Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585б |
0 |
221.56Кб |
1 |
260.02Кб |
1. Congratulations.mp4 |
20.15Мб |
1. Congratulations.srt |
1.67Кб |
1. Section Introduction.mp4 |
20.24Мб |
1. Section Introduction.mp4 |
13.59Мб |
1. Section Introduction.mp4 |
13.23Мб |
1. Section Introduction.mp4 |
12.83Мб |
1. Section Introduction.mp4 |
10.74Мб |
1. Section Introduction.mp4 |
10.62Мб |
1. Section Introduction.mp4 |
9.98Мб |
1. Section Introduction.mp4 |
9.76Мб |
1. Section Introduction.mp4 |
7.92Мб |
1. Section Introduction.srt |
756б |
1. Section Introduction.srt |
1.09Кб |
1. Section Introduction.srt |
1.79Кб |
1. Section Introduction.srt |
687б |
1. Section Introduction.srt |
877б |
1. Section Introduction.srt |
1.07Кб |
1. Section Introduction.srt |
1.00Кб |
1. Section Introduction.srt |
964б |
1. Section Introduction.srt |
832б |
1. Welcome to the Course!.mp4 |
22.40Мб |
1. Welcome to the Course!.srt |
6.06Кб |
10 |
467.21Кб |
10. Student Exercise 2 Identifying your MAC and IP Address (Windows and Mac OS).mp4 |
34.13Мб |
10. Student Exercise 2 Identifying your MAC and IP Address (Windows and Mac OS).srt |
5.67Кб |
10. Virtual Private Network (VPN).mp4 |
19.64Мб |
10. Virtual Private Network (VPN).srt |
5.45Кб |
11 |
276.17Кб |
11. Wireless Networking Security.mp4 |
31.04Мб |
11. Wireless Networking Security.srt |
8.10Кб |
12 |
278.55Кб |
12. Student Exercise #3 Exploring the Built-In Firewall (Windows and Mac OS).mp4 |
49.60Мб |
12. Student Exercise #3 Exploring the Built-In Firewall (Windows and Mac OS).srt |
8.79Кб |
13 |
44.24Кб |
14 |
211.93Кб |
15 |
28.33Кб |
16 |
204.52Кб |
17 |
227.35Кб |
18 |
333.13Кб |
19 |
505.54Кб |
2 |
279.09Кб |
2. How to Download Your Udemy Course Certificate of Completion.html |
659б |
2. Multi-Factor Authentication.mp4 |
15.10Мб |
2. Multi-Factor Authentication.srt |
5.53Кб |
2. Patch Management & Change Management.mp4 |
23.09Мб |
2. Patch Management & Change Management.srt |
6.86Кб |
2. Social Engineering Attacks.mp4 |
21.83Мб |
2. Social Engineering Attacks.srt |
6.59Кб |
2. The CIA Triad.mp4 |
19.25Мб |
2. The CIA Triad.srt |
7.56Кб |
2. Viruses and Worms.mp4 |
20.19Мб |
2. Viruses and Worms.srt |
5.98Кб |
2. What Hacking Isn’t.mp4 |
40.24Мб |
2. What Hacking Isn’t.srt |
3.08Кб |
2. What is a Computer Network.mp4 |
8.43Мб |
2. What is a Computer Network.srt |
2.87Кб |
2. What is Cyber Security.mp4 |
24.36Мб |
2. What is Cyber Security.srt |
4.73Кб |
2. Why Learn Cyber Security from Me.mp4 |
14.69Мб |
2. Why Learn Cyber Security from Me.srt |
4.03Кб |
2. Zero-Day Attacks.mp4 |
15.13Мб |
2. Zero-Day Attacks.srt |
3.97Кб |
20 |
241.08Кб |
21 |
143.26Кб |
22 |
262.41Кб |
23 |
452.62Кб |
24 |
488.87Кб |
25 |
247.13Кб |
26 |
422.99Кб |
27 |
332.53Кб |
28 |
105.99Кб |
29 |
177.24Кб |
3 |
406.30Кб |
3.1 Course Companion Study Guide.pdf |
2.18Мб |
3. Buffer Overflows.mp4 |
23.74Мб |
3. Buffer Overflows.srt |
6.70Кб |
3. Course Companion Study Guide.mp4 |
15.87Мб |
3. Course Companion Study Guide.srt |
1.32Кб |
3. Defense in Depth.mp4 |
8.12Мб |
3. Defense in Depth.srt |
3.04Кб |
3. Incident Response.mp4 |
30.23Мб |
3. Incident Response.srt |
8.75Кб |
3. Password Best Practices.mp4 |
21.04Мб |
3. Password Best Practices.srt |
7.46Кб |
3. Social Engineering Scenarios Overview.mp4 |
26.51Мб |
3. Social Engineering Scenarios Overview.srt |
2.26Кб |
3. Some Basic Networking Rules.mp4 |
9.39Мб |
3. Some Basic Networking Rules.srt |
2.99Кб |
3. Trojan Horses and Logic Bombs.mp4 |
13.97Мб |
3. Trojan Horses and Logic Bombs.srt |
4.94Кб |
3. Types of Hackers.mp4 |
10.49Мб |
3. Types of Hackers.srt |
3.51Кб |
3. Why Do We Need Cyber Security.mp4 |
23.26Мб |
3. Why Do We Need Cyber Security.srt |
7.66Кб |
30 |
446.93Кб |
31 |
357.17Кб |
32 |
468.29Кб |
33 |
139.67Кб |
34 |
149.39Кб |
35 |
93.54Кб |
36 |
261.30Кб |
37 |
318.33Кб |
38 |
355.93Кб |
39 |
368.69Кб |
4 |
347.27Кб |
4. Application Development Security.mp4 |
31.10Мб |
4. Application Development Security.srt |
8.32Кб |
4. Computer Protocols.mp4 |
12.52Мб |
4. Computer Protocols.srt |
4.23Кб |
4. Course Case Studies Overview.mp4 |
19.08Мб |
4. Course Case Studies Overview.srt |
1.47Кб |
4. Endpoint Protection.mp4 |
19.10Мб |
4. Endpoint Protection.srt |
6.26Кб |
4. Hacker Motivations.mp4 |
17.99Мб |
4. Hacker Motivations.srt |
5.49Кб |
4. Least Privilege.mp4 |
14.60Мб |
4. Least Privilege.srt |
6.00Кб |
4. Protocol Spoofing.mp4 |
31.05Мб |
4. Protocol Spoofing.srt |
10.85Кб |
4. Social Engineering Phone Call Example #1.mp4 |
29.96Мб |
4. Social Engineering Phone Call Example #1.srt |
2.40Кб |
4. Spyware and Adware.mp4 |
11.03Мб |
4. Spyware and Adware.srt |
4.32Кб |
4. The Current State of Cybersecurity in 2021 & 2022.mp4 |
55.73Мб |
4. The Current State of Cybersecurity in 2021 & 2022.srt |
9.64Кб |
40 |
259.28Кб |
41 |
410.09Кб |
42 |
434.45Кб |
43 |
232.99Кб |
44 |
338.68Кб |
45 |
172.50Кб |
46 |
7.74Кб |
47 |
144.19Кб |
48 |
137.54Кб |
49 |
474.79Кб |
5 |
270.58Кб |
5. DoS and DDoS Attacks.mp4 |
15.54Мб |
5. DoS and DDoS Attacks.srt |
4.82Кб |
5. Encryption.mp4 |
30.23Мб |
5. Encryption.srt |
8.61Кб |
5. Familiarizing Yourself with Udemy's Course Taking Interface.mp4 |
62.75Мб |
5. Familiarizing Yourself with Udemy's Course Taking Interface.srt |
11.25Кб |
5. LANs versus WANs.mp4 |
18.33Мб |
5. LANs versus WANs.srt |
5.72Кб |
5. Ransomware and Rootkits.mp4 |
28.47Мб |
5. Ransomware and Rootkits.srt |
6.30Кб |
5. Risk Management.mp4 |
80.39Мб |
5. Risk Management.srt |
27.17Кб |
5. Security Assessments.mp4 |
18.77Мб |
5. Security Assessments.srt |
5.73Кб |
5. Social Engineering Phone Call Example #2.mp4 |
35.31Мб |
5. Social Engineering Phone Call Example #2.srt |
2.48Кб |
5. The Hacking Methodology.mp4 |
23.56Мб |
5. The Hacking Methodology.srt |
11.24Кб |
50 |
380.01Кб |
51 |
413.41Кб |
52 |
318.45Кб |
53 |
411.29Кб |
54 |
33.95Кб |
55 |
414.96Кб |
56 |
281.21Кб |
57 |
177.74Кб |
58 |
491.27Кб |
59 |
480.20Кб |
6 |
193.02Кб |
6. Email Spam, Spoofing, Phishing, and Pharming.mp4 |
45.66Мб |
6. Email Spam, Spoofing, Phishing, and Pharming.srt |
13.01Кб |
6. Firewalls.mp4 |
24.76Мб |
6. Firewalls.srt |
7.24Кб |
6. How Hackers Deploy Malware.mp4 |
20.41Мб |
6. How Hackers Deploy Malware.srt |
5.45Кб |
6. How to Access Course Subtitles & Transcripts.html |
1.04Кб |
6. MAC versus IP Addresses.mp4 |
16.86Мб |
6. MAC versus IP Addresses.srt |
4.87Кб |
6. Risk Management Program.mp4 |
28.79Мб |
6. Risk Management Program.srt |
7.73Кб |
6. Weak Encryption Key & Software Vulnerability Attacks.mp4 |
20.86Мб |
6. Weak Encryption Key & Software Vulnerability Attacks.srt |
5.60Кб |
60 |
269.69Кб |
61 |
393.58Кб |
62 |
6.17Кб |
63 |
21.43Кб |
64 |
248.91Кб |
65 |
112.33Кб |
66 |
67.84Кб |
67 |
384.11Кб |
68 |
77.73Кб |
69 |
180.19Кб |
7 |
379.43Кб |
7. Case Study Colonial Pipeline.html |
2.49Кб |
7. Intrusion Detection & Prevention Systems (IDSIPS).mp4 |
22.68Мб |
7. Intrusion Detection & Prevention Systems (IDSIPS).srt |
6.08Кб |
7. Join our Facebook Student Community.html |
1.07Кб |
7. Personnel Policies.mp4 |
20.85Мб |
7. Personnel Policies.srt |
6.89Кб |
7. Switches versus Routers.mp4 |
27.80Мб |
7. Switches versus Routers.srt |
8.02Кб |
7. Web-Based Attacks.mp4 |
23.52Мб |
7. Web-Based Attacks.srt |
7.96Кб |
8 |
414.66Кб |
8. Evil Twin and Rogue Access Points.mp4 |
26.67Мб |
8. Evil Twin and Rogue Access Points.srt |
7.12Кб |
8. TCPIP Protocol Suite.mp4 |
21.15Мб |
8. TCPIP Protocol Suite.srt |
5.55Кб |
8. Training, Eduation and Awareness.mp4 |
21.56Мб |
8. Training, Eduation and Awareness.srt |
7.17Кб |
8. Udemy Mobile App for iOS & Android - Download & Take Course Videos On the Go!.html |
1.19Кб |
8. Utilizing a Network DMZ.mp4 |
18.67Мб |
8. Utilizing a Network DMZ.srt |
5.29Кб |
9 |
459.35Кб |
9. Case Study TJX Companies Inc. (TJX).html |
2.00Кб |
9. Honeypot Decoys.mp4 |
7.82Мб |
9. Honeypot Decoys.srt |
2.08Кб |
9. How the Internet Works (Simplified).mp4 |
26.78Мб |
9. How the Internet Works (Simplified).srt |
6.19Кб |
9. Student Exercise Introduce Yourself.html |
281б |
TutsNode.com.txt |
63б |