TorBT - Torrents and Magnet Links Search Engine
[DesireCourse.Net] Udemy - Cyber Security - Go From Zero to Hero (2020)
- Date: 2022-10-31
- Size: 3.5 GB
- Files: 244
File Name
Size
0. Websites you may like/[CourseClub.Me].url
48 B
0. Websites you may like/[DesireCourse.Net].url
51 B
1. FUNDAMENTALS OF NETWORKING/1. ARE YOU READY.html
3.6 kB
1. FUNDAMENTALS OF NETWORKING/10. Layers of OSI Model.mp4
33 MB
1. FUNDAMENTALS OF NETWORKING/10. Layers of OSI Model.srt
11 kB
1. FUNDAMENTALS OF NETWORKING/11. Introduction to TCPIP Model.mp4
76 MB
1. FUNDAMENTALS OF NETWORKING/11. Introduction to TCPIP Model.srt
12 kB
1. FUNDAMENTALS OF NETWORKING/12. OSI Model vs TCPIP Model.mp4
24 MB
1. FUNDAMENTALS OF NETWORKING/12. OSI Model vs TCPIP Model.srt
4.9 kB
1. FUNDAMENTALS OF NETWORKING/13. BASICS OF NETWORKING Quiz 2.html
147 B
1. FUNDAMENTALS OF NETWORKING/14. Addressing in Computer Networks.mp4
54 MB
1. FUNDAMENTALS OF NETWORKING/14. Addressing in Computer Networks.srt
9.9 kB
1. FUNDAMENTALS OF NETWORKING/15. IP Address- IPv4 and IPv6.mp4
41 MB
1. FUNDAMENTALS OF NETWORKING/15. IP Address- IPv4 and IPv6.srt
6.9 kB
1. FUNDAMENTALS OF NETWORKING/16. Introduction to Classes of IP Addressing.mp4
15 MB
1. FUNDAMENTALS OF NETWORKING/16. Introduction to Classes of IP Addressing.srt
4.4 kB
1. FUNDAMENTALS OF NETWORKING/17. Classes of IP Address.mp4
55 MB
1. FUNDAMENTALS OF NETWORKING/17. Classes of IP Address.srt
9.7 kB
1. FUNDAMENTALS OF NETWORKING/18. PRACTICAL HOW TO FIND OUT YOUR PC's IP ADDRESS.mp4
22 MB
1. FUNDAMENTALS OF NETWORKING/18. PRACTICAL HOW TO FIND OUT YOUR PC's IP ADDRESS.srt
3.5 kB
1. FUNDAMENTALS OF NETWORKING/19. PRACTICAL HOW TO FIND OUT YOUR PC'S MAC ADDRESS.mp4
41 MB
1. FUNDAMENTALS OF NETWORKING/19. PRACTICAL HOW TO FIND OUT YOUR PC'S MAC ADDRESS.srt
5.2 kB
1. FUNDAMENTALS OF NETWORKING/2. What is Computer Networking - Definition and Characteristics.mp4
19 MB
1. FUNDAMENTALS OF NETWORKING/2. What is Computer Networking - Definition and Characteristics.srt
3.2 kB
1. FUNDAMENTALS OF NETWORKING/20. The Internet Protocol (IP).mp4
32 MB
1. FUNDAMENTALS OF NETWORKING/20. The Internet Protocol (IP).srt
7.4 kB
1. FUNDAMENTALS OF NETWORKING/21. BASICS OF NETWORKING QUIZ 3.html
147 B
1. FUNDAMENTALS OF NETWORKING/22. Address Resolution Protocol (ARP).mp4
50 MB
1. FUNDAMENTALS OF NETWORKING/22. Address Resolution Protocol (ARP).srt
10 kB
1. FUNDAMENTALS OF NETWORKING/23. SUPPORT WE SECURE!.html
2.5 kB
1. FUNDAMENTALS OF NETWORKING/24. Dynamic Host Configuration Protocol (DHCP).mp4
37 MB
1. FUNDAMENTALS OF NETWORKING/24. Dynamic Host Configuration Protocol (DHCP).srt
9.2 kB
1. FUNDAMENTALS OF NETWORKING/25. Internet Control Message Protocol (ICMP).mp4
37 MB
1. FUNDAMENTALS OF NETWORKING/25. Internet Control Message Protocol (ICMP).srt
7.1 kB
1. FUNDAMENTALS OF NETWORKING/26. RIP and OSPF Protocols.mp4
36 MB
1. FUNDAMENTALS OF NETWORKING/26. RIP and OSPF Protocols.srt
6.1 kB
1. FUNDAMENTALS OF NETWORKING/27. PRACTICAL HOW TO FIND OUT THE PATH OF DATA PACKETS USING TRACERT.mp4
17 MB
1. FUNDAMENTALS OF NETWORKING/27. PRACTICAL HOW TO FIND OUT THE PATH OF DATA PACKETS USING TRACERT.srt
3.0 kB
1. FUNDAMENTALS OF NETWORKING/28. What are Sockets.mp4
30 MB
1. FUNDAMENTALS OF NETWORKING/28. What are Sockets.srt
6.5 kB
1. FUNDAMENTALS OF NETWORKING/29. File Transfer Protocol (FTP).mp4
28 MB
1. FUNDAMENTALS OF NETWORKING/29. File Transfer Protocol (FTP).srt
4.0 kB
1. FUNDAMENTALS OF NETWORKING/3. Network Topologies.mp4
26 MB
1. FUNDAMENTALS OF NETWORKING/3. Network Topologies.srt
7.7 kB
1. FUNDAMENTALS OF NETWORKING/30. Hypertext Transfer Protocol (HTTP).mp4
42 MB
1. FUNDAMENTALS OF NETWORKING/30. Hypertext Transfer Protocol (HTTP).srt
4.6 kB
1. FUNDAMENTALS OF NETWORKING/31. Hyptertext Transfer ProtocolSecure Socket Layer (HTTPS).mp4
46 MB
1. FUNDAMENTALS OF NETWORKING/31. Hyptertext Transfer ProtocolSecure Socket Layer (HTTPS).srt
6.3 kB
1. FUNDAMENTALS OF NETWORKING/32. Domain Name System (DNS).mp4
20 MB
1. FUNDAMENTALS OF NETWORKING/32. Domain Name System (DNS).srt
3.0 kB
1. FUNDAMENTALS OF NETWORKING/33. BASICS OF NETWORKING Quiz 4.html
720 B
1. FUNDAMENTALS OF NETWORKING/34. Conclusion.mp4
2.2 MB
1. FUNDAMENTALS OF NETWORKING/34. Conclusion.srt
849 B
1. FUNDAMENTALS OF NETWORKING/34.1 Network-Security-Essentials-4th-Edition William Stallings.pdf
3.1 MB
1. FUNDAMENTALS OF NETWORKING/34.2 (McGraw-Hill Forouzan Networking) Behrouz A. Forouzan - Data Communications and Networking -McGraw-Hill Higher Education (2007).pdf
11 MB
1. FUNDAMENTALS OF NETWORKING/34.3 Atul Kahate - Cryptography and network security (2006, Tata McGraw-Hill).pdf
15 MB
1. FUNDAMENTALS OF NETWORKING/34.4 Kurose, James F._ Ross, Keith W. - Computer networking _ a top-down approach (2017) - libgen.lc.pdf
20 MB
1. FUNDAMENTALS OF NETWORKING/4. Meet the instructors!.mp4
7.3 MB
1. FUNDAMENTALS OF NETWORKING/4. Meet the instructors!.srt
484 B
1. FUNDAMENTALS OF NETWORKING/5. History and Applications of Computer Networking.mp4
39 MB
1. FUNDAMENTALS OF NETWORKING/5. History and Applications of Computer Networking.srt
6.7 kB
1. FUNDAMENTALS OF NETWORKING/6. Before moving ahead....html
2.5 kB
1. FUNDAMENTALS OF NETWORKING/6.1 Network-Security-Essentials-4th-Edition William Stallings.pdf
3.1 MB
1. FUNDAMENTALS OF NETWORKING/6.2 (McGraw-Hill Forouzan Networking) Behrouz A. Forouzan - Data Communications and Networking -McGraw-Hill Higher Education (2007).pdf
11 MB
1. FUNDAMENTALS OF NETWORKING/6.3 Ethem Mining - Kali Linux Hacking_ A Complete Step by Step Guide to Learn the Fundamentals of Cyber Security, Hacking, and Penetration Testing. Includes Valuable Basic Networking Concepts-Independentl.epub
2.6 MB
1. FUNDAMENTALS OF NETWORKING/7. Protocols and Standards.mp4
29 MB
1. FUNDAMENTALS OF NETWORKING/7. Protocols and Standards.srt
4.9 kB
1. FUNDAMENTALS OF NETWORKING/8. BASICS OF NETWORKING Quiz 1.html
147 B
1. FUNDAMENTALS OF NETWORKING/9. Introduction to OSI Model.mp4
32 MB
1. FUNDAMENTALS OF NETWORKING/9. Introduction to OSI Model.srt
5.1 kB
2. GETTING STARTED WITH CYBER SECURITY/1. Definition of Computer Security.mp4
28 MB
2. GETTING STARTED WITH CYBER SECURITY/1. Definition of Computer Security.srt
3.9 kB
2. GETTING STARTED WITH CYBER SECURITY/2. Interesting Facts about Cyber Security.mp4
43 MB
2. GETTING STARTED WITH CYBER SECURITY/2. Interesting Facts about Cyber Security.srt
5.3 kB
2. GETTING STARTED WITH CYBER SECURITY/3. Have a look at this!.mp4
12 MB
2. GETTING STARTED WITH CYBER SECURITY/3. Have a look at this!.srt
776 B
2. GETTING STARTED WITH CYBER SECURITY/4. History of Cyber Security.mp4
60 MB
2. GETTING STARTED WITH CYBER SECURITY/4. History of Cyber Security.srt
7.2 kB
2. GETTING STARTED WITH CYBER SECURITY/5. Scope and Career Insights in Cyber Security.mp4
48 MB
2. GETTING STARTED WITH CYBER SECURITY/5. Scope and Career Insights in Cyber Security.srt
11 kB
2. GETTING STARTED WITH CYBER SECURITY/5.1 How to Become a Cyber Security Professional.html
94 B
2. GETTING STARTED WITH CYBER SECURITY/6. GETTING STARTED WITH CYBER SECURITY QUIZ.html
661 B
2. GETTING STARTED WITH CYBER SECURITY/7. DID YOU RATE.html
2.5 kB
2. GETTING STARTED WITH CYBER SECURITY/8. Conclusion.mp4
3.6 MB
2. GETTING STARTED WITH CYBER SECURITY/8. Conclusion.srt
693 B
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/1. Introduction.mp4
5.7 MB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/1. Introduction.srt
1.4 kB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/10. SECTION 3 QUIZ.html
627 B
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/11. We value your feedback!.html
2.5 kB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/12. Conclusion.mp4
2.6 MB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/12. Conclusion.srt
785 B
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/2. Standard Definition of Cyber Security.mp4
19 MB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/2. Standard Definition of Cyber Security.srt
3.1 kB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/3. Types of Computer Security.mp4
25 MB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/3. Types of Computer Security.srt
3.3 kB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/4. Key Terms in Cyber Security.mp4
31 MB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/4. Key Terms in Cyber Security.srt
8.0 kB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/5. The Elements of Information Security.mp4
23 MB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/5. The Elements of Information Security.srt
6.4 kB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/6. Types of Attacks.mp4
43 MB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/6. Types of Attacks.srt
13 kB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/7. Roles in Cyber Security Part 1.mp4
49 MB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/7. Roles in Cyber Security Part 1.srt
9.6 kB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/8. Roles in Cyber Security Part 2.mp4
34 MB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/8. Roles in Cyber Security Part 2.srt
6.3 kB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/9. PRACTICAL USING OSINT FRAMEWORK FOR INFORMATION GATHERING.mp4
41 MB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/9. PRACTICAL USING OSINT FRAMEWORK FOR INFORMATION GATHERING.srt
6.4 kB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/[CourseClub.Me].url
48 B
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/[DesireCourse.Net].url
51 B
4. DIVING DEEP INTO CYBER SECURITY/1. Introduction.mp4
10 MB
4. DIVING DEEP INTO CYBER SECURITY/1. Introduction.srt
1.7 kB
4. DIVING DEEP INTO CYBER SECURITY/10. Symmetric Encryption.mp4
14 MB
4. DIVING DEEP INTO CYBER SECURITY/10. Symmetric Encryption.srt
3.5 kB
4. DIVING DEEP INTO CYBER SECURITY/11. AES and DES.mp4
44 MB
4. DIVING DEEP INTO CYBER SECURITY/11. AES and DES.srt
7.1 kB
4. DIVING DEEP INTO CYBER SECURITY/12. Asymmetric Encryption.mp4
16 MB
4. DIVING DEEP INTO CYBER SECURITY/12. Asymmetric Encryption.srt
3.1 kB
4. DIVING DEEP INTO CYBER SECURITY/13. Hey there! Support We Secure..html
2.5 kB
4. DIVING DEEP INTO CYBER SECURITY/14. RSA & Diffie Hellman.mp4
48 MB
4. DIVING DEEP INTO CYBER SECURITY/14. RSA & Diffie Hellman.srt
9.2 kB
4. DIVING DEEP INTO CYBER SECURITY/15. Hashing.mp4
62 MB
4. DIVING DEEP INTO CYBER SECURITY/15. Hashing.srt
8.4 kB
4. DIVING DEEP INTO CYBER SECURITY/16. Security Organizations.mp4
27 MB
4. DIVING DEEP INTO CYBER SECURITY/16. Security Organizations.srt
5.9 kB
4. DIVING DEEP INTO CYBER SECURITY/17. Critical Thinking in Cyber Security.mp4
22 MB
4. DIVING DEEP INTO CYBER SECURITY/17. Critical Thinking in Cyber Security.srt
4.8 kB
4. DIVING DEEP INTO CYBER SECURITY/18. The Five Critical Thinking Skills.mp4
24 MB
4. DIVING DEEP INTO CYBER SECURITY/18. The Five Critical Thinking Skills.srt
7.2 kB
4. DIVING DEEP INTO CYBER SECURITY/19. PRACTICAL USING NSLOOKUP TOOL.mp4
7.1 MB
4. DIVING DEEP INTO CYBER SECURITY/19. PRACTICAL USING NSLOOKUP TOOL.srt
3.1 kB
4. DIVING DEEP INTO CYBER SECURITY/2. Security Architect's View of Security.mp4
47 MB
4. DIVING DEEP INTO CYBER SECURITY/2. Security Architect's View of Security.srt
10 kB
4. DIVING DEEP INTO CYBER SECURITY/20. PRACTICAL USING NETSTAT TOOL.mp4
32 MB
4. DIVING DEEP INTO CYBER SECURITY/20. PRACTICAL USING NETSTAT TOOL.srt
4.4 kB
4. DIVING DEEP INTO CYBER SECURITY/21. SECTION 4 QUIZ - DIVING DEEP INTO CYBER SECURITY.html
627 B
4. DIVING DEEP INTO CYBER SECURITY/22. Conclusion.mp4
2.8 MB
4. DIVING DEEP INTO CYBER SECURITY/22. Conclusion.srt
726 B
4. DIVING DEEP INTO CYBER SECURITY/3. What is Vulnerability Assessment.mp4
37 MB
4. DIVING DEEP INTO CYBER SECURITY/3. What is Vulnerability Assessment.srt
5.8 kB
4. DIVING DEEP INTO CYBER SECURITY/4. 4 Phases of Vulnerability Assessment.mp4
40 MB
4. DIVING DEEP INTO CYBER SECURITY/4. 4 Phases of Vulnerability Assessment.srt
13 kB
4. DIVING DEEP INTO CYBER SECURITY/5. PRACTICAL DOWNLOADING NESSUS VULNERABILITY SCANNER.mp4
11 MB
4. DIVING DEEP INTO CYBER SECURITY/5. PRACTICAL DOWNLOADING NESSUS VULNERABILITY SCANNER.srt
2.0 kB
4. DIVING DEEP INTO CYBER SECURITY/6. PRACTICAL CREATING A ADVANCE NETWORK SCAN POLICY.mp4
29 MB
4. DIVING DEEP INTO CYBER SECURITY/6. PRACTICAL CREATING A ADVANCE NETWORK SCAN POLICY.srt
7.5 kB
4. DIVING DEEP INTO CYBER SECURITY/7. PRACTICAL INITIATING A SCAN USING USER DEFINED POLICIES.mp4
17 MB
4. DIVING DEEP INTO CYBER SECURITY/7. PRACTICAL INITIATING A SCAN USING USER DEFINED POLICIES.srt
3.8 kB
4. DIVING DEEP INTO CYBER SECURITY/8. PRACTICAL GOING THROUGH SCANNED RESULTS.mp4
15 MB
4. DIVING DEEP INTO CYBER SECURITY/8. PRACTICAL GOING THROUGH SCANNED RESULTS.srt
4.1 kB
4. DIVING DEEP INTO CYBER SECURITY/9. Introduction to Cryptography.mp4
42 MB
4. DIVING DEEP INTO CYBER SECURITY/9. Introduction to Cryptography.srt
5.8 kB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/1. Introduction.mp4
7.2 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/1. Introduction.srt
1.0 kB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/10. OH MY GOD! VIRUS!!.mp4
38 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/10. OH MY GOD! VIRUS!!.srt
7.6 kB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/11. Types of Virus.mp4
59 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/11. Types of Virus.srt
11 kB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/12. You should defend yourself!.mp4
46 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/12. You should defend yourself!.srt
9.0 kB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/13. Have you ever heard about a Ransomware.mp4
81 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/13. Have you ever heard about a Ransomware.srt
12 kB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/14. IMPORTANT!.html
2.5 kB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/15. PRACTICAL INFORMATION GATHERING USING SHODAN.mp4
74 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/15. PRACTICAL INFORMATION GATHERING USING SHODAN.srt
9.7 kB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/16. The Cyber Kill Chain.mp4
31 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/16. The Cyber Kill Chain.srt
10 kB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/17. Introduction to Social Engineering.mp4
28 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/17. Introduction to Social Engineering.srt
5.9 kB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/18. Types of Social Engineering.mp4
58 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/18. Types of Social Engineering.srt
7.0 kB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/19. PRACTICAL HOW TO FIND OUT USERNAMES AND PASSWORDS USING SOCIAL ENGINEERING.mp4
86 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/19. PRACTICAL HOW TO FIND OUT USERNAMES AND PASSWORDS USING SOCIAL ENGINEERING.srt
12 kB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/2. Different types of Actors in Cyber Security.mp4
64 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/2. Different types of Actors in Cyber Security.srt
11 kB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/20. SECTION 5 QUIZ - TYPES OF ACTORS, ATTACKS AND MALWARE.html
627 B
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/21. Conclusion.mp4
4.1 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/21. Conclusion.srt
847 B
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/3. Types of Cyber Attacks.mp4
31 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/3. Types of Cyber Attacks.srt
5.0 kB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/4. Hacking Organizations around the Globe.mp4
27 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/4. Hacking Organizations around the Globe.srt
5.9 kB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/5. Security Services and Mechanisms.mp4
18 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/5. Security Services and Mechanisms.srt
4.3 kB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/6. Introduction to Threats.mp4
11 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/6. Introduction to Threats.srt
4.0 kB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/7. What is a Malware.mp4
48 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/7. What is a Malware.srt
9.3 kB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/8. Everything about Trojans.mp4
50 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/8. Everything about Trojans.srt
8.6 kB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/9. Types of Trojans.mp4
50 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/9. Types of Trojans.srt
8.1 kB
6. KEY SECURITY CONCEPTS/1. Introduction.mp4
8.7 MB
6. KEY SECURITY CONCEPTS/1. Introduction.srt
1.7 kB
6. KEY SECURITY CONCEPTS/10. The NIST Framework.mp4
22 MB
6. KEY SECURITY CONCEPTS/10. The NIST Framework.srt
3.8 kB
6. KEY SECURITY CONCEPTS/11. The COBIT Framework.mp4
26 MB
6. KEY SECURITY CONCEPTS/11. The COBIT Framework.srt
4.1 kB
6. KEY SECURITY CONCEPTS/12. Other Security Frameworks.mp4
25 MB
6. KEY SECURITY CONCEPTS/12. Other Security Frameworks.srt
5.4 kB
6. KEY SECURITY CONCEPTS/13. SECTION 6 QUIZ - KEY SECURITY CONCEPTS.html
627 B
6. KEY SECURITY CONCEPTS/14. Leave a Rating!.html
2.5 kB
6. KEY SECURITY CONCEPTS/15. Conclusion.mp4
2.1 MB
6. KEY SECURITY CONCEPTS/15. Conclusion.srt
732 B
6. KEY SECURITY CONCEPTS/2. Confidentiality - The Most Important Element of Security.mp4
26 MB
6. KEY SECURITY CONCEPTS/2. Confidentiality - The Most Important Element of Security.srt
5.1 kB
6. KEY SECURITY CONCEPTS/3. Integrity, Authentication, Access Control and Non-Repudiation.mp4
56 MB
6. KEY SECURITY CONCEPTS/3. Integrity, Authentication, Access Control and Non-Repudiation.srt
10 kB
6. KEY SECURITY CONCEPTS/4. Introduction to Incident Response Team.mp4
32 MB
6. KEY SECURITY CONCEPTS/4. Introduction to Incident Response Team.srt
6.5 kB
6. KEY SECURITY CONCEPTS/5. Phases of Incident Response.mp4
20 MB
6. KEY SECURITY CONCEPTS/5. Phases of Incident Response.srt
6.2 kB
6. KEY SECURITY CONCEPTS/6. Laws in Cyber Security.mp4
32 MB
6. KEY SECURITY CONCEPTS/6. Laws in Cyber Security.srt
6.2 kB
6. KEY SECURITY CONCEPTS/7. What are Audits in Cyber Security.mp4
45 MB
6. KEY SECURITY CONCEPTS/7. What are Audits in Cyber Security.srt
12 kB
6. KEY SECURITY CONCEPTS/8. Internal Audit vs External Audit.mp4
35 MB
6. KEY SECURITY CONCEPTS/8. Internal Audit vs External Audit.srt
5.6 kB
6. KEY SECURITY CONCEPTS/9. How to carry out an Internal Audit.mp4
48 MB
6. KEY SECURITY CONCEPTS/9. How to carry out an Internal Audit.srt
14 kB
7. FIREWALLS AND ANTIVIRUS/1. Introduction.mp4
13 MB
7. FIREWALLS AND ANTIVIRUS/1. Introduction.srt
1.6 kB
7. FIREWALLS AND ANTIVIRUS/10. Firewalls vs Antivirus.mp4
9.3 MB
7. FIREWALLS AND ANTIVIRUS/10. Firewalls vs Antivirus.srt
2.2 kB
7. FIREWALLS AND ANTIVIRUS/11. THE FINAL QUIZ - FIREWALLS AND ANTIVIRUS.html
870 B
7. FIREWALLS AND ANTIVIRUS/12. CONGRATULATIONS!.mp4
19 MB
7. FIREWALLS AND ANTIVIRUS/12. CONGRATULATIONS!.srt
2.4 kB
7. FIREWALLS AND ANTIVIRUS/2. Intrusion Detection System.mp4
59 MB
7. FIREWALLS AND ANTIVIRUS/2. Intrusion Detection System.srt
12 kB
7. FIREWALLS AND ANTIVIRUS/3. Introduction to Firewalls.mp4
53 MB
7. FIREWALLS AND ANTIVIRUS/3. Introduction to Firewalls.srt
10 kB
7. FIREWALLS AND ANTIVIRUS/4. IDS evasion techniques.mp4
34 MB
7. FIREWALLS AND ANTIVIRUS/4. IDS evasion techniques.srt
8.5 kB
7. FIREWALLS AND ANTIVIRUS/5. What is DMZ.mp4
37 MB
7. FIREWALLS AND ANTIVIRUS/5. What is DMZ.srt
6.3 kB
7. FIREWALLS AND ANTIVIRUS/6. Firewall evasion techniques.mp4
41 MB
7. FIREWALLS AND ANTIVIRUS/6. Firewall evasion techniques.srt
9.4 kB
7. FIREWALLS AND ANTIVIRUS/7. Different types of Firewalls.mp4
32 MB
7. FIREWALLS AND ANTIVIRUS/7. Different types of Firewalls.srt
11 kB
7. FIREWALLS AND ANTIVIRUS/8. The Antivirus!.mp4
20 MB
7. FIREWALLS AND ANTIVIRUS/8. The Antivirus!.srt
3.7 kB
7. FIREWALLS AND ANTIVIRUS/9. Antivirus Detection Techniques.mp4
73 MB
7. FIREWALLS AND ANTIVIRUS/9. Antivirus Detection Techniques.srt
12 kB
[CourseClub.Me].url
48 B
[DesireCourse.Net].url
51 B