Parent directory/ | - | - |
01. Course Intro.mp4 | 17.0 MiB | 2022-Feb-27 13:08 |
02. L 1 History of Security-de.vtt | 7.2 KiB | 2022-Feb-27 13:08 |
02. L 1 History of Security-es-MX.vtt | 6.9 KiB | 2022-Feb-27 13:08 |
02. L 1 History of Security-fr.vtt | 7.2 KiB | 2022-Feb-27 13:08 |
02. L 1 History of Security-pt.vtt | 6.8 KiB | 2022-Feb-27 13:08 |
02. L 1 History of Security.mp4 | 27.7 MiB | 2022-Feb-27 13:08 |
02. L 1 History of Security.vtt | 6.3 KiB | 2022-Feb-27 13:08 |
03. L 2 Information Security-de.vtt | 7.1 KiB | 2022-Feb-27 13:08 |
03. L 2 Information Security-es-MX.vtt | 7.0 KiB | 2022-Feb-27 13:08 |
03. L 2 Information Security-fr.vtt | 7.4 KiB | 2022-Feb-27 13:08 |
03. L 2 Information Security-pt.vtt | 6.9 KiB | 2022-Feb-27 13:08 |
03. L 2 Information Security.mp4 | 20.1 MiB | 2022-Feb-27 13:08 |
03. L 2 Information Security.vtt | 6.3 KiB | 2022-Feb-27 13:08 |
04. Lab enviroment-de.vtt | 4.9 KiB | 2022-Feb-27 13:08 |
04. Lab enviroment-es-MX.vtt | 4.7 KiB | 2022-Feb-27 13:08 |
04. Lab enviroment-fr.vtt | 5.1 KiB | 2022-Feb-27 13:08 |
04. Lab enviroment-pt.vtt | 4.7 KiB | 2022-Feb-27 13:08 |
04. Lab enviroment.mp4 | 27.2 MiB | 2022-Feb-27 13:08 |
04. Lab enviroment.vtt | 4.3 KiB | 2022-Feb-27 13:08 |
05. LAB Hashing for Integrity-de.vtt | 4.1 KiB | 2022-Feb-27 13:08 |
05. LAB Hashing for Integrity-es-MX.vtt | 3.8 KiB | 2022-Feb-27 13:08 |
05. LAB Hashing for Integrity-fr.vtt | 4.1 KiB | 2022-Feb-27 13:08 |
05. LAB Hashing for Integrity-pt.vtt | 3.8 KiB | 2022-Feb-27 13:08 |
05. LAB Hashing for Integrity.mp4 | 10.7 MiB | 2022-Feb-27 13:08 |
05. LAB Hashing for Integrity.vtt | 3.6 KiB | 2022-Feb-27 13:08 |
06. L 3 Defining Cyber Space-de.vtt | 8.3 KiB | 2022-Feb-27 13:08 |
06. L 3 Defining Cyber Space-es-MX.vtt | 8.0 KiB | 2022-Feb-27 13:08 |
06. L 3 Defining Cyber Space-fr.vtt | 8.3 KiB | 2022-Feb-27 13:08 |
06. L 3 Defining Cyber Space-pt.vtt | 7.8 KiB | 2022-Feb-27 13:08 |
06. L 3 Defining Cyber Space.mp4 | 27.4 MiB | 2022-Feb-27 13:08 |
06. L 3 Defining Cyber Space.vtt | 7.4 KiB | 2022-Feb-27 13:08 |
07. L 4 Defining Cybersecurity-de.vtt | 19.0 KiB | 2022-Feb-27 13:08 |
07. L 4 Defining Cybersecurity-es-MX.vtt | 18.7 KiB | 2022-Feb-27 13:08 |
07. L 4 Defining Cybersecurity-fr.vtt | 19.1 KiB | 2022-Feb-27 13:08 |
07. L 4 Defining Cybersecurity-pt.vtt | 18.2 KiB | 2022-Feb-27 13:08 |
07. L 4 Defining Cybersecurity.mp4 | 64.5 MiB | 2022-Feb-27 13:09 |
07. L 4 Defining Cybersecurity.vtt | 16.8 KiB | 2022-Feb-27 13:08 |
08. LAB The Importance of End to End Encryption-de.vtt | 5.4 KiB | 2022-Feb-27 13:09 |
08. LAB The Importance of End to End Encryption-es-MX.vtt | 5.3 KiB | 2022-Feb-27 13:09 |
08. LAB The Importance of End to End Encryption-fr.vtt | 5.6 KiB | 2022-Feb-27 13:09 |
08. LAB The Importance of End to End Encryption-pt.vtt | 5.3 KiB | 2022-Feb-27 13:09 |
08. LAB The Importance of End to End Encryption.mp4 | 28.3 MiB | 2022-Feb-27 13:09 |
08. LAB The Importance of End to End Encryption.vtt | 4.9 KiB | 2022-Feb-27 13:09 |
09. L 5 Cyber Threats-de.vtt | 9.1 KiB | 2022-Feb-27 13:09 |
09. L 5 Cyber Threats-es-MX.vtt | 8.5 KiB | 2022-Feb-27 13:09 |
09. L 5 Cyber Threats-fr.vtt | 9.0 KiB | 2022-Feb-27 13:09 |
09. L 5 Cyber Threats-pt.vtt | 8.5 KiB | 2022-Feb-27 13:09 |
09. L 5 Cyber Threats.mp4 | 35.4 MiB | 2022-Feb-27 13:09 |
09. L 5 Cyber Threats.vtt | 7.7 KiB | 2022-Feb-27 13:09 |
10. LAB Deploying DoS Attacks-de.vtt | 3.5 KiB | 2022-Feb-27 13:09 |
10. LAB Deploying DoS Attacks-es-MX.vtt | 3.4 KiB | 2022-Feb-27 13:09 |
10. LAB Deploying DoS Attacks-fr.vtt | 3.5 KiB | 2022-Feb-27 13:09 |
10. LAB Deploying DoS Attacks-pt.vtt | 3.4 KiB | 2022-Feb-27 13:09 |
10. LAB Deploying DoS Attacks.mp4 | 14.6 MiB | 2022-Feb-27 13:09 |
10. LAB Deploying DoS Attacks.vtt | 3.1 KiB | 2022-Feb-27 13:09 |
11. L 6 Network Essantials-de.vtt | 27.9 KiB | 2022-Feb-27 13:09 |
11. L 6 Network Essantials-es-MX.vtt | 26.8 KiB | 2022-Feb-27 13:09 |
11. L 6 Network Essantials-fr.vtt | 27.8 KiB | 2022-Feb-27 13:09 |
11. L 6 Network Essantials-pt.vtt | 26.5 KiB | 2022-Feb-27 13:09 |
11. L 6 Network Essantials.mp4 | 92.2 MiB | 2022-Feb-27 13:09 |
11. L 6 Network Essantials.vtt | 24.5 KiB | 2022-Feb-27 13:09 |
12. LAB Network Protocol Analyze-de.vtt | 3.2 KiB | 2022-Feb-27 13:09 |
12. LAB Network Protocol Analyze-es-MX.vtt | 3.1 KiB | 2022-Feb-27 13:09 |
12. LAB Network Protocol Analyze-fr.vtt | 3.2 KiB | 2022-Feb-27 13:09 |
12. LAB Network Protocol Analyze-pt.vtt | 3.1 KiB | 2022-Feb-27 13:09 |
12. LAB Network Protocol Analyze.mp4 | 74.0 MiB | 2022-Feb-27 13:09 |
12. LAB Network Protocol Analyze.vtt | 2.8 KiB | 2022-Feb-27 13:09 |
13. L 7 Defence in Depth-de.vtt | 3.5 KiB | 2022-Feb-27 13:09 |
13. L 7 Defence in Depth-es-MX.vtt | 3.3 KiB | 2022-Feb-27 13:09 |
13. L 7 Defence in Depth-fr.vtt | 3.5 KiB | 2022-Feb-27 13:09 |
13. L 7 Defence in Depth-pt.vtt | 3.3 KiB | 2022-Feb-27 13:09 |
13. L 7 Defence in Depth.mp4 | 8.5 MiB | 2022-Feb-27 13:09 |
13. L 7 Defence in Depth.vtt | 3.0 KiB | 2022-Feb-27 13:09 |
14. L 8 Network Security Technologies Firewall-de.vtt | 10.8 KiB | 2022-Feb-27 13:09 |
14. L 8 Network Security Technologies Firewall-es-MX.vtt | 10.1 KiB | 2022-Feb-27 13:10 |
14. L 8 Network Security Technologies Firewall-fr.vtt | 10.6 KiB | 2022-Feb-27 13:10 |
14. L 8 Network Security Technologies Firewall-pt.vtt | 10.0 KiB | 2022-Feb-27 13:10 |
14. L 8 Network Security Technologies Firewall.mp4 | 29.6 MiB | 2022-Feb-27 13:10 |
14. L 8 Network Security Technologies Firewall.vtt | 9.3 KiB | 2022-Feb-27 13:10 |
15. LAB PfSense Firewall Practices Part-1 Configuring the PfSense and Home Lab-de.vtt | 3.1 KiB | 2022-Feb-27 13:10 |
15. LAB PfSense Firewall Practices Part-1 Configuring the PfSense and Home Lab-es-MX.vtt | 2.9 KiB | 2022-Feb-27 13:10 |
15. LAB PfSense Firewall Practices Part-1 Configuring the PfSense and Home Lab-fr.vtt | 3.1 KiB | 2022-Feb-27 13:10 |
15. LAB PfSense Firewall Practices Part-1 Configuring the PfSense and Home Lab-pt.vtt | 3.0 KiB | 2022-Feb-27 13:10 |
15. LAB PfSense Firewall Practices Part-1 Configuring the PfSense and Home Lab.mp4 | 57.5 MiB | 2022-Feb-27 13:10 |
15. LAB PfSense Firewall Practices Part-1 Configuring the PfSense and Home Lab.vtt | 2.7 KiB | 2022-Feb-27 13:10 |
16. LAB FWs Part 2 Scenarios-de.vtt | 9.8 KiB | 2022-Feb-27 13:10 |
16. LAB FWs Part 2 Scenarios-es-MX.vtt | 9.0 KiB | 2022-Feb-27 13:10 |
16. LAB FWs Part 2 Scenarios-fr.vtt | 9.5 KiB | 2022-Feb-27 13:10 |
16. LAB FWs Part 2 Scenarios-pt.vtt | 9.0 KiB | 2022-Feb-27 13:10 |
16. LAB FWs Part 2 Scenarios.mp4 | 62.0 MiB | 2022-Feb-27 13:10 |
16. LAB FWs Part 2 Scenarios.vtt | 8.4 KiB | 2022-Feb-27 13:10 |
17. L 9 Network Security Devices IDS IPS-de.vtt | 6.2 KiB | 2022-Feb-27 13:10 |
17. L 9 Network Security Devices IDS IPS-es-MX.vtt | 5.9 KiB | 2022-Feb-27 13:10 |
17. L 9 Network Security Devices IDS IPS-fr.vtt | 6.2 KiB | 2022-Feb-27 13:10 |
17. L 9 Network Security Devices IDS IPS-pt.vtt | 6.0 KiB | 2022-Feb-27 13:10 |
17. L 9 Network Security Devices IDS IPS.mp4 | 22.6 MiB | 2022-Feb-27 13:10 |
17. L 9 Network Security Devices IDS IPS.vtt | 5.4 KiB | 2022-Feb-27 13:10 |
18. LAB IDS Practices-de.vtt | 8.4 KiB | 2022-Feb-27 13:10 |
18. LAB IDS Practices-es-MX.vtt | 8.0 KiB | 2022-Feb-27 13:10 |
18. LAB IDS Practices-fr.vtt | 8.3 KiB | 2022-Feb-27 13:10 |
18. LAB IDS Practices-pt.vtt | 7.9 KiB | 2022-Feb-27 13:10 |
18. LAB IDS Practices.mp4 | 64.2 MiB | 2022-Feb-27 13:10 |
18. LAB IDS Practices.vtt | 7.2 KiB | 2022-Feb-27 13:10 |
19. LAB IDS Practices part 2-de.vtt | 5.4 KiB | 2022-Feb-27 13:10 |
19. LAB IDS Practices part 2-es-MX.vtt | 5.1 KiB | 2022-Feb-27 13:10 |
19. LAB IDS Practices part 2-fr.vtt | 5.4 KiB | 2022-Feb-27 13:10 |
19. LAB IDS Practices part 2-pt.vtt | 5.1 KiB | 2022-Feb-27 13:10 |
19. LAB IDS Practices part 2.mp4 | 50.8 MiB | 2022-Feb-27 13:11 |
19. LAB IDS Practices part 2.vtt | 4.7 KiB | 2022-Feb-27 13:10 |
20. L 10 Network Security Devices WAF-de.vtt | 6.3 KiB | 2022-Feb-27 13:11 |
20. L 10 Network Security Devices WAF-es-MX.vtt | 6.0 KiB | 2022-Feb-27 13:11 |
20. L 10 Network Security Devices WAF-fr.vtt | 6.2 KiB | 2022-Feb-27 13:11 |
20. L 10 Network Security Devices WAF-pt.vtt | 6.1 KiB | 2022-Feb-27 13:11 |
20. L 10 Network Security Devices WAF.mp4 | 21.1 MiB | 2022-Feb-27 13:11 |
20. L 10 Network Security Devices WAF.vtt | 5.6 KiB | 2022-Feb-27 13:11 |
21. LAB Proxies-de.vtt | 4.4 KiB | 2022-Feb-27 13:11 |
21. LAB Proxies-es-MX.vtt | 4.2 KiB | 2022-Feb-27 13:11 |
21. LAB Proxies-fr.vtt | 4.4 KiB | 2022-Feb-27 13:11 |
21. LAB Proxies-pt.vtt | 4.3 KiB | 2022-Feb-27 13:11 |
21. LAB Proxies.mp4 | 36.6 MiB | 2022-Feb-27 13:11 |
21. LAB Proxies.vtt | 3.9 KiB | 2022-Feb-27 13:11 |
22. L 11 URL Filtering-de.vtt | 2.5 KiB | 2022-Feb-27 13:11 |
22. L 11 URL Filtering-es-MX.vtt | 2.4 KiB | 2022-Feb-27 13:11 |
22. L 11 URL Filtering-fr.vtt | 2.5 KiB | 2022-Feb-27 13:11 |
22. L 11 URL Filtering-pt.vtt | 2.4 KiB | 2022-Feb-27 13:11 |
22. L 11 URL Filtering.mp4 | 8.5 MiB | 2022-Feb-27 13:11 |
22. L 11 URL Filtering.vtt | 2.1 KiB | 2022-Feb-27 13:11 |
23. LAB Pfsense Ngblock Practice-de.vtt | 7.1 KiB | 2022-Feb-27 13:11 |
23. LAB Pfsense Ngblock Practice-es-MX.vtt | 6.7 KiB | 2022-Feb-27 13:11 |
23. LAB Pfsense Ngblock Practice-fr.vtt | 7.1 KiB | 2022-Feb-27 13:11 |
23. LAB Pfsense Ngblock Practice-pt.vtt | 6.7 KiB | 2022-Feb-27 13:11 |
23. LAB Pfsense Ngblock Practice.mp4 | 74.1 MiB | 2022-Feb-27 13:11 |
23. LAB Pfsense Ngblock Practice.vtt | 6.1 KiB | 2022-Feb-27 13:11 |
24. L 12 UTMs-de.vtt | 4.9 KiB | 2022-Feb-27 13:11 |
24. L 12 UTMs-es-MX.vtt | 4.7 KiB | 2022-Feb-27 13:11 |
24. L 12 UTMs-fr.vtt | 4.9 KiB | 2022-Feb-27 13:11 |
24. L 12 UTMs-pt.vtt | 4.6 KiB | 2022-Feb-27 13:11 |
24. L 12 UTMs.mp4 | 22.4 MiB | 2022-Feb-27 13:11 |
24. L 12 UTMs.vtt | 4.3 KiB | 2022-Feb-27 13:11 |
25. L 13 NACs-de.vtt | 3.5 KiB | 2022-Feb-27 13:11 |
25. L 13 NACs-es-MX.vtt | 3.3 KiB | 2022-Feb-27 13:11 |
25. L 13 NACs-fr.vtt | 3.4 KiB | 2022-Feb-27 13:11 |
25. L 13 NACs-pt.vtt | 3.2 KiB | 2022-Feb-27 13:11 |
25. L 13 NACs.mp4 | 17.1 MiB | 2022-Feb-27 13:11 |
25. L 13 NACs.vtt | 2.9 KiB | 2022-Feb-27 13:11 |
26. L 14 Honetpods-de.vtt | 2.0 KiB | 2022-Feb-27 13:11 |
26. L 14 Honetpods-es-MX.vtt | 1.9 KiB | 2022-Feb-27 13:11 |
26. L 14 Honetpods-fr.vtt | 2.0 KiB | 2022-Feb-27 13:11 |
26. L 14 Honetpods-pt.vtt | 1.9 KiB | 2022-Feb-27 13:11 |
26. L 14 Honetpods.mp4 | 7.6 MiB | 2022-Feb-27 13:11 |
26. L 14 Honetpods.vtt | 1.8 KiB | 2022-Feb-27 13:11 |
27. LAB Honeypod Practices-de.vtt | 2.9 KiB | 2022-Feb-27 13:11 |
27. LAB Honeypod Practices-es-MX.vtt | 2.8 KiB | 2022-Feb-27 13:11 |
27. LAB Honeypod Practices-fr.vtt | 3.0 KiB | 2022-Feb-27 13:11 |
27. LAB Honeypod Practices-pt.vtt | 2.7 KiB | 2022-Feb-27 13:11 |
27. LAB Honeypod Practices.mp4 | 27.5 MiB | 2022-Feb-27 13:11 |
27. LAB Honeypod Practices.vtt | 2.6 KiB | 2022-Feb-27 13:11 |
28. L 15 IP Security Protocol-de.vtt | 6.8 KiB | 2022-Feb-27 13:11 |
28. L 15 IP Security Protocol-es-MX.vtt | 6.2 KiB | 2022-Feb-27 13:11 |
28. L 15 IP Security Protocol-fr.vtt | 6.5 KiB | 2022-Feb-27 13:11 |
28. L 15 IP Security Protocol-pt.vtt | 6.2 KiB | 2022-Feb-27 13:11 |
28. L 15 IP Security Protocol.mp4 | 19.7 MiB | 2022-Feb-27 13:12 |
28. L 15 IP Security Protocol.vtt | 5.7 KiB | 2022-Feb-27 13:11 |
29. LAB VPN Practices-de.vtt | 6.6 KiB | 2022-Feb-27 13:12 |
29. LAB VPN Practices-es-MX.vtt | 6.2 KiB | 2022-Feb-27 13:12 |
29. LAB VPN Practices-fr.vtt | 6.4 KiB | 2022-Feb-27 13:12 |
29. LAB VPN Practices-pt.vtt | 6.2 KiB | 2022-Feb-27 13:12 |
29. LAB VPN Practices.mp4 | 58.4 MiB | 2022-Feb-27 13:12 |
29. LAB VPN Practices.vtt | 5.8 KiB | 2022-Feb-27 13:12 |
30. L 16 Wireless Network Security-de.vtt | 5.2 KiB | 2022-Feb-27 13:12 |
30. L 16 Wireless Network Security-es-MX.vtt | 5.0 KiB | 2022-Feb-27 13:12 |
30. L 16 Wireless Network Security-fr.vtt | 5.1 KiB | 2022-Feb-27 13:12 |
30. L 16 Wireless Network Security-pt.vtt | 4.9 KiB | 2022-Feb-27 13:12 |
30. L 16 Wireless Network Security.mp4 | 17.9 MiB | 2022-Feb-27 13:12 |
30. L 16 Wireless Network Security.vtt | 4.5 KiB | 2022-Feb-27 13:12 |
31. L 17 Endpoint Security-de.vtt | 4.5 KiB | 2022-Feb-27 13:12 |
31. L 17 Endpoint Security-es-MX.vtt | 4.3 KiB | 2022-Feb-27 13:12 |
31. L 17 Endpoint Security-fr.vtt | 4.6 KiB | 2022-Feb-27 13:12 |
31. L 17 Endpoint Security-pt.vtt | 4.3 KiB | 2022-Feb-27 13:12 |
31. L 17 Endpoint Security.mp4 | 16.3 MiB | 2022-Feb-27 13:12 |
31. L 17 Endpoint Security.vtt | 3.9 KiB | 2022-Feb-27 13:12 |
32. Evolution of Endpoint Security Technologies-de.vtt | 6.8 KiB | 2022-Feb-27 13:12 |
32. Evolution of Endpoint Security Technologies-es-MX.vtt | 6.3 KiB | 2022-Feb-27 13:12 |
32. Evolution of Endpoint Security Technologies-fr.vtt | 6.7 KiB | 2022-Feb-27 13:12 |
32. Evolution of Endpoint Security Technologies-pt.vtt | 6.2 KiB | 2022-Feb-27 13:12 |
32. Evolution of Endpoint Security Technologies.mp4 | 19.6 MiB | 2022-Feb-27 13:12 |
32. Evolution of Endpoint Security Technologies.vtt | 5.7 KiB | 2022-Feb-27 13:12 |
33. LAB Malware Analysis with Virustotal-de.vtt | 4.4 KiB | 2022-Feb-27 13:12 |
33. LAB Malware Analysis with Virustotal-es-MX.vtt | 4.1 KiB | 2022-Feb-27 13:12 |
33. LAB Malware Analysis with Virustotal-fr.vtt | 4.5 KiB | 2022-Feb-27 13:12 |
33. LAB Malware Analysis with Virustotal-pt.vtt | 4.1 KiB | 2022-Feb-27 13:12 |
33. LAB Malware Analysis with Virustotal.mp4 | 53.3 MiB | 2022-Feb-27 13:12 |
33. LAB Malware Analysis with Virustotal.vtt | 3.8 KiB | 2022-Feb-27 13:12 |
34. L 19 Endpoint Hardening-de.vtt | 6.8 KiB | 2022-Feb-27 13:12 |
34. L 19 Endpoint Hardening-es-MX.vtt | 6.7 KiB | 2022-Feb-27 13:12 |
34. L 19 Endpoint Hardening-fr.vtt | 7.0 KiB | 2022-Feb-27 13:12 |
34. L 19 Endpoint Hardening-pt.vtt | 6.7 KiB | 2022-Feb-27 13:12 |
34. L 19 Endpoint Hardening.mp4 | 21.1 MiB | 2022-Feb-27 13:12 |
34. L 19 Endpoint Hardening.vtt | 6.0 KiB | 2022-Feb-27 13:12 |
35. LAB Hardening a Linux Endpoint with IPTABLES-de.vtt | 4.3 KiB | 2022-Feb-27 13:12 |
35. LAB Hardening a Linux Endpoint with IPTABLES-es-MX.vtt | 4.0 KiB | 2022-Feb-27 13:12 |
35. LAB Hardening a Linux Endpoint with IPTABLES-fr.vtt | 4.3 KiB | 2022-Feb-27 13:12 |
35. LAB Hardening a Linux Endpoint with IPTABLES-pt.vtt | 4.1 KiB | 2022-Feb-27 13:12 |
35. LAB Hardening a Linux Endpoint with IPTABLES.mp4 | 18.4 MiB | 2022-Feb-27 13:12 |
35. LAB Hardening a Linux Endpoint with IPTABLES.vtt | 3.6 KiB | 2022-Feb-27 13:12 |
36. L 20 Endpoint Security Logging-de.vtt | 5.8 KiB | 2022-Feb-27 13:12 |
36. L 20 Endpoint Security Logging-es-MX.vtt | 5.7 KiB | 2022-Feb-27 13:12 |
36. L 20 Endpoint Security Logging-fr.vtt | 6.2 KiB | 2022-Feb-27 13:12 |
36. L 20 Endpoint Security Logging-pt.vtt | 5.5 KiB | 2022-Feb-27 13:12 |
36. L 20 Endpoint Security Logging.mp4 | 20.2 MiB | 2022-Feb-27 13:12 |
36. L 20 Endpoint Security Logging.vtt | 4.9 KiB | 2022-Feb-27 13:12 |
37. LAB security logging-de.vtt | 5.4 KiB | 2022-Feb-27 13:13 |
37. LAB security logging-es-MX.vtt | 5.4 KiB | 2022-Feb-27 13:13 |
37. LAB security logging-fr.vtt | 5.8 KiB | 2022-Feb-27 13:13 |
37. LAB security logging-pt.vtt | 5.3 KiB | 2022-Feb-27 13:13 |
37. LAB security logging.mp4 | 109.7 MiB | 2022-Feb-27 13:13 |
37. LAB security logging.vtt | 4.7 KiB | 2022-Feb-27 13:13 |
38. L 21 Mobile Security-de.vtt | 4.5 KiB | 2022-Feb-27 13:13 |
38. L 21 Mobile Security-es-MX.vtt | 4.5 KiB | 2022-Feb-27 13:13 |
38. L 21 Mobile Security-fr.vtt | 4.7 KiB | 2022-Feb-27 13:13 |
38. L 21 Mobile Security-pt.vtt | 4.4 KiB | 2022-Feb-27 13:13 |
38. L 21 Mobile Security.mp4 | 16.2 MiB | 2022-Feb-27 13:13 |
38. L 21 Mobile Security.vtt | 4.0 KiB | 2022-Feb-27 13:13 |
39. L 22 App Security-de.vtt | 3.8 KiB | 2022-Feb-27 13:13 |
39. L 22 App Security-es-MX.vtt | 3.6 KiB | 2022-Feb-27 13:13 |
39. L 22 App Security-fr.vtt | 3.9 KiB | 2022-Feb-27 13:13 |
39. L 22 App Security-pt.vtt | 3.6 KiB | 2022-Feb-27 13:13 |
39. L 22 App Security.mp4 | 15.6 MiB | 2022-Feb-27 13:13 |
39. L 22 App Security.vtt | 3.3 KiB | 2022-Feb-27 13:13 |
40. L 23 Webapp Security-de.vtt | 3.7 KiB | 2022-Feb-27 13:13 |
40. L 23 Webapp Security-es-MX.vtt | 3.6 KiB | 2022-Feb-27 13:13 |
40. L 23 Webapp Security-fr.vtt | 3.8 KiB | 2022-Feb-27 13:13 |
40. L 23 Webapp Security-pt.vtt | 3.6 KiB | 2022-Feb-27 13:13 |
40. L 23 Webapp Security.mp4 | 15.4 MiB | 2022-Feb-27 13:13 |
40. L 23 Webapp Security.vtt | 3.2 KiB | 2022-Feb-27 13:13 |
41. LAB Discovering Web Applicaiton Vulnerabilities-de.vtt | 4.0 KiB | 2022-Feb-27 13:13 |
41. LAB Discovering Web Applicaiton Vulnerabilities-es-MX.vtt | 4.1 KiB | 2022-Feb-27 13:13 |
41. LAB Discovering Web Applicaiton Vulnerabilities-fr.vtt | 4.2 KiB | 2022-Feb-27 13:13 |
41. LAB Discovering Web Applicaiton Vulnerabilities-pt.vtt | 4.1 KiB | 2022-Feb-27 13:13 |
41. LAB Discovering Web Applicaiton Vulnerabilities.mp4 | 60.9 MiB | 2022-Feb-27 13:13 |
41. LAB Discovering Web Applicaiton Vulnerabilities.vtt | 3.7 KiB | 2022-Feb-27 13:13 |
42. L 24 Data Security-de.vtt | 9.7 KiB | 2022-Feb-27 13:13 |
42. L 24 Data Security-es-MX.vtt | 9.4 KiB | 2022-Feb-27 13:13 |
42. L 24 Data Security-fr.vtt | 9.8 KiB | 2022-Feb-27 13:13 |
42. L 24 Data Security-pt.vtt | 9.2 KiB | 2022-Feb-27 13:13 |
42. L 24 Data Security.mp4 | 34.6 MiB | 2022-Feb-27 13:13 |
42. L 24 Data Security.vtt | 8.3 KiB | 2022-Feb-27 13:13 |
43. L 25 Teams in Cybersecurity-de.vtt | 6.0 KiB | 2022-Feb-27 13:13 |
43. L 25 Teams in Cybersecurity-es-MX.vtt | 5.6 KiB | 2022-Feb-27 13:13 |
43. L 25 Teams in Cybersecurity-fr.vtt | 5.9 KiB | 2022-Feb-27 13:13 |
43. L 25 Teams in Cybersecurity-pt.vtt | 5.6 KiB | 2022-Feb-27 13:13 |
43. L 25 Teams in Cybersecurity.mp4 | 15.3 MiB | 2022-Feb-27 13:13 |
43. L 25 Teams in Cybersecurity.vtt | 5.1 KiB | 2022-Feb-27 13:13 |
44. L 26 SOC Operations-de.vtt | 12.9 KiB | 2022-Feb-27 13:13 |
44. L 26 SOC Operations-es-MX.vtt | 11.8 KiB | 2022-Feb-27 13:13 |
44. L 26 SOC Operations-fr.vtt | 12.5 KiB | 2022-Feb-27 13:13 |
44. L 26 SOC Operations-pt.vtt | 11.7 KiB | 2022-Feb-27 13:13 |
44. L 26 SOC Operations.mp4 | 46.8 MiB | 2022-Feb-27 13:14 |
44. L 26 SOC Operations.vtt | 10.7 KiB | 2022-Feb-27 13:13 |
45. L 27 PENTEST-de.vtt | 6.0 KiB | 2022-Feb-27 13:14 |
45. L 27 PENTEST-es-MX.vtt | 5.9 KiB | 2022-Feb-27 13:14 |
45. L 27 PENTEST-fr.vtt | 6.1 KiB | 2022-Feb-27 13:14 |
45. L 27 PENTEST-pt.vtt | 5.9 KiB | 2022-Feb-27 13:14 |
45. L 27 PENTEST.mp4 | 25.6 MiB | 2022-Feb-27 13:14 |
45. L 27 PENTEST.vtt | 5.4 KiB | 2022-Feb-27 13:14 |
46. LAB OSINT.mp4 | 112.4 MiB | 2022-Feb-27 13:14 |
47. L 28 Adversary Emulation-de.vtt | 12.7 KiB | 2022-Feb-27 13:14 |
47. L 28 Adversary Emulation-es-MX.vtt | 11.9 KiB | 2022-Feb-27 13:14 |
47. L 28 Adversary Emulation-fr.vtt | 12.8 KiB | 2022-Feb-27 13:14 |
47. L 28 Adversary Emulation-pt.vtt | 11.9 KiB | 2022-Feb-27 13:14 |
47. L 28 Adversary Emulation.mp4 | 43.4 MiB | 2022-Feb-27 13:14 |
47. L 28 Adversary Emulation.vtt | 11.2 KiB | 2022-Feb-27 13:14 |
48. L 29 Crptography-de.vtt | 11.9 KiB | 2022-Feb-27 13:14 |
48. L 29 Crptography-es-MX.vtt | 11.1 KiB | 2022-Feb-27 13:14 |
48. L 29 Crptography-fr.vtt | 11.9 KiB | 2022-Feb-27 13:14 |
48. L 29 Crptography-pt.vtt | 11.1 KiB | 2022-Feb-27 13:14 |
48. L 29 Crptography.mp4 | 30.8 MiB | 2022-Feb-27 13:14 |
48. L 29 Crptography.vtt | 10.2 KiB | 2022-Feb-27 13:14 |
49. LAB Cryptology with Steganography-de.vtt | 2.9 KiB | 2022-Feb-27 13:14 |
49. LAB Cryptology with Steganography-es-MX.vtt | 2.8 KiB | 2022-Feb-27 13:14 |
49. LAB Cryptology with Steganography-fr.vtt | 2.9 KiB | 2022-Feb-27 13:14 |
49. LAB Cryptology with Steganography-pt.vtt | 2.7 KiB | 2022-Feb-27 13:14 |
49. LAB Cryptology with Steganography.mp4 | 20.2 MiB | 2022-Feb-27 13:14 |
49. LAB Cryptology with Steganography.vtt | 2.5 KiB | 2022-Feb-27 13:14 |
50. L 30 Cyber Hygiene-de.vtt | 6.1 KiB | 2022-Feb-27 13:14 |
50. L 30 Cyber Hygiene-es-MX.vtt | 5.9 KiB | 2022-Feb-27 13:14 |
50. L 30 Cyber Hygiene-fr.vtt | 6.2 KiB | 2022-Feb-27 13:14 |
50. L 30 Cyber Hygiene-pt.vtt | 5.9 KiB | 2022-Feb-27 13:14 |
50. L 30 Cyber Hygiene.mp4 | 16.0 MiB | 2022-Feb-27 13:15 |
50. L 30 Cyber Hygiene.vtt | 5.3 KiB | 2022-Feb-27 13:14 |
51. LAB- Testing Awareness Deploying Phishing Campaigs with Gophish-de.vtt | 5.8 KiB | 2022-Feb-27 13:15 |
51. LAB- Testing Awareness Deploying Phishing Campaigs with Gophish-es-MX.vtt | 5.6 KiB | 2022-Feb-27 13:15 |
51. LAB- Testing Awareness Deploying Phishing Campaigs with Gophish-fr.vtt | 5.8 KiB | 2022-Feb-27 13:15 |
51. LAB- Testing Awareness Deploying Phishing Campaigs with Gophish-pt.vtt | 5.5 KiB | 2022-Feb-27 13:15 |
51. LAB- Testing Awareness Deploying Phishing Campaigs with Gophish.mp4 | 88.5 MiB | 2022-Feb-27 13:15 |
51. LAB- Testing Awareness Deploying Phishing Campaigs with Gophish.vtt | 5.0 KiB | 2022-Feb-27 13:15 |
52. LAB-Vulnerablity Scanning with NESSUS Essetials (Free for 16 IPs)essus-de.vtt | 7.3 KiB | 2022-Feb-27 13:15 |
52. LAB-Vulnerablity Scanning with NESSUS Essetials (Free for 16 IPs)essus-es-MX.vtt | 7.3 KiB | 2022-Feb-27 13:15 |
52. LAB-Vulnerablity Scanning with NESSUS Essetials (Free for 16 IPs)essus-fr.vtt | 7.7 KiB | 2022-Feb-27 13:15 |
52. LAB-Vulnerablity Scanning with NESSUS Essetials (Free for 16 IPs)essus-pt.vtt | 7.3 KiB | 2022-Feb-27 13:15 |
52. LAB-Vulnerablity Scanning with NESSUS Essetials (Free for 16 IPs)essus.mp4 | 74.5 MiB | 2022-Feb-27 13:16 |
52. LAB-Vulnerablity Scanning with NESSUS Essetials (Free for 16 IPs)essus.vtt | 6.5 KiB | 2022-Feb-27 13:15 |
53. L 31 compliance-de.vtt | 9.8 KiB | 2022-Feb-27 13:16 |
53. L 31 compliance-es-MX.vtt | 9.1 KiB | 2022-Feb-27 13:16 |
53. L 31 compliance-fr.vtt | 9.7 KiB | 2022-Feb-27 13:16 |
53. L 31 compliance-pt.vtt | 9.2 KiB | 2022-Feb-27 13:16 |
53. L 31 compliance.mp4 | 30.5 MiB | 2022-Feb-27 13:16 |
53. L 31 compliance.vtt | 8.3 KiB | 2022-Feb-27 13:16 |
54. L 32 Risk Management-de.vtt | 6.6 KiB | 2022-Feb-27 13:16 |
54. L 32 Risk Management-es-MX.vtt | 6.0 KiB | 2022-Feb-27 13:16 |
54. L 32 Risk Management-fr.vtt | 6.4 KiB | 2022-Feb-27 13:16 |
54. L 32 Risk Management-pt.vtt | 6.0 KiB | 2022-Feb-27 13:16 |
54. L 32 Risk Management.mp4 | 22.8 MiB | 2022-Feb-27 13:16 |
54. L 32 Risk Management.vtt | 5.5 KiB | 2022-Feb-27 13:16 |
55. LAB Risk Management Sytem-de.vtt | 5.6 KiB | 2022-Feb-27 13:16 |
55. LAB Risk Management Sytem-es-MX.vtt | 5.3 KiB | 2022-Feb-27 13:16 |
55. LAB Risk Management Sytem-fr.vtt | 5.7 KiB | 2022-Feb-27 13:16 |
55. LAB Risk Management Sytem-pt.vtt | 5.3 KiB | 2022-Feb-27 13:16 |
55. LAB Risk Management Sytem.mp4 | 105.5 MiB | 2022-Feb-27 13:16 |
55. LAB Risk Management Sytem.vtt | 4.8 KiB | 2022-Feb-27 13:16 |
56. L 33 Security Controls-de.vtt | 7.9 KiB | 2022-Feb-27 13:16 |
56. L 33 Security Controls-es-MX.vtt | 7.5 KiB | 2022-Feb-27 13:16 |
56. L 33 Security Controls-fr.vtt | 8.1 KiB | 2022-Feb-27 13:16 |
56. L 33 Security Controls-pt.vtt | 7.6 KiB | 2022-Feb-27 13:16 |
56. L 33 Security Controls.mp4 | 29.5 MiB | 2022-Feb-27 13:16 |
56. L 33 Security Controls.vtt | 6.9 KiB | 2022-Feb-27 13:16 |
57. CIS LAB-de.vtt | 3.4 KiB | 2022-Feb-27 13:16 |
57. CIS LAB-es-MX.vtt | 3.2 KiB | 2022-Feb-27 13:16 |
57. CIS LAB-fr.vtt | 3.3 KiB | 2022-Feb-27 13:16 |
57. CIS LAB-pt.vtt | 3.2 KiB | 2022-Feb-27 13:16 |
57. CIS LAB.mp4 | 47.9 MiB | 2022-Feb-27 13:16 |
57. CIS LAB.vtt | 2.8 KiB | 2022-Feb-27 13:16 |
58. Main Cybersecurity Career Paths-de.vtt | 5.9 KiB | 2022-Feb-27 13:16 |
58. Main Cybersecurity Career Paths-es-MX.vtt | 5.7 KiB | 2022-Feb-27 13:16 |
58. Main Cybersecurity Career Paths-fr.vtt | 6.1 KiB | 2022-Feb-27 13:16 |
58. Main Cybersecurity Career Paths-pt.vtt | 5.8 KiB | 2022-Feb-27 13:16 |
58. Main Cybersecurity Career Paths.mp4 | 16.3 MiB | 2022-Feb-27 13:16 |
58. Main Cybersecurity Career Paths.vtt | 5.1 KiB | 2022-Feb-27 13:16 |