~Get Your Files Here !/10 - Launching VS Code from the Command Line/Intrusion Detection/intrusion_input2/intrusion_input2.mp4 103.3 MB
~Get Your Files Here !/15 - Model Inference for Intrusion Detection/17 - Model Inference Code Explanation for Intrusion Detection.mp4 93.2 MB
~Get Your Files Here !/18 - Intrusion Detection Code Execution/20 - Intrusion Detection Code Execution.mp4 41.6 MB
~Get Your Files Here !/9 - Environment Setup for Python Development/11 - VS Code Setup for Python Development.mp4 34.3 MB
~Get Your Files Here !/2 - Environment Setup for Python Development/3 - VS Code Setup for Python Development.mp4 34.2 MB
~Get Your Files Here !/8 - Executing RealTime Model Inference for Object Detection/9 - Performing RealTime Object Detection with YOLOv7tiny.mp4 32.8 MB
~Get Your Files Here !/17 - Getting Polygon Coordinates Using Roboflow for Intrusion Detection/19 - Getting Polygon Coordinates Using Roboflow.mp4 29.8 MB
~Get Your Files Here !/3 - Object Detection Project Overview/Object Detection using Yolov7/inpu_video1.mp4 29.6 MB
~Get Your Files Here !/6 - RealTime Object Detection with YOLOv7tiny/7 - Implementing YOLOv7tiny for Live Video Analysis.mp4 25.9 MB
~Get Your Files Here !/3 - Object Detection Project Overview/Object Detection using Yolov7/traced_model.pt 25.2 MB
~Get Your Files Here !/16 - Tkinter Implementation for RealTime Intrusion Detection/18 - Tkinter Implementation for RealTime Intrusion Detection.mp4 21.8 MB
~Get Your Files Here !/7 - Building a Tkinter GUI for RealTime Object Detection/8 - Integrating YOLOv7tiny with a Tkinter GUI.mp4 17.2 MB
~Get Your Files Here !/1 - Introduction of the Object Detection using yolov7/1 - Course Overview and Features.mp4 12.8 MB
~Get Your Files Here !/3 - Object Detection Project Overview/Object Detection using Yolov7/yolov7-tiny.pt 12.6 MB
~Get Your Files Here !/3 - Object Detection Project Overview/Object Detection using Yolov7/tools/YOLOv7-Dynamic-Batch-TENSORRT.ipynb 12.6 MB
~Get Your Files Here !/2 - Environment Setup for Python Development/2 - Installing Python.mp4 12.0 MB
~Get Your Files Here !/10 - Launching VS Code from the Command Line/Intrusion Detection/intrusion_input2/input.png 10.9 MB
~Get Your Files Here !/12 - Understanding and Setting Up Required Packages/14 - Understanding Key Packages for Intrusion Detection System.mp4 9.9 MB
~Get Your Files Here !/9 - Environment Setup for Python Development/10 - Installing Python.mp4 9.8 MB
~Get Your Files Here !/14 - Key Variables and Their Role in YOLOv8/16 - Understanding and Customizing Key Variables in YOLOv8.mp4 7.8 MB
~Get Your Files Here !/7 - Hazard Analysis Checklist/7 - Hazard Analysis Checklist.mp4 1.1 GB
~Get Your Files Here !/2 - Key Definitions/2 - Key Definitions.mp4 390.3 MB
~Get Your Files Here !/5 - Hazard Identification Control/5 - Hazard Identification Control.mp4 271.6 MB
~Get Your Files Here !/1 - Introduction/1 - Introduction.mp4 264.4 MB
~Get Your Files Here !/8 - Work Permit Issuance Process/8 - Work Permit Issuance Process.mp4 173.1 MB
~Get Your Files Here !/3 - Overview of the work permit forms/3 - Overview of the Four Work Permit Forms.mp4 140.3 MB
~Get Your Files Here !/6 - Atmospheric Gas Testing/6 - Atmospheric Gas Testing.mp4 118.8 MB
~Get Your Files Here !/9 - Renewing extending cancelling and closing work permits/9 - Renewing extending cancelling and closing work permits.mp4 88.6 MB
~Get Your Files Here !/4 - Sections of the Work Permit Forms/4 - Sections of the Work Permit Forms.mp4 35.1 MB
Get Bonus Downloads Here.url 183 Bytes
~Get Your Files Here !/Bonus Resources.txt 70 Bytes
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/3. Cross-Site-Scripting/1. Cross-Site-Scripting - Lecture.mp4 748.2 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/8. Cross Site Request Forgery/1. CSRF - Techniques.mp4 695.8 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/2. All Interesting Tools/1. Tools I Use.mp4 632.4 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/1. Introduction/3. Recon with.mp4 608.7 MB
Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/18. Reconnaissance/8. Active Recon - Port Scanning.mp4 436.1 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/7. Open Redirect Vulnerability/1. Open Redirect Vulnerability with @hemanth1261.mp4 435.9 MB
Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/19. Exploitation/11. SQL Injection _ SQLMap.mp4 417.9 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/1. Introduction/5. Another Recon Video.mp4 398.8 MB
Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/16. Assembly Course/5. Arithmetic.mp4 331.0 MB
Udemy - The Complete Ethical Hacking Course, by Gerri Banfield _ Erman Kirkpatrick/05 How to create a bootable USB of Kali Linux ( optional )/025 How to create a bootable USB of Kali with persistent storage _ 4 GB part 4.mp4 328.9 MB
Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/25. Job Hunting/6. Analyzing the Job Post.mp4 312.1 MB
Udemy - The Complete Ethical Hacking Course, by Gerri Banfield _ Erman Kirkpatrick/04 Set up instructions for Mac users ONLY/021 Kali Linux Live USB on a MacBook Pro part 3 ( OPTIONAL ).mp4 302.6 MB