/13. Active Recon - Working with NC.srt
17 kB
18. Reconnaissance/13.1 NC For Windows.html
109 B
18. Reconnaissance/13.2 Pentest Monkey.html
130 B
18. Reconnaissance/14. Active Recon - Banner Grabbing.mp4
37 MB
18. Reconnaissance/14. Active Recon - Banner Grabbing.srt
11 kB
18. Reconnaissance/15. Active Recon - Vulnerability Scanners.mp4
15 MB
18. Reconnaissance/15. Active Recon - Vulnerability Scanners.srt
6.9 kB
18. Reconnaissance/15.1 Nessus Download.html
101 B
18. Reconnaissance/15.2 Vuln Scanners.pptx
96 kB
18. Reconnaissance/15.3 Nessus Tutorial.html
161 B
18. Reconnaissance/16. Active Recon - Browsing.mp4
32 MB
18. Reconnaissance/16. Active Recon - Browsing.srt
9.5 kB
18. Reconnaissance/17. Active Recon - Manual vs Automated.mp4
23 MB
18. Reconnaissance/17. Active Recon - Manual vs Automated.srt
5.9 kB
18. Reconnaissance/18. Reconnaissance Hands On.mp4
7.5 MB
18. Reconnaissance/18. Reconnaissance Hands On.srt
2.3 kB
19. Exploitation/1. Finding Exploits.mp4
59 MB
19. Exploitation/1. Finding Exploits.srt
14 kB
19. Exploitation/1.1 Exploit-DB.html
102 B
19. Exploitation/2. Misconfigurations.mp4
11 MB
19. Exploitation/2. Misconfigurations.srt
5.4 kB
19. Exploitation/2.1 Misconfigurations.pptx
95 kB
19. Exploitation/3. Looking for 0 days.mp4
12 MB
19. Exploitation/3. Looking for 0 days.srt
6.1 kB
19. Exploitation/3.1 0Days.pptx
93 kB
19. Exploitation/4. Metasploit - What is Metasploit.mp4
30 MB
19. Exploitation/4. Metasploit - What is Metasploit.srt
11 kB
19. Exploitation/5. Metasploit - Exploits and Payloads.mp4
82 MB
19. Exploitation/5. Metasploit - Exploits and Payloads.srt
22 kB
19. Exploitation/6. Metasploit - The Meterpreter.mp4
68 MB
19. Exploitation/6. Metasploit - The Meterpreter.srt
18 kB
19. Exploitation/7. Metasploit - Adding an Exploit to Metasploit.mp4
42 MB
19. Exploitation/7. Metasploit - Adding an Exploit to Metasploit.srt
14 kB
19. Exploitation/8. Metasploit - MSFVenom.mp4
45 MB
19. Exploitation/8. Metasploit - MSFVenom.srt
11 kB
19. Exploitation/9. Metasploit - Hands On.mp4
9.0 MB
19. Exploitation/9. Metasploit - Hands On.srt
4.6 kB
19. Exploitation/9.1 Metasploit Hands On.pptx
92 kB
19. Exploitation/10. The OWASP Top 10.mp4
50 MB
19. Exploitation/10. The OWASP Top 10.srt
11 kB
19. Exploitation/10.1 CSRF.html
139 B
19. Exploitation/10.2 OWASP Top 10.html
145 B
1. Welcome! Who Is This Guy!/1. Introduction.mp4
9.3 MB
19. Exploitation/11. SQL Injection _ SQLMap.srt
40 kB
19. Exploitation/11.1 Installing DVWA in Kali Linux.html
179 B
19. Exploitation/11.2 SQLInjection Tutorial.html
108 B
19. Exploitation/12. XSS.mp4
48 MB
19. Exploitation/12. XSS.srt
19 kB
19. Exploitation/13. Insecure Direct Object Reference.mp4
17 MB
19. Exploitation/13. Insecure Direct Object Reference.srt
7.9 kB
19. Exploitation/13.1 idor.txt
496 B
19. Exploitation/14. Local File Inclusion.mp4
74 MB
19. Exploitation/14. Local File Inclusion.srt
16 kB
19. Exploitation/15. Remote File Inclusion.mp4
30 MB
19. Exploitation/15. Remote File Inclusion.srt
10 kB
19. Exploitation/16. The Authenticated Unauthenticated Pages.mp4
19 MB
19. Exploitation/16. The Authenticated Unauthenticated Pages.srt
7.1 kB
19. Exploitation/17. Broken Authentication and Session Management.mp4
25 MB
19. Exploitation/17. Broken Authentication and Session Management.srt
12 kB
19. Exploitation/17.1 Broken Auth.pptx
100 kB
19. Exploitation/18. Faulty Redirects.mp4
8.8 MB
19. Exploitation/18. Faulty Redirects.srt
5.1 kB
20. Post Exploitation/1. Stabilizing Shells.mp4
66 MB
20. Post Exploitation/1. Stabilizing Shells.srt
18 kB
20. Post Exploitation/2. Breaking Out Of The Jail Shell.mp4
40 MB
20. Post Exploitation/2. Breaking Out Of The Jail Shell.srt
11 kB
20. Post Exploitation/3. What is Persistence.mp4
6.6 MB
20. Post Exploitation/3. What is Persistence.srt
3.9 kB
20. Post Exploitation/3.1 What is Persistence.pptx
95 kB
20. Post Exploitation/4. Windows Persistence.mp4
48 MB
20. Post Exploitation/4. Windows Persistence.srt
14 kB
20. Post Exploitation/5. Linux Persistence.mp4
48 MB
20. Post Exploitation/5. Linux Persistence.srt
15 kB
20. Post Exploitation/6. What is Privilege Escalation.mp4
25 MB
20. Post Exploitation/6. What is Privilege Escalation.srt
6.5 kB
20. Post Exploitation/7. OS Version.mp4
59 MB
20. Post Exploitation/7. OS Version.srt
14 kB
20. Post Exploitation/8. Common Configuration Issues.mp4
57 MB
20. Post Exploitation/8. Common Configuration Issues.srt
16 kB
20. Post Exploitation/8.1 Windows Privilege Escalation Tutorial 1.html
142 B
20. Post Exploitation/8.2 Windows Privilege Escalation Tutorial 2.html
107 B
20. Post Exploitation/8.3 Linux Privilege Escalation Tutorial 2.html
130 B
20. Post Exploitation/8.4 Linux Privilege Escalation Tutorial 1.html
127 B
20. Post Exploitation/9. File Permissions.mp4
71 MB
20. Post Exploitation/9. File Permissions.srt
19 kB
20. Post Exploitation/9.1 AccessCheck Tutorial.html
107 B
20. Post Exploitation/10. MySQL.mp4
69 MB
20. Post Exploitation/10. MySQL.srt
18 kB
20. Post Exploitation/11. Sudo.mp4
45 MB
20. Post Exploitation/11. Sudo.srt
12 kB
20. Post Exploitation/12. Relative Path Sudo Binary.mp4
47 MB
20. Post Exploitation/12. Relative Path Sudo Binary.srt
10 kB
20. Post Exploitation/13. Unquoted Service Path.mp4
61 MB
20. Post Exploitation/13. Unquoted Service Path.srt
19 kB
20. Post Exploitation/14. Service Misconfigurations.mp4
43 MB
20. Post Exploitation/14. Service Misconfigurations.srt
9.5 kB
20. Post Exploitation/14.1 AccessCheck Windows XP.html
147 B
20. Post Exploitation/14.2 AccessCheck Windows Vista _ Up.html
114 B
20. Post Exploitation/15. LinuxPrivChecker.mp4
45 MB
20. Post Exploitation/15. LinuxPrivChecker.srt
9.8 kB
20. Post Exploitation/15.1 LinuxPrivChecker.html
118 B
20. Post Exploitation/16. Im Root Now What.mp4
13 MB
20. Post Exploitation/16. Im Root Now What.srt
4.3 kB
20. Post Exploitation/17. Pulling Hashes.mp4
47 MB
20. Post Exploitation/17. Pulling Hashes.srt
14 kB
20. Post Exploitation/18. Pass The Hash.mp4
20 MB
20. Post Exploitation/18. Pass The Hash.srt
6.8 kB
20. Post Exploitation/19. SSH Keys.mp4
25 MB
20. Post Exploitation/19. SSH Keys.srt
6.7 kB
20. Post Exploitation/20. Checking Logs.mp4
9.9 MB
20. Post Exploitation/20. Checking Logs.srt
2.7 kB
20. Post Exploitation/21. Duel Homed Machines.mp4
8.7 MB
20. Post Exploitation/21. Duel Homed Machines.srt
2.9 kB
20. Post Exploitation/22. Network Traffic.mp4
40 MB
20. Post Exploitation/22. Network Traffic.srt
11 kB
20. Post Exploitation/23. ARP Poisoning.mp4
35 MB
20. Post Exploitation/23. ARP Poisoning.srt
9.6 kB
20. Post Exploitation/24. Web Servers.mp4
9.8 MB
20. Post Exploitation/24. Web Servers.srt
3.3 kB
20. Post Exploitation/25. Account Directory Attacks.mp4
18 MB
20. Post Exploitation/25. Account Directory Attacks.srt
5.5 kB
20. Post Exploitation/26. Password Spraying.mp4
25 MB
20. Post Exploitation/26. Password Spraying.srt
8.2 kB
20. Post Exploitation/26.1 spray.py
831 B
20. Post Exploitation/27. SSH Tunneling.mp4
57 MB
20. Post Exploitation/27. SSH Tunneling.srt
15 kB
20. Post Exploitation/28. Pivoting.mp4
64 MB
20. Post Exploitation/28. Pivoting.srt
18 kB
21. Password Cracking/1. What is Password Cracking.mp4
14 MB
21. Password Cracking/1. What is Password Cracking.srt
6.9 kB
21. Password Cracking/1.1 What is Password Cracking.pptx
99 kB
21. Password Cracking/2. John The Ripper.mp4
21 MB
21. Password Cracking/2. John The Ripper.srt
7.1 kB
21. Password Cracking/2.1 John The Ripper Windows Tutorial.html
135 B
21. Password Cracking/2.2 John The Ripper Linux Tutorial.html
162 B
21. Password Cracking/3. Hashcat.mp4
28 MB
21. Password Cracking/3. Hashcat.srt
8.7 kB
21. Password Cracking/4. Rainbow Tables.mp4
17 MB
21. Password Cracking/4. Rainbow Tables.srt
7.2 kB
21. Password Cracking/4.1 Rainbow Tables.pptx
99 kB
21. Password Cracking/5. Password Cracking Hands On.mp4
3.8 MB
21. Password Cracking/5. Password Cracking Hands On.srt
2.2 kB
21. Password Cracking/5.1 Password Cracking Hands On.pptx
93 kB
22. Covering Your Tracks/1. Why Cover Your Tracks.mp4
11 MB
22. Covering Your Tracks/1. Why Cover Your Tracks.srt
6.5 kB
22. Covering Your Tracks/1.1 Why Cover Your Tracks.pptx
97 kB
22. Covering Your Tracks/2. Clearing Windows Logs.mp4
17 MB
22. Covering Your Tracks/2. Clearing Windows Logs.srt
4.6 kB
22. Covering Your Tracks/3. Clearing Linux Logs.mp4
40 MB
22. Covering Your Tracks/3. Clearing Linux Logs.srt
7.7 kB
22. Covering Your Tracks/4. Quick Talk on Logging.mp4
26 MB
22. Covering Your Tracks/4. Quick Talk on Logging.srt
7.4 kB
22. Covering Your Tracks/5. Clearing Command History.mp4
36 MB
22. Covering Your Tracks/5. Clearing Command History.srt
11 kB
22. Covering Your Tracks/6. Persistent Backdoors.mp4
16 MB
22. Covering Your Tracks/6. Persistent Backdoors.srt
4.5 kB
22. Covering Your Tracks/7. The Clean Up.mp4
9.9 MB
22. Covering Your Tracks/7. The Clean Up.srt
4.5 kB
22. Covering Your Tracks/8. Covering Your Tracks Hands On.mp4
2.0 MB
22. Covering Your Tracks/8. Covering Your Tracks Hands On.srt
1.5 kB
23. Reporting/1. The Format.mp4
69 MB
23. Reporting/1. The Format.srt
21 kB
23. Reporting/1.1 Report Template.docx
112 kB
23. Reporting/2. The Audience.mp4
12 MB
23. Reporting/2. The Audience.srt
6.0 kB
23. Reporting/2.1 The Audience.pptx
96 kB
23. Reporting/3. Business Risks on Findings.mp4
14 MB
23. Reporting/3. Business Risks on Findings.srt
8.3 kB
23. Reporting/3.1 Buisness Risk on Findings.pptx
97 kB
23. Reporting/4. Remediation Options.mp4
7.7 MB
23. Reporting/4. Remediation Options.srt
4.6 kB
23. Reporting/4.1 Remediation Options.pptx
92 kB
23. Reporting/5. Working With The Blue Team.mp4
6.1 MB
23. Reporting/5. Working With The Blue Team.srt
3.1 kB
23. Reporting/5.1 Working With The Blue Team.pptx
93 kB
24. Attacking Active Directory (Realistic Scenario)/1. Reconnaissance.mp4
13 MB
24. Attacking Active Directory (Realistic Scenario)/1. Reconnaissance.srt
4.1 kB
24. Attacking Active Directory (Realistic Scenario)/2. Exploitation.mp4
18 MB
24. Attacking Active Directory (Realistic Scenario)/2. Exploitation.srt
5.0 kB
24. Attacking Active Directory (Realistic Scenario)/3. Post Exploitation.mp4
18 MB
24. Attacking Active Directory (Realistic Scenario)/3. Post Exploitation.srt
4.5 kB
24. Attacking Active Directory (Realistic Scenario)/4. Finding New Access.mp4
27 MB
24. Attacking Active Directory (Realistic Scenario)/4. Finding New Access.srt
8.9 kB
24. Attacking Active Directory (Realistic Scenario)/5. Moving Up In The World!.mp4
22 MB
24. Attacking Active Directory (Realistic Scenario)/5. Moving Up In The World!.srt
4.9 kB
24. Attacking Active Directory (Realistic Scenario)/6. Getting Domain Admin.mp4
36 MB
24. Attacking Active Directory (Realistic Scenario)/6. Getting Domain Admin.srt
10 kB
25. Job Hunting/1. The Resume.mp4
48 MB
25. Job Hunting/1. The Resume.srt
11 kB
25. Job Hunting/1.1 Resume.docx
19 kB
25. Job Hunting/2. Professional Email.mp4
15 MB
25. Job Hunting/2. Professional Email.srt
6.7 kB
25. Job Hunting/3. Certifications.mp4
47 MB
25. Job Hunting/3. Certifications.srt
18 kB
25. Job Hunting/4. Personal Brand.mp4
51 MB
25. Job Hunting/4. Personal Brand.srt
18 kB
25. Job Hunting/5. Searching for the Job.mp4
56 MB
25. Job Hunting/5. Searching for the Job.srt
18 kB
25. Job Hunting/6. Analyzing the Job Post.mp4
122 MB
25. Job Hunting/6. Analyzing the Job Post.srt
35 kB
25. Job Hunting/7. Applying for the Job.mp4
23 MB
25. Job Hunting/7. Applying for the Job.srt
6.9 kB
25. Job Hunting/8. The Future Company.mp4
43 MB
25. Job Hunting/8. The Future Company.srt
13 kB
25. Job Hunting/9. Salary Requirements.mp4
47 MB
25. Job Hunting/9. Salary Requirements.srt
16 kB
25. Job Hunting/10. The Interview Process - The Screening Call.mp4
19 MB
25. Job Hunting/10. The Interview Process - The Screening Call.srt
12 kB
25. Job Hunting/10.1 The Screening Call.pptx
95 kB
25. Job Hunting/11. The Interview Process - Prepping for the Technical Interviews.srt
356 B
25. Job Hunting/12. The Interview Process - The Technical Screening Interview.srt
356 B
25. Job Hunting/13. The Interview Process - Prepping for the On Site Final Interview.srt
356 B
25. Job Hunting/13.1 Prepping for the on site Interview.pptx
345 B
25. Job Hunting/14. The Interview Process - The Onsite.srt
356 B
25. Job Hunting/14.1 Onsite Interview.pptx
345 B
25. Job Hunting/15. The Interview Process - The Offer.srt
356 B
25. Job Hunting/15.1 The Offer.pptx
345 B
25. Job Hunting/16. Congratulations!.srt
356 B