TorBT - Torrents and Magnet Links Search Engine

[ FreeCourseWeb.com ] Udemy - Master Cybersecurity,Ethical Hacking and Penetrating Testing (Updated 09 - 2021)

File Name
Size
Get Bonus Downloads Here.url
183 B
~Get Your Files Here !/1. Introduction/1. Who Am I.mp4
6.6 MB
~Get Your Files Here !/1. Introduction/1. Who Am I.srt
1.6 kB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/1. What is Cybersecurity .mp4
33 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/1. What is Cybersecurity .srt
4.9 kB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/10. Closure.mp4
22 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/10. Closure.srt
3.3 kB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/11. Setting up Labs.mp4
162 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/11. Setting up Labs.srt
23 kB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/2. What is Ethical Hacking .srt
3.7 kB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/2. What is Ethical Hacking.mp4
5.7 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/3. What is Penetrating Testing .mp4
15 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/3. What is Penetrating Testing .srt
2.3 kB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/4. Difference Between Ethical Hacking and Penetrating Testing.mp4
14 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/4. Difference Between Ethical Hacking and Penetrating Testing.srt
2.4 kB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/5. Purpose of Studying Ethical Hacking and Penetrating Testing.mp4
23 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/5. Purpose of Studying Ethical Hacking and Penetrating Testing.srt
2.9 kB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/6. Scope For Ethical Hackers and Penetrating Testers.mp4
18 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/6. Scope For Ethical Hackers and Penetrating Testers.srt
2.4 kB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/7. Do Ethical Hackers And Penetrating Testers Need Permission.mp4
6.2 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/7. Do Ethical Hackers And Penetrating Testers Need Permission.srt
818 B
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/8. Who Conduct it .mp4
25 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/8. Who Conduct it .srt
3.1 kB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/9. Who should You Choose .mp4
20 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/9. Who should You Choose .srt
2.2 kB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/1. Goals and Learning Objectives.mp4
19 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/1. Goals and Learning Objectives.srt
1.1 kB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/10. Zero Trust Model.mp4
82 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/10. Zero Trust Model.srt
7.0 kB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/2. Protect What You Value.mp4
89 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/2. Protect What You Value.srt
9.3 kB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/3. What is Privacy, Anonymity and Pseudonymity .mp4
152 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/3. What is Privacy, Anonymity and Pseudonymity .srt
12 kB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/4. Security, Vulnerabilities, Threats and Adversaries.mp4
112 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/4. Security, Vulnerabilities, Threats and Adversaries.srt
9.7 kB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/5. Asset Selection.mp4
17 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/5. Asset Selection.srt
7.1 kB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/6. Threat Modelling And Risk Assessment.mp4
151 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/6. Threat Modelling And Risk Assessment.srt
13 kB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/7. Security,Anonymity and Privacy.mp4
57 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/7. Security,Anonymity and Privacy.srt
4.3 kB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/8. Confidentiality, Integrity and Availability - (Security Attributes).mp4
135 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/8. Confidentiality, Integrity and Availability - (Security Attributes).srt
10 kB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/9. Defence in Depth.mp4
33 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/9. Defence in Depth.srt
3.8 kB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/1. Goals and Learning Objectives - Know Your Enemy.mp4
21 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/1. Goals and Learning Objectives - Know Your Enemy.srt
1.3 kB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/10. Social Engineering - Scams, Cons, Tricks and Fraud.mp4
156 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/10. Social Engineering - Scams, Cons, Tricks and Fraud.srt
15 kB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/2. Why You Need Security .mp4
181 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/2. Why You Need Security .srt
17 kB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/3. The Top 3 Things You Need To Stay Safe Online.mp4
12 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/3. The Top 3 Things You Need To Stay Safe Online.srt
7.1 kB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4
172 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.srt
15 kB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/5. Hackers, crackers and cyber criminals.mp4
140 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/5. Hackers, crackers and cyber criminals.srt
9.7 kB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/6. Malware, Viruses, Root kits and RATs.mp4
146 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/6. Malware, Viruses, Root kits and RATs.srt
16 kB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/7. Spyware, Adware, Scareware, PUPs & Browser hijacking.mp4
171 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/7. Spyware, Adware, Scareware, PUPs & Browser hijacking.srt
16 kB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/8. What is Phishing, Vishing and SMShing.mp4
236 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/8. What is Phishing, Vishing and SMShing.srt
26 kB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/9. Spamming & Doxing.mp4
160 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/9. Spamming & Doxing.srt
20 kB
~Get Your Files Here !/Bonus Resources.txt
357 B