TorBT - Torrents and Magnet Links Search Engine

The Complete Cyber Security Course - Hackers Exposed

File Name
Size
01 Introduction/001 Welcome and Introduction to the Instructor.mp4
59 MB
01 Introduction/002 Goals and Learning Objectives - Volume 1.mp4
70 MB
01 Introduction/003 Target Audience.mp4
50 MB
01 Introduction/004 Study Recommendations.mp4
96 MB
01 Introduction/005 Course updates.mp4
19 MB
02 know Yourself - The Threat and Vulnerability Landscape/006 Goals and Learning Objectives.mp4
19 MB
02 know Yourself - The Threat and Vulnerability Landscape/007 Protect What You Value.mp4
22 MB
02 know Yourself - The Threat and Vulnerability Landscape/008 What is Privacy Anonymity and Pseudonymity.mp4
108 MB
02 know Yourself - The Threat and Vulnerability Landscape/009 Security Vulnerabilities Threats and Adversaries.mp4
88 MB
02 know Yourself - The Threat and Vulnerability Landscape/010 Threat Modeling and Risk Assessments.mp4
148 MB
02 know Yourself - The Threat and Vulnerability Landscape/011 Security vs Privacy vs Anonymity - Can we have it all.mp4
41 MB
02 know Yourself - The Threat and Vulnerability Landscape/012 Defense In Depth.mp4
6.9 MB
02 know Yourself - The Threat and Vulnerability Landscape/013 The Zero Trust Model.mp4
77 MB
02 know Yourself - The Threat and Vulnerability Landscape/The-Cyber-Security-Landscape-Diagram.jpg
777 kB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/014 Goals and Learning Objectives.mp4
21 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/015 Why You Need Security The Value Of A Hack.mp4
115 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/016 The Top 3 Things You Need To Stay Safe Online.mp4
11 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/017 Security Bugs and Vulnerabilities.mp4
125 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/018 Hackers crackers and cyber criminals.mp4
61 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/019 Malware viruses rootkits and RATs.mp4
81 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/020 Spyware Adware Scareware PUPs Browser hijacking.mp4
72 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/021 What is Phishing Vishing and SMShing.mp4
55 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/022 Spamming Doxing.mp4
34 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/023 Social engineering - Scams cons tricks and fraud.mp4
93 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/024 Darknets Dark Markets and Exploit kits.mp4
204 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/025 Governments spies and secret stuff part I.mp4
136 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/026 Governments spies and secret stuff part II.mp4
164 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/027 Encryption mandating insecurity legalizing spying.mp4
330 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/028 Trust Backdoors.mp4
167 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/029 Censorship.mp4
42 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/030 Security News and Alerts Stay Informed.mp4
10 MB
04 Encryption Crash Course/031 Goals and Learning Objectives.mp4
12 MB
04 Encryption Crash Course/032 Symmetric Encryption.mp4
159 MB
04 Encryption Crash Course/033 Asymmetric Encryption.mp4
79 MB
04 Encryption Crash Course/034 Hash Functions.mp4
124 MB
04 Encryption Crash Course/035 Digital Signatures.mp4
50 MB
04 Encryption Crash Course/036 Secure Sockets Layer SSL and Transport layer security TLS.mp4
195 MB
04 Encryption Crash Course/037 SSL Stripping.mp4
150 MB
04 Encryption Crash Course/038 HTTPS HTTP Secure.mp4
133 MB
04 Encryption Crash Course/039 Digital Certificates.mp4
118 MB
04 Encryption Crash Course/040 Certificate Authorities and HTTPS.mp4
255 MB
04 Encryption Crash Course/041 End-to-End Encryption E2EE.mp4
8.5 MB
04 Encryption Crash Course/042 Steganography.mp4
173 MB
04 Encryption Crash Course/043 How Security and Encryption is Really Attacked.mp4
24 MB
05 Setting up a Testing Environment Using Virtual Machines/044 Goals and Learning Objectives.mp4
13 MB
05 Setting up a Testing Environment Using Virtual Machines/045 Setting up a Testing Environment Using Virtual Machines.mp4
193 MB
05 Setting up a Testing Environment Using Virtual Machines/046 Vmware.mp4
164 MB
05 Setting up a Testing Environment Using Virtual Machines/047 Virtual box.mp4
198 MB
05 Setting up a Testing Environment Using Virtual Machines/048 Kali Linux 2016.mp4
65 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/049 Goals and Learning Objectives.mp4
18 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/050 Security Features and Functionality.mp4
41 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/051 Security Bugs and Vulnerabilities.mp4
63 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/052 Usage Share.mp4
45 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/053 Windows 10 - Privacy Tracking.mp4
108 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/054 Windows 10 - Disable tracking automatically.mp4
99 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/055 Windows 10 - Tool Disable Windows 10 Tracking.mp4
165 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/056 Windows 10 Cortana.mp4
49 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/057 Windows 10 Privacy Settings.mp4
87 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/058 Windows 10 - WiFi Sense.mp4
75 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/059 Windows 7 8 and 8.1 - Privacy Tracking.mp4
134 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/060 Mac OS X - Privacy Tracking.mp4
84 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/061 Linux and Unix like Operating systems.mp4
81 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/062 Linux - Debian.mp4
7.8 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/063 Linux - Debian 8 Jessie - Virtual box guest additions Issue.mp4
84 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/064 Linux - OpenBSD and Archlinux.mp4
41 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/065 Linux - Ubuntu.mp4
10 MB
07 Security Bugs and Vulnerabilities/066 Goals and Learning Objectives.mp4
12 MB
07 Security Bugs and Vulnerabilities/067 The Importance of Patching.mp4
42 MB
07 Security Bugs and Vulnerabilities/068 Windows 7 - Auto Update.mp4
27 MB
07 Security Bugs and Vulnerabilities/069 Windows 8 8.1 - Auto Update.mp4
13 MB
07 Security Bugs and Vulnerabilities/070 Windows 10 - Auto Update.mp4
22 MB
07 Security Bugs and Vulnerabilities/071 Windows - Criticality and Patch Tuesday.mp4
78 MB
07 Security Bugs and Vulnerabilities/072 Windows 7 8 8.1 10 - Automate the pain away from patching.mp4
130 MB
07 Security Bugs and Vulnerabilities/073 Linux - Debian - Patching.mp4
134 MB
07 Security Bugs and Vulnerabilities/074 Mac OS X - Patching.mp4
108 MB
07 Security Bugs and Vulnerabilities/075 Firefox - Browser and extension updates.mp4
71 MB
07 Security Bugs and Vulnerabilities/076 Chrome - Browser and extension updates.mp4
14 MB
07 Security Bugs and Vulnerabilities/077 IE and Edge - Browser and extention updates.mp4
15 MB
07 Security Bugs and Vulnerabilities/078 Auto updates - The Impact to privacy and anonymity.mp4
16 MB
08 Reducing Threat Privilege/079 Goals and Learning Objectives Removing Privilege.mp4
81 MB
08 Reducing Threat Privilege/080 Windows 7 - Not using admin.mp4
56 MB
08 Reducing Threat Privilege/081 Windows 8 and 8.1 - Not using admin.mp4
53 MB
08 Reducing Threat Privilege/082 Windows 10 - Not using admin.mp4
38 MB
09 Social Engineering and Social Media Offence and Defence/083 Goals and Learning Objectives.mp4
13 MB
09 Social Engineering and Social Media Offence and Defence/084 Information Disclosure and Identity Strategies for Social Media.mp4
201 MB
09 Social Engineering and Social Media Offence and Defence/085 Identify Verification and Registration.mp4
56 MB
09 Social Engineering and Social Media Offence and Defence/086 Security Controls Against Social Threats Phishing Spam Part 1.mp4
55 MB
09 Social Engineering and Social Media Offence and Defence/087 Security Controls Against Social Threats Phishing Spam Part 2.mp4
136 MB
09 Social Engineering and Social Media Offence and Defence/088 Security Controls Against Social Threats Phishing Spam Scam Cons.mp4
52 MB
10 Security Domains/089 Goals and Learning Objectives.mp4
9.8 MB
10 Security Domains/090 Security Domains.mp4
95 MB
11 Security Through Isolation and Compartmentalization/091 Goals and Learning Objectives.mp4
18 MB
11 Security Through Isolation and Compartmentalization/092 Introduction to Isolation and Compartmentalization.mp4
24 MB
11 Security Through Isolation and Compartmentalization/093 Physical and Hardware Isolation - How to change the Mac Address.mp4
65 MB
11 Security Through Isolation and Compartmentalization/094 Physical and Hardware Isolation - Hardware Serials.mp4
138 MB
11 Security Through Isolation and Compartmentalization/095 Virtual Isolation.mp4
115 MB
11 Security Through Isolation and Compartmentalization/096 Dual Boot.mp4
28 MB
11 Security Through Isolation and Compartmentalization/097 Built-in Sandboxes and Application Isolation.mp4
38 MB
11 Security Through Isolation and Compartmentalization/098 Windows - Sandboxes and Application Isolation.mp4
92 MB
11 Security Through Isolation and Compartmentalization/099 Windows - Sandboxes and Application Isolation - Sandboxie.mp4
174 MB
11 Security Through Isolation and Compartmentalization/100 Linux - Sandboxes and Application Isolation.mp4
38 MB
11 Security Through Isolation and Compartmentalization/101 Mac OS X - Sandboxes and Application Isolation.mp4
59 MB
11 Security Through Isolation and Compartmentalization/102 Virtual Machines.mp4
157 MB
11 Security Through Isolation and Compartmentalization/103 Virtual Machine Weaknesses.mp4
107 MB
11 Security Through Isolation and Compartmentalization/104 Virtual Machine Hardening.mp4
107 MB
11 Security Through Isolation and Compartmentalization/105 Whonix OS - Anonymous Operating system.mp4
285 MB
11 Security Through Isolation and Compartmentalization/106 Whonix OS - Weaknesses.mp4
78 MB
11 Security Through Isolation and Compartmentalization/107 Qubes OS.mp4
263 MB
11 Security Through Isolation and Compartmentalization/108 Security Domains Isolation and Compartmentalization.mp4
56 MB
12 BONUS - Whats next... Volume 2 3 and 4/109 BONUS - Important Information.mp4
20 MB
12 BONUS - Whats next... Volume 2 3 and 4/110 Congratulations.mp4
27 MB
12 BONUS - Whats next... Volume 2 3 and 4/111 BONUS Lecture from Volume 2 - Router Vulnerability Scanning Shodan Qualys.mp4
204 MB
12 BONUS - Whats next... Volume 2 3 and 4/112 BONUS Lecture from Volume 2 - Password cracking part 2.mp4
143 MB
12 BONUS - Whats next... Volume 2 3 and 4/113 BONUS Lecture from Volume 3 - Bypassing firewalls and HTTP proxies part 3.mp4
122 MB
12 BONUS - Whats next... Volume 2 3 and 4/114 BONUS Lecture from Volume 4 - Email clients protocols and authentication.mp4
181 MB
12 BONUS - Whats next... Volume 2 3 and 4/115 BONUS DISCOUNT COUPONS.html
5.4 kB
Torrent Downloaded From Katcr.co - Kickasstorrents.txt
52 B