Общая информация
Название [FreeTutorials.Us] Udemy - Hacking in Practice Certified Ethical Hacking MEGA Course
Тип
Размер 4.61Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
0. (1Hack.Us) Premium Tutorials-Guides-Articles & Community based Forum.url 377б
1. (FreeTutorials.Us) Download Udemy Paid Courses For Free.url 328б
1. Answer sample questions which you can find during the examination.html 156б
1. Authentication and authorisation - Introduction.mp4 9.64Мб
1. Authentication and authorisation - Introduction.srt 2.00Кб
1. Authentication and authorisation - Introduction.vtt 1.79Кб
1. BONUS Examination - your voucher.pdf 93.40Кб
1. Designing Computer Networks - introduction.mp4 14.24Мб
1. Designing Computer Networks - introduction.srt 2.48Кб
1. Designing Computer Networks - introduction.vtt 2.20Кб
1. Here’s what you’ll learn in this module.mp4 3.11Мб
1. Here’s what you’ll learn in this module.srt 1.16Кб
1. Here’s what you’ll learn in this module.vtt 1.03Кб
1. Introduction to Application Security.mp4 21.26Мб
1. Introduction to Application Security.srt 8.99Кб
1. Introduction to Application Security.vtt 7.97Кб
1. Introduction to cryptography.mp4 23.58Мб
1. Introduction to cryptography.srt 11.32Кб
1. Introduction to cryptography.vtt 9.99Кб
1. Introduction to cryptology.mp4 18.19Мб
1. Introduction to cryptology.srt 2.66Кб
1. Introduction to cryptology.vtt 2.36Кб
1. Introduction to Current Cyber Threats.mp4 39.03Мб
1. Introduction to Current Cyber Threats.srt 6.08Кб
1. Introduction to Current Cyber Threats.vtt 5.34Кб
1. Introduction to Defence in Depth.mp4 4.54Мб
1. Introduction to Defence in Depth.srt 1.64Кб
1. Introduction to Defence in Depth.vtt 1.47Кб
1. Introduction to Disaster Recovery.mp4 4.36Мб
1. Introduction to Disaster Recovery.srt 1.68Кб
1. Introduction to Disaster Recovery.vtt 1.47Кб
1. Introduction to Monitoring Transmitted Data.mp4 6.46Мб
1. Introduction to Monitoring Transmitted Data.srt 1.32Кб
1. Introduction to Monitoring Transmitted Data.vtt 1.18Кб
1. Introduction to Risk Management.mp4 3.87Мб
1. Introduction to Risk Management.srt 1.63Кб
1. Introduction to Risk Management.vtt 1.44Кб
1. Network security - introduction.mp4 34.45Мб
1. Network security - introduction.srt 6.31Кб
1. Network security - introduction.vtt 5.59Кб
1. Operating systems security - introduction.mp4 110.64Мб
1. Operating systems security - introduction.srt 10.31Кб
1. Operating systems security - introduction.vtt 9.13Кб
1. Security policies – introduction.mp4 5.87Мб
1. Security policies – introduction.srt 2.13Кб
1. Security policies – introduction.vtt 1.89Кб
1. The Certificate - see how it looks like.pdf 482.37Кб
1. Windows Security - what you’ll learn.mp4 7.60Мб
1. Windows Security - what you’ll learn.srt 1.38Кб
1. Windows Security - what you’ll learn.vtt 1.22Кб
1. Wireless Networks.mp4 8.78Мб
1. Wireless Networks.srt 1.39Кб
1. Wireless Networks.vtt 1.25Кб
10.1 14-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf 1.61Мб
10.1 16-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf 2.18Мб
10. BitLocker To Go Reader.mp4 18.44Мб
10. BitLocker To Go Reader.srt 5.04Кб
10. BitLocker To Go Reader.vtt 4.46Кб
10. CONFICKER CASE STUDY.mp4 20.02Мб
10. CONFICKER CASE STUDY.srt 7.80Кб
10. CONFICKER CASE STUDY.vtt 6.88Кб
10. DREAD Exploitability.mp4 13.90Мб
10. DREAD Exploitability.srt 5.94Кб
10. DREAD Exploitability.vtt 5.24Кб
10. EXERCISE Offline attacks.mp4 45.63Мб
10. EXERCISE Offline attacks.srt 12.92Кб
10. EXERCISE Offline attacks.vtt 11.31Кб
10. EXERCISE Vulnerability attacks.mp4 47.61Мб
10. EXERCISE Vulnerability attacks.srt 10.49Кб
10. EXERCISE Vulnerability attacks.vtt 9.20Кб
10. How to protect users without interrupting their work - notes for the examination.html 10б
10. Law #2.mp4 7.58Мб
10. Law #2.srt 3.18Кб
10. Law #2.vtt 2.82Кб
10. Network access control RADIUS.mp4 48.43Мб
10. Network access control RADIUS.srt 12.00Кб
10. Network access control RADIUS.vtt 10.59Кб
10. OSI MODEL #4 - Transport Layer.mp4 28.63Мб
10. OSI MODEL #4 - Transport Layer.srt 6.33Кб
10. OSI MODEL #4 - Transport Layer.vtt 5.61Кб
10. Popular Myths About Computer System Security - notes for the examination.pdf 988.50Кб
10. Public Key Infrastructure - Trust but verify - notes for the examination.html 10б
10. Scanning computers.mp4 35.28Мб
10. Scanning computers.srt 8.21Кб
10. Scanning computers.vtt 7.25Кб
10. Standards and Security Solutions - notes for the examination.pdf 1.46Мб
10. Stream Ciphers - RC4.mp4 8.59Мб
10. Stream Ciphers - RC4.srt 3.89Кб
10. Stream Ciphers - RC4.vtt 3.42Кб
10. STRIDE Spoofing identity.mp4 13.85Мб
10. STRIDE Spoofing identity.srt 5.53Кб
10. STRIDE Spoofing identity.vtt 4.84Кб
10. Unsafe applications.mp4 24.95Мб
10. Unsafe applications.srt 11.58Кб
10. Unsafe applications.vtt 10.19Кб
11.1 05-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf 2.44Мб
11.1 13-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf 1.06Мб
11. Asymmetric-key algorithms.mp4 19.08Мб
11. Asymmetric-key algorithms.srt 8.51Кб
11. Asymmetric-key algorithms.vtt 7.53Кб
11. EXERCISE Identifying suspicious processes.mp4 29.97Мб
11. EXERCISE Identifying suspicious processes.srt 7.71Кб
11. EXERCISE Identifying suspicious processes.vtt 6.81Кб
11. EXERCISE Risk Assessment.mp4 18.11Мб
11. EXERCISE Risk Assessment.srt 8.11Кб
11. EXERCISE Risk Assessment.vtt 7.16Кб
11. File and folder encryption - EFS.mp4 34.52Мб
11. File and folder encryption - EFS.srt 8.14Кб
11. File and folder encryption - EFS.vtt 7.15Кб
11. How to reduce losses - notes for the examination.html 10б
11. Law #3.mp4 5.86Мб
11. Law #3.srt 2.49Кб
11. Law #3.vtt 2.18Кб
11. Monitoring transmitted data - notes for the examination.pdf 1.77Мб
11. Program Security Assessment - notes for the examination.html 10б
11. Protocols and Services - notes for the examination.pdf 1.19Мб
11. STRIDE Tampering with Data.mp4 12.84Мб
11. STRIDE Tampering with Data.srt 4.98Кб
11. STRIDE Tampering with Data.vtt 4.37Кб
11. Threats Enumerating Remote Computers.mp4 16.81Мб
11. Threats Enumerating Remote Computers.srt 4.04Кб
11. Threats Enumerating Remote Computers.vtt 3.58Кб
11. Threats of WIFI networks.mp4 30.54Мб
11. Threats of WIFI networks.srt 6.70Кб
11. Threats of WIFI networks.vtt 5.89Кб
11. Trends in IT Security.mp4 18.70Мб
11. Trends in IT Security.srt 4.18Кб
11. Trends in IT Security.vtt 3.68Кб
11. Using online cracking services.mp4 37.65Мб
11. Using online cracking services.srt 9.54Кб
11. Using online cracking services.vtt 8.37Кб
12.1 03-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf 1.81Мб
12. Check your knowledge and get ready for the exam.html 157б
12. Client Attacks Launching a rogue access point.mp4 33.57Мб
12. Client Attacks Launching a rogue access point.srt 7.55Кб
12. Client Attacks Launching a rogue access point.vtt 6.70Кб
12. Demonstration Process Explorer.mp4 38.13Мб
12. Demonstration Process Explorer.srt 9.92Кб
12. Demonstration Process Explorer.vtt 8.77Кб
12. EXERCISE EFS.mp4 15.35Мб
12. EXERCISE EFS.srt 6.08Кб
12. EXERCISE EFS.vtt 5.34Кб
12. EXERCISE Transport Layer Attack using METASPLOIT part 1.mp4 12.84Мб
12. EXERCISE Transport Layer Attack using METASPLOIT part 1.srt 5.90Кб
12. EXERCISE Transport Layer Attack using METASPLOIT part 1.vtt 5.16Кб
12. Identity Theft - notes for the examination.pdf 2.13Мб
12. Law #4.mp4 5.97Мб
12. Law #4.srt 1.99Кб
12. Law #4.vtt 1.78Кб
12. Risk Assessment - notes for the examination.html 10б
12. RSA.mp4 12.83Мб
12. RSA.srt 5.69Кб
12. RSA.vtt 4.96Кб
12. STRIDE Denial of Service.mp4 10.39Мб
12. STRIDE Denial of Service.srt 4.24Кб
12. STRIDE Denial of Service.vtt 3.76Кб
12. The birth of technology society.mp4 18.58Мб
12. The birth of technology society.srt 3.45Кб
12. The birth of technology society.vtt 3.05Кб
13. Client Attacks Evil twin.mp4 22.76Мб
13. Client Attacks Evil twin.srt 5.27Кб
13. Client Attacks Evil twin.vtt 4.64Кб
13. ELGAMAL.mp4 4.90Мб
13. ELGAMAL.srt 2.16Кб
13. ELGAMAL.vtt 1.88Кб
13. Encryption - notes for the examination.pdf 1.60Мб
13. EXERCISE How much info can you gather.mp4 13.78Мб
13. EXERCISE How much info can you gather.srt 4.21Кб
13. EXERCISE How much info can you gather.vtt 3.70Кб
13. EXERCISE Removing malware.mp4 45.85Мб
13. EXERCISE Removing malware.srt 9.47Кб
13. EXERCISE Removing malware.vtt 8.34Кб
13. EXERCISE Transport Layer Attack using METASPLOIT part 2.mp4 26.08Мб
13. EXERCISE Transport Layer Attack using METASPLOIT part 2.srt 5.69Кб
13. EXERCISE Transport Layer Attack using METASPLOIT part 2.vtt 5.03Кб
13. Introduction to Social Engineering and rogue software.mp4 11.41Мб
13. Introduction to Social Engineering and rogue software.srt 4.69Кб
13. Introduction to Social Engineering and rogue software.vtt 4.15Кб
13. Law #5.mp4 8.81Мб
13. Law #5.srt 3.52Кб
13. Law #5.vtt 3.11Кб
14. Client Attacks Denial of service.mp4 36.52Мб
14. Client Attacks Denial of service.srt 10.33Кб
14. Client Attacks Denial of service.vtt 9.02Кб
14. Fake identity.mp4 21.76Мб
14. Fake identity.srt 5.61Кб
14. Fake identity.vtt 4.92Кб
14. HASH functions.mp4 14.43Мб
14. HASH functions.srt 6.04Кб
14. HASH functions.vtt 5.28Кб
14. Law #6.mp4 5.82Мб
14. Law #6.srt 2.40Кб
14. Law #6.vtt 2.11Кб
14. Manipulation tactics.mp4 22.17Мб
14. Manipulation tactics.srt 10.43Кб
14. Manipulation tactics.vtt 9.17Кб
14. OSI MODEL #5 - Session Layer.mp4 16.38Мб
14. OSI MODEL #5 - Session Layer.srt 4.06Кб
14. OSI MODEL #5 - Session Layer.vtt 3.60Кб
14. Rootkits.mp4 28.94Мб
14. Rootkits.srt 6.72Кб
14. Rootkits.vtt 5.91Кб
15. Digital signature.mp4 15.45Мб
15. Digital signature.srt 6.68Кб
15. Digital signature.vtt 5.82Кб
15. EXERCISE Detecting rootkits.mp4 58.29Мб
15. EXERCISE Detecting rootkits.srt 12.13Кб
15. EXERCISE Detecting rootkits.vtt 10.64Кб
15. EXERCISE Social Engineering attacks.mp4 19.02Мб
15. EXERCISE Social Engineering attacks.srt 6.84Кб
15. EXERCISE Social Engineering attacks.vtt 6.01Кб
15. EXERCISE WPA attack.mp4 8.87Мб
15. EXERCISE WPA attack.srt 3.88Кб
15. EXERCISE WPA attack.vtt 3.37Кб
15. Law #7.mp4 2.90Мб
15. Law #7.srt 1.37Кб
15. Law #7.vtt 1.20Кб
15. Online privacy.mp4 32.04Мб
15. Online privacy.srt 6.68Кб
15. Online privacy.vtt 5.87Кб
15. Transport Protocols - notes for the examination.pdf 1.10Мб
16. Analyzing sniffing software.mp4 19.51Мб
16. Analyzing sniffing software.srt 3.72Кб
16. Analyzing sniffing software.vtt 3.29Кб
16. EXERCISE Security evaluation.mp4 17.82Мб
16. EXERCISE Security evaluation.srt 6.55Кб
16. EXERCISE Security evaluation.vtt 5.79Кб
16. Hybrid Schemes.mp4 16.07Мб
16. Hybrid Schemes.srt 7.01Кб
16. Hybrid Schemes.vtt 6.17Кб
16. Law #8.mp4 4.59Мб
16. Law #8.srt 1.72Кб
16. Law #8.vtt 1.52Кб
16. OSI MODEL #6 - Presentation Layer.mp4 37.43Мб
16. OSI MODEL #6 - Presentation Layer.srt 6.81Кб
16. OSI MODEL #6 - Presentation Layer.vtt 5.99Кб
16. SE with KALI BackTrack.mp4 16.16Мб
16. SE with KALI BackTrack.srt 7.35Кб
16. SE with KALI BackTrack.vtt 6.41Кб
16. Wi-Fi Security Threats - notes for the examination.pdf 1.70Мб
17.1 15-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf 2.52Мб
17. Cyber War.mp4 45.40Мб
17. Cyber War.srt 8.80Кб
17. Cyber War.vtt 7.75Кб
17. Law #9.mp4 9.23Мб
17. Law #9.srt 4.60Кб
17. Law #9.vtt 4.06Кб
17. Malware - notes for the examination.pdf 2.49Мб
17. OSI MODEL #7 - Application Layer.mp4 16.92Мб
17. OSI MODEL #7 - Application Layer.srt 4.16Кб
17. OSI MODEL #7 - Application Layer.vtt 3.67Кб
17. Rogue Software.mp4 7.38Мб
17. Rogue Software.srt 2.71Кб
17. Rogue Software.vtt 2.38Кб
17. Symmetric and Asymmetric Ciphers - notes for the examination.html 10б
18. Changing IT Security Trends - notes for the examination.pdf 2.04Мб
18. EXERCISE Application Layer Attacks.mp4 18.99Мб
18. EXERCISE Application Layer Attacks.srt 5.87Кб
18. EXERCISE Application Layer Attacks.vtt 5.13Кб
18. Fraud tools #1.mp4 20.02Мб
18. Fraud tools #1.srt 7.33Кб
18. Fraud tools #1.vtt 6.39Кб
18. Law #10.mp4 1.96Мб
18. Law #10.srt 796б
18. Law #10.vtt 716б
19. Backtrack Attack Demonstration.mp4 15.59Мб
19. Backtrack Attack Demonstration.srt 3.74Кб
19. Backtrack Attack Demonstration.vtt 3.31Кб
19. Fraud tools #2.mp4 17.72Мб
19. Fraud tools #2.srt 7.16Кб
19. Fraud tools #2.vtt 6.32Кб
19. Laws for administrators.mp4 13.86Мб
19. Laws for administrators.srt 6.71Кб
19. Laws for administrators.vtt 5.91Кб
19. Objective #1 - Data security - Introduction.mp4 38.83Мб
19. Objective #1 - Data security - Introduction.srt 7.29Кб
19. Objective #1 - Data security - Introduction.vtt 6.43Кб
2. (FreeCoursesOnline.Me) Download Udacity, Masterclass, Lynda, PHLearn, Pluralsight Free.url 286б
2. Attack methods.mp4 17.28Мб
2. Attack methods.srt 7.54Кб
2. Attack methods.vtt 6.64Кб
2. Attacks on applications.mp4 25.50Мб
2. Attacks on applications.srt 11.68Кб
2. Attacks on applications.vtt 10.33Кб
2. Authentication users.mp4 31.37Мб
2. Authentication users.srt 7.87Кб
2. Authentication users.vtt 6.92Кб
2. BONUS LECTURE Learn more and get to know our other courses.html 5.86Кб
2. History of ciphers.mp4 25.50Мб
2. History of ciphers.srt 12.22Кб
2. History of ciphers.vtt 10.77Кб
2. How to reduce losses.mp4 14.86Мб
2. How to reduce losses.srt 5.96Кб
2. How to reduce losses.vtt 5.26Кб
2. How to use Defence in Depth model.mp4 14.67Мб
2. How to use Defence in Depth model.srt 6.11Кб
2. How to use Defence in Depth model.vtt 5.40Кб
2. IT Prehistory.mp4 44.20Мб
2. IT Prehistory.srt 5.66Кб
2. IT Prehistory.vtt 5.00Кб
2. Managing applications.mp4 17.21Мб
2. Managing applications.srt 10.23Кб
2. Managing applications.vtt 9.01Кб
2. Monitoring Transmitted Data - Basic informations.mp4 41.07Мб
2. Monitoring Transmitted Data - Basic informations.srt 9.75Кб
2. Monitoring Transmitted Data - Basic informations.vtt 8.63Кб
2. OSI MODEL #1 - Physical layer.mp4 28.96Мб
2. OSI MODEL #1 - Physical layer.srt 6.44Кб
2. OSI MODEL #1 - Physical layer.vtt 5.69Кб
2. Public key infrastructure.mp4 14.81Мб
2. Public key infrastructure.srt 7.29Кб
2. Public key infrastructure.vtt 6.39Кб
2. Security boundaries.mp4 21.20Мб
2. Security boundaries.srt 5.33Кб
2. Security boundaries.vtt 4.74Кб
2. Subnetting IPv4.mp4 29.12Мб
2. Subnetting IPv4.srt 7.83Кб
2. Subnetting IPv4.vtt 6.96Кб
2. User Account Control.mp4 32.01Мб
2. User Account Control.srt 6.78Кб
2. User Account Control.vtt 5.96Кб
2. What is security.mp4 10.90Мб
2. What is security.srt 3.89Кб
2. What is security.vtt 3.42Кб
2. WIFI security solutions - introduction.mp4 29.17Мб
2. WIFI security solutions - introduction.srt 6.34Кб
2. WIFI security solutions - introduction.vtt 5.64Кб
20.1 03-3-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf 2.91Мб
20.1 04-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf 1.62Мб
20. Confidentiality of data.mp4 31.66Мб
20. Confidentiality of data.srt 5.58Кб
20. Confidentiality of data.vtt 4.90Кб
20. Immutable Laws of Security - notes for the examination.html 10б
20. Man-in-the-Middle and Denial of Service Attacks.mp4 14.20Мб
20. Man-in-the-Middle and Denial of Service Attacks.srt 2.92Кб
20. Man-in-the-Middle and Denial of Service Attacks.vtt 2.61Кб
20. Social Engineering and Rogue Software - notes for the examination.html 10б
21. EXERCISE Finding confidential data with search engines.mp4 23.49Мб
21. EXERCISE Finding confidential data with search engines.srt 5.98Кб
21. EXERCISE Finding confidential data with search engines.vtt 5.23Кб
21. Modifying Transmitted Packets.mp4 26.77Мб
21. Modifying Transmitted Packets.srt 5.07Кб
21. Modifying Transmitted Packets.vtt 4.47Кб
22. Integrity of data.mp4 32.11Мб
22. Integrity of data.srt 7.04Кб
22. Integrity of data.vtt 6.19Кб
22. Unencrypted protocols.mp4 13.64Мб
22. Unencrypted protocols.srt 3.25Кб
22. Unencrypted protocols.vtt 2.86Кб
23. Application Protocols - notes for the examination.pdf 2.17Мб
23. Data security - notes for the examination.pdf 1.99Мб
3. (NulledPremium.com) Download E-Learning, E-Books, Audio-Books, Comics, Articles and more... etc.url 163б
3. DiD OS and LAN Layers.mp4 16.14Мб
3. DiD OS and LAN Layers.srt 7.09Кб
3. DiD OS and LAN Layers.vtt 6.26Кб
3. Ensuring continous availability.mp4 10.78Мб
3. Ensuring continous availability.srt 4.37Кб
3. Ensuring continous availability.vtt 3.86Кб
3. How secure is your password.mp4 15.97Мб
3. How secure is your password.srt 5.71Кб
3. How secure is your password.vtt 5.01Кб
3. Implementing public key infrastructure.mp4 12.74Мб
3. Implementing public key infrastructure.srt 6.42Кб
3. Implementing public key infrastructure.vtt 5.72Кб
3. Information security.mp4 10.26Мб
3. Information security.srt 4.13Кб
3. Information security.vtt 3.66Кб
3. Intrusion detection systems.mp4 38.23Мб
3. Intrusion detection systems.srt 8.99Кб
3. Intrusion detection systems.vtt 7.93Кб
3. Let’s look a few years back.mp4 35.96Мб
3. Let’s look a few years back.srt 6.04Кб
3. Let’s look a few years back.vtt 5.30Кб
3. Local attacks.mp4 7.89Мб
3. Local attacks.srt 3.31Кб
3. Local attacks.vtt 2.94Кб
3. OSI MODEL #2 - Data link layer.mp4 22.75Мб
3. OSI MODEL #2 - Data link layer.srt 5.26Кб
3. OSI MODEL #2 - Data link layer.vtt 4.65Кб
3. Software updates.mp4 6.22Мб
3. Software updates.srt 3.16Кб
3. Software updates.vtt 2.79Кб
3. SQL Injection.mp4 17.96Мб
3. SQL Injection.srt 9.23Кб
3. SQL Injection.vtt 8.10Кб
3. Subnetting IPv6.mp4 17.45Мб
3. Subnetting IPv6.srt 3.52Кб
3. Subnetting IPv6.vtt 3.10Кб
3. Symmetric and asymmetric ciphers.mp4 15.06Мб
3. Symmetric and asymmetric ciphers.srt 6.74Кб
3. Symmetric and asymmetric ciphers.vtt 5.93Кб
3. Thank you for joining the training.html 374б
3. Three core.mp4 29.75Мб
3. Three core.srt 8.22Кб
3. Three core.vtt 7.28Кб
3. UAC configuration.mp4 35.10Мб
3. UAC configuration.srt 8.95Кб
3. UAC configuration.vtt 7.86Кб
3. WIFI - working principles.mp4 29.36Мб
3. WIFI - working principles.srt 6.63Кб
3. WIFI - working principles.vtt 5.86Кб
4. (FTUApps.com) Download Cracked Developers Applications For Free.url 239б
4. Additional Security Features - ASLR and DEP.mp4 40.91Мб
4. Additional Security Features - ASLR and DEP.srt 12.90Кб
4. Additional Security Features - ASLR and DEP.vtt 11.30Кб
4. Authentication protocols and services.mp4 31.82Мб
4. Authentication protocols and services.srt 8.71Кб
4. Authentication protocols and services.vtt 7.71Кб
4. Cyber crimes - an evolution not revolution.mp4 30.76Мб
4. Cyber crimes - an evolution not revolution.srt 5.78Кб
4. Cyber crimes - an evolution not revolution.vtt 5.09Кб
4. DiD Perimeter and Physical Access Layers.mp4 12.93Мб
4. DiD Perimeter and Physical Access Layers.srt 6.20Кб
4. DiD Perimeter and Physical Access Layers.vtt 5.41Кб
4. EXERCISE Analyze the application.mp4 28.74Мб
4. EXERCISE Analyze the application.srt 15.70Кб
4. EXERCISE Analyze the application.vtt 13.67Кб
4. EXERCISE OS boundaries.mp4 39.10Мб
4. EXERCISE OS boundaries.srt 7.76Кб
4. EXERCISE OS boundaries.vtt 6.80Кб
4. Information security - level up.mp4 9.88Мб
4. Information security - level up.srt 4.27Кб
4. Information security - level up.vtt 3.73Кб
4. MS Update.mp4 16.24Мб
4. MS Update.srt 7.51Кб
4. MS Update.vtt 6.68Кб
4. Other wireless technologies.mp4 13.16Мб
4. Other wireless technologies.srt 3.35Кб
4. Other wireless technologies.vtt 2.95Кб
4. Subnetting - notes for the examination.pdf 1.41Мб
4. Symmetric-key algorithms.mp4 13.51Мб
4. Symmetric-key algorithms.srt 6.06Кб
4. Symmetric-key algorithms.vtt 5.35Кб
4. Target scanning and enumeration techniques #1.mp4 15.84Мб
4. Target scanning and enumeration techniques #1.srt 6.26Кб
4. Target scanning and enumeration techniques #1.vtt 5.53Кб
4. Threat discovery #1.mp4 12.28Мб
4. Threat discovery #1.srt 4.55Кб
4. Threat discovery #1.vtt 4.01Кб
4. Threats MAC spoofing.mp4 27.46Мб
4. Threats MAC spoofing.srt 6.62Кб
4. Threats MAC spoofing.vtt 5.82Кб
4. What will PKI allow you.mp4 14.46Мб
4. What will PKI allow you.srt 7.51Кб
4. What will PKI allow you.vtt 6.63Кб
4. Why are firewalls and NDIS not enough.mp4 28.19Мб
4. Why are firewalls and NDIS not enough.srt 6.40Кб
4. Why are firewalls and NDIS not enough.vtt 5.67Кб
5. Authentication - notes for the examination.pdf 2.86Мб
5. Blind SQL Injection.mp4 22.47Мб
5. Blind SQL Injection.srt 11.07Кб
5. Blind SQL Injection.vtt 9.70Кб
5. Block ciphers.mp4 15.35Мб
5. Block ciphers.srt 6.43Кб
5. Block ciphers.vtt 5.70Кб
5. Current Cyber Threats - notes for the examination.pdf 1.47Мб
5. DiD Demonstration.mp4 6.98Мб
5. DiD Demonstration.srt 2.85Кб
5. DiD Demonstration.vtt 2.49Кб
5. EXERCISE Certificates.mp4 20.63Мб
5. EXERCISE Certificates.srt 10.12Кб
5. EXERCISE Certificates.vtt 8.92Кб
5. IPv6 address notation.mp4 27.31Мб
5. IPv6 address notation.srt 6.91Кб
5. IPv6 address notation.vtt 6.08Кб
5. PatchGuard.mp4 7.86Мб
5. PatchGuard.srt 1.58Кб
5. PatchGuard.vtt 1.40Кб
5. Process isolation.mp4 26.85Мб
5. Process isolation.srt 7.17Кб
5. Process isolation.vtt 6.37Кб
5. Security issues.mp4 12.84Мб
5. Security issues.srt 5.02Кб
5. Security issues.vtt 4.42Кб
5. System Center Configuration Manager.mp4 6.28Мб
5. System Center Configuration Manager.srt 3.17Кб
5. System Center Configuration Manager.vtt 2.81Кб
5. Target scanning and enumeration techniques #2.mp4 8.40Мб
5. Target scanning and enumeration techniques #2.srt 3.69Кб
5. Target scanning and enumeration techniques #2.vtt 3.27Кб
5. Threat discovery #2.mp4 8.84Мб
5. Threat discovery #2.srt 3.93Кб
5. Threat discovery #2.vtt 3.46Кб
5. Threats and risks.mp4 18.50Мб
5. Threats and risks.srt 5.13Кб
5. Threats and risks.vtt 4.53Кб
5. Threats ARP Poisoning.mp4 31.29Мб
5. Threats ARP Poisoning.srt 7.61Кб
5. Threats ARP Poisoning.vtt 6.69Кб
5. Wireshark - Introduction to network analysis.mp4 30.66Мб
5. Wireshark - Introduction to network analysis.srt 7.79Кб
5. Wireshark - Introduction to network analysis.vtt 6.86Кб
6. Audit users and keep control accounts.mp4 13.30Мб
6. Audit users and keep control accounts.srt 5.18Кб
6. Audit users and keep control accounts.vtt 4.52Кб
6. Automated attack targeting a service.mp4 15.14Мб
6. Automated attack targeting a service.srt 5.26Кб
6. Automated attack targeting a service.vtt 4.64Кб
6. Automated SQL Injection.mp4 29.48Мб
6. Automated SQL Injection.srt 13.71Кб
6. Automated SQL Injection.vtt 11.96Кб
6. Blocking applications.mp4 17.98Мб
6. Blocking applications.srt 8.70Кб
6. Blocking applications.vtt 7.70Кб
6. Data encryption standard.mp4 16.54Мб
6. Data encryption standard.srt 7.16Кб
6. Data encryption standard.vtt 6.32Кб
6. DMZ demilitarized Zone.mp4 30.28Мб
6. DMZ demilitarized Zone.srt 6.85Кб
6. DMZ demilitarized Zone.vtt 6.06Кб
6. EXERCISE Data Link Layer Attack.mp4 35.27Мб
6. EXERCISE Data Link Layer Attack.srt 8.03Кб
6. EXERCISE Data Link Layer Attack.vtt 7.04Кб
6. How to use Wireshark.mp4 43.56Мб
6. How to use Wireshark.srt 10.17Кб
6. How to use Wireshark.vtt 8.99Кб
6. Ineffective solutions.mp4 18.98Мб
6. Ineffective solutions.srt 4.69Кб
6. Ineffective solutions.vtt 4.15Кб
6. Kernel Mode Code Signing.mp4 25.68Мб
6. Kernel Mode Code Signing.srt 6.95Кб
6. Kernel Mode Code Signing.vtt 6.13Кб
6. LM Hash.mp4 30.70Мб
6. LM Hash.srt 7.51Кб
6. LM Hash.vtt 6.58Кб
6. Passive scanning.mp4 7.13Мб
6. Passive scanning.srt 2.09Кб
6. Passive scanning.vtt 1.84Кб
6. Planning the PKI.mp4 22.55Мб
6. Planning the PKI.srt 10.28Кб
6. Planning the PKI.vtt 9.02Кб
6. Popular myths about IT security - origins.mp4 44.25Мб
6. Popular myths about IT security - origins.srt 6.40Кб
6. Popular myths about IT security - origins.vtt 5.64Кб
6. Techniques and Methods - notes for the examination.pdf 1.44Мб
6. Why are security solutions fallible.mp4 15.49Мб
6. Why are security solutions fallible.srt 5.96Кб
6. Why are security solutions fallible.vtt 5.24Кб
7.1 03-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf 1.61Мб
7. Analyzing Captured data.mp4 31.02Мб
7. Analyzing Captured data.srt 6.53Кб
7. Analyzing Captured data.vtt 5.73Кб
7. Attack Methodologies - notes for the examination.html 10б
7. Authentication methods.mp4 37.13Мб
7. Authentication methods.srt 9.77Кб
7. Authentication methods.vtt 8.59Кб
7. Automated user-targeting attack.mp4 13.43Мб
7. Automated user-targeting attack.srt 4.99Кб
7. Automated user-targeting attack.vtt 4.41Кб
7. Cached Credentials.mp4 18.08Мб
7. Cached Credentials.srt 5.04Кб
7. Cached Credentials.vtt 4.45Кб
7. Certificate life cycle.mp4 16.19Мб
7. Certificate life cycle.srt 7.19Кб
7. Certificate life cycle.vtt 6.35Кб
7. Cross-site scripting - XSS.mp4 29.10Мб
7. Cross-site scripting - XSS.srt 11.16Кб
7. Cross-site scripting - XSS.vtt 9.79Кб
7. DES-X.mp4 18.22Мб
7. DES-X.srt 7.65Кб
7. DES-X.vtt 6.69Кб
7. Encryption - key protection.mp4 46.34Мб
7. Encryption - key protection.srt 16.07Кб
7. Encryption - key protection.vtt 14.11Кб
7. High risk users.mp4 7.92Мб
7. High risk users.srt 3.65Кб
7. High risk users.vtt 3.21Кб
7. Java Virtual Machine and code access security.mp4 18.64Мб
7. Java Virtual Machine and code access security.srt 4.87Кб
7. Java Virtual Machine and code access security.vtt 4.28Кб
7. Myths #1 - you’ll never be hacked.mp4 29.18Мб
7. Myths #1 - you’ll never be hacked.srt 6.86Кб
7. Myths #1 - you’ll never be hacked.vtt 6.03Кб
7. OSI MODEL #3 - Network layer.mp4 31.70Мб
7. OSI MODEL #3 - Network layer.srt 7.16Кб
7. OSI MODEL #3 - Network layer.vtt 6.35Кб
7. Protocols and services IP SEC.mp4 43.74Мб
7. Protocols and services IP SEC.srt 10.57Кб
7. Protocols and services IP SEC.vtt 9.38Кб
7. Security policy issues.mp4 12.60Мб
7. Security policy issues.srt 5.08Кб
7. Security policy issues.vtt 4.47Кб
7. Software restrictions policies.mp4 14.49Мб
7. Software restrictions policies.srt 6.77Кб
7. Software restrictions policies.vtt 5.96Кб
8.1 04-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf 1.64Мб
8.1 13-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf 1.65Мб
8. 802.11 WEP.mp4 31.39Мб
8. 802.11 WEP.srt 7.74Кб
8. 802.11 WEP.vtt 6.77Кб
8. Advanced encryption standards.mp4 12.83Мб
8. Advanced encryption standards.srt 5.47Кб
8. Advanced encryption standards.vtt 4.80Кб
8. Application Attacks - notes for the examination.html 10б
8. Collecting and analysing evidence.mp4 18.29Мб
8. Collecting and analysing evidence.srt 6.92Кб
8. Collecting and analysing evidence.vtt 6.10Кб
8. Drive encryption.mp4 37.33Мб
8. Drive encryption.srt 9.32Кб
8. Drive encryption.vtt 8.20Кб
8. EXERCISE Application control rules.mp4 27.19Мб
8. EXERCISE Application control rules.srt 13.41Кб
8. EXERCISE Application control rules.vtt 11.74Кб
8. How to analyze telnet protocol.mp4 37.99Мб
8. How to analyze telnet protocol.srt 8.87Кб
8. How to analyze telnet protocol.vtt 7.76Кб
8. Introduction to risk assessment.mp4 18.15Мб
8. Introduction to risk assessment.srt 7.06Кб
8. Introduction to risk assessment.vtt 6.27Кб
8. Introduction to threat modelling and classification.mp4 13.30Мб
8. Introduction to threat modelling and classification.srt 5.67Кб
8. Introduction to threat modelling and classification.vtt 5.00Кб
8. IP SEC Phase 1.mp4 21.71Мб
8. IP SEC Phase 1.srt 8.22Кб
8. IP SEC Phase 1.vtt 7.27Кб
8. KERBEROS.mp4 52.56Мб
8. KERBEROS.srt 12.17Кб
8. KERBEROS.vtt 10.72Кб
8. Myths #2 - you don’t need any protection software or hardware.mp4 25.77Мб
8. Myths #2 - you don’t need any protection software or hardware.srt 6.26Кб
8. Myths #2 - you don’t need any protection software or hardware.vtt 5.52Кб
8. OS Security Boundaries - notes for the examination.pdf 4.26Мб
8. PKI Administration.mp4 67.22Мб
8. PKI Administration.srt 8.48Кб
8. PKI Administration.vtt 7.49Кб
8. TCP Tunnelling over ICMP.mp4 34.99Мб
8. TCP Tunnelling over ICMP.srt 7.70Кб
8. TCP Tunnelling over ICMP.vtt 6.80Кб
8. The Defence in Depth Model - notes for the examination.html 10б
9.1 02-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf 1.42Мб
9. 802.11I WPA.mp4 31.59Мб
9. 802.11I WPA.srt 6.58Кб
9. 802.11I WPA.vtt 5.75Кб
9. BitLocker.mp4 36.43Мб
9. BitLocker.srt 8.94Кб
9. BitLocker.vtt 7.85Кб
9. Block cipher modes.mp4 17.50Мб
9. Block cipher modes.srt 7.72Кб
9. Block cipher modes.vtt 6.76Кб
9. DREAD Risk assessment model.mp4 12.64Мб
9. DREAD Risk assessment model.srt 5.17Кб
9. DREAD Risk assessment model.vtt 4.57Кб
9. Forensics example.mp4 10.61Мб
9. Forensics example.srt 4.06Кб
9. Forensics example.vtt 3.59Кб
9. Identity Theft.mp4 42.95Мб
9. Identity Theft.srt 10.49Кб
9. Identity Theft.vtt 9.22Кб
9. Introduction to Immutable laws of security - Law #1.mp4 13.99Мб
9. Introduction to Immutable laws of security - Law #1.srt 5.14Кб
9. Introduction to Immutable laws of security - Law #1.vtt 4.54Кб
9. Intrusion detection.mp4 46.35Мб
9. Intrusion detection.srt 8.66Кб
9. Intrusion detection.vtt 7.54Кб
9. Isolating applications.mp4 16.88Мб
9. Isolating applications.srt 7.16Кб
9. Isolating applications.vtt 6.30Кб
9. Malware.mp4 44.86Мб
9. Malware.srt 14.10Кб
9. Malware.vtt 12.33Кб
9. Myths #3 - IT security is always a priority.mp4 6.00Мб
9. Myths #3 - IT security is always a priority.srt 1.30Кб
9. Myths #3 - IT security is always a priority.vtt 1.13Кб
9. Network Address translation.mp4 52.64Мб
9. Network Address translation.srt 13.51Кб
9. Network Address translation.vtt 11.90Кб
9. Network Protocols - notes for the examination.pdf 2.22Мб
9. Program security assessment.mp4 12.15Мб
9. Program security assessment.srt 6.09Кб
9. Program security assessment.vtt 5.42Кб
9. Threat Modelling and Classification - notes for the examination.html 10б
9. Threat modelling - STRIDE.mp4 10.58Мб
9. Threat modelling - STRIDE.srt 4.15Кб
9. Threat modelling - STRIDE.vtt 3.67Кб
How you can help Team-FTU.txt 237б
Статистика распространения по странам
Индия (IN) 3
Россия (RU) 2
Бразилия (BR) 2
Китай (CN) 1
Румыния (RO) 1
Португалия (PT) 1
Всего 10
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент