TorBT - Torrents and Magnet Links Search Engine

Certified_Ethical_Hacker_(CEH)_-_Linux_Academy_AcloudGuru

File Name
Size
05_Protecting_Information/015_Data_Backup.mp4
223 MB
01_Getting_Started/001_Certified_Ethical_Hacker_(CEH)_-_Linux_Academys_Prep_Course_PDF.pdf
5.5 MB
01_Getting_Started/001_Module_1.docx
1.1 MB
01_Getting_Started/001_Module_2.docx
24 kB
01_Getting_Started/001_Module_3.docx
17 kB
01_Getting_Started/001_Module_4.docx
28 kB
01_Getting_Started/001_Module_5.docx
22 kB
01_Getting_Started/001_Module_6.docx
20 kB
01_Getting_Started/001_Module_7.docx
21 kB
01_Getting_Started/001_Module_8.docx
36 kB
01_Getting_Started/001_Module_9.docx
20 kB
01_Getting_Started/002_About_the_Author.mp4
23 MB
01_Getting_Started/003_Course_Requirements.mp4
56 MB
01_Getting_Started/004_How_to_Get_Help.mp4
71 MB
01_Getting_Started/005_About_the_Exam.mp4
134 MB
02_Overview_of_Information_Security/001_Chapter_Introduction.mp4
28 MB
02_Overview_of_Information_Security/002_Common_Terms_(Hack_Value_Vulnerability_Exploit_Payload).mp4
62 MB
02_Overview_of_Information_Security/003_Zero_Day_Attack.mp4
64 MB
02_Overview_of_Information_Security/004_Daisy_Chaining.mp4
86 MB
02_Overview_of_Information_Security/005_Module_1_Study_Guide.docx
1.1 MB
02_Overview_of_Information_Security/005_QUIZ_SOLUTION_Overview_of_Information_Security_-_Questions_answered_and_explained.mp4
58 MB
03_Overview_of_Information_Security_Threats_and_Attacks/001_Chapter_Introduction.mp4
8.8 MB
03_Overview_of_Information_Security_Threats_and_Attacks/002_Threats_vs_Attacks.mp4
29 MB
03_Overview_of_Information_Security_Threats_and_Attacks/003_Motives_and_Reasons_Behind_Cyber_Security_Attacks.mp4
31 MB
03_Overview_of_Information_Security_Threats_and_Attacks/004_What_Are_the_Means_by_Which_Hackers_Gain_Access_to_Systems_and_Networks.mp4
29 MB
03_Overview_of_Information_Security_Threats_and_Attacks/005_Cloud_Computing_Threats.mp4
75 MB
03_Overview_of_Information_Security_Threats_and_Attacks/006_Advanced_Persistent_Threats.mp4
24 MB
03_Overview_of_Information_Security_Threats_and_Attacks/007_Viruses_and_Worms.mp4
38 MB
03_Overview_of_Information_Security_Threats_and_Attacks/008_Ransomware.mp4
60 MB
03_Overview_of_Information_Security_Threats_and_Attacks/009_Mobile_Threats.mp4
42 MB
03_Overview_of_Information_Security_Threats_and_Attacks/010_Modern_Age_Information_Warfare.mp4
53 MB
03_Overview_of_Information_Security_Threats_and_Attacks/011_Insider_Attacks.mp4
21 MB
03_Overview_of_Information_Security_Threats_and_Attacks/012_Phishing.mp4
28 MB
03_Overview_of_Information_Security_Threats_and_Attacks/013_Web_Application_Threats.mp4
28 MB
03_Overview_of_Information_Security_Threats_and_Attacks/014_Classification_of_Threats_Network_Threats.mp4
33 MB
03_Overview_of_Information_Security_Threats_and_Attacks/015_Clasification_of_Threats_Host_Threats.mp4
28 MB
03_Overview_of_Information_Security_Threats_and_Attacks/016_Clasification_of_Threats_Application_Threats.mp4
24 MB
03_Overview_of_Information_Security_Threats_and_Attacks/017_Classification_of_Attacks.mp4
141 MB
03_Overview_of_Information_Security_Threats_and_Attacks/018_Botnets.mp4
34 MB
03_Overview_of_Information_Security_Threats_and_Attacks/019_Laws_Standards_and_Regulations.mp4
133 MB
03_Overview_of_Information_Security_Threats_and_Attacks/020_QUIZ_SOLUTION_Overview_of_Information_Security_Threats_and_Attacks_-_Questions_answered_and_explained.mp4
67 MB
04_History_of_Hacking/001_A_Brief_Look_at_the_History_of_Hacking.mp4
119 MB
04_History_of_Hacking/002_Types_of_Hackers.mp4
86 MB
04_History_of_Hacking/003_What_is_Ethical_Hacking_What_is_Its_Purpose.mp4
28 MB
04_History_of_Hacking/004_Scope_of_Ethical_Hacking.mp4
36 MB
04_History_of_Hacking/005_Hacking_Stages_Reconnaissance.mp4
25 MB
04_History_of_Hacking/006_Hacking_Stages_Scanning.mp4
19 MB
04_History_of_Hacking/007_Hacking_Stages_Gaining_Access.mp4
6.5 MB
04_History_of_Hacking/008_Hacking_Stages_Maintaining_Access.mp4
33 MB
04_History_of_Hacking/009_Hacking_Stages_Clearing_Tracks.mp4
30 MB
04_History_of_Hacking/010_QUIZ_SOLUTION__History_of_Hacking_-_Questions_answered_and_explained.mp4
82 MB
05_Protecting_Information/001_Chapter_Introduction.mp4
57 MB
05_Protecting_Information/002_Information_Assurance.mp4
135 MB
05_Protecting_Information/003_EISA_and_Information_security_management_program.mp4
118 MB
05_Protecting_Information/004_Network_Zoning.mp4
156 MB
05_Protecting_Information/005_Defense_in_Depth.mp4
131 MB
05_Protecting_Information/006_What_Sort_of_Things_Do_Policies_Regulate.mp4
150 MB
05_Protecting_Information/007_Workplace_Security_Policies_and_Examples.mp4
108 MB
05_Protecting_Information/008_Physical_Security_Controls_and_Risk.mp4
116 MB
05_Protecting_Information/009_Risk_Management.mp4
127 MB
05_Protecting_Information/010_Threat_Modeling_and_Incident_Management.mp4
213 MB
05_Protecting_Information/011_UBA_-_User_Behavior_Analytics_and_Network_Security_Controls.mp4
84 MB
05_Protecting_Information/012_Access_Controls.mp4
83 MB
05_Protecting_Information/013_Identification_Authentication_Authorization_Accounting_and_IAM.mp4
122 MB
05_Protecting_Information/014_Data_Leakage.mp4
98 MB
01_Getting_Started/001_About_the_Course.mp4
81 MB
05_Protecting_Information/016_Data_Recovery.mp4
28 MB
05_Protecting_Information/017_QUIZ_SOLUTION_Protecting_Information_-_Questions_answered_and_explained.mp4
87 MB
06_Penetration_Testing/001_What_Is_Penetration_Testing.mp4
38 MB
06_Penetration_Testing/002_What_Does_a_Good_Penetration_Test_Consist_of.mp4
130 MB
06_Penetration_Testing/003_Why_Do_a_Penetration_Test.mp4
124 MB
06_Penetration_Testing/004_Pre-Attack_Phase_Contracts.mp4
30 MB
06_Penetration_Testing/005_Audit_vs_Vulnerability_Assessment_vs_Penetration_Test.mp4
26 MB
06_Penetration_Testing/006_Red_vs_Blue_Team.mp4
32 MB
06_Penetration_Testing/007_Types_of_Penetration_Testing.mp4
80 MB
06_Penetration_Testing/008_Pre-Attack_Phase_Rules_of_Engagement.mp4
26 MB
06_Penetration_Testing/009_Pre-Attack_Phase_Understanding_your_Clients_requirements.mp4
44 MB
06_Penetration_Testing/010_Pre-Attack_Phase_Scope_of_a_Penetration_Test.mp4
77 MB
06_Penetration_Testing/011_Pre-Attack_Phase_Information_Gathering.mp4
71 MB
06_Penetration_Testing/012_Pre-Attack_Phase_Two_Types_of_Information_Gathering.mp4
60 MB
06_Penetration_Testing/013_Attack_Phase.mp4
16 MB
06_Penetration_Testing/014_Attack_Phase_Penetrating_the_Perimeter.mp4
47 MB
06_Penetration_Testing/015_Attack_Phase_Target_Acquisition.mp4
31 MB
06_Penetration_Testing/016_Attack_Phase_Privilege_Escalation.mp4
32 MB
06_Penetration_Testing/017_Attack_Phase_Execute_Implant_Retract.mp4
37 MB
06_Penetration_Testing/018_Post-Attack_Phase.mp4
24 MB
06_Penetration_Testing/019_Security_Testing_Methodologies.mp4
78 MB
06_Penetration_Testing/020_QUIZ_SOLUTION_Penetration_Testing_-_Questions_answered_and_explained.mp4
65 MB
07_Footprinting_Process/001_About_Footprinting.mp4
34 MB
07_Footprinting_Process/002_Hacker_State_of_Mind.mp4
60 MB
07_Footprinting_Process/003_Search_Engine_and_Online_Resources.mp4
196 MB
07_Footprinting_Process/004_Whois_GeoIpLocation_and_DNS_Interogation.mp4
146 MB
07_Footprinting_Process/005_Email_Header_Analysis.mp4
164 MB
07_Footprinting_Process/006_Getting_an_IP_Address_from_an_Email_and_More.mp4
167 MB
07_Footprinting_Process/007_Quick_Look_at_a_Website_Certificate_Source_Code_and_Traffic.mp4
170 MB
07_Footprinting_Process/008_How_to_Clone_a_Website_and_Extract_Metadata_from_Files.mp4
186 MB
07_Footprinting_Process/009_Nmap_and_Traceroute.mp4
201 MB
07_Footprinting_Process/010_QUIZ_SOLUTION_Footprinting_-_Questions_answered_and_explained.mp4
55 MB
08_Reports_and_Countermeasures/001_Countermeasures_and_Best_Practices.mp4
122 MB
08_Reports_and_Countermeasures/002_What_Goes_into_a_Footprinting_Report.mp4
56 MB
08_Reports_and_Countermeasures/003_QUIZ_SOLUTION_Reports_and_Countermeasures_-_Questions_answered_and_explained.mp4
50 MB
09_Network_Scanning_Techniques/001_Banner_Grabbing.mp4
55 MB
09_Network_Scanning_Techniques/002_Drawing_and_Mapping_Out_Network_Topologies.mp4
97 MB
09_Network_Scanning_Techniques/003_Scanning_for_Vulnerabilities.mp4
143 MB
09_Network_Scanning_Techniques/004_Enumeration.mp4
72 MB
09_Network_Scanning_Techniques/005_QUIZ_SOLUTION_Network_Scanning_Techniques_-_Questions_answered_and_explained.mp4
57 MB
10_Password_Cracking_Techniques/001_Password_Cracking_Crunch_and_Some_Basics.mp4
170 MB
10_Password_Cracking_Techniques/002_Using_Hydra_for_online_password_cracking.mp4
182 MB
10_Password_Cracking_Techniques/003_Hashcat_Environment_Setup.mp4
178 MB
10_Password_Cracking_Techniques/004_HashCat_Installation.mp4
79 MB
10_Password_Cracking_Techniques/005_HashCat_Let_Us_Crack_Some_Passwords.mp4
166 MB
10_Password_Cracking_Techniques/006_HashCat_Results_and_Recap.mp4
123 MB
10_Password_Cracking_Techniques/007_QUIZ_SOLUTION_Password_Cracking_Techniques_-_Questions_answered_and_explained.mp4
78 MB
11_Techniques_for_Creating_and_Maintaining_Access_to_the_Remote_System/001_Reverse_Shell_and_Remote_Service_Exploitation.mp4
185 MB
11_Techniques_for_Creating_and_Maintaining_Access_to_the_Remote_System/002_Keylogger_Intro_and_Environment_Setup.mp4
118 MB
11_Techniques_for_Creating_and_Maintaining_Access_to_the_Remote_System/003_Keylogger_Source_Code_Download_and_Import.mp4
51 MB
11_Techniques_for_Creating_and_Maintaining_Access_to_the_Remote_System/004_Keylogger_Configuration.mp4
80 MB
11_Techniques_for_Creating_and_Maintaining_Access_to_the_Remote_System/005_Keylogger_Demo.mp4
134 MB
11_Techniques_for_Creating_and_Maintaining_Access_to_the_Remote_System/006_Decrypting_Keylogger_Logs.mp4
91 MB
11_Techniques_for_Creating_and_Maintaining_Access_to_the_Remote_System/007_QUIZ_SOLUTION_Persistent_Remote_Access_-_Questions_Answered_and_Explained.mp4
55 MB
12_Hiding_Malicious_Programs/001_SandBox.mp4
174 MB
12_Hiding_Malicious_Programs/002_How_to_Create_a_Safe_Sandbox_Environment.mp4
133 MB
12_Hiding_Malicious_Programs/003_Anti-Malware_Software_Overview.mp4
109 MB
12_Hiding_Malicious_Programs/004_Packing_Malware.mp4
126 MB
12_Hiding_Malicious_Programs/005_Rootkits.mp4
69 MB
12_Hiding_Malicious_Programs/006_Hiding_Files_and_Steganography.mp4
116 MB
12_Hiding_Malicious_Programs/007_QUIZ_SOLUTION_Hiding_Malicious_Programs_-_Questions_Answered_and_Explained.mp4
38 MB
13_Covering_Tracks_and_Destroying_Evidence/001_Log_Files_Covering_Your_Tracks.mp4
136 MB
13_Covering_Tracks_and_Destroying_Evidence/002_QUIZ_SOLUTION_Covering_Tracks_and_Destroying_Evidence_-_Questions_Answered_and_Explained.mp4
68 MB
14_Spoofing_Techniques/001_ARP_Spoofing.mp4
174 MB
14_Spoofing_Techniques/002_MAC_Address_Spoofing.mp4
120 MB
14_Spoofing_Techniques/003_DHCP_Starvation.mp4
71 MB
14_Spoofing_Techniques/004_QUIZ_SOLUTION_Sniffing_Techniques_-_Questions_Answered_and_Explained.mp4
101 MB
15_Attacking_and_Exploiting_Wireless_Networks/001_Capturing_the_WPA2_Handshake.mp4
145 MB
15_Attacking_and_Exploiting_Wireless_Networks/002_Cracking_WPA2_Passkey.mp4
162 MB
15_Attacking_and_Exploiting_Wireless_Networks/003_QUIZ_SOLUTION_Wireless_Networks_-_Questions_Answered_and_Explained.mp4
77 MB
16_Tip_Tricks_and_Real_Life_Scenarios/001_Social_Engineering.mp4
170 MB
16_Tip_Tricks_and_Real_Life_Scenarios/002_Well_Known_Social_Engineering_Attacks_A_Retrospective.mp4
114 MB
16_Tip_Tricks_and_Real_Life_Scenarios/003_QUIZ_SOLUTION_Social_Engineering_-_Questions_Answered_and_Explained.mp4
59 MB
17_Firewalls/001_What_Is_a_Firewall_How_Does_It_Work.mp4
90 MB
17_Firewalls/002_Firewall_Usage_Logging_and_Configuration.mp4
111 MB
17_Firewalls/003_Evading_Firewall_GeoIpBock.mp4
176 MB
17_Firewalls/004_QUIZ_SOLUTION_Firewalls_-_Questions_answered_and_explained.mp4
60 MB
18_Honeypots/001_How_to_Set_Up_a_Honeypot.mp4
137 MB
18_Honeypots/002_How_to_grab_traffic_from_a_Honeypot.mp4
130 MB
18_Honeypots/003_QUIZ_SOLUTION_Honeypots_-_Questions_Answered_and_Explained.mp4
53 MB
19_Lets_Attack_Web_Servers_and_Web_Applications/001_OWASP_-_Open_Web_Application_Security_Project.mp4
50 MB
19_Lets_Attack_Web_Servers_and_Web_Applications/002_XSS_Cross_Site_Scripting.mp4
128 MB
19_Lets_Attack_Web_Servers_and_Web_Applications/003_SQL_Injections.mp4
172 MB
19_Lets_Attack_Web_Servers_and_Web_Applications/004_QUIZ_SOLUTION_Attacking_Web_Servers_and_Web_Applications_-_Questions_Answered_and_Explained.mp4
58 MB
20_About_Cryptography/001_Cryptography_Basics.mp4
75 MB
20_About_Cryptography/002_Cryptography_Common_Algorithms__and_Message_Digest.mp4
94 MB
20_About_Cryptography/003_PKI_Public_Key_Infrastructure.mp4
72 MB
21_Encryption_Decryption_Cryptanalysis_and_Attack_Vectors/001_Cryptanalysis_and_Attack_Vectors.mp4
105 MB
21_Encryption_Decryption_Cryptanalysis_and_Attack_Vectors/002_Checksum_and_File_Encryption.mp4
132 MB
21_Encryption_Decryption_Cryptanalysis_and_Attack_Vectors/003_SSH_RSA_Demo.mp4
147 MB
21_Encryption_Decryption_Cryptanalysis_and_Attack_Vectors/004_Storage_Medium_Encryption.mp4
141 MB
21_Encryption_Decryption_Cryptanalysis_and_Attack_Vectors/005_QUIZ_SOLUTION_Cryptography_-_Questions_Answered_and_Explained.mp4
54 MB
22_Final/001_Final_Practice_Exam.mp4
60 MB
23_Final_SOLUTIONS/001_Final_Practice_Exam_Question_and_Answer_overview_part_1.mp4
114 MB
23_Final_SOLUTIONS/002_Final_Practice_exam_Question_and_Answer_overview_part_2.mp4
69 MB
23_Final_SOLUTIONS/003_Final_Practice_exam_Question_and_Answer_overview_part_3.mp4
111 MB
23_Final_SOLUTIONS/004_Final_Practice_exam_Question_and_Answer_overview_part_4.mp4
113 MB