~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/8. What is Phishing, Vishing and SMShing.mp4 247.1 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/2. Why You Need Security .mp4 189.8 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4 180.0 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/7. Spyware, Adware, Scareware, PUPs & Browser hijacking.mp4 178.9 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/11. Setting up Labs.mp4 169.5 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/9. Spamming & Doxing.mp4 168.1 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/10. Social Engineering - Scams, Cons, Tricks and Fraud.mp4 163.0 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/3. What is Privacy, Anonymity and Pseudonymity .mp4 158.8 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/6. Threat Modelling And Risk Assessment.mp4 158.3 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/6. Malware, Viruses, Root kits and RATs.mp4 152.7 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/5. Hackers, crackers and cyber criminals.mp4 146.5 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/8. Confidentiality, Integrity and Availability - (Security Attributes).mp4 141.8 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/4. Security, Vulnerabilities, Threats and Adversaries.mp4 117.8 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/2. Protect What You Value.mp4 93.7 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/10. Zero Trust Model.mp4 85.7 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/7. Security,Anonymity and Privacy.mp4 59.8 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/1. What is Cybersecurity .mp4 34.8 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/9. Defence in Depth.mp4 34.2 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/8. Who Conduct it .mp4 26.4 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/5. Purpose of Studying Ethical Hacking and Penetrating Testing.mp4 24.3 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/10. Closure.mp4 23.6 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/1. Goals and Learning Objectives - Know Your Enemy.mp4 21.8 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/9. Who should You Choose .mp4 20.6 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/1. Goals and Learning Objectives.mp4 19.7 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/6. Scope For Ethical Hackers and Penetrating Testers.mp4 18.6 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/5. Asset Selection.mp4 18.3 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/3. What is Penetrating Testing .mp4 15.7 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/4. Difference Between Ethical Hacking and Penetrating Testing.mp4 14.3 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/3. The Top 3 Things You Need To Stay Safe Online.mp4 12.3 MB
~Get Your Files Here !/1. Introduction/1. Who Am I.mp4 6.9 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/7. Do Ethical Hackers And Penetrating Testers Need Permission.mp4 6.5 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/2. What is Ethical Hacking.mp4 6.0 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/8. What is Phishing, Vishing and SMShing.srt 26.7 kB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/11. Setting up Labs.srt 23.2 kB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/9. Spamming & Doxing.srt 20.2 kB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/2. Why You Need Security .srt 17.2 kB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/6. Malware, Viruses, Root kits and RATs.srt 16.5 kB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/7. Spyware, Adware, Scareware, PUPs & Browser hijacking.srt 16.4 kB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/10. Social Engineering - Scams, Cons, Tricks and Fraud.srt 15.6 kB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.srt 15.5 kB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/6. Threat Modelling And Risk Assessment.srt 13.6 kB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/3. What is Privacy, Anonymity and Pseudonymity .srt 12.4 kB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/8. Confidentiality, Integrity and Availability - (Security Attributes).srt 10.5 kB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/5. Hackers, crackers and cyber criminals.srt 10.0 kB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/4. Security, Vulnerabilities, Threats and Adversaries.srt 9.9 kB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/2. Protect What You Value.srt 9.5 kB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/5. Asset Selection.srt 7.3 kB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/3. The Top 3 Things You Need To Stay Safe Online.srt 7.3 kB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/10. Zero Trust Model.srt 7.2 kB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/1. What is Cybersecurity .srt 5.1 kB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/7. Security,Anonymity and Privacy.srt 4.4 kB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/9. Defence in Depth.srt 3.9 kB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/2. What is Ethical Hacking .srt 3.8 kB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/10. Closure.srt 3.4 kB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/8. Who Conduct it .srt 3.1 kB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/5. Purpose of Studying Ethical Hacking and Penetrating Testing.srt 3.0 kB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/4. Difference Between Ethical Hacking and Penetrating Testing.srt 2.5 kB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/6. Scope For Ethical Hackers and Penetrating Testers.srt 2.5 kB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/3. What is Penetrating Testing .srt 2.3 kB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/9. Who should You Choose .srt 2.3 kB
~Get Your Files Here !/1. Introduction/1. Who Am I.srt 1.7 kB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/1. Goals and Learning Objectives - Know Your Enemy.srt 1.4 kB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/1. Goals and Learning Objectives.srt 1.1 kB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/7. Do Ethical Hackers And Penetrating Testers Need Permission.srt 818 Bytes
~Get Your Files Here !/Bonus Resources.txt 357 Bytes