[FreeCoursesOnline.Us] ethical-hacking-social-engineering
大小
794.24 MB
文件数
124
Info Hash:
20BDF537CB625AEDE9725A215A73712B2E405B69
收录时间
2025-12-14 13:46:36
更新时间
2025-12-14 13:46:36
文件列表 (124)
00.Humans-The-Soft-Center-Within-the-Hard-Shell/00.Overview.mp4
4.71 MB
00.Humans-The-Soft-Center-Within-the-Hard-Shell/00.Overview.mp4.srt
4.36 KB
00.Humans-The-Soft-Center-Within-the-Hard-Shell/01.Social-Engineering-Through-the-Ages.mp4
27.2 MB
00.Humans-The-Soft-Center-Within-the-Hard-Shell/01.Social-Engineering-Through-the-Ages.mp4.srt
3.5 KB
00.Humans-The-Soft-Center-Within-the-Hard-Shell/02.The-Soft-Center-That-Social-Engineering-Exploits.mp4
12.12 MB
00.Humans-The-Soft-Center-Within-the-Hard-Shell/02.The-Soft-Center-That-Social-Engineering-Exploits.mp4.srt
7.43 KB
00.Humans-The-Soft-Center-Within-the-Hard-Shell/03.Human-Weaknesses-That-Enable-Social-Engineering.mp4
24.7 MB
00.Humans-The-Soft-Center-Within-the-Hard-Shell/03.Human-Weaknesses-That-Enable-Social-Engineering.mp4.srt
17.36 KB
00.Humans-The-Soft-Center-Within-the-Hard-Shell/04.Computer-based-Versus-Human-based-Social-Engineering.mp4
4.79 MB
00.Humans-The-Soft-Center-Within-the-Hard-Shell/04.Computer-based-Versus-Human-based-Social-Engineering.mp4.srt
5.98 KB
00.Humans-The-Soft-Center-Within-the-Hard-Shell/05.Social-Engineering-at-Home-and-in-Popular-Culture.mp4
15.9 MB
00.Humans-The-Soft-Center-Within-the-Hard-Shell/05.Social-Engineering-at-Home-and-in-Popular-Culture.mp4.srt
6.14 KB
00.Humans-The-Soft-Center-Within-the-Hard-Shell/06.Summary.mp4
2.69 MB
00.Humans-The-Soft-Center-Within-the-Hard-Shell/06.Summary.mp4.srt
2.57 KB
00.Humans-The-Soft-Center-Within-the-Hard-Shell/clips-info.json
1.89 KB
00.Humans-The-Soft-Center-Within-the-Hard-Shell/module-info.json
343 B
01.A-Walkthrough-of-a-Social-Engineering-Attack/00.Overview.mp4
2.77 MB
01.A-Walkthrough-of-a-Social-Engineering-Attack/00.Overview.mp4.srt
2.35 KB
01.A-Walkthrough-of-a-Social-Engineering-Attack/01.Case-Study-Cold-Call-Virus-Scams.mp4
14.66 MB
01.A-Walkthrough-of-a-Social-Engineering-Attack/01.Case-Study-Cold-Call-Virus-Scams.mp4.srt
5.75 KB
01.A-Walkthrough-of-a-Social-Engineering-Attack/02.Establishing-Authority-and-Creating-Fear.mp4
10.02 MB
01.A-Walkthrough-of-a-Social-Engineering-Attack/02.Establishing-Authority-and-Creating-Fear.mp4.srt
4.92 KB
01.A-Walkthrough-of-a-Social-Engineering-Attack/03.Executing-the-Social-Engineering-Attack.mp4
20.72 MB
01.A-Walkthrough-of-a-Social-Engineering-Attack/03.Executing-the-Social-Engineering-Attack.mp4.srt
9.84 KB
01.A-Walkthrough-of-a-Social-Engineering-Attack/04.Demonstrating-Authenticity.mp4
31.73 MB
01.A-Walkthrough-of-a-Social-Engineering-Attack/04.Demonstrating-Authenticity.mp4.srt
17.74 KB
01.A-Walkthrough-of-a-Social-Engineering-Attack/05.Creating-a-Debt.mp4
27.2 MB
01.A-Walkthrough-of-a-Social-Engineering-Attack/05.Creating-a-Debt.mp4.srt
21.93 KB
01.A-Walkthrough-of-a-Social-Engineering-Attack/06.Monetizing-the-Scam.mp4
33.51 MB
01.A-Walkthrough-of-a-Social-Engineering-Attack/06.Monetizing-the-Scam.mp4.srt
16.94 KB
01.A-Walkthrough-of-a-Social-Engineering-Attack/07.Summary.mp4
4.89 MB
01.A-Walkthrough-of-a-Social-Engineering-Attack/07.Summary.mp4.srt
4.07 KB
01.A-Walkthrough-of-a-Social-Engineering-Attack/clips-info.json
2.07 KB
01.A-Walkthrough-of-a-Social-Engineering-Attack/module-info.json
341 B
02.Reconnaissance-and-OSINT/00.Overview.mp4
4.25 MB
02.Reconnaissance-and-OSINT/00.Overview.mp4.srt
3.8 KB
02.Reconnaissance-and-OSINT/01.Understanding-OSINT.mp4
56.03 MB
02.Reconnaissance-and-OSINT/01.Understanding-OSINT.mp4.srt
11.1 KB
02.Reconnaissance-and-OSINT/02.Organizational-Reconnaissance.mp4
8.05 MB
02.Reconnaissance-and-OSINT/02.Organizational-Reconnaissance.mp4.srt
6.41 KB
02.Reconnaissance-and-OSINT/03.Identifying-Targets-Within-an-Organization.mp4
22.92 MB
02.Reconnaissance-and-OSINT/03.Identifying-Targets-Within-an-Organization.mp4.srt
8.56 KB
02.Reconnaissance-and-OSINT/04.Identity-Reconnaissance-with-PiPL.mp4
6.52 MB
02.Reconnaissance-and-OSINT/04.Identity-Reconnaissance-with-PiPL.mp4.srt
3.69 KB
02.Reconnaissance-and-OSINT/05.Shoulder-Surfing-Eavesdropping-and-Tailgating.mp4
21.67 MB
02.Reconnaissance-and-OSINT/05.Shoulder-Surfing-Eavesdropping-and-Tailgating.mp4.srt
11.57 KB
02.Reconnaissance-and-OSINT/06.Dumpster-Diving-and-Mail-Theft.mp4
7.62 MB
02.Reconnaissance-and-OSINT/06.Dumpster-Diving-and-Mail-Theft.mp4.srt
4 KB
02.Reconnaissance-and-OSINT/07.Data-Breaches.mp4
6.42 MB
02.Reconnaissance-and-OSINT/07.Data-Breaches.mp4.srt
5.94 KB
02.Reconnaissance-and-OSINT/08.Summary.mp4
2.72 MB
02.Reconnaissance-and-OSINT/08.Summary.mp4.srt
2.91 KB
02.Reconnaissance-and-OSINT/clips-info.json
2.34 KB
02.Reconnaissance-and-OSINT/module-info.json
301 B
03.Phishing-Attacks/00.Overview.mp4
4.72 MB
03.Phishing-Attacks/00.Overview.mp4.srt
4.11 KB
03.Phishing-Attacks/01.Teach-a-Man-to-Phish-and-Hell-Eat-for-a-Lifetime.mp4
21.55 MB
03.Phishing-Attacks/01.Teach-a-Man-to-Phish-and-Hell-Eat-for-a-Lifetime.mp4.srt
12.64 KB
03.Phishing-Attacks/02.Call-Signs-of-a-Phishing-Email.mp4
18.55 MB
03.Phishing-Attacks/02.Call-Signs-of-a-Phishing-Email.mp4.srt
12.34 KB
03.Phishing-Attacks/03.Call-Signs-of-a-Phishing-Page.mp4
14.43 MB
03.Phishing-Attacks/03.Call-Signs-of-a-Phishing-Page.mp4.srt
9 KB
03.Phishing-Attacks/04.Understanding-Spearphishing.mp4
7.04 MB
03.Phishing-Attacks/04.Understanding-Spearphishing.mp4.srt
4.31 KB
03.Phishing-Attacks/05.Enumeration-as-a-Verification-Vector.mp4
7.35 MB
03.Phishing-Attacks/05.Enumeration-as-a-Verification-Vector.mp4.srt
5.64 KB
03.Phishing-Attacks/06.Filter-Evasion-and-Concealment-Techniques.mp4
23.27 MB
03.Phishing-Attacks/06.Filter-Evasion-and-Concealment-Techniques.mp4.srt
12.46 KB
03.Phishing-Attacks/07.Identifying-Attacks-with-PhishTank.mp4
7.97 MB
03.Phishing-Attacks/07.Identifying-Attacks-with-PhishTank.mp4.srt
3.24 KB
03.Phishing-Attacks/08.Phishing-with-BeEF.mp4
32.28 MB
03.Phishing-Attacks/08.Phishing-with-BeEF.mp4.srt
14.26 KB
03.Phishing-Attacks/09.Mounting-Your-Own-Ethical-Phishing-Attack-with-Phish5.mp4
21.26 MB
03.Phishing-Attacks/09.Mounting-Your-Own-Ethical-Phishing-Attack-with-Phish5.mp4.srt
13.61 KB
03.Phishing-Attacks/10.Summary.mp4
3.17 MB
03.Phishing-Attacks/10.Summary.mp4.srt
2.62 KB
03.Phishing-Attacks/clips-info.json
2.92 KB
03.Phishing-Attacks/module-info.json
285 B
04.Identity-Theft-and-Impersonation/00.Overview.mp4
5.15 MB
04.Identity-Theft-and-Impersonation/00.Overview.mp4.srt
4.68 KB
04.Identity-Theft-and-Impersonation/01.The-Impact-of-Identity-Theft.mp4
5.47 MB
04.Identity-Theft-and-Impersonation/01.The-Impact-of-Identity-Theft.mp4.srt
5.76 KB
04.Identity-Theft-and-Impersonation/02.Identities-for-Sale.mp4
20.52 MB
04.Identity-Theft-and-Impersonation/02.Identities-for-Sale.mp4.srt
8.29 KB
04.Identity-Theft-and-Impersonation/03.The-Mechanics-of-an-Identify-Theft-Attack.mp4
19.32 MB
04.Identity-Theft-and-Impersonation/03.The-Mechanics-of-an-Identify-Theft-Attack.mp4.srt
16.79 KB
04.Identity-Theft-and-Impersonation/04.In-person-Human-based-Identity-Theft.mp4
11.84 MB
04.Identity-Theft-and-Impersonation/04.In-person-Human-based-Identity-Theft.mp4.srt
7.16 KB
04.Identity-Theft-and-Impersonation/05.Impersonation.mp4
23.49 MB
04.Identity-Theft-and-Impersonation/05.Impersonation.mp4.srt
14.63 KB
04.Identity-Theft-and-Impersonation/06.Social-Engineering-and-Impersonation-by-Example.mp4
23.01 MB
04.Identity-Theft-and-Impersonation/06.Social-Engineering-and-Impersonation-by-Example.mp4.srt
12.42 KB
04.Identity-Theft-and-Impersonation/07.Summary.mp4
3.96 MB
04.Identity-Theft-and-Impersonation/07.Summary.mp4.srt
3.44 KB
04.Identity-Theft-and-Impersonation/clips-info.json
2.08 KB
04.Identity-Theft-and-Impersonation/module-info.json
317 B
05.Social-Engineering-Countermeasures/00.Overview.mp4
3.34 MB
05.Social-Engineering-Countermeasures/00.Overview.mp4.srt
3.01 KB
05.Social-Engineering-Countermeasures/01.Defenses-in-the-Browser-and-Email-Clients.mp4
12.13 MB
05.Social-Engineering-Countermeasures/01.Defenses-in-the-Browser-and-Email-Clients.mp4.srt
11.91 KB
05.Social-Engineering-Countermeasures/02.Record-Destruction.mp4
46.33 MB
05.Social-Engineering-Countermeasures/02.Record-Destruction.mp4.srt
12.37 KB
05.Social-Engineering-Countermeasures/03.Physical-Security.mp4
19.8 MB
05.Social-Engineering-Countermeasures/03.Physical-Security.mp4.srt
7.28 KB
05.Social-Engineering-Countermeasures/04.Separation-of-Duties-and-the-Principle-of-Least-Privilege.mp4
15.06 MB
05.Social-Engineering-Countermeasures/04.Separation-of-Duties-and-the-Principle-of-Least-Privilege.mp4.srt
15.04 KB
05.Social-Engineering-Countermeasures/05.Multi-Step-and-Side-Channel-Identity-Verification.mp4
21.82 MB
05.Social-Engineering-Countermeasures/05.Multi-Step-and-Side-Channel-Identity-Verification.mp4.srt
15.85 KB
05.Social-Engineering-Countermeasures/06.Logging-Auditing-and-Monitoring.mp4
7.57 MB
05.Social-Engineering-Countermeasures/06.Logging-Auditing-and-Monitoring.mp4.srt
6.86 KB
05.Social-Engineering-Countermeasures/07.Identity-Monitoring.mp4
5.66 MB
05.Social-Engineering-Countermeasures/07.Identity-Monitoring.mp4.srt
5.75 KB
05.Social-Engineering-Countermeasures/08.Conditioning-the-Humans.mp4
9.32 MB
05.Social-Engineering-Countermeasures/08.Conditioning-the-Humans.mp4.srt
5.44 KB
05.Social-Engineering-Countermeasures/09.Summary.mp4
4.3 MB
05.Social-Engineering-Countermeasures/09.Summary.mp4.srt
4.09 KB
05.Social-Engineering-Countermeasures/clips-info.json
2.62 KB
05.Social-Engineering-Countermeasures/module-info.json
321 B
[FreeCoursesOnline.Us].txt
138 B
[FreeCoursesOnline.Us].url
123 B
[FreeTutorials.Us].txt
75 B
[FreeTutorials.Us].url
119 B