RAR-files |
ilearn-csbacc.rar |
50,000,000 |
E20EAD6B |
ilearn-csbacc.r00 |
50,000,000 |
F646DE15 |
ilearn-csbacc.r01 |
50,000,000 |
6CA9590F |
ilearn-csbacc.r02 |
50,000,000 |
F12928E8 |
ilearn-csbacc.r03 |
50,000,000 |
F750C5DA |
ilearn-csbacc.r04 |
50,000,000 |
E043E401 |
ilearn-csbacc.r05 |
50,000,000 |
234E628F |
ilearn-csbacc.r06 |
50,000,000 |
7BD8D02D |
ilearn-csbacc.r07 |
50,000,000 |
C10B0CDD |
ilearn-csbacc.r08 |
50,000,000 |
36385C57 |
ilearn-csbacc.r09 |
50,000,000 |
6E3CB196 |
ilearn-csbacc.r10 |
50,000,000 |
21E9F9AF |
ilearn-csbacc.r11 |
50,000,000 |
F12E4D77 |
ilearn-csbacc.r12 |
50,000,000 |
83893D2C |
ilearn-csbacc.r13 |
50,000,000 |
F7E4755E |
ilearn-csbacc.r14 |
50,000,000 |
2F290937 |
ilearn-csbacc.r15 |
50,000,000 |
59129F5D |
ilearn-csbacc.r16 |
50,000,000 |
091A36A0 |
ilearn-csbacc.r17 |
50,000,000 |
2C1CBFF6 |
ilearn-csbacc.r18 |
50,000,000 |
327EE0BD |
ilearn-csbacc.r19 |
50,000,000 |
1082BE35 |
ilearn-csbacc.r20 |
50,000,000 |
56D72DD8 |
ilearn-csbacc.r21 |
50,000,000 |
6796BF6F |
ilearn-csbacc.r22 |
50,000,000 |
2683AD73 |
ilearn-csbacc.r23 |
50,000,000 |
287473C2 |
ilearn-csbacc.r24 |
50,000,000 |
1440DBB1 |
ilearn-csbacc.r25 |
50,000,000 |
FAD8B996 |
ilearn-csbacc.r26 |
50,000,000 |
99B69043 |
ilearn-csbacc.r27 |
50,000,000 |
EB5A58D5 |
ilearn-csbacc.r28 |
50,000,000 |
37C4AB46 |
ilearn-csbacc.r29 |
50,000,000 |
19930284 |
ilearn-csbacc.r30 |
50,000,000 |
97C07F49 |
ilearn-csbacc.r31 |
50,000,000 |
48B2D996 |
ilearn-csbacc.r32 |
50,000,000 |
A5CFBAB3 |
ilearn-csbacc.r33 |
50,000,000 |
23825285 |
ilearn-csbacc.r34 |
50,000,000 |
10DA0831 |
ilearn-csbacc.r35 |
17,411,980 |
8EE62BFA |
|
Total size: |
1,817,411,980 |
|
|
Archived
files |
3. SECURITY SKILLS - COMMAND LINE - CODE - TCP-IP.mp4
[c8eab1bbc541678c]
|
11,208,404 |
68D95167 |
4. TYPICAL SECURITY MODEL - SECURITY POSTURE - SECURITY POLICY.mp4
[24e08902c6e5e34f]
|
9,784,218 |
78A31F49 |
5. NETWORK PROTOCOLS - TRANSPORT PROTOCOLS.mp4
[ea76c1635fae16d]
|
11,202,859 |
7CD610CF |
6. FLOW OF DATA.mp4
[680f56f70d118ab0]
|
11,895,074 |
EA427652 |
7. UNIX AND LINUX.mp4
[92fca649f9f213bd]
|
12,804,382 |
892462BB |
8. VIRTUALIZATION.mp4
[3b60c500e0d62eed]
|
19,912,179 |
6FC415E5 |
9. QUESTIONS.mp4
[4ebecd45efd0c46f]
|
8,282,796 |
23BB00AF |
10. NETWORK PROTOCOLS.mp4
[a57f65b65065552f]
|
5,175,180 |
5D5A6373 |
11. ARP - ADDRESS RESOLUTION PROTOCOL.mp4
[16b1816a944e16c1]
|
4,740,234 |
32C05ABB |
12. DNS - DOMAIN NAME SYSTEM.mp4
[6cd9078ff202124e]
|
6,778,147 |
AA767430 |
13. TFTP - TRIVIAL FILE TRANSFER PROTOCOL.mp4
[20c2b2dd920234eb]
|
5,096,266 |
5CFE82FB |
14. TCP - TRANSMISSION CONTROL PROTOCOL.mp4
[51fbe47b78388b81]
|
9,466,484 |
B0BA88F0 |
15. TCP DATA FLOW.mp4
[71dac291ce627d2a]
|
9,274,128 |
F387B698 |
16. DEMO - WIRESHARK.mp4
[29209f2f1215c376]
|
151,425,212 |
ECB8BB44 |
17. QUESTIONS.mp4
[a5df6e5b2f7a39cc]
|
9,797,678 |
8E078487 |
18. TMI - GOOD AND THE BAD.mp4
[7fb8c2414a97f1f5]
|
12,050,736 |
4FFEBB8D |
19. THE BAD AND THE UGLY.mp4
[6c51499f8f47e6ff]
|
9,788,258 |
EAFFE749 |
20. VULNERABILITY MANAGEMENT.mp4
[12241a7d6f4ecfe1]
|
5,473,035 |
0055E269 |
21. INGRESS - EGRESS FILTERING.mp4
[4691b57d5708d2d1]
|
7,792,813 |
370AF715 |
22. SECURE NETWORK ARCHITECTURES.mp4
[f711b98f2cc7d3e0]
|
52,262,822 |
7B3C69A0 |
23. DEMO AND QUESTIONS.mp4
[dec5dc67f0f82f2a]
|
14,321,526 |
48DE7234 |
24. VULNERABILITY SITES - LAB - VIRTUAL MACHINES.mp4
[995ef724343dc1da]
|
13,410,425 |
65356C24 |
25. VIRTUAL MACHINE CREATION - COMPONENTS OF VIRTUAL NETWORK.mp4
[67382608b2acf42]
|
11,377,454 |
2394DC5C |
26. MORE COMPONENTS.mp4
[44f9ee149e72f8a3]
|
10,415,347 |
235DFE6F |
27. NETWORK SECURITY TOOLKIT - FOLDERS - PLANNING.mp4
[629da8f5d0670b8d]
|
7,189,007 |
6443B4B1 |
28. VIRTUAL DESIGN - REPLAYING CAPTURED TRAFFIC.mp4
[8776590802761d57]
|
6,092,291 |
1AF42225 |
29. DEMO.mp4
[62b1adaa4bce9ff7]
|
101,331,832 |
52D7F018 |
30. PENETRATION TESTING UNVEILED.mp4
[8b34b2d85545dedb]
|
9,273,823 |
7C3F0928 |
31. SECURITY TESTING PLAN - ABSTRACT METHODOLOGY.mp4
[6e5bfe390b527761]
|
9,905,305 |
B58C82EE |
32. NON-INTRUSIVE.mp4
[637467ffdf45bf6e]
|
8,579,498 |
2CFB5C7C |
33. GOOGLE HACKING BASICS - INTRUSIVE - EXPLOIT.mp4
[99b63a68a8d31b3d]
|
12,786,640 |
EC1569BE |
34. PENTEST FRAMEWORK - SAMPLE ARCHITECTURE.mp4
[f50d22914dc8f567]
|
10,310,031 |
1DE568B6 |
35. DETAILED FINDINGS - CONCLUSION.mp4
[2ee0e2c0b19d626f]
|
8,249,744 |
FBE3199E |
36. DEMO.mp4
[87bce49856c7fba8]
|
95,872,351 |
6A50F8FE |
37. QUESTIONS.mp4
[6eaf88192414a264]
|
4,919,527 |
53BEE974 |
38. INTRUSION DETECTION.mp4
[b074152334d2bad]
|
11,066,754 |
1B858DDD |
39. FUNCTIONS OF IDS.mp4
[7335dbf9c0813ba4]
|
12,608,736 |
65B7BED1 |
40. UNDER ATTACK.mp4
[c3ae3383891f777a]
|
14,367,856 |
A1EA5194 |
41. STOP THE ATTACK - INTRUSION PREVENTION.mp4
[8d71546ba93dd915]
|
8,345,791 |
52132790 |
42. TYPES OF IPS.mp4
[4810d0db5e5bf0fc]
|
9,538,826 |
3D75BAB4 |
43. IDENTIFYING THE OS - METHODOLOGY OF NETWORK ANALYSIS.mp4
[1e3f14e7a89d081d]
|
7,484,671 |
278E5A9D |
44. DEMO.mp4
[1f2d97478d71b49d]
|
83,506,308 |
281EF1CC |
45. QUESTIONS.mp4
[b86c43e503417ced]
|
4,455,670 |
02F60BB9 |
46. FILTER - SESSION CONTENT - INTERFACE CUSTOMIZATION.mp4
[d3ee6fa148a24a72]
|
15,865,393 |
143F54A8 |
47. STATISTICS.mp4
[ce12c42fb7425002]
|
10,165,562 |
E11CD3A3 |
48. COMPUTER INCIDENTS.mp4
[ea0d4be7464da001]
|
6,397,778 |
9A9BB21F |
49. ESTABLISHING A COMPUTER FORENSIC METHODOLOGY I.mp4
[e991ca4059a1a0d7]
|
5,515,973 |
5B913A8E |
50. ESTABLISHING A COMPUTER FORENSIC METHODOLOGY II.mp4
[fe32bc1b48682987]
|
10,562,793 |
1E2AFE2F |
51. DEMO.mp4
[ae13e66e0e002461]
|
125,047,842 |
9D3FCF01 |
52. Building a Security Skills Foundation.mp4
[b89f55b1adba3e14]
|
95,742,658 |
CE4E7BB5 |
53. Leveraging Wireshark for Security.mp4
[721ab7b72b683b7f]
|
108,546,247 |
18420CE6 |
54. Essential Defensive Strategies.mp4
[b84d301f7dab7a75]
|
122,088,862 |
12DDCEE3 |
55. Building a Cyber Range - Part 1.mp4
[99ff11fbc9ead9e0]
|
48,200,903 |
F889B31B |
56. Building a Cyber Range - Part 2.mp4
[f614f73923a6e6cf]
|
35,253,465 |
8E452783 |
57. Penetration Testing.mp4
[d030cd5dfb15b11b]
|
107,777,461 |
98B1CC4B |
58. Intrusion Analysis.mp4
[98040d34dc7dc8fa]
|
105,631,890 |
D85B6F58 |
59. Intrusion Handling.mp4
[cc73f6120f71fe01]
|
87,789,350 |
FBFB9079 |
60. Take-aways.mp4
[632edcc51daa1a69]
|
55,575,453 |
713FFF9B |
1. Welcome!.mp4
[f996c23baaffc16a]
|
19,649,430 |
DCCE3264 |
2. Developing Security Skills - Skill Deficiencies.mp4
[695f0dd78a50b6a2]
|
7,972,537 |
54D56DC4 |
|
Total size: |
1,817,403,915 |
|
|