20. Security/4. Detecting Trojans Using a Sandbox.mp410.58MB
3. Preparation - Linux Basics/1. Basic Overview Of Kali Linux.mp4107.41MB
3. Preparation - Linux Basics/2. The Linux Terminal & Basic Linux Commands.mp4223.54MB
3. Preparation - Linux Basics/3. Creating & Using Snapshots.mp489.38MB
4. Information Gathering/1. Introduction.mp46.75MB
5. Information Gathering - Gathering Info About A CompanyWebsite/1. Maltego Overview.mp4104.63MB
5. Information Gathering - Gathering Info About A CompanyWebsite/2. Discovering Domain Info & Emails Associated With Target.mp424.59MB
5. Information Gathering - Gathering Info About A CompanyWebsite/3. Discovering Information About Hosting Company, Support Team Emails & Admin Email.mp427.09MB
5. Information Gathering - Gathering Info About A CompanyWebsite/4. Discovering Files, Links, Websites & Other Companies Related To Target.mp419.4MB
5. Information Gathering - Gathering Info About A CompanyWebsite/5. Using The Gathered Info To Build An Attack Strategy.mp416.41MB
6. Information Gathering - Gathering Info About A Person/1. Discovering Websites, Links & Social Networking Accounts.mp432.95MB
6. Information Gathering - Gathering Info About A Person/2. Discovering Twitter Friends & Associated Accounts.mp417.65MB
6. Information Gathering - Gathering Info About A Person/3. Discovering Emails Of The Target's Friends.mp417.86MB
6. Information Gathering - Gathering Info About A Person/4. Analysing The Gathered Info & Building An Attack Strategy.mp433.21MB
7. Windows Malware/1. Introduction.mp47.67MB
8. Windows Malware - Generating Undetectable Backdoors/1. Installing Veil Framework.mp449.68MB
8. Windows Malware - Generating Undetectable Backdoors/10. Modifying Backdoor Source To Bypass All Anti-virus Programs.mp423.56MB