| - | 023 Malware Infections.en.srt | 9140 | srt | 2025-08-25 13:11:16 |
| - | 023 Malware Infections.mp4 | 97699474 | mp4 | 2025-08-25 13:29:24 |
| - | 024 Common Delivery Methods (OBJ 1.1 & 1.5).en.srt | 9949 | srt | 2025-08-25 13:11:14 |
| - | 024 Common Delivery Methods (OBJ 1.1 & 1.5).mp4 | 101580826 | mp4 | 2025-08-25 13:28:34 |
| - | 025 Demo_ Phishing (OBJ 1.1 & 5.3).en.srt | 11952 | srt | 2025-08-25 13:10:44 |
| - | 025 Demo_ Phishing (OBJ 1.1 & 5.3).mp4 | 52341912 | mp4 | 2025-08-25 13:59:47 |
| - | 026 Botnets and Zombies (OBJ 1.2 & 1.4).en.srt | 7682 | srt | 2025-08-25 13:11:45 |
| - | 026 Botnets and Zombies (OBJ 1.2 & 1.4).mp4 | 65498057 | mp4 | 2025-08-25 13:48:45 |
| - | 027 Active Interception and Privilege Escalation (OBJ 1.3 & 1.4).en.srt | 5643 | srt | 2025-08-25 13:11:47 |
| - | 027 Active Interception and Privilege Escalation (OBJ 1.3 & 1.4).mp4 | 42564785 | mp4 | 2025-08-25 14:10:48 |
| - | 028 Demo_ Privilege Escalation (OBJ 1.3 & 1.8).en.srt | 12161 | srt | 2025-08-25 13:10:44 |
| - | 028 Demo_ Privilege Escalation (OBJ 1.3 & 1.8).mp4 | 79157140 | mp4 | 2025-08-25 13:38:10 |
| - | 029 Backdoors and Logic Bombs (OBJ 1.2).en.srt | 8500 | srt | 2025-08-25 13:11:17 |
| - | 029 Backdoors and Logic Bombs (OBJ 1.2).mp4 | 88171846 | mp4 | 2025-08-25 13:32:51 |
| - | 030 Symptoms of Infection (OBJ 1.2).en.srt | 9398 | srt | 2025-08-25 13:11:16 |
| - | 030 Symptoms of Infection (OBJ 1.2).mp4 | 95842428 | mp4 | 2025-08-25 13:31:05 |
| - | 031 Removing Malware (OBJ 4.2).en.srt | 11580 | srt | 2025-08-25 13:11:13 |
| - | 031 Removing Malware (OBJ 4.2).mp4 | 113553748 | mp4 | 2025-08-25 13:25:12 |
| - | 032 Preventing Malware (OBJ 1.6 & 3.2).en.srt | 13111 | srt | 2025-08-25 13:10:43 |
| - | 032 Preventing Malware (OBJ 1.6 & 3.2).mp4 | 135095504 | mp4 | 2025-08-25 13:22:01 |
| - | 033 __ Malware Exploitation (OBJ 1.2 & 1.4).en.srt | 18689 | srt | 2025-08-25 13:10:41 |
| - | 033 __ Malware Exploitation (OBJ 1.2 & 1.4).mp4 | 41459483 | mp4 | 2025-08-25 14:11:40 |