Filename | Size |
| 00.The-Truth-About-Living-in-a-Technology-Based-World/00.Introduction.mp4 | 7.8 MB |
| 00.The-Truth-About-Living-in-a-Technology-Based-World/00.Introduction.mp4.srt | 5.4 KB |
| 00.The-Truth-About-Living-in-a-Technology-Based-World/01.How-Protected-Do-You-Feel.mp4 | 32.4 MB |
| 00.The-Truth-About-Living-in-a-Technology-Based-World/01.How-Protected-Do-You-Feel.mp4.srt | 2.6 KB |
| 00.The-Truth-About-Living-in-a-Technology-Based-World/clips-info.json | 513 B |
| 00.The-Truth-About-Living-in-a-Technology-Based-World/module-info.json | 346 B |
| 01.Overview-of-the-CEH-Certification-Program/00.Overview-of-the-CEH-Certification-Program.mp4 | 3.3 MB |
| 01.Overview-of-the-CEH-Certification-Program/00.Overview-of-the-CEH-Certification-Program.mp4.srt | 2.5 KB |
| 01.Overview-of-the-CEH-Certification-Program/01.What-Certification-Brings-You.mp4 | 2.6 MB |
| 01.Overview-of-the-CEH-Certification-Program/01.What-Certification-Brings-You.mp4.srt | 1.8 KB |
| 01.Overview-of-the-CEH-Certification-Program/02.Should-I-Watch-This-Series.mp4 | 9 MB |
| 01.Overview-of-the-CEH-Certification-Program/02.Should-I-Watch-This-Series.mp4.srt | 6.4 KB |
| 01.Overview-of-the-CEH-Certification-Program/03.Whats-Expected-of-You.mp4 | 17 MB |
| 01.Overview-of-the-CEH-Certification-Program/03.Whats-Expected-of-You.mp4.srt | 12.4 KB |
| 01.Overview-of-the-CEH-Certification-Program/04.Review-the-CCA.mp4 | 3.2 MB |
| 01.Overview-of-the-CEH-Certification-Program/04.Review-the-CCA.mp4.srt | 2.7 KB |
| 01.Overview-of-the-CEH-Certification-Program/clips-info.json | 1.3 KB |
| 01.Overview-of-the-CEH-Certification-Program/module-info.json | 329 B |
| 02.How-to-Build-a-Lab-to-Hack-Safely/00.Overview-How-to-Build-a-Lab-to-Hack-Safely.mp4 | 19.5 MB |
| 02.How-to-Build-a-Lab-to-Hack-Safely/00.Overview-How-to-Build-a-Lab-to-Hack-Safely.mp4.srt | 17.7 KB |
| 02.How-to-Build-a-Lab-to-Hack-Safely/01.The-Host-Machine.mp4 | 21.9 MB |
| 02.How-to-Build-a-Lab-to-Hack-Safely/01.The-Host-Machine.mp4.srt | 8.9 KB |
| 02.How-to-Build-a-Lab-to-Hack-Safely/02.Installing-The-Host-Machine.mp4 | 41.7 MB |
| 02.How-to-Build-a-Lab-to-Hack-Safely/02.Installing-The-Host-Machine.mp4.srt | 26.2 KB |
| 02.How-to-Build-a-Lab-to-Hack-Safely/03.Summary.mp4 | 1.8 MB |
| 02.How-to-Build-a-Lab-to-Hack-Safely/03.Summary.mp4.srt | 2.1 KB |
| 02.How-to-Build-a-Lab-to-Hack-Safely/clips-info.json | 1 KB |
| 02.How-to-Build-a-Lab-to-Hack-Safely/module-info.json | 313 B |
| 03.Installing-and-Configuring-Your-Windows-Server-VMs/00.Introduction.mp4 | 2.6 MB |
| 03.Installing-and-Configuring-Your-Windows-Server-VMs/00.Introduction.mp4.srt | 2.3 KB |
| 03.Installing-and-Configuring-Your-Windows-Server-VMs/01.Virtual-Machine-Server-2012R2.mp4 | 75.9 MB |
| 03.Installing-and-Configuring-Your-Windows-Server-VMs/01.Virtual-Machine-Server-2012R2.mp4.srt | 33.6 KB |
| 03.Installing-and-Configuring-Your-Windows-Server-VMs/02.Virtual-Machine-Server-2008R2.mp4 | 53.8 MB |
| 03.Installing-and-Configuring-Your-Windows-Server-VMs/02.Virtual-Machine-Server-2008R2.mp4.srt | 20.8 KB |
| 03.Installing-and-Configuring-Your-Windows-Server-VMs/03.Summary.mp4 | 965.5 KB |
| 03.Installing-and-Configuring-Your-Windows-Server-VMs/03.Summary.mp4.srt | 882 B |
| 03.Installing-and-Configuring-Your-Windows-Server-VMs/clips-info.json | 1 KB |
| 03.Installing-and-Configuring-Your-Windows-Server-VMs/module-info.json | 347 B |
| 04.Installing-and-Configuring-Your-Desktop-VMs/00.Introduction.mp4 | 2.9 MB |
| 04.Installing-and-Configuring-Your-Desktop-VMs/00.Introduction.mp4.srt | 2.4 KB |
| 04.Installing-and-Configuring-Your-Desktop-VMs/01.Virtual-Machine-Windows-81.mp4 | 56.4 MB |
| 04.Installing-and-Configuring-Your-Desktop-VMs/01.Virtual-Machine-Windows-81.mp4.srt | 20.6 KB |
| 04.Installing-and-Configuring-Your-Desktop-VMs/02.Virtual-Machine-Windows-7.mp4 | 44.9 MB |
| 04.Installing-and-Configuring-Your-Desktop-VMs/02.Virtual-Machine-Windows-7.mp4.srt | 16.9 KB |
| 04.Installing-and-Configuring-Your-Desktop-VMs/03.Virtual-Machine-Kali.mp4 | 35.1 MB |
| 04.Installing-and-Configuring-Your-Desktop-VMs/03.Virtual-Machine-Kali.mp4.srt | 15 KB |
| 04.Installing-and-Configuring-Your-Desktop-VMs/04.Virtual-Machine-Housekeeping.mp4 | 36.1 MB |
| 04.Installing-and-Configuring-Your-Desktop-VMs/04.Virtual-Machine-Housekeeping.mp4.srt | 16.7 KB |
| 04.Installing-and-Configuring-Your-Desktop-VMs/05.Summary.mp4 | 1.9 MB |
| 04.Installing-and-Configuring-Your-Desktop-VMs/05.Summary.mp4.srt | 2.1 KB |
| 04.Installing-and-Configuring-Your-Desktop-VMs/clips-info.json | 1.5 KB |
| 04.Installing-and-Configuring-Your-Desktop-VMs/module-info.json | 333 B |
| 05.Information-Security-Overview/00.Information-Security-Overview.mp4 | 4.1 MB |
| 05.Information-Security-Overview/00.Information-Security-Overview.mp4.srt | 2.4 KB |
| 05.Information-Security-Overview/01.Hacking-vs-Ethical-Hacking.mp4 | 5.3 MB |
| 05.Information-Security-Overview/01.Hacking-vs-Ethical-Hacking.mp4.srt | 6.3 KB |
| 05.Information-Security-Overview/02.Fundamentals-of-Information-Security.mp4 | 5.1 MB |
| 05.Information-Security-Overview/02.Fundamentals-of-Information-Security.mp4.srt | 5.6 KB |
| 05.Information-Security-Overview/03.Speak-like-a-Hacker.mp4 | 10 MB |
| 05.Information-Security-Overview/03.Speak-like-a-Hacker.mp4.srt | 8.4 KB |
| 05.Information-Security-Overview/04.The-Technology-Triangle.mp4 | 4.8 MB |
| 05.Information-Security-Overview/04.The-Technology-Triangle.mp4.srt | 4.2 KB |
| 05.Information-Security-Overview/05.Summary.mp4 | 2.7 MB |
| 05.Information-Security-Overview/05.Summary.mp4.srt | 2.8 KB |
| 05.Information-Security-Overview/clips-info.json | 1.5 KB |
| 05.Information-Security-Overview/module-info.json | 305 B |
| 06.Security-Threats-and-Attack-Vectors/00.Overview-of-Threats-and-Attack-Vectors.mp4 | 3.8 MB |
| 06.Security-Threats-and-Attack-Vectors/00.Overview-of-Threats-and-Attack-Vectors.mp4.srt | 4.5 KB |
| 06.Security-Threats-and-Attack-Vectors/01.Threats-Hosts.mp4 | 9.6 MB |
| 06.Security-Threats-and-Attack-Vectors/01.Threats-Hosts.mp4.srt | 12.3 KB |
| 06.Security-Threats-and-Attack-Vectors/02.Threats-Natural--Physical.mp4 | 11.1 MB |
| 06.Security-Threats-and-Attack-Vectors/02.Threats-Natural--Physical.mp4.srt | 8.7 KB |
| 06.Security-Threats-and-Attack-Vectors/03.Threats-Applications.mp4 | 7.9 MB |
| 06.Security-Threats-and-Attack-Vectors/03.Threats-Applications.mp4.srt | 9 KB |
| 06.Security-Threats-and-Attack-Vectors/04.Threats-Human.mp4 | 9.8 MB |
| 06.Security-Threats-and-Attack-Vectors/04.Threats-Human.mp4.srt | 8.8 KB |
| 06.Security-Threats-and-Attack-Vectors/05.Threats-Networks.mp4 | 4 MB |
| 06.Security-Threats-and-Attack-Vectors/05.Threats-Networks.mp4.srt | 3.9 KB |
| 06.Security-Threats-and-Attack-Vectors/06.Threats-Where-Do-They-Come-From.mp4 | 4.3 MB |
| 06.Security-Threats-and-Attack-Vectors/06.Threats-Where-Do-They-Come-From.mp4.srt | 6.9 KB |
| 06.Security-Threats-and-Attack-Vectors/07.Attack-Vectors.mp4 | 12.3 MB |
| 06.Security-Threats-and-Attack-Vectors/07.Attack-Vectors.mp4.srt | 14.9 KB |
| 06.Security-Threats-and-Attack-Vectors/08.IPv6-Issues.mp4 | 9.6 MB |
| 06.Security-Threats-and-Attack-Vectors/08.IPv6-Issues.mp4.srt | 11.7 KB |
| 06.Security-Threats-and-Attack-Vectors/09.Summary-of-Threats-and-Attack-Vectors.mp4 | 1.6 MB |
| 06.Security-Threats-and-Attack-Vectors/09.Summary-of-Threats-and-Attack-Vectors.mp4.srt | 2.6 KB |
| 06.Security-Threats-and-Attack-Vectors/clips-info.json | 2.5 KB |
| 06.Security-Threats-and-Attack-Vectors/module-info.json | 317 B |
| 07.Hacking-Concepts/00.Overview-of-Hacking-Concepts.mp4 | 3.6 MB |
| 07.Hacking-Concepts/00.Overview-of-Hacking-Concepts.mp4.srt | 3.7 KB |
| 07.Hacking-Concepts/01.Hacking-Defined.mp4 | 2.2 MB |
| 07.Hacking-Concepts/01.Hacking-Defined.mp4.srt | 1.3 KB |
| 07.Hacking-Concepts/02.History-of-Hacking-In-the-Beginning.mp4 | 10.4 MB |
| 07.Hacking-Concepts/02.History-of-Hacking-In-the-Beginning.mp4.srt | 7.2 KB |
| 07.Hacking-Concepts/03.History-of-Hacking-Currently.mp4 | 8 MB |
| 07.Hacking-Concepts/03.History-of-Hacking-Currently.mp4.srt | 9.6 KB |
| 07.Hacking-Concepts/04.Ethical-Hacking-Defined.mp4 | 11.6 MB |
| 07.Hacking-Concepts/04.Ethical-Hacking-Defined.mp4.srt | 9 KB |
| 07.Hacking-Concepts/05.What-Skills-Should-an-Ethical-Hacker-Have.mp4 | 7 MB |