[DesireCourse.Net] Udemy - Cyber Security - Go From Zero to Hero (2020)

File Type Create Time File Size Seeders Leechers Updated
Movie 2020-09-18 3.47GB 2 1 1 year ago
Download
Magnet link   or   Save Instantly without Torrenting   or   Torrent download

To download this file, you need a free bitTorrent client such as qBittorrent.

Report Abuse
Tags
DesireCourse  Net  Udemy  Cyber  Security  From  Zero  Hero  2020  
Related Torrents
  1. [DesireCourse.Net] Udemy - The Complete Web Developer in 2020 Zero to Mastery 17.29GB
  2. [DesireCourse.Net] Udemy - The Complete Web Developer in 2020 Zero to Mastery 17.43GB
  3. [DesireCourse.Net] Udemy - The Complete Web Developer in 2020 Zero to Mastery 17.43GB
  4. [DesireCourse.Net] Udemy - The Complete Web Developer in 2020 Zero to Mastery 17.28GB
  5. desirecourse-net-udemy---the-complete-web-developer-in-2020-zero-to-mastery - Downloader.exe 782.95KB
  6. [DesireCourse.Net] Udemy - Bootstrap 4 From Scratch With 5 Projects 7.76GB
  7. [DesireCourse.Net] Udemy - Modern JavaScript (from Novice to Ninja) 8.48GB
  8. [DesireCourse.Net] Udemy - The New Modern Javascript Bootcamp (2020) 19.62GB
  9. [DesireCourse.Net] Udemy - Facebook Ads & Facebook Marketing MASTERY 2020 Coursenvy ™ 4.38GB
  10. [DesireCourse.Net] Udemy - React Native - The Practical Guide 2020 18.08GB
Files
  1. 0. Websites you may like/[CourseClub.Me].url 48B
  2. 0. Websites you may like/[DesireCourse.Net].url 51B
  3. 1. FUNDAMENTALS OF NETWORKING/1. ARE YOU READY.html 3.64KB
  4. 1. FUNDAMENTALS OF NETWORKING/10. Layers of OSI Model.mp4 33.25MB
  5. 1. FUNDAMENTALS OF NETWORKING/10. Layers of OSI Model.srt 10.85KB
  6. 1. FUNDAMENTALS OF NETWORKING/11. Introduction to TCPIP Model.mp4 76.04MB
  7. 1. FUNDAMENTALS OF NETWORKING/11. Introduction to TCPIP Model.srt 11.55KB
  8. 1. FUNDAMENTALS OF NETWORKING/12. OSI Model vs TCPIP Model.mp4 24.13MB
  9. 1. FUNDAMENTALS OF NETWORKING/12. OSI Model vs TCPIP Model.srt 4.95KB
  10. 1. FUNDAMENTALS OF NETWORKING/13. BASICS OF NETWORKING Quiz 2.html 147B
  11. 1. FUNDAMENTALS OF NETWORKING/14. Addressing in Computer Networks.mp4 53.58MB
  12. 1. FUNDAMENTALS OF NETWORKING/14. Addressing in Computer Networks.srt 9.92KB
  13. 1. FUNDAMENTALS OF NETWORKING/15. IP Address- IPv4 and IPv6.mp4 40.64MB
  14. 1. FUNDAMENTALS OF NETWORKING/15. IP Address- IPv4 and IPv6.srt 6.86KB
  15. 1. FUNDAMENTALS OF NETWORKING/16. Introduction to Classes of IP Addressing.mp4 14.98MB
  16. 1. FUNDAMENTALS OF NETWORKING/16. Introduction to Classes of IP Addressing.srt 4.43KB
  17. 1. FUNDAMENTALS OF NETWORKING/17. Classes of IP Address.mp4 54.86MB
  18. 1. FUNDAMENTALS OF NETWORKING/17. Classes of IP Address.srt 9.75KB
  19. 1. FUNDAMENTALS OF NETWORKING/18. PRACTICAL HOW TO FIND OUT YOUR PC's IP ADDRESS.mp4 22.43MB
  20. 1. FUNDAMENTALS OF NETWORKING/18. PRACTICAL HOW TO FIND OUT YOUR PC's IP ADDRESS.srt 3.54KB
  21. 1. FUNDAMENTALS OF NETWORKING/19. PRACTICAL HOW TO FIND OUT YOUR PC'S MAC ADDRESS.mp4 41.40MB
  22. 1. FUNDAMENTALS OF NETWORKING/19. PRACTICAL HOW TO FIND OUT YOUR PC'S MAC ADDRESS.srt 5.18KB
  23. 1. FUNDAMENTALS OF NETWORKING/2. What is Computer Networking - Definition and Characteristics.mp4 19.41MB
  24. 1. FUNDAMENTALS OF NETWORKING/2. What is Computer Networking - Definition and Characteristics.srt 3.24KB
  25. 1. FUNDAMENTALS OF NETWORKING/20. The Internet Protocol (IP).mp4 31.93MB
  26. 1. FUNDAMENTALS OF NETWORKING/20. The Internet Protocol (IP).srt 7.44KB
  27. 1. FUNDAMENTALS OF NETWORKING/21. BASICS OF NETWORKING QUIZ 3.html 147B
  28. 1. FUNDAMENTALS OF NETWORKING/22. Address Resolution Protocol (ARP).mp4 50.52MB
  29. 1. FUNDAMENTALS OF NETWORKING/22. Address Resolution Protocol (ARP).srt 10.29KB
  30. 1. FUNDAMENTALS OF NETWORKING/23. SUPPORT WE SECURE!.html 2.53KB
  31. 1. FUNDAMENTALS OF NETWORKING/24. Dynamic Host Configuration Protocol (DHCP).mp4 36.84MB
  32. 1. FUNDAMENTALS OF NETWORKING/24. Dynamic Host Configuration Protocol (DHCP).srt 9.19KB
  33. 1. FUNDAMENTALS OF NETWORKING/25. Internet Control Message Protocol (ICMP).mp4 37.40MB
  34. 1. FUNDAMENTALS OF NETWORKING/25. Internet Control Message Protocol (ICMP).srt 7.13KB
  35. 1. FUNDAMENTALS OF NETWORKING/26. RIP and OSPF Protocols.mp4 35.66MB
  36. 1. FUNDAMENTALS OF NETWORKING/26. RIP and OSPF Protocols.srt 6.07KB
  37. 1. FUNDAMENTALS OF NETWORKING/27. PRACTICAL HOW TO FIND OUT THE PATH OF DATA PACKETS USING TRACERT.mp4 16.99MB
  38. 1. FUNDAMENTALS OF NETWORKING/27. PRACTICAL HOW TO FIND OUT THE PATH OF DATA PACKETS USING TRACERT.srt 2.98KB
  39. 1. FUNDAMENTALS OF NETWORKING/28. What are Sockets.mp4 30.39MB
  40. 1. FUNDAMENTALS OF NETWORKING/28. What are Sockets.srt 6.50KB
  41. 1. FUNDAMENTALS OF NETWORKING/29. File Transfer Protocol (FTP).mp4 27.89MB
  42. 1. FUNDAMENTALS OF NETWORKING/29. File Transfer Protocol (FTP).srt 4.04KB
  43. 1. FUNDAMENTALS OF NETWORKING/3. Network Topologies.mp4 25.81MB
  44. 1. FUNDAMENTALS OF NETWORKING/3. Network Topologies.srt 7.67KB
  45. 1. FUNDAMENTALS OF NETWORKING/30. Hypertext Transfer Protocol (HTTP).mp4 41.68MB
  46. 1. FUNDAMENTALS OF NETWORKING/30. Hypertext Transfer Protocol (HTTP).srt 4.60KB
  47. 1. FUNDAMENTALS OF NETWORKING/31. Hyptertext Transfer ProtocolSecure Socket Layer (HTTPS).mp4 46.19MB
  48. 1. FUNDAMENTALS OF NETWORKING/31. Hyptertext Transfer ProtocolSecure Socket Layer (HTTPS).srt 6.28KB
  49. 1. FUNDAMENTALS OF NETWORKING/32. Domain Name System (DNS).mp4 20.48MB
  50. 1. FUNDAMENTALS OF NETWORKING/32. Domain Name System (DNS).srt 2.99KB
  51. 1. FUNDAMENTALS OF NETWORKING/33. BASICS OF NETWORKING Quiz 4.html 720B
  52. 1. FUNDAMENTALS OF NETWORKING/34. Conclusion.mp4 2.21MB
  53. 1. FUNDAMENTALS OF NETWORKING/34. Conclusion.srt 849B
  54. 1. FUNDAMENTALS OF NETWORKING/34.1 Network-Security-Essentials-4th-Edition William Stallings.pdf 3.06MB
  55. 1. FUNDAMENTALS OF NETWORKING/34.2 (McGraw-Hill Forouzan Networking) Behrouz A. Forouzan - Data Communications and Networking -McGraw-Hill Higher Education (2007).pdf 10.84MB
  56. 1. FUNDAMENTALS OF NETWORKING/34.3 Atul Kahate - Cryptography and network security (2006, Tata McGraw-Hill).pdf 14.95MB
  57. 1. FUNDAMENTALS OF NETWORKING/34.4 Kurose, James F._ Ross, Keith W. - Computer networking _ a top-down approach (2017) - libgen.lc.pdf 19.97MB
  58. 1. FUNDAMENTALS OF NETWORKING/4. Meet the instructors!.mp4 7.26MB
  59. 1. FUNDAMENTALS OF NETWORKING/4. Meet the instructors!.srt 484B
  60. 1. FUNDAMENTALS OF NETWORKING/5. History and Applications of Computer Networking.mp4 39.06MB
  61. 1. FUNDAMENTALS OF NETWORKING/5. History and Applications of Computer Networking.srt 6.68KB
  62. 1. FUNDAMENTALS OF NETWORKING/6. Before moving ahead....html 2.53KB
  63. 1. FUNDAMENTALS OF NETWORKING/6.1 Network-Security-Essentials-4th-Edition William Stallings.pdf 3.06MB
  64. 1. FUNDAMENTALS OF NETWORKING/6.2 (McGraw-Hill Forouzan Networking) Behrouz A. Forouzan - Data Communications and Networking -McGraw-Hill Higher Education (2007).pdf 10.83MB
  65. 1. FUNDAMENTALS OF NETWORKING/6.3 Ethem Mining - Kali Linux Hacking_ A Complete Step by Step Guide to Learn the Fundamentals of Cyber Security, Hacking, and Penetration Testing. Includes Valuable Basic Networking Concepts-Independentl.epub 2.56MB
  66. 1. FUNDAMENTALS OF NETWORKING/7. Protocols and Standards.mp4 28.91MB
  67. 1. FUNDAMENTALS OF NETWORKING/7. Protocols and Standards.srt 4.93KB
  68. 1. FUNDAMENTALS OF NETWORKING/8. BASICS OF NETWORKING Quiz 1.html 147B
  69. 1. FUNDAMENTALS OF NETWORKING/9. Introduction to OSI Model.mp4 32.18MB
  70. 1. FUNDAMENTALS OF NETWORKING/9. Introduction to OSI Model.srt 5.05KB
  71. 2. GETTING STARTED WITH CYBER SECURITY/1. Definition of Computer Security.mp4 28.43MB
  72. 2. GETTING STARTED WITH CYBER SECURITY/1. Definition of Computer Security.srt 3.92KB
  73. 2. GETTING STARTED WITH CYBER SECURITY/2. Interesting Facts about Cyber Security.mp4 42.84MB
  74. 2. GETTING STARTED WITH CYBER SECURITY/2. Interesting Facts about Cyber Security.srt 5.31KB
  75. 2. GETTING STARTED WITH CYBER SECURITY/3. Have a look at this!.mp4 11.74MB
  76. 2. GETTING STARTED WITH CYBER SECURITY/3. Have a look at this!.srt 776B
  77. 2. GETTING STARTED WITH CYBER SECURITY/4. History of Cyber Security.mp4 60.12MB
  78. 2. GETTING STARTED WITH CYBER SECURITY/4. History of Cyber Security.srt 7.22KB
  79. 2. GETTING STARTED WITH CYBER SECURITY/5. Scope and Career Insights in Cyber Security.mp4 48.28MB
  80. 2. GETTING STARTED WITH CYBER SECURITY/5. Scope and Career Insights in Cyber Security.srt 10.67KB
  81. 2. GETTING STARTED WITH CYBER SECURITY/5.1 How to Become a Cyber Security Professional.html 94B
  82. 2. GETTING STARTED WITH CYBER SECURITY/6. GETTING STARTED WITH CYBER SECURITY QUIZ.html 661B
  83. 2. GETTING STARTED WITH CYBER SECURITY/7. DID YOU RATE.html 2.53KB
  84. 2. GETTING STARTED WITH CYBER SECURITY/8. Conclusion.mp4 3.58MB
  85. 2. GETTING STARTED WITH CYBER SECURITY/8. Conclusion.srt 693B
  86. 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/1. Introduction.mp4 5.73MB
  87. 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/1. Introduction.srt 1.43KB
  88. 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/10. SECTION 3 QUIZ.html 627B
  89. 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/11. We value your feedback!.html 2.54KB
  90. 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/12. Conclusion.mp4 2.62MB
  91. 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/12. Conclusion.srt 785B
  92. 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/2. Standard Definition of Cyber Security.mp4 19.01MB
  93. 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/2. Standard Definition of Cyber Security.srt 3.07KB
  94. 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/3. Types of Computer Security.mp4 25.09MB
  95. 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/3. Types of Computer Security.srt 3.26KB
  96. 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/4. Key Terms in Cyber Security.mp4 30.67MB
  97. 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/4. Key Terms in Cyber Security.srt 7.99KB
  98. 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/5. The Elements of Information Security.mp4 23.07MB
  99. 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/5. The Elements of Information Security.srt 6.44KB
  100. 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/6. Types of Attacks.mp4 43.35MB
  101. 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/6. Types of Attacks.srt 13.35KB
  102. 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/7. Roles in Cyber Security Part 1.mp4 48.97MB
  103. 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/7. Roles in Cyber Security Part 1.srt 9.59KB
  104. 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/8. Roles in Cyber Security Part 2.mp4 34.05MB
  105. 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/8. Roles in Cyber Security Part 2.srt 6.29KB
  106. 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/9. PRACTICAL USING OSINT FRAMEWORK FOR INFORMATION GATHERING.mp4 41.17MB
  107. 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/9. PRACTICAL USING OSINT FRAMEWORK FOR INFORMATION GATHERING.srt 6.40KB
  108. 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/[CourseClub.Me].url 48B
  109. 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/[DesireCourse.Net].url 51B
  110. 4. DIVING DEEP INTO CYBER SECURITY/1. Introduction.mp4 10.16MB
  111. 4. DIVING DEEP INTO CYBER SECURITY/1. Introduction.srt 1.72KB
  112. 4. DIVING DEEP INTO CYBER SECURITY/10. Symmetric Encryption.mp4 14.37MB
  113. 4. DIVING DEEP INTO CYBER SECURITY/10. Symmetric Encryption.srt 3.48KB
  114. 4. DIVING DEEP INTO CYBER SECURITY/11. AES and DES.mp4 44.52MB
  115. 4. DIVING DEEP INTO CYBER SECURITY/11. AES and DES.srt 7.12KB
  116. 4. DIVING DEEP INTO CYBER SECURITY/12. Asymmetric Encryption.mp4 16.27MB
  117. 4. DIVING DEEP INTO CYBER SECURITY/12. Asymmetric Encryption.srt 3.12KB
  118. 4. DIVING DEEP INTO CYBER SECURITY/13. Hey there! Support We Secure..html 2.53KB
  119. 4. DIVING DEEP INTO CYBER SECURITY/14. RSA & Diffie Hellman.mp4 47.48MB
  120. 4. DIVING DEEP INTO CYBER SECURITY/14. RSA & Diffie Hellman.srt 9.20KB
  121. 4. DIVING DEEP INTO CYBER SECURITY/15. Hashing.mp4 62.06MB
  122. 4. DIVING DEEP INTO CYBER SECURITY/15. Hashing.srt 8.41KB
  123. 4. DIVING DEEP INTO CYBER SECURITY/16. Security Organizations.mp4 26.77MB
  124. 4. DIVING DEEP INTO CYBER SECURITY/16. Security Organizations.srt 5.89KB
  125. 4. DIVING DEEP INTO CYBER SECURITY/17. Critical Thinking in Cyber Security.mp4 21.72MB
  126. 4. DIVING DEEP INTO CYBER SECURITY/17. Critical Thinking in Cyber Security.srt 4.82KB
  127. 4. DIVING DEEP INTO CYBER SECURITY/18. The Five Critical Thinking Skills.mp4 24.13MB
  128. 4. DIVING DEEP INTO CYBER SECURITY/18. The Five Critical Thinking Skills.srt 7.16KB
  129. 4. DIVING DEEP INTO CYBER SECURITY/19. PRACTICAL USING NSLOOKUP TOOL.mp4 7.14MB
  130. 4. DIVING DEEP INTO CYBER SECURITY/19. PRACTICAL USING NSLOOKUP TOOL.srt 3.09KB
  131. 4. DIVING DEEP INTO CYBER SECURITY/2. Security Architect's View of Security.mp4 46.98MB
  132. 4. DIVING DEEP INTO CYBER SECURITY/2. Security Architect's View of Security.srt 10.03KB
  133. 4. DIVING DEEP INTO CYBER SECURITY/20. PRACTICAL USING NETSTAT TOOL.mp4 32.45MB
  134. 4. DIVING DEEP INTO CYBER SECURITY/20. PRACTICAL USING NETSTAT TOOL.srt 4.37KB
  135. 4. DIVING DEEP INTO CYBER SECURITY/21. SECTION 4 QUIZ - DIVING DEEP INTO CYBER SECURITY.html 627B
  136. 4. DIVING DEEP INTO CYBER SECURITY/22. Conclusion.mp4 2.78MB
  137. 4. DIVING DEEP INTO CYBER SECURITY/22. Conclusion.srt 726B
  138. 4. DIVING DEEP INTO CYBER SECURITY/3. What is Vulnerability Assessment.mp4 36.97MB
  139. 4. DIVING DEEP INTO CYBER SECURITY/3. What is Vulnerability Assessment.srt 5.76KB
  140. 4. DIVING DEEP INTO CYBER SECURITY/4. 4 Phases of Vulnerability Assessment.mp4 40.36MB
  141. 4. DIVING DEEP INTO CYBER SECURITY/4. 4 Phases of Vulnerability Assessment.srt 12.64KB
  142. 4. DIVING DEEP INTO CYBER SECURITY/5. PRACTICAL DOWNLOADING NESSUS VULNERABILITY SCANNER.mp4 11.24MB
  143. 4. DIVING DEEP INTO CYBER SECURITY/5. PRACTICAL DOWNLOADING NESSUS VULNERABILITY SCANNER.srt 1.95KB
  144. 4. DIVING DEEP INTO CYBER SECURITY/6. PRACTICAL CREATING A ADVANCE NETWORK SCAN POLICY.mp4 28.84MB
  145. 4. DIVING DEEP INTO CYBER SECURITY/6. PRACTICAL CREATING A ADVANCE NETWORK SCAN POLICY.srt 7.48KB
  146. 4. DIVING DEEP INTO CYBER SECURITY/7. PRACTICAL INITIATING A SCAN USING USER DEFINED POLICIES.mp4 16.75MB
  147. 4. DIVING DEEP INTO CYBER SECURITY/7. PRACTICAL INITIATING A SCAN USING USER DEFINED POLICIES.srt 3.80KB
  148. 4. DIVING DEEP INTO CYBER SECURITY/8. PRACTICAL GOING THROUGH SCANNED RESULTS.mp4 15.11MB
  149. 4. DIVING DEEP INTO CYBER SECURITY/8. PRACTICAL GOING THROUGH SCANNED RESULTS.srt 4.06KB
  150. 4. DIVING DEEP INTO CYBER SECURITY/9. Introduction to Cryptography.mp4 41.86MB
  151. 4. DIVING DEEP INTO CYBER SECURITY/9. Introduction to Cryptography.srt 5.81KB
  152. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/1. Introduction.mp4 7.23MB
  153. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/1. Introduction.srt 1.03KB
  154. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/10. OH MY GOD! VIRUS!!.mp4 37.79MB
  155. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/10. OH MY GOD! VIRUS!!.srt 7.55KB
  156. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/11. Types of Virus.mp4 59.33MB
  157. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/11. Types of Virus.srt 11.32KB
  158. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/12. You should defend yourself!.mp4 45.98MB
  159. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/12. You should defend yourself!.srt 8.95KB
  160. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/13. Have you ever heard about a Ransomware.mp4 81.12MB
  161. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/13. Have you ever heard about a Ransomware.srt 12.43KB
  162. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/14. IMPORTANT!.html 2.53KB
  163. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/15. PRACTICAL INFORMATION GATHERING USING SHODAN.mp4 74.34MB
  164. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/15. PRACTICAL INFORMATION GATHERING USING SHODAN.srt 9.69KB
  165. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/16. The Cyber Kill Chain.mp4 31.30MB
  166. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/16. The Cyber Kill Chain.srt 10.52KB
  167. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/17. Introduction to Social Engineering.mp4 28.11MB
  168. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/17. Introduction to Social Engineering.srt 5.94KB
  169. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/18. Types of Social Engineering.mp4 57.62MB
  170. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/18. Types of Social Engineering.srt 6.99KB
  171. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/19. PRACTICAL HOW TO FIND OUT USERNAMES AND PASSWORDS USING SOCIAL ENGINEERING.mp4 85.55MB
  172. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/19. PRACTICAL HOW TO FIND OUT USERNAMES AND PASSWORDS USING SOCIAL ENGINEERING.srt 12.47KB
  173. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/2. Different types of Actors in Cyber Security.mp4 64.44MB
  174. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/2. Different types of Actors in Cyber Security.srt 11.29KB
  175. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/20. SECTION 5 QUIZ - TYPES OF ACTORS, ATTACKS AND MALWARE.html 627B
  176. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/21. Conclusion.mp4 4.15MB
  177. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/21. Conclusion.srt 847B
  178. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/3. Types of Cyber Attacks.mp4 31.37MB
  179. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/3. Types of Cyber Attacks.srt 4.95KB
  180. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/4. Hacking Organizations around the Globe.mp4 27.15MB
  181. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/4. Hacking Organizations around the Globe.srt 5.91KB
  182. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/5. Security Services and Mechanisms.mp4 17.62MB
  183. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/5. Security Services and Mechanisms.srt 4.31KB
  184. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/6. Introduction to Threats.mp4 11.24MB
  185. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/6. Introduction to Threats.srt 3.99KB
  186. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/7. What is a Malware.mp4 47.53MB
  187. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/7. What is a Malware.srt 9.28KB
  188. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/8. Everything about Trojans.mp4 50.19MB
  189. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/8. Everything about Trojans.srt 8.64KB
  190. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/9. Types of Trojans.mp4 49.55MB
  191. 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/9. Types of Trojans.srt 8.11KB
  192. 6. KEY SECURITY CONCEPTS/1. Introduction.mp4 8.71MB
  193. 6. KEY SECURITY CONCEPTS/1. Introduction.srt 1.72KB
  194. 6. KEY SECURITY CONCEPTS/10. The NIST Framework.mp4 21.87MB
  195. 6. KEY SECURITY CONCEPTS/10. The NIST Framework.srt 3.83KB
  196. 6. KEY SECURITY CONCEPTS/11. The COBIT Framework.mp4 25.57MB
  197. 6. KEY SECURITY CONCEPTS/11. The COBIT Framework.srt 4.07KB
  198. 6. KEY SECURITY CONCEPTS/12. Other Security Frameworks.mp4 25.21MB
  199. 6. KEY SECURITY CONCEPTS/12. Other Security Frameworks.srt 5.43KB
  200. 6. KEY SECURITY CONCEPTS/13. SECTION 6 QUIZ - KEY SECURITY CONCEPTS.html 627B
  201. 6. KEY SECURITY CONCEPTS/14. Leave a Rating!.html 2.53KB
  202. 6. KEY SECURITY CONCEPTS/15. Conclusion.mp4 2.13MB
  203. 6. KEY SECURITY CONCEPTS/15. Conclusion.srt 732B
  204. 6. KEY SECURITY CONCEPTS/2. Confidentiality - The Most Important Element of Security.mp4 26.20MB
  205. 6. KEY SECURITY CONCEPTS/2. Confidentiality - The Most Important Element of Security.srt 5.07KB
  206. 6. KEY SECURITY CONCEPTS/3. Integrity, Authentication, Access Control and Non-Repudiation.mp4 55.85MB
  207. 6. KEY SECURITY CONCEPTS/3. Integrity, Authentication, Access Control and Non-Repudiation.srt 10.41KB
  208. 6. KEY SECURITY CONCEPTS/4. Introduction to Incident Response Team.mp4 32.05MB
  209. 6. KEY SECURITY CONCEPTS/4. Introduction to Incident Response Team.srt 6.49KB
  210. 6. KEY SECURITY CONCEPTS/5. Phases of Incident Response.mp4 19.83MB
  211. 6. KEY SECURITY CONCEPTS/5. Phases of Incident Response.srt 6.23KB
  212. 6. KEY SECURITY CONCEPTS/6. Laws in Cyber Security.mp4 31.94MB
  213. 6. KEY SECURITY CONCEPTS/6. Laws in Cyber Security.srt 6.23KB
  214. 6. KEY SECURITY CONCEPTS/7. What are Audits in Cyber Security.mp4 45.02MB
  215. 6. KEY SECURITY CONCEPTS/7. What are Audits in Cyber Security.srt 12.44KB
  216. 6. KEY SECURITY CONCEPTS/8. Internal Audit vs External Audit.mp4 34.89MB
  217. 6. KEY SECURITY CONCEPTS/8. Internal Audit vs External Audit.srt 5.57KB
  218. 6. KEY SECURITY CONCEPTS/9. How to carry out an Internal Audit.mp4 48.54MB
  219. 6. KEY SECURITY CONCEPTS/9. How to carry out an Internal Audit.srt 13.56KB
  220. 7. FIREWALLS AND ANTIVIRUS/1. Introduction.mp4 13.02MB
  221. 7. FIREWALLS AND ANTIVIRUS/1. Introduction.srt 1.61KB
  222. 7. FIREWALLS AND ANTIVIRUS/10. Firewalls vs Antivirus.mp4 9.27MB
  223. 7. FIREWALLS AND ANTIVIRUS/10. Firewalls vs Antivirus.srt 2.21KB
  224. 7. FIREWALLS AND ANTIVIRUS/11. THE FINAL QUIZ - FIREWALLS AND ANTIVIRUS.html 870B
  225. 7. FIREWALLS AND ANTIVIRUS/12. CONGRATULATIONS!.mp4 18.64MB
  226. 7. FIREWALLS AND ANTIVIRUS/12. CONGRATULATIONS!.srt 2.37KB
  227. 7. FIREWALLS AND ANTIVIRUS/2. Intrusion Detection System.mp4 59.16MB
  228. 7. FIREWALLS AND ANTIVIRUS/2. Intrusion Detection System.srt 12.42KB
  229. 7. FIREWALLS AND ANTIVIRUS/3. Introduction to Firewalls.mp4 53.33MB
  230. 7. FIREWALLS AND ANTIVIRUS/3. Introduction to Firewalls.srt 10.47KB
  231. 7. FIREWALLS AND ANTIVIRUS/4. IDS evasion techniques.mp4 33.93MB
  232. 7. FIREWALLS AND ANTIVIRUS/4. IDS evasion techniques.srt 8.55KB
  233. 7. FIREWALLS AND ANTIVIRUS/5. What is DMZ.mp4 36.70MB
  234. 7. FIREWALLS AND ANTIVIRUS/5. What is DMZ.srt 6.32KB
  235. 7. FIREWALLS AND ANTIVIRUS/6. Firewall evasion techniques.mp4 40.89MB
  236. 7. FIREWALLS AND ANTIVIRUS/6. Firewall evasion techniques.srt 9.39KB
  237. 7. FIREWALLS AND ANTIVIRUS/7. Different types of Firewalls.mp4 31.95MB
  238. 7. FIREWALLS AND ANTIVIRUS/7. Different types of Firewalls.srt 10.89KB
  239. 7. FIREWALLS AND ANTIVIRUS/8. The Antivirus!.mp4 20.17MB
  240. 7. FIREWALLS AND ANTIVIRUS/8. The Antivirus!.srt 3.73KB
  241. 7. FIREWALLS AND ANTIVIRUS/9. Antivirus Detection Techniques.mp4 72.62MB
  242. 7. FIREWALLS AND ANTIVIRUS/9. Antivirus Detection Techniques.srt 11.74KB
  243. [CourseClub.Me].url 48B
  244. [DesireCourse.Net].url 51B