Index of /courses/246

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[VID]01._#1_Introduction_To_Cyber_Security_-_SpicalEdition.mp42025-06-24 11:37 59M 
[VID]03._#3_How_to_install_Kali_Linux_N_Virtual_Box_environment.mp42025-06-24 11:37 35M 
[VID]02._#2_Introduction_To_Computer___Cyber_Security.mp42025-06-24 11:37 121M 
[VID]05._#4_Basic_Linux_Commands_-_Part_2___Cyber_Security.mp42025-06-24 11:37 71M 
[VID]04._#4_Basic_Linux_Commands_-_Part_1___Cyber_Security.mp42025-06-24 11:37 95M 
[VID]07._#4_Basic_Linux_Commands_-_Part_4___CyberSecurity.mp42025-06-24 11:37 82M 
[VID]06._#4_Basic_Linux_Commands_-_Part_3___CyberSecurity.mp42025-06-24 11:37 120M 
[VID]08._#4_Basic_Linux_Commands_-_Part_5___CyberSecurity.mp42025-06-24 11:37 70M 
[VID]09._#4_Basic_Linux_Commands_-_Part_6___CyberSecurity.mp42025-06-24 11:37 85M 
[VID]10._#4_Basic_Linux_Commands_-_Part_7___CyberSecurity.mp42025-06-24 11:37 79M 
[VID]12._#6_Encoding___CyberSecurity.mp42025-06-24 11:37 26M 
[VID]11._#5_Hashing___CyberSecurity.mp42025-06-24 11:37 90M 
[VID]13._#7_Encryption___CyberSecurity.mp42025-06-24 11:37 59M 
[VID]14._#8_HTTPS___CyberSecurity.mp42025-06-24 11:37 39M 
[VID]15._#9_Introduction_To_Network_-_Part1___CyberSecurity.mp42025-06-24 11:37 79M 
[VID]16._#9_Introduction_To_Network_(_IPv4_,_ARP_,_NAT_,_MAC_)_-_Part2___CyberSecurity.mp42025-06-24 11:37 77M 
[VID]17._#9_Introduction_To_Network_(_Topolgies_and_OSI_7_Layers_)_-_Part3___CyberSecurity.mp42025-06-24 11:37 78M 
[VID]18._#9_Introduction_To_Network_(_OSI_7_Layers_)_-_Part4___CyberSecurity.mp42025-06-24 11:37 78M 
[VID]19._#9_Introduction_To_Network_(_OSI_,_DNS_,_TCP_and_UDP_)_-_Part5___CyberSecurity.mp42025-06-24 11:37 58M 
[VID]20._#9_Introduction_To_Network_(_Switch_,_HUB_,_Repeater_,_Router_)_-_Part6___CyberSecurity.mp42025-06-24 11:37 46M 
[VID]21._#9_Introduction_To_Network_(_Firewall_,_Access_Point_)_-_Part7___CyberSecurity.mp42025-06-24 11:37 57M 
[VID]22._#9_Introduction_To_Network_(_IPv4_Subnet_Mask)_-_Part8___CyberSecurity.mp42025-06-24 11:37 73M 
[VID]23._#10_VPN_vs_Proxy___CyberSecurity.mp42025-06-24 11:37 83M 
[VID]24._#11_Introduction_To_Information_Gathering_-_Part1___CyberSecurity.mp42025-06-24 11:38 124M 
[VID]25._#11_Introduction_To_Information_Gathering_-_Part2___CyberSecurity.mp42025-06-24 11:38 117M 
[VID]26._#11_Introduction_To_Information_Gathering_-_Part3___CyberSecurity.mp42025-06-24 11:38 93M 
[VID]28._#11_Introduction_To_Information_Gathering_-_Part5___CyberSecurity.mp42025-06-24 11:38 49M 
[VID]27._#11_Introduction_To_Information_Gathering_-_Part4___CyberSecurity.mp42025-06-24 11:38 106M 
[VID]29._#11_Introduction_To_Information_Gathering_-_Part6___CyberSecurity.mp42025-06-24 11:38 72M 
[VID]30._#12_Introduction_To_BurpSuite_-_Part1___CyberSecurity.mp42025-06-24 11:38 82M 
[VID]31._#12_Introduction_To_BurpSuite_-_Part2___CyberSecurity.mp42025-06-24 11:38 64M 
[VID]32._#12_Introduction_To_BurpSuite_-_Part3___CyberSecurity.mp42025-06-24 11:38 98M 
[VID]33._#13_SubList3r____CyberSecurity.mp42025-06-24 11:38 87M 
[VID]34._#14_Subdomain_TakeOver___CyberSecurity.mp42025-06-24 11:38 57M 
[VID]35._#15_HTTP_Methods,Request,Response___CyberSecurity.mp42025-06-24 11:38 76M 
[VID]36._#16_Introduction_To_HTML_-_Part1___CyberSecurity.mp42025-06-24 11:38 76M 
[VID]37._#16_Introduction_To_HTML_-_Part2___CyberSecurity.mp42025-06-24 11:38 58M 
[VID]38._#17_XSS_(_Cross_Site_Script_)_-_Part1___CyberSecurity.mp42025-06-24 11:38 62M 
[VID]40._#17_XSS_(_Cross_Site_Script_)_-_Part3___CyberSecurity.mp42025-06-24 11:38 87M 
[VID]39._#17_XSS_(_Cross_Site_Script_)_-_Part2___CyberSecurity.mp42025-06-24 11:38 107M 
[VID]41._#17_XSS_(_Cross_Site_Script_)_-_Part4___CyberSecurity.mp42025-06-24 11:38 20M 
[VID]42._#18_RCE_(_Remote_Command_Execution_)_-_Part1____CyberSecurity.mp42025-06-24 11:38 23M 
[VID]43._#19_CORS_&_SOP_(_Same-origin_Policy_)____CyberSecurity.mp42025-06-24 11:38 44M 
[VID]44._#20_CSRF_(_Cross_Site_Request_Forgery_)____CyberSecurity.mp42025-06-24 11:38 58M 
[VID]45._#21_LFI_(_Local_File_Inclusion_)____CyberSecurity.mp42025-06-24 11:38 32M 
[VID]47._#22_FU_(_File_Upload_)_-_Part2___CyberSecurity.mp42025-06-24 11:38 14M 
[VID]46._#22_FU_(_File_Upload_)_-_Part1___CyberSecurity.mp42025-06-24 11:38 34M 
[VID]48._#22_FU_(_File_Upload_)_-_Part3___CyberSecurity.mp42025-06-24 11:38 21M 
[VID]49._#23_SQLi_(_SQL_injection_)_-_Part2___CyberSecurity.mp42025-06-24 11:38 72M 
[VID]50._#23_SQLi_(_SQL_injection_#Automated_)_-_Part3___CyberSecurity.mp42025-06-24 11:38 65M 
[VID]52._#24_Metasploit_Attack_Learn_(_Metasploitable_v2)_-_Part_2___CyberSecurity.mp42025-06-24 11:38 50M 
[VID]51._#24_Metasploit_Attack_Learn_(_Metasploitable_v2)_-_Part_1___CyberSecurity.mp42025-06-24 11:38 76M 
[VID]53._#24_Metasploit_Attack_Learn_(_Metasploitable_v2)_-_Part_4___CyberSecurity.mp42025-06-24 11:38 34M 
[VID]55._#27_How_to_hack_WebApps_(CTF_Learn)_Part_1____Cyber_Security.mp42025-06-24 11:38 35M 
[VID]54._#26_CTF_(_Capture_The_Flag_)_Road_Map_For_Beginners___Cyber_Security.mp42025-06-24 11:38 68M 
[VID]56._#27_How_to_hack_WebApps_(CTF_Learn)_Part_2____Cyber_Security.mp42025-06-24 11:38 23M 
[VID]57._#27_How_to_hack_WebApps_(CTF_Learn)_Part_3____Cyber_Security.mp42025-06-24 11:38 19M 
[VID]58._#27_How_to_hack_WebApps_(CTF_Learn)_Part_4____Cyber_Security.mp42025-06-24 11:38 23M 
[VID]59._#28_How_to_solve_Digital_Forensics_challenges_(CTF_Learn)_Part_1____Cybersecurity.mp42025-06-24 11:38 29M 
[VID]61._#28_How_to_solve_Digital_Forensics_challenges_(CTF_Learn)_Part_3____Cybersecurity.mp42025-06-24 11:38 30M 
[VID]60._#28_How_to_solve_Digital_Forensics_challenges_(CTF_Learn)_Part_2____Cybersecurity.mp42025-06-24 11:38 37M 
[VID]62._#28_How_to_solve_Digital_Forensics_challenges_(CTF_Learn)_Part_4____Cybersecurity.mp42025-06-24 11:38 54M 
[VID]63._#28_How_to_solve_Digital_Forensics_challenges_(CTF_Learn)_Part_5____Cybersecurity.mp42025-06-24 11:38 67M 
[VID]65._#29_How_to_solve_Cryptography_challenges_(CTF_Learn)_Part_1____Cyber_security.mp42025-06-24 11:38 34M 
[VID]64._#28_How_to_solve_Digital_Forensics_challenges_(CTF_Learn)_Part_6____Cybersecurity.mp42025-06-24 11:38 94M 
[VID]66._#29_How_to_solve_Cryptography_challenges_(CTF_Learn)_Part_2____Cyber_security.mp42025-06-24 11:38 51M 
[VID]67._#29_How_to_solve_Cryptography_challenges_(CTF_Learn)_Part_3____Cyber_security.mp42025-06-24 11:38 54M 
[VID]68._Remote_Code_Execution_via_web_shell_upload___AWAPT___Portswigger_Lab___Cyber_Security.mp42025-06-24 11:38 45M 
[VID]69._Web_shell_upload_via_Content-Type_bypass_and_path_traversal__AWAPT__Portswigger_Lab___Cyber_Security.mp42025-06-24 11:38 40M 
[VID]70._Web_shell_upload_via_extension_blacklist_bypass___AWAPT___Portswigger_Lab___Cyber_Security.mp42025-06-24 11:38 22M 
[VID]71._Web_shell_upload_via_obfuscated_file_extension___AWAPT___Portswigger_Lab___Cyber_Security.mp42025-06-24 11:38 27M 
[VID]72._Remote_code_execution_via_polyglot_web_shell_upload___AWAPT___Portswigger_Lab___Cyber_Security.mp42025-06-24 11:38 30M 
[VID]73._Web_shell_upload_via_race_condition___AWAPT___Portswigger_Lab___Cyber_Security.mp42025-06-24 11:38 38M 
[VID]74._Authentication_bypass_via_OAuth_implicit_flow___AWAPT___Portswigger_Lab___Cyber_Security.mp42025-06-24 11:38 33M 
[VID]75._Forced_OAuth_profile_linking___AWAPT___Portswigger_Lab___Cyber_Security.mp42025-06-24 11:38 32M 
[VID]76._The_End_-_النهاية_❤.mp42025-06-24 11:38 24M 

Apache/2.4.62 (Debian) Server at files.wikicourses.net Port 80