~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/9. Methods of Encryption Symmetric Cryptography.mp4 90.5 MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/14. Protecting Assets Understanding Configuration Management - 2.mp4 67.1 MB
~Get Your Files Here !/10. Learning System & Computer Architecture/11. Section Outro.mp4 66.6 MB
~Get Your Files Here !/2. Understanding Information Life Cycle/1. Introduction.mp4 63.7 MB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/23. Methods of Encryption Hash Message Authentication Code.mp4 62.7 MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/13. Protecting Assets Understanding Configuration Management - 1.mp4 61.9 MB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/7. Methods of Encryption Understanding Symmetric Algorithms.mp4 60.7 MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/12. Protecting Assets Learning System Configuration.mp4 60.4 MB
~Get Your Files Here !/16. Methods of Encryption - Symmetric Cryptography/11. Methods of Encryption Exclusive OR (XOR).mp4 57.7 MB
~Get Your Files Here !/10. Learning System & Computer Architecture/1. Introduction.mp4 56.1 MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/18. Protecting Assets Tools to Securely Delete Content.mp4 55.3 MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/19. Section Outro.mp4 54.3 MB
~Get Your Files Here !/6. Protecting Assets - Data Security Controls/10. Protecting Assets Learn About ASD.mp4 52.4 MB
~Get Your Files Here !/2. Understanding Information Life Cycle/2. Information Life Cycle The Valuable Information Assets - 1.mp4 51.9 MB
~Get Your Files Here !/11. Learn and Understand Operating Systems/12. Section Outro.mp4 50.9 MB
~Get Your Files Here !/17. Methods of Encryption - Learning Asymmetric Cryptography/11. Methods of Encryption Learning Asymmetric Key Algorithms.mp4 50.7 MB
~Get Your Files Here !/9. Getting Started - Learn and Understand Security Models/11. Security Models Learning the Trusted Computing Base.mp4 50.5 MB
~Get Your Files Here !/2. Understanding Information Life Cycle/3. Information Life Cycle The Valuable Information Assets - 2.mp4 50.1 MB
~Get Your Files Here !/10. Learning System & Computer Architecture/8. System and Computer Architecture Memory Types - 3.mp4 49.8 MB
~Get Your Files Here !/13. Understanding Information Systems Architecture/20. Learning Information Systems Architecture SSO For Web Applications.mp4 48.6 MB
~Get Your Files Here !/Ex_Files_Motion_Control_3D_Bringing_Photos_to_Life/Exercise Files/12 Mixing in Footage/Shot 2/NightSky2.mov 996.6 MB
~Get Your Files Here !/Ex_Files_Motion_Control_3D_Bringing_Photos_to_Life/Exercise Files/13 Creating 3D Perspective with Vanishing Point/Building/t3mu514.tif 291.3 MB
~Get Your Files Here !/Ex_Files_Motion_Control_3D_Bringing_Photos_to_Life/Exercise Files/12 Mixing in Footage/Shot 2/Ridge.psd 194.5 MB
~Get Your Files Here !/Ex_Files_Motion_Control_3D_Bringing_Photos_to_Life/Exercise Files/08 Animating the Camera/montezuma/Monster Clouds1.TIFF 182.0 MB
~Get Your Files Here !/Ex_Files_Motion_Control_3D_Bringing_Photos_to_Life/Exercise Files/12 Mixing in Footage/Shot 1/NightSky1.mov 152.8 MB
~Get Your Files Here !/Ex_Files_Motion_Control_3D_Bringing_Photos_to_Life/Exercise Files/12 Mixing in Footage/Shot 2/NightSky1.mov 152.8 MB
~Get Your Files Here !/Ex_Files_Motion_Control_3D_Bringing_Photos_to_Life/Exercise Files/03 Planning the Move/04 Focal Length/Focal1.tiff 72.1 MB
~Get Your Files Here !/Ex_Files_Motion_Control_3D_Bringing_Photos_to_Life/Exercise Files/01 Introducing Motion Control 3D/Moco_Sailor.mov 72.0 MB
~Get Your Files Here !/Ex_Files_Motion_Control_3D_Bringing_Photos_to_Life/Exercise Files/03 Planning the Move/Renders/Moco_Sailor.mov 72.0 MB
~Get Your Files Here !/Ex_Files_Motion_Control_3D_Bringing_Photos_to_Life/Exercise Files/01 Introducing Motion Control 3D/Moco_Statue.mov 72.0 MB
~Get Your Files Here !/Ex_Files_Motion_Control_3D_Bringing_Photos_to_Life/Exercise Files/03 Planning the Move/Renders/Moco_Statue.mov 72.0 MB
~Get Your Files Here !/Ex_Files_Motion_Control_3D_Bringing_Photos_to_Life/Exercise Files/14 Viewing in 3D/Vancouver.psd 68.6 MB
~Get Your Files Here !/Ex_Files_Motion_Control_3D_Bringing_Photos_to_Life/Exercise Files/06 Organizing the Comp/Vancouver.psd 68.5 MB
~Get Your Files Here !/Ex_Files_Motion_Control_3D_Bringing_Photos_to_Life/Exercise Files/04 Layering the Images/Soldiers_Field3.psd 63.9 MB
~Get Your Files Here !/Ex_Files_Motion_Control_3D_Bringing_Photos_to_Life/Exercise Files/07 Build the Comp/Soldiers_Field_to import.psd 63.4 MB
~Get Your Files Here !/Ex_Files_Motion_Control_3D_Bringing_Photos_to_Life/Exercise Files/10 Re-lighting the Scene/Footage/Soldiers_Field_to import.psd 63.4 MB
~Get Your Files Here !/Ex_Files_Motion_Control_3D_Bringing_Photos_to_Life/Exercise Files/04 Layering the Images/Soldiers_Field4.psd 63.4 MB
~Get Your Files Here !/Ex_Files_Motion_Control_3D_Bringing_Photos_to_Life/Exercise Files/06 Organizing the Comp/Soldiers_Field_to_organize.psd 63.4 MB
~Get Your Files Here !/Ex_Files_Motion_Control_3D_Bringing_Photos_to_Life/Exercise Files/04 Layering the Images/Soldiers_Field6.psd 63.2 MB
~Get Your Files Here !/Ex_Files_Motion_Control_3D_Bringing_Photos_to_Life/Exercise Files/11 Adding Depth with Particles/Vancouver.psd 57.6 MB
~Get Your Files Here !/7 - Windows Malware - Generating Undetectable Backdoors/7 - Generating An Undetectable Backdoor For Windows - Method 2.encrypted.mp4 163.4 MB
~Get Your Files Here !/2 - Preparation - Linux Basics/2 - The Linux Terminal & Basic Linux Commands.encrypted.mp4 152.8 MB
~Get Your Files Here !/11 - Mac OS X Malware/2 - Hacking Mac OS X Using A Meterpreter Backdoor.encrypted.mp4 119.4 MB
~Get Your Files Here !/4 - Information Gathering - Gathering Info About A Company Website/1 - Maltego Overview.mp4 109.7 MB
~Get Your Files Here !/12 - Linux Malware/4 - Using A Remote Keylogger To Capture Key Strikes Including Passwords.mp4 105.0 MB
~Get Your Files Here !/14 - Using The Above Attacks Outside The Local Network/1 - Overview of the Setup.mp4 101.1 MB
~Get Your Files Here !/13 - Delivery Methods/7 - Stealing Login Info Using Fake A Login Page.mp4 87.0 MB
~Get Your Files Here !/7 - Windows Malware - Generating Undetectable Backdoors/3 - Generating Undetectable Backdoors For Windows.mp4 87.0 MB
~Get Your Files Here !/1 - Preparation - Creating a Penetration Testing Lab/2 - Initial Preparation.encrypted.mp4 80.3 MB
~Get Your Files Here !/11 - Mac OS X Malware/5 - Embedding A Normal File With Backdoor.encrypted.mp4 76.9 MB
~Get Your Files Here !/13 - Delivery Methods/5 - Hacking OS X & Linux Using Pure Social Engineering Without Sending Any Files.encrypted.mp4 76.4 MB
~Get Your Files Here !/13 - Delivery Methods/3 - Mail Delivery - Spoofing Emails.encrypted.mp4 74.9 MB
~Get Your Files Here !/17 - Post Exploitation - Empire/4 - Injecting a Backdoor In a System Processes.encrypted.mp4 74.5 MB
~Get Your Files Here !/10 - Windows Malware - Creating Trojans/7 - Embedding a Backdoor In a Legitimate Microsoft Office Document.encrypted.mp4 70.6 MB
~Get Your Files Here !/13 - Delivery Methods/11 - Luring Targets Into Accessing Evil URL Without Direct Interaction.encrypted.mp4 64.9 MB
~Get Your Files Here !/10 - Windows Malware - Creating Trojans/5 - Download & Execute Payload (Method 2).encrypted.mp4 64.0 MB
~Get Your Files Here !/9 - Windows Malware - Enhancing Malware/2 - Download & Execute Payload.encrypted.mp4 63.7 MB
~Get Your Files Here !/11 - Mac OS X Malware/6 - Generating a Basic Trojan For Max OS X.encrypted.mp4 58.5 MB
~Get Your Files Here !/13 - Delivery Methods/4 - Mail Delivery - Spoofing Emails (method 2).encrypted.mp4 58.3 MB
~Get Your Files Here !/13 - Delivery Methods/10 - URL Manipulation.mp4 57.5 MB