magnet:?xt=urn:btih:B69327BB89E4BF32A3AA5E9BB09A0C03DD5B5A3F
05. Identifying Common Malware Behavior/35. Lab 11 - Malware Analysis with Wireshark - Part 1.mp4 45.8 MB
03. Analyzing Port Scans and Enumeration Methods/18. Lab 5 - Analyzing HTTP Path Enumeration with Wireshark.mp4 42.7 MB
03. Analyzing Port Scans and Enumeration Methods/12. Lab 3 - Analyzing Malware for Network and Port Scans.mp4 42.3 MB
04. Analyzing Common Attack Signatures of Suspect Traffic/28. Lab 9 - Analyzing HTTP Traffic and Unencrypted File Transfers.mp4 41.8 MB
06. Identify Shell Reverse Shell Botnet and DDoS Attack Traffic/42. Lab 13 - Identifying Botnet Traffic with Wireshark.mp4 39.5 MB
03. Analyzing Port Scans and Enumeration Methods/15. Lab 4 - Detecting OS Fingerprinting with Wireshark.mp4 37.9 MB
06. Identify Shell Reverse Shell Botnet and DDoS Attack Traffic/45. Lab 14 - Analyzing Data Exfiltration with Wireshark.mp4 37.6 MB
06. Identify Shell Reverse Shell Botnet and DDoS Attack Traffic/43. Lab 13 - Identifying Botnet Traffic - Part 2.mp4 37.3 MB
03. Analyzing Port Scans and Enumeration Methods/10. Lab 2 - Identifying Port Scans with Wireshark.mp4 33.5 MB
04. Analyzing Common Attack Signatures of Suspect Traffic/25. Lab 7 - Spotting Suspect Country Codes with Wireshark.mp4 28.7 MB
03. Analyzing Port Scans and Enumeration Methods/16. Lab 4 - Part 2 - Detecting OS Fingerprinting.mp4 28.0 MB
04. Analyzing Common Attack Signatures of Suspect Traffic/30. Lab 10 - Analysis of a Brute Force Attack.mp4 27.2 MB
03. Analyzing Port Scans and Enumeration Methods/09. Lab 1 - Detecting Network Discovery Scans with Wireshark.mp4 25.7 MB
04. Analyzing Common Attack Signatures of Suspect Traffic/23. Lab 4 - Analyzing TCP SYN Attacks.mp4 21.9 MB
03. Analyzing Port Scans and Enumeration Methods/11. Lab 2 - Part 2 - Detecting Port Scans.mp4 21.6 MB
04. Analyzing Common Attack Signatures of Suspect Traffic/26. Lab 8 - Filtering for Unusual Domain Name Lookups.mp4 20.3 MB
03. Analyzing Port Scans and Enumeration Methods/13. Lab 3 - Part 2 - Analyzing Malware for Network and Port Scans.mp4 16.8 MB
05. Identifying Common Malware Behavior/36. Lab 11 - Malware Analysis with Wireshark - Part 2.mp4 15.8 MB
Exercise Files/04/demos/Lab9_HTTPTransfers.pcapng 13.7 MB
06. Identify Shell Reverse Shell Botnet and DDoS Attack Traffic/40. Lab 12 - Analyzing Reverse Shell Behavior .mp4 10.4 MB
[FreeCoursesOnline.us] Lightroom 101 & 201 [phlearn] 12.8 GB
[FreeCoursesOnline.Us] Special FX 4 Pack 1.4 GB
[FreeCoursesOnline.Us] Pluralsight -... 725.7 MB
[FreeCoursesOnline.Us] Laracasts -... 353.3 MB
[FreeCoursesOnline.Us] Lynda - Python - Data Analysis 381.5 MB
[FreeCoursesOnline.Us] ethical-hacking-buffer-overflow 485.0 MB
[FreeCoursesOnline.Us] Plural Sight - unity-audio-fundamentals 406.4 MB
[FreeCoursesOnline.Us] Pluralsight -... 1.0 GB
[FreeCoursesOnline.Us] Pluralsight - Java Path -... 849.2 MB
[FreeCoursesOnline.Us] Treehouse - build-a-rest-api-in-spring 533.4 MB