ØMagnet

CBTNuggets - Hacker Tools, Techniques, and Incident Handling (SEC504)

Torrent Hash :
f753e7d957ea13da5afc0270a209d4750fcb2eea
Content Size :
52.97 GB
Date :
2023-11-13
Short Magnet :
Short Magnet
https://0mag.biz/!kO9MOm QR code
Files ( 238 )size
32. Covering Tracks/4. Network Traffic .mp4519.84 MB
33. Establishing Persistence/4. Reconnaissance Information-Gathering .mp4464.18 MB
9. MITRE ATT&CK Framework Introduction/4. Organizational Assessment .mp4444.5 MB
17. Password Attacks/6. Crossing the Rainbow Bridge .mp4411.56 MB
8. Federal Rules of Evidence/2. Daubert Standard .mp4410.06 MB
30. Pivoting and Lateral Movement/5. Persistence .mp4396.37 MB
7. Cloud Investigations/4. Where is the cloud .mp4390.34 MB
14. Enumerating Shadow Cloud Targets/3. Scanning for Clouds .mp4389.45 MB
21. Cloud Spotlight - Insecure Storage/3. Default Storage in Windows .mp4384.96 MB
28. Cloud Spotlight - SSRF and IMDS Attacks/5. SQL Injection .mp4384.86 MB
9. MITRE ATT&CK Framework Introduction/5. Whose Fault is it .mp4376.01 MB
15. Server Message Block (SMB) Sessions/6. Exploiting SMB .mp4371.62 MB
4. Network Investigations/3. Too Many Connections .mp4371.14 MB
32. Covering Tracks/3. Event Logs .mp4370.58 MB
25. Defense Spotlight System Resource Usage Monitor/2. Windows Resource Monitor .mp4369.97 MB
14. Enumerating Shadow Cloud Targets/4. Finding the Key Master .mp4369 MB
26. Command Injection/5. Where to Command Inject .mp4368.92 MB
24. Drive-By Attacks/4. Turning the Sandbox into a Honeypot .mp4367.94 MB
27. Cross-Site Scripting (XSS)/2. Common Weak Points .mp4365.08 MB
18. Microsoft 365 Attacks/6. Pivoting and Traffic Analysis .mp4365.06 MB
33. Establishing Persistence/2. What is Establishing Persistence.mp4361.45 MB
10. Open-Source Intelligence/4. Publications and Other Print .mp4359.93 MB
36. Password Spray, Guessing, and Credential Stuffing Attacks/3. Password Guessing .mp4359.4 MB
9. MITRE ATT&CK Framework Introduction/3. Enter the Matrix .mp4352.58 MB
26. Command Injection/3. The Bad .mp4352.39 MB
1. Incident Response/6. Writing Everything Up .mp4351.08 MB
13. Network and Host Scanning with Nmap/4. Dusting for Prints .mp4350.82 MB
27. Cross-Site Scripting (XSS)/5. Third-party Protection .mp4349.97 MB
22. Multi-Purpose Netcat/3. Making Someone Use Netcat .mp4349.9 MB
34. Data Collection/2. Importance .mp4349.44 MB
11. DNS Interrogation/4. Hijacking DNS .mp4344.1 MB
14. Enumerating Shadow Cloud Targets/2. Shadow Components .mp4340.79 MB
13. Network and Host Scanning with Nmap/3. What the Scans Look Like .mp4340.1 MB
33. Establishing Persistence/6. Cloud Post-Exploitation .mp4336.48 MB
31. Hijacking Attacks/2. Predictability .mp4332.89 MB
34. Data Collection/3. Choosing and Configuring Exploits .mp4331.92 MB
22. Multi-Purpose Netcat/6. Covering the Tracks .mp4328.82 MB
12. Website Reconnaissance/2. Understand the Structure .mp4328.55 MB
4. Network Investigations/5. Packet Reading Basics .mp4325.7 MB
3. Live Examination/3. Working with FTK .mp4323.78 MB
19. Understanding Password Hashes/7. Custom Hash Tables .mp4323.14 MB
9. MITRE ATT&CK Framework Introduction/2. Damage Assessment .mp4322.68 MB
6. Malware Investigations/7. Find the Evidence on the Network .mp4322.09 MB
9. MITRE ATT&CK Framework Introduction/6. Moving to Contain .mp4322.02 MB
36. Password Spray, Guessing, and Credential Stuffing Attacks/2. Password Spraying .mp4320.15 MB
34. Data Collection/5. Real Intelligence Threat Analytics .mp4319.93 MB
5. Memory Investigations/5. Volatility .mp4316.86 MB
35. Attacking Windows Active Directory/3. Target Discovery and Enumeration .mp4315.48 MB
35. Attacking Windows Active Directory/5. Internal Attacker Compromise Attribution .mp4315.16 MB
23. Metasploit Framework/3. Systems Without Metasploit .mp4315.11 MB

Related Torrents:

(無修正-流出) KMHRS-005 (Uncensored Leaked) 祝、ハタチ!即、飲酒!とろ酔い恥ずかし汁まみれ性交 小岩いと2.15 GB
IPX-1145.82 GB
BBAN-3691.85 GB
短发小萌妹,卧室里面秀身材,露出逼逼,网友说有点黑,还生气了呢177.86 MB
DeepLush.22.04.06.Jewelz.Blu.All.About.Jewelz.XXX.SD.MP4-KLEENEX287.64 MB
Seal.of.Desire.2022.P.WEB-DLRip.14OOMB.avi1.37 GB