Torrent Info
Title [FreeCourseSite.com] Udemy - Hacking in Practice Intensive Ethical Hacking MEGA Course
Category
Size 4.79GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
[CourseClub.ME].url 122B
[FCS Forum].url 133B
[FreeCourseSite.com].url 127B
1. Answer sample questions which you can find during the examination.html 166B
1. Authentication and authorisation - Introduction.mp4 9.63MB
1. Authentication and authorisation - Introduction.srt 2.00KB
1. BONUS Examination - your voucher.pdf 93.40KB
1. Designing Computer Networks - introduction.mp4 10.94MB
1. Designing Computer Networks - introduction.srt 2.48KB
1. Here’s what you’ll learn in this module.mp4 3.10MB
1. Here’s what you’ll learn in this module.srt 1.15KB
1. Introduction to cryptography.mp4 23.58MB
1. Introduction to cryptography.srt 11.32KB
1. Introduction to cryptology.mp4 5.98MB
1. Introduction to cryptology.srt 2.66KB
1. Introduction to Current Cyber Threats.mp4 20.46MB
1. Introduction to Current Cyber Threats.srt 6.08KB
1. Introduction to Defence in Depth.mp4 4.54MB
1. Introduction to Defence in Depth.srt 1.63KB
1. Introduction to Disaster Recovery.mp4 4.37MB
1. Introduction to Disaster Recovery.srt 1.67KB
1. Introduction to Monitoring Transmitted Data.mp4 6.19MB
1. Introduction to Monitoring Transmitted Data.srt 1.31KB
1. Introduction to Risk Management.mp4 3.88MB
1. Introduction to Risk Management.srt 1.63KB
1. Network security - introduction.mp4 22.05MB
1. Network security - introduction.srt 6.31KB
1. Objective #1 - Data security - Introduction.mp4 38.84MB
1. Objective #1 - Data security - Introduction.srt 7.29KB
1. Operating systems security - introduction.mp4 48.08MB
1. Operating systems security - introduction.srt 10.30KB
1. Popular myths about IT security - origins.mp4 27.93MB
1. Popular myths about IT security - origins.srt 6.40KB
1. Security policies – introduction.mp4 5.87MB
1. Security policies – introduction.srt 2.13KB
1. The Certificate - see how it looks like.pdf 482.37KB
1. Trends in IT Security.mp4 18.71MB
1. Trends in IT Security.srt 4.18KB
1. Welcome to the course.html 334B
1. Why is this section here.html 380B
1. Windows Security - what you’ll learn.mp4 7.59MB
1. Windows Security - what you’ll learn.srt 1.38KB
1. Wireless Networks.mp4 6.97MB
1. Wireless Networks.srt 1.39KB
1. Wiriting a Shellcode.mp4 179.91MB
1. Wiriting a Shellcode.srt 16.44KB
10.1 14-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.61MB
10.1 16-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 2.18MB
10. BitLocker To Go Reader.mp4 18.45MB
10. BitLocker To Go Reader.srt 5.04KB
10. CONFICKER CASE STUDY.mp4 20.03MB
10. CONFICKER CASE STUDY.srt 7.80KB
10. DREAD Exploitability.mp4 13.91MB
10. DREAD Exploitability.srt 5.93KB
10. EXERCISE Offline attacks.mp4 45.64MB
10. EXERCISE Offline attacks.srt 12.91KB
10. EXERCISE Vulnerability attacks.mp4 47.61MB
10. EXERCISE Vulnerability attacks.srt 10.48KB
10. How to protect users without interrupting their work - notes for the examination.html 10B
10. Law #2.mp4 7.59MB
10. Law #2.srt 3.18KB
10. Network access control RADIUS.mp4 48.44MB
10. Network access control RADIUS.srt 11.99KB
10. OSI MODEL #4 - Transport Layer.mp4 28.63MB
10. OSI MODEL #4 - Transport Layer.srt 6.33KB
10. Program security assessment.mp4 12.15MB
10. Program security assessment.srt 6.08KB
10. Public Key Infrastructure - Trust but verify - notes for the examination.html 10B
10. Scanning computers.mp4 35.28MB
10. Scanning computers.srt 8.21KB
10. Standards and Security Solutions - notes for the examination.pdf 1.46MB
10. Stream Ciphers - RC4.mp4 8.60MB
10. Stream Ciphers - RC4.srt 3.88KB
10. STRIDE Spoofing identity.mp4 13.85MB
10. STRIDE Spoofing identity.srt 5.53KB
11.1 05-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 2.45MB
11. Asymmetric-key algorithms.mp4 19.09MB
11. Asymmetric-key algorithms.srt 8.51KB
11. EXERCISE Identifying suspicious processes.mp4 29.97MB
11. EXERCISE Identifying suspicious processes.srt 7.70KB
11. EXERCISE Risk Assessment.mp4 18.11MB
11. EXERCISE Risk Assessment.srt 8.11KB
11. File and folder encryption - EFS.mp4 34.53MB
11. File and folder encryption - EFS.srt 8.13KB
11. How to reduce losses - notes for the examination.html 10B
11. Law #3.mp4 5.86MB
11. Law #3.srt 2.48KB
11. Monitoring transmitted data - notes for the examination.pdf 1.77MB
11. Protocols and Services - notes for the examination.pdf 1.19MB
11. STRIDE Tampering with Data.mp4 12.85MB
11. STRIDE Tampering with Data.srt 4.98KB
11. Threats Enumerating Remote Computers.mp4 16.82MB
11. Threats Enumerating Remote Computers.srt 4.03KB
11. Threats of WIFI networks.mp4 30.54MB
11. Threats of WIFI networks.srt 6.70KB
11. Unsafe applications.mp4 24.95MB
11. Unsafe applications.srt 11.58KB
11. Using online cracking services.mp4 37.66MB
11. Using online cracking services.srt 9.53KB
12.1 03-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.81MB
12.1 13-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.06MB
12. Client Attacks Launching a rogue access point.mp4 33.58MB
12. Client Attacks Launching a rogue access point.srt 7.55KB
12. Demonstration Process Explorer.mp4 38.14MB
12. Demonstration Process Explorer.srt 9.91KB
12. EXERCISE EFS.mp4 15.35MB
12. EXERCISE EFS.srt 6.07KB
12. EXERCISE Transport Layer Attack using METASPLOIT part 1.mp4 12.85MB
12. EXERCISE Transport Layer Attack using METASPLOIT part 1.srt 5.90KB
12. Identity Theft - notes for the examination.pdf 2.13MB
12. Law #4.mp4 5.96MB
12. Law #4.srt 1.99KB
12. Program Security Assessment - notes for the examination.html 10B
12. Risk Assessment - notes for the examination.html 10B
12. RSA.mp4 12.84MB
12. RSA.srt 5.68KB
12. STRIDE Denial of Service.mp4 10.40MB
12. STRIDE Denial of Service.srt 4.24KB
13. Check your knowledge and get ready for the exam.html 167B
13. Client Attacks Evil twin.mp4 22.77MB
13. Client Attacks Evil twin.srt 5.27KB
13. ELGAMAL.mp4 4.91MB
13. ELGAMAL.srt 2.16KB
13. Encryption - notes for the examination.pdf 1.60MB
13. EXERCISE Removing malware.mp4 45.86MB
13. EXERCISE Removing malware.srt 9.47KB
13. EXERCISE Transport Layer Attack using METASPLOIT part 2.mp4 26.09MB
13. EXERCISE Transport Layer Attack using METASPLOIT part 2.srt 5.69KB
13. Introduction to Social Engineering and rogue software.mp4 11.41MB
13. Introduction to Social Engineering and rogue software.srt 4.69KB
13. Law #5.mp4 8.81MB
13. Law #5.srt 3.52KB
14. Client Attacks Denial of service.mp4 36.52MB
14. Client Attacks Denial of service.srt 10.32KB
14. HASH functions.mp4 14.44MB
14. HASH functions.srt 6.04KB
14. Law #6.mp4 5.82MB
14. Law #6.srt 2.40KB
14. Manipulation tactics.mp4 22.18MB
14. Manipulation tactics.srt 10.42KB
14. OSI MODEL #5 - Session Layer.mp4 16.38MB
14. OSI MODEL #5 - Session Layer.srt 4.06KB
14. Rootkits.mp4 28.94MB
14. Rootkits.srt 6.71KB
15. Digital signature.mp4 15.45MB
15. Digital signature.srt 6.67KB
15. EXERCISE Detecting rootkits.mp4 58.30MB
15. EXERCISE Detecting rootkits.srt 12.13KB
15. EXERCISE Social Engineering attacks.mp4 19.03MB
15. EXERCISE Social Engineering attacks.srt 6.83KB
15. EXERCISE WPA attack.mp4 8.86MB
15. EXERCISE WPA attack.srt 3.88KB
15. Law #7.mp4 2.90MB
15. Law #7.srt 1.36KB
15. Transport Protocols - notes for the examination.pdf 1.10MB
16. EXERCISE Security evaluation.mp4 17.82MB
16. EXERCISE Security evaluation.srt 6.54KB
16. Hybrid Schemes.mp4 16.06MB
16. Hybrid Schemes.srt 7.00KB
16. Law #8.mp4 4.60MB
16. Law #8.srt 1.71KB
16. OSI MODEL #6 - Presentation Layer.mp4 37.43MB
16. OSI MODEL #6 - Presentation Layer.srt 6.80KB
16. SE with KALI BackTrack.mp4 16.17MB
16. SE with KALI BackTrack.srt 7.34KB
16. Wi-Fi Security Threats - notes for the examination.pdf 1.70MB
17.1 15-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 2.52MB
17. Law #9.mp4 9.23MB
17. Law #9.srt 4.60KB
17. Malware - notes for the examination.pdf 2.49MB
17. OSI MODEL #7 - Application Layer.mp4 16.93MB
17. OSI MODEL #7 - Application Layer.srt 4.16KB
17. Rogue Software.mp4 7.38MB
17. Rogue Software.srt 2.70KB
17. Symmetric and Asymmetric Ciphers - notes for the examination.html 10B
18. EXERCISE Application Layer Attacks.mp4 19.00MB
18. EXERCISE Application Layer Attacks.srt 5.86KB
18. Fraud tools #1.mp4 20.03MB
18. Fraud tools #1.srt 7.32KB
18. Law #10.mp4 1.96MB
18. Law #10.srt 791B
19. Backtrack Attack Demonstration.mp4 15.59MB
19. Backtrack Attack Demonstration.srt 3.74KB
19. Fraud tools #2.mp4 17.72MB
19. Fraud tools #2.srt 7.15KB
19. Laws for administrators.mp4 13.86MB
19. Laws for administrators.srt 6.71KB
2. Attack methods.mp4 17.28MB
2. Attack methods.srt 7.53KB
2. Authentication users.mp4 31.38MB
2. Authentication users.srt 7.86KB
2. BONUS LECTURE Learn more and get to know our other courses.html 5.86KB
2. Foreword & FAQ.html 2.58KB
2. History of ciphers.mp4 25.51MB
2. History of ciphers.srt 12.21KB
2. How to reduce losses.mp4 14.85MB
2. How to reduce losses.srt 5.95KB
2. How to use Defence in Depth model.mp4 14.68MB
2. How to use Defence in Depth model.srt 6.11KB
2. Integrity of data.mp4 32.12MB
2. Integrity of data.srt 7.04KB
2. Introduction to Application Security.mp4 21.26MB
2. Introduction to Application Security.srt 8.99KB
2. IT Prehistory.mp4 25.80MB
2. IT Prehistory.srt 5.65KB
2. Managing applications.mp4 17.21MB
2. Managing applications.srt 10.22KB
2. Monitoring Transmitted Data - Basic informations.mp4 41.08MB
2. Monitoring Transmitted Data - Basic informations.srt 9.75KB
2. Myths #1 - you’ll never be hacked.mp4 29.18MB
2. Myths #1 - you’ll never be hacked.srt 6.85KB
2. OSI MODEL #1 - Physical layer.mp4 28.96MB
2. OSI MODEL #1 - Physical layer.srt 6.43KB
2. Public key infrastructure.mp4 14.81MB
2. Public key infrastructure.srt 7.28KB
2. Security boundaries.mp4 21.21MB
2. Security boundaries.srt 5.32KB
2. Subnetting IPv4.mp4 29.12MB
2. Subnetting IPv4.srt 7.83KB
2. The birth of technology society.mp4 18.58MB
2. The birth of technology society.srt 3.44KB
2. User Account Control.mp4 32.01MB
2. User Account Control.srt 6.77KB
2. What is security.mp4 10.90MB
2. What is security.srt 3.89KB
2. WIFI security solutions - introduction.mp4 29.17MB
2. WIFI security solutions - introduction.srt 6.34KB
20.1 03-3-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 2.91MB
20.1 04-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.62MB
20. Immutable Laws of Security - notes for the examination.html 10B
20. Man-in-the-Middle and Denial of Service Attacks.mp4 14.21MB
20. Man-in-the-Middle and Denial of Service Attacks.srt 2.92KB
20. Social Engineering and Rogue Software - notes for the examination.html 10B
21. Modifying Transmitted Packets.mp4 26.76MB
21. Modifying Transmitted Packets.srt 5.07KB
22. Unencrypted protocols.mp4 13.64MB
22. Unencrypted protocols.srt 3.25KB
23. Application Protocols - notes for the examination.pdf 2.16MB
3. Attacks on applications.mp4 25.50MB
3. Attacks on applications.srt 11.68KB
3. Course preview 15 min. long demo lecture. The whole training is 27 hours long..mp4 213.50MB
3. Course preview 15 min. long demo lecture. The whole training is 27 hours long..srt 25.12KB
3. Data security - notes for the examination.pdf 1.99MB
3. DiD OS and LAN Layers.mp4 16.14MB
3. DiD OS and LAN Layers.srt 7.08KB
3. Ensuring continous availability.mp4 10.79MB
3. Ensuring continous availability.srt 4.36KB
3. EXERCISE How much info can you gather.mp4 13.78MB
3. EXERCISE How much info can you gather.srt 4.20KB
3. How secure is your password.mp4 15.98MB
3. How secure is your password.srt 5.70KB
3. Implementing public key infrastructure.mp4 12.74MB
3. Implementing public key infrastructure.srt 6.41KB
3. Information security.mp4 10.27MB
3. Information security.srt 4.12KB
3. Intrusion detection systems.mp4 38.24MB
3. Intrusion detection systems.srt 8.98KB
3. Let’s look a few years back.mp4 23.63MB
3. Let’s look a few years back.srt 6.03KB
3. Local attacks.mp4 7.89MB
3. Local attacks.srt 3.30KB
3. Myths #2 - you don’t need any protection software or hardware.mp4 25.78MB
3. Myths #2 - you don’t need any protection software or hardware.srt 6.25KB
3. OSI MODEL #2 - Data link layer.mp4 22.76MB
3. OSI MODEL #2 - Data link layer.srt 5.25KB
3. Software updates.mp4 6.23MB
3. Software updates.srt 3.16KB
3. Subnetting IPv6.mp4 17.45MB
3. Subnetting IPv6.srt 3.51KB
3. Symmetric and asymmetric ciphers.mp4 15.07MB
3. Symmetric and asymmetric ciphers.srt 6.74KB
3. Thanks for joining.html 374B
3. Three core.mp4 29.75MB
3. Three core.srt 8.22KB
3. UAC configuration.mp4 35.11MB
3. UAC configuration.srt 8.94KB
3. WIFI - working principles.mp4 29.36MB
3. WIFI - working principles.srt 6.63KB
4.1 Kali Linux Download - your training environment.html 146B
4. Additional Security Features - ASLR and DEP.mp4 40.91MB
4. Additional Security Features - ASLR and DEP.srt 12.89KB
4. Authentication protocols and services.mp4 31.82MB
4. Authentication protocols and services.srt 8.70KB
4. Confidentiality of data.mp4 31.66MB
4. Confidentiality of data.srt 5.58KB
4. Cyber crimes - an evolution not revolution.mp4 21.27MB
4. Cyber crimes - an evolution not revolution.srt 5.78KB
4. DiD Perimeter and Physical Access Layers.mp4 12.92MB
4. DiD Perimeter and Physical Access Layers.srt 6.19KB
4. EXERCISE OS boundaries.mp4 39.10MB
4. EXERCISE OS boundaries.srt 7.76KB
4. Fake identity.mp4 21.76MB
4. Fake identity.srt 5.60KB
4. Information security - level up.mp4 9.87MB
4. Information security - level up.srt 4.26KB
4. MS Update.mp4 16.25MB
4. MS Update.srt 7.51KB
4. Myths #3 - IT security is always a priority.mp4 6.00MB
4. Myths #3 - IT security is always a priority.srt 1.30KB
4. Other wireless technologies.mp4 13.16MB
4. Other wireless technologies.srt 3.34KB
4. SQL Injection.mp4 17.97MB
4. SQL Injection.srt 9.22KB
4. Subnetting - notes for the examination.pdf 1.41MB
4. Symmetric-key algorithms.mp4 13.51MB
4. Symmetric-key algorithms.srt 6.06KB
4. Target scanning and enumeration techniques #1.mp4 15.85MB
4. Target scanning and enumeration techniques #1.srt 6.26KB
4. Threat discovery #1.mp4 12.28MB
4. Threat discovery #1.srt 4.54KB
4. Threats MAC spoofing.mp4 27.47MB
4. Threats MAC spoofing.srt 6.61KB
4. What will PKI allow you.mp4 14.46MB
4. What will PKI allow you.srt 7.50KB
4. Why are firewalls and NDIS not enough.mp4 28.20MB
4. Why are firewalls and NDIS not enough.srt 6.39KB
5. Authentication - notes for the examination.pdf 2.86MB
5. Block ciphers.mp4 15.35MB
5. Block ciphers.srt 6.43KB
5. Current Cyber Threats - notes for the examination.pdf 1.47MB
5. DiD Demonstration.mp4 6.98MB
5. DiD Demonstration.srt 2.84KB
5. EXERCISE Analyze the application.mp4 28.74MB
5. EXERCISE Analyze the application.srt 15.69KB
5. EXERCISE Certificates.mp4 20.63MB
5. EXERCISE Certificates.srt 10.12KB
5. EXERCISE Finding confidential data with search engines.mp4 23.50MB
5. EXERCISE Finding confidential data with search engines.srt 5.97KB
5. IPv6 address notation.mp4 27.31MB
5. IPv6 address notation.srt 6.90KB
5. Online privacy.mp4 32.05MB
5. Online privacy.srt 6.68KB
5. PatchGuard.mp4 7.87MB
5. PatchGuard.srt 1.57KB
5. Popular Myths About Computer System Security - notes for the examination.pdf 988.50KB
5. Process isolation.mp4 26.86MB
5. Process isolation.srt 7.16KB
5. Security issues.mp4 12.84MB
5. Security issues.srt 5.02KB
5. System Center Configuration Manager.mp4 6.27MB
5. System Center Configuration Manager.srt 3.17KB
5. Target scanning and enumeration techniques #2.mp4 8.40MB
5. Target scanning and enumeration techniques #2.srt 3.68KB
5. Threat discovery #2.mp4 8.84MB
5. Threat discovery #2.srt 3.93KB
5. Threats and risks.mp4 18.50MB
5. Threats and risks.srt 5.13KB
5. Threats ARP Poisoning.mp4 31.29MB
5. Threats ARP Poisoning.srt 7.60KB
5. Wireshark - Introduction to network analysis.mp4 30.66MB
5. Wireshark - Introduction to network analysis.srt 7.78KB
6. Analyzing sniffing software.mp4 19.51MB
6. Analyzing sniffing software.srt 3.72KB
6. Audit users and keep control accounts.mp4 13.30MB
6. Audit users and keep control accounts.srt 5.18KB
6. Automated attack targeting a service.mp4 15.15MB
6. Automated attack targeting a service.srt 5.26KB
6. Blind SQL Injection.mp4 22.47MB
6. Blind SQL Injection.srt 11.07KB
6. Blocking applications.mp4 17.99MB
6. Blocking applications.srt 8.70KB
6. Data encryption standard.mp4 16.55MB
6. Data encryption standard.srt 7.16KB
6. DMZ demilitarized Zone.mp4 30.29MB
6. DMZ demilitarized Zone.srt 6.84KB
6. EXERCISE Data Link Layer Attack.mp4 35.28MB
6. EXERCISE Data Link Layer Attack.srt 8.02KB
6. How to use Wireshark.mp4 43.56MB
6. How to use Wireshark.srt 10.17KB
6. Ineffective solutions.mp4 18.99MB
6. Ineffective solutions.srt 4.69KB
6. Kernel Mode Code Signing.mp4 25.69MB
6. Kernel Mode Code Signing.srt 6.94KB
6. LM Hash.mp4 30.71MB
6. LM Hash.srt 7.51KB
6. Passive scanning.mp4 7.14MB
6. Passive scanning.srt 2.08KB
6. Planning the PKI.mp4 22.56MB
6. Planning the PKI.srt 10.28KB
6. Techniques and Methods - notes for the examination.pdf 1.44MB
6. Why are security solutions fallible.mp4 15.49MB
6. Why are security solutions fallible.srt 5.96KB
7.1 03-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.61MB
7. Analyzing Captured data.mp4 31.02MB
7. Analyzing Captured data.srt 6.52KB
7. Attack Methodologies - notes for the examination.html 10B
7. Authentication methods.mp4 37.14MB
7. Authentication methods.srt 9.77KB
7. Automated SQL Injection.mp4 29.49MB
7. Automated SQL Injection.srt 13.71KB
7. Automated user-targeting attack.mp4 13.43MB
7. Automated user-targeting attack.srt 4.99KB
7. Cached Credentials.mp4 18.09MB
7. Cached Credentials.srt 5.03KB
7. Certificate life cycle.mp4 16.19MB
7. Certificate life cycle.srt 7.18KB
7. Cyber War.mp4 45.40MB
7. Cyber War.srt 8.80KB
7. DES-X.mp4 18.23MB
7. DES-X.srt 7.65KB
7. Encryption - key protection.mp4 46.34MB
7. Encryption - key protection.srt 16.07KB
7. High risk users.mp4 7.93MB
7. High risk users.srt 3.64KB
7. Java Virtual Machine and code access security.mp4 18.65MB
7. Java Virtual Machine and code access security.srt 4.86KB
7. OSI MODEL #3 - Network layer.mp4 31.71MB
7. OSI MODEL #3 - Network layer.srt 7.16KB
7. Protocols and services IP SEC.mp4 43.74MB
7. Protocols and services IP SEC.srt 10.57KB
7. Security policy issues.mp4 12.60MB
7. Security policy issues.srt 5.07KB
7. Software restrictions policies.mp4 14.50MB
7. Software restrictions policies.srt 6.76KB
8.1 04-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.64MB
8. 802.11 WEP.mp4 31.40MB
8. 802.11 WEP.srt 7.73KB
8. Advanced encryption standards.mp4 12.83MB
8. Advanced encryption standards.srt 5.47KB
8. Changing IT Security Trends - notes for the examination.pdf 2.04MB
8. Collecting and analysing evidence.mp4 18.30MB
8. Collecting and analysing evidence.srt 6.91KB
8. Cross-site scripting - XSS.mp4 29.10MB
8. Cross-site scripting - XSS.srt 11.15KB
8. Drive encryption.mp4 37.33MB
8. Drive encryption.srt 9.31KB
8. EXERCISE Application control rules.mp4 27.20MB
8. EXERCISE Application control rules.srt 13.40KB
8. How to analyze telnet protocol.mp4 38.00MB
8. How to analyze telnet protocol.srt 8.87KB
8. Introduction to risk assessment.mp4 18.16MB
8. Introduction to risk assessment.srt 7.05KB
8. Introduction to threat modelling and classification.mp4 13.31MB
8. Introduction to threat modelling and classification.srt 5.66KB
8. IP SEC Phase 1.mp4 21.72MB
8. IP SEC Phase 1.srt 8.22KB
8. KERBEROS.mp4 52.57MB
8. KERBEROS.srt 12.17KB
8. OS Security Boundaries - notes for the examination.pdf 4.26MB
8. PKI Administration.mp4 19.70MB
8. PKI Administration.srt 8.47KB
8. TCP Tunnelling over ICMP.mp4 35.00MB
8. TCP Tunnelling over ICMP.srt 7.69KB
8. The Defence in Depth Model - notes for the examination.html 10B
9.1 02-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.42MB
9.1 13-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.65MB
9. 802.11I WPA.mp4 31.60MB
9. 802.11I WPA.srt 6.57KB
9. Application Attacks - notes for the examination.html 10B
9. BitLocker.mp4 36.44MB
9. BitLocker.srt 8.94KB
9. Block cipher modes.mp4 17.49MB
9. Block cipher modes.srt 7.72KB
9. DREAD Risk assessment model.mp4 12.64MB
9. DREAD Risk assessment model.srt 5.16KB
9. Forensics example.mp4 10.62MB
9. Forensics example.srt 4.05KB
9. Identity Theft.mp4 42.96MB
9. Identity Theft.srt 10.49KB
9. Introduction to Immutable laws of security - Law #1.mp4 14.00MB
9. Introduction to Immutable laws of security - Law #1.srt 5.13KB
9. Intrusion detection.mp4 46.35MB
9. Intrusion detection.srt 8.66KB
9. Isolating applications.mp4 16.89MB
9. Isolating applications.srt 7.16KB
9. Malware.mp4 44.86MB
9. Malware.srt 14.09KB
9. Network Address translation.mp4 52.65MB
9. Network Address translation.srt 13.51KB
9. Network Protocols - notes for the examination.pdf 2.22MB
9. Threat Modelling and Classification - notes for the examination.html 10B
9. Threat modelling - STRIDE.mp4 10.59MB
9. Threat modelling - STRIDE.srt 4.14KB
Distribution statistics by country
United States (US) 1
China (CN) 1
Total 2
IP List List of IP addresses which were distributed this torrent