| - | 1. Domain 1 Threat Management.mp4 | 5035107 | mp4 | 2025-08-25 05:41:02 |
| - | 1. Domain 1 Threat Management.vtt | 2337 | vtt | 2025-08-25 05:41:03 |
| - | 1.1 Domain 1 - Threat Management.pdf.pdf | 62949974 | pdf | 2025-08-25 05:41:06 |
| - | 10. Network Perimeter Security.mp4 | 37612041 | mp4 | 2025-08-25 05:41:08 |
| - | 10. Network Perimeter Security.vtt | 15127 | vtt | 2025-08-25 05:41:08 |
| - | 10.1 13 - Network Perimeter Security.pdf.pdf | 3291359 | pdf | 2025-08-25 05:41:09 |
| - | 11. Network Segmentation.mp4 | 12064346 | mp4 | 2025-08-25 05:41:09 |
| - | 11. Network Segmentation.vtt | 5455 | vtt | 2025-08-25 05:41:09 |
| - | 11.1 14 - Network Segmentation.pdf.pdf | 1382503 | pdf | 2025-08-25 05:41:09 |
| - | 12. Network Access Control.mp4 | 28245766 | mp4 | 2025-08-25 05:41:11 |
| - | 12. Network Access Control.vtt | 12802 | vtt | 2025-08-25 05:41:11 |
| - | 12.1 15 - Network Access Control.pdf.pdf | 1855238 | pdf | 2025-08-25 05:41:11 |
| - | 13. Defense Deception Methods.mp4 | 16787389 | mp4 | 2025-08-25 05:41:12 |
| - | 13. Defense Deception Methods.vtt | 7784 | vtt | 2025-08-25 05:41:12 |
| - | 13.1 16 - Defense Deception Methods.pdf.pdf | 1549446 | pdf | 2025-08-25 05:41:12 |
| - | 14. Secure Endpoint Management.mp4 | 34247752 | mp4 | 2025-08-25 05:41:14 |
| - | 14. Secure Endpoint Management.vtt | 15393 | vtt | 2025-08-25 05:41:14 |
| - | 14.1 17 - Secure Endpoint Management.pdf.pdf | 2408339 | pdf | 2025-08-25 05:41:14 |
| - | 15. Penetration Testing.mp4 | 36382178 | mp4 | 2025-08-25 05:41:17 |
| - | 15. Penetration Testing.vtt | 16649 | vtt | 2025-08-25 05:41:17 |
| - | 15.1 18 - Penetration Testing.pdf.pdf | 2428303 | pdf | 2025-08-25 05:41:17 |
| - | 16. Security Exercises and Training.mp4 | 14064245 | mp4 | 2025-08-25 05:41:18 |
| - | 16. Security Exercises and Training.vtt | 6709 | vtt | 2025-08-25 05:41:18 |
| - | 16.1 19 - Security Exercises and Training.pdf.pdf | 1455001 | pdf | 2025-08-25 05:41:18 |
| - | 17. Reverse Engineering.mp4 | 29234669 | mp4 | 2025-08-25 05:41:20 |
| - | 17. Reverse Engineering.vtt | 13721 | vtt | 2025-08-25 05:41:21 |
| - | 17.1 20 - Reverse Engineering.pdf.pdf | 1460761 | pdf | 2025-08-25 05:41:21 |
| - | 18. Quiz Defense Against Cyber Threats.html | 121 | html | 2025-08-25 05:41:21 |
| - | 19. Reconnaissance and Intelligence.mp4 | 5833000 | mp4 | 2025-08-25 05:41:21 |
| - | 19. Reconnaissance and Intelligence.vtt | 2477 | vtt | 2025-08-25 05:41:21 |
| - | 19.1 21 - Reconnaissance and Intelligence.pdf.pdf | 511183 | pdf | 2025-08-25 05:41:21 |
| - | 2. CIA Triad.mp4 | 38008956 | mp4 | 2025-08-25 05:41:24 |
| - | 2. CIA Triad.vtt | 17118 | vtt | 2025-08-25 05:41:24 |
| - | 2.1 05 - CIA Triad.pdf.pdf | 2938810 | pdf | 2025-08-25 05:41:24 |
| - | 20. Footprinting the Network.mp4 | 14067251 | mp4 | 2025-08-25 05:41:25 |
| - | 20. Footprinting the Network.vtt | 6244 | vtt | 2025-08-25 05:41:25 |
| - | 20.1 22 - Footprinting the Network.pdf.pdf | 827427 | pdf | 2025-08-25 05:41:25 |
| - | 21. Network Mapping.mp4 | 18370878 | mp4 | 2025-08-25 05:41:26 |
| - | 21. Network Mapping.vtt | 7993 | vtt | 2025-08-25 05:41:26 |
| - | 21.1 23 - Network Mapping.pdf.pdf | 1190137 | pdf | 2025-08-25 05:41:26 |
| - | 22. Port Scanning.mp4 | 25555955 | mp4 | 2025-08-25 05:41:28 |
| - | 22. Port Scanning.vtt | 11059 | vtt | 2025-08-25 05:41:28 |
| - | 22.1 24 - Port Scanning.pdf.pdf | 1871442 | pdf | 2025-08-25 05:41:28 |
| - | 23. Other Port Scanners.mp4 | 9855216 | mp4 | 2025-08-25 05:41:29 |
| - | 23. Other Port Scanners.vtt | 4044 | vtt | 2025-08-25 05:41:29 |
| - | 23.1 25 - Other Port Scanners.pdf.pdf | 827587 | pdf | 2025-08-25 05:41:29 |
| - | 24. NMAP - Demonstration of the world's most popular port scanning tool.mp4 | 10412228 | mp4 | 2025-08-25 05:41:30 |
| - | 24. NMAP - Demonstration of the world's most popular port scanning tool.vtt | 11519 | vtt | 2025-08-25 05:41:30 |
| - | 25. Passive Reconnaissance.mp4 | 12863472 | mp4 | 2025-08-25 05:41:30 |
| - | 25. Passive Reconnaissance.vtt | 5913 | vtt | 2025-08-25 05:41:30 |
| - | 25.1 27 - Passive Reconnaissance.pdf.pdf | 825571 | pdf | 2025-08-25 05:41:31 |
| - | 26. Passive Recon - Network Devices.mp4 | 39919240 | mp4 | 2025-08-25 05:41:34 |
| - | 26. Passive Recon - Network Devices.vtt | 16814 | vtt | 2025-08-25 05:41:34 |
| - | 26.1 28 - Passive Recon - Network Devices.pdf.pdf | 3469229 | pdf | 2025-08-25 05:41:35 |
| - | 27. Passive Recon - Netstat.mp4 | 23262337 | mp4 | 2025-08-25 05:41:46 |
| - | 27. Passive Recon - Netstat.vtt | 9605 | vtt | 2025-08-25 05:41:46 |
| - | 27.1 29 - Passive Recon - Netstat.pdf.pdf | 2090107 | pdf | 2025-08-25 05:41:46 |
| - | 28. DHCP Logs and Configs.mp4 | 15489734 | mp4 | 2025-08-25 05:41:46 |
| - | 28. DHCP Logs and Configs.vtt | 5990 | vtt | 2025-08-25 05:41:46 |
| - | 28.1 30 - DHCP Logs and Configs.pdf.pdf | 1539755 | pdf | 2025-08-25 05:41:47 |
| - | 29. Firewall Logs and Configs.mp4 | 18482040 | mp4 | 2025-08-25 05:41:48 |
| - | 29. Firewall Logs and Configs.vtt | 7358 | vtt | 2025-08-25 05:41:48 |
| - | 29.1 Example Firewall Logs from CISCO.html | 147 | html | 2025-08-25 05:41:48 |
| - | 29.2 31 - Firewall Logs and Configs.pdf.pdf | 1533884 | pdf | 2025-08-25 05:41:48 |
| - | 3. Risk Consideration.mp4 | 26361457 | mp4 | 2025-08-25 05:41:49 |
| - | 3. Risk Consideration.vtt | 11984 | vtt | 2025-08-25 05:41:49 |
| - | 3.1 06 - Risk Considerations.pdf.pdf | 3081054 | pdf | 2025-08-25 05:41:49 |
| - | 30. System and Host Log Files.mp4 | 12352807 | mp4 | 2025-08-25 05:41:50 |
| - | 30. System and Host Log Files.vtt | 5288 | vtt | 2025-08-25 05:41:50 |
| - | 30.1 32 - System and Host Log Files.pdf.pdf | 1141911 | pdf | 2025-08-25 05:41:51 |
| - | 31. DNS Harvesting.mp4 | 17212409 | mp4 | 2025-08-25 05:41:52 |
| - | 31. DNS Harvesting.vtt | 6310 | vtt | 2025-08-25 05:41:52 |
| - | 31.1 33 - DNS Harvesting.pdf.pdf | 2013264 | pdf | 2025-08-25 05:41:53 |
| - | 32. Domain Names and IP Ranges.mp4 | 12590504 | mp4 | 2025-08-25 05:41:53 |
| - | 32. Domain Names and IP Ranges.vtt | 5341 | vtt | 2025-08-25 05:41:53 |
| - | 32.1 34 - Domain Names and IP Ranges.pdf.pdf | 827294 | pdf | 2025-08-25 05:41:53 |
| - | 33. DNS Zone Transfers.mp4 | 16651028 | mp4 | 2025-08-25 05:41:54 |
| - | 33. DNS Zone Transfers.vtt | 7139 | vtt | 2025-08-25 05:41:54 |
| - | 33.1 35 - DNS Zone Transfers.pdf.pdf | 1143628 | pdf | 2025-08-25 05:41:54 |
| - | 34. Whois and Host Commands.mp4 | 14840891 | mp4 | 2025-08-25 05:41:55 |
| - | 34. Whois and Host Commands.vtt | 6464 | vtt | 2025-08-25 05:41:55 |
| - | 34.1 36 - Whois and Host Commands.pdf.pdf | 1637352 | pdf | 2025-08-25 05:41:55 |
| - | 35. Information Gathering and Aggregation.mp4 | 20333918 | mp4 | 2025-08-25 05:41:56 |
| - | 35. Information Gathering and Aggregation.vtt | 8913 | vtt | 2025-08-25 05:41:56 |
| - | 35.1 37 - Information Gathering and Aggregation.pdf.pdf | 2069094 | pdf | 2025-08-25 05:41:56 |
| - | 36. Organizational Intelligence.mp4 | 35947849 | mp4 | 2025-08-25 05:41:58 |
| - | 36. Organizational Intelligence.vtt | 17413 | vtt | 2025-08-25 05:41:58 |
| - | 36.1 38 - Organizational Intelligence.pdf.pdf | 2554818 | pdf | 2025-08-25 05:41:58 |
| - | 37. Detecting, Preventing, and Responding to Reconnaissance.mp4 | 31084377 | mp4 | 2025-08-25 05:41:59 |
| - | 37. Detecting, Preventing, and Responding to Reconnaissance.vtt | 15421 | vtt | 2025-08-25 05:41:59 |
| - | 37.1 39 - Detecting, Preventing, and Responding to Reconnaissance.pdf.pdf | 2092378 | pdf | 2025-08-25 05:41:59 |
| - | 38. Quiz Reconnaissance and Intelligence Gathering.html | 121 | html | 2025-08-25 05:41:59 |
| - | 4. Risk Assessment.mp4 | 16251526 | mp4 | 2025-08-25 05:42:00 |
| - | 4. Risk Assessment.vtt | 6991 | vtt | 2025-08-25 05:42:00 |
| - | 4.1 07 - Risk Assessment.pdf.pdf | 1509213 | pdf | 2025-08-25 05:42:00 |
| - | 5. Identify Threats.mp4 | 30824196 | mp4 | 2025-08-25 05:42:02 |
| - | 5. Identify Threats.vtt | 13964 | vtt | 2025-08-25 05:42:02 |
| - | 5.1 08 - Identify Threats.pdf.pdf | 2963900 | pdf | 2025-08-25 05:42:02 |
| - | 6. Identify Vulnerabilities.mp4 | 11345216 | mp4 | 2025-08-25 05:42:03 |
| - | 6. Identify Vulnerabilities.vtt | 4900 | vtt | 2025-08-25 05:42:03 |
| - | 6.1 09 - Identify Vulnerabilities.pdf.pdf | 1701750 | pdf | 2025-08-25 05:42:03 |
| - | 7. Likelihood, Impact, and Risk.mp4 | 14250650 | mp4 | 2025-08-25 05:42:04 |
| - | 7. Likelihood, Impact, and Risk.vtt | 6092 | vtt | 2025-08-25 05:42:04 |
| - | 7.1 10 - Likelihood, Impact, and Risk.pdf.pdf | 1675005 | pdf | 2025-08-25 05:42:04 |
| - | 8. Qualitative and Quantitative Assessments.mp4 | 19504674 | mp4 | 2025-08-25 05:42:05 |
| - | 8. Qualitative and Quantitative Assessments.vtt | 11298 | vtt | 2025-08-25 05:42:05 |
| - | 8.1 11 - Qualitative and Quantitative Assessments.pdf.pdf | 2301235 | pdf | 2025-08-25 05:42:05 |
| - | 9. Reviewing Controls.mp4 | 33284421 | mp4 | 2025-08-25 05:42:08 |
| - | 9. Reviewing Controls.vtt | 15453 | vtt | 2025-08-25 05:42:08 |
| - | 9.1 12 - Revieiwing Controls.pdf.pdf | 2089009 | pdf | 2025-08-25 05:42:08 |