Lesson 13 Network Infrastructure Security/006. 13.5 Exploring and Mitigating Common Layer 2 Threats.mp415.04MB
Lesson 13 Network Infrastructure Security/007. 13.6 Understanding and Configuring BPDU Guard and Root Guard.mp46.44MB
Lesson 13 Network Infrastructure Security/008. 13.7 Understanding and Configuring CDPLLDP.mp48.68MB
Lesson 13 Network Infrastructure Security/009. 13.8 Understanding the Control Plane, Data Plane, and Management Plane.mp414.55MB
Lesson 13 Network Infrastructure Security/010. 13.9 Exploring How to Secure the Management Plane.mp413.82MB
Lesson 13 Network Infrastructure Security/011. 13.10 Exploring How to Secure the Control Plane.mp414.58MB
Lesson 13 Network Infrastructure Security/012. 13.11 Exploring How to Secure the Data Plane.mp411.28MB
Lesson 14 Software-Defined Networking Security and Programmability/001. Learning objectives.mp48.05MB
Lesson 14 Software-Defined Networking Security and Programmability/002. 14.1 Introducing SDN.mp413.57MB
Lesson 14 Software-Defined Networking Security and Programmability/003. 14.2 Explaining North Bound and South Bound APIs in the SDN Architecture.mp49.41MB
Lesson 26 Post-Exploitation Techniques/002. 26.1 Maintaining Persistence After Compromising a System.mp430.32MB
Lesson 26 Post-Exploitation Techniques/003. 26.2 Understanding How to Perform Lateral Movement and Pivoting.mp412.84MB
Lesson 26 Post-Exploitation Techniques/004. 26.3 Understanding How to Cover Your Tracks and Clean up Systems After a Penetration Testing Engagement.mp46.41MB
Lesson 27 Hacking User Credentials/001. Learning objectives.mp43.57MB
Lesson 27 Hacking User Credentials/002. 27.1 Understanding Authentication and Authorization Mechanisms.mp421.41MB
Lesson 27 Hacking User Credentials/003. 27.2 Understanding Authentication and Authorization Attacks.mp415.05MB
Lesson 27 Hacking User Credentials/004. 27.3 Exploring Password Storage Mechanisms.mp46.9MB
Lesson 27 Hacking User Credentials/005. 27.4 Understanding Password Storage Vulnerability.mp410.91MB
Lesson 27 Hacking User Credentials/006. 27.5 Cracking Passwords with John the Ripper.mp463.03MB
Lesson 27 Hacking User Credentials/007. 27.6 Cracking Passwords with hashcat.mp439.01MB
Lesson 27 Hacking User Credentials/008. 27.7 Improving Password Security.mp47.94MB
Lesson 28 Reporting and Communication/001. Learning objectives.mp42.84MB
Lesson 28 Reporting and Communication/002. 28.1 Surveying Report Writing and Handling Best Practices.mp414.03MB
Lesson 28 Reporting and Communication/003. 28.2 Recommending Mitigation Strategies for the Discovered Vulnerabilities.mp48.58MB
Lesson 28 Reporting and Communication/004. 28.3 Explaining the Importance of Appropriate Communication.mp428.75MB
Lesson 29 Hacking Mobile Platforms/001. Learning objectives.mp42.54MB
Lesson 29 Hacking Mobile Platforms/002. 29.1 Understanding Mobile Platform Attack Vectors.mp470.05MB
Lesson 29 Hacking Mobile Platforms/003. 29.2 Hacking iOS.mp482.59MB
Lesson 29 Hacking Mobile Platforms/004. 29.3 Hacking Android OS.mp460.86MB
Lesson 29 Hacking Mobile Platforms/005. 29.4 Understanding Mobile Device Management.mp436.09MB
Lesson 29 Hacking Mobile Platforms/006. 29.5 Surveying Mobile Security Guidelines and Tools.mp410.92MB
Lesson 3 Types of Attacks and Vulnerabilities/001. Learning objectives.mp47.91MB
Lesson 3 Types of Attacks and Vulnerabilities/002. 3.1 Surveying Types of Vulnerabilities.mp434.23MB
Lesson 3 Types of Attacks and Vulnerabilities/003. 3.2 Understanding Passive Reconnaissance and Social Engineering.mp427.14MB
Lesson 3 Types of Attacks and Vulnerabilities/004. 3.3 Understanding Active Reconnaissance Port Scanning and Host Profiling.mp429.49MB
Lesson 3 Types of Attacks and Vulnerabilities/005. 3.4 Understanding Privilege Escalation and Code Execution Attacks.mp44.46MB
Lesson 3 Types of Attacks and Vulnerabilities/006. 3.5 Understanding Backdoors and Man-in-the-Middle Attacks.mp411.94MB
Lesson 3 Types of Attacks and Vulnerabilities/007. 3.6 Understanding Denial of Service Attacks.mp49.79MB
Lesson 3 Types of Attacks and Vulnerabilities/008. 3.7 Surveying Attack Methods for Data Exfiltration.mp46.93MB
Lesson 3 Types of Attacks and Vulnerabilities/009. 3.8 Understanding ARP Cache Poisoning and Route Manipulation Attacks.mp414.45MB
Lesson 3 Types of Attacks and Vulnerabilities/010. 3.9 Understanding Password Attacks.mp412.38MB
Lesson 3 Types of Attacks and Vulnerabilities/011. 3.10 Understanding Wireless Attacks.mp410.21MB
Lesson 3 Types of Attacks and Vulnerabilities/012. 3.11 Exploring Security Evasion Techniques.mp417.61MB
Lesson 3 Types of Attacks and Vulnerabilities/013. 3.12 Identifying the Challenges of Data Visibility in Detection.mp422.15MB
Lesson 3 Types of Attacks and Vulnerabilities/014. 3.13 Identifying Potential Data Loss from Provided Traffic Profiles.mp45.32MB
Lesson 3 Types of Attacks and Vulnerabilities/015. 3.14 Comparing Rule-based Detection vs. Behavioral and Statistical Detection.mp426.3MB
Lesson 30 Mobile Device Security/001. Learning objectives.mp42.48MB
Lesson 30 Mobile Device Security/002. 30.1 Understanding OWASP Mobile Device Vulnerabilities.mp418.18MB
Lesson 30 Mobile Device Security/003. 30.2 Wrestling with the BYOD Dilemma.mp424.48MB
Lesson 30 Mobile Device Security/004. 30.3 Understanding Mobile Device Management (MDM).mp426.38MB
Lesson 30 Mobile Device Security/005. 30.4 Understanding Mobile Device Security Policies.mp420.35MB
Lesson 31 Fundamentals of Android Security/001. Learning objectives.mp42.41MB
Lesson 31 Fundamentals of Android Security/002. 31.1 Hacking Android Devices.mp442.49MB
Lesson 31 Fundamentals of Android Security/003. 31.2 Exploring Android Emulators and SDK.mp410.26MB
Lesson 31 Fundamentals of Android Security/004. 31.3 Understanding Android Hacking Tools and Methodologies.mp448.41MB
Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/007. 9.6 Understanding Windows Forensics Basics.mp437.2MB
Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/008. 9.7 Surveying Windows Forensics Application Processes.mp410.57MB
Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/009. 9.8 Surveying Windows Forensics Memory.mp416.22MB
Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/010. 9.9 Surveying Windows Forensics The Windows Registry.mp420.01MB
Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/011. 9.10 Surveying Windows Forensics Hard Drives, FAT, and NTFS.mp423.03MB
Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/012. 9.11 Understanding Linux and MAC OS X Forensics Basics.mp433.21MB
Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/013. 9.12 Examining Web Server Logs.mp420.89MB