Torrent Info
Title [ FreeCourseWeb.com ] Udemy - Master Cybersecurity,Ethical Hacking and Penetrating Testing (Updated 09 - 2021)
Category
Size 2.53GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
1. Goals and Learning Objectives.mp4 18.75MB
1. Goals and Learning Objectives.srt 1.06KB
1. Goals and Learning Objectives - Know Your Enemy.mp4 20.81MB
1. Goals and Learning Objectives - Know Your Enemy.srt 1.35KB
1. What is Cybersecurity .mp4 33.17MB
1. What is Cybersecurity .srt 4.93KB
1. Who Am I.mp4 6.57MB
1. Who Am I.srt 1.63KB
10. Closure.mp4 22.53MB
10. Closure.srt 3.29KB
10. Social Engineering - Scams, Cons, Tricks and Fraud.mp4 155.46MB
10. Social Engineering - Scams, Cons, Tricks and Fraud.srt 15.26KB
10. Zero Trust Model.mp4 81.71MB
10. Zero Trust Model.srt 7.02KB
11. Setting up Labs.mp4 161.67MB
11. Setting up Labs.srt 22.69KB
2. Protect What You Value.mp4 89.35MB
2. Protect What You Value.srt 9.28KB
2. What is Ethical Hacking.mp4 5.68MB
2. What is Ethical Hacking .srt 3.75KB
2. Why You Need Security .mp4 180.96MB
2. Why You Need Security .srt 16.75KB
3. The Top 3 Things You Need To Stay Safe Online.mp4 11.71MB
3. The Top 3 Things You Need To Stay Safe Online.srt 7.11KB
3. What is Penetrating Testing .mp4 14.99MB
3. What is Penetrating Testing .srt 2.29KB
3. What is Privacy, Anonymity and Pseudonymity .mp4 151.46MB
3. What is Privacy, Anonymity and Pseudonymity .srt 12.13KB
4. Difference Between Ethical Hacking and Penetrating Testing.mp4 13.60MB
4. Difference Between Ethical Hacking and Penetrating Testing.srt 2.42KB
4. Security, Vulnerabilities, Threats and Adversaries.mp4 112.37MB
4. Security, Vulnerabilities, Threats and Adversaries.srt 9.65KB
4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4 171.63MB
4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.srt 15.16KB
5. Asset Selection.mp4 17.42MB
5. Asset Selection.srt 7.11KB
5. Hackers, crackers and cyber criminals.mp4 139.67MB
5. Hackers, crackers and cyber criminals.srt 9.73KB
5. Purpose of Studying Ethical Hacking and Penetrating Testing.mp4 23.17MB
5. Purpose of Studying Ethical Hacking and Penetrating Testing.srt 2.91KB
6. Malware, Viruses, Root kits and RATs.mp4 145.59MB
6. Malware, Viruses, Root kits and RATs.srt 16.16KB
6. Scope For Ethical Hackers and Penetrating Testers.mp4 17.69MB
6. Scope For Ethical Hackers and Penetrating Testers.srt 2.39KB
6. Threat Modelling And Risk Assessment.mp4 150.99MB
6. Threat Modelling And Risk Assessment.srt 13.31KB
7. Do Ethical Hackers And Penetrating Testers Need Permission.mp4 6.24MB
7. Do Ethical Hackers And Penetrating Testers Need Permission.srt 818B
7. Security,Anonymity and Privacy.mp4 57.00MB
7. Security,Anonymity and Privacy.srt 4.25KB
7. Spyware, Adware, Scareware, PUPs & Browser hijacking.mp4 170.61MB
7. Spyware, Adware, Scareware, PUPs & Browser hijacking.srt 15.97KB
8. Confidentiality, Integrity and Availability - (Security Attributes).mp4 135.22MB
8. Confidentiality, Integrity and Availability - (Security Attributes).srt 10.23KB
8. What is Phishing, Vishing and SMShing.mp4 235.62MB
8. What is Phishing, Vishing and SMShing.srt 26.03KB
8. Who Conduct it .mp4 25.15MB
8. Who Conduct it .srt 3.06KB
9. Defence in Depth.mp4 32.57MB
9. Defence in Depth.srt 3.79KB
9. Spamming & Doxing.mp4 160.28MB
9. Spamming & Doxing.srt 19.78KB
9. Who should You Choose .mp4 19.63MB
9. Who should You Choose .srt 2.21KB
Bonus Resources.txt 357B
Get Bonus Downloads Here.url 183B
Distribution statistics by country
Total 0
IP List List of IP addresses which were distributed this torrent