Общая информация
Название [FreeAllCourse.Com] Udemy - Hacking in Practice Certified Ethical Hacking MEGA Course
Тип
Размер 4.79Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
[FreeAllCourse.Com].url 52б
001 Welcome to the course.html 1.17Кб
002 Foreword FAQ.html 3.42Кб
003 Course preview 15 min. long demo lecture. The whole training is 27 hours long.en.srt 25.12Кб
003 Course preview 15 min. long demo lecture. The whole training is 27 hours long.it.srt 27.08Кб
003 Course preview 15 min. long demo lecture. The whole training is 27 hours long.mp4 213.49Мб
004 Why is this section here.html 1.22Кб
005 Introduction to Application Security.en.srt 8.99Кб
005 Introduction to Application Security.it.srt 9.84Кб
005 Introduction to Application Security.mp4 21.26Мб
006 Attacks on applications.en.srt 11.68Кб
006 Attacks on applications.it.srt 12.78Кб
006 Attacks on applications.mp4 25.50Мб
007 SQL Injection.en.srt 9.22Кб
007 SQL Injection.it.srt 9.96Кб
007 SQL Injection.mp4 17.96Мб
008 EXERCISE Analyze the application.en.srt 15.69Кб
008 EXERCISE Analyze the application.it.srt 16.73Кб
008 EXERCISE Analyze the application.mp4 28.74Мб
009 Blind SQL Injection.en.srt 11.07Кб
009 Blind SQL Injection.it.srt 12.14Кб
009 Blind SQL Injection.mp4 22.47Мб
010 Automated SQL Injection.en.srt 13.71Кб
010 Automated SQL Injection.it.srt 14.90Кб
010 Automated SQL Injection.mp4 29.48Мб
011 Cross-site scripting - XSS.en.srt 11.15Кб
011 Cross-site scripting - XSS.it.srt 12.19Кб
011 Cross-site scripting - XSS.mp4 29.10Мб
012 13-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.65Мб
012 Application Attacks - notes for the examination.html 898б
013 Program security assessment.en.srt 6.08Кб
013 Program security assessment.it.srt 6.67Кб
013 Program security assessment.mp4 12.15Мб
014 Unsafe applications.en.srt 11.58Кб
014 Unsafe applications.it.srt 12.61Кб
014 Unsafe applications.mp4 24.95Мб
015 13-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.06Мб
015 Program Security Assessment - notes for the examination.html 906б
016 Introduction to Current Cyber Threats.en.srt 6.08Кб
016 Introduction to Current Cyber Threats.it.srt 6.51Кб
016 Introduction to Current Cyber Threats.mp4 20.46Мб
017 IT Prehistory.en.srt 5.65Кб
017 IT Prehistory.it.srt 6.09Кб
017 IT Prehistory.mp4 25.80Мб
018 Lets look a few years back.en.srt 6.03Кб
018 Lets look a few years back.it.srt 6.54Кб
018 Lets look a few years back.mp4 23.63Мб
019 Cyber crimes - an evolution not revolution.en.srt 5.78Кб
019 Cyber crimes - an evolution not revolution.it.srt 6.03Кб
019 Cyber crimes - an evolution not revolution.mp4 21.26Мб
020 01-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.47Мб
021 Popular myths about IT security - origins.en.srt 6.40Кб
021 Popular myths about IT security - origins.it.srt 6.80Кб
021 Popular myths about IT security - origins.mp4 27.92Мб
022 Myths 1 - youll never be hacked.en.srt 6.85Кб
022 Myths 1 - youll never be hacked.it.srt 7.38Кб
022 Myths 1 - youll never be hacked.mp4 29.18Мб
023 Myths 2 - you dont need any protection software or hardware.en.srt 6.25Кб
023 Myths 2 - you dont need any protection software or hardware.it.srt 6.63Кб
023 Myths 2 - you dont need any protection software or hardware.mp4 25.77Мб
024 Myths 3 - IT security is always a priority.en.srt 1.30Кб
024 Myths 3 - IT security is always a priority.it.srt 1.42Кб
024 Myths 3 - IT security is always a priority.mp4 6.00Мб
025 01-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 988.50Кб
026 Trends in IT Security.en.srt 4.18Кб
026 Trends in IT Security.it.srt 4.54Кб
026 Trends in IT Security.mp4 18.70Мб
027 The birth of technology society.en.srt 3.44Кб
027 The birth of technology society.it.srt 3.75Кб
027 The birth of technology society.mp4 18.58Мб
028 EXERCISE How much info can you gather.en.srt 4.20Кб
028 EXERCISE How much info can you gather.it.srt 4.50Кб
028 EXERCISE How much info can you gather.mp4 13.78Мб
029 Fake identity.en.srt 5.60Кб
029 Fake identity.it.srt 5.94Кб
029 Fake identity.mp4 21.76Мб
030 Online privacy.en.srt 6.68Кб
030 Online privacy.it.srt 7.26Кб
030 Online privacy.mp4 32.04Мб
031 Analyzing sniffing software.en.srt 3.72Кб
031 Analyzing sniffing software.it.srt 4.10Кб
031 Analyzing sniffing software.mp4 19.50Мб
032 Cyber War.en.srt 8.80Кб
032 Cyber War.it.srt 9.52Кб
032 Cyber War.mp4 45.40Мб
033 01-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 2.04Мб
034 Objective 1 - Data security - Introduction.en.srt 7.29Кб
034 Objective 1 - Data security - Introduction.it.srt 8.01Кб
034 Objective 1 - Data security - Introduction.mp4 38.83Мб
035 Integrity of data.en.srt 7.04Кб
035 Integrity of data.it.srt 7.60Кб
035 Integrity of data.mp4 32.11Мб
036 01-3-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.99Мб
037 Confidentiality of data.en.srt 5.58Кб
037 Confidentiality of data.it.srt 5.99Кб
037 Confidentiality of data.mp4 31.65Мб
038 EXERCISE Finding confidential data with search engines.en.srt 5.97Кб
038 EXERCISE Finding confidential data with search engines.it.srt 6.27Кб
038 EXERCISE Finding confidential data with search engines.mp4 23.49Мб
039 Network security - introduction.en.srt 6.31Кб
039 Network security - introduction.it.srt 6.70Кб
039 Network security - introduction.mp4 22.04Мб
040 OSI MODEL 1 - Physical layer.en.srt 6.43Кб
040 OSI MODEL 1 - Physical layer.it.srt 6.85Кб
040 OSI MODEL 1 - Physical layer.mp4 28.95Мб
041 OSI MODEL 2 - Data link layer.en.srt 5.25Кб
041 OSI MODEL 2 - Data link layer.it.srt 5.68Кб
041 OSI MODEL 2 - Data link layer.mp4 22.75Мб
042 Threats MAC spoofing.en.srt 6.61Кб
042 Threats MAC spoofing.it.srt 7.12Кб
042 Threats MAC spoofing.mp4 27.46Мб
043 Threats ARP Poisoning.en.srt 7.60Кб
043 Threats ARP Poisoning.it.srt 8.05Кб
043 Threats ARP Poisoning.mp4 31.29Мб
044 EXERCISE Data Link Layer Attack.en.srt 8.02Кб
044 EXERCISE Data Link Layer Attack.it.srt 8.74Кб
044 EXERCISE Data Link Layer Attack.mp4 35.27Мб
045 OSI MODEL 3 - Network layer.en.srt 7.16Кб
045 OSI MODEL 3 - Network layer.it.srt 7.65Кб
045 OSI MODEL 3 - Network layer.mp4 31.70Мб
046 TCP Tunnelling over ICMP.en.srt 7.69Кб
046 TCP Tunnelling over ICMP.it.srt 8.29Кб
046 TCP Tunnelling over ICMP.mp4 34.99Мб
047 06-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 2.22Мб
048 OSI MODEL 4 - Transport Layer.en.srt 6.33Кб
048 OSI MODEL 4 - Transport Layer.it.srt 6.88Кб
048 OSI MODEL 4 - Transport Layer.mp4 28.63Мб
049 Threats Enumerating Remote Computers.en.srt 4.03Кб
049 Threats Enumerating Remote Computers.it.srt 4.40Кб
049 Threats Enumerating Remote Computers.mp4 16.81Мб
050 EXERCISE Transport Layer Attack using METASPLOIT part 1.en.srt 5.90Кб
050 EXERCISE Transport Layer Attack using METASPLOIT part 1.it.srt 6.24Кб
050 EXERCISE Transport Layer Attack using METASPLOIT part 1.mp4 12.84Мб
051 EXERCISE Transport Layer Attack using METASPLOIT part 2.en.srt 5.69Кб
051 EXERCISE Transport Layer Attack using METASPLOIT part 2.it.srt 6.09Кб
051 EXERCISE Transport Layer Attack using METASPLOIT part 2.mp4 26.08Мб
052 OSI MODEL 5 - Session Layer.en.srt 4.06Кб
052 OSI MODEL 5 - Session Layer.it.srt 4.36Кб
052 OSI MODEL 5 - Session Layer.mp4 16.38Мб
053 06-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.10Мб
054 OSI MODEL 6 - Presentation Layer.en.srt 6.80Кб
054 OSI MODEL 6 - Presentation Layer.it.srt 7.30Кб
054 OSI MODEL 6 - Presentation Layer.mp4 37.43Мб
055 OSI MODEL 7 - Application Layer.en.srt 4.16Кб
055 OSI MODEL 7 - Application Layer.it.srt 4.20Кб
055 OSI MODEL 7 - Application Layer.mp4 16.92Мб
056 EXERCISE Application Layer Attacks.en.srt 5.86Кб
056 EXERCISE Application Layer Attacks.it.srt 6.08Кб
056 EXERCISE Application Layer Attacks.mp4 18.99Мб
057 Backtrack Attack Demonstration.en.srt 3.74Кб
057 Backtrack Attack Demonstration.it.srt 3.89Кб
057 Backtrack Attack Demonstration.mp4 15.59Мб
058 Man-in-the-Middle and Denial of Service Attacks.en.srt 2.92Кб
058 Man-in-the-Middle and Denial of Service Attacks.it.srt 3.07Кб
058 Man-in-the-Middle and Denial of Service Attacks.mp4 14.20Мб
059 Modifying Transmitted Packets.en.srt 5.07Кб
059 Modifying Transmitted Packets.it.srt 5.35Кб
059 Modifying Transmitted Packets.mp4 26.76Мб
060 Unencrypted protocols.en.srt 3.25Кб
060 Unencrypted protocols.it.srt 3.43Кб
060 Unencrypted protocols.mp4 13.64Мб
061 06-3-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 2.16Мб
062 Designing Computer Networks - introduction.en.srt 2.48Кб
062 Designing Computer Networks - introduction.it.srt 2.63Кб
062 Designing Computer Networks - introduction.mp4 10.93Мб
063 Subnetting IPv4.en.srt 7.83Кб
063 Subnetting IPv4.it.srt 8.17Кб
063 Subnetting IPv4.mp4 29.12Мб
064 Subnetting IPv6.en.srt 3.51Кб
064 Subnetting IPv6.it.srt 3.66Кб
064 Subnetting IPv6.mp4 17.45Мб
065 07-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.41Мб
066 IPv6 address notation.en.srt 6.90Кб
066 IPv6 address notation.it.srt 7.35Кб
066 IPv6 address notation.mp4 27.31Мб
067 DMZ demilitarized Zone.en.srt 6.84Кб
067 DMZ demilitarized Zone.it.srt 7.17Кб
067 DMZ demilitarized Zone.mp4 30.28Мб
068 Protocols and services IP SEC.en.srt 10.57Кб
068 Protocols and services IP SEC.it.srt 11.42Кб
068 Protocols and services IP SEC.mp4 43.74Мб
069 IP SEC Phase 1.en.srt 8.22Кб
069 IP SEC Phase 1.it.srt 8.78Кб
069 IP SEC Phase 1.mp4 21.71Мб
070 Network Address translation.en.srt 13.51Кб
070 Network Address translation.it.srt 14.21Кб
070 Network Address translation.mp4 52.64Мб
071 Network access control RADIUS.en.srt 11.99Кб
071 Network access control RADIUS.it.srt 12.67Кб
071 Network access control RADIUS.mp4 48.43Мб
072 07-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.19Мб
073 Introduction to Monitoring Transmitted Data.en.srt 1.31Кб
073 Introduction to Monitoring Transmitted Data.it.srt 1.36Кб
073 Introduction to Monitoring Transmitted Data.mp4 6.18Мб
074 Monitoring Transmitted Data - Basic informations.en.srt 9.75Кб
074 Monitoring Transmitted Data - Basic informations.it.srt 10.53Кб
074 Monitoring Transmitted Data - Basic informations.mp4 41.07Мб
075 Intrusion detection systems.en.srt 8.98Кб
075 Intrusion detection systems.it.srt 9.68Кб
075 Intrusion detection systems.mp4 38.23Мб
076 Why are firewalls and NDIS not enough.en.srt 6.39Кб
076 Why are firewalls and NDIS not enough.it.srt 6.57Кб
076 Why are firewalls and NDIS not enough.mp4 28.19Мб
077 Wireshark - Introduction to network analysis.en.srt 7.78Кб
077 Wireshark - Introduction to network analysis.it.srt 8.38Кб
077 Wireshark - Introduction to network analysis.mp4 30.65Мб
078 How to use Wireshark.en.srt 10.17Кб
078 How to use Wireshark.it.srt 11.00Кб
078 How to use Wireshark.mp4 43.55Мб
079 Analyzing Captured data.en.srt 6.52Кб
079 Analyzing Captured data.it.srt 6.78Кб
079 Analyzing Captured data.mp4 31.01Мб
080 How to analyze telnet protocol.en.srt 8.87Кб
080 How to analyze telnet protocol.it.srt 9.46Кб
080 How to analyze telnet protocol.mp4 37.99Мб
081 Intrusion detection.en.srt 8.66Кб
081 Intrusion detection.it.srt 9.42Кб
081 Intrusion detection.mp4 46.35Мб
082 Scanning computers.en.srt 8.21Кб
082 Scanning computers.it.srt 8.86Кб
082 Scanning computers.mp4 35.27Мб
083 08-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.77Мб
084 Wireless Networks.en.srt 1.39Кб
084 Wireless Networks.it.srt 1.49Кб
084 Wireless Networks.mp4 6.96Мб
085 WIFI security solutions - introduction.en.srt 6.34Кб
085 WIFI security solutions - introduction.it.srt 6.79Кб
085 WIFI security solutions - introduction.mp4 29.17Мб
086 WIFI - working principles.en.srt 6.63Кб
086 WIFI - working principles.it.srt 7.23Кб
086 WIFI - working principles.mp4 29.36Мб
087 Other wireless technologies.en.srt 3.34Кб
087 Other wireless technologies.it.srt 3.60Кб
087 Other wireless technologies.mp4 13.16Мб
088 Threats and risks.en.srt 5.13Кб
088 Threats and risks.it.srt 5.58Кб
088 Threats and risks.mp4 18.49Мб
089 Ineffective solutions.en.srt 4.69Кб
089 Ineffective solutions.it.srt 5.07Кб
089 Ineffective solutions.mp4 18.98Мб
090 Authentication methods.en.srt 9.77Кб
090 Authentication methods.it.srt 10.41Кб
090 Authentication methods.mp4 37.13Мб
091 802.11 WEP.en.srt 7.73Кб
091 802.11 WEP.it.srt 8.24Кб
091 802.11 WEP.mp4 31.39Мб
092 802.11I WPA.en.srt 6.57Кб
092 802.11I WPA.it.srt 7.06Кб
092 802.11I WPA.mp4 31.59Мб
093 09-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.46Мб
094 Threats of WIFI networks.en.srt 6.70Кб
094 Threats of WIFI networks.it.srt 7.39Кб
094 Threats of WIFI networks.mp4 30.54Мб
095 Client Attacks Launching a rogue access point.en.srt 7.55Кб
095 Client Attacks Launching a rogue access point.it.srt 8.21Кб
095 Client Attacks Launching a rogue access point.mp4 33.57Мб
096 Client Attacks Evil twin.en.srt 5.27Кб
096 Client Attacks Evil twin.it.srt 5.75Кб
096 Client Attacks Evil twin.mp4 22.76Мб
097 Client Attacks Denial of service.en.srt 10.32Кб
097 Client Attacks Denial of service.it.srt 11.17Кб
097 Client Attacks Denial of service.mp4 36.52Мб
098 EXERCISE WPA attack.en.srt 3.88Кб
098 EXERCISE WPA attack.it.srt 4.09Кб
098 EXERCISE WPA attack.mp4 8.86Мб
099 09-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.70Мб
100 Operating systems security - introduction.en.srt 10.30Кб
100 Operating systems security - introduction.it.srt 11.02Кб
100 Operating systems security - introduction.mp4 48.07Мб
101 Security boundaries.en.srt 5.32Кб
101 Security boundaries.it.srt 5.74Кб
101 Security boundaries.mp4 21.20Мб
102 Three core.en.srt 8.22Кб
102 Three core.it.srt 8.85Кб
102 Three core.mp4 29.75Мб
103 EXERCISE OS boundaries.en.srt 7.76Кб
103 EXERCISE OS boundaries.it.srt 8.46Кб
103 EXERCISE OS boundaries.mp4 39.10Мб
104 Process isolation.en.srt 7.16Кб
104 Process isolation.it.srt 7.74Кб
104 Process isolation.mp4 26.85Мб
105 Kernel Mode Code Signing.en.srt 6.94Кб
105 Kernel Mode Code Signing.it.srt 7.75Кб
105 Kernel Mode Code Signing.mp4 25.68Мб
106 Java Virtual Machine and code access security.en.srt 4.86Кб
106 Java Virtual Machine and code access security.it.srt 5.32Кб
106 Java Virtual Machine and code access security.mp4 18.64Мб
107 10-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 4.25Мб
108 Malware.en.srt 14.09Кб
108 Malware.it.srt 15.14Кб
108 Malware.mp4 44.86Мб
109 EXERCISE Vulnerability attacks.en.srt 10.48Кб
109 EXERCISE Vulnerability attacks.it.srt 11.31Кб
109 EXERCISE Vulnerability attacks.mp4 47.61Мб
110 EXERCISE Identifying suspicious processes.en.srt 7.70Кб
110 EXERCISE Identifying suspicious processes.it.srt 8.25Кб
110 EXERCISE Identifying suspicious processes.mp4 29.97Мб
111 Demonstration Process Explorer.en.srt 9.91Кб
111 Demonstration Process Explorer.it.srt 10.73Кб
111 Demonstration Process Explorer.mp4 38.13Мб
112 EXERCISE Removing malware.en.srt 9.47Кб
112 EXERCISE Removing malware.it.srt 10.34Кб
112 EXERCISE Removing malware.mp4 45.85Мб
113 Rootkits.en.srt 6.71Кб
113 Rootkits.it.srt 7.33Кб
113 Rootkits.mp4 28.94Мб
114 EXERCISE Detecting rootkits.en.srt 12.13Кб
114 EXERCISE Detecting rootkits.it.srt 13.15Кб
114 EXERCISE Detecting rootkits.mp4 58.29Мб
115 EXERCISE Security evaluation.en.srt 6.54Кб
115 EXERCISE Security evaluation.it.srt 7.12Кб
115 EXERCISE Security evaluation.mp4 17.82Мб
116 10-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 2.49Мб
117 Authentication and authorisation - Introduction.en.srt 2.00Кб
117 Authentication and authorisation - Introduction.it.srt 2.16Кб
117 Authentication and authorisation - Introduction.mp4 9.63Мб
118 Authentication users.en.srt 7.86Кб
118 Authentication users.it.srt 8.48Кб
118 Authentication users.mp4 31.37Мб
119 How secure is your password.en.srt 5.70Кб
119 How secure is your password.it.srt 6.05Кб
119 How secure is your password.mp4 15.97Мб
120 Authentication protocols and services.en.srt 8.70Кб
120 Authentication protocols and services.it.srt 9.35Кб
120 Authentication protocols and services.mp4 31.82Мб
121 11-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 2.86Мб
122 LM Hash.en.srt 7.51Кб
122 LM Hash.it.srt 8.02Кб
122 LM Hash.mp4 30.70Мб
123 Cached Credentials.en.srt 5.03Кб
123 Cached Credentials.it.srt 5.36Кб
123 Cached Credentials.mp4 18.08Мб
124 KERBEROS.en.srt 12.17Кб
124 KERBEROS.it.srt 13.32Кб
124 KERBEROS.mp4 52.56Мб
125 Identity Theft.en.srt 10.49Кб
125 Identity Theft.it.srt 11.35Кб
125 Identity Theft.mp4 42.95Мб
126 EXERCISE Offline attacks.en.srt 12.91Кб
126 EXERCISE Offline attacks.it.srt 13.81Кб
126 EXERCISE Offline attacks.mp4 45.63Мб
127 Using online cracking services.en.srt 9.53Кб
127 Using online cracking services.it.srt 10.28Кб
127 Using online cracking services.mp4 37.65Мб
128 11-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 2.12Мб
129 Windows Security - what youll learn.en.srt 1.38Кб
129 Windows Security - what youll learn.it.srt 1.45Кб
129 Windows Security - what youll learn.mp4 7.59Мб
130 User Account Control.en.srt 6.77Кб
130 User Account Control.it.srt 7.27Кб
130 User Account Control.mp4 32.01Мб
131 UAC configuration.en.srt 8.94Кб
131 UAC configuration.it.srt 9.67Кб
131 UAC configuration.mp4 35.10Мб
132 Additional Security Features - ASLR and DEP.en.srt 12.89Кб
132 Additional Security Features - ASLR and DEP.it.srt 13.86Кб
132 Additional Security Features - ASLR and DEP.mp4 40.91Мб
133 PatchGuard.en.srt 1.57Кб
133 PatchGuard.it.srt 1.71Кб
133 PatchGuard.mp4 7.86Мб
134 12-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.44Мб
135 Encryption - key protection.en.srt 16.07Кб
135 Encryption - key protection.it.srt 17.44Кб
135 Encryption - key protection.mp4 46.34Мб
136 Drive encryption.en.srt 9.31Кб
136 Drive encryption.it.srt 9.87Кб
136 Drive encryption.mp4 37.33Мб
137 BitLocker.en.srt 8.94Кб
137 BitLocker.it.srt 9.49Кб
137 BitLocker.mp4 36.43Мб
138 BitLocker To Go Reader.en.srt 5.04Кб
138 BitLocker To Go Reader.it.srt 5.43Кб
138 BitLocker To Go Reader.mp4 18.44Мб
139 File and folder encryption - EFS.en.srt 8.13Кб
139 File and folder encryption - EFS.it.srt 8.74Кб
139 File and folder encryption - EFS.mp4 34.52Мб
140 EXERCISE EFS.en.srt 6.07Кб
140 EXERCISE EFS.it.srt 6.51Кб
140 EXERCISE EFS.mp4 15.35Мб
141 12-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.60Мб
142 Security policies introduction.en.srt 2.13Кб
142 Security policies introduction.it.srt 2.33Кб
142 Security policies introduction.mp4 5.87Мб
143 What is security.en.srt 3.89Кб
143 What is security.it.srt 4.15Кб
143 What is security.mp4 10.89Мб
144 Information security.en.srt 4.12Кб
144 Information security.it.srt 4.46Кб
144 Information security.mp4 10.26Мб
145 Information security - level up.en.srt 4.26Кб
145 Information security - level up.it.srt 4.61Кб
145 Information security - level up.mp4 9.87Мб
146 Security issues.en.srt 5.02Кб
146 Security issues.it.srt 5.48Кб
146 Security issues.mp4 12.84Мб
147 Why are security solutions fallible.en.srt 5.96Кб
147 Why are security solutions fallible.it.srt 6.44Кб
147 Why are security solutions fallible.mp4 15.48Мб
148 Security policy issues.en.srt 5.07Кб
148 Security policy issues.it.srt 5.48Кб
148 Security policy issues.mp4 12.60Мб
149 Introduction to threat modelling and classification.en.srt 5.66Кб
149 Introduction to threat modelling and classification.it.srt 6.17Кб
149 Introduction to threat modelling and classification.mp4 13.30Мб
150 Threat modelling - STRIDE.en.srt 4.14Кб
150 Threat modelling - STRIDE.it.srt 4.38Кб
150 Threat modelling - STRIDE.mp4 10.58Мб
151 STRIDE Spoofing identity.en.srt 5.53Кб
151 STRIDE Spoofing identity.it.srt 5.95Кб
151 STRIDE Spoofing identity.mp4 13.84Мб
152 STRIDE Tampering with Data.en.srt 4.98Кб
152 STRIDE Tampering with Data.it.srt 5.40Кб
152 STRIDE Tampering with Data.mp4 12.84Мб
153 STRIDE Denial of Service.en.srt 4.24Кб
153 STRIDE Denial of Service.it.srt 4.67Кб
153 STRIDE Denial of Service.mp4 10.39Мб
154 Introduction to Risk Management.en.srt 1.63Кб
154 Introduction to Risk Management.it.srt 1.71Кб
154 Introduction to Risk Management.mp4 3.87Мб
155 Attack methods.en.srt 7.53Кб
155 Attack methods.it.srt 8.12Кб
155 Attack methods.mp4 17.28Мб
156 Local attacks.en.srt 3.30Кб
156 Local attacks.it.srt 3.70Кб
156 Local attacks.mp4 7.88Мб
157 Target scanning and enumeration techniques 1.en.srt 6.26Кб
157 Target scanning and enumeration techniques 1.it.srt 6.64Кб
157 Target scanning and enumeration techniques 1.mp4 15.84Мб
158 Target scanning and enumeration techniques 2.en.srt 3.68Кб
158 Target scanning and enumeration techniques 2.it.srt 3.93Кб
158 Target scanning and enumeration techniques 2.mp4 8.40Мб
159 Passive scanning.en.srt 2.08Кб
159 Passive scanning.it.srt 2.24Кб
159 Passive scanning.mp4 7.13Мб
160 03-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.61Мб
160 Attack Methodologies - notes for the examination.html 899б
161 Introduction to risk assessment.en.srt 7.05Кб
161 Introduction to risk assessment.it.srt 7.58Кб
161 Introduction to risk assessment.mp4 18.15Мб
162 DREAD Risk assessment model.en.srt 5.16Кб
162 DREAD Risk assessment model.it.srt 5.49Кб
162 DREAD Risk assessment model.mp4 12.64Мб
163 DREAD Exploitability.en.srt 5.93Кб
163 DREAD Exploitability.it.srt 6.33Кб
163 DREAD Exploitability.mp4 13.90Мб
164 EXERCISE Risk Assessment.en.srt 8.11Кб
164 EXERCISE Risk Assessment.it.srt 8.63Кб
164 EXERCISE Risk Assessment.mp4 18.11Мб
165 03-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.81Мб
165 Risk Assessment - notes for the examination.html 894б
166 Introduction to Social Engineering and rogue software.en.srt 4.69Кб
166 Introduction to Social Engineering and rogue software.it.srt 5.01Кб
166 Introduction to Social Engineering and rogue software.mp4 11.41Мб
167 Manipulation tactics.en.srt 10.42Кб
167 Manipulation tactics.it.srt 10.85Кб
167 Manipulation tactics.mp4 22.17Мб
168 EXERCISE Social Engineering attacks.en.srt 6.83Кб
168 EXERCISE Social Engineering attacks.it.srt 7.27Кб
168 EXERCISE Social Engineering attacks.mp4 19.02Мб
169 SE with KALI BackTrack.en.srt 7.34Кб
169 SE with KALI BackTrack.it.srt 7.73Кб
169 SE with KALI BackTrack.mp4 16.16Мб
170 Rogue Software.en.srt 2.70Кб
170 Rogue Software.it.srt 2.84Кб
170 Rogue Software.mp4 7.37Мб
171 Fraud tools 1.en.srt 7.32Кб
171 Fraud tools 1.it.srt 7.94Кб
171 Fraud tools 1.mp4 20.02Мб
172 Fraud tools 2.en.srt 7.15Кб
172 Fraud tools 2.it.srt 7.68Кб
172 Fraud tools 2.mp4 17.72Мб
173 03-3-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 2.90Мб
173 Social Engineering and Rogue Software - notes for the examination.html 916б
174 Introduction to Defence in Depth.en.srt 1.63Кб
174 Introduction to Defence in Depth.it.srt 1.79Кб
174 Introduction to Defence in Depth.mp4 4.54Мб
175 How to use Defence in Depth model.en.srt 6.11Кб
175 How to use Defence in Depth model.it.srt 6.58Кб
175 How to use Defence in Depth model.mp4 14.67Мб
176 DiD OS and LAN Layers.en.srt 7.08Кб
176 DiD OS and LAN Layers.it.srt 7.53Кб
176 DiD OS and LAN Layers.mp4 16.13Мб
177 DiD Perimeter and Physical Access Layers.en.srt 6.19Кб
177 DiD Perimeter and Physical Access Layers.it.srt 6.59Кб
177 DiD Perimeter and Physical Access Layers.mp4 12.92Мб
178 DiD Demonstration.en.srt 2.84Кб
178 DiD Demonstration.it.srt 3.08Кб
178 DiD Demonstration.mp4 6.98Мб
179 Automated attack targeting a service.en.srt 5.26Кб
179 Automated attack targeting a service.it.srt 5.63Кб
179 Automated attack targeting a service.mp4 15.14Мб
180 Automated user-targeting attack.en.srt 4.99Кб
180 Automated user-targeting attack.it.srt 5.31Кб
180 Automated user-targeting attack.mp4 13.43Мб
181 04-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.64Мб
181 The Defence in Depth Model - notes for the examination.html 905б
182 Introduction to Immutable laws of security - Law 1.en.srt 5.13Кб
182 Introduction to Immutable laws of security - Law 1.it.srt 5.38Кб
182 Introduction to Immutable laws of security - Law 1.mp4 13.99Мб
183 Law 2.en.srt 3.18Кб
183 Law 2.it.srt 3.51Кб
183 Law 2.mp4 7.58Мб
184 Law 3.en.srt 2.48Кб
184 Law 3.it.srt 2.62Кб
184 Law 3.mp4 5.86Мб
185 Law 4.en.srt 1.99Кб
185 Law 4.it.srt 2.15Кб
185 Law 4.mp4 5.96Мб
186 Law 5.en.srt 3.52Кб
186 Law 5.it.srt 3.80Кб
186 Law 5.mp4 8.81Мб
187 Law 6.en.srt 2.40Кб
187 Law 6.it.srt 2.66Кб
187 Law 6.mp4 5.82Мб
188 Law 7.en.srt 1.36Кб
188 Law 7.it.srt 1.49Кб
188 Law 7.mp4 2.90Мб
189 Law 8.en.srt 1.71Кб
189 Law 8.it.srt 1.80Кб
189 Law 8.mp4 4.59Мб
190 Law 9.en.srt 4.60Кб
190 Law 9.it.srt 4.79Кб
190 Law 9.mp4 9.23Мб
191 Law 10.en.srt 791б
191 Law 10.it.srt 865б
191 Law 10.mp4 1.96Мб
192 Laws for administrators.en.srt 6.71Кб
192 Laws for administrators.it.srt 7.18Кб
192 Laws for administrators.mp4 13.86Мб
193 04-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.62Мб
193 Immutable Laws of Security - notes for the examination.html 905б
194 Introduction to Disaster Recovery.en.srt 1.67Кб
194 Introduction to Disaster Recovery.it.srt 1.81Кб
194 Introduction to Disaster Recovery.mp4 4.36Мб
195 How to reduce losses.en.srt 5.95Кб
195 How to reduce losses.it.srt 6.39Кб
195 How to reduce losses.mp4 14.85Мб
196 Ensuring continous availability.en.srt 4.36Кб
196 Ensuring continous availability.it.srt 4.67Кб
196 Ensuring continous availability.mp4 10.78Мб
197 Threat discovery 1.en.srt 4.54Кб
197 Threat discovery 1.it.srt 5.20Кб
197 Threat discovery 1.mp4 12.28Мб
198 Threat discovery 2.en.srt 3.93Кб
198 Threat discovery 2.it.srt 4.31Кб
198 Threat discovery 2.mp4 8.84Мб
199 Audit users and keep control accounts.en.srt 5.17Кб
199 Audit users and keep control accounts.it.srt 5.69Кб
199 Audit users and keep control accounts.mp4 13.30Мб
200 High risk users.en.srt 3.64Кб
200 High risk users.it.srt 4.04Кб
200 High risk users.mp4 7.92Мб
201 Collecting and analysing evidence.en.srt 6.91Кб
201 Collecting and analysing evidence.it.srt 7.41Кб
201 Collecting and analysing evidence.mp4 18.29Мб
202 Forensics example.en.srt 4.05Кб
202 Forensics example.it.srt 4.32Кб
202 Forensics example.mp4 10.61Мб
203 CONFICKER CASE STUDY.en.srt 7.80Кб
203 CONFICKER CASE STUDY.it.srt 8.51Кб
203 CONFICKER CASE STUDY.mp4 20.02Мб
204 05-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 2.44Мб
204 How to reduce losses - notes for the examination.html 899б
205 Heres what youll learn in this module.en.srt 1.15Кб
205 Heres what youll learn in this module.it.srt 1.29Кб
205 Heres what youll learn in this module.mp4 3.10Мб
206 Managing applications.en.srt 10.22Кб
206 Managing applications.it.srt 11.17Кб
206 Managing applications.mp4 17.21Мб
207 Software updates.en.srt 3.16Кб
207 Software updates.it.srt 3.34Кб
207 Software updates.mp4 6.22Мб
208 MS Update.en.srt 7.51Кб
208 MS Update.it.srt 8.14Кб
208 MS Update.mp4 16.24Мб
209 System Center Configuration Manager.en.srt 3.17Кб
209 System Center Configuration Manager.it.srt 3.34Кб
209 System Center Configuration Manager.mp4 6.27Мб
210 Blocking applications.en.srt 8.70Кб
210 Blocking applications.it.srt 9.54Кб
210 Blocking applications.mp4 17.98Мб
211 Software restrictions policies.en.srt 6.76Кб
211 Software restrictions policies.it.srt 7.56Кб
211 Software restrictions policies.mp4 14.49Мб
212 EXERCISE Application control rules.en.srt 13.40Кб
212 EXERCISE Application control rules.it.srt 14.88Кб
212 EXERCISE Application control rules.mp4 27.19Мб
213 Isolating applications.en.srt 7.16Кб
213 Isolating applications.it.srt 7.85Кб
213 Isolating applications.mp4 16.88Мб
214 14-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.61Мб
214 How to protect users without interrupting their work - notes for the examination.html 931б
215 Introduction to cryptography.en.srt 11.32Кб
215 Introduction to cryptography.it.srt 12.42Кб
215 Introduction to cryptography.mp4 23.58Мб
216 History of ciphers.en.srt 12.21Кб
216 History of ciphers.it.srt 13.13Кб
216 History of ciphers.mp4 25.50Мб
217 Symmetric and asymmetric ciphers.en.srt 6.74Кб
217 Symmetric and asymmetric ciphers.it.srt 7.08Кб
217 Symmetric and asymmetric ciphers.mp4 15.06Мб
218 Symmetric-key algorithms.en.srt 6.06Кб
218 Symmetric-key algorithms.it.srt 6.66Кб
218 Symmetric-key algorithms.mp4 13.51Мб
219 Block ciphers.en.srt 6.43Кб
219 Block ciphers.it.srt 6.92Кб
219 Block ciphers.mp4 15.35Мб
220 Data encryption standard.en.srt 7.16Кб
220 Data encryption standard.it.srt 7.70Кб
220 Data encryption standard.mp4 16.54Мб
221 DES-X.en.srt 7.65Кб
221 DES-X.it.srt 8.33Кб
221 DES-X.mp4 18.22Мб
222 Advanced encryption standards.en.srt 5.47Кб
222 Advanced encryption standards.it.srt 5.79Кб
222 Advanced encryption standards.mp4 12.83Мб
223 Block cipher modes.en.srt 7.72Кб
223 Block cipher modes.it.srt 8.35Кб
223 Block cipher modes.mp4 17.49Мб
224 Stream Ciphers - RC4.en.srt 3.88Кб
224 Stream Ciphers - RC4.it.srt 4.14Кб
224 Stream Ciphers - RC4.mp4 8.59Мб
225 Asymmetric-key algorithms.en.srt 8.51Кб
225 Asymmetric-key algorithms.it.srt 9.17Кб
225 Asymmetric-key algorithms.mp4 19.08Мб
226 RSA.en.srt 5.68Кб
226 RSA.it.srt 6.03Кб
226 RSA.mp4 12.83Мб
227 ELGAMAL.en.srt 2.16Кб
227 ELGAMAL.it.srt 2.33Кб
227 ELGAMAL.mp4 4.90Мб
228 HASH functions.en.srt 6.04Кб
228 HASH functions.it.srt 6.31Кб
228 HASH functions.mp4 14.43Мб
229 Digital signature.en.srt 6.67Кб
229 Digital signature.it.srt 7.21Кб
229 Digital signature.mp4 15.45Мб
230 Hybrid Schemes.en.srt 7.00Кб
230 Hybrid Schemes.it.srt 7.55Кб
230 Hybrid Schemes.mp4 16.06Мб
231 15-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 2.51Мб
231 Symmetric and Asymmetric Ciphers - notes for the examination.html 911б
232 Introduction to cryptology.en.srt 2.66Кб
232 Introduction to cryptology.it.srt 2.83Кб
232 Introduction to cryptology.mp4 5.98Мб
233 Public key infrastructure.en.srt 7.28Кб
233 Public key infrastructure.it.srt 7.72Кб
233 Public key infrastructure.mp4 14.80Мб
234 Implementing public key infrastructure.en.srt 6.41Кб
234 Implementing public key infrastructure.it.srt 6.97Кб
234 Implementing public key infrastructure.mp4 12.74Мб
235 What will PKI allow you.en.srt 7.50Кб
235 What will PKI allow you.it.srt 8.12Кб
235 What will PKI allow you.mp4 14.46Мб
236 EXERCISE Certificates.en.srt 10.12Кб
236 EXERCISE Certificates.it.srt 10.70Кб
236 EXERCISE Certificates.mp4 20.63Мб
237 Planning the PKI.en.srt 10.28Кб
237 Planning the PKI.it.srt 10.80Кб
237 Planning the PKI.mp4 22.55Мб
238 Certificate life cycle.en.srt 7.18Кб
238 Certificate life cycle.it.srt 7.65Кб
238 Certificate life cycle.mp4 16.19Мб
239 PKI Administration.en.srt 8.47Кб
239 PKI Administration.it.srt 9.06Кб
239 PKI Administration.mp4 19.69Мб
240 02-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.42Мб
240 Threat Modelling and Classification - notes for the examination.html 914б
241 16-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 2.18Мб
241 Public Key Infrastructure - Trust but verify - notes for the examination.html 923б
242 Certificate-Itsec.pdf 482.37Кб
243 Wiriting a Shellcode.en.srt 16.44Кб
243 Wiriting a Shellcode.it.srt 17.65Кб
243 Wiriting a Shellcode.mp4 179.90Мб
244 Secacademy-Voucher.pdf 93.40Кб
245 BONUS LECTURE Learn more and get to know our other courses.html 5.30Кб
246 Thank you.html 1.20Кб
external-assets-links.txt 137б
Read Me.txt 1.02Кб
Статистика распространения по странам
Всего 0
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент