~Get Your Files Here !/2 - Bits Bobs Whats Under the Hood Beyond the Screen Inside Your Machine/14 - Build A PC.mp4 149.9 MB
~Get Your Files Here !/24 - The Cyber Career Map Steps to Success Cyber Job Steps/151 - Hack The Box Demo.mp4 135.7 MB
~Get Your Files Here !/23 - Unlocking Your Next Level Hack Your Career/143 - DORKING FOR JOB HUNTING.mp4 85.7 MB
~Get Your Files Here !/14 - Web Application Attacks 404 Web Security Not Found/95 - OWASP ZAP Lab.mp4 64.1 MB
~Get Your Files Here !/2 - Bits Bobs Whats Under the Hood Beyond the Screen Inside Your Machine/16 - What is a Virtual Machine.mp4 61.9 MB
~Get Your Files Here !/11 - Reconnaissance Intelligence Gathering Spy Before You Strike/75 - theHarvester Demo.mp4 56.8 MB
~Get Your Files Here !/3 - NetWork It Out Network Fundamentals/23 - Wireshark.mp4 53.6 MB
~Get Your Files Here !/3 - NetWork It Out Network Fundamentals/19 - DNS Demystified The Internets Phonebook.mp4 46.4 MB
~Get Your Files Here !/4 - Operating System Basics The OS Layer Cake/30 - Linux Terminal Demo.mp4 43.5 MB
~Get Your Files Here !/10 - Scripting Automation Byte Me Scripts That Do the Work/69 - Bash Script Demo.mp4 39.9 MB
~Get Your Files Here !/9 - Social Engineering Hack the Human/61 - AI Faces the Death of Anonymity.mp4 39.2 MB
~Get Your Files Here !/22 - Artificial Intelligence Cybersecurity Rise of the Bots AI vs Cyber Threats/136 - Deep Fake Voice Demo.mp4 36.8 MB
~Get Your Files Here !/1 - Byte One Cybersecurity Unplugged Cybersecurity Fundamentals/4 - The CIA Triad Protecting Data with Confidentiality Integrity Availability.mp4 36.4 MB
~Get Your Files Here !/1 - Byte One Cybersecurity Unplugged Cybersecurity Fundamentals/5 - Common Cyber Attack Types Know Your Enemies.mp4 35.6 MB
~Get Your Files Here !/1 - Byte One Cybersecurity Unplugged Cybersecurity Fundamentals/3 - Threat Actors Motivations.mp4 32.5 MB
~Get Your Files Here !/2 - Bits Bobs Whats Under the Hood Beyond the Screen Inside Your Machine/15 - BIOS Simulation.mp4 32.0 MB
~Get Your Files Here !/10 - Scripting Automation Byte Me Scripts That Do the Work/66 - Getting Started with Your First Script.mp4 32.0 MB
~Get Your Files Here !/1 - Byte One Cybersecurity Unplugged Cybersecurity Fundamentals/7 - The Kill Chain MITRE ATTCK Mapping Cyberattack Tactics.mp4 31.3 MB
~Get Your Files Here !/13 - Exploitation Basics The Art of the Exploit/89 - SQLMap Demo.mp4 30.4 MB
~Get Your Files Here !/12 - Scanning Enumeration Ping Probe and Peek/81 - nmap demo.mp4 30.0 MB
~Get Your Files Here !/3 - NetWork It Out Network Fundamentals/17 - What Is an IP Address.mp4 28.8 MB
~Get Your Files Here !/10 - Scripting Automation Byte Me Scripts That Do the Work/65 - Automating Recon or Scanning.mp4 27.5 MB
~Get Your Files Here !/4 - Operating System Basics The OS Layer Cake/28 - Recognising Key System Folders and Commands.mp4 25.9 MB
~Get Your Files Here !/10 - Scripting Automation Byte Me Scripts That Do the Work/63 - What is a Script.mp4 25.7 MB
~Get Your Files Here !/5 - Firewalls Antivirus Your Digital Doormen/33 - What Antivirus Software Does.mp4 24.5 MB
~Get Your Files Here !/3 - NetWork It Out Network Fundamentals/18 - Unlocking the Digital Doors Ports Protocols Explained.mp4 24.5 MB
~Get Your Files Here !/1 - Byte One Cybersecurity Unplugged Cybersecurity Fundamentals/8 - Types of Cyber Attacks.mp4 24.1 MB
~Get Your Files Here !/4 - Operating System Basics The OS Layer Cake/29 - Staying Safe OS Hardening Basic Security Practices.mp4 23.9 MB
~Get Your Files Here !/10 - Scripting Automation Byte Me Scripts That Do the Work/64 - Basic Bash PowerShell Concepts.mp4 23.5 MB
~Get Your Files Here !/20 - Incident Response Forensics Basics/120 - What Is Incident Response.mp4 23.0 MB
~Get Your Files Here !/5 - Firewalls Antivirus Your Digital Doormen/35 - Tips to Maximize Your Digital Security.mp4 22.4 MB
~Get Your Files Here !/6 - Cryptography Basics Crack the Code Crypto for Mortals/40 - Common Cryptographic Algorithms.mp4 22.2 MB
~Get Your Files Here !/23 - Unlocking Your Next Level Hack Your Career/138 - BeginnerFriendly Certifications.mp4 22.0 MB
~Get Your Files Here !/21 - Introduction to Penetration Testing First Blood Pen Testing Primer/127 - Ethical Hacking vs Malicious Hacking.mp4 21.9 MB
~Get Your Files Here !/13 - Exploitation Basics The Art of the Exploit/84 - The Ethical Hacking Process.mp4 21.9 MB
~Get Your Files Here !/16 - Cloud Security Fundamentals The Fog of Cloud/103 - The Shared Responsibility Model.mp4 21.7 MB
~Get Your Files Here !/15 - Mobile Security PocketSized Threats/98 - Simple Steps to Stay Safe.mp4 21.7 MB
~Get Your Files Here !/9 - Social Engineering Hack the Human/59 - How to Defend Yourself.mp4 21.7 MB
~Get Your Files Here !/5 - Firewalls Antivirus Your Digital Doormen/36 - Staying Safe OS Hardening Basic Security Practices.mp4 21.5 MB
~Get Your Files Here !/14 - Web Application Attacks 404 Web Security Not Found/91 - OWASP Top 10 Simplified.mp4 21.5 MB
~Get Your Files Here !/5 - Firewalls Antivirus Your Digital Doormen/32 - How Do Firewalls Protect You.mp4 21.0 MB
~Get Your Files Here !/4 - Operating System Basics The OS Layer Cake/31 - Windows CMD Demo.mp4 20.9 MB
~Get Your Files Here !/9 - Social Engineering Hack the Human/62 - Phishing Demo.mp4 20.6 MB
~Get Your Files Here !/1 - Byte One Cybersecurity Unplugged Cybersecurity Fundamentals/2 - Introduction.mp4 20.6 MB
~Get Your Files Here !/1 - Byte One Cybersecurity Unplugged Cybersecurity Fundamentals/1 - What is Cybersecurity.mp4 20.6 MB
~Get Your Files Here !/24 - The Cyber Career Map Steps to Success Cyber Job Steps/145 - What Employers Look For.mp4 20.4 MB
~Get Your Files Here !/4 - Operating System Basics The OS Layer Cake/27 - Understanding Permissions and File Structures.mp4 20.4 MB
~Get Your Files Here !/2 - Bits Bobs Whats Under the Hood Beyond the Screen Inside Your Machine/12 - User Accounts Admins Permissions.mp4 20.2 MB
~Get Your Files Here !/6 - Cryptography Basics Crack the Code Crypto for Mortals/38 - What Is Cryptography.mp4 20.1 MB
~Get Your Files Here !/5 - Firewalls Antivirus Your Digital Doormen/34 - Why You Need Both Firewalls Antivirus.mp4 20.1 MB
~Get Your Files Here !/4 - Operating System Basics The OS Layer Cake/26 - Your Digital ID Access Levels.mp4 20.0 MB
~Get Your Files Here !/24 - The Cyber Career Map Steps to Success Cyber Job Steps/147 - Other Ways to Gain Experience.mp4 19.6 MB
~Get Your Files Here !/16 - Cloud Security Fundamentals The Fog of Cloud/102 - Cloud Security Basics.mp4 19.6 MB
~Get Your Files Here !/15 - Mobile Security PocketSized Threats/97 - Common Mobile Threats.mp4 19.6 MB
~Get Your Files Here !/5 - Firewalls Antivirus Your Digital Doormen/37 - Windows Defender Demo.mp4 19.5 MB
~Get Your Files Here !/23 - Unlocking Your Next Level Hack Your Career/142 - Google Dorks Your Hidden Job Search Superpower Pt 2.mp4 19.5 MB
~Get Your Files Here !/4 - Operating System Basics The OS Layer Cake/25 - Windows vs Linux A Friendly Introduction.mp4 19.4 MB
~Get Your Files Here !/7 - The Many Shades of Cyber Fifty Shades of Threat/48 - Beyond Red Blue The Lesser Known Cybersecurity Teams.mp4 19.3 MB
~Get Your Files Here !/22 - Artificial Intelligence Cybersecurity Rise of the Bots AI vs Cyber Threats/132 - How Attackers Use AI.mp4 19.2 MB
~Get Your Files Here !/24 - The Cyber Career Map Steps to Success Cyber Job Steps/149 - Cybersecurity Career Paths Find Your Fit.mp4 19.1 MB
~Get Your Files Here !/18 - PostExploitation Privilege Escalation Now Youre InRoot/115 - Cowrei Demo.mp4 19.0 MB
~Get Your Files Here !/20 - Incident Response Forensics Basics/123 - Common Forensics Techniques.mp4 19.0 MB
~Get Your Files Here !/2 - Bits Bobs Whats Under the Hood Beyond the Screen Inside Your Machine/11 - How the OS Manages Processes Resources.mp4 18.6 MB
~Get Your Files Here !/12 - Scanning Enumeration Ping Probe and Peek/80 - Understanding CVEs The Vulnerability Playbook.mp4 18.6 MB
~Get Your Files Here !/6 - Cryptography Basics Crack the Code Crypto for Mortals/39 - Symmetric vs Asymmetric Encryption.mp4 18.5 MB
~Get Your Files Here !/22 - Artificial Intelligence Cybersecurity Rise of the Bots AI vs Cyber Threats/131 - How AI Defends Systems.mp4 18.4 MB
~Get Your Files Here !/6 - Cryptography Basics Crack the Code Crypto for Mortals/42 - Weaknesses Real World Risks.mp4 18.2 MB
~Get Your Files Here !/20 - Incident Response Forensics Basics/122 - What Is Digital Forensics.mp4 18.1 MB
~Get Your Files Here !/10 - Scripting Automation Byte Me Scripts That Do the Work/68 - Tools of the Trade.mp4 18.0 MB
~Get Your Files Here !/21 - Introduction to Penetration Testing First Blood Pen Testing Primer/128 - Legal Compliance Considerations.mp4 17.9 MB
~Get Your Files Here !/2 - Bits Bobs Whats Under the Hood Beyond the Screen Inside Your Machine/10 - The Key Components Inside a Computer.mp4 17.8 MB
~Get Your Files Here !/24 - The Cyber Career Map Steps to Success Cyber Job Steps/146 - Build Skills with TryHackMe Hack The Box.mp4 17.7 MB
~Get Your Files Here !/7 - The Many Shades of Cyber Fifty Shades of Threat/49 - Understanding Hacker Roles.mp4 17.7 MB
~Get Your Files Here !/22 - Artificial Intelligence Cybersecurity Rise of the Bots AI vs Cyber Threats/133 - Machine Learning in Cybersecurity.mp4 17.5 MB
~Get Your Files Here !/14 - Web Application Attacks 404 Web Security Not Found/93 - Cookie Tampering Input Validation.mp4 17.4 MB
~Get Your Files Here !/20 - Incident Response Forensics Basics/124 - Best Practices RealWorld Tips.mp4 17.3 MB
~Get Your Files Here !/9 - Social Engineering Hack the Human/56 - Common Social Engineering Attacks.mp4 17.3 MB
~Get Your Files Here !/24 - The Cyber Career Map Steps to Success Cyber Job Steps/150 - Your Next Steps.mp4 17.1 MB
~Get Your Files Here !/22 - Artificial Intelligence Cybersecurity Rise of the Bots AI vs Cyber Threats/134 - The Future AI vs AI.mp4 17.0 MB
~Get Your Files Here !/8 - Endpoint Security First Line of Defence/51 - Key Security Tools Solutions.mp4 16.8 MB
~Get Your Files Here !/18 - PostExploitation Privilege Escalation Now Youre InRoot/114 - Honeypots Honeytokens Fake Asset.mp4 16.7 MB
~Get Your Files Here !/20 - Incident Response Forensics Basics/121 - The 6 Phases of Incident Response.mp4 16.7 MB
~Get Your Files Here !/14 - Web Application Attacks 404 Web Security Not Found/92 - Tools Burp Suite OWASP ZAP.mp4 16.5 MB
~Get Your Files Here !/4 - Operating System Basics The OS Layer Cake/24 - What is an Operating System Really.mp4 16.5 MB
~Get Your Files Here !/24 - The Cyber Career Map Steps to Success Cyber Job Steps/144 - Why Cybersecurity Is a Great Career.mp4 16.3 MB
~Get Your Files Here !/23 - Unlocking Your Next Level Hack Your Career/140 - Certification Tips Mistakes to Avoid.mp4 16.3 MB
~Get Your Files Here !/10 - Scripting Automation Byte Me Scripts That Do the Work/67 - Why Learn Python for Cybersecurity.mp4 16.3 MB
~Get Your Files Here !/3 - NetWork It Out Network Fundamentals/21 - Ping The Digital Echo.mp4 16.2 MB
~Get Your Files Here !/16 - Cloud Security Fundamentals The Fog of Cloud/104 - Common Cloud Threats.mp4 15.8 MB
~Get Your Files Here !/15 - Mobile Security PocketSized Threats/99 - Spot the Signs of Trouble.mp4 15.8 MB
~Get Your Files Here !/17 - Wireless Attacks WiFight the Power/109 - Deauthentication Deauth Attacks.mp4 15.7 MB
~Get Your Files Here !/21 - Introduction to Penetration Testing First Blood Pen Testing Primer/126 - What is Penetration Testing.mp4 15.4 MB
~Get Your Files Here !/24 - The Cyber Career Map Steps to Success Cyber Job Steps/148 - Bug Bounties Get Paid to Hack Legally.mp4 15.3 MB
~Get Your Files Here !/11 - Reconnaissance Intelligence Gathering Spy Before You Strike/71 - WHOIS nslookup Shodan theHarvester Reconng.mp4 15.1 MB
~Get Your Files Here !/23 - Unlocking Your Next Level Hack Your Career/141 - Google Dorks Your Hidden Job Search Superpower.mp4 14.9 MB
~Get Your Files Here !/2 - Bits Bobs Whats Under the Hood Beyond the Screen Inside Your Machine/13 - Why It Matters to Cybersecurity.mp4 14.9 MB
~Get Your Files Here !/1 - Byte One Cybersecurity Unplugged Cybersecurity Fundamentals/6 - Security Controls Technical Physical Administrative Layers.mp4 14.6 MB
~Get Your Files Here !/6 - Cryptography Basics Crack the Code Crypto for Mortals/41 - Why Cryptography Matters.mp4 14.4 MB
~Get Your Files Here !/3 - NetWork It Out Network Fundamentals/20 - LAN WAN The Internet Whats the Difference.mp4 14.2 MB
~Get Your Files Here !/9 - Social Engineering Hack the Human/60 - Tools of the Trade.mp4 13.9 MB
~Get Your Files Here !/8 - Endpoint Security First Line of Defence/52 - Best Practices for Users.mp4 13.5 MB
~Get Your Files Here !/3 - NetWork It Out Network Fundamentals/22 - Tools of the Trade.mp4 13.5 MB
~Get Your Files Here !/11 - Reconnaissance Intelligence Gathering Spy Before You Strike/74 - More Tools of the Trade.mp4 13.4 MB
~Get Your Files Here !/6 - Cryptography Basics Crack the Code Crypto for Mortals/43 - John The Ripper Demo.mp4 13.3 MB
~Get Your Files Here !/8 - Endpoint Security First Line of Defence/53 - Why Endpoint Security Matters.mp4 13.2 MB
~Get Your Files Here !/17 - Wireless Attacks WiFight the Power/110 - Tools of the Trade.mp4 13.2 MB
~Get Your Files Here !/9 - Social Engineering Hack the Human/55 - What Is Social Engineering.mp4 13.1 MB
~Get Your Files Here !/8 - Endpoint Security First Line of Defence/54 - Tools of the Trade.mp4 13.0 MB
~Get Your Files Here !/16 - Cloud Security Fundamentals The Fog of Cloud/101 - What Is Cloud Computing.mp4 12.9 MB
~Get Your Files Here !/15 - Mobile Security PocketSized Threats/96 - Why Mobile Security Matters.mp4 12.9 MB
~Get Your Files Here !/8 - Endpoint Security First Line of Defence/50 - Common Endpoint Threats.mp4 12.8 MB
~Get Your Files Here !/23 - Unlocking Your Next Level Hack Your Career/137 - Why Certifications Matter.mp4 12.6 MB
~Get Your Files Here !/15 - Mobile Security PocketSized Threats/100 - BYOD Work Phones.mp4 12.6 MB
~Get Your Files Here !/16 - Cloud Security Fundamentals The Fog of Cloud/105 - Best Practices for Cloud Security.mp4 12.6 MB
~Get Your Files Here !/9 - Social Engineering Hack the Human/57 - Red Flags to Watch For.mp4 12.5 MB
~Get Your Files Here !/22 - Artificial Intelligence Cybersecurity Rise of the Bots AI vs Cyber Threats/130 - AI in Cybersecurity A DoubleEdged Sword.mp4 12.5 MB
~Get Your Files Here !/22 - Artificial Intelligence Cybersecurity Rise of the Bots AI vs Cyber Threats/135 - Tools of the Trade.mp4 12.4 MB
~Get Your Files Here !/23 - Unlocking Your Next Level Hack Your Career/139 - RoleSpecific Certifications.mp4 12.3 MB
~Get Your Files Here !/17 - Wireless Attacks WiFight the Power/106 - Wireless Standards Weaknesses.mp4 11.9 MB
~Get Your Files Here !/20 - Incident Response Forensics Basics/125 - Tools of the trade.mp4 11.9 MB
~Get Your Files Here !/13 - Exploitation Basics The Art of the Exploit/88 - PostExploitation Essentials.mp4 11.7 MB
~Get Your Files Here !/13 - Exploitation Basics The Art of the Exploit/87 - PostExploitation Essentials.mp4 11.6 MB
~Get Your Files Here !/13 - Exploitation Basics The Art of the Exploit/83 - Exploit vs Vulnerability.mp4 11.4 MB
~Get Your Files Here !/2 - Bits Bobs Whats Under the Hood Beyond the Screen Inside Your Machine/9 - What Happens When You Power On.mp4 11.3 MB
~Get Your Files Here !/14 - Web Application Attacks 404 Web Security Not Found/90 - What is OWASP.mp4 11.1 MB
~Get Your Files Here !/9 - Social Engineering Hack the Human/58 - The Psychology Behind It.mp4 11.1 MB
~Get Your Files Here !/14 - Web Application Attacks 404 Web Security Not Found/94 - CrossSite Request Forgery CSRF.mp4 11.0 MB
~Get Your Files Here !/18 - PostExploitation Privilege Escalation Now Youre InRoot/111 - What to Do After Access.mp4 11.0 MB
~Get Your Files Here !/7 - The Many Shades of Cyber Fifty Shades of Threat/47 - Tools Tactics Vary.mp4 10.9 MB
~Get Your Files Here !/18 - PostExploitation Privilege Escalation Now Youre InRoot/112 - Windows vs Linux Privilege Escalation PrivEsc.mp4 10.6 MB
~Get Your Files Here !/21 - Introduction to Penetration Testing First Blood Pen Testing Primer/129 - The PenTest Exam Overview.mp4 9.7 MB
~Get Your Files Here !/19 - Reporting Communication Cyber Speak Translate the Threat/119 - Provide Detailed Technical Info.mp4 9.3 MB
~Get Your Files Here !/13 - Exploitation Basics The Art of the Exploit/85 - Tools Metasploit SQLmap John the Ripper Hydra.mp4 9.1 MB
~Get Your Files Here !/19 - Reporting Communication Cyber Speak Translate the Threat/116 - Writing a Clear PenTest Report.mp4 9.1 MB
~Get Your Files Here !/13 - Exploitation Basics The Art of the Exploit/86 - Common Vulnerabilities Examples.mp4 9.1 MB
~Get Your Files Here !/12 - Scanning Enumeration Ping Probe and Peek/78 - Common Scanning Tools Explained.mp4 8.8 MB
~Get Your Files Here !/7 - The Many Shades of Cyber Fifty Shades of Threat/45 - Blue Team Defensive Security Experts.mp4 8.8 MB
~Get Your Files Here !/24 - The Cyber Career Map Steps to Success Cyber Job Steps/148 - SLIDE-5.mp4 8.5 MB
~Get Your Files Here !/17 - Wireless Attacks WiFight the Power/107 - Cracking WiFi with Aircrackng.mp4 8.3 MB
~Get Your Files Here !/11 - Reconnaissance Intelligence Gathering Spy Before You Strike/72 - Social Engineering Basics.mp4 8.1 MB
~Get Your Files Here !/12 - Scanning Enumeration Ping Probe and Peek/79 - Vulnerability Scanning vs Manual Discovery.mp4 7.6 MB
~Get Your Files Here !/13 - Exploitation Basics The Art of the Exploit/82 - What Is an Exploit.mp4 7.5 MB
~Get Your Files Here !/7 - The Many Shades of Cyber Fifty Shades of Threat/44 - Red Team Offensive Security in Action.mp4 7.4 MB
~Get Your Files Here !/17 - Wireless Attacks WiFight the Power/108 - Evil Twin Attacks.mp4 6.7 MB
~Get Your Files Here !/12 - Scanning Enumeration Ping Probe and Peek/77 - Port Scanning Banner Grabbing.mp4 6.7 MB
~Get Your Files Here !/19 - Reporting Communication Cyber Speak Translate the Threat/118 - Presenting to NonTechnical Stakeholders.mp4 6.7 MB
~Get Your Files Here !/7 - The Many Shades of Cyber Fifty Shades of Threat/46 - Different Goals Same Mission.mp4 6.3 MB
~Get Your Files Here !/18 - PostExploitation Privilege Escalation Now Youre InRoot/113 - Mimikatz PowerView LinPEAS.mp4 6.2 MB
~Get Your Files Here !/19 - Reporting Communication Cyber Speak Translate the Threat/117 - Risk Ratings Explained Simply.mp4 6.2 MB
~Get Your Files Here !/12 - Scanning Enumeration Ping Probe and Peek/76 - Scanning Enumeration.mp4 6.1 MB
~Get Your Files Here !/11 - Reconnaissance Intelligence Gathering Spy Before You Strike/70 - Passive vs Active Reconnaissance.mp4 6.1 MB
~Get Your Files Here !/11 - Reconnaissance Intelligence Gathering Spy Before You Strike/73 - OSINT Open Source Intelligence.mp4 5.5 MB
~Get Your Files Here !/2 - Bits Bobs Whats Under the Hood Beyond the Screen Inside Your Machine/9 - Beyond-the-Screen-Inside-Your-Machine.pdf 827.8 kB
~Get Your Files Here !/1 - Byte One Cybersecurity Unplugged Cybersecurity Fundamentals/1 - Cybersecurity-Fundamentals.pdf 827.6 kB
~Get Your Files Here !/11 - Reconnaissance Intelligence Gathering Spy Before You Strike/70 - Reconnaissance-Intelligence-Gathering.pdf 712.5 kB
~Get Your Files Here !/10 - Scripting Automation Byte Me Scripts That Do the Work/63 - Scripting-Automation-Beginner-Level.pdf 689.4 kB
~Get Your Files Here !/17 - Wireless Attacks WiFight the Power/106 - Wireless-Attacks.pdf 685.3 kB
~Get Your Files Here !/3 - NetWork It Out Network Fundamentals/17 - Network-Fundamentals.pdf 667.4 kB
~Get Your Files Here !/21 - Introduction to Penetration Testing First Blood Pen Testing Primer/126 - What-is-pentesting.pdf 662.4 kB
~Get Your Files Here !/7 - The Many Shades of Cyber Fifty Shades of Threat/44 - Understanding-the-Red-and-Blue-Teams.pdf 587.7 kB
~Get Your Files Here !/24 - The Cyber Career Map Steps to Success Cyber Job Steps/144 - Unlocking-Your-Cyber-Career.pdf 586.8 kB
~Get Your Files Here !/14 - Web Application Attacks 404 Web Security Not Found/90 - Web-Application-Attacks.pdf 559.2 kB
~Get Your Files Here !/6 - Cryptography Basics Crack the Code Crypto for Mortals/38 - Cryptography.pdf 533.7 kB
~Get Your Files Here !/12 - Scanning Enumeration Ping Probe and Peek/76 - Scanning-Enumeration.pdf 526.0 kB
~Get Your Files Here !/18 - PostExploitation Privilege Escalation Now Youre InRoot/111 - Post-Exploitation-Privilege-Escalation.pdf 524.3 kB
~Get Your Files Here !/22 - Artificial Intelligence Cybersecurity Rise of the Bots AI vs Cyber Threats/130 - AI-in-Cybersecurity.pdf 508.6 kB
~Get Your Files Here !/16 - Cloud Security Fundamentals The Fog of Cloud/101 - Cloud-Security-Fundamentals.pdf 502.7 kB
~Get Your Files Here !/15 - Mobile Security PocketSized Threats/96 - Mobile-Security.pdf 497.8 kB
~Get Your Files Here !/9 - Social Engineering Hack the Human/55 - Social-Engineering.pdf 496.1 kB
~Get Your Files Here !/23 - Unlocking Your Next Level Hack Your Career/137 - Certs-That-Get-You-Hired.pdf 466.7 kB
~Get Your Files Here !/4 - Operating System Basics The OS Layer Cake/24 - Foundation-Boosters-Operating-System-Basics.pdf 444.0 kB
~Get Your Files Here !/19 - Reporting Communication Cyber Speak Translate the Threat/116 - Reporting-Communication.pdf 406.0 kB
~Get Your Files Here !/20 - Incident Response Forensics Basics/120 - Incident-Response-Forensics-Basics.pdf 388.3 kB
~Get Your Files Here !/11 - Reconnaissance Intelligence Gathering Spy Before You Strike/70 - OSINT-Resources.pdf 380.8 kB
~Get Your Files Here !/8 - Endpoint Security First Line of Defence/50 - EndPoint-Security.pdf 338.7 kB
~Get Your Files Here !/21 - Introduction to Penetration Testing First Blood Pen Testing Primer/126 - Free-Labs-to-Test-PenTest-Skills.pdf 330.8 kB
~Get Your Files Here !/4 - Operating System Basics The OS Layer Cake/24 - Linux-Commands.pdf 285.9 kB
~Get Your Files Here !/3 - NetWork It Out Network Fundamentals/17 - Wireshark-Filters.pdf 273.6 kB
~Get Your Files Here !/4 - Operating System Basics The OS Layer Cake/24 - Linux-Filesystem-Hierarchy.pdf 187.9 kB
~Get Your Files Here !/4 - Operating System Basics The OS Layer Cake/24 - Windows-CLI-Commands.pdf 157.2 kB
~Get Your Files Here !/12 - Scanning Enumeration Ping Probe and Peek/76 - NMAP-commands.pdf 97.5 kB
~Get Your Files Here !/6 - Cryptography Basics Crack the Code Crypto for Mortals/6 - The Core Purpose of Cryptography.html 640 Bytes
~Get Your Files Here !/1 - Byte One Cybersecurity Unplugged Cybersecurity Fundamentals/1 - Lock It Down Test Your Cybersecurity Knowledge.html 495 Bytes
~Get Your Files Here !/7 - The Many Shades of Cyber Fifty Shades of Threat/7 - Cybersecurity Teams Test Your Knowledge.html 432 Bytes
~Get Your Files Here !/8 - Endpoint Security First Line of Defence/8 - Endpoint Security Basics.html 419 Bytes
~Get Your Files Here !/11 - Reconnaissance Intelligence Gathering Spy Before You Strike/11 - Cybersecurity Reconnaissance Intelligence Fundamentals Quiz.html 223 Bytes
~Get Your Files Here !/19 - Reporting Communication Cyber Speak Translate the Threat/19 - Effective Cybersecurity Reporting Communication Quiz.html 218 Bytes
~Get Your Files Here !/18 - PostExploitation Privilege Escalation Now Youre InRoot/18 - PostExploitation Techniques Tools Quiz.html 203 Bytes
~Get Your Files Here !/12 - Scanning Enumeration Ping Probe and Peek/12 - Scanning Enumeration and Vulnerability Management Quiz.html 199 Bytes
~Get Your Files Here !/15 - Mobile Security PocketSized Threats/15 - Mobile Security Threats Best Practices Quiz.html 195 Bytes
~Get Your Files Here !/23 - Unlocking Your Next Level Hack Your Career/23 - Cybersecurity Certifications Career Strategy Quiz.html 194 Bytes
~Get Your Files Here !/22 - Artificial Intelligence Cybersecurity Rise of the Bots AI vs Cyber Threats/22 - The Role of AI in Cybersecurity Quiz.html 193 Bytes
~Get Your Files Here !/24 - The Cyber Career Map Steps to Success Cyber Job Steps/24 - Launching Your Cybersecurity Career Quiz.html 193 Bytes
~Get Your Files Here !/13 - Exploitation Basics The Art of the Exploit/13 - Cybersecurity Exploitation Fundamentals Quiz.html 190 Bytes
~Get Your Files Here !/16 - Cloud Security Fundamentals The Fog of Cloud/16 - Cloud Security Principles Threats Quiz.html 190 Bytes
Get Bonus Downloads Here.url 180 Bytes
~Get Your Files Here !/21 - Introduction to Penetration Testing First Blood Pen Testing Primer/21 - Introduction to Penetration Testing Quiz.html 180 Bytes
~Get Your Files Here !/14 - Web Application Attacks 404 Web Security Not Found/14 - Web Application Security OWASP Fundamentals Quiz.html 169 Bytes
~Get Your Files Here !/20 - Incident Response Forensics Basics/20 - Incident Response Digital Forensics Fundamentals Quiz.html 160 Bytes
~Get Your Files Here !/9 - Social Engineering Hack the Human/9 - Human Hacking Basics.html 155 Bytes
~Get Your Files Here !/17 - Wireless Attacks WiFight the Power/17 - Wireless Network Security Attack Methods Quiz.html 144 Bytes
~Get Your Files Here !/5 - Firewalls Antivirus Your Digital Doormen/5 - Firewalls and Their Role in Network Protection.html 118 Bytes
~Get Your Files Here !/10 - Scripting Automation Byte Me Scripts That Do the Work/10 - Understanding Scripts.html 111 Bytes
~Get Your Files Here !/2 - Bits Bobs Whats Under the Hood Beyond the Screen Inside Your Machine/2 - Decoding Your Desktop A Guide to the Machine Within.html 77 Bytes
~Get Your Files Here !/3 - NetWork It Out Network Fundamentals/3 - Unlocking the Digital World A Network Fundamentals Quiz.html 71 Bytes
~Get Your Files Here !/Bonus Resources.txt 70 Bytes