TorBT - Torrents and Magnet Links Search Engine
[ WebToolTip.com ] Udemy - The Complete Social Engineering and Anti-Phishing Course
- Date: 2026-03-19
- Size: 674 MB
- Files: 32
File Name
Size
Get Bonus Downloads Here.url
180 B
~Get Your Files Here !/1 - Introduction to strombreaker/1 -Course Introduction.en_US.vtt
2.8 kB
~Get Your Files Here !/1 - Introduction to strombreaker/1 -Course Introduction.mp4
63 MB
~Get Your Files Here !/1 - Introduction to strombreaker/2 -Introduction to Strombreaker.en_US.vtt
4.1 kB
~Get Your Files Here !/1 - Introduction to strombreaker/2 -Introduction to Strombreaker.mp4
8.6 MB
~Get Your Files Here !/1 - Introduction to strombreaker/3 -Legal and Ethical Use of Stormbeaker.en_US.vtt
5.4 kB
~Get Your Files Here !/1 - Introduction to strombreaker/3 -Legal and Ethical Use of Stormbeaker.mp4
11 MB
~Get Your Files Here !/1 - Introduction to strombreaker/4 -System Requirements & Setup for Storm breaker.en_US.vtt
10 kB
~Get Your Files Here !/1 - Introduction to strombreaker/4 -System Requirements & Setup for Storm breaker.mp4
43 MB
~Get Your Files Here !/2 - Configuring Strombreaker/1 -installing Storm breaker program.en_US.vtt
8.4 kB
~Get Your Files Here !/2 - Configuring Strombreaker/1 -installing Storm breaker program.mp4
68 MB
~Get Your Files Here !/2 - Configuring Strombreaker/2 -Setting up Ngrok account.en_US.vtt
7.4 kB
~Get Your Files Here !/2 - Configuring Strombreaker/2 -Setting up Ngrok account.mp4
46 MB
~Get Your Files Here !/2 - Configuring Strombreaker/3 -How Storm-Breaker structured.en_US.vtt
11 kB
~Get Your Files Here !/2 - Configuring Strombreaker/3 -How Storm-Breaker structured.mp4
71 MB
~Get Your Files Here !/3 - Phishing & Social Engineering Techniques/1 -What is Fishing.en_US.vtt
12 kB
~Get Your Files Here !/3 - Phishing & Social Engineering Techniques/1 -What is Fishing.mp4
23 MB
~Get Your Files Here !/3 - Phishing & Social Engineering Techniques/2 -Crafting a Realistic Phishing Page.en_US.vtt
27 kB
~Get Your Files Here !/3 - Phishing & Social Engineering Techniques/2 -Crafting a Realistic Phishing Page.mp4
124 MB
~Get Your Files Here !/3 - Phishing & Social Engineering Techniques/3 -Email, SMS & Social Media Phishing Techniques.en_US.vtt
9.5 kB
~Get Your Files Here !/3 - Phishing & Social Engineering Techniques/3 -Email, SMS & Social Media Phishing Techniques.mp4
19 MB
~Get Your Files Here !/4 - Device Control & Data Collection/1 -Accessing Device Camera (with Permission Prompt).en_US.vtt
15 kB
~Get Your Files Here !/4 - Device Control & Data Collection/1 -Accessing Device Camera (with Permission Prompt).mp4
59 MB
~Get Your Files Here !/4 - Device Control & Data Collection/2 -Getting GPS Coodinates(Location Tracking).en_US.vtt
11 kB
~Get Your Files Here !/4 - Device Control & Data Collection/2 -Getting GPS Coodinates(Location Tracking).mp4
33 MB
~Get Your Files Here !/4 - Device Control & Data Collection/3 -storm breaker template overview.mp4.en_US.vtt
9.3 kB
~Get Your Files Here !/4 - Device Control & Data Collection/3 -storm breaker template overview.mp4.mp4
69 MB
~Get Your Files Here !/5 - Countermeasures & Defense/1 -How to Detect Storm-Breaker Attacks.en_US.vtt
9.8 kB
~Get Your Files Here !/5 - Countermeasures & Defense/1 -How to Detect Storm-Breaker Attacks.mp4
20 MB
~Get Your Files Here !/5 - Countermeasures & Defense/2 -How to Detect Storm-Breaker Attacks.en_US.vtt
9.5 kB
~Get Your Files Here !/5 - Countermeasures & Defense/2 -How to Detect Storm-Breaker Attacks.mp4
15 MB
~Get Your Files Here !/Bonus Resources.txt
70 B