RAR-files |
linkedin.learning.threat.modeling.denial.of.service.and.elevation.of.privilege-xqzt.rar |
50,000,000 |
AD0E17FF |
linkedin.learning.threat.modeling.denial.of.service.and.elevation.of.privilege-xqzt.r00 |
50,000,000 |
5CCE861A |
linkedin.learning.threat.modeling.denial.of.service.and.elevation.of.privilege-xqzt.r01 |
50,000,000 |
720EB3AF |
linkedin.learning.threat.modeling.denial.of.service.and.elevation.of.privilege-xqzt.r02 |
50,000,000 |
6AAD910A |
linkedin.learning.threat.modeling.denial.of.service.and.elevation.of.privilege-xqzt.r03 |
1,620,850 |
3D0FFA7B |
|
Total size: |
201,620,850 |
|
|
Archived
files |
01.01-let_me_interrupt_you.mkv
[6561a651a77d0c6a]
|
6,800,860 |
37A22278 |
01.02-stride_and_the_four_question_framework.mkv
[998d22c71a998aaf]
|
6,770,861 |
C475168F |
02.01-dos_in_context.mkv
[1dae065be9f2ecda]
|
5,948,506 |
9A85DE0E |
02.02-attackers_fill_networks.mkv
[bc9f4fa3d7ffdb20]
|
5,983,814 |
B081D045 |
02.03-how_attackers_redline_your_cpu.mkv
[ed42bc61f4c95c8a]
|
10,539,232 |
DB4A3C75 |
02.04-how_attackers_fill_storage.mkv
[ff4a58e18f289d84]
|
7,803,619 |
842A64CF |
02.05-how_attackers_spend_your_budget.mkv
[b0f30fcec8d1efab]
|
4,921,930 |
9CCFC100 |
02.06-how_attackers_drain_your_battery.mkv
[69aa46eea269d69c]
|
6,561,945 |
89252315 |
03.01-persistence_and_transience_of_dos.mkv
[4a39ab38da9daf58]
|
5,380,727 |
B603B9A2 |
03.02-naive_to_clever_understanding_dos.mkv
[f1e03ab4901c7c25]
|
10,796,839 |
7A610A3F |
03.03-amplified_or_native_two_modes_of_dos.mkv
[c0dd7cc53762e70d]
|
8,343,776 |
0A91E07F |
04.01-mobile_and_iot_denial_of_service.mkv
[d3b934c6e5f9d336]
|
6,897,392 |
C7A16FF5 |
04.02-cloud_denial_of_service.mkv
[607706e72fa5a11d]
|
5,505,332 |
6BC7A43E |
05.01-designing_for_resilience.mkv
[b7b2d18245ccb95b]
|
7,685,050 |
D6955AE0 |
05.02-quantity_as_a_defense.mkv
[f48036fd21814303]
|
4,192,539 |
3989188A |
06.01-what_is_elevation_of_privilege.mkv
[f2240340ccd5d83e]
|
6,121,784 |
07368F45 |
06.02-input_corrupts.mkv
[b803920636ca8283]
|
5,150,789 |
A1E70E41 |
06.03-main_forms_of_corrupt_input.mkv
[d0ad8f037f70f2aa]
|
13,288,238 |
E55C6A4E |
07.01-ways_to_defend_against_eop.mkv
[e4c80e95fd87aa7d]
|
3,930,025 |
A0B75241 |
07.02-validation_to_defend_against_elevation.mkv
[a0c47a65d970a160]
|
6,314,479 |
2C5D47C9 |
07.03-validate_for_purpose_to_prevent_elevations.mkv
[cafbe8f029879490]
|
8,725,030 |
B4ADD422 |
07.04-validation_not_sanitization_for_defense.mkv
[ad0b9497c9ddef5e]
|
6,963,228 |
2D10F962 |
07.05-attenuation_in_defense.mkv
[2e123d7a46b8b18]
|
8,593,143 |
807DB979 |
07.06-memory_safety_as_a_defensive_tool.mkv
[b90f93317043035d]
|
10,108,643 |
E4F1A95F |
07.07-stack_canaries_to_protect_your_code.mkv
[46e99a50332830ca]
|
8,770,559 |
83B97653 |
07.08-sandboxes_and_isolation_protect_your_environment.mkv
[8aca388c863cc598]
|
5,135,608 |
50B023B3 |
07.09-bolt-on_or_built-in_defenses.mkv
[33419e927c7cbb51]
|
6,387,936 |
A5781349 |
08.01-making_great_strides.mkv
[c126ea05b266c6ae]
|
7,996,332 |
71D5F150 |
|
Total size: |
201,618,216 |
|
|