[FreeCoursesOnline.Us] ethical-hacking-social-engineering/00.Humans-The-Soft-Center-Within-the-Hard-Shell/00.Overview.mp4 |
4.7 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/00.Humans-The-Soft-Center-Within-the-Hard-Shell/00.Overview.mp4.srt |
4 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/00.Humans-The-Soft-Center-Within-the-Hard-Shell/01.Social-Engineering-Through-the-Ages.mp4 |
27.2 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/00.Humans-The-Soft-Center-Within-the-Hard-Shell/01.Social-Engineering-Through-the-Ages.mp4.srt |
4 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/00.Humans-The-Soft-Center-Within-the-Hard-Shell/02.The-Soft-Center-That-Social-Engineering-Exploits.mp4 |
12.1 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/00.Humans-The-Soft-Center-Within-the-Hard-Shell/02.The-Soft-Center-That-Social-Engineering-Exploits.mp4.srt |
7 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/00.Humans-The-Soft-Center-Within-the-Hard-Shell/03.Human-Weaknesses-That-Enable-Social-Engineering.mp4 |
24.7 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/00.Humans-The-Soft-Center-Within-the-Hard-Shell/03.Human-Weaknesses-That-Enable-Social-Engineering.mp4.srt |
17 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/00.Humans-The-Soft-Center-Within-the-Hard-Shell/04.Computer-based-Versus-Human-based-Social-Engineering.mp4 |
4.8 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/00.Humans-The-Soft-Center-Within-the-Hard-Shell/04.Computer-based-Versus-Human-based-Social-Engineering.mp4.srt |
6 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/00.Humans-The-Soft-Center-Within-the-Hard-Shell/05.Social-Engineering-at-Home-and-in-Popular-Culture.mp4 |
15.9 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/00.Humans-The-Soft-Center-Within-the-Hard-Shell/05.Social-Engineering-at-Home-and-in-Popular-Culture.mp4.srt |
6 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/00.Humans-The-Soft-Center-Within-the-Hard-Shell/06.Summary.mp4 |
2.7 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/00.Humans-The-Soft-Center-Within-the-Hard-Shell/06.Summary.mp4.srt |
3 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/00.Humans-The-Soft-Center-Within-the-Hard-Shell/clips-info.json |
2 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/00.Humans-The-Soft-Center-Within-the-Hard-Shell/module-info.json |
343 B |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/01.A-Walkthrough-of-a-Social-Engineering-Attack/00.Overview.mp4 |
2.8 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/01.A-Walkthrough-of-a-Social-Engineering-Attack/00.Overview.mp4.srt |
2 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/01.A-Walkthrough-of-a-Social-Engineering-Attack/01.Case-Study-Cold-Call-Virus-Scams.mp4 |
14.7 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/01.A-Walkthrough-of-a-Social-Engineering-Attack/01.Case-Study-Cold-Call-Virus-Scams.mp4.srt |
6 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/01.A-Walkthrough-of-a-Social-Engineering-Attack/02.Establishing-Authority-and-Creating-Fear.mp4 |
10 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/01.A-Walkthrough-of-a-Social-Engineering-Attack/02.Establishing-Authority-and-Creating-Fear.mp4.srt |
5 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/01.A-Walkthrough-of-a-Social-Engineering-Attack/03.Executing-the-Social-Engineering-Attack.mp4 |
20.7 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/01.A-Walkthrough-of-a-Social-Engineering-Attack/03.Executing-the-Social-Engineering-Attack.mp4.srt |
10 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/01.A-Walkthrough-of-a-Social-Engineering-Attack/04.Demonstrating-Authenticity.mp4 |
31.7 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/01.A-Walkthrough-of-a-Social-Engineering-Attack/04.Demonstrating-Authenticity.mp4.srt |
18 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/01.A-Walkthrough-of-a-Social-Engineering-Attack/05.Creating-a-Debt.mp4 |
27.2 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/01.A-Walkthrough-of-a-Social-Engineering-Attack/05.Creating-a-Debt.mp4.srt |
22 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/01.A-Walkthrough-of-a-Social-Engineering-Attack/06.Monetizing-the-Scam.mp4 |
33.5 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/01.A-Walkthrough-of-a-Social-Engineering-Attack/06.Monetizing-the-Scam.mp4.srt |
17 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/01.A-Walkthrough-of-a-Social-Engineering-Attack/07.Summary.mp4 |
4.9 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/01.A-Walkthrough-of-a-Social-Engineering-Attack/07.Summary.mp4.srt |
4 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/01.A-Walkthrough-of-a-Social-Engineering-Attack/clips-info.json |
2 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/01.A-Walkthrough-of-a-Social-Engineering-Attack/module-info.json |
341 B |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/02.Reconnaissance-and-OSINT/00.Overview.mp4 |
4.2 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/02.Reconnaissance-and-OSINT/00.Overview.mp4.srt |
4 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/02.Reconnaissance-and-OSINT/01.Understanding-OSINT.mp4 |
56 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/02.Reconnaissance-and-OSINT/01.Understanding-OSINT.mp4.srt |
11 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/02.Reconnaissance-and-OSINT/02.Organizational-Reconnaissance.mp4 |
8.1 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/02.Reconnaissance-and-OSINT/02.Organizational-Reconnaissance.mp4.srt |
6 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/02.Reconnaissance-and-OSINT/03.Identifying-Targets-Within-an-Organization.mp4 |
22.9 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/02.Reconnaissance-and-OSINT/03.Identifying-Targets-Within-an-Organization.mp4.srt |
9 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/02.Reconnaissance-and-OSINT/04.Identity-Reconnaissance-with-PiPL.mp4 |
6.5 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/02.Reconnaissance-and-OSINT/04.Identity-Reconnaissance-with-PiPL.mp4.srt |
4 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/02.Reconnaissance-and-OSINT/05.Shoulder-Surfing-Eavesdropping-and-Tailgating.mp4 |
21.7 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/02.Reconnaissance-and-OSINT/05.Shoulder-Surfing-Eavesdropping-and-Tailgating.mp4.srt |
12 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/02.Reconnaissance-and-OSINT/06.Dumpster-Diving-and-Mail-Theft.mp4 |
7.6 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/02.Reconnaissance-and-OSINT/06.Dumpster-Diving-and-Mail-Theft.mp4.srt |
4 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/02.Reconnaissance-and-OSINT/07.Data-Breaches.mp4 |
6.4 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/02.Reconnaissance-and-OSINT/07.Data-Breaches.mp4.srt |
6 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/02.Reconnaissance-and-OSINT/08.Summary.mp4 |
2.7 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/02.Reconnaissance-and-OSINT/08.Summary.mp4.srt |
3 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/02.Reconnaissance-and-OSINT/clips-info.json |
2 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/02.Reconnaissance-and-OSINT/module-info.json |
301 B |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/03.Phishing-Attacks/00.Overview.mp4 |
4.7 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/03.Phishing-Attacks/00.Overview.mp4.srt |
4 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/03.Phishing-Attacks/01.Teach-a-Man-to-Phish-and-Hell-Eat-for-a-Lifetime.mp4 |
21.6 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/03.Phishing-Attacks/01.Teach-a-Man-to-Phish-and-Hell-Eat-for-a-Lifetime.mp4.srt |
13 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/03.Phishing-Attacks/02.Call-Signs-of-a-Phishing-Email.mp4 |
18.5 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/03.Phishing-Attacks/02.Call-Signs-of-a-Phishing-Email.mp4.srt |
12 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/03.Phishing-Attacks/03.Call-Signs-of-a-Phishing-Page.mp4 |
14.4 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/03.Phishing-Attacks/03.Call-Signs-of-a-Phishing-Page.mp4.srt |
9 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/03.Phishing-Attacks/04.Understanding-Spearphishing.mp4 |
7 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/03.Phishing-Attacks/04.Understanding-Spearphishing.mp4.srt |
4 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/03.Phishing-Attacks/05.Enumeration-as-a-Verification-Vector.mp4 |
7.4 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/03.Phishing-Attacks/05.Enumeration-as-a-Verification-Vector.mp4.srt |
6 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/03.Phishing-Attacks/06.Filter-Evasion-and-Concealment-Techniques.mp4 |
23.3 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/03.Phishing-Attacks/06.Filter-Evasion-and-Concealment-Techniques.mp4.srt |
12 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/03.Phishing-Attacks/07.Identifying-Attacks-with-PhishTank.mp4 |
8 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/03.Phishing-Attacks/07.Identifying-Attacks-with-PhishTank.mp4.srt |
3 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/03.Phishing-Attacks/08.Phishing-with-BeEF.mp4 |
32.3 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/03.Phishing-Attacks/08.Phishing-with-BeEF.mp4.srt |
14 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/03.Phishing-Attacks/09.Mounting-Your-Own-Ethical-Phishing-Attack-with-Phish5.mp4 |
21.3 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/03.Phishing-Attacks/09.Mounting-Your-Own-Ethical-Phishing-Attack-with-Phish5.mp4.srt |
14 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/03.Phishing-Attacks/10.Summary.mp4 |
3.2 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/03.Phishing-Attacks/10.Summary.mp4.srt |
3 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/03.Phishing-Attacks/clips-info.json |
3 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/03.Phishing-Attacks/module-info.json |
285 B |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/04.Identity-Theft-and-Impersonation/00.Overview.mp4 |
5.1 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/04.Identity-Theft-and-Impersonation/00.Overview.mp4.srt |
5 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/04.Identity-Theft-and-Impersonation/01.The-Impact-of-Identity-Theft.mp4 |
5.5 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/04.Identity-Theft-and-Impersonation/01.The-Impact-of-Identity-Theft.mp4.srt |
6 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/04.Identity-Theft-and-Impersonation/02.Identities-for-Sale.mp4 |
20.5 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/04.Identity-Theft-and-Impersonation/02.Identities-for-Sale.mp4.srt |
8 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/04.Identity-Theft-and-Impersonation/03.The-Mechanics-of-an-Identify-Theft-Attack.mp4 |
19.3 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/04.Identity-Theft-and-Impersonation/03.The-Mechanics-of-an-Identify-Theft-Attack.mp4.srt |
17 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/04.Identity-Theft-and-Impersonation/04.In-person-Human-based-Identity-Theft.mp4 |
11.8 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/04.Identity-Theft-and-Impersonation/04.In-person-Human-based-Identity-Theft.mp4.srt |
7 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/04.Identity-Theft-and-Impersonation/05.Impersonation.mp4 |
23.5 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/04.Identity-Theft-and-Impersonation/05.Impersonation.mp4.srt |
15 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/04.Identity-Theft-and-Impersonation/06.Social-Engineering-and-Impersonation-by-Example.mp4 |
23 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/04.Identity-Theft-and-Impersonation/06.Social-Engineering-and-Impersonation-by-Example.mp4.srt |
12 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/04.Identity-Theft-and-Impersonation/07.Summary.mp4 |
4 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/04.Identity-Theft-and-Impersonation/07.Summary.mp4.srt |
3 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/04.Identity-Theft-and-Impersonation/clips-info.json |
2 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/04.Identity-Theft-and-Impersonation/module-info.json |
317 B |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/05.Social-Engineering-Countermeasures/00.Overview.mp4 |
3.3 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/05.Social-Engineering-Countermeasures/00.Overview.mp4.srt |
3 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/05.Social-Engineering-Countermeasures/01.Defenses-in-the-Browser-and-Email-Clients.mp4 |
12.1 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/05.Social-Engineering-Countermeasures/01.Defenses-in-the-Browser-and-Email-Clients.mp4.srt |
12 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/05.Social-Engineering-Countermeasures/02.Record-Destruction.mp4 |
46.3 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/05.Social-Engineering-Countermeasures/02.Record-Destruction.mp4.srt |
12 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/05.Social-Engineering-Countermeasures/03.Physical-Security.mp4 |
19.8 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/05.Social-Engineering-Countermeasures/03.Physical-Security.mp4.srt |
7 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/05.Social-Engineering-Countermeasures/04.Separation-of-Duties-and-the-Principle-of-Least-Privilege.mp4 |
15.1 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/05.Social-Engineering-Countermeasures/04.Separation-of-Duties-and-the-Principle-of-Least-Privilege.mp4.srt |
15 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/05.Social-Engineering-Countermeasures/05.Multi-Step-and-Side-Channel-Identity-Verification.mp4 |
21.8 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/05.Social-Engineering-Countermeasures/05.Multi-Step-and-Side-Channel-Identity-Verification.mp4.srt |
16 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/05.Social-Engineering-Countermeasures/06.Logging-Auditing-and-Monitoring.mp4 |
7.6 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/05.Social-Engineering-Countermeasures/06.Logging-Auditing-and-Monitoring.mp4.srt |
7 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/05.Social-Engineering-Countermeasures/07.Identity-Monitoring.mp4 |
5.7 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/05.Social-Engineering-Countermeasures/07.Identity-Monitoring.mp4.srt |
6 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/05.Social-Engineering-Countermeasures/08.Conditioning-the-Humans.mp4 |
9.3 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/05.Social-Engineering-Countermeasures/08.Conditioning-the-Humans.mp4.srt |
5 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/05.Social-Engineering-Countermeasures/09.Summary.mp4 |
4.3 MB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/05.Social-Engineering-Countermeasures/09.Summary.mp4.srt |
4 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/05.Social-Engineering-Countermeasures/clips-info.json |
3 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/05.Social-Engineering-Countermeasures/module-info.json |
321 B |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/course-info.json |
2 KB |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/[FreeCoursesOnline.Us].txt |
138 B |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/[FreeCoursesOnline.Us].url |
123 B |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/[FreeTutorials.Us].txt |
75 B |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/[FreeTutorials.Us].url |
119 B |
[FreeCoursesOnline.Us] ethical-hacking-social-engineering/image.jpg |
297 KB |