Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
1. Goals and Learning Objectives.mp4 |
18.75MB |
1. Goals and Learning Objectives.srt |
1.06KB |
1. Goals and Learning Objectives - Know Your Enemy.mp4 |
20.81MB |
1. Goals and Learning Objectives - Know Your Enemy.srt |
1.35KB |
1. What is Cybersecurity .mp4 |
33.17MB |
1. What is Cybersecurity .srt |
4.93KB |
1. Who Am I.mp4 |
6.57MB |
1. Who Am I.srt |
1.63KB |
10. Closure.mp4 |
22.53MB |
10. Closure.srt |
3.29KB |
10. Social Engineering - Scams, Cons, Tricks and Fraud.mp4 |
155.46MB |
10. Social Engineering - Scams, Cons, Tricks and Fraud.srt |
15.26KB |
10. Zero Trust Model.mp4 |
81.71MB |
10. Zero Trust Model.srt |
7.02KB |
11. Setting up Labs.mp4 |
161.67MB |
11. Setting up Labs.srt |
22.69KB |
2. Protect What You Value.mp4 |
89.35MB |
2. Protect What You Value.srt |
9.28KB |
2. What is Ethical Hacking.mp4 |
5.68MB |
2. What is Ethical Hacking .srt |
3.75KB |
2. Why You Need Security .mp4 |
180.96MB |
2. Why You Need Security .srt |
16.75KB |
3. The Top 3 Things You Need To Stay Safe Online.mp4 |
11.71MB |
3. The Top 3 Things You Need To Stay Safe Online.srt |
7.11KB |
3. What is Penetrating Testing .mp4 |
14.99MB |
3. What is Penetrating Testing .srt |
2.29KB |
3. What is Privacy, Anonymity and Pseudonymity .mp4 |
151.46MB |
3. What is Privacy, Anonymity and Pseudonymity .srt |
12.13KB |
4. Difference Between Ethical Hacking and Penetrating Testing.mp4 |
13.60MB |
4. Difference Between Ethical Hacking and Penetrating Testing.srt |
2.42KB |
4. Security, Vulnerabilities, Threats and Adversaries.mp4 |
112.37MB |
4. Security, Vulnerabilities, Threats and Adversaries.srt |
9.65KB |
4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4 |
171.63MB |
4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.srt |
15.16KB |
5. Asset Selection.mp4 |
17.42MB |
5. Asset Selection.srt |
7.11KB |
5. Hackers, crackers and cyber criminals.mp4 |
139.67MB |
5. Hackers, crackers and cyber criminals.srt |
9.73KB |
5. Purpose of Studying Ethical Hacking and Penetrating Testing.mp4 |
23.17MB |
5. Purpose of Studying Ethical Hacking and Penetrating Testing.srt |
2.91KB |
6. Malware, Viruses, Root kits and RATs.mp4 |
145.59MB |
6. Malware, Viruses, Root kits and RATs.srt |
16.16KB |
6. Scope For Ethical Hackers and Penetrating Testers.mp4 |
17.69MB |
6. Scope For Ethical Hackers and Penetrating Testers.srt |
2.39KB |
6. Threat Modelling And Risk Assessment.mp4 |
150.99MB |
6. Threat Modelling And Risk Assessment.srt |
13.31KB |
7. Do Ethical Hackers And Penetrating Testers Need Permission.mp4 |
6.24MB |
7. Do Ethical Hackers And Penetrating Testers Need Permission.srt |
818B |
7. Security,Anonymity and Privacy.mp4 |
57.00MB |
7. Security,Anonymity and Privacy.srt |
4.25KB |
7. Spyware, Adware, Scareware, PUPs & Browser hijacking.mp4 |
170.61MB |
7. Spyware, Adware, Scareware, PUPs & Browser hijacking.srt |
15.97KB |
8. Confidentiality, Integrity and Availability - (Security Attributes).mp4 |
135.22MB |
8. Confidentiality, Integrity and Availability - (Security Attributes).srt |
10.23KB |
8. What is Phishing, Vishing and SMShing.mp4 |
235.62MB |
8. What is Phishing, Vishing and SMShing.srt |
26.03KB |
8. Who Conduct it .mp4 |
25.15MB |
8. Who Conduct it .srt |
3.06KB |
9. Defence in Depth.mp4 |
32.57MB |
9. Defence in Depth.srt |
3.79KB |
9. Spamming & Doxing.mp4 |
160.28MB |
9. Spamming & Doxing.srt |
19.78KB |
9. Who should You Choose .mp4 |
19.63MB |
9. Who should You Choose .srt |
2.21KB |
Bonus Resources.txt |
357B |
Get Bonus Downloads Here.url |
183B |