Filename Size ~Get Your Files Here !/02/introduction-slides.pdf 9.4 MB ~Get Your Files Here !/03/dns-analysis-slides.pdf 15.9 MB ~Get Your Files Here !/04/osint-analysis-slides.pdf 12.8 MB ~Get Your Files Here !/05/conduct-social-engineering-attack-slides.pdf 12.8 MB ~Get Your Files Here !/05/demos.pdf 1.1 MB ~Get Your Files Here !/06/live-host-identification-slides.pdf 9.2 MB ~Get Your Files Here !/07/network-discovery-port-and-protocol-analysis-slides.pdf 6.4 MB ~Get Your Files Here !/1. Course Overview/1. Course Overview.mp4 3.2 MB ~Get Your Files Here !/1. Course Overview/1. Course Overview.vtt 2.7 KB ~Get Your Files Here !/2. Introduction/1. Information Gathering Objectives.mp4 6.5 MB ~Get Your Files Here !/2. Introduction/1. Information Gathering Objectives.vtt 6.4 KB ~Get Your Files Here !/2. Introduction/2. Lab Setup.mp4 3.8 MB ~Get Your Files Here !/2. Introduction/2. Lab Setup.vtt 3.5 KB ~Get Your Files Here !/3. DNS Analysis/1. Objectives of DNS Analysis.mp4 15.3 MB ~Get Your Files Here !/3. DNS Analysis/1. Objectives of DNS Analysis.vtt 8.9 KB ~Get Your Files Here !/3. DNS Analysis/2. DNSRecon.mp4 10.1 MB ~Get Your Files Here !/3. DNS Analysis/2. DNSRecon.vtt 4.6 KB ~Get Your Files Here !/3. DNS Analysis/3. DNSEnum.mp4 9.5 MB ~Get Your Files Here !/3. DNS Analysis/3. DNSEnum.vtt 4.9 KB ~Get Your Files Here !/3. DNS Analysis/4. DNSMap.mp4 8.7 MB ~Get Your Files Here !/3. DNS Analysis/4. DNSMap.vtt 5 KB ~Get Your Files Here !/4. OSINT Analysis/1. Objectives of OSINT Analysis.mp4 9.7 MB ~Get Your Files Here !/4. OSINT Analysis/1. Objectives of OSINT Analysis.vtt 8.8 KB ~Get Your Files Here !/4. OSINT Analysis/2. Spiderfoot.mp4 12.9 MB ~Get Your Files Here !/4. OSINT Analysis/2. Spiderfoot.vtt 8 KB ~Get Your Files Here !/4. OSINT Analysis/3. theHarvester.mp4 10 MB ~Get Your Files Here !/4. OSINT Analysis/3. theHarvester.vtt 6 KB ~Get Your Files Here !/5. Conduct Social Engineering Attack/1. Objective of a Social Engineering Attack.mp4 6 MB ~Get Your Files Here !/5. Conduct Social Engineering Attack/1. Objective of a Social Engineering Attack.vtt 5.5 KB ~Get Your Files Here !/5. Conduct Social Engineering Attack/2. Social Engineering Toolkit (SET).mp4 12 MB ~Get Your Files Here !/5. Conduct Social Engineering Attack/2. Social Engineering Toolkit (SET).vtt 7.2 KB ~Get Your Files Here !/6. Live Host Identification/1. Objectives of Host Identification.mp4 4.6 MB ~Get Your Files Here !/6. Live Host Identification/1. Objectives of Host Identification.vtt 4.1 KB ~Get Your Files Here !/6. Live Host Identification/2. Netdiscover.mp4 7.2 MB ~Get Your Files Here !/6. Live Host Identification/2. Netdiscover.vtt 5.1 KB ~Get Your Files Here !/6. Live Host Identification/3. Arp-scan.mp4 11.1 MB ~Get Your Files Here !/6. Live Host Identification/3. Arp-scan.vtt 5.6 KB ~Get Your Files Here !/7. Network Discovery, Port, and Protocol Analysis/1. Objectives of Network Discovery.mp4 7.4 MB ~Get Your Files Here !/7. Network Discovery, Port, and Protocol Analysis/1. Objectives of Network Discovery.vtt 6 KB ~Get Your Files Here !/7. Network Discovery, Port, and Protocol Analysis/2. NMap.mp4 25.5 MB ~Get Your Files Here !/7. Network Discovery, Port, and Protocol Analysis/2. NMap.vtt 12 KB ~Get Your Files Here !/7. Network Discovery, Port, and Protocol Analysis/3. Course Summary.mp4 6.2 MB ~Get Your Files Here !/7. Network Discovery, Port, and Protocol Analysis/3. Course Summary.vtt 5.9 KB ~Get Your Files Here !/Bonus Resources.txt 386 B