TorBT - Torrents and Magnet Links Search Engine

[ DevCourseWeb.com ] Udemy - Ultimate Cybersecurity - Uncovering Hacker Strategies

File Name
Size
Get Bonus Downloads Here.url
182 B
~Get Your Files Here !/1 - Introduction/1 - Introduction Video.mp4
42 MB
~Get Your Files Here !/1 - Introduction/2 - 11 Course Overview.mp4
43 MB
~Get Your Files Here !/1 - Introduction/3 - 12 Importance of Cybersecurity.mp4
51 MB
~Get Your Files Here !/1 - Introduction/4 - 13 Course Objectives and Expectations.mp4
47 MB
~Get Your Files Here !/2 - Fundamentals of Cybersecurity/5 - Fundamentals of Cybersecurity Video.mp4
29 MB
~Get Your Files Here !/2 - Fundamentals of Cybersecurity/6 - 21 Key Concepts and Terminologies.mp4
57 MB
~Get Your Files Here !/2 - Fundamentals of Cybersecurity/7 - 22 Understanding Threats Vulnerabilities and Risks.mp4
62 MB
~Get Your Files Here !/2 - Fundamentals of Cybersecurity/8 - 23 The CIA Triad Confidentiality Integrity Availability.mp4
46 MB
~Get Your Files Here !/3 - Common Hacker Strategies/10 - 31 Social Engineering Attacks.mp4
54 MB
~Get Your Files Here !/3 - Common Hacker Strategies/11 - 311 Phishing.mp4
59 MB
~Get Your Files Here !/3 - Common Hacker Strategies/12 - 312 Pretexting.mp4
62 MB
~Get Your Files Here !/3 - Common Hacker Strategies/13 - 313 Baiting.mp4
56 MB
~Get Your Files Here !/3 - Common Hacker Strategies/14 - 32 Malware Attacks.mp4
67 MB
~Get Your Files Here !/3 - Common Hacker Strategies/15 - 321 Viruses.mp4
59 MB
~Get Your Files Here !/3 - Common Hacker Strategies/16 - 322 Worms.mp4
62 MB
~Get Your Files Here !/3 - Common Hacker Strategies/17 - 323 Ransomware.mp4
59 MB
~Get Your Files Here !/3 - Common Hacker Strategies/18 - 33 Networkbased Attacks.mp4
64 MB
~Get Your Files Here !/3 - Common Hacker Strategies/19 - 331 ManintheMiddle.mp4
58 MB
~Get Your Files Here !/3 - Common Hacker Strategies/20 - 332 Denial of Service DoS.mp4
61 MB
~Get Your Files Here !/3 - Common Hacker Strategies/21 - 333 Distributed Denial of Service DDoS.mp4
65 MB
~Get Your Files Here !/3 - Common Hacker Strategies/22 - 34 Exploiting Vulnerabilities.mp4
64 MB
~Get Your Files Here !/3 - Common Hacker Strategies/23 - 341 SQL Injection.mp4
59 MB
~Get Your Files Here !/3 - Common Hacker Strategies/24 - 342 CrossSite Scripting XSS.mp4
67 MB
~Get Your Files Here !/3 - Common Hacker Strategies/25 - 343 ZeroDay Exploits.mp4
67 MB
~Get Your Files Here !/3 - Common Hacker Strategies/9 - Common Hacker Strategies Video.mp4
54 MB
~Get Your Files Here !/4 - Cybersecurity Best Practices/26 - Cybersecurity Best Practices Video.mp4
64 MB
~Get Your Files Here !/4 - Cybersecurity Best Practices/27 - 41 Implementing Strong Password Policies.mp4
61 MB
~Get Your Files Here !/4 - Cybersecurity Best Practices/28 - 42 Regular Software Updates and Patch Management.mp4
63 MB
~Get Your Files Here !/4 - Cybersecurity Best Practices/29 - 43 MultiFactor Authentication MFA.mp4
69 MB
~Get Your Files Here !/4 - Cybersecurity Best Practices/30 - 44 Data Encryption and Secure Communication.mp4
74 MB
~Get Your Files Here !/4 - Cybersecurity Best Practices/31 - 45 Network Security Measures.mp4
74 MB
~Get Your Files Here !/4 - Cybersecurity Best Practices/32 - 451 Firewalls.mp4
76 MB
~Get Your Files Here !/4 - Cybersecurity Best Practices/33 - 452 Intrusion Detection and Prevention Systems IDPS.mp4
79 MB
~Get Your Files Here !/4 - Cybersecurity Best Practices/34 - 453 Virtual Private Networks VPNs.mp4
76 MB
~Get Your Files Here !/5 - Incident Response and Recovery/35 - Incident Response and Recovery Video.mp4
76 MB
~Get Your Files Here !/5 - Incident Response and Recovery/36 - 51 Creating an Incident Response Plan.html
8.6 kB
~Get Your Files Here !/5 - Incident Response and Recovery/37 - 52 Identifying and Analyzing Security Incidents.mp4
76 MB
~Get Your Files Here !/5 - Incident Response and Recovery/38 - 53 Containment Eradication and Recovery.mp4
63 MB
~Get Your Files Here !/5 - Incident Response and Recovery/39 - 54 PostIncident Review and Lessons Learned.mp4
64 MB
~Get Your Files Here !/6 - Cybersecurity Laws Regulations and Compliance/40 - Cybersecurity Laws Regulations and Compliance Video.mp4
81 MB
~Get Your Files Here !/6 - Cybersecurity Laws Regulations and Compliance/41 - 61 Understanding Data Privacy Laws.mp4
74 MB
~Get Your Files Here !/6 - Cybersecurity Laws Regulations and Compliance/42 - 62 Compliance with Industry Standards.mp4
79 MB
~Get Your Files Here !/6 - Cybersecurity Laws Regulations and Compliance/43 - 621 GDPR.html
3.3 kB
~Get Your Files Here !/6 - Cybersecurity Laws Regulations and Compliance/44 - 622 HIPAA.html
2.6 kB
~Get Your Files Here !/6 - Cybersecurity Laws Regulations and Compliance/45 - 623 PCI DSS.html
2.9 kB
~Get Your Files Here !/6 - Cybersecurity Laws Regulations and Compliance/46 - 63 Cybersecurity Frameworks.mp4
76 MB
~Get Your Files Here !/6 - Cybersecurity Laws Regulations and Compliance/47 - 631 NIST.html
3.3 kB
~Get Your Files Here !/6 - Cybersecurity Laws Regulations and Compliance/48 - 632 ISOIEC 27001.html
3.2 kB
~Get Your Files Here !/7 - Cybersecurity Tools and Resources/49 - Cybersecurity Tools and Resources Video.mp4
75 MB
~Get Your Files Here !/7 - Cybersecurity Tools and Resources/50 - 71 Security Assessment and Testing Tools.mp4
76 MB
~Get Your Files Here !/7 - Cybersecurity Tools and Resources/51 - 72 OpenSource Security Tools.mp4
75 MB
~Get Your Files Here !/7 - Cybersecurity Tools and Resources/52 - 73 Monitoring and Logging Tools.mp4
78 MB
~Get Your Files Here !/7 - Cybersecurity Tools and Resources/53 - 74 Essential Security Resources and Communities.html
8.4 kB
~Get Your Files Here !/8 - Conclusion/54 - Conclusion Video.mp4
73 MB
~Get Your Files Here !/8 - Conclusion/55 - 81 Course Summary.mp4
74 MB
~Get Your Files Here !/8 - Conclusion/56 - 82 Staying Informed and UptoDate.mp4
95 MB
~Get Your Files Here !/8 - Conclusion/57 - 83 Next Steps for Advancing Your Cybersecurity Knowledge.mp4
88 MB
~Get Your Files Here !/9 - Supplementary Materials/58 - Glossary of Cybersecurity Terms.html
9.8 kB
~Get Your Files Here !/9 - Supplementary Materials/59 - Security Incident Response Plan Template.html
5.8 kB
~Get Your Files Here !/9 - Supplementary Materials/60 - List of Recommended Cybersecurity Books and Online Resources.html
2.6 kB
~Get Your Files Here !/9 - Supplementary Materials/61 - Practical Exercises and Case Studies.html
9.3 kB
~Get Your Files Here !/9 - Supplementary Materials/62 - Assessment Cybersecurity Quiz.html
30 kB
~Get Your Files Here !/Bonus Resources.txt
386 B