Naam: | Python for Cybersecurity Specialization |
_DESCRIPTION_: Description Master Python for a variety of cybersecurity tasks. This Specialization provides an application-driven introduction to using Python for cybersecurity. Advance your subject-matter expertise Learn in-demand skills from university and industry experts Master a subject or tool with hands-on projects Develop a deep understanding of key concepts Earn a career certificate from Infosec Specialization – 5 course series Python is one of the most popular and widely-used programming languages in the world due to its high usability and large collection of libraries. This learning path provides an application-driven introduction to using Python for cybersecurity. Python can help to automate tasks across the cyberattack life cycle for both cyber attackers and defenders. This Specialization demonstrates some of these applications and how Python can be used to make cybersecurity professionals more efficient and effective. Last Updated 9/2023 | |
YouTube Video: | |
Categorie: | Tutorials |
Taal: | English |
Totale grootte: | 1.14 GB |
Info Hash: | FC65D2A14A672DCDD71D8DFD97E434B587B10B4A |
Toegevoegd door: | tutsnode |
Datum toegevoegd: | 2023-10-18 12:51:03 |
_TORSTATUS_: | Torrent Verified |
Ratings: | Not Yet Rated (Log in to rate it) |
URL | Zaaimachines | Leechers | Completed |
---|---|---|---|
udp://open.stealth.si:80/announce | 0 | 0 | 0 |
udp://tracker.tiny-vps.com:6969/announce | 0 | 0 | 0 |
udp://fasttracker.foreverpirates.co:6969/announce | 0 | 0 | 0 |
udp://tracker.opentrackr.org:1337/announce | 0 | 0 | 0 |
udp://explodie.org:6969/announce | 0 | 0 | 0 |
udp://tracker.cyberia.is:6969/announce | 0 | 0 | 0 |
udp://ipv4.tracker.harry.lu:80/announce | 0 | 0 | 0 |
udp://tracker.uw0.xyz:6969/announce | 0 | 0 | 0 |
udp://opentracker.i2p.rocks:6969/announce | 0 | 0 | 0 |
udp://tracker.birkenwald.de:6969/announce | 0 | 0 | 0 |
udp://tracker.torrent.eu.org:451/announce | 0 | 0 | 0 |
udp://tracker.moeking.me:6969/announce | 0 | 0 | 0 |
udp://tracker.dler.org:6969/announce | 0 | 0 | 0 |
udp://9.rarbg.me:2970/announce | 0 | 0 | 0 |
Bestand | Grootte |
---|---|
.pad/0 | 102.00 B |
.pad/1 | 94.33 kB |
.pad/10 | 387.92 kB |
.pad/11 | 395.57 kB |
.pad/12 | 287.08 kB |
.pad/13 | 60.86 kB |
.pad/14 | 494.84 kB |
.pad/15 | 172.04 kB |
.pad/16 | 274.56 kB |
.pad/17 | 298.90 kB |
.pad/18 | 205.63 kB |
.pad/19 | 269.34 kB |
.pad/2 | 472.82 kB |
.pad/20 | 177.16 kB |
.pad/21 | 411.21 kB |
.pad/22 | 141.32 kB |
.pad/23 | 74.79 kB |
.pad/24 | 47.33 kB |
.pad/25 | 286.92 kB |
.pad/26 | 383.98 kB |
.pad/27 | 103.82 kB |
.pad/28 | 195.16 kB |
.pad/29 | 392.11 kB |
.pad/3 | 479.87 kB |
.pad/30 | 487.48 kB |
.pad/31 | 374.93 kB |
.pad/32 | 357.66 kB |
.pad/33 | 410.03 kB |
.pad/34 | 373.56 kB |
.pad/35 | 491.32 kB |
.pad/36 | 183.07 kB |
.pad/37 | 2.05 kB |
.pad/38 | 176.47 kB |
.pad/39 | 453.46 kB |
.pad/4 | 132.58 kB |
.pad/40 | 82.60 kB |
.pad/41 | 124.61 kB |
.pad/42 | 138.13 kB |
.pad/43 | 272.02 kB |
.pad/44 | 289.22 kB |
.pad/45 | 377.08 kB |
.pad/46 | 423.93 kB |
.pad/47 | 457.51 kB |
.pad/48 | 503.69 kB |
.pad/49 | 159.74 kB |
.pad/5 | 398.62 kB |
.pad/50 | 184.25 kB |
.pad/51 | 257.90 kB |
.pad/52 | 306.77 kB |
.pad/53 | 308.29 kB |
.pad/54 | 428.53 kB |
.pad/55 | 483.62 kB |
.pad/56 | 47.60 kB |
.pad/57 | 87.43 kB |
.pad/58 | 127.87 kB |
.pad/59 | 137.26 kB |
.pad/6 | 289.89 kB |
.pad/60 | 208.91 kB |
.pad/61 | 229.06 kB |
.pad/62 | 381.78 kB |
.pad/63 | 423.59 kB |
.pad/64 | 109.12 kB |
.pad/65 | 154.98 kB |
.pad/66 | 202.64 kB |
.pad/67 | 361.74 kB |
.pad/68 | 376.18 kB |
.pad/69 | 484.62 kB |
.pad/7 | 436.50 kB |
.pad/70 | 55.70 kB |
.pad/71 | 220.76 kB |
.pad/72 | 220.79 kB |
.pad/73 | 237.41 kB |
.pad/74 | 295.45 kB |
.pad/75 | 318.09 kB |
.pad/76 | 411.58 kB |
.pad/77 | 417.84 kB |
.pad/78 | 22.18 kB |
.pad/79 | 49.98 kB |
.pad/8 | 165.04 kB |
.pad/80 | 165.20 kB |
.pad/81 | 192.50 kB |
.pad/82 | 213.84 kB |
.pad/83 | 252.13 kB |
.pad/84 | 358.61 kB |
.pad/85 | 3.26 kB |
.pad/86 | 128.93 kB |
.pad/87 | 239.16 kB |
.pad/88 | 143.08 kB |
.pad/9 | 224.92 kB |
TutsNode.org.txt | 63.00 B |
[TGx]Downloaded from torrentgalaxy.to .txt | 585.00 B |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_mitre-att-ck-command-and-control.en.srt | 5.84 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_mitre-att-ck-command-and-control.en.txt | 3.12 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_mitre-att-ck-command-and-control.mp4 | 7.28 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/02_introduction-to-encrypted-channels.en.srt | 6.95 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/02_introduction-to-encrypted-channels.en.txt | 3.64 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/02_introduction-to-encrypted-channels.mp4 | 7.82 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/03_encrypted-channel.en.srt | 20.01 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/03_encrypted-channel.en.txt | 10.52 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/03_encrypted-channel.mp4 | 24.62 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/04_introduction-to-protocol-tunneling.en.srt | 6.33 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/04_introduction-to-protocol-tunneling.en.txt | 4.04 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/04_introduction-to-protocol-tunneling.mp4 | 7.45 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/05_protocol-tunneling.en.srt | 13.84 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/05_protocol-tunneling.en.txt | 7.31 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/05_protocol-tunneling.mp4 | 17.36 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_mitre-att-ck-exfiltration.en.srt | 4.20 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_mitre-att-ck-exfiltration.en.txt | 2.68 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_mitre-att-ck-exfiltration.mp4 | 5.98 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/02_introduction-to-exfiltration-over-alternative-protocols.en.srt | 4.45 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/02_introduction-to-exfiltration-over-alternative-protocols.en.txt | 2.37 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/02_introduction-to-exfiltration-over-alternative-protocols.mp4 | 5.81 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/03_alternative-protocol.en.srt | 38.97 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/03_alternative-protocol.en.txt | 20.48 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/03_alternative-protocol.mp4 | 58.97 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/04_introduction-to-non-application-layer-protocol.en.srt | 5.02 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/04_introduction-to-non-application-layer-protocol.en.txt | 3.23 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/04_introduction-to-non-application-layer-protocol.mp4 | 6.53 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/05_non-application-layer-protocol.en.srt | 6.41 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/05_non-application-layer-protocol.en.txt | 3.43 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/05_non-application-layer-protocol.mp4 | 6.80 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_mitre-att-ck-impact.en.srt | 4.11 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_mitre-att-ck-impact.en.txt | 2.63 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_mitre-att-ck-impact.mp4 | 5.75 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/02_introduction-to-data-encrypted-for-impact.en.srt | 5.06 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/02_introduction-to-data-encrypted-for-impact.en.txt | 2.68 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/02_introduction-to-data-encrypted-for-impact.mp4 | 5.95 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/03_data-encryption.en.srt | 12.87 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/03_data-encryption.en.txt | 8.26 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/03_data-encryption.mp4 | 22.52 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/04_introduction-to-account-access-removal.en.srt | 6.74 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/04_introduction-to-account-access-removal.en.txt | 3.63 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/04_introduction-to-account-access-removal.mp4 | 7.41 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/05_account-access-removal.en.srt | 11.29 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/05_account-access-removal.en.txt | 7.12 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/05_account-access-removal.mp4 | 14.40 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_mitre-att-ck-credential-access.en.srt | 5.21 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_mitre-att-ck-credential-access.en.txt | 3.29 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_mitre-att-ck-credential-access.mp4 | 7.38 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/02_introduction-to-credentials-from-password-stores.en.srt | 5.94 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/02_introduction-to-credentials-from-password-stores.en.txt | 3.16 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/02_introduction-to-credentials-from-password-stores.mp4 | 6.63 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/03_credentials-from-web-browsers.en.srt | 10.93 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/03_credentials-from-web-browsers.en.txt | 6.83 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/03_credentials-from-web-browsers.mp4 | 19.74 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/04_introduction-to-network-sniffing.en.srt | 6.65 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/04_introduction-to-network-sniffing.en.txt | 3.63 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/04_introduction-to-network-sniffing.mp4 | 7.58 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/05_network-sniffing.en.srt | 31.71 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/05_network-sniffing.en.txt | 16.57 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/05_network-sniffing.mp4 | 40.04 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_mitre-att-ck-discovery.en.srt | 4.50 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_mitre-att-ck-discovery.en.txt | 2.88 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_mitre-att-ck-discovery.mp4 | 6.28 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/02_introduction-to-account-discovery.en.srt | 6.85 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/02_introduction-to-account-discovery.en.txt | 3.68 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/02_introduction-to-account-discovery.mp4 | 7.37 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/03_user-account-discovery.en.srt | 22.18 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/03_user-account-discovery.en.txt | 11.63 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/03_user-account-discovery.mp4 | 24.22 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/04_introduction-to-file-and-directory-discovery.en.srt | 4.41 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/04_introduction-to-file-and-directory-discovery.en.txt | 2.76 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/04_introduction-to-file-and-directory-discovery.mp4 | 5.79 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/05_file-and-directory-discovery.en.srt | 13.40 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/05_file-and-directory-discovery.en.txt | 7.11 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/05_file-and-directory-discovery.mp4 | 15.95 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_mitre-att-ck-lateral-movement.en.srt | 3.50 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_mitre-att-ck-lateral-movement.en.txt | 2.25 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_mitre-att-ck-lateral-movement.mp4 | 5.15 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/02_introduction-to-remote-services.en.srt | 5.04 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/02_introduction-to-remote-services.en.txt | 2.66 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/02_introduction-to-remote-services.mp4 | 6.09 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/03_smb-windows-admin-shares.en.srt | 8.32 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/03_smb-windows-admin-shares.en.txt | 5.28 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/03_smb-windows-admin-shares.mp4 | 11.60 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/04_introduction-to-use-alternative-authentication-material.en.srt | 6.32 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/04_introduction-to-use-alternative-authentication-material.en.txt | 4.00 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/04_introduction-to-use-alternative-authentication-material.mp4 | 8.56 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/05_web-session-cookie.en.srt | 12.10 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/05_web-session-cookie.en.txt | 6.36 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/05_web-session-cookie.mp4 | 14.31 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_mitre-att-ck-collection.en.srt | 3.71 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_mitre-att-ck-collection.en.txt | 2.33 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_mitre-att-ck-collection.mp4 | 5.00 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/02_introduction-to-clipboard-data.en.srt | 6.26 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/02_introduction-to-clipboard-data.en.txt | 3.95 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/02_introduction-to-clipboard-data.mp4 | 8.05 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/03_clipboard-data.en.srt | 9.76 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/03_clipboard-data.en.txt | 6.24 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/03_clipboard-data.mp4 | 12.65 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/04_introduction-to-email-collection.en.srt | 7.11 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/04_introduction-to-email-collection.en.txt | 3.83 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/04_introduction-to-email-collection.mp4 | 7.53 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/05_local-email-collection.en.srt | 6.61 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/05_local-email-collection.en.txt | 3.63 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/05_local-email-collection.mp4 | 7.30 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_mitre-att-ck-execution.en.srt | 5.06 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_mitre-att-ck-execution.en.txt | 2.71 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_mitre-att-ck-execution.mp4 | 6.10 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/02_introduction-to-user-execution.en.srt | 4.19 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/02_introduction-to-user-execution.en.txt | 2.28 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/02_introduction-to-user-execution.mp4 | 4.77 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/03_malicious-links.en.srt | 10.88 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/03_malicious-links.en.txt | 6.92 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/03_malicious-links.mp4 | 13.13 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/04_introduction-to-scheduled-tasks-and-jobs.en.srt | 6.02 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/04_introduction-to-scheduled-tasks-and-jobs.en.txt | 3.18 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/04_introduction-to-scheduled-tasks-and-jobs.mp4 | 6.28 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/05_scheduled-execution.en.srt | 14.84 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/05_scheduled-execution.en.txt | 7.74 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/05_scheduled-execution.mp4 | 24.61 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_mitre-att-ck-persistence.en.srt | 5.04 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_mitre-att-ck-persistence.en.txt | 2.70 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_mitre-att-ck-persistence.mp4 | 6.21 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/02_introduction-to-boot-or-logon-autostart-execution.en.srt | 4.83 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/02_introduction-to-boot-or-logon-autostart-execution.en.txt | 2.58 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/02_introduction-to-boot-or-logon-autostart-execution.mp4 | 6.19 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/03_registry-autorun.en.srt | 17.92 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/03_registry-autorun.en.txt | 11.29 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/03_registry-autorun.mp4 | 27.61 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/04_introduction-to-hijack-execution-flow.en.srt | 6.00 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/04_introduction-to-hijack-execution-flow.en.txt | 3.22 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/04_introduction-to-hijack-execution-flow.mp4 | 7.70 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/05_hijacked-execution-flow.en.srt | 18.06 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/05_hijacked-execution-flow.en.txt | 11.53 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/05_hijacked-execution-flow.mp4 | 26.22 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_mitre-att-ck-privilege-escalation.en.srt | 4.82 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_mitre-att-ck-privilege-escalation.en.txt | 2.54 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_mitre-att-ck-privilege-escalation.mp4 | 5.84 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/02_introduction-to-boot-or-logon-autostart-execution.en.srt | 5.98 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/02_introduction-to-boot-or-logon-autostart-execution.en.txt | 3.23 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/02_introduction-to-boot-or-logon-autostart-execution.mp4 | 7.13 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/03_logon-scripts.en.srt | 19.05 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/03_logon-scripts.en.txt | 10.03 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/03_logon-scripts.mp4 | 23.44 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/04_introduction-to-process-injection.en.srt | 8.41 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/04_introduction-to-process-injection.en.txt | 4.48 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/04_introduction-to-process-injection.mp4 | 9.64 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/05_python-library-injection.en.srt | 11.40 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/05_python-library-injection.en.txt | 7.20 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/05_python-library-injection.mp4 | 13.62 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_mitre-att-ck-defense-evasion.en.srt | 4.53 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_mitre-att-ck-defense-evasion.en.txt | 2.42 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_mitre-att-ck-defense-evasion.mp4 | 6.45 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/02_introduction-to-impair-defenses.en.srt | 6.91 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/02_introduction-to-impair-defenses.en.txt | 3.63 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/02_introduction-to-impair-defenses.mp4 | 8.42 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/03_impair-avs.en.srt | 13.27 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/03_impair-avs.en.txt | 8.49 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/03_impair-avs.mp4 | 19.80 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/04_introduction-to-hide-artifacts.en.srt | 7.81 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/04_introduction-to-hide-artifacts.en.txt | 4.09 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/04_introduction-to-hide-artifacts.mp4 | 8.38 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/05_alternate-data-streams.en.srt | 16.07 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/05_alternate-data-streams.en.txt | 8.42 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/05_alternate-data-streams.mp4 | 21.33 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_introduction-to-decoys.en.srt | 6.45 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_introduction-to-decoys.en.txt | 3.47 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_introduction-to-decoys.mp4 | 8.09 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/02_decoy-processes-for-active-defense.en.srt | 6.67 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/02_decoy-processes-for-active-defense.en.txt | 3.66 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/02_decoy-processes-for-active-defense.mp4 | 8.23 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/03_decoy-processes.en.srt | 14.17 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/03_decoy-processes.en.txt | 7.47 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/03_decoy-processes.mp4 | 17.60 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/04_decoy-content-for-active-defense.en.srt | 5.52 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/04_decoy-content-for-active-defense.en.txt | 3.57 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/04_decoy-content-for-active-defense.mp4 | 7.84 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/05_decoy-content.en.srt | 7.80 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/05_decoy-content.en.txt | 4.11 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/05_decoy-content.mp4 | 9.52 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/06_decoy-credentials-for-active-defense.en.srt | 6.38 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/06_decoy-credentials-for-active-defense.en.txt | 4.00 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/06_decoy-credentials-for-active-defense.mp4 | 7.75 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/07_decoy-credentials.en.srt | 15.94 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/07_decoy-credentials.en.txt | 8.39 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/07_decoy-credentials.mp4 | 18.83 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/01_active-defense-on-the-network.en.srt | 3.90 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/01_active-defense-on-the-network.en.txt | 2.11 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/01_active-defense-on-the-network.mp4 | 4.87 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/02_pcap-collection-for-active-defense.en.srt | 5.61 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/02_pcap-collection-for-active-defense.en.txt | 2.97 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/02_pcap-collection-for-active-defense.mp4 | 6.27 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/03_pcap-collection.en.srt | 17.68 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/03_pcap-collection.en.txt | 11.16 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/03_pcap-collection.mp4 | 24.78 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/04_protocol-decoding-for-active-defense.en.srt | 5.81 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/04_protocol-decoding-for-active-defense.en.txt | 3.10 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/04_protocol-decoding-for-active-defense.mp4 | 6.85 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/05_protocol-decoding.en.srt | 19.93 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/05_protocol-decoding.en.txt | 12.72 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/05_protocol-decoding.mp4 | 30.03 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/06_burn-in-for-active-defense.en.srt | 5.89 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/06_burn-in-for-active-defense.en.txt | 3.11 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/06_burn-in-for-active-defense.mp4 | 7.09 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/07_burn-in.en.srt | 14.66 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/07_burn-in.en.txt | 7.66 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/07_burn-in.mp4 | 16.43 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_monitoring-for-active-defense.en.srt | 3.26 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_monitoring-for-active-defense.en.txt | 2.04 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_monitoring-for-active-defense.mp4 | 4.36 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/02_network-monitoring-for-active-defense.en.srt | 5.46 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/02_network-monitoring-for-active-defense.en.txt | 2.95 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/02_network-monitoring-for-active-defense.mp4 | 6.89 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/03_network-monitoring.en.srt | 13.92 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/03_network-monitoring.en.txt | 7.36 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/03_network-monitoring.mp4 | 15.72 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/04_system-activity-monitoring-for-active-defense.en.srt | 5.91 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/04_system-activity-monitoring-for-active-defense.en.txt | 3.72 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/04_system-activity-monitoring-for-active-defense.mp4 | 8.37 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/05_system-activity-monitoring.en.srt | 19.70 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/05_system-activity-monitoring.en.txt | 10.34 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/05_system-activity-monitoring.mp4 | 25.34 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/06_behavioral-analytics-for-active-defense.en.srt | 6.61 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/06_behavioral-analytics-for-active-defense.en.txt | 4.16 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/06_behavioral-analytics-for-active-defense.mp4 | 9.00 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/07_behavioral-analytics.en.srt | 19.81 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/07_behavioral-analytics.en.txt | 12.46 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/07_behavioral-analytics.mp4 | 27.87 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity.en.srt | 2.79 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity.en.txt | 1.77 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity.mp4 | 3.87 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/02_introduction-to-python.en.srt | 6.72 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/02_introduction-to-python.en.txt | 4.27 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/02_introduction-to-python.mp4 | 8.83 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/03_introduction-to-mitre-att-ck-and-shield.en.srt | 10.27 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/03_introduction-to-mitre-att-ck-and-shield.en.txt | 6.45 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/03_introduction-to-mitre-att-ck-and-shield.mp4 | 15.63 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/04_python-for-cybersecurity-resources_instructions.html | 1.05 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/04_python-for-cybersecurity-resources_Python_for_Cybersecurity_Handout.pdf | 25.04 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/05_python-for-cybersecurity_quiz.html | 3.42 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_mitre-pre-att-ck.en.srt | 7.27 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_mitre-pre-att-ck.en.txt | 3.93 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_mitre-pre-att-ck.mp4 | 9.32 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/02_introduction-to-network-scanning.en.srt | 7.07 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/02_introduction-to-network-scanning.en.txt | 3.73 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/02_introduction-to-network-scanning.mp4 | 8.01 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/03_introduction-to-scapy.en.srt | 11.72 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/03_introduction-to-scapy.en.txt | 6.15 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/03_introduction-to-scapy.mp4 | 13.52 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/04_network-scanning.en.srt | 29.66 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/04_network-scanning.en.txt | 15.48 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/04_network-scanning.mp4 | 31.04 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/05_introduction-to-open-technical-databases.en.srt | 6.37 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/05_introduction-to-open-technical-databases.en.txt | 3.40 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/05_introduction-to-open-technical-databases.mp4 | 7.70 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/06_dns-exploration.en.srt | 19.60 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/06_dns-exploration.en.txt | 12.56 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/06_dns-exploration.mp4 | 26.07 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/07_python-for-pre-att-ck_quiz.html | 3.90 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_mitre-att-ck-initial-access.en.srt | 5.61 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_mitre-att-ck-initial-access.en.txt | 2.99 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_mitre-att-ck-initial-access.mp4 | 6.65 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/02_introduction-to-valid-accounts.en.srt | 7.04 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/02_introduction-to-valid-accounts.en.txt | 3.76 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/02_introduction-to-valid-accounts.mp4 | 8.22 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/03_default-account-discovery.en.srt | 16.53 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/03_default-account-discovery.en.txt | 8.78 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/03_default-account-discovery.mp4 | 20.73 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/04_introduction-to-replication-through-removable-media.en.srt | 7.25 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/04_introduction-to-replication-through-removable-media.en.txt | 3.87 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/04_introduction-to-replication-through-removable-media.mp4 | 8.13 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/05_autorun-scripts.en.srt | 17.44 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/05_autorun-scripts.en.txt | 9.24 kB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/05_autorun-scripts.mp4 | 20.21 MB |
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/06_python-for-initial-access_exam.html | 4.35 kB |