switch to basic browser
📂
📝
📟

🌲 / learning Testing - security The Complete Cybersecurity Bootcamp, 2nd Edition Lesson 3 Types of Attacks and Vulnerabilities

c File Name Size files dur q vq aq Vc Ac Fmt Res fps T Date
-001. Learning objectives en.srt2120srtsrt2023-08-23 17:36:30
-001. Learning objectives.mp4829830278.20483848716125h264aacmov1280x72030mp42023-08-23 15:51:35
-002. 3.1 Surveying Types of Vulnerabilities en.srt18801srtsrt2023-08-23 17:36:30
-002. 3.1 Surveying Types of Vulnerabilities.mp435888197759.38542378244125h264aacmov1280x72030mp42023-08-23 15:51:38
-003. 3.2 Understanding Passive Reconnaissance and Social Engineering en.srt18785srtsrt2023-08-23 17:36:31
-003. 3.2 Understanding Passive Reconnaissance and Social Engineering.mp428454514746.567982304171125h264aacmov1280x72030mp42023-08-23 15:51:41
-004. 3.3 Understanding Active Reconnaissance Port Scanning and Host Profiling en.srt17145srtsrt2023-08-23 17:36:31
-004. 3.3 Understanding Active Reconnaissance Port Scanning and Host Profiling.mp430921351703.146667351218125h264aacmov1280x72030mp42023-08-23 15:51:44
-005. 3.4 Understanding Privilege Escalation and Code Execution Attacks en.srt2979srtsrt2023-08-23 17:36:32
-005. 3.4 Understanding Privilege Escalation and Code Execution Attacks.mp44676313124.319637300167125h264aacmov1280x72030mp42023-08-23 15:51:44
-006. 3.5 Understanding Backdoors and Man-in-the-Middle Attacks en.srt9114srtsrt2023-08-23 17:36:32
-006. 3.5 Understanding Backdoors and Man-in-the-Middle Attacks.mp412518199345.211066290156125h264aacmov1280x72030mp42023-08-23 15:51:46
-007. 3.6 Understanding Denial of Service Attacks en.srt8604srtsrt2023-08-23 17:36:32
-007. 3.6 Understanding Denial of Service Attacks.mp410269185337.73424243109125h264aacmov1280x72030mp42023-08-23 15:51:47
-008. 3.7 Surveying Attack Methods for Data Exfiltration en.srt4124srtsrt2023-08-23 17:36:33
-008. 3.7 Surveying Attack Methods for Data Exfiltration.mp47270031152.880181380247125h264aacmov1280x72030mp42023-08-23 15:51:48
-009. 3.8 Understanding ARP Cache Poisoning and Route Manipulation Attacks en.srt10709srtsrt2023-08-23 17:36:33
-009. 3.8 Understanding ARP Cache Poisoning and Route Manipulation Attacks.mp415153295427.641905283150125h264aacmov1280x72030mp42023-08-23 15:51:49
-010. 3.9 Understanding Password Attacks en.srt6382srtsrt2023-08-23 17:36:34
-010. 3.9 Understanding Password Attacks.mp412982557253.724444409275125h264aacmov1280x72030mp42023-08-23 15:51:50
-011. 3.10 Understanding Wireless Attacks en.srt6947srtsrt2023-08-23 17:36:35
-011. 3.10 Understanding Wireless Attacks.mp410707391259.715193329196125h264aacmov1280x72030mp42023-08-23 15:51:51
-012. 3.11 Exploring Security Evasion Techniques en.srt10760srtsrt2023-08-23 17:36:36
-012. 3.11 Exploring Security Evasion Techniques.mp418460551464.515193317184125h264aacmov1280x72030mp42023-08-23 15:51:53
-013. 3.12 Identifying the Challenges of Data Visibility in Detection en.srt12103srtsrt2023-08-23 17:36:37
-013. 3.12 Identifying the Challenges of Data Visibility in Detection.mp423229621452.719456410277125h264aacmov1280x72030mp42023-08-23 15:51:55
-014. 3.13 Identifying Potential Data Loss from Provided Traffic Profiles en.srt2862srtsrt2023-08-23 17:36:39
-014. 3.13 Identifying Potential Data Loss from Provided Traffic Profiles.mp45574996114.335057390256125h264aacmov1280x72030mp42023-08-23 15:51:56
-015. 3.14 Comparing Rule-based Detection vs. Behavioral and Statistical Detection en.srt4631srtsrt2023-08-23 17:36:39
-015. 3.14 Comparing Rule-based Detection vs. Behavioral and Statistical Detection.mp427574158232.269206949816125h264aacmov1280x72030mp42023-08-23 15:51:59

control-panel

π
f69dc311a936 // 3.77 TiB free of 3.98 TiB