Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
001 Application security.mp4 |
9.83Мб |
001 Application security-en.srt |
7.50Кб |
001 Comparing viruses worms and Trojans.mp4 |
23.71Мб |
001 Comparing viruses worms and Trojans-en.srt |
10.01Кб |
001 Cybersecurity adversaries.mp4 |
14.72Мб |
001 Cybersecurity adversaries-en.srt |
6.90Кб |
001 Denial of service attacks.mp4 |
8.32Мб |
001 Denial of service attacks-en.srt |
7.64Кб |
001 Next steps.mp4 |
1.94Мб |
001 Next steps-en.srt |
1.36Кб |
001 Security assessment tools.mp4 |
21.34Мб |
001 Security assessment tools-en.srt |
11.14Кб |
001 Social engineering.mp4 |
9.15Мб |
001 Social engineering-en.srt |
10.39Кб |
001 Vendor vulnerabilities.mp4 |
7.60Мб |
001 Vendor vulnerabilities-en.srt |
7.77Кб |
001 Welcome.mp4 |
4.61Мб |
001 Welcome-en.srt |
3.13Кб |
001 Wireless eavesdropping.mp4 |
9.63Мб |
001 Wireless eavesdropping-en.srt |
8.19Кб |
002 Comparing adware spyware and ransomware.mp4 |
9.56Мб |
002 Comparing adware spyware and ransomware-en.srt |
8.75Кб |
002 Eavesdropping attacks.mp4 |
8.15Мб |
002 Eavesdropping attacks-en.srt |
7.56Кб |
002 Impersonation attacks.mp4 |
7.71Мб |
002 Impersonation attacks-en.srt |
9.04Кб |
002 Memory vulnerabilities.mp4 |
5.34Мб |
002 Memory vulnerabilities-en.srt |
6.79Кб |
002 Preventing insider threats.mp4 |
8.64Мб |
002 Preventing insider threats-en.srt |
7.59Кб |
002 Preventing SQL injection.mp4 |
11.51Мб |
002 Preventing SQL injection-en.srt |
10.06Кб |
002 Scanning for vulnerabilities.mp4 |
12.46Мб |
002 Scanning for vulnerabilities-en.srt |
10.83Кб |
002 What you need to know.mp4 |
787.70Кб |
002 What you need to know-en.srt |
1.10Кб |
002 WPA and WPS attacks.mp4 |
7.09Мб |
002 WPA and WPS attacks-en.srt |
6.41Кб |
003 Assessing threats.mp4 |
20.91Мб |
003 Assessing threats-en.srt |
6.21Кб |
003 Network attacks.mp4 |
11.99Мб |
003 Network attacks-en.srt |
11.51Кб |
003 Physical social engineering.mp4 |
9.27Мб |
003 Physical social engineering-en.srt |
4.51Кб |
003 Propagation attacks.mp4 |
9.74Мб |
003 Propagation attacks-en.srt |
7.13Кб |
003 Race condition vulnerabilities.mp4 |
4.30Мб |
003 Race condition vulnerabilities-en.srt |
4.62Кб |
003 Threat intelligence.mp4 |
3.68Мб |
003 Threat intelligence-en.srt |
4.44Кб |
003 Understanding backdoors and logic bombs.mp4 |
9.79Мб |
003 Understanding backdoors and logic bombs-en.srt |
7.26Кб |
003 Understanding cross-site scripting.mp4 |
17.18Мб |
003 Understanding cross-site scripting-en.srt |
12.03Кб |
004 Configuration vulnerabilities.mp4 |
7.17Мб |
004 Configuration vulnerabilities-en.srt |
5.89Кб |
004 Looking at advanced malware.mp4 |
8.15Мб |
004 Looking at advanced malware-en.srt |
7.87Кб |
004 Network address spoofing.mp4 |
4.63Мб |
004 Network address spoofing-en.srt |
6.19Кб |
004 Preventing rogues and evil twins.mp4 |
6.17Мб |
004 Preventing rogues and evil twins-en.srt |
6.13Кб |
004 Threat assessment techniques.mp4 |
5.75Мб |
004 Threat assessment techniques-en.srt |
5.05Кб |
004 Understanding cross-site request forgery.mp4 |
11.35Мб |
004 Understanding cross-site request forgery-en.srt |
7.35Кб |
005 Architectural vulnerabilities.mp4 |
4.08Мб |
005 Architectural vulnerabilities-en.srt |
4.15Кб |
005 Clickjacking.mp4 |
3.08Мб |
005 Clickjacking-en.srt |
3.35Кб |
005 Disassociation attacks.mp4 |
4.02Мб |
005 Disassociation attacks-en.srt |
4.62Кб |
005 Password attacks.mp4 |
21.34Мб |
005 Password attacks-en.srt |
14.97Кб |
005 Penetration testing.mp4 |
7.67Мб |
005 Penetration testing-en.srt |
7.19Кб |
005 Understanding botnets.mp4 |
6.14Мб |
005 Understanding botnets-en.srt |
5.41Кб |
006 Advanced persistent threats.mp4 |
7.87Мб |
006 Advanced persistent threats-en.srt |
6.06Кб |
006 Advanced vulnerability scanning.mp4 |
6.24Мб |
006 Advanced vulnerability scanning-en.srt |
5.72Кб |
006 Brute force cryptographic attacks.mp4 |
4.76Мб |
006 Brute force cryptographic attacks-en.srt |
5.48Кб |
006 Defending against directory traversal.mp4 |
7.57Мб |
006 Defending against directory traversal-en.srt |
5.88Кб |
006 Understanding Bluetooth and NFC attacks.mp4 |
5.04Мб |
006 Understanding Bluetooth and NFC attacks-en.srt |
4.57Кб |
007 Knowledge-based crytpographic attacks.mp4 |
8.17Мб |
007 Knowledge-based crytpographic attacks-en.srt |
5.29Кб |
007 Overflow attacks.mp4 |
9.99Мб |
007 Overflow attacks-en.srt |
6.16Кб |
007 RFID security.mp4 |
7.37Мб |
007 RFID security-en.srt |
4.89Кб |
008 Explaining cookies and attachments.mp4 |
6.82Мб |
008 Explaining cookies and attachments-en.srt |
6.40Кб |
008 Watering hole attacks.mp4 |
7.38Мб |
008 Watering hole attacks-en.srt |
5.72Кб |
009 Session hijacking.mp4 |
8.80Мб |
009 Session hijacking-en.srt |
6.93Кб |
010 Malicious add-ons.mp4 |
6.25Мб |
010 Malicious add-ons-en.srt |
4.65Кб |
011 Code execution attacks.mp4 |
6.99Мб |
011 Code execution attacks-en.srt |
5.00Кб |
012 Driver manipulation.mp4 |
3.67Мб |
012 Driver manipulation-en.srt |
4.79Кб |
013 Error and exception handling.mp4 |
6.90Мб |
013 Error and exception handling-en.srt |
6.64Кб |