~Get Your Files Here !/01 Introduction/001 Who Am I.mp46.57MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/001 What is Cybersecurity _.mp433.17MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/002 What is Ethical Hacking _.mp424.57MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/003 What is Penetrating Testing _.mp414.99MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/004 Difference Between Ethical Hacking and Penetrating Testing.mp413.6MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/005 Purpose of Studying Ethical Hacking and Penetrating Testing.mp423.16MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/006 Scope For Ethical Hackers and Penetrating Testers.mp417.68MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/007 Do Ethical Hackers And Penetrating Testers Need Permission_.mp46.24MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/008 Who Conduct it _.mp425.15MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/009 Who should You Choose _.mp419.63MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/010 Closure.mp422.53MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/011 Setting up Labs.mp4161.67MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/001 Goals and Learning Objectives.mp418.75MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/002 Protect What You Value.mp489.35MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/003 What is Privacy, Anonymity and Pseudonymity _.mp4151.45MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/004 Security, Vulnerabilities, Threats and Adversaries.mp4112.36MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/005 Asset Selection.mp490.14MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/006 Threat Modelling And Risk Assessment.mp4150.99MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/007 Security,Anonymity and Privacy.mp456.99MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/008 Confidentiality, Integrity and Availability - (Security Attributes).mp4135.21MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/009 Defence in Depth.mp432.57MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/010 Zero Trust Model.mp481.71MB
~Get Your Files Here !/04 Exposing Hackers - Know Your Enemy/001 Goals and Learning Objectives - Know Your Enemy.mp420.81MB
~Get Your Files Here !/04 Exposing Hackers - Know Your Enemy/002 Why You Need Security _.mp4180.96MB