- Introduction 4
- Lecture1.1
- Lecture1.2
- Lecture1.305 min
- Lecture1.402 min
- Basics 5
- Lecture2.1
- Lecture2.204 min
- Lecture2.309 min
- Lecture2.406 min
- Lecture2.510 min
- Phishing 10
- Lecture3.1
- Lecture3.209 min
- Lecture3.308 min
- Lecture3.405 min
- Lecture3.507 min
- Lecture3.610 min
- Lecture3.709 min
- Lecture3.807 min
- Lecture3.906 min
- Lecture3.1008 min
- Phishing - Bypassing 2 / Multi Factor Authentication (2FA / MFA) 3
- Lecture4.107 min
- Lecture4.206 min
- Lecture4.309 min
- Accessing Cloud Server Desktop 2
- Lecture5.104 min
- Lecture5.210 min
- BitB - Browser In Browser Attack 6
- Lecture6.108 min
- Lecture6.205 min
- Lecture6.308 min
- Lecture6.405 min
- Lecture6.507 min
- Lecture6.6
- Mobile BitB - Mobile Friendly Phishing & 2FA Bypass 4
- Lecture7.109 min
- Lecture7.209 min
- Lecture7.307 min
- Lecture7.407 min
- Multi-BitB Attack 3
- Lecture8.109 min
- Lecture8.207 min
- Lecture8.309 min
- Hacking Web Browsers 8
- Lecture9.1
- Lecture9.213 min
- Lecture9.310 min
- Lecture9.412 min
- Lecture9.505 min
- Lecture9.607 min
- Lecture9.713 min
- Lecture9.805 min
- Command & Control Servers (C2 / C&C) 2
- Lecture10.102 min
- Lecture10.207 min
- Hacking Windows, Linux & Apple Mac OS 5
- Lecture11.108 min
- Lecture11.206 min
- Lecture11.310 min
- Lecture11.407 min
- Lecture11.505 min
- Post Exploitation With StarKiller 6
- Lecture12.109 min
- Lecture12.207 min
- Lecture12.306 min
- Lecture12.405 min
- Lecture12.505 min
- Lecture12.6
- Hacking Windows Using Discord as a C2 4
- Lecture13.105 min
- Lecture13.206 min
- Lecture13.304 min
- Lecture13.408 min
- Windows Post Exploitation via Discord 4
- Lecture14.106 min
- Lecture14.208 min
- Lecture14.306 min
- Lecture14.4
- Creating Windows Trojans 3
- Lecture15.1
- Lecture15.209 min
- Lecture15.303 min
- Creating Apple Mac OS & Linux Trojans 3
- Lecture16.106 min
- Lecture16.212 min
- Lecture16.311 min
- Advanced Malware Delivery 7
- Lecture17.1
- Lecture17.206 min
- Lecture17.306 min
- Lecture17.408 min
- Lecture17.503 min
- Lecture17.607 min
- Lecture17.709 min
- Bonus Section 1
- Lecture18.1
This content is protected, please login and enroll course to view this content!
Cross-Platform Malware Delivery
Prev