LA239

mp4   Hot:22   Size:13.2 GB   Created:2021-11-06 22:36:44   Update:2022-10-07 03:54:21  

Download link

File List

  • 001 - About the Author.mp4 22.6 MB
    002 - About the Course.mp4 80.93 MB
    003 - Course Requirements.mp4 55.88 MB
    004 - How to Get Help.mp4 71.28 MB
    005 - About the Exam.mp4 134.45 MB
    006 - Chapter Introduction.mp4 28.26 MB
    007 - Common Terms (Hack Value, Vulnerability, Exploit, Payload).mp4 62.08 MB
    008 - Zero Day Attack.mp4 64.18 MB
    009 - Daisy Chaining.mp4 86.32 MB
    010 - QUIZ SOLUTION: Overview of Information Security - Questions answered and explained.mp4 58.2 MB
    011 - Chapter Introduction.mp4 8.84 MB
    012 - Threats vs Attacks.mp4 28.72 MB
    013 - Motives and Reasons Behind Cyber Security Attacks.mp4 30.66 MB
    014 - What Are the Means by Which Hackers Gain Access to Systems and Networks?.mp4 12.31 MB
    015 - Cloud Computing Threats.mp4 75.23 MB
    016 - Advanced Presistent Threats.mp4 24.05 MB
    017 - Viruses and Worms.mp4 37.9 MB
    018 - Ransomware.mp4 60.23 MB
    019 - Mobile Threats.mp4 42.56 MB
    020 - Modern Age Information Warfare.mp4 53.15 MB
    021 - Insider Attacks.mp4 20.78 MB
    022 - Phishing.mp4 27.54 MB
    023 - Web Application Threats.mp4 28.54 MB
    024 - Classification of Threats: Network Threats.mp4 32.75 MB
    025 - Clasification of Threats: Host Threats.mp4 27.79 MB
    026 - Clasification of Threats: Application Threats.mp4 44.65 MB
    027 - Classification of Attacks.mp4 141.27 MB
    028 - Botnets.mp4 34.05 MB
    029 - Laws, Standards, and Regulations.mp4 132.79 MB
    030 - QUIZ SOLUTION: Overview of Information Security Threats and Attacks - Questions answered and explained.mp4 67.08 MB
    031 - A Brief Look at the History of Hacking.mp4 119.03 MB
    032 - Types of Hackers.mp4 85.93 MB
    033 - What is Ethical Hacking? What is Its Purpose?.mp4 28.41 MB
    034 - Scope of Ethical Hacking.mp4 36.58 MB
    035 - Hacking Stages: Reconnaissance.mp4 24.71 MB
    036 - Hacking Stages: Scanning.mp4 18.81 MB
    037 - Hacking Stages: Gaining Access.mp4 6.52 MB
    038 - Hacking Stages: Maintaining Access.mp4 32.77 MB
    039 - Hacking Stages: Clearing Tracks.mp4 29.49 MB
    040 - QUIZ SOLUTION: History of Hacking - Questions answered and explained.mp4 82.56 MB
    041 - Chapter Introduction.mp4 57.45 MB
    042 - Information Assurance.mp4 135.18 MB
    043 - EISA and Information security management program.mp4 118.65 MB
    044 - Network Zoning.mp4 155.91 MB
    045 - Defense in Depth.mp4 131.04 MB
    046 - What Sort of Things Do Policies Regulate?.mp4 150.28 MB
    047 - Workplace Security Policies and Examples.mp4 108.34 MB
    048 - Physical Security Controls and Risk.mp4 116.44 MB
    049 - Risk Management.mp4 127.31 MB
    050 - Threat Modeling and Incident Management.mp4 212.88 MB
    051 - UBA - User Behavior Analytics and Network Security Controls.mp4 83.63 MB
    052 - Access Controls.mp4 83.52 MB
    053 - Identification Authentication Authorization Accounting and IAM.mp4 122.34 MB
    054 - Data Leakage.mp4 98.51 MB
    055 - Data Backup.mp4 223.12 MB
    056 - Data Recovery.mp4 28.08 MB
    057 - QUIZ SOLUTION: Protecting Information - Questions answered and explained.mp4 87.09 MB
    058 - What Is Penetration Testing?.mp4 37.88 MB
    059 - What Does a Good Penetration Test Consist of?.mp4 129.97 MB
    060 - Why Do a Penetration Test.mp4 123.63 MB
    061 - Pre-Attack Phase: Contracts.mp4 29.91 MB
    062 - Audit vs Vulnerability Assessment vs Penetration Test.mp4 26.54 MB
    063 - Red vs Blue Team!.mp4 32.18 MB
    064 - Types of Penetration Testing.mp4 80.48 MB
    065 - Pre-Attack Phase: Rules of Engagement.mp4 26.3 MB
    066 - Pre-Attack Phase: Understanding your Client's requirements.mp4 43.73 MB
    067 - Pre-Attack Phase: Scope of a Penetration Test.mp4 76.8 MB
    068 - Pre-Attack Phase: Information Gathering.mp4 70.82 MB
    069 - Pre-Attack Phase: Two Types of Information Gathering.mp4 60.52 MB
    070 - Attack Phase.mp4 15.9 MB
    071 - Attack Phase: Penetrating the Perimeter.mp4 46.69 MB
    072 - Attack Phase: Target Acquisition.mp4 30.76 MB
    073 - Attack Phase: Privilege Escalation.mp4 31.85 MB
    074 - Attack Phase: Execute, Implant, Retract.mp4 36.6 MB
    075 - Post-Attack Phase.mp4 23.49 MB
    076 - Security Testing Methodologies.mp4 77.54 MB
    077 - QUIZ SOLUTION: Penetration Testing - Questions answered and explained.mp4 65.3 MB
    078 - About Footprinting.mp4 33.97 MB
    079 - Hacker State of Mind.mp4 59.92 MB
    080 - Search Engine and Online Resources.mp4 196.65 MB
    081 - Whois GeoIpLocation and DNS Interogation.mp4 145.77 MB
    082 - Email Header Analysis.mp4 164.45 MB
    083 - Getting an IP Address from an Email and More.mp4 167.36 MB
    084 - Quick Look at a Website Certificate, Source Code and Traffic.mp4 169.92 MB
    085 - How to Clone a Website and Extract Metadata from Files.mp4 186.24 MB
    086 - Nmap and Traceroute.mp4 201.34 MB
    087 - QUIZ SOLUTION: Footprinting - Questions answered and explained.mp4 55.07 MB
    088 - Countermeasures and Best Practices.mp4 121.64 MB
    089 - What Goes into a Footprinting Report?.mp4 56.53 MB
    090 - QUIZ SOLUTION: Reports and Countermeasures - Questions answered and explained.mp4 50.07 MB
    091 - Banner Grabbing.mp4 54.83 MB
    092 - Drawing and Mapping Out Network Topologies.mp4 97.26 MB
    093 - Scanning for Vulnerabilities.mp4 143.2 MB
    094 - Enumeration.mp4 72.26 MB
    095 - QUIZ SOLUTION: Network Scanning Techniques - Questions answered and explained.mp4 57.03 MB
    096 - Password Cracking, Crunch, and Some Basics.mp4 169.96 MB
    097 - Using Hydra for online password cracking.mp4 181.74 MB
    098 - Hashcat: Environment Setup.mp4 178.44 MB
    099 - HashCat: Installation.mp4 78.99 MB
    100 - HashCat: Let Us Crack Some Passwords!.mp4 166.47 MB
    101 - HashCat: Results and Recap.mp4 123.07 MB
    102 - QUIZ SOLUTION: Password Cracking Techniques - Questions answered and explained.mp4 78.43 MB
    103 - Reverse Shell and Remote Service Exploitation.mp4 185.14 MB
    104 - Keylogger Intro and Environment Setup.mp4 118.07 MB
    105 - Keylogger Source Code Download and Import.mp4 50.84 MB
    106 - Keylogger Configuration.mp4 79.59 MB
    107 - Keylogger Demo.mp4 134.14 MB
    108 - Decrypting Keylogger Logs.mp4 91.29 MB
    109 - QUIZ SOLUTION: Persistent Remote Access - Questions Answered and Explained.mp4 54.78 MB
    110 - SandBox.mp4 173.97 MB
    111 - How to Create a Safe Sandbox Environment.mp4 133.18 MB
    112 - Anti-Malware Software Overview.mp4 109.48 MB
    113 - Packing Malware.mp4 125.95 MB
    114 - Rootkits.mp4 68.84 MB
    115 - Hiding Files and Steganography.mp4 116.08 MB
    116 - QUIZ SOLUTION: Hiding Malicious Programs - Questions Answered and Explained.mp4 38.19 MB
    117 - Log Files: Covering Your Tracks.mp4 136.04 MB
    118 - QUIZ SOLUTION: Covering Tracks and Destroying Evidence - Questions Answered and Explained.mp4 68.4 MB
    119 - ARP Spoofing.mp4 174.61 MB
    120 - MAC Address Spoofing.mp4 120.2 MB
    121 - DHCP Starvation.mp4 71.52 MB
    122 - QUIZ SOLUTION: Sniffing Techniques - Questions Answered and Explained.mp4 101.29 MB
    123 - Capturing the WPA2 Handshake.mp4 145.32 MB
    124 - Cracking WPA2 Passkey.mp4 162.1 MB
    125 - QUIZ SOLUTION: Wireless Networks - Questions Answered and Explained.mp4 76.85 MB
    126 - Social Engineering.mp4 170.02 MB
    127 - Well Known Social Engineering Attacks: A Retrospective.mp4 114.38 MB
    128 - QUIZ SOLUTION: Social Engineering - Questions Answered and Explained.mp4 59.04 MB
    129 - What Is a Firewall? How Does It Work?.mp4 90.22 MB
    130 - Firewall Usage, Logging, and Configuration.mp4 110.74 MB
    131 - Evading Firewall GeoIpBock.mp4 176.26 MB
    132 - QUIZ SOLUTION: Firewalls - Questions answered and explained.mp4 59.63 MB
    133 - How to Set Up a Honeypot.mp4 137.22 MB
    134 - How to grab traffic from a Honeypot.mp4 130.45 MB
    135 - QUIZ SOLUTION: Honeypots - Questions Answered and Explained.mp4 53.49 MB
    136 - OWASP - Open Web Application Security Project.mp4 49.99 MB
    137 - XSS Cross Site Scripting.mp4 127.82 MB
    138 - SQL Injections.mp4 172.11 MB
    139 - QUIZ SOLUTION: Attacking Web Servers and Web Applications - Questions Answered and Explained.mp4 57.84 MB
    140 - Cryptography Basics.mp4 75.54 MB
    141 - Cryptography Common Algorithms and Message Digest.mp4 93.89 MB
    142 - PKI Public Key Infrastructure.mp4 72.44 MB
    143 - Cryptanalysis and Attack Vectors.mp4 105.05 MB
    144 - Checksum and File Encryption.mp4 131.72 MB
    145 - SSH RSA Demo.mp4 146.91 MB
    146 - Storage Medium Encryption.mp4 141.3 MB
    147 - QUIZ SOLUTION: Cryptography - Questions Answered and Explained.mp4 54.62 MB
    148 - Final Practice Exam.mp4 59.95 MB
    149 - Final Practice Exam Question and Answer overview part 1.mp4 114.44 MB
    150 - Final Practice exam Question and Answer overview part 2.mp4 68.89 MB
    151 - Final Practice exam Question and Answer overview part 3.mp4 111.63 MB
    152 - Final Practice exam Question and Answer overview part 4.mp4 113.12 MB

Download Info

  • Tips

    “LA239” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.

  • DMCA Notice and Takedown Procedure

    If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.