PuZo.org: Udemy Computer Security A Hands On Approach - PuZo.org

Jump to content

Page 1 of 1
  • You cannot start a new topic
  • You cannot reply to this topic

Udemy Computer Security A Hands On Approach

#1 User is online   MagP2P 

  • Addicted to PuZo's
  • PipPipPipPipPip
  • Group: Members
  • Posts: 57056
  • Joined: 05-October 22

Posted 17 April 2024 - 11:01 PM


Posted Image


Download Free Download : Udemy Computer Security A Hands on Approach
mp4 | Video: h264,1920X1080 | Audio: AAC, 44.1 KHz
Genre:eLearning | Language: English | Size:8.8 GB


Files Included :

1 - Introduction.mp4 (16.16 MB)
MP4
2 - Set Up the Lab Environment.mp4 (312.86 MB)
MP4
3 - Textbook.mp4 (38.56 MB)
MP4
4 - Linux Users and Groups.mp4 (196.74 MB)
MP4
5 - Access Control and Permissions.mp4 (97.16 MB)
MP4
6 - Running Commands as Superuser.mp4 (34.74 MB)
MP4
7 - Summary.mp4 (13.68 MB)
MP4
10 - The SetUID Mechanism.mp4 (108.11 MB)
MP4
11 - What Can Go Wrong.mp4 (94.97 MB)
MP4
12 - Attacks via Environment Variables.mp4 (457.92 MB)
MP4
13 - Attacks via Explicit User Inputs.mp4 (108.02 MB)
MP4
14 - Capability Leaking.mp4 (92.34 MB)
MP4
15 - Security Analysis and Summary.mp4 (90.15 MB)
MP4
8 - Introduction.mp4 (8.45 MB)
MP4
9 - The Need for Privileged Programs.mp4 (83.42 MB)
MP4
17 - Introduction.mp4 (9.59 MB)
MP4
18 - Shellshock Vulnerability.mp4 (226.39 MB)
MP4
19 - Exploit the Vulnerability.mp4 (414.53 MB)
MP4
20 - Reverse Shell.mp4 (292.09 MB)
MP4
21 - Launch the Reverse Shell Attack Summary.mp4 (27.58 MB)
MP4
23 - Introduction.mp4 (41.4 MB)
MP4
24 - Memory Layout.mp4 (21.55 MB)
MP4
25 - Stack Layout.mp4 (54.67 MB)
MP4
26 - Buffer Overflow Vulnerability.mp4 (75.09 MB)
MP4
27 - Experiment Environment Setup.mp4 (18.2 MB)
MP4
28 - Launching Buffer Overflow Attacks.mp4 (136.18 MB)
MP4
29 - Exercises.mp4 (63.8 MB)
MP4
30 - Writing Shellcode.mp4 (128.59 MB)
MP4
31 - Countermeasures Overview.mp4 (9.07 MB)
MP4
32 - Developers Approach.mp4 (80.74 MB)
MP4
33 - Address Space Layout Randomization.mp4 (229.35 MB)
MP4
34 - Shell Programs Defense.mp4 (64.43 MB)
MP4
35 - NonExecutable Stacks.mp4 (61.96 MB)
MP4
36 - Compilers Approach StackGuard.mp4 (122.29 MB)
MP4
37 - HeapBased Buffer Overflow.mp4 (72.96 MB)
MP4
38 - Summary.mp4 (21.97 MB)
MP4
40 - Introduction.mp4 (18.3 MB)
MP4
41 - NonExecutable Stacks.mp4 (213.91 MB)
MP4
42 - Overcome the Challenges.mp4 (70.41 MB)
MP4
43 - The Returntolibc Attack.mp4 (95.16 MB)
MP4
44 - Return Oriented Programming.mp4 (124.82 MB)
MP4
45 - Chaining Function Calls wo Arguments.mp4 (82.58 MB)
MP4
46 - Chaining Function Calls with Arguments.mp4 (108.34 MB)
MP4
47 - Chaining Function Calls from Library.mp4 (169.81 MB)
MP4
48 - The Final Attack.mp4 (96.73 MB)
MP4
50 - Introduction.mp4 (70.8 MB)
MP4
51 - Race Condition Vulnerability.mp4 (293.2 MB)
MP4
52 - Attack.mp4 (240.26 MB)
MP4
53 - Improved Attack.mp4 (96.55 MB)
MP4
54 - Countermeasures.mp4 (354.29 MB)
MP4
57 - Introduction and Background.mp4 (22.09 MB)
MP4
58 - Background.mp4 (57.18 MB)
MP4
59 - Memory Mapping.mp4 (80.96 MB)
MP4
60 - Mapping ReadOnly Files.mp4 (181.34 MB)
MP4
61 - The Dirty COW Vulnerability.mp4 (154.6 MB)
MP4
62 - Launch the Attack Summary.mp4 (147.54 MB)
MP4
64 - Introduction.mp4 (38.67 MB)
MP4
65 - Side Channels.mp4 (112.58 MB)
MP4
66 - Use CPU Cache as Side Channel.mp4 (60.57 MB)
MP4
67 - Secret Room and Guards.mp4 (49.75 MB)
MP4
68 - Out Of Order Execution in Meltdown Attack.mp4 (90.21 MB)
MP4
69 - Launch the Meltdown Attack.mp4 (398.79 MB)
MP4
70 - Speculative Execution in Spectre Attack.mp4 (64.41 MB)
MP4
71 - Launch the Spectre Attack.mp4 (116.59 MB)
MP4
72 - Summary.mp4 (37.75 MB)
MP4
74 - Introduction.mp4 (19.27 MB)
MP4
75 - How Format String Works.mp4 (346.45 MB)
MP4
76 - Format Stings with Missing Arguments.mp4 (75.72 MB)
MP4
77 - Read from Memory Using Vulnerabilities.mp4 (188.54 MB)
MP4
78 - Write to Memory.mp4 (367.09 MB)
MP4
79 - Write to Memory Faster.mp4 (195.76 MB)
MP4
81 - Remote Code Injection.mp4 (156.14 MB)
MP4
82 - Countermeasures.mp4 (60.44 MB)
MP4
83 - Summary.mp4 (23.88 MB)
MP4

Posted Image

https://voltupload.c...on_Approach.z01
https://voltupload.c...on_Approach.z02
https://voltupload.c...on_Approach.z03
https://voltupload.c...on_Approach.z04
https://voltupload.c...on_Approach.z05
https://voltupload.c...on_Approach.z06
https://voltupload.c...on_Approach.z07
https://voltupload.c...on_Approach.z08
https://voltupload.c...on_Approach.z09
https://voltupload.c...on_Approach.zip

https://rapidgator.n...on_Approach.z01
https://rapidgator.n...on_Approach.z02
https://rapidgator.n...on_Approach.z03
https://rapidgator.n...on_Approach.z04
https://rapidgator.n...on_Approach.z05
https://rapidgator.n...on_Approach.z06
https://rapidgator.n...on_Approach.z07
https://rapidgator.n...on_Approach.z08
https://rapidgator.n...on_Approach.z09
https://rapidgator.n...on_Approach.zip


Free search engine download: Udemy Computer Security A Hands on Approach

Share this topic:


Page 1 of 1
  • You cannot start a new topic
  • You cannot reply to this topic