搜索
Udemy - The Complete Hands-On Cybersecurity Analyst Course (4.2025)
磁力链接/BT种子名称
Udemy - The Complete Hands-On Cybersecurity Analyst Course (4.2025)
磁力链接/BT种子简介
种子哈希:
562d7cac4065b5eb45490e113c2c09c8edca1367
文件大小:
55.97G
已经下载:
700
次
下载速度:
极快
收录时间:
2025-05-29
最近下载:
2025-09-30
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:562D7CAC4065B5EB45490E113C2C09C8EDCA1367
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
世界之窗
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
极乐禁地
91短视频
抖音Max
TikTok成人版
PornHub
听泉鉴鲍
少女日记
草榴社区
哆哔涩漫
呦乐园
萝莉岛
悠悠禁区
拔萝卜
疯马秀
最近搜索
塞
める
穴位
偷心
トマト
moodyz 姉妹
全脱
网红脸女神
小只
[shadow]
纯纯酱
不良少女
香港
老炮儿
多奶子
同事
blackedraw anal
猎奇
小月
突然来了
洋洋
收费
兄弟 女友
之力
高潮集
花与绳
家 集
fc2-ppv-4481667
清妙
豪车
文件列表
25. Network Traffic Analysis/5. Wireshark Part 2 Configuring Profiles and Filters.mp4
1.2 GB
14. Incident Response Exercises/8. Report Writing.mp4
1.1 GB
12. SIEMs/10. Wazuh Part 3 Sysmon Tuning Custom Rules, and APT Simulator.mp4
1.0 GB
12. SIEMs/9. Wazuh Part 2 VirusTotal Integration and Sysmon and PowerShell Logging.mp4
968.6 MB
24. Security Fundamentals (CompTIA Security+ Objectives)/18. Malicious Activity Part 2 (CompTIA Sec+ OBJ 2.4).mp4
962.0 MB
27. Purple Teaming/2. Purple Team Exercise 1 Part 1 (Attack and Discovery).mp4
805.9 MB
11. Introduction to Windows Forensics/41. Forensics CTF Walkthrough.mp4
800.8 MB
26. Malware Analysis for SOC Analysts/27. Behavioral Analysis Walkthrough.mp4
786.2 MB
10. Email and Phishing Analysis/2. Email Header Analysis.mp4
693.3 MB
26. Malware Analysis for SOC Analysts/19. Behavioral Analysis Part 8B Sysmon Tuning.mp4
691.0 MB
25. Network Traffic Analysis/4. Wireshark Part 1 Introduction to Wireshark.mp4
673.2 MB
24. Security Fundamentals (CompTIA Security+ Objectives)/8. Cryptography (CompTIA Sec+ OBJ 1.4).mp4
660.4 MB
21. Mr. Robot Exercise/3. Mr. Robot Exercise Initial Access.mp4
638.9 MB
20. C2 Frameworks/4. PowerShell Empire C2 Framework.mp4
624.0 MB
12. SIEMs/8. Wazuh Part 1 Setup and Detecting Malware.mp4
620.0 MB
24. Security Fundamentals (CompTIA Security+ Objectives)/14. Vulnerabilities (CompTIA Sec+ OBJ 2.3).mp4
620.0 MB
26. Malware Analysis for SOC Analysts/8. Static Analysis Walkthrough.mp4
593.1 MB
06. Advanced Lab Option/15. Advanced Option Proxmox Lab Install Velociraptor Server.mp4
583.1 MB
26. Malware Analysis for SOC Analysts/7. Static Analysis Part 2.mp4
553.1 MB
11. Introduction to Windows Forensics/33. Intro to Memory Analysis Volatility.mp4
542.8 MB
25. Network Traffic Analysis/3. Analyzing Network Traffic with TCPdump.mp4
526.5 MB
12. SIEMs/13. Wazuh CTF Walkthrough.mp4
516.7 MB
16. Threat Hunting/3. Threat Hunting with Splunk Part 2 Initial Access.mp4
486.1 MB
23. Cyber Threat Intelligence/4. Intro to MITRE ATT&CK.mp4
475.6 MB
21. Mr. Robot Exercise/14. Mr. Robot Exercise Incident Response Report Writing Walkthrough.mp4
470.1 MB
24. Security Fundamentals (CompTIA Security+ Objectives)/4. Fundamental Security Concepts (CompTIA Sec+ OBJ 1.2).mp4
451.6 MB
26. Malware Analysis for SOC Analysts/16. Behavioral Analysis Part 6 Procmon.mp4
450.2 MB
21. Mr. Robot Exercise/11. Mr. Robot Exercise Data Destruction (Part 2).mp4
448.0 MB
26. Malware Analysis for SOC Analysts/25. Behavioral Analysis Part 14 Using Volatility for Memory Analysis.mp4
426.7 MB
24. Security Fundamentals (CompTIA Security+ Objectives)/16. Malicious Activity Part 1 (CompTIA Sec+ OBJ 2.4).mp4
418.2 MB
08. Ultimate Cyber Security Primer/5. Linux Primer One - SSH and Basic File Operations.mp4
410.2 MB
26. Malware Analysis for SOC Analysts/2. Malware Analysis Configuring the Windows VM (FLARE VM).mp4
406.9 MB
27. Purple Teaming/5. Purple Team Exercise 2 Part 2 (Blue TeamElastic).mp4
401.5 MB
26. Malware Analysis for SOC Analysts/1. Malware Analysis Primer.mp4
386.9 MB
11. Introduction to Windows Forensics/3. Windows File System Artifacts.mp4
383.4 MB
16. Threat Hunting/4. Threat Hunting with Splunk Part 3 Lateral Movement.mp4
378.3 MB
06. Advanced Lab Option/12. Advanced Option Proxmox Lab Configure pfSense Firewall Rules.mp4
374.9 MB
11. Introduction to Windows Forensics/43. Installing Velociraptor.mp4
373.6 MB
27. Purple Teaming/9. Purple Team Exercise 3 Part 3 (Custom Snort Alert).mp4
371.9 MB
23. Cyber Threat Intelligence/8. Primary Intelligence Requirements.mp4
359.3 MB
14. Incident Response Exercises/1. Intro to Incident Response.mp4
358.8 MB
12. SIEMs/5. Intro to Elastic.mp4
357.6 MB
27. Purple Teaming/4. Purple Team Exercise 2 Part 1 (Red Team).mp4
348.0 MB
20. C2 Frameworks/5. Sliver C2 Framework.mp4
347.4 MB
27. Purple Teaming/3. Purple Team Exercise 1 Part 2 (Detections and Mitigations).mp4
343.4 MB
21. Mr. Robot Exercise/7. Mr. Robot Exercise C2 Blue Team.mp4
342.1 MB
21. Mr. Robot Exercise/9. Mr. Robot Exercise Bad USB.mp4
341.5 MB
21. Mr. Robot Exercise/12. Mr. Robot Exercise Applying MITRE ATT&CK Assignment Intro.mp4
336.4 MB
11. Introduction to Windows Forensics/37. Recovering Deleted Files From a NTFS File System (Windows).mp4
330.9 MB
15. Honey Pots/3. Reviewing and Analyzing Honey Pot Data (Dionaea).mp4
327.7 MB
22. WiFi Pentesting/1. WiFi Basics.mp4
326.0 MB
26. Malware Analysis for SOC Analysts/17. Behavioral Analysis Part 7 Procdot.mp4
321.5 MB
25. Network Traffic Analysis/8. Snort on pfSense Custom Rules.mp4
319.8 MB
21. Mr. Robot Exercise/8. Mr. Robot Exercise Wireless Attacks.mp4
318.4 MB
21. Mr. Robot Exercise/2. Mr. Robot Exercise Pre-Attack.mp4
317.7 MB
21. Mr. Robot Exercise/13. Mr Robot Exercise Applying MITRE ATT&CK Assignment Walkthrough.mp4
313.7 MB
27. Purple Teaming/7. Purple Team Exercise 3 Part 1 (Red Team).mp4
311.9 MB
21. Mr. Robot Exercise/10. Mr Robot Exercise Data Destruction (Part 1).mp4
311.4 MB
24. Security Fundamentals (CompTIA Security+ Objectives)/12. Threat Actors , Vectors, and Attack Surfaces (CompTIA Sec+ (OBJ 2.1 and 2.2).mp4
309.6 MB
25. Network Traffic Analysis/6. Wireshark Part 3 Analyzing Network Traffic.mp4
309.3 MB
23. Cyber Threat Intelligence/5. ATT&CK Navigator.mp4
301.7 MB
10. Email and Phishing Analysis/3. Email Body Analysis.mp4
301.4 MB
18. Web Application Pentesting/41. Writing A Custom Python SQL Injection Tool.mp4
297.3 MB
26. Malware Analysis for SOC Analysts/6. Static Analysis Part 1.mp4
290.8 MB
27. Purple Teaming/8. Purple Team Exercise 3 Part 2 (Blue Team).mp4
277.3 MB
07. Bonus Lab Content/2. Creating a Shortcut to Connect to ProxMox VM via Spice Protocol.mp4
275.5 MB
25. Network Traffic Analysis/9. Snort on pfSense Pre-Built Rules.mp4
271.6 MB
16. Threat Hunting/2. Threat Hunting with Splunk Part 1 Recon.mp4
271.1 MB
21. Mr. Robot Exercise/16. Mr. Robot Exercise Ransomware Analysis Walkthrough.mp4
268.9 MB
06. Advanced Lab Option/11. Advanced Option PROXMOX Lab Install FLARE and Configure Windows VMs.mp4
266.2 MB
24. Security Fundamentals (CompTIA Security+ Objectives)/40. Security Awareness Practices (Sec+ OBJ 5.6).mp4
263.9 MB
26. Malware Analysis for SOC Analysts/26. Behavioral Analysis Part 15 Using MemProcFS for Memory Analysis.mp4
263.3 MB
11. Introduction to Windows Forensics/45. Velociraptor Use Case.mp4
257.1 MB
26. Malware Analysis for SOC Analysts/4. Safe Malware Handling.mp4
256.2 MB
18. Web Application Pentesting/5. Web Application Fingerprinting - Viewing Source Code and Robots.txt.mp4
253.9 MB
15. Honey Pots/4. Reviewing and Analyzing Honey Pot Data (Cowrie).mp4
252.9 MB
06. Advanced Lab Option/7. Advanced Option Proxmox Lab Configure Networking.mp4
252.8 MB
22. WiFi Pentesting/4. WiFi Pentesting Scanning.mp4
252.7 MB
11. Introduction to Windows Forensics/5. Intro to Windows Registry.mp4
250.7 MB
18. Web Application Pentesting/43. Refactoring SQLi Tool.mp4
246.6 MB
12. SIEMs/2. Intro to Splunk.mp4
234.3 MB
26. Malware Analysis for SOC Analysts/10. Online Sandbox Analysis.mp4
234.2 MB
07. Bonus Lab Content/1. Adding Ivanti VPN Appliance to ProxMox Lab.mp4
234.0 MB
25. Network Traffic Analysis/7. Snort on pfSense.mp4
233.9 MB
18. Web Application Pentesting/25. Writing Lab 1.mp4
233.6 MB
10. Email and Phishing Analysis/4. Email Attachment Analysis.mp4
230.0 MB
12. SIEMs/7. Elastic Part 2 Configure Elastic.mp4
228.8 MB
06. Advanced Lab Option/5. Advanced Option Proxmox Lab Install pfSense.mp4
221.0 MB
11. Introduction to Windows Forensics/26. Google Chrome Forensics.mp4
219.9 MB
08. Ultimate Cyber Security Primer/26. Linux Primer Ten - nc and ncat.mp4
213.3 MB
13. Bad USB Attacks/4. DIY Rubber Ducky Generic USB Flash Drive.mp4
213.1 MB
21. Mr. Robot Exercise/5. Mr. Robot Exercise C2 Part 2.mp4
212.7 MB
06. Advanced Lab Option/1. Advanced Option ProxMox Lab Intro and Installation.mp4
207.4 MB
08. Ultimate Cyber Security Primer/36. Linux Primer - Linux Processes, States, and Jobs.mp4
205.4 MB
11. Introduction to Windows Forensics/44. Velociraptor Dashboard Review.mp4
204.9 MB
17. Reverse Engineering/14. Solution for REXOR-RE2.mp4
204.4 MB
23. Cyber Threat Intelligence/10. Operationalizing Crown Jewel Analysis, PIR Development, and the Collection Plan.mp4
201.7 MB
26. Malware Analysis for SOC Analysts/14. Behavioral Analysis Part 4 Process Explorer.mp4
200.9 MB
11. Introduction to Windows Forensics/35. Intro to Memory Analysis MemProcFS.mp4
199.9 MB
24. Security Fundamentals (CompTIA Security+ Objectives)/33. Incident Response (Sec+ OBJ4.8).mp4
199.1 MB
05. Intermediate Lab Option/7. Intermediate Option VirtualBox Lab Environment Part 2.3a Configure Windows VM-1.mp4
198.2 MB
08. Ultimate Cyber Security Primer/34. Linux Primer Thirteen - SUID and GUID Binaries.mp4
197.5 MB
20. C2 Frameworks/1. Intro to C2 Frameworks.mp4
196.4 MB
23. Cyber Threat Intelligence/1. Intro to CTI.mp4
196.1 MB
25. Network Traffic Analysis/2. Introduction to TCPdump.mp4
195.4 MB
17. Reverse Engineering/18. Basics of a Buffer Overflow.mp4
194.8 MB
22. WiFi Pentesting/6. WiFi Pentesting MitM Attack (ARP Poisoning).mp4
194.4 MB
05. Intermediate Lab Option/11. Intermediate Option VirtualBox Lab Environment Part 5 Domain Joining.mp4
194.2 MB
21. Mr. Robot Exercise/4. Mr. Robot Exercise C2.mp4
192.3 MB
22. WiFi Pentesting/8. WiFi Pentesting MitM Attack (DNS Spoofing).mp4
191.7 MB
12. SIEMs/1. Install Splunk.mp4
191.4 MB
24. Security Fundamentals (CompTIA Security+ Objectives)/28. Vulnerability Management (Sec+ OBJ4.3).mp4
190.2 MB
08. Ultimate Cyber Security Primer/32. Linux Primer Twelve - More about SSH.mp4
189.6 MB
13. Bad USB Attacks/3. DIY Rubber Ducky Raspberry Pi Pico.mp4
189.4 MB
19. Vulnerability Scanning/3. Vulnerability Scanning Reporting.mp4
184.5 MB
18. Web Application Pentesting/27. Writing Lab 3.mp4
183.6 MB
24. Security Fundamentals (CompTIA Security+ Objectives)/30. Enhancing Security (Sec+ OBJ4.5.mp4
183.4 MB
08. Ultimate Cyber Security Primer/16. Linux Primer Six - base64, tr, and xxd.mp4
181.7 MB
11. Introduction to Windows Forensics/2. Intro to Windows Forensic Artifacts.mp4
179.0 MB
22. WiFi Pentesting/10. WPA3 Pentesting.mp4
177.6 MB
24. Security Fundamentals (CompTIA Security+ Objectives)/35. Effective Security Governance (Sec+ OBJ5.1).mp4
176.9 MB
26. Malware Analysis for SOC Analysts/12. Behavioral Analysis Part 2 Wireshark & inetsim.mp4
174.9 MB
19. Vulnerability Scanning/2. Vulnerability Scanning Mitigation.mp4
173.2 MB
18. Web Application Pentesting/50. Natas 16 - 17 Solution.mp4
171.1 MB
06. Advanced Lab Option/2. Advanced Option Proxmox Lab Install Windows VM.mp4
170.9 MB
24. Security Fundamentals (CompTIA Security+ Objectives)/24. Strategies to Protect Data (CompTIA Sec+ OBJ3.3).mp4
169.4 MB
18. Web Application Pentesting/49. DETOUR WAPTM-4 and Natas 15 - 16 Solutions.mp4
167.7 MB
04. Basic Lab Option/1. Basic Lab Option.mp4
165.5 MB
23. Cyber Threat Intelligence/7. Crown Jewel Analysis.mp4
164.9 MB
24. Security Fundamentals (CompTIA Security+ Objectives)/31. Identity and Access Management (Sec+ OBJ4.6).mp4
164.4 MB
13. Bad USB Attacks/2. Rubber Ducky.mp4
162.9 MB
24. Security Fundamentals (CompTIA Security+ Objectives)/37. 3d Party Risk Assessment & Management (Sec+ OBJ5.3).mp4
162.1 MB
22. WiFi Pentesting/2. Intro to WiFi Pentesting.mp4
161.9 MB
24. Security Fundamentals (CompTIA Security+ Objectives)/32. Automation and Orchestration (Sec+ OBJ4.7).mp4
161.3 MB
05. Intermediate Lab Option/3. Intermediate Option VirtualBox Lab Environment Part 1.3 Configure pfSense.mp4
160.6 MB
24. Security Fundamentals (CompTIA Security+ Objectives)/26. Apply Common Security Techniques (Sec+ OBJ4.1).mp4
160.4 MB
08. Ultimate Cyber Security Primer/7. Linux Primer Two - More Commands.mp4
158.1 MB
18. Web Application Pentesting/1. Introduction to the HTTP Protocol.mp4
158.0 MB
22. WiFi Pentesting/5. WiFi Pentesting Exploiting WPAWPA2.mp4
156.1 MB
20. C2 Frameworks/2. Install and Create a Mythic C2 Framework Payload.mp4
155.8 MB
21. Mr. Robot Exercise/1. Intro to Mr. Robot Exercise.mp4
154.9 MB
22. WiFi Pentesting/7. WiFi Pentesting Manual MAC Address Spoofing.mp4
154.5 MB
06. Advanced Lab Option/14. Advanced Option ProxMox Lab Create and Deploy Wazuh Agents.mp4
154.5 MB
08. Ultimate Cyber Security Primer/39. Linux Primer - Introduction to Cron.mp4
153.4 MB
22. WiFi Pentesting/9. Evil Portal Attack.mp4
153.0 MB
14. Incident Response Exercises/6. Incident Response Exercise 2 Walkthrough.mp4
152.7 MB
17. Reverse Engineering/25. PE File Format - PIMAGE_NT_HEADERS.mp4
150.9 MB
18. Web Application Pentesting/15. Bypassing File Upload Restrictions.mp4
147.0 MB
24. Security Fundamentals (CompTIA Security+ Objectives)/25. Resilience and Recovery (CompTIA Sec+ OBJ3.4).mp4
146.5 MB
12. SIEMs/6. Elastic Part 1 Install Elastic.mp4
146.5 MB
24. Security Fundamentals (CompTIA Security+ Objectives)/6. Change Management (Comptia Sec+ OBJ 1.3).mp4
146.3 MB
13. Bad USB Attacks/1. Bad USB Attacks.mp4
146.1 MB
14. Incident Response Exercises/4. Incident Response Exercise 1 Walkthrough.mp4
144.6 MB
24. Security Fundamentals (CompTIA Security+ Objectives)/27. Asset Management (Sec+ OBJ4.2).mp4
144.2 MB
11. Introduction to Windows Forensics/31. Intro to Memory Analysis.mp4
143.5 MB
03. Quick Start Lab Option/1. Quick Start Option - Importing Kali VirtualBox Appliance.mp4
141.7 MB
24. Security Fundamentals (CompTIA Security+ Objectives)/38. Effective Security Compliance (Sec+ OBJ5.4).mp4
141.0 MB
08. Ultimate Cyber Security Primer/17. Bandit 10 - 13 Solutions.mp4
140.9 MB
24. Security Fundamentals (CompTIA Security+ Objectives)/20. Mitigation Techniques Part 2 (Comptia Sec+ OBJ2.5).mp4
138.2 MB
24. Security Fundamentals (CompTIA Security+ Objectives)/39. Audits and Assessments (Sec+ OBJ 5.5).mp4
135.0 MB
24. Security Fundamentals (CompTIA Security+ Objectives)/9. Hashing vs Encryption.mp4
132.1 MB
11. Introduction to Windows Forensics/13. Prefetch Files.mp4
130.8 MB
11. Introduction to Windows Forensics/1. Intro to Windows Forensics.mp4
128.3 MB
17. Reverse Engineering/2. Introduction to Basic Static File Analysis.mp4
128.1 MB
08. Ultimate Cyber Security Primer/43. Bandit23 - 24 Solution.mp4
128.0 MB
26. Malware Analysis for SOC Analysts/11. Behavioral Analysis Part 1.mp4
126.0 MB
05. Intermediate Lab Option/1. Intermediate Option VirtualBox Lab Environment Part 1.1 Install pfSense.mp4
122.9 MB
11. Introduction to Windows Forensics/29. Browsing History View by Nirsoft.mp4
122.0 MB
06. Advanced Lab Option/10. Advanced Option Proxmox Lab Domain Joining.mp4
120.8 MB
12. SIEMs/3. Sysmon-Splunk Exercise.mp4
119.1 MB
11. Introduction to Windows Forensics/46. Build a Velociraptor Off-line Collector.mp4
118.0 MB
06. Advanced Lab Option/6. Advanced Option Proxmox Install SPICE.mp4
117.0 MB
17. Reverse Engineering/7. Solution for Python DETOUR-RE2.mp4
116.8 MB
23. Cyber Threat Intelligence/2. Lockheed Martin Cyber Kill Chain.mp4
116.4 MB
06. Advanced Lab Option/13. Advanced Option Proxmox Lab Installing Wazuh Server.mp4
116.1 MB
10. Email and Phishing Analysis/1. Intro to Email Analysis.mp4
115.5 MB
15. Honey Pots/1. Intro to Honey Pots.mp4
114.4 MB
24. Security Fundamentals (CompTIA Security+ Objectives)/10. Digital Signatures.mp4
113.5 MB
08. Ultimate Cyber Security Primer/38. Linux Primer - Introduction to Bash Shell Scripting.mp4
109.7 MB
22. WiFi Pentesting/3. Setting up WiFi Network Card in Kali.mp4
107.5 MB
06. Advanced Lab Option/9. Advanced Option Proxmox Lab Active Directory.mp4
106.3 MB
24. Security Fundamentals (CompTIA Security+ Objectives)/23. Application of Security Principles (CompTIA Sec+ OBJ3.2).mp4
102.7 MB
26. Malware Analysis for SOC Analysts/5. Malware Analysis Final Configuration.mp4
102.7 MB
02. Introduction to Home Virtual Labs/2. Virtual Lab Options.mp4
102.1 MB
24. Security Fundamentals (CompTIA Security+ Objectives)/29. Alerting and Monitoring (Sec+ OBJ4.4).mp4
101.5 MB
17. Reverse Engineering/20. PE File Format - C++ Project Setup.mp4
97.5 MB
06. Advanced Lab Option/3. Advanced Option Proxmox Lab Install Linux VM.mp4
97.2 MB
06. Advanced Lab Option/8. Advanced Option Proxmox Configure Install Active Directory on Domain Controller.mp4
96.7 MB
09. Password Cracking/4. Writing a John Rule Generation Utility - Character Substitution.mp4
95.9 MB
24. Security Fundamentals (CompTIA Security+ Objectives)/34. Data Sources (Sec+ OBJ4.9).mp4
95.8 MB
08. Ultimate Cyber Security Primer/10. Bandit 7 - 10 Solutions.mp4
95.5 MB
24. Security Fundamentals (CompTIA Security+ Objectives)/1. Intro to Security Fundamentals (Sec+ Objectives).mp4
95.3 MB
26. Malware Analysis for SOC Analysts/18. Behavioral Analysis Part 8 Sysmon.mp4
94.0 MB
08. Ultimate Cyber Security Primer/24. Foundations of Networking.mp4
92.2 MB
17. Reverse Engineering/16. Solution for REXOR-RE3.mp4
89.5 MB
17. Reverse Engineering/24. PE File Format - PIMAGE_DOS_HEADER.mp4
89.2 MB
11. Introduction to Windows Forensics/19. Windows Shell Bags.mp4
89.1 MB
27. Purple Teaming/6. Purple Team Exercise 2 Part 3 (Blue TeamSplunk).mp4
89.1 MB
23. Cyber Threat Intelligence/6. Intro to Unified Kill Chain.mp4
89.0 MB
18. Web Application Pentesting/24. Writing a Landing Page.mp4
88.5 MB
15. Honey Pots/5. Reviewing and Analyzing Honey Pot Data (Heralding).mp4
88.0 MB
08. Ultimate Cyber Security Primer/12. Linux Primer Five - Compression Utilities.mp4
87.7 MB
17. Reverse Engineering/11. Solution for REXOR-RE1.mp4
86.8 MB
24. Security Fundamentals (CompTIA Security+ Objectives)/21. Architecture Considerations Part 1 (CompTIA Sec+ OBJ 3.1).mp4
86.5 MB
05. Intermediate Lab Option/9. Intermediate Option VirtualBox Lab Environment Part 3 Active Directory.mp4
86.5 MB
24. Security Fundamentals (CompTIA Security+ Objectives)/36. Risk Management (Sec+ OBJ5.2).mp4
86.4 MB
08. Ultimate Cyber Security Primer/11. Linux Primer Four - mv, cp, and mkdir.mp4
85.4 MB
11. Introduction to Windows Forensics/15. Windows User Assist.mp4
82.7 MB
23. Cyber Threat Intelligence/3. Pyramid of Pain.mp4
82.7 MB
16. Threat Hunting/1. Threat Hunting with Splunk Setup (botsv2).mp4
81.6 MB
26. Malware Analysis for SOC Analysts/15. Behavioral Analysis Part 5 System Informer.mp4
80.1 MB
21. Mr. Robot Exercise/6. Mr. Robot Exercise Intro to Splunk Dashboard.mp4
79.4 MB
11. Introduction to Windows Forensics/39. Forensic CTF Intro.mp4
78.4 MB
24. Security Fundamentals (CompTIA Security+ Objectives)/2. Security Controls (CompTIA Sec+ OBJ 1.1).mp4
77.4 MB
15. Honey Pots/2. Installing the Honey Pot (TPOT) on Cloud Server.mp4
76.5 MB
09. Password Cracking/3. Password Cracking - John Rules.mp4
76.3 MB
26. Malware Analysis for SOC Analysts/21. Behavioral Analysis Part 10 RegShot.mp4
75.7 MB
08. Ultimate Cyber Security Primer/8. Bandit 4 - 7 Solutions.mp4
75.1 MB
17. Reverse Engineering/3. File Create, Access, and Modify Times.mp4
73.8 MB
25. Network Traffic Analysis/1. Introduction to Network Traffic Analysis.mp4
73.8 MB
08. Ultimate Cyber Security Primer/9. Linux Primer Three - Even More Commands.mp4
72.6 MB
26. Malware Analysis for SOC Analysts/23. Behavioral Analysis Part 12 Intro to Memory Analysis.mp4
72.0 MB
18. Web Application Pentesting/12. Web Application Testing - Command Injection.mp4
70.7 MB
08. Ultimate Cyber Security Primer/29. Bandit 16 - 17 Solution.mp4
70.3 MB
19. Vulnerability Scanning/1. Intro to Vulnerability Scanning.mp4
70.2 MB
27. Purple Teaming/1. Intro to Purple Teaming.mp4
69.9 MB
05. Intermediate Lab Option/10. Intermediate Option VirtualBox Lab Environment Part 4 UsersGroupsPolicies.mp4
69.2 MB
18. Web Application Pentesting/20. Installing Components of LAMP Stack.mp4
68.2 MB
21. Mr. Robot Exercise/15. Mr. Robot Exercise Ransomware Analysis Challenge Intro.mp4
67.2 MB
24. Security Fundamentals (CompTIA Security+ Objectives)/19. Mitigation Techniques Part 1 (CompTIA Sec+ OBJ 2.5).mp4
66.2 MB
11. Introduction to Windows Forensics/23. Windows Shimcache.mp4
65.7 MB
14. Incident Response Exercises/2. Incident Response Exercises Lab Setup.mp4
65.2 MB
20. C2 Frameworks/3. Deploy and Task Mythic C2 Agent.mp4
65.1 MB
18. Web Application Pentesting/16. Natas 12 - 14 Solutions.mp4
65.0 MB
17. Reverse Engineering/5. Solution for Python DETOUR-RE1.mp4
65.0 MB
08. Ultimate Cyber Security Primer/25. Network Pentesting - Intro to NMAP.mp4
64.3 MB
08. Ultimate Cyber Security Primer/3. Intro to Binary and Machine Code.mp4
64.2 MB
18. Web Application Pentesting/11. Natas 6 - 9 solutions.mp4
63.9 MB
18. Web Application Pentesting/14. Natas 11 - 12 Solution.mp4
63.4 MB
18. Web Application Pentesting/46. Refactoring SQL Injection Tool to Implement Basic Authentication and New Payload.mp4
62.9 MB
18. Web Application Pentesting/26. Writing Lab 2.mp4
62.4 MB
18. Web Application Pentesting/8. Web Application Fingerprinting - Inspecting Headers and Cookies.mp4
60.8 MB
08. Ultimate Cyber Security Primer/30. Linux Primer Eleven - diff.mp4
59.9 MB
11. Introduction to Windows Forensics/7. Windows Run Keys.mp4
59.1 MB
18. Web Application Pentesting/3. DETOUR WAPTM-1 Solution - Part 1.mp4
58.5 MB
17. Reverse Engineering/4. Introduction to File Headers.mp4
56.4 MB
11. Introduction to Windows Forensics/27. Microsoft Edge Forensics.mp4
54.5 MB
18. Web Application Pentesting/19. Building a LAMP Stack - Part 2.mp4
53.5 MB
06. Advanced Lab Option/18. Setting Up pfSense in VMWare Workstation.mp4
53.3 MB
23. Cyber Threat Intelligence/9. Collection Plan.mp4
51.8 MB
14. Incident Response Exercises/7. Incident Response Exercise 3.mp4
50.9 MB
26. Malware Analysis for SOC Analysts/13. Behavioral Analysis Part 3 FakeDNS.mp4
50.6 MB
08. Ultimate Cyber Security Primer/46. Bandit 24 - 25 Solution Using Python.mp4
49.4 MB
14. Incident Response Exercises/3. Incident Response Exercise 1.mp4
47.3 MB
15. Honey Pots/6. Reviewing and Analyzing Honey Pot Data from CLI.mp4
47.1 MB
08. Ultimate Cyber Security Primer/21. Bandit 13 - 14 Solution.mp4
46.7 MB
08. Ultimate Cyber Security Primer/19. Linux Primer Seven - File Permissions and the chmod Command.mp4
45.3 MB
18. Web Application Pentesting/10. Web Application Testing - Local File Inclusions.mp4
45.0 MB
05. Intermediate Lab Option/5. Intermediate Option VirtualBox Lab Environment Part 2.2a Install Windows VM-1.mp4
44.9 MB
08. Ultimate Cyber Security Primer/20. Linux Primer Eight - Intro to SSH Keys.mp4
44.8 MB
18. Web Application Pentesting/47. Blind Data Exfil Using SQL Injection Timed-Based Attacks.mp4
43.6 MB
06. Advanced Lab Option/4. Advanced Option Proxmox Lab Install Windows Server.mp4
42.7 MB
26. Malware Analysis for SOC Analysts/20. Behavioral Analysis Part 9 API Monitor.mp4
42.1 MB
17. Reverse Engineering/21. PE File Format - Creating a Handle to a File.mp4
40.7 MB
18. Web Application Pentesting/28. Writing Lab 4.mp4
39.0 MB
05. Intermediate Lab Option/2. Intermediate Option VirtualBox Lab Environment Part 1.2 Install Kali Linux.mp4
38.8 MB
17. Reverse Engineering/19. Introduction to the PE File Format.mp4
38.7 MB
17. Reverse Engineering/23. PE File Format - MapViewOfFile.mp4
37.8 MB
11. Introduction to Windows Forensics/21. Windows Background Activity Monitor.mp4
37.5 MB
11. Introduction to Windows Forensics/25. Intro to Browser Forensics.mp4
37.2 MB
08. Ultimate Cyber Security Primer/37. Bandit 20 - 21 Solution.mp4
36.9 MB
17. Reverse Engineering/12. Stripped Binary Analysis.mp4
36.9 MB
08. Ultimate Cyber Security Primer/44. Linux Primer - seq command and for in loop in bash.mp4
35.7 MB
18. Web Application Pentesting/23. Creating Database.mp4
35.3 MB
18. Web Application Pentesting/6. DETOUR WAPTM-2 Solution.mp4
34.8 MB
24. Security Fundamentals (CompTIA Security+ Objectives)/22. Architecture Considerations Part 2 (CompTIA Sec+ OBJ 3.1).mp4
34.5 MB
09. Password Cracking/2. Password Cracking - Cracking MD5 Hashes Using John.mp4
34.5 MB
08. Ultimate Cyber Security Primer/6. Bandit 0 - 4 Solutions.mp4
32.6 MB
08. Ultimate Cyber Security Primer/14. Intro to Encoding and Base64.mp4
32.5 MB
26. Malware Analysis for SOC Analysts/24. Behavioral Analysis Part 13 Memory Capturing.mp4
32.3 MB
05. Intermediate Lab Option/8. Intermediate Option VirtualBox Lab Environment Part 2.3b Configure Windows VM-2.mp4
32.2 MB
26. Malware Analysis for SOC Analysts/22. Behavioral Analysis Part 11 Autoruns.mp4
30.3 MB
01. Welcome/1. Welcome Message.mp4
30.2 MB
17. Reverse Engineering/22. PE File Format - CreateFileMapping.mp4
30.1 MB
18. Web Application Pentesting/44. Crafting Payloads for Update Statements.mp4
29.9 MB
05. Intermediate Lab Option/6. Intermediate Option VirtualBox Lab Environment Part 2.2b Install Windows VM-2.mp4
29.5 MB
11. Introduction to Windows Forensics/17. Windows Recent Documents.mp4
29.2 MB
06. Advanced Lab Option/17. ReArm Windows Dev VM.mp4
29.1 MB
11. Introduction to Windows Forensics/11. Windows Scheduled Tasks.mp4
28.3 MB
17. Reverse Engineering/8. Introduction to Ghidra.mp4
26.0 MB
08. Ultimate Cyber Security Primer/23. Linux Primer Nine - More on grep.mp4
25.0 MB
18. Web Application Pentesting/7. DETOUR WAPTM-3 Solution.mp4
25.0 MB
18. Web Application Pentesting/45. Solution for Natas 14 - Natas 15.mp4
24.5 MB
08. Ultimate Cyber Security Primer/45. Bandit 24 - 25 Solution Using Bash.mp4
24.1 MB
18. Web Application Pentesting/42. Testing SQLi Tool on Lab 2.mp4
23.9 MB
18. Web Application Pentesting/13. Natas 9 - 11 Solutions.mp4
23.1 MB
11. Introduction to Windows Forensics/42. Intro to Velociraptor.mp4
22.5 MB
09. Password Cracking/1. Cryptography - Hashing and MD5.mp4
22.4 MB
05. Intermediate Lab Option/4. Intermediate Option VirtualBox Lab Environment Part 2.1 Install Metasploitable.mp4
22.3 MB
18. Web Application Pentesting/4. DETOUR WAPTM-1 Solution - Part 2.mp4
21.7 MB
18. Web Application Pentesting/38. Lab 4 Part 2.mp4
20.5 MB
08. Ultimate Cyber Security Primer/2. Module Introduction.mp4
20.4 MB
11. Introduction to Windows Forensics/9. Windows Services Keys.mp4
20.3 MB
08. Ultimate Cyber Security Primer/41. Bandit 22 - 23 Solution.mp4
19.7 MB
17. Reverse Engineering/17. What is the Stack and How Does it Work.mp4
19.6 MB
18. Web Application Pentesting/9. Natas 4 - 6 Solutions.mp4
19.3 MB
18. Web Application Pentesting/21. Creating Firewall Rule.mp4
19.2 MB
17. Reverse Engineering/6. What is the ELF File Type.mp4
18.9 MB
18. Web Application Pentesting/29. Writing Lab 5.mp4
18.0 MB
17. Reverse Engineering/26. DETOUR PE File Reader C++ Challenge.mp4
17.8 MB
26. Malware Analysis for SOC Analysts/3. Malware Analysis Initial REMnux Install.mp4
17.7 MB
08. Ultimate Cyber Security Primer/18. Krypton 0 - 2 Solutions.mp4
17.2 MB
08. Ultimate Cyber Security Primer/35. Bandit 19 - 20 Solution.mp4
16.3 MB
18. Web Application Pentesting/37. Lab 4 Part 1.mp4
15.8 MB
11. Introduction to Windows Forensics/2. Intro_to_Windows_Endpoint_Forensic_Analysis_Artifacts_(VMware_Lab).pdf
14.1 MB
08. Ultimate Cyber Security Primer/22. Intro to Bitwise Operators.mp4
13.6 MB
06. Advanced Lab Option/16. Advanced Option ProxMox Cluster Hosts to Expand Your Lab.mp4
13.5 MB
08. Ultimate Cyber Security Primer/13. Intro to Hex.mp4
13.0 MB
08. Ultimate Cyber Security Primer/40. Bandit 21 - 22 Solution.mp4
12.9 MB
18. Web Application Pentesting/39. Lab 5 Part 1.mp4
12.1 MB
02. Introduction to Home Virtual Labs/1. Setting Up Home Virtual Lab Intro.mp4
12.0 MB
11. Introduction to Windows Forensics/28. Mozilla Firefox Forensics.mp4
11.7 MB
18. Web Application Pentesting/36. Lab 3 Part 2.mp4
10.7 MB
02. Introduction to Home Virtual Labs/3. Install VirtualBox.mp4
10.6 MB
17. Reverse Engineering/9. Challenge Ransomware REXOR-RE1.mp4
10.1 MB
08. Ultimate Cyber Security Primer/15. Intro to Cryptography and ROT13.mp4
10.1 MB
18. Web Application Pentesting/35. Lab 3 Part 1.mp4
9.9 MB
18. Web Application Pentesting/32. Lab 1 Part 3.mp4
9.1 MB
14. Incident Response Exercises/5. Incident Response Exercise 2.mp4
8.6 MB
08. Ultimate Cyber Security Primer/28. Bandit 15 - 16 Solution.mp4
7.6 MB
17. Reverse Engineering/13. Challenge Ransomware REXOR-RE2.mp4
7.5 MB
08. Ultimate Cyber Security Primer/33. Bandit 18 - 19 Solution.mp4
7.2 MB
08. Ultimate Cyber Security Primer/31. Bandit 17 - 18 Solution.mp4
7.2 MB
17. Reverse Engineering/1. Safely Handling Malware.mp4
6.6 MB
18. Web Application Pentesting/34. Lab 2.mp4
6.3 MB
17. Reverse Engineering/15. Challenge Ransomware REXOR-RE3.mp4
6.3 MB
18. Web Application Pentesting/40. Lab 5 Part 2.mp4
6.2 MB
18. Web Application Pentesting/22. MySQL Secure Installation.mp4
6.1 MB
18. Web Application Pentesting/33. Lab 1 Part 4.mp4
5.6 MB
08. Ultimate Cyber Security Primer/4. Principal of Duality.mp4
5.4 MB
18. Web Application Pentesting/31. Lab 1 Part 2.mp4
5.2 MB
08. Ultimate Cyber Security Primer/27. Bandit 14 - 15 Solution.mp4
5.2 MB
12. SIEMs/11. Wazuh CTF Intro.mp4
4.6 MB
18. Web Application Pentesting/30. Lab 1 Part 1.mp4
4.5 MB
08. Ultimate Cyber Security Primer/42. Linux Primer - Introduction to stat and timeout Commands.mp4
3.1 MB
18. Web Application Pentesting/17. Deep Dive Into Injection - Introduction.mp4
2.4 MB
18. Web Application Pentesting/18. Building a LAMP Stack - Part 1.mp4
1.4 MB
18. Web Application Pentesting/2. Python Challenged - DETOUR WAPTM-1.mp4
1.0 MB
18. Web Application Pentesting/48. DETOUR WAPTM-4 Challenge.mp4
958.5 kB
08. Ultimate Cyber Security Primer/1.1 Pretest.html
73.7 kB
14. Incident Response Exercises/8. Report Writing.vtt
54.7 kB
12. SIEMs/10. Wazuh Part 3 Sysmon Tuning Custom Rules, and APT Simulator.vtt
49.6 kB
12. SIEMs/9. Wazuh Part 2 VirusTotal Integration and Sysmon and PowerShell Logging.vtt
49.0 kB
21. Mr. Robot Exercise/3. Mr. Robot Exercise Initial Access.vtt
43.8 kB
26. Malware Analysis for SOC Analysts/27. Behavioral Analysis Walkthrough.vtt
43.1 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/18. Malicious Activity Part 2 (CompTIA Sec+ OBJ 2.4).vtt
40.7 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/14. Vulnerabilities (CompTIA Sec+ OBJ 2.3).vtt
38.2 kB
11. Introduction to Windows Forensics/41. Forensics CTF Walkthrough.vtt
37.5 kB
25. Network Traffic Analysis/5. Wireshark Part 2 Configuring Profiles and Filters.vtt
37.0 kB
12. SIEMs/8. Wazuh Part 1 Setup and Detecting Malware.vtt
36.8 kB
26. Malware Analysis for SOC Analysts/19. Behavioral Analysis Part 8B Sysmon Tuning.vtt
35.5 kB
27. Purple Teaming/2. Purple Team Exercise 1 Part 1 (Attack and Discovery).vtt
35.5 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/4. Fundamental Security Concepts (CompTIA Sec+ OBJ 1.2).vtt
33.2 kB
16. Threat Hunting/3. Threat Hunting with Splunk Part 2 Initial Access.vtt
32.9 kB
20. C2 Frameworks/4. PowerShell Empire C2 Framework.vtt
32.6 kB
10. Email and Phishing Analysis/2. Email Header Analysis.vtt
32.3 kB
04. Basic Lab Option/1. Basic Lab Option.vtt
32.0 kB
08. Ultimate Cyber Security Primer/36. Linux Primer - Linux Processes, States, and Jobs.vtt
31.6 kB
26. Malware Analysis for SOC Analysts/6. Static Analysis Part 1.vtt
30.8 kB
21. Mr. Robot Exercise/2. Mr. Robot Exercise Pre-Attack.vtt
30.6 kB
26. Malware Analysis for SOC Analysts/8. Static Analysis Walkthrough.vtt
30.5 kB
21. Mr. Robot Exercise/8. Mr. Robot Exercise Wireless Attacks.vtt
29.4 kB
11. Introduction to Windows Forensics/40.19 Forensic CTF Quiz.html
28.9 kB
11. Introduction to Windows Forensics/33. Intro to Memory Analysis Volatility.vtt
27.9 kB
12. SIEMs/13. Wazuh CTF Walkthrough.vtt
27.8 kB
26. Malware Analysis for SOC Analysts/7. Static Analysis Part 2.vtt
27.8 kB
21. Mr. Robot Exercise/14. Mr. Robot Exercise Incident Response Report Writing Walkthrough.vtt
27.7 kB
10. Email and Phishing Analysis/3. Email Body Analysis.vtt
27.5 kB
26. Malware Analysis for SOC Analysts/9.30 Static Analysis Quiz.html
27.1 kB
26. Malware Analysis for SOC Analysts/28.31 Behavioral Analysis Quiz.html
26.8 kB
12. SIEMs/2. Intro to Splunk.vtt
26.4 kB
18. Web Application Pentesting/5. Web Application Fingerprinting - Viewing Source Code and Robots.txt.vtt
25.6 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/8. Cryptography (CompTIA Sec+ OBJ 1.4).vtt
25.5 kB
08. Ultimate Cyber Security Primer/5. Linux Primer One - SSH and Basic File Operations.vtt
25.2 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/3.23 Security Controls Quiz.html
25.0 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/5.24 Fundamental Security Concepts Quiz.html
24.8 kB
18. Web Application Pentesting/41. Writing A Custom Python SQL Injection Tool.vtt
24.6 kB
09. Password Cracking/5.2 Password Cracking Using John and Rulesets.html
24.5 kB
23. Cyber Threat Intelligence/8. Primary Intelligence Requirements.vtt
24.3 kB
27. Purple Teaming/5. Purple Team Exercise 2 Part 2 (Blue TeamElastic).vtt
24.1 kB
11. Introduction to Windows Forensics/30.14 Browser Forensics Quiz.html
24.1 kB
16. Threat Hunting/4. Threat Hunting with Splunk Part 3 Lateral Movement.vtt
24.0 kB
12. SIEMs/5. Intro to Elastic.vtt
24.0 kB
12. SIEMs/12.21 Wazuh CTF.html
23.7 kB
07. Bonus Lab Content/1. Adding Ivanti VPN Appliance to ProxMox Lab.vtt
23.6 kB
26. Malware Analysis for SOC Analysts/2. Malware Analysis Configuring the Windows VM (FLARE VM).vtt
23.6 kB
12. SIEMs/4.20 Sysmon-Splunk Quiz.html
23.4 kB
16. Threat Hunting/2. Threat Hunting with Splunk Part 1 Recon.vtt
23.4 kB
21. Mr. Robot Exercise/11. Mr. Robot Exercise Data Destruction (Part 2).vtt
23.3 kB
11. Introduction to Windows Forensics/3. Windows File System Artifacts.vtt
23.2 kB
23. Cyber Threat Intelligence/4. Intro to MITRE ATT&CK.vtt
22.9 kB
06. Advanced Lab Option/12. Advanced Option Proxmox Lab Configure pfSense Firewall Rules.vtt
22.8 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/13.27 Threat Actors, Vectors, and Attack Surfaces Quiz.html
22.2 kB
27. Purple Teaming/4. Purple Team Exercise 2 Part 1 (Red Team).vtt
21.9 kB
26. Malware Analysis for SOC Analysts/16. Behavioral Analysis Part 6 Procmon.vtt
21.7 kB
17. Reverse Engineering/11. Solution for REXOR-RE1.vtt
21.6 kB
27. Purple Teaming/3. Purple Team Exercise 1 Part 2 (Detections and Mitigations).vtt
21.6 kB
27. Purple Teaming/7. Purple Team Exercise 3 Part 1 (Red Team).vtt
21.4 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/17.29 Malicious Activity Quiz.html
21.3 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/15.28 Vulnerabilities Quiz.html
21.3 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/11.26 Cryptography Quiz.html
21.3 kB
25. Network Traffic Analysis/4. Wireshark Part 1 Introduction to Wireshark.vtt
21.1 kB
22. WiFi Pentesting/1. WiFi Basics.vtt
21.1 kB
26. Malware Analysis for SOC Analysts/4. Safe Malware Handling.vtt
21.0 kB
26. Malware Analysis for SOC Analysts/25. Behavioral Analysis Part 14 Using Volatility for Memory Analysis.vtt
20.9 kB
11. Introduction to Windows Forensics/8.5 Run Keys Quiz.html
20.7 kB
25. Network Traffic Analysis/3. Analyzing Network Traffic with TCPdump.vtt
20.7 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/7.25 Change Management Quiz.html
20.6 kB
11. Introduction to Windows Forensics/6.4 Windows Registry Quiz.html
20.6 kB
11. Introduction to Windows Forensics/32.15 Memory Quiz.html
20.6 kB
11. Introduction to Windows Forensics/4.3 File System Artifacts Quiz.html
20.5 kB
18. Web Application Pentesting/25. Writing Lab 1.vtt
20.3 kB
21. Mr. Robot Exercise/16. Mr. Robot Exercise Ransomware Analysis Walkthrough.vtt
20.1 kB
25. Network Traffic Analysis/2. Introduction to TCPdump.vtt
20.1 kB
06. Advanced Lab Option/15. Advanced Option Proxmox Lab Install Velociraptor Server.vtt
19.7 kB
05. Intermediate Lab Option/7. Intermediate Option VirtualBox Lab Environment Part 2.3a Configure Windows VM-1.vtt
19.7 kB
26. Malware Analysis for SOC Analysts/17. Behavioral Analysis Part 7 Procdot.vtt
19.6 kB
18. Web Application Pentesting/49. DETOUR WAPTM-4 and Natas 15 - 16 Solutions.vtt
19.4 kB
11. Introduction to Windows Forensics/43. Installing Velociraptor.vtt
19.3 kB
23. Cyber Threat Intelligence/1. Intro to CTI.vtt
19.3 kB
12. SIEMs/3. Sysmon-Splunk Exercise.vtt
19.1 kB
11. Introduction to Windows Forensics/10.6 Windows Services Quiz.html
18.9 kB
11. Introduction to Windows Forensics/18.10 Recent Documents Quiz.html
18.9 kB
11. Introduction to Windows Forensics/16.9 User Assist Quiz.html
18.9 kB
11. Introduction to Windows Forensics/24.13 Shimcache Quiz.html
18.7 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/12. Threat Actors , Vectors, and Attack Surfaces (CompTIA Sec+ (OBJ 2.1 and 2.2).vtt
18.7 kB
11. Introduction to Windows Forensics/20.11 Shell Bags Quiz.html
18.7 kB
11. Introduction to Windows Forensics/12.7 Scheduled Tasks Quiz.html
18.7 kB
08. Ultimate Cyber Security Primer/39. Linux Primer - Introduction to Cron.vtt
18.7 kB
11. Introduction to Windows Forensics/14.8 Prefetch Quiz.html
18.6 kB
11. Introduction to Windows Forensics/36.17 MemProcFS Quiz.html
18.6 kB
11. Introduction to Windows Forensics/22.12 BAM Quiz.html
18.5 kB
11. Introduction to Windows Forensics/38.18 Recovering Deleted Files Quiz.html
18.5 kB
21. Mr. Robot Exercise/13. Mr Robot Exercise Applying MITRE ATT&CK Assignment Walkthrough.vtt
18.3 kB
06. Advanced Lab Option/2. Advanced Option Proxmox Lab Install Windows VM.vtt
18.3 kB
11. Introduction to Windows Forensics/34.16 Volatility Quiz.html
18.3 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/16. Malicious Activity Part 1 (CompTIA Sec+ OBJ 2.4).vtt
18.1 kB
17. Reverse Engineering/10.22 REXOR-RE1.html
17.8 kB
15. Honey Pots/3. Reviewing and Analyzing Honey Pot Data (Dionaea).vtt
17.8 kB
26. Malware Analysis for SOC Analysts/1. Malware Analysis Primer.vtt
17.7 kB
08. Ultimate Cyber Security Primer/38. Linux Primer - Introduction to Bash Shell Scripting.vtt
17.5 kB
21. Mr. Robot Exercise/7. Mr. Robot Exercise C2 Blue Team.vtt
17.5 kB
21. Mr. Robot Exercise/5. Mr. Robot Exercise C2 Part 2.vtt
17.5 kB
18. Web Application Pentesting/43. Refactoring SQLi Tool.vtt
17.2 kB
22. WiFi Pentesting/5. WiFi Pentesting Exploiting WPAWPA2.vtt
17.1 kB
26. Malware Analysis for SOC Analysts/14. Behavioral Analysis Part 4 Process Explorer.vtt
16.7 kB
17. Reverse Engineering/18. Basics of a Buffer Overflow.vtt
16.5 kB
11. Introduction to Windows Forensics/37. Recovering Deleted Files From a NTFS File System (Windows).vtt
16.4 kB
25. Network Traffic Analysis/8. Snort on pfSense Custom Rules.vtt
16.4 kB
18. Web Application Pentesting/50. Natas 16 - 17 Solution.vtt
16.1 kB
22. WiFi Pentesting/2. Intro to WiFi Pentesting.vtt
16.1 kB
18. Web Application Pentesting/8. Web Application Fingerprinting - Inspecting Headers and Cookies.vtt
15.8 kB
27. Purple Teaming/8. Purple Team Exercise 3 Part 2 (Blue Team).vtt
15.8 kB
11. Introduction to Windows Forensics/45. Velociraptor Use Case.vtt
15.7 kB
18. Web Application Pentesting/1. Introduction to the HTTP Protocol.vtt
15.6 kB
19. Vulnerability Scanning/3. Vulnerability Scanning Reporting.vtt
15.3 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/9. Hashing vs Encryption.vtt
15.3 kB
20. C2 Frameworks/5. Sliver C2 Framework.vtt
15.2 kB
21. Mr. Robot Exercise/10. Mr Robot Exercise Data Destruction (Part 1).vtt
15.0 kB
22. WiFi Pentesting/4. WiFi Pentesting Scanning.vtt
15.0 kB
07. Bonus Lab Content/2. Creating a Shortcut to Connect to ProxMox VM via Spice Protocol.vtt
15.0 kB
18. Web Application Pentesting/14. Natas 11 - 12 Solution.vtt
15.0 kB
22. WiFi Pentesting/6. WiFi Pentesting MitM Attack (ARP Poisoning).vtt
14.9 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/10. Digital Signatures.vtt
14.8 kB
25. Network Traffic Analysis/7. Snort on pfSense.vtt
14.4 kB
05. Intermediate Lab Option/1. Intermediate Option VirtualBox Lab Environment Part 1.1 Install pfSense.vtt
14.4 kB
11. Introduction to Windows Forensics/5. Intro to Windows Registry.vtt
14.2 kB
06. Advanced Lab Option/11. Advanced Option PROXMOX Lab Install FLARE and Configure Windows VMs.vtt
14.2 kB
15. Honey Pots/1. Intro to Honey Pots.vtt
14.1 kB
22. WiFi Pentesting/8. WiFi Pentesting MitM Attack (DNS Spoofing).vtt
14.0 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/23. Application of Security Principles (CompTIA Sec+ OBJ3.2).vtt
13.8 kB
21. Mr. Robot Exercise/12. Mr. Robot Exercise Applying MITRE ATT&CK Assignment Intro.vtt
13.5 kB
26. Malware Analysis for SOC Analysts/10. Online Sandbox Analysis.vtt
13.4 kB
26. Malware Analysis for SOC Analysts/26. Behavioral Analysis Part 15 Using MemProcFS for Memory Analysis.vtt
13.3 kB
27. Purple Teaming/9. Purple Team Exercise 3 Part 3 (Custom Snort Alert).vtt
13.3 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/35. Effective Security Governance (Sec+ OBJ5.1).vtt
13.3 kB
17. Reverse Engineering/2. Introduction to Basic Static File Analysis.vtt
13.0 kB
17. Reverse Engineering/16. Solution for REXOR-RE3.vtt
12.9 kB
18. Web Application Pentesting/3. DETOUR WAPTM-1 Solution - Part 1.vtt
12.9 kB
17. Reverse Engineering/5. Solution for Python DETOUR-RE1.vtt
12.8 kB
21. Mr. Robot Exercise/9. Mr. Robot Exercise Bad USB.vtt
12.8 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/24. Strategies to Protect Data (CompTIA Sec+ OBJ3.3).vtt
12.7 kB
18. Web Application Pentesting/26. Writing Lab 2.vtt
12.7 kB
18. Web Application Pentesting/15. Bypassing File Upload Restrictions.vtt
12.7 kB
14. Incident Response Exercises/1. Intro to Incident Response.vtt
12.6 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/29. Alerting and Monitoring (Sec+ OBJ4.4).vtt
12.5 kB
10. Email and Phishing Analysis/4. Email Attachment Analysis.vtt
12.5 kB
19. Vulnerability Scanning/1. Intro to Vulnerability Scanning.vtt
12.5 kB
17. Reverse Engineering/24. PE File Format - PIMAGE_DOS_HEADER.vtt
12.4 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/28. Vulnerability Management (Sec+ OBJ4.3).vtt
12.4 kB
23. Cyber Threat Intelligence/3. Pyramid of Pain.vtt
12.4 kB
08. Ultimate Cyber Security Primer/32. Linux Primer Twelve - More about SSH.vtt
12.4 kB
26. Malware Analysis for SOC Analysts/12. Behavioral Analysis Part 2 Wireshark & inetsim.vtt
12.4 kB
15. Honey Pots/4. Reviewing and Analyzing Honey Pot Data (Cowrie).vtt
12.4 kB
05. Intermediate Lab Option/10. Intermediate Option VirtualBox Lab Environment Part 4 UsersGroupsPolicies.vtt
12.4 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/33. Incident Response (Sec+ OBJ4.8).vtt
12.3 kB
08. Ultimate Cyber Security Primer/34. Linux Primer Thirteen - SUID and GUID Binaries.vtt
12.3 kB
11. Introduction to Windows Forensics/2. Intro to Windows Forensic Artifacts.vtt
12.1 kB
08. Ultimate Cyber Security Primer/26. Linux Primer Ten - nc and ncat.vtt
12.1 kB
17. Reverse Engineering/14. Solution for REXOR-RE2.vtt
12.1 kB
11. Introduction to Windows Forensics/26. Google Chrome Forensics.vtt
12.1 kB
08. Ultimate Cyber Security Primer/9. Linux Primer Three - Even More Commands.vtt
12.0 kB
18. Web Application Pentesting/27. Writing Lab 3.vtt
12.0 kB
08. Ultimate Cyber Security Primer/12. Linux Primer Five - Compression Utilities.vtt
11.9 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/36. Risk Management (Sec+ OBJ5.2).vtt
11.8 kB
12. SIEMs/7. Elastic Part 2 Configure Elastic.vtt
11.8 kB
06. Advanced Lab Option/18. Setting Up pfSense in VMWare Workstation.vtt
11.8 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/26. Apply Common Security Techniques (Sec+ OBJ4.1).vtt
11.8 kB
06. Advanced Lab Option/9. Advanced Option Proxmox Lab Active Directory.vtt
11.5 kB
05. Intermediate Lab Option/3. Intermediate Option VirtualBox Lab Environment Part 1.3 Configure pfSense.vtt
11.5 kB
05. Intermediate Lab Option/9. Intermediate Option VirtualBox Lab Environment Part 3 Active Directory.vtt
11.5 kB
17. Reverse Engineering/7. Solution for Python DETOUR-RE2.vtt
11.4 kB
11. Introduction to Windows Forensics/44. Velociraptor Dashboard Review.vtt
11.4 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/25. Resilience and Recovery (CompTIA Sec+ OBJ3.4).vtt
11.4 kB
08. Ultimate Cyber Security Primer/43. Bandit23 - 24 Solution.vtt
11.3 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/31. Identity and Access Management (Sec+ OBJ4.6).vtt
11.3 kB
18. Web Application Pentesting/23. Creating Database.vtt
11.3 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/30. Enhancing Security (Sec+ OBJ4.5.vtt
11.2 kB
17. Reverse Engineering/25. PE File Format - PIMAGE_NT_HEADERS.vtt
11.2 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/38. Effective Security Compliance (Sec+ OBJ5.4).vtt
11.2 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/27. Asset Management (Sec+ OBJ4.2).vtt
11.2 kB
06. Advanced Lab Option/1. Advanced Option ProxMox Lab Intro and Installation.vtt
11.1 kB
18. Web Application Pentesting/20. Installing Components of LAMP Stack.vtt
11.1 kB
17. Reverse Engineering/21. PE File Format - Creating a Handle to a File.vtt
11.0 kB
08. Ultimate Cyber Security Primer/24. Foundations of Networking.vtt
11.0 kB
11. Introduction to Windows Forensics/31. Intro to Memory Analysis.vtt
11.0 kB
23. Cyber Threat Intelligence/7. Crown Jewel Analysis.vtt
10.9 kB
17. Reverse Engineering/4. Introduction to File Headers.vtt
10.9 kB
23. Cyber Threat Intelligence/6. Intro to Unified Kill Chain.vtt
10.8 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/34. Data Sources (Sec+ OBJ4.9).vtt
10.7 kB
12. SIEMs/1. Install Splunk.vtt
10.7 kB
21. Mr. Robot Exercise/4. Mr. Robot Exercise C2.vtt
10.7 kB
14. Incident Response Exercises/4. Incident Response Exercise 1 Walkthrough.vtt
10.7 kB
08. Ultimate Cyber Security Primer/46. Bandit 24 - 25 Solution Using Python.vtt
10.7 kB
09. Password Cracking/3. Password Cracking - John Rules.vtt
10.6 kB
08. Ultimate Cyber Security Primer/7. Linux Primer Two - More Commands.vtt
10.6 kB
18. Web Application Pentesting/12. Web Application Testing - Command Injection.vtt
10.5 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/40. Security Awareness Practices (Sec+ OBJ 5.6).vtt
10.5 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/32. Automation and Orchestration (Sec+ OBJ4.7).vtt
10.5 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/39. Audits and Assessments (Sec+ OBJ 5.5).vtt
10.4 kB
11. Introduction to Windows Forensics/35. Intro to Memory Analysis MemProcFS.vtt
10.3 kB
08. Ultimate Cyber Security Primer/3. Intro to Binary and Machine Code.vtt
10.3 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/37. 3d Party Risk Assessment & Management (Sec+ OBJ5.3).vtt
10.2 kB
09. Password Cracking/4. Writing a John Rule Generation Utility - Character Substitution.vtt
10.2 kB
12. SIEMs/6. Elastic Part 1 Install Elastic.vtt
10.1 kB
17. Reverse Engineering/20. PE File Format - C++ Project Setup.vtt
10.0 kB
18. Web Application Pentesting/6. DETOUR WAPTM-2 Solution.vtt
10.0 kB
23. Cyber Threat Intelligence/10. Operationalizing Crown Jewel Analysis, PIR Development, and the Collection Plan.vtt
9.9 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/20. Mitigation Techniques Part 2 (Comptia Sec+ OBJ2.5).vtt
9.7 kB
17. Reverse Engineering/19. Introduction to the PE File Format.vtt
9.7 kB
15. Honey Pots/6. Reviewing and Analyzing Honey Pot Data from CLI.vtt
9.7 kB
15. Honey Pots/2. Installing the Honey Pot (TPOT) on Cloud Server.vtt
9.6 kB
08. Ultimate Cyber Security Primer/16. Linux Primer Six - base64, tr, and xxd.vtt
9.6 kB
22. WiFi Pentesting/10. WPA3 Pentesting.vtt
9.6 kB
06. Advanced Lab Option/7. Advanced Option Proxmox Lab Configure Networking.vtt
9.6 kB
13. Bad USB Attacks/1. Bad USB Attacks.vtt
9.5 kB
05. Intermediate Lab Option/11. Intermediate Option VirtualBox Lab Environment Part 5 Domain Joining.vtt
9.4 kB
23. Cyber Threat Intelligence/5. ATT&CK Navigator.vtt
9.4 kB
25. Network Traffic Analysis/6. Wireshark Part 3 Analyzing Network Traffic.vtt
9.3 kB
18. Web Application Pentesting/47. Blind Data Exfil Using SQL Injection Timed-Based Attacks.vtt
9.2 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/21. Architecture Considerations Part 1 (CompTIA Sec+ OBJ 3.1).vtt
9.1 kB
26. Malware Analysis for SOC Analysts/18. Behavioral Analysis Part 8 Sysmon.vtt
9.0 kB
20. C2 Frameworks/1. Intro to C2 Frameworks.vtt
8.9 kB
19. Vulnerability Scanning/2. Vulnerability Scanning Mitigation.vtt
8.9 kB
25. Network Traffic Analysis/9. Snort on pfSense Pre-Built Rules.vtt
8.9 kB
22. WiFi Pentesting/9. Evil Portal Attack.vtt
8.8 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/6. Change Management (Comptia Sec+ OBJ 1.3).vtt
8.8 kB
26. Malware Analysis for SOC Analysts/5. Malware Analysis Final Configuration.vtt
8.8 kB
18. Web Application Pentesting/16. Natas 12 - 14 Solutions.vtt
8.6 kB
08. Ultimate Cyber Security Primer/17. Bandit 10 - 13 Solutions.vtt
8.5 kB
22. WiFi Pentesting/7. WiFi Pentesting Manual MAC Address Spoofing.vtt
8.3 kB
14. Incident Response Exercises/6. Incident Response Exercise 2 Walkthrough.vtt
8.2 kB
17. Reverse Engineering/3. File Create, Access, and Modify Times.vtt
8.2 kB
18. Web Application Pentesting/28. Writing Lab 4.vtt
8.0 kB
13. Bad USB Attacks/2. Rubber Ducky.vtt
8.0 kB
18. Web Application Pentesting/46. Refactoring SQL Injection Tool to Implement Basic Authentication and New Payload.vtt
7.9 kB
21. Mr. Robot Exercise/6. Mr. Robot Exercise Intro to Splunk Dashboard.vtt
7.8 kB
18. Web Application Pentesting/24. Writing a Landing Page.vtt
7.7 kB
23. Cyber Threat Intelligence/9. Collection Plan.vtt
7.6 kB
22. WiFi Pentesting/3. Setting up WiFi Network Card in Kali.vtt
7.6 kB
08. Ultimate Cyber Security Primer/45. Bandit 24 - 25 Solution Using Bash.vtt
7.6 kB
27. Purple Teaming/6. Purple Team Exercise 2 Part 3 (Blue TeamSplunk).vtt
7.5 kB
20. C2 Frameworks/2. Install and Create a Mythic C2 Framework Payload.vtt
7.5 kB
08. Ultimate Cyber Security Primer/20. Linux Primer Eight - Intro to SSH Keys.vtt
7.4 kB
06. Advanced Lab Option/5. Advanced Option Proxmox Lab Install pfSense.vtt
7.3 kB
08. Ultimate Cyber Security Primer/19. Linux Primer Seven - File Permissions and the chmod Command.vtt
7.3 kB
26. Malware Analysis for SOC Analysts/11. Behavioral Analysis Part 1.vtt
7.2 kB
08. Ultimate Cyber Security Primer/44. Linux Primer - seq command and for in loop in bash.vtt
7.2 kB
06. Advanced Lab Option/6. Advanced Option Proxmox Install SPICE.vtt
7.1 kB
10. Email and Phishing Analysis/1. Intro to Email Analysis.vtt
7.1 kB
11. Introduction to Windows Forensics/13. Prefetch Files.vtt
7.0 kB
08. Ultimate Cyber Security Primer/22. Intro to Bitwise Operators.vtt
7.0 kB
08. Ultimate Cyber Security Primer/10. Bandit 7 - 10 Solutions.vtt
7.0 kB
13. Bad USB Attacks/3. DIY Rubber Ducky Raspberry Pi Pico.vtt
6.9 kB
17. Reverse Engineering/12. Stripped Binary Analysis.vtt
6.8 kB
17. Reverse Engineering/8. Introduction to Ghidra.vtt
6.7 kB
06. Advanced Lab Option/13. Advanced Option Proxmox Lab Installing Wazuh Server.vtt
6.7 kB
08. Ultimate Cyber Security Primer/6. Bandit 0 - 4 Solutions.vtt
6.6 kB
05. Intermediate Lab Option/2. Intermediate Option VirtualBox Lab Environment Part 1.2 Install Kali Linux.vtt
6.6 kB
26. Malware Analysis for SOC Analysts/15. Behavioral Analysis Part 5 System Informer.vtt
6.5 kB
18. Web Application Pentesting/11. Natas 6 - 9 solutions.vtt
6.5 kB
20. C2 Frameworks/3. Deploy and Task Mythic C2 Agent.vtt
6.5 kB
18. Web Application Pentesting/10. Web Application Testing - Local File Inclusions.vtt
6.5 kB
05. Intermediate Lab Option/5. Intermediate Option VirtualBox Lab Environment Part 2.2a Install Windows VM-1.vtt
6.5 kB
25. Network Traffic Analysis/1. Introduction to Network Traffic Analysis.vtt
6.4 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/22. Architecture Considerations Part 2 (CompTIA Sec+ OBJ 3.1).vtt
6.4 kB
18. Web Application Pentesting/13. Natas 9 - 11 Solutions.vtt
6.4 kB
08. Ultimate Cyber Security Primer/25. Network Pentesting - Intro to NMAP.vtt
6.4 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/19. Mitigation Techniques Part 1 (CompTIA Sec+ OBJ 2.5).vtt
6.4 kB
03. Quick Start Lab Option/1. Quick Start Option - Importing Kali VirtualBox Appliance.vtt
6.3 kB
08. Ultimate Cyber Security Primer/8. Bandit 4 - 7 Solutions.vtt
6.3 kB
21. Mr. Robot Exercise/1. Intro to Mr. Robot Exercise.vtt
6.2 kB
06. Advanced Lab Option/14. Advanced Option ProxMox Lab Create and Deploy Wazuh Agents.vtt
6.1 kB
23. Cyber Threat Intelligence/2. Lockheed Martin Cyber Kill Chain.vtt
6.1 kB
26. Malware Analysis for SOC Analysts/13. Behavioral Analysis Part 3 FakeDNS.vtt
6.1 kB
11. Introduction to Windows Forensics/29. Browsing History View by Nirsoft.vtt
5.9 kB
01. Welcome/1. Welcome Message.vtt
5.9 kB
06. Advanced Lab Option/4. Advanced Option Proxmox Lab Install Windows Server.vtt
5.8 kB
17. Reverse Engineering/23. PE File Format - MapViewOfFile.vtt
5.8 kB
11. Introduction to Windows Forensics/46. Build a Velociraptor Off-line Collector.vtt
5.7 kB
08. Ultimate Cyber Security Primer/37. Bandit 20 - 21 Solution.vtt
5.7 kB
26. Malware Analysis for SOC Analysts/23. Behavioral Analysis Part 12 Intro to Memory Analysis.vtt
5.7 kB
06. Advanced Lab Option/8. Advanced Option Proxmox Configure Install Active Directory on Domain Controller.vtt
5.7 kB
08. Ultimate Cyber Security Primer/11. Linux Primer Four - mv, cp, and mkdir.vtt
5.6 kB
11. Introduction to Windows Forensics/7. Windows Run Keys.vtt
5.6 kB
08. Ultimate Cyber Security Primer/30. Linux Primer Eleven - diff.vtt
5.5 kB
13. Bad USB Attacks/4. DIY Rubber Ducky Generic USB Flash Drive.vtt
5.4 kB
02. Introduction to Home Virtual Labs/2. Virtual Lab Options.vtt
5.3 kB
05. Intermediate Lab Option/6. Intermediate Option VirtualBox Lab Environment Part 2.2b Install Windows VM-2.vtt
5.3 kB
06. Advanced Lab Option/3. Advanced Option Proxmox Lab Install Linux VM.vtt
5.2 kB
18. Web Application Pentesting/4. DETOUR WAPTM-1 Solution - Part 2.vtt
5.2 kB
18. Web Application Pentesting/35. Lab 3 Part 1.vtt
5.2 kB
18. Web Application Pentesting/36. Lab 3 Part 2.vtt
5.2 kB
16. Threat Hunting/1. Threat Hunting with Splunk Setup (botsv2).vtt
5.1 kB
26. Malware Analysis for SOC Analysts/21. Behavioral Analysis Part 10 RegShot.vtt
5.0 kB
06. Advanced Lab Option/10. Advanced Option Proxmox Lab Domain Joining.vtt
5.0 kB
09. Password Cracking/1. Cryptography - Hashing and MD5.vtt
5.0 kB
18. Web Application Pentesting/44. Crafting Payloads for Update Statements.vtt
5.0 kB
11. Introduction to Windows Forensics/15. Windows User Assist.vtt
4.9 kB
08. Ultimate Cyber Security Primer/29. Bandit 16 - 17 Solution.vtt
4.8 kB
11. Introduction to Windows Forensics/1. Intro to Windows Forensics.vtt
4.8 kB
18. Web Application Pentesting/37. Lab 4 Part 1.vtt
4.8 kB
14. Incident Response Exercises/2. Incident Response Exercises Lab Setup.vtt
4.8 kB
18. Web Application Pentesting/7. DETOUR WAPTM-3 Solution.vtt
4.8 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/2. Security Controls (CompTIA Sec+ OBJ 1.1).vtt
4.8 kB
26. Malware Analysis for SOC Analysts/20. Behavioral Analysis Part 9 API Monitor.vtt
4.7 kB
18. Web Application Pentesting/38. Lab 4 Part 2.vtt
4.7 kB
15. Honey Pots/5. Reviewing and Analyzing Honey Pot Data (Heralding).vtt
4.7 kB
17. Reverse Engineering/22. PE File Format - CreateFileMapping.vtt
4.6 kB
18. Web Application Pentesting/32. Lab 1 Part 3.vtt
4.6 kB
24. Security Fundamentals (CompTIA Security+ Objectives)/1. Intro to Security Fundamentals (Sec+ Objectives).vtt
4.5 kB
18. Web Application Pentesting/40. Lab 5 Part 2.vtt
4.5 kB
11. Introduction to Windows Forensics/39. Forensic CTF Intro.vtt
4.5 kB
08. Ultimate Cyber Security Primer/41. Bandit 22 - 23 Solution.vtt
4.4 kB
08. Ultimate Cyber Security Primer/21. Bandit 13 - 14 Solution.vtt
4.4 kB
17. Reverse Engineering/17. What is the Stack and How Does it Work.vtt
4.3 kB
18. Web Application Pentesting/45. Solution for Natas 14 - Natas 15.vtt
4.3 kB
14. Incident Response Exercises/3. Incident Response Exercise 1.vtt
4.3 kB
27. Purple Teaming/1. Intro to Purple Teaming.vtt
4.3 kB
18. Web Application Pentesting/34. Lab 2.vtt
4.2 kB
02. Introduction to Home Virtual Labs/1. Setting Up Home Virtual Lab Intro.vtt
4.2 kB
18. Web Application Pentesting/19. Building a LAMP Stack - Part 2.vtt
4.1 kB
11. Introduction to Windows Forensics/19. Windows Shell Bags.vtt
4.1 kB
18. Web Application Pentesting/9. Natas 4 - 6 Solutions.vtt
4.1 kB
18. Web Application Pentesting/39. Lab 5 Part 1.vtt
4.0 kB
08. Ultimate Cyber Security Primer/2. Module Introduction.vtt
4.0 kB
08. Ultimate Cyber Security Primer/18. Krypton 0 - 2 Solutions.vtt
3.9 kB
06. Advanced Lab Option/16. Advanced Option ProxMox Cluster Hosts to Expand Your Lab.vtt
3.9 kB
08. Ultimate Cyber Security Primer/14. Intro to Encoding and Base64.vtt
3.8 kB
05. Intermediate Lab Option/4. Intermediate Option VirtualBox Lab Environment Part 2.1 Install Metasploitable.vtt
3.8 kB
17. Reverse Engineering/6. What is the ELF File Type.vtt
3.8 kB
26. Malware Analysis for SOC Analysts/22. Behavioral Analysis Part 11 Autoruns.vtt
3.8 kB
11. Introduction to Windows Forensics/23. Windows Shimcache.vtt
3.7 kB
11. Introduction to Windows Forensics/25. Intro to Browser Forensics.vtt
3.7 kB
18. Web Application Pentesting/21. Creating Firewall Rule.vtt
3.7 kB
26. Malware Analysis for SOC Analysts/24. Behavioral Analysis Part 13 Memory Capturing.vtt
3.6 kB
18. Web Application Pentesting/31. Lab 1 Part 2.vtt
3.6 kB
21. Mr. Robot Exercise/15. Mr. Robot Exercise Ransomware Analysis Challenge Intro.vtt
3.5 kB
08. Ultimate Cyber Security Primer/13. Intro to Hex.vtt
3.5 kB
11. Introduction to Windows Forensics/17. Windows Recent Documents.vtt
3.5 kB
11. Introduction to Windows Forensics/11. Windows Scheduled Tasks.vtt
3.4 kB
18. Web Application Pentesting/30. Lab 1 Part 1.vtt
3.4 kB
08. Ultimate Cyber Security Primer/23. Linux Primer Nine - More on grep.vtt
3.3 kB
09. Password Cracking/2. Password Cracking - Cracking MD5 Hashes Using John.vtt
3.2 kB
02. Introduction to Home Virtual Labs/3. Install VirtualBox.vtt
3.1 kB
08. Ultimate Cyber Security Primer/40. Bandit 21 - 22 Solution.vtt
3.1 kB
08. Ultimate Cyber Security Primer/35. Bandit 19 - 20 Solution.vtt
3.0 kB
08. Ultimate Cyber Security Primer/15. Intro to Cryptography and ROT13.vtt
3.0 kB
11. Introduction to Windows Forensics/27. Microsoft Edge Forensics.vtt
2.9 kB
05. Intermediate Lab Option/8. Intermediate Option VirtualBox Lab Environment Part 2.3b Configure Windows VM-2.vtt
2.8 kB
18. Web Application Pentesting/33. Lab 1 Part 4.vtt
2.8 kB
18. Web Application Pentesting/29. Writing Lab 5.vtt
2.7 kB
06. Advanced Lab Option/17. ReArm Windows Dev VM.vtt
2.6 kB
17. Reverse Engineering/1. Safely Handling Malware.vtt
2.5 kB
14. Incident Response Exercises/7. Incident Response Exercise 3.vtt
2.4 kB
11. Introduction to Windows Forensics/21. Windows Background Activity Monitor.vtt
2.4 kB
11. Introduction to Windows Forensics/9. Windows Services Keys.vtt
2.3 kB
11. Introduction to Windows Forensics/42. Intro to Velociraptor.vtt
2.3 kB
08. Ultimate Cyber Security Primer/4. Principal of Duality.vtt
2.1 kB
26. Malware Analysis for SOC Analysts/3. Malware Analysis Initial REMnux Install.vtt
2.1 kB
08. Ultimate Cyber Security Primer/33. Bandit 18 - 19 Solution.vtt
2.0 kB
08. Ultimate Cyber Security Primer/31. Bandit 17 - 18 Solution.vtt
2.0 kB
18. Web Application Pentesting/42. Testing SQLi Tool on Lab 2.vtt
1.9 kB
18. Web Application Pentesting/22. MySQL Secure Installation.vtt
1.6 kB
17. Reverse Engineering/9. Challenge Ransomware REXOR-RE1.vtt
1.6 kB
08. Ultimate Cyber Security Primer/28. Bandit 15 - 16 Solution.vtt
1.5 kB
17. Reverse Engineering/26. DETOUR PE File Reader C++ Challenge.vtt
1.5 kB
08. Ultimate Cyber Security Primer/42. Linux Primer - Introduction to stat and timeout Commands.vtt
1.5 kB
08. Ultimate Cyber Security Primer/27. Bandit 14 - 15 Solution.vtt
1.4 kB
11. Introduction to Windows Forensics/28. Mozilla Firefox Forensics.vtt
1.3 kB
12. SIEMs/11. Wazuh CTF Intro.vtt
1.2 kB
17. Reverse Engineering/13. Challenge Ransomware REXOR-RE2.vtt
1.2 kB
14. Incident Response Exercises/5. Incident Response Exercise 2.vtt
1.2 kB
18. Web Application Pentesting/18. Building a LAMP Stack - Part 1.vtt
1.1 kB
17. Reverse Engineering/15. Challenge Ransomware REXOR-RE3.vtt
992 Bytes
18. Web Application Pentesting/17. Deep Dive Into Injection - Introduction.vtt
826 Bytes
18. Web Application Pentesting/2. Python Challenged - DETOUR WAPTM-1.vtt
479 Bytes
18. Web Application Pentesting/48. DETOUR WAPTM-4 Challenge.vtt
333 Bytes
12. SIEMs/9. Wazuh-Part-2.txt
176 Bytes
12. SIEMs/10. Wazuh-Part-3.txt
154 Bytes
05. Intermediate Lab Option/10. VirtualBox-Lab-Environment-Part-4-Setting-Up-Users-Groups-and-Policies.txt
152 Bytes
26. Malware Analysis for SOC Analysts/16. Intro-to-Malware-Analysis-Behavioral-Analysis-Tool-Familiarization.txt
146 Bytes
26. Malware Analysis for SOC Analysts/22. Intro-to-Malware-Analysis-Behavioral-Analysis-Tool-Familiarization.txt
146 Bytes
26. Malware Analysis for SOC Analysts/15. Intro-to-Malware-Analysis-Behavioral-Analysis-Tool-Familiarization.txt
146 Bytes
26. Malware Analysis for SOC Analysts/14. Intro-to-Malware-Analysis-Behavioral-Analysis-Tool-Familiarization.txt
146 Bytes
26. Malware Analysis for SOC Analysts/11. Intro-to-Malware-Analysis-Behavioral-Analysis-Tool-Familiarization.txt
146 Bytes
26. Malware Analysis for SOC Analysts/17. Intro-to-Malware-Analysis-Behavioral-Analysis-Tool-Familiarization.txt
146 Bytes
26. Malware Analysis for SOC Analysts/18. Intro-to-Malware-Analysis-Behavioral-Analysis-Tool-Familiarization.txt
146 Bytes
26. Malware Analysis for SOC Analysts/19. Intro-to-Malware-Analysis-Behavioral-Analysis-Tool-Familiarization.txt
146 Bytes
26. Malware Analysis for SOC Analysts/21. Intro-to-Malware-Analysis-Behavioral-Analysis-Tool-Familiarization.txt
146 Bytes
26. Malware Analysis for SOC Analysts/20. Intro-to-Malware-Analysis-Behavioral-Analysis-Tool-Familiarization.txt
146 Bytes
26. Malware Analysis for SOC Analysts/12. Intro-to-Malware-Analysis-Behavioral-Analysis-Tool-Familiarization.txt
146 Bytes
26. Malware Analysis for SOC Analysts/13. Intro-to-Malware-Analysis-Behavioral-Analysis-Tool-Familiarization.txt
146 Bytes
05. Intermediate Lab Option/6. VirtualBox-Lab-Environment-Part-2-Metasploitable-2-and-Windows-10.txt
145 Bytes
05. Intermediate Lab Option/4. Install-Metasploitable-and-Win10.txt
145 Bytes
05. Intermediate Lab Option/5. VirtualBox-Lab-Environment-Part-2-Metasploitable-2-and-Windows-10.txt
145 Bytes
23. Cyber Threat Intelligence/10. Operationalizing-Crown-Jewell-Analysis-PIR-and-the-Collection-Plan.txt
145 Bytes
11. Introduction to Windows Forensics/2. Intro-to-Windows-Endpoint-Forensic-Analysis-Artifacts.txt
144 Bytes
11. Introduction to Windows Forensics/7. Windows-Forensics.txt
144 Bytes
11. Introduction to Windows Forensics/17. Windows-Forensics.txt
144 Bytes
11. Introduction to Windows Forensics/19. Windows-Forensics.txt
144 Bytes
11. Introduction to Windows Forensics/15. Windows-Forensics.txt
144 Bytes
11. Introduction to Windows Forensics/11. Windows-Forensics.txt
144 Bytes
11. Introduction to Windows Forensics/2. Windows-Forensics.txt
144 Bytes
11. Introduction to Windows Forensics/23. Windows-Forensics.txt
144 Bytes
11. Introduction to Windows Forensics/21. Windows-Forensics.txt
144 Bytes
11. Introduction to Windows Forensics/3. Windows-Forensics.txt
144 Bytes
11. Introduction to Windows Forensics/25. Windows-Forensics.txt
144 Bytes
11. Introduction to Windows Forensics/1. Intro-to-Windows-Endpoint-Forensic-Analysis-Artifacts-VMware-Lab-.txt
144 Bytes
11. Introduction to Windows Forensics/13. Windows-Forensics.txt
144 Bytes
11. Introduction to Windows Forensics/5. Windows-Forensics.txt
144 Bytes
11. Introduction to Windows Forensics/9. Windows-Forensics.txt
144 Bytes
21. Mr. Robot Exercise/5. Mr-Robot-Exercise-C2-Part-2.txt
142 Bytes
06. Advanced Lab Option/16. Clustering-Proxmox.txt
140 Bytes
16. Threat Hunting/4. Threat-Hunting-with-Splunk-Part-3-Lateral-Movement-Walkthrough.txt
140 Bytes
05. Intermediate Lab Option/7. Windows-and-Metasploitable.txt
139 Bytes
05. Intermediate Lab Option/8. Windows-and-Metasploitable.txt
139 Bytes
26. Malware Analysis for SOC Analysts/2. Setting-Up-The-Windows-FLARE-VM-and-Installing-Course-Material.txt
139 Bytes
23. Cyber Threat Intelligence/6. Unified-Kill-Chain.txt
138 Bytes
21. Mr. Robot Exercise/7. Mr-Robot-Exercise-C2-Walkthrough.txt
136 Bytes
26. Malware Analysis for SOC Analysts/10. Online-Sandboxes.txt
136 Bytes
24. Security Fundamentals (CompTIA Security+ Objectives)/4. Study-Guide.txt
135 Bytes
24. Security Fundamentals (CompTIA Security+ Objectives)/2. Study-Guide.txt
135 Bytes
24. Security Fundamentals (CompTIA Security+ Objectives)/16. Study-Guide.txt
135 Bytes
24. Security Fundamentals (CompTIA Security+ Objectives)/18. Study-Guide.txt
135 Bytes
24. Security Fundamentals (CompTIA Security+ Objectives)/6. Study-Guide.txt
135 Bytes
24. Security Fundamentals (CompTIA Security+ Objectives)/14. Study-Guide.txt
135 Bytes
24. Security Fundamentals (CompTIA Security+ Objectives)/12. Study-Guide.txt
135 Bytes
24. Security Fundamentals (CompTIA Security+ Objectives)/10. Study-Guide.txt
135 Bytes
24. Security Fundamentals (CompTIA Security+ Objectives)/8. Study-Guide.txt
135 Bytes
24. Security Fundamentals (CompTIA Security+ Objectives)/9. Study-Guide.txt
135 Bytes
11. Introduction to Windows Forensics/37. Recovering-Deleted-Files.txt
134 Bytes
16. Threat Hunting/3. Threat-Hunting-with-Splunk-Part-2-Initial-Access-Walkthrough.txt
134 Bytes
26. Malware Analysis for SOC Analysts/24. Behavoiral-Analysis-Memory-Capture-with-DumpIT.txt
134 Bytes
12. SIEMs/8. Wazuh-Part-1.txt
131 Bytes
05. Intermediate Lab Option/2. Install-pfSense-and-Kail.txt
130 Bytes
05. Intermediate Lab Option/9. Install-Domain-Controller.txt
130 Bytes
05. Intermediate Lab Option/3. Install-pfSense-and-Kali.txt
130 Bytes
25. Network Traffic Analysis/5. Configuring-Prfiles-and-Filters-in-Wireshark.txt
129 Bytes
05. Intermediate Lab Option/11. VirtualBox-Lab-Environment-Part-5-Domain-Joining.txt
128 Bytes
16. Threat Hunting/2. Cyber-Threat-Hunting-with-Splunk-Recon-Walkthrough.txt
128 Bytes
26. Malware Analysis for SOC Analysts/4. Safe-Malware-Handling.txt
127 Bytes
27. Purple Teaming/9. Purple-Team-Exercise-3-Part-3-Snort-.txt
127 Bytes
23. Cyber Threat Intelligence/1. Intro-to-CTI.txt
125 Bytes
05. Intermediate Lab Option/1. Install-pfSense-and-Kali.txt
124 Bytes
22. WiFi Pentesting/3. Kali-and-WiFi-Adaptor-Setup.txt
123 Bytes
22. WiFi Pentesting/5. WiFi-Pentesting-WPA2.txt
123 Bytes
22. WiFi Pentesting/6. MitM-Attack-Walkthrough.txt
121 Bytes
25. Network Traffic Analysis/4. Introduction-to-Wireshark.txt
121 Bytes
26. Malware Analysis for SOC Analysts/7. Static-Analysis.txt
121 Bytes
26. Malware Analysis for SOC Analysts/6. Static-Analysis-Part-1.txt
121 Bytes
26. Malware Analysis for SOC Analysts/27. Behavioral-Analysis-Walkthrough.txt
121 Bytes
13. Bad USB Attacks/4. DIY-Rubber-Ducky-from-USB-Flash-Drive.txt
120 Bytes
19. Vulnerability Scanning/2. Vulnerability-Scanning-Mitigation-Walkthrough.txt
120 Bytes
22. WiFi Pentesting/7. MAC-Address-Changing-Walkthrough.txt
120 Bytes
22. WiFi Pentesting/8. DNS-Spoofing-Walkthrough.txt
120 Bytes
25. Network Traffic Analysis/1. Intro-to-Network-Traffic-Analysis.txt
120 Bytes
26. Malware Analysis for SOC Analysts/1. Malware-Analysis-Primer.txt
120 Bytes
11. Introduction to Windows Forensics/35. MemprocFS.txt
119 Bytes
11. Introduction to Windows Forensics/31. Memory.txt
119 Bytes
25. Network Traffic Analysis/6. Analyze-Traffic-With-Wireshark.txt
118 Bytes
26. Malware Analysis for SOC Analysts/8. Static-Analysis-Walkthrough.txt
118 Bytes
27. Purple Teaming/7. Purple-Team-Exercise-3.txt
118 Bytes
10. Email and Phishing Analysis/3. Analyzing-the-Body-of-Emails.txt
117 Bytes
11. Introduction to Windows Forensics/25. Browser-Forensics.txt
117 Bytes
11. Introduction to Windows Forensics/29. Browser-Forensics.txt
117 Bytes
11. Introduction to Windows Forensics/26. Browser-Forensics.txt
117 Bytes
11. Introduction to Windows Forensics/28. Browser-Forensics.txt
117 Bytes
12. SIEMs/3. SPlunk-Sysmon.txt
117 Bytes
24. Security Fundamentals (CompTIA Security+ Objectives)/1. CompTIA-Security-SY0-701-Study-Guide.txt
116 Bytes
25. Network Traffic Analysis/3. Analyzing-Network-Traffic-with-TCPdump.txt
116 Bytes
26. Malware Analysis for SOC Analysts/5. Malware-Analysis-Final-Configuration.txt
116 Bytes
06. Advanced Lab Option/17. Re-Arming-Windows-Evaluation-VMs.txt
115 Bytes
26. Malware Analysis for SOC Analysts/26. Memory-Analysis.txt
115 Bytes
26. Malware Analysis for SOC Analysts/25. Memory-Analysis.txt
115 Bytes
13. Bad USB Attacks/3. DIY-Rubber-Ducky-Raspberry-Pi-Pico.txt
114 Bytes
19. Vulnerability Scanning/1. Intro-to-Vulnerability-Scanning-Walkthrough.txt
114 Bytes
15. Honey Pots/4. Intro-to-Analyzing-Honey-Pot-Data.txt
113 Bytes
15. Honey Pots/3. Intro-to-Analyzing-Honey-Pot-Data.txt
113 Bytes
15. Honey Pots/5. Intro-to-Analyzing-Honey-Pot-Data.txt
113 Bytes
23. Cyber Threat Intelligence/8. PIR.txt
113 Bytes
11. Introduction to Windows Forensics/41. Forensics-CTF-Walkthrough.txt
112 Bytes
12. SIEMs/7. Configure-Elastic-Walkthrough.txt
112 Bytes
16. Threat Hunting/1. Threat-Hunting-with-Splunk-Setup-Walkthrough.txt
112 Bytes
19. Vulnerability Scanning/3. Vulnerability-Scanning-Reporting-Walkthrough.txt
112 Bytes
23. Cyber Threat Intelligence/2. Lockheed-Martin-Kill-chain.txt
112 Bytes
25. Network Traffic Analysis/9. Snort-in-pfSense-Pre-Built-Rules.txt
112 Bytes
27. Purple Teaming/8. Purple-Team-Exercise-3.txt
112 Bytes
22. WiFi Pentesting/9. Evil-Portal-Walkthrough.txt
111 Bytes
12. SIEMs/6. Elastic-Part-1-Install-Elastic-Walkthrough.txt
110 Bytes
23. Cyber Threat Intelligence/5. ATT-CK-Navigator.txt
110 Bytes
27. Purple Teaming/1. Intro-to-Purple-Teaming.txt
110 Bytes
03. Quick Start Lab Option/1. Virtual-Lab-Quick-Start-Guide.txt
109 Bytes
17. Reverse Engineering/24. Walkthrough.txt
109 Bytes
17. Reverse Engineering/23. Walkthrough.txt
109 Bytes
17. Reverse Engineering/26. Walkthrough.txt
109 Bytes
17. Reverse Engineering/22. Walkthrough.txt
109 Bytes
17. Reverse Engineering/25. Walkthrough.txt
109 Bytes
17. Reverse Engineering/19. Walkthrough.txt
109 Bytes
17. Reverse Engineering/20. Walkthrough.txt
109 Bytes
17. Reverse Engineering/21. Walkthrough.txt
109 Bytes
25. Network Traffic Analysis/8. Snort-on-pfSense-Custom-Rules.txt
109 Bytes
13. Bad USB Attacks/3. DIY-Rubber-Ducky.txt
108 Bytes
14. Incident Response Exercises/7. Incident-Response-Exercise-3.txt
108 Bytes
14. Incident Response Exercises/3. Incident-Response-Exercise-Walkthrough.txt
108 Bytes
14. Incident Response Exercises/4. Incident-Response-Exercise-1.txt
108 Bytes
02. Introduction to Home Virtual Labs/1. Home-Lab-Intro.txt
107 Bytes
06. Advanced Lab Option/1. Intro-to-Proxmox-Lab-Set-Up.txt
107 Bytes
10. Email and Phishing Analysis/4. Email-Attachment-Analysis.txt
107 Bytes
11. Introduction to Windows Forensics/39. Windows-Forensics-CTF-Intro.txt
107 Bytes
25. Network Traffic Analysis/7. Snort-on-pfSense.txt
107 Bytes
10. Email and Phishing Analysis/1. Intro-to-Phishing.txt
106 Bytes
21. Mr. Robot Exercise/3. Mr.Robot-Exercise-Initial-Access-Walkthrough.txt
106 Bytes
21. Mr. Robot Exercise/1. Intro-to-Mr.Robot-Exercise.txt
106 Bytes
26. Malware Analysis for SOC Analysts/23. Memory-Analysis.txt
106 Bytes
21. Mr. Robot Exercise/8. Mr.Robot-Exercise-Wireless-Attack-Walkthrough.txt
105 Bytes
13. Bad USB Attacks/2. USB-Rubber-Ducky.txt
104 Bytes
22. WiFi Pentesting/2. Intro-to-WiFi-Pentesting-Walkthrough.txt
104 Bytes
12. SIEMs/13. Wazuh-CTF-Walkthrough.txt
103 Bytes
25. Network Traffic Analysis/2. Intro-to-TCPDUMP.txt
103 Bytes
27. Purple Teaming/3. Purple-Team-Exercise-1.txt
103 Bytes
27. Purple Teaming/2. Purple-Team-Exercise-1.txt
103 Bytes
14. Incident Response Exercises/5. Incident-Response-Exercise-2-Walkthrough.txt
102 Bytes
15. Honey Pots/1. Honey-Pots.txt
102 Bytes
15. Honey Pots/2. Honey-Pots.txt
102 Bytes
27. Purple Teaming/6. Purple-Team-Exercies-2.txt
102 Bytes
27. Purple Teaming/5. Puple-Team-Exercise-2.txt
102 Bytes
27. Purple Teaming/4. Purple-Team-Exercise-2.txt
102 Bytes
06. Advanced Lab Option/5. Proxmox-Home-Lab.txt
101 Bytes
06. Advanced Lab Option/4. Proxmox-Home-Lab.txt
101 Bytes
06. Advanced Lab Option/15. Proxmox-Home-Lab.txt
101 Bytes
06. Advanced Lab Option/2. Proxmox-Home-Lab.txt
101 Bytes
06. Advanced Lab Option/6. Proxmox-Home-Lab.txt
101 Bytes
06. Advanced Lab Option/3. Proxmox-Home-Lab.txt
101 Bytes
06. Advanced Lab Option/13. Proxmox-Home-Lab.txt
101 Bytes
06. Advanced Lab Option/7. Proxmox-Home-Lab.txt
101 Bytes
06. Advanced Lab Option/12. Proxmox-Home-Lab.txt
101 Bytes
06. Advanced Lab Option/11. Proxmox-Home-Lab.txt
101 Bytes
06. Advanced Lab Option/8. Proxmox-Home-Lab.txt
101 Bytes
06. Advanced Lab Option/1. Proxmox-Home-Lab.txt
101 Bytes
06. Advanced Lab Option/14. Proxmox-Home-Lab.txt
101 Bytes
06. Advanced Lab Option/9. Proxmox-Home-Lab.txt
101 Bytes
10. Email and Phishing Analysis/2. Email-Header-Analysis-Walkthrough.txt
101 Bytes
11. Introduction to Windows Forensics/39. Forensic-CTF-Intro.txt
101 Bytes
23. Cyber Threat Intelligence/4. Intro-to-MITRE-ATT-CK.txt
101 Bytes
24. Security Fundamentals (CompTIA Security+ Objectives)/9. Hashing-vs-Encryption.txt
101 Bytes
21. Mr. Robot Exercise/2. Mr.Robot-Exercise-Pre-Attack-Walkthrough.txt
100 Bytes
22. WiFi Pentesting/10. WPA3-Pentesting.txt
100 Bytes
23. Cyber Threat Intelligence/7. Crown-Jewell-Analysis.txt
100 Bytes
02. Introduction to Home Virtual Labs/3. Install-VirtualBox-Walkthrough.txt
99 Bytes
25. Network Traffic Analysis/8. Custom-Snort-Rules.txt
98 Bytes
12. SIEMs/1. Install-Splunk.txt
97 Bytes
17. Reverse Engineering/15. Download-REXOR-RE3-Zip.txt
97 Bytes
04. Basic Lab Option/1. Basic-Lab-Option.txt
95 Bytes
12. SIEMs/2. Intro-to-Splunk.txt
95 Bytes
13. Bad USB Attacks/1. Bad-USB-Attacks.txt
95 Bytes
23. Cyber Threat Intelligence/9. Collection-Plan.txt
95 Bytes
23. Cyber Threat Intelligence/3. Pyramid-of-Pain.txt
95 Bytes
14. Incident Response Exercises/8. Report-Writing.txt
94 Bytes
20. C2 Frameworks/1. C2-Frameworks-Walkthrough.txt
93 Bytes
20. C2 Frameworks/3. C2-Frameworks-Walkthough.txt
93 Bytes
20. C2 Frameworks/2. C2-Frameworks-Walkthrough.txt
93 Bytes
20. C2 Frameworks/4. C2-Frameworks-Walkthrough.txt
93 Bytes
26. Malware Analysis for SOC Analysts/19. Sysmon-Tuning.txt
93 Bytes
11. Introduction to Windows Forensics/42. Velocirapor.txt
92 Bytes
11. Introduction to Windows Forensics/44. Velociraptor.txt
92 Bytes
11. Introduction to Windows Forensics/45. Velociraptor.txt
92 Bytes
24. Security Fundamentals (CompTIA Security+ Objectives)/10. Digital-Signatures-Walkthrough.txt
92 Bytes
22. WiFi Pentesting/1. WiFi-Basics.txt
91 Bytes
07. Bonus Lab Content/1. Download-Vulnerable-Appliance.txt
85 Bytes
17. Reverse Engineering/9. Download-REXOR-RE-Zip.txt
69 Bytes
17. Reverse Engineering/13. Download-REXCOR-RE2-Zip.txt
69 Bytes
18. Web Application Pentesting/17. Download-DDII-LAMP-Stack-ISO.txt
69 Bytes
08. Ultimate Cyber Security Primer/3. Cisco-Learning-Content-Binary-Game.txt
57 Bytes
01. Welcome/1. Course-Discord-Server.txt
29 Bytes
02. Introduction to Home Virtual Labs/2. Course-Discord-Server.txt
29 Bytes
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!