| - | 001. Learning objectives en.srt | 2120 | | | | | | | | srt | | | srt | 2023-08-23 17:36:30 |
| - | 001. Learning objectives.mp4 | 8298302 | | 78.20483 | 848 | 716 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:51:35 |
| - | 002. 3.1 Surveying Types of Vulnerabilities en.srt | 18801 | | | | | | | | srt | | | srt | 2023-08-23 17:36:30 |
| - | 002. 3.1 Surveying Types of Vulnerabilities.mp4 | 35888197 | | 759.38542 | 378 | 244 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:51:38 |
| - | 003. 3.2 Understanding Passive Reconnaissance and Social Engineering en.srt | 18785 | | | | | | | | srt | | | srt | 2023-08-23 17:36:31 |
| - | 003. 3.2 Understanding Passive Reconnaissance and Social Engineering.mp4 | 28454514 | | 746.567982 | 304 | 171 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:51:41 |
| - | 004. 3.3 Understanding Active Reconnaissance Port Scanning and Host Profiling en.srt | 17145 | | | | | | | | srt | | | srt | 2023-08-23 17:36:31 |
| - | 004. 3.3 Understanding Active Reconnaissance Port Scanning and Host Profiling.mp4 | 30921351 | | 703.146667 | 351 | 218 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:51:44 |
| - | 005. 3.4 Understanding Privilege Escalation and Code Execution Attacks en.srt | 2979 | | | | | | | | srt | | | srt | 2023-08-23 17:36:32 |
| - | 005. 3.4 Understanding Privilege Escalation and Code Execution Attacks.mp4 | 4676313 | | 124.319637 | 300 | 167 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:51:44 |
| - | 006. 3.5 Understanding Backdoors and Man-in-the-Middle Attacks en.srt | 9114 | | | | | | | | srt | | | srt | 2023-08-23 17:36:32 |
| - | 006. 3.5 Understanding Backdoors and Man-in-the-Middle Attacks.mp4 | 12518199 | | 345.211066 | 290 | 156 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:51:46 |
| - | 007. 3.6 Understanding Denial of Service Attacks en.srt | 8604 | | | | | | | | srt | | | srt | 2023-08-23 17:36:32 |
| - | 007. 3.6 Understanding Denial of Service Attacks.mp4 | 10269185 | | 337.73424 | 243 | 109 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:51:47 |
| - | 008. 3.7 Surveying Attack Methods for Data Exfiltration en.srt | 4124 | | | | | | | | srt | | | srt | 2023-08-23 17:36:33 |
| - | 008. 3.7 Surveying Attack Methods for Data Exfiltration.mp4 | 7270031 | | 152.880181 | 380 | 247 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:51:48 |
| - | 009. 3.8 Understanding ARP Cache Poisoning and Route Manipulation Attacks en.srt | 10709 | | | | | | | | srt | | | srt | 2023-08-23 17:36:33 |
| - | 009. 3.8 Understanding ARP Cache Poisoning and Route Manipulation Attacks.mp4 | 15153295 | | 427.641905 | 283 | 150 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:51:49 |
| - | 010. 3.9 Understanding Password Attacks en.srt | 6382 | | | | | | | | srt | | | srt | 2023-08-23 17:36:34 |
| - | 010. 3.9 Understanding Password Attacks.mp4 | 12982557 | | 253.724444 | 409 | 275 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:51:50 |
| - | 011. 3.10 Understanding Wireless Attacks en.srt | 6947 | | | | | | | | srt | | | srt | 2023-08-23 17:36:35 |
| - | 011. 3.10 Understanding Wireless Attacks.mp4 | 10707391 | | 259.715193 | 329 | 196 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:51:51 |
| - | 012. 3.11 Exploring Security Evasion Techniques en.srt | 10760 | | | | | | | | srt | | | srt | 2023-08-23 17:36:36 |
| - | 012. 3.11 Exploring Security Evasion Techniques.mp4 | 18460551 | | 464.515193 | 317 | 184 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:51:53 |
| - | 013. 3.12 Identifying the Challenges of Data Visibility in Detection en.srt | 12103 | | | | | | | | srt | | | srt | 2023-08-23 17:36:37 |
| - | 013. 3.12 Identifying the Challenges of Data Visibility in Detection.mp4 | 23229621 | | 452.719456 | 410 | 277 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:51:55 |
| - | 014. 3.13 Identifying Potential Data Loss from Provided Traffic Profiles en.srt | 2862 | | | | | | | | srt | | | srt | 2023-08-23 17:36:39 |
| - | 014. 3.13 Identifying Potential Data Loss from Provided Traffic Profiles.mp4 | 5574996 | | 114.335057 | 390 | 256 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:51:56 |
| - | 015. 3.14 Comparing Rule-based Detection vs. Behavioral and Statistical Detection en.srt | 4631 | | | | | | | | srt | | | srt | 2023-08-23 17:36:39 |
| - | 015. 3.14 Comparing Rule-based Detection vs. Behavioral and Statistical Detection.mp4 | 27574158 | | 232.269206 | 949 | 816 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 15:51:59 |