Security |
||
Name |
DOWNLOAD Copy Link | |
Total Size |
80.9 GB |
|
Total Files |
8423 |
|
Hash |
B55AA1A793043405153C7F139CEAC76F103C756E |
/.../OWASP Top 10 Web Application Security Risks for ASP.NET/ |
|
|
374.6 MB |
/.../10. Reversing Malware with Debugging Tools/ |
|
|
1.0 MB |
|
35.2 MB |
|
15.4 MB |
|
18.8 MB |
/.../11. Reversing Malware with IDA pro/ |
|
|
987.8 KB |
|
35.5 MB |
|
11.0 MB |
|
10.5 MB |
/.../12. Customizing Reports - From Researchers to CISOs/ |
|
|
13.6 MB |
|
2.5 MB |
|
536.1 KB |
/2. Introduction/ |
|
|
2.0 MB |
|
28.6 MB |
|
7.9 MB |
|
715.3 KB |
/.../3. Recognizing the Exploit Vector/ |
|
|
6.9 MB |
|
22.0 MB |
|
19.3 MB |
|
310.8 KB |
/.../4. Unraveling Exploit Obfuscation/ |
|
|
10.7 MB |
|
19.7 MB |
|
14.9 MB |
|
674.3 KB |
/.../5. Circumventing Exploit Kit Encryption/ |
|
|
4.0 MB |
|
6.0 MB |
|
8.1 MB |
|
659.7 KB |
/.../6. Understanding Moving Target Communications/ |
|
|
4.1 MB |
|
8.8 MB |
|
3.9 MB |
|
1.9 MB |
/.../7. Detecting Angler in the Wild/ |
|
|
2.4 MB |
|
3.9 MB |
|
4.7 MB |
|
6.7 MB |
/.../8. Performing Safe Dynamic Analysis/ |
|
|
4.6 MB |
|
6.6 MB |
|
11.2 MB |
|
1.3 MB |
/.../9. Analyzing Files Statically/ |
|
|
8.9 MB |
|
20.3 MB |
|
8.6 MB |
|
1.7 MB |
/Advanced Malware Analysis - Combating Exploit Kits/ |
|
|
26.5 MB |
/1. Course Overview/ |
|
|
5.1 MB |
/.../2. What Is an Advanced Persistent Threat/ |
|
|
5.3 MB |
|
1.4 MB |
|
9.0 MB |
|
12.2 MB |
06. Why Is Classifying Every Threat as an APT a Bad Idea.mp4 |
3.9 MB |
|
1.2 MB |
/.../3. Understanding the History of APTs/ |
|
|
2.3 MB |
|
11.9 MB |
|
12.5 MB |
|
5.9 MB |
|
4.8 MB |
|
806.8 KB |
/.../4. How Does an APT Work/ |
|
|
3.2 MB |
|
11.8 MB |
|
5.6 MB |
|
939.3 KB |
/.../5. Who Are They, and Why Do They Do What They Do/ |
|
|
2.5 MB |
|
14.0 MB |
/.../6. How Do You Detect APTs/ |
|
|
2.2 MB |
|
2.8 MB |
|
20.8 MB |
|
1.1 MB |
/.../7. Defending Against APTs - Best Practices and Mitigation Strategies/ |
|
|
4.8 MB |
|
1.4 MB |
|
9.0 MB |
|
2.2 MB |
|
5.5 MB |
|
4.3 MB |
|
8.6 MB |
|
4.4 MB |
|
5.3 MB |
|
2.9 MB |
|
1.1 MB |
|
2.8 MB |
/Advanced Persistent Threats - The Big Picture/ |
|
|
6.3 MB |
/1. Course Overview/ |
|
|
7.1 MB |
/.../2. Setting up Your Burp Suite Environment for This Course/ |
|
|
1.5 MB |
|
14.7 MB |
|
2.6 MB |
|
5.0 MB |
|
7.6 MB |
/.../3. Hybrid Spidering Your Web Application/ |
|
|
8.7 MB |
|
4.1 MB |
|
14.4 MB |
|
10.7 MB |
|
6.7 MB |
|
8.0 MB |
/.../4. Exploiting Vulnerabilities in Your Web Application/ |
|
|
7.1 MB |
|
17.2 MB |
|
9.9 MB |
16. Using Burp to Uncover Cookie_Session Management Issues.mp4 |
10.0 MB |
|
16.5 MB |
18. Using Burp to Perform Cross-site Request Forgery (CSRF) Attacks.mp4 |
12.3 MB |
19. Using Burp to Determine Clickjacking Vulnerabilities.mp4 |
7.4 MB |
/.../5. Integrating Burp and File Attacks/ |
|
|
8.4 MB |
|
13.4 MB |
|
4.7 MB |
|
6.0 MB |
/.../6. Writing Your Own Burp Extension and Exercising Automation/ |
|
|
31.6 MB |
|
6.9 MB |
/Advanced Web Application Penetration Testing with Burp Suite/ |
|
|
1.1 MB |
/1. Introduction/ |
|
|
5.1 MB |
/2. Configuration/ |
|
|
15.5 MB |
|
19.3 MB |
|
8.2 MB |
|
4.5 MB |
|
26.2 MB |
|
7.6 MB |
|
4.9 MB |
|
23.9 MB |
|
17.6 MB |
|
11.1 MB |
|
11.3 MB |
|
11.5 MB |
|
12.8 MB |
|
13.1 MB |
|
13.1 MB |
|
21.5 MB |
|
5.4 MB |
/.../3. Membership, Identity and Roles/ |
|
|
17.2 MB |
|
10.3 MB |
|
7.6 MB |
|
4.5 MB |
|
12.2 MB |
|
13.3 MB |
|
10.1 MB |
|
14.0 MB |
|
28.3 MB |
|
20.8 MB |
|
13.6 MB |
|
5.1 MB |
/4. MVC/ |
|
|
23.1 MB |
|
12.5 MB |
|
25.3 MB |
|
21.5 MB |
|
17.0 MB |
|
12.6 MB |
|
11.4 MB |
|
14.5 MB |
|
5.0 MB |
/5. Web Forms/ |
|
|
19.3 MB |
|
18.0 MB |
|
17.3 MB |
|
40.5 MB |
|
32.7 MB |
|
20.4 MB |
|
34.5 MB |
|
20.8 MB |
|
6.8 MB |
/.../6. General Security Principles and Tools/ |
|
|
12.6 MB |
|
31.4 MB |
|
18.6 MB |
|
28.6 MB |
|
14.3 MB |
|
19.9 MB |
|
9.0 MB |
|
30.6 MB |
|
8.3 MB |
/ASP.NET Security Secrets Revealed/ |
|
|
83.5 MB |
/1. Course Overview/ |
|
|
4.6 MB |
/.../2. What's the Landscape Like/ |
|
|
8.7 MB |
|
3.8 MB |
|
8.0 MB |
|
3.9 MB |
|
6.6 MB |
|
4.4 MB |
|
6.3 MB |
|
9.0 MB |
|
2.4 MB |
|
13.7 MB |
|
5.6 MB |
|
6.4 MB |
|
7.4 MB |
|
2.0 MB |
/.../3. What Is Risk Assessment/ |
|
|
10.7 MB |
|
3.8 MB |
|
3.8 MB |
|
7.6 MB |
|
10.0 MB |
|
3.3 MB |
|
1.4 MB |
/.../4. Successful Risk Assessments/ |
|
|
3.4 MB |
|
3.8 MB |
|
3.5 MB |
|
1.9 MB |
|
2.6 MB |
|
4.6 MB |
|
8.9 MB |
|
7.9 MB |
|
1.5 MB |
|
4.6 MB |
|
6.0 MB |
|
2.3 MB |
|
2.5 MB |
/.../5. Mitigation and Controls/ |
|
|
3.2 MB |
|
3.3 MB |
|
2.3 MB |
39. Vulnerability Assessment, Remediation, Administrative Privileges.mp4 |
2.8 MB |
|
2.4 MB |
|
6.3 MB |
42. Data Recovery & Secure Configuration - Network Devices.mp4 |
4.3 MB |
|
2.7 MB |
44. Wireless Access Control, Account Control & Monitoring.mp4 |
4.0 MB |
|
3.5 MB |
|
2.1 MB |
/.../6. Tools and Tips/ |
|
|
3.2 MB |
|
14.1 MB |
|
16.3 MB |
|
21.5 MB |
|
4.1 MB |
|
7.8 MB |
|
4.4 MB |
|
10.1 MB |
|
3.7 MB |
/Assessing and Mitigating Security Risks/ |
|
|
8.0 MB |
/1. Course Overview/ |
|
|
3.7 MB |
/2. Auditing IAM/ |
|
|
2.9 MB |
|
6.0 MB |
|
7.0 MB |
|
2.0 MB |
|
4.1 MB |
|
3.5 MB |
|
5.3 MB |
|
2.9 MB |
|
6.6 MB |
|
2.6 MB |
|
10.6 MB |
|
1.5 MB |
/3. Auditing VPC/ |
|
|
2.9 MB |
|
4.5 MB |
|
2.3 MB |
|
1.7 MB |
|
2.8 MB |
|
1.7 MB |
|
1.5 MB |
|
2.2 MB |
|
1.7 MB |
|
2.3 MB |
|
9.3 MB |
|
837.4 KB |
|
1.5 MB |
|
1.4 MB |
|
834.7 KB |
|
11.2 MB |
|
1.4 MB |
/4. Auditing EC2/ |
|
|
1.9 MB |
|
2.6 MB |
|
3.3 MB |
|
2.2 MB |
|
7.9 MB |
|
12.2 MB |
|
799.6 KB |
|
4.7 MB |
|
1.8 MB |
|
3.2 MB |
|
7.9 MB |
|
905.8 KB |
/5. Auditing EBS/ |
|
|
1.6 MB |
|
2.6 MB |
|
3.9 MB |
|
10.1 MB |
|
5.2 MB |
|
2.1 MB |
|
15.4 MB |
|
1.0 MB |
/6. Auditing S3/ |
|
|
2.3 MB |
|
3.5 MB |
|
2.5 MB |
|
3.1 MB |
55. Demo - Uploading and Object with Server Side Encryption.mp4 |
3.3 MB |
|
6.5 MB |
|
2.0 MB |
|
1.1 MB |
|
1.5 MB |
/Auditing AWS Environments for Security and Best Practices/ |
|
|
949.9 KB |
/.../1. Splat to GAiA Distributed Deployment Upgrades/ |
|
|
5.9 MB |
|
32.1 MB |
|
5.0 MB |
|
1.8 MB |
|
4.2 MB |
|
3.1 MB |
/.../2. Splat to GAiA Stand-Alone Deployment Upgrades/ |
|
|
5.7 MB |
|
17.0 MB |
|
1.8 MB |
|
3.4 MB |
|
8.8 MB |
|
36.9 MB |
|
3.7 MB |
/3. GAiA Upgrades/ |
|
|
2.7 MB |
|
7.4 MB |
|
4.3 MB |
|
4.6 MB |
|
2.4 MB |
|
1.4 MB |
|
4.8 MB |
|
2.1 MB |
/4. Splat Backup/ |
|
|
2.4 MB |
|
11.0 MB |
|
5.3 MB |
|
55.6 MB |
|
1.8 MB |
/.../5. GAiA Backup Options/ |
|
|
2.2 MB |
|
33.8 MB |
|
15.3 MB |
|
2.8 MB |
/6. Disaster Recovery/ |
|
|
3.0 MB |
|
5.2 MB |
|
8.9 MB |
|
43.8 MB |
|
2.2 MB |
/Check Point Certified Security Administrator - Backup and Updating/ |
|
check-point-certified-security-administrator-backup-updating.zip |
725.9 KB |
/.../1. Check Point History/ |
|
|
9.3 MB |
|
33.4 MB |
/.../10. R76 Smart Dashboard and DMZ Deployment/ |
|
|
360.7 KB |
|
33.6 MB |
|
17.0 MB |
|
41.1 MB |
|
8.9 MB |
/.../2. Workstation Settings and Network Topology/ |
|
|
1.1 MB |
|
6.6 MB |
|
17.6 MB |
|
9.7 MB |
|
3.4 MB |
/.../3. Stand-Alone Management Install/ |
|
|
301.4 KB |
|
15.3 MB |
|
8.8 MB |
|
21.8 MB |
|
19.0 MB |
|
5.9 MB |
/.../4. Stand-Alone Firewall Install/ |
|
|
262.5 KB |
|
39.6 MB |
|
75.6 MB |
|
15.3 MB |
/5. Smart Dashboard/ |
|
|
233.3 KB |
|
43.8 MB |
|
28.2 MB |
|
47.5 MB |
|
9.5 MB |
|
13.5 MB |
/6. Policy Package/ |
|
|
208.3 KB |
|
60.3 MB |
/.../7. Network Address Translation/ |
|
|
317.1 KB |
|
76.1 MB |
/.../8. Distributed GAiA Firewall/ |
|
|
323.7 KB |
|
19.9 MB |
|
13.3 MB |
|
30.0 MB |
/.../9. Distributed GAiA Management/ |
|
|
326.2 KB |
|
12.7 MB |
|
1.7 MB |
|
8.8 MB |
|
8.8 MB |
|
24.7 MB |
/Check Point Certified Security Administrator - Install & Deploy/ |
|
check-point-certified-security-administrator-install-deploy.zip |
40.3 KB |
/1. Introduction/ |
|
|
1.2 MB |
|
1.1 MB |
/.../2. Information and Asset Classification/ |
|
03. Introduction to Information and Asset Classification.mp4 |
9.2 MB |
|
6.5 MB |
|
2.5 MB |
|
2.4 MB |
|
4.1 MB |
|
866.3 KB |
/.../3. Data and System Ownership/ |
|
|
2.1 MB |
|
4.9 MB |
|
4.9 MB |
|
2.1 MB |
|
1.4 MB |
|
648.2 KB |
/4. Privacy Protection/ |
|
|
3.6 MB |
|
2.2 MB |
|
3.2 MB |
18. How Is Privacy Protection Related to Data Classification.mp4 |
1.9 MB |
|
1.9 MB |
|
1.6 MB |
|
909.9 KB |
/5. Appropriate Retention/ |
|
|
2.7 MB |
|
2.3 MB |
|
2.0 MB |
|
1.7 MB |
|
6.1 MB |
|
1.4 MB |
|
946.5 KB |
/.../6. Data Security Controls/ |
|
|
1.7 MB |
|
2.2 MB |
|
2.4 MB |
|
7.9 MB |
|
1.7 MB |
34. Automation Is Your Friend for Data Security Controls.mp4 |
2.8 MB |
|
787.6 KB |
/7. Handling Requirements/ |
|
|
1.2 MB |
|
2.0 MB |
38. How Does Classification Impact Handling Requirements.mp4 |
1.4 MB |
|
2.0 MB |
|
1.1 MB |
/CISSP® - Asset Security/ |
|
|
5.1 MB |
/1. Course Overview/ |
|
|
3.6 MB |
/2. Introduction/ |
|
|
1.4 MB |
003. What Is Communications and Network Security and What's Next.mp4 |
3.2 MB |
/.../3. Secure Network Architecture and Design/ |
|
004. Introduction to Secure Network Architecture and Design.mp4 |
2.2 MB |
|
1.9 MB |
|
1.0 MB |
|
731.4 KB |
|
1.2 MB |
|
1.9 MB |
|
2.1 MB |
|
1.0 MB |
|
719.3 KB |
|
1.8 MB |
|
2.4 MB |
|
3.7 MB |
|
5.5 MB |
|
1.9 MB |
|
2.3 MB |
|
2.5 MB |
|
5.4 MB |
|
1.2 MB |
/.../4. Supervisory Control and Data Acquisition (SCADA)/ |
|
022. Introduction to Supervisory Control and Data Acquisition.mp4 |
1.7 MB |
|
1.7 MB |
|
1.6 MB |
|
2.2 MB |
|
803.4 KB |
/5. Network Protocols/ |
|
|
1.8 MB |
|
901.3 KB |
|
2.8 MB |
|
1.8 MB |
|
2.2 MB |
|
4.9 MB |
|
788.2 KB |
|
4.3 MB |
|
804.0 KB |
|
1.5 MB |
|
2.0 MB |
|
3.1 MB |
|
1.3 MB |
/.../6. Securing Network Components/ |
|
|
1.9 MB |
|
1.5 MB |
|
281.6 KB |
|
1.9 MB |
|
1.3 MB |
|
2.2 MB |
|
1.1 MB |
|
1.3 MB |
|
201.8 KB |
|
1.3 MB |
|
1.9 MB |
|
1.2 MB |
|
1.6 MB |
|
1.8 MB |
|
1.3 MB |
|
1.1 MB |
/7. Communication Channels/ |
|
|
1.7 MB |
|
1.6 MB |
|
2.1 MB |
|
651.0 KB |
|
293.9 KB |
|
978.3 KB |
|
746.7 KB |
|
1.3 MB |
|
641.4 KB |
|
2.1 MB |
|
1.6 MB |
|
1.3 MB |
|
1.0 MB |
|
1.1 MB |
|
859.3 KB |
|
1.1 MB |
|
302.8 KB |
|
2.2 MB |
|
3.6 MB |
|
1.4 MB |
|
2.0 MB |
|
1.6 MB |
|
1.2 MB |
|
503.9 KB |
|
564.2 KB |
|
635.1 KB |
|
1.0 MB |
|
2.1 MB |
|
1.2 MB |
|
285.4 KB |
|
1.2 MB |
|
565.8 KB |
|
976.4 KB |
|
928.3 KB |
|
1.1 MB |
|
672.4 KB |
|
1.6 MB |
|
1.3 MB |
/8. Network Attacks/ |
|
|
1.1 MB |
|
339.5 KB |
|
1.5 MB |
|
632.4 KB |
|
2.3 MB |
|
1.7 MB |
|
1.2 MB |
|
4.0 MB |
|
532.1 KB |
|
3.4 MB |
|
2.6 MB |
|
2.3 MB |
|
1.5 MB |
/CISSP® - Communications and Network Security/ |
|
|
10.0 MB |
/1. Course Overview/ |
|
|
6.0 MB |
/.../2. Control Physical and Logical Access to Assets/ |
|
|
8.7 MB |
|
17.3 MB |
|
15.2 MB |
|
3.2 MB |
/.../3. Manage Identification and Authentication of People and Devices/ |
|
06. Manage Identification and Authentication of People and Devices.mp4 |
6.6 MB |
|
14.8 MB |
|
6.3 MB |
|
8.5 MB |
|
9.5 MB |
|
11.4 MB |
|
1.9 MB |
/.../4. Integrate Identity as a Service/ |
|
|
8.2 MB |
/.../5. Integrate Third-party Identity Services/ |
|
|
5.4 MB |
/.../6. Implement and Manage Authorization Mechanisms/ |
|
|
13.8 MB |
|
13.3 MB |
|
8.4 MB |
|
877.1 KB |
/.../7. Prevent or Mitigate Access Control Attacks/ |
|
|
12.6 MB |
|
1.2 MB |
/.../8. Manage the Identity and Access Provisioning Lifecycle/ |
|
21. Manage the Identity and Access Provisioning Lifecycle.mp4 |
14.4 MB |
|
789.9 KB |
/CISSP® - Identity and Access Management/ |
|
|
1.8 MB |
/1. Course Overview/ |
|
|
6.8 MB |
/.../10. Security Awareness/ |
|
|
1.8 MB |
|
9.1 MB |
|
5.3 MB |
|
4.1 MB |
|
8.5 MB |
|
1.4 MB |
/.../11. Aligning Security to the Organization/ |
|
|
1.9 MB |
|
1.1 MB |
|
11.9 MB |
|
3.0 MB |
|
6.1 MB |
|
2.5 MB |
|
1.4 MB |
/.../12. Creating Policies, Procedures, Guidelines, and Baselines/ |
|
|
2.0 MB |
|
8.0 MB |
|
7.9 MB |
|
5.6 MB |
|
5.1 MB |
|
2.0 MB |
|
4.0 MB |
|
2.5 MB |
/.../13. Continuity Planning and Disaster Recovery/ |
|
|
1.9 MB |
|
1.8 MB |
|
1.8 MB |
076. Disaster Recovery Planning vs. Business Continuity Planning.mp4 |
3.0 MB |
|
2.6 MB |
|
981.2 KB |
|
1.5 MB |
|
3.7 MB |
|
647.1 KB |
/.../14. Threat Modeling/ |
|
|
2.0 MB |
|
3.9 MB |
|
4.8 MB |
|
3.5 MB |
|
2.0 MB |
|
1.6 MB |
|
5.1 MB |
|
1.9 MB |
|
1.1 MB |
|
1.7 MB |
/.../15. Risk Assessment Concepts/ |
|
|
2.1 MB |
|
2.8 MB |
|
2.9 MB |
|
2.1 MB |
|
772.4 KB |
|
2.9 MB |
|
2.7 MB |
|
3.5 MB |
|
891.4 KB |
|
1.1 MB |
|
3.4 MB |
|
1.6 MB |
|
1.1 MB |
/.../16. Countermeasure Selection Process/ |
|
|
2.1 MB |
|
2.1 MB |
|
2.1 MB |
|
2.5 MB |
|
3.0 MB |
|
3.5 MB |
|
1.2 MB |
|
6.0 MB |
|
1.3 MB |
/17. Frameworks/ |
|
|
2.7 MB |
|
1.2 MB |
|
2.0 MB |
|
9.1 MB |
|
4.3 MB |
|
3.2 MB |
|
918.9 KB |
/2. Introduction/ |
|
|
9.4 MB |
/.../3. Fundamental Security Principles/ |
|
|
3.3 MB |
|
8.6 MB |
|
3.3 MB |
|
16.2 MB |
|
9.2 MB |
|
3.1 MB |
|
7.5 MB |
|
3.6 MB |
|
4.9 MB |
|
1.3 MB |
/.../4. Legal and Regulatory/ |
|
|
1.7 MB |
|
999.1 KB |
|
3.8 MB |
|
3.6 MB |
|
12.3 MB |
|
640.7 KB |
/5. Computer Crime/ |
|
|
1.4 MB |
|
5.7 MB |
|
3.1 MB |
|
4.2 MB |
|
5.2 MB |
|
5.8 MB |
|
2.9 MB |
|
4.7 MB |
|
2.8 MB |
/6. Intellectual Property/ |
|
|
1.2 MB |
|
3.7 MB |
|
2.4 MB |
|
2.8 MB |
|
647.4 KB |
/7. Privacy/ |
|
|
1.8 MB |
|
8.5 MB |
|
15.3 MB |
|
1.7 MB |
/8. Licensing/ |
|
|
1.2 MB |
|
3.3 MB |
|
507.7 KB |
|
4.2 MB |
|
4.9 MB |
|
1.1 MB |
|
4.8 MB |
|
1.8 MB |
|
1.9 MB |
|
1.3 MB |
|
1.2 MB |
/.../9. Trans-border Data Flow/ |
|
|
1.5 MB |
|
8.6 MB |
|
5.0 MB |
|
1.9 MB |
/CISSP® - Security and Risk Management/ |
|
|
21.9 MB |
/1. Course Overview/ |
|
|
4.1 MB |
/.../2. Assessment and Testing Strategies/ |
|
|
5.8 MB |
|
13.8 MB |
|
5.0 MB |
|
9.1 MB |
|
2.8 MB |
|
3.0 MB |
|
6.9 MB |
|
1.2 MB |
/.../3. Security Control Effectiveness Testing/ |
|
|
2.3 MB |
|
9.3 MB |
|
2.5 MB |
|
3.3 MB |
|
2.4 MB |
|
878.9 KB |
|
2.0 MB |
|
4.9 MB |
|
2.0 MB |
|
2.3 MB |
|
3.1 MB |
|
6.8 MB |
|
2.1 MB |
|
1.3 MB |
|
938.7 KB |
|
3.8 MB |
|
11.2 MB |
|
4.3 MB |
|
9.6 MB |
|
4.3 MB |
|
1.2 MB |
/.../4. Security Process Data Collection/ |
|
|
1.9 MB |
|
1.8 MB |
|
2.9 MB |
|
2.5 MB |
|
2.6 MB |
|
1.7 MB |
|
1.1 MB |
|
1.3 MB |
/.../5. Test Result Analysis/ |
|
|
2.0 MB |
|
429.2 KB |
|
1.4 MB |
|
2.5 MB |
|
943.3 KB |
|
402.7 KB |
|
2.0 MB |
|
6.4 MB |
|
1.2 MB |
/.../6. Third-party Assessment/ |
|
|
2.0 MB |
|
1.8 MB |
|
1.3 MB |
|
968.9 KB |
|
1.3 MB |
|
1.5 MB |
|
959.8 KB |
/.../7. Information Security Continuous Monitoring/ |
|
|
1.7 MB |
|
996.3 KB |
|
817.2 KB |
|
1.9 MB |
|
1.4 MB |
|
1.4 MB |
|
1.3 MB |
|
1.5 MB |
|
1.1 MB |
|
1.4 MB |
/.../Advanced Malware Analysis - Combating Exploit Kits/1. Course Overview/ |
|
|
3.9 MB |
/.../10. Reversing Malware with Debugging Tools/ |
|
|
1.0 MB |
|
35.2 MB |
|
15.4 MB |
|
18.8 MB |
/.../11. Reversing Malware with IDA pro/ |
|
|
987.8 KB |
|
35.5 MB |
|
11.0 MB |
|
10.5 MB |
/.../12. Customizing Reports - From Researchers to CISOs/ |
|
|
13.6 MB |
|
2.5 MB |
|
536.1 KB |
/.../Advanced Malware Analysis - Combating Exploit Kits/2. Introduction/ |
|
|
2.0 MB |
|
28.6 MB |
|
7.9 MB |
|
715.3 KB |
/.../3. Recognizing the Exploit Vector/ |
|
|
6.9 MB |
|
22.0 MB |
|
19.3 MB |
|
310.8 KB |
/.../4. Unraveling Exploit Obfuscation/ |
|
|
10.7 MB |
|
19.7 MB |
|
14.9 MB |
|
674.3 KB |
/.../5. Circumventing Exploit Kit Encryption/ |
|
|
4.0 MB |
|
6.0 MB |
|
8.1 MB |
|
659.7 KB |
/.../6. Understanding Moving Target Communications/ |
|
|
4.1 MB |
|
8.8 MB |
|
3.9 MB |
|
1.9 MB |
/.../7. Detecting Angler in the Wild/ |
|
|
2.4 MB |
|
3.9 MB |
|
4.7 MB |
|
6.7 MB |
/.../8. Performing Safe Dynamic Analysis/ |
|
|
4.6 MB |
|
6.6 MB |
|
11.2 MB |
|
1.3 MB |
/.../9. Analyzing Files Statically/ |
|
|
8.9 MB |
|
20.3 MB |
|
8.6 MB |
|
1.7 MB |
/.../Advanced Malware Analysis - Combating Exploit Kits/ |
|
|
26.5 MB |
/.../Advanced Persistent Threats - The Big Picture/1. Course Overview/ |
|
|
5.1 MB |
/.../2. What Is an Advanced Persistent Threat/ |
|
|
5.3 MB |
|
1.4 MB |
|
9.0 MB |
|
12.2 MB |
06. Why Is Classifying Every Threat as an APT a Bad Idea.mp4 |
3.9 MB |
|
1.2 MB |
/.../3. Understanding the History of APTs/ |
|
|
2.3 MB |
|
11.9 MB |
|
12.5 MB |
|
5.9 MB |
|
4.8 MB |
|
806.8 KB |
/.../4. How Does an APT Work/ |
|
|
3.2 MB |
|
11.8 MB |
|
5.6 MB |
|
939.3 KB |
/.../5. Who Are They, and Why Do They Do What They Do/ |
|
|
2.5 MB |
|
14.0 MB |
/.../6. How Do You Detect APTs/ |
|
|
2.2 MB |
|
2.8 MB |
|
20.8 MB |
|
1.1 MB |
/.../7. Defending Against APTs - Best Practices and Mitigation Strategies/ |
|
|
4.8 MB |
|
9.0 MB |
|
2.2 MB |
|
5.5 MB |
|
4.3 MB |
|
4.4 MB |
|
5.3 MB |
|
1.1 MB |
|
2.8 MB |
/.../Advanced Persistent Threats - The Big Picture/ |
|
|
6.3 MB |
/.../Advanced Web Application Penetration Testing with Burp Suite/1. Course Overview/ |
|
|
7.1 MB |
/.../2. Setting up Your Burp Suite Environment for This Course/ |
|
|
1.5 MB |
|
14.7 MB |
|
2.6 MB |
|
5.0 MB |
/.../3. Hybrid Spidering Your Web Application/ |
|
|
8.7 MB |
|
4.1 MB |
|
14.4 MB |
|
10.7 MB |
|
6.7 MB |
|
8.0 MB |
/.../5. Integrating Burp and File Attacks/ |
|
|
8.4 MB |
|
13.4 MB |
|
4.7 MB |
|
6.0 MB |
/.../6. Writing Your Own Burp Extension and Exercising Automation/ |
|
|
31.6 MB |
|
6.9 MB |
/.../Advanced Web Application Penetration Testing with Burp Suite/ |
|
|
1.1 MB |
/.../ASP.NET Security Secrets Revealed/1. Introduction/ |
|
|
5.1 MB |
/.../ASP.NET Security Secrets Revealed/2. Configuration/ |
|
|
15.5 MB |
|
19.3 MB |
|
8.2 MB |
|
4.5 MB |
|
26.2 MB |
|
7.6 MB |
|
4.9 MB |
|
23.9 MB |
|
17.6 MB |
|
11.1 MB |
|
11.3 MB |
|
11.5 MB |
|
12.8 MB |
|
13.1 MB |
|
13.1 MB |
|
21.5 MB |
|
5.4 MB |
/.../3. Membership, Identity and Roles/ |
|
|
17.2 MB |
|
10.3 MB |
|
7.6 MB |
|
4.5 MB |
|
12.2 MB |
|
13.3 MB |
|
10.1 MB |
|
14.0 MB |
|
28.3 MB |
|
20.8 MB |
|
13.6 MB |
|
5.1 MB |
/.../ASP.NET Security Secrets Revealed/4. MVC/ |
|
|
23.1 MB |
|
12.5 MB |
|
25.3 MB |
|
21.5 MB |
|
17.0 MB |
|
12.6 MB |
|
11.4 MB |
|
14.5 MB |
|
5.0 MB |
/.../ASP.NET Security Secrets Revealed/5. Web Forms/ |
|
|
19.3 MB |
|
18.0 MB |
|
17.3 MB |
|
40.5 MB |
|
32.7 MB |
|
20.4 MB |
|
34.5 MB |
|
20.8 MB |
|
6.8 MB |
/.../6. General Security Principles and Tools/ |
|
|
12.6 MB |
|
31.4 MB |
|
18.6 MB |
|
28.6 MB |
|
14.3 MB |
|
19.9 MB |
|
9.0 MB |
|
30.6 MB |
|
8.3 MB |
/.../ASP.NET Security Secrets Revealed/ |
|
|
83.5 MB |
/.../Assessing and Mitigating Security Risks/1. Course Overview/ |
|
|
4.6 MB |
/.../2. What's the Landscape Like/ |
|
|
8.7 MB |
|
3.8 MB |
|
8.0 MB |
|
3.9 MB |
|
6.6 MB |
|
4.4 MB |
|
6.3 MB |
|
9.0 MB |
|
2.4 MB |
|
13.7 MB |
|
5.6 MB |
|
6.4 MB |
|
7.4 MB |
|
2.0 MB |
/.../3. What Is Risk Assessment/ |
|
|
10.7 MB |
|
3.8 MB |
|
3.8 MB |
|
7.6 MB |
|
10.0 MB |
|
3.3 MB |
|
1.4 MB |
/.../4. Successful Risk Assessments/ |
|
|
3.4 MB |
|
3.8 MB |
|
3.5 MB |
|
1.9 MB |
|
2.6 MB |
|
4.6 MB |
|
8.9 MB |
|
7.9 MB |
|
1.5 MB |
|
4.6 MB |
|
6.0 MB |
|
2.3 MB |
|
2.5 MB |
/.../5. Mitigation and Controls/ |
|
|
3.2 MB |
|
3.3 MB |
|
2.3 MB |
39. Vulnerability Assessment, Remediation, Administrative Privileges.mp4 |
2.8 MB |
|
2.4 MB |
|
6.3 MB |
42. Data Recovery & Secure Configuration - Network Devices.mp4 |
4.3 MB |
|
2.7 MB |
44. Wireless Access Control, Account Control & Monitoring.mp4 |
4.0 MB |
|
3.5 MB |
|
2.1 MB |
/.../6. Tools and Tips/ |
|
|
3.2 MB |
|
14.1 MB |
|
16.3 MB |
|
21.5 MB |
|
4.1 MB |
|
7.8 MB |
|
4.4 MB |
|
10.1 MB |
|
3.7 MB |
/.../Assessing and Mitigating Security Risks/ |
|
|
8.0 MB |
/.../Auditing AWS Environments for Security and Best Practices/1. Course Overview/ |
|
|
3.7 MB |
/.../Auditing AWS Environments for Security and Best Practices/2. Auditing IAM/ |
|
|
2.9 MB |
|
6.0 MB |
|
7.0 MB |
|
2.0 MB |
|
4.1 MB |
|
3.5 MB |
|
5.3 MB |
|
2.9 MB |
|
6.6 MB |
|
2.6 MB |
|
10.6 MB |
|
1.5 MB |
/.../Auditing AWS Environments for Security and Best Practices/3. Auditing VPC/ |
|
|
2.9 MB |
|
4.5 MB |
|
2.3 MB |
|
1.7 MB |
|
2.8 MB |
|
1.7 MB |
|
1.5 MB |
|
2.2 MB |
|
1.7 MB |
|
2.3 MB |
|
9.3 MB |
|
837.4 KB |
|
1.5 MB |
|
1.4 MB |
|
834.7 KB |
|
11.2 MB |
|
1.4 MB |
/.../Auditing AWS Environments for Security and Best Practices/4. Auditing EC2/ |
|
|
1.9 MB |
|
2.6 MB |
|
3.3 MB |
|
2.2 MB |
|
7.9 MB |
|
12.2 MB |
|
799.6 KB |
|
4.7 MB |
|
1.8 MB |
|
3.2 MB |
|
7.9 MB |
|
905.8 KB |
/.../Auditing AWS Environments for Security and Best Practices/5. Auditing EBS/ |
|
|
1.6 MB |
|
2.6 MB |
|
3.9 MB |
|
10.1 MB |
|
5.2 MB |
|
2.1 MB |
|
15.4 MB |
|
1.0 MB |
/.../Auditing AWS Environments for Security and Best Practices/6. Auditing S3/ |
|
|
2.3 MB |
|
3.5 MB |
|
2.5 MB |
|
3.1 MB |
55. Demo - Uploading and Object with Server Side Encryption.mp4 |
3.3 MB |
|
6.5 MB |
|
2.0 MB |
|
1.1 MB |
|
1.5 MB |
/.../Auditing AWS Environments for Security and Best Practices/ |
|
|
949.9 KB |
/.../1. Splat to GAiA Distributed Deployment Upgrades/ |
|
|
5.9 MB |
|
5.0 MB |
|
1.8 MB |
|
4.2 MB |
|
3.1 MB |
/.../2. Splat to GAiA Stand-Alone Deployment Upgrades/ |
|
|
5.7 MB |
|
17.0 MB |
|
1.8 MB |
|
3.4 MB |
|
8.8 MB |
|
36.9 MB |
|
3.7 MB |
/.../Check Point Certified Security Administrator - Backup and Updating/3. GAiA Upgrades/ |
|
|
2.7 MB |
|
7.4 MB |
|
4.3 MB |
|
4.6 MB |
|
2.4 MB |
|
1.4 MB |
|
4.8 MB |
|
2.1 MB |
/.../Check Point Certified Security Administrator - Backup and Updating/4. Splat Backup/ |
|
|
2.4 MB |
|
11.0 MB |
|
5.3 MB |
|
55.6 MB |
|
1.8 MB |
/.../5. GAiA Backup Options/ |
|
|
2.2 MB |
|
33.8 MB |
|
15.3 MB |
|
2.8 MB |
/.../Check Point Certified Security Administrator - Backup and Updating/6. Disaster Recovery/ |
|
|
3.0 MB |
|
5.2 MB |
|
8.9 MB |
|
43.8 MB |
|
2.2 MB |
/.../Check Point Certified Security Administrator - Backup and Updating/ |
|
check-point-certified-security-administrator-backup-updating.zip |
725.9 KB |
/.../1. Check Point History/ |
|
|
9.3 MB |
|
33.4 MB |
/.../10. R76 Smart Dashboard and DMZ Deployment/ |
|
|
33.6 MB |
|
17.0 MB |
|
41.1 MB |
|
8.9 MB |
/.../2. Workstation Settings and Network Topology/ |
|
|
1.1 MB |
|
6.6 MB |
|
17.6 MB |
|
9.7 MB |
|
3.4 MB |
/.../3. Stand-Alone Management Install/ |
|
|
301.4 KB |
|
15.3 MB |
|
8.8 MB |
|
21.8 MB |
|
19.0 MB |
|
5.9 MB |
/.../4. Stand-Alone Firewall Install/ |
|
|
262.5 KB |
|
39.6 MB |
|
75.6 MB |
|
15.3 MB |
/.../Check Point Certified Security Administrator - Install & Deploy/5. Smart Dashboard/ |
|
|
233.3 KB |
|
43.8 MB |
|
28.2 MB |
|
47.5 MB |
|
9.5 MB |
|
13.5 MB |
/.../Check Point Certified Security Administrator - Install & Deploy/6. Policy Package/ |
|
|
208.3 KB |
|
60.3 MB |
/.../7. Network Address Translation/ |
|
|
317.1 KB |
|
76.1 MB |
/.../8. Distributed GAiA Firewall/ |
|
|
323.7 KB |
|
19.9 MB |
|
13.3 MB |
|
30.0 MB |
/.../9. Distributed GAiA Management/ |
|
|
326.2 KB |
|
12.7 MB |
|
1.7 MB |
|
8.8 MB |
|
8.8 MB |
|
24.7 MB |
/.../Check Point Certified Security Administrator - Install & Deploy/ |
|
check-point-certified-security-administrator-install-deploy.zip |
40.3 KB |
/CISSP® - Security Assessment and Testing/ |
|
|
2.0 MB |
/.../CISSP® - Asset Security/1. Introduction/ |
|
|
1.2 MB |
|
1.1 MB |
/.../2. Information and Asset Classification/ |
|
03. Introduction to Information and Asset Classification.mp4 |
9.2 MB |
|
6.5 MB |
|
2.5 MB |
|
2.4 MB |
|
4.1 MB |
|
866.3 KB |
/.../3. Data and System Ownership/ |
|
|
2.1 MB |
|
4.9 MB |
|
4.9 MB |
|
2.1 MB |
|
1.4 MB |
|
648.2 KB |
/.../CISSP® - Asset Security/4. Privacy Protection/ |
|
|
3.6 MB |
|
2.2 MB |
|
3.2 MB |
18. How Is Privacy Protection Related to Data Classification.mp4 |
1.9 MB |
|
1.9 MB |
|
1.6 MB |
|
909.9 KB |
/.../CISSP® - Asset Security/5. Appropriate Retention/ |
|
|
2.7 MB |
|
2.3 MB |
|
2.0 MB |
|
1.7 MB |
|
6.1 MB |
|
1.4 MB |
|
946.5 KB |
/.../6. Data Security Controls/ |
|
|
1.7 MB |
|
2.2 MB |
|
2.4 MB |
|
7.9 MB |
|
1.7 MB |
34. Automation Is Your Friend for Data Security Controls.mp4 |
2.8 MB |
|
787.6 KB |
/.../CISSP® - Asset Security/7. Handling Requirements/ |
|
|
1.2 MB |
|
2.0 MB |
38. How Does Classification Impact Handling Requirements.mp4 |
1.4 MB |
|
2.0 MB |
|
1.1 MB |
/.../CISSP® - Asset Security/ |
|
|
5.1 MB |
/.../CISSP® - Communications and Network Security/1. Course Overview/ |
|
|
3.6 MB |
/.../CISSP® - Communications and Network Security/2. Introduction/ |
|
|
1.4 MB |
003. What Is Communications and Network Security and What's Next.mp4 |
3.2 MB |
/.../3. Secure Network Architecture and Design/ |
|
004. Introduction to Secure Network Architecture and Design.mp4 |
2.2 MB |
|
1.9 MB |
|
1.0 MB |
|
731.4 KB |
|
1.2 MB |
|
1.9 MB |
|
2.1 MB |
|
1.0 MB |
|
719.3 KB |
|
1.8 MB |
|
2.4 MB |
|
3.7 MB |
|
5.5 MB |
|
1.9 MB |
|
2.3 MB |
|
2.5 MB |
|
5.4 MB |
|
1.2 MB |
/.../4. Supervisory Control and Data Acquisition (SCADA)/ |
|
|
1.7 MB |
|
1.6 MB |
|
2.2 MB |
|
803.4 KB |
/.../CISSP® - Communications and Network Security/5. Network Protocols/ |
|
|
1.8 MB |
|
901.3 KB |
|
2.8 MB |
|
1.8 MB |
|
2.2 MB |
|
4.9 MB |
|
788.2 KB |
|
4.3 MB |
|
804.0 KB |
|
1.5 MB |
|
2.0 MB |
|
3.1 MB |
|
1.3 MB |
/.../6. Securing Network Components/ |
|
|
1.9 MB |
|
1.5 MB |
|
281.6 KB |
|
1.9 MB |
|
1.3 MB |
|
2.2 MB |
|
1.1 MB |
|
1.3 MB |
|
201.8 KB |
|
1.3 MB |
|
1.9 MB |
|
1.2 MB |
|
1.6 MB |
|
1.8 MB |
|
1.3 MB |
|
1.1 MB |
/.../CISSP® - Communications and Network Security/7. Communication Channels/ |
|
|
1.7 MB |
|
1.6 MB |
|
2.1 MB |
|
651.0 KB |
|
293.9 KB |
|
978.3 KB |
|
746.7 KB |
|
1.3 MB |
|
641.4 KB |
|
2.1 MB |
|
1.6 MB |
|
1.3 MB |
|
1.0 MB |
|
1.1 MB |
|
859.3 KB |
|
1.1 MB |
|
302.8 KB |
|
2.2 MB |
|
3.6 MB |
|
1.4 MB |
|
2.0 MB |
|
1.6 MB |
|
1.2 MB |
|
503.9 KB |
|
564.2 KB |
|
635.1 KB |
|
1.0 MB |
|
2.1 MB |
|
1.2 MB |
|
285.4 KB |
|
1.2 MB |
|
565.8 KB |
|
976.4 KB |
|
928.3 KB |
|
1.1 MB |
|
672.4 KB |
|
1.6 MB |
|
1.3 MB |
/.../CISSP® - Communications and Network Security/8. Network Attacks/ |
|
|
1.1 MB |
|
339.5 KB |
|
1.5 MB |
|
632.4 KB |
|
2.3 MB |
|
1.7 MB |
|
1.2 MB |
|
4.0 MB |
|
532.1 KB |
|
3.4 MB |
|
2.6 MB |
|
2.3 MB |
|
1.5 MB |
/.../CISSP® - Communications and Network Security/ |
|
|
10.0 MB |
/.../CISSP® - Identity and Access Management/1. Course Overview/ |
|
|
6.0 MB |
/.../2. Control Physical and Logical Access to Assets/ |
|
|
8.7 MB |
|
17.3 MB |
|
15.2 MB |
|
3.2 MB |
/.../3. Manage Identification and Authentication of People and Devices/ |
|
|
14.8 MB |
|
6.3 MB |
|
8.5 MB |
|
9.5 MB |
|
11.4 MB |
|
1.9 MB |
/.../4. Integrate Identity as a Service/ |
|
|
8.2 MB |
/.../5. Integrate Third-party Identity Services/ |
|
|
5.4 MB |
/.../6. Implement and Manage Authorization Mechanisms/ |
|
|
13.8 MB |
|
13.3 MB |
|
8.4 MB |
|
877.1 KB |
/.../7. Prevent or Mitigate Access Control Attacks/ |
|
|
12.6 MB |
|
1.2 MB |
/.../8. Manage the Identity and Access Provisioning Lifecycle/ |
|
21. Manage the Identity and Access Provisioning Lifecycle.mp4 |
14.4 MB |
|
789.9 KB |
/.../CISSP® - Identity and Access Management/ |
|
|
1.8 MB |
/.../CISSP® - Security and Risk Management/1. Course Overview/ |
|
|
6.8 MB |
/.../10. Security Awareness/ |
|
|
1.8 MB |
|
9.1 MB |
|
5.3 MB |
|
4.1 MB |
|
8.5 MB |
|
1.4 MB |
/.../11. Aligning Security to the Organization/ |
|
|
1.9 MB |
|
1.1 MB |
|
11.9 MB |
|
3.0 MB |
|
6.1 MB |
|
2.5 MB |
|
1.4 MB |
/.../12. Creating Policies, Procedures, Guidelines, and Baselines/ |
|
|
2.0 MB |
|
8.0 MB |
|
7.9 MB |
|
5.6 MB |
|
5.1 MB |
|
2.0 MB |
|
4.0 MB |
|
2.5 MB |
/.../13. Continuity Planning and Disaster Recovery/ |
|
|
1.9 MB |
|
1.8 MB |
|
1.8 MB |
076. Disaster Recovery Planning vs. Business Continuity Planning.mp4 |
3.0 MB |
|
2.6 MB |
|
981.2 KB |
|
1.5 MB |
|
3.7 MB |
|
647.1 KB |
/.../14. Threat Modeling/ |
|
|
2.0 MB |
|
3.9 MB |
|
4.8 MB |
|
3.5 MB |
|
2.0 MB |
|
1.6 MB |
|
5.1 MB |
|
1.9 MB |
|
1.1 MB |
|
1.7 MB |
/.../15. Risk Assessment Concepts/ |
|
|
2.1 MB |
|
2.8 MB |
|
2.9 MB |
|
2.1 MB |
|
772.4 KB |
|
2.9 MB |
|
2.7 MB |
|
3.5 MB |
|
891.4 KB |
|
1.1 MB |
|
3.4 MB |
|
1.6 MB |
|
1.1 MB |
/.../16. Countermeasure Selection Process/ |
|
|
2.1 MB |
|
2.1 MB |
|
2.1 MB |
|
2.5 MB |
|
3.0 MB |
|
3.5 MB |
|
1.2 MB |
|
6.0 MB |
|
1.3 MB |
/.../CISSP® - Security and Risk Management/17. Frameworks/ |
|
|
2.7 MB |
|
1.2 MB |
|
2.0 MB |
|
9.1 MB |
|
4.3 MB |
|
3.2 MB |
|
918.9 KB |
/.../CISSP® - Security and Risk Management/2. Introduction/ |
|
|
9.4 MB |
/.../3. Fundamental Security Principles/ |
|
|
3.3 MB |
|
8.6 MB |
|
3.3 MB |
|
16.2 MB |
|
9.2 MB |
|
3.1 MB |
|
7.5 MB |
|
3.6 MB |
|
4.9 MB |
|
1.3 MB |
/.../4. Legal and Regulatory/ |
|
|
1.7 MB |
|
999.1 KB |
|
3.8 MB |
|
3.6 MB |
|
12.3 MB |
|
640.7 KB |
/.../CISSP® - Security and Risk Management/5. Computer Crime/ |
|
|
1.4 MB |
|
5.7 MB |
|
3.1 MB |
|
4.2 MB |
|
5.2 MB |
|
5.8 MB |
|
2.9 MB |
|
4.7 MB |
|
2.8 MB |
/.../CISSP® - Security and Risk Management/6. Intellectual Property/ |
|
|
1.2 MB |
|
3.7 MB |
|
2.4 MB |
|
2.8 MB |
|
647.4 KB |
/.../CISSP® - Security and Risk Management/7. Privacy/ |
|
|
1.8 MB |
|
8.5 MB |
|
15.3 MB |
|
1.7 MB |
/.../CISSP® - Security and Risk Management/8. Licensing/ |
|
|
1.2 MB |
|
3.3 MB |
|
507.7 KB |
|
4.2 MB |
|
4.9 MB |
|
1.1 MB |
|
4.8 MB |
|
1.8 MB |
|
1.9 MB |
|
1.3 MB |
|
1.2 MB |
/.../9. Trans-border Data Flow/ |
|
|
1.5 MB |
|
8.6 MB |
|
5.0 MB |
|
1.9 MB |
/.../CISSP® - Security and Risk Management/ |
|
|
21.9 MB |
/.../CISSP® - Security Assessment and Testing/1. Course Overview/ |
|
|
4.1 MB |
/.../2. Assessment and Testing Strategies/ |
|
|
5.8 MB |
|
13.8 MB |
|
5.0 MB |
|
9.1 MB |
|
2.8 MB |
|
3.0 MB |
|
6.9 MB |
|
1.2 MB |
/.../3. Security Control Effectiveness Testing/ |
|
|
2.3 MB |
|
9.3 MB |
|
2.5 MB |
|
3.3 MB |
|
2.4 MB |
|
878.9 KB |
|
2.0 MB |
|
4.9 MB |
|
2.0 MB |
|
2.3 MB |
|
3.1 MB |
|
6.8 MB |
|
2.1 MB |
|
1.3 MB |
|
938.7 KB |
|
3.8 MB |
|
11.2 MB |
|
4.3 MB |
|
9.6 MB |
|
4.3 MB |
|
1.2 MB |
/.../4. Security Process Data Collection/ |
|
|
1.9 MB |
|
1.8 MB |
|
2.9 MB |
|
2.5 MB |
|
2.6 MB |
|
1.7 MB |
|
1.1 MB |
|
1.3 MB |
/.../5. Test Result Analysis/ |
|
|
2.0 MB |
|
429.2 KB |
|
1.4 MB |
|
2.5 MB |
|
943.3 KB |
|
402.7 KB |
|
2.0 MB |
|
6.4 MB |
|
1.2 MB |
/.../6. Third-party Assessment/ |
|
|
2.0 MB |
|
1.8 MB |
|
1.3 MB |
|
968.9 KB |
|
1.3 MB |
|
1.5 MB |
|
959.8 KB |
/.../7. Information Security Continuous Monitoring/ |
|
|
1.7 MB |
|
996.3 KB |
|
817.2 KB |
|
1.9 MB |
|
1.4 MB |
|
1.4 MB |
|
1.3 MB |
|
1.5 MB |
|
1.1 MB |
|
1.4 MB |
/.../CISSP® - Security Assessment and Testing/ |
|
|
2.0 MB |
/.../CISSP® - Security Engineering/1. Introduction/ |
|
|
1.7 MB |
|
3.6 MB |
/.../2. Secure Design Principles and Processes/ |
|
03. Introduction to Secure Design Principles and Processes.mp4 |
2.3 MB |
|
2.9 MB |
|
1.8 MB |
|
3.9 MB |
|
1.2 MB |
|
3.1 MB |
|
2.3 MB |
|
2.5 MB |
|
5.0 MB |
|
7.9 MB |
|
5.0 MB |
|
11.1 MB |
|
6.5 MB |
|
6.2 MB |
|
2.0 MB |
/.../3. Fundamental Concepts of Security Models/ |
|
18. Introduction to Fundamental Concepts of Security Models.mp4 |
2.1 MB |
|
1.2 MB |
|
2.5 MB |
|
2.1 MB |
|
1.5 MB |
|
2.7 MB |
|
3.8 MB |
|
524.4 KB |
|
6.7 MB |
|
3.7 MB |
|
931.9 KB |
|
1.7 MB |
|
1.1 MB |
|
1.1 MB |
|
2.7 MB |
|
2.4 MB |
34. Sherwood Applied Business Security Architecture (SABSA).mp4 |
1.8 MB |
|
1.5 MB |
/.../4. Security Evaluation Models/ |
|
|
2.1 MB |
|
3.5 MB |
|
671.8 KB |
|
13.7 MB |
40. Information Technology Security Evaluation Criteria (ITSEC).mp4 |
13.3 MB |
|
5.1 MB |
|
1.6 MB |
|
7.7 MB |
44. Control Objects for Information and Related Technology (COBIT).mp4 |
3.0 MB |
45. Payment Card Industry Data Security Standard (PCI-DSS).mp4 |
8.0 MB |
|
1.7 MB |
/.../5. Security Capabilities of Information Systems/ |
|
47. Introduction to Security Capabilities of Information Systems.mp4 |
1.6 MB |
|
1.4 MB |
|
4.0 MB |
|
2.5 MB |
|
2.8 MB |
|
979.2 KB |
|
2.2 MB |
|
3.0 MB |
|
1.2 MB |
/.../6. Vulnerabilities in Security Architecture and Technology Components/ |
|
|
2.5 MB |
|
9.2 MB |
|
1.9 MB |
|
6.2 MB |
|
4.3 MB |
|
2.0 MB |
/.../CISSP® - Security Engineering/7. Cryptography/ |
|
|
1.6 MB |
|
1.8 MB |
|
5.4 MB |
|
5.2 MB |
|
3.2 MB |
|
2.8 MB |
|
2.3 MB |
|
4.5 MB |
|
1.6 MB |
|
5.9 MB |
|
1.2 MB |
|
1.3 MB |
|
2.1 MB |
|
4.5 MB |
|
2.2 MB |
|
3.0 MB |
|
1.6 MB |
|
1.9 MB |
|
2.1 MB |
|
1.3 MB |
/.../8. Site and Facility Secure Design/ |
|
|
1.6 MB |
|
2.7 MB |
|
2.5 MB |
|
3.5 MB |
|
378.4 KB |
|
2.1 MB |
|
1.5 MB |
|
865.0 KB |
|
2.0 MB |
|
1.8 MB |
/.../CISSP® - Security Engineering/ |
|
|
14.3 MB |
/.../CISSP® - Security Operations/1. Course Overview/ |
|
|
3.6 MB |
/.../10. Evidence Handling/ |
|
|
1.1 MB |
|
4.0 MB |
|
760.9 KB |
/.../11. Resource Provisioning/ |
|
|
1.2 MB |
|
9.0 MB |
|
1.3 MB |
/.../12. Recovery Strategies/ |
|
|
1.3 MB |
|
9.5 MB |
|
741.8 KB |
/.../13. Personnel Privacy and Safety/ |
|
|
756.2 KB |
|
6.7 MB |
|
12.8 MB |
|
1.5 MB |
/.../14. Business Continuity and Disaster Recovery/ |
|
|
1.4 MB |
|
9.7 MB |
|
1.6 MB |
/.../15. Internal Physical Security/ |
|
|
1.1 MB |
|
17.0 MB |
|
2.8 MB |
|
5.3 MB |
|
711.1 KB |
/.../16. Securing Assets/ |
|
|
932.3 KB |
|
8.1 MB |
|
895.1 KB |
/.../17. External Physical Security/ |
|
|
1.4 MB |
|
19.7 MB |
|
9.6 MB |
|
3.0 MB |
|
850.7 KB |
/.../2. Introduction to Security Operations/ |
|
|
3.0 MB |
|
4.9 MB |
|
849.3 KB |
/.../CISSP® - Security Operations/3. Digital Forensics/ |
|
|
2.3 MB |
|
10.1 MB |
|
13.7 MB |
|
1.4 MB |
/.../4. Logging and Monitoring/ |
|
|
889.6 KB |
|
7.2 MB |
|
9.6 MB |
|
10.0 MB |
|
733.6 KB |
/.../CISSP® - Security Operations/5. Vulnerability Management/ |
|
|
950.0 KB |
|
9.8 MB |
|
7.4 MB |
|
881.4 KB |
/.../CISSP® - Security Operations/6. Change Management/ |
|
|
945.8 KB |
|
12.5 MB |
|
901.1 KB |
/.../7. Operate and Maintain Protective Controls/ |
|
|
1.2 MB |
|
15.0 MB |
|
3.2 MB |
/.../CISSP® - Security Operations/8. Incident Management/ |
|
|
832.0 KB |
|
4.9 MB |
|
5.6 MB |
|
588.1 KB |
/.../CISSP® - Security Operations/9. Investigative Types/ |
|
|
1.1 MB |
|
5.1 MB |
|
1.2 MB |
/.../CISSP® - Security Operations/ |
|
|
9.4 MB |
/.../CISSP® - Software Development Security/1. Introduction/ |
|
|
4.4 MB |
|
9.8 MB |
/.../CISSP® - Software Development Security/2. Application Security/ |
|
|
2.5 MB |
|
18.9 MB |
|
12.9 MB |
|
13.5 MB |
|
11.8 MB |
|
3.1 MB |
/.../3. Development Life Cycle/ |
|
|
2.7 MB |
|
6.2 MB |
|
14.8 MB |
|
13.0 MB |
|
16.3 MB |
|
7.4 MB |
|
959.6 KB |
/.../4. Security Impact of Acquired Software/ |
|
|
1.2 MB |
|
12.8 MB |
|
18.2 MB |
|
2.1 MB |
/.../CISSP® - Software Development Security/5. Software Threats/ |
|
|
1.1 MB |
|
10.8 MB |
22. Path Traversal, Covert Channels, DOS, Trap Doors, Flaws.mp4 |
18.5 MB |
|
13.2 MB |
24. File Inclusion, Violations, Undocumented Functionality.mp4 |
7.0 MB |
|
2.3 MB |
/.../6. Programming Language Concepts and Concerns/ |
|
|
2.4 MB |
|
15.9 MB |
|
24.1 MB |
|
6.4 MB |
/.../7. Secure Coding and Security Control Concepts/ |
|
|
2.9 MB |
|
5.7 MB |
|
8.5 MB |
|
7.3 MB |
|
10.6 MB |
|
16.2 MB |
|
10.3 MB |
|
8.4 MB |
|
8.8 MB |
/.../CISSP® - Software Development Security/ |
|
|
28.1 MB |
/.../1. Claims-Based Identity for Windows - The Big Picture/ |
|
|
2.1 MB |
/.../2. Understanding Claims-Based Identity/ |
|
|
8.3 MB |
|
4.8 MB |
|
2.9 MB |
|
2.8 MB |
|
4.2 MB |
|
5.3 MB |
|
5.0 MB |
|
5.1 MB |
|
6.0 MB |
|
3.6 MB |
|
1.5 MB |
/.../3. Implementing Claims-Based Identity - Microsoft Technologies/ |
|
|
6.7 MB |
|
3.3 MB |
|
2.5 MB |
/.../4. Using Claims-Based Identity - Scenarios#/ |
|
|
8.2 MB |
20. Accessing an Enterprise Application - Via the Internet.mp4 |
3.6 MB |
|
3.7 MB |
|
8.3 MB |
|
2.2 MB |
/.../Claims-based Identity for Windows - The Big Picture/ |
|
|
4.4 MB |
/.../CompTIA Security+ (SY0-401) Access Control and Identity Management/1. Authentication Services/ |
|
|
3.8 MB |
|
4.3 MB |
|
2.5 MB |
|
5.7 MB |
|
7.4 MB |
|
4.5 MB |
|
1.4 MB |
|
4.3 MB |
|
1.1 MB |
/.../2. Authentication, Authorization, and Access Control/ |
|
|
1.2 MB |
|
1.9 MB |
|
5.5 MB |
|
2.7 MB |
|
2.8 MB |
|
5.4 MB |
|
1.3 MB |
|
3.2 MB |
|
1.7 MB |
|
1.9 MB |
|
1.7 MB |
|
2.8 MB |
|
2.2 MB |
|
1.8 MB |
|
1.2 MB |
|
2.9 MB |
|
2.7 MB |
|
4.3 MB |
|
1.9 MB |
|
2.3 MB |
|
1.4 MB |
|
3.1 MB |
|
2.1 MB |
|
2.2 MB |
|
855.6 KB |
/.../3. Account Management Security Controls/ |
|
|
1.3 MB |
|
4.7 MB |
|
2.2 MB |
|
3.0 MB |
|
3.6 MB |
|
2.6 MB |
|
4.4 MB |
|
3.0 MB |
|
1.4 MB |
|
1.2 MB |
|
3.7 MB |
|
1.2 MB |
|
751.1 KB |
|
2.8 MB |
|
4.7 MB |
|
2.3 MB |
|
3.7 MB |
|
5.6 MB |
|
1.2 MB |
/.../CompTIA Security+ (SY0-401) Access Control and Identity Management/ |
|
comptia-security-plus-sy0-401-access-control-identity-management.zip |
6.6 MB |
/.../1. Application Security Controls and Techniques/ |
|
|
10.1 MB |
|
7.3 MB |
|
14.4 MB |
|
14.5 MB |
|
3.1 MB |
/.../2. Mobile Security Concepts and Technologies/ |
|
|
21.2 MB |
|
3.5 MB |
|
4.9 MB |
|
13.3 MB |
/.../3. Establishing Host Security/ |
|
|
4.9 MB |
|
5.9 MB |
|
2.4 MB |
|
2.6 MB |
|
2.5 MB |
|
9.1 MB |
|
6.1 MB |
|
5.2 MB |
|
2.6 MB |
|
25.7 MB |
/.../4. Appropriate Controls to Ensure Data Security/ |
|
|
2.3 MB |
|
5.2 MB |
|
10.4 MB |
|
12.4 MB |
|
7.9 MB |
|
3.2 MB |
|
1.6 MB |
|
13.1 MB |
/.../5. Mitigate Security Risks in Static Environments/ |
|
|
2.9 MB |
|
21.6 MB |
|
6.1 MB |
|
3.8 MB |
|
3.9 MB |
|
4.7 MB |
|
7.2 MB |
|
6.9 MB |
|
4.9 MB |
|
528.5 KB |
/.../CompTIA Security+ (SY0-401) Application, Data, and Host Security/ |
|
comptia-security-plus-sy0-401-application-data-host-security.zip |
9.9 MB |
/.../1. Risk and Related Concepts/ |
|
|
8.4 MB |
|
6.1 MB |
|
21.2 MB |
|
12.0 MB |
005. False Positives, False Negatives, and Security Policies.mp4 |
22.3 MB |
|
20.4 MB |
|
7.3 MB |
|
12.0 MB |
009. Risk Avoidance and Risks Associated With Cloud Computing.mp4 |
10.1 MB |
|
11.7 MB |
/.../2. Risks Associated With 3rd Party Integration/ |
|
|
6.9 MB |
|
4.2 MB |
|
2.4 MB |
|
4.3 MB |
|
4.3 MB |
|
1.1 MB |
|
6.4 MB |
|
2.5 MB |
|
3.7 MB |
|
4.3 MB |
/.../3. Risk Mitigation Strategies/ |
|
|
1.7 MB |
|
18.0 MB |
|
4.9 MB |
|
7.4 MB |
|
2.1 MB |
|
3.4 MB |
|
2.8 MB |
|
6.0 MB |
|
1.3 MB |
/.../4. Implementing Basic Forensic Procedures/ |
|
|
2.4 MB |
|
5.8 MB |
|
11.6 MB |
|
11.4 MB |
|
9.7 MB |
|
9.6 MB |
|
2.1 MB |
|
6.8 MB |
|
13.7 MB |
|
3.1 MB |
|
4.9 MB |
|
7.1 MB |
|
8.2 MB |
|
9.5 MB |
|
2.3 MB |
/.../5. Incident Response Concepts/ |
|
|
3.3 MB |
|
18.2 MB |
|
5.0 MB |
|
3.3 MB |
|
9.7 MB |
|
8.2 MB |
|
3.5 MB |
|
7.5 MB |
|
2.6 MB |
|
3.2 MB |
|
7.5 MB |
|
8.8 MB |
|
5.5 MB |
|
1.7 MB |
/.../6. Security Related Awareness and Training/ |
|
|
2.3 MB |
|
6.1 MB |
|
2.1 MB |
|
2.6 MB |
|
3.5 MB |
|
4.0 MB |
|
7.4 MB |
|
9.0 MB |
|
17.6 MB |
|
6.2 MB |
|
6.6 MB |
|
3.2 MB |
/.../7. Physical and Environmental Controls/ |
|
|
2.2 MB |
|
2.9 MB |
|
5.7 MB |
|
8.8 MB |
|
5.8 MB |
|
6.9 MB |
|
4.4 MB |
|
4.2 MB |
|
6.1 MB |
|
5.7 MB |
|
5.5 MB |
|
2.2 MB |
|
2.0 MB |
|
10.7 MB |
|
4.6 MB |
|
8.6 MB |
/.../8. Risk Management Best Practices/ |
|
|
2.6 MB |
|
5.6 MB |
|
7.8 MB |
|
3.6 MB |
|
3.9 MB |
|
7.5 MB |
|
6.7 MB |
|
9.5 MB |
|
5.8 MB |
|
3.2 MB |
|
7.6 MB |
|
8.6 MB |
|
7.5 MB |
|
4.3 MB |
|
12.1 MB |
|
4.2 MB |
|
3.5 MB |
|
1.7 MB |
|
8.1 MB |
|
12.7 MB |
/.../9. Appropriate Controls to Meet Security Goals/ |
|
|
3.9 MB |
|
7.4 MB |
|
1.6 MB |
|
18.3 MB |
|
6.1 MB |
|
8.4 MB |
|
3.9 MB |
|
2.5 MB |
|
1.3 MB |
|
2.1 MB |
|
4.9 MB |
|
3.0 MB |
/.../CompTIA Security+ (SY0-401) Compliance and Operational Security/ |
|
comptia-security-plus-sy0-401-compliance-operational-security.zip |
30.2 MB |
/.../1. General Cryptography Concepts/ |
|
|
4.3 MB |
|
7.5 MB |
|
14.9 MB |
|
9.5 MB |
|
1.9 MB |
|
3.3 MB |
|
4.2 MB |
|
2.5 MB |
|
8.3 MB |
|
4.6 MB |
|
4.0 MB |
|
2.5 MB |
|
3.6 MB |
|
2.3 MB |
|
2.7 MB |
|
4.0 MB |
|
1.8 MB |
|
4.1 MB |
/.../2. Using Appropriate Cryptographic Methods/ |
|
|
2.4 MB |
|
5.1 MB |
|
4.4 MB |
|
3.3 MB |
|
2.9 MB |
|
3.0 MB |
|
4.3 MB |
|
7.0 MB |
|
15.4 MB |
|
2.3 MB |
|
1.9 MB |
|
3.1 MB |
|
6.4 MB |
|
2.8 MB |
|
4.1 MB |
|
3.4 MB |
/.../3. PKI and Certificate Management/ |
|
|
4.1 MB |
|
4.3 MB |
|
2.6 MB |
|
3.5 MB |
|
2.7 MB |
|
10.3 MB |
|
2.5 MB |
|
2.6 MB |
|
1.1 MB |
|
1.9 MB |
|
2.9 MB |
|
5.3 MB |
|
1.8 MB |
/.../CompTIA Security+ (SY0-401) Cryptography/ |
|
|
7.1 MB |
/.../CompTIA Security+ (SY0-401) Network Security/1. Getting Started/ |
|
|
501.2 KB |
|
2.5 MB |
|
2.5 MB |
|
17.1 MB |
|
4.4 MB |
|
9.5 MB |
|
12.0 MB |
/.../2. Security Configuration Parameters/ |
|
|
9.4 MB |
|
5.8 MB |
|
6.5 MB |
|
5.9 MB |
|
5.0 MB |
|
5.6 MB |
|
4.4 MB |
|
12.5 MB |
|
5.6 MB |
|
5.3 MB |
|
2.8 MB |
|
3.6 MB |
|
3.9 MB |
|
10.7 MB |
|
5.7 MB |
|
9.1 MB |
|
2.0 MB |
/.../3. Secure Network Administration Principles/ |
|
|
2.3 MB |
|
17.8 MB |
|
12.5 MB |
|
11.0 MB |
|
10.6 MB |
|
12.5 MB |
/.../4. Network Design Elements/ |
|
|
3.9 MB |
|
20.5 MB |
|
28.1 MB |
|
14.1 MB |
|
14.5 MB |
|
37.9 MB |
/.../5. Common Protocols and Services/ |
|
|
15.6 MB |
|
6.0 MB |
|
38.4 MB |
|
12.0 MB |
|
5.9 MB |
|
21.6 MB |
|
14.4 MB |
/.../CompTIA Security+ (SY0-401) Network Security/6. Wireless Security/ |
|
|
6.4 MB |
|
5.1 MB |
|
14.8 MB |
|
5.7 MB |
|
7.6 MB |
49. EAP, PEAP, LEAP, and Wireless Security Best Practices.mp4 |
15.4 MB |
|
8.9 MB |
|
7.6 MB |
|
8.0 MB |
|
7.1 MB |
/.../CompTIA Security+ (SY0-401) Network Security/ |
|
|
11.2 MB |
/.../1. Types of Malware/ |
|
|
12.0 MB |
|
11.8 MB |
|
2.4 MB |
|
15.9 MB |
|
2.7 MB |
|
2.0 MB |
|
3.3 MB |
|
15.2 MB |
|
3.2 MB |
/.../2. Types of Attacks/ |
|
|
4.6 MB |
|
8.4 MB |
|
17.5 MB |
|
1.9 MB |
|
3.6 MB |
|
4.5 MB |
|
1.4 MB |
|
3.7 MB |
|
2.2 MB |
|
12.4 MB |
|
7.3 MB |
|
5.0 MB |
|
2.4 MB |
|
2.7 MB |
|
5.4 MB |
|
19.9 MB |
|
3.0 MB |
|
9.2 MB |
|
1.6 MB |
/.../3. Effectiveness of Social Engineering Attacks/ |
|
|
3.8 MB |
|
3.1 MB |
|
8.1 MB |
|
7.1 MB |
|
9.3 MB |
|
4.1 MB |
|
8.3 MB |
|
3.0 MB |
|
2.9 MB |
|
3.8 MB |
|
2.0 MB |
|
2.5 MB |
|
2.3 MB |
|
2.2 MB |
|
2.3 MB |
|
1.1 MB |
/.../CompTIA Security+ (SY0-401) Threats and Vulnerabilities/4. Wireless Attacks/ |
|
|
11.5 MB |
|
3.8 MB |
|
10.0 MB |
|
6.6 MB |
|
9.3 MB |
|
3.5 MB |
|
4.7 MB |
|
9.8 MB |
|
4.2 MB |
/.../CompTIA Security+ (SY0-401) Threats and Vulnerabilities/5. Application Attacks/ |
|
|
3.9 MB |
|
7.5 MB |
|
6.4 MB |
|
13.3 MB |
|
4.4 MB |
|
5.5 MB |
|
4.3 MB |
|
4.3 MB |
|
6.4 MB |
|
4.5 MB |
|
3.3 MB |
|
3.2 MB |
|
5.0 MB |
|
1.5 MB |
|
3.8 MB |
/.../6. Mitigation and Deterrent Techniques/ |
|
|
4.7 MB |
|
8.7 MB |
|
10.8 MB |
|
7.4 MB |
|
1.7 MB |
|
2.9 MB |
|
12.0 MB |
|
3.3 MB |
|
13.8 MB |
|
1.8 MB |
/.../7. Discovering Security Threats and Vulnerabilities/ |
|
|
5.5 MB |
|
7.5 MB |
|
3.0 MB |
|
3.2 MB |
|
8.2 MB |
|
2.1 MB |
|
4.8 MB |
|
4.6 MB |
|
3.1 MB |
|
3.6 MB |
|
960.2 KB |
/.../8. Penetration Testing vs. Vulnerability Scanning/ |
|
|
3.1 MB |
|
5.6 MB |
|
2.7 MB |
|
2.1 MB |
|
5.0 MB |
|
3.3 MB |
|
3.2 MB |
|
6.2 MB |
|
1.7 MB |
/.../CompTIA Security+ (SY0-401) Threats and Vulnerabilities/ |
|
|
18.9 MB |
/.../Computing, Communication, and Business Integration for CASP (CAS-002)/1. Course Overview/ |
|
|
5.2 MB |
/.../2. Computing, Communications, and Business Discipline Integration/ |
|
|
6.3 MB |
|
4.3 MB |
|
2.3 MB |
|
4.1 MB |
/.../3. Facilitating Collaboration to Achieve Security Goals/ |
|
|
9.3 MB |
|
6.9 MB |
|
3.7 MB |
|
6.3 MB |
|
6.3 MB |
|
13.2 MB |
/.../4. Implement Security Activities Across the Technology Lifecycle/ |
|
|
6.6 MB |
|
3.4 MB |
|
7.7 MB |
/.../Computing, Communication, and Business Integration for CASP (CAS-002)/ |
|
computing-communication-business-integration-casp-cas-002.zip |
1.9 MB |
/.../Conducting Network Vulnerability Analysis/1. Course Overview/ |
|
|
3.2 MB |
/.../Conducting Network Vulnerability Analysis/2. Course Concepts/ |
|
|
6.5 MB |
|
4.7 MB |
|
5.4 MB |
/.../3. Preparing the Toolkit/ |
|
|
6.8 MB |
|
22.7 MB |
|
5.4 MB |
|
22.0 MB |
|
7.8 MB |
/.../4. Performing the Scanning Methodology/ |
|
|
5.0 MB |
|
28.6 MB |
|
3.9 MB |
|
5.3 MB |
|
4.9 MB |
|
41.7 MB |
|
3.1 MB |
|
47.1 MB |
|
1.6 MB |
/.../5. Leveraging the Internet to Find Vulnerabilities/ |
|
|
3.6 MB |
|
10.6 MB |
|
3.2 MB |
|
46.1 MB |
|
3.0 MB |
/.../6. Understanding the Types of Vulnerability Scanning/ |
|
|
3.8 MB |
|
18.3 MB |
|
4.3 MB |
|
20.7 MB |
|
2.3 MB |
|
1.9 MB |
/.../7. Executing Vulnerability Scanning/ |
|
|
4.1 MB |
|
18.7 MB |
|
2.7 MB |
|
17.1 MB |
|
1.9 MB |
|
21.6 MB |
|
6.7 MB |
|
848.0 KB |
/.../Conducting Network Vulnerability Analysis/8. Conclusion/ |
|
|
7.4 MB |
/.../Conducting Network Vulnerability Analysis/ |
|
|
4.2 MB |
/.../Cryptography - The Big Picture/1. Course Overview/ |
|
|
4.0 MB |
/.../2. Course Overview and Basic Concepts/ |
|
|
7.1 MB |
|
9.9 MB |
/.../3. Symmetric Key Cryptography/ |
|
|
2.6 MB |
|
4.7 MB |
|
8.7 MB |
|
4.9 MB |
|
1.7 MB |
|
2.0 MB |
|
2.1 MB |
|
7.2 MB |
|
8.7 MB |
|
8.9 MB |
|
1.0 MB |
/.../4. Asymmetric Key Cryptography/ |
|
|
2.0 MB |
|
2.7 MB |
|
5.6 MB |
|
3.8 MB |
|
2.4 MB |
|
605.3 KB |
|
6.0 MB |
|
2.4 MB |
|
7.4 MB |
|
1.2 MB |
/.../5. That’s Confidentiality, but What About Integrity/ |
|
|
2.3 MB |
|
2.8 MB |
|
3.3 MB |
|
4.2 MB |
|
1.7 MB |
|
6.7 MB |
|
4.2 MB |
|
2.3 MB |
|
4.3 MB |
|
5.5 MB |
|
1.1 MB |
/.../6. Cryptography Moving Forward/ |
|
|
3.8 MB |
/.../Cryptography - The Big Picture/ |
|
|
5.0 MB |
/.../1. History of Cryptography/ |
|
|
8.0 MB |
|
6.3 MB |
|
7.6 MB |
|
13.1 MB |
|
9.9 MB |
|
14.4 MB |
|
11.0 MB |
|
1.9 MB |
/.../Cryptography Fundamentals for Developers and Security Professionals/2. Algorithms/ |
|
|
956.9 KB |
|
2.5 MB |
|
1.8 MB |
|
3.2 MB |
|
1.2 MB |
|
1.7 MB |
|
4.7 MB |
|
2.7 MB |
|
5.5 MB |
|
4.0 MB |
|
7.6 MB |
|
4.3 MB |
|
3.2 MB |
|
8.1 MB |
|
6.7 MB |
|
4.5 MB |
|
3.8 MB |
|
4.7 MB |
|
7.2 MB |
|
2.6 MB |
|
1.6 MB |
/.../Cryptography Fundamentals for Developers and Security Professionals/3. APIs/ |
|
|
4.6 MB |
|
38.7 MB |
|
2.7 MB |
|
34.2 MB |
|
7.5 MB |
|
1.5 MB |
|
34.1 MB |
|
43.0 MB |
|
1.6 MB |
/.../4. Transport Layer Security/ |
|
|
13.0 MB |
|
9.1 MB |
|
14.4 MB |
|
21.1 MB |
|
10.6 MB |
|
6.0 MB |
|
1.3 MB |
|
5.6 MB |
|
1.1 MB |
/.../5. Authentication and Authorization/ |
|
|
3.4 MB |
|
3.9 MB |
|
5.7 MB |
|
2.7 MB |
|
5.7 MB |
|
6.6 MB |
|
4.6 MB |
|
6.3 MB |
|
1.8 MB |
|
4.4 MB |
|
3.6 MB |
|
9.6 MB |
|
3.6 MB |
|
1.6 MB |
/.../Cryptography Fundamentals for Developers and Security Professionals/6. Case Studies/ |
|
|
7.4 MB |
|
5.9 MB |
|
9.4 MB |
|
11.4 MB |
|
7.2 MB |
|
1.6 MB |
/.../Cryptography Fundamentals for Developers and Security Professionals/7. Decentralized Systems/ |
|
|
4.3 MB |
|
7.2 MB |
|
3.9 MB |
|
5.0 MB |
|
3.9 MB |
|
5.6 MB |
/.../Cryptography Fundamentals for Developers and Security Professionals/ |
|
|
10.7 MB |
/.../CSSLP® - Secure Software Concepts/1. Course Overview/ |
|
|
4.9 MB |
/.../2. Secure Software Core Concepts/ |
|
|
10.4 MB |
|
9.2 MB |
|
11.8 MB |
|
11.9 MB |
|
10.5 MB |
|
9.0 MB |
|
9.0 MB |
|
10.0 MB |
|
14.9 MB |
|
16.2 MB |
|
12.6 MB |
|
11.8 MB |
|
7.8 MB |
|
12.7 MB |
|
6.3 MB |
/.../3. Secure Software Concepts/ |
|
|
9.8 MB |
|
12.7 MB |
|
19.6 MB |
|
15.3 MB |
|
16.8 MB |
|
10.6 MB |
|
8.2 MB |
|
16.2 MB |
|
15.4 MB |
|
15.3 MB |
|
4.7 MB |
28. Economy of Mechanism and Leveraging Existing Components.mp4 |
8.9 MB |
|
24.4 MB |
|
9.7 MB |
|
14.9 MB |
|
14.3 MB |
/.../CSSLP® - Secure Software Concepts/ |
|
|
12.6 MB |
/.../CSSLP® - Secure Software Requirements/1. Course Overview/ |
|
|
4.2 MB |
/.../2. Identity Security Requirements/ |
|
|
15.1 MB |
|
14.6 MB |
|
4.0 MB |
|
9.5 MB |
|
16.1 MB |
/.../3. Interpret Data Classification Requirements/ |
|
|
9.4 MB |
08. Identify Data Classification Requirements - Ownership.mp4 |
5.7 MB |
09. Identify Data Classification Requirements - Retention.mp4 |
7.9 MB |
|
18.7 MB |
|
8.1 MB |
|
9.0 MB |
/.../4. Include Security in Software Requirement Specifications/ |
|
13. Include Security in Software Requirements Specification.mp4 |
7.0 MB |
|
17.7 MB |
|
10.8 MB |
|
12.0 MB |
|
9.9 MB |
|
10.0 MB |
|
8.7 MB |
|
22.2 MB |
|
17.2 MB |
|
18.9 MB |
|
11.3 MB |
|
4.8 MB |
/.../CSSLP® - Secure Software Requirements/ |
|
|
1.8 MB |
/.../Cybersecurity Threats - Ransomware/1. Course Overview/ |
|
|
5.4 MB |
/.../2. What Is Ransomware/ |
|
|
4.1 MB |
|
20.3 MB |
|
15.2 MB |
|
5.9 MB |
|
15.1 MB |
|
11.7 MB |
|
617.9 KB |
|
52.0 MB |
|
6.4 MB |
|
2.5 MB |
/.../3. Ransomware Entry Points/ |
|
|
2.7 MB |
|
3.1 MB |
|
10.6 MB |
15. Embedded Hyperlinks, Websites_downloads, and Drive-by Infections.mp4 |
6.2 MB |
|
5.4 MB |
17. Command and Callback (C&C) and Indicators of Compromise.mp4 |
7.0 MB |
|
2.8 MB |
/.../4. Incident Response - Detection and Containment/ |
|
|
2.6 MB |
|
5.3 MB |
|
7.3 MB |
|
9.0 MB |
|
1.7 MB |
/.../5. Incident Response - Eradication and Recovery/ |
|
|
5.9 MB |
|
3.7 MB |
|
7.3 MB |
|
15.1 MB |
|
6.7 MB |
|
71.4 MB |
|
22.3 MB |
|
6.0 MB |
/.../6. Countermeasures and Preparing Your Incident Response/ |
|
|
5.5 MB |
|
11.4 MB |
|
8.0 MB |
|
5.6 MB |
|
10.9 MB |
|
5.5 MB |
/.../Cybersecurity Threats - Ransomware/ |
|
|
17.2 MB |
/.../Designing and Implementing Security Policies/1. Course Overview/ |
|
|
5.2 MB |
/.../2. Identifying Security Standards and Bodies/ |
|
|
8.8 MB |
|
9.1 MB |
04. International Organization for Standardization (ISO).mp4 |
10.3 MB |
05. Payment Card Industry Data Security Standard (PCI DSS).mp4 |
4.1 MB |
|
24.3 MB |
|
12.7 MB |
|
5.3 MB |
09. Health Insurance Portability and Accountability Act (HIPAA).mp4 |
4.3 MB |
|
8.1 MB |
|
6.4 MB |
|
1.6 MB |
/.../3. Designing Security Policies/ |
|
|
2.7 MB |
|
8.6 MB |
|
14.8 MB |
|
7.2 MB |
|
8.1 MB |
|
9.5 MB |
|
18.2 MB |
|
19.4 MB |
|
5.5 MB |
|
16.7 MB |
|
16.4 MB |
|
14.6 MB |
|
3.5 MB |
|
3.4 MB |
/.../4. Implementing Security Policies/ |
|
|
1.4 MB |
|
11.7 MB |
|
18.7 MB |
|
6.9 MB |
|
11.7 MB |
|
9.9 MB |
|
25.1 MB |
|
2.7 MB |
/.../Designing and Implementing Security Policies/ |
|
|
715.3 KB |
/.../Digital Forensics - Getting Started with File Systems/1. Course Overview/ |
|
|
5.1 MB |
/.../2. Getting Started with New Technology File System (NTFS)/ |
|
|
3.4 MB |
|
4.5 MB |
|
1.9 MB |
|
1.7 MB |
|
2.8 MB |
|
975.7 KB |
|
2.6 MB |
|
1.7 MB |
|
2.8 MB |
|
64.5 MB |
|
1.9 MB |
/.../3. Working with Extended File System (EXT)/ |
|
|
790.8 KB |
|
1.0 MB |
|
10.8 MB |
|
10.3 MB |
|
3.2 MB |
|
32.6 MB |
|
7.7 MB |
|
1.2 MB |
/.../4. Analyzing with Hierarchical File System Plus (HFS+)/ |
|
|
923.7 KB |
|
18.0 MB |
|
6.9 MB |
|
11.0 MB |
|
732.4 KB |
/.../Digital Forensics - Getting Started with File Systems/ |
|
|
1.4 MB |
/.../1. Introduction to Kali Linux and Digital Forensics/ |
|
|
11.8 MB |
|
9.1 MB |
|
4.7 MB |
|
10.9 MB |
|
4.7 MB |
/.../2. Getting Started with Kali Forensics/ |
|
|
4.0 MB |
|
29.7 MB |
|
20.6 MB |
|
16.4 MB |
|
52.1 MB |
|
33.5 MB |
|
30.9 MB |
|
6.1 MB |
/.../3. Forensic Imaging Tools/ |
|
|
14.2 MB |
|
25.1 MB |
|
26.4 MB |
|
35.5 MB |
|
25.4 MB |
|
23.8 MB |
|
20.8 MB |
|
21.5 MB |
|
21.1 MB |
|
11.8 MB |
|
3.2 MB |
/.../4. Forensic Hashing Tools/ |
|
|
11.4 MB |
|
13.8 MB |
|
8.3 MB |
|
4.7 MB |
|
27.8 MB |
|
62.0 MB |
|
44.7 MB |
|
2.0 MB |
|
5.5 MB |
/.../5. What We Covered/ |
|
|
12.9 MB |
/.../Digital Forensics Tools in Kali Linux - Imaging and Hashing/ |
|
|
8.7 MB |
/.../Enterprise Security for CASP (CAS-002)/1. Course Overview/ |
|
|
5.8 MB |
/.../2. Appropriate Cryptographic Concepts and Techniques/ |
|
|
7.3 MB |
|
5.1 MB |
04. Pseudo-random Number Generators and Encryption Types.mp4 |
6.6 MB |
|
4.9 MB |
|
8.1 MB |
07. Cryptographic Methods and Design, EBC, CBC, OFB, and CFB.mp4 |
8.7 MB |
|
4.4 MB |
|
4.5 MB |
|
4.1 MB |
|
6.0 MB |
/.../3. Security Implications Associated with Enterprise Storage/ |
|
|
2.9 MB |
|
8.1 MB |
|
6.7 MB |
|
12.0 MB |
|
10.0 MB |
|
8.9 MB |
|
8.0 MB |
|
3.6 MB |
|
4.2 MB |
|
2.9 MB |
|
2.4 MB |
|
7.3 MB |
/.../4. Network and Security Components, Concepts, and Architectures/ |
|
|
4.5 MB |
|
8.3 MB |
|
4.3 MB |
|
3.6 MB |
|
5.6 MB |
|
6.1 MB |
|
2.9 MB |
|
11.5 MB |
|
7.0 MB |
|
7.6 MB |
|
6.1 MB |
/.../5. Troubleshoot Security Controls for Hosts/ |
|
|
4.6 MB |
|
6.6 MB |
38. Configuring Dedicated Interfaces and out of Band NICs.mp4 |
10.7 MB |
|
6.6 MB |
40. Security Advantages and Disadvantages of Virtualizing Servers.mp4 |
14.1 MB |
|
8.8 MB |
|
5.0 MB |
|
7.7 MB |
|
2.2 MB |
|
4.0 MB |
|
1.8 MB |
|
5.1 MB |
|
4.5 MB |
49. VDI, Terminal Services, and Application Delivery Services.mp4 |
13.9 MB |
|
8.7 MB |
/.../6. Application Vulnerabilities and Appropriate Security Controls/ |
|
|
2.7 MB |
|
5.1 MB |
|
4.9 MB |
|
2.7 MB |
|
4.5 MB |
|
2.5 MB |
|
5.8 MB |
|
5.9 MB |
|
2.3 MB |
|
1.4 MB |
|
2.5 MB |
|
3.4 MB |
|
6.8 MB |
|
2.6 MB |
|
4.7 MB |
|
2.2 MB |
|
2.7 MB |
|
1.5 MB |
|
2.1 MB |
/.../Enterprise Security for CASP (CAS-002)/ |
|
|
5.1 MB |
/.../1. The Truth About Living in a Technology Based World/ |
|
|
8.2 MB |
|
34.0 MB |
/.../10. Attack Types/ |
|
|
2.7 MB |
|
13.0 MB |
|
7.7 MB |
|
25.1 MB |
|
4.4 MB |
|
11.9 MB |
|
4.0 MB |
/.../11. Information Security Controls/ |
|
|
3.7 MB |
|
6.8 MB |
|
4.7 MB |
|
6.4 MB |
|
6.2 MB |
|
6.4 MB |
|
5.4 MB |
|
7.5 MB |
|
22.5 MB |
|
8.0 MB |
|
6.5 MB |
/.../12. How to Prepare for the Certified Ethical Hacker Exam/ |
|
|
3.7 MB |
|
1.9 MB |
|
3.6 MB |
|
9.2 MB |
|
10.0 MB |
|
3.8 MB |
|
1.3 MB |
/.../2. Overview of the CEH Certification Program/ |
|
|
3.5 MB |
|
2.7 MB |
|
9.4 MB |
|
17.8 MB |
|
3.4 MB |
/.../3. How to Build a Lab to Hack Safely/ |
|
|
20.5 MB |
|
23.0 MB |
|
43.8 MB |
|
1.9 MB |
/.../4. Installing and Configuring Your Windows Server VMs/ |
|
|
2.7 MB |
|
79.6 MB |
|
56.5 MB |
|
988.7 KB |
/.../5. Installing and Configuring Your Desktop VMs/ |
|
|
3.1 MB |
|
59.2 MB |
|
47.1 MB |
|
36.9 MB |
|
37.8 MB |
|
2.0 MB |
/.../6. Information Security Overview/ |
|
|
4.3 MB |
|
5.5 MB |
|
5.3 MB |
|
10.5 MB |
|
5.0 MB |
|
2.8 MB |
/.../7. Security Threats and Attack Vectors/ |
|
|
4.0 MB |
|
10.1 MB |
|
11.7 MB |
|
8.2 MB |
|
10.3 MB |
|
4.2 MB |
|
4.6 MB |
|
12.9 MB |
|
10.0 MB |
|
1.7 MB |
/.../Ethical Hacking - Understanding Ethical Hacking/8. Hacking Concepts/ |
|
|
3.8 MB |
|
2.3 MB |
|
10.9 MB |
|
8.4 MB |
|
12.2 MB |
|
7.3 MB |
|
2.7 MB |
|
9.6 MB |
|
7.6 MB |
|
34.8 MB |
|
3.1 MB |
/.../Ethical Hacking - Understanding Ethical Hacking/9. Hacking Phases/ |
|
|
7.0 MB |
|
1.3 MB |
|
24.4 MB |
|
8.1 MB |
|
3.6 MB |
|
8.8 MB |
|
4.3 MB |
|
3.2 MB |
/.../Ethical Hacking - Understanding Ethical Hacking/ |
|
|
13.6 MB |
/.../OWASP Top 10 Web Application Security Risks for ASP.NET/1. Introduction/ |
|
|
1.4 MB |
|
7.1 MB |
|
15.1 MB |
|
14.9 MB |
|
8.5 MB |
/.../10. Insufficient Transport Layer Protection/ |
|
|
3.9 MB |
|
10.5 MB |
|
40.6 MB |
|
30.2 MB |
|
38.2 MB |
|
20.5 MB |
|
12.4 MB |
|
22.2 MB |
|
13.9 MB |
|
17.2 MB |
|
17.5 MB |
|
15.7 MB |
/.../11. Unvalidated Redirects and Forwards/ |
|
|
1.9 MB |
|
10.3 MB |
|
19.7 MB |
|
14.7 MB |
|
17.6 MB |
|
19.3 MB |
|
8.5 MB |
|
6.7 MB |
/.../OWASP Top 10 Web Application Security Risks for ASP.NET/2. Injection/ |
|
|
3.1 MB |
|
6.2 MB |
|
37.1 MB |
|
5.2 MB |
|
2.2 MB |
|
5.1 MB |
|
18.6 MB |
|
16.3 MB |
|
10.5 MB |
|
20.5 MB |
|
16.9 MB |
|
25.8 MB |
|
18.8 MB |
|
7.6 MB |
/.../3. Cross Site Scripting (XSS)/ |
|
|
2.9 MB |
|
3.9 MB |
|
17.5 MB |
|
25.7 MB |
|
2.8 MB |
|
9.5 MB |
|
26.8 MB |
|
13.0 MB |
|
6.6 MB |
|
11.9 MB |
|
66.7 MB |
|
18.3 MB |
|
14.3 MB |
|
4.2 MB |
|
10.6 MB |
/.../4. Broken Authentication and Session Management/ |
|
|
1.6 MB |
|
3.8 MB |
|
4.8 MB |
|
6.6 MB |
|
2.1 MB |
|
10.4 MB |
|
5.6 MB |
|
7.1 MB |
|
6.0 MB |
/.../5. Insecure Direct Object References/ |
|
|
1.4 MB |
|
3.5 MB |
|
17.3 MB |
|
11.0 MB |
|
10.9 MB |
|
21.0 MB |
|
11.1 MB |
|
44.9 MB |
|
4.5 MB |
|
3.8 MB |
/.../6. Cross Site Request Forgery (CSRF)/ |
|
|
2.2 MB |
|
6.6 MB |
|
15.0 MB |
|
18.3 MB |
|
34.8 MB |
|
6.7 MB |
|
19.4 MB |
|
18.3 MB |
|
9.0 MB |
|
7.1 MB |
/.../OWASP Top 10 Web Application Security Risks for ASP.NET/7. Security Misconfiguration/ |
|
|
2.3 MB |
|
6.4 MB |
|
27.1 MB |
|
17.9 MB |
|
41.6 MB |
|
21.8 MB |
|
23.3 MB |
074. Demo - Encrypting sensitive parts of the web.config.mp4 |
30.2 MB |
075. Demo - Using config transforms to apply secure configurations.mp4 |
34.2 MB |
|
15.1 MB |
|
9.0 MB |
/.../8. Insecure Cryptographic Storage/ |
|
|
2.8 MB |
|
6.7 MB |
|
63.0 MB |
|
18.9 MB |
|
26.3 MB |
|
35.7 MB |
084. Slowing down hashes with the new Membership Provider.mp4 |
27.8 MB |
|
15.7 MB |
086. Things to consider when choosing a hashing implementation.mp4 |
14.7 MB |
|
11.3 MB |
|
24.6 MB |
|
15.3 MB |
|
12.6 MB |
/.../9. Failure to Restrict URL Access/ |
|
|
1.8 MB |
|
6.3 MB |
|
6.2 MB |
|
22.1 MB |
|
19.3 MB |
|
12.9 MB |
/1. Course Overview/ |
|
|
3.9 MB |
/.../1. Installing and Configuring Kali Linux/ |
|
|
1.4 MB |
|
51.8 MB |
|
22.9 MB |
|
20.3 MB |
|
15.0 MB |
|
11.7 MB |
|
2.6 MB |
|
7.8 MB |
|
3.3 MB |
|
1.0 MB |
/.../10. Wi-Fi Penetration Testing/ |
|
|
2.3 MB |
|
14.0 MB |
|
26.4 MB |
|
29.3 MB |
|
7.3 MB |
|
1.4 MB |
/.../11. Brute Force Attack Testing/ |
|
|
1.6 MB |
|
6.1 MB |
|
4.2 MB |
|
11.1 MB |
|
9.3 MB |
|
1.0 MB |
/.../12. Advanced Penetration Testing/ |
|
|
882.4 KB |
|
23.1 MB |
|
8.1 MB |
|
14.3 MB |
|
19.4 MB |
|
1.2 MB |
/.../2. Pre-penetration Testing Checklist/ |
|
|
1.5 MB |
|
14.8 MB |
|
2.9 MB |
|
567.2 KB |
/.../Penetration Testing and Ethical Hacking with Kali Linux/3. Information Gathering/ |
|
|
1.9 MB |
|
7.7 MB |
|
5.1 MB |
|
3.2 MB |
|
15.2 MB |
|
7.3 MB |
|
5.2 MB |
|
4.6 MB |
|
6.5 MB |
|
4.2 MB |
|
7.6 MB |
|
14.3 MB |
|
22.3 MB |
|
1.6 MB |
/.../4. External Pen-testing/ |
|
|
1.4 MB |
|
2.9 MB |
|
8.0 MB |
|
5.8 MB |
|
15.5 MB |
|
878.6 KB |
/.../5. Website Penetration Testing/ |
|
|
1.2 MB |
|
2.9 MB |
|
2.1 MB |
|
2.3 MB |
|
2.1 MB |
|
14.5 MB |
|
8.8 MB |
|
8.9 MB |
|
14.2 MB |
|
5.1 MB |
|
7.2 MB |
|
7.5 MB |
|
33.3 MB |
|
10.3 MB |
|
10.2 MB |
|
7.8 MB |
|
22.3 MB |
|
2.5 MB |
/.../6. Internal Network Penetration Testing/ |
|
|
1.1 MB |
|
1.1 MB |
|
6.2 MB |
|
37.3 MB |
|
848.8 KB |
/.../Penetration Testing and Ethical Hacking with Kali Linux/7. Network Sniffing/ |
|
|
1.0 MB |
|
10.5 MB |
|
13.5 MB |
|
30.0 MB |
|
20.7 MB |
|
13.4 MB |
|
20.1 MB |
|
1.7 MB |
/.../Penetration Testing and Ethical Hacking with Kali Linux/8. Exploitation/ |
|
|
1.2 MB |
|
28.4 MB |
|
23.8 MB |
|
7.8 MB |
|
31.1 MB |
|
18.3 MB |
|
1.4 MB |
/.../Penetration Testing and Ethical Hacking with Kali Linux/9. Social Engineering/ |
|
|
918.5 KB |
|
19.6 MB |
|
14.6 MB |
|
16.8 MB |
|
11.3 MB |
|
1.2 MB |
/.../Penetration Testing and Ethical Hacking with Kali Linux/ |
|
|
3.6 MB |
/.../Securing Your Node.js Web App/1. Course Overview/ |
|
|
7.5 MB |
/.../2. Introduction to Hackers Hall/ |
|
|
12.4 MB |
/.../3. Proper User Authentication/ |
|
|
2.3 MB |
|
9.8 MB |
|
9.5 MB |
|
37.3 MB |
|
23.2 MB |
|
30.9 MB |
09. Enforcing Validation at the Database level with Mongoose.mp4 |
7.6 MB |
|
1.3 MB |
|
10.9 MB |
|
30.0 MB |
|
14.8 MB |
|
3.4 MB |
|
1.0 MB |
/.../Securing Your Node.js Web App/4. Session Management/ |
|
|
4.0 MB |
|
1.5 MB |
|
26.1 MB |
|
15.8 MB |
|
1.8 MB |
|
7.2 MB |
|
3.4 MB |
|
13.5 MB |
24. Using Transport Layer Security to Secure Session Cookies.mp4 |
8.6 MB |
|
4.3 MB |
|
10.9 MB |
|
1.8 MB |
|
1.3 MB |
/.../5. Securing MongoDB from Injection Attacks/ |
|
|
2.7 MB |
|
7.3 MB |
|
58.6 MB |
|
8.4 MB |
|
3.8 MB |
|
23.4 MB |
|
21.0 MB |
|
3.2 MB |
/.../6. Handling Untrusted Data/ |
|
|
2.4 MB |
|
46.4 MB |
|
12.9 MB |
|
12.7 MB |
|
2.1 MB |
|
24.3 MB |
|
5.9 MB |
|
2.7 MB |
|
4.0 MB |
/.../Securing Your Node.js Web App/7. Access Controls/ |
|
|
2.7 MB |
|
5.2 MB |
|
2.6 MB |
|
10.8 MB |
|
23.4 MB |
|
2.9 MB |
|
42.3 MB |
|
8.5 MB |
|
15.0 MB |
|
2.1 MB |
/.../8. Defending Against Cross-site Scripting (XSS)/ |
|
|
2.8 MB |
|
14.4 MB |
|
16.7 MB |
|
5.5 MB |
|
2.6 MB |
|
21.8 MB |
|
5.2 MB |
|
5.6 MB |
|
3.1 MB |
|
12.8 MB |
|
28.8 MB |
|
31.2 MB |
|
15.6 MB |
|
3.1 MB |
/.../9. Securing Your Connection/ |
|
|
1.6 MB |
|
4.0 MB |
|
3.3 MB |
|
39.9 MB |
|
10.4 MB |
|
9.7 MB |
|
31.5 MB |
|
3.6 MB |
|
19.3 MB |
|
10.6 MB |
/.../Securing Your Node.js Web App/ |
|
|
45.4 MB |
/.../USB Forensics - Writeblocking and Impersonation/1. Course Overview/ |
|
|
5.5 MB |
/.../2. Software Write Blocking with Udev Rules/ |
|
|
11.2 MB |
|
21.7 MB |
|
18.0 MB |
|
23.7 MB |
/.../3. Hardware Write Blocker Based on VNC2/ |
|
|
17.8 MB |
|
30.9 MB |
|
47.0 MB |
|
13.9 MB |
|
17.6 MB |
/.../USB Forensics - Writeblocking and Impersonation/4. USB Impersonation/ |
|
|
24.4 MB |
|
31.4 MB |
|
8.8 MB |
/.../USB Forensics - Writeblocking and Impersonation/ |
|
|
4.4 MB |
/1. Introduction/ |
|
|
1.7 MB |
|
3.6 MB |
/.../2. Secure Design Principles and Processes/ |
|
03. Introduction to Secure Design Principles and Processes.mp4 |
2.3 MB |
|
2.9 MB |
|
1.8 MB |
|
3.9 MB |
|
1.2 MB |
|
3.1 MB |
|
2.3 MB |
|
2.5 MB |
|
5.0 MB |
|
7.9 MB |
|
5.0 MB |
|
11.1 MB |
|
6.5 MB |
|
6.2 MB |
|
2.0 MB |
/.../3. Fundamental Concepts of Security Models/ |
|
18. Introduction to Fundamental Concepts of Security Models.mp4 |
2.1 MB |
|
1.2 MB |
|
2.5 MB |
|
2.1 MB |
|
1.5 MB |
|
2.7 MB |
|
3.8 MB |
|
524.4 KB |
|
6.7 MB |
|
3.7 MB |
|
931.9 KB |
|
1.7 MB |
|
1.1 MB |
|
1.1 MB |
|
2.7 MB |
|
2.4 MB |
34. Sherwood Applied Business Security Architecture (SABSA).mp4 |
1.8 MB |
|
1.5 MB |
/.../4. Security Evaluation Models/ |
|
|
2.1 MB |
|
3.5 MB |
|
671.8 KB |
|
13.7 MB |
40. Information Technology Security Evaluation Criteria (ITSEC).mp4 |
13.3 MB |
|
5.1 MB |
|
1.6 MB |
|
7.7 MB |
44. Control Objects for Information and Related Technology (COBIT).mp4 |
3.0 MB |
45. Payment Card Industry Data Security Standard (PCI-DSS).mp4 |
8.0 MB |
|
1.7 MB |
/.../5. Security Capabilities of Information Systems/ |
|
47. Introduction to Security Capabilities of Information Systems.mp4 |
1.6 MB |
|
1.4 MB |
|
4.0 MB |
|
2.5 MB |
|
2.8 MB |
|
979.2 KB |
|
2.2 MB |
|
3.0 MB |
|
1.2 MB |
/.../6. Vulnerabilities in Security Architecture and Technology Components/ |
|
56. Introduction to Vulnerabilities in Security Architecture and Technology Components.mp4 |
2.8 MB |
|
2.5 MB |
|
9.2 MB |
|
1.9 MB |
|
6.2 MB |
|
4.3 MB |
|
2.0 MB |
/7. Cryptography/ |
|
|
1.6 MB |
|
1.8 MB |
|
5.4 MB |
|
5.2 MB |
|
3.2 MB |
|
2.8 MB |
|
2.3 MB |
|
4.5 MB |
|
1.6 MB |
|
5.9 MB |
|
1.2 MB |
|
1.3 MB |
|
2.1 MB |
|
4.5 MB |
|
2.2 MB |
|
3.0 MB |
|
1.6 MB |
|
1.9 MB |
|
2.1 MB |
|
1.3 MB |
/.../8. Site and Facility Secure Design/ |
|
|
1.6 MB |
|
2.7 MB |
|
2.5 MB |
|
3.5 MB |
|
378.4 KB |
|
2.1 MB |
|
1.5 MB |
|
865.0 KB |
|
2.0 MB |
|
1.8 MB |
/CISSP® - Security Engineering/ |
|
|
14.3 MB |
/1. Course Overview/ |
|
|
3.6 MB |
/.../10. Evidence Handling/ |
|
|
1.1 MB |
|
4.0 MB |
|
760.9 KB |
/.../11. Resource Provisioning/ |
|
|
1.2 MB |
|
9.0 MB |
|
1.3 MB |
/.../12. Recovery Strategies/ |
|
|
1.3 MB |
|
9.5 MB |
|
741.8 KB |
/.../13. Personnel Privacy and Safety/ |
|
|
756.2 KB |
|
6.7 MB |
|
12.8 MB |
|
1.5 MB |
/.../14. Business Continuity and Disaster Recovery/ |
|
|
1.4 MB |
|
9.7 MB |
|
1.6 MB |
/.../15. Internal Physical Security/ |
|
|
1.1 MB |
|
17.0 MB |
|
2.8 MB |
|
5.3 MB |
|
711.1 KB |
/.../16. Securing Assets/ |
|
|
932.3 KB |
|
8.1 MB |
|
895.1 KB |
/.../17. External Physical Security/ |
|
|
1.4 MB |
|
19.7 MB |
|
9.6 MB |
|
3.0 MB |
|
850.7 KB |
/.../2. Introduction to Security Operations/ |
|
|
3.0 MB |
|
4.9 MB |
|
849.3 KB |
/3. Digital Forensics/ |
|
|
2.3 MB |
|
10.1 MB |
|
13.7 MB |
|
1.4 MB |
/.../4. Logging and Monitoring/ |
|
|
889.6 KB |
|
7.2 MB |
|
9.6 MB |
|
10.0 MB |
|
733.6 KB |
/5. Vulnerability Management/ |
|
|
950.0 KB |
|
9.8 MB |
|
7.4 MB |
|
881.4 KB |
/6. Change Management/ |
|
|
945.8 KB |
|
12.5 MB |
|
901.1 KB |
/.../7. Operate and Maintain Protective Controls/ |
|
|
1.2 MB |
|
15.0 MB |
|
3.2 MB |
/8. Incident Management/ |
|
|
832.0 KB |
|
4.9 MB |
|
5.6 MB |
|
588.1 KB |
/9. Investigative Types/ |
|
|
1.1 MB |
|
5.1 MB |
|
1.2 MB |
/CISSP® - Security Operations/ |
|
|
9.4 MB |
/1. Introduction/ |
|
|
4.4 MB |
|
9.8 MB |
/2. Application Security/ |
|
|
2.5 MB |
|
18.9 MB |
|
12.9 MB |
|
13.5 MB |
|
11.8 MB |
|
3.1 MB |
/.../3. Development Life Cycle/ |
|
|
2.7 MB |
|
6.2 MB |
|
14.8 MB |
|
13.0 MB |
|
16.3 MB |
|
7.4 MB |
|
959.6 KB |
/.../4. Security Impact of Acquired Software/ |
|
|
1.2 MB |
|
12.8 MB |
|
18.2 MB |
|
2.1 MB |
/5. Software Threats/ |
|
|
1.1 MB |
|
10.8 MB |
22. Path Traversal, Covert Channels, DOS, Trap Doors, Flaws.mp4 |
18.5 MB |
|
13.2 MB |
24. File Inclusion, Violations, Undocumented Functionality.mp4 |
7.0 MB |
|
2.3 MB |
/.../6. Programming Language Concepts and Concerns/ |
|
|
2.4 MB |
|
15.9 MB |
|
24.1 MB |
|
6.4 MB |
/.../7. Secure Coding and Security Control Concepts/ |
|
|
2.9 MB |
|
5.7 MB |
|
8.5 MB |
|
7.3 MB |
|
10.6 MB |
|
16.2 MB |
|
10.3 MB |
|
8.4 MB |
|
8.8 MB |
/CISSP® - Software Development Security/ |
|
|
28.1 MB |
/.../1. Claims-Based Identity for Windows - The Big Picture/ |
|
|
2.1 MB |
/.../2. Understanding Claims-Based Identity/ |
|
|
8.3 MB |
|
4.8 MB |
|
2.9 MB |
|
2.8 MB |
|
4.2 MB |
|
5.3 MB |
|
5.0 MB |
|
5.1 MB |
|
6.0 MB |
|
3.6 MB |
|
1.5 MB |
/.../3. Implementing Claims-Based Identity - Microsoft Technologies/ |
|
|
6.4 MB |
|
5.8 MB |
|
6.7 MB |
|
4.7 MB |
|
3.3 MB |
|
2.5 MB |
/.../4. Using Claims-Based Identity - Scenarios#/ |
|
|
8.2 MB |
20. Accessing an Enterprise Application - Via the Internet.mp4 |
3.6 MB |
|
3.7 MB |
22. Single Sign-On to an Application in Another Enterprise - Using Federation.mp4 |
10.6 MB |
23. Using Windows Azure Active Directory as an Identity Provider.mp4 |
4.2 MB |
24. Using Windows Azure Active Directory as a Federation Provider.mp4 |
6.0 MB |
25. Using Windows Azure Active Directory Access Control as a Federation Provider.mp4 |
9.7 MB |
|
8.3 MB |
|
2.2 MB |
/Claims-based Identity for Windows - The Big Picture/ |
|
|
4.4 MB |
/1. Authentication Services/ |
|
|
3.8 MB |
|
4.3 MB |
|
2.5 MB |
|
5.7 MB |
|
7.4 MB |
|
4.5 MB |
|
1.4 MB |
|
4.3 MB |
|
1.1 MB |
/.../2. Authentication, Authorization, and Access Control/ |
|
|
1.2 MB |
|
2.7 MB |
|
1.9 MB |
|
2.0 MB |
|
5.5 MB |
|
2.7 MB |
|
2.8 MB |
|
5.4 MB |
|
1.3 MB |
|
3.2 MB |
|
1.7 MB |
|
1.9 MB |
|
1.7 MB |
|
2.8 MB |
|
2.2 MB |
|
1.8 MB |
|
1.2 MB |
|
2.9 MB |
|
2.7 MB |
|
4.3 MB |
|
1.9 MB |
|
2.3 MB |
|
1.4 MB |
|
3.5 MB |
|
3.1 MB |
|
2.1 MB |
|
2.2 MB |
|
855.6 KB |
/.../3. Account Management Security Controls/ |
|
|
1.3 MB |
|
4.7 MB |
|
2.2 MB |
|
3.0 MB |
|
3.6 MB |
|
2.6 MB |
|
4.4 MB |
|
3.0 MB |
|
1.4 MB |
|
1.2 MB |
|
3.7 MB |
|
1.2 MB |
|
751.1 KB |
|
2.8 MB |
|
4.7 MB |
|
2.3 MB |
|
3.7 MB |
|
5.6 MB |
|
1.2 MB |
/CompTIA Security+ (SY0-401) Access Control and Identity Management/ |
|
comptia-security-plus-sy0-401-access-control-identity-management.zip |
6.6 MB |
/.../1. Application Security Controls and Techniques/ |
|
|
10.1 MB |
|
7.3 MB |
|
14.4 MB |
04. Cross Site Scripting (XSS) and Cross Site Request Forgery (XSRF).mp4 |
15.6 MB |
05. Application Baseline Configuration and Application Hardening.mp4 |
8.2 MB |
|
6.7 MB |
|
14.5 MB |
|
3.1 MB |
/.../2. Mobile Security Concepts and Technologies/ |
|
|
21.2 MB |
|
8.3 MB |
|
3.5 MB |
|
4.9 MB |
|
13.3 MB |
/.../3. Establishing Host Security/ |
|
|
4.9 MB |
|
5.9 MB |
|
2.4 MB |
|
2.6 MB |
|
2.5 MB |
|
9.1 MB |
|
6.1 MB |
|
5.2 MB |
|
2.6 MB |
|
25.7 MB |
/.../4. Appropriate Controls to Ensure Data Security/ |
|
|
2.3 MB |
|
5.2 MB |
|
10.4 MB |
|
12.4 MB |
|
7.9 MB |
|
3.2 MB |
|
1.6 MB |
|
13.1 MB |
/.../5. Mitigate Security Risks in Static Environments/ |
|
|
2.9 MB |
|
21.6 MB |
|
7.2 MB |
|
6.1 MB |
|
3.8 MB |
|
3.9 MB |
|
4.7 MB |
|
7.2 MB |
|
6.9 MB |
|
4.9 MB |
|
3.5 MB |
|
528.5 KB |
/CompTIA Security+ (SY0-401) Application, Data, and Host Security/ |
|
comptia-security-plus-sy0-401-application-data-host-security.zip |
9.9 MB |
/.../1. Risk and Related Concepts/ |
|
|
8.4 MB |
|
6.1 MB |
|
21.2 MB |
|
12.0 MB |
005. False Positives, False Negatives, and Security Policies.mp4 |
22.3 MB |
|
20.4 MB |
|
7.3 MB |
|
12.0 MB |
009. Risk Avoidance and Risks Associated With Cloud Computing.mp4 |
10.1 MB |
|
11.7 MB |
/.../2. Risks Associated With 3rd Party Integration/ |
|
|
6.9 MB |
|
4.2 MB |
|
2.4 MB |
|
4.3 MB |
|
4.3 MB |
|
1.1 MB |
|
6.4 MB |
|
7.3 MB |
|
2.5 MB |
|
3.7 MB |
|
4.3 MB |
/.../3. Risk Mitigation Strategies/ |
|
|
1.7 MB |
|
18.0 MB |
|
4.9 MB |
|
7.4 MB |
|
2.1 MB |
|
3.4 MB |
|
2.8 MB |
|
6.0 MB |
|
1.3 MB |
/.../4. Implementing Basic Forensic Procedures/ |
|
|
2.4 MB |
|
5.8 MB |
|
11.6 MB |
|
11.4 MB |
|
9.7 MB |
|
9.6 MB |
|
2.1 MB |
|
6.8 MB |
|
13.7 MB |
|
3.1 MB |
|
4.9 MB |
|
7.1 MB |
|
8.2 MB |
|
9.5 MB |
|
2.3 MB |
/.../5. Incident Response Concepts/ |
|
|
3.3 MB |
|
18.2 MB |
|
5.0 MB |
|
3.3 MB |
|
9.7 MB |
|
8.2 MB |
|
3.5 MB |
|
7.5 MB |
|
2.6 MB |
|
3.2 MB |
|
7.5 MB |
|
8.8 MB |
|
5.5 MB |
|
1.7 MB |
/.../6. Security Related Awareness and Training/ |
|
|
2.3 MB |
|
6.1 MB |
|
2.1 MB |
|
2.6 MB |
|
3.5 MB |
|
4.0 MB |
|
7.4 MB |
|
9.0 MB |
|
17.6 MB |
|
6.2 MB |
|
6.6 MB |
|
3.2 MB |
/.../7. Physical and Environmental Controls/ |
|
|
2.2 MB |
|
2.9 MB |
|
5.7 MB |
|
8.8 MB |
|
5.8 MB |
|
6.9 MB |
|
4.4 MB |
|
4.2 MB |
080. Physical Security, Locks, Mantraps, and Video Surveillance.mp4 |
8.5 MB |
|
6.1 MB |
|
5.7 MB |
|
5.5 MB |
|
2.2 MB |
|
2.0 MB |
|
10.7 MB |
|
4.6 MB |
|
8.6 MB |
/.../8. Risk Management Best Practices/ |
|
|
2.6 MB |
|
5.6 MB |
|
7.8 MB |
|
3.6 MB |
|
3.9 MB |
|
7.5 MB |
|
6.7 MB |
|
9.5 MB |
|
5.8 MB |
|
3.2 MB |
|
7.6 MB |
|
8.6 MB |
|
7.5 MB |
|
4.3 MB |
|
12.1 MB |
|
4.2 MB |
|
3.5 MB |
|
1.7 MB |
|
8.1 MB |
|
12.7 MB |
/.../9. Appropriate Controls to Meet Security Goals/ |
|
|
3.9 MB |
|
7.4 MB |
|
1.6 MB |
|
18.3 MB |
|
6.1 MB |
|
8.4 MB |
115. Availability, Redundancy, Fault Tolerance, and Patching.mp4 |
7.8 MB |
|
3.9 MB |
|
2.5 MB |
|
1.3 MB |
|
2.1 MB |
|
4.9 MB |
|
3.0 MB |
/CompTIA Security+ (SY0-401) Compliance and Operational Security/ |
|
comptia-security-plus-sy0-401-compliance-operational-security.zip |
30.2 MB |
/.../1. General Cryptography Concepts/ |
|
|
4.3 MB |
|
7.5 MB |
|
14.9 MB |
|
9.5 MB |
|
1.9 MB |
|
3.3 MB |
|
4.2 MB |
|
2.5 MB |
|
8.3 MB |
|
4.6 MB |
|
4.0 MB |
|
2.5 MB |
|
3.6 MB |
|
2.3 MB |
|
2.7 MB |
|
4.0 MB |
|
1.8 MB |
|
4.1 MB |
/.../2. Using Appropriate Cryptographic Methods/ |
|
|
2.4 MB |
|
5.1 MB |
|
4.4 MB |
|
3.3 MB |
|
2.9 MB |
|
3.0 MB |
|
4.3 MB |
|
7.0 MB |
|
15.4 MB |
|
2.3 MB |
|
1.9 MB |
|
3.1 MB |
|
6.4 MB |
|
2.8 MB |
|
4.1 MB |
|
3.4 MB |
/.../3. PKI and Certificate Management/ |
|
|
4.1 MB |
|
4.3 MB |
|
2.6 MB |
|
3.5 MB |
|
2.7 MB |
|
10.3 MB |
|
2.5 MB |
|
2.6 MB |
|
1.1 MB |
|
1.9 MB |
|
2.9 MB |
|
5.3 MB |
|
1.8 MB |
/CompTIA Security+ (SY0-401) Cryptography/ |
|
|
7.1 MB |
/1. Getting Started/ |
|
|
501.2 KB |
|
2.5 MB |
|
2.5 MB |
|
17.1 MB |
|
4.4 MB |
|
9.5 MB |
|
12.0 MB |
/.../2. Security Configuration Parameters/ |
|
|
9.4 MB |
|
5.8 MB |
|
6.5 MB |
|
5.9 MB |
|
5.0 MB |
|
5.6 MB |
|
4.4 MB |
|
12.5 MB |
|
5.6 MB |
|
5.3 MB |
|
2.8 MB |
|
3.6 MB |
|
3.9 MB |
|
10.7 MB |
|
5.7 MB |
|
9.1 MB |
|
2.0 MB |
/.../3. Secure Network Administration Principles/ |
|
|
2.3 MB |
|
17.8 MB |
|
12.5 MB |
|
11.0 MB |
|
10.6 MB |
|
12.5 MB |
/.../4. Network Design Elements/ |
|
|
3.9 MB |
|
20.5 MB |
|
28.1 MB |
|
14.1 MB |
|
14.5 MB |
|
37.9 MB |
/.../5. Common Protocols and Services/ |
|
|
15.6 MB |
|
6.0 MB |
|
38.4 MB |
|
12.0 MB |
|
5.9 MB |
|
21.6 MB |
|
14.4 MB |
/6. Wireless Security/ |
|
|
6.4 MB |
|
5.1 MB |
|
14.8 MB |
|
5.7 MB |
|
7.6 MB |
49. EAP, PEAP, LEAP, and Wireless Security Best Practices.mp4 |
15.4 MB |
|
8.9 MB |
|
7.6 MB |
|
8.0 MB |
|
7.1 MB |
/CompTIA Security+ (SY0-401) Network Security/ |
|
|
11.2 MB |
/.../1. Types of Malware/ |
|
|
12.0 MB |
|
11.8 MB |
|
2.4 MB |
|
15.9 MB |
|
2.7 MB |
|
2.0 MB |
|
3.3 MB |
|
15.2 MB |
|
3.2 MB |
/.../2. Types of Attacks/ |
|
|
4.6 MB |
|
8.4 MB |
|
17.5 MB |
|
1.9 MB |
|
3.6 MB |
|
4.5 MB |
|
1.4 MB |
|
3.7 MB |
|
2.2 MB |
|
12.4 MB |
|
7.3 MB |
|
5.0 MB |
|
2.4 MB |
|
2.7 MB |
|
5.4 MB |
|
19.9 MB |
|
3.0 MB |
|
9.2 MB |
|
1.6 MB |
/.../3. Effectiveness of Social Engineering Attacks/ |
|
|
3.8 MB |
|
3.1 MB |
|
8.1 MB |
|
7.1 MB |
|
9.3 MB |
|
4.1 MB |
|
8.3 MB |
|
3.0 MB |
|
2.9 MB |
|
3.8 MB |
|
2.0 MB |
|
2.5 MB |
|
2.3 MB |
|
2.2 MB |
|
2.3 MB |
|
1.1 MB |
/4. Wireless Attacks/ |
|
|
11.5 MB |
|
3.8 MB |
|
10.0 MB |
|
6.6 MB |
|
9.3 MB |
|
3.5 MB |
|
4.7 MB |
|
9.8 MB |
|
4.2 MB |
/5. Application Attacks/ |
|
|
3.9 MB |
|
7.5 MB |
|
6.4 MB |
|
13.3 MB |
|
4.4 MB |
|
5.5 MB |
|
4.3 MB |
|
4.3 MB |
|
6.4 MB |
|
4.5 MB |
|
3.3 MB |
|
3.2 MB |
|
5.0 MB |
|
1.5 MB |
|
3.8 MB |
/.../6. Mitigation and Deterrent Techniques/ |
|
|
4.7 MB |
|
8.7 MB |
|
10.8 MB |
|
7.4 MB |
|
1.7 MB |
|
2.9 MB |
|
12.0 MB |
|
3.3 MB |
|
13.8 MB |
|
1.8 MB |
/.../7. Discovering Security Threats and Vulnerabilities/ |
|
079. Module Overview and Interpreting Assessment Tools Results.mp4 |
10.4 MB |
|
9.7 MB |
|
5.5 MB |
|
7.5 MB |
|
3.0 MB |
|
3.2 MB |
|
8.2 MB |
|
2.1 MB |
|
2.8 MB |
|
4.8 MB |
|
4.6 MB |
|
3.1 MB |
|
3.6 MB |
|
960.2 KB |
/.../8. Penetration Testing vs. Vulnerability Scanning/ |
|
|
3.1 MB |
|
8.1 MB |
|
5.6 MB |
|
2.7 MB |
|
2.1 MB |
098. Testing Security Controls and Identifying Vulnerabilities.mp4 |
5.3 MB |
|
5.0 MB |
100. Intrusive vs. Non-intrusive and Credentialed vs. Non-credentialed.mp4 |
6.9 MB |
|
3.3 MB |
|
3.2 MB |
|
6.2 MB |
|
1.7 MB |
/CompTIA Security+ (SY0-401) Threats and Vulnerabilities/ |
|
|
18.9 MB |
/1. Course Overview/ |
|
|
5.2 MB |
/.../2. Computing, Communications, and Business Discipline Integration/ |
|
02. Communicating with Stakeholders from Other Disciplines.mp4 |
6.6 MB |
|
6.3 MB |
|
4.3 MB |
|
3.9 MB |
|
5.4 MB |
|
8.0 MB |
|
8.5 MB |
|
2.3 MB |
|
5.4 MB |
|
5.2 MB |
|
3.0 MB |
|
3.4 MB |
|
4.1 MB |
/.../3. Facilitating Collaboration to Achieve Security Goals/ |
|
15. Module Intro and Security of Unified Collaboration Tools.mp4 |
5.1 MB |
|
9.3 MB |
|
6.9 MB |
|
3.7 MB |
|
8.0 MB |
|
7.8 MB |
|
7.1 MB |
|
4.9 MB |
|
6.2 MB |
|
6.3 MB |
|
6.3 MB |
|
19.4 MB |
|
13.2 MB |
/.../4. Implement Security Activities Across the Technology Lifecycle/ |
|
|
6.4 MB |
|
4.1 MB |
|
6.6 MB |
|
3.4 MB |
|
3.5 MB |
|
3.4 MB |
|
2.3 MB |
|
2.4 MB |
|
7.7 MB |
|
3.7 MB |
|
1.5 MB |
|
1.9 MB |
|
1.9 MB |
|
2.3 MB |
|
3.2 MB |
|
4.5 MB |
|
3.4 MB |
|
5.3 MB |
|
3.0 MB |
|
9.1 MB |
/Computing, Communication, and Business Integration for CASP (CAS-002)/ |
|
computing-communication-business-integration-casp-cas-002.zip |
1.9 MB |
/1. Course Overview/ |
|
|
3.2 MB |
/2. Course Concepts/ |
|
|
6.5 MB |
|
4.7 MB |
|
5.4 MB |
/.../3. Preparing the Toolkit/ |
|
|
6.8 MB |
|
22.7 MB |
|
5.4 MB |
|
22.0 MB |
|
7.8 MB |
/.../4. Performing the Scanning Methodology/ |
|
|
5.0 MB |
|
28.6 MB |
|
3.9 MB |
|
5.3 MB |
|
4.9 MB |
|
41.7 MB |
|
3.1 MB |
|
47.1 MB |
|
1.6 MB |
/.../5. Leveraging the Internet to Find Vulnerabilities/ |
|
|
3.6 MB |
|
10.6 MB |
|
3.2 MB |
|
46.1 MB |
|
3.0 MB |
/.../6. Understanding the Types of Vulnerability Scanning/ |
|
|
3.8 MB |
|
18.3 MB |
|
4.3 MB |
|
20.7 MB |
|
2.3 MB |
|
1.9 MB |
/.../7. Executing Vulnerability Scanning/ |
|
|
4.1 MB |
|
18.7 MB |
|
2.7 MB |
|
17.1 MB |
|
1.9 MB |
|
21.6 MB |
|
6.7 MB |
|
848.0 KB |
/8. Conclusion/ |
|
|
7.4 MB |
/Conducting Network Vulnerability Analysis/ |
|
|
4.2 MB |
/1. Course Overview/ |
|
|
4.0 MB |
/.../2. Course Overview and Basic Concepts/ |
|
|
7.1 MB |
|
9.9 MB |
/.../3. Symmetric Key Cryptography/ |
|
|
2.6 MB |
|
4.7 MB |
|
8.7 MB |
|
4.9 MB |
|
1.7 MB |
|
2.0 MB |
|
2.1 MB |
|
7.2 MB |
|
8.7 MB |
|
8.9 MB |
|
1.0 MB |
/.../4. Asymmetric Key Cryptography/ |
|
|
2.0 MB |
|
2.7 MB |
|
5.6 MB |
|
3.8 MB |
|
2.4 MB |
|
605.3 KB |
|
6.0 MB |
|
2.4 MB |
|
7.4 MB |
|
1.2 MB |
/.../5. That’s Confidentiality, but What About Integrity/ |
|
|
2.3 MB |
|
2.8 MB |
|
3.3 MB |
|
4.2 MB |
|
1.7 MB |
|
6.7 MB |
|
4.2 MB |
|
2.3 MB |
|
4.3 MB |
|
5.5 MB |
|
1.1 MB |
/.../6. Cryptography Moving Forward/ |
|
|
3.8 MB |
/Cryptography - The Big Picture/ |
|
|
5.0 MB |
/.../1. History of Cryptography/ |
|
|
8.0 MB |
|
6.3 MB |
|
7.6 MB |
|
13.1 MB |
|
9.9 MB |
|
14.4 MB |
|
11.0 MB |
|
1.9 MB |
/2. Algorithms/ |
|
|
956.9 KB |
|
2.5 MB |
|
1.8 MB |
|
3.2 MB |
|
1.2 MB |
|
1.7 MB |
|
4.7 MB |
|
2.7 MB |
|
5.5 MB |
|
4.0 MB |
|
7.6 MB |
|
4.3 MB |
|
3.2 MB |
|
8.1 MB |
|
6.7 MB |
|
4.5 MB |
|
3.8 MB |
|
4.7 MB |
|
7.2 MB |
|
2.6 MB |
|
1.6 MB |
/3. APIs/ |
|
|
4.6 MB |
|
38.7 MB |
|
2.7 MB |
|
34.2 MB |
|
7.5 MB |
|
1.5 MB |
|
34.1 MB |
|
43.0 MB |
|
1.6 MB |
/.../4. Transport Layer Security/ |
|
|
13.0 MB |
|
9.1 MB |
|
14.4 MB |
|
21.1 MB |
|
10.6 MB |
|
6.0 MB |
|
1.3 MB |
|
5.6 MB |
|
1.1 MB |
/.../5. Authentication and Authorization/ |
|
|
3.4 MB |
|
3.9 MB |
|
5.7 MB |
|
2.7 MB |
|
5.7 MB |
|
6.6 MB |
|
4.6 MB |
|
6.3 MB |
|
1.8 MB |
|
4.4 MB |
|
3.6 MB |
|
9.6 MB |
|
3.6 MB |
|
1.6 MB |
/6. Case Studies/ |
|
|
7.4 MB |
|
5.9 MB |
|
9.4 MB |
|
11.4 MB |
|
7.2 MB |
|
1.6 MB |
/7. Decentralized Systems/ |
|
|
4.3 MB |
|
7.2 MB |
|
3.9 MB |
|
5.0 MB |
|
3.9 MB |
|
5.6 MB |
/Cryptography Fundamentals for Developers and Security Professionals/ |
|
|
10.7 MB |
/1. Course Overview/ |
|
|
4.9 MB |
/.../2. Secure Software Core Concepts/ |
|
|
10.4 MB |
|
9.2 MB |
|
11.8 MB |
|
11.9 MB |
|
10.5 MB |
|
9.0 MB |
|
9.0 MB |
|
10.0 MB |
|
14.9 MB |
|
16.2 MB |
|
12.6 MB |
|
11.8 MB |
|
7.8 MB |
|
12.7 MB |
|
6.3 MB |
/.../3. Secure Software Concepts/ |
|
|
9.8 MB |
|
12.7 MB |
|
19.6 MB |
|
15.3 MB |
|
16.8 MB |
|
10.6 MB |
|
8.2 MB |
|
16.2 MB |
|
15.4 MB |
|
15.3 MB |
|
4.7 MB |
28. Economy of Mechanism and Leveraging Existing Components.mp4 |
8.9 MB |
|
24.4 MB |
|
9.7 MB |
|
14.9 MB |
|
14.3 MB |
/CSSLP® - Secure Software Concepts/ |
|
|
12.6 MB |
/1. Course Overview/ |
|
|
4.2 MB |
/.../2. Identity Security Requirements/ |
|
|
15.1 MB |
|
14.6 MB |
|
4.0 MB |
|
9.5 MB |
|
16.1 MB |
/.../3. Interpret Data Classification Requirements/ |
|
|
9.4 MB |
08. Identify Data Classification Requirements - Ownership.mp4 |
5.7 MB |
09. Identify Data Classification Requirements - Retention.mp4 |
7.9 MB |
|
18.7 MB |
|
8.1 MB |
|
9.0 MB |
/.../4. Include Security in Software Requirement Specifications/ |
|
13. Include Security in Software Requirements Specification.mp4 |
7.0 MB |
|
17.7 MB |
|
10.8 MB |
|
12.0 MB |
|
9.9 MB |
|
10.0 MB |
|
8.7 MB |
|
22.2 MB |
|
17.2 MB |
|
18.9 MB |
|
11.3 MB |
|
4.8 MB |
/CSSLP® - Secure Software Requirements/ |
|
|
1.8 MB |
/1. Course Overview/ |
|
|
5.4 MB |
/.../2. What Is Ransomware/ |
|
|
4.1 MB |
|
20.3 MB |
|
15.2 MB |
|
5.9 MB |
|
15.1 MB |
|
11.7 MB |
|
617.9 KB |
|
52.0 MB |
|
6.4 MB |
|
2.5 MB |
/.../3. Ransomware Entry Points/ |
|
|
2.7 MB |
|
3.1 MB |
|
10.6 MB |
15. Embedded Hyperlinks, Websites_downloads, and Drive-by Infections.mp4 |
6.2 MB |
|
5.4 MB |
17. Command and Callback (C&C) and Indicators of Compromise.mp4 |
7.0 MB |
|
2.8 MB |
/.../4. Incident Response - Detection and Containment/ |
|
|
2.6 MB |
|
5.3 MB |
|
7.3 MB |
|
9.0 MB |
|
1.7 MB |
/.../5. Incident Response - Eradication and Recovery/ |
|
|
5.9 MB |
|
3.7 MB |
|
7.3 MB |
|
15.1 MB |
|
6.7 MB |
|
71.4 MB |
|
22.3 MB |
|
6.0 MB |
/.../6. Countermeasures and Preparing Your Incident Response/ |
|
|
5.5 MB |
|
11.4 MB |
|
8.0 MB |
|
5.6 MB |
|
10.9 MB |
|
5.5 MB |
/Cybersecurity Threats - Ransomware/ |
|
|
17.2 MB |
/1. Course Overview/ |
|
|
5.2 MB |
/.../2. Identifying Security Standards and Bodies/ |
|
|
8.8 MB |
|
9.1 MB |
04. International Organization for Standardization (ISO).mp4 |
10.3 MB |
05. Payment Card Industry Data Security Standard (PCI DSS).mp4 |
4.1 MB |
|
24.3 MB |
|
12.7 MB |
|
5.3 MB |
09. Health Insurance Portability and Accountability Act (HIPAA).mp4 |
4.3 MB |
|
8.1 MB |
|
6.4 MB |
|
1.6 MB |
/.../3. Designing Security Policies/ |
|
|
2.7 MB |
|
8.6 MB |
|
14.8 MB |
|
7.2 MB |
|
8.1 MB |
|
9.5 MB |
|
18.2 MB |
|
19.4 MB |
|
5.5 MB |
|
16.7 MB |
|
16.4 MB |
|
14.6 MB |
|
3.5 MB |
|
3.4 MB |
/.../4. Implementing Security Policies/ |
|
|
1.4 MB |
|
11.7 MB |
|
18.7 MB |
|
6.9 MB |
|
11.7 MB |
|
9.9 MB |
|
25.1 MB |
|
2.7 MB |
/Designing and Implementing Security Policies/ |
|
|
715.3 KB |
/1. Course Overview/ |
|
|
5.1 MB |
/.../2. Getting Started with New Technology File System (NTFS)/ |
|
|
3.4 MB |
|
1.9 MB |
|
4.5 MB |
|
4.2 MB |
|
1.9 MB |
|
1.7 MB |
|
2.8 MB |
|
975.7 KB |
|
2.6 MB |
|
1.7 MB |
|
2.8 MB |
|
64.5 MB |
|
1.9 MB |
/.../3. Working with Extended File System (EXT)/ |
|
|
790.8 KB |
|
1.0 MB |
|
10.8 MB |
|
10.3 MB |
|
3.2 MB |
|
32.6 MB |
|
7.7 MB |
|
1.2 MB |
/.../4. Analyzing with Hierarchical File System Plus (HFS+)/ |
|
|
923.7 KB |
|
10.4 MB |
|
18.0 MB |
|
6.9 MB |
|
11.0 MB |
|
732.4 KB |
/Digital Forensics - Getting Started with File Systems/ |
|
|
1.4 MB |
/.../1. Introduction to Kali Linux and Digital Forensics/ |
|
|
11.8 MB |
|
9.1 MB |
|
4.7 MB |
|
10.9 MB |
|
4.3 MB |
|
4.7 MB |
/.../2. Getting Started with Kali Forensics/ |
|
|
4.0 MB |
|
29.7 MB |
|
20.6 MB |
|
16.4 MB |
|
52.1 MB |
|
33.5 MB |
|
30.9 MB |
|
6.1 MB |
/.../3. Forensic Imaging Tools/ |
|
|
14.2 MB |
|
25.1 MB |
|
26.4 MB |
|
35.5 MB |
|
25.4 MB |
|
23.8 MB |
|
20.8 MB |
|
21.5 MB |
|
21.1 MB |
|
11.8 MB |
|
3.2 MB |
/.../4. Forensic Hashing Tools/ |
|
|
11.4 MB |
|
13.8 MB |
|
8.3 MB |
|
4.7 MB |
|
27.8 MB |
|
62.0 MB |
|
44.7 MB |
|
2.0 MB |
|
5.5 MB |
/.../5. What We Covered/ |
|
|
12.9 MB |
/Digital Forensics Tools in Kali Linux - Imaging and Hashing/ |
|
|
8.7 MB |
/1. Course Overview/ |
|
|
4.3 MB |
/.../2. Security Data Analytics - What's Going On/ |
|
|
11.1 MB |
|
1.4 MB |
|
15.9 MB |
|
9.1 MB |
|
4.9 MB |
|
17.7 MB |
|
1.9 MB |
/.../3. Defense in Depth - This Is Where It Begins/ |
|
|
1.4 MB |
|
17.7 MB |
|
9.8 MB |
|
3.7 MB |
|
3.6 MB |
|
4.2 MB |
|
2.5 MB |
/.../4. Defense in Depth - What Tools Can You Use/ |
|
|
2.2 MB |
|
10.4 MB |
|
13.8 MB |
|
4.3 MB |
|
2.0 MB |
|
12.8 MB |
|
8.0 MB |
|
13.7 MB |
|
2.6 MB |
/.../5. Defense in Depth - Drill, Test, Rinse, Repeat/ |
|
|
1.2 MB |
|
6.9 MB |
|
10.4 MB |
|
4.3 MB |
|
4.9 MB |
|
7.8 MB |
|
2.0 MB |
/.../6. The Fundamentals of Frameworks, Policies, Controls, & Procedures/ |
|
|
1.1 MB |
|
7.1 MB |
|
12.8 MB |
|
6.9 MB |
|
7.5 MB |
|
6.2 MB |
|
1.5 MB |
/Enterprise Security - Policies, Practices, and Procedures/ |
|
|
8.6 MB |
/1. Course Overview/ |
|
|
5.8 MB |
/.../2. Appropriate Cryptographic Concepts and Techniques/ |
|
|
7.3 MB |
|
5.1 MB |
04. Pseudo-random Number Generators and Encryption Types.mp4 |
6.6 MB |
|
4.9 MB |
|
8.1 MB |
07. Cryptographic Methods and Design, EBC, CBC, OFB, and CFB.mp4 |
8.7 MB |
|
4.4 MB |
|
4.5 MB |
|
4.1 MB |
|
6.0 MB |
/.../3. Security Implications Associated with Enterprise Storage/ |
|
|
2.9 MB |
|
8.1 MB |
|
6.7 MB |
|
12.0 MB |
|
10.0 MB |
|
8.9 MB |
|
8.0 MB |
|
3.6 MB |
|
4.2 MB |
|
2.9 MB |
|
2.4 MB |
|
7.3 MB |
24. Encryption Types - Disk, Block, File, Record, and Port.mp4 |
8.7 MB |
/.../4. Network and Security Components, Concepts, and Architectures/ |
|
|
4.5 MB |
|
8.3 MB |
|
4.3 MB |
|
3.6 MB |
|
5.6 MB |
|
6.1 MB |
|
2.9 MB |
|
11.5 MB |
|
7.0 MB |
|
7.6 MB |
|
6.1 MB |
/.../5. Troubleshoot Security Controls for Hosts/ |
|
|
4.6 MB |
|
6.6 MB |
38. Configuring Dedicated Interfaces and out of Band NICs.mp4 |
10.7 MB |
|
6.6 MB |
40. Security Advantages and Disadvantages of Virtualizing Servers.mp4 |
14.1 MB |
|
8.8 MB |
|
5.0 MB |
|
7.7 MB |
|
2.2 MB |
|
4.0 MB |
|
1.8 MB |
|
5.1 MB |
|
4.5 MB |
49. VDI, Terminal Services, and Application Delivery Services.mp4 |
13.9 MB |
|
8.7 MB |
/.../6. Application Vulnerabilities and Appropriate Security Controls/ |
|
|
2.7 MB |
|
5.1 MB |
|
4.9 MB |
|
2.7 MB |
|
4.5 MB |
|
2.5 MB |
|
5.8 MB |
|
5.9 MB |
59. Application Security Frameworks and Standard Libraries.mp4 |
4.4 MB |
|
2.3 MB |
|
1.4 MB |
|
2.5 MB |
|
3.4 MB |
|
6.8 MB |
|
2.6 MB |
|
4.7 MB |
|
2.2 MB |
|
2.7 MB |
|
1.5 MB |
|
2.1 MB |
/Enterprise Security for CASP (CAS-002)/ |
|
|
5.1 MB |
/.../1. Getting a Grip on Mobile Security/ |
|
|
36.0 MB |
|
10.4 MB |
|
26.3 MB |
|
4.4 MB |
/.../2. Security Threat Discussion/ |
|
|
36.5 MB |
|
29.9 MB |
|
42.8 MB |
|
21.2 MB |
/3. Cryptography Primer/ |
|
|
2.9 MB |
|
15.7 MB |
|
10.7 MB |
|
19.2 MB |
|
15.1 MB |
|
4.9 MB |
|
14.6 MB |
|
28.1 MB |
|
24.4 MB |
|
8.7 MB |
/.../4. Defining Requirements for Secure Mobile Devices/ |
|
|
2.8 MB |
|
25.0 MB |
|
18.9 MB |
|
19.5 MB |
|
8.6 MB |
/.../5. Defining Requirements for a Secure Mobile Backend Infrastructure/ |
|
|
10.6 MB |
|
29.8 MB |
|
6.6 MB |
|
26.8 MB |
|
28.0 MB |
|
14.0 MB |
/.../6. Risk Mitigation Strategies/ |
|
|
2.7 MB |
|
26.3 MB |
|
34.9 MB |
|
15.3 MB |
|
17.4 MB |
|
9.9 MB |
|
14.1 MB |
|
13.8 MB |
|
17.8 MB |
|
21.6 MB |
|
7.1 MB |
/.../7. Technologies Able to Satisfy Security_Mitigation Requirements/ |
|
|
1.3 MB |
|
9.8 MB |
|
31.5 MB |
|
5.0 MB |
|
13.8 MB |
|
12.5 MB |
|
14.8 MB |
|
10.4 MB |
|
22.2 MB |
|
4.2 MB |
|
22.3 MB |
|
3.7 MB |
/.../8. Reaching Enterprise Security/ |
|
|
3.3 MB |
|
26.8 MB |
|
22.7 MB |
|
7.8 MB |
|
10.6 MB |
|
12.5 MB |
|
9.5 MB |
|
9.8 MB |
|
8.0 MB |
|
13.5 MB |
|
38.1 MB |
|
5.3 MB |
/Enterprise Strength Mobile Device Security/ |
|
|
17.3 MB |
/.../1. What Are Buffer Overflows/ |
|
|
13.2 MB |
|
11.2 MB |
|
17.9 MB |
|
13.8 MB |
|
5.2 MB |
/.../2. Inside Buffer Overflows/ |
|
|
15.9 MB |
|
10.2 MB |
|
11.5 MB |
|
6.9 MB |
|
30.5 MB |
|
8.9 MB |
|
14.8 MB |
|
10.2 MB |
|
9.9 MB |
|
2.5 MB |
/.../3. Finding Buffer Overflows/ |
|
|
14.6 MB |
|
18.6 MB |
|
31.4 MB |
|
24.3 MB |
|
28.8 MB |
|
15.6 MB |
|
20.4 MB |
|
20.7 MB |
|
4.5 MB |
/.../4. Mitigating Buffer Overflows/ |
|
|
10.8 MB |
|
25.4 MB |
|
24.5 MB |
|
22.3 MB |
|
20.7 MB |
30. SEHOP - Structured Exception Handling Overwrite Protection.mp4 |
12.7 MB |
|
2.8 MB |
|
3.5 MB |
/Ethical Hacking - Buffer Overflow/ |
|
|
20.0 MB |
/.../1. Cloud Computing Concepts/ |
|
|
4.9 MB |
|
61.4 MB |
|
9.8 MB |
|
13.7 MB |
|
6.0 MB |
|
8.2 MB |
|
3.8 MB |
|
7.0 MB |
|
3.6 MB |
/.../2. Organizational Security Considerations/ |
|
|
3.9 MB |
|
3.2 MB |
|
28.9 MB |
|
20.3 MB |
|
13.2 MB |
|
2.8 MB |
|
8.1 MB |
|
5.1 MB |
/.../3. Cloud Computing Risks/ |
|
|
3.5 MB |
|
27.6 MB |
|
13.2 MB |
|
16.5 MB |
|
14.0 MB |
|
10.0 MB |
|
25.6 MB |
|
3.0 MB |
/.../4. Cloud Computing Security Strengths/ |
|
|
4.1 MB |
|
27.7 MB |
|
28.8 MB |
|
12.7 MB |
|
4.8 MB |
|
8.9 MB |
|
13.1 MB |
|
5.2 MB |
/.../5. Hardening the Cloud/ |
|
|
3.4 MB |
|
16.3 MB |
|
16.1 MB |
|
8.6 MB |
|
7.3 MB |
|
14.0 MB |
|
16.0 MB |
|
2.8 MB |
/Ethical Hacking - Cloud Computing/ |
|
|
4.0 MB |
/1. Learning Cryptography/ |
|
|
6.4 MB |
|
2.3 MB |
|
6.7 MB |
|
8.2 MB |
|
2.7 MB |
|
2.0 MB |
/.../2. Additional Cryptography Topics/ |
|
|
4.4 MB |
|
8.5 MB |
|
6.6 MB |
|
3.7 MB |
|
7.4 MB |
|
3.2 MB |
/.../3. Cryptography Tools for Advanced Study/ |
|
|
3.0 MB |
|
10.3 MB |
|
11.5 MB |
|
6.9 MB |
|
2.1 MB |
/Ethical Hacking - Cryptography/ |
|
|
2.0 MB |
/.../1. Understanding Denial of Service Attacks/ |
|
|
5.4 MB |
|
10.3 MB |
|
4.8 MB |
|
5.2 MB |
|
34.2 MB |
|
7.0 MB |
|
20.9 MB |
|
7.1 MB |
|
3.7 MB |
|
3.4 MB |
/2. Attack Techniques/ |
|
|
4.4 MB |
|
7.3 MB |
|
9.1 MB |
|
26.9 MB |
|
4.5 MB |
|
10.0 MB |
|
14.9 MB |
|
2.8 MB |
|
3.4 MB |
|
3.7 MB |
|
12.5 MB |
|
10.3 MB |
|
4.8 MB |
/.../3. Tools and Services/ |
|
|
5.2 MB |
|
26.5 MB |
|
9.8 MB |
|
22.5 MB |
|
42.7 MB |
|
8.7 MB |
|
15.2 MB |
|
3.4 MB |
/.../4. Defending Against Attacks/ |
|
|
4.1 MB |
|
4.9 MB |
|
5.6 MB |
|
8.8 MB |
|
7.7 MB |
|
17.6 MB |
|
9.7 MB |
|
8.2 MB |
|
12.3 MB |
|
5.4 MB |
/Ethical Hacking - Denial of Service/ |
|
|
4.6 MB |
/.../1. Enumeration Explained & the Techniques Used/ |
|
|
2.6 MB |
|
7.0 MB |
|
8.9 MB |
|
5.8 MB |
|
1.6 MB |
/.../2. Enumerating via Defaults & NetBIOS/ |
|
|
4.1 MB |
|
15.2 MB |
|
2.5 MB |
|
55.5 MB |
|
21.2 MB |
|
19.9 MB |
|
2.4 MB |
/.../3. Enumerating via SNMP/ |
|
|
2.1 MB |
|
14.0 MB |
|
21.4 MB |
|
874.8 KB |
/.../4. Enumerating via LDAP/ |
|
|
1.8 MB |
|
10.0 MB |
|
26.8 MB |
|
1.2 MB |
/.../5. Enumerating via NTP/ |
|
|
1.8 MB |
|
5.7 MB |
|
12.4 MB |
|
1.3 MB |
/.../6. Enumerating via SMTP/ |
|
|
2.5 MB |
|
7.3 MB |
|
15.9 MB |
|
16.9 MB |
|
1.5 MB |
/.../7. Enumerating via DNS/ |
|
|
3.0 MB |
|
6.3 MB |
|
8.0 MB |
|
23.4 MB |
|
1.3 MB |
/.../8. Linux Isn't Safe Either/ |
|
|
4.0 MB |
|
11.0 MB |
|
13.9 MB |
|
2.0 MB |
/.../9. Countermeasures for Enumeration/ |
|
|
3.1 MB |
|
14.3 MB |
|
3.0 MB |
/Ethical Hacking - Enumeration/ |
|
|
92.5 MB |
/.../1. Understanding Organizational Defenses/ |
|
|
6.6 MB |
|
30.6 MB |
|
4.5 MB |
|
4.5 MB |
|
4.9 MB |
|
2.1 MB |
|
2.0 MB |
/2. Firewalls/ |
|
|
4.8 MB |
|
14.3 MB |
|
9.0 MB |
|
10.2 MB |
|
6.9 MB |
|
5.4 MB |
|
4.9 MB |
|
5.6 MB |
|
8.4 MB |
|
18.6 MB |
|
25.4 MB |
|
5.4 MB |
/.../3. Intrusion Detection Systems/ |
|
|
3.9 MB |
|
21.6 MB |
|
8.3 MB |
|
9.0 MB |
|
6.0 MB |
|
7.5 MB |
|
3.4 MB |
|
8.4 MB |
|
14.3 MB |
|
9.8 MB |
|
9.1 MB |
|
5.5 MB |
/4. Honeypots/ |
|
|
3.3 MB |
|
23.3 MB |
|
19.5 MB |
|
16.9 MB |
|
10.5 MB |
|
30.9 MB |
|
13.6 MB |
|
4.2 MB |
/Ethical Hacking - Evading IDS, Firewalls, and Honeypots/ |
|
|
5.3 MB |
/.../1. Mobile Device Attack Vectors/ |
|
|
10.2 MB |
|
14.8 MB |
|
11.6 MB |
|
4.2 MB |
|
16.1 MB |
|
30.9 MB |
|
3.5 MB |
/2. Hacking Android/ |
|
|
3.0 MB |
|
24.7 MB |
|
20.8 MB |
|
22.3 MB |
|
15.8 MB |
|
39.6 MB |
|
45.6 MB |
|
22.9 MB |
|
18.4 MB |
|
22.0 MB |
|
9.0 MB |
|
2.4 MB |
/3. Hacking iOS/ |
|
|
5.9 MB |
|
17.4 MB |
|
14.5 MB |
|
10.8 MB |
|
14.4 MB |
|
41.9 MB |
|
14.3 MB |
|
3.0 MB |
/.../4. Hacking Other Mobile Platforms/ |
|
|
4.8 MB |
|
8.1 MB |
|
3.6 MB |
|
6.7 MB |
|
8.1 MB |
|
1.7 MB |
/.../5. MDM - Mobile Device Management, Guidelines, and Tools/ |
|
34. MDM - Mobile Device Management, Guidelines, and Tools.mp4 |
3.9 MB |
|
17.8 MB |
|
16.5 MB |
|
13.2 MB |
|
7.0 MB |
|
22.2 MB |
|
1.4 MB |
/6. Mobile Malware/ |
|
|
3.0 MB |
|
19.5 MB |
|
26.9 MB |
|
17.4 MB |
|
11.6 MB |
|
2.2 MB |
/7. Mobile Payments/ |
|
|
2.6 MB |
|
5.3 MB |
|
5.8 MB |
|
5.8 MB |
|
8.2 MB |
|
1.9 MB |
/Ethical Hacking - Hacking Mobile Platforms/ |
|
|
14.5 MB |
/.../1. Understanding Security in Web Applications/ |
|
|
4.4 MB |
|
5.4 MB |
|
11.7 MB |
|
12.0 MB |
|
19.1 MB |
|
17.4 MB |
|
3.9 MB |
|
2.2 MB |
|
3.3 MB |
/.../2. Reconnaissance and Footprinting/ |
|
|
3.7 MB |
|
26.8 MB |
|
27.8 MB |
|
38.5 MB |
|
5.8 MB |
|
8.5 MB |
|
19.6 MB |
|
13.7 MB |
|
18.9 MB |
|
8.9 MB |
|
2.7 MB |
/.../3. Tampering of Untrusted Data/ |
|
|
3.3 MB |
|
9.6 MB |
|
8.9 MB |
|
18.0 MB |
|
10.4 MB |
|
10.7 MB |
|
9.6 MB |
|
13.0 MB |
|
6.4 MB |
|
2.3 MB |
/.../4. Attacks Involving the Client/ |
|
|
3.2 MB |
|
35.7 MB |
|
16.4 MB |
|
5.3 MB |
|
13.4 MB |
|
19.0 MB |
|
28.6 MB |
|
26.9 MB |
|
4.3 MB |
/.../5. Attacks Against Identity Management and Access Controls/ |
|
|
5.0 MB |
|
5.2 MB |
|
19.6 MB |
|
19.0 MB |
|
11.2 MB |
|
14.4 MB |
|
12.1 MB |
|
3.6 MB |
/.../6. Denial of Service Attacks/ |
|
|
3.9 MB |
|
6.9 MB |
|
4.1 MB |
|
7.2 MB |
|
30.0 MB |
|
16.7 MB |
|
10.8 MB |
|
6.8 MB |
|
13.3 MB |
|
4.8 MB |
/.../7. Other Attacks on the Server/ |
|
|
4.6 MB |
|
41.8 MB |
|
8.0 MB |
|
35.8 MB |
|
17.5 MB |
|
22.8 MB |
|
14.7 MB |
|
5.3 MB |
/Ethical Hacking - Hacking Web Applications/ |
|
|
10.9 MB |
/.../1. Understanding How Web Servers Are Hacked/ |
|
|
3.1 MB |
|
15.4 MB |
|
11.0 MB |
|
6.9 MB |
|
10.3 MB |
|
3.6 MB |
/.../2. Discovering Risks in Web Servers/ |
|
|
3.6 MB |
|
23.8 MB |
|
18.4 MB |
|
19.7 MB |
|
13.9 MB |
|
21.6 MB |
|
2.5 MB |
/.../3. Web Server Misconfiguration/ |
|
|
3.4 MB |
|
42.7 MB |
|
20.7 MB |
|
18.3 MB |
|
32.6 MB |
|
53.0 MB |
|
4.1 MB |
/.../4. Managing and Hardening Web Servers/ |
|
|
3.5 MB |
|
13.8 MB |
|
12.2 MB |
|
28.7 MB |
|
4.2 MB |
|
23.8 MB |
|
3.7 MB |
/.../5. Other Attacks Against Web Servers/ |
|
|
3.1 MB |
|
13.1 MB |
|
8.9 MB |
|
4.4 MB |
|
24.6 MB |
|
3.5 MB |
|
2.1 MB |
|
3.6 MB |
/Ethical Hacking - Hacking Web Servers/ |
|
|
6.0 MB |
/.../1. Insights into Wireless/ |
|
|
22.8 MB |
|
19.7 MB |
|
9.0 MB |
|
4.2 MB |
|
14.2 MB |
|
5.4 MB |
|
11.3 MB |
|
12.7 MB |
|
3.6 MB |
/.../2. Encryption in Wireless/ |
|
|
3.3 MB |
|
6.6 MB |
|
13.4 MB |
|
10.3 MB |
|
3.3 MB |
|
2.6 MB |
/.../3. Threats from Wireless/ |
|
|
3.2 MB |
|
12.2 MB |
|
10.2 MB |
|
6.0 MB |
|
1.2 MB |
/.../4. The Methodology of Hacking Wireless/ |
|
|
1.9 MB |
|
5.0 MB |
|
178.0 MB |
|
9.8 MB |
|
7.7 MB |
|
5.4 MB |
|
3.2 MB |
|
11.6 MB |
|
1.9 MB |
/5. Hacking Bluetooth/ |
|
|
1.4 MB |
|
1.8 MB |
|
6.8 MB |
|
5.9 MB |
|
7.7 MB |
|
1.4 MB |
/6. Countermeasures/ |
|
|
1.6 MB |
|
2.7 MB |
|
3.9 MB |
|
6.2 MB |
|
13.1 MB |
|
3.0 MB |
|
2.0 MB |
/Ethical Hacking - Hacking Wireless Networks/ |
|
|
9.8 MB |
/.../1. The Hard Truth Behind Malware/ |
|
|
8.0 MB |
|
4.6 MB |
|
8.7 MB |
|
25.4 MB |
|
1.7 MB |
/2. What's a Trojan/ |
|
|
2.4 MB |
|
7.9 MB |
|
9.9 MB |
|
22.3 MB |
|
7.4 MB |
|
2.3 MB |
/3. Trojan Infections/ |
|
|
2.8 MB |
|
14.3 MB |
|
36.9 MB |
|
6.2 MB |
|
6.1 MB |
|
2.2 MB |
/.../4. Types of Trojans/ |
|
|
4.1 MB |
|
17.1 MB |
|
29.0 MB |
|
1.5 MB |
/.../5. Virus and Worms/ |
|
|
2.8 MB |
|
11.4 MB |
|
20.7 MB |
|
6.2 MB |
|
10.7 MB |
|
22.7 MB |
|
8.8 MB |
|
2.8 MB |
/6. Detecting Malware/ |
|
|
2.2 MB |
|
37.2 MB |
|
17.7 MB |
|
34.8 MB |
|
2.2 MB |
/7. Countermeasures/ |
|
|
4.6 MB |
|
5.9 MB |
|
20.6 MB |
|
3.7 MB |
/Ethical Hacking - Malware Threats/ |
|
|
7.4 MB |
/.../1. Understanding Penetration Testing/ |
|
|
5.7 MB |
|
16.9 MB |
|
6.0 MB |
|
24.8 MB |
|
18.2 MB |
|
4.1 MB |
|
29.8 MB |
|
4.7 MB |
/.../10. Pen Testing - Targeting Web Servers/ |
|
|
6.5 MB |
|
7.3 MB |
|
7.5 MB |
|
2.4 MB |
/.../11. Pen Testing - Hitting Web Apps/ |
|
|
6.2 MB |
|
8.0 MB |
|
3.9 MB |
|
3.0 MB |
|
3.4 MB |
|
2.1 MB |
|
4.9 MB |
|
3.3 MB |
|
6.3 MB |
|
2.6 MB |
|
4.9 MB |
/.../12. Pen Testing - Looking at the Wi-Fi/ |
|
|
4.5 MB |
|
3.0 MB |
|
1.3 MB |
|
3.0 MB |
|
3.1 MB |
|
2.4 MB |
/.../13. Pen Testing - Focusing on the Mobile Devices/ |
|
|
8.6 MB |
|
9.4 MB |
|
3.7 MB |
|
3.4 MB |
|
7.0 MB |
|
2.6 MB |
/.../14. Pen Testing - Target the Firewall and_or IDS/ |
|
|
4.8 MB |
|
5.3 MB |
|
11.7 MB |
|
2.0 MB |
/.../15. Pen Testing - Going After the Cloud/ |
|
|
4.2 MB |
|
4.5 MB |
|
8.5 MB |
|
2.3 MB |
/.../16. How to Bring It All Together/ |
|
|
3.2 MB |
|
12.4 MB |
|
3.1 MB |
/.../2. Pen Testing - Reconning and_or Footprinting the Target/ |
|
|
2.1 MB |
|
11.2 MB |
|
1.2 MB |
/.../3. Pen Testing - Scanning the Target/ |
|
|
5.2 MB |
|
14.3 MB |
|
1.1 MB |
/.../4. Pen Testing - Enumerating the Target/ |
|
|
3.1 MB |
|
11.7 MB |
|
6.6 MB |
/.../5. Pen Testing - Hacking the Target/ |
|
|
5.9 MB |
|
21.5 MB |
|
3.3 MB |
|
3.0 MB |
|
5.0 MB |
|
1.9 MB |
|
3.4 MB |
/.../6. Pen Testing - Sniffing the Target/ |
|
|
3.3 MB |
|
8.8 MB |
|
2.8 MB |
/.../7. Pen Testing - Social Engineering the Target/ |
|
|
10.4 MB |
|
7.8 MB |
|
10.1 MB |
|
2.3 MB |
/.../8. Pen Testing - DoS_DDoS the Target/ |
|
|
8.3 MB |
|
1.3 MB |
|
3.3 MB |
|
3.3 MB |
|
2.6 MB |
|
3.5 MB |
/.../9. Pen Testing - Session Hijacking the Target/ |
|
|
4.8 MB |
|
8.0 MB |
|
3.0 MB |
/Ethical Hacking - Penetration Testing/ |
|
|
15.8 MB |
/.../1. What Do You Mean by Reconnaissance_Footprinting/ |
|
|
8.8 MB |
|
6.8 MB |
|
4.0 MB |
|
4.4 MB |
|
19.7 MB |
|
3.1 MB |
|
1.3 MB |
/.../2. Initially What Do You Look For/ |
|
|
4.5 MB |
|
20.8 MB |
|
44.6 MB |
|
25.6 MB |
|
16.3 MB |
|
18.7 MB |
|
25.1 MB |
|
1.6 MB |
/.../3. The More You Look, the More You Find/ |
|
|
4.9 MB |
|
18.6 MB |
|
20.2 MB |
|
11.1 MB |
|
24.4 MB |
|
19.1 MB |
|
7.2 MB |
|
2.7 MB |
/.../4. Other Reconnaissance Techniques/ |
|
|
3.4 MB |
|
5.6 MB |
|
7.0 MB |
|
40.5 MB |
|
18.4 MB |
|
8.2 MB |
|
6.5 MB |
|
13.7 MB |
|
3.8 MB |
/.../5. Reconnaissance via Google Hacking/ |
|
|
3.5 MB |
|
5.8 MB |
|
15.7 MB |
|
11.2 MB |
|
16.9 MB |
|
23.4 MB |
|
14.3 MB |
|
30.6 MB |
|
3.5 MB |
|
2.4 MB |
/.../6. Reconnaissance Countermeasures & Pen Testing/ |
|
|
2.3 MB |
|
5.0 MB |
|
6.5 MB |
|
10.6 MB |
|
8.3 MB |
|
9.4 MB |
|
1.7 MB |
/Ethical Hacking - Reconnaissance_Footprinting/ |
|
|
115.7 MB |
/.../1. Overview of Scanning/ |
|
|
5.6 MB |
|
3.4 MB |
|
9.4 MB |
|
5.3 MB |
|
5.4 MB |
|
3.9 MB |
|
3.1 MB |
/.../2. Understanding the 3-way Handshake/ |
|
|
3.9 MB |
|
8.9 MB |
|
7.3 MB |
|
5.4 MB |
|
28.1 MB |
|
2.8 MB |
|
2.0 MB |
/.../3. Checking for 'Live' Systems and Their Open Ports/ |
|
|
4.3 MB |
|
22.4 MB |
|
23.9 MB |
|
7.9 MB |
|
5.8 MB |
|
12.6 MB |
|
1.2 MB |
/.../4. Types of Scanning/ |
|
|
3.0 MB |
|
27.4 MB |
|
18.2 MB |
|
21.6 MB |
|
13.8 MB |
|
14.0 MB |
|
5.4 MB |
|
7.4 MB |
|
30.3 MB |
|
6.0 MB |
|
2.8 MB |
/.../5. Banner Grabbing and OS Fingerprinting/ |
|
|
2.4 MB |
|
3.8 MB |
|
53.1 MB |
|
18.6 MB |
|
3.8 MB |
|
1.4 MB |
/.../6. Vulnerability Scanning and Drawing Out the Network/ |
|
|
3.3 MB |
|
5.3 MB |
|
5.1 MB |
|
15.3 MB |
|
5.1 MB |
|
8.1 MB |
|
3.8 MB |
|
3.5 MB |
|
33.9 MB |
|
4.1 MB |
|
26.5 MB |
|
2.1 MB |
/.../7. Preparing Proxies and Other Anonymizing Techniques/ |
|
|
3.0 MB |
|
12.4 MB |
|
4.1 MB |
|
4.3 MB |
|
3.9 MB |
|
2.0 MB |
/Ethical Hacking - Scanning Networks/ |
|
|
227.6 MB |
/.../1. Understanding Session Hijacking/ |
|
|
4.1 MB |
|
2.5 MB |
|
4.9 MB |
|
5.6 MB |
|
9.2 MB |
|
14.2 MB |
|
1.9 MB |
/.../2. Session Persistence in Web Applications/ |
|
|
2.6 MB |
|
6.1 MB |
|
8.5 MB |
|
23.5 MB |
|
16.5 MB |
|
6.1 MB |
|
4.1 MB |
/.../3. Hijacking Sessions in Web Applications/ |
|
|
3.8 MB |
|
31.7 MB |
|
16.6 MB |
|
21.3 MB |
|
21.1 MB |
|
23.7 MB |
|
20.0 MB |
|
11.5 MB |
|
13.2 MB |
|
5.0 MB |
/.../4. Network and Client Level Session Hijacking/ |
|
|
4.7 MB |
|
13.4 MB |
|
34.3 MB |
28. Generation and Predictability of TCP Sequence Numbers.mp4 |
16.6 MB |
|
3.6 MB |
|
3.2 MB |
|
2.2 MB |
|
3.0 MB |
|
4.6 MB |
|
4.6 MB |
|
3.6 MB |
/.../5. Mitigating the Risk of Session Hijacking/ |
|
|
3.6 MB |
|
4.9 MB |
|
3.8 MB |
|
21.1 MB |
|
11.2 MB |
|
15.1 MB |
|
25.1 MB |
|
15.5 MB |
|
4.8 MB |
|
4.4 MB |
|
3.2 MB |
|
5.0 MB |
/.../6. Automating Session Hijack Attacks/ |
|
|
3.2 MB |
|
18.5 MB |
|
31.7 MB |
|
27.0 MB |
|
22.9 MB |
|
3.3 MB |
/Ethical Hacking - Session Hijacking/ |
|
|
12.9 MB |
/.../1. Sniffing – It's Not the Cold Season/ |
|
|
8.1 MB |
|
13.5 MB |
|
5.0 MB |
|
13.1 MB |
|
7.7 MB |
|
2.8 MB |
/2. DHCP Assaults/ |
|
|
2.9 MB |
|
13.8 MB |
|
7.2 MB |
|
3.8 MB |
|
9.0 MB |
|
2.5 MB |
/.../3. Big-MAC Attacks/ |
|
|
2.6 MB |
|
5.1 MB |
|
7.4 MB |
|
3.8 MB |
|
3.3 MB |
|
2.9 MB |
/4. ARP Poisoning/ |
|
|
3.6 MB |
|
12.6 MB |
|
6.1 MB |
|
25.3 MB |
|
6.2 MB |
|
3.7 MB |
|
2.6 MB |
/5. DNS Poisoning/ |
|
|
2.3 MB |
|
6.0 MB |
|
3.4 MB |
|
10.7 MB |
|
4.8 MB |
|
8.2 MB |
|
6.6 MB |
|
2.0 MB |
/6. Countermeasures/ |
|
|
2.1 MB |
|
9.8 MB |
|
17.9 MB |
|
5.7 MB |
|
4.2 MB |
/Ethical Hacking - Sniffing/ |
|
|
6.0 MB |
/.../1. Humans - The Soft Center Within the Hard Shell/ |
|
|
4.9 MB |
|
28.5 MB |
|
12.7 MB |
|
25.9 MB |
05. Computer-based Versus Human-based Social Engineering.mp4 |
5.0 MB |
|
16.7 MB |
|
2.8 MB |
/.../2. A Walkthrough of a Social Engineering Attack/ |
|
|
2.9 MB |
|
15.4 MB |
|
10.5 MB |
|
21.7 MB |
|
33.3 MB |
|
28.5 MB |
|
35.1 MB |
|
5.1 MB |
/.../3. Reconnaissance and OSINT/ |
|
|
4.5 MB |
|
58.8 MB |
|
8.4 MB |
|
24.0 MB |
|
6.8 MB |
|
22.7 MB |
|
8.0 MB |
|
6.7 MB |
|
2.9 MB |
/4. Phishing Attacks/ |
|
|
4.9 MB |
|
22.6 MB |
|
19.4 MB |
|
15.1 MB |
|
7.4 MB |
|
7.7 MB |
|
24.4 MB |
|
8.4 MB |
|
33.8 MB |
34. Mounting Your Own Ethical Phishing Attack with Phish5.mp4 |
22.3 MB |
|
3.3 MB |
/.../5. Identity Theft and Impersonation/ |
|
|
5.4 MB |
|
5.7 MB |
|
21.5 MB |
|
20.3 MB |
|
12.4 MB |
|
24.6 MB |
|
24.1 MB |
|
4.2 MB |
/.../6. Social Engineering Countermeasures/ |
|
|
3.5 MB |
|
12.7 MB |
|
48.6 MB |
|
20.8 MB |
48. Separation of Duties and the Principle of Least Privilege.mp4 |
15.8 MB |
|
22.9 MB |
|
7.9 MB |
|
5.9 MB |
|
9.8 MB |
|
4.5 MB |
/Ethical Hacking - Social Engineering/ |
|
|
29.7 MB |
/.../1. Why SQL Injection Matters/ |
|
|
3.8 MB |
|
11.6 MB |
|
10.8 MB |
|
4.1 MB |
|
8.2 MB |
|
1.9 MB |
/.../2. Understanding SQL Queries/ |
|
|
4.6 MB |
|
25.4 MB |
|
7.5 MB |
|
7.1 MB |
|
9.4 MB |
|
5.6 MB |
|
3.8 MB |
/.../3. The Mechanics of SQL Injection Attacks/ |
|
|
3.7 MB |
|
6.5 MB |
|
34.0 MB |
|
22.3 MB |
|
10.1 MB |
|
8.5 MB |
|
16.0 MB |
|
5.4 MB |
|
4.4 MB |
/.../4. Discovering Schema and Extracting Data/ |
|
|
4.6 MB |
|
10.6 MB |
|
44.5 MB |
26. Manual Database Structure Discovery with Error-based Injection.mp4 |
32.8 MB |
|
10.8 MB |
|
15.2 MB |
|
18.4 MB |
30. Extracting Schema Details with Error-based Injection .mp4 |
35.0 MB |
|
3.6 MB |
/.../5. Blind SQL Injection/ |
|
|
3.3 MB |
|
6.4 MB |
|
8.6 MB |
|
7.0 MB |
36. Constructing Yes and No Questions for Boolean Based Injection.mp4 |
23.5 MB |
|
19.1 MB |
|
9.5 MB |
|
7.0 MB |
|
29.7 MB |
|
3.0 MB |
/.../6. Advanced SQL Injection Concepts/ |
|
|
4.1 MB |
|
24.3 MB |
|
19.4 MB |
|
21.7 MB |
|
23.4 MB |
|
19.2 MB |
|
18.6 MB |
|
16.9 MB |
|
3.9 MB |
|
5.8 MB |
/.../7. Defending Against Attacks/ |
|
|
3.5 MB |
|
11.7 MB |
|
24.4 MB |
|
22.0 MB |
|
11.4 MB |
|
11.8 MB |
|
28.2 MB |
|
8.3 MB |
|
16.7 MB |
|
13.5 MB |
|
4.8 MB |
/8. Evasion Techniques/ |
|
|
2.2 MB |
|
4.7 MB |
|
3.0 MB |
|
2.3 MB |
|
2.3 MB |
|
4.8 MB |
|
4.1 MB |
|
2.7 MB |
|
7.0 MB |
|
2.9 MB |
/9. Automating Attacks/ |
|
|
4.2 MB |
|
15.8 MB |
|
28.7 MB |
|
9.2 MB |
|
13.2 MB |
|
47.2 MB |
|
3.4 MB |
/Ethical Hacking - SQL Injection/ |
|
|
6.7 MB |
/.../1. Understanding This Stage/ |
|
|
3.9 MB |
|
4.3 MB |
|
2.2 MB |
|
4.6 MB |
|
1.2 MB |
/.../2. Phase 1 - Gaining Access – Cracking Passwords/ |
|
|
6.4 MB |
|
14.0 MB |
|
12.2 MB |
|
23.7 MB |
|
12.4 MB |
|
8.6 MB |
|
9.9 MB |
|
4.1 MB |
/3. More Cracking/ |
|
|
4.1 MB |
|
7.6 MB |
|
5.3 MB |
|
6.8 MB |
|
15.6 MB |
|
65.7 MB |
|
2.4 MB |
/.../4. Phase 2 - Gaining Access – Escalating Privileges/ |
|
|
4.2 MB |
|
13.4 MB |
|
25.2 MB |
|
5.1 MB |
|
2.8 MB |
/.../5. Phase 3 - Maintaining Access – Executing Applications/ |
|
|
4.2 MB |
|
7.5 MB |
|
17.0 MB |
|
11.3 MB |
|
10.0 MB |
|
3.4 MB |
/.../6. Phase 4 - Maintaining Access – Hiding Your Tools/ |
|
|
2.8 MB |
|
10.5 MB |
|
19.2 MB |
|
7.1 MB |
|
1.7 MB |
/.../7. Phase 5 - Covering Your Tracks - Clearing Logs and Evidence/ |
|
|
2.3 MB |
|
5.0 MB |
|
14.2 MB |
|
13.2 MB |
|
4.2 MB |
/Ethical Hacking - System Hacking/ |
|
|
7.7 MB |
/.../1. The Truth About Living in a Technology Based World/ |
|
|
8.2 MB |
|
34.0 MB |
/.../10. Attack Types/ |
|
|
2.7 MB |
|
13.0 MB |
|
7.7 MB |
|
25.1 MB |
|
4.4 MB |
|
11.9 MB |
|
4.0 MB |
/.../11. Information Security Controls/ |
|
|
3.7 MB |
|
6.8 MB |
|
4.7 MB |
|
6.4 MB |
|
6.2 MB |
|
6.4 MB |
|
5.4 MB |
|
7.5 MB |
|
22.5 MB |
|
8.0 MB |
|
6.5 MB |
/.../12. How to Prepare for the Certified Ethical Hacker Exam/ |
|
|
3.7 MB |
|
1.9 MB |
|
3.6 MB |
|
9.2 MB |
|
10.0 MB |
|
3.8 MB |
|
1.3 MB |
/.../2. Overview of the CEH Certification Program/ |
|
|
3.5 MB |
|
2.7 MB |
|
9.4 MB |
|
17.8 MB |
|
3.4 MB |
/.../3. How to Build a Lab to Hack Safely/ |
|
|
20.5 MB |
|
23.0 MB |
|
43.8 MB |
|
1.9 MB |
/.../4. Installing and Configuring Your Windows Server VMs/ |
|
|
2.7 MB |
|
79.6 MB |
|
56.5 MB |
|
988.7 KB |
/.../5. Installing and Configuring Your Desktop VMs/ |
|
|
3.1 MB |
|
59.2 MB |
|
47.1 MB |
|
36.9 MB |
|
37.8 MB |
|
2.0 MB |
/.../6. Information Security Overview/ |
|
|
4.3 MB |
|
5.5 MB |
|
5.3 MB |
|
10.5 MB |
|
5.0 MB |
|
2.8 MB |
/.../7. Security Threats and Attack Vectors/ |
|
|
4.0 MB |
|
10.1 MB |
|
11.7 MB |
|
8.2 MB |
|
10.3 MB |
|
4.2 MB |
|
4.6 MB |
|
12.9 MB |
|
10.0 MB |
|
1.7 MB |
/8. Hacking Concepts/ |
|
|
3.8 MB |
|
2.3 MB |
|
10.9 MB |
|
8.4 MB |
|
12.2 MB |
|
7.3 MB |
|
2.7 MB |
|
9.6 MB |
|
7.6 MB |
|
34.8 MB |
|
3.1 MB |
/9. Hacking Phases/ |
|
|
7.0 MB |
|
1.3 MB |
|
24.4 MB |
|
8.1 MB |
|
3.6 MB |
|
8.8 MB |
|
4.3 MB |
|
3.2 MB |
/Ethical Hacking - Understanding Ethical Hacking/ |
|
|
13.6 MB |
|
13.6 MB |
/1. Course Overview/ |
|
|
8.2 MB |
/.../2. Fundamentals of Reverse Engineering/ |
|
|
2.4 MB |
|
26.1 MB |
|
70.2 MB |
|
31.7 MB |
|
21.4 MB |
|
20.8 MB |
|
6.6 MB |
|
68.1 MB |
|
18.4 MB |
|
59.5 MB |
|
4.1 MB |
|
1.9 MB |
/.../3. Basics of Stack Overflows/ |
|
|
2.2 MB |
|
8.8 MB |
|
18.5 MB |
|
14.0 MB |
|
8.9 MB |
|
1.3 MB |
/.../4. Stack Overflow Exploitation/ |
|
|
1.2 MB |
|
20.2 MB |
|
12.8 MB |
|
22.0 MB |
|
15.2 MB |
|
9.8 MB |
|
1.7 MB |
/.../5. Porting Exploits to the Metasploit Framework/ |
|
|
1.4 MB |
|
7.3 MB |
|
11.2 MB |
|
13.7 MB |
|
10.1 MB |
|
1.7 MB |
/.../6. Assembly Tricks to Locate Shellcode/ |
|
|
1.7 MB |
|
17.6 MB |
|
40.6 MB |
|
19.1 MB |
|
10.5 MB |
|
1.8 MB |
/.../7. Structured Exception Handler/ |
|
|
5.2 MB |
|
6.1 MB |
|
12.4 MB |
|
25.7 MB |
|
21.8 MB |
|
10.4 MB |
|
9.2 MB |
|
1.9 MB |
/Exploit Development and Execution with the Metasploit Framework/ |
|
|
2.4 MB |
/1. Course Overview/ |
|
|
6.2 MB |
/.../2. Evading Detection and Bypassing Countermeasures/ |
|
|
9.4 MB |
/3. Remaining Anonymous/ |
|
|
7.5 MB |
|
20.6 MB |
|
7.2 MB |
|
9.7 MB |
|
5.9 MB |
|
13.7 MB |
/.../4. Bypassing Network Firewalls/ |
|
|
10.9 MB |
|
18.4 MB |
|
14.6 MB |
|
26.4 MB |
/.../5. Sneaking Past Intrusion Detection Systems and Honeypots/ |
|
|
7.3 MB |
|
6.9 MB |
|
22.5 MB |
|
24.6 MB |
17. Evasion with Polymorphism, Insertion, and Fragmentation Techniques.mp4 |
11.0 MB |
|
13.3 MB |
|
5.3 MB |
|
11.3 MB |
|
6.5 MB |
|
18.5 MB |
|
4.7 MB |
/.../6. Circumventing Application Security Controls/ |
|
|
2.9 MB |
|
6.4 MB |
|
4.9 MB |
|
14.6 MB |
|
12.0 MB |
|
7.6 MB |
|
3.8 MB |
|
2.2 MB |
|
3.2 MB |
|
12.3 MB |
|
34.0 MB |
|
6.5 MB |
36. Circumventing Application Security Controls - Lesson Summary.mp4 |
3.6 MB |
/.../7. Fooling Platform Controls/ |
|
|
8.0 MB |
38. Evading Anti-virus Using Polymorphism, Encryption, and Obfuscation.mp4 |
41.2 MB |
|
9.2 MB |
|
24.0 MB |
|
13.2 MB |
/.../8. Outwitting Platform Memory Controls/ |
|
|
6.3 MB |
|
5.5 MB |
|
13.4 MB |
|
12.8 MB |
|
22.1 MB |
|
5.6 MB |
|
7.9 MB |
/.../9. Mapping Evasion Techniques to Kill Chains/ |
|
|
9.8 MB |
|
9.5 MB |
|
11.2 MB |
/Exploitation - Evading Detection and Bypassing Countermeasures/ |
|
exploitation-evading-detection-bypassing-countermeasures.zip |
5.4 MB |
/1. Course Overview/ |
|
|
2.8 MB |
/.../2. Welcome to External Footprinting/ |
|
|
3.1 MB |
|
2.9 MB |
|
3.8 MB |
|
2.8 MB |
|
544.0 KB |
/3. Passive Reconnaissance/ |
|
|
1.7 MB |
|
10.3 MB |
|
5.1 MB |
|
21.0 MB |
|
6.1 MB |
|
3.8 MB |
|
4.1 MB |
|
958.3 KB |
/4. Active Reconnaissance/ |
|
|
2.3 MB |
|
6.9 MB |
|
4.0 MB |
|
6.7 MB |
|
7.7 MB |
|
3.6 MB |
|
4.3 MB |
|
700.8 KB |
/.../5. Prioritizing External Target List/ |
|
|
2.2 MB |
|
2.5 MB |
|
11.9 MB |
|
3.3 MB |
|
2.0 MB |
|
4.6 MB |
|
5.2 MB |
|
783.7 KB |
/.../6. Countermeasures and Reporting/ |
|
|
1.1 MB |
|
2.0 MB |
|
4.8 MB |
|
2.5 MB |
|
3.8 MB |
|
789.1 KB |
/External Footprinting - Reconnaissance and Mapping/ |
|
|
2.5 MB |
/1. Course Overview/ |
|
|
7.3 MB |
/.../2. Investigating Malware Infections/ |
|
|
4.8 MB |
|
6.5 MB |
|
4.6 MB |
|
11.6 MB |
|
4.5 MB |
|
3.7 MB |
|
2.4 MB |
|
5.2 MB |
|
12.7 MB |
|
2.3 MB |
/.../3. Analyzing Malicious Links/ |
|
|
4.8 MB |
|
3.4 MB |
|
3.6 MB |
|
3.6 MB |
|
4.3 MB |
|
2.7 MB |
|
4.2 MB |
|
7.2 MB |
|
5.9 MB |
/.../4. Dissecting Infected Documents/ |
|
|
2.2 MB |
|
4.8 MB |
|
6.5 MB |
|
3.1 MB |
|
3.2 MB |
|
15.3 MB |
|
11.1 MB |
|
12.9 MB |
|
2.2 MB |
/.../5. Analyzing Malicious Archives/ |
|
|
2.8 MB |
|
3.6 MB |
|
1.9 MB |
|
4.0 MB |
|
8.0 MB |
|
2.9 MB |
|
3.2 MB |
|
26.5 MB |
|
4.9 MB |
/.../6. Designing the Process for Analyzing Malware/ |
|
|
1.8 MB |
|
4.5 MB |
|
4.7 MB |
|
5.7 MB |
|
3.2 MB |
|
3.0 MB |
|
9.1 MB |
|
2.0 MB |
/Getting Started Analyzing Malware Infections/ |
|
|
2.5 MB |
/.../1. The CloudFlare™ Model/ |
|
|
2.5 MB |
|
7.4 MB |
|
5.4 MB |
|
6.5 MB |
|
2.1 MB |
/.../2. Setting Up a New Site/ |
|
|
2.0 MB |
|
14.2 MB |
|
13.5 MB |
|
5.5 MB |
|
18.9 MB |
|
1.7 MB |
/.../3. Getting SSL for Free/ |
|
|
3.0 MB |
|
4.4 MB |
|
3.9 MB |
|
10.3 MB |
|
7.6 MB |
|
11.8 MB |
|
6.8 MB |
|
10.0 MB |
|
20.1 MB |
|
3.2 MB |
/.../4. Managing the Firewall/ |
|
|
2.7 MB |
|
4.8 MB |
|
14.2 MB |
|
10.3 MB |
|
17.5 MB |
|
4.0 MB |
|
5.1 MB |
|
3.1 MB |
/Getting Started with CloudFlare™ Security/ |
|
|
1.6 MB |
/1. Course Overview/ |
|
|
4.2 MB |
/.../2. Installing and Setting up Your ZAP Environment/ |
|
|
6.5 MB |
|
28.8 MB |
|
32.4 MB |
|
19.5 MB |
|
17.1 MB |
|
3.5 MB |
/.../3. Prepping Your Attack Functions/ |
|
|
15.6 MB |
|
15.4 MB |
|
9.0 MB |
|
13.5 MB |
/.../4. Scanning Your Web Application Functions/ |
|
|
23.6 MB |
|
7.4 MB |
|
20.7 MB |
|
12.3 MB |
|
6.7 MB |
/.../5. Documenting Found Vulnerabilities/ |
|
|
21.4 MB |
|
23.7 MB |
|
50.8 MB |
|
2.4 MB |
/Getting Started with OWASP Zed Attack Proxy (ZAP) for Web Application Penetration Testing/ |
|
|
4.1 MB |
/1. Introduction/ |
|
|
16.9 MB |
|
9.8 MB |
|
4.6 MB |
|
8.8 MB |
|
13.9 MB |
|
12.9 MB |
|
5.3 MB |
/.../2. Discovering Device Communication With APIs/ |
|
|
8.0 MB |
|
10.8 MB |
|
27.5 MB |
|
8.9 MB |
|
39.4 MB |
|
18.7 MB |
|
10.2 MB |
|
8.2 MB |
/.../3. Leaky APIs and Hidden APIs/ |
|
|
16.0 MB |
|
38.1 MB |
|
20.2 MB |
|
21.6 MB |
|
4.9 MB |
|
10.7 MB |
|
26.2 MB |
|
6.2 MB |
/.../4. API Manipulation and Parameter Tampering/ |
|
|
8.2 MB |
|
9.2 MB |
|
29.8 MB |
|
35.1 MB |
|
49.3 MB |
|
6.8 MB |
/.../5. API Authentication and Authorization Vulnerabilities/ |
|
|
7.3 MB |
|
27.2 MB |
|
12.7 MB |
|
27.9 MB |
|
7.5 MB |
|
12.6 MB |
|
24.2 MB |
|
17.8 MB |
|
27.7 MB |
|
6.4 MB |
|
8.0 MB |
/.../6. Working With SSL Encrypted API Traffic/ |
|
|
8.9 MB |
|
6.0 MB |
43. Configuring Fiddler to Decrypt Encrypted Connections.mp4 |
35.2 MB |
|
3.9 MB |
|
11.5 MB |
|
11.3 MB |
|
6.9 MB |
|
9.9 MB |
|
20.6 MB |
|
10.8 MB |
|
7.3 MB |
|
6.7 MB |
/Hack Your API First/ |
|
|
23.6 MB |
/1. Introduction/ |
|
|
4.8 MB |
|
10.0 MB |
03. Introducing a vulnerable website – Supercar Showdown.mp4 |
21.1 MB |
|
28.7 MB |
|
23.5 MB |
|
19.9 MB |
/.../2. Transport Layer Protection/ |
|
|
3.3 MB |
|
4.9 MB |
|
6.9 MB |
|
21.6 MB |
11. The risk of sending cookies over insecure connections.mp4 |
44.5 MB |
|
97.7 MB |
|
39.7 MB |
|
30.7 MB |
|
9.7 MB |
/.../3. Cross Site Scripting (XSS)/ |
|
|
3.8 MB |
|
15.7 MB |
|
10.8 MB |
|
22.3 MB |
|
22.1 MB |
|
28.6 MB |
|
40.9 MB |
|
29.3 MB |
|
11.2 MB |
/4. Cookies/ |
|
|
2.3 MB |
|
14.8 MB |
|
26.5 MB |
|
32.6 MB |
|
38.9 MB |
|
29.6 MB |
|
17.9 MB |
|
9.8 MB |
/.../5. Internal Implementation Disclosure/ |
|
|
4.3 MB |
|
43.0 MB |
|
37.8 MB |
|
55.9 MB |
|
31.8 MB |
|
10.9 MB |
|
18.9 MB |
|
48.3 MB |
|
52.8 MB |
|
13.9 MB |
/6. Parameter Tampering/ |
|
|
5.0 MB |
44. Identifying untrusted data in HTTP request parameters.mp4 |
43.5 MB |
|
45.3 MB |
|
37.1 MB |
|
60.2 MB |
|
6.4 MB |
|
39.6 MB |
|
56.7 MB |
|
81.1 MB |
|
17.9 MB |
/7. SQL Injection/ |
|
|
3.7 MB |
|
25.7 MB |
|
25.8 MB |
|
52.9 MB |
|
19.1 MB |
|
34.0 MB |
|
44.6 MB |
|
23.9 MB |
|
20.4 MB |
/.../8. Cross Site Attacks/ |
|
|
2.9 MB |
|
9.3 MB |
|
38.7 MB |
|
52.7 MB |
|
62.3 MB |
|
64.5 MB |
|
12.4 MB |
/9. Account Management/ |
|
|
6.1 MB |
|
62.7 MB |
|
14.9 MB |
|
5.9 MB |
|
21.0 MB |
|
7.1 MB |
|
8.0 MB |
|
32.2 MB |
|
30.5 MB |
|
12.3 MB |
|
24.2 MB |
|
19.5 MB |
/Hack Yourself First - How to go on the Cyber-Offense/ |
|
|
35.6 MB |
/1. Course Overview/ |
|
|
4.6 MB |
/.../2. Incident Response - Job Security at Its Best/ |
|
|
11.0 MB |
|
3.9 MB |
|
7.0 MB |
|
7.3 MB |
|
1.5 MB |
/.../3. The Nature of the Threat - Why Are We Here/ |
|
|
2.2 MB |
|
7.7 MB |
|
7.8 MB |
|
8.2 MB |
|
8.2 MB |
|
9.6 MB |
|
41.1 MB |
/.../4. Common IR Tasks - An Overview/ |
|
|
1.8 MB |
|
6.2 MB |
|
13.8 MB |
|
38.8 MB |
|
84.1 MB |
|
1.6 MB |
/.../5. Analyzing Files - Character Encodings, Carrier Files, and Hex Editors/ |
|
|
1.8 MB |
|
5.5 MB |
|
11.0 MB |
|
6.3 MB |
|
20.3 MB |
|
4.3 MB |
|
6.0 MB |
|
21.6 MB |
|
70.1 MB |
|
2.0 MB |
/.../6. Proactive IR - Intelligence, Indicators of Compromise, and Hunting/ |
|
|
1.3 MB |
|
4.8 MB |
|
13.9 MB |
|
3.8 MB |
|
19.3 MB |
|
3.5 MB |
|
32.4 MB |
|
1.3 MB |
/.../7. Course Review & Next Steps/ |
|
|
1.1 MB |
|
9.5 MB |
|
704.7 KB |
/Hands-On Incident Response Fundamentals/ |
|
|
6.5 MB |
/1. Course Overview/ |
|
|
4.4 MB |
/.../2. Overview and PKI Crash Course/ |
|
|
6.3 MB |
|
14.2 MB |
|
9.3 MB |
|
22.2 MB |
|
16.2 MB |
|
27.0 MB |
/.../3. Exercise - Certificate Validation Testing/ |
|
|
5.6 MB |
|
10.7 MB |
|
14.0 MB |
|
20.5 MB |
|
29.2 MB |
|
16.6 MB |
/.../4. A Short History of SSL_TLS Protocol Flaws/ |
|
|
14.2 MB |
|
16.4 MB |
|
14.5 MB |
|
14.1 MB |
/.../5. Web-oriented Man-in-the-Middle Attacks/ |
|
|
7.0 MB |
|
10.6 MB |
|
6.8 MB |
|
18.3 MB |
|
18.7 MB |
|
18.5 MB |
/How to Stop Man-in-the-Middle and Downgrade Attacks in Your Apps/ |
|
|
6.7 MB |
/1. Course Overview/ |
|
|
4.8 MB |
/.../2. Why Care About Security Assessments and Authorization/ |
|
|
4.9 MB |
|
6.1 MB |
|
12.1 MB |
|
7.0 MB |
|
3.2 MB |
|
4.7 MB |
|
8.4 MB |
|
1.3 MB |
/.../3. Learning Assessment Fundamentals/ |
|
|
3.0 MB |
|
7.9 MB |
|
11.3 MB |
|
8.2 MB |
|
3.3 MB |
/.../4. Looking at a Typical Assessment Process/ |
|
|
1.9 MB |
|
3.8 MB |
|
5.8 MB |
|
4.0 MB |
|
14.5 MB |
|
1.6 MB |
/.../5. Comparing Assessment Methods/ |
|
|
1.9 MB |
|
4.7 MB |
|
6.8 MB |
|
3.9 MB |
|
6.3 MB |
|
5.0 MB |
|
1.7 MB |
/6. Assessing Controls/ |
|
|
3.1 MB |
|
7.1 MB |
|
14.0 MB |
|
8.1 MB |
|
10.9 MB |
|
8.9 MB |
|
10.4 MB |
|
4.9 MB |
/7. Conformance Testing/ |
|
|
1.3 MB |
|
7.7 MB |
|
11.5 MB |
|
8.4 MB |
|
4.5 MB |
/.../8. Presenting Your Assessment Findings/ |
|
|
3.6 MB |
|
4.5 MB |
|
4.0 MB |
|
1.7 MB |
/9. Security Authorization/ |
|
|
1.2 MB |
|
6.3 MB |
|
3.1 MB |
|
2.5 MB |
|
7.4 MB |
|
1.2 MB |
/Implementing a Security Assessment and Authorization Process/ |
|
|
7.6 MB |
/1. Course Overview/ |
|
|
4.1 MB |
/.../2. Identifying Workplace Security Issues/ |
|
|
2.1 MB |
|
9.3 MB |
|
11.9 MB |
|
19.5 MB |
|
5.2 MB |
|
10.8 MB |
|
10.1 MB |
|
4.7 MB |
|
5.4 MB |
|
2.0 MB |
|
12.6 MB |
|
1.5 MB |
/.../3. Implementing Physical Security Controls/ |
|
|
1.5 MB |
|
5.2 MB |
|
7.5 MB |
|
9.8 MB |
|
4.0 MB |
|
19.5 MB |
|
6.8 MB |
|
10.4 MB |
|
28.4 MB |
|
1.8 MB |
/.../4. Implementing Environmental Security Controls/ |
|
|
1.1 MB |
|
13.2 MB |
|
7.5 MB |
|
4.0 MB |
|
5.2 MB |
|
7.3 MB |
|
1.2 MB |
/Implementing Physical Security/ |
|
|
655.7 KB |
/1. Course Overview/ |
|
|
3.6 MB |
/.../2. Formulating Information Security Strategy/ |
|
02. Organizational Vision, Culture, Mission, Goals, and Objectives.mp4 |
5.5 MB |
03. Scenario - Organizational Characteristics of Globomantics.mp4 |
3.5 MB |
|
4.8 MB |
|
5.4 MB |
|
9.2 MB |
07. Scenario - Globomantics’ Organizational and IS Strategies.mp4 |
3.8 MB |
|
15.3 MB |
|
8.7 MB |
|
8.9 MB |
|
2.7 MB |
/.../3. Integrating Information Security Governance Concepts/ |
|
|
6.2 MB |
|
3.5 MB |
14. Information Security Standards, Frameworks, and Best Practices.mp4 |
5.4 MB |
|
7.2 MB |
16. Designing and Implementing Information Security Governance.mp4 |
9.2 MB |
17. Scenario - Developing & Implementing IS Governance at Globomantics.mp4 |
7.7 MB |
18. Incorporating Infosec Governance into Organizational Governance.mp4 |
6.7 MB |
19. Scenario - Incorporating IS Governance at Globomantics.mp4 |
5.3 MB |
|
2.0 MB |
/.../4. Writing Information Security Policies/ |
|
|
6.3 MB |
|
3.0 MB |
|
12.0 MB |
|
6.9 MB |
|
8.8 MB |
26. Scenario - Developing Globomantics’ Security Policies.mp4 |
4.0 MB |
|
8.8 MB |
|
10.1 MB |
|
1.7 MB |
/.../5. Creating Business Cases/ |
|
|
9.0 MB |
|
6.5 MB |
|
7.5 MB |
|
4.0 MB |
|
9.7 MB |
|
10.0 MB |
|
8.9 MB |
37. Scenario - Integrating Security and Business Initiatives.mp4 |
4.9 MB |
|
6.5 MB |
|
1.8 MB |
/.../6. Influencing Security Strategy and Governance/ |
|
40. Internal and External Influences on Security Strategy.mp4 |
9.6 MB |
41. Scenario - Internal and External Influences on Security.mp4 |
5.7 MB |
|
6.7 MB |
43. Scenario - Third-party Considerations at Globomantics.mp4 |
6.6 MB |
|
10.3 MB |
45. Scenario - Contract and Third-party Compliance at Globomantics.mp4 |
5.1 MB |
|
3.5 MB |
|
3.8 MB |
48. Scenario - Effects of Organizational Change on Security.mp4 |
4.7 MB |
|
2.3 MB |
/.../7. Gaining Stakeholder Commitment/ |
|
|
9.9 MB |
|
4.6 MB |
|
14.3 MB |
53. Scenario - Understanding Stakeholder Information Needs.mp4 |
11.5 MB |
|
8.5 MB |
55. Scenario - Communicating Information Security at Globomantics.mp4 |
3.0 MB |
56. Obtaining Commitment on the Information Security Strategy.mp4 |
5.8 MB |
57. Scenario - Getting Commitment on the Information Security Strategy.mp4 |
5.3 MB |
|
987.9 KB |
/.../8. Information Security Management Roles and Responsibilities/ |
|
|
6.5 MB |
60. Scenario - Organization Structures and Lines of Authority.mp4 |
4.8 MB |
|
7.5 MB |
62. Information Security Manager Roles and Responsibilities.mp4 |
6.2 MB |
63. Scenario - Information Security Managers at Globomantics.mp4 |
2.2 MB |
|
6.9 MB |
|
6.1 MB |
|
7.3 MB |
|
6.2 MB |
|
2.0 MB |
/.../9. Demystifying Security Metrics/ |
|
|
7.6 MB |
|
2.1 MB |
|
7.6 MB |
72. Scenario - Developing and Using KPIs at Globomantics.mp4 |
4.4 MB |
|
8.4 MB |
74. Scenario - Developing and Using KRIs at Globomantics.mp4 |
4.1 MB |
|
3.4 MB |
76. Scenario - Developing and Using KGIs at Globomantics.mp4 |
4.4 MB |
77. Using Security Metrics to Determine Security Program Effectiveness.mp4 |
4.1 MB |
|
909.7 KB |
/Information Security Manager - Information Security Governance/ |
|
|
2.8 MB |
/1. Course Overview/ |
|
|
4.5 MB |
/.../2. The Role and Benefits of Information Systems Auditing/ |
|
|
13.2 MB |
|
6.0 MB |
/.../3. The Audit Plan/ |
|
|
8.0 MB |
|
6.9 MB |
/.../4. Conducting an Audit/ |
|
|
11.1 MB |
|
10.9 MB |
|
9.8 MB |
/.../5. Analysis of Evidence/ |
|
|
12.6 MB |
|
3.5 MB |
|
2.0 MB |
/6. Audit Recommendations/ |
|
|
2.5 MB |
|
8.0 MB |
|
2.1 MB |
|
1.2 MB |
/7. Audit Reporting/ |
|
|
3.9 MB |
|
3.0 MB |
|
1.4 MB |
|
6.5 MB |
/.../8. Follow Up and Monitoring/ |
|
|
4.1 MB |
|
6.1 MB |
|
777.3 KB |
|
1.2 MB |
/Information Systems Auditing - The Big Picture/ |
|
|
1.4 MB |
/1. Course Overview/ |
|
|
6.8 MB |
/.../2. Overseeing Investment in Information Technology/ |
|
|
12.5 MB |
|
9.4 MB |
|
7.5 MB |
/.../3. Programs and Projects/ |
|
|
19.5 MB |
|
10.3 MB |
|
8.2 MB |
|
10.4 MB |
|
3.7 MB |
|
4.0 MB |
|
17.6 MB |
|
10.3 MB |
|
3.2 MB |
|
10.0 MB |
|
6.8 MB |
|
11.2 MB |
|
9.3 MB |
|
13.1 MB |
/4. Information Systems/ |
|
|
22.2 MB |
|
8.9 MB |
|
22.4 MB |
|
20.8 MB |
/5. Systems Development/ |
|
|
33.2 MB |
|
28.7 MB |
/Information Systems Auditor - Acquisition and Development/ |
|
|
4.6 MB |
/1. Course Overview/ |
|
|
7.2 MB |
/.../2. Aligning IT Strategy with Organizational Strategy/ |
|
|
10.5 MB |
|
10.5 MB |
|
12.1 MB |
|
7.9 MB |
/.../3. Enterprise IT Governance/ |
|
|
34.5 MB |
|
4.2 MB |
|
22.3 MB |
|
28.0 MB |
/4. Risk Management/ |
|
|
14.5 MB |
|
14.0 MB |
|
6.6 MB |
/.../5. IT Management Practices/ |
|
|
18.6 MB |
|
17.1 MB |
|
11.6 MB |
|
14.8 MB |
|
5.8 MB |
|
7.2 MB |
|
10.0 MB |
|
5.0 MB |
|
27.4 MB |
/.../6. Auditing IT Operations/ |
|
|
11.5 MB |
|
10.6 MB |
|
10.5 MB |
|
7.7 MB |
|
10.6 MB |
/.../7. Business Continuity Planning/ |
|
|
25.4 MB |
|
20.4 MB |
|
11.2 MB |
|
12.3 MB |
|
10.9 MB |
|
22.9 MB |
/Information Systems Auditor - Governance and Management/ |
|
|
1.5 MB |
/1. Course Overview/ |
|
|
5.7 MB |
/2. Service Management/ |
|
|
9.3 MB |
|
6.5 MB |
|
17.4 MB |
/.../3. IT Asset Management/ |
|
|
8.6 MB |
|
9.8 MB |
|
8.4 MB |
|
15.7 MB |
|
18.4 MB |
|
27.6 MB |
|
14.1 MB |
|
17.4 MB |
|
16.9 MB |
/4. Controlling Change/ |
|
|
5.1 MB |
|
4.5 MB |
|
2.6 MB |
/.../5. Disaster Recovery Planning/ |
|
|
9.2 MB |
|
6.9 MB |
|
4.9 MB |
|
9.9 MB |
|
5.8 MB |
|
5.5 MB |
|
3.2 MB |
|
5.3 MB |
/Information Systems Auditor - Operations, Maintenance, and Service/ |
|
information-systems-auditor-operations-maintenance-service.zip |
4.4 MB |
/1. Course Overview/ |
|
|
7.4 MB |
/2. Overview/ |
|
|
13.1 MB |
|
22.9 MB |
|
11.8 MB |
|
21.5 MB |
|
19.9 MB |
|
17.0 MB |
/.../3. Information Systems Essentials/ |
|
|
13.8 MB |
|
19.1 MB |
/.../4. Logical Access Controls/ |
|
|
11.5 MB |
|
15.3 MB |
|
23.5 MB |
|
12.4 MB |
|
11.6 MB |
|
16.7 MB |
/.../5. Network and Internet Security/ |
|
|
26.4 MB |
|
14.0 MB |
|
33.7 MB |
|
20.5 MB |
/6. Encryption/ |
|
|
7.9 MB |
|
10.8 MB |
|
12.7 MB |
|
11.5 MB |
|
12.6 MB |
|
11.9 MB |
|
12.8 MB |
/.../7. Auditing Information Security Management/ |
|
|
5.6 MB |
|
28.1 MB |
|
18.0 MB |
|
24.1 MB |
|
4.9 MB |
/8. Physical Security/ |
|
|
3.0 MB |
|
12.5 MB |
|
15.2 MB |
|
7.5 MB |
|
10.7 MB |
|
6.6 MB |
|
6.3 MB |
/Information Systems Auditor - Protection of Information Assets/ |
|
|
8.5 MB |
/1. Course Overview/ |
|
|
5.8 MB |
/.../2. Audit Standards and Risk-based Audit/ |
|
|
6.4 MB |
|
15.5 MB |
/3. Audit Planning/ |
|
|
15.7 MB |
|
39.3 MB |
|
34.5 MB |
|
17.2 MB |
/.../4. Planning an IS Audit/ |
|
|
38.7 MB |
|
20.1 MB |
|
8.9 MB |
|
28.7 MB |
|
43.2 MB |
|
15.3 MB |
|
24.3 MB |
/.../5. Communicating Audit Results/ |
|
|
12.7 MB |
|
15.2 MB |
|
19.0 MB |
/Information Systems Auditor - The Process of Auditing/ |
|
|
793.9 KB |
/.../1. Understanding Browser Security Headers/ |
|
|
3.9 MB |
|
6.3 MB |
|
5.5 MB |
|
15.3 MB |
|
11.9 MB |
|
4.6 MB |
|
6.5 MB |
|
3.5 MB |
/.../2. HTTP Strict Transport Security (HSTS)/ |
|
|
4.3 MB |
|
27.8 MB |
|
21.0 MB |
|
12.6 MB |
|
10.0 MB |
|
30.0 MB |
|
4.0 MB |
|
3.0 MB |
/.../3. HTTP Public Key Pinning (HPKP)/ |
|
|
4.1 MB |
|
34.1 MB |
|
22.1 MB |
|
17.7 MB |
|
10.9 MB |
|
11.1 MB |
|
4.9 MB |
|
912.8 KB |
|
5.8 MB |
|
3.0 MB |
/.../4. Content Security Policy (CSP)/ |
|
|
3.0 MB |
|
24.1 MB |
|
18.8 MB |
|
6.8 MB |
|
10.6 MB |
|
33.9 MB |
33. Using Hashes and Nonces to Whitelist Unsafe Inline Content.mp4 |
36.1 MB |
|
12.9 MB |
|
11.2 MB |
|
5.0 MB |
|
10.9 MB |
|
2.2 MB |
/.../5. Tools for Working with Browser Headers/ |
|
|
2.9 MB |
|
10.6 MB |
|
6.3 MB |
|
9.1 MB |
|
33.2 MB |
|
13.8 MB |
|
11.1 MB |
|
3.6 MB |
/Introduction to Browser Security Headers/ |
|
|
5.4 MB |
/1. Course Overview/ |
|
|
7.2 MB |
/.../2. Introducing Metasploit for White Hat Penetration Testing/ |
|
|
9.4 MB |
|
8.9 MB |
|
8.3 MB |
|
10.7 MB |
|
6.8 MB |
/.../3. Installing and Configuring Metasploit/ |
|
|
2.5 MB |
|
9.1 MB |
|
24.1 MB |
|
52.1 MB |
|
33.5 MB |
|
1.6 MB |
/.../4. Scanning the Network/ |
|
|
2.2 MB |
|
23.3 MB |
|
25.9 MB |
|
39.3 MB |
|
37.6 MB |
|
12.1 MB |
|
2.0 MB |
/.../5. Gaining Access to Systems/ |
|
|
2.9 MB |
|
23.2 MB |
|
14.1 MB |
|
11.5 MB |
|
19.7 MB |
|
37.6 MB |
|
63.5 MB |
|
3.8 MB |
/.../6. Maintaining and Expanding Metasploit/ |
|
|
2.6 MB |
|
11.3 MB |
|
14.9 MB |
|
7.6 MB |
|
3.4 MB |
/Introduction to Penetration Testing Using Metasploit/ |
|
|
5.0 MB |
/1. Course Overview/ |
|
|
9.1 MB |
/.../2. Why ISO_IEC 27001 Is so Important/ |
|
|
4.2 MB |
|
9.9 MB |
|
9.0 MB |
05. ISO_IEC 27001 History and Difference to Other Standards.mp4 |
9.2 MB |
|
10.5 MB |
|
1.5 MB |
|
12.9 MB |
09. Sample Certificates from AWS, Dropbox, and Microsoft.mp4 |
23.0 MB |
|
4.9 MB |
/.../3. Understanding the Standard’s Structure/ |
|
|
4.2 MB |
|
4.7 MB |
|
9.9 MB |
|
6.7 MB |
|
13.2 MB |
|
6.4 MB |
|
5.9 MB |
|
12.7 MB |
|
14.8 MB |
|
17.9 MB |
|
1.6 MB |
/.../4. Certification Life Cycle - Attaining Your Certification/ |
|
|
2.7 MB |
|
7.5 MB |
|
9.0 MB |
|
9.6 MB |
|
11.1 MB |
|
6.8 MB |
|
2.2 MB |
/.../5. Certification Life Cycle - Retaining Your Certification/ |
|
|
2.6 MB |
|
27.1 MB |
|
6.6 MB |
|
7.9 MB |
|
3.5 MB |
|
614.6 KB |
/.../6. Getting Your Toolset and Support Ready/ |
|
|
5.0 MB |
|
6.5 MB |
|
7.0 MB |
|
8.9 MB |
|
12.3 MB |
|
3.9 MB |
|
2.6 MB |
/ISO_IEC 27001 Information Security - The Big Picture/ |
|
|
1.5 MB |
/1. Course Overview/ |
|
|
6.1 MB |
/.../2. Malware - Why Should You Care/ |
|
|
1.2 MB |
|
6.6 MB |
|
6.7 MB |
|
6.4 MB |
|
8.6 MB |
|
2.4 MB |
|
3.3 MB |
|
2.3 MB |
|
2.1 MB |
|
1.8 MB |
|
4.2 MB |
|
9.4 MB |
|
4.8 MB |
/3. Best Practices/ |
|
|
1.1 MB |
|
6.4 MB |
|
5.6 MB |
|
6.1 MB |
19. Malware Incident Handling Best Practices and Layered Defense.mp4 |
4.3 MB |
|
4.1 MB |
|
8.9 MB |
|
5.8 MB |
|
2.7 MB |
24. Best Practices Around Virtualization and Application Whitelisting.mp4 |
7.9 MB |
|
9.1 MB |
|
5.4 MB |
|
6.6 MB |
|
9.1 MB |
|
2.5 MB |
|
5.9 MB |
|
4.4 MB |
/.../4. Tools and Teams/ |
|
32. Module Intro & Importance of a Properly Trained Response Team.mp4 |
6.3 MB |
|
3.7 MB |
|
2.8 MB |
|
8.6 MB |
36. Stopping the Spread of Malware, Eradication and Recovery.mp4 |
4.5 MB |
|
5.4 MB |
|
3.2 MB |
|
8.0 MB |
|
3.7 MB |
|
9.4 MB |
|
6.4 MB |
|
6.2 MB |
|
1.3 MB |
/.../5. Investigative and Legal Considerations/ |
|
|
1.7 MB |
|
3.6 MB |
|
5.3 MB |
|
1.6 MB |
|
4.8 MB |
|
6.1 MB |
|
6.1 MB |
|
1.8 MB |
|
5.8 MB |
|
1.1 MB |
|
10.6 MB |
|
8.0 MB |
/Malware Analysis - The Big Picture/ |
|
|
3.1 MB |
/1. Course Overview/ |
|
|
3.8 MB |
/.../10. Lab 2 - Dynamic Analysis/ |
|
|
3.1 MB |
|
63.0 MB |
|
781.5 KB |
/.../11. Progressing Your Malware Analysis Skills/ |
|
|
841.5 KB |
|
2.8 MB |
|
6.6 MB |
|
395.7 KB |
/.../2. Introduction and Setting up Your Malware Analysis Lab/ |
|
|
2.9 MB |
|
5.9 MB |
|
7.0 MB |
|
5.7 MB |
06. Demo - Configuring a Virtual Machine for Malware Analysis.mp4 |
13.7 MB |
|
1.7 MB |
/.../3. Static Analysis - Identifying Malware/ |
|
|
1.7 MB |
|
5.1 MB |
|
3.6 MB |
|
10.9 MB |
|
7.3 MB |
|
5.9 MB |
|
13.1 MB |
|
2.1 MB |
/.../4. Static Analysis - Analyzing Embedded Strings/ |
|
|
1.2 MB |
|
4.9 MB |
|
6.3 MB |
|
31.1 MB |
|
10.8 MB |
|
19.3 MB |
|
1.8 MB |
/.../5. Static Analysis - Understanding the PE Header/ |
|
|
1.3 MB |
|
7.6 MB |
|
3.8 MB |
|
9.6 MB |
|
9.0 MB |
|
1.3 MB |
|
50.7 MB |
|
1.8 MB |
/.../6. Lab 1 - Static Analysis/ |
|
|
3.1 MB |
|
7.9 MB |
|
20.5 MB |
|
25.4 MB |
|
6.1 MB |
/.../7. Dynamic Analysis Considerations/ |
|
|
2.1 MB |
|
4.0 MB |
|
5.2 MB |
|
14.4 MB |
|
1.5 MB |
/.../8. Dynamic Analysis - Detecting Malware System Changes/ |
|
|
1.5 MB |
|
2.8 MB |
|
86.2 MB |
|
3.6 MB |
/.../9. Dynamic Analysis - Monitoring Malware Behavior/ |
|
|
3.2 MB |
|
19.3 MB |
|
114.5 MB |
|
5.7 MB |
|
1.1 MB |
/Malware Analysis Fundamentals/ |
|
|
7.1 MB |
/1. Course Overview/ |
|
|
4.5 MB |
/.../2. Preparing for Success/ |
|
|
25.2 MB |
/.../3. Building the Information Security Organization/ |
|
03. An Intro to Planning an Information Security Organization.mp4 |
3.8 MB |
|
6.0 MB |
|
9.6 MB |
|
7.0 MB |
|
5.7 MB |
/.../4. Establishing Security Policies and a Code of Conduct/ |
|
|
13.9 MB |
09. Establishing Security Prior to and During Employment.mp4 |
7.4 MB |
|
4.5 MB |
|
2.5 MB |
/.../5. Enabling Information Security with People, Process, and Technology/ |
|
12. Establishing the Information Security Management System.mp4 |
8.7 MB |
|
8.0 MB |
|
10.0 MB |
|
1.7 MB |
/.../6. Using the Security Incident Cycle to Improve Security Response/ |
|
|
6.6 MB |
|
8.7 MB |
|
20.0 MB |
|
4.7 MB |
/.../7. Logging and Managing Security Events and Incidents/ |
|
|
15.6 MB |
21. The Value of Establishing Incident Management Procedures.mp4 |
15.2 MB |
|
10.1 MB |
|
6.7 MB |
/.../8. Complying with Regulatory, Legislative, and Organization Mandates/ |
|
24. Managing Statutory, Regulatory, and Contractual Obligations.mp4 |
11.1 MB |
|
8.4 MB |
|
5.1 MB |
|
12.9 MB |
/.../9. Improving Security with a Formal Audit Program/ |
|
|
7.5 MB |
|
9.5 MB |
|
5.7 MB |
/Managing Information Security Incidents (ISO_IEC 27002)/ |
|
|
11.1 MB |
/.../1. Preparing for Success/ |
|
|
9.6 MB |
|
6.9 MB |
|
13.4 MB |
|
9.7 MB |
/.../2. Understanding Basic Information Concepts/ |
|
|
6.9 MB |
|
16.9 MB |
|
21.4 MB |
|
18.0 MB |
|
4.3 MB |
/.../3. Determining the Value of Information Assets/ |
|
|
18.0 MB |
|
12.1 MB |
|
12.8 MB |
|
4.1 MB |
/.../4. Leveraging Operational Process Types to Manage Assets/ |
|
14. Leveraging Operational Process Types to Manage Assets.mp4 |
9.0 MB |
|
13.4 MB |
|
3.8 MB |
/.../5. Achieving Information Reliability Through Security/ |
|
|
5.2 MB |
|
27.7 MB |
|
3.5 MB |
20. Classifying Assets to Apply Proper Level of Security.mp4 |
13.0 MB |
|
7.9 MB |
/.../6. Preparing to Manage Threats and Risks/ |
|
|
6.1 MB |
|
5.7 MB |
|
3.2 MB |
|
3.8 MB |
|
6.2 MB |
/.../7. Categorizing Threats, Identifying Damage, and Calculating Loss/ |
|
|
6.5 MB |
|
10.7 MB |
|
5.1 MB |
|
7.0 MB |
|
15.2 MB |
/.../8. Analyzing Risk to Help Drive Information Security Decisions/ |
|
|
9.7 MB |
|
3.2 MB |
|
8.4 MB |
|
14.9 MB |
|
9.9 MB |
|
4.5 MB |
/.../9. Using Risk Mitigation Strategies to Minimize the Impact of Risk/ |
|
|
10.6 MB |
|
5.7 MB |
|
12.3 MB |
|
6.5 MB |
|
6.9 MB |
/Managing Information Security Threats & Risks (ISO_IEC 27002)/ |
|
|
17.9 MB |
/.../1. Metasploit Setup and Configuration/ |
|
|
3.7 MB |
|
48.1 MB |
|
5.0 MB |
|
27.5 MB |
|
1.1 MB |
/.../2. Metasploit Framework and Structure/ |
|
|
8.2 MB |
|
62.3 MB |
|
1.1 MB |
/.../3. Finding Targets Through Scanning/ |
|
|
4.5 MB |
10. Scanning_Capturing with Nmap, Metasploit, and Wireshark..mp4 |
79.9 MB |
|
6.8 MB |
/.../4. Exploitation and Payload Techniques/ |
|
|
3.8 MB |
|
18.1 MB |
|
15.6 MB |
|
4.6 MB |
/.../5. Pivoting, Port Forwarding, Token Stealing, and Impersonation/ |
|
|
858.0 KB |
|
6.3 MB |
|
3.3 MB |
|
18.2 MB |
20. Forward Local Ports Using Metasploit, Then RDP to Target.mp4 |
5.8 MB |
21. Use steal_token and Incognito to Impersonate Accounts..mp4 |
23.8 MB |
|
2.4 MB |
/.../6. Metasploit and SharePoint/ |
|
|
2.6 MB |
|
92.5 MB |
|
72.3 MB |
|
1.9 MB |
/.../7. Protecting SharePoint from Metasploit/ |
|
|
1.2 MB |
|
30.6 MB |
|
20.3 MB |
|
787.4 KB |
/Metasploit Basics for Protecting SharePoint/ |
|
|
2.7 MB |
/1. Course Overview/ |
|
|
4.7 MB |
/.../2. Discovering Network Topologies and Equipment/ |
|
|
1.5 MB |
|
4.9 MB |
|
3.3 MB |
|
3.0 MB |
|
5.4 MB |
|
8.7 MB |
08. Demo - Enable SSH Remote Administrators for a Network Router.mp4 |
9.5 MB |
|
1.9 MB |
/.../3. Exploring the TCP_IP Protocol Suite/ |
|
|
697.2 KB |
|
12.7 MB |
|
7.3 MB |
|
9.1 MB |
|
9.9 MB |
|
2.3 MB |
16. Demo - Create a DHCP Scope and Configure Scope Options.mp4 |
7.4 MB |
|
17.7 MB |
18. Demo - Capture Network Traffic and Examine the IP Header.mp4 |
19.9 MB |
|
6.4 MB |
20. Demo - Capture Network Traffic and Examine the TCP and UDP Headers.mp4 |
20.7 MB |
|
1.5 MB |
|
2.2 MB |
/.../4. Configuring IPv4 and IPv6/ |
|
|
775.2 KB |
|
4.4 MB |
|
23.3 MB |
|
4.5 MB |
|
1.5 MB |
|
13.6 MB |
|
9.1 MB |
|
1.6 MB |
|
1.0 MB |
/.../5. Applying Computer Network Defense (CND)/ |
|
|
974.9 KB |
|
6.7 MB |
|
3.2 MB |
35. Configure Centralized RADIUS Authentication Using Windows Server.mp4 |
10.6 MB |
|
1.0 MB |
/Network Fundamentals and Protocols/ |
|
|
2.5 MB |
/1. Course Overview/ |
|
|
6.2 MB |
/.../2. Before We Start/ |
|
|
1.9 MB |
|
3.4 MB |
|
3.8 MB |
|
2.1 MB |
/.../3. Setting up the Environment/ |
|
|
1.1 MB |
|
12.4 MB |
|
15.7 MB |
|
16.7 MB |
|
824.5 KB |
/.../4. Network Sockets in Python/ |
|
|
1.1 MB |
|
31.5 MB |
|
17.9 MB |
|
8.8 MB |
|
771.6 KB |
/.../5. Raw Sockets in Python/ |
|
|
1.2 MB |
|
10.4 MB |
|
17.7 MB |
|
25.1 MB |
|
741.3 KB |
/.../6. Replacing Netcat Using Python/ |
|
|
1.4 MB |
|
7.6 MB |
|
10.6 MB |
|
10.7 MB |
|
1.2 MB |
/Network Penetration Testing Using Python and Kali Linux/ |
|
|
995.8 KB |
/.../1. Introduction to NMAP/ |
|
|
13.2 MB |
/.../2. Scan Phases and Basic Options/ |
|
|
9.0 MB |
|
7.4 MB |
|
4.1 MB |
/.../3. Host Enumeration and Network Mapping/ |
|
|
4.0 MB |
|
5.4 MB |
|
6.5 MB |
|
11.9 MB |
|
5.6 MB |
/.../4. UDP and TCP Port Scanning/ |
|
|
2.7 MB |
|
1.5 MB |
|
5.2 MB |
|
3.5 MB |
|
3.2 MB |
|
4.5 MB |
|
4.1 MB |
|
1.4 MB |
/.../5. Performance and Timing/ |
|
|
2.5 MB |
|
5.3 MB |
|
3.1 MB |
|
1.0 MB |
/.../6. Evading Firewalls and Other Sneakiness/ |
|
|
1.6 MB |
|
656.4 KB |
|
10.9 MB |
|
6.0 MB |
|
4.3 MB |
|
2.1 MB |
|
4.6 MB |
|
1.1 MB |
/.../7. OS and Service Version Detection/ |
|
|
914.7 KB |
|
11.8 MB |
|
12.8 MB |
|
939.5 KB |
/.../8. NMAP Scripting Engine/ |
|
|
1.0 MB |
|
2.1 MB |
|
5.4 MB |
|
9.6 MB |
|
650.8 KB |
/9. Wrap Up/ |
|
|
424.0 KB |
|
25.3 MB |
|
1.3 MB |
/Network Security Testing With NMAP/ |
|
|
1.8 MB |
/1. Course Overview/ |
|
|
4.3 MB |
/.../2. Getting Started with OpenVAS/ |
|
02. What Is Vulnerability Scanning and How Does OpenVAS Do the Job.mp4 |
10.3 MB |
|
10.0 MB |
|
29.4 MB |
|
23.9 MB |
/3. OpenVAS Administration/ |
|
|
16.3 MB |
|
17.4 MB |
|
9.4 MB |
|
7.4 MB |
/.../4. Working with NVTs and CVEs/ |
|
|
10.4 MB |
|
28.1 MB |
/5. OpenVAS Scanning/ |
|
|
14.7 MB |
|
21.4 MB |
/.../6. Interpreting the Results/ |
|
|
18.5 MB |
|
6.5 MB |
|
12.2 MB |
|
6.1 MB |
/Network Vulnerability Scanning with OpenVAS/ |
|
|
585.8 KB |
/1. Course Overview/ |
|
|
4.5 MB |
/.../2. OPSEC and the Penetration Testing Workflow/ |
|
|
3.2 MB |
|
16.7 MB |
|
5.4 MB |
|
5.1 MB |
|
8.3 MB |
/.../3. Setting up a Secure Penetration Testing Environment/ |
|
|
4.3 MB |
|
9.7 MB |
|
10.6 MB |
|
4.4 MB |
|
27.9 MB |
|
5.4 MB |
|
9.3 MB |
|
7.6 MB |
|
2.2 MB |
/.../4. Identifying and Mitigating Risks While Testing/ |
|
|
7.9 MB |
|
5.1 MB |
|
18.8 MB |
|
32.6 MB |
|
15.5 MB |
|
25.3 MB |
|
2.5 MB |
/.../5. Wrapping up Penetration Testing Engagements Securely/ |
|
|
6.9 MB |
|
3.7 MB |
|
33.3 MB |
|
4.0 MB |
|
4.5 MB |
/OPSEC for Penetration Testers/ |
|
|
3.6 MB |
/1. Introduction/ |
|
|
1.4 MB |
|
7.1 MB |
|
15.1 MB |
|
14.9 MB |
|
8.5 MB |
/.../10. Insufficient Transport Layer Protection/ |
|
|
3.9 MB |
|
10.5 MB |
|
40.6 MB |
|
30.2 MB |
104. Demo - Understanding secure cookies and forms authentication.mp4 |
39.3 MB |
|
38.2 MB |
|
20.5 MB |
|
12.4 MB |
|
22.2 MB |
|
13.9 MB |
|
17.2 MB |
|
17.5 MB |
|
15.7 MB |
/.../11. Unvalidated Redirects and Forwards/ |
|
|
1.9 MB |
|
10.3 MB |
|
19.7 MB |
|
14.7 MB |
117. Understanding the value of unvalidated redirects to attackers.mp4 |
12.7 MB |
|
17.6 MB |
|
19.3 MB |
|
8.5 MB |
|
6.7 MB |
/2. Injection/ |
|
|
3.1 MB |
|
6.2 MB |
|
37.1 MB |
|
5.2 MB |
|
2.2 MB |
|
5.1 MB |
|
18.6 MB |
|
16.3 MB |
|
10.5 MB |
|
20.5 MB |
|
16.9 MB |
|
25.8 MB |
|
18.8 MB |
|
7.6 MB |
/.../3. Cross Site Scripting (XSS)/ |
|
|
2.9 MB |
|
3.9 MB |
|
17.5 MB |
|
25.7 MB |
|
2.8 MB |
|
9.5 MB |
|
26.8 MB |
|
13.0 MB |
|
6.6 MB |
|
11.9 MB |
|
66.7 MB |
|
18.3 MB |
|
14.3 MB |
|
4.2 MB |
|
10.6 MB |
/.../4. Broken Authentication and Session Management/ |
|
|
1.6 MB |
|
3.8 MB |
|
4.8 MB |
|
6.6 MB |
|
2.1 MB |
040. The risk of session persistence in the URL versus cookies.mp4 |
5.8 MB |
|
10.4 MB |
042. Demo - Leveraging ASP.NET membership provider for authentication.mp4 |
18.3 MB |
043. Customising session and forms timeouts to minimise risk windows.mp4 |
5.4 MB |
|
5.6 MB |
|
7.1 MB |
|
6.0 MB |
/.../5. Insecure Direct Object References/ |
|
|
1.4 MB |
|
3.5 MB |
|
17.3 MB |
|
11.0 MB |
|
10.9 MB |
|
21.0 MB |
|
11.1 MB |
|
44.9 MB |
|
4.5 MB |
|
3.8 MB |
/.../6. Cross Site Request Forgery (CSRF)/ |
|
|
2.2 MB |
|
6.6 MB |
|
15.0 MB |
|
18.3 MB |
|
34.8 MB |
|
6.7 MB |
|
19.4 MB |
|
18.3 MB |
|
9.0 MB |
|
7.1 MB |
/7. Security Misconfiguration/ |
|
|
2.3 MB |
|
6.4 MB |
|
27.1 MB |
|
17.9 MB |
|
41.6 MB |
|
21.8 MB |
|
23.3 MB |
074. Demo - Encrypting sensitive parts of the web.config.mp4 |
30.2 MB |
075. Demo - Using config transforms to apply secure configurations.mp4 |
34.2 MB |
|
15.1 MB |
|
9.0 MB |
/.../8. Insecure Cryptographic Storage/ |
|
|
2.8 MB |
|
6.7 MB |
|
63.0 MB |
|
18.9 MB |
|
26.3 MB |
|
35.7 MB |
084. Slowing down hashes with the new Membership Provider.mp4 |
27.8 MB |
|
15.7 MB |
086. Things to consider when choosing a hashing implementation.mp4 |
14.7 MB |
|
11.3 MB |
|
24.6 MB |
|
15.3 MB |
|
12.6 MB |
/.../9. Failure to Restrict URL Access/ |
|
|
1.8 MB |
|
6.3 MB |
|
6.2 MB |
|
22.1 MB |
095. Demo - Access controls in ASP.NET part 1 - web.config locations.mp4 |
20.6 MB |
096. Demo - Access controls in ASP.NET part 2 - The authorize attribute.mp4 |
22.1 MB |
097. Demo - Role based authorisation with the ASP.NET Role Provider.mp4 |
30.6 MB |
|
19.3 MB |
|
12.9 MB |
/OWASP Top 10 Web Application Security Risks for ASP.NET/ |
|
|
374.6 MB |
/1. Course Overview/ |
|
|
3.8 MB |
/.../2. Discovering How Card Payments Work/ |
|
|
8.0 MB |
|
10.4 MB |
04. The Entities Involved in Authorizing a Payment Card Transaction.mp4 |
12.2 MB |
|
5.6 MB |
06. E-commerce Transactions and Payment Service Providers.mp4 |
8.6 MB |
|
5.8 MB |
|
2.6 MB |
|
5.6 MB |
/.../3. Working Out Which PCI Standards Apply/ |
|
|
9.0 MB |
|
11.1 MB |
|
13.6 MB |
|
8.7 MB |
|
11.2 MB |
|
7.7 MB |
16. Point-to-point Encryption and Card Production Standards.mp4 |
8.8 MB |
|
6.2 MB |
/.../4. PCI Compliance, Qualified Professionals, and Programs/ |
|
|
8.1 MB |
|
8.3 MB |
|
7.6 MB |
|
8.6 MB |
|
9.1 MB |
/.../5. Becoming a PCI Professional/ |
|
|
5.8 MB |
|
9.0 MB |
|
5.6 MB |
|
3.6 MB |
/Payment Card Security, Processing, and the PCI Standards/ |
|
|
11.9 MB |
/1. Course Overview/ |
|
|
5.3 MB |
/2. Introduction/ |
|
|
14.6 MB |
|
9.2 MB |
/.../3. Inside the Standard/ |
|
|
9.8 MB |
|
16.1 MB |
|
15.5 MB |
|
5.0 MB |
|
9.1 MB |
|
7.6 MB |
/.../4. What Is PCI DSS Compliance/ |
|
10. Who Can Ask You to Validate PCI DSS Compliance and How.mp4 |
10.2 MB |
11. Reports on Compliance and Self-assessment Questionnaires.mp4 |
11.1 MB |
|
15.4 MB |
|
13.0 MB |
/.../5. Ten PCI DSS Common Myths/ |
|
|
11.3 MB |
/PCI DSS - The Big Picture/ |
|
|
3.4 MB |
/1. Course Overview/ |
|
|
4.4 MB |
/Penetration Testing - Setting the Scope and Rules of Engagement/ |
|
|
9.8 MB |
/.../1. Installing and Configuring Kali Linux/ |
|
|
1.4 MB |
|
51.8 MB |
|
22.9 MB |
|
20.3 MB |
|
15.0 MB |
|
11.7 MB |
|
2.6 MB |
|
7.8 MB |
|
3.3 MB |
|
1.0 MB |
/.../10. Wi-Fi Penetration Testing/ |
|
|
2.3 MB |
|
14.0 MB |
|
26.4 MB |
|
29.3 MB |
|
7.3 MB |
|
1.4 MB |
/.../11. Brute Force Attack Testing/ |
|
|
1.6 MB |
|
6.1 MB |
|
4.2 MB |
|
11.1 MB |
|
9.3 MB |
|
1.0 MB |
/.../12. Advanced Penetration Testing/ |
|
|
882.4 KB |
|
23.1 MB |
|
8.1 MB |
|
14.3 MB |
|
19.4 MB |
|
1.2 MB |
/.../2. Pre-penetration Testing Checklist/ |
|
|
1.5 MB |
|
14.8 MB |
|
2.9 MB |
|
567.2 KB |
/3. Information Gathering/ |
|
|
1.9 MB |
|
7.7 MB |
|
5.1 MB |
|
3.2 MB |
|
15.2 MB |
|
7.3 MB |
|
5.2 MB |
|
4.6 MB |
|
6.5 MB |
|
4.2 MB |
|
7.6 MB |
|
14.3 MB |
|
22.3 MB |
|
1.6 MB |
/.../4. External Pen-testing/ |
|
|
1.4 MB |
|
2.9 MB |
|
8.0 MB |
|
5.8 MB |
|
15.5 MB |
|
878.6 KB |
/.../5. Website Penetration Testing/ |
|
|
1.2 MB |
|
2.9 MB |
|
2.1 MB |
|
2.3 MB |
|
2.1 MB |
|
14.5 MB |
|
8.8 MB |
|
8.9 MB |
|
14.2 MB |
|
5.1 MB |
|
7.2 MB |
|
7.5 MB |
|
33.3 MB |
|
10.3 MB |
|
10.2 MB |
|
7.8 MB |
|
22.3 MB |
|
2.5 MB |
/.../6. Internal Network Penetration Testing/ |
|
|
1.1 MB |
|
1.1 MB |
|
6.2 MB |
|
37.3 MB |
|
848.8 KB |
/7. Network Sniffing/ |
|
|
1.0 MB |
|
10.5 MB |
|
13.5 MB |
|
30.0 MB |
|
20.7 MB |
|
13.4 MB |
|
20.1 MB |
|
1.7 MB |
/8. Exploitation/ |
|
|
1.2 MB |
|
28.4 MB |
|
23.8 MB |
|
7.8 MB |
|
31.1 MB |
|
18.3 MB |
|
1.4 MB |
/9. Social Engineering/ |
|
|
918.5 KB |
|
19.6 MB |
|
14.6 MB |
|
16.8 MB |
|
11.3 MB |
|
1.2 MB |
/Penetration Testing and Ethical Hacking with Kali Linux/ |
|
|
3.6 MB |
/1. Course Overview/ |
|
|
8.0 MB |
/2. Welcome/ |
|
|
1.6 MB |
|
5.4 MB |
|
2.1 MB |
|
12.7 MB |
|
2.4 MB |
/.../3. Building the Automation Sandbox/ |
|
|
1.1 MB |
|
6.0 MB |
|
8.0 MB |
|
7.2 MB |
|
10.9 MB |
|
31.5 MB |
|
1.5 MB |
/4. Reconnaissance Automation/ |
|
|
1.6 MB |
|
2.2 MB |
|
27.2 MB |
|
11.8 MB |
|
9.3 MB |
|
16.7 MB |
|
43.6 MB |
|
1.1 MB |
/.../5. Internal Scanning Automation/ |
|
|
1.1 MB |
|
1.9 MB |
|
24.2 MB |
|
13.4 MB |
|
19.9 MB |
|
1.1 MB |
/6. Attack Automation/ |
|
|
1.1 MB |
|
1.4 MB |
|
8.1 MB |
|
42.2 MB |
|
31.3 MB |
|
1.0 MB |
/.../7. Web Application Security Automation/ |
|
|
4.8 MB |
|
5.1 MB |
|
14.9 MB |
|
14.1 MB |
|
1.5 MB |
/Penetration Testing Automation Using Python and Kali Linux/ |
|
|
3.4 MB |
/.../1. Penetration Testing Lifecycle Explained/ |
|
|
9.9 MB |
/2. Phase 1 - Planning/ |
|
|
3.0 MB |
|
4.2 MB |
|
3.4 MB |
|
3.7 MB |
|
3.1 MB |
|
3.7 MB |
/3. Phase 2 - Discovery/ |
|
|
1.1 MB |
|
4.6 MB |
|
5.3 MB |
|
7.1 MB |
/4. Phase 3 - Enumeration/ |
|
|
16.8 MB |
|
5.4 MB |
|
33.6 MB |
|
7.6 MB |
/.../5. Penetration Testing Lifecycle Explained - Vulnerability Phase/ |
|
|
4.6 MB |
|
40.0 MB |
|
6.6 MB |
|
25.4 MB |
|
30.4 MB |
/.../6. Penetration Testing Lifecycle Explained – Exploitation Phase/ |
|
|
46.4 MB |
/.../7. Penetration Testing Lifecycle Explained – Impact Analysis/ |
|
|
11.2 MB |
/Penetration Testing Life Cycle Explained/ |
|
|
4.2 MB |
/1. Course Overview/ |
|
|
4.2 MB |
/.../2. Recon-ng Basics/ |
|
|
9.2 MB |
|
10.8 MB |
04. Exploring the Recon-ng Shell and Data Management System.mp4 |
17.3 MB |
/.../3. Understanding Recon-ng Modules/ |
|
|
27.6 MB |
|
14.0 MB |
|
10.2 MB |
/.../4. Preparing and Running a Scan/ |
|
|
14.5 MB |
|
13.7 MB |
|
8.0 MB |
|
8.5 MB |
/.../5. Working with Scan Results/ |
|
|
16.9 MB |
|
11.0 MB |
/Penetration Testing OSINT Gathering with Recon-ng/ |
|
|
651.2 KB |
/1. Course Overview/ |
|
|
6.5 MB |
/.../2. Penetration Testing - Steps and Process/ |
|
|
26.6 MB |
/.../3. Map the SharePoint Environment/ |
|
03. Network, Server and Device Scanning, and Interrogation.mp4 |
11.0 MB |
|
33.0 MB |
|
4.1 MB |
06. Protecting from Network Scans Using the Windows Firewall.mp4 |
22.8 MB |
|
781.2 KB |
/.../4. Scan the SharePoint Network/ |
|
|
12.0 MB |
|
147.9 MB |
10. Protecting Servers and Devices on the SharePoint Network.mp4 |
5.6 MB |
|
616.9 KB |
/.../5. Widen the Attack Vector/ |
|
12. Understanding SharePoint Topology and Supporting Services.mp4 |
13.0 MB |
|
2.2 MB |
|
78.6 MB |
|
1.9 MB |
|
31.1 MB |
|
451.0 KB |
/.../6. Attacking and Testing the SharePoint Web Application/ |
|
|
9.0 MB |
|
48.6 MB |
|
3.1 MB |
21. SharePoint Clientside Request and Response Tampering.mp4 |
93.3 MB |
|
2.7 MB |
|
42.2 MB |
|
4.5 MB |
/.../7. End to End SharePoint Protection/ |
|
|
10.8 MB |
26. Protecting with Firewall, Port Control, and Whitelisting.mp4 |
47.1 MB |
|
7.4 MB |
|
21.5 MB |
|
10.0 MB |
|
20.9 MB |
|
4.5 MB |
/Penetration Testing SharePoint/ |
|
|
2.7 MB |
/1. Course Overview/ |
|
|
8.3 MB |
/.../10. Checking for 'Live' Systems and Their Open Ports/ |
|
|
4.3 MB |
|
21.9 MB |
|
23.5 MB |
|
7.9 MB |
|
6.3 MB |
|
11.5 MB |
|
1.1 MB |
/.../11. Types of Scanning/ |
|
|
2.7 MB |
|
27.0 MB |
|
17.7 MB |
|
21.0 MB |
|
13.2 MB |
|
13.2 MB |
|
4.3 MB |
|
6.0 MB |
|
30.5 MB |
|
5.1 MB |
|
2.5 MB |
/.../12. Banner Grabbing and OS Fingerprinting/ |
|
|
2.3 MB |
|
4.1 MB |
|
50.9 MB |
|
18.3 MB |
|
3.5 MB |
|
1.3 MB |
/.../13. More Tools for the Utility-belt/ |
|
|
1.1 MB |
|
6.9 MB |
|
3.0 MB |
|
8.7 MB |
|
4.3 MB |
|
1.1 MB |
/.../14. Threats from Wireless/ |
|
|
2.8 MB |
|
11.8 MB |
|
8.9 MB |
|
5.8 MB |
|
1.1 MB |
/.../2. The Two Steps/ |
|
|
11.6 MB |
|
7.5 MB |
|
3.3 MB |
|
5.3 MB |
|
5.3 MB |
|
9.6 MB |
|
3.6 MB |
/.../3. Initially What Do You Look For/ |
|
|
4.9 MB |
|
20.2 MB |
|
43.7 MB |
|
26.3 MB |
|
15.6 MB |
|
18.1 MB |
|
24.1 MB |
|
1.4 MB |
/.../4. The More You Look, the More You Find/ |
|
|
4.1 MB |
|
18.1 MB |
|
20.0 MB |
|
10.8 MB |
|
23.4 MB |
|
4.4 MB |
|
34.3 MB |
|
2.9 MB |
|
18.3 MB |
|
2.4 MB |
/.../5. Other Reconnaissance Techniques/ |
|
|
3.0 MB |
|
4.4 MB |
|
6.7 MB |
|
41.1 MB |
|
18.0 MB |
|
7.3 MB |
|
5.9 MB |
|
11.3 MB |
|
3.4 MB |
/.../6. Reconnaissance via Google Hacking/ |
|
|
3.1 MB |
|
5.3 MB |
|
15.0 MB |
|
9.5 MB |
|
17.4 MB |
|
23.0 MB |
|
14.0 MB |
|
30.3 MB |
|
3.3 MB |
|
2.3 MB |
/.../7. Let's Not Forget PowerShell/ |
|
|
1.5 MB |
|
8.4 MB |
|
3.9 MB |
|
6.1 MB |
|
60.8 MB |
|
27.8 MB |
|
15.6 MB |
|
29.5 MB |
|
1.8 MB |
/.../8. Overview of Scanning/ |
|
|
5.6 MB |
|
3.2 MB |
|
9.0 MB |
|
4.9 MB |
|
4.0 MB |
|
3.5 MB |
|
2.7 MB |
/.../9. Understanding the 3-way Handshake/ |
|
|
3.8 MB |
|
7.2 MB |
|
5.9 MB |
|
5.1 MB |
|
32.4 MB |
|
8.4 MB |
|
1.8 MB |
/Performing and Analyzing Network Reconnaissance/ |
|
|
9.5 MB |
/1. Course Overview/ |
|
|
4.5 MB |
/.../2. Preparing to Perform Corporate OSINT/ |
|
|
1.6 MB |
|
3.4 MB |
|
8.3 MB |
|
10.6 MB |
|
3.9 MB |
|
10.2 MB |
|
792.2 KB |
/.../3. Gathering Physical OSINT/ |
|
|
1.2 MB |
|
3.3 MB |
|
8.4 MB |
|
7.5 MB |
|
1.7 MB |
|
5.8 MB |
|
3.8 MB |
|
25.6 MB |
|
21.9 MB |
|
1.0 MB |
/.../4. Gathering Logical OSINT/ |
|
|
1.3 MB |
|
2.3 MB |
|
8.3 MB |
|
7.9 MB |
|
7.5 MB |
|
5.3 MB |
|
5.1 MB |
|
7.8 MB |
|
29.6 MB |
|
27.4 MB |
|
30.8 MB |
|
1.1 MB |
/.../5. Constructing an Org Chart/ |
|
|
1.6 MB |
|
2.4 MB |
|
6.4 MB |
|
5.6 MB |
|
6.4 MB |
|
3.1 MB |
|
22.6 MB |
|
20.3 MB |
|
880.7 KB |
/.../6. Gathering Electronic OSINT/ |
|
|
3.3 MB |
|
6.4 MB |
|
8.2 MB |
|
11.5 MB |
|
15.0 MB |
|
20.7 MB |
|
13.5 MB |
|
949.8 KB |
/.../7. Identifying Infrastructure Assets/ |
|
|
1.8 MB |
|
7.9 MB |
|
6.6 MB |
|
9.6 MB |
|
7.1 MB |
|
6.2 MB |
|
5.1 MB |
|
7.7 MB |
|
9.1 MB |
|
29.6 MB |
|
21.7 MB |
|
28.6 MB |
|
24.2 MB |
|
1.8 MB |
/.../8. Gathering Financial OSINT/ |
|
|
1.4 MB |
|
6.2 MB |
|
4.2 MB |
|
41.7 MB |
|
809.8 KB |
/.../9. Putting It All Together/ |
|
|
967.7 KB |
|
2.9 MB |
|
2.6 MB |
|
22.2 MB |
|
24.5 MB |
|
22.1 MB |
|
29.8 MB |
|
16.6 MB |
|
15.0 MB |
|
29.1 MB |
|
23.4 MB |
|
13.9 MB |
|
2.5 MB |
|
2.4 MB |
/Performing OSINT Gathering on Corporate Targets/ |
|
|
8.4 MB |
/1. Course Overview/ |
|
|
12.0 MB |
/.../2. SQL Injection - TalkTalk/ |
|
|
29.4 MB |
|
26.2 MB |
|
48.4 MB |
|
47.2 MB |
/.../3. Session Hijacking - Valve/ |
|
|
31.3 MB |
07. Cryptographically Safe Cookies and Cross-site Scripting (XSS).mp4 |
21.4 MB |
08. Preventing Session Hijacking and Man in the Middle Attacks.mp4 |
44.6 MB |
/.../4. Evading IDS, Firewalls, and Honeypots - Ashley Madison and Sony Pictures/ |
|
|
26.6 MB |
|
44.5 MB |
11. Firewalls, Intrusion Detection System (IDS), and Honeypots.mp4 |
73.2 MB |
|
33.6 MB |
13. The Sony Pictures Hack and the Hard Cost of Breaches.mp4 |
32.3 MB |
/.../5. Hacking Web Servers - Drupal/ |
|
|
18.8 MB |
|
21.8 MB |
|
77.1 MB |
|
15.2 MB |
/.../6. Distributed Denial of Services (DDoS) - Nissan/ |
|
|
18.4 MB |
19. Breaking Down a Distributed Denial of Service (DDoS) Attack.mp4 |
41.5 MB |
20. Coordinating a DDoS Attack with Low Orbit Ion Cannon (LOIC).mp4 |
24.2 MB |
21. Exploring Automated Tools for DDoS Attacks and How to Prevent Attacks.mp4 |
69.2 MB |
22. Corporate Espionage and Troy's Vulnerability Discover with Nissan.mp4 |
29.3 MB |
|
63.4 MB |
|
10.5 MB |
/1. Course Overview/ |
|
|
15.2 MB |
/.../2. Session Hijacking via Cross-site Scripting (XSS)/ |
|
|
97.4 MB |
3. How Can Users and Developers Mitigate Reflected XSS Risks.mp4 |
118.5 MB |
|
91.2 MB |
|
46.4 MB |
/3. Hacker Hardware/ |
|
|
116.8 MB |
|
234.5 MB |
/4. Conclusion/ |
|
|
79.4 MB |
/1. Course Overview/ |
|
|
19.3 MB |
/2. Shodan Overview/ |
|
|
20.5 MB |
|
72.0 MB |
|
77.8 MB |
/.../3. Vulnerabilities and Automation/ |
|
|
43.8 MB |
|
31.9 MB |
|
42.8 MB |
/.../4. Hiding in Plain Sight and the Dark Web/ |
|
|
64.9 MB |
09. Finding SSIDs with Wigle.net and Questionable Tracking Practices.mp4 |
58.1 MB |
|
103.5 MB |
|
20.1 MB |
/1. Course Overview/ |
|
|
15.0 MB |
/.../2. Computer-based Social Engineering/ |
|
|
49.8 MB |
|
25.5 MB |
04. Computer-based Social Engineering - Phishing with BeEF.mp4 |
68.2 MB |
|
29.4 MB |
/.../3. Human-based Social Engineering/ |
|
|
47.2 MB |
|
98.3 MB |
|
13.0 MB |
09. Social Engineering Reconaissance - Open Source Intelligence (OSINT).mp4 |
83.1 MB |
|
69.6 MB |
/.../1. Secure Account Management/ |
|
|
10.1 MB |
|
34.0 MB |
|
59.7 MB |
|
53.2 MB |
|
8.0 MB |
|
28.4 MB |
|
52.7 MB |
|
119.3 MB |
09. Brute Force Attacks, Throttling, and Account Lockout.mp4 |
109.2 MB |
|
17.5 MB |
|
40.6 MB |
|
52.9 MB |
|
94.5 MB |
|
62.4 MB |
|
13.1 MB |
/.../2. Patterns of Good Web Security/ |
|
|
42.6 MB |
|
50.8 MB |
|
170.6 MB |
|
147.0 MB |
|
58.1 MB |
|
30.3 MB |
|
33.1 MB |
|
56.7 MB |
|
53.0 MB |
|
23.5 MB |
/1. Course Overview/ |
|
|
2.8 MB |
/.../2. Understanding Post Exploitation/ |
|
|
6.7 MB |
|
3.4 MB |
/.../3. Revisiting the Rules of Engagement/ |
|
|
12.4 MB |
|
667.3 KB |
/.../4. Analyzing Network Configuration with Inbuilt Tools/ |
|
|
2.5 MB |
|
434.7 KB |
|
3.3 MB |
|
4.6 MB |
|
3.4 MB |
|
1.6 MB |
|
1.2 MB |
|
1.5 MB |
|
620.8 KB |
/.../5. Analyzing Network Configuration with Uploaded Tools/ |
|
|
1.2 MB |
|
4.9 MB |
|
1.2 MB |
|
2.9 MB |
|
6.5 MB |
|
4.2 MB |
|
2.7 MB |
|
1.1 MB |
/.../6. Identifying Network Services/ |
|
|
844.9 KB |
|
2.3 MB |
|
17.5 MB |
|
9.3 MB |
|
7.5 MB |
|
3.6 MB |
|
1.1 MB |
/.../7. This End Is Where It Begins/ |
|
|
4.0 MB |
/Post Exploitation - Performing Infrastructure Analysis/ |
|
|
3.6 MB |
/1. Course Overview/ |
|
|
9.1 MB |
/.../2. Applying Research Methods/ |
|
|
3.5 MB |
|
4.4 MB |
|
2.0 MB |
|
5.4 MB |
|
8.2 MB |
|
4.6 MB |
|
1.5 MB |
|
3.9 MB |
|
7.6 MB |
|
13.5 MB |
|
4.7 MB |
13. Research Security Implications of New Business Tools_Social Media.mp4 |
7.8 MB |
|
3.7 MB |
|
4.3 MB |
|
3.2 MB |
|
3.2 MB |
|
5.7 MB |
|
5.0 MB |
|
7.7 MB |
/.../3. Analyze Scenarios to the Secure the Enterprise/ |
|
|
2.3 MB |
|
7.0 MB |
|
9.5 MB |
|
2.8 MB |
|
5.6 MB |
|
5.8 MB |
|
2.7 MB |
28. Reverse Engineer_Deconstruct Existing Security Solutions.mp4 |
7.2 MB |
|
11.9 MB |
30. Lessons Learned, After Action Reports, and Using Judgment.mp4 |
10.8 MB |
/.../4. Assessment Tools and Methods/ |
|
|
10.9 MB |
|
7.0 MB |
|
9.4 MB |
|
3.7 MB |
|
6.0 MB |
|
5.1 MB |
|
1.6 MB |
/Research and Analysis for CASP (CAS-002)/ |
|
|
1.4 MB |
/Risk Management/1. Getting Started/ |
|
|
545.7 KB |
|
11.7 MB |
|
5.8 MB |
|
2.5 MB |
|
600.4 KB |
/Risk Management/2. Governance Models/ |
|
|
662.7 KB |
|
3.4 MB |
|
1.6 MB |
|
1.4 MB |
|
4.3 MB |
|
1.8 MB |
/Risk Management/3. Assessing Risk/ |
|
|
332.4 KB |
|
3.7 MB |
|
3.7 MB |
|
1.8 MB |
|
1.8 MB |
|
6.5 MB |
|
3.0 MB |
|
791.8 KB |
/Risk Management/4. Risk Mitigation/ |
|
|
406.3 KB |
|
1.4 MB |
|
5.1 MB |
|
3.3 MB |
|
1.1 MB |
/.../5. Risk Monitoring and Reporting/ |
|
|
502.7 KB |
|
2.7 MB |
|
1.1 MB |
|
418.7 KB |
/Risk Management/6. Final Thoughts/ |
|
|
321.0 KB |
|
1.3 MB |
|
2.6 MB |
|
539.9 KB |
/Risk Management/ |
|
|
2.1 MB |
/1. Course Overview/ |
|
|
5.6 MB |
/.../2. Introduction to Risk Management and Incident Response/ |
|
|
4.9 MB |
03. New or Changing Business Models, Strategies, and Outsourcing.mp4 |
6.5 MB |
|
3.5 MB |
|
12.2 MB |
|
2.5 MB |
|
2.8 MB |
|
2.9 MB |
|
1.2 MB |
|
4.7 MB |
|
5.1 MB |
|
2.8 MB |
|
3.6 MB |
|
2.2 MB |
|
7.0 MB |
|
7.7 MB |
/.../3. Risk Mitigation, Planning, Strategies, and Controls/ |
|
|
2.4 MB |
|
10.8 MB |
|
4.5 MB |
20. Classify Information Types into Levels of CIA and Determine Aggregate Score.mp4 |
5.4 MB |
21. Extreme Scenario Planning_Worst-case Scenario Planning.mp4 |
12.0 MB |
|
3.4 MB |
|
3.4 MB |
|
1.8 MB |
|
5.7 MB |
/.../4. Comparing Security, Privacy Policies, and Procedures/ |
|
|
1.8 MB |
|
2.2 MB |
|
1.9 MB |
|
11.1 MB |
|
4.3 MB |
|
1.5 MB |
32. General Privacy Principles for Sensitive Information, Hiring, and Firing.mp4 |
10.2 MB |
|
3.9 MB |
|
2.0 MB |
/.../5. Incident Response and Recovery Procedures/ |
|
|
2.7 MB |
|
4.2 MB |
|
5.5 MB |
|
5.6 MB |
|
3.6 MB |
|
5.5 MB |
|
1.6 MB |
|
5.4 MB |
|
4.2 MB |
|
4.3 MB |
|
2.7 MB |
|
2.6 MB |
|
3.0 MB |
|
3.0 MB |
|
3.8 MB |
|
777.3 KB |
/Risk Management and Incident Response for CASP (CAS-002)/ |
|
|
1.9 MB |
/1. Course Overview/ |
|
|
4.6 MB |
/.../2. Introduction to Risk Management/ |
|
|
9.7 MB |
|
12.4 MB |
|
7.9 MB |
|
10.1 MB |
/.../3. Risk Management Certification/ |
|
|
12.4 MB |
|
1.9 MB |
/.../4. Risk and Governance - An Overview of Risk Governance/ |
|
|
14.5 MB |
/.../5. Risk Context and Risk Factors/ |
|
|
15.0 MB |
/.../6. Areas of Risk/ |
|
|
11.3 MB |
|
4.7 MB |
|
6.9 MB |
/Risk Management and Information Systems Control - Introduction to Risk/ |
|
|
3.3 MB |
/1. Course Overview/ |
|
|
4.8 MB |
/.../2. Key Topics and the Learning Objectives/ |
|
|
13.9 MB |
/.../3. Risk Identification vs. Risk Assessment/ |
|
|
17.3 MB |
/.../4. Impact of Culture on Risk/ |
|
|
21.1 MB |
/.../5. Controls and Controls Gap/ |
|
|
12.7 MB |
|
6.8 MB |
|
9.3 MB |
/6. Determining Risk/ |
|
|
12.7 MB |
|
15.3 MB |
|
16.3 MB |
/.../7. Risk Areas to Consider/ |
|
|
18.0 MB |
/Risk Management and Information Systems Control - IT Risk Assessment/ |
|
risk-management-information-systems-control-risk-assessment.zip |
846.8 KB |
/1. Course Overview/ |
|
|
4.6 MB |
/.../2. Key Topics and the Learning Objectives/ |
|
|
11.5 MB |
/.../3. Metrics and Key Risk Indicators/ |
|
|
7.2 MB |
|
11.1 MB |
|
5.5 MB |
/.../4. Data Collection Sources/ |
|
|
8.4 MB |
|
9.0 MB |
/.../5. Vulnerability Assessments and Penetration Tests/ |
|
|
14.7 MB |
/.../6. Third Party Assurance and Reporting/ |
|
|
9.8 MB |
/Risk Management and Information Systems Control - Risk and Control Monitoring and Reporting/ |
|
risk-management-information-systems-control-monitoring-reporting.zip |
2.4 MB |
/1. Course Overview/ |
|
|
5.0 MB |
/.../2. Key Topics and the Learning Objectives/ |
|
|
22.9 MB |
|
12.0 MB |
/.../3. The Methodology of Risk Identification/ |
|
|
9.1 MB |
|
4.4 MB |
|
8.4 MB |
/.../4. Gathering Risk Data and Culture/ |
|
|
15.4 MB |
|
14.2 MB |
|
11.2 MB |
/.../5. Ethics, Laws, and Standards/ |
|
|
9.7 MB |
|
14.8 MB |
/.../6. Asset Values, Threats, and Vulnerabilities/ |
|
|
12.8 MB |
|
10.2 MB |
14. Risk Related to Business Processes and Risk Scenarios.mp4 |
8.3 MB |
/.../7. Management Responsibilities and Awareness/ |
|
|
9.5 MB |
|
11.2 MB |
/Risk Management and Information Systems Control - Risk Identification/ |
|
risk-management-information-systems-control-risk-identification.zip |
2.4 MB |
/1. Course Overview/ |
|
|
4.8 MB |
/.../2. Key Topics and the Learning Objectives/ |
|
|
18.7 MB |
/.../3. Risk Response Goals and Alternatives/ |
|
|
10.0 MB |
/.../4. Selecting a Risk Response/ |
|
|
13.8 MB |
|
16.7 MB |
/5. Inherent Risk/ |
|
|
7.5 MB |
|
12.3 MB |
/6. Data Protection/ |
|
|
10.3 MB |
/7. Data Encryption/ |
|
|
16.1 MB |
/.../8. Risk Areas to Consider/ |
|
|
9.9 MB |
|
16.6 MB |
|
8.9 MB |
|
8.5 MB |
/Risk Management and Information Systems Control - Risk Response and Mitigation/ |
|
risk-management-information-systems-control-response-mitigation.zip |
3.9 MB |
/1. Course Overview/ |
|
|
4.9 MB |
/2. Analyzing Risk/ |
|
|
32.1 MB |
03. Recovery Time Objective and Risk Management Overview.mp4 |
9.4 MB |
|
4.0 MB |
|
6.7 MB |
|
1.6 MB |
/3. Mitigating Malware/ |
|
|
7.6 MB |
|
8.1 MB |
|
10.4 MB |
|
3.0 MB |
|
9.6 MB |
|
11.5 MB |
|
1.8 MB |
/.../4. Attack Defense Tactics/ |
|
|
1.7 MB |
|
10.9 MB |
|
16.7 MB |
|
20.2 MB |
|
12.1 MB |
|
17.6 MB |
|
20.3 MB |
|
12.6 MB |
|
2.1 MB |
|
8.6 MB |
|
3.2 MB |
/.../5. Conducting Vulnerability Assessments/ |
|
|
5.0 MB |
|
4.9 MB |
27. Configure Updates and Credentialed Scans Using Languard.mp4 |
11.1 MB |
|
34.6 MB |
|
14.6 MB |
|
1.7 MB |
/Risks, Vulnerabilities, and Threats/ |
|
|
3.4 MB |
/1. Introduction/ |
|
|
3.9 MB |
|
22.7 MB |
|
7.7 MB |
|
15.9 MB |
/.../10. Additional Considerations/ |
|
|
3.8 MB |
|
13.2 MB |
|
11.5 MB |
|
11.2 MB |
74. The Mechanics and Risks Within Two Factor Authentication.mp4 |
19.0 MB |
|
27.1 MB |
|
19.3 MB |
|
11.2 MB |
|
16.4 MB |
|
5.1 MB |
/.../2. Fundamental Security Concepts/ |
|
|
2.5 MB |
|
4.3 MB |
|
24.4 MB |
|
16.0 MB |
|
4.3 MB |
|
5.7 MB |
|
3.3 MB |
/3. Password Storage/ |
|
|
4.8 MB |
|
5.5 MB |
|
27.0 MB |
|
4.6 MB |
|
46.9 MB |
|
14.9 MB |
|
3.0 MB |
/4. Registration/ |
|
|
4.3 MB |
|
14.1 MB |
|
23.9 MB |
|
30.5 MB |
23. More Sophisticated Password Strength Implementations.mp4 |
30.5 MB |
|
31.5 MB |
|
26.3 MB |
|
21.2 MB |
|
34.5 MB |
|
4.3 MB |
/5. Logon/ |
|
|
3.9 MB |
|
9.0 MB |
|
64.4 MB |
|
20.6 MB |
|
22.4 MB |
|
66.3 MB |
|
13.2 MB |
|
5.4 MB |
/6. Remember Me/ |
|
|
3.9 MB |
|
16.6 MB |
|
24.9 MB |
|
22.4 MB |
|
6.2 MB |
|
17.4 MB |
|
2.5 MB |
/.../7. Account Details Change/ |
|
|
3.3 MB |
|
14.9 MB |
|
17.9 MB |
|
30.0 MB |
|
23.2 MB |
|
22.8 MB |
|
22.0 MB |
|
5.0 MB |
/8. Password Reset/ |
|
|
2.6 MB |
|
21.5 MB |
|
11.7 MB |
|
13.1 MB |
|
21.2 MB |
|
23.9 MB |
|
12.5 MB |
|
9.1 MB |
|
21.1 MB |
|
10.8 MB |
|
8.1 MB |
/9. Logoff/ |
|
|
3.5 MB |
|
14.4 MB |
|
11.2 MB |
|
15.7 MB |
|
9.4 MB |
|
15.8 MB |
|
5.1 MB |
/Secure Account Management Fundamentals/ |
|
|
26.1 MB |
/1. Course Overview/ |
|
|
7.5 MB |
/.../2. Introduction to Hackers Hall/ |
|
|
12.4 MB |
/.../3. Proper User Authentication/ |
|
|
2.3 MB |
|
9.8 MB |
|
9.5 MB |
|
37.3 MB |
|
23.2 MB |
|
30.9 MB |
09. Enforcing Validation at the Database level with Mongoose.mp4 |
7.6 MB |
|
1.3 MB |
|
10.9 MB |
|
30.0 MB |
|
14.8 MB |
|
3.4 MB |
|
1.0 MB |
/4. Session Management/ |
|
|
4.0 MB |
|
1.5 MB |
|
26.1 MB |
|
15.8 MB |
|
1.8 MB |
|
7.2 MB |
|
3.4 MB |
|
13.5 MB |
24. Using Transport Layer Security to Secure Session Cookies.mp4 |
8.6 MB |
|
4.3 MB |
|
10.9 MB |
|
1.8 MB |
|
1.3 MB |
/.../5. Securing MongoDB from Injection Attacks/ |
|
|
2.7 MB |
|
7.3 MB |
|
58.6 MB |
|
8.4 MB |
|
3.8 MB |
|
23.4 MB |
|
21.0 MB |
|
3.2 MB |
/.../6. Handling Untrusted Data/ |
|
|
2.4 MB |
|
46.4 MB |
|
12.9 MB |
|
12.7 MB |
|
2.1 MB |
|
24.3 MB |
|
5.9 MB |
|
2.7 MB |
|
4.0 MB |
/7. Access Controls/ |
|
|
2.7 MB |
|
5.2 MB |
|
2.6 MB |
|
10.8 MB |
|
23.4 MB |
|
2.9 MB |
|
42.3 MB |
|
8.5 MB |
|
15.0 MB |
|
2.1 MB |
/.../8. Defending Against Cross-site Scripting (XSS)/ |
|
|
2.8 MB |
|
14.4 MB |
|
16.7 MB |
|
5.5 MB |
|
2.6 MB |
|
21.8 MB |
|
5.2 MB |
|
5.6 MB |
|
3.1 MB |
|
12.8 MB |
|
28.8 MB |
|
31.2 MB |
|
15.6 MB |
|
3.1 MB |
/.../9. Securing Your Connection/ |
|
|
1.6 MB |
|
4.0 MB |
|
3.3 MB |
|
39.9 MB |
|
10.4 MB |
|
9.7 MB |
|
31.5 MB |
|
3.6 MB |
|
19.3 MB |
|
10.6 MB |
/Securing Your Node.js Web App/ |
|
|
45.4 MB |
/1. Course Overview/ |
|
|
5.3 MB |
/.../2. Exploring C Program Details Related to Security/ |
|
|
17.8 MB |
|
29.7 MB |
|
12.8 MB |
/3. Auditing C Code/ |
|
05. Find Security Flaws - Overflows, Off-by-one, Command Injection, Design, ASCII_Wide, and More.mp4 |
16.0 MB |
06. Review Memory Allocations Closely and Introducing Heartbleed.mp4 |
10.5 MB |
07. Explore the Heartbleed Vulnerability with the SCI Understand Code Auditing Tool.mp4 |
31.9 MB |
|
8.7 MB |
|
9.5 MB |
/.../4. Exploring C++ Program Details Related to Security/ |
|
|
1.3 MB |
|
29.4 MB |
|
18.9 MB |
|
11.2 MB |
|
11.1 MB |
/5. Auditing C++/ |
|
|
4.8 MB |
|
15.0 MB |
17. Introduce the Newer Bugs in Modern C++ Apps, Why They Exist, and How an Exploit Could Work.mp4 |
7.5 MB |
|
16.1 MB |
19. New in-app Protections - Isolated Heap and Deferred Free.mp4 |
3.3 MB |
|
9.4 MB |
/Security for Hackers and Developers - Code Auditing/ |
|
|
20.7 MB |
/1. Course Overview/ |
|
|
4.8 MB |
/.../10. Applying Fuzzing Metrics/ |
|
|
2.9 MB |
|
5.8 MB |
|
1.9 MB |
/.../2. Explaining Fuzz Testing/ |
|
|
13.2 MB |
|
13.2 MB |
|
14.4 MB |
/.../3. Writing and Monitoring Mutation Fuzzers/ |
|
|
17.8 MB |
|
23.8 MB |
/.../4. Using the Sulley Fuzzing Framework for Generation Fuzzing/ |
|
|
19.5 MB |
/.../5. Learning the Peach Fuzzer/ |
|
|
32.2 MB |
|
10.8 MB |
/.../6. Distributing Fuzz Test Cases/ |
|
|
22.3 MB |
|
15.9 MB |
/7. Fuzzing APIs/ |
|
|
4.7 MB |
|
18.3 MB |
/.../8. Fuzzing In-memory Code/ |
|
|
4.0 MB |
|
43.9 MB |
/.../9. Learning Feedback Fuzzers - AFL and libFuzzer/ |
|
|
14.6 MB |
|
42.3 MB |
/Security for Hackers and Developers - Fuzzing/ |
|
|
2.5 MB |
/1. Course Overview/ |
|
|
4.2 MB |
/2. Introduction/ |
|
|
3.9 MB |
|
5.2 MB |
|
8.4 MB |
|
293.7 KB |
/.../3. Understanding the Security Development Lifecycle - SDL/ |
|
|
625.0 KB |
|
5.8 MB |
|
7.9 MB |
|
437.0 KB |
|
3.1 MB |
|
5.9 MB |
|
12.7 MB |
|
1.6 MB |
/.../4. Uncovering Security Bugs/ |
|
|
5.9 MB |
|
6.7 MB |
|
2.8 MB |
/.../5. Using Static Analysis/ |
|
|
4.3 MB |
|
5.6 MB |
|
9.9 MB |
/.../6. Pentesting Code - Learning from a Case Study/ |
|
|
3.7 MB |
|
3.5 MB |
|
4.8 MB |
|
8.3 MB |
|
3.2 MB |
/Security for Hackers and Developers - Overview/ |
|
|
1.8 MB |
/1. Course Overview/ |
|
|
4.1 MB |
/.../2. Using IDA Pro to Reverse Code/ |
|
|
13.7 MB |
|
67.6 MB |
|
10.3 MB |
/.../3. Learning x86 and Calling Conventions/ |
|
|
13.1 MB |
|
5.9 MB |
|
21.2 MB |
/.../4. Understanding C-to-Assembly and Compiled Structures/ |
|
|
7.8 MB |
|
19.7 MB |
|
8.2 MB |
/.../5. Patching a Compiled Binary/ |
|
|
7.8 MB |
|
18.7 MB |
13. Describe FLIRT_FLARE, Talk About Malware, and Summarize.mp4 |
8.5 MB |
/6. Reversing C++/ |
|
|
4.5 MB |
|
47.6 MB |
|
8.1 MB |
/.../7. Extending IDA with Scripts/ |
|
|
8.7 MB |
18. Perform Enough of the IDA Python Lab to Faciliate Hands-on Learning.mp4 |
39.0 MB |
|
8.7 MB |
/Security for Hackers and Developers - Reverse Engineering/ |
|
|
3.1 MB |
/1. Course Overview/ |
|
|
3.7 MB |
/.../2. Organizational Security Management/ |
|
|
12.6 MB |
|
2.2 MB |
|
13.7 MB |
05. Scenario - Integrating Security Goals at Globomantics.mp4 |
2.6 MB |
|
18.6 MB |
|
5.2 MB |
08. Scenario - Applying Security Principles at Globomantics.mp4 |
2.2 MB |
|
5.3 MB |
|
11.3 MB |
11. Scenario - Applying Security Controls at Globomantics.mp4 |
2.2 MB |
|
2.2 MB |
/.../3. Establishing a Security Management Program/ |
|
|
12.0 MB |
|
3.4 MB |
|
4.8 MB |
|
4.7 MB |
|
9.0 MB |
18. Scenario - Business and Security Relationships at Globomantics.mp4 |
2.3 MB |
|
10.0 MB |
|
4.7 MB |
|
14.2 MB |
22. Scenario - Creating a Security Management Program at Globomantics.mp4 |
3.9 MB |
|
1.7 MB |
/.../4. Deciphering the Risk Management Program/ |
|
|
11.4 MB |
|
4.2 MB |
|
2.5 MB |
|
8.2 MB |
|
6.1 MB |
|
3.9 MB |
|
5.4 MB |
|
3.9 MB |
|
1.2 MB |
|
1.0 MB |
/.../5. Embracing Organizational Resilience/ |
|
|
7.1 MB |
|
8.7 MB |
|
7.2 MB |
|
10.8 MB |
|
7.5 MB |
|
7.8 MB |
|
2.5 MB |
|
8.5 MB |
|
5.7 MB |
|
6.6 MB |
|
1.8 MB |
/Security Management - The Big Picture/ |
|
|
3.2 MB |
/1. Introduction/ |
|
|
10.6 MB |
/.../2. Implement Authentication Mechanisms/ |
|
|
10.3 MB |
03. Single_Multifactor Authentication - Something You Know.mp4 |
30.4 MB |
04. Single_Multifactor Authentication - Something You Have.mp4 |
6.5 MB |
05. Single_Multifactor Authentication - Something You Are.mp4 |
12.0 MB |
|
6.6 MB |
|
8.9 MB |
|
21.5 MB |
|
3.8 MB |
/.../3. Operate Internetwork Trust Architectures/ |
|
|
7.9 MB |
|
13.0 MB |
|
8.2 MB |
|
9.2 MB |
|
4.8 MB |
/.../4. Participate in the Identity-management Lifecycle/ |
|
|
4.4 MB |
|
22.0 MB |
|
19.6 MB |
|
21.1 MB |
|
9.2 MB |
|
5.3 MB |
/.../5. Implement Access Controls/ |
|
|
4.9 MB |
|
18.1 MB |
|
20.3 MB |
|
9.4 MB |
|
5.7 MB |
|
6.7 MB |
|
8.6 MB |
|
5.1 MB |
/SSCP® - Access Controls/ |
|
|
2.4 MB |
/SSCP® - Cryptography/1. Introduction/ |
|
|
6.4 MB |
/.../2. Understand and Apply Fundamental Concepts of Cryptography/ |
|
|
16.0 MB |
|
23.9 MB |
|
4.5 MB |
|
9.0 MB |
|
12.8 MB |
|
25.1 MB |
|
14.4 MB |
|
9.9 MB |
|
3.8 MB |
/.../3. Understand Requirements for Cryptography/ |
|
|
4.3 MB |
|
6.0 MB |
|
20.2 MB |
|
22.4 MB |
|
3.4 MB |
/.../4. Understand and Support Secured Protocols/ |
|
|
2.1 MB |
|
10.5 MB |
|
19.0 MB |
|
4.3 MB |
|
3.8 MB |
/.../5. Operate and Implement Cryptographic Systems/ |
|
|
4.1 MB |
|
23.7 MB |
|
16.2 MB |
|
26.0 MB |
|
5.4 MB |
|
5.5 MB |
/SSCP® - Cryptography/ |
|
|
5.6 MB |
/.../1. SSCP Incident Response and Recovery/ |
|
|
4.7 MB |
/.../2. Participate in Incident Handling/ |
|
|
9.7 MB |
|
13.6 MB |
|
8.1 MB |
|
9.8 MB |
|
24.5 MB |
|
6.7 MB |
|
6.1 MB |
/.../3. Understand and Support Forensic Investigations/ |
|
|
11.3 MB |
|
16.5 MB |
|
10.5 MB |
|
6.7 MB |
|
7.0 MB |
|
4.8 MB |
/.../4. Understand and Support Business Continuity Plan and Disaster Recovery Plan/ |
|
|
7.4 MB |
|
28.0 MB |
|
26.3 MB |
|
7.5 MB |
|
36.1 MB |
|
11.1 MB |
|
5.0 MB |
/SSCP® - Incident Response and Recovery/ |
|
|
3.1 MB |
/.../1. SSCP Introduction and Exam Requirements/ |
|
|
5.1 MB |
|
10.4 MB |
|
21.8 MB |
|
5.0 MB |
|
24.3 MB |
/SSCP® - Introduction and the Exam Requirements/ |
|
|
1.9 MB |
/1. Introduction/ |
|
|
8.0 MB |
/.../2. Understand Security Issues Related to Networks/ |
|
|
6.4 MB |
|
10.1 MB |
|
13.6 MB |
|
7.3 MB |
|
25.8 MB |
|
15.8 MB |
|
9.4 MB |
|
7.5 MB |
|
2.5 MB |
/.../3. Protect Telecommunications Technologies/ |
|
|
3.0 MB |
|
7.3 MB |
|
17.6 MB |
|
2.1 MB |
/.../4. Control Network Access/ |
|
|
2.6 MB |
|
14.7 MB |
|
6.5 MB |
|
13.0 MB |
|
1.9 MB |
/.../5. Manage LAN-based Security/ |
|
|
3.6 MB |
|
6.0 MB |
|
11.0 MB |
|
5.1 MB |
|
24.5 MB |
|
12.0 MB |
|
2.9 MB |
/.../6. Operate and Configure Network-based Security Devices/ |
|
|
4.3 MB |
|
27.5 MB |
|
23.4 MB |
|
10.0 MB |
|
2.6 MB |
/.../7. Implement and Operate Wireless Technologies/ |
|
|
3.6 MB |
|
10.5 MB |
34. Transmission Security - Wireless Protocols and Standards.mp4 |
12.2 MB |
|
7.0 MB |
|
14.9 MB |
|
1.9 MB |
/SSCP® - Network and Communications Security/ |
|
|
5.0 MB |
/1. Introduction/ |
|
|
7.3 MB |
/.../2. Understanding the Risk Management Process/ |
|
|
14.1 MB |
|
9.5 MB |
|
33.4 MB |
|
32.9 MB |
|
12.9 MB |
|
5.0 MB |
/.../3. Perform Security Assessment Activities/ |
|
|
5.1 MB |
|
33.9 MB |
10. Participate in Security Testing and Evaluation - Risk Analysis.mp4 |
34.7 MB |
11. Interpretation and Reporting of Scanning and Testing Results.mp4 |
7.2 MB |
|
3.0 MB |
/.../4. Operate and Maintain Monitoring Systems/ |
|
|
6.7 MB |
|
16.0 MB |
|
10.3 MB |
|
25.9 MB |
|
4.2 MB |
/.../5. Analyze Monitoring Results/ |
|
|
3.5 MB |
|
35.0 MB |
|
10.5 MB |
|
9.3 MB |
|
8.3 MB |
|
4.5 MB |
/SSCP® - Risk Identification, Monitoring, and Analysis/ |
|
|
4.2 MB |
/1. Introduction/ |
|
|
15.5 MB |
/.../2. Understand and Comply with Codes of Ethics/ |
|
|
6.9 MB |
|
11.4 MB |
|
9.0 MB |
|
16.0 MB |
|
21.8 MB |
|
12.8 MB |
|
10.5 MB |
|
6.1 MB |
/.../3. Understand Security Concepts/ |
|
|
5.9 MB |
|
10.2 MB |
|
7.1 MB |
|
12.1 MB |
|
6.1 MB |
|
11.2 MB |
|
11.8 MB |
|
11.9 MB |
|
7.6 MB |
/.../4. Document and Operate Security Controls/ |
|
|
10.6 MB |
|
16.5 MB |
|
10.3 MB |
|
14.0 MB |
|
14.3 MB |
|
3.7 MB |
/.../5. Participate in Asset Management/ |
|
|
12.7 MB |
|
18.3 MB |
|
16.6 MB |
|
7.9 MB |
|
23.0 MB |
|
15.2 MB |
|
3.7 MB |
/.../6. Implement and Assess Compliance with Controls/ |
|
|
14.9 MB |
|
7.0 MB |
|
19.2 MB |
|
15.3 MB |
|
14.6 MB |
|
11.4 MB |
|
3.7 MB |
/.../7. Participate in Change Management/ |
|
|
20.7 MB |
|
16.2 MB |
41. Implementation of Configuration Management Plan - Goals.mp4 |
12.0 MB |
|
4.9 MB |
|
7.2 MB |
|
9.6 MB |
|
8.5 MB |
|
6.1 MB |
/.../8. Participate in Security Awareness and Training/ |
|
|
12.9 MB |
|
22.5 MB |
|
31.2 MB |
|
17.2 MB |
|
7.7 MB |
|
13.5 MB |
|
5.6 MB |
/.../9. Participate in Physical Security Operations/ |
|
|
5.8 MB |
|
6.6 MB |
|
11.2 MB |
|
9.6 MB |
|
14.5 MB |
|
10.0 MB |
|
7.1 MB |
|
7.7 MB |
/SSCP® - Security Operations and Administration/ |
|
|
6.0 MB |
/1. Introduction/ |
|
|
10.1 MB |
/.../2. Identify and Analyze Malicious Code and Activity/ |
|
|
3.4 MB |
|
44.4 MB |
|
25.7 MB |
|
15.1 MB |
|
16.5 MB |
|
2.7 MB |
/.../3. Implement and Operate Endpoint Device Security/ |
|
|
2.3 MB |
|
9.4 MB |
|
6.7 MB |
|
5.0 MB |
|
10.2 MB |
|
16.9 MB |
|
7.3 MB |
|
4.3 MB |
/.../4. Operate and Configure Cloud Security/ |
|
|
4.8 MB |
|
14.7 MB |
|
16.6 MB |
|
4.9 MB |
|
4.0 MB |
|
7.8 MB |
|
5.2 MB |
|
8.3 MB |
|
4.4 MB |
/.../5. Secure Big Data Systems/ |
|
|
3.6 MB |
|
4.5 MB |
|
4.7 MB |
|
8.1 MB |
|
2.4 MB |
/.../6. Operate and Secure Virtual Environments/ |
|
|
2.8 MB |
|
6.8 MB |
|
5.5 MB |
|
3.1 MB |
|
5.3 MB |
|
5.8 MB |
|
2.2 MB |
/SSCP® - Systems and Application Security/ |
|
|
3.9 MB |
/1. Course Overview/ |
|
|
5.7 MB |
/.../2. Integrating Hosts, Storage, Networks, and Applications/ |
|
|
16.2 MB |
|
4.0 MB |
|
8.9 MB |
|
3.2 MB |
06. In-house Developed vs. Commercial vs. Commercial Customized.mp4 |
4.7 MB |
|
12.7 MB |
|
7.6 MB |
|
5.3 MB |
10. Data Isolation and Users, Servers, and Virtual Devices .mp4 |
4.9 MB |
11. Logical, Physical, and Secure Infrastructure Design Documents.mp4 |
7.1 MB |
|
3.9 MB |
|
10.3 MB |
|
8.0 MB |
/.../3. Integrating Advanced Authentication & Authorization Technologies/ |
|
|
1.8 MB |
|
5.6 MB |
|
3.2 MB |
|
2.3 MB |
|
4.9 MB |
|
4.3 MB |
|
6.2 MB |
|
3.4 MB |
|
3.2 MB |
|
4.6 MB |
|
4.3 MB |
|
11.3 MB |
/Technical Integration of Enterprise Components for CASP (CAS-002)/ |
|
technical-integration-enterprise-components-casp-cas-002.zip |
4.1 MB |
/1. Course Overview/ |
|
|
5.0 MB |
/.../2. Here's Why We Need to Talk About Security/ |
|
|
5.0 MB |
|
12.0 MB |
|
15.5 MB |
|
12.8 MB |
|
3.0 MB |
/.../3. The Soft Center Within Our Networks/ |
|
|
3.3 MB |
|
8.6 MB |
|
9.9 MB |
|
12.1 MB |
|
2.4 MB |
/.../4. The Security Lies We Tell Ourselves/ |
|
|
3.0 MB |
|
17.1 MB |
|
8.5 MB |
15. Open Source Is More Secure (and Other Infosec Fairytales).mp4 |
6.4 MB |
|
2.5 MB |
/.../5. The Problems (and Solutions) with Mobile Devices/ |
|
|
3.3 MB |
|
18.0 MB |
|
15.5 MB |
|
5.0 MB |
|
3.3 MB |
/.../6. What People Just Don't Understand About the Web/ |
|
|
5.5 MB |
|
14.1 MB |
24. The Things People Connect to the Internet (and How to Find Them).mp4 |
27.8 MB |
|
49.2 MB |
|
3.8 MB |
/.../7. The Painful Truths About Passwords and Authentication/ |
|
|
4.2 MB |
|
16.7 MB |
|
14.8 MB |
|
7.3 MB |
|
2.8 MB |
/The Information Security Big Picture/ |
|
|
4.4 MB |
/1. Course Overview/ |
|
|
5.1 MB |
/.../2. It's All About Control/ |
|
|
14.8 MB |
|
3.7 MB |
|
3.2 MB |
|
3.7 MB |
|
6.5 MB |
|
3.9 MB |
|
2.3 MB |
|
4.0 MB |
|
2.2 MB |
|
2.2 MB |
/.../3. Managing Your Secret Identity/ |
|
|
791.4 KB |
|
9.5 MB |
|
5.6 MB |
|
5.8 MB |
|
1.1 MB |
/.../4. Other Authentication Methods/ |
|
|
1.7 MB |
|
3.7 MB |
|
9.9 MB |
|
6.1 MB |
|
10.3 MB |
|
8.1 MB |
|
1.5 MB |
/5. Identity Repositories/ |
|
|
1.3 MB |
|
6.0 MB |
|
4.4 MB |
|
4.4 MB |
|
3.6 MB |
|
2.6 MB |
|
5.0 MB |
|
7.5 MB |
|
3.5 MB |
/.../6. Building the Lab/ |
|
|
2.3 MB |
|
10.2 MB |
|
30.3 MB |
|
12.4 MB |
|
6.0 MB |
|
26.1 MB |
|
40.8 MB |
|
2.3 MB |
/.../7. Let's Look at the Exploits/ |
|
|
1.3 MB |
|
2.7 MB |
|
44.8 MB |
|
1.2 MB |
|
7.7 MB |
|
1.5 MB |
|
51.4 MB |
|
2.0 MB |
|
7.1 MB |
|
3.1 MB |
/The Issues of Identity and Access Management (IAM)/ |
|
|
11.3 MB |
/1. Course Overview/ |
|
|
2.8 MB |
/.../2. The Current Threat Landscape/ |
|
|
4.8 MB |
|
2.5 MB |
|
5.4 MB |
|
13.5 MB |
|
5.8 MB |
|
4.5 MB |
|
1.0 MB |
/.../3. Threat Intelligence Methodologies/ |
|
|
1.2 MB |
|
1.4 MB |
|
2.0 MB |
|
3.5 MB |
|
10.4 MB |
|
6.1 MB |
|
3.4 MB |
|
5.2 MB |
|
784.3 KB |
/.../4. Sharing and Ingesting Intelligence/ |
|
|
2.5 MB |
|
3.9 MB |
|
7.0 MB |
|
12.5 MB |
|
7.5 MB |
|
2.8 MB |
|
4.3 MB |
|
1.9 MB |
/.../5. Searching for Indicators of Compromise/ |
|
|
2.2 MB |
|
1.9 MB |
|
3.4 MB |
|
5.3 MB |
|
2.3 MB |
|
6.6 MB |
|
1.8 MB |
/.../6. Doing Threat Intelligence Right/ |
|
|
3.0 MB |
|
6.4 MB |
|
2.4 MB |
|
3.7 MB |
|
2.4 MB |
|
5.0 MB |
|
4.2 MB |
/Threat Intelligence - The Big Picture/ |
|
|
3.1 MB |
/1. Course Overview/ |
|
|
2.9 MB |
/.../2. The Power of Threat Modeling/ |
|
|
2.5 MB |
|
4.4 MB |
|
6.7 MB |
|
4.7 MB |
|
3.9 MB |
|
2.9 MB |
/.../3. Tools of the Trade/ |
|
|
1.2 MB |
|
6.0 MB |
|
6.0 MB |
|
2.6 MB |
|
933.4 KB |
/.../4. Improving Application Security with Threat Modeling/ |
|
|
2.1 MB |
|
1.2 MB |
|
8.8 MB |
|
8.6 MB |
|
5.0 MB |
|
4.3 MB |
|
1.8 MB |
/.../5. Threat Modeling for Hackers/ |
|
|
1.0 MB |
|
1.2 MB |
|
8.6 MB |
|
1.8 MB |
|
939.7 KB |
/6. Expected Challenges/ |
|
|
795.4 KB |
|
1.6 MB |
|
15.9 MB |
|
1.8 MB |
/Threat Modeling - The Big Picture/ |
|
|
1.9 MB |
/1. Course Overview/ |
|
|
3.9 MB |
/.../2. Threat Modeling, the What, Why, Who, and When/ |
|
|
2.9 MB |
|
5.5 MB |
|
5.5 MB |
|
2.7 MB |
|
2.0 MB |
|
1.8 MB |
/.../3. Choosing the Right Approach/ |
|
|
4.3 MB |
|
5.4 MB |
|
5.8 MB |
|
6.0 MB |
|
3.4 MB |
/.../4. Choosing the Right Methodology/ |
|
|
3.3 MB |
|
8.6 MB |
|
7.0 MB |
|
8.1 MB |
|
4.0 MB |
|
2.2 MB |
|
2.9 MB |
/.../5. Threat Modeling in Practice/ |
|
|
8.0 MB |
|
3.4 MB |
|
18.8 MB |
|
4.1 MB |
|
10.5 MB |
|
5.1 MB |
|
2.5 MB |
/.../6. Improving Threat Modeling/ |
|
|
1.6 MB |
|
6.3 MB |
|
7.6 MB |
|
5.5 MB |
|
3.7 MB |
/Threat Modeling Fundamentals/ |
|
|
2.1 MB |
/1. Introduction/ |
|
|
2.0 MB |
|
5.6 MB |
|
4.1 MB |
|
5.2 MB |
|
10.4 MB |
/.../2. Running Code Securely/ |
|
|
4.5 MB |
|
12.8 MB |
|
7.5 MB |
|
14.4 MB |
|
1.8 MB |
11. Demonstrating Replacing and Augmenting Default Policy.mp4 |
11.0 MB |
|
5.4 MB |
|
13.2 MB |
|
4.6 MB |
|
8.6 MB |
|
1.5 MB |
|
13.7 MB |
|
5.3 MB |
|
11.0 MB |
|
599.8 KB |
/3. Privileged Scopes/ |
|
|
3.3 MB |
|
9.8 MB |
|
10.4 MB |
|
792.3 KB |
/Understanding the Java Virtual Machine - Security/ |
|
|
441.3 KB |
/1. Introduction/ |
|
|
6.1 MB |
|
5.1 MB |
|
5.8 MB |
|
9.3 MB |
/2. Exploiting Shellshock/ |
|
|
6.1 MB |
|
8.4 MB |
/.../3. Defending Against Shellshock/ |
|
|
4.7 MB |
|
3.6 MB |
|
2.3 MB |
/4. Summary/ |
|
|
14.1 MB |
|
5.2 MB |
/Understanding the Shellshock Bash Bug/ |
|
|
916.2 KB |
/1. Course Overview/ |
|
|
8.7 MB |
/.../2. Introduction to FTDI VNC2/ |
|
02. Introduction to Course and FTDI Vinculum II Microcontroller.mp4 |
5.3 MB |
|
21.4 MB |
|
21.0 MB |
|
15.7 MB |
|
11.7 MB |
/.../3. Building a Basic Duplicator/ |
|
|
7.5 MB |
|
16.5 MB |
|
21.7 MB |
|
22.6 MB |
/.../4. Enhancing Performance and Usability/ |
|
|
6.4 MB |
|
7.4 MB |
|
24.5 MB |
|
23.8 MB |
|
42.6 MB |
|
21.2 MB |
/USB Forensics - Duplication/ |
|
|
3.7 MB |
/1. Getting Started/ |
|
|
8.5 MB |
|
15.7 MB |
|
12.8 MB |
|
15.6 MB |
|
13.2 MB |
|
27.5 MB |
/.../2. Endpoints, Classes, and Commands/ |
|
|
5.5 MB |
|
25.0 MB |
|
16.6 MB |
|
12.4 MB |
|
12.6 MB |
/.../3. Hosts and Hubs/ |
|
|
10.1 MB |
|
12.6 MB |
/.../4. USB Mass Storage Descriptors, Endpoints, and Device Presentation/ |
|
|
3.5 MB |
|
34.1 MB |
|
8.0 MB |
17. USB Mass Storage Device Presentation Demo and Summary.mp4 |
20.3 MB |
/.../5. USB Mass Storage Communication and Windows Specific Behavior/ |
|
|
4.5 MB |
|
6.1 MB |
20. SCSI Commands and USB Mass Storage Communication Phases.mp4 |
12.2 MB |
|
35.7 MB |
|
11.3 MB |
/.../6. USB Human Interface Devices/ |
|
|
4.0 MB |
|
5.5 MB |
|
16.3 MB |
|
17.0 MB |
/USB Forensics - Fundamentals/ |
|
|
1.0 MB |
/1. Course Overview/ |
|
|
5.5 MB |
/.../2. Software Write Blocking with Udev Rules/ |
|
|
11.2 MB |
|
21.7 MB |
|
18.0 MB |
|
23.7 MB |
/.../3. Hardware Write Blocker Based on VNC2/ |
|
|
17.8 MB |
|
30.9 MB |
|
47.0 MB |
|
13.9 MB |
|
17.6 MB |
/4. USB Impersonation/ |
|
|
24.4 MB |
|
31.4 MB |
|
8.8 MB |
/USB Forensics - Writeblocking and Impersonation/ |
|
|
4.4 MB |
/1. Course Overview/ |
|
|
10.0 MB |
/2. Introduction/ |
|
|
5.6 MB |
/3. Google Caching/ |
|
|
796.5 KB |
|
946.4 KB |
|
2.8 MB |
|
5.1 MB |
|
1.3 MB |
|
1.1 MB |
/.../4. Cacheable HTTPS Responses/ |
|
|
902.4 KB |
|
2.9 MB |
|
15.7 MB |
|
839.7 KB |
|
1.1 MB |
/.../5. Caching of Credit Card Data/ |
|
|
940.2 KB |
|
2.6 MB |
|
3.1 MB |
|
1.6 MB |
|
1.1 MB |
/.../6. Sensitive Data in the URL/ |
|
|
672.1 KB |
|
1.3 MB |
|
5.1 MB |
|
897.3 KB |
|
961.4 KB |
/.../7. Industry Best Practices/ |
|
|
1.0 MB |
|
2.3 MB |
|
9.4 MB |
|
974.6 KB |
/8. Summary/ |
|
|
6.6 MB |
/Web App Hacking - Caching Problems/ |
|
|
2.2 MB |
/1. Course Overview/ |
|
|
3.9 MB |
/2. Introduction/ |
|
|
9.7 MB |
/.../3. Leakage of Cookie with Sensitive Data/ |
|
|
1.2 MB |
|
412.7 KB |
|
629.6 KB |
|
13.7 MB |
|
993.6 KB |
/4. Cookie Hijacking/ |
|
|
907.7 KB |
|
1.2 MB |
|
651.6 KB |
|
17.1 MB |
|
655.6 KB |
/.../5. Weaknesses in Cookie Lifecycle/ |
|
|
1.5 MB |
|
3.7 MB |
|
6.5 MB |
|
2.2 MB |
|
7.2 MB |
|
1.2 MB |
/.../6. Underestimated Risk - XSS via Cookie/ |
|
|
1.3 MB |
|
2.2 MB |
|
2.3 MB |
|
8.4 MB |
|
4.2 MB |
|
1.1 MB |
/.../7. Remote Cookie Tampering/ |
|
|
788.3 KB |
|
891.3 KB |
|
1.8 MB |
|
8.5 MB |
|
1.5 MB |
|
731.8 KB |
/8. Summary/ |
|
|
5.8 MB |
/Web App Hacking - Cookie Attacks/ |
|
|
2.2 MB |
/1. Course Overview/ |
|
|
4.5 MB |
/2. Introduction/ |
|
|
4.6 MB |
/3. SQL Injection/ |
|
|
758.6 KB |
|
7.1 MB |
|
4.8 MB |
|
2.9 MB |
|
723.6 KB |
/4. Dictionary Attack/ |
|
|
546.6 KB |
|
2.9 MB |
|
5.7 MB |
|
13.0 MB |
|
2.4 MB |
|
708.1 KB |
/5. HTTPS Enforcement/ |
|
|
809.0 KB |
|
974.2 KB |
|
3.4 MB |
|
5.3 MB |
|
1.2 MB |
/6. Session Regeneration/ |
|
|
705.7 KB |
|
6.0 MB |
|
6.4 MB |
|
1.2 MB |
/7. User Enumeration/ |
|
|
537.7 KB |
|
1.6 MB |
|
1.5 MB |
|
859.9 KB |
|
608.4 KB |
/.../8. Industry Best Practices/ |
|
|
560.1 KB |
|
1.9 MB |
|
2.8 MB |
|
1.4 MB |
/9. Summary/ |
|
|
5.9 MB |
/Web App Hacking - Hacking Authentication/ |
|
|
2.2 MB |
/1. Course Overview/ |
|
|
4.8 MB |
/2. Introduction/ |
|
|
14.2 MB |
/.../3. Leakage of Password Reset Link/ |
|
|
609.0 KB |
|
1.6 MB |
|
3.0 MB |
|
7.2 MB |
|
778.0 KB |
|
677.0 KB |
/.../4. Insecure Direct Object Reference/ |
|
|
904.9 KB |
|
2.1 MB |
|
2.4 MB |
|
3.5 MB |
|
2.4 MB |
|
1.3 MB |
/.../5. Insecure Session Management/ |
|
|
629.4 KB |
|
4.0 MB |
|
5.5 MB |
|
3.0 MB |
|
3.2 MB |
|
891.7 KB |
/.../6. Weaknesses in Lifecycle of Password Reset Link/ |
|
|
631.5 KB |
|
2.9 MB |
|
5.1 MB |
|
2.4 MB |
|
3.5 MB |
|
716.3 KB |
/7. User Enumeration/ |
|
|
495.5 KB |
|
2.2 MB |
|
2.0 MB |
|
1.2 MB |
|
892.5 KB |
/8. Summary/ |
|
|
6.5 MB |
/Web App Hacking - Hacking Password Reset Functionality/ |
|
|
1.0 MB |
/1. Course Overview/ |
|
|
5.1 MB |
/10. Summary/ |
|
|
7.6 MB |
/2. Introduction/ |
|
|
7.2 MB |
/.../3. Insecure Error Handling/ |
|
|
647.3 KB |
|
1.2 MB |
|
1.2 MB |
|
7.9 MB |
|
773.0 KB |
/.../4. Disclosure of Sensitive Files/ |
|
|
697.5 KB |
|
2.8 MB |
|
1.6 MB |
|
3.1 MB |
|
949.7 KB |
/.../5. Information Disclosure via Metadata/ |
|
|
497.0 KB |
|
1.3 MB |
|
3.1 MB |
|
4.1 MB |
|
616.2 KB |
/.../6. Underestimated Risk - Disclosure of Software Version/ |
|
|
1.1 MB |
|
1.5 MB |
|
2.6 MB |
|
18.0 MB |
|
1.1 MB |
/.../7. Insecure Communication Channel/ |
|
|
745.7 KB |
|
524.5 KB |
|
3.0 MB |
|
981.0 KB |
|
3.3 MB |
|
7.3 MB |
|
811.9 KB |
/.../8. Leakage of Cookie with Sensitive Data/ |
|
|
1.1 MB |
|
3.3 MB |
|
2.0 MB |
|
939.3 KB |
|
16.9 MB |
|
1.5 MB |
/.../9. Leakage of Sensitive Data via Referer Header/ |
|
|
1.5 MB |
|
2.1 MB |
|
2.9 MB |
|
6.8 MB |
|
800.9 KB |
|
1.0 MB |
/Web App Hacking - Sensitive Data Exposure/ |
|
|
3.4 MB |
/1. Course Overview/ |
|
|
4.4 MB |
/10. Summary/ |
|
|
17.7 MB |
|
5.6 MB |
/.../2. The Principles of a Web Application Penetration Test/ |
|
|
4.0 MB |
|
6.4 MB |
|
20.9 MB |
|
5.3 MB |
|
2.6 MB |
/3. Pre-engagement/ |
|
|
9.7 MB |
|
6.7 MB |
|
5.6 MB |
/4. Footprinting/ |
|
|
10.6 MB |
|
26.0 MB |
|
15.5 MB |
|
7.2 MB |
|
9.6 MB |
/.../5. Attacking User Controls/ |
|
|
16.4 MB |
|
12.0 MB |
|
8.2 MB |
/.../6. Attacking Application Inputs/ |
|
|
4.3 MB |
|
7.1 MB |
|
1.9 MB |
/.../7. Common Attack Methods/ |
|
|
13.5 MB |
|
11.2 MB |
|
8.6 MB |
|
4.9 MB |
|
6.7 MB |
/.../8. Discovering Logic Flaws/ |
|
|
8.7 MB |
|
4.9 MB |
|
5.1 MB |
|
3.0 MB |
|
5.1 MB |
/9. Reporting/ |
|
|
7.0 MB |
|
11.9 MB |
/Web Application Penetration Testing Fundamentals/ |
|
|
7.9 MB |
/1. Course Overview/ |
|
|
5.3 MB |
/.../2. Setting up Your Burp Suite Environment/ |
|
|
10.7 MB |
|
7.8 MB |
|
8.1 MB |
|
24.1 MB |
|
9.1 MB |
|
6.4 MB |
|
10.3 MB |
/.../3. Spidering Your Web Application/ |
|
|
5.4 MB |
|
10.8 MB |
|
14.3 MB |
|
25.0 MB |
|
6.4 MB |
|
25.2 MB |
/.../4. Scanning Your Web Application/ |
|
|
12.5 MB |
|
13.0 MB |
|
6.5 MB |
|
21.1 MB |
|
7.1 MB |
/.../5. Digging Deeper into Your Results/ |
|
|
10.0 MB |
|
15.6 MB |
|
6.1 MB |
|
19.3 MB |
|
11.7 MB |
|
5.3 MB |
|
13.2 MB |
/.../6. Documenting Your Findings/ |
|
|
15.2 MB |
|
9.1 MB |
|
11.9 MB |
/Web Application Penetration Testing with Burp Suite/ |
|
|
4.8 MB |
/1. Introduction/ |
|
|
18.7 MB |
/.../10. Using Components with Known Vulnerabilities/ |
|
|
5.8 MB |
|
5.0 MB |
|
6.6 MB |
|
5.6 MB |
/.../11. Unvalidated Redirects and Forwards/ |
|
|
5.1 MB |
|
5.2 MB |
|
5.2 MB |
|
9.2 MB |
/2. Injection/ |
|
|
8.5 MB |
|
5.0 MB |
|
10.5 MB |
|
6.0 MB |
/.../3. Broken Authentication and Session Management/ |
|
|
5.8 MB |
|
9.5 MB |
|
11.1 MB |
|
4.2 MB |
/.../4. Cross-Site Scripting (XSS)/ |
|
|
11.2 MB |
|
4.1 MB |
|
6.2 MB |
|
12.9 MB |
/.../5. Insecure Direct Object References/ |
|
|
5.5 MB |
|
4.7 MB |
|
12.2 MB |
|
4.7 MB |
/6. Security Misconfiguration/ |
|
|
4.1 MB |
|
7.5 MB |
|
7.5 MB |
|
5.5 MB |
/.../7. Sensitive Data Exposure/ |
|
|
4.9 MB |
|
9.1 MB |
|
7.5 MB |
|
6.2 MB |
/.../8. Missing Function Level Access Control/ |
|
|
6.3 MB |
|
7.7 MB |
|
10.1 MB |
|
7.5 MB |
/.../9. Cross-Site Request Forgery (CSRF)/ |
|
|
6.5 MB |
|
5.4 MB |
|
8.5 MB |
|
7.1 MB |
/Web Security and the OWASP Top 10 - The Big Picture/ |
|
|
4.3 MB |
/1. Introduction/ |
|
|
6.2 MB |
|
9.2 MB |
|
10.1 MB |
|
9.2 MB |
05. Summary - It’s All Still Web App Sec, It’s All Still Good!.mp4 |
6.6 MB |
/.../2. Understanding the Risk Assessment/ |
|
|
3.5 MB |
|
3.6 MB |
|
7.7 MB |
|
8.7 MB |
|
10.0 MB |
|
10.0 MB |
|
9.9 MB |
|
6.9 MB |
|
4.3 MB |
|
8.7 MB |
|
6.1 MB |
/.../3. What's Changed in the Top 10#/ |
|
|
2.4 MB |
|
3.9 MB |
|
6.6 MB |
|
6.1 MB |
|
5.4 MB |
|
5.5 MB |
|
4.8 MB |
|
6.0 MB |
|
3.9 MB |
|
5.5 MB |
|
4.2 MB |
|
7.4 MB |
/.../4. Additional Risks to Consider/ |
|
|
4.4 MB |
|
7.9 MB |
|
7.4 MB |
|
8.2 MB |
/What's New in the OWASP Top 10 for 2013/ |
|
|
1.4 MB |
/1. Course Overview/ |
|
|
4.3 MB |
/2. Introduction/ |
|
|
6.7 MB |
/.../3. Acquiring Local Administrative Rights/ |
|
|
7.2 MB |
|
24.7 MB |
|
4.6 MB |
/.../4. Beating Permissions with Privileges/ |
|
|
13.7 MB |
|
33.6 MB |
|
2.7 MB |
|
30.7 MB |
|
986.5 KB |
/.../5. Bypassing Company Group Policies/ |
|
|
1.7 MB |
|
16.5 MB |
|
2.4 MB |
|
12.4 MB |
|
813.3 KB |
|
4.7 MB |
|
654.9 KB |
/.../6. Elevating Your Rights to Domain Admin/ |
|
|
2.6 MB |
|
12.6 MB |
|
1.9 MB |
/.../7. Using Pass-the-hash and Pass-the-ticket Attacks/ |
|
|
6.3 MB |
|
13.7 MB |
|
8.4 MB |
|
5.7 MB |
|
3.2 MB |
/8. Bypassing BitLocker/ |
|
|
4.4 MB |
27. Demo - Bypassing BitLocker with Social Engineering and PowerPoint.mp4 |
16.3 MB |
|
7.6 MB |
/Windows - How It's Hacked, How to Protect It/ |
|
|
3.1 MB |
/1. Course Overview/ |
|
|
3.4 MB |
/.../2. Introduction and Wireless Penetration Test Process Overview/ |
|
|
4.1 MB |
|
4.6 MB |
|
3.1 MB |
/3. Information Gathering/ |
|
|
2.0 MB |
|
3.6 MB |
|
3.1 MB |
|
6.9 MB |
|
9.6 MB |
/.../4. Identifying and Exploiting Vulnerabilities/ |
|
|
17.9 MB |
|
7.2 MB |
|
18.1 MB |
|
13.1 MB |
|
13.8 MB |
|
4.1 MB |
/5. Reporting/ |
|
|
1.7 MB |
|
4.1 MB |
|
9.0 MB |
/Wireless Network Penetration Testing/ |
|
|
655.0 KB |
/1. Course Overview/ |
|
|
7.4 MB |
/.../2. An Advanced Approach to Wireless Penetration Testing/ |
|
|
6.6 MB |
|
3.7 MB |
/.../3. Preparing for the Tests/ |
|
|
1.2 MB |
|
5.2 MB |
|
7.8 MB |
/.../4. Advanced Penetration Testing Techniques – Non-disruptive Attacks/ |
|
|
971.0 KB |
|
22.1 MB |
|
6.8 MB |
|
15.8 MB |
|
2.0 MB |
|
23.2 MB |
/.../5. Advanced Penetration Testing Techniques – Disruptive Attacks/ |
|
|
2.9 MB |
|
12.3 MB |
|
4.6 MB |
|
17.4 MB |
/.../6. Covering Your Traces/ |
|
|
3.2 MB |
|
6.9 MB |
|
3.2 MB |
|
7.6 MB |
/Wireless Network Penetration Testing Advanced Techniques/ |
|
wireless-network-penetration-testing-advanced-techniques.zip |
1.0 MB |
Total files 8423 |
Copyright © 2024 FileMood.com