Lesson 14 Software-Defined Networking Security and Programmability/003. 14.2 Explaining North Bound and South Bound APIs in the SDN Architecture.mp49.4 MB
Lesson 26 Post-Exploitation Techniques/002. 26.1 Maintaining Persistence After Compromising a System.mp430.3 MB
Lesson 26 Post-Exploitation Techniques/003. 26.2 Understanding How to Perform Lateral Movement and Pivoting.mp412.8 MB
Lesson 26 Post-Exploitation Techniques/004. 26.3 Understanding How to Cover Your Tracks and Clean up Systems After a Penetration Testing Engagement.mp46.4 MB
Lesson 27 Hacking User Credentials/001. Learning objectives.mp43.6 MB
Lesson 27 Hacking User Credentials/002. 27.1 Understanding Authentication and Authorization Mechanisms.mp421.4 MB
Lesson 27 Hacking User Credentials/003. 27.2 Understanding Authentication and Authorization Attacks.mp415.0 MB
Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/007. 9.6 Understanding Windows Forensics Basics.mp437.2 MB
Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/008. 9.7 Surveying Windows Forensics Application Processes.mp410.6 MB
Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/009. 9.8 Surveying Windows Forensics Memory.mp416.2 MB
Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/010. 9.9 Surveying Windows Forensics The Windows Registry.mp420.0 MB
Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/011. 9.10 Surveying Windows Forensics Hard Drives, FAT, and NTFS.mp423.0 MB
Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/012. 9.11 Understanding Linux and MAC OS X Forensics Basics.mp433.2 MB
Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/013. 9.12 Examining Web Server Logs.mp420.9 MB