:Search:

Coursera Python for Cybersecurity Specialization 5 course ser

Torrent:
Info Hash: 1C7D77A44A6FEE4BACEAF1BD7278A0EA9FC4DC51
Similar Posts:
Uploader: SunRiseZone
Source: 1 Logo 1337x
Downloads: 3608
Type: Tutorials
Images:
Coursera Python for Cybersecurity Specialization 5 course ser
Language: English
Category: Other
Size: 1.1 GB
Added: April 30, 2024, 7:50 p.m.
Peers: Seeders: 26, Leechers: 6 (Last updated: 11 months, 1 week ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://open.stealth.si:80/announce 7 2 2244
udp://exodus.desync.com:6969/announce 0 0 0
udp://tracker.cyberia.is:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.opentrackr.org:1337/announce 11 1 1184
udp://tracker.torrent.eu.org:451/announce 6 1 164
udp://explodie.org:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.birkenwald.de:6969/announce 0 1 0
udp://tracker.moeking.me:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://ipv4.tracker.harry.lu:80/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.tiny-vps.com:6969/announce 2 0 16
udp://tracker.rarbg.torrentbay.st:6969/announce 0 1 0
Files:
  1. 0. Join Our Discord for More Awesome Stuff!.txt 156 bytes
  2. 01_04_python-for-cybersecurity-resources_instructions.html 1.0 KB
  3. 01_01_introduction-to-python-for-cybersecurity.en.txt 1.8 KB
  4. 01_01_monitoring-for-active-defense.en.txt 2.0 KB
  5. 01_01_active-defense-on-the-network.en.txt 2.1 KB
  6. 01_01_mitre-att-ck-lateral-movement.en.txt 2.2 KB
  7. 01_02_introduction-to-user-execution.en.txt 2.3 KB
  8. 01_01_mitre-att-ck-collection.en.txt 2.3 KB
  9. 01_02_introduction-to-exfiltration-over-alternative-protocols.en.txt 2.4 KB
  10. 01_01_mitre-att-ck-defense-evasion.en.txt 2.4 KB
  11. 01_01_mitre-att-ck-privilege-escalation.en.txt 2.5 KB
  12. 01_02_introduction-to-boot-or-logon-autostart-execution.en.txt 2.6 KB
  13. 01_01_mitre-att-ck-impact.en.txt 2.6 KB
  14. 01_02_introduction-to-remote-services.en.txt 2.7 KB
  15. 01_02_introduction-to-data-encrypted-for-impact.en.txt 2.7 KB
  16. 01_01_mitre-att-ck-exfiltration.en.txt 2.7 KB
  17. 01_01_mitre-att-ck-persistence.en.txt 2.7 KB
  18. 01_01_mitre-att-ck-execution.en.txt 2.7 KB
  19. 01_04_introduction-to-file-and-directory-discovery.en.txt 2.8 KB
  20. 01_01_introduction-to-python-for-cybersecurity.en.srt 2.8 KB
  21. 01_01_mitre-att-ck-discovery.en.txt 2.9 KB
  22. 01_02_network-monitoring-for-active-defense.en.txt 2.9 KB
  23. 01_02_pcap-collection-for-active-defense.en.txt 3.0 KB
  24. 01_01_mitre-att-ck-initial-access.en.txt 3.0 KB
  25. 01_04_protocol-decoding-for-active-defense.en.txt 3.1 KB
  26. 01_06_burn-in-for-active-defense.en.txt 3.1 KB
  27. 01_01_mitre-att-ck-command-and-control.en.txt 3.1 KB
  28. 01_02_introduction-to-credentials-from-password-stores.en.txt 3.2 KB
  29. 01_04_introduction-to-scheduled-tasks-and-jobs.en.txt 3.2 KB
  30. 01_04_introduction-to-hijack-execution-flow.en.txt 3.2 KB
  31. 01_02_introduction-to-boot-or-logon-autostart-execution.en.txt 3.2 KB
  32. 01_04_introduction-to-non-application-layer-protocol.en.txt 3.2 KB
  33. 01_01_monitoring-for-active-defense.en.srt 3.3 KB
  34. 01_01_mitre-att-ck-credential-access.en.txt 3.3 KB
  35. 01_05_introduction-to-open-technical-databases.en.txt 3.4 KB
  36. 01_05_python-for-cybersecurity_quiz.html 3.4 KB
  37. 01_05_non-application-layer-protocol.en.txt 3.4 KB
  38. 01_01_introduction-to-decoys.en.txt 3.5 KB
  39. 01_01_mitre-att-ck-lateral-movement.en.srt 3.5 KB
  40. 01_04_decoy-content-for-active-defense.en.txt 3.6 KB
  41. 01_04_introduction-to-account-access-removal.en.txt 3.6 KB
  42. 01_05_local-email-collection.en.txt 3.6 KB
  43. 01_02_introduction-to-impair-defenses.en.txt 3.6 KB
  44. 01_04_introduction-to-network-sniffing.en.txt 3.6 KB
  45. 01_02_introduction-to-encrypted-channels.en.txt 3.6 KB
  46. 01_02_decoy-processes-for-active-defense.en.txt 3.7 KB
  47. 01_02_introduction-to-account-discovery.en.txt 3.7 KB
  48. 01_01_mitre-att-ck-collection.en.srt 3.7 KB
  49. 01_04_system-activity-monitoring-for-active-defense.en.txt 3.7 KB
  50. 01_02_introduction-to-network-scanning.en.txt 3.7 KB
  51. 01_02_introduction-to-valid-accounts.en.txt 3.8 KB
  52. 01_04_introduction-to-email-collection.en.txt 3.8 KB
  53. 01_04_introduction-to-replication-through-removable-media.en.txt 3.9 KB
  54. 01_01_active-defense-on-the-network.en.srt 3.9 KB
  55. 01_07_python-for-pre-att-ck_quiz.html 3.9 KB
  56. 01_01_mitre-pre-att-ck.en.txt 3.9 KB
  57. 01_02_introduction-to-clipboard-data.en.txt 3.9 KB
  58. 01_06_python-for-discovery_quiz.html 4.0 KB
  59. 01_06_python-for-exfiltration_quiz.html 4.0 KB
  60. 01_06_decoy-credentials-for-active-defense.en.txt 4.0 KB
  61. 01_04_introduction-to-use-alternative-authentication-material.en.txt 4.0 KB
  62. 01_04_introduction-to-protocol-tunneling.en.txt 4.0 KB
  63. 01_06_python-for-persistence_quiz.html 4.1 KB
  64. 01_06_python-for-credential-access_quiz.html 4.1 KB
  65. 01_04_introduction-to-hide-artifacts.en.txt 4.1 KB
  66. 01_01_mitre-att-ck-impact.en.srt 4.1 KB
  67. 01_05_decoy-content.en.txt 4.1 KB
  68. 01_06_python-for-execution_quiz.html 4.1 KB
  69. 01_06_behavioral-analytics-for-active-defense.en.txt 4.2 KB
  70. 01_02_introduction-to-user-execution.en.srt 4.2 KB
  71. 01_01_mitre-att-ck-exfiltration.en.srt 4.2 KB
  72. 01_08_network_quiz.html 4.2 KB
  73. 01_02_introduction-to-python.en.txt 4.3 KB
  74. 01_06_python-for-defense-evasion_exam.html 4.3 KB
  75. 01_06_python-for-initial-access_exam.html 4.3 KB
  76. 01_04_introduction-to-file-and-directory-discovery.en.srt 4.4 KB
  77. 01_02_introduction-to-exfiltration-over-alternative-protocols.en.srt 4.4 KB
  78. 01_04_introduction-to-process-injection.en.txt 4.5 KB
  79. 01_01_mitre-att-ck-discovery.en.srt 4.5 KB
  80. 01_01_mitre-att-ck-defense-evasion.en.srt 4.5 KB
  81. 01_08_monitoring_exam.html 4.5 KB
  82. 01_06_python-for-impact_exam.html 4.5 KB
  83. 01_06_python-for-command-and-control_quiz.html 4.6 KB
  84. 01_06_python-for-collection_exam.html 4.6 KB
  85. 01_06_python-for-lateral-movement_quiz.html 4.7 KB
  86. 01_01_mitre-att-ck-privilege-escalation.en.srt 4.8 KB
  87. 01_02_introduction-to-boot-or-logon-autostart-execution.en.srt 4.8 KB
  88. 01_06_python-for-privilege-escalation_quiz.html 4.9 KB
  89. 01_08_decoys_quiz.html 4.9 KB
  90. 01_04_introduction-to-non-application-layer-protocol.en.srt 5.0 KB
  91. 01_02_introduction-to-remote-services.en.srt 5.0 KB
  92. 01_01_mitre-att-ck-persistence.en.srt 5.0 KB
  93. 01_01_mitre-att-ck-execution.en.srt 5.1 KB
  94. 01_02_introduction-to-data-encrypted-for-impact.en.srt 5.1 KB
  95. 01_01_mitre-att-ck-credential-access.en.srt 5.2 KB
  96. 01_03_smb-windows-admin-shares.en.txt 5.3 KB
  97. 01_02_network-monitoring-for-active-defense.en.srt 5.5 KB
  98. 01_04_decoy-content-for-active-defense.en.srt 5.5 KB
  99. 01_01_mitre-att-ck-initial-access.en.srt 5.6 KB
  100. 01_02_pcap-collection-for-active-defense.en.srt 5.6 KB
  101. 01_04_protocol-decoding-for-active-defense.en.srt 5.8 KB
  102. 01_01_mitre-att-ck-command-and-control.en.srt 5.8 KB
  103. 01_06_burn-in-for-active-defense.en.srt 5.9 KB
  104. 01_04_system-activity-monitoring-for-active-defense.en.srt 5.9 KB
  105. 01_02_introduction-to-credentials-from-password-stores.en.srt 5.9 KB
  106. 01_02_introduction-to-boot-or-logon-autostart-execution.en.srt 6.0 KB
  107. 01_04_introduction-to-hijack-execution-flow.en.srt 6.0 KB
  108. 01_04_introduction-to-scheduled-tasks-and-jobs.en.srt 6.0 KB
  109. 01_03_introduction-to-scapy.en.txt 6.2 KB
  110. 01_03_clipboard-data.en.txt 6.2 KB
  111. 01_02_introduction-to-clipboard-data.en.srt 6.3 KB
  112. 01_04_introduction-to-use-alternative-authentication-material.en.srt 6.3 KB
  113. 01_04_introduction-to-protocol-tunneling.en.srt 6.3 KB
  114. 01_05_web-session-cookie.en.txt 6.4 KB
  115. 01_05_introduction-to-open-technical-databases.en.srt 6.4 KB
  116. 01_06_decoy-credentials-for-active-defense.en.srt 6.4 KB
  117. 01_05_non-application-layer-protocol.en.srt 6.4 KB
  118. 01_03_introduction-to-mitre-att-ck-and-shield.en.txt 6.4 KB
  119. 01_01_introduction-to-decoys.en.srt 6.5 KB
  120. 01_06_behavioral-analytics-for-active-defense.en.srt 6.6 KB
  121. 01_05_local-email-collection.en.srt 6.6 KB
  122. 01_04_introduction-to-network-sniffing.en.srt 6.6 KB
  123. 01_02_decoy-processes-for-active-defense.en.srt 6.7 KB
  124. 01_02_introduction-to-python.en.srt 6.7 KB
  125. 01_04_introduction-to-account-access-removal.en.srt 6.7 KB
  126. 01_03_credentials-from-web-browsers.en.txt 6.8 KB
  127. 01_02_introduction-to-account-discovery.en.srt 6.9 KB
  128. 01_02_introduction-to-impair-defenses.en.srt 6.9 KB
  129. 01_03_malicious-links.en.txt 6.9 KB
  130. 01_02_introduction-to-encrypted-channels.en.srt 7.0 KB
  131. 01_02_introduction-to-valid-accounts.en.srt 7.0 KB
  132. 01_02_introduction-to-network-scanning.en.srt 7.1 KB
  133. 01_04_introduction-to-email-collection.en.srt 7.1 KB
  134. 01_05_file-and-directory-discovery.en.txt 7.1 KB
  135. 01_05_account-access-removal.en.txt 7.1 KB
  136. 01_05_python-library-injection.en.txt 7.2 KB
  137. 01_04_introduction-to-replication-through-removable-media.en.srt 7.2 KB
  138. 01_01_mitre-pre-att-ck.en.srt 7.3 KB
  139. 01_05_protocol-tunneling.en.txt 7.3 KB
  140. 01_03_network-monitoring.en.txt 7.4 KB
  141. 01_03_decoy-processes.en.txt 7.5 KB
  142. 01_07_burn-in.en.txt 7.7 KB
  143. 01_05_scheduled-execution.en.txt 7.7 KB
  144. 01_05_decoy-content.en.srt 7.8 KB
  145. 01_04_introduction-to-hide-artifacts.en.srt 7.8 KB
  146. 01_03_data-encryption.en.txt 8.3 KB
  147. 01_03_smb-windows-admin-shares.en.srt 8.3 KB
  148. 01_07_decoy-credentials.en.txt 8.4 KB
  149. 01_04_introduction-to-process-injection.en.srt 8.4 KB
  150. 01_05_alternate-data-streams.en.txt 8.4 KB
  151. 01_03_impair-avs.en.txt 8.5 KB
  152. 01_03_default-account-discovery.en.txt 8.8 KB
  153. 01_05_autorun-scripts.en.txt 9.2 KB
  154. 01_03_clipboard-data.en.srt 9.8 KB
  155. 01_03_logon-scripts.en.txt 10.0 KB
  156. 01_03_introduction-to-mitre-att-ck-and-shield.en.srt 10.3 KB
  157. 01_05_system-activity-monitoring.en.txt 10.3 KB
  158. 01_03_encrypted-channel.en.txt 10.5 KB
  159. 01_03_malicious-links.en.srt 10.9 KB
  160. 01_03_credentials-from-web-browsers.en.srt 10.9 KB
  161. 01_03_pcap-collection.en.txt 11.2 KB
  162. 01_05_account-access-removal.en.srt 11.3 KB
  163. 01_03_registry-autorun.en.txt 11.3 KB
  164. 01_05_python-library-injection.en.srt 11.4 KB
  165. 01_05_hijacked-execution-flow.en.txt 11.5 KB
  166. 01_03_user-account-discovery.en.txt 11.6 KB
  167. 01_03_introduction-to-scapy.en.srt 11.7 KB
  168. 01_05_web-session-cookie.en.srt 12.1 KB
  169. 01_07_behavioral-analytics.en.txt 12.5 KB
  170. 01_06_dns-exploration.en.txt 12.6 KB
  171. 01_05_protocol-decoding.en.txt 12.7 KB
  172. 01_03_data-encryption.en.srt 12.9 KB
  173. 01_03_impair-avs.en.srt 13.3 KB
  174. 01_05_file-and-directory-discovery.en.srt 13.4 KB
  175. 01_05_protocol-tunneling.en.srt 13.8 KB
  176. 01_03_network-monitoring.en.srt 13.9 KB
  177. 01_03_decoy-processes.en.srt 14.2 KB
  178. 01_07_burn-in.en.srt 14.7 KB
  179. 01_05_scheduled-execution.en.srt 14.8 KB
  180. 01_04_network-scanning.en.txt 15.5 KB
  181. 01_07_decoy-credentials.en.srt 15.9 KB
  182. 01_05_alternate-data-streams.en.srt 16.1 KB
  183. 01_03_default-account-discovery.en.srt 16.5 KB
  184. 01_05_network-sniffing.en.txt 16.6 KB
  185. 01_05_autorun-scripts.en.srt 17.4 KB
  186. 01_03_pcap-collection.en.srt 17.7 KB
  187. 01_03_registry-autorun.en.srt 17.9 KB
  188. 01_05_hijacked-execution-flow.en.srt 18.1 KB
  189. 01_03_logon-scripts.en.srt 19.1 KB
  190. 01_06_dns-exploration.en.srt 19.6 KB
  191. 01_05_system-activity-monitoring.en.srt 19.7 KB
  192. 01_07_behavioral-analytics.en.srt 19.8 KB
  193. 01_05_protocol-decoding.en.srt 19.9 KB
  194. 01_03_encrypted-channel.en.srt 20.0 KB
  195. 01_03_alternative-protocol.en.txt 20.5 KB
  196. 01_03_user-account-discovery.en.srt 22.2 KB
  197. 01_04_python-for-cybersecurity-resources_Python_for_Cybersecurity_Handout.pdf 25.0 KB
  198. 01_04_network-scanning.en.srt 29.7 KB
  199. 01_05_network-sniffing.en.srt 31.7 KB
  200. 01_03_alternative-protocol.en.srt 39.0 KB
  201. 01_01_introduction-to-python-for-cybersecurity.mp4 3.9 MB
  202. 01_01_monitoring-for-active-defense.mp4 4.4 MB
  203. 01_02_introduction-to-user-execution.mp4 4.8 MB
  204. 01_01_active-defense-on-the-network.mp4 4.9 MB
  205. 01_01_mitre-att-ck-collection.mp4 5.0 MB
  206. 01_01_mitre-att-ck-lateral-movement.mp4 5.1 MB
  207. 01_01_mitre-att-ck-impact.mp4 5.8 MB
  208. 01_04_introduction-to-file-and-directory-discovery.mp4 5.8 MB
  209. 01_02_introduction-to-exfiltration-over-alternative-protocols.mp4 5.8 MB
  210. 01_01_mitre-att-ck-privilege-escalation.mp4 5.8 MB
  211. 01_02_introduction-to-data-encrypted-for-impact.mp4 6.0 MB
  212. 01_01_mitre-att-ck-exfiltration.mp4 6.0 MB
  213. 01_02_introduction-to-remote-services.mp4 6.1 MB
  214. 01_01_mitre-att-ck-execution.mp4 6.1 MB
  215. 01_02_introduction-to-boot-or-logon-autostart-execution.mp4 6.2 MB
  216. 01_01_mitre-att-ck-persistence.mp4 6.2 MB
  217. 01_02_pcap-collection-for-active-defense.mp4 6.3 MB
  218. 01_04_introduction-to-scheduled-tasks-and-jobs.mp4 6.3 MB
  219. 01_01_mitre-att-ck-discovery.mp4 6.3 MB
  220. 01_01_mitre-att-ck-defense-evasion.mp4 6.4 MB
  221. 01_04_introduction-to-non-application-layer-protocol.mp4 6.5 MB
  222. 01_02_introduction-to-credentials-from-password-stores.mp4 6.6 MB
  223. 01_01_mitre-att-ck-initial-access.mp4 6.6 MB
  224. 01_05_non-application-layer-protocol.mp4 6.8 MB
  225. 01_04_protocol-decoding-for-active-defense.mp4 6.8 MB
  226. 01_02_network-monitoring-for-active-defense.mp4 6.9 MB
  227. 01_06_burn-in-for-active-defense.mp4 7.1 MB
  228. 01_02_introduction-to-boot-or-logon-autostart-execution.mp4 7.1 MB
  229. 01_01_mitre-att-ck onehack.us.mp4 7.3 MB
  230. 01_05_local-email-collection.mp4 7.3 MB
  231. 01_02_introduction-to-account-discovery.mp4 7.4 MB
  232. 01_01_mitre-att-ck-credential-access.mp4 7.4 MB
  233. 01_04_introduction-to-account-access-removal.mp4 7.4 MB
  234. 01_04_introduction-to-protocol-tunneling.mp4 7.5 MB
  235. 01_04_introduction-to-email-collection.mp4 7.5 MB
  236. 01_04_introduction-to-network-sniffing.mp4 7.6 MB
  237. 01_04_introduction-to-hijack-execution-flow.mp4 7.7 MB
  238. 01_05_introduction-to-open-technical-databases.mp4 7.7 MB
  239. 01_06_decoy-credentials-for-active-defense.mp4 7.7 MB
  240. 01_02_introduction-to-encrypted-channels.mp4 7.8 MB
  241. 01_04_decoy-content-for-active-defense.mp4 7.8 MB
  242. 01_02_introduction-to-network-scanning.mp4 8.0 MB
  243. 01_02_introduction-to-clipboard-data.mp4 8.1 MB
  244. 01_01_introduction-to-decoys.mp4 8.1 MB
  245. 01_04_introduction-to-replication-through-removable-media.mp4 8.1 MB
  246. 01_02_introduction-to-valid-accounts.mp4 8.2 MB
  247. 01_02_decoy-processes-for-active-defense.mp4 8.2 MB
  248. 01_04_system-activity-monitoring-for-active-defense.mp4 8.4 MB
  249. 01_04_introduction-to-hide-artifacts.mp4 8.4 MB
  250. 01_02_introduction-to-impair-defenses.mp4 8.4 MB
  251. 01_04_introduction-to-use-alternative-authentication-material.mp4 8.6 MB
  252. 01_02_introduction-to-python.mp4 8.8 MB
  253. 01_06_behavioral-analytics-for-active-defense.mp4 9.0 MB
  254. 01_01_mitre-pre-att-ck.mp4 9.3 MB
  255. 01_05_decoy-content.mp4 9.5 MB
  256. 01_04_introduction-to-process-injection.mp4 9.6 MB
  257. 01_03_smb-windows-admin-shares.mp4 11.6 MB
  258. 01_03_clipboard-data.mp4 12.7 MB
  259. 01_03_malicious-links.mp4 13.1 MB
  260. 01_03_introduction-to-scapy.mp4 13.5 MB
  261. 01_05_python-library-injection.mp4 13.6 MB
  262. 01_05_web-session-cookie.mp4 14.3 MB
  263. 01_05_account-access-removal.mp4 14.4 MB
  264. 01_03_introduction-to-mitre-att-ck-and-shield.mp4 15.6 MB
  265. 01_03_network-monitoring.mp4 15.7 MB
  266. 01_05_file-and-directory-discovery.mp4 16.0 MB
  267. 01_07_burn-in.mp4 16.4 MB
  268. 01_05_protocol-tunneling.mp4 17.4 MB
  269. 01_03_decoy-processes.mp4 17.6 MB
  270. 01_07_decoy-credentials.mp4 18.8 MB
  271. 01_03_credentials-from-web-browsers.mp4 19.7 MB
  272. 01_03_impair-avs.mp4 19.8 MB
  273. 01_05_autorun-scripts.mp4 20.2 MB
  274. 01_03_default-account-discovery.mp4 20.7 MB
  275. 01_05_alternate-data-streams.mp4 21.3 MB
  276. 01_03_data-encryption.mp4 22.5 MB
  277. 01_03_logon-scripts.mp4 23.4 MB
  278. 01_03_user-account-discovery.mp4 24.2 MB
  279. 01_05_scheduled-execution.mp4 24.6 MB
  280. 01_03_encrypted-channel.mp4 24.6 MB
  281. 01_03_pcap-collection.mp4 24.8 MB
  282. 01_05_system-activity-monitoring.mp4 25.3 MB
  283. 01_06_dns-exploration.mp4 26.1 MB
  284. 01_05_hijacked-execution-flow.mp4 26.2 MB
  285. 01_03_registry-autorun.mp4 27.6 MB
  286. 01_07_behavioral-analytics.mp4 27.9 MB
  287. 01_05_protocol-decoding.mp4 30.0 MB
  288. 01_04_network-scanning.mp4 31.0 MB
  289. 01_05_network-sniffing.mp4 40.0 MB
  290. 01_03_alternative-protocol.mp4 59.0 MB

Discussion