18 - Security/4 - Detecting Trojans Using a Sandbox.encrypted.m4a1.6MB
18 - Security/4 - Detecting Trojans Using a Sandbox.encrypted.mp413.57MB
2 - Preparation - Linux Basics/1 - Basic Overview Of Kali Linux.encrypted.m4a2.53MB
2 - Preparation - Linux Basics/1 - Basic Overview Of Kali Linux.encrypted.mp413.44MB
2 - Preparation - Linux Basics/2 - The Linux Terminal & Basic Linux Commands.encrypted.m4a6.41MB
2 - Preparation - Linux Basics/2 - The Linux Terminal & Basic Linux Commands.encrypted.mp4145.76MB
3 - Information Gathering/1 - Introduction.encrypted.m4a939.91KB
3 - Information Gathering/1 - Introduction.encrypted.mp44.69MB
4 - Information Gathering - Gathering Info About A Company Website/1 - Maltego Overview.mp4104.63MB
4 - Information Gathering - Gathering Info About A Company Website/2 - Discovering Domain Info & Emails Associated With Target.encrypted.m4a3.62MB
4 - Information Gathering - Gathering Info About A Company Website/2 - Discovering Domain Info & Emails Associated With Target.encrypted.mp412.04MB
4 - Information Gathering - Gathering Info About A Company Website/3 - Discovering Information About Hosting Company, Support Team Emails & Admin Email.encrypted.m4a3.39MB
4 - Information Gathering - Gathering Info About A Company Website/3 - Discovering Information About Hosting Company, Support Team Emails & Admin Email.encrypted.mp418.87MB
4 - Information Gathering - Gathering Info About A Company Website/4 - Discovering Files, Links, Websites & Other Companies Related To Target.encrypted.m4a2.55MB
4 - Information Gathering - Gathering Info About A Company Website/4 - Discovering Files, Links, Websites & Other Companies Related To Target.encrypted.mp419.94MB
4 - Information Gathering - Gathering Info About A Company Website/5 - Using The Gathered Info To Build An Attack Strategy.encrypted.m4a2.09MB
4 - Information Gathering - Gathering Info About A Company Website/5 - Using The Gathered Info To Build An Attack Strategy.encrypted.mp49.26MB
5 - Information Gathering - Gathering Info About A Person/1 - Discovering Websites, Links & Social Networking Accounts.encrypted.m4a4.63MB
5 - Information Gathering - Gathering Info About A Person/1 - Discovering Websites, Links & Social Networking Accounts.encrypted.mp416.7MB
5 - Information Gathering - Gathering Info About A Person/2 - Discovering Twitter Friends & Associated Accounts.encrypted.m4a2.42MB
5 - Information Gathering - Gathering Info About A Person/2 - Discovering Twitter Friends & Associated Accounts.encrypted.mp413.33MB
5 - Information Gathering - Gathering Info About A Person/3 - Discovering Emails Of The Target's Friends.encrypted.m4a2.28MB
5 - Information Gathering - Gathering Info About A Person/3 - Discovering Emails Of The Target's Friends.encrypted.mp412.61MB
5 - Information Gathering - Gathering Info About A Person/4 - Analysing The Gathered Info & Building An Attack Strategy.encrypted.m4a4.25MB
5 - Information Gathering - Gathering Info About A Person/4 - Analysing The Gathered Info & Building An Attack Strategy.encrypted.mp414.92MB
6 - Windows Malware/1 - Introduction.mp45.05MB
6 - Windows Malware/2 - Installing Windows As a Virtual Machine.encrypted.m4a3.01MB
6 - Windows Malware/2 - Installing Windows As a Virtual Machine.encrypted.mp420.38MB