Torrent details for "Python for Cybersecurity Specialization" Log in to bookmark
Controls:
×
Report Torrent
Please select a reason for reporting this torrent:
Your report will be reviewed by our moderation team.
×
Report Information
Loading report information...
This torrent has been reported 0 times.
Report Summary:
| User | Reason | Date |
|---|
Failed to load report information.
×
Success
Your report has been submitted successfully.
Checked by:
Category:
Language:
English
Total Size:
1.1 GB
Info Hash:
FC65D2A14A672DCDD71D8DFD97E434B587B10B4A
Added By:
Added:
Oct. 18, 2023, 4:52 a.m.
Stats:
|
(Last updated: May 19, 2025, 1:24 p.m.)
| File | Size |
|---|---|
| 03_alternative-protocol.mp4 | 59.0 MB |
| TutsNode.org.txt | 63 bytes |
| 04_network-scanning.en.srt | 29.7 KB |
| 01_introduction-to-python-for-cybersecurity.en.txt | 1.8 KB |
| 0 | 102 bytes |
| 05_network-sniffing.mp4 | 40.0 MB |
| 03_alternative-protocol.en.srt | 39.0 KB |
| 05_network-sniffing.en.srt | 31.7 KB |
| 04_python-for-cybersecurity-resources_Python_for_Cybersecurity_Handout.pdf | 25.0 KB |
| 03_user-account-discovery.en.srt | 22.2 KB |
| 03_alternative-protocol.en.txt | 20.5 KB |
| 03_encrypted-channel.en.srt | 20.0 KB |
| 05_protocol-decoding.en.srt | 19.9 KB |
| 07_behavioral-analytics.en.srt | 19.8 KB |
| 05_system-activity-monitoring.en.srt | 19.7 KB |
| 06_dns-exploration.en.srt | 19.6 KB |
| 03_logon-scripts.en.srt | 19.1 KB |
| 05_hijacked-execution-flow.en.srt | 18.1 KB |
| 01_mitre-att-ck-exfiltration.en.txt | 2.7 KB |
| 03_registry-autorun.en.srt | 17.9 KB |
| 03_pcap-collection.en.srt | 17.7 KB |
| 02_introduction-to-exfiltration-over-alternative-protocols.en.txt | 2.4 KB |
| 05_autorun-scripts.en.srt | 17.4 KB |
| 05_network-sniffing.en.txt | 16.6 KB |
| 03_default-account-discovery.en.srt | 16.5 KB |
| [TGx]Downloaded from torrentgalaxy.to .txt | 585 bytes |
| 05_alternate-data-streams.en.srt | 16.1 KB |
| 07_decoy-credentials.en.srt | 15.9 KB |
| 04_network-scanning.en.txt | 15.5 KB |
| 05_scheduled-execution.en.srt | 14.8 KB |
| 07_burn-in.en.srt | 14.7 KB |
| 03_decoy-processes.en.srt | 14.2 KB |
| 06_dns-exploration.en.txt | 12.6 KB |
| 01_mitre-att-ck-impact.en.txt | 2.6 KB |
| 03_network-monitoring.en.srt | 13.9 KB |
| 05_protocol-tunneling.en.srt | 13.8 KB |
| 02_introduction-to-data-encrypted-for-impact.en.txt | 2.7 KB |
| 05_file-and-directory-discovery.en.srt | 13.4 KB |
| 03_impair-avs.en.srt | 13.3 KB |
| 03_data-encryption.en.srt | 12.9 KB |
| 05_protocol-decoding.en.txt | 12.7 KB |
| 07_behavioral-analytics.en.txt | 12.5 KB |
| 05_web-session-cookie.en.srt | 12.1 KB |
| 03_introduction-to-scapy.en.srt | 11.7 KB |
| 03_user-account-discovery.en.txt | 11.6 KB |
| 05_hijacked-execution-flow.en.txt | 11.5 KB |
| 05_python-library-injection.en.srt | 11.4 KB |
| 03_registry-autorun.en.txt | 11.3 KB |
| 05_account-access-removal.en.srt | 11.3 KB |
| 03_pcap-collection.en.txt | 11.2 KB |
| 03_credentials-from-web-browsers.en.srt | 10.9 KB |
| 03_malicious-links.en.srt | 10.9 KB |
| 03_encrypted-channel.en.txt | 10.5 KB |
| 05_system-activity-monitoring.en.txt | 10.3 KB |
| 03_introduction-to-mitre-att-ck-and-shield.en.srt | 10.3 KB |
| 03_logon-scripts.en.txt | 10.0 KB |
| 03_clipboard-data.en.srt | 9.8 KB |
| 05_autorun-scripts.en.txt | 9.2 KB |
| 03_default-account-discovery.en.txt | 8.8 KB |
| 03_impair-avs.en.txt | 8.5 KB |
| 05_alternate-data-streams.en.txt | 8.4 KB |
| 04_introduction-to-process-injection.en.srt | 8.4 KB |
| 07_decoy-credentials.en.txt | 8.4 KB |
| 01_mitre-att-ck-discovery.en.txt | 2.9 KB |
| 03_smb-windows-admin-shares.en.srt | 8.3 KB |
| 03_data-encryption.en.txt | 8.3 KB |
| 04_introduction-to-hide-artifacts.en.srt | 7.8 KB |
| 05_decoy-content.en.srt | 7.8 KB |
| 05_scheduled-execution.en.txt | 7.7 KB |
| 07_burn-in.en.txt | 7.7 KB |
| 03_decoy-processes.en.txt | 7.5 KB |
| 03_network-monitoring.en.txt | 7.4 KB |
| 04_introduction-to-file-and-directory-discovery.en.txt | 2.8 KB |
| 05_protocol-tunneling.en.txt | 7.3 KB |
| 01_mitre-pre-att-ck.en.srt | 7.3 KB |
| 04_introduction-to-replication-through-removable-media.en.srt | 7.2 KB |
| 05_python-library-injection.en.txt | 7.2 KB |
| 05_account-access-removal.en.txt | 7.1 KB |
| 01_mitre-att-ck-lateral-movement.en.txt | 2.2 KB |
| 05_file-and-directory-discovery.en.txt | 7.1 KB |
| 04_introduction-to-email-collection.en.srt | 7.1 KB |
| 02_introduction-to-remote-services.en.txt | 2.7 KB |
| 02_introduction-to-network-scanning.en.srt | 7.1 KB |
| 02_introduction-to-valid-accounts.en.srt | 7.0 KB |
| 02_introduction-to-encrypted-channels.en.srt | 7.0 KB |
| 03_malicious-links.en.txt | 6.9 KB |
| 02_introduction-to-impair-defenses.en.srt | 6.9 KB |
| 02_introduction-to-account-discovery.en.srt | 6.9 KB |
| 03_credentials-from-web-browsers.en.txt | 6.8 KB |
| 04_introduction-to-account-access-removal.en.srt | 6.7 KB |
| 02_introduction-to-python.en.srt | 6.7 KB |
| 02_decoy-processes-for-active-defense.en.srt | 6.7 KB |
| 02_pcap-collection-for-active-defense.en.srt | 5.6 KB |
| 01_mitre-att-ck-collection.en.txt | 2.3 KB |
| 04_introduction-to-network-sniffing.en.srt | 6.6 KB |
| 05_local-email-collection.en.srt | 6.6 KB |
| 06_behavioral-analytics-for-active-defense.en.srt | 6.6 KB |
| 01_introduction-to-decoys.en.srt | 6.5 KB |
| 03_introduction-to-mitre-att-ck-and-shield.en.txt | 6.4 KB |
| 05_non-application-layer-protocol.en.srt | 6.4 KB |
| 06_decoy-credentials-for-active-defense.en.srt | 6.4 KB |
| 05_introduction-to-open-technical-databases.en.srt | 6.4 KB |
| 05_web-session-cookie.en.txt | 6.4 KB |
| 04_introduction-to-protocol-tunneling.en.srt | 6.3 KB |
| 04_introduction-to-use-alternative-authentication-material.en.srt | 6.3 KB |
| 02_introduction-to-clipboard-data.en.srt | 6.3 KB |
| 03_clipboard-data.en.txt | 6.2 KB |
| 03_introduction-to-scapy.en.txt | 6.2 KB |
| 01_mitre-att-ck-execution.en.txt | 2.7 KB |
| 04_introduction-to-scheduled-tasks-and-jobs.en.srt | 6.0 KB |
| 04_introduction-to-hijack-execution-flow.en.srt | 6.0 KB |
| 02_introduction-to-user-execution.en.txt | 2.3 KB |
| 02_introduction-to-boot-or-logon-autostart-execution.en.srt | 6.0 KB |
| 02_introduction-to-credentials-from-password-stores.en.srt | 5.9 KB |
| 04_system-activity-monitoring-for-active-defense.en.srt | 5.9 KB |
| 06_burn-in-for-active-defense.en.srt | 5.9 KB |
| 01_mitre-att-ck-command-and-control.en.srt | 5.8 KB |
| 04_protocol-decoding-for-active-defense.en.srt | 5.8 KB |
| 01_mitre-att-ck-initial-access.en.srt | 5.6 KB |
| 04_decoy-content-for-active-defense.en.srt | 5.5 KB |
| 02_network-monitoring-for-active-defense.en.srt | 5.5 KB |
| 03_smb-windows-admin-shares.en.txt | 5.3 KB |
| 01_mitre-att-ck-credential-access.en.srt | 5.2 KB |
| 01_mitre-att-ck-persistence.en.txt | 2.7 KB |
| 02_introduction-to-data-encrypted-for-impact.en.srt | 5.1 KB |
| 01_mitre-att-ck-execution.en.srt | 5.1 KB |
| 02_introduction-to-boot-or-logon-autostart-execution.en.txt | 2.6 KB |
| 01_mitre-att-ck-persistence.en.srt | 5.0 KB |
| 02_introduction-to-remote-services.en.srt | 5.0 KB |
| 04_introduction-to-non-application-layer-protocol.en.srt | 5.0 KB |
| 02_introduction-to-boot-or-logon-autostart-execution.en.srt | 4.8 KB |
| 01_mitre-att-ck-privilege-escalation.en.srt | 4.8 KB |
| 01_mitre-att-ck-defense-evasion.en.srt | 4.5 KB |
| 01_mitre-att-ck-discovery.en.srt | 4.5 KB |
| 04_introduction-to-process-injection.en.txt | 4.5 KB |
| 02_introduction-to-exfiltration-over-alternative-protocols.en.srt | 4.4 KB |
| 04_introduction-to-file-and-directory-discovery.en.srt | 4.4 KB |
| 06_python-for-initial-access_exam.html | 4.3 KB |
| 01_mitre-att-ck-privilege-escalation.en.txt | 2.5 KB |
| 02_introduction-to-python.en.txt | 4.3 KB |
| 01_mitre-att-ck-exfiltration.en.srt | 4.2 KB |
| 02_introduction-to-user-execution.en.srt | 4.2 KB |
| 06_behavioral-analytics-for-active-defense.en.txt | 4.2 KB |
| 05_decoy-content.en.txt | 4.1 KB |
| 01_mitre-att-ck-impact.en.srt | 4.1 KB |
| 04_introduction-to-hide-artifacts.en.txt | 4.1 KB |
| 04_introduction-to-protocol-tunneling.en.txt | 4.0 KB |
| 04_introduction-to-use-alternative-authentication-material.en.txt | 4.0 KB |
| 06_decoy-credentials-for-active-defense.en.txt | 4.0 KB |
| 02_introduction-to-clipboard-data.en.txt | 3.9 KB |
| 01_mitre-pre-att-ck.en.txt | 3.9 KB |
| 07_python-for-pre-att-ck_quiz.html | 3.9 KB |
| 01_active-defense-on-the-network.en.srt | 3.9 KB |
| 01_mitre-att-ck-defense-evasion.en.txt | 2.4 KB |
| 04_introduction-to-replication-through-removable-media.en.txt | 3.9 KB |
| 04_introduction-to-email-collection.en.txt | 3.8 KB |
| 02_introduction-to-valid-accounts.en.txt | 3.8 KB |
| 02_introduction-to-network-scanning.en.txt | 3.7 KB |
| 04_system-activity-monitoring-for-active-defense.en.txt | 3.7 KB |
| 01_mitre-att-ck-collection.en.srt | 3.7 KB |
| 02_introduction-to-account-discovery.en.txt | 3.7 KB |
| 02_decoy-processes-for-active-defense.en.txt | 3.7 KB |
| 02_introduction-to-encrypted-channels.en.txt | 3.6 KB |
| 04_introduction-to-network-sniffing.en.txt | 3.6 KB |
| 05_local-email-collection.en.txt | 3.6 KB |
| 02_introduction-to-impair-defenses.en.txt | 3.6 KB |
| 04_introduction-to-account-access-removal.en.txt | 3.6 KB |
| 04_decoy-content-for-active-defense.en.txt | 3.6 KB |
| 01_mitre-att-ck-lateral-movement.en.srt | 3.5 KB |
| 01_introduction-to-decoys.en.txt | 3.5 KB |
| 05_non-application-layer-protocol.en.txt | 3.4 KB |
| 05_python-for-cybersecurity_quiz.html | 3.4 KB |
| 05_introduction-to-open-technical-databases.en.txt | 3.4 KB |
| 01_mitre-att-ck-credential-access.en.txt | 3.3 KB |
| 01_monitoring-for-active-defense.en.srt | 3.3 KB |
| 04_introduction-to-non-application-layer-protocol.en.txt | 3.2 KB |
| 02_introduction-to-boot-or-logon-autostart-execution.en.txt | 3.2 KB |
| 04_introduction-to-hijack-execution-flow.en.txt | 3.2 KB |
| 04_introduction-to-scheduled-tasks-and-jobs.en.txt | 3.2 KB |
| 02_introduction-to-credentials-from-password-stores.en.txt | 3.2 KB |
| 01_mitre-att-ck-command-and-control.en.txt | 3.1 KB |
| 06_burn-in-for-active-defense.en.txt | 3.1 KB |
| 04_protocol-decoding-for-active-defense.en.txt | 3.1 KB |
| 01_mitre-att-ck-initial-access.en.txt | 3.0 KB |
| 02_pcap-collection-for-active-defense.en.txt | 3.0 KB |
| 02_network-monitoring-for-active-defense.en.txt | 2.9 KB |
| 01_introduction-to-python-for-cybersecurity.en.srt | 2.8 KB |
| 01_active-defense-on-the-network.en.txt | 2.1 KB |
| 01_monitoring-for-active-defense.en.txt | 2.0 KB |
| 04_python-for-cybersecurity-resources_instructions.html | 1.0 KB |
| 1 | 94.3 KB |
| 04_network-scanning.mp4 | 31.0 MB |
| 2 | 472.8 KB |
| 05_protocol-decoding.mp4 | 30.0 MB |
| 3 | 479.9 KB |
| 07_behavioral-analytics.mp4 | 27.9 MB |
| 4 | 132.6 KB |
| 03_registry-autorun.mp4 | 27.6 MB |
| 5 | 398.6 KB |
| 05_hijacked-execution-flow.mp4 | 26.2 MB |
| 6 | 289.9 KB |
| 06_dns-exploration.mp4 | 26.1 MB |
| 7 | 436.5 KB |
| 05_system-activity-monitoring.mp4 | 25.3 MB |
| 8 | 165.0 KB |
| 03_pcap-collection.mp4 | 24.8 MB |
| 9 | 224.9 KB |
| 03_encrypted-channel.mp4 | 24.6 MB |
| 10 | 387.9 KB |
| 05_scheduled-execution.mp4 | 24.6 MB |
| 11 | 395.6 KB |
| 03_user-account-discovery.mp4 | 24.2 MB |
| 12 | 287.1 KB |
| 03_logon-scripts.mp4 | 23.4 MB |
| 13 | 60.9 KB |
| 03_data-encryption.mp4 | 22.5 MB |
| 14 | 494.8 KB |
| 05_alternate-data-streams.mp4 | 21.3 MB |
| 15 | 172.0 KB |
| 03_default-account-discovery.mp4 | 20.7 MB |
| 16 | 274.6 KB |
| 05_autorun-scripts.mp4 | 20.2 MB |
| 17 | 298.9 KB |
| 03_impair-avs.mp4 | 19.8 MB |
| 18 | 205.6 KB |
| 03_credentials-from-web-browsers.mp4 | 19.7 MB |
| 19 | 269.3 KB |
| 07_decoy-credentials.mp4 | 18.8 MB |
| 20 | 177.2 KB |
| 03_decoy-processes.mp4 | 17.6 MB |
| 21 | 411.2 KB |
| 05_protocol-tunneling.mp4 | 17.4 MB |
| 22 | 141.3 KB |
| 07_burn-in.mp4 | 16.4 MB |
| 23 | 74.8 KB |
| 05_file-and-directory-discovery.mp4 | 16.0 MB |
| 24 | 47.3 KB |
| 03_network-monitoring.mp4 | 15.7 MB |
| 25 | 286.9 KB |
| 03_introduction-to-mitre-att-ck-and-shield.mp4 | 15.6 MB |
| 26 | 384.0 KB |
| 05_account-access-removal.mp4 | 14.4 MB |
| 27 | 103.8 KB |
| 05_web-session-cookie.mp4 | 14.3 MB |
| 28 | 195.2 KB |
| 05_python-library-injection.mp4 | 13.6 MB |
| 29 | 392.1 KB |
| 03_introduction-to-scapy.mp4 | 13.5 MB |
| 30 | 487.5 KB |
| 03_malicious-links.mp4 | 13.1 MB |
| 31 | 374.9 KB |
| 03_clipboard-data.mp4 | 12.7 MB |
| 32 | 357.7 KB |
| 03_smb-windows-admin-shares.mp4 | 11.6 MB |
| 33 | 410.0 KB |
| 04_introduction-to-process-injection.mp4 | 9.6 MB |
| 34 | 373.6 KB |
| 05_decoy-content.mp4 | 9.5 MB |
| 35 | 491.3 KB |
| 01_mitre-pre-att-ck.mp4 | 9.3 MB |
| 36 | 183.1 KB |
| 06_behavioral-analytics-for-active-defense.mp4 | 9.0 MB |
| 37 | 2.0 KB |
| 02_introduction-to-python.mp4 | 8.8 MB |
| 38 | 176.5 KB |
| 04_introduction-to-use-alternative-authentication-material.mp4 | 8.6 MB |
| 39 | 453.5 KB |
| 02_introduction-to-impair-defenses.mp4 | 8.4 MB |
| 40 | 82.6 KB |
| 04_introduction-to-hide-artifacts.mp4 | 8.4 MB |
| 41 | 124.6 KB |
| 04_system-activity-monitoring-for-active-defense.mp4 | 8.4 MB |
| 42 | 138.1 KB |
| 02_decoy-processes-for-active-defense.mp4 | 8.2 MB |
| 43 | 272.0 KB |
| 02_introduction-to-valid-accounts.mp4 | 8.2 MB |
| 44 | 289.2 KB |
| 04_introduction-to-replication-through-removable-media.mp4 | 8.1 MB |
| 45 | 377.1 KB |
| 01_introduction-to-decoys.mp4 | 8.1 MB |
| 46 | 423.9 KB |
| 02_introduction-to-clipboard-data.mp4 | 8.1 MB |
| 47 | 457.5 KB |
| 02_introduction-to-network-scanning.mp4 | 8.0 MB |
| 48 | 503.7 KB |
| 04_decoy-content-for-active-defense.mp4 | 7.8 MB |
| 49 | 159.7 KB |
| 02_introduction-to-encrypted-channels.mp4 | 7.8 MB |
| 50 | 184.2 KB |
| 06_decoy-credentials-for-active-defense.mp4 | 7.7 MB |
| 51 | 257.9 KB |
| 05_introduction-to-open-technical-databases.mp4 | 7.7 MB |
| 52 | 306.8 KB |
| 04_introduction-to-hijack-execution-flow.mp4 | 7.7 MB |
| 53 | 308.3 KB |
| 04_introduction-to-network-sniffing.mp4 | 7.6 MB |
| 54 | 428.5 KB |
| 04_introduction-to-email-collection.mp4 | 7.5 MB |
| 55 | 483.6 KB |
| 04_introduction-to-protocol-tunneling.mp4 | 7.5 MB |
| 56 | 47.6 KB |
| 04_introduction-to-account-access-removal.mp4 | 7.4 MB |
| 57 | 87.4 KB |
| 01_mitre-att-ck-credential-access.mp4 | 7.4 MB |
| 58 | 127.9 KB |
| 02_introduction-to-account-discovery.mp4 | 7.4 MB |
| 59 | 137.3 KB |
| 05_local-email-collection.mp4 | 7.3 MB |
| 60 | 208.9 KB |
| 01_mitre-att-ck-command-and-control.mp4 | 7.3 MB |
| 61 | 229.1 KB |
| 02_introduction-to-boot-or-logon-autostart-execution.mp4 | 7.1 MB |
| 62 | 381.8 KB |
| 06_burn-in-for-active-defense.mp4 | 7.1 MB |
| 63 | 423.6 KB |
| 02_network-monitoring-for-active-defense.mp4 | 6.9 MB |
| 64 | 109.1 KB |
| 04_protocol-decoding-for-active-defense.mp4 | 6.8 MB |
| 65 | 155.0 KB |
| 05_non-application-layer-protocol.mp4 | 6.8 MB |
| 66 | 202.6 KB |
| 01_mitre-att-ck-initial-access.mp4 | 6.6 MB |
| 67 | 361.7 KB |
| 02_introduction-to-credentials-from-password-stores.mp4 | 6.6 MB |
| 68 | 376.2 KB |
| 04_introduction-to-non-application-layer-protocol.mp4 | 6.5 MB |
| 69 | 484.6 KB |
| 01_mitre-att-ck-defense-evasion.mp4 | 6.4 MB |
| 70 | 55.7 KB |
| 01_mitre-att-ck-discovery.mp4 | 6.3 MB |
| 71 | 220.8 KB |
| 04_introduction-to-scheduled-tasks-and-jobs.mp4 | 6.3 MB |
| 72 | 220.8 KB |
| 02_pcap-collection-for-active-defense.mp4 | 6.3 MB |
| 73 | 237.4 KB |
| 01_mitre-att-ck-persistence.mp4 | 6.2 MB |
| 74 | 295.5 KB |
| 02_introduction-to-boot-or-logon-autostart-execution.mp4 | 6.2 MB |
| 75 | 318.1 KB |
| 01_mitre-att-ck-execution.mp4 | 6.1 MB |
| 76 | 411.6 KB |
| 02_introduction-to-remote-services.mp4 | 6.1 MB |
| 77 | 417.8 KB |
| 01_mitre-att-ck-exfiltration.mp4 | 6.0 MB |
| 78 | 22.2 KB |
| 02_introduction-to-data-encrypted-for-impact.mp4 | 6.0 MB |
| 79 | 50.0 KB |
| 01_mitre-att-ck-privilege-escalation.mp4 | 5.8 MB |
| 80 | 165.2 KB |
| 02_introduction-to-exfiltration-over-alternative-protocols.mp4 | 5.8 MB |
| 81 | 192.5 KB |
| 04_introduction-to-file-and-directory-discovery.mp4 | 5.8 MB |
| 82 | 213.8 KB |
| 01_mitre-att-ck-impact.mp4 | 5.8 MB |
| 83 | 252.1 KB |
| 01_mitre-att-ck-lateral-movement.mp4 | 5.1 MB |
| 84 | 358.6 KB |
| 01_mitre-att-ck-collection.mp4 | 5.0 MB |
| 85 | 3.3 KB |
| 01_active-defense-on-the-network.mp4 | 4.9 MB |
| 86 | 128.9 KB |
| 02_introduction-to-user-execution.mp4 | 4.8 MB |
| 87 | 239.2 KB |
| 01_monitoring-for-active-defense.mp4 | 4.4 MB |
| 88 | 143.1 KB |
| 01_introduction-to-python-for-cybersecurity.mp4 | 3.9 MB |
Name
DL
Uploader
Size
S/L
Added
-
10.5 MB
[20
/
0]
2023-06-01
| Uploaded by freecoursewb | Size 10.5 MB | Health [ 20 /0 ] | Added 2023-06-01 |
-
23.9 MB
[14
/
1]
2024-04-07
| Uploaded by indexFroggy | Size 23.9 MB | Health [ 14 /1 ] | Added 2024-04-07 |
-
903.8 MB
[15
/
5]
2024-05-02
| Uploaded by SunRiseZone | Size 903.8 MB | Health [ 15 /5 ] | Added 2024-05-02 |
NOTE
SOURCE: Python for Cybersecurity Specialization
-----------------------------------------------------------------------------------
COVER

-----------------------------------------------------------------------------------
MEDIAINFO
None
×


