f69dc311a936 // 3.77 TiB free of 3.98 TiB

c File Name Size Date
parent folder--
-001. Learning objectives en.srt21202023-08-23 17:36:30
-001. Learning objectives.mp482983022023-08-23 15:51:35
-002. 3.1 Surveying Types of Vulnerabilities en.srt188012023-08-23 17:36:30
-002. 3.1 Surveying Types of Vulnerabilities.mp4358881972023-08-23 15:51:38
-003. 3.2 Understanding Passive Reconnaissance and Social Engineering en.srt187852023-08-23 17:36:31
-003. 3.2 Understanding Passive Reconnaissance and Social Engineering.mp4284545142023-08-23 15:51:41
-004. 3.3 Understanding Active Reconnaissance Port Scanning and Host Profiling en.srt171452023-08-23 17:36:31
-004. 3.3 Understanding Active Reconnaissance Port Scanning and Host Profiling.mp4309213512023-08-23 15:51:44
-005. 3.4 Understanding Privilege Escalation and Code Execution Attacks en.srt29792023-08-23 17:36:32
-005. 3.4 Understanding Privilege Escalation and Code Execution Attacks.mp446763132023-08-23 15:51:44
-006. 3.5 Understanding Backdoors and Man-in-the-Middle Attacks en.srt91142023-08-23 17:36:32
-006. 3.5 Understanding Backdoors and Man-in-the-Middle Attacks.mp4125181992023-08-23 15:51:46
-007. 3.6 Understanding Denial of Service Attacks en.srt86042023-08-23 17:36:32
-007. 3.6 Understanding Denial of Service Attacks.mp4102691852023-08-23 15:51:47
-008. 3.7 Surveying Attack Methods for Data Exfiltration en.srt41242023-08-23 17:36:33
-008. 3.7 Surveying Attack Methods for Data Exfiltration.mp472700312023-08-23 15:51:48
-009. 3.8 Understanding ARP Cache Poisoning and Route Manipulation Attacks en.srt107092023-08-23 17:36:33
-009. 3.8 Understanding ARP Cache Poisoning and Route Manipulation Attacks.mp4151532952023-08-23 15:51:49
-010. 3.9 Understanding Password Attacks en.srt63822023-08-23 17:36:34
-010. 3.9 Understanding Password Attacks.mp4129825572023-08-23 15:51:50
-011. 3.10 Understanding Wireless Attacks en.srt69472023-08-23 17:36:35
-011. 3.10 Understanding Wireless Attacks.mp4107073912023-08-23 15:51:51
-012. 3.11 Exploring Security Evasion Techniques en.srt107602023-08-23 17:36:36
-012. 3.11 Exploring Security Evasion Techniques.mp4184605512023-08-23 15:51:53
-013. 3.12 Identifying the Challenges of Data Visibility in Detection en.srt121032023-08-23 17:36:37
-013. 3.12 Identifying the Challenges of Data Visibility in Detection.mp4232296212023-08-23 15:51:55
-014. 3.13 Identifying Potential Data Loss from Provided Traffic Profiles en.srt28622023-08-23 17:36:39
-014. 3.13 Identifying Potential Data Loss from Provided Traffic Profiles.mp455749962023-08-23 15:51:56
-015. 3.14 Comparing Rule-based Detection vs. Behavioral and Statistical Detection en.srt46312023-08-23 17:36:39
-015. 3.14 Comparing Rule-based Detection vs. Behavioral and Statistical Detection.mp4275741582023-08-23 15:51:59

control-panel