MuerBT磁力搜索 BT种子搜索利器 免费下载BT种子,超5000万条种子数据

DIY Cybersecurity Degree

磁力链接/BT种子名称

DIY Cybersecurity Degree

磁力链接/BT种子简介

种子哈希:dec06a2ae7e430b894645ac6c133577f8f6690fd
文件大小: 217.34G
已经下载:488次
下载速度:极快
收录时间:2025-01-21
最近下载:2025-10-17

移花宫入口

移花宫.com邀月.com怜星.com花无缺.comyhgbt.icuyhgbt.top

磁力链接下载

magnet:?xt=urn:btih:DEC06A2AE7E430B894645AC6C133577F8F6690FD
推荐使用PIKPAK网盘下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看

下载BT种子文件

磁力链接 迅雷下载 PIKPAK在线播放 世界之窗 小蓝俱乐部 含羞草 欲漫涩 逼哩逼哩 成人快手 51品茶 51动漫 91短视频 抖音Max TikTok成人版 PornHub 暗网Xvideo 草榴社区 哆哔涩漫 呦乐园 萝莉岛 搜同

最近搜索

chocomilk extended 52幼幼 七月 ny tokyo hot 大乱交sp2006 有纱 core 小粉嫩嫩少女 170小飞 nina妈妈 空宝 boss大神 fc2ppv 阿朱 金主 丝足交 小乐乐小妖 秀人嫩模 写真女神小丁 爱二人 王露娜 性感妖娆 富二代调教 完美口交 纯情女大学生 整学期女生宿舍自慰大秀 まみれにするデカチン巨乳ふたなり体育教師 主动拍 疯狂抽插 如狼似虎之 一群人

文件列表

  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/101 - Final Stretch/002 Study With Me.mp4 1.9 GB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/101 - Final Stretch/001 Recording of our Live AMA (aka AAA - Ask Angela Anything).mp4 713.4 MB
  • CompTIA/CompTIA A+ Core 1 (220-1101)/5. Troubleshooting Hardware and Networking/5.2 Troubleshooting PC Components.mp4 697.8 MB
  • CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.1 Network Cables.mp4 637.3 MB
  • CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.4 Random-access Memory.mp4 579.5 MB
  • Job Tips/Behavioral Interview Prep/03. General Tips.mp4 571.0 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.4 Technical Controls - The Basics.mp4 551.2 MB
  • CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.6 Motherboards.mp4 540.8 MB
  • CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.5 Storage Devices.mp4 527.8 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.3 Non-Technical Controls - The Rest.mp4 526.4 MB
  • CompTIA/CompTIA A+ Core 1 (220-1101)/1. Mobile Devices/1.2 Laptop Hardware and Components.mp4 525.8 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.8 How do we Analyze Risk.mp4 509.3 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.23 Social Engineering and Physical Attacks.mp4 498.2 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.2 Non-Technical Controls - The Basics.mp4 486.5 MB
  • CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.2 Peripheral and Video Cables.mp4 485.9 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/4. Reporting and Communication/4.3 Communication During a Pentest.mp4 478.0 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.14 Frameworks, Audits and Policy.mp4 473.1 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.10 How do we Document and Train for Risk.mp4 472.2 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.15 IAM Policies and Procedures.mp4 463.2 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.9 How do we Prioritize, Communicate Risk.mp4 460.5 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.16 Cloud Attacks.mp4 455.2 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.31 Other Cloud Service Threats.mp4 454.8 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/4. Operational Procedures/4.8 Communication and Professionalism Techniques.mp4 449.5 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.32 Mitigate Specific Attack Types.mp4 445.7 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/2. Software and Systems Security/2.2 Network Architecture and Segmentation.mp4 444.4 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/4. Reporting and Communication/4.2 Recommended Remediations.mp4 442.5 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.17 Mobile Attacks.mp4 439.8 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.20 ICS SCADA and IIOT Vulnerabilities.mp4 430.4 MB
  • CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.9 Expansion Cards.mp4 427.8 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/4. Reporting and Communication/4.1 Components of Written Reports.mp4 425.6 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/2. Security/2.6 Social Engineering Techniques and Exploits.mp4 425.4 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/1. Planning and Scoping/1.4 Legal Concepts and Documents.mp4 425.4 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/2. Software and Systems Security/2.3 Identity and Access Management.mp4 423.5 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.6 What is Risk.mp4 422.9 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/1. Planning and Scoping/1.7 Professionalism and Integrity.mp4 416.4 MB
  • Job Tips/Behavioral Interview Prep/02. What Are Behavioral Interviews.mp4 408.0 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.12 Controls.mp4 407.9 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/2. Information Gathering and Vunerabilities/2.6 Vulnerability Scanning.mp4 403.8 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.5 Technical Controls - The Rest.mp4 400.8 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.13 Policies and Procedures.mp4 397.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/58 - Day 58 - Web Foundation Bootstrap/005 Day 58 Project - A Startup Website for TinDog.mp4 395.9 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.2 Denial of Service.mp4 394.4 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.8 OWASP Top 10 Web App Security Risks.mp4 390.5 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.1 Exploit Resources.mp4 387.4 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/5. Tools and Code Analysis/5.1 Basic Programming Concepts.mp4 387.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 7 - Malware Defenses/7.2 Malware Defenses Part 2.mp4 386.3 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/2. Software and Systems Security/2.8 Hardware Assurance.mp4 385.0 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/2. Security/2.4 Wireless SOHO Security.mp4 381.6 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.15 Vulnerability Remediation and Mitigation.mp4 381.2 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.7 Wireless Attacks.mp4 380.6 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/2. Security/2.5 Malware Types.mp4 380.4 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.6 Threat Actors.mp4 377.7 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/2. Software and Systems Security/2.9 Software Assurance and Secure Coding.mp4 376.2 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.18 IoT Hacking.mp4 375.3 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/4. Incident Response/4.4 Digital Forensics.mp4 373.2 MB
  • CompTIA/CompTIA A+ Core 1 (220-1101)/2. Networking/2.11 Network Tools.mp4 373.2 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.33 Mitigate Vulnerability Types.mp4 371.1 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.14 Vulnerability Identification and Validation.mp4 366.0 MB
  • CompTIA/CompTIA A+ Core 1 (220-1101)/4. Virtualization and Cloud Computing/4.2 Virtualization.mp4 365.7 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.1 Privacy vs. Security.mp4 365.2 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/2. Information Gathering and Vunerabilities/2.4 Web and Cloud Discovery and Enumeration.mp4 364.7 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/4. Incident Response/4.2 Incident Response Phases.mp4 359.5 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/2. Security/2.2 Logical User Security Concepts.mp4 357.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/58 - Day 58 - Web Foundation Bootstrap/004 Bootstrap Components.mp4 355.8 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.26 Privilege Escalation.mp4 354.6 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/2. Information Gathering and Vunerabilities/2.7 Nmap.mp4 354.3 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.11 Email Analysis.mp4 353.8 MB
  • CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.11 Printer Configuration.mp4 350.8 MB
  • CompTIA/CompTIA A+ Core 1 (220-1101)/1. Mobile Devices/1.3 Mobile Device Ports and Accessories.mp4 348.8 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.30 Cloud Service Model Threats.mp4 346.9 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.17 Inhibitors to Remediation.mp4 346.8 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.14 Session Attacks.mp4 344.7 MB
  • CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.8 Processors.mp4 344.2 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/4. Reporting and Communication/4.4 Post Report Delivery Activities.mp4 343.6 MB
  • CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.10 Power Supplies.mp4 343.3 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/4. Incident Response/4.1 Incident Response Communication.mp4 341.6 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.4 Password Attacks.mp4 341.4 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/5. Tools and Code Analysis/5.2 Analyze Scripts Or Code For Use In A Pentest.mp4 341.0 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.1 Trend Analysis.mp4 338.9 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/4. Operational Procedures/4.4 Equipment and Personal Safety Procedures.mp4 338.9 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.29 Cloud Deployment Model Threats.mp4 338.8 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.11 Threat Research.mp4 338.7 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/1. Planning and Scoping/1.5 Standards and Methodologies.mp4 338.6 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/2. Information Gathering and Vunerabilities/2.5 Defense Detection and Avoidance.mp4 337.5 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/2. Information Gathering and Vunerabilities/2.2 Target Recon.mp4 336.6 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/3. Software Troubleshooting/3.1 Windows OS Issues.mp4 336.2 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.11 SQL Injection Attacks.mp4 335.7 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.5 Threat Classification.mp4 333.7 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/3. Software Troubleshooting/3.5 Mobile OS and Application Issues.mp4 333.6 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.12 Threat Modeling Methodologies.mp4 331.2 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.14 Firewall Configurations.mp4 331.0 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/4. Operational Procedures/4.3 Workstation Backup and Recovery Methods.mp4 330.2 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.28 Detection Avoidance.mp4 329.4 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.6 Endpoint Behavior Analysis.mp4 329.2 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.8 Log Review.mp4 328.2 MB
  • CompTIA/CompTIA Network+ (N10-008)/4. Network Security/4.11 Network Hardening - Best Practices.mp4 327.8 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.16 Vulnerability Scanning Parameters and Criteria.mp4 326.5 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.3 ARP and DNS Poisoning.mp4 325.6 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/1. Operating Systems/1.12 Desktop Operating Systems.mp4 319.7 MB
  • CompTIA/CompTIA Security+ (SY0-601)/2. Cryptography/2.4 Secure Protocols.mp4 319.7 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.7 Intelligence Cycle.mp4 319.0 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/1. Planning and Scoping/1.2 Regulation and Compliance.mp4 317.6 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.25 Premises and Vehicle Systems Threats.mp4 316.3 MB
  • CompTIA/CompTIA A+ Core 1 (220-1101)/2. Networking/2.2 Networking Hardware.mp4 315.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/65 - Day 65 - Web Design School - How to Create a Website that People will Love/006 Web Design in Practice - Let's apply what we've learnt!.mp4 313.8 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/1. Operating Systems/1.9 Windows Command Line Tools.mp4 311.8 MB
  • CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.2 OSI Model.mp4 311.4 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/3. Software Troubleshooting/3.3 PC Security Issues.mp4 310.6 MB
  • CompTIA/CompTIA Security+ (SY0-601)/1. Threats, Attacks, and Vulnerabilities/1.19 Threat Actors and Vectors.mp4 307.0 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.15 API Attacks.mp4 306.0 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.24 Mobile Technology Threats.mp4 305.8 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/4. Operational Procedures/4.7 Incident Response Policies and Procedures.mp4 305.5 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.12 Other Injection Attacks.mp4 304.5 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.27 Persistence.mp4 303.0 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.15 Data Loss Prevention.mp4 301.5 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.26 Controller System Threats.mp4 301.4 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/1. Planning and Scoping/1.6 Scoping an Engagement.mp4 299.2 MB
  • CompTIA/CompTIA A+ Core 1 (220-1101)/2. Networking/2.1 Ports and Protocols.mp4 298.4 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.27 IoT and Embedded System Threats.mp4 297.2 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/2. Software and Systems Security/2.1 Asset Tagging and Change Management.mp4 296.0 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/3. Software Troubleshooting/3.6 Mobile OS and Application Security Issues.mp4 295.9 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/1. Operating Systems/1.15 Using Microsoft Control Panel Utilities.mp4 293.9 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/1. Operating Systems/1.8 Windows Client Networking Configuration.mp4 292.9 MB
  • Job Tips/Behavioral Interview Prep/12. Production Outage.mp4 292.0 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.13 Blacklisting and Whitelisting.mp4 291.6 MB
  • CompTIA/CompTIA Security+ (SY0-601)/2. Cryptography/2.8 Keys.mp4 291.2 MB
  • CompTIA/CompTIA A+ Core 1 (220-1101)/5. Troubleshooting Hardware and Networking/5.5 Troubleshooting Printers.mp4 290.7 MB
  • CompTIA/CompTIA A+ Core 1 (220-1101)/1. Mobile Devices/1.4. Mobile Device Displays.mp4 289.5 MB
  • CompTIA/CompTIA Network+ (N10-008)/3. Network Operations/3.8 Security Policies.mp4 289.3 MB
  • CompTIA/CompTIA Security+ (SY0-601)/7. Operational Security and Incident Response/7.8 Investigational Data Sources.mp4 289.1 MB
  • CompTIA/CompTIA A+ Core 1 (220-1101)/5. Troubleshooting Hardware and Networking/5.1 Troubleshooting Methodology.mp4 287.7 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.19 Threat Hunting.mp4 286.0 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.9 Information Sharing and Analysis Centers.mp4 285.6 MB
  • CompTIA/CompTIA Security+ (SY0-601)/7. Operational Security and Incident Response/7.2 Packet Capture and Replay.mp4 285.2 MB
  • CompTIA/CompTIA Security+ (SY0-601)/2. Cryptography/2.5 Symmetric vs. Asymmetric Encryption.mp4 285.1 MB
  • CompTIA/CompTIA Security+ (SY0-601)/8. Governance, Risk and Compliance/8.2 Regulations, Standards and Frameworks.mp4 284.5 MB
  • CompTIA/CompTIA A+ Core 1 (220-1101)/2. Networking/2.9 Internet Connection Types.mp4 284.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/14 - Day 14 - Beginner - Higher Lower Game Project/002 Solution & Walkthrough of the Higher Lower Game.mp4 282.9 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/2. Information Gathering and Vunerabilities/2.3 Host Discovery and Enumeration.mp4 282.9 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/4. Incident Response/4.3 Indicators of Compromise.mp4 279.4 MB
  • CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.3 OSI and TCP-IP Models.mp4 279.2 MB
  • CompTIA/CompTIA Security+ (SY0-601)/7. Operational Security and Incident Response/7.7 Digital Forensics Concepts.mp4 278.8 MB
  • CompTIA/CompTIA Security+ (SY0-601)/6. Operational Resliency/6.1 Hardware Redundancy.mp4 277.4 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.24 Post Exploitation Enumeration and Tools.mp4 277.1 MB
  • CompTIA/CompTIA Security+ (SY0-601)/8. Governance, Risk and Compliance/8.11 Risk Management Concepts Business Impact Analysis.mp4 276.7 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/2. Software and Systems Security/2.5 Honeypots and Active Defense.mp4 275.3 MB
  • CompTIA/CompTIA Security+ (SY0-601)/8. Governance, Risk and Compliance/8.3 Spotlight on General Data Protection Regulation.mp4 272.5 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/1. Planning and Scoping/1.3 Common Pentest Restrictions.mp4 272.4 MB
  • CompTIA/CompTIA Security+ (SY0-601)/4. Implementing Security/4.2 Physical Security.mp4 272.0 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.19 Data Storage System Vulnerabilities.mp4 271.9 MB
  • CompTIA/CompTIA Security+ (SY0-601)/1. Threats, Attacks, and Vulnerabilities/1.14 Network Attacks - Wireless.mp4 269.2 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.5 Flow Analysis.mp4 269.2 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/1. Operating Systems/1.10 Windows Network Commands.mp4 267.4 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.20 Software Assessment Tools and Techniques.mp4 267.4 MB
  • CompTIA/CompTIA Security+ (SY0-601)/8. Governance, Risk and Compliance/8.4 Organizational Security Policies - Personnel.mp4 266.3 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/2. Security/2.10 Mobile Device Security Solutions.mp4 265.1 MB
  • CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.23 Cloud and Networking Concepts.mp4 264.8 MB
  • CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.10 Fiber Cables and Connections.mp4 263.9 MB
  • CompTIA/CompTIA A+ Core 1 (220-1101)/4. Virtualization and Cloud Computing/4.1 Cloud Models and Services.mp4 263.0 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/1. Operating Systems/1.2 Mobile Operating Systems.mp4 261.5 MB
  • CompTIA/CompTIA A+ Core 1 (220-1101)/2. Networking/2.4 Networked Hosts and Services.mp4 260.9 MB
  • CompTIA/CompTIA Network+ (N10-008)/4. Network Security/4.3 Security - Defense in Depth.mp4 260.3 MB
  • CompTIA/CompTIA Security+ (SY0-601)/8. Governance, Risk and Compliance/8.9 Risk Management Concepts - Types & Strategies.mp4 260.3 MB
  • CompTIA/CompTIA Security+ (SY0-601)/4. Implementing Security/4.6 Host Security - Hardening.mp4 260.2 MB
  • CompTIA/CompTIA Network+ (N10-008)/4. Network Security/4.1 Security Concepts.mp4 259.9 MB
  • CompTIA/CompTIA Security+ (SY0-601)/2. Cryptography/2.9 IPSec.mp4 259.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 5 - Basic Static Analysis/5.3 Basic Static Analysis Part 3.mp4 259.8 MB
  • CompTIA/CompTIA Security+ (SY0-601)/1. Threats, Attacks, and Vulnerabilities/1.18 Threat Intelligence Vulnerability Databases Feed.mp4 258.9 MB
  • CompTIA/CompTIA Security+ (SY0-601)/3. Identity and Access Management/3.1 Authentication and Authorization.mp4 258.9 MB
  • CompTIA/CompTIA Network+ (N10-008)/4. Network Security/4.2 Security - Cryptography Basics.mp4 258.3 MB
  • CompTIA/CompTIA Security+ (SY0-601)/3. Identity and Access Management/3.2 Authentication Methods.mp4 258.0 MB
  • CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.3 Storage Device Cables.mp4 258.0 MB
  • Job Tips/Behavioral Interview Prep/11. Challenging Project.mp4 258.0 MB
  • CompTIA/CompTIA Security+ (SY0-601)/4. Implementing Security/4.8 Mobile Device Management and Enforcement.mp4 257.0 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/2. Security/2.11 Securing Web Browsers.mp4 257.0 MB
  • CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.11 Ethernet Standards.mp4 256.7 MB
  • CompTIA/CompTIA Network+ (N10-008)/2. Network Implementations/2.4 Wireless Infrastructure.mp4 256.5 MB
  • CompTIA/CompTIA Network+ (N10-008)/3. Network Operations/3.9 Organizational Documentation.mp4 256.1 MB
  • CompTIA/CompTIA Security+ (SY0-601)/2. Cryptography/2.7 Certificates.mp4 256.1 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.11 Apply Risk Management to our Supply Chains.mp4 255.1 MB
  • CompTIA/CompTIA Security+ (SY0-601)/1. Threats, Attacks, and Vulnerabilities/1.10 Network Attacks - DNS Attacks.mp4 255.1 MB
  • CompTIA/CompTIA Security+ (SY0-601)/1. Threats, Attacks, and Vulnerabilities/1.15 Vulnerabilities.mp4 254.9 MB
  • Job Tips/Behavioral Interview Prep/05. Team Conflict.mp4 254.6 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/2. Security/2.7 Microsoft OS Security - Permissions.mp4 253.8 MB
  • CompTIA/CompTIA Security+ (SY0-601)/4. Implementing Security/4.5 Host Security - Endpoint Protection.mp4 253.5 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.2 Intelligence Sources.mp4 253.5 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/4. Computer Hardware/4.7 Storage Hardware.mp4 252.4 MB
  • CompTIA/CompTIA Security+ (SY0-601)/8. Governance, Risk and Compliance/8.5 Organizational Security Policies - 3rd Party Risk.mp4 252.2 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/4. Operational Procedures/4.10 Implementing Remote Access Technologies.mp4 252.1 MB
  • CompTIA/CompTIA A+ Core 1 (220-1101)/5. Troubleshooting Hardware and Networking/5.4 Troubleshooting Display Issues.mp4 251.4 MB
  • CompTIA/CompTIA A+ Core 1 (220-1101)/2. Networking/2.3 Wireless Protocols.mp4 251.4 MB
  • Books/CompTIA/Network+/CompTIANetworkCertificationAll-in-OneExamGuideEighthEditionExamN10-008.pdf 250.7 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.10 Attack Frameworks.mp4 250.6 MB
  • Job Tips/Behavioral Interview Prep/10. Past Mistake.mp4 250.6 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/1. Operating Systems/1.14 Linux Commands.mp4 250.6 MB
  • CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.9 Copper Cables and Connections.mp4 250.1 MB
  • CompTIA/CompTIA A+ Core 1 (220-1101)/2. Networking/2.7 IP Address Format.mp4 250.1 MB
  • CompTIA/CompTIA Security+ (SY0-601)/2. Cryptography/2.6 PKI Concepts.mp4 249.2 MB
  • CompTIA/CompTIA Security+ (SY0-601)/4. Implementing Security/4.3 Wireless Security.mp4 249.2 MB
  • CompTIA/CompTIA Security+ (SY0-601)/7. Operational Security and Incident Response/7.5 Pentesting Techniques.mp4 248.1 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/4. Computer Hardware/4.2 Common Hardware.mp4 247.7 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.7 Malware Analysis.mp4 246.8 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.7 How do we Calculate Risk.mp4 246.2 MB
  • CompTIA/CompTIA Security+ (SY0-601)/4. Implementing Security/4.11 Network Security - Segmentation.mp4 246.1 MB
  • CompTIA/CompTIA Security+ (SY0-601)/1. Threats, Attacks, and Vulnerabilities/1.3 Malware.mp4 245.8 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.21 AI and Machine Learning.mp4 245.0 MB
  • Books/CompTIA/IT Fundamentals+/CompTIA IT Fundamentals Study Guide Exam FC0-U51 (1).pdf 245.0 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.16 Network Access Control.mp4 244.5 MB
  • CompTIA/CompTIA Security+ (SY0-601)/3. Identity and Access Management/3.9 Access Control Schemes.mp4 244.0 MB
  • CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.4 Encapsulation.mp4 243.8 MB
  • CompTIA/CompTIA Network+ (N10-008)/4. Network Security/4.4 Security - Authentication Methods.mp4 242.1 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.13 Threat Intelligence Sharing, Supported Functions.mp4 242.0 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.3 Indicator Management.mp4 241.9 MB
  • CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.12 Printers.mp4 241.3 MB
  • CompTIA/CompTIA Security+ (SY0-601)/5. Cloud and Virtualization/5.2 Cloud Concepts.mp4 240.9 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.10 SIEM Review.mp4 240.5 MB
  • Job Tips/Behavioral Interview Prep/07. Strong Disagreement.mp4 240.2 MB
  • Job Tips/Behavioral Interview Prep/04. Low Performer.mp4 240.2 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/2. Security/2.3 Logical Device and Network Security Concepts.mp4 240.0 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/1. Operating Systems/1.6 Partitioning and File Systems.mp4 239.3 MB
  • CompTIA/CompTIA Security+ (SY0-601)/1. Threats, Attacks, and Vulnerabilities/1.7 Application Attacks - System Resources.mp4 239.1 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.22 Wireless Assessment Tools.mp4 238.7 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/5. Defense in Depth/1. System Hardening.zip 238.1 MB
  • CompTIA/CompTIA Network+ (N10-008)/3. Network Operations/3.10 High Availability and Disaster Recovery.mp4 237.8 MB
  • CompTIA/CompTIA A+ Core 1 (220-1101)/5. Troubleshooting Hardware and Networking/5.7 Troubleshooting Networks.mp4 237.5 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/2. Hardware/3. Starting it up/2. Putting it all together.mp4 237.3 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.18 Web App Scanners.mp4 237.2 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.9 Impact Analysis.mp4 237.2 MB
  • CompTIA/CompTIA Security+ (SY0-601)/4. Implementing Security/4.7 Mobile Device Deployment.mp4 237.1 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.6 MAC Spoofing.mp4 236.7 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/2. Software and Applications/2.1 Software Usage Requirements.mp4 235.7 MB
  • CompTIA/CompTIA A+ Core 1 (220-1101)/1. Mobile Devices/1.5 Mobile Device Network Connections.mp4 235.5 MB
  • CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.22 Datacenter Network Architecture.mp4 234.9 MB
  • CompTIA/CompTIA Security+ (SY0-601)/6. Operational Resliency/6.4 Backup and Recovery.mp4 234.8 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/1. Operating Systems/1.7 Post Installation Tasks.mp4 234.8 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.20 Scripting.mp4 233.3 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/2. Security/2.1 Implementing Physical Security Measures.mp4 233.2 MB
  • CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.6 Network Types.mp4 233.1 MB
  • CompTIA/CompTIA Network+ (N10-008)/5. Network Troubleshooting/5.14 Additional Network Commands.mp4 232.9 MB
  • CompTIA/CompTIA A+ Core 1 (220-1101)/5. Troubleshooting Hardware and Networking/5.6 Troubleshooting Mobile Devices.mp4 232.8 MB
  • CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.18 IP Addressing IPv6.mp4 232.7 MB
  • CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.5 Network Topologies.mp4 232.1 MB
  • CompTIA/CompTIA Security+ (SY0-601)/5. Cloud and Virtualization/5.5 Computing Types.mp4 231.8 MB
  • Job Tips/Behavioral Interview Prep/09. Work Distribution.mp4 231.6 MB
  • Splunk Training/3. Splunk Fundamentals 3/7. The internal Index.mp4 231.5 MB
  • CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.8 Service Provider Links.mp4 231.0 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.2 URL Analysis.mp4 230.8 MB
  • CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.13 IP Addressing Schemes and Contexts.mp4 230.0 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.17 Blackholes and Sinkholes.mp4 229.8 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/2. Security/2.9 Workstation Security Best Practices.mp4 228.9 MB
  • CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.14 IP Addressing IPv4.mp4 228.5 MB
  • CompTIA/CompTIA Security+ (SY0-601)/8. Governance, Risk and Compliance/8.1 Security Controls.mp4 227.7 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/2. Software and Systems Security/2.7 Certificate Management.mp4 226.9 MB
  • CompTIA/CompTIA Security+ (SY0-601)/1. Threats, Attacks, and Vulnerabilities/1.2 Social Engineering Techniques.mp4 225.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/007 Solution & Walkthrough for the Coffee Machine Code.mp4 225.3 MB
  • CompTIA/CompTIA Security+ (SY0-601)/8. Governance, Risk and Compliance/8.15 Privacy and Data Sensitivity - Other Areas.mp4 224.9 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.22 Container Vulnerabilities.mp4 224.8 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/4. Computer Hardware/4.6 Display Hardware.mp4 224.7 MB
  • CompTIA/CompTIA Security+ (SY0-601)/8. Governance, Risk and Compliance/8.13 Privacy, Data Sensitivity - Privacy Enhancing Tech.mp4 224.6 MB
  • CompTIA/CompTIA Security+ (SY0-601)/1. Threats, Attacks, and Vulnerabilities/1.11 Network Attacks - Layer 2 Attacks.mp4 224.5 MB
  • Job Tips/Behavioral Interview Prep/08. Sudden Onboarding.mp4 223.0 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.22 Continuous Integration and Deployment.mp4 223.0 MB
  • CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.20 Network Services.mp4 221.6 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/2. Information Gathering and Vunerabilities/2.1 DNS Recon.mp4 221.5 MB
  • CompTIA/CompTIA Network+ (N10-008)/2. Network Implementations/2.2 Routing and Bandwidth Management.mp4 221.5 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.3 DNS Analysis.mp4 221.4 MB
  • CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.19 Protocols and Ports.mp4 221.3 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.9 SSRF Attacks.mp4 220.3 MB
  • CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.7 Virtualization.mp4 220.1 MB
  • CompTIA/CompTIA Network+ (N10-008)/2. Network Implementations/2.3 Ethernet Switching.mp4 219.4 MB
  • CompTIA/CompTIA Network+ (N10-008)/5. Network Troubleshooting/5.3 Troubleshooting - Plan and Implement a Solution.mp4 218.4 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/1. Operating Systems/1.4 Installation Requirements.mp4 218.1 MB
  • CompTIA/CompTIA Security+ (SY0-601)/2. Cryptography/2.3 Hashing.mp4 217.7 MB
  • CompTIA/CompTIA Network+ (N10-008)/5. Network Troubleshooting/5.17 Network Service Issues.mp4 216.8 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.8 Commodity Malware.mp4 215.4 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/1. Operating Systems/1.5 OS Boot and Installation Methods.mp4 215.0 MB
  • CompTIA/CompTIA Network+ (N10-008)/4. Network Security/4.5 Security - Assessment Types.mp4 214.9 MB
  • CompTIA/CompTIA Security+ (SY0-601)/3. Identity and Access Management/3.10 Account Management - Account Types.mp4 214.7 MB
  • CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.21 Network Services DNS.mp4 214.6 MB
  • CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.12 Cable Management.mp4 213.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 3 - Dynamic Analysis Part 1/3.2 Dynamic Analysis Part 1.2.mp4 213.4 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/4. Operational Procedures/4.5 Environmental Variables and Controls.mp4 212.8 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/4. Computer Hardware/4.4 Peripheral Devices.mp4 212.3 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.12 File System Permissions.mp4 212.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 6 - Packers/6.4 Packers Part 4.mp4 211.7 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.21 Virtual Environment Vulnerabilities.mp4 211.6 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/4. Computer Hardware/4.1 Central Processing Unit (CPU).mp4 211.5 MB
  • CompTIA/CompTIA Security+ (SY0-601)/4. Implementing Security/4.1 Application Security.mp4 211.5 MB
  • CompTIA/CompTIA A+ Core 1 (220-1101)/5. Troubleshooting Hardware and Networking/5.3 Troubleshooting Storage.mp4 211.2 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/4. Operational Procedures/4.2 Basic Change Management Best Practices.mp4 211.1 MB
  • CompTIA/CompTIA Network+ (N10-008)/4. Network Security/4.10 Physical Security.mp4 210.5 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/1. Operating Systems/1.11 Using Microsoft System Utilities.mp4 210.5 MB
  • CompTIA/CompTIA Security+ (SY0-601)/4. Implementing Security/4.12 Network Security - VPNs.mp4 210.4 MB
  • Splunk Training/6. Architecture 101/8. Introduction to Clustering Concepts.mp4 209.9 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/2. Software and Systems Security/2.4 Virtual Desktop Infrastructure, Containerization.mp4 209.4 MB
  • CompTIA/CompTIA Security+ (SY0-601)/6. Operational Resliency/6.3 Non-persistence Concepts.mp4 209.4 MB
  • CompTIA/CompTIA Network+ (N10-008)/5. Network Troubleshooting/5.10 IP Addressing Commands.mp4 209.4 MB
  • CompTIA/CompTIA Network+ (N10-008)/4. Network Security/4.9 Virtual Private Networks.mp4 209.3 MB
  • CompTIA/CompTIA Security+ (SY0-601)/4. Implementing Security/4.10 Specialized Systems.mp4 209.2 MB
  • CompTIA/CompTIA Network+ (N10-008)/5. Network Troubleshooting/5.12 Route Troubleshooting Commands.mp4 208.2 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.18 Malware Signatures.mp4 207.1 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/2. Security/2.8 Microsoft OS Security Features.mp4 207.1 MB
  • CompTIA/CompTIA Security+ (SY0-601)/7. Operational Security and Incident Response/7.6 Pentesting Exercise Types.mp4 206.8 MB
  • CompTIA/CompTIA Network+ (N10-008)/5. Network Troubleshooting/5.6 Cabling Tools.mp4 206.6 MB
  • CompTIA/CompTIA Security+ (SY0-601)/8. Governance, Risk and Compliance/8.10 Risk Management Concepts - Risk Analysis.mp4 206.5 MB
  • CompTIA/CompTIA Security+ (SY0-601)/4. Implementing Security/4.13 Network Security - Proxies and Load Balancing.mp4 204.8 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.13 XSS Attacks.mp4 204.7 MB
  • CompTIA/CompTIA Network+ (N10-008)/4. Network Security/4.7 Remote Connections.mp4 204.0 MB
  • CompTIA/CompTIA Security+ (SY0-601)/7. Operational Security and Incident Response/7.3 Vulnerability Scans.mp4 203.7 MB
  • CompTIA/CompTIA Security+ (SY0-601)/4. Implementing Security/4.4 Secure Data Destruction.mp4 203.6 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.19 Infrastructure Vulnerability Scanners.mp4 203.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 5 - Basic Static Analysis/5.7 Basic Static Analysis Part 6.mp4 203.1 MB
  • CompTIA/CompTIA Network+ (N10-008)/3. Network Operations/3.5 Environmental Factors.mp4 202.2 MB
  • CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.17 IP Addressing Subnetting Scenarios.mp4 202.0 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.23 Cloud Infrastructure Assessment Tools.mp4 201.6 MB
  • CompTIA/CompTIA Security+ (SY0-601)/4. Implementing Security/4.14 Network Security - Port Security.mp4 200.8 MB
  • CompTIA/CompTIA Security+ (SY0-601)/7. Operational Security and Incident Response/7.1 Network Reconnaissance and Discovery.mp4 200.6 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/4. Operational Procedures/4.1 Organizational Documentation.mp4 200.2 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/5. Tools and Code Analysis/5.3 Opportunities for Automation.mp4 200.0 MB
  • CompTIA/CompTIA Security+ (SY0-601)/5. Cloud and Virtualization/5.1 Virtualization.mp4 198.9 MB
  • CompTIA/CompTIA Security+ (SY0-601)/8. Governance, Risk and Compliance/8.12 Privacy and Data Sensitivity - Breaches & Data Types.mp4 198.8 MB
  • CompTIA/CompTIA Network+ (N10-008)/5. Network Troubleshooting/5.8 Network Software Tools.mp4 198.1 MB
  • CompTIA/CompTIA Network+ (N10-008)/2. Network Implementations/2.6 802.11 Standards.mp4 196.0 MB
  • Job Tips/Behavioral Interview Prep/13. Tough Feedback.mp4 196.0 MB
  • CompTIA/CompTIA Security+ (SY0-601)/5. Cloud and Virtualization/5.6 Cloud Security Controls.mp4 195.6 MB
  • CompTIA/CompTIA Data+ (DA0-001)/1. Understanding Data and Information/6. Bonus Materials .mp4 195.2 MB
  • CompTIA/CompTIA Network+ (N10-008)/4. Network Security/4.8 Social Engineering.mp4 194.6 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/3. Software Troubleshooting/3.2 Additional Windows OS Issues.mp4 194.2 MB
  • CompTIA/CompTIA Network+ (N10-008)/4. Network Security/4.6 Technology-based Attacks.mp4 193.6 MB
  • CompTIA/CompTIA Network+ (N10-008)/2. Network Implementations/2.1 Networking and Networked Devices.mp4 193.6 MB
  • CompTIA/CompTIA Security+ (SY0-601)/2. Cryptography/2.1 Cryptography Concepts.mp4 193.4 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.25 Network Segmentation Testing.mp4 192.7 MB
  • CompTIA/CompTIA Security+ (SY0-601)/8. Governance, Risk and Compliance/8.6 Organizational Security Policies - Data.mp4 191.5 MB
  • CompTIA/CompTIA Network+ (N10-008)/5. Network Troubleshooting/5.9 Troubleshooting with Ping.mp4 191.5 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.28 CVSS Metrics.mp4 191.1 MB
  • Splunk Training/5. Admin 2 - Data Admin/11. Parsing Phase and Data Preview Demo.mp4 191.0 MB
  • CompTIA/CompTIA Network+ (N10-008)/3. Network Operations/3.7 Plans and procedures - BCDR.mp4 190.9 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/5. Networking/5.2 Basic Networking Concepts Part 2.mp4 190.8 MB
  • CompTIA/CompTIA Network+ (N10-008)/3. Network Operations/3.6 Plans and Procedures.mp4 190.6 MB
  • CompTIA/CompTIA Security+ (SY0-601)/3. Identity and Access Management/3.4 Biometrics.mp4 190.3 MB
  • Splunk Training/6. Architecture 101/5. All things Indexers Demo.mp4 188.7 MB
  • CompTIA/CompTIA Network+ (N10-008)/2. Network Implementations/2.5 Wireless Encryption Standards.mp4 188.7 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/5. Networking/5.3 Configuring a Wireless Router.mp4 188.7 MB
  • Splunk Training/6. Architecture 101/6. Planning Based On Server Roles Lecture.mp4 188.6 MB
  • CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.16 IP Addressing Subnetting Example.mp4 188.1 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.21 Vulnerability Enumeration.mp4 187.8 MB
  • CompTIA/CompTIA Network+ (N10-008)/5. Network Troubleshooting/5.2 Troubleshooting - Establish and Test a Theory.mp4 187.5 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.10 Business Logic Flaws.mp4 187.2 MB
  • Splunk Training/4. Admin 1 - System Admin/8. Configuration Files Demo.mp4 186.5 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/5. Networking/5.6 Connection and Service Types Part 2.mp4 186.5 MB
  • CompTIA/CompTIA Security+ (SY0-601)/8. Governance, Risk and Compliance/8.8 Risk Management Concepts - Vocabulary.mp4 186.5 MB
  • CompTIA/CompTIA Network+ (N10-008)/5. Network Troubleshooting/5.18 Routing and Switching Issues.mp4 186.2 MB
  • CompTIA/CompTIA Network+ (N10-008)/4. Network Security/4.12 Network Hardening - Wireless Security.mp4 185.9 MB
  • CompTIA/CompTIA Network+ (N10-008)/5. Network Troubleshooting/5.16 Addressing Issues.mp4 185.9 MB
  • Splunk Training/3. Splunk Fundamentals 3/8. Working with JSON Data.mp4 185.3 MB
  • CompTIA/CompTIA Security+ (SY0-601)/2. Cryptography/2.2 Encryption and Steganography.mp4 185.3 MB
  • CompTIA/CompTIA Network+ (N10-008)/5. Network Troubleshooting/5.11 DNS Troubleshooting Commands.mp4 184.8 MB
  • Job Tips/Behavioral Interview Prep/15. Comfort Zone.mp4 184.8 MB
  • CompTIA/CompTIA Network+ (N10-008)/5. Network Troubleshooting/5.13 Information Gathering Commands.mp4 184.7 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/4. Active Directory/9. Group Policy Troubleshooting - Google - Coursera.mp4 183.9 MB
  • CompTIA/CompTIA Security+ (SY0-601)/1. Threats, Attacks, and Vulnerabilities/1.17 Threat Intelligence - Threat Maps and Feeds.mp4 183.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 4 - Dynamic Analysis Part 2/4.2 Dynamic Analysis Part 2.2.mp4 182.2 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.5 VLAN Hopping.mp4 181.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 5 - Basic Static Analysis/5.4 Basic Static Analysis Part 4A.mp4 181.4 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/7. Security/7.1 Basic Security Principles.mp4 181.0 MB
  • CompTIA/CompTIA Network+ (N10-008)/5. Network Troubleshooting/5.7 Cabling Issues.mp4 180.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/70 - Day 70 - Advanced - Deploying Your Web Application with Heroku/002 Version Control and Git.mp4 180.0 MB
  • CompTIA/CompTIA Network+ (N10-008)/3. Network Operations/3.1 Performance Metrics.mp4 179.8 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/1. Operating Systems/1.5 GNU Linux.mp4 179.6 MB
  • CompTIA/CompTIA Security+ (SY0-601)/3. Identity and Access Management/3.6 Authentication Protocols - EAP and 802.1X.mp4 179.5 MB
  • CompTIA/CompTIA Security+ (SY0-601)/7. Operational Security and Incident Response/7.9 Incident Response Process.mp4 178.5 MB
  • CompTIA/CompTIA Security+ (SY0-601)/1. Threats, Attacks, and Vulnerabilities/1.6 Application Attacks - Injections.mp4 176.9 MB
  • CompTIA/CompTIA Security+ (SY0-601)/5. Cloud and Virtualization/5.3 Cloud Services.mp4 176.6 MB
  • CompTIA/CompTIA Network+ (N10-008)/3. Network Operations/3.3 Device Logs.mp4 176.1 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/1. Operating Systems/1.13 macOS Tools and Features.mp4 176.1 MB
  • Splunk Training/9. Regular Expressions - From Beginning To End/14. Capture groups and named capture groups Demo.mp4 174.6 MB
  • CompTIA/CompTIA Security+ (SY0-601)/comptia-secplusy0601.zip 174.5 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/6. Databases/6.1 Database Concepts.mp4 172.8 MB
  • CompTIA/CompTIA Security+ (SY0-601)/4. Implementing Security/4.15 Network Security - Firewalls.mp4 172.8 MB
  • CompTIA/CompTIA Network+ (N10-008)/5. Network Troubleshooting/5.1 Troubleshooting - Identify the problem.mp4 172.4 MB
  • CompTIA/CompTIA Network+ (N10-008)/2. Network Implementations/2.7 Cellular Technologies.mp4 172.4 MB
  • CompTIA/CompTIA Security+ (SY0-601)/7. Operational Security and Incident Response/7.11 Attack Frameworks.mp4 172.4 MB
  • CompTIA/CompTIA Network+ (N10-008)/3. Network Operations/3.4 SNMP.mp4 171.8 MB
  • Splunk Training/6. Architecture 101/4. All things Indexers Lecture.mp4 170.9 MB
  • CompTIA/CompTIA Security+ (SY0-601)/4. Implementing Security/4.9 Mobile Device Connections.mp4 170.7 MB
  • CompTIA/CompTIA Security+ (SY0-601)/8. Governance, Risk and Compliance/8.14 Privacy, Data Sensitivity, Roles, Responsibilities.mp4 169.8 MB
  • CompTIA/CompTIA Security+ (SY0-601)/6. Operational Resliency/6.2 Site Redundancy.mp4 169.7 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/2. Software and Applications/2.4 Collaboration Software.mp4 169.5 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/3. Software Troubleshooting/3.4 Malware Removal Best Practices.mp4 169.3 MB
  • Splunk Training/5. Admin 2 - Data Admin/10. Parsing Phase and Data Preview.mp4 169.1 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/2. Software and Systems Security/2.6 Cloud Access Security Broker.mp4 168.4 MB
  • CompTIA/CompTIA Security+ (SY0-601)/7. Operational Security and Incident Response/7.10 Incident Response Plans.mp4 167.8 MB
  • CompTIA/CompTIA A+ Core 1 (220-1101)/2. Networking/2.6 Dynamic Host Configuration Protocol (DHCP).mp4 167.1 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/6. Databases/6.3 Table Design.mp4 165.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/65 - Day 65 - Web Design School - How to Create a Website that People will Love/005 User Experience (UX) Design.mp4 163.8 MB
  • Splunk Training/6. Architecture 101/2. What does an architect do.mp4 163.8 MB
  • CompTIA/CompTIA Security+ (SY0-601)/3. Identity and Access Management/3.11 Account Management - Password Policies.mp4 163.4 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/3. Software Development/3.1 Programming Concepts.mp4 162.9 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/5. Networking/5.1 Basic Networking Concepts.mp4 160.7 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/1. Operating Systems/1.4 Apple macOS.mp4 159.7 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/7. Security/7.2 Basic Security Principles Part 2.mp4 159.6 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/2. Software and Applications/2.5 Web Browser Settings.mp4 159.5 MB
  • Splunk Training/1. Splunk Fundamentals 1/16. Reports and Dashboards Demo.mp4 159.4 MB
  • Splunk Training/5. Admin 2 - Data Admin/7. Data Inputs.mp4 158.6 MB
  • CompTIA/CompTIA Security+ (SY0-601)/1. Threats, Attacks, and Vulnerabilities/1.5 Password Attacks - Tools.mp4 157.9 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/3. Software Development/3.3 Developing with Python.mp4 157.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 5 - Basic Static Analysis/5.6 Basic Static Analysis Part 5.mp4 157.9 MB
  • CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.7 BIOS and UEFI.mp4 157.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/007 Solution & Walkthrough for the Automated Birthday Wisher.mp4 156.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/45 - Day 45 - Intermediate+ Web Scraping with Beautiful Soup/004 Scraping a Live Website.mp4 156.5 MB
  • Splunk Training/4. Admin 1 - System Admin/13. User and Roles Demo.mp4 156.4 MB
  • CompTIA/CompTIA Security+ (SY0-601)/7. Operational Security and Incident Response/7.4 SIEM and SOAR Systems.mp4 156.4 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/3. Security Operations and Monitoring/3.4 Packet and Protocol Analysis.mp4 156.0 MB
  • Splunk Training/3. Splunk Fundamentals 3/6. Acceleration.mp4 155.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 6 - Packers/6.3 Packers Part 3.mp4 155.0 MB
  • Splunk Training/3. Splunk Fundamentals 3/1. Eval Command.mp4 154.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/65 - Day 65 - Web Design School - How to Create a Website that People will Love/003 Understanding Typography and How to Choose Fonts.mp4 154.3 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/2. Software and Applications/2.2 Business and Productivity Software.mp4 154.0 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/7. Security/7.4 Security Best Practices Part 2.mp4 153.6 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/4. Operational Procedures/4.6 Privacy and Licensing Concepts.mp4 153.4 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/4. Computer Hardware/4.3 Common Hardware Part 2.mp4 153.4 MB
  • CompTIA/CompTIA Security+ (SY0-601)/8. Governance, Risk and Compliance/8.7 Organizational Security Policies - Other Areas.mp4 153.1 MB
  • CompTIA/CompTIA A+ Core 1 (220-1101)/2. Networking/2.10 Network Types.mp4 152.6 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/2. Software and Applications/2.6 Web Browser Settings Part 2.mp4 152.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 5 - Basic Static Analysis/5.1 Basic Static Analysis Part 1.mp4 152.0 MB
  • CompTIA/CompTIA Network+ (N10-008)/5. Network Troubleshooting/5.4 Troubleshooting - Verify System Functionality.mp4 151.9 MB
  • CompTIA/CompTIA Security+ (SY0-601)/5. Cloud and Virtualization/5.4 Cloud Models.mp4 151.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 12 - Exploit Development/12.14 Exploit Development (part 14) Structured Exception Handler Over-Write.mp4 151.5 MB
  • Job Tips/Behavioral Interview Prep/14. Strengths And Improvements.mp4 151.5 MB
  • CompTIA/CompTIA Network+ (N10-008)/5. Network Troubleshooting/5.15 Wireless Network Issues.mp4 150.7 MB
  • CompTIA/CompTIA Network+ (N10-008)/3. Network Operations/3.2 Interface Statistics.mp4 150.5 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/4. Active Directory/3. Managing Active Directory Users and Groups - Google - Coursera.mp4 150.0 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/1. Operating Systems/1.3 Microsoft Windows.mp4 149.7 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/3. Software Development/3.2 Programming Concepts Part 2.mp4 149.7 MB
  • CompTIA/CompTIA Security+ (SY0-601)/1. Threats, Attacks, and Vulnerabilities/1.12 Network Attacks - DoS and DDoS.mp4 149.5 MB
  • CompTIA/CompTIA Security+ (SY0-601)/1. Threats, Attacks, and Vulnerabilities/1.4 Password Attacks - Types.mp4 149.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/004 Challenge - Check if it Will Rain in the Next 12 Hours.mp4 148.7 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/1. Planning and Scoping/1.1 Overview.mp4 148.3 MB
  • CompTIA/CompTIA Security+ (SY0-601)/1. Threats, Attacks, and Vulnerabilities/1.9 Application Attacks - Replay Attacks.mp4 148.1 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/7. Security/7.3 Security Best Practices.mp4 148.0 MB
  • CompTIA/CompTIA A+ Core 1 (220-1101)/2. Networking/2.5 Domain Name System (DNS).mp4 148.0 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/4. Computer Hardware/4.5 Peripheral Devices Part 2.mp4 147.8 MB
  • Splunk Training/4. Admin 1 - System Admin/12. User Roles and Management.mp4 147.3 MB
  • Splunk Training/4. Admin 1 - System Admin/15. Forwarding Demo.mp4 147.2 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/8. Troubleshooting/8.1 Troubleshooting Methodology.mp4 146.9 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/6. Databases/6.2 Querying a Database.mp4 146.7 MB
  • CompTIA/CompTIA Security+ (SY0-601)/3. Identity and Access Management/3.12 Account Management - Account Policies.mp4 145.9 MB
  • Splunk Training/5. Admin 2 - Data Admin/12. Raw Data and Knowledge Objects.mp4 145.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/65 - Day 65 - Web Design School - How to Create a Website that People will Love/002 Understanding Color Theory.mp4 145.2 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/4. Operational Procedures/4.9 Introduction to Basic Scripting Techniques.mp4 145.0 MB
  • CompTIA/CompTIA A+ Core 1 (220-1101)/1. Mobile Devices/1.6 Mobile Device Application Support.mp4 144.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/011 Day 3 Project Treasure Island.mp4 143.5 MB
  • Splunk Training/9. Regular Expressions - From Beginning To End/3. What are regular expressions Demo.mp4 141.8 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/4. Securing Your Networks/1. Secure Network Architecture.zip 141.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/56 - Day 56 - Intermediate+ Rendering HTMLStatic files and Using Website Templates/004 How to Use Website Templates to Speed Up Web Development.mp4 140.8 MB
  • Splunk Training/5. Admin 2 - Data Admin/4. Configuring Forwarders Demo.mp4 140.3 MB
  • CompTIA/CompTIA Security+ (SY0-601)/1. Threats, Attacks, and Vulnerabilities/1.16 Threat Intelligence - OSINT.mp4 140.3 MB
  • Splunk Training/6. Architecture 101/9. Forwarder Management and Data Ingest Lecture.mp4 139.2 MB
  • CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.1 Overview.mp4 139.0 MB
  • CompTIA/CompTIA Security+ (SY0-601)/1. Threats, Attacks, and Vulnerabilities/1.13 Network Attacks - MiTM and MiTB.mp4 138.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/006 Caesar Cipher Part 1 - Encryption.mp4 138.5 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/1. Operating Systems/1.3 Windows OS.mp4 137.7 MB
  • Splunk Training/8. Getting Data In/3. Forward over Ubuntu logs.mp4 136.7 MB
  • Splunk Training/4. Admin 1 - System Admin/10. Indexes Demo.mp4 136.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/12 - Day 12 - Beginner - Scope & Number Guessing Game/006 Solution & Walkthrough to the Number Guessing Game.mp4 136.7 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/2. Software and Applications/2.3 Business and Productivity Software Part 2.mp4 135.4 MB
  • CompTIA/CompTIA Network+ (N10-008)/5. Network Troubleshooting/5.5 Troubleshooting - Document the Issue.mp4 135.2 MB
  • CompTIA/CompTIA Security+ (SY0-601)/3. Identity and Access Management/3.8 Authentication Protocols - Kerberos.mp4 135.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/43 - Day 43 - Web Foundation - Introduction to CSS/003 CSS Selectors.mp4 134.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/007 Solution and Complete Code for the Secret Auction Program.mp4 133.9 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 11 Build and Implement a Physical and Logical Cloud Infrastructure/006. 11.5 Secure Network Configuration.mp4 133.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/009 Challenge 2 - Search for a Website in the Password Manager.mp4 131.8 MB
  • Splunk Training/9. Regular Expressions - From Beginning To End/15. Regex in Splunk commands Lecture.mp4 131.6 MB
  • CompTIA/CompTIA Data+ (DA0-001)/14. Explore Analysis Techniques/4. Excel EDA .mp4 131.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/003 Understand the Command Line on Windows and Mac.mp4 131.4 MB
  • Job Tips/Behavioral Interview Prep/06. Interest In Company.mp4 130.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/58 - Day 58 - Web Foundation Bootstrap/002 What is Bootstrap.mp4 129.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/009 Day 2 Project Tip Calculator.mp4 129.1 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/4. Active Directory/7. Group Policy Creation and Editing - Google - Coursera.mp4 128.9 MB
  • CompTIA/CompTIA Security+ (SY0-601)/3. Identity and Access Management/3.7 Authentication Protocols - RADIUS and TACACS.mp4 128.8 MB
  • Books/CompTIA/Linux+/Jordan T. CompTIA Linux+ Certification All-in-One Exam Guide...XK0-005 2ed 2023.pdf 128.8 MB
  • Protocol Deep Dive/ARP - Deep Dive/05 Addressing ARP-related Security Risks/05 Demo - CAM Table Flood with Port Security .mp4 128.7 MB
  • CompTIA/CompTIA Data+ (DA0-001)/9. Optimize Data/4. Query Execution Plans .mp4 128.5 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/1. Operating Systems/1.2 Computer Operating Systems.mp4 128.0 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/5. Networking/5.4 Configuring a Wireless Router Part 2.mp4 127.1 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/5. Networking/5.5 Connection and Service Types.mp4 127.1 MB
  • Splunk Training/5. Admin 2 - Data Admin/6. HFs and Forwarder Management Demo.mp4 126.0 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/7. Security/7.5 Security Best Practices Part 3.mp4 125.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/009 Caesar Cipher Part 4 - User Experience Improvements & Final Touches.mp4 125.8 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/3. Package and Software Management/1. Software Distribution.zip 125.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 5 - Basic Static Analysis/5.2 Basic Static Analysis Part 2.mp4 123.9 MB
  • CompTIA/CompTIA Security+ (SY0-601)/3. Identity and Access Management/3.3 Additional Authentication Methods.mp4 123.8 MB
  • CompTIA/CompTIA Security+ (SY0-601)/3. Identity and Access Management/3.5 Authentication Protocols - PAP and CHAP.mp4 123.3 MB
  • CompTIA/CompTIA Data+ (DA0-001)/5. Collect and Integrate Data/5. Web Scraping .mp4 123.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/36 - Day 36 - Intermediate+ Stock Trading News Alert Project/003 Solution & Walkthrough for Step 1 - Check for Stock Price Movements.mp4 122.9 MB
  • Splunk Training/2. Splunk Fundamentals 2/22. CIM Addon Builder.mp4 121.5 MB
  • Splunk Training/1. Splunk Fundamentals 1/18. Common Information Model (CIM) Demo.mp4 121.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/006 U.S. States Game Part 2 Challenge with .csv.mp4 120.7 MB
  • Splunk Training/5. Admin 2 - Data Admin/13. Raw Data and Knowledge Objects Demo.mp4 119.6 MB
  • CompTIA/CompTIA Data+ (DA0-001)/13. Apply Inferential Statistics/3. AB Testing Part 1 .mp4 119.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 2 - Lab Setup/2.2 Lab Setup Part 2.mp4 118.9 MB
  • CompTIA/CompTIA Security+ (SY0-601)/1. Threats, Attacks, and Vulnerabilities/1.8 Application Attacks - XSS and XSRF.mp4 117.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/008 Day 4 Project Rock Paper Scissors.mp4 116.4 MB
  • Job Tips/Behavioral Interview Prep/01. Introduction.mp4 115.6 MB
  • Splunk Training/2. Splunk Fundamentals 2/8. Investigating with the Transaction Command.mp4 114.9 MB
  • Splunk Training/2. Splunk Fundamentals 2/6. Demo eval and fillnull.mp4 114.6 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.4 Confidence Levels.mp4 113.8 MB
  • Protocol Deep Dive/EIGRP - Deep Dive/05 - Showing How Information Is Exchanged with EIGRP/18 - Network Changes - Demo.mp4 113.2 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 1 Concepts and Architectures of Cloud Computing/006. 1.5 Cloud Computing Activities and Capabilities.mp4 113.1 MB
  • Splunk Training/1. Splunk Fundamentals 1/4. Getting Data In Lecture.mp4 112.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 7 - Malware Defenses/7.3 Malware Defenses Part 3.mp4 111.8 MB
  • Splunk Training/2. Splunk Fundamentals 2/4. Building Maps.mp4 110.9 MB
  • Splunk Training/2. Splunk Fundamentals 2/12. Rex Erex and the Field Extractor.mp4 110.2 MB
  • CompTIA/CompTIA Data+ (DA0-001)/20. Describe Data Quality Control Concepts/2. Master Data Management .mp4 109.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/010 [Interactive Coding Exercise] Love Calculator.mp4 109.6 MB
  • CompTIA/CompTIA A+ Core 1 (220-1101)/2. Networking/2.8 IP Address Configuration.mp4 107.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/003 How to Find and Select Elements on a Website with Selenium.mp4 107.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/44 - Day 44 - Web Foundation - Intermediate CSS/002 Font Properties.mp4 107.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 05 - Web Application Penetration Testing/5.15 Web Application Lab Walkthrough.mp4 107.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/44 - Day 44 - Web Foundation - Intermediate CSS/004 The CSS Box Model - Margin, Padding and Border.mp4 105.6 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/2. Pelcgbybtl (Cryptology)/3. Hashing.zip 105.4 MB
  • Splunk Training/8. Getting Data In/6. Tutorial Data.mp4 105.1 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/8. Troubleshooting/8.2 Troubleshooting Methodology Part 2.mp4 104.8 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/3. The 3 A's of Cybersecurity - Authentication, Authorization, Accounting/1. Authentication/2. Multifactor Authentication - Google - Coursera.mp4 104.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/003 How to Send Emails with Python using SMTP.mp4 104.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 4 - Information Gathering/4.5 Information Gathering (part 5) NMAP and PortScanning.mp4 102.8 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/4. Securing Your Networks/3. Network Monitoring.zip 102.5 MB
  • Splunk Training/9. Regular Expressions - From Beginning To End/18. Regex in Splunk conf files Demo.mp4 102.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/003 Using API Keys to Authenticate and Get the Weather from OpenWeatherMap.mp4 101.6 MB
  • CompTIA/CompTIA Data+ (DA0-001)/17. Explain Dashboarding/6. Bonus Resource .mp4 101.3 MB
  • CompTIA/CompTIA Data+ (DA0-001)/19. Describe Data Governance Concepts/4. Data Owner .mp4 100.9 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/1. Understanding Security Threats/2. Malicious Software.zip 100.5 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 6 Data Center Design and Risk Analysis/003. 6.2 Physical Data Center Design.mp4 100.4 MB
  • MITRE/Cybrary - MITRE ATT&CK SOC Assessments Course/3. Synthesizing SOC Assessments/3.2 Communicating with ATT&CK.mp4 100.3 MB
  • Splunk Training/1. Splunk Fundamentals 1/8. Basic Searching Demo.mp4 100.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/003 Downloadable Resources and Tips for Taking the Course.mp4 99.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/003 Downloadable Resources and Tips for Taking the Course.mp4_original 99.7 MB
  • Splunk Training/6. Architecture 101/3. How to plan a deployment.mp4 99.7 MB
  • Splunk Training/9. Regular Expressions - From Beginning To End/8. Quantifiers to Know Demo.mp4 98.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.1 What is the Penetration Testing Execution Standard (PTES).mp4 98.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 01 - Course Introduction/1.4 Navigation and Review.mp4 98.0 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 01 - Course Introduction/1.4 Navigation and Review.mp4 98.0 MB
  • Splunk Training/9. Regular Expressions - From Beginning To End/12. Groupings Demo.mp4 98.0 MB
  • Splunk Training/5. Admin 2 - Data Admin/5. HFs and Forwarder Management.mp4 97.6 MB
  • CompTIA/CompTIA Data+ (DA0-001)/21. Identify Data Security Concepts/5. Access Control Models .mp4 97.2 MB
  • Cybrary/Cybrary - Become an Incident Handler/06. Analyzing Attacks for Incident Handlers/Module 1 - Analyzing Attacks for Incident Handlers/1.8 Redline Analysis Lab Part 2.mp4 97.1 MB
  • CompTIA/CompTIA Data+ (DA0-001)/16. Explain Business Requirements and Reports/5. Applying Design Basics .mp4 96.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/006 How to Automate Filling Out Forms and Clicking Buttons with Selenium.mp4 96.8 MB
  • Books/CompTIA/A+/Docter Q. CompTIA A+ Complete Study Guide...5ed 2022.pdf 96.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/008 Final Project Escaping the Maze.mp4 96.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 6 - Insider Threat/6.3 Indicators to identify an insider threat.mp4 96.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/003 DataFrames & Series Working with Rows & Columns.mp4 95.9 MB
  • Splunk Training/5. Admin 2 - Data Admin/3. Configuring Forwarders.mp4 95.7 MB
  • Splunk Training/4. Admin 1 - System Admin/11. Management of Splunk Indexes.mp4 95.6 MB
  • Splunk Training/3. Splunk Fundamentals 3/2. Eventstats and Streamstats.mp4 95.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 2 - Introductory Commands/2.4 Common Linux Tools.mp4 93.8 MB
  • CompTIA/CompTIA Data+ (DA0-001)/14. Explore Analysis Techniques/3. EDA (Exploratory Data Analysis) .mp4 93.8 MB
  • CompTIA/CompTIA Data+ (DA0-001)/9. Optimize Data/2. Indexing .mp4 93.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/004 The Great Squirrel Census Data Analysis (with Pandas!).mp4 93.4 MB
  • CompTIA/CompTIA Data+ (DA0-001)/6. Clean and Profile Datasets/2. Handling Duplicate Data .mp4 93.1 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 12 Operational Controls and Standards/010. 12.9 Security Operations Centers (SOC).mp4 93.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/37 - Day 37 - Intermediate+ Habit Tracking Project API Post Requests & Headers/003 Advanced Authentication using an HTTP Header.mp4 93.0 MB
  • Splunk Training/6. Architecture 101/12. The Monitoring Console Demo.mp4 92.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 12 - Exploit Development/12.8 Exploit Development (part 8) Creating a Cyclic Pattern.mp4 92.1 MB
  • CompTIA/CompTIA Data+ (DA0-001)/20. Describe Data Quality Control Concepts/5. Data Quality Validation .mp4 91.9 MB
  • Splunk Training/2. Splunk Fundamentals 2/17. Building a Macro.mp4 91.8 MB
  • CompTIA/CompTIA Data+ (DA0-001)/13. Apply Inferential Statistics/2. AA Testing .mp4 91.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/010 The Hirst Painting Project Part 1 - How to Extract RGB Values from Images.mp4 91.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/005 Sending SMS via the Twilio API.mp4 91.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/55 - Day 55 - Intermediate+ HTML & URL Parsing in Flask and the Higher Lower Game/002 Working Flask URL Paths and the Flask Debugger.mp4 91.0 MB
  • Splunk Training/4. Admin 1 - System Admin/6. Applications Demo.mp4 90.9 MB
  • Splunk Training/5. Admin 2 - Data Admin/8. Data Inputs Demo.mp4 90.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/43 - Day 43 - Web Foundation - Introduction to CSS/001 Why do we need CSS.mp4 90.5 MB
  • Splunk Training/9. Regular Expressions - From Beginning To End/11. Groupings Lecture.mp4 90.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/008 Caesar Cipher Part 3 - Reorganising our Code.mp4 90.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 8 - Incident Recovery/8.1 Incident Recovery.mp4 90.1 MB
  • CompTIA/CompTIA Security+ (SY0-601)/4. Implementing Security/4.16 Network Security - NIDS and NIPS.mp4 90.0 MB
  • CompTIA/CompTIA Network+ (N10-008)/1. Networking Fundamentals/1.15 IP Addressing Subnetting Basics.mp4 89.7 MB
  • Splunk Training/1. Splunk Fundamentals 1/14. Transforming Demo.mp4 89.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 3 - Nmap & The TCP_IP Protocol Suite/3.4 Nmap and Wireshark Part 2 - NM.mp4 89.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 3 - Nmap & The TCP_IP Protocol Suite/3.4 Nmap and Wireshark Part 2 - NM.mp4 89.6 MB
  • CompTIA/CompTIA Data+ (DA0-001)/13. Apply Inferential Statistics/1. Introduction -3.mp4 89.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/36 - Day 36 - Intermediate+ Stock Trading News Alert Project/005 Solution & Walkthrough for Step 3 - Send the SMS Messages.mp4 89.3 MB
  • Splunk Training/1. Splunk Fundamentals 1/20. Lookups Demo.mp4 89.1 MB
  • Books/Cloud/Lab Guide, IPSpecialist. Hands-On Labs. CLF-C01. AWS Certified Cloud...2ed 2023.pdf 88.9 MB
  • Splunk Training/9. Regular Expressions - From Beginning To End/1. History of regex.mp4 88.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/002 Understanding Turtle Graphics and How to use the Documentation.mp4 88.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/41 - Day 41 - Web Foundation - Introduction to HTML/007 Self Closing Tags.mp4 87.6 MB
  • Splunk Training/3. Splunk Fundamentals 3/5. Data Masking.mp4 87.6 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/4. Securing Your Networks/2. Wireless Security/2. Let_s Get Rid of WEP! WPA_WPA2 - Google - Coursera.mp4 87.4 MB
  • Splunk Training/5. Admin 2 - Data Admin/1. Getting Data In.mp4 87.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/006 Understand API Parameters Match Sunset Times with the Current Time.mp4 86.7 MB
  • CompTIA/CompTIA Data+ (DA0-001)/20. Describe Data Quality Control Concepts/4. Maintaining Data Quality .mp4 85.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/006 Challenge 2 Solution - How to Replace the Blanks.mp4 84.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/008 Day 5 Project Create a Password Generator.mp4 84.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/45 - Day 45 - Intermediate+ Web Scraping with Beautiful Soup/006 100 Movies that You Must Watch.mp4 84.3 MB
  • Splunk Training/4. Admin 1 - System Admin/7. Configuration Files.mp4 84.3 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/6. Troubleshooting/2. Customer Service/3. How to deal with Difficult Situations.mp4 84.2 MB
  • Splunk Training/9. Regular Expressions - From Beginning To End/2. What are regular expressions Lecture.mp4 84.1 MB
  • CompTIA/CompTIA Data+ (DA0-001)/21. Identify Data Security Concepts/3. Data Confidentiality .mp4 84.0 MB
  • CompTIA/CompTIA Data+ (DA0-001)/3. Identify File Formats/4. HTML .mp4 84.0 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/1. Threat and Vulnerability Management/1.1 Overview.mp4 83.9 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/8. Troubleshooting/8.3 Troubleshooting Example.mp4 83.8 MB
  • CompTIA/CompTIA Data+ (DA0-001)/22. Identify Data Privacy Concepts/3. Data Privacy Principles .mp4 83.6 MB
  • CompTIA/CompTIA Data+ (DA0-001)/19. Describe Data Governance Concepts/6. Data Custodian .mp4 83.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/08. OWASP Top 10 - 2021/Module 1 - Introduction/1.7 Video Demonstration of Using Intercepting Proxies.mp4 83.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/45 - Day 45 - Intermediate+ Web Scraping with Beautiful Soup/003 Finding and Selecting Particular Elements with BeautifulSoup.mp4 83.3 MB
  • CompTIA/CompTIA Data+ (DA0-001)/9. Optimize Data/3. Subsets .mp4 83.1 MB
  • Protocol Deep Dive/OSPF - Deep Dive/05 - Introducing Multi-area OSPF (Hierarchy)/32 - Exploring the Different OSPF Area Types.mp4 82.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/007 [Interactive Coding Exercise] Treasure Map.mp4 82.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/004 Understanding the Offset and Appending Items to Lists.mp4 82.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/20 - Day 20 - Intermediate - Build the Snake Game Part 1 Animation & Coordinates/003 Animating the Snake Segments on Screen.mp4 82.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 6 - Packers/6.1 Packers Part 1.mp4 82.5 MB
  • CompTIA/CompTIA Data+ (DA0-001)/16. Explain Business Requirements and Reports/4. Building Cover Pages .mp4 82.2 MB
  • CompTIA/CompTIA Data+ (DA0-001)/23. Explain Regulations and Compliance/3. Data Breaches .mp4 82.0 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/1. Introduction to Operating Systems & Becoming a Power User/Course Introduction - Google.mp4 81.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/007 ISS Overhead Notifier Project - Challenge & Solution.mp4 81.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/41 - Day 41 - Web Foundation - Introduction to HTML/006 HTML Paragraph Elements.mp4 81.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/002 Using Jinja to Produce Dynamic HTML Pages.mp4 81.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 1 - Mapping to ATT&CK® from Narrative Reports/1.1 Introduction - Challenges, Advantages and the Process of Mapping to ATT&CK®.mp4 81.5 MB
  • MITRE/Cybrary - MITRE ATT&CK Cyber Threat Intelligence/1. Mapping to ATT&CK from Narrative Reports/1.1 Introduction- Challenges, Advantages and the Process of Mapping to ATT&CK.mp4 81.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 10 - Password Cracking and Brute-Forcing Logins/10.6 Brute-Force and Password Cracking Lab Walkthrough.mp4 81.3 MB
  • CompTIA/CompTIA Data+ (DA0-001)/23. Explain Regulations and Compliance/2. Regulatory Compliance Concepts .mp4 81.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/42 - Day 42 - Web Foundation - Intermediate HTML/002 The List Element.mp4 81.1 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 1 Concepts and Architectures of Cloud Computing/005. 1.4 Cloud Building Block Technologies.mp4 81.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/56 - Day 56 - Intermediate+ Rendering HTMLStatic files and Using Website Templates/006 Solution and Walkthrough for the Name Card Final Project.mp4 80.5 MB
  • CompTIA/CompTIA Security+ (SY0-601)/1. Threats, Attacks, and Vulnerabilities/1.1 Overview.mp4 80.3 MB
  • Splunk Training/6. Architecture 101/7. Planning Based On Server Roles Demo.mp4 80.2 MB
  • CompTIA/CompTIA Data+ (DA0-001)/6. Clean and Profile Datasets/4. Errors and Outliers .mp4 80.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 05 - Web Application Penetration Testing/5.1 Web Application Enumeration.mp4 80.1 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/6. Creating a Company Culture for Security/1. Risk in the Workplace/1. Security Goals - Google - Coursera.mp4 80.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Module 2 - Wireshark and TCPDUMP/2.9 Applying Filters to TCPDUMP and Wireshark Lab Part 2.mp4 79.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Module 2 - Wireshark and TCPDUMP/2.7 Applying Filters to TCPDUMP and Wireshark Lab Part 2.mp4 79.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 12 - Exploit Development/12.9 Exploit Development (part 9) Verifying Offsets.mp4 79.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/011 The Hirst Painting Project Part 2 - Drawing the Dots.mp4 79.7 MB
  • CompTIA/CompTIA Data+ (DA0-001)/11. Describe Measures of Dispersion/2. Range .mp4 79.6 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/4. Active Directory/8. Group Policy Inheritance and Precedence - Google - Coursera.mp4 79.3 MB
  • Splunk Training/9. Regular Expressions - From Beginning To End/13. Capture groups and named capture groups Lecture.mp4 79.1 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/1. Introduction to IT/2. History of Computing/2. The Path to Modern Computers.mp4 79.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 4 - Network Scanning and Discovery/4.14 Operating System Detection and Fingerprinting Part 2 - NM.mp4 78.6 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 8 Application Security Awareness and Life Cycles/004. 8.3 SDLC Business Requirements and Phases.mp4 78.6 MB
  • Splunk Training/6. Architecture 101/11. The Monitoring Console Lecture.mp4 78.5 MB
  • MITRE/Cybrary - MITRE ATT&CK SOC Assessments Course/3. Synthesizing SOC Assessments/3.1 Interviewing Staff.mp4 78.4 MB
  • CompTIA/CompTIA Data+ (DA0-001)/18. Compare Visualizations/4. Pie Charts and Heat Maps .mp4 78.3 MB
  • Splunk Training/2. Splunk Fundamentals 2/14. Making Field Aliases.mp4 78.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 4 - Network Scanning and Discovery/4.14 Operating System Detection and Fingerprinting Part 2 - NM.mp4 78.2 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/6. Troubleshooting and Future of Networking/5. IPv6/1. IPv6 Addressing and Subnetting.mp4 78.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/007 Understanding Environment Variables and Hiding API Keys.mp4 78.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 1 - Introduction/1.1 Intro Part 1.mp4 77.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/29 - Day 29 - Intermediate - Building a Password Manager GUI App with Tkinter/007 Generate a Password & Copy it to the Clipboard.mp4 77.0 MB
  • CompTIA/CompTIA Data+ (DA0-001)/7. Manipulate Data/3. Working with Dates .mp4 77.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/31 - Day 31 - Intermediate - Flash Card App Capstone Project/001 Day 31 Goals what you will make by the end of the day.mp4 76.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/27 - Day 27 - Intermediate - Tkinter, args, kwargs and Creating GUI Programs/010 Mile to Kilometers Converter Project.mp4 76.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/44 - Day 44 - Web Foundation - Intermediate CSS/005 Day 44 Project - Motivational Poster Website.mp4 76.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/007 How to Hack Passwords 101.mp4 76.2 MB
  • Splunk Training/5. Admin 2 - Data Admin/2. Getting Data In Demo.mp4 76.2 MB
  • CompTIA/CompTIA Network+ (N10-008)/comptia-netplusn10008.zip 76.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/003 Constructing Objects and Accessing their Attributes and Methods.mp4 75.8 MB
  • CompTIA/CompTIA Data+ (DA0-001)/11. Describe Measures of Dispersion/5. Standard Deviation .mp4 75.7 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/2. Hardware/1. The Modern Computer/3. Programs and Hardware.mp4 75.7 MB
  • CompTIA/CompTIA A+ Core 2 (220-1102)/1. Operating Systems/1.1 Overview.mp4 75.4 MB
  • CompTIA/CompTIA Data+ (DA0-001)/23. Explain Regulations and Compliance/7. International Data Transfers .mp4 75.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/005 While Loops.mp4 75.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 1 - Introduction to the Command Line/1.3 Asking for Help.mp4 74.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/28 - Day 28 - Intermediate - Tkinter, Dynamic Typing and the Pomodoro GUI Application/002 How to work with the Canvas Widget and Add Images to Tkinter.mp4 74.8 MB
  • Splunk Training/1. Splunk Fundamentals 1/11. Commands Lecture.mp4 74.5 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/1. Understanding Security Threats/1. Introduction to IT Security/Course Introduction - Google - Coursera.mp4 74.5 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/2. Pelcgbybtl (Cryptology)/1. Symmetric Encryption/3. Symmetric Encryption Algorithms - Google - Coursera.mp4 74.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 09 - Privilege Escalation/9.5 Privilege Escalation Walkthrough - Windows.mp4 74.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/006 Encryption and Hashing.mp4 74.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/45 - Day 45 - Intermediate+ Web Scraping with Beautiful Soup/005 Is Web Scraping Legal.mp4 74.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 11 - Putting it All Together/11.2 Hands-on Penetration Test Lab Walkthrough.mp4 73.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/31 - Day 31 - Intermediate - Flash Card App Capstone Project/007 Solution & Walkthrough for Flipping Cards.mp4 73.7 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/6. Troubleshooting/2. Customer Service/1. Intro to Soft Skills.mp4 73.6 MB
  • Protocol Deep Dive/DNS - Deep Dive/05. Troubleshooting DNS/24. Demo-Troubleshooting Slow Responses.mp4 73.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/29 - Day 29 - Intermediate - Building a Password Manager GUI App with Tkinter/005 Challenge 3 - Saving Data to File.mp4 73.6 MB
  • Splunk Training/8. Getting Data In/5. Make Your Own Data.mp4 73.5 MB
  • CompTIA/CompTIA Data+ (DA0-001)/1. Understanding Data and Information/5. KeyValue Pairs .mp4 73.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 3 - Metasploit/3.3 Metasploit (part 3) Operation.mp4 73.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 3 - Linux Command Line Tools/3.12 Linux Networking Part 2.mp4 73.3 MB
  • MITRE/Cybrary - MITRE ATT&CK SOC Assessments Course/3. Synthesizing SOC Assessments/3.3 Compiling a Final Heatmap Part 1.mp4 73.2 MB
  • Splunk Training/2. Splunk Fundamentals 2/10. Setting Permissions of KOs.mp4 73.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/19 - Day 19 - Intermediate - Instances, State and Higher Order Functions/005 Understanding the Turtle Coordinate System.mp4 73.2 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/02_slowness/01_understanding-slowness/05_slow-web-server.mp4 73.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/65 - Day 65 - Web Design School - How to Create a Website that People will Love/004 Manage ATTENTION with effective User Interface (UI) Design.mp4 73.1 MB
  • Splunk Training/4. Admin 1 - System Admin/2. Overview Demo.mp4 73.0 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/4. Active Directory/1. What is Active Directory- - Google - Coursera.mp4 73.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 3/3.1 What is XSS.mp4 72.8 MB
  • CompTIA/CompTIA Data+ (DA0-001)/8. Recode, Sort, Filter, and Aggregate Data/3. Sorting Data .mp4 72.8 MB
  • CompTIA/CompTIA Data+ (DA0-001)/5. Collect and Integrate Data/3. Public Datasets .mp4 72.8 MB
  • Protocol Deep Dive/EIGRP - Deep Dive/03 - Digging into EIGRP Relationships/07 - Forming a Neighborship.mp4 72.8 MB
  • Splunk Training/1. Splunk Fundamentals 1/23. Alerts Demo.mp4 72.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/2. OWASP Top 10 - 2021/Module 1 - Introduction/1.6 Video Demonstration of Using Intercepting Proxies.mp4 72.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 4 - Network Scanning and Discovery/4.11 Service and Application Version Detection Part 1 - NM.mp4 72.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 4 - Network Scanning and Discovery/4.11 Service and Application Version Detection Part 1 - NM.mp4 72.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 4 - Defensive Recs from ATT&CK®-Mapped Data/4.4 Make Defensive Recommendations.mp4 72.4 MB
  • MITRE/Cybrary - MITRE ATT&CK Cyber Threat Intelligence/4. Defensive Recs from ATT&CK-Mapped Data/4.4 Make Defensive Recommendations.mp4 72.4 MB
  • MITRE/Cybrary - MITRE ATT&CK Cyber Threat Intelligence/4. Making Defensive Recommendations from ATT&CK-Mapped Data/4.4 Make Defensive Recommendations.mp4 72.4 MB
  • CompTIA/CompTIA Data+ (DA0-001)/6. Clean and Profile Datasets/3. Null or Missing Values .mp4 72.4 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/04_managing-resources/02_managing-our-time/02_prioritizing-tasks.mp4 72.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 9 - Advanced Exploitation/9.4 Advanced Exploitation (part 4) Social Engineering.mp4 72.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/002 How to Create Lists using List Comprehension.mp4 72.2 MB
  • Splunk Training/3. Splunk Fundamentals 3/4. The Rest Command.mp4 71.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 1 - Mapping to ATT&CK® from Narrative Reports/1.4 Identifying Techniques or Sub-Techniques.mp4 71.6 MB
  • MITRE/Cybrary - MITRE ATT&CK Cyber Threat Intelligence/1. Mapping to ATT&CK from Narrative Reports/1.4 Identifying Techniques or Sub-Techniques.mp4 71.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/28 - Day 28 - Intermediate - Tkinter, Dynamic Typing and the Pomodoro GUI Application/004 Add a Count Down Mechanism.mp4 71.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 1/1.4 HTTP Basics.mp4 71.3 MB
  • Splunk Training/4. Admin 1 - System Admin/17. Diag Demo.mp4 71.1 MB
  • CompTIA/CompTIA Data+ (DA0-001)/13. Apply Inferential Statistics/5. Correlation Testing .mp4 71.1 MB
  • MITRE/Cybrary - MITRE ATT&CK SOC Assessments Course/3. Synthesizing SOC Assessments/3.5 Proposing Recommendations Part 1.mp4 71.1 MB
  • MITRE/Cybrary - MITRE ATT&CK SOC Assessments Course/2. Analyzing SOC Components with ATT&CK/2.4 Analyzing Analytics.mp4 70.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 1/1.3 Packets.mp4 70.7 MB
  • MITRE/Cybrary - MITRE ATT&CK SOC Assessments Course/3. Synthesizing SOC Assessments/3.6 Proposing Recommendations Part 2.mp4 70.6 MB
  • Splunk Training/7. Fields & Extractions/1. Fields command.mp4 70.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/24 - Day 24 - Intermediate - Files, Directories and Paths/005 Understand Relative and Absolute File Paths.mp4 70.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/003 PyCharm's Charming Features (while you wait for the download to finish).mp4 70.0 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 9 Software Assurance and Validation/006. 9.5 Supply Chain Management.mp4 69.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/005 [Interactive Coding Exercise] Banker Roulette - Who will pay the bill.mp4 69.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/6. Incident Response Recovery/Module 1 - Incident Recovery/1.5 Lessons Learned Part 2.mp4 69.4 MB
  • Cybrary/Cybrary - Become an Incident Handler/04. Incident Response Recovery/Module 1 - Incident Recovery/1.5 Lessons Learned Part 2.mp4 69.4 MB
  • Splunk Training/7. Fields & Extractions/5. rex.mp4 69.2 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/1. Operating Systems/1.1 Overview.mp4 69.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 1 - Mapping to ATT&CK® from Narrative Reports/1.3 Translating the Behavior into a Tactic.mp4 69.2 MB
  • MITRE/Cybrary - MITRE ATT&CK Cyber Threat Intelligence/1. Mapping to ATT&CK from Narrative Reports/1.3 Translating the Behavior into a Tactic.mp4 69.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/008 While Loops, Flags and Recursion.mp4 69.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/41 - Day 41 - Web Foundation - Introduction to HTML/005 HTML Heading Elements.mp4 68.9 MB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 1 - Mapping to ATT&CK® from Narrative Reports/1.1 Introduction - Challenges, Advantages and the Process of Mapping to ATT&CK®.mp4 68.9 MB
  • CompTIA/CompTIA Data+ (DA0-001)/9. Optimize Data/5. Parameterization .mp4 68.8 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/03_crashing-programs/02_code-that-crashes/02_unhandled-errors-and-exceptions.mp4 68.8 MB
  • Splunk Training/6. Architecture 101/10. Forwarder Management and Data Ingest Demo.mp4 68.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/36 - Day 36 - Intermediate+ Stock Trading News Alert Project/004 Solution & Walkthrough for Step 2 - Get the News Articles.mp4 68.6 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/01_troubleshooting-concepts/03_understanding-the-problem/01_it-doesn-t-work.mp4 68.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/002 Random Module.mp4 68.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 07 - Public Exploits/7.4 Introduction to Metasploit.mp4 68.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/58 - Day 58 - Web Foundation Bootstrap/003 Bootstrap Layout.mp4 68.3 MB
  • Splunk Training/4. Admin 1 - System Admin/14. Forwarding Basics.mp4 68.3 MB
  • Splunk Training/9. Regular Expressions - From Beginning To End/16. Regex in Splunk commands Demo.mp4 68.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/002 Reading CSV Data in Python.mp4 68.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/002 Functions with Outputs.mp4 68.0 MB
  • CompTIA/CompTIA Data+ (DA0-001)/5. Collect and Integrate Data/4. APIs .mp4 68.0 MB
  • Splunk Training/9. Regular Expressions - From Beginning To End/10. Regex Anchors Demo.mp4 67.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 6 - Insider Threat/6.6 Policies and procedures.mp4 67.7 MB
  • Books/CompTIA/Security+/Clarke G.CompTIA Security+ Certification Bundle.SY0-601 4ed 2022.pdf 67.7 MB
  • CompTIA/CompTIA Data+ (DA0-001)/21. Identify Data Security Concepts/4. Access Management .mp4 67.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/31 - Day 31 - Intermediate - Flash Card App Capstone Project/005 Solution & Walkthrough for Creating New Flash Cards.mp4 67.6 MB
  • Protocol Deep Dive/ARP - Deep Dive/03 Understanding InARP, GARP, RARP, and Proxy ARP/10 Demo - Proxy ARP .mp4 67.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 2 - Lab Setup/2.3 Lab Setup Part 3.mp4 67.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.23 Implement Dump Registers.mp4 67.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 9 - Advanced Exploitation/9.5 Advanced Exploitation (part 5) Bypassing Antivirus Software.mp4 67.3 MB
  • CompTIA/CompTIA Data+ (DA0-001)/13. Apply Inferential Statistics/4. AB Testing Part 2 .mp4 67.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 10 - Password Cracking and Brute-Forcing Logins/10.4 Password Brute-Forcing Tips.mp4 67.1 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 5 Cloud Infrastructure and Platform Components/008. 5.7 Management Plane Cloud Solutions.mp4 67.0 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/03_crashing-programs/02_code-that-crashes/01_accessing-invalid-memory.mp4 67.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/11 - Day 11 - Beginner - The Blackjack Capstone Project/002 Blackjack Program Requirements and Game Rules.mp4 66.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 2/2.1 What is SQL Injection.mp4 66.8 MB
  • Splunk Training/7. Fields & Extractions/6. eval and replace.mp4 66.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/006 [Interactive Coding Exercise] Leap Year.mp4 66.5 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/04_managing-resources/02_managing-our-time/04_communicating-expectations.mp4 66.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 4 - Network Scanning and Discovery/4.16 NSE, Vulnerability Testing & Exploitation Part 2 - NM.mp4 66.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 4 - Network Scanning and Discovery/4.16 NSE, Vulnerability Testing & Exploitation Part 2 - NM.mp4 66.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/001 What you're going to get from this course.mp4 66.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/001 What you're going to get from this course.mp4_original 66.4 MB
  • Splunk Training/4. Admin 1 - System Admin/9. Splunk Indexes.mp4 66.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 2 - Incident Response Policy/2.2 The Elements of an Incident Response Policy.mp4 65.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 2 - Incident Response Policy/2.4 The Different Types of Incident Response Teams.mp4 65.6 MB
  • MITRE/Cybrary - MITRE ATT&CK SOC Assessments Course/2. Analyzing SOC Components with ATT&CK/2.5 Breaking Down Tools.mp4 65.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/36 - Day 36 - Intermediate+ Stock Trading News Alert Project/001 Day 36 Goals what you will make by the end of the day.mp4 65.3 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 6 Data Center Design and Risk Analysis/008. 6.7 Cloud Infrastructure Risk Mitigation Strategies.mp4 64.9 MB
  • Splunk Training/2. Splunk Fundamentals 2/20. Making POST and Search Workflow Actions.mp4 64.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/002 Create your First Web Server with Flask.mp4 64.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/006 Use PythonAnywhere to Automate the Python Script.mp4 64.6 MB
  • Splunk Training/3. Splunk Fundamentals 3/3. Appendpipe.mp4 64.5 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/6. Creating a Company Culture for Security/3. Incident Handling/2. Incident Response and Recovery - Google - Coursera.mp4 64.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/009 Turtle Challenge 5 - Draw a Spirograph.mp4 64.4 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/03_crashing-programs/01_why-programs-crash/03_understanding-crashing-applications.mp4 64.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 6 - Insider Threat/6.4 Using Automated processes to look for indicators of in insider threats.mp4 64.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/004 Challenge Use Selenium to Scrape Website Data.mp4 64.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 05 - Web Application Penetration Testing/5.13 Content Management Systems Demo.mp4 64.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 1 - Mapping to ATT&CK® from Narrative Reports/1.5 Mapping to a Narrative Point.mp4 63.9 MB
  • MITRE/Cybrary - MITRE ATT&CK Cyber Threat Intelligence/1. Mapping to ATT&CK from Narrative Reports/1.5 Mapping to a Narrative Point .mp4 63.9 MB
  • CompTIA/CompTIA Data+ (DA0-001)/12. Explain Inferential Statistics/4. Hypothesis Testing Part 1 .mp4 63.8 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/6. Creating a Company Culture for Security/3. Incident Handling/1. Incident Reporting and Analysis - Google - Coursera.mp4 63.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/005 Challenge 1 - Send Motivational Quotes on Mondays via Email.mp4 63.8 MB
  • Protocol Deep Dive/OSPF - Deep Dive/03 - Forming Basic OSPF Relationships/09 - Viewing the Requirements to Form an OSPF Neighborship.mp4 63.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/31 - Day 31 - Intermediate - Flash Card App Capstone Project/009 Solution & Walkthrough for Saving Progress.mp4 63.7 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/1. Introduction to Networking/1. Introduction to Computer Networking/Course Introduction - Google.mp4 63.7 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/5. Data Recovery & Backups/2. Disaster Recovery Plans/2. Designing a Disaster Recovery Plan - Google - Coursera.mp4 63.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/19 - Day 19 - Intermediate - Instances, State and Higher Order Functions/006 Aaaand, we're off to the races!.mp4 63.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 12 - Exploit Development/12.12 Exploit Development (part 12) Public Exploits and Perl.mp4 63.3 MB
  • CompTIA/CompTIA A+ Core 1 (220-1101)/1. Mobile Devices/1.1 Overview.mp4 63.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 6 - Insider Threat/6.5 Policy Enforcement.mp4 63.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 2 - Nmap Basics/2.9 Getting Help - NM.mp4 63.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 2 - Nmap Basics/2.9 Getting Help - NM.mp4 63.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 5 - Forensics of Incident Response/5.8 Volatile Memory Capture.mp4 63.0 MB
  • Cybrary/Cybrary - Become an Incident Handler/07. Online Reconnaissance/Module 1 - Online Reconnaissance/1.2 Job Boards, Certificates, and Company Websites.mp4 63.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.3 Course Use.mp4 63.0 MB
  • CompTIA/CompTIA Data+ (DA0-001)/5. Collect and Integrate Data/7. Sampling .mp4 62.9 MB
  • Splunk Training/9. Regular Expressions - From Beginning To End/9. Regex Anchors Lecture.mp4 62.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/003 Challenge Combining Jinja Templating with APIs.mp4 62.6 MB
  • Splunk Training/9. Regular Expressions - From Beginning To End/6. The basic characters to know Demo.mp4 62.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/53 - Day 53 - Intermediate+ Web Scraping Capstone - Data Entry Job Automation/001 Day 53 Goals what you will make by the end of the day.mp4 62.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/05. Malware Threats/Module 2 - Analyze Malware/2.4 Rootkit Lab Part 2.mp4 62.2 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/4. Active Directory/4. Managing Active Directory User Passwords - Google - Coursera.mp4 62.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/45 - Day 45 - Intermediate+ Web Scraping with Beautiful Soup/002 Parsing HTML and Making Soup.mp4 61.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 6 - Insider Threat/6.7 Policies and procedures (continued).mp4 61.9 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/4. Networking Services/3. Name Resolution in Practise/1. Resource Record Types.mp4 61.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 1/1.6 Why Sites Get Hacked.mp4 61.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/24 - Day 24 - Intermediate - Files, Directories and Paths/007 Solution & Walkthrough for the Mail Merge Project.mp4 61.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 2 - Incident Response Policy/2.6 The Role of the Incident Response Manager.mp4 61.6 MB
  • Cybrary/Cybrary - Become an Incident Handler/07. Online Reconnaissance/Module 1 - Online Reconnaissance/1.3 Social Media Lab Part 1.mp4 61.6 MB
  • Splunk Training/9. Regular Expressions - From Beginning To End/7. Quantifiers to Know Lecture.mp4 61.6 MB
  • MITRE/Cybrary - MITRE ATT&CK SOC Assessments Course/2. Analyzing SOC Components with ATT&CK/2.1 Setting a Coverage Rubric.mp4 61.3 MB
  • Splunk Training/1. Splunk Fundamentals 1/10. How to use the time picker.mp4 61.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Module 2 - The Cyber Kill Chain/2.1 Reconnaissance 1.mp4 61.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 5/5.1 Report Creation.mp4 61.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/42 - Day 42 - Web Foundation - Intermediate HTML/001 HTML Boilerplate.mp4 61.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 01 - Computer Forensics Today/1.5 Analyze Photos Lab Part 1.mp4 61.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 8 - Passwords/8.4 Passwords (part 4) Using oclhashcat.mp4 61.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/005 U.S. States Game Part 1 Setup.mp4 61.1 MB
  • Cybrary/Cybrary - Become an Incident Handler/06. Analyzing Attacks for Incident Handlers/Module 1 - Analyzing Attacks for Incident Handlers/1.7 Redline Analysis Lab Part 1.mp4 61.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 6 - Packers/6.2 Packers Part 2.mp4 61.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 8 - Incident Recovery/8.2 Resiliency - The Answer to the Cyber Security Paradox.mp4 61.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/11 - Day 11 - Beginner - The Blackjack Capstone Project/006 Hint 10-12 Solution Walkthrough.mp4 61.0 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/04_managing-resources/02_managing-our-time/01_getting-to-the-important-tasks.mp4 60.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/27 - Day 27 - Intermediate - Tkinter, args, kwargs and Creating GUI Programs/007 Buttons, Entry, and Setting Component Options.mp4 60.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 04 - Understanding Network Protocols/4.9 SMB Enumeration Demo.mp4 60.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 12 - Exploit Development/12.10 Exploit Development (part 10) Creating Shell Code in Kali Linux.mp4 60.6 MB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 4 - Making Defensive Recs for ATT&CK®-Mapped Data/4.4 Make Defensive Recommendations.mp4 60.6 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/01_troubleshooting-concepts/03_understanding-the-problem/03_finding-the-root-cause.mp4 60.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 10 - Post Exploitation/10.1 Post Exploitation (part 1) File Transfer without and Interactive Shell.mp4 60.5 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/02_slowness/03_when-slowness-problems-get-complex/01_parallelizing-operations.mp4 60.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 4 - Legal Aspects of Incident Response/4.3 Personally Identifiable Information (PII).mp4 60.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/002 How to Install & Set Up Selenium.mp4 60.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 10 - Post Exploitation/10.2 Post Exploitation (part 2) Exploit Development.mp4 60.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 12 - Exploit Development/12.13 Exploit Development (part 13) Turning a 3Com Exploit into a Metasploit Module.mp4 60.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 1 - Basic Assembly/1.6 Instructions, Directives and Generating a Listing.mp4 60.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 03 - Hard Disks & File Systems/3.8 Recovering Graphics Files Lab Part 2.mp4 60.1 MB
  • CompTIA/CompTIA Data+ (DA0-001)/22. Identify Data Privacy Concepts/4. Anonymized Data .mp4 60.0 MB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 1 - Mapping to ATT&CK® from Narrative Reports/1.4 Identifying Techniques or Sub-Techniques.mp4 59.9 MB
  • CompTIA/CompTIA Data+ (DA0-001)/15. Identify Data Analytics Tools/7. Other Analytics Tools .mp4 59.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.8 Structures, Unions and Malloc Example.mp4 59.7 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/03_crashing-programs/01_why-programs-crash/02_systems-that-crash.mp4 59.6 MB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 1 - Mapping to ATT&CK® from Narrative Reports/1.3 Translating the Behavior into a Tactic.mp4 59.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 3/3.10 Exploiting XSS.mp4 59.6 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/2. Pelcgbybtl (Cryptology)/2. Public Key or Asymmetric Encryption/1. Asymmetric Cryptography - Google - Coursera.mp4 59.5 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/03_crashing-programs/03_handling-bigger-incidents/01_crashes-in-complex-systems.mp4 59.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 2 - Intelligence Gathering/2.2 General Background Concepts.mp4 59.4 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/6. Creating a Company Culture for Security/2. Users/1. User Habits - Google - Coursera.mp4 59.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/05. Malware Threats/Module 2 - Analyze Malware/2.3 Rootkit Lab Part 1.mp4 59.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.13 VFP and Neon.mp4 59.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 2 - Nmap Basics/2.14 General Considerations - NM.mp4 59.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 2 - Nmap Basics/2.14 General Considerations - NM.mp4 59.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.6 Simple Function Example.mp4 59.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 4 - Network Scanning and Discovery/4.5 Scan Techniques Lab - NM.mp4 58.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 4 - Network Scanning and Discovery/4.5 Scan Techniques Lab - NM.mp4 58.9 MB
  • CompTIA/CompTIA Data+ (DA0-001)/8. Recode, Sort, Filter, and Aggregate Data/6. Challenge .mp4 58.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 6 - Vulnerabilities/6.4 Vulnerability Scanner Setup and Configuration of OpenVAS Part 2.mp4 58.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 12 - Exploit Development/12.4 Exploit Development (part 4) GNU Compilers.mp4 58.7 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/2. Pelcgbybtl (Cryptology)/4. Cryptography Applications/1. Public Key Infrastructure - Google - Coursera.mp4 58.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 4 - Legal Aspects of Incident Response/4.4 Giving notice to individuals.mp4 58.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 03 - Hard Disks & File Systems/3.9 Recovering Graphics Files Lab Part 3.mp4 58.2 MB
  • Cybrary/Cybrary - Become an Incident Handler/08. Scanning and Enumeration with NMAP/1.2 NMAP Lab Part 1.mp4 58.1 MB
  • CompTIA/CompTIA Data+ (DA0-001)/17. Explain Dashboarding/2. Dashboard Basics .mp4 58.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 2 - Introductory Commands/2.1 Command Line Survival Part 1.mp4 58.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/13. Intro to PowerShell Scripting/Module 1 - Intro to PowerShell Scripting/1.9 Common Commands Part 2.mp4 58.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 2 - Security Architecture/2.1 Network Security Architecture Part 1.mp4 58.0 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/3. The 3 A's of Cybersecurity - Authentication, Authorization, Accounting/1. Authentication/6. Kerberos - Google - Coursera.mp4 58.0 MB
  • CompTIA/CompTIA Data+ (DA0-001)/12. Explain Inferential Statistics/5. Hypothesis Testing Part 2 .mp4 58.0 MB
  • CompTIA/CompTIA Data+ (DA0-001)/10. Describe Measures of Central Tendencies/8. Challenge .mp4 57.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 08 - Getting a Shell, Now What/8.4 Transferring Files Demo.mp4 57.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 04 - Understanding Network Protocols/4.15 SSH Enumeration.mp4 57.7 MB
  • Protocol Deep Dive/OSPF - Deep Dive/06 - Troubleshooting Common OSPF Issues/46 - Troubleshooting Common OSPF Issues - Network Type Mismatch.mp4 57.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 7 - Malware/7.3 Dynamic Analysis.mp4 57.5 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/04_managing-resources/03_making-our-future-lives-easier/02_proactive-practices.mp4 57.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 4 - Defensive Recs from ATT&CK®-Mapped Data/4.3 Researching Organizational Capabilities and Constraints and Determine Trade-Offs.mp4 57.4 MB
  • MITRE/Cybrary - MITRE ATT&CK Cyber Threat Intelligence/4. Defensive Recs from ATT&CK-Mapped Data/4.3 Researching Organizational Capabilities and Constraints and Determine Trade-Offs.mp4 57.4 MB
  • MITRE/Cybrary - MITRE ATT&CK Cyber Threat Intelligence/4. Making Defensive Recommendations from ATT&CK-Mapped Data/4.3 Researching Organizational Capabilities and Constraints and Determine Trade-Offs.mp4 57.4 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/04_managing-resources/01_managing-computer-resources/03_managing-disk-space.mp4 57.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 1/1.10 Best Practices.mp4 57.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 6 - Insider Threat/6.1 What is Insider Threat.mp4 57.3 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/1. Introduction to IT/1. Introduction to IT Support/1. Program Introduction.mp4 57.3 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/5. Data Recovery & Backups/1. Planning for Data Recovery/6. Types of Backup - Google - Coursera.mp4 57.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 12 - Exploit Development/12.11 Exploit Development (part 11) Fuzzing.mp4 57.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 4 - Information Gathering/4.3 Information Gathering (part 3) Targeting Email and Maltego.mp4 57.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 1 - Introduction/1.1 Introduction.mp4 57.2 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/2. Centralized Management/What is centralized management- - Google - Coursera.mp4 57.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 6 - Insider Threat/6.8 Policies and procedures (continued).mp4 56.9 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/2. Pelcgbybtl (Cryptology)/1. Symmetric Encryption/1. Cryptography - Google - Coursera.mp4 56.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/007 Caesar Cipher Part 2 - Decryption.mp4 56.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 5 - Forensics of Incident Response/5.16 The Autopsy Program.mp4 56.5 MB
  • CompTIA/CompTIA Data+ (DA0-001)/3. Identify File Formats/2. Text Data .mp4 56.3 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 2 Cloud Data Security/Lesson 3 The Cloud Data Lifecycle/008. 3.7 Cloud Data Flows.mp4 56.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/004 [Interactive Coding Exercise] Paint Area Calculator.mp4 55.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 5 - Forensics of Incident Response/5.10 Formatting a disk for Incident Response.mp4 55.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.19 Dealing With Third Parties.mp4 55.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 3 - Nmap & The TCP_IP Protocol Suite/3.2 IP, TCP, UDP, and ICMP Headers - NM.mp4 55.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 3 - Nmap & The TCP_IP Protocol Suite/3.2 IP, TCP, UDP, and ICMP Headers - NM.mp4 55.8 MB
  • CompTIA/CompTIA Data+ (DA0-001)/7. Manipulate Data/2. Working with Strings .mp4 55.7 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/2. Pelcgbybtl (Cryptology)/4. Cryptography Applications/2. Cryptography in Action - Google - Coursera.mp4 55.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Module 2 - Wireshark and TCPDUMP/2.8 Applying Filters to TCPDUMP and Wireshark Lab Part 1.mp4 55.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Module 2 - Wireshark and TCPDUMP/2.6 Applying Filters to TCPDUMP and Wireshark Lab Part 1.mp4 55.5 MB
  • CompTIA/CompTIA Data+ (DA0-001)/14. Explore Analysis Techniques/2. Business Questions .mp4 55.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 1/1.2 Tools.mp4 55.5 MB
  • CompTIA/CompTIA Data+ (DA0-001)/10. Describe Measures of Central Tendencies/4. Median .mp4 55.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 2 - Incident Response Policy/2.5 Outsourcing Considerations.mp4 55.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 1/1.7 Why Sites Get Hacked.mp4 55.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 2 - Incident Response Policy/2.3 The Role of Communication with Law Enforcement when it comes to security.mp4 55.3 MB
  • CompTIA/CompTIA Data+ (DA0-001)/15. Identify Data Analytics Tools/5. SQL (Structures Query Language) .mp4 55.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/007 Multiple If Statements in Succession.mp4 55.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 5 - Forensics of Incident Response/5.3 The Preservation Phase of Investigation.mp4 55.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 1 - Basic Assembly/1.14 Arithmetic Shift.mp4 55.1 MB
  • Splunk Training/2. Splunk Fundamentals 2/19. Building a Workflow Action.mp4 55.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/007 Write, read and update JSON data in the Password Manager.mp4 55.0 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/01_automating-with-configuration-management/02_introduction-to-automation-at-scale/04_what-is-infrastructure-as-code.mp4 54.9 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 6 Data Center Design and Risk Analysis/006. 6.5 Cloud Infrastructure Risk Assessment.mp4 54.8 MB
  • CompTIA/CompTIA Data+ (DA0-001)/4. Explain Data Storage/3. OLTP and OLAP .mp4 54.8 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/03_crashing-programs/03_handling-bigger-incidents/02_communication-and-documentation-during-incidents.mp4 54.8 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/1. What is System Administration/1. Intro to System Administration IT Infrastructure Services/Course Introduction.mp4 54.7 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/01_introduction-to-version-control/01_course-introduction/01_course-introduction.mp4 54.7 MB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 1 - Mapping to ATT&CK® from Narrative Reports/1.5 Mapping to a Narrative Point.mp4 54.7 MB
  • MITRE/Cybrary - MITRE ATT&CK SOC Assessments Course/2. Analyzing SOC Components with ATT&CK/2.2 Working with Data Sources Part 1.mp4 54.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 03 - Kali Linux Basics/3.1 Setting up the Kali Linux VM.mp4 54.6 MB
  • Splunk Training/8. Getting Data In/4. REST API.mp4 54.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 03 - Kali Linux Basics/3.2 Overview of Tools in Kali Linux.mp4 54.5 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/6. Troubleshooting/2. Customer Service/2. Anatomy of an Interaction.mp4 54.4 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/4. Active Directory/6. What is Group Policy- - Google - Coursera.mp4 54.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/6. Incident Response Recovery/Module 1 - Incident Recovery/1.2 Incident Documentation.mp4 54.4 MB
  • Cybrary/Cybrary - Become an Incident Handler/04. Incident Response Recovery/Module 1 - Incident Recovery/1.2 Incident Documentation.mp4 54.4 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/5. Defense in Depth/2. Application Hardening/1. Software Patch Management - Google - Coursera.mp4 54.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 04 - Scanning and Enumeration/4.3 NMAP (Demo).mp4 54.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 1 - Mapping to ATT&CK® from Narrative Reports/1.6 Hedging Your Biases.mp4 54.3 MB
  • MITRE/Cybrary - MITRE ATT&CK Cyber Threat Intelligence/1. Mapping to ATT&CK from Narrative Reports/1.6 Hedging Your Biases.mp4 54.3 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/01_troubleshooting-concepts/03_understanding-the-problem/04_dealing-with-intermittent-issues.mp4 54.3 MB
  • CompTIA/CompTIA Data+ (DA0-001)/14. Explore Analysis Techniques/6.Analysis Types .mp4 54.3 MB
  • Protocol Deep Dive/ARP - Deep Dive/02 Address Resolution Protocol Fundamentals/06 Demo - Cisco Router ARP Basics .mp4 54.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 3 - Security Operations/3.5 Vulnerability Assessments.mp4 54.2 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 5 Cloud Infrastructure and Platform Components/003. 5.2 Network Cloud Environments.mp4 54.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 5 - Forensics of Incident Response/5.7 Imaging concepts.mp4 54.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 5 - Governance, Risk, and Compliance/5.4 Governance and Compliance Part 1.mp4 54.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/05. Malware Threats/Module 2 - Analyze Malware/2.5 Rootkit Lab Part 3.mp4 54.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/004 Multiline Statements with Jinja.mp4 54.0 MB
  • Protocol Deep Dive/DHCP - Deep Dive/02. Course Overview and DHCPv4/02_07-Configuring DHCPv4 on Cisco.mp4 53.9 MB
  • Splunk Training/4. Admin 1 - System Admin/1. Overview of Splunk Deployment.mp4 53.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/21 - Day 21 - Intermediate - Build the Snake Game Part 2 Inheritance & List Slicing/003 Detect Collisions with Food.mp4 53.9 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 2 Network Management/003. 2.2 Creating Static Routes.mp4 53.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/28 - Day 28 - Intermediate - Tkinter, Dynamic Typing and the Pomodoro GUI Application/003 Challenge - Complete the Application's User Interface (UI).mp4 53.7 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/2. Pelcgbybtl (Cryptology)/4. Cryptography Applications/4. Cryptographic Hardware - Google - Coursera.mp4 53.7 MB
  • CompTIA/CompTIA Data+ (DA0-001)/12. Explain Inferential Statistics/3. Confidence Intervals Part 2 .mp4 53.6 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/03_crashing-programs/01_why-programs-crash/04_what-to-do-when-you-can-t-fix-the-program.mp4 53.6 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/04_managing-resources/01_managing-computer-resources/02_memory-leaks-and-how-to-prevent-them.mp4 53.5 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/6. Creating a Company Culture for Security/1. Risk in the Workplace/2. Measuring and Assessing Risk - Google - Coursera.mp4 53.3 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/3. Software and Platform Services/1. Software Services/3. Configuring Email Services - Google - Coursera.mp4 53.3 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 7 Cloud Business Continuity Planning/006. 7.5 Disaster Recovery Plan Testing Strategies.mp4 53.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 06 - Introduction to Buffer Overflow/6.3 Fuzzing the Application.mp4 53.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/006 Introduction & Requirements for the Coffee Machine Project.mp4 53.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/56 - Day 56 - Intermediate+ Rendering HTMLStatic files and Using Website Templates/002 Rendering HTML Files with Flask.mp4 53.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 5 - Governance, Risk, and Compliance/5.1 Understanding Risk.mp4 53.0 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 11 Build and Implement a Physical and Logical Cloud Infrastructure/007. 11.6 Network Security Controls.mp4 53.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 2 - Nmap Basics/2.16 Custom Scan Profiles Part 2 - NM.mp4 53.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 2 - Nmap Basics/2.16 Custom Scan Profiles Part 2 - NM.mp4 53.0 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/04_managing-resources/03_making-our-future-lives-easier/01_dealing-with-hard-problems.mp4 53.0 MB
  • CompTIA/CompTIA Data+ (DA0-001)/11. Describe Measures of Dispersion/7. Percentages .mp4 52.9 MB
  • Cybrary/Cybrary - Become an Incident Handler/06. Analyzing Attacks for Incident Handlers/Module 1 - Analyzing Attacks for Incident Handlers/1.6 VM and Malware Lab.mp4 52.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/20 - Day 20 - Intermediate - Build the Snake Game Part 1 Animation & Coordinates/006 Programming is not Memorising.mp4 52.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Module 2 - Wireshark and TCPDUMP/2.10 TCPDUMP Lab.mp4 52.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Module 2 - Wireshark and TCPDUMP/2.8 TCPDUMP Lab.mp4 52.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 1 - Introduction to Incident Response/1.2 The Humans Behind Cyber Security Incidents.mp4 52.7 MB
  • CompTIA/CompTIA Data+ (DA0-001)/15. Identify Data Analytics Tools/6. Machine Learning .mp4 52.7 MB
  • CompTIA/CompTIA Data+ (DA0-001)/23. Explain Regulations and Compliance/5. Health Insurance Portability and Accountability Act (HIPAA) .mp4 52.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/006 Hurdles Challenge using While Loops.mp4 52.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/27 - Day 27 - Intermediate - Tkinter, args, kwargs and Creating GUI Programs/006 kwargs Many Keyword Arguments.mp4 52.4 MB
  • Cybrary/Cybrary - Become an Incident Handler/07. Online Reconnaissance/Module 1 - Online Reconnaissance/1.4 Social Media Lab Part 2.mp4 52.3 MB
  • CompTIA/CompTIA Data+ (DA0-001)/21. Identify Data Security Concepts/2. What is Data Security .mp4 52.3 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 12 Operational Controls and Standards/011. 12.10 Intelligent Security Control Monitoring.mp4 52.2 MB
  • CompTIA/CompTIA Data+ (DA0-001)/2. Explain Data Types/2. Numeric Data .mp4 52.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 1/1.12 Environment Setup.mp4 52.0 MB
  • CompTIA/CompTIA Data+ (DA0-001)/7. Manipulate Data/4. Base and Derived Data .mp4 51.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 05 - Web Application Penetration Testing/5.3 Using Intercepting Proxies Part 2.mp4 51.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.22 AES Implementations.mp4 51.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/55 - Day 55 - Intermediate+ HTML & URL Parsing in Flask and the Higher Lower Game/003 Rendering HTML Elements with Flask.mp4 51.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.21 Thumb Mode Example.mp4 51.5 MB
  • Protocol Deep Dive/OSPF - Deep Dive/03 - Forming Basic OSPF Relationships/11 - Looking into Neighbor States.mp4 51.4 MB
  • CompTIA/CompTIA Data+ (DA0-001)/10. Describe Measures of Central Tendencies/5. Mean .mp4 51.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/005 [Interactive Coding Exercise] Prime Number Checker.mp4 51.4 MB
  • Splunk Training/2. Splunk Fundamentals 2/16. Creating Tags and Setting Event Types.mp4 51.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 1 - Linux/1.5 Linux (part 5) IP Addressing and netcat.mp4 51.4 MB
  • Protocol Deep Dive/OSPF - Deep Dive/05 - Introducing Multi-area OSPF (Hierarchy)/36 - Viewing the Summary LSA (Type 4).mp4 51.3 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/01_troubleshooting-concepts/02_introduction-to-debugging/04_silently-crashing-application.mp4 51.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 7 - Malware/7.1 Malware incidents.mp4 51.2 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/6. Troubleshooting and Future of Networking/4. The Cloud/1. What is The Cloud.mp4 51.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/56 - Day 56 - Intermediate+ Rendering HTMLStatic files and Using Website Templates/003 Serving Static Files using Flask.mp4 51.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 4 - Data/4.3 Ways to Get Data.mp4 51.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.9 Privilege Escalation Case Study.mp4 50.9 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.9 Privilege Escalation Case Study.mp4 50.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/010 [Interactive Coding Exercise] Debugging Practice.mp4 50.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 5 - Forensics of Incident Response/5.4 Keys of Preservation.mp4 50.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/08. OWASP Top 10 - 2021/Module 1 - Introduction/1.6 Using Intercepting Proxies in Web Application Security Testing.mp4 50.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 4 - Security Engineering and Cryptography/4.10 Implementing PKI Solutions.mp4 50.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/004 Challenge 1 Solution - How to Check the User's Answer.mp4 50.8 MB
  • Cybrary/Cybrary - Become an Incident Handler/08. Scanning and Enumeration with NMAP/1.3 NMAP Lab Part 2.mp4 50.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/005 [Interactive Coding Exercise] BMI 2.0.mp4 50.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 4 - Defensive Recs from ATT&CK®-Mapped Data/4.2 How Techniques and Sub-Techniques are Being Used.mp4 50.7 MB
  • MITRE/Cybrary - MITRE ATT&CK Cyber Threat Intelligence/4. Defensive Recs from ATT&CK-Mapped Data/4.2 How Techniques and Sub-Techniques are Being Used.mp4 50.7 MB
  • MITRE/Cybrary - MITRE ATT&CK Cyber Threat Intelligence/4. Making Defensive Recommendations from ATT&CK-Mapped Data/4.2 How Techniques and Sub-Techniques are Being Used.mp4 50.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.3 Spearphishing Link.mp4 50.6 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.3 Spearphishing Link.mp4 50.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/002 The Python Dictionary Deep Dive.mp4 50.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.21 Max of Three Numbers.mp4 50.5 MB
  • Protocol Deep Dive/DNS - Deep Dive/03. Configuring DNS for Clients/09. Demo-Clearing Cache on Client and Server.mp4 50.5 MB
  • CompTIA/CompTIA Data+ (DA0-001)/19. Describe Data Governance Concepts/5. Data Steward .mp4 50.5 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/3. Software and Platform Services/4. Platform Services.zip 50.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 11 - WebApps/11.3 WebApp (part 3) SQL Injection.mp4 50.5 MB
  • Books/CompTIA/CySA+/bb-comptia.cysa.practice.tests.ex.epub 50.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/006 Building the Coffee Machine in OOP.mp4 50.4 MB
  • CompTIA/CompTIA Data+ (DA0-001)/8. Recode, Sort, Filter, and Aggregate Data/2. Recoding Data .mp4 50.4 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 1 Concepts and Architectures of Cloud Computing/010. 1.9 Impact of Cloud and Related Technologies.mp4 50.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.18 Specify IP Ranges and Domains.mp4 50.3 MB
  • Splunk Training/4. Admin 1 - System Admin/16. Splunk Diags and Distributed Search.mp4 50.3 MB
  • Splunk Training/8. Getting Data In/1. Windows UF setup.mp4 50.2 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/02_slowness/02_slow-code/04_keeping-local-results.mp4 50.2 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/3. Software and Platform Services/1. Software Services/5. Configuring Security Services - Google - Coursera.mp4 50.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 04 - Understanding Network Protocols/4.4 Scanning with Netcat.mp4 50.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 5 - Forensics of Incident Response/5.9 Forensics in Support of Incident Response.mp4 50.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/21 - Day 21 - Intermediate - Build the Snake Game Part 2 Inheritance & List Slicing/004 Create a Scoreboard and Keep Score.mp4 50.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/002 Catching Exceptions The try catch except finally Pattern.mp4 50.1 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/04_managing-cloud-instances-at-scale/01_building-software-for-the-cloud/02_storing-data-in-the-cloud.mp4 50.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 12 - Exploit Development/12.7 Exploit Development (part 7) Network Based Exploits and Debuggers.mp4 50.0 MB
  • Protocol Deep Dive/IPsec - Deep Dive/04 - Using IPsec in the Enterprise/14 - Using IPsec with DMVPN.mp4 50.0 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 2 Cloud Security Concepts and Design Principles/004. 2.3 Network and Virtualization Security.mp4 49.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 1 - Basic Assembly/1.10 Multiply and Divide Examples.mp4 49.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 10 - Password Cracking and Brute-Forcing Logins/10.3 Password Brute-Forcing Web Logins.mp4 49.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/82 - Day 82 - Professional Portfolio Project - [Python Web Development]/001 Where are the Videos and the Solution Code.mp4 49.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 2 - Mapping to ATT&CK® from Raw Data/2.4 Raw Data to Narrative Reporting.mp4 49.7 MB
  • MITRE/Cybrary - MITRE ATT&CK Cyber Threat Intelligence/2. Mapping to ATT&CK from Raw Data/2.4 Raw Data to Narrative Reporting MITRE ATT&CK Defender.mp4 49.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 5 - Forensics of Incident Response/5.13 Navigating the H Drive.mp4 49.6 MB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/1. Welcome to the exciting world of cybersecurity/01_get-started-with-the-certificate-program/1. Welcome to the Google Cybersecurity Certificate.mp4 49.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 1/1.8 Why Sites Get Hacked.mp4 49.6 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/04_managing-resources/01_managing-computer-resources/05_dealing-with-memory-leaks.mp4 49.5 MB
  • CompTIA/CompTIA Data+ (DA0-001)/1. Understanding Data and Information/3. Structured and Unstructured Data .mp4 49.4 MB
  • Splunk Training/1. Splunk Fundamentals 1/6. Basic navigation.mp4 49.4 MB
  • MITRE/Cybrary - MITRE ATT&CK SOC Assessments Course/1. Overview of ATT&CK-Based SOC Assessments/1.3 Framing an Assessment.mp4 49.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 2 - Nmap Basics/2.13 Constructing an Nmap Scan Lab Part 2 - NM.mp4 49.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 2 - Nmap Basics/2.13 Constructing an Nmap Scan Lab Part 2 - NM.mp4 49.3 MB
  • Cybrary/Cybrary - Become an Incident Handler/07. Online Reconnaissance/Module 1 - Online Reconnaissance/1.5 Social Media Lab Part 3.mp4 49.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/006 [Interactive Coding Exercise] BMI Calculator.mp4 49.3 MB
  • Splunk Training/1. Splunk Fundamentals 1/21. Creating an Automatic Lookup.mp4 49.3 MB
  • Protocol Deep Dive/DNS - Deep Dive/04. Modifying DNS Configuration for Servers/13. Demo-Creating Zones.mp4 49.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/003 Positional vs. Keyword Arguments.mp4 49.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 7 - Exploitation/7.1 Exploitation (part 1) Direct Exploitation.mp4 49.2 MB
  • Books/CompTIA/Security+/lc-wiley.comptia.securityplus.study.guide.exam.sy0-601.2021.epub 49.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Module 2 - Wireshark and TCPDUMP/2.2 Wireshark Lab Part 2.mp4 49.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Module 2 - Wireshark and TCPDUMP/2.2 Wireshark Lab Part 2.mp4 49.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 4 - Security Engineering and Cryptography/4.8 Cryptography.mp4 49.0 MB
  • CompTIA/CompTIA Data+ (DA0-001)/8. Recode, Sort, Filter, and Aggregate Data/4. Filtering Data .mp4 49.0 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/3. Software and Platform Services/1. Software Services/2. Configuring Communication Services - Google - Coursera.mp4 49.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 07 - Public Exploits/7.7 Public Exploit Lab Walkthrough.mp4 48.9 MB
  • MITRE/Cybrary - MITRE ATT&CK SOC Assessments Course/1. Overview of ATT&CK-Based SOC Assessments/1.1 Introduction- Bringing ATT&CK into the SOC.mp4 48.9 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/2. Hardware/1. The Modern Computer/2. Introduction to Computer Hardware.mp4 48.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/004 Indentation in Python.mp4 48.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.6 Memory, Offsets, Debugging and Listing.mp4 48.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/47 - Day 47 - Intermediate+ Create an Automated Amazon Price Tracker/001 Day 47 Goals what you will make by the end of the day.mp4 48.8 MB
  • CompTIA/CompTIA Data+ (DA0-001)/10. Describe Measures of Central Tendencies/7. Centrality and Outliers .mp4 48.7 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 5 Describe Azure compute and networking services/005. 5.4 Describe application hosting options.mp4 48.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/003 [Interactive Coding Exercise] Average Height.mp4 48.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 8 - Passwords/8.3 Passwords (part 3) Offline Password Attacks.mp4 48.6 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/3. The 3 A's of Cybersecurity - Authentication, Authorization, Accounting/1. Authentication/1. Authentication Best Practices - Google - Coursera.mp4 48.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 2 - Nmap Basics/2.5 Kali Linux Lab - Running it Live - NM.mp4 48.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 2 - Nmap Basics/2.5 Kali Linux Lab - Running it Live - NM.mp4 48.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.28 Rules of Engagement Part 1.mp4 48.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 2 - Introductory Commands/2.3 Changing Directories.mp4 48.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 2 - Introductory Commands/2.5 Windows Common Tools.mp4 48.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Resources/CHF Course Notes.pdf 48.5 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/02_using-git-locally/02_undoing-things/04_identifying-a-commit.mp4 48.5 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/4. Networking/1. What is Networking/2. Basics of Networking.mp4 48.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/008 Run Your Python Code in the Cloud!.mp4 48.4 MB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 4 - Making Defensive Recs for ATT&CK®-Mapped Data/4.3 Researching Organizational Capabilities and Constraints and Determine Trade-Offs.mp4 48.4 MB
  • Protocol Deep Dive/OSPF - Deep Dive/04 - Discussing Simple OSPF Communication Blocks/22 - Viewing into the Router LSA (Type 1).mp4 48.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.26 Shared Library Example.mp4 48.3 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/03_automation-in-the-cloud/01_cloud-computing/03_scaling-in-the-cloud.mp4 48.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 2 - Nmap Basics/2.10 Phases of the Nmap Scan - NM.mp4 48.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 2 - Nmap Basics/2.10 Phases of the Nmap Scan - NM.mp4 48.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 04 - Data Acquisition/4.3 Forensics Lab Part 1.mp4 48.1 MB
  • Splunk Training/5. Admin 2 - Data Admin/9. Tuning Inputs.mp4 48.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 13 - Smartphone Pentest Framework/13.5 SPF (part 5) Pentesting Mobile Devices.mp4 48.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/005 Practice Modifying Object Attributes and Calling Methods.mp4 48.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 3 - Security Operations/3.1 Threat Management.mp4 48.1 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/01_troubleshooting-concepts/01_course-introduction/01_course-introduction.mp4 48.0 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/01_troubleshooting-concepts/02_introduction-to-debugging/03_problem-solving-steps.mp4 48.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/42 - Day 42 - Web Foundation - Intermediate HTML/005 Image Elements.mp4 48.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.11 More Complicated Function.mp4 48.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 5 - Governance, Risk, and Compliance/5.2 The Risk Life Cycle.mp4 48.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 8 - Passwords/8.1 Passwords (part 1) Password Attacks.mp4 47.9 MB
  • Protocol Deep Dive/EIGRP - Deep Dive/07 - Reviewing EIGRP Load-balancing/31 - Implementing EIGRP Load-balancing.mp4 47.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 3 - Linux Command Line Tools/3.11 Linux Networking Part 1.mp4 47.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 5 - Forensics of Incident Response/5.5 Volatile Data Considerations.mp4 47.8 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/03_automation-in-the-cloud/01_cloud-computing/05_migrating-to-the-cloud.mp4 47.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/008 Python Tuples and How to Generate Random RGB Colours.mp4 47.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 4 - Security Engineering and Cryptography/4.7 Security Implications of Cloud Technology Adoption.mp4 47.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 1 - Basic Assembly/1.7 Logical Operators and Memory Layout.mp4 47.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/007 Turtle Challenge 4 - Generate a Random Walk.mp4 47.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 04 - Data Acquisition/4.4 Forensics Lab Part 2.mp4 47.4 MB
  • Protocol Deep Dive/ARP - Deep Dive/02 Address Resolution Protocol Fundamentals/03 Demo - Windows and ARP.mp4 47.3 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/4. Securing Your Networks/2. Wireless Security/1. WEP Encryption and Why You Shouldn_t Use It - Google - Coursera.mp4 47.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 1 - Introduction to Incident Response/1.1 An Overall View of the Course.mp4 47.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/17 - Day 17 - Intermediate - The Quiz Project & the Benefits of OOP/006 Quiz Project Part 2 Creating the List of Question Objects from the Data.mp4 47.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 5 - Enumeration Tools/5.1 Zenmap.mp4 47.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/010 Challenge 4 Solution - How to Keep Track of the Player's Lives.mp4 47.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 4 - Fingerprinting & Banner Grabbing/4.2 Banner Grabbing.mp4 47.1 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/5. Data Recovery & Backups/2. Disaster Recovery Plans/1. What_s a Disaster Recovery Plan- - Google - Coursera.mp4 47.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 07 - Public Exploits/7.3 Modifying the Code to Fit the Environment.mp4 47.0 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/3. Software and Platform Services/2. File Services/2. Network File Storage - Google - Coursera.mp4 46.9 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/6. Troubleshooting/1. Troubleshooting Best Practices/2. Ask Questions!.mp4 46.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 2 - Nmap Basics/2.3 Installing Nmap on Mac - NM.mp4 46.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 2 - Nmap Basics/2.3 Installing Nmap on Mac - NM.mp4 46.9 MB
  • CompTIA/CompTIA Data+ (DA0-001)/11. Describe Measures of Dispersion/4. Variance Part 2 .mp4 46.8 MB
  • Protocol Deep Dive/ARP - Deep Dive/04 Troubleshooting Common ARP Issues/06 Demo - Static ARP Problems .mp4 46.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/66 - Day 66 - Advanced - Building Your Own API with RESTful Routing/002 What is REST.mp4 46.8 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/04_managing-resources/02_managing-our-time/03_estimating-the-time-tasks-will-take.mp4 46.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 1 - Mapping to ATT&CK® from Narrative Reports/1.2 Finding and Researching the Behavior.mp4 46.8 MB
  • MITRE/Cybrary - MITRE ATT&CK Cyber Threat Intelligence/1. Mapping to ATT&CK from Narrative Reports/1.2 Finding and Researching the Behavior.mp4 46.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 3 - Metasploit/3.2 Metasploit (part 2) Fundamentals.mp4 46.8 MB
  • Splunk Training/7. Fields & Extractions/4. erex.mp4 46.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/31 - Day 31 - Intermediate - Flash Card App Capstone Project/003 Solution & Walkthrough for Creating the UI.mp4 46.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 3 - Incident Handling/3.1 An Introduction to Incident Handling.mp4 46.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 4 - Network Scanning and Discovery/4.12 Service and Application Version Detection Part 2 - NM.mp4 46.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 4 - Network Scanning and Discovery/4.12 Service and Application Version Detection Part 2 - NM.mp4 46.7 MB
  • CompTIA/CompTIA Data+ (DA0-001)/11. Describe Measures of Dispersion/6. Z-score .mp4 46.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/004 Working with Responses HTTP Codes, Exceptions & JSON Data.mp4 46.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Module 2 - Wireshark and TCPDUMP/2.5 Packet Sniffing Lab Part 1.mp4 46.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Module 2 - Wireshark and TCPDUMP/2.4 Packet Sniffing Lab Part 1.mp4 46.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 3 - Dynamic Analysis Part 1/3.3 Dynamic Analysis Part 1.3.mp4 46.5 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/1. Introduction to IT/2. History of Computing/1. From Abacus to Analytical Engine.mp4 46.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 4 - Tools and Techniques/4.6 OSINT the Systems.mp4 46.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 1 - Introduction to Incident Response/1.3 The Sony Hack Case Study.mp4 46.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 1 - Introduction to the Command Line/1.1 Introduction and Setup.mp4 46.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 05 - Web Application Penetration Testing/5.4 SQL Injections.mp4 46.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 3 - Nmap & The TCP_IP Protocol Suite/3.3 Nmap and Wireshark Part 1 - NM.mp4 46.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 3 - Nmap & The TCP_IP Protocol Suite/3.3 Nmap and Wireshark Part 1 - NM.mp4 46.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 5 - Forensics of Incident Response/5.12 The Forensic Acquisition of Data from a PC.mp4 46.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/003 The Hurdles Loop Challenge.mp4 46.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 5 - Advanced Command Line Techniques/5.2 Windows Command Redirection.mp4 46.1 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 5 Managing Partitions/010. 5.9 Creating LVM Volumes.mp4 46.1 MB
  • CompTIA/CompTIA Data+ (DA0-001)/14. Explore Analysis Techniques/5. Python EDA .mp4 46.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 5 - Governance, Risk, and Compliance/5.3 Vendor Risk.mp4 46.0 MB
  • MITRE/Cybrary - MITRE ATT&CK SOC Assessments Course/3. Synthesizing SOC Assessments/3.4 Compiling a Final Heatmap Part 2.mp4 45.8 MB
  • CompTIA/CompTIA Data+ (DA0-001)/8. Recode, Sort, Filter, and Aggregate Data/5. Aggregating Data .mp4 45.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/008 [Interactive Coding Exercise] Life in Weeks.mp4 45.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 1 - Introduction/1.2 Intro Part 2.mp4 45.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 3 - Linux Command Line Tools/3.3 Linux Basics Part 3.mp4 45.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/06. Phishing/Module 1 - Recon/1.6 Scanning With Recon-NG.mp4 45.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 5 - Forensics of Incident Response/5.11 Using the FTK Imaging Software.mp4 45.7 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/03_crashing-programs/02_code-that-crashes/03_fixing-someone-elses-code.mp4 45.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 05 - Web Application Penetration Testing/5.11 XXE Attacks.mp4 45.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/008 [Interactive Coding Exercise] Printing.mp4 45.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/41 - Day 41 - Web Foundation - Introduction to HTML/001 How Does the Internet Actually Work.mp4 45.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 1/1.5 Why Sites Get Hacked.mp4 45.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/49 - Day 49 - Intermediate+ Automating Job Applications on LinkedIn/005 Solution-LinkedIn-Job-Application-Automation.zip 45.3 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/04_managing-resources/03_making-our-future-lives-easier/03_planning-future-resource-usage.mp4 45.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.1 ARM Intro.mp4 45.3 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/1. Intro to IT Infrastructure Services/3. Types of IT Infrastructure Services.mp4 45.3 MB
  • Protocol Deep Dive/EIGRP - Deep Dive/02 - Covering EIGRP Essentials/04 - EIGRP Routing Concepts.mp4 45.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 2/2.8 Discovering SQLI.mp4 45.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/005 [Interactive Coding Exercise] Dictionary in List.mp4 45.1 MB
  • Cybrary/Cybrary - Become an Incident Handler/12. Stealth Techniques for Incident Handlers/Module 1 - Stealth Techniques for Incident Handlers/1.1 Being Stealthy.mp4 45.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/44 - Day 44 - Web Foundation - Intermediate CSS/003 Inspecting CSS.mp4 45.0 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/03_crashing-programs/03_handling-bigger-incidents/03_writing-effective-postmortems.mp4 45.0 MB
  • Protocol Deep Dive/ARP - Deep Dive/04 Troubleshooting Common ARP Issues/02 Connectivity Losses to Hosts and Default Gateway.mp4 44.9 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/01_troubleshooting-concepts/04_binary-searching-a-problem/03_applying-binary-search-in-troubleshooting.mp4 44.9 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/3. Package and Software Management/2. Package Managers/2. Linux- Package Manager Apt - Google - Coursera.mp4 44.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 4 - Dynamic Analysis Part 2/4.1 Dynamic Analysis Part 2.1.mp4 44.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/14. How to Use Unicornscan (BSWR)/Module 1 - Unicornscan (BSWR)/1.1 Unicornscan (BSWR).mp4 44.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 3 - Linux Command Line Tools/3.6 Linux Files Part 3.mp4 44.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.23 Payment Terms Part 1.mp4 44.8 MB
  • CompTIA/CompTIA Data+ (DA0-001)/18. Compare Visualizations/3. Scatterplots and Bubble Charts .mp4 44.8 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/04_collaboration/03_managing-projects/03_continuous-integration.mp4 44.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 5 - Forensics of Incident Response/5.6 Capturing the data.mp4 44.7 MB
  • Protocol Deep Dive/ARP - Deep Dive/05 Addressing ARP-related Security Risks/08 ARP Security Through Dynamic ARP Inspection.mp4 44.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 5 - Forensics of Incident Response/5.1 Forensics in Support of an Incident Response.mp4 44.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 1 - Basic Assembly/1.12 Skeleton and Loop Example.mp4 44.7 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/01_automating-with-configuration-management/01_course-introduction/01_course-introduction.mp4 44.7 MB
  • CompTIA/CompTIA Data+ (DA0-001)/22. Identify Data Privacy Concepts/5. Data Obfuscation .mp4 44.7 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/04_managing-resources/03_making-our-future-lives-easier/04_preventing-future-problems.mp4 44.6 MB
  • Splunk Training/1. Splunk Fundamentals 1/3. MacOS Installation.mp4 44.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 09 - Privilege Escalation/9.6 Privilege Escalation Walkthrough - Linux.mp4 44.6 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/04_managing-cloud-instances-at-scale/02_monitoring-and-alerting/02_getting-alerts-when-things-go-wrong.mp4 44.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/70 - Day 70 - Advanced - Deploying Your Web Application with Heroku/003 What is GitHub.mp4 44.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 5 - Vulnerability Discovery or Scanning/5.2 Vulnerability Scanning (part 2) Nessus.mp4 44.4 MB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 1 - Mapping to ATT&CK® from Narrative Reports/1.6 Hedging Your Biases.mp4 44.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 7 - Malware Defenses/7.1 Malware Defenses Part 1.mp4 44.3 MB
  • CompTIA/CompTIA Data+ (DA0-001)/10. Describe Measures of Central Tendencies/6. Centrality and Distributions .mp4 44.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 1 - Basic Assembly/1.1 Template and Setup.mp4 44.3 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/03_crashing-programs/02_code-that-crashes/05_debugging-a-python-crash.mp4 44.2 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/1. Understanding Security Threats/4. Other Attacks/3. Deceptive Attacks - Google - Coursera.mp4 44.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/01. Welcome to the SOC Analyst Level 1 Career Path/1.1 Welcome to the SOC Analyst Level 1 Career Path.mp4 44.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 6 - Traffic Capture/6.5 Traffic Capture (part 5) ettercap.mp4 44.0 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/03_crashing-programs/01_why-programs-crash/01_intro-to-module-3-crashing-programs.mp4 43.9 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/2. Hardware/2. Components/1. CPU.mp4 43.9 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/5. OpenLDAP/2. Managing OpenLDAP - Google - Coursera.mp4 43.9 MB
  • Protocol Deep Dive/ARP - Deep Dive/04 Troubleshooting Common ARP Issues/04 Demo - Stale ARP Cache Problems.mp4 43.9 MB
  • CompTIA/CompTIA Data+ (DA0-001)/4. Explain Data Storage/5. Schemas and Dimensions .mp4 43.8 MB
  • CompTIA/CompTIA Data+ (DA0-001)/10. Describe Measures of Central Tendencies/2. Measures of Central Tendency .mp4 43.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 01 - Computer Forensics Today/1.7 Analyze Photos Lab Part 3.mp4 43.8 MB
  • CompTIA/CompTIA Data+ (DA0-001)/15. Identify Data Analytics Tools/3. Programming Languages Part 1 .mp4 43.7 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/01_automating-with-configuration-management/02_introduction-to-automation-at-scale/03_what-is-configuration-management.mp4 43.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Module 2/2.3 Moving Around (KL).mp4 43.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Module 2/2.3 Moving Around (KL).mp4 43.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/27 - Day 27 - Intermediate - Tkinter, args, kwargs and Creating GUI Programs/003 Creating Windows and Labels with Tkinter.mp4 43.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 2 - Check for Live Systems & Ports/2.2 Checking for Live Systems Lab Part 2.mp4 43.7 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/03_crashing-programs/01_why-programs-crash/05_internal-server-error.mp4 43.6 MB
  • Books/Cloud/Cheshire J. Exam Ref AZ-900 Microsoft Azure Fundamentals 3ed 2023.pdf 43.6 MB
  • CompTIA/CompTIA Data+ (DA0-001)/18. Compare Visualizations/6. Tree Maps, Word Clouds, and Infographics .mp4 43.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 12 - Exploit Development/12.6 Exploit Development (part 6) Executing Unintended Code.mp4 43.5 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/02_slowness/01_understanding-slowness/03_how-computers-use-resources.mp4 43.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 4 - Windows Command Line Tools/4.7 Windows Networking Part 1.mp4 43.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 4 - Fingerprinting & Banner Grabbing/4.1 OS Fingerprinting.mp4 43.4 MB
  • CompTIA/CompTIA Data+ (DA0-001)/4. Explain Data Storage/2. Relational Databases .mp4 43.4 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 2 Cloud Security Concepts and Design Principles/002. 2.1 Cryptography and Key Management.mp4 43.4 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/02_slowness/02_slow-code/05_slow-script-with-expensive-loop.mp4 43.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/17 - Day 17 - Intermediate - The Quiz Project & the Benefits of OOP/007 Quiz Project Part 3 The QuizBrain and the next_question() Method.mp4 43.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 2 - Introductory Commands/2.2 Command Line Survival Part 2.mp4 43.2 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Summary/001. Exam AZ-900 Microsoft Azure Fundamentals Summary.mp4 43.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/01. Welcome to the Penetration Tester Career Path/Module 1 - Welcome to the Penetration Tester Career Path/1.1 Welcome to the Penetration Tester Career Path.mp4 43.1 MB
  • CompTIA/CompTIA Data+ (DA0-001)/23. Explain Regulations and Compliance/4. The Gramm-Leach-Biley Act (GLBA) .mp4 43.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/37 - Day 37 - Intermediate+ Habit Tracking Project API Post Requests & Headers/002 HTTP Post Requests.mp4 43.1 MB
  • MITRE/Cybrary - MITRE ATT&CK SOC Assessments Course/1. Overview of ATT&CK-Based SOC Assessments/1.2 A Methodology for Assessments.mp4 43.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/002 Defining and Calling Python Functions.mp4 43.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 4 - Information Gathering/4.2 Information Gathering (part 2) Domain Name Services.mp4 43.1 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/6. Troubleshooting and Future of Networking/2. Verifying Connectivity/1. Ping Internet Control Message Protocol.mp4 43.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 2 - Theory/2.2 What is OSINT.mp4 43.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 02 - Setting the Foundation for Success/2.1 Understanding the Penetration Test Report.mp4 43.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 4 - Security Engineering and Cryptography/4.4 Endpoint Security - Hardening Part 2.mp4 43.0 MB
  • Protocol Deep Dive/OSPF - Deep Dive/05 - Introducing Multi-area OSPF (Hierarchy)/30 - Reviewing the different OSPF Device Types.mp4 42.9 MB
  • Protocol Deep Dive/OSPF - Deep Dive/02 - Covering OSPF Basics/04 - Reviewing the OSPF Metric.mp4 42.9 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/04_managing-cloud-instances-at-scale/02_monitoring-and-alerting/03_service-level-objectives.mp4 42.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.14 Local Variables Example.mp4 42.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/004 [Interactive Coding Exercise] Days in Month.mp4 42.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/05. Malware Threats/Module 2 - Analyze Malware/2.1 Analyze and Classify Malware Lab Part 1.mp4 42.7 MB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 4 - Making Defensive Recs for ATT&CK®-Mapped Data/4.2 How Techniques and Sub-Techniques are Being Used.mp4 42.7 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/6. Troubleshooting and Future of Networking/3. Digging into DNS/4. Hosts Files.mp4 42.7 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/1. Introduction to Networking/5. The Data Link Layer/1. Ethernet and MAC Addresses.mp4 42.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 4 - Windows Command Line Tools/4.10 Net Command.mp4 42.7 MB
  • Protocol Deep Dive/DNS - Deep Dive/Exercise Files/05/Mod5-AtGabriela-PrimaryDownThenSecondaryDown.pcapng.gz 42.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 3 - Setting Up Splunk/3.3 Installing Splunk on Linux.mp4 42.6 MB
  • Protocol Deep Dive/EIGRP - Deep Dive/06 - Covering EIGRP Advanced Topics/27 - Significance of EIGRP Router-IDs, Pt 2.mp4 42.6 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/04_collaboration/03_managing-projects/02_tracking-issues.mp4 42.6 MB
  • Protocol Deep Dive/DNS - Deep Dive/05. Troubleshooting DNS/19. Demo-Isolating Cause of Inability to Access Local Resources Too.mp4 42.6 MB
  • CompTIA/CompTIA Data+ (DA0-001)/3. Identify File Formats/3. JSON Files .mp4 42.5 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 2 Cloud Security Concepts and Design Principles/008. 2.7 Functional Security Requirements in the Cloud.mp4 42.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 01 - Introduction/1.2 Introduction to the CEH Certification.mp4 42.5 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/02_deploying-puppet/03_updating-deployments/02_safely-rolling-out-changes-and-validating-them.mp4 42.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 04 - Understanding Network Protocols/4.14 FTP Enumeration Demo.mp4 42.4 MB
  • Cybrary/Cybrary - Become an Incident Handler/06. Analyzing Attacks for Incident Handlers/Module 1 - Analyzing Attacks for Incident Handlers/1.2 Memory Analysis Explanation.mp4 42.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 4 - Network Scanning and Discovery/4.4 Scan Techniques - NM.mp4 42.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 4 - Network Scanning and Discovery/4.4 Scan Techniques - NM.mp4 42.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 4 - Tools and Techniques/4.2 Search Engines.mp4 42.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 4 - Network Scanning and Discovery/4.17 NSE, Vulnerability Testing & Exploitation - NM.mp4 42.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 4 - Network Scanning and Discovery/4.17 NSE, Vulnerability Testing & Exploitation - NM.mp4 42.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.19 SIMD Encryption Example.mp4 42.3 MB
  • CompTIA/CompTIA Data+ (DA0-001)/6. Clean and Profile Datasets/1. Introduction .mp4 42.3 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/02_slowness/01_understanding-slowness/04_possible-causes-of-slowness.mp4 42.2 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/01_troubleshooting-concepts/02_introduction-to-debugging/02_what-is-debugging.mp4 42.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 4 - Security Engineering and Cryptography/4.2 Enterprise Mobility Security Part 2.mp4 42.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.2 Command Line Interface.mp4 42.2 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.2 Command Line Interface.mp4 42.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Module 2 - Wireshark and TCPDUMP/2.1 Wireshark Lab Part 1.mp4 42.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Module 2 - Wireshark and TCPDUMP/2.1 Wireshark Lab Part 1.mp4 42.2 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 2 Network Management/008. 2.7 Analyzing Network Traffic with tcpdump and nmap.mp4 42.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 6 - Preparing for Your Exam/6.1 Course Recap.mp4 42.2 MB
  • CompTIA/CompTIA Data+ (DA0-001)/19. Describe Data Governance Concepts/2. Data Governance .mp4 42.2 MB
  • CompTIA/CompTIA Data+ (DA0-001)/18. Compare Visualizations/5. Bar Charts and Histograms .mp4 42.2 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/3. The 3 A's of Cybersecurity - Authentication, Authorization, Accounting/2. Authorization/2. Access Control - Google - Coursera.mp4 42.1 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/6. Troubleshooting and Future of Networking/3. Digging into DNS/2. Public DNS Servers.mp4 42.1 MB
  • Protocol Deep Dive/EIGRP - Deep Dive/05 - Showing How Information Is Exchanged with EIGRP/17 - Neighbor Establishment - Demo.mp4 42.1 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/6. Troubleshooting and Future of Networking/5. IPv6/4. Interview Role Play Networking.mp4 42.0 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/02_slowness/03_when-slowness-problems-get-complex/04_using-threads-to-make-things-go-faster.mp4 42.0 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/4. Networking Services/2. Name Resolution/2. The Many Steps of Name Resolution.mp4 42.0 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 1 Concepts and Architectures of Cloud Computing/002. 1.1 Key Cloud Computing Definitions.mp4 41.9 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/4. Active Directory/2. Managing Active Directory - Google - Coursera.mp4 41.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 08 - Getting a Shell, Now What/8.1 The Different Types of Shells.mp4 41.9 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/6. Creating a Company Culture for Security/2. Users/2. Third-Party Security - Google - Coursera.mp4 41.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/21 - Day 21 - Intermediate - Build the Snake Game Part 2 Inheritance & List Slicing/002 Class Inheritance.mp4 41.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 4 - Network Scanning and Discovery/4.2 Target Specification Lab Part 1 - NM.mp4 41.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 4 - Network Scanning and Discovery/4.2 Target Specification Lab Part 1 - NM.mp4 41.7 MB
  • Protocol Deep Dive/EIGRP - Deep Dive/06 - Covering EIGRP Advanced Topics/24 - EIGRP Summary Routing, Pt 2.mp4 41.7 MB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 2 - Mapping to ATT&CK® from Raw Data/2.4 Raw Data to Narrative Reporting.mp4 41.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 4 - Legal Aspects of Incident Response/4.1 An Introduction to legal considerations of incident response.mp4 41.6 MB
  • Books/CompTIA/Pentest+/lc-wiley.comptia.pentestplus.study.guide.exam.pt0-002.2022.epub 41.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 5 - Forensics of Incident Response/5.2 The Phases of Investigation.mp4 41.6 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/2. Pelcgbybtl (Cryptology)/2. Public Key or Asymmetric Encryption/Asymmetric Encryption Algorithms - Google - Coursera.mp4 41.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.8 Function Epilogue.mp4 41.5 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/02_slowness/02_slow-code/01_writing-efficient-code.mp4 41.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 6 - Traffic Capture/6.3 Traffic Capture (part 3) Address Resolution Protocol ARP.mp4 41.4 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/02_slowness/01_understanding-slowness/02_why-is-my-computer-slow.mp4 41.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 1/1.11 Best Practices.mp4 41.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/006 Understanding Python Decorator Functions and the @ Syntax.mp4 41.4 MB
  • Protocol Deep Dive/ARP - Deep Dive/03 Understanding InARP, GARP, RARP, and Proxy ARP/03 Demo - InARP .mp4 41.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/001 Why do we need OOP and how does it work.mp4 41.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 5 - Governance, Risk, and Compliance/5.6 Business Impact Analysis.mp4 41.3 MB
  • Splunk Training/7. Fields & Extractions/3. Regex Powerpoint.mp4 41.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/20 - Day 20 - Intermediate - Build the Snake Game Part 1 Animation & Coordinates/005 How to Control the Snake with a Keypress.mp4 41.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/37 - Day 37 - Intermediate+ Habit Tracking Project API Post Requests & Headers/006 How to use HTTP Put and Delete Requests.mp4 41.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 09 - Privilege Escalation/9.2 Windows Privilege Escalation.mp4 41.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/005 Challenge Use Selenium in a Blank Project & Scrape a Different Piece of Data.mp4 41.1 MB
  • CompTIA/CompTIA Data+ (DA0-001)/19. Describe Data Governance Concepts/3. Data Governance Roles .mp4 41.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.5 OSI Layers 1 and 2.mp4 41.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/04. How to Use binwalk (BSWJ)/Module 1 - BSWJ - binwalk/1.1 BSWJ - binwalk.mp4 41.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/5. How to Use binwalk (BSWJ)/Module 1 - BSWJ - binwalk/1.1 BSWJ - binwalk.mp4 41.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 4 - Legal Aspects of Incident Response/4.2 Expectation of Privacy.mp4 41.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 3 - OSINT Playground/3.4 Password Manager.mp4 41.0 MB
  • CompTIA/CompTIA Data+ (DA0-001)/16. Explain Business Requirements and Reports/6. Including Documentation .mp4 40.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/004 Importing Modules, Installing Packages, and Working with Aliases.mp4 40.9 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/6. Configuring Network Services/2. Configuring DHCP with Dnsmasq - Google - Coursera.mp4 40.9 MB
  • Job Tips/Writing a Tech Resume/0. Introduction/0.1 Why do you need a resume.mp4 40.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 2/2.11 Discovering SQLI.mp4 40.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/002 Trivia Question API Challenge.mp4 40.8 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/01_troubleshooting-concepts/03_understanding-the-problem/02_creating-a-reproduction-case.mp4 40.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 5 - Governance, Risk, and Compliance/5.5 Governance and Compliance Part 2.mp4 40.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 3/3.9 Exploiting XSS.mp4 40.6 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/1. Introduction to Directory Services/2. What is a directory server.mp4 40.6 MB
  • Protocol Deep Dive/IPsec - Deep Dive/03 - Building the IPsec Protocol/11 - Seeing IPsec in Action.mp4 40.5 MB
  • Protocol Deep Dive/DNS - Deep Dive/02. Exploring DNS Terminology and Use Cases/05. Capturing DNS Recursion.mp4 40.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/002 Control Flow with if else and Conditional Operators.mp4 40.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/2. OWASP Top 10 - 2021/Module 1 - Introduction/1.5 Using Intercepting Proxies in Web Application Security Testing.mp4 40.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.17 Start and End Dates.mp4 40.5 MB
  • CompTIA/CompTIA Data+ (DA0-001)/6. Clean and Profile Datasets/5. Working with Outliers .mp4 40.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.27 Strings Uppercase Example.mp4 40.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/005 Class based Tkinter UI.mp4 40.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 3 - Linux Command Line Tools/3.10 Linux System Part 2.mp4 40.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/08. OWASP Top 10 - 2021/Module 1 - Introduction/1.4 The OWASP Top 10.mp4 40.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/2. OWASP Top 10 - 2021/Module 1 - Introduction/1.3 The OWASP Top 10.mp4 40.2 MB
  • Cybrary/Cybrary - Become an Incident Handler/03. Implementing an Incident Response Plan/Module 1 - Implementing an Incident Response Plan/1.4 Chain of Custody Part 2.mp4 40.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 4 - Windows Command Line Tools/4.5 Windows System Part 2.mp4 40.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 2 - Check for Live Systems & Ports/2.1 Checking for Live Systems Lab Part 1.mp4 40.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 2 - Nmap Basics/2.11 Constructing an Nmap Scan - NM.mp4 40.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 2 - Nmap Basics/2.11 Constructing an Nmap Scan - NM.mp4 40.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.18 Floating Point Circle Example.mp4 40.1 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/4. Networking/2. Limitations of the Internet/1. History of the Internet.mp4 40.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 01 - Course Introduction/1.1 Course Overview.mp4 40.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 2 - Intelligence Gathering/2.6 OSINT Part 1.mp4 39.9 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/2. Pelcgbybtl (Cryptology)/4. Cryptography Applications/3. Securing Network Traffic - Google - Coursera.mp4 39.9 MB
  • Protocol Deep Dive/EIGRP - Deep Dive/05 - Showing How Information Is Exchanged with EIGRP/19 - External Routes - Demo.mp4 39.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 06 - Network and Perimeter Hacking/6.5 Introduction to Social Engineering.mp4 39.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.30 Capabilities and Technology in Place.mp4 39.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/12. Intro to Burp Suite Pro/Module 4 - Conclusion/4.1 Scan Review and Conclusion.mp4 39.7 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/03_automation-in-the-cloud/01_cloud-computing/04_evaluating-the-cloud.mp4 39.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 10 - Post Exploitation/10.4 Post Exploitation (part 4) Setting Up a Domain Controller.mp4 39.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 4 - Network Scanning and Discovery/4.7 Host Discovery Part 2 - NM.mp4 39.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 4 - Network Scanning and Discovery/4.7 Host Discovery Part 2 - NM.mp4 39.7 MB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 1 - Mapping to ATT&CK® from Narrative Reports/1.2 Finding and Researching the Behavior.mp4 39.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/009 Give Feedback to the Player, Keep Score and Fix the Bugs =).mp4 39.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 1 - Linux/1.4 Linux (part 4) chmod, manipulation and packages.mp4 39.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 5 - Vulnerability Discovery or Scanning/5.5 Vulnerability Scanning (part 5) WebApp, XAMPP, WEBDAV, nikto.mp4 39.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 4 - Windows Command Line Tools/4.3 Windows Files Part 2.mp4 39.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 2 - Security Architecture/2.2 Network Security Architecture Part 2.mp4 39.5 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/02_using-git-locally/01_advanced-git-interaction/03_getting-more-information-about-our-changes.mp4 39.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/28 - Day 28 - Intermediate - Tkinter, Dynamic Typing and the Pomodoro GUI Application/007 Adding Checkmarks and Resetting the Application.mp4 39.5 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/2. Hardware/2. Components/3. Motherboards.mp4 39.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/004 How to Add Python Packages and use PyPi.mp4 39.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 3 - Linux Command Line Tools/3.2 Linux Basics Part 2.mp4 39.4 MB
  • Cybrary/Cybrary - Become an Incident Handler/03. Implementing an Incident Response Plan/Module 1 - Implementing an Incident Response Plan/1.3 Chain of Custody Part 1.mp4 39.3 MB
  • CompTIA/CompTIA Data+ (DA0-001)/1. Understanding Data and Information/2. Data and Information .mp4 39.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/29 - Day 29 - Intermediate - Building a Password Manager GUI App with Tkinter/006 Dialog Boxes and Pop-Ups in Tkinter.mp4 39.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 2 - Nmap Basics/2.1 Installing Nmap on Windows - NM.mp4 39.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 2 - Nmap Basics/2.1 Installing Nmap on Windows - NM.mp4 39.2 MB
  • Cybrary/Cybrary - Become an Incident Handler/02. Incident Response Planning/Module 1 - Incident Response Planning/1.1 Incident Response Kits Introduction.mp4 39.2 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/2. Hardware/3. Starting it up/1. BIOS.mp4 39.1 MB
  • CompTIA/CompTIA Data+ (DA0-001)/3. Identify File Formats/6. Challenge .mp4 39.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 5/5.2 Report Creation.mp4 39.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 1 - Basic Assembly/1.13 Shift Left and Right.mp4 39.1 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/03_automation-in-the-cloud/02_managing-instances-in-the-cloud/01_spinning-up-vms-in-the-cloud.mp4 39.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 4 - Network Scanning and Discovery/4.6 Host Discovery Part 1 - NM.mp4 39.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 4 - Network Scanning and Discovery/4.6 Host Discovery Part 1 - NM.mp4 39.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 3 - Incident Handling/3.4 The REACT Principle.mp4 39.1 MB
  • CompTIA/CompTIA Data+ (DA0-001)/19. Describe Data Governance Concepts/7. Challenge .mp4 39.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/12 - Day 12 - Beginner - Scope & Number Guessing Game/001 Namespaces Local vs. Global Scope.mp4 39.0 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/04_managing-cloud-instances-at-scale/01_building-software-for-the-cloud/04_change-management.mp4 39.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 04 - Scanning and Enumeration/4.1 Introduction to Network Scanning.mp4 39.0 MB
  • Cybrary/Cybrary - Become an Incident Handler/02. Incident Response Planning/Module 1 - Incident Response Planning/1.4 Incident Response Team Models.mp4 39.0 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/01_introduction-to-version-control/02_before-version-control/04_applying-changes.mp4 39.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/007 Walkthrough and Solution for the OOP Coffee Machine.mp4 38.9 MB
  • CompTIA/CompTIA Data+ (DA0-001)/3. Identify File Formats/5. XML .mp4 38.9 MB
  • Cybrary/Cybrary - Become an Incident Handler/07. Online Reconnaissance/Module 1 - Online Reconnaissance/1.1 Reconnaissance.mp4 38.8 MB
  • CompTIA/CompTIA Data+ (DA0-001)/2. Explain Data Types/3. Text Data .mp4 38.8 MB
  • Splunk Training/9. Regular Expressions - From Beginning To End/4. Highlight resources to use.mp4 38.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Module 2 - Wireshark and TCPDUMP/2.3 Wireshark Lab Part 3.mp4 38.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Module 2 - Wireshark and TCPDUMP/2.3 Wireshark Lab Part 3.mp4 38.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 2 - Incident Response Policy/2.1 An Overview of Incident Response Policy.mp4 38.7 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/01_hello-python/01_course-introduction/01_specialization-introduction.mp4 38.7 MB
  • Cybrary/Cybrary - Become an Incident Handler/08. Scanning and Enumeration with NMAP/1.1 Scanning and Enumeration.mp4 38.7 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/1. Introduction to IT/1. Introduction to IT Support/2. What is IT.mp4 38.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 3 - Security Operations/3.4 Vulnerability Management.mp4 38.6 MB
  • Splunk Training/7. Fields & Extractions/2. Fields with IN clause.mp4 38.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 4 - Windows Command Line Tools/4.1 Windows Basis.mp4 38.6 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/03_working-with-remotes/03_solving-conflicts/01_the-pull-merge-push-workflow.mp4 38.6 MB
  • Protocol Deep Dive/TCP & UDP - Deep Dive/04.TCP UDP Ready Set Action/04.02.TCP Web Session Analysis.mp4 38.6 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 8 Managing and Monitoring Performance/004. 8.3 Understanding Cgroups.mp4 38.5 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/01_troubleshooting-concepts/03_understanding-the-problem/05_intermittently-failing-script.mp4 38.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 7 - Malware/7.2 Setting up a Virtual Machine.mp4 38.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/08. OWASP Top 10 - 2021/Module 1 - Introduction/1.2 Introduction.mp4 38.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 04 - Understanding Network Protocols/4.10 NFS Enumeration.mp4 38.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 5 - Using Data/5.3 Alerts.mp4 38.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 2 - Nmap Basics/2.2 Installing Nmap on Linux - NM.mp4 38.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 2 - Nmap Basics/2.2 Installing Nmap on Linux - NM.mp4 38.3 MB
  • Cybrary/Cybrary - Become an Incident Handler/06. Analyzing Attacks for Incident Handlers/Module 1 - Analyzing Attacks for Incident Handlers/1.5 Redline Lab.mp4 38.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 1 - Just the Basics/1.7 For Loops - IP.mp4 38.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 3 - Metasploit/3.6 Metasploit (part 6) msfvenom.mp4 38.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/41 - Day 41 - Web Foundation - Introduction to HTML/002 How Do Websites Actually Work.mp4 38.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 3 - Linux Command Line Tools/3.5 Linux Files Part 2.mp4 38.1 MB
  • Cybrary/Cybrary - Become an Incident Handler/06. Analyzing Attacks for Incident Handlers/Module 1 - Analyzing Attacks for Incident Handlers/1.4 Lab Introduction.mp4 38.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 9 - Advanced Exploitation/9.2 Advanced Exploitation (part 2) Client Side Attacks.mp4 38.1 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/01_hello-python/01_course-introduction/02_course-introduction.mp4 38.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 07 - Web Application Hacking/7.2 Types of Web Server Attacks and Countermeasures.mp4 38.1 MB
  • CompTIA/CompTIA Data+ (DA0-001)/12. Explain Inferential Statistics/2. Confidence Intervals Part 1 .mp4 38.0 MB
  • Protocol Deep Dive/ARP - Deep Dive/03 Understanding InARP, GARP, RARP, and Proxy ARP/08 Demo - Duplicate IP Detection .mp4 38.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.7 Structures, Unions and Malloc.mp4 38.0 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/02_slowness/02_slow-code/03_expensive-loops.mp4 38.0 MB
  • Protocol Deep Dive/DNS - Deep Dive/04. Modifying DNS Configuration for Servers/15. Demo-Adding Records and Confirming Zone Transfer.mp4 38.0 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/01_getting-your-python-on/02_getting-ready-for-python/06_setting-up-your-environment-on-linux-optional.mp4 38.0 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/03_working-with-remotes/03_solving-conflicts/02_pushing-remote-branches.mp4 37.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/14 - Day 14 - Beginner - Higher Lower Game Project/001 Introduction & Program Requirements for the Higher Lower Game.mp4 37.9 MB
  • CompTIA/CompTIA Data+ (DA0-001)/23. Explain Regulations and Compliance/6. Family Educational Rights and Privacy Act (FERPA) .mp4 37.9 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/4. Networking Services/4. Dynamic Host Configuration Protocol DHCP/1. Overview of DHCP.mp4 37.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 4 - Security Engineering and Cryptography/4.1 Enterprise Mobility Security Part 1.mp4 37.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/28 - Day 28 - Intermediate - Tkinter, Dynamic Typing and the Pomodoro GUI Application/005 Dynamic Typing Explained.mp4 37.8 MB
  • CompTIA/CompTIA Data+ (DA0-001)/20. Describe Data Quality Control Concepts/3. Data Dictionary .mp4 37.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 2 - Security Architecture/2.10 Virtualization and Cloud Technology.mp4 37.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.20 64-Bit Assembly.mp4 37.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/27 - Day 27 - Intermediate - Tkinter, args, kwargs and Creating GUI Programs/009 Tkinter Layout Managers pack(), place() and grid().mp4 37.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/002 START HERE.mp4 37.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/002 START HERE.mp4_original 37.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/17 - Day 17 - Intermediate - The Quiz Project & the Benefits of OOP/010 The Benefits of OOP Use Open Trivia DB to Get New Questions.mp4 37.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 4 - Network Scanning and Discovery/4.10 TCP & UDP Port Scanning Lab Part 2.mp4 37.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 4 - Network Scanning and Discovery/4.10 TCP & UDP Port Scanning Lab Part 2.mp4 37.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Module 3/3.3 Useful Commands (KL).mp4 37.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Module 3/3.3 Useful Commands (KL).mp4 37.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 6 - Vulnerabilities/6.3 Vulnerability Scanner Setup and Configuration of OpenVAS Part 1.mp4 37.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 7 - Exploitation/7.2 Exploitation (part 2) SQL Commands.mp4 37.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/51 - Day 51 - Intermediate+ Internet Speed Twitter Complaint Bot/001 Day 51 Goals what you will make by the end of the day.mp4 37.6 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/6. Creating a Company Culture for Security/3. Incident Handling/3. Interview Role Play- Security - Google - Coursera.mp4 37.6 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/6. Operating Systems in Practice/1. Remote Access/2. Remote Connection and SSH - Google - Coursera.mp4 37.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 5 - Enumeration Tools/5.2 Dig and Finger Commands.mp4 37.6 MB
  • CompTIA/CompTIA Data+ (DA0-001)/4. Explain Data Storage/4. Non-Relational Databases .mp4 37.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/012 [Interactive Coding Exercise] Input Function.mp4 37.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 4 - Security Engineering and Cryptography/4.3 Endpoint Security - Hardening Part 1.mp4 37.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.14 Neon Example.mp4 37.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/55 - Day 55 - Intermediate+ HTML & URL Parsing in Flask and the Higher Lower Game/005 Advanced Decorators with args and kwargs.mp4 37.4 MB
  • Cybrary/Cybrary - Become an Incident Handler/02. Incident Response Planning/Module 1 - Incident Response Planning/1.5 Incident Response Team Members.mp4 37.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 3 - Incident Handling/3.2 CIRC Team Composition.mp4 37.3 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/3. The 3 A's of Cybersecurity - Authentication, Authorization, Accounting/1. Authentication/3. Certificates - Google - Coursera.mp4 37.3 MB
  • CompTIA/CompTIA Data+ (DA0-001)/13. Apply Inferential Statistics/6. Simple Linear Regression .mp4 37.2 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/2. Pelcgbybtl (Cryptology)/1. Symmetric Encryption/2. Symmetric Cryptography - Google - Coursera.mp4 37.2 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/3. Operating System/1. What_s an Operating System/2. Components of an Operating System.mp4 37.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 3 - Linux Command Line Tools/3.8 Linux Files Part 5.mp4 37.2 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 8 Managing and Monitoring Performance/003. 8.2 Interpreting Memory Statistics.mp4 37.2 MB
  • CompTIA/CompTIA Data+ (DA0-001)/12. Explain Inferential Statistics/6. T-test Part 1 .mp4 37.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 5 - Advanced Command Line Techniques/5.1 Windows Advanced Piping and Ampersands.mp4 37.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Module 2 - Identifying Web Attacks Through Logs/2.4 SQL Injection.mp4 37.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.13 Additional Support Part 2.mp4 37.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/42 - Day 42 - Web Foundation - Intermediate HTML/006 Day 42 Project - Birthday Invite Website.mp4 37.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 6 - Vulnerabilities/6.1 Vulnerability Scanner Setup and Configuration of Core Impact Part 1.mp4 37.1 MB
  • Cybrary/Cybrary - Become an Incident Handler/03. Implementing an Incident Response Plan/Module 1 - Implementing an Incident Response Plan/1.6 Recovery.mp4 37.1 MB
  • Cybrary/Cybrary - Become an Incident Handler/03. Implementing an Incident Response Plan/Module 1 - Implementing an Incident Response Plan/1.1 Incident Identification.mp4 37.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Module 2 - The Cyber Kill Chain/2.8 Action on Objectives.mp4 37.1 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 1 Concepts and Architectures of Cloud Computing/008. 1.7 Cloud Deployment Models.mp4 37.0 MB
  • Protocol Deep Dive/DNS - Deep Dive/05. Troubleshooting DNS/23. Demo-Troubleshooting Error Responses.mp4 37.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/006 Printing to the Console in Python.mp4 37.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/006 Printing to the Console in Python.mp4_original 37.0 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/03_working-with-remotes/03_solving-conflicts/04_another-rebasing-example.mp4 37.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 2 - Intelligence Gathering/2.5 Target Selection.mp4 37.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 1 - Basic Assembly/1.11 Compare, Conditionals and Jumps.mp4 37.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 1 - Basic Assembly/1.3 Architecture, Registers, and Protected Mode.mp4 37.0 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/3. File & Text Manipulation/9. Windows- Input, Output, and the Pipeline - Google - Coursera.mp4 36.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 1 - Just the Basics/1.11 Turning Logic into Pseudocode Part 3 - IP.mp4 36.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 6 - Insider Threat/6.2 American Superconductor Case Study.mp4 36.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 4 - Data/4.2 Web Interface Tour.mp4 36.8 MB
  • Cybrary/Cybrary - Become an Incident Handler/02. Incident Response Planning/Module 1 - Incident Response Planning/1.2 Incident Response Kits Hardware.mp4 36.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 03 - Footprinting and Reconnaissance/3.8 Job Boards (Demo).mp4 36.8 MB
  • Splunk Training/9. Regular Expressions - From Beginning To End/5. The basic characters to know Lecture.mp4 36.8 MB
  • MITRE/Cybrary - MITRE ATT&CK SOC Assessments Course/2. Analyzing SOC Components with ATT&CK/2.3 Working with Data Sources Part 2.mp4 36.8 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/2. Hardware/2. Components/4. Storage.mp4 36.8 MB
  • CompTIA/CompTIA Data+ (DA0-001)/5. Collect and Integrate Data/2. ETL and ELT .mp4 36.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 2 - Security Architecture/2.3 Secure Infrastructure Design.mp4 36.7 MB
  • Cybrary/Cybrary - Become an Incident Handler/06. Analyzing Attacks for Incident Handlers/Module 1 - Analyzing Attacks for Incident Handlers/1.3 Using FTK for Memory Analysis.mp4 36.7 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/6. Troubleshooting and Future of Networking/5. IPv6/3. IPv6 and IPv4 Harmony.mp4 36.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.13 Inline Assembly.mp4 36.7 MB
  • CompTIA/CompTIA Data+ (DA0-001)/2. Explain Data Types/4. Discrete and Continuous Data .mp4 36.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 2 - Check for Live Systems & Ports/2.3 Checking for Open Ports Lab Part 1.mp4 36.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 2 - Security Architecture/2.9 Authorization Controls.mp4 36.6 MB
  • CompTIA/CompTIA Data+ (DA0-001)/7. Manipulate Data/5. Joining Datasets .mp4 36.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 6 - Traffic Capture/6.6 Traffic Capture (part 6) SSL Stripping.mp4 36.6 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 13 Networking and Database/003. 13.2 Virtual Private Cloud (VPC).mp4 36.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Module 2 - Identifying Web Attacks Through Logs/2.8 Other Log Sources Part 1.mp4 36.5 MB
  • CompTIA/CompTIA Data+ (DA0-001)/15. Identify Data Analytics Tools/8. Bonus Resources .mp4 36.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 2 - Incident Response Policy/2.7 What does an Incident Response team do.mp4 36.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/11 - Day 11 - Beginner - The Blackjack Capstone Project/004 Hint 6-8 Solution Walkthrough.mp4 36.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 1 - Linux/1.2 Linux (part 2) Kali Linux Commands.mp4 36.4 MB
  • CompTIA/CompTIA Data+ (DA0-001)/22. Identify Data Privacy Concepts/2. What is Data Privacy .mp4 36.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/22 - Day 22 - Intermediate - Build Pong The Famous Arcade Game/009 Score Keeping and Changing the Ball Speed.mp4 36.3 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 17 Managing Linux Server Roles/006. 17.5 Managing Datacenter Storage.mp4 36.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.14 Inline Assembly Example.mp4 36.2 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/5. Connecting to the Internet/5. Wireless Networking/1. Introduction to Wireless Networking Technologies.mp4 36.2 MB
  • Splunk Training/9. Regular Expressions - From Beginning To End/17. Regex in Splunk conf files Lecture.mp4 36.2 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/5. Connecting to the Internet/2. POTS and Dial up/1. Dial-up, Modems and Point-to-Point Protocols.mp4 36.2 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/04_managing-resources/01_managing-computer-resources/04_network-saturation.mp4 36.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.2 Who and Why.mp4 36.1 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/2. The Network Layer/3. Subnetting/2. Subnet Masks.mp4 36.1 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/03_automation-in-the-cloud/01_cloud-computing/02_cloud-services-overview.mp4 36.1 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/4. Networking/2. Limitations of the Internet/2. Limitations of the Internet.mp4 36.1 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/01_introduction-to-version-control/04_using-git/04_anatomy-of-a-commit-message.mp4 36.1 MB
  • Cybrary/Cybrary - Become an Incident Handler/03. Implementing an Incident Response Plan/Module 1 - Implementing an Incident Response Plan/1.5 Incident Containment.mp4 36.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 6 - Vulnerabilities/6.2 Vulnerability Scanner Setup and Configuration of Core Impact Part 2.mp4 36.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.8 Metrics for Time Estimation Part 1.mp4 35.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.3 Slack Intro Part 1.mp4 35.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/65 - Day 65 - Web Design School - How to Create a Website that People will Love/001 Introduction to Web Design.mp4 35.9 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/04_collaboration/03_managing-projects/01_managing-collaboration.mp4 35.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/004 [Interactive Coding Exercise] High Score.mp4 35.8 MB
  • Splunk Training/4. Admin 1 - System Admin/5. Applications.mp4 35.8 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/6. Troubleshooting and Future of Networking/4. The Cloud/2. Everything as a Service.mp4 35.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 11 - WebApps/11.2 WebApp (part 2) Vulnerable Web Applications.mp4 35.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 3 - Incident Handling/3.5 Maintaining the Integrity of the Scene following an incident.mp4 35.7 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/6. Creating a Company Culture for Security/2. Users/3. Security Training - Google - Coursera.mp4 35.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 4 - Network Scanning and Discovery/4.13 Operating System Detection and Fingerprinting Part 1 - NM.mp4 35.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 4 - Network Scanning and Discovery/4.13 Operating System Detection and Fingerprinting Part 1 - NM.mp4 35.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 3 - Linux Command Line Tools/3.1 Linux Basics Part 1.mp4 35.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 6 - Packers/6.5 Packers Part 5.mp4 35.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.19 Integers in Assembly.mp4 35.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/002 What is API Authentication and Why Do We Need to Authenticate Ourselves.mp4 35.6 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 14 Securing Linux/006. 14.5 Managing LUKS Disk Encryption.mp4 35.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/44 - Day 44 - Web Foundation - Intermediate CSS/001 CSS Colours.mp4 35.5 MB
  • Cybrary/Cybrary - Become an Incident Handler/06. Analyzing Attacks for Incident Handlers/Module 1 - Analyzing Attacks for Incident Handlers/1.1 Introduction to Memory Analysis.mp4 35.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/13. Intro to PowerShell Scripting/Module 1 - Intro to PowerShell Scripting/1.7 Scripting Basics.mp4 35.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/003 API Endpoints and Making API Calls.mp4 35.5 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/4. Networking/3. Impact of the Internet/4. Privacy and Security.mp4 35.5 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/3. Operating System/2. Installing an Operating System/3. Installing Windows.mp4 35.5 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/03_working-with-remotes/03_solving-conflicts/05_best-practices-for-collaboration.mp4 35.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.1 Tools for Code, Reverse Engineering.mp4 35.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 1 - Just the Basics/1.9 Turning Logic into Pseudocode Part 1 - IP.mp4 35.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/6. Incident Response Recovery/Module 1 - Incident Recovery/1.3 Legal Concerns.mp4 35.3 MB
  • Cybrary/Cybrary - Become an Incident Handler/04. Incident Response Recovery/Module 1 - Incident Recovery/1.3 Legal Concerns.mp4 35.3 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 8 Application Security Awareness and Life Cycles/006. 8.5 Software Threat Modeling Methods.mp4 35.3 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/6. Creating a Company Culture for Security/1. Risk in the Workplace/3. Privacy Policy - Google - Coursera.mp4 35.3 MB
  • Protocol Deep Dive/ARP - Deep Dive/02 Address Resolution Protocol Fundamentals/01 Fundamentals of ARP.mp4 35.3 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/4. Networking Services/2. Name Resolution/1. Introduction to Network Services.mp4 35.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/24 - Day 24 - Intermediate - Files, Directories and Paths/008 What's the correct solution What's the best answer What's the right way.mp4 35.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 1 - Just the Basics/1.13 Python Basics Part 2 - IP.mp4 35.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.24 Arrays.mp4 35.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/6. Incident Response Recovery/Module 1 - Incident Recovery/1.1 Incident Recovery.mp4 35.2 MB
  • Cybrary/Cybrary - Become an Incident Handler/04. Incident Response Recovery/Module 1 - Incident Recovery/1.1 Incident Recovery.mp4 35.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.16 Scope Creep.mp4 35.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 1 - Just the Basics/1.3 Logic Part 1 - IP.mp4 35.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 2 - Mapping to ATT&CK® from Raw Data/2.1 The Process of Mapping from Raw Data.mp4 35.1 MB
  • MITRE/Cybrary - MITRE ATT&CK Cyber Threat Intelligence/2. Mapping to ATT&CK from Raw Data/2.1 The Process of Mapping from Raw Data.mp4 35.1 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 6 Data Center Design and Risk Analysis/004. 6.3 Data Center Environmental Design.mp4 35.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/13. Intro to PowerShell Scripting/Module 1 - Intro to PowerShell Scripting/1.4 Getting Help.mp4 35.1 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/01_getting-your-python-on/01_course-introduction/01_course-introduction.mp4 35.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.20 Define Acceptable Sociable Engineering Pretexts Part 1.mp4 35.1 MB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 01 - The Role of an Expert Witness/1.1 Seeking the Truth.mp4 35.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 3 - Linux Command Line Tools/3.9 Linux System Part 1.mp4 35.1 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/1. What is System Administration/3. Sytem Administration Tasks/3. User and Hardware Provisioning - Google - Coursera.mp4 35.1 MB
  • Protocol Deep Dive/EIGRP - Deep Dive/06 - Covering EIGRP Advanced Topics/23 - EIGRP Summary Routing, Pt 1.mp4 35.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/08. Password Cracking Tool Fundamentals/Module 1 - Password Cracking Tool Fundamentals/1.5 Cain and Abel.mp4 35.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/003 [Interactive Coding Exercise] Grading Program.mp4 35.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 2 - Security Architecture/2.11 Emerging Technologies.mp4 34.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/6. Incident Response Recovery/Module 1 - Incident Recovery/1.4 Lessons Learned Part 1.mp4 34.9 MB
  • Cybrary/Cybrary - Become an Incident Handler/04. Incident Response Recovery/Module 1 - Incident Recovery/1.4 Lessons Learned Part 1.mp4 34.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 06 - Introduction to Buffer Overflow/6.5 Finding the Return Address.mp4 34.8 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/02_deploying-puppet/02_deploying-puppet-to-clients/02_puppets-certificate-infrastructure.mp4 34.8 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/02_slowness/02_slow-code/02_using-the-right-data-structures.mp4 34.8 MB
  • Books/CompTIA/Linux+/Rothwell W. CompTIA Linux+ XK0-005 Exam Cram 2023.pdf 34.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/39 - Day 39 - Intermediate+ Capstone Part 1 Flight Deal Finder/001 Day 39 Goals what you will make by the end of the day.mp4 34.7 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/01_troubleshooting-concepts/04_binary-searching-a-problem/04_finding-invalid-data.mp4 34.7 MB
  • Protocol Deep Dive/ARP - Deep Dive/04 Troubleshooting Common ARP Issues/09 Demo - Proxy ARP Unavailable .mp4 34.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 1 - Introduction to the Command Line/1.2 Opening the Command Line.mp4 34.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/43 - Day 43 - Web Foundation - Introduction to CSS/004 Day 43 Project - Colour Vocab Website.mp4 34.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 4 - Network Scanning and Discovery/4.8 TCP & UDP Port Scanning - NM.mp4 34.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 4 - Network Scanning and Discovery/4.8 TCP & UDP Port Scanning - NM.mp4 34.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 2 - Programming/2.4 Programming (part 4) Python for Port Scanning.mp4 34.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/24 - Day 24 - Intermediate - Files, Directories and Paths/002 Add a High Score to the Snake Game.mp4 34.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.15 PTES Questionnaires Part 2.mp4 34.5 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/04_collaboration/01_pull-requests/03_the-typical-pull-request-workflow-on-github.mp4 34.5 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/6. Configuring Network Services/1. Configuring DNS with Dnsmasq - Google - Coursera.mp4 34.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.8 Scanning with hping3 and SYN Scan.mp4 34.5 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/1. What is System Administration/2. What is System Administration/3. The Cloud - Google - Coursera.mp4 34.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Module 3/3.1 The Terminal (KL).mp4 34.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Module 3/3.1 The Terminal (KL).mp4 34.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.11 Scoping Meeting Part 2.mp4 34.4 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/6. Operating Systems in Practice/3. Logging/3. Linux Logs - Google - Coursera.mp4 34.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 1 - Linux/1.3 Linux (part 3) - Directories, myfile and Nano.mp4 34.3 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/4. Networking/3. Impact of the Internet/1. Impact.mp4 34.3 MB
  • Protocol Deep Dive/ARP - Deep Dive/05 Addressing ARP-related Security Risks/03 Demo - Broadcast Storm Control .mp4 34.3 MB
  • Protocol Deep Dive/DHCP - Deep Dive/04. Troubleshooting DHCP/04_02-Troubleshooting DHCP Configuration Issues.mp4 34.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 04 - Understanding Network Protocols/4.2 Scanning with Nmap.mp4 34.3 MB
  • CompTIA/CompTIA Data+ (DA0-001)/18. Compare Visualizations/2. Line Charts .mp4 34.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.17 SIMD Load and Store Data.mp4 34.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.18 SIMD Process Data.mp4 34.2 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/3. Package and Software Management/4. Device Software Management/2. Linux- Devices and Drivers - Google - Coursera.mp4 34.1 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 16 Managing SELinux and AppArmor/007. 16.6 Working with SELinux Labels.mp4 34.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 5 - Vulnerability Discovery or Scanning/5.3 Vulnerability Scanning (part 3) Nmap Scripting Engine.mp4 34.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 1 - Introduction/1.4 Ethics and Legality of Scanning - NM.mp4 34.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 1 - Introduction/1.4 Ethics and Legality of Scanning - NM.mp4 34.1 MB
  • Splunk Training/4. Admin 1 - System Admin/4. License Management Demo.mp4 34.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 2 - Nmap Basics/2.6 Removing Nmap from Windows - NM.mp4 34.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 2 - Nmap Basics/2.6 Removing Nmap from Windows - NM.mp4 34.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 06 - Network and Perimeter Hacking/6.8 Types of DoS and DDoS Attacks.mp4 34.0 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/03_working-with-remotes/02_using-a-remote-repository/01_what-is-a-remote.mp4 34.0 MB
  • Protocol Deep Dive/DHCP - Deep Dive/04. Troubleshooting DHCP/04_03-Troubleshooting DHCP Networking Issues.mp4 34.0 MB
  • Books/CompTIA/Linux+/Blum R. CompTIA Linux+ Study Guide. Exam XK0-005 5ed 2022.pdf 34.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 02 - Computer Forensics Investigation Process/2.1 Computer Forensics Investigation Process Part 1.mp4 33.9 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 1 Concepts and Architectures of Cloud Computing/007. 1.6 Categories of Cloud Services.mp4 33.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Module 4/4.1 Basic Network Commands (KL).mp4 33.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Module 4/4.1 Basic Network Commands (KL).mp4 33.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 5 - Advanced Command Line Techniques/5.3 For and While Loops.mp4 33.9 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/1. What is System Administration/2. What is System Administration/2. Servers Revisited - Google - Coursera.mp4 33.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.3 Setup Reverse Engineering Lab.mp4 33.8 MB
  • Protocol Deep Dive/EIGRP - Deep Dive/02 - Covering EIGRP Essentials/03 - EIGRP vs. Other Routing Protocols.mp4 33.8 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/3. LDAP/2. What is LDAP Authentication- - Google - Coursera.mp4 33.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 05 - Web Application Penetration Testing/5.7 BeEF Framework Demo.mp4 33.8 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 2 Network Management/002. 2.1 Configuring Interfaces.mp4 33.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/42 - Day 42 - Web Foundation - Intermediate HTML/003 Nesting and Indentation.mp4 33.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 1 - Basic Assembly/1.9 Sign Extend, Zero Extend, Multiple, Divide.mp4 33.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Module 2 - The Cyber Kill Chain/2.2 Reconnaissance 2.mp4 33.6 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/04_managing-cloud-instances-at-scale/01_building-software-for-the-cloud/05_understanding-limitations.mp4 33.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/11 - Day 11 - Beginner - The Blackjack Capstone Project/003 Hint 4 & 5 Solution Walkthrough.mp4 33.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/24 - Day 24 - Intermediate - Files, Directories and Paths/003 How to Open, Read, and Write to Files using the with Keyword.mp4 33.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.6 Introduction to Scope Part 1.mp4 33.6 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/3. The Transport and Application Layers/2. The Transport Layer/5. Connection-oriented and Connectionless Protocols.mp4 33.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.21 MMX, SSE, AES-NI.mp4 33.5 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/01_introduction-to-version-control/03_version-control-systems/02_version-control-and-automation.mp4 33.5 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 01 - Course Introduction/1.3 Where is the MITRE ATT&CK Framework Being Used.mp4 33.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/006 Turtle Challenge 3 - Drawing Different Shapes.mp4 33.5 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 3 Describe Azure Management and Governance/Lesson 10 Describe features and tools for managing and deploying resources/003. 10.2 Describe command-line tools.mp4 33.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/006 Python Typing & Showing the Next Question in the GUI.mp4 33.4 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 8 Application Security Awareness and Life Cycles/002. 8.1 Cloud Application Architecture Elements.mp4 33.4 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 6 Data Center Design and Risk Analysis/002. 6.1 Secure Data Center Logical Design.mp4 33.3 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/2. The Network Layer/4. Routing/1. Basic Routing Concepts.mp4 33.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 3 - Linux Command Line Tools/3.4 Linux Files Part 1.mp4 33.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/11 - Day 11 - Beginner - The Blackjack Capstone Project/007 Hint 13 Solution Walkthrough.mp4 33.2 MB
  • Cybrary/Cybrary - Become an Incident Handler/02. Incident Response Planning/Module 1 - Incident Response Planning/1.3 Incident Response Kits Software.mp4 33.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.5 Pre-Engagement Interactions Overview Part 2.mp4 33.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 2 - Nmap Basics/2.12 Constructing an Nmap Scan Lab Part 1 - NM.mp4 33.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 2 - Nmap Basics/2.12 Constructing an Nmap Scan Lab Part 1 - NM.mp4 33.2 MB
  • Cybrary/Cybrary - Become an Incident Handler/03. Implementing an Incident Response Plan/Module 1 - Implementing an Incident Response Plan/1.2 First Steps in Incident Response.mp4 33.2 MB
  • Protocol Deep Dive/EIGRP - Deep Dive/05 - Showing How Information Is Exchanged with EIGRP/20 - Authentication - Demo.mp4 33.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/27 - Day 27 - Intermediate - Tkinter, args, kwargs and Creating GUI Programs/004 Setting Default Values for Optional Arguments inside a Function Header.mp4 33.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/003 Wallpapers.zip 33.1 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/1. Introduction to IT/4. Computer Architecture Layer/2. Computer Architecture Overview.mp4 33.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/43 - Day 43 - Web Foundation - Introduction to CSS/002 How to add CSS.mp4 33.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 3 - OSINT Playground/3.3 Notes, Notes, Notes.mp4 33.0 MB
  • MITRE/Cybrary - MITRE ATT&CK SOC Assessments Course/1. Overview of ATT&CK-Based SOC Assessments/1.4 Scoping an Assessment.mp4 33.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 4 - Windows Command Line Tools/4.8 Windows Networking Part 2.mp4 33.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 05 - Web Application Penetration Testing/5.2 Using Intercepting Proxies Part 1.mp4 33.0 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/1. What is System Administration/4. Applying Changes/1. With Great Power Comes Great Responsibility - Google - Coursera.mp4 33.0 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/01_automating-with-configuration-management/04_the-building-blocks-of-configuration-management/02_the-driving-principles-of-configuration-management.mp4 33.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 4 - Network Scanning and Discovery/4.19 Timing and Performance Part 2 - NM.mp4 33.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 4 - Network Scanning and Discovery/4.19 Timing and Performance Part 2 - NM.mp4 33.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.10 Saving Registers.mp4 32.9 MB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 09 - Expert Testimony/9.1 Voire Dire of Experts.mp4 32.9 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/01_introduction-to-version-control/04_using-git/03_the-basic-git-workflow.mp4 32.8 MB
  • CompTIA/CompTIA Data+ (DA0-001)/17. Explain Dashboarding/4. Building Dashboards .mp4 32.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.4 Branching, If, While, Shift.mp4 32.8 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 2 Cloud Security Concepts and Design Principles/009. 2.8 Security Considerations for Cloud Service Types.mp4 32.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/22 - Day 22 - Intermediate - Build Pong The Famous Arcade Game/003 Create a Paddle that responds to Key Presses.mp4 32.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Module 5/5.1 Troubleshooting Basics (KL).mp4 32.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Module 5/5.1 Troubleshooting Basics (KL).mp4 32.7 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/1. Introduction to Directory Services/3. Implementing Directory Services.mp4 32.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 3 - Linux Command Line Tools/3.7 Linux Files Part 4.mp4 32.7 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 10 Identity and Access Management Solutions/002. 10.1 Cloud IAM Services.mp4 32.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.20 Floating Point Comparison Example.mp4 32.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 1 - Basic Assembly/1.8 Segments and Functions.mp4 32.6 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/03_automation-in-the-cloud/03_automating-cloud-deployments/03_cloud-infrastructure-as-code.mp4 32.6 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/02_slowness/01_understanding-slowness/01_intro-to-module-2-slowness.mp4 32.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 1 - Just the Basics/1.10 Turning Logic into Pseudocode Part 2 - IP.mp4 32.6 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/5. Data Recovery & Backups/3. Post-Mortems/2. Writing a Post-Mortem - Google - Coursera.mp4 32.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 04 - Understanding Network Protocols/4.7 Weaponizing Wireshark.mp4 32.6 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/3. Software and Platform Services/3. Print Services/1. Configuring Print Services - Google - Coursera.mp4 32.5 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/06_bash-scripting/01_interacting-with-the-command-line-shell/05_signalling-processes.mp4 32.5 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/01_hello-python/03_introduction-to-python/03_why-is-python-relevant-to-it.mp4 32.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/005 Python Functions as First Class Objects Passing & Nesting Functions.mp4 32.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 2 - Nmap Basics/2.15 Custom Scan Profiles Part 1 - NM.mp4 32.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 2 - Nmap Basics/2.15 Custom Scan Profiles Part 1 - NM.mp4 32.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.13 Cloud Services.mp4 32.5 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/2. Users and Permissions/2. Permissions/3. Windows- Modifying Permissions - Google - Coursera.mp4 32.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/13. Intro to PowerShell Scripting/Module 1 - Intro to PowerShell Scripting/1.8 Common Commands Part 1.mp4 32.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.6 Trusted Relationship.mp4 32.4 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.6 Trusted Relationship.mp4 32.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Module 2 - The Cyber Kill Chain/2.5 Delivery.mp4 32.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.10 Scanning with hping3 and XMAS Scan.mp4 32.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 1 - Just the Basics/1.2 1.0.2 Background Information - IP.mp4 32.3 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 2 Cloud Security Concepts and Design Principles/010. 2.9 Cloud Design Patterns.mp4 32.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Module 2 - Identifying Web Attacks Through Logs/2.2 Vulnerability Scans.mp4 32.2 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/04_collaboration/02_code-reviews/01_what-are-code-reviews.mp4 32.1 MB
  • Protocol Deep Dive/EIGRP - Deep Dive/06 - Covering EIGRP Advanced Topics/25 - Controlling Query Behavior.mp4 32.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.12 Additional Support Part 1.mp4 32.1 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 2 Cloud Security Concepts and Design Principles/006. 2.5 Cloud Security Hygiene.mp4 32.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 4 - Vulnerability Analysis/4.5 Validation.mp4 32.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 05 - Web Application Penetration Testing/5.9 File Inclusion Demo.mp4 31.9 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/2. Hardware/2. Components/5. Power Supplies.mp4 31.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 4 - Vulnerability Analysis/4.6 Research.mp4 31.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 4 - Vulnerability Analysis/4.3 Active Testing.mp4 31.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 4 - Windows Command Line Tools/4.2 Windows Files Part 1.mp4 31.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 7 - Identity and Access Management/7.2 Authentication.mp4 31.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 3 - Storing and Analyzing ATT&CK®-Mapped Data/3.3 Analyzing ATT&CK®-Mapped Data.mp4 31.7 MB
  • MITRE/Cybrary - MITRE ATT&CK Cyber Threat Intelligence/3. Storing and Analyzing ATT&CK-Mapped Data/3.3 Analyzing ATT&CK-Mapped Data.mp4 31.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 1 - Introduction/1.3 Intro Part 3.mp4 31.6 MB
  • CompTIA/CompTIA Data+ (DA0-001)/12. Explain Inferential Statistics/7. T-test Part 2 .mp4 31.6 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/01_introduction-to-version-control/03_version-control-systems/01_what-is-version-control.mp4 31.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 1 - Just the Basics/1.4 Logic Part 2 - IP.mp4 31.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.12 Calling Conventions.mp4 31.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/2. OWASP Top 10 - 2021/Module 1 - Introduction/1.1 Introduction.mp4 31.5 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/3. Operating System/2. Installing an Operating System/4. Installing Linux.mp4 31.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 4 - Network Scanning and Discovery/4.9 TCP & UDP Port Scanning Lab Part 1 - NM.mp4 31.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 4 - Network Scanning and Discovery/4.9 TCP & UDP Port Scanning Lab Part 1 - NM.mp4 31.5 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/5. OpenLDAP/1. What is OpenLDAP- - Google - Coursera.mp4 31.5 MB
  • Books/CompTIA/CySA+/lc-mcgraw-hill.comptia.cysaplus.cybersecurity.analyst.certification.bundle.exam.cs0-002.2021.epub 31.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 03 - Kali Linux Basics/3.3 Understanding the Command Line.mp4 31.4 MB
  • CompTIA/CompTIA Data+ (DA0-001)/2. Explain Data Types/5. Dates and Times .mp4 31.4 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/01_getting-your-python-on/02_getting-ready-for-python/02_getting-familiar-with-the-operating-system.mp4 31.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/19 - Day 19 - Intermediate - Instances, State and Higher Order Functions/007 Expand on the Solutions.mp4 31.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/009 String Manipulation and Code Intelligence.mp4 31.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/004 [Interactive Coding Exercise] Data Types.mp4 31.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 06 - Network and Perimeter Hacking/6.6 Social Engineering Countermeasures.mp4 31.3 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 19 Using Git for Version Control/002. 19.1 Understanding Git.mp4 31.3 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/04_managing-cloud-instances-at-scale/01_building-software-for-the-cloud/03_load-balancing.mp4 31.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 4 - Network Scanning and Discovery/4.3 Target Specification Lab Part 2 - NM.mp4 31.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 4 - Network Scanning and Discovery/4.3 Target Specification Lab Part 2 - NM.mp4 31.3 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/4. Active Directory/5. Joining an Active Directory Domain - Google - Coursera.mp4 31.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 5 - Forensics of Incident Response/5.14 Obtaining the Windows Bitlocker Encryption Keys.mp4 31.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/42 - Day 42 - Web Foundation - Intermediate HTML/004 Anchor Elements.mp4 31.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 4 - Security Engineering and Cryptography/4.5 Sector-Specific Technology Security Concerns.mp4 31.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 02 - Setting the Foundation for Success/2.3 Note Taking and Mind Mapping.mp4 31.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/23 - Day 23 - Intermediate - The Turtle Crossing Capstone Project/011 This course is not about typing out code.mp4 31.1 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 17 Managing Linux Server Roles/008. 17.7 Understanding and Managing SMB File Services.mp4 31.1 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/04_managing-cloud-instances-at-scale/02_monitoring-and-alerting/01_getting-started-with-monitoring.mp4 31.1 MB
  • Protocol Deep Dive/EIGRP - Deep Dive/03 - Digging into EIGRP Relationships/08 - EIGRP Timers.mp4 31.1 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 6 Legal, Risk, and Compliance/Lesson 13 Legal Requirements, Privacy Issues, and Risk Management in the Cloud/002. 13.1 Conflicting International Legislation.mp4 31.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 3 - Security Operations/3.7 Vulnerability Risk Mitigation Part 2.mp4 31.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Module 2 - Identifying Web Attacks Through Logs/2.1 Web Application Attacks Review.mp4 31.0 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/03_automation-in-the-cloud/03_automating-cloud-deployments/01_cloud-scale-deployments.mp4 31.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/007 Jumping over Hurdles with Variable Heights.mp4 30.9 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 5 Managing Partitions/005. 5.4 Managing MBR Extended and Logical Partitions with fdisk.mp4 30.9 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/4. Networking Services/5. Network Address Translation/3. NAT, Non-Routable Address Space and the Limits of IPv4.mp4 30.8 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/01_introduction-to-version-control/03_version-control-systems/03_what-is-git.mp4 30.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 4 - Security Engineering and Cryptography/4.9 Implementing Public Key Infrastructure.mp4 30.7 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/6. Troubleshooting and Future of Networking/3. Digging into DNS/3. DNS Registration and Expiration.mp4 30.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 07 - Public Exploits/7.1 Where to Look for Public Exploits.mp4 30.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 6 - Traffic Capture/6.2 Traffic Capture (part 2) Analyzing Network Protocol with Wireshark.mp4 30.7 MB
  • Splunk Training/1. Splunk Fundamentals 1/2. Windows Installation.mp4 30.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.4 Control Panel Items.mp4 30.7 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.4 Control Panel Items.mp4 30.7 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Introduction/001. Exam AZ-900 Microsoft Azure Fundamentals Introduction.mp4 30.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/17 - Day 17 - Intermediate - The Quiz Project & the Benefits of OOP/009 Quiz Project Part 5 Checking Answers and Keeping Score.mp4 30.7 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/04_collaboration/01_pull-requests/05_squashing-changes.mp4 30.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.17 Interrupts Example Use Fork.mp4 30.6 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 7 Cloud Business Continuity Planning/003. 7.2 Business Impact Analysis.mp4 30.6 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/5. Software/1. Introduction to Software/3. Types of Software.mp4 30.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.27 Establishing Lines of Communication Part 2.mp4 30.6 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/2. Physical Infrastructure Services/3. Remote Access Revisited - Google - Coursera.mp4 30.6 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/04_collaboration/02_code-reviews/02_the-code-review-workflow.mp4 30.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 1 - Introduction/1.3 Splunk and Your Career.mp4 30.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 1 - Just the Basics/1.6 If Statements - IP.mp4 30.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 4 - Tools and Techniques/4.3 Social Networks.mp4 30.5 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/3. Software and Platform Services/5. Troubleshooting Platform Services/1. Is the website down- - Google - Coursera.mp4 30.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 03 - Hard Disks & File Systems/3.7 Recovering Graphics Files Lab Part 1.mp4 30.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/006 IndexErrors and Working with Nested Lists.mp4 30.4 MB
  • Protocol Deep Dive/OSPF - Deep Dive/02 - Covering OSPF Basics/03 - OSPF vs. Other Routing Protocols.mp4 30.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Module 2 - The Cyber Kill Chain/2.4 Weaponization.mp4 30.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 3 - Security Operations/3.6 Vulnerability Risk Mitigation Part 1.mp4 30.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/22 - Day 22 - Intermediate - Build Pong The Famous Arcade Game/010 Picturing fears even the worst-case scenario is not so scary.mp4 30.3 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/5. Connecting to the Internet/3. Broadband Connections/4. Cable Broadband.mp4 30.3 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/2. The Network Layer/2. The Networking Layer/3. IP Datagrams and Encapsulation.mp4 30.3 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/02_slowness/03_when-slowness-problems-get-complex/03_dealing-with-complex-slow-systems.mp4 30.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 4 - Windows Command Line Tools/4.9 Windows Networking Part 3.mp4 30.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 05 - Web Application Penetration Testing/5.6 Cross-Site Scripting (XSS).mp4 30.3 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 8 Managing and Monitoring Performance/002. 8.1 Analyzing top Output.mp4 30.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/06. Phishing/Module 1 - Recon/1.3 The Harvester.mp4 30.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 05 - Web Application Penetration Testing/5.8 File Inclusion Vulnerabilities.mp4 30.2 MB
  • Protocol Deep Dive/ARP - Deep Dive/05 Addressing ARP-related Security Risks/06 ARP Poisoning, Blackhole, Spoofing, MITM.mp4 30.2 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 14 Securing Linux/004. 14.3 An Introduction to Auditing.mp4 30.1 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/03_automation-in-the-cloud/02_managing-instances-in-the-cloud/03_customizing-vms-in-gcp.mp4 30.1 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 15 EC2 Pricing Models/002. 15.1 Pricing Model Summary.mp4 30.1 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/1. Introduction to Networking/2. The TCPIP Five Layer Network Model/The TCP IP Five Layer Network Model.mp4 30.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/007 How to use Dictionary Comprehension.mp4 30.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/27 - Day 27 - Intermediate - Tkinter, args, kwargs and Creating GUI Programs/008 Other Tkinter Widgets Radiobuttons, Scales, Checkbuttons and more.mp4 30.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.9 Protocols of the TCPIP Suite Part 1.mp4 30.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 4 - Security Engineering and Cryptography/4.6 ICS Protocols.mp4 30.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.25 Shared Library.mp4 30.0 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 16 Managing SELinux and AppArmor/004. 16.3 Configuring AppArmor.mp4 30.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/004 Nesting Lists and Dictionaries.mp4 29.9 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/01_introduction-to-version-control/03_version-control-systems/05_installing-git.mp4 29.9 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/5. Data Recovery & Backups/1. Planning for Data Recovery/4. Backup Solutions - Google - Coursera.mp4 29.9 MB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 2 - Mapping to ATT&CK® from Raw Data/2.1 The Process of Mapping from Raw Data.mp4 29.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.18 Strings in C.mp4 29.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.16 SysCall and Interrupts.mp4 29.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 4 - Data/4.4 Inputs Monitoring.mp4 29.9 MB
  • Protocol Deep Dive/DNS - Deep Dive/02. Exploring DNS Terminology and Use Cases/03. Demo-Simple Client Query.mp4 29.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/45 - Day 45 - Intermediate+ Web Scraping with Beautiful Soup/001 Day 45 Goals what you will make by the end of the day.mp4 29.7 MB
  • Books/CompTIA/A+/bb-comptia.a.certification.study.guide.eleventh.edition.exams.220.1101.and.220.1102..epub 29.7 MB
  • Protocol Deep Dive/ARP - Deep Dive/04 Troubleshooting Common ARP Issues/10 Demo - Proxy ARP Blackhole .mp4 29.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 5 - Vulnerability Discovery or Scanning/5.4 Vulnerability Scanning (part 4) Metasploit.mp4 29.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 04 - Understanding Network Protocols/4.3 Scanning with Masscan.mp4 29.6 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/6. Troubleshooting and Future of Networking/2. Verifying Connectivity/2. Traceroute.mp4 29.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 3 - Security Operations/3.11 Forensics Tools.mp4 29.6 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/3. The 3 A's of Cybersecurity - Authentication, Authorization, Accounting/1. Authentication/4. LDAP - Google - Coursera.mp4 29.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 5 - Network Connectivity Devices/5.5 Routing.mp4 29.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.4 Supply Chain Compromise Part 1.mp4 29.6 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.4 Supply Chain Compromise Part 1.mp4 29.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/007 The Cookie Clicker Project.mp4 29.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.15 Assembly with C.mp4 29.5 MB
  • Protocol Deep Dive/OSPF - Deep Dive/05 - Introducing Multi-area OSPF (Hierarchy)/29 - What Is multi-area OSPF.mp4 29.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/19 - Day 19 - Intermediate - Instances, State and Higher Order Functions/002 Python Higher Order Functions & Event Listeners.mp4 29.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/008 [Interactive Coding Exercise] Pizza Order Practice.mp4 29.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.2 External Remote Services.mp4 29.4 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.2 External Remote Services.mp4 29.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 2 - Intelligence Gathering/2.3 Business Asset Analyst.mp4 29.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.26 Establish Lines of Communication Part 1.mp4 29.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 3 - Threat Modeling/3.3 Business Asset Analysis.mp4 29.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/005 URL Building with Flask.mp4 29.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 2 - Security Architecture/2.6 Software Development Activities.mp4 29.2 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/3. Vulnerabilities in systems/01_flaws-in-the-system/4. Common vulnerabilities and exposures.mp4 29.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 4 - Windows Command Line Tools/4.4 Windows System Part 1.mp4 29.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 2 - Programming/2.5 Programming (part 5) Python Import Command.mp4 29.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 2 - Security Architecture/2.7 Data Security and the Data Life Cycle.mp4 29.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 5 - Network Connectivity Devices/5.7 Firewalls.mp4 29.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.23 Conditional Execution Example.mp4 29.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Module 2 - The Cyber Kill Chain/2.7 Command and Control.mp4 29.1 MB
  • CompTIA/CompTIA Data+ (DA0-001)/5. Collect and Integrate Data/6. Surveys and Observations .mp4 29.1 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/02_using-git-locally/02_undoing-things/01_undoing-changes-before-committing.mp4 29.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.3 ARM Math and Data Movement.mp4 29.1 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/06_final-project/02_final-project/02_final-project-overview.mp4 29.1 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/2. Basic Commands/4. Linux- List Directories - Google - Coursera.mp4 29.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/41 - Day 41 - Web Foundation - Introduction to HTML/008 Day 41 Project - Movie Ranking.mp4 29.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 5 - Forensics of Incident Response/5.15 Obtaining the Windows Bitlocker Encryption Keys (continued).mp4 29.0 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/02_slowness/03_when-slowness-problems-get-complex/02_slowly-growing-in-complexity.mp4 29.0 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 9 Managing the Boot Procedure/006. 9.5 Installing a new GRUB Bootloader.mp4 29.0 MB
  • Protocol Deep Dive/IPsec - Deep Dive/07 - Implementing IPsec in IPv6/32 - Migrating IPv4 to IPv6 for IPsec.mp4 29.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Module 2 - The Cyber Kill Chain/2.3 Reconnaissance 3.mp4 28.9 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/6. Troubleshooting and Future of Networking/4. The Cloud/3. Cloud Storage.mp4 28.9 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 12 Operational Controls and Standards/002. 12.1 Configuration and Change Management.mp4 28.9 MB
  • CompTIA/CompTIA Data+ (DA0-001)/23. Explain Regulations and Compliance/1. Introduction -5.mp4 28.9 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/6. Operating Systems in Practice/3. Logging/4. Working with Logs - Google - Coursera.mp4 28.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 06 - Introduction to Buffer Overflow/6.2 Setting up the Environment.mp4 28.9 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/02_using-git-locally/01_advanced-git-interaction/02_skipping-the-staging-area.mp4 28.9 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/3. File & Text Manipulation/6. Windows- Searching within Files - Google - Coursera.mp4 28.9 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/04_managing-resources/01_managing-computer-resources/01_intro-to-module-4-managing-resources.mp4 28.9 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/1. What is System Administration/3. Sytem Administration Tasks/6. Troubleshooting and Managing Issues - Google - Coursera.mp4 28.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.11 Scanning with hping3, ACK Scan, and Windows Firewall.mp4 28.8 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/2. The Network Layer/4. Routing/3. Interior Gateway Protocols.mp4 28.8 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/02_deploying-puppet/01_deploying-puppet-locally/02_applying-rules-locally.mp4 28.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 5 - Network Connectivity Devices/5.9 Intrusion Detection and Prevention.mp4 28.8 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/02_deploying-puppet/01_deploying-puppet-locally/04_organizing-your-puppet-modules.mp4 28.7 MB
  • CompTIA/CompTIA Data+ (DA0-001)/15. Identify Data Analytics Tools/2. Spreadsheets .mp4 28.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 06 - Introduction to Buffer Overflow/6.6 Getting a Shell.mp4 28.7 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/1. Introduction to Networking/5. The Data Link Layer/3. Dissecting an Ethernet Frame.mp4 28.7 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/03_loops/04_module-review/02_in-margas-words-how-i-got-into-programming.mp4 28.7 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/01_introduction-to-version-control/03_version-control-systems/06_installing-git-on-windows-optional.mp4 28.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 05 - Web Application Penetration Testing/5.12 Content Management Systems.mp4 28.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.22 DoS Testing.mp4 28.6 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/03_working-with-remotes/01_introduction-to-github/03_basic-interaction-with-github.mp4 28.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 08 - Getting a Shell, Now What/8.2 How to Upgrade a Shell.mp4 28.6 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/5. Defense in Depth/2. Application Hardening/2. Application Policies - Google - Coursera.mp4 28.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 7 - Identity and Access Management/7.8 Authorization.mp4 28.5 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 5 Cloud Architecture Design Principles/004. 5.3 Well-Architected Framework Pillars Part 1.mp4 28.5 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/6. Operating Systems in Practice/1. Remote Access/3. Remote Connections on Windows - Google - Coursera.mp4 28.4 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/5. Data Recovery & Backups/1. Planning for Data Recovery/2. What is Data Recovery- - Google - Coursera.mp4 28.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 02 - Setting the Foundation for Success/2.4 Finding Resources to Prepare for the Offensive Penetration Testing.mp4 28.4 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/3. Network Services/6. DNS for Internal Networks - Google - Coursera.mp4 28.4 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/05_object-oriented-programming-optional/03_code-reuse/03_composition-optional.mp4 28.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 05 - System Hacking/5.4 Password Cracking with Medusa (Demo).mp4 28.4 MB
  • CompTIA/CompTIA Data+ (DA0-001)/10. Describe Measures of Central Tendencies/3. Mode .mp4 28.4 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/2. Physical Infrastructure Services/2. Virtualization - Google - Coursera.mp4 28.3 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/4. Networking Services/4. Dynamic Host Configuration Protocol DHCP/2. DHCP in Action.mp4 28.3 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/3. Package and Software Management/2. Package Managers/1. Windows- Package Manager - Google - Coursera.mp4 28.3 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/01_troubleshooting-concepts/05_module-review/01_module-1-wrap-up-troubleshooting-concepts.mp4 28.3 MB
  • CompTIA/CompTIA Data+ (DA0-001)/16. Explain Business Requirements and Reports/3. Meeting Requirements Part 2 .mp4 28.2 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/3. Operating System/2. Installing an Operating System/5. What is Chrome OS.mp4 28.2 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/2. The Network Layer/3. Subnetting/3. Basic Binary Math.mp4 28.2 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/04_managing-cloud-instances-at-scale/02_monitoring-and-alerting/04_basic-monitoring-in-gcp.mp4 28.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/012 Space out your study sessions and stay consistent.mp4 28.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Module 3/3.2 File System (KL).mp4 28.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Module 3/3.2 File System (KL).mp4 28.1 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/05_testing-in-python/04_errors-and-exceptions/02_raising-errors.mp4 28.1 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/02_deploying-puppet/03_updating-deployments/01_modifying-and-testing-manifests.mp4 28.1 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 11 Build and Implement a Physical and Logical Cloud Infrastructure/004. 11.3 SDS and Securing Storage Area Networks.mp4 28.1 MB
  • Books/CompTIA/Pentest+/Clarke G. CompTIA PenTest+ Certification For Dummies 2022.pdf 28.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/23 - Day 23 - Intermediate - The Turtle Crossing Capstone Project/007 Solution to Step 4 - Create the Car Behaviour.mp4 28.0 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/4. Networking Services/2. Name Resolution/3. DNS and UDP.mp4 28.0 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/2. Hardware/2. Components/6. Peripherals.mp4 28.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Module 2 - Identifying Web Attacks Through Logs/2.3 Brute Force Attacks.mp4 28.0 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/4. Networking Services/3. Name Resolution in Practise/3. DNS Zones.mp4 28.0 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/1. Understanding Security Threats/3. Network Attacks/1. Network Attacks - Google - Coursera.mp4 27.9 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/5. Software/2. Interacting with Software/1. Managing Software.mp4 27.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 2 - Intelligence Gathering/2.7 OSINT Part 2.mp4 27.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Module 2 - Identifying Web Attacks Through Logs/2.6 XSS - Cross-Site Scripting.mp4 27.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Module 1 - Introduction and Review/1.2 Web Applications Architecture Review Part 1.mp4 27.9 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/02_using-git-locally/01_advanced-git-interaction/04_deleting-and-renaming-files.mp4 27.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 10 - Post Exploitation/10.3 Post Exploitation (part 3) Pivoting.mp4 27.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 4 - Network Scanning and Discovery/4.15 NSE, Vulnerability Testing & Exploitation Part 1 - NM.mp4 27.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 4 - Network Scanning and Discovery/4.15 NSE, Vulnerability Testing & Exploitation Part 1 - NM.mp4 27.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/001 Understanding Backend Web Development with Python.mp4 27.8 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/5. Software/1. Introduction to Software/5. Recipe for Commputing.mp4 27.8 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 3 Describe Azure Management and Governance/Lesson 8 Describe cost management in Azure/003. 8.2 Compare the Pricing calculator and the Total Cost of Ownership (TCO) calculator.mp4 27.8 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/4. Networking Services/6. VPNs and Proxies/2. Proxy Services.mp4 27.8 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/4. Networking Services/6. VPNs and Proxies/1. Virtual Private Networks.mp4 27.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 12 - Cryptography/12.2 Hashing, Digital Certificates and Digital Signatures.mp4 27.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 5 - Exploitation/5.3 Countermeasures.mp4 27.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 2 - Security Architecture/2.5 Integrating Software Applications Part 2.mp4 27.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.25 Goals.mp4 27.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 04 - Understanding Network Protocols/4.8 SMB Enumeration.mp4 27.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.17 Floating Point.mp4 27.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/010 [Interactive Coding Exercise] Debugging FizzBuzz.mp4 27.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/006 Code Exercise Exception Handling in the NATO Phonetic Alphabet Project.mp4 27.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 12 - Exploit Development/12.5 Exploit Development (part 5) Python.mp4 27.6 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 8 AWS Access Management/005. 8.4 AWS IAM Users and Groups.mp4 27.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 2 - Intelligence Gathering/2.10 Footprinting - External.mp4 27.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.2 Accessibility Features.mp4 27.6 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.2 Accessibility Features.mp4 27.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/06. Phishing/Module 3 - Automating Your Emails/3.3 Watching the Attack.mp4 27.6 MB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 02 - Forensic Concept Review/2.3 Evidence Handling and Storage.mp4 27.6 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/4. Networking/1. What is Networking/1. Module Introduction.mp4 27.6 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/6. Troubleshooting/4. Going through a Technical Interview/6. Interview Role Play-Customer Service.mp4 27.5 MB
  • Protocol Deep Dive/EIGRP - Deep Dive/06 - Covering EIGRP Advanced Topics/26 - Significance of EIGRP Router-IDs, Pt 1.mp4 27.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 03 - Footprinting and Reconnaissance/3.5 Shodan (Demo).mp4 27.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/27 - Day 27 - Intermediate - Tkinter, args, kwargs and Creating GUI Programs/002 History of GUI and Introduction to Tkinter.mp4 27.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/28 - Day 28 - Intermediate - Tkinter, Dynamic Typing and the Pomodoro GUI Application/006 Setting Different Timer Sessions and Values.mp4 27.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 2 - Check for Live Systems & Ports/2.4 Checking for Open Ports Lab Part 2.mp4 27.4 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/04_managing-data-and-processes/02_python-subprocesses/03_advanced-subprocess-management.mp4 27.4 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 12 Operational Controls and Standards/006. 12.5 Incident and Problem Management.mp4 27.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.9 Function Arguments.mp4 27.3 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/01_getting-your-python-on/04_automating-tasks-through-programming/02_pitfalls-of-automation.mp4 27.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 4 - Defensive Recs from ATT&CK®-Mapped Data/4.1 The Defensive Recommendations Process.mp4 27.3 MB
  • MITRE/Cybrary - MITRE ATT&CK Cyber Threat Intelligence/4. Defensive Recs from ATT&CK-Mapped Data/4.1 The Defensive Recommendations Process.mp4 27.3 MB
  • MITRE/Cybrary - MITRE ATT&CK Cyber Threat Intelligence/4. Making Defensive Recommendations from ATT&CK-Mapped Data/4.1 The Defensive Recommendations Process.mp4 27.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.24 Static and Dynamic Linking Assembly.mp4 27.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/001 Day 5 Goals what we will make by the end of the day.mp4 27.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.10 Jump Table Example.mp4 27.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 01 - Computer Forensics Today/1.4 Computer Forensics Today Part 3.mp4 27.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 04 - Understanding Network Protocols/4.11 SMTP Enumeration.mp4 27.2 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/5. Data Recovery & Backups/3. Post-Mortems/1. What_s a post-mortem- - Google - Coursera.mp4 27.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/29 - Day 29 - Intermediate - Building a Password Manager GUI App with Tkinter/004 Solution to the Creating the Grid Layout.mp4 27.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 1 - Just the Basics/1.8 While Loops - IP.mp4 27.2 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 3 Managing Services/007. 3.6 Using Systemd Timers.mp4 27.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 2 - Mapping to ATT&CK® from Raw Data/2.2 Identify and Research Behaviors.mp4 27.2 MB
  • MITRE/Cybrary - MITRE ATT&CK Cyber Threat Intelligence/2. Mapping to ATT&CK from Raw Data/2.2 Identify and Research Behaviors.mp4 27.2 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 17 Managing Linux Server Roles/003. 17.2 Understanding and Managing Certificate Services.mp4 27.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 03 - Footprinting and Reconnaissance/3.4 HTTrack (Demo).mp4 27.2 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/5. Connecting to the Internet/3. Broadband Connections/3. Digital Subscriber Lines.mp4 27.1 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/5. Connecting to the Internet/5. Wireless Networking/3. Wireless Channels.mp4 27.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Module 2 - Identifying Web Attacks Through Logs/2.9 Other Log Sources Part 2.mp4 27.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.11 Function Pointers.mp4 27.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 2 - Splunk Products, Resources, and Certifications/2.2 Splunk Website.mp4 27.1 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/02_deploying-puppet/02_deploying-puppet-to-clients/03_setting-up-puppet-clients-and-servers.mp4 27.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 03 - Kali Linux Basics/3.7 Command Line Lab Walkthrough.mp4 27.1 MB
  • Protocol Deep Dive/IPsec - Deep Dive/06 - Establishing IPsec with IKEv2/28 - IKEv2 Phases.mp4 27.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.22 Conditional Move.mp4 27.1 MB
  • CompTIA/CompTIA Data+ (DA0-001)/7. Manipulate Data/6. Bonus Resources .mp4 27.0 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/4. Networking/1. What is Networking/3. Networking Hardware.mp4 27.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Module 2 - The Cyber Kill Chain/2.6 Exploitation and Installation.mp4 27.0 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/5. Managing System Systems/2. Managing Services in Linux - Google - Coursera.mp4 27.0 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/2. Users and Permissions/1. Users and Groups/5. Windows- Passwords - Google - Coursera.mp4 27.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.5 Stack Usage.mp4 27.0 MB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 3 - Storing and Analyzing ATT&CK®-Mapped Data/3.3 Analyzing ATT&CK®-Mapped Data.mp4 27.0 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/6. Troubleshooting and Future of Networking/2. Verifying Connectivity/3. Testing Port Connectivity.mp4 27.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.8 Business Continuity and Disaster Recovery Part 1.mp4 26.9 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 21 An Introduction to Containers/004. 21.3 Running Containers in Docker and Podman.mp4 26.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 3/3.6 Discovering XSS.mp4 26.9 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/2. Users and Permissions/1. Users and Groups/7. Windows- Adding and Removing Users - Google - Coursera.mp4 26.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 6 - Post-Exploitation/6.5 Pillaging Part 1.mp4 26.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/40 - Day 40 - Intermediate+ Capstone Part 2 Flight Club/003 flight-deals-end.zip 26.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/001 Installing Python Locally on Your Computer.mp4 26.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/39 - Day 39 - Intermediate+ Capstone Part 1 Flight Deal Finder/002 flight-deals-start.zip 26.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.5 Powershell.mp4 26.8 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.5 Powershell.mp4 26.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/17 - Day 17 - Intermediate - The Quiz Project & the Benefits of OOP/008 Quiz Project Part 4 How to continue showing new Questions.mp4 26.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/06. Phishing/Module 3 - Automating Your Emails/3.2 Attacking With SET.mp4 26.8 MB
  • Protocol Deep Dive/ARP - Deep Dive/04 Troubleshooting Common ARP Issues/07 Proxy ARP Problems.mp4 26.8 MB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/2. The evolution of cybersecurity/01_the-history-of-cybersecurity/3. Attacks in the digital age.mp4 26.8 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 17 Managing Linux Server Roles/004. 17.3 Creating Self-Signed Certificates.mp4 26.7 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 15 Managing Secure Access Control/002. 15.1 Understanding PAM.mp4 26.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Module 1 - Introduction and Review/1.3 Web Applications Architecture Review Part 2.mp4 26.7 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/5. Managing System Systems/4. Configuring Services in Linux - Google - Coursera.mp4 26.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.7 Scanning with NMAP ACK Scan and Windows Firewall.mp4 26.6 MB
  • Protocol Deep Dive/QUIC - Deep Dive/03. Analyzing QUIC with Wireshark/13. Demo-The QUIC Handshake in Wireshark.mp4 26.6 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/1. Introduction to Networking/3. The Basics of Networking Devices/1. Cables.mp4 26.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 4/4.3 LFI & RFI.mp4 26.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 07 - Web Application Hacking/7.3 Web Application Threats.mp4 26.5 MB
  • Protocol Deep Dive/ARP - Deep Dive/03 Understanding InARP, GARP, RARP, and Proxy ARP/06 HSRP Failover.mp4 26.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Module 5/5.2 The Tools Chest (KL).mp4 26.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Module 5/5.2 The Tools Chest (KL).mp4 26.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 12 - Exploit Development/12.2 Exploit Development (part 2) A Program in Memory.mp4 26.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.4 Browser Extension.mp4 26.4 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.4 Browser Extension.mp4 26.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.10 Scoping Meeting Part 1.mp4 26.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 3 - Incident Handling/3.3 Incident Response Policies.mp4 26.4 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/2. Protect organizational assets/03_authentication-authorization-and-accounting/3. The mechanisms of authorization.mp4 26.4 MB
  • Protocol Deep Dive/IPsec - Deep Dive/04 - Using IPsec in the Enterprise/15 - Using IPsec on Your Endpoint.mp4 26.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 5 - Network Connectivity Devices/5.1 Network Connectivity Devices Part 1.mp4 26.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.2 Reverse Engineering Process.mp4 26.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 3 - Nmap & The TCP_IP Protocol Suite/3.1 IPv4 for Nmap - NM.mp4 26.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 3 - Nmap & The TCP_IP Protocol Suite/3.1 IPv4 for Nmap - NM.mp4 26.3 MB
  • MITRE/Cybrary - MITRE ATT&CK Defender (MAD) Fundamentals/1. Understanding ATT&CK/1.1 Introduction to ATT&CK.mp4 26.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 3 - Incident Handling/3.6 The Respond Part of Incident Response.mp4 26.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Module 1 - Introduction and Review/1.7 Tips and Common Issues Part 2.mp4 26.2 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/5. Data Recovery & Backups/3. Post-Mortems/3. Interview Role Play- Sys Admin - Google - Coursera.mp4 26.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 7 - Reporting/7.3 The Executive Summary.mp4 26.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 2 - Programming/2.2 Programming (part 2) Bash Scripting and If_Then Command.mp4 26.2 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/2. Basic Commands/2. List Directories in a GUI - Google - Coursera.mp4 26.2 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/3. Software and Platform Services/1. Software Services/4. Configuring User Productivity Services - Google - Coursera.mp4 26.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.23 Conditional Move Max Example.mp4 26.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 7 - Reporting/7.4 Technical Support.mp4 26.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/006 Bringing out the BIG Gun Using a Debugger.mp4 26.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/29 - Day 29 - Intermediate - Building a Password Manager GUI App with Tkinter/002 Challenge 1 - Working with Images and Setting up the Canvas.mp4 26.1 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 5 Managing Partitions/007. 5.6 Creating File Systems.mp4 26.1 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/4. Filesystems/1. Filesystem Types/6. Linux- Disk Partitioning and Formatting a Filesystem - Google - Coursera.mp4 26.0 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/3. The 3 A's of Cybersecurity - Authentication, Authorization, Accounting/1. Authentication/8. Single Sign-On - Google - Coursera.mp4 26.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.14 PTES Questionnaires Part 1.mp4 26.0 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/1. Understanding Security Threats/4. Other Attacks/2. Password Attacks - Google - Coursera.mp4 26.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.4 OSI Model Introduction and Encapsulation.mp4 26.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 3 - Threat Modeling/3.2 General - Modeling Process.mp4 26.0 MB
  • Protocol Deep Dive/EIGRP - Deep Dive/protocol-deep-dive-eigrp.zip 26.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 05 - System Hacking/5.7 Malware - Rootkits.mp4 26.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/13. Intro to PowerShell Scripting/Module 1 - Intro to PowerShell Scripting/1.11 Common Commands Part 4.mp4 26.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/010 How to Iterate over a Pandas DataFrame.mp4 25.9 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/2. Hardware/2. Components/2. RAM.mp4 25.9 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 6 Managing File Systems/004. 6.3 Using Labels and UUIDs.mp4 25.9 MB
  • Splunk Training/4. Admin 1 - System Admin/3. Splunk License and Management.mp4 25.9 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 7 Cloud Business Continuity Planning/002. 7.1 Business Continuity Planning.mp4 25.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/20 - Day 20 - Intermediate - Build the Snake Game Part 1 Animation & Coordinates/004 Create a Snake Class & Move to OOP.mp4 25.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/05. Malware Threats/Module 1 - Introduction/1.2 Malware Introduction.mp4 25.8 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/3. The Transport and Application Layers/3. The Application Layer/3. All the Layers Working in Unison.mp4 25.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 1/1.9 Why Sites Get Hacked.mp4 25.7 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/6. Troubleshooting/1. Troubleshooting Best Practices/4. Follow the Cookie Crumbs.mp4 25.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 3 - Security Operations/3.3 Indicators of Compromise.mp4 25.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 3/3.2 What is XSS.mp4 25.7 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/02_malware/1. Malicious software.mp4 25.7 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/01_troubleshooting-concepts/04_binary-searching-a-problem/01_what-is-binary-search.mp4 25.7 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/3. The Transport and Application Layers/2. The Transport Layer/3. TCP Control Flags and the Three-way Handshake.mp4 25.7 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 19 Using Git for Version Control/003. 19.2 Creating Git Repositories.mp4 25.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 2/2.2 Spidering.mp4 25.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/5. Incident Response and Advanced Forensics/Module 4 - Legal Aspects of Incident Response/4.5 Benefits of Information Sharing.mp4 25.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/006 Calculator Part 1 Combining Dictionaries and Functions.mp4 25.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.6 Structure Creation - Reverse Engineering.mp4 25.6 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/01_automating-with-configuration-management/03_introduction-to-puppet/01_what-is-puppet.mp4 25.6 MB
  • Splunk Training/8. Getting Data In/2. UF on Linux.mp4 25.6 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/5. Connecting to the Internet/3. Broadband Connections/1. What is broadband.mp4 25.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/011 Challenge 5 - Improving the User Experience.mp4 25.6 MB
  • CompTIA/CompTIA Data+ (DA0-001)/19. Describe Data Governance Concepts/1. Introduction .mp4 25.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 01 - Computer Forensics Today/1.6 Analyze Photos Lab Part 2.mp4 25.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.9 Array Indexing.mp4 25.5 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/04_use-playbooks-to-respond-to-incidents/01_phases-of-incident-response-playbooks/2. Phases of an incident response playbook.mp4 25.5 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/03_automation-in-the-cloud/03_automating-cloud-deployments/02_what-is-orchestration.mp4 25.5 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/3. The Transport and Application Layers/2. The Transport Layer/1. The Transport Layer.mp4 25.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/009 Why is this so Hard! Can I really do this.mp4 25.4 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/4. Networking/1. What is Networking/5. The Web.mp4 25.4 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/3. Package and Software Management/3. Whats happening in the background/1. Windows- Underneath the Hood - Google - Coursera.mp4 25.4 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 12 Troubleshooting Linux Issues/007. 12.6 Resetting a Lost Root Password.mp4 25.4 MB
  • Cybrary/Cybrary - Become an Incident Handler/01. Incident Response Steps/Module 1 - Incident Response Steps/1.3 Incident Response Steps Breakdown.mp4 25.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 09 - Privilege Escalation/9.1 Linux Privilege Escalation.mp4 25.4 MB
  • CompTIA/CompTIA Data+ (DA0-001)/17. Explain Dashboarding/5. Presenting Dashboards .mp4 25.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 07 - Public Exploits/7.2 Understanding the Code.mp4 25.3 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/04_managing-cloud-instances-at-scale/03_troubleshooting-and-debugging/03_recovering-from-failure.mp4 25.3 MB
  • Splunk Training/2. Splunk Fundamentals 2/18. Workflow Actions.mp4 25.3 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/4. Developing Routine and Sensitive Memos/4.3 Developing Sensitive Memos.mp4 25.3 MB
  • Cybrary/Cybrary - Become an Incident Handler/07. Online Reconnaissance/Module 1 - Online Reconnaissance/1.6 Whois Lab.mp4 25.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.6 Create Account.mp4 25.3 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.6 Create Account.mp4 25.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 2 - Security Architecture/2.8 Authentication.mp4 25.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 10 - Password Cracking and Brute-Forcing Logins/10.1 Introduction to Password Cracking Tools.mp4 25.2 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 5 Cloud Architecture Design Principles/005. 5.4 Well-Architected Framework Pillars Part 2.mp4 25.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 4 - Windows Command Line Tools/4.6 Windows System Part 3.mp4 25.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 3 - Security Operations/3.8 Techniques for Risk Reduction.mp4 25.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 3 - Metasploit/3.5 Metasploit (part 5) msfcli.mp4 25.2 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/01_social-engineering/4. Phishing for information.mp4 25.2 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 9 Managing the Boot Procedure/008. 9.7 Troubleshooting the Boot Procedure.mp4 25.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 2 - Programming/2.3 Programming (part 3) Network Pings.mp4 25.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/37 - Day 37 - Intermediate+ Habit Tracking Project API Post Requests & Headers/004 Challenge Add a Pixel to the Habit Tracker using a Post Request.mp4 25.1 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/04_collaboration/02_code-reviews/03_how-to-use-code-reviews-in-github.mp4 25.1 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/6. Troubleshooting and Future of Networking/6. Course Wrap Up/1. Course Wrap Up.mp4 25.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 2/2.7 Discovering SQLI.mp4 25.1 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/2. The Network Layer/4. Routing/5. Non-Routable Address Space.mp4 25.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/006 Automated Birthday Wisher Project Challenge.mp4 25.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/009 Logical Operators.mp4 25.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.12 Function Pointers Example.mp4 25.0 MB
  • Protocol Deep Dive/ARP - Deep Dive/04 Troubleshooting Common ARP Issues/11 Demo - Finding Computers in a Complex LAN .mp4 25.0 MB
  • Protocol Deep Dive/QUIC - Deep Dive/03. Analyzing QUIC with Wireshark/11. Demo-The QUIC Handoff.mp4 25.0 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/6. Troubleshooting/1. Troubleshooting Best Practices/3. Isolating the Problem.mp4 25.0 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/2. The Network Layer/4. Routing/2. Routing Tables.mp4 24.9 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/06_bash-scripting/01_interacting-with-the-command-line-shell/02_basic-linux-commands.mp4 24.9 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/02_basic-python-syntax/02_functions/06_code-style.mp4 24.9 MB
  • CompTIA/CompTIA Data+ (DA0-001)/3. Identify File Formats/1. Introduction .mp4 24.9 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/03_working-with-remotes/03_solving-conflicts/03_rebasing-your-changes.mp4 24.9 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 7 Configuring Logging/003. 7.2 Managing rsyslogd.mp4 24.8 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/02_malware/3. The rise of cryptojacking.mp4 24.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 01 - Course Introduction/1.2 What is the MITRE ATT&CK Framework.mp4 24.7 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 01 - Course Introduction/1.2 What is the MITRE ATT&CK Framework.mp4 24.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.21 Define Acceptable Sociable Engineering Pretexts Part 2.mp4 24.7 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 5 Cloud Infrastructure and Platform Components/002. 5.1 Physical Cloud Environments.mp4 24.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/003 [Interactive Coding Exercise] Odd or Even Introducing the Modulo.mp4 24.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 4 - Vulnerability Analysis/4.2 Vulnerability Testing.mp4 24.7 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/3. Network Services/1. FTP, SFTP, and TFTP - Google - Coursera.mp4 24.7 MB
  • Protocol Deep Dive/QUIC - Deep Dive/04. Troubleshooting the QUIC Protocol/23. Demo-Identifying Packet Loss with Wireshark.mp4 24.7 MB
  • Protocol Deep Dive/QUIC - Deep Dive/02. An Introduction to QUIC/08. Demo-Hands-On with QUIC in Wireshark - Part 1.mp4 24.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 11 - Putting it All Together/11.3 Writing the Report.mp4 24.7 MB
  • Books/CompTIA/Data+/Dodd С. CompTIA Data+. DAO-001 Certification Guide 2022.pdf 24.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/08. OWASP Top 10 - 2021/Module 1 - Introduction/1.3 An Introduction to OWASP.mp4 24.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/2. OWASP Top 10 - 2021/Module 1 - Introduction/1.2 An Introduction to OWASP.mp4 24.6 MB
  • Books/CompTIA/Pentest+/Chapple M. CompTIA PenTest+ Study Guide Exam PT0-002 2ed 2022.pdf 24.6 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/01_getting-your-python-on/04_automating-tasks-through-programming/03_practical-automation-example.mp4 24.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 4 - Network Scanning and Discovery/4.18 Timing and Performance Part 1 - NM.mp4 24.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 4 - Network Scanning and Discovery/4.18 Timing and Performance Part 1 - NM.mp4 24.6 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/01_troubleshooting-concepts/02_introduction-to-debugging/01_intro-to-module-1-troubleshooting-concepts.mp4 24.6 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/2. Hardware/1. The Modern Computer/1. Module Introduction.mp4 24.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.8 Web Shell.mp4 24.5 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.8 Web Shell.mp4 24.5 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/4. Filesystems/1. Filesystem Types/13. Windows- Filesystem Repair - Google - Coursera.mp4 24.5 MB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/3. Protect against threats, risks, and vulnerabilities/01_frameworks-and-controls/2. Introduction to security frameworks and controls.mp4 24.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/008 Challenge 1 - Handling Exceptions in the Password Manager.mp4 24.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/13. Intro to PowerShell Scripting/Module 1 - Intro to PowerShell Scripting/1.2 Working with P2.mp4 24.5 MB
  • Splunk Training/1. Splunk Fundamentals 1/9. Searching with Time Lecture.mp4 24.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/007 Final Debugging Tips.mp4 24.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/22 - Day 22 - Intermediate - Build Pong The Famous Arcade Game/004 Write the Paddle Class and Create the Second Paddle.mp4 24.5 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 2 Cloud Security Concepts and Design Principles/003. 2.2 Identity and Access Control.mp4 24.5 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/4. Filesystems/1. Filesystem Types/9. Windows- Files - Google - Coursera.mp4 24.5 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/02_using-git-locally/02_undoing-things/03_rollbacks.mp4 24.4 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 1 Concepts and Architectures of Cloud Computing/009. 1.8 Shared Considerations for the Cloud.mp4 24.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 2/2.15 Exploiting SQLI.mp4 24.4 MB
  • Protocol Deep Dive/ARP - Deep Dive/04 Troubleshooting Common ARP Issues/08 Demo - Proxy ARP Overhead .mp4 24.4 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/6. Final Project/1. Final Project/1. Final Project Introduction - Google - Coursera.mp4 24.4 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/6. Troubleshooting/4. Going through a Technical Interview/2. Standing out from the Crowd.mp4 24.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 5 - Using Data/5.4 Reports and Dashboards.mp4 24.4 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/3. Operating System/1. What_s an Operating System/3. Files and File Systems.mp4 24.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/13. Intro to PowerShell Scripting/Module 1 - Intro to PowerShell Scripting/1.1 What is PowerShell.mp4 24.3 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 8 Application Security Awareness and Life Cycles/005. 8.4 Common Software Vulnerabilities.mp4 24.3 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 5 Managing Partitions/011. 5.10 Creating Software RAID Devices.mp4 24.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 2 - Mapping to ATT&CK® from Raw Data/2.3 Translate Behaviors to Tactics, Techniques and Sub-Techniques.mp4 24.3 MB
  • MITRE/Cybrary - MITRE ATT&CK Cyber Threat Intelligence/2. Mapping to ATT&CK from Raw Data/2.3 Translate Behaviors to Tactics, Techniques and Sub-Techniques.mp4 24.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.9 Metrics for Time Estimation Part 2.mp4 24.3 MB
  • Protocol Deep Dive/DNS - Deep Dive/03. Configuring DNS for Clients/11. Demo-Implementing DNS over TLS (DoT).mp4 24.3 MB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/1. Welcome to the exciting world of cybersecurity/02_introduction-to-cybersecurity/1. Introduction to cybersecurity.mp4 24.2 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/4. Python in practice/03_debug-python-code/1. Debugging strategies.mp4 24.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.1 Why Security+.mp4 24.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/12. Intro to Burp Suite Pro/Module 3 - Scan/3.1 Crawling, Scope, and Auditing (Performing the Scan).mp4 24.2 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 1 Managing User Related Security/002. 1.1 Managing ACLs.mp4 24.2 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 2 Cloud Data Security/Lesson 4 Cloud Data Security/002. 4.1 Concepts of Cloud Data Security.mp4 24.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Module 2 - Identifying Web Attacks Through Logs/2.5 File Inclusion.mp4 24.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 5 - Exploitation/5.6 Customized Exploitation Avenue.mp4 24.1 MB
  • CompTIA/CompTIA Data+ (DA0-001)/11. Describe Measures of Dispersion/3. Variance Part 1 .mp4 24.1 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/02_lists/07_iterating-over-lists-and-tuples.mp4 24.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 4 - Analysis/4.3 Cyber Kill Chain and Diamond Model.mp4 24.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Module 1 - Introduction and Review/1.6 Tips and Common Issues Part 1.mp4 24.1 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/01_introduction-to-version-control/02_before-version-control/01_intro-to-module-1-version-control.mp4 24.1 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 7 Cloud Business Continuity Planning/005. 7.4 Disaster Recovery Planning.mp4 24.1 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/5. Software/1. Introduction to Software/1. Module Introduction.mp4 24.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 06 - Network and Perimeter Hacking/6.9 DDoS Tools and Countermeasures.mp4 24.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 3 - Threat Modeling/3.4 Business Process Analysis.mp4 24.0 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 17 Billing Support Resources/008. 17.7 Cost Optimization Fundamental Principles.mp4 24.0 MB
  • CompTIA/CompTIA Data+ (DA0-001)/17. Explain Dashboarding/3. Dashboard Design .mp4 24.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 08 - Web Attack Investigation/8.2 Web Attack Investigation Part 2.mp4 24.0 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/03_automation-in-the-cloud/02_managing-instances-in-the-cloud/04_templating-a-customized-vm.mp4 24.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 2 - Nmap Basics/2.4 Kali Linux - A Hacker's Best Friend - NM.mp4 24.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 2 - Nmap Basics/2.4 Kali Linux - A Hacker's Best Friend - NM.mp4 24.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Module 1 - Introduction and Review/1.5 Web Server Logs Review Part 2.mp4 24.0 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/5. Data Recovery & Backups/1. Planning for Data Recovery/3. Backing Up Your Data - Google - Coursera.mp4 23.9 MB
  • Protocol Deep Dive/TCP & UDP - Deep Dive/05.Troubleshooting TCP UDP Issues/05.02.TCP Firewall Issues.mp4 23.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/17 - Day 17 - Intermediate - The Quiz Project & the Benefits of OOP/003 Working with Attributes, Class Constructors and the __init__() Function.mp4 23.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 2 - Collection/2.9 Leveraging OSINT Part 1.mp4 23.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/23 - Day 23 - Intermediate - The Turtle Crossing Capstone Project/010 Solution to Step 7 - Add the Scoreboard and Game Over sequence.mp4 23.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 06 - Introduction to Buffer Overflow/6.4 Finding Bad Characters.mp4 23.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/17 - Day 17 - Intermediate - The Quiz Project & the Benefits of OOP/004 Adding Methods to a Class.mp4 23.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 2 - Collection/2.6 Community Data Sources.mp4 23.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.25 IT Block Example.mp4 23.8 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/02_basic-python-syntax/04_module-review/02_in-margas-words-why-i-like-python.mp4 23.8 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/03_loops/02_for-loops/05_nested-for-loops.mp4 23.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/17 - Day 17 - Intermediate - The Quiz Project & the Benefits of OOP/011 Run for that Bus!.mp4 23.8 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/5. Software/1. Introduction to Software/2. What is Software.mp4 23.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 3 - Nmap & The TCP_IP Protocol Suite/3.5 Nmap & IPv6 - NM.mp4 23.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 3 - Nmap & The TCP_IP Protocol Suite/3.5 Nmap & IPv6 - NM.mp4 23.7 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 7 Next Steps/Lesson 18 Further Study/002. 18.1 Documentation.mp4 23.7 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/6. Troubleshooting/1. Troubleshooting Best Practices/1. Module Introduction.mp4 23.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/06. Phishing/Module 1 - Recon/1.2 Recon.mp4 23.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Module 2 - Wireshark and TCPDUMP/2.6 Packet Sniffing Lab Part 2.mp4 23.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Module 2 - Wireshark and TCPDUMP/2.5 Packet Sniffing Lab Part 2.mp4 23.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 08 - Getting a Shell, Now What/8.3 Transferring Files to and from Kali Linux.mp4 23.7 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/2. Users and Permissions/1. Users and Groups/4. Linux- Users, Superuser and Beyond - Google - Coursera.mp4 23.7 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/2. Protect organizational assets/02_encryption-methods/1. Fundamentals of cryptography.mp4 23.7 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/3. Vulnerabilities in systems/03_cyber-attacker-mindset/1. Protect all entry points.mp4 23.6 MB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/3. Protect against threats, risks, and vulnerabilities/02_ethics-in-cybersecurity/1. Ethics in cybersecurity.mp4 23.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Module 1 - Understanding ATT&CK®/1.6 Data Sources and Detections.mp4 23.6 MB
  • Splunk Training/2. Splunk Fundamentals 2/7. Transaction Command.mp4 23.6 MB
  • Splunk Training/1. Splunk Fundamentals 1/12. How to use fields.mp4 23.6 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/03_crashing-programs/02_code-that-crashes/04_debugging-a-segmentation-fault.mp4 23.6 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 8 Application Security Awareness and Life Cycles/003. 8.2 Cloud Development.mp4 23.6 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/01_getting-your-python-on/03_running-python-locally/02_how-to-run-a-python-script.mp4 23.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.15 Neon Floating Point.mp4 23.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 3 - Setting Up Splunk/3.4 Installing Splunk on Windows.mp4 23.6 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/03_regular-expressions/01_regular-expressions/04_basic-matching-with-grep.mp4 23.6 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 13 Networking and Database/005. 13.4 Route 53.mp4 23.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 2 - Data Types and Logic/2.6 Python Functions - IP.mp4 23.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 01 - Course Introduction/1.3 Where is the MITRE ATT&CK Framework Being Used.mp4 23.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 13 - Smartphone Pentest Framework/13.3 SPF (part 3) Turning an Android App into a SPF Agent.mp4 23.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 3 - Security Operations/3.10 Forensics Concepts.mp4 23.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 5 - Vulnerability Discovery or Scanning/5.6 Vulnerability Scanning (part 6) Directory Transversals.mp4 23.5 MB
  • CompTIA/CompTIA Data+ (DA0-001)/16. Explain Business Requirements and Reports/2. Meeting Requirements Part 1 .mp4 23.5 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/3. Vulnerabilities in systems/03_cyber-attacker-mindset/5. Pathways through defenses.mp4 23.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.4 Scanning, Monitoring and Patching.mp4 23.5 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/2. The Network Layer/3. Subnetting/4. CIDR.mp4 23.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 04 - Understanding Network Protocols/4.6 Wireshark and Encrypted Traffic.mp4 23.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/41 - Day 41 - Web Foundation - Introduction to HTML/004 What is HTML.mp4 23.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.7 User Execution.mp4 23.4 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.7 User Execution.mp4 23.4 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/01_getting-your-python-on/03_running-python-locally/03_your-own-python-modules.mp4 23.4 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/1. What is System Administration/3. Sytem Administration Tasks/1. Organizational Policies - Google - Coursera.mp4 23.4 MB
  • Protocol Deep Dive/ARP - Deep Dive/02 Address Resolution Protocol Fundamentals/04 Demo - ARP Wireshark Captures.mp4 23.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 02 - Computer Forensics Investigation Process/2.2 Computer Forensics Investigation Process Part 2.mp4 23.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Module 4/4.2 Services (KL).mp4 23.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Module 4/4.2 Services (KL).mp4 23.4 MB
  • CompTIA/CompTIA Data+ (DA0-001)/1. Understanding Data and Information/4. Tabular Data .mp4 23.4 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/02_managing-files-with-python/01_reading-and-writing-files/02_reading-files.mp4 23.3 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/01_introduction-to-version-control/02_before-version-control/05_practical-application-of-diff-and-patch.mp4 23.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 13 - Smartphone Pentest Framework/13.4 SPF (part 4) Functionality for Agents.mp4 23.3 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 5 Describe Azure compute and networking services/004. 5.3 Describe resources required for virtual machines.mp4 23.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.22 Conditional Execution.mp4 23.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 2 - Intelligence Gathering/2.11 Footprinting - Internal.mp4 23.3 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 11 Build and Implement a Physical and Logical Cloud Infrastructure/011. 11.10 Performance and Capacity Monitoring.mp4 23.3 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 6 Data Center Design and Risk Analysis/005. 6.4 Design Resilient Environments.mp4 23.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 3 - Storing and Analyzing ATT&CK®-Mapped Data/3.2 Expressing and Storing ATT&CK®-Mapped Data.mp4 23.3 MB
  • MITRE/Cybrary - MITRE ATT&CK Cyber Threat Intelligence/3. Storing and Analyzing ATT&CK-Mapped Data/3.2 Expressing and Storing ATT&CK-Mapped Data.mp4 23.3 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 1 Concepts and Architectures of Cloud Computing/004. 1.3 Core Cloud Computing Characteristics.mp4 23.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.6 Scripting.mp4 23.2 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.6 Scripting.mp4 23.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 5 - Using Data/5.2 Searches.mp4 23.2 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 7 Describe Azure identity, access, and security/002. 7.1 Describe directory services in Azure.mp4 23.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 02 - Setting the Foundation for Success/2.2 Penetration Test Report Demo.mp4 23.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 5 - Exploitation/5.7 Zero Day Angle.mp4 23.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.25 Arrays Examples.mp4 23.2 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 4 Technology/Lesson 11 AWS Global Infrastructure/004. 11.3 Regions.mp4 23.2 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/02_using-git-locally/02_undoing-things/02_amending-commits.mp4 23.1 MB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/2. The evolution of cybersecurity/01_the-history-of-cybersecurity/2. Past cybersecurity attacks.mp4 23.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Module 1 - Introduction and the Cyber Kill Chain Overview/1.2 The Cyber Kill Chain.mp4 23.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/06. Phishing/Module 3 - Automating Your Emails/3.1 Social Engineer's Toolkit (SET).mp4 23.1 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 6 Describe Azure storage services/006. 6.5 Identify options for moving files.mp4 23.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Module 2/2.2 Getting Kali up and Running (KL).mp4 23.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Module 2/2.2 Getting Kali up and Running (KL).mp4 23.1 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/3. Operating System/2. Installing an Operating System/1. Choosing an Operating System.mp4 23.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.16 Neon Floating Point Example.mp4 23.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/08. Password Cracking Tool Fundamentals/Module 1 - Password Cracking Tool Fundamentals/1.2 John the Ripper Introduction.mp4 23.0 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/01_automating-with-configuration-management/04_the-building-blocks-of-configuration-management/01_what-are-domain-specific-languages.mp4 23.0 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/04_managing-data-and-processes/01_data-streams/05_command-line-arguments-and-exit-status.mp4 23.0 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/3. Vulnerabilities in systems/01_flaws-in-the-system/2. Vulnerability management.mp4 23.0 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/02_using-git-locally/03_branching-and-merging/05_merge-conflicts.mp4 23.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.1 Scanning Introduction.mp4 23.0 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/04_cloud-hardening/2. Kelsey - Cloud security explained.mp4 23.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 1 - Just the Basics/1.5 Variables - IP.mp4 23.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 4/4.2 LFI & RFI.mp4 22.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Module 2/2.1 The Beginning (KL).mp4 22.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Module 2/2.1 The Beginning (KL).mp4 22.9 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 17 Managing Linux Server Roles/007. 17.6 Understanding and Managing NFS File Services.mp4 22.9 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/04_managing-cloud-instances-at-scale/03_troubleshooting-and-debugging/02_identifying-where-the-failure-is-coming-from.mp4 22.9 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/3. Work with strings and lists/03_regular-expressions/1. Regular expressions in Python.mp4 22.9 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/06_final-project/01_writing-a-script-from-the-ground-up/03_research.mp4 22.9 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/4. Troubleshooting Networking Services/1. Unable to Resolve Hostname Domain Name.mp4 22.9 MB
  • Protocol Deep Dive/DHCP - Deep Dive/03. Understanding DHCPv6/03_04-Examining DHCPv6 Packet Captures.mp4 22.9 MB
  • Books/CompTIA/Pentest+/lc-mcgraw.hill.comptia.pentestplus.certification.all-in-one.exam.guide.exam.pt0-002.2022.epub 22.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 06 - Introduction to Buffer Overflow/6.7 Buffer Overflow Lab.mp4 22.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.4 Network-Based Attacks.mp4 22.9 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 5 Describe Azure compute and networking services/006. 5.5 Describe virtual networking.mp4 22.9 MB
  • Cybrary/Cybrary - Become an Incident Handler/01. Incident Response Steps/Module 1 - Incident Response Steps/1.1 Incident Response Steps Introduction.mp4 22.9 MB
  • Splunk Training/1. Splunk Fundamentals 1/7. Basic Searching Lecture.mp4 22.8 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/01_getting-your-python-on/02_getting-ready-for-python/05_setting-up-your-environment-on-macos-optional.mp4 22.8 MB
  • CompTIA/CompTIA Data+ (DA0-001)/12. Explain Inferential Statistics/1. Introduction .mp4 22.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 5 - Governance, Risk, and Compliance/5.7 Disaster Recovery Plans.mp4 22.8 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 20 Configuration Management/007. 20.6 Using Ansible Playbooks.mp4 22.8 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 3 Managing Services/005. 3.4 Managing Targets.mp4 22.8 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/01_social-engineering/2. The criminal art of persuasion.mp4 22.7 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 8 Application Security Awareness and Life Cycles/007. 8.6 Secure Coding Methodologies.mp4 22.7 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/03_core-python-components/3. Work with variables in Python.mp4 22.7 MB
  • Protocol Deep Dive/TCP & UDP - Deep Dive/03.TCP UDP Theory of Operation/03.02.TCP Breakdown.mp4 22.7 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/5. Process Management/2. Managing Processes/6. Linux- Managing Processes - Google - Coursera.mp4 22.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 5 - Advanced Command Line Techniques/5.4 Linux Shell Scripting.mp4 22.7 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/1. Understanding Security Threats/3. Network Attacks/2. Denial-of-Service - Google - Coursera.mp4 22.7 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/06_bash-scripting/03_advanced-bash-concepts/01_while-loops-in-bash-scripts.mp4 22.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 3 - Security Operations/3.2 Threat Management Frameworks.mp4 22.7 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/2. The Network Layer/4. Routing/4. Exterior Gateway Protocols.mp4 22.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.4 Exploitation for Privilege Escalation.mp4 22.6 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.4 Exploitation for Privilege Escalation.mp4 22.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 07 - Public Exploits/7.5 Using Metasploit or Not.mp4 22.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 5 - Exploitation/5.2 Purpose.mp4 22.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.11 ARM Multiple Load and Store.mp4 22.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.7 Introduction to Scope Part 2.mp4 22.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 7 - Dissemination and Sharing/7.4 Strategic Intelligence.mp4 22.6 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 13 Configuring a Firewall/003. 13.2 Understanding Firewalling.mp4 22.6 MB
  • CompTIA/CompTIA Data+ (DA0-001)/5. Collect and Integrate Data/1. Introduction .mp4 22.6 MB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 03 - Investigative Process/3.1 Investigation Planning.mp4 22.6 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/03_web-based-exploits/1. Cross-site scripting.mp4 22.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 4 - Security Engineering and Cryptography/4.11 Common Certificate Implementation Issues.mp4 22.5 MB
  • Splunk Training/1. Splunk Fundamentals 1/5. Splunk User Interface (UI) Lecture.mp4 22.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.2 Policies and Best Practices Part 1.mp4 22.5 MB
  • CompTIA/CompTIA Data+ (DA0-001)/15. Identify Data Analytics Tools/4. Programming Languages Part 2 .mp4 22.4 MB
  • Splunk Training/2. Splunk Fundamentals 2/13. Field Aliases and Calculated Fields.mp4 22.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/52 - Day 52 - Intermediate+ Instagram Follower Bot/001 Day 52 Goals what you will make by the end of the day.mp4 22.4 MB
  • Splunk Training/1. Splunk Fundamentals 1/17. Common Information Model (CIM) Lecture.mp4 22.4 MB
  • Books/CompTIA/CySA+/Chapple M. CompTIA CySA+ Study Guide Exam CS0-002 2ed 2020.pdf 22.4 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 10 Identity and Access Management Solutions/004. 10.3 Identity Providers.mp4 22.4 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 10 Identity and Access Management Solutions/005. 10.4 Single Sign-on.mp4 22.4 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 16 Managing SELinux and AppArmor/009. 16.8 Troubleshooting SELinux.mp4 22.4 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/03_dictionaries/05_dictionaries-vs-lists.mp4 22.3 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/03_working-with-remotes/01_introduction-to-github/02_what-is-github.mp4 22.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.5 Component Firmware.mp4 22.3 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.5 Component Firmware.mp4 22.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 2/2.13 Exploiting SQLI.mp4 22.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/20 - Day 20 - Intermediate - Build the Snake Game Part 1 Animation & Coordinates/002 Screen Setup and Creating a Snake Body.mp4 22.3 MB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 2 - Mapping to ATT&CK® from Raw Data/2.2 Identify and Research Behaviors.mp4 22.3 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/3. Work with strings and lists/01_working-with-strings/2. String operations.mp4 22.3 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 7 Cloud Security and Compliance Concepts/003. 7.2 Compliance Strategies.mp4 22.3 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/2. Users and Permissions/2. Permissions/1. Windows- File Permissions - Google - Coursera.mp4 22.3 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 12 Compute and Storage/004. 12.3 Elastic Compute Cloud (EC2).mp4 22.3 MB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 4 - Making Defensive Recs for ATT&CK®-Mapped Data/4.1 The Defensive Recommendations Process.mp4 22.3 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/06_bash-scripting/01_interacting-with-the-command-line-shell/04_pipes-and-pipelines.mp4 22.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 11 - WebApps/11.4 WebApp (part 4) File Inclusion.mp4 22.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.8 Wireless Security Part 1.mp4 22.3 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/2. Users and Permissions/2. Permissions/6. Linux- SetUID, SetGID, Sticky Bit - Google - Coursera.mp4 22.2 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/03_working-with-remotes/01_introduction-to-github/01_intro-to-module-3-working-with-remotes.mp4 22.2 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/2. Protect organizational assets/02_encryption-methods/2. Public key infrastructure.mp4 22.2 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/05_object-oriented-programming-optional/03_code-reuse/01_inheritance-optional.mp4 22.2 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 12 Troubleshooting Linux Issues/005. 12.4 Understanding Linux Memory Use.mp4 22.1 MB
  • Cybrary/Cybrary - Become an Incident Handler/01. Incident Response Steps/Module 1 - Incident Response Steps/1.2 Incident Response Steps.mp4 22.1 MB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 10 - Testimony Do’s and Don’ts/10.1 Expert Testimony Do's and Don'ts.mp4 22.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/24 - Day 24 - Intermediate - Files, Directories and Paths/004 Challenge Read and Write the High Score to a File in Snake.mp4 22.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 3/3.7 Discovering XSS.mp4 22.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.2 Cryptography Definitions_ Initialization Vectors.mp4 22.1 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/04_collaboration/01_pull-requests/04_updating-an-existing-pull-request.mp4 22.0 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/3. Software and Platform Services/6. Managing Cloud Resources/1. Cloud Concepts - Google - Coursera.mp4 22.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.11 Code Injection and Cross Site Scripting.mp4 22.0 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/2. Write effective Python code/02_work-with-functions/4. Explore built-in functions.mp4 22.0 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/3. Software and Platform Services/6. Managing Cloud Resources/3. When and How to Choose Cloud - Google - Coursera.mp4 22.0 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/3. The 3 A's of Cybersecurity - Authentication, Authorization, Accounting/3. Accounting/1. Tracking Usage and Access - Google - Coursera.mp4 22.0 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/10. Progress Reports_ Keeping Supervisors Informed About a Project/10.3 Analyzing a Sample Progess Report.mp4 22.0 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/2. The Traits and Fucntions of Workplace Writing/2.10 Professional Writing Trait Nine_ The Writing Situation.mp4 22.0 MB
  • Protocol Deep Dive/SSH and Telnet - Deep Dive/02.The Secure Shell (SSH) Protocol/0203.Using SSH Debugging Tools.mp4 22.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 1 - Basic Assembly/1.4 Binary, 2's Complement and Hexadecimal.mp4 22.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 01 - Computer Forensics Today/1.1 Course Introduction.mp4 21.9 MB
  • CompTIA/CompTIA Data+ (DA0-001)/2. Explain Data Types/6. Multimedia .mp4 21.9 MB
  • MITRE/Cybrary - MITRE ATT&CK Defender (MAD) Fundamentals/1. Understanding ATT&CK/1.8 How ATT&CK Grows and Evolves.mp4 21.9 MB
  • Protocol Deep Dive/SNMP - Deep Dive/02 - Overview of SNMP/05 - SNMP Packet Formats.mp4 21.9 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/01_hello-python/02_introduction-to-programming/04_getting-computers-to-work-for-you.mp4 21.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 2/2.14 Exploiting SQLI.mp4 21.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 04 - Scanning and Enumeration/4.4 Hping3 (Demo).mp4 21.9 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 2 Cloud Security Concepts and Design Principles/005. 2.4 Common Cloud Threats.mp4 21.9 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/02_using-git-locally/03_branching-and-merging/01_what-is-a-branch.mp4 21.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 7 - Dissemination and Sharing/7.1 Introduction to Dissemination.mp4 21.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 11 - WebApps/11.5 WebApp (part 5) Cross Site Scripting XSS.mp4 21.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 2 - Intelligence Gathering/2.8 OSINT Part 3.mp4 21.8 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 12 Troubleshooting Linux Issues/003. 12.2 Troubleshooting Storage Problems.mp4 21.8 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/01_getting-your-python-on/04_automating-tasks-through-programming/01_benefits-of-automation.mp4 21.8 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/6. Troubleshooting and Future of Networking/3. Digging into DNS/1. Name Resolution Tools.mp4 21.8 MB
  • MITRE/Cybrary - MITRE ATT&CK Defender (MAD) Fundamentals/2. Benefits of Using ATT&CK/2.4 Attack Navigator.mp4 21.8 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/05_testing-in-python/03_other-test-concepts/02_other-test-types.mp4 21.8 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/1. Introduction to asset security/02_introduction-to-assets/2. The what, why, and how of asset security.mp4 21.8 MB
  • Job Tips/Writing a Tech Resume/1. Logistics of a Technical Resume/1.1 How hiring managers read your resume.mp4 21.7 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 4 Cloud Economics/007. 4.6 Cloud Cost Benefits Part 2.mp4 21.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 2 - Collection/2.7 Public Data Sources Part 1.mp4 21.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 7 - Exploitation/7.5 Exploitation (part 5) Using Backdoor to Access an FTP Server.mp4 21.7 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Introduction/001. AWS Certified Cloud Practitioner (CLF-C01) Introduction.mp4 21.7 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/6. Troubleshooting and Future of Networking/1. Introduction to Troubleshooting, Future of Networking/Introduction to Troubleshooting.mp4 21.7 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/04_managing-cloud-instances-at-scale/03_troubleshooting-and-debugging/01_what-to-do-when-you-can-t-be-physically-there.mp4 21.7 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 12 Troubleshooting Linux Issues/004. 12.3 Troubleshooting CPU Performance.mp4 21.7 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 1 Exam Foundation/Lesson 1 Exam Guide/005. 1.4 Exam Question Domains.mp4 21.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.2 Scanning with NMAP Half Connect Scan.mp4 21.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 5 - Advanced Command Line Techniques/5.5 Windows Batch Scripting.mp4 21.6 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 17 Billing Support Resources/009. 17.8 Question Breakdown 1.mp4 21.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/012 Solution & Walkthrough for the NATO Alphabet Project.mp4 21.6 MB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 02 - Forensic Concept Review/2.5 Examination Notes and Analysis Documentation.mp4 21.6 MB
  • CompTIA/CompTIA Data+ (DA0-001)/22. Identify Data Privacy Concepts/1. Introduction -3.mp4 21.6 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/3. Package and Software Management/4. Device Software Management/3. Window- Operating System Updates - Google - Coursera.mp4 21.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 3 - Threat Modeling/3.6 Threat Capability Analysis.mp4 21.6 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/5. Connecting to the Internet/3. Broadband Connections/2. T Carrier Technologies.mp4 21.6 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/3. The Transport and Application Layers/2. The Transport Layer/2. Dissection of a TCP Segment.mp4 21.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.2 ARM Template.mp4 21.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 7 - Exploitation/7.4 Exploitation (part 4) Open Source Vulnerability.mp4 21.6 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 12 Compute and Storage/006. 12.5 Elastic Load Balancing (ELB).mp4 21.5 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/1. What is System Administration/2. What is System Administration/1. What is Systems Administration- - Google - Coursera.mp4 21.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Module 1 - Introduction and Review/1.4 Web Server Logs Review Part 1.mp4 21.5 MB
  • Splunk Training/1. Splunk Fundamentals 1/1. Introduction Lecture.mp4 21.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.7 RAID and Data Backups.mp4 21.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 1 - Basic Assembly/1.5 Assembly Template.mp4 21.5 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 1 Managing User Related Security/004. 1.3 Configuring sudo.mp4 21.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 1 - Just the Basics/1.12 Python Basics Part 1 - IP.mp4 21.5 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 9 Software Assurance and Validation/007. 9.6 Third-party Software Management.mp4 21.5 MB
  • Job Tips/Writing a Tech Resume/5. Design Dos and Don'ts/5.1 Typography.mp4 21.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/21 - Day 21 - Intermediate - Build the Snake Game Part 2 Inheritance & List Slicing/007 How to Slice Lists & Tuples in Python.mp4 21.4 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/01_introduction-to-version-control/04_using-git/01_first-steps-with-git.mp4 21.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/08. OWASP Top 10 - 2021/Module 1 - Introduction/1.5 OWASP Web Security Testing Guide (WSTG).mp4 21.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/2. OWASP Top 10 - 2021/Module 1 - Introduction/1.4 OWASP Web Security Testing Guide (WSTG).mp4 21.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 6 - Preparing for Your Exam/6.3 Exam Time - Strategies for Success.mp4 21.4 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 5 Managing Partitions/008. 5.7 Using UUIDs and Labels.mp4 21.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.5 Patch Lifecycle Baselines and Traffic Analysis.mp4 21.4 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 16 Multiple Account Strategies/003. 16.2 AWS Organizations Benefits.mp4 21.4 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/4. Networking Services/5. Network Address Translation/1. Basics of NAT.mp4 21.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 07 - Web Application Hacking/7.6 Command Injection Attack (Demo).mp4 21.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.7 Valid Accounts Part 1.mp4 21.3 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.7 Valid Accounts Part 1.mp4 21.3 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/1. Introduction to asset security/04_risk-and-asset-security/2. The NIST Cybersecurity Framework.mp4 21.3 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/01_automating-with-configuration-management/05_module-review/01_module-1-wrap-up-automating-with-configuration-management.mp4 21.3 MB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 03 - Investigative Process/3.2 Investigation Bias.mp4 21.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 1 - Basic Assembly/1.2 Introduction to Assembly.mp4 21.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 05 - System Hacking/5.8 Malware - Trojans.mp4 21.3 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/3. Work with strings and lists/01_working-with-strings/3. String indices and slices.mp4 21.3 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/2. Basic Commands/3. Windows- List Directories in CLI - Google - Coursera.mp4 21.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 5 - Using Data/5.5 App Basics.mp4 21.2 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 13 Configuring a Firewall/006. 13.5 Managing iptables Firewalls.mp4 21.2 MB
  • Splunk Training/1. Splunk Fundamentals 1/15. Creating Reports and Dashboards Lecture.mp4 21.2 MB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/4. Cybersecurity tools and programming languages/01_important-cybersecurity-tools/2. Common cybersecurity tools.mp4 21.2 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/1. Introduction to asset security/04_risk-and-asset-security/1. Elements of a security plan.mp4 21.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/21 - Day 21 - Intermediate - Build the Snake Game Part 2 Inheritance & List Slicing/006 Detect Collisions with your own Tail.mp4 21.2 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/5. Process Management/3. Process Utilization/2. Linux- Resource Monitoring - Google - Coursera.mp4 21.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 1 - Introduction/1.1 Nmap - What It Is and Why It's Important - NM.mp4 21.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 1 - Introduction/1.1 Nmap - What It Is and Why It's Important - NM.mp4 21.2 MB
  • Protocol Deep Dive/DHCP - Deep Dive/03. Understanding DHCPv6/03_06-Configuring DHCPv6 on Cisco.mp4 21.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 12 - Developing the Hacker Mindset/12.1 Understanding the Hacker Mindset.mp4 21.2 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 12 Compute and Storage/009. 12.8 Simple Storage Service (S3) and Glacier.mp4 21.1 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/03_loops/01_while-loops/07_infinite-loops-and-how-to-break-them.mp4 21.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 06 - Network and Perimeter Hacking/6.11 Network Level Session Hijacking.mp4 21.1 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/5. Connecting to the Internet/3. Broadband Connections/5. Fiber Connections.mp4 21.1 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 2 Cloud Data Security/Lesson 4 Cloud Data Security/007. 4.6 Data Classification and Policy.mp4 21.1 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/02_introduction-to-python-programming-in-cybersecurity/2. Python and cybersecurity.mp4 21.1 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/06_bash-scripting/03_advanced-bash-concepts/02_for-loops-in-bash-scripts.mp4 21.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.5 Scanning with XMAS Scan Part 2.mp4 21.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/007 U.S. States Game Part 3 Saving Data to .csv.mp4 21.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.6 OSI Layers 3 and 4.mp4 21.0 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/01_automating-with-configuration-management/02_introduction-to-automation-at-scale/02_what-is-scale.mp4 21.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 01 - Computer Forensics Today/1.3 Computer Forensics Today Part 2.mp4 21.0 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 4 Cloud Economics/002. 4.1 Total Cost of Ownership.mp4 21.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/08. Password Cracking Tool Fundamentals/Module 1 - Password Cracking Tool Fundamentals/1.1 Password Cracking Foundations.mp4 21.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 6 - Post-Exploitation/6.4 Infrastructure Analysis.mp4 21.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 4 - Analysis/4.4 Cyber Kill Chain and Courses of Action Matrix.mp4 21.0 MB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/1. Welcome to the exciting world of cybersecurity/02_introduction-to-cybersecurity/2. Toni - My path to cybersecurity.mp4 21.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Module 1 - Understanding ATT&CK®/1.1 Introduction to ATT&CK®.mp4 21.0 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/05_testing-in-python/02_unit-tests/02_writing-unit-tests-in-python.mp4 20.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 4/4.1 LFI & RFI.mp4 20.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/005 Challenge - Build a Kanye Quotes App using the Kanye Rest API.mp4 20.9 MB
  • Protocol Deep Dive/DHCP - Deep Dive/02. Course Overview and DHCPv4/02_06-Examining the DHCPv4 Packet Flow.mp4 20.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/007 Challenge 3 - Checking if the Player has Won.mp4 20.9 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/3. Vulnerabilities in systems/01_flaws-in-the-system/3. Defense in depth strategy.mp4 20.9 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 1 Concepts and Architectures of Cloud Computing/003. 1.2 Roles and Responsibilities in Cloud Computing.mp4 20.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 03 - Kali Linux Basics/3.5 Windows Command Lab.mp4 20.9 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/02_basic-python-syntax/01_expressions-and-variables/02_data-types.mp4 20.8 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/04_use-playbooks-to-respond-to-incidents/02_explore-incident-response/2. Erin - The importance of diversity of perspective on a security team.mp4 20.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 3 - Threat Modeling/3.5 Threat Agent or Community Analysis.mp4 20.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 3 - Data Management and Processing/3.5 Threat Intelligence Platforms.mp4 20.8 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/5. Connecting to the Internet/5. Wireless Networking/4. Wireless Security.mp4 20.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/002 Functions with Inputs.mp4 20.8 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/01_security-domains/02_more-about-the-cissp-security-domains/5. Ashley - My path to cybersecurity.mp4 20.8 MB
  • Job Tips/Writing a Tech Resume/4. Tools for Creating a Resume/4.1 Word processors.mp4 20.8 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 8 Application Security Awareness and Life Cycles/008. 8.7 Software Configuration Management and Versioning.mp4 20.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 2 - Splunk Products, Resources, and Certifications/2.3 Splunk Products.mp4 20.7 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/01_introduction-to-version-control/04_using-git/02_tracking-files.mp4 20.7 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/4. Networking Services/3. Name Resolution in Practise/2. Anatomy of a Domain Name.mp4 20.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.29 Rules of Engagement Part 2.mp4 20.7 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/3. Operating System/1. What_s an Operating System/7. Interacting with the OS-User Space.mp4 20.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.9 Scanning with hping3 and ACK Scan.mp4 20.7 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/04_managing-data-and-processes/02_python-subprocesses/01_running-system-commands-in-python.mp4 20.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.11 Network Services DNS.mp4 20.7 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/04_collaboration/01_pull-requests/02_a-simple-pull-request-on-github.mp4 20.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/009 Hard Work and Perseverance beats Raw Talent Every Time.mp4 20.7 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 4 Technology/Lesson 10 AWS Cloud Deployment and Operations/002. 10.1 AWS Interaction Options.mp4 20.7 MB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 05 - The Origins of the American Legal System/5.1 US Constitution.mp4 20.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 04 - Understanding Network Protocols/4.12 SNMP Enumeration.mp4 20.6 MB
  • CompTIA/CompTIA Data+ (DA0-001)/14. Explore Analysis Techniques/1. Introduction -5.mp4 20.6 MB
  • CompTIA/CompTIA Data+ (DA0-001)/8. Recode, Sort, Filter, and Aggregate Data/1. Introduction .mp4 20.6 MB
  • Splunk Training/2. Splunk Fundamentals 2/5. The eval and fillnull Commands.mp4 20.6 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 2 Cloud Security Concepts and Design Principles/007. 2.6 Cloud Business Continuity and Disaster Recovery.mp4 20.6 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/1. What is System Administration/4. Applying Changes/2. Never Test in Production - Google - Coursera.mp4 20.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.26 String Instructions.mp4 20.5 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/2. Protect organizational assets/01_safeguard-information/2. Security controls.mp4 20.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 04 - Understanding Network Protocols/4.16 Protocol Tips.mp4 20.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 05 - Web Application Penetration Testing/5.10 File Upload Vulnerabilities.mp4 20.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 03 - Kali Linux Basics/3.4 Who, What, When, Where and How of the Linux Command Line.mp4 20.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.10 Virtualization Part 1.mp4 20.5 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/02_using-git-locally/03_branching-and-merging/02_creating-new-branches.mp4 20.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/46 - Day 46 - Intermediate+ Create a Spotify Playlist using the Musical Time Machine/001 Day 46 Goals what you will make by the end of the day.mp4 20.5 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 4 Cloud Economics/005. 4.4 On-premises (KTLO) Operations.mp4 20.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 12 - Developing the Hacker Mindset/12.2 Tips on Harnessing the Hacker Mindset.mp4 20.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.3 Network Services Continued - DHCP and IPAM.mp4 20.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.7 Pushing and Popping.mp4 20.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/016 Day 1 Project Band Name Generator.mp4 20.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/008 Location, Location, Location - Pavlov's Coding Corner.mp4 20.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 3 - Data Management and Processing/3.2 Common CTI Standards Part 1.mp4 20.4 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/01_getting-your-python-on/03_running-python-locally/04_what-is-an-ide.mp4 20.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 4 - Network Scanning and Discovery/4.1 Target Specification Review+ - NM.mp4 20.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 4 - Network Scanning and Discovery/4.1 Target Specification Review+ - NM.mp4 20.4 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/3. Vulnerabilities in systems/02_identify-system-vulnerabilities/1. Vulnerability assessments.mp4 20.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 7 - Exploitation/7.3 Exploitation (part 3) Directory Traversal.mp4 20.4 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/3. Package and Software Management/4. Device Software Management/3. Linux- Operating System Updates - Google - Coursera.mp4 20.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 2/2.3 Spidering.mp4 20.3 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/03_core-python-components/1. Data types in Python.mp4 20.3 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 4 Basic Hardware Management/002. 4.1 Understanding Computer Hardware Components.mp4 20.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/005 Turtle Challenge 2 - Draw a Dashed Line.mp4 20.3 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 18 An Introduction to Bash Shell Scripts/004. 18.3 Using Conditional Statements in Shell Scripts.mp4 20.3 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/02_managing-files-with-python/02_managing-files-and-directories/03_directories.mp4 20.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 2 - Introductory Commands/2.6 Copy and Paste in Windows Command.mp4 20.3 MB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/1. Welcome to the exciting world of cybersecurity/03_core-skills-for-cybersecurity-professionals/1. Core skills for cybersecurity professionals.mp4 20.3 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/3. Secure against network intrusions/03_network-attack-tactics-and-defense/1. Malicious packet sniffing.mp4 20.3 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/3. Work with strings and lists/02_work-with-lists-and-develop-algorithms/1. List operations in Python.mp4 20.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.6 DNS Service.mp4 20.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 2 - Collection/2.4 Private Data Sources Part 1.mp4 20.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 05 - Web Application Penetration Testing/5.5 SQL Injection Authentication Bypass.mp4 20.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 02 - Introduction to Ethical Hacking/2.1 Fundamental Security Concepts.mp4 20.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 04 - Understanding Network Protocols/4.1 Scanning Network Protocols.mp4 20.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 6 - Attribution/6.5 Nation-State Attribution Part 1.mp4 20.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.7 OSI Layers 5, 6, 7 and Summary.mp4 20.2 MB
  • Protocol Deep Dive/OSPF - Deep Dive/04 - Discussing Simple OSPF Communication Blocks/24 - Viewing into the Network LSA (Type 2).mp4 20.1 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 12 Compute and Storage/005. 12.4 EC2 Auto Scaling.mp4 20.1 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 18 An Introduction to Bash Shell Scripts/005. 18.4 Using Advanced Scripting Options.mp4 20.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.9 Jump Tables and Switch Statements.mp4 20.1 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/01_hello-python/03_introduction-to-python/05_other-languages.mp4 20.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.2 Access Token Manipulation.mp4 20.1 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.2 Access Token Manipulation.mp4 20.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 5 - Exploitation/5.8 Example Avenues of Attack.mp4 20.1 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/03_loops/03_recursion-optional/01_what-is-recursion-optional.mp4 20.1 MB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/3. Protect against threats, risks, and vulnerabilities/01_frameworks-and-controls/3. Secure design.mp4 20.1 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/01_security-domains/02_more-about-the-cissp-security-domains/2. Explore the CISSP security domains, Part 1.mp4 20.1 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/04_managing-data-and-processes/02_python-subprocesses/02_obtaining-the-output-of-a-system-command.mp4 20.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 3 - Setting Up Splunk/3.5 Installing a Universal Forwarder.mp4 20.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/014 [Interactive Coding Exercise] Variables.mp4 20.0 MB
  • MITRE/Cybrary - MITRE ATT&CK Defender (MAD) Fundamentals/1. Understanding ATT&CK/1.4 Techniques and Sub-Techniques.mp4 20.0 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/3. Operating System/1. What_s an Operating System/1. Module Introduction.mp4 20.0 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/02_security-frameworks-and-controls/04_owasp-principles-and-security-audits/1. OWASP security principles.mp4 20.0 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/01_introduction-to-version-control/05_module-wrap-up/01_module-1-wrap-up-intro-to-version-control.mp4 20.0 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/4. Python in practice/01_python-for-automation/2. Automate cybersecurity tasks with Python.mp4 20.0 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/5. Connecting to the Internet/4. WANs/1. Wide Area Network Technologies.mp4 20.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.4 Pre-Engagement Interactions Overview Part 1.mp4 20.0 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/01_introduction-to-version-control/02_before-version-control/03_diffing-files.mp4 20.0 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/2. Write effective Python code/03_learn-from-the-python-community/2. Code readability.mp4 20.0 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/04_use-playbooks-to-respond-to-incidents/02_explore-incident-response/1. Use a playbook to respond to threats, risks, or vulnerabilities.mp4 20.0 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/01_getting-your-python-on/02_getting-ready-for-python/03_getting-your-computer-ready-for-python.mp4 20.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/11 - Day 11 - Beginner - The Blackjack Capstone Project/005 Hint 9 Solution Walkthrough Refactoring and calling calculate_score().mp4 20.0 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 6 Describe Azure storage services/007. 6.6 Describe migration options.mp4 20.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/06. Phishing/Module 1 - Recon/1.5 Using Recon-NG.mp4 20.0 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/2. Basic Commands/12. Windows- Copying Files _ Directories - Google - Coursera.mp4 19.9 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/7. Incident Reports_ Documenting When Something Goes Wrong/7.2 Examples of Incident Types.mp4 19.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/29 - Day 29 - Intermediate - Building a Password Manager GUI App with Tkinter/001 Day 29 Goals what we will make by the end of the day.mp4 19.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.8 New Service.mp4 19.9 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.8 New Service.mp4 19.9 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/2. Escalate incidents/01_escalation-in-cybersecurity/2. The importance of escalation.mp4 19.9 MB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 2 - Mapping to ATT&CK® from Raw Data/2.3 Translate Behaviors to Tactics, Techniques and Sub-Techniques.mp4 19.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 04 - Data Acquisition/4.1 Data Acquisition Part 1.mp4 19.9 MB
  • Splunk Training/2. Splunk Fundamentals 2/21. Datamodels and the CIM.mp4 19.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/11 - Day 11 - Beginner - The Blackjack Capstone Project/008 A Solid Foundation goes a Long Way.mp4 19.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 2 - Intelligence Gathering/2.9 Covert Gathering.mp4 19.9 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 7 Describe Azure identity, access, and security/005. 7.4 Describe Azure role-based access control (RBAC).mp4 19.8 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/06_final-project/01_writing-a-script-from-the-ground-up/01_final-project-introduction.mp4 19.8 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/02_introduction-to-networks/2. Chris - My path to cybersecurity.mp4 19.8 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 13 Configuring a Firewall/005. 13.4 Managing firewalld.mp4 19.8 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/6. Troubleshooting/4. Going through a Technical Interview/3. Getting Ready for the Interview.mp4 19.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.11 Virtualization Part 2.mp4 19.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/21 - Day 21 - Intermediate - Build the Snake Game Part 2 Inheritance & List Slicing/008 Stay motivated by remembering the reason you signed up.mp4 19.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 3 - Security Operations/3.9 Incident Response.mp4 19.7 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/3. Network Services/2. NTP - Google - Coursera.mp4 19.7 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 16 Multiple Account Strategies/002. 16.1 AWS Organizations.mp4 19.7 MB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 3 - Storing and Analyzing ATT&CK®-Mapped Data/3.2 Expressing and Storing ATT&CK®-Mapped Data.mp4 19.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/14 - Day 14 - Beginner - Higher Lower Game Project/003 Study Tip Set Reminders in Your Calendar to Review.mp4 19.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 7 - Exploitation/7.6 Exploitation (part 6) Attaching to an IP Address.mp4 19.7 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/2. Basic Commands/16. Windows- Removing Files _ Directories - Google - Coursera.mp4 19.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 3 - OSINT Playground/3.2 Computer-Secure Environment.mp4 19.7 MB
  • Protocol Deep Dive/DHCP - Deep Dive/02. Course Overview and DHCPv4/02_08-Configuring DHCPv4 on Windows.mp4 19.7 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 7 Describe Azure identity, access, and security/003. 7.2 Describe authentication methods in Azure.mp4 19.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.3 Bootkit.mp4 19.7 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.3 Bootkit.mp4 19.7 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/03_regular-expressions/02_basic-regular-expressions/02_wildcards-and-character-classes.mp4 19.6 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 5 Cloud Infrastructure and Platform Components/005. 5.4 Core Cloud Compute Resources.mp4 19.6 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 14 Securing Linux/002. 14.1 Managing Boot Loader Password.mp4 19.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 2/2.10 Discovering SQLI.mp4 19.6 MB
  • Protocol Deep Dive/ARP - Deep Dive/03 Understanding InARP, GARP, RARP, and Proxy ARP/09 Proxy ARP.mp4 19.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 2 - Data Types and Logic/2.7 Strings (Deep-Dive) Part 1 - IP.mp4 19.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 01 - Introduction/1.1 Course Introduction.mp4 19.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 9 - Advanced Exploitation/9.3 Advanced Exploitation (part 3) Exploiting Java.mp4 19.6 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/02_deploying-puppet/04_module-review/01_module-2-wrap-up-deploying-puppet.mp4 19.6 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 5 Managing Partitions/009. 5.8 Creating Swap Partitions.mp4 19.6 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 8 AWS Access Management/002. 8.1 User and Identity Management Basics.mp4 19.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/002 What are Application Programming Interfaces (APIs).mp4 19.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/13. Intro to PowerShell Scripting/Module 1 - Intro to PowerShell Scripting/1.5 Additional Piping.mp4 19.5 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/2. Users and Permissions/1. Users and Groups/1. Users, Administrators, and Groups, Oh My! - Google - Coursera.mp4 19.5 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/6. Operating Systems in Practice/1. Remote Access/5. Remote Connection File Transfer on Windows - Google - Coursera.mp4 19.5 MB
  • Protocol Deep Dive/IPsec - Deep Dive/05 - Securing the Network with IKEv1/20 - IKEv1 Main Mode.mp4 19.5 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/03_working-with-remotes/02_using-a-remote-repository/04_updating-the-local-repository.mp4 19.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 09 - Lateral Movement/9.5 Lateral Movement Case Study.mp4 19.5 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 09 - Lateral Movement/9.5 Lateral Movement Case Study.mp4 19.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/001 Day 34 Goals what you will make by the end of the day.mp4 19.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 10 - Collection/10.3 Clipboard Data.mp4 19.5 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 10 - Collection/10.3 Clipboard Data.mp4 19.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/22 - Day 22 - Intermediate - Build Pong The Famous Arcade Game/006 Add the Ball Bouncing Logic.mp4 19.5 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/1. Protect data and communicate incidents/03_your-impact-on-data-protection/1. Detect and protect without neglect.mp4 19.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/004 Nested if statements and elif statements.mp4 19.5 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/03_crashing-programs/04_module-review/01_module-3-wrap-up-crashing-programs.mp4 19.5 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/02_slowness/04_module-review/01_module-2-wrap-up-slowness.mp4 19.5 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/3. Secure against network intrusions/02_secure-networks-against-denial-of-service-dos-attacks/1. Denial of Service (DoS) attacks.mp4 19.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 04 - Understanding Network Protocols/4.5 Using Wireshark.mp4 19.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 2 - Intelligence Gathering/2.4 Intelligence Gathering Basics.mp4 19.4 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/06_bash-scripting/02_bash-scripting/03_conditional-execution-in-bash.mp4 19.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 05 - System Hacking/5.2 Vulnerability Assessment Phases and Tools.mp4 19.4 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 3 Describe Azure Management and Governance/Lesson 10 Describe features and tools for managing and deploying resources/002. 10.1 Describe the Azure portal.mp4 19.4 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 3 Describe Azure Management and Governance/Lesson 11 Describe monitoring tools/004. 11.3 Describe Azure Monitor.mp4 19.4 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/03_answer-interview-questions/5. Karan - Interview tips from a hiring manager.mp4 19.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 5 - Exploitation/5.4 Evasion.mp4 19.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 5 - Campaign Analysis/5.4 MITRE ATT&CK and the MITRE Threat Groups Track.mp4 19.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 05 - System Hacking/5.1 Introduction to Vulnerabilities.mp4 19.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/06. Phishing/Module 4 - Stopping Phishing Attacks/4.1 Stopping Phishing Attacks.mp4 19.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/004 Fixing Errors and Watching for Red Underlines.mp4 19.3 MB
  • Protocol Deep Dive/OSPF - Deep Dive/04 - Discussing Simple OSPF Communication Blocks/26 - Viewing into the External LSA (Type 5).mp4 19.3 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/3. Operating System/2. Installing an Operating System/7. Tri Ngo Obstacles _ How to be Successful in IT.mp4 19.3 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/3. Network Services/7. DHCP - Google - Coursera.mp4 19.3 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 4 Technology/Lesson 11 AWS Global Infrastructure/005. 11.4 Edge Locations.mp4 19.3 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 3 Managing Services/004. 3.3 Creating Custom systemd Service Configuration.mp4 19.2 MB
  • CompTIA/CompTIA Data+ (DA0-001)/4. Explain Data Storage/6. Extra Resources .mp4 19.2 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/01_getting-your-python-on/05_introduction-to-qwiklabs/01_what-is-qwiklabs.mp4 19.2 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 7 Configuring Logging/002. 7.1 Understanding Logging.mp4 19.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 5 - Sock Puppets/5.2 What is a Sock Puppet.mp4 19.2 MB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/2. The evolution of cybersecurity/02_the-eight-cissp-security-domains/1. Introduction to the eight CISSP security domains, Part 1.mp4 19.2 MB
  • Protocol Deep Dive/DNS - Deep Dive/05. Troubleshooting DNS/22. Demo-Troubleshooting Silence.mp4 19.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/007 Print vs. Return.mp4 19.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 1/1.1 Introduction.mp4 19.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/05. Malware Threats/Module 2 - Analyze Malware/2.2 Analyze and Classify Malware Lab Part 2.mp4 19.2 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/2. Protect organizational assets/03_authentication-authorization-and-accounting/1. Access controls and authentication systems.mp4 19.2 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/2. Escalate incidents/03_timing-is-everything/1. From simple activity to major data breach.mp4 19.2 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 15 EC2 Pricing Models/004. 15.3 Reserved-Instance Scenario.mp4 19.1 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/06_bash-scripting/01_interacting-with-the-command-line-shell/03_redirecting-streams.mp4 19.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 2/2.6 Discovering SQLI.mp4 19.1 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/5. Process Management/1. Life of a Process/3. Windows- Process Creation and Termination - Google - Coursera.mp4 19.1 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 9 Software Assurance and Validation/003. 9.2 Security Testing Methodologies.mp4 19.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/007 [Interactive Coding Exercise] The FizzBuzz Job Interview Question.mp4 19.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.5 Risk Assessment.mp4 19.1 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/01_security-domains/02_more-about-the-cissp-security-domains/3. Explore the CISSP security domains, Part 2.mp4 19.1 MB
  • CompTIA/CompTIA Data+ (DA0-001)/15. Identify Data Analytics Tools/1. Introduction .mp4 19.1 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/01_hello-python/03_introduction-to-python/01_what-is-python.mp4 19.1 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/3. Communicate effectively to influence stakeholders/03_visual-communication-using-a-dashboard/3. How to create a visual dashboard.mp4 19.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.5 Shift Example.mp4 19.0 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 2 Cloud Data Security/Lesson 4 Cloud Data Security/008. 4.7 Auditability, Traceability, and Accountability.mp4 19.0 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/02_managing-files-with-python/01_reading-and-writing-files/03_iterating-through-files.mp4 19.0 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/2. Basic Commands/6. Windows- Changing Directories in the CLI - Google - Coursera.mp4 19.0 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/3. Operating System/2. Installing an Operating System/6. Installing Mac OS.mp4 19.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/004 __name__ and __main__ Special Attributes built into Python.mp4 19.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/012 Challenge 5 Solution - How to Add ASCII Art and Improve the UI.mp4 19.0 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/3. Vulnerabilities in systems/03_cyber-attacker-mindset/4. Niru - Adopt an attacker mindset.mp4 19.0 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/02_deploying-puppet/02_deploying-puppet-to-clients/01_puppet-nodes.mp4 18.9 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/06_bash-scripting/02_bash-scripting/02_using-variables-and-globs.mp4 18.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.15 Tunneling and IPSec Part 2.mp4 18.9 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/01_get-started-with-the-course/1. Introduction to Course 7.mp4 18.9 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/6. Operating Systems in Practice/4. Operating System Deployment/2. Operating Systems Deployment Methods - Google - Coursera.mp4 18.9 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/02_os-hardening/1. OS hardening practices.mp4 18.9 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/6. Troubleshooting/6. Course Wrap-up/1. Course Wrap up.mp4 18.9 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 13 Networking and Database/009. 13.8 Relational Database Service (RDS).mp4 18.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.8 Valid Accounts Part 2.mp4 18.9 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.8 Valid Accounts Part 2.mp4 18.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.14 Tunneling and IPSec Part 1.mp4 18.9 MB
  • Protocol Deep Dive/DNS - Deep Dive/04. Modifying DNS Configuration for Servers/14. Configuring Record Types.mp4 18.9 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/02_security-frameworks-and-controls/03_nist-frameworks/1. NIST frameworks.mp4 18.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/004 Working with the datetime Module.mp4 18.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 03 - Footprinting and Reconnaissance/3.7 LinkedIn (Demo).mp4 18.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 09 - Lateral Movement/9.3 Exploitation of Remote Services.mp4 18.9 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 09 - Lateral Movement/9.3 Exploitation of Remote Services.mp4 18.9 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/3. The Transport and Application Layers/3. The Application Layer/1. The Application Layer.mp4 18.9 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/3. File & Text Manipulation/10. Linux- Input, Output and Pipeline - Google - Coursera.mp4 18.8 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 6 Managing File Systems/008. 6.7 Managing Btrfs.mp4 18.8 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/1. Introduction to asset security/03_digital-and-physical-assets/1. Assets in a digital world.mp4 18.8 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 17 Managing Linux Server Roles/002. 17.1 Understanding and Managing Time Services.mp4 18.8 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/02_managing-files-with-python/02_managing-files-and-directories/02_more-file-information.mp4 18.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 4 - Information Gathering/4.4 Information Gathering (part 4) recon-ng and google operators.mp4 18.8 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 4 Basic Hardware Management/007. 4.6 Understanding dev, sys and proc Usage.mp4 18.8 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 3 Managing Services/003. 3.2 Managing Unit State with systemd.mp4 18.7 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/01_hello-python/02_introduction-to-programming/03_what-is-automation.mp4 18.7 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 20 Configuration Management/005. 20.4 Setting up Ansible for Configuration Management.mp4 18.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/009 Programming is like going to the Gym.mp4 18.7 MB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 04 - The Expert Report/4.1 Format of the Expert Report.mp4 18.7 MB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/1. Welcome to the exciting world of cybersecurity/03_core-skills-for-cybersecurity-professionals/4. The importance of cybersecurity.mp4 18.7 MB
  • Job Tips/Writing a Tech Resume/2. Resume Content/2.2 Education.mp4 18.7 MB
  • MITRE/Cybrary - MITRE ATT&CK Defender (MAD) Fundamentals/1. Understanding ATT&CK/1.7 Groups and Software.mp4 18.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/011 The Python Input Function.mp4 18.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 1 - Introduction/1.1 Course Introduction.mp4 18.7 MB
  • MITRE/Cybrary - MITRE ATT&CK Defender (MAD) Fundamentals/2. Benefits of Using ATT&CK/2.1 Community Perspective.mp4 18.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 02 - Introduction to Ethical Hacking/2.6 Introduction to Security Laws and Standards.mp4 18.7 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/04_threat-modeling/3. PASTA - The Process for Attack Simulation and Threat Analysis.mp4 18.7 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/3. Linux commands in the Bash shell/02_manage-file-content-in-bash/3. Create and modify directories and files.mp4 18.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 07 - Web Application Hacking/7.7 Web Attack Countermeasures.mp4 18.6 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/5. Process Management/2. Managing Processes/2. Linux- Reading Process Information - Google - Coursera.mp4 18.6 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 18 An Introduction to Bash Shell Scripts/007. Lesson 18 Lab Solution Writing a Shell Script.mp4 18.6 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/5. Data Recovery & Backups/1. Planning for Data Recovery/5. Testing Backups - Google - Coursera.mp4 18.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.9 Persistence Case Study.mp4 18.6 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.9 Persistence Case Study.mp4 18.6 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/01_hello-python/05_module-review/02_meet-marga-the-curriculum-developer.mp4 18.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.3 Policies and Best Practices Part 2.mp4 18.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 04 - Scanning and Enumeration/4.5 Introduction to Enumeration.mp4 18.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.8 Execution Case Study.mp4 18.6 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.8 Execution Case Study.mp4 18.6 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/2. Users and Permissions/2. Permissions/4. Linux- Modifying Permissions - Google - Coursera.mp4 18.5 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/04_conditional-and-iterative-statements/1. Conditional statements in Python.mp4 18.5 MB
  • CompTIA/CompTIA Data+ (DA0-001)/17. Explain Dashboarding/1. Introduction .mp4 18.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 1 - Linux/1.6 Linux (part 6) Copy Commands and crontab.mp4 18.5 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/03_loops/02_for-loops/01_what-is-a-for-loop.mp4 18.5 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/06_congratulations-on-completing-course-5/1. Course wrap-up.mp4 18.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/13. Intro to PowerShell Scripting/Module 1 - Intro to PowerShell Scripting/1.3 Command Line.mp4 18.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.6 Scanning with NMAP ACK Scan.mp4 18.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/19 - Day 19 - Intermediate - Instances, State and Higher Order Functions/003 Challenge Make an Etch-A-Sketch App.mp4 18.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 3 - Setting Up Splunk/3.2 Parts of Splunk.mp4 18.5 MB
  • MITRE/Cybrary - MITRE ATT&CK Defender (MAD) Fundamentals/3. Operationalizing ATT&CK/3.3 Threat Emulation.mp4 18.5 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/01_getting-your-python-on/02_getting-ready-for-python/04_setting-up-your-environment-on-windows-optional.mp4 18.5 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/3. Work with strings and lists/02_work-with-lists-and-develop-algorithms/2. Write a simple algorithm.mp4 18.4 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/6. Operating Systems in Practice/3. Logging/2. The Windows Event Viewer - Google - Coursera.mp4 18.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/010 How to Get a Good Night's Sleep.mp4 18.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/37 - Day 37 - Intermediate+ Habit Tracking Project API Post Requests & Headers/001 Day 37 Goals what you will make by the end of the day.mp4 18.4 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/3. The Transport and Application Layers/2. The Transport Layer/4. TCP Socket States.mp4 18.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 8 - Passwords/8.2 Passwords (part 2) Online Password Cracking.mp4 18.4 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 3 AWS Cloud and Value Proposition/006. 3.5 Cloud Business Value.mp4 18.4 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/04_collaboration/04_module-review/01_module-4-wrap-up-collaboration.mp4 18.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/37 - Day 37 - Intermediate+ Habit Tracking Project API Post Requests & Headers/005 Autofilling today's date using strftime.mp4 18.3 MB
  • Splunk Training/2. Splunk Fundamentals 2/9. Knowledge Objects.mp4 18.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 7 - Identity and Access Management/7.5 Single Sign-On with Federated Services Part 1.mp4 18.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.1 Networking Concepts.mp4 18.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.1 Indirect Addressing and Variables Part 1.mp4 18.3 MB
  • Protocol Deep Dive/SNMP - Deep Dive/06 - Troubleshooting Using SNMP/18 - Troubleshooting Issues.mp4 18.3 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 9 Security Support Resources/002. 9.1 AWS Network Security Capabilities.mp4 18.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/007 Number Manipulation and F Strings in Python.mp4 18.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.12 PKI Continued.mp4 18.2 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/6. Troubleshooting/3. Documentation/1. Ticketing Systems and Documenting Your Work.mp4 18.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 7 - Conclusion/7.2 Scanning, Enumerations, & Vulnerabilities Conclusion.mp4 18.2 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/2. Basic Commands/1. Lesson Overview _ Practice Tips - Google - Coursera.mp4 18.2 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/03_web-based-exploits/2. Exploitable gaps in databases.mp4 18.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.4 Structures and Unions.mp4 18.2 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/4. Filesystems/1. Filesystem Types/4. Windows- Disk Partitioning & Formatting a Filesystem.mp4 18.2 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/03_working-with-remotes/02_using-a-remote-repository/02_working-with-remotes.mp4 18.2 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 5 Cloud Architecture Design Principles/002. 5.1 Simple Design Principles.mp4 18.2 MB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/2. The evolution of cybersecurity/02_the-eight-cissp-security-domains/2. Introduction to the eight CISSP security domains, Part 2.mp4 18.2 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/01_security-domains/03_navigate-threats-risks-and-vulnerabilities/2. Key impacts of threats, risks, and vulnerabilities.mp4 18.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/13. Intro to PowerShell Scripting/Module 1 - Intro to PowerShell Scripting/1.6 Additional Help.mp4 18.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/04. Social Engineering/Module 1 - Introduction/1.2 Introduction to Social Engineering Part 1.mp4 18.1 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/2. Escalate incidents/02_to-escalate-or-not-to-escalate/1. Prepare to escalate through security recognition.mp4 18.1 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/03_regular-expressions/03_advanced-regular-expressions/04_splitting-and-replacing.mp4 18.1 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/6. Troubleshooting and Future of Networking/5. IPv6/2. IPv6 Headers.mp4 18.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Module 1 - Understanding ATT&CK®/1.8 How ATT&CK® Grows and Evolves.mp4 18.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 07 - Web Application Hacking/7.1 Web Server Attack Methodology.mp4 18.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/004 Unescaping HTML Entities.mp4 18.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/011 Building Confidence.mp4 18.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Module 4 - Conclusion/4.1 Conclusion.mp4 18.0 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 17 Managing Linux Server Roles/005. 17.4 Understanding Self-Signed Certificate Creation.mp4 18.0 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/04_collaboration/01_pull-requests/01_intro-to-module-4-collaboration.mp4 18.0 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/02_basic-python-syntax/01_expressions-and-variables/01_basic-python-syntax-introduction.mp4 18.0 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/03_working-with-remotes/02_using-a-remote-repository/03_fetching-new-changes.mp4 18.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 2 - Collection/2.3 External Data Sources.mp4 18.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 02 - Introduction to Ethical Hacking/2.4 Introduction to the Cyber Kill Chain.mp4 18.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/04. Social Engineering/Module 1 - Introduction/1.3 Introduction to Social Engineering Part 2.mp4 18.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 3/3.4 Discovering XSS.mp4 18.0 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/03_loops/03_recursion-optional/02_recursion-in-action-in-the-it-context.mp4 18.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Module 2 - Benefits of Using ATT&CK®/2.4 ATT&CK® Navigator.mp4 18.0 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/4. Networking Services/5. Network Address Translation/2. NAT and the Transport Layer.mp4 18.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/06. Phishing/Module 1 - Recon/1.1 Introduction.mp4 18.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 2/2.4 Spidering.mp4 18.0 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/6. Troubleshooting/1. Troubleshooting Best Practices/5. Start with the Quikest Step First.mp4 17.9 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/3. The 3 A's of Cybersecurity - Authentication, Authorization, Accounting/3. Accounting/2. Rob Important Skills in Security - Google - Coursera.mp4 17.9 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/04_threat-modeling/1. A proactive approach to security.mp4 17.9 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/5. Process Management/2. Managing Processes/5. Windows- Managing Processes - Google - Coursera.mp4 17.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 01 - Computer Forensics Today/1.2 Computer Forensics Today Part 1.mp4 17.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.24 Payment Terms Part 2.mp4 17.9 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/01_security-domains/03_navigate-threats-risks-and-vulnerabilities/1. Threats, risks, and vulnerabilities.mp4 17.9 MB
  • Protocol Deep Dive/IPsec - Deep Dive/05 - Securing the Network with IKEv1/21 - IKEv1 Aggressive Mode.mp4 17.9 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/5. Process Management/3. Process Utilization/1. Windows- Resource Monitoring - Google - Coursera.mp4 17.8 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/04_managing-data-and-processes/01_data-streams/04_environment-variables.mp4 17.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/24 - Day 24 - Intermediate - Files, Directories and Paths/006 Introducing the Mail Merge Challenge.mp4 17.8 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/6. Troubleshooting/4. Going through a Technical Interview/4. What to Expect During the Technical Interview.mp4 17.8 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/3. Communicate effectively to influence stakeholders/02_communicate-for-impact/2. Building blocks of cybersecurity communications.mp4 17.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/22 - Day 22 - Intermediate - Build Pong The Famous Arcade Game/008 How to Detect when the Ball goes Out of Bounds.mp4 17.8 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/1. What is System Administration/4. Applying Changes/4. Fixing Things the Right Way - Google - Coursera.mp4 17.8 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/02_security-frameworks-and-controls/04_owasp-principles-and-security-audits/5. Complete a security audit.mp4 17.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 1 - Introduction/1.2 What is Splunk.mp4 17.8 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/01_strings/05_creating-new-strings.mp4 17.8 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/2. Users and Permissions/2. Permissions/5. Windows- Special Permissions - Google - Coursera.mp4 17.8 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/10. Progress Reports_ Keeping Supervisors Informed About a Project/10.2 Developing a Progress Report.mp4 17.8 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/1. Introduction to asset security/02_introduction-to-assets/4. Tri - Life in asset security.mp4 17.8 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 7 Configuring Logging/005. 7.4 Working with systemd-journald.mp4 17.8 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/1. Protect data and communicate incidents/02_event-and-incident-detection/2. Security as a mindse.mp4 17.8 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/04_managing-resources/05_course-wrap-up/01_congratulations.mp4 17.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.8 Hashing for Integrity.mp4 17.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Module 3 - Defense in Depth Using the Cyber Kill Chain/3.1 Defense in Depth.mp4 17.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 3 - Dynamic Analysis Part 1/3.1 Dynamic Analysis Part 1.1.mp4 17.7 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/03_regular-expressions/03_advanced-regular-expressions/01_capturing-groups.mp4 17.7 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/03_network-hardening/1. Network hardening practices.mp4 17.7 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/1. Introduction to asset security/02_introduction-to-assets/5. Security starts with asset classification.mp4 17.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.13 Local Variables.mp4 17.7 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 2 Cloud Data Security/Lesson 4 Cloud Data Security/006. 4.5 Data Discovery.mp4 17.7 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/1. Protect data and communicate incidents/01_get-started-with-the-course/3. Dion - My personal career journey.mp4 17.7 MB
  • Protocol Deep Dive/SNMP - Deep Dive/04 - Configuring SNMP/12 - 0404 Configuring SNMPv3 On Cisco IOS.mp4 17.7 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/1. Introduction to IT/3. Digital Logic/2. Character Encoding.mp4 17.6 MB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/3. Protect against threats, risks, and vulnerabilities/01_frameworks-and-controls/5. Heather - Protect sensitive data and information.mp4 17.6 MB
  • Protocol Deep Dive/IPsec - Deep Dive/Exercise Files/04/demos/Module 4/Mod 4 RA VPN PCAP.pcapng 17.6 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/2. Network operations/02_system-identification/1. Firewalls and network security measures.mp4 17.6 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 17 Billing Support Resources/006. 17.5 Budgets.mp4 17.6 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/02_using-git-locally/01_advanced-git-interaction/01_intro-to-module-2-using-git-locally.mp4 17.6 MB
  • Protocol Deep Dive/ARP - Deep Dive/02 Address Resolution Protocol Fundamentals/05 Demo - Ubuntu Linux and ARP.mp4 17.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 06 - Network and Perimeter Hacking/6.2 Sniffing Attacks.mp4 17.6 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/01_hello-python/02_introduction-to-programming/02_what-is-programming.mp4 17.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.9 Defense Evasion Case Study.mp4 17.6 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.9 Defense Evasion Case Study.mp4 17.6 MB
  • CompTIA/CompTIA Data+ (DA0-001)/18. Compare Visualizations/1. Introduction .mp4 17.6 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 4 Cloud Economics/003. 4.2 CapEx vs OpEx.mp4 17.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 1 - Pre-Engagement Interactions/1.31 Module 1 Summary.mp4 17.6 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/3. Linux commands in the Bash shell/03_authenticate-and-authorize-users/1. File permissions and ownership.mp4 17.5 MB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 07 - Rules of Evidence and Procedure/7.1 Federal Rule of Evidence 702.mp4 17.5 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 13 Networking and Database/006. 13.5 VPN and AWS Direct Connect.mp4 17.5 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/3. File & Text Manipulation/1. Windows- Display File Contents - Google - Coursera.mp4 17.5 MB
  • CompTIA/CompTIA Data+ (DA0-001)/16. Explain Business Requirements and Reports/1. Introduction .mp4 17.5 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/02_security-frameworks-and-controls/04_owasp-principles-and-security-audits/4. Plan a security audit.mp4 17.5 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/03_dictionaries/01_what-is-a-dictionary.mp4 17.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 3/3.3 Discovering XSS.mp4 17.5 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 6 AWS Shared Responsibility Model/004. 6.3 AWS Responsibility.mp4 17.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 2 - Security Architecture/2.4 Integrating Software Applications Part 1.mp4 17.5 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 1 Describe Cloud Concepts/Lesson 1 Describe cloud computing/004. 1.3 Define cloud models.mp4 17.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 05 - System Hacking/5.12 Detecting Malware.mp4 17.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.4 Scanning with XMAS Scan Part 1.mp4 17.4 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/3. Operating System/2. Installing an Operating System/8. Introduction to Qwiklabs.mp4 17.4 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/07_final-project/01_getting-ready-for-the-final-project/02_writing-a-script-from-the-ground-up.mp4 17.4 MB
  • Protocol Deep Dive/SSH and Telnet - Deep Dive/02.The Secure Shell (SSH) Protocol/0202.Introduction to OpenSSH.mp4 17.4 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/05_testing-in-python/01_simple-tests/03_manual-testing-and-automated-testing.mp4 17.4 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/5. Process Management/1. Life of a Process/5. Jess Passions - Google - Coursera.mp4 17.3 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/11. Meeting Minutes/11.3 Analyzing Sample Meeting Minutes.mp4 17.3 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 13 Networking and Database/012. 13.11 Question Breakdown 2.mp4 17.3 MB
  • MITRE/Cybrary - MITRE ATT&CK Defender (MAD) Fundamentals/1. Understanding ATT&CK/1.2 Matricies-Platforms.mp4 17.3 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 11 Build and Implement a Physical and Logical Cloud Infrastructure/010. 11.9 Clustered Host Availability.mp4 17.3 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 13 Networking and Database/010. 13.9 DynamoDB.mp4 17.3 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/01_get-started-with-the-course/3. Ángel - My personal career journey.mp4 17.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.9 Initial Access Case Study.mp4 17.3 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.9 Initial Access Case Study.mp4 17.3 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/02_basic-python-syntax/03_conditionals/07_elif-statements.mp4 17.3 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 8 AWS Access Management/004. 8.3 AWS Root Account.mp4 17.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/17 - Day 17 - Intermediate - The Quiz Project & the Benefits of OOP/005 Quiz Project Part 1 Creating the Question Class.mp4 17.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 2 - Nmap Basics/2.8 Removing Nmap from Mac - NM.mp4 17.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 2 - Nmap Basics/2.8 Removing Nmap from Mac - NM.mp4 17.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/005 [Interactive Coding Exercise] Data Overlap.mp4 17.3 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/05_testing-in-python/02_unit-tests/04_additional-test-cases.mp4 17.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 3 - Threat Modeling/3.8 Finding Relevant News.mp4 17.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/008 Check the Answer.mp4 17.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 7 - Identity and Access Management/7.3 Single Sign-On Kerberos Part 1.mp4 17.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.16 Enter and Leave Example Conversion.mp4 17.2 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/02_basic-python-syntax/01_expressions-and-variables/04_variables.mp4 17.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 6 - Post-Exploitation/6.6 Pillaging Part 2.mp4 17.2 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/02_managing-files-with-python/02_managing-files-and-directories/01_working-with-files.mp4 17.2 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/03_introduction-to-cybersecurity-tools/01_security-information-and-event-management-siem-dashboards/5. Parisa - The parallels of accessibility and security.mp4 17.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.12 ARM Load and Store Multiple Examples.mp4 17.2 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/04_managing-resources/04_module-review/01_module-4-wrap-up-managing-resources.mp4 17.2 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 11 Build and Implement a Physical and Logical Cloud Infrastructure/003. 11.2 Installation and Configuration of Management Tools.mp4 17.2 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/01_strings/07_more-string-methods.mp4 17.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 14 - Forensic Reporting/14.1 Forensic Reporting.mp4 17.2 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/01_security-domains/03_navigate-threats-risks-and-vulnerabilities/4. NIST’s Risk Management Framework.mp4 17.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.19 Floating Point Comparison.mp4 17.1 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/01_hello-python/02_introduction-to-programming/01_the-beginning-of-your-programming-journey.mp4 17.1 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/01_find-and-prepare-for-a-job-in-cybersecurity/2. Find cybersecurity jobs.mp4 17.1 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/06_bash-scripting/03_advanced-bash-concepts/03_advanced-command-interaction.mp4 17.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/003 Type Error, Type Checking and Type Conversion.mp4 17.1 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/4. Developing Routine and Sensitive Memos/4.2 Developing Routine Memos.mp4 17.1 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 7 Next Steps/Lesson 18 Further Study/003. 18.2 Hands-on Learning.mp4 17.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 09 - Mobile Hacking/9.1 OWASP Top 10 for Mobile.mp4 17.0 MB
  • Protocol Deep Dive/QUIC - Deep Dive/04. Troubleshooting the QUIC Protocol/24. Demo-Troubleshooting QUIC Streams with Wireshark.mp4 17.0 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/2. Protect organizational assets/03_authentication-authorization-and-accounting/4. Why we audit user activity.mp4 17.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 4 - C Constructs and Interrupts/4.5 Structure Layout.mp4 17.0 MB
  • Protocol Deep Dive/SNMP - Deep Dive/05 - Monitoring Systems With SNMP/14 - Configuring The Windows Firewall For Network Management.mp4 17.0 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/02_lists/03_modifying-the-contents-of-a-list.mp4 17.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/06. Phishing/Module 1 - Recon/1.4 Recon-NG.mp4 17.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 2 - Data Types and Logic/2.3 For_Else - IP.mp4 17.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 6 - Attribution/6.1 Introduction to Attribution.mp4 17.0 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 5 Managing Partitions/004. 5.3 Managing MBR Primary Partitions with fdisk.mp4 17.0 MB
  • MITRE/Cybrary - MITRE ATT&CK Defender (MAD) Fundamentals/3. Operationalizing ATT&CK/3.2 Detection and Analysis.mp4 17.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 2 - Theory/2.4 Who Uses OSINT.mp4 17.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.10 Protocols of the TCPIP Suite Part 2.mp4 16.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/011 Introducing the NATO Alphabet Project.mp4 16.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 1 - Introduction/1.1 Welcome.mp4 16.9 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 6 AWS Shared Responsibility Model/005. 6.4 Question Breakdown 1.mp4 16.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.24 IT Block Assembly.mp4 16.9 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/3. File & Text Manipulation/5. Windows Powershell - Google - Coursera.mp4 16.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/002 Using the for loop with Python Lists.mp4 16.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/008 Don't forget to review occasionally.mp4 16.9 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/03_more-sql-filters/3. Filters with AND, OR, and NOT.mp4 16.9 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/05_object-oriented-programming-optional/01_object-oriented-programming-optional/02_what-is-object-oriented-programming-optional.mp4 16.9 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/3. Communicate effectively to influence stakeholders/03_visual-communication-using-a-dashboard/1. Visual storytelling in cybersecurity.mp4 16.9 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 7 Next Steps/Lesson 18 Further Study/004. 18.3 Sample Questions.mp4 16.9 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/3. Network Services/3. Network Support Services Revisited - Google - Coursera.mp4 16.8 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/1. Introduction to asset security/01_get-started-with-the-course/1. Introduction to Course 5.mp4 16.8 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 11 Build and Implement a Physical and Logical Cloud Infrastructure/009. 11.8 Patch Management and Infrastructure as Code (IaC).mp4 16.8 MB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/1. Welcome to the exciting world of cybersecurity/02_introduction-to-cybersecurity/4. Nikki - A day in the life of a security engineer.mp4 16.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 3 - Storing and Analyzing ATT&CK®-Mapped Data/3.1 Storing and Displaying ATT&CK®-Mapped Data.mp4 16.8 MB
  • MITRE/Cybrary - MITRE ATT&CK Cyber Threat Intelligence/3. Storing and Analyzing ATT&CK-Mapped Data/3.1 Storing and Displaing ATT&CK-Mapped Data.mp4 16.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/002 Python Primitive Data Types.mp4 16.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 5 - Campaign Analysis/5.2 Heatmap Analysis.mp4 16.8 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 19 Using Git for Version Control/010. Lesson 19 Lab Solution Using Git with Branches.mp4 16.8 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/02_managing-files-with-python/01_reading-and-writing-files/01_programming-with-files.mp4 16.8 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/1. Introduction to detection and incident response/02_the-incident-response-lifecycle/2. Introduction to the incident response lifecycle.mp4 16.8 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/1. What is System Administration/4. Applying Changes/3. Assessing Risk - Google - Coursera.mp4 16.8 MB
  • Protocol Deep Dive/OSPF - Deep Dive/05 - Introducing Multi-area OSPF (Hierarchy)/34 - Reviewing OSPF Building Blocks (Type 3).mp4 16.8 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/4. Filesystems/1. Filesystem Types/11. Windows- Disk Usage - Google - Coursera.mp4 16.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 02 - Introduction to Ethical Hacking/2.3 Introduction to Ethical Hacking.mp4 16.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.8 Push Example.mp4 16.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/50 - Day 50 - Intermediate+ Auto Tinder Swiping Bot/001 Day 50 Goals what you will make by the end of the day.mp4 16.7 MB
  • Protocol Deep Dive/SNMP - Deep Dive/05 - Monitoring Systems With SNMP/16 - Configuring A Windows Server In The NMS.mp4 16.7 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 4 Technology/Lesson 10 AWS Cloud Deployment and Operations/006. 10.5 Question Breakdown 2.mp4 16.7 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/1. Introduction to IT/3. Digital Logic/4. How to count in Binary.mp4 16.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 2 - Theory/2.5 The OSINT Cycle.mp4 16.7 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/05_testing-in-python/03_other-test-concepts/01_black-box-vs-white-box.mp4 16.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 03 - Footprinting and Reconnaissance/3.10 Banner Grabbing (Demo).mp4 16.7 MB
  • CompTIA/CompTIA Data+ (DA0-001)/20. Describe Data Quality Control Concepts/1. Introduction .mp4 16.7 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/02_deploying-puppet/01_deploying-puppet-locally/03_managing-resource-relationships.mp4 16.7 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/3. The 3 A's of Cybersecurity - Authentication, Authorization, Accounting/1. Authentication/9. Rob Path to IT - Google - Coursera.mp4 16.7 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 17 Billing Support Resources/004. 17.3 AWS Pricing Calculator and Pricing API.mp4 16.6 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 7 Cloud Security and Compliance Concepts/002. 7.1 Compliance Information.mp4 16.6 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/03_automation-in-the-cloud/01_cloud-computing/01_intro-to-module-3-automation-in-the-cloud.mp4 16.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 1 - Introduction/1.2 Introduction to the Intelligence Lifecycle.mp4 16.6 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/03_working-with-remotes/04_module-review/01_module-3-wrap-up-working-with-remotes.mp4 16.6 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/3. Package and Software Management/4. Device Software Management/1. Windows- Devices and Drivers - Google - Coursera.mp4 16.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 1 - Just the Basics/1.1 1.0.1 Course Introduction - IP.mp4 16.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/06. Phishing/Module 2 - Getting Organized/2.1 Common Phishing Techniques.mp4 16.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 6 - Post-Exploitation/6.3 Rules of Engagement - Post-Exploitation.mp4 16.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.3 Brute Forces.mp4 16.5 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.3 Brute Forces.mp4 16.5 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/03_regular-expressions/02_basic-regular-expressions/03_repetition-qualifiers.mp4 16.5 MB
  • Protocol Deep Dive/ARP - Deep Dive/05 Addressing ARP-related Security Risks/02 Broadcast Storms, Denial Of Service (DoS), and Storm Control.mp4 16.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 09 - Privilege Escalation/9.3 A Word on Privilege Escalation Enumeration Scripts.mp4 16.5 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/3. Interacting via Email/3.3 Top Ten Tips of Email Etiquette.mp4 16.5 MB
  • Job Tips/Writing a Tech Resume/2. Resume Content/2.1 Contact information.mp4 16.5 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/4. Networking/3. Impact of the Internet/5. Heather Adkins Keeping Hacker_s out.mp4 16.5 MB
  • MITRE/Cybrary - MITRE ATT&CK Defender (MAD) Fundamentals/3. Operationalizing ATT&CK/3.4 Assessment and Engineering.mp4 16.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 2/2.12 Exploiting SQLI.mp4 16.4 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/02_basic-python-syntax/03_conditionals/05_else-statements.mp4 16.4 MB
  • Protocol Deep Dive/NAT - Deep Dive/2.Identifying NAT Components/6.Cisco Static and Hide NAT.mp4 16.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/08. Password Cracking Tool Fundamentals/Module 1 - Password Cracking Tool Fundamentals/1.3 John the Ripper Demonstration.mp4 16.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 2 - Data Types and Logic/2.10 Lists (Deep-Dive) - IP.mp4 16.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.5 Supply Chain Compromise Part 2.mp4 16.4 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.5 Supply Chain Compromise Part 2.mp4 16.4 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/06_bash-scripting/03_advanced-bash-concepts/04_choosing-between-bash-and-python.mp4 16.4 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 3 AWS Cloud and Value Proposition/007. 3.6 Question Breakdown 2.mp4 16.4 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/4. Securing Your Networks/2. Wireless Security/3. Wireless Hardening - Google - Coursera.mp4 16.4 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/06_final-project/01_writing-a-script-from-the-ground-up/02_problem-statement.mp4 16.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Module 1 - Understanding ATT&CK®/1.4 Techniques and Sub-Techniques.mp4 16.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 05 - Anti-Forensics Techniques/5.2 Anti-Forensics Techniques Part 2.mp4 16.3 MB
  • Protocol Deep Dive/ARP - Deep Dive/03 Understanding InARP, GARP, RARP, and Proxy ARP/05 Demo - Gratuitous ARP .mp4 16.3 MB
  • Protocol Deep Dive/NAT - Deep Dive/4.Troubleshooting NAT/2.Debugging NAT.mp4 16.3 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 21 An Introduction to Containers/005. 21.4 Managing Container Images.mp4 16.3 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/02_using-git-locally/03_branching-and-merging/03_working-with-branches.mp4 16.3 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/2. Network monitoring and analysis/01_understand-network-traffic/5. Data exfiltration attacks.mp4 16.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 7 - Dissemination and Sharing/7.2 Tactical Intelligence.mp4 16.3 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/02_managing-files-with-python/01_reading-and-writing-files/04_writing-files.mp4 16.3 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 3 Describe Azure Management and Governance/Lesson 11 Describe monitoring tools/002. 11.1 Describe Azure Advisor.mp4 16.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 4 - Analysis/4.2 Analysis of Competing Hypothesis.mp4 16.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/20 - Day 20 - Intermediate - Build the Snake Game Part 1 Animation & Coordinates/001 Day 20 Goals what we will make by the end of the day.mp4 16.2 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/5. Defense in Depth/3. Case study the security model of chrome OS/1. The Security Principles of Chrome OS.mp4 16.2 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/03_regular-expressions/02_basic-regular-expressions/05_regular-expressions-in-action.mp4 16.2 MB
  • Protocol Deep Dive/OSPF - Deep Dive/03 - Forming Basic OSPF Relationships/14 - Inspecting the OSPF Packet - OSPF Database Descriptor Packet.mp4 16.2 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/02_managing-files-with-python/03_reading-and-writing-csv-files/04_reading-and-writing-csv-files-with-dictionaries.mp4 16.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 7 - Identity and Access Management/7.7 Network Access Control and Authentication Wrap-Up.mp4 16.2 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 3 AWS Cloud and Value Proposition/005. 3.4 Question Breakdown 1.mp4 16.2 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/07_final-project/01_getting-ready-for-the-final-project/03_project-problem-statement.mp4 16.2 MB
  • Books/CompTIA/Pentest+/lc-wiley.comptia.pentestplus.certification.for.dummies.2020.epub 16.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.5 File System Permission Weakness.mp4 16.2 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.5 File System Permission Weakness.mp4 16.2 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/4. Networking Services/2. Name Resolution/4. DNS and UDP.mp4 16.2 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/4. Engage with the cybersecurity community/01_reliable-sources-go-a-long-way/4. Victoria - Continue your learning journey.mp4 16.2 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 7 Cloud Security and Compliance Concepts/006. 7.5 Least Privilege Concepts and Strategies.mp4 16.2 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/04_managing-cloud-instances-at-scale/01_building-software-for-the-cloud/01_intro-to-module-4-managing-cloud-instances-at-scale.mp4 16.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 2 - Intelligence Gathering/2.12 Identity Protection Mechanisms.mp4 16.2 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 4 Basic Hardware Management/005. 4.4 Understanding systemd-udevd.mp4 16.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 2/2.9 Discovering SQLI.mp4 16.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 10 - Forensics with the Cloud/10.1 Forensics with the Cloud Part 1.mp4 16.1 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 5 Managing Partitions/013. Lesson 5 Lab Solution Managing Partitions.mp4 16.1 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/05_object-oriented-programming-optional/03_code-reuse/05_python-modules-optional.mp4 16.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 11 - Cloud Computing/11.1 Introduction to Cloud Environments.mp4 16.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/008 [Interactive Coding Exercise] Dictionary Comprehension 1.mp4 16.1 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/01_automating-with-configuration-management/02_introduction-to-automation-at-scale/01_intro-to-module-1-automating-with-configuration-management.mp4 16.1 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 20 Configuration Management/006. 20.5 Using Ansible Ad-hoc Commands.mp4 16.1 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 20 Configuration Management/009. Lesson 20 Lab Solution Using Configuration Management.mp4 16.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 5 - Campaign Analysis/5.5 Threat Intelligence Naming Conventions.mp4 16.1 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/2. The Network Layer/2. The Networking Layer/4. IP Address Classes.mp4 16.1 MB
  • Splunk Training/6. Architecture 101/1. Introduction.mp4 16.1 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 2 Cloud Data Security/Lesson 4 Cloud Data Security/003. 4.2 Data Obfuscation.mp4 16.1 MB
  • Protocol Deep Dive/QUIC - Deep Dive/03. Analyzing QUIC with Wireshark/16. Demo-Analyzing QUIC Connections in Wireshark.mp4 16.0 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/2. Users and Permissions/1. Users and Groups/3. Windows- View User and Group Information using CLI - Google - Coursera.mp4 16.0 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/01_introduction-to-version-control/02_before-version-control/02_keeping-historical-copies.mp4 16.0 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/4. Engage with the cybersecurity community/01_reliable-sources-go-a-long-way/2. Helpful cybersecurity resources.mp4 16.0 MB
  • CompTIA/CompTIA Data+ (DA0-001)/21. Identify Data Security Concepts/1. Introduction .mp4 16.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.9 Wireless Security Part 2.mp4 16.0 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/4. Python in practice/02_work-with-files-in-python/4. Develop a parsing algorithm in Python.mp4 16.0 MB
  • Protocol Deep Dive/SNMP - Deep Dive/03 - Managing Devices With SNMP/08 - Gathering SNMP Data From Devices.mp4 16.0 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/04_managing-data-and-processes/01_data-streams/03_standard-streams.mp4 16.0 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 14 Technology Support Resources/005. 14.4 Question Breakdown 1.mp4 15.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 07 - Web Application Hacking/7.5 Introduction to SQL Injection Attacks.mp4 15.9 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/1. Introduction to detection and incident response/03_incident-response-operations/2. Fatima - The importance of communication during incident response.mp4 15.9 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/5. Managing System Systems/1. What do Services Look Like in Action - Google - Coursera.mp4 15.9 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 13 Configuring a Firewall/004. 13.3 Managing ufw Firewalling.mp4 15.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 4 - Vulnerability Analysis/4.4 Passive Testing.mp4 15.9 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/02_security-frameworks-and-controls/03_nist-frameworks/2. Explore the five functions of the NIST Cybersecurity Framework.mp4 15.9 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/2. The Network Layer/2. The Networking Layer/2. IP Addresses.mp4 15.9 MB
  • Protocol Deep Dive/QUIC - Deep Dive/02. An Introduction to QUIC/09. Demo-Hands-On with QUIC in Wireshark - Part 2.mp4 15.9 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/3. Communicate effectively to influence stakeholders/01_understand-your-stakeholders/2. Stakeholders in cybersecurity.mp4 15.9 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 5 Cloud Infrastructure and Platform Components/006. 5.5 Cloud Virtualization Resources.mp4 15.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.20 Thumb Mode.mp4 15.9 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 4 Cloud Economics/008. 4.7 Question Breakdown 2.mp4 15.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 06 - Network and Perimeter Hacking/6.10 Introduction to Session Hijacking.mp4 15.8 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/5. Connecting to the Internet/5. Wireless Networking/2. Wireless Network Configurations.mp4 15.8 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/9. Investigative Reports_ Communicating Different Options/9.3 Analyzing a Sample Investigative Report.mp4 15.8 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 4 Basic Hardware Management/004. 4.3 Managing Kernel Modules.mp4 15.8 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/05_object-oriented-programming-optional/02_classes-and-methods-optional/03_constructors-and-other-special-methods-optional.mp4 15.8 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/4. Filesystems/1. Filesystem Types/7. Windows- Swap - Google - Coursera.mp4 15.8 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 3 AWS Cloud and Value Proposition/004. 3.3 Cloud Value Proposition Part 2.mp4 15.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.6 Scheduled Task.mp4 15.7 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.6 Scheduled Task.mp4 15.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 1 - About the Exam and Certification/1.2 CASP+ Overview.mp4 15.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 08 - Discovery/8.3 Browser Bookmark Discovery.mp4 15.7 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 08 - Discovery/8.3 Browser Bookmark Discovery.mp4 15.7 MB
  • Job Tips/Writing a Tech Resume/3. Content Tips and Tricks/3.1 The importance of word choice.mp4 15.7 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/05_object-oriented-programming-optional/01_object-oriented-programming-optional/04_classes-and-objects-in-python-optional.mp4 15.7 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/1. Introduction to IT/4. Computer Architecture Layer/3. Kevin Advice.mp4 15.7 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/02_using-git-locally/03_branching-and-merging/04_merging.mp4 15.6 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/1. Introduction to IT/3. Digital Logic/3. Binary.mp4 15.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 2/2.5 Spidering.mp4 15.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 6 - Attribution/6.2 Cognitive Biases.mp4 15.6 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/01_strings/09_formatting-strings.mp4 15.6 MB
  • Job Tips/Writing a Tech Resume/2. Resume Content/2.4 Relevant skills.mp4 15.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/001 Day 48 Goals what you will make by the end of the day.mp4 15.6 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 21 An Introduction to Containers/007. 21.6 Running a Container in Kubernetes.mp4 15.6 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 2 Cloud Data Security/Lesson 3 The Cloud Data Lifecycle/002. 3.1 Phase 1 Create.mp4 15.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/001 Describe the Problem.mp4 15.5 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/05_testing-in-python/02_unit-tests/03_edge-cases.mp4 15.5 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/1. Introduction to Networking/4. The Physical Layer/3. Network Ports and Patch Panels.mp4 15.5 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 7 Cloud Security and Compliance Concepts/005. 7.4 Auditing and Reporting.mp4 15.5 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/03_automation-in-the-cloud/04_module-review/01_module-3-wrap-up-automation-in-the-cloud.mp4 15.5 MB
  • Protocol Deep Dive/DNS - Deep Dive/05. Troubleshooting DNS/18. Demo-Isolating Cause of Inability to Browse Internet.mp4 15.5 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/02_sql-queries/4. Basic filters on SQL queries.mp4 15.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 4/4.4 LFI & RFI Lab.mp4 15.5 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/05_testing-in-python/02_unit-tests/01_unit-tests.mp4 15.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 04 - Scanning and Enumeration/4.9 DNS Enumeration (Demo).mp4 15.5 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/02_security-frameworks-and-controls/02_the-cia-triad-confidentiality-integrity-and-availability/1. Explore the CIA triad.mp4 15.5 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 9 Managing the Boot Procedure/010. 9.9 Understanding System V Init Legacy Boot.mp4 15.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Module 2 - Benefits of Using ATT&CK®/2.1 Community Perspective.mp4 15.5 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 11 Managing User Interfaces/007. 11.6 Configuring Console Redirection.mp4 15.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 12 - Exploit Development/12.3 Exploit Development (part 3) Stack Frame for Function.mp4 15.4 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/5. Process Management/1. Life of a Process/2. Programs vs Processes Revisited - Google - Coursera.mp4 15.4 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/1. Introduction to IT/3. Digital Logic/1. Computer Language.mp4 15.4 MB
  • Job Tips/Writing a Tech Resume/7. Having a Professinoal Online Presence/7.1 LinkedIn.mp4 15.4 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/3. Network Services/4. DNS - Google - Coursera.mp4 15.4 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/03_introduction-to-cybersecurity-tools/02_explore-security-information-and-event-management-siem-tools/1. Explore common SIEM tools.mp4 15.4 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 1 Exam Foundation/Lesson 2 Exam Registration and Exam Strategies/005. 2.4 Online Proctoring Strategies.mp4 15.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 2 - Data Types and Logic/2.2 If_Elif_Else - IP.mp4 15.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.7 Sudo.mp4 15.4 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.7 Sudo.mp4 15.4 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/4. Engage with the cybersecurity community/02_build-your-cybersecurity-network/1. Engage with the cybersecurity community in a meaningful way.mp4 15.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 2 - Theory/2.6 OSINT Ethics and Moral Dilemmas.mp4 15.4 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/02_overview-of-intrusion-detection-systems-ids/1. Security monitoring with detection tools.mp4 15.4 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/3. Linux commands in the Bash shell/03_authenticate-and-authorize-users/4. Add and delete users.mp4 15.4 MB
  • Protocol Deep Dive/NAT - Deep Dive/3.NAT Setup and Analysis/4.NAT as Seen through a Protocol Analyzer.mp4 15.4 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 6 Legal, Risk, and Compliance/Lesson 13 Legal Requirements, Privacy Issues, and Risk Management in the Cloud/003. 13.2 eDiscovery and Forensics.mp4 15.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 11 - Malware/11.3 Malware Part 3 (FI).mp4 15.3 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/3. Software and Platform Services/2. File Services/1. What are file services- - Google - Coursera.mp4 15.3 MB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/3. Protect against threats, risks, and vulnerabilities/02_ethics-in-cybersecurity/3. Holly - The importance of ethics as a cybersecurity professional.mp4 15.3 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 12 Troubleshooting Linux Issues/006. 12.5 Troubleshooting Linux Memory.mp4 15.3 MB
  • Books/CompTIA/Pentest+/lc-wiley.comptia.pentestplus.certification.for.dummies.2022.epub 15.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/13. Intro to PowerShell Scripting/Module 1 - Intro to PowerShell Scripting/1.10 Common Commands Part 3.mp4 15.3 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 15 Managing Secure Access Control/005. Lesson 15 Lab Solution Configuring PAM.mp4 15.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Module 1 - Understanding ATT&CK®/1.7 Groups and Software.mp4 15.3 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/2. Protect organizational assets/01_safeguard-information/5. Heather - The importance of protecting PII.mp4 15.3 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 13 Networking and Database/011. 13.10 Redshift.mp4 15.2 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/2. Pelcgbybtl (Cryptology)/1. Symmetric Encryption/4. Rob What a Security Engineer Does - Google - Coursera.mp4 15.2 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/5. Process Management/2. Managing Processes/1. Windows- Reading Process Information - Google - Coursera.mp4 15.2 MB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/1. Welcome to the exciting world of cybersecurity/02_introduction-to-cybersecurity/3. Responsibilities of an entry-level cybersecurity analyst.mp4 15.2 MB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/4. Cybersecurity tools and programming languages/02_core-cybersecurity-knowledge-and-skills/1. Introduction to Linux, SQL, and Python.mp4 15.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/005 Mathematical Operations in Python.mp4 15.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 5 - Network Connectivity Devices/5.8 Firewall Best Practices.mp4 15.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 5 - Network Connectivity Devices/5.3 Switch and VLAN Configuration Part 1.mp4 15.2 MB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/3. Protect against threats, risks, and vulnerabilities/01_frameworks-and-controls/1. Welcome to week 3.mp4 15.2 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/5. Data Recovery & Backups/1. Planning for Data Recovery/7. User Backups - Google - Coursera.mp4 15.2 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/1. Introduction to detection and incident response/04_incident-response-tools/5. Alert and event management with SIEM and SOAR tools.mp4 15.2 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 16 Multiple Account Strategies/005. 16.4 Question Breakdown 1.mp4 15.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.16 OWASP IoT and Wrap-Up.mp4 15.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/27 - Day 27 - Intermediate - Tkinter, args, kwargs and Creating GUI Programs/005 args Many Positional Arguments.mp4 15.2 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/1. What is System Administration/3. Sytem Administration Tasks/5. Vendors - Google - Coursera.mp4 15.1 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/03_regular-expressions/02_basic-regular-expressions/04_escaping-characters.mp4 15.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Module 3 - Operationalizing ATT&CK®/3.3 Threat Emulation.mp4 15.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/002 How to break a Complex Problem down into a Flow Chart.mp4 15.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.12 Network Storage.mp4 15.1 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/1. What is System Administration/3. Sytem Administration Tasks/8. Dion Michelle Obama Story - Google - Coursera.mp4 15.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/008 Challenge 3 Solution - How to Check if the Player Won.mp4 15.1 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/06_final-project/01_writing-a-script-from-the-ground-up/05_writing-the-script.mp4 15.1 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/03_regular-expressions/03_advanced-regular-expressions/02_more-on-repetition-qualifiers.mp4 15.0 MB
  • MITRE/Cybrary - MITRE ATT&CK Defender (MAD) Fundamentals/3. Operationalizing ATT&CK/3.1 Cyber Threat Intelligence.mp4 15.0 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/03_regular-expressions/01_regular-expressions/02_what-are-regular-expressions.mp4 15.0 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/06_bash-scripting/01_interacting-with-the-command-line-shell/01_intro-to-module-6-bash-scripting.mp4 15.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 05 - Anti-Forensics Techniques/5.1 Anti-Forensics Techniques Part 1.mp4 15.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 02 - Introduction to Ethical Hacking/2.2 Information Security Threats and Attacks.mp4 15.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 7 - Identity and Access Management/7.6 Single Sign-On with Federated Services Part 2.mp4 15.0 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/02_lists/01_what-is-a-list.mp4 15.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 07 - Network Forensics/7.1 Network Forensics.mp4 15.0 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 13 Networking and Database/007. 13.6 Question Breakdown 1.mp4 14.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.3 Execution Through API.mp4 14.9 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.3 Execution Through API.mp4 14.9 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/6. Creating a Company Culture for Security/2. Users/4. Alex Grit Story - Google - Coursera.mp4 14.9 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 10 Managing File Compression and Backup/004. 10.3 Managing Clones with dd.mp4 14.9 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/05_testing-in-python/04_errors-and-exceptions/01_the-try-except-construct.mp4 14.9 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 3 Managing Services/008. 3.7 Managing Systemd Sockets.mp4 14.9 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 3 AWS Cloud and Value Proposition/003. 3.2 Cloud Value Proposition Part 1.mp4 14.9 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 6 Data Center Design and Risk Analysis/007. 6.6 Cloud Vulnerabilities, Threats, and Attacks.mp4 14.9 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/1. Introduction to IT/1. Introduction to IT Support/4. Course Introduction.mp4 14.9 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 1 Exam Foundation/Lesson 2 Exam Registration and Exam Strategies/007. 2.6 Exam Answer Strategies.mp4 14.9 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/3. Operating System/1. What_s an Operating System/4. Process Management.mp4 14.8 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/03_response-and-recovery/2. Robin - Foster cross-team collaboration.mp4 14.8 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/2. Basic Commands/18. Cindy Why OS is Important - Google - Coursera.mp4 14.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/23 - Day 23 - Intermediate - The Turtle Crossing Capstone Project/009 Solution to Step 6 - Detect when the Player has reached the other side.mp4 14.8 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 4 Technology/Lesson 11 AWS Global Infrastructure/002. 11.1 Data Centers.mp4 14.8 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/3. LDAP/1. What is LDAP- - Google - Coursera.mp4 14.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.3 Elevation Escalation with Prompt.mp4 14.8 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.3 Elevation Escalation with Prompt.mp4 14.8 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/02_security-frameworks-and-controls/01_more-about-frameworks-and-controls/3. Controls.mp4 14.8 MB
  • CompTIA/CompTIA Data+ (DA0-001)/4. Explain Data Storage/1. Introduction .mp4 14.8 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/04_threat-modeling/2. Chantelle - The value of diversity in cybersecurity.mp4 14.8 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 7 Cloud Security and Compliance Concepts/004. 7.3 Question Breakdown 1.mp4 14.8 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/2. Users and Permissions/1. Users and Groups/2. Windows- View User and Group Information - Google - Coursera.mp4 14.8 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/1. Introduction to operating systems/04_the-user-interface/1. GUI versus CLI.mp4 14.8 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 6 Legal, Risk, and Compliance/Lesson 13 Legal Requirements, Privacy Issues, and Risk Management in the Cloud/007. 13.6 Risk Treatment.mp4 14.8 MB
  • Splunk Training/2. Splunk Fundamentals 2/15. Tags and Event Types.mp4 14.8 MB
  • Protocol Deep Dive/SNMP - Deep Dive/04 - Configuring SNMP/10 - 0402 Configuring SNMPv2 And V3 On Linux.mp4 14.8 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/06_final-project/02_final-project/01_in-margas-words-developing-an-inclusive-curriculum.mp4 14.7 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/1. Understanding Security Threats/4. Other Attacks/1. Client-Side Attacks - Google - Coursera.mp4 14.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/55 - Day 55 - Intermediate+ HTML & URL Parsing in Flask and the Higher Lower Game/004 Challenge Use Python Decorators to Style HTML Tags.mp4 14.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Module 5 - Advanced Command Line Techniques/5.6 Conclusion.mp4 14.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 06 - Operating System Forensics/6.3 Operating System Forensics Part 3 (FI).mp4 14.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 08 - Web Attack Investigation/8.3 Web Attack Investigation Part 3.mp4 14.7 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 4 Cloud Economics/006. 4.5 Cloud Cost Benefits Part 1.mp4 14.7 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 16 Managing SELinux and AppArmor/008. 16.7 Managing SELinux Booleans.mp4 14.7 MB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 02 - Forensic Concept Review/2.1 Evidence Identification.mp4 14.7 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/02_basic-python-syntax/02_functions/03_returning-values.mp4 14.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/006 [Interactive Coding Exercise] Adding Even Numbers.mp4 14.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 04 - Data Acquisition/4.2 Data Acquisition Part 2.mp4 14.7 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/05_object-oriented-programming-optional/02_classes-and-methods-optional/01_instance-methods-optional.mp4 14.7 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/07.Troubleshooting and Securing IGMP and MLD/0703.Analysis Successful Multicast Traceroute Request.mp4 14.7 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/02_the-cybersecurity-job-interview-process/1. Explore the interview process.mp4 14.7 MB
  • Protocol Deep Dive/SSH and Telnet - Deep Dive/02.The Secure Shell (SSH) Protocol/0205.Common SSH Failure Scenarios.mp4 14.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Module 2 - Identifying Web Attacks Through Logs/2.7 CSRF - Cross Site Request Forgery.mp4 14.7 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 8 Managing and Monitoring Performance/006. 8.5 Tuning Kernel Parameters.mp4 14.7 MB
  • Books/CompTIA/Security+/Stewart J. CompTIA Security+ Review Guide. Exam SY0-601 5ed 2021.pdf 14.7 MB
  • Cybrary/Cybrary - Become an Incident Handler/11. Evasion for Incident Handlers/Module 1 - Evasion for Incident Handlers/1.1 Evasion.mp4 14.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 2 - Data Types and Logic/2.8 Strings (Deep-Dive) Part 2 - IP.mp4 14.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/005 Squash bugs with a print() Statement.mp4 14.6 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 4 Describe the core architectural components of Azure/002. 4.1 Define Azure regions, region pairs, and sovereign regions.mp4 14.6 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/04_develop-an-elevator-pitch/4. Emily - Overcome imposter syndrome.mp4 14.6 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/05_testing-in-python/03_other-test-concepts/03_test-driven-development.mp4 14.6 MB
  • Protocol Deep Dive/DNS - Deep Dive/04. Modifying DNS Configuration for Servers/16. Adding Subdomains including Demo.mp4 14.6 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/04.New Multicast Designs with IGMPv3/0403.Analysis IGMPv3 Membership Query and Report.mp4 14.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 04 - Understanding Network Protocols/4.13 FTP Enumeration.mp4 14.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 5 - Campaign Analysis/5.3 Visual Analysis.mp4 14.6 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/03_automation-in-the-cloud/02_managing-instances-in-the-cloud/02_creating-a-new-vm-using-the-gcp-web-ui.mp4 14.6 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/1. Introduction to asset security/01_get-started-with-the-course/4. Da'Queshia - My path to cybersecurity.mp4 14.6 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/1. Introduction to detection and incident response/01_get-started-with-the-course/4. Dave - Grow your cybersecurity career with mentors.mp4 14.6 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/2. Network monitoring and analysis/01_understand-network-traffic/2. Casey - Apply soft skills in cybersecurity.mp4 14.6 MB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/2. The evolution of cybersecurity/01_the-history-of-cybersecurity/5. Sean - Keep your cool during a data breach.mp4 14.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.8 Security Principles - Confidentiality.mp4 14.5 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 6 Managing File Systems/003. 6.2 Automating File System Mounts through etcfstab.mp4 14.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.6 Fault Management.mp4 14.5 MB
  • CompTIA/CompTIA Data+ (DA0-001)/11. Describe Measures of Dispersion/1. Introduction .mp4 14.5 MB
  • Protocol Deep Dive/OSPF - Deep Dive/06 - Troubleshooting Common OSPF Issues/44 - Troubleshooting Common OSPF Issues - Mismatched Timers.mp4 14.5 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/2. Write effective Python code/01_introduction-to-functions/2. Introduction to functions.mp4 14.5 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/06_bash-scripting/02_bash-scripting/01_creating-bash-scripts.mp4 14.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/013 The Benefits of Daily Practice.mp4 14.5 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/04_managing-data-and-processes/03_processing-log-files/02_filtering-log-files-with-regular-expressions.mp4 14.5 MB
  • Job Tips/Writing a Tech Resume/5. Design Dos and Don'ts/5.2 Color.mp4 14.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.6 Risk Mitigation.mp4 14.5 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/02 - Starting at the Beginning - FTP Active Mode/06 - Analysis - Active FTP Control Session Setup.mp4 14.5 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/03_loops/02_for-loops/06_common-errors-in-for-loops.mp4 14.4 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/5. Defense in Depth/3. Case study the security model of chrome OS/3. Chrome OS Data Encryption - Google - Coursera.mp4 14.4 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 15 EC2 Pricing Models/006. 15.5 Question Breakdown 1.mp4 14.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 3/3.5 Discovering XSS.mp4 14.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.3 Compile After Delivery.mp4 14.4 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.3 Compile After Delivery.mp4 14.4 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/06_final-project/01_writing-a-script-from-the-ground-up/04_planning.mp4 14.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 6 - Post-Exploitation/6.7 High Value or Profile Targets.mp4 14.4 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 4 Basic Hardware Management/006. 4.5 Managing Udev Rules.mp4 14.4 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/2. The Network Layer/2. The Networking Layer/6. Sergio Path.mp4 14.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 03 - Footprinting and Reconnaissance/3.12 Footprinting Countermeasures.mp4 14.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 10 - IoT and OT Hacking/10.5 OT Concepts.mp4 14.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 2 - Collection/2.2 Internal Data Acquisition.mp4 14.4 MB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 02 - Forensic Concept Review/2.4 Chain of Custody.mp4 14.4 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 6 AWS Shared Responsibility Model/002. 6.1 Shared Responsibility Model Purpose.mp4 14.4 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/2. The Network Layer/3. Subnetting/1. Subnetting.mp4 14.4 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/01_introduction-to-sql-and-databases/5. Adedayo - SQL in cybersecurity.mp4 14.4 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/2. Write effective Python code/02_work-with-functions/2. Return statements.mp4 14.4 MB
  • Splunk Training/2. Splunk Fundamentals 2/1. Macros Overview.mp4 14.4 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/02_managing-files-with-python/03_reading-and-writing-csv-files/01_what-is-a-csv-file.mp4 14.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.21 Forensic Investigations.mp4 14.3 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/1. Introduction to Networking/3. The Basics of Networking Devices/4. Servers and Clients.mp4 14.3 MB
  • Protocol Deep Dive/OSPF - Deep Dive/03 - Forming Basic OSPF Relationships/17 - Inspecting the OSPF Packet - OSPF Link State Acknowledgment Packet.mp4 14.3 MB
  • CompTIA/CompTIA Data+ (DA0-001)/7. Manipulate Data/1. Introduction .mp4 14.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 06 - Network and Perimeter Hacking/6.14 Gaining Remote Access (Demo).mp4 14.3 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/4. Networking/1. What is Networking/4. Language of the Internet.mp4 14.3 MB
  • Books/CompTIA/Security+/CompTIA Security+ All-in-One Exam Guide, Sixth Edition (1).pdf 14.3 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/2. Network monitoring and analysis/02_capture-and-view-network-traffic/4. Reexamine the fields of a packet header.mp4 14.3 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 12 Operational Controls and Standards/005. 12.4 Service Level Management.mp4 14.3 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/02_the-cybersecurity-job-interview-process/6. Build rapport with interviewers.mp4 14.3 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/03_regular-expressions/02_basic-regular-expressions/01_simple-matching-in-python.mp4 14.3 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 14 Technology Support Resources/003. 14.2 AWS Support and Partner Network.mp4 14.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/008 Salting Passwords.mp4 14.2 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/3. Linux commands in the Bash shell/04_get-help-in-linux/1. Damar - My journey into Linux commands.mp4 14.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 3 - Metasploit/3.4 Metasploit (part 4) Auxiliary Module.mp4 14.2 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/4. Python in practice/03_debug-python-code/2. Apply debugging strategies.mp4 14.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/22 - Day 22 - Intermediate - Build Pong The Famous Arcade Game/007 How to Detect Collisions with the Paddle.mp4 14.2 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 3 Managing Services/011. Lesson 3 Lab Solution Managing Systemd Dependencies.mp4 14.2 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/4. Filesystems/1. Filesystem Types/3. Disk Anatomy - Google - Coursera.mp4 14.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Module 1 - Understanding ATT&CK®/1.2 Matrices or Platforms.mp4 14.2 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/4. Networking/3. Impact of the Internet/2. Internet of Things.mp4 14.2 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/3. Operating System/1. What_s an Operating System/8. Logs.mp4 14.2 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/2. Protect organizational assets/02_encryption-methods/5. Non-repudiation and hashing.mp4 14.2 MB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 11 - Course Review and Next Steps/11.1 Course Wrap-Up and Next Steps.mp4 14.1 MB
  • Protocol Deep Dive/EIGRP - Deep Dive/04 - Determining How Information Is Exchanged with EIGRP/13 - EIGRP Message-Packet Types.mp4 14.1 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/04_managing-resources/05_course-wrap-up/02_sneak-peek-of-next-course.mp4 14.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/001 Day 33 Goals what you will make by the end of the day.mp4 14.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.2 Network Connectivity.mp4 14.1 MB
  • Splunk Training/1. Splunk Fundamentals 1/19. Lookups Lecture.mp4 14.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/06. Phishing/Module 4 - Stopping Phishing Attacks/4.2 Conclusion.mp4 14.1 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/06.New Multicast Designs with MLDv2/0604.Analysis MLDv2 Membership Query and Report.mp4 14.1 MB
  • Splunk Training/1. Splunk Fundamentals 1/13. Transforming Commands.mp4 14.1 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/02_introduction-to-networks/5. Emmanuel - Useful skills for network security.mp4 14.1 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/05_object-oriented-programming-optional/02_classes-and-methods-optional/08_about-jupyter-notebooks-optional.mp4 14.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 12 - Cryptography/12.3 Cryptography Attacks and Countermeasures.mp4 14.1 MB
  • Protocol Deep Dive/SNMP - Deep Dive/04 - Configuring SNMP/11 - 0403 Configuring SNMPv2 On Cisco IOS.mp4 14.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 6 - Attribution/6.3 Logical Fallacies.mp4 14.1 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/03_loops/01_while-loops/05_why-initializing-variables-matters.mp4 14.1 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/02_basic-python-syntax/02_functions/01_defining-functions.mp4 14.1 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/01_incident-detection-and-verification/4. MK - Changes in the cybersecurity industry.mp4 14.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/003 Solution & Walkthrough for getting Trivia Questions.mp4 14.0 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/4. Networking Services/1. Introduction to Network Services/Introduction to Network Services.mp4 14.0 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 9 Software Assurance and Validation/002. 9.1 Functional vs. Non-functional Testing.mp4 14.0 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 15 EC2 Pricing Models/005. 15.4 Spot Instance Scenario.mp4 14.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 2 - Collection/2.10 Leveraging OSINT Part 2.mp4 14.0 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 9 Security Support Resources/004. 9.3 AWS Trusted Advisor.mp4 14.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 3 - ARM Architecture/3.10 Array Indexing Example.mp4 14.0 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/04_managing-cloud-instances-at-scale/04_module-review/01_module-4-wrap-up-managing-cloud-instances-at-scale.mp4 14.0 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 3 Describe Azure Management and Governance/Lesson 10 Describe features and tools for managing and deploying resources/005. 10.4 Describe Azure Resource Manager (ARM).mp4 14.0 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 5 Cloud Infrastructure and Platform Components/004. 5.3 Cloud Communications.mp4 14.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 6 - Traffic Capture/6.4 Traffic Capture (part 4) DNS.mp4 14.0 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/3. Software and Platform Services/1. Software Services/1. Module Introduction - Google - Coursera.mp4 14.0 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/6. Troubleshooting/1. Troubleshooting Best Practices/6. Troubleshooting Pitfalls to Avoid.mp4 14.0 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 5 Cloud Architecture Design Principles/006. 5.5 Question Breakdown 1.mp4 14.0 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/04_managing-data-and-processes/03_processing-log-files/03_making-sense-out-of-the-data.mp4 14.0 MB
  • Books/Cloud/9781801075930-AWS_CERTIFIED_CLOUD_PRACTITIONER_EXAM_GUIDE.pdf 13.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 11 - Cloud Computing/11.3 Benefits of Cloud Computing.mp4 13.9 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/01_strings/02_what-is-a-string.mp4 13.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 11 - Malware/11.1 Malware Part 1 (FI).mp4 13.9 MB
  • Protocol Deep Dive/ARP - Deep Dive/03 Understanding InARP, GARP, RARP, and Proxy ARP/04 Gratuitous ARP.mp4 13.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/40 - Day 40 - Intermediate+ Capstone Part 2 Flight Club/001 Day 40 Goals what you will make by the end of the day.mp4 13.9 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 6 Legal, Risk, and Compliance/Lesson 14 Cloud Audits, Methodologies, and Contracts/004. 14.3 Policies and Stakeholder Involvement.mp4 13.9 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/01_hello-python/04_hello-world/03_python-can-be-your-calculator.mp4 13.9 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 12 Troubleshooting Linux Issues/002. 12.1 Troubleshooting Networking.mp4 13.9 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/1. Introduction to Networking/3. The Basics of Networking Devices/2. Hubs and Switches.mp4 13.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.2 Clear Command History.mp4 13.9 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.2 Clear Command History.mp4 13.9 MB
  • Job Tips/Writing a Tech Resume/6. Should You Include/6.3 References.mp4 13.9 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/5. Managing System Systems/5. Configuring Services in Windows - Google - Coursera.mp4 13.9 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 5 Describe Azure compute and networking services/002. 5.1 Compare compute types.mp4 13.9 MB
  • Protocol Deep Dive/DNS - Deep Dive/06. Securing DNS/26. Demo-Filtering at the Server with Microsoft DNS Policy.mp4 13.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Module 3 - Operationalizing ATT&CK®/3.2 Detection and Analysis.mp4 13.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.5 Symmetric Cryptography.mp4 13.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 06 - Network and Perimeter Hacking/6.3 Sniffing Tools.mp4 13.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.19 Vulnerability Assessments and Penetration Tests.mp4 13.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 10 - IoT and OT Hacking/10.2 IoT Communication Models and Operating Systems.mp4 13.8 MB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 3 - Storing and Analyzing ATT&CK®-Mapped Data/3.1 Storing and Displaying ATT&CK®-Mapped Data.mp4 13.8 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/04_collaboration/05_course-wrap-up/02_sneak-peek-of-the-next-course.mp4 13.8 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/6. Operating Systems in Practice/5. Course Wrap Up/2. Heather Early Career Advice - Google - Coursera.mp4 13.8 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 8 AWS Access Management/003. 8.2 AWS Credentials and MFA.mp4 13.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 6 - Preparing for Your Exam/6.2 Study Strategies.mp4 13.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.15 Enter and Leave.mp4 13.8 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/1. Protect data and communicate incidents/01_get-started-with-the-course/1. Introduction to Course 8.mp4 13.8 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/5. Connecting to the Internet/4. WANs/2. Point-to-Point VPNs.mp4 13.8 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/3. Operating System/2. Installing an Operating System/2. Virtual Machines.mp4 13.8 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/02_create-and-use-documentation/2. Document evidence with chain of custody forms.mp4 13.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 6 - Post-Exploitation/6.8 Data Infiltration.mp4 13.7 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 5 Cloud Infrastructure and Platform Components/007. 5.6 Core Cloud Storage Components.mp4 13.7 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/6. Creating a Company Culture for Security/3. Incident Handling/4. Amir Interview - Google - Coursera.mp4 13.7 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 17 Billing Support Resources/005. 17.4 Free Tier and Free Tier Usage Dashboard.mp4 13.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/003 Raising your own Exceptions.mp4 13.7 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/3. Software and Platform Services/6. Managing Cloud Resources/2. Typical Cloud Infrastructure Setups - Google - Coursera.mp4 13.7 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/02 - Starting at the Beginning - FTP Active Mode/04 - Demo - Active FTP File Download.mp4 13.7 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/6. Troubleshooting/4. Going through a Technical Interview/7. Rob finding a great candidate.mp4 13.7 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/3. The 3 A's of Cybersecurity - Authentication, Authorization, Accounting/1. Authentication/5. RADIUS - Google - Coursera.mp4 13.7 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/6. Operating Systems in Practice/2. Virtualization/1. Virtual Machines - Google - Coursera.mp4 13.7 MB
  • Protocol Deep Dive/SNMP - Deep Dive/04 - Configuring SNMP/09 - 0401 Configuring SNMPv2 On Windows.mp4 13.7 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 3 Managing Services/006. 3.5 Understanding and Managing Unit Dependencies.mp4 13.6 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/04_develop-an-elevator-pitch/1. Develop an elevator pitch.mp4 13.6 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/02_create-and-use-documentation/4. The value of cybersecurity playbooks.mp4 13.6 MB
  • Job Tips/Writing a Tech Resume/2. Resume Content/2.3 Work experience.mp4 13.6 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/1. Introduction to Networking/3. The Basics of Networking Devices/5. Sergio Being A Network Engineer.mp4 13.6 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 3 AWS Cloud and Value Proposition/002. 3.1 AWS Cloud Definition.mp4 13.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Module 4/4.3 Managing Users (KL).mp4 13.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Module 4/4.3 Managing Users (KL).mp4 13.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 10 - Forensics with the Cloud/10.2 Forensics with the Cloud Part 2.mp4 13.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 03 - Footprinting and Reconnaissance/3.11 theHarvester (Demo).mp4 13.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 10 - IoT and OT Hacking/10.4 IoT Attack Countermeasures.mp4 13.5 MB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 07 - Rules of Evidence and Procedure/7.5 Work Product Doctrine.mp4 13.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 3 - Data Management and Processing/3.1 Introduction to Data Processing.mp4 13.5 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 18 An Introduction to Bash Shell Scripts/003. 18.2 Essential Shell Script Components.mp4 13.5 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/2. Escalate incidents/03_timing-is-everything/2. When and how to escalate a security incident.mp4 13.5 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 2 Cloud Data Security/Lesson 4 Cloud Data Security/005. 4.4 Keys, Secrets, and Certificate Management.mp4 13.5 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/1. Intro to IT Infrastructure Services/5. Heather First Tech Job - Google - Coursera.mp4 13.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 06 - Introduction to Buffer Overflow/6.1 How to Practice Buffer Overflows.mp4 13.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/006 The Secret Auction Program Instructions and Flow Chart.mp4 13.4 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/02_basic-python-syntax/03_conditionals/03_branching-with-if-statements.mp4 13.4 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/07_final-project/02_course-wrap-up/01_congratulations.mp4 13.4 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/3. Operating System/1. What_s an Operating System/Cindy Drive _ Career Path.mp4 13.4 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/02_overview-of-intrusion-detection-systems-ids/3. Components of a detection signature.mp4 13.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 05 - System Hacking/5.10 Malware - Types of Viruses.mp4 13.4 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 2 Cloud Data Security/Lesson 3 The Cloud Data Lifecycle/006. 3.5 Phase 5 Archive.mp4 13.4 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/1. Introduction to Networking/4. The Physical Layer/1. Moving Bits Across the Wire.mp4 13.4 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/5. Software/2. Interacting with Software/2. Installing, Updating and Removing Software on Windows.mp4 13.4 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/2. Network monitoring and analysis/01_understand-network-traffic/3. The importance of network traffic flows.mp4 13.4 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/01_overview-of-logs/2. The importance of logs.mp4 13.4 MB
  • Books/CompTIA/Security+/Marty M. Weiss - Pearson - CompTIA Security+ SY0-601 Exam Cram 6th Edition.epub 13.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 8 - Summary/8.1 Summary.mp4 13.4 MB
  • MITRE/Cybrary - MITRE ATT&CK Defender (MAD) Fundamentals/3. Operationalizing ATT&CK/3.5 Putting it all Together into Threat-Informed Defense.mp4 13.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.12 XSRF Race Conditions and Memory Issues.mp4 13.4 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 13 Networking and Database/008. 13.7 Database Service Summary.mp4 13.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/009 Calculator Finishing Touches and Bug Fixes.mp4 13.3 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 19 Using Git for Version Control/006. 19.5 Working with Branches.mp4 13.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/12 - Day 12 - Beginner - Scope & Number Guessing Game/007 Don't be too hard on yourself.mp4 13.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/22 - Day 22 - Intermediate - Build Pong The Famous Arcade Game/005 Write the Ball Class and Make the Ball Move.mp4 13.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 12 - Email Investigation/12.1 Email Investigation Part 1.mp4 13.3 MB
  • Protocol Deep Dive/QUIC - Deep Dive/03. Analyzing QUIC with Wireshark/18. Demo-Analyzing QUIC Packets vs. Frames.mp4 13.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 09 - Lateral Movement/9.2 Application Deployment Software.mp4 13.2 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 09 - Lateral Movement/9.2 Application Deployment Software.mp4 13.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 05 - System Hacking/5.3 Types of Password Attacks and Defenses.mp4 13.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Module 3 - Operationalizing ATT&CK®/3.4 Assessment and Engineering.mp4 13.2 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/03_regular-expressions/03_advanced-regular-expressions/03_extracting-a-pid-using-regexes-in-python.mp4 13.2 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/2. The Linux operating system/01_all-about-linux/2. Introduction to Linux.mp4 13.2 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/2. The Linux operating system/01_all-about-linux/3. Phil - Learn and grow in the cybersecurity field.mp4 13.2 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 9 Managing the Boot Procedure/009. 9.8 Managing Initramfs.mp4 13.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 7 - Dissemination and Sharing/7.3 Operational Intelligence.mp4 13.2 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/02_the-cybersecurity-job-interview-process/5. Conduct pre-interview research.mp4 13.2 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 6 Legal, Risk, and Compliance/Lesson 14 Cloud Audits, Methodologies, and Contracts/006. 14.5 The Impact of Distributed IT.mp4 13.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/010 How You Can Stay Motivated.mp4 13.1 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 12 Compute and Storage/007. 12.6 Question Breakdown 1.mp4 13.1 MB
  • Protocol Deep Dive/IPsec - Deep Dive/07 - Implementing IPsec in IPv6/33 - IPv6 IPsec Site-to-site Lab.mp4 13.1 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/2. The Network Layer/4. Routing/6. Alex Good Story.mp4 13.1 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 3 Describe Azure Management and Governance/001. Module introduction.mp4 13.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/29 - Day 29 - Intermediate - Building a Password Manager GUI App with Tkinter/003 Challenge 2 - Use grid() and columnspan to Complete the User Interface.mp4 13.1 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 5 Managing Partitions/006. 5.5 Managing GPT Partitions with parted.mp4 13.1 MB
  • Protocol Deep Dive/DNS - Deep Dive/02. Exploring DNS Terminology and Use Cases/04. Understanding DNS Terminology.mp4 13.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/013 Python Variables.mp4 13.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.6 Symmetric Ciphers Stream and Block.mp4 13.1 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/02_deploying-puppet/01_deploying-puppet-locally/01_intro-to-module-2-deploying-puppet.mp4 13.1 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 10 Managing File Compression and Backup/003. 10.2 Working with cpio.mp4 13.1 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/6. Troubleshooting/4. Going through a Technical Interview/1. Your Opportunity for Success.mp4 13.1 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/5. Software/2. Interacting with Software/4. Software Automation.mp4 13.0 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/1. Introduction to detection and incident response/03_incident-response-operations/1. Incident response teams.mp4 13.0 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/6. Creating a Company Culture for Security/3. Incident Handling/5. Ari Interview - Google - Coursera.mp4 13.0 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/3. Interacting via Email/3.2 The Structure and Features of Email.mp4 13.0 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/05_Resources/06_course-4-resources-and-citations/01__Linux-in-a-Nutshell-6th-Edition.pdf 13.0 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/1. Introduction to operating systems/04_the-user-interface/3. Ellen - My path into cybersecurity.mp4 13.0 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/3. Software and Platform Services/1. Software Services/6. Heather Managing Self Doubt - Google - Coursera.mp4 13.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 2 - Nmap Basics/2.7 Removing Nmap from Linux - NM.mp4 13.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 2 - Nmap Basics/2.7 Removing Nmap from Linux - NM.mp4 13.0 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/05_object-oriented-programming-optional/04_module-review/02_in-margas-words-my-favorite-course-optional.mp4 13.0 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/2. Basic Commands/10. Windows- Command History - Google - Coursera.mp4 13.0 MB
  • Job Tips/Writing a Tech Resume/3. Content Tips and Tricks/3.2 State your impact.mp4 13.0 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/02_lists/05_lists-and-tuples.mp4 13.0 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 9 Security Support Resources/005. 9.4 Question Breakdown 1.mp4 13.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 11 - Cloud Computing/11.2 Cloud Computing Services.mp4 13.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 5 - Exploitation/5.5 Precision Strike.mp4 12.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.7 Passwords.mp4 12.9 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/04 - Protecting Data with FTP Secure (FTPS)/23 - Demo - FTPS File Downloads in Action.mp4 12.9 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 9 Managing the Boot Procedure/005. 9.4 Managing GRUB2 Configuration.mp4 12.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 1 - Introduction/1.1 Scanning & Enumeration Introduction.mp4 12.9 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 17 Managing Linux Server Roles/010. Lesson 17 Lab Solution Creating Self-Signed Certificates.mp4 12.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 05 - System Hacking/5.6 Malware - Keyloggers.mp4 12.9 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/2. The Traits and Fucntions of Workplace Writing/2.1 General Introduction and Course Objectives.mp4 12.9 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/6. Field and Trip Reports/6.4 Analyzing a Sample Trip Report.mp4 12.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 08 - Wireless Network Hacking/8.1 Introduction to Wireless.mp4 12.9 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/04_sql-joins/1. Join tables in SQL.mp4 12.9 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/02_using-git-locally/04_module-wrap-up/01_module-2-wrap-up-using-git-locally.mp4 12.9 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/02_managing-files-with-python/03_reading-and-writing-csv-files/02_reading-csv-files.mp4 12.9 MB
  • Job Tips/Writing a Tech Resume/2. Resume Content/2.5 Awards and certifications.mp4 12.9 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/04_module-review/02_in-margas-words-my-most-challenging-script.mp4 12.9 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 4 Technology/Lesson 10 AWS Cloud Deployment and Operations/004. 10.3 Cloud Deployment Models.mp4 12.9 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/01_introduction-to-security-hardening/2. Security hardening.mp4 12.8 MB
  • Protocol Deep Dive/TCP & UDP - Deep Dive/05.Troubleshooting TCP UDP Issues/05.05.UDP Firewall Issues.mp4 12.8 MB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 05 - The Origins of the American Legal System/5.3 State Courts and Federalism.mp4 12.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 10 - IoT and OT Hacking/10.6 OT Attacks and Countermeasures.mp4 12.8 MB
  • Protocol Deep Dive/ARP - Deep Dive/05 Addressing ARP-related Security Risks/07 Demo - ARP Poisoning and Man in the Middle .mp4 12.8 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/6. Troubleshooting and Future of Networking/6. Course Wrap Up/2. Alex Career Path.mp4 12.8 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/04_conditional-and-iterative-statements/3. For loops.mp4 12.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/06. Phishing/Module 2 - Getting Organized/2.2 Time to Go Phishing.mp4 12.8 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 13 Networking and Database/004. 13.3 VPC Security Groups.mp4 12.7 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/3. Communicate effectively to influence stakeholders/02_communicate-for-impact/1. Clear and concise communication .mp4 12.7 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/06_final-project/03_course-wrap-up/01_congratulations.mp4 12.7 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 3 Describe Azure Management and Governance/Lesson 8 Describe cost management in Azure/005. 8.4 Describe tags.mp4 12.7 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/1. Introduction to IT/4. Computer Architecture Layer/1. Video Abstraction.mp4 12.7 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 2 Cloud Security Concepts and Design Principles/011. 2.10 DevOps Security.mp4 12.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 6 - Post-Exploitation/6.9 Persistence.mp4 12.7 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 14 Technology Support Resources/002. 14.1 Technology Support Documentation.mp4 12.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 6 - Attribution/6.4 How to Manage Biases.mp4 12.7 MB
  • MITRE/Cybrary - MITRE ATT&CK Defender (MAD) Fundamentals/2. Benefits of Using ATT&CK/2.2 Common Language.mp4 12.7 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/01_getting-your-python-on/02_getting-ready-for-python/01_intro-to-module-1-getting-your-python-on.mp4 12.7 MB
  • Protocol Deep Dive/SNMP - Deep Dive/05 - Monitoring Systems With SNMP/15 - Configuring A Linux Server In The NMS.mp4 12.7 MB
  • Splunk Training/2. Splunk Fundamentals 2/11. Field Extractions.mp4 12.7 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/03_dictionaries/03_iterating-over-the-contents-of-a-dictionary.mp4 12.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/004 How to Install PyCharm on Windows.mp4 12.6 MB
  • Job Tips/Writing a Tech Resume/4. Tools for Creating a Resume/4.2 Resume builders.mp4 12.6 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/03_answer-interview-questions/1. Use strategies to answer interview questions.mp4 12.6 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 8 AWS Access Management/007. 8.6 Question Breakdown 1.mp4 12.6 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/2. Network operations/02_system-identification/3. Security zones.mp4 12.6 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/01_hello-python/04_hello-world/01_hello-world.mp4 12.6 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/5. Managing System Systems/3. Managing Services in Windows - Google - Coursera.mp4 12.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.13 Remote Access.mp4 12.5 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/1. Intro to IT Infrastructure Services/4. How do Qwiklabs Work- - Google - Coursera.mp4 12.5 MB
  • Protocol Deep Dive/SNMP - Deep Dive/05 - Monitoring Systems With SNMP/17 - Configuring A Cisco IOS Device In The NMS.mp4 12.5 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 19 Using Git for Version Control/005. 19.4 Undoing Changes.mp4 12.5 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/01_find-and-prepare-for-a-job-in-cybersecurity/3. Create a resume.mp4 12.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 03 - Footprinting and Reconnaissance/3.1 Introduction to Footprinting.mp4 12.5 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 1 Exam Foundation/Lesson 1 Exam Guide/002. 1.1 Introduction.mp4 12.5 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/01_overview-of-logs/5. Variations of logs.mp4 12.5 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 7 Configuring Logging/004. 7.3 Managing with Logrotate.mp4 12.5 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 5 Managing Partitions/003. 5.2 Understanding Storage Device Names.mp4 12.5 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 12 Operational Controls and Standards/012. 12.11 Vulnerability Assessment.mp4 12.5 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 12 Compute and Storage/011. 12.10 AWS Snowball and Storage Gateway.mp4 12.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 5 - Basic Static Analysis/5.5 Basic Static Analysis Part 4B.mp4 12.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 03 - Hard Disks & File Systems/3.2 Hard Disks and File Systems Part 2.mp4 12.4 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 12 Compute and Storage/012. 12.11 Elastic File System (EFS).mp4 12.4 MB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/04_collaboration/05_course-wrap-up/01_congratulations.mp4 12.4 MB
  • CompTIA/CompTIA Data+ (DA0-001)/1. Understanding Data and Information/1. Understanding Data and Information .mp4 12.4 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/01_automating-with-configuration-management/03_introduction-to-puppet/03_puppet-classes.mp4 12.4 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/4. Python in practice/05_congratulations-on-completing-course-7/1. Course wrap-up.mp4 12.4 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 7 Cloud Security and Compliance Concepts/007. 7.6 Question Breakdown 2.mp4 12.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.12 Cloud Computing.mp4 12.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 10 - Password Cracking and Brute-Forcing Logins/10.2 Introduction to Login Brute-Forcing Tools.mp4 12.4 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/3. Vulnerabilities in systems/04_review-vulnerabilities-in-systems/1. Wrap-up.mp4 12.4 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 10 Managing File Compression and Backup/005. 10.4 Storing Backup Offsite.mp4 12.4 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/2. The Linux operating system/01_all-about-linux/4. Linux architecture.mp4 12.4 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/6. Troubleshooting/4. Going through a Technical Interview/5. Showing your best self during the Interview.mp4 12.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/21 - Day 21 - Intermediate - Build the Snake Game Part 2 Inheritance & List Slicing/005 Detect Collisions with the Wall.mp4 12.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/008 Motivation and the Accountability Trick.mp4 12.4 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 5 Cloud Architecture Design Principles/003. 5.2 Well-Architected Framework Basics.mp4 12.4 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/6. Troubleshooting/6. Course Wrap-up/2. Sabrina No degree.mp4 12.3 MB
  • Protocol Deep Dive/QUIC - Deep Dive/02. An Introduction to QUIC/03. Why Replace TCP.mp4 12.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.3 Scanning with NMAP Full Connect Scan.mp4 12.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/08. Password Cracking Tool Fundamentals/Module 1 - Password Cracking Tool Fundamentals/1.4 Hash Suite.mp4 12.3 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 11 Build and Implement a Physical and Logical Cloud Infrastructure/002. 11.1 Hardware-specific Security Configuration.mp4 12.3 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/3. Operating System/1. What_s an Operating System/5. Memory Management.mp4 12.3 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 9 Security Support Resources/003. 9.2 Security Documentation Types.mp4 12.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Module 3 - Operationalizing ATT&CK®/3.1 Cyber Threat Intelligence.mp4 12.2 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/3. File & Text Manipulation/2. Linux- Display File Contents - Google - Coursera.mp4 12.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 03 - Hard Disks & File Systems/3.1 Hard Disks and File Systems Part 1.mp4 12.2 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 9 Managing the Boot Procedure/002. 9.1 Understanding the Boot Procedure.mp4 12.2 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/01_automating-with-configuration-management/03_introduction-to-puppet/02_puppet-resources.mp4 12.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.14 Cloud Deployment Models and Cloud Wrap-Up.mp4 12.2 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/06_bash-scripting/04_module-review/01_module-6-wrap-up-bash-scripting.mp4 12.2 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 9 Software Assurance and Validation/005. 9.4 OWASP API Security.mp4 12.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 13 - Smartphone Pentest Framework/13.2 SPF (part 2) Attach to Smartphone Based Apps.mp4 12.2 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/01_find-and-prepare-for-a-job-in-cybersecurity/5. Garvey - Cover letter tips.mp4 12.2 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/4. Filesystems/1. Filesystem Types/2. Review of Filesystems - Google - Coursera.mp4 12.2 MB
  • MITRE/Cybrary - MITRE ATT&CK Defender (MAD) Fundamentals/2. Benefits of Using ATT&CK/2.3 Quantitative Scorecard.mp4 12.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/05. Malware Threats/Module 1 - Introduction/1.1 Introduction.mp4 12.2 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 2 Cloud Data Security/Lesson 4 Cloud Data Security/004. 4.3 Information Rights Management.mp4 12.1 MB
  • CompTIA/CompTIA Data+ (DA0-001)/10. Describe Measures of Central Tendencies/1. Introduction .mp4 12.1 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/03_response-and-recovery/1. The role of triage in incident response.mp4 12.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Module 1 - Introduction and Review/1.1 Course Introduction.mp4 12.1 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 6 Legal, Risk, and Compliance/Lesson 13 Legal Requirements, Privacy Issues, and Risk Management in the Cloud/008. 13.7 Provider Risk Assessment Programs.mp4 12.1 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 17 Billing Support Resources/003. 17.2 Cost and Usage Report.mp4 12.1 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 6 Legal, Risk, and Compliance/Lesson 13 Legal Requirements, Privacy Issues, and Risk Management in the Cloud/009. 13.8 Regulatory Transparency Requirements.mp4 12.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 1 - Introduction/1.2 About the Instructor - NM.mp4 12.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 1 - Introduction/1.2 About the Instructor - NM.mp4 12.1 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/3. Secure against network intrusions/03_network-attack-tactics-and-defense/2. IP Spoofing.mp4 12.1 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 16 Managing SELinux and AppArmor/006. 16.5 Configuring SELinux Mode.mp4 12.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 1 - Basic Assembly/1.15 Module 1 Review.mp4 12.1 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/1. Introduction to operating systems/02_the-wonderful-world-of-operating-systems/3. Introduction to operating systems.mp4 12.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 09 - Mobile Hacking/9.2 Mobile Attacks and Countermeasures.mp4 12.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 2 - Data Types and Logic/2.11 Dictionaries (Deep-Dive) - IP.mp4 12.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 10 - IoT and OT Hacking/10.3 IoT Attacks and Threats.mp4 12.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/005 Challenge 2 - Replacing Blanks with Guesses.mp4 12.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 03 - Hard Disks & File Systems/3.3 Hard Disks and File Systems Part 3.mp4 12.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.5 Hidden Files and Directories.mp4 12.0 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.5 Hidden Files and Directories.mp4 12.0 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/06.New Multicast Designs with MLDv2/0603.Demo MLDv2 Operations.mp4 12.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/002 Reproduce the Bug.mp4 12.0 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 4 Technology/Lesson 10 AWS Cloud Deployment and Operations/003. 10.2 Question Breakdown 1.mp4 12.0 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 6 AWS Shared Responsibility Model/003. 6.2 Customer Responsibility.mp4 11.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 5 - Network Connectivity Devices/5.6 Network Address Translation.mp4 11.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 10 - IoT and OT Hacking/10.1 Introduction to IoT Hacking.mp4 11.9 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/2. Write effective Python code/03_learn-from-the-python-community/4. Dorsa - Use Python efficiently on a cybersecurity team.mp4 11.9 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/04.New Multicast Designs with IGMPv3/0402.Demo IGMPv3 Operations.mp4 11.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 08 - Discovery/8.2 Account Discovery.mp4 11.9 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 08 - Discovery/8.2 Account Discovery.mp4 11.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Module 2 - Identifying Web Attacks Through Logs/2.10 Course Summary.mp4 11.9 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/5. Software/1. Introduction to Software/Phlean Navy.mp4 11.9 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/1. Introduction to Networking/3. The Basics of Networking Devices/3. Routers.mp4 11.9 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/2. Write effective Python code/03_learn-from-the-python-community/1. Modules and libraries.mp4 11.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.7 Process Hollowing.mp4 11.9 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.7 Process Hollowing.mp4 11.9 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/5. Connecting to the Internet/5. Wireless Networking/5. Cellular Networking.mp4 11.9 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/4. Python in practice/01_python-for-automation/4. Clancy - Continual learning and Python.mp4 11.9 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/02_introduction-to-networks/4. Tina - Working in network security.mp4 11.9 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/3. The 3 A's of Cybersecurity - Authentication, Authorization, Accounting/1. Authentication/7. TACACS+ - Google - Coursera.mp4 11.9 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 1 Exam Foundation/Lesson 1 Exam Guide/003. 1.2 Target Candidate Description.mp4 11.9 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/2. The Traits and Fucntions of Workplace Writing/2.4 Professional Writing Trait Three_ Conciseness.mp4 11.8 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 14 Technology Support Resources/004. 14.3 AWS Trusted Advisor.mp4 11.8 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/2. Network operations/01_introduction-to-network-protocols/2. Network protocols.mp4 11.8 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 8 AWS Access Management/006. 8.5 AWS IAM Roles and Policies.mp4 11.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 7 - Conclusion/7.1 Final Thoughts.mp4 11.8 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/07 - Modernizing FTP with IPv6/47 - Analysis - Exploring IPv6 Active FTP Transfers.mp4 11.8 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/1. Introduction to Networking/5. The Data Link Layer/4. Victor Escobedo Practical Experience in IT.mp4 11.8 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/3. Linux commands in the Bash shell/01_navigate-the-linux-file-system/3. Core commands for navigation and reading files.mp4 11.8 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 17 Billing Support Resources/002. 17.1 Cost Explorer.mp4 11.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/007 Python Typing Type Hints and Arrows -.mp4 11.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.15 IoT Introduction.mp4 11.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/005 for loops and the range() function.mp4 11.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/001 Day 25 Goals what we will make by the end of the day.mp4 11.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 6 - OSINT Defense/6.2 Operations Security (OPSEC).mp4 11.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 03 - Footprinting and Reconnaissance/3.9 whois (Demo).mp4 11.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 5 - Exploitation/5.9 Overall Objectives.mp4 11.8 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/7. Incident Reports_ Documenting When Something Goes Wrong/7.3 Developing an Incident Report.mp4 11.8 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/02_the-cybersecurity-job-interview-process/3. Garvey - Technical interview tips.mp4 11.8 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/2. Network operations/02_system-identification/5. Proxy servers.mp4 11.8 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 5 Describe Azure compute and networking services/003. 5.2 Describe VM options.mp4 11.7 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 3 Describe Azure Management and Governance/Lesson 11 Describe monitoring tools/003. 11.2 Describe Azure Service Health.mp4 11.7 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/5. Connecting to the Internet/1. Introduction to Connecting to the Internet/Introduction to Connecting to the Internet.mp4 11.7 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/8. Test Reports_ Presenting Experiments and Diagnostics/8.3 Analyzing a Sample Test Report.mp4 11.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 08 - Discovery/8.5 Discovery Case Study.mp4 11.7 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 08 - Discovery/8.5 Discovery Case Study.mp4 11.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/12. Intro to Burp Suite Pro/Module 2 - Configuration and Functionality/2.1 Burp Suite Configuration and Interface Overview.mp4 11.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/009 [Interactive Coding Exercise] Dictionary Comprehension 2.mp4 11.7 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 1 Exam Foundation/Lesson 2 Exam Registration and Exam Strategies/006. 2.5 Exam Question Format.mp4 11.7 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/2. Users and Permissions/1. Users and Groups/9. Ben Life as a CIO - Google - Coursera.mp4 11.7 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/4. Filesystems/1. Filesystem Types/12. Linux- Disk Usage - Google - Coursera.mp4 11.7 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/02_lists/09_list-comprehensions.mp4 11.7 MB
  • CompTIA/CompTIA Data+ (DA0-001)/9. Optimize Data/1. Introduction .mp4 11.7 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 14 Securing Linux/003. 14.2 Understanding and Managing chroot Jails.mp4 11.7 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/01_getting-your-python-on/03_running-python-locally/01_interpreted-vs-compiled-languages.mp4 11.7 MB
  • Protocol Deep Dive/IPsec - Deep Dive/02 - Learning IPsec Fundamentals/06 - Information and Resources.mp4 11.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 4 - Tools and Techniques/4.5 Leaks and Data Breaches.mp4 11.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/12 - Day 12 - Beginner - Scope & Number Guessing Game/005 Introducing the Final Project The Number Guessing Game.mp4 11.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 6 - OSINT Defense/6.3 OSINT Awareness.mp4 11.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 4 - Tools and Techniques/4.4 Emails and Usernames.mp4 11.6 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/6. Troubleshooting/4. Going through a Technical Interview/8. Module Wrap up.mp4 11.6 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/6. Troubleshooting/3. Documentation/2. Process Documentation.mp4 11.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.9 Business Continuity and Disaster Recovery Part 2.mp4 11.5 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/1. What is System Administration/3. Sytem Administration Tasks/7. In Case of Fire, Break Glass - Google - Coursera.mp4 11.5 MB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/1. Welcome to the exciting world of cybersecurity/03_core-skills-for-cybersecurity-professionals/2. Veronica - My path to working in cybersecurity.mp4 11.5 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/1. Introduction to detection and incident response/04_incident-response-tools/2. The value of documentation.mp4 11.5 MB
  • Protocol Deep Dive/OSPF - Deep Dive/06 - Troubleshooting Common OSPF Issues/45 - Troubleshooting Common OSPF Issues - Area Type Mismatch.mp4 11.5 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/03_more-sql-filters/1. Filter dates and numbers.mp4 11.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.1 What is Initial Access.mp4 11.5 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.1 What is Initial Access.mp4 11.5 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/07_final-project/02_course-wrap-up/02_sneak-peek-of-the-next-course.mp4 11.5 MB
  • Protocol Deep Dive/QUIC - Deep Dive/03. Analyzing QUIC with Wireshark/17. Demo-Analyzing QUIC Streams in Wireshark.mp4 11.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 5/5.3 Wrap Up.mp4 11.5 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/03 - Simplifying Operations with FTP Passive Mode/19 - Demo - Reconfiguring the Firewall for Passive FTP.mp4 11.5 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/6. Troubleshooting/1. Troubleshooting Best Practices/7. Amir Attributes.mp4 11.5 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/02_basic-python-syntax/03_conditionals/01_comparing-things.mp4 11.5 MB
  • Splunk Training/1. Splunk Fundamentals 1/22. Alerts Lecture.mp4 11.5 MB
  • MITRE/Cybrary - MITRE ATT&CK Defender (MAD) Fundamentals/1. Understanding ATT&CK/1.5 Mitigations.mp4 11.5 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/6. Operating Systems in Practice/5. Course Wrap Up/1. Course Wrap Up - Google - Coursera.mp4 11.5 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 13 Configuring a Firewall/008. Lesson 13 Lab Solution Configuring Firewalling.mp4 11.5 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 2 Network Management/005. 2.4 Understanding Name Service Switch.mp4 11.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 2 - Data Types and Logic/2.5 Python Logical Escapes - IP.mp4 11.4 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/1. Introduction to operating systems/02_the-wonderful-world-of-operating-systems/2. Kim - My journey into computing.mp4 11.4 MB
  • Job Tips/Writing a Tech Resume/6. Should You Include/6.2 Extracurricular activities or hobbies.mp4 11.4 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/04_managing-data-and-processes/01_data-streams/01_intro-to-module-4-managing-data-and-processes.mp4 11.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/005 [Interactive Coding Exercise] KeyError Handling.mp4 11.4 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/07.Troubleshooting and Securing IGMP and MLD/0704.Analysis Successful Multicast Traceroute Response.mp4 11.4 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 13 Configuring a Firewall/002. 13.1 Understanding Network Ports.mp4 11.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/27 - Day 27 - Intermediate - Tkinter, args, kwargs and Creating GUI Programs/001 Day 27 Goals what we will make by the end of the day.mp4 11.4 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 17 Billing Support Resources/007. 17.6 Cost Allocation Tags.mp4 11.4 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/05_object-oriented-programming-optional/01_object-oriented-programming-optional/06_defining-new-classes-optional.mp4 11.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/08. Password Cracking Tool Fundamentals/Module 1 - Password Cracking Tool Fundamentals/1.6 Securing Your Password.mp4 11.4 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/3. The Transport and Application Layers/3. The Application Layer/2. The Application Layer and the OSI Model.mp4 11.4 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/04_module-review/01_basic-structures-wrap-up.mp4 11.4 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 7 Cloud Business Continuity Planning/004. 7.3 Backup and Restore Policies.mp4 11.3 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/07_final-project/01_getting-ready-for-the-final-project/04_help-with-research-and-planning.mp4 11.3 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/3. Operating System/1. What_s an Operating System/9. the Boot Process.mp4 11.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 06 - Network and Perimeter Hacking/6.7 Introduction to DoS and DDoS Attacks.mp4 11.3 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 4 Technology/Lesson 11 AWS Global Infrastructure/006. 11.5 Question Breakdown 1.mp4 11.3 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/03_introduction-to-cybersecurity-tools/01_security-information-and-event-management-siem-dashboards/3. SIEM dashboards.mp4 11.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/49 - Day 49 - Intermediate+ Automating Job Applications on LinkedIn/001 Day 49 Goals what you will make by the end of the day.mp4 11.3 MB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 01 - The Role of an Expert Witness/1.2 Facts vs. Expert Witness.mp4 11.3 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/2. The Traits and Fucntions of Workplace Writing/2.9 Professional Writing Trait Eight_ Honesty.mp4 11.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 3/3.11 XSS Lab.mp4 11.2 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/4. Networking/1. What is Networking/6. Victor_s First Job.mp4 11.2 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 4 Technology/Lesson 10 AWS Cloud Deployment and Operations/005. 10.4 AWS Network Connectivity Options.mp4 11.2 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 1 Exam Foundation/Lesson 2 Exam Registration and Exam Strategies/002. 2.1 Testing Center Registration.mp4 11.2 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 4 Cloud Economics/004. 4.3 Question Breakdown 1.mp4 11.2 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/3. Linux commands in the Bash shell/02_manage-file-content-in-bash/1. Find what you need with Linux.mp4 11.2 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/3. Operating System/1. What_s an Operating System/6. I-O Management.mp4 11.2 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/03_loops/01_while-loops/01_introduction-to-loops.mp4 11.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.2 Risk Management and Security Basics.mp4 11.2 MB
  • Protocol Deep Dive/ICMP - Deep Dive/06 - Mastering IPv6 Neighbor Discovery/29 - Demo - IPv6 Neighbor Solitication (NS) and Neighbor Advertisement (NA).mp4 11.1 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 3 Describe Azure Management and Governance/Lesson 8 Describe cost management in Azure/004. 8.3 Describe the Azure Cost Management and Billing tool.mp4 11.1 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/2. Write effective Python code/02_work-with-functions/1. Use parameters in functions.mp4 11.1 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/8. Test Reports_ Presenting Experiments and Diagnostics/8.1 Introduction to Test Reports.mp4 11.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 11 - Cloud Computing/11.5 Cloud Security Considerations.mp4 11.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 07 - Web Application Hacking/7.4 Web Application Hacking Methodology.mp4 11.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 11 - Cloud Computing/11.4 Cloud Threats and Attacks.mp4 11.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 04 - Scanning and Enumeration/4.7 SMB Enumeration (Demo).mp4 11.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.3 Risk Management Overview.mp4 11.0 MB
  • Protocol Deep Dive/IPsec - Deep Dive/03 - Building the IPsec Protocol/08 - IPsec Building Blocks.mp4 11.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.10 Hybrid Cryptography SSL and TLS.mp4 11.0 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/05_testing-in-python/01_simple-tests/02_what-is-testing.mp4 11.0 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/4. Python in practice/02_work-with-files-in-python/1. Access a text file in Python.mp4 11.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.4 Desirable Qualities of Algorithms and Keys.mp4 11.0 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 1 Exam Foundation/Lesson 1 Exam Guide/004. 1.3 Exam Content.mp4 11.0 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/1. Introduction to operating systems/03_the-operating-system-at-work/1. Inside the operating system.mp4 11.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.2 Indirect Addressing and Variables Part 2.mp4 10.9 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/01_introduction-to-sql-and-databases/2. Introduction to databases.mp4 10.9 MB
  • Protocol Deep Dive/OSPF - Deep Dive/03 - Forming Basic OSPF Relationships/16 - Inspecting the OSPF Packet - OSPF Link State Update Packet.mp4 10.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/23 - Day 23 - Intermediate - The Turtle Crossing Capstone Project/006 Solution to Step 3 - Create the Player Behaviour.mp4 10.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 5 - Campaign Analysis/5.1 Introduction to Campaigns.mp4 10.9 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/04_managing-data-and-processes/01_data-streams/02_reading-data-interactively.mp4 10.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 7 - Identity and Access Management/7.4 Single Sign-On Kerberos Part 2.mp4 10.9 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/01_strings/03_the-parts-of-a-string.mp4 10.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 02 - Introduction to Ethical Hacking/2.5 Introduction to Security Controls.mp4 10.9 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/4. Networking/3. Impact of the Internet/3. Gian what hes does in Android Security.mp4 10.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Module 3 - Operationalizing ATT&CK®/3.5 Putting it all Together into Threat-Informed Defense.mp4 10.8 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/02_security-frameworks-and-controls/01_more-about-frameworks-and-controls/2. Frameworks.mp4 10.8 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/05.The Future of Neworking IPv6 Multicast and MLDv1/0504.Analysis MLDv1 General Query and Report.mp4 10.8 MB
  • CompTIA/CompTIA Data+ (DA0-001)/2. Explain Data Types/1. Data Concepts and Environments .mp4 10.8 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 12 Compute and Storage/010. 12.9 Elastic Block Store (EBS).mp4 10.8 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/3. File & Text Manipulation/3. Windows- Modifying Text Files - Google - Coursera.mp4 10.8 MB
  • Job Tips/Writing a Tech Resume/1. Logistics of a Technical Resume/1.2 Resume length.mp4 10.8 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/2. The Linux operating system/02_linux-distributions/1. Linux distributions.mp4 10.8 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/4. Engage with the cybersecurity community/02_build-your-cybersecurity-network/3. Sarah - Network in the cybersecurity community.mp4 10.8 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/3. The 3 A's of Cybersecurity - Authentication, Authorization, Accounting/2. Authorization/1. Authorization and Access Control Methods - Google - Coursera.mp4 10.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.8 Software Packing.mp4 10.8 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.8 Software Packing.mp4 10.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 6 - Post-Exploitation/6.2 Purpose.mp4 10.8 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 6 Legal, Risk, and Compliance/Lesson 14 Cloud Audits, Methodologies, and Contracts/005. 14.4 Specialized Compliance Requirements.mp4 10.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.8 Ports and Protocols Introduction.mp4 10.7 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 12 Compute and Storage/013. 12.12 Question Breakdown 2.mp4 10.7 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/2. Network monitoring and analysis/02_capture-and-view-network-traffic/1. Packets and packet captures.mp4 10.7 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/01_hello-python/04_hello-world/02_getting-information-from-the-user.mp4 10.7 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/04 - Protecting Data with FTP Secure (FTPS)/24 - Analysis - FTPS Session Initialization and Download Packets.mp4 10.7 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 2 Network Management/007. 2.6 Analyzing Network Socket.mp4 10.7 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 3 Describe Azure Management and Governance/Lesson 9 Describe features and tools for governance and compliance/004. 9.3 Describe resource locks.mp4 10.7 MB
  • Protocol Deep Dive/ICMP - Deep Dive/04 - Conquering the Fear of Fragmentation/21 - Analysis - ICMP Packet-too-big Unreachable.mp4 10.7 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/3. Linux commands in the Bash shell/01_navigate-the-linux-file-system/2. Linux commands via the Bash shell.mp4 10.7 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/04_conditional-and-iterative-statements/4. While loops.mp4 10.7 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 6 Managing File Systems/006. 6.5 Monitoring File Systems.mp4 10.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/003 Play Computer and Evaluate Each Line.mp4 10.7 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/05 - Improving Confidentiality with SSH FTP (SFTP)/31 - Demo - Downloading Files with SFTP.mp4 10.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 09 - Lateral Movement/9.4 SSH Hijacking.mp4 10.7 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 09 - Lateral Movement/9.4 SSH Hijacking.mp4 10.7 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/1. Introduction to asset security/02_introduction-to-assets/1. Welcome to week 1.mp4 10.7 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/3. The Transport and Application Layers/2. The Transport Layer/6. Firewalls.mp4 10.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 05 - System Hacking/5.9 Malware - Introduction to Viruses.mp4 10.6 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 6 Legal, Risk, and Compliance/Lesson 14 Cloud Audits, Methodologies, and Contracts/007. 14.6 Business Agreement Requirements.mp4 10.6 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/02_managing-files-with-python/04_module-review/01_module-2-wrap-up-managing-files-with-python.mp4 10.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 3 - Storing and Analyzing ATT&CK®-Mapped Data/3.4 Exercise 3 - Comparing Layers in ATT&CK® Navigator.mp4 10.6 MB
  • MITRE/Cybrary - MITRE ATT&CK Cyber Threat Intelligence/3. Storing and Analyzing ATT&CK-Mapped Data/3.4 Exercise 3- Comparing Layers in ATT&CK Navigator.mp4 10.6 MB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 06 - The Trial Process/6.2 Anatomy of a Trial.mp4 10.6 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/3. File & Text Manipulation/11. Windows and Linux Advanced Navigation - Google - Coursera.mp4 10.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.9 Module 3 Summary.mp4 10.6 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.9 Module 3 Summary.mp4 10.6 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/1. What is System Administration/3. Sytem Administration Tasks/2. IT Infrastructure Services - Google - Coursera.mp4 10.6 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/02_basic-python-syntax/01_expressions-and-variables/05_expressions-numbers-and-type-conversions.mp4 10.6 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/2. Basic Commands/8. Windows- Make Directories in the GUI _ CLI - Google - Coursera.mp4 10.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.13 PGP and SMIME.mp4 10.6 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/4. Filesystems/1. Filesystem Types/10. Linux- Files - Google - Coursera.mp4 10.5 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/6. Operating Systems in Practice/3. Logging/1. System Monitoring - Google - Coursera.mp4 10.5 MB
  • Protocol Deep Dive/ARP - Deep Dive/05 Addressing ARP-related Security Risks/04 CAM Table Flood with Port Security.mp4 10.5 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/07 - Modernizing FTP with IPv6/50 - Analysis - Exploring IPv6 Passive FTP Transfers.mp4 10.5 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/4. Securing Your Networks/2. Wireless Security/4. Heather Social Engineering - Google - Coursera.mp4 10.5 MB
  • Protocol Deep Dive/SSH and Telnet - Deep Dive/03.The Telnet Protocol/0303.How Telnet works.mp4 10.5 MB
  • MITRE/Cybrary - MITRE ATT&CK Defender (MAD) Fundamentals/1. Understanding ATT&CK/1.3 Tactics.mp4 10.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/08. OWASP Top 10 - 2021/Module 1 - Introduction/1.8 Video Demonstration of Using OWASP Mutillidae.mp4 10.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/2. OWASP Top 10 - 2021/Module 1 - Introduction/1.7 Video Demonstration of Using OWASP Mutillidae.mp4 10.5 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/4. Python in practice/02_work-with-files-in-python/3. Parse a text file in Python.mp4 10.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 4 - Analysis/4.1 Introduction to Analysis.mp4 10.5 MB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 02 - Forensic Concept Review/2.2 Evidence Preservation.mp4 10.5 MB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 07 - Rules of Evidence and Procedure/7.2 Federal Rule of Civil Procedure 26.mp4 10.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.5 Steal Web Session Cookie.mp4 10.5 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.5 Steal Web Session Cookie.mp4 10.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 5 - Network Connectivity Devices/5.2 Network Connectivity Devices Part 2.mp4 10.5 MB
  • Protocol Deep Dive/OSPF - Deep Dive/03 - Forming Basic OSPF Relationships/12 - Inspecting the OSPF Packet - OSPF Header.mp4 10.5 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/02_security-frameworks-and-controls/04_owasp-principles-and-security-audits/3. Wajih - Stay up-to-date on the latest cybersecurity threats.mp4 10.4 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 12 Compute and Storage/003. 12.2 Compute Service Summary.mp4 10.4 MB
  • Job Tips/Writing a Tech Resume/5. Design Dos and Don'ts/5.4 File format.mp4 10.4 MB
  • Protocol Deep Dive/ICMP - Deep Dive/02 - Using Ping/05 - Analysis - ICMP Echo-request.mp4 10.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 1 - About the Exam and Certification/1.1 Course Welcome and Introduction.mp4 10.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/004 [Interactive Coding Exercise] IndexError Handling.mp4 10.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 3 - Setting Up Splunk/3.1 Setting Up Splunk.mp4 10.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 05 - System Hacking/5.5 Privilege Escalation.mp4 10.4 MB
  • Job Tips/Writing a Tech Resume/7. Having a Professinoal Online Presence/7.3 Personal portfolio or website.mp4 10.4 MB
  • Protocol Deep Dive/NAT - Deep Dive/3.NAT Setup and Analysis/1.NAT Demonstration in a Modern Network.mp4 10.4 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/3. Vulnerabilities in systems/02_identify-system-vulnerabilities/4. Omad - My learning journey into cybersecurity.mp4 10.4 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/3. File & Text Manipulation/12. Ben First Tech Job - Google - Coursera.mp4 10.4 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 6 Legal, Risk, and Compliance/Lesson 14 Cloud Audits, Methodologies, and Contracts/003. 14.2 Gap Analysis and Internal InfoSec Management Systems.mp4 10.4 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/03_response-and-recovery/4. The containment, eradication, and recovery phase of the lifecycle.mp4 10.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 03 - Footprinting and Reconnaissance/3.2 Website Footprinting.mp4 10.3 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/2. Protect organizational assets/01_safeguard-information/1. Welcome to week 2.mp4 10.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.7 Asymmetric Cryptography.mp4 10.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/23 - Day 23 - Intermediate - The Turtle Crossing Capstone Project/003 How to use the Starter Code.mp4 10.3 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 12 Operational Controls and Standards/007. 12.6 Release and Deployment Management.mp4 10.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/017 Congratulations! Well done!.mp4 10.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 6 - Post-Exploitation/6.10 Further Penetration Into Infrastructure.mp4 10.3 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 15 EC2 Pricing Models/003. 15.2 On-Demand Scenario.mp4 10.2 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/3. Network Services/5. DNS for Web Servers - Google - Coursera.mp4 10.2 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/4. Filesystems/1. Filesystem Types/15. Ben Passion - Google - Coursera.mp4 10.2 MB
  • Protocol Deep Dive/QUIC - Deep Dive/04. Troubleshooting the QUIC Protocol/22. Demo-Browser Tools for Validating QUIC.mp4 10.2 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/5. Defense in Depth/3. Case study the security model of chrome OS/2. Chrome OS Verified Boot - Google - Coursera.mp4 10.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 7 - Identity and Access Management/7.1 Identity and Access Management Introduction.mp4 10.2 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/04_cloud-hardening/1. Network security in the cloud.mp4 10.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 6 - Conclusion/6.1 More to Learn.mp4 10.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.4 Credential Dumping.mp4 10.2 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.4 Credential Dumping.mp4 10.2 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 2 Network Management/010. Lesson 2 Lab Solution Managing Custom Routes.mp4 10.1 MB
  • Protocol Deep Dive/OSPF - Deep Dive/06 - Troubleshooting Common OSPF Issues/42 - Troubleshooting Common OSPF Issues - Duplicate Address.mp4 10.1 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/05_object-oriented-programming-optional/04_module-review/01_oop-wrap-up-optional.mp4 10.1 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/2. The Traits and Fucntions of Workplace Writing/2.3 Professional Writing Trait Two_ Correctness.mp4 10.1 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/3. LDAP/3. Heather Overcoming Obstacles - Google - Coursera.mp4 10.1 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/1. Introduction to IT/2. History of Computing/3. Kevin Career.mp4 10.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 5 - Network Connectivity Devices/5.4 Switch and VLAN Configuration Part 2.mp4 10.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 10 - Collection/10.5 Collection Case Study.mp4 10.1 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 10 - Collection/10.5 Collection Case Study.mp4 10.1 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/01_strings/01_basic-structures-introduction.mp4 10.1 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 6 Legal, Risk, and Compliance/Lesson 13 Legal Requirements, Privacy Issues, and Risk Management in the Cloud/004. 13.3 Issues with PHI and PII in the Cloud.mp4 10.1 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/05_object-oriented-programming-optional/02_classes-and-methods-optional/05_documenting-functions-classes-and-methods-optional.mp4 10.1 MB
  • Protocol Deep Dive/SSH and Telnet - Deep Dive/03.The Telnet Protocol/0304.Troubleshooting Telnet Connections.mp4 10.1 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/01_security-domains/03_navigate-threats-risks-and-vulnerabilities/3. Herbert - Manage threats, risks, and vulnerabilities.mp4 10.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Module 2 - Benefits of Using ATT&CK®/2.2 Common Language.mp4 10.1 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 16 Multiple Account Strategies/004. 16.3 Multiple Account Cost Allocation.mp4 10.1 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 10 Identity and Access Management Solutions/008. 10.7 Managed Security Service Providers.mp4 10.1 MB
  • Splunk Training/2. Splunk Fundamentals 2/3. Mapping Commands.mp4 10.1 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/03_introduction-to-cybersecurity-tools/02_explore-security-information-and-event-management-siem-tools/3. Talya - Myths about the cybersecurity field.mp4 10.0 MB
  • MITRE/Cybrary - MITRE ATT&CK Defender (MAD) Fundamentals/1. Understanding ATT&CK/1.6 Data Sources and Detections.mp4 10.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 2/2.16 SQLI Lab.mp4 10.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 2 - Collection/2.1 Introduction to Data Collection.mp4 10.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/003 [Interactive Coding Exercise] Squaring Numbers.mp4 10.0 MB
  • Protocol Deep Dive/ARP - Deep Dive/04 Troubleshooting Common ARP Issues/05 Static ARP Problems.mp4 10.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.10 Module 2 Summary.mp4 10.0 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.10 Module 2 Summary.mp4 10.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 2 - Theory/2.3 Types of OSINT.mp4 10.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.2 Social Engineering.mp4 10.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/04. Social Engineering/Module 2 - Social Engineering Labs/2.2 EC-Council Certified Ethical Hacker v10 Social Engineering Lab Overview.mp4 10.0 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/03_loops/01_while-loops/04_more-while-loop-examples.mp4 10.0 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/7. Incident Reports_ Documenting When Something Goes Wrong/7.4 Analyzing a Sample Incident Report.mp4 10.0 MB
  • Protocol Deep Dive/DHCP - Deep Dive/03. Understanding DHCPv6/03_01-Overview of DHCPv6.mp4 10.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 10 - Collection/10.2 Audio Capture.mp4 10.0 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 10 - Collection/10.2 Audio Capture.mp4 10.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 13 - Mobile/13.5 Mobile Part 5.mp4 10.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/004 Day 1 Goals what we will make by the end of the day.mp4 9.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/004 Day 1 Goals what we will make by the end of the day.mp4_original 9.9 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/02 - Starting at the Beginning - FTP Active Mode/07 - Analysis - Active FTP Data Transport.mp4 9.9 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 21 An Introduction to Containers/003. 21.2 Understanding Container Runtimes.mp4 9.9 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/1. Introduction to operating systems/03_the-operating-system-at-work/3. Resource allocation via the OS.mp4 9.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 12 - Email Investigation/12.2 Email Investigation Part 2.mp4 9.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/38 - Day 38 - Intermediate+ Workout Tracking Using Google Sheets/001 Day 38 Goals what you will make by the end of the day.mp4 9.9 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/1. Intro to IT Infrastructure Services/2. Role of IT Infrastructure Services in SysAdmin.mp4 9.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Module 2 - Benefits of Using ATT&CK®/2.3 Quantitative Scorecard.mp4 9.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.18 Hardening the System Part 2.mp4 9.9 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/6. Final Project/1. Final Project/2. Alex passion _ success - Google - Coursera.mp4 9.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.1 Cryptography Introduction and Services.mp4 9.9 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/06_certificate-wrap-up/2. Congratulations on completing the Google Cybersecurity Certificate program!.mp4 9.9 MB
  • Protocol Deep Dive/ARP - Deep Dive/03 Understanding InARP, GARP, RARP, and Proxy ARP/01 Intro.mp4 9.9 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 6 Describe Azure storage services/002. 6.1 Compare Azure storage services.mp4 9.9 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/3. Linux commands in the Bash shell/03_authenticate-and-authorize-users/2. Change permissions.mp4 9.9 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/3. The 3 A's of Cybersecurity - Authentication, Authorization, Accounting/2. Authorization/3. Access Control List - Google - Coursera.mp4 9.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 2 - Data Types and Logic/2.4 While in Python - IP.mp4 9.8 MB
  • Protocol Deep Dive/ICMP - Deep Dive/04 - Conquering the Fear of Fragmentation/19 - Demo - MTU Discovery Using Ping Bracketing.mp4 9.8 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 7 Describe Azure identity, access, and security/001. Learning objectives.mp4 9.8 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/1. Introduction to Networking/2. The TCPIP Five Layer Network Model/Alex Why Networking.mp4 9.8 MB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 08 - Providing Depositions and Affidavits/8.1 Written vs. Oral Testimony.mp4 9.8 MB
  • Protocol Deep Dive/DNS - Deep Dive/Exercise Files/03/Mod3-AtGabriela-DoHConfig.pcapng.gz 9.8 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 4 Technology/Lesson 11 AWS Global Infrastructure/003. 11.2 Availability Zones.mp4 9.8 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 6 Legal, Risk, and Compliance/Lesson 13 Legal Requirements, Privacy Issues, and Risk Management in the Cloud/006. 13.5 Privacy Impact Assessments (PIAs).mp4 9.8 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/01_overview-of-logs/4. Rebecca - Learn new tools and technologies.mp4 9.8 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/2. The Network Layer/2. The Networking Layer/5. Address Resolution Protocol.mp4 9.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Module 1 - Introduction/1.3 Course Overview and Prerequisites - NM.mp4 9.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Module 1 - Introduction/1.3 Course Overview and Prerequisites - NM.mp4 9.8 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/02_create-and-use-documentation/1. The benefits of documentation.mp4 9.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/17 - Day 17 - Intermediate - The Quiz Project & the Benefits of OOP/002 How to create your own Class in Python.mp4 9.8 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/2. Network monitoring and analysis/03_packet-inspection/1. Packet captures with tcpdump.mp4 9.8 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/1. Introduction to detection and incident response/03_incident-response-operations/4. Incident response plans.mp4 9.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 04 - Scanning and Enumeration/4.8 NetBIOS Enumeration (Demo).mp4 9.7 MB
  • Protocol Deep Dive/ICMP - Deep Dive/02 - Using Ping/08 - Demo - Troubleshooting with Ping.mp4 9.7 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 3 Describe Azure Management and Governance/Lesson 8 Describe cost management in Azure/002. 8.1 Describe factors that can affect costs.mp4 9.7 MB
  • Protocol Deep Dive/OSPF - Deep Dive/06 - Troubleshooting Common OSPF Issues/43 - Troubleshooting Common OSPF Issues - Authentication Mismatch.mp4 9.7 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/03_overview-of-security-information-event-management-siem/2. Query for events with Splunk.mp4 9.7 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/1. What is System Administration/3. Sytem Administration Tasks/4. Routine Maintenance - Google - Coursera.mp4 9.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/12 - Day 12 - Beginner - Scope & Number Guessing Game/003 How to Modify a Global Variable.mp4 9.7 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/5. Software/1. Introduction to Software/4. Revisiting Abstraction.mp4 9.7 MB
  • Protocol Deep Dive/ICMP - Deep Dive/06 - Mastering IPv6 Neighbor Discovery/33 - Analysis - IPv6 RS and RA Packets.mp4 9.7 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/03_regular-expressions/01_regular-expressions/03_why-use-regular-expressions.mp4 9.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 2 - Collection/2.8 Public Data Sources Part 2.mp4 9.6 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/3. Vulnerabilities in systems/01_flaws-in-the-system/1. Welcome to week 3.mp4 9.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 6 - Conclusion/6.2 Final Review.mp4 9.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.1 Understanding Attacks.mp4 9.6 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 6 Describe Azure storage services/004. 6.3 Describe redundancy options.mp4 9.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/005 Docstrings.mp4 9.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 3 - Threat Modeling/3.7 Motivation Modeling.mp4 9.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 11 - Command and Control/11.4 Uncommonly Used Ports.mp4 9.5 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 11 - Command and Control/11.4 Uncommonly Used Ports.mp4 9.5 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/03_overview-of-security-information-event-management-siem/1. Reexamine SIEM tools.mp4 9.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 06 - Operating System Forensics/6.1 Operating System Forensics Part 1 (FI).mp4 9.5 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 4 Basic Hardware Management/003. 4.2 Listing and Identifying Hardware Components.mp4 9.5 MB
  • Protocol Deep Dive/TCP & UDP - Deep Dive/04.TCP UDP Ready Set Action/04.03.UDP DHCP Session Analysis.mp4 9.5 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 16 Managing SELinux and AppArmor/011. Lesson 16 Lab Solution Configuring SELinux.mp4 9.5 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/0. Introduction/001. CompTIA Linux+ XK0-005 Introduction.mp4 9.5 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/3. Communicate effectively to influence stakeholders/04_review-communicate-effectively-to-influence-stakeholders/1. Wrap-up.mp4 9.5 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/1. Introduction to Networking/5. The Data Link Layer/2. Unicast, Multicast, and Broadcast.mp4 9.5 MB
  • Books/CompTIA/Network+/CompTIA Network+ Practice Tests - Exam N10-008, 2nd Edition.pdf 9.5 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 2 Cloud Data Security/Lesson 3 The Cloud Data Lifecycle/004. 3.3 Phase 3 Use.mp4 9.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 06 - Network and Perimeter Hacking/6.12 IDS and Firewall Evasion Techniques.mp4 9.4 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/03_network-communication/2. The TCPIP model.mp4 9.4 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/02_sql-queries/1. Basic queries.mp4 9.4 MB
  • Protocol Deep Dive/DHCP - Deep Dive/02. Course Overview and DHCPv4/02_03-DHCP Address Assignment.mp4 9.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Module 1 - Introduction/1.1 Introduction.mp4 9.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Module 1 - Introduction/1.1 Introduction.mp4 9.3 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/13. Your Main Takeaways_ Conclusion and Additional Resources/13.1 The Most Important Concepts from the Entire Course.mp4 9.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/24 - Day 24 - Intermediate - Files, Directories and Paths/001 Day 24 Goals what you will make by the end of the day.mp4 9.3 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/1. Introduction to Directory Services/1. Module Introduction.mp4 9.3 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/03_introduction-to-cybersecurity-tools/01_security-information-and-event-management-siem-dashboards/2. Logs and SIEM tools.mp4 9.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 03 - Footprinting and Reconnaissance/3.6 Google Hacking Database (Demo).mp4 9.3 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/6. Creating a Company Culture for Security/4. Course Wrap up/Congratulations! - Google - Coursera.mp4 9.3 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 1 Describe Cloud Concepts/Lesson 2 Describe the benefits of using cloud services/002. 2.1 Explain high availability and scalability.mp4 9.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.4 Use and Misuse Cases.mp4 9.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 13 - Mobile/13.2 Mobile Part 2.mp4 9.3 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/06_certificate-wrap-up/1. Recap of the Google Cybersecurity Certificate program.mp4 9.3 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/03_loops/01_while-loops/02_what-is-a-while-loop.mp4 9.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/005 Installing PyCharm on Mac.mp4 9.3 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/2. Physical Infrastructure Services/1. Server Operating Systems - Google - Coursera.mp4 9.2 MB
  • Job Tips/Writing a Tech Resume/5. Design Dos and Don'ts/5.3 Layout.mp4 9.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/11 - Day 11 - Beginner - The Blackjack Capstone Project/001 Day 11 Goals what we will make by the end of the day.mp4 9.2 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/02_introduction-to-networks/8. Cloud networks.mp4 9.2 MB
  • Protocol Deep Dive/DNS - Deep Dive/04. Modifying DNS Configuration for Servers/12. Configuring DNS Zones.mp4 9.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/04. Social Engineering/Module 1 - Introduction/1.1 Introduction.mp4 9.2 MB
  • Protocol Deep Dive/ICMP - Deep Dive/06 - Mastering IPv6 Neighbor Discovery/32 - Demo - IPv6 Router Solitication (RS) and Router Advertisement (RA).mp4 9.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 6 - Attribution/6.6 Nation-State Attribution Part 2.mp4 9.2 MB
  • Protocol Deep Dive/SNMP - Deep Dive/03 - Managing Devices With SNMP/07 - OIDs And MIBs.mp4 9.1 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 10 Identity and Access Management Solutions/003. 10.2 Federated Identity.mp4 9.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Module 1 - Understanding ATT&CK®/1.5 Mitigations.mp4 9.1 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/2. The Network Layer/2. The Networking Layer/1. The Network Layer.mp4 9.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 3 - Data Management and Processing/3.3 Common CTI Standards Part 2.mp4 9.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 06 - Network and Perimeter Hacking/6.4 Sniffing Countermeasures.mp4 9.1 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 6 Legal, Risk, and Compliance/Lesson 13 Legal Requirements, Privacy Issues, and Risk Management in the Cloud/005. 13.4 Standard Privacy Requirements.mp4 9.1 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/4. Developing Routine and Sensitive Memos/4.1 The Role and Form of Memos.mp4 9.1 MB
  • Protocol Deep Dive/SSH and Telnet - Deep Dive/02.The Secure Shell (SSH) Protocol/0204.Basic SSH Troubleshooting.mp4 9.1 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/3. Package and Software Management/3. Whats happening in the background/2. Linux- Underneath the Hood - Google - Coursera.mp4 9.1 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/1. Introduction to operating systems/01_get-started-with-the-course/1. Introduction to Course.mp4 9.1 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 1 Exam Foundation/Lesson 2 Exam Registration and Exam Strategies/003. 2.2 Testing Center Strategies.mp4 9.1 MB
  • Protocol Deep Dive/ARP - Deep Dive/04 Troubleshooting Common ARP Issues/03 Stale ARP Cache Problems.mp4 9.1 MB
  • Protocol Deep Dive/DHCP - Deep Dive/02. Course Overview and DHCPv4/02_02-DHCPv4 Indepth.mp4 9.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/001 Day 35 Goals what you will make by the end of the day.mp4 9.0 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/03_regular-expressions/01_regular-expressions/01_intro-to-module-3-regular-expressions.mp4 9.0 MB
  • Protocol Deep Dive/TCP & UDP - Deep Dive/02.Protocol Introduction/02.04.What Is TCP.mp4 9.0 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/05_testing-in-python/04_errors-and-exceptions/03_testing-for-expected-errors.mp4 9.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 2 - Data Types and Logic/2.1 Data Types and Logic Introduction - IP.mp4 9.0 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/01_social-engineering/1. Welcome to week 4.mp4 9.0 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/2. The Linux operating system/03_the-shell/2. Input and output in the shell.mp4 9.0 MB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 04 - The Expert Report/4.2 Importance of Every Word.mp4 9.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 12 - Exfiltration/12.2 Automated Exfiltration.mp4 9.0 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 12 - Exfiltration/12.2 Automated Exfiltration.mp4 9.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/001 Day 8 Goals what we will make by the end of the day.mp4 9.0 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/01_incident-detection-and-verification/2. The detection and analysis phase of the lifecycle.mp4 9.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 6 - Post-Exploitation/6.11 Cleanup.mp4 9.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/009 [Interactive Coding Exercise] Debugging Leap Year.mp4 9.0 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 2 Cloud Data Security/Lesson 3 The Cloud Data Lifecycle/005. 3.4 Phase 4 Share.mp4 9.0 MB
  • Protocol Deep Dive/NAT - Deep Dive/3.NAT Setup and Analysis/3.NAT Demonstration in a SOHO Network.mp4 8.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.2 Bash History.mp4 8.9 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.2 Bash History.mp4 8.9 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/01_introduction-to-sql-and-databases/3. Query databases with SQL.mp4 8.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/60 - Day 60 - Advanced - Make POST Requests with Flask and HTML Forms/006 Solution-Completed-Code-day-60-end.zip 8.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/003 Multiple return values.mp4 8.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 03 - Hard Disks & File Systems/3.5 Hard Disks and File Systems Part 5.mp4 8.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 09 - Database Forensics/9.1 Database Forensics.mp4 8.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 2 - Intelligence Gathering/2.13 Module 2 Summary.mp4 8.9 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 15 Managing Secure Access Control/003. 15.2 Managing TCP Wrappers.mp4 8.9 MB
  • Protocol Deep Dive/DHCP - Deep Dive/03. Understanding DHCPv6/03_03-Understanding Stateless and Stateful DHCPv6.mp4 8.9 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/02_introduction-to-python-programming-in-cybersecurity/4. Create a basic Python script.mp4 8.8 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 9 Software Assurance and Validation/004. 9.3 Abuse Case Testing.mp4 8.8 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 2 Cloud Data Security/Lesson 3 The Cloud Data Lifecycle/003. 3.2 Phase 2 Store.mp4 8.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 2 - Collection/2.5 Private Data Sources Part 2.mp4 8.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 2 - Data Types and Logic/2.9 Numbers (Deep-Dive) - IP.mp4 8.8 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/02_overview-of-intrusion-detection-systems-ids/4. Examine signatures with Suricata.mp4 8.8 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 1 Managing User Related Security/003. 1.2 Managing File System Attributes.mp4 8.8 MB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 3 - Storing and Analyzing ATT&CK®-Mapped Data/3.4 Exercise 3 - Comparing Layers in ATT&CK® Navigator.mp4 8.8 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/05_testing-in-python/01_simple-tests/01_intro-to-module-5-testing-in-python.mp4 8.8 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/1. Introduction to Networking/4. The Physical Layer/2. Twisted Pair Cabling and Duplexing.mp4 8.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.7 Function Prologue.mp4 8.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.6 Credential Access Case Study.mp4 8.7 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.6 Credential Access Case Study.mp4 8.7 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/03_regular-expressions/04_module-review/01_module-3-wrap-up-regular-expressions.mp4 8.7 MB
  • Protocol Deep Dive/DNS - Deep Dive/05. Troubleshooting DNS/20. Demo-Isolating Cause of Inability to Access Local or Remote Resources.mp4 8.7 MB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 03 - Investigative Process/3.3 Checklists and Standard Procedure.mp4 8.7 MB
  • Protocol Deep Dive/OSPF - Deep Dive/03 - Forming Basic OSPF Relationships/10 - Digging Further into OSPF Network Types.mp4 8.7 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 12 Operational Controls and Standards/003. 12.2 Continuity Management.mp4 8.7 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/2. Hardware/3. Starting it up/Ben_s Advice.mp4 8.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 08 - Wireless Network Hacking/8.2 Wireless Attacks and Countermeasures.mp4 8.7 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/2. Hardware/1. The Modern Computer/Joe Diversity.mp4 8.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.20 Incident Response.mp4 8.7 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 12 Operational Controls and Standards/008. 12.7 Availability Management.mp4 8.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 13 - Mobile/13.4 Mobile Part 4.mp4 8.6 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/12. Internal Social Media Platforms_ Using Office Instant Messaging/12.1 Defining Traits of Office Social Messaging.mp4 8.6 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/2. Protect organizational assets/04_review-protect-organizational-assets/1. Wrap-up.mp4 8.6 MB
  • Protocol Deep Dive/ICMP - Deep Dive/03 - Using Traceroute/11 - Demo - Traceroute in Action.mp4 8.6 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 19 Using Git for Version Control/004. 19.3 Using Git Repositories.mp4 8.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/012 Share and Show off your Project!.mp4 8.6 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/03_overview-of-security-information-event-management-siem/3. Query for events with Chronicle.mp4 8.6 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/04_post-incident-actions/1. The post-incident activity phase of the lifecycle.mp4 8.6 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/1. Intro to IT Infrastructure Services/1. What are IT Infrastructure Services.mp4 8.6 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/3. The Transport and Application Layers/1. Introduction to the Transport and Application Layers/Introduction to the Transport.mp4 8.6 MB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/04_putting-it-all-together/02_course-wrap-up/01_outtakes.mp4 8.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 11 - Command and Control/11.2 Commonly Used Port.mp4 8.6 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 11 - Command and Control/11.2 Commonly Used Port.mp4 8.6 MB
  • Protocol Deep Dive/NAT - Deep Dive/3.NAT Setup and Analysis/2.NAT Demonstration with a Router.mp4 8.6 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/01_getting-your-python-on/06_module-review/01_module-1-wrap-up-getting-your-python-on.mp4 8.6 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/2. The Network Layer/1. Introduction/Introduction to The Network Layer.mp4 8.6 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 9 Managing the Boot Procedure/007. 9.6 Booting into Non-default Targets.mp4 8.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Module 1 - Introduction and the Cyber Kill Chain Overview/1.1 Introduction.mp4 8.5 MB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/04_managing-cloud-instances-at-scale/05_course-wrap-up/01_congratulations.mp4 8.5 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 11 Managing User Interfaces/009. Lesson 11 Lab Solution Remotely Accessing the GUI.mp4 8.5 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/05_review-threats-in-cybersecurity/1. Wrap-up.mp4 8.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.7 Hooking.mp4 8.5 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.7 Hooking.mp4 8.5 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/2. Network operations/02_system-identification/2. Virtual private networks (VPNs).mp4 8.5 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/5. Process Management/2. Managing Processes/3. Windows- Signals - Google - Coursera.mp4 8.4 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 13 Networking and Database/002. 13.1 Network Service Summary.mp4 8.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 04 - Scanning and Enumeration/4.6 Enumeration Countermeasures.mp4 8.4 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 12 Compute and Storage/008. 12.7 Storage Service Summary.mp4 8.4 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/05.The Future of Neworking IPv6 Multicast and MLDv1/0503.Demo MLDv1 Operations.mp4 8.4 MB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 09 - Expert Testimony/9.4 Cross Examination.mp4 8.4 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/02_managing-files-with-python/03_reading-and-writing-csv-files/03_generating-csv.mp4 8.4 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/03_loops/02_for-loops/03_more-for-loop-examples.mp4 8.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Module 1 - Understanding ATT&CK®/1.3 Tactics.mp4 8.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.11 SSL, TLS and PKI Introduction.mp4 8.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.1 Introduction and Policy.mp4 8.4 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/04_sql-joins/2. Types of joins.mp4 8.4 MB
  • Job Tips/Writing a Tech Resume/4. Tools for Creating a Resume/4.3 Visual design tools.mp4 8.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 1 - Just the Basics/1.14 Summary and Review - IP.mp4 8.3 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 1 Managing User Related Security/005. 1.4 Using Policykit and pkexec.mp4 8.3 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/04_managing-data-and-processes/03_processing-log-files/01_what-are-log-files.mp4 8.3 MB
  • Protocol Deep Dive/SSH and Telnet - Deep Dive/03.The Telnet Protocol/0302.When NOT to Use Telnet.mp4 8.3 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/04.New Multicast Designs with IGMPv3/0404.Analysis IGMPv3 Any-source Multicast (ASM) LeaveQuery.mp4 8.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 03 - Hard Disks & File Systems/3.6 Hard Disks and File Systems Part 6.mp4 8.3 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 10 Managing File Compression and Backup/006. 10.5 Checking File Integrity.mp4 8.3 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/5. Software/2. Interacting with Software/3. Installing, Updating and Removing Software on Linux.mp4 8.3 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 11 Build and Implement a Physical and Logical Cloud Infrastructure/005. 11.4 Installation of Guest OS Virtualization Tools.mp4 8.3 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/01_security-domains/01_get-started-with-the-course/1. Introduction to Course 2.mp4 8.3 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/03_answer-interview-questions/4. Ask the interviewer questions.mp4 8.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.4 Disabling Security Tools.mp4 8.3 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.4 Disabling Security Tools.mp4 8.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 13 - Mobile/13.1 Mobile Part 1.mp4 8.3 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 5 Managing Partitions/002. 5.1 Understanding MBR and GPT.mp4 8.3 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/06_final-project/03_course-wrap-up/02_sneak-peek-of-the-next-course.mp4 8.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/006 Apply List Comprehension to the U.S. States Game.mp4 8.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 4 - Tools and Techniques/4.1 Module 4 Overview - Tools and Techniques.mp4 8.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 05 - System Hacking/5.13 Malware Countermeasures.mp4 8.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 3 - OSINT Playground/3.5 Validation (True or False).mp4 8.2 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 20 Configuration Management/004. 20.3 Understanding CICD.mp4 8.2 MB
  • Splunk Training/2. Splunk Fundamentals 2/2. Introduction.mp4 8.2 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/4. Filesystems/1. Filesystem Types/14. Linux- Filesystem Repair - Google - Coursera.mp4 8.2 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/02_introduction-to-python-programming-in-cybersecurity/1. Welcome to week 1.mp4 8.2 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 21 An Introduction to Containers/009. Lesson 21 Lab Solution Running Containers.mp4 8.2 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/02_basic-python-syntax/02_functions/05_the-principles-of-code-reuse.mp4 8.2 MB
  • Protocol Deep Dive/DHCP - Deep Dive/02. Course Overview and DHCPv4/02_04-DHCP Lease Time Events.mp4 8.2 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/6. Troubleshooting/3. Documentation/3. Documenting in Ticketing Systems.mp4 8.2 MB
  • Protocol Deep Dive/DNS - Deep Dive/03. Configuring DNS for Clients/07. Demo-DNS in DHCP.mp4 8.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/015 Variable Naming.mp4 8.1 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 13 Networking and Database/001. Learning objectives.mp4 8.1 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/04_managing-data-and-processes/04_module-review/01_module-4-wrap-up-managing-data-and-processes.mp4 8.1 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/04.New Multicast Designs with IGMPv3/0401.Why Wasn’t IGMPv2 Enough.mp4 8.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 6 - Post-Exploitation/6.12 Module 6 Summary.mp4 8.1 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/2. Basic Commands/14. Windows- Moving and Renaming Files, Directories - Google - Coursera.mp4 8.1 MB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/4. Cybersecurity tools and programming languages/04_congratulations-on-completing-course-1/1. Course wrap-up.mp4 8.1 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 14 - Conclusion/14.1 Course Summary.mp4 8.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 03 - Hard Disks & File Systems/3.4 Hard Disks and File Systems Part 4.mp4 8.0 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/2. Network monitoring and analysis/02_capture-and-view-network-traffic/3. Interpret network communications with packets.mp4 8.0 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 12 Compute and Storage/001. Learning objectives.mp4 8.0 MB
  • Protocol Deep Dive/SSH and Telnet - Deep Dive/02.The Secure Shell (SSH) Protocol/0201.Communication Protocol Terms.mp4 8.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 10 - Collection/10.4 Data from Local System.mp4 8.0 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 10 - Collection/10.4 Data from Local System.mp4 8.0 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/05 - Improving Confidentiality with SSH FTP (SFTP)/32 - Demo - Uploading Files with SFTP.mp4 8.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 11 - Command and Control/11.3 Custom Command and Control Protocol.mp4 8.0 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 11 - Command and Control/11.3 Custom Command and Control Protocol.mp4 8.0 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/07_final-project/01_getting-ready-for-the-final-project/01_intro-to-your-final-project.mp4 8.0 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Introduction/001. Certified Cloud Security Professional (CCSP) Introduction.mp4 8.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Module 3 - Conclusion/3.1 Capstone Lab Navigation.mp4 7.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Module 3 - Conclusion/3.1 Capstone Lab Navigation.mp4 7.9 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/01_hello-python/05_module-review/01_first-steps-wrap-up.mp4 7.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Module 2 - Lab Setup/2.1 Lab Setup Part 1.mp4 7.9 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/01_find-and-prepare-for-a-job-in-cybersecurity/1. Welcome to week 5.mp4 7.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/009 Challenge 4 - Keeping Track of the Player's Lives.mp4 7.9 MB
  • Protocol Deep Dive/DHCP - Deep Dive/04. Troubleshooting DHCP/04_01-Overview of DHCP Troubleshooting.mp4 7.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/004 [Interactive Coding Exercise] Filtering Even Numbers.mp4 7.9 MB
  • Protocol Deep Dive/ICMP - Deep Dive/04 - Conquering the Fear of Fragmentation/20 - Demo - MTU Discovery Using Ping Sweeping.mp4 7.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/05. Malware Threats/Module 3 - Conclusion/3.1 Conclusion.mp4 7.9 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 6 Describe Azure storage services/001. Learning objectives.mp4 7.8 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 3 Managing Services/009. 3.8 Mounting File Systems with Systemd.mp4 7.8 MB
  • Job Tips/Writing a Tech Resume/6. Should You Include/6.1 Summary or objective.mp4 7.8 MB
  • Protocol Deep Dive/OSPF - Deep Dive/05 - Introducing Multi-area OSPF (Hierarchy)/31 - Differentiating the different OSPF Area Types.mp4 7.7 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/02_overview-of-intrusion-detection-systems-ids/5. Examine Suricata logs.mp4 7.7 MB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/2. The evolution of cybersecurity/03_review-the-evolution-of-cybersecurity/1. Wrap-up.mp4 7.7 MB
  • Protocol Deep Dive/IPsec - Deep Dive/05 - Securing the Network with IKEv1/22 - IKEv1 Quick Mode.mp4 7.7 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/04.New Multicast Designs with IGMPv3/0405.Analysis IGMPv3 Source-specific Multicast (SSM) LeaveQuery.mp4 7.7 MB
  • Protocol Deep Dive/OSPF - Deep Dive/05 - Introducing Multi-area OSPF (Hierarchy)/38 - Viewing the NSSA LSA (Type 7).mp4 7.7 MB
  • Protocol Deep Dive/DHCP - Deep Dive/03. Understanding DHCPv6/03_02-Compare and Contrast DHCPv4 and DHCPv6.mp4 7.7 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/1. Introduction to IT/1. Introduction to IT Support/3. What does an IT Support Specialist do.mp4 7.7 MB
  • Protocol Deep Dive/ICMP - Deep Dive/03 - Using Traceroute/15 - Demo - Troubleshooting with Traceroute.mp4 7.7 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/04_local-and-wide-network-communication/1. IP addresses and network communication.mp4 7.7 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/001. Module introduction.mp4 7.7 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/4. Filesystems/1. Filesystem Types/8. Linux- Swap - Google - Coursera.mp4 7.7 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/06.New Multicast Designs with MLDv2/0606.Analysis MLDv2 Source-specific Multicast (SSM) LeaveQuery.mp4 7.6 MB
  • Protocol Deep Dive/ICMP - Deep Dive/03 - Using Traceroute/14 - Analysis - Traceroute ICMP Port-unreachable.mp4 7.6 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 10 Managing File Compression and Backup/008. Lesson 10 Lab Solution Managing Backups.mp4 7.6 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/2. Basic Commands/7. Linux- Changing Directories in Bash - Google - Coursera.mp4 7.6 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/03_network-communication/1. Introduction to network communication.mp4 7.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 08 - Web Attack Investigation/8.1 Web Attack Investigation Part 1.mp4 7.6 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 1 Describe Cloud Concepts/Lesson 2 Describe the benefits of using cloud services/005. 2.4 Explain manageability in the cloud.mp4 7.6 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 10 Identity and Access Management Solutions/007. 10.6 Cloud Access Security Brokers.mp4 7.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/22 - Day 22 - Intermediate - Build Pong The Famous Arcade Game/001 Day 22 Goals what you will make by the end of the day.mp4 7.6 MB
  • Protocol Deep Dive/ICMP - Deep Dive/05 - Designing Network Security for ICMP/25 - Demo - A Basic and Functional Firewall Policy.mp4 7.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 13 - Conclusion/13.1 Conclusion.mp4 7.6 MB
  • Protocol Deep Dive/IPsec - Deep Dive/Exercise Files/02/learning-ipsec-fundamentals-slides.pdf 7.6 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/1. Introduction to detection and incident response/01_get-started-with-the-course/1. Introduction to Course 6.mp4 7.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.17 Hardening the System Part 1.mp4 7.5 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/2. The Linux operating system/02_linux-distributions/2. KALI LINUX.mp4 7.5 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/2. Write effective Python code/01_introduction-to-functions/3. Create a basic function.mp4 7.5 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/06 - Simplifying File Transfers with Trivial FTP (TFTP)/38 - Demo - TFTP Downloads in Action.mp4 7.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 06 - Network and Perimeter Hacking/6.13 WAF Detection with WAFW00F (Demo).mp4 7.5 MB
  • Books/CompTIA/Network+/CompTIA Network+ Practice Tests - Exam N10-008, 2nd Edition.epub 7.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 13 - Mobile/13.3 Mobile Part 3.mp4 7.5 MB
  • Job Tips/Writing a Tech Resume/6. Should You Include/6.4 Photo.mp4 7.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 13 - Impact/13.2 Account Access Removal.mp4 7.4 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 13 - Impact/13.2 Account Access Removal.mp4 7.4 MB
  • Protocol Deep Dive/TCP & UDP - Deep Dive/03.TCP UDP Theory of Operation/03.08.UDP Breakdown.mp4 7.4 MB
  • Protocol Deep Dive/OSPF - Deep Dive/03 - Forming Basic OSPF Relationships/13 - Inspecting the OSPF Packet - OSPF Hello Packet.mp4 7.4 MB
  • Protocol Deep Dive/ARP - Deep Dive/03 Understanding InARP, GARP, RARP, and Proxy ARP/07 ARP Duplicate IP Detection.mp4 7.4 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/02_security-frameworks-and-controls/05_review-security-frameworks-and-controls/1. Wrap-up.mp4 7.4 MB
  • Job Tips/Writing a Tech Resume/1. Logistics of a Technical Resume/1.3 The difference between a resume and a CV.mp4 7.4 MB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 04 - The Expert Report/4.5 Supplemental Reports.mp4 7.4 MB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/4. Cybersecurity tools and programming languages/01_important-cybersecurity-tools/1. Welcome to week 4.mp4 7.4 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/02_introduction-to-networks/6. Network tools.mp4 7.4 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/05_object-oriented-programming-optional/01_object-oriented-programming-optional/01_oop-introduction-optional.mp4 7.4 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 3 Describe Azure Management and Governance/Lesson 10 Describe features and tools for managing and deploying resources/004. 10.3 Describe Azure Arc.mp4 7.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 03 - Footprinting and Reconnaissance/3.3 DNS Footprinting.mp4 7.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 12 - Exfiltration/12.5 Exfiltration Case Study.mp4 7.3 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 12 - Exfiltration/12.5 Exfiltration Case Study.mp4 7.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 06 - Network and Perimeter Hacking/6.1 Introduction to Sniffing.mp4 7.3 MB
  • Job Tips/Writing a Tech Resume/7. Having a Professinoal Online Presence/7.2 GitHub.mp4 7.3 MB
  • Protocol Deep Dive/ICMP - Deep Dive/07 - Exploring the IPv6 Toolset/37 - Analysis - IPv6 Traceroute Packets.mp4 7.3 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 6 Legal, Risk, and Compliance/Lesson 14 Cloud Audits, Methodologies, and Contracts/002. 14.1 Audit Controls, Reports, and Their Impact.mp4 7.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 06 - Operating System Forensics/6.2 Operating System Forensics Part 2 (FI).mp4 7.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.5 Spoofing and Redirection.mp4 7.3 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/03.Better Performance with IGMPv2/0305.Analysis IGMPv2 Leave Group and Group-specific Query.mp4 7.3 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/2. Protect organizational assets/03_authentication-authorization-and-accounting/5. Tim - Finding purpose in protecting assets.mp4 7.3 MB
  • Protocol Deep Dive/ICMP - Deep Dive/07 - Exploring the IPv6 Toolset/40 - IPv6 Security Summary and Demo.mp4 7.3 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/02_security-frameworks-and-controls/01_more-about-frameworks-and-controls/04_the-relationship-between-frameworks-and-controls_physical-access-control.pdf 7.3 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/05_Resources/04_course-2-resources-and-citations/01__physical-access-control.pdf 7.3 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/05 - Improving Confidentiality with SSH FTP (SFTP)/29 - Basics of Secure Shell (SSH) in the Context of SFTP.mp4 7.3 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/5. Process Management/1. Life of a Process/4. Linux- Process Creation and Termination - Google - Coursera.mp4 7.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/04. Social Engineering/Module 2 - Social Engineering Labs/2.1 Phishing Lab Overview.mp4 7.3 MB
  • Protocol Deep Dive/OSPF - Deep Dive/05 - Introducing Multi-area OSPF (Hierarchy)/37 - Decoding the NSSA LSA (Type 7).mp4 7.2 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 19 Using Git for Version Control/008. 19.7 Using gitignore.mp4 7.2 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/8. Test Reports_ Presenting Experiments and Diagnostics/8.2 Developing a Test Report.mp4 7.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.6 Hidden Users.mp4 7.2 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.6 Hidden Users.mp4 7.2 MB
  • Protocol Deep Dive/IPsec - Deep Dive/08 - Finalizing IPsec Concepts/35 - Course Review.mp4 7.2 MB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 09 - Expert Testimony/9.2 Consulting vs. Testifying.mp4 7.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 04 - Scanning and Enumeration/4.2 Ping Command (Demo).mp4 7.2 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 6 Managing File Systems/005. 6.4 Monitoring Available Disk Space.mp4 7.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 13 - Impact/13.4 Impact Case Study.mp4 7.2 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 13 - Impact/13.4 Impact Case Study.mp4 7.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.10 Application Attacks.mp4 7.2 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 2 Network Management/006. 2.5 Understanding Network Bridges.mp4 7.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 08 - Discovery/8.4 System Owner or User Discovery.mp4 7.2 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 08 - Discovery/8.4 System Owner or User Discovery.mp4 7.2 MB
  • Protocol Deep Dive/SNMP - Deep Dive/02 - Overview of SNMP/03 - SNMP Versions.mp4 7.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.9 MAC Message Authentication Code.mp4 7.2 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/4. Engage with the cybersecurity community/01_reliable-sources-go-a-long-way/1. Welcome to week 4.mp4 7.2 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/1. Introduction to asset security/05_review-introduction-to-asset-security/1. Wrap-up.mp4 7.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 05 - System Hacking/5.11 Malware - Worms.mp4 7.2 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 11 Managing User Interfaces/004. 11.3 Understanding Graphical Desktops.mp4 7.2 MB
  • Protocol Deep Dive/DHCP - Deep Dive/03. Understanding DHCPv6/03_05-Configuring DHCPv6 on Windows.mp4 7.1 MB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 09 - Expert Testimony/9.5 Redirect Examination.mp4 7.1 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/06_final-project/01_writing-a-script-from-the-ground-up/06_putting-it-all-together.mp4 7.1 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/7. Incident Reports_ Documenting When Something Goes Wrong/7.5 The Ethics of Incident Reports.mp4 7.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/002 What is Authentication.mp4 7.1 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 7 Describe Azure identity, access, and security/007. 7.6 Describe Microsoft Defender for Cloud.mp4 7.1 MB
  • Protocol Deep Dive/QUIC - Deep Dive/03. Analyzing QUIC with Wireshark/14. Connections and Streams.mp4 7.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 3 - Threat Modeling/3.9 Module 3 Summary.mp4 7.1 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/11. Meeting Minutes/11.1 Introduction to Meeting Minutes.mp4 7.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 01 - Course Introduction/1.1 Course Overview.mp4 7.1 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 01 - Course Introduction/1.1 Course Overview.mp4 7.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Module 3 - Conclusion/3.2 Conclusion.mp4 7.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Module 3 - Conclusion/3.2 Conclusion.mp4 7.0 MB
  • Protocol Deep Dive/SNMP - Deep Dive/06 - Troubleshooting Using SNMP/19 - Network Monitoring Discussion.mp4 7.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/003 Challenge 1 - Picking a Random Words and Checking Answers.mp4 7.0 MB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/2. The evolution of cybersecurity/01_the-history-of-cybersecurity/1. Welcome to week 2.mp4 7.0 MB
  • Protocol Deep Dive/ICMP - Deep Dive/06 - Mastering IPv6 Neighbor Discovery/30 - Analysis - IPv6 NS and DAD.mp4 7.0 MB
  • Protocol Deep Dive/TCP & UDP - Deep Dive/05.Troubleshooting TCP UDP Issues/05.04.TCP Issues with MTU MSS.mp4 7.0 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 9 Managing the Boot Procedure/004. 9.3 Managing and Accessing UEFI from Linux.mp4 7.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/12. Intro to Burp Suite Pro/Module 1 - Introduction/1.1 Course Introduction and Objectives.mp4 7.0 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/11. Meeting Minutes/11.2 Developing Meeting Minutes.mp4 7.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Module 12 - Cryptography/12.1 Introduction to Cryptography.mp4 7.0 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/06_congratulations-on-completing-course-3/1. Course wrap-up.mp4 7.0 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/6. Operating Systems in Practice/1. Remote Access/4. Remote Connection File Transfer - Google - Coursera.mp4 7.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 2 - Intelligence Gathering/2.1 Intelligence Gathering Overview.mp4 6.9 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/2. Users and Permissions/2. Permissions/2. Linux- File Permissions - Google - Coursera.mp4 6.9 MB
  • CompTIA/CompTIA IT Fundamentals+ (FC0-U61)/comptia-itfunfc0u61.zip 6.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Module 7 - Conclusion/7.1 Vulnerability Scan Assessment Overview.mp4 6.9 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/03_loops/04_module-review/01_loops-wrap-up.mp4 6.9 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/3. Linux commands in the Bash shell/04_get-help-in-linux/3. Man pages within the shell.mp4 6.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/002 How to use OOP Classes and Objects.mp4 6.9 MB
  • Protocol Deep Dive/DNS - Deep Dive/Exercise Files/04/Mod4-AtNSPrimary-AddRecords.pcapng.gz 6.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 5 - Exploitation/5.10 Module 5 Summary.mp4 6.9 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/07.Troubleshooting and Securing IGMP and MLD/0702.Demo Multicast Traceroute in Action.mp4 6.9 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/06 - Simplifying File Transfers with Trivial FTP (TFTP)/42 - Demo - Attempting to Secure TFTP.mp4 6.9 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 1 Exam Foundation/Lesson 2 Exam Registration and Exam Strategies/004. 2.3 Online Proctoring Registration.mp4 6.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 8 - Summary/8.1 Course Summary.mp4 6.8 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/5. Process Management/1. Life of a Process/1. Module Introduction - Google - Coursera.mp4 6.8 MB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 09 - Expert Testimony/9.3 Direct Examination.mp4 6.8 MB
  • Protocol Deep Dive/DNS - Deep Dive/02. Exploring DNS Terminology and Use Cases/02. Describe the Purpose of DNS.mp4 6.8 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/02_basic-python-syntax/04_module-review/01_basic-syntax-wrap-up.mp4 6.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Module 1 - About the Exam and Certification/1.3 CASP+ Course Overview.mp4 6.8 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/03_network-communication/3. The four layers of the TCPIP model.mp4 6.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 11 - Command and Control/11.5 Command and Control Case Study.mp4 6.8 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 11 - Command and Control/11.5 Command and Control Case Study.mp4 6.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/69 - Day 69 - Advanced - Blog Capstone Project Part 4 - Adding Users/002 Starting-Files-blog-with-users-start.zip 6.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/67 - Day 67 - Advanced - Blog Capstone Project Part 3 - RESTful Routing/002 Starting-Files-RESTful-blog-start.zip 6.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/008 [Interactive Coding Exercise] Debugging Odd or Even.mp4 6.7 MB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/05_testing-in-python/05_module-review/01_module-5-wrap-up-testing-in-python.mp4 6.7 MB
  • Protocol Deep Dive/ICMP - Deep Dive/03 - Using Traceroute/13 - Analysis - Traceroute ICMP TTL-exceeded.mp4 6.7 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/05.The Future of Neworking IPv6 Multicast and MLDv1/0505.Analysis MLDv1 Done and Group-specific Query.mp4 6.7 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 4 Describe the core architectural components of Azure/001. Learning objectives.mp4 6.7 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 7 Describe Azure identity, access, and security/006. 7.5 Describe Zero-Trust and defense in depth.mp4 6.7 MB
  • Job Tips/Writing a Tech Resume/8. Conclusion/8.1 Next steps with your resume.mp4 6.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 7 - Identity and Access Management/7.9 Auditing and Wrap-Up.mp4 6.7 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/3. File & Text Manipulation/4. Linux- Modifying Text Files - Google - Coursera.mp4 6.7 MB
  • Protocol Deep Dive/DNS - Deep Dive/06. Securing DNS/25. Preventing Common DNS Attacks.mp4 6.6 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/02 - Starting at the Beginning - FTP Active Mode/11 - Demo - Verifying Our Active FTP Security Policy.mp4 6.6 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 1 Managing User Related Security/007. Lesson 1 Lab Solution Managing sudo.mp4 6.6 MB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 08 - Providing Depositions and Affidavits/8.2 Affidavits vs. Declarations.mp4 6.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/Cybereason Operation Cobalt Kitty - Original Report.pdf 6.6 MB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/Cybereason_Operation_Cobalt_Kitty_-_Original_Report.pdf 6.6 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 10 Managing File Compression and Backup/002. 10.1 Understanding Backup Strategies.mp4 6.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.3 Algorithms and Keys.mp4 6.6 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Summary/001. AWS Certified Cloud Practitioner (CLF-C01) Summary.mp4 6.6 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 7 Describe Azure identity, access, and security/004. 7.3 Describe Azure AD Conditional Access.mp4 6.6 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/2. Basic Commands/13. Linux- Copying Files and Directories - Google - Coursera.mp4 6.6 MB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 03 - Investigative Process/3.4 Drawing Conclusions.mp4 6.6 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/7. Incident Reports_ Documenting When Something Goes Wrong/7.1 Introduction to Incident Reports.mp4 6.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 3 - OSINT Playground/3.1 Module 3 Overview - OSINT Playground.mp4 6.6 MB
  • Protocol Deep Dive/DNS - Deep Dive/05. Troubleshooting DNS/21. Identifying Single Points of Failure .mp4 6.5 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/02_introduction-to-networks/3. What are networks.mp4 6.5 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 3 Describe Azure Management and Governance/Lesson 10 Describe features and tools for managing and deploying resources/001. Learning objectives.mp4 6.5 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 12 Compute and Storage/002. 12.1 Core Service Categories.mp4 6.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 12 - Exfiltration/12.3 Data Compressed.mp4 6.5 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 12 - Exfiltration/12.3 Data Compressed.mp4 6.5 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/07 - Modernizing FTP with IPv6/51 - Demo - Retesting FTPS Using IPv6.mp4 6.5 MB
  • Protocol Deep Dive/DHCP - Deep Dive/02. Course Overview and DHCPv4/02_05-DHCPv4 Options Processing.mp4 6.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.9 Integrity and Availability Threats and Mitigation.mp4 6.5 MB
  • Protocol Deep Dive/SNMP - Deep Dive/05 - Monitoring Systems With SNMP/13 - Installing And Configuring An NMS.mp4 6.5 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 7 Configuring Logging/008. Lesson 7 Lab Solution Configuring Logging.mp4 6.4 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/03.Better Performance with IGMPv2/0304.Analysis IGMPv2 General Query and Membership Report.mp4 6.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 7 - Reporting/7.2 Reporting Structure.mp4 6.4 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 6 Managing File Systems/010. Lesson 6 Lab Solution Managing File Systems.mp4 6.4 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/3. Interacting via Email/3.1 Email's Role in the Workplace.mp4 6.4 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/07 - Modernizing FTP with IPv6/53 - Demo - Retesting SFTP Using IPv6.mp4 6.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/04. Social Engineering/Module 3 - Conclusion/3.1 Conclusion.mp4 6.4 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 5 Describe Azure compute and networking services/001. Learning objectives.mp4 6.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/55 - Day 55 - Intermediate+ HTML & URL Parsing in Flask and the Higher Lower Game/001 Day 55 Goals what you will make by the end of the day.mp4 6.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 12 - Exfiltration/12.4 Data Transfer Size or Limits.mp4 6.4 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 12 - Exfiltration/12.4 Data Transfer Size or Limits.mp4 6.4 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/2. Users and Permissions/1. Users and Groups/6. Linux- Passwords - Google - Coursera.mp4 6.4 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/2. Escalate incidents/01_escalation-in-cybersecurity/1. Welcome to week 2.mp4 6.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.3 Malware.mp4 6.3 MB
  • Protocol Deep Dive/SNMP - Deep Dive/02 - Overview of SNMP/02 - Overview Of SNMP.mp4 6.3 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 6 Managing File Systems/002. 6.1 Understanding File Systems.mp4 6.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/19 - Day 19 - Intermediate - Instances, State and Higher Order Functions/001 Day 19 Goals what we will make by the end of the day.mp4 6.3 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/07.Troubleshooting and Securing IGMP and MLD/0706.Analysis Failed Multicast Traceroute Packets.mp4 6.3 MB
  • Protocol Deep Dive/IPsec - Deep Dive/06 - Establishing IPsec with IKEv2/25 - IKEv2 Benefits.mp4 6.3 MB
  • Protocol Deep Dive/OSPF - Deep Dive/04 - Discussing Simple OSPF Communication Blocks/21 - Digging into the Router LSA (Type 1).mp4 6.3 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/3. Linux commands in the Bash shell/04_get-help-in-linux/2. The Linux community.mp4 6.3 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/2. The Linux operating system/03_the-shell/1. Introduction to the shell.mp4 6.3 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 18 An Introduction to Bash Shell Scripts/002. 18.1 Understanding Bash Shell Scripts.mp4 6.3 MB
  • Protocol Deep Dive/DHCP - Deep Dive/02. Course Overview and DHCPv4/02_01-Course Overview.mp4 6.3 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/03 - Simplifying Operations with FTP Passive Mode/16 - Analysis - The PASV Exchange and Passive FTP Downloads.mp4 6.2 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/07 - Modernizing FTP with IPv6/46 - Demo - Active FTP with IPv6.mp4 6.2 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 9 Managing the Boot Procedure/003. 9.2 Understanding BIOS and UEFI.mp4 6.2 MB
  • Protocol Deep Dive/ICMP - Deep Dive/06 - Mastering IPv6 Neighbor Discovery/28 - IPv6 Neighbor Discovery Operations.mp4 6.2 MB
  • Protocol Deep Dive/QUIC - Deep Dive/04. Troubleshooting the QUIC Protocol/20. Tools for Testing and Validating QUIC.mp4 6.2 MB
  • Protocol Deep Dive/IPsec - Deep Dive/02 - Learning IPsec Fundamentals/02 - Course Introduction.mp4 6.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Module 1 - Introduction/1.2 Intro-Disclaimer(KL).mp4 6.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Module 1 - Introduction/1.2 Intro-Disclaimer(KL).mp4 6.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.10 Module 6 Summary.mp4 6.2 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.10 Module 6 Summary.mp4 6.2 MB
  • Protocol Deep Dive/ICMP - Deep Dive/03 - Using Traceroute/09 - How Traceroute Really Works.mp4 6.2 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/6. Operating Systems in Practice/4. Operating System Deployment/1. Imaging Software - Google - Coursera.mp4 6.2 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/10. Progress Reports_ Keeping Supervisors Informed About a Project/10.1 Introduction to Progress Reports.mp4 6.2 MB
  • Protocol Deep Dive/OSPF - Deep Dive/03 - Forming Basic OSPF Relationships/15 - Inspecting the OSPF Packet - OSPF Link State Request Packet.mp4 6.2 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/03.Better Performance with IGMPv2/0303.Demo IGMPv2 Operations.mp4 6.2 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 3 Describe Azure Management and Governance/Lesson 9 Describe features and tools for governance and compliance/002. 9.1 Describe Azure Blueprints.mp4 6.2 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/12. Internal Social Media Platforms_ Using Office Instant Messaging/12.2 Using Office Social Messaging Well.mp4 6.2 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/05_congratulations-on-completing-course-6/1. Course wrap-up.mp4 6.1 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 4 Describe the core architectural components of Azure/003. 4.2 Explain availability zones.mp4 6.1 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 1 Describe Cloud Concepts/Lesson 3 Describe cloud service types/003. 3.2 Describe platform as a service (PaaS).mp4 6.1 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 20 Configuration Management/002. 20.1 Understanding Configuration Management.mp4 6.1 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/5. Data Recovery & Backups/1. Planning for Data Recovery/1. Module Introduction - Google - Coursera.mp4 6.1 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/1. Introduction to detection and incident response/02_the-incident-response-lifecycle/1. Welcome to week 1.mp4 6.1 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/05_Resources/04_course-2-resources-and-citations/01__NIST.SP.800-53r5.pdf 6.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 11 - Malware/11.2 Malware Part 2 (FI).mp4 6.1 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 19 Using Git for Version Control/007. 19.6 Merging Changes.mp4 6.1 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 11 Build and Implement a Physical and Logical Cloud Infrastructure/008. 11.7 Operating System Hardening.mp4 6.0 MB
  • Protocol Deep Dive/DNS - Deep Dive/Exercise Files/03/Mod3-AtClient-Cache.pcapng.gz 6.0 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 2 Cloud Data Security/Lesson 3 The Cloud Data Lifecycle/007. 3.6 Phase 6 Destroy.mp4 6.0 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/02_introduction-to-python-programming-in-cybersecurity/6. Akash - Python and the cybersecurity professional.mp4 6.0 MB
  • Protocol Deep Dive/IPsec - Deep Dive/07 - Implementing IPsec in IPv6/30 - IPsec in IPv6.mp4 6.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/59 - Day 59 - Advanced - Blog Capstone Project Part 2 - Adding Styling/008 Solution-Completed-Code-day-59-end-updated.zip 6.0 MB
  • Protocol Deep Dive/QUIC - Deep Dive/02. An Introduction to QUIC/02. Introduction - Why Learn QUIC.mp4 6.0 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 9 Security Support Resources/001. Learning objectives.mp4 6.0 MB
  • Protocol Deep Dive/EIGRP - Deep Dive/03 - Digging into EIGRP Relationships/09 - Introduction to the EIGRP Packet.mp4 6.0 MB
  • Protocol Deep Dive/ICMP - Deep Dive/02 - Using Ping/06 - Analysis - ICMP Echo-reply.mp4 5.9 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/06.New Multicast Designs with MLDv2/0605.Analysis MLDv2 Any-source Multicast (ASM) LeaveQuery.mp4 5.9 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/5. Understanding Informal Reports/5.1 Indroducing Informal Reports.mp4 5.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/23 - Day 23 - Intermediate - The Turtle Crossing Capstone Project/008 Solution to Step 5 - Detect when the Turtle collides with a Car squish.mp4 5.9 MB
  • Protocol Deep Dive/OSPF - Deep Dive/01 - Course Overview/01 - Course Overview.mp4 5.9 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 16 Managing SELinux and AppArmor/002. 16.1 Understanding the Need for Mandatory Access Control (MAC).mp4 5.9 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/13. Your Main Takeaways_ Conclusion and Additional Resources/13.2 Where to Go for Additional Resources.mp4 5.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 14 - Conclusion/14.1 Course Summary.mp4 5.9 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 1 Describe Cloud Concepts/Lesson 2 Describe the benefits of using cloud services/004. 2.3 Describe security and governance.mp4 5.9 MB
  • Protocol Deep Dive/ICMP - Deep Dive/05 - Designing Network Security for ICMP/23 - Demo - An Incomplete Firewall Policy.mp4 5.9 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/003 Turtle Challenge 1 - Draw a Square.mp4 5.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 5 - Exploitation/5.1 Exploitation Overview.mp4 5.8 MB
  • Protocol Deep Dive/DNS - Deep Dive/Exercise Files/03/Mod3-AtNSPrimary-Cache.pcapng.gz 5.8 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/2. The Traits and Fucntions of Workplace Writing/2.7 Professional Writing Trait Six_ Appearance.mp4 5.8 MB
  • Protocol Deep Dive/OSPF - Deep Dive/06 - Troubleshooting Common OSPF Issues/41 - Troubleshooting Common OSPF Issues - Core1.mp4 5.8 MB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 06 - The Trial Process/6.1 Judge vs. Jury Trial.mp4 5.8 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/3. Secure against network intrusions/01_introduction-to-network-intrusion-tactics/2. The case for securing networks.mp4 5.8 MB
  • Protocol Deep Dive/QUIC - Deep Dive/04. Troubleshooting the QUIC Protocol/19. Common Problems with QUIC.mp4 5.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Module 3/3.8 Discovering XSS.mp4 5.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Module 15 - Course Summary/15.1 Course Summary.mp4 5.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/010 You are already in the top 50%.mp4 5.8 MB
  • Protocol Deep Dive/ICMP - Deep Dive/03 - Using Traceroute/12 - Analysis - Traceroute UDP Probe.mp4 5.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 3 - Threat Modeling/3.1 Threat Modeling Overview.mp4 5.7 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 3 Describe Azure Management and Governance/Lesson 8 Describe cost management in Azure/001. Learning objectives.mp4 5.7 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/Exercise Files/protocol-deep-dive-igmp-mld.zip 5.7 MB
  • Protocol Deep Dive/EIGRP - Deep Dive/07 - Reviewing EIGRP Load-balancing/30 - EIGRP Load-balancing Basics.mp4 5.7 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/1. Introduction to detection and incident response/04_incident-response-tools/1. Incident response tools.mp4 5.7 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/02_security-frameworks-and-controls/01_more-about-frameworks-and-controls/1. Welcome to week 2.mp4 5.7 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 1 Describe Cloud Concepts/Lesson 3 Describe cloud service types/002. 3.1 Describe infrastructure as a service (IaaS).mp4 5.7 MB
  • Protocol Deep Dive/ICMP - Deep Dive/02 - Using Ping/03 - Demo - Basic Ping in Action.mp4 5.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.1 What is Defense Evasion.mp4 5.6 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.1 What is Defense Evasion.mp4 5.6 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 3 Describe Azure Management and Governance/Lesson 9 Describe features and tools for governance and compliance/003. 9.2 Describe Azure Policy.mp4 5.6 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/1. Introduction to detection and incident response/04_incident-response-tools/3. Intrusion detection systems.mp4 5.6 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/02.Introduction to IPv4 Multicast and IGMPv1/0201.What How Why.mp4 5.6 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/02 - Starting at the Beginning - FTP Active Mode/03 - Moving Files with Active FTP.mp4 5.6 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/2. Basic Commands/5. Windows- Changing Directories in the GUI - Google - Coursera.mp4 5.6 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 1 Describe Cloud Concepts/Lesson 1 Describe cloud computing/001. Learning objectives.mp4 5.6 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 6 Managing File Systems/007. 6.6 Repairing File Systems.mp4 5.6 MB
  • Protocol Deep Dive/OSPF - Deep Dive/04 - Discussing Simple OSPF Communication Blocks/25 - Digging into the External LSA (Type 5).mp4 5.6 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/01_introduction-to-sql-and-databases/1. Welcome to week 4.mp4 5.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/001 Day 32 Goals what we will make by the end of the day.mp4 5.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.1 What is Execution.mp4 5.5 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.1 What is Execution.mp4 5.5 MB
  • Protocol Deep Dive/TCP & UDP - Deep Dive/05.Troubleshooting TCP UDP Issues/05.03.TCP DNAT Issues.mp4 5.5 MB
  • Protocol Deep Dive/DNS - Deep Dive/03. Configuring DNS for Clients/10. Comparing DNS Privacy Methods.mp4 5.5 MB
  • Protocol Deep Dive/QUIC - Deep Dive/03. Analyzing QUIC with Wireshark/12. The QUIC Handshake.mp4 5.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Module 2 - Data Types and Logic/2.12 Summary and Review - IP.mp4 5.5 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/02 - Starting at the Beginning - FTP Active Mode/08 - Demo - Active FTP File Upload.mp4 5.5 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 3 Managing Services/002. 3.1 Understanding Systemd.mp4 5.5 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/04_use-playbooks-to-respond-to-incidents/04_congratulations-on-completing-course-2/1. Course wrap-up.mp4 5.5 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 21 An Introduction to Containers/002. 21.1 Understanding Containers.mp4 5.5 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 9 Managing the Boot Procedure/012. Lesson 9 Lab Solution Managing Initramfs.mp4 5.5 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/6. Operating Systems in Practice/1. Remote Access/1. Introduction - Google - Coursera.mp4 5.5 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Module 3 - Data Management and Processing/3.4 Storage and Integration.mp4 5.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 4 - Tools and Techniques/4.7 Module 4 Summary.mp4 5.4 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/001. Module introduction.mp4 5.4 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 3 Describe Azure Management and Governance/Lesson 11 Describe monitoring tools/001. Learning objectives.mp4 5.4 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/6. Field and Trip Reports/6.2 Different Types of Trip Reports.mp4 5.4 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 4 Basic Hardware Management/009. Lesson 4 Lab Solution Monitoring Hardware.mp4 5.4 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/2. The Traits and Fucntions of Workplace Writing/2.2 Professional Writing Trait One_ Clarity.mp4 5.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/12 - Day 12 - Beginner - Scope & Number Guessing Game/002 Does Python Have Block Scope.mp4 5.4 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/4. Python in practice/01_python-for-automation/1. Welcome to week 4.mp4 5.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Module 2 - Indirect Addressing, Stack, Arrays and Strings/2.4 Slack Intro Part 2.mp4 5.4 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/2. Basic Commands/17. Linux- Removing Files _ Directories - Google - Coursera.mp4 5.4 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/05 - Improving Confidentiality with SSH FTP (SFTP)/30 - SFTP Session Initialization and Common Message Operations.mp4 5.4 MB
  • Protocol Deep Dive/OSPF - Deep Dive/Exercise Files/05/introducing-multi-area-ospf-hierarchy-slides.pdf 5.4 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/3. Linux commands in the Bash shell/01_navigate-the-linux-file-system/1. Welcome to week 3.mp4 5.4 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/2. Network operations/01_introduction-to-network-protocols/6. Wireless protocols.mp4 5.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 4 - Vulnerability Analysis/4.7 Module 4 Summary.mp4 5.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/003 [Interactive Coding Exercise] Heads or Tails.mp4 5.4 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/03.Better Performance with IGMPv2/0306.Demo Basic IPv4 Multicast Flow.mp4 5.3 MB
  • Protocol Deep Dive/OSPF - Deep Dive/03 - Forming Basic OSPF Relationships/08 - Reviewing the Requirements to Form an OSPF Neighborship.mp4 5.3 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/9. Investigative Reports_ Communicating Different Options/9.1 Introduction to Investigative Reports.mp4 5.3 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 6 Legal, Risk, and Compliance/Lesson 14 Cloud Audits, Methodologies, and Contracts/008. 14.7 Supply Chain Management.mp4 5.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/19 - Day 19 - Intermediate - Instances, State and Higher Order Functions/004 Object State and Instances.mp4 5.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 5 - Sock Puppets/5.3 How to Spot a Sock Puppet.mp4 5.3 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 4 Describe the core architectural components of Azure/005. 4.4 Describe Azure resources and resource groups.mp4 5.3 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 8 Managing and Monitoring Performance/005. 8.4 Managing Process Priority and Cgroups.mp4 5.3 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 20 Configuration Management/003. 20.2 Understanding Configuration Management Solutions.mp4 5.3 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 14 Securing Linux/008. Lesson 14 Lab Solution Configuring Auditing.mp4 5.3 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/2. Write effective Python code/01_introduction-to-functions/1. Welcome to week 2.mp4 5.2 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/01_overview-of-logs/1. Welcome to week 4.mp4 5.2 MB
  • Protocol Deep Dive/ICMP - Deep Dive/07 - Exploring the IPv6 Toolset/35 - Analysis - IPv6 Ping Packets.mp4 5.2 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/2. Basic Commands/9. Linux- Make Directories in Bash - Google - Coursera.mp4 5.2 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 6 Describe Azure storage services/003. 6.2 Describe storage tiers.mp4 5.2 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 11 Managing User Interfaces/003. 11.2 Graphics Server Installation and Configuration.mp4 5.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/002 Download PyCharm for Windows or Mac.mp4 5.2 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 1 Describe Cloud Concepts/Lesson 2 Describe the benefits of using cloud services/003. 2.2 Define reliability and predictability.mp4 5.2 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/04 - Protecting Data with FTP Secure (FTPS)/25 - Demo - FTPS File Uploads in Action.mp4 5.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 13 - Impact/13.3 Defacement.mp4 5.2 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 13 - Impact/13.3 Defacement.mp4 5.2 MB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/06_final-project/01_writing-a-script-from-the-ground-up/07_using-graded-jupyter-notebooks.mp4 5.2 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/2. The Traits and Fucntions of Workplace Writing/2.8 Professional Writing Trait Seven_ Accuracy.mp4 5.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/1.2 Slide Handout.pdf 5.2 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 1 Describe Cloud Concepts/001. Module introduction.mp4 5.1 MB
  • Protocol Deep Dive/QUIC - Deep Dive/02. An Introduction to QUIC/07. QUIC - The Pathway to HTTP 3.mp4 5.1 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/3. Work with strings and lists/01_working-with-strings/1. Welcome to week 3.mp4 5.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.1 What is Privilege Escalation.mp4 5.1 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.1 What is Privilege Escalation.mp4 5.1 MB
  • Protocol Deep Dive/IPsec - Deep Dive/02 - Learning IPsec Fundamentals/04 - What Is IPsec.mp4 5.1 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 5 Describe Azure compute and networking services/007. 5.6 Define public and private endpoints.mp4 5.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.10 Module 4 Summary.mp4 5.1 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.10 Module 4 Summary.mp4 5.1 MB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 07 - Rules of Evidence and Procedure/7.4 State and Local Rules.mp4 5.1 MB
  • Protocol Deep Dive/ICMP - Deep Dive/06 - Mastering IPv6 Neighbor Discovery/31 - Analysis - IPv6 NA Packets.mp4 5.1 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 4 Technology/Lesson 10 AWS Cloud Deployment and Operations/001. Learning objectives.mp4 5.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 6 - Post-Exploitation/6.1 Post-Exploitation Overview.mp4 5.0 MB
  • Protocol Deep Dive/QUIC - Deep Dive/Exercise Files/02/an-introduction-to-quic-slides.pdf 5.0 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 16 Managing SELinux and AppArmor/005. 16.4 Troubleshooting AppArmor.mp4 5.0 MB
  • Protocol Deep Dive/QUIC - Deep Dive/04. Troubleshooting the QUIC Protocol/21. Demo-Online Tools for Testing QUIC.mp4 5.0 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/9. Investigative Reports_ Communicating Different Options/9.2 Developing an Investigative Report.mp4 5.0 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/001. Module introduction.mp4 5.0 MB
  • Protocol Deep Dive/ICMP - Deep Dive/04 - Conquering the Fear of Fragmentation/17 - The What, How, and Why of Fragmentation.mp4 5.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/21 - Day 21 - Intermediate - Build the Snake Game Part 2 Inheritance & List Slicing/001 Day 21 Goals what we will make by the end of the day.mp4 5.0 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/5. Process Management/2. Managing Processes/4. Linux- Signals - Google - Coursera.mp4 5.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/23 - Day 23 - Intermediate - The Turtle Crossing Capstone Project/001 Day 23 Goals what you will make by the end of the day.mp4 5.0 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 12 Operational Controls and Standards/009. 12.8 Capacity Management.mp4 5.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/28 - Day 28 - Intermediate - Tkinter, Dynamic Typing and the Pomodoro GUI Application/001 Day 28 Goals what we will make by the end of the day.mp4 5.0 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/07.Troubleshooting and Securing IGMP and MLD/0707.Security Design for IGMP and MLD.mp4 5.0 MB
  • Protocol Deep Dive/IPsec - Deep Dive/04 - Using IPsec in the Enterprise/13 - IPsec Implementations.mp4 4.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 4 - Vulnerability Analysis/4.1 Vulnerability Analysis Overview.mp4 4.9 MB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/3. Protect against threats, risks, and vulnerabilities/03_review-protect-against-threats-risks-and-vulnerabilities/1. Wrap-up.mp4 4.9 MB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 04 - The Expert Report/4.3 Drawing Conclusions Revisited.mp4 4.9 MB
  • Protocol Deep Dive/OSPF - Deep Dive/02 - Covering OSPF Basics/05 - Selecting the Best Route Entry.mp4 4.9 MB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/1. Welcome to the exciting world of cybersecurity/01_get-started-with-the-certificate-program/4. Welcome to week 1.mp4 4.9 MB
  • Job Tips/Writing a Tech Resume/6. Should You Include/6.5 Graduation year.mp4 4.9 MB
  • Books/Cloud/bb-.isc.2.ccsp.certified.cloud.security.professional.official.study.guide.epub 4.9 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 8 Managing and Monitoring Performance/008. Lesson 8 Lab Solution Managing Performance.mp4 4.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.10 Module 5 Summary.mp4 4.9 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.10 Module 5 Summary.mp4 4.9 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/05.The Future of Neworking IPv6 Multicast and MLDv1/0506.Demo Basic IPv6 Multicast Flow.mp4 4.8 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 11 Managing User Interfaces/002. 11.1 Understanding Display Servers.mp4 4.8 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/2. Network operations/01_introduction-to-network-protocols/1. Welcome to week 2.mp4 4.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Resources/Study Guide.pdf 4.8 MB
  • Protocol Deep Dive/NAT - Deep Dive/2.Identifying NAT Components/2.RFCs that Make up the Catalog of NAT Types.mp4 4.8 MB
  • Protocol Deep Dive/ARP - Deep Dive/01 Course Overview/01 Course Overview.mp4 4.8 MB
  • Protocol Deep Dive/SNMP - Deep Dive/03 - Managing Devices With SNMP/06 - SNMP On The Wire.mp4 4.8 MB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 05 - The Origins of the American Legal System/5.2 Original vs. Appellate Jurisdiction.mp4 4.8 MB
  • Protocol Deep Dive/TCP & UDP - Deep Dive/02.Protocol Introduction/02.05.What Is UDP.mp4 4.8 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/5. Understanding Informal Reports/5.2 What All Informal Reports Have in Common.mp4 4.8 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 12 Operational Controls and Standards/004. 12.3 Information Security Management.mp4 4.7 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/2. Escalate incidents/04_review-escalate-incidents/1. Wrap-up.mp4 4.7 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/07 - Modernizing FTP with IPv6/56 - Analysis - Examining IPv6 TFTP Uploads and Downloads.mp4 4.7 MB
  • CompTIA/CompTIA PenTest + (PT0-002)/comptia-pentestplus-pt0002.zip 4.7 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/4. Filesystems/1. Filesystem Types/1. Module Introduction - Google - Coursera.mp4 4.7 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/07.Troubleshooting and Securing IGMP and MLD/0701.How Multicast Traceroute Really Works.mp4 4.7 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/01_security-domains/02_more-about-the-cissp-security-domains/1. Welcome to week 1.mp4 4.7 MB
  • Protocol Deep Dive/SSH and Telnet - Deep Dive/03.The Telnet Protocol/0301.Telnet's Historical Legacy.mp4 4.6 MB
  • Protocol Deep Dive/SNMP - Deep Dive/02 - Overview of SNMP/04 - NMS Basics.mp4 4.6 MB
  • Protocol Deep Dive/TCP & UDP - Deep Dive/03.TCP UDP Theory of Operation/03.06.TCP Data Retransmission.mp4 4.6 MB
  • Protocol Deep Dive/QUIC - Deep Dive/04. Troubleshooting the QUIC Protocol/25. QUIC Course Review.mp4 4.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.7 Risk Monitoring.mp4 4.6 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/2. The Traits and Fucntions of Workplace Writing/2.5 Professional Writing Trait Four_ Comprehensiveness.mp4 4.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.1 What is Persistence.mp4 4.6 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.1 What is Persistence.mp4 4.6 MB
  • Protocol Deep Dive/DNS - Deep Dive/Exercise Files/05/Mod5-AtJayden-PrimaryDownthenSecondaryDown10000.pcapng.gz 4.6 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 3 Describe Azure Management and Governance/Lesson 9 Describe features and tools for governance and compliance/001. Learning objectives.mp4 4.6 MB
  • Protocol Deep Dive/ICMP - Deep Dive/05 - Designing Network Security for ICMP/26 - Analysis - ICMP Admin-prohibited Unreachable.mp4 4.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/44 - Day 44 - Web Foundation - Intermediate CSS/005 6.4-Motivation-Meme-Project.zip 4.6 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/04_use-playbooks-to-respond-to-incidents/03_review-use-playbooks-to-respond-to-incidents/1. Wrap-up.mp4 4.6 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 1 Describe Cloud Concepts/Lesson 2 Describe the benefits of using cloud services/001. Learning objectives.mp4 4.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/22 - Day 22 - Intermediate - Build Pong The Famous Arcade Game/002 Set up the Main Screen.mp4 4.6 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/04 - Protecting Data with FTP Secure (FTPS)/26 - Analysis - FTPS Upload Packets.mp4 4.6 MB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 04 - The Expert Report/4.4 The Importance of Peer Review.mp4 4.6 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/04 - Protecting Data with FTP Secure (FTPS)/21 - FTPS Problem Statement and Basic Operations.mp4 4.6 MB
  • Protocol Deep Dive/IPsec - Deep Dive/04 - Using IPsec in the Enterprise/16 - IPsec Extras.mp4 4.6 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 10 Identity and Access Management Solutions/006. 10.5 Multi-factor Authentication.mp4 4.6 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/07 - Modernizing FTP with IPv6/49 - Demo - Passive FTP with IPv6.mp4 4.6 MB
  • Protocol Deep Dive/DHCP - Deep Dive/01. Course Overview/01_01-Course Overview.mp4 4.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 09 - Privilege Escalation/9.4 Privilege Escalation Lab.mp4 4.5 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 5 Core AWS Services/Lesson 14 Technology Support Resources/001. Learning objectives.mp4 4.5 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/05 - Improving Confidentiality with SSH FTP (SFTP)/33 - Analysis - SFTP Download Packet Deep Dive.mp4 4.5 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/2. The Traits and Fucntions of Workplace Writing/2.11 Module Review.mp4 4.5 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 9 Managing the Boot Procedure/001. Learning objectives.mp4 4.5 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 7 Next Steps/Lesson 18 Further Study/001. Learning objectives.mp4 4.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 5 - Sock Puppets/5.1 Module 5 Overview - Sock Puppets.mp4 4.5 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/03_introduction-to-cybersecurity-tools/01_security-information-and-event-management-siem-dashboards/1. Welcome to week 3.mp4 4.5 MB
  • Protocol Deep Dive/TCP & UDP - Deep Dive/Exercise_file.zip 4.5 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 14 Securing Linux/005. 14.4 Configuring MOTD.mp4 4.4 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 17 Billing Support Resources/001. Learning objectives.mp4 4.4 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/06 - Simplifying File Transfers with Trivial FTP (TFTP)/37 - Understanding TFTP Operations.mp4 4.4 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 16 Managing SELinux and AppArmor/003. 16.2 SELinux vs. AppArmor.mp4 4.4 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/3. File & Text Manipulation/7. Windows- Searching within Directories - Google - Coursera.mp4 4.4 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 1 Describe Cloud Concepts/Lesson 3 Describe cloud service types/004. 3.3 Describe software as a service (SaaS).mp4 4.4 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 8 AWS Access Management/001. Learning objectives.mp4 4.4 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/03 - Simplifying Operations with FTP Passive Mode/15 - Demo - Downloading Files with Passive FTP.mp4 4.4 MB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/05_Resources/03_course-1-resources-and-citations/01__nist_small_business_fundamentals_july_2019.pptx 4.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Module 1 - Introduction/1.1 Intro-Instructor Welcome and Objectives(KL).mp4 4.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Module 1 - Introduction/1.1 Intro-Instructor Welcome and Objectives(KL).mp4 4.4 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/01.Course Overview/0101.Course Overview.mp4 4.3 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 4 Technology/001. Module introduction.mp4 4.3 MB
  • Protocol Deep Dive/ICMP - Deep Dive/05 - Designing Network Security for ICMP/24 - High Level ICMP Firewall Design.mp4 4.3 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/001. Module introduction.mp4 4.3 MB
  • Protocol Deep Dive/EIGRP - Deep Dive/04 - Determining How Information Is Exchanged with EIGRP/14 - Common EIGRP TLVs.mp4 4.3 MB
  • Protocol Deep Dive/IPsec - Deep Dive/03 - Building the IPsec Protocol/09 - IPsec Components.mp4 4.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 7 - Reporting/7.5 Module 7 Summary.mp4 4.3 MB
  • Protocol Deep Dive/TCP & UDP - Deep Dive/02.Protocol Introduction/02.03.What Is a Port.mp4 4.3 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/03 - Simplifying Operations with FTP Passive Mode/14 - Passive FTP Communications.mp4 4.3 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/1. Protect data and communicate incidents/04_review-protect-assets-and-communicate-incidents/1. Wrap-up.mp4 4.3 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 11 Managing User Interfaces/006. 11.5 Configuring Accessibility Features.mp4 4.3 MB
  • Protocol Deep Dive/OSPF - Deep Dive/06 - Troubleshooting Common OSPF Issues/47 - Troubleshooting Common OSPF Issues - Finale - Ral2.mp4 4.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 03 - Kali Linux Basics/3.6 Command Line Lab.mp4 4.3 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/2. The Traits and Fucntions of Workplace Writing/2.6 Professional Writing Trait Five_ Accessibility.mp4 4.3 MB
  • Protocol Deep Dive/SSH and Telnet - Deep Dive/01.Course Overview/0101.Course Overview.mp4 4.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/66 - Day 66 - Advanced - Building Your Own API with RESTful Routing/009 HTTP PUT vs. PATCH.mp4 4.2 MB
  • Protocol Deep Dive/DNS - Deep Dive/Exercise Files/02/businesswire-news-home-20201123006264-en-Internet-Grows-to-370-7-Million-Domain-Name-Registrations-at-th~0.pdf 4.2 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 11 Build and Implement a Physical and Logical Cloud Infrastructure/001. Learning objectives.mp4 4.2 MB
  • Protocol Deep Dive/ICMP - Deep Dive/03 - Using Traceroute/10 - New Traceroute ICMP Packets.mp4 4.2 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/56 - Day 56 - Intermediate+ Rendering HTMLStatic files and Using Website Templates/001 Day 56 Goals what you will make by the end of the day.mp4 4.2 MB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/1. Welcome to the exciting world of cybersecurity/04_review-welcome-to-the-exciting-world-of-cybersecurity/1. Wrap-up.mp4 4.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/2.3 Slide Handout.pdf 4.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Module 3/3.4 Summary (KL).mp4 4.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Module 3/3.4 Summary (KL).mp4 4.2 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/02.Introduction to IPv4 Multicast and IGMPv1/0206.Analysis IGMPv1 Membership Report.mp4 4.2 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/3. File & Text Manipulation/8. Linux- Searching within Files - Google - Coursera.mp4 4.2 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/001. Module introduction.mp4 4.2 MB
  • Protocol Deep Dive/IPsec - Deep Dive/01 - Course Overview/01 - Course Overview.mp4 4.1 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/01_security-domains/04_review-security-domains/1. Wrap-up.mp4 4.1 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 6 AWS Shared Responsibility Model/001. Learning objectives.mp4 4.1 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 7 Next Steps/001. Module introduction.mp4 4.1 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/02.Introduction to IPv4 Multicast and IGMPv1/0203.Demo IGMPv1 Operations.mp4 4.1 MB
  • Protocol Deep Dive/IPsec - Deep Dive/06 - Establishing IPsec with IKEv2/24 - Introducing IKEv2.mp4 4.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/001 Day 10 Goals what we will make by the end of the day.mp4 4.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/001 Day 30 Goals what you will make by the end of the day.mp4 4.1 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 3 Security and Compliance/Lesson 7 Cloud Security and Compliance Concepts/001. Learning objectives.mp4 4.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/1.3 Slide Handout.pdf 4.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/12 - Day 12 - Beginner - Scope & Number Guessing Game/004 Python Constants and Global Scope.mp4 4.1 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 6 Describe Azure storage services/005. 6.4 Describe storage account options.mp4 4.1 MB
  • Protocol Deep Dive/IPsec - Deep Dive/04 - Using IPsec in the Enterprise/12 - IPsec Functionality in the Enterprise.mp4 4.0 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/4. Engage with the cybersecurity community/03_review-engage-with-the-cybersecurity-community/1. Wrap-up.mp4 4.0 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/01_introduction-to-security-hardening/1. Welcome to week 4.mp4 4.0 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/06 - Simplifying File Transfers with Trivial FTP (TFTP)/41 - Analysis - Examining the TFTP Upload Exchange.mp4 4.0 MB
  • Protocol Deep Dive/IPsec - Deep Dive/07 - Implementing IPsec in IPv6/31 - IPv6 Implementations.mp4 4.0 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/2. Basic Commands/15. Linux- Moving and Renaming Files, Directories - Google - Coursera.mp4 4.0 MB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 07 - Rules of Evidence and Procedure/7.3 Federal Criminal Rule of Procedure 16.mp4 4.0 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 5 Managing Partitions/001. Learning objectives.mp4 4.0 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 12 Troubleshooting Linux Issues/009. Lesson 12 Lab Solution Analyzing Memory Use.mp4 4.0 MB
  • Protocol Deep Dive/QUIC - Deep Dive/03. Analyzing QUIC with Wireshark/10. Understanding the TCP to QUIC Handoff.mp4 3.9 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 4 Cloud Economics/001. Learning objectives.mp4 3.9 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/06_congratulations-on-completing-course-4/1. Course wrap-up.mp4 3.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Resources/CHF Syllabus & Outline.pdf 3.9 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 1 Describe Cloud Concepts/Lesson 3 Describe cloud service types/001. Learning objectives.mp4 3.9 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/2. Write effective Python code/04_review-write-effective-python-code/1. Wrap-up.mp4 3.9 MB
  • Protocol Deep Dive/ICMP - Deep Dive/03 - Using Traceroute/16 - Using ICMP Instead of UDP Probes.mp4 3.9 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 2 Cloud Security Concepts and Design Principles/001. Learning objectives.mp4 3.9 MB
  • Protocol Deep Dive/TCP & UDP - Deep Dive/03.TCP UDP Theory of Operation/03.07.TCP Session Termination.mp4 3.9 MB
  • Protocol Deep Dive/IPsec - Deep Dive/03 - Building the IPsec Protocol/07 - Building IPsec.mp4 3.9 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/1. Course Overview/1.1 Course Overview.mp4 3.9 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/6. Field and Trip Reports/6.1 Introduction to Trip Reports.mp4 3.9 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/05 - Improving Confidentiality with SSH FTP (SFTP)/34 - Demo - Implementing an SFTP Security Policy.mp4 3.9 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/3. Communicate effectively to influence stakeholders/01_understand-your-stakeholders/1. Welcome to week 3.mp4 3.9 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/2. Network monitoring and analysis/01_understand-network-traffic/1. Welcome to week 2.mp4 3.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.10 Security Principles Wrap-Up.mp4 3.9 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 1 Describe Cloud Concepts/Lesson 1 Describe cloud computing/005. 1.4 Consumption-based model.mp4 3.9 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/4. Filesystems/1. Filesystem Types/5. Windows- Mounting and Unmounting a Filesystem - Google - Coursera.mp4 3.8 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/3. Work with strings and lists/04_review-work-with-strings-and-lists/1. Wrap-up.mp4 3.8 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 3 AWS Cloud and Value Proposition/001. Learning objectives.mp4 3.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/70 - Day 70 - Advanced - Deploying Your Web Application with Heroku/001 Day 70 Goals - Learn to Deploy Your Website.mp4 3.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/12. Intro to Burp Suite Pro/Resources/Burp_Suite_Power_Point.pdf 3.8 MB
  • Protocol Deep Dive/IPsec - Deep Dive/06 - Establishing IPsec with IKEv2/26 - IKEv2 Modes.mp4 3.8 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/2. Network monitoring and analysis/02_capture-and-view-network-traffic/5. Investigate packet details.html 3.8 MB
  • Protocol Deep Dive/DNS - Deep Dive/03. Configuring DNS for Clients/06. Examine How Clients Obtain DNS.mp4 3.8 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/07 - Modernizing FTP with IPv6/55 - Demo - Trivial FTP (TFTP) with IPv6.mp4 3.8 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Summary/001. Linux Fundamentals Summary.mp4 3.8 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/06.New Multicast Designs with MLDv2/0602.MLDv2 Solutions and Exchanges.mp4 3.8 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/01_get-started-with-the-course/1. Introduction to Course 3.mp4 3.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 3 - OSINT Playground/3.6 Module 3 Summary.mp4 3.8 MB
  • Protocol Deep Dive/ICMP - Deep Dive/04 - Conquering the Fear of Fragmentation/18 - Advantages and Disadvantages.mp4 3.8 MB
  • Protocol Deep Dive/DNS - Deep Dive/01. Course Overview/01. Course Overview.mp4 3.8 MB
  • Protocol Deep Dive/TCP & UDP - Deep Dive/04.TCP UDP Ready Set Action/04.04.Module Review.mp4 3.8 MB
  • Protocol Deep Dive/NAT - Deep Dive/2.Identifying NAT Components/1.The History of the Need for NAT.mp4 3.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/001 Day 9 Goals what we will make by the end of the day.mp4 3.7 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 4 Technology/Lesson 11 AWS Global Infrastructure/001. Learning objectives.mp4 3.7 MB
  • Protocol Deep Dive/IPsec - Deep Dive/05 - Securing the Network with IKEv1/18 - IKEv1 Authentication.mp4 3.7 MB
  • Protocol Deep Dive/ICMP - Deep Dive/07 - Exploring the IPv6 Toolset/39 - Analysis - ICMPv6 Packet-too-big Unreachable.mp4 3.7 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/01_incident-detection-and-verification/1. Welcome to week 3.mp4 3.7 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/9. Investigative Reports_ Communicating Different Options/9.4 Most Important Concepts About Investigative Reports.mp4 3.7 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/03 - Simplifying Operations with FTP Passive Mode/17 - Demo - Uploading Files with Passive FTP.mp4 3.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 08 - Discovery/8.1 What is Discovery.mp4 3.7 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 08 - Discovery/8.1 What is Discovery.mp4 3.7 MB
  • Protocol Deep Dive/IPsec - Deep Dive/02 - Learning IPsec Fundamentals/03 - Course Overview.mp4 3.7 MB
  • MITRE/Cybrary - MITRE ATT&CK Defender (MAD) Fundamentals/3. Operationalizing ATT&CK/3.6 Course Summary.mp4 3.7 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/03.Better Performance with IGMPv2/0302.IGMPv2 Solutions and How They Work.mp4 3.7 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 21 An Introduction to Containers/006. 21.5 Understanding Kubernetes.mp4 3.6 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/05.The Future of Neworking IPv6 Multicast and MLDv1/0502.MLDv1 Overview and Message Flow.mp4 3.6 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 4 Describe the core architectural components of Azure/004. 4.3 Describe Azure datacenters.mp4 3.6 MB
  • Protocol Deep Dive/ICMP - Deep Dive/05 - Designing Network Security for ICMP/22 - Basic Stateless Firewall Operation.mp4 3.6 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 2 Describe Azure Architecture and Services/Lesson 4 Describe the core architectural components of Azure/006. 4.5 Describe management groups.mp4 3.6 MB
  • Protocol Deep Dive/SNMP - Deep Dive/01 - Course Overview/01 - Course Overview.mp4 3.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/001 Day 57 Goals what you will make by the end of the day.mp4 3.6 MB
  • Protocol Deep Dive/IPsec - Deep Dive/06 - Establishing IPsec with IKEv2/27 - Authenticating IKEv2.mp4 3.6 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/02 - Starting at the Beginning - FTP Active Mode/09 - Analysis - Active FTP File Upload.mp4 3.6 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 1 Exam Foundation/001. Module introduction.mp4 3.6 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/04_review-network-traffic-and-logs-using-ids-and-siem-tools/1. Wrap-up.mp4 3.6 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/05_review-introduction-to-python/1. Wrap-up.mp4 3.6 MB
  • Protocol Deep Dive/ICMP - Deep Dive/07 - Exploring the IPv6 Toolset/36 - IPv6 Traceroute Summary and Demo.mp4 3.6 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/02.Introduction to IPv4 Multicast and IGMPv1/0208.Demo Basic Multicast Flow.mp4 3.6 MB
  • Protocol Deep Dive/TCP & UDP - Deep Dive/05.Troubleshooting TCP UDP Issues/05.06.UDP Service Issues.mp4 3.6 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 16 Managing SELinux and AppArmor/001. Learning objectives.mp4 3.6 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/03 - Simplifying Operations with FTP Passive Mode/13 - Why Do We Need Another FTP Method.mp4 3.6 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 20 Configuration Management/001. Learning objectives.mp4 3.6 MB
  • Protocol Deep Dive/ICMP - Deep Dive/07 - Exploring the IPv6 Toolset/34 - IPv6 Ping Summary and Demo.mp4 3.6 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/10. Progress Reports_ Keeping Supervisors Informed About a Project/10.4 Most Important Concepts About Progress Reports.mp4 3.5 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/05_review-databases-and-sql/1. Wrap-up.mp4 3.5 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 6 Legal, Risk, and Compliance/Lesson 13 Legal Requirements, Privacy Issues, and Risk Management in the Cloud/001. Learning objectives.mp4 3.5 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/04 - Protecting Data with FTP Secure (FTPS)/22 - World___s Fastest Explanation of Public Key Infrastructure (PKI).mp4 3.5 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/01 - Course Overview/01 - Course Overview.mp4 3.5 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/3. Linux commands in the Bash shell/05_review-linux-commands-in-the-bash-shell/1. Wrap-up.mp4 3.5 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 6 Managing File Systems/001. Learning objectives.mp4 3.5 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 2 Cloud Concepts/Lesson 5 Cloud Architecture Design Principles/001. Learning objectives.mp4 3.5 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 1 Exam Foundation/Lesson 2 Exam Registration and Exam Strategies/001. Learning objectives.mp4 3.5 MB
  • Protocol Deep Dive/NAT - Deep Dive/2.Identifying NAT Components/3.NAT Loopback.mp4 3.5 MB
  • Protocol Deep Dive/QUIC - Deep Dive/02. An Introduction to QUIC/06. Understanding the QUIC Protocol Stack.mp4 3.5 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 2 Network Management/004. 2.3 Managing DNS Clients.mp4 3.4 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 15 EC2 Pricing Models/001. Learning objectives.mp4 3.4 MB
  • Protocol Deep Dive/NAT - Deep Dive/1.Course Overview/1.Course Overview.mp4 3.4 MB
  • Protocol Deep Dive/TCP & UDP - Deep Dive/05.Troubleshooting TCP UDP Issues/05.07.Module Review.mp4 3.4 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/2. The Linux operating system/01_all-about-linux/1. Welcome to week 2.mp4 3.4 MB
  • Protocol Deep Dive/TCP & UDP - Deep Dive/02.Protocol Introduction/02.06.Module Review.mp4 3.4 MB
  • Protocol Deep Dive/EIGRP - Deep Dive/02 - Covering EIGRP Essentials/02 - Course and Module Introduction.mp4 3.4 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/2. Network monitoring and analysis/04_review-network-monitoring-and-analysis/1. Wrap-up.mp4 3.4 MB
  • Protocol Deep Dive/QUIC - Deep Dive/01. Course Overview/01. Course Overview.mp4 3.4 MB
  • Protocol Deep Dive/ICMP - Deep Dive/05 - Designing Network Security for ICMP/27 - Other Firewall ICMP Considerations.mp4 3.3 MB
  • Protocol Deep Dive/OSPF - Deep Dive/04 - Discussing Simple OSPF Communication Blocks/23 - Digging into the Network LSA (Type 2).mp4 3.3 MB
  • Protocol Deep Dive/OSPF - Deep Dive/02 - Covering OSPF Basics/02 - Course and Module Introduction.mp4 3.3 MB
  • Protocol Deep Dive/EIGRP - Deep Dive/04 - Determining How Information Is Exchanged with EIGRP/12 - EIGRP Route States, Split Horizon, and Poison Reverse.mp4 3.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/73 - Day 73 - Advanced - Aggregate & Merge Data with Pandas Analyse the LEGO Dataset/011 LEGO-Notebook-and-Data-completed.zip 3.3 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/1. Introduction to operating systems/05_review-introduction-to-operating-systems/1. Wrap-up.mp4 3.3 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 1 Describe Cloud Concepts/Lesson 1 Describe cloud computing/003. 1.2 Describe the shared responsibility model.mp4 3.3 MB
  • Protocol Deep Dive/QUIC - Deep Dive/02. An Introduction to QUIC/04. TCP vs. QUIC - Saving Network Roundtrips.mp4 3.3 MB
  • Protocol Deep Dive/ICMP - Deep Dive/02 - Using Ping/07 - More ICMP Type_Code Examples.mp4 3.3 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/05_review-security-hardening/1. Wrap-up.mp4 3.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 13 - Smartphone Pentest Framework/13.1 SPF Introduction (part 1).mp4 3.3 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 7 Configuring Logging/006. 7.5 Using the logger Command.mp4 3.3 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 4 Basic Hardware Management/001. Learning objectives.mp4 3.2 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/06 - Simplifying File Transfers with Trivial FTP (TFTP)/39 - Analysis - Examining the TFTP Download Exchange.mp4 3.2 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/6. Field and Trip Reports/6.3 Developing a Trip or Field Report.mp4 3.2 MB
  • Protocol Deep Dive/ICMP - Deep Dive/01 - Course Overview/01 - Course Overview.mp4 3.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/3.2 Slide Handout.pdf 3.2 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/07 - Modernizing FTP with IPv6/54 - Analysis - A Glance at IPv6 SFTP Packets.mp4 3.2 MB
  • Protocol Deep Dive/DNS - Deep Dive/05. Troubleshooting DNS/17. Isolating Cause of DNS Outages.mp4 3.2 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 1 Exam Foundation/Lesson 1 Exam Guide/001. Learning objectives.mp4 3.2 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/03.Better Performance with IGMPv2/0301.Why Wasn’t IGMPv1 Enough.mp4 3.2 MB
  • Cloud/AWS Certified Cloud Practitioner CLF-C01/Module 6 Billing and Pricing/Lesson 16 Multiple Account Strategies/001. Learning objectives.mp4 3.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Module 4/4.4 Summary (KL).mp4 3.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Module 4/4.4 Summary (KL).mp4 3.2 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 6 Legal, Risk, and Compliance/Lesson 14 Cloud Audits, Methodologies, and Contracts/001. Learning objectives.mp4 3.2 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 21 An Introduction to Containers/001. Learning objectives.mp4 3.2 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/Lesson 1 Concepts and Architectures of Cloud Computing/001. Learning objectives.mp4 3.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 2 - Splunk Products, Resources, and Certifications/2.1 Splunk Products, Resources, and Certifications.mp4 3.1 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/06.New Multicast Designs with MLDv2/0601.Why Wasn’t MLDv1 Enough.mp4 3.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 12 - Exfiltration/12.6 Module 12 Summary.mp4 3.1 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 12 - Exfiltration/12.6 Module 12 Summary.mp4 3.1 MB
  • Protocol Deep Dive/OSPF - Deep Dive/05 - Introducing Multi-area OSPF (Hierarchy)/35 - Decoding the Summary LSA (Type 4).mp4 3.1 MB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/4. Cybersecurity tools and programming languages/01_important-cybersecurity-tools/03_tools-for-protecting-business-operations_gcat_threathorizons_full_sept2022.pdf 3.1 MB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/05_Resources/03_course-1-resources-and-citations/01__gcat_threathorizons_full_sept2022.pdf 3.1 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/04_use-playbooks-to-respond-to-incidents/01_phases-of-incident-response-playbooks/1. Welcome to week 4.mp4 3.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/001 Day 3 Goals what we will make by the end of the day.mp4 3.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.1 What is Credential Access.mp4 3.1 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.1 What is Credential Access.mp4 3.1 MB
  • Protocol Deep Dive/ICMP - Deep Dive/07 - Exploring the IPv6 Toolset/38 - IPv6 Fragmentation Summary and Demo.mp4 3.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 2 - Theory/2.7 Module 2 Summary.mp4 3.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/5.3 Slide Handout.pdf 3.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/5.4 Slide Handout.pdf 3.1 MB
  • Protocol Deep Dive/IPsec - Deep Dive/08 - Finalizing IPsec Concepts/36 - Let's Wrap Up.mp4 3.1 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 11 Managing User Interfaces/005. 11.4 Understanding Remote Access Protocols.mp4 3.1 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/1. Introduction to operating systems/02_the-wonderful-world-of-operating-systems/1. Welcome to week 1.mp4 3.1 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/Lesson 12 Operational Controls and Standards/001. Learning objectives.mp4 3.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 11 - WebApps/11.1 WebApp Introduction (part 1) Web App Testing.mp4 3.1 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 6 - OSINT Defense/6.1 Module 6 Overview - Defense.mp4 3.1 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/3. Secure against network intrusions/04_review-secure-against-network-intrusion/1. Wrap-up.mp4 3.1 MB
  • Protocol Deep Dive/TCP & UDP - Deep Dive/01.Course Overview/01.01.Course Overview.mp4 3.1 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/07 - Modernizing FTP with IPv6/57 - Securing IPv6 FTP Variants.mp4 3.0 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/001. Module introduction.mp4 3.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 08 - Discovery/8.6 Module 8 Summary.mp4 3.0 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 08 - Discovery/8.6 Module 8 Summary.mp4 3.0 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/03_network-hardening/2. Network security applications.html 3.0 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/73 - Day 73 - Advanced - Aggregate & Merge Data with Pandas Analyse the LEGO Dataset/001 LEGO-Notebook-and-Data-start.zip 3.0 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/4. Python in practice/04_review-python-in-practice/1. Wrap-up.mp4 3.0 MB
  • Protocol Deep Dive/TCP & UDP - Deep Dive/03.TCP UDP Theory of Operation/03.09.Module Review.mp4 3.0 MB
  • Protocol Deep Dive/ICMP - Deep Dive/02 - Using Ping/04 - Wireshark Detour.mp4 3.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 09 - Lateral Movement/9.1 What is Lateral Movement.mp4 3.0 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 09 - Lateral Movement/9.1 What is Lateral Movement.mp4 3.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/4.4 Slide Handout.pdf 3.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Module 2/2.4 Module Summary (KL).mp4 3.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Module 2/2.4 Module Summary (KL).mp4 3.0 MB
  • CompTIA/CompTIA CySA+ (CS0-002)/comptia-cysaplus-cs0002.zip 3.0 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/05_review-incident-investigation-and-response/1. Wrap-up.mp4 3.0 MB
  • Protocol Deep Dive/DNS - Deep Dive/Exercise Files/05/Mod5-AtGabriela-NoOutsideDNS.pcapng.gz 3.0 MB
  • Protocol Deep Dive/IPsec - Deep Dive/05 - Securing the Network with IKEv1/17 - What Is IKE.mp4 3.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 3 - Metasploit/3.1 Metasploit (part 1) Introduction.mp4 3.0 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/11. Meeting Minutes/11.4 Most Important Concepts About Meeting Minutes.mp4 3.0 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/2. The Linux operating system/04_review-the-linux-operating-system/1. Wrap-up.mp4 3.0 MB
  • Protocol Deep Dive/NAT - Deep Dive/4.Troubleshooting NAT/3.Disadvantages of NAT.mp4 3.0 MB
  • Protocol Deep Dive/TCP & UDP - Deep Dive/03.TCP UDP Theory of Operation/03.03.TCP Session Formation.mp4 3.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Module 3 - Operationalizing ATT&CK®/3.6 Course Summary.mp4 2.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 04 - Understanding Network Protocols/4.17 Network Protocols Lab.mp4 2.9 MB
  • Protocol Deep Dive/OSPF - Deep Dive/Exercise Files/02/covering-ospf-basics-slides.pdf 2.9 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 3 Managing Services/001. Learning objectives.mp4 2.9 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/05.The Future of Neworking IPv6 Multicast and MLDv1/0501.What’s New with IPv6 Multicast.mp4 2.9 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/2. Network operations/03_review-network-operations/1. Wrap-up.mp4 2.9 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/02 - Starting at the Beginning - FTP Active Mode/02 - The Globomantics Network.mp4 2.9 MB
  • Protocol Deep Dive/ICMP - Deep Dive/02 - Using Ping/02 - Purpose of ICMP.mp4 2.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 5 - Sock Puppets/5.4 Module 5 Summary.mp4 2.9 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/05_review-find-and-apply-for-cybersecurity-jobs/3. Course wrap-up.mp4 2.9 MB
  • Protocol Deep Dive/QUIC - Deep Dive/03. Analyzing QUIC with Wireshark/15. QUIC Packets vs. Frames.mp4 2.9 MB
  • Protocol Deep Dive/ICMP - Deep Dive/07 - Exploring the IPv6 Toolset/41 - Analysis - ICMPv6 Admin-prohibited Unreachable.mp4 2.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 09 - Lateral Movement/9.6 Module 9 Summary.mp4 2.9 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 09 - Lateral Movement/9.6 Module 9 Summary.mp4 2.9 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 8 Application Security Awareness and Life Cycles/001. Learning objectives.mp4 2.8 MB
  • Protocol Deep Dive/IPsec - Deep Dive/03 - Building the IPsec Protocol/10 - SA Establishment Protocols.mp4 2.8 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/7. Incident Reports_ Documenting When Something Goes Wrong/7.6 The Most Important Concepts About Incident Reports.mp4 2.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/6.1 Slide Handout.pdf 2.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/5.5 Slide Handout.pdf 2.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 12 - Exploit Development/12.1 Exploit Development Introduction (part 1).mp4 2.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 10 - Collection/10.1 What is Collection.mp4 2.8 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 10 - Collection/10.1 What is Collection.mp4 2.8 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 6 Data Center Design and Risk Analysis/001. Learning objectives.mp4 2.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 2 - Programming/2.1 Programming (part 1) Fundamentals for Pen Testers.mp4 2.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Resources/CybraryAdvancedPenSlidesnew__1_.pdf 2.8 MB
  • Protocol Deep Dive/TCP & UDP - Deep Dive/02.Protocol Introduction/02.02.Criticality of TCP and UDP.mp4 2.8 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/02.Introduction to IPv4 Multicast and IGMPv1/0207.Router-to-Router Signaling with PIM.mp4 2.8 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/02.Introduction to IPv4 Multicast and IGMPv1/0204.Review of Packet Analysis Using Wireshark.mp4 2.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Module 7 - Reporting/7.1 Reporting Overview.mp4 2.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 11 - Command and Control/11.6 Module 11 Summary.mp4 2.8 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 11 - Command and Control/11.6 Module 11 Summary.mp4 2.8 MB
  • Protocol Deep Dive/OSPF - Deep Dive/Exercise Files/03/forming-basic-ospf-relationships-slides.pdf 2.8 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/02 - Starting at the Beginning - FTP Active Mode/05 - Detour - Using Wireshark.mp4 2.8 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 14 Securing Linux/001. Learning objectives.mp4 2.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 1 - Linux/1.1 Linux (part 1).mp4 2.8 MB
  • Protocol Deep Dive/TCP & UDP - Deep Dive/03.TCP UDP Theory of Operation/03.04.TCP Data Segmentation.mp4 2.8 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 2 Cloud Data Security/Lesson 4 Cloud Data Security/001. Learning objectives.mp4 2.8 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/5. Understanding Informal Reports/5.3 Most Important Concepts About Informal Reports.mp4 2.8 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/6. Field and Trip Reports/6.5 The Most Important Trip Report Concepts.mp4 2.7 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/03_introduction-to-cybersecurity-tools/03_review-introduction-to-cybersecurity-tools/1. Wrap-up.mp4 2.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/001 Day 2 Goals what we will make by the end of the day.mp4 2.7 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 7 Configuring Logging/001. Learning objectives.mp4 2.7 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 11 Managing User Interfaces/001. Learning objectives.mp4 2.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 10 - Collection/10.6 Module 10 Summary.mp4 2.7 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 10 - Collection/10.6 Module 10 Summary.mp4 2.7 MB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/Cybereason_Operation_Cobalt_Kitty_-_Exercise_Answers.pdf 2.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/Cybereason Operation Cobalt Kitty - Exercise Answers.pdf 2.7 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 19 Using Git for Version Control/001. Learning objectives.mp4 2.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.7 Module 7 Summary.mp4 2.7 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.7 Module 7 Summary.mp4 2.7 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/07 - Modernizing FTP with IPv6/58 - Module and Course Summary.mp4 2.7 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 18 An Introduction to Bash Shell Scripts/006. Lesson 18 Lab Writing a Shell Script.mp4 2.7 MB
  • Protocol Deep Dive/NAT - Deep Dive/2.Identifying NAT Components/5.Applications Affected by NAT.mp4 2.7 MB
  • Protocol Deep Dive/OSPF - Deep Dive/05 - Introducing Multi-area OSPF (Hierarchy)/33 - Decoding Multi-area OSPF Building Blocks.mp4 2.7 MB
  • Protocol Deep Dive/ARP - Deep Dive/Exercise files/05/addressing-arp-related-security-risks-slides.pdf 2.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 6 - Traffic Capture/6.1 Traffic Capture Introduction (part 1).mp4 2.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 6 - OSINT Defense/6.4 Module 6 Summary.mp4 2.7 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 9 - Advanced Exploitation/9.1 Advanced Exploitation (part 1) Introduction.mp4 2.6 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 13 Configuring a Firewall/001. Learning objectives.mp4 2.6 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/4. Developing Routine and Sensitive Memos/4.4 Most Important Concepts About Memos.mp4 2.6 MB
  • Protocol Deep Dive/EIGRP - Deep Dive/01 - Course Overview/01 - Course Overview.mp4 2.6 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/02.Introduction to IPv4 Multicast and IGMPv1/0205.Analysis IGMPv1 Membership Query.mp4 2.6 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/07 - Modernizing FTP with IPv6/48 - New Messages in FTP Passive Mode.mp4 2.6 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 4 - Information Gathering/4.1 Information Gathering Intro (part 1).mp4 2.6 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/3. Interacting via Email/3.4 Most Important Concepts About Email.mp4 2.6 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 17 Managing Linux Server Roles/001. Learning objectives.mp4 2.6 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 2 Network Management/001. Learning objectives.mp4 2.6 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 5 Cloud Infrastructure and Platform Components/001. Learning objectives.mp4 2.6 MB
  • Protocol Deep Dive/DNS - Deep Dive/Exercise Files/05/Peter Drucker Quote-two-most-important-quotes-business-2020-12-12-17_34_30.pdf 2.6 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/001. Module introduction.mp4 2.6 MB
  • Protocol Deep Dive/OSPF - Deep Dive/Exercise Files/04/discussing-simple-ospf-communication-blocks-slides.pdf 2.6 MB
  • Protocol Deep Dive/ARP - Deep Dive/Exercise files/04/troubleshooting-common-arp-issues-slides.pdf 2.6 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 10 Identity and Access Management Solutions/001. Learning objectives.mp4 2.5 MB
  • Protocol Deep Dive/QUIC - Deep Dive/02. An Introduction to QUIC/05. Learning QUIC Protocol Fundamentals.mp4 2.5 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 12 Troubleshooting Linux Issues/001. Learning objectives.mp4 2.5 MB
  • Protocol Deep Dive/QUIC - Deep Dive/Exercise Files/04/troubleshooting-the-quic-protocol-slides.pdf 2.5 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Module 2 - Theory/2.1 Module 2 Overview - Theory.mp4 2.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/001 Day 7 Goals what we will make by the end of the day.mp4 2.5 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 18 An Introduction to Bash Shell Scripts/001. Learning objectives.mp4 2.5 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/1. Introduction to detection and incident response/05_review-introduction-to-detection-and-incident-response/1. Wrap-up.mp4 2.5 MB
  • Protocol Deep Dive/IPsec - Deep Dive/05 - Securing the Network with IKEv1/19 - IKEv1 Phases.mp4 2.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/003 12-Rules-to-Learn-to-Code-eBook-Copyright-App-Brewery.pdf 2.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/003 12-Rules-to-Learn-to-Code-eBook-Copyright-App-Brewery.pdf_original 2.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/17 - Day 17 - Intermediate - The Quiz Project & the Benefits of OOP/001 Day 17 Goals what we will make by the end of the day.mp4 2.5 MB
  • Protocol Deep Dive/NAT - Deep Dive/2.Identifying NAT Components/4.IPv6 and NAT.mp4 2.5 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/001. Module introduction.mp4 2.5 MB
  • Protocol Deep Dive/DNS - Deep Dive/03. Configuring DNS for Clients/08. Understanding DNS Cache.mp4 2.4 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 8 Managing and Monitoring Performance/001. Learning objectives.mp4 2.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 13 - Impact/13.1 What is Impact.mp4 2.4 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 13 - Impact/13.1 What is Impact.mp4 2.4 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 11 - Command and Control/11.1 What is Command Control.mp4 2.4 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 11 - Command and Control/11.1 What is Command Control.mp4 2.4 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 2 Cloud Data Security/Lesson 3 The Cloud Data Lifecycle/001. Learning objectives.mp4 2.4 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/03 - Simplifying Operations with FTP Passive Mode/18 - Analysis - Passive FTP Uploads.mp4 2.4 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/02_introduction-to-networks/1. Welcome to week 1.mp4 2.4 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/07/modernizing-ftp-with-ipv6-slides.pdf 2.4 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Resources/Advanced_Penetration_Testing_Notes_Task_2__2_.pdf 2.4 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Summary/001. Certified Cloud Security Professional (CCSP) Summary.mp4 2.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/001 Day 18 Goals what we will make by the end of the day.mp4 2.4 MB
  • Protocol Deep Dive/IPsec - Deep Dive/02 - Learning IPsec Fundamentals/05 - Why IPsec.mp4 2.4 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 10 Managing File Compression and Backup/001. Learning objectives.mp4 2.4 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/6. Troubleshooting and Future of Networking/6. Course Wrap Up/3. Congratulations!.mp4 2.4 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/Lesson 9 Software Assurance and Validation/001. Learning objectives.mp4 2.3 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 19 Using Git for Version Control/009. Lesson 19 Lab Using Git with Branches.mp4 2.3 MB
  • Protocol Deep Dive/TCP & UDP - Deep Dive/03.TCP UDP Theory of Operation/03.01.Introduction.mp4 2.3 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/07 - Modernizing FTP with IPv6/44 - Does IPv6 Really Matter for File Transfer.mp4 2.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/001 Day 26 Goals what you will make by the end of the day.mp4 2.3 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 10 Managing File Compression and Backup/007. Lesson 10 Lab Managing Backups.mp4 2.3 MB
  • Protocol Deep Dive/ARP - Deep Dive/Exercise files/03/understanding-inarp-garp-rarp-and-proxy-arp-slides.pdf 2.3 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/07 - Modernizing FTP with IPv6/45 - New Messages in FTP Active Mode.mp4 2.3 MB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/6. Troubleshooting/6. Course Wrap-up/3. Congratulations.mp4 2.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/42 - Day 42 - Web Foundation - Intermediate HTML/005 3.3-Image-Elements.zip 2.3 MB
  • Protocol Deep Dive/TCP & UDP - Deep Dive/02.Protocol Introduction/02.01.Protocol Introduction.mp4 2.3 MB
  • Protocol Deep Dive/ARP - Deep Dive/04 Troubleshooting Common ARP Issues/01 Intro.mp4 2.3 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/001. Module introduction.mp4 2.3 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/Lesson 7 Cloud Business Continuity Planning/001. Learning objectives.mp4 2.3 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/07.Troubleshooting and Securing IGMP and MLD/0705.Demo Finding the Fault with Multicast Traceroute.mp4 2.3 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/04 - Protecting Data with FTP Secure (FTPS)/28 - Comparing FTPS to Unsecure FTP.mp4 2.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 5 - Using Data/5.1 Using Data.mp4 2.3 MB
  • Protocol Deep Dive/IPsec - Deep Dive/06 - Establishing IPsec with IKEv2/29 - Summarizing IKEv2.mp4 2.2 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Module 5 - Vulnerability Discovery or Scanning/5.1 Vulnerability Scanning Intro (part 1).mp4 2.2 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/12. Internal Social Media Platforms_ Using Office Instant Messaging/12.3 Most Important Concepts About Social Messaging.mp4 2.2 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/06 - Simplifying File Transfers with Trivial FTP (TFTP)/36 - Why TFTP is Different.mp4 2.2 MB
  • Protocol Deep Dive/NAT - Deep Dive/4.Troubleshooting NAT/4.NAT Vulnerabilities.mp4 2.2 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/03 - Simplifying Operations with FTP Passive Mode/20 - Comparing Active and Passive FTP Designs.mp4 2.2 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/2. Users and Permissions/1. Users and Groups/8. Linux- Adding and Removing Users - Google - Coursera.mp4 2.2 MB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/4. Cybersecurity tools and programming languages/03_review-cybersecurity-tools-and-programming-languages/1. Wrap-up.mp4 2.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/3.3 Slide Handout.pdf 2.1 MB
  • Cloud/Microsoft Azure Fundamentals AZ-900/Module 1 Describe Cloud Concepts/Lesson 1 Describe cloud computing/002. 1.1 Define cloud computing.mp4 2.1 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/07 - Modernizing FTP with IPv6/52 - Analysis - A Glance at IPv6 FTPS Packets.mp4 2.1 MB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/6. Final Project/2. Course Wrap Up/Congratulations! - Google - Coursera.mp4 2.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/Cybereason Operation Cobalt Kitty - Exercise.pdf 2.1 MB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/Cybereason_Operation_Cyber_Kitty_-_Exercise.pdf 2.1 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/Cybereason Operation Cobalt Kitty - Exercise Hints.pdf 2.1 MB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/Cybereason_Operation_Cobalt_Kitty_-_Exercise_Hints.pdf 2.1 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/2. Basic Commands/11. Linux- Command History - Google - Coursera.mp4 2.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/001 Day 4 Goals what we will make by the end of the day.mp4 2.1 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/05_review-find-and-apply-for-cybersecurity-jobs/1. Wrap-up.mp4 2.1 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/05 - Improving Confidentiality with SSH FTP (SFTP)/35 - Comparing SFTP to FTPS.mp4 2.0 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 4 Cloud Application Security/001. Module introduction.mp4 2.0 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 6 Legal, Risk, and Compliance/001. Module introduction.mp4 2.0 MB
  • Protocol Deep Dive/OSPF - Deep Dive/04 - Discussing Simple OSPF Communication Blocks/20 - Reviewing What a Link State Advertisement Is.mp4 2.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 10 - Password Cracking and Brute-Forcing Logins/10.5 Brute-Force and Password Cracking Lab.mp4 2.0 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 13 - Impact/13.5 Module 13 Summary.mp4 2.0 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 13 - Impact/13.5 Module 13 Summary.mp4 2.0 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 2 Network Management/009. Lesson 2 Lab Managing Custom Routes.mp4 2.0 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/01_security-domains/01_get-started-with-the-course/2. Course 2 overview.html 1.9 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/05_Resources/04_course-3-resources-and-citations/01__sp800-179r1-draft.pdf 1.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Module 12 - Exfiltration/12.1 What is Exfiltration.mp4 1.9 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 12 - Exfiltration/12.1 What is Exfiltration.mp4 1.9 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/5.2 Slide Handout.pdf 1.9 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/1. Protect data and communicate incidents/02_event-and-incident-detection/1. Welcome to week 1.mp4 1.9 MB
  • Protocol Deep Dive/ARP - Deep Dive/02 Address Resolution Protocol Fundamentals/02 Fundamentals of ARP Demo Introduction.mp4 1.9 MB
  • Protocol Deep Dive/TCP & UDP - Deep Dive/05.Troubleshooting TCP UDP Issues/05.01.Introduction.mp4 1.9 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Module 5/5.3 Summary (KL).mp4 1.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Module 5/5.3 Summary (KL).mp4 1.8 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 1 Managing User Related Security/001. Learning objectives.mp4 1.8 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 15 Managing Secure Access Control/001. Learning objectives.mp4 1.8 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/02 - Starting at the Beginning - FTP Active Mode/10 - Designing an Active FTP Security Policy.mp4 1.8 MB
  • Protocol Deep Dive/ARP - Deep Dive/03 Understanding InARP, GARP, RARP, and Proxy ARP/02 InARP and RARP.mp4 1.8 MB
  • Job Tips/Writing in the Workplace_ Email, Memos, Reports, and Social Messaging/8. Test Reports_ Presenting Experiments and Diagnostics/8.4 Most Important Concepts About Test Reports.mp4 1.8 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 3 Cloud Platform and Infrastructure Security/001. Module introduction.mp4 1.8 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/06 - Simplifying File Transfers with Trivial FTP (TFTP)/43 - TFTP vs. FTP and When to Use Each.mp4 1.8 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 6 Managing File Systems/009. Lesson 6 Lab Managing File Systems.mp4 1.8 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/4.3 Slide Handout.pdf 1.8 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/06 - Simplifying File Transfers with Trivial FTP (TFTP)/40 - Demo - TFTP Uploads In Action.mp4 1.8 MB
  • Protocol Deep Dive/OSPF - Deep Dive/03 - Forming Basic OSPF Relationships/07 - Module Introduction.mp4 1.8 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/05_review-network-architecture/1. Wrap-up.mp4 1.8 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 3 Managing Services/010. Lesson 3 Lab Managing Systemd Dependencies.mp4 1.8 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 5 Managing Partitions/012. Lesson 5 Lab Managing Partitions.mp4 1.8 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/80 - Day 80 - Advanced - Capstone Project - Predict House Prices/002 Multivariable-Regression-Complete.zip 1.8 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/02_introduction-to-networks/7. Network components, devices, and diagrams.html 1.8 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/05_course-6-resources-and-citations/01__nistspecialpublication800-92.pdf 1.8 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/04 - Protecting Data with FTP Secure (FTPS)/27 - No Need for FTPS Firewall Changes.mp4 1.8 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 07 - Public Exploits/7.6 Public Exploit Lab.mp4 1.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/41 - Day 41 - Web Foundation - Introduction to HTML/006 2.2-Paragraph-Element.zip 1.7 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/001 Day 6 Goals what we will make by the end of the day.mp4 1.7 MB
  • Protocol Deep Dive/ARP - Deep Dive/05 Addressing ARP-related Security Risks/01 ARP and Security Intro.mp4 1.7 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 13 Configuring a Firewall/007. Lesson 13 Lab Configuring Firewalling.mp4 1.7 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 1 Cloud Concepts, Architecture, and Design/001. Module introduction.mp4 1.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Module 4 - Data/4.1 Data.mp4 1.7 MB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/05_Resources/03_course-1-resources-and-citations/01__index.html 1.7 MB
  • Protocol Deep Dive/ICMP - Deep Dive/Exercise Files/07/exploring-the-ipv6-toolset-slides.pdf 1.7 MB
  • Protocol Deep Dive/NAT - Deep Dive/4.Troubleshooting NAT/1.NAT Limitations.mp4 1.7 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Resources/Advanced_Cyber_Threat_Intelligence_Study_Guide__1_.pdf 1.7 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/001. Module introduction.mp4 1.6 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 5 Cloud Security Operations/001. Module introduction.mp4 1.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/6.2 Slide Handout.pdf 1.6 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/03_network-communication/4. Learn more about the TCPIP model.html 1.6 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/1. Introduction to asset security/04_risk-and-asset-security/03_security-guidelines-in-action_Commercial_Facilities_Sector_Cybersecurity_Framework_Implementation_Guidance_FINAL_508.pdf 1.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/3.4 Slide Handout.pdf 1.6 MB
  • Splunk Training/1. Splunk Fundamentals 1/Practice_Data.zip 1.6 MB
  • Splunk Training/2. Splunk Fundamentals 2/Practice_Data.zip 1.6 MB
  • Splunk Training/3. Splunk Fundamentals 3/Practice_Data.zip 1.6 MB
  • Splunk Training/4. Admin 1 - System Admin/Practice_Data.zip 1.6 MB
  • Splunk Training/5. Admin 2 - Data Admin/Practice_Data.zip 1.6 MB
  • Splunk Training/7. Fields & Extractions/Practice_Data.zip 1.6 MB
  • Splunk Training/8. Getting Data In/Practice_Data.zip 1.6 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/04_sql-joins/3. Compare types of joins.html 1.6 MB
  • Protocol Deep Dive/TCP & UDP - Deep Dive/03.TCP UDP Theory of Operation/03.05.TCP Data Reassembly.mp4 1.6 MB
  • Protocol Deep Dive/IPsec - Deep Dive/05 - Securing the Network with IKEv1/23 - Summarizing IKEv1.mp4 1.6 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/42 - Day 42 - Web Foundation - Intermediate HTML/006 3.4-Birthday-Invite-Project.zip 1.6 MB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/05_Resources/03_course-1-resources-and-citations/01__cis-controls-and-the-hph.pdf 1.6 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Resources/Lab logs.zip 1.6 MB
  • Protocol Deep Dive/OSPF - Deep Dive/03 - Forming Basic OSPF Relationships/18 - Summary.mp4 1.5 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/05_course-6-resources-and-citations/01__nist.sp.800-61r2.pdf 1.5 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/06_Resources/03_course-8-resources-and-citations/01__nist.sp.800-61r2.pdf 1.5 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 8 Managing and Monitoring Performance/007. Lesson 8 Lab Managing Performance.mp4 1.5 MB
  • Protocol Deep Dive/ARP - Deep Dive/Exercise files/02/address-resolution-protocol-fundamentals-slides.pdf 1.5 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/01_incident-detection-and-verification/6. Analyze indicators of compromise with investigative tools.html 1.5 MB
  • Protocol Deep Dive/IPsec - Deep Dive/07 - Implementing IPsec in IPv6/34 - IPv6 IPsec Summary.mp4 1.5 MB
  • Protocol Deep Dive/OSPF - Deep Dive/04 - Discussing Simple OSPF Communication Blocks/19 - Module Introduction.mp4 1.5 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 21 An Introduction to Containers/008. Lesson 21 Lab Running Containers.mp4 1.5 MB
  • Cloud/Certified Cloud Security Professional (CCSP)/Module 2 Cloud Data Security/001. Module introduction.mp4 1.5 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Summary/001. CompTIA Linux+ XK0-005 Summary.mp4 1.5 MB
  • Protocol Deep Dive/DNS - Deep Dive/Exercise Files/04/modifying-dns-configuration-for-servers-slides.pdf 1.5 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__FULL_TEXT.pdf 1.5 MB
  • Protocol Deep Dive/OSPF - Deep Dive/05 - Introducing Multi-area OSPF (Hierarchy)/28 - Module Introduction.mp4 1.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/41 - Day 41 - Web Foundation - Introduction to HTML/007 2.3-Void-Elements.zip 1.5 MB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/03_crashing-programs/02_code-that-crashes/06_resources-for-debugging-crashes_bottle.py 1.5 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/58 - Day 58 - Web Foundation Bootstrap/005 11.3-TinDog-Project.zip 1.5 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/1. Protect data and communicate incidents/01_get-started-with-the-course/2. Course 8 overview.html 1.4 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/58 - Day 58 - Web Foundation Bootstrap/002 11.0-Bootstrap-Intro.zip 1.4 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 1 Essential Linux Management/Lesson 1 Managing User Related Security/006. Lesson 1 Lab Managing sudo.mp4 1.4 MB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/02/starting-at-the-beginning-ftp-active-mode-slides.pdf 1.4 MB
  • Protocol Deep Dive/DNS - Deep Dive/Exercise Files/02/domain-name-report-Q32020.pdf 1.4 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/3. Secure against network intrusions/01_introduction-to-network-intrusion-tactics/1. Welcome to week 3.mp4 1.4 MB
  • Protocol Deep Dive/DNS - Deep Dive/Exercise Files/02/exploring-dns-terminology-and-use-cases-slides.pdf 1.4 MB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/05_Resources/03_course-1-resources-and-citations/01__R46536.pdf 1.4 MB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/1. Introduction to detection and incident response/01_get-started-with-the-course/2. Course 6 overview.html 1.3 MB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/1. Welcome to the exciting world of cybersecurity/01_get-started-with-the-certificate-program/3. Course 1 overview.html 1.3 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 20 Configuration Management/008. Lesson 20 Lab Using Configuration Management.mp4 1.3 MB
  • Protocol Deep Dive/IGMP and MLD - Deep Dive/02.Introduction to IPv4 Multicast and IGMPv1/0202.Host-to-Router Signaling with IGMP.mp4 1.3 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/1. Introduction to asset security/01_get-started-with-the-course/2. Course 5 overview.html 1.3 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Resources/Application_of_the_MITRE_Attack_Framework_Study_Guide__2___1_.pdf 1.3 MB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Resources/Application_of_the_MITRE_Attack_Framework_Study_Guide__2___1_.pdf 1.3 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 05 - Web Application Penetration Testing/5.14 Web Application Lab.mp4 1.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/76 - Day 76 - Advanced - Computation with NumPy and N-Dimensional Arrays/006 Computation-with-NumPy-complete.zip 1.3 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__Trend_Report_-_Why_Businesses_are_Moving_to_the_Cloud.pdf 1.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/58 - Day 58 - Web Foundation Bootstrap/004 11.2-Bootstrap-Components.zip 1.3 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/05_Resources/04_course-2-resources-and-citations/01__Audit_and_Accountability_AU_CIO-IT_Security_01-08_Rev_6_12-03-2020docx.pdf 1.3 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/02_security-frameworks-and-controls/04_owasp-principles-and-security-audits/06_more-about-security-audits_Audit_and_Accountability_AU_CIO-IT_Security_01-08_Rev_6_12-03-2020docx.pdf 1.3 MB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/01_get-started-with-the-course/2. Course 3 overview.html 1.3 MB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/01_get-started-with-the-course/2. Course 7 overview.html 1.3 MB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/3. Vulnerabilities in systems/03_cyber-attacker-mindset/06_fortify-against-brute-force-cyber-attacks_NIST.SP.800-63b.pdf 1.3 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/1. Introduction to operating systems/01_get-started-with-the-course/2. Course 4 overview.html 1.3 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/78 - Day 78 - Advanced - Analysing the Nobel Prize with Plotly, Matplotlib & Seaborn/008 Nobel-Prize-Analysis-Complete.zip 1.2 MB
  • Protocol Deep Dive/EIGRP - Deep Dive/04 - Determining How Information Is Exchanged with EIGRP/11 - Module Introduction.mp4 1.2 MB
  • Google Coursera/IT Support/Supplemental Reading - Courses HTML Files/4. Supplemental reading.zip 1.2 MB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/6. Operating Systems in Practice/5. Course Wrap Up/4. Congratulations! - Google - Coursera.mp4 1.2 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/06_congratulations-on-completing-course-4/02_course-4-glossary_Course_4_glossary.docx 1.2 MB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/05_Resources/05_course-4-glossary/01__Course_4_glossary.docx 1.2 MB
  • Protocol Deep Dive/OSPF - Deep Dive/05 - Introducing Multi-area OSPF (Hierarchy)/39 - Summary.mp4 1.2 MB
  • Google Coursera/IT Support/Supplemental Reading - Courses HTML Files/5. Supplemental reading.zip 1.2 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 12 Troubleshooting Linux Issues/008. Lesson 12 Lab Analyzing Memory Use.mp4 1.2 MB
  • Google Coursera/IT Support/Supplemental Reading - Courses HTML Files/3. Supplemental Reading.zip 1.2 MB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Resources/Intro_to_Malware_Analysis_and_Reverse_Engineering_Study_Guide__1_.pdf 1.2 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/05_review-find-and-apply-for-cybersecurity-jobs/04_course-8-glossary_Course_8_glossary.docx 1.2 MB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/06_Resources/02_course-8-glossary/01__Course_8_glossary.docx 1.2 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 7 Configuring Logging/007. Lesson 7 Lab Configuring Logging.mp4 1.2 MB
  • Protocol Deep Dive/EIGRP - Deep Dive/05 - Showing How Information Is Exchanged with EIGRP/16 - Module Introduction.mp4 1.1 MB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/05_Resources/04_course-2-resources-and-citations/01__Federal_Government_Cybersecurity_Incident_and_Vulnerability_Response_Playbooks_508C.pdf 1.1 MB
  • Protocol Deep Dive/EIGRP - Deep Dive/06 - Covering EIGRP Advanced Topics/22 - Module Introduction.mp4 1.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/99 - Day 99 - Professional Portfolio Project - [Data Science]/001 [assignment_file] Analyse Deaths involving Police in the United States.zip 1.1 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 16 Managing SELinux and AppArmor/010. Lesson 16 Lab Configuring SELinux.mp4 1.1 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 14 Securing Linux/007. Lesson 14 Lab Configuring Auditing.mp4 1.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/77 - Day 77 - Advanced - Linear Regression and Data Visualisation with Seaborn/009 Seaborn-Linear-Regression-complete.zip 1.1 MB
  • Protocol Deep Dive/OSPF - Deep Dive/04 - Discussing Simple OSPF Communication Blocks/27 - Summary.mp4 1.1 MB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/79 - Day 79 - Advanced - The Tragic Discovery of Handwashing t-Tests & Distributions/006 Dr-Semmelweis-Analysis-complete.zip 1.1 MB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/2. Pelcgbybtl (Cryptology)/2. Public Key or Asymmetric Encryption/PlayStation 3 hack - how it happened and what it means.html 1.1 MB
  • Protocol Deep Dive/IPsec - Deep Dive/Exercise Files/06/establishing-ipsec-with-ikev2-slides.pdf 1.1 MB
  • Protocol Deep Dive/TCP & UDP - Deep Dive/04.TCP UDP Ready Set Action/04.01.Introduction.mp4 1.0 MB
  • Protocol Deep Dive/EIGRP - Deep Dive/03 - Digging into EIGRP Relationships/06 - Module Introduction.mp4 1.0 MB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/3. The Transport and Application Layers/2. The Transport Layer/List of TCP and UDP port numbers - Wikipedia.html 1.0 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 2 Storage Management/Lesson 4 Basic Hardware Management/008. Lesson 4 Lab Monitoring Hardware.mp4 1.0 MB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Resources/CEH_Notes.pdf 1.0 MB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 4 Security/Lesson 15 Managing Secure Access Control/004. Lesson 15 Lab Configuring PAM.mp4 1.0 MB
  • Protocol Deep Dive/DNS - Deep Dive/Exercise Files/02/Mod2-AtClient-Recursive.pcapng.gz 996.8 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Module 11 - Putting it All Together/11.1 Hands-on Penetration Test Lab.mp4 960.0 kB
  • Protocol Deep Dive/IPsec - Deep Dive/Exercise Files/03/building-the-ipsec-protocol-slides.pdf 947.4 kB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/04/protecting-data-with-ftp-secure-ftps-slides.pdf 943.2 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Resources/Quiz.pdf 942.1 kB
  • Protocol Deep Dive/EIGRP - Deep Dive/07 - Reviewing EIGRP Load-balancing/29 - Module Introduction.mp4 940.3 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/06_certificate-wrap-up/3. Showcase your work.html 920.8 kB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 9 Managing the Boot Procedure/011. Lesson 9 Lab Managing Initramfs.mp4 908.2 kB
  • Protocol Deep Dive/DNS - Deep Dive/Exercise Files/03/configuring-dns-for-clients-slides.pdf 901.6 kB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/1. Welcome to the exciting world of cybersecurity/01_get-started-with-the-certificate-program/05_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx 900.4 kB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/01_security-domains/01_get-started-with-the-course/03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx 900.4 kB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/05_Resources/02_google-cybersecurity-certificate-glossary/01__Google_Cybersecurity_Certificate_glossary.docx 900.4 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/01_get-started-with-the-course/03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx 900.4 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/05_Resources/02_google-cybersecurity-certificate-glossary/01__Google_Cybersecurity_Certificate_glossary.docx 900.4 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/1. Introduction to operating systems/01_get-started-with-the-course/03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx 900.4 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/05_Resources/02_google-cybersecurity-certificate-glossary/01__Google_Cybersecurity_Certificate_glossary.docx 900.4 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/1. Introduction to asset security/01_get-started-with-the-course/03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx 900.4 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/02_google-cybersecurity-certificate-glossary/01__Google_Cybersecurity_Certificate_glossary.docx 900.4 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/1. Introduction to detection and incident response/01_get-started-with-the-course/03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx 900.4 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/02_google-cybersecurity-certificate-glossary/01__Google_Cybersecurity_Certificate_glossary.docx 900.4 kB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/01_get-started-with-the-course/04_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx 900.4 kB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/05_Resources/02_google-cybersecurity-certificate-glossary/01__Google_Cybersecurity_Certificate_glossary.docx 900.4 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/1. Protect data and communicate incidents/01_get-started-with-the-course/04_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx 900.4 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/06_certificate-wrap-up/05_google-cybersecurity-certificate-glossary_Google_Cybersecurity_Certificate_glossary.docx 900.4 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/06_Resources/04_google-cybersecurity-certificate-glossary/01__Google_Cybersecurity_Certificate_glossary.docx 900.4 kB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/05_Resources/04_google-cybersecurity-certificate-glossary/01__Google_Cybersecurity_Certificate_glossary.docx 900.2 kB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 3 Common Administration Tasks/Lesson 11 Managing User Interfaces/008. Lesson 11 Lab Remotely Accessing the GUI.mp4 896.2 kB
  • Protocol Deep Dive/ICMP - Deep Dive/Exercise Files/06/mastering-ipv6-neighbor-discovery-slides.pdf 894.9 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/43 - Day 43 - Web Foundation - Introduction to CSS/004 5.4-Color-Vocab-Project.zip 894.7 kB
  • Protocol Deep Dive/OSPF - Deep Dive/02 - Covering OSPF Basics/06 - Summary.mp4 892.4 kB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/05_Resources/03_course-7-glossary/01__Course_7_glossary.docx 890.7 kB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/4. Python in practice/05_congratulations-on-completing-course-7/02_course-7-glossary_Course_7_glossary.docx 890.7 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/06_congratulations-on-completing-course-5/02_course-5-glossary_Course_5_glossary.docx 883.1 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/05_course-5-glossary/01__Course_5_glossary.docx 883.1 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/04_course-6-glossary/01__Course_6_glossary.docx 880.4 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/05_congratulations-on-completing-course-6/02_course-6-glossary_Course_6_glossary.docx 880.3 kB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/4. Cybersecurity tools and programming languages/04_congratulations-on-completing-course-1/02_course-1-glossary_Course_1_glossary.docx 879.5 kB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/05_Resources/02_course-1-glossary/01__Course_1_glossary.docx 879.3 kB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/04_use-playbooks-to-respond-to-incidents/04_congratulations-on-completing-course-2/02_course-2-glossary_Course_2_glossary.docx 879.1 kB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/05_Resources/03_course-2-glossary/01__Course_2_glossary.docx 879.1 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/06_congratulations-on-completing-course-3/02_course-3-glossary_Course_3_glossary.docx 878.1 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/05_Resources/03_course-3-glossary/01__Course_3_glossary.docx 878.1 kB
  • Protocol Deep Dive/EIGRP - Deep Dive/05 - Showing How Information Is Exchanged with EIGRP/21 - Summary.mp4 874.8 kB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/02_security-frameworks-and-controls/04_owasp-principles-and-security-audits/06_more-about-security-audits_Control_categories.docx 858.1 kB
  • Protocol Deep Dive/EIGRP - Deep Dive/04 - Determining How Information Is Exchanged with EIGRP/15 - Summary.mp4 855.8 kB
  • Protocol Deep Dive/EIGRP - Deep Dive/06 - Covering EIGRP Advanced Topics/28 - Summary.mp4 846.5 kB
  • Protocol Deep Dive/EIGRP - Deep Dive/03 - Digging into EIGRP Relationships/10 - Summary.mp4 846.3 kB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/4. Python in practice/05_congratulations-on-completing-course-7/3. Get started on the next course.html 825.4 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/44 - Day 44 - Web Foundation - Intermediate CSS/004 6.3-CSS-Box-Model.zip 822.5 kB
  • CompTIA/CompTIA Linux+ (XK0-005)/Module 5 Advanced Administration Tasks/Lesson 17 Managing Linux Server Roles/009. Lesson 17 Lab Creating Self-Signed Certificates.mp4 818.2 kB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/4. Cybersecurity tools and programming languages/04_congratulations-on-completing-course-1/3. Get started on the next course.html 815.3 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/06_congratulations-on-completing-course-5/3. Get started on the next course.html 813.8 kB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/04_use-playbooks-to-respond-to-incidents/04_congratulations-on-completing-course-2/3. Get started on the next course.html 812.2 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/05_congratulations-on-completing-course-6/3. Get started on the next course.html 808.4 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/06_congratulations-on-completing-course-3/3. Get started on the next course.html 805.3 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/06_congratulations-on-completing-course-4/3. Get started on the next course.html 803.0 kB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/05_Resources/03_course-1-resources-and-citations/01__ncsam_eskimming_508.pdf 800.2 kB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/01_security-domains/03_navigate-threats-risks-and-vulnerabilities/5. Manage common threats, risks, and vulnerabilities.html 797.8 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/2. Basic Commands/Bash Reference Manual.html 795.5 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Resources/Intro_to_Python_study_guide__1_.pdf 793.0 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/74 - Day 74 - Advanced - Google Trends Data Resampling and Visualising Time Series/009 Google-Trends-Data-Viz-complete.zip 784.7 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Resources/CHF Module 1 - Analyze Photos Lab - Step by Step Guide.pdf 779.9 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/3. Package and Software Management/4. Device Software Management/Linux kernel - Wikipedia.html 754.7 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/2. Network monitoring and analysis/02_capture-and-view-network-traffic/2. Learn more about packet captures.html 753.5 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/004 2018-Central-Park-Squirrel-Census-Squirrel-Data.csv 747.8 kB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/05_Resources/04_course-2-resources-and-citations/01__NIST.SP.800-218.pdf 740.5 kB
  • Protocol Deep Dive/ICMP - Deep Dive/Exercise Files/02/using-ping-slides.pdf 736.9 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/02_introduction-to-networks/9. Cloud computing and software-defined networks.html 710.8 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/03_automatic-output-generation/01_sending-emails-from-python/03_adding-attachments_media-types.xhtml 709.5 kB
  • Protocol Deep Dive/OSPF - Deep Dive/06 - Troubleshooting Common OSPF Issues/40 - Module Introduction.mp4 705.2 kB
  • Protocol Deep Dive/EIGRP - Deep Dive/07 - Reviewing EIGRP Load-balancing/32 - Summary.mp4 700.3 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/06. Phishing/Resources/Course_Resources_Cybrary_New__1_.pdf 697.5 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/Study Guide.pdf 688.8 kB
  • Protocol Deep Dive/DNS - Deep Dive/Exercise Files/02/Mod2-AtClient-SimpleQuery.pcapng.gz 684.8 kB
  • Protocol Deep Dive/EIGRP - Deep Dive/02 - Covering EIGRP Essentials/05 - Summary.mp4 683.5 kB
  • Protocol Deep Dive/DHCP - Deep Dive/Exercise files/protocoldeepdivedhcp.zip 675.3 kB
  • Protocol Deep Dive/ICMP - Deep Dive/Exercise Files/03/using-traceroute-slides.pdf 674.3 kB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/2. Hardware/2. Components/32-bit and 64-bit Windows_ Frequently asked questions - Windows Help_files.zip 672.3 kB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/4. Cybersecurity tools and programming languages/01_important-cybersecurity-tools/3. Tools for protecting business operations.html 667.2 kB
  • Protocol Deep Dive/IPsec - Deep Dive/Exercise Files/05/securing-the-network-with-ikev1-slides.pdf 662.7 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/56 - Day 56 - Intermediate+ Rendering HTMLStatic files and Using Website Templates/005 html5up-identity.zip 659.8 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/04_local-and-wide-network-communication/2. Components of network layer communication.html 657.6 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/06. Phishing/Resources/Recon-ng_Cheat_Sheet_Cybrary_New.pdf 656.9 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/06_certificate-wrap-up/03_showcase-your-work_overview.html 651.7 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/06_Resources/03_course-8-resources-and-citations/01__overview.html 651.7 kB
  • Protocol Deep Dive/OSPF - Deep Dive/06 - Troubleshooting Common OSPF Issues/48 - Summary.mp4 642.1 kB
  • Google Coursera/IT Support/Supplemental Reading - Courses HTML Files/2. Supplemental Reading.zip 629.3 kB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/3. Operating System/2. Installing an Operating System/balenaEtcher - Home_files.zip 620.0 kB
  • Protocol Deep Dive/IPsec - Deep Dive/Exercise Files/04/using-ipsec-in-the-enterprise-slides.pdf 612.2 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/2. Protect organizational assets/02_encryption-methods/6. The evolution of hash functions.html 599.4 kB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/05_Resources/03_course-1-resources-and-citations/01__IntroToCybersecurityEthics.pdf 592.7 kB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/02 - Starting at the Beginning - FTP Active Mode/12 - Module Summary.mp4 590.0 kB
  • Protocol Deep Dive/IPsec - Deep Dive/Exercise Files/07/implementing-ipsec-in-ipv6-slides.pdf 585.7 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/72 - Day 72 - Advanced - Data Visualisation with Matplotlib Programming Languages/010 Programming-Languages-complete.ipynb.zip 581.9 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/03_automatic-output-generation/02_generating-pdfs-from-python/03_adding-graphics-to-our-pdfs_reportlab-userguide.pdf 560.8 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/04_putting-it-all-together/01_final-course-project/03_how-to-approach-the-problem_reportlab-userguide.pdf 560.8 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Resources/CHF Study Guide.pdf 558.9 kB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/06/simplifying-file-transfers-with-trivial-ftp-tftp-slides.pdf 557.5 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/FireEye APT39 - Exercise Answers.pdf 555.1 kB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/APT39_Answers.pdf 555.1 kB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/2. Hardware/1. The Modern Computer/How to Overclock Your CPU _ Page 3 _ Digital Trends_files.zip 549.2 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Resources/Sniffing_Resources_-_Wireshark__TCPDump_Study_Guide__1_.pdf 545.0 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Resources/Wireshark & TCPDump - Instructor Notes.pdf 545.0 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/01_strings/11_string-reference-cheat-sheet_stdtypes.html 540.3 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/01_strings/12_formatting-strings-cheat-sheet_stdtypes.html 540.3 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/02_lists/11_lists-and-tuples-operations-cheat-sheet_stdtypes.html 540.3 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/03_dictionaries/06_dictionary-methods-cheat-sheet_stdtypes.html 540.3 kB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/03/simplifying-operations-with-ftp-passive-mode-slides.pdf 537.6 kB
  • Protocol Deep Dive/IPsec - Deep Dive/Exercise Files/08/finalizing-ipsec-concepts-slides.pdf 526.3 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Resources/CHF Tool Notes.pdf 526.1 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Resources/Penetration_Testing_Execution_Standard_Study_Guide__1_.pdf 518.1 kB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/1. Welcome to the exciting world of cybersecurity/01_get-started-with-the-certificate-program/2. Google Cybersecurity Certificate overview.html 512.5 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/02_managing-files-with-python/02_managing-files-and-directories/04_files-and-directories-cheat-sheet_os.html 506.3 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/3. Vulnerabilities in systems/03_cyber-attacker-mindset/3. Types of threat actors.html 505.2 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Resources/CHF Module 3 - Recovering Graphics Files Lab - Step by Step Guide.pdf 495.8 kB
  • Protocol Deep Dive/NAT - Deep Dive/protocol-deep-dive-nat.zip 491.7 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/1. Introduction to asset security/04_risk-and-asset-security/3. Security guidelines in action.html 483.8 kB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/05/improving-confidentiality-with-ssh-ftp-sftp-slides.pdf 468.3 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Resources/CHF Module 4 - Live Data Acquisition Lab - Step by Step Guide.pdf 465.8 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Resources/Internet Logs.zip 464.8 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/FireEye APT39 - Exercise.pdf 464.3 kB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/APT39_Annotations.pdf 464.3 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/06. Phishing/Resources/Cybrary_Phishing_Assessment_Lab_Cybrary_New.pdf 460.0 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/09. Password Cracking 101/Module 2 - Password Cracking/2.2 Cracking Hashes.pdf 455.6 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/1. Intro to IT Infrastructure Services/News, Tips, and Advice for Technology Professionals.html 451.7 kB
  • Protocol Deep Dive/ICMP - Deep Dive/Exercise Files/04/conquering-the-fear-of-fragmentation-slides.pdf 451.1 kB
  • Protocol Deep Dive/DNS - Deep Dive/Exercise Files/05/troubleshooting-dns-slides.pdf 444.1 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/3. Software and Platform Services/6. Managing Cloud Resources/Managing Cloud Resources _ Coursera.html 440.6 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/1. What is System Administration/4. Applying Changes/Recording Your Actions _ Coursera.html 440.6 kB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/2. Pelcgbybtl (Cryptology)/1. Symmetric Encryption/Supplemental Reading for The Future of Cryptanalysis _ Coursera.html 440.0 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/3. Package and Software Management/2. Package Managers/Supplemental Reading on GIMP _ Coursera.html 439.3 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Resources/Advanced_Penetration_Testing_Study_Guide__1_.pdf 439.3 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Resources/beginners_python_cheat_sheet_pcc_files_exceptions.pdf 436.9 kB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/6. Creating a Company Culture for Security/2. Users/Phishing prevention with Password Alert FAQ - G Suite Admin Help.html 427.2 kB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/3. Operating System/1. What_s an Operating System/Chrome OS - Wikipedia.html 427.1 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/Lab Info.pdf 426.6 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/FireEye APT39 - Original Report.pdf 425.9 kB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/APT39_Original_Report.pdf 425.9 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/03_overview-of-security-information-event-management-siem/4. Search methods with SIEM tools.html 425.5 kB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/3. Operating System/2. Installing an Operating System/The leading operating system for PCs, IoT devices, servers, cloud Ubuntu files.zip 401.8 kB
  • Protocol Deep Dive/QUIC - Deep Dive/Exercise Files/03/analyzing-quic-with-wireshark-slides.pdf 398.4 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/41 - Day 41 - Web Foundation - Introduction to HTML/008 2.4-Movie-Ranking-Project.zip 398.1 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Resources/Command_Line_Basics_Study_Guide__1_.pdf 397.9 kB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/02_deploying-puppet/01_deploying-puppet-locally/05_more-information-about-deploying-puppet-locally_style_guide.html 397.1 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/06. Phishing/Resources/Phishing_Crafting_the_Perfect_Email.pdf 391.5 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/09. Password Cracking 101/Module 2 - Password Cracking/2.1 Identifying Hash Types.pdf 390.0 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Resources/Study Guide.pdf 387.5 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/2. Protect organizational assets/03_authentication-authorization-and-accounting/2. The rise of SSO and MFA.html 378.4 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/3. Software and Platform Services/2. File Services/Cloud Storage Comparison 2019_ Compare 50+ Cloud Providers.html 375.6 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Resources/Sniffing_Glossary.pdf 374.7 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Resources/Glossary.pdf 374.7 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/05_course-6-resources-and-citations/01__cisa-insights_chain-of-custody-and-ci-systems_508.pdf 369.5 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Resources/CASP__Glossary.pdf 368.5 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/6. Operating Systems in Practice/2. Virtualization/Comparison of platform virtualization software - Wikipedia.html 365.2 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Resources/CHF Additional Tools to Know.pdf 364.1 kB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/02_using-git-locally/01_advanced-git-interaction/05_advanced-git-cheat-sheet_github-git-cheat-sheet.pdf 361.7 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Resources/beginners_python_cheat_sheet_pcc_lists.pdf 360.4 kB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/01_automating-with-configuration-management/03_introduction-to-puppet/04_puppet-resources_lang_resources.html 360.2 kB
  • Protocol Deep Dive/QUIC - Deep Dive/Exercise Files/03/demos/Lab3-QUIC Streams.pcapng 355.8 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/003 Coding-Notebook-Sheets-to-Print.pdf 354.6 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/003 Coding-Notebook-Sheets-to-Print.pdf_original 354.6 kB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/2. Pelcgbybtl (Cryptology)/4. Cryptography Applications/rfc5280.txt 352.6 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/02_overview-of-intrusion-detection-systems-ids/2. Detection tools and techniques.html 351.0 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Resources/beginners_python_cheat_sheet_pcc_dictionaries.pdf 350.3 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Resources/beginners_python_cheat_sheet_pcc_if_while.pdf 350.2 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/01_social-engineering/5. Types of phishing.html 347.5 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/44 - Day 44 - Web Foundation - Intermediate CSS/002 6.1-Font-Properties.zip 341.5 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Resources/Web_Application_Penetration_Testing_Study_Guide__1___1_.pdf 339.5 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Resources/beginners_python_cheat_sheet_pcc_functions.pdf 334.1 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Resources/Sniffing_Study_Guide__1_.pdf 332.7 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Resources/Study Guide.pdf 332.7 kB
  • Protocol Deep Dive/DNS - Deep Dive/Exercise Files/06/securing-dns-slides.pdf 331.8 kB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/02_deploying-puppet/01_deploying-puppet-locally/05_more-information-about-deploying-puppet-locally_install_from_packages.html 329.7 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Resources/Nmap_Study_Guide.pdf 327.9 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Resources/Study Guide.pdf 327.9 kB
  • Protocol Deep Dive/DNS - Deep Dive/Exercise Files/02/Mod2-AtNSPrimary-Recursive.pcapng.gz 323.8 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/75 - Day 75 - Advanced - Beautiful Plotly Charts & Analysing the Android App Store/009 Google-Play-Store-Analysis-Complete.zip 321.5 kB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/2. The evolution of cybersecurity/02_the-eight-cissp-security-domains/4. Understand attackers.html 320.8 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/14. CompTIA Security+ (SY0-601)/Resources/CompTIA Security Plus Syllabus and Outline.pdf 315.7 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/08. OWASP Top 10 - 2021/Resources/OWASP Top 10 2021 Complete Syllabus.pdf 312.9 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/2. OWASP Top 10 - 2021/Resources/OWASP_Top_10_2021_Complete_Syllabus.pdf 312.9 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__NIST.FIPS.140-3.pdf 311.3 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/2. Protect organizational assets/03_authentication-authorization-and-accounting/6. Identity and access management.html 310.1 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/03_network-communication/5. The OSI model .html 310.1 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/2. Network monitoring and analysis/01_understand-network-traffic/4. Maintain awareness with network monitoring.html 300.8 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Resources/CASP__Syllabus.pdf 299.5 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/75 - Day 75 - Advanced - Beautiful Plotly Charts & Analysing the Android App Store/001 Google-Play-Store-Project-Start.zip 291.9 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/05_course-6-resources-and-citations/01__RAID4.pdf 291.7 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Resources/figures.zip 291.0 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/41 - Day 41 - Web Foundation - Introduction to HTML/005 2.1-Heading-Element.zip 289.1 kB
  • Protocol Deep Dive/DNS - Deep Dive/Exercise Files/05/Troubleshooting_Slow_Demo/Mod5-AtNSbind-chi-Slow.pcap.gz 281.3 kB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/5. Connecting to the Internet/5. Wireless Networking/IEEE 802.11 - Wikipedia.html 280.7 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/05_testing-in-python/02_unit-tests/05_unit-test-cheat-sheet_unittest.html 279.7 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/003 Python-Syntax-Cheat-Sheet-Booklet-v2.pdf 279.4 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/003 Python-Syntax-Cheat-Sheet-Booklet-v2.pdf_original 279.4 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Resources/Sniffing_Resources_-_Wireshark_Cheat_Sheet.pdf 279.2 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Resources/Wireshark Cheat Sheet.pdf 279.2 kB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/2. Hardware/2. Components/64-bit computing - Wikipedia.html 275.6 kB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/2. Write effective Python code/02_work-with-functions/5. Work with built-in functions.html 275.6 kB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/05_Resources/04_course-7-resources-and-citations/01__functions.html 275.6 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/002 Solution-Hangman-Flowchart-1.png 270.5 kB
  • Protocol Deep Dive/ICMP - Deep Dive/Exercise Files/05/designing-network-security-for-icmp-slides.pdf 269.8 kB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/03_crashing-programs/01_why-programs-crash/06_resources-for-understanding-crashes_how-to-check-system-logs-on-linux-complete-usage-guide.htm 261.7 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Resources/NMAP_Syllabus_and_Outline__1_.pdf 260.2 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Resources/Syllabus and Outline.pdf 260.2 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Resources/Footprinting Using Passive Tools - Websites Step by Step Guide.pdf 258.3 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/1. Intro to IT Infrastructure Services/The 24 most popular cloud apps used at work.html 256.3 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__what-is-owasp-top-10.html 253.5 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Resources/Copy_of__Syllabus_and_Outline_Template__1_.pdf 251.3 kB
  • Protocol Deep Dive/SNMP - Deep Dive/Exercise Files/03/managing-devices-with-snmp-slides.pdf 251.0 kB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Resources/DFIR_Investigations_and_Witness_Testimony_Study_Guide__1_.pdf 250.0 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Resources/Sniffing_Syllabus_and_Outline-v1.0_Watermark__1_.pdf 249.8 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Resources/Syllabus and Outline.pdf 249.8 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Resources/Glossary_Web_Application_Penetration_Testing___2_.pdf 248.9 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/03_automatic-output-generation/01_sending-emails-from-python/02_introduction-to-python-email-library_rfc2821.html 248.1 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/03_automatic-output-generation/01_sending-emails-from-python/04_sending-the-email-through-an-smtp-server_rfc2821.html 248.1 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/12. Intro to Burp Suite Pro/Resources/Cybrary_Burp_Outline__v2__1_.pdf 247.0 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Resources/Syllabus and Outline.pdf 246.7 kB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/05_Resources/04_course-2-resources-and-citations/01__dod85.pdf 246.1 kB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/2. Hardware/2. Components/32-bit and 64-bit Windows_ Frequently asked questions - Windows Help.html 245.4 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Resources/Application_of_the_MITRE_Attack_Framework_Glossary__1_.pdf 243.5 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Resources/Application_of_the_MITRE_Attack_Framework_Glossary__1_.pdf 243.5 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/02_overview-of-intrusion-detection-systems-ids/06_overview-of-suricata_suricata-yaml.html 242.3 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/05_course-6-resources-and-citations/01__suricata-yaml.html 242.3 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/Syllabus and Outline.pdf 241.4 kB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/2. Hardware/1. The Modern Computer/How to Overclock Your CPU _ Page 3 _ Digital Trends.html 239.6 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/04_post-incident-actions/2. Post-incident review.html 239.0 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Resources/CHF Glossary.pdf 238.6 kB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/3. Operating System/1. What_s an Operating System/ReFS - Wikipedia.html 236.7 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/04. Social Engineering/Resources/Glossary_-_Social_Engineering__1_.pdf 236.2 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/Additional Readings.pdf 236.1 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Resources/Scanning & Enumeration Glossary.pdf 235.8 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/42 - Day 42 - Web Foundation - Intermediate HTML/002 3.0-List-Elements.zip 235.4 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/42 - Day 42 - Web Foundation - Intermediate HTML/004 3.2-Anchor-Elements.zip 233.7 kB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/05_Resources/03_course-1-resources-and-citations/01__why-splunk.html 232.9 kB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/05_Resources/04_course-2-resources-and-citations/01__why-splunk.html 232.9 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/3. File & Text Manipulation/Microsoft PowerShell Tutorial Microsoft Virtual Academy.html 231.4 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Resources/CHF Cisco Router Log Information.pdf 230.9 kB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/3. Operating System/2. Installing an Operating System/UbuntuUpdates - All package updates_files.zip 230.7 kB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/2. The evolution of cybersecurity/02_the-eight-cissp-security-domains/3. Determine the type of attack.html 230.4 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Resources/Footprinting Using Passive Tools - Whois Step by Step Guide.pdf 229.9 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/01_hello-python/04_hello-world/04_first-programming-concepts-cheat-sheet_functions.html 226.5 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/02_managing-files-with-python/01_reading-and-writing-files/05_reading-and-writing-files-cheat-sheet_functions.html 226.5 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/06_Resources/03_course-8-resources-and-citations/01__R0239.pdf 226.4 kB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/6. Creating a Company Culture for Security/1. Risk in the Workplace/Nessus Professional™ Vulnerability Scanner.html 225.4 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/05_course-6-resources-and-citations/01__network-operations-center.html 224.9 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Resources/Assembly_Study_Guide__1_.pdf 224.4 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/1. Intro to IT Infrastructure Services/Azure Active Directory _ Microsoft Azure.html 224.1 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/13. Advanced Penetration Testing/Resources/Advanced_Penetration_Testing_Glossary__2_.pdf 223.7 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/1. Intro to IT Infrastructure Services/The Best Cloud Computing Service Reviews of 2019.html 219.3 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/4. Filesystems/1. Filesystem Types/16.17.5. Recommended Partitioning Scheme - Red Hat Customer Portal.html 219.3 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/2. Centralized Management/Deliver better software, faster _ Puppet.html 218.3 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Resources/Footprinting Using Passive Tools - NsLookup Step by Step Guide.pdf 217.1 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__malware.html 216.8 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Resources/Module 2 - Weaponization Lab Using MSFvenom Step by Step Guide.pdf 214.1 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/05_testing-in-python/03_other-test-concepts/04_more-about-tests_performance-testing.html 212.8 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Resources/Fingerprinting Using Nmap Step by Step Guide.pdf 212.6 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/3. Vulnerabilities in systems/03_cyber-attacker-mindset/2. Approach cybersecurity with an attacker mindset.html 210.9 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/04_managing-data-and-processes/01_data-streams/06_more-about-input-functions_functions.html 210.5 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Resources/Command_Line_Basics_Syllabus_and_Outline__1_.pdf 209.2 kB
  • Protocol Deep Dive/SSH and Telnet - Deep Dive/Files/ssh-telnet-protocol-deep-dive.zip 209.0 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Resources/Glossary.pdf 207.1 kB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/04_use-playbooks-to-respond-to-incidents/01_phases-of-incident-response-playbooks/3. More about playbooks.html 205.2 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/5. Data Recovery & Backups/1. Planning for Data Recovery/Standard RAID levels - Wikipedia.html 203.7 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Resources/Scanning & Enumeration Study Guide.pdf 202.2 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/1. Introduction to operating systems/04_the-user-interface/2. The command line in use.html 201.8 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__paper.pdf 201.8 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/03_regular-expressions/02_basic-regular-expressions/06_regular-expressions-cheat-sheet_re.html 201.0 kB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/05_Resources/03_course-1-resources-and-citations/01__hipaa.html 200.6 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__hipaa.html 200.6 kB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/01_security-domains/02_more-about-the-cissp-security-domains/4. Security domains cybersecurity analysts need to know.html 200.0 kB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/3. Operating System/2. Installing an Operating System/The leading operating system for PCs, IoT devices, servers.html 198.1 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/3. Network Services/Comparison of FTP client software - Wikipedia.html 197.9 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Resources/Sniffing_Resources_-_Wireshark_Filters__1_.pdf 194.4 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Resources/Wireshark Filters.pdf 194.4 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/06. Phishing/Resources/Phishing__1_.pdf 194.1 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/100 - Day 100 - Professional Portfolio Project - [Data Science]/001 [assignment_file] Predict Earnings using Multivariable Regression.zip 191.3 kB
  • Protocol Deep Dive/SNMP - Deep Dive/Exercise Files/02/overview-of-snmp-slides.pdf 191.3 kB
  • Protocol Deep Dive/OSPF - Deep Dive/Exercise Files/06/troubleshooting-common-ospf-issues-slides.pdf 191.2 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Resources/Glossary.pdf 190.7 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/03_answer-interview-questions/6. Prepare for interviews with Interview Warmup.html 187.5 kB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/01_automating-with-configuration-management/04_the-building-blocks-of-configuration-management/03_more-information-about-configuration-management_the-puppet-design-philosophy.html 187.2 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/15. Offensive Penetration Testing/Resources/Offensive_Penetration_Testing_Syllabus.docx.pdf 184.6 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/3. Software and Platform Services/5. Troubleshooting Platform Services/List of HTTP status codes - Wikipedia.html 183.5 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/01_manipulating-images/02_application-programming-interfaces-apis/04_how-to-make-sense-of-an-api_Image.html 182.2 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Resources/Kali_Linux_Fundamentals_Glossary__1_.pdf 180.8 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Resources/Glossary.pdf 180.8 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/003 100-Days-of-Python-Check-Off-Posters.pdf 180.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/003 100-Days-of-Python-Check-Off-Posters.pdf_original 180.2 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/01_social-engineering/3. Social engineering tactics.html 179.5 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/7. Computer Hacking and Forensics/Resources/CHF Recommended Labs.pdf 179.0 kB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/2. Hardware/1. The Modern Computer/CPU cache - Wikipedia_files.zip 178.4 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/11. Web Application Penetration Testing/Resources/Web_Application_Penetration_Testing_Syllabus__6_.pdf 176.9 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__5-signs-youve-been-hit-with-an-apt.html 176.6 kB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/4. Networking Services/5. Network Address Translation/IPv4 address exhaustion - Wikipedia.html 175.6 kB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/2. Pelcgbybtl (Cryptology)/2. Public Key or Asymmetric Encryption/Sony PS3 hacked “for good” master keys.html 175.5 kB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/1. Introduction to Networking/2. The TCPIP Five Layer Network Model/OSI model - Wikipedia.html 175.2 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Resources/Kali_Linux_Fundamentals_Study_Guide__1_.pdf 175.2 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Resources/Study Guide.pdf 175.2 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/05_testing-in-python/03_other-test-concepts/04_more-about-tests_test-first-is-fun_08.html 175.1 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/05_course-6-resources-and-citations/01__question525.htm 174.4 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__what-is-cve-its-definition-and-purpose.html 173.2 kB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/3. Operating System/1. What_s an Operating System/Chrome OS - Wikipedia_files.zip 170.4 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/04. Social Engineering/Resources/Social_Engineering_Study_Guide__1_.pdf 170.3 kB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/3. Operating System/2. Installing an Operating System/balenaEtcher - Home.html 170.2 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/04_managing-data-and-processes/02_python-subprocesses/04_python-subprocesses-cheat-sheet_subprocess.html 169.9 kB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/04_collaboration/03_managing-projects/04_additional-tools_what-is-cicd-continuous-integration-and-continuous-delivery-explained.html 169.2 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/02_malware/2. An introduction to malware.html 167.8 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/003 Syllabus-for-100-Days-of-Python.pdf 167.0 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/003 Syllabus-for-100-Days-of-Python.pdf_original 167.0 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/12. Intro to Burp Suite Pro/Resources/Intro_to_Burp_Suite_Pro_Study_Guide__1_.pdf 166.0 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Resources/Sniffing_Resources_-_TCPDump_Cheat_Sheet.pdf 165.5 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Resources/TCPDump Cheat Sheet.pdf 165.5 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__what-is-phishing-examples-types-and-techniques.html 165.3 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Resources/Penetration_Testing_Execution_Standard__PTES__Glossary__1_.pdf 163.8 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/009 Amended-Hangman-Flowchart.png 163.8 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__hashing-explained-why-its-your-best-bet-to-protect-stored-passwords.html 163.4 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/2. Network operations/01_introduction-to-network-protocols/7. The evolution of wireless security protocols.html 163.0 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/Quiz Questions.pdf 162.8 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/14. How to Use Unicornscan (BSWR)/Resources/How_To_Guide_Unicornscan_by_Tahir_Ibrahim.pdf 160.4 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Resources/Assembly_1.1_Installing_the_Lab_Software_Step-by-Step_Guide.pdf 159.9 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/12. Intro to Burp Suite Pro/Resources/Intro_to_Burp_Suite_Pro_Glossary__1_.pdf 159.8 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__csos-guide-to-phishing-and-phishing-kits.html 159.6 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__ssrf-attacks-explained-and-how-to-defend-against-them.html 159.3 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__gdpr-tldr-what-security-pros-need-to-know-about-the-new-era-of-privacy-regulations.html 159.2 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/2. Physical Infrastructure Services/OpenSSH - Wikipedia.html 158.6 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Resources/Commandline_Basics_Glossary.pdf 158.6 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/05_Resources/06_course-4-resources-and-citations/01__operating-system2.htm 157.3 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Resources/Assembly_Glossary__1_.pdf 157.1 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/3. Vulnerabilities in systems/03_cyber-attacker-mindset/6. Fortify against brute force cyber attacks.html 156.8 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Resources/Intro_to_Python_Glossary__1_.pdf 156.5 kB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/3. Protect against threats, risks, and vulnerabilities/01_frameworks-and-controls/4. Controls, frameworks, and compliance.html 155.5 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Resources/Advanced_Cyber_Threat_Intelligence_Glossary__1___1_.pdf 154.6 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/03_regular-expressions/02_basic-regular-expressions/06_regular-expressions-cheat-sheet_regex.html 154.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/77 - Day 77 - Advanced - Linear Regression and Data Visualisation with Seaborn/001 Seaborn-Linear-Regression-start.zip 151.4 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/06. Cybersecurity Kill Chain™/Resources/Additional Resources.pdf 151.0 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/3. Intro to Malware Analysis and Reverse Engineering/Resources/Intro_to_Malware_Analysis_and_Reverse_Engineering_Glossary__1_.pdf 150.7 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/3. Secure against network intrusions/02_secure-networks-against-denial-of-service-dos-attacks/2. Read tcpdump logs.html 150.2 kB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/2. The Network Layer/4. Routing/Border Gateway Protocol - Wikipedia.html 150.0 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/06. Phishing/Resources/Phishing_Crafting_The_Perfect_Email_Glossary_New__2_.pdf 149.9 kB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/2. Hardware/2. Components/Kilobyte - Wikipedia.html 149.3 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/07. Penetration Testing and Ethical Hacking/Resources/Penetration_Testing_and_Ethical_Hacking_Syllabus_and_Outline__1___2_.pdf 149.1 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/3. Package and Software Management/4. Device Software Management/Windows Update - Wikipedia.html 148.1 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/02_interacting-with-web-services/01_web-applications-and-services/04_data-serialization-formats_pickle.html 148.0 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Resources/Intro_to_Python_Solutions__1_.pdf 147.6 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Resources/Sniffing_Resources_-_Lab_3_Applying_Filters_to_TCPDump_and_Wireshark__1_.pdf 145.9 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Resources/Lab 3 Applying Filters to TCPDump and Wireshark - Step by Step Guide.pdf 145.9 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/05_course-6-resources-and-citations/01__Bryan_Nolen_-_Surviving_Your_First_Incident_Purplecon_2018.pdf 145.8 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Resources/Sniffing_Resources_-_Lab_1_Wireshark__1_.pdf 145.6 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Resources/Lab 1 Wireshark - Step by Step Guide.pdf 145.6 kB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Resources/DFIR_Investigations_and_Witness_Testimony_Glossary__1_.pdf 145.4 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/3. Vulnerabilities in systems/01_flaws-in-the-system/5. The OWASP Top 10.html 145.3 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/1. Introduction to asset security/03_digital-and-physical-assets/2. The emergence of cloud security.html 144.7 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/3. Software and Platform Services/3. Print Services/CUPS - Wikipedia.html 142.8 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/4. Filesystems/1. Filesystem Types/Paging - Wikipedia.html 142.4 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/Glossary.pdf 142.1 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/43 - Day 43 - Web Foundation - Introduction to CSS/003 5.3-CSS-Selectors.zip 141.4 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/APT39 and Cobalt Kitty Techniques.pdf 140.1 kB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/APT39-and-Cobalt-Kitty-Techniques.pdf 140.1 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/3. Package and Software Management/4. Device Software Management/Device file - Wikipedia.html 140.1 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Resources/Sniffing_Resources_-_Lab_2_Packet_Sniffing__1_.pdf 140.0 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Resources/Lab 2 Packet Sniffing - Step by Step Guide.pdf 140.0 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Resources/OSINT_Fundamentals_Quiz.pdf 138.1 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Resources/Advanced_Cyber_Threat_Intelligence_Syllabus_and_Outline__1___1_.pdf 138.0 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Resources/OSINT_Fundamentals_Syllabus_and_Outline.pdf 137.3 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/1. Introduction to operating systems/03_the-operating-system-at-work/2. Requests to the operating system.html 137.1 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/2. Network operations/02_system-identification/4. Subnetting and CIDR.html 137.1 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/2. Network monitoring and analysis/03_packet-inspection/2. Overview of tcpdump.html 135.7 kB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/2. Pelcgbybtl (Cryptology)/1. Symmetric Encryption/Integer factorization - Wikipedia.html 134.8 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/6. Operating Systems in Practice/1. Remote Access/Comparison of SSH clients - Wikipedia.html 134.1 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Resources/Intro_to_Python-Syllabus_update_-5_5_2022-.pdf 133.9 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Resources/Sniffing_Resources_-_Lab_4_TCPDump__1_.pdf 133.2 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Resources/Lab 4 TCPDump - Step by Step Guide.pdf 133.2 kB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/2. The Network Layer/4. Routing/Open Shortest Path First - Wikipedia.html 132.7 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/4. Filesystems/1. Filesystem Types/Why Linux Doesn’t Need Defragmenting.html 132.5 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/2. Protect organizational assets/01_safeguard-information/4. Information privacy - Regulations and compliance.html 132.3 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/01_incident-detection-and-verification/5. Indicators of compromise.html 130.8 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/4. Advanced Cyber Threat Intelligence/Resources/Advanced_Cyber_Threat_Intelligence_Resources.pdf 130.4 kB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/5. Connecting to the Internet/3. Broadband Connections/Point-to-Point Protocol over Ethernet - Wikipedia.html 128.8 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/2. MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training/Resources/MITRE_ATT_CK_Defender_____MAD__ATT_CK___Fundamentals_Badge_Training_Syllabus_and_Outline__1_.pdf 128.8 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/56 - Day 56 - Intermediate+ Rendering HTMLStatic files and Using Website Templates/004 personal-site-html-and-css-files.zip 128.5 kB
  • Protocol Deep Dive/QUIC - Deep Dive/Exercise Files/03/demos/Lab3-keys.log 127.6 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/05_Resources/06_course-4-resources-and-citations/01__ShellIntro.pdf 127.4 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/02_overview-of-intrusion-detection-systems-ids/6. Overview of Suricata.html 127.4 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/6. Operating Systems in Practice/2. Virtualization/Chapter 1. First Steps.html 127.3 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/3. Application of the MITRE ATT&CK Framework/Resources/Application_of_the_MITRE_Attack_Framework_Syllabus_and_Outline.pdf 127.0 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Resources/Application_of_the_MITRE_Attack_Framework_Syllabus_and_Outline.pdf 127.0 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/04_threat-modeling/4. Traits of an effective threat model.html 123.8 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/4. Filesystems/1. Filesystem Types/How to determine the appropriate page filesize for 64-bit win.html 122.2 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/1. Intro to IT Infrastructure Services/Cloud Hosted Directory Services.html 121.7 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/76 - Day 76 - Advanced - Computation with NumPy and N-Dimensional Arrays/001 Computation-with-NumPy-start.zip 120.4 kB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/1. Introduction to Networking/4. The Physical Layer/Ethernet over twisted pair - Wikipedia.html 120.3 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/05. Malware Threats/Resources/Malware_Threats_Rootkit_Lab__1_.pdf 119.6 kB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/2. The Network Layer/4. Routing/April Fools_ Day Request for Comments - Wikipedia.html 118.7 kB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Resources/DFIR_Investigation_and_Witness_Testimony_Syllabus.pdf 117.0 kB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/5. Connecting to the Internet/4. WANs/Asynchronous transfer mode - Wikipedia.html 116.0 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/07. Scanning, Enumeration, and Vulnerabilities/Resources/Scanning & Enumeration Scanning Assessment.pdf 115.8 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/4. Filesystems/1. Filesystem Types/Default cluster size for NTFS, FAT, and exFAT.html 115.4 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/02. Open Source Intelligence (OSINT) Fundamentals/Resources/OSINT_Fundamentals_Glossary.pdf 115.0 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Resources/Assembly_Syllabus_and_Outline.pdf 114.8 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/ticket-473845 answers.pdf 114.7 kB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/ticket-473845_answers.pdf 114.7 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/10. Sniffing/Resources/Sniffing_Resources_-_Cheat_Sheet_Sources.pdf 114.5 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/09. Sniffing/Resources/Wireshark & TCPDump Sources.pdf 114.5 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__sql_injection.asp 112.8 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/3. Package and Software Management/4. Device Software Management/ConfigMgr_ Windows Update Explained.html 112.8 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/03. NMAP/Resources/Glossary_Nmap.pdf 112.6 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 2/1. NMAP/Resources/Glossary.pdf 112.6 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/2. Protect organizational assets/02_encryption-methods/4. Resources for completing labs.html 111.1 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/2. Network monitoring and analysis/02_capture-and-view-network-traffic/6. Resources for completing labs.html 111.1 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/05_Resources/03_resources-for-completing-linux-labs/01__resources.html 111.1 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/2. The Linux operating system/02_linux-distributions/4. Resources for completing Linux labs.html 111.1 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/02_sql-queries/3. Resources for completing SQL labs.html 111.1 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/05_Resources/04_resources-for-completing-sql-labs/01__resources.html 111.1 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/03_resources-for-completing-labs/01__resources.html 111.1 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/03_resources-for-completing-labs/01__resources.html 111.1 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/11. Identifying Web Attacks Through Logs/Resources/Syllabus and Outline.pdf 110.9 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/10. Introduction to Splunk/Resources/Cheat Sheet.pdf 110.6 kB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/4. Python in practice/02_work-with-files-in-python/2. Import files into Python.html 109.9 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/98 - Day 98 - Professional Portfolio Project - [Data Science]/001 [assignment_file] Analyse and Visualise the Space Race.zip 109.4 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/1. Introduction to asset security/02_introduction-to-assets/6. Common classification requirements.html 108.8 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/3. Linux commands in the Bash shell/01_navigate-the-linux-file-system/4. Navigate Linux and read file content.html 107.4 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/3. Software and Platform Services/1. Software Services/The 12 Best Team Chat Apps for Your Company.html 107.0 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/6. Operating Systems in Practice/1. Remote Access/Looking Forward_ Microsoft Support for Secure Shell (SSH) _ PowerShell.html 106.8 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/04. Social Engineering/Resources/Social_Engineering_Syllabus_and_Outline__1_.pdf 105.5 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/3. Package and Software Management/4. Device Software Management/udev - Wikipedia.html 104.5 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/05. Malware Threats/Resources/Malware_Threats_Analyze_and_Classify_Malware_Lab__1___1_.pdf 104.0 kB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/6. Troubleshooting/5. Writing Effective Documentation _ Coursera.pdf 103.8 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/05. Malware Threats/Resources/Malware_Threats_Syllabus_and_Outline__1_.pdf 103.3 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/01_strings/12_formatting-strings-cheat-sheet_string.html 101.8 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/05_testing-in-python/04_errors-and-exceptions/04_handling-errors-cheat-sheet_simple_stmts.html 101.7 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Resources/Vector_Floating_Point_Instruction_Set.pdf 101.6 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/05_testing-in-python/03_other-test-concepts/04_more-about-tests_smoke-testing.html 99.8 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/5. Data Recovery & Backups/1. Planning for Data Recovery/Back up and restore your PC - Windows Help.html 99.7 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/2. Physical Infrastructure Services/PuTTY - Wikipedia.html 99.5 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/03. Command Line Basics/Resources/Command_Line_Basics_Command_Categories__1_.pdf 98.6 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/Syllabus and Outline.pdf 98.4 kB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/MITRE_ATT_CK_Defender_____MAD__ATT_CK___Cyber_Threat_Intelligence_Certification_Training_Syllabus_and_Outline.pdf 98.2 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/4. Filesystems/1. Filesystem Types/Description of the FAT32 File System.html 97.3 kB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/1. Introduction to IT/3. Digital Logic/Logic gate - Simple English Wikipedia, the free encyclopedia.html 97.1 kB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/6. Creating a Company Culture for Security/1. Risk in the Workplace/Qualys Community Edition _ Qualys, Inc..html 96.5 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/3. Network Services/Comparison of DHCP server software - Wikipedia.html 96.1 kB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/2. The Network Layer/4. Routing/Routing Information Protocol - Wikipedia.html 94.8 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/2. Physical Infrastructure Services/Server Operating Systems - PC World Australia.html 94.5 kB
  • Protocol Deep Dive/DNS - Deep Dive/Exercise Files/05/Troubleshooting_Slow_Demo/Mod5-AtNSStub-Slow.pcapng.gz 94.1 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/5. OpenLDAP/How To Use LDIF Files to Make Changes to an OpenLDAP System _ DigitalOcean.html 94.0 kB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/5. Connecting to the Internet/4. WANs/Frame Relay - Wikipedia.html 93.9 kB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/2. The Network Layer/4. Routing/Enhanced Interior Gateway Routing Protocol - Wikipedia.html 93.8 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/3. Package and Software Management/2. Package Managers/Chocolatey Gallery _ Packages.html 93.7 kB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/6. Troubleshooting and Future of Networking/2. Verifying Connectivity/netcat - Wikipedia.html 93.7 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/04_putting-it-all-together/01_final-course-project/03_how-to-approach-the-problem_shutil.html 93.3 kB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/5. Connecting to the Internet/4. WANs/High-Level Data Link Control - Wikipedia.html 92.5 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/4. Filesystems/1. Filesystem Types/How to start Disk Cleanup by using the command line.html 92.1 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/05_course-6-resources-and-citations/01__xml_whatis.asp 91.5 kB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/5. Connecting to the Internet/3. Broadband Connections/Point-to-Point Protocol - Wikipedia.html 91.4 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/05_testing-in-python/03_other-test-concepts/04_more-about-tests_exploratory-testing.html 91.3 kB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/03_automation-in-the-cloud/03_automating-cloud-deployments/04_more-about-cloud-gcp_gcp.html 91.2 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/5. OpenLDAP/How To Install and Configure OpenLDAP phpLDAPadmin.html 90.5 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/01_strings/12_formatting-strings-cheat-sheet_lexical_analysis.html 89.1 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/03_automatic-output-generation/01_sending-emails-from-python/02_introduction-to-python-email-library_email.message.html 89.0 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/03_automatic-output-generation/01_sending-emails-from-python/04_sending-the-email-through-an-smtp-server_email.message.html 89.0 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/3. File & Text Manipulation/PowerShell_README.md at master · PowerShell_PowerShell · GitHub.html 88.6 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/05_testing-in-python/04_errors-and-exceptions/04_handling-errors-cheat-sheet_exceptions.html 87.8 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/2. Centralized Management/Role-based access control - Wikipedia.html 87.7 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/3. Package and Software Management/4. Device Software Management/How Do I Update Ubuntu Linux Software.html 87.3 kB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/2. Pelcgbybtl (Cryptology)/4. Cryptography Applications/RFC 3193 - Securing L2TP using IPsec.html 87.3 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/1. Introduction to detection and incident response/03_incident-response-operations/3. Roles in response.html 86.4 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/ticket-473822 answers.pdf 86.3 kB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/ticket-473822_answers.pdf 86.3 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/3. Package and Software Management/2. Package Managers/NuGet - Wikipedia.html 86.1 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/02_interacting-with-web-services/01_web-applications-and-services/05_more-about-json_json.html 85.4 kB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/1. Understanding Security Threats/3. Network Attacks/Dyn Analysis Summary Of Friday October 21 Attack _ Dyn Blog.html 85.4 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/16. Penetration Testing Execution Standard (PTES)/Resources/Penetration_Testing_Execution_Standard__PTES__Syllabus_and_Outline__1_.pdf 83.0 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/3. Software and Platform Services/5. Troubleshooting Platform Services/Chrome DevTools Overview - Google Chrome.html 82.7 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/6. Operating Systems in Practice/4. Operating System Deployment/Comparison of disk cloning software - Wikipedia.html 82.2 kB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/2. Pelcgbybtl (Cryptology)/1. Symmetric Encryption/Supplemental Reading for The Future of Cryptanalysis _ Coursera.PNG 80.0 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/1. What is System Administration/2. What is System Administration/KVM switch - Wikipedia.html 79.0 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__vulnerability-vs-threat-vs-risk.html 78.6 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/006 Coffee-Machine-Classes-Documentation.pdf 77.4 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/3. Software and Platform Services/1. Software Services/Why You May Not Want To Run Your Own Mail Server _ DigitalOcean.html 77.4 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/4. Filesystems/1. Filesystem Types/DiskPart Command-Line Options _ Microsoft Docs.html 76.9 kB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/2. Pelcgbybtl (Cryptology)/2. Public Key or Asymmetric Encryption/Supplemental reading for asymmetric encryption attack.PNG 76.9 kB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/05_Resources/03_course-1-resources-and-citations/01__rules-and-security-requirements.html 76.6 kB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/01_introduction-to-version-control/04_using-git/05_initial-git-cheat-sheet_submitting-patches.rst 76.4 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/3. Network Services/Preboot Execution Environment - Wikipedia.html 75.2 kB
  • Protocol Deep Dive/IPsec - Deep Dive/Exercise Files/04/demos/Module 4/Mod 4 DMVPN PCAP.pcap 75.0 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/2. Network monitoring and analysis/03_packet-inspection/02_overview-of-tcpdump_tcpdump.1.html 74.3 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/05_course-6-resources-and-citations/01__tcpdump.1.html 74.3 kB
  • Protocol Deep Dive/SNMP - Deep Dive/Exercise Files/06/troubleshooting-using-snmp-slides.pdf 74.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/002 Course-Pledge-App-Brewery-100-Days-of-Python.pdf 73.8 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/002 Course-Pledge-App-Brewery-100-Days-of-Python.pdf_original 73.8 kB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/1. Understanding Security Threats/3. Network Attacks/Major DNS Cache Poisoning Attack Hits Brazilian ISPs _ Threatpost.html 73.6 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/72 - Day 72 - Advanced - Data Visualisation with Matplotlib Programming Languages/002 QueryResults.csv 73.6 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/04_putting-it-all-together/01_final-course-project/03_how-to-approach-the-problem_smtplib.html 72.1 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/5. Process Management/2. Managing Processes/ps(1) - Linux manual page.html 72.0 kB
  • Protocol Deep Dive/IPsec - Deep Dive/Exercise Files/03/demos/Mod 3 PCAP.pcap 71.6 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/02_managing-files-with-python/03_reading-and-writing-csv-files/05_csv-files-cheat-sheet_csv.html 71.1 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/03_automatic-output-generation/01_sending-emails-from-python/04_sending-the-email-through-an-smtp-server_smtplib.html 71.0 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/78 - Day 78 - Advanced - Analysing the Nobel Prize with Plotly, Matplotlib & Seaborn/001 Nobel-Prize-Analysis-Start.zip 70.5 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/006 Coffee-Machine-Program-Requirements.pdf 70.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/006 Coffee-Machine-Program-Requirements.pdf 69.2 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/01_incident-detection-and-verification/05_indicators-of-compromise_the-pyramid-of-pain.html 68.7 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/05_course-6-resources-and-citations/01__the-pyramid-of-pain.html 68.7 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/05_Resources/06_course-4-resources-and-citations/01__thegnuproject.html 66.6 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/4. Filesystems/1. Filesystem Types/fstab - Wikipedia.html 66.3 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/01_manipulating-images/02_application-programming-interfaces-apis/04_how-to-make-sense-of-an-api_tutorial.html 65.9 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/01_manipulating-images/03_manipulating-images/01_how-to-use-pil-for-working-with-images_tutorial.html 65.9 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/04_putting-it-all-together/01_final-course-project/03_how-to-approach-the-problem_tutorial.html 65.9 kB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/6. Troubleshooting/4. Going through a Technical Interview/Crafting Your Resume _ Coursera.pdf 65.4 kB
  • Protocol Deep Dive/DNS - Deep Dive/Exercise Files/05/Troubleshooting_Slow_Demo/Mod5-AtNSPrimary-Slow.pcapng.gz 65.2 kB
  • Protocol Deep Dive/DNS - Deep Dive/Exercise Files/02/Betty-DNS.zip 65.1 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Resources/Robert_Smith_-_Syllabus_Kali_Fundamentals_-_Updated.pdf 64.9 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Resources/Syllabus and Outline.pdf 64.9 kB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/05_Resources/04_course-2-resources-and-citations/01__Cyber-Incident-Response-Standard.docx 64.8 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/05_Resources/06_course-4-resources-and-citations/01__01-intro.html 64.8 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/05_Resources/04_course-3-resources-and-citations/01__article.asp 64.3 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/2. Centralized Management/Chef Infra _ Chef.html 64.2 kB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/2. Pelcgbybtl (Cryptology)/4. Cryptography Applications/Supplemental reading for securing traffic network.PNG 63.2 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/05_Resources/04_course-3-resources-and-citations/01__what-is-a-firewall.html 62.8 kB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/1. Introduction to IT/3. Digital Logic/Logic gate - Simple English Wikipedia, the free encyclopedia_files.zip 62.4 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/2. Users and Permissions/1. Users and Groups/Selecting Secure Passwords _ Microsoft Docs.html 62.2 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/4. Active Directory/How the Windows Time Service Works _ Microsoft Docs.html 61.7 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__resources.html 61.6 kB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/3. Operating System/1. What_s an Operating System/ReFS - Wikipedia_files.zip 60.4 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/5. Process Management/3. Process Utilization/Load (computing) - Wikipedia.html 60.0 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/4. Assembly/Resources/Thumb___16-bit_Instruction_Set.pdf 59.7 kB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/2. Hardware/2. Components/64-bit computing - Wikipedia_files.zip 59.6 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/2. Centralized Management/Introduction - Configuration Manager _ Microsoft Docs.html 59.1 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/003 Starting-Files-flask-auth-start.zip 58.7 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/04_putting-it-all-together/01_final-course-project/03_how-to-approach-the-problem_email.examples.html 57.9 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/87 - Day 87 - Professional Portfolio Project - [Web Development]/001 [assignment_file] Cafe and Wifi Website.db 57.3 kB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/3. Operating System/2. Installing an Operating System/UbuntuUpdates - All package updates.html 56.4 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/4. Filesystems/1. Filesystem Types/fsck - Wikipedia.html 56.3 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/12. Intro to Python/Resources/Challenges.pdf 56.3 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/5. Data Recovery & Backups/1. Planning for Data Recovery/Back up your Mac with Time Machine - Apple Support.html 56.1 kB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/4. Securing Your Networks/2. Wireless Security/Weaknesses in the Key Scheduling Algorithm of RC4 _ SpringerLink.html 55.8 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/02_managing-files-with-python/02_managing-files-and-directories/04_files-and-directories-cheat-sheet_os.path.html 55.6 kB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/2. Hardware/2. Components/Kilobyte - Wikipedia_files.zip 55.3 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/3. File & Text Manipulation/A guided tour of Emacs.html 55.2 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/Making Defensive Recommendations Unguided Exercise.rtf 54.9 kB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/Making_Defensive_Recommendations_Unguided_Exercise.rtf 54.9 kB
  • Protocol Deep Dive/DNS - Deep Dive/Exercise Files/05/Troubleshooting_Slow_Demo/Mod5-AtNSSecondary-Slow.pcapng.gz 54.5 kB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/6. Troubleshooting/4. Going through a Technical Interview/Creating Your Elevator Pitch _ Coursera.pdf 53.9 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/1. Intro to IT Infrastructure Services/Network as a service - Wikipedia.html 53.7 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/5. OpenLDAP/OpenLDAP Software 2.4 Administrator_s Guide_ Configuring slapd.html 53.6 kB
  • Protocol Deep Dive/SNMP - Deep Dive/Exercise Files/04/configuring-snmp-slides.pdf 52.9 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/80 - Day 80 - Advanced - Capstone Project - Predict House Prices/001 Multivariable-Regression-Start.zip 52.9 kB
  • Protocol Deep Dive/QUIC - Deep Dive/Exercise Files/02/demos/Lab1-QUIC.pcapng 52.4 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/03_answer-interview-questions/2. Apply the STAR method during interviews.html 52.2 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/1. Intro to IT Infrastructure Services/Amazon Cloud Directory _ Amazon Web Services (AWS).html 52.0 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/Making Defensive Recommendations Guided Exercise.rtf 51.4 kB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/Making_Defensive_Recommendations_Guided_Exercise.rtf 51.4 kB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/2. Pelcgbybtl (Cryptology)/4. Cryptography Applications/Supplemental reading for TPM Attacks.PNG 49.7 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/03_automatic-output-generation/02_generating-pdfs-from-python/03_adding-graphics-to-our-pdfs_instructions.html 49.6 kB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/2. Pelcgbybtl (Cryptology)/4. Cryptography Applications/Open Source Community _ OpenVPN.html 49.5 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/01_hello-python/03_introduction-to-python/04_more-about-python_license.html 49.5 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/05_testing-in-python/04_errors-and-exceptions/04_handling-errors-cheat-sheet_errors.html 49.3 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/5. Data Recovery & Backups/1. Planning for Data Recovery/rsync - ArchWiki.html 49.2 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/03_automatic-output-generation/02_generating-pdfs-from-python/02_adding-tables-to-our-pdfs_instructions.html 49.0 kB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/01_introduction-to-version-control/02_before-version-control/06_diff-and-patch-cheat-sheet_patch.1.html 48.9 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/5. Process Management/2. Managing Processes/Get-Process.html 48.6 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/5. Process Management/3. Process Utilization/Get-Process.html 48.6 kB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/02_slowness/01_understanding-slowness/06_monitoring-tools_linuxperf.html 48.6 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/31 - Day 31 - Intermediate - Flash Card App Capstone Project/009 Solution-flash-card-project-end.zip 47.8 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/4. Active Directory/Windows Server 2016 Functional Levels _ Microsoft Docs.html 47.4 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/31 - Day 31 - Intermediate - Flash Card App Capstone Project/001 flash-card-project-start.zip 47.0 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/005 Solution-kanye-quotes-end.zip 46.7 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/005 kanye-quotes-start.zip 46.6 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/03_answer-interview-questions/03_prepare-for-interviews_vol01iss13.cfm 46.6 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/06_Resources/03_course-8-resources-and-citations/01__vol01iss13.cfm 46.6 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__encryption-explained.html 46.3 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/3. Package and Software Management/4. Device Software Management/Linux 101_ Updating Your System _ Linux.com.html 45.9 kB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/6. Troubleshooting and Future of Networking/5. IPv6/Anything In Anything - Wikipedia.html 45.1 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/007 Solution-us-states-game-end.zip 45.0 kB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/4. Securing Your Networks/2. Wireless Security/Supplemental reading for WEP Encryption and why you shouldn_t use it.PNG 45.0 kB
  • Google Coursera/IT Support/1. Technical Support Fundamentals/6. Troubleshooting/6. Course Wrap-up/work.jpg 44.7 kB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/2. Pelcgbybtl (Cryptology)/4. Cryptography Applications/Supplemental reading for X.509 Standard.PNG 44.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/005 us-states-game-start.zip 44.1 kB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/4. Securing Your Networks/2. Wireless Security/VU#723755 - WiFi Protected Setup (WPS) PIN brute force vulnerability.html 43.7 kB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/05_Resources/03_course-1-resources-and-citations/01__55.html 43.5 kB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/3. The 3 A's of Cybersecurity - Authentication, Authorization, Accounting/2. Authorization/Supplemental reading for Authorization.PNG 43.4 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/02_interacting-with-web-services/02_python-requests/04_what-is-django_flask.html 43.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/74 - Day 74 - Advanced - Google Trends Data Resampling and Visualising Time Series/001 Google-Trends-Data-Viz-start.zip 42.0 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/3. Software and Platform Services/1. Software Services/Redbooth101-LetstalkAboutEmail-Redbooth.jpg 41.4 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/4. Active Directory/Troubleshooting Active Directory—Related DNS Problems _ Microsoft Docs.html 40.4 kB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/6. Troubleshooting and Future of Networking/2. Verifying Connectivity/Test-NetConnection.html 40.0 kB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/6. Troubleshooting and Future of Networking/5. IPv6/6in4 - Wikipedia.html 39.8 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/5. Process Management/2. Managing Processes/signal _ Microsoft Docs.html 38.9 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/42 - Day 42 - Web Foundation - Intermediate HTML/003 3.1-Nesting-and-Indentation.zip 38.7 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/1. What is System Administration/4. Applying Changes/Start-Transcript.html 38.3 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/05_course-6-resources-and-citations/01__resources.html 37.9 kB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/05_Resources/03_course-1-resources-and-citations/01__display.cfm 37.9 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/5. Data Recovery & Backups/1. Planning for Data Recovery/GitLab.com database incident _ GitLab.html 37.6 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/3. LDAP/What Is Kerberos Authentication__ Logon and Authentication _ Microsoft Docs.html 37.5 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/4. Active Directory/Check Group Policy Infrastructure Status _ Microsoft Docs.html 35.9 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/3. LDAP/LDAP Data Interchange Format - Wikipedia.html 35.9 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/5. OpenLDAP/LDAP Data Interchange Format - Wikipedia.html 35.9 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/6. Operating Systems in Practice/3. Logging/Ubuntu Manpage_ logrotate ‐ rotates, compresses, and mails system logs.html 35.0 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/05_Resources/04_course-3-resources-and-citations/01__aa494182vexchg.140 34.8 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/3. Package and Software Management/4. Device Software Management/Step 2 A Driver for the Device is Selected - Windows drivers.html 34.7 kB
  • Protocol Deep Dive/SNMP - Deep Dive/Exercise Files/02/demos/SNMPv3.pcap 34.6 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Resources/Kali_Linux_-_Robert_Smith_-_Module_3_Quiz.pdf 34.2 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Resources/Module 3 - Quiz.pdf 34.2 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/5. Process Management/1. Life of a Process/taskkill _ Microsoft Docs.html 34.0 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Resources/Kali_Linux_-_Robert_Smith_-_Module_2_Quiz.pdf 33.9 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Resources/Module 2 - Quiz.pdf 33.9 kB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/05_Resources/04_course-2-resources-and-citations/01__resources.html 33.8 kB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/02_slowness/01_understanding-slowness/06_monitoring-tools_usemethod.html 33.3 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/02_overview-of-intrusion-detection-systems-ids/06_overview-of-suricata_index.html 33.3 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/05_course-6-resources-and-citations/01__index.html 33.3 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/03_automatic-output-generation/01_sending-emails-from-python/04_sending-the-email-through-an-smtp-server_mimetypes.html 33.0 kB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/6. Troubleshooting and Future of Networking/5. IPv6/Tunnel Setup Protocol - Wikipedia.html 33.0 kB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/6. Creating a Company Culture for Security/1. Risk in the Workplace/Supplemental reading for risk in the workplace.PNG 32.6 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/09. Password Cracking 101/Module 1 - Introduction/1.1 Introduction.pdf 32.3 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/2. Physical Infrastructure Services/Remote Desktop clients _ Microsoft Docs.html 32.2 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/2. Basic Commands/PowerShell Scripting _ Microsoft Docs.html 32.0 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/3. Software and Platform Services/1. Software Services/jabber.at - Jabber_XMPP Clients.html 32.0 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/3. Package and Software Management/4. Device Software Management/Introduction to Plug and Play - Windows drivers _ Microsoft Docs.html 32.0 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/05. Kali Linux Fundamentals/Resources/Kali_Linux_-_Robert_Smith_-_Module_4_Quiz.pdf 31.6 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 1 Path/02. Kali Linux Fundamentals/Resources/Module 4 - Quiz.pdf 31.6 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/3. Package and Software Management/4. Device Software Management/Step 1 The New Device is Identified - Windows drivers.html 31.5 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/3. Package and Software Management/4. Device Software Management/Hardware ID - Windows drivers _ Microsoft Docs.html 31.5 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/011 Treasure-Island-Flowchart-pdf.pdf 31.4 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/1. CompTIA CASP+ (CAS-004)/Resources/CASP__Resources.pdf 31.1 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/4. Active Directory/Group scope_ Active Directory _ Microsoft Docs.html 30.3 kB
  • Cybrary/Cybrary - Become a Penetration Tester Path/09. Password Cracking 101/Module 2 - Password Cracking/2.3 Mitigation.pdf 30.2 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/3. Software and Platform Services/2. File Services/Server Message Block Overview _ Microsoft Docs.html 30.1 kB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/04_collaboration/03_managing-projects/04_additional-tools_diy.html 29.9 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/2. Physical Infrastructure Services/About Windows Remote Management.html 29.7 kB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/3. The 3 A's of Cybersecurity - Authentication, Authorization, Accounting/1. Authentication/Indian pupils cheat biometric system with glue _ Planet Biometrics News.html 29.3 kB
  • Protocol Deep Dive/SNMP - Deep Dive/Exercise Files/05/monitoring-systems-with-snmp-slides.pdf 29.3 kB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/05_Resources/03_course-1-resources-and-citations/01__resources.html 28.8 kB
  • Protocol Deep Dive/IPsec - Deep Dive/Exercise Files/07/demos/IPv6 Over IPv4 PCAP.pcap 28.7 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/4. Active Directory/What Are Security Principals_ _ Microsoft Docs.html 28.5 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/3. Software and Platform Services/2. File Services/NFS-Utils-2.3.4.html 27.8 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/03_automatic-output-generation/01_sending-emails-from-python/02_introduction-to-python-email-library_email.html 27.8 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/03_automatic-output-generation/01_sending-emails-from-python/04_sending-the-email-through-an-smtp-server_email.html 27.8 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/4. Active Directory/Features of EFS _ Microsoft Docs.html 27.5 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/4. Active Directory/Gpresult _ Microsoft Docs.html 27.2 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/6. Operating Systems in Practice/1. Remote Access/Download PuTTY_ latest release (0.71).html 27.2 kB
  • Google Coursera/IT Support/2. The Bits and Bytes of Computer Networking/2. The Network Layer/4. Routing/IETF _ Internet Engineering Task Force.html 27.0 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/6. Operating Systems in Practice/1. Remote Access/Net share _ Microsoft Docs.html 26.9 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/5. Process Management/2. Managing Processes/Process Explorer - Windows Sysinternals _ Microsoft Docs.html 26.9 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/3. Package and Software Management/3. Whats happening in the background/Process Monitor - Windows Sysinternals.html 26.6 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__16-software-updates.html 26.1 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/2. Basic Commands/Windows Confidential _ Microsoft Docs.html 25.6 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/4. Active Directory/W32tm _ Microsoft Docs.html 25.3 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/3. Software and Platform Services/3. Print Services/Overview of Print and Document Services _ Microsoft Docs.html 25.1 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/4. Filesystems/1. Filesystem Types/Creating Symbolic Links - Windows applications _ Microsoft Docs.html 24.8 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/2. Users and Permissions/2. Permissions/Access Control Lists - Windows applications _ Microsoft Docs.html 24.6 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/2. Users and Permissions/2. Permissions/File and Folder Permissions _ Microsoft Docs.html 24.4 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/4. Filesystems/1. Filesystem Types/Master File Table - Windows applications _ Microsoft Docs.html 24.4 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/4. Filesystems/1. Filesystem Types/Hard Links and Junctions - Windows applications _ Microsoft Docs.html 24.2 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/02_overview-of-intrusion-detection-systems-ids/06_overview-of-suricata_suricata-update.html 24.0 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/05_course-6-resources-and-citations/01__suricata-update.html 24.0 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/3. Package and Software Management/3. Whats happening in the background/Orca.exe - Windows applications _ Microsoft Docs.html 24.0 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/02_overview-of-intrusion-detection-systems-ids/06_overview-of-suricata_eve-json-examplesjq.html 23.5 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/05_Resources/04_course-3-resources-and-citations/01__index.html 23.5 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.6 Trusted Relationship.vtt 23.4 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/4. Filesystems/1. Filesystem Types/Disk Usage - Windows Sysinternals _ Microsoft Docs.html 23.4 kB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/2. Pelcgbybtl (Cryptology)/1. Symmetric Encryption/RC4 NOMORE.html 23.3 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/4. Active Directory/Create a WMI Filter _ Microsoft Docs.html 23.2 kB
  • Protocol Deep Dive/OSPF - Deep Dive/04 - Discussing Simple OSPF Communication Blocks/22 - Viewing into the Router LSA (Type 1).en.srt 23.1 kB
  • Cybrary/Cybrary - Become an Incident Handler/07. Online Reconnaissance/Module 1 - Online Reconnaissance/1.2 Job Boards, Certificates, and Company Websites.vtt 23.0 kB
  • Cybrary/Cybrary - Become an Incident Handler/08. Scanning and Enumeration with NMAP/1.1 Scanning and Enumeration.vtt 23.0 kB
  • Protocol Deep Dive/IPsec - Deep Dive/Exercise Files/07/demos/IPv6 to IPv6 IPsec PCAP.pcap 22.9 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/3. Package and Software Management/3. Whats happening in the background/Windows Installer Examples - Windows applications.html 22.9 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/4. Active Directory/Control the Scope of Group Policy Objects _ Microsoft Docs.html 21.9 kB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/05_Resources/04_course-2-resources-and-citations/01__index.html 21.8 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/4. Directory Services/4. Active Directory/Managing Flexible Single-Master Operations _ Microsoft Docs.html 21.8 kB
  • Cybrary/Cybrary - Become an Incident Handler/08. Scanning and Enumeration with NMAP/1.2 NMAP Lab Part 1.vtt 21.4 kB
  • Protocol Deep Dive/OSPF - Deep Dive/03 - Forming Basic OSPF Relationships/09 - Viewing the Requirements to Form an OSPF Neighborship.en.srt 21.1 kB
  • Cybrary/Cybrary - Become an Incident Handler/07. Online Reconnaissance/Module 1 - Online Reconnaissance/1.1 Reconnaissance.vtt 20.7 kB
  • Protocol Deep Dive/OSPF - Deep Dive/05 - Introducing Multi-area OSPF (Hierarchy)/32 - Exploring the Different OSPF Area Types.en.srt 20.4 kB
  • Cybrary/Cybrary - Become an Incident Handler/07. Online Reconnaissance/Module 1 - Online Reconnaissance/1.3 Social Media Lab Part 1.vtt 20.3 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/05_Resources/06_course-4-resources-and-citations/01__resources.html 20.2 kB
  • Cybrary/Cybrary - Become an Incident Handler/12. Stealth Techniques for Incident Handlers/Module 1 - Stealth Techniques for Incident Handlers/1.1 Being Stealthy.vtt 20.2 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.2 External Remote Services.vtt 20.2 kB
  • Protocol Deep Dive/IPsec - Deep Dive/04 - Using IPsec in the Enterprise/14 - Using IPsec with DMVPN.en.srt 20.1 kB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 4 - Making Defensive Recs for ATT&CK®-Mapped Data/4.4 Make Defensive Recommendations.vtt 19.9 kB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/05_Resources/01_frequently-asked-questions/01__resources.html 19.9 kB
  • Cybrary/Cybrary - Become an Incident Handler/07. Online Reconnaissance/Module 1 - Online Reconnaissance/1.4 Social Media Lab Part 2.vtt 19.6 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/010 hirst-painting-start.zip 19.5 kB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 1 - Mapping to ATT&CK® from Narrative Reports/1.1 Introduction - Challenges, Advantages and the Process of Mapping to ATT&CK®.vtt 19.4 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/01_hello-python/01_course-introduction/03_welcome-to-the-course_index.html 19.2 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/01_getting-your-python-on/01_course-introduction/02_welcome-to-the-course_index.html 19.2 kB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/05_Resources/01_frequently-asked-questions/01__resources.html 19.1 kB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/07/demos/demo/ftps_pas_put_v6.pcapng 19.0 kB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/05_Resources/01_frequently-asked-questions/01__resources.html 19.0 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/01_frequently-asked-questions/01__resources.html 19.0 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/05_Resources/01_frequently-asked-questions/01__resources.html 19.0 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/01_frequently-asked-questions/01__resources.html 19.0 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/06_Resources/01_frequently-asked-questions/01__resources.html 19.0 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/05_Resources/01_frequently-asked-questions/01__resources.html 19.0 kB
  • Google Coursera/IT Support/4. System Administration and IT Infrastructure Services/2. Network and Infrastructure Services/3. Network Services/The Top DNS Servers And What They Offer - DNSimple Blog.html 18.9 kB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/07/demos/demo/ftps_pas_get_v6.pcapng 18.8 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/44 - Day 44 - Web Foundation - Intermediate CSS/001 6.0-CSS-Colors.zip 18.8 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 01 - Course Introduction/1.3 Where is the MITRE ATT&CK Framework Being Used.vtt 18.7 kB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/07/demos/demo/ftps_act_put_v6.pcapng 18.6 kB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/07/demos/demo/ftps_act_get_v6.pcapng 18.3 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.2 Command Line Interface.vtt 18.1 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/05_Resources/04_course-3-resources-and-citations/01__resources.html 18.0 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.7 User Execution.vtt 17.9 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.6 Scripting.vtt 17.9 kB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/04_use-playbooks-to-respond-to-incidents/01_phases-of-incident-response-playbooks/03_more-about-playbooks_guidelines.html 17.8 kB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/05_Resources/04_course-2-resources-and-citations/01__guidelines.html 17.8 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.2 Accessibility Features.vtt 17.8 kB
  • Cybrary/Cybrary - Become an Incident Handler/02. Incident Response Planning/Module 1 - Incident Response Planning/1.1 Incident Response Kits Introduction.vtt 17.8 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.3 Spearphishing Link.vtt 17.7 kB
  • Protocol Deep Dive/IPsec - Deep Dive/03 - Building the IPsec Protocol/11 - Seeing IPsec in Action.en.srt 17.6 kB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/04_managing-cloud-instances-at-scale/01_building-software-for-the-cloud/06_more-about-cloud-providers_aws_service_limits.html 17.6 kB
  • Cybrary/Cybrary - Become an Incident Handler/07. Online Reconnaissance/Module 1 - Online Reconnaissance/1.5 Social Media Lab Part 3.vtt 17.6 kB
  • Cybrary/Cybrary - Become an Incident Handler/02. Incident Response Planning/Module 1 - Incident Response Planning/1.5 Incident Response Team Members.vtt 17.3 kB
  • Cybrary/Cybrary - Become an Incident Handler/02. Incident Response Planning/Module 1 - Incident Response Planning/1.4 Incident Response Team Models.vtt 17.3 kB
  • Cybrary/Cybrary - Become an Incident Handler/04. Incident Response Recovery/Module 1 - Incident Recovery/1.4 Lessons Learned Part 1.vtt 17.3 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.5 Powershell.vtt 17.3 kB
  • Protocol Deep Dive/IPsec - Deep Dive/06 - Establishing IPsec with IKEv2/28 - IKEv2 Phases.en.srt 17.2 kB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/05_Resources/04_course-2-resources-and-citations/01__Format-Security-plus-Study-Guide.pdf 17.2 kB
  • Cybrary/Cybrary - Become an Incident Handler/04. Incident Response Recovery/Module 1 - Incident Recovery/1.5 Lessons Learned Part 2.vtt 17.2 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.4 Control Panel Items.vtt 17.2 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.4 Browser Extension.vtt 17.2 kB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 1 - Mapping to ATT&CK® from Narrative Reports/1.6 Hedging Your Biases.vtt 17.1 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.8 Web Shell.vtt 17.1 kB
  • Cybrary/Cybrary - Become an Incident Handler/02. Incident Response Planning/Module 1 - Incident Response Planning/1.3 Incident Response Kits Software.vtt 17.1 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.6 Create Account.vtt 16.9 kB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 1 - Mapping to ATT&CK® from Narrative Reports/1.4 Identifying Techniques or Sub-Techniques.vtt 16.8 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/01_overview-of-logs/6. Overview of log file formats.html 16.8 kB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 1 - Mapping to ATT&CK® from Narrative Reports/1.3 Translating the Behavior into a Tactic.vtt 16.7 kB
  • Cybrary/Cybrary - Become an Incident Handler/02. Incident Response Planning/Module 1 - Incident Response Planning/1.2 Incident Response Kits Hardware.vtt 16.7 kB
  • Protocol Deep Dive/OSPF - Deep Dive/05 - Introducing Multi-area OSPF (Hierarchy)/29 - What Is multi-area OSPF.en.srt 16.6 kB
  • Cybrary/Cybrary - Become an Incident Handler/04. Incident Response Recovery/Module 1 - Incident Recovery/1.2 Incident Documentation.vtt 16.6 kB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/04/demos/demo/ftps_pas_put.pcapng 16.6 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/3. Package and Software Management/2. Package Managers/Packaging_PPA - Launchpad Help.html 16.5 kB
  • Cybrary/Cybrary - Become an Incident Handler/01. Incident Response Steps/Module 1 - Incident Response Steps/1.3 Incident Response Steps Breakdown.vtt 16.5 kB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/04/demos/demo/ftps_act_put.pcapng 16.4 kB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/05_Resources/05_frequently-asked-questions/01__resources.html 16.3 kB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/05_Resources/05_frequently-asked-questions/01__resources.html 16.3 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/05_Resources/05_frequently-asked-questions/01__resources.html 16.3 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/05_Resources/07_frequently-asked-questions/01__resources.html 16.3 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/06_frequently-asked-questions/01__resources.html 16.3 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/06_frequently-asked-questions/01__resources.html 16.3 kB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/05_Resources/05_frequently-asked-questions/01__resources.html 16.3 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/06_Resources/05_frequently-asked-questions/01__resources.html 16.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/009 Solution-password-manager-improved-end.zip 16.3 kB
  • Cybrary/Cybrary - Become an Incident Handler/04. Incident Response Recovery/Module 1 - Incident Recovery/1.1 Incident Recovery.vtt 16.2 kB
  • Protocol Deep Dive/OSPF - Deep Dive/03 - Forming Basic OSPF Relationships/11 - Looking into Neighbor States.en.srt 16.2 kB
  • Cybrary/Cybrary - Become an Incident Handler/08. Scanning and Enumeration with NMAP/1.3 NMAP Lab Part 2.vtt 16.1 kB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/04/demos/demo/ftps_pas_get.pcapng 16.1 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/29 - Day 29 - Intermediate - Building a Password Manager GUI App with Tkinter/007 Solution-password-manager-end.zip 16.0 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/007 Password-Manager-End-of-Day-29.zip 16.0 kB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/04_conditional-and-iterative-statements/5. More on loops in Python.html 16.0 kB
  • Cybrary/Cybrary - Become an Incident Handler/01. Incident Response Steps/Module 1 - Incident Response Steps/1.2 Incident Response Steps.vtt 15.9 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/3. Linux commands in the Bash shell/03_authenticate-and-authorize-users/3. Permission commands.html 15.9 kB
  • Protocol Deep Dive/IPsec - Deep Dive/07 - Implementing IPsec in IPv6/32 - Migrating IPv4 to IPv6 for IPsec.en.srt 15.8 kB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/04/demos/demo/ftps_act_get.pcapng 15.7 kB
  • Cybrary/Cybrary - Become an Incident Handler/04. Incident Response Recovery/Module 1 - Incident Recovery/1.3 Legal Concerns.vtt 15.7 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 01 - Course Introduction/1.4 Navigation and Review.vtt 15.6 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.4 Exploitation for Privilege Escalation.vtt 15.6 kB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 4 - Making Defensive Recs for ATT&CK®-Mapped Data/4.3 Researching Organizational Capabilities and Constraints and Determine Trade-Offs.vtt 15.6 kB
  • Protocol Deep Dive/OSPF - Deep Dive/02 - Covering OSPF Basics/03 - OSPF vs. Other Routing Protocols.en.srt 15.5 kB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/04_conditional-and-iterative-statements/2. More on conditionals in Python.html 15.5 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/02_interacting-with-web-services/02_python-requests/02_useful-operations-for-python-requests_http-status-codes.xhtml 15.4 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/03_automatic-output-generation/02_generating-pdfs-from-python/01_introduction-to-generating-pdfs_instructions.html 15.3 kB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/01_introduction-to-version-control/02_before-version-control/06_diff-and-patch-cheat-sheet_diff.1.html 15.3 kB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/07/demos/demo/sftp_get_v6.pcapng 15.2 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.3 Bootkit.vtt 15.2 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/3. File & Text Manipulation/Vim documentation _ vim online.html 15.1 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/24 - Day 24 - Intermediate - Files, Directories and Paths/007 Mail-Merge-Project-Completed.zip 15.1 kB
  • Protocol Deep Dive/OSPF - Deep Dive/02 - Covering OSPF Basics/04 - Reviewing the OSPF Metric.en.srt 15.0 kB
  • Protocol Deep Dive/OSPF - Deep Dive/05 - Introducing Multi-area OSPF (Hierarchy)/30 - Reviewing the different OSPF Device Types.en.srt 15.0 kB
  • Cybrary/Cybrary - Become an Incident Handler/03. Implementing an Incident Response Plan/Module 1 - Implementing an Incident Response Plan/1.6 Recovery.vtt 14.9 kB
  • Cybrary/Cybrary - Become an Incident Handler/03. Implementing an Incident Response Plan/Module 1 - Implementing an Incident Response Plan/1.2 First Steps in Incident Response.vtt 14.6 kB
  • Cybrary/Cybrary - Become an Incident Handler/06. Analyzing Attacks for Incident Handlers/Module 1 - Analyzing Attacks for Incident Handlers/1.8 Redline Analysis Lab Part 2.vtt 14.5 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.5 Component Firmware.vtt 14.4 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.9 Privilege Escalation Case Study.vtt 14.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/29 - Day 29 - Intermediate - Building a Password Manager GUI App with Tkinter/002 password-manager-start.zip 14.2 kB
  • Cybrary/Cybrary - Become an Incident Handler/06. Analyzing Attacks for Incident Handlers/Module 1 - Analyzing Attacks for Incident Handlers/1.1 Introduction to Memory Analysis.vtt 14.2 kB
  • Cybrary/Cybrary - Become an Incident Handler/03. Implementing an Incident Response Plan/Module 1 - Implementing an Incident Response Plan/1.3 Chain of Custody Part 1.vtt 14.1 kB
  • Cybrary/Cybrary - Become an Incident Handler/03. Implementing an Incident Response Plan/Module 1 - Implementing an Incident Response Plan/1.5 Incident Containment.vtt 14.1 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 09 - Lateral Movement/9.3 Exploitation of Remote Services.vtt 13.9 kB
  • Cybrary/Cybrary - Become an Incident Handler/06. Analyzing Attacks for Incident Handlers/Module 1 - Analyzing Attacks for Incident Handlers/1.3 Using FTK for Memory Analysis.vtt 13.8 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 08 - Discovery/8.3 Browser Bookmark Discovery.vtt 13.8 kB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/3. Work with strings and lists/01_working-with-strings/4. Strings and the security analyst.html 13.8 kB
  • Cybrary/Cybrary - Become an Incident Handler/06. Analyzing Attacks for Incident Handlers/Module 1 - Analyzing Attacks for Incident Handlers/1.5 Redline Lab.vtt 13.7 kB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 4 - Making Defensive Recs for ATT&CK®-Mapped Data/4.2 How Techniques and Sub-Techniques are Being Used.vtt 13.7 kB
  • Cybrary/Cybrary - Become an Incident Handler/06. Analyzing Attacks for Incident Handlers/Module 1 - Analyzing Attacks for Incident Handlers/1.2 Memory Analysis Explanation.vtt 13.7 kB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 2 - Mapping to ATT&CK® from Raw Data/2.4 Raw Data to Narrative Reporting.vtt 13.7 kB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/07/demos/demo/sftp_put_v6.pcapng 13.6 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.2 Access Token Manipulation.vtt 13.6 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/28 - Day 28 - Intermediate - Tkinter, Dynamic Typing and the Pomodoro GUI Application/007 Solution-pomodoro-end.zip 13.6 kB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/04_managing-cloud-instances-at-scale/03_troubleshooting-and-debugging/04_reading-debugging-problems-on-the-cloud_ec2-instance-troubleshoot.html 13.6 kB
  • Cybrary/Cybrary - Become an Incident Handler/03. Implementing an Incident Response Plan/Module 1 - Implementing an Incident Response Plan/1.4 Chain of Custody Part 2.vtt 13.5 kB
  • Protocol Deep Dive/OSPF - Deep Dive/05 - Introducing Multi-area OSPF (Hierarchy)/36 - Viewing the Summary LSA (Type 4).en.srt 13.5 kB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/3. Work with strings and lists/02_work-with-lists-and-develop-algorithms/3. Lists and the security analyst.html 13.4 kB
  • Protocol Deep Dive/IPsec - Deep Dive/Exercise Files/06/demos/IKEv2 PCAP.pcap 13.4 kB
  • Cybrary/Cybrary - Become an Incident Handler/01. Incident Response Steps/Module 1 - Incident Response Steps/1.1 Incident Response Steps Introduction.vtt 13.3 kB
  • Protocol Deep Dive/IPsec - Deep Dive/03 - Building the IPsec Protocol/08 - IPsec Building Blocks.en.srt 13.3 kB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/2. Pelcgbybtl (Cryptology)/4. Cryptography Applications/WhyIWrotePGP.html 13.3 kB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/4. Python in practice/03_debug-python-code/3. Explore debugging techniques.html 13.3 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.5 Supply Chain Compromise Part 2.vtt 13.2 kB
  • Cybrary/Cybrary - Become an Incident Handler/06. Analyzing Attacks for Incident Handlers/Module 1 - Analyzing Attacks for Incident Handlers/1.4 Lab Introduction.vtt 13.2 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.7 Valid Accounts Part 1.vtt 13.2 kB
  • Cybrary/Cybrary - Become an Incident Handler/03. Implementing an Incident Response Plan/Module 1 - Implementing an Incident Response Plan/1.1 Incident Identification.vtt 13.1 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/61 - Day 61 - Advanced - Building Advanced Forms with Flask-WTForms/009 Solution-Completed-Code-day-61-end.zip.zip 13.1 kB
  • Protocol Deep Dive/QUIC - Deep Dive/Exercise Files/03/demos/Lab2-QUIC Handshake.pcapng 13.1 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/01_manipulating-images/02_application-programming-interfaces-apis/04_how-to-make-sense-of-an-api_index.html 12.9 kB
  • Cybrary/Cybrary - Become an Incident Handler/06. Analyzing Attacks for Incident Handlers/Module 1 - Analyzing Attacks for Incident Handlers/1.7 Redline Analysis Lab Part 1.vtt 12.8 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.8 Valid Accounts Part 2.vtt 12.8 kB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 1 - Mapping to ATT&CK® from Narrative Reports/1.5 Mapping to a Narrative Point.vtt 12.6 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/78 - Day 78 - Advanced - Analysing the Nobel Prize with Plotly, Matplotlib & Seaborn/005 A Choropleth Map and the Countries with the Most Prizes.html 12.6 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 09 - Lateral Movement/9.5 Lateral Movement Case Study.vtt 12.6 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.3 Brute Forces.vtt 12.6 kB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/05/demos/demo/sftp_get.pcapng 12.5 kB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/6. Creating a Company Culture for Security/1. Risk in the Workplace/OpenVAS - OpenVAS - Open Vulnerability Assessment System.html 12.5 kB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/03_core-python-components/2. More about data types.html 12.5 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/6. Operating Systems in Practice/4. Operating System Deployment/dd(1) - Linux manual page.html 12.4 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.8 New Service.vtt 12.4 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 10 - Collection/10.3 Clipboard Data.vtt 12.3 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.8 Execution Case Study.vtt 12.3 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/6. Operating Systems in Practice/2. Virtualization/Downloads – Oracle VM VirtualBox.html 12.1 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.6 Scheduled Task.vtt 12.1 kB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/05/demos/demo/sftp_put.pcapng 12.1 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/03_automatic-output-generation/01_sending-emails-from-python/04_sending-the-email-through-an-smtp-server_getpass.html 12.1 kB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 1 - Mapping to ATT&CK® from Narrative Reports/1.2 Finding and Researching the Behavior.vtt 12.0 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 01 - Course Introduction/1.2 What is the MITRE ATT&CK Framework.vtt 12.0 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/05_Resources/04_course-3-resources-and-citations/01__7.1 11.9 kB
  • Protocol Deep Dive/SNMP - Deep Dive/Exercise Files/02/demos/SNMPv1.cap 11.9 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.3 Compile After Delivery.vtt 11.8 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/06_Resources/03_course-8-resources-and-citations/01__resources.html 11.8 kB
  • Protocol Deep Dive/IPsec - Deep Dive/05 - Securing the Network with IKEv1/20 - IKEv1 Main Mode.en.srt 11.7 kB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/3. Work with strings and lists/03_regular-expressions/2. More about regular expressions.html 11.7 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.4 Supply Chain Compromise Part 1.vtt 11.5 kB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/01_get-started-with-the-course/4. Helpful resources and tips.html 11.5 kB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/01_security-domains/01_get-started-with-the-course/3. Helpful resources and tips.html 11.5 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/1. Introduction to asset security/01_get-started-with-the-course/3. Helpful resources and tips.html 11.5 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/1. Introduction to detection and incident response/01_get-started-with-the-course/3. Helpful resources and tips.html 11.5 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/1. Protect data and communicate incidents/01_get-started-with-the-course/4. Helpful resources and tips.html 11.5 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/01_get-started-with-the-course/3. Helpful resources and tips.html 11.5 kB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/1. Welcome to the exciting world of cybersecurity/01_get-started-with-the-certificate-program/5. Helpful resources and tips.html 11.5 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/1. Introduction to operating systems/01_get-started-with-the-course/3. Helpful resources and tips.html 11.4 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/3. Linux commands in the Bash shell/03_authenticate-and-authorize-users/5. Responsible use of sudo.html 11.4 kB
  • Protocol Deep Dive/OSPF - Deep Dive/03 - Forming Basic OSPF Relationships/10 - Digging Further into OSPF Network Types.en.srt 11.4 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/2. Network operations/01_introduction-to-network-protocols/4. Additional network protocols.html 11.3 kB
  • Protocol Deep Dive/IPsec - Deep Dive/04 - Using IPsec in the Enterprise/15 - Using IPsec on Your Endpoint.en.srt 11.3 kB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 01 - The Role of an Expert Witness/1.1 Seeking the Truth.vtt 11.3 kB
  • Cybrary/Cybrary - Become an Incident Handler/06. Analyzing Attacks for Incident Handlers/Module 1 - Analyzing Attacks for Incident Handlers/1.6 VM and Malware Lab.vtt 11.2 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.9 Defense Evasion Case Study.vtt 11.2 kB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/2. Write effective Python code/02_work-with-functions/3. Functions and variables.html 11.1 kB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/02_using-git-locally/02_undoing-things/05_git-revert-cheat-sheet_4-doing-a-hard-reset.html 11.0 kB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 2 - Mapping to ATT&CK® from Raw Data/2.1 The Process of Mapping from Raw Data.vtt 10.8 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.7 Sudo.vtt 10.8 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.5 File System Permission Weakness.vtt 10.8 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.3 Execution Through API.vtt 10.8 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/79 - Day 79 - Advanced - The Tragic Discovery of Handwashing t-Tests & Distributions/005 Visualising Distributions and Testing for Statistical Significance.html 10.7 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/28 - Day 28 - Intermediate - Tkinter, Dynamic Typing and the Pomodoro GUI Application/002 pomodoro-start.zip 10.6 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.2 Clear Command History.vtt 10.5 kB
  • Protocol Deep Dive/OSPF - Deep Dive/04 - Discussing Simple OSPF Communication Blocks/24 - Viewing into the Network LSA (Type 2).en.srt 10.4 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/78 - Day 78 - Advanced - Analysing the Nobel Prize with Plotly, Matplotlib & Seaborn/007 Unearthing Patterns in the Laureate Age at the Time of the Award.html 10.4 kB
  • Cybrary/Cybrary - Become an Incident Handler/11. Evasion for Incident Handlers/Module 1 - Evasion for Incident Handlers/1.1 Evasion.vtt 10.3 kB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 09 - Expert Testimony/9.1 Voire Dire of Experts.vtt 10.2 kB
  • Protocol Deep Dive/OSPF - Deep Dive/06 - Troubleshooting Common OSPF Issues/46 - Troubleshooting Common OSPF Issues - Network Type Mismatch.en.srt 10.2 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.7 Process Hollowing.vtt 10.1 kB
  • Protocol Deep Dive/IPsec - Deep Dive/05 - Securing the Network with IKEv1/21 - IKEv1 Aggressive Mode.en.srt 10.1 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/3. Linux commands in the Bash shell/02_manage-file-content-in-bash/4. Manage directories and files.html 9.9 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.3 Elevation Escalation with Prompt.vtt 9.8 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 08 - Discovery/8.2 Account Discovery.vtt 9.8 kB
  • Protocol Deep Dive/DNS - Deep Dive/Exercise Files/04/Mod4-AtPrimary-Add-Zones.pcapng.gz 9.8 kB
  • Protocol Deep Dive/OSPF - Deep Dive/05 - Introducing Multi-area OSPF (Hierarchy)/31 - Differentiating the different OSPF Area Types.en.srt 9.8 kB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/2. Write effective Python code/03_learn-from-the-python-community/3. Ensure proper syntax and readability in Python.html 9.8 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.9 Persistence Case Study.vtt 9.8 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/05_review-security-hardening/3. Weekly challenge 4.html 9.7 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/1. Introduction to detection and incident response/04_incident-response-tools/4. Overview of detection tools.html 9.7 kB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/07/demos/demo/ftp_pas_put_v6.pcapng 9.6 kB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 03 - Investigative Process/3.2 Investigation Bias.vtt 9.6 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.9 Module 3 Summary.vtt 9.6 kB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/07/demos/demo/ftp_act_put_v6.pcapng 9.5 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/3. Secure against network intrusions/04_review-secure-against-network-intrusion/3. Weekly challenge 3.html 9.5 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 09 - Lateral Movement/9.2 Application Deployment Software.vtt 9.5 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.9 Initial Access Case Study.vtt 9.5 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/2. Protect organizational assets/02_encryption-methods/3. Symmetric and asymmetric encryption.html 9.4 kB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/07/demos/demo/ftp_pas_get_v6.pcapng 9.3 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/04_cloud-hardening/3. Secure the cloud.html 9.2 kB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/07/demos/demo/ftp_act_get_v6.pcapng 9.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/75 - Day 75 - Advanced - Beautiful Plotly Charts & Analysing the Android App Store/008 Grouped Bar Charts and Box Plots with Plotly.html 9.1 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/24 - Day 24 - Intermediate - Files, Directories and Paths/006 Mail-Merge-Project-Start.zip 9.1 kB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/02_security-frameworks-and-controls/04_owasp-principles-and-security-audits/6. More about security audits.html 9.0 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/02_interacting-with-web-services/01_web-applications-and-services/05_more-about-json_instructions.html 9.0 kB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 10 - Testimony Do’s and Don’ts/10.1 Expert Testimony Do's and Don'ts.vtt 9.0 kB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 3 - Storing and Analyzing ATT&CK®-Mapped Data/3.3 Analyzing ATT&CK®-Mapped Data.vtt 9.0 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/02_sql-queries/2. Query a database.html 9.0 kB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/05_Resources/06_create-a-cybersecurity-portfolio/01__resources.html 9.0 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/05_Resources/06_create-a-cybersecurity-portfolio/01__resources.html 9.0 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/05_Resources/08_create-a-cybersecurity-portfolio/01__resources.html 9.0 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/07_create-a-cybersecurity-portfolio/01__resources.html 9.0 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/07_create-a-cybersecurity-portfolio/01__resources.html 9.0 kB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/05_Resources/06_create-a-cybersecurity-portfolio/01__resources.html 9.0 kB
  • Cybrary/Cybrary - Become an Incident Handler/07. Online Reconnaissance/Module 1 - Online Reconnaissance/1.6 Whois Lab.vtt 9.0 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/06_Resources/06_create-a-cybersecurity-portfolio/01__resources.html 9.0 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 10 - Collection/10.2 Audio Capture.vtt 8.9 kB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/4. Cybersecurity tools and programming languages/02_core-cybersecurity-knowledge-and-skills/3. Create a cybersecurity portfolio.html 8.9 kB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 4 - Making Defensive Recs for ATT&CK®-Mapped Data/4.1 The Defensive Recommendations Process.vtt 8.9 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/3. Linux commands in the Bash shell/02_manage-file-content-in-bash/2. Filter content in Linux.html 8.9 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/2. Network operations/01_introduction-to-network-protocols/3. Common network protocols.html 8.9 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__2-4-3.html 8.8 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/71 - Day 71 - Advanced - Data Exploration with Pandas College Major v.s. Your Salary/010 Data-Exploration-Pandas-College-Major-complete.zip 8.8 kB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 2 - Mapping to ATT&CK® from Raw Data/2.2 Identify and Research Behaviors.vtt 8.8 kB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/03_introduction-to-cybersecurity-tools/02_explore-security-information-and-event-management-siem-tools/4. Use SIEM tools to protect organizations.html 8.8 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.5 Hidden Files and Directories.vtt 8.8 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/78 - Day 78 - Advanced - Analysing the Nobel Prize with Plotly, Matplotlib & Seaborn/003 plotly Bar & Donut Charts Analyse Prize Categories & Women Winning Prizes.html 8.8 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.8 Software Packing.vtt 8.7 kB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 02 - Forensic Concept Review/2.3 Evidence Handling and Storage.vtt 8.7 kB
  • Protocol Deep Dive/IPsec - Deep Dive/02 - Learning IPsec Fundamentals/06 - Information and Resources.en.srt 8.7 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.10 Module 2 Summary.vtt 8.7 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/2. Network operations/03_review-network-operations/3. Weekly challenge 2.html 8.7 kB
  • Protocol Deep Dive/OSPF - Deep Dive/04 - Discussing Simple OSPF Communication Blocks/26 - Viewing into the External LSA (Type 5).en.srt 8.7 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/2. Network operations/02_system-identification/6. Virtual networks and privacy.html 8.6 kB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/2. The evolution of cybersecurity/01_the-history-of-cybersecurity/4. Common attacks and their effectiveness.html 8.6 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/05_review-network-architecture/3. Weekly challenge 1.html 8.6 kB
  • Protocol Deep Dive/OSPF - Deep Dive/03 - Forming Basic OSPF Relationships/14 - Inspecting the OSPF Packet - OSPF Database Descriptor Packet.en.srt 8.6 kB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 3 - Storing and Analyzing ATT&CK®-Mapped Data/3.2 Expressing and Storing ATT&CK®-Mapped Data.vtt 8.6 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/01_overview-of-logs/3. Best practices for log collection and management.html 8.5 kB
  • Protocol Deep Dive/IPsec - Deep Dive/08 - Finalizing IPsec Concepts/35 - Course Review.en.srt 8.5 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/03_response-and-recovery/3. The triage process.html 8.5 kB
  • Protocol Deep Dive/IPsec - Deep Dive/06 - Establishing IPsec with IKEv2/25 - IKEv2 Benefits.en.srt 8.5 kB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/4. Python in practice/01_python-for-automation/3. Essential Python components for automation.html 8.4 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__7.5 8.4 kB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/03_core-python-components/4. Assign and reassign variables in Python.html 8.4 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/05_Resources/06_course-4-resources-and-citations/01__bootup.html 8.3 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/02_os-hardening/2. Brute force attacks and OS hardening.html 8.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/79 - Day 79 - Advanced - The Tragic Discovery of Handwashing t-Tests & Distributions/001 Dr-Semmelweis-Analysis-start.zip 8.3 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/02_sql-queries/5. The WHERE clause and basic operators.html 8.3 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 02 - Initial Access/2.1 What is Initial Access.vtt 8.2 kB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/03/demos/demo/ftp_pas_put.pcapng 8.2 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/05_review-threats-in-cybersecurity/2. Glossary terms from week 4.html 8.1 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/76 - Day 76 - Advanced - Computation with NumPy and N-Dimensional Arrays/005 Manipulating Images as ndarrays.html 8.1 kB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/3. Protect against threats, risks, and vulnerabilities/02_ethics-in-cybersecurity/2. Ethical concepts that guide cybersecurity decisions.html 8.1 kB
  • Protocol Deep Dive/OSPF - Deep Dive/03 - Forming Basic OSPF Relationships/17 - Inspecting the OSPF Packet - OSPF Link State Acknowledgment Packet.en.srt 8.0 kB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 02 - Forensic Concept Review/2.5 Examination Notes and Analysis Documentation.vtt 8.0 kB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/02/demos/demo/ftp_act_put.pcapng 8.0 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/3. File & Text Manipulation/Notepad++ Home.html 7.9 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.5 Steal Web Session Cookie.vtt 7.9 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/01_incident-detection-and-verification/3. Cybersecurity incident detection methods.html 7.9 kB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/02/demos/demo/ftp_act_get.pcapng 7.9 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/2. Protect organizational assets/01_safeguard-information/3. Principle of least privilege.html 7.9 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/77 - Day 77 - Advanced - Linear Regression and Data Visualisation with Seaborn/008 Use scikit-learn to Run Your Own Regression.html 7.9 kB
  • Protocol Deep Dive/OSPF - Deep Dive/05 - Introducing Multi-area OSPF (Hierarchy)/37 - Decoding the NSSA LSA (Type 7).en.srt 7.8 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 11 - Command and Control/11.4 Uncommonly Used Ports.vtt 7.8 kB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/03/demos/demo/ftp_pas_get_minmax.pcapng 7.8 kB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 2 - Mapping to ATT&CK® from Raw Data/2.3 Translate Behaviors to Tactics, Techniques and Sub-Techniques.vtt 7.8 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.4 Credential Dumping.vtt 7.8 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 09 - Lateral Movement/9.4 SSH Hijacking.vtt 7.8 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/009 Solution-quizzler-app-end.zip 7.8 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/01_getting-your-python-on/01_course-introduction/02_welcome-to-the-course_instructions.html 7.7 kB
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/03/demos/demo/ftp_pas_get.pcapng 7.7 kB
  • Protocol Deep Dive/IPsec - Deep Dive/07 - Implementing IPsec in IPv6/30 - IPsec in IPv6.en.srt 7.7 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/05_Resources/04_course-3-resources-and-citations/01__7.2 7.7 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/78 - Day 78 - Advanced - Analysing the Nobel Prize with Plotly, Matplotlib & Seaborn/006 Create Sunburst Charts for a Detailed Regional Breakdown of Research Locations.html 7.6 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/03_automatic-output-generation/01_sending-emails-from-python/04_sending-the-email-through-an-smtp-server_instructions.html 7.6 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/3. Vulnerabilities in systems/02_identify-system-vulnerabilities/2. Approaches to vulnerability scanning.html 7.6 kB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/2. Write effective Python code/02_work-with-functions/05_work-with-built-in-functions_instructions.html 7.6 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/63 - Day 63 - Advanced - Databases and with SQLite and SQLAlchemy/005 SQLite Databases.html 7.6 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/002 quizzler-app-start.zip 7.6 kB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 03 - Investigative Process/3.1 Investigation Planning.vtt 7.6 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/01_strings/12_formatting-strings-cheat-sheet_instructions.html 7.5 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/74 - Day 74 - Advanced - Google Trends Data Resampling and Visualising Time Series/004 Data Visualisation - Tesla Line Charts in Matplotlib.html 7.5 kB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/1. Welcome to the exciting world of cybersecurity/03_core-skills-for-cybersecurity-professionals/3. Transferable and technical cybersecurity skills.html 7.5 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/78 - Day 78 - Advanced - Analysing the Nobel Prize with Plotly, Matplotlib & Seaborn/004 Using Matplotlib to Visualise Trends over Time.html 7.5 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/3. Secure against network intrusions/03_network-attack-tactics-and-defense/3. Overview of interception tactics.html 7.4 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/3. Vulnerabilities in systems/02_identify-system-vulnerabilities/3. The importance of updates.html 7.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/external-links.txt 7.3 kB
  • Protocol Deep Dive/OSPF - Deep Dive/03 - Forming Basic OSPF Relationships/08 - Reviewing the Requirements to Form an OSPF Neighborship.en.srt 7.3 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/2. Protect organizational assets/04_review-protect-organizational-assets/2. Glossary terms from week 2.html 7.2 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 12 - Exfiltration/12.2 Automated Exfiltration.vtt 7.2 kB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/05_Resources/04_course-7-resources-and-citations/01__resources.html 7.2 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 10 - Collection/10.5 Collection Case Study.vtt 7.1 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 08 - Discovery/8.5 Discovery Case Study.vtt 7.1 kB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 11 - Course Review and Next Steps/11.1 Course Wrap-Up and Next Steps.vtt 7.1 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/01_hello-python/05_module-review/03_module-1-graded-assessment_exam.html 7.0 kB
  • Protocol Deep Dive/OSPF - Deep Dive/04 - Discussing Simple OSPF Communication Blocks/21 - Digging into the Router LSA (Type 1).en.srt 7.0 kB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/2. Write effective Python code/01_introduction-to-functions/4. Python functions in cybersecurity.html 7.0 kB
  • Protocol Deep Dive/OSPF - Deep Dive/05 - Introducing Multi-area OSPF (Hierarchy)/34 - Reviewing OSPF Building Blocks (Type 3).en.srt 7.0 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.4 Disabling Security Tools.vtt 7.0 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/03_more-sql-filters/2. Operators for filtering dates and numbers.html 6.9 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/77 - Day 77 - Advanced - Linear Regression and Data Visualisation with Seaborn/005 Seaborn Data Visualisation Bubble Charts.html 6.9 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/79 - Day 79 - Advanced - The Tragic Discovery of Handwashing t-Tests & Distributions/002 Preliminary Data Exploration and Visualising Births & Deaths at Vienna Hospital.html 6.9 kB
  • Protocol Deep Dive/OSPF - Deep Dive/03 - Forming Basic OSPF Relationships/12 - Inspecting the OSPF Packet - OSPF Header.en.srt 6.9 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 11 - Command and Control/11.2 Commonly Used Port.vtt 6.9 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/66 - Day 66 - Advanced - Building Your Own API with RESTful Routing/003 Starting-Files-cafe-api-start.zip 6.9 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.2 Bash History.vtt 6.8 kB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/01_introduction-to-version-control/01_course-introduction/02_welcome-to-the-course_instructions.html 6.8 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 11 - Command and Control/11.3 Custom Command and Control Protocol.vtt 6.8 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/76 - Day 76 - Advanced - Computation with NumPy and N-Dimensional Arrays/003 Generating and Manipulating ndarrays.html 6.8 kB
  • Protocol Deep Dive/IPsec - Deep Dive/04 - Using IPsec in the Enterprise/13 - IPsec Implementations.en.srt 6.8 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/3. Secure against network intrusions/01_introduction-to-network-intrusion-tactics/3. How intrusions compromise your system.html 6.8 kB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/4. Cybersecurity tools and programming languages/02_core-cybersecurity-knowledge-and-skills/2. Use tools to protect business operations.html 6.7 kB
  • Protocol Deep Dive/DNS - Deep Dive/Exercise Files/06/Mod6-AtNSPrimary-DNS-PolicyTest.pcapng.pcapng.gz 6.7 kB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/02_security-frameworks-and-controls/01_more-about-frameworks-and-controls/4. The relationship between frameworks and controls.html 6.7 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/04_module-review/03_module-4-graded-assessment_exam.html 6.7 kB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/05_Resources/04_google-cybersecurity-certificate-glossary/01__resources.html 6.7 kB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/05_Resources/02_google-cybersecurity-certificate-glossary/01__resources.html 6.7 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/05_Resources/02_google-cybersecurity-certificate-glossary/01__resources.html 6.7 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/05_Resources/02_google-cybersecurity-certificate-glossary/01__resources.html 6.7 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/02_google-cybersecurity-certificate-glossary/01__resources.html 6.7 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/02_google-cybersecurity-certificate-glossary/01__resources.html 6.7 kB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/05_Resources/02_google-cybersecurity-certificate-glossary/01__resources.html 6.7 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/06_certificate-wrap-up/5. Google Cybersecurity Certificate glossary.html 6.7 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/06_Resources/04_google-cybersecurity-certificate-glossary/01__resources.html 6.7 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.6 Credential Access Case Study.vtt 6.7 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/2. The Linux operating system/01_all-about-linux/5. Linux architecture explained.html 6.7 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/75 - Day 75 - Advanced - Beautiful Plotly Charts & Analysing the Android App Store/005 Numeric Type Conversions for the Installations & Price Data.html 6.7 kB
  • Protocol Deep Dive/IPsec - Deep Dive/02 - Learning IPsec Fundamentals/02 - Course Introduction.en.srt 6.7 kB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/4. Cybersecurity tools and programming languages/04_congratulations-on-completing-course-1/2. Course 1 glossary.html 6.6 kB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/05_Resources/02_course-1-glossary/01__resources.html 6.6 kB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/04_use-playbooks-to-respond-to-incidents/04_congratulations-on-completing-course-2/2. Course 2 glossary.html 6.6 kB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/05_Resources/03_course-2-glossary/01__resources.html 6.6 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/4. Threats to asset security/06_congratulations-on-completing-course-5/2. Course 5 glossary .html 6.6 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/05_course-5-glossary/01__resources.html 6.6 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/05_congratulations-on-completing-course-6/2. Course 6 glossary.html 6.6 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/05_Resources/04_course-6-glossary/01__resources.html 6.6 kB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/4. Python in practice/05_congratulations-on-completing-course-7/2. Course 7 glossary.html 6.6 kB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/05_Resources/03_course-7-glossary/01__resources.html 6.6 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/06_congratulations-on-completing-course-4/2. Course 4 glossary.html 6.6 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/05_Resources/05_course-4-glossary/01__resources.html 6.6 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/75 - Day 75 - Advanced - Beautiful Plotly Charts & Analysing the Android App Store/002 Data Cleaning Removing NaN Values and Duplicates.html 6.6 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/06_congratulations-on-completing-course-3/2. Course 3 glossary.html 6.6 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/05_Resources/03_course-3-glossary/01__resources.html 6.6 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 10 - Collection/10.4 Data from Local System.vtt 6.6 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/05_review-find-and-apply-for-cybersecurity-jobs/4. Course 8 glossary.html 6.6 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/06_Resources/02_course-8-glossary/01__resources.html 6.6 kB
  • Protocol Deep Dive/IPsec - Deep Dive/07 - Implementing IPsec in IPv6/33 - IPv6 IPsec Site-to-site Lab.en.srt 6.6 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/1. Introduction to asset security/02_introduction-to-assets/3. Understand risks, threats, and vulnerabilities.html 6.6 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/03_more-sql-filters/4. More on filters with AND, OR, and NOT.html 6.5 kB
  • Protocol Deep Dive/OSPF - Deep Dive/03 - Forming Basic OSPF Relationships/13 - Inspecting the OSPF Packet - OSPF Hello Packet.en.srt 6.5 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/02_basic-python-syntax/04_module-review/03_module-2-graded-assessment_exam.html 6.5 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/01_getting-your-python-on/04_automating-tasks-through-programming/05_practice-quiz-automation_quiz.html 6.5 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/02_interacting-with-web-services/02_python-requests/03_http-get-and-post-methods_instructions.html 6.5 kB
  • Protocol Deep Dive/IPsec - Deep Dive/Exercise Files/05/demos/Module 5/Mod 5 Aggressive and Quick mode PCAP.pcap 6.5 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 08 - Discovery/8.4 System Owner or User Discovery.vtt 6.5 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/75 - Day 75 - Advanced - Beautiful Plotly Charts & Analysing the Android App Store/006 Plotly Bar Charts & Scatter Plots The Most Competitive & Popular App Categories.html 6.4 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/79 - Day 79 - Advanced - The Tragic Discovery of Handwashing t-Tests & Distributions/003 Analysing the Yearly Data Split By Clinic.html 6.4 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/1. Introduction to operating systems/02_the-wonderful-world-of-operating-systems/4. Compare operating systems.html 6.4 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/02_interacting-with-web-services/02_python-requests/01_the-python-requests-library_instructions.html 6.4 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/05_testing-in-python/02_unit-tests/05_unit-test-cheat-sheet_instructions.html 6.4 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/03_response-and-recovery/5. Business continuity considerations.html 6.3 kB
  • Protocol Deep Dive/OSPF - Deep Dive/02 - Covering OSPF Basics/05 - Selecting the Best Route Entry.en.srt 6.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/003 Birthday-Wisher-Day-32-start.zip 6.3 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/01_hello-python/01_course-introduction/03_welcome-to-the-course_instructions.html 6.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/70 - Day 70 - Advanced - Deploying Your Web Application with Heroku/004 Step 1 - Upload Your Project to GitHub.html 6.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/76 - Day 76 - Advanced - Computation with NumPy and N-Dimensional Arrays/002 NumPy's ndarray - Incredible Power at Your Fingertips!.html 6.2 kB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 3 - Storing and Analyzing ATT&CK®-Mapped Data/3.1 Storing and Displaying ATT&CK®-Mapped Data.vtt 6.2 kB
  • Protocol Deep Dive/IPsec - Deep Dive/04 - Using IPsec in the Enterprise/16 - IPsec Extras.en.srt 6.2 kB
  • Protocol Deep Dive/IPsec - Deep Dive/05 - Securing the Network with IKEv1/22 - IKEv1 Quick Mode.en.srt 6.1 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/69 - Day 69 - Advanced - Blog Capstone Project Part 4 - Adding Users/007 Requirement 4 - Allow Any User to Add Comments to BlogPosts.html 6.1 kB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/01_troubleshooting-concepts/01_course-introduction/02_welcome-to-the-course_instructions.html 6.1 kB
  • Protocol Deep Dive/IPsec - Deep Dive/03 - Building the IPsec Protocol/09 - IPsec Components.en.srt 6.1 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 13 - Impact/13.4 Impact Case Study.vtt 6.0 kB
  • Protocol Deep Dive/OSPF - Deep Dive/04 - Discussing Simple OSPF Communication Blocks/25 - Digging into the External LSA (Type 5).en.srt 6.0 kB
  • Protocol Deep Dive/IPsec - Deep Dive/07 - Implementing IPsec in IPv6/31 - IPv6 Implementations.en.srt 6.0 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.6 Hidden Users.vtt 6.0 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/02_create-and-use-documentation/3. Best practices for effective documentation.html 6.0 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 12 - Exfiltration/12.3 Data Compressed.vtt 5.9 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/39 - Day 39 - Intermediate+ Capstone Part 1 Flight Deal Finder/003 flight-deals-step-2-solution.zip 5.9 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/02_interacting-with-web-services/02_python-requests/04_what-is-django_instructions.html 5.9 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/1. Protect data and communicate incidents/02_event-and-incident-detection/3. Data and asset classification.html 5.9 kB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/01_automating-with-configuration-management/01_course-introduction/02_welcome-to-the-course_instructions.html 5.9 kB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/04_managing-resources/03_making-our-future-lives-easier/05_more-about-preventing-future-breakage_instructions.html 5.9 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 13 - Impact/13.2 Account Access Removal.vtt 5.9 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/62 - Day 62 - Advanced - Flask, WTForms, Bootstrap and CSV - Coffee & Wifi Project/003 Check Off Each Requirement.html 5.8 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/79 - Day 79 - Advanced - The Tragic Discovery of Handwashing t-Tests & Distributions/004 The Effect of Handwashing.html 5.8 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/74 - Day 74 - Advanced - Google Trends Data Resampling and Visualising Time Series/007 Data Visualisation - Unemployment How to use Grids.html 5.8 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/3. Communicate effectively to influence stakeholders/01_understand-your-stakeholders/3. The purpose and impact of stakeholders.html 5.8 kB
  • Protocol Deep Dive/ICMP - Deep Dive/Exercise Files/07/demos/v6-tool-packet-too-big.pcapng 5.8 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/02_the-cybersecurity-job-interview-process/4. Prepare for technical interviews.html 5.8 kB
  • Protocol Deep Dive/IPsec - Deep Dive/06 - Establishing IPsec with IKEv2/27 - Authenticating IKEv2.en.srt 5.7 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/78 - Day 78 - Advanced - Analysing the Nobel Prize with Plotly, Matplotlib & Seaborn/002 Update Packages in Google Colab & Explore and Clean the Dataset.html 5.7 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/04_develop-an-elevator-pitch/3. Tips for interviewing remotely.html 5.7 kB
  • Protocol Deep Dive/IPsec - Deep Dive/Exercise Files/05/demos/Module 5/Mod 5 Main Mode PCAP.pcap 5.7 kB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/1. Welcome to the exciting world of cybersecurity/02_introduction-to-cybersecurity/5. Common cybersecurity terminology.html 5.7 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/04_managing-data-and-processes/01_data-streams/06_more-about-input-functions_instructions.html 5.7 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/2. Escalate incidents/03_timing-is-everything/3. Escalation timing.html 5.7 kB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/03_introduction-to-cybersecurity-tools/02_explore-security-information-and-event-management-siem-tools/2. More about cybersecurity tools.html 5.6 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/1. Protect data and communicate incidents/03_your-impact-on-data-protection/2. Disaster recovery and business continuity.html 5.6 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/39 - Day 39 - Intermediate+ Capstone Part 1 Flight Deal Finder/002 Step 1 - Choose Your Path and Download the Starting Project.html 5.6 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/4. Engage with the cybersecurity community/01_reliable-sources-go-a-long-way/3. Strategies for engaging with the cybersecurity community.html 5.6 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/03_answer-interview-questions/3. Prepare for interviews.html 5.6 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 12 - Exfiltration/12.4 Data Transfer Size or Limits.vtt 5.6 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/06_bash-scripting/01_interacting-with-the-command-line-shell/06_basic-linux-commands-cheat-sheet_instructions.html 5.6 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.7 Hooking.vtt 5.5 kB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 04 - The Expert Report/4.1 Format of the Expert Report.vtt 5.5 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 01 - Course Introduction/1.1 Course Overview.vtt 5.5 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/05_Resources/04_course-5-resources-and-citations/01__5.2 5.5 kB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 05 - The Origins of the American Legal System/5.1 US Constitution.vtt 5.5 kB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/02_security-frameworks-and-controls/04_owasp-principles-and-security-audits/2. More about OWASP security principles.html 5.5 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/01_hello-python/02_introduction-to-programming/05_practice-quiz-introduction-to-programming_quiz.html 5.5 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/04_sql-joins/4. Continuous learning in SQL.html 5.5 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/46 - Day 46 - Intermediate+ Create a Spotify Playlist using the Musical Time Machine/003 Step 2 - Authentication with Spotify.html 5.5 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/01_hello-python/03_introduction-to-python/04_more-about-python_instructions.html 5.4 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 12 - Exfiltration/12.5 Exfiltration Case Study.vtt 5.4 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/61 - Day 61 - Advanced - Building Advanced Forms with Flask-WTForms/007 Inheriting Templates Using Jinja2.html 5.4 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/02_the-cybersecurity-job-interview-process/2. The interview process.html 5.4 kB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 07 - Rules of Evidence and Procedure/7.1 Federal Rule of Evidence 702.vtt 5.4 kB
  • Protocol Deep Dive/IPsec - Deep Dive/02 - Learning IPsec Fundamentals/04 - What Is IPsec.en.srt 5.4 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/03_automatic-output-generation/01_sending-emails-from-python/02_introduction-to-python-email-library_instructions.html 5.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/77 - Day 77 - Advanced - Linear Regression and Data Visualisation with Seaborn/004 Filter on Multiple Conditions International Films.html 5.3 kB
  • Protocol Deep Dive/IPsec - Deep Dive/06 - Establishing IPsec with IKEv2/24 - Introducing IKEv2.en.srt 5.3 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/3. Secure against network intrusions/02_secure-networks-against-denial-of-service-dos-attacks/4. Real-life DDoS attack.html 5.2 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/3. Linux commands in the Bash shell/04_get-help-in-linux/4. Linux resources.html 5.2 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/2. Network operations/03_review-network-operations/2. Glossary terms from week 2.html 5.2 kB
  • Protocol Deep Dive/OSPF - Deep Dive/03 - Forming Basic OSPF Relationships/16 - Inspecting the OSPF Packet - OSPF Link State Update Packet.en.srt 5.2 kB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/03_introduction-to-cybersecurity-tools/01_security-information-and-event-management-siem-dashboards/4. The future of SIEM tools.html 5.2 kB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 02 - Forensic Concept Review/2.1 Evidence Identification.vtt 5.2 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/3. Communicate effectively to influence stakeholders/02_communicate-for-impact/3. Communicate effectively with stakeholders.html 5.2 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/02_interacting-with-web-services/01_web-applications-and-services/03_data-serialization_instructions.html 5.2 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/1. Protect data and communicate incidents/03_your-impact-on-data-protection/3. Juliana's story - Asset protection.html 5.1 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/04_develop-an-elevator-pitch/2. Learn more about developing an elevator pitch.html 5.1 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/3. Communicate effectively to influence stakeholders/03_visual-communication-using-a-dashboard/2. Create visual dashboards for impactful cybersecurity communications.html 5.1 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/2. The Linux operating system/04_review-the-linux-operating-system/2. Glossary terms from week 2.html 5.1 kB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/02_security-frameworks-and-controls/05_review-security-frameworks-and-controls/2. Glossary terms from week 2.html 5.1 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/61 - Day 61 - Advanced - Building Advanced Forms with Flask-WTForms/002 Starting-Files-flask-secrets.zip 5.0 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/03_network-communication/6. Test your knowledge - Network communication.html 5.0 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/72 - Day 72 - Advanced - Data Visualisation with Matplotlib Programming Languages/006 Data Manipulation Pivoting DataFrames.html 5.0 kB
  • Protocol Deep Dive/OSPF - Deep Dive/03 - Forming Basic OSPF Relationships/15 - Inspecting the OSPF Packet - OSPF Link State Request Packet.en.srt 5.0 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/2. Escalate incidents/01_escalation-in-cybersecurity/3. Escalate with a purpose.html 5.0 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/2. Escalate incidents/03_timing-is-everything/4. Juliana's story - Attention to detail.html 4.9 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/3. Incident investigation and response/05_review-incident-investigation-and-response/2. Glossary terms from week 3.html 4.9 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/01_manipulating-images/01_course-introduction/02_welcome-to-the-course_instructions.html 4.9 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/01_manipulating-images/02_application-programming-interfaces-apis/02_built-in-libraries-vs-external-libraries_instructions.html 4.9 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/04_managing-data-and-processes/03_processing-log-files/04_practice-quiz-processing-log-files_quiz.html 4.9 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/74 - Day 74 - Advanced - Google Trends Data Resampling and Visualising Time Series/003 Data Cleaning - Resampling Time Series Data.html 4.9 kB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 06 - The Trial Process/6.2 Anatomy of a Trial.vtt 4.9 kB
  • Protocol Deep Dive/IPsec - Deep Dive/08 - Finalizing IPsec Concepts/36 - Let's Wrap Up.en.srt 4.9 kB
  • Protocol Deep Dive/IPsec - Deep Dive/02 - Learning IPsec Fundamentals/03 - Course Overview.en.srt 4.9 kB
  • Protocol Deep Dive/IPsec - Deep Dive/04 - Using IPsec in the Enterprise/12 - IPsec Functionality in the Enterprise.en.srt 4.9 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/03_loops/04_module-review/03_module-3-graded-assessment_exam.html 4.8 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/01_hello-python/04_hello-world/04_first-programming-concepts-cheat-sheet_instructions.html 4.8 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/01_getting-your-python-on/03_running-python-locally/06_practice-quiz-running-python-locally_quiz.html 4.8 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/01_manipulating-images/02_application-programming-interfaces-apis/04_how-to-make-sense-of-an-api_instructions.html 4.8 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 11 - Command and Control/11.5 Command and Control Case Study.vtt 4.8 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/70 - Day 70 - Advanced - Deploying Your Web Application with Heroku/007 Step 4 - Upgrade SQLite Database to PostgreSQL.html 4.8 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/03_automatic-output-generation/01_sending-emails-from-python/03_adding-attachments_instructions.html 4.7 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/77 - Day 77 - Advanced - Linear Regression and Data Visualisation with Seaborn/003 Investigate the Films that had Zero Revenue.html 4.7 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/04_managing-data-and-processes/02_python-subprocesses/05_practice-quiz-python-subprocesses_quiz.html 4.7 kB
  • Protocol Deep Dive/IPsec - Deep Dive/03 - Building the IPsec Protocol/07 - Building IPsec.en.srt 4.7 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/03_regular-expressions/01_regular-expressions/05_practice-quiz-regular-expressions_quiz.html 4.7 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/100 - Day 100 - Professional Portfolio Project - [Data Science]/001 [assignment_info] Predict Earnings using Multivariable Regression.html 4.6 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/02_interacting-with-web-services/01_web-applications-and-services/04_data-serialization-formats_instructions.html 4.6 kB
  • Protocol Deep Dive/DNS - Deep Dive/Exercise Files/04/Mod4-AtNSPrimary-AddSubdomain.pcapng.gz 4.6 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/4. Network traffic and logs using IDS and SIEM tools/04_review-network-traffic-and-logs-using-ids-and-siem-tools/2. Glossary terms from week 4.html 4.6 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/05_review-network-architecture/2. Glossary terms from week 1.html 4.6 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/06_certificate-wrap-up/4. Claim your Google Cybersecurity Certificate badge!.html 4.6 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/06_bash-scripting/03_advanced-bash-concepts/05_practice-quiz-advanced-bash-concepts_quiz.html 4.6 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/3. Communicate effectively to influence stakeholders/03_visual-communication-using-a-dashboard/4. Juliana’s story - Effective communication.html 4.6 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/77 - Day 77 - Advanced - Linear Regression and Data Visualisation with Seaborn/007 Plotting Linear Regressions with Seaborn.html 4.6 kB
  • Protocol Deep Dive/ICMP - Deep Dive/Exercise Files/04/demos/packet-too-big.pcapng 4.6 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/69 - Day 69 - Advanced - Blog Capstone Project Part 4 - Adding Users/006 Creating Relational Databases.html 4.6 kB
  • Protocol Deep Dive/IPsec - Deep Dive/05 - Securing the Network with IKEv1/18 - IKEv1 Authentication.en.srt 4.5 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/05_testing-in-python/03_other-test-concepts/05_practice-quiz-other-test-concepts_quiz.html 4.5 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/2. The Linux operating system/02_linux-distributions/3. More Linux distributions.html 4.5 kB
  • Protocol Deep Dive/OSPF - Deep Dive/02 - Covering OSPF Basics/02 - Course and Module Introduction.en.srt 4.5 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/95 - Day 95 - Professional Portfolio Project - [HTTP Requests & APIs]/001 [assignment_info] Custom API Based Website.html 4.5 kB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 05 - The Origins of the American Legal System/5.3 State Courts and Federalism.vtt 4.5 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.10 Module 6 Summary.vtt 4.5 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/04_managing-data-and-processes/01_data-streams/07_practice-quiz-data-streams_quiz.html 4.5 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 03 - Execution/3.1 What is Execution.vtt 4.4 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/2. Escalate incidents/02_to-escalate-or-not-to-escalate/2. Recognize roles and responsibilities during escalation.html 4.4 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/05_Resources/06_course-4-resources-and-citations/01__subsection3.1.html 4.4 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/06_bash-scripting/01_interacting-with-the-command-line-shell/08_practice-quiz-interacting-with-the-command-line_quiz.html 4.4 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/06_bash-scripting/02_bash-scripting/05_practice-quiz-bash-scripting_quiz.html 4.4 kB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 01 - The Role of an Expert Witness/1.2 Facts vs. Expert Witness.vtt 4.4 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/74 - Day 74 - Advanced - Google Trends Data Resampling and Visualising Time Series/002 Data Exploration - Making Sense of Google Search Data.html 4.4 kB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/02_security-frameworks-and-controls/02_the-cia-triad-confidentiality-integrity-and-availability/2. Use the CIA triad to protect organizations.html 4.4 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/2. Network operations/02_system-identification/7. Test your knowledge - System identification.html 4.4 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/05_testing-in-python/01_simple-tests/04_practice-quiz-simple-tests_quiz.html 4.4 kB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/02_introduction-to-python-programming-in-cybersecurity/3. Get to know Python.html 4.4 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/73 - Day 73 - Advanced - Aggregate & Merge Data with Pandas Analyse the LEGO Dataset/009 Relational Database Schemas Primary and Foreign Keys.html 4.4 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/01_find-and-prepare-for-a-job-in-cybersecurity/4. Tips for finding and applying for a job.html 4.3 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/4. Engage with the cybersecurity community/02_build-your-cybersecurity-network/2. Connect with other cybersecurity professionals.html 4.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/77 - Day 77 - Advanced - Linear Regression and Data Visualisation with Seaborn/002 Explore and Clean the Data.html 4.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/53 - Day 53 - Intermediate+ Web Scraping Capstone - Data Entry Job Automation/002 Capstone Project Program Requirements.html 4.3 kB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/2. The evolution of cybersecurity/03_review-the-evolution-of-cybersecurity/2. Glossary terms from week 2.html 4.3 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/03_regular-expressions/02_basic-regular-expressions/07_practice-quiz-basic-regular-expressions_quiz.html 4.3 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/01_getting-your-python-on/02_getting-ready-for-python/08_practice-quiz-getting-ready-for-python_quiz.html 4.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/97 - Day 97 - Professional Portfolio Project - [Python Automation]/001 [assignment_info] Custom Automation.html 4.3 kB
  • Protocol Deep Dive/OSPF - Deep Dive/04 - Discussing Simple OSPF Communication Blocks/23 - Digging into the Network LSA (Type 2).en.srt 4.3 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/01_introduction-to-sql-and-databases/4. SQL filtering versus Linux filtering.html 4.3 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.10 Module 4 Summary.vtt 4.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced - My Top 10 Movies Website/002 Starting-Files-movie-project-start.zip 4.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced -My Top 10 Movies Website/002 Starting-Files-movie-project-start.zip 4.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced - My Top 10 Movies Website/006 Requirement 4 - Be Able to Add New Movies Via the Add Page.html 4.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced -My Top 10 Movies Website/006 Requirement 4 - Be Able to Add New Movies Via the Add Page.html 4.3 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/02_lists/11_lists-and-tuples-operations-cheat-sheet_instructions.html 4.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/external-links.txt 4.3 kB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/02_introduction-to-python-programming-in-cybersecurity/5. Python environments.html 4.3 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/04_putting-it-all-together/01_final-course-project/03_how-to-approach-the-problem_instructions.html 4.3 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/05_object-oriented-programming-optional/03_code-reuse/02_object-inheritance_instructions.html 4.3 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/1. Introduction to detection and incident response/05_review-introduction-to-detection-and-incident-response/2. Glossary terms from week 1.html 4.2 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/05_object-oriented-programming-optional/01_object-oriented-programming-optional/08_practice-quiz-object-oriented-programming-optional_quiz.html 4.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/63 - Day 63 - Advanced - Databases and with SQLite and SQLAlchemy/002 Starting-Files-library-start.zip 4.2 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 06 - Defense Evasion/6.1 What is Defense Evasion.vtt 4.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/77 - Day 77 - Advanced - Linear Regression and Data Visualisation with Seaborn/006 Floor Division A Trick to Convert Years to Decades.html 4.2 kB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 02 - Forensic Concept Review/2.2 Evidence Preservation.vtt 4.2 kB
  • Protocol Deep Dive/IPsec - Deep Dive/06 - Establishing IPsec with IKEv2/26 - IKEv2 Modes.en.srt 4.2 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/02_managing-files-with-python/03_reading-and-writing-csv-files/06_practice-quiz-reading-writing-csv-files_quiz.html 4.2 kB
  • Google Coursera/IT Support/3. Operating Systems and You Becoming a Power User/1. Navigating the System/3. File & Text Manipulation/GNU nano.html 4.2 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 13 - Impact/13.3 Defacement.vtt 4.2 kB
  • Protocol Deep Dive/OSPF - Deep Dive/05 - Introducing Multi-area OSPF (Hierarchy)/38 - Viewing the NSSA LSA (Type 7).en.srt 4.1 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/67 - Day 67 - Advanced - Blog Capstone Project Part 3 - RESTful Routing/004 Requirement 2 - Be Able to POST a New Blog Post.html 4.1 kB
  • Google Coursera/Cybersecurity/6. Sound the Alarm - Detection and Response/2. Network monitoring and analysis/04_review-network-monitoring-and-analysis/2. Glossary terms from week 2.html 4.1 kB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/1. Introduction to Python/05_review-introduction-to-python/2. Glossary terms from week 1.html 4.1 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/02_lists/12_practice-quiz-lists_quiz.html 4.1 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 14 - Conclusion/14.1 Course Summary.vtt 4.1 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/3. Secure against network intrusions/03_network-attack-tactics-and-defense/5. Test your knowledge - Network interception attack tactics.html 4.1 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/01_getting-your-python-on/02_getting-ready-for-python/07_pointers-for-getting-your-environment-setup_instructions.html 4.1 kB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/02_using-git-locally/01_advanced-git-interaction/05_advanced-git-cheat-sheet_instructions.html 4.1 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/92 - Day 92 - Professional Portfolio Project - [Web Scraping]/001 [assignment_info] Custom Web Scraper.html 4.1 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/76 - Day 76 - Advanced - Computation with NumPy and N-Dimensional Arrays/004 Broadcasting, Scalars and Matrix Multiplication.html 4.1 kB
  • Protocol Deep Dive/IPsec - Deep Dive/05 - Securing the Network with IKEv1/17 - What Is IKE.en.srt 4.1 kB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/01_security-domains/04_review-security-domains/2. Glossary terms from week 1.html 4.0 kB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/3. Protect against threats, risks, and vulnerabilities/03_review-protect-against-threats-risks-and-vulnerabilities/2. Glossary terms from week 3.html 4.0 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/03_dictionaries/07_practice-quiz-dictionaries_quiz.html 4.0 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/61 - Day 61 - Advanced - Building Advanced Forms with Flask-WTForms/005 Adding Validation to Forms with Flask-WTF.html 3.9 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.10 Module 5 Summary.vtt 3.9 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/3. Secure against network intrusions/02_secure-networks-against-denial-of-service-dos-attacks/5. Test your knowledge - Secure networks against Denial of Service (DoS) attacks.html 3.9 kB
  • Protocol Deep Dive/IPsec - Deep Dive/03 - Building the IPsec Protocol/10 - SA Establishment Protocols.en.srt 3.9 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/006 NATO-Phonetic-Alphabet-for-the-Code-Exercise.zip 3.9 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/98 - Day 98 - Professional Portfolio Project - [Data Science]/001 [assignment_info] Analyse and Visualise the Space Race.html 3.9 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/03_loops/03_recursion-optional/04_practice-quiz-recursion_quiz.html 3.9 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/006 Solution-NATO-alphabet-improved-end.zip 3.9 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/03_network-hardening/4. Test your knowledge - Network hardening.html 3.9 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/73 - Day 73 - Advanced - Aggregate & Merge Data with Pandas Analyse the LEGO Dataset/010 How to Merge DataFrames and Create Bar Charts.html 3.9 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/3. Secure against network intrusions/04_review-secure-against-network-intrusion/2. Glossary terms from week 3.html 3.8 kB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/1. Welcome to the exciting world of cybersecurity/01_get-started-with-the-certificate-program/6. Participate in program surveys.html 3.8 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/01_hello-python/04_hello-world/05_practice-quiz-hello-world_quiz.html 3.8 kB
  • Protocol Deep Dive/IPsec - Deep Dive/06 - Establishing IPsec with IKEv2/29 - Summarizing IKEv2.en.srt 3.8 kB
  • Protocol Deep Dive/OSPF - Deep Dive/05 - Introducing Multi-area OSPF (Hierarchy)/35 - Decoding the Summary LSA (Type 4).en.srt 3.8 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/70 - Day 70 - Advanced - Deploying Your Web Application with Heroku/006 Step 3 - Setup a WSGI server with gunicorn.html 3.8 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/02_os-hardening/4. Test your knowledge - OS hardening.html 3.8 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/03_loops/02_for-loops/07_loops-cheat-sheet_instructions.html 3.8 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/01_strings/08_advanced-string-methods_instructions.html 3.8 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/05_object-oriented-programming-optional/03_code-reuse/06_augmenting-python-with-modules_instructions.html 3.8 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/04_local-and-wide-network-communication/3. Test your knowledge - Local and wide network communication.html 3.8 kB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 03 - Investigative Process/3.3 Checklists and Standard Procedure.vtt 3.8 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 05 - Privilege Escalation/5.1 What is Privilege Escalation.vtt 3.8 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/93 - Day 93 - Professional Portfolio Project - [GUI Automation]/001 [assignment_info] Automate the Google Dinosaur Game.html 3.7 kB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 04 - The Expert Report/4.5 Supplemental Reports.vtt 3.7 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/3. Vulnerabilities in systems/04_review-vulnerabilities-in-systems/2. Glossary terms from week 3.html 3.7 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/02_basic-python-syntax/03_conditionals/10_practice-quiz-conditionals_quiz.html 3.7 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/04_cloud-hardening/4. Test your knowledge - Cloud hardening.html 3.7 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/01_manipulating-images/02_application-programming-interfaces-apis/03_what-is-an-api_instructions.html 3.7 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/72 - Day 72 - Advanced - Data Visualisation with Matplotlib Programming Languages/007 Data Visualisation with Matplotlib.html 3.7 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/74 - Day 74 - Advanced - Google Trends Data Resampling and Visualising Time Series/006 Data Visualisation - Bitcoin Line Style and Markers.html 3.7 kB
  • Protocol Deep Dive/IPsec - Deep Dive/05 - Securing the Network with IKEv1/19 - IKEv1 Phases.en.srt 3.7 kB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/02_using-git-locally/03_branching-and-merging/06_git-branches-and-merging-cheat-sheet_instructions.html 3.7 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/73 - Day 73 - Advanced - Aggregate & Merge Data with Pandas Analyse the LEGO Dataset/004 Find the Oldest and Largest LEGO Sets.html 3.6 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/02_basic-python-syntax/02_functions/07_practice-quiz-functions_quiz.html 3.6 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 04 - Persistence/4.1 What is Persistence.vtt 3.6 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/69 - Day 69 - Advanced - Blog Capstone Project Part 4 - Adding Users/004 Requirement 2 - Login Registered Users.html 3.6 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/1. Network architecture/02_introduction-to-networks/10. Test your knowledge - Introduction to networks.html 3.6 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/05_review-security-hardening/4. Portfolio Activity - Use the NIST Cybersecurity Framework to respond to a security incident.html 3.5 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/2. Network operations/01_introduction-to-network-protocols/5. Test your knowledge - Recognize different network protocols.html 3.5 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/61 - Day 61 - Advanced - Building Advanced Forms with Flask-WTForms/004 Code Improvements for Our WTForms.html 3.5 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/39 - Day 39 - Intermediate+ Capstone Part 1 Flight Deal Finder/003 Step 2 - Use Sheety to Read and Write Data to the Google Sheet.html 3.5 kB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 07 - Rules of Evidence and Procedure/7.5 Work Product Doctrine.vtt 3.5 kB
  • Google Coursera/Cybersecurity/5. Assets, Threats, and Vulnerabilities/1. Introduction to asset security/05_review-introduction-to-asset-security/2. Glossary terms from week 1.html 3.5 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/05_object-oriented-programming-optional/02_classes-and-methods-optional/04_special-methods_instructions.html 3.5 kB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/03_crashing-programs/01_why-programs-crash/06_resources-for-understanding-crashes_instructions.html 3.5 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/60 - Day 60 - Advanced - Make POST Requests with Flask and HTML Forms/003 Handle POST Requests with Flask Servers.html 3.5 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/05_object-oriented-programming-optional/02_classes-and-methods-optional/06_documenting-with-docstrings_instructions.html 3.5 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/03_loops/02_for-loops/02_for-loops-recap_instructions.html 3.5 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/36 - Day 36 - Intermediate+ Stock Trading News Alert Project/002 stock-news-hard-start.zip 3.4 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/86 - Day 86 - Professional Portfolio Project - [Game]/001 [assignment_info] Breakout Game.html 3.4 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/008 Reeborg-World-Tests.zip 3.4 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/70 - Day 70 - Advanced - Deploying Your Web Application with Heroku/005 Step 2 - Use gunicorn and Heroku to host your website.html 3.4 kB
  • Protocol Deep Dive/IPsec - Deep Dive/02 - Learning IPsec Fundamentals/05 - Why IPsec.en.srt 3.4 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/02_interacting-with-web-services/02_python-requests/02_useful-operations-for-python-requests_instructions.html 3.4 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/01_getting-your-python-on/05_introduction-to-qwiklabs/02_how-to-log-in-to-qwiklabs_instructions.html 3.4 kB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/01_troubleshooting-concepts/05_module-review/02_how-to-log-in-to-qwiklabs_instructions.html 3.4 kB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/01_automating-with-configuration-management/05_module-review/02_how-to-log-in-to-qwiklabs_instructions.html 3.4 kB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/03_working-with-remotes/01_introduction-to-github/04_basic-interaction-with-github-cheat-sheet_instructions.html 3.4 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/39 - Day 39 - Intermediate+ Capstone Part 1 Flight Deal Finder/005 Step 4 - Search for Cheap Flights.html 3.4 kB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/01_introduction-to-version-control/05_module-wrap-up/02_how-to-log-in-to-qwiklabs_instructions.html 3.4 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/53 - Day 53 - Intermediate+ Web Scraping Capstone - Data Entry Job Automation/003 Solution-Zillow-Rental-Research.zip 3.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/84 - Day 84 - Professional Portfolio Project - [GUI]/001 [assignment_info] Image Watermarking Desktop App.html 3.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/90 - Day 90 - Professional Portfolio Project - [HTTP Requests & APIs]/001 [assignment_info] Convert PDF to Audiobook.html 3.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/83 - Day 83 - Professional Portfolio Project - [Python Scripting]/001 [assignment_info] Tic Tac Toe.html 3.3 kB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 02 - Forensic Concept Review/2.4 Chain of Custody.vtt 3.3 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/03_regular-expressions/03_advanced-regular-expressions/06_practice-quiz-advanced-regular-expressions_quiz.html 3.3 kB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/03_crashing-programs/02_code-that-crashes/06_resources-for-debugging-crashes_instructions.html 3.3 kB
  • Protocol Deep Dive/OSPF - Deep Dive/05 - Introducing Multi-area OSPF (Hierarchy)/33 - Decoding Multi-area OSPF Building Blocks.en.srt 3.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/89 - Day 89 - Professional Portfolio Project - [GUI Desktop App]/001 [assignment_info] Disappearing Text Writing App.html 3.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/91 - Day 91 - Professional Portfolio Project - [Image Processing & Data Science]/001 [assignment_info] Image Colour Palette Generator.html 3.3 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/01_strings/13_practice-quiz-strings_quiz.html 3.3 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/3. Linux commands in the Bash shell/05_review-linux-commands-in-the-bash-shell/2. Glossary terms from week 3.html 3.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/38 - Day 38 - Intermediate+ Workout Tracking Using Google Sheets/007 Step 6 - Environment Variables in Repl.it.html 3.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/38 - Day 38 - Intermediate+ Workout Tracking Using Google Sheets/007 Solution-Exercise-Tracker.zip 3.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/63 - Day 63 - Advanced - Databases and with SQLite and SQLAlchemy/008 Build a SQLite Database into the Flask Website.html 3.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/75 - Day 75 - Advanced - Beautiful Plotly Charts & Analysing the Android App Store/007 Extracting Nested Column Data using .stack().html 3.2 kB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 04 - The Expert Report/4.2 Importance of Every Word.vtt 3.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/47 - Day 47 - Intermediate+ Create an Automated Amazon Price Tracker/002 Step 1 - Use BeautifulSoup to Scrape the Product Price.html 3.2 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/01_hello-python/01_course-introduction/04_program-surveys_instructions.html 3.2 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/02_lists/04_modifying-lists_instructions.html 3.2 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/06_bash-scripting/01_interacting-with-the-command-line-shell/07_redirections-pipes-and-signals_instructions.html 3.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/88 - Day 88 - Professional Portfolio Project - [Web Development]/001 [assignment_info] Todo List.html 3.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/85 - Day 85 - Professional Portfolio Project - [GUI]/001 [assignment_info] Typing Speed Test.html 3.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/62 - Day 62 - Advanced - Flask, WTForms, Bootstrap and CSV - Coffee & Wifi Project/001 Starting-Files-coffee-and-wifi.zip 3.2 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/01_strings/11_string-reference-cheat-sheet_instructions.html 3.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/66 - Day 66 - Advanced - Building Your Own API with RESTful Routing/004 HTTP GET - a Random Cafe.html 3.2 kB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Module 3 - Storing and Analyzing ATT&CK®-Mapped Data/3.4 Exercise 3 - Comparing Layers in ATT&CK® Navigator.vtt 3.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/82 - Day 82 - Professional Portfolio Project - [Python Web Development]/001 [assignment_info] Portfolio Website.html 3.2 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/05_object-oriented-programming-optional/03_code-reuse/04_object-composition_instructions.html 3.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/36 - Day 36 - Intermediate+ Stock Trading News Alert Project/002 stock-news-extrahard-start.zip 3.2 kB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/04_use-playbooks-to-respond-to-incidents/02_explore-incident-response/3. Playbooks, SIEM tools, and SOAR tools.html 3.2 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/03_dictionaries/02_dictionaries-defined_instructions.html 3.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/43 - Day 43 - Web Foundation - Introduction to CSS/002 5.1-Adding-CSS.zip 3.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/73 - Day 73 - Advanced - Aggregate & Merge Data with Pandas Analyse the LEGO Dataset/005 Visualise the Number of Sets Published over Time.html 3.2 kB
  • Protocol Deep Dive/OSPF - Deep Dive/06 - Troubleshooting Common OSPF Issues/44 - Troubleshooting Common OSPF Issues - Mismatched Timers.en.srt 3.2 kB
  • Google Coursera/IT Support/5. IT Security Defense against the digital dark arts/6. Creating a Company Culture for Security/2. Users/VSAQ - Security Assessment Questionnaires.html 3.1 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/87 - Day 87 - Professional Portfolio Project - [Web Development]/001 [assignment_info] Cafe and Wifi Website.html 3.1 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/96 - Day 96 - Professional Portfolio Project - [Web Development]/001 [assignment_info] An Online Shop.html 3.1 kB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/2. Write effective Python code/04_review-write-effective-python-code/2. Glossary terms from week 2.html 3.1 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/79 - Day 79 - Advanced - The Tragic Discovery of Handwashing t-Tests & Distributions/006 Learning Points & Summary.html 3.1 kB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/03_working-with-remotes/02_using-a-remote-repository/05_git-remotes-cheat-sheet_instructions.html 3.1 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/05_testing-in-python/04_errors-and-exceptions/04_handling-errors-cheat-sheet_instructions.html 3.1 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/71 - Day 71 - Advanced - Data Exploration with Pandas College Major v.s. Your Salary/007 Sorting Values & Adding Columns Majors with the Most Potential vs Lowest Risk.html 3.1 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/72 - Day 72 - Advanced - Data Visualisation with Matplotlib Programming Languages/002 Programming-Languages-start.ipynb.zip 3.1 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/71 - Day 71 - Advanced - Data Exploration with Pandas College Major v.s. Your Salary/003 salaries-by-college-major.csv 3.1 kB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 09 - Expert Testimony/9.4 Cross Examination.vtt 3.1 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/94 - Day 94 - Professional Portfolio Project - [Game]/001 [assignment_info] Space Invaders.html 3.1 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/4. Databases and SQL/05_review-databases-and-sql/2. Glossary terms from week 4.html 3.1 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 08 - Discovery/8.1 What is Discovery.vtt 3.1 kB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/01_introduction-to-version-control/02_before-version-control/06_diff-and-patch-cheat-sheet_instructions.html 3.1 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/03_loops/02_for-loops/08_practice-quiz-for-loops_quiz.html 3.0 kB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 08 - Providing Depositions and Affidavits/8.1 Written vs. Oral Testimony.vtt 3.0 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/63 - Day 63 - Advanced - Databases and with SQLite and SQLAlchemy/003 Make the Website Work.html 3.0 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/01_strings/06_basic-string-methods_instructions.html 3.0 kB
  • Protocol Deep Dive/OSPF - Deep Dive/06 - Troubleshooting Common OSPF Issues/41 - Troubleshooting Common OSPF Issues - Core1.en.srt 3.0 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/99 - Day 99 - Professional Portfolio Project - [Data Science]/001 [assignment_info] Analyse Deaths involving Police in the United States.html 3.0 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/01_hello-python/03_introduction-to-python/06_practice-quiz-introduction-to-python_quiz.html 3.0 kB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/4. Python in practice/04_review-python-in-practice/2. Glossary terms from week 4.html 3.0 kB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 09 - Expert Testimony/9.2 Consulting vs. Testifying.vtt 3.0 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/81 - Day 81 - Professional Portfolio Project - [Python Scripting]/001 [assignment_info] Text to Morse Code Converter.html 3.0 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/45 - Day 45 - Intermediate+ Web Scraping with Beautiful Soup/006 Solution-100-movies-to-watch-end.zip 3.0 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/01_manipulating-images/01_course-introduction/01_course-introduction_instructions.html 3.0 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/75 - Day 75 - Advanced - Beautiful Plotly Charts & Analysing the Android App Store/004 Data Visualisation with Plotly Create Pie and Donut Charts.html 3.0 kB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 07 - Rules of Evidence and Procedure/7.2 Federal Rule of Civil Procedure 26.vtt 3.0 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/02_managing-files-with-python/02_managing-files-and-directories/05_practice-quiz-managing-files-directories_quiz.html 2.9 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/03_loops/01_while-loops/09_practice-quiz-while-loops_quiz.html 2.9 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/60 - Day 60 - Advanced - Make POST Requests with Flask and HTML Forms/005 Getting the Contact Form to Work.html 2.9 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/05_object-oriented-programming-optional/02_classes-and-methods-optional/07_classes-and-methods-cheat-sheet-optional_instructions.html 2.9 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/06_final-project/02_final-project/03_final-project-help_instructions.html 2.9 kB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/4. Cybersecurity tools and programming languages/03_review-cybersecurity-tools-and-programming-languages/2. Glossary terms from week 4.html 2.9 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/03_automatic-output-generation/01_sending-emails-from-python/01_module-3-introduction_instructions.html 2.9 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/05_review-security-hardening/2. Glossary terms from week 4.html 2.9 kB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 09 - Expert Testimony/9.5 Redirect Examination.vtt 2.9 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/67 - Day 67 - Advanced - Blog Capstone Project Part 3 - RESTful Routing/005 Requirement 3 - Be Able to Edit Existing Blog Posts.html 2.9 kB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/02_using-git-locally/02_undoing-things/05_git-revert-cheat-sheet_instructions.html 2.9 kB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/02_slowness/01_understanding-slowness/06_monitoring-tools_instructions.html 2.9 kB
  • Google Coursera/Cybersecurity/1. Foundations of Cybersecurity/1. Welcome to the exciting world of cybersecurity/04_review-welcome-to-the-exciting-world-of-cybersecurity/2. Glossary terms from week 1.html 2.8 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/39 - Day 39 - Intermediate+ Capstone Part 1 Flight Deal Finder/004 Step 3 - Get the IATA Codes using the Kiwi Partners API.html 2.8 kB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/03_automation-in-the-cloud/03_automating-cloud-deployments/04_more-about-cloud-gcp_instructions.html 2.8 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/03_dictionaries/06_dictionary-methods-cheat-sheet_instructions.html 2.8 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/73 - Day 73 - Advanced - Aggregate & Merge Data with Pandas Analyse the LEGO Dataset/008 Scatter Plots Average Number of Parts per LEGO Set.html 2.8 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/71 - Day 71 - Advanced - Data Exploration with Pandas College Major v.s. Your Salary/005 Accessing Columns and Individual Cells in a Dataframe.html 2.8 kB
  • Protocol Deep Dive/IPsec - Deep Dive/01 - Course Overview/01 - Course Overview.en.srt 2.8 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/101 - Final Stretch/003 Bonus Lecture Check out my other courses.html 2.8 kB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 03 - Investigative Process/3.4 Drawing Conclusions.vtt 2.8 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/02_basic-python-syntax/01_expressions-and-variables/07_practice-quiz-expressions-and-variables_quiz.html 2.8 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/63 - Day 63 - Advanced - Databases and with SQLite and SQLAlchemy/007 CRUD Operations with SQLAlchemy.html 2.7 kB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 09 - Expert Testimony/9.3 Direct Examination.vtt 2.7 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/02_basic-python-syntax/03_conditionals/09_conditionals-cheat-sheet_instructions.html 2.7 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/01_getting-your-python-on/03_running-python-locally/05_setting-up-your-environment_instructions.html 2.7 kB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/03_introduction-to-cybersecurity-tools/03_review-introduction-to-cybersecurity-tools/2. Glossary terms from week 3.html 2.7 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/010 Authenticating Users with Flask-Login.html 2.7 kB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 07 - Rules of Evidence and Procedure/7.4 State and Local Rules.vtt 2.7 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/01_strings/10_string-formatting_instructions.html 2.7 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/01_manipulating-images/03_manipulating-images/01_how-to-use-pil-for-working-with-images_instructions.html 2.7 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/008 Challenge Create an Automated Game Playing Bot.html 2.6 kB
  • Google Coursera/Cybersecurity/7. Automate Cybersecurity Tasks with Python/3. Work with strings and lists/04_review-work-with-strings-and-lists/2. Glossary terms from week 3.html 2.6 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/59 - Day 59 - Advanced - Blog Capstone Project Part 2 - Adding Styling/007 Step 6 - Fetch and render the blog posts from an API.html 2.6 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/50 - Day 50 - Intermediate+ Auto Tinder Swiping Bot/004 Step 3 - Login with Facebook.html 2.6 kB
  • Protocol Deep Dive/OSPF - Deep Dive/04 - Discussing Simple OSPF Communication Blocks/20 - Reviewing What a Link State Advertisement Is.en.srt 2.6 kB
  • Protocol Deep Dive/IPsec - Deep Dive/05 - Securing the Network with IKEv1/23 - Summarizing IKEv1.en.srt 2.6 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/71 - Day 71 - Advanced - Data Exploration with Pandas College Major v.s. Your Salary/004 Preliminary Data Exploration and Data Cleaning with Pandas.html 2.6 kB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/04_collaboration/03_managing-projects/04_additional-tools_instructions.html 2.6 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/02_interacting-with-web-services/01_web-applications-and-services/02_web-applications-and-services_instructions.html 2.6 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/73 - Day 73 - Advanced - Aggregate & Merge Data with Pandas Analyse the LEGO Dataset/001 Day 73 Goals what you will make by the end of the day.html 2.6 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/02_basic-python-syntax/03_conditionals/02_comparison-operators_instructions.html 2.6 kB
  • Protocol Deep Dive/IPsec - Deep Dive/07 - Implementing IPsec in IPv6/34 - IPv6 IPsec Summary.en.srt 2.5 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/66 - Day 66 - Advanced - Building Your Own API with RESTful Routing/010 HTTP PATCH - A Cafe's Coffee Price.html 2.5 kB
  • Google Coursera/Cybersecurity/4. Tools of the Trade - Linux and SQL/1. Introduction to operating systems/05_review-introduction-to-operating-systems/2. Glossary terms from week 1.html 2.5 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/05_object-oriented-programming-optional/01_object-oriented-programming-optional/07_defining-classes-optional_instructions.html 2.5 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/02_lists/02_lists-defined_instructions.html 2.5 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/2. Escalate incidents/04_review-escalate-incidents/2. Glossary terms from week 2.html 2.5 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/61 - Day 61 - Advanced - Building Advanced Forms with Flask-WTForms/002 Installing Flask-WTF.html 2.5 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/external-links.txt 2.5 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/006 blog-templating-start.zip 2.5 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 08 - Discovery/8.6 Module 8 Summary.vtt 2.5 kB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 06 - The Trial Process/6.1 Judge vs. Jury Trial.vtt 2.5 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/73 - Day 73 - Advanced - Aggregate & Merge Data with Pandas Analyse the LEGO Dataset/006 How to use the Pandas .agg() function.html 2.5 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.1 What is Credential Access.vtt 2.5 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/63 - Day 63 - Advanced - Databases and with SQLite and SQLAlchemy/006 SQLAlchemy.html 2.5 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/40 - Day 40 - Intermediate+ Capstone Part 2 Flight Club/002 Step 1 - Create the Customer Acquisition Code.html 2.4 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 12 - Exfiltration/12.6 Module 12 Summary.vtt 2.4 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/38 - Day 38 - Intermediate+ Workout Tracking Using Google Sheets/006 Step 5 - Authenticate Your Sheety API.html 2.4 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/73 - Day 73 - Advanced - Aggregate & Merge Data with Pandas Analyse the LEGO Dataset/002 Use HTML Markdown to Make Your Notebook Look Pretty.html 2.4 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/01_strings/04_string-indexing-and-slicing_instructions.html 2.4 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/23 - Day 23 - Intermediate - The Turtle Crossing Capstone Project/005 Step 2 - Break down the Problem.html 2.4 kB
  • Protocol Deep Dive/OSPF - Deep Dive/06 - Troubleshooting Common OSPF Issues/43 - Troubleshooting Common OSPF Issues - Authentication Mismatch.en.srt 2.4 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/04_putting-it-all-together/01_final-course-project/02_project-problem-statement_instructions.html 2.4 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/52 - Day 52 - Intermediate+ Instagram Follower Bot/005 Step 4 - Find the followers of the target account.html 2.4 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/78 - Day 78 - Advanced - Analysing the Nobel Prize with Plotly, Matplotlib & Seaborn/001 Day 78 Goals what you will make by the end of the day.html 2.4 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/1. Protect data and communicate incidents/04_review-protect-assets-and-communicate-incidents/2. Glossary terms from week 1.html 2.4 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/03_loops/02_for-loops/04_a-closer-look-at-the-range-function_instructions.html 2.3 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/05_testing-in-python/03_other-test-concepts/04_more-about-tests_instructions.html 2.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/006 Solution-blog-templating-end.zip 2.3 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/ticket-473845.rtf 2.3 kB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/ticket-473845.rtf 2.3 kB
  • Protocol Deep Dive/OSPF - Deep Dive/06 - Troubleshooting Common OSPF Issues/45 - Troubleshooting Common OSPF Issues - Area Type Mismatch.en.srt 2.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/47 - Day 47 - Intermediate+ Create an Automated Amazon Price Tracker/003 Step 2 - Email Alert When Price Below Preset Value.html 2.3 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 10 - Collection/10.6 Module 10 Summary.vtt 2.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/009 Ticketing-Flow-Chart-Version-5-with-Midlife-Crisis.url 2.3 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/02_lists/10_list-comprehensions_instructions.html 2.3 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 10 - Collection/10.1 What is Collection.vtt 2.3 kB
  • Protocol Deep Dive/OSPF - Deep Dive/03 - Forming Basic OSPF Relationships/07 - Module Introduction.en.srt 2.3 kB
  • Protocol Deep Dive/ICMP - Deep Dive/Exercise Files/07/demos/v6-tool-traceroute.pcapng 2.3 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/01_manipulating-images/04_module-1-project/01_project-problem-statement_instructions.html 2.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/72 - Day 72 - Advanced - Data Visualisation with Matplotlib Programming Languages/008 Multi-Line Charts with Matplotib.html 2.3 kB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/03_working-with-remotes/03_solving-conflicts/06_conflict-resolution-cheat-sheet_instructions.html 2.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/55 - Day 55 - Intermediate+ HTML & URL Parsing in Flask and the Higher Lower Game/007 Final Project - Higher or Lower URLs.html 2.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/74 - Day 74 - Advanced - Google Trends Data Resampling and Visualising Time Series/001 Day 74 Goals what you will make by the end of the day.html 2.2 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/02_lists/06_tuples_instructions.html 2.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/75 - Day 75 - Advanced - Beautiful Plotly Charts & Analysing the Android App Store/001 Day 75 Goals what you will make by the end of the day.html 2.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/73 - Day 73 - Advanced - Aggregate & Merge Data with Pandas Analyse the LEGO Dataset/003 Solution Exploring the LEGO Brick Colours.html 2.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/75 - Day 75 - Advanced - Beautiful Plotly Charts & Analysing the Android App Store/003 Preliminary Exploration The Highest Ratings, Most Reviews, and Largest Size.html 2.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/71 - Day 71 - Advanced - Data Exploration with Pandas College Major v.s. Your Salary/009 Grouping and Pivoting Data with Pandas.html 2.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/74 - Day 74 - Advanced - Google Trends Data Resampling and Visualising Time Series/005 Using Locators and DateFormatters to generate Tick Marks on a Time Line.html 2.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/011 Hint-Flow-Chart-for-Hangman.url 2.2 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/03_automatic-output-generation/03_module-3-project/01_project-problem-statement_instructions.html 2.2 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/05_testing-in-python/02_unit-tests/06_help-with-jupyter-notebooks_instructions.html 2.1 kB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 08 - Providing Depositions and Affidavits/8.2 Affidavits vs. Declarations.vtt 2.1 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 11 - Command and Control/11.6 Module 11 Summary.vtt 2.1 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/05_object-oriented-programming-optional/02_classes-and-methods-optional/09_help-with-jupyter-notebooks-optional_instructions.html 2.1 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/24 - Day 24 - Intermediate - Files, Directories and Paths/004 Solution-snake-game-high-score-final.zip 2.1 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/72 - Day 72 - Advanced - Data Visualisation with Matplotlib Programming Languages/003 Solution Preliminary Data Exploration.html 2.1 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 09 - Lateral Movement/9.1 What is Lateral Movement.vtt 2.1 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 09 - Lateral Movement/9.6 Module 9 Summary.vtt 2.1 kB
  • Protocol Deep Dive/OSPF - Deep Dive/01 - Course Overview/01 - Course Overview.en.srt 2.1 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/59 - Day 59 - Advanced - Blog Capstone Project Part 2 - Adding Styling/001 Day 59 Goals What you'll make by the end of today.html 2.1 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/02_basic-python-syntax/03_conditionals/06_else-statements-and-the-modulo-operator_instructions.html 2.1 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 07 - Credential Access/7.7 Module 7 Summary.vtt 2.1 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/02_basic-python-syntax/02_functions/02_defining-functions-recap_instructions.html 2.1 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/006 oop-coffee-machine-start.zip 2.1 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/05_object-oriented-programming-optional/01_object-oriented-programming-optional/05_classes-and-objects-in-detail_instructions.html 2.1 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/007 Join Our Class on Coding Rooms.html 2.1 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/61 - Day 61 - Advanced - Building Advanced Forms with Flask-WTForms/009 Flask-Bootstrap Supports WTForms.html 2.1 kB
  • Protocol Deep Dive/OSPF - Deep Dive/03 - Forming Basic OSPF Relationships/18 - Summary.en.srt 2.1 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/61 - Day 61 - Advanced - Building Advanced Forms with Flask-WTForms/003 Creating Forms with Flask-WTF.html 2.1 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/72 - Day 72 - Advanced - Data Visualisation with Matplotlib Programming Languages/005 Data Cleaning Working with Time Stamps.html 2.1 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/31 - Day 31 - Intermediate - Flash Card App Capstone Project/006 Step 3 - Flip the Cards!.html 2.1 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/61 - Day 61 - Advanced - Building Advanced Forms with Flask-WTForms/006 Receiving Form Data with WTForms.html 2.1 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/31 - Day 31 - Intermediate - Flash Card App Capstone Project/008 Step 4 - Save Your Progress.html 2.0 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/69 - Day 69 - Advanced - Blog Capstone Project Part 4 - Adding Users/005 Requirement 3 - Protect Routes.html 2.0 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/external-links.txt 2.0 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/006 birthday-wisher-normal-start.zip 2.0 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/79 - Day 79 - Advanced - The Tragic Discovery of Handwashing t-Tests & Distributions/001 Day 79 Goals what you will make by the end of the day.html 2.0 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/02_interacting-with-web-services/01_web-applications-and-services/01_module-2-introduction_instructions.html 2.0 kB
  • Protocol Deep Dive/OSPF - Deep Dive/06 - Troubleshooting Common OSPF Issues/42 - Troubleshooting Common OSPF Issues - Duplicate Address.en.srt 2.0 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/02_interacting-with-web-services/03_module-2-project/01_project-problem-statement_instructions.html 2.0 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced - My Top 10 Movies Website/003 Requirement 1 - Be Able to View Movie List Items.html 2.0 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced -My Top 10 Movies Website/003 Requirement 1 - Be Able to View Movie List Items.html 2.0 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/01_hello-python/03_introduction-to-python/02_a-note-on-syntax-and-code-blocks_instructions.html 2.0 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/011 Flask Flash Messages.html 2.0 kB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/04_managing-resources/01_managing-computer-resources/06_more-about-managing-resources_instructions.html 2.0 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/03_loops/03_recursion-optional/03_additional-recursion-sources_instructions.html 1.9 kB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/01_troubleshooting-concepts/04_binary-searching-a-problem/02_linear-and-binary-search-optional_instructions.html 1.9 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/21 - Day 21 - Intermediate - Build the Snake Game Part 2 Inheritance & List Slicing/007 snake-game-part-2-final.zip 1.9 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/24 - Day 24 - Intermediate - Files, Directories and Paths/002 Snake-Project-Code-from-Day-21.zip 1.9 kB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 05 - The Origins of the American Legal System/5.2 Original vs. Appellate Jurisdiction.vtt 1.9 kB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/03_automation-in-the-cloud/02_managing-instances-in-the-cloud/05_managing-vms-in-gcp_instructions.html 1.9 kB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 04 - The Expert Report/4.3 Drawing Conclusions Revisited.vtt 1.9 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 13 - Impact/13.1 What is Impact.vtt 1.9 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced - My Top 10 Movies Website/007 Requirement 5 - Be Able to Sort and Rank the Movies By Rating.html 1.9 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced -My Top 10 Movies Website/007 Requirement 5 - Be Able to Sort and Rank the Movies By Rating.html 1.9 kB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/04_managing-cloud-instances-at-scale/02_monitoring-and-alerting/05_more-information-on-monitoring-and-alerting_instructions.html 1.9 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/59 - Day 59 - Advanced - Blog Capstone Project Part 2 - Adding Styling/006 Step 5 - Make the About and Contact Pages Work.html 1.9 kB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/01_introduction-to-version-control/04_using-git/05_initial-git-cheat-sheet_instructions.html 1.9 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/76 - Day 76 - Advanced - Computation with NumPy and N-Dimensional Arrays/001 Day 76 Goals what you will make by the end of the day.html 1.9 kB
  • Protocol Deep Dive/ICMP - Deep Dive/Exercise Files/03/demos/traceroute.pcapng 1.9 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/03_dictionaries/04_iterating-over-dictionaries_instructions.html 1.8 kB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/04_collaboration/02_code-reviews/04_more-information-on-code-reviews_instructions.html 1.8 kB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/04_managing-cloud-instances-at-scale/01_building-software-for-the-cloud/06_more-about-cloud-providers_instructions.html 1.8 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/external-links.txt 1.8 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/49 - Day 49 - Intermediate+ Automating Job Applications on LinkedIn/002 Step 1 - Setup Your LinkedIn Account.html 1.8 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/23 - Day 23 - Intermediate - The Turtle Crossing Capstone Project/010 Solution-turtle-crossing-final.zip 1.8 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/40 - Day 40 - Intermediate+ Capstone Part 2 Flight Club/004 Step 3 - Exception Handling for Destinations without Flights.html 1.8 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/02_basic-python-syntax/03_conditionals/08_more-complex-branching-with-elif-statements_instructions.html 1.8 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/72 - Day 72 - Advanced - Data Visualisation with Matplotlib Programming Languages/009 Smoothing out Time-Series Data.html 1.8 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/66 - Day 66 - Advanced - Building Your Own API with RESTful Routing/012 Build Documentation for Your API.html 1.8 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/77 - Day 77 - Advanced - Linear Regression and Data Visualisation with Seaborn/001 Day 77 Goals what you will make by the end of the day.html 1.8 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/38 - Day 38 - Intermediate+ Workout Tracking Using Google Sheets/004 Step 3 - Setup Your Google Sheet with Sheety.html 1.8 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/04_putting-it-all-together/01_final-course-project/01_module-4-introduction_instructions.html 1.8 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/40 - Day 40 - Intermediate+ Capstone Part 2 Flight Club/005 Step 4 - Destinations without Direct Flights.html 1.8 kB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/04_managing-cloud-instances-at-scale/03_troubleshooting-and-debugging/04_reading-debugging-problems-on-the-cloud_instructions.html 1.8 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/03_loops/01_while-loops/06_common-pitfalls-with-variable-initialization_instructions.html 1.8 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 11 - Command and Control/11.1 What is Command Control.vtt 1.8 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced - My Top 10 Movies Website/004 Requirement 2 - Be Able to Edit a Movie's Rating and Review.html 1.8 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced -My Top 10 Movies Website/004 Requirement 2 - Be Able to Edit a Movie's Rating and Review.html 1.8 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/03_regular-expressions/02_basic-regular-expressions/06_regular-expressions-cheat-sheet_instructions.html 1.8 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/74 - Day 74 - Advanced - Google Trends Data Resampling and Visualising Time Series/008 Data Visualisation - Unemployment The Effect of New Data.html 1.8 kB
  • Protocol Deep Dive/OSPF - Deep Dive/05 - Introducing Multi-area OSPF (Hierarchy)/28 - Module Introduction.en.srt 1.7 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/38 - Day 38 - Intermediate+ Workout Tracking Using Google Sheets/005 Step 4 - Saving Data into Google Sheets.html 1.7 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/80 - Day 80 - Advanced - Capstone Project - Predict House Prices/001 Day 80 Goals what you will make by the end of the day.html 1.7 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/05_object-oriented-programming-optional/02_classes-and-methods-optional/02_what-is-a-method_instructions.html 1.7 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/41 - Day 41 - Web Foundation - Introduction to HTML/003 Download the Required Software.html 1.7 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/02_basic-python-syntax/01_expressions-and-variables/06_implicit-vs-explicit-conversion_instructions.html 1.7 kB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 04 - The Expert Report/4.4 The Importance of Peer Review.vtt 1.7 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/81 - Day 81 - Professional Portfolio Project - [Python Scripting]/001 The Road to Becoming a Professional Developer.html 1.7 kB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/02_slowness/03_when-slowness-problems-get-complex/05_more-about-complex-slow-systems_instructions.html 1.7 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/73 - Day 73 - Advanced - Aggregate & Merge Data with Pandas Analyse the LEGO Dataset/007 Superimposing Line Charts with Separate Axes.html 1.7 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/007 Solution-birthday-wisher-end.zip 1.7 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/49 - Day 49 - Intermediate+ Automating Job Applications on LinkedIn/004 Step 3 - Apply for a Job.html 1.7 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/03_loops/01_while-loops/08_infinite-loops-and-code-blocks_instructions.html 1.7 kB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/01_introduction-to-version-control/03_version-control-systems/04_more-information-about-git_instructions.html 1.7 kB
  • Protocol Deep Dive/OSPF - Deep Dive/04 - Discussing Simple OSPF Communication Blocks/19 - Module Introduction.en.srt 1.7 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/02_basic-python-syntax/03_conditionals/04_if-statements-recap_instructions.html 1.6 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/59 - Day 59 - Advanced - Blog Capstone Project Part 2 - Adding Styling/004 Step 3 - Fix the header and footer.html 1.6 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/78 - Day 78 - Advanced - Analysing the Nobel Prize with Plotly, Matplotlib & Seaborn/008 Learning Points & Summary.html 1.6 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/49 - Day 49 - Intermediate+ Automating Job Applications on LinkedIn/003 Step 2 - Automatically Login.html 1.6 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/02_basic-python-syntax/02_functions/04_returning-values-using-functions_instructions.html 1.6 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/53 - Day 53 - Intermediate+ Web Scraping Capstone - Data Entry Job Automation/003 HINTS & SOLUTION.html 1.6 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/22 - Day 22 - Intermediate - Build Pong The Famous Arcade Game/009 Solution-pong-game-final.zip 1.6 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/005 day-57-end.zip 1.6 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/03_loops/01_while-loops/03_anatomy-of-a-while-loop_instructions.html 1.6 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/71 - Day 71 - Advanced - Data Exploration with Pandas College Major v.s. Your Salary/010 Learning Points & Summary.html 1.6 kB
  • Protocol Deep Dive/OSPF - Deep Dive/05 - Introducing Multi-area OSPF (Hierarchy)/39 - Summary.en.srt 1.6 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/61 - Day 61 - Advanced - Building Advanced Forms with Flask-WTForms/001 Day 61 Goals Building Advanced Forms.html 1.6 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/66 - Day 66 - Advanced - Building Your Own API with RESTful Routing/007 Postman - The all in one API Testing Tool.html 1.6 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/36 - Day 36 - Intermediate+ Stock Trading News Alert Project/005 Solution-stock-news-end.zip 1.6 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/61 - Day 61 - Advanced - Building Advanced Forms with Flask-WTForms/008 Using Flask-Bootstrap as an Inherited Template.html 1.6 kB
  • Protocol Deep Dive/ICMP - Deep Dive/Exercise Files/02/demos/ping.pcapng 1.6 kB
  • Protocol Deep Dive/ICMP - Deep Dive/Exercise Files/07/demos/v6-tool-ping.pcapng 1.6 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/06_bash-scripting/02_bash-scripting/04_bash-scripting-resources_instructions.html 1.6 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/006 Hint-Flowchart-of-Secret-Auction.url 1.6 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/external-links.txt 1.6 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/02_managing-files-with-python/02_managing-files-and-directories/04_files-and-directories-cheat-sheet_instructions.html 1.6 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/50 - Day 50 - Intermediate+ Auto Tinder Swiping Bot/003 Step 2 - Navigate to Login Page.html 1.5 kB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/01_introduction-to-version-control/03_version-control-systems/07_installing-git_instructions.html 1.5 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/71 - Day 71 - Advanced - Data Exploration with Pandas College Major v.s. Your Salary/002 Getting Set Up for Data Science.html 1.5 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/49 - Day 49 - Intermediate+ Automating Job Applications on LinkedIn/005 Step 4 - Apply for all the jobs.html 1.5 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/72 - Day 72 - Advanced - Data Visualisation with Matplotlib Programming Languages/001 Day 72 Goals what you will make by the end of the day.html 1.5 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/66 - Day 66 - Advanced - Building Your Own API with RESTful Routing/011 HTTP DELETE - A Cafe that's Closed.html 1.5 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/006 birthday-wisher-hard-start.zip 1.5 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/50 - Day 50 - Intermediate+ Auto Tinder Swiping Bot/006 Step 5 - Hit Like!.html 1.5 kB
  • Google Coursera/Cybersecurity/2. Play It Safe - Manage Security Risks/04_use-playbooks-to-respond-to-incidents/03_review-use-playbooks-to-respond-to-incidents/2. Glossary terms from week 4.html 1.5 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/04_strings-lists-and-dictionaries/02_lists/08_iterating-over-lists-using-enumerate_instructions.html 1.5 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/05_object-oriented-programming-optional/01_object-oriented-programming-optional/03_object-oriented-programming-defined_instructions.html 1.5 kB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/01_automating-with-configuration-management/03_introduction-to-puppet/04_puppet-resources_instructions.html 1.5 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/71 - Day 71 - Advanced - Data Exploration with Pandas College Major v.s. Your Salary/001 Day 71 Goals what you will make by the end of the day.html 1.5 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/72 - Day 72 - Advanced - Data Visualisation with Matplotlib Programming Languages/002 Download and Open the Starter Notebook.html 1.5 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/74 - Day 74 - Advanced - Google Trends Data Resampling and Visualising Time Series/009 Learning Points & Summary.html 1.5 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/external-links.txt 1.5 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/external-links.txt 1.5 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/71 - Day 71 - Advanced - Data Exploration with Pandas College Major v.s. Your Salary/006 Solution Highest and Lowest Earning Degrees.html 1.5 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/004 blog-data.txt 1.5 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/59 - Day 59 - Advanced - Blog Capstone Project Part 2 - Adding Styling/007 blog-data.txt 1.5 kB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/02_deploying-puppet/01_deploying-puppet-locally/05_more-information-about-deploying-puppet-locally_instructions.html 1.5 kB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/01_automating-with-configuration-management/04_the-building-blocks-of-configuration-management/03_more-information-about-configuration-management_instructions.html 1.5 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/5. Find and apply for cybersecurity jobs/05_review-find-and-apply-for-cybersecurity-jobs/2. Glossary terms from week 5.html 1.4 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/02_basic-python-syntax/01_expressions-and-variables/03_data-types-recap_instructions.html 1.4 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 13 - Impact/13.5 Module 13 Summary.vtt 1.4 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/38 - Day 38 - Intermediate+ Workout Tracking Using Google Sheets/003 Step 2 - Get Exercise Stats with Natural Language Queries.html 1.4 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/005 FAQ Can I Use PyCharmVSCode Another Local Code Editor.html 1.4 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/71 - Day 71 - Advanced - Data Exploration with Pandas College Major v.s. Your Salary/003 Upload the Data and Read the .csv File.html 1.4 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/006 Leap-Year-Flow-Chart.url 1.4 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/006 Blog Capstone Project Part 1 - Templating.html 1.4 kB
  • Google Coursera/IT Automation with Python/6. Automating Real-World Tasks with Python/01_manipulating-images/02_application-programming-interfaces-apis/01_module-1-introduction_instructions.html 1.4 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/38 - Day 38 - Intermediate+ Workout Tracking Using Google Sheets/002 Step 1 - Setup API Credentials and Google Spreadsheet.html 1.4 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/53 - Day 53 - Intermediate+ Web Scraping Capstone - Data Entry Job Automation/external-links.txt 1.4 kB
  • Cybrary/Cybrary - Become an Incident Handler/05. DFIR Investigations and Witness Testimony/Module 07 - Rules of Evidence and Procedure/7.3 Federal Criminal Rule of Procedure 16.vtt 1.4 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/02_managing-files-with-python/03_reading-and-writing-csv-files/05_csv-files-cheat-sheet_instructions.html 1.4 kB
  • Cybrary/Cybrary - Become an Incident Handler/09. Application of the MITRE ATT&CK Framework/Module 12 - Exfiltration/12.1 What is Exfiltration.vtt 1.4 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/72 - Day 72 - Advanced - Data Visualisation with Matplotlib Programming Languages/010 Learning Points & Summary.html 1.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/009 Hashing Passwords using Werkzeug.html 1.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced - My Top 10 Movies Website/001 Day 64 Goals What We'll Build.html 1.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced -My Top 10 Movies Website/001 Day 64 Goals What We'll Build.html 1.3 kB
  • Protocol Deep Dive/OSPF - Deep Dive/02 - Covering OSPF Basics/06 - Summary.en.srt 1.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/66 - Day 66 - Advanced - Building Your Own API with RESTful Routing/008 HTTP POST - A New Cafe.html 1.3 kB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/02_deploying-puppet/03_updating-deployments/03_more-information-about-updating-deployments_instructions.html 1.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/external-links.txt 1.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/36 - Day 36 - Intermediate+ Stock Trading News Alert Project/002 stock-news-normal-start.zip 1.3 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/05_object-oriented-programming-optional/03_code-reuse/07_supplemental-reading-for-code-reuse-optional_instructions.html 1.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/66 - Day 66 - Advanced - Building Your Own API with RESTful Routing/006 HTTP GET - Find a Cafe.html 1.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/59 - Day 59 - Advanced - Blog Capstone Project Part 2 - Adding Styling/005 Step 4 - Using Jinja Include fo Render Templates.html 1.3 kB
  • Protocol Deep Dive/OSPF - Deep Dive/04 - Discussing Simple OSPF Communication Blocks/27 - Summary.en.srt 1.3 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/3. Secure against network intrusions/02_secure-networks-against-denial-of-service-dos-attacks/3. Activity Exemplar - Analyze network layer communication.html 1.3 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/02_os-hardening/3. Activity - Apply OS hardening techniques.html 1.3 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/3. Communicate effectively to influence stakeholders/04_review-communicate-effectively-to-influence-stakeholders/2. Glossary terms from week 3.html 1.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/52 - Day 52 - Intermediate+ Instagram Follower Bot/006 Step 5 - Follow all the followers.html 1.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/60 - Day 60 - Advanced - Make POST Requests with Flask and HTML Forms/004 POST Requests in Flask Solution.html 1.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/002 A Note About the Next Lesson Google SMTP Port.html 1.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/40 - Day 40 - Intermediate+ Capstone Part 2 Flight Club/006 Step 5 - Email all our customers.html 1.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/73 - Day 73 - Advanced - Aggregate & Merge Data with Pandas Analyse the LEGO Dataset/011 Learning Points & Summary.html 1.3 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/3. Secure against network intrusions/03_network-attack-tactics-and-defense/4. Activity Exemplar - Analyze network attacks.html 1.3 kB
  • Google Coursera/Cybersecurity/3. Connect and Protect - Networks and Network Security/4. Security hardening/03_network-hardening/3. Activity - Analysis of network hardening.html 1.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/004 Register New Users.html 1.3 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/60 - Day 60 - Advanced - Make POST Requests with Flask and HTML Forms/002 HTML Forms Revision - Creating a Form from Scratch.html 1.3 kB
  • Google Coursera/IT Automation with Python/3. Introduction to Git and GitHub/04_collaboration/01_pull-requests/06_git-fork-and-pull-request-cheat-sheet_instructions.html 1.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/001 Day 68 Goals - Login and Registering Users with Authentication.html 1.2 kB
  • Google Coursera/IT Automation with Python/5. Configuration Management and the Cloud/02_deploying-puppet/02_deploying-puppet-to-clients/04_more-information-about-deploying-puppet-to-clients_instructions.html 1.2 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/02_managing-files-with-python/01_reading-and-writing-files/05_reading-and-writing-files-cheat-sheet_instructions.html 1.2 kB
  • Google Coursera/IT Automation with Python/1. Crash Course on Python/06_final-project/02_final-project/04_programming-final-project-wordcloud_instructions.html 1.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/45 - Day 45 - Intermediate+ Web Scraping with Beautiful Soup/006 Starting-Code-100-movies-to-watch-start.zip 1.2 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/04_managing-data-and-processes/02_python-subprocesses/04_python-subprocesses-cheat-sheet_instructions.html 1.2 kB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/04_managing-resources/02_managing-our-time/05_more-about-making-the-best-use-of-our-time_instructions.html 1.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/39 - Day 39 - Intermediate+ Capstone Part 1 Flight Deal Finder/006 Step 5 - If Flight Price Lower than in Google Sheet send an SMS.html 1.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/006 birthday-wisher-extrahard-start.zip 1.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/31 - Day 31 - Intermediate - Flash Card App Capstone Project/002 Step 1 - Create the User Interface (UI) with Tkinter.html 1.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/external-links.txt 1.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/77 - Day 77 - Advanced - Linear Regression and Data Visualisation with Seaborn/009 Learning Points & Summary.html 1.2 kB
  • Google Coursera/IT Automation with Python/4. Troubleshooting and Debugging Techniques/02_slowness/02_slow-code/06_more-about-improving-our-code_instructions.html 1.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/23 - Day 23 - Intermediate - The Turtle Crossing Capstone Project/002 Choose Your Difficulty.html 1.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/002 Ticketing-Flow-Chart-Version-1-if-else-statements.url 1.2 kB
  • Google Coursera/Cybersecurity/8. Put It to Work - Prepare for Cybersecurity Jobs/4. Engage with the cybersecurity community/03_review-engage-with-the-cybersecurity-community/2. Glossary terms from week 4.html 1.2 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/01_getting-your-python-on/04_automating-tasks-through-programming/04_is-it-worth-the-time_instructions.html 1.2 kB
  • Google Coursera/IT Automation with Python/2. Using Python to Interact with the Operating System/03_regular-expressions/03_advanced-regular-expressions/05_advanced-regular-expressions-cheat-sheet_instructions.html 1.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/50 - Day 50 - Intermediate+ Auto Tinder Swiping Bot/005 Step 4 - Dismiss all requests.html 1.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/63 - Day 63 - Advanced - Databases and with SQLite and SQLAlchemy/004 What Happens When You Refresh the Server.html 1.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/80 - Day 80 - Advanced - Capstone Project - Predict House Prices/002 Solution & Learning Points.html 1.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/005 Downloading Files.html 1.2 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/external-links.txt 1.1 kB
  • Protocol Deep Dive/DNS - Deep Dive/Exercise Files/03/Mod3-AtClient-DHCP.pcapng.gz 1.1 kB
  • Cybrary/Cybrary - Become a SOC Analyst/Cybrary - Become a SOC Analyst - Level 3/6. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/ticket-473822.rtf 1.1 kB
  • Cybrary/Cybrary - Become an Incident Handler/10. MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training/Resources/ticket-473822.rtf 1.1 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/56 - Day 56 - Intermediate+ Rendering HTMLStatic files and Using Website Templates/005 Final Project - Name Card Website Template.html 1.1 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/50 - Day 50 - Intermediate+ Auto Tinder Swiping Bot/002 Step 1 - Setup your account on Tinder.html 1.1 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/external-links.txt 1.1 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/59 - Day 59 - Advanced - Blog Capstone Project Part 2 - Adding Styling/002 Step 1 - Download the starting project.html 1.1 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/external-links.txt 1.1 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/31 - Day 31 - Intermediate - Flash Card App Capstone Project/004 Step 2 - Create New Flash Cards.html 1.1 kB
  • Protocol Deep Dive/OSPF - Deep Dive/06 - Troubleshooting Common OSPF Issues/47 - Troubleshooting Common OSPF Issues - Finale - Ral2.en.srt 1.0 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/51 - Day 51 - Intermediate+ Internet Speed Twitter Complaint Bot/004 Step 3 - Get Internet Speeds.html 1.0 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/008 Solution-cookie-clicker-end.zip 1.0 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/012 Passing Authentication Status to Templates.html 1.0 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/71 - Day 71 - Advanced - Data Exploration with Pandas College Major v.s. Your Salary/008 Solution Degrees with the Highest Potential.html 1.0 kB
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/17 - Day 17 - Intermediate - The Quiz Project & the Benefits of OOP/005 quiz-game-start.zip 995 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/46 - Day 46 - Intermediate+ Create a Spotify Playlist using the Musical Time Machine/004 Step 3 - Search Spotify for the Songs from Step 1.html 987 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/external-links.txt 977 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/60 - Day 60 - Advanced - Make POST Requests with Flask and HTML Forms/001 Day 60 goals - Make the Contact Form Work.html 975 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/66 - Day 66 - Advanced - Building Your Own API with RESTful Routing/001 Day 66 Goals Build Your Own REST API Service.html 971 Bytes
  • Protocol Deep Dive/OSPF - Deep Dive/06 - Troubleshooting Common OSPF Issues/48 - Summary.en.srt 965 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/external-links.txt 960 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/67 - Day 67 - Advanced - Blog Capstone Project Part 3 - RESTful Routing/003 Requirement 1 - Be Able to GET Blog Post Items.html 956 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/20 - Day 20 - Intermediate - Build the Snake Game Part 1 Animation & Coordinates/005 snake-game-part-1-final.zip 947 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/51 - Day 51 - Intermediate+ Internet Speed Twitter Complaint Bot/005 Solution-internet-speed-twitter-bot-end.zip 944 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/69 - Day 69 - Advanced - Blog Capstone Project Part 4 - Adding Users/003 Requirement 1 - Register New Users.html 943 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/59 - Day 59 - Advanced - Blog Capstone Project Part 2 - Adding Styling/008 Step 7 - Rendering Individual Posts.html 936 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/51 - Day 51 - Intermediate+ Internet Speed Twitter Complaint Bot/005 Step 4 - Building a Twitter Bot to Tweet at your Internet Provider.html 930 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/51 - Day 51 - Intermediate+ Internet Speed Twitter Complaint Bot/003 Step 2 - Create a Class.html 923 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/23 - Day 23 - Intermediate - The Turtle Crossing Capstone Project/002 turtle-crossing-start.zip 921 Bytes
  • Protocol Deep Dive/SNMP - Deep Dive/Exercise Files/02/demos/SNMPv2c_get_requests.cap 894 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/53 - Day 53 - Intermediate+ Web Scraping Capstone - Data Entry Job Automation/001 Zillow-Property-search.url 890 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/external-links.txt 886 Bytes
  • Protocol Deep Dive/OSPF - Deep Dive/06 - Troubleshooting Common OSPF Issues/40 - Module Introduction.en.srt 884 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/external-links.txt 865 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/12 - Day 12 - Beginner - Scope & Number Guessing Game/external-links.txt 863 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/011 NATO-alphabet-start.zip 860 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/52 - Day 52 - Intermediate+ Instagram Follower Bot/006 Solution-instagram-follower-end.zip 860 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/external-links.txt 857 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/007 Solution-rain-alert-end.zip 851 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/72 - Day 72 - Advanced - Data Visualisation with Matplotlib Programming Languages/004 Solution Analysis by Programming Language.html 851 Bytes
  • Protocol Deep Dive/IPsec - Deep Dive/Exercise Files/03/demos/Globo_Site1 849 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/007 Solution-issoverhead-end.zip 846 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/75 - Day 75 - Advanced - Beautiful Plotly Charts & Analysing the Android App Store/009 Learning Points & Summary.html 839 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/69 - Day 69 - Advanced - Blog Capstone Project Part 4 - Adding Users/002 Download the Starting Project.html 836 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/003 Download the Starting Project.html 832 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/50 - Day 50 - Intermediate+ Auto Tinder Swiping Bot/006 Solution-auto-tinder-swiper-end.zip 831 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/46 - Day 46 - Intermediate+ Create a Spotify Playlist using the Musical Time Machine/002 Step 1 - Scraping the Billboard Hot 100.html 827 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/66 - Day 66 - Advanced - Building Your Own API with RESTful Routing/005 HTTP GET - All the Cafes.html 818 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/012 Solution-NATO-alphabet-end.zip 815 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/58 - Day 58 - Web Foundation Bootstrap/001 Day 58 Goals What You'll Learn By the End of Today.html 812 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/51 - Day 51 - Intermediate+ Internet Speed Twitter Complaint Bot/002 Step 1 - Setup Your Twitter Account.html 811 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/23 - Day 23 - Intermediate - The Turtle Crossing Capstone Project/004 Step 1 - Check out how the game play works.html 802 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/46 - Day 46 - Intermediate+ Create a Spotify Playlist using the Musical Time Machine/005 Step 4 - Creating and Adding to Spotify Playlist.html 802 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/76 - Day 76 - Advanced - Computation with NumPy and N-Dimensional Arrays/006 Learning Points & Summary.html 796 Bytes
  • Protocol Deep Dive/IPsec - Deep Dive/Exercise Files/03/demos/Globo_HQ 796 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/67 - Day 67 - Advanced - Blog Capstone Project Part 3 - RESTful Routing/006 Requirement 4- Be Able DELETE Blog Posts.html 790 Bytes
  • Protocol Deep Dive/QUIC - Deep Dive/Exercise Files/03/demos/Lab2-keys.log 783 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/67 - Day 67 - Advanced - Blog Capstone Project Part 3 - RESTful Routing/002 Download the Starting Project.html 739 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/external-links.txt 729 Bytes
  • Protocol Deep Dive/IPsec - Deep Dive/Exercise Files/06/demos/Globo_Site1_IKEv2 722 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/007 issoverhead-start.zip 720 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/37 - Day 37 - Intermediate+ Habit Tracking Project API Post Requests & Headers/006 Solution-habit-tracking-end.zip 713 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/63 - Day 63 - Advanced - Databases and with SQLite and SQLAlchemy/001 Day 63 Goals Creating a Virtual Bookshelf.html 712 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/19 - Day 19 - Intermediate - Instances, State and Higher Order Functions/006 Solution-turtle-race-final.zip 707 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/55 - Day 55 - Intermediate+ HTML & URL Parsing in Flask and the Higher Lower Game/005 Solution-Completed-Code-for-day-55-end.zip 707 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/60 - Day 60 - Advanced - Make POST Requests with Flask and HTML Forms/006 Sending Email with smtplib.html 684 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/66 - Day 66 - Advanced - Building Your Own API with RESTful Routing/003 Download the Starting Project.html 674 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/external-links.txt 673 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/45 - Day 45 - Intermediate+ Web Scraping with Beautiful Soup/002 bs4-start.zip 668 Bytes
  • Protocol Deep Dive/IPsec - Deep Dive/Exercise Files/06/demos/Globo_HQ_IKEv2 658 Bytes
  • Protocol Deep Dive/IPsec - Deep Dive/Exercise Files/02/demos/Mod 2 Demo Files/Internet Router 650 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/external-links.txt 643 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/external-links.txt 641 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/29 - Day 29 - Intermediate - Building a Password Manager GUI App with Tkinter/external-links.txt 632 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/52 - Day 52 - Intermediate+ Instagram Follower Bot/003 Step 2 - Create a Class.html 619 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/31 - Day 31 - Intermediate - Flash Card App Capstone Project/external-links.txt 606 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/11 - Day 11 - Beginner - The Blackjack Capstone Project/external-links.txt 598 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/external-links.txt 584 Bytes
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/07/demos/demo/tftp_put_v6.pcapng 568 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/52 - Day 52 - Intermediate+ Instagram Follower Bot/002 Step 1 - Get Your Instagram Credentials.html 565 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/69 - Day 69 - Advanced - Blog Capstone Project Part 4 - Adding Users/001 Day 69 Goals - Adding Users to Our Blog Project.html 537 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/27 - Day 27 - Intermediate - Tkinter, args, kwargs and Creating GUI Programs/external-links.txt 534 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/external-links.txt 526 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/40 - Day 40 - Intermediate+ Capstone Part 2 Flight Club/003 Step 2 - Download the Starting Project.html 526 Bytes
  • Protocol Deep Dive/IPsec - Deep Dive/Exercise Files/05/demos/Module 5/Globo_HQ Aggressive Mode 521 Bytes
  • Protocol Deep Dive/IPsec - Deep Dive/Exercise Files/05/demos/Module 5/Globo_Site1 Aggressive Mode 521 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/65 - Day 65 - Web Design School - How to Create a Website that People will Love/external-links.txt 518 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/51 - Day 51 - Intermediate+ Internet Speed Twitter Complaint Bot/external-links.txt 516 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/59 - Day 59 - Advanced - Blog Capstone Project Part 2 - Adding Styling/003 Step 2 - Get the home page to work.html 511 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/29 - Day 29 - Intermediate - Building a Password Manager GUI App with Tkinter/007 Day-5-Password-Generator-Project-Code.zip 502 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/55 - Day 55 - Intermediate+ HTML & URL Parsing in Flask and the Higher Lower Game/external-links.txt 501 Bytes
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/06/demos/demo/tftp_put.pcapng 488 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/62 - Day 62 - Advanced - Flask, WTForms, Bootstrap and CSV - Coffee & Wifi Project/001 Download the Starting Project.html 478 Bytes
  • Protocol Deep Dive/IPsec - Deep Dive/Exercise Files/05/demos/Module 5/Globo_Site1 Main Mode 476 Bytes
  • Protocol Deep Dive/IPsec - Deep Dive/Exercise Files/07/demos/Globo_INTERNET_IPv6 BASE 474 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/45 - Day 45 - Intermediate+ Web Scraping with Beautiful Soup/external-links.txt 468 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/52 - Day 52 - Intermediate+ Instagram Follower Bot/004 Step 3 - Login to Instagram.html 466 Bytes
  • Protocol Deep Dive/ICMP - Deep Dive/Exercise Files/06/demos/v6-nsna.pcapng 464 Bytes
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/07/demos/demo/tftp_get_v6.pcapng 456 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/external-links.txt 454 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/24 - Day 24 - Intermediate - Files, Directories and Paths/external-links.txt 452 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/56 - Day 56 - Intermediate+ Rendering HTMLStatic files and Using Website Templates/external-links.txt 444 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced - My Top 10 Movies Website/005 Requirement 3 - Be Able to Delete Movies from the Database.html 437 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced -My Top 10 Movies Website/005 Requirement 3 - Be Able to Delete Movies from the Database.html 437 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/21 - Day 21 - Intermediate - Build the Snake Game Part 2 Inheritance & List Slicing/external-links.txt 419 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/14 - Day 14 - Beginner - Higher Lower Game Project/external-links.txt 418 Bytes
  • Protocol Deep Dive/IPsec - Deep Dive/Exercise Files/05/demos/Module 5/Globo_HQ Main Mode 412 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/67 - Day 67 - Advanced - Blog Capstone Project Part 3 - RESTful Routing/001 Day 67 Goals Building a RESTful Blog with Editing!.html 408 Bytes
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/06/demos/demo/tftp_get.pcapng 408 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/17 - Day 17 - Intermediate - The Quiz Project & the Benefits of OOP/external-links.txt 402 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/36 - Day 36 - Intermediate+ Stock Trading News Alert Project/002 Choose Your Destiny!.html 396 Bytes
  • Protocol Deep Dive/IPsec - Deep Dive/Exercise Files/07/demos/Globo_Site1_IPv6 to IPv6 384 Bytes
  • Protocol Deep Dive/IPsec - Deep Dive/Exercise Files/07/demos/Globo_HQ_IPv6 to IPv6 379 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/41 - Day 41 - Web Foundation - Introduction to HTML/external-links.txt 378 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/19 - Day 19 - Intermediate - Instances, State and Higher Order Functions/003 Solution-etch-a-sketch-final.zip 376 Bytes
  • Protocol Deep Dive/ICMP - Deep Dive/Exercise Files/07/demos/v6-tool-admin-unr80.pcapng 376 Bytes
  • Protocol Deep Dive/IPsec - Deep Dive/Exercise Files/07/demos/Globo_HQ_IPv6 Over IPv4 373 Bytes
  • Protocol Deep Dive/IPsec - Deep Dive/Exercise Files/07/demos/Globo_Site1_IPv6 Over IPv4 373 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/52 - Day 52 - Intermediate+ Instagram Follower Bot/external-links.txt 364 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/37 - Day 37 - Intermediate+ Habit Tracking Project API Post Requests & Headers/external-links.txt 361 Bytes
  • Protocol Deep Dive/ICMP - Deep Dive/Exercise Files/06/demos/v6-rsra.pcapng 360 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/38 - Day 38 - Intermediate+ Workout Tracking Using Google Sheets/external-links.txt 359 Bytes
  • Protocol Deep Dive/IPsec - Deep Dive/Exercise Files/02/demos/Mod 2 Demo Files/Globo_Site1 Router 356 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/28 - Day 28 - Intermediate - Tkinter, Dynamic Typing and the Pomodoro GUI Application/external-links.txt 353 Bytes
  • Protocol Deep Dive/IPsec - Deep Dive/Exercise Files/02/demos/Mod 2 Demo Files/Globo_HQ Router 350 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/50 - Day 50 - Intermediate+ Auto Tinder Swiping Bot/external-links.txt 337 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/55 - Day 55 - Intermediate+ HTML & URL Parsing in Flask and the Higher Lower Game/006 [Interactive Coding Exercise] Advanced Decorators.html 311 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/007 [Interactive Coding Exercise] Create Your Own Python Decorator.html 309 Bytes
  • Protocol Deep Dive/IPsec - Deep Dive/Exercise Files/07/demos/Globo_HQ_IPv6 BASE 306 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced - My Top 10 Movies Website/002 Download the Starting Project.html 303 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced -My Top 10 Movies Website/002 Download the Starting Project.html 303 Bytes
  • Protocol Deep Dive/ICMP - Deep Dive/Exercise Files/05/demos/admin-unr80.pcapng 300 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/007 Type-Hints-demo-Day-34-end.zip 297 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/63 - Day 63 - Advanced - Databases and with SQLite and SQLAlchemy/002 Download the Starting Project.html 286 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/44 - Day 44 - Web Foundation - Intermediate CSS/external-links.txt 281 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/36 - Day 36 - Intermediate+ Stock Trading News Alert Project/external-links.txt 280 Bytes
  • Protocol Deep Dive/IPsec - Deep Dive/Exercise Files/07/demos/Globo_Site1_IPv6 BASE 279 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/006 Completed-Code-for-day-54-end.zip 270 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/19 - Day 19 - Intermediate - Instances, State and Higher Order Functions/external-links.txt 263 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/002 day-57-start.zip 263 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/19 - Day 19 - Intermediate - Instances, State and Higher Order Functions/003 etch-a-sketch-start.zip 260 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/011 Treasure-Island-Flowchart-website-.url 249 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/004 Ticketing-Flow-Chart-Version-3-if-elif-else-statements.url 234 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/007 Ticketing-Flow-Chart-Version-4-Multiple-if-statements.url 234 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/004 Ticketing-Flow-Chart-Version-2-nested-if-else-statements.url 221 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/19 - Day 19 - Intermediate - Instances, State and Higher Order Functions/005 turtle-race-start.zip 197 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/006 How-to-Get-TKinter-Canvas-Text-to-Wrap.url 197 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/52 - Day 52 - Intermediate+ Instagram Follower Bot/001 Follow-your-competitors-followers-to-grow-your-instagram-account.url 196 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/20 - Day 20 - Intermediate - Build the Snake Game Part 1 Animation & Coordinates/external-links.txt 178 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/009 How-to-Disable-Tkinter-Buttons.url 176 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/003 Reeborgs-World-Hurdles-Challenge.url 175 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/005 Reeborgs-World-Hurdles-2-Challenge.url 175 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/006 Reeborgs-World-Hurdles-3-Challenge.url 175 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/007 Reeborgs-World-Hurdles-4-Challenge.url 175 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/002 Reeborgs-World-Start.url 168 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/008 Reeborgs-World-Maze-Challenge.url 167 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/49 - Day 49 - Intermediate+ Automating Job Applications on LinkedIn/external-links.txt 151 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/40 - Day 40 - Intermediate+ Capstone Part 2 Flight Club/external-links.txt 148 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/51 - Day 51 - Intermediate+ Internet Speed Twitter Complaint Bot/001 Comcast-Twitter-Bot.url 145 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/002 weather-data.csv 144 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/53 - Day 53 - Intermediate+ Web Scraping Capstone - Data Entry Job Automation/001 Automated-Job-Story.url 144 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/002 For-the-Curious-Random-vs-Pseudorandom-Numbers.url 140 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/016 Course-Fixes-Report-an-Issue.url 137 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/006 Steve-Jobs-on-Object-Oriented-Programming.url 128 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/50 - Day 50 - Intermediate+ Auto Tinder Swiping Bot/001 NY-Times-Tinder-Article.url 128 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/45 - Day 45 - Intermediate+ Web Scraping with Beautiful Soup/006 Empires-Top-100-Movies-of-All-Time-from-Web-Archive-.url 126 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/006 My-Web-Dev-Course.url 125 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/62 - Day 62 - Advanced - Flask, WTForms, Bootstrap and CSV - Coffee & Wifi Project/002 Look at the Desired Final Product.html 125 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/006 PyCharm-Keyboard-Shortcuts.url 124 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/004 Central-Park-Squirrel-Census-Data.url 123 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/002 AskPythons-Documentation-on-Random.url 119 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/005 Documentation-on-random.choice-.url 119 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/44 - Day 44 - Web Foundation - Intermediate CSS/003 Pesticide.url 119 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/003 Windows-Command-Prompt-Cheat-Sheet.url 117 Bytes
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/07/demos/demo/ftps_pas_get.lftp 116 Bytes
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/07/demos/demo/ftps_pas_put.lftp 116 Bytes
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/07/demos/demo/ftps_act_get.lftp 115 Bytes
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/07/demos/demo/ftps_act_put.lftp 115 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/53 - Day 53 - Intermediate+ Web Scraping Capstone - Data Entry Job Automation/001 Automating-Your-Job-Reddit.url 114 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/002 How-to-Convert-Strings-to-Title-Case.url 113 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/003 FAQ-I-Cant-Open-the-Course-Resource-Links.url 111 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/009 FAQ-How-to-Get-2-Decimal-Places-.url 111 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/002 FAQ-I-Cant-Access-Reborgs-World.url 111 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/38 - Day 38 - Intermediate+ Workout Tracking Using Google Sheets/003 Nutritionix-API-Documentation.url 111 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/003 JSON-Viewer-Extension.url 110 Bytes
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/04/demos/demo/ftps_pas_get.lftp 110 Bytes
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/04/demos/demo/ftps_pas_put.lftp 110 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/004 Python-Built-In-Attributes-e.g.name-.url 109 Bytes
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/04/demos/demo/ftps_act_get.lftp 109 Bytes
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/04/demos/demo/ftps_act_put.lftp 109 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/006 How-to-bring-up-the-Emoji-Keyboard-on-Windows-10.url 108 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/004 StackOverflow-Answer-on-Unescaping-HTML-Entities-in-Python.url 105 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/51 - Day 51 - Intermediate+ Internet Speed Twitter Complaint Bot/001 Huffington-Post-Comcast-Call-from-Hell.url 105 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/20 - Day 20 - Intermediate - Build the Snake Game Part 1 Animation & Coordinates/003 The-tracer-method.url 102 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/24 - Day 24 - Intermediate - Files, Directories and Paths/003 The-open-method.url 101 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/12 - Day 12 - Beginner - Scope & Number Guessing Game/005 Get-your-own-ASCII-Text-from-Patorjk.url 100 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/003 Study-With-Me-Video.url 99 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/41 - Day 41 - Web Foundation - Introduction to HTML/005 MDN-Docs-Headings.url 98 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/56 - Day 56 - Intermediate+ Rendering HTMLStatic files and Using Website Templates/002 Flask-Docs-Rendering-Templates.url 98 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/002 Rendering-Templates-in-Flask.url 98 Bytes
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/07/demos/demo/sftp_get.lftp 98 Bytes
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/07/demos/demo/sftp_put.lftp 98 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/006 Day-15-Goal-Press-Play-button-bottom-right-.url 97 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/005 Convert-a-String-to-a-List.url 96 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/003 Challenge-1-Target-Behaviour.url 96 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/005 Challenge-2-Target-Behaviour.url 96 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/007 Challenge-3-Target-Behaviour.url 96 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/009 Challenge-4-Target-Behaviour.url 96 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/011 Challenge-5-Target-Behaviour.url 96 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/006 For-the-Curious-The-Dirty-Dozen.url 95 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/004 OpenWeatherMap-Condition-IDs-and-Condition-Codes.url 95 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/004 Python-Slice-Operator-with-Square-Brackets.url 95 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/28 - Day 28 - Intermediate - Tkinter, Dynamic Typing and the Pomodoro GUI Application/005 Python-as-a-Strongly-and-Dynamically-Typed-Programming-Language.url 93 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/31 - Day 31 - Intermediate - Flash Card App Capstone Project/001 2018-Frequency-Lists-from-Hermit-Dave.url 93 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/55 - Day 55 - Intermediate+ HTML & URL Parsing in Flask and the Higher Lower Game/002 Flask-Docs-Variable-Rules.url 93 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/008 Step-2-Join-Our-Coding-Room-Course.url 92 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/010 Join-Our-Coding-Rooms.url 92 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/012 Join-Our-Coding-Rooms.url 92 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/55 - Day 55 - Intermediate+ HTML & URL Parsing in Flask and the Higher Lower Game/004 SOLUTION.url 92 Bytes
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/05/demos/demo/sftp_get.lftp 92 Bytes
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/05/demos/demo/sftp_put.lftp 92 Bytes
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/05/demos/demo/sftp_sec.lftp 92 Bytes
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/06/demos/demo/tftp_sec.sh 92 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/010 Exercise-2-Debugging-Practice.url 90 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/012 Exercise-3-Input-Functions.url 90 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/014 Exercise-4-Variables.url 90 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/004 Exercise-1-Data-Types.url 90 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/006 Exercise-2-BMI-Calculator.url 90 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/008 Exercise-3-Life-in-Weeks.url 90 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/003 Exercise-1-Odd-or-Even.url 90 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/005 Exercise-2-BMI-Calculator-2.0.url 90 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/006 Exercise-3-Leap-Year.url 90 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/008 Coding-Exercise-3.4-Pizza-Order-START-HERE.url 90 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/010 Coding-Exercise-3.5-Love-Calculator-START-HERE.url 90 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/003 Exercise-4.1-Heads-or-Tails-START-HERE.url 90 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/005 Exercise-4.2-Whos-Paying-START-HERE.url 90 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/007 Exercise-4.3-Treasure-Map-START-HERE.url 90 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/003 Exercise-5.1-Average-Height-START-HERE.url 90 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/004 Exercise-5.2-High-Score-START-HERE.url 90 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/006 Exercise-5.3-Adding-Even-Numbers-START-HERE.url 90 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/007 Exercise-5.4-FizzBuzz-START-HERE.url 90 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/004 Exercise-1-Paint-Area-Calculator.url 90 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/005 Exercise-2-Prime-Numbers.url 90 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/003 Exercise-1-Grading-Program.url 90 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/005 Exercise-2-Dictionary-in-List.url 90 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/004 Exercise-1-Days-in-Month.url 90 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/008 Exercise-1-Debugging-Odd-or-Even.url 90 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/009 Exercise-2-Debugging-Leap-Year.url 90 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/010 Exercise-3-Debugging-FizzBuzz.url 90 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/003 Exercise-1-Squaring-Numbers.url 90 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/004 Exercise-2-Filtering-Even-Numbers.url 90 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/005 Exercise-3-Data-Overlap.url 90 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/008 Exercise-4-Dictionary-Comprehension-1.url 90 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/009 Exercise-5-Dictionary-Comprehension-2.url 90 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/004 Exercise-1-IndexError-Handling.url 90 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/005 Exercise-2-KeyError-Handling.url 90 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/006 How-the-Enigma-Machine-Works.url 90 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/006 The-Flaw-in-the-Enigma-Machine.url 90 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/004 PrettyTable-Package-Documentation.url 89 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/19 - Day 19 - Intermediate - Instances, State and Higher Order Functions/005 Turtle.textinput-documentation.url 88 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/002 Application-Programming-Interface-Wikipedia-Entry.url 87 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/007 Most-Common-Passwords.url 87 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/55 - Day 55 - Intermediate+ HTML & URL Parsing in Flask and the Higher Lower Game/002 Flask-Docs-Routing.url 86 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/55 - Day 55 - Intermediate+ HTML & URL Parsing in Flask and the Higher Lower Game/005 Advanced-Python-Decorators-Repl.it-Code.url 86 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/004 Flask-Docs-Routing.url 86 Bytes
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/07/demos/demo/ftp_pas_get.lftp 86 Bytes
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/07/demos/demo/ftp_pas_put.lftp 86 Bytes
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/07/demos/demo/ftp_pas_sec.lftp 86 Bytes
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/07/demos/demo/ftp_act_get.lftp 85 Bytes
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/07/demos/demo/ftp_act_put.lftp 85 Bytes
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/07/demos/demo/ftp_act_sec.lftp 85 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/016 Band-Name-Generator-Starting-Code-replit.com-.url 84 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/006 How-to-bring-up-the-Emoji-Keyboard-on-Mac.url 84 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/41 - Day 41 - Web Foundation - Introduction to HTML/005 Unzip-on-Mac.url 84 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/44 - Day 44 - Web Foundation - Intermediate CSS/001 Named-Colours.url 84 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/65 - Day 65 - Web Design School - How to Create a Website that People will Love/001 Penny-Juice-Rebranded.url 84 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/11 - Day 11 - Beginner - The Blackjack Capstone Project/004 Python-list-methods.url 83 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/19 - Day 19 - Intermediate - Instances, State and Higher Order Functions/002 The-listen-method.url 83 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/006 How-to-Get-Twilio-to-Work-on-PythonAnywhere-Free-Accounts.url 83 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/001 Day-4-Goal-Click-Run-to-see-the-final-project.url 82 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/001 Day-8-Goal-Click-Run-to-see-the-final-project.url 82 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/001 Day-9-Goal-Click-Run-to-see-the-final-project.url 82 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/006 Press-Run-to-see-the-final-project.url 82 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/12 - Day 12 - Beginner - Scope & Number Guessing Game/005 Starting-Repl-for-the-Number-Guessing-Game.url 82 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/12 - Day 12 - Beginner - Scope & Number Guessing Game/006 Solution-Guess-the-Number-Completed-Code.url 82 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/21 - Day 21 - Intermediate - Build the Snake Game Part 2 Inheritance & List Slicing/003 The-shape-and-shapesize-methods.url 82 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/21 - Day 21 - Intermediate - Build the Snake Game Part 2 Inheritance & List Slicing/004 The-write-method.url 82 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/44 - Day 44 - Web Foundation - Intermediate CSS/001 RGB-Colour-Mixer.url 82 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/45 - Day 45 - Intermediate+ Web Scraping with Beautiful Soup/004 SOLUTION.url 82 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/001 Day-5-Goal-Click-Run-to-see-the-final-project.url 81 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/003 Hint-Python-List-Documentation.url 81 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/12 - Day 12 - Beginner - Scope & Number Guessing Game/005 Day-12-Goal-Click-Run-to-see-the-final-project.url 81 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/27 - Day 27 - Intermediate - Tkinter, args, kwargs and Creating GUI Programs/003 Python-Docs-The-Packer.url 81 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/31 - Day 31 - Intermediate - Flash Card App Capstone Project/001 Wiktionary-Frequency-Lists.url 81 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/001 What-is-the-ISS-.url 81 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/011 Treasure-Island-Starting-Code-replit.com-.url 80 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/011 Hint-Importing-Modules.url 80 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/29 - Day 29 - Intermediate - Building a Password Manager GUI App with Tkinter/003 Tkinter-Grid-columnspan-Demo-Repl.url 80 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/005 101-Monday-Motivational-Quotes-from-the-Positivity-Blog.url 80 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/003 ISS-Current-Location-API-Documentation.url 80 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/41 - Day 41 - Web Foundation - Introduction to HTML/005 Unzip-in-Windows.url 80 Bytes
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/03/demos/demo/ftp_pas_get.lftp 80 Bytes
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/03/demos/demo/ftp_pas_put.lftp 80 Bytes
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/03/demos/demo/ftp_pas_sec.lftp 80 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/009 Tip-Calculator-Start-replit.com-.url 79 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/002 For-Loop-Practice-Completed-Code.url 79 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/24 - Day 24 - Intermediate - Files, Directories and Paths/006 Hint-1.url 79 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/24 - Day 24 - Intermediate - Files, Directories and Paths/006 Hint-2.url 79 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/31 - Day 31 - Intermediate - Flash Card App Capstone Project/001 Google-Translate-for-Google-Sheets.url 79 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/31 - Day 31 - Intermediate - Flash Card App Capstone Project/001 Google-Translate-Language-Codes.url 79 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/49 - Day 49 - Intermediate+ Automating Job Applications on LinkedIn/001 LinkedIn-Jobs.url 79 Bytes
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/02/demos/demo/ftp_act_get.lftp 79 Bytes
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/02/demos/demo/ftp_act_put.lftp 79 Bytes
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/02/demos/demo/ftp_act_sec.lftp 79 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/004 Press-Run-to-see-the-final-project.url 78 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/001 Day-3-Goal-Click-Run-to-see-the-final-project.url 78 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/004 Things-that-lists-can-do-in-Python.url 78 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/001 Day-7-Goal-Click-Run-to-see-the-final-project.url 78 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/29 - Day 29 - Intermediate - Building a Password Manager GUI App with Tkinter/005 w3schools-Python-Writing-to-File-Documentation.url 78 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/45 - Day 45 - Intermediate+ Web Scraping with Beautiful Soup/002 Beautiful-Soup-Documentation.url 78 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/002 Flask-Quick-Start-Documentation.url 78 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/005 Visualising-Nested-Function-Return-on-PythonTutor.url 78 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/002 Jinja-Documentation.url 78 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/001 Press-Run-to-see-the-final-project.url 77 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/009 Floating-Point-Arithmetic.url 77 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/008 Rock-Paper-Scissors-Starter-Code.url 77 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/007 Debugging-Solution.url 77 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/14 - Day 14 - Beginner - Higher Lower Game Project/001 Day-14-Goal-Click-Run-to-see-the-final-project.url 77 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/24 - Day 24 - Intermediate - Files, Directories and Paths/006 Hint-3.url 77 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/006 w3schools-Python-split-method-Documentation.url 77 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/003 Mac-Linux-Terminal-Cheat-Sheet.url 77 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/005 Python-Decorators-Repl.it-Code.url 77 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/006 Interactive-Coding-Exercise-Day-54.1-Decorators.url 77 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/008 Password-Generator-Start.url 76 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/005 Hint-Python-Lists-and-Range-.url 76 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/006 Starting-Code-for-the-Calculator-on-Repl.it.url 76 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/11 - Day 11 - Beginner - The Blackjack Capstone Project/004 Python-sum-Function.url 76 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/006 OOP-Coffee-Machine-Project-Starting-Code.url 76 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/007 OOP-Coffee-Machine-Project-Final-Code.url 76 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/29 - Day 29 - Intermediate - Building a Password Manager GUI App with Tkinter/007 w3schools-Python-join-method-Documentation.url 76 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/004 Latitude-and-Longitude-to-Address-Tool.url 76 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/37 - Day 37 - Intermediate+ Habit Tracking Project API Post Requests & Headers/005 w3schools-Python-Date-Formatting-with-strftime.url 76 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/51 - Day 51 - Intermediate+ Internet Speed Twitter Complaint Bot/001 Time-Does-Tweeting-at-Companies-Really-Work-.url 76 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/016 Solution-Band-Name-Generator-Ending-Code.url 75 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/008 Solution-Rock-Paper-Scissors-Completed-Code.url 75 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/006 Python-List-index-Method.url 75 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/007 Solution-Secret-Auction-Completed-Code.url 75 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/001 Day-10-Goal-Click-Run-to-see-the-final-project.url 75 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/12 - Day 12 - Beginner - Scope & Number Guessing Game/006 Using-Python-Tutor-to-Step-Through-your-Code.url 75 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/006 Debug-your-code-online-with-Python-Tutor.url 75 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/002 Pandas-API-Reference.url 75 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/004 Python-Slice-Function.url 75 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/53 - Day 53 - Intermediate+ Web Scraping Capstone - Data Entry Job Automation/001 Data-Entry-Jobs-on-Indeed.url 75 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/008 Solution-Password-Generator-Completed-Code.url 74 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/11 - Day 11 - Beginner - The Blackjack Capstone Project/001 Day-11-Goal-Click-Run-to-see-the-final-project.url 74 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/17 - Day 17 - Intermediate - The Quiz Project & the Benefits of OOP/001 Day-17-Goal-Click-Run-to-see-the-final-project.url 74 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/007 Environment-Variables-Wikipedia-Entry.url 74 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/013 Variables-Starting-Repl.url 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/003 Challenge-1-Starting-Code.url 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/005 Challenge-2-Starting-Code.url 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/007 Challenge-3-Starting-Code.url 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/009 Challenge-4-Starting-Code.url 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/011 Challenge-5-Starting-Code.url 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/006 Caesar-Cipher-1-Start.url 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/007 Caesar-Cipher-2-Start.url 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/008 Caesar-Cipher-3-Start.url 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/009 Caesar-Cipher-4-Start.url 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/11 - Day 11 - Beginner - The Blackjack Capstone Project/001 Try-out-an-online-Blackjack-game.url 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/007 Search-Stack-Overflow-for-Errors.url 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/22 - Day 22 - Intermediate - Build Pong The Famous Arcade Game/external-links.txt 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/23 - Day 23 - Intermediate - The Turtle Crossing Capstone Project/external-links.txt 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/005 Twilio-SMS-Quickstart-Documentation-for-Python.url 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/39 - Day 39 - Intermediate+ Capstone Part 1 Flight Deal Finder/external-links.txt 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/46 - Day 46 - Intermediate+ Create a Spotify Playlist using the Musical Time Machine/external-links.txt 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/47 - Day 47 - Intermediate+ Create an Automated Amazon Price Tracker/external-links.txt 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/59 - Day 59 - Advanced - Blog Capstone Project Part 2 - Adding Styling/external-links.txt 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/60 - Day 60 - Advanced - Make POST Requests with Flask and HTML Forms/external-links.txt 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/61 - Day 61 - Advanced - Building Advanced Forms with Flask-WTForms/external-links.txt 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/62 - Day 62 - Advanced - Flask, WTForms, Bootstrap and CSV - Coffee & Wifi Project/external-links.txt 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/63 - Day 63 - Advanced - Databases and with SQLite and SQLAlchemy/external-links.txt 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced - My Top 10 Movies Website/external-links.txt 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced -My Top 10 Movies Website/external-links.txt 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/66 - Day 66 - Advanced - Building Your Own API with RESTful Routing/external-links.txt 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/67 - Day 67 - Advanced - Blog Capstone Project Part 3 - RESTful Routing/external-links.txt 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/69 - Day 69 - Advanced - Blog Capstone Project Part 4 - Adding Users/external-links.txt 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/70 - Day 70 - Advanced - Deploying Your Web Application with Heroku/external-links.txt 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/71 - Day 71 - Advanced - Data Exploration with Pandas College Major v.s. Your Salary/external-links.txt 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/72 - Day 72 - Advanced - Data Visualisation with Matplotlib Programming Languages/external-links.txt 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/73 - Day 73 - Advanced - Aggregate & Merge Data with Pandas Analyse the LEGO Dataset/external-links.txt 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/74 - Day 74 - Advanced - Google Trends Data Resampling and Visualising Time Series/external-links.txt 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/75 - Day 75 - Advanced - Beautiful Plotly Charts & Analysing the Android App Store/external-links.txt 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/76 - Day 76 - Advanced - Computation with NumPy and N-Dimensional Arrays/external-links.txt 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/77 - Day 77 - Advanced - Linear Regression and Data Visualisation with Seaborn/external-links.txt 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/78 - Day 78 - Advanced - Analysing the Nobel Prize with Plotly, Matplotlib & Seaborn/external-links.txt 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/79 - Day 79 - Advanced - The Tragic Discovery of Handwashing t-Tests & Distributions/external-links.txt 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/80 - Day 80 - Advanced - Capstone Project - Predict House Prices/external-links.txt 73 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/006 Fork-the-Day-1-Starting-Repl.url 72 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/002 Built-in-Python-Functions.url 72 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/12 - Day 12 - Beginner - Scope & Number Guessing Game/001 Fork-the-Day-12-Starting-Repl.url 72 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/006 Fork-the-Day-15-Starting-Repl.url 72 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/007 Day-15-Ending-Code.url 72 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/002 Fork-the-Day-25-Starting-Repl.url 72 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/004 Documentation-on-HTML-Entities.url 72 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/007 Password-Complexity-Checker.url 72 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/013 Variables-Ending-Repl.url 71 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/011 Solution-Treasure-Island-Ending-Code.url 71 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/004 List-Practice-Repl-US-States-Veg-.url 71 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/004 Challenge-1-Completed-Code.url 71 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/006 Challenge-2-Completed-Code.url 71 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/008 Challenge-3-Completed-Code.url 71 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/010 Challenge-4-Completed-Code.url 71 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/012 Challenge-5-Completed-Code.url 71 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/012 Final-Code.url 71 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/006 Caesar-Cipher-1-End.url 71 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/007 Caesar-Cipher-2-End.url 71 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/008 Caesar-Cipher-3-End.url 71 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/009 Caesar-Cipher-4-End.url 71 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/006 Secret-Auction-Starting-Code.url 71 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/008 RGB-Tool-from-W3Schools.url 71 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/011 Hirst-Painting-Project-Final-Code.url 71 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/27 - Day 27 - Intermediate - Tkinter, args, kwargs and Creating GUI Programs/008 Tkinter-Widget-Example-Code-Palette.url 71 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/004 Python-datetime-Documentation.url 71 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/36 - Day 36 - Intermediate+ Stock Trading News Alert Project/001 TSLA-Stock-Price.url 71 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/004 What-is-main-.url 71 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/004 npoint-example-blog-data.url 71 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/015 Day-1-Ending-Code.url 70 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/008 Tim-Urbans-Life-in-Weeks.url 70 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/009 Solution-Tip-Calculator-Ending-Code.url 70 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/002 For-the-Curious-The-Mersenne-Twister.url 70 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/002 Play-Hangman-with-Friends-Online.url 70 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/003 Completed-Example-Code-for-Day-10.url 70 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/14 - Day 14 - Beginner - Higher Lower Game Project/001 Fork-the-Day-14-Starting-Repl.url 70 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/14 - Day 14 - Beginner - Higher Lower Game Project/002 Day-14-Ending-Code.url 70 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/29 - Day 29 - Intermediate - Building a Password Manager GUI App with Tkinter/005 Entry-Widget-Docs-on-tkdocs.com.url 70 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/003 Completed-Day-30-Practice-Code.url 70 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/003 Python-smtplib-Documentation.url 70 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/005 Day-32-Ending-Code.url 70 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/003 or-just-use-Firefox-to-view-JSON-.url 70 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/004 FreeFormatter-HTML-Unescape-Tool.url 70 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/37 - Day 37 - Intermediate+ Habit Tracking Project API Post Requests & Headers/002 Requests-Module-Documentation.url 70 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/006 BMI-Explained.url 69 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/007 Multiple-if-statements-Ending-Code.url 69 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/009 Day-3-Ending-Code.url 69 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/003 Turtle-Graphics-Documentation.url 69 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/002 Turtle-Colours.url 69 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/002 Turtle-Graphics-Documentation.url 69 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/21 - Day 21 - Intermediate - Build the Snake Game Part 2 Inheritance & List Slicing/002 Inheritance-Repl.it-Example-Code.url 69 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/27 - Day 27 - Intermediate - Tkinter, args, kwargs and Creating GUI Programs/006 Playground.py-Completed-Code.url 69 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/002 Create-a-free-account-on-OpenWeatherMap.url 69 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/003 w3schools-XPath-Tutorial.url 69 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/006 Coding-Exercise-START-HERE.url 68 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/002 How-the-Hangman-Game-works.url 68 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/009 Solution-Calculator-Completed-Code.url 68 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/003 Turtle-Colours-cs111.wellesley.edu-.url 68 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/31 - Day 31 - Intermediate - Flash Card App Capstone Project/001 Open-Subtitles.url 68 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/006 For-the-Curious-How-Leap-Years-Work.url 67 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/11 - Day 11 - Beginner - The Blackjack Capstone Project/002 Fork-the-Day-11-Starting-Repl.url 67 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/11 - Day 11 - Beginner - The Blackjack Capstone Project/007 Blackjack-Completed-Code.url 67 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/002 Step-2-Download-Install-Pycharm.url 67 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/17 - Day 17 - Intermediate - The Quiz Project & the Benefits of OOP/005 Download-or-Fork-the-Quiz-Game-Starting-Code.url 67 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/17 - Day 17 - Intermediate - The Quiz Project & the Benefits of OOP/010 Quiz-Project-Final-Code.url 67 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/007 Python-JSON-Module-Documentation.url 67 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/004 Python-Requests-Module-Documentation.url 67 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/003 OpenWeatherMap-OneCall-Api-Documentation.url 67 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/002 Download-and-Install-Selenium-ChromeDriver.url 67 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/005 Primer-on-Prime-Numbers.url 66 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/003 Challenge-1-Draw-a-Square-Starting-Code.url 66 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/005 Challenge-2-Draw-a-Dashed-Line-Starting-Code.url 66 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/006 Challenge-3-Drawing-Different-Shapes-Starting-Code.url 66 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/007 Challenge-4-Generate-a-Random-Walk-Starting-Code.url 66 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/009 Challenge-5-Create-a-Spirograph-Starting-Code.url 66 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/006 Challenge-URL-Form-Sign-Up.url 66 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/65 - Day 65 - Web Design School - How to Create a Website that People will Love/002 Adobe-Color-Wheel.url 66 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/004 PEP-8-The-Python-Style-Guide.url 65 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/003 Python-PEP8-Style-Guide.url 65 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/007 What-is-a-Random-Walk-.url 65 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/28 - Day 28 - Intermediate - Tkinter, Dynamic Typing and the Pomodoro GUI Application/004 TCL-tk-Docs-after-.url 65 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/001 Addiction-Warning-The-Cookie-Clicker-Game.url 65 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/002 Download-and-Install-the-Chrome-Browser.url 65 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/007 The-Cookie-Clicker-Game.url 65 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/002 Fork-the-Day-10-Starting-Repl.url 64 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/12 - Day 12 - Beginner - Scope & Number Guessing Game/002 Fork-the-Day-12-Starting-Repl.url 64 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/001 Fork-the-Day-13-Starting-Repl.url 64 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/003 Solution-to-Challenge-1.url 64 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/005 Solution-to-Challenge-2.url 64 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/006 Solution-to-Challenge-3.url 64 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/007 Solution-to-Challenge-4.url 64 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/009 Solution-to-Challenge-5-Day-18-Ending-Code-.url 64 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/27 - Day 27 - Intermediate - Tkinter, args, kwargs and Creating GUI Programs/007 TCL-tk-Docs-Entry-.url 64 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/003 Link-to-Your-OpenWeatherMap-API-Key-req.login.url 64 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/38 - Day 38 - Intermediate+ Workout Tracking Using Google Sheets/002 Nutritionix-API.url 64 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/002 Fork-the-Day-2-Starting-Repl.url 63 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/002 Fork-the-Day-3-Starting-Repl.url 63 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/002 Fork-the-Day-4-Starting-Repl.url 63 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/002 Fork-the-Day-5-Starting-Repl.url 63 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/002 Fork-the-Day-6-Starting-Repl.url 63 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/002 Fork-the-Day-8-Starting-Repl.url 63 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/002 Fork-the-Day-9-Starting-Repl.url 63 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/27 - Day 27 - Intermediate - Tkinter, args, kwargs and Creating GUI Programs/003 TCL-tk-Docs-pack-.url 63 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/29 - Day 29 - Intermediate - Building a Password Manager GUI App with Tkinter/002 Canvas-Documentation-on-tkdocs.com.url 63 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/003 Selenium-Documentation.url 63 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/005 Wikipedia-Main-Page.url 63 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/50 - Day 50 - Intermediate+ Auto Tinder Swiping Bot/001 Machine-Learning-Generated-Profile-Pictures.url 63 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/12 - Day 12 - Beginner - Scope & Number Guessing Game/004 Day-12-Ending-Code.url 62 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/007 Day-13-Ending-Code.url 62 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/004 Pokemon-Pokedex.url 62 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/010 Colorgram-Package.url 62 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/24 - Day 24 - Intermediate - Files, Directories and Paths/005 Day-24-Ending-Code.url 62 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/004 Day-25-End-Code.url 62 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/005 Sporcles-Name-the-States-Game.url 62 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/010 Day-26-End-Code.url 62 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/27 - Day 27 - Intermediate - Tkinter, args, kwargs and Creating GUI Programs/009 Day-27-End-Code.url 62 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/31 - Day 31 - Intermediate - Flash Card App Capstone Project/001 Google-Sheets.url 62 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/006 Our-Actual-Newsletter.url 62 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/007 Day-5-Completed-Code.url 61 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/003 Day-8-Ending-Code.url 61 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/004 Day-9-Ending-Code.url 61 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/004 PrettyTable-Package.url 61 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/006 Add-a-Coffee-Emoji-from-Emojipedia.org.url 60 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/007 -have-i-been-pwned-.url 60 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/02 - Day 2 - Beginner - Understanding Data Types and How to Manipulate Strings/009 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/011 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/008 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/008 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/06 - Day 6 - Beginner - Python Functions & Karel/008 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/07 - Day 7 - Beginner - Hangman/012 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/08 - Day 8 - Beginner - Function Parameters & Caesar Cipher/009 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/007 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/10 - Day 10 - Beginner - Functions with Outputs/009 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/11 - Day 11 - Beginner - The Blackjack Capstone Project/007 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/12 - Day 12 - Beginner - Scope & Number Guessing Game/006 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/13 - Day 13 - Beginner - Debugging How to Find and Fix Errors in your Code/010 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/14 - Day 14 - Beginner - Higher Lower Game Project/002 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/007 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/007 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/17 - Day 17 - Intermediate - The Quiz Project & the Benefits of OOP/010 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/011 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/19 - Day 19 - Intermediate - Instances, State and Higher Order Functions/006 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/20 - Day 20 - Intermediate - Build the Snake Game Part 1 Animation & Coordinates/005 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/21 - Day 21 - Intermediate - Build the Snake Game Part 2 Inheritance & List Slicing/007 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/21 - Day 21 - Intermediate - Build the Snake Game Part 2 Inheritance & List Slicing/007 Piano-Keys-List-Slicing-Repl.it.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/22 - Day 22 - Intermediate - Build Pong The Famous Arcade Game/009 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/23 - Day 23 - Intermediate - The Turtle Crossing Capstone Project/010 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/24 - Day 24 - Intermediate - Files, Directories and Paths/007 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/007 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/26 - Day 26 - Intermediate - List Comprehension and the NATO Alphabet/012 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/27 - Day 27 - Intermediate - Tkinter, args, kwargs and Creating GUI Programs/010 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/28 - Day 28 - Intermediate - Tkinter, Dynamic Typing and the Pomodoro GUI Application/007 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/29 - Day 29 - Intermediate - Building a Password Manager GUI App with Tkinter/007 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/29 - Day 29 - Intermediate - Building a Password Manager GUI App with Tkinter/007 Pyperclip-documentation-on-PyPi.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/30 - Day 30 - Intermediate - Errors, Exceptions and JSON Data Improving the Password/009 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/31 - Day 31 - Intermediate - Flash Card App Capstone Project/009 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/008 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/007 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/009 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/007 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/36 - Day 36 - Intermediate+ Stock Trading News Alert Project/005 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/37 - Day 37 - Intermediate+ Habit Tracking Project API Post Requests & Headers/006 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/38 - Day 38 - Intermediate+ Workout Tracking Using Google Sheets/001 OpenAi-GPT-3.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/38 - Day 38 - Intermediate+ Workout Tracking Using Google Sheets/007 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/39 - Day 39 - Intermediate+ Capstone Part 1 Flight Deal Finder/006 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/40 - Day 40 - Intermediate+ Capstone Part 2 Flight Club/006 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/45 - Day 45 - Intermediate+ Web Scraping with Beautiful Soup/006 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/46 - Day 46 - Intermediate+ Create a Spotify Playlist using the Musical Time Machine/005 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/47 - Day 47 - Intermediate+ Create an Automated Amazon Price Tracker/003 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/008 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/49 - Day 49 - Intermediate+ Automating Job Applications on LinkedIn/005 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/50 - Day 50 - Intermediate+ Auto Tinder Swiping Bot/006 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/51 - Day 51 - Intermediate+ Internet Speed Twitter Complaint Bot/005 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/52 - Day 52 - Intermediate+ Instagram Follower Bot/006 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/53 - Day 53 - Intermediate+ Web Scraping Capstone - Data Entry Job Automation/003 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/007 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/55 - Day 55 - Intermediate+ HTML & URL Parsing in Flask and the Higher Lower Game/007 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/56 - Day 56 - Intermediate+ Rendering HTMLStatic files and Using Website Templates/006 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/006 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/59 - Day 59 - Advanced - Blog Capstone Project Part 2 - Adding Styling/008 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/60 - Day 60 - Advanced - Make POST Requests with Flask and HTML Forms/006 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/61 - Day 61 - Advanced - Building Advanced Forms with Flask-WTForms/009 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/62 - Day 62 - Advanced - Flask, WTForms, Bootstrap and CSV - Coffee & Wifi Project/003 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/63 - Day 63 - Advanced - Databases and with SQLite and SQLAlchemy/008 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced - My Top 10 Movies Website/007 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/64 - Day 64 - Advanced -My Top 10 Movies Website/007 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/65 - Day 65 - Web Design School - How to Create a Website that People will Love/006 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/66 - Day 66 - Advanced - Building Your Own API with RESTful Routing/012 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/67 - Day 67 - Advanced - Blog Capstone Project Part 3 - RESTful Routing/006 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/012 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/69 - Day 69 - Advanced - Blog Capstone Project Part 4 - Adding Users/007 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/70 - Day 70 - Advanced - Deploying Your Web Application with Heroku/007 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/71 - Day 71 - Advanced - Data Exploration with Pandas College Major v.s. Your Salary/010 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/72 - Day 72 - Advanced - Data Visualisation with Matplotlib Programming Languages/010 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/73 - Day 73 - Advanced - Aggregate & Merge Data with Pandas Analyse the LEGO Dataset/011 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/74 - Day 74 - Advanced - Google Trends Data Resampling and Visualising Time Series/009 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/75 - Day 75 - Advanced - Beautiful Plotly Charts & Analysing the Android App Store/009 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/76 - Day 76 - Advanced - Computation with NumPy and N-Dimensional Arrays/006 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/77 - Day 77 - Advanced - Linear Regression and Data Visualisation with Seaborn/009 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/78 - Day 78 - Advanced - Analysing the Nobel Prize with Plotly, Matplotlib & Seaborn/008 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/79 - Day 79 - Advanced - The Tragic Discovery of Handwashing t-Tests & Distributions/006 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/80 - Day 80 - Advanced - Capstone Project - Predict House Prices/002 Course-Fixes-Report-an-Issue.url 59 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/003 OpenWeatherMap-Current-Weather-API-Documentation.url 58 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/41 - Day 41 - Web Foundation - Introduction to HTML/001 Submarine-Cable-Map.url 58 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/15 - Day 15 - Intermediate - Local Development Environment Setup & the Coffee Machine/001 Step-1-Install-Python-3-on-your-Machine.url 57 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/005 Signup-for-Twilio.url 57 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/56 - Day 56 - Intermediate+ Rendering HTMLStatic files and Using Website Templates/002 My-CV-Website-Hosted-on-GitHub.url 57 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/14 - Day 14 - Beginner - Higher Lower Game Project/001 Try-out-the-Online-Higher-Lower-Game.url 55 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/25 - Day 25 - Intermediate - Working with CSV Data and the Pandas Library/002 Pandas-Documentation.url 55 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/32 - Day 32 - Intermediate+ Send Email (smtplib) & Manage Dates (datetime)/008 Host-your-Code-in-the-Cloud-with-pythonanywhere.url 55 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/006 PythonAnywhere.url 55 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/54 - Day 54 - Intermediate+ Introduction to Web Development with Flask/002 Flask-Package-on-PyPi.url 55 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/007 Plain-Text-Offenders.url 55 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/18 - Day 18 - Intermediate - Turtle & the Graphical User Interface (GUI)/002 Trinket-Turtle-Colours.url 54 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/006 Sunrise-and-Sunset-Times-API.url 54 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/003 Join-the-Student-Community-on-Discord.url 53 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/45 - Day 45 - Intermediate+ Web Scraping with Beautiful Soup/004 Y-Combinator-Hacker-News.url 53 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/53 - Day 53 - Intermediate+ Web Scraping Capstone - Data Entry Job Automation/001 Google-Forms.url 53 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/36 - Day 36 - Intermediate+ Stock Trading News Alert Project/002 Stock-Price-API.url 52 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/40 - Day 40 - Intermediate+ Capstone Part 2 Flight Club/001 Project-Inspiration-Jacks-Flight-Club.url 52 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/41 - Day 41 - Web Foundation - Introduction to HTML/007 Diff-Checker.url 52 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/002 Update-Your-Footer.url 52 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/008 Step-1-Sign-Up-to-Coding-Rooms-First-Register-for-Free-Student-Account.url 51 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/05 - Day 5 - Beginner - Python Loops/001 Have-I-been-pwned-.url 51 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/09 - Day 9 - Beginner - Dictionaries, Nesting and the Secret Auction/007 Step-Through-Execution-with-Python-Tutor.url 51 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/003 Online-JSON-Viewer.url 51 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/65 - Day 65 - Web Design School - How to Create a Website that People will Love/001 Penny-Juices-Website.url 51 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/51 - Day 51 - Intermediate+ Internet Speed Twitter Complaint Bot/001 Internet-Speed-Checker.url 50 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/52 - Day 52 - Intermediate+ Instagram Follower Bot/001 Instagram.url 50 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/006 Create-a-Replit-Account.url 49 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/004 HTTP-Status-Codes.url 49 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/004 Find-a-Place-thats-raining-using-Ventusky.url 49 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/003 Find-Your-Latitude-longitude.url 48 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/012 Step-Through-Execution-with-Python-Tutor.url 47 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/03 - Day 3 - Beginner - Control Flow and Logical Operators/011 Add-your-own-ASCII-art.url 47 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/007 Find-Your-Current-Latitude-and-Longitude-Tool.url 47 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/36 - Day 36 - Intermediate+ Stock Trading News Alert Project/002 Twilio-API.url 47 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/48 - Day 48 - Intermediate+ Selenium Webdriver Browser and Game Playing Bot/004 Python.org.url 47 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/65 - Day 65 - Web Design School - How to Create a Website that People will Love/006 Design-Challenges-on-Daily-UI.url 47 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/04 - Day 4 - Beginner - Randomisation and Python Lists/008 The-World-Rock-Paper-Scissors-Association.url 46 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/004 Create-your-own-bin-with-npoint.io.url 46 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/65 - Day 65 - Web Design School - How to Create a Website that People will Love/006 Build-a-design-using-canva.com.url 46 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/65 - Day 65 - Web Design School - How to Create a Website that People will Love/006 Page-inspirations-on-Collect-UI.url 46 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/28 - Day 28 - Intermediate - Tkinter, Dynamic Typing and the Pomodoro GUI Application/002 Use-Color-Hunt-to-Choose-a-Nice-Colour.url 45 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/37 - Day 37 - Intermediate+ Habit Tracking Project API Post Requests & Headers/002 Pixela-API-Documentation.url 45 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/56 - Day 56 - Intermediate+ Rendering HTMLStatic files and Using Website Templates/006 unsplash.com-beautiful-images.url 45 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/003 Genderize-API.url 45 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/65 - Day 65 - Web Design School - How to Create a Website that People will Love/002 Color-Hunt.url 45 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/17 - Day 17 - Intermediate - The Quiz Project & the Benefits of OOP/010 Open-Trivia-Database.url 44 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/34 - Day 34 - Intermediate+ API Practice - Creating a GUI Quiz App/001 The-Open-Trivia-Database.url 44 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/35 - Day 35 - Intermediate+ Keys, Authentication & Environment Variables Send SMS/007 Other-APIs-to-Explore.url 44 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/36 - Day 36 - Intermediate+ Stock Trading News Alert Project/002 News-API.url 44 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/56 - Day 56 - Intermediate+ Rendering HTMLStatic files and Using Website Templates/004 HTML5-UP-Website-Templates.url 44 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/56 - Day 56 - Intermediate+ Rendering HTMLStatic files and Using Website Templates/005 Check-out-html5up.nets-live-demo-sites.url 44 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/68 - Day 68 - Advanced - Authentication with Flask/006 Cryptii-Online-Encryption.url 44 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/01 - Day 1 - Beginner - Working with Variables in Python to Manage Data/012 Step-Through-Execution-with-Thonny-IDE.url 43 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/33 - Day 33 - Intermediate+ API Endpoints & API Parameters - ISS Overhead Notifier/005 Kanye-Quotes-API.url 43 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/50 - Day 50 - Intermediate+ Auto Tinder Swiping Bot/001 Tinder.url 43 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/38 - Day 38 - Intermediate+ Workout Tracking Using Google Sheets/004 Sheety-API.url 42 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/55 - Day 55 - Intermediate+ HTML & URL Parsing in Flask and the Higher Lower Game/003 giphy.com.url 42 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/16 - Day 16 - Intermediate - Object Oriented Programming (OOP)/004 Python-Package-Index.url 41 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/57 - Day 57 - Intermediate+ Templating with Jinja in Flask Applications/003 Agify-API.url 41 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/37 - Day 37 - Intermediate+ Habit Tracking Project API Post Requests & Headers/002 Pixela-Website.url 40 Bytes
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/07/demos/demo/tftp_get.sh 37 Bytes
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/07/demos/demo/tftp_put.sh 37 Bytes
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/06/demos/demo/tftp_get.sh 31 Bytes
  • Protocol Deep Dive/FTP and It's Variants - Deep Dive/Exercise Files/06/demos/demo/tftp_put.sh 31 Bytes
  • 100 Days of Code The Complete Python Pro Bootcamp for 2023/101 - Final Stretch/001 Recording of our Live AMA (aka AAA - Ask Angela Anything).mp4_exiftool_tmp 0 Bytes

随机展示

相关说明

本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!