~Get Your Files Here !/7. Module 7 - Wireless Fortification Pentesting Mastery/2. Web App Pentesting Practical.mp4 636.4 MB
~Get Your Files Here !/10. Module 10 - Communicating Findings Reporting Mastery/2. Reporting Practical + Conclusion.mp4 283.4 MB
~Get Your Files Here !/6. Module 6 - Crack the Code Password Mastery/2. Password Cracking Practical.mp4 265.1 MB
~Get Your Files Here !/5. Module 5 - Hacking Mastery Strategic Exploitation/2. Exploitation Practical.mp4 222.1 MB
~Get Your Files Here !/9. Module 9 - Human Manipulation Social Engineering/2. Social Engineering Practical.mp4 198.1 MB
~Get Your Files Here !/8. Module 8 - Wireless Fortification Pentesting Mastery/2. Wireless Pentesting Practical.mp4 194.1 MB
~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/3. Social Media Reconnaissance.mp4 142.0 MB
~Get Your Files Here !/4. Module 4 - Infiltration Techniques Mastering Active Reconnaissance/2. Vulnerability Assessment.mp4 121.4 MB
~Get Your Files Here !/5. Module 5 - Hacking Mastery Strategic Exploitation/1. Exploitation Introduction.mp4 84.3 MB
~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/3. Microsoft Azure Guide..mp4 54.4 MB
~Get Your Files Here !/6. Module 6 - Crack the Code Password Mastery/1. Password Cracking Introduction.mp4 48.2 MB
~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/2. Google Cloud Platform(GCP) Guide..mp4 47.9 MB
~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/1. Amazon Web Services(AWS) Guide..mp4 46.0 MB
~Get Your Files Here !/4. Module 4 - Infiltration Techniques Mastering Active Reconnaissance/3. Scanning.mp4 44.9 MB
~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/4. Unveiling the Secrets of OS Fingerprinting in Cybersecurity with Kali Linux.mp4 44.7 MB
~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/5. Target Validation in Cybersecurity with Kali Linux.mp4 39.9 MB
~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/1. Reconnaissance — First Phase of Hacking.mp4 30.0 MB
~Get Your Files Here !/1. Module 1 - Course Introduction & Teaser/2. Course Introduction.mp4 28.4 MB
~Get Your Files Here !/8. Module 8 - Wireless Fortification Pentesting Mastery/1. Wireless Pentesting Introduction.mp4 24.5 MB
~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/6. Subdomain Discovery in Cybersecurity with Kali Linux.mp4 24.5 MB
~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/2. Open Source Intelligence(OSINT).mp4 9.5 MB
~Get Your Files Here !/1. Module 1 - Course Introduction & Teaser/1. Kali Linux & Cybersecurity Course Trailer.mp4 7.6 MB
~Get Your Files Here !/9. Module 9 - Human Manipulation Social Engineering/1. Social Engineering Introduction.mp4 6.2 MB
~Get Your Files Here !/7. Module 7 - Wireless Fortification Pentesting Mastery/1. Web App Pentesting Introduction.mp4 2.7 MB
~Get Your Files Here !/10. Module 10 - Communicating Findings Reporting Mastery/1. Reporting Introduction.mp4 2.0 MB
~Get Your Files Here !/4. Module 4 - Infiltration Techniques Mastering Active Reconnaissance/1. Active Reconnaissance Introduction.mp4 1.9 MB
~Get Your Files Here !/7. Module 7 - Wireless Fortification Pentesting Mastery/3. Web App Pentesting Conclusion.mp4 1.4 MB
~Get Your Files Here !/8. Module 8 - Wireless Fortification Pentesting Mastery/3. Wireless Pentesting Conclusion.mp4 1.3 MB
~Get Your Files Here !/5. Module 5 - Hacking Mastery Strategic Exploitation/3. Exploitation Conclusion.mp4 1.2 MB
~Get Your Files Here !/4. Module 4 - Infiltration Techniques Mastering Active Reconnaissance/4. Conclusion.mp4 910.1 kB
~Get Your Files Here !/6. Module 6 - Crack the Code Password Mastery/3. Password Cracking Conclusion.mp4 859.8 kB
~Get Your Files Here !/9. Module 9 - Human Manipulation Social Engineering/3. Social Engineering Conclusion.mp4 733.7 kB
~Get Your Files Here !/Bonus Resources.txt 386 Bytes
~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/4.1 Unveiling the Secrets of OS Fingerprinting in Cybersecurity with Kali Linux.html 184 Bytes
Get Bonus Downloads Here.url 182 Bytes
~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/2.1 How to Install Browser Based Kali Linux with 2500+ security apps on Google Cloud Platform(GCP).html 172 Bytes
~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/1.1 How to Install Browser-Based Kali Linux with 2500+ security apps On Amazon Web Services(AWS).html 170 Bytes
~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/3.1 How to Install Browser-Based Kali Linux with 2500+ security apps From Azure Marketplace..html 166 Bytes
~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/6.1 Subdomain Discovery in Cybersecurity with Kali Linux.html 161 Bytes
~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/5.1 Target Validation in Cybersecurity with Kali Linux.html 159 Bytes
~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/1.1 Reconnaissance — First Phase of Hacking.html 146 Bytes
~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/2.1 Open Source Intelligence(OSINT).html 139 Bytes
~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/3.1 Social Media Reconnaissance.html 136 Bytes