Showing 1-20 of 3,114 items.

mp4 [FreeTutorials.us] hacking-securing-php

Hot:4  Size:449.16 MB  Created:2019-07-25 10:28:05  File Count:67

01 InjectionA1 - OWASP Top10/006 SQL Injection Union - Demo - Exploitation.mp4  28.79 MB
16 Cross-Site Request Forgery CSRF - A8 - OWASP Top10/055 Cross-Site Request Forgery CSRF - OWASP Top10 - A8 - Presentation.mp4  17.66 MB
01 InjectionA1 - OWASP Top10/009 SQL Injection - Demo - Defense.mp4  17.55 MB
05 InjectionA1 - PHP Object Injection/020 PHP Object Injection Demo 1.mp4  15.62 MB
01 InjectionA1 - OWASP Top10/003 SQLI.mp4  14.99 MB

mp4 [FreeTutorials.us] hacking-securing-php

Hot:542  Size:449.16 MB  Created:2017-08-26 17:06:39  File Count:69

01 InjectionA1 - OWASP Top10/001 Injection - OWASP Top10 A1 - Presentation.mp4  4.9 MB
01 InjectionA1 - OWASP Top10/002 Blind SQL Injection Presentation.mp4  14.14 MB
01 InjectionA1 - OWASP Top10/003 SQLI.mp4  14.99 MB
01 InjectionA1 - OWASP Top10/004 Time based SQLI.mp4  7.02 MB
01 InjectionA1 - OWASP Top10/005 Union Exploitation Technique.mp4  14.09 MB

mp4 Securing Generative AI

Hot:1  Size:845.7 MB  Created:2024-10-22 15:07:41  File Count:34

Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/006. 3.5 Securing Amazon BedRock, SageMaker, Microsoft Azure AI Services, and Other Environments.mp4  67.84 MB
Lesson 1 Introduction to AI Threats and LLM Security/001. Learning objectives.mp4  8.44 MB
Lesson 1 Introduction to AI Threats and LLM Security/002. 1.1 Understanding the Significance of LLMs in the AI Landscape.mp4  48.75 MB
Lesson 1 Introduction to AI Threats and LLM Security/003. 1.2 Exploring the Resources for this Course - GitHub Repositories and Others.mp4  10.69 MB
Lesson 1 Introduction to AI Threats and LLM Security/004. 1.3 Introducing Retrieval Augmented Generation (RAG).mp4  33.99 MB

mp4 TutsPlus - Securing an AngularJS Application

Hot:315  Size:970.61 MB  Created:2017-09-01 05:58:46  File Count:10

01. Introduction/0101_Introduction.mp4  7.47 MB
02. Getting Started/0201_What You Need.mp4  102.44 MB
02. Getting Started/0202_Introducing Soundboard.mp4  170.89 MB
03. Thinking Differently/0301_Persisting Data in the Client.mp4  95.32 MB
03. Thinking Differently/0302_User Authentication With Bearer Tokens.mp4  137.13 MB

mp4 Lynda - Securing Windows 10

Hot:80  Size:218.24 MB  Created:2017-09-13 13:10:29  File Count:31

0. Introduction/441834_01_01_WX30_Intro.mp4  2.59 MB
0. Introduction/441834_01_02_XR30_ShouldKnow.mp4  803.64 KB
1. Authentication and Accounts/441834_02_04_XR15_DomainAccount.mp4  5.24 MB
1. Authentication and Accounts/441834_02_02_XR15_LocalUser.mp4  3.95 MB
1. Authentication and Accounts/441834_02_01_XR30_Authentication.mp4  3.2 MB

mp4 Pluralsight - Ethical Hacking System Hacking

Hot:232  Size:736.97 MB  Created:2017-09-06 23:02:41  File Count:49

03 More Cracking/03 06 DEMO - Cain & Abel _ John the Ripper.mp4  89.68 MB
04 Phase 2 - Gaining Access - Escalating Privileges/04 03 Types of Escalation.mp4  44.32 MB
06 Phase 4 - Maintaining Access - Hiding Your Tools/06 03 Alternate Data Streams.mp4  39.8 MB
02 Phase 1 - Gaining Access - Cracking Passwords/02 04 The Architecture.mp4  38.55 MB
05 Phase 3 - Maintaining Access - Executing Applications/05 03 Spyware & Backdoors.mp4  35.83 MB

mp4 Ethical Hacking Hacking Wireless Networks

Hot:494  Size:445.56 MB  Created:2017-08-27 05:02:50  File Count:43

04 The Methodology of Hacking Wireless/20160503170212.mp4  169.71 MB
01 Insights into Wireless/20160503170204_2.mp4  18.81 MB
01 Insights into Wireless/20160503170204_3.mp4  8.59 MB
01 Insights into Wireless/20160503170204_4.mp4  3.98 MB
01 Insights into Wireless/20160503170205.mp4  13.53 MB

mp4 Pluralsight - Ethical Hacking - System Hacking

Hot:253  Size:736.97 MB  Created:2017-08-31 09:31:32  File Count:49

01 Understanding This Stage/01 01 Understanding This Stage.mp4  7.79 MB
01 Understanding This Stage/01 02 Now, How Exactly Did We Get Here.mp4  8.42 MB
01 Understanding This Stage/01 03 What Are Our Goals.mp4  5.1 MB
01 Understanding This Stage/01 04 The Three Goals and Five Phases.mp4  10.2 MB
01 Understanding This Stage/01 05 Summary.mp4  2.54 MB

mp4 Ethical_Hacking_-_System_Hacking

Hot:414  Size:209.37 MB  Created:2017-09-04 00:40:07  File Count:31

1_Introduction/01_Welcome.mp4  7.25 MB
1_Introduction/02_What_you_should_know.mp4  2.22 MB
1_Introduction/03_Hacking_ethically.mp4  2.46 MB
2_1._System_Hacking_Overview/04_Setting_the_stage.mp4  5.42 MB
2_1._System_Hacking_Overview/05_Hacking_goals.mp4  4.21 MB

mp4 Ethical Hacking Understanding Ethical Hacking

Hot:718  Size:772.53 MB  Created:2017-09-02 18:16:08  File Count:83

01. The Truth About Living in a Technology Based World/01 - Introduction.mp4  6.7 MB
01. The Truth About Living in a Technology Based World/02 - How Protected Do You Feel.mp4  25.79 MB
02. Overview of the CEH Certification Program/01 - Overview of the CEH Certification Program.mp4  2.77 MB
02. Overview of the CEH Certification Program/02 - What Certification Brings You.mp4  2.25 MB
02. Overview of the CEH Certification Program/03 - Should I Watch This Series.mp4  7.7 MB

mp4 Pluralsight - Ethical Hacking - System Hacking

Hot:12  Size:736.97 MB  Created:2022-08-15 00:36:51  File Count:49

01 Understanding This Stage/01 01 Understanding This Stage.mp4  7.79 MB
01 Understanding This Stage/01 02 Now, How Exactly Did We Get Here.mp4  8.42 MB
01 Understanding This Stage/01 03 What Are Our Goals.mp4  5.1 MB
01 Understanding This Stage/01 04 The Three Goals and Five Phases.mp4  10.2 MB
01 Understanding This Stage/01 05 Summary.mp4  2.54 MB

mp4 Ethical Hacking Hacking Wireless Networks

Hot:3  Size:445.56 MB  Created:2022-09-09 11:27:01  File Count:43

04 The Methodology of Hacking Wireless/20160503170212.mp4  169.71 MB
01 Insights into Wireless/20160503170204_2.mp4  18.81 MB
01 Insights into Wireless/20160503170204_3.mp4  8.59 MB
01 Insights into Wireless/20160503170204_4.mp4  3.98 MB
01 Insights into Wireless/20160503170205.mp4  13.53 MB

mp4 Securing_SQL_Server_2012

Hot:74  Size:278.04 MB  Created:2017-09-12 17:00:11  File Count:21

1_Introduction/Welcome.mp4  5.91 MB
1_Introduction/What_you_should_know_before_watching_this_course.mp4  1.04 MB
2_1._Security_Best_Practices_for_SQL_Server/File_system_security.mp4  12.83 MB
2_1._Security_Best_Practices_for_SQL_Server/Network_security_considerations.mp4  16.63 MB
2_1._Security_Best_Practices_for_SQL_Server/Physical_security.mp4  5.14 MB

mp4 Lynda – Securing Microsoft Office Files

Hot:102  Size:142.65 MB  Created:2017-09-19 06:29:46  File Count:49

01_03-parts.mp4  8.32 MB
02_03-activex.mp4  8.15 MB
01_07-ranges.mp4  8.13 MB
02_04-external.mp4  7.59 MB
04_01-process.mp4  7.33 MB

mp4 Lynda - Securing SQL Server 2012

Hot:163  Size:255.38 MB  Created:2017-08-28 03:02:34  File Count:21

0. Introduction/1.Welcome.mp4  9.01 MB
0. Introduction/2.What you should know before watching this course.mp4  776.03 KB
1. Security Best Practices for SQL Server/1.Physical security.mp4  3.9 MB
1. Security Best Practices for SQL Server/2.SQL instance security.mp4  10.73 MB
1. Security Best Practices for SQL Server/3.Network security considerations.mp4  15.36 MB

mp4 Lynda - Securing Microsoft Office Files

Hot:118  Size:142.55 MB  Created:2017-08-26 20:24:35  File Count:34

00. Introduction/01. Welcome.mp4  6.12 MB
00. Introduction/02. Using the exercise files.mp4  1.18 MB
00. Introduction/01. Welcome.srt  1.34 KB
00. Introduction/02. Using the exercise files.srt  836 B
01. Securing Files and File Elements Using Passwords/03. Restricting how a user can edit a Word file.mp4  8.32 MB

mp4 Infinite Skills - Securing Cloud Services

Hot:565  Size:783.57 MB  Created:2017-08-29 15:12:36  File Count:52

01. Introduction To Cloud Services/0101 Introduction And About The Author.MP4  7.91 MB
01. Introduction To Cloud Services/0102 Service Models.MP4  18.12 MB
01. Introduction To Cloud Services/0103 Service And Deployment Models.MP4  11.92 MB
01. Introduction To Cloud Services/0104 Deployment Models Summary.MP4  10.47 MB
01. Introduction To Cloud Services/0105 Deployment Models And Benefits.MP4  22.62 MB

mp4 Lynda - Securing Your Mobile Device

Hot:606  Size:218.77 MB  Created:2017-09-07 04:20:16  File Count:29

001 Welcome.mp4  18.59 MB
002 What you should know.mp4  2.16 MB
003 Risks of technology.mp4  7.63 MB
004 Risks of mobile devices.mp4  8.12 MB
005 Acquire a device securely.mp4  7.23 MB