Filename Size 00.Humans-The-Soft-Center-Within-the-Hard-Shell/00.Overview.mp4 4.7 MB 00.Humans-The-Soft-Center-Within-the-Hard-Shell/00.Overview.mp4.srt 4.4 KB 00.Humans-The-Soft-Center-Within-the-Hard-Shell/01.Social-Engineering-Through-the-Ages.mp4 27.2 MB 00.Humans-The-Soft-Center-Within-the-Hard-Shell/01.Social-Engineering-Through-the-Ages.mp4.srt 3.5 KB 00.Humans-The-Soft-Center-Within-the-Hard-Shell/02.The-Soft-Center-That-Social-Engineering-Exploits.mp4 12.1 MB 00.Humans-The-Soft-Center-Within-the-Hard-Shell/02.The-Soft-Center-That-Social-Engineering-Exploits.mp4.srt 7.4 KB 00.Humans-The-Soft-Center-Within-the-Hard-Shell/03.Human-Weaknesses-That-Enable-Social-Engineering.mp4 24.7 MB 00.Humans-The-Soft-Center-Within-the-Hard-Shell/03.Human-Weaknesses-That-Enable-Social-Engineering.mp4.srt 17.4 KB 00.Humans-The-Soft-Center-Within-the-Hard-Shell/04.Computer-based-Versus-Human-based-Social-Engineering.mp4 4.8 MB 00.Humans-The-Soft-Center-Within-the-Hard-Shell/04.Computer-based-Versus-Human-based-Social-Engineering.mp4.srt 6 KB 00.Humans-The-Soft-Center-Within-the-Hard-Shell/05.Social-Engineering-at-Home-and-in-Popular-Culture.mp4 15.9 MB 00.Humans-The-Soft-Center-Within-the-Hard-Shell/05.Social-Engineering-at-Home-and-in-Popular-Culture.mp4.srt 6.1 KB 00.Humans-The-Soft-Center-Within-the-Hard-Shell/06.Summary.mp4 2.7 MB 00.Humans-The-Soft-Center-Within-the-Hard-Shell/06.Summary.mp4.srt 2.6 KB 00.Humans-The-Soft-Center-Within-the-Hard-Shell/clips-info.json 1.9 KB 00.Humans-The-Soft-Center-Within-the-Hard-Shell/module-info.json 343 B 01.A-Walkthrough-of-a-Social-Engineering-Attack/00.Overview.mp4 2.8 MB 01.A-Walkthrough-of-a-Social-Engineering-Attack/00.Overview.mp4.srt 2.4 KB 01.A-Walkthrough-of-a-Social-Engineering-Attack/01.Case-Study-Cold-Call-Virus-Scams.mp4 14.7 MB 01.A-Walkthrough-of-a-Social-Engineering-Attack/01.Case-Study-Cold-Call-Virus-Scams.mp4.srt 5.8 KB 01.A-Walkthrough-of-a-Social-Engineering-Attack/02.Establishing-Authority-and-Creating-Fear.mp4 10 MB 01.A-Walkthrough-of-a-Social-Engineering-Attack/02.Establishing-Authority-and-Creating-Fear.mp4.srt 4.9 KB 01.A-Walkthrough-of-a-Social-Engineering-Attack/03.Executing-the-Social-Engineering-Attack.mp4 20.7 MB 01.A-Walkthrough-of-a-Social-Engineering-Attack/03.Executing-the-Social-Engineering-Attack.mp4.srt 9.8 KB 01.A-Walkthrough-of-a-Social-Engineering-Attack/04.Demonstrating-Authenticity.mp4 31.7 MB 01.A-Walkthrough-of-a-Social-Engineering-Attack/04.Demonstrating-Authenticity.mp4.srt 17.7 KB 01.A-Walkthrough-of-a-Social-Engineering-Attack/05.Creating-a-Debt.mp4 27.2 MB 01.A-Walkthrough-of-a-Social-Engineering-Attack/05.Creating-a-Debt.mp4.srt 21.9 KB 01.A-Walkthrough-of-a-Social-Engineering-Attack/06.Monetizing-the-Scam.mp4 33.5 MB 01.A-Walkthrough-of-a-Social-Engineering-Attack/06.Monetizing-the-Scam.mp4.srt 16.9 KB 01.A-Walkthrough-of-a-Social-Engineering-Attack/07.Summary.mp4 4.9 MB 01.A-Walkthrough-of-a-Social-Engineering-Attack/07.Summary.mp4.srt 4.1 KB 01.A-Walkthrough-of-a-Social-Engineering-Attack/clips-info.json 2.1 KB 01.A-Walkthrough-of-a-Social-Engineering-Attack/module-info.json 341 B 02.Reconnaissance-and-OSINT/00.Overview.mp4 4.2 MB 02.Reconnaissance-and-OSINT/00.Overview.mp4.srt 3.8 KB 02.Reconnaissance-and-OSINT/01.Understanding-OSINT.mp4 56 MB 02.Reconnaissance-and-OSINT/01.Understanding-OSINT.mp4.srt 11.1 KB 02.Reconnaissance-and-OSINT/02.Organizational-Reconnaissance.mp4 8.1 MB 02.Reconnaissance-and-OSINT/02.Organizational-Reconnaissance.mp4.srt 6.4 KB 02.Reconnaissance-and-OSINT/03.Identifying-Targets-Within-an-Organization.mp4 22.9 MB 02.Reconnaissance-and-OSINT/03.Identifying-Targets-Within-an-Organization.mp4.srt 8.6 KB 02.Reconnaissance-and-OSINT/04.Identity-Reconnaissance-with-PiPL.mp4 6.5 MB 02.Reconnaissance-and-OSINT/04.Identity-Reconnaissance-with-PiPL.mp4.srt 3.7 KB 02.Reconnaissance-and-OSINT/05.Shoulder-Surfing-Eavesdropping-and-Tailgating.mp4 21.7 MB 02.Reconnaissance-and-OSINT/05.Shoulder-Surfing-Eavesdropping-and-Tailgating.mp4.srt 11.6 KB 02.Reconnaissance-and-OSINT/06.Dumpster-Diving-and-Mail-Theft.mp4 7.6 MB 02.Reconnaissance-and-OSINT/06.Dumpster-Diving-and-Mail-Theft.mp4.srt 4 KB 02.Reconnaissance-and-OSINT/07.Data-Breaches.mp4 6.4 MB 02.Reconnaissance-and-OSINT/07.Data-Breaches.mp4.srt 5.9 KB 02.Reconnaissance-and-OSINT/08.Summary.mp4 2.7 MB 02.Reconnaissance-and-OSINT/08.Summary.mp4.srt 2.9 KB 02.Reconnaissance-and-OSINT/clips-info.json 2.3 KB 02.Reconnaissance-and-OSINT/module-info.json 301 B 03.Phishing-Attacks/00.Overview.mp4 4.7 MB 03.Phishing-Attacks/00.Overview.mp4.srt 4.1 KB 03.Phishing-Attacks/01.Teach-a-Man-to-Phish-and-Hell-Eat-for-a-Lifetime.mp4 21.6 MB 03.Phishing-Attacks/01.Teach-a-Man-to-Phish-and-Hell-Eat-for-a-Lifetime.mp4.srt 12.6 KB 03.Phishing-Attacks/02.Call-Signs-of-a-Phishing-Email.mp4 18.5 MB 03.Phishing-Attacks/02.Call-Signs-of-a-Phishing-Email.mp4.srt 12.3 KB 03.Phishing-Attacks/03.Call-Signs-of-a-Phishing-Page.mp4 14.4 MB 03.Phishing-Attacks/03.Call-Signs-of-a-Phishing-Page.mp4.srt 9 KB 03.Phishing-Attacks/04.Understanding-Spearphishing.mp4 7 MB 03.Phishing-Attacks/04.Understanding-Spearphishing.mp4.srt 4.3 KB 03.Phishing-Attacks/05.Enumeration-as-a-Verification-Vector.mp4 7.4 MB 03.Phishing-Attacks/05.Enumeration-as-a-Verification-Vector.mp4.srt 5.6 KB 03.Phishing-Attacks/06.Filter-Evasion-and-Concealment-Techniques.mp4 23.3 MB 03.Phishing-Attacks/06.Filter-Evasion-and-Concealment-Techniques.mp4.srt 12.5 KB 03.Phishing-Attacks/07.Identifying-Attacks-with-PhishTank.mp4 8 MB 03.Phishing-Attacks/07.Identifying-Attacks-with-PhishTank.mp4.srt 3.2 KB 03.Phishing-Attacks/08.Phishing-with-BeEF.mp4 32.3 MB 03.Phishing-Attacks/08.Phishing-with-BeEF.mp4.srt 14.3 KB 03.Phishing-Attacks/09.Mounting-Your-Own-Ethical-Phishing-Attack-with-Phish5.mp4 21.3 MB 03.Phishing-Attacks/09.Mounting-Your-Own-Ethical-Phishing-Attack-with-Phish5.mp4.srt 13.6 KB 03.Phishing-Attacks/10.Summary.mp4 3.2 MB 03.Phishing-Attacks/10.Summary.mp4.srt 2.6 KB 03.Phishing-Attacks/clips-info.json 2.9 KB 03.Phishing-Attacks/module-info.json 285 B 04.Identity-Theft-and-Impersonation/00.Overview.mp4 5.1 MB 04.Identity-Theft-and-Impersonation/00.Overview.mp4.srt 4.7 KB 04.Identity-Theft-and-Impersonation/01.The-Impact-of-Identity-Theft.mp4 5.5 MB 04.Identity-Theft-and-Impersonation/01.The-Impact-of-Identity-Theft.mp4.srt 5.8 KB 04.Identity-Theft-and-Impersonation/02.Identities-for-Sale.mp4 20.5 MB 04.Identity-Theft-and-Impersonation/02.Identities-for-Sale.mp4.srt 8.3 KB 04.Identity-Theft-and-Impersonation/03.The-Mechanics-of-an-Identify-Theft-Attack.mp4 19.3 MB 04.Identity-Theft-and-Impersonation/03.The-Mechanics-of-an-Identify-Theft-Attack.mp4.srt 16.8 KB 04.Identity-Theft-and-Impersonation/04.In-person-Human-based-Identity-Theft.mp4 11.8 MB 04.Identity-Theft-and-Impersonation/04.In-person-Human-based-Identity-Theft.mp4.srt 7.2 KB 04.Identity-Theft-and-Impersonation/05.Impersonation.mp4 23.5 MB 04.Identity-Theft-and-Impersonation/05.Impersonation.mp4.srt 14.6 KB 04.Identity-Theft-and-Impersonation/06.Social-Engineering-and-Impersonation-by-Example.mp4 23 MB 04.Identity-Theft-and-Impersonation/06.Social-Engineering-and-Impersonation-by-Example.mp4.srt 12.4 KB 04.Identity-Theft-and-Impersonation/07.Summary.mp4 4 MB 04.Identity-Theft-and-Impersonation/07.Summary.mp4.srt 3.4 KB 04.Identity-Theft-and-Impersonation/clips-info.json 2.1 KB 04.Identity-Theft-and-Impersonation/module-info.json 317 B 05.Social-Engineering-Countermeasures/00.Overview.mp4 3.3 MB 05.Social-Engineering-Countermeasures/00.Overview.mp4.srt 3 KB 05.Social-Engineering-Countermeasures/01.Defenses-in-the-Browser-and-Email-Clients.mp4 12.1 MB