| - | 001. 1.0 Learning objectives en.srt | 1694 | | | | | | | | srt | | | srt | 2023-09-06 06:12:01 |
| - | 001. 1.0 Learning objectives.mp4 | 11570126 | | 63.168005 | 1465 | 1328 | 128 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-09-05 21:47:29 |
| - | 002. 1.1 Introducing Ethical Hacking and Pen Testing en.srt | 7238 | | | | | | | | srt | | | srt | 2023-09-06 06:12:02 |
| - | 002. 1.1 Introducing Ethical Hacking and Pen Testing.mp4 | 44836006 | | 235.669002 | 1521 | 1385 | 128 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-09-05 21:47:33 |
| - | 003. 1.2 Getting Started with Ethical Hacking and Pen Testing en.srt | 11879 | | | | | | | | srt | | | srt | 2023-09-06 06:12:02 |
| - | 003. 1.2 Getting Started with Ethical Hacking and Pen Testing.mp4 | 60475492 | | 386.133333 | 1252 | 1116 | 128 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-09-05 21:47:40 |
| - | 004. 1.3 Understanding the Legal Aspects of Penetration Testing en.srt | 10148 | | | | | | | | srt | | | srt | 2023-09-06 06:12:03 |
| - | 004. 1.3 Understanding the Legal Aspects of Penetration Testing.mp4 | 44004114 | | 453.802993 | 775 | 639 | 128 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-09-05 21:47:44 |
| - | 005. 1.4 Exploring Penetration Testing Methodologies en.srt | 6045 | | | | | | | | srt | | | srt | 2023-09-06 06:12:04 |
| - | 005. 1.4 Exploring Penetration Testing Methodologies.mp4 | 22915165 | | 219.307007 | 835 | 699 | 128 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-09-05 21:47:47 |
| - | 006. 1.5 Exploring Penetration Testing and other Cyber Security Certifications en.srt | 12180 | | | | | | | | srt | | | srt | 2023-09-06 06:12:05 |
| - | 006. 1.5 Exploring Penetration Testing and other Cyber Security Certifications.mp4 | 59540507 | | 499.370998 | 953 | 817 | 128 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-09-05 21:47:54 |
| - | 007. 1.6 Building Your Own Lab Overview en.srt | 14435 | | | | | | | | srt | | | srt | 2023-09-06 06:12:07 |
| - | 007. 1.6 Building Your Own Lab Overview.mp4 | 55423672 | | 474.347007 | 934 | 798 | 128 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-09-05 21:48:00 |
| - | 008. 1.7 Building Your Own Lab VIRL and Operating System Software en.srt | 18397 | | | | | | | | srt | | | srt | 2023-09-06 06:12:08 |
| - | 008. 1.7 Building Your Own Lab VIRL and Operating System Software.mp4 | 60636430 | | 560.875011 | 864 | 728 | 128 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-09-05 21:48:06 |
| - | 009. 1.8 Understanding Vulnerabilities, Threats, and Exploits en.srt | 4267 | | | | | | | | srt | | | srt | 2023-09-06 06:12:09 |
| - | 009. 1.8 Understanding Vulnerabilities, Threats, and Exploits.mp4 | 20415269 | | 174.208005 | 937 | 800 | 128 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-09-05 21:48:09 |
| - | 010. 1.9 Understanding the Current Threat Landscape en.srt | 10311 | | | | | | | | srt | | | srt | 2023-09-06 06:12:10 |
| - | 010. 1.9 Understanding the Current Threat Landscape.mp4 | 33249953 | | 426.943991 | 623 | 487 | 128 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-09-05 21:48:13 |