| - | 001. Learning objectives en.srt | 1141 | | | | | | | | srt | | | srt | 2023-09-05 21:08:07 |
| - | 001. Learning objectives.mp4 | 6798408 | | 55.04 | 988 | 853 | 128 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-09-05 21:02:57 |
| - | 002. 9.1 Understanding the Different Use Cases of Penetration Testing Tools en.srt | 3070 | | | | | | | | srt | | | srt | 2023-09-05 21:08:08 |
| - | 003. 9.2 Exploring Tools for Reconnaissance en.srt | 12326 | | | | | | | | srt | | | srt | 2023-09-05 21:08:09 |
| - | 003. 9.2 Exploring Tools for Reconnaissance.mp4 | 40764047 | | 443.361814 | 735 | 602 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-09-05 21:03:06 |
| - | 004. 9.3 Exploring Tools for Vulnerability Scanning en.srt | 2589 | | | | | | | | srt | | | srt | 2023-09-05 21:08:10 |
| - | 004. 9.3 Exploring Tools for Vulnerability Scanning.mp4 | 4434601 | | 96.107007 | 369 | 234 | 128 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-09-05 21:03:08 |
| - | 005. 9.4 Exploring Tools for Credential Attacks en.srt | 5934 | | | | | | | | srt | | | srt | 2023-09-05 21:08:11 |
| - | 005. 9.4 Exploring Tools for Credential Attacks.mp4 | 16673650 | | 240.46585 | 554 | 421 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-09-05 21:03:23 |
| - | 006. 9.5 Exploring Tools for Persistence en.srt | 2033 | | | | | | | | srt | | | srt | 2023-09-05 21:08:12 |
| - | 006. 9.5 Exploring Tools for Persistence.mp4 | 7792366 | | 85.739002 | 727 | 592 | 128 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-09-05 21:03:36 |
| - | 007. 9.6 Exploring Tools for Evasion en.srt | 6056 | | | | | | | | srt | | | srt | 2023-09-05 21:08:13 |
| - | 007. 9.6 Exploring Tools for Evasion.mp4 | 21549072 | | 250.287891 | 688 | 555 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-09-05 21:03:51 |
| - | 008. 9.7 Exploring Tools for De-compilation en.srt | 7926 | | | | | | | | srt | | | srt | 2023-09-05 21:08:14 |
| - | 008. 9.7 Exploring Tools for De-compilation.mp4 | 21930263 | | 301.487891 | 581 | 448 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-09-05 21:03:55 |
| - | 009. 9.8 Exploring Tools for Forensics en.srt | 4675 | | | | | | | | srt | | | srt | 2023-09-05 21:08:16 |
| - | 009. 9.8 Exploring Tools for Forensics.mp4 | 12819647 | | 182.392744 | 562 | 428 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-09-05 21:03:57 |
| - | 010. 9.9 Exploring Tools for Software Assurance en.srt | 5997 | | | | | | | | srt | | | srt | 2023-09-05 21:08:17 |
| - | 010. 9.9 Exploring Tools for Software Assurance.mp4 | 14488412 | | 235.891542 | 491 | 358 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-09-05 21:03:59 |
| - | 011. 9.10 Leveraging Bash, Python, Ruby, and PowerShell in Penetration Testing Engagements en.srt | 3405 | | | | | | | | srt | | | srt | 2023-09-05 21:08:18 |
| - | 011. 9.10 Leveraging Bash, Python, Ruby, and PowerShell in Penetration Testing Engagements.mp4 | 9363214 | | 131.494603 | 569 | 436 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-09-05 21:04:01 |