TorBT - Torrents and Magnet Links Search Engine

[ WebToolTip.com ] Udemy - Linux and AI for Ethical Hackers

File Name
Size
Get Bonus Downloads Here.url
180 B
~Get Your Files Here !/1 - Introduction to Ethical Hacking and Linux/1 - Introduction.mp4
37 MB
~Get Your Files Here !/1 - Introduction to Ethical Hacking and Linux/10 - Legal and Ethical Considerations.mp4
12 MB
~Get Your Files Here !/1 - Introduction to Ethical Hacking and Linux/2 - Course Overview.mp4
34 MB
~Get Your Files Here !/1 - Introduction to Ethical Hacking and Linux/3 - What is Ethical Hacking.mp4
13 MB
~Get Your Files Here !/1 - Introduction to Ethical Hacking and Linux/4 - Why it is important to learn Ethical hacking.mp4
11 MB
~Get Your Files Here !/1 - Introduction to Ethical Hacking and Linux/5 - Role of Linux in Cybersecurity.mp4
11 MB
~Get Your Files Here !/1 - Introduction to Ethical Hacking and Linux/6 - Overview of Popular Distros (Kali, Parrot, BlackArch).mp4
13 MB
~Get Your Files Here !/1 - Introduction to Ethical Hacking and Linux/7 - The Difference Between Hackers Black Hat vs White Hat.mp4
13 MB
~Get Your Files Here !/1 - Introduction to Ethical Hacking and Linux/8 - Real-World Careers in Ethical Hacking.mp4
14 MB
~Get Your Files Here !/1 - Introduction to Ethical Hacking and Linux/9 - Tools of the Trade What Do Ethical Hackers Use.mp4
14 MB
~Get Your Files Here !/10 - Final Tips and Resources/1 - Legal Practice Platforms (TryHackMe, Hack The Box).mp4
41 MB
~Get Your Files Here !/10 - Final Tips and Resources/2 - Certifications and Career Paths.mp4
27 MB
~Get Your Files Here !/10 - Final Tips and Resources/3 - Staying Updated with Tools and News.mp4
26 MB
~Get Your Files Here !/10 - Final Tips and Resources/4 - Creating a Cybersecurity Portfolio That Stands Out.mp4
16 MB
~Get Your Files Here !/10 - Final Tips and Resources/5 - Entry-Level Jobs You Can Apply for After This Course.mp4
19 MB
~Get Your Files Here !/10 - Final Tips and Resources/6 - How to Talk About This Course in Your Resume and Interviews.mp4
20 MB
~Get Your Files Here !/10 - Final Tips and Resources/7 - Building a Personal Brand in Cybersecurity.mp4
19 MB
~Get Your Files Here !/10 - Final Tips and Resources/8 - Wrap-Up lecture.mp4
18 MB
~Get Your Files Here !/11 - Bonus Lecture/1 - Bonus Video.mp4
28 MB
~Get Your Files Here !/2 - Lab Setup for Ethical Hacking/1 - Lab Design.mp4
12 MB
~Get Your Files Here !/2 - Lab Setup for Ethical Hacking/2 - Oracle VirtualBox Download and Installation.mp4
20 MB
~Get Your Files Here !/2 - Lab Setup for Ethical Hacking/3 - Installing Kali Linux on VirtualBox.mp4
36 MB
~Get Your Files Here !/2 - Lab Setup for Ethical Hacking/4 - Installing CentOS on VirtualBox.mp4
50 MB
~Get Your Files Here !/2 - Lab Setup for Ethical Hacking/5 - Post Lab Setup.mp4
47 MB
~Get Your Files Here !/3 - Linux Basics for Ethical Hackers/1 - File System Hierarchy.mp4
15 MB
~Get Your Files Here !/3 - Linux Basics for Ethical Hackers/2 - Basic Commands.mp4
17 MB
~Get Your Files Here !/3 - Linux Basics for Ethical Hackers/3 - Using Find, Locate, and Which.mp4
50 MB
~Get Your Files Here !/3 - Linux Basics for Ethical Hackers/4 - Text Manipulation Commands.mp4
28 MB
~Get Your Files Here !/3 - Linux Basics for Ethical Hackers/5 - File Permissions and Ownership.mp4
22 MB
~Get Your Files Here !/4 - Networking Essentials for Hackers/1 - Viewing Network Interfaces.mp4
29 MB
~Get Your Files Here !/4 - Networking Essentials for Hackers/2 - Identifying Network Configuration Files.mp4
23 MB
~Get Your Files Here !/4 - Networking Essentials for Hackers/3 - Network related commands.mp4
50 MB
~Get Your Files Here !/4 - Networking Essentials for Hackers/4 - Netcat and Tcpdump.mp4
46 MB
~Get Your Files Here !/5 - User and Privilege Management/1 - Creating and Managing UsersGroups.mp4
20 MB
~Get Your Files Here !/5 - User and Privilege Management/2 - Adding Users to sudo.mp4
11 MB
~Get Your Files Here !/5 - User and Privilege Management/3 - Using su, sudo -i, and visudo.mp4
14 MB
~Get Your Files Here !/5 - User and Privilege Management/4 - Password Policies and Expiry Settings.mp4
28 MB
~Get Your Files Here !/6 - Must-Know Tools for Ethical Hackers/1 - htop and lsof (process & connection investigation).mp4
33 MB
~Get Your Files Here !/6 - Must-Know Tools for Ethical Hackers/2 - whois and amass (domain reconnaissance).mp4
39 MB
~Get Your Files Here !/6 - Must-Know Tools for Ethical Hackers/3 - hydra basics (brute force attacks).mp4
55 MB
~Get Your Files Here !/6 - Must-Know Tools for Ethical Hackers/4 - john (John the Ripper) basics (password cracking).mp4
51 MB
~Get Your Files Here !/7 - Practice Labs and Challenges/1 - Lab Ping Sweep Script.mp4
19 MB
~Get Your Files Here !/7 - Practice Labs and Challenges/2 - Lab Port Scanning.mp4
25 MB
~Get Your Files Here !/7 - Practice Labs and Challenges/3 - Lab Password Brute Force.mp4
60 MB
~Get Your Files Here !/7 - Practice Labs and Challenges/4 - Lab Setting Up a Honeypot (Optional).mp4
75 MB
~Get Your Files Here !/8 - AI-Powered Ethical Hacking/1 - What is AI in Ethical Hacking.mp4
25 MB
~Get Your Files Here !/8 - AI-Powered Ethical Hacking/2 - Python Basics for Running AI in Ethical Hacking.mp4
32 MB
~Get Your Files Here !/8 - AI-Powered Ethical Hacking/3 - Setting Up the AI Toolkit on Kali Linux.mp4
41 MB
~Get Your Files Here !/8 - AI-Powered Ethical Hacking/4 - AI for Log Analysis and Attack Detection.mp4
126 MB
~Get Your Files Here !/8 - AI-Powered Ethical Hacking/5 - Lab Detect File Changes with AI on Linux.mp4
154 MB
~Get Your Files Here !/9 - Project Case Study on System Attack and Security Fixes/1 - Part 1 Understanding the Attack.mp4
83 MB
~Get Your Files Here !/9 - Project Case Study on System Attack and Security Fixes/2 - Part 2 Fixing the System and Removing Damage.mp4
60 MB
~Get Your Files Here !/9 - Project Case Study on System Attack and Security Fixes/3 - Part 3 Applying Security Fixes to Prevent Future Attacks.mp4
84 MB
~Get Your Files Here !/Bonus Resources.txt
70 B