Общая информация
Название Cyber Security for Absolute Beginners Essential Concepts
Тип
Размер 1.58Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
[TGx]Downloaded from torrentgalaxy.to .txt 585б
0 221.56Кб
1 260.02Кб
1. Congratulations.mp4 20.15Мб
1. Congratulations.srt 1.67Кб
1. Section Introduction.mp4 20.24Мб
1. Section Introduction.mp4 13.59Мб
1. Section Introduction.mp4 13.23Мб
1. Section Introduction.mp4 12.83Мб
1. Section Introduction.mp4 10.74Мб
1. Section Introduction.mp4 10.62Мб
1. Section Introduction.mp4 9.98Мб
1. Section Introduction.mp4 9.76Мб
1. Section Introduction.mp4 7.92Мб
1. Section Introduction.srt 756б
1. Section Introduction.srt 1.09Кб
1. Section Introduction.srt 1.79Кб
1. Section Introduction.srt 687б
1. Section Introduction.srt 877б
1. Section Introduction.srt 1.07Кб
1. Section Introduction.srt 1.00Кб
1. Section Introduction.srt 964б
1. Section Introduction.srt 832б
1. Welcome to the Course!.mp4 22.40Мб
1. Welcome to the Course!.srt 6.06Кб
10 467.21Кб
10. Student Exercise 2 Identifying your MAC and IP Address (Windows and Mac OS).mp4 34.13Мб
10. Student Exercise 2 Identifying your MAC and IP Address (Windows and Mac OS).srt 5.67Кб
10. Virtual Private Network (VPN).mp4 19.64Мб
10. Virtual Private Network (VPN).srt 5.45Кб
11 276.17Кб
11. Wireless Networking Security.mp4 31.04Мб
11. Wireless Networking Security.srt 8.10Кб
12 278.55Кб
12. Student Exercise #3 Exploring the Built-In Firewall (Windows and Mac OS).mp4 49.60Мб
12. Student Exercise #3 Exploring the Built-In Firewall (Windows and Mac OS).srt 8.79Кб
13 44.24Кб
14 211.93Кб
15 28.33Кб
16 204.52Кб
17 227.35Кб
18 333.13Кб
19 505.54Кб
2 279.09Кб
2. How to Download Your Udemy Course Certificate of Completion.html 659б
2. Multi-Factor Authentication.mp4 15.10Мб
2. Multi-Factor Authentication.srt 5.53Кб
2. Patch Management & Change Management.mp4 23.09Мб
2. Patch Management & Change Management.srt 6.86Кб
2. Social Engineering Attacks.mp4 21.83Мб
2. Social Engineering Attacks.srt 6.59Кб
2. The CIA Triad.mp4 19.25Мб
2. The CIA Triad.srt 7.56Кб
2. Viruses and Worms.mp4 20.19Мб
2. Viruses and Worms.srt 5.98Кб
2. What Hacking Isn’t.mp4 40.24Мб
2. What Hacking Isn’t.srt 3.08Кб
2. What is a Computer Network.mp4 8.43Мб
2. What is a Computer Network.srt 2.87Кб
2. What is Cyber Security.mp4 24.36Мб
2. What is Cyber Security.srt 4.73Кб
2. Why Learn Cyber Security from Me.mp4 14.69Мб
2. Why Learn Cyber Security from Me.srt 4.03Кб
2. Zero-Day Attacks.mp4 15.13Мб
2. Zero-Day Attacks.srt 3.97Кб
20 241.08Кб
21 143.26Кб
22 262.41Кб
23 452.62Кб
24 488.87Кб
25 247.13Кб
26 422.99Кб
27 332.53Кб
28 105.99Кб
29 177.24Кб
3 406.30Кб
3.1 Course Companion Study Guide.pdf 2.18Мб
3. Buffer Overflows.mp4 23.74Мб
3. Buffer Overflows.srt 6.70Кб
3. Course Companion Study Guide.mp4 15.87Мб
3. Course Companion Study Guide.srt 1.32Кб
3. Defense in Depth.mp4 8.12Мб
3. Defense in Depth.srt 3.04Кб
3. Incident Response.mp4 30.23Мб
3. Incident Response.srt 8.75Кб
3. Password Best Practices.mp4 21.04Мб
3. Password Best Practices.srt 7.46Кб
3. Social Engineering Scenarios Overview.mp4 26.51Мб
3. Social Engineering Scenarios Overview.srt 2.26Кб
3. Some Basic Networking Rules.mp4 9.39Мб
3. Some Basic Networking Rules.srt 2.99Кб
3. Trojan Horses and Logic Bombs.mp4 13.97Мб
3. Trojan Horses and Logic Bombs.srt 4.94Кб
3. Types of Hackers.mp4 10.49Мб
3. Types of Hackers.srt 3.51Кб
3. Why Do We Need Cyber Security.mp4 23.26Мб
3. Why Do We Need Cyber Security.srt 7.66Кб
30 446.93Кб
31 357.17Кб
32 468.29Кб
33 139.67Кб
34 149.39Кб
35 93.54Кб
36 261.30Кб
37 318.33Кб
38 355.93Кб
39 368.69Кб
4 347.27Кб
4. Application Development Security.mp4 31.10Мб
4. Application Development Security.srt 8.32Кб
4. Computer Protocols.mp4 12.52Мб
4. Computer Protocols.srt 4.23Кб
4. Course Case Studies Overview.mp4 19.08Мб
4. Course Case Studies Overview.srt 1.47Кб
4. Endpoint Protection.mp4 19.10Мб
4. Endpoint Protection.srt 6.26Кб
4. Hacker Motivations.mp4 17.99Мб
4. Hacker Motivations.srt 5.49Кб
4. Least Privilege.mp4 14.60Мб
4. Least Privilege.srt 6.00Кб
4. Protocol Spoofing.mp4 31.05Мб
4. Protocol Spoofing.srt 10.85Кб
4. Social Engineering Phone Call Example #1.mp4 29.96Мб
4. Social Engineering Phone Call Example #1.srt 2.40Кб
4. Spyware and Adware.mp4 11.03Мб
4. Spyware and Adware.srt 4.32Кб
4. The Current State of Cybersecurity in 2021 & 2022.mp4 55.73Мб
4. The Current State of Cybersecurity in 2021 & 2022.srt 9.64Кб
40 259.28Кб
41 410.09Кб
42 434.45Кб
43 232.99Кб
44 338.68Кб
45 172.50Кб
46 7.74Кб
47 144.19Кб
48 137.54Кб
49 474.79Кб
5 270.58Кб
5. DoS and DDoS Attacks.mp4 15.54Мб
5. DoS and DDoS Attacks.srt 4.82Кб
5. Encryption.mp4 30.23Мб
5. Encryption.srt 8.61Кб
5. Familiarizing Yourself with Udemy's Course Taking Interface.mp4 62.75Мб
5. Familiarizing Yourself with Udemy's Course Taking Interface.srt 11.25Кб
5. LANs versus WANs.mp4 18.33Мб
5. LANs versus WANs.srt 5.72Кб
5. Ransomware and Rootkits.mp4 28.47Мб
5. Ransomware and Rootkits.srt 6.30Кб
5. Risk Management.mp4 80.39Мб
5. Risk Management.srt 27.17Кб
5. Security Assessments.mp4 18.77Мб
5. Security Assessments.srt 5.73Кб
5. Social Engineering Phone Call Example #2.mp4 35.31Мб
5. Social Engineering Phone Call Example #2.srt 2.48Кб
5. The Hacking Methodology.mp4 23.56Мб
5. The Hacking Methodology.srt 11.24Кб
50 380.01Кб
51 413.41Кб
52 318.45Кб
53 411.29Кб
54 33.95Кб
55 414.96Кб
56 281.21Кб
57 177.74Кб
58 491.27Кб
59 480.20Кб
6 193.02Кб
6. Email Spam, Spoofing, Phishing, and Pharming.mp4 45.66Мб
6. Email Spam, Spoofing, Phishing, and Pharming.srt 13.01Кб
6. Firewalls.mp4 24.76Мб
6. Firewalls.srt 7.24Кб
6. How Hackers Deploy Malware.mp4 20.41Мб
6. How Hackers Deploy Malware.srt 5.45Кб
6. How to Access Course Subtitles & Transcripts.html 1.04Кб
6. MAC versus IP Addresses.mp4 16.86Мб
6. MAC versus IP Addresses.srt 4.87Кб
6. Risk Management Program.mp4 28.79Мб
6. Risk Management Program.srt 7.73Кб
6. Weak Encryption Key & Software Vulnerability Attacks.mp4 20.86Мб
6. Weak Encryption Key & Software Vulnerability Attacks.srt 5.60Кб
60 269.69Кб
61 393.58Кб
62 6.17Кб
63 21.43Кб
64 248.91Кб
65 112.33Кб
66 67.84Кб
67 384.11Кб
68 77.73Кб
69 180.19Кб
7 379.43Кб
7. Case Study Colonial Pipeline.html 2.49Кб
7. Intrusion Detection & Prevention Systems (IDSIPS).mp4 22.68Мб
7. Intrusion Detection & Prevention Systems (IDSIPS).srt 6.08Кб
7. Join our Facebook Student Community.html 1.07Кб
7. Personnel Policies.mp4 20.85Мб
7. Personnel Policies.srt 6.89Кб
7. Switches versus Routers.mp4 27.80Мб
7. Switches versus Routers.srt 8.02Кб
7. Web-Based Attacks.mp4 23.52Мб
7. Web-Based Attacks.srt 7.96Кб
8 414.66Кб
8. Evil Twin and Rogue Access Points.mp4 26.67Мб
8. Evil Twin and Rogue Access Points.srt 7.12Кб
8. TCPIP Protocol Suite.mp4 21.15Мб
8. TCPIP Protocol Suite.srt 5.55Кб
8. Training, Eduation and Awareness.mp4 21.56Мб
8. Training, Eduation and Awareness.srt 7.17Кб
8. Udemy Mobile App for iOS & Android - Download & Take Course Videos On the Go!.html 1.19Кб
8. Utilizing a Network DMZ.mp4 18.67Мб
8. Utilizing a Network DMZ.srt 5.29Кб
9 459.35Кб
9. Case Study TJX Companies Inc. (TJX).html 2.00Кб
9. Honeypot Decoys.mp4 7.82Мб
9. Honeypot Decoys.srt 2.08Кб
9. How the Internet Works (Simplified).mp4 26.78Мб
9. How the Internet Works (Simplified).srt 6.19Кб
9. Student Exercise Introduce Yourself.html 281б
TutsNode.com.txt 63б
Статистика распространения по странам
Великобритания (GB) 1
Россия (RU) 1
Франция (FR) 1
Всего 3
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент