| parent folder | - | - |
| - | 001. Learning objectives en.srt | 1141 | 2023-09-05 21:08:07 |
| - | 001. Learning objectives.mp4 | 6798408 | 2023-09-05 21:02:57 |
| - | 002. 9.1 Understanding the Different Use Cases of Penetration Testing Tools en.srt | 3070 | 2023-09-05 21:08:08 |
| - | 003. 9.2 Exploring Tools for Reconnaissance en.srt | 12326 | 2023-09-05 21:08:09 |
| - | 003. 9.2 Exploring Tools for Reconnaissance.mp4 | 40764047 | 2023-09-05 21:03:06 |
| - | 004. 9.3 Exploring Tools for Vulnerability Scanning en.srt | 2589 | 2023-09-05 21:08:10 |
| - | 004. 9.3 Exploring Tools for Vulnerability Scanning.mp4 | 4434601 | 2023-09-05 21:03:08 |
| - | 005. 9.4 Exploring Tools for Credential Attacks en.srt | 5934 | 2023-09-05 21:08:11 |
| - | 005. 9.4 Exploring Tools for Credential Attacks.mp4 | 16673650 | 2023-09-05 21:03:23 |
| - | 006. 9.5 Exploring Tools for Persistence en.srt | 2033 | 2023-09-05 21:08:12 |
| - | 006. 9.5 Exploring Tools for Persistence.mp4 | 7792366 | 2023-09-05 21:03:36 |
| - | 007. 9.6 Exploring Tools for Evasion en.srt | 6056 | 2023-09-05 21:08:13 |
| - | 007. 9.6 Exploring Tools for Evasion.mp4 | 21549072 | 2023-09-05 21:03:51 |
| - | 008. 9.7 Exploring Tools for De-compilation en.srt | 7926 | 2023-09-05 21:08:14 |
| - | 008. 9.7 Exploring Tools for De-compilation.mp4 | 21930263 | 2023-09-05 21:03:55 |
| - | 009. 9.8 Exploring Tools for Forensics en.srt | 4675 | 2023-09-05 21:08:16 |
| - | 009. 9.8 Exploring Tools for Forensics.mp4 | 12819647 | 2023-09-05 21:03:57 |
| - | 010. 9.9 Exploring Tools for Software Assurance en.srt | 5997 | 2023-09-05 21:08:17 |
| - | 010. 9.9 Exploring Tools for Software Assurance.mp4 | 14488412 | 2023-09-05 21:03:59 |
| - | 011. 9.10 Leveraging Bash, Python, Ruby, and PowerShell in Penetration Testing Engagements en.srt | 3405 | 2023-09-05 21:08:18 |
| - | 011. 9.10 Leveraging Bash, Python, Ruby, and PowerShell in Penetration Testing Engagements.mp4 | 9363214 | 2023-09-05 21:04:01 |