elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
00316 Enterprise_Penetration_Testing_and_Continuous_Monitoring_-_Summary.mp4 92M
00315 10.2_Surveying_Continouos_Reporting_for_Enterprise_Continuous_Monitoring.mp4 29M
00314 10.1_Surveying_Final_Reports_for_Transactional_Penetration_Testing_Events.mp4 74M
00313 Learning_objectives.mp4 25M
00312 9.2_Exploring_How_to_Test_in_the_Cloud.mp4 182M
00311 9.1_Understanding_the_Challenge_of_Testing_Cloud_Services.mp4 211M
00310 Learning_objectives.mp4 26M
00309 8.8_Understanding_How_to_Cover_Your_Tracks.mp4 78M
00308 8.7_Understanding_Data_Exfiltration_Techniques.mp4 103M
00307 8.6_Searching_for_Sensitive_Data.mp4 142M
00306 8.5_Understanding_That_Domain_Admin_Is_Not_the_End_Goal.mp4 36M
00305 8.4_Surveying_Password_Cracking_amp_Reporting.mp4 48M
00304 8.3_Understanding_How_to_Compromise_User_Credentials.mp4 128M
00303 8.2_Learning_How_to_Achieve_Domain_Admin_Access.mp4 79M
00302 8.1_Understanding_Persistent_Access.mp4 16M
00301 Learning_objectives.mp4 55M
00300 7.3_Surveying_Privilege_Escalation_Essential_Tools.mp4 59M
00299 7.2_Understanding_Lateral_Movement.mp4 218M
00298 7.1_Learning_Privilege_Escalation_Methodologies.mp4 74M
00297 Learning_objectives.mp4 32M
00296 6.4_Learning_How_to_Host_Enterprise_Capture_the_Flag_Events.mp4 98M
00295 6.3_Exploring_the_Hidden_Cost_of_Open_Source_Software.mp4 223M
00294 6.2_Understanding_What_Hosts_to_Target_and_the_Scope_of_the_Testing.mp4 70M
00293 6.1_Understanding_How_to_Initially_Get_on_the_Network.mp4 27M
00292 Learning_objectives.mp4 21M
00291 5.3_Understanding_Enterprise_Application_Continuous_Testing.mp4 95M
00290 5.2_Exploring_Web_App_Testing_Essential_Tools.mp4 171M
00289 5.1_Exploring_How_to_Target_Hosts.mp4 40M
00288 Learning_objectives.mp4 29M
00287 4.8_Understanding_How_to_Perform_Continuous_Monitoring.mp4 39M
00286 4.7_Understanding_Binary_and_Source_Code_Scanners.mp4 46M
00285 4.6_Exploring_Vulnerability_Scanners.mp4 149M
00284 4.5_Using_Shodan_and_Its_API.mp4 106M
00283 4.4_Exploring_How_to_Automate_Scans.mp4 205M
00282 4.3_Understanding_Scanning_Tools.mp4 46M
00281 4.2_Understanding_the_Operational_Impact_of_Enterprise-wide_Scanning.mp4 80M
00280 4.1_Exploring_Network_and_Vulnerability_Scanning_Methodologies.mp4 69M
00279 Learning_objectives.mp4 40M
00278 3.3_Exploiting_Social_Engineering_Tools.mp4 192M
00277 3.2_Understanding_How_to_Target_Employees.mp4 157M
00276 3.1_Surveying_Social_Engineering_Methodologies.mp4 231M
00275 Learning_objectives.mp4 24M
00274 2.3_Understanding_Active_Recon.mp4 145M
00273 2.2_Understanding_Passive_Recon.mp4 334M
00272 2.1_Understanding_the_Red_Team_Environment.mp4 313M
00271 Learning_objectives.mp4 31M
00270 1.7_Understanding_Red_Team_Collaboration.mp4 151M
00269 1.6_Understanding_How_to_Create_and_Hire_the_Red_Team.mp4 137M
00268 1.5_Surveying_Operational_Processes_and_Policies_for_the_Red_Team.mp4 212M
00267 1.4_Exploring_How_to_Plan_and_Fund_a_Red_Team.mp4 186M
00266 1.3_Understanding_the_Difference_Between_Red_and_Blue_Teams.mp4 160M
00265 1.2_Understanding_Enterprise_Wide_Penetration_Testing.mp4 435M
00264 1.1_Introducing_Red_Teams_and_Enterprise_Hacking.mp4 315M
00263 Learning_objectives.mp4 67M
00262 Introduction.mp4 124M
00261 Wireless_Networks_IoT_and_Mobile_Devices_Hacking_-_Summary.mp4 80M
00260 15.3_Surveying_Tools_for_Dissasembling_iOS_Applications.mp4 28M
00259 15.2_Exploring_Jailbraking_iOS.mp4 31M
00258 15.1_Introducing_iOS_Security.mp4 17M
00257 Learning_objectives.mp4 23M
00256 14.3_Understanding_Android_Hacking_Tools_and_Methodologies.mp4 276M
00255 14.2_Exploring_Android_Emulators_and_SDK.mp4 47M
00254 14.1_Exploring_The_Android_Security_Model.mp4 223M
00253 Learning_objectives.mp4 29M
00252 13.4_Understanding_Mobile_Device_Security_Policies.mp4 93M
00251 13.3_Understanding_Mobile_Device_Management_MDM.mp4 120M
00250 13.2_Wrestling_with_the_BYOD_Dilemma.mp4 112M
00249 13.1_Understanding_OWASP_Mobile_Device_Vulnerabilities.mp4 160M
00248 Learning_objectives.mp4 35M
00247 12.5_Exploring_LoRA.mp4 59M
00246 12.4_Exploring_ZWave.mp4 212M
00245 12.3_Exploring_INSTEON.mp4 48M
00244 12.2_Exploring_ZigBee_and_IEEE_802.15.4.mp4 50M
00243 12.1_Understanding_IoT_Fundamentals.mp4 258M
00242 Learning_objectives.mp4 24M
00241 11.4_Understanding_Wireless_Security_Policies.mp4 24M
00240 11.3_Understanding_Wireless_Intrusion_Monitoring_and_Prevention.mp4 17M
00239 11.2_Surveying_Fast_and_Secure_Roaming.mp4 115M
00238 11.1_Understanding_the_Evolution_of_Wireless_Defenses.mp4 64M
00237 Learning_objectives.mp4 25M
00236 10.2_Exploring_NFC_Attacks_and_Case_Studies.mp4 55M
00235 10.1_Understanding_NFC_Vulnerabilities.mp4 27M
00234 Learning_objectives.mp4 33M
00233 9.2_Surveying_Tools_for_Bluetooth_Monitoring.mp4 137M
00232 9.1_Understanding_Bluetooth_Vulnerabilities.mp4 19M
00231 Learning_objectives.mp4 23M
00230 8.4_Exploring_the_WiFi_Pineapple.mp4 223M
00229 8.3_Using_Karmetasploit.mp4 97M
00228 8.2_Performing_Evil_Twin_Attacks.mp4 228M
00227 8.1_Defining_Evil_Twin_Attacks.mp4 73M
00226 Learning_objectives.mp4 27M
00225 7.3_Learning_How_to_Hack_Default_Configurations.mp4 44M
00224 7.2_Using_Wireshark.mp4 53M
00223 7.1_Using_Kismet.mp4 60M
00222 Learning_objectives.mp4 24M
00221 6.5_Exploring_WPA_Enterprise_Hacking.mp4 59M
00220 6.4_Using_Pyrit.mp4 91M
00219 6.3_Using_coWPAtty.mp4 165M
00218 6.2_Surveying_Attacks_Against_WPA2-PSK_Networks.mp4 102M
00217 6.1_Understanding_WPA_Fundamentals.mp4 129M
00216 Learning_objectives.mp4 31M
00215 5.2_Learning_How_to_Crack_WEP.mp4 136M
00214 5.1_Understanding_WEP_Fundamentals.mp4 92M
00213 Learning_objectives.mp4 21M
00212 4.7_Introducing_Airtun-ng.mp4 50M
00211 4.6_Introducing_Airserv-ng.mp4 82M
00210 4.5_Introducing_Airdecap-ng.mp4 44M
00209 4.4_Introducing_Aireplay-ng.mp4 89M
00208 4.3_Understanding_Airodump-ng.mp4 87M
00207 4.2_Introducing_Airmon-ng.mp4 37M
00206 4.1_Introducing_the_Aircrack-ng_Suite.mp4 171M
00205 Learning_objectives.mp4 28M
00204 3.3_Building_Your_Own_Lab.mp4 165M
00203 3.2_Surveying_Wi-Fi_Devices_Like_the_Pinneaple.mp4 348M
00202 3.1_Understanding_Wireless_Antennas.mp4 125M
00201 Learning_objectives.mp4 23M
00200 2.5_Attacking_the_Preferred_Network_List_PNL.mp4 23M
00199 2.4_Attacking_Publicly_Secure_Packet_Forwarding_PSPF.mp4 31M
00198 2.3_Eavesdropping_and_Manipulating_Unencrypted_Wi-Fi_Communications.mp4 57M
00197 2.2_Learning_Packet_Injection_Attacks.mp4 24M
00196 2.1_Understanding_Wireless_Client_Attacks_and_Their_Motives.mp4 292M
00195 Learning_objectives.mp4 41M
00194 1.6_Understanding_802.1x_and_Wireless_Authentication_Mechanisms.mp4 98M
00193 1.5_Understanding_NFC.mp4 130M
00192 1.4_Understanding_Bluetooth.mp4 112M
00191 1.3_Understanding_the_802.11_Standard.mp4 144M
00190 1.2_Introducing_Wireless_Standards_and_Technologies.mp4 210M
00189 1.1_Introducing_Wireless_Hacking.mp4 254M
00188 Learning_objectives.mp4 27M
00187 Introduction.mp4 115M
00186 Hacking_Web_Applications_-_Summary.mp4 165M
00185 11.4_Fuzzing_Web_Applications.mp4 297M
00184 11.3_Surveying_Information_Disclosure_Vulnerabilities.mp4 52M
00183 11.2_Exploiting_Insecure_Direct_Object_References_and_Path_Traversal.mp4 309M
00182 11.1_Understanding_the_Other_Common_Security_Flaws_in_Web_Applications.mp4 132M
00181 Learning_objectives.mp4 63M
00180 10.4_Mitigating_AJAX_HTML5_and_Client-side_Vulnerabilities.mp4 59M
00179 10.3_Understanding_AJAX_Implementations.mp4 80M
00178 10.2_Understanding_HTML5_Implementations.mp4 212M
00177 10.1_Surveying_the_Client-side_Code_and_Storage.mp4 187M
00176 Learning_objectives.mp4 41M
00175 9.2_Exploring_the_Tools_Used_to_Test_the_APIs.mp4 139M
00174 9.1_Understanding_the_APIs.mp4 94M
00173 Learning_objectives.mp4 32M
00172 8.4_Mitigating_Flaws_in_Cryptographic_Implementations.mp4 103M
00171 8.3_Surveying_Examples_of_Crypto-based_Attacks_and_Vulnerabilities.mp4 136M
00170 8.2_Identifying_Common_Flaws_in_Data_Storage_and_Transmission.mp4 289M
00169 8.1_Introducing_Cryptography_Encryption_and_Hashing_Protocols.mp4 722M
00168 Learning_objectives.mp4 68M
00167 7.8_Mitigating_XSS_and_CSRF_Vulnerabilities.mp4 240M
00166 7.7_Evading_Web_Application_Security_Controls.mp4 185M
00165 7.6_Exploiting_CSRF_Vulnerabilities.mp4 72M
00164 7.5_Understanding_Cross-Site_Request_Forgery_CSRF.mp4 42M
00163 7.4_Exploiting_DOM-based_XSS_Vulnerabilities.mp4 108M
00162 7.3_Exploiting_Stored_XSS_Vulnerabilities.mp4 106M
00161 7.2_Exploiting_Reflected_XSS_Vulnerabilities.mp4 82M
00160 7.1_Introducing_XSS.mp4 41M
00159 Learning_objectives.mp4 84M
00158 6.7_Mitigating_Injection_Vulnerabilities.mp4 79M
00157 6.6_Exploiting_XML_Injection_Vulnerabilities.mp4 81M
00156 6.5_Understanding_XML_Injection.mp4 47M
00155 6.4_Exploiting_SQL_Injection_Vulnerabilities.mp4 808M
00154 6.3_Understanding_SQL_Injection.mp4 169M
00153 6.2_Exploiting_Command_Injection_Vulnerabilities.mp4 97M
00152 6.1_Understanding_Command_Injection.mp4 68M
00151 Learning_objectives.mp4 69M
00150 5.2_Exploring_Session_Management_Mechanisms_and_Related_Vulnerabilities.mp4 439M
00149 5.1_Understanding_Authentication_Schemes_in_Web_Applications.mp4 699M
00148 Learning_objectives.mp4 52M
00147 4.10_Introducing_OpenVAS.mp4 266M
00146 4.9_Introducing_OWASP_Zed_Application_Proxy_ZAP.mp4 170M
00145 4.8_Introducing_the_Burp_Suite.mp4 524M
00144 4.7_Introducing_Nikto.mp4 117M
00143 4.6_Understanding_How_Web_Application_Scanners_Work.mp4 64M
00142 4.5_Surveying_Web_Crawlers_and_Directory_Brute_Force.mp4 152M
00141 4.4_Exploring_CMS_and_Framework_Identification.mp4 134M
00140 4.3_Exploring_Shodan_Maltego_Recon-NG_SpiderFoot_and_TheHarvester.mp4 488M
00139 4.2_Using_Search_Engines_and_Public_Information.mp4 162M
00138 4.1_Understanding_Passive_vs._Active_Reconnaissance.mp4 131M
00137 Learning_objectives.mp4 104M
00136 3.8_Understanding_Cyber_Ranges_and_Capture_the_Flag_Events.mp4 109M
00135 3.7_Understanding_Web_Application_Proxies.mp4 109M
00134 3.6_Exploring_the_Web_Security_Dojo.mp4 105M
00133 3.5_Surveying_Hackazon.mp4 100M
00132 3.4_Surveying_WebGoat.mp4 64M
00131 3.3_Surveying_DVWA.mp4 51M
00130 3.2_Introducing_Vulnerable_Applications.mp4 57M
00129 3.1_Exploring_Kali_Linux.mp4 559M
00128 Learning_objectives.mp4 91M
00127 2.8_Introducing_Kubernetes.mp4 96M
00126 2.7_Surveying_Docker_Containers.mp4 182M
00125 2.6_Exploring_Web_Application_Frameworks.mp4 69M
00124 2.5_Exploring_Cloud_Services.mp4 108M
00123 2.4_Introducing_DevOps.mp4 74M
00122 2.3_Surveying_Session_Management_and_Cookies.mp4 231M
00121 2.2_Exploring_the_HTTP_Request_and_Response.mp4 167M
00120 2.1_Understanding_the_Web_Application_Protocols.mp4 219M
00119 Learning_objectives.mp4 89M
00118 1.5_Exploring_What_Programming_Languages_You_Should_Know.mp4 167M
00117 1.4_Exploring_How_Web_Applications_Have_Evolved_Over_Time.mp4 123M
00116 1.3_Understanding_the_Need_for_Web_Application_Penetration_Testing.mp4 75M
00115 1.2_Surveying_Web_Application_Penetration_Testing_Methodologies.mp4 133M
00114 1.1_Understanding_Ethical_Hacking_and_Penetration_Testing.mp4 44M
00113 Learning_objectives.mp4 83M
00112 Introduction.mp4 166M
00111 Security_Penetration_Testing_-_Summary.mp4 56M
00110 15.5_Distributing_Pen_Test_Reports.mp4 38M
00109 15.4_Exploring_Risk_Ratings.mp4 67M
00108 15.3_Understanding_the_Pen_Test_Report_Format.mp4 66M
00107 15.2_Planning_and_Organizing_Your_Report.mp4 84M
00106 15.1_Understanding_Pen_Test_Reports_and_How_They_Are_Used.mp4 94M
00105 Learning_objectives.mp4 37M
00104 14.6_Defending_Against_the_Advanced_Persistent_Threat.mp4 53M
00103 14.5_Understanding_Pivoting_and_Lateral_Movement.mp4 215M
00102 14.4_Maintaining_Persistence.mp4 28M
00101 14.3_Gaining_Network_Access_with_SMB_Relay_Attacks_NetBIOS_Name_Service.mp4 386M
00100 14.2_Gaining_Network_Access.mp4 294M
00099 14.1_Understanding_Persistence.mp4 164M
00098 Learning_objectives.mp4 31M
00097 13.4_Surveying_Social_Engineering_Case_Studies.mp4 250M
00096 13.3_Exploring_Maltego.mp4 196M
00095 13.2_Exploring_the_Social_Engineering_Toolkit_SET.mp4 178M
00094 13.1_Understanding_Social_Engineering.mp4 210M
00093 Learning_objectives.mp4 31M
00092 12.3_Covering_Your_Tracks.mp4 44M
00091 12.2_Exploring_Post_Exploitation_Techniques.mp4 34M
00090 12.1_Understanding_Security_Evasion_Techniques.mp4 201M
00089 Learning_objectives.mp4 27M
00088 11.4_Gathering_Network_Information_Using_PowerShell.mp4 123M
00087 11.3_Pwning_Windows_Using_PowerShell_-_Empire_Modules_and_Advanced_Exploits.mp4 247M
00086 11.2_Pwning_Windows_Using_PowerShell_-_Empire_Components_Setup_and_Basic_Exploits.mp4 404M
00085 11.1_Understanding_Powershell.mp4 245M
00084 Learning_objectives.mp4 16M
00083 10.7_Surveying_Tools_to_Find_and_Exploit_Buffer_Overflows.mp4 193M
00082 10.6_Exploring_Mutation-based_Generation-based_and_Evolutionary_Fuzzers.mp4 94M
00081 10.5_Creating_a_Fuzzing_Strategy.mp4 152M
00080 10.4_Understanding_Fuzzing.mp4 52M
00079 10.3_Overcoming_Defenses_for_Buffer_Overflow_Vulnerabilities.mp4 37M
00078 10.2_Exploiting_Buffer_Overflows.mp4 165M
00077 10.1_Understanding_Buffer_Overflows.mp4 188M
00076 Learning_objectives.mp4 29M
00075 9.5_Understanding_Hacking_Wireless_Clients.mp4 188M
00074 9.4_Hacking_WEP_WPA_and_Other_Protocols.mp4 311M
00073 9.3_Surveying_Wireless_Hacking_Tools_-_Software.mp4 159M
00072 9.2_Surveying_Wireless_Hacking_Tools_-_Wireless_Adapters.mp4 230M
00071 9.1_Reviewing_Wireless_Technology_Fundamentals.mp4 236M
00070 Learning_objectives.mp4 30M
00069 8.18_Using_Network_Device_Hacking_Tools_to_Perform_a_MiTM_Attack.mp4 65M
00068 8.17_Surveying_Essential_Tools_for_Hacking_Network_Devices_-_Linux_Tools.mp4 97M
00067 8.16_Surveying_Essential_Tools_for_Hacking_Network_Devices_-_MiTM_Tools.mp4 81M
00066 8.15_Surveying_Essential_Tools_for_Hacking_Network_Devices_-_ARP_Spoofing_Tools.mp4 206M
00065 8.14_Surveying_Essential_Tools_for_Hacking_Network_Devices_-_Switch_and_Router.mp4 200M
00064 8.13_Surveying_Essential_Tools_for_Hacking_Network_Devices_-_Packet_Capture.mp4 285M
00063 8.12_Performing_Firewall_Reconnaissance_and_Tunneling.mp4 126M
00062 8.11_Understanding_Firewall_Fundamentals_and_Levels_of_Inspection.mp4 315M
00061 8.10_Hacking_the_Management_Plane.mp4 448M
00060 8.9_Examining_ICMP_First_Hop_Redundancy_and_Routing_Protocol_Attacks.mp4 270M
00059 8.8_Reviewing_Router_Fundamentals.mp4 358M
00058 8.7_Hacking_Switches_-_ARP_Vulnerabilities_and_ARP_Cache_Poisoning.mp4 124M
00057 8.6_Hacking_Switches_-_Demo.mp4 95M
00056 8.5_Hacking_Switches_-_Reviewing_Ethernet_Fundamentals.mp4 445M
00055 8.4_Building_an_Internetwork_Topology_Using_VIRL.mp4 134M
00054 8.3_Reviewing_Networking_Technology_Fundamentals_-_Forwarding_Device_Architecture.mp4 129M
00053 8.2_Reviewing_Networking_Technology_Fundamentals_-_OSI_and_DoD_Internet_Models.mp4 118M
00052 8.1_Understanding_the_Reasons_for_and_the_Steps_to_Hacking_a_Network.mp4 185M
00051 Learning_objectives.mp4 61M
00050 7.4_Surveying_Defenses_to_Mitigate_Database_Hacking.mp4 110M
00049 7.3_Attacking_a_Database_-_Automated_Scanners.mp4 29M
00048 7.2_Attacking_a_Database_-_Discovery_Validation_and_Exploitation.mp4 243M
00047 7.1_Reviewing_Database_Fundamentals.mp4 102M
00046 Learning_objectives.mp4 29M
00045 6.7_Improving_Password_Security.mp4 63M
00044 6.6_Cracking_Passwords_with_hashcat.mp4 197M
00043 6.5_Cracking_Passwords_with_John_the_Ripper.mp4 402M
00042 6.4_Understanding_Password_Storage_Vulnerability.mp4 79M
00041 6.3_Exploring_Password_Storage_Mechanisms.mp4 42M
00040 6.2_Understanding_Authentication_and_Authorization_Attacks.mp4 118M
00039 6.1_Understanding_Authentication_and_Authorization_Mechanisms.mp4 162M
00038 Learning_objectives.mp4 25M
00037 5.9_Surveying_Defenses_to_Mitigate_Web_Application_Hacking.mp4 19M
00036 5.8_Understanding_the_Exploitation_of_Web_Applications.mp4 103M
00035 5.7_Testing_Web_Applications_-_Vulnerability_Discovery.mp4 145M
00034 5.6_Testing_Web_Applications_-_Mapping.mp4 86M
00033 5.5_Testing_Web_Applications_-_Reconnaissance.mp4 121M
00032 5.4_Testing_Web_Applications_-_Methodology.mp4 18M
00031 5.3_Uncovering_Web_Vulnerabilities.mp4 177M
00030 5.2_Understanding_Web_Architectures.mp4 56M
00029 5.1_Understanding_Web_Applications.mp4 166M
00028 Learning_objectives.mp4 34M
00027 4.4_Surveying_Essential_Tools_for_Active_Reconnaissance_-_Network_and_Web.mp4 138M
00026 4.3_Surveying_Essential_Tools_for_Active_Reconnaissance_-_Port_Scanning.mp4 264M
00025 4.2_Exploring_Active_Reconnaissance_Methodologies_from_an_Ethical_Hacker.mp4 51M
00024 4.1_Understanding_Active_Reconnaissance.mp4 134M
00023 Learning_objectives.mp4 25M
00022 3.6_Surveying_Essential_Tools_for_Passive_Reconnaissance_-_Recon-ng.mp4 466M
00021 3.5_Surveying_Essential_Tools_for_Passive_Reconnaissance_-_SpiderFoot.mp4 179M
00020 3.4_Exploring_Passive_Reconnaissance_Methodologies_-_Searching_for_Names.mp4 107M
00019 3.3_Exploring_Passive_Reconnaissance_Methodologies_-_Searching_for_Files.mp4 153M
00018 3.2_Exploring_Passive_Reconnaissance_Methodologies_-_Discovering_Host.mp4 268M
00017 3.1_Understanding_Passive_Reconnaissance.mp4 270M
00016 Learning_objectives.mp4 26M
00015 2.3_Managing_Kali_Services.mp4 132M
00014 2.2_Examining_Kali_Modules_and_Architecture.mp4 135M
00013 2.1_Installing_Kali.mp4 138M
00012 Learning_objectives.mp4 28M
00011 1.9_Understanding_the_Current_Threat_Landscape.mp4 88M
00010 1.8_Understanding_Vulnerabilities_Threats_and_Exploits.mp4 73M
00009 1.7_Building_Your_Own_Lab_-_VIRL_and_Operating_System_Software.mp4 264M
00008 1.6_Building_Your_Own_Lab_-_Overview.mp4 434M
00007 1.5_Exploring_Penetration_Testing_and_other_Cyber_Security_Certifications.mp4 172M
00006 1.4_Exploring_Penetration_Testing_Methodologies.mp4 88M
00005 1.3_Understanding_the_Legal_Aspects_of_Penetration_Testing.mp4 134M
00004 1.2_Getting_Started_with_Ethical_Hacking_and_Pen_Testing.mp4 353M
00003 1.1_Introducing_Ethical_Hacking_and_Pen_Testing.mp4 216M
00002 Learning_objectives.mp4 58M
00001 Introduction.mp4 246M