Torrent Info
Title Python for Cybersecurity Specialization
Category
Size 1.14GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
[TGx]Downloaded from torrentgalaxy.to .txt 585B
0 102B
01_active-defense-on-the-network.en.srt 3.90KB
01_active-defense-on-the-network.en.txt 2.11KB
01_active-defense-on-the-network.mp4 4.87MB
01_introduction-to-decoys.en.srt 6.45KB
01_introduction-to-decoys.en.txt 3.47KB
01_introduction-to-decoys.mp4 8.09MB
01_introduction-to-python-for-cybersecurity.en.srt 2.79KB
01_introduction-to-python-for-cybersecurity.en.txt 1.77KB
01_introduction-to-python-for-cybersecurity.mp4 3.87MB
01_mitre-att-ck-collection.en.srt 3.71KB
01_mitre-att-ck-collection.en.txt 2.33KB
01_mitre-att-ck-collection.mp4 5.00MB
01_mitre-att-ck-command-and-control.en.srt 5.84KB
01_mitre-att-ck-command-and-control.en.txt 3.12KB
01_mitre-att-ck-command-and-control.mp4 7.28MB
01_mitre-att-ck-credential-access.en.srt 5.21KB
01_mitre-att-ck-credential-access.en.txt 3.29KB
01_mitre-att-ck-credential-access.mp4 7.38MB
01_mitre-att-ck-defense-evasion.en.srt 4.53KB
01_mitre-att-ck-defense-evasion.en.txt 2.42KB
01_mitre-att-ck-defense-evasion.mp4 6.45MB
01_mitre-att-ck-discovery.en.srt 4.50KB
01_mitre-att-ck-discovery.en.txt 2.88KB
01_mitre-att-ck-discovery.mp4 6.28MB
01_mitre-att-ck-execution.en.srt 5.06KB
01_mitre-att-ck-execution.en.txt 2.71KB
01_mitre-att-ck-execution.mp4 6.10MB
01_mitre-att-ck-exfiltration.en.srt 4.20KB
01_mitre-att-ck-exfiltration.en.txt 2.68KB
01_mitre-att-ck-exfiltration.mp4 5.98MB
01_mitre-att-ck-impact.en.srt 4.11KB
01_mitre-att-ck-impact.en.txt 2.63KB
01_mitre-att-ck-impact.mp4 5.75MB
01_mitre-att-ck-initial-access.en.srt 5.61KB
01_mitre-att-ck-initial-access.en.txt 2.99KB
01_mitre-att-ck-initial-access.mp4 6.65MB
01_mitre-att-ck-lateral-movement.en.srt 3.50KB
01_mitre-att-ck-lateral-movement.en.txt 2.25KB
01_mitre-att-ck-lateral-movement.mp4 5.15MB
01_mitre-att-ck-persistence.en.srt 5.04KB
01_mitre-att-ck-persistence.en.txt 2.70KB
01_mitre-att-ck-persistence.mp4 6.21MB
01_mitre-att-ck-privilege-escalation.en.srt 4.82KB
01_mitre-att-ck-privilege-escalation.en.txt 2.54KB
01_mitre-att-ck-privilege-escalation.mp4 5.84MB
01_mitre-pre-att-ck.en.srt 7.27KB
01_mitre-pre-att-ck.en.txt 3.93KB
01_mitre-pre-att-ck.mp4 9.32MB
01_monitoring-for-active-defense.en.srt 3.26KB
01_monitoring-for-active-defense.en.txt 2.04KB
01_monitoring-for-active-defense.mp4 4.36MB
02_decoy-processes-for-active-defense.en.srt 6.67KB
02_decoy-processes-for-active-defense.en.txt 3.66KB
02_decoy-processes-for-active-defense.mp4 8.23MB
02_introduction-to-account-discovery.en.srt 6.85KB
02_introduction-to-account-discovery.en.txt 3.68KB
02_introduction-to-account-discovery.mp4 7.37MB
02_introduction-to-boot-or-logon-autostart-execution.en.srt 5.98KB
02_introduction-to-boot-or-logon-autostart-execution.en.srt 4.83KB
02_introduction-to-boot-or-logon-autostart-execution.en.txt 2.58KB
02_introduction-to-boot-or-logon-autostart-execution.en.txt 3.23KB
02_introduction-to-boot-or-logon-autostart-execution.mp4 7.13MB
02_introduction-to-boot-or-logon-autostart-execution.mp4 6.19MB
02_introduction-to-clipboard-data.en.srt 6.26KB
02_introduction-to-clipboard-data.en.txt 3.95KB
02_introduction-to-clipboard-data.mp4 8.05MB
02_introduction-to-credentials-from-password-stores.en.srt 5.94KB
02_introduction-to-credentials-from-password-stores.en.txt 3.16KB
02_introduction-to-credentials-from-password-stores.mp4 6.63MB
02_introduction-to-data-encrypted-for-impact.en.srt 5.06KB
02_introduction-to-data-encrypted-for-impact.en.txt 2.68KB
02_introduction-to-data-encrypted-for-impact.mp4 5.95MB
02_introduction-to-encrypted-channels.en.srt 6.95KB
02_introduction-to-encrypted-channels.en.txt 3.64KB
02_introduction-to-encrypted-channels.mp4 7.82MB
02_introduction-to-exfiltration-over-alternative-protocols.en.srt 4.45KB
02_introduction-to-exfiltration-over-alternative-protocols.en.txt 2.37KB
02_introduction-to-exfiltration-over-alternative-protocols.mp4 5.81MB
02_introduction-to-impair-defenses.en.srt 6.91KB
02_introduction-to-impair-defenses.en.txt 3.63KB
02_introduction-to-impair-defenses.mp4 8.42MB
02_introduction-to-network-scanning.en.srt 7.07KB
02_introduction-to-network-scanning.en.txt 3.73KB
02_introduction-to-network-scanning.mp4 8.01MB
02_introduction-to-python.en.srt 6.72KB
02_introduction-to-python.en.txt 4.27KB
02_introduction-to-python.mp4 8.83MB
02_introduction-to-remote-services.en.srt 5.04KB
02_introduction-to-remote-services.en.txt 2.66KB
02_introduction-to-remote-services.mp4 6.09MB
02_introduction-to-user-execution.en.srt 4.19KB
02_introduction-to-user-execution.en.txt 2.28KB
02_introduction-to-user-execution.mp4 4.77MB
02_introduction-to-valid-accounts.en.srt 7.04KB
02_introduction-to-valid-accounts.en.txt 3.76KB
02_introduction-to-valid-accounts.mp4 8.22MB
02_network-monitoring-for-active-defense.en.srt 5.46KB
02_network-monitoring-for-active-defense.en.txt 2.95KB
02_network-monitoring-for-active-defense.mp4 6.89MB
02_pcap-collection-for-active-defense.en.srt 5.61KB
02_pcap-collection-for-active-defense.en.txt 2.97KB
02_pcap-collection-for-active-defense.mp4 6.27MB
03_alternative-protocol.en.srt 38.97KB
03_alternative-protocol.en.txt 20.48KB
03_alternative-protocol.mp4 58.97MB
03_clipboard-data.en.srt 9.76KB
03_clipboard-data.en.txt 6.24KB
03_clipboard-data.mp4 12.65MB
03_credentials-from-web-browsers.en.srt 10.93KB
03_credentials-from-web-browsers.en.txt 6.83KB
03_credentials-from-web-browsers.mp4 19.74MB
03_data-encryption.en.srt 12.87KB
03_data-encryption.en.txt 8.26KB
03_data-encryption.mp4 22.52MB
03_decoy-processes.en.srt 14.17KB
03_decoy-processes.en.txt 7.47KB
03_decoy-processes.mp4 17.60MB
03_default-account-discovery.en.srt 16.53KB
03_default-account-discovery.en.txt 8.78KB
03_default-account-discovery.mp4 20.73MB
03_encrypted-channel.en.srt 20.01KB
03_encrypted-channel.en.txt 10.52KB
03_encrypted-channel.mp4 24.62MB
03_impair-avs.en.srt 13.27KB
03_impair-avs.en.txt 8.49KB
03_impair-avs.mp4 19.80MB
03_introduction-to-mitre-att-ck-and-shield.en.srt 10.27KB
03_introduction-to-mitre-att-ck-and-shield.en.txt 6.45KB
03_introduction-to-mitre-att-ck-and-shield.mp4 15.63MB
03_introduction-to-scapy.en.srt 11.72KB
03_introduction-to-scapy.en.txt 6.15KB
03_introduction-to-scapy.mp4 13.52MB
03_logon-scripts.en.srt 19.05KB
03_logon-scripts.en.txt 10.03KB
03_logon-scripts.mp4 23.44MB
03_malicious-links.en.srt 10.88KB
03_malicious-links.en.txt 6.92KB
03_malicious-links.mp4 13.13MB
03_network-monitoring.en.srt 13.92KB
03_network-monitoring.en.txt 7.36KB
03_network-monitoring.mp4 15.72MB
03_pcap-collection.en.srt 17.68KB
03_pcap-collection.en.txt 11.16KB
03_pcap-collection.mp4 24.78MB
03_registry-autorun.en.srt 17.92KB
03_registry-autorun.en.txt 11.29KB
03_registry-autorun.mp4 27.61MB
03_smb-windows-admin-shares.en.srt 8.32KB
03_smb-windows-admin-shares.en.txt 5.28KB
03_smb-windows-admin-shares.mp4 11.60MB
03_user-account-discovery.en.srt 22.18KB
03_user-account-discovery.en.txt 11.63KB
03_user-account-discovery.mp4 24.22MB
04_decoy-content-for-active-defense.en.srt 5.52KB
04_decoy-content-for-active-defense.en.txt 3.57KB
04_decoy-content-for-active-defense.mp4 7.84MB
04_introduction-to-account-access-removal.en.srt 6.74KB
04_introduction-to-account-access-removal.en.txt 3.63KB
04_introduction-to-account-access-removal.mp4 7.41MB
04_introduction-to-email-collection.en.srt 7.11KB
04_introduction-to-email-collection.en.txt 3.83KB
04_introduction-to-email-collection.mp4 7.53MB
04_introduction-to-file-and-directory-discovery.en.srt 4.41KB
04_introduction-to-file-and-directory-discovery.en.txt 2.76KB
04_introduction-to-file-and-directory-discovery.mp4 5.79MB
04_introduction-to-hide-artifacts.en.srt 7.81KB
04_introduction-to-hide-artifacts.en.txt 4.09KB
04_introduction-to-hide-artifacts.mp4 8.38MB
04_introduction-to-hijack-execution-flow.en.srt 6.00KB
04_introduction-to-hijack-execution-flow.en.txt 3.22KB
04_introduction-to-hijack-execution-flow.mp4 7.70MB
04_introduction-to-network-sniffing.en.srt 6.65KB
04_introduction-to-network-sniffing.en.txt 3.63KB
04_introduction-to-network-sniffing.mp4 7.58MB
04_introduction-to-non-application-layer-protocol.en.srt 5.02KB
04_introduction-to-non-application-layer-protocol.en.txt 3.23KB
04_introduction-to-non-application-layer-protocol.mp4 6.53MB
04_introduction-to-process-injection.en.srt 8.41KB
04_introduction-to-process-injection.en.txt 4.48KB
04_introduction-to-process-injection.mp4 9.64MB
04_introduction-to-protocol-tunneling.en.srt 6.33KB
04_introduction-to-protocol-tunneling.en.txt 4.04KB
04_introduction-to-protocol-tunneling.mp4 7.45MB
04_introduction-to-replication-through-removable-media.en.srt 7.25KB
04_introduction-to-replication-through-removable-media.en.txt 3.87KB
04_introduction-to-replication-through-removable-media.mp4 8.13MB
04_introduction-to-scheduled-tasks-and-jobs.en.srt 6.02KB
04_introduction-to-scheduled-tasks-and-jobs.en.txt 3.18KB
04_introduction-to-scheduled-tasks-and-jobs.mp4 6.28MB
04_introduction-to-use-alternative-authentication-material.en.srt 6.32KB
04_introduction-to-use-alternative-authentication-material.en.txt 4.00KB
04_introduction-to-use-alternative-authentication-material.mp4 8.56MB
04_network-scanning.en.srt 29.66KB
04_network-scanning.en.txt 15.48KB
04_network-scanning.mp4 31.04MB
04_protocol-decoding-for-active-defense.en.srt 5.81KB
04_protocol-decoding-for-active-defense.en.txt 3.10KB
04_protocol-decoding-for-active-defense.mp4 6.85MB
04_python-for-cybersecurity-resources_instructions.html 1.05KB
04_python-for-cybersecurity-resources_Python_for_Cybersecurity_Handout.pdf 25.04KB
04_system-activity-monitoring-for-active-defense.en.srt 5.91KB
04_system-activity-monitoring-for-active-defense.en.txt 3.72KB
04_system-activity-monitoring-for-active-defense.mp4 8.37MB
05_account-access-removal.en.srt 11.29KB
05_account-access-removal.en.txt 7.12KB
05_account-access-removal.mp4 14.40MB
05_alternate-data-streams.en.srt 16.07KB
05_alternate-data-streams.en.txt 8.42KB
05_alternate-data-streams.mp4 21.33MB
05_autorun-scripts.en.srt 17.44KB
05_autorun-scripts.en.txt 9.24KB
05_autorun-scripts.mp4 20.21MB
05_decoy-content.en.srt 7.80KB
05_decoy-content.en.txt 4.11KB
05_decoy-content.mp4 9.52MB
05_file-and-directory-discovery.en.srt 13.40KB
05_file-and-directory-discovery.en.txt 7.11KB
05_file-and-directory-discovery.mp4 15.95MB
05_hijacked-execution-flow.en.srt 18.06KB
05_hijacked-execution-flow.en.txt 11.53KB
05_hijacked-execution-flow.mp4 26.22MB
05_introduction-to-open-technical-databases.en.srt 6.37KB
05_introduction-to-open-technical-databases.en.txt 3.40KB
05_introduction-to-open-technical-databases.mp4 7.70MB
05_local-email-collection.en.srt 6.61KB
05_local-email-collection.en.txt 3.63KB
05_local-email-collection.mp4 7.30MB
05_network-sniffing.en.srt 31.71KB
05_network-sniffing.en.txt 16.57KB
05_network-sniffing.mp4 40.04MB
05_non-application-layer-protocol.en.srt 6.41KB
05_non-application-layer-protocol.en.txt 3.43KB
05_non-application-layer-protocol.mp4 6.80MB
05_protocol-decoding.en.srt 19.93KB
05_protocol-decoding.en.txt 12.72KB
05_protocol-decoding.mp4 30.03MB
05_protocol-tunneling.en.srt 13.84KB
05_protocol-tunneling.en.txt 7.31KB
05_protocol-tunneling.mp4 17.36MB
05_python-for-cybersecurity_quiz.html 3.42KB
05_python-library-injection.en.srt 11.40KB
05_python-library-injection.en.txt 7.20KB
05_python-library-injection.mp4 13.62MB
05_scheduled-execution.en.srt 14.84KB
05_scheduled-execution.en.txt 7.74KB
05_scheduled-execution.mp4 24.61MB
05_system-activity-monitoring.en.srt 19.70KB
05_system-activity-monitoring.en.txt 10.34KB
05_system-activity-monitoring.mp4 25.34MB
05_web-session-cookie.en.srt 12.10KB
05_web-session-cookie.en.txt 6.36KB
05_web-session-cookie.mp4 14.31MB
06_behavioral-analytics-for-active-defense.en.srt 6.61KB
06_behavioral-analytics-for-active-defense.en.txt 4.16KB
06_behavioral-analytics-for-active-defense.mp4 9.00MB
06_burn-in-for-active-defense.en.srt 5.89KB
06_burn-in-for-active-defense.en.txt 3.11KB
06_burn-in-for-active-defense.mp4 7.09MB
06_decoy-credentials-for-active-defense.en.srt 6.38KB
06_decoy-credentials-for-active-defense.en.txt 4.00KB
06_decoy-credentials-for-active-defense.mp4 7.75MB
06_dns-exploration.en.srt 19.60KB
06_dns-exploration.en.txt 12.56KB
06_dns-exploration.mp4 26.07MB
06_python-for-initial-access_exam.html 4.35KB
07_behavioral-analytics.en.srt 19.81KB
07_behavioral-analytics.en.txt 12.46KB
07_behavioral-analytics.mp4 27.87MB
07_burn-in.en.srt 14.66KB
07_burn-in.en.txt 7.66KB
07_burn-in.mp4 16.43MB
07_decoy-credentials.en.srt 15.94KB
07_decoy-credentials.en.txt 8.39KB
07_decoy-credentials.mp4 18.83MB
07_python-for-pre-att-ck_quiz.html 3.90KB
1 94.33KB
10 387.92KB
11 395.57KB
12 287.08KB
13 60.86KB
14 494.84KB
15 172.04KB
16 274.56KB
17 298.90KB
18 205.63KB
19 269.34KB
2 472.82KB
20 177.16KB
21 411.21KB
22 141.32KB
23 74.79KB
24 47.33KB
25 286.92KB
26 383.98KB
27 103.82KB
28 195.16KB
29 392.11KB
3 479.87KB
30 487.48KB
31 374.93KB
32 357.66KB
33 410.03KB
34 373.56KB
35 491.32KB
36 183.07KB
37 2.05KB
38 176.47KB
39 453.46KB
4 132.58KB
40 82.60KB
41 124.61KB
42 138.13KB
43 272.02KB
44 289.22KB
45 377.08KB
46 423.93KB
47 457.51KB
48 503.69KB
49 159.74KB
5 398.62KB
50 184.25KB
51 257.90KB
52 306.77KB
53 308.29KB
54 428.53KB
55 483.62KB
56 47.60KB
57 87.43KB
58 127.87KB
59 137.26KB
6 289.89KB
60 208.91KB
61 229.06KB
62 381.78KB
63 423.59KB
64 109.12KB
65 154.98KB
66 202.64KB
67 361.74KB
68 376.18KB
69 484.62KB
7 436.50KB
70 55.70KB
71 220.76KB
72 220.79KB
73 237.41KB
74 295.45KB
75 318.09KB
76 411.58KB
77 417.84KB
78 22.18KB
79 49.98KB
8 165.04KB
80 165.20KB
81 192.50KB
82 213.84KB
83 252.13KB
84 358.61KB
85 3.26KB
86 128.93KB
87 239.16KB
88 143.08KB
9 224.92KB
TutsNode.org.txt 63B