|
Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
| [TGx]Downloaded from torrentgalaxy.to .txt |
585B |
| 0 |
1.05KB |
| 1 |
4.15KB |
| 1.1 Cyber Law.pdf |
175.63KB |
| 1.1 Security Measures.pdf |
140.66KB |
| 1.1 What is an Attack.pdf |
121.61KB |
| 1.1 What is Cryptology.pdf |
164.38KB |
| 1.1 What is DDOS Attack.pdf |
155.13KB |
| 1.1 What is meant by term Digital Forensics.pdf |
293.82KB |
| 1.1 What is Substitution Cipher.pdf |
184.30KB |
| 1. Cyber Law.mp4 |
59.52MB |
| 1. Cyber Security Course Overview.mp4 |
12.84MB |
| 1. Definition of Digital Forensics.mp4 |
90.79MB |
| 1. Fundamentals of Networking-Overview.mp4 |
17.12MB |
| 1. Introduction.mp4 |
101.03MB |
| 1. Security Measures.mp4 |
64.89MB |
| 1. Test your knowledge.html |
174B |
| 1. Test your knowledge.html |
174B |
| 1. Test your knowledge.html |
174B |
| 1. What is an Attack.mp4 |
52.83MB |
| 1. What is Cryptology.mp4 |
65.08MB |
| 1. What is DDOS Attack.mp4 |
102.90MB |
| 1. What is Substitution Cipher.mp4 |
85.02MB |
| 10 |
29.77KB |
| 10.1 Cryptography System.pdf |
112.75KB |
| 10.1 Cyber Crimes Against Person - Email and SMS Spoofing.pdf |
133.39KB |
| 10.1 Networking Devices- Switch.pdf |
102.52KB |
| 10.1 OSI Model - Physical Layer.pdf |
191.36KB |
| 10.1 Spyware.pdf |
171.96KB |
| 10.1 Why Asymmetric key cryptography is important.pdf |
121.15KB |
| 10. Cryptography System.mp4 |
28.89MB |
| 10. Cyber Crimes Against Person - Email and SMS Spoofing.mp4 |
73.67MB |
| 10. Networking Devices Switch.mp4 |
31.04MB |
| 10. OSI Model Physical Layer.mp4 |
22.45MB |
| 10. Types of Malware Spyware.mp4 |
20.98MB |
| 10. Why Asymmetric key cryptography is important.mp4 |
17.20MB |
| 100 |
487.27KB |
| 101 |
536.37KB |
| 102 |
578.28KB |
| 103 |
711.41KB |
| 104 |
27.57KB |
| 105 |
313.83KB |
| 106 |
563.89KB |
| 107 |
793.45KB |
| 108 |
140.44KB |
| 109 |
25.35KB |
| 11 |
2.64KB |
| 11.1 3+Quarters+Complete+-+Well+Done+Keep+Going.pdf |
623.46KB |
| 11.1 Advantages of Asymmetric Key Cryptography.pdf |
132.71KB |
| 11.1 Crimeware.pdf |
171.96KB |
| 11.1 Cryptography in everyday life.pdf |
138.43KB |
| 11.1 OSI Layers Example.pdf |
191.36KB |
| 11.1 What is an IP Address.pdf |
153.36KB |
| 11. Advantages of Asymmetric Key Cryptography.mp4 |
69.42MB |
| 11. Cryptography in everyday life.mp4 |
143.84MB |
| 11. OSI Layers Example.mp4 |
19.43MB |
| 11. Types of Malware Crimeware.mp4 |
43.54MB |
| 11. What is an IP Address.mp4 |
46.01MB |
| 11. You've Achieved 75% Let's Celebrate Your Progress And Keep Going To 100% .mp4 |
4.71MB |
| 110 |
587.68KB |
| 111 |
815.74KB |
| 112 |
897.51KB |
| 113 |
450.03KB |
| 114 |
493.85KB |
| 115 |
632.41KB |
| 116 |
160.11KB |
| 117 |
413.49KB |
| 118 |
51.97KB |
| 119 |
16.02KB |
| 12 |
1.96KB |
| 12.1 Cyber Crimes Against Person - Carding.pdf |
133.39KB |
| 12.1 Digital Signature.pdf |
171.78KB |
| 12.1 OSI Layers Protocols.pdf |
148.31KB |
| 12.1 Rootkit.pdf |
171.96KB |
| 12.1 Types of Cryptography.pdf |
72.48KB |
| 12.1 What is a MAC Address.pdf |
153.36KB |
| 12. Cyber Crimes Against Person - Carding.mp4 |
27.84MB |
| 12. Digital Signature.mp4 |
55.46MB |
| 12. OSI Layers Protocols.mp4 |
48.06MB |
| 12. Types of Cryptography.mp4 |
25.48MB |
| 12. Types of Malware Rootkit.mp4 |
40.36MB |
| 12. What is a MAC Address.mp4 |
46.89MB |
| 120 |
276.74KB |
| 121 |
884.02KB |
| 122 |
447.48KB |
| 123 |
870.42KB |
| 124 |
298.76KB |
| 125 |
724.53KB |
| 126 |
141.06KB |
| 13 |
970B |
| 13.1 Cyber Crimes Against Person - Cheating and Fraud.pdf |
133.39KB |
| 13.1 HTTP Protocol.pdf |
128.40KB |
| 13.1 Ransomware.pdf |
171.96KB |
| 13.1 Signing and Verification Process.pdf |
171.78KB |
| 13.1 Symmetric Key Cryptography.pdf |
129.99KB |
| 13.1 What is a PORT Address.pdf |
153.36KB |
| 13. Cyber Crimes Against Person - Cheating and Fraud.mp4 |
80.30MB |
| 13. HTTP Protocol.mp4 |
198.06MB |
| 13. Signing and Verification Process.mp4 |
36.49MB |
| 13. Symmetric Key Cryptography.mp4 |
56.16MB |
| 13. Types of Malware Ransomware.mp4 |
69.23MB |
| 13. What is a PORT Address.mp4 |
39.50MB |
| 14 |
40.19KB |
| 14.1 Asymmetric Key Cryptography.pdf |
190.79KB |
| 14.1 Cyber Crimes Against Person - Assault by Threat.pdf |
143.39KB |
| 14.1 How to check Integrity of Message.pdf |
171.78KB |
| 14.1 Man in the Middle Attack.pdf |
136.85KB |
| 14.1 Quarter+Complete+-+Well+Done+Keep+Going.pdf |
464.29KB |
| 14.1 What is a DNS.pdf |
124.58KB |
| 14. Asymmetric Key Cryptography.mp4 |
111.62MB |
| 14. Cyber Crimes Against Person - Assault by Threat.mp4 |
25.44MB |
| 14. How to check the Integrity of a Message.mp4 |
118.21MB |
| 14. Man in the Middle Attack.mp4 |
74.35MB |
| 14. What is a DNS.mp4 |
84.73MB |
| 14. You've Achieved 25% Let's Celebrate Your Progress And Keep Going To 50% .mp4 |
3.63MB |
| 15 |
67.27KB |
| 15.1 Cyber Crime Against Persons Property.pdf |
143.98KB |
| 15.1 Man in the Middle Attack Example.pdf |
118.73KB |
| 15.1 TCP Protocol.pdf |
156.16KB |
| 15.1 What is a VPN.pdf |
134.89KB |
| 15.1 What is Hashing.pdf |
168.92KB |
| 15. Cyber Crime Against Persons Property.mp4 |
220.39MB |
| 15. Man in the Middle Attack Example.mp4 |
97.96MB |
| 15. TCP Protocol.mp4 |
90.61MB |
| 15. What is a VPN.mp4 |
38.69MB |
| 15. What is Hashing.mp4 |
127.93MB |
| 16 |
498B |
| 16.1 Cyber Crime against Government.pdf |
180.16KB |
| 16.1 Hashing Algorithm.pdf |
168.92KB |
| 16.1 Sniffing Attack.pdf |
181.52KB |
| 16.1 UDP Protocol.pdf |
153.66KB |
| 16.1 What is a Virus.pdf |
113.77KB |
| 16. Cyber Crime against Government.mp4 |
113.95MB |
| 16. Hashing Algorithm.mp4 |
9.14MB |
| 16. Sniffing Attack.mp4 |
106.73MB |
| 16. UDP Protocol.mp4 |
116.82MB |
| 16. What is a Virus.mp4 |
31.61MB |
| 17 |
46.96KB |
| 17.1 Cyber Crime against Society at Large.pdf |
158.22KB |
| 17.1 Difference between UDP and TCP Protocol.pdf |
118.53KB |
| 17.1 DOS Attack.pdf |
160.29KB |
| 17.1 Learn Hacking and the different Types of Hackers.pdf |
229.88KB |
| 17.1 Techniques of Hashing.pdf |
141.63KB |
| 17. Cyber Crime against Society at Large.mp4 |
88.32MB |
| 17. Difference between UDP and TCP Protocol.mp4 |
46.50MB |
| 17. DOS Attack.mp4 |
202.50MB |
| 17. Learn Hacking and the different Types of Hackers.mp4 |
75.33MB |
| 17. Techniques of Hashing.mp4 |
82.69MB |
| 18 |
1.20KB |
| 18.1 DHCP Protocol.pdf |
160.66KB |
| 18.1 DOS Attack Example.pdf |
83.86KB |
| 18.1 Job Profiles in the field of Cybersecurity.pdf |
146.55KB |
| 18. DHCP Protocol.mp4 |
175.37MB |
| 18. DOS Attack Example.mp4 |
44.86MB |
| 18. Job Profiles in the field of Cybersecurity.mp4 |
25.52MB |
| 19 |
48.48KB |
| 19.1 ARP Protocol.pdf |
131.00KB |
| 19.1 Important Cybersecurity Skills.pdf |
112.99KB |
| 19. ARP Protocol.mp4 |
50.76MB |
| 19. Important Cybersecurity Skills.mp4 |
105.48MB |
| 2 |
1.71KB |
| 2.1 Categories of Cyber Attacks.pdf |
68.84KB |
| 2.1 Computer Networks.pdf |
156.35KB |
| 2.1 DDOS Attack Example.pdf |
155.13KB |
| 2.1 Process of Digital Forensics.pdf |
112.32KB |
| 2.1 The Need for Cryptography.pdf |
103.09KB |
| 2.1 What is Firewall.pdf |
146.81KB |
| 2.1 What is Transposition Cipher.pdf |
194.30KB |
| 2.1 Why there is a need for Cyber Law.pdf |
194.51KB |
| 2. Assessment.html |
174B |
| 2. Assessment.html |
174B |
| 2. Assessment.html |
174B |
| 2. Categories of Cyber Attacks.mp4 |
174.14MB |
| 2. Computer Networks.mp4 |
46.22MB |
| 2. DDOS Attack Example.mp4 |
199.68MB |
| 2. Introduce Yourself To Your Fellow Students And Tell Everyone What Are Your Goals.html |
611B |
| 2. Introduction of Facilitator.mp4 |
57.29MB |
| 2. Process of Digital Forensics.mp4 |
160.76MB |
| 2. The Need for Cryptography.mp4 |
62.44MB |
| 2. What is Firewall.mp4 |
223.83MB |
| 2. What is Transposition Cipher.mp4 |
38.47MB |
| 2. Why there is a need for Cyber Law.mp4 |
59.35MB |
| 20 |
3.20KB |
| 20.1 What is an IP address and its types.pdf |
144.46KB |
| 20. What is an IP address and its types.mp4 |
143.31MB |
| 21 |
298B |
| 21.1 What is a Port Address and its types.pdf |
212.52KB |
| 21. What is a Port Address and its types.mp4 |
80.74MB |
| 22 |
81B |
| 22.1 Network Troubleshooting.pdf |
126.63KB |
| 22. Network Troubleshooting.mp4 |
181.84MB |
| 23 |
3.10KB |
| 24 |
1.03KB |
| 25 |
47.14KB |
| 26 |
40.83KB |
| 27 |
32B |
| 28 |
48.17KB |
| 29 |
65.95KB |
| 3 |
32.25KB |
| 3.1 All+Complete+-+Well+Done.pdf |
839.99KB |
| 3.1 Basic Cryptography System.pdf |
111.53KB |
| 3.1 Cesar Cipher and how it works.pdf |
150.28KB |
| 3.1 Is our Data really safe on internet.pdf |
155.70KB |
| 3.1 Let's+Celebrate+Your+Progress.pdf |
840.02KB |
| 3.1 Phishing Attack.pdf |
95.92KB |
| 3.1 The OSI Model.pdf |
191.36KB |
| 3.1 Types of Attacks.pdf |
164.54KB |
| 3.1 Types of Digital Forensics.pdf |
191.62KB |
| 3.1 Types of Firewall- Packet Filter.pdf |
83.08KB |
| 3.1 What is Cyber Crime.pdf |
135.27KB |
| 3. Basic Cryptography System.mp4 |
22.69MB |
| 3. Cesar Cipher and how it works.mp4 |
125.69MB |
| 3. Is our Data really safe on internet.mp4 |
16.52MB |
| 3. Let's Celebrate Your Progress In This Course 25% 50% 75% 100%!!.mp4 |
11.95MB |
| 3. Phishing Attack.mp4 |
157.44MB |
| 3. The OSI Model.mp4 |
61.28MB |
| 3. Types of Attacks.mp4 |
16.56MB |
| 3. Types of Digital Forensics.mp4 |
39.42MB |
| 3. Types of Firewall Packet Filter.mp4 |
130.39MB |
| 3. What is Cyber Crime.mp4 |
72.38MB |
| 3. You've Achieved 100% Let's Celebrate! Remember To Share Your Certificate!!.mp4 |
9.73MB |
| 30 |
714B |
| 31 |
16.16KB |
| 32 |
59.89KB |
| 33 |
3.65KB |
| 34 |
8.05KB |
| 35 |
860B |
| 36 |
19.13KB |
| 37 |
2.61KB |
| 38 |
684B |
| 39 |
13.38KB |
| 4 |
2.09KB |
| 4.1 Classification of Cyber Crime.pdf |
114.93KB |
| 4.1 Cyber Security Workbook.pdf |
12.60MB |
| 4.1 Example of Cesar Cipher.pdf |
203.43KB |
| 4.1 OSI Model- Application Layer.pdf |
191.36KB |
| 4.1 Password attack and its types.pdf |
335.82KB |
| 4.1 Phishing Attack Example.pdf |
126.51KB |
| 4.1 Types of Firewall- Stateful Inspection Firewall.pdf |
83.08KB |
| 4.1 What is Cybersecurity.pdf |
150.32KB |
| 4.1 What is Encryption.pdf |
159.14KB |
| 4. Classification of Cyber Crime.mp4 |
26.05MB |
| 4. Example of Cesar Cipher.mp4 |
75.77MB |
| 4. OSI Model Application Layer.mp4 |
35.53MB |
| 4. Password attack and its types.mp4 |
187.35MB |
| 4. Phishing Attack Example.mp4 |
23.97MB |
| 4. Preview The 87 Page Cyber Security Awareness Workbook You Get With This Course.mp4 |
31.32MB |
| 4. Types of Firewall Stateful Inspection Firewall.mp4 |
100.79MB |
| 4. What is Cybersecurity.mp4 |
22.23MB |
| 4. What is Encryption.mp4 |
16.38MB |
| 40 |
362B |
| 41 |
130B |
| 42 |
74.45KB |
| 43 |
246B |
| 44 |
42.03KB |
| 45 |
34.80KB |
| 46 |
395.00KB |
| 47 |
946.75KB |
| 48 |
110.07KB |
| 49 |
943.71KB |
| 5 |
2.22KB |
| 5.1 Cyber Crimes Against Person - Cyber Stalking.pdf |
133.39KB |
| 5.1 Evolution of Cyber Threats.pdf |
99.48KB |
| 5.1 Malware Attack.pdf |
207.73KB |
| 5.1 OSI Model- Presentation Layer.pdf |
201.36KB |
| 5.1 SQL Injection Attack.pdf |
132.92KB |
| 5.1 Transposition Cipher.pdf |
169.20KB |
| 5.1 Types of Firewall- Proxy-server firewall.pdf |
83.08KB |
| 5.1 What is Decryption.pdf |
159.14KB |
| 5. Cyber Crimes Against Person - Cyber Stalking.mp4 |
45.52MB |
| 5. Evolution of Cyber Threats.mp4 |
21.86MB |
| 5. Malware Attack.mp4 |
30.93MB |
| 5. OSI Model Presentation Layer.mp4 |
63.08MB |
| 5. SQL Injection Attack.mp4 |
37.42MB |
| 5. Transposition Cipher.mp4 |
30.88MB |
| 5. Types of Firewall Proxy-server firewall.mp4 |
95.04MB |
| 5. What is Decryption.mp4 |
8.56MB |
| 50 |
576.94KB |
| 51 |
733.53KB |
| 52 |
121.08KB |
| 53 |
489.83KB |
| 54 |
670.19KB |
| 55 |
727.71KB |
| 56 |
37.86KB |
| 57 |
860.67KB |
| 58 |
557.37KB |
| 59 |
515.63KB |
| 6 |
983B |
| 6.1 Cyber Crimes Against Person - Dissemination of obscene Material.pdf |
133.39KB |
| 6.1 Define Plain text.pdf |
159.14KB |
| 6.1 Example of SQL Injection Attack.pdf |
109.18KB |
| 6.1 OSI Model- Session Layer.pdf |
191.36KB |
| 6.1 Three Types of Security Goals.pdf |
95.55KB |
| 6.1 Worms.pdf |
181.96KB |
| 6. Cyber Crimes Against Person - Dissemination of obscene Material.mp4 |
34.64MB |
| 6. Define Plain text.mp4 |
3.86MB |
| 6. Example of SQL Injection Attack.mp4 |
36.51MB |
| 6. Example of Transposition Cipher.mp4 |
88.11MB |
| 6. OSI Model Session Layer.mp4 |
71.48MB |
| 6. Three Types of Security Goals.mp4 |
89.90MB |
| 6. Types of Malware Worms.mp4 |
40.47MB |
| 60 |
51.48KB |
| 61 |
169.35KB |
| 62 |
276.43KB |
| 63 |
248.64KB |
| 64 |
814.36KB |
| 65 |
27.97KB |
| 66 |
600.31KB |
| 67 |
297.41KB |
| 68 |
959.84KB |
| 69 |
111.46KB |
| 7 |
1.06KB |
| 7.1 Cross-site Scripting Attack.pdf |
175.29KB |
| 7.1 Cyber Crimes Against Person - Defamation.pdf |
133.39KB |
| 7.1 Half+Complete+-+Well+Done+Keep+Going.pdf |
511.26KB |
| 7.1 Importance of Cybersecurity.pdf |
590.83KB |
| 7.1 OSI Model- Transport Layer.pdf |
191.36KB |
| 7.1 Stream Cipher.pdf |
145.17KB |
| 7.1 Viruses.pdf |
171.96KB |
| 7. Cross-site Scripting Attack.mp4 |
43.85MB |
| 7. Cyber Crimes Against Person - Defamation.mp4 |
24.31MB |
| 7. Importance of Cybersecurity.mp4 |
56.96MB |
| 7. OSI Model Transport Layer.mp4 |
89.42MB |
| 7. Stream Cipher.mp4 |
59.88MB |
| 7. Types of Malware Viruses.mp4 |
53.50MB |
| 7. You've Achieved 50% Let's Celebrate Your Progress And Keep Going To 75% .mp4 |
4.29MB |
| 70 |
515.12KB |
| 71 |
798.25KB |
| 72 |
1016.45KB |
| 73 |
487.18KB |
| 74 |
140.69KB |
| 75 |
416.93KB |
| 76 |
157.63KB |
| 77 |
234.99KB |
| 78 |
467.84KB |
| 79 |
540.46KB |
| 8 |
43.05KB |
| 8.1 Block Cipher.pdf |
169.28KB |
| 8.1 Cyber Crimes Against Person - Hacking.pdf |
133.39KB |
| 8.1 OSI Model- Network Layer.pdf |
191.36KB |
| 8.1 Post Scanning Attack.pdf |
163.51KB |
| 8.1 Threat, Vulnerability, and Risk.pdf |
104.82KB |
| 8.1 Trojan.pdf |
171.96KB |
| 8.1 What is Secret Key.pdf |
159.14KB |
| 8. Block Cipher.mp4 |
51.73MB |
| 8. Cyber Crimes Against Person - Hacking.mp4 |
27.88MB |
| 8. OSI Model Network Layer.mp4 |
48.71MB |
| 8. Post Scanning Attack.mp4 |
142.69MB |
| 8. Threat, Vulnerability, and Risk.mp4 |
38.43MB |
| 8. Types of Malware Trojan.mp4 |
49.97MB |
| 8. What is Secret Key.mp4 |
5.15MB |
| 80 |
658.71KB |
| 81 |
510.86KB |
| 82 |
591.73KB |
| 83 |
313.14KB |
| 84 |
538.18KB |
| 85 |
585.93KB |
| 86 |
592.04KB |
| 87 |
497.80KB |
| 88 |
518.61KB |
| 89 |
476.48KB |
| 9 |
14.48KB |
| 9.1 Advantages of Symmetric Key Cryptography.pdf |
130.90KB |
| 9.1 Adware.pdf |
171.96KB |
| 9.1 Cyber Crimes Against Person - Cracking.pdf |
133.39KB |
| 9.1 Networking Devices-Router.pdf |
105.74KB |
| 9.1 OSI Model- Data Link Layer.pdf |
201.36KB |
| 9.1 What is Cipher text.pdf |
159.14KB |
| 9. Advantages of Symmetric Key Cryptography.mp4 |
44.59MB |
| 9. Cyber Crimes Against Person - Cracking.mp4 |
52.95MB |
| 9. Networking Devices Router.mp4 |
43.77MB |
| 9. OSI Model Data Link Layer.mp4 |
49.41MB |
| 9. Types of Malware Adware.mp4 |
50.20MB |
| 9. What is Cipher text.mp4 |
10.98MB |
| 90 |
369.14KB |
| 91 |
396.39KB |
| 92 |
697.42KB |
| 93 |
978.83KB |
| 94 |
73.30KB |
| 95 |
119.88KB |
| 96 |
113.73KB |
| 97 |
127.95KB |
| 98 |
159.34KB |
| 99 |
969.74KB |
| TutsNode.com.txt |
63B |