| - | 001. Learning objectives.mp4 | 275777 | | 38.911995 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:09:59 |
| - | 002. 27.1 Understanding Authentication and Authorization Mechanisms.mp4 | 1249032 | | 177.045011 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:10:00 |
| - | 003. 27.2 Understanding Authentication and Authorization Attacks.mp4 | 2415303 | | 342.549002 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:10:01 |
| - | 004. 27.3 Exploring Password Storage Mechanisms.mp4 | 1240699 | | 175.871995 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:10:02 |
| - | 005. 27.4 Understanding Password Storage Vulnerability.mp4 | 1555865 | | 220.608005 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:10:03 |
| - | 006. 27.5 Cracking Passwords with John the Ripper.mp4 | 5439821 | | 771.732993 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:10:04 |
| - | 007. 27.6 Cracking Passwords with hashcat.mp4 | 3947127 | | 559.914671 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:10:06 |
| - | 008. 27.7 Improving Password Security.mp4 | 935664 | | 132.608005 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:10:06 |