اسم: | Python for Cybersecurity Specialization |
الوصف: Description Master Python for a variety of cybersecurity tasks. This Specialization provides an application-driven introduction to using Python for cybersecurity. Advance your subject-matter expertise Learn in-demand skills from university and industry experts Master a subject or tool with hands-on projects Develop a deep understanding of key concepts Earn a career certificate from Infosec Specialization – 5 course series Python is one of the most popular and widely-used programming languages in the world due to its high usability and large collection of libraries. This learning path provides an application-driven introduction to using Python for cybersecurity. Python can help to automate tasks across the cyberattack life cycle for both cyber attackers and defenders. This Specialization demonstrates some of these applications and how Python can be used to make cybersecurity professionals more efficient and effective. Last Updated 9/2023 | |
يوتيوب فيديو: | |
الفئة: | Tutorials |
اللغة: | English |
إجمالي حجم: | 1.14 GB |
تجزئة المعلومات: | FC65D2A14A672DCDD71D8DFD97E434B587B10B4A |
وأضاف بها: | tutsnode |
تاريخ الإضافة: | 2023-10-18 12:51:03 |
سيل مركز: | Torrent Verified |
تصنيفات: | Not Yet Rated (Log in to rate it) |
URL | آلات | leechers | إكمال |
---|---|---|---|
udp://open.stealth.si:80/announce | 0 | 0 | 0 |
udp://tracker.tiny-vps.com:6969/announce | 0 | 0 | 0 |
udp://fasttracker.foreverpirates.co:6969/announce | 0 | 0 | 0 |
udp://tracker.opentrackr.org:1337/announce | 0 | 0 | 0 |
udp://explodie.org:6969/announce | 0 | 0 | 0 |
udp://tracker.cyberia.is:6969/announce | 0 | 0 | 0 |
udp://ipv4.tracker.harry.lu:80/announce | 0 | 0 | 0 |
udp://tracker.uw0.xyz:6969/announce | 0 | 0 | 0 |
udp://opentracker.i2p.rocks:6969/announce | 0 | 0 | 0 |
udp://tracker.birkenwald.de:6969/announce | 0 | 0 | 0 |
udp://tracker.torrent.eu.org:451/announce | 0 | 0 | 0 |
udp://tracker.moeking.me:6969/announce | 0 | 0 | 0 |
udp://tracker.dler.org:6969/announce | 0 | 0 | 0 |
udp://9.rarbg.me:2970/announce | 0 | 0 | 0 |
ملف | حجم |
---|---|
.pad/0 | 102.00 B |
.pad/1 | 94.33 kB |
.pad/10 | 387.92 kB |
.pad/11 | 395.57 kB |
.pad/12 | 287.08 kB |
.pad/13 | 60.86 kB |
.pad/14 | 494.84 kB |
.pad/15 | 172.04 kB |
.pad/16 | 274.56 kB |
.pad/17 | 298.90 kB |
.pad/18 | 205.63 kB |
.pad/19 | 269.34 kB |
.pad/2 | 472.82 kB |
.pad/20 | 177.16 kB |
.pad/21 | 411.21 kB |
.pad/22 | 141.32 kB |
.pad/23 | 74.79 kB |
.pad/24 | 47.33 kB |
.pad/25 | 286.92 kB |
.pad/26 | 383.98 kB |
.pad/27 | 103.82 kB |
.pad/28 | 195.16 kB |
.pad/29 | 392.11 kB |
.pad/3 | 479.87 kB |
.pad/30 | 487.48 kB |
.pad/31 | 374.93 kB |
.pad/32 | 357.66 kB |
.pad/33 | 410.03 kB |
.pad/34 | 373.56 kB |
.pad/35 | 491.32 kB |
.pad/36 | 183.07 kB |
.pad/37 | 2.05 kB |
.pad/38 | 176.47 kB |
.pad/39 | 453.46 kB |
.pad/4 | 132.58 kB |
.pad/40 | 82.60 kB |
.pad/41 | 124.61 kB |
.pad/42 | 138.13 kB |
.pad/43 | 272.02 kB |
.pad/44 | 289.22 kB |
.pad/45 | 377.08 kB |
.pad/46 | 423.93 kB |
.pad/47 | 457.51 kB |
.pad/48 | 503.69 kB |
.pad/49 | 159.74 kB |
.pad/5 | 398.62 kB |
.pad/50 | 184.25 kB |
.pad/51 | 257.90 kB |
.pad/52 | 306.77 kB |
.pad/53 | 308.29 kB |
.pad/54 | 428.53 kB |
.pad/55 | 483.62 kB |
.pad/56 | 47.60 kB |
.pad/57 | 87.43 kB |
.pad/58 | 127.87 kB |
.pad/59 | 137.26 kB |
.pad/6 | 289.89 kB |
.pad/60 | 208.91 kB |
.pad/61 | 229.06 kB |
.pad/62 | 381.78 kB |
.pad/63 | 423.59 kB |
.pad/64 | 109.12 kB |
.pad/65 | 154.98 kB |
.pad/66 | 202.64 kB |
.pad/67 | 361.74 kB |
.pad/68 | 376.18 kB |
.pad/69 | 484.62 kB |
.pad/7 | 436.50 kB |
.pad/70 | 55.70 kB |
.pad/71 | 220.76 kB |
.pad/72 | 220.79 kB |
.pad/73 | 237.41 kB |
.pad/74 | 295.45 kB |
.pad/75 | 318.09 kB |
.pad/76 | 411.58 kB |
.pad/77 | 417.84 kB |
.pad/78 | 22.18 kB |
.pad/79 | 49.98 kB |
.pad/8 | 165.04 kB |
.pad/80 | 165.20 kB |
.pad/81 | 192.50 kB |
.pad/82 | 213.84 kB |
.pad/83 | 252.13 kB |
.pad/84 | 358.61 kB |
.pad/85 | 3.26 kB |
.pad/86 | 128.93 kB |
.pad/87 | 239.16 kB |
.pad/88 | 143.08 kB |
.pad/9 | 224.92 kB |
TutsNode.org.txt | 63.00 B |
[TGx]Downloaded from torrentgalaxy.to .txt | 585.00 B |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_mitre-att-ck-command-and-control.en.srt | 5.84 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_mitre-att-ck-command-and-control.en.txt | 3.12 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_mitre-att-ck-command-and-control.mp4 | 7.28 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/02_introduction-to-encrypted-channels.en.srt | 6.95 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/02_introduction-to-encrypted-channels.en.txt | 3.64 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/02_introduction-to-encrypted-channels.mp4 | 7.82 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/03_encrypted-channel.en.srt | 20.01 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/03_encrypted-channel.en.txt | 10.52 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/03_encrypted-channel.mp4 | 24.62 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/04_introduction-to-protocol-tunneling.en.srt | 6.33 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/04_introduction-to-protocol-tunneling.en.txt | 4.04 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/04_introduction-to-protocol-tunneling.mp4 | 7.45 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/05_protocol-tunneling.en.srt | 13.84 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/05_protocol-tunneling.en.txt | 7.31 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/05_protocol-tunneling.mp4 | 17.36 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_mitre-att-ck-exfiltration.en.srt | 4.20 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_mitre-att-ck-exfiltration.en.txt | 2.68 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_mitre-att-ck-exfiltration.mp4 | 5.98 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/02_introduction-to-exfiltration-over-alternative-protocols.en.srt | 4.45 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/02_introduction-to-exfiltration-over-alternative-protocols.en.txt | 2.37 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/02_introduction-to-exfiltration-over-alternative-protocols.mp4 | 5.81 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/03_alternative-protocol.en.srt | 38.97 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/03_alternative-protocol.en.txt | 20.48 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/03_alternative-protocol.mp4 | 58.97 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/04_introduction-to-non-application-layer-protocol.en.srt | 5.02 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/04_introduction-to-non-application-layer-protocol.en.txt | 3.23 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/04_introduction-to-non-application-layer-protocol.mp4 | 6.53 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/05_non-application-layer-protocol.en.srt | 6.41 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/05_non-application-layer-protocol.en.txt | 3.43 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/05_non-application-layer-protocol.mp4 | 6.80 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_mitre-att-ck-impact.en.srt | 4.11 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_mitre-att-ck-impact.en.txt | 2.63 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_mitre-att-ck-impact.mp4 | 5.75 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/02_introduction-to-data-encrypted-for-impact.en.srt | 5.06 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/02_introduction-to-data-encrypted-for-impact.en.txt | 2.68 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/02_introduction-to-data-encrypted-for-impact.mp4 | 5.95 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/03_data-encryption.en.srt | 12.87 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/03_data-encryption.en.txt | 8.26 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/03_data-encryption.mp4 | 22.52 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/04_introduction-to-account-access-removal.en.srt | 6.74 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/04_introduction-to-account-access-removal.en.txt | 3.63 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/04_introduction-to-account-access-removal.mp4 | 7.41 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/05_account-access-removal.en.srt | 11.29 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/05_account-access-removal.en.txt | 7.12 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/05_account-access-removal.mp4 | 14.40 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_mitre-att-ck-credential-access.en.srt | 5.21 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_mitre-att-ck-credential-access.en.txt | 3.29 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_mitre-att-ck-credential-access.mp4 | 7.38 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/02_introduction-to-credentials-from-password-stores.en.srt | 5.94 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/02_introduction-to-credentials-from-password-stores.en.txt | 3.16 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/02_introduction-to-credentials-from-password-stores.mp4 | 6.63 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/03_credentials-from-web-browsers.en.srt | 10.93 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/03_credentials-from-web-browsers.en.txt | 6.83 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/03_credentials-from-web-browsers.mp4 | 19.74 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/04_introduction-to-network-sniffing.en.srt | 6.65 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/04_introduction-to-network-sniffing.en.txt | 3.63 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/04_introduction-to-network-sniffing.mp4 | 7.58 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/05_network-sniffing.en.srt | 31.71 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/05_network-sniffing.en.txt | 16.57 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/05_network-sniffing.mp4 | 40.04 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_mitre-att-ck-discovery.en.srt | 4.50 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_mitre-att-ck-discovery.en.txt | 2.88 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_mitre-att-ck-discovery.mp4 | 6.28 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/02_introduction-to-account-discovery.en.srt | 6.85 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/02_introduction-to-account-discovery.en.txt | 3.68 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/02_introduction-to-account-discovery.mp4 | 7.37 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/03_user-account-discovery.en.srt | 22.18 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/03_user-account-discovery.en.txt | 11.63 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/03_user-account-discovery.mp4 | 24.22 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/04_introduction-to-file-and-directory-discovery.en.srt | 4.41 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/04_introduction-to-file-and-directory-discovery.en.txt | 2.76 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/04_introduction-to-file-and-directory-discovery.mp4 | 5.79 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/05_file-and-directory-discovery.en.srt | 13.40 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/05_file-and-directory-discovery.en.txt | 7.11 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/05_file-and-directory-discovery.mp4 | 15.95 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_mitre-att-ck-lateral-movement.en.srt | 3.50 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_mitre-att-ck-lateral-movement.en.txt | 2.25 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_mitre-att-ck-lateral-movement.mp4 | 5.15 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/02_introduction-to-remote-services.en.srt | 5.04 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/02_introduction-to-remote-services.en.txt | 2.66 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/02_introduction-to-remote-services.mp4 | 6.09 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/03_smb-windows-admin-shares.en.srt | 8.32 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/03_smb-windows-admin-shares.en.txt | 5.28 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/03_smb-windows-admin-shares.mp4 | 11.60 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/04_introduction-to-use-alternative-authentication-material.en.srt | 6.32 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/04_introduction-to-use-alternative-authentication-material.en.txt | 4.00 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/04_introduction-to-use-alternative-authentication-material.mp4 | 8.56 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/05_web-session-cookie.en.srt | 12.10 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/05_web-session-cookie.en.txt | 6.36 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/05_web-session-cookie.mp4 | 14.31 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_mitre-att-ck-collection.en.srt | 3.71 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_mitre-att-ck-collection.en.txt | 2.33 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_mitre-att-ck-collection.mp4 | 5.00 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/02_introduction-to-clipboard-data.en.srt | 6.26 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/02_introduction-to-clipboard-data.en.txt | 3.95 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/02_introduction-to-clipboard-data.mp4 | 8.05 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/03_clipboard-data.en.srt | 9.76 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/03_clipboard-data.en.txt | 6.24 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/03_clipboard-data.mp4 | 12.65 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/04_introduction-to-email-collection.en.srt | 7.11 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/04_introduction-to-email-collection.en.txt | 3.83 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/04_introduction-to-email-collection.mp4 | 7.53 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/05_local-email-collection.en.srt | 6.61 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/05_local-email-collection.en.txt | 3.63 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/05_local-email-collection.mp4 | 7.30 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_mitre-att-ck-execution.en.srt | 5.06 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_mitre-att-ck-execution.en.txt | 2.71 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_mitre-att-ck-execution.mp4 | 6.10 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/02_introduction-to-user-execution.en.srt | 4.19 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/02_introduction-to-user-execution.en.txt | 2.28 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/02_introduction-to-user-execution.mp4 | 4.77 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/03_malicious-links.en.srt | 10.88 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/03_malicious-links.en.txt | 6.92 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/03_malicious-links.mp4 | 13.13 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/04_introduction-to-scheduled-tasks-and-jobs.en.srt | 6.02 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/04_introduction-to-scheduled-tasks-and-jobs.en.txt | 3.18 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/04_introduction-to-scheduled-tasks-and-jobs.mp4 | 6.28 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/05_scheduled-execution.en.srt | 14.84 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/05_scheduled-execution.en.txt | 7.74 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/05_scheduled-execution.mp4 | 24.61 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_mitre-att-ck-persistence.en.srt | 5.04 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_mitre-att-ck-persistence.en.txt | 2.70 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_mitre-att-ck-persistence.mp4 | 6.21 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/02_introduction-to-boot-or-logon-autostart-execution.en.srt | 4.83 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/02_introduction-to-boot-or-logon-autostart-execution.en.txt | 2.58 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/02_introduction-to-boot-or-logon-autostart-execution.mp4 | 6.19 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/03_registry-autorun.en.srt | 17.92 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/03_registry-autorun.en.txt | 11.29 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/03_registry-autorun.mp4 | 27.61 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/04_introduction-to-hijack-execution-flow.en.srt | 6.00 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/04_introduction-to-hijack-execution-flow.en.txt | 3.22 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/04_introduction-to-hijack-execution-flow.mp4 | 7.70 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/05_hijacked-execution-flow.en.srt | 18.06 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/05_hijacked-execution-flow.en.txt | 11.53 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/05_hijacked-execution-flow.mp4 | 26.22 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_mitre-att-ck-privilege-escalation.en.srt | 4.82 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_mitre-att-ck-privilege-escalation.en.txt | 2.54 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_mitre-att-ck-privilege-escalation.mp4 | 5.84 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/02_introduction-to-boot-or-logon-autostart-execution.en.srt | 5.98 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/02_introduction-to-boot-or-logon-autostart-execution.en.txt | 3.23 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/02_introduction-to-boot-or-logon-autostart-execution.mp4 | 7.13 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/03_logon-scripts.en.srt | 19.05 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/03_logon-scripts.en.txt | 10.03 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/03_logon-scripts.mp4 | 23.44 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/04_introduction-to-process-injection.en.srt | 8.41 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/04_introduction-to-process-injection.en.txt | 4.48 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/04_introduction-to-process-injection.mp4 | 9.64 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/05_python-library-injection.en.srt | 11.40 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/05_python-library-injection.en.txt | 7.20 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/05_python-library-injection.mp4 | 13.62 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_mitre-att-ck-defense-evasion.en.srt | 4.53 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_mitre-att-ck-defense-evasion.en.txt | 2.42 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_mitre-att-ck-defense-evasion.mp4 | 6.45 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/02_introduction-to-impair-defenses.en.srt | 6.91 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/02_introduction-to-impair-defenses.en.txt | 3.63 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/02_introduction-to-impair-defenses.mp4 | 8.42 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/03_impair-avs.en.srt | 13.27 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/03_impair-avs.en.txt | 8.49 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/03_impair-avs.mp4 | 19.80 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/04_introduction-to-hide-artifacts.en.srt | 7.81 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/04_introduction-to-hide-artifacts.en.txt | 4.09 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/04_introduction-to-hide-artifacts.mp4 | 8.38 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/05_alternate-data-streams.en.srt | 16.07 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/05_alternate-data-streams.en.txt | 8.42 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/05_alternate-data-streams.mp4 | 21.33 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_introduction-to-decoys.en.srt | 6.45 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_introduction-to-decoys.en.txt | 3.47 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_introduction-to-decoys.mp4 | 8.09 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/02_decoy-processes-for-active-defense.en.srt | 6.67 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/02_decoy-processes-for-active-defense.en.txt | 3.66 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/02_decoy-processes-for-active-defense.mp4 | 8.23 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/03_decoy-processes.en.srt | 14.17 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/03_decoy-processes.en.txt | 7.47 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/03_decoy-processes.mp4 | 17.60 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/04_decoy-content-for-active-defense.en.srt | 5.52 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/04_decoy-content-for-active-defense.en.txt | 3.57 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/04_decoy-content-for-active-defense.mp4 | 7.84 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/05_decoy-content.en.srt | 7.80 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/05_decoy-content.en.txt | 4.11 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/05_decoy-content.mp4 | 9.52 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/06_decoy-credentials-for-active-defense.en.srt | 6.38 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/06_decoy-credentials-for-active-defense.en.txt | 4.00 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/06_decoy-credentials-for-active-defense.mp4 | 7.75 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/07_decoy-credentials.en.srt | 15.94 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/07_decoy-credentials.en.txt | 8.39 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/07_decoy-credentials.mp4 | 18.83 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/01_active-defense-on-the-network.en.srt | 3.90 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/01_active-defense-on-the-network.en.txt | 2.11 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/01_active-defense-on-the-network.mp4 | 4.87 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/02_pcap-collection-for-active-defense.en.srt | 5.61 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/02_pcap-collection-for-active-defense.en.txt | 2.97 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/02_pcap-collection-for-active-defense.mp4 | 6.27 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/03_pcap-collection.en.srt | 17.68 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/03_pcap-collection.en.txt | 11.16 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/03_pcap-collection.mp4 | 24.78 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/04_protocol-decoding-for-active-defense.en.srt | 5.81 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/04_protocol-decoding-for-active-defense.en.txt | 3.10 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/04_protocol-decoding-for-active-defense.mp4 | 6.85 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/05_protocol-decoding.en.srt | 19.93 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/05_protocol-decoding.en.txt | 12.72 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/05_protocol-decoding.mp4 | 30.03 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/06_burn-in-for-active-defense.en.srt | 5.89 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/06_burn-in-for-active-defense.en.txt | 3.11 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/06_burn-in-for-active-defense.mp4 | 7.09 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/07_burn-in.en.srt | 14.66 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/07_burn-in.en.txt | 7.66 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/07_burn-in.mp4 | 16.43 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_monitoring-for-active-defense.en.srt | 3.26 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_monitoring-for-active-defense.en.txt | 2.04 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_monitoring-for-active-defense.mp4 | 4.36 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/02_network-monitoring-for-active-defense.en.srt | 5.46 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/02_network-monitoring-for-active-defense.en.txt | 2.95 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/02_network-monitoring-for-active-defense.mp4 | 6.89 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/03_network-monitoring.en.srt | 13.92 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/03_network-monitoring.en.txt | 7.36 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/03_network-monitoring.mp4 | 15.72 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/04_system-activity-monitoring-for-active-defense.en.srt | 5.91 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/04_system-activity-monitoring-for-active-defense.en.txt | 3.72 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/04_system-activity-monitoring-for-active-defense.mp4 | 8.37 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/05_system-activity-monitoring.en.srt | 19.70 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/05_system-activity-monitoring.en.txt | 10.34 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/05_system-activity-monitoring.mp4 | 25.34 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/06_behavioral-analytics-for-active-defense.en.srt | 6.61 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/06_behavioral-analytics-for-active-defense.en.txt | 4.16 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/06_behavioral-analytics-for-active-defense.mp4 | 9.00 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/07_behavioral-analytics.en.srt | 19.81 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/07_behavioral-analytics.en.txt | 12.46 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/07_behavioral-analytics.mp4 | 27.87 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity.en.srt | 2.79 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity.en.txt | 1.77 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity.mp4 | 3.87 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/02_introduction-to-python.en.srt | 6.72 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/02_introduction-to-python.en.txt | 4.27 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/02_introduction-to-python.mp4 | 8.83 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/03_introduction-to-mitre-att-ck-and-shield.en.srt | 10.27 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/03_introduction-to-mitre-att-ck-and-shield.en.txt | 6.45 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/03_introduction-to-mitre-att-ck-and-shield.mp4 | 15.63 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/04_python-for-cybersecurity-resources_instructions.html | 1.05 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/04_python-for-cybersecurity-resources_Python_for_Cybersecurity_Handout.pdf | 25.04 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/05_python-for-cybersecurity_quiz.html | 3.42 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_mitre-pre-att-ck.en.srt | 7.27 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_mitre-pre-att-ck.en.txt | 3.93 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_mitre-pre-att-ck.mp4 | 9.32 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/02_introduction-to-network-scanning.en.srt | 7.07 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/02_introduction-to-network-scanning.en.txt | 3.73 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/02_introduction-to-network-scanning.mp4 | 8.01 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/03_introduction-to-scapy.en.srt | 11.72 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/03_introduction-to-scapy.en.txt | 6.15 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/03_introduction-to-scapy.mp4 | 13.52 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/04_network-scanning.en.srt | 29.66 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/04_network-scanning.en.txt | 15.48 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/04_network-scanning.mp4 | 31.04 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/05_introduction-to-open-technical-databases.en.srt | 6.37 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/05_introduction-to-open-technical-databases.en.txt | 3.40 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/05_introduction-to-open-technical-databases.mp4 | 7.70 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/06_dns-exploration.en.srt | 19.60 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/06_dns-exploration.en.txt | 12.56 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/06_dns-exploration.mp4 | 26.07 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/07_python-for-pre-att-ck_quiz.html | 3.90 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_mitre-att-ck-initial-access.en.srt | 5.61 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_mitre-att-ck-initial-access.en.txt | 2.99 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_mitre-att-ck-initial-access.mp4 | 6.65 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/02_introduction-to-valid-accounts.en.srt | 7.04 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/02_introduction-to-valid-accounts.en.txt | 3.76 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/02_introduction-to-valid-accounts.mp4 | 8.22 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/03_default-account-discovery.en.srt | 16.53 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/03_default-account-discovery.en.txt | 8.78 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/03_default-account-discovery.mp4 | 20.73 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/04_introduction-to-replication-through-removable-media.en.srt | 7.25 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/04_introduction-to-replication-through-removable-media.en.txt | 3.87 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/04_introduction-to-replication-through-removable-media.mp4 | 8.13 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/05_autorun-scripts.en.srt | 17.44 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/05_autorun-scripts.en.txt | 9.24 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/05_autorun-scripts.mp4 | 20.21 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/06_python-for-initial-access_exam.html | 4.35 kB |