TorBT - Torrents and Magnet Links Search Engine
Cyber Security The Ultimate Beginner's Handbook
- Date: 2026-04-26
- Size: 718 MB
- Files: 186
File Name
Size
1. Introduction to Cyber Security/1. Introduction.mp4
8.2 MB
.pad/304376
297 kB
1. Introduction to Cyber Security/1. Introduction.srt
2.0 kB
.pad/522208
510 kB
1. Introduction to Cyber Security/2. What is cyber security.mp4
18 MB
.pad/313084
306 kB
1. Introduction to Cyber Security/2. What is cyber security.srt
1.9 kB
.pad/522294
510 kB
1. Introduction to Cyber Security/3. Why you need to learn.mp4
5.8 MB
.pad/182020
178 kB
1. Introduction to Cyber Security/3. Why you need to learn.srt
1.1 kB
.pad/523159
511 kB
1. Introduction to Cyber Security/4. What is Computer, Information and Cyber Security.mp4
11 MB
.pad/96228
94 kB
1. Introduction to Cyber Security/4. What is Computer, Information and Cyber Security.srt
1.1 kB
.pad/523163
511 kB
1. Introduction to Cyber Security/5. Basic Principles of Information Security.mp4
10 MB
.pad/28072
27 kB
1. Introduction to Cyber Security/5. Basic Principles of Information Security.srt
2.3 kB
.pad/521984
510 kB
1. Introduction to Cyber Security/6. Security Controls.mp4
17 MB
.pad/241212
236 kB
1. Introduction to Cyber Security/6. Security Controls.srt
3.4 kB
.pad/520787
509 kB
1. Introduction to Cyber Security/7. Information Assets and Asset Owners.mp4
4.3 MB
.pad/208284
203 kB
1. Introduction to Cyber Security/7. Information Assets and Asset Owners.srt
928 B
.pad/523360
511 kB
2. Cyber Security Threats/1. Introduction to Cyber Security Threats.mp4
5.0 MB
.pad/516140
504 kB
2. Cyber Security Threats/1. Introduction to Cyber Security Threats.srt
904 B
.pad/523384
511 kB
2. Cyber Security Threats/10. SPAM.mp4
5.0 MB
.pad/39040
38 kB
2. Cyber Security Threats/10. SPAM.srt
1.4 kB
.pad/522813
511 kB
2. Cyber Security Threats/11. Social Hacking.mp4
8.8 MB
.pad/230072
225 kB
2. Cyber Security Threats/11. Social Hacking.srt
1.6 kB
.pad/522676
510 kB
2. Cyber Security Threats/12. Unpatched Software.mp4
7.1 MB
.pad/374024
365 kB
2. Cyber Security Threats/12. Unpatched Software.srt
1.3 kB
.pad/522945
511 kB
2. Cyber Security Threats/13. Eaves Dropping.mp4
5.1 MB
.pad/389428
380 kB
2. Cyber Security Threats/13. Eaves Dropping.srt
1.5 kB
.pad/522779
510 kB
2. Cyber Security Threats/2. Hackers and Predators.mp4
20 MB
.pad/20844
20 kB
2. Cyber Security Threats/2. Hackers and Predators.srt
2.0 kB
.pad/522268
510 kB
2. Cyber Security Threats/3. Malware, Spyware and Ransomware.mp4
22 MB
.pad/478780
468 kB
2. Cyber Security Threats/3. Malware, Spyware and Ransomware.srt
4.1 kB
.pad/520060
508 kB
2. Cyber Security Threats/4. Keyloggers and Trojan Horse.mp4
14 MB
.pad/18176
18 kB
2. Cyber Security Threats/4. Keyloggers and Trojan Horse.srt
2.2 kB
.pad/522061
510 kB
2. Cyber Security Threats/5. Bot and Botnets.mp4
8.2 MB
.pad/267528
261 kB
2. Cyber Security Threats/5. Bot and Botnets.srt
1.2 kB
.pad/523026
511 kB
2. Cyber Security Threats/6. DDoS (Distributed Denial of Service).mp4
7.2 MB
.pad/347516
339 kB
2. Cyber Security Threats/6. DDoS (Distributed Denial of Service).srt
1.5 kB
.pad/522800
510 kB
2. Cyber Security Threats/7. Image Spam.mp4
5.2 MB
.pad/349948
342 kB
2. Cyber Security Threats/7. Image Spam.srt
1.2 kB
.pad/523050
511 kB
2. Cyber Security Threats/8. Phishing.mp4
8.5 MB
.pad/12412
12 kB
2. Cyber Security Threats/8. Phishing.srt
1.9 kB
.pad/522346
510 kB
2. Cyber Security Threats/9. Pharming.mp4
14 MB
.pad/483432
472 kB
2. Cyber Security Threats/9. Pharming.srt
2.2 kB
.pad/521987
510 kB
3. Mitigate Cyber Security Risks and Protect your Data/1. Introduction.mp4
7.0 MB
.pad/488516
477 kB
3. Mitigate Cyber Security Risks and Protect your Data/1. Introduction.srt
1.8 kB
.pad/522453
510 kB
3. Mitigate Cyber Security Risks and Protect your Data/2. Keep Software up-to-date.mp4
14 MB
.pad/469664
459 kB
3. Mitigate Cyber Security Risks and Protect your Data/2. Keep Software up-to-date.srt
1.8 kB
.pad/522406
510 kB
3. Mitigate Cyber Security Risks and Protect your Data/3. Install Antivirus protection software.mp4
16 MB
.pad/333000
325 kB
3. Mitigate Cyber Security Risks and Protect your Data/3. Install Antivirus protection software.srt
1.8 kB
.pad/522401
510 kB
3. Mitigate Cyber Security Risks and Protect your Data/4. Backup critical data.mp4
26 MB
.pad/282864
276 kB
3. Mitigate Cyber Security Risks and Protect your Data/4. Backup critical data.srt
1.6 kB
.pad/522692
510 kB
3. Mitigate Cyber Security Risks and Protect your Data/5. Educate the Employees.mp4
6.8 MB
.pad/161628
158 kB
3. Mitigate Cyber Security Risks and Protect your Data/5. Educate the Employees.srt
1.7 kB
.pad/522579
510 kB
3. Mitigate Cyber Security Risks and Protect your Data/6. Cyber Security Policies for Employees.mp4
16 MB
.pad/490776
479 kB
3. Mitigate Cyber Security Risks and Protect your Data/6. Cyber Security Policies for Employees.srt
2.6 kB
.pad/521675
509 kB
3. Mitigate Cyber Security Risks and Protect your Data/7. Outsourcing key cyber security functions.mp4
6.9 MB
.pad/148844
145 kB
3. Mitigate Cyber Security Risks and Protect your Data/7. Outsourcing key cyber security functions.srt
1.5 kB
.pad/522723
510 kB
3. Mitigate Cyber Security Risks and Protect your Data/8. Secure your Infra Structure.mp4
5.9 MB
.pad/75612
74 kB
3. Mitigate Cyber Security Risks and Protect your Data/8. Secure your Infra Structure.srt
1.3 kB
.pad/522912
511 kB
3. Mitigate Cyber Security Risks and Protect your Data/9. Implement MFA (Multi Factor Authentication).mp4
41 MB
.pad/462256
451 kB
3. Mitigate Cyber Security Risks and Protect your Data/9. Implement MFA (Multi Factor Authentication).srt
3.8 kB
.pad/520396
508 kB
4. Be Safe and Vigilant/1. Introduction.mp4
8.1 MB
.pad/469252
458 kB
4. Be Safe and Vigilant/1. Introduction.srt
1.2 kB
.pad/523053
511 kB
4. Be Safe and Vigilant/10. Parenting in Digital Age.mp4
16 MB
.pad/101616
99 kB
4. Be Safe and Vigilant/10. Parenting in Digital Age.srt
2.9 kB
.pad/521311
509 kB
4. Be Safe and Vigilant/11. Cyber Bullying Cyber Harassment.mp4
52 MB
.pad/502980
491 kB
4. Be Safe and Vigilant/11. Cyber Bullying Cyber Harassment.srt
2.7 kB
.pad/521574
509 kB
4. Be Safe and Vigilant/12. Other Cyber Security Hygiene.mp4
12 MB
.pad/50976
50 kB
4. Be Safe and Vigilant/12. Other Cyber Security Hygiene.srt
2.3 kB
.pad/521983
510 kB
4. Be Safe and Vigilant/2. Browser Safety Threats.mp4
22 MB
.pad/32424
32 kB
4. Be Safe and Vigilant/2. Browser Safety Threats.srt
4.0 kB
.pad/520198
508 kB
4. Be Safe and Vigilant/3. Email.mp4
19 MB
.pad/245360
240 kB
4. Be Safe and Vigilant/3. Email.srt
3.3 kB
.pad/520925
509 kB
4. Be Safe and Vigilant/4. Online Ticket Booking.mp4
20 MB
.pad/413864
404 kB
4. Be Safe and Vigilant/4. Online Ticket Booking.srt
2.6 kB
.pad/521658
509 kB
4. Be Safe and Vigilant/5. Online Banking.mp4
20 MB
.pad/359012
351 kB
4. Be Safe and Vigilant/5. Online Banking.srt
3.4 kB
.pad/520808
509 kB
4. Be Safe and Vigilant/6. Social Media like Facebook, whtsapp.mp4
12 MB
.pad/254436
248 kB
4. Be Safe and Vigilant/6. Social Media like Facebook, whtsapp.srt
3.3 kB
.pad/520878
509 kB
4. Be Safe and Vigilant/7. Digital Wallets.mp4
28 MB
.pad/397180
388 kB
4. Be Safe and Vigilant/7. Digital Wallets.srt
2.1 kB
.pad/522122
510 kB
4. Be Safe and Vigilant/8. Online Games.mp4
19 MB
.pad/78372
76 kB
4. Be Safe and Vigilant/8. Online Games.srt
3.7 kB
.pad/520508
508 kB
4. Be Safe and Vigilant/9. Mobile Safety.mp4
29 MB
.pad/476616
465 kB
4. Be Safe and Vigilant/9. Mobile Safety.srt
4.0 kB
.pad/520144
508 kB
5. Business Continuity Planning and Disaster Recovery/1. Introduction.mp4
7.8 MB
.pad/243132
237 kB
5. Business Continuity Planning and Disaster Recovery/1. Introduction.srt
1.2 kB
.pad/523068
511 kB
5. Business Continuity Planning and Disaster Recovery/2. Business Continuity Planning.mp4
9.7 MB
.pad/269652
263 kB
5. Business Continuity Planning and Disaster Recovery/2. Business Continuity Planning.srt
1.7 kB
.pad/522525
510 kB
5. Business Continuity Planning and Disaster Recovery/3. Disaster Recovery.mp4
12 MB
.pad/448972
438 kB
5. Business Continuity Planning and Disaster Recovery/3. Disaster Recovery.srt
2.1 kB
.pad/522116
510 kB
5. Business Continuity Planning and Disaster Recovery/4. Data Backup, Storage, Restoration.mp4
43 MB
.pad/165936
162 kB
5. Business Continuity Planning and Disaster Recovery/4. Data Backup, Storage, Restoration.srt
2.4 kB
.pad/521801
510 kB
6. Gifts/1. Highly demandable Cyber Security Jobs.mp4
10 MB
.pad/93640
91 kB
6. Gifts/1. Highly demandable Cyber Security Jobs.srt
823 B
.pad/523465
511 kB
6. Gifts/Resources
41 B
.pad/524247
512 kB