f69dc311a936 // 3.77 TiB free of 3.98 TiB

c File Name Size Date
parent folder--
zipIntroduction/352423222023-08-23 15:50:54
zipLesson 1 Cybersecurity Fundamentals/4622350802023-08-23 17:44:41
zipLesson 10 Network Intrusion Analysis/2767081642023-08-23 17:44:41
zipLesson 11 Introducing AAA and Identity Management/2236249642023-08-23 17:44:41
zipLesson 12 Network Visibility and Segmentation/1093699322023-08-23 17:44:41
zipLesson 13 Network Infrastructure Security/2936311822023-08-23 17:44:41
zipLesson 14 Software-Defined Networking Security and Programmability/5086373462023-08-23 17:44:41
zipLesson 15 Overview of Ethical Hacking and Penetration Testing/2727116642023-08-23 17:44:41
zipLesson 16 Information Gathering and Passive Reconnaissance/5311348242023-08-23 17:44:41
zipLesson 17 Active Reconnaissance, Scanning, and Enumeration/13385375242023-08-23 17:44:41
zipLesson 18 Hacking Web Servers/2351584802023-08-23 17:44:41
zipLesson 19 Hacking Web Applications/7975537902023-08-23 17:44:41
zipLesson 2 Additional Cybersecurity Principles/3395251882023-08-23 17:44:41
zipLesson 20 SQL Injection/2860532022023-08-23 17:44:41
zipLesson 21 Fundamentals of Wireless Hacking/6740507942023-08-23 17:44:41
zipLesson 22 Wireless Client Attacks/1246166642023-08-23 17:44:41
zipLesson 23 Building Your Lab and Attack Hardware/1990669142023-08-23 17:44:41
zipLesson 24 Aircrack-ng/1662657662023-08-23 17:44:41
zipLesson 25 Buffer Overflows/2397120682023-08-23 17:44:41
zipLesson 26 Post-Exploitation Techniques/1100359602023-08-23 17:44:41
zipLesson 27 Hacking User Credentials/3520545602023-08-23 17:44:41
zipLesson 28 Reporting and Communication/1137036582023-08-23 17:44:41
zipLesson 29 Hacking Mobile Platforms/5517713202023-08-23 17:44:41
zipLesson 3 Types of Attacks and Vulnerabilities/5042294542023-08-23 17:44:41
zipLesson 30 Mobile Device Security/1926774782023-08-23 17:44:41
zipLesson 31 Fundamentals of Android Security/2173198982023-08-23 17:44:41
zipLesson 32 Hacking iOS Devices/368928042023-08-23 17:44:41
zipLesson 33 Fundamentals of IoT Security/8965410302023-08-23 17:44:41
zipLesson 34 Hacking IoT Devices/2525521762023-08-23 17:44:41
zipLesson 35 Attacking Bluetooth/624405282023-08-23 17:44:41
zipLesson 36 Attacking NFC/460179102023-08-23 17:44:41
zipLesson 37 Understanding Cloud Security/3513466042023-08-23 17:44:41
zipLesson 38 Understanding Social Engineering Countermeasures/1994595982023-08-23 17:44:41
zipLesson 4 Fundamentals of Cryptography and PKI/3504365682023-08-23 17:44:41
zipLesson 5 Fundamentals of Incident Response/6265143402023-08-23 17:44:41
zipLesson 6 Fundamentals of Security Monitoring/2905399302023-08-23 17:44:41
zipLesson 7 Intrusion Event Categories/2810321822023-08-23 17:44:41
zipLesson 8 Digital Forensics Fundamentals/2633432262023-08-23 17:44:41
zipLesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/4692410582023-08-23 17:44:41
zipModule 1 Security Concepts/60373442023-08-23 17:44:41
zipModule 2 Security Operations, Incident Response, and Digital Forensics/90136322023-08-23 17:44:41
zipModule 3 Security Operations, Incident Response, and Digital Forensics/123603862023-08-23 17:44:41
zipModule 4 Fundamentals of Ethical Hacking and Penetration Testing/192280242023-08-23 17:44:41
zipModule 5 Mobile Device Security/49323722023-08-23 17:44:41
zipModule 6 Internet of Things (IoT) Security/48976322023-08-23 17:44:41
zipModule 7 Cloud Security Fundamentals/66906062023-08-23 17:44:41
zipModule 8 Social Engineering Fundamentals/67521722023-08-23 17:44:41
zipSummary/145701422023-08-23 17:44:41
-The Complete Cybersecurity Bootcamp, 2nd Edition.pdf2154962023-08-23 17:35:13

control-panel