Filename Size 001 - About the Author.mp4 22.6 MB 002 - About the Course.mp4 80.9 MB 003 - Course Requirements.mp4 55.9 MB 004 - How to Get Help.mp4 71.3 MB 005 - About the Exam.mp4 134.5 MB 006 - Chapter Introduction.mp4 28.3 MB 007 - Common Terms (Hack Value, Vulnerability, Exploit, Payload).mp4 62.1 MB 008 - Zero Day Attack.mp4 64.2 MB 009 - Daisy Chaining.mp4 86.3 MB 010 - QUIZ SOLUTION: Overview of Information Security - Questions answered and explained.mp4 58.2 MB 011 - Chapter Introduction.mp4 8.8 MB 012 - Threats vs Attacks.mp4 28.7 MB 013 - Motives and Reasons Behind Cyber Security Attacks.mp4 30.7 MB 014 - What Are the Means by Which Hackers Gain Access to Systems and Networks?.mp4 12.3 MB 015 - Cloud Computing Threats.mp4 75.2 MB 016 - Advanced Presistent Threats.mp4 24.1 MB 017 - Viruses and Worms.mp4 37.9 MB 018 - Ransomware.mp4 60.2 MB 019 - Mobile Threats.mp4 42.6 MB 020 - Modern Age Information Warfare.mp4 53.1 MB 021 - Insider Attacks.mp4 20.8 MB 022 - Phishing.mp4 27.5 MB 023 - Web Application Threats.mp4 28.5 MB 024 - Classification of Threats: Network Threats.mp4 32.8 MB 025 - Clasification of Threats: Host Threats.mp4 27.8 MB 026 - Clasification of Threats: Application Threats.mp4 44.7 MB 027 - Classification of Attacks.mp4 141.3 MB 028 - Botnets.mp4 34.1 MB 029 - Laws, Standards, and Regulations.mp4 132.8 MB 030 - QUIZ SOLUTION: Overview of Information Security Threats and Attacks - Questions answered and explained.mp4 67.1 MB 031 - A Brief Look at the History of Hacking.mp4 119 MB 032 - Types of Hackers.mp4 85.9 MB 033 - What is Ethical Hacking? What is Its Purpose?.mp4 28.4 MB 034 - Scope of Ethical Hacking.mp4 36.6 MB 035 - Hacking Stages: Reconnaissance.mp4 24.7 MB 036 - Hacking Stages: Scanning.mp4 18.8 MB 037 - Hacking Stages: Gaining Access.mp4 6.5 MB 038 - Hacking Stages: Maintaining Access.mp4 32.8 MB 039 - Hacking Stages: Clearing Tracks.mp4 29.5 MB 040 - QUIZ SOLUTION: History of Hacking - Questions answered and explained.mp4 82.6 MB 041 - Chapter Introduction.mp4 57.4 MB 042 - Information Assurance.mp4 135.2 MB 043 - EISA and Information security management program.mp4 118.6 MB 044 - Network Zoning.mp4 155.9 MB 045 - Defense in Depth.mp4 131 MB 046 - What Sort of Things Do Policies Regulate?.mp4 150.3 MB 047 - Workplace Security Policies and Examples.mp4 108.3 MB 048 - Physical Security Controls and Risk.mp4 116.4 MB 049 - Risk Management.mp4 127.3 MB 050 - Threat Modeling and Incident Management.mp4 212.9 MB 051 - UBA - User Behavior Analytics and Network Security Controls.mp4 83.6 MB 052 - Access Controls.mp4 83.5 MB 053 - Identification Authentication Authorization Accounting and IAM.mp4 122.3 MB 054 - Data Leakage.mp4 98.5 MB 055 - Data Backup.mp4 223.1 MB 056 - Data Recovery.mp4 28.1 MB 057 - QUIZ SOLUTION: Protecting Information - Questions answered and explained.mp4 87.1 MB 058 - What Is Penetration Testing?.mp4 37.9 MB 059 - What Does a Good Penetration Test Consist of?.mp4 130 MB 060 - Why Do a Penetration Test.mp4 123.6 MB 061 - Pre-Attack Phase: Contracts.mp4 29.9 MB 062 - Audit vs Vulnerability Assessment vs Penetration Test.mp4 26.5 MB 063 - Red vs Blue Team!.mp4 32.2 MB 064 - Types of Penetration Testing.mp4 80.5 MB 065 - Pre-Attack Phase: Rules of Engagement.mp4 26.3 MB 066 - Pre-Attack Phase: Understanding your Client's requirements.mp4 43.7 MB 067 - Pre-Attack Phase: Scope of a Penetration Test.mp4 76.8 MB 068 - Pre-Attack Phase: Information Gathering.mp4 70.8 MB 069 - Pre-Attack Phase: Two Types of Information Gathering.mp4 60.5 MB 070 - Attack Phase.mp4 15.9 MB 071 - Attack Phase: Penetrating the Perimeter.mp4 46.7 MB 072 - Attack Phase: Target Acquisition.mp4 30.8 MB 073 - Attack Phase: Privilege Escalation.mp4 31.8 MB 074 - Attack Phase: Execute, Implant, Retract.mp4 36.6 MB 075 - Post-Attack Phase.mp4 23.5 MB 076 - Security Testing Methodologies.mp4 77.5 MB 077 - QUIZ SOLUTION: Penetration Testing - Questions answered and explained.mp4 65.3 MB 078 - About Footprinting.mp4 34 MB 079 - Hacker State of Mind.mp4 59.9 MB 080 - Search Engine and Online Resources.mp4 196.7 MB 081 - Whois GeoIpLocation and DNS Interogation.mp4 145.8 MB 082 - Email Header Analysis.mp4 164.5 MB 083 - Getting an IP Address from an Email and More.mp4 167.4 MB 084 - Quick Look at a Website Certificate, Source Code and Traffic.mp4 169.9 MB 085 - How to Clone a Website and Extract Metadata from Files.mp4 186.2 MB 086 - Nmap and Traceroute.mp4 201.3 MB 087 - QUIZ SOLUTION: Footprinting - Questions answered and explained.mp4 55.1 MB 088 - Countermeasures and Best Practices.mp4 121.6 MB 089 - What Goes into a Footprinting Report?.mp4 56.5 MB 090 - QUIZ SOLUTION: Reports and Countermeasures - Questions answered and explained.mp4 50.1 MB 091 - Banner Grabbing.mp4 54.8 MB 092 - Drawing and Mapping Out Network Topologies.mp4 97.3 MB 093 - Scanning for Vulnerabilities.mp4 143.2 MB 094 - Enumeration.mp4 72.3 MB 095 - QUIZ SOLUTION: Network Scanning Techniques - Questions answered and explained.mp4 57 MB 096 - Password Cracking, Crunch, and Some Basics.mp4 170 MB 097 - Using Hydra for online password cracking.mp4 181.7 MB 098 - Hashcat: Environment Setup.mp4 178.4 MB 099 - HashCat: Installation.mp4 79 MB