:Search:

Python for Cybersecurity Specialization

Torrent:
Info Hash: FC65D2A14A672DCDD71D8DFD97E434B587B10B4A
Thumbnail:
Similar Posts:
Uploader: tutsnode
Source: T Logo Torrent Galaxy
Downloads: 10056
Language: English
Description:
None
Category: Other
Size: 1.1 GB
Added: Oct. 18, 2023, 4:52 a.m.
Peers: Seeders: 86, Leechers: 6 (Last updated: 10 months, 3 weeks ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://open.stealth.si:80/announce 23 2 5840
udp://exodus.desync.com:6969/announce 3 0 70
udp://tracker.cyberia.is:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.opentrackr.org:1337/announce 28 1 2129
udp://tracker.torrent.eu.org:451/announce 22 1 1929
udp://explodie.org:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.birkenwald.de:6969/announce 0 1 0
udp://tracker.moeking.me:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://ipv4.tracker.harry.lu:80/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.tiny-vps.com:6969/announce 10 0 88
udp://tracker.therarbg.to:6969/announce 0 1 0
Files:
  1. 03_alternative-protocol.mp4 59.0 MB
  2. TutsNode.org.txt 63 bytes
  3. 04_network-scanning.en.srt 29.7 KB
  4. 01_introduction-to-python-for-cybersecurity.en.txt 1.8 KB
  5. 0 102 bytes
  6. 05_network-sniffing.mp4 40.0 MB
  7. 03_alternative-protocol.en.srt 39.0 KB
  8. 05_network-sniffing.en.srt 31.7 KB
  9. 04_python-for-cybersecurity-resources_Python_for_Cybersecurity_Handout.pdf 25.0 KB
  10. 03_user-account-discovery.en.srt 22.2 KB
  11. 03_alternative-protocol.en.txt 20.5 KB
  12. 03_encrypted-channel.en.srt 20.0 KB
  13. 05_protocol-decoding.en.srt 19.9 KB
  14. 07_behavioral-analytics.en.srt 19.8 KB
  15. 05_system-activity-monitoring.en.srt 19.7 KB
  16. 06_dns-exploration.en.srt 19.6 KB
  17. 03_logon-scripts.en.srt 19.1 KB
  18. 05_hijacked-execution-flow.en.srt 18.1 KB
  19. 01_mitre-att-ck-exfiltration.en.txt 2.7 KB
  20. 03_registry-autorun.en.srt 17.9 KB
  21. 03_pcap-collection.en.srt 17.7 KB
  22. 02_introduction-to-exfiltration-over-alternative-protocols.en.txt 2.4 KB
  23. 05_autorun-scripts.en.srt 17.4 KB
  24. 05_network-sniffing.en.txt 16.6 KB
  25. 03_default-account-discovery.en.srt 16.5 KB
  26. [TGx]Downloaded from torrentgalaxy.to .txt 585 bytes
  27. 05_alternate-data-streams.en.srt 16.1 KB
  28. 07_decoy-credentials.en.srt 15.9 KB
  29. 04_network-scanning.en.txt 15.5 KB
  30. 05_scheduled-execution.en.srt 14.8 KB
  31. 07_burn-in.en.srt 14.7 KB
  32. 03_decoy-processes.en.srt 14.2 KB
  33. 06_dns-exploration.en.txt 12.6 KB
  34. 01_mitre-att-ck-impact.en.txt 2.6 KB
  35. 03_network-monitoring.en.srt 13.9 KB
  36. 05_protocol-tunneling.en.srt 13.8 KB
  37. 02_introduction-to-data-encrypted-for-impact.en.txt 2.7 KB
  38. 05_file-and-directory-discovery.en.srt 13.4 KB
  39. 03_impair-avs.en.srt 13.3 KB
  40. 03_data-encryption.en.srt 12.9 KB
  41. 05_protocol-decoding.en.txt 12.7 KB
  42. 07_behavioral-analytics.en.txt 12.5 KB
  43. 05_web-session-cookie.en.srt 12.1 KB
  44. 03_introduction-to-scapy.en.srt 11.7 KB
  45. 03_user-account-discovery.en.txt 11.6 KB
  46. 05_hijacked-execution-flow.en.txt 11.5 KB
  47. 05_python-library-injection.en.srt 11.4 KB
  48. 03_registry-autorun.en.txt 11.3 KB
  49. 05_account-access-removal.en.srt 11.3 KB
  50. 03_pcap-collection.en.txt 11.2 KB
  51. 03_credentials-from-web-browsers.en.srt 10.9 KB
  52. 03_malicious-links.en.srt 10.9 KB
  53. 03_encrypted-channel.en.txt 10.5 KB
  54. 05_system-activity-monitoring.en.txt 10.3 KB
  55. 03_introduction-to-mitre-att-ck-and-shield.en.srt 10.3 KB
  56. 03_logon-scripts.en.txt 10.0 KB
  57. 03_clipboard-data.en.srt 9.8 KB
  58. 05_autorun-scripts.en.txt 9.2 KB
  59. 03_default-account-discovery.en.txt 8.8 KB
  60. 03_impair-avs.en.txt 8.5 KB
  61. 05_alternate-data-streams.en.txt 8.4 KB
  62. 04_introduction-to-process-injection.en.srt 8.4 KB
  63. 07_decoy-credentials.en.txt 8.4 KB
  64. 01_mitre-att-ck-discovery.en.txt 2.9 KB
  65. 03_smb-windows-admin-shares.en.srt 8.3 KB
  66. 03_data-encryption.en.txt 8.3 KB
  67. 04_introduction-to-hide-artifacts.en.srt 7.8 KB
  68. 05_decoy-content.en.srt 7.8 KB
  69. 05_scheduled-execution.en.txt 7.7 KB
  70. 07_burn-in.en.txt 7.7 KB
  71. 03_decoy-processes.en.txt 7.5 KB
  72. 03_network-monitoring.en.txt 7.4 KB
  73. 04_introduction-to-file-and-directory-discovery.en.txt 2.8 KB
  74. 05_protocol-tunneling.en.txt 7.3 KB
  75. 01_mitre-pre-att-ck.en.srt 7.3 KB
  76. 04_introduction-to-replication-through-removable-media.en.srt 7.2 KB
  77. 05_python-library-injection.en.txt 7.2 KB
  78. 05_account-access-removal.en.txt 7.1 KB
  79. 01_mitre-att-ck-lateral-movement.en.txt 2.2 KB
  80. 05_file-and-directory-discovery.en.txt 7.1 KB
  81. 04_introduction-to-email-collection.en.srt 7.1 KB
  82. 02_introduction-to-remote-services.en.txt 2.7 KB
  83. 02_introduction-to-network-scanning.en.srt 7.1 KB
  84. 02_introduction-to-valid-accounts.en.srt 7.0 KB
  85. 02_introduction-to-encrypted-channels.en.srt 7.0 KB
  86. 03_malicious-links.en.txt 6.9 KB
  87. 02_introduction-to-impair-defenses.en.srt 6.9 KB
  88. 02_introduction-to-account-discovery.en.srt 6.9 KB
  89. 03_credentials-from-web-browsers.en.txt 6.8 KB
  90. 04_introduction-to-account-access-removal.en.srt 6.7 KB
  91. 02_introduction-to-python.en.srt 6.7 KB
  92. 02_decoy-processes-for-active-defense.en.srt 6.7 KB
  93. 02_pcap-collection-for-active-defense.en.srt 5.6 KB
  94. 01_mitre-att-ck-collection.en.txt 2.3 KB
  95. 04_introduction-to-network-sniffing.en.srt 6.6 KB
  96. 05_local-email-collection.en.srt 6.6 KB
  97. 06_behavioral-analytics-for-active-defense.en.srt 6.6 KB
  98. 01_introduction-to-decoys.en.srt 6.5 KB
  99. 03_introduction-to-mitre-att-ck-and-shield.en.txt 6.4 KB
  100. 05_non-application-layer-protocol.en.srt 6.4 KB
  101. 06_decoy-credentials-for-active-defense.en.srt 6.4 KB
  102. 05_introduction-to-open-technical-databases.en.srt 6.4 KB
  103. 05_web-session-cookie.en.txt 6.4 KB
  104. 04_introduction-to-protocol-tunneling.en.srt 6.3 KB
  105. 04_introduction-to-use-alternative-authentication-material.en.srt 6.3 KB
  106. 02_introduction-to-clipboard-data.en.srt 6.3 KB
  107. 03_clipboard-data.en.txt 6.2 KB
  108. 03_introduction-to-scapy.en.txt 6.2 KB
  109. 01_mitre-att-ck-execution.en.txt 2.7 KB
  110. 04_introduction-to-scheduled-tasks-and-jobs.en.srt 6.0 KB
  111. 04_introduction-to-hijack-execution-flow.en.srt 6.0 KB
  112. 02_introduction-to-user-execution.en.txt 2.3 KB
  113. 02_introduction-to-boot-or-logon-autostart-execution.en.srt 6.0 KB
  114. 02_introduction-to-credentials-from-password-stores.en.srt 5.9 KB
  115. 04_system-activity-monitoring-for-active-defense.en.srt 5.9 KB
  116. 06_burn-in-for-active-defense.en.srt 5.9 KB
  117. 01_mitre-att-ck-command-and-control.en.srt 5.8 KB
  118. 04_protocol-decoding-for-active-defense.en.srt 5.8 KB
  119. 01_mitre-att-ck-initial-access.en.srt 5.6 KB
  120. 04_decoy-content-for-active-defense.en.srt 5.5 KB
  121. 02_network-monitoring-for-active-defense.en.srt 5.5 KB
  122. 03_smb-windows-admin-shares.en.txt 5.3 KB
  123. 01_mitre-att-ck-credential-access.en.srt 5.2 KB
  124. 01_mitre-att-ck-persistence.en.txt 2.7 KB
  125. 02_introduction-to-data-encrypted-for-impact.en.srt 5.1 KB
  126. 01_mitre-att-ck-execution.en.srt 5.1 KB
  127. 02_introduction-to-boot-or-logon-autostart-execution.en.txt 2.6 KB
  128. 01_mitre-att-ck-persistence.en.srt 5.0 KB
  129. 02_introduction-to-remote-services.en.srt 5.0 KB
  130. 04_introduction-to-non-application-layer-protocol.en.srt 5.0 KB
  131. 02_introduction-to-boot-or-logon-autostart-execution.en.srt 4.8 KB
  132. 01_mitre-att-ck-privilege-escalation.en.srt 4.8 KB
  133. 01_mitre-att-ck-defense-evasion.en.srt 4.5 KB
  134. 01_mitre-att-ck-discovery.en.srt 4.5 KB
  135. 04_introduction-to-process-injection.en.txt 4.5 KB
  136. 02_introduction-to-exfiltration-over-alternative-protocols.en.srt 4.4 KB
  137. 04_introduction-to-file-and-directory-discovery.en.srt 4.4 KB
  138. 06_python-for-initial-access_exam.html 4.3 KB
  139. 01_mitre-att-ck-privilege-escalation.en.txt 2.5 KB
  140. 02_introduction-to-python.en.txt 4.3 KB
  141. 01_mitre-att-ck-exfiltration.en.srt 4.2 KB
  142. 02_introduction-to-user-execution.en.srt 4.2 KB
  143. 06_behavioral-analytics-for-active-defense.en.txt 4.2 KB
  144. 05_decoy-content.en.txt 4.1 KB
  145. 01_mitre-att-ck-impact.en.srt 4.1 KB
  146. 04_introduction-to-hide-artifacts.en.txt 4.1 KB
  147. 04_introduction-to-protocol-tunneling.en.txt 4.0 KB
  148. 04_introduction-to-use-alternative-authentication-material.en.txt 4.0 KB
  149. 06_decoy-credentials-for-active-defense.en.txt 4.0 KB
  150. 02_introduction-to-clipboard-data.en.txt 3.9 KB
  151. 01_mitre-pre-att-ck.en.txt 3.9 KB
  152. 07_python-for-pre-att-ck_quiz.html 3.9 KB
  153. 01_active-defense-on-the-network.en.srt 3.9 KB
  154. 01_mitre-att-ck-defense-evasion.en.txt 2.4 KB
  155. 04_introduction-to-replication-through-removable-media.en.txt 3.9 KB
  156. 04_introduction-to-email-collection.en.txt 3.8 KB
  157. 02_introduction-to-valid-accounts.en.txt 3.8 KB
  158. 02_introduction-to-network-scanning.en.txt 3.7 KB
  159. 04_system-activity-monitoring-for-active-defense.en.txt 3.7 KB
  160. 01_mitre-att-ck-collection.en.srt 3.7 KB
  161. 02_introduction-to-account-discovery.en.txt 3.7 KB
  162. 02_decoy-processes-for-active-defense.en.txt 3.7 KB
  163. 02_introduction-to-encrypted-channels.en.txt 3.6 KB
  164. 04_introduction-to-network-sniffing.en.txt 3.6 KB
  165. 05_local-email-collection.en.txt 3.6 KB
  166. 02_introduction-to-impair-defenses.en.txt 3.6 KB
  167. 04_introduction-to-account-access-removal.en.txt 3.6 KB
  168. 04_decoy-content-for-active-defense.en.txt 3.6 KB
  169. 01_mitre-att-ck-lateral-movement.en.srt 3.5 KB
  170. 01_introduction-to-decoys.en.txt 3.5 KB
  171. 05_non-application-layer-protocol.en.txt 3.4 KB
  172. 05_python-for-cybersecurity_quiz.html 3.4 KB
  173. 05_introduction-to-open-technical-databases.en.txt 3.4 KB
  174. 01_mitre-att-ck-credential-access.en.txt 3.3 KB
  175. 01_monitoring-for-active-defense.en.srt 3.3 KB
  176. 04_introduction-to-non-application-layer-protocol.en.txt 3.2 KB
  177. 02_introduction-to-boot-or-logon-autostart-execution.en.txt 3.2 KB
  178. 04_introduction-to-hijack-execution-flow.en.txt 3.2 KB
  179. 04_introduction-to-scheduled-tasks-and-jobs.en.txt 3.2 KB
  180. 02_introduction-to-credentials-from-password-stores.en.txt 3.2 KB
  181. 01_mitre-att-ck-command-and-control.en.txt 3.1 KB
  182. 06_burn-in-for-active-defense.en.txt 3.1 KB
  183. 04_protocol-decoding-for-active-defense.en.txt 3.1 KB
  184. 01_mitre-att-ck-initial-access.en.txt 3.0 KB
  185. 02_pcap-collection-for-active-defense.en.txt 3.0 KB
  186. 02_network-monitoring-for-active-defense.en.txt 2.9 KB
  187. 01_introduction-to-python-for-cybersecurity.en.srt 2.8 KB
  188. 01_active-defense-on-the-network.en.txt 2.1 KB
  189. 01_monitoring-for-active-defense.en.txt 2.0 KB
  190. 04_python-for-cybersecurity-resources_instructions.html 1.0 KB
  191. 1 94.3 KB
  192. 04_network-scanning.mp4 31.0 MB
  193. 2 472.8 KB
  194. 05_protocol-decoding.mp4 30.0 MB
  195. 3 479.9 KB
  196. 07_behavioral-analytics.mp4 27.9 MB
  197. 4 132.6 KB
  198. 03_registry-autorun.mp4 27.6 MB
  199. 5 398.6 KB
  200. 05_hijacked-execution-flow.mp4 26.2 MB
  201. 6 289.9 KB
  202. 06_dns-exploration.mp4 26.1 MB
  203. 7 436.5 KB
  204. 05_system-activity-monitoring.mp4 25.3 MB
  205. 8 165.0 KB
  206. 03_pcap-collection.mp4 24.8 MB
  207. 9 224.9 KB
  208. 03_encrypted-channel.mp4 24.6 MB
  209. 10 387.9 KB
  210. 05_scheduled-execution.mp4 24.6 MB
  211. 11 395.6 KB
  212. 03_user-account-discovery.mp4 24.2 MB
  213. 12 287.1 KB
  214. 03_logon-scripts.mp4 23.4 MB
  215. 13 60.9 KB
  216. 03_data-encryption.mp4 22.5 MB
  217. 14 494.8 KB
  218. 05_alternate-data-streams.mp4 21.3 MB
  219. 15 172.0 KB
  220. 03_default-account-discovery.mp4 20.7 MB
  221. 16 274.6 KB
  222. 05_autorun-scripts.mp4 20.2 MB
  223. 17 298.9 KB
  224. 03_impair-avs.mp4 19.8 MB
  225. 18 205.6 KB
  226. 03_credentials-from-web-browsers.mp4 19.7 MB
  227. 19 269.3 KB
  228. 07_decoy-credentials.mp4 18.8 MB
  229. 20 177.2 KB
  230. 03_decoy-processes.mp4 17.6 MB
  231. 21 411.2 KB
  232. 05_protocol-tunneling.mp4 17.4 MB
  233. 22 141.3 KB
  234. 07_burn-in.mp4 16.4 MB
  235. 23 74.8 KB
  236. 05_file-and-directory-discovery.mp4 16.0 MB
  237. 24 47.3 KB
  238. 03_network-monitoring.mp4 15.7 MB
  239. 25 286.9 KB
  240. 03_introduction-to-mitre-att-ck-and-shield.mp4 15.6 MB
  241. 26 384.0 KB
  242. 05_account-access-removal.mp4 14.4 MB
  243. 27 103.8 KB
  244. 05_web-session-cookie.mp4 14.3 MB
  245. 28 195.2 KB
  246. 05_python-library-injection.mp4 13.6 MB
  247. 29 392.1 KB
  248. 03_introduction-to-scapy.mp4 13.5 MB
  249. 30 487.5 KB
  250. 03_malicious-links.mp4 13.1 MB
  251. 31 374.9 KB
  252. 03_clipboard-data.mp4 12.7 MB
  253. 32 357.7 KB
  254. 03_smb-windows-admin-shares.mp4 11.6 MB
  255. 33 410.0 KB
  256. 04_introduction-to-process-injection.mp4 9.6 MB
  257. 34 373.6 KB
  258. 05_decoy-content.mp4 9.5 MB
  259. 35 491.3 KB
  260. 01_mitre-pre-att-ck.mp4 9.3 MB
  261. 36 183.1 KB
  262. 06_behavioral-analytics-for-active-defense.mp4 9.0 MB
  263. 37 2.0 KB
  264. 02_introduction-to-python.mp4 8.8 MB
  265. 38 176.5 KB
  266. 04_introduction-to-use-alternative-authentication-material.mp4 8.6 MB
  267. 39 453.5 KB
  268. 02_introduction-to-impair-defenses.mp4 8.4 MB
  269. 40 82.6 KB
  270. 04_introduction-to-hide-artifacts.mp4 8.4 MB
  271. 41 124.6 KB
  272. 04_system-activity-monitoring-for-active-defense.mp4 8.4 MB
  273. 42 138.1 KB
  274. 02_decoy-processes-for-active-defense.mp4 8.2 MB
  275. 43 272.0 KB
  276. 02_introduction-to-valid-accounts.mp4 8.2 MB
  277. 44 289.2 KB
  278. 04_introduction-to-replication-through-removable-media.mp4 8.1 MB
  279. 45 377.1 KB
  280. 01_introduction-to-decoys.mp4 8.1 MB
  281. 46 423.9 KB
  282. 02_introduction-to-clipboard-data.mp4 8.1 MB
  283. 47 457.5 KB
  284. 02_introduction-to-network-scanning.mp4 8.0 MB
  285. 48 503.7 KB
  286. 04_decoy-content-for-active-defense.mp4 7.8 MB
  287. 49 159.7 KB
  288. 02_introduction-to-encrypted-channels.mp4 7.8 MB
  289. 50 184.2 KB
  290. 06_decoy-credentials-for-active-defense.mp4 7.7 MB
  291. 51 257.9 KB
  292. 05_introduction-to-open-technical-databases.mp4 7.7 MB
  293. 52 306.8 KB
  294. 04_introduction-to-hijack-execution-flow.mp4 7.7 MB
  295. 53 308.3 KB
  296. 04_introduction-to-network-sniffing.mp4 7.6 MB
  297. 54 428.5 KB
  298. 04_introduction-to-email-collection.mp4 7.5 MB
  299. 55 483.6 KB
  300. 04_introduction-to-protocol-tunneling.mp4 7.5 MB
  301. 56 47.6 KB
  302. 04_introduction-to-account-access-removal.mp4 7.4 MB
  303. 57 87.4 KB
  304. 01_mitre-att-ck-credential-access.mp4 7.4 MB
  305. 58 127.9 KB
  306. 02_introduction-to-account-discovery.mp4 7.4 MB
  307. 59 137.3 KB
  308. 05_local-email-collection.mp4 7.3 MB
  309. 60 208.9 KB
  310. 01_mitre-att-ck-command-and-control.mp4 7.3 MB
  311. 61 229.1 KB
  312. 02_introduction-to-boot-or-logon-autostart-execution.mp4 7.1 MB
  313. 62 381.8 KB
  314. 06_burn-in-for-active-defense.mp4 7.1 MB
  315. 63 423.6 KB
  316. 02_network-monitoring-for-active-defense.mp4 6.9 MB
  317. 64 109.1 KB
  318. 04_protocol-decoding-for-active-defense.mp4 6.8 MB
  319. 65 155.0 KB
  320. 05_non-application-layer-protocol.mp4 6.8 MB
  321. 66 202.6 KB
  322. 01_mitre-att-ck-initial-access.mp4 6.6 MB
  323. 67 361.7 KB
  324. 02_introduction-to-credentials-from-password-stores.mp4 6.6 MB
  325. 68 376.2 KB
  326. 04_introduction-to-non-application-layer-protocol.mp4 6.5 MB
  327. 69 484.6 KB
  328. 01_mitre-att-ck-defense-evasion.mp4 6.4 MB
  329. 70 55.7 KB
  330. 01_mitre-att-ck-discovery.mp4 6.3 MB
  331. 71 220.8 KB
  332. 04_introduction-to-scheduled-tasks-and-jobs.mp4 6.3 MB
  333. 72 220.8 KB
  334. 02_pcap-collection-for-active-defense.mp4 6.3 MB
  335. 73 237.4 KB
  336. 01_mitre-att-ck-persistence.mp4 6.2 MB
  337. 74 295.5 KB
  338. 02_introduction-to-boot-or-logon-autostart-execution.mp4 6.2 MB
  339. 75 318.1 KB
  340. 01_mitre-att-ck-execution.mp4 6.1 MB
  341. 76 411.6 KB
  342. 02_introduction-to-remote-services.mp4 6.1 MB
  343. 77 417.8 KB
  344. 01_mitre-att-ck-exfiltration.mp4 6.0 MB
  345. 78 22.2 KB
  346. 02_introduction-to-data-encrypted-for-impact.mp4 6.0 MB
  347. 79 50.0 KB
  348. 01_mitre-att-ck-privilege-escalation.mp4 5.8 MB
  349. 80 165.2 KB
  350. 02_introduction-to-exfiltration-over-alternative-protocols.mp4 5.8 MB
  351. 81 192.5 KB
  352. 04_introduction-to-file-and-directory-discovery.mp4 5.8 MB
  353. 82 213.8 KB
  354. 01_mitre-att-ck-impact.mp4 5.8 MB
  355. 83 252.1 KB
  356. 01_mitre-att-ck-lateral-movement.mp4 5.1 MB
  357. 84 358.6 KB
  358. 01_mitre-att-ck-collection.mp4 5.0 MB
  359. 85 3.3 KB
  360. 01_active-defense-on-the-network.mp4 4.9 MB
  361. 86 128.9 KB
  362. 02_introduction-to-user-execution.mp4 4.8 MB
  363. 87 239.2 KB
  364. 01_monitoring-for-active-defense.mp4 4.4 MB
  365. 88 143.1 KB
  366. 01_introduction-to-python-for-cybersecurity.mp4 3.9 MB

Discussion