32. Covering Tracks/4. Network Traffic .mp4 | 519.84 MB |
33. Establishing Persistence/4. Reconnaissance Information-Gathering .mp4 | 464.18 MB |
9. MITRE ATT&CK Framework Introduction/4. Organizational Assessment .mp4 | 444.5 MB |
17. Password Attacks/6. Crossing the Rainbow Bridge .mp4 | 411.56 MB |
8. Federal Rules of Evidence/2. Daubert Standard .mp4 | 410.06 MB |
30. Pivoting and Lateral Movement/5. Persistence .mp4 | 396.37 MB |
7. Cloud Investigations/4. Where is the cloud .mp4 | 390.34 MB |
14. Enumerating Shadow Cloud Targets/3. Scanning for Clouds .mp4 | 389.45 MB |
21. Cloud Spotlight - Insecure Storage/3. Default Storage in Windows .mp4 | 384.96 MB |
28. Cloud Spotlight - SSRF and IMDS Attacks/5. SQL Injection .mp4 | 384.86 MB |
9. MITRE ATT&CK Framework Introduction/5. Whose Fault is it .mp4 | 376.01 MB |
15. Server Message Block (SMB) Sessions/6. Exploiting SMB .mp4 | 371.62 MB |
4. Network Investigations/3. Too Many Connections .mp4 | 371.14 MB |
32. Covering Tracks/3. Event Logs .mp4 | 370.58 MB |
25. Defense Spotlight System Resource Usage Monitor/2. Windows Resource Monitor .mp4 | 369.97 MB |
14. Enumerating Shadow Cloud Targets/4. Finding the Key Master .mp4 | 369 MB |
26. Command Injection/5. Where to Command Inject .mp4 | 368.92 MB |
24. Drive-By Attacks/4. Turning the Sandbox into a Honeypot .mp4 | 367.94 MB |
27. Cross-Site Scripting (XSS)/2. Common Weak Points .mp4 | 365.08 MB |
18. Microsoft 365 Attacks/6. Pivoting and Traffic Analysis .mp4 | 365.06 MB |
33. Establishing Persistence/2. What is Establishing Persistence.mp4 | 361.45 MB |
10. Open-Source Intelligence/4. Publications and Other Print .mp4 | 359.93 MB |
36. Password Spray, Guessing, and Credential Stuffing Attacks/3. Password Guessing .mp4 | 359.4 MB |
9. MITRE ATT&CK Framework Introduction/3. Enter the Matrix .mp4 | 352.58 MB |
26. Command Injection/3. The Bad .mp4 | 352.39 MB |
1. Incident Response/6. Writing Everything Up .mp4 | 351.08 MB |
13. Network and Host Scanning with Nmap/4. Dusting for Prints .mp4 | 350.82 MB |
27. Cross-Site Scripting (XSS)/5. Third-party Protection .mp4 | 349.97 MB |
22. Multi-Purpose Netcat/3. Making Someone Use Netcat .mp4 | 349.9 MB |
34. Data Collection/2. Importance .mp4 | 349.44 MB |
11. DNS Interrogation/4. Hijacking DNS .mp4 | 344.1 MB |
14. Enumerating Shadow Cloud Targets/2. Shadow Components .mp4 | 340.79 MB |
13. Network and Host Scanning with Nmap/3. What the Scans Look Like .mp4 | 340.1 MB |
33. Establishing Persistence/6. Cloud Post-Exploitation .mp4 | 336.48 MB |
31. Hijacking Attacks/2. Predictability .mp4 | 332.89 MB |
34. Data Collection/3. Choosing and Configuring Exploits .mp4 | 331.92 MB |
22. Multi-Purpose Netcat/6. Covering the Tracks .mp4 | 328.82 MB |
12. Website Reconnaissance/2. Understand the Structure .mp4 | 328.55 MB |
4. Network Investigations/5. Packet Reading Basics .mp4 | 325.7 MB |
3. Live Examination/3. Working with FTK .mp4 | 323.78 MB |
19. Understanding Password Hashes/7. Custom Hash Tables .mp4 | 323.14 MB |
9. MITRE ATT&CK Framework Introduction/2. Damage Assessment .mp4 | 322.68 MB |
6. Malware Investigations/7. Find the Evidence on the Network .mp4 | 322.09 MB |
9. MITRE ATT&CK Framework Introduction/6. Moving to Contain .mp4 | 322.02 MB |
36. Password Spray, Guessing, and Credential Stuffing Attacks/2. Password Spraying .mp4 | 320.15 MB |
34. Data Collection/5. Real Intelligence Threat Analytics .mp4 | 319.93 MB |
5. Memory Investigations/5. Volatility .mp4 | 316.86 MB |
35. Attacking Windows Active Directory/3. Target Discovery and Enumeration .mp4 | 315.48 MB |
35. Attacking Windows Active Directory/5. Internal Attacker Compromise Attribution .mp4 | 315.16 MB |
23. Metasploit Framework/3. Systems Without Metasploit .mp4 | 315.11 MB |