{
  "version": "1.2.0",
  "chapters": [
    {
      "title": "- Intro\r",
      "startTime": 0,
      "endTime": 91
    },
    {
      "title": "- Why do Hackers do it?\r",
      "startTime": 91,
      "endTime": 503
    },
    {
      "title": "- What do Ethical Hackers do?\r",
      "startTime": 503,
      "endTime": 598
    },
    {
      "title": "- Hottest sectors for hackers in India\r",
      "startTime": 598,
      "endTime": 838
    },
    {
      "title": "- How to Stay Safe from Hacking\r",
      "startTime": 838,
      "endTime": 1338
    },
    {
      "title": "- Hacking is Easy!\r",
      "startTime": 1338,
      "endTime": 1754
    },
    {
      "title": "- Difference between Scam and Hacking\r",
      "startTime": 1754,
      "endTime": 2015
    },
    {
      "title": "- Qishing = QR Code Fishing!\r",
      "startTime": 2015,
      "endTime": 2113
    },
    {
      "title": "- Domino effect on a Corporate Device\r",
      "startTime": 2113,
      "endTime": 2435
    },
    {
      "title": "- Avoid these mistakes\r",
      "startTime": 2435,
      "endTime": 3350
    },
    {
      "title": "- Are Laptop & Phone Cameras Safe?\r",
      "startTime": 3350,
      "endTime": 3494
    },
    {
      "title": "- Why you should update your phone\r",
      "startTime": 3494,
      "endTime": 3635
    },
    {
      "title": "- CCTV Cameras in Homes. Safe or not?\r",
      "startTime": 3635,
      "endTime": 3737
    },
    {
      "title": "- MUST WATCH: Don't record private moments\r",
      "startTime": 3737,
      "endTime": 3869
    },
    {
      "title": "- Do this if you get hacked\r",
      "startTime": 3869,
      "endTime": 3936
    },
    {
      "title": "- Rapid Fire",
      "startTime": 3936,
      "endTime": 0
    }
  ]
}