Download link
File List
-
1.1 Describing the CIA Triad.mp4 6.4 MB
1.2 Comparing Security Deployments Network, Endpoint, and Application Security Systems.mp4 12.41 MB
1.3 Comparing Security Deployments Agentless and Agent-based Protections.mp4 11.43 MB
1.4 Comparing Security Deployments Legacy Antivirus and Antimalware.mp4 10.65 MB
1.5 Comparing Security Deployments SIEM, SOAR, and Log Management.mp4 33.63 MB
1.6 Defining Threat Intelligence.mp4 45.58 MB
1.7 Defining Threat Hunting.mp4 28.26 MB
1.8 Understanding Malware Analysis.mp4 28.15 MB
1.9 Interpreting the Output Report of a Malware Analysis Tool.mp4 9.49 MB
1.10 Understanding the Different Threat Actor Types.mp4 5.66 MB
1.11 Defining Run Book Automation (RBA).mp4 8.49 MB
1.12 Defining Reverse Engineering.mp4 9.62 MB
1.13 Understanding the Sliding Window Anomaly Detection.mp4 4.77 MB
2.1 Performing Risk Assessment.mp4 22.15 MB
2.2 Comparing Threats, Vulnerabilities, and Exploits.mp4 24.29 MB
2.3 Understanding Authentication, Authorization, and Accounting.mp4 7.6 MB
2.4 Examining the Access Control Process Terminology and Data Classification.mp4 9.86 MB
2.5 Examining the Access Control Process Data States and Policy Roles.mp4 10.06 MB
2.6 Examining the Access Control Process Security and Access Control Classification.mp4 19.64 MB
2.7 Understanding Discretionary Access Control.mp4 9.22 MB
2.8 Understanding Mandatory Access Control.mp4 10.78 MB
2.9 Understanding Role-based Access Control.mp4 7.94 MB
2.10 Understanding Attribute-based Access Control.mp4 6.31 MB
2.11 Understanding Rule-based Access Control.mp4 20.44 MB
2.12 Understanding Time-based Access Control.mp4 8.15 MB
3.1 Surveying Types of Vulnerabilities.mp4 34.23 MB
3.2 Understanding Passive Reconnaissance and Social Engineering.mp4 27.14 MB
3.3 Understanding Active Reconnaissance Port Scanning and Host Profiling.mp4 29.49 MB
3.4 Understanding Privilege Escalation and Code Execution Attacks.mp4 4.46 MB
3.5 Understanding Backdoors and Man-in-the-Middle Attacks.mp4 11.94 MB
3.6 Understanding Denial of Service Attacks.mp4 9.79 MB
3.7 Surveying Attack Methods for Data Exfiltration.mp4 6.93 MB
3.8 Understanding ARP Cache Poisoning and Route Manipulation Attacks.mp4 14.45 MB
3.9 Understanding Password Attacks.mp4 12.38 MB
3.10 Understanding Wireless Attacks.mp4 10.21 MB
3.11 Exploring Security Evasion Techniques.mp4 17.61 MB
3.12 Identifying the Challenges of Data Visibility in Detection.mp4 22.15 MB
3.13 Identifying Potential Data Loss from Provided Traffic Profiles.mp4 5.32 MB
3.14 Comparing Rule-based Detection vs. Behavioral and Statistical Detection.mp4 26.3 MB
4.1 Understanding the Basic Components of Cryptography.mp4 30.29 MB
4.2 Introducing Public Key Infrastructure.mp4 19.85 MB
4.3 Deciphering Encryption Algorithms.mp4 17.48 MB
4.4 Understanding Hashing Algorithms.mp4 34.66 MB
4.5 Examining Secure Socket Layer and Transport Layer Security.mp4 21.98 MB
4.6 Examining Digital Certificates.mp4 39.03 MB
5.1 Describing Concepts as Documented in NIST.SP800-86.mp4 44.13 MB
5.2 Mapping the Organization Stakeholders Against the NIST IR Categories.mp4 36.19 MB
5.3 Scoping the Incident Response Plan and Process.mp4 41.64 MB
5.4 Understanding Information Sharing and Coordination.mp4 9.72 MB
5.5 Identifying the Incident Response Team Structure.mp4 4.39 MB
5.6 Analyzing Computer Incident Response Teams (CSIRTs).mp4 65.31 MB
5.7 Analyzing Product Security Incident Response Teams (PSIRTs).mp4 34.66 MB
5.8 Surveying Coordination Centers.mp4 16.53 MB
5.9 Analyzing Managed Security Service Providers Incident Response Teams.mp4 10.49 MB
5.10 Introducing the Vocabulary for Event Recording and Incident Sharing (VERIS).mp4 8.43 MB
5.11 Applying the VERIS Schema to Incident Handling.mp4 18.19 MB
5.12 Surveying the VERIS Incident Recording Tool and Other Resources.mp4 5.22 MB
6.1 Describing Endpoint-based Attacks.mp4 33.41 MB
6.2 Understanding Data Normalization.mp4 7.52 MB
6.3 Deconstructing Universal Data Formats.mp4 10.24 MB
6.4 Understanding the 5-tuple Correlation.mp4 5.57 MB
6.5 Performing DNS Analysis.mp4 5.26 MB
6.6 Performing Web Log Analysis.mp4 15.66 MB
6.7 Performing Deterministic and Probabilistic Analysis.mp4 6.09 MB
6.8 Understanding Security Monitoring Fundamentals.mp4 7.46 MB
6.9 Surveying Security Monitoring Tools.mp4 7.02 MB
6.10 Grasping Security Monitoring Operational Challenges.mp4 35.06 MB
7.1 Identifying and Mitigating Reconnaissance.mp4 24.07 MB
7.2 Identifying and Mitigating Weaponization.mp4 10.68 MB
7.3 Identifying and Mitigating Delivery.mp4 7.22 MB
7.4 Identifying and Mitigating Exploitation.mp4 3.14 MB
7.5 Identifying and Mitigating Installation.mp4 9.04 MB
7.6 Identifying and Mitigating Command and Control.mp4 5.07 MB
7.7 Understanding Action on Objectives.mp4 6.08 MB
7.8 Understanding the MITRE ATT&CK Framework.mp4 62.71 MB
8.1 Examining Types of Evidence.mp4 20.88 MB
8.2 Understanding Chain of Custody.mp4 17.63 MB
8.3 Understanding Evidence Collection.mp4 54.51 MB
8.4 Handling Evidence.mp4 15.83 MB
8.5 Examining Asset and Threat Actor Attribution.mp4 13.96 MB
9.1 Examining Host-based Intrusion Detection.mp4 8.64 MB
9.2 Exploring Antimalware and Antivirus.mp4 15.12 MB
9.3 Understanding Host-based Firewalls.mp4 12.86 MB
9.4 Exploring Application-level AllowListsBlockLists.mp4 5.45 MB
9.5 Exploring Systems-based Sandboxing.mp4 15.41 MB
9.6 Understanding Windows Forensics Basics.mp4 37.2 MB
9.7 Surveying Windows Forensics Application Processes.mp4 10.57 MB
9.8 Surveying Windows Forensics Memory.mp4 16.22 MB
9.9 Surveying Windows Forensics The Windows Registry.mp4 20.01 MB
9.10 Surveying Windows Forensics Hard Drives, FAT, and NTFS.mp4 23.03 MB
9.11 Understanding Linux and MAC OS X Forensics Basics.mp4 33.21 MB
9.12 Examining Web Server Logs.mp4 20.89 MB
10.1 Introducing Intrusion Analysis Fundamentals.mp4 32.7 MB
10.2 Examining Packet Captures.mp4 27.52 MB
10.3 Examining Protocol Headers.mp4 8.39 MB
10.4 Analyzing Security Device Data.mp4 17.49 MB
10.5 Differentiating False Positives, False Negatives, True Positives, and True Negatives.mp4 7.56 MB
10.6 Comparing Inline Traffic Interrogation and Taps or Traffic Monitoring.mp4 15.48 MB
10.7 Extracting Files from a TCP Stream when Given a PCAP File and Wireshark.mp4 6.95 MB
10.8 Interpreting Common Artifact Elements from an Event to Identify an Alert.mp4 10.66 MB
11.1 Understanding Authentication.mp4 29.19 MB
11.2 Exploring the RADIUS Protocol.mp4 10.07 MB
11.3 Surveying the TACACS+ Protocol.mp4 6.91 MB
11.4 Understanding Authorization.mp4 7.18 MB
11.5 Surveying Authorization Models.mp4 14.46 MB
11.6 Defining Accounting.mp4 5.78 MB
11.7 Exploring Multifactor Authentication and Single Sign-On.mp4 23.64 MB
11.8 Exploring Examples of Multifactor and Single Sign-On.mp4 6.44 MB
12.1 Defining Network Visibility and Segmentation.mp4 5.92 MB
12.2 Introducing NetFlow and IPFIX.mp4 6.34 MB
12.3 Describing Flexible NetFlow Records.mp4 10.81 MB
12.4 Understanding NetFlow Deployment.mp4 10.08 MB
12.5 Introducing Network Segmentation.mp4 5.11 MB
12.6 Exploring Application-based Segmentation.mp4 5.57 MB
12.7 Describing Network Access with CoA.mp4 4.74 MB
13.1 Configuring and Verifying Network Segmentation Using VLANs and VRF-lite.mp4 12.58 MB
13.2 Configuring and Verifying Port Security.mp4 11.55 MB
13.3 Configuring and Verifying DHCP Snooping.mp4 10.89 MB
13.4 Configuring and Verifying Dynamic ARP Inspection.mp4 15.18 MB
13.5 Exploring and Mitigating Common Layer 2 Threats.mp4 15.04 MB
13.6 Understanding and Configuring BPDU Guard and Root Guard.mp4 6.44 MB
13.7 Understanding and Configuring CDPLLDP.mp4 8.68 MB
13.8 Understanding the Control Plane, Data Plane, and Management Plane.mp4 14.55 MB
13.9 Exploring How to Secure the Management Plane.mp4 13.82 MB
13.10 Exploring How to Secure the Control Plane.mp4 14.58 MB
13.11 Exploring How to Secure the Data Plane.mp4 11.28 MB
14.1 Introducing SDN.mp4 13.57 MB
14.2 Explaining North Bound and South Bound APIs in the SDN Architecture.mp4 9.41 MB
14.3 Introducing Cisco ACI.mp4 17.14 MB
14.4 Introducing Cisco DNA and Cisco DNA Center.mp4 28.5 MB
14.5 Understanding VXLAN and Network Overlays.mp4 9.78 MB
14.6 Understanding Microsegmentation.mp4 8.89 MB
14.7 Surveying Open Source SDN Solutions.mp4 9.8 MB
14.8 Understanding the Threats Against SDN Solutions.mp4 7.23 MB
14.9 Understanding the Security Benefits in SDN Solutions.mp4 6.67 MB
14.10 Introducing Network Programmability.mp4 30.91 MB
14.11 Exploring DevNet and DevNet Resources for Security Automation.mp4 3.74 MB
14.12 Introducing APIs, NETCONF, RESTCONF, and YANG.mp4 37.22 MB
14.13 A Brief Introduction to Git.mp4 24.93 MB
14.14 Exploring pxGrid.mp4 15.55 MB
14.15 Integrating and Automating Security Operations with Cisco Products.mp4 11.01 MB
15.1 Introducing Ethical Hacking and Pen Testing.mp4 20.61 MB
15.2 Exploring Penetration Testing Methodologies.mp4 21.05 MB
15.3 Explaining the Importance of the Planning and Preparation Phase.mp4 44.93 MB
15.4 Understanding the Legal Concepts of Penetration Testing.mp4 13.83 MB
15.5 Learning How to Scope a Penetration Testing Engagement Properly.mp4 14.57 MB
15.6 Learning the Key Aspects of Compliance-based Assessments.mp4 10.9 MB
16.1 Introducing Footprinting Concepts and Methodologies.mp4 26.47 MB
16.2 Performing Footprinting through Search Engines.mp4 19.4 MB
16.3 Performing Footprinting through Web Services.mp4 22.13 MB
16.4 Performing Footprinting through Social Networking Sites.mp4 7.26 MB
16.5 Understanding Website Footprinting.mp4 36.83 MB
16.6 Understanding Email Footprinting.mp4 12.21 MB
16.7 Understanding Whois Footprinting.mp4 20.89 MB
16.8 Understanding DNS Footprinting.mp4 26.42 MB
16.9 Understanding Network Footprinting.mp4 13.62 MB
16.10 Performing Footprinting through Social Engineering.mp4 56.36 MB
16.11 Surveying Footprinting Tools.mp4 7.37 MB
17.1 Surveying Network Scanning Concepts.mp4 12.76 MB
17.2 Exploiting Scanning Tools.mp4 35.02 MB
17.3 Understanding Host Discovery.mp4 66.51 MB
17.4 Understanding Port and Service Discovery.mp4 37.74 MB
17.5 Performing OS Discovery (Banner GrabbingOS Fingerprinting).mp4 39.66 MB
17.6 Scanning Beyond IDS and Firewall.mp4 65.08 MB
17.7 Creating Network Diagrams.mp4 25.03 MB
17.8 Introducing Enumeration Techniques.mp4 17.6 MB
17.9 Performing NetBIOS Enumeration.mp4 34.49 MB
17.10 Performing SNMP Enumeration.mp4 68.48 MB
17.11 Performing LDAP Enumeration.mp4 22.46 MB
17.12 Performing NTP and NFS Enumeration.mp4 58.89 MB
17.13 Performing SMTP and DNS Enumeration.mp4 76.32 MB
17.14 Conducting Additional Enumeration Techniques.mp4 72.26 MB
18.1 Introducing Web Server Concepts.mp4 25.06 MB
18.2 Exploring Web Server Attacks and Methodologies.mp4 15.07 MB
18.3 Surveying Web Server Attack Tools.mp4 39.74 MB
18.4 Understanding Patch Management.mp4 21.49 MB
18.5 Surveying Web Server Security Tools.mp4 8 MB
19.1 Introducing Web Application Concepts.mp4 26.32 MB
19.2 Understanding Web App Threats and Hacking Methodologies.mp4 39.29 MB
19.3 Footprinting Web Infrastructures.mp4 43.8 MB
19.4 Analyzing Web Applications.mp4 23.01 MB
19.5 Introducing the OWASP Top 10.mp4 20.21 MB
19.6 Attacking Authentication, Authorization, and Access Controls - Part 1.mp4 21 MB
19.7 Attacking Authentication, Authorization, and Access Controls - Part 2.mp4 44.33 MB
19.8 Performing Command Injection Attacks.mp4 14.32 MB
19.9 Exploiting DirectoryPath Traversal Vulnerabilities.mp4 10.15 MB
19.10 Input Validation and Sanitation.mp4 21.68 MB
19.11 Exploiting Cross-site Scripting (XSS) Vulnerabilities.mp4 45.23 MB
19.12 Exploiting XML External Entities.mp4 19.28 MB
19.13 Attacking Web Services, APIs, and Understanding Webhooks.mp4 45.28 MB
20.1 Introducing SQL Injection Concepts.mp4 20.1 MB
20.2 Understanding the Types of SQL Injection.mp4 11.96 MB
20.3 Exploring the SQL Injection Methodologies.mp4 16.41 MB
20.4 Exploring SQL Injection Tools.mp4 60.35 MB
20.5 Exploring Evasion Techniques.mp4 8.42 MB
20.6 Understanding SQL Injection Countermeasures.mp4 15.79 MB
21.1 Introducing Wireless Concepts.mp4 30.17 MB
21.2 Understanding Wireless Encryption.mp4 59.83 MB
21.3 Exploring Wireless Threats.mp4 75.32 MB
21.4 Understanding Wireless Hacking Methodologies.mp4 20.32 MB
21.5 Surveying Wireless Hacking Tools.mp4 47.27 MB
21.6 Hacking Bluetooth.mp4 49.92 MB
21.7 Introducing Wireless Countermeasures.mp4 35.45 MB
22.1 Understanding Wireless Client Attacks and Their Motives.mp4 30.19 MB
22.2 Learning Packet Injection Attacks.mp4 4.45 MB
22.3 Eavesdropping and Manipulating Unencrypted Wi-Fi Communications.mp4 10.82 MB
22.4 Attacking Publicly Secure Packet Forwarding (PSPF).mp4 6.6 MB
22.5 Attacking the Preferred Network List (PNL).mp4 4.56 MB
23.1 Understanding Wireless Antennas.mp4 17.49 MB
23.2 Surveying Wi-Fi Devices Like the Pinneaple.mp4 47.41 MB
23.3 Building Your Own Lab.mp4 27.83 MB
24.1 Introducing the Aircrack-ng Suite.mp4 24.63 MB
24.2 Introducing Airmon-ng.mp4 5.18 MB
24.3 Understanding Airodump-ng.mp4 11.84 MB
24.4 Introducing Aireplay-ng.mp4 12.03 MB
24.5 Introducing Airdecap-ng.mp4 6.19 MB
24.6 Introducing Airserv-ng.mp4 10.56 MB
24.7 Introducing Airtun-ng.mp4 6.86 MB
25.1 Understanding Buffer Overflows.mp4 22.09 MB
25.2 Exploiting Buffer Overflows.mp4 18.24 MB
25.3 Overcoming Defenses for Buffer Overflow Vulnerabilities.mp4 5.46 MB
25.4 Understanding Fuzzing.mp4 7.7 MB
25.5 Creating a Fuzzing Strategy.mp4 19.99 MB
25.6 Exploring Mutation-based, Generation-based, and Evolutionary Fuzzers.mp4 12.92 MB
25.7 Surveying Tools to Find and Exploit Buffer Overflows.mp4 24.19 MB
26.1 Maintaining Persistence After Compromising a System.mp4 30.32 MB
26.2 Understanding How to Perform Lateral Movement and Pivoting.mp4 12.84 MB
26.3 Understanding How to Cover Your Tracks and Clean up Systems After a Penetration Testing Engagement.mp4 6.41 MB
27.1 Understanding Authentication and Authorization Mechanisms.mp4 21.41 MB
27.2 Understanding Authentication and Authorization Attacks.mp4 15.05 MB
27.3 Exploring Password Storage Mechanisms.mp4 6.9 MB
27.4 Understanding Password Storage Vulnerability.mp4 10.91 MB
27.5 Cracking Passwords with John the Ripper.mp4 63.03 MB
27.6 Cracking Passwords with hashcat.mp4 39.01 MB
27.7 Improving Password Security.mp4 7.94 MB
28.1 Surveying Report Writing and Handling Best Practices.mp4 14.03 MB
28.2 Recommending Mitigation Strategies for the Discovered Vulnerabilities.mp4 8.58 MB
28.3 Explaining the Importance of Appropriate Communication.mp4 28.75 MB
29.1 Understanding Mobile Platform Attack Vectors.mp4 70.05 MB
29.2 Hacking iOS.mp4 82.59 MB
29.3 Hacking Android OS.mp4 60.86 MB
29.4 Understanding Mobile Device Management.mp4 36.09 MB
29.5 Surveying Mobile Security Guidelines and Tools.mp4 10.92 MB
30.1 Understanding OWASP Mobile Device Vulnerabilities.mp4 18.18 MB
30.2 Wrestling with the BYOD Dilemma.mp4 24.48 MB
30.3 Understanding Mobile Device Management (MDM).mp4 26.38 MB
30.4 Understanding Mobile Device Security Policies.mp4 20.35 MB
31.1 Hacking Android Devices.mp4 42.49 MB
31.2 Exploring Android Emulators and SDK.mp4 10.26 MB
31.3 Understanding Android Hacking Tools and Methodologies.mp4 48.41 MB
32.2 Exploring Jailbraking iOS.mp4 6.71 MB
32.3 Surveying Tools for Disassembling iOS Applications.mp4 4.75 MB
33.1 Introducing IoT Concepts.mp4 70.95 MB
33.2 Understanding IoT Attacks.mp4 73.27 MB
33.3 Understanding IoT Hacking Methodologies.mp4 28.42 MB
33.4 Surveying IoT Hacking Tools.mp4 38.09 MB
33.5 Understanding IoT Countermeasures.mp4 34.55 MB
33.6 Introducing OT Concepts.mp4 42.59 MB
33.7 Performing OT Attacks.mp4 31.31 MB
33.8 Understanding OT Hacking Methodologies.mp4 22.2 MB
33.9 Surveying OT Hacking Tools.mp4 35.8 MB
33.10 Understanding OT Countermeasures.mp4 46.53 MB
34.1 Surveying Tools for Dissasembling iOS Applications.mp4 48.36 MB
34.2 Exploring ZigBee and IEEE 802.15.4.mp4 11.15 MB
34.3 Exploring INSTEON.mp4 9.52 MB
34.4 Exploring ZWave.mp4 36.3 MB
34.5 Exploring LoRA.mp4 12.66 MB
35.1 Attacking Bluetooth.mp4 4.2 MB
35.2 Surveying Tools for Bluetooth Monitoring.mp4 24 MB
36.1 Understanding NFC Vulnerabilities.mp4 6.85 MB
36.2 Exploring NFC Attacks and Case Studies.mp4 13.36 MB
37.1 Introducing Cloud Computing Concepts.mp4 29.18 MB
37.2 Exploring Container Technology.mp4 19.91 MB
37.3 Understanding Serverless Computing.mp4 3.75 MB
37.4 Surveying Cloud Computing Threats.mp4 19.66 MB
37.5 Understanding Cloud Hacking and Cloud Security Implementations.mp4 19.65 MB
37.6 Introducing the Different Cloud Deployment and Service Models.mp4 11.23 MB
37.7 Surveying Patch Management in the Cloud.mp4 8.09 MB
37.8 Performing Security Assessments in Cloud Environments.mp4 11.35 MB
37.9 Introducing Agile, DevOps, and CICD Pipelines.mp4 21.49 MB
37.10 Understanding Container Orchestration and an Introduction to Kubernetes.mp4 5.41 MB
37.11 Exploring the Concepts of DevSecOps.mp4 12.36 MB
38.1 Introducing Social Engineering Concepts.mp4 14.54 MB
38.2 Exploring Social Engineering Techniques.mp4 23.45 MB
38.3 Understanding the Insider Threat.mp4 9.64 MB
38.4 Impersonation on Social Networking Sites.mp4 21.36 MB
38.5 Understanding Identity Theft.mp4 13.96 MB
38.6 Understanding Social Engineering Countermeasures.mp4 8.9 MB
The Complete Cybersecurity Bootcamp Introduction.mp4 16.8 MB
The Complete Cybersecurity Bootcamp Summary.mp4 6.95 MB
Download Info
-
Tips
“[LiveLessons] The Complete Cybersecurity Bootcamp, 2nd Edition [En]” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.
-
DMCA Notice and Takedown Procedure
If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.