Filename Size ~Get Your Files Here !/01. Introduction/001. Securing systems and applications.en.srt 2.3 KB ~Get Your Files Here !/01. Introduction/001. Securing systems and applications.mp4 18.4 MB ~Get Your Files Here !/01. Introduction/002. What you need to know.en.srt 1.2 KB ~Get Your Files Here !/01. Introduction/002. What you need to know.mp4 5.3 MB ~Get Your Files Here !/01. Introduction/003. Study resources.en.srt 2.9 KB ~Get Your Files Here !/01. Introduction/003. Study resources.mp4 15.3 MB ~Get Your Files Here !/02. Malware/004. Comparing viruses, worms, and trojans.en.srt 9 KB ~Get Your Files Here !/02. Malware/004. Comparing viruses, worms, and trojans.mp4 60.7 MB ~Get Your Files Here !/02. Malware/005. Malware payloads.en.srt 10.6 KB ~Get Your Files Here !/02. Malware/005. Malware payloads.mp4 55.4 MB ~Get Your Files Here !/02. Malware/006. Understanding backdoors and logic bombs.en.srt 6.7 KB ~Get Your Files Here !/02. Malware/006. Understanding backdoors and logic bombs.mp4 35.2 MB ~Get Your Files Here !/02. Malware/007. Looking at advanced malware.en.srt 4.8 KB ~Get Your Files Here !/02. Malware/007. Looking at advanced malware.mp4 26.1 MB ~Get Your Files Here !/02. Malware/008. Understanding botnets.en.srt 4.9 KB ~Get Your Files Here !/02. Malware/008. Understanding botnets.mp4 25.1 MB ~Get Your Files Here !/02. Malware/009. Code signing.en.srt 1.9 KB ~Get Your Files Here !/02. Malware/009. Code signing.mp4 18.9 MB ~Get Your Files Here !/03. Understanding Attackers/010. Cybersecurity adversaries.en.srt 1.9 KB ~Get Your Files Here !/03. Understanding Attackers/010. Cybersecurity adversaries.mp4 44.1 MB ~Get Your Files Here !/03. Understanding Attackers/011. Preventing insider threats.en.srt 4.6 KB ~Get Your Files Here !/03. Understanding Attackers/011. Preventing insider threats.mp4 24 MB ~Get Your Files Here !/03. Understanding Attackers/012. Attack vectors.en.srt 7 KB ~Get Your Files Here !/03. Understanding Attackers/012. Attack vectors.mp4 35.3 MB ~Get Your Files Here !/03. Understanding Attackers/013. Zero-days and the Advanced Persistent Threat.en.srt 5.7 KB ~Get Your Files Here !/03. Understanding Attackers/013. Zero-days and the Advanced Persistent Threat.mp4 29.5 MB ~Get Your Files Here !/04. Social Engineering Attacks/014. Social engineering.en.srt 9.7 KB ~Get Your Files Here !/04. Social Engineering Attacks/014. Social engineering.mp4 48.4 MB ~Get Your Files Here !/04. Social Engineering Attacks/015. Impersonation attacks.en.srt 9.3 KB ~Get Your Files Here !/04. Social Engineering Attacks/015. Impersonation attacks.mp4 46.7 MB ~Get Your Files Here !/04. Social Engineering Attacks/016. Identity fraud and pretexting.en.srt 5.1 KB ~Get Your Files Here !/04. Social Engineering Attacks/016. Identity fraud and pretexting.mp4 25.9 MB ~Get Your Files Here !/04. Social Engineering Attacks/017. Watering hole attacks.en.srt 5.3 KB ~Get Your Files Here !/04. Social Engineering Attacks/017. Watering hole attacks.mp4 25.3 MB ~Get Your Files Here !/04. Social Engineering Attacks/018. Physical social engineering.en.srt 4.4 KB ~Get Your Files Here !/04. Social Engineering Attacks/018. Physical social engineering.mp4 22 MB ~Get Your Files Here !/05. Web Application Attacks/019. OWASP Top Ten.en.srt 9.3 KB ~Get Your Files Here !/05. Web Application Attacks/019. OWASP Top Ten.mp4 48.7 MB ~Get Your Files Here !/05. Web Application Attacks/020. Application security.en.srt 7.4 KB ~Get Your Files Here !/05. Web Application Attacks/020. Application security.mp4 37.1 MB ~Get Your Files Here !/05. Web Application Attacks/021. Preventing SQL injection.en.srt 8 KB ~Get Your Files Here !/05. Web Application Attacks/021. Preventing SQL injection.mp4 37.7 MB ~Get Your Files Here !/05. Web Application Attacks/022. Understanding cross-site scripting.en.srt 5.9 KB ~Get Your Files Here !/05. Web Application Attacks/022. Understanding cross-site scripting.mp4 27.9 MB ~Get Your Files Here !/05. Web Application Attacks/023. Request forgery.en.srt 7.4 KB ~Get Your Files Here !/05. Web Application Attacks/023. Request forgery.mp4 35.5 MB ~Get Your Files Here !/05. Web Application Attacks/024. Defending against directory traversal.en.srt 5.8 KB ~Get Your Files Here !/05. Web Application Attacks/024. Defending against directory traversal.mp4 29 MB ~Get Your Files Here !/05. Web Application Attacks/025. Overflow attacks.en.srt 5.7 KB ~Get Your Files Here !/05. Web Application Attacks/025. Overflow attacks.mp4 28.9 MB ~Get Your Files Here !/05. Web Application Attacks/026. Explaining cookies and attachments.en.srt 8.1 KB ~Get Your Files Here !/05. Web Application Attacks/026. Explaining cookies and attachments.mp4 38.1 MB ~Get Your Files Here !/05. Web Application Attacks/027. Session hijacking.en.srt 7.6 KB ~Get Your Files Here !/05. Web Application Attacks/027. Session hijacking.mp4 41.5 MB ~Get Your Files Here !/05. Web Application Attacks/028. Code execution attacks.en.srt 4.8 KB ~Get Your Files Here !/05. Web Application Attacks/028. Code execution attacks.mp4 23.6 MB ~Get Your Files Here !/06. Host Security/029. Operating system security.en.srt 15.4 KB ~Get Your Files Here !/06. Host Security/029. Operating system security.mp4 76.7 MB ~Get Your Files Here !/06. Host Security/030. Malware prevention.en.srt 7.1 KB ~Get Your Files Here !/06. Host Security/030. Malware prevention.mp4 37.1 MB ~Get Your Files Here !/06. Host Security/031. Application management.en.srt 10.2 KB ~Get Your Files Here !/06. Host Security/031. Application management.mp4 51.7 MB ~Get Your Files Here !/06. Host Security/032. Host-based network security controls.en.srt 13.3 KB ~Get Your Files Here !/06. Host Security/032. Host-based network security controls.mp4 67.8 MB ~Get Your Files Here !/06. Host Security/033. File integrity monitoring.en.srt 8.3 KB ~Get Your Files Here !/06. Host Security/033. File integrity monitoring.mp4 42.1 MB ~Get Your Files Here !/06. Host Security/034. Data loss prevention.en.srt 10 KB ~Get Your Files Here !/06. Host Security/034. Data loss prevention.mp4 53 MB ~Get Your Files Here !/06. Host Security/035. Endpoint monitoring.en.srt 5.2 KB ~Get Your Files Here !/06. Host Security/035. Endpoint monitoring.mp4 25.1 MB ~Get Your Files Here !/07. Hardware Security/036. Data encryption.en.srt 9.3 KB ~Get Your Files Here !/07. Hardware Security/036. Data encryption.mp4 47.4 MB ~Get Your Files Here !/07. Hardware Security/037. Hardware and firmware security.en.srt 7.8 KB ~Get Your Files Here !/07. Hardware Security/037. Hardware and firmware security.mp4 40.4 MB ~Get Your Files Here !/07. Hardware Security/038. Peripheral security.en.srt 5.3 KB ~Get Your Files Here !/07. Hardware Security/038. Peripheral security.mp4 25.6 MB ~Get Your Files Here !/08. Mobile Device Security/039. Mobile connection methods.en.srt 7.7 KB ~Get Your Files Here !/08. Mobile Device Security/039. Mobile connection methods.mp4 35.9 MB ~Get Your Files Here !/08. Mobile Device Security/040. Mobile device security.en.srt 5.7 KB ~Get Your Files Here !/08. Mobile Device Security/040. Mobile device security.mp4 27.1 MB ~Get Your Files Here !/08. Mobile Device Security/041. Mobile device management.en.srt 12.6 KB ~Get Your Files Here !/08. Mobile Device Security/041. Mobile device management.mp4 62.9 MB ~Get Your Files Here !/08. Mobile Device Security/042. Mobile device tracking.en.srt 5.5 KB ~Get Your Files Here !/08. Mobile Device Security/042. Mobile device tracking.mp4 27.4 MB ~Get Your Files Here !/08. Mobile Device Security/043. Mobile application management.en.srt 7.1 KB ~Get Your Files Here !/08. Mobile Device Security/043. Mobile application management.mp4 34.2 MB ~Get Your Files Here !/08. Mobile Device Security/044. Mobile security enforcement.en.srt 6.9 KB ~Get Your Files Here !/08. Mobile Device Security/044. Mobile security enforcement.mp4 34 MB ~Get Your Files Here !/08. Mobile Device Security/045. Bring Your Own Device (BYOD).en.srt 7.9 KB ~Get Your Files Here !/08. Mobile Device Security/045. Bring Your Own Device (BYOD).mp4 40.3 MB ~Get Your Files Here !/08. Mobile Device Security/046. Mobile deployment models.en.srt 5 KB ~Get Your Files Here !/08. Mobile Device Security/046. Mobile deployment models.mp4 25.8 MB ~Get Your Files Here !/09. Embedded Systems Security/047. Industrial control systems.en.srt 8.7 KB ~Get Your Files Here !/09. Embedded Systems Security/047. Industrial control systems.mp4 44.7 MB ~Get Your Files Here !/09. Embedded Systems Security/048. Internet of Things.en.srt 5.3 KB ~Get Your Files Here !/09. Embedded Systems Security/048. Internet of Things.mp4 26.8 MB ~Get Your Files Here !/09. Embedded Systems Security/049. Securing smart devices.en.srt 5.6 KB ~Get Your Files Here !/09. Embedded Systems Security/049. Securing smart devices.mp4 27.6 MB