switch to basic browser
📂
📝
📟

🌲 / learning Testing - security The Complete Cybersecurity Bootcamp, 2nd Edition - Audio Lesson 3 Types of Attacks and Vulnerabilities

c File Name Size files dur q aq Ac Fmt T Date
-001. Learning objectives.mp455233178.1439915655aacmovmp42023-08-23 16:06:06
-002. 3.1 Surveying Types of Vulnerabilities.mp45352447759.3386855655aacmovmp42023-08-23 16:06:07
-003. 3.2 Understanding Passive Reconnaissance and Social Engineering.mp45262131746.5170075655aacmovmp42023-08-23 16:06:08
-004. 3.3 Understanding Active Reconnaissance Port Scanning and Host Profiling.mp44956130703.0826535655aacmovmp42023-08-23 16:06:10
-005. 3.4 Understanding Privilege Escalation and Code Execution Attacks.mp4876918124.2666675655aacmovmp42023-08-23 16:06:11
-006. 3.5 Understanding Backdoors and Man-in-the-Middle Attacks.mp42433631345.1519955655aacmovmp42023-08-23 16:06:12
-007. 3.6 Understanding Denial of Service Attacks.mp42380939337.6850115655aacmovmp42023-08-23 16:06:14
-008. 3.7 Surveying Attack Methods for Data Exfiltration.mp41078208152.810685655aacmovmp42023-08-23 16:06:14
-009. 3.8 Understanding ARP Cache Poisoning and Route Manipulation Attacks.mp43014543427.5839915655aacmovmp42023-08-23 16:06:16
-010. 3.9 Understanding Password Attacks.mp41788884253.6746715655aacmovmp42023-08-23 16:06:17
-011. 3.10 Understanding Wireless Attacks.mp41831102259.6480055655aacmovmp42023-08-23 16:06:18
-012. 3.11 Exploring Security Evasion Techniques.mp43274414464.4480055655aacmovmp42023-08-23 16:06:19
-013. 3.12 Identifying the Challenges of Data Visibility in Detection.mp43191271452.6719955655aacmovmp42023-08-23 16:06:20
-014. 3.13 Identifying Potential Data Loss from Provided Traffic Profiles.mp4806554114.2826535655aacmovmp42023-08-23 16:06:21
-015. 3.14 Comparing Rule-based Detection vs. Behavioral and Statistical Detection.mp41637683232.2129935655aacmovmp42023-08-23 16:06:22

control-panel

π
f69dc311a936 // 3.77 TiB free of 3.98 TiB