| parent folder | - | - |
| - | 001. Learning objectives en.srt | 2120 | 2023-08-23 17:36:30 |
| - | 001. Learning objectives.mp4 | 8298302 | 2023-08-23 15:51:35 |
| - | 002. 3.1 Surveying Types of Vulnerabilities en.srt | 18801 | 2023-08-23 17:36:30 |
| - | 002. 3.1 Surveying Types of Vulnerabilities.mp4 | 35888197 | 2023-08-23 15:51:38 |
| - | 003. 3.2 Understanding Passive Reconnaissance and Social Engineering en.srt | 18785 | 2023-08-23 17:36:31 |
| - | 003. 3.2 Understanding Passive Reconnaissance and Social Engineering.mp4 | 28454514 | 2023-08-23 15:51:41 |
| - | 004. 3.3 Understanding Active Reconnaissance Port Scanning and Host Profiling en.srt | 17145 | 2023-08-23 17:36:31 |
| - | 004. 3.3 Understanding Active Reconnaissance Port Scanning and Host Profiling.mp4 | 30921351 | 2023-08-23 15:51:44 |
| - | 005. 3.4 Understanding Privilege Escalation and Code Execution Attacks en.srt | 2979 | 2023-08-23 17:36:32 |
| - | 005. 3.4 Understanding Privilege Escalation and Code Execution Attacks.mp4 | 4676313 | 2023-08-23 15:51:44 |
| - | 006. 3.5 Understanding Backdoors and Man-in-the-Middle Attacks en.srt | 9114 | 2023-08-23 17:36:32 |
| - | 006. 3.5 Understanding Backdoors and Man-in-the-Middle Attacks.mp4 | 12518199 | 2023-08-23 15:51:46 |
| - | 007. 3.6 Understanding Denial of Service Attacks en.srt | 8604 | 2023-08-23 17:36:32 |
| - | 007. 3.6 Understanding Denial of Service Attacks.mp4 | 10269185 | 2023-08-23 15:51:47 |
| - | 008. 3.7 Surveying Attack Methods for Data Exfiltration en.srt | 4124 | 2023-08-23 17:36:33 |
| - | 008. 3.7 Surveying Attack Methods for Data Exfiltration.mp4 | 7270031 | 2023-08-23 15:51:48 |
| - | 009. 3.8 Understanding ARP Cache Poisoning and Route Manipulation Attacks en.srt | 10709 | 2023-08-23 17:36:33 |
| - | 009. 3.8 Understanding ARP Cache Poisoning and Route Manipulation Attacks.mp4 | 15153295 | 2023-08-23 15:51:49 |
| - | 010. 3.9 Understanding Password Attacks en.srt | 6382 | 2023-08-23 17:36:34 |
| - | 010. 3.9 Understanding Password Attacks.mp4 | 12982557 | 2023-08-23 15:51:50 |
| - | 011. 3.10 Understanding Wireless Attacks en.srt | 6947 | 2023-08-23 17:36:35 |
| - | 011. 3.10 Understanding Wireless Attacks.mp4 | 10707391 | 2023-08-23 15:51:51 |
| - | 012. 3.11 Exploring Security Evasion Techniques en.srt | 10760 | 2023-08-23 17:36:36 |
| - | 012. 3.11 Exploring Security Evasion Techniques.mp4 | 18460551 | 2023-08-23 15:51:53 |
| - | 013. 3.12 Identifying the Challenges of Data Visibility in Detection en.srt | 12103 | 2023-08-23 17:36:37 |
| - | 013. 3.12 Identifying the Challenges of Data Visibility in Detection.mp4 | 23229621 | 2023-08-23 15:51:55 |
| - | 014. 3.13 Identifying Potential Data Loss from Provided Traffic Profiles en.srt | 2862 | 2023-08-23 17:36:39 |
| - | 014. 3.13 Identifying Potential Data Loss from Provided Traffic Profiles.mp4 | 5574996 | 2023-08-23 15:51:56 |
| - | 015. 3.14 Comparing Rule-based Detection vs. Behavioral and Statistical Detection en.srt | 4631 | 2023-08-23 17:36:39 |
| - | 015. 3.14 Comparing Rule-based Detection vs. Behavioral and Statistical Detection.mp4 | 27574158 | 2023-08-23 15:51:59 |