13. Mid-Course Capstone/2. Walkthrough - Legacy.mp4 | 331.87 MB |
13. Mid-Course Capstone/6. Walkthrough - Jerry.mp4 | 305.37 MB |
13. Mid-Course Capstone/7. Walkthrough - Nibbles.mp4 | 285.38 MB |
13. Mid-Course Capstone/4. Walkthrough - Blue.mp4 | 284.21 MB |
13. Mid-Course Capstone/3. Walkthrough - Lame.mp4 | 279.98 MB |
7. Introduction to Python/16. Building a Port Scanner.mp4 | 269.57 MB |
13. Mid-Course Capstone/5. Walkthrough - Devel.mp4 | 246.73 MB |
13. Mid-Course Capstone/9. Walkthrough - Bashed.mp4 | 242.28 MB |
13. Mid-Course Capstone/8. Walkthrough - Optimum.mp4 | 235.57 MB |
13. Mid-Course Capstone/11. Walkthrough - Netmon.mp4 | 233.96 MB |
4. Networking Refresher/7. Subnetting Part 1 - Methodology.mp4 | 207.87 MB |
13. Mid-Course Capstone/10. Walkthrough - Grandpa.mp4 | 163.27 MB |
12. Exploitation Basics/6. Password Spraying and Credential Stuffing.mp4 | 156.73 MB |
17. Attacking Active Directory Initial Attack Vectors/4. Password Cracking with Hashcat.mp4 | 154.35 MB |
10. Scanning & Enumeration/4. Enumerating HTTPHTTPS - Part 2.mp4 | 150.59 MB |
7. Introduction to Python/13. Advanced Strings.mp4 | 145.43 MB |
7. Introduction to Python/9. Lists.mp4 | 143.16 MB |
18. Attacking Active Directory Post-Compromise Enumeration/3. Domain Enumeration with PowerView.mp4 | 139.48 MB |
10. Scanning & Enumeration/7. Researching Potential Vulnerabilities.mp4 | 138.56 MB |
12. Exploitation Basics/4. Manual Exploitation.mp4 | 136.32 MB |
6. Introduction to Linux/8. Scripting with Bash.mp4 | 133.33 MB |
10. Scanning & Enumeration/2. Scanning with Nmap.mp4 | 133.24 MB |
22. Testing the Top 10 Web Application Vulnerabilities/2. The OWASP Top 10 and OWASP Testing Checklist.mp4 | 130.37 MB |
23. Wireless Penetration Testing/2. WPA PSK Exploit Walkthrough.mp4 | 126.92 MB |
7. Introduction to Python/8. Conditional Statements.mp4 | 122.47 MB |
7. Introduction to Python/14. Dictionaries.mp4 | 114.62 MB |
6. Introduction to Linux/2. Navigating the File System.mp4 | 113.4 MB |
10. Scanning & Enumeration/3. Enumerating HTTPHTTPS - Part 1.mp4 | 111.19 MB |
7. Introduction to Python/4. Variables & Methods.mp4 | 110.6 MB |
22. Testing the Top 10 Web Application Vulnerabilities/5. Exploring Burp Suite.mp4 | 106.03 MB |
9. Information Gathering (Reconnaissance)/9. Information Gathering with Burp Suite.mp4 | 105.72 MB |
16. Active Directory Lab Build/5. Setting Up Users, Groups, and Policies.mp4 | 99.72 MB |
11. Additional Scanning Tools/3. Scanning with Nessus - Part 1.mp4 | 98.95 MB |
7. Introduction to Python/5. Functions.mp4 | 97.19 MB |
9. Information Gathering (Reconnaissance)/8. Identifying Website Technologies.mp4 | 96.4 MB |
6. Introduction to Linux/3. Users and Privileges.mp4 | 94.17 MB |
12. Exploitation Basics/5. Brute Force Attacks.mp4 | 93.16 MB |
10. Scanning & Enumeration/5. Enumerating SMB.mp4 | 90.27 MB |
22. Testing the Top 10 Web Application Vulnerabilities/3. Installing OWASP Juice Shop.mp4 | 88.64 MB |
17. Attacking Active Directory Initial Attack Vectors/16. IPv6 DNS Takeover via mitm6.mp4 | 86.78 MB |
22. Testing the Top 10 Web Application Vulnerabilities/8. SQL Injection Walkthrough.mp4 | 85.21 MB |
6. Introduction to Linux/6. Starting and Stopping Kali Services.mp4 | 82.16 MB |
22. Testing the Top 10 Web Application Vulnerabilities/19. Cross-Site Scripting (XSS) Overview.mp4 | 81.88 MB |
22. Testing the Top 10 Web Application Vulnerabilities/13. Testing for Sensitive Data Exposure.mp4 | 79.92 MB |
9. Information Gathering (Reconnaissance)/6. Hunting Subdomains - Part 1.mp4 | 79.51 MB |
16. Active Directory Lab Build/6. Joining Our Machines to the Domain.mp4 | 79.34 MB |
24. Legal Documents and Report Writing/3. Reviewing a Real Pentest Report.mp4 | 79.26 MB |
22. Testing the Top 10 Web Application Vulnerabilities/10. Broken Authentication Overview and Defenses.mp4 | 78.63 MB |
4. Networking Refresher/2. IP Addresses.mp4 | 78.33 MB |
22. Testing the Top 10 Web Application Vulnerabilities/15. XXE Attack and Defense.mp4 | 77.44 MB |