Name Size
Parent Directory - 11. Summary.mp4 3.2M 1. Introduction.mp4 4.7M 5. Understanding spearphishing.mp4 7.0M 6. Enumeration as a verification vector.mp4 7.4M 8. Identifying attacks with phishtank.mp4 8.0M 4. Call signs of a fishing page.mp4 14M 3. Call signs of a fishing email.mp4 19M 10. Phish5.mp4 21M 2. Phishing.mp4 22M 7. Filter evasion and concealment techniques.mp4 23M 9. Phishing with beef.mp4 32M