FileMood

Download DIY Cybersecurity Degree

DIY Cybersecurity Degree

Name

DIY Cybersecurity Degree

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

233.4 GB

Total Files

7179

Last Seen

2025-08-13 23:30

Hash

DEC06A2AE7E430B894645AC6C133577F8F6690FD

/.../101 - Final Stretch/

001 Recording of our Live AMA (aka AAA - Ask Angela Anything).mp4_exiftool_tmp

0.0 KB

002 Study With Me.mp4

1.9 GB

001 Recording of our Live AMA (aka AAA - Ask Angela Anything).mp4

713.4 MB

003 Bonus Lecture Check out my other courses.html

2.8 KB

/.../01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/

002 Course-Pledge-App-Brewery-100-Days-of-Python.pdf

73.8 KB

002 Course-Pledge-App-Brewery-100-Days-of-Python.pdf_original

73.8 KB

002 START HERE.mp4

37.8 MB

002 START HERE.mp4_original

37.8 MB

003 12-Rules-to-Learn-to-Code-eBook-Copyright-App-Brewery.pdf

2.5 MB

003 12-Rules-to-Learn-to-Code-eBook-Copyright-App-Brewery.pdf_original

2.5 MB

003 100-Days-of-Python-Check-Off-Posters.pdf

180.2 KB

003 100-Days-of-Python-Check-Off-Posters.pdf_original

180.2 KB

003 Coding-Notebook-Sheets-to-Print.pdf

354.6 KB

003 Coding-Notebook-Sheets-to-Print.pdf_original

354.6 KB

003 Downloadable Resources and Tips for Taking the Course.mp4

99.7 MB

003 Downloadable Resources and Tips for Taking the Course.mp4_original

99.7 MB

003 FAQ-I-Cant-Open-the-Course-Resource-Links.url

0.1 KB

003 Join-the-Student-Community-on-Discord.url

0.1 KB

003 Python-Syntax-Cheat-Sheet-Booklet-v2.pdf

279.4 KB

003 Python-Syntax-Cheat-Sheet-Booklet-v2.pdf_original

279.4 KB

003 Study-With-Me-Video.url

0.1 KB

003 Syllabus-for-100-Days-of-Python.pdf

167.0 KB

003 Syllabus-for-100-Days-of-Python.pdf_original

167.0 KB

003 Wallpapers.zip

33.1 MB

004 Day 1 Goals what we will make by the end of the day.mp4

9.9 MB

004 Day 1 Goals what we will make by the end of the day.mp4_original

9.9 MB

004 Press-Run-to-see-the-final-project.url

0.1 KB

005 FAQ Can I Use PyCharmVSCode Another Local Code Editor.html

1.4 KB

006 Create-a-Replit-Account.url

0.0 KB

006 Fork-the-Day-1-Starting-Repl.url

0.1 KB

006 Printing to the Console in Python.mp4

37.0 MB

006 Printing to the Console in Python.mp4_original

37.0 MB

007 Join Our Class on Coding Rooms.html

2.1 KB

008 [Interactive Coding Exercise] Printing.mp4

45.5 MB

008 Step-1-Sign-Up-to-Coding-Rooms-First-Register-for-Free-Student-Account.url

0.1 KB

008 Step-2-Join-Our-Coding-Room-Course.url

0.1 KB

009 String Manipulation and Code Intelligence.mp4

31.3 MB

010 [Interactive Coding Exercise] Debugging Practice.mp4

50.9 MB

010 Exercise-2-Debugging-Practice.url

0.1 KB

010 Join-Our-Coding-Rooms.url

0.1 KB

011 The Python Input Function.mp4

18.7 MB

012 [Interactive Coding Exercise] Input Function.mp4

37.5 MB

012 Exercise-3-Input-Functions.url

0.1 KB

012 Join-Our-Coding-Rooms.url

0.1 KB

012 Step-Through-Execution-with-Python-Tutor.url

0.0 KB

012 Step-Through-Execution-with-Thonny-IDE.url

0.0 KB

013 Python Variables.mp4

13.1 MB

013 Variables-Ending-Repl.url

0.1 KB

013 Variables-Starting-Repl.url

0.1 KB

014 [Interactive Coding Exercise] Variables.mp4

20.0 MB

014 Exercise-4-Variables.url

0.1 KB

015 Day-1-Ending-Code.url

0.1 KB

015 Variable Naming.mp4

8.1 MB

016 Band-Name-Generator-Starting-Code-replit.com-.url

0.1 KB

016 Course-Fixes-Report-an-Issue.url

0.1 KB

016 Day 1 Project Band Name Generator.mp4

20.4 MB

016 Solution-Band-Name-Generator-Ending-Code.url

0.1 KB

017 Congratulations! Well done!.mp4

10.3 MB

external-links.txt

2.0 KB

001 What you're going to get from this course.mp4

66.4 MB

001 What you're going to get from this course.mp4_original

66.4 MB

/.../02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/

001 Day 2 Goals what we will make by the end of the day.mp4

2.7 MB

001 Press-Run-to-see-the-final-project.url

0.1 KB

002 Fork-the-Day-2-Starting-Repl.url

0.1 KB

002 Python Primitive Data Types.mp4

16.8 MB

003 Type Error, Type Checking and Type Conversion.mp4

17.1 MB

004 [Interactive Coding Exercise] Data Types.mp4

31.3 MB

004 Exercise-1-Data-Types.url

0.1 KB

005 Mathematical Operations in Python.mp4

15.2 MB

006 [Interactive Coding Exercise] BMI Calculator.mp4

49.3 MB

006 BMI-Explained.url

0.1 KB

006 Exercise-2-BMI-Calculator.url

0.1 KB

007 Number Manipulation and F Strings in Python.mp4

18.2 MB

008 [Interactive Coding Exercise] Life in Weeks.mp4

45.7 MB

008 Exercise-3-Life-in-Weeks.url

0.1 KB

008 Tim-Urbans-Life-in-Weeks.url

0.1 KB

009 Course-Fixes-Report-an-Issue.url

0.1 KB

009 Day 2 Project Tip Calculator.mp4

129.1 MB

009 FAQ-How-to-Get-2-Decimal-Places-.url

0.1 KB

009 Floating-Point-Arithmetic.url

0.1 KB

009 Solution-Tip-Calculator-Ending-Code.url

0.1 KB

009 Tip-Calculator-Start-replit.com-.url

0.1 KB

010 You are already in the top 50%.mp4

5.8 MB

external-links.txt

1.1 KB

/.../03 - Day 3 - Beginner - Control Flow and Logical Operators/

001 Day 3 Goals what we will make by the end of the day.mp4

3.1 MB

001 Day-3-Goal-Click-Run-to-see-the-final-project.url

0.1 KB

002 Control Flow with if else and Conditional Operators.mp4

40.5 MB

002 Fork-the-Day-3-Starting-Repl.url

0.1 KB

002 Ticketing-Flow-Chart-Version-1-if-else-statements.url

1.2 KB

003 [Interactive Coding Exercise] Odd or Even Introducing the Modulo.mp4

24.7 MB

003 Exercise-1-Odd-or-Even.url

0.1 KB

004 Nested if statements and elif statements.mp4

19.5 MB

004 Ticketing-Flow-Chart-Version-2-nested-if-else-statements.url

0.2 KB

004 Ticketing-Flow-Chart-Version-3-if-elif-else-statements.url

0.2 KB

005 [Interactive Coding Exercise] BMI 2.0.mp4

50.7 MB

005 Exercise-2-BMI-Calculator-2.0.url

0.1 KB

006 [Interactive Coding Exercise] Leap Year.mp4

66.5 MB

006 Exercise-3-Leap-Year.url

0.1 KB

006 For-the-Curious-How-Leap-Years-Work.url

0.1 KB

006 Leap-Year-Flow-Chart.url

1.4 KB

007 Multiple If Statements in Succession.mp4

55.3 MB

007 Multiple-if-statements-Ending-Code.url

0.1 KB

007 Ticketing-Flow-Chart-Version-4-Multiple-if-statements.url

0.2 KB

008 [Interactive Coding Exercise] Pizza Order Practice.mp4

29.4 MB

008 Coding-Exercise-3.4-Pizza-Order-START-HERE.url

0.1 KB

009 Day-3-Ending-Code.url

0.1 KB

009 Logical Operators.mp4

25.0 MB

009 Ticketing-Flow-Chart-Version-5-with-Midlife-Crisis.url

2.3 KB

010 [Interactive Coding Exercise] Love Calculator.mp4

109.6 MB

010 Coding-Exercise-3.5-Love-Calculator-START-HERE.url

0.1 KB

011 Add-your-own-ASCII-art.url

0.0 KB

011 Course-Fixes-Report-an-Issue.url

0.1 KB

011 Day 3 Project Treasure Island.mp4

143.5 MB

011 Solution-Treasure-Island-Ending-Code.url

0.1 KB

011 Treasure-Island-Flowchart-pdf.pdf

31.4 KB

011 Treasure-Island-Flowchart-website-.url

0.2 KB

011 Treasure-Island-Starting-Code-replit.com-.url

0.1 KB

012 Share and Show off your Project!.mp4

8.6 MB

external-links.txt

7.3 KB

/.../04 - Day 4 - Beginner - Randomisation and Python Lists/

001 Day 4 Goals what we will make by the end of the day.mp4

2.1 MB

001 Day-4-Goal-Click-Run-to-see-the-final-project.url

0.1 KB

002 AskPythons-Documentation-on-Random.url

0.1 KB

002 For-the-Curious-Random-vs-Pseudorandom-Numbers.url

0.1 KB

002 For-the-Curious-The-Mersenne-Twister.url

0.1 KB

002 Fork-the-Day-4-Starting-Repl.url

0.1 KB

002 Random Module.mp4

68.5 MB

003 [Interactive Coding Exercise] Heads or Tails.mp4

5.4 MB

003 Exercise-4.1-Heads-or-Tails-START-HERE.url

0.1 KB

004 List-Practice-Repl-US-States-Veg-.url

0.1 KB

004 Things-that-lists-can-do-in-Python.url

0.1 KB

004 Understanding the Offset and Appending Items to Lists.mp4

82.7 MB

005 [Interactive Coding Exercise] Banker Roulette - Who will pay the bill.mp4

69.6 MB

005 Convert-a-String-to-a-List.url

0.1 KB

005 Documentation-on-random.choice-.url

0.1 KB

005 Exercise-4.2-Whos-Paying-START-HERE.url

0.1 KB

006 For-the-Curious-The-Dirty-Dozen.url

0.1 KB

006 IndexErrors and Working with Nested Lists.mp4

30.4 MB

007 [Interactive Coding Exercise] Treasure Map.mp4

82.7 MB

007 Exercise-4.3-Treasure-Map-START-HERE.url

0.1 KB

008 Course-Fixes-Report-an-Issue.url

0.1 KB

008 Day 4 Project Rock Paper Scissors.mp4

116.4 MB

008 Rock-Paper-Scissors-Starter-Code.url

0.1 KB

008 Solution-Rock-Paper-Scissors-Completed-Code.url

0.1 KB

008 The-World-Rock-Paper-Scissors-Association.url

0.0 KB

009 Programming is like going to the Gym.mp4

18.7 MB

external-links.txt

1.8 KB

/.../05 - Day 5 - Beginner - Python Loops/

001 Day 5 Goals what we will make by the end of the day.mp4

27.3 MB

001 Day-5-Goal-Click-Run-to-see-the-final-project.url

0.1 KB

001 Have-I-been-pwned-.url

0.1 KB

002 For-Loop-Practice-Completed-Code.url

0.1 KB

002 Fork-the-Day-5-Starting-Repl.url

0.1 KB

002 Using the for loop with Python Lists.mp4

16.9 MB

003 [Interactive Coding Exercise] Average Height.mp4

48.7 MB

003 Exercise-5.1-Average-Height-START-HERE.url

0.1 KB

004 [Interactive Coding Exercise] High Score.mp4

35.8 MB

004 Exercise-5.2-High-Score-START-HERE.url

0.1 KB

005 for loops and the range() function.mp4

11.8 MB

006 [Interactive Coding Exercise] Adding Even Numbers.mp4

14.7 MB

006 Coding-Exercise-START-HERE.url

0.1 KB

006 Exercise-5.3-Adding-Even-Numbers-START-HERE.url

0.1 KB

007 [Interactive Coding Exercise] The FizzBuzz Job Interview Question.mp4

19.1 MB

007 Day-5-Completed-Code.url

0.1 KB

007 Exercise-5.4-FizzBuzz-START-HERE.url

0.1 KB

008 Course-Fixes-Report-an-Issue.url

0.1 KB

008 Day 5 Project Create a Password Generator.mp4

84.3 MB

008 Password-Generator-Start.url

0.1 KB

008 Solution-Password-Generator-Completed-Code.url

0.1 KB

009 Hard Work and Perseverance beats Raw Talent Every Time.mp4

20.7 MB

external-links.txt

1.2 KB

/.../06 - Day 6 - Beginner - Python Functions & Karel/

001 Day 6 Goals what we will make by the end of the day.mp4

1.7 MB

002 Built-in-Python-Functions.url

0.1 KB

002 Defining and Calling Python Functions.mp4

43.1 MB

002 FAQ-I-Cant-Access-Reborgs-World.url

0.1 KB

002 Fork-the-Day-6-Starting-Repl.url

0.1 KB

002 Reeborgs-World-Start.url

0.2 KB

003 Reeborgs-World-Hurdles-Challenge.url

0.2 KB

003 The Hurdles Loop Challenge.mp4

46.2 MB

004 Indentation in Python.mp4

48.9 MB

004 PEP-8-The-Python-Style-Guide.url

0.1 KB

005 Reeborgs-World-Hurdles-2-Challenge.url

0.2 KB

005 While Loops.mp4

75.3 MB

006 Hurdles Challenge using While Loops.mp4

52.5 MB

006 Reeborgs-World-Hurdles-3-Challenge.url

0.2 KB

007 Jumping over Hurdles with Variable Heights.mp4

30.9 MB

007 Reeborgs-World-Hurdles-4-Challenge.url

0.2 KB

008 Course-Fixes-Report-an-Issue.url

0.1 KB

008 Final Project Escaping the Maze.mp4

96.8 MB

008 Reeborg-World-Tests.zip

3.4 KB

008 Reeborgs-World-Maze-Challenge.url

0.2 KB

009 Why is this so Hard! Can I really do this.mp4

25.4 MB

external-links.txt

1.6 KB

/.../07 - Day 7 - Beginner - Hangman/

001 Day 7 Goals what we will make by the end of the day.mp4

2.5 MB

001 Day-7-Goal-Click-Run-to-see-the-final-project.url

0.1 KB

002 How to break a Complex Problem down into a Flow Chart.mp4

15.1 MB

002 How-the-Hangman-Game-works.url

0.1 KB

002 Play-Hangman-with-Friends-Online.url

0.1 KB

002 Solution-Hangman-Flowchart-1.png

270.5 KB

003 Challenge 1 - Picking a Random Words and Checking Answers.mp4

7.0 MB

003 Challenge-1-Starting-Code.url

0.1 KB

003 Challenge-1-Target-Behaviour.url

0.1 KB

003 Hint-Python-List-Documentation.url

0.1 KB

004 Challenge 1 Solution - How to Check the User's Answer.mp4

50.8 MB

004 Challenge-1-Completed-Code.url

0.1 KB

005 Challenge 2 - Replacing Blanks with Guesses.mp4

12.0 MB

005 Challenge-2-Starting-Code.url

0.1 KB

005 Challenge-2-Target-Behaviour.url

0.1 KB

005 Hint-Python-Lists-and-Range-.url

0.1 KB

006 Challenge 2 Solution - How to Replace the Blanks.mp4

84.4 MB

006 Challenge-2-Completed-Code.url

0.1 KB

007 Challenge 3 - Checking if the Player has Won.mp4

20.9 MB

007 Challenge-3-Starting-Code.url

0.1 KB

007 Challenge-3-Target-Behaviour.url

0.1 KB

008 Challenge 3 Solution - How to Check if the Player Won.mp4

15.1 MB

008 Challenge-3-Completed-Code.url

0.1 KB

009 Amended-Hangman-Flowchart.png

163.8 KB

009 Challenge 4 - Keeping Track of the Player's Lives.mp4

7.9 MB

009 Challenge-4-Starting-Code.url

0.1 KB

009 Challenge-4-Target-Behaviour.url

0.1 KB

010 Challenge 4 Solution - How to Keep Track of the Player's Lives.mp4

47.1 MB

010 Challenge-4-Completed-Code.url

0.1 KB

011 Challenge 5 - Improving the User Experience.mp4

25.6 MB

011 Challenge-5-Starting-Code.url

0.1 KB

011 Challenge-5-Target-Behaviour.url

0.1 KB

011 Hint-Flow-Chart-for-Hangman.url

2.2 KB

011 Hint-Importing-Modules.url

0.1 KB

012 Challenge 5 Solution - How to Add ASCII Art and Improve the UI.mp4

19.0 MB

012 Challenge-5-Completed-Code.url

0.1 KB

012 Course-Fixes-Report-an-Issue.url

0.1 KB

012 Final-Code.url

0.1 KB

013 The Benefits of Daily Practice.mp4

14.5 MB

external-links.txt

4.3 KB

/.../08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/

001 Day 8 Goals what we will make by the end of the day.mp4

9.0 MB

001 Day-8-Goal-Click-Run-to-see-the-final-project.url

0.1 KB

002 Fork-the-Day-8-Starting-Repl.url

0.1 KB

002 Functions with Inputs.mp4

20.8 MB

003 Day-8-Ending-Code.url

0.1 KB

003 Positional vs. Keyword Arguments.mp4

49.2 MB

004 [Interactive Coding Exercise] Paint Area Calculator.mp4

55.9 MB

004 Exercise-1-Paint-Area-Calculator.url

0.1 KB

005 [Interactive Coding Exercise] Prime Number Checker.mp4

51.4 MB

005 Exercise-2-Prime-Numbers.url

0.1 KB

005 Primer-on-Prime-Numbers.url

0.1 KB

006 Caesar Cipher Part 1 - Encryption.mp4

138.5 MB

006 Caesar-Cipher-1-End.url

0.1 KB

006 Caesar-Cipher-1-Start.url

0.1 KB

006 Python-List-index-Method.url

0.1 KB

007 Caesar Cipher Part 2 - Decryption.mp4

56.7 MB

007 Caesar-Cipher-2-End.url

0.1 KB

007 Caesar-Cipher-2-Start.url

0.1 KB

008 Caesar Cipher Part 3 - Reorganising our Code.mp4

90.1 MB

008 Caesar-Cipher-3-End.url

0.1 KB

008 Caesar-Cipher-3-Start.url

0.1 KB

009 Caesar Cipher Part 4 - User Experience Improvements & Final Touches.mp4

125.8 MB

009 Caesar-Cipher-4-End.url

0.1 KB

009 Caesar-Cipher-4-Start.url

0.1 KB

009 Course-Fixes-Report-an-Issue.url

0.1 KB

010 How You Can Stay Motivated.mp4

13.1 MB

external-links.txt

1.3 KB

/.../09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/

001 Day 9 Goals what we will make by the end of the day.mp4

3.7 MB

001 Day-9-Goal-Click-Run-to-see-the-final-project.url

0.1 KB

002 Fork-the-Day-9-Starting-Repl.url

0.1 KB

002 The Python Dictionary Deep Dive.mp4

50.6 MB

003 [Interactive Coding Exercise] Grading Program.mp4

35.0 MB

003 Exercise-1-Grading-Program.url

0.1 KB

004 Day-9-Ending-Code.url

0.1 KB

004 Nesting Lists and Dictionaries.mp4

29.9 MB

005 [Interactive Coding Exercise] Dictionary in List.mp4

45.1 MB

005 Exercise-2-Dictionary-in-List.url

0.1 KB

006 Hint-Flowchart-of-Secret-Auction.url

1.6 KB

006 Press-Run-to-see-the-final-project.url

0.1 KB

006 Secret-Auction-Starting-Code.url

0.1 KB

006 The Secret Auction Program Instructions and Flow Chart.mp4

13.4 MB

007 Course-Fixes-Report-an-Issue.url

0.1 KB

007 Solution and Complete Code for the Secret Auction Program.mp4

133.9 MB

007 Solution-Secret-Auction-Completed-Code.url

0.1 KB

007 Step-Through-Execution-with-Python-Tutor.url

0.1 KB

008 Motivation and the Accountability Trick.mp4

12.4 MB

external-links.txt

2.5 KB

/.../10 - Day 10 - Beginner - Functions with Outputs/

001 Day 10 Goals what we will make by the end of the day.mp4

4.1 MB

001 Day-10-Goal-Click-Run-to-see-the-final-project.url

0.1 KB

002 Fork-the-Day-10-Starting-Repl.url

0.1 KB

002 Functions with Outputs.mp4

68.0 MB

002 How-to-Convert-Strings-to-Title-Case.url

0.1 KB

003 Completed-Example-Code-for-Day-10.url

0.1 KB

003 Multiple return values.mp4

8.9 MB

004 [Interactive Coding Exercise] Days in Month.mp4

42.8 MB

004 Exercise-1-Days-in-Month.url

0.1 KB

005 Docstrings.mp4

9.6 MB

006 Calculator Part 1 Combining Dictionaries and Functions.mp4

25.6 MB

006 Starting-Code-for-the-Calculator-on-Repl.it.url

0.1 KB

007 Debugging-Solution.url

0.1 KB

007 Print vs. Return.mp4

19.2 MB

008 While Loops, Flags and Recursion.mp4

69.1 MB

009 Calculator Finishing Touches and Bug Fixes.mp4

13.3 MB

009 Course-Fixes-Report-an-Issue.url

0.1 KB

009 Solution-Calculator-Completed-Code.url

0.1 KB

010 How to Get a Good Night's Sleep.mp4

18.4 MB

external-links.txt

0.9 KB

/.../11 - Day 11 - Beginner - The Blackjack Capstone Project/

001 Day 11 Goals what we will make by the end of the day.mp4

9.2 MB

001 Day-11-Goal-Click-Run-to-see-the-final-project.url

0.1 KB

001 Try-out-an-online-Blackjack-game.url

0.1 KB

002 Blackjack Program Requirements and Game Rules.mp4

66.9 MB

002 Fork-the-Day-11-Starting-Repl.url

0.1 KB

003 Hint 4 & 5 Solution Walkthrough.mp4

33.6 MB

004 Hint 6-8 Solution Walkthrough.mp4

36.4 MB

004 Python-list-methods.url

0.1 KB

004 Python-sum-Function.url

0.1 KB

005 Hint 9 Solution Walkthrough Refactoring and calling calculate_score().mp4

20.0 MB

006 Hint 10-12 Solution Walkthrough.mp4

61.0 MB

007 Blackjack-Completed-Code.url

0.1 KB

007 Course-Fixes-Report-an-Issue.url

0.1 KB

007 Hint 13 Solution Walkthrough.mp4

33.2 MB

008 A Solid Foundation goes a Long Way.mp4

19.9 MB

external-links.txt

0.6 KB

/.../12 - Day 12 - Beginner - Scope & Number Guessing Game/

001 Fork-the-Day-12-Starting-Repl.url

0.1 KB

001 Namespaces Local vs. Global Scope.mp4

39.0 MB

002 Does Python Have Block Scope.mp4

5.4 MB

002 Fork-the-Day-12-Starting-Repl.url

0.1 KB

003 How to Modify a Global Variable.mp4

9.7 MB

004 Day-12-Ending-Code.url

0.1 KB

004 Python Constants and Global Scope.mp4

4.1 MB

005 Day-12-Goal-Click-Run-to-see-the-final-project.url

0.1 KB

005 Get-your-own-ASCII-Text-from-Patorjk.url

0.1 KB

005 Introducing the Final Project The Number Guessing Game.mp4

11.6 MB

005 Starting-Repl-for-the-Number-Guessing-Game.url

0.1 KB

006 Course-Fixes-Report-an-Issue.url

0.1 KB

006 Solution & Walkthrough to the Number Guessing Game.mp4

136.7 MB

006 Solution-Guess-the-Number-Completed-Code.url

0.1 KB

006 Using-Python-Tutor-to-Step-Through-your-Code.url

0.1 KB

007 Don't be too hard on yourself.mp4

13.3 MB

external-links.txt

0.9 KB

/.../13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/

001 Describe the Problem.mp4

15.5 MB

001 Fork-the-Day-13-Starting-Repl.url

0.1 KB

002 Reproduce the Bug.mp4

12.0 MB

003 Play Computer and Evaluate Each Line.mp4

10.7 MB

004 Fixing Errors and Watching for Red Underlines.mp4

19.3 MB

005 Squash bugs with a print() Statement.mp4

14.6 MB

006 Bringing out the BIG Gun Using a Debugger.mp4

26.1 MB

006 Debug-your-code-online-with-Python-Tutor.url

0.1 KB

007 Day-13-Ending-Code.url

0.1 KB

007 Final Debugging Tips.mp4

24.5 MB

007 Search-Stack-Overflow-for-Errors.url

0.1 KB

008 [Interactive Coding Exercise] Debugging Odd or Even.mp4

6.7 MB

008 Exercise-1-Debugging-Odd-or-Even.url

0.1 KB

009 [Interactive Coding Exercise] Debugging Leap Year.mp4

9.0 MB

009 Exercise-2-Debugging-Leap-Year.url

0.1 KB

010 [Interactive Coding Exercise] Debugging FizzBuzz.mp4

27.6 MB

010 Course-Fixes-Report-an-Issue.url

0.1 KB

010 Exercise-3-Debugging-FizzBuzz.url

0.1 KB

011 Building Confidence.mp4

18.1 MB

external-links.txt

0.7 KB

/.../14 - Day 14 - Beginner - Higher Lower Game Project/

001 Day-14-Goal-Click-Run-to-see-the-final-project.url

0.1 KB

001 Fork-the-Day-14-Starting-Repl.url

0.1 KB

001 Introduction & Program Requirements for the Higher Lower Game.mp4

37.9 MB

001 Try-out-the-Online-Higher-Lower-Game.url

0.1 KB

002 Course-Fixes-Report-an-Issue.url

0.1 KB

002 Day-14-Ending-Code.url

0.1 KB

002 Solution & Walkthrough of the Higher Lower Game.mp4

282.9 MB

003 Study Tip Set Reminders in Your Calendar to Review.mp4

19.7 MB

external-links.txt

0.4 KB

/.../15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/

001 Installing Python Locally on Your Computer.mp4

26.8 MB

001 Step-1-Install-Python-3-on-your-Machine.url

0.1 KB

002 Download PyCharm for Windows or Mac.mp4

5.2 MB

002 Step-2-Download-Install-Pycharm.url

0.1 KB

003 PyCharm's Charming Features (while you wait for the download to finish).mp4

70.0 MB

003 Python-PEP8-Style-Guide.url

0.1 KB

004 How to Install PyCharm on Windows.mp4

12.6 MB

005 Installing PyCharm on Mac.mp4

9.3 MB

006 Add-a-Coffee-Emoji-from-Emojipedia.org.url

0.1 KB

006 Coffee-Machine-Program-Requirements.pdf

70.2 KB

006 Day-15-Goal-Press-Play-button-bottom-right-.url

0.1 KB

006 Fork-the-Day-15-Starting-Repl.url

0.1 KB

006 How-to-bring-up-the-Emoji-Keyboard-on-Mac.url

0.1 KB

006 How-to-bring-up-the-Emoji-Keyboard-on-Windows-10.url

0.1 KB

006 Introduction & Requirements for the Coffee Machine Project.mp4

53.2 MB

006 PyCharm-Keyboard-Shortcuts.url

0.1 KB

007 Course-Fixes-Report-an-Issue.url

0.1 KB

007 Day-15-Ending-Code.url

0.1 KB

007 Solution & Walkthrough for the Coffee Machine Code.mp4

225.3 MB

008 Location, Location, Location - Pavlov's Coding Corner.mp4

20.4 MB

external-links.txt

1.1 KB

/.../16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/

001 Why do we need OOP and how does it work.mp4

41.3 MB

002 How to use OOP Classes and Objects.mp4

6.9 MB

003 Constructing Objects and Accessing their Attributes and Methods.mp4

75.8 MB

003 Turtle-Colours-cs111.wellesley.edu-.url

0.1 KB

003 Turtle-Graphics-Documentation.url

0.1 KB

004 How to Add Python Packages and use PyPi.mp4

39.4 MB

004 Pokemon-Pokedex.url

0.1 KB

004 PrettyTable-Package-Documentation.url

0.1 KB

004 PrettyTable-Package.url

0.1 KB

004 Python-Package-Index.url

0.0 KB

005 Practice Modifying Object Attributes and Calling Methods.mp4

48.1 MB

006 Building the Coffee Machine in OOP.mp4

50.4 MB

006 Coffee-Machine-Classes-Documentation.pdf

77.4 KB

006 Coffee-Machine-Program-Requirements.pdf

69.2 KB

006 OOP-Coffee-Machine-Project-Starting-Code.url

0.1 KB

006 oop-coffee-machine-start.zip

2.1 KB

006 Steve-Jobs-on-Object-Oriented-Programming.url

0.1 KB

007 Course-Fixes-Report-an-Issue.url

0.1 KB

007 OOP-Coffee-Machine-Project-Final-Code.url

0.1 KB

007 Walkthrough and Solution for the OOP Coffee Machine.mp4

38.9 MB

008 Don't forget to review occasionally.mp4

16.9 MB

external-links.txt

0.9 KB

/.../17 - Day 17 - Intermediate - The Quiz Project & the Benefits of OOP/

001 Day 17 Goals what we will make by the end of the day.mp4

2.5 MB

001 Day-17-Goal-Click-Run-to-see-the-final-project.url

0.1 KB

002 How to create your own Class in Python.mp4

9.8 MB

003 Working with Attributes, Class Constructors and the __init__() Function.mp4

23.9 MB

004 Adding Methods to a Class.mp4

23.8 MB

005 Download-or-Fork-the-Quiz-Game-Starting-Code.url

0.1 KB

005 Quiz Project Part 1 Creating the Question Class.mp4

17.3 MB

005 quiz-game-start.zip

1.0 KB

006 Quiz Project Part 2 Creating the List of Question Objects from the Data.mp4

47.2 MB

007 Quiz Project Part 3 The QuizBrain and the next_question() Method.mp4

43.3 MB

008 Quiz Project Part 4 How to continue showing new Questions.mp4

26.8 MB

009 Quiz Project Part 5 Checking Answers and Keeping Score.mp4

30.7 MB

010 Course-Fixes-Report-an-Issue.url

0.1 KB

010 Open-Trivia-Database.url

0.0 KB

010 Quiz-Project-Final-Code.url

0.1 KB

010 The Benefits of OOP Use Open Trivia DB to Get New Questions.mp4

37.7 MB

011 Run for that Bus!.mp4

23.8 MB

external-links.txt

0.4 KB

/.../18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/

001 Day 18 Goals what we will make by the end of the day.mp4

2.4 MB

002 Trinket-Turtle-Colours.url

0.1 KB

002 Turtle-Colours.url

0.1 KB

002 Turtle-Graphics-Documentation.url

0.1 KB

002 Understanding Turtle Graphics and How to use the Documentation.mp4

88.5 MB

003 Challenge-1-Draw-a-Square-Starting-Code.url

0.1 KB

003 Solution-to-Challenge-1.url

0.1 KB

003 Turtle Challenge 1 - Draw a Square.mp4

5.8 MB

004 Importing Modules, Installing Packages, and Working with Aliases.mp4

40.9 MB

005 Challenge-2-Draw-a-Dashed-Line-Starting-Code.url

0.1 KB

005 Solution-to-Challenge-2.url

0.1 KB

005 Turtle Challenge 2 - Draw a Dashed Line.mp4

20.3 MB

006 Challenge-3-Drawing-Different-Shapes-Starting-Code.url

0.1 KB

006 Solution-to-Challenge-3.url

0.1 KB

006 Turtle Challenge 3 - Drawing Different Shapes.mp4

33.5 MB

007 Challenge-4-Generate-a-Random-Walk-Starting-Code.url

0.1 KB

007 Solution-to-Challenge-4.url

0.1 KB

007 Turtle Challenge 4 - Generate a Random Walk.mp4

47.5 MB

007 What-is-a-Random-Walk-.url

0.1 KB

008 Python Tuples and How to Generate Random RGB Colours.mp4

47.7 MB

008 RGB-Tool-from-W3Schools.url

0.1 KB

009 Challenge-5-Create-a-Spirograph-Starting-Code.url

0.1 KB

009 Solution-to-Challenge-5-Day-18-Ending-Code-.url

0.1 KB

009 Turtle Challenge 5 - Draw a Spirograph.mp4

64.4 MB

010 Colorgram-Package.url

0.1 KB

010 hirst-painting-start.zip

19.5 KB

010 The Hirst Painting Project Part 1 - How to Extract RGB Values from Images.mp4

91.2 MB

011 Course-Fixes-Report-an-Issue.url

0.1 KB

011 Hirst-Painting-Project-Final-Code.url

0.1 KB

011 The Hirst Painting Project Part 2 - Drawing the Dots.mp4

79.7 MB

012 Space out your study sessions and stay consistent.mp4

28.2 MB

external-links.txt

1.5 KB

/.../19 - Day 19 - Intermediate - Instances, State and Higher Order Functions/

001 Day 19 Goals what we will make by the end of the day.mp4

6.3 MB

002 Python Higher Order Functions & Event Listeners.mp4

29.4 MB

002 The-listen-method.url

0.1 KB

003 Challenge Make an Etch-A-Sketch App.mp4

18.5 MB

003 etch-a-sketch-start.zip

0.3 KB

003 Solution-etch-a-sketch-final.zip

0.4 KB

004 Object State and Instances.mp4

5.3 MB

005 turtle-race-start.zip

0.2 KB

005 Turtle.textinput-documentation.url

0.1 KB

005 Understanding the Turtle Coordinate System.mp4

73.2 MB

006 Aaaand, we're off to the races!.mp4

63.5 MB

006 Course-Fixes-Report-an-Issue.url

0.1 KB

006 Solution-turtle-race-final.zip

0.7 KB

007 Expand on the Solutions.mp4

31.4 MB

external-links.txt

0.3 KB

/.../20 - Day 20 - Intermediate - Build the Snake Game Part 1 Animation & Coordinates/

001 Day 20 Goals what we will make by the end of the day.mp4

16.2 MB

002 Screen Setup and Creating a Snake Body.mp4

22.3 MB

003 Animating the Snake Segments on Screen.mp4

82.6 MB

003 The-tracer-method.url

0.1 KB

004 Create a Snake Class & Move to OOP.mp4

25.8 MB

005 Course-Fixes-Report-an-Issue.url

0.1 KB

005 How to Control the Snake with a Keypress.mp4

41.2 MB

005 snake-game-part-1-final.zip

0.9 KB

006 Programming is not Memorising.mp4

52.7 MB

external-links.txt

0.2 KB

/.../21 - Day 21 - Intermediate - Build the Snake Game Part 2 Inheritance & List Slicing/

001 Day 21 Goals what we will make by the end of the day.mp4

5.0 MB

002 Class Inheritance.mp4

41.7 MB

002 Inheritance-Repl.it-Example-Code.url

0.1 KB

003 Detect Collisions with Food.mp4

53.9 MB

003 The-shape-and-shapesize-methods.url

0.1 KB

004 Create a Scoreboard and Keep Score.mp4

50.2 MB

004 The-write-method.url

0.1 KB

005 Detect Collisions with the Wall.mp4

12.4 MB

006 Detect Collisions with your own Tail.mp4

21.2 MB

007 Course-Fixes-Report-an-Issue.url

0.1 KB

007 How to Slice Lists & Tuples in Python.mp4

21.4 MB

007 Piano-Keys-List-Slicing-Repl.it.url

0.1 KB

007 snake-game-part-2-final.zip

1.9 KB

008 Stay motivated by remembering the reason you signed up.mp4

19.8 MB

external-links.txt

0.4 KB

/.../22 - Day 22 - Intermediate - Build Pong The Famous Arcade Game/

001 Day 22 Goals what you will make by the end of the day.mp4

7.6 MB

002 Set up the Main Screen.mp4

4.6 MB

003 Create a Paddle that responds to Key Presses.mp4

32.8 MB

004 Write the Paddle Class and Create the Second Paddle.mp4

24.5 MB

005 Write the Ball Class and Make the Ball Move.mp4

13.3 MB

006 Add the Ball Bouncing Logic.mp4

19.5 MB

007 How to Detect Collisions with the Paddle.mp4

14.2 MB

008 How to Detect when the Ball goes Out of Bounds.mp4

17.8 MB

009 Course-Fixes-Report-an-Issue.url

0.1 KB

009 Score Keeping and Changing the Ball Speed.mp4

36.3 MB

009 Solution-pong-game-final.zip

1.6 KB

010 Picturing fears even the worst-case scenario is not so scary.mp4

30.3 MB

external-links.txt

0.1 KB

/.../23 - Day 23 - Intermediate - The Turtle Crossing Capstone Project/

001 Day 23 Goals what you will make by the end of the day.mp4

5.0 MB

002 Choose Your Difficulty.html

1.2 KB

002 turtle-crossing-start.zip

0.9 KB

003 How to use the Starter Code.mp4

10.3 MB

004 Step 1 - Check out how the game play works.html

0.8 KB

005 Step 2 - Break down the Problem.html

2.4 KB

006 Solution to Step 3 - Create the Player Behaviour.mp4

10.9 MB

007 Solution to Step 4 - Create the Car Behaviour.mp4

28.0 MB

008 Solution to Step 5 - Detect when the Turtle collides with a Car squish.mp4

5.9 MB

009 Solution to Step 6 - Detect when the Player has reached the other side.mp4

14.8 MB

010 Course-Fixes-Report-an-Issue.url

0.1 KB

010 Solution to Step 7 - Add the Scoreboard and Game Over sequence.mp4

23.9 MB

010 Solution-turtle-crossing-final.zip

1.8 KB

011 This course is not about typing out code.mp4

31.1 MB

external-links.txt

0.1 KB

/.../24 - Day 24 - Intermediate - Files, Directories and Paths/

001 Day 24 Goals what you will make by the end of the day.mp4

9.3 MB

002 Add a High Score to the Snake Game.mp4

34.5 MB

002 Snake-Project-Code-from-Day-21.zip

1.9 KB

003 How to Open, Read, and Write to Files using the with Keyword.mp4

33.6 MB

003 The-open-method.url

0.1 KB

004 Challenge Read and Write the High Score to a File in Snake.mp4

22.1 MB

004 Solution-snake-game-high-score-final.zip

2.1 KB

005 Day-24-Ending-Code.url

0.1 KB

005 Understand Relative and Absolute File Paths.mp4

70.4 MB

006 Hint-1.url

0.1 KB

006 Hint-2.url

0.1 KB

006 Hint-3.url

0.1 KB

006 Introducing the Mail Merge Challenge.mp4

17.8 MB

006 Mail-Merge-Project-Start.zip

9.1 KB

007 Course-Fixes-Report-an-Issue.url

0.1 KB

007 Mail-Merge-Project-Completed.zip

15.1 KB

007 Solution & Walkthrough for the Mail Merge Project.mp4

61.6 MB

008 What's the correct solution What's the best answer What's the right way.mp4

35.2 MB

external-links.txt

0.5 KB

/.../25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/

001 Day 25 Goals what we will make by the end of the day.mp4

11.8 MB

002 Fork-the-Day-25-Starting-Repl.url

0.1 KB

002 Pandas-API-Reference.url

0.1 KB

002 Pandas-Documentation.url

0.1 KB

002 Reading CSV Data in Python.mp4

68.1 MB

002 weather-data.csv

0.1 KB

003 DataFrames & Series Working with Rows & Columns.mp4

95.9 MB

004 2018-Central-Park-Squirrel-Census-Squirrel-Data.csv

747.8 KB

004 Central-Park-Squirrel-Census-Data.url

0.1 KB

004 Day-25-End-Code.url

0.1 KB

004 The Great Squirrel Census Data Analysis (with Pandas!).mp4

93.4 MB

005 Sporcles-Name-the-States-Game.url

0.1 KB

005 U.S. States Game Part 1 Setup.mp4

61.1 MB

005 us-states-game-start.zip

44.1 KB

006 U.S. States Game Part 2 Challenge with .csv.mp4

120.7 MB

007 Course-Fixes-Report-an-Issue.url

0.1 KB

007 Solution-us-states-game-end.zip

45.0 KB

007 U.S. States Game Part 3 Saving Data to .csv.mp4

21.0 MB

external-links.txt

0.6 KB

/.../26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/

001 Day 26 Goals what you will make by the end of the day.mp4

2.3 MB

002 How to Create Lists using List Comprehension.mp4

72.2 MB

003 [Interactive Coding Exercise] Squaring Numbers.mp4

10.0 MB

003 Exercise-1-Squaring-Numbers.url

0.1 KB

004 [Interactive Coding Exercise] Filtering Even Numbers.mp4

7.9 MB

004 Exercise-2-Filtering-Even-Numbers.url

0.1 KB

005 [Interactive Coding Exercise] Data Overlap.mp4

17.3 MB

005 Exercise-3-Data-Overlap.url

0.1 KB

006 Apply List Comprehension to the U.S. States Game.mp4

8.3 MB

007 How to use Dictionary Comprehension.mp4

30.1 MB

008 [Interactive Coding Exercise] Dictionary Comprehension 1.mp4

16.1 MB

008 Exercise-4-Dictionary-Comprehension-1.url

0.1 KB

009 [Interactive Coding Exercise] Dictionary Comprehension 2.mp4

11.7 MB

009 Exercise-5-Dictionary-Comprehension-2.url

0.1 KB

010 Day-26-End-Code.url

0.1 KB

010 How to Iterate over a Pandas DataFrame.mp4

25.9 MB

011 Introducing the NATO Alphabet Project.mp4

16.9 MB

011 NATO-alphabet-start.zip

0.9 KB

012 Course-Fixes-Report-an-Issue.url

0.1 KB

012 Solution & Walkthrough for the NATO Alphabet Project.mp4

21.6 MB

012 Solution-NATO-alphabet-end.zip

0.8 KB

external-links.txt

0.7 KB

/.../27 - Day 27 - Intermediate - Tkinter, args, kwargs and Creating GUI Programs/

001 Day 27 Goals what we will make by the end of the day.mp4

11.4 MB

002 History of GUI and Introduction to Tkinter.mp4

27.5 MB

003 Creating Windows and Labels with Tkinter.mp4

43.7 MB

003 Python-Docs-The-Packer.url

0.1 KB

003 TCL-tk-Docs-pack-.url

0.1 KB

004 Setting Default Values for Optional Arguments inside a Function Header.mp4

33.1 MB

005 args Many Positional Arguments.mp4

15.2 MB

006 kwargs Many Keyword Arguments.mp4

52.4 MB

006 Playground.py-Completed-Code.url

0.1 KB

007 Buttons, Entry, and Setting Component Options.mp4

60.9 MB

007 TCL-tk-Docs-Entry-.url

0.1 KB

008 Other Tkinter Widgets Radiobuttons, Scales, Checkbuttons and more.mp4

30.0 MB

008 Tkinter-Widget-Example-Code-Palette.url

0.1 KB

009 Day-27-End-Code.url

0.1 KB

009 Tkinter Layout Managers pack(), place() and grid().mp4

37.8 MB

010 Course-Fixes-Report-an-Issue.url

0.1 KB

010 Mile to Kilometers Converter Project.mp4

76.5 MB

external-links.txt

0.5 KB

/.../28 - Day 28 - Intermediate - Tkinter, Dynamic Typing and the Pomodoro GUI Application/

001 Day 28 Goals what we will make by the end of the day.mp4

5.0 MB

002 How to work with the Canvas Widget and Add Images to Tkinter.mp4

74.8 MB

002 pomodoro-start.zip

10.6 KB

002 Use-Color-Hunt-to-Choose-a-Nice-Colour.url

0.0 KB

003 Challenge - Complete the Application's User Interface (UI).mp4

53.7 MB

004 Add a Count Down Mechanism.mp4

71.5 MB

004 TCL-tk-Docs-after-.url

0.1 KB

005 Dynamic Typing Explained.mp4

37.8 MB

005 Python-as-a-Strongly-and-Dynamically-Typed-Programming-Language.url

0.1 KB

006 Setting Different Timer Sessions and Values.mp4

27.4 MB

007 Adding Checkmarks and Resetting the Application.mp4

39.5 MB

007 Course-Fixes-Report-an-Issue.url

0.1 KB

007 Solution-pomodoro-end.zip

13.6 KB

external-links.txt

0.4 KB

/.../29 - Day 29 - Intermediate - Building a Password Manager GUI App with Tkinter/

001 Day 29 Goals what we will make by the end of the day.mp4

19.9 MB

002 Canvas-Documentation-on-tkdocs.com.url

0.1 KB

002 Challenge 1 - Working with Images and Setting up the Canvas.mp4

26.1 MB

002 password-manager-start.zip

14.2 KB

003 Challenge 2 - Use grid() and columnspan to Complete the User Interface.mp4

13.1 MB

003 Tkinter-Grid-columnspan-Demo-Repl.url

0.1 KB

004 Solution to the Creating the Grid Layout.mp4

27.2 MB

005 Challenge 3 - Saving Data to File.mp4

73.6 MB

005 Entry-Widget-Docs-on-tkdocs.com.url

0.1 KB

005 w3schools-Python-Writing-to-File-Documentation.url

0.1 KB

006 Dialog Boxes and Pop-Ups in Tkinter.mp4

39.2 MB

007 Course-Fixes-Report-an-Issue.url

0.1 KB

007 Day-5-Password-Generator-Project-Code.zip

0.5 KB

007 Generate a Password & Copy it to the Clipboard.mp4

77.0 MB

007 Pyperclip-documentation-on-PyPi.url

0.1 KB

007 Solution-password-manager-end.zip

16.0 KB

007 w3schools-Python-join-method-Documentation.url

0.1 KB

external-links.txt

0.6 KB

/.../30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/

001 Day 30 Goals what you will make by the end of the day.mp4

4.1 MB

002 Catching Exceptions The try catch except finally Pattern.mp4

50.1 MB

003 Completed-Day-30-Practice-Code.url

0.1 KB

003 Raising your own Exceptions.mp4

13.7 MB

004 [Interactive Coding Exercise] IndexError Handling.mp4

10.4 MB

004 Exercise-1-IndexError-Handling.url

0.1 KB

005 [Interactive Coding Exercise] KeyError Handling.mp4

11.4 MB

005 Exercise-2-KeyError-Handling.url

0.1 KB

006 Code Exercise Exception Handling in the NATO Phonetic Alphabet Project.mp4

27.6 MB

006 NATO-Phonetic-Alphabet-for-the-Code-Exercise.zip

3.9 KB

006 Solution-NATO-alphabet-improved-end.zip

3.9 KB

007 Password-Manager-End-of-Day-29.zip

16.0 KB

007 Python-JSON-Module-Documentation.url

0.1 KB

007 Write, read and update JSON data in the Password Manager.mp4

55.0 MB

008 Challenge 1 - Handling Exceptions in the Password Manager.mp4

24.5 MB

009 Challenge 2 - Search for a Website in the Password Manager.mp4

131.8 MB

009 Course-Fixes-Report-an-Issue.url

0.1 KB

009 Solution-password-manager-improved-end.zip

16.3 KB

external-links.txt

0.5 KB

/.../31 - Day 31 - Intermediate - Flash Card App Capstone Project/

001 2018-Frequency-Lists-from-Hermit-Dave.url

0.1 KB

001 Day 31 Goals what you will make by the end of the day.mp4

76.6 MB

001 flash-card-project-start.zip

47.0 KB

001 Google-Sheets.url

0.1 KB

001 Google-Translate-for-Google-Sheets.url

0.1 KB

001 Google-Translate-Language-Codes.url

0.1 KB

001 Open-Subtitles.url

0.1 KB

001 Wiktionary-Frequency-Lists.url

0.1 KB

002 Step 1 - Create the User Interface (UI) with Tkinter.html

1.2 KB

003 Solution & Walkthrough for Creating the UI.mp4

46.7 MB

004 Step 2 - Create New Flash Cards.html

1.1 KB

005 Solution & Walkthrough for Creating New Flash Cards.mp4

67.6 MB

006 Step 3 - Flip the Cards!.html

2.1 KB

007 Solution & Walkthrough for Flipping Cards.mp4

73.7 MB

008 Step 4 - Save Your Progress.html

2.0 KB

009 Course-Fixes-Report-an-Issue.url

0.1 KB

009 Solution & Walkthrough for Saving Progress.mp4

63.7 MB

009 Solution-flash-card-project-end.zip

47.8 KB

external-links.txt

0.6 KB

/.../32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/

001 Day 32 Goals what we will make by the end of the day.mp4

5.5 MB

002 A Note About the Next Lesson Google SMTP Port.html

1.3 KB

003 Birthday-Wisher-Day-32-start.zip

6.3 KB

003 How to Send Emails with Python using SMTP.mp4

104.3 MB

003 Python-smtplib-Documentation.url

0.1 KB

004 Python-datetime-Documentation.url

0.1 KB

004 Working with the datetime Module.mp4

18.9 MB

005 101-Monday-Motivational-Quotes-from-the-Positivity-Blog.url

0.1 KB

005 Challenge 1 - Send Motivational Quotes on Mondays via Email.mp4

63.8 MB

005 Day-32-Ending-Code.url

0.1 KB

006 Automated Birthday Wisher Project Challenge.mp4

25.0 MB

006 birthday-wisher-extrahard-start.zip

1.2 KB

006 birthday-wisher-hard-start.zip

1.5 KB

006 birthday-wisher-normal-start.zip

2.0 KB

007 Solution & Walkthrough for the Automated Birthday Wisher.mp4

156.8 MB

007 Solution-birthday-wisher-end.zip

1.7 KB

008 Course-Fixes-Report-an-Issue.url

0.1 KB

008 Host-your-Code-in-the-Cloud-with-pythonanywhere.url

0.1 KB

008 Run Your Python Code in the Cloud!.mp4

48.4 MB

external-links.txt

0.5 KB

/.../33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/

001 Day 33 Goals what you will make by the end of the day.mp4

14.1 MB

001 What-is-the-ISS-.url

0.1 KB

002 Application-Programming-Interface-Wikipedia-Entry.url

0.1 KB

002 What are Application Programming Interfaces (APIs).mp4

19.6 MB

003 API Endpoints and Making API Calls.mp4

35.5 MB

003 ISS-Current-Location-API-Documentation.url

0.1 KB

003 JSON-Viewer-Extension.url

0.1 KB

003 or-just-use-Firefox-to-view-JSON-.url

0.1 KB

004 HTTP-Status-Codes.url

0.0 KB

004 Latitude-and-Longitude-to-Address-Tool.url

0.1 KB

004 Python-Requests-Module-Documentation.url

0.1 KB

004 Working with Responses HTTP Codes, Exceptions & JSON Data.mp4

46.6 MB

005 Challenge - Build a Kanye Quotes App using the Kanye Rest API.mp4

20.9 MB

005 Kanye-Quotes-API.url

0.0 KB

005 kanye-quotes-start.zip

46.6 KB

005 Solution-kanye-quotes-end.zip

46.7 KB

006 Sunrise-and-Sunset-Times-API.url

0.1 KB

006 Understand API Parameters Match Sunset Times with the Current Time.mp4

86.7 MB

006 w3schools-Python-split-method-Documentation.url

0.1 KB

007 Course-Fixes-Report-an-Issue.url

0.1 KB

007 Find-Your-Current-Latitude-and-Longitude-Tool.url

0.0 KB

007 ISS Overhead Notifier Project - Challenge & Solution.mp4

81.9 MB

007 issoverhead-start.zip

0.7 KB

007 Solution-issoverhead-end.zip

0.8 KB

external-links.txt

1.1 KB

/.../34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/

001 Day 34 Goals what you will make by the end of the day.mp4

19.5 MB

001 The-Open-Trivia-Database.url

0.0 KB

002 quizzler-app-start.zip

7.6 KB

002 Trivia Question API Challenge.mp4

40.8 MB

003 Solution & Walkthrough for getting Trivia Questions.mp4

14.0 MB

004 Documentation-on-HTML-Entities.url

0.1 KB

004 FreeFormatter-HTML-Unescape-Tool.url

0.1 KB

004 StackOverflow-Answer-on-Unescaping-HTML-Entities-in-Python.url

0.1 KB

004 Unescaping HTML Entities.mp4

18.1 MB

005 Class based Tkinter UI.mp4

40.3 MB

006 How-to-Get-TKinter-Canvas-Text-to-Wrap.url

0.2 KB

006 Python Typing & Showing the Next Question in the GUI.mp4

33.4 MB

007 Python Typing Type Hints and Arrows -.mp4

11.8 MB

007 Type-Hints-demo-Day-34-end.zip

0.3 KB

008 Check the Answer.mp4

17.2 MB

009 Course-Fixes-Report-an-Issue.url

0.1 KB

009 Give Feedback to the Player, Keep Score and Fix the Bugs =).mp4

39.7 MB

009 How-to-Disable-Tkinter-Buttons.url

0.2 KB

009 Solution-quizzler-app-end.zip

7.8 KB

external-links.txt

0.9 KB

/.../35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/

001 Day 35 Goals what you will make by the end of the day.mp4

9.0 MB

002 Create-a-free-account-on-OpenWeatherMap.url

0.1 KB

002 What is API Authentication and Why Do We Need to Authenticate Ourselves.mp4

35.6 MB

003 Find-Your-Latitude-longitude.url

0.0 KB

003 Link-to-Your-OpenWeatherMap-API-Key-req.login.url

0.1 KB

003 Online-JSON-Viewer.url

0.1 KB

003 OpenWeatherMap-Current-Weather-API-Documentation.url

0.1 KB

003 OpenWeatherMap-OneCall-Api-Documentation.url

0.1 KB

003 Using API Keys to Authenticate and Get the Weather from OpenWeatherMap.mp4

101.6 MB

004 Challenge - Check if it Will Rain in the Next 12 Hours.mp4

148.7 MB

004 Find-a-Place-thats-raining-using-Ventusky.url

0.0 KB

004 OpenWeatherMap-Condition-IDs-and-Condition-Codes.url

0.1 KB

004 Python-Slice-Function.url

0.1 KB

004 Python-Slice-Operator-with-Square-Brackets.url

0.1 KB

005 Sending SMS via the Twilio API.mp4

91.0 MB

005 Signup-for-Twilio.url

0.1 KB

005 Twilio-SMS-Quickstart-Documentation-for-Python.url

0.1 KB

006 How-to-Get-Twilio-to-Work-on-PythonAnywhere-Free-Accounts.url

0.1 KB

006 PythonAnywhere.url

0.1 KB

006 Use PythonAnywhere to Automate the Python Script.mp4

64.6 MB

007 Course-Fixes-Report-an-Issue.url

0.1 KB

007 Environment-Variables-Wikipedia-Entry.url

0.1 KB

007 Other-APIs-to-Explore.url

0.0 KB

007 Solution-rain-alert-end.zip

0.9 KB

007 Understanding Environment Variables and Hiding API Keys.mp4

78.0 MB

external-links.txt

1.5 KB

/.../36 - Day 36 - Intermediate+ Stock Trading News Alert Project/

001 Day 36 Goals what you will make by the end of the day.mp4

65.3 MB

001 TSLA-Stock-Price.url

0.1 KB

002 Choose Your Destiny!.html

0.4 KB

002 News-API.url

0.0 KB

002 stock-news-extrahard-start.zip

3.2 KB

002 stock-news-hard-start.zip

3.4 KB

002 stock-news-normal-start.zip

1.3 KB

002 Stock-Price-API.url

0.1 KB

002 Twilio-API.url

0.0 KB

003 Solution & Walkthrough for Step 1 - Check for Stock Price Movements.mp4

122.9 MB

004 Solution & Walkthrough for Step 2 - Get the News Articles.mp4

68.6 MB

005 Course-Fixes-Report-an-Issue.url

0.1 KB

005 Solution & Walkthrough for Step 3 - Send the SMS Messages.mp4

89.3 MB

005 Solution-stock-news-end.zip

1.6 KB

external-links.txt

0.3 KB

/.../37 - Day 37 - Intermediate+ Habit Tracking Project API Post Requests & Headers/

001 Day 37 Goals what you will make by the end of the day.mp4

18.4 MB

002 HTTP Post Requests.mp4

43.1 MB

002 Pixela-API-Documentation.url

0.0 KB

002 Pixela-Website.url

0.0 KB

002 Requests-Module-Documentation.url

0.1 KB

003 Advanced Authentication using an HTTP Header.mp4

93.0 MB

004 Challenge Add a Pixel to the Habit Tracker using a Post Request.mp4

25.1 MB

005 Autofilling today's date using strftime.mp4

18.3 MB

005 w3schools-Python-Date-Formatting-with-strftime.url

0.1 KB

006 Course-Fixes-Report-an-Issue.url

0.1 KB

006 How to use HTTP Put and Delete Requests.mp4

41.2 MB

006 Solution-habit-tracking-end.zip

0.7 KB

external-links.txt

0.4 KB

/.../38 - Day 38 - Intermediate+ Workout Tracking Using Google Sheets/

001 Day 38 Goals what you will make by the end of the day.mp4

9.9 MB

001 OpenAi-GPT-3.url

0.1 KB

002 Nutritionix-API.url

0.1 KB

002 Step 1 - Setup API Credentials and Google Spreadsheet.html

1.4 KB

003 Nutritionix-API-Documentation.url

0.1 KB

003 Step 2 - Get Exercise Stats with Natural Language Queries.html

1.4 KB

004 Sheety-API.url

0.0 KB

004 Step 3 - Setup Your Google Sheet with Sheety.html

1.8 KB

005 Step 4 - Saving Data into Google Sheets.html

1.7 KB

006 Step 5 - Authenticate Your Sheety API.html

2.4 KB

007 Course-Fixes-Report-an-Issue.url

0.1 KB

007 Solution-Exercise-Tracker.zip

3.3 KB

007 Step 6 - Environment Variables in Repl.it.html

3.3 KB

external-links.txt

0.4 KB

/.../39 - Day 39 - Intermediate+ Capstone Part 1 Flight Deal Finder/

001 Day 39 Goals what you will make by the end of the day.mp4

34.7 MB

002 flight-deals-start.zip

26.8 MB

002 Step 1 - Choose Your Path and Download the Starting Project.html

5.6 KB

003 flight-deals-step-2-solution.zip

5.9 KB

003 Step 2 - Use Sheety to Read and Write Data to the Google Sheet.html

3.5 KB

004 Step 3 - Get the IATA Codes using the Kiwi Partners API.html

2.8 KB

005 Step 4 - Search for Cheap Flights.html

3.4 KB

006 Course-Fixes-Report-an-Issue.url

0.1 KB

006 Step 5 - If Flight Price Lower than in Google Sheet send an SMS.html

1.2 KB

external-links.txt

0.1 KB

/.../40 - Day 40 - Intermediate+ Capstone Part 2 Flight Club/

001 Day 40 Goals what you will make by the end of the day.mp4

13.9 MB

001 Project-Inspiration-Jacks-Flight-Club.url

0.1 KB

002 Step 1 - Create the Customer Acquisition Code.html

2.4 KB

003 flight-deals-end.zip

26.9 MB

003 Step 2 - Download the Starting Project.html

0.5 KB

004 Step 3 - Exception Handling for Destinations without Flights.html

1.8 KB

005 Step 4 - Destinations without Direct Flights.html

1.8 KB

006 Course-Fixes-Report-an-Issue.url

0.1 KB

006 Step 5 - Email all our customers.html

1.3 KB

external-links.txt

0.1 KB

/.../41 - Day 41 - Web Foundation - Introduction to HTML/

001 How Does the Internet Actually Work.mp4

45.5 MB

001 Submarine-Cable-Map.url

0.1 KB

002 How Do Websites Actually Work.mp4

38.1 MB

003 Download the Required Software.html

1.7 KB

004 What is HTML.mp4

23.4 MB

005 2.1-Heading-Element.zip

289.1 KB

005 HTML Heading Elements.mp4

68.9 MB

005 MDN-Docs-Headings.url

0.1 KB

005 Unzip-in-Windows.url

0.1 KB

005 Unzip-on-Mac.url

0.1 KB

006 2.2-Paragraph-Element.zip

1.7 MB

006 HTML Paragraph Elements.mp4

81.8 MB

007 2.3-Void-Elements.zip

1.5 MB

007 Diff-Checker.url

0.1 KB

007 Self Closing Tags.mp4

87.6 MB

008 2.4-Movie-Ranking-Project.zip

398.1 KB

008 Day 41 Project - Movie Ranking.mp4

29.1 MB

external-links.txt

0.4 KB

/.../42 - Day 42 - Web Foundation - Intermediate HTML/

001 HTML Boilerplate.mp4

61.2 MB

002 3.0-List-Elements.zip

235.4 KB

002 The List Element.mp4

81.1 MB

003 3.1-Nesting-and-Indentation.zip

38.7 KB

003 Nesting and Indentation.mp4

33.7 MB

004 3.2-Anchor-Elements.zip

233.7 KB

004 Anchor Elements.mp4

31.2 MB

005 3.3-Image-Elements.zip

2.3 MB

005 Image Elements.mp4

48.0 MB

006 3.4-Birthday-Invite-Project.zip

1.6 MB

006 Day 42 Project - Birthday Invite Website.mp4

37.1 MB

/.../43 - Day 43 - Web Foundation - Introduction to CSS/

001 Why do we need CSS.mp4

90.5 MB

002 5.1-Adding-CSS.zip

3.2 KB

002 How to add CSS.mp4

33.1 MB

003 5.3-CSS-Selectors.zip

141.4 KB

003 CSS Selectors.mp4

134.8 MB

004 5.4-Color-Vocab-Project.zip

894.7 KB

004 Day 43 Project - Colour Vocab Website.mp4

34.6 MB

/.../44 - Day 44 - Web Foundation - Intermediate CSS/

001 6.0-CSS-Colors.zip

18.8 KB

001 CSS Colours.mp4

35.5 MB

001 Named-Colours.url

0.1 KB

001 RGB-Colour-Mixer.url

0.1 KB

002 6.1-Font-Properties.zip

341.5 KB

002 Font Properties.mp4

107.5 MB

003 Inspecting CSS.mp4

45.0 MB

003 Pesticide.url

0.1 KB

004 6.3-CSS-Box-Model.zip

822.5 KB

004 The CSS Box Model - Margin, Padding and Border.mp4

105.6 MB

005 6.4-Motivation-Meme-Project.zip

4.6 MB

005 Day 44 Project - Motivational Poster Website.mp4

76.3 MB

external-links.txt

0.3 KB

/.../45 - Day 45 - Intermediate+ Web Scraping with Beautiful Soup/

001 Day 45 Goals what you will make by the end of the day.mp4

29.7 MB

002 Beautiful-Soup-Documentation.url

0.1 KB

002 bs4-start.zip

0.7 KB

002 Parsing HTML and Making Soup.mp4

61.9 MB

003 Finding and Selecting Particular Elements with BeautifulSoup.mp4

83.3 MB

004 Scraping a Live Website.mp4

156.5 MB

004 SOLUTION.url

0.1 KB

004 Y-Combinator-Hacker-News.url

0.1 KB

005 Is Web Scraping Legal.mp4

74.0 MB

006 100 Movies that You Must Watch.mp4

84.3 MB

006 Course-Fixes-Report-an-Issue.url

0.1 KB

006 Empires-Top-100-Movies-of-All-Time-from-Web-Archive-.url

0.1 KB

006 Solution-100-movies-to-watch-end.zip

3.0 KB

006 Starting-Code-100-movies-to-watch-start.zip

1.2 KB

external-links.txt

0.5 KB

/.../46 - Day 46 - Intermediate+ Create a Spotify Playlist using the Musical Time Machine/

001 Day 46 Goals what you will make by the end of the day.mp4

20.5 MB

002 Step 1 - Scraping the Billboard Hot 100.html

0.8 KB

003 Step 2 - Authentication with Spotify.html

5.5 KB

004 Step 3 - Search Spotify for the Songs from Step 1.html

1.0 KB

005 Course-Fixes-Report-an-Issue.url

0.1 KB

005 Step 4 - Creating and Adding to Spotify Playlist.html

0.8 KB

external-links.txt

0.1 KB

/.../47 - Day 47 - Intermediate+ Create an Automated Amazon Price Tracker/

001 Day 47 Goals what you will make by the end of the day.mp4

48.8 MB

002 Step 1 - Use BeautifulSoup to Scrape the Product Price.html

3.2 KB

003 Course-Fixes-Report-an-Issue.url

0.1 KB

003 Step 2 - Email Alert When Price Below Preset Value.html

2.3 KB

external-links.txt

0.1 KB

/.../48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/

001 Addiction-Warning-The-Cookie-Clicker-Game.url

0.1 KB

001 Day 48 Goals what you will make by the end of the day.mp4

15.6 MB

002 Download-and-Install-Selenium-ChromeDriver.url

0.1 KB

002 Download-and-Install-the-Chrome-Browser.url

0.1 KB

002 How to Install & Set Up Selenium.mp4

60.4 MB

003 How to Find and Select Elements on a Website with Selenium.mp4

107.6 MB

003 Selenium-Documentation.url

0.1 KB

003 w3schools-XPath-Tutorial.url

0.1 KB

004 Challenge Use Selenium to Scrape Website Data.mp4

64.0 MB

004 Python.org.url

0.0 KB

005 Challenge Use Selenium in a Blank Project & Scrape a Different Piece of Data.mp4

41.1 MB

005 Wikipedia-Main-Page.url

0.1 KB

006 Challenge-URL-Form-Sign-Up.url

0.1 KB

006 How to Automate Filling Out Forms and Clicking Buttons with Selenium.mp4

96.8 MB

006 My-Web-Dev-Course.url

0.1 KB

006 Our-Actual-Newsletter.url

0.1 KB

007 The Cookie Clicker Project.mp4

29.5 MB

007 The-Cookie-Clicker-Game.url

0.1 KB

008 Challenge Create an Automated Game Playing Bot.html

2.6 KB

008 Course-Fixes-Report-an-Issue.url

0.1 KB

008 Solution-cookie-clicker-end.zip

1.0 KB

external-links.txt

1.0 KB

/.../49 - Day 49 - Intermediate+ Automating Job Applications on LinkedIn/

001 Day 49 Goals what you will make by the end of the day.mp4

11.3 MB

001 LinkedIn-Jobs.url

0.1 KB

002 Step 1 - Setup Your LinkedIn Account.html

1.8 KB

003 Step 2 - Automatically Login.html

1.6 KB

004 Step 3 - Apply for a Job.html

1.7 KB

005 Course-Fixes-Report-an-Issue.url

0.1 KB

005 Solution-LinkedIn-Job-Application-Automation.zip

45.3 MB

005 Step 4 - Apply for all the jobs.html

1.5 KB

external-links.txt

0.2 KB

/.../50 - Day 50 - Intermediate+ Auto Tinder Swiping Bot/

001 Day 50 Goals what you will make by the end of the day.mp4

16.7 MB

001 Machine-Learning-Generated-Profile-Pictures.url

0.1 KB

001 NY-Times-Tinder-Article.url

0.1 KB

001 Tinder.url

0.0 KB

002 Step 1 - Setup your account on Tinder.html

1.1 KB

003 Step 2 - Navigate to Login Page.html

1.5 KB

004 Step 3 - Login with Facebook.html

2.6 KB

005 Step 4 - Dismiss all requests.html

1.2 KB

006 Course-Fixes-Report-an-Issue.url

0.1 KB

006 Solution-auto-tinder-swiper-end.zip

0.8 KB

006 Step 5 - Hit Like!.html

1.5 KB

external-links.txt

0.3 KB

/.../51 - Day 51 - Intermediate+ Internet Speed Twitter Complaint Bot/

001 Comcast-Twitter-Bot.url

0.1 KB

001 Day 51 Goals what you will make by the end of the day.mp4

37.6 MB

001 Huffington-Post-Comcast-Call-from-Hell.url

0.1 KB

001 Internet-Speed-Checker.url

0.1 KB

001 Time-Does-Tweeting-at-Companies-Really-Work-.url

0.1 KB

002 Step 1 - Setup Your Twitter Account.html

0.8 KB

003 Step 2 - Create a Class.html

0.9 KB

004 Step 3 - Get Internet Speeds.html

1.0 KB

005 Course-Fixes-Report-an-Issue.url

0.1 KB

005 Solution-internet-speed-twitter-bot-end.zip

0.9 KB

005 Step 4 - Building a Twitter Bot to Tweet at your Internet Provider.html

0.9 KB

external-links.txt

0.5 KB

/.../52 - Day 52 - Intermediate+ Instagram Follower Bot/

001 Day 52 Goals what you will make by the end of the day.mp4

22.4 MB

001 Follow-your-competitors-followers-to-grow-your-instagram-account.url

0.2 KB

001 Instagram.url

0.1 KB

002 Step 1 - Get Your Instagram Credentials.html

0.6 KB

003 Step 2 - Create a Class.html

0.6 KB

004 Step 3 - Login to Instagram.html

0.5 KB

005 Step 4 - Find the followers of the target account.html

2.4 KB

006 Course-Fixes-Report-an-Issue.url

0.1 KB

006 Solution-instagram-follower-end.zip

0.9 KB

006 Step 5 - Follow all the followers.html

1.3 KB

external-links.txt

0.4 KB

/.../53 - Day 53 - Intermediate+ Web Scraping Capstone - Data Entry Job Automation/

001 Automated-Job-Story.url

0.1 KB

001 Automating-Your-Job-Reddit.url

0.1 KB

001 Data-Entry-Jobs-on-Indeed.url

0.1 KB

001 Day 53 Goals what you will make by the end of the day.mp4

62.4 MB

001 Google-Forms.url

0.1 KB

001 Zillow-Property-search.url

0.9 KB

002 Capstone Project Program Requirements.html

4.3 KB

003 Course-Fixes-Report-an-Issue.url

0.1 KB

003 HINTS & SOLUTION.html

1.6 KB

003 Solution-Zillow-Rental-Research.zip

3.3 KB

external-links.txt

1.4 KB

/.../54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/

001 Understanding Backend Web Development with Python.mp4

27.8 MB

002 Create your First Web Server with Flask.mp4

64.7 MB

002 Flask-Package-on-PyPi.url

0.1 KB

002 Flask-Quick-Start-Documentation.url

0.1 KB

003 Mac-Linux-Terminal-Cheat-Sheet.url

0.1 KB

003 Understand the Command Line on Windows and Mac.mp4

131.4 MB

003 Windows-Command-Prompt-Cheat-Sheet.url

0.1 KB

004 __name__ and __main__ Special Attributes built into Python.mp4

19.0 MB

004 Python-Built-In-Attributes-e.g.name-.url

0.1 KB

004 What-is-main-.url

0.1 KB

005 Python Functions as First Class Objects Passing & Nesting Functions.mp4

32.5 MB

005 Python-Decorators-Repl.it-Code.url

0.1 KB

005 Visualising-Nested-Function-Return-on-PythonTutor.url

0.1 KB

006 Completed-Code-for-day-54-end.zip

0.3 KB

006 Interactive-Coding-Exercise-Day-54.1-Decorators.url

0.1 KB

006 Understanding Python Decorator Functions and the @ Syntax.mp4

41.4 MB

007 [Interactive Coding Exercise] Create Your Own Python Decorator.html

0.3 KB

007 Course-Fixes-Report-an-Issue.url

0.1 KB

external-links.txt

1.0 KB

/.../55 - Day 55 - Intermediate+ HTML & URL Parsing in Flask and the Higher Lower Game/

001 Day 55 Goals what you will make by the end of the day.mp4

6.4 MB

002 Flask-Docs-Routing.url

0.1 KB

002 Flask-Docs-Variable-Rules.url

0.1 KB

002 Working Flask URL Paths and the Flask Debugger.mp4

91.0 MB

003 giphy.com.url

0.0 KB

003 Rendering HTML Elements with Flask.mp4

51.5 MB

004 Challenge Use Python Decorators to Style HTML Tags.mp4

14.7 MB

004 SOLUTION.url

0.1 KB

005 Advanced Decorators with args and kwargs.mp4

37.4 MB

005 Advanced-Python-Decorators-Repl.it-Code.url

0.1 KB

005 Solution-Completed-Code-for-day-55-end.zip

0.7 KB

006 [Interactive Coding Exercise] Advanced Decorators.html

0.3 KB

007 Course-Fixes-Report-an-Issue.url

0.1 KB

007 Final Project - Higher or Lower URLs.html

2.2 KB

external-links.txt

0.5 KB

/.../56 - Day 56 - Intermediate+ Rendering HTMLStatic files and Using Website Templates/

001 Day 56 Goals what you will make by the end of the day.mp4

4.2 MB

002 Flask-Docs-Rendering-Templates.url

0.1 KB

002 My-CV-Website-Hosted-on-GitHub.url

0.1 KB

002 Rendering HTML Files with Flask.mp4

53.1 MB

003 Serving Static Files using Flask.mp4

51.0 MB

004 How to Use Website Templates to Speed Up Web Development.mp4

140.8 MB

004 HTML5-UP-Website-Templates.url

0.0 KB

004 personal-site-html-and-css-files.zip

128.5 KB

005 Check-out-html5up.nets-live-demo-sites.url

0.0 KB

005 Final Project - Name Card Website Template.html

1.1 KB

005 html5up-identity.zip

659.8 KB

006 Course-Fixes-Report-an-Issue.url

0.1 KB

006 Solution and Walkthrough for the Name Card Final Project.mp4

80.5 MB

006 unsplash.com-beautiful-images.url

0.0 KB

external-links.txt

0.4 KB

/.../57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/

001 Day 57 Goals what you will make by the end of the day.mp4

3.6 MB

002 day-57-start.zip

0.3 KB

002 Jinja-Documentation.url

0.1 KB

002 Rendering-Templates-in-Flask.url

0.1 KB

002 Update-Your-Footer.url

0.1 KB

002 Using Jinja to Produce Dynamic HTML Pages.mp4

81.6 MB

003 Agify-API.url

0.0 KB

003 Challenge Combining Jinja Templating with APIs.mp4

62.6 MB

003 Genderize-API.url

0.0 KB

004 blog-data.txt

1.5 KB

004 Create-your-own-bin-with-npoint.io.url

0.0 KB

004 Flask-Docs-Routing.url

0.1 KB

004 Multiline Statements with Jinja.mp4

54.0 MB

004 npoint-example-blog-data.url

0.1 KB

005 day-57-end.zip

1.6 KB

005 URL Building with Flask.mp4

29.2 MB

006 Blog Capstone Project Part 1 - Templating.html

1.4 KB

006 blog-templating-start.zip

2.5 KB

006 Course-Fixes-Report-an-Issue.url

0.1 KB

006 Solution-blog-templating-end.zip

2.3 KB

external-links.txt

0.6 KB

/.../58 - Day 58 - Web Foundation Bootstrap/

001 Day 58 Goals What You'll Learn By the End of Today.html

0.8 KB

002 11.0-Bootstrap-Intro.zip

1.4 MB

002 What is Bootstrap.mp4

129.6 MB

003 Bootstrap Layout.mp4

68.3 MB

004 11.2-Bootstrap-Components.zip

1.3 MB

004 Bootstrap Components.mp4

355.8 MB

005 11.3-TinDog-Project.zip

1.5 MB

005 Day 58 Project - A Startup Website for TinDog.mp4

395.9 MB

/.../59 - Day 59 - Advanced - Blog Capstone Project Part 2 - Adding Styling/

001 Day 59 Goals What you'll make by the end of today.html

2.1 KB

002 Step 1 - Download the starting project.html

1.1 KB

003 Step 2 - Get the home page to work.html

0.5 KB

004 Step 3 - Fix the header and footer.html

1.6 KB

005 Step 4 - Using Jinja Include fo Render Templates.html

1.3 KB

006 Step 5 - Make the About and Contact Pages Work.html

1.9 KB

007 blog-data.txt

1.5 KB

007 Step 6 - Fetch and render the blog posts from an API.html

2.6 KB

008 Course-Fixes-Report-an-Issue.url

0.1 KB

008 Solution-Completed-Code-day-59-end-updated.zip

6.0 MB

008 Step 7 - Rendering Individual Posts.html

0.9 KB

external-links.txt

0.1 KB

/.../60 - Day 60 - Advanced - Make POST Requests with Flask and HTML Forms/

001 Day 60 goals - Make the Contact Form Work.html

1.0 KB

002 HTML Forms Revision - Creating a Form from Scratch.html

1.3 KB

003 Handle POST Requests with Flask Servers.html

3.5 KB

004 POST Requests in Flask Solution.html

1.3 KB

005 Getting the Contact Form to Work.html

2.9 KB

006 Course-Fixes-Report-an-Issue.url

0.1 KB

006 Sending Email with smtplib.html

0.7 KB

006 Solution-Completed-Code-day-60-end.zip

8.9 MB

external-links.txt

0.1 KB

/.../61 - Day 61 - Advanced - Building Advanced Forms with Flask-WTForms/

001 Day 61 Goals Building Advanced Forms.html

1.6 KB

002 Installing Flask-WTF.html

2.5 KB

002 Starting-Files-flask-secrets.zip

5.0 KB

003 Creating Forms with Flask-WTF.html

2.1 KB

004 Code Improvements for Our WTForms.html

3.5 KB

005 Adding Validation to Forms with Flask-WTF.html

3.9 KB

006 Receiving Form Data with WTForms.html

2.1 KB

007 Inheriting Templates Using Jinja2.html

5.4 KB

008 Using Flask-Bootstrap as an Inherited Template.html

1.6 KB

009 Course-Fixes-Report-an-Issue.url

0.1 KB

009 Flask-Bootstrap Supports WTForms.html

2.1 KB

009 Solution-Completed-Code-day-61-end.zip.zip

13.1 KB

external-links.txt

0.1 KB

/.../62 - Day 62 - Advanced - Flask, WTForms, Bootstrap and CSV - Coffee & Wifi Project/

001 Download the Starting Project.html

0.5 KB

001 Starting-Files-coffee-and-wifi.zip

3.2 KB

002 Look at the Desired Final Product.html

0.1 KB

003 Check Off Each Requirement.html

5.8 KB

003 Course-Fixes-Report-an-Issue.url

0.1 KB

external-links.txt

0.1 KB

/.../63 - Day 63 - Advanced - Databases and with SQLite and SQLAlchemy/

001 Day 63 Goals Creating a Virtual Bookshelf.html

0.7 KB

002 Download the Starting Project.html

0.3 KB

002 Starting-Files-library-start.zip

4.2 KB

003 Make the Website Work.html

3.0 KB

004 What Happens When You Refresh the Server.html

1.2 KB

005 SQLite Databases.html

7.6 KB

006 SQLAlchemy.html

2.5 KB

007 CRUD Operations with SQLAlchemy.html

2.7 KB

008 Build a SQLite Database into the Flask Website.html

3.2 KB

008 Course-Fixes-Report-an-Issue.url

0.1 KB

external-links.txt

0.1 KB

/.../64 - Day 64 - Advanced - My Top 10 Movies Website/

001 Day 64 Goals What We'll Build.html

1.3 KB

002 Download the Starting Project.html

0.3 KB

002 Starting-Files-movie-project-start.zip

4.3 KB

003 Requirement 1 - Be Able to View Movie List Items.html

2.0 KB

004 Requirement 2 - Be Able to Edit a Movie's Rating and Review.html

1.8 KB

005 Requirement 3 - Be Able to Delete Movies from the Database.html

0.4 KB

006 Requirement 4 - Be Able to Add New Movies Via the Add Page.html

4.3 KB

007 Course-Fixes-Report-an-Issue.url

0.1 KB

007 Requirement 5 - Be Able to Sort and Rank the Movies By Rating.html

1.9 KB

external-links.txt

0.1 KB

/.../64 - Day 64 - Advanced -My Top 10 Movies Website/

001 Day 64 Goals What We'll Build.html

1.3 KB

002 Download the Starting Project.html

0.3 KB

002 Starting-Files-movie-project-start.zip

4.3 KB

003 Requirement 1 - Be Able to View Movie List Items.html

2.0 KB

004 Requirement 2 - Be Able to Edit a Movie's Rating and Review.html

1.8 KB

005 Requirement 3 - Be Able to Delete Movies from the Database.html

0.4 KB

006 Requirement 4 - Be Able to Add New Movies Via the Add Page.html

4.3 KB

007 Course-Fixes-Report-an-Issue.url

0.1 KB

007 Requirement 5 - Be Able to Sort and Rank the Movies By Rating.html

1.9 KB

external-links.txt

0.1 KB

/.../65 - Day 65 - Web Design School - How to Create a Website that People will Love/

001 Introduction to Web Design.mp4

35.9 MB

001 Penny-Juice-Rebranded.url

0.1 KB

001 Penny-Juices-Website.url

0.1 KB

002 Adobe-Color-Wheel.url

0.1 KB

002 Color-Hunt.url

0.0 KB

002 Understanding Color Theory.mp4

145.2 MB

003 Understanding Typography and How to Choose Fonts.mp4

154.3 MB

004 Manage ATTENTION with effective User Interface (UI) Design.mp4

73.1 MB

005 User Experience (UX) Design.mp4

163.8 MB

006 Build-a-design-using-canva.com.url

0.0 KB

006 Course-Fixes-Report-an-Issue.url

0.1 KB

006 Design-Challenges-on-Daily-UI.url

0.0 KB

006 Page-inspirations-on-Collect-UI.url

0.0 KB

006 Web Design in Practice - Let's apply what we've learnt!.mp4

313.8 MB

external-links.txt

0.5 KB

/.../66 - Day 66 - Advanced - Building Your Own API with RESTful Routing/

001 Day 66 Goals Build Your Own REST API Service.html

1.0 KB

002 What is REST.mp4

46.8 MB

003 Download the Starting Project.html

0.7 KB

003 Starting-Files-cafe-api-start.zip

6.9 KB

004 HTTP GET - a Random Cafe.html

3.2 KB

005 HTTP GET - All the Cafes.html

0.8 KB

006 HTTP GET - Find a Cafe.html

1.3 KB

007 Postman - The all in one API Testing Tool.html

1.6 KB

008 HTTP POST - A New Cafe.html

1.3 KB

009 HTTP PUT vs. PATCH.mp4

4.2 MB

010 HTTP PATCH - A Cafe's Coffee Price.html

2.5 KB

011 HTTP DELETE - A Cafe that's Closed.html

1.5 KB

012 Build Documentation for Your API.html

1.8 KB

012 Course-Fixes-Report-an-Issue.url

0.1 KB

external-links.txt

0.1 KB

/.../67 - Day 67 - Advanced - Blog Capstone Project Part 3 - RESTful Routing/

001 Day 67 Goals Building a RESTful Blog with Editing!.html

0.4 KB

002 Download the Starting Project.html

0.7 KB

002 Starting-Files-RESTful-blog-start.zip

6.8 MB

003 Requirement 1 - Be Able to GET Blog Post Items.html

1.0 KB

004 Requirement 2 - Be Able to POST a New Blog Post.html

4.1 KB

005 Requirement 3 - Be Able to Edit Existing Blog Posts.html

2.9 KB

006 Course-Fixes-Report-an-Issue.url

0.1 KB

006 Requirement 4- Be Able DELETE Blog Posts.html

0.8 KB

external-links.txt

0.1 KB

/.../68 - Day 68 - Advanced - Authentication with Flask/

001 Day 68 Goals - Login and Registering Users with Authentication.html

1.2 KB

002 What is Authentication.mp4

7.1 MB

003 Download the Starting Project.html

0.8 KB

003 Starting-Files-flask-auth-start.zip

58.7 KB

004 Register New Users.html

1.3 KB

005 Downloading Files.html

1.2 KB

006 Cryptii-Online-Encryption.url

0.0 KB

006 Encryption and Hashing.mp4

74.0 MB

006 How-the-Enigma-Machine-Works.url

0.1 KB

006 The-Flaw-in-the-Enigma-Machine.url

0.1 KB

007 -have-i-been-pwned-.url

0.1 KB

007 How to Hack Passwords 101.mp4

76.2 MB

007 Most-Common-Passwords.url

0.1 KB

007 Password-Complexity-Checker.url

0.1 KB

007 Plain-Text-Offenders.url

0.1 KB

008 Salting Passwords.mp4

14.2 MB

009 Hashing Passwords using Werkzeug.html

1.3 KB

010 Authenticating Users with Flask-Login.html

2.7 KB

011 Flask Flash Messages.html

2.0 KB

012 Course-Fixes-Report-an-Issue.url

0.1 KB

012 Passing Authentication Status to Templates.html

1.0 KB

external-links.txt

0.6 KB

/.../69 - Day 69 - Advanced - Blog Capstone Project Part 4 - Adding Users/

001 Day 69 Goals - Adding Users to Our Blog Project.html

0.5 KB

002 Download the Starting Project.html

0.8 KB

002 Starting-Files-blog-with-users-start.zip

6.8 MB

003 Requirement 1 - Register New Users.html

0.9 KB

004 Requirement 2 - Login Registered Users.html

3.6 KB

005 Requirement 3 - Protect Routes.html

2.0 KB

006 Creating Relational Databases.html

4.6 KB

007 Course-Fixes-Report-an-Issue.url

0.1 KB

007 Requirement 4 - Allow Any User to Add Comments to BlogPosts.html

6.1 KB

external-links.txt

0.1 KB

/.../70 - Day 70 - Advanced - Deploying Your Web Application with Heroku/

001 Day 70 Goals - Learn to Deploy Your Website.mp4

3.8 MB

002 Version Control and Git.mp4

180.0 MB

003 What is GitHub.mp4

44.5 MB

004 Step 1 - Upload Your Project to GitHub.html

6.2 KB

005 Step 2 - Use gunicorn and Heroku to host your website.html

3.4 KB

006 Step 3 - Setup a WSGI server with gunicorn.html

3.8 KB

007 Course-Fixes-Report-an-Issue.url

0.1 KB

007 Step 4 - Upgrade SQLite Database to PostgreSQL.html

4.8 KB

external-links.txt

0.1 KB

/.../71 - Day 71 - Advanced - Data Exploration with Pandas College Major v.s. Your Salary/

001 Day 71 Goals what you will make by the end of the day.html

1.5 KB

002 Getting Set Up for Data Science.html

1.5 KB

003 salaries-by-college-major.csv

3.1 KB

003 Upload the Data and Read the .csv File.html

1.4 KB

004 Preliminary Data Exploration and Data Cleaning with Pandas.html

2.6 KB

005 Accessing Columns and Individual Cells in a Dataframe.html

2.8 KB

006 Solution Highest and Lowest Earning Degrees.html

1.5 KB

007 Sorting Values & Adding Columns Majors with the Most Potential vs Lowest Risk.html

3.1 KB

008 Solution Degrees with the Highest Potential.html

1.0 KB

009 Grouping and Pivoting Data with Pandas.html

2.2 KB

010 Course-Fixes-Report-an-Issue.url

0.1 KB

010 Data-Exploration-Pandas-College-Major-complete.zip

8.8 KB

010 Learning Points & Summary.html

1.6 KB

external-links.txt

0.1 KB

/.../72 - Day 72 - Advanced - Data Visualisation with Matplotlib Programming Languages/

001 Day 72 Goals what you will make by the end of the day.html

1.5 KB

002 Download and Open the Starter Notebook.html

1.5 KB

002 Programming-Languages-start.ipynb.zip

3.1 KB

002 QueryResults.csv

73.6 KB

003 Solution Preliminary Data Exploration.html

2.1 KB

004 Solution Analysis by Programming Language.html

0.9 KB

005 Data Cleaning Working with Time Stamps.html

2.1 KB

006 Data Manipulation Pivoting DataFrames.html

5.0 KB

007 Data Visualisation with Matplotlib.html

3.7 KB

008 Multi-Line Charts with Matplotib.html

2.3 KB

009 Smoothing out Time-Series Data.html

1.8 KB

010 Course-Fixes-Report-an-Issue.url

0.1 KB

010 Learning Points & Summary.html

1.3 KB

010 Programming-Languages-complete.ipynb.zip

581.9 KB

external-links.txt

0.1 KB

/.../73 - Day 73 - Advanced - Aggregate & Merge Data with Pandas Analyse the LEGO Dataset/

001 Day 73 Goals what you will make by the end of the day.html

2.6 KB

001 LEGO-Notebook-and-Data-start.zip

3.0 MB

002 Use HTML Markdown to Make Your Notebook Look Pretty.html

2.4 KB

003 Solution Exploring the LEGO Brick Colours.html

2.2 KB

004 Find the Oldest and Largest LEGO Sets.html

3.6 KB

005 Visualise the Number of Sets Published over Time.html

3.2 KB

006 How to use the Pandas .agg() function.html

2.5 KB

007 Superimposing Line Charts with Separate Axes.html

1.7 KB

008 Scatter Plots Average Number of Parts per LEGO Set.html

2.8 KB

009 Relational Database Schemas Primary and Foreign Keys.html

4.4 KB

010 How to Merge DataFrames and Create Bar Charts.html

3.9 KB

011 Course-Fixes-Report-an-Issue.url

0.1 KB

011 Learning Points & Summary.html

1.3 KB

011 LEGO-Notebook-and-Data-completed.zip

3.3 MB

external-links.txt

0.1 KB

/.../74 - Day 74 - Advanced - Google Trends Data Resampling and Visualising Time Series/

001 Day 74 Goals what you will make by the end of the day.html

2.2 KB

001 Google-Trends-Data-Viz-start.zip

42.0 KB

002 Data Exploration - Making Sense of Google Search Data.html

4.4 KB

003 Data Cleaning - Resampling Time Series Data.html

4.9 KB

004 Data Visualisation - Tesla Line Charts in Matplotlib.html

7.5 KB

005 Using Locators and DateFormatters to generate Tick Marks on a Time Line.html

2.2 KB

006 Data Visualisation - Bitcoin Line Style and Markers.html

3.7 KB

007 Data Visualisation - Unemployment How to use Grids.html

5.8 KB

008 Data Visualisation - Unemployment The Effect of New Data.html

1.8 KB

009 Course-Fixes-Report-an-Issue.url

0.1 KB

009 Google-Trends-Data-Viz-complete.zip

784.7 KB

009 Learning Points & Summary.html

1.5 KB

external-links.txt

0.1 KB

/.../75 - Day 75 - Advanced - Beautiful Plotly Charts & Analysing the Android App Store/

001 Day 75 Goals what you will make by the end of the day.html

2.2 KB

001 Google-Play-Store-Project-Start.zip

291.9 KB

002 Data Cleaning Removing NaN Values and Duplicates.html

6.6 KB

003 Preliminary Exploration The Highest Ratings, Most Reviews, and Largest Size.html

2.2 KB

004 Data Visualisation with Plotly Create Pie and Donut Charts.html

3.0 KB

005 Numeric Type Conversions for the Installations & Price Data.html

6.7 KB

006 Plotly Bar Charts & Scatter Plots The Most Competitive & Popular App Categories.html

6.4 KB

007 Extracting Nested Column Data using .stack().html

3.2 KB

008 Grouped Bar Charts and Box Plots with Plotly.html

9.1 KB

009 Course-Fixes-Report-an-Issue.url

0.1 KB

009 Google-Play-Store-Analysis-Complete.zip

321.5 KB

009 Learning Points & Summary.html

0.8 KB

external-links.txt

0.1 KB

/.../76 - Day 76 - Advanced - Computation with NumPy and N-Dimensional Arrays/

001 Computation-with-NumPy-start.zip

120.4 KB

001 Day 76 Goals what you will make by the end of the day.html

1.9 KB

002 NumPy's ndarray - Incredible Power at Your Fingertips!.html

6.2 KB

003 Generating and Manipulating ndarrays.html

6.8 KB

004 Broadcasting, Scalars and Matrix Multiplication.html

4.1 KB

005 Manipulating Images as ndarrays.html

8.1 KB

006 Computation-with-NumPy-complete.zip

1.3 MB

006 Course-Fixes-Report-an-Issue.url

0.1 KB

006 Learning Points & Summary.html

0.8 KB

external-links.txt

0.1 KB

/.../77 - Day 77 - Advanced - Linear Regression and Data Visualisation with Seaborn/

001 Day 77 Goals what you will make by the end of the day.html

1.8 KB

001 Seaborn-Linear-Regression-start.zip

151.4 KB

002 Explore and Clean the Data.html

4.3 KB

003 Investigate the Films that had Zero Revenue.html

4.7 KB

004 Filter on Multiple Conditions International Films.html

5.3 KB

005 Seaborn Data Visualisation Bubble Charts.html

6.9 KB

006 Floor Division A Trick to Convert Years to Decades.html

4.2 KB

007 Plotting Linear Regressions with Seaborn.html

4.6 KB

008 Use scikit-learn to Run Your Own Regression.html

7.9 KB

009 Course-Fixes-Report-an-Issue.url

0.1 KB

009 Learning Points & Summary.html

1.2 KB

009 Seaborn-Linear-Regression-complete.zip

1.1 MB

external-links.txt

0.1 KB

/.../78 - Day 78 - Advanced - Analysing the Nobel Prize with Plotly, Matplotlib & Seaborn/

001 Day 78 Goals what you will make by the end of the day.html

2.4 KB

001 Nobel-Prize-Analysis-Start.zip

70.5 KB

002 Update Packages in Google Colab & Explore and Clean the Dataset.html

5.7 KB

003 plotly Bar & Donut Charts Analyse Prize Categories & Women Winning Prizes.html

8.8 KB

004 Using Matplotlib to Visualise Trends over Time.html

7.5 KB

005 A Choropleth Map and the Countries with the Most Prizes.html

12.6 KB

006 Create Sunburst Charts for a Detailed Regional Breakdown of Research Locations.html

7.6 KB

007 Unearthing Patterns in the Laureate Age at the Time of the Award.html

10.4 KB

008 Course-Fixes-Report-an-Issue.url

0.1 KB

008 Learning Points & Summary.html

1.6 KB

008 Nobel-Prize-Analysis-Complete.zip

1.2 MB

external-links.txt

0.1 KB

/.../79 - Day 79 - Advanced - The Tragic Discovery of Handwashing t-Tests & Distributions/

001 Day 79 Goals what you will make by the end of the day.html

2.0 KB

001 Dr-Semmelweis-Analysis-start.zip

8.3 KB

002 Preliminary Data Exploration and Visualising Births & Deaths at Vienna Hospital.html

6.9 KB

003 Analysing the Yearly Data Split By Clinic.html

6.4 KB

004 The Effect of Handwashing.html

5.8 KB

005 Visualising Distributions and Testing for Statistical Significance.html

10.7 KB

006 Course-Fixes-Report-an-Issue.url

0.1 KB

006 Dr-Semmelweis-Analysis-complete.zip

1.1 MB

006 Learning Points & Summary.html

3.1 KB

external-links.txt

0.1 KB

/.../80 - Day 80 - Advanced - Capstone Project - Predict House Prices/

001 Day 80 Goals what you will make by the end of the day.html

1.7 KB

001 Multivariable-Regression-Start.zip

52.9 KB

002 Course-Fixes-Report-an-Issue.url

0.1 KB

002 Multivariable-Regression-Complete.zip

1.8 MB

002 Solution & Learning Points.html

1.2 KB

external-links.txt

0.1 KB

/.../81 - Day 81 - Professional Portfolio Project - [Python Scripting]/

001 [assignment_info] Text to Morse Code Converter.html

3.0 KB

001 The Road to Becoming a Professional Developer.html

1.7 KB

/.../82 - Day 82 - Professional Portfolio Project - [Python Web Development]/

001 [assignment_info] Portfolio Website.html

3.2 KB

001 Where are the Videos and the Solution Code.mp4

49.7 MB

/.../83 - Day 83 - Professional Portfolio Project - [Python Scripting]/

001 [assignment_info] Tic Tac Toe.html

3.3 KB

/.../84 - Day 84 - Professional Portfolio Project - [GUI]/

001 [assignment_info] Image Watermarking Desktop App.html

3.3 KB

/.../85 - Day 85 - Professional Portfolio Project - [GUI]/

001 [assignment_info] Typing Speed Test.html

3.2 KB

/.../86 - Day 86 - Professional Portfolio Project - [Game]/

001 [assignment_info] Breakout Game.html

3.4 KB

/.../87 - Day 87 - Professional Portfolio Project - [Web Development]/

001 [assignment_file] Cafe and Wifi Website.db

57.3 KB

001 [assignment_info] Cafe and Wifi Website.html

3.1 KB

/.../88 - Day 88 - Professional Portfolio Project - [Web Development]/

001 [assignment_info] Todo List.html

3.2 KB

/.../89 - Day 89 - Professional Portfolio Project - [GUI Desktop App]/

001 [assignment_info] Disappearing Text Writing App.html

3.3 KB

/.../90 - Day 90 - Professional Portfolio Project - [HTTP Requests & APIs]/

001 [assignment_info] Convert PDF to Audiobook.html

3.3 KB

/.../91 - Day 91 - Professional Portfolio Project - [Image Processing & Data Science]/

001 [assignment_info] Image Colour Palette Generator.html

3.3 KB

/.../92 - Day 92 - Professional Portfolio Project - [Web Scraping]/

001 [assignment_info] Custom Web Scraper.html

4.1 KB

/.../93 - Day 93 - Professional Portfolio Project - [GUI Automation]/

001 [assignment_info] Automate the Google Dinosaur Game.html

3.7 KB

/.../94 - Day 94 - Professional Portfolio Project - [Game]/

001 [assignment_info] Space Invaders.html

3.1 KB

/.../95 - Day 95 - Professional Portfolio Project - [HTTP Requests & APIs]/

001 [assignment_info] Custom API Based Website.html

4.5 KB

/.../96 - Day 96 - Professional Portfolio Project - [Web Development]/

001 [assignment_info] An Online Shop.html

3.1 KB

/.../97 - Day 97 - Professional Portfolio Project - [Python Automation]/

001 [assignment_info] Custom Automation.html

4.3 KB

/.../98 - Day 98 - Professional Portfolio Project - [Data Science]/

001 [assignment_file] Analyse and Visualise the Space Race.zip

109.4 KB

001 [assignment_info] Analyse and Visualise the Space Race.html

3.9 KB

/.../99 - Day 99 - Professional Portfolio Project - [Data Science]/

001 [assignment_file] Analyse Deaths involving Police in the United States.zip

1.1 MB

001 [assignment_info] Analyse Deaths involving Police in the United States.html

3.0 KB

/.../100 - Day 100 - Professional Portfolio Project - [Data Science]/

001 [assignment_file] Predict Earnings using Multivariable Regression.zip

191.3 KB

001 [assignment_info] Predict Earnings using Multivariable Regression.html

4.6 KB

/Books/Cloud/

9781801075930-AWS_CERTIFIED_CLOUD_PRACTITIONER_EXAM_GUIDE.pdf

13.9 MB

bb-.isc.2.ccsp.certified.cloud.security.professional.official.study.guide.epub

4.9 MB

Cheshire J. Exam Ref AZ-900 Microsoft Azure Fundamentals 3ed 2023.pdf

43.6 MB

Lab Guide, IPSpecialist. Hands-On Labs. CLF-C01. AWS Certified Cloud...2ed 2023.pdf

88.9 MB

/Books/CompTIA/A+/

bb-comptia.a.certification.study.guide.eleventh.edition.exams.220.1101.and.220.1102..epub

29.7 MB

Docter Q. CompTIA A+ Complete Study Guide...5ed 2022.pdf

96.8 MB

/Books/CompTIA/CySA+/

bb-comptia.cysa.practice.tests.ex.epub

50.4 MB

Chapple M. CompTIA CySA+ Study Guide Exam CS0-002 2ed 2020.pdf

22.4 MB

lc-mcgraw-hill.comptia.cysaplus.cybersecurity.analyst.certification.bundle.exam.cs0-002.2021.epub

31.5 MB

/Books/CompTIA/Data+/

Dodd С. CompTIA Data+. DAO-001 Certification Guide 2022.pdf

24.6 MB

/Books/CompTIA/IT Fundamentals+/

CompTIA IT Fundamentals Study Guide Exam FC0-U51 (1).pdf

245.0 MB

/Books/CompTIA/Linux+/

Blum R. CompTIA Linux+ Study Guide. Exam XK0-005 5ed 2022.pdf

34.0 MB

Jordan T. CompTIA Linux+ Certification All-in-One Exam Guide...XK0-005 2ed 2023.pdf

128.8 MB

Rothwell W. CompTIA Linux+ XK0-005 Exam Cram 2023.pdf

34.8 MB

/Books/CompTIA/Network+/

CompTIA Network+ Practice Tests - Exam N10-008, 2nd Edition.epub

7.5 MB

CompTIA Network+ Practice Tests - Exam N10-008, 2nd Edition.pdf

9.5 MB

CompTIANetworkCertificationAll-in-OneExamGuideEighthEditionExamN10-008.pdf

250.7 MB

/Books/CompTIA/Pentest+/

Chapple M. CompTIA PenTest+ Study Guide Exam PT0-002 2ed 2022.pdf

24.6 MB

Clarke G. CompTIA PenTest+ Certification For Dummies 2022.pdf

28.0 MB

lc-mcgraw.hill.comptia.pentestplus.certification.all-in-one.exam.guide.exam.pt0-002.2022.epub

22.9 MB

lc-wiley.comptia.pentestplus.certification.for.dummies.2020.epub

16.2 MB

lc-wiley.comptia.pentestplus.certification.for.dummies.2022.epub

15.3 MB

lc-wiley.comptia.pentestplus.study.guide.exam.pt0-002.2022.epub

41.6 MB

/Books/CompTIA/Security+/

Clarke G.CompTIA Security+ Certification Bundle.SY0-601 4ed 2022.pdf

67.7 MB

CompTIA Security+ All-in-One Exam Guide, Sixth Edition (1).pdf

14.3 MB

lc-wiley.comptia.securityplus.study.guide.exam.sy0-601.2021.epub

49.1 MB

Marty M. Weiss - Pearson - CompTIA Security+ SY0-601 Exam Cram 6th Edition.epub

13.4 MB

Stewart J. CompTIA Security+ Review Guide. Exam SY0-601 5ed 2021.pdf

14.7 MB

/.../AWS Certified Cloud Practitioner CLF-C01/Introduction/

001. AWS Certified Cloud Practitioner (CLF-C01) Introduction.mp4

21.7 MB

/.../Module 1 Exam Foundation/

001. Module introduction.mp4

3.6 MB

/.../Lesson 1 Exam Guide/

001. Learning objectives.mp4

3.2 MB

002. 1.1 Introduction.mp4

12.5 MB

003. 1.2 Target Candidate Description.mp4

11.9 MB

004. 1.3 Exam Content.mp4

11.0 MB

005. 1.4 Exam Question Domains.mp4

21.7 MB

/.../Lesson 2 Exam Registration and Exam Strategies/

001. Learning objectives.mp4

3.5 MB

002. 2.1 Testing Center Registration.mp4

11.2 MB

003. 2.2 Testing Center Strategies.mp4

9.1 MB

004. 2.3 Online Proctoring Registration.mp4

6.9 MB

005. 2.4 Online Proctoring Strategies.mp4

15.4 MB

006. 2.5 Exam Question Format.mp4

11.7 MB

007. 2.6 Exam Answer Strategies.mp4

14.9 MB

/.../Module 2 Cloud Concepts/

001. Module introduction.mp4

4.2 MB

/.../Lesson 3 AWS Cloud and Value Proposition/

001. Learning objectives.mp4

3.8 MB

002. 3.1 AWS Cloud Definition.mp4

13.6 MB

003. 3.2 Cloud Value Proposition Part 1.mp4

14.9 MB

004. 3.3 Cloud Value Proposition Part 2.mp4

15.7 MB

005. 3.4 Question Breakdown 1.mp4

16.2 MB

006. 3.5 Cloud Business Value.mp4

18.4 MB

007. 3.6 Question Breakdown 2.mp4

16.4 MB

/.../Lesson 4 Cloud Economics/

001. Learning objectives.mp4

3.9 MB

002. 4.1 Total Cost of Ownership.mp4

21.0 MB

003. 4.2 CapEx vs OpEx.mp4

17.6 MB

004. 4.3 Question Breakdown 1.mp4

11.2 MB

005. 4.4 On-premises (KTLO) Operations.mp4

20.5 MB

006. 4.5 Cloud Cost Benefits Part 1.mp4

14.7 MB

007. 4.6 Cloud Cost Benefits Part 2.mp4

21.7 MB

008. 4.7 Question Breakdown 2.mp4

15.9 MB

/.../Lesson 5 Cloud Architecture Design Principles/

001. Learning objectives.mp4

3.5 MB

002. 5.1 Simple Design Principles.mp4

18.2 MB

003. 5.2 Well-Architected Framework Basics.mp4

12.4 MB

004. 5.3 Well-Architected Framework Pillars Part 1.mp4

28.5 MB

005. 5.4 Well-Architected Framework Pillars Part 2.mp4

25.2 MB

006. 5.5 Question Breakdown 1.mp4

14.0 MB

/.../Module 3 Security and Compliance/

001. Module introduction.mp4

5.4 MB

/.../Lesson 6 AWS Shared Responsibility Model/

001. Learning objectives.mp4

4.1 MB

002. 6.1 Shared Responsibility Model Purpose.mp4

14.4 MB

003. 6.2 Customer Responsibility.mp4

11.9 MB

004. 6.3 AWS Responsibility.mp4

17.5 MB

005. 6.4 Question Breakdown 1.mp4

16.9 MB

/.../Lesson 7 Cloud Security and Compliance Concepts/

001. Learning objectives.mp4

4.1 MB

002. 7.1 Compliance Information.mp4

16.6 MB

003. 7.2 Compliance Strategies.mp4

22.3 MB

004. 7.3 Question Breakdown 1.mp4

14.8 MB

005. 7.4 Auditing and Reporting.mp4

15.5 MB

006. 7.5 Least Privilege Concepts and Strategies.mp4

16.2 MB

007. 7.6 Question Breakdown 2.mp4

12.4 MB

/.../Lesson 8 AWS Access Management/

001. Learning objectives.mp4

4.4 MB

002. 8.1 User and Identity Management Basics.mp4

19.6 MB

003. 8.2 AWS Credentials and MFA.mp4

13.8 MB

004. 8.3 AWS Root Account.mp4

17.3 MB

005. 8.4 AWS IAM Users and Groups.mp4

27.6 MB

006. 8.5 AWS IAM Roles and Policies.mp4

11.8 MB

007. 8.6 Question Breakdown 1.mp4

12.6 MB

/.../Lesson 9 Security Support Resources/

001. Learning objectives.mp4

6.0 MB

002. 9.1 AWS Network Security Capabilities.mp4

18.2 MB

003. 9.2 Security Documentation Types.mp4

12.2 MB

004. 9.3 AWS Trusted Advisor.mp4

14.0 MB

005. 9.4 Question Breakdown 1.mp4

13.0 MB

/.../AWS Certified Cloud Practitioner CLF-C01/Module 4 Technology/

001. Module introduction.mp4

4.3 MB

/.../Lesson 10 AWS Cloud Deployment and Operations/

001. Learning objectives.mp4

5.1 MB

002. 10.1 AWS Interaction Options.mp4

20.7 MB

003. 10.2 Question Breakdown 1.mp4

12.0 MB

004. 10.3 Cloud Deployment Models.mp4

12.9 MB

005. 10.4 AWS Network Connectivity Options.mp4

11.2 MB

006. 10.5 Question Breakdown 2.mp4

16.7 MB

/.../Lesson 11 AWS Global Infrastructure/

001. Learning objectives.mp4

3.7 MB

002. 11.1 Data Centers.mp4

14.8 MB

003. 11.2 Availability Zones.mp4

9.8 MB

004. 11.3 Regions.mp4

23.2 MB

005. 11.4 Edge Locations.mp4

19.3 MB

006. 11.5 Question Breakdown 1.mp4

11.3 MB

/.../Module 5 Core AWS Services/

001. Module introduction.mp4

5.0 MB

/.../Lesson 12 Compute and Storage/

001. Learning objectives.mp4

8.0 MB

002. 12.1 Core Service Categories.mp4

6.5 MB

003. 12.2 Compute Service Summary.mp4

10.4 MB

004. 12.3 Elastic Compute Cloud (EC2).mp4

22.3 MB

005. 12.4 EC2 Auto Scaling.mp4

20.1 MB

006. 12.5 Elastic Load Balancing (ELB).mp4

21.5 MB

007. 12.6 Question Breakdown 1.mp4

13.1 MB

008. 12.7 Storage Service Summary.mp4

8.4 MB

009. 12.8 Simple Storage Service (S3) and Glacier.mp4

21.1 MB

010. 12.9 Elastic Block Store (EBS).mp4

10.8 MB

011. 12.10 AWS Snowball and Storage Gateway.mp4

12.5 MB

012. 12.11 Elastic File System (EFS).mp4

12.4 MB

013. 12.12 Question Breakdown 2.mp4

10.7 MB

/.../Lesson 13 Networking and Database/

001. Learning objectives.mp4

8.1 MB

002. 13.1 Network Service Summary.mp4

8.4 MB

003. 13.2 Virtual Private Cloud (VPC).mp4

36.6 MB

004. 13.3 VPC Security Groups.mp4

12.7 MB

005. 13.4 Route 53.mp4

23.6 MB

006. 13.5 VPN and AWS Direct Connect.mp4

17.5 MB

007. 13.6 Question Breakdown 1.mp4

14.9 MB

008. 13.7 Database Service Summary.mp4

13.3 MB

009. 13.8 Relational Database Service (RDS).mp4

18.9 MB

010. 13.9 DynamoDB.mp4

17.3 MB

011. 13.10 Redshift.mp4

15.2 MB

012. 13.11 Question Breakdown 2.mp4

17.3 MB

/.../Lesson 14 Technology Support Resources/

001. Learning objectives.mp4

4.5 MB

002. 14.1 Technology Support Documentation.mp4

12.7 MB

003. 14.2 AWS Support and Partner Network.mp4

14.3 MB

004. 14.3 AWS Trusted Advisor.mp4

11.8 MB

005. 14.4 Question Breakdown 1.mp4

15.9 MB

/.../Module 6 Billing and Pricing/

001. Module introduction.mp4

4.3 MB

/.../Lesson 15 EC2 Pricing Models/

001. Learning objectives.mp4

3.4 MB

002. 15.1 Pricing Model Summary.mp4

30.1 MB

003. 15.2 On-Demand Scenario.mp4

10.2 MB

004. 15.3 Reserved-Instance Scenario.mp4

19.1 MB

005. 15.4 Spot Instance Scenario.mp4

14.0 MB

006. 15.5 Question Breakdown 1.mp4

14.4 MB

/.../Lesson 16 Multiple Account Strategies/

001. Learning objectives.mp4

3.2 MB

002. 16.1 AWS Organizations.mp4

19.7 MB

003. 16.2 AWS Organizations Benefits.mp4

21.4 MB

004. 16.3 Multiple Account Cost Allocation.mp4

10.1 MB

005. 16.4 Question Breakdown 1.mp4

15.2 MB

/.../Lesson 17 Billing Support Resources/

001. Learning objectives.mp4

4.4 MB

002. 17.1 Cost Explorer.mp4

11.8 MB

003. 17.2 Cost and Usage Report.mp4

12.1 MB

004. 17.3 AWS Pricing Calculator and Pricing API.mp4

16.6 MB

005. 17.4 Free Tier and Free Tier Usage Dashboard.mp4

13.7 MB

006. 17.5 Budgets.mp4

17.6 MB

007. 17.6 Cost Allocation Tags.mp4

11.4 MB

008. 17.7 Cost Optimization Fundamental Principles.mp4

24.0 MB

009. 17.8 Question Breakdown 1.mp4

21.6 MB

/.../Module 7 Next Steps/

001. Module introduction.mp4

4.1 MB

/.../Lesson 18 Further Study/

001. Learning objectives.mp4

4.5 MB

002. 18.1 Documentation.mp4

23.7 MB

003. 18.2 Hands-on Learning.mp4

17.1 MB

004. 18.3 Sample Questions.mp4

16.9 MB

/.../AWS Certified Cloud Practitioner CLF-C01/Summary/

001. AWS Certified Cloud Practitioner (CLF-C01) Summary.mp4

6.6 MB

/.../Certified Cloud Security Professional (CCSP)/Introduction/

001. Certified Cloud Security Professional (CCSP) Introduction.mp4

8.0 MB

/.../Module 1 Cloud Concepts, Architecture, and Design/

001. Module introduction.mp4

1.7 MB

/.../Lesson 1 Concepts and Architectures of Cloud Computing/

001. Learning objectives.mp4

3.2 MB

002. 1.1 Key Cloud Computing Definitions.mp4

41.9 MB

003. 1.2 Roles and Responsibilities in Cloud Computing.mp4

20.9 MB

004. 1.3 Core Cloud Computing Characteristics.mp4

23.3 MB

005. 1.4 Cloud Building Block Technologies.mp4

81.1 MB

006. 1.5 Cloud Computing Activities and Capabilities.mp4

113.1 MB

007. 1.6 Categories of Cloud Services.mp4

33.9 MB

008. 1.7 Cloud Deployment Models.mp4

37.0 MB

009. 1.8 Shared Considerations for the Cloud.mp4

24.4 MB

010. 1.9 Impact of Cloud and Related Technologies.mp4

50.3 MB

/.../Lesson 2 Cloud Security Concepts and Design Principles/

001. Learning objectives.mp4

3.9 MB

002. 2.1 Cryptography and Key Management.mp4

43.4 MB

003. 2.2 Identity and Access Control.mp4

24.5 MB

004. 2.3 Network and Virtualization Security.mp4

49.8 MB

005. 2.4 Common Cloud Threats.mp4

21.9 MB

006. 2.5 Cloud Security Hygiene.mp4

32.1 MB

007. 2.6 Cloud Business Continuity and Disaster Recovery.mp4

20.6 MB

008. 2.7 Functional Security Requirements in the Cloud.mp4

42.5 MB

009. 2.8 Security Considerations for Cloud Service Types.mp4

32.8 MB

010. 2.9 Cloud Design Patterns.mp4

32.2 MB

011. 2.10 DevOps Security.mp4

12.7 MB

/.../Module 2 Cloud Data Security/

001. Module introduction.mp4

1.5 MB

/.../Lesson 3 The Cloud Data Lifecycle/

001. Learning objectives.mp4

2.4 MB

002. 3.1 Phase 1 Create.mp4

15.6 MB

003. 3.2 Phase 2 Store.mp4

8.8 MB

004. 3.3 Phase 3 Use.mp4

9.5 MB

005. 3.4 Phase 4 Share.mp4

9.0 MB

006. 3.5 Phase 5 Archive.mp4

13.4 MB

007. 3.6 Phase 6 Destroy.mp4

6.0 MB

008. 3.7 Cloud Data Flows.mp4

56.1 MB

/.../Lesson 4 Cloud Data Security/

001. Learning objectives.mp4

2.8 MB

002. 4.1 Concepts of Cloud Data Security.mp4

24.2 MB

003. 4.2 Data Obfuscation.mp4

16.1 MB

004. 4.3 Information Rights Management.mp4

12.1 MB

005. 4.4 Keys, Secrets, and Certificate Management.mp4

13.5 MB

006. 4.5 Data Discovery.mp4

17.7 MB

007. 4.6 Data Classification and Policy.mp4

21.1 MB

008. 4.7 Auditability, Traceability, and Accountability.mp4

19.0 MB

/.../Module 3 Cloud Platform and Infrastructure Security/

001. Module introduction.mp4

1.8 MB

/.../Lesson 5 Cloud Infrastructure and Platform Components/

001. Learning objectives.mp4

2.6 MB

002. 5.1 Physical Cloud Environments.mp4

24.7 MB

003. 5.2 Network Cloud Environments.mp4

54.2 MB

004. 5.3 Cloud Communications.mp4

14.0 MB

005. 5.4 Core Cloud Compute Resources.mp4

19.6 MB

006. 5.5 Cloud Virtualization Resources.mp4

15.9 MB

007. 5.6 Core Cloud Storage Components.mp4

13.7 MB

008. 5.7 Management Plane Cloud Solutions.mp4

67.0 MB

/.../Lesson 6 Data Center Design and Risk Analysis/

001. Learning objectives.mp4

2.8 MB

002. 6.1 Secure Data Center Logical Design.mp4

33.3 MB

003. 6.2 Physical Data Center Design.mp4

100.4 MB

004. 6.3 Data Center Environmental Design.mp4

35.1 MB

005. 6.4 Design Resilient Environments.mp4

23.3 MB

006. 6.5 Cloud Infrastructure Risk Assessment.mp4

54.8 MB

007. 6.6 Cloud Vulnerabilities, Threats, and Attacks.mp4

14.9 MB

008. 6.7 Cloud Infrastructure Risk Mitigation Strategies.mp4

64.9 MB

/.../Lesson 7 Cloud Business Continuity Planning/

001. Learning objectives.mp4

2.3 MB

002. 7.1 Business Continuity Planning.mp4

25.9 MB

003. 7.2 Business Impact Analysis.mp4

30.6 MB

004. 7.3 Backup and Restore Policies.mp4

11.3 MB

005. 7.4 Disaster Recovery Planning.mp4

24.1 MB

006. 7.5 Disaster Recovery Plan Testing Strategies.mp4

53.2 MB

/.../Module 4 Cloud Application Security/

001. Module introduction.mp4

2.0 MB

/.../Lesson 8 Application Security Awareness and Life Cycles/

001. Learning objectives.mp4

2.8 MB

002. 8.1 Cloud Application Architecture Elements.mp4

33.4 MB

003. 8.2 Cloud Development.mp4

23.6 MB

004. 8.3 SDLC Business Requirements and Phases.mp4

78.6 MB

005. 8.4 Common Software Vulnerabilities.mp4

24.3 MB

006. 8.5 Software Threat Modeling Methods.mp4

35.3 MB

007. 8.6 Secure Coding Methodologies.mp4

22.7 MB

008. 8.7 Software Configuration Management and Versioning.mp4

20.8 MB

/.../Lesson 9 Software Assurance and Validation/

001. Learning objectives.mp4

2.3 MB

002. 9.1 Functional vs. Non-functional Testing.mp4

14.0 MB

003. 9.2 Security Testing Methodologies.mp4

19.1 MB

004. 9.3 Abuse Case Testing.mp4

8.8 MB

005. 9.4 OWASP API Security.mp4

12.2 MB

006. 9.5 Supply Chain Management.mp4

69.7 MB

007. 9.6 Third-party Software Management.mp4

21.5 MB

/.../Lesson 10 Identity and Access Management Solutions/

001. Learning objectives.mp4

2.5 MB

002. 10.1 Cloud IAM Services.mp4

32.7 MB

003. 10.2 Federated Identity.mp4

9.1 MB

004. 10.3 Identity Providers.mp4

22.4 MB

005. 10.4 Single Sign-on.mp4

22.4 MB

006. 10.5 Multi-factor Authentication.mp4

4.6 MB

007. 10.6 Cloud Access Security Brokers.mp4

7.6 MB

008. 10.7 Managed Security Service Providers.mp4

10.1 MB

/.../Module 5 Cloud Security Operations/

001. Module introduction.mp4

1.6 MB

/.../Lesson 11 Build and Implement a Physical and Logical Cloud Infrastructure/

001. Learning objectives.mp4

4.2 MB

002. 11.1 Hardware-specific Security Configuration.mp4

12.3 MB

003. 11.2 Installation and Configuration of Management Tools.mp4

17.2 MB

004. 11.3 SDS and Securing Storage Area Networks.mp4

28.1 MB

005. 11.4 Installation of Guest OS Virtualization Tools.mp4

8.3 MB

006. 11.5 Secure Network Configuration.mp4

133.1 MB

007. 11.6 Network Security Controls.mp4

53.0 MB

008. 11.7 Operating System Hardening.mp4

6.0 MB

009. 11.8 Patch Management and Infrastructure as Code (IaC).mp4

16.8 MB

010. 11.9 Clustered Host Availability.mp4

17.3 MB

011. 11.10 Performance and Capacity Monitoring.mp4

23.3 MB

/.../Lesson 12 Operational Controls and Standards/

001. Learning objectives.mp4

3.1 MB

002. 12.1 Configuration and Change Management.mp4

28.9 MB

003. 12.2 Continuity Management.mp4

8.7 MB

004. 12.3 Information Security Management.mp4

4.7 MB

005. 12.4 Service Level Management.mp4

14.3 MB

006. 12.5 Incident and Problem Management.mp4

27.4 MB

007. 12.6 Release and Deployment Management.mp4

10.3 MB

008. 12.7 Availability Management.mp4

8.6 MB

009. 12.8 Capacity Management.mp4

5.0 MB

010. 12.9 Security Operations Centers (SOC).mp4

93.0 MB

011. 12.10 Intelligent Security Control Monitoring.mp4

52.2 MB

012. 12.11 Vulnerability Assessment.mp4

12.5 MB

/.../Module 6 Legal, Risk, and Compliance/

001. Module introduction.mp4

2.0 MB

/.../Lesson 13 Legal Requirements, Privacy Issues, and Risk Management in the Cloud/

001. Learning objectives.mp4

3.5 MB

002. 13.1 Conflicting International Legislation.mp4

31.0 MB

003. 13.2 eDiscovery and Forensics.mp4

15.4 MB

004. 13.3 Issues with PHI and PII in the Cloud.mp4

10.1 MB

005. 13.4 Standard Privacy Requirements.mp4

9.1 MB

006. 13.5 Privacy Impact Assessments (PIAs).mp4

9.8 MB

007. 13.6 Risk Treatment.mp4

14.8 MB

008. 13.7 Provider Risk Assessment Programs.mp4

12.1 MB

009. 13.8 Regulatory Transparency Requirements.mp4

12.1 MB

/.../Lesson 14 Cloud Audits, Methodologies, and Contracts/

001. Learning objectives.mp4

3.2 MB

002. 14.1 Audit Controls, Reports, and Their Impact.mp4

7.3 MB

003. 14.2 Gap Analysis and Internal InfoSec Management Systems.mp4

10.4 MB

004. 14.3 Policies and Stakeholder Involvement.mp4

13.9 MB

005. 14.4 Specialized Compliance Requirements.mp4

10.8 MB

006. 14.5 The Impact of Distributed IT.mp4

13.2 MB

007. 14.6 Business Agreement Requirements.mp4

10.6 MB

008. 14.7 Supply Chain Management.mp4

5.3 MB

/.../Certified Cloud Security Professional (CCSP)/Summary/

001. Certified Cloud Security Professional (CCSP) Summary.mp4

2.4 MB

/.../Microsoft Azure Fundamentals AZ-900/Introduction/

001. Exam AZ-900 Microsoft Azure Fundamentals Introduction.mp4

30.7 MB

/.../Module 1 Describe Cloud Concepts/

001. Module introduction.mp4

5.1 MB

/.../Lesson 1 Describe cloud computing/

001. Learning objectives.mp4

5.6 MB

002. 1.1 Define cloud computing.mp4

2.1 MB

003. 1.2 Describe the shared responsibility model.mp4

3.3 MB

004. 1.3 Define cloud models.mp4

17.5 MB

005. 1.4 Consumption-based model.mp4

3.9 MB

/.../Lesson 2 Describe the benefits of using cloud services/

001. Learning objectives.mp4

4.6 MB

002. 2.1 Explain high availability and scalability.mp4

9.3 MB

003. 2.2 Define reliability and predictability.mp4

5.2 MB

004. 2.3 Describe security and governance.mp4

5.9 MB

005. 2.4 Explain manageability in the cloud.mp4

7.6 MB

/.../Lesson 3 Describe cloud service types/

001. Learning objectives.mp4

3.9 MB

002. 3.1 Describe infrastructure as a service (IaaS).mp4

5.7 MB

003. 3.2 Describe platform as a service (PaaS).mp4

6.1 MB

004. 3.3 Describe software as a service (SaaS).mp4

4.4 MB

/.../Module 2 Describe Azure Architecture and Services/

001. Module introduction.mp4

7.7 MB

/.../Lesson 4 Describe the core architectural components of Azure/

001. Learning objectives.mp4

6.7 MB

002. 4.1 Define Azure regions, region pairs, and sovereign regions.mp4

14.6 MB

003. 4.2 Explain availability zones.mp4

6.1 MB

004. 4.3 Describe Azure datacenters.mp4

3.6 MB

005. 4.4 Describe Azure resources and resource groups.mp4

5.3 MB

006. 4.5 Describe management groups.mp4

3.6 MB

/.../Lesson 5 Describe Azure compute and networking services/

001. Learning objectives.mp4

6.4 MB

002. 5.1 Compare compute types.mp4

13.9 MB

003. 5.2 Describe VM options.mp4

11.7 MB

004. 5.3 Describe resources required for virtual machines.mp4

23.3 MB

005. 5.4 Describe application hosting options.mp4

48.7 MB

006. 5.5 Describe virtual networking.mp4

22.9 MB

007. 5.6 Define public and private endpoints.mp4

5.1 MB

/.../Lesson 6 Describe Azure storage services/

001. Learning objectives.mp4

7.8 MB

002. 6.1 Compare Azure storage services.mp4

9.9 MB

003. 6.2 Describe storage tiers.mp4

5.2 MB

004. 6.3 Describe redundancy options.mp4

9.6 MB

005. 6.4 Describe storage account options.mp4

4.1 MB

006. 6.5 Identify options for moving files.mp4

23.1 MB

007. 6.6 Describe migration options.mp4

20.0 MB

/.../Lesson 7 Describe Azure identity, access, and security/

001. Learning objectives.mp4

9.8 MB

002. 7.1 Describe directory services in Azure.mp4

23.2 MB

003. 7.2 Describe authentication methods in Azure.mp4

19.7 MB

004. 7.3 Describe Azure AD Conditional Access.mp4

6.6 MB

005. 7.4 Describe Azure role-based access control (RBAC).mp4

19.8 MB

006. 7.5 Describe Zero-Trust and defense in depth.mp4

6.7 MB

007. 7.6 Describe Microsoft Defender for Cloud.mp4

7.1 MB

/.../Module 3 Describe Azure Management and Governance/

001. Module introduction.mp4

13.1 MB

/.../Lesson 8 Describe cost management in Azure/

001. Learning objectives.mp4

5.7 MB

002. 8.1 Describe factors that can affect costs.mp4

9.7 MB

003. 8.2 Compare the Pricing calculator and the Total Cost of Ownership (TCO) calculator.mp4

27.8 MB

004. 8.3 Describe the Azure Cost Management and Billing tool.mp4

11.1 MB

005. 8.4 Describe tags.mp4

12.7 MB

/.../Lesson 9 Describe features and tools for governance and compliance/

001. Learning objectives.mp4

4.6 MB

002. 9.1 Describe Azure Blueprints.mp4

6.2 MB

003. 9.2 Describe Azure Policy.mp4

5.6 MB

004. 9.3 Describe resource locks.mp4

10.7 MB

/.../Lesson 10 Describe features and tools for managing and deploying resources/

001. Learning objectives.mp4

6.5 MB

002. 10.1 Describe the Azure portal.mp4

19.4 MB

003. 10.2 Describe command-line tools.mp4

33.5 MB

004. 10.3 Describe Azure Arc.mp4

7.4 MB

005. 10.4 Describe Azure Resource Manager (ARM).mp4

14.0 MB

/.../Lesson 11 Describe monitoring tools/

001. Learning objectives.mp4

5.4 MB

002. 11.1 Describe Azure Advisor.mp4

16.2 MB

003. 11.2 Describe Azure Service Health.mp4

11.7 MB

004. 11.3 Describe Azure Monitor.mp4

19.4 MB

/.../Microsoft Azure Fundamentals AZ-900/Summary/

001. Exam AZ-900 Microsoft Azure Fundamentals Summary.mp4

43.1 MB

/.../CompTIA A+ Core 1 (220-1101)/1. Mobile Devices/

1.1 Overview.mp4

63.2 MB

1.2 Laptop Hardware and Components.mp4

525.8 MB

1.3 Mobile Device Ports and Accessories.mp4

348.8 MB

1.4. Mobile Device Displays.mp4

289.5 MB

1.5 Mobile Device Network Connections.mp4

235.5 MB

1.6 Mobile Device Application Support.mp4

144.3 MB

/.../CompTIA A+ Core 1 (220-1101)/2. Networking/

2.1 Ports and Protocols.mp4

298.4 MB

2.2 Networking Hardware.mp4

315.0 MB

2.3 Wireless Protocols.mp4

251.4 MB

2.4 Networked Hosts and Services.mp4

260.9 MB

2.5 Domain Name System (DNS).mp4

148.0 MB

2.6 Dynamic Host Configuration Protocol (DHCP).mp4

167.1 MB

2.7 IP Address Format.mp4

250.1 MB

2.8 IP Address Configuration.mp4

107.6 MB

2.9 Internet Connection Types.mp4

284.4 MB

2.10 Network Types.mp4

152.6 MB

2.11 Network Tools.mp4

373.2 MB

/.../CompTIA A+ Core 1 (220-1101)/3. Hardware/

3.1 Network Cables.mp4

637.3 MB

3.2 Peripheral and Video Cables.mp4

485.9 MB

3.3 Storage Device Cables.mp4

258.0 MB

3.4 Random-access Memory.mp4

579.5 MB

3.5 Storage Devices.mp4

527.8 MB

3.6 Motherboards.mp4

540.8 MB

3.7 BIOS and UEFI.mp4

157.7 MB

3.8 Processors.mp4

344.2 MB

3.9 Expansion Cards.mp4

427.8 MB

3.10 Power Supplies.mp4

343.3 MB

3.11 Printer Configuration.mp4

350.8 MB

3.12 Printers.mp4

241.3 MB

/.../4. Virtualization and Cloud Computing/

4.1 Cloud Models and Services.mp4

263.0 MB

4.2 Virtualization.mp4

365.7 MB

/.../5. Troubleshooting Hardware and Networking/

5.1 Troubleshooting Methodology.mp4

287.7 MB

5.2 Troubleshooting PC Components.mp4

697.8 MB

5.3 Troubleshooting Storage.mp4

211.2 MB

5.4 Troubleshooting Display Issues.mp4

251.4 MB

5.5 Troubleshooting Printers.mp4

290.7 MB

5.6 Troubleshooting Mobile Devices.mp4

232.8 MB

5.7 Troubleshooting Networks.mp4

237.5 MB

/.../CompTIA A+ Core 2 (220-1102)/1. Operating Systems/

1.1 Overview.mp4

75.4 MB

1.2 Mobile Operating Systems.mp4

261.5 MB

1.3 Windows OS.mp4

137.7 MB

1.4 Installation Requirements.mp4

218.1 MB

1.5 OS Boot and Installation Methods.mp4

215.0 MB

1.6 Partitioning and File Systems.mp4

239.3 MB

1.7 Post Installation Tasks.mp4

234.8 MB

1.8 Windows Client Networking Configuration.mp4

292.9 MB

1.9 Windows Command Line Tools.mp4

311.8 MB

1.10 Windows Network Commands.mp4

267.4 MB

1.11 Using Microsoft System Utilities.mp4

210.5 MB

1.12 Desktop Operating Systems.mp4

319.7 MB

1.13 macOS Tools and Features.mp4

176.1 MB

1.14 Linux Commands.mp4

250.6 MB

1.15 Using Microsoft Control Panel Utilities.mp4

293.9 MB

/.../CompTIA A+ Core 2 (220-1102)/2. Security/

2.1 Implementing Physical Security Measures.mp4

233.2 MB

2.2 Logical User Security Concepts.mp4

357.2 MB

2.3 Logical Device and Network Security Concepts.mp4

240.0 MB

2.4 Wireless SOHO Security.mp4

381.6 MB

2.5 Malware Types.mp4

380.4 MB

2.6 Social Engineering Techniques and Exploits.mp4

425.4 MB

2.7 Microsoft OS Security - Permissions.mp4

253.8 MB

2.8 Microsoft OS Security Features.mp4

207.1 MB

2.9 Workstation Security Best Practices.mp4

228.9 MB

2.10 Mobile Device Security Solutions.mp4

265.1 MB

2.11 Securing Web Browsers.mp4

257.0 MB

/.../CompTIA A+ Core 2 (220-1102)/3. Software Troubleshooting/

3.1 Windows OS Issues.mp4

336.2 MB

3.2 Additional Windows OS Issues.mp4

194.2 MB

3.3 PC Security Issues.mp4

310.6 MB

3.4 Malware Removal Best Practices.mp4

169.3 MB

3.5 Mobile OS and Application Issues.mp4

333.6 MB

3.6 Mobile OS and Application Security Issues.mp4

295.9 MB

/.../CompTIA A+ Core 2 (220-1102)/4. Operational Procedures/

4.1 Organizational Documentation.mp4

200.2 MB

4.2 Basic Change Management Best Practices.mp4

211.1 MB

4.3 Workstation Backup and Recovery Methods.mp4

330.2 MB

4.4 Equipment and Personal Safety Procedures.mp4

338.9 MB

4.5 Environmental Variables and Controls.mp4

212.8 MB

4.6 Privacy and Licensing Concepts.mp4

153.4 MB

4.7 Incident Response Policies and Procedures.mp4

305.5 MB

4.8 Communication and Professionalism Techniques.mp4

449.5 MB

4.9 Introduction to Basic Scripting Techniques.mp4

145.0 MB

4.10 Implementing Remote Access Technologies.mp4

252.1 MB

/.../CompTIA CySA+ (CS0-002)/

comptia-cysaplus-cs0002.zip

3.0 MB

/.../1. Threat and Vulnerability Management/

1.1 Overview.mp4

83.9 MB

1.2 Intelligence Sources.mp4

253.5 MB

1.3 Indicator Management.mp4

241.9 MB

1.4 Confidence Levels.mp4

113.8 MB

1.5 Threat Classification.mp4

333.7 MB

1.6 Threat Actors.mp4

377.7 MB

1.7 Intelligence Cycle.mp4

319.0 MB

1.8 Commodity Malware.mp4

215.4 MB

1.9 Information Sharing and Analysis Centers.mp4

285.6 MB

1.10 Attack Frameworks.mp4

250.6 MB

1.11 Threat Research.mp4

338.7 MB

1.12 Threat Modeling Methodologies.mp4

331.2 MB

1.13 Threat Intelligence Sharing, Supported Functions.mp4

242.0 MB

1.14 Vulnerability Identification and Validation.mp4

366.0 MB

1.15 Vulnerability Remediation and Mitigation.mp4

381.2 MB

1.16 Vulnerability Scanning Parameters and Criteria.mp4

326.5 MB

1.17 Inhibitors to Remediation.mp4

346.8 MB

1.18 Web App Scanners.mp4

237.2 MB

1.19 Infrastructure Vulnerability Scanners.mp4

203.4 MB

1.20 Software Assessment Tools and Techniques.mp4

267.4 MB

1.21 Vulnerability Enumeration.mp4

187.8 MB

1.22 Wireless Assessment Tools.mp4

238.7 MB

1.23 Cloud Infrastructure Assessment Tools.mp4

201.6 MB

1.24 Mobile Technology Threats.mp4

305.8 MB

1.25 Premises and Vehicle Systems Threats.mp4

316.3 MB

1.26 Controller System Threats.mp4

301.4 MB

1.27 IoT and Embedded System Threats.mp4

297.2 MB

1.28 CVSS Metrics.mp4

191.1 MB

1.29 Cloud Deployment Model Threats.mp4

338.8 MB

1.30 Cloud Service Model Threats.mp4

346.9 MB

1.31 Other Cloud Service Threats.mp4

454.8 MB

1.32 Mitigate Specific Attack Types.mp4

445.7 MB

1.33 Mitigate Vulnerability Types.mp4

371.1 MB

/.../2. Software and Systems Security/

2.1 Asset Tagging and Change Management.mp4

296.0 MB

2.2 Network Architecture and Segmentation.mp4

444.4 MB

2.3 Identity and Access Management.mp4

423.5 MB

2.4 Virtual Desktop Infrastructure, Containerization.mp4

209.4 MB

2.5 Honeypots and Active Defense.mp4

275.3 MB

2.6 Cloud Access Security Broker.mp4

168.4 MB

2.7 Certificate Management.mp4

226.9 MB

2.8 Hardware Assurance.mp4

385.0 MB

2.9 Software Assurance and Secure Coding.mp4

376.2 MB

/.../3. Security Operations and Monitoring/

3.1 Trend Analysis.mp4

338.9 MB

3.2 URL Analysis.mp4

230.8 MB

3.3 DNS Analysis.mp4

221.4 MB

3.4 Packet and Protocol Analysis.mp4

156.0 MB

3.5 Flow Analysis.mp4

269.2 MB

3.6 Endpoint Behavior Analysis.mp4

329.2 MB

3.7 Malware Analysis.mp4

246.8 MB

3.8 Log Review.mp4

328.2 MB

3.9 Impact Analysis.mp4

237.2 MB

3.10 SIEM Review.mp4

240.5 MB

3.11 Email Analysis.mp4

353.8 MB

3.12 File System Permissions.mp4

212.1 MB

3.13 Blacklisting and Whitelisting.mp4

291.6 MB

3.14 Firewall Configurations.mp4

331.0 MB

3.15 Data Loss Prevention.mp4

301.5 MB

3.16 Network Access Control.mp4

244.5 MB

3.17 Blackholes and Sinkholes.mp4

229.8 MB

3.18 Malware Signatures.mp4

207.1 MB

3.19 Threat Hunting.mp4

286.0 MB

3.20 Scripting.mp4

233.3 MB

3.21 AI and Machine Learning.mp4

245.0 MB

3.22 Continuous Integration and Deployment.mp4

223.0 MB

/.../CompTIA CySA+ (CS0-002)/4. Incident Response/

4.1 Incident Response Communication.mp4

341.6 MB

4.2 Incident Response Phases.mp4

359.5 MB

4.3 Indicators of Compromise.mp4

279.4 MB

4.4 Digital Forensics.mp4

373.2 MB

/.../5. Compliance and Assessment/

5.1 Privacy vs. Security.mp4

365.2 MB

5.2 Non-Technical Controls - The Basics.mp4

486.5 MB

5.3 Non-Technical Controls - The Rest.mp4

526.4 MB

5.4 Technical Controls - The Basics.mp4

551.2 MB

5.5 Technical Controls - The Rest.mp4

400.8 MB

5.6 What is Risk.mp4

422.9 MB

5.7 How do we Calculate Risk.mp4

246.2 MB

5.8 How do we Analyze Risk.mp4

509.3 MB

5.9 How do we Prioritize, Communicate Risk.mp4

460.5 MB

5.10 How do we Document and Train for Risk.mp4

472.2 MB

5.11 Apply Risk Management to our Supply Chains.mp4

255.1 MB

5.12 Controls.mp4

407.9 MB

5.13 Policies and Procedures.mp4

397.7 MB

5.14 Frameworks, Audits and Policy.mp4

473.1 MB

5.15 IAM Policies and Procedures.mp4

463.2 MB

/.../1. Understanding Data and Information/

1. Understanding Data and Information .mp4

12.4 MB

2. Data and Information .mp4

39.3 MB

3. Structured and Unstructured Data .mp4

49.4 MB

4. Tabular Data .mp4

23.4 MB

5. KeyValue Pairs .mp4

73.5 MB

6. Bonus Materials .mp4

195.2 MB

/.../2. Explain Data Types/

1. Data Concepts and Environments .mp4

10.8 MB

2. Numeric Data .mp4

52.2 MB

3. Text Data .mp4

38.8 MB

4. Discrete and Continuous Data .mp4

36.6 MB

5. Dates and Times .mp4

31.4 MB

6. Multimedia .mp4

21.9 MB

/.../3. Identify File Formats/

1. Introduction .mp4

24.9 MB

2. Text Data .mp4

56.3 MB

3. JSON Files .mp4

42.5 MB

4. HTML .mp4

84.0 MB

5. XML .mp4

38.9 MB

6. Challenge .mp4

39.1 MB

/.../4. Explain Data Storage/

1. Introduction .mp4

14.8 MB

2. Relational Databases .mp4

43.4 MB

3. OLTP and OLAP .mp4

54.8 MB

4. Non-Relational Databases .mp4

37.5 MB

5. Schemas and Dimensions .mp4

43.8 MB

6. Extra Resources .mp4

19.2 MB

/.../5. Collect and Integrate Data/

1. Introduction .mp4

22.6 MB

2. ETL and ELT .mp4

36.7 MB

3. Public Datasets .mp4

72.8 MB

4. APIs .mp4

68.0 MB

5. Web Scraping .mp4

123.0 MB

6. Surveys and Observations .mp4

29.1 MB

7. Sampling .mp4

62.9 MB

/.../6. Clean and Profile Datasets/

1. Introduction .mp4

42.3 MB

2. Handling Duplicate Data .mp4

93.1 MB

3. Null or Missing Values .mp4

72.4 MB

4. Errors and Outliers .mp4

80.2 MB

5. Working with Outliers .mp4

40.4 MB

/.../CompTIA Data+ (DA0-001)/7. Manipulate Data/

1. Introduction .mp4

14.3 MB

2. Working with Strings .mp4

55.7 MB

3. Working with Dates .mp4

77.0 MB

4. Base and Derived Data .mp4

51.8 MB

5. Joining Datasets .mp4

36.6 MB

6. Bonus Resources .mp4

27.0 MB

/.../8. Recode, Sort, Filter, and Aggregate Data/

1. Introduction .mp4

20.6 MB

2. Recoding Data .mp4

50.4 MB

3. Sorting Data .mp4

72.8 MB

4. Filtering Data .mp4

49.0 MB

5. Aggregating Data .mp4

45.8 MB

6. Challenge .mp4

58.8 MB

/.../CompTIA Data+ (DA0-001)/9. Optimize Data/

1. Introduction .mp4

11.7 MB

2. Indexing .mp4

93.5 MB

3. Subsets .mp4

83.1 MB

4. Query Execution Plans .mp4

128.5 MB

5. Parameterization .mp4

68.8 MB

/.../10. Describe Measures of Central Tendencies/

1. Introduction .mp4

12.1 MB

2. Measures of Central Tendency .mp4

43.8 MB

3. Mode .mp4

28.4 MB

4. Median .mp4

55.4 MB

5. Mean .mp4

51.4 MB

6. Centrality and Distributions .mp4

44.3 MB

7. Centrality and Outliers .mp4

48.7 MB

8. Challenge .mp4

57.9 MB

/.../11. Describe Measures of Dispersion/

1. Introduction .mp4

14.5 MB

2. Range .mp4

79.6 MB

3. Variance Part 1 .mp4

24.1 MB

4. Variance Part 2 .mp4

46.8 MB

5. Standard Deviation .mp4

75.7 MB

6. Z-score .mp4

46.6 MB

7. Percentages .mp4

52.9 MB

/.../12. Explain Inferential Statistics/

1. Introduction .mp4

22.8 MB

2. Confidence Intervals Part 1 .mp4

38.0 MB

3. Confidence Intervals Part 2 .mp4

53.6 MB

4. Hypothesis Testing Part 1 .mp4

63.8 MB

5. Hypothesis Testing Part 2 .mp4

58.0 MB

6. T-test Part 1 .mp4

37.2 MB

7. T-test Part 2 .mp4

31.6 MB

/.../13. Apply Inferential Statistics/

1. Introduction -3.mp4

89.4 MB

2. AA Testing .mp4

91.6 MB

3. AB Testing Part 1 .mp4

119.6 MB

4. AB Testing Part 2 .mp4

67.2 MB

5. Correlation Testing .mp4

71.1 MB

6. Simple Linear Regression .mp4

37.2 MB

/.../14. Explore Analysis Techniques/

1. Introduction -5.mp4

20.6 MB

2. Business Questions .mp4

55.5 MB

3. EDA (Exploratory Data Analysis) .mp4

93.8 MB

4. Excel EDA .mp4

131.5 MB

5. Python EDA .mp4

46.0 MB

6.Analysis Types .mp4

54.3 MB

/.../15. Identify Data Analytics Tools/

1. Introduction .mp4

19.1 MB

2. Spreadsheets .mp4

28.7 MB

3. Programming Languages Part 1 .mp4

43.7 MB

4. Programming Languages Part 2 .mp4

22.4 MB

5. SQL (Structures Query Language) .mp4

55.3 MB

6. Machine Learning .mp4

52.7 MB

7. Other Analytics Tools .mp4

59.8 MB

8. Bonus Resources .mp4

36.5 MB

/.../16. Explain Business Requirements and Reports/

1. Introduction .mp4

17.5 MB

2. Meeting Requirements Part 1 .mp4

23.5 MB

3. Meeting Requirements Part 2 .mp4

28.2 MB

4. Building Cover Pages .mp4

82.2 MB

5. Applying Design Basics .mp4

96.9 MB

6. Including Documentation .mp4

40.9 MB

/.../17. Explain Dashboarding/

1. Introduction .mp4

18.5 MB

2. Dashboard Basics .mp4

58.0 MB

3. Dashboard Design .mp4

24.0 MB

4. Building Dashboards .mp4

32.8 MB

5. Presenting Dashboards .mp4

25.3 MB

6. Bonus Resource .mp4

101.3 MB

/.../18. Compare Visualizations/

1. Introduction .mp4

17.6 MB

2. Line Charts .mp4

34.2 MB

3. Scatterplots and Bubble Charts .mp4

44.8 MB

4. Pie Charts and Heat Maps .mp4

78.3 MB

5. Bar Charts and Histograms .mp4

42.2 MB

6. Tree Maps, Word Clouds, and Infographics .mp4

43.6 MB

/.../19. Describe Data Governance Concepts/

1. Introduction .mp4

25.5 MB

2. Data Governance .mp4

42.2 MB

3. Data Governance Roles .mp4

41.1 MB

4. Data Owner .mp4

100.9 MB

5. Data Steward .mp4

50.5 MB

6. Data Custodian .mp4

83.6 MB

7. Challenge .mp4

39.1 MB

/.../20. Describe Data Quality Control Concepts/

1. Introduction .mp4

16.7 MB

2. Master Data Management .mp4

109.9 MB

3. Data Dictionary .mp4

37.8 MB

4. Maintaining Data Quality .mp4

85.1 MB

5. Data Quality Validation .mp4

91.9 MB

/.../21. Identify Data Security Concepts/

1. Introduction .mp4

16.0 MB

2. What is Data Security .mp4

52.3 MB

3. Data Confidentiality .mp4

84.0 MB

4. Access Management .mp4

67.7 MB

5. Access Control Models .mp4

97.2 MB

/.../22. Identify Data Privacy Concepts/

1. Introduction -3.mp4

21.6 MB

2. What is Data Privacy .mp4

36.3 MB

3. Data Privacy Principles .mp4

83.6 MB

4. Anonymized Data .mp4

60.0 MB

5. Data Obfuscation .mp4

44.7 MB

/.../23. Explain Regulations and Compliance/

1. Introduction -5.mp4

28.9 MB

2. Regulatory Compliance Concepts .mp4

81.2 MB

3. Data Breaches .mp4

82.0 MB

4. The Gramm-Leach-Biley Act (GLBA) .mp4

43.1 MB

5. Health Insurance Portability and Accountability Act (HIPAA) .mp4

52.6 MB

6. Family Educational Rights and Privacy Act (FERPA) .mp4

37.9 MB

7. International Data Transfers .mp4

75.4 MB

/.../CompTIA IT Fundamentals+ (FC0-U61)/

comptia-itfunfc0u61.zip

6.9 MB

/.../CompTIA IT Fundamentals+ (FC0-U61)/1. Operating Systems/

1.1 Overview.mp4

69.2 MB

1.2 Computer Operating Systems.mp4

128.0 MB

1.3 Microsoft Windows.mp4

149.7 MB

1.4 Apple macOS.mp4

159.7 MB

1.5 GNU Linux.mp4

179.6 MB

/.../2. Software and Applications/

2.1 Software Usage Requirements.mp4

235.7 MB

2.2 Business and Productivity Software.mp4

154.0 MB

2.3 Business and Productivity Software Part 2.mp4

135.4 MB

2.4 Collaboration Software.mp4

169.5 MB

2.5 Web Browser Settings.mp4

159.5 MB

2.6 Web Browser Settings Part 2.mp4

152.1 MB

/.../CompTIA IT Fundamentals+ (FC0-U61)/3. Software Development/

3.1 Programming Concepts.mp4

162.9 MB

3.2 Programming Concepts Part 2.mp4

149.7 MB

3.3 Developing with Python.mp4

157.9 MB

/.../CompTIA IT Fundamentals+ (FC0-U61)/4. Computer Hardware/

4.1 Central Processing Unit (CPU).mp4

211.5 MB

4.2 Common Hardware.mp4

247.7 MB

4.3 Common Hardware Part 2.mp4

153.4 MB

4.4 Peripheral Devices.mp4

212.3 MB

4.5 Peripheral Devices Part 2.mp4

147.8 MB

4.6 Display Hardware.mp4

224.7 MB

4.7 Storage Hardware.mp4

252.4 MB

/.../CompTIA IT Fundamentals+ (FC0-U61)/5. Networking/

5.1 Basic Networking Concepts.mp4

160.7 MB

5.2 Basic Networking Concepts Part 2.mp4

190.8 MB

5.3 Configuring a Wireless Router.mp4

188.7 MB

5.4 Configuring a Wireless Router Part 2.mp4

127.1 MB

5.5 Connection and Service Types.mp4

127.1 MB

5.6 Connection and Service Types Part 2.mp4

186.5 MB

/.../CompTIA IT Fundamentals+ (FC0-U61)/6. Databases/

6.1 Database Concepts.mp4

172.8 MB

6.2 Querying a Database.mp4

146.7 MB

6.3 Table Design.mp4

165.6 MB

/.../CompTIA IT Fundamentals+ (FC0-U61)/7. Security/

7.1 Basic Security Principles.mp4

181.0 MB

7.2 Basic Security Principles Part 2.mp4

159.6 MB

7.3 Security Best Practices.mp4

148.0 MB

7.4 Security Best Practices Part 2.mp4

153.6 MB

7.5 Security Best Practices Part 3.mp4

125.9 MB

/.../CompTIA IT Fundamentals+ (FC0-U61)/8. Troubleshooting/

8.1 Troubleshooting Methodology.mp4

146.9 MB

8.2 Troubleshooting Methodology Part 2.mp4

104.8 MB

8.3 Troubleshooting Example.mp4

83.8 MB

/.../CompTIA Linux+ (XK0-005)/0. Introduction/

001. CompTIA Linux+ XK0-005 Introduction.mp4

9.5 MB

/.../Module 1 Essential Linux Management/

001. Module introduction.mp4

1.6 MB

/.../Lesson 1 Managing User Related Security/

001. Learning objectives.mp4

1.8 MB

002. 1.1 Managing ACLs.mp4

24.2 MB

003. 1.2 Managing File System Attributes.mp4

8.8 MB

004. 1.3 Configuring sudo.mp4

21.5 MB

005. 1.4 Using Policykit and pkexec.mp4

8.3 MB

006. Lesson 1 Lab Managing sudo.mp4

1.4 MB

007. Lesson 1 Lab Solution Managing sudo.mp4

6.6 MB

/.../Lesson 2 Network Management/

001. Learning objectives.mp4

2.6 MB

002. 2.1 Configuring Interfaces.mp4

33.7 MB

003. 2.2 Creating Static Routes.mp4

53.8 MB

004. 2.3 Managing DNS Clients.mp4

3.4 MB

005. 2.4 Understanding Name Service Switch.mp4

11.5 MB

006. 2.5 Understanding Network Bridges.mp4

7.2 MB

007. 2.6 Analyzing Network Socket.mp4

10.7 MB

008. 2.7 Analyzing Network Traffic with tcpdump and nmap.mp4

42.2 MB

009. Lesson 2 Lab Managing Custom Routes.mp4

2.0 MB

010. Lesson 2 Lab Solution Managing Custom Routes.mp4

10.1 MB

/.../Lesson 3 Managing Services/

001. Learning objectives.mp4

2.9 MB

002. 3.1 Understanding Systemd.mp4

5.5 MB

003. 3.2 Managing Unit State with systemd.mp4

18.7 MB

004. 3.3 Creating Custom systemd Service Configuration.mp4

19.2 MB

005. 3.4 Managing Targets.mp4

22.8 MB

006. 3.5 Understanding and Managing Unit Dependencies.mp4

13.6 MB

007. 3.6 Using Systemd Timers.mp4

27.2 MB

008. 3.7 Managing Systemd Sockets.mp4

14.9 MB

009. 3.8 Mounting File Systems with Systemd.mp4

7.8 MB

010. Lesson 3 Lab Managing Systemd Dependencies.mp4

1.8 MB

011. Lesson 3 Lab Solution Managing Systemd Dependencies.mp4

14.2 MB

/.../Module 2 Storage Management/

001. Module introduction.mp4

2.3 MB

/.../Lesson 4 Basic Hardware Management/

001. Learning objectives.mp4

3.2 MB

002. 4.1 Understanding Computer Hardware Components.mp4

20.3 MB

003. 4.2 Listing and Identifying Hardware Components.mp4

9.5 MB

004. 4.3 Managing Kernel Modules.mp4

15.8 MB

005. 4.4 Understanding systemd-udevd.mp4

16.2 MB

006. 4.5 Managing Udev Rules.mp4

14.4 MB

007. 4.6 Understanding dev, sys and proc Usage.mp4

18.8 MB

008. Lesson 4 Lab Monitoring Hardware.mp4

1.0 MB

009. Lesson 4 Lab Solution Monitoring Hardware.mp4

5.4 MB

/.../Lesson 5 Managing Partitions/

001. Learning objectives.mp4

4.0 MB

002. 5.1 Understanding MBR and GPT.mp4

8.3 MB

003. 5.2 Understanding Storage Device Names.mp4

12.5 MB

004. 5.3 Managing MBR Primary Partitions with fdisk.mp4

17.0 MB

005. 5.4 Managing MBR Extended and Logical Partitions with fdisk.mp4

30.9 MB

006. 5.5 Managing GPT Partitions with parted.mp4

13.1 MB

007. 5.6 Creating File Systems.mp4

26.1 MB

008. 5.7 Using UUIDs and Labels.mp4

21.4 MB

009. 5.8 Creating Swap Partitions.mp4

19.6 MB

010. 5.9 Creating LVM Volumes.mp4

46.1 MB

011. 5.10 Creating Software RAID Devices.mp4

24.3 MB

012. Lesson 5 Lab Managing Partitions.mp4

1.8 MB

013. Lesson 5 Lab Solution Managing Partitions.mp4

16.1 MB

/.../Lesson 6 Managing File Systems/

001. Learning objectives.mp4

3.5 MB

002. 6.1 Understanding File Systems.mp4

6.3 MB

003. 6.2 Automating File System Mounts through etcfstab.mp4

14.5 MB

004. 6.3 Using Labels and UUIDs.mp4

25.9 MB

005. 6.4 Monitoring Available Disk Space.mp4

7.2 MB

006. 6.5 Monitoring File Systems.mp4

10.7 MB

007. 6.6 Repairing File Systems.mp4

5.6 MB

008. 6.7 Managing Btrfs.mp4

18.8 MB

009. Lesson 6 Lab Managing File Systems.mp4

1.8 MB

010. Lesson 6 Lab Solution Managing File Systems.mp4

6.4 MB

/.../Module 3 Common Administration Tasks/

001. Module introduction.mp4

3.0 MB

/.../Lesson 7 Configuring Logging/

001. Learning objectives.mp4

2.7 MB

002. 7.1 Understanding Logging.mp4

19.2 MB

003. 7.2 Managing rsyslogd.mp4

24.8 MB

004. 7.3 Managing with Logrotate.mp4

12.5 MB

005. 7.4 Working with systemd-journald.mp4

17.8 MB

006. 7.5 Using the logger Command.mp4

3.3 MB

007. Lesson 7 Lab Configuring Logging.mp4

1.2 MB

008. Lesson 7 Lab Solution Configuring Logging.mp4

6.4 MB

/.../Lesson 8 Managing and Monitoring Performance/

001. Learning objectives.mp4

2.4 MB

002. 8.1 Analyzing top Output.mp4

30.2 MB

003. 8.2 Interpreting Memory Statistics.mp4

37.2 MB

004. 8.3 Understanding Cgroups.mp4

38.5 MB

005. 8.4 Managing Process Priority and Cgroups.mp4

5.3 MB

006. 8.5 Tuning Kernel Parameters.mp4

14.7 MB

007. Lesson 8 Lab Managing Performance.mp4

1.5 MB

008. Lesson 8 Lab Solution Managing Performance.mp4

4.9 MB

/.../Lesson 9 Managing the Boot Procedure/

001. Learning objectives.mp4

4.5 MB

002. 9.1 Understanding the Boot Procedure.mp4

12.2 MB

003. 9.2 Understanding BIOS and UEFI.mp4

6.2 MB

004. 9.3 Managing and Accessing UEFI from Linux.mp4

7.0 MB

005. 9.4 Managing GRUB2 Configuration.mp4

12.9 MB

006. 9.5 Installing a new GRUB Bootloader.mp4

29.0 MB

007. 9.6 Booting into Non-default Targets.mp4

8.6 MB

008. 9.7 Troubleshooting the Boot Procedure.mp4

25.2 MB

009. 9.8 Managing Initramfs.mp4

13.2 MB

010. 9.9 Understanding System V Init Legacy Boot.mp4

15.5 MB

011. Lesson 9 Lab Managing Initramfs.mp4

908.2 KB

012. Lesson 9 Lab Solution Managing Initramfs.mp4

5.5 MB

/.../Lesson 10 Managing File Compression and Backup/

001. Learning objectives.mp4

2.4 MB

002. 10.1 Understanding Backup Strategies.mp4

6.6 MB

003. 10.2 Working with cpio.mp4

13.1 MB

004. 10.3 Managing Clones with dd.mp4

14.9 MB

005. 10.4 Storing Backup Offsite.mp4

12.4 MB

006. 10.5 Checking File Integrity.mp4

8.3 MB

007. Lesson 10 Lab Managing Backups.mp4

2.3 MB

008. Lesson 10 Lab Solution Managing Backups.mp4

7.6 MB

/.../Lesson 11 Managing User Interfaces/

001. Learning objectives.mp4

2.7 MB

002. 11.1 Understanding Display Servers.mp4

4.8 MB

003. 11.2 Graphics Server Installation and Configuration.mp4

5.2 MB

004. 11.3 Understanding Graphical Desktops.mp4

7.2 MB

005. 11.4 Understanding Remote Access Protocols.mp4

3.1 MB

006. 11.5 Configuring Accessibility Features.mp4

4.3 MB

007. 11.6 Configuring Console Redirection.mp4

15.4 MB

008. Lesson 11 Lab Remotely Accessing the GUI.mp4

896.2 KB

009. Lesson 11 Lab Solution Remotely Accessing the GUI.mp4

8.5 MB

/.../Lesson 12 Troubleshooting Linux Issues/

001. Learning objectives.mp4

2.5 MB

002. 12.1 Troubleshooting Networking.mp4

13.9 MB

003. 12.2 Troubleshooting Storage Problems.mp4

21.8 MB

004. 12.3 Troubleshooting CPU Performance.mp4

21.7 MB

005. 12.4 Understanding Linux Memory Use.mp4

22.1 MB

006. 12.5 Troubleshooting Linux Memory.mp4

15.3 MB

007. 12.6 Resetting a Lost Root Password.mp4

25.4 MB

008. Lesson 12 Lab Analyzing Memory Use.mp4

1.2 MB

009. Lesson 12 Lab Solution Analyzing Memory Use.mp4

4.0 MB

/.../CompTIA Linux+ (XK0-005)/Module 4 Security/

001. Module introduction.mp4

2.5 MB

/.../Lesson 13 Configuring a Firewall/

001. Learning objectives.mp4

2.6 MB

002. 13.1 Understanding Network Ports.mp4

11.4 MB

003. 13.2 Understanding Firewalling.mp4

22.6 MB

004. 13.3 Managing ufw Firewalling.mp4

15.9 MB

005. 13.4 Managing firewalld.mp4

19.8 MB

006. 13.5 Managing iptables Firewalls.mp4

21.2 MB

007. Lesson 13 Lab Configuring Firewalling.mp4

1.7 MB

008. Lesson 13 Lab Solution Configuring Firewalling.mp4

11.5 MB

/.../Lesson 14 Securing Linux/

001. Learning objectives.mp4

2.8 MB

002. 14.1 Managing Boot Loader Password.mp4

19.6 MB

003. 14.2 Understanding and Managing chroot Jails.mp4

11.7 MB

004. 14.3 An Introduction to Auditing.mp4

30.1 MB

005. 14.4 Configuring MOTD.mp4

4.4 MB

006. 14.5 Managing LUKS Disk Encryption.mp4

35.6 MB

007. Lesson 14 Lab Configuring Auditing.mp4

1.1 MB

008. Lesson 14 Lab Solution Configuring Auditing.mp4

5.3 MB

/.../Lesson 15 Managing Secure Access Control/

001. Learning objectives.mp4

1.8 MB

002. 15.1 Understanding PAM.mp4

26.7 MB

003. 15.2 Managing TCP Wrappers.mp4

8.9 MB

004. Lesson 15 Lab Configuring PAM.mp4

1.0 MB

005. Lesson 15 Lab Solution Configuring PAM.mp4

15.3 MB

/.../Lesson 16 Managing SELinux and AppArmor/

001. Learning objectives.mp4

3.6 MB

002. 16.1 Understanding the Need for Mandatory Access Control (MAC).mp4

5.9 MB

003. 16.2 SELinux vs. AppArmor.mp4

4.4 MB

004. 16.3 Configuring AppArmor.mp4

30.0 MB

005. 16.4 Troubleshooting AppArmor.mp4

5.0 MB

006. 16.5 Configuring SELinux Mode.mp4

12.1 MB

007. 16.6 Working with SELinux Labels.mp4

34.1 MB

008. 16.7 Managing SELinux Booleans.mp4

14.7 MB

009. 16.8 Troubleshooting SELinux.mp4

22.4 MB

010. Lesson 16 Lab Configuring SELinux.mp4

1.1 MB

011. Lesson 16 Lab Solution Configuring SELinux.mp4

9.5 MB

/.../Module 5 Advanced Administration Tasks/

001. Module introduction.mp4

2.6 MB

/.../Lesson 17 Managing Linux Server Roles/

001. Learning objectives.mp4

2.6 MB

002. 17.1 Understanding and Managing Time Services.mp4

18.8 MB

003. 17.2 Understanding and Managing Certificate Services.mp4

27.2 MB

004. 17.3 Creating Self-Signed Certificates.mp4

26.7 MB

005. 17.4 Understanding Self-Signed Certificate Creation.mp4

18.0 MB

006. 17.5 Managing Datacenter Storage.mp4

36.2 MB

007. 17.6 Understanding and Managing NFS File Services.mp4

22.9 MB

008. 17.7 Understanding and Managing SMB File Services.mp4

31.1 MB

009. Lesson 17 Lab Creating Self-Signed Certificates.mp4

818.2 KB

010. Lesson 17 Lab Solution Creating Self-Signed Certificates.mp4

12.9 MB

/.../Lesson 18 An Introduction to Bash Shell Scripts/

001. Learning objectives.mp4

2.5 MB

002. 18.1 Understanding Bash Shell Scripts.mp4

6.3 MB

003. 18.2 Essential Shell Script Components.mp4

13.5 MB

004. 18.3 Using Conditional Statements in Shell Scripts.mp4

20.3 MB

005. 18.4 Using Advanced Scripting Options.mp4

20.1 MB

006. Lesson 18 Lab Writing a Shell Script.mp4

2.7 MB

007. Lesson 18 Lab Solution Writing a Shell Script.mp4

18.6 MB

/.../Lesson 19 Using Git for Version Control/

001. Learning objectives.mp4

2.7 MB

002. 19.1 Understanding Git.mp4

31.3 MB

003. 19.2 Creating Git Repositories.mp4

25.7 MB

004. 19.3 Using Git Repositories.mp4

8.6 MB

005. 19.4 Undoing Changes.mp4

12.5 MB

006. 19.5 Working with Branches.mp4

13.3 MB

007. 19.6 Merging Changes.mp4

6.1 MB

008. 19.7 Using gitignore.mp4

7.2 MB

009. Lesson 19 Lab Using Git with Branches.mp4

2.3 MB

010. Lesson 19 Lab Solution Using Git with Branches.mp4

16.8 MB

/.../Lesson 20 Configuration Management/

001. Learning objectives.mp4

3.6 MB

002. 20.1 Understanding Configuration Management.mp4

6.1 MB

003. 20.2 Understanding Configuration Management Solutions.mp4

5.3 MB

004. 20.3 Understanding CICD.mp4

8.2 MB

005. 20.4 Setting up Ansible for Configuration Management.mp4

18.7 MB

006. 20.5 Using Ansible Ad-hoc Commands.mp4

16.1 MB

007. 20.6 Using Ansible Playbooks.mp4

22.8 MB

008. Lesson 20 Lab Using Configuration Management.mp4

1.3 MB

009. Lesson 20 Lab Solution Using Configuration Management.mp4

16.1 MB

/.../Lesson 21 An Introduction to Containers/

001. Learning objectives.mp4

3.2 MB

002. 21.1 Understanding Containers.mp4

5.5 MB

003. 21.2 Understanding Container Runtimes.mp4

9.9 MB

004. 21.3 Running Containers in Docker and Podman.mp4

26.9 MB

005. 21.4 Managing Container Images.mp4

16.3 MB

006. 21.5 Understanding Kubernetes.mp4

3.6 MB

007. 21.6 Running a Container in Kubernetes.mp4

15.6 MB

008. Lesson 21 Lab Running Containers.mp4

1.5 MB

009. Lesson 21 Lab Solution Running Containers.mp4

8.2 MB

/.../CompTIA Linux+ (XK0-005)/Summary/

001. CompTIA Linux+ XK0-005 Summary.mp4

1.5 MB

001. Linux Fundamentals Summary.mp4

3.8 MB

/.../CompTIA Network+ (N10-008)/

comptia-netplusn10008.zip

76.1 MB

/.../CompTIA Network+ (N10-008)/1. Networking Fundamentals/

1.1 Overview.mp4

139.0 MB

1.2 OSI Model.mp4

311.4 MB

1.3 OSI and TCP-IP Models.mp4

279.2 MB

1.4 Encapsulation.mp4

243.8 MB

1.5 Network Topologies.mp4

232.1 MB

1.6 Network Types.mp4

233.1 MB

1.7 Virtualization.mp4

220.1 MB

1.8 Service Provider Links.mp4

231.0 MB

1.9 Copper Cables and Connections.mp4

250.1 MB

1.10 Fiber Cables and Connections.mp4

263.9 MB

1.11 Ethernet Standards.mp4

256.7 MB

1.12 Cable Management.mp4

213.4 MB

1.13 IP Addressing Schemes and Contexts.mp4

230.0 MB

1.14 IP Addressing IPv4.mp4

228.5 MB

1.15 IP Addressing Subnetting Basics.mp4

89.7 MB

1.16 IP Addressing Subnetting Example.mp4

188.1 MB

1.17 IP Addressing Subnetting Scenarios.mp4

202.0 MB

1.18 IP Addressing IPv6.mp4

232.7 MB

1.19 Protocols and Ports.mp4

221.3 MB

1.20 Network Services.mp4

221.6 MB

1.21 Network Services DNS.mp4

214.6 MB

1.22 Datacenter Network Architecture.mp4

234.9 MB

1.23 Cloud and Networking Concepts.mp4

264.8 MB

/.../CompTIA Network+ (N10-008)/2. Network Implementations/

2.1 Networking and Networked Devices.mp4

193.6 MB

2.2 Routing and Bandwidth Management.mp4

221.5 MB

2.3 Ethernet Switching.mp4

219.4 MB

2.4 Wireless Infrastructure.mp4

256.5 MB

2.5 Wireless Encryption Standards.mp4

188.7 MB

2.6 802.11 Standards.mp4

196.0 MB

2.7 Cellular Technologies.mp4

172.4 MB

/.../CompTIA Network+ (N10-008)/3. Network Operations/

3.1 Performance Metrics.mp4

179.8 MB

3.2 Interface Statistics.mp4

150.5 MB

3.3 Device Logs.mp4

176.1 MB

3.4 SNMP.mp4

171.8 MB

3.5 Environmental Factors.mp4

202.2 MB

3.6 Plans and Procedures.mp4

190.6 MB

3.7 Plans and procedures - BCDR.mp4

190.9 MB

3.8 Security Policies.mp4

289.3 MB

3.9 Organizational Documentation.mp4

256.1 MB

3.10 High Availability and Disaster Recovery.mp4

237.8 MB

/.../CompTIA Network+ (N10-008)/4. Network Security/

4.1 Security Concepts.mp4

259.9 MB

4.2 Security - Cryptography Basics.mp4

258.3 MB

4.3 Security - Defense in Depth.mp4

260.3 MB

4.4 Security - Authentication Methods.mp4

242.1 MB

4.5 Security - Assessment Types.mp4

214.9 MB

4.6 Technology-based Attacks.mp4

193.6 MB

4.7 Remote Connections.mp4

204.0 MB

4.8 Social Engineering.mp4

194.6 MB

4.9 Virtual Private Networks.mp4

209.3 MB

4.10 Physical Security.mp4

210.5 MB

4.11 Network Hardening - Best Practices.mp4

327.8 MB

4.12 Network Hardening - Wireless Security.mp4

185.9 MB

/.../CompTIA Network+ (N10-008)/5. Network Troubleshooting/

5.1 Troubleshooting - Identify the problem.mp4

172.4 MB

5.2 Troubleshooting - Establish and Test a Theory.mp4

187.5 MB

5.3 Troubleshooting - Plan and Implement a Solution.mp4

218.4 MB

5.4 Troubleshooting - Verify System Functionality.mp4

151.9 MB

5.5 Troubleshooting - Document the Issue.mp4

135.2 MB

5.6 Cabling Tools.mp4

206.6 MB

5.7 Cabling Issues.mp4

180.7 MB

5.8 Network Software Tools.mp4

198.1 MB

5.9 Troubleshooting with Ping.mp4

191.5 MB

5.10 IP Addressing Commands.mp4

209.4 MB

5.11 DNS Troubleshooting Commands.mp4

184.8 MB

5.12 Route Troubleshooting Commands.mp4

208.2 MB

5.13 Information Gathering Commands.mp4

184.7 MB

5.14 Additional Network Commands.mp4

232.9 MB

5.15 Wireless Network Issues.mp4

150.7 MB

5.16 Addressing Issues.mp4

185.9 MB

5.17 Network Service Issues.mp4

216.8 MB

5.18 Routing and Switching Issues.mp4

186.2 MB

/.../CompTIA PenTest + (PT0-002)/

comptia-pentestplus-pt0002.zip

4.7 MB

/.../1. Planning and Scoping/

1.1 Overview.mp4

148.3 MB

1.2 Regulation and Compliance.mp4

317.6 MB

1.3 Common Pentest Restrictions.mp4

272.4 MB

1.4 Legal Concepts and Documents.mp4

425.4 MB

1.5 Standards and Methodologies.mp4

338.6 MB

1.6 Scoping an Engagement.mp4

299.2 MB

1.7 Professionalism and Integrity.mp4

416.4 MB

/.../2. Information Gathering and Vunerabilities/

2.1 DNS Recon.mp4

221.5 MB

2.2 Target Recon.mp4

336.6 MB

2.3 Host Discovery and Enumeration.mp4

282.9 MB

2.4 Web and Cloud Discovery and Enumeration.mp4

364.7 MB

2.5 Defense Detection and Avoidance.mp4

337.5 MB

2.6 Vulnerability Scanning.mp4

403.8 MB

2.7 Nmap.mp4

354.3 MB

/.../3. Attacks and Exploits/

3.1 Exploit Resources.mp4

387.4 MB

3.2 Denial of Service.mp4

394.4 MB

3.3 ARP and DNS Poisoning.mp4

325.6 MB

3.4 Password Attacks.mp4

341.4 MB

3.5 VLAN Hopping.mp4

181.7 MB

3.6 MAC Spoofing.mp4

236.7 MB

3.7 Wireless Attacks.mp4

380.6 MB

3.8 OWASP Top 10 Web App Security Risks.mp4

390.5 MB

3.9 SSRF Attacks.mp4

220.3 MB

3.10 Business Logic Flaws.mp4

187.2 MB

3.11 SQL Injection Attacks.mp4

335.7 MB

3.12 Other Injection Attacks.mp4

304.5 MB

3.13 XSS Attacks.mp4

204.7 MB

3.14 Session Attacks.mp4

344.7 MB

3.15 API Attacks.mp4

306.0 MB

3.16 Cloud Attacks.mp4

455.2 MB

3.17 Mobile Attacks.mp4

439.8 MB

3.18 IoT Hacking.mp4

375.3 MB

3.19 Data Storage System Vulnerabilities.mp4

271.9 MB

3.20 ICS SCADA and IIOT Vulnerabilities.mp4

430.4 MB

3.21 Virtual Environment Vulnerabilities.mp4

211.6 MB

3.22 Container Vulnerabilities.mp4

224.8 MB

3.23 Social Engineering and Physical Attacks.mp4

498.2 MB

3.24 Post Exploitation Enumeration and Tools.mp4

277.1 MB

3.25 Network Segmentation Testing.mp4

192.7 MB

3.26 Privilege Escalation.mp4

354.6 MB

3.27 Persistence.mp4

303.0 MB

3.28 Detection Avoidance.mp4

329.4 MB

/.../4. Reporting and Communication/

4.1 Components of Written Reports.mp4

425.6 MB

4.2 Recommended Remediations.mp4

442.5 MB

4.3 Communication During a Pentest.mp4

478.0 MB

4.4 Post Report Delivery Activities.mp4

343.6 MB

/.../5. Tools and Code Analysis/

5.1 Basic Programming Concepts.mp4

387.3 MB

5.2 Analyze Scripts Or Code For Use In A Pentest.mp4

341.0 MB

5.3 Opportunities for Automation.mp4

200.0 MB

/.../CompTIA Security+ (SY0-601)/

comptia-secplusy0601.zip

174.5 MB

/.../1. Threats, Attacks, and Vulnerabilities/

1.1 Overview.mp4

80.3 MB

1.2 Social Engineering Techniques.mp4

225.3 MB

1.3 Malware.mp4

245.8 MB

1.4 Password Attacks - Types.mp4

149.5 MB

1.5 Password Attacks - Tools.mp4

157.9 MB

1.6 Application Attacks - Injections.mp4

176.9 MB

1.7 Application Attacks - System Resources.mp4

239.1 MB

1.8 Application Attacks - XSS and XSRF.mp4

117.6 MB

1.9 Application Attacks - Replay Attacks.mp4

148.1 MB

1.10 Network Attacks - DNS Attacks.mp4

255.1 MB

1.11 Network Attacks - Layer 2 Attacks.mp4

224.5 MB

1.12 Network Attacks - DoS and DDoS.mp4

149.5 MB

1.13 Network Attacks - MiTM and MiTB.mp4

138.9 MB

1.14 Network Attacks - Wireless.mp4

269.2 MB

1.15 Vulnerabilities.mp4

254.9 MB

1.16 Threat Intelligence - OSINT.mp4

140.3 MB

1.17 Threat Intelligence - Threat Maps and Feeds.mp4

183.9 MB

1.18 Threat Intelligence Vulnerability Databases Feed.mp4

258.9 MB

1.19 Threat Actors and Vectors.mp4

307.0 MB

/.../CompTIA Security+ (SY0-601)/2. Cryptography/

2.1 Cryptography Concepts.mp4

193.4 MB

2.2 Encryption and Steganography.mp4

185.3 MB

2.3 Hashing.mp4

217.7 MB

2.4 Secure Protocols.mp4

319.7 MB

2.5 Symmetric vs. Asymmetric Encryption.mp4

285.1 MB

2.6 PKI Concepts.mp4

249.2 MB

2.7 Certificates.mp4

256.1 MB

2.8 Keys.mp4

291.2 MB

2.9 IPSec.mp4

259.8 MB

/.../3. Identity and Access Management/

3.1 Authentication and Authorization.mp4

258.9 MB

3.2 Authentication Methods.mp4

258.0 MB

3.3 Additional Authentication Methods.mp4

123.8 MB

3.4 Biometrics.mp4

190.3 MB

3.5 Authentication Protocols - PAP and CHAP.mp4

123.3 MB

3.6 Authentication Protocols - EAP and 802.1X.mp4

179.5 MB

3.7 Authentication Protocols - RADIUS and TACACS.mp4

128.8 MB

3.8 Authentication Protocols - Kerberos.mp4

135.0 MB

3.9 Access Control Schemes.mp4

244.0 MB

3.10 Account Management - Account Types.mp4

214.7 MB

3.11 Account Management - Password Policies.mp4

163.4 MB

3.12 Account Management - Account Policies.mp4

145.9 MB

/.../CompTIA Security+ (SY0-601)/4. Implementing Security/

4.1 Application Security.mp4

211.5 MB

4.2 Physical Security.mp4

272.0 MB

4.3 Wireless Security.mp4

249.2 MB

4.4 Secure Data Destruction.mp4

203.6 MB

4.5 Host Security - Endpoint Protection.mp4

253.5 MB

4.6 Host Security - Hardening.mp4

260.2 MB

4.7 Mobile Device Deployment.mp4

237.1 MB

4.8 Mobile Device Management and Enforcement.mp4

257.0 MB

4.9 Mobile Device Connections.mp4

170.7 MB

4.10 Specialized Systems.mp4

209.2 MB

4.11 Network Security - Segmentation.mp4

246.1 MB

4.12 Network Security - VPNs.mp4

210.4 MB

4.13 Network Security - Proxies and Load Balancing.mp4

204.8 MB

4.14 Network Security - Port Security.mp4

200.8 MB

4.15 Network Security - Firewalls.mp4

172.8 MB

4.16 Network Security - NIDS and NIPS.mp4

90.0 MB

/.../5. Cloud and Virtualization/

5.1 Virtualization.mp4

198.9 MB

5.2 Cloud Concepts.mp4

240.9 MB

5.3 Cloud Services.mp4

176.6 MB

5.4 Cloud Models.mp4

151.7 MB

5.5 Computing Types.mp4

231.8 MB

5.6 Cloud Security Controls.mp4

195.6 MB

/.../CompTIA Security+ (SY0-601)/6. Operational Resliency/

6.1 Hardware Redundancy.mp4

277.4 MB

6.2 Site Redundancy.mp4

169.7 MB

6.3 Non-persistence Concepts.mp4

209.4 MB

6.4 Backup and Recovery.mp4

234.8 MB

/.../7. Operational Security and Incident Response/

7.1 Network Reconnaissance and Discovery.mp4

200.6 MB

7.2 Packet Capture and Replay.mp4

285.2 MB

7.3 Vulnerability Scans.mp4

203.7 MB

7.4 SIEM and SOAR Systems.mp4

156.4 MB

7.5 Pentesting Techniques.mp4

248.1 MB

7.6 Pentesting Exercise Types.mp4

206.8 MB

7.7 Digital Forensics Concepts.mp4

278.8 MB

7.8 Investigational Data Sources.mp4

289.1 MB

7.9 Incident Response Process.mp4

178.5 MB

7.10 Incident Response Plans.mp4

167.8 MB

7.11 Attack Frameworks.mp4

172.4 MB

/.../8. Governance, Risk and Compliance/

8.1 Security Controls.mp4

227.7 MB

8.2 Regulations, Standards and Frameworks.mp4

284.5 MB

8.3 Spotlight on General Data Protection Regulation.mp4

272.5 MB

8.4 Organizational Security Policies - Personnel.mp4

266.3 MB

8.5 Organizational Security Policies - 3rd Party Risk.mp4

252.2 MB

8.6 Organizational Security Policies - Data.mp4

191.5 MB

8.7 Organizational Security Policies - Other Areas.mp4

153.1 MB

8.8 Risk Management Concepts - Vocabulary.mp4

186.5 MB

8.9 Risk Management Concepts - Types & Strategies.mp4

260.3 MB

8.10 Risk Management Concepts - Risk Analysis.mp4

206.5 MB

8.11 Risk Management Concepts Business Impact Analysis.mp4

276.7 MB

8.12 Privacy and Data Sensitivity - Breaches & Data Types.mp4

198.8 MB

8.13 Privacy, Data Sensitivity - Privacy Enhancing Tech.mp4

224.6 MB

8.14 Privacy, Data Sensitivity, Roles, Responsibilities.mp4

169.8 MB

8.15 Privacy and Data Sensitivity - Other Areas.mp4

224.9 MB

/.../Module 1 - Welcome to the Penetration Tester Career Path/

1.1 Welcome to the Penetration Tester Career Path.mp4

43.1 MB

/.../02. Open Source Intelligence (OSINT) Fundamentals/Module 1 - Introduction/

1.1 Introduction.mp4

57.2 MB

/.../02. Open Source Intelligence (OSINT) Fundamentals/Module 2 - Theory/

2.1 Module 2 Overview - Theory.mp4

2.5 MB

2.2 What is OSINT.mp4

43.0 MB

2.3 Types of OSINT.mp4

10.0 MB

2.4 Who Uses OSINT.mp4

17.0 MB

2.5 The OSINT Cycle.mp4

16.7 MB

2.6 OSINT Ethics and Moral Dilemmas.mp4

15.4 MB

2.7 Module 2 Summary.mp4

3.1 MB

/.../Module 3 - OSINT Playground/

3.1 Module 3 Overview - OSINT Playground.mp4

6.6 MB

3.2 Computer-Secure Environment.mp4

19.7 MB

3.3 Notes, Notes, Notes.mp4

33.0 MB

3.4 Password Manager.mp4

41.0 MB

3.5 Validation (True or False).mp4

8.2 MB

3.6 Module 3 Summary.mp4

3.8 MB

/.../Module 4 - Tools and Techniques/

4.1 Module 4 Overview - Tools and Techniques.mp4

8.2 MB

4.2 Search Engines.mp4

42.3 MB

4.3 Social Networks.mp4

30.5 MB

4.4 Emails and Usernames.mp4

11.6 MB

4.5 Leaks and Data Breaches.mp4

11.6 MB

4.6 OSINT the Systems.mp4

46.4 MB

4.7 Module 4 Summary.mp4

5.4 MB

/.../Module 5 - Sock Puppets/

5.1 Module 5 Overview - Sock Puppets.mp4

4.5 MB

5.2 What is a Sock Puppet.mp4

19.2 MB

5.3 How to Spot a Sock Puppet.mp4

5.3 MB

5.4 Module 5 Summary.mp4

2.9 MB

/.../Module 6 - OSINT Defense/

6.1 Module 6 Overview - Defense.mp4

3.1 MB

6.2 Operations Security (OPSEC).mp4

11.8 MB

6.3 OSINT Awareness.mp4

11.6 MB

6.4 Module 6 Summary.mp4

2.7 MB

/.../02. Open Source Intelligence (OSINT) Fundamentals/Module 7 - Conclusion/

7.1 Final Thoughts.mp4

11.8 MB

/.../02. Open Source Intelligence (OSINT) Fundamentals/Resources/

OSINT_Fundamentals_Glossary.pdf

115.0 KB

OSINT_Fundamentals_Quiz.pdf

138.1 KB

OSINT_Fundamentals_Syllabus_and_Outline.pdf

137.3 KB

/.../Cybrary - Become a Penetration Tester Path/03. NMAP/Module 1 - Introduction/

1.1 Nmap - What It Is and Why It's Important - NM.mp4

21.2 MB

1.2 About the Instructor - NM.mp4

12.1 MB

1.3 Course Overview and Prerequisites - NM.mp4

9.8 MB

1.4 Ethics and Legality of Scanning - NM.mp4

34.1 MB

/.../Module 2 - Nmap Basics/

2.1 Installing Nmap on Windows - NM.mp4

39.2 MB

2.2 Installing Nmap on Linux - NM.mp4

38.3 MB

2.3 Installing Nmap on Mac - NM.mp4

46.9 MB

2.4 Kali Linux - A Hacker's Best Friend - NM.mp4

24.0 MB

2.5 Kali Linux Lab - Running it Live - NM.mp4

48.6 MB

2.6 Removing Nmap from Windows - NM.mp4

34.0 MB

2.7 Removing Nmap from Linux - NM.mp4

13.0 MB

2.8 Removing Nmap from Mac - NM.mp4

17.3 MB

2.9 Getting Help - NM.mp4

63.1 MB

2.10 Phases of the Nmap Scan - NM.mp4

48.2 MB

2.11 Constructing an Nmap Scan - NM.mp4

40.1 MB

2.12 Constructing an Nmap Scan Lab Part 1 - NM.mp4

33.2 MB

2.13 Constructing an Nmap Scan Lab Part 2 - NM.mp4

49.3 MB

2.14 General Considerations - NM.mp4

59.1 MB

2.15 Custom Scan Profiles Part 1 - NM.mp4

32.5 MB

2.16 Custom Scan Profiles Part 2 - NM.mp4

53.0 MB

/.../Module 3 - Nmap & The TCP_IP Protocol Suite/

3.1 IPv4 for Nmap - NM.mp4

26.3 MB

3.2 IP, TCP, UDP, and ICMP Headers - NM.mp4

55.8 MB

3.3 Nmap and Wireshark Part 1 - NM.mp4

46.3 MB

3.4 Nmap and Wireshark Part 2 - NM.mp4

89.6 MB

3.5 Nmap & IPv6 - NM.mp4

23.7 MB

/.../Module 4 - Network Scanning and Discovery/

4.1 Target Specification Review+ - NM.mp4

20.4 MB

4.2 Target Specification Lab Part 1 - NM.mp4

41.7 MB

4.3 Target Specification Lab Part 2 - NM.mp4

31.3 MB

4.4 Scan Techniques - NM.mp4

42.3 MB

4.5 Scan Techniques Lab - NM.mp4

58.9 MB

4.6 Host Discovery Part 1 - NM.mp4

39.1 MB

4.7 Host Discovery Part 2 - NM.mp4

39.7 MB

4.8 TCP & UDP Port Scanning - NM.mp4

34.6 MB

4.9 TCP & UDP Port Scanning Lab Part 1 - NM.mp4

31.5 MB

4.10 TCP & UDP Port Scanning Lab Part 2.mp4

37.7 MB

4.11 Service and Application Version Detection Part 1 - NM.mp4

72.5 MB

4.12 Service and Application Version Detection Part 2 - NM.mp4

46.7 MB

4.13 Operating System Detection and Fingerprinting Part 1 - NM.mp4

35.7 MB

4.14 Operating System Detection and Fingerprinting Part 2 - NM.mp4

78.2 MB

4.15 NSE, Vulnerability Testing & Exploitation Part 1 - NM.mp4

27.8 MB

4.16 NSE, Vulnerability Testing & Exploitation Part 2 - NM.mp4

66.4 MB

4.17 NSE, Vulnerability Testing & Exploitation - NM.mp4

42.3 MB

4.18 Timing and Performance Part 1 - NM.mp4

24.6 MB

4.19 Timing and Performance Part 2 - NM.mp4

33.0 MB

/.../Cybrary - Become a Penetration Tester Path/03. NMAP/Resources/

Glossary_Nmap.pdf

112.6 KB

Nmap_Study_Guide.pdf

327.9 KB

NMAP_Syllabus_and_Outline__1_.pdf

260.2 KB

/.../04. Social Engineering/Module 1 - Introduction/

1.1 Introduction.mp4

9.2 MB

1.2 Introduction to Social Engineering Part 1.mp4

18.1 MB

1.3 Introduction to Social Engineering Part 2.mp4

18.0 MB

/.../Module 2 - Social Engineering Labs/

2.1 Phishing Lab Overview.mp4

7.3 MB

2.2 EC-Council Certified Ethical Hacker v10 Social Engineering Lab Overview.mp4

10.0 MB

/.../04. Social Engineering/Module 3 - Conclusion/

3.1 Conclusion.mp4

6.4 MB

/.../04. Social Engineering/Resources/

Glossary_-_Social_Engineering__1_.pdf

236.2 KB

Social_Engineering_Study_Guide__1_.pdf

170.3 KB

Social_Engineering_Syllabus_and_Outline__1_.pdf

105.5 KB

/.../05. Kali Linux Fundamentals/Module 1 - Introduction/

1.1 Intro-Instructor Welcome and Objectives(KL).mp4

4.4 MB

1.2 Intro-Disclaimer(KL).mp4

6.2 MB

/.../05. Kali Linux Fundamentals/Module 2/

2.1 The Beginning (KL).mp4

22.9 MB

2.2 Getting Kali up and Running (KL).mp4

23.1 MB

2.3 Moving Around (KL).mp4

43.7 MB

2.4 Module Summary (KL).mp4

3.0 MB

/.../05. Kali Linux Fundamentals/Module 3/

3.1 The Terminal (KL).mp4

34.4 MB

3.2 File System (KL).mp4

28.1 MB

3.3 Useful Commands (KL).mp4

37.7 MB

3.4 Summary (KL).mp4

4.2 MB

/.../05. Kali Linux Fundamentals/Module 4/

4.1 Basic Network Commands (KL).mp4

33.9 MB

4.2 Services (KL).mp4

23.4 MB

4.3 Managing Users (KL).mp4

13.6 MB

4.4 Summary (KL).mp4

3.2 MB

/.../05. Kali Linux Fundamentals/Module 5/

5.1 Troubleshooting Basics (KL).mp4

32.7 MB

5.2 The Tools Chest (KL).mp4

26.5 MB

5.3 Summary (KL).mp4

1.8 MB

/.../05. Kali Linux Fundamentals/Resources/

Kali_Linux_-_Robert_Smith_-_Module_2_Quiz.pdf

33.9 KB

Kali_Linux_-_Robert_Smith_-_Module_3_Quiz.pdf

34.2 KB

Kali_Linux_-_Robert_Smith_-_Module_4_Quiz.pdf

31.6 KB

Kali_Linux_Fundamentals_Glossary__1_.pdf

180.8 KB

Kali_Linux_Fundamentals_Study_Guide__1_.pdf

175.2 KB

Robert_Smith_-_Syllabus_Kali_Fundamentals_-_Updated.pdf

64.9 KB

/.../Cybrary - Become a Penetration Tester Path/06. Phishing/Module 1 - Recon/

1.1 Introduction.mp4

18.0 MB

1.2 Recon.mp4

23.7 MB

1.3 The Harvester.mp4

30.2 MB

1.4 Recon-NG.mp4

17.0 MB

1.5 Using Recon-NG.mp4

20.0 MB

1.6 Scanning With Recon-NG.mp4

45.7 MB

/.../Module 2 - Getting Organized/

2.1 Common Phishing Techniques.mp4

16.5 MB

2.2 Time to Go Phishing.mp4

12.8 MB

/.../Module 3 - Automating Your Emails/

3.1 Social Engineer's Toolkit (SET).mp4

23.1 MB

3.2 Attacking With SET.mp4

26.8 MB

3.3 Watching the Attack.mp4

27.6 MB

/.../Module 4 - Stopping Phishing Attacks/

4.1 Stopping Phishing Attacks.mp4

19.3 MB

4.2 Conclusion.mp4

14.1 MB

/.../Cybrary - Become a Penetration Tester Path/06. Phishing/Resources/

Course_Resources_Cybrary_New__1_.pdf

697.5 KB

Cybrary_Phishing_Assessment_Lab_Cybrary_New.pdf

460.0 KB

Phishing__1_.pdf

194.1 KB

Phishing_Crafting_the_Perfect_Email.pdf

391.5 KB

Phishing_Crafting_The_Perfect_Email_Glossary_New__2_.pdf

149.9 KB

Recon-ng_Cheat_Sheet_Cybrary_New.pdf

656.9 KB

/.../Module 01 - Introduction/

1.1 Course Introduction.mp4

19.6 MB

1.2 Introduction to the CEH Certification.mp4

42.5 MB

/.../Module 02 - Introduction to Ethical Hacking/

2.1 Fundamental Security Concepts.mp4

20.2 MB

2.2 Information Security Threats and Attacks.mp4

15.0 MB

2.3 Introduction to Ethical Hacking.mp4

16.7 MB

2.4 Introduction to the Cyber Kill Chain.mp4

18.0 MB

2.5 Introduction to Security Controls.mp4

10.9 MB

2.6 Introduction to Security Laws and Standards.mp4

18.7 MB

/.../Module 03 - Footprinting and Reconnaissance/

3.1 Introduction to Footprinting.mp4

12.5 MB

3.2 Website Footprinting.mp4

10.3 MB

3.3 DNS Footprinting.mp4

7.3 MB

3.4 HTTrack (Demo).mp4

27.2 MB

3.5 Shodan (Demo).mp4

27.5 MB

3.6 Google Hacking Database (Demo).mp4

9.3 MB

3.7 LinkedIn (Demo).mp4

18.9 MB

3.8 Job Boards (Demo).mp4

36.8 MB

3.9 whois (Demo).mp4

11.8 MB

3.10 Banner Grabbing (Demo).mp4

16.7 MB

3.11 theHarvester (Demo).mp4

13.5 MB

3.12 Footprinting Countermeasures.mp4

14.4 MB

/.../Module 04 - Scanning and Enumeration/

4.1 Introduction to Network Scanning.mp4

39.0 MB

4.2 Ping Command (Demo).mp4

7.2 MB

4.3 NMAP (Demo).mp4

54.3 MB

4.4 Hping3 (Demo).mp4

21.9 MB

4.5 Introduction to Enumeration.mp4

18.6 MB

4.6 Enumeration Countermeasures.mp4

8.4 MB

4.7 SMB Enumeration (Demo).mp4

11.1 MB

4.8 NetBIOS Enumeration (Demo).mp4

9.7 MB

4.9 DNS Enumeration (Demo).mp4

15.5 MB

/.../Module 05 - System Hacking/

5.1 Introduction to Vulnerabilities.mp4

19.3 MB

5.2 Vulnerability Assessment Phases and Tools.mp4

19.4 MB

5.3 Types of Password Attacks and Defenses.mp4

13.2 MB

5.4 Password Cracking with Medusa (Demo).mp4

28.4 MB

5.5 Privilege Escalation.mp4

10.4 MB

5.6 Malware - Keyloggers.mp4

12.9 MB

5.7 Malware - Rootkits.mp4

26.0 MB

5.8 Malware - Trojans.mp4

21.3 MB

5.9 Malware - Introduction to Viruses.mp4

10.6 MB

5.10 Malware - Types of Viruses.mp4

13.4 MB

5.11 Malware - Worms.mp4

7.2 MB

5.12 Detecting Malware.mp4

17.4 MB

5.13 Malware Countermeasures.mp4

8.2 MB

/.../Module 06 - Network and Perimeter Hacking/

6.1 Introduction to Sniffing.mp4

7.3 MB

6.2 Sniffing Attacks.mp4

17.6 MB

6.3 Sniffing Tools.mp4

13.8 MB

6.4 Sniffing Countermeasures.mp4

9.1 MB

6.5 Introduction to Social Engineering.mp4

39.8 MB

6.6 Social Engineering Countermeasures.mp4

31.3 MB

6.7 Introduction to DoS and DDoS Attacks.mp4

11.3 MB

6.8 Types of DoS and DDoS Attacks.mp4

34.0 MB

6.9 DDoS Tools and Countermeasures.mp4

24.0 MB

6.10 Introduction to Session Hijacking.mp4

15.8 MB

6.11 Network Level Session Hijacking.mp4

21.1 MB

6.12 IDS and Firewall Evasion Techniques.mp4

9.4 MB

6.13 WAF Detection with WAFW00F (Demo).mp4

7.5 MB

6.14 Gaining Remote Access (Demo).mp4

14.3 MB

/.../Module 07 - Web Application Hacking/

7.1 Web Server Attack Methodology.mp4

18.1 MB

7.2 Types of Web Server Attacks and Countermeasures.mp4

38.1 MB

7.3 Web Application Threats.mp4

26.5 MB

7.4 Web Application Hacking Methodology.mp4

11.1 MB

7.5 Introduction to SQL Injection Attacks.mp4

15.9 MB

7.6 Command Injection Attack (Demo).mp4

21.3 MB

7.7 Web Attack Countermeasures.mp4

18.6 MB

/.../Module 08 - Wireless Network Hacking/

8.1 Introduction to Wireless.mp4

12.9 MB

8.2 Wireless Attacks and Countermeasures.mp4

8.7 MB

/.../Module 09 - Mobile Hacking/

9.1 OWASP Top 10 for Mobile.mp4

17.0 MB

9.2 Mobile Attacks and Countermeasures.mp4

12.1 MB

/.../Module 10 - IoT and OT Hacking/

10.1 Introduction to IoT Hacking.mp4

11.9 MB

10.2 IoT Communication Models and Operating Systems.mp4

13.8 MB

10.3 IoT Attacks and Threats.mp4

12.0 MB

10.4 IoT Attack Countermeasures.mp4

13.5 MB

10.5 OT Concepts.mp4

14.4 MB

10.6 OT Attacks and Countermeasures.mp4

12.8 MB

/.../Module 11 - Cloud Computing/

11.1 Introduction to Cloud Environments.mp4

16.1 MB

11.2 Cloud Computing Services.mp4

13.0 MB

11.3 Benefits of Cloud Computing.mp4

13.9 MB

11.4 Cloud Threats and Attacks.mp4

11.1 MB

11.5 Cloud Security Considerations.mp4

11.1 MB

/.../Module 12 - Cryptography/

12.1 Introduction to Cryptography.mp4

7.0 MB

12.2 Hashing, Digital Certificates and Digital Signatures.mp4

27.7 MB

12.3 Cryptography Attacks and Countermeasures.mp4

14.1 MB

/.../Module 13 - Conclusion/

13.1 Conclusion.mp4

7.6 MB

/.../07. Penetration Testing and Ethical Hacking/Resources/

CEH_Notes.pdf

1.0 MB

Penetration_Testing_and_Ethical_Hacking_Syllabus_and_Outline__1___2_.pdf

149.1 KB

/.../Module 1 - Password Cracking Tool Fundamentals/

1.1 Password Cracking Foundations.mp4

21.0 MB

1.2 John the Ripper Introduction.mp4

23.0 MB

1.3 John the Ripper Demonstration.mp4

16.4 MB

1.4 Hash Suite.mp4

12.3 MB

1.5 Cain and Abel.mp4

35.0 MB

1.6 Securing Your Password.mp4

11.4 MB

/.../09. Password Cracking 101/Module 1 - Introduction/

1.1 Introduction.pdf

32.3 KB

/.../Module 2 - Password Cracking/

2.1 Identifying Hash Types.pdf

390.0 KB

2.2 Cracking Hashes.pdf

455.6 KB

2.3 Mitigation.pdf

30.2 KB

/.../Cybrary - Become a Penetration Tester Path/10. Sniffing/Module 1 - Introduction/

1.1 Introduction.mp4

9.3 MB

/.../Module 2 - Wireshark and TCPDUMP/

2.1 Wireshark Lab Part 1.mp4

42.2 MB

2.2 Wireshark Lab Part 2.mp4

49.1 MB

2.3 Wireshark Lab Part 3.mp4

38.7 MB

2.5 Packet Sniffing Lab Part 1.mp4

46.6 MB

2.6 Packet Sniffing Lab Part 2.mp4

23.7 MB

2.8 Applying Filters to TCPDUMP and Wireshark Lab Part 1.mp4

55.5 MB

2.9 Applying Filters to TCPDUMP and Wireshark Lab Part 2.mp4

79.9 MB

2.10 TCPDUMP Lab.mp4

52.7 MB

/.../Cybrary - Become a Penetration Tester Path/10. Sniffing/Module 3 - Conclusion/

3.1 Capstone Lab Navigation.mp4

7.9 MB

3.2 Conclusion.mp4

7.0 MB

/.../Cybrary - Become a Penetration Tester Path/10. Sniffing/Resources/

Sniffing_Glossary.pdf

374.7 KB

Sniffing_Resources_-_Cheat_Sheet_Sources.pdf

114.5 KB

Sniffing_Resources_-_Lab_1_Wireshark__1_.pdf

145.6 KB

Sniffing_Resources_-_Lab_2_Packet_Sniffing__1_.pdf

140.0 KB

Sniffing_Resources_-_Lab_3_Applying_Filters_to_TCPDump_and_Wireshark__1_.pdf

145.9 KB

Sniffing_Resources_-_Lab_4_TCPDump__1_.pdf

133.2 KB

Sniffing_Resources_-_TCPDump_Cheat_Sheet.pdf

165.5 KB

Sniffing_Resources_-_Wireshark__TCPDump_Study_Guide__1_.pdf

545.0 KB

Sniffing_Resources_-_Wireshark_Cheat_Sheet.pdf

279.2 KB

Sniffing_Resources_-_Wireshark_Filters__1_.pdf

194.4 KB

Sniffing_Study_Guide__1_.pdf

332.7 KB

Sniffing_Syllabus_and_Outline-v1.0_Watermark__1_.pdf

249.8 KB

/.../11. Web Application Penetration Testing/Module 1/

1.1 Introduction.mp4

19.2 MB

1.2 Tools.mp4

55.5 MB

1.3 Packets.mp4

70.7 MB

1.4 HTTP Basics.mp4

71.3 MB

1.5 Why Sites Get Hacked.mp4

45.4 MB

1.6 Why Sites Get Hacked.mp4

61.8 MB

1.7 Why Sites Get Hacked.mp4

55.3 MB

1.8 Why Sites Get Hacked.mp4

49.6 MB

1.9 Why Sites Get Hacked.mp4

25.7 MB

1.10 Best Practices.mp4

57.4 MB

1.11 Best Practices.mp4

41.4 MB

1.12 Environment Setup.mp4

52.0 MB

/.../11. Web Application Penetration Testing/Module 2/

2.1 What is SQL Injection.mp4

66.8 MB

2.2 Spidering.mp4

25.7 MB

2.3 Spidering.mp4

20.3 MB

2.4 Spidering.mp4

18.0 MB

2.5 Spidering.mp4

15.6 MB

2.6 Discovering SQLI.mp4

19.1 MB

2.7 Discovering SQLI.mp4

25.1 MB

2.8 Discovering SQLI.mp4

45.2 MB

2.9 Discovering SQLI.mp4

16.1 MB

2.10 Discovering SQLI.mp4

19.6 MB

2.11 Discovering SQLI.mp4

40.8 MB

2.12 Exploiting SQLI.mp4

16.4 MB

2.13 Exploiting SQLI.mp4

22.3 MB

2.14 Exploiting SQLI.mp4

21.9 MB

2.15 Exploiting SQLI.mp4

24.4 MB

2.16 SQLI Lab.mp4

10.0 MB

/.../11. Web Application Penetration Testing/Module 3/

3.1 What is XSS.mp4

72.8 MB

3.2 What is XSS.mp4

25.7 MB

3.3 Discovering XSS.mp4

17.5 MB

3.4 Discovering XSS.mp4

18.0 MB

3.5 Discovering XSS.mp4

14.4 MB

3.6 Discovering XSS.mp4

26.9 MB

3.7 Discovering XSS.mp4

22.1 MB

3.8 Discovering XSS.mp4

5.8 MB

3.9 Exploiting XSS.mp4

40.6 MB

3.10 Exploiting XSS.mp4

59.6 MB

3.11 XSS Lab.mp4

11.2 MB

/.../11. Web Application Penetration Testing/Module 4/

4.1 LFI & RFI.mp4

20.9 MB

4.2 LFI & RFI.mp4

22.9 MB

4.3 LFI & RFI.mp4

26.5 MB

4.4 LFI & RFI Lab.mp4

15.5 MB

/.../11. Web Application Penetration Testing/Module 5/

5.1 Report Creation.mp4

61.2 MB

5.2 Report Creation.mp4

39.1 MB

5.3 Wrap Up.mp4

11.5 MB

/.../11. Web Application Penetration Testing/Resources/

Glossary_Web_Application_Penetration_Testing___2_.pdf

248.9 KB

Web_Application_Penetration_Testing_Study_Guide__1___1_.pdf

339.5 KB

Web_Application_Penetration_Testing_Syllabus__6_.pdf

176.9 KB

/.../12. Intro to Burp Suite Pro/Module 1 - Introduction/

1.1 Course Introduction and Objectives.mp4

7.0 MB

/.../Module 2 - Configuration and Functionality/

2.1 Burp Suite Configuration and Interface Overview.mp4

11.7 MB

/.../12. Intro to Burp Suite Pro/Module 3 - Scan/

3.1 Crawling, Scope, and Auditing (Performing the Scan).mp4

24.2 MB

/.../12. Intro to Burp Suite Pro/Module 4 - Conclusion/

4.1 Scan Review and Conclusion.mp4

39.7 MB

/.../12. Intro to Burp Suite Pro/Resources/

Burp_Suite_Power_Point.pdf

3.8 MB

Cybrary_Burp_Outline__v2__1_.pdf

247.0 KB

Intro_to_Burp_Suite_Pro_Glossary__1_.pdf

159.8 KB

Intro_to_Burp_Suite_Pro_Study_Guide__1_.pdf

166.0 KB

/.../13. Advanced Penetration Testing/Module 1 - Linux/

1.1 Linux (part 1).mp4

2.8 MB

1.2 Linux (part 2) Kali Linux Commands.mp4

36.4 MB

1.3 Linux (part 3) - Directories, myfile and Nano.mp4

34.3 MB

1.4 Linux (part 4) chmod, manipulation and packages.mp4

39.6 MB

1.5 Linux (part 5) IP Addressing and netcat.mp4

51.4 MB

1.6 Linux (part 6) Copy Commands and crontab.mp4

18.5 MB

/.../13. Advanced Penetration Testing/Module 2 - Programming/

2.1 Programming (part 1) Fundamentals for Pen Testers.mp4

2.8 MB

2.2 Programming (part 2) Bash Scripting and If_Then Command.mp4

26.2 MB

2.3 Programming (part 3) Network Pings.mp4

25.1 MB

2.4 Programming (part 4) Python for Port Scanning.mp4

34.6 MB

2.5 Programming (part 5) Python Import Command.mp4

29.2 MB

/.../13. Advanced Penetration Testing/Module 3 - Metasploit/

3.1 Metasploit (part 1) Introduction.mp4

3.0 MB

3.2 Metasploit (part 2) Fundamentals.mp4

46.8 MB

3.3 Metasploit (part 3) Operation.mp4

73.4 MB

3.4 Metasploit (part 4) Auxiliary Module.mp4

14.2 MB

3.5 Metasploit (part 5) msfcli.mp4

25.2 MB

3.6 Metasploit (part 6) msfvenom.mp4

38.2 MB

/.../Module 4 - Information Gathering/

4.1 Information Gathering Intro (part 1).mp4

2.6 MB

4.2 Information Gathering (part 2) Domain Name Services.mp4

43.1 MB

4.3 Information Gathering (part 3) Targeting Email and Maltego.mp4

57.2 MB

4.4 Information Gathering (part 4) recon-ng and google operators.mp4

18.8 MB

4.5 Information Gathering (part 5) NMAP and PortScanning.mp4

102.8 MB

/.../Module 5 - Vulnerability Discovery or Scanning/

5.1 Vulnerability Scanning Intro (part 1).mp4

2.2 MB

5.2 Vulnerability Scanning (part 2) Nessus.mp4

44.4 MB

5.3 Vulnerability Scanning (part 3) Nmap Scripting Engine.mp4

34.1 MB

5.4 Vulnerability Scanning (part 4) Metasploit.mp4

29.7 MB

5.5 Vulnerability Scanning (part 5) WebApp, XAMPP, WEBDAV, nikto.mp4

39.6 MB

5.6 Vulnerability Scanning (part 6) Directory Transversals.mp4

23.5 MB

/.../Module 6 - Traffic Capture/

6.1 Traffic Capture Introduction (part 1).mp4

2.7 MB

6.2 Traffic Capture (part 2) Analyzing Network Protocol with Wireshark.mp4

30.7 MB

6.3 Traffic Capture (part 3) Address Resolution Protocol ARP.mp4

41.4 MB

6.4 Traffic Capture (part 4) DNS.mp4

14.0 MB

6.5 Traffic Capture (part 5) ettercap.mp4

44.0 MB

6.6 Traffic Capture (part 6) SSL Stripping.mp4

36.6 MB

/.../13. Advanced Penetration Testing/Module 7 - Exploitation/

7.1 Exploitation (part 1) Direct Exploitation.mp4

49.2 MB

7.2 Exploitation (part 2) SQL Commands.mp4

37.6 MB

7.3 Exploitation (part 3) Directory Traversal.mp4

20.4 MB

7.4 Exploitation (part 4) Open Source Vulnerability.mp4

21.6 MB

7.5 Exploitation (part 5) Using Backdoor to Access an FTP Server.mp4

21.7 MB

7.6 Exploitation (part 6) Attaching to an IP Address.mp4

19.7 MB

/.../13. Advanced Penetration Testing/Module 8 - Passwords/

8.1 Passwords (part 1) Password Attacks.mp4

47.9 MB

8.2 Passwords (part 2) Online Password Cracking.mp4

18.4 MB

8.3 Passwords (part 3) Offline Password Attacks.mp4

48.6 MB

8.4 Passwords (part 4) Using oclhashcat.mp4

61.1 MB

/.../Module 9 - Advanced Exploitation/

9.1 Advanced Exploitation (part 1) Introduction.mp4

2.6 MB

9.2 Advanced Exploitation (part 2) Client Side Attacks.mp4

38.1 MB

9.3 Advanced Exploitation (part 3) Exploiting Java.mp4

19.6 MB

9.4 Advanced Exploitation (part 4) Social Engineering.mp4

72.2 MB

9.5 Advanced Exploitation (part 5) Bypassing Antivirus Software.mp4

67.3 MB

/.../Module 10 - Post Exploitation/

10.1 Post Exploitation (part 1) File Transfer without and Interactive Shell.mp4

60.5 MB

10.2 Post Exploitation (part 2) Exploit Development.mp4

60.4 MB

10.3 Post Exploitation (part 3) Pivoting.mp4

27.9 MB

10.4 Post Exploitation (part 4) Setting Up a Domain Controller.mp4

39.7 MB

/.../Module 11 - WebApps/

11.1 WebApp Introduction (part 1) Web App Testing.mp4

3.1 MB

11.2 WebApp (part 2) Vulnerable Web Applications.mp4

35.7 MB

11.3 WebApp (part 3) SQL Injection.mp4

50.5 MB

11.4 WebApp (part 4) File Inclusion.mp4

22.3 MB

11.5 WebApp (part 5) Cross Site Scripting XSS.mp4

21.8 MB

/.../Module 12 - Exploit Development/

12.1 Exploit Development Introduction (part 1).mp4

2.8 MB

12.2 Exploit Development (part 2) A Program in Memory.mp4

26.5 MB

12.3 Exploit Development (part 3) Stack Frame for Function.mp4

15.4 MB

12.4 Exploit Development (part 4) GNU Compilers.mp4

58.7 MB

12.5 Exploit Development (part 5) Python.mp4

27.6 MB

12.6 Exploit Development (part 6) Executing Unintended Code.mp4

43.5 MB

12.7 Exploit Development (part 7) Network Based Exploits and Debuggers.mp4

50.0 MB

12.8 Exploit Development (part 8) Creating a Cyclic Pattern.mp4

92.1 MB

12.9 Exploit Development (part 9) Verifying Offsets.mp4

79.8 MB

12.10 Exploit Development (part 10) Creating Shell Code in Kali Linux.mp4

60.6 MB

12.11 Exploit Development (part 11) Fuzzing.mp4

57.2 MB

12.12 Exploit Development (part 12) Public Exploits and Perl.mp4

63.3 MB

12.13 Exploit Development (part 13) Turning a 3Com Exploit into a Metasploit Module.mp4

60.3 MB

12.14 Exploit Development (part 14) Structured Exception Handler Over-Write.mp4

151.5 MB

/.../Module 13 - Smartphone Pentest Framework/

13.1 SPF Introduction (part 1).mp4

3.3 MB

13.2 SPF (part 2) Attach to Smartphone Based Apps.mp4

12.2 MB

13.3 SPF (part 3) Turning an Android App into a SPF Agent.mp4

23.5 MB

13.4 SPF (part 4) Functionality for Agents.mp4

23.3 MB

13.5 SPF (part 5) Pentesting Mobile Devices.mp4

48.1 MB

/.../13. Advanced Penetration Testing/Resources/

Advanced_Penetration_Testing_Glossary__2_.pdf

223.7 KB

Advanced_Penetration_Testing_Notes_Task_2__2_.pdf

2.4 MB

Advanced_Penetration_Testing_Study_Guide__1_.pdf

439.3 KB

Copy_of__Syllabus_and_Outline_Template__1_.pdf

251.3 KB

CybraryAdvancedPenSlidesnew__1_.pdf

2.8 MB

/.../Module 1 - Unicornscan (BSWR)/

1.1 Unicornscan (BSWR).mp4

44.8 MB

/.../14. How to Use Unicornscan (BSWR)/Resources/

How_To_Guide_Unicornscan_by_Tahir_Ibrahim.pdf

160.4 KB

/.../Module 01 - Course Introduction/

1.1 Course Overview.mp4

40.0 MB

/.../Module 02 - Setting the Foundation for Success/

2.1 Understanding the Penetration Test Report.mp4

43.0 MB

2.2 Penetration Test Report Demo.mp4

23.2 MB

2.3 Note Taking and Mind Mapping.mp4

31.1 MB

2.4 Finding Resources to Prepare for the Offensive Penetration Testing.mp4

28.4 MB

/.../Module 03 - Kali Linux Basics/

3.1 Setting up the Kali Linux VM.mp4

54.6 MB

3.2 Overview of Tools in Kali Linux.mp4

54.5 MB

3.3 Understanding the Command Line.mp4

31.4 MB

3.4 Who, What, When, Where and How of the Linux Command Line.mp4

20.5 MB

3.5 Windows Command Lab.mp4

20.9 MB

3.6 Command Line Lab.mp4

4.3 MB

3.7 Command Line Lab Walkthrough.mp4

27.1 MB

/.../Module 04 - Understanding Network Protocols/

4.1 Scanning Network Protocols.mp4

20.2 MB

4.2 Scanning with Nmap.mp4

34.3 MB

4.3 Scanning with Masscan.mp4

29.6 MB

4.4 Scanning with Netcat.mp4

50.2 MB

4.5 Using Wireshark.mp4

19.5 MB

4.6 Wireshark and Encrypted Traffic.mp4

23.5 MB

4.7 Weaponizing Wireshark.mp4

32.6 MB

4.8 SMB Enumeration.mp4

27.6 MB

4.9 SMB Enumeration Demo.mp4

60.7 MB

4.10 NFS Enumeration.mp4

38.4 MB

4.11 SMTP Enumeration.mp4

27.2 MB

4.12 SNMP Enumeration.mp4

20.6 MB

4.13 FTP Enumeration.mp4

14.6 MB

4.14 FTP Enumeration Demo.mp4

42.4 MB

4.15 SSH Enumeration.mp4

57.7 MB

4.16 Protocol Tips.mp4

20.5 MB

4.17 Network Protocols Lab.mp4

2.9 MB

/.../Module 05 - Web Application Penetration Testing/

5.1 Web Application Enumeration.mp4

80.1 MB

5.2 Using Intercepting Proxies Part 1.mp4

33.0 MB

5.3 Using Intercepting Proxies Part 2.mp4

51.8 MB

5.4 SQL Injections.mp4

46.3 MB

5.5 SQL Injection Authentication Bypass.mp4

20.2 MB

5.6 Cross-Site Scripting (XSS).mp4

30.3 MB

5.7 BeEF Framework Demo.mp4

33.8 MB

5.8 File Inclusion Vulnerabilities.mp4

30.2 MB

5.9 File Inclusion Demo.mp4

31.9 MB

5.10 File Upload Vulnerabilities.mp4

20.5 MB

5.11 XXE Attacks.mp4

45.6 MB

5.12 Content Management Systems.mp4

28.6 MB

5.13 Content Management Systems Demo.mp4

64.0 MB

5.14 Web Application Lab.mp4

1.3 MB

5.15 Web Application Lab Walkthrough.mp4

107.2 MB

/.../Module 06 - Introduction to Buffer Overflow/

6.1 How to Practice Buffer Overflows.mp4

13.4 MB

6.2 Setting up the Environment.mp4

28.9 MB

6.3 Fuzzing the Application.mp4

53.2 MB

6.4 Finding Bad Characters.mp4

23.8 MB

6.5 Finding the Return Address.mp4

34.8 MB

6.6 Getting a Shell.mp4

28.7 MB

6.7 Buffer Overflow Lab.mp4

22.9 MB

/.../Module 07 - Public Exploits/

7.1 Where to Look for Public Exploits.mp4

30.7 MB

7.2 Understanding the Code.mp4

25.3 MB

7.3 Modifying the Code to Fit the Environment.mp4

47.0 MB

7.4 Introduction to Metasploit.mp4

68.3 MB

7.5 Using Metasploit or Not.mp4

22.6 MB

7.6 Public Exploit Lab.mp4

1.7 MB

7.7 Public Exploit Lab Walkthrough.mp4

48.9 MB

/.../Module 08 - Getting a Shell, Now What/

8.1 The Different Types of Shells.mp4

41.9 MB

8.2 How to Upgrade a Shell.mp4

28.6 MB

8.3 Transferring Files to and from Kali Linux.mp4

23.7 MB

8.4 Transferring Files Demo.mp4

57.8 MB

/.../Module 09 - Privilege Escalation/

9.1 Linux Privilege Escalation.mp4

25.4 MB

9.2 Windows Privilege Escalation.mp4

41.1 MB

9.3 A Word on Privilege Escalation Enumeration Scripts.mp4

16.5 MB

9.4 Privilege Escalation Lab.mp4

4.5 MB

9.5 Privilege Escalation Walkthrough - Windows.mp4

74.1 MB

9.6 Privilege Escalation Walkthrough - Linux.mp4

44.6 MB

/.../Module 10 - Password Cracking and Brute-Forcing Logins/

10.1 Introduction to Password Cracking Tools.mp4

25.2 MB

10.2 Introduction to Login Brute-Forcing Tools.mp4

12.4 MB

10.3 Password Brute-Forcing Web Logins.mp4

49.8 MB

10.4 Password Brute-Forcing Tips.mp4

67.1 MB

10.5 Brute-Force and Password Cracking Lab.mp4

2.0 MB

10.6 Brute-Force and Password Cracking Lab Walkthrough.mp4

81.3 MB

/.../Module 11 - Putting it All Together/

11.1 Hands-on Penetration Test Lab.mp4

960.0 KB

11.2 Hands-on Penetration Test Lab Walkthrough.mp4

73.9 MB

11.3 Writing the Report.mp4

24.7 MB

/.../Module 12 - Developing the Hacker Mindset/

12.1 Understanding the Hacker Mindset.mp4

21.2 MB

12.2 Tips on Harnessing the Hacker Mindset.mp4

20.5 MB

/.../15. Offensive Penetration Testing/Resources/

Offensive_Penetration_Testing_Syllabus.docx.pdf

184.6 KB

/.../Module 1 - Pre-Engagement Interactions/

1.1 What is the Penetration Testing Execution Standard (PTES).mp4

98.2 MB

1.2 Who and Why.mp4

36.1 MB

1.3 Course Use.mp4

63.0 MB

1.4 Pre-Engagement Interactions Overview Part 1.mp4

20.0 MB

1.5 Pre-Engagement Interactions Overview Part 2.mp4

33.2 MB

1.6 Introduction to Scope Part 1.mp4

33.6 MB

1.7 Introduction to Scope Part 2.mp4

22.6 MB

1.8 Metrics for Time Estimation Part 1.mp4

35.9 MB

1.9 Metrics for Time Estimation Part 2.mp4

24.3 MB

1.10 Scoping Meeting Part 1.mp4

26.4 MB

1.11 Scoping Meeting Part 2.mp4

34.4 MB

1.12 Additional Support Part 1.mp4

32.1 MB

1.13 Additional Support Part 2.mp4

37.2 MB

1.14 PTES Questionnaires Part 1.mp4

26.0 MB

1.15 PTES Questionnaires Part 2.mp4

34.5 MB

1.16 Scope Creep.mp4

35.2 MB

1.17 Start and End Dates.mp4

40.5 MB

1.18 Specify IP Ranges and Domains.mp4

50.3 MB

1.19 Dealing With Third Parties.mp4

55.9 MB

1.20 Define Acceptable Sociable Engineering Pretexts Part 1.mp4

35.1 MB

1.21 Define Acceptable Sociable Engineering Pretexts Part 2.mp4

24.7 MB

1.22 DoS Testing.mp4

28.6 MB

1.23 Payment Terms Part 1.mp4

44.8 MB

1.24 Payment Terms Part 2.mp4

17.9 MB

1.25 Goals.mp4

27.7 MB

1.26 Establish Lines of Communication Part 1.mp4

29.3 MB

1.27 Establishing Lines of Communication Part 2.mp4

30.6 MB

1.28 Rules of Engagement Part 1.mp4

48.6 MB

1.29 Rules of Engagement Part 2.mp4

20.7 MB

1.30 Capabilities and Technology in Place.mp4

39.7 MB

1.31 Module 1 Summary.mp4

17.6 MB

/.../Module 2 - Intelligence Gathering/

2.1 Intelligence Gathering Overview.mp4

6.9 MB

2.2 General Background Concepts.mp4

59.4 MB

2.3 Business Asset Analyst.mp4

29.3 MB

2.4 Intelligence Gathering Basics.mp4

19.4 MB

2.5 Target Selection.mp4

37.0 MB

2.6 OSINT Part 1.mp4

39.9 MB

2.7 OSINT Part 2.mp4

27.9 MB

2.8 OSINT Part 3.mp4

21.8 MB

2.9 Covert Gathering.mp4

19.9 MB

2.10 Footprinting - External.mp4

27.6 MB

2.11 Footprinting - Internal.mp4

23.3 MB

2.12 Identity Protection Mechanisms.mp4

16.2 MB

2.13 Module 2 Summary.mp4

8.9 MB

/.../Module 3 - Threat Modeling/

3.1 Threat Modeling Overview.mp4

5.7 MB

3.2 General - Modeling Process.mp4

26.0 MB

3.3 Business Asset Analysis.mp4

29.2 MB

3.4 Business Process Analysis.mp4

24.0 MB

3.5 Threat Agent or Community Analysis.mp4

20.8 MB

3.6 Threat Capability Analysis.mp4

21.6 MB

3.7 Motivation Modeling.mp4

9.5 MB

3.8 Finding Relevant News.mp4

17.2 MB

3.9 Module 3 Summary.mp4

7.1 MB

/.../Module 4 - Vulnerability Analysis/

4.1 Vulnerability Analysis Overview.mp4

4.9 MB

4.2 Vulnerability Testing.mp4

24.7 MB

4.3 Active Testing.mp4

31.8 MB

4.4 Passive Testing.mp4

15.9 MB

4.5 Validation.mp4

32.0 MB

4.6 Research.mp4

31.8 MB

4.7 Module 4 Summary.mp4

5.4 MB

/.../16. Penetration Testing Execution Standard (PTES)/Module 5 - Exploitation/

5.1 Exploitation Overview.mp4

5.8 MB

5.2 Purpose.mp4

22.6 MB

5.3 Countermeasures.mp4

27.7 MB

5.4 Evasion.mp4

19.4 MB

5.5 Precision Strike.mp4

12.9 MB

5.6 Customized Exploitation Avenue.mp4

24.1 MB

5.7 Zero Day Angle.mp4

23.2 MB

5.8 Example Avenues of Attack.mp4

20.1 MB

5.9 Overall Objectives.mp4

11.8 MB

5.10 Module 5 Summary.mp4

6.9 MB

/.../Module 6 - Post-Exploitation/

6.1 Post-Exploitation Overview.mp4

5.0 MB

6.2 Purpose.mp4

10.8 MB

6.3 Rules of Engagement - Post-Exploitation.mp4

16.5 MB

6.4 Infrastructure Analysis.mp4

21.0 MB

6.5 Pillaging Part 1.mp4

26.9 MB

6.6 Pillaging Part 2.mp4

17.2 MB

6.7 High Value or Profile Targets.mp4

14.4 MB

6.8 Data Infiltration.mp4

13.7 MB

6.9 Persistence.mp4

12.7 MB

6.10 Further Penetration Into Infrastructure.mp4

10.3 MB

6.11 Cleanup.mp4

9.0 MB

6.12 Module 6 Summary.mp4

8.1 MB

/.../16. Penetration Testing Execution Standard (PTES)/Module 7 - Reporting/

7.1 Reporting Overview.mp4

2.8 MB

7.2 Reporting Structure.mp4

6.4 MB

7.3 The Executive Summary.mp4

26.2 MB

7.4 Technical Support.mp4

26.1 MB

7.5 Module 7 Summary.mp4

4.3 MB

/.../16. Penetration Testing Execution Standard (PTES)/Module 8 - Summary/

8.1 Course Summary.mp4

6.8 MB

/.../16. Penetration Testing Execution Standard (PTES)/Resources/

Penetration_Testing_Execution_Standard__PTES__Glossary__1_.pdf

163.8 KB

Penetration_Testing_Execution_Standard__PTES__Syllabus_and_Outline__1_.pdf

83.0 KB

Penetration_Testing_Execution_Standard_Study_Guide__1_.pdf

518.1 KB

/.../01. Welcome to the SOC Analyst Level 1 Career Path/

1.1 Welcome to the SOC Analyst Level 1 Career Path.mp4

44.1 MB

/.../02. Kali Linux Fundamentals/Module 1 - Introduction/

1.1 Intro-Instructor Welcome and Objectives(KL).mp4

4.4 MB

1.2 Intro-Disclaimer(KL).mp4

6.2 MB

/.../02. Kali Linux Fundamentals/Module 2/

2.1 The Beginning (KL).mp4

22.9 MB

2.2 Getting Kali up and Running (KL).mp4

23.1 MB

2.3 Moving Around (KL).mp4

43.7 MB

2.4 Module Summary (KL).mp4

3.0 MB

/.../02. Kali Linux Fundamentals/Module 3/

3.1 The Terminal (KL).mp4

34.4 MB

3.2 File System (KL).mp4

28.1 MB

3.3 Useful Commands (KL).mp4

37.7 MB

3.4 Summary (KL).mp4

4.2 MB

/.../02. Kali Linux Fundamentals/Module 4/

4.1 Basic Network Commands (KL).mp4

33.9 MB

4.2 Services (KL).mp4

23.4 MB

4.3 Managing Users (KL).mp4

13.6 MB

4.4 Summary (KL).mp4

3.2 MB

/.../02. Kali Linux Fundamentals/Module 5/

5.1 Troubleshooting Basics (KL).mp4

32.7 MB

5.2 The Tools Chest (KL).mp4

26.5 MB

5.3 Summary (KL).mp4

1.8 MB

/.../02. Kali Linux Fundamentals/Resources/

Glossary.pdf

180.8 KB

Module 2 - Quiz.pdf

33.9 KB

Module 3 - Quiz.pdf

34.2 KB

Module 4 - Quiz.pdf

31.6 KB

Study Guide.pdf

175.2 KB

Syllabus and Outline.pdf

64.9 KB

/.../Module 1 - Introduction to the Command Line/

1.1 Introduction and Setup.mp4

46.4 MB

1.2 Opening the Command Line.mp4

34.7 MB

1.3 Asking for Help.mp4

74.9 MB

/.../Module 2 - Introductory Commands/

2.1 Command Line Survival Part 1.mp4

58.0 MB

2.2 Command Line Survival Part 2.mp4

43.2 MB

2.3 Changing Directories.mp4

48.5 MB

2.4 Common Linux Tools.mp4

93.8 MB

2.5 Windows Common Tools.mp4

48.5 MB

2.6 Copy and Paste in Windows Command.mp4

20.3 MB

/.../Module 3 - Linux Command Line Tools/

3.1 Linux Basics Part 1.mp4

35.7 MB

3.2 Linux Basics Part 2.mp4

39.4 MB

3.3 Linux Basics Part 3.mp4

45.7 MB

3.4 Linux Files Part 1.mp4

33.3 MB

3.5 Linux Files Part 2.mp4

38.1 MB

3.6 Linux Files Part 3.mp4

44.8 MB

3.7 Linux Files Part 4.mp4

32.7 MB

3.8 Linux Files Part 5.mp4

37.2 MB

3.9 Linux System Part 1.mp4

35.1 MB

3.10 Linux System Part 2.mp4

40.2 MB

3.11 Linux Networking Part 1.mp4

47.9 MB

3.12 Linux Networking Part 2.mp4

73.3 MB

/.../Module 4 - Windows Command Line Tools/

4.1 Windows Basis.mp4

38.6 MB

4.2 Windows Files Part 1.mp4

31.8 MB

4.3 Windows Files Part 2.mp4

39.6 MB

4.4 Windows System Part 1.mp4

29.2 MB

4.5 Windows System Part 2.mp4

40.2 MB

4.6 Windows System Part 3.mp4

25.2 MB

4.7 Windows Networking Part 1.mp4

43.4 MB

4.8 Windows Networking Part 2.mp4

33.0 MB

4.9 Windows Networking Part 3.mp4

30.3 MB

4.10 Net Command.mp4

42.7 MB

/.../Module 5 - Advanced Command Line Techniques/

5.1 Windows Advanced Piping and Ampersands.mp4

37.2 MB

5.2 Windows Command Redirection.mp4

46.1 MB

5.3 For and While Loops.mp4

33.9 MB

5.4 Linux Shell Scripting.mp4

22.7 MB

5.5 Windows Batch Scripting.mp4

21.6 MB

5.6 Conclusion.mp4

14.7 MB

/.../03. Command Line Basics/Resources/

Command_Line_Basics_Command_Categories__1_.pdf

98.6 KB

Command_Line_Basics_Study_Guide__1_.pdf

397.9 KB

Command_Line_Basics_Syllabus_and_Outline__1_.pdf

209.2 KB

Commandline_Basics_Glossary.pdf

158.6 KB

/.../Module 1 - BSWJ - binwalk/

1.1 BSWJ - binwalk.mp4

41.0 MB

/.../05. Malware Threats/Module 1 - Introduction/

1.1 Introduction.mp4

12.2 MB

1.2 Malware Introduction.mp4

25.8 MB

/.../Module 2 - Analyze Malware/

2.1 Analyze and Classify Malware Lab Part 1.mp4

42.7 MB

2.2 Analyze and Classify Malware Lab Part 2.mp4

19.2 MB

2.3 Rootkit Lab Part 1.mp4

59.3 MB

2.4 Rootkit Lab Part 2.mp4

62.2 MB

2.5 Rootkit Lab Part 3.mp4

54.0 MB

/.../05. Malware Threats/Module 3 - Conclusion/

3.1 Conclusion.mp4

7.9 MB

/.../05. Malware Threats/Resources/

Malware_Threats_Analyze_and_Classify_Malware_Lab__1___1_.pdf

104.0 KB

Malware_Threats_Rootkit_Lab__1_.pdf

119.6 KB

Malware_Threats_Syllabus_and_Outline__1_.pdf

103.3 KB

/.../Module 1 - Introduction and the Cyber Kill Chain Overview/

1.1 Introduction.mp4

8.5 MB

1.2 The Cyber Kill Chain.mp4

23.1 MB

/.../Module 2 - The Cyber Kill Chain/

2.1 Reconnaissance 1.mp4

61.2 MB

2.2 Reconnaissance 2.mp4

33.6 MB

2.3 Reconnaissance 3.mp4

28.9 MB

2.4 Weaponization.mp4

30.4 MB

2.5 Delivery.mp4

32.4 MB

2.6 Exploitation and Installation.mp4

27.0 MB

2.7 Command and Control.mp4

29.1 MB

2.8 Action on Objectives.mp4

37.1 MB

/.../Module 3 - Defense in Depth Using the Cyber Kill Chain/

3.1 Defense in Depth.mp4

17.7 MB

/.../06. Cybersecurity Kill Chain™/Module 4 - Conclusion/

4.1 Conclusion.mp4

18.0 MB

/.../06. Cybersecurity Kill Chain™/Resources/

Additional Resources.pdf

151.0 KB

Fingerprinting Using Nmap Step by Step Guide.pdf

212.6 KB

Footprinting Using Passive Tools - NsLookup Step by Step Guide.pdf

217.1 KB

Footprinting Using Passive Tools - Websites Step by Step Guide.pdf

258.3 KB

Footprinting Using Passive Tools - Whois Step by Step Guide.pdf

229.9 KB

Glossary.pdf

207.1 KB

Module 2 - Weaponization Lab Using MSFvenom Step by Step Guide.pdf

214.1 KB

Study Guide.pdf

387.5 KB

Syllabus and Outline.pdf

246.7 KB

/.../07. Scanning, Enumeration, and Vulnerabilities/Module 1 - Introduction/

1.1 Scanning & Enumeration Introduction.mp4

12.9 MB

/.../Module 2 - Check for Live Systems & Ports/

2.1 Checking for Live Systems Lab Part 1.mp4

40.2 MB

2.2 Checking for Live Systems Lab Part 2.mp4

43.7 MB

2.3 Checking for Open Ports Lab Part 1.mp4

36.6 MB

2.4 Checking for Open Ports Lab Part 2.mp4

27.4 MB

/.../07. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/

3.1 Scanning Introduction.mp4

23.0 MB

3.2 Scanning with NMAP Half Connect Scan.mp4

21.6 MB

3.3 Scanning with NMAP Full Connect Scan.mp4

12.3 MB

3.4 Scanning with XMAS Scan Part 1.mp4

17.4 MB

3.5 Scanning with XMAS Scan Part 2.mp4

21.0 MB

3.6 Scanning with NMAP ACK Scan.mp4

18.5 MB

3.7 Scanning with NMAP ACK Scan and Windows Firewall.mp4

26.6 MB

3.8 Scanning with hping3 and SYN Scan.mp4

34.5 MB

3.9 Scanning with hping3 and ACK Scan.mp4

20.7 MB

3.10 Scanning with hping3 and XMAS Scan.mp4

32.3 MB

3.11 Scanning with hping3, ACK Scan, and Windows Firewall.mp4

28.8 MB

/.../Module 4 - Fingerprinting & Banner Grabbing/

4.1 OS Fingerprinting.mp4

43.4 MB

4.2 Banner Grabbing.mp4

47.1 MB

/.../Module 5 - Enumeration Tools/

5.1 Zenmap.mp4

47.2 MB

5.2 Dig and Finger Commands.mp4

37.6 MB

/.../07. Scanning, Enumeration, and Vulnerabilities/Module 6 - Vulnerabilities/

6.1 Vulnerability Scanner Setup and Configuration of Core Impact Part 1.mp4

37.1 MB

6.2 Vulnerability Scanner Setup and Configuration of Core Impact Part 2.mp4

36.0 MB

6.3 Vulnerability Scanner Setup and Configuration of OpenVAS Part 1.mp4

37.7 MB

6.4 Vulnerability Scanner Setup and Configuration of OpenVAS Part 2.mp4

58.7 MB

/.../07. Scanning, Enumeration, and Vulnerabilities/Module 7 - Conclusion/

7.1 Vulnerability Scan Assessment Overview.mp4

6.9 MB

7.2 Scanning, Enumerations, & Vulnerabilities Conclusion.mp4

18.2 MB

/.../07. Scanning, Enumeration, and Vulnerabilities/Resources/

Scanning & Enumeration Glossary.pdf

235.8 KB

Scanning & Enumeration Scanning Assessment.pdf

115.8 KB

Scanning & Enumeration Study Guide.pdf

202.2 KB

/.../08. OWASP Top 10 - 2021/Module 1 - Introduction/

1.2 Introduction.mp4

38.5 MB

1.3 An Introduction to OWASP.mp4

24.6 MB

1.4 The OWASP Top 10.mp4

40.2 MB

1.5 OWASP Web Security Testing Guide (WSTG).mp4

21.4 MB

1.6 Using Intercepting Proxies in Web Application Security Testing.mp4

50.9 MB

1.7 Video Demonstration of Using Intercepting Proxies.mp4

83.5 MB

1.8 Video Demonstration of Using OWASP Mutillidae.mp4

10.5 MB

/.../08. OWASP Top 10 - 2021/Resources/

OWASP Top 10 2021 Complete Syllabus.pdf

312.9 KB

/.../Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Module 1 - Introduction/

1.1 Introduction.mp4

9.3 MB

/.../Module 2 - Wireshark and TCPDUMP/

2.1 Wireshark Lab Part 1.mp4

42.2 MB

2.2 Wireshark Lab Part 2.mp4

49.1 MB

2.3 Wireshark Lab Part 3.mp4

38.7 MB

2.4 Packet Sniffing Lab Part 1.mp4

46.6 MB

2.5 Packet Sniffing Lab Part 2.mp4

23.7 MB

2.6 Applying Filters to TCPDUMP and Wireshark Lab Part 1.mp4

55.5 MB

2.7 Applying Filters to TCPDUMP and Wireshark Lab Part 2.mp4

79.9 MB

2.8 TCPDUMP Lab.mp4

52.7 MB

/.../Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Module 3 - Conclusion/

3.1 Capstone Lab Navigation.mp4

7.9 MB

3.2 Conclusion.mp4

7.0 MB

/.../Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Resources/

Glossary.pdf

374.7 KB

Lab 1 Wireshark - Step by Step Guide.pdf

145.6 KB

Lab 2 Packet Sniffing - Step by Step Guide.pdf

140.0 KB

Lab 3 Applying Filters to TCPDump and Wireshark - Step by Step Guide.pdf

145.9 KB

Lab 4 TCPDump - Step by Step Guide.pdf

133.2 KB

Study Guide.pdf

332.7 KB

Syllabus and Outline.pdf

249.8 KB

TCPDump Cheat Sheet.pdf

165.5 KB

Wireshark & TCPDump - Instructor Notes.pdf

545.0 KB

Wireshark & TCPDump Sources.pdf

114.5 KB

Wireshark Cheat Sheet.pdf

279.2 KB

Wireshark Filters.pdf

194.4 KB

/.../10. Introduction to Splunk/Module 1 - Introduction/

1.1 Welcome.mp4

16.9 MB

1.2 What is Splunk.mp4

17.8 MB

1.3 Splunk and Your Career.mp4

30.5 MB

/.../Module 2 - Splunk Products, Resources, and Certifications/

2.1 Splunk Products, Resources, and Certifications.mp4

3.1 MB

2.2 Splunk Website.mp4

27.1 MB

2.3 Splunk Products.mp4

20.7 MB

/.../Module 3 - Setting Up Splunk/

3.1 Setting Up Splunk.mp4

10.4 MB

3.2 Parts of Splunk.mp4

18.5 MB

3.3 Installing Splunk on Linux.mp4

42.6 MB

3.4 Installing Splunk on Windows.mp4

23.6 MB

3.5 Installing a Universal Forwarder.mp4

20.1 MB

/.../10. Introduction to Splunk/Module 4 - Data/

4.1 Data.mp4

1.7 MB

4.2 Web Interface Tour.mp4

36.8 MB

4.3 Ways to Get Data.mp4

51.0 MB

4.4 Inputs Monitoring.mp4

29.9 MB

/.../Module 5 - Using Data/

5.1 Using Data.mp4

2.3 MB

5.2 Searches.mp4

23.2 MB

5.3 Alerts.mp4

38.3 MB

5.4 Reports and Dashboards.mp4

24.4 MB

5.5 App Basics.mp4

21.2 MB

/.../10. Introduction to Splunk/Module 6 - Conclusion/

6.1 More to Learn.mp4

10.2 MB

6.2 Final Review.mp4

9.6 MB

/.../10. Introduction to Splunk/Resources/

1.2 Slide Handout.pdf

5.2 MB

1.3 Slide Handout.pdf

4.1 MB

2.3 Slide Handout.pdf

4.2 MB

3.2 Slide Handout.pdf

3.2 MB

3.3 Slide Handout.pdf

2.1 MB

3.4 Slide Handout.pdf

1.6 MB

4.3 Slide Handout.pdf

1.8 MB

4.4 Slide Handout.pdf

3.0 MB

5.2 Slide Handout.pdf

1.9 MB

5.3 Slide Handout.pdf

3.1 MB

5.4 Slide Handout.pdf

3.1 MB

5.5 Slide Handout.pdf

2.8 MB

6.1 Slide Handout.pdf

2.8 MB

6.2 Slide Handout.pdf

1.6 MB

Additional Readings.pdf

236.1 KB

Cheat Sheet.pdf

110.6 KB

Glossary.pdf

142.1 KB

Lab Info.pdf

426.6 KB

Quiz Questions.pdf

162.8 KB

Study Guide.pdf

688.8 KB

Syllabus and Outline.pdf

241.4 KB

/.../Module 1 - Introduction and Review/

1.1 Course Introduction.mp4

12.1 MB

1.2 Web Applications Architecture Review Part 1.mp4

27.9 MB

1.3 Web Applications Architecture Review Part 2.mp4

26.7 MB

1.4 Web Server Logs Review Part 1.mp4

21.5 MB

1.5 Web Server Logs Review Part 2.mp4

24.0 MB

1.6 Tips and Common Issues Part 1.mp4

24.1 MB

1.7 Tips and Common Issues Part 2.mp4

26.2 MB

/.../Module 2 - Identifying Web Attacks Through Logs/

2.1 Web Application Attacks Review.mp4

31.0 MB

2.2 Vulnerability Scans.mp4

32.2 MB

2.3 Brute Force Attacks.mp4

28.0 MB

2.4 SQL Injection.mp4

37.2 MB

2.5 File Inclusion.mp4

24.1 MB

2.6 XSS - Cross-Site Scripting.mp4

27.9 MB

2.7 CSRF - Cross Site Request Forgery.mp4

14.7 MB

2.8 Other Log Sources Part 1.mp4

36.5 MB

2.9 Other Log Sources Part 2.mp4

27.1 MB

2.10 Course Summary.mp4

11.9 MB

/.../11. Identifying Web Attacks Through Logs/Resources/

Glossary.pdf

190.7 KB

Internet Logs.zip

464.8 KB

Lab logs.zip

1.6 MB

Quiz.pdf

942.1 KB

Study Guide.pdf

4.8 MB

Syllabus and Outline.pdf

110.9 KB

/.../Module 1 - Just the Basics/

1.1 1.0.1 Course Introduction - IP.mp4

16.5 MB

1.2 1.0.2 Background Information - IP.mp4

32.3 MB

1.3 Logic Part 1 - IP.mp4

35.2 MB

1.4 Logic Part 2 - IP.mp4

31.6 MB

1.5 Variables - IP.mp4

23.0 MB

1.6 If Statements - IP.mp4

30.5 MB

1.7 For Loops - IP.mp4

38.2 MB

1.8 While Loops - IP.mp4

27.2 MB

1.9 Turning Logic into Pseudocode Part 1 - IP.mp4

35.4 MB

1.10 Turning Logic into Pseudocode Part 2 - IP.mp4

32.6 MB

1.11 Turning Logic into Pseudocode Part 3 - IP.mp4

36.9 MB

1.12 Python Basics Part 1 - IP.mp4

21.5 MB

1.13 Python Basics Part 2 - IP.mp4

35.2 MB

1.14 Summary and Review - IP.mp4

8.3 MB

/.../Module 2 - Data Types and Logic/

2.1 Data Types and Logic Introduction - IP.mp4

9.0 MB

2.2 If_Elif_Else - IP.mp4

15.4 MB

2.3 For_Else - IP.mp4

17.0 MB

2.4 While in Python - IP.mp4

9.8 MB

2.5 Python Logical Escapes - IP.mp4

11.4 MB

2.6 Python Functions - IP.mp4

23.6 MB

2.7 Strings (Deep-Dive) Part 1 - IP.mp4

19.6 MB

2.8 Strings (Deep-Dive) Part 2 - IP.mp4

14.6 MB

2.9 Numbers (Deep-Dive) - IP.mp4

8.8 MB

2.10 Lists (Deep-Dive) - IP.mp4

16.4 MB

2.11 Dictionaries (Deep-Dive) - IP.mp4

12.1 MB

2.12 Summary and Review - IP.mp4

5.5 MB

/.../12. Intro to Python/Resources/

beginners_python_cheat_sheet_pcc_dictionaries.pdf

350.3 KB

beginners_python_cheat_sheet_pcc_files_exceptions.pdf

436.9 KB

beginners_python_cheat_sheet_pcc_functions.pdf

334.2 KB

beginners_python_cheat_sheet_pcc_if_while.pdf

350.2 KB

beginners_python_cheat_sheet_pcc_lists.pdf

360.4 KB

Challenges.pdf

56.3 KB

Intro_to_Python-Syllabus_update_-5_5_2022-.pdf

133.9 KB

Intro_to_Python_Glossary__1_.pdf

156.5 KB

Intro_to_Python_Solutions__1_.pdf

147.6 KB

Intro_to_Python_study_guide__1_.pdf

793.0 KB

/.../Module 1 - Intro to PowerShell Scripting/

1.1 What is PowerShell.mp4

24.3 MB

1.2 Working with P2.mp4

24.5 MB

1.3 Command Line.mp4

18.5 MB

1.4 Getting Help.mp4

35.1 MB

1.5 Additional Piping.mp4

19.5 MB

1.6 Additional Help.mp4

18.1 MB

1.7 Scripting Basics.mp4

35.5 MB

1.8 Common Commands Part 1.mp4

32.4 MB

1.9 Common Commands Part 2.mp4

58.0 MB

1.10 Common Commands Part 3.mp4

15.3 MB

1.11 Common Commands Part 4.mp4

26.0 MB

/.../Module 1 - Risk Management and Security Basics/

1.1 Why Security+.mp4

24.2 MB

1.2 Risk Management and Security Basics.mp4

11.2 MB

1.3 Risk Management Overview.mp4

11.0 MB

1.4 Use and Misuse Cases.mp4

9.3 MB

1.5 Risk Assessment.mp4

19.1 MB

1.6 Risk Mitigation.mp4

14.5 MB

1.7 Risk Monitoring.mp4

4.6 MB

1.8 Security Principles - Confidentiality.mp4

14.5 MB

1.9 Integrity and Availability Threats and Mitigation.mp4

6.5 MB

1.10 Security Principles Wrap-Up.mp4

3.9 MB

/.../Module 2 - Threats, Attacks and Vulnerabilities/

2.1 Understanding Attacks.mp4

9.6 MB

2.2 Social Engineering.mp4

10.0 MB

2.3 Malware.mp4

6.3 MB

2.4 Network-Based Attacks.mp4

22.9 MB

2.5 Spoofing and Redirection.mp4

7.3 MB

2.6 DNS Service.mp4

20.2 MB

2.7 Passwords.mp4

12.9 MB

2.8 Wireless Security Part 1.mp4

22.3 MB

2.9 Wireless Security Part 2.mp4

16.0 MB

2.10 Application Attacks.mp4

7.2 MB

2.11 Code Injection and Cross Site Scripting.mp4

22.0 MB

2.12 XSRF Race Conditions and Memory Issues.mp4

13.4 MB

/.../14. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/

3.1 Cryptography Introduction and Services.mp4

9.9 MB

3.2 Cryptography Definitions_ Initialization Vectors.mp4

22.1 MB

3.3 Algorithms and Keys.mp4

6.6 MB

3.4 Desirable Qualities of Algorithms and Keys.mp4

11.0 MB

3.5 Symmetric Cryptography.mp4

13.8 MB

3.6 Symmetric Ciphers Stream and Block.mp4

13.1 MB

3.7 Asymmetric Cryptography.mp4

10.3 MB

3.8 Hashing for Integrity.mp4

17.7 MB

3.9 MAC Message Authentication Code.mp4

7.2 MB

3.10 Hybrid Cryptography SSL and TLS.mp4

11.0 MB

3.11 SSL, TLS and PKI Introduction.mp4

8.4 MB

3.12 PKI Continued.mp4

18.2 MB

3.13 PGP and SMIME.mp4

10.6 MB

/.../Module 4 - Network Security/

4.1 Networking Concepts.mp4

18.3 MB

4.2 Network Connectivity.mp4

14.1 MB

4.3 Network Services Continued - DHCP and IPAM.mp4

20.4 MB

4.4 OSI Model Introduction and Encapsulation.mp4

26.0 MB

4.5 OSI Layers 1 and 2.mp4

41.1 MB

4.6 OSI Layers 3 and 4.mp4

21.0 MB

4.7 OSI Layers 5, 6, 7 and Summary.mp4

20.2 MB

4.8 Ports and Protocols Introduction.mp4

10.7 MB

4.9 Protocols of the TCPIP Suite Part 1.mp4

30.0 MB

4.10 Protocols of the TCPIP Suite Part 2.mp4

16.9 MB

4.11 Network Services DNS.mp4

20.7 MB

4.12 Network Storage.mp4

15.1 MB

4.13 Remote Access.mp4

12.5 MB

4.14 Tunneling and IPSec Part 1.mp4

18.9 MB

4.15 Tunneling and IPSec Part 2.mp4

18.9 MB

/.../Module 5 - Network Connectivity Devices/

5.1 Network Connectivity Devices Part 1.mp4

26.3 MB

5.2 Network Connectivity Devices Part 2.mp4

10.5 MB

5.3 Switch and VLAN Configuration Part 1.mp4

15.2 MB

5.4 Switch and VLAN Configuration Part 2.mp4

10.1 MB

5.5 Routing.mp4

29.6 MB

5.6 Network Address Translation.mp4

11.9 MB

5.7 Firewalls.mp4

29.1 MB

5.8 Firewall Best Practices.mp4

15.2 MB

5.9 Intrusion Detection and Prevention.mp4

28.8 MB

/.../Module 6 - Operational Security/

6.1 Introduction and Policy.mp4

8.4 MB

6.2 Policies and Best Practices Part 1.mp4

22.5 MB

6.3 Policies and Best Practices Part 2.mp4

18.6 MB

6.4 Scanning, Monitoring and Patching.mp4

23.5 MB

6.5 Patch Lifecycle Baselines and Traffic Analysis.mp4

21.4 MB

6.6 Fault Management.mp4

14.5 MB

6.7 RAID and Data Backups.mp4

21.5 MB

6.8 Business Continuity and Disaster Recovery Part 1.mp4

26.9 MB

6.9 Business Continuity and Disaster Recovery Part 2.mp4

11.5 MB

6.10 Virtualization Part 1.mp4

20.5 MB

6.11 Virtualization Part 2.mp4

19.8 MB

6.12 Cloud Computing.mp4

12.4 MB

6.13 Cloud Services.mp4

32.5 MB

6.14 Cloud Deployment Models and Cloud Wrap-Up.mp4

12.2 MB

6.15 IoT Introduction.mp4

11.8 MB

6.16 OWASP IoT and Wrap-Up.mp4

15.2 MB

6.17 Hardening the System Part 1.mp4

7.5 MB

6.18 Hardening the System Part 2.mp4

9.9 MB

6.19 Vulnerability Assessments and Penetration Tests.mp4

13.8 MB

6.20 Incident Response.mp4

8.7 MB

6.21 Forensic Investigations.mp4

14.3 MB

/.../Module 7 - Identity and Access Management/

7.1 Identity and Access Management Introduction.mp4

10.2 MB

7.2 Authentication.mp4

31.7 MB

7.3 Single Sign-On Kerberos Part 1.mp4

17.2 MB

7.4 Single Sign-On Kerberos Part 2.mp4

10.9 MB

7.5 Single Sign-On with Federated Services Part 1.mp4

18.3 MB

7.6 Single Sign-On with Federated Services Part 2.mp4

15.0 MB

7.7 Network Access Control and Authentication Wrap-Up.mp4

16.2 MB

7.8 Authorization.mp4

28.5 MB

7.9 Auditing and Wrap-Up.mp4

6.7 MB

/.../14. CompTIA Security+ (SY0-601)/Resources/

CompTIA Security Plus Syllabus and Outline.pdf

315.7 KB

/.../Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 1 - Introduction/

1.1 Nmap - What It Is and Why It's Important - NM.mp4

21.2 MB

1.2 About the Instructor - NM.mp4

12.1 MB

1.3 Course Overview and Prerequisites - NM.mp4

9.8 MB

1.4 Ethics and Legality of Scanning - NM.mp4

34.1 MB

/.../Module 2 - Nmap Basics/

2.1 Installing Nmap on Windows - NM.mp4

39.2 MB

2.2 Installing Nmap on Linux - NM.mp4

38.3 MB

2.3 Installing Nmap on Mac - NM.mp4

46.9 MB

2.4 Kali Linux - A Hacker's Best Friend - NM.mp4

24.0 MB

2.5 Kali Linux Lab - Running it Live - NM.mp4

48.6 MB

2.6 Removing Nmap from Windows - NM.mp4

34.0 MB

2.7 Removing Nmap from Linux - NM.mp4

13.0 MB

2.8 Removing Nmap from Mac - NM.mp4

17.3 MB

2.9 Getting Help - NM.mp4

63.1 MB

2.10 Phases of the Nmap Scan - NM.mp4

48.2 MB

2.11 Constructing an Nmap Scan - NM.mp4

40.1 MB

2.12 Constructing an Nmap Scan Lab Part 1 - NM.mp4

33.2 MB

2.13 Constructing an Nmap Scan Lab Part 2 - NM.mp4

49.3 MB

2.14 General Considerations - NM.mp4

59.1 MB

2.15 Custom Scan Profiles Part 1 - NM.mp4

32.5 MB

2.16 Custom Scan Profiles Part 2 - NM.mp4

53.0 MB

/.../Module 3 - Nmap & The TCP_IP Protocol Suite/

3.1 IPv4 for Nmap - NM.mp4

26.3 MB

3.2 IP, TCP, UDP, and ICMP Headers - NM.mp4

55.8 MB

3.3 Nmap and Wireshark Part 1 - NM.mp4

46.3 MB

3.4 Nmap and Wireshark Part 2 - NM.mp4

89.6 MB

3.5 Nmap & IPv6 - NM.mp4

23.7 MB

/.../Module 4 - Network Scanning and Discovery/

4.1 Target Specification Review+ - NM.mp4

20.4 MB

4.2 Target Specification Lab Part 1 - NM.mp4

41.7 MB

4.3 Target Specification Lab Part 2 - NM.mp4

31.3 MB

4.4 Scan Techniques - NM.mp4

42.3 MB

4.5 Scan Techniques Lab - NM.mp4

58.9 MB

4.6 Host Discovery Part 1 - NM.mp4

39.1 MB

4.7 Host Discovery Part 2 - NM.mp4

39.7 MB

4.8 TCP & UDP Port Scanning - NM.mp4

34.6 MB

4.9 TCP & UDP Port Scanning Lab Part 1 - NM.mp4

31.5 MB

4.10 TCP & UDP Port Scanning Lab Part 2.mp4

37.7 MB

4.11 Service and Application Version Detection Part 1 - NM.mp4

72.5 MB

4.12 Service and Application Version Detection Part 2 - NM.mp4

46.7 MB

4.13 Operating System Detection and Fingerprinting Part 1 - NM.mp4

35.7 MB

4.14 Operating System Detection and Fingerprinting Part 2 - NM.mp4

78.6 MB

4.15 NSE, Vulnerability Testing & Exploitation Part 1 - NM.mp4

27.8 MB

4.16 NSE, Vulnerability Testing & Exploitation Part 2 - NM.mp4

66.4 MB

4.17 NSE, Vulnerability Testing & Exploitation - NM.mp4

42.3 MB

4.18 Timing and Performance Part 1 - NM.mp4

24.6 MB

4.19 Timing and Performance Part 2 - NM.mp4

33.0 MB

/.../Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Resources/

Glossary.pdf

112.6 KB

Study Guide.pdf

327.9 KB

Syllabus and Outline.pdf

260.2 KB

/.../Module 1 - Understanding ATT&CK®/

1.1 Introduction to ATT&CK®.mp4

21.0 MB

1.2 Matrices or Platforms.mp4

14.2 MB

1.3 Tactics.mp4

8.4 MB

1.4 Techniques and Sub-Techniques.mp4

16.3 MB

1.5 Mitigations.mp4

9.1 MB

1.6 Data Sources and Detections.mp4

23.6 MB

1.7 Groups and Software.mp4

15.3 MB

1.8 How ATT&CK® Grows and Evolves.mp4

18.1 MB

/.../Module 2 - Benefits of Using ATT&CK®/

2.1 Community Perspective.mp4

15.5 MB

2.2 Common Language.mp4

10.1 MB

2.3 Quantitative Scorecard.mp4

9.9 MB

2.4 ATT&CK® Navigator.mp4

18.0 MB

/.../Module 3 - Operationalizing ATT&CK®/

3.1 Cyber Threat Intelligence.mp4

12.2 MB

3.2 Detection and Analysis.mp4

13.9 MB

3.3 Threat Emulation.mp4

15.1 MB

3.4 Assessment and Engineering.mp4

13.2 MB

3.5 Putting it all Together into Threat-Informed Defense.mp4

10.8 MB

3.6 Course Summary.mp4

2.9 MB

/.../2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Resources/

MITRE_ATT_CK_Defender_____MAD__ATT_CK___Fundamentals_Badge_Training_Syllabus_and_Outline__1_.pdf

128.8 KB

/.../Module 01 - Course Introduction/

1.1 Course Overview.mp4

7.1 MB

1.2 What is the MITRE ATT&CK Framework.mp4

24.7 MB

1.3 Where is the MITRE ATT&CK Framework Being Used.mp4

23.6 MB

1.4 Navigation and Review.mp4

98.0 MB

/.../Module 02 - Initial Access/

2.1 What is Initial Access.mp4

11.5 MB

2.2 External Remote Services.mp4

29.4 MB

2.3 Spearphishing Link.mp4

50.6 MB

2.4 Supply Chain Compromise Part 1.mp4

29.6 MB

2.5 Supply Chain Compromise Part 2.mp4

16.4 MB

2.6 Trusted Relationship.mp4

32.4 MB

2.7 Valid Accounts Part 1.mp4

21.3 MB

2.8 Valid Accounts Part 2.mp4

18.9 MB

2.9 Initial Access Case Study.mp4

17.3 MB

2.10 Module 2 Summary.mp4

10.0 MB

/.../Module 03 - Execution/

3.1 What is Execution.mp4

5.5 MB

3.2 Command Line Interface.mp4

42.2 MB

3.3 Execution Through API.mp4

14.9 MB

3.4 Control Panel Items.mp4

30.7 MB

3.5 Powershell.mp4

26.8 MB

3.6 Scripting.mp4

23.2 MB

3.7 User Execution.mp4

23.4 MB

3.8 Execution Case Study.mp4

18.6 MB

3.9 Module 3 Summary.mp4

10.6 MB

/.../Module 04 - Persistence/

4.1 What is Persistence.mp4

4.6 MB

4.2 Accessibility Features.mp4

27.6 MB

4.3 Bootkit.mp4

19.7 MB

4.4 Browser Extension.mp4

26.4 MB

4.5 Component Firmware.mp4

22.3 MB

4.6 Create Account.mp4

25.3 MB

4.7 Hooking.mp4

8.5 MB

4.8 New Service.mp4

19.9 MB

4.9 Persistence Case Study.mp4

18.6 MB

4.10 Module 4 Summary.mp4

5.1 MB

/.../Module 05 - Privilege Escalation/

5.1 What is Privilege Escalation.mp4

5.1 MB

5.2 Access Token Manipulation.mp4

20.1 MB

5.3 Elevation Escalation with Prompt.mp4

14.8 MB

5.4 Exploitation for Privilege Escalation.mp4

22.6 MB

5.5 File System Permission Weakness.mp4

16.2 MB

5.6 Scheduled Task.mp4

15.7 MB

5.7 Sudo.mp4

15.4 MB

5.8 Web Shell.mp4

24.5 MB

5.9 Privilege Escalation Case Study.mp4

50.9 MB

5.10 Module 5 Summary.mp4

4.9 MB

/.../Module 06 - Defense Evasion/

6.1 What is Defense Evasion.mp4

5.6 MB

6.2 Clear Command History.mp4

13.9 MB

6.3 Compile After Delivery.mp4

14.4 MB

6.4 Disabling Security Tools.mp4

8.3 MB

6.5 Hidden Files and Directories.mp4

12.0 MB

6.6 Hidden Users.mp4

7.2 MB

6.7 Process Hollowing.mp4

11.9 MB

6.8 Software Packing.mp4

10.8 MB

6.9 Defense Evasion Case Study.mp4

17.6 MB

6.10 Module 6 Summary.mp4

6.2 MB

/.../Module 07 - Credential Access/

7.1 What is Credential Access.mp4

3.1 MB

7.2 Bash History.mp4

8.9 MB

7.3 Brute Forces.mp4

16.5 MB

7.4 Credential Dumping.mp4

10.2 MB

7.5 Steal Web Session Cookie.mp4

10.5 MB

7.6 Credential Access Case Study.mp4

8.7 MB

7.7 Module 7 Summary.mp4

2.7 MB

/.../Module 08 - Discovery/

8.1 What is Discovery.mp4

3.7 MB

8.2 Account Discovery.mp4

11.9 MB

8.3 Browser Bookmark Discovery.mp4

15.7 MB

8.4 System Owner or User Discovery.mp4

7.2 MB

8.5 Discovery Case Study.mp4

11.7 MB

8.6 Module 8 Summary.mp4

3.0 MB

/.../Module 09 - Lateral Movement/

9.1 What is Lateral Movement.mp4

3.0 MB

9.2 Application Deployment Software.mp4

13.2 MB

9.3 Exploitation of Remote Services.mp4

18.9 MB

9.4 SSH Hijacking.mp4

10.7 MB

9.5 Lateral Movement Case Study.mp4

19.5 MB

9.6 Module 9 Summary.mp4

2.9 MB

/.../Module 10 - Collection/

10.1 What is Collection.mp4

2.8 MB

10.2 Audio Capture.mp4

10.0 MB

10.3 Clipboard Data.mp4

19.5 MB

10.4 Data from Local System.mp4

8.0 MB

10.5 Collection Case Study.mp4

10.1 MB

10.6 Module 10 Summary.mp4

2.7 MB

/.../Module 11 - Command and Control/

11.1 What is Command Control.mp4

2.4 MB

11.2 Commonly Used Port.mp4

8.6 MB

11.3 Custom Command and Control Protocol.mp4

8.0 MB

11.4 Uncommonly Used Ports.mp4

9.5 MB

11.5 Command and Control Case Study.mp4

6.8 MB

11.6 Module 11 Summary.mp4

2.8 MB

/.../Module 12 - Exfiltration/

12.1 What is Exfiltration.mp4

1.9 MB

12.2 Automated Exfiltration.mp4

9.0 MB

12.3 Data Compressed.mp4

6.5 MB

12.4 Data Transfer Size or Limits.mp4

6.4 MB

12.5 Exfiltration Case Study.mp4

7.3 MB

12.6 Module 12 Summary.mp4

3.1 MB

/.../Module 13 - Impact/

13.1 What is Impact.mp4

2.4 MB

13.2 Account Access Removal.mp4

7.4 MB

13.3 Defacement.mp4

5.2 MB

13.4 Impact Case Study.mp4

7.2 MB

13.5 Module 13 Summary.mp4

2.0 MB

/.../Module 14 - Conclusion/

14.1 Course Summary.mp4

5.9 MB

/.../3. Application of the MITRE ATT&CK Framework/Resources/

Application_of_the_MITRE_Attack_Framework_Glossary__1_.pdf

243.5 KB

Application_of_the_MITRE_Attack_Framework_Study_Guide__2___1_.pdf

1.3 MB

Application_of_the_MITRE_Attack_Framework_Syllabus_and_Outline.pdf

127.0 KB

/.../4. Advanced Cyber Threat Intelligence/Module 1 - Introduction/

1.1 Course Introduction.mp4

18.7 MB

1.2 Introduction to the Intelligence Lifecycle.mp4

16.6 MB

/.../4. Advanced Cyber Threat Intelligence/Module 2 - Collection/

2.1 Introduction to Data Collection.mp4

10.0 MB

2.2 Internal Data Acquisition.mp4

14.4 MB

2.3 External Data Sources.mp4

18.0 MB

2.4 Private Data Sources Part 1.mp4

20.2 MB

2.5 Private Data Sources Part 2.mp4

8.8 MB

2.6 Community Data Sources.mp4

23.8 MB

2.7 Public Data Sources Part 1.mp4

21.7 MB

2.8 Public Data Sources Part 2.mp4

9.6 MB

2.9 Leveraging OSINT Part 1.mp4

23.9 MB

2.10 Leveraging OSINT Part 2.mp4

14.0 MB

/.../Module 3 - Data Management and Processing/

3.1 Introduction to Data Processing.mp4

13.5 MB

3.2 Common CTI Standards Part 1.mp4

20.4 MB

3.3 Common CTI Standards Part 2.mp4

9.1 MB

3.4 Storage and Integration.mp4

5.4 MB

3.5 Threat Intelligence Platforms.mp4

20.8 MB

/.../4. Advanced Cyber Threat Intelligence/Module 4 - Analysis/

4.1 Introduction to Analysis.mp4

10.5 MB

4.2 Analysis of Competing Hypothesis.mp4

16.2 MB

4.3 Cyber Kill Chain and Diamond Model.mp4

24.1 MB

4.4 Cyber Kill Chain and Courses of Action Matrix.mp4

21.0 MB

/.../Module 5 - Campaign Analysis/

5.1 Introduction to Campaigns.mp4

10.9 MB

5.2 Heatmap Analysis.mp4

16.8 MB

5.3 Visual Analysis.mp4

14.6 MB

5.4 MITRE ATT&CK and the MITRE Threat Groups Track.mp4

19.4 MB

5.5 Threat Intelligence Naming Conventions.mp4

16.1 MB

/.../4. Advanced Cyber Threat Intelligence/Module 6 - Attribution/

6.1 Introduction to Attribution.mp4

17.0 MB

6.2 Cognitive Biases.mp4

15.6 MB

6.3 Logical Fallacies.mp4

14.1 MB

6.4 How to Manage Biases.mp4

12.7 MB

6.5 Nation-State Attribution Part 1.mp4

20.2 MB

6.6 Nation-State Attribution Part 2.mp4

9.2 MB

/.../Module 7 - Dissemination and Sharing/

7.1 Introduction to Dissemination.mp4

21.8 MB

7.2 Tactical Intelligence.mp4

16.3 MB

7.3 Operational Intelligence.mp4

13.2 MB

7.4 Strategic Intelligence.mp4

22.6 MB

/.../4. Advanced Cyber Threat Intelligence/Module 8 - Summary/

8.1 Summary.mp4

13.4 MB

/.../4. Advanced Cyber Threat Intelligence/Resources/

Advanced_Cyber_Threat_Intelligence_Glossary__1___1_.pdf

154.6 KB

Advanced_Cyber_Threat_Intelligence_Resources.pdf

130.4 KB

Advanced_Cyber_Threat_Intelligence_Study_Guide__1_.pdf

1.7 MB

Advanced_Cyber_Threat_Intelligence_Syllabus_and_Outline__1___1_.pdf

138.0 KB

/.../Module 1 - Introduction to Incident Response/

1.1 An Overall View of the Course.mp4

47.3 MB

1.2 The Humans Behind Cyber Security Incidents.mp4

52.7 MB

1.3 The Sony Hack Case Study.mp4

46.4 MB

/.../Module 2 - Incident Response Policy/

2.1 An Overview of Incident Response Policy.mp4

38.7 MB

2.2 The Elements of an Incident Response Policy.mp4

65.6 MB

2.3 The Role of Communication with Law Enforcement when it comes to security.mp4

55.3 MB

2.4 The Different Types of Incident Response Teams.mp4

65.6 MB

2.5 Outsourcing Considerations.mp4

55.4 MB

2.6 The Role of the Incident Response Manager.mp4

61.6 MB

2.7 What does an Incident Response team do.mp4

36.5 MB

/.../Module 3 - Incident Handling/

3.1 An Introduction to Incident Handling.mp4

46.7 MB

3.2 CIRC Team Composition.mp4

37.3 MB

3.3 Incident Response Policies.mp4

26.4 MB

3.4 The REACT Principle.mp4

39.1 MB

3.5 Maintaining the Integrity of the Scene following an incident.mp4

35.7 MB

3.6 The Respond Part of Incident Response.mp4

26.3 MB

/.../Module 4 - Legal Aspects of Incident Response/

4.1 An Introduction to legal considerations of incident response.mp4

41.6 MB

4.2 Expectation of Privacy.mp4

41.0 MB

4.3 Personally Identifiable Information (PII).mp4

60.4 MB

4.4 Giving notice to individuals.mp4

58.4 MB

4.5 Benefits of Information Sharing.mp4

25.6 MB

/.../Module 5 - Forensics of Incident Response/

5.1 Forensics in Support of an Incident Response.mp4

44.7 MB

5.2 The Phases of Investigation.mp4

41.6 MB

5.3 The Preservation Phase of Investigation.mp4

55.2 MB

5.4 Keys of Preservation.mp4

50.9 MB

5.5 Volatile Data Considerations.mp4

47.8 MB

5.6 Capturing the data.mp4

44.7 MB

5.7 Imaging concepts.mp4

54.2 MB

5.8 Volatile Memory Capture.mp4

63.0 MB

5.9 Forensics in Support of Incident Response.mp4

50.2 MB

5.10 Formatting a disk for Incident Response.mp4

55.9 MB

5.11 Using the FTK Imaging Software.mp4

45.7 MB

5.12 The Forensic Acquisition of Data from a PC.mp4

46.2 MB

5.13 Navigating the H Drive.mp4

49.6 MB

5.14 Obtaining the Windows Bitlocker Encryption Keys.mp4

31.2 MB

5.15 Obtaining the Windows Bitlocker Encryption Keys (continued).mp4

29.0 MB

5.16 The Autopsy Program.mp4

56.5 MB

/.../Module 6 - Insider Threat/

6.1 What is Insider Threat.mp4

57.3 MB

6.2 American Superconductor Case Study.mp4

36.9 MB

6.3 Indicators to identify an insider threat.mp4

96.6 MB

6.4 Using Automated processes to look for indicators of in insider threats.mp4

64.1 MB

6.5 Policy Enforcement.mp4

63.1 MB

6.6 Policies and procedures.mp4

67.7 MB

6.7 Policies and procedures (continued).mp4

61.9 MB

6.8 Policies and procedures (continued).mp4

56.9 MB

/.../5. Incident Response and Advanced Forensics/Module 7 - Malware/

7.1 Malware incidents.mp4

51.2 MB

7.2 Setting up a Virtual Machine.mp4

38.5 MB

7.3 Dynamic Analysis.mp4

57.5 MB

/.../Module 8 - Incident Recovery/

8.1 Incident Recovery.mp4

90.1 MB

8.2 Resiliency - The Answer to the Cyber Security Paradox.mp4

61.0 MB

/.../Module 1 - Incident Recovery/

1.1 Incident Recovery.mp4

35.2 MB

1.2 Incident Documentation.mp4

54.4 MB

1.3 Legal Concerns.mp4

35.3 MB

1.4 Lessons Learned Part 1.mp4

34.9 MB

1.5 Lessons Learned Part 2.mp4

69.4 MB

/.../Module 01 - Computer Forensics Today/

1.1 Course Introduction.mp4

21.9 MB

1.2 Computer Forensics Today Part 1.mp4

17.9 MB

1.3 Computer Forensics Today Part 2.mp4

21.0 MB

1.4 Computer Forensics Today Part 3.mp4

27.2 MB

1.5 Analyze Photos Lab Part 1.mp4

61.2 MB

1.6 Analyze Photos Lab Part 2.mp4

25.5 MB

1.7 Analyze Photos Lab Part 3.mp4

43.8 MB

/.../Module 02 - Computer Forensics Investigation Process/

2.1 Computer Forensics Investigation Process Part 1.mp4

33.9 MB

2.2 Computer Forensics Investigation Process Part 2.mp4

23.4 MB

/.../Module 03 - Hard Disks & File Systems/

3.1 Hard Disks and File Systems Part 1.mp4

12.2 MB

3.2 Hard Disks and File Systems Part 2.mp4

12.4 MB

3.3 Hard Disks and File Systems Part 3.mp4

12.0 MB

3.4 Hard Disks and File Systems Part 4.mp4

8.0 MB

3.5 Hard Disks and File Systems Part 5.mp4

8.9 MB

3.6 Hard Disks and File Systems Part 6.mp4

8.3 MB

3.7 Recovering Graphics Files Lab Part 1.mp4

30.4 MB

3.8 Recovering Graphics Files Lab Part 2.mp4

60.1 MB

3.9 Recovering Graphics Files Lab Part 3.mp4

58.2 MB

/.../Module 04 - Data Acquisition/

4.1 Data Acquisition Part 1.mp4

19.9 MB

4.2 Data Acquisition Part 2.mp4

14.7 MB

4.3 Forensics Lab Part 1.mp4

48.1 MB

4.4 Forensics Lab Part 2.mp4

47.4 MB

/.../Module 05 - Anti-Forensics Techniques/

5.1 Anti-Forensics Techniques Part 1.mp4

15.0 MB

5.2 Anti-Forensics Techniques Part 2.mp4

16.3 MB

/.../Module 06 - Operating System Forensics/

6.1 Operating System Forensics Part 1 (FI).mp4

9.5 MB

6.2 Operating System Forensics Part 2 (FI).mp4

7.3 MB

6.3 Operating System Forensics Part 3 (FI).mp4

14.7 MB

/.../Module 07 - Network Forensics/

7.1 Network Forensics.mp4

15.0 MB

/.../Module 08 - Web Attack Investigation/

8.1 Web Attack Investigation Part 1.mp4

7.6 MB

8.2 Web Attack Investigation Part 2.mp4

24.0 MB

8.3 Web Attack Investigation Part 3.mp4

14.7 MB

/.../Module 09 - Database Forensics/

9.1 Database Forensics.mp4

8.9 MB

/.../Module 10 - Forensics with the Cloud/

10.1 Forensics with the Cloud Part 1.mp4

16.1 MB

10.2 Forensics with the Cloud Part 2.mp4

13.5 MB

/.../Module 11 - Malware/

11.1 Malware Part 1 (FI).mp4

13.9 MB

11.2 Malware Part 2 (FI).mp4

6.1 MB

11.3 Malware Part 3 (FI).mp4

15.3 MB

/.../Module 12 - Email Investigation/

12.1 Email Investigation Part 1.mp4

13.3 MB

12.2 Email Investigation Part 2.mp4

9.9 MB

/.../Module 13 - Mobile/

13.1 Mobile Part 1.mp4

8.3 MB

13.2 Mobile Part 2.mp4

9.3 MB

13.3 Mobile Part 3.mp4

7.5 MB

13.4 Mobile Part 4.mp4

8.6 MB

13.5 Mobile Part 5.mp4

10.0 MB

/.../Module 14 - Forensic Reporting/

14.1 Forensic Reporting.mp4

17.2 MB

/.../Module 15 - Course Summary/

15.1 Course Summary.mp4

5.8 MB

/.../7. Computer Hacking and Forensics/Resources/

CHF Additional Tools to Know.pdf

364.1 KB

CHF Cisco Router Log Information.pdf

231.0 KB

CHF Course Notes.pdf

48.5 MB

CHF Glossary.pdf

238.6 KB

CHF Module 1 - Analyze Photos Lab - Step by Step Guide.pdf

779.9 KB

CHF Module 3 - Recovering Graphics Files Lab - Step by Step Guide.pdf

495.8 KB

CHF Module 4 - Live Data Acquisition Lab - Step by Step Guide.pdf

465.8 KB

CHF Recommended Labs.pdf

179.0 KB

CHF Study Guide.pdf

558.9 KB

CHF Syllabus & Outline.pdf

3.9 MB

CHF Tool Notes.pdf

526.1 KB

/.../Module 1 - About the Exam and Certification/

1.1 Course Welcome and Introduction.mp4

10.4 MB

1.2 CASP+ Overview.mp4

15.7 MB

1.3 CASP+ Course Overview.mp4

6.8 MB

/.../Module 2 - Security Architecture/

2.1 Network Security Architecture Part 1.mp4

58.0 MB

2.2 Network Security Architecture Part 2.mp4

39.5 MB

2.3 Secure Infrastructure Design.mp4

36.7 MB

2.4 Integrating Software Applications Part 1.mp4

17.5 MB

2.5 Integrating Software Applications Part 2.mp4

27.7 MB

2.6 Software Development Activities.mp4

29.2 MB

2.7 Data Security and the Data Life Cycle.mp4

29.1 MB

2.8 Authentication.mp4

25.2 MB

2.9 Authorization Controls.mp4

36.6 MB

2.10 Virtualization and Cloud Technology.mp4

37.8 MB

2.11 Emerging Technologies.mp4

34.9 MB

/.../Module 3 - Security Operations/

3.1 Threat Management.mp4

48.1 MB

3.2 Threat Management Frameworks.mp4

22.7 MB

3.3 Indicators of Compromise.mp4

25.7 MB

3.4 Vulnerability Management.mp4

38.6 MB

3.5 Vulnerability Assessments.mp4

54.2 MB

3.6 Vulnerability Risk Mitigation Part 1.mp4

30.3 MB

3.7 Vulnerability Risk Mitigation Part 2.mp4

31.0 MB

3.8 Techniques for Risk Reduction.mp4

25.2 MB

3.9 Incident Response.mp4

19.7 MB

3.10 Forensics Concepts.mp4

23.5 MB

3.11 Forensics Tools.mp4

29.6 MB

/.../Module 4 - Security Engineering and Cryptography/

4.1 Enterprise Mobility Security Part 1.mp4

37.8 MB

4.2 Enterprise Mobility Security Part 2.mp4

42.2 MB

4.3 Endpoint Security - Hardening Part 1.mp4

37.4 MB

4.4 Endpoint Security - Hardening Part 2.mp4

43.0 MB

4.5 Sector-Specific Technology Security Concerns.mp4

31.1 MB

4.6 ICS Protocols.mp4

30.0 MB

4.7 Security Implications of Cloud Technology Adoption.mp4

47.5 MB

4.8 Cryptography.mp4

49.0 MB

4.9 Implementing Public Key Infrastructure.mp4

30.7 MB

4.10 Implementing PKI Solutions.mp4

50.8 MB

4.11 Common Certificate Implementation Issues.mp4

22.5 MB

/.../Module 5 - Governance, Risk, and Compliance/

5.1 Understanding Risk.mp4

53.0 MB

5.2 The Risk Life Cycle.mp4

48.0 MB

5.3 Vendor Risk.mp4

46.0 MB

5.4 Governance and Compliance Part 1.mp4

54.1 MB

5.5 Governance and Compliance Part 2.mp4

40.6 MB

5.6 Business Impact Analysis.mp4

41.3 MB

5.7 Disaster Recovery Plans.mp4

22.8 MB

/.../Module 6 - Preparing for Your Exam/

6.1 Course Recap.mp4

42.2 MB

6.2 Study Strategies.mp4

13.8 MB

6.3 Exam Time - Strategies for Success.mp4

21.4 MB

/.../1. CompTIA CASP+ (CAS-004)/Resources/

CASP__Glossary.pdf

368.5 KB

CASP__Resources.pdf

31.1 KB

CASP__Syllabus.pdf

299.5 KB

/.../2. OWASP Top 10 - 2021/Module 1 - Introduction/

1.1 Introduction.mp4

31.5 MB

1.2 An Introduction to OWASP.mp4

24.6 MB

1.3 The OWASP Top 10.mp4

40.2 MB

1.4 OWASP Web Security Testing Guide (WSTG).mp4

21.4 MB

1.5 Using Intercepting Proxies in Web Application Security Testing.mp4

40.5 MB

1.6 Video Demonstration of Using Intercepting Proxies.mp4

72.5 MB

1.7 Video Demonstration of Using OWASP Mutillidae.mp4

10.5 MB

/.../2. OWASP Top 10 - 2021/Resources/

OWASP_Top_10_2021_Complete_Syllabus.pdf

312.9 KB

/.../3. Intro to Malware Analysis and Reverse Engineering/Module 1 - Introduction/

1.1 Intro Part 1.mp4

77.4 MB

1.2 Intro Part 2.mp4

45.7 MB

1.3 Intro Part 3.mp4

31.6 MB

/.../Module 2 - Lab Setup/

2.1 Lab Setup Part 1.mp4

7.9 MB

2.2 Lab Setup Part 2.mp4

118.9 MB

2.3 Lab Setup Part 3.mp4

67.5 MB

/.../Module 3 - Dynamic Analysis Part 1/

3.1 Dynamic Analysis Part 1.1.mp4

17.7 MB

3.2 Dynamic Analysis Part 1.2.mp4

213.4 MB

3.3 Dynamic Analysis Part 1.3.mp4

46.5 MB

/.../Module 4 - Dynamic Analysis Part 2/

4.1 Dynamic Analysis Part 2.1.mp4

44.8 MB

4.2 Dynamic Analysis Part 2.2.mp4

182.2 MB

/.../Module 5 - Basic Static Analysis/

5.1 Basic Static Analysis Part 1.mp4

152.0 MB

5.2 Basic Static Analysis Part 2.mp4

123.9 MB

5.3 Basic Static Analysis Part 3.mp4

259.8 MB

5.4 Basic Static Analysis Part 4A.mp4

181.4 MB

5.5 Basic Static Analysis Part 4B.mp4

12.5 MB

5.6 Basic Static Analysis Part 5.mp4

157.9 MB

5.7 Basic Static Analysis Part 6.mp4

203.1 MB

/.../3. Intro to Malware Analysis and Reverse Engineering/Module 6 - Packers/

6.1 Packers Part 1.mp4

82.5 MB

6.2 Packers Part 2.mp4

61.0 MB

6.3 Packers Part 3.mp4

155.0 MB

6.4 Packers Part 4.mp4

211.7 MB

6.5 Packers Part 5.mp4

35.6 MB

/.../Module 7 - Malware Defenses/

7.1 Malware Defenses Part 1.mp4

44.3 MB

7.2 Malware Defenses Part 2.mp4

386.3 MB

7.3 Malware Defenses Part 3.mp4

111.8 MB

/.../3. Intro to Malware Analysis and Reverse Engineering/Resources/

Intro_to_Malware_Analysis_and_Reverse_Engineering_Glossary__1_.pdf

150.7 KB

Intro_to_Malware_Analysis_and_Reverse_Engineering_Study_Guide__1_.pdf

1.2 MB

/.../Module 1 - Basic Assembly/

1.1 Template and Setup.mp4

44.3 MB

1.2 Introduction to Assembly.mp4

21.3 MB

1.3 Architecture, Registers, and Protected Mode.mp4

37.0 MB

1.4 Binary, 2's Complement and Hexadecimal.mp4

22.0 MB

1.5 Assembly Template.mp4

21.5 MB

1.6 Instructions, Directives and Generating a Listing.mp4

60.2 MB

1.7 Logical Operators and Memory Layout.mp4

47.5 MB

1.8 Segments and Functions.mp4

32.6 MB

1.9 Sign Extend, Zero Extend, Multiple, Divide.mp4

33.7 MB

1.10 Multiply and Divide Examples.mp4

49.8 MB

1.11 Compare, Conditionals and Jumps.mp4

37.0 MB

1.12 Skeleton and Loop Example.mp4

44.7 MB

1.13 Shift Left and Right.mp4

39.1 MB

1.14 Arithmetic Shift.mp4

55.1 MB

1.15 Module 1 Review.mp4

12.1 MB

/.../Module 2 - Indirect Addressing, Stack, Arrays and Strings/

2.1 Indirect Addressing and Variables Part 1.mp4

18.3 MB

2.2 Indirect Addressing and Variables Part 2.mp4

10.9 MB

2.3 Slack Intro Part 1.mp4

35.9 MB

2.4 Slack Intro Part 2.mp4

5.4 MB

2.5 Stack Usage.mp4

27.0 MB

2.6 Simple Function Example.mp4

59.0 MB

2.7 Function Prologue.mp4

8.8 MB

2.8 Function Epilogue.mp4

41.5 MB

2.9 Function Arguments.mp4

27.3 MB

2.10 Saving Registers.mp4

32.9 MB

2.11 More Complicated Function.mp4

48.0 MB

2.12 Calling Conventions.mp4

31.6 MB

2.13 Local Variables.mp4

17.7 MB

2.14 Local Variables Example.mp4

42.8 MB

2.15 Enter and Leave.mp4

13.8 MB

2.16 Enter and Leave Example Conversion.mp4

17.2 MB

2.17 Floating Point.mp4

27.6 MB

2.18 Floating Point Circle Example.mp4

40.1 MB

2.19 Floating Point Comparison.mp4

17.1 MB

2.20 Floating Point Comparison Example.mp4

32.6 MB

2.21 Max of Three Numbers.mp4

50.5 MB

2.22 Conditional Move.mp4

27.1 MB

2.23 Conditional Move Max Example.mp4

26.1 MB

2.24 Arrays.mp4

35.2 MB

2.25 Arrays Examples.mp4

23.2 MB

2.26 String Instructions.mp4

20.5 MB

2.27 Strings Uppercase Example.mp4

40.4 MB

/.../Module 3 - ARM Architecture/

3.1 ARM Intro.mp4

45.3 MB

3.2 ARM Template.mp4

21.6 MB

3.3 ARM Math and Data Movement.mp4

29.1 MB

3.4 Branching, If, While, Shift.mp4

32.8 MB

3.5 Shift Example.mp4

19.0 MB

3.6 Memory, Offsets, Debugging and Listing.mp4

48.8 MB

3.7 Pushing and Popping.mp4

20.4 MB

3.8 Push Example.mp4

16.7 MB

3.9 Array Indexing.mp4

25.5 MB

3.10 Array Indexing Example.mp4

14.0 MB

3.11 ARM Multiple Load and Store.mp4

22.6 MB

3.12 ARM Load and Store Multiple Examples.mp4

17.2 MB

3.13 VFP and Neon.mp4

59.3 MB

3.14 Neon Example.mp4

37.4 MB

3.15 Neon Floating Point.mp4

23.6 MB

3.16 Neon Floating Point Example.mp4

23.0 MB

3.17 SIMD Load and Store Data.mp4

34.2 MB

3.18 SIMD Process Data.mp4

34.2 MB

3.19 SIMD Encryption Example.mp4

42.3 MB

3.20 Thumb Mode.mp4

15.9 MB

3.21 Thumb Mode Example.mp4

51.5 MB

3.22 Conditional Execution.mp4

23.3 MB

3.23 Conditional Execution Example.mp4

29.1 MB

3.24 IT Block Assembly.mp4

16.9 MB

3.25 IT Block Example.mp4

23.8 MB

/.../Module 4 - C Constructs and Interrupts/

4.1 Tools for Code, Reverse Engineering.mp4

35.4 MB

4.2 Reverse Engineering Process.mp4

26.3 MB

4.3 Setup Reverse Engineering Lab.mp4

33.8 MB

4.4 Structures and Unions.mp4

18.2 MB

4.5 Structure Layout.mp4

17.0 MB

4.6 Structure Creation - Reverse Engineering.mp4

25.6 MB

4.7 Structures, Unions and Malloc.mp4

38.0 MB

4.8 Structures, Unions and Malloc Example.mp4

59.7 MB

4.9 Jump Tables and Switch Statements.mp4

20.1 MB

4.10 Jump Table Example.mp4

27.3 MB

4.11 Function Pointers.mp4

27.1 MB

4.12 Function Pointers Example.mp4

25.0 MB

4.13 Inline Assembly.mp4

36.7 MB

4.14 Inline Assembly Example.mp4

36.2 MB

4.15 Assembly with C.mp4

29.5 MB

4.16 SysCall and Interrupts.mp4

29.9 MB

4.17 Interrupts Example Use Fork.mp4

30.6 MB

4.18 Strings in C.mp4

29.9 MB

4.19 Integers in Assembly.mp4

35.6 MB

4.20 64-Bit Assembly.mp4

37.8 MB

4.21 MMX, SSE, AES-NI.mp4

33.5 MB

4.22 AES Implementations.mp4

51.6 MB

4.23 Implement Dump Registers.mp4

67.5 MB

4.24 Static and Dynamic Linking Assembly.mp4

27.3 MB

4.25 Shared Library.mp4

30.0 MB

4.26 Shared Library Example.mp4

48.3 MB

/.../Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Resources/

Assembly_1.1_Installing_the_Lab_Software_Step-by-Step_Guide.pdf

159.9 KB

Assembly_Glossary__1_.pdf

157.1 KB

Assembly_Study_Guide__1_.pdf

224.4 KB

Assembly_Syllabus_and_Outline.pdf

114.8 KB

figures.zip

291.0 KB

Thumb___16-bit_Instruction_Set.pdf

59.7 KB

Vector_Floating_Point_Instruction_Set.pdf

101.6 KB

/.../Module 1 - BSWJ - binwalk/

1.1 BSWJ - binwalk.mp4

41.0 MB

/.../Module 1 - Mapping to ATT&CK® from Narrative Reports/

1.1 Introduction - Challenges, Advantages and the Process of Mapping to ATT&CK®.mp4

81.5 MB

1.2 Finding and Researching the Behavior.mp4

46.8 MB

1.3 Translating the Behavior into a Tactic.mp4

69.2 MB

1.4 Identifying Techniques or Sub-Techniques.mp4

71.6 MB

1.5 Mapping to a Narrative Point.mp4

63.9 MB

1.6 Hedging Your Biases.mp4

54.3 MB

/.../Module 2 - Mapping to ATT&CK® from Raw Data/

2.1 The Process of Mapping from Raw Data.mp4

35.1 MB

2.2 Identify and Research Behaviors.mp4

27.2 MB

2.3 Translate Behaviors to Tactics, Techniques and Sub-Techniques.mp4

24.3 MB

2.4 Raw Data to Narrative Reporting.mp4

49.7 MB

/.../Module 3 - Storing and Analyzing ATT&CK®-Mapped Data/

3.1 Storing and Displaying ATT&CK®-Mapped Data.mp4

16.8 MB

3.2 Expressing and Storing ATT&CK®-Mapped Data.mp4

23.3 MB

3.3 Analyzing ATT&CK®-Mapped Data.mp4

31.7 MB

3.4 Exercise 3 - Comparing Layers in ATT&CK® Navigator.mp4

10.6 MB

/.../Module 4 - Defensive Recs from ATT&CK®-Mapped Data/

4.1 The Defensive Recommendations Process.mp4

27.3 MB

4.2 How Techniques and Sub-Techniques are Being Used.mp4

50.7 MB

4.3 Researching Organizational Capabilities and Constraints and Determine Trade-Offs.mp4

57.4 MB

4.4 Make Defensive Recommendations.mp4

72.4 MB

/.../6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/

APT39 and Cobalt Kitty Techniques.pdf

140.1 KB

Cybereason Operation Cobalt Kitty - Exercise Answers.pdf

2.7 MB

Cybereason Operation Cobalt Kitty - Exercise Hints.pdf

2.1 MB

Cybereason Operation Cobalt Kitty - Exercise.pdf

2.1 MB

Cybereason Operation Cobalt Kitty - Original Report.pdf

6.6 MB

FireEye APT39 - Exercise Answers.pdf

555.1 KB

FireEye APT39 - Exercise.pdf

464.3 KB

FireEye APT39 - Original Report.pdf

425.9 KB

Making Defensive Recommendations Guided Exercise.rtf

51.4 KB

Making Defensive Recommendations Unguided Exercise.rtf

54.9 KB

Syllabus and Outline.pdf

98.4 KB

ticket-473822 answers.pdf

86.3 KB

ticket-473822.rtf

1.1 KB

ticket-473845 answers.pdf

114.7 KB

ticket-473845.rtf

2.3 KB

/.../Module 1 - Incident Response Steps/

1.1 Incident Response Steps Introduction.mp4

22.9 MB

1.1 Incident Response Steps Introduction.vtt

13.3 KB

1.2 Incident Response Steps.mp4

22.1 MB

1.2 Incident Response Steps.vtt

15.9 KB

1.3 Incident Response Steps Breakdown.mp4

25.4 MB

1.3 Incident Response Steps Breakdown.vtt

16.5 KB

/.../Module 1 - Incident Response Planning/

1.1 Incident Response Kits Introduction.mp4

39.2 MB

1.1 Incident Response Kits Introduction.vtt

17.8 KB

1.2 Incident Response Kits Hardware.mp4

36.8 MB

1.2 Incident Response Kits Hardware.vtt

16.7 KB

1.3 Incident Response Kits Software.mp4

33.2 MB

1.3 Incident Response Kits Software.vtt

17.1 KB

1.4 Incident Response Team Models.mp4

39.0 MB

1.4 Incident Response Team Models.vtt

17.3 KB

1.5 Incident Response Team Members.mp4

37.3 MB

1.5 Incident Response Team Members.vtt

17.3 KB

/.../Module 1 - Implementing an Incident Response Plan/

1.1 Incident Identification.mp4

37.1 MB

1.1 Incident Identification.vtt

13.1 KB

1.2 First Steps in Incident Response.mp4

33.2 MB

1.2 First Steps in Incident Response.vtt

14.6 KB

1.3 Chain of Custody Part 1.mp4

39.3 MB

1.3 Chain of Custody Part 1.vtt

14.1 KB

1.4 Chain of Custody Part 2.mp4

40.2 MB

1.4 Chain of Custody Part 2.vtt

13.5 KB

1.5 Incident Containment.mp4

36.0 MB

1.5 Incident Containment.vtt

14.1 KB

1.6 Recovery.mp4

37.1 MB

1.6 Recovery.vtt

14.9 KB

/.../Module 1 - Incident Recovery/

1.1 Incident Recovery.mp4

35.2 MB

1.1 Incident Recovery.vtt

16.2 KB

1.2 Incident Documentation.mp4

54.4 MB

1.2 Incident Documentation.vtt

16.6 KB

1.3 Legal Concerns.mp4

35.3 MB

1.3 Legal Concerns.vtt

15.7 KB

1.4 Lessons Learned Part 1.mp4

34.9 MB

1.4 Lessons Learned Part 1.vtt

17.3 KB

1.5 Lessons Learned Part 2.mp4

69.4 MB

1.5 Lessons Learned Part 2.vtt

17.2 KB

/.../Module 01 - The Role of an Expert Witness/

1.1 Seeking the Truth.mp4

35.1 MB

1.1 Seeking the Truth.vtt

11.3 KB

1.2 Facts vs. Expert Witness.mp4

11.3 MB

1.2 Facts vs. Expert Witness.vtt

4.4 KB

/.../Module 02 - Forensic Concept Review/

2.1 Evidence Identification.mp4

14.7 MB

2.1 Evidence Identification.vtt

5.2 KB

2.2 Evidence Preservation.mp4

10.5 MB

2.2 Evidence Preservation.vtt

4.2 KB

2.3 Evidence Handling and Storage.mp4

27.6 MB

2.3 Evidence Handling and Storage.vtt

8.7 KB

2.4 Chain of Custody.mp4

14.4 MB

2.4 Chain of Custody.vtt

3.3 KB

2.5 Examination Notes and Analysis Documentation.mp4

21.6 MB

2.5 Examination Notes and Analysis Documentation.vtt

8.0 KB

/.../Module 03 - Investigative Process/

3.1 Investigation Planning.mp4

22.6 MB

3.1 Investigation Planning.vtt

7.6 KB

3.2 Investigation Bias.mp4

21.3 MB

3.2 Investigation Bias.vtt

9.6 KB

3.3 Checklists and Standard Procedure.mp4

8.7 MB

3.3 Checklists and Standard Procedure.vtt

3.8 KB

3.4 Drawing Conclusions.mp4

6.6 MB

3.4 Drawing Conclusions.vtt

2.8 KB

/.../Module 04 - The Expert Report/

4.1 Format of the Expert Report.mp4

18.7 MB

4.1 Format of the Expert Report.vtt

5.5 KB

4.2 Importance of Every Word.mp4

9.0 MB

4.2 Importance of Every Word.vtt

3.2 KB

4.3 Drawing Conclusions Revisited.mp4

4.9 MB

4.3 Drawing Conclusions Revisited.vtt

1.9 KB

4.4 The Importance of Peer Review.mp4

4.6 MB

4.4 The Importance of Peer Review.vtt

1.7 KB

4.5 Supplemental Reports.mp4

7.4 MB

4.5 Supplemental Reports.vtt

3.7 KB

/.../Module 05 - The Origins of the American Legal System/

5.1 US Constitution.mp4

20.6 MB

5.1 US Constitution.vtt

5.5 KB

5.2 Original vs. Appellate Jurisdiction.mp4

4.8 MB

5.2 Original vs. Appellate Jurisdiction.vtt

1.9 KB

5.3 State Courts and Federalism.mp4

12.8 MB

5.3 State Courts and Federalism.vtt

4.5 KB

/.../Module 06 - The Trial Process/

6.1 Judge vs. Jury Trial.mp4

5.8 MB

6.1 Judge vs. Jury Trial.vtt

2.5 KB

6.2 Anatomy of a Trial.mp4

10.6 MB

6.2 Anatomy of a Trial.vtt

4.9 KB

/.../Module 07 - Rules of Evidence and Procedure/

7.1 Federal Rule of Evidence 702.mp4

17.5 MB

7.1 Federal Rule of Evidence 702.vtt

5.4 KB

7.2 Federal Rule of Civil Procedure 26.mp4

10.5 MB

7.2 Federal Rule of Civil Procedure 26.vtt

3.0 KB

7.3 Federal Criminal Rule of Procedure 16.mp4

4.0 MB

7.3 Federal Criminal Rule of Procedure 16.vtt

1.4 KB

7.4 State and Local Rules.mp4

5.1 MB

7.4 State and Local Rules.vtt

2.7 KB

7.5 Work Product Doctrine.mp4

13.5 MB

7.5 Work Product Doctrine.vtt

3.5 KB

/.../Module 08 - Providing Depositions and Affidavits/

8.1 Written vs. Oral Testimony.mp4

9.8 MB

8.1 Written vs. Oral Testimony.vtt

3.0 KB

8.2 Affidavits vs. Declarations.mp4

6.6 MB

8.2 Affidavits vs. Declarations.vtt

2.1 KB

/.../Module 09 - Expert Testimony/

9.1 Voire Dire of Experts.mp4

32.9 MB

9.1 Voire Dire of Experts.vtt

10.2 KB

9.2 Consulting vs. Testifying.mp4

7.2 MB

9.2 Consulting vs. Testifying.vtt

3.0 KB

9.3 Direct Examination.mp4

6.8 MB

9.3 Direct Examination.vtt

2.7 KB

9.4 Cross Examination.mp4

8.4 MB

9.4 Cross Examination.vtt

3.1 KB

9.5 Redirect Examination.mp4

7.1 MB

9.5 Redirect Examination.vtt

2.9 KB

/.../Module 10 - Testimony Do’s and Don’ts/

10.1 Expert Testimony Do's and Don'ts.mp4

22.1 MB

10.1 Expert Testimony Do's and Don'ts.vtt

9.0 KB

/.../Module 11 - Course Review and Next Steps/

11.1 Course Wrap-Up and Next Steps.mp4

14.1 MB

11.1 Course Wrap-Up and Next Steps.vtt

7.1 KB

/.../05. DFIR Investigations and Witness Testimony/Resources/

DFIR_Investigation_and_Witness_Testimony_Syllabus.pdf

117.0 KB

DFIR_Investigations_and_Witness_Testimony_Glossary__1_.pdf

145.4 KB

DFIR_Investigations_and_Witness_Testimony_Study_Guide__1_.pdf

250.0 KB

/.../Module 1 - Analyzing Attacks for Incident Handlers/

1.1 Introduction to Memory Analysis.mp4

35.5 MB

1.1 Introduction to Memory Analysis.vtt

14.2 KB

1.2 Memory Analysis Explanation.mp4

42.4 MB

1.2 Memory Analysis Explanation.vtt

13.7 KB

1.3 Using FTK for Memory Analysis.mp4

36.7 MB

1.3 Using FTK for Memory Analysis.vtt

13.8 KB

1.4 Lab Introduction.mp4

38.1 MB

1.4 Lab Introduction.vtt

13.2 KB

1.5 Redline Lab.mp4

38.2 MB

1.5 Redline Lab.vtt

13.7 KB

1.6 VM and Malware Lab.mp4

52.7 MB

1.6 VM and Malware Lab.vtt

11.2 KB

1.7 Redline Analysis Lab Part 1.mp4

61.1 MB

1.7 Redline Analysis Lab Part 1.vtt

12.8 KB

1.8 Redline Analysis Lab Part 2.mp4

97.1 MB

1.8 Redline Analysis Lab Part 2.vtt

14.5 KB

/.../Module 1 - Online Reconnaissance/

1.1 Reconnaissance.mp4

38.8 MB

1.1 Reconnaissance.vtt

20.7 KB

1.2 Job Boards, Certificates, and Company Websites.mp4

63.0 MB

1.2 Job Boards, Certificates, and Company Websites.vtt

23.0 KB

1.3 Social Media Lab Part 1.mp4

61.6 MB

1.3 Social Media Lab Part 1.vtt

20.3 KB

1.4 Social Media Lab Part 2.mp4

52.3 MB

1.4 Social Media Lab Part 2.vtt

19.6 KB

1.5 Social Media Lab Part 3.mp4

49.3 MB

1.5 Social Media Lab Part 3.vtt

17.6 KB

1.6 Whois Lab.mp4

25.3 MB

1.6 Whois Lab.vtt

9.0 KB

/.../08. Scanning and Enumeration with NMAP/

1.1 Scanning and Enumeration.mp4

38.7 MB

1.1 Scanning and Enumeration.vtt

23.0 KB

1.2 NMAP Lab Part 1.mp4

58.1 MB

1.2 NMAP Lab Part 1.vtt

21.4 KB

1.3 NMAP Lab Part 2.mp4

50.8 MB

1.3 NMAP Lab Part 2.vtt

16.2 KB

/.../Module 01 - Course Introduction/

1.1 Course Overview.mp4

7.1 MB

1.1 Course Overview.vtt

5.5 KB

1.2 What is the MITRE ATT&CK Framework.mp4

24.7 MB

1.2 What is the MITRE ATT&CK Framework.vtt

12.0 KB

1.3 Where is the MITRE ATT&CK Framework Being Used.mp4

33.5 MB

1.3 Where is the MITRE ATT&CK Framework Being Used.vtt

18.7 KB

1.4 Navigation and Review.mp4

98.0 MB

1.4 Navigation and Review.vtt

15.6 KB

/.../Module 02 - Initial Access/

2.1 What is Initial Access.mp4

11.5 MB

2.1 What is Initial Access.vtt

8.2 KB

2.2 External Remote Services.mp4

29.4 MB

2.2 External Remote Services.vtt

20.2 KB

2.3 Spearphishing Link.mp4

50.6 MB

2.3 Spearphishing Link.vtt

17.7 KB

2.4 Supply Chain Compromise Part 1.mp4

29.6 MB

2.4 Supply Chain Compromise Part 1.vtt

11.5 KB

2.5 Supply Chain Compromise Part 2.mp4

16.4 MB

2.5 Supply Chain Compromise Part 2.vtt

13.2 KB

2.6 Trusted Relationship.mp4

32.4 MB

2.6 Trusted Relationship.vtt

23.4 KB

2.7 Valid Accounts Part 1.mp4

21.3 MB

2.7 Valid Accounts Part 1.vtt

13.2 KB

2.8 Valid Accounts Part 2.mp4

18.9 MB

2.8 Valid Accounts Part 2.vtt

12.8 KB

2.9 Initial Access Case Study.mp4

17.3 MB

2.9 Initial Access Case Study.vtt

9.5 KB

2.10 Module 2 Summary.mp4

10.0 MB

2.10 Module 2 Summary.vtt

8.7 KB

/.../Module 03 - Execution/

3.1 What is Execution.mp4

5.5 MB

3.1 What is Execution.vtt

4.4 KB

3.2 Command Line Interface.mp4

42.2 MB

3.2 Command Line Interface.vtt

18.1 KB

3.3 Execution Through API.mp4

14.9 MB

3.3 Execution Through API.vtt

10.8 KB

3.4 Control Panel Items.mp4

30.7 MB

3.4 Control Panel Items.vtt

17.2 KB

3.5 Powershell.mp4

26.8 MB

3.5 Powershell.vtt

17.3 KB

3.6 Scripting.mp4

23.2 MB

3.6 Scripting.vtt

17.9 KB

3.7 User Execution.mp4

23.4 MB

3.7 User Execution.vtt

17.9 KB

3.8 Execution Case Study.mp4

18.6 MB

3.8 Execution Case Study.vtt

12.3 KB

3.9 Module 3 Summary.mp4

10.6 MB

3.9 Module 3 Summary.vtt

9.6 KB

/.../Module 04 - Persistence/

4.1 What is Persistence.mp4

4.6 MB

4.1 What is Persistence.vtt

3.6 KB

4.2 Accessibility Features.mp4

27.6 MB

4.2 Accessibility Features.vtt

17.8 KB

4.3 Bootkit.mp4

19.7 MB

4.3 Bootkit.vtt

15.2 KB

4.4 Browser Extension.mp4

26.4 MB

4.4 Browser Extension.vtt

17.2 KB

4.5 Component Firmware.mp4

22.3 MB

4.5 Component Firmware.vtt

14.4 KB

4.6 Create Account.mp4

25.3 MB

4.6 Create Account.vtt

16.9 KB

4.7 Hooking.mp4

8.5 MB

4.7 Hooking.vtt

5.5 KB

4.8 New Service.mp4

19.9 MB

4.8 New Service.vtt

12.4 KB

4.9 Persistence Case Study.mp4

18.6 MB

4.9 Persistence Case Study.vtt

9.8 KB

4.10 Module 4 Summary.mp4

5.1 MB

4.10 Module 4 Summary.vtt

4.3 KB

/.../Module 05 - Privilege Escalation/

5.1 What is Privilege Escalation.mp4

5.1 MB

5.1 What is Privilege Escalation.vtt

3.8 KB

5.2 Access Token Manipulation.mp4

20.1 MB

5.2 Access Token Manipulation.vtt

13.6 KB

5.3 Elevation Escalation with Prompt.mp4

14.8 MB

5.3 Elevation Escalation with Prompt.vtt

9.8 KB

5.4 Exploitation for Privilege Escalation.mp4

22.6 MB

5.4 Exploitation for Privilege Escalation.vtt

15.6 KB

5.5 File System Permission Weakness.mp4

16.2 MB

5.5 File System Permission Weakness.vtt

10.8 KB

5.6 Scheduled Task.mp4

15.7 MB

5.6 Scheduled Task.vtt

12.1 KB

5.7 Sudo.mp4

15.4 MB

5.7 Sudo.vtt

10.8 KB

5.8 Web Shell.mp4

24.5 MB

5.8 Web Shell.vtt

17.1 KB

5.9 Privilege Escalation Case Study.mp4

50.9 MB

5.9 Privilege Escalation Case Study.vtt

14.3 KB

5.10 Module 5 Summary.mp4

4.9 MB

5.10 Module 5 Summary.vtt

3.9 KB

/.../Module 06 - Defense Evasion/

6.1 What is Defense Evasion.mp4

5.6 MB

6.1 What is Defense Evasion.vtt

4.2 KB

6.2 Clear Command History.mp4

13.9 MB

6.2 Clear Command History.vtt

10.5 KB

6.3 Compile After Delivery.mp4

14.4 MB

6.3 Compile After Delivery.vtt

11.8 KB

6.4 Disabling Security Tools.mp4

8.3 MB

6.4 Disabling Security Tools.vtt

7.0 KB

6.5 Hidden Files and Directories.mp4

12.0 MB

6.5 Hidden Files and Directories.vtt

8.8 KB

6.6 Hidden Users.mp4

7.2 MB

6.6 Hidden Users.vtt

6.0 KB

6.7 Process Hollowing.mp4

11.9 MB

6.7 Process Hollowing.vtt

10.1 KB

6.8 Software Packing.mp4

10.8 MB

6.8 Software Packing.vtt

8.7 KB

6.9 Defense Evasion Case Study.mp4

17.6 MB

6.9 Defense Evasion Case Study.vtt

11.2 KB

6.10 Module 6 Summary.mp4

6.2 MB

6.10 Module 6 Summary.vtt

4.5 KB

/.../Module 07 - Credential Access/

7.1 What is Credential Access.mp4

3.1 MB

7.1 What is Credential Access.vtt

2.5 KB

7.2 Bash History.mp4

8.9 MB

7.2 Bash History.vtt

6.8 KB

7.3 Brute Forces.mp4

16.5 MB

7.3 Brute Forces.vtt

12.6 KB

7.4 Credential Dumping.mp4

10.2 MB

7.4 Credential Dumping.vtt

7.8 KB

7.5 Steal Web Session Cookie.mp4

10.5 MB

7.5 Steal Web Session Cookie.vtt

7.9 KB

7.6 Credential Access Case Study.mp4

8.7 MB

7.6 Credential Access Case Study.vtt

6.7 KB

7.7 Module 7 Summary.mp4

2.7 MB

7.7 Module 7 Summary.vtt

2.1 KB

/.../Module 08 - Discovery/

8.1 What is Discovery.mp4

3.7 MB

8.1 What is Discovery.vtt

3.1 KB

8.2 Account Discovery.mp4

11.9 MB

8.2 Account Discovery.vtt

9.8 KB

8.3 Browser Bookmark Discovery.mp4

15.7 MB

8.3 Browser Bookmark Discovery.vtt

13.8 KB

8.4 System Owner or User Discovery.mp4

7.2 MB

8.4 System Owner or User Discovery.vtt

6.5 KB

8.5 Discovery Case Study.mp4

11.7 MB

8.5 Discovery Case Study.vtt

7.1 KB

8.6 Module 8 Summary.mp4

3.0 MB

8.6 Module 8 Summary.vtt

2.5 KB

/.../Module 09 - Lateral Movement/

9.1 What is Lateral Movement.mp4

3.0 MB

9.1 What is Lateral Movement.vtt

2.1 KB

9.2 Application Deployment Software.mp4

13.2 MB

9.2 Application Deployment Software.vtt

9.5 KB

9.3 Exploitation of Remote Services.mp4

18.9 MB

9.3 Exploitation of Remote Services.vtt

13.9 KB

9.4 SSH Hijacking.mp4

10.7 MB

9.4 SSH Hijacking.vtt

7.8 KB

9.5 Lateral Movement Case Study.mp4

19.5 MB

9.5 Lateral Movement Case Study.vtt

12.6 KB

9.6 Module 9 Summary.mp4

2.9 MB

9.6 Module 9 Summary.vtt

2.1 KB

/.../Module 10 - Collection/

10.1 What is Collection.mp4

2.8 MB

10.1 What is Collection.vtt

2.3 KB

10.2 Audio Capture.mp4

10.0 MB

10.2 Audio Capture.vtt

8.9 KB

10.3 Clipboard Data.mp4

19.5 MB

10.3 Clipboard Data.vtt

12.3 KB

10.4 Data from Local System.mp4

8.0 MB

10.4 Data from Local System.vtt

6.6 KB

10.5 Collection Case Study.mp4

10.1 MB

10.5 Collection Case Study.vtt

7.1 KB

10.6 Module 10 Summary.mp4

2.7 MB

10.6 Module 10 Summary.vtt

2.3 KB

/.../Module 11 - Command and Control/

11.1 What is Command Control.mp4

2.4 MB

11.1 What is Command Control.vtt

1.8 KB

11.2 Commonly Used Port.mp4

8.6 MB

11.2 Commonly Used Port.vtt

6.9 KB

11.3 Custom Command and Control Protocol.mp4

8.0 MB

11.3 Custom Command and Control Protocol.vtt

6.8 KB

11.4 Uncommonly Used Ports.mp4

9.5 MB

11.4 Uncommonly Used Ports.vtt

7.8 KB

11.5 Command and Control Case Study.mp4

6.8 MB

11.5 Command and Control Case Study.vtt

4.8 KB

11.6 Module 11 Summary.mp4

2.8 MB

11.6 Module 11 Summary.vtt

2.1 KB

/.../Module 12 - Exfiltration/

12.1 What is Exfiltration.mp4

1.9 MB

12.1 What is Exfiltration.vtt

1.4 KB

12.2 Automated Exfiltration.mp4

9.0 MB

12.2 Automated Exfiltration.vtt

7.2 KB

12.3 Data Compressed.mp4

6.5 MB

12.3 Data Compressed.vtt

5.9 KB

12.4 Data Transfer Size or Limits.mp4

6.4 MB

12.4 Data Transfer Size or Limits.vtt

5.6 KB

12.5 Exfiltration Case Study.mp4

7.3 MB

12.5 Exfiltration Case Study.vtt

5.4 KB

12.6 Module 12 Summary.mp4

3.1 MB

12.6 Module 12 Summary.vtt

2.4 KB

/.../Module 13 - Impact/

13.1 What is Impact.mp4

2.4 MB

13.1 What is Impact.vtt

1.9 KB

13.2 Account Access Removal.mp4

7.4 MB

13.2 Account Access Removal.vtt

5.9 KB

13.3 Defacement.mp4

5.2 MB

13.3 Defacement.vtt

4.2 KB

13.4 Impact Case Study.mp4

7.2 MB

13.4 Impact Case Study.vtt

6.1 KB

13.5 Module 13 Summary.mp4

2.0 MB

13.5 Module 13 Summary.vtt

1.4 KB

/.../Module 14 - Conclusion/

14.1 Course Summary.mp4

8.1 MB

14.1 Course Summary.vtt

4.1 KB

/.../09. Application of the MITRE ATT&CK Framework/Resources/

Application_of_the_MITRE_Attack_Framework_Glossary__1_.pdf

243.5 KB

Application_of_the_MITRE_Attack_Framework_Study_Guide__2___1_.pdf

1.3 MB

Application_of_the_MITRE_Attack_Framework_Syllabus_and_Outline.pdf

127.0 KB

/.../Module 1 - Mapping to ATT&CK® from Narrative Reports/

1.1 Introduction - Challenges, Advantages and the Process of Mapping to ATT&CK®.mp4

68.9 MB

1.1 Introduction - Challenges, Advantages and the Process of Mapping to ATT&CK®.vtt

19.4 KB

1.2 Finding and Researching the Behavior.mp4

39.7 MB

1.2 Finding and Researching the Behavior.vtt

12.0 KB

1.3 Translating the Behavior into a Tactic.mp4

59.6 MB

1.3 Translating the Behavior into a Tactic.vtt

16.7 KB

1.4 Identifying Techniques or Sub-Techniques.mp4

59.9 MB

1.4 Identifying Techniques or Sub-Techniques.vtt

16.8 KB

1.5 Mapping to a Narrative Point.mp4

54.7 MB

1.5 Mapping to a Narrative Point.vtt

12.6 KB

1.6 Hedging Your Biases.mp4

44.4 MB

1.6 Hedging Your Biases.vtt

17.1 KB

/.../Module 2 - Mapping to ATT&CK® from Raw Data/

2.1 The Process of Mapping from Raw Data.mp4

29.9 MB

2.1 The Process of Mapping from Raw Data.vtt

10.8 KB

2.2 Identify and Research Behaviors.mp4

22.3 MB

2.2 Identify and Research Behaviors.vtt

8.8 KB

2.3 Translate Behaviors to Tactics, Techniques and Sub-Techniques.mp4

19.9 MB

2.3 Translate Behaviors to Tactics, Techniques and Sub-Techniques.vtt

7.8 KB

2.4 Raw Data to Narrative Reporting.mp4

41.6 MB

2.4 Raw Data to Narrative Reporting.vtt

13.7 KB

/.../Module 3 - Storing and Analyzing ATT&CK®-Mapped Data/

3.1 Storing and Displaying ATT&CK®-Mapped Data.mp4

13.8 MB

3.1 Storing and Displaying ATT&CK®-Mapped Data.vtt

6.2 KB

3.2 Expressing and Storing ATT&CK®-Mapped Data.mp4

19.7 MB

3.2 Expressing and Storing ATT&CK®-Mapped Data.vtt

8.6 KB

3.3 Analyzing ATT&CK®-Mapped Data.mp4

27.0 MB

3.3 Analyzing ATT&CK®-Mapped Data.vtt

9.0 KB

3.4 Exercise 3 - Comparing Layers in ATT&CK® Navigator.mp4

8.8 MB

3.4 Exercise 3 - Comparing Layers in ATT&CK® Navigator.vtt

3.2 KB

/.../Module 4 - Making Defensive Recs for ATT&CK®-Mapped Data/

4.1 The Defensive Recommendations Process.mp4

22.3 MB

4.1 The Defensive Recommendations Process.vtt

8.9 KB

4.2 How Techniques and Sub-Techniques are Being Used.mp4

42.7 MB

4.2 How Techniques and Sub-Techniques are Being Used.vtt

13.7 KB

4.3 Researching Organizational Capabilities and Constraints and Determine Trade-Offs.mp4

48.4 MB

4.3 Researching Organizational Capabilities and Constraints and Determine Trade-Offs.vtt

15.6 KB

4.4 Make Defensive Recommendations.mp4

60.6 MB

4.4 Make Defensive Recommendations.vtt

19.9 KB

/.../10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/

APT39-and-Cobalt-Kitty-Techniques.pdf

140.1 KB

APT39_Annotations.pdf

464.3 KB

APT39_Answers.pdf

555.1 KB

APT39_Original_Report.pdf

425.9 KB

Cybereason_Operation_Cobalt_Kitty_-_Exercise_Answers.pdf

2.7 MB

Cybereason_Operation_Cobalt_Kitty_-_Exercise_Hints.pdf

2.1 MB

Cybereason_Operation_Cobalt_Kitty_-_Original_Report.pdf

6.6 MB

Cybereason_Operation_Cyber_Kitty_-_Exercise.pdf

2.1 MB

Making_Defensive_Recommendations_Guided_Exercise.rtf

51.4 KB

Making_Defensive_Recommendations_Unguided_Exercise.rtf

54.9 KB

MITRE_ATT_CK_Defender_____MAD__ATT_CK___Cyber_Threat_Intelligence_Certification_Training_Syllabus_and_Outline.pdf

98.2 KB

ticket-473822.rtf

1.1 KB

ticket-473822_answers.pdf

86.3 KB

ticket-473845.rtf

2.3 KB

ticket-473845_answers.pdf

114.7 KB

/.../Module 1 - Evasion for Incident Handlers/

1.1 Evasion.mp4

14.7 MB

1.1 Evasion.vtt

10.3 KB

/.../Module 1 - Stealth Techniques for Incident Handlers/

1.1 Being Stealthy.mp4

45.1 MB

1.1 Being Stealthy.vtt

20.2 KB

/.../01_get-started-with-the-certificate-program/

1. Welcome to the Google Cybersecurity Certificate.mp4

49.6 MB

2. Google Cybersecurity Certificate overview.html

512.5 KB

3. Course 1 overview.html

1.3 MB

4. Welcome to week 1.mp4

4.9 MB

5. Helpful resources and tips.html

11.5 KB

6. Participate in program surveys.html

3.8 KB

05_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx

900.4 KB

/.../02_introduction-to-cybersecurity/

1. Introduction to cybersecurity.mp4

24.2 MB

2. Toni - My path to cybersecurity.mp4

21.0 MB

3. Responsibilities of an entry-level cybersecurity analyst.mp4

15.2 MB

4. Nikki - A day in the life of a security engineer.mp4

16.8 MB

5. Common cybersecurity terminology.html

5.7 KB

/.../03_core-skills-for-cybersecurity-professionals/

1. Core skills for cybersecurity professionals.mp4

20.3 MB

2. Veronica - My path to working in cybersecurity.mp4

11.5 MB

3. Transferable and technical cybersecurity skills.html

7.5 KB

4. The importance of cybersecurity.mp4

18.7 MB

/.../04_review-welcome-to-the-exciting-world-of-cybersecurity/

1. Wrap-up.mp4

4.2 MB

2. Glossary terms from week 1.html

2.8 KB

/.../01_the-history-of-cybersecurity/

1. Welcome to week 2.mp4

7.0 MB

2. Past cybersecurity attacks.mp4

23.1 MB

3. Attacks in the digital age.mp4

26.8 MB

4. Common attacks and their effectiveness.html

8.6 KB

5. Sean - Keep your cool during a data breach.mp4

14.6 MB

/.../02_the-eight-cissp-security-domains/

1. Introduction to the eight CISSP security domains, Part 1.mp4

19.2 MB

2. Introduction to the eight CISSP security domains, Part 2.mp4

18.2 MB

3. Determine the type of attack.html

230.4 KB

4. Understand attackers.html

320.8 KB

/.../03_review-the-evolution-of-cybersecurity/

1. Wrap-up.mp4

7.7 MB

2. Glossary terms from week 2.html

4.3 KB

/.../01_frameworks-and-controls/

1. Welcome to week 3.mp4

15.2 MB

2. Introduction to security frameworks and controls.mp4

24.5 MB

3. Secure design.mp4

20.1 MB

4. Controls, frameworks, and compliance.html

155.5 KB

5. Heather - Protect sensitive data and information.mp4

17.6 MB

/.../02_ethics-in-cybersecurity/

1. Ethics in cybersecurity.mp4

23.6 MB

2. Ethical concepts that guide cybersecurity decisions.html

8.1 KB

3. Holly - The importance of ethics as a cybersecurity professional.mp4

15.3 MB

/.../03_review-protect-against-threats-risks-and-vulnerabilities/

1. Wrap-up.mp4

4.9 MB

2. Glossary terms from week 3.html

4.0 KB

/.../01_important-cybersecurity-tools/

1. Welcome to week 4.mp4

7.4 MB

2. Common cybersecurity tools.mp4

21.2 MB

3. Tools for protecting business operations.html

667.2 KB

03_tools-for-protecting-business-operations_gcat_threathorizons_full_sept2022.pdf

3.1 MB

/.../02_core-cybersecurity-knowledge-and-skills/

1. Introduction to Linux, SQL, and Python.mp4

15.2 MB

2. Use tools to protect business operations.html

6.7 KB

3. Create a cybersecurity portfolio.html

8.9 KB

/.../03_review-cybersecurity-tools-and-programming-languages/

1. Wrap-up.mp4

2.2 MB

2. Glossary terms from week 4.html

2.9 KB

/.../04_congratulations-on-completing-course-1/

1. Course wrap-up.mp4

8.1 MB

2. Course 1 glossary.html

6.6 KB

3. Get started on the next course.html

815.3 KB

02_course-1-glossary_Course_1_glossary.docx

879.5 KB

/.../01_frequently-asked-questions/

01__resources.html

19.9 KB

/.../02_course-1-glossary/

01__Course_1_glossary.docx

879.3 KB

01__resources.html

6.6 KB

/.../03_course-1-resources-and-citations/

01__55.html

43.5 KB

01__cis-controls-and-the-hph.pdf

1.6 MB

01__display.cfm

37.9 KB

01__gcat_threathorizons_full_sept2022.pdf

3.1 MB

01__hipaa.html

200.6 KB

01__index.html

1.7 MB

01__IntroToCybersecurityEthics.pdf

592.7 KB

01__ncsam_eskimming_508.pdf

800.2 KB

01__nist_small_business_fundamentals_july_2019.pptx

4.4 MB

01__R46536.pdf

1.4 MB

01__resources.html

28.8 KB

01__rules-and-security-requirements.html

76.6 KB

01__why-splunk.html

232.9 KB

/.../04_google-cybersecurity-certificate-glossary/

01__Google_Cybersecurity_Certificate_glossary.docx

900.2 KB

01__resources.html

6.7 KB

/.../05_frequently-asked-questions/

01__resources.html

16.3 KB

/.../01_get-started-with-the-course/

1. Introduction to Course 2.mp4

8.3 MB

2. Course 2 overview.html

1.9 MB

3. Helpful resources and tips.html

11.5 KB

03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx

900.4 KB

/.../02_more-about-the-cissp-security-domains/

1. Welcome to week 1.mp4

4.7 MB

2. Explore the CISSP security domains, Part 1.mp4

20.1 MB

3. Explore the CISSP security domains, Part 2.mp4

19.1 MB

4. Security domains cybersecurity analysts need to know.html

200.0 KB

5. Ashley - My path to cybersecurity.mp4

20.8 MB

/.../03_navigate-threats-risks-and-vulnerabilities/

1. Threats, risks, and vulnerabilities.mp4

17.9 MB

2. Key impacts of threats, risks, and vulnerabilities.mp4

18.1 MB

3. Herbert - Manage threats, risks, and vulnerabilities.mp4

10.1 MB

4. NIST’s Risk Management Framework.mp4

17.1 MB

5. Manage common threats, risks, and vulnerabilities.html

797.8 KB

/.../04_review-security-domains/

1. Wrap-up.mp4

4.1 MB

2. Glossary terms from week 1.html

4.0 KB

/.../01_more-about-frameworks-and-controls/

1. Welcome to week 2.mp4

5.7 MB

2. Frameworks.mp4

10.8 MB

3. Controls.mp4

14.8 MB

4. The relationship between frameworks and controls.html

6.7 KB

04_the-relationship-between-frameworks-and-controls_physical-access-control.pdf

7.3 MB

/.../02_the-cia-triad-confidentiality-integrity-and-availability/

1. Explore the CIA triad.mp4

15.5 MB

2. Use the CIA triad to protect organizations.html

4.4 KB

/.../03_nist-frameworks/

1. NIST frameworks.mp4

18.9 MB

2. Explore the five functions of the NIST Cybersecurity Framework.mp4

15.9 MB

/.../04_owasp-principles-and-security-audits/

1. OWASP security principles.mp4

20.0 MB

2. More about OWASP security principles.html

5.5 KB

3. Wajih - Stay up-to-date on the latest cybersecurity threats.mp4

10.4 MB

4. Plan a security audit.mp4

17.5 MB

5. Complete a security audit.mp4

17.8 MB

6. More about security audits.html

9.0 KB

06_more-about-security-audits_Audit_and_Accountability_AU_CIO-IT_Security_01-08_Rev_6_12-03-2020docx.pdf

1.3 MB

06_more-about-security-audits_Control_categories.docx

858.1 KB

/.../05_review-security-frameworks-and-controls/

1. Wrap-up.mp4

7.4 MB

2. Glossary terms from week 2.html

5.1 KB

/.../01_security-information-and-event-management-siem-dashboards/

1. Welcome to week 3.mp4

4.5 MB

2. Logs and SIEM tools.mp4

9.3 MB

3. SIEM dashboards.mp4

11.3 MB

4. The future of SIEM tools.html

5.2 KB

5. Parisa - The parallels of accessibility and security.mp4

17.2 MB

/.../02_explore-security-information-and-event-management-siem-tools/

1. Explore common SIEM tools.mp4

15.4 MB

2. More about cybersecurity tools.html

5.6 KB

3. Talya - Myths about the cybersecurity field.mp4

10.0 MB

4. Use SIEM tools to protect organizations.html

8.8 KB

/.../03_review-introduction-to-cybersecurity-tools/

1. Wrap-up.mp4

2.7 MB

2. Glossary terms from week 3.html

2.7 KB

/.../01_phases-of-incident-response-playbooks/

1. Welcome to week 4.mp4

3.1 MB

2. Phases of an incident response playbook.mp4

25.5 MB

3. More about playbooks.html

205.2 KB

03_more-about-playbooks_guidelines.html

17.8 KB

/.../02_explore-incident-response/

1. Use a playbook to respond to threats, risks, or vulnerabilities.mp4

20.0 MB

2. Erin - The importance of diversity of perspective on a security team.mp4

20.8 MB

3. Playbooks, SIEM tools, and SOAR tools.html

3.2 KB

/.../03_review-use-playbooks-to-respond-to-incidents/

1. Wrap-up.mp4

4.6 MB

2. Glossary terms from week 4.html

1.5 KB

/.../04_congratulations-on-completing-course-2/

1. Course wrap-up.mp4

5.5 MB

2. Course 2 glossary.html

6.6 KB

3. Get started on the next course.html

812.2 KB

02_course-2-glossary_Course_2_glossary.docx

879.1 KB

/.../01_frequently-asked-questions/

01__resources.html

19.0 KB

/.../02_google-cybersecurity-certificate-glossary/

01__Google_Cybersecurity_Certificate_glossary.docx

900.4 KB

01__resources.html

6.7 KB

/.../03_course-2-glossary/

01__Course_2_glossary.docx

879.1 KB

01__resources.html

6.6 KB

/.../04_course-2-resources-and-citations/

01__Audit_and_Accountability_AU_CIO-IT_Security_01-08_Rev_6_12-03-2020docx.pdf

1.3 MB

01__Cyber-Incident-Response-Standard.docx

64.8 KB

01__dod85.pdf

246.1 KB

01__Federal_Government_Cybersecurity_Incident_and_Vulnerability_Response_Playbooks_508C.pdf

1.1 MB

01__Format-Security-plus-Study-Guide.pdf

17.2 KB

01__guidelines.html

17.8 KB

01__index.html

21.8 KB

01__NIST.SP.800-53r5.pdf

6.1 MB

01__NIST.SP.800-218.pdf

740.5 KB

01__physical-access-control.pdf

7.3 MB

01__resources.html

33.8 KB

01__why-splunk.html

232.9 KB

/.../05_frequently-asked-questions/

01__resources.html

16.3 KB

/.../06_create-a-cybersecurity-portfolio/

01__resources.html

9.0 KB

/.../01_get-started-with-the-course/

1. Introduction to Course 3.mp4

3.8 MB

2. Course 3 overview.html

1.3 MB

3. Helpful resources and tips.html

11.5 KB

03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx

900.4 KB

/.../02_introduction-to-networks/

1. Welcome to week 1.mp4

2.4 MB

2. Chris - My path to cybersecurity.mp4

19.8 MB

3. What are networks.mp4

6.5 MB

4. Tina - Working in network security.mp4

11.9 MB

5. Emmanuel - Useful skills for network security.mp4

14.1 MB

6. Network tools.mp4

7.4 MB

7. Network components, devices, and diagrams.html

1.8 MB

8. Cloud networks.mp4

9.2 MB

9. Cloud computing and software-defined networks.html

710.8 KB

10. Test your knowledge - Introduction to networks.html

3.6 KB

/.../03_network-communication/

1. Introduction to network communication.mp4

7.6 MB

2. The TCPIP model.mp4

9.4 MB

3. The four layers of the TCPIP model.mp4

6.8 MB

4. Learn more about the TCPIP model.html

1.6 MB

5. The OSI model .html

310.1 KB

6. Test your knowledge - Network communication.html

5.0 KB

/.../04_local-and-wide-network-communication/

1. IP addresses and network communication.mp4

7.7 MB

2. Components of network layer communication.html

657.6 KB

3. Test your knowledge - Local and wide network communication.html

3.8 KB

/.../05_review-network-architecture/

1. Wrap-up.mp4

1.8 MB

2. Glossary terms from week 1.html

4.6 KB

3. Weekly challenge 1.html

8.6 KB

/.../01_introduction-to-network-protocols/

1. Welcome to week 2.mp4

4.8 MB

2. Network protocols.mp4

11.8 MB

3. Common network protocols.html

8.9 KB

4. Additional network protocols.html

11.3 KB

5. Test your knowledge - Recognize different network protocols.html

3.5 KB

6. Wireless protocols.mp4

5.4 MB

7. The evolution of wireless security protocols.html

163.0 KB

/.../02_system-identification/

1. Firewalls and network security measures.mp4

17.6 MB

2. Virtual private networks (VPNs).mp4

8.5 MB

3. Security zones.mp4

12.6 MB

4. Subnetting and CIDR.html

137.1 KB

5. Proxy servers.mp4

11.8 MB

6. Virtual networks and privacy.html

8.6 KB

7. Test your knowledge - System identification.html

4.4 KB

/.../03_review-network-operations/

1. Wrap-up.mp4

2.9 MB

2. Glossary terms from week 2.html

5.2 KB

3. Weekly challenge 2.html

8.7 KB

/.../01_introduction-to-network-intrusion-tactics/

1. Welcome to week 3.mp4

1.4 MB

2. The case for securing networks.mp4

5.8 MB

3. How intrusions compromise your system.html

6.8 KB

/.../02_secure-networks-against-denial-of-service-dos-attacks/

1. Denial of Service (DoS) attacks.mp4

19.5 MB

2. Read tcpdump logs.html

150.2 KB

3. Activity Exemplar - Analyze network layer communication.html

1.3 KB

4. Real-life DDoS attack.html

5.2 KB

5. Test your knowledge - Secure networks against Denial of Service (DoS) attacks.html

3.9 KB

/.../03_network-attack-tactics-and-defense/

1. Malicious packet sniffing.mp4

20.3 MB

2. IP Spoofing.mp4

12.1 MB

3. Overview of interception tactics.html

7.4 KB

4. Activity Exemplar - Analyze network attacks.html

1.3 KB

5. Test your knowledge - Network interception attack tactics.html

4.1 KB

/.../04_review-secure-against-network-intrusion/

1. Wrap-up.mp4

3.1 MB

2. Glossary terms from week 3.html

3.8 KB

3. Weekly challenge 3.html

9.5 KB

/.../01_introduction-to-security-hardening/

1. Welcome to week 4.mp4

4.0 MB

2. Security hardening.mp4

12.8 MB

/.../02_os-hardening/

1. OS hardening practices.mp4

18.9 MB

2. Brute force attacks and OS hardening.html

8.3 KB

3. Activity - Apply OS hardening techniques.html

1.3 KB

4. Test your knowledge - OS hardening.html

3.8 KB

/.../03_network-hardening/

1. Network hardening practices.mp4

17.7 MB

2. Network security applications.html

3.0 MB

3. Activity - Analysis of network hardening.html

1.3 KB

4. Test your knowledge - Network hardening.html

3.9 KB

/.../04_cloud-hardening/

1. Network security in the cloud.mp4

10.2 MB

2. Kelsey - Cloud security explained.mp4

23.0 MB

3. Secure the cloud.html

9.2 KB

4. Test your knowledge - Cloud hardening.html

3.7 KB

/.../05_review-security-hardening/

1. Wrap-up.mp4

3.3 MB

2. Glossary terms from week 4.html

2.9 KB

3. Weekly challenge 4.html

9.7 KB

4. Portfolio Activity - Use the NIST Cybersecurity Framework to respond to a security incident.html

3.5 KB

/.../06_congratulations-on-completing-course-3/

1. Course wrap-up.mp4

7.0 MB

2. Course 3 glossary.html

6.6 KB

3. Get started on the next course.html

805.3 KB

02_course-3-glossary_Course_3_glossary.docx

878.1 KB

/.../01_frequently-asked-questions/

01__resources.html

19.0 KB

/.../02_google-cybersecurity-certificate-glossary/

01__Google_Cybersecurity_Certificate_glossary.docx

900.4 KB

01__resources.html

6.7 KB

/.../03_course-3-glossary/

01__Course_3_glossary.docx

878.1 KB

01__resources.html

6.6 KB

/.../04_course-3-resources-and-citations/

01__7.1

11.9 KB

01__7.2

7.7 KB

01__aa494182vexchg.140

34.8 KB

01__article.asp

64.3 KB

01__index.html

23.5 KB

01__resources.html

18.0 KB

01__sp800-179r1-draft.pdf

1.9 MB

01__what-is-a-firewall.html

62.8 KB

/.../05_frequently-asked-questions/

01__resources.html

16.3 KB

/.../06_create-a-cybersecurity-portfolio/

01__resources.html

9.0 KB

/.../01_get-started-with-the-course/

1. Introduction to Course.mp4

9.1 MB

2. Course 4 overview.html

1.3 MB

3. Helpful resources and tips.html

11.4 KB

03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx

900.4 KB

/.../02_the-wonderful-world-of-operating-systems/

1. Welcome to week 1.mp4

3.1 MB

2. Kim - My journey into computing.mp4

11.4 MB

3. Introduction to operating systems.mp4

12.1 MB

4. Compare operating systems.html

6.4 KB

/.../03_the-operating-system-at-work/

1. Inside the operating system.mp4

11.0 MB

2. Requests to the operating system.html

137.1 KB

3. Resource allocation via the OS.mp4

9.9 MB

/.../04_the-user-interface/

1. GUI versus CLI.mp4

14.8 MB

2. The command line in use.html

201.8 KB

3. Ellen - My path into cybersecurity.mp4

13.0 MB

/.../05_review-introduction-to-operating-systems/

1. Wrap-up.mp4

3.3 MB

2. Glossary terms from week 1.html

2.5 KB

/.../01_all-about-linux/

1. Welcome to week 2.mp4

3.4 MB

2. Introduction to Linux.mp4

13.2 MB

3. Phil - Learn and grow in the cybersecurity field.mp4

13.2 MB

4. Linux architecture.mp4

12.4 MB

5. Linux architecture explained.html

6.7 KB

/.../02_linux-distributions/

1. Linux distributions.mp4

10.8 MB

2. KALI LINUX.mp4

7.5 MB

3. More Linux distributions.html

4.5 KB

4. Resources for completing Linux labs.html

111.1 KB

/.../03_the-shell/

1. Introduction to the shell.mp4

6.3 MB

2. Input and output in the shell.mp4

9.0 MB

/.../04_review-the-linux-operating-system/

1. Wrap-up.mp4

3.0 MB

2. Glossary terms from week 2.html

5.1 KB

/.../01_navigate-the-linux-file-system/

1. Welcome to week 3.mp4

5.4 MB

2. Linux commands via the Bash shell.mp4

10.7 MB

3. Core commands for navigation and reading files.mp4

11.8 MB

4. Navigate Linux and read file content.html

107.4 KB

/.../02_manage-file-content-in-bash/

1. Find what you need with Linux.mp4

11.2 MB

2. Filter content in Linux.html

8.9 KB

3. Create and modify directories and files.mp4

18.7 MB

4. Manage directories and files.html

9.9 KB

/.../03_authenticate-and-authorize-users/

1. File permissions and ownership.mp4

17.5 MB

2. Change permissions.mp4

9.9 MB

3. Permission commands.html

15.9 KB

4. Add and delete users.mp4

15.4 MB

5. Responsible use of sudo.html

11.4 KB

/.../04_get-help-in-linux/

1. Damar - My journey into Linux commands.mp4

14.2 MB

2. The Linux community.mp4

6.3 MB

3. Man pages within the shell.mp4

6.9 MB

4. Linux resources.html

5.2 KB

/.../05_review-linux-commands-in-the-bash-shell/

1. Wrap-up.mp4

3.5 MB

2. Glossary terms from week 3.html

3.3 KB

/.../01_introduction-to-sql-and-databases/

1. Welcome to week 4.mp4

5.5 MB

2. Introduction to databases.mp4

10.9 MB

3. Query databases with SQL.mp4

8.9 MB

4. SQL filtering versus Linux filtering.html

4.3 KB

5. Adedayo - SQL in cybersecurity.mp4

14.4 MB

/.../02_sql-queries/

1. Basic queries.mp4

9.4 MB

2. Query a database.html

9.0 KB

3. Resources for completing SQL labs.html

111.1 KB

4. Basic filters on SQL queries.mp4

15.5 MB

5. The WHERE clause and basic operators.html

8.3 KB

/.../03_more-sql-filters/

1. Filter dates and numbers.mp4

11.5 MB

2. Operators for filtering dates and numbers.html

6.9 KB

3. Filters with AND, OR, and NOT.mp4

16.9 MB

4. More on filters with AND, OR, and NOT.html

6.5 KB

/.../04_sql-joins/

1. Join tables in SQL.mp4

12.9 MB

2. Types of joins.mp4

8.4 MB

3. Compare types of joins.html

1.6 MB

4. Continuous learning in SQL.html

5.5 KB

/.../05_review-databases-and-sql/

1. Wrap-up.mp4

3.5 MB

2. Glossary terms from week 4.html

3.1 KB

/.../06_congratulations-on-completing-course-4/

1. Course wrap-up.mp4

3.9 MB

2. Course 4 glossary.html

6.6 KB

3. Get started on the next course.html

803.0 KB

02_course-4-glossary_Course_4_glossary.docx

1.2 MB

/.../01_frequently-asked-questions/

01__resources.html

19.0 KB

/.../02_google-cybersecurity-certificate-glossary/

01__Google_Cybersecurity_Certificate_glossary.docx

900.4 KB

01__resources.html

6.7 KB

/.../03_resources-for-completing-linux-labs/

01__resources.html

111.1 KB

/.../04_resources-for-completing-sql-labs/

01__resources.html

111.1 KB

/.../05_course-4-glossary/

01__Course_4_glossary.docx

1.2 MB

01__resources.html

6.6 KB

/.../06_course-4-resources-and-citations/

01__01-intro.html

64.8 KB

01__bootup.html

8.3 KB

01__Linux-in-a-Nutshell-6th-Edition.pdf

13.0 MB

01__operating-system2.htm

157.3 KB

01__resources.html

20.2 KB

01__ShellIntro.pdf

127.4 KB

01__subsection3.1.html

4.4 KB

01__thegnuproject.html

66.6 KB

/.../07_frequently-asked-questions/

01__resources.html

16.3 KB

/.../08_create-a-cybersecurity-portfolio/

01__resources.html

9.0 KB

/.../01_get-started-with-the-course/

1. Introduction to Course 5.mp4

16.8 MB

2. Course 5 overview.html

1.3 MB

3. Helpful resources and tips.html

11.5 KB

4. Da'Queshia - My path to cybersecurity.mp4

14.6 MB

03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx

900.4 KB

/.../02_introduction-to-assets/

1. Welcome to week 1.mp4

10.7 MB

2. The what, why, and how of asset security.mp4

21.8 MB

3. Understand risks, threats, and vulnerabilities.html

6.6 KB

4. Tri - Life in asset security.mp4

17.8 MB

5. Security starts with asset classification.mp4

17.7 MB

6. Common classification requirements.html

108.8 KB

/.../03_digital-and-physical-assets/

1. Assets in a digital world.mp4

18.8 MB

2. The emergence of cloud security.html

144.7 KB

/.../04_risk-and-asset-security/

1. Elements of a security plan.mp4

21.2 MB

2. The NIST Cybersecurity Framework.mp4

21.3 MB

3. Security guidelines in action.html

483.8 KB

03_security-guidelines-in-action_Commercial_Facilities_Sector_Cybersecurity_Framework_Implementation_Guidance_FINAL_508.pdf

1.6 MB

/.../05_review-introduction-to-asset-security/

1. Wrap-up.mp4

7.2 MB

2. Glossary terms from week 1.html

3.5 KB

/.../01_safeguard-information/

1. Welcome to week 2.mp4

10.3 MB

2. Security controls.mp4

20.5 MB

3. Principle of least privilege.html

7.9 KB

4. Information privacy - Regulations and compliance.html

132.3 KB

5. Heather - The importance of protecting PII.mp4

15.3 MB

/.../02_encryption-methods/

1. Fundamentals of cryptography.mp4

23.7 MB

2. Public key infrastructure.mp4

22.2 MB

3. Symmetric and asymmetric encryption.html

9.4 KB

4. Resources for completing labs.html

111.1 KB

5. Non-repudiation and hashing.mp4

14.2 MB

6. The evolution of hash functions.html

599.4 KB

/.../03_authentication-authorization-and-accounting/

1. Access controls and authentication systems.mp4

19.2 MB

2. The rise of SSO and MFA.html

378.4 KB

3. The mechanisms of authorization.mp4

26.4 MB

4. Why we audit user activity.mp4

17.0 MB

5. Tim - Finding purpose in protecting assets.mp4

7.3 MB

6. Identity and access management.html

310.1 KB

/.../04_review-protect-organizational-assets/

1. Wrap-up.mp4

8.6 MB

2. Glossary terms from week 2.html

7.2 KB

/.../01_flaws-in-the-system/

1. Welcome to week 3.mp4

9.6 MB

2. Vulnerability management.mp4

23.0 MB

3. Defense in depth strategy.mp4

20.9 MB

4. Common vulnerabilities and exposures.mp4

29.2 MB

5. The OWASP Top 10.html

145.3 KB

/.../02_identify-system-vulnerabilities/

1. Vulnerability assessments.mp4

20.4 MB

2. Approaches to vulnerability scanning.html

7.6 KB

3. The importance of updates.html

7.3 KB

4. Omad - My learning journey into cybersecurity.mp4

10.4 MB

/.../03_cyber-attacker-mindset/

1. Protect all entry points.mp4

23.6 MB

2. Approach cybersecurity with an attacker mindset.html

210.9 KB

3. Types of threat actors.html

505.2 KB

4. Niru - Adopt an attacker mindset.mp4

19.0 MB

5. Pathways through defenses.mp4

23.5 MB

6. Fortify against brute force cyber attacks.html

156.8 KB

06_fortify-against-brute-force-cyber-attacks_NIST.SP.800-63b.pdf

1.3 MB

/.../04_review-vulnerabilities-in-systems/

1. Wrap-up.mp4

12.4 MB

2. Glossary terms from week 3.html

3.7 KB

/.../01_social-engineering/

1. Welcome to week 4.mp4

9.0 MB

2. The criminal art of persuasion.mp4

22.7 MB

3. Social engineering tactics.html

179.5 KB

4. Phishing for information.mp4

25.2 MB

5. Types of phishing.html

347.5 KB

/.../4. Threats to asset security/02_malware/

1. Malicious software.mp4

25.7 MB

2. An introduction to malware.html

167.8 KB

3. The rise of cryptojacking.mp4

24.8 MB

/.../03_web-based-exploits/

1. Cross-site scripting.mp4

22.5 MB

2. Exploitable gaps in databases.mp4

18.2 MB

/.../04_threat-modeling/

1. A proactive approach to security.mp4

17.9 MB

2. Chantelle - The value of diversity in cybersecurity.mp4

14.8 MB

3. PASTA - The Process for Attack Simulation and Threat Analysis.mp4

18.7 MB

4. Traits of an effective threat model.html

123.8 KB

/.../05_review-threats-in-cybersecurity/

1. Wrap-up.mp4

8.5 MB

2. Glossary terms from week 4.html

8.1 KB

/.../06_congratulations-on-completing-course-5/

1. Course wrap-up.mp4

18.5 MB

2. Course 5 glossary .html

6.6 KB

3. Get started on the next course.html

813.8 KB

02_course-5-glossary_Course_5_glossary.docx

883.1 KB

/.../01_frequently-asked-questions/

01__resources.html

19.0 KB

/.../02_google-cybersecurity-certificate-glossary/

01__Google_Cybersecurity_Certificate_glossary.docx

900.4 KB

01__resources.html

6.7 KB

/.../03_resources-for-completing-labs/

01__resources.html

111.1 KB

/.../04_course-5-resources-and-citations/

01__2-4-3.html

8.8 KB

01__5-signs-youve-been-hit-with-an-apt.html

176.6 KB

01__5.2

5.5 KB

01__7.5

8.4 KB

01__16-software-updates.html

26.1 KB

01__csos-guide-to-phishing-and-phishing-kits.html

159.6 KB

01__encryption-explained.html

46.3 KB

01__FULL_TEXT.pdf

1.5 MB

01__gdpr-tldr-what-security-pros-need-to-know-about-the-new-era-of-privacy-regulations.html

159.2 KB

01__hashing-explained-why-its-your-best-bet-to-protect-stored-passwords.html

163.4 KB

01__hipaa.html

200.6 KB

01__malware.html

216.8 KB

01__NIST.FIPS.140-3.pdf

311.3 KB

01__paper.pdf

201.8 KB

01__resources.html

61.6 KB

01__sql_injection.asp

112.8 KB

01__ssrf-attacks-explained-and-how-to-defend-against-them.html

159.3 KB

01__Trend_Report_-_Why_Businesses_are_Moving_to_the_Cloud.pdf

1.3 MB

01__vulnerability-vs-threat-vs-risk.html

78.6 KB

01__what-is-cve-its-definition-and-purpose.html

173.2 KB

01__what-is-owasp-top-10.html

253.5 KB

01__what-is-phishing-examples-types-and-techniques.html

165.3 KB

/.../05_course-5-glossary/

01__Course_5_glossary.docx

883.1 KB

01__resources.html

6.6 KB

/.../06_frequently-asked-questions/

01__resources.html

16.3 KB

/.../07_create-a-cybersecurity-portfolio/

01__resources.html

9.0 KB

/.../01_get-started-with-the-course/

1. Introduction to Course 6.mp4

7.6 MB

2. Course 6 overview.html

1.3 MB

3. Helpful resources and tips.html

11.5 KB

4. Dave - Grow your cybersecurity career with mentors.mp4

14.6 MB

03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx

900.4 KB

/.../02_the-incident-response-lifecycle/

1. Welcome to week 1.mp4

6.1 MB

2. Introduction to the incident response lifecycle.mp4

16.8 MB

/.../03_incident-response-operations/

1. Incident response teams.mp4

13.0 MB

2. Fatima - The importance of communication during incident response.mp4

15.9 MB

3. Roles in response.html

86.4 KB

4. Incident response plans.mp4

9.8 MB

/.../04_incident-response-tools/

1. Incident response tools.mp4

5.7 MB

2. The value of documentation.mp4

11.5 MB

3. Intrusion detection systems.mp4

5.6 MB

4. Overview of detection tools.html

9.7 KB

5. Alert and event management with SIEM and SOAR tools.mp4

15.2 MB

/.../05_review-introduction-to-detection-and-incident-response/

1. Wrap-up.mp4

2.5 MB

2. Glossary terms from week 1.html

4.2 KB

/.../01_understand-network-traffic/

1. Welcome to week 2.mp4

3.9 MB

2. Casey - Apply soft skills in cybersecurity.mp4

14.6 MB

3. The importance of network traffic flows.mp4

13.4 MB

4. Maintain awareness with network monitoring.html

300.8 KB

5. Data exfiltration attacks.mp4

16.3 MB

/.../02_capture-and-view-network-traffic/

1. Packets and packet captures.mp4

10.7 MB

2. Learn more about packet captures.html

753.5 KB

3. Interpret network communications with packets.mp4

8.0 MB

4. Reexamine the fields of a packet header.mp4

14.3 MB

5. Investigate packet details.html

3.8 MB

6. Resources for completing labs.html

111.1 KB

/.../03_packet-inspection/

1. Packet captures with tcpdump.mp4

9.8 MB

2. Overview of tcpdump.html

135.7 KB

02_overview-of-tcpdump_tcpdump.1.html

74.3 KB

/.../04_review-network-monitoring-and-analysis/

1. Wrap-up.mp4

3.4 MB

2. Glossary terms from week 2.html

4.1 KB

/.../01_incident-detection-and-verification/

1. Welcome to week 3.mp4

3.7 MB

2. The detection and analysis phase of the lifecycle.mp4

9.0 MB

3. Cybersecurity incident detection methods.html

7.9 KB

4. MK - Changes in the cybersecurity industry.mp4

14.0 MB

5. Indicators of compromise.html

130.8 KB

6. Analyze indicators of compromise with investigative tools.html

1.5 MB

05_indicators-of-compromise_the-pyramid-of-pain.html

68.7 KB

/.../02_create-and-use-documentation/

1. The benefits of documentation.mp4

9.8 MB

2. Document evidence with chain of custody forms.mp4

13.7 MB

3. Best practices for effective documentation.html

6.0 KB

4. The value of cybersecurity playbooks.mp4

13.6 MB

/.../03_response-and-recovery/

1. The role of triage in incident response.mp4

12.1 MB

2. Robin - Foster cross-team collaboration.mp4

14.8 MB

3. The triage process.html

8.5 KB

4. The containment, eradication, and recovery phase of the lifecycle.mp4

10.3 MB

5. Business continuity considerations.html

6.4 KB

/.../04_post-incident-actions/

1. The post-incident activity phase of the lifecycle.mp4

8.6 MB

2. Post-incident review.html

239.0 KB

/.../05_review-incident-investigation-and-response/

1. Wrap-up.mp4

3.0 MB

2. Glossary terms from week 3.html

4.9 KB

/.../01_overview-of-logs/

1. Welcome to week 4.mp4

5.2 MB

2. The importance of logs.mp4

13.4 MB

3. Best practices for log collection and management.html

8.5 KB

4. Rebecca - Learn new tools and technologies.mp4

9.8 MB

5. Variations of logs.mp4

12.5 MB

6. Overview of log file formats.html

16.8 KB

/.../02_overview-of-intrusion-detection-systems-ids/

1. Security monitoring with detection tools.mp4

15.4 MB

2. Detection tools and techniques.html

351.0 KB

3. Components of a detection signature.mp4

13.4 MB

4. Examine signatures with Suricata.mp4

8.8 MB

5. Examine Suricata logs.mp4

7.7 MB

6. Overview of Suricata.html

127.4 KB

06_overview-of-suricata_eve-json-examplesjq.html

23.5 KB

06_overview-of-suricata_index.html

33.3 KB

06_overview-of-suricata_suricata-update.html

24.0 KB

06_overview-of-suricata_suricata-yaml.html

242.3 KB

/.../03_overview-of-security-information-event-management-siem/

1. Reexamine SIEM tools.mp4

9.5 MB

2. Query for events with Splunk.mp4

9.7 MB

3. Query for events with Chronicle.mp4

8.6 MB

4. Search methods with SIEM tools.html

425.5 KB

/.../04_review-network-traffic-and-logs-using-ids-and-siem-tools/

1. Wrap-up.mp4

3.6 MB

2. Glossary terms from week 4.html

4.6 KB

/.../05_congratulations-on-completing-course-6/

1. Course wrap-up.mp4

6.1 MB

2. Course 6 glossary.html

6.6 KB

3. Get started on the next course.html

808.4 KB

02_course-6-glossary_Course_6_glossary.docx

880.3 KB

/.../01_frequently-asked-questions/

01__resources.html

19.0 KB

/.../02_google-cybersecurity-certificate-glossary/

01__Google_Cybersecurity_Certificate_glossary.docx

900.4 KB

01__resources.html

6.7 KB

/.../03_resources-for-completing-labs/

01__resources.html

111.1 KB

/.../04_course-6-glossary/

01__Course_6_glossary.docx

880.4 KB

01__resources.html

6.6 KB

/.../05_course-6-resources-and-citations/

01__Bryan_Nolen_-_Surviving_Your_First_Incident_Purplecon_2018.pdf

145.8 KB

01__cisa-insights_chain-of-custody-and-ci-systems_508.pdf

369.5 KB

01__index.html

33.3 KB

01__network-operations-center.html

224.9 KB

01__nist.sp.800-61r2.pdf

1.5 MB

01__nistspecialpublication800-92.pdf

1.8 MB

01__question525.htm

174.4 KB

01__RAID4.pdf

291.7 KB

01__resources.html

37.9 KB

01__suricata-update.html

24.0 KB

01__suricata-yaml.html

242.3 KB

01__tcpdump.1.html

74.3 KB

01__the-pyramid-of-pain.html

68.7 KB

01__xml_whatis.asp

91.5 KB

/.../06_frequently-asked-questions/

01__resources.html

16.3 KB

/.../07_create-a-cybersecurity-portfolio/

01__resources.html

9.0 KB

/.../01_get-started-with-the-course/

1. Introduction to Course 7.mp4

18.9 MB

2. Course 7 overview.html

1.3 MB

3. Ángel - My personal career journey.mp4

17.3 MB

4. Helpful resources and tips.html

11.5 KB

04_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx

900.4 KB

/.../02_introduction-to-python-programming-in-cybersecurity/

1. Welcome to week 1.mp4

8.2 MB

2. Python and cybersecurity.mp4

21.1 MB

3. Get to know Python.html

4.4 KB

4. Create a basic Python script.mp4

8.8 MB

5. Python environments.html

4.3 KB

6. Akash - Python and the cybersecurity professional.mp4

6.0 MB

/.../03_core-python-components/

1. Data types in Python.mp4

20.3 MB

2. More about data types.html

12.5 KB

3. Work with variables in Python.mp4

22.7 MB

4. Assign and reassign variables in Python.html

8.4 KB

/.../04_conditional-and-iterative-statements/

1. Conditional statements in Python.mp4

18.5 MB

2. More on conditionals in Python.html

15.5 KB

3. For loops.mp4

12.8 MB

4. While loops.mp4

10.7 MB

5. More on loops in Python.html

16.0 KB

/.../05_review-introduction-to-python/

1. Wrap-up.mp4

3.6 MB

2. Glossary terms from week 1.html

4.1 KB

/.../01_introduction-to-functions/

1. Welcome to week 2.mp4

5.2 MB

2. Introduction to functions.mp4

14.5 MB

3. Create a basic function.mp4

7.5 MB

4. Python functions in cybersecurity.html

7.0 KB

/.../02_work-with-functions/

1. Use parameters in functions.mp4

11.1 MB

2. Return statements.mp4

14.4 MB

3. Functions and variables.html

11.1 KB

4. Explore built-in functions.mp4

22.0 MB

5. Work with built-in functions.html

275.6 KB

05_work-with-built-in-functions_instructions.html

7.6 KB

/.../03_learn-from-the-python-community/

1. Modules and libraries.mp4

11.9 MB

2. Code readability.mp4

20.0 MB

3. Ensure proper syntax and readability in Python.html

9.8 KB

4. Dorsa - Use Python efficiently on a cybersecurity team.mp4

11.9 MB

/.../04_review-write-effective-python-code/

1. Wrap-up.mp4

3.9 MB

2. Glossary terms from week 2.html

3.1 KB

/.../01_working-with-strings/

1. Welcome to week 3.mp4

5.1 MB

2. String operations.mp4

22.3 MB

3. String indices and slices.mp4

21.3 MB

4. Strings and the security analyst.html

13.8 KB

/.../02_work-with-lists-and-develop-algorithms/

1. List operations in Python.mp4

20.3 MB

2. Write a simple algorithm.mp4

18.4 MB

3. Lists and the security analyst.html

13.4 KB

/.../03_regular-expressions/

1. Regular expressions in Python.mp4

22.9 MB

2. More about regular expressions.html

11.7 KB

/.../04_review-work-with-strings-and-lists/

1. Wrap-up.mp4

3.8 MB

2. Glossary terms from week 3.html

2.6 KB

/.../01_python-for-automation/

1. Welcome to week 4.mp4

5.4 MB

2. Automate cybersecurity tasks with Python.mp4

20.0 MB

3. Essential Python components for automation.html

8.4 KB

4. Clancy - Continual learning and Python.mp4

11.9 MB

/.../02_work-with-files-in-python/

1. Access a text file in Python.mp4

11.0 MB

2. Import files into Python.html

109.9 KB

3. Parse a text file in Python.mp4

10.5 MB

4. Develop a parsing algorithm in Python.mp4

16.0 MB

/.../03_debug-python-code/

1. Debugging strategies.mp4

24.2 MB

2. Apply debugging strategies.mp4

14.2 MB

3. Explore debugging techniques.html

13.3 KB

/.../04_review-python-in-practice/

1. Wrap-up.mp4

3.0 MB

2. Glossary terms from week 4.html

3.0 KB

/.../05_congratulations-on-completing-course-7/

1. Course wrap-up.mp4

12.4 MB

2. Course 7 glossary.html

6.6 KB

3. Get started on the next course.html

825.4 KB

02_course-7-glossary_Course_7_glossary.docx

890.7 KB

/.../01_frequently-asked-questions/

01__resources.html

19.1 KB

/.../02_google-cybersecurity-certificate-glossary/

01__Google_Cybersecurity_Certificate_glossary.docx

900.4 KB

01__resources.html

6.7 KB

/.../03_course-7-glossary/

01__Course_7_glossary.docx

890.7 KB

01__resources.html

6.6 KB

/.../04_course-7-resources-and-citations/

01__functions.html

275.6 KB

01__resources.html

7.2 KB

/.../05_frequently-asked-questions/

01__resources.html

16.3 KB

/.../06_create-a-cybersecurity-portfolio/

01__resources.html

9.0 KB

/.../01_get-started-with-the-course/

1. Introduction to Course 8.mp4

13.8 MB

2. Course 8 overview.html

1.4 MB

3. Dion - My personal career journey.mp4

17.7 MB

4. Helpful resources and tips.html

11.5 KB

04_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx

900.4 KB

/.../02_event-and-incident-detection/

1. Welcome to week 1.mp4

1.9 MB

2. Security as a mindse.mp4

17.8 MB

3. Data and asset classification.html

5.9 KB

/.../03_your-impact-on-data-protection/

1. Detect and protect without neglect.mp4

19.5 MB

2. Disaster recovery and business continuity.html

5.6 KB

3. Juliana's story - Asset protection.html

5.1 KB

/.../04_review-protect-assets-and-communicate-incidents/

1. Wrap-up.mp4

4.3 MB

2. Glossary terms from week 1.html

2.4 KB

/.../01_escalation-in-cybersecurity/

1. Welcome to week 2.mp4

6.4 MB

2. The importance of escalation.mp4

19.9 MB

3. Escalate with a purpose.html

5.0 KB

/.../02_to-escalate-or-not-to-escalate/

1. Prepare to escalate through security recognition.mp4

18.1 MB

2. Recognize roles and responsibilities during escalation.html

4.4 KB

/.../03_timing-is-everything/

1. From simple activity to major data breach.mp4

19.2 MB

2. When and how to escalate a security incident.mp4

13.5 MB

3. Escalation timing.html

5.7 KB

4. Juliana's story - Attention to detail.html

4.9 KB

/.../04_review-escalate-incidents/

1. Wrap-up.mp4

4.7 MB

2. Glossary terms from week 2.html

2.5 KB

/.../01_understand-your-stakeholders/

1. Welcome to week 3.mp4

3.9 MB

2. Stakeholders in cybersecurity.mp4

15.9 MB

3. The purpose and impact of stakeholders.html

5.8 KB

/.../02_communicate-for-impact/

1. Clear and concise communication .mp4

12.7 MB

2. Building blocks of cybersecurity communications.mp4

17.8 MB

3. Communicate effectively with stakeholders.html

5.2 KB

/.../03_visual-communication-using-a-dashboard/

1. Visual storytelling in cybersecurity.mp4

16.9 MB

2. Create visual dashboards for impactful cybersecurity communications.html

5.1 KB

3. How to create a visual dashboard.mp4

19.0 MB

4. Juliana’s story - Effective communication.html

4.6 KB

/.../04_review-communicate-effectively-to-influence-stakeholders/

1. Wrap-up.mp4

9.5 MB

2. Glossary terms from week 3.html

1.3 KB

/.../01_reliable-sources-go-a-long-way/

1. Welcome to week 4.mp4

7.2 MB

2. Helpful cybersecurity resources.mp4

16.0 MB

3. Strategies for engaging with the cybersecurity community.html

5.6 KB

4. Victoria - Continue your learning journey.mp4

16.2 MB

/.../02_build-your-cybersecurity-network/

1. Engage with the cybersecurity community in a meaningful way.mp4

15.4 MB

2. Connect with other cybersecurity professionals.html

4.3 KB

3. Sarah - Network in the cybersecurity community.mp4

10.8 MB

/.../03_review-engage-with-the-cybersecurity-community/

1. Wrap-up.mp4

4.0 MB

2. Glossary terms from week 4.html

1.2 KB

/.../01_find-and-prepare-for-a-job-in-cybersecurity/

1. Welcome to week 5.mp4

7.9 MB

2. Find cybersecurity jobs.mp4

17.1 MB

3. Create a resume.mp4

12.5 MB

4. Tips for finding and applying for a job.html

4.3 KB

5. Garvey - Cover letter tips.mp4

12.2 MB

/.../02_the-cybersecurity-job-interview-process/

1. Explore the interview process.mp4

14.7 MB

2. The interview process.html

5.4 KB

3. Garvey - Technical interview tips.mp4

11.8 MB

4. Prepare for technical interviews.html

5.8 KB

5. Conduct pre-interview research.mp4

13.2 MB

6. Build rapport with interviewers.mp4

14.3 MB

/.../03_answer-interview-questions/

1. Use strategies to answer interview questions.mp4

12.6 MB

2. Apply the STAR method during interviews.html

52.2 KB

3. Prepare for interviews.html

5.6 KB

4. Ask the interviewer questions.mp4

8.3 MB

5. Karan - Interview tips from a hiring manager.mp4

19.4 MB

6. Prepare for interviews with Interview Warmup.html

187.5 KB

03_prepare-for-interviews_vol01iss13.cfm

46.6 KB

/.../04_develop-an-elevator-pitch/

1. Develop an elevator pitch.mp4

13.6 MB

2. Learn more about developing an elevator pitch.html

5.1 KB

3. Tips for interviewing remotely.html

5.7 KB

4. Emily - Overcome imposter syndrome.mp4

14.6 MB

/.../05_review-find-and-apply-for-cybersecurity-jobs/

1. Wrap-up.mp4

2.1 MB

2. Glossary terms from week 5.html

1.4 KB

3. Course wrap-up.mp4

2.9 MB

4. Course 8 glossary.html

6.6 KB

04_course-8-glossary_Course_8_glossary.docx

1.2 MB

/.../06_certificate-wrap-up/

1. Recap of the Google Cybersecurity Certificate program.mp4

9.3 MB

2. Congratulations on completing the Google Cybersecurity Certificate program!.mp4

9.9 MB

3. Showcase your work.html

920.8 KB

4. Claim your Google Cybersecurity Certificate badge!.html

4.6 KB

5. Google Cybersecurity Certificate glossary.html

6.7 KB

03_showcase-your-work_overview.html

651.7 KB

05_google-cybersecurity-certificate-glossary_Google_Cybersecurity_Certificate_glossary.docx

900.4 KB

/.../01_frequently-asked-questions/

01__resources.html

19.0 KB

/.../02_course-8-glossary/

01__Course_8_glossary.docx

1.2 MB

01__resources.html

6.6 KB

/.../03_course-8-resources-and-citations/

01__nist.sp.800-61r2.pdf

1.5 MB

01__overview.html

651.7 KB

01__R0239.pdf

226.4 KB

01__resources.html

11.8 KB

01__vol01iss13.cfm

46.6 KB

/.../04_google-cybersecurity-certificate-glossary/

01__Google_Cybersecurity_Certificate_glossary.docx

900.4 KB

01__resources.html

6.7 KB

/.../05_frequently-asked-questions/

01__resources.html

16.3 KB

/.../06_create-a-cybersecurity-portfolio/

01__resources.html

9.0 KB

/.../01_course-introduction/

01_specialization-introduction.mp4

38.7 MB

02_course-introduction.mp4

38.1 MB

03_welcome-to-the-course_index.html

19.2 KB

03_welcome-to-the-course_instructions.html

6.3 KB

04_program-surveys_instructions.html

3.2 KB

/.../02_introduction-to-programming/

01_the-beginning-of-your-programming-journey.mp4

17.1 MB

02_what-is-programming.mp4

17.6 MB

03_what-is-automation.mp4

18.7 MB

04_getting-computers-to-work-for-you.mp4

21.9 MB

05_practice-quiz-introduction-to-programming_quiz.html

5.5 KB

/.../03_introduction-to-python/

01_what-is-python.mp4

19.1 MB

02_a-note-on-syntax-and-code-blocks_instructions.html

2.0 KB

03_why-is-python-relevant-to-it.mp4

32.5 MB

04_more-about-python_instructions.html

5.4 KB

04_more-about-python_license.html

49.5 KB

05_other-languages.mp4

20.1 MB

06_practice-quiz-introduction-to-python_quiz.html

3.0 KB

/.../04_hello-world/

01_hello-world.mp4

12.6 MB

02_getting-information-from-the-user.mp4

10.7 MB

03_python-can-be-your-calculator.mp4

13.9 MB

04_first-programming-concepts-cheat-sheet_functions.html

226.5 KB

04_first-programming-concepts-cheat-sheet_instructions.html

4.8 KB

05_practice-quiz-hello-world_quiz.html

3.8 KB

/.../05_module-review/

01_first-steps-wrap-up.mp4

7.9 MB

02_meet-marga-the-curriculum-developer.mp4

18.6 MB

03_module-1-graded-assessment_exam.html

7.0 KB

/.../01_expressions-and-variables/

01_basic-python-syntax-introduction.mp4

18.0 MB

02_data-types.mp4

20.8 MB

03_data-types-recap_instructions.html

1.4 KB

04_variables.mp4

17.2 MB

05_expressions-numbers-and-type-conversions.mp4

10.6 MB

06_implicit-vs-explicit-conversion_instructions.html

1.7 KB

07_practice-quiz-expressions-and-variables_quiz.html

2.8 KB

/.../02_basic-python-syntax/02_functions/

01_defining-functions.mp4

14.1 MB

02_defining-functions-recap_instructions.html

2.1 KB

03_returning-values.mp4

14.7 MB

04_returning-values-using-functions_instructions.html

1.6 KB

05_the-principles-of-code-reuse.mp4

8.2 MB

06_code-style.mp4

24.9 MB

07_practice-quiz-functions_quiz.html

3.6 KB

/.../02_basic-python-syntax/03_conditionals/

01_comparing-things.mp4

11.5 MB

02_comparison-operators_instructions.html

2.6 KB

03_branching-with-if-statements.mp4

13.4 MB

04_if-statements-recap_instructions.html

1.6 KB

05_else-statements.mp4

16.4 MB

06_else-statements-and-the-modulo-operator_instructions.html

2.1 KB

07_elif-statements.mp4

17.3 MB

08_more-complex-branching-with-elif-statements_instructions.html

1.8 KB

09_conditionals-cheat-sheet_instructions.html

2.7 KB

10_practice-quiz-conditionals_quiz.html

3.7 KB

/.../04_module-review/

01_basic-syntax-wrap-up.mp4

6.8 MB

02_in-margas-words-why-i-like-python.mp4

23.8 MB

03_module-2-graded-assessment_exam.html

6.5 KB

/.../01_while-loops/

01_introduction-to-loops.mp4

11.2 MB

02_what-is-a-while-loop.mp4

9.3 MB

03_anatomy-of-a-while-loop_instructions.html

1.6 KB

04_more-while-loop-examples.mp4

10.0 MB

05_why-initializing-variables-matters.mp4

14.1 MB

06_common-pitfalls-with-variable-initialization_instructions.html

1.8 KB

07_infinite-loops-and-how-to-break-them.mp4

21.1 MB

08_infinite-loops-and-code-blocks_instructions.html

1.7 KB

09_practice-quiz-while-loops_quiz.html

2.9 KB

/.../02_for-loops/

01_what-is-a-for-loop.mp4

18.5 MB

02_for-loops-recap_instructions.html

3.5 KB

03_more-for-loop-examples.mp4

8.4 MB

04_a-closer-look-at-the-range-function_instructions.html

2.3 KB

05_nested-for-loops.mp4

23.8 MB

06_common-errors-in-for-loops.mp4

14.4 MB

07_loops-cheat-sheet_instructions.html

3.8 KB

08_practice-quiz-for-loops_quiz.html

3.0 KB

/.../03_recursion-optional/

01_what-is-recursion-optional.mp4

20.1 MB

02_recursion-in-action-in-the-it-context.mp4

18.0 MB

03_additional-recursion-sources_instructions.html

1.9 KB

04_practice-quiz-recursion_quiz.html

3.9 KB

/.../04_module-review/

01_loops-wrap-up.mp4

6.9 MB

02_in-margas-words-how-i-got-into-programming.mp4

28.7 MB

03_module-3-graded-assessment_exam.html

4.8 KB

/.../04_strings-lists-and-dictionaries/01_strings/

01_basic-structures-introduction.mp4

10.1 MB

02_what-is-a-string.mp4

13.9 MB

03_the-parts-of-a-string.mp4

10.9 MB

04_string-indexing-and-slicing_instructions.html

2.4 KB

05_creating-new-strings.mp4

17.8 MB

06_basic-string-methods_instructions.html

3.0 KB

07_more-string-methods.mp4

17.2 MB

08_advanced-string-methods_instructions.html

3.8 KB

09_formatting-strings.mp4

15.6 MB

10_string-formatting_instructions.html

2.7 KB

11_string-reference-cheat-sheet_instructions.html

3.2 KB

11_string-reference-cheat-sheet_stdtypes.html

540.3 KB

12_formatting-strings-cheat-sheet_instructions.html

7.5 KB

12_formatting-strings-cheat-sheet_lexical_analysis.html

89.1 KB

12_formatting-strings-cheat-sheet_stdtypes.html

540.3 KB

12_formatting-strings-cheat-sheet_string.html

101.8 KB

13_practice-quiz-strings_quiz.html

3.3 KB

/.../04_strings-lists-and-dictionaries/02_lists/

01_what-is-a-list.mp4

15.0 MB

02_lists-defined_instructions.html

2.5 KB

03_modifying-the-contents-of-a-list.mp4

17.0 MB

04_modifying-lists_instructions.html

3.2 KB

05_lists-and-tuples.mp4

13.0 MB

06_tuples_instructions.html

2.2 KB

07_iterating-over-lists-and-tuples.mp4

24.1 MB

08_iterating-over-lists-using-enumerate_instructions.html

1.5 KB

09_list-comprehensions.mp4

11.7 MB

10_list-comprehensions_instructions.html

2.3 KB

11_lists-and-tuples-operations-cheat-sheet_instructions.html

4.3 KB

11_lists-and-tuples-operations-cheat-sheet_stdtypes.html

540.3 KB

12_practice-quiz-lists_quiz.html

4.1 KB

/.../04_strings-lists-and-dictionaries/03_dictionaries/

01_what-is-a-dictionary.mp4

17.5 MB

02_dictionaries-defined_instructions.html

3.2 KB

03_iterating-over-the-contents-of-a-dictionary.mp4

12.7 MB

04_iterating-over-dictionaries_instructions.html

1.8 KB

05_dictionaries-vs-lists.mp4

22.3 MB

06_dictionary-methods-cheat-sheet_instructions.html

2.8 KB

06_dictionary-methods-cheat-sheet_stdtypes.html

540.3 KB

07_practice-quiz-dictionaries_quiz.html

4.0 KB

/.../04_module-review/

01_basic-structures-wrap-up.mp4

11.4 MB

02_in-margas-words-my-most-challenging-script.mp4

12.9 MB

03_module-4-graded-assessment_exam.html

6.7 KB

/.../01_object-oriented-programming-optional/

01_oop-introduction-optional.mp4

7.4 MB

02_what-is-object-oriented-programming-optional.mp4

16.9 MB

03_object-oriented-programming-defined_instructions.html

1.5 KB

04_classes-and-objects-in-python-optional.mp4

15.7 MB

05_classes-and-objects-in-detail_instructions.html

2.1 KB

06_defining-new-classes-optional.mp4

11.4 MB

07_defining-classes-optional_instructions.html

2.5 KB

08_practice-quiz-object-oriented-programming-optional_quiz.html

4.2 KB

/.../02_classes-and-methods-optional/

01_instance-methods-optional.mp4

14.7 MB

02_what-is-a-method_instructions.html

1.7 KB

03_constructors-and-other-special-methods-optional.mp4

15.8 MB

04_special-methods_instructions.html

3.5 KB

05_documenting-functions-classes-and-methods-optional.mp4

10.1 MB

06_documenting-with-docstrings_instructions.html

3.5 KB

07_classes-and-methods-cheat-sheet-optional_instructions.html

2.9 KB

08_about-jupyter-notebooks-optional.mp4

14.1 MB

09_help-with-jupyter-notebooks-optional_instructions.html

2.1 KB

/.../03_code-reuse/

01_inheritance-optional.mp4

22.2 MB

02_object-inheritance_instructions.html

4.3 KB

03_composition-optional.mp4

28.4 MB

04_object-composition_instructions.html

3.2 KB

05_python-modules-optional.mp4

16.1 MB

06_augmenting-python-with-modules_instructions.html

3.8 KB

07_supplemental-reading-for-code-reuse-optional_instructions.html

1.3 KB

/.../04_module-review/

01_oop-wrap-up-optional.mp4

10.1 MB

02_in-margas-words-my-favorite-course-optional.mp4

13.0 MB

/.../01_writing-a-script-from-the-ground-up/

01_final-project-introduction.mp4

19.8 MB

02_problem-statement.mp4

16.4 MB

03_research.mp4

22.9 MB

04_planning.mp4

14.4 MB

05_writing-the-script.mp4

15.1 MB

06_putting-it-all-together.mp4

7.1 MB

07_using-graded-jupyter-notebooks.mp4

5.2 MB

/.../02_final-project/

01_in-margas-words-developing-an-inclusive-curriculum.mp4

14.7 MB

02_final-project-overview.mp4

29.1 MB

03_final-project-help_instructions.html

2.9 KB

04_programming-final-project-wordcloud_instructions.html

1.2 KB

/.../03_course-wrap-up/

01_congratulations.mp4

12.7 MB

02_sneak-peek-of-the-next-course.mp4

8.3 MB

/.../01_course-introduction/

01_course-introduction.mp4

35.1 MB

02_welcome-to-the-course_index.html

19.2 KB

02_welcome-to-the-course_instructions.html

7.7 KB

/.../02_getting-ready-for-python/

01_intro-to-module-1-getting-your-python-on.mp4

12.7 MB

02_getting-familiar-with-the-operating-system.mp4

31.4 MB

03_getting-your-computer-ready-for-python.mp4

20.0 MB

04_setting-up-your-environment-on-windows-optional.mp4

18.5 MB

05_setting-up-your-environment-on-macos-optional.mp4

22.8 MB

06_setting-up-your-environment-on-linux-optional.mp4

38.0 MB

07_pointers-for-getting-your-environment-setup_instructions.html

4.1 KB

08_practice-quiz-getting-ready-for-python_quiz.html

4.3 KB

/.../03_running-python-locally/

01_interpreted-vs-compiled-languages.mp4

11.7 MB

02_how-to-run-a-python-script.mp4

23.6 MB

03_your-own-python-modules.mp4

23.4 MB

04_what-is-an-ide.mp4

20.4 MB

05_setting-up-your-environment_instructions.html

2.7 KB

06_practice-quiz-running-python-locally_quiz.html

4.8 KB

/.../04_automating-tasks-through-programming/

01_benefits-of-automation.mp4

21.8 MB

02_pitfalls-of-automation.mp4

27.3 MB

03_practical-automation-example.mp4

24.6 MB

04_is-it-worth-the-time_instructions.html

1.2 KB

05_practice-quiz-automation_quiz.html

6.5 KB

/.../05_introduction-to-qwiklabs/

01_what-is-qwiklabs.mp4

19.2 MB

02_how-to-log-in-to-qwiklabs_instructions.html

3.4 KB

/.../06_module-review/

01_module-1-wrap-up-getting-your-python-on.mp4

8.6 MB

/.../01_reading-and-writing-files/

01_programming-with-files.mp4

16.8 MB

02_reading-files.mp4

23.3 MB

03_iterating-through-files.mp4

19.0 MB

04_writing-files.mp4

16.3 MB

05_reading-and-writing-files-cheat-sheet_functions.html

226.5 KB

05_reading-and-writing-files-cheat-sheet_instructions.html

1.2 KB

/.../02_managing-files-and-directories/

01_working-with-files.mp4

17.2 MB

02_more-file-information.mp4

18.8 MB

03_directories.mp4

20.3 MB

04_files-and-directories-cheat-sheet_instructions.html

1.6 KB

04_files-and-directories-cheat-sheet_os.html

506.3 KB

04_files-and-directories-cheat-sheet_os.path.html

55.6 KB

05_practice-quiz-managing-files-directories_quiz.html

2.9 KB

/.../03_reading-and-writing-csv-files/

01_what-is-a-csv-file.mp4

14.3 MB

02_reading-csv-files.mp4

12.9 MB

03_generating-csv.mp4

8.4 MB

04_reading-and-writing-csv-files-with-dictionaries.mp4

16.2 MB

05_csv-files-cheat-sheet_csv.html

71.1 KB

05_csv-files-cheat-sheet_instructions.html

1.4 KB

06_practice-quiz-reading-writing-csv-files_quiz.html

4.2 KB

/.../04_module-review/

01_module-2-wrap-up-managing-files-with-python.mp4

10.6 MB

/.../01_regular-expressions/

01_intro-to-module-3-regular-expressions.mp4

9.0 MB

02_what-are-regular-expressions.mp4

15.0 MB

03_why-use-regular-expressions.mp4

9.7 MB

04_basic-matching-with-grep.mp4

23.6 MB

05_practice-quiz-regular-expressions_quiz.html

4.7 KB

/.../02_basic-regular-expressions/

01_simple-matching-in-python.mp4

14.3 MB

02_wildcards-and-character-classes.mp4

19.6 MB

03_repetition-qualifiers.mp4

16.5 MB

04_escaping-characters.mp4

15.1 MB

05_regular-expressions-in-action.mp4

16.2 MB

06_regular-expressions-cheat-sheet_instructions.html

1.8 KB

06_regular-expressions-cheat-sheet_re.html

201.0 KB

06_regular-expressions-cheat-sheet_regex.html

154.4 KB

07_practice-quiz-basic-regular-expressions_quiz.html

4.3 KB

/.../03_advanced-regular-expressions/

01_capturing-groups.mp4

17.7 MB

02_more-on-repetition-qualifiers.mp4

15.0 MB

03_extracting-a-pid-using-regexes-in-python.mp4

13.2 MB

04_splitting-and-replacing.mp4

18.1 MB

05_advanced-regular-expressions-cheat-sheet_instructions.html

1.2 KB

06_practice-quiz-advanced-regular-expressions_quiz.html

3.3 KB

/.../04_module-review/

01_module-3-wrap-up-regular-expressions.mp4

8.7 MB

/.../01_data-streams/

01_intro-to-module-4-managing-data-and-processes.mp4

11.4 MB

02_reading-data-interactively.mp4

10.9 MB

03_standard-streams.mp4

16.0 MB

04_environment-variables.mp4

17.8 MB

05_command-line-arguments-and-exit-status.mp4

23.0 MB

06_more-about-input-functions_functions.html

210.5 KB

06_more-about-input-functions_instructions.html

5.7 KB

07_practice-quiz-data-streams_quiz.html

4.5 KB

/.../02_python-subprocesses/

01_running-system-commands-in-python.mp4

20.7 MB

02_obtaining-the-output-of-a-system-command.mp4

20.1 MB

03_advanced-subprocess-management.mp4

27.4 MB

04_python-subprocesses-cheat-sheet_instructions.html

1.2 KB

04_python-subprocesses-cheat-sheet_subprocess.html

169.9 KB

05_practice-quiz-python-subprocesses_quiz.html

4.7 KB

/.../03_processing-log-files/

01_what-are-log-files.mp4

8.3 MB

02_filtering-log-files-with-regular-expressions.mp4

14.5 MB

03_making-sense-out-of-the-data.mp4

14.0 MB

04_practice-quiz-processing-log-files_quiz.html

4.9 KB

/.../04_module-review/

01_module-4-wrap-up-managing-data-and-processes.mp4

8.1 MB

/.../01_simple-tests/

01_intro-to-module-5-testing-in-python.mp4

8.8 MB

02_what-is-testing.mp4

11.0 MB

03_manual-testing-and-automated-testing.mp4

17.4 MB

04_practice-quiz-simple-tests_quiz.html

4.4 KB

/.../02_unit-tests/

01_unit-tests.mp4

15.5 MB

02_writing-unit-tests-in-python.mp4

20.9 MB

03_edge-cases.mp4

15.5 MB

04_additional-test-cases.mp4

17.3 MB

05_unit-test-cheat-sheet_instructions.html

6.4 KB

05_unit-test-cheat-sheet_unittest.html

279.7 KB

06_help-with-jupyter-notebooks_instructions.html

2.1 KB

/.../03_other-test-concepts/

01_black-box-vs-white-box.mp4

16.7 MB

02_other-test-types.mp4

21.8 MB

03_test-driven-development.mp4

14.6 MB

04_more-about-tests_exploratory-testing.html

91.3 KB

04_more-about-tests_instructions.html

2.3 KB

04_more-about-tests_performance-testing.html

212.8 KB

04_more-about-tests_smoke-testing.html

99.8 KB

04_more-about-tests_test-first-is-fun_08.html

175.1 KB

05_practice-quiz-other-test-concepts_quiz.html

4.5 KB

/.../04_errors-and-exceptions/

01_the-try-except-construct.mp4

14.9 MB

02_raising-errors.mp4

28.1 MB

03_testing-for-expected-errors.mp4

9.0 MB

04_handling-errors-cheat-sheet_errors.html

49.3 KB

04_handling-errors-cheat-sheet_exceptions.html

87.8 KB

04_handling-errors-cheat-sheet_instructions.html

3.1 KB

04_handling-errors-cheat-sheet_simple_stmts.html

101.7 KB

/.../05_module-review/

01_module-5-wrap-up-testing-in-python.mp4

6.7 MB

/.../01_interacting-with-the-command-line-shell/

01_intro-to-module-6-bash-scripting.mp4

15.0 MB

02_basic-linux-commands.mp4

24.9 MB

03_redirecting-streams.mp4

19.1 MB

04_pipes-and-pipelines.mp4

22.3 MB

05_signalling-processes.mp4

32.5 MB

06_basic-linux-commands-cheat-sheet_instructions.html

5.6 KB

07_redirections-pipes-and-signals_instructions.html

3.2 KB

08_practice-quiz-interacting-with-the-command-line_quiz.html

4.4 KB

/.../02_bash-scripting/

01_creating-bash-scripts.mp4

14.5 MB

02_using-variables-and-globs.mp4

18.9 MB

03_conditional-execution-in-bash.mp4

19.4 MB

04_bash-scripting-resources_instructions.html

1.6 KB

05_practice-quiz-bash-scripting_quiz.html

4.4 KB

/.../03_advanced-bash-concepts/

01_while-loops-in-bash-scripts.mp4

22.7 MB

02_for-loops-in-bash-scripts.mp4

21.0 MB

03_advanced-command-interaction.mp4

17.1 MB

04_choosing-between-bash-and-python.mp4

16.4 MB

05_practice-quiz-advanced-bash-concepts_quiz.html

4.6 KB

/.../04_module-review/

01_module-6-wrap-up-bash-scripting.mp4

12.2 MB

/.../01_getting-ready-for-the-final-project/

01_intro-to-your-final-project.mp4

8.0 MB

02_writing-a-script-from-the-ground-up.mp4

17.4 MB

03_project-problem-statement.mp4

16.2 MB

04_help-with-research-and-planning.mp4

11.3 MB

/.../02_course-wrap-up/

01_congratulations.mp4

13.4 MB

02_sneak-peek-of-the-next-course.mp4

11.5 MB

/.../01_course-introduction/

01_course-introduction.mp4

54.7 MB

02_welcome-to-the-course_instructions.html

6.8 KB

/.../02_before-version-control/

01_intro-to-module-1-version-control.mp4

24.1 MB

02_keeping-historical-copies.mp4

16.0 MB

03_diffing-files.mp4

20.0 MB

04_applying-changes.mp4

39.0 MB

05_practical-application-of-diff-and-patch.mp4

23.3 MB

06_diff-and-patch-cheat-sheet_diff.1.html

15.3 KB

06_diff-and-patch-cheat-sheet_instructions.html

3.1 KB

06_diff-and-patch-cheat-sheet_patch.1.html

48.9 KB

/.../03_version-control-systems/

01_what-is-version-control.mp4

31.6 MB

02_version-control-and-automation.mp4

33.5 MB

03_what-is-git.mp4

30.8 MB

04_more-information-about-git_instructions.html

1.7 KB

05_installing-git.mp4

29.9 MB

06_installing-git-on-windows-optional.mp4

28.7 MB

07_installing-git_instructions.html

1.5 KB

/.../04_using-git/

01_first-steps-with-git.mp4

21.4 MB

02_tracking-files.mp4

20.7 MB

03_the-basic-git-workflow.mp4

32.8 MB

04_anatomy-of-a-commit-message.mp4

36.1 MB

05_initial-git-cheat-sheet_instructions.html

1.9 KB

05_initial-git-cheat-sheet_submitting-patches.rst

76.4 KB

/.../05_module-wrap-up/

01_module-1-wrap-up-intro-to-version-control.mp4

20.0 MB

02_how-to-log-in-to-qwiklabs_instructions.html

3.4 KB

/.../01_advanced-git-interaction/

01_intro-to-module-2-using-git-locally.mp4

17.6 MB

02_skipping-the-staging-area.mp4

28.9 MB

03_getting-more-information-about-our-changes.mp4

39.5 MB

04_deleting-and-renaming-files.mp4

27.9 MB

05_advanced-git-cheat-sheet_github-git-cheat-sheet.pdf

361.7 KB

05_advanced-git-cheat-sheet_instructions.html

4.1 KB

/.../02_undoing-things/

01_undoing-changes-before-committing.mp4

29.1 MB

02_amending-commits.mp4

23.1 MB

03_rollbacks.mp4

24.4 MB

04_identifying-a-commit.mp4

48.5 MB

05_git-revert-cheat-sheet_4-doing-a-hard-reset.html

11.0 KB

05_git-revert-cheat-sheet_instructions.html

2.9 KB

/.../03_branching-and-merging/

01_what-is-a-branch.mp4

21.8 MB

02_creating-new-branches.mp4

20.5 MB

03_working-with-branches.mp4

16.3 MB

04_merging.mp4

15.6 MB

05_merge-conflicts.mp4

23.0 MB

06_git-branches-and-merging-cheat-sheet_instructions.html

3.7 KB

/.../04_module-wrap-up/

01_module-2-wrap-up-using-git-locally.mp4

12.9 MB

/.../01_introduction-to-github/

01_intro-to-module-3-working-with-remotes.mp4

22.2 MB

02_what-is-github.mp4

22.3 MB

03_basic-interaction-with-github.mp4

28.6 MB

04_basic-interaction-with-github-cheat-sheet_instructions.html

3.4 KB

/.../02_using-a-remote-repository/

01_what-is-a-remote.mp4

34.0 MB

02_working-with-remotes.mp4

18.2 MB

03_fetching-new-changes.mp4

18.0 MB

04_updating-the-local-repository.mp4

19.5 MB

05_git-remotes-cheat-sheet_instructions.html

3.1 KB

/.../03_solving-conflicts/

01_the-pull-merge-push-workflow.mp4

38.6 MB

02_pushing-remote-branches.mp4

37.9 MB

03_rebasing-your-changes.mp4

24.9 MB

04_another-rebasing-example.mp4

37.0 MB

05_best-practices-for-collaboration.mp4

35.4 MB

06_conflict-resolution-cheat-sheet_instructions.html

2.2 KB

/.../04_module-review/

01_module-3-wrap-up-working-with-remotes.mp4

16.6 MB

/.../01_pull-requests/

01_intro-to-module-4-collaboration.mp4

18.0 MB

02_a-simple-pull-request-on-github.mp4

20.7 MB

03_the-typical-pull-request-workflow-on-github.mp4

34.5 MB

04_updating-an-existing-pull-request.mp4

22.0 MB

05_squashing-changes.mp4

30.6 MB

06_git-fork-and-pull-request-cheat-sheet_instructions.html

1.2 KB

/.../02_code-reviews/

01_what-are-code-reviews.mp4

32.1 MB

02_the-code-review-workflow.mp4

30.5 MB

03_how-to-use-code-reviews-in-github.mp4

25.1 MB

04_more-information-on-code-reviews_instructions.html

1.8 KB

/.../03_managing-projects/

01_managing-collaboration.mp4

35.8 MB

02_tracking-issues.mp4

42.6 MB

03_continuous-integration.mp4

44.7 MB

04_additional-tools_diy.html

29.9 KB

04_additional-tools_instructions.html

2.6 KB

04_additional-tools_what-is-cicd-continuous-integration-and-continuous-delivery-explained.html

169.2 KB

/.../04_module-review/

01_module-4-wrap-up-collaboration.mp4

18.4 MB

/.../05_course-wrap-up/

01_congratulations.mp4

12.4 MB

02_sneak-peek-of-the-next-course.mp4

13.8 MB

/.../01_course-introduction/

01_course-introduction.mp4

48.0 MB

02_welcome-to-the-course_instructions.html

6.1 KB

/.../02_introduction-to-debugging/

01_intro-to-module-1-troubleshooting-concepts.mp4

24.6 MB

02_what-is-debugging.mp4

42.2 MB

03_problem-solving-steps.mp4

48.0 MB

04_silently-crashing-application.mp4

51.3 MB

/.../03_understanding-the-problem/

01_it-doesn-t-work.mp4

68.5 MB

02_creating-a-reproduction-case.mp4

40.7 MB

03_finding-the-root-cause.mp4

60.6 MB

04_dealing-with-intermittent-issues.mp4

54.3 MB

05_intermittently-failing-script.mp4

38.5 MB

/.../04_binary-searching-a-problem/

01_what-is-binary-search.mp4

25.7 MB

02_linear-and-binary-search-optional_instructions.html

1.9 KB

03_applying-binary-search-in-troubleshooting.mp4

44.9 MB

04_finding-invalid-data.mp4

34.7 MB

/.../05_module-review/

01_module-1-wrap-up-troubleshooting-concepts.mp4

28.3 MB

02_how-to-log-in-to-qwiklabs_instructions.html

3.4 KB

/.../01_understanding-slowness/

01_intro-to-module-2-slowness.mp4

32.6 MB

02_why-is-my-computer-slow.mp4

41.4 MB

03_how-computers-use-resources.mp4

43.4 MB

04_possible-causes-of-slowness.mp4

42.2 MB

05_slow-web-server.mp4

73.2 MB

06_monitoring-tools_instructions.html

2.9 KB

06_monitoring-tools_linuxperf.html

48.6 KB

06_monitoring-tools_usemethod.html

33.3 KB

/.../02_slow-code/

01_writing-efficient-code.mp4

41.5 MB

02_using-the-right-data-structures.mp4

34.8 MB

03_expensive-loops.mp4

38.0 MB

04_keeping-local-results.mp4

50.2 MB

05_slow-script-with-expensive-loop.mp4

43.3 MB

06_more-about-improving-our-code_instructions.html

1.2 KB

/.../03_when-slowness-problems-get-complex/

01_parallelizing-operations.mp4

60.5 MB

02_slowly-growing-in-complexity.mp4

29.0 MB

03_dealing-with-complex-slow-systems.mp4

30.3 MB

04_using-threads-to-make-things-go-faster.mp4

42.0 MB

05_more-about-complex-slow-systems_instructions.html

1.7 KB

/.../04_module-review/

01_module-2-wrap-up-slowness.mp4

19.5 MB

/.../01_why-programs-crash/

01_intro-to-module-3-crashing-programs.mp4

43.9 MB

02_systems-that-crash.mp4

59.6 MB

03_understanding-crashing-applications.mp4

64.1 MB

04_what-to-do-when-you-can-t-fix-the-program.mp4

53.6 MB

05_internal-server-error.mp4

43.6 MB

06_resources-for-understanding-crashes_how-to-check-system-logs-on-linux-complete-usage-guide.htm

261.7 KB

06_resources-for-understanding-crashes_instructions.html

3.5 KB

/.../02_code-that-crashes/

01_accessing-invalid-memory.mp4

67.0 MB

02_unhandled-errors-and-exceptions.mp4

68.8 MB

03_fixing-someone-elses-code.mp4

45.7 MB

04_debugging-a-segmentation-fault.mp4

23.6 MB

05_debugging-a-python-crash.mp4

44.2 MB

06_resources-for-debugging-crashes_bottle.py

1.5 MB

06_resources-for-debugging-crashes_instructions.html

3.3 KB

/.../03_handling-bigger-incidents/

01_crashes-in-complex-systems.mp4

59.4 MB

02_communication-and-documentation-during-incidents.mp4

54.8 MB

03_writing-effective-postmortems.mp4

45.0 MB

/.../04_module-review/

01_module-3-wrap-up-crashing-programs.mp4

19.5 MB

/.../01_managing-computer-resources/

01_intro-to-module-4-managing-resources.mp4

28.9 MB

02_memory-leaks-and-how-to-prevent-them.mp4

53.5 MB

03_managing-disk-space.mp4

57.4 MB

04_network-saturation.mp4

36.1 MB

05_dealing-with-memory-leaks.mp4

49.5 MB

06_more-about-managing-resources_instructions.html

2.0 KB

/.../02_managing-our-time/

01_getting-to-the-important-tasks.mp4

60.9 MB

02_prioritizing-tasks.mp4

72.4 MB

03_estimating-the-time-tasks-will-take.mp4

46.8 MB

04_communicating-expectations.mp4

66.4 MB

05_more-about-making-the-best-use-of-our-time_instructions.html

1.2 KB

/.../03_making-our-future-lives-easier/

01_dealing-with-hard-problems.mp4

53.0 MB

02_proactive-practices.mp4

57.4 MB

03_planning-future-resource-usage.mp4

45.3 MB

04_preventing-future-problems.mp4

44.6 MB

05_more-about-preventing-future-breakage_instructions.html

5.9 KB

/.../04_module-review/

01_module-4-wrap-up-managing-resources.mp4

17.2 MB

/.../05_course-wrap-up/

01_congratulations.mp4

17.8 MB

02_sneak-peek-of-next-course.mp4

14.1 MB

/.../01_course-introduction/

01_course-introduction.mp4

44.7 MB

02_welcome-to-the-course_instructions.html

5.9 KB

/.../02_introduction-to-automation-at-scale/

01_intro-to-module-1-automating-with-configuration-management.mp4

16.1 MB

02_what-is-scale.mp4

21.0 MB

03_what-is-configuration-management.mp4

43.7 MB

04_what-is-infrastructure-as-code.mp4

54.9 MB

/.../03_introduction-to-puppet/

01_what-is-puppet.mp4

25.6 MB

02_puppet-resources.mp4

12.2 MB

03_puppet-classes.mp4

12.4 MB

04_puppet-resources_instructions.html

1.5 KB

04_puppet-resources_lang_resources.html

360.2 KB

/.../04_the-building-blocks-of-configuration-management/

01_what-are-domain-specific-languages.mp4

23.0 MB

02_the-driving-principles-of-configuration-management.mp4

33.0 MB

03_more-information-about-configuration-management_instructions.html

1.5 KB

03_more-information-about-configuration-management_the-puppet-design-philosophy.html

187.2 KB

/.../05_module-review/

01_module-1-wrap-up-automating-with-configuration-management.mp4

21.3 MB

02_how-to-log-in-to-qwiklabs_instructions.html

3.4 KB

/.../01_deploying-puppet-locally/

01_intro-to-module-2-deploying-puppet.mp4

13.1 MB

02_applying-rules-locally.mp4

28.8 MB

03_managing-resource-relationships.mp4

16.7 MB

04_organizing-your-puppet-modules.mp4

28.7 MB

05_more-information-about-deploying-puppet-locally_install_from_packages.html

329.7 KB

05_more-information-about-deploying-puppet-locally_instructions.html

1.5 KB

05_more-information-about-deploying-puppet-locally_style_guide.html

397.1 KB

/.../02_deploying-puppet-to-clients/

01_puppet-nodes.mp4

18.9 MB

02_puppets-certificate-infrastructure.mp4

34.8 MB

03_setting-up-puppet-clients-and-servers.mp4

27.1 MB

04_more-information-about-deploying-puppet-to-clients_instructions.html

1.2 KB

/.../03_updating-deployments/

01_modifying-and-testing-manifests.mp4

28.1 MB

02_safely-rolling-out-changes-and-validating-them.mp4

42.5 MB

03_more-information-about-updating-deployments_instructions.html

1.3 KB

/.../04_module-review/

01_module-2-wrap-up-deploying-puppet.mp4

19.6 MB

/.../01_cloud-computing/

01_intro-to-module-3-automation-in-the-cloud.mp4

16.6 MB

02_cloud-services-overview.mp4

36.1 MB

03_scaling-in-the-cloud.mp4

48.3 MB

04_evaluating-the-cloud.mp4

39.7 MB

05_migrating-to-the-cloud.mp4

47.8 MB

/.../02_managing-instances-in-the-cloud/

01_spinning-up-vms-in-the-cloud.mp4

39.1 MB

02_creating-a-new-vm-using-the-gcp-web-ui.mp4

14.6 MB

03_customizing-vms-in-gcp.mp4

30.1 MB

04_templating-a-customized-vm.mp4

24.0 MB

05_managing-vms-in-gcp_instructions.html

1.9 KB

/.../03_automating-cloud-deployments/

01_cloud-scale-deployments.mp4

31.0 MB

02_what-is-orchestration.mp4

25.5 MB

03_cloud-infrastructure-as-code.mp4

32.6 MB

04_more-about-cloud-gcp_gcp.html

91.2 KB

04_more-about-cloud-gcp_instructions.html

2.8 KB

/.../04_module-review/

01_module-3-wrap-up-automation-in-the-cloud.mp4

15.5 MB

/.../01_building-software-for-the-cloud/

01_intro-to-module-4-managing-cloud-instances-at-scale.mp4

16.2 MB

02_storing-data-in-the-cloud.mp4

50.1 MB

03_load-balancing.mp4

31.3 MB

04_change-management.mp4

39.0 MB

05_understanding-limitations.mp4

33.6 MB

06_more-about-cloud-providers_aws_service_limits.html

17.6 KB

06_more-about-cloud-providers_instructions.html

1.8 KB

/.../02_monitoring-and-alerting/

01_getting-started-with-monitoring.mp4

31.1 MB

02_getting-alerts-when-things-go-wrong.mp4

44.6 MB

03_service-level-objectives.mp4

42.8 MB

04_basic-monitoring-in-gcp.mp4

28.2 MB

05_more-information-on-monitoring-and-alerting_instructions.html

1.9 KB

/.../03_troubleshooting-and-debugging/

01_what-to-do-when-you-can-t-be-physically-there.mp4

21.7 MB

02_identifying-where-the-failure-is-coming-from.mp4

22.9 MB

03_recovering-from-failure.mp4

25.3 MB

04_reading-debugging-problems-on-the-cloud_ec2-instance-troubleshoot.html

13.6 KB

04_reading-debugging-problems-on-the-cloud_instructions.html

1.8 KB

/.../04_module-review/

01_module-4-wrap-up-managing-cloud-instances-at-scale.mp4

14.0 MB

/.../05_course-wrap-up/

01_congratulations.mp4

8.5 MB

/.../01_course-introduction/

01_course-introduction_instructions.html

3.0 KB

02_welcome-to-the-course_instructions.html

4.9 KB

/.../02_application-programming-interfaces-apis/

01_module-1-introduction_instructions.html

1.4 KB

02_built-in-libraries-vs-external-libraries_instructions.html

4.9 KB

03_what-is-an-api_instructions.html

3.7 KB

04_how-to-make-sense-of-an-api_Image.html

182.2 KB

04_how-to-make-sense-of-an-api_index.html

12.9 KB

04_how-to-make-sense-of-an-api_instructions.html

4.8 KB

04_how-to-make-sense-of-an-api_tutorial.html

65.9 KB

/.../03_manipulating-images/

01_how-to-use-pil-for-working-with-images_instructions.html

2.7 KB

01_how-to-use-pil-for-working-with-images_tutorial.html

65.9 KB

/.../04_module-1-project/

01_project-problem-statement_instructions.html

2.3 KB

/.../01_web-applications-and-services/

01_module-2-introduction_instructions.html

2.0 KB

02_web-applications-and-services_instructions.html

2.6 KB

03_data-serialization_instructions.html

5.2 KB

04_data-serialization-formats_instructions.html

4.6 KB

04_data-serialization-formats_pickle.html

148.0 KB

05_more-about-json_instructions.html

9.0 KB

05_more-about-json_json.html

85.4 KB

/.../02_python-requests/

01_the-python-requests-library_instructions.html

6.4 KB

02_useful-operations-for-python-requests_http-status-codes.xhtml

15.4 KB

02_useful-operations-for-python-requests_instructions.html

3.4 KB

03_http-get-and-post-methods_instructions.html

6.5 KB

04_what-is-django_flask.html

43.3 KB

04_what-is-django_instructions.html

5.9 KB

/.../03_module-2-project/

01_project-problem-statement_instructions.html

2.0 KB

/.../01_sending-emails-from-python/

01_module-3-introduction_instructions.html

2.9 KB

02_introduction-to-python-email-library_email.html

27.8 KB

02_introduction-to-python-email-library_email.message.html

89.0 KB

02_introduction-to-python-email-library_instructions.html

5.3 KB

02_introduction-to-python-email-library_rfc2821.html

248.1 KB

03_adding-attachments_instructions.html

4.7 KB

03_adding-attachments_media-types.xhtml

709.5 KB

04_sending-the-email-through-an-smtp-server_email.html

27.8 KB

04_sending-the-email-through-an-smtp-server_email.message.html

89.0 KB

04_sending-the-email-through-an-smtp-server_getpass.html

12.1 KB

04_sending-the-email-through-an-smtp-server_instructions.html

7.6 KB

04_sending-the-email-through-an-smtp-server_mimetypes.html

33.0 KB

04_sending-the-email-through-an-smtp-server_rfc2821.html

248.1 KB

04_sending-the-email-through-an-smtp-server_smtplib.html

71.0 KB

/.../02_generating-pdfs-from-python/

01_introduction-to-generating-pdfs_instructions.html

15.3 KB

02_adding-tables-to-our-pdfs_instructions.html

49.0 KB

03_adding-graphics-to-our-pdfs_instructions.html

49.6 KB

03_adding-graphics-to-our-pdfs_reportlab-userguide.pdf

560.8 KB

/.../03_module-3-project/

01_project-problem-statement_instructions.html

2.2 KB

/.../01_final-course-project/

01_module-4-introduction_instructions.html

1.8 KB

02_project-problem-statement_instructions.html

2.4 KB

03_how-to-approach-the-problem_email.examples.html

57.9 KB

03_how-to-approach-the-problem_instructions.html

4.3 KB

03_how-to-approach-the-problem_reportlab-userguide.pdf

560.8 KB

03_how-to-approach-the-problem_shutil.html

93.3 KB

03_how-to-approach-the-problem_smtplib.html

72.1 KB

03_how-to-approach-the-problem_tutorial.html

65.9 KB

/.../02_course-wrap-up/

01_outtakes.mp4

8.6 MB

/.../1. Introduction to IT Support/

1. Program Introduction.mp4

57.3 MB

2. What is IT.mp4

38.7 MB

3. What does an IT Support Specialist do.mp4

7.7 MB

4. Course Introduction.mp4

14.9 MB

/.../2. History of Computing/

1. From Abacus to Analytical Engine.mp4

46.4 MB

2. The Path to Modern Computers.mp4

79.1 MB

3. Kevin Career.mp4

10.1 MB

/.../1. Introduction to IT/3. Digital Logic/

1. Computer Language.mp4

15.4 MB

2. Character Encoding.mp4

17.6 MB

3. Binary.mp4

15.6 MB

4. How to count in Binary.mp4

16.7 MB

Logic gate - Simple English Wikipedia, the free encyclopedia.html

97.1 KB

Logic gate - Simple English Wikipedia, the free encyclopedia_files.zip

62.4 KB

/.../4. Computer Architecture Layer/

1. Video Abstraction.mp4

12.7 MB

2. Computer Architecture Overview.mp4

33.1 MB

3. Kevin Advice.mp4

15.7 MB

/.../1. The Modern Computer/

1. Module Introduction.mp4

24.6 MB

2. Introduction to Computer Hardware.mp4

48.9 MB

3. Programs and Hardware.mp4

75.7 MB

CPU cache - Wikipedia_files.zip

178.4 KB

How to Overclock Your CPU _ Page 3 _ Digital Trends.html

239.6 KB

How to Overclock Your CPU _ Page 3 _ Digital Trends_files.zip

549.2 KB

Joe Diversity.mp4

8.7 MB

/.../1. Technical Support Fundamentals/2. Hardware/2. Components/

1. CPU.mp4

43.9 MB

2. RAM.mp4

25.9 MB

3. Motherboards.mp4

39.4 MB

4. Storage.mp4

36.8 MB

5. Power Supplies.mp4

31.8 MB

6. Peripherals.mp4

28.0 MB

32-bit and 64-bit Windows_ Frequently asked questions - Windows Help.html

245.4 KB

32-bit and 64-bit Windows_ Frequently asked questions - Windows Help_files.zip

672.3 KB

64-bit computing - Wikipedia.html

275.6 KB

64-bit computing - Wikipedia_files.zip

59.6 KB

Kilobyte - Wikipedia.html

149.3 KB

Kilobyte - Wikipedia_files.zip

55.3 KB

/.../3. Starting it up/

1. BIOS.mp4

39.1 MB

2. Putting it all together.mp4

237.3 MB

Ben_s Advice.mp4

8.7 MB

/.../1. What_s an Operating System/

1. Module Introduction.mp4

20.0 MB

2. Components of an Operating System.mp4

37.2 MB

3. Files and File Systems.mp4

24.3 MB

4. Process Management.mp4

14.8 MB

5. Memory Management.mp4

12.3 MB

6. I-O Management.mp4

11.2 MB

7. Interacting with the OS-User Space.mp4

20.7 MB

8. Logs.mp4

14.2 MB

9. the Boot Process.mp4

11.3 MB

Chrome OS - Wikipedia.html

427.1 KB

Chrome OS - Wikipedia_files.zip

170.4 KB

Cindy Drive _ Career Path.mp4

13.4 MB

ReFS - Wikipedia.html

236.7 KB

ReFS - Wikipedia_files.zip

60.4 KB

/.../2. Installing an Operating System/

1. Choosing an Operating System.mp4

23.0 MB

2. Virtual Machines.mp4

13.8 MB

3. Installing Windows.mp4

35.5 MB

4. Installing Linux.mp4

31.5 MB

5. What is Chrome OS.mp4

28.2 MB

6. Installing Mac OS.mp4

19.0 MB

7. Tri Ngo Obstacles _ How to be Successful in IT.mp4

19.3 MB

8. Introduction to Qwiklabs.mp4

17.4 MB

balenaEtcher - Home.html

170.2 KB

balenaEtcher - Home_files.zip

620.0 KB

The leading operating system for PCs, IoT devices, servers, cloud Ubuntu files.zip

401.8 KB

The leading operating system for PCs, IoT devices, servers.html

198.1 KB

UbuntuUpdates - All package updates.html

56.4 KB

UbuntuUpdates - All package updates_files.zip

230.7 KB

/.../1. What is Networking/

1. Module Introduction.mp4

27.6 MB

2. Basics of Networking.mp4

48.5 MB

3. Networking Hardware.mp4

27.0 MB

4. Language of the Internet.mp4

14.3 MB

5. The Web.mp4

25.4 MB

6. Victor_s First Job.mp4

11.2 MB

/.../2. Limitations of the Internet/

1. History of the Internet.mp4

40.1 MB

2. Limitations of the Internet.mp4

36.1 MB

/.../3. Impact of the Internet/

1. Impact.mp4

34.3 MB

2. Internet of Things.mp4

14.2 MB

3. Gian what hes does in Android Security.mp4

10.8 MB

4. Privacy and Security.mp4

35.5 MB

5. Heather Adkins Keeping Hacker_s out.mp4

16.5 MB

/.../1. Introduction to Software/

1. Module Introduction.mp4

24.1 MB

2. What is Software.mp4

23.8 MB

3. Types of Software.mp4

30.6 MB

4. Revisiting Abstraction.mp4

9.7 MB

5. Recipe for Commputing.mp4

27.8 MB

Phlean Navy.mp4

11.9 MB

/.../2. Interacting with Software/

1. Managing Software.mp4

27.9 MB

2. Installing, Updating and Removing Software on Windows.mp4

13.4 MB

3. Installing, Updating and Removing Software on Linux.mp4

8.3 MB

4. Software Automation.mp4

13.0 MB

/.../1. Technical Support Fundamentals/6. Troubleshooting/

5. Writing Effective Documentation _ Coursera.pdf

103.8 KB

/.../1. Troubleshooting Best Practices/

1. Module Introduction.mp4

23.7 MB

2. Ask Questions!.mp4

46.9 MB

3. Isolating the Problem.mp4

25.0 MB

4. Follow the Cookie Crumbs.mp4

25.7 MB

5. Start with the Quikest Step First.mp4

17.9 MB

6. Troubleshooting Pitfalls to Avoid.mp4

14.0 MB

7. Amir Attributes.mp4

11.5 MB

/.../1. Technical Support Fundamentals/6. Troubleshooting/2. Customer Service/

1. Intro to Soft Skills.mp4

73.6 MB

2. Anatomy of an Interaction.mp4

54.4 MB

3. How to deal with Difficult Situations.mp4

84.2 MB

/.../1. Technical Support Fundamentals/6. Troubleshooting/3. Documentation/

1. Ticketing Systems and Documenting Your Work.mp4

18.2 MB

2. Process Documentation.mp4

11.6 MB

3. Documenting in Ticketing Systems.mp4

8.2 MB

/.../4. Going through a Technical Interview/

1. Your Opportunity for Success.mp4

13.1 MB

2. Standing out from the Crowd.mp4

24.4 MB

3. Getting Ready for the Interview.mp4

19.8 MB

4. What to Expect During the Technical Interview.mp4

17.8 MB

5. Showing your best self during the Interview.mp4

12.4 MB

6. Interview Role Play-Customer Service.mp4

27.5 MB

7. Rob finding a great candidate.mp4

13.7 MB

8. Module Wrap up.mp4

11.6 MB

Crafting Your Resume _ Coursera.pdf

65.4 KB

Creating Your Elevator Pitch _ Coursera.pdf

53.9 KB

/.../6. Course Wrap-up/

1. Course Wrap up.mp4

18.9 MB

2. Sabrina No degree.mp4

12.3 MB

3. Congratulations.mp4

2.3 MB

work.jpg

44.7 KB

/.../1. Introduction to Computer Networking/

Course Introduction - Google.mp4

63.7 MB

/.../2. The TCPIP Five Layer Network Model/

Alex Why Networking.mp4

9.8 MB

OSI model - Wikipedia.html

175.2 KB

The TCP IP Five Layer Network Model.mp4

30.1 MB

/.../3. The Basics of Networking Devices/

1. Cables.mp4

26.6 MB

2. Hubs and Switches.mp4

13.9 MB

3. Routers.mp4

11.9 MB

4. Servers and Clients.mp4

14.3 MB

5. Sergio Being A Network Engineer.mp4

13.6 MB

/.../4. The Physical Layer/

1. Moving Bits Across the Wire.mp4

13.4 MB

2. Twisted Pair Cabling and Duplexing.mp4

8.8 MB

3. Network Ports and Patch Panels.mp4

15.5 MB

Ethernet over twisted pair - Wikipedia.html

120.3 KB

/.../5. The Data Link Layer/

1. Ethernet and MAC Addresses.mp4

42.7 MB

2. Unicast, Multicast, and Broadcast.mp4

9.5 MB

3. Dissecting an Ethernet Frame.mp4

28.7 MB

4. Victor Escobedo Practical Experience in IT.mp4

11.8 MB

/.../2. The Network Layer/1. Introduction/

Introduction to The Network Layer.mp4

8.6 MB

/.../2. The Networking Layer/

1. The Network Layer.mp4

9.1 MB

2. IP Addresses.mp4

15.9 MB

3. IP Datagrams and Encapsulation.mp4

30.3 MB

4. IP Address Classes.mp4

16.1 MB

5. Address Resolution Protocol.mp4

9.8 MB

6. Sergio Path.mp4

14.4 MB

/.../2. The Network Layer/3. Subnetting/

1. Subnetting.mp4

14.4 MB

2. Subnet Masks.mp4

36.1 MB

3. Basic Binary Math.mp4

28.2 MB

4. CIDR.mp4

23.5 MB

/.../2. The Network Layer/4. Routing/

1. Basic Routing Concepts.mp4

33.3 MB

2. Routing Tables.mp4

24.9 MB

3. Interior Gateway Protocols.mp4

28.8 MB

4. Exterior Gateway Protocols.mp4

22.7 MB

5. Non-Routable Address Space.mp4

25.1 MB

6. Alex Good Story.mp4

13.1 MB

April Fools_ Day Request for Comments - Wikipedia.html

118.7 KB

Border Gateway Protocol - Wikipedia.html

150.0 KB

Enhanced Interior Gateway Routing Protocol - Wikipedia.html

93.8 KB

IETF _ Internet Engineering Task Force.html

27.0 KB

Open Shortest Path First - Wikipedia.html

132.7 KB

Routing Information Protocol - Wikipedia.html

94.8 KB

/.../1. Introduction to the Transport and Application Layers/

Introduction to the Transport.mp4

8.6 MB

/.../2. The Transport Layer/

1. The Transport Layer.mp4

25.5 MB

2. Dissection of a TCP Segment.mp4

21.6 MB

3. TCP Control Flags and the Three-way Handshake.mp4

25.7 MB

4. TCP Socket States.mp4

18.4 MB

5. Connection-oriented and Connectionless Protocols.mp4

33.6 MB

6. Firewalls.mp4

10.6 MB

List of TCP and UDP port numbers - Wikipedia.html

1.0 MB

/.../3. The Application Layer/

1. The Application Layer.mp4

18.9 MB

2. The Application Layer and the OSI Model.mp4

11.4 MB

3. All the Layers Working in Unison.mp4

25.8 MB

/.../1. Introduction to Network Services/

Introduction to Network Services.mp4

14.0 MB

/.../2. The Bits and Bytes of Computer Networking/4. Networking Services/2. Name Resolution/

1. Introduction to Network Services.mp4

35.2 MB

2. The Many Steps of Name Resolution.mp4

42.0 MB

3. DNS and UDP.mp4

28.0 MB

4. DNS and UDP.mp4

16.2 MB

/.../3. Name Resolution in Practise/

1. Resource Record Types.mp4

61.8 MB

2. Anatomy of a Domain Name.mp4

20.7 MB

3. DNS Zones.mp4

28.0 MB

/.../4. Dynamic Host Configuration Protocol DHCP/

1. Overview of DHCP.mp4

37.9 MB

2. DHCP in Action.mp4

28.3 MB

/.../5. Network Address Translation/

1. Basics of NAT.mp4

21.3 MB

2. NAT and the Transport Layer.mp4

18.0 MB

3. NAT, Non-Routable Address Space and the Limits of IPv4.mp4

30.8 MB

IPv4 address exhaustion - Wikipedia.html

175.6 KB

/.../6. VPNs and Proxies/

1. Virtual Private Networks.mp4

27.7 MB

2. Proxy Services.mp4

27.8 MB

/.../1. Introduction to Connecting to the Internet/

Introduction to Connecting to the Internet.mp4

11.7 MB

/.../2. POTS and Dial up/

1. Dial-up, Modems and Point-to-Point Protocols.mp4

36.2 MB

/.../5. Connecting to the Internet/3. Broadband Connections/

1. What is broadband.mp4

25.6 MB

2. T Carrier Technologies.mp4

21.6 MB

3. Digital Subscriber Lines.mp4

27.1 MB

4. Cable Broadband.mp4

30.3 MB

5. Fiber Connections.mp4

21.1 MB

Point-to-Point Protocol - Wikipedia.html

91.4 KB

Point-to-Point Protocol over Ethernet - Wikipedia.html

128.8 KB

/.../5. Connecting to the Internet/4. WANs/

1. Wide Area Network Technologies.mp4

20.0 MB

2. Point-to-Point VPNs.mp4

13.8 MB

Asynchronous transfer mode - Wikipedia.html

116.0 KB

Frame Relay - Wikipedia.html

93.9 KB

High-Level Data Link Control - Wikipedia.html

92.5 KB

/.../5. Connecting to the Internet/5. Wireless Networking/

1. Introduction to Wireless Networking Technologies.mp4

36.2 MB

2. Wireless Network Configurations.mp4

15.8 MB

3. Wireless Channels.mp4

27.1 MB

4. Wireless Security.mp4

20.8 MB

5. Cellular Networking.mp4

11.9 MB

IEEE 802.11 - Wikipedia.html

280.7 KB

/.../1. Introduction to Troubleshooting, Future of Networking/

Introduction to Troubleshooting.mp4

21.7 MB

/.../6. Troubleshooting and Future of Networking/2. Verifying Connectivity/

1. Ping Internet Control Message Protocol.mp4

43.0 MB

2. Traceroute.mp4

29.6 MB

3. Testing Port Connectivity.mp4

27.0 MB

netcat - Wikipedia.html

93.7 KB

Test-NetConnection.html

40.0 KB

/.../3. Digging into DNS/

1. Name Resolution Tools.mp4

21.8 MB

2. Public DNS Servers.mp4

42.1 MB

3. DNS Registration and Expiration.mp4

30.7 MB

4. Hosts Files.mp4

42.7 MB

/.../6. Troubleshooting and Future of Networking/4. The Cloud/

1. What is The Cloud.mp4

51.1 MB

2. Everything as a Service.mp4

35.8 MB

3. Cloud Storage.mp4

28.9 MB

/.../6. Troubleshooting and Future of Networking/5. IPv6/

1. IPv6 Addressing and Subnetting.mp4

78.2 MB

2. IPv6 Headers.mp4

18.1 MB

3. IPv6 and IPv4 Harmony.mp4

36.7 MB

4. Interview Role Play Networking.mp4

42.0 MB

6in4 - Wikipedia.html

39.8 KB

Anything In Anything - Wikipedia.html

45.1 KB

Tunnel Setup Protocol - Wikipedia.html

33.0 KB

/.../6. Course Wrap Up/

1. Course Wrap Up.mp4

25.1 MB

2. Alex Career Path.mp4

12.8 MB

3. Congratulations!.mp4

2.4 MB

/.../1. Introduction to Operating Systems & Becoming a Power User/

Course Introduction - Google.mp4

81.9 MB

/.../1. Navigating the System/2. Basic Commands/

1. Lesson Overview _ Practice Tips - Google - Coursera.mp4

18.2 MB

2. List Directories in a GUI - Google - Coursera.mp4

26.2 MB

3. Windows- List Directories in CLI - Google - Coursera.mp4

21.3 MB

4. Linux- List Directories - Google - Coursera.mp4

29.1 MB

5. Windows- Changing Directories in the GUI - Google - Coursera.mp4

5.6 MB

6. Windows- Changing Directories in the CLI - Google - Coursera.mp4

19.0 MB

7. Linux- Changing Directories in Bash - Google - Coursera.mp4

7.6 MB

8. Windows- Make Directories in the GUI _ CLI - Google - Coursera.mp4

10.6 MB

9. Linux- Make Directories in Bash - Google - Coursera.mp4

5.2 MB

10. Windows- Command History - Google - Coursera.mp4

13.0 MB

11. Linux- Command History - Google - Coursera.mp4

2.1 MB

12. Windows- Copying Files _ Directories - Google - Coursera.mp4

19.9 MB

13. Linux- Copying Files and Directories - Google - Coursera.mp4

6.6 MB

14. Windows- Moving and Renaming Files, Directories - Google - Coursera.mp4

8.1 MB

15. Linux- Moving and Renaming Files, Directories - Google - Coursera.mp4

4.0 MB

16. Windows- Removing Files _ Directories - Google - Coursera.mp4

19.7 MB

17. Linux- Removing Files _ Directories - Google - Coursera.mp4

5.4 MB

18. Cindy Why OS is Important - Google - Coursera.mp4

14.8 MB

Bash Reference Manual.html

795.5 KB

PowerShell Scripting _ Microsoft Docs.html

32.0 KB

Windows Confidential _ Microsoft Docs.html

25.6 KB

/.../3. File & Text Manipulation/

1. Windows- Display File Contents - Google - Coursera.mp4

17.5 MB

2. Linux- Display File Contents - Google - Coursera.mp4

12.2 MB

3. Windows- Modifying Text Files - Google - Coursera.mp4

10.8 MB

4. Linux- Modifying Text Files - Google - Coursera.mp4

6.7 MB

5. Windows Powershell - Google - Coursera.mp4

16.9 MB

6. Windows- Searching within Files - Google - Coursera.mp4

28.9 MB

7. Windows- Searching within Directories - Google - Coursera.mp4

4.4 MB

8. Linux- Searching within Files - Google - Coursera.mp4

4.2 MB

9. Windows- Input, Output, and the Pipeline - Google - Coursera.mp4

36.9 MB

10. Linux- Input, Output and Pipeline - Google - Coursera.mp4

18.8 MB

11. Windows and Linux Advanced Navigation - Google - Coursera.mp4

10.6 MB

12. Ben First Tech Job - Google - Coursera.mp4

10.4 MB

A guided tour of Emacs.html

55.2 KB

GNU nano.html

4.2 KB

Microsoft PowerShell Tutorial Microsoft Virtual Academy.html

231.4 KB

Notepad++ Home.html

7.9 KB

PowerShell_README.md at master · PowerShell_PowerShell · GitHub.html

88.6 KB

Vim documentation _ vim online.html

15.1 KB

/.../1. Users and Groups/

1. Users, Administrators, and Groups, Oh My! - Google - Coursera.mp4

19.5 MB

2. Windows- View User and Group Information - Google - Coursera.mp4

14.8 MB

3. Windows- View User and Group Information using CLI - Google - Coursera.mp4

16.0 MB

4. Linux- Users, Superuser and Beyond - Google - Coursera.mp4

23.7 MB

5. Windows- Passwords - Google - Coursera.mp4

27.0 MB

6. Linux- Passwords - Google - Coursera.mp4

6.4 MB

7. Windows- Adding and Removing Users - Google - Coursera.mp4

26.9 MB

8. Linux- Adding and Removing Users - Google - Coursera.mp4

2.2 MB

9. Ben Life as a CIO - Google - Coursera.mp4

11.7 MB

Selecting Secure Passwords _ Microsoft Docs.html

62.2 KB

/.../2. Users and Permissions/2. Permissions/

1. Windows- File Permissions - Google - Coursera.mp4

22.3 MB

2. Linux- File Permissions - Google - Coursera.mp4

6.9 MB

3. Windows- Modifying Permissions - Google - Coursera.mp4

32.5 MB

4. Linux- Modifying Permissions - Google - Coursera.mp4

18.5 MB

5. Windows- Special Permissions - Google - Coursera.mp4

17.8 MB

6. Linux- SetUID, SetGID, Sticky Bit - Google - Coursera.mp4

22.2 MB

Access Control Lists - Windows applications _ Microsoft Docs.html

24.6 KB

File and Folder Permissions _ Microsoft Docs.html

24.4 KB

/.../3. Package and Software Management/

1. Software Distribution.zip

125.6 MB

/.../3. Package and Software Management/2. Package Managers/

1. Windows- Package Manager - Google - Coursera.mp4

28.3 MB

2. Linux- Package Manager Apt - Google - Coursera.mp4

44.8 MB

Chocolatey Gallery _ Packages.html

93.7 KB

NuGet - Wikipedia.html

86.1 KB

Packaging_PPA - Launchpad Help.html

16.5 KB

Supplemental Reading on GIMP _ Coursera.html

439.3 KB

/.../3. Whats happening in the background/

1. Windows- Underneath the Hood - Google - Coursera.mp4

25.4 MB

2. Linux- Underneath the Hood - Google - Coursera.mp4

9.1 MB

Orca.exe - Windows applications _ Microsoft Docs.html

24.0 KB

Process Monitor - Windows Sysinternals.html

26.6 KB

Windows Installer Examples - Windows applications.html

22.9 KB

/.../4. Device Software Management/

1. Windows- Devices and Drivers - Google - Coursera.mp4

16.5 MB

2. Linux- Devices and Drivers - Google - Coursera.mp4

34.1 MB

3. Linux- Operating System Updates - Google - Coursera.mp4

20.4 MB

3. Window- Operating System Updates - Google - Coursera.mp4

21.6 MB

ConfigMgr_ Windows Update Explained.html

112.8 KB

Device file - Wikipedia.html

140.1 KB

Hardware ID - Windows drivers _ Microsoft Docs.html

31.5 KB

How Do I Update Ubuntu Linux Software.html

87.3 KB

Introduction to Plug and Play - Windows drivers _ Microsoft Docs.html

32.0 KB

Linux 101_ Updating Your System _ Linux.com.html

45.9 KB

Linux kernel - Wikipedia.html

754.7 KB

Step 1 The New Device is Identified - Windows drivers.html

31.5 KB

Step 2 A Driver for the Device is Selected - Windows drivers.html

34.7 KB

udev - Wikipedia.html

104.6 KB

Windows Update - Wikipedia.html

148.1 KB

/.../3. Operating Systems and You Becoming a Power User/4. Filesystems/1. Filesystem Types/

1. Module Introduction - Google - Coursera.mp4

4.7 MB

2. Review of Filesystems - Google - Coursera.mp4

12.2 MB

3. Disk Anatomy - Google - Coursera.mp4

14.2 MB

4. Windows- Disk Partitioning & Formatting a Filesystem.mp4

18.2 MB

5. Windows- Mounting and Unmounting a Filesystem - Google - Coursera.mp4

3.8 MB

6. Linux- Disk Partitioning and Formatting a Filesystem - Google - Coursera.mp4

26.0 MB

7. Windows- Swap - Google - Coursera.mp4

15.8 MB

8. Linux- Swap - Google - Coursera.mp4

7.7 MB

9. Windows- Files - Google - Coursera.mp4

24.5 MB

10. Linux- Files - Google - Coursera.mp4

10.5 MB

11. Windows- Disk Usage - Google - Coursera.mp4

16.8 MB

12. Linux- Disk Usage - Google - Coursera.mp4

11.7 MB

13. Windows- Filesystem Repair - Google - Coursera.mp4

24.5 MB

14. Linux- Filesystem Repair - Google - Coursera.mp4

8.2 MB

15. Ben Passion - Google - Coursera.mp4

10.2 MB

16.17.5. Recommended Partitioning Scheme - Red Hat Customer Portal.html

219.3 KB

Creating Symbolic Links - Windows applications _ Microsoft Docs.html

24.8 KB

Default cluster size for NTFS, FAT, and exFAT.html

115.4 KB

Description of the FAT32 File System.html

97.3 KB

Disk Usage - Windows Sysinternals _ Microsoft Docs.html

23.4 KB

DiskPart Command-Line Options _ Microsoft Docs.html

76.9 KB

fsck - Wikipedia.html

56.3 KB

fstab - Wikipedia.html

66.3 KB

Hard Links and Junctions - Windows applications _ Microsoft Docs.html

24.2 KB

How to determine the appropriate page filesize for 64-bit win.html

122.2 KB

How to start Disk Cleanup by using the command line.html

92.1 KB

Master File Table - Windows applications _ Microsoft Docs.html

24.4 KB

Paging - Wikipedia.html

142.4 KB

Why Linux Doesn’t Need Defragmenting.html

132.5 KB

/.../1. Life of a Process/

1. Module Introduction - Google - Coursera.mp4

6.8 MB

2. Programs vs Processes Revisited - Google - Coursera.mp4

15.4 MB

3. Windows- Process Creation and Termination - Google - Coursera.mp4

19.1 MB

4. Linux- Process Creation and Termination - Google - Coursera.mp4

7.3 MB

5. Jess Passions - Google - Coursera.mp4

17.3 MB

taskkill _ Microsoft Docs.html

34.0 KB

/.../3. Operating Systems and You Becoming a Power User/5. Process Management/2. Managing Processes/

1. Windows- Reading Process Information - Google - Coursera.mp4

15.2 MB

2. Linux- Reading Process Information - Google - Coursera.mp4

18.6 MB

3. Windows- Signals - Google - Coursera.mp4

8.4 MB

4. Linux- Signals - Google - Coursera.mp4

5.0 MB

5. Windows- Managing Processes - Google - Coursera.mp4

17.9 MB

6. Linux- Managing Processes - Google - Coursera.mp4

22.7 MB

Get-Process.html

48.6 KB

Process Explorer - Windows Sysinternals _ Microsoft Docs.html

26.9 KB

ps(1) - Linux manual page.html

72.0 KB

signal _ Microsoft Docs.html

38.9 KB

/.../3. Operating Systems and You Becoming a Power User/5. Process Management/3. Process Utilization/

1. Windows- Resource Monitoring - Google - Coursera.mp4

17.8 MB

2. Linux- Resource Monitoring - Google - Coursera.mp4

21.2 MB

Get-Process.html

48.6 KB

Load (computing) - Wikipedia.html

60.0 KB

/.../6. Operating Systems in Practice/1. Remote Access/

1. Introduction - Google - Coursera.mp4

5.5 MB

2. Remote Connection and SSH - Google - Coursera.mp4

37.6 MB

3. Remote Connections on Windows - Google - Coursera.mp4

28.4 MB

4. Remote Connection File Transfer - Google - Coursera.mp4

7.0 MB

5. Remote Connection File Transfer on Windows - Google - Coursera.mp4

19.5 MB

Comparison of SSH clients - Wikipedia.html

134.1 KB

Download PuTTY_ latest release (0.71).html

27.2 KB

Looking Forward_ Microsoft Support for Secure Shell (SSH) _ PowerShell.html

106.8 KB

Net share _ Microsoft Docs.html

26.9 KB

/.../6. Operating Systems in Practice/2. Virtualization/

1. Virtual Machines - Google - Coursera.mp4

13.7 MB

Chapter 1. First Steps.html

127.3 KB

Comparison of platform virtualization software - Wikipedia.html

365.2 KB

Downloads – Oracle VM VirtualBox.html

12.1 KB

/.../6. Operating Systems in Practice/3. Logging/

1. System Monitoring - Google - Coursera.mp4

10.5 MB

2. The Windows Event Viewer - Google - Coursera.mp4

18.4 MB

3. Linux Logs - Google - Coursera.mp4

34.3 MB

4. Working with Logs - Google - Coursera.mp4

28.9 MB

Ubuntu Manpage_ logrotate ‐ rotates, compresses, and mails system logs.html

35.0 KB

/.../4. Operating System Deployment/

1. Imaging Software - Google - Coursera.mp4

6.2 MB

2. Operating Systems Deployment Methods - Google - Coursera.mp4

18.9 MB

Comparison of disk cloning software - Wikipedia.html

82.2 KB

dd(1) - Linux manual page.html

12.4 KB

/.../5. Course Wrap Up/

1. Course Wrap Up - Google - Coursera.mp4

11.5 MB

2. Heather Early Career Advice - Google - Coursera.mp4

13.8 MB

4. Congratulations! - Google - Coursera.mp4

1.2 MB

/.../1. Intro to System Administration IT Infrastructure Services/

Course Introduction.mp4

54.7 MB

/.../2. What is System Administration/

1. What is Systems Administration- - Google - Coursera.mp4

21.5 MB

2. Servers Revisited - Google - Coursera.mp4

33.9 MB

3. The Cloud - Google - Coursera.mp4

34.4 MB

KVM switch - Wikipedia.html

79.0 KB

/.../3. Sytem Administration Tasks/

1. Organizational Policies - Google - Coursera.mp4

23.4 MB

2. IT Infrastructure Services - Google - Coursera.mp4

10.6 MB

3. User and Hardware Provisioning - Google - Coursera.mp4

35.1 MB

4. Routine Maintenance - Google - Coursera.mp4

9.7 MB

5. Vendors - Google - Coursera.mp4

15.1 MB

6. Troubleshooting and Managing Issues - Google - Coursera.mp4

28.8 MB

7. In Case of Fire, Break Glass - Google - Coursera.mp4

11.5 MB

8. Dion Michelle Obama Story - Google - Coursera.mp4

15.1 MB

/.../1. What is System Administration/4. Applying Changes/

1. With Great Power Comes Great Responsibility - Google - Coursera.mp4

33.0 MB

2. Never Test in Production - Google - Coursera.mp4

20.5 MB

3. Assessing Risk - Google - Coursera.mp4

16.8 MB

4. Fixing Things the Right Way - Google - Coursera.mp4

17.8 MB

Recording Your Actions _ Coursera.html

440.6 KB

Start-Transcript.html

38.3 KB

/.../1. Intro to IT Infrastructure Services/

1. What are IT Infrastructure Services.mp4

8.6 MB

2. Role of IT Infrastructure Services in SysAdmin.mp4

9.9 MB

3. Types of IT Infrastructure Services.mp4

45.3 MB

4. How do Qwiklabs Work- - Google - Coursera.mp4

12.5 MB

5. Heather First Tech Job - Google - Coursera.mp4

13.4 MB

Amazon Cloud Directory _ Amazon Web Services (AWS).html

52.0 KB

Azure Active Directory _ Microsoft Azure.html

224.1 KB

Cloud Hosted Directory Services.html

121.7 KB

Network as a service - Wikipedia.html

53.7 KB

News, Tips, and Advice for Technology Professionals.html

451.7 KB

The 24 most popular cloud apps used at work.html

256.3 KB

The Best Cloud Computing Service Reviews of 2019.html

219.3 KB

/.../2. Physical Infrastructure Services/

1. Server Operating Systems - Google - Coursera.mp4

9.2 MB

2. Virtualization - Google - Coursera.mp4

28.3 MB

3. Remote Access Revisited - Google - Coursera.mp4

30.6 MB

About Windows Remote Management.html

29.7 KB

OpenSSH - Wikipedia.html

158.6 KB

PuTTY - Wikipedia.html

99.5 KB

Remote Desktop clients _ Microsoft Docs.html

32.2 KB

Server Operating Systems - PC World Australia.html

94.5 KB

/.../2. Network and Infrastructure Services/3. Network Services/

1. FTP, SFTP, and TFTP - Google - Coursera.mp4

24.7 MB

2. NTP - Google - Coursera.mp4

19.7 MB

3. Network Support Services Revisited - Google - Coursera.mp4

16.8 MB

4. DNS - Google - Coursera.mp4

15.4 MB

5. DNS for Web Servers - Google - Coursera.mp4

10.2 MB

6. DNS for Internal Networks - Google - Coursera.mp4

28.4 MB

7. DHCP - Google - Coursera.mp4

19.3 MB

Comparison of DHCP server software - Wikipedia.html

96.1 KB

Comparison of FTP client software - Wikipedia.html

197.9 KB

Preboot Execution Environment - Wikipedia.html

75.2 KB

The Top DNS Servers And What They Offer - DNSimple Blog.html

18.9 KB

/.../4. Troubleshooting Networking Services/

1. Unable to Resolve Hostname Domain Name.mp4

22.9 MB

/.../5. Managing System Systems/

1. What do Services Look Like in Action - Google - Coursera.mp4

15.9 MB

2. Managing Services in Linux - Google - Coursera.mp4

27.0 MB

3. Managing Services in Windows - Google - Coursera.mp4

12.6 MB

4. Configuring Services in Linux - Google - Coursera.mp4

26.6 MB

5. Configuring Services in Windows - Google - Coursera.mp4

13.9 MB

/.../6. Configuring Network Services/

1. Configuring DNS with Dnsmasq - Google - Coursera.mp4

34.5 MB

2. Configuring DHCP with Dnsmasq - Google - Coursera.mp4

40.9 MB

/.../3. Software and Platform Services/

4. Platform Services.zip

50.5 MB

/.../3. Software and Platform Services/1. Software Services/

1. Module Introduction - Google - Coursera.mp4

14.0 MB

2. Configuring Communication Services - Google - Coursera.mp4

49.0 MB

3. Configuring Email Services - Google - Coursera.mp4

53.3 MB

4. Configuring User Productivity Services - Google - Coursera.mp4

26.2 MB

5. Configuring Security Services - Google - Coursera.mp4

50.2 MB

6. Heather Managing Self Doubt - Google - Coursera.mp4

13.0 MB

jabber.at - Jabber_XMPP Clients.html

32.0 KB

Redbooth101-LetstalkAboutEmail-Redbooth.jpg

41.4 KB

The 12 Best Team Chat Apps for Your Company.html

107.0 KB

Why You May Not Want To Run Your Own Mail Server _ DigitalOcean.html

77.4 KB

/.../3. Software and Platform Services/2. File Services/

1. What are file services- - Google - Coursera.mp4

15.3 MB

2. Network File Storage - Google - Coursera.mp4

46.9 MB

Cloud Storage Comparison 2019_ Compare 50+ Cloud Providers.html

375.6 KB

NFS-Utils-2.3.4.html

27.8 KB

Server Message Block Overview _ Microsoft Docs.html

30.1 KB

/.../3. Software and Platform Services/3. Print Services/

1. Configuring Print Services - Google - Coursera.mp4

32.5 MB

CUPS - Wikipedia.html

142.8 KB

Overview of Print and Document Services _ Microsoft Docs.html

25.1 KB

/.../5. Troubleshooting Platform Services/

1. Is the website down- - Google - Coursera.mp4

30.4 MB

Chrome DevTools Overview - Google Chrome.html

82.7 KB

List of HTTP status codes - Wikipedia.html

183.5 KB

/.../6. Managing Cloud Resources/

1. Cloud Concepts - Google - Coursera.mp4

22.0 MB

2. Typical Cloud Infrastructure Setups - Google - Coursera.mp4

13.7 MB

3. When and How to Choose Cloud - Google - Coursera.mp4

22.0 MB

Managing Cloud Resources _ Coursera.html

440.6 KB

/.../1. Introduction to Directory Services/

1. Module Introduction.mp4

9.3 MB

2. What is a directory server.mp4

40.6 MB

3. Implementing Directory Services.mp4

32.7 MB

/.../4. System Administration and IT Infrastructure Services/4. Directory Services/2. Centralized Management/

Chef Infra _ Chef.html

64.2 KB

Deliver better software, faster _ Puppet.html

218.3 KB

Introduction - Configuration Manager _ Microsoft Docs.html

59.1 KB

Role-based access control - Wikipedia.html

87.7 KB

What is centralized management- - Google - Coursera.mp4

57.0 MB

/.../4. System Administration and IT Infrastructure Services/4. Directory Services/3. LDAP/

1. What is LDAP- - Google - Coursera.mp4

14.8 MB

2. What is LDAP Authentication- - Google - Coursera.mp4

33.8 MB

3. Heather Overcoming Obstacles - Google - Coursera.mp4

10.1 MB

LDAP Data Interchange Format - Wikipedia.html

35.9 KB

What Is Kerberos Authentication__ Logon and Authentication _ Microsoft Docs.html

37.5 KB

/.../4. System Administration and IT Infrastructure Services/4. Directory Services/4. Active Directory/

1. What is Active Directory- - Google - Coursera.mp4

73.0 MB

2. Managing Active Directory - Google - Coursera.mp4

41.9 MB

3. Managing Active Directory Users and Groups - Google - Coursera.mp4

150.0 MB

4. Managing Active Directory User Passwords - Google - Coursera.mp4

62.0 MB

5. Joining an Active Directory Domain - Google - Coursera.mp4

31.2 MB

6. What is Group Policy- - Google - Coursera.mp4

54.4 MB

7. Group Policy Creation and Editing - Google - Coursera.mp4

128.9 MB

8. Group Policy Inheritance and Precedence - Google - Coursera.mp4

79.3 MB

9. Group Policy Troubleshooting - Google - Coursera.mp4

183.9 MB

Check Group Policy Infrastructure Status _ Microsoft Docs.html

35.9 KB

Control the Scope of Group Policy Objects _ Microsoft Docs.html

21.9 KB

Create a WMI Filter _ Microsoft Docs.html

23.2 KB

Features of EFS _ Microsoft Docs.html

27.5 KB

Gpresult _ Microsoft Docs.html

27.2 KB

Group scope_ Active Directory _ Microsoft Docs.html

30.3 KB

How the Windows Time Service Works _ Microsoft Docs.html

61.7 KB

Managing Flexible Single-Master Operations _ Microsoft Docs.html

21.8 KB

Troubleshooting Active Directory—Related DNS Problems _ Microsoft Docs.html

40.4 KB

W32tm _ Microsoft Docs.html

25.3 KB

What Are Security Principals_ _ Microsoft Docs.html

28.5 KB

Windows Server 2016 Functional Levels _ Microsoft Docs.html

47.4 KB

/.../4. System Administration and IT Infrastructure Services/4. Directory Services/5. OpenLDAP/

1. What is OpenLDAP- - Google - Coursera.mp4

31.5 MB

2. Managing OpenLDAP - Google - Coursera.mp4

43.9 MB

How To Install and Configure OpenLDAP phpLDAPadmin.html

90.5 KB

How To Use LDIF Files to Make Changes to an OpenLDAP System _ DigitalOcean.html

94.0 KB

LDAP Data Interchange Format - Wikipedia.html

35.9 KB

OpenLDAP Software 2.4 Administrator_s Guide_ Configuring slapd.html

53.6 KB

/.../1. Planning for Data Recovery/

1. Module Introduction - Google - Coursera.mp4

6.1 MB

2. What is Data Recovery- - Google - Coursera.mp4

28.4 MB

3. Backing Up Your Data - Google - Coursera.mp4

23.9 MB

4. Backup Solutions - Google - Coursera.mp4

29.9 MB

5. Testing Backups - Google - Coursera.mp4

18.6 MB

6. Types of Backup - Google - Coursera.mp4

57.3 MB

7. User Backups - Google - Coursera.mp4

15.2 MB

Back up and restore your PC - Windows Help.html

99.7 KB

Back up your Mac with Time Machine - Apple Support.html

56.1 KB

GitLab.com database incident _ GitLab.html

37.6 KB

rsync - ArchWiki.html

49.2 KB

Standard RAID levels - Wikipedia.html

203.7 KB

/.../2. Disaster Recovery Plans/

1. What_s a Disaster Recovery Plan- - Google - Coursera.mp4

47.0 MB

2. Designing a Disaster Recovery Plan - Google - Coursera.mp4

63.5 MB

/.../5. Data Recovery & Backups/3. Post-Mortems/

1. What_s a post-mortem- - Google - Coursera.mp4

27.2 MB

2. Writing a Post-Mortem - Google - Coursera.mp4

32.6 MB

3. Interview Role Play- Sys Admin - Google - Coursera.mp4

26.2 MB

/.../4. System Administration and IT Infrastructure Services/6. Final Project/1. Final Project/

1. Final Project Introduction - Google - Coursera.mp4

24.4 MB

2. Alex passion _ success - Google - Coursera.mp4

9.9 MB

/.../2. Course Wrap Up/

Congratulations! - Google - Coursera.mp4

2.1 MB

/.../1. Understanding Security Threats/

2. Malicious Software.zip

100.5 MB

/.../1. Introduction to IT Security/

Course Introduction - Google - Coursera.mp4

74.5 MB

/.../1. Understanding Security Threats/3. Network Attacks/

1. Network Attacks - Google - Coursera.mp4

27.9 MB

2. Denial-of-Service - Google - Coursera.mp4

22.7 MB

Dyn Analysis Summary Of Friday October 21 Attack _ Dyn Blog.html

85.4 KB

Major DNS Cache Poisoning Attack Hits Brazilian ISPs _ Threatpost.html

73.6 KB

/.../1. Understanding Security Threats/4. Other Attacks/

1. Client-Side Attacks - Google - Coursera.mp4

14.7 MB

2. Password Attacks - Google - Coursera.mp4

26.0 MB

3. Deceptive Attacks - Google - Coursera.mp4

44.2 MB

/.../5. IT Security Defense against the digital dark arts/2. Pelcgbybtl (Cryptology)/

3. Hashing.zip

105.4 MB

/.../5. IT Security Defense against the digital dark arts/2. Pelcgbybtl (Cryptology)/1. Symmetric Encryption/

1. Cryptography - Google - Coursera.mp4

56.7 MB

2. Symmetric Cryptography - Google - Coursera.mp4

37.2 MB

3. Symmetric Encryption Algorithms - Google - Coursera.mp4

74.3 MB

4. Rob What a Security Engineer Does - Google - Coursera.mp4

15.2 MB

Integer factorization - Wikipedia.html

134.8 KB

RC4 NOMORE.html

23.3 KB

Supplemental Reading for The Future of Cryptanalysis _ Coursera.html

440.0 KB

Supplemental Reading for The Future of Cryptanalysis _ Coursera.PNG

80.0 KB

/.../2. Public Key or Asymmetric Encryption/

1. Asymmetric Cryptography - Google - Coursera.mp4

59.5 MB

Asymmetric Encryption Algorithms - Google - Coursera.mp4

41.5 MB

PlayStation 3 hack - how it happened and what it means.html

1.1 MB

Sony PS3 hacked “for good” master keys.html

175.5 KB

Supplemental reading for asymmetric encryption attack.PNG

76.9 KB

/.../5. IT Security Defense against the digital dark arts/2. Pelcgbybtl (Cryptology)/4. Cryptography Applications/

1. Public Key Infrastructure - Google - Coursera.mp4

58.5 MB

2. Cryptography in Action - Google - Coursera.mp4

55.7 MB

3. Securing Network Traffic - Google - Coursera.mp4

39.9 MB

4. Cryptographic Hardware - Google - Coursera.mp4

53.7 MB

Open Source Community _ OpenVPN.html

49.5 KB

RFC 3193 - Securing L2TP using IPsec.html

87.3 KB

rfc5280.txt

352.6 KB

Supplemental reading for securing traffic network.PNG

63.2 KB

Supplemental reading for TPM Attacks.PNG

49.7 KB

Supplemental reading for X.509 Standard.PNG

44.3 KB

WhyIWrotePGP.html

13.3 KB

/.../3. The 3 A's of Cybersecurity - Authentication, Authorization, Accounting/1. Authentication/

1. Authentication Best Practices - Google - Coursera.mp4

48.6 MB

2. Multifactor Authentication - Google - Coursera.mp4

104.5 MB

3. Certificates - Google - Coursera.mp4

37.3 MB

4. LDAP - Google - Coursera.mp4

29.6 MB

5. RADIUS - Google - Coursera.mp4

13.7 MB

6. Kerberos - Google - Coursera.mp4

58.0 MB

7. TACACS+ - Google - Coursera.mp4

11.9 MB

8. Single Sign-On - Google - Coursera.mp4

26.0 MB

9. Rob Path to IT - Google - Coursera.mp4

16.7 MB

Indian pupils cheat biometric system with glue _ Planet Biometrics News.html

29.3 KB

/.../3. The 3 A's of Cybersecurity - Authentication, Authorization, Accounting/2. Authorization/

1. Authorization and Access Control Methods - Google - Coursera.mp4

10.8 MB

2. Access Control - Google - Coursera.mp4

42.1 MB

3. Access Control List - Google - Coursera.mp4

9.9 MB

Supplemental reading for Authorization.PNG

43.4 KB

/.../3. The 3 A's of Cybersecurity - Authentication, Authorization, Accounting/3. Accounting/

1. Tracking Usage and Access - Google - Coursera.mp4

22.0 MB

2. Rob Important Skills in Security - Google - Coursera.mp4

17.9 MB

/.../4. Securing Your Networks/

1. Secure Network Architecture.zip

141.6 MB

3. Network Monitoring.zip

102.5 MB

/.../4. Securing Your Networks/2. Wireless Security/

1. WEP Encryption and Why You Shouldn_t Use It - Google - Coursera.mp4

47.3 MB

2. Let_s Get Rid of WEP! WPA_WPA2 - Google - Coursera.mp4

87.4 MB

3. Wireless Hardening - Google - Coursera.mp4

16.4 MB

4. Heather Social Engineering - Google - Coursera.mp4

10.5 MB

Supplemental reading for WEP Encryption and why you shouldn_t use it.PNG

45.0 KB

VU#723755 - WiFi Protected Setup (WPS) PIN brute force vulnerability.html

43.7 KB

Weaknesses in the Key Scheduling Algorithm of RC4 _ SpringerLink.html

55.8 KB

/.../5. Defense in Depth/

1. System Hardening.zip

238.1 MB

/.../5. Defense in Depth/2. Application Hardening/

1. Software Patch Management - Google - Coursera.mp4

54.4 MB

2. Application Policies - Google - Coursera.mp4

28.6 MB

/.../3. Case study the security model of chrome OS/

1. The Security Principles of Chrome OS.mp4

16.2 MB

2. Chrome OS Verified Boot - Google - Coursera.mp4

10.2 MB

3. Chrome OS Data Encryption - Google - Coursera.mp4

14.4 MB

/.../1. Risk in the Workplace/

1. Security Goals - Google - Coursera.mp4

80.0 MB

2. Measuring and Assessing Risk - Google - Coursera.mp4

53.3 MB

3. Privacy Policy - Google - Coursera.mp4

35.3 MB

Nessus Professional™ Vulnerability Scanner.html

225.4 KB

OpenVAS - OpenVAS - Open Vulnerability Assessment System.html

12.5 KB

Qualys Community Edition _ Qualys, Inc..html

96.5 KB

Supplemental reading for risk in the workplace.PNG

32.6 KB

/.../6. Creating a Company Culture for Security/2. Users/

1. User Habits - Google - Coursera.mp4

59.4 MB

2. Third-Party Security - Google - Coursera.mp4

41.7 MB

3. Security Training - Google - Coursera.mp4

35.7 MB

4. Alex Grit Story - Google - Coursera.mp4

14.9 MB

Phishing prevention with Password Alert FAQ - G Suite Admin Help.html

427.2 KB

VSAQ - Security Assessment Questionnaires.html

3.1 KB

/.../6. Creating a Company Culture for Security/3. Incident Handling/

1. Incident Reporting and Analysis - Google - Coursera.mp4

63.8 MB

2. Incident Response and Recovery - Google - Coursera.mp4

64.5 MB

3. Interview Role Play- Security - Google - Coursera.mp4

37.6 MB

4. Amir Interview - Google - Coursera.mp4

13.7 MB

5. Ari Interview - Google - Coursera.mp4

13.0 MB

/.../4. Course Wrap up/

Congratulations! - Google - Coursera.mp4

9.3 MB

/.../Supplemental Reading - Courses HTML Files/

2. Supplemental Reading.zip

629.3 KB

3. Supplemental Reading.zip

1.2 MB

4. Supplemental reading.zip

1.2 MB

5. Supplemental reading.zip

1.2 MB

/.../Behavioral Interview Prep/

01. Introduction.mp4

115.6 MB

02. What Are Behavioral Interviews.mp4

408.0 MB

03. General Tips.mp4

571.0 MB

04. Low Performer.mp4

240.2 MB

05. Team Conflict.mp4

254.6 MB

06. Interest In Company.mp4

130.0 MB

07. Strong Disagreement.mp4

240.2 MB

08. Sudden Onboarding.mp4

223.0 MB

09. Work Distribution.mp4

231.6 MB

10. Past Mistake.mp4

250.6 MB

11. Challenging Project.mp4

258.0 MB

12. Production Outage.mp4

292.0 MB

13. Tough Feedback.mp4

196.0 MB

14. Strengths And Improvements.mp4

151.5 MB

15. Comfort Zone.mp4

184.8 MB

/.../Writing a Tech Resume/0. Introduction/

0.1 Why do you need a resume.mp4

40.8 MB

/.../1. Logistics of a Technical Resume/

1.1 How hiring managers read your resume.mp4

21.7 MB

1.2 Resume length.mp4

10.8 MB

1.3 The difference between a resume and a CV.mp4

7.4 MB

/.../Writing a Tech Resume/2. Resume Content/

2.1 Contact information.mp4

16.5 MB

2.2 Education.mp4

18.7 MB

2.3 Work experience.mp4

13.6 MB

2.4 Relevant skills.mp4

15.6 MB

2.5 Awards and certifications.mp4

12.9 MB

/.../3. Content Tips and Tricks/

3.1 The importance of word choice.mp4

15.7 MB

3.2 State your impact.mp4

13.0 MB

/.../4. Tools for Creating a Resume/

4.1 Word processors.mp4

20.8 MB

4.2 Resume builders.mp4

12.6 MB

4.3 Visual design tools.mp4

8.3 MB

/.../5. Design Dos and Don'ts/

5.1 Typography.mp4

21.4 MB

5.2 Color.mp4

14.5 MB

5.3 Layout.mp4

9.2 MB

5.4 File format.mp4

10.4 MB

/.../6. Should You Include/

6.1 Summary or objective.mp4

7.8 MB

6.2 Extracurricular activities or hobbies.mp4

11.4 MB

6.3 References.mp4

13.9 MB

6.4 Photo.mp4

7.4 MB

6.5 Graduation year.mp4

4.9 MB

/.../7. Having a Professinoal Online Presence/

7.1 LinkedIn.mp4

15.4 MB

7.2 GitHub.mp4

7.3 MB

7.3 Personal portfolio or website.mp4

10.4 MB

/.../Writing a Tech Resume/8. Conclusion/

8.1 Next steps with your resume.mp4

6.7 MB

/.../Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/1. Course Overview/

1.1 Course Overview.mp4

3.9 MB

/.../2. The Traits and Fucntions of Workplace Writing/

2.1 General Introduction and Course Objectives.mp4

12.9 MB

2.2 Professional Writing Trait One_ Clarity.mp4

5.4 MB

2.3 Professional Writing Trait Two_ Correctness.mp4

10.1 MB

2.4 Professional Writing Trait Three_ Conciseness.mp4

11.8 MB

2.5 Professional Writing Trait Four_ Comprehensiveness.mp4

4.6 MB

2.6 Professional Writing Trait Five_ Accessibility.mp4

4.3 MB

2.7 Professional Writing Trait Six_ Appearance.mp4

5.8 MB

2.8 Professional Writing Trait Seven_ Accuracy.mp4

5.2 MB

2.9 Professional Writing Trait Eight_ Honesty.mp4

11.3 MB

2.10 Professional Writing Trait Nine_ The Writing Situation.mp4

22.0 MB

2.11 Module Review.mp4

4.5 MB

/.../3. Interacting via Email/

3.1 Email's Role in the Workplace.mp4

6.4 MB

3.2 The Structure and Features of Email.mp4

13.0 MB

3.3 Top Ten Tips of Email Etiquette.mp4

16.5 MB

3.4 Most Important Concepts About Email.mp4

2.6 MB

/.../4. Developing Routine and Sensitive Memos/

4.1 The Role and Form of Memos.mp4

9.1 MB

4.2 Developing Routine Memos.mp4

17.1 MB

4.3 Developing Sensitive Memos.mp4

25.3 MB

4.4 Most Important Concepts About Memos.mp4

2.6 MB

/.../5. Understanding Informal Reports/

5.1 Indroducing Informal Reports.mp4

5.9 MB

5.2 What All Informal Reports Have in Common.mp4

4.8 MB

5.3 Most Important Concepts About Informal Reports.mp4

2.8 MB

/.../6. Field and Trip Reports/

6.1 Introduction to Trip Reports.mp4

3.9 MB

6.2 Different Types of Trip Reports.mp4

5.4 MB

6.3 Developing a Trip or Field Report.mp4

3.2 MB

6.4 Analyzing a Sample Trip Report.mp4

12.9 MB

6.5 The Most Important Trip Report Concepts.mp4

2.7 MB

/.../7. Incident Reports_ Documenting When Something Goes Wrong/

7.1 Introduction to Incident Reports.mp4

6.6 MB

7.2 Examples of Incident Types.mp4

19.9 MB

7.3 Developing an Incident Report.mp4

11.8 MB

7.4 Analyzing a Sample Incident Report.mp4

10.0 MB

7.5 The Ethics of Incident Reports.mp4

7.1 MB

7.6 The Most Important Concepts About Incident Reports.mp4

2.8 MB

/.../8. Test Reports_ Presenting Experiments and Diagnostics/

8.1 Introduction to Test Reports.mp4

11.1 MB

8.2 Developing a Test Report.mp4

7.2 MB

8.3 Analyzing a Sample Test Report.mp4

11.7 MB

8.4 Most Important Concepts About Test Reports.mp4

1.8 MB

/.../9. Investigative Reports_ Communicating Different Options/

9.1 Introduction to Investigative Reports.mp4

5.3 MB

9.2 Developing an Investigative Report.mp4

5.0 MB

9.3 Analyzing a Sample Investigative Report.mp4

15.8 MB

9.4 Most Important Concepts About Investigative Reports.mp4

3.7 MB

/.../10. Progress Reports_ Keeping Supervisors Informed About a Project/

10.1 Introduction to Progress Reports.mp4

6.2 MB

10.2 Developing a Progress Report.mp4

17.8 MB

10.3 Analyzing a Sample Progess Report.mp4

22.0 MB

10.4 Most Important Concepts About Progress Reports.mp4

3.5 MB

/.../11. Meeting Minutes/

11.1 Introduction to Meeting Minutes.mp4

7.1 MB

11.2 Developing Meeting Minutes.mp4

7.0 MB

11.3 Analyzing Sample Meeting Minutes.mp4

17.3 MB

11.4 Most Important Concepts About Meeting Minutes.mp4

3.0 MB

/.../12. Internal Social Media Platforms_ Using Office Instant Messaging/

12.1 Defining Traits of Office Social Messaging.mp4

8.6 MB

12.2 Using Office Social Messaging Well.mp4

6.2 MB

12.3 Most Important Concepts About Social Messaging.mp4

2.2 MB

/.../13. Your Main Takeaways_ Conclusion and Additional Resources/

13.1 The Most Important Concepts from the Entire Course.mp4

9.3 MB

13.2 Where to Go for Additional Resources.mp4

5.9 MB

/.../1. Mapping to ATT&CK from Narrative Reports/

1.1 Introduction- Challenges, Advantages and the Process of Mapping to ATT&CK.mp4

81.5 MB

1.2 Finding and Researching the Behavior.mp4

46.8 MB

1.3 Translating the Behavior into a Tactic.mp4

69.2 MB

1.4 Identifying Techniques or Sub-Techniques.mp4

71.6 MB

1.5 Mapping to a Narrative Point .mp4

63.9 MB

1.6 Hedging Your Biases.mp4

54.3 MB

/.../2. Mapping to ATT&CK from Raw Data/

2.1 The Process of Mapping from Raw Data.mp4

35.1 MB

2.2 Identify and Research Behaviors.mp4

27.2 MB

2.3 Translate Behaviors to Tactics, Techniques and Sub-Techniques.mp4

24.3 MB

2.4 Raw Data to Narrative Reporting MITRE ATT&CK Defender.mp4

49.7 MB

/.../3. Storing and Analyzing ATT&CK-Mapped Data/

3.1 Storing and Displaing ATT&CK-Mapped Data.mp4

16.8 MB

3.2 Expressing and Storing ATT&CK-Mapped Data.mp4

23.3 MB

3.3 Analyzing ATT&CK-Mapped Data.mp4

31.7 MB

3.4 Exercise 3- Comparing Layers in ATT&CK Navigator.mp4

10.6 MB

/.../4. Defensive Recs from ATT&CK-Mapped Data/

4.1 The Defensive Recommendations Process.mp4

27.3 MB

4.2 How Techniques and Sub-Techniques are Being Used.mp4

50.7 MB

4.3 Researching Organizational Capabilities and Constraints and Determine Trade-Offs.mp4

57.4 MB

4.4 Make Defensive Recommendations.mp4

72.4 MB

/.../4. Making Defensive Recommendations from ATT&CK-Mapped Data/

4.1 The Defensive Recommendations Process.mp4

27.3 MB

4.2 How Techniques and Sub-Techniques are Being Used.mp4

50.7 MB

4.3 Researching Organizational Capabilities and Constraints and Determine Trade-Offs.mp4

57.4 MB

4.4 Make Defensive Recommendations.mp4

72.4 MB

/.../1. Understanding ATT&CK/

1.1 Introduction to ATT&CK.mp4

26.3 MB

1.2 Matricies-Platforms.mp4

17.3 MB

1.3 Tactics.mp4

10.5 MB

1.4 Techniques and Sub-Techniques.mp4

20.0 MB

1.5 Mitigations.mp4

11.5 MB

1.6 Data Sources and Detections.mp4

10.0 MB

1.7 Groups and Software.mp4

18.7 MB

1.8 How ATT&CK Grows and Evolves.mp4

21.9 MB

/.../2. Benefits of Using ATT&CK/

2.1 Community Perspective.mp4

18.7 MB

2.2 Common Language.mp4

12.7 MB

2.3 Quantitative Scorecard.mp4

12.2 MB

2.4 Attack Navigator.mp4

21.8 MB

/.../3. Operationalizing ATT&CK/

3.1 Cyber Threat Intelligence.mp4

15.0 MB

3.2 Detection and Analysis.mp4

17.0 MB

3.3 Threat Emulation.mp4

18.5 MB

3.4 Assessment and Engineering.mp4

16.5 MB

3.5 Putting it all Together into Threat-Informed Defense.mp4

13.4 MB

3.6 Course Summary.mp4

3.7 MB

/.../1. Overview of ATT&CK-Based SOC Assessments/

1.1 Introduction- Bringing ATT&CK into the SOC.mp4

48.9 MB

1.2 A Methodology for Assessments.mp4

43.1 MB

1.3 Framing an Assessment.mp4

49.3 MB

1.4 Scoping an Assessment.mp4

33.0 MB

/.../2. Analyzing SOC Components with ATT&CK/

2.1 Setting a Coverage Rubric.mp4

61.3 MB

2.2 Working with Data Sources Part 1.mp4

54.6 MB

2.3 Working with Data Sources Part 2.mp4

36.8 MB

2.4 Analyzing Analytics.mp4

70.7 MB

2.5 Breaking Down Tools.mp4

65.4 MB

/.../3. Synthesizing SOC Assessments/

3.1 Interviewing Staff.mp4

78.4 MB

3.2 Communicating with ATT&CK.mp4

100.3 MB

3.3 Compiling a Final Heatmap Part 1.mp4

73.2 MB

3.4 Compiling a Final Heatmap Part 2.mp4

45.8 MB

3.5 Proposing Recommendations Part 1.mp4

71.1 MB

3.6 Proposing Recommendations Part 2.mp4

70.6 MB

/.../01 Course Overview/

01 Course Overview.mp4

4.8 MB

/.../02 Address Resolution Protocol Fundamentals/

01 Fundamentals of ARP.mp4

35.3 MB

02 Fundamentals of ARP Demo Introduction.mp4

1.9 MB

03 Demo - Windows and ARP.mp4

47.3 MB

04 Demo - ARP Wireshark Captures.mp4

23.4 MB

05 Demo - Ubuntu Linux and ARP.mp4

17.6 MB

06 Demo - Cisco Router ARP Basics .mp4

54.2 MB

/.../03 Understanding InARP, GARP, RARP, and Proxy ARP/

01 Intro.mp4

9.9 MB

02 InARP and RARP.mp4

1.8 MB

03 Demo - InARP .mp4

41.3 MB

04 Gratuitous ARP.mp4

13.9 MB

05 Demo - Gratuitous ARP .mp4

16.3 MB

06 HSRP Failover.mp4

26.5 MB

07 ARP Duplicate IP Detection.mp4

7.4 MB

08 Demo - Duplicate IP Detection .mp4

38.0 MB

09 Proxy ARP.mp4

19.6 MB

10 Demo - Proxy ARP .mp4

67.5 MB

/.../04 Troubleshooting Common ARP Issues/

01 Intro.mp4

2.3 MB

02 Connectivity Losses to Hosts and Default Gateway.mp4

44.9 MB

03 Stale ARP Cache Problems.mp4

9.1 MB

04 Demo - Stale ARP Cache Problems.mp4

43.9 MB

05 Static ARP Problems.mp4

10.0 MB

06 Demo - Static ARP Problems .mp4

46.8 MB

07 Proxy ARP Problems.mp4

26.8 MB

08 Demo - Proxy ARP Overhead .mp4

24.4 MB

09 Demo - Proxy ARP Unavailable .mp4

34.7 MB

10 Demo - Proxy ARP Blackhole .mp4

29.7 MB

11 Demo - Finding Computers in a Complex LAN .mp4

25.0 MB

/.../05 Addressing ARP-related Security Risks/

01 ARP and Security Intro.mp4

1.7 MB

02 Broadcast Storms, Denial Of Service (DoS), and Storm Control.mp4

16.5 MB

03 Demo - Broadcast Storm Control .mp4

34.3 MB

04 CAM Table Flood with Port Security.mp4

10.5 MB

05 Demo - CAM Table Flood with Port Security .mp4

128.7 MB

06 ARP Poisoning, Blackhole, Spoofing, MITM.mp4

30.2 MB

07 Demo - ARP Poisoning and Man in the Middle .mp4

12.8 MB

08 ARP Security Through Dynamic ARP Inspection.mp4

44.7 MB

/.../ARP - Deep Dive/Exercise files/02/

address-resolution-protocol-fundamentals-slides.pdf

1.5 MB

/.../ARP - Deep Dive/Exercise files/03/

understanding-inarp-garp-rarp-and-proxy-arp-slides.pdf

2.3 MB

/.../ARP - Deep Dive/Exercise files/04/

troubleshooting-common-arp-issues-slides.pdf

2.6 MB

/.../ARP - Deep Dive/Exercise files/05/

addressing-arp-related-security-risks-slides.pdf

2.7 MB

/.../01. Course Overview/

01_01-Course Overview.mp4

4.6 MB

/.../02. Course Overview and DHCPv4/

02_01-Course Overview.mp4

6.3 MB

02_02-DHCPv4 Indepth.mp4

9.1 MB

02_03-DHCP Address Assignment.mp4

9.4 MB

02_04-DHCP Lease Time Events.mp4

8.2 MB

02_05-DHCPv4 Options Processing.mp4

6.5 MB

02_06-Examining the DHCPv4 Packet Flow.mp4

20.9 MB

02_07-Configuring DHCPv4 on Cisco.mp4

53.9 MB

02_08-Configuring DHCPv4 on Windows.mp4

19.7 MB

/.../03. Understanding DHCPv6/

03_01-Overview of DHCPv6.mp4

10.0 MB

03_02-Compare and Contrast DHCPv4 and DHCPv6.mp4

7.7 MB

03_03-Understanding Stateless and Stateful DHCPv6.mp4

8.9 MB

03_04-Examining DHCPv6 Packet Captures.mp4

22.9 MB

03_05-Configuring DHCPv6 on Windows.mp4

7.1 MB

03_06-Configuring DHCPv6 on Cisco.mp4

21.2 MB

/.../04. Troubleshooting DHCP/

04_01-Overview of DHCP Troubleshooting.mp4

7.9 MB

04_02-Troubleshooting DHCP Configuration Issues.mp4

34.3 MB

04_03-Troubleshooting DHCP Networking Issues.mp4

34.0 MB

/.../DHCP - Deep Dive/Exercise files/

protocoldeepdivedhcp.zip

675.3 KB

/.../01. Course Overview/

01. Course Overview.mp4

3.8 MB

/.../02. Exploring DNS Terminology and Use Cases/

02. Describe the Purpose of DNS.mp4

6.8 MB

03. Demo-Simple Client Query.mp4

29.8 MB

04. Understanding DNS Terminology.mp4

13.1 MB

05. Capturing DNS Recursion.mp4

40.5 MB

/.../03. Configuring DNS for Clients/

06. Examine How Clients Obtain DNS.mp4

3.8 MB

07. Demo-DNS in DHCP.mp4

8.1 MB

08. Understanding DNS Cache.mp4

2.4 MB

09. Demo-Clearing Cache on Client and Server.mp4

50.5 MB

10. Comparing DNS Privacy Methods.mp4

5.5 MB

11. Demo-Implementing DNS over TLS (DoT).mp4

24.3 MB

/.../04. Modifying DNS Configuration for Servers/

12. Configuring DNS Zones.mp4

9.2 MB

13. Demo-Creating Zones.mp4

49.2 MB

14. Configuring Record Types.mp4

18.9 MB

15. Demo-Adding Records and Confirming Zone Transfer.mp4

38.0 MB

16. Adding Subdomains including Demo.mp4

14.6 MB

/.../05. Troubleshooting DNS/

17. Isolating Cause of DNS Outages.mp4

3.2 MB

18. Demo-Isolating Cause of Inability to Browse Internet.mp4

15.5 MB

19. Demo-Isolating Cause of Inability to Access Local Resources Too.mp4

42.6 MB

20. Demo-Isolating Cause of Inability to Access Local or Remote Resources.mp4

8.7 MB

21. Identifying Single Points of Failure .mp4

6.5 MB

22. Demo-Troubleshooting Silence.mp4

19.2 MB

23. Demo-Troubleshooting Error Responses.mp4

37.0 MB

24. Demo-Troubleshooting Slow Responses.mp4

73.6 MB

/.../06. Securing DNS/

25. Preventing Common DNS Attacks.mp4

6.6 MB

26. Demo-Filtering at the Server with Microsoft DNS Policy.mp4

13.9 MB

/.../DNS - Deep Dive/Exercise Files/02/

Betty-DNS.zip

65.1 KB

businesswire-news-home-20201123006264-en-Internet-Grows-to-370-7-Million-Domain-Name-Registrations-at-th~0.pdf

4.2 MB

domain-name-report-Q32020.pdf

1.4 MB

exploring-dns-terminology-and-use-cases-slides.pdf

1.4 MB

Mod2-AtClient-Recursive.pcapng.gz

996.8 KB

Mod2-AtClient-SimpleQuery.pcapng.gz

684.8 KB

Mod2-AtNSPrimary-Recursive.pcapng.gz

323.8 KB

/.../DNS - Deep Dive/Exercise Files/03/

configuring-dns-for-clients-slides.pdf

901.6 KB

Mod3-AtClient-Cache.pcapng.gz

6.0 MB

Mod3-AtClient-DHCP.pcapng.gz

1.1 KB

Mod3-AtGabriela-DoHConfig.pcapng.gz

9.8 MB

Mod3-AtNSPrimary-Cache.pcapng.gz

5.8 MB

/.../DNS - Deep Dive/Exercise Files/04/

Mod4-AtNSPrimary-AddRecords.pcapng.gz

6.9 MB

Mod4-AtNSPrimary-AddSubdomain.pcapng.gz

4.6 KB

Mod4-AtPrimary-Add-Zones.pcapng.gz

9.8 KB

modifying-dns-configuration-for-servers-slides.pdf

1.5 MB

/.../DNS - Deep Dive/Exercise Files/05/

Mod5-AtGabriela-NoOutsideDNS.pcapng.gz

3.0 MB

Mod5-AtGabriela-PrimaryDownThenSecondaryDown.pcapng.gz

42.7 MB

Mod5-AtJayden-PrimaryDownthenSecondaryDown10000.pcapng.gz

4.6 MB

Peter Drucker Quote-two-most-important-quotes-business-2020-12-12-17_34_30.pdf

2.6 MB

troubleshooting-dns-slides.pdf

444.1 KB

/.../Troubleshooting_Slow_Demo/

Mod5-AtNSbind-chi-Slow.pcap.gz

281.3 KB

Mod5-AtNSPrimary-Slow.pcapng.gz

65.2 KB

Mod5-AtNSSecondary-Slow.pcapng.gz

54.5 KB

Mod5-AtNSStub-Slow.pcapng.gz

94.1 KB

/.../DNS - Deep Dive/Exercise Files/06/

Mod6-AtNSPrimary-DNS-PolicyTest.pcapng.pcapng.gz

6.7 KB

securing-dns-slides.pdf

331.8 KB

/.../EIGRP - Deep Dive/

protocol-deep-dive-eigrp.zip

26.0 MB

/.../01 - Course Overview/

01 - Course Overview.mp4

2.6 MB

/.../02 - Covering EIGRP Essentials/

02 - Course and Module Introduction.mp4

3.4 MB

03 - EIGRP vs. Other Routing Protocols.mp4

33.8 MB

04 - EIGRP Routing Concepts.mp4

45.2 MB

05 - Summary.mp4

683.5 KB

/.../03 - Digging into EIGRP Relationships/

06 - Module Introduction.mp4

1.0 MB

07 - Forming a Neighborship.mp4

72.8 MB

08 - EIGRP Timers.mp4

31.1 MB

09 - Introduction to the EIGRP Packet.mp4

6.0 MB

10 - Summary.mp4

846.3 KB

/.../04 - Determining How Information Is Exchanged with EIGRP/

11 - Module Introduction.mp4

1.2 MB

12 - EIGRP Route States, Split Horizon, and Poison Reverse.mp4

3.3 MB

13 - EIGRP Message-Packet Types.mp4

14.1 MB

14 - Common EIGRP TLVs.mp4

4.3 MB

15 - Summary.mp4

855.8 KB

/.../05 - Showing How Information Is Exchanged with EIGRP/

16 - Module Introduction.mp4

1.1 MB

17 - Neighbor Establishment - Demo.mp4

42.1 MB

18 - Network Changes - Demo.mp4

113.2 MB

19 - External Routes - Demo.mp4

39.9 MB

20 - Authentication - Demo.mp4

33.2 MB

21 - Summary.mp4

874.8 KB

/.../06 - Covering EIGRP Advanced Topics/

22 - Module Introduction.mp4

1.1 MB

23 - EIGRP Summary Routing, Pt 1.mp4

35.0 MB

24 - EIGRP Summary Routing, Pt 2.mp4

41.7 MB

25 - Controlling Query Behavior.mp4

32.1 MB

26 - Significance of EIGRP Router-IDs, Pt 1.mp4

27.5 MB

27 - Significance of EIGRP Router-IDs, Pt 2.mp4

42.6 MB

28 - Summary.mp4

846.5 KB

/.../07 - Reviewing EIGRP Load-balancing/

29 - Module Introduction.mp4

940.3 KB

30 - EIGRP Load-balancing Basics.mp4

5.7 MB

31 - Implementing EIGRP Load-balancing.mp4

47.9 MB

32 - Summary.mp4

700.3 KB

/.../01 - Course Overview/

01 - Course Overview.mp4

3.5 MB

/.../02 - Starting at the Beginning - FTP Active Mode/

02 - The Globomantics Network.mp4

2.9 MB

03 - Moving Files with Active FTP.mp4

5.6 MB

04 - Demo - Active FTP File Download.mp4

13.7 MB

05 - Detour - Using Wireshark.mp4

2.8 MB

06 - Analysis - Active FTP Control Session Setup.mp4

14.5 MB

07 - Analysis - Active FTP Data Transport.mp4

9.9 MB

08 - Demo - Active FTP File Upload.mp4

5.5 MB

09 - Analysis - Active FTP File Upload.mp4

3.6 MB

10 - Designing an Active FTP Security Policy.mp4

1.8 MB

11 - Demo - Verifying Our Active FTP Security Policy.mp4

6.6 MB

12 - Module Summary.mp4

590.0 KB

/.../03 - Simplifying Operations with FTP Passive Mode/

13 - Why Do We Need Another FTP Method.mp4

3.6 MB

14 - Passive FTP Communications.mp4

4.3 MB

15 - Demo - Downloading Files with Passive FTP.mp4

4.4 MB

16 - Analysis - The PASV Exchange and Passive FTP Downloads.mp4

6.2 MB

17 - Demo - Uploading Files with Passive FTP.mp4

3.7 MB

18 - Analysis - Passive FTP Uploads.mp4

2.4 MB

19 - Demo - Reconfiguring the Firewall for Passive FTP.mp4

11.5 MB

20 - Comparing Active and Passive FTP Designs.mp4

2.2 MB

/.../04 - Protecting Data with FTP Secure (FTPS)/

21 - FTPS Problem Statement and Basic Operations.mp4

4.6 MB

22 - World___s Fastest Explanation of Public Key Infrastructure (PKI).mp4

3.5 MB

23 - Demo - FTPS File Downloads in Action.mp4

12.9 MB

24 - Analysis - FTPS Session Initialization and Download Packets.mp4

10.7 MB

25 - Demo - FTPS File Uploads in Action.mp4

5.2 MB

26 - Analysis - FTPS Upload Packets.mp4

4.6 MB

27 - No Need for FTPS Firewall Changes.mp4

1.8 MB

28 - Comparing FTPS to Unsecure FTP.mp4

2.3 MB

/.../05 - Improving Confidentiality with SSH FTP (SFTP)/

29 - Basics of Secure Shell (SSH) in the Context of SFTP.mp4

7.3 MB

30 - SFTP Session Initialization and Common Message Operations.mp4

5.4 MB

31 - Demo - Downloading Files with SFTP.mp4

10.7 MB

32 - Demo - Uploading Files with SFTP.mp4

8.0 MB

33 - Analysis - SFTP Download Packet Deep Dive.mp4

4.5 MB

34 - Demo - Implementing an SFTP Security Policy.mp4

3.9 MB

35 - Comparing SFTP to FTPS.mp4

2.0 MB

/.../06 - Simplifying File Transfers with Trivial FTP (TFTP)/

36 - Why TFTP is Different.mp4

2.2 MB

37 - Understanding TFTP Operations.mp4

4.4 MB

38 - Demo - TFTP Downloads in Action.mp4

7.5 MB

39 - Analysis - Examining the TFTP Download Exchange.mp4

3.2 MB

40 - Demo - TFTP Uploads In Action.mp4

1.8 MB

41 - Analysis - Examining the TFTP Upload Exchange.mp4

4.0 MB

42 - Demo - Attempting to Secure TFTP.mp4

6.9 MB

43 - TFTP vs. FTP and When to Use Each.mp4

1.8 MB

/.../07 - Modernizing FTP with IPv6/

44 - Does IPv6 Really Matter for File Transfer.mp4

2.3 MB

45 - New Messages in FTP Active Mode.mp4

2.3 MB

46 - Demo - Active FTP with IPv6.mp4

6.2 MB

47 - Analysis - Exploring IPv6 Active FTP Transfers.mp4

11.8 MB

48 - New Messages in FTP Passive Mode.mp4

2.6 MB

49 - Demo - Passive FTP with IPv6.mp4

4.6 MB

50 - Analysis - Exploring IPv6 Passive FTP Transfers.mp4

10.5 MB

51 - Demo - Retesting FTPS Using IPv6.mp4

6.5 MB

52 - Analysis - A Glance at IPv6 FTPS Packets.mp4

2.1 MB

53 - Demo - Retesting SFTP Using IPv6.mp4

6.4 MB

54 - Analysis - A Glance at IPv6 SFTP Packets.mp4

3.2 MB

55 - Demo - Trivial FTP (TFTP) with IPv6.mp4

3.8 MB

56 - Analysis - Examining IPv6 TFTP Uploads and Downloads.mp4

4.7 MB

57 - Securing IPv6 FTP Variants.mp4

3.0 MB

58 - Module and Course Summary.mp4

2.7 MB

/.../FTP and It's Variants - Deep Dive/Exercise Files/02/

starting-at-the-beginning-ftp-active-mode-slides.pdf

1.4 MB

/.../FTP and It's Variants - Deep Dive/Exercise Files/02/demos/demo/

ftp_act_get.lftp

0.1 KB

ftp_act_get.pcapng

7.9 KB

ftp_act_put.lftp

0.1 KB

ftp_act_put.pcapng

8.0 KB

ftp_act_sec.lftp

0.1 KB

/.../FTP and It's Variants - Deep Dive/Exercise Files/03/

simplifying-operations-with-ftp-passive-mode-slides.pdf

537.6 KB

/.../FTP and It's Variants - Deep Dive/Exercise Files/03/demos/demo/

ftp_pas_get.lftp

0.1 KB

ftp_pas_get.pcapng

7.7 KB

ftp_pas_get_minmax.pcapng

7.8 KB

ftp_pas_put.lftp

0.1 KB

ftp_pas_put.pcapng

8.2 KB

ftp_pas_sec.lftp

0.1 KB

/.../FTP and It's Variants - Deep Dive/Exercise Files/04/

protecting-data-with-ftp-secure-ftps-slides.pdf

943.2 KB

/.../FTP and It's Variants - Deep Dive/Exercise Files/04/demos/demo/

ftps_act_get.lftp

0.1 KB

ftps_act_get.pcapng

15.7 KB

ftps_act_put.lftp

0.1 KB

ftps_act_put.pcapng

16.4 KB

ftps_pas_get.lftp

0.1 KB

ftps_pas_get.pcapng

16.1 KB

ftps_pas_put.lftp

0.1 KB

ftps_pas_put.pcapng

16.6 KB

/.../FTP and It's Variants - Deep Dive/Exercise Files/05/

improving-confidentiality-with-ssh-ftp-sftp-slides.pdf

468.3 KB

/.../FTP and It's Variants - Deep Dive/Exercise Files/05/demos/demo/

sftp_get.lftp

0.1 KB

sftp_get.pcapng

12.5 KB

sftp_put.lftp

0.1 KB

sftp_put.pcapng

12.1 KB

sftp_sec.lftp

0.1 KB

/.../FTP and It's Variants - Deep Dive/Exercise Files/06/

simplifying-file-transfers-with-trivial-ftp-tftp-slides.pdf

557.5 KB

/.../FTP and It's Variants - Deep Dive/Exercise Files/06/demos/demo/

tftp_get.pcapng

0.4 KB

tftp_get.sh

0.0 KB

tftp_put.pcapng

0.5 KB

tftp_put.sh

0.0 KB

tftp_sec.sh

0.1 KB

/.../FTP and It's Variants - Deep Dive/Exercise Files/07/

modernizing-ftp-with-ipv6-slides.pdf

2.4 MB

/.../FTP and It's Variants - Deep Dive/Exercise Files/07/demos/demo/

ftp_act_get.lftp

0.1 KB

ftp_act_get_v6.pcapng

9.2 KB

ftp_act_put.lftp

0.1 KB

ftp_act_put_v6.pcapng

9.5 KB

ftp_act_sec.lftp

0.1 KB

ftp_pas_get.lftp

0.1 KB

ftp_pas_get_v6.pcapng

9.3 KB

ftp_pas_put.lftp

0.1 KB

ftp_pas_put_v6.pcapng

9.6 KB

ftp_pas_sec.lftp

0.1 KB

ftps_act_get.lftp

0.1 KB

ftps_act_get_v6.pcapng

18.3 KB

ftps_act_put.lftp

0.1 KB

ftps_act_put_v6.pcapng

18.6 KB

ftps_pas_get.lftp

0.1 KB

ftps_pas_get_v6.pcapng

18.8 KB

ftps_pas_put.lftp

0.1 KB

ftps_pas_put_v6.pcapng

19.0 KB

sftp_get.lftp

0.1 KB

sftp_get_v6.pcapng

15.2 KB

sftp_put.lftp

0.1 KB

sftp_put_v6.pcapng

13.6 KB

tftp_get.sh

0.0 KB

tftp_get_v6.pcapng

0.5 KB

tftp_put.sh

0.0 KB

tftp_put_v6.pcapng

0.6 KB

/.../01 - Course Overview/

01 - Course Overview.mp4

3.2 MB

/.../02 - Using Ping/

02 - Purpose of ICMP.mp4

2.9 MB

03 - Demo - Basic Ping in Action.mp4

5.6 MB

04 - Wireshark Detour.mp4

3.0 MB

05 - Analysis - ICMP Echo-request.mp4

10.4 MB

06 - Analysis - ICMP Echo-reply.mp4

5.9 MB

07 - More ICMP Type_Code Examples.mp4

3.3 MB

08 - Demo - Troubleshooting with Ping.mp4

9.7 MB

/.../03 - Using Traceroute/

09 - How Traceroute Really Works.mp4

6.2 MB

10 - New Traceroute ICMP Packets.mp4

4.2 MB

11 - Demo - Traceroute in Action.mp4

8.6 MB

12 - Analysis - Traceroute UDP Probe.mp4

5.8 MB

13 - Analysis - Traceroute ICMP TTL-exceeded.mp4

6.7 MB

14 - Analysis - Traceroute ICMP Port-unreachable.mp4

7.6 MB

15 - Demo - Troubleshooting with Traceroute.mp4

7.7 MB

16 - Using ICMP Instead of UDP Probes.mp4

3.9 MB

/.../04 - Conquering the Fear of Fragmentation/

17 - The What, How, and Why of Fragmentation.mp4

5.0 MB

18 - Advantages and Disadvantages.mp4

3.8 MB

19 - Demo - MTU Discovery Using Ping Bracketing.mp4

9.8 MB

20 - Demo - MTU Discovery Using Ping Sweeping.mp4

7.9 MB

21 - Analysis - ICMP Packet-too-big Unreachable.mp4

10.7 MB

/.../05 - Designing Network Security for ICMP/

22 - Basic Stateless Firewall Operation.mp4

3.6 MB

23 - Demo - An Incomplete Firewall Policy.mp4

5.9 MB

24 - High Level ICMP Firewall Design.mp4

4.3 MB

25 - Demo - A Basic and Functional Firewall Policy.mp4

7.6 MB

26 - Analysis - ICMP Admin-prohibited Unreachable.mp4

4.6 MB

27 - Other Firewall ICMP Considerations.mp4

3.3 MB

/.../06 - Mastering IPv6 Neighbor Discovery/

28 - IPv6 Neighbor Discovery Operations.mp4

6.2 MB

29 - Demo - IPv6 Neighbor Solitication (NS) and Neighbor Advertisement (NA).mp4

11.1 MB

30 - Analysis - IPv6 NS and DAD.mp4

7.0 MB

31 - Analysis - IPv6 NA Packets.mp4

5.1 MB

32 - Demo - IPv6 Router Solitication (RS) and Router Advertisement (RA).mp4

9.2 MB

33 - Analysis - IPv6 RS and RA Packets.mp4

9.7 MB

/.../07 - Exploring the IPv6 Toolset/

34 - IPv6 Ping Summary and Demo.mp4

3.6 MB

35 - Analysis - IPv6 Ping Packets.mp4

5.2 MB

36 - IPv6 Traceroute Summary and Demo.mp4

3.6 MB

37 - Analysis - IPv6 Traceroute Packets.mp4

7.3 MB

38 - IPv6 Fragmentation Summary and Demo.mp4

3.1 MB

39 - Analysis - ICMPv6 Packet-too-big Unreachable.mp4

3.7 MB

40 - IPv6 Security Summary and Demo.mp4

7.3 MB

41 - Analysis - ICMPv6 Admin-prohibited Unreachable.mp4

2.9 MB

/.../ICMP - Deep Dive/Exercise Files/02/

using-ping-slides.pdf

736.9 KB

/.../ICMP - Deep Dive/Exercise Files/02/demos/

ping.pcapng

1.6 KB

/.../ICMP - Deep Dive/Exercise Files/03/

using-traceroute-slides.pdf

674.3 KB

/.../ICMP - Deep Dive/Exercise Files/03/demos/

traceroute.pcapng

1.9 KB

/.../ICMP - Deep Dive/Exercise Files/04/

conquering-the-fear-of-fragmentation-slides.pdf

451.1 KB

/.../ICMP - Deep Dive/Exercise Files/04/demos/

packet-too-big.pcapng

4.6 KB

/.../ICMP - Deep Dive/Exercise Files/05/

designing-network-security-for-icmp-slides.pdf

269.8 KB

/.../ICMP - Deep Dive/Exercise Files/05/demos/

admin-unr80.pcapng

0.3 KB

/.../ICMP - Deep Dive/Exercise Files/06/

mastering-ipv6-neighbor-discovery-slides.pdf

894.9 KB

/.../ICMP - Deep Dive/Exercise Files/06/demos/

v6-nsna.pcapng

0.5 KB

v6-rsra.pcapng

0.4 KB

/.../ICMP - Deep Dive/Exercise Files/07/

exploring-the-ipv6-toolset-slides.pdf

1.7 MB

/.../ICMP - Deep Dive/Exercise Files/07/demos/

v6-tool-admin-unr80.pcapng

0.4 KB

v6-tool-packet-too-big.pcapng

5.8 KB

v6-tool-ping.pcapng

1.6 KB

v6-tool-traceroute.pcapng

2.3 KB

/.../01.Course Overview/

0101.Course Overview.mp4

4.3 MB

/.../02.Introduction to IPv4 Multicast and IGMPv1/

0201.What How Why.mp4

5.6 MB

0202.Host-to-Router Signaling with IGMP.mp4

1.3 MB

0203.Demo IGMPv1 Operations.mp4

4.1 MB

0204.Review of Packet Analysis Using Wireshark.mp4

2.8 MB

0205.Analysis IGMPv1 Membership Query.mp4

2.6 MB

0206.Analysis IGMPv1 Membership Report.mp4

4.2 MB

0207.Router-to-Router Signaling with PIM.mp4

2.8 MB

0208.Demo Basic Multicast Flow.mp4

3.6 MB

/.../03.Better Performance with IGMPv2/

0301.Why Wasn’t IGMPv1 Enough.mp4

3.2 MB

0302.IGMPv2 Solutions and How They Work.mp4

3.7 MB

0303.Demo IGMPv2 Operations.mp4

6.2 MB

0304.Analysis IGMPv2 General Query and Membership Report.mp4

6.4 MB

0305.Analysis IGMPv2 Leave Group and Group-specific Query.mp4

7.3 MB

0306.Demo Basic IPv4 Multicast Flow.mp4

5.3 MB

/.../04.New Multicast Designs with IGMPv3/

0401.Why Wasn’t IGMPv2 Enough.mp4

8.1 MB

0402.Demo IGMPv3 Operations.mp4

11.9 MB

0403.Analysis IGMPv3 Membership Query and Report.mp4

14.6 MB

0404.Analysis IGMPv3 Any-source Multicast (ASM) LeaveQuery.mp4

8.3 MB

0405.Analysis IGMPv3 Source-specific Multicast (SSM) LeaveQuery.mp4

7.7 MB

/.../05.The Future of Neworking IPv6 Multicast and MLDv1/

0501.What’s New with IPv6 Multicast.mp4

2.9 MB

0502.MLDv1 Overview and Message Flow.mp4

3.6 MB

0503.Demo MLDv1 Operations.mp4

8.4 MB

0504.Analysis MLDv1 General Query and Report.mp4

10.8 MB

0505.Analysis MLDv1 Done and Group-specific Query.mp4

6.7 MB

0506.Demo Basic IPv6 Multicast Flow.mp4

4.8 MB

/.../06.New Multicast Designs with MLDv2/

0601.Why Wasn’t MLDv1 Enough.mp4

3.1 MB

0602.MLDv2 Solutions and Exchanges.mp4

3.8 MB

0603.Demo MLDv2 Operations.mp4

12.0 MB

0604.Analysis MLDv2 Membership Query and Report.mp4

14.1 MB

0605.Analysis MLDv2 Any-source Multicast (ASM) LeaveQuery.mp4

5.9 MB

0606.Analysis MLDv2 Source-specific Multicast (SSM) LeaveQuery.mp4

7.6 MB

/.../07.Troubleshooting and Securing IGMP and MLD/

0701.How Multicast Traceroute Really Works.mp4

4.7 MB

0702.Demo Multicast Traceroute in Action.mp4

6.9 MB

0703.Analysis Successful Multicast Traceroute Request.mp4

14.7 MB

0704.Analysis Successful Multicast Traceroute Response.mp4

11.4 MB

0705.Demo Finding the Fault with Multicast Traceroute.mp4

2.3 MB

0706.Analysis Failed Multicast Traceroute Packets.mp4

6.3 MB

0707.Security Design for IGMP and MLD.mp4

5.0 MB

/.../IGMP and MLD - Deep Dive/Exercise Files/

protocol-deep-dive-igmp-mld.zip

5.7 MB

/.../01 - Course Overview/

01 - Course Overview.en.srt

2.8 KB

01 - Course Overview.mp4

4.1 MB

/.../02 - Learning IPsec Fundamentals/

02 - Course Introduction.en.srt

6.7 KB

02 - Course Introduction.mp4

6.2 MB

03 - Course Overview.en.srt

4.9 KB

03 - Course Overview.mp4

3.7 MB

04 - What Is IPsec.en.srt

5.4 KB

04 - What Is IPsec.mp4

5.1 MB

05 - Why IPsec.en.srt

3.4 KB

05 - Why IPsec.mp4

2.4 MB

06 - Information and Resources.en.srt

8.7 KB

06 - Information and Resources.mp4

11.6 MB

/.../03 - Building the IPsec Protocol/

07 - Building IPsec.en.srt

4.7 KB

07 - Building IPsec.mp4

3.9 MB

08 - IPsec Building Blocks.en.srt

13.3 KB

08 - IPsec Building Blocks.mp4

11.0 MB

09 - IPsec Components.en.srt

6.1 KB

09 - IPsec Components.mp4

4.3 MB

10 - SA Establishment Protocols.en.srt

3.9 KB

10 - SA Establishment Protocols.mp4

2.8 MB

11 - Seeing IPsec in Action.en.srt

17.6 KB

11 - Seeing IPsec in Action.mp4

40.5 MB

/.../04 - Using IPsec in the Enterprise/

12 - IPsec Functionality in the Enterprise.en.srt

4.9 KB

12 - IPsec Functionality in the Enterprise.mp4

4.0 MB

13 - IPsec Implementations.en.srt

6.8 KB

13 - IPsec Implementations.mp4

4.9 MB

14 - Using IPsec with DMVPN.en.srt

20.1 KB

14 - Using IPsec with DMVPN.mp4

50.0 MB

15 - Using IPsec on Your Endpoint.en.srt

11.3 KB

15 - Using IPsec on Your Endpoint.mp4

26.4 MB

16 - IPsec Extras.en.srt

6.2 KB

16 - IPsec Extras.mp4

4.6 MB

/.../05 - Securing the Network with IKEv1/

17 - What Is IKE.en.srt

4.1 KB

17 - What Is IKE.mp4

3.0 MB

18 - IKEv1 Authentication.en.srt

4.5 KB

18 - IKEv1 Authentication.mp4

3.7 MB

19 - IKEv1 Phases.en.srt

3.7 KB

19 - IKEv1 Phases.mp4

2.5 MB

20 - IKEv1 Main Mode.en.srt

11.7 KB

20 - IKEv1 Main Mode.mp4

19.5 MB

21 - IKEv1 Aggressive Mode.en.srt

10.1 KB

21 - IKEv1 Aggressive Mode.mp4

17.9 MB

22 - IKEv1 Quick Mode.en.srt

6.1 KB

22 - IKEv1 Quick Mode.mp4

7.7 MB

23 - Summarizing IKEv1.en.srt

2.6 KB

23 - Summarizing IKEv1.mp4

1.6 MB

/.../06 - Establishing IPsec with IKEv2/

24 - Introducing IKEv2.en.srt

5.3 KB

24 - Introducing IKEv2.mp4

4.1 MB

25 - IKEv2 Benefits.en.srt

8.5 KB

25 - IKEv2 Benefits.mp4

6.3 MB

26 - IKEv2 Modes.en.srt

4.2 KB

26 - IKEv2 Modes.mp4

3.8 MB

27 - Authenticating IKEv2.en.srt

5.7 KB

27 - Authenticating IKEv2.mp4

3.6 MB

28 - IKEv2 Phases.en.srt

17.2 KB

28 - IKEv2 Phases.mp4

27.1 MB

29 - Summarizing IKEv2.en.srt

3.8 KB

29 - Summarizing IKEv2.mp4

2.2 MB

/.../07 - Implementing IPsec in IPv6/

30 - IPsec in IPv6.en.srt

7.7 KB

30 - IPsec in IPv6.mp4

6.0 MB

31 - IPv6 Implementations.en.srt

6.0 KB

31 - IPv6 Implementations.mp4

4.0 MB

32 - Migrating IPv4 to IPv6 for IPsec.en.srt

15.8 KB

32 - Migrating IPv4 to IPv6 for IPsec.mp4

29.0 MB

33 - IPv6 IPsec Site-to-site Lab.en.srt

6.6 KB

33 - IPv6 IPsec Site-to-site Lab.mp4

13.1 MB

34 - IPv6 IPsec Summary.en.srt

2.5 KB

34 - IPv6 IPsec Summary.mp4

1.5 MB

/.../08 - Finalizing IPsec Concepts/

35 - Course Review.en.srt

8.5 KB

35 - Course Review.mp4

7.2 MB

36 - Let's Wrap Up.en.srt

4.9 KB

36 - Let's Wrap Up.mp4

3.1 MB

/.../IPsec - Deep Dive/Exercise Files/02/

learning-ipsec-fundamentals-slides.pdf

7.6 MB

/.../Mod 2 Demo Files/

Globo_HQ Router

0.4 KB

Globo_Site1 Router

0.4 KB

Internet Router

0.7 KB

/.../IPsec - Deep Dive/Exercise Files/03/

building-the-ipsec-protocol-slides.pdf

947.4 KB

/.../IPsec - Deep Dive/Exercise Files/03/demos/

Globo_HQ

0.8 KB

Globo_Site1

0.8 KB

Mod 3 PCAP.pcap

71.6 KB

/.../IPsec - Deep Dive/Exercise Files/04/

using-ipsec-in-the-enterprise-slides.pdf

612.2 KB

/.../IPsec - Deep Dive/Exercise Files/04/demos/Module 4/

Mod 4 DMVPN PCAP.pcap

75.0 KB

Mod 4 RA VPN PCAP.pcapng

17.6 MB

/.../IPsec - Deep Dive/Exercise Files/05/

securing-the-network-with-ikev1-slides.pdf

662.7 KB

/.../IPsec - Deep Dive/Exercise Files/05/demos/Module 5/

Globo_HQ Aggressive Mode

0.5 KB

Globo_HQ Main Mode

0.4 KB

Globo_Site1 Aggressive Mode

0.5 KB

Globo_Site1 Main Mode

0.5 KB

Mod 5 Aggressive and Quick mode PCAP.pcap

6.5 KB

Mod 5 Main Mode PCAP.pcap

5.7 KB

/.../IPsec - Deep Dive/Exercise Files/06/

establishing-ipsec-with-ikev2-slides.pdf

1.1 MB

/.../IPsec - Deep Dive/Exercise Files/06/demos/

Globo_HQ_IKEv2

0.7 KB

Globo_Site1_IKEv2

0.7 KB

IKEv2 PCAP.pcap

13.4 KB

/.../IPsec - Deep Dive/Exercise Files/07/

implementing-ipsec-in-ipv6-slides.pdf

585.7 KB

/.../IPsec - Deep Dive/Exercise Files/07/demos/

Globo_HQ_IPv6 BASE

0.3 KB

Globo_HQ_IPv6 Over IPv4

0.4 KB

Globo_HQ_IPv6 to IPv6

0.4 KB

Globo_INTERNET_IPv6 BASE

0.5 KB

Globo_Site1_IPv6 BASE

0.3 KB

Globo_Site1_IPv6 Over IPv4

0.4 KB

Globo_Site1_IPv6 to IPv6

0.4 KB

IPv6 Over IPv4 PCAP.pcap

28.7 KB

IPv6 to IPv6 IPsec PCAP.pcap

22.9 KB

/.../IPsec - Deep Dive/Exercise Files/08/

finalizing-ipsec-concepts-slides.pdf

526.3 KB

/.../NAT - Deep Dive/

protocol-deep-dive-nat.zip

491.7 KB

/.../NAT - Deep Dive/1.Course Overview/

1.Course Overview.mp4

3.4 MB

/.../2.Identifying NAT Components/

1.The History of the Need for NAT.mp4

3.7 MB

2.RFCs that Make up the Catalog of NAT Types.mp4

4.8 MB

3.NAT Loopback.mp4

3.5 MB

4.IPv6 and NAT.mp4

2.5 MB

5.Applications Affected by NAT.mp4

2.7 MB

6.Cisco Static and Hide NAT.mp4

16.4 MB

/.../3.NAT Setup and Analysis/

1.NAT Demonstration in a Modern Network.mp4

10.4 MB

2.NAT Demonstration with a Router.mp4

8.6 MB

3.NAT Demonstration in a SOHO Network.mp4

8.9 MB

4.NAT as Seen through a Protocol Analyzer.mp4

15.4 MB

/.../NAT - Deep Dive/4.Troubleshooting NAT/

1.NAT Limitations.mp4

1.7 MB

2.Debugging NAT.mp4

16.3 MB

3.Disadvantages of NAT.mp4

3.0 MB

4.NAT Vulnerabilities.mp4

2.2 MB

/.../01 - Course Overview/

01 - Course Overview.en.srt

2.1 KB

01 - Course Overview.mp4

5.9 MB

/.../02 - Covering OSPF Basics/

02 - Course and Module Introduction.en.srt

4.5 KB

02 - Course and Module Introduction.mp4

3.3 MB

03 - OSPF vs. Other Routing Protocols.en.srt

15.5 KB

03 - OSPF vs. Other Routing Protocols.mp4

30.4 MB

04 - Reviewing the OSPF Metric.en.srt

15.0 KB

04 - Reviewing the OSPF Metric.mp4

42.9 MB

05 - Selecting the Best Route Entry.en.srt

6.3 KB

05 - Selecting the Best Route Entry.mp4

4.9 MB

06 - Summary.en.srt

1.3 KB

06 - Summary.mp4

892.4 KB

/.../03 - Forming Basic OSPF Relationships/

07 - Module Introduction.en.srt

2.3 KB

07 - Module Introduction.mp4

1.8 MB

08 - Reviewing the Requirements to Form an OSPF Neighborship.en.srt

7.3 KB

08 - Reviewing the Requirements to Form an OSPF Neighborship.mp4

5.3 MB

09 - Viewing the Requirements to Form an OSPF Neighborship.en.srt

21.1 KB

09 - Viewing the Requirements to Form an OSPF Neighborship.mp4

63.7 MB

10 - Digging Further into OSPF Network Types.en.srt

11.4 KB

10 - Digging Further into OSPF Network Types.mp4

8.7 MB

11 - Looking into Neighbor States.en.srt

16.2 KB

11 - Looking into Neighbor States.mp4

51.4 MB

12 - Inspecting the OSPF Packet - OSPF Header.en.srt

6.9 KB

12 - Inspecting the OSPF Packet - OSPF Header.mp4

10.5 MB

13 - Inspecting the OSPF Packet - OSPF Hello Packet.en.srt

6.5 KB

13 - Inspecting the OSPF Packet - OSPF Hello Packet.mp4

7.4 MB

14 - Inspecting the OSPF Packet - OSPF Database Descriptor Packet.en.srt

8.6 KB

14 - Inspecting the OSPF Packet - OSPF Database Descriptor Packet.mp4

16.2 MB

15 - Inspecting the OSPF Packet - OSPF Link State Request Packet.en.srt

5.0 KB

15 - Inspecting the OSPF Packet - OSPF Link State Request Packet.mp4

6.2 MB

16 - Inspecting the OSPF Packet - OSPF Link State Update Packet.en.srt

5.2 KB

16 - Inspecting the OSPF Packet - OSPF Link State Update Packet.mp4

10.9 MB

17 - Inspecting the OSPF Packet - OSPF Link State Acknowledgment Packet.en.srt

8.0 KB

17 - Inspecting the OSPF Packet - OSPF Link State Acknowledgment Packet.mp4

14.3 MB

18 - Summary.en.srt

2.1 KB

18 - Summary.mp4

1.5 MB

/.../04 - Discussing Simple OSPF Communication Blocks/

19 - Module Introduction.en.srt

1.7 KB

19 - Module Introduction.mp4

1.5 MB

20 - Reviewing What a Link State Advertisement Is.en.srt

2.6 KB

20 - Reviewing What a Link State Advertisement Is.mp4

2.0 MB

21 - Digging into the Router LSA (Type 1).en.srt

7.0 KB

21 - Digging into the Router LSA (Type 1).mp4

6.3 MB

22 - Viewing into the Router LSA (Type 1).en.srt

23.1 KB

22 - Viewing into the Router LSA (Type 1).mp4

48.4 MB

23 - Digging into the Network LSA (Type 2).en.srt

4.3 KB

23 - Digging into the Network LSA (Type 2).mp4

3.3 MB

24 - Viewing into the Network LSA (Type 2).en.srt

10.4 KB

24 - Viewing into the Network LSA (Type 2).mp4

20.1 MB

25 - Digging into the External LSA (Type 5).en.srt

6.0 KB

25 - Digging into the External LSA (Type 5).mp4

5.6 MB

26 - Viewing into the External LSA (Type 5).en.srt

8.7 KB

26 - Viewing into the External LSA (Type 5).mp4

19.3 MB

27 - Summary.en.srt

1.3 KB

27 - Summary.mp4

1.1 MB

/.../05 - Introducing Multi-area OSPF (Hierarchy)/

28 - Module Introduction.en.srt

1.7 KB

28 - Module Introduction.mp4

1.5 MB

29 - What Is multi-area OSPF.en.srt

16.6 KB

29 - What Is multi-area OSPF.mp4

29.4 MB

30 - Reviewing the different OSPF Device Types.en.srt

15.0 KB

30 - Reviewing the different OSPF Device Types.mp4

42.9 MB

31 - Differentiating the different OSPF Area Types.en.srt

9.8 KB

31 - Differentiating the different OSPF Area Types.mp4

7.7 MB

32 - Exploring the Different OSPF Area Types.en.srt

20.4 KB

32 - Exploring the Different OSPF Area Types.mp4

82.9 MB

33 - Decoding Multi-area OSPF Building Blocks.en.srt

3.3 KB

33 - Decoding Multi-area OSPF Building Blocks.mp4

2.7 MB

34 - Reviewing OSPF Building Blocks (Type 3).en.srt

7.0 KB

34 - Reviewing OSPF Building Blocks (Type 3).mp4

16.8 MB

35 - Decoding the Summary LSA (Type 4).en.srt

3.8 KB

35 - Decoding the Summary LSA (Type 4).mp4

3.1 MB

36 - Viewing the Summary LSA (Type 4).en.srt

13.5 KB

36 - Viewing the Summary LSA (Type 4).mp4

51.3 MB

37 - Decoding the NSSA LSA (Type 7).en.srt

7.8 KB

37 - Decoding the NSSA LSA (Type 7).mp4

7.2 MB

38 - Viewing the NSSA LSA (Type 7).en.srt

4.1 KB

38 - Viewing the NSSA LSA (Type 7).mp4

7.7 MB

39 - Summary.en.srt

1.6 KB

39 - Summary.mp4

1.2 MB

/.../06 - Troubleshooting Common OSPF Issues/

40 - Module Introduction.en.srt

0.9 KB

40 - Module Introduction.mp4

705.2 KB

41 - Troubleshooting Common OSPF Issues - Core1.en.srt

3.0 KB

41 - Troubleshooting Common OSPF Issues - Core1.mp4

5.8 MB

42 - Troubleshooting Common OSPF Issues - Duplicate Address.en.srt

2.0 KB

42 - Troubleshooting Common OSPF Issues - Duplicate Address.mp4

10.1 MB

43 - Troubleshooting Common OSPF Issues - Authentication Mismatch.en.srt

2.4 KB

43 - Troubleshooting Common OSPF Issues - Authentication Mismatch.mp4

9.7 MB

44 - Troubleshooting Common OSPF Issues - Mismatched Timers.en.srt

3.2 KB

44 - Troubleshooting Common OSPF Issues - Mismatched Timers.mp4

14.5 MB

45 - Troubleshooting Common OSPF Issues - Area Type Mismatch.en.srt

2.3 KB

45 - Troubleshooting Common OSPF Issues - Area Type Mismatch.mp4

11.5 MB

46 - Troubleshooting Common OSPF Issues - Network Type Mismatch.en.srt

10.2 KB

46 - Troubleshooting Common OSPF Issues - Network Type Mismatch.mp4

57.7 MB

47 - Troubleshooting Common OSPF Issues - Finale - Ral2.en.srt

1.0 KB

47 - Troubleshooting Common OSPF Issues - Finale - Ral2.mp4

4.3 MB

48 - Summary.en.srt

1.0 KB

48 - Summary.mp4

642.1 KB

/.../OSPF - Deep Dive/Exercise Files/02/

covering-ospf-basics-slides.pdf

2.9 MB

/.../OSPF - Deep Dive/Exercise Files/03/

forming-basic-ospf-relationships-slides.pdf

2.8 MB

/.../OSPF - Deep Dive/Exercise Files/04/

discussing-simple-ospf-communication-blocks-slides.pdf

2.6 MB

/.../OSPF - Deep Dive/Exercise Files/05/

introducing-multi-area-ospf-hierarchy-slides.pdf

5.4 MB

/.../OSPF - Deep Dive/Exercise Files/06/

troubleshooting-common-ospf-issues-slides.pdf

191.2 KB

/.../01. Course Overview/

01. Course Overview.mp4

3.4 MB

/.../02. An Introduction to QUIC/

02. Introduction - Why Learn QUIC.mp4

6.0 MB

03. Why Replace TCP.mp4

12.3 MB

04. TCP vs. QUIC - Saving Network Roundtrips.mp4

3.3 MB

05. Learning QUIC Protocol Fundamentals.mp4

2.5 MB

06. Understanding the QUIC Protocol Stack.mp4

3.5 MB

07. QUIC - The Pathway to HTTP 3.mp4

5.1 MB

08. Demo-Hands-On with QUIC in Wireshark - Part 1.mp4

24.7 MB

09. Demo-Hands-On with QUIC in Wireshark - Part 2.mp4

15.9 MB

/.../03. Analyzing QUIC with Wireshark/

10. Understanding the TCP to QUIC Handoff.mp4

3.9 MB

11. Demo-The QUIC Handoff.mp4

25.0 MB

12. The QUIC Handshake.mp4

5.5 MB

13. Demo-The QUIC Handshake in Wireshark.mp4

26.6 MB

14. Connections and Streams.mp4

7.1 MB

15. QUIC Packets vs. Frames.mp4

2.9 MB

16. Demo-Analyzing QUIC Connections in Wireshark.mp4

16.0 MB

17. Demo-Analyzing QUIC Streams in Wireshark.mp4

11.5 MB

18. Demo-Analyzing QUIC Packets vs. Frames.mp4

13.2 MB

/.../04. Troubleshooting the QUIC Protocol/

19. Common Problems with QUIC.mp4

5.8 MB

20. Tools for Testing and Validating QUIC.mp4

6.2 MB

21. Demo-Online Tools for Testing QUIC.mp4

5.0 MB

22. Demo-Browser Tools for Validating QUIC.mp4

10.2 MB

23. Demo-Identifying Packet Loss with Wireshark.mp4

24.7 MB

24. Demo-Troubleshooting QUIC Streams with Wireshark.mp4

17.0 MB

25. QUIC Course Review.mp4

4.6 MB

/.../QUIC - Deep Dive/Exercise Files/02/

an-introduction-to-quic-slides.pdf

5.0 MB

/.../QUIC - Deep Dive/Exercise Files/02/demos/

Lab1-QUIC.pcapng

52.4 KB

/.../QUIC - Deep Dive/Exercise Files/03/

analyzing-quic-with-wireshark-slides.pdf

398.4 KB

/.../QUIC - Deep Dive/Exercise Files/03/demos/

Lab2-keys.log

0.8 KB

Lab2-QUIC Handshake.pcapng

13.1 KB

Lab3-keys.log

127.6 KB

Lab3-QUIC Streams.pcapng

355.8 KB

/.../QUIC - Deep Dive/Exercise Files/04/

troubleshooting-the-quic-protocol-slides.pdf

2.5 MB

/.../01 - Course Overview/

01 - Course Overview.mp4

3.6 MB

/.../02 - Overview of SNMP/

02 - Overview Of SNMP.mp4

6.3 MB

03 - SNMP Versions.mp4

7.2 MB

04 - NMS Basics.mp4

4.6 MB

05 - SNMP Packet Formats.mp4

21.9 MB

/.../03 - Managing Devices With SNMP/

06 - SNMP On The Wire.mp4

4.8 MB

07 - OIDs And MIBs.mp4

9.1 MB

08 - Gathering SNMP Data From Devices.mp4

16.0 MB

/.../04 - Configuring SNMP/

09 - 0401 Configuring SNMPv2 On Windows.mp4

13.7 MB

10 - 0402 Configuring SNMPv2 And V3 On Linux.mp4

14.8 MB

11 - 0403 Configuring SNMPv2 On Cisco IOS.mp4

14.1 MB

12 - 0404 Configuring SNMPv3 On Cisco IOS.mp4

17.7 MB

/.../05 - Monitoring Systems With SNMP/

13 - Installing And Configuring An NMS.mp4

6.5 MB

14 - Configuring The Windows Firewall For Network Management.mp4

17.0 MB

15 - Configuring A Linux Server In The NMS.mp4

12.7 MB

16 - Configuring A Windows Server In The NMS.mp4

16.7 MB

17 - Configuring A Cisco IOS Device In The NMS.mp4

12.5 MB

/.../06 - Troubleshooting Using SNMP/

18 - Troubleshooting Issues.mp4

18.3 MB

19 - Network Monitoring Discussion.mp4

7.0 MB

/.../SNMP - Deep Dive/Exercise Files/02/

overview-of-snmp-slides.pdf

191.3 KB

/.../SNMP - Deep Dive/Exercise Files/02/demos/

SNMPv1.cap

11.9 KB

SNMPv2c_get_requests.cap

0.9 KB

SNMPv3.pcap

34.6 KB

/.../SNMP - Deep Dive/Exercise Files/03/

managing-devices-with-snmp-slides.pdf

251.0 KB

/.../SNMP - Deep Dive/Exercise Files/04/

configuring-snmp-slides.pdf

52.9 KB

/.../SNMP - Deep Dive/Exercise Files/05/

monitoring-systems-with-snmp-slides.pdf

29.3 KB

/.../SNMP - Deep Dive/Exercise Files/06/

troubleshooting-using-snmp-slides.pdf

74.2 KB

/.../01.Course Overview/

0101.Course Overview.mp4

4.3 MB

/.../02.The Secure Shell (SSH) Protocol/

0201.Communication Protocol Terms.mp4

8.0 MB

0202.Introduction to OpenSSH.mp4

17.4 MB

0203.Using SSH Debugging Tools.mp4

22.0 MB

0204.Basic SSH Troubleshooting.mp4

9.1 MB

0205.Common SSH Failure Scenarios.mp4

14.7 MB

/.../03.The Telnet Protocol/

0301.Telnet's Historical Legacy.mp4

4.6 MB

0302.When NOT to Use Telnet.mp4

8.3 MB

0303.How Telnet works.mp4

10.5 MB

0304.Troubleshooting Telnet Connections.mp4

10.1 MB

/.../SSH and Telnet - Deep Dive/Files/

ssh-telnet-protocol-deep-dive.zip

209.0 KB

/.../TCP & UDP - Deep Dive/

Exercise_file.zip

4.5 MB

/.../01.Course Overview/

01.01.Course Overview.mp4

3.1 MB

/.../02.Protocol Introduction/

02.01.Protocol Introduction.mp4

2.3 MB

02.02.Criticality of TCP and UDP.mp4

2.8 MB

02.03.What Is a Port.mp4

4.3 MB

02.04.What Is TCP.mp4

9.0 MB

02.05.What Is UDP.mp4

4.8 MB

02.06.Module Review.mp4

3.4 MB

/.../03.TCP UDP Theory of Operation/

03.01.Introduction.mp4

2.3 MB

03.02.TCP Breakdown.mp4

22.7 MB

03.03.TCP Session Formation.mp4

3.0 MB

03.04.TCP Data Segmentation.mp4

2.8 MB

03.05.TCP Data Reassembly.mp4

1.6 MB

03.06.TCP Data Retransmission.mp4

4.6 MB

03.07.TCP Session Termination.mp4

3.9 MB

03.08.UDP Breakdown.mp4

7.4 MB

03.09.Module Review.mp4

3.0 MB

/.../04.TCP UDP Ready Set Action/

04.01.Introduction.mp4

1.0 MB

04.02.TCP Web Session Analysis.mp4

38.6 MB

04.03.UDP DHCP Session Analysis.mp4

9.5 MB

04.04.Module Review.mp4

3.8 MB

/.../05.Troubleshooting TCP UDP Issues/

05.01.Introduction.mp4

1.9 MB

05.02.TCP Firewall Issues.mp4

23.9 MB

05.03.TCP DNAT Issues.mp4

5.5 MB

05.04.TCP Issues with MTU MSS.mp4

7.0 MB

05.05.UDP Firewall Issues.mp4

12.8 MB

05.06.UDP Service Issues.mp4

3.6 MB

05.07.Module Review.mp4

3.4 MB

/Splunk Training/1. Splunk Fundamentals 1/

1. Introduction Lecture.mp4

21.5 MB

2. Windows Installation.mp4

30.7 MB

3. MacOS Installation.mp4

44.6 MB

4. Getting Data In Lecture.mp4

112.5 MB

5. Splunk User Interface (UI) Lecture.mp4

22.5 MB

6. Basic navigation.mp4

49.4 MB

7. Basic Searching Lecture.mp4

22.8 MB

8. Basic Searching Demo.mp4

100.2 MB

9. Searching with Time Lecture.mp4

24.5 MB

10. How to use the time picker.mp4

61.3 MB

11. Commands Lecture.mp4

74.5 MB

12. How to use fields.mp4

23.6 MB

13. Transforming Commands.mp4

14.1 MB

14. Transforming Demo.mp4

89.7 MB

15. Creating Reports and Dashboards Lecture.mp4

21.2 MB

16. Reports and Dashboards Demo.mp4

159.4 MB

17. Common Information Model (CIM) Lecture.mp4

22.4 MB

18. Common Information Model (CIM) Demo.mp4

121.0 MB

19. Lookups Lecture.mp4

14.1 MB

20. Lookups Demo.mp4

89.1 MB

21. Creating an Automatic Lookup.mp4

49.3 MB

22. Alerts Lecture.mp4

11.5 MB

23. Alerts Demo.mp4

72.5 MB

Practice_Data.zip

1.6 MB

/Splunk Training/2. Splunk Fundamentals 2/

1. Macros Overview.mp4

14.4 MB

2. Introduction.mp4

8.2 MB

3. Mapping Commands.mp4

10.1 MB

4. Building Maps.mp4

110.9 MB

5. The eval and fillnull Commands.mp4

20.6 MB

6. Demo eval and fillnull.mp4

114.6 MB

7. Transaction Command.mp4

23.6 MB

8. Investigating with the Transaction Command.mp4

114.9 MB

9. Knowledge Objects.mp4

18.3 MB

10. Setting Permissions of KOs.mp4

73.2 MB

11. Field Extractions.mp4

12.7 MB

12. Rex Erex and the Field Extractor.mp4

110.2 MB

13. Field Aliases and Calculated Fields.mp4

22.4 MB

14. Making Field Aliases.mp4

78.2 MB

15. Tags and Event Types.mp4

14.8 MB

16. Creating Tags and Setting Event Types.mp4

51.4 MB

17. Building a Macro.mp4

91.8 MB

18. Workflow Actions.mp4

25.3 MB

19. Building a Workflow Action.mp4

55.0 MB

20. Making POST and Search Workflow Actions.mp4

64.8 MB

21. Datamodels and the CIM.mp4

19.9 MB

22. CIM Addon Builder.mp4

121.5 MB

Practice_Data.zip

1.6 MB

/Splunk Training/3. Splunk Fundamentals 3/

1. Eval Command.mp4

154.7 MB

2. Eventstats and Streamstats.mp4

95.1 MB

3. Appendpipe.mp4

64.5 MB

4. The Rest Command.mp4

71.9 MB

5. Data Masking.mp4

87.6 MB

6. Acceleration.mp4

155.7 MB

7. The internal Index.mp4

231.5 MB

8. Working with JSON Data.mp4

185.3 MB

Practice_Data.zip

1.6 MB

/.../4. Admin 1 - System Admin/

1. Overview of Splunk Deployment.mp4

53.9 MB

2. Overview Demo.mp4

73.0 MB

3. Splunk License and Management.mp4

25.9 MB

4. License Management Demo.mp4

34.0 MB

5. Applications.mp4

35.8 MB

6. Applications Demo.mp4

90.9 MB

7. Configuration Files.mp4

84.3 MB

8. Configuration Files Demo.mp4

186.5 MB

9. Splunk Indexes.mp4

66.1 MB

10. Indexes Demo.mp4

136.7 MB

11. Management of Splunk Indexes.mp4

95.6 MB

12. User Roles and Management.mp4

147.3 MB

13. User and Roles Demo.mp4

156.4 MB

14. Forwarding Basics.mp4

68.3 MB

15. Forwarding Demo.mp4

147.2 MB

16. Splunk Diags and Distributed Search.mp4

50.3 MB

17. Diag Demo.mp4

71.1 MB

Practice_Data.zip

1.6 MB

/.../5. Admin 2 - Data Admin/

1. Getting Data In.mp4

87.3 MB

2. Getting Data In Demo.mp4

76.2 MB

3. Configuring Forwarders.mp4

95.7 MB

4. Configuring Forwarders Demo.mp4

140.3 MB

5. HFs and Forwarder Management.mp4

97.6 MB

6. HFs and Forwarder Management Demo.mp4

126.0 MB

7. Data Inputs.mp4

158.6 MB

8. Data Inputs Demo.mp4

90.5 MB

9. Tuning Inputs.mp4

48.1 MB

10. Parsing Phase and Data Preview.mp4

169.1 MB

11. Parsing Phase and Data Preview Demo.mp4

191.0 MB

12. Raw Data and Knowledge Objects.mp4

145.6 MB

13. Raw Data and Knowledge Objects Demo.mp4

119.6 MB

Practice_Data.zip

1.6 MB

/Splunk Training/6. Architecture 101/

1. Introduction.mp4

16.1 MB

2. What does an architect do.mp4

163.8 MB

3. How to plan a deployment.mp4

99.7 MB

4. All things Indexers Lecture.mp4

170.9 MB

5. All things Indexers Demo.mp4

188.7 MB

6. Planning Based On Server Roles Lecture.mp4

188.6 MB

7. Planning Based On Server Roles Demo.mp4

80.2 MB

8. Introduction to Clustering Concepts.mp4

209.9 MB

9. Forwarder Management and Data Ingest Lecture.mp4

139.2 MB

10. Forwarder Management and Data Ingest Demo.mp4

68.7 MB

11. The Monitoring Console Lecture.mp4

78.5 MB

12. The Monitoring Console Demo.mp4

92.5 MB

/Splunk Training/7. Fields & Extractions/

1. Fields command.mp4

70.5 MB

2. Fields with IN clause.mp4

38.6 MB

3. Regex Powerpoint.mp4

41.3 MB

4. erex.mp4

46.8 MB

5. rex.mp4

69.2 MB

6. eval and replace.mp4

66.6 MB

Practice_Data.zip

1.6 MB

/.../8. Getting Data In/

1. Windows UF setup.mp4

50.2 MB

2. UF on Linux.mp4

25.6 MB

3. Forward over Ubuntu logs.mp4

136.7 MB

4. REST API.mp4

54.6 MB

5. Make Your Own Data.mp4

73.5 MB

6. Tutorial Data.mp4

105.1 MB

Practice_Data.zip

1.6 MB

/.../9. Regular Expressions - From Beginning To End/

1. History of regex.mp4

88.7 MB

2. What are regular expressions Lecture.mp4

84.1 MB

3. What are regular expressions Demo.mp4

141.8 MB

4. Highlight resources to use.mp4

38.8 MB

5. The basic characters to know Lecture.mp4

36.8 MB

6. The basic characters to know Demo.mp4

62.4 MB

7. Quantifiers to Know Lecture.mp4

61.6 MB

8. Quantifiers to Know Demo.mp4

98.6 MB

9. Regex Anchors Lecture.mp4

62.7 MB

10. Regex Anchors Demo.mp4

67.8 MB

11. Groupings Lecture.mp4

90.3 MB

12. Groupings Demo.mp4

98.0 MB

13. Capture groups and named capture groups Lecture.mp4

79.1 MB

14. Capture groups and named capture groups Demo.mp4

174.6 MB

15. Regex in Splunk commands Lecture.mp4

131.6 MB

16. Regex in Splunk commands Demo.mp4

68.2 MB

17. Regex in Splunk conf files Lecture.mp4

36.2 MB

18. Regex in Splunk conf files Demo.mp4

102.0 MB

 

Total files 7179


Copyright © 2025 FileMood.com