Общая информация
Название Hacking Exposed
Тип
Размер 9.66Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
001 Welcome and Introduction to the Instructor.mp4 60.80Мб
002 Goals and Learning Objectives - Volume 1.mp4 70.37Мб
003 Target Audience.mp4 49.67Мб
004 Study Recommendations.mp4 95.83Мб
005 Course updates.mp4 18.85Мб
006 Goals and Learning Objectives.mp4 19.42Мб
007 Protect What You Value.mp4 21.49Мб
008 What is Privacy Anonymity and Pseudonymity.mp4 107.68Мб
009 Security Vulnerabilities Threats and Adversaries.mp4 87.98Мб
010 Threat Modeling and Risk Assessments.mp4 147.69Мб
011 Security vs Privacy vs Anonymity - Can we have it all.mp4 41.19Мб
012 Defense In Depth.mp4 6.90Мб
013 The Zero Trust Model.mp4 76.71Мб
014 Goals and Learning Objectives.mp4 20.74Мб
015 Why You Need Security The Value Of A Hack.mp4 114.64Мб
016 The Top 3 Things You Need To Stay Safe Online.mp4 10.71Мб
017 Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4 124.63Мб
018 Hackers crackers and cyber criminals.mp4 61.18Мб
019 Malware viruses rootkits and RATs.mp4 81.27Мб
020 Spyware Adware Scareware PUPs Browser hijacking.mp4 71.88Мб
021 What is Phishing Vishing and SMShing.mp4 54.46Мб
022 Spamming Doxing.mp4 34.26Мб
023 Social engineering - Scams cons tricks and fraud.mp4 93.39Мб
024 Darknets Dark Markets and Exploit kits.mp4 204.21Мб
025 Governments spies and secret stuff part I.mp4 136.32Мб
026 Governments spies and secret stuff part II.mp4 164.01Мб
027 Regulating encryption mandating insecurity legalizing spying.mp4 330.20Мб
028 Trust Backdoors.mp4 166.81Мб
029 Censorship.mp4 41.61Мб
030 Security News and Alerts Stay Informed.mp4 10.00Мб
031 Goals and Learning Objectives.mp4 11.47Мб
032 Symmetric Encryption.mp4 158.67Мб
033 Asymmetric Encryption.mp4 79.30Мб
034 Hash Functions.mp4 123.86Мб
035 Digital Signatures.mp4 49.71Мб
036 Secure Sockets Layer SSL and Transport layer security TLS.mp4 194.74Мб
037 SSL Stripping.mp4 150.07Мб
038 HTTPS HTTP Secure.mp4 132.79Мб
039 Digital Certificates.mp4 118.54Мб
040 Certificate Authorities and HTTPS.mp4 255.14Мб
041 End-to-End Encryption E2EE.mp4 8.49Мб
042 Steganography.mp4 172.74Мб
043 How Security and Encryption is Really Attacked.mp4 24.49Мб
044 Goals and Learning Objectives.mp4 13.13Мб
045 Introduction to Setting up a Testing Environment Using Virtual Machines.mp4 193.28Мб
046 Vmware.mp4 163.53Мб
047 Virtual box.mp4 197.67Мб
048 Kali Linux 2016.mp4 64.75Мб
049 Goals and Learning Objectives.mp4 17.48Мб
050 Security Features and Functionality.mp4 41.08Мб
051 Security Bugs and Vulnerabilities.mp4 63.24Мб
052 Usage Share.mp4 45.39Мб
053 Windows 10 - Privacy Tracking.mp4 108.03Мб
054 Windows 10 - Disable tracking automatically.mp4 98.98Мб
055 Windows 10 - Tool Disable Windows 10 Tracking.mp4 164.70Мб
056 Windows 10 Cortana.mp4 49.00Мб
057 Windows 10 Privacy Settings.mp4 86.86Мб
058 Windows 10 - WiFi Sense.mp4 74.97Мб
059 Windows 7 8 and 8.1 - Privacy Tracking.mp4 134.33Мб
060 Mac OS X - Privacy Tracking.mp4 84.14Мб
061 Linux and Unix like Operating systems.mp4 80.91Мб
062 Linux - Debian.mp4 7.79Мб
063 Linux - Debian 8 Jessie - Virtual box guest additions Issue.mp4 83.53Мб
064 Linux - OpenBSD and Archlinux.mp4 40.82Мб
065 Linux - Ubuntu.mp4 10.05Мб
066 Goals and Learning Objectives.mp4 11.75Мб
067 The Importance of Patching.mp4 41.73Мб
068 Windows 7 - Auto Update.mp4 26.82Мб
069 Windows 8 8.1 - Auto Update.mp4 12.90Мб
070 Windows 10 - Auto Update.mp4 22.52Мб
071 Windows - Criticality and Patch Tuesday.mp4 78.15Мб
072 Windows 7 8 8.1 10 - Automate the pain away from patching.mp4 130.11Мб
073 Linux - Debian - Patching.mp4 133.82Мб
074 Mac OS X - Patching.mp4 107.99Мб
075 Firefox - Browser and extension updates.mp4 71.41Мб
076 Chrome - Browser and extension updates.mp4 13.79Мб
077 IE and Edge - Browser and extention updates.mp4 14.85Мб
078 Auto updates - The Impact to privacy and anonymity.mp4 15.55Мб
079 Goals and Learning Objectives Removing Privilege.mp4 81.02Мб
080 Windows 7 - Not using admin.mp4 55.46Мб
081 Windows 8 and 8.1 - Not using admin.mp4 53.15Мб
082 Windows 10 - Not using admin.mp4 37.78Мб
083 Goals and Learning Objectives.mp4 12.60Мб
084 Information Disclosure and Identity Strategies for Social Media.mp4 201.38Мб
085 Identify Verification and Registration.mp4 56.12Мб
086 Behavioural Security Controls Against Social Threats Phishing Spam Part 1.mp4 54.58Мб
087 Behavioural Security Controls Against Social Threats Phishing Spam Part 2.mp4 136.30Мб
088 Technical Security Controls Against Social Threats Phishing Spam Scam Cons.mp4 52.38Мб
089 Goals and Learning Objectives.mp4 9.81Мб
090 Security Domains.mp4 95.29Мб
091 Goals and Learning Objectives.mp4 17.87Мб
092 Introduction to Isolation and Compartmentalization.mp4 23.65Мб
093 Physical and Hardware Isolation - How to change the Mac Address.mp4 64.92Мб
094 Physical and Hardware Isolation - Hardware Serials.mp4 138.01Мб
095 Virtual Isolation.mp4 115.02Мб
096 Dual Boot.mp4 27.48Мб
097 Built-in Sandboxes and Application Isolation.mp4 38.24Мб
098 Windows - Sandboxes and Application Isolation.mp4 92.15Мб
099 Windows - Sandboxes and Application Isolation - Sandboxie.mp4 173.85Мб
100 Linux - Sandboxes and Application Isolation.mp4 37.80Мб
101 Mac OS X - Sandboxes and Application Isolation.mp4 58.60Мб
102 Virtual Machines.mp4 157.22Мб
103 Virtual Machine Weaknesses.mp4 106.61Мб
104 Virtual Machine Hardening.mp4 107.36Мб
105 Whonix OS - Anonymous Operating system.mp4 285.20Мб
106 Whonix OS - Weaknesses.mp4 78.03Мб
107 Qubes OS.mp4 263.29Мб
108 Security Domains Isolation and Compartmentalization.mp4 55.60Мб
109 BONUS - Important Information.mp4 20.16Мб
110 Congratulations.mp4 26.81Мб
111 BONUS Lecture from Volume 2 - Router Vulnerability Scanning Shodan Qualys.mp4 204.00Мб
112 BONUS Lecture from Volume 2 - Password cracking part 2.mp4 143.04Мб
113 BONUS Lecture from Volume 3 - Bypassing firewalls and HTTP proxies part 3.mp4 122.21Мб
114 BONUS Lecture from Volume 4 - Email clients protocols and authentication.mp4 181.09Мб
115 BONUS DISCOUNT COUPONS.html 5.38Кб
The-Cyber-Security-Landscape-Diagram.jpg 777.15Кб
Статистика распространения по странам
Венгрия (HU) 1
Россия (RU) 1
США (US) 1
Всего 3
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент