switch to basic browser
📂
📝
📟

🌲 / learning Testing - security The Complete Cybersecurity Bootcamp, 2nd Edition - Audio Lesson 15 Overview of Ethical Hacking and Penetration Testing

c File Name Size files dur q aq Ac Fmt T Date
-001. Learning objectives.mp431081743.8826535655aacmovmp42023-08-23 16:08:19
-002. 15.1 Introducing Ethical Hacking and Pen Testing.mp42740287388.6719955655aacmovmp42023-08-23 16:08:20
-003. 15.2 Exploring Penetration Testing Methodologies.mp43901297553.4080055655aacmovmp42023-08-23 16:08:21
-004. 15.3 Explaining the Importance of the Planning and Preparation Phase.mp474326231054.5066675655aacmovmp42023-08-23 16:08:23
-005. 15.4 Understanding the Legal Concepts of Penetration Testing.mp42382412337.8770075655aacmovmp42023-08-23 16:08:24
-006. 15.5 Learning How to Scope a Penetration Testing Engagement Properly.mp42889524409.8346715655aacmovmp42023-08-23 16:08:26
-007. 15.6 Learning the Key Aspects of Compliance-based Assessments.mp42003412284.1170075655aacmovmp42023-08-23 16:08:27

control-panel

π
f69dc311a936 // 3.77 TiB free of 3.98 TiB