{
  "version": "1.2.0",
  "chapters": [
    {
      "title": "Intro - Intro to Using Defense Hacking Tools",
      "startTime": 0,
      "endTime": 108.26,
      "url": "https://youtube.com/live/WWz857uhCrE"
    },
    {
      "title": "Executive Problem Statement",
      "startTime": 108.26,
      "endTime": 208.26
    },
    {
      "title": "First and Foremost",
      "startTime": 208.26,
      "endTime": 633.26
    },
    {
      "title": "Recon & OSINT Tooling",
      "startTime": 633.26,
      "endTime": 1149.26
    },
    {
      "title": "Scan & Enumerate Tooling",
      "startTime": 1149.26,
      "endTime": 1477.26
    },
    {
      "title": "Vulnerability Scanning",
      "startTime": 1477.26,
      "endTime": 1637.26
    },
    {
      "title": "Vulnerability Exploitation",
      "startTime": 1637.26,
      "endTime": 1907.26
    },
    {
      "title": "Web Applications",
      "startTime": 1907.26,
      "endTime": 2167.26
    },
    {
      "title": "Local System Tooling",
      "startTime": 2167.26,
      "endTime": 2283.26
    },
    {
      "title": "Password Spraying/Cred Abuse",
      "startTime": 2283.26,
      "endTime": 2499.26
    },
    {
      "title": "Active Directory",
      "startTime": 2499.26,
      "endTime": 2975.26
    },
    {
      "title": "Proxy Chains / SSH Tunnels",
      "startTime": 2975.26,
      "endTime": 3018.26
    },
    {
      "title": "SMB File Shares",
      "startTime": 3018.26,
      "endTime": 3095.26
    },
    {
      "title": "Kerberos Interaction",
      "startTime": 3095.26,
      "endTime": 3159.26
    },
    {
      "title": "Impacket Tools",
      "startTime": 3159.26,
      "endTime": 3244.26
    },
    {
      "title": "Pre-Windows 2000",
      "startTime": 3244.26,
      "endTime": 3322.26
    },
    {
      "title": "Credential Relay (and LLMNR)",
      "startTime": 3322.26,
      "endTime": 3404.26
    },
    {
      "title": "ADCS Investigation & Abuse",
      "startTime": 3404.26,
      "endTime": 3437.26
    },
    {
      "title": "Browser Hijacks",
      "startTime": 3437.26,
      "endTime": 3494.26
    },
    {
      "title": "We Have a Class - Active Directory Security and Hardening",
      "startTime": 3494.26,
      "endTime": 3533.26,
      "url": "https://www.antisyphontraining.com/product/active-directory-security-and-hardening-with-jordan-drysdale-and-kent-ickler/"
    },
    {
      "title": "Q&A Start",
      "startTime": 3533.26,
      "endTime": 3613.26
    },
    {
      "title": "How Do you Build These Skills?",
      "startTime": 3613.26,
      "endTime": 3728.26
    },
    {
      "title": "When Did You Start Feeling Comfortable with Your Skillset?",
      "startTime": 3728.26,
      "endTime": 3983.26
    },
    {
      "title": "Getting a Company to Approve Running These Tools?",
      "startTime": 3983.26,
      "endTime": 4130.26
    },
    {
      "title": "HIPPA Approved Tools?",
      "startTime": 4130.26,
      "endTime": 4266.26
    },
    {
      "title": "Training for an Organization?",
      "startTime": 4266.26,
      "endTime": 4343.26
    },
    {
      "title": "Finding Entry Level Jobs",
      "startTime": 4343.26,
      "endTime": 4498.26
    },
    {
      "title": "Closing Remarks",
      "startTime": 4498.26,
      "endTime": 4625.26
    }
  ]
}