f69dc311a936 // 3.77 TiB free of 3.98 TiB

c File Name Size Date
parent folder--
zipIntroduction/22854262023-08-23 16:05:39
zipLesson 1 Cybersecurity Fundamentals/395640202023-08-23 16:05:53
zipLesson 10 Network Intrusion Analysis/277388022023-08-23 16:07:32
zipLesson 11 Introducing AAA and Identity Management/310850182023-08-23 16:07:41
zipLesson 12 Network Visibility and Segmentation/160838302023-08-23 16:07:49
zipLesson 13 Network Infrastructure Security/426781342023-08-23 16:08:02
zipLesson 14 Software-Defined Networking Security and Programmability/620693462023-08-23 16:08:17
zipLesson 15 Overview of Ethical Hacking and Penetration Testing/433207442023-08-23 16:08:27
zipLesson 16 Information Gathering and Passive Reconnaissance/513209462023-08-23 16:08:39
zipLesson 17 Active Reconnaissance, Scanning, and Enumeration/820140082023-08-23 16:08:55
zipLesson 18 Hacking Web Servers/294023922023-08-23 16:09:01
zipLesson 19 Hacking Web Applications/874526562023-08-23 16:09:18
zipLesson 2 Additional Cybersecurity Principles/475498482023-08-23 16:06:05
zipLesson 20 SQL Injection/260836042023-08-23 16:09:24
zipLesson 21 Fundamentals of Wireless Hacking/412736342023-08-23 16:09:32
zipLesson 22 Wireless Client Attacks/149392202023-08-23 16:09:38
zipLesson 23 Building Your Lab and Attack Hardware/103185062023-08-23 16:09:41
zipLesson 24 Aircrack-ng/166296042023-08-23 16:09:47
zipLesson 25 Buffer Overflows/374160602023-08-23 16:09:55
zipLesson 26 Post-Exploitation Techniques/115221202023-08-23 16:09:58
zipLesson 27 Hacking User Credentials/341185762023-08-23 16:10:06
zipLesson 28 Reporting and Communication/91827782023-08-23 16:10:10
zipLesson 29 Hacking Mobile Platforms/327762362023-08-23 16:10:17
zipLesson 3 Types of Attacks and Vulnerabilities/768743722023-08-23 16:06:22
zipLesson 30 Mobile Device Security/96100742023-08-23 16:10:22
zipLesson 31 Fundamentals of Android Security/314225622023-08-23 16:10:26
zipLesson 32 Hacking iOS Devices/60333682023-08-23 16:10:30
zipLesson 33 Fundamentals of IoT Security/583888562023-08-23 16:10:43
zipLesson 34 Hacking IoT Devices/292147942023-08-23 16:10:49
zipLesson 35 Attacking Bluetooth/60903482023-08-23 16:10:52
zipLesson 36 Attacking NFC/85946782023-08-23 16:10:54
zipLesson 37 Understanding Cloud Security/485614982023-08-23 16:11:07
zipLesson 38 Understanding Social Engineering Countermeasures/252913902023-08-23 16:11:15
zipLesson 4 Fundamentals of Cryptography and PKI/265081822023-08-23 16:06:28
zipLesson 5 Fundamentals of Incident Response/517129442023-08-23 16:06:42
zipLesson 6 Fundamentals of Security Monitoring/388413622023-08-23 16:06:53
zipLesson 7 Intrusion Event Categories/304874202023-08-23 16:07:03
zipLesson 8 Digital Forensics Fundamentals/329644942023-08-23 16:07:09
zipLesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/670285362023-08-23 16:07:22
zipModule 1 Security Concepts/4429702023-08-23 16:05:40
zipModule 2 Security Operations, Incident Response, and Digital Forensics/6186462023-08-23 16:06:29
zipModule 3 Security Operations, Incident Response, and Digital Forensics/8316502023-08-23 16:07:32
zipModule 4 Fundamentals of Ethical Hacking and Penetration Testing/12357222023-08-23 16:08:18
zipModule 5 Mobile Device Security/3571582023-08-23 16:10:11
zipModule 6 Internet of Things (IoT) Security/3655682023-08-23 16:10:31
zipModule 7 Cloud Security Fundamentals/4792022023-08-23 16:10:55
zipModule 8 Social Engineering Fundamentals/4906922023-08-23 16:11:08
zipSummary/10218802023-08-23 16:11:16
-The Complete Cybersecurity Bootcamp, 2nd Edition.pdf2114522023-08-23 17:24:08

control-panel