Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
[FreeAllCourse.Com].url |
52б |
001 Welcome to the course.html |
1.17Кб |
002 Foreword FAQ.html |
3.42Кб |
003 Course preview 15 min. long demo lecture. The whole training is 27 hours long.en.srt |
25.12Кб |
003 Course preview 15 min. long demo lecture. The whole training is 27 hours long.it.srt |
27.08Кб |
003 Course preview 15 min. long demo lecture. The whole training is 27 hours long.mp4 |
213.49Мб |
004 Why is this section here.html |
1.22Кб |
005 Introduction to Application Security.en.srt |
8.99Кб |
005 Introduction to Application Security.it.srt |
9.84Кб |
005 Introduction to Application Security.mp4 |
21.26Мб |
006 Attacks on applications.en.srt |
11.68Кб |
006 Attacks on applications.it.srt |
12.78Кб |
006 Attacks on applications.mp4 |
25.50Мб |
007 SQL Injection.en.srt |
9.22Кб |
007 SQL Injection.it.srt |
9.96Кб |
007 SQL Injection.mp4 |
17.96Мб |
008 EXERCISE Analyze the application.en.srt |
15.69Кб |
008 EXERCISE Analyze the application.it.srt |
16.73Кб |
008 EXERCISE Analyze the application.mp4 |
28.74Мб |
009 Blind SQL Injection.en.srt |
11.07Кб |
009 Blind SQL Injection.it.srt |
12.14Кб |
009 Blind SQL Injection.mp4 |
22.47Мб |
010 Automated SQL Injection.en.srt |
13.71Кб |
010 Automated SQL Injection.it.srt |
14.90Кб |
010 Automated SQL Injection.mp4 |
29.48Мб |
011 Cross-site scripting - XSS.en.srt |
11.15Кб |
011 Cross-site scripting - XSS.it.srt |
12.19Кб |
011 Cross-site scripting - XSS.mp4 |
29.10Мб |
012 13-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf |
1.65Мб |
012 Application Attacks - notes for the examination.html |
898б |
013 Program security assessment.en.srt |
6.08Кб |
013 Program security assessment.it.srt |
6.67Кб |
013 Program security assessment.mp4 |
12.15Мб |
014 Unsafe applications.en.srt |
11.58Кб |
014 Unsafe applications.it.srt |
12.61Кб |
014 Unsafe applications.mp4 |
24.95Мб |
015 13-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf |
1.06Мб |
015 Program Security Assessment - notes for the examination.html |
906б |
016 Introduction to Current Cyber Threats.en.srt |
6.08Кб |
016 Introduction to Current Cyber Threats.it.srt |
6.51Кб |
016 Introduction to Current Cyber Threats.mp4 |
20.46Мб |
017 IT Prehistory.en.srt |
5.65Кб |
017 IT Prehistory.it.srt |
6.09Кб |
017 IT Prehistory.mp4 |
25.80Мб |
018 Lets look a few years back.en.srt |
6.03Кб |
018 Lets look a few years back.it.srt |
6.54Кб |
018 Lets look a few years back.mp4 |
23.63Мб |
019 Cyber crimes - an evolution not revolution.en.srt |
5.78Кб |
019 Cyber crimes - an evolution not revolution.it.srt |
6.03Кб |
019 Cyber crimes - an evolution not revolution.mp4 |
21.26Мб |
020 01-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf |
1.47Мб |
021 Popular myths about IT security - origins.en.srt |
6.40Кб |
021 Popular myths about IT security - origins.it.srt |
6.80Кб |
021 Popular myths about IT security - origins.mp4 |
27.92Мб |
022 Myths 1 - youll never be hacked.en.srt |
6.85Кб |
022 Myths 1 - youll never be hacked.it.srt |
7.38Кб |
022 Myths 1 - youll never be hacked.mp4 |
29.18Мб |
023 Myths 2 - you dont need any protection software or hardware.en.srt |
6.25Кб |
023 Myths 2 - you dont need any protection software or hardware.it.srt |
6.63Кб |
023 Myths 2 - you dont need any protection software or hardware.mp4 |
25.77Мб |
024 Myths 3 - IT security is always a priority.en.srt |
1.30Кб |
024 Myths 3 - IT security is always a priority.it.srt |
1.42Кб |
024 Myths 3 - IT security is always a priority.mp4 |
6.00Мб |
025 01-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf |
988.50Кб |
026 Trends in IT Security.en.srt |
4.18Кб |
026 Trends in IT Security.it.srt |
4.54Кб |
026 Trends in IT Security.mp4 |
18.70Мб |
027 The birth of technology society.en.srt |
3.44Кб |
027 The birth of technology society.it.srt |
3.75Кб |
027 The birth of technology society.mp4 |
18.58Мб |
028 EXERCISE How much info can you gather.en.srt |
4.20Кб |
028 EXERCISE How much info can you gather.it.srt |
4.50Кб |
028 EXERCISE How much info can you gather.mp4 |
13.78Мб |
029 Fake identity.en.srt |
5.60Кб |
029 Fake identity.it.srt |
5.94Кб |
029 Fake identity.mp4 |
21.76Мб |
030 Online privacy.en.srt |
6.68Кб |
030 Online privacy.it.srt |
7.26Кб |
030 Online privacy.mp4 |
32.04Мб |
031 Analyzing sniffing software.en.srt |
3.72Кб |
031 Analyzing sniffing software.it.srt |
4.10Кб |
031 Analyzing sniffing software.mp4 |
19.50Мб |
032 Cyber War.en.srt |
8.80Кб |
032 Cyber War.it.srt |
9.52Кб |
032 Cyber War.mp4 |
45.40Мб |
033 01-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf |
2.04Мб |
034 Objective 1 - Data security - Introduction.en.srt |
7.29Кб |
034 Objective 1 - Data security - Introduction.it.srt |
8.01Кб |
034 Objective 1 - Data security - Introduction.mp4 |
38.83Мб |
035 Integrity of data.en.srt |
7.04Кб |
035 Integrity of data.it.srt |
7.60Кб |
035 Integrity of data.mp4 |
32.11Мб |
036 01-3-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf |
1.99Мб |
037 Confidentiality of data.en.srt |
5.58Кб |
037 Confidentiality of data.it.srt |
5.99Кб |
037 Confidentiality of data.mp4 |
31.65Мб |
038 EXERCISE Finding confidential data with search engines.en.srt |
5.97Кб |
038 EXERCISE Finding confidential data with search engines.it.srt |
6.27Кб |
038 EXERCISE Finding confidential data with search engines.mp4 |
23.49Мб |
039 Network security - introduction.en.srt |
6.31Кб |
039 Network security - introduction.it.srt |
6.70Кб |
039 Network security - introduction.mp4 |
22.04Мб |
040 OSI MODEL 1 - Physical layer.en.srt |
6.43Кб |
040 OSI MODEL 1 - Physical layer.it.srt |
6.85Кб |
040 OSI MODEL 1 - Physical layer.mp4 |
28.95Мб |
041 OSI MODEL 2 - Data link layer.en.srt |
5.25Кб |
041 OSI MODEL 2 - Data link layer.it.srt |
5.68Кб |
041 OSI MODEL 2 - Data link layer.mp4 |
22.75Мб |
042 Threats MAC spoofing.en.srt |
6.61Кб |
042 Threats MAC spoofing.it.srt |
7.12Кб |
042 Threats MAC spoofing.mp4 |
27.46Мб |
043 Threats ARP Poisoning.en.srt |
7.60Кб |
043 Threats ARP Poisoning.it.srt |
8.05Кб |
043 Threats ARP Poisoning.mp4 |
31.29Мб |
044 EXERCISE Data Link Layer Attack.en.srt |
8.02Кб |
044 EXERCISE Data Link Layer Attack.it.srt |
8.74Кб |
044 EXERCISE Data Link Layer Attack.mp4 |
35.27Мб |
045 OSI MODEL 3 - Network layer.en.srt |
7.16Кб |
045 OSI MODEL 3 - Network layer.it.srt |
7.65Кб |
045 OSI MODEL 3 - Network layer.mp4 |
31.70Мб |
046 TCP Tunnelling over ICMP.en.srt |
7.69Кб |
046 TCP Tunnelling over ICMP.it.srt |
8.29Кб |
046 TCP Tunnelling over ICMP.mp4 |
34.99Мб |
047 06-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf |
2.22Мб |
048 OSI MODEL 4 - Transport Layer.en.srt |
6.33Кб |
048 OSI MODEL 4 - Transport Layer.it.srt |
6.88Кб |
048 OSI MODEL 4 - Transport Layer.mp4 |
28.63Мб |
049 Threats Enumerating Remote Computers.en.srt |
4.03Кб |
049 Threats Enumerating Remote Computers.it.srt |
4.40Кб |
049 Threats Enumerating Remote Computers.mp4 |
16.81Мб |
050 EXERCISE Transport Layer Attack using METASPLOIT part 1.en.srt |
5.90Кб |
050 EXERCISE Transport Layer Attack using METASPLOIT part 1.it.srt |
6.24Кб |
050 EXERCISE Transport Layer Attack using METASPLOIT part 1.mp4 |
12.84Мб |
051 EXERCISE Transport Layer Attack using METASPLOIT part 2.en.srt |
5.69Кб |
051 EXERCISE Transport Layer Attack using METASPLOIT part 2.it.srt |
6.09Кб |
051 EXERCISE Transport Layer Attack using METASPLOIT part 2.mp4 |
26.08Мб |
052 OSI MODEL 5 - Session Layer.en.srt |
4.06Кб |
052 OSI MODEL 5 - Session Layer.it.srt |
4.36Кб |
052 OSI MODEL 5 - Session Layer.mp4 |
16.38Мб |
053 06-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf |
1.10Мб |
054 OSI MODEL 6 - Presentation Layer.en.srt |
6.80Кб |
054 OSI MODEL 6 - Presentation Layer.it.srt |
7.30Кб |
054 OSI MODEL 6 - Presentation Layer.mp4 |
37.43Мб |
055 OSI MODEL 7 - Application Layer.en.srt |
4.16Кб |
055 OSI MODEL 7 - Application Layer.it.srt |
4.20Кб |
055 OSI MODEL 7 - Application Layer.mp4 |
16.92Мб |
056 EXERCISE Application Layer Attacks.en.srt |
5.86Кб |
056 EXERCISE Application Layer Attacks.it.srt |
6.08Кб |
056 EXERCISE Application Layer Attacks.mp4 |
18.99Мб |
057 Backtrack Attack Demonstration.en.srt |
3.74Кб |
057 Backtrack Attack Demonstration.it.srt |
3.89Кб |
057 Backtrack Attack Demonstration.mp4 |
15.59Мб |
058 Man-in-the-Middle and Denial of Service Attacks.en.srt |
2.92Кб |
058 Man-in-the-Middle and Denial of Service Attacks.it.srt |
3.07Кб |
058 Man-in-the-Middle and Denial of Service Attacks.mp4 |
14.20Мб |
059 Modifying Transmitted Packets.en.srt |
5.07Кб |
059 Modifying Transmitted Packets.it.srt |
5.35Кб |
059 Modifying Transmitted Packets.mp4 |
26.76Мб |
060 Unencrypted protocols.en.srt |
3.25Кб |
060 Unencrypted protocols.it.srt |
3.43Кб |
060 Unencrypted protocols.mp4 |
13.64Мб |
061 06-3-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf |
2.16Мб |
062 Designing Computer Networks - introduction.en.srt |
2.48Кб |
062 Designing Computer Networks - introduction.it.srt |
2.63Кб |
062 Designing Computer Networks - introduction.mp4 |
10.93Мб |
063 Subnetting IPv4.en.srt |
7.83Кб |
063 Subnetting IPv4.it.srt |
8.17Кб |
063 Subnetting IPv4.mp4 |
29.12Мб |
064 Subnetting IPv6.en.srt |
3.51Кб |
064 Subnetting IPv6.it.srt |
3.66Кб |
064 Subnetting IPv6.mp4 |
17.45Мб |
065 07-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf |
1.41Мб |
066 IPv6 address notation.en.srt |
6.90Кб |
066 IPv6 address notation.it.srt |
7.35Кб |
066 IPv6 address notation.mp4 |
27.31Мб |
067 DMZ demilitarized Zone.en.srt |
6.84Кб |
067 DMZ demilitarized Zone.it.srt |
7.17Кб |
067 DMZ demilitarized Zone.mp4 |
30.28Мб |
068 Protocols and services IP SEC.en.srt |
10.57Кб |
068 Protocols and services IP SEC.it.srt |
11.42Кб |
068 Protocols and services IP SEC.mp4 |
43.74Мб |
069 IP SEC Phase 1.en.srt |
8.22Кб |
069 IP SEC Phase 1.it.srt |
8.78Кб |
069 IP SEC Phase 1.mp4 |
21.71Мб |
070 Network Address translation.en.srt |
13.51Кб |
070 Network Address translation.it.srt |
14.21Кб |
070 Network Address translation.mp4 |
52.64Мб |
071 Network access control RADIUS.en.srt |
11.99Кб |
071 Network access control RADIUS.it.srt |
12.67Кб |
071 Network access control RADIUS.mp4 |
48.43Мб |
072 07-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf |
1.19Мб |
073 Introduction to Monitoring Transmitted Data.en.srt |
1.31Кб |
073 Introduction to Monitoring Transmitted Data.it.srt |
1.36Кб |
073 Introduction to Monitoring Transmitted Data.mp4 |
6.18Мб |
074 Monitoring Transmitted Data - Basic informations.en.srt |
9.75Кб |
074 Monitoring Transmitted Data - Basic informations.it.srt |
10.53Кб |
074 Monitoring Transmitted Data - Basic informations.mp4 |
41.07Мб |
075 Intrusion detection systems.en.srt |
8.98Кб |
075 Intrusion detection systems.it.srt |
9.68Кб |
075 Intrusion detection systems.mp4 |
38.23Мб |
076 Why are firewalls and NDIS not enough.en.srt |
6.39Кб |
076 Why are firewalls and NDIS not enough.it.srt |
6.57Кб |
076 Why are firewalls and NDIS not enough.mp4 |
28.19Мб |
077 Wireshark - Introduction to network analysis.en.srt |
7.78Кб |
077 Wireshark - Introduction to network analysis.it.srt |
8.38Кб |
077 Wireshark - Introduction to network analysis.mp4 |
30.65Мб |
078 How to use Wireshark.en.srt |
10.17Кб |
078 How to use Wireshark.it.srt |
11.00Кб |
078 How to use Wireshark.mp4 |
43.55Мб |
079 Analyzing Captured data.en.srt |
6.52Кб |
079 Analyzing Captured data.it.srt |
6.78Кб |
079 Analyzing Captured data.mp4 |
31.01Мб |
080 How to analyze telnet protocol.en.srt |
8.87Кб |
080 How to analyze telnet protocol.it.srt |
9.46Кб |
080 How to analyze telnet protocol.mp4 |
37.99Мб |
081 Intrusion detection.en.srt |
8.66Кб |
081 Intrusion detection.it.srt |
9.42Кб |
081 Intrusion detection.mp4 |
46.35Мб |
082 Scanning computers.en.srt |
8.21Кб |
082 Scanning computers.it.srt |
8.86Кб |
082 Scanning computers.mp4 |
35.27Мб |
083 08-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf |
1.77Мб |
084 Wireless Networks.en.srt |
1.39Кб |
084 Wireless Networks.it.srt |
1.49Кб |
084 Wireless Networks.mp4 |
6.96Мб |
085 WIFI security solutions - introduction.en.srt |
6.34Кб |
085 WIFI security solutions - introduction.it.srt |
6.79Кб |
085 WIFI security solutions - introduction.mp4 |
29.17Мб |
086 WIFI - working principles.en.srt |
6.63Кб |
086 WIFI - working principles.it.srt |
7.23Кб |
086 WIFI - working principles.mp4 |
29.36Мб |
087 Other wireless technologies.en.srt |
3.34Кб |
087 Other wireless technologies.it.srt |
3.60Кб |
087 Other wireless technologies.mp4 |
13.16Мб |
088 Threats and risks.en.srt |
5.13Кб |
088 Threats and risks.it.srt |
5.58Кб |
088 Threats and risks.mp4 |
18.49Мб |
089 Ineffective solutions.en.srt |
4.69Кб |
089 Ineffective solutions.it.srt |
5.07Кб |
089 Ineffective solutions.mp4 |
18.98Мб |
090 Authentication methods.en.srt |
9.77Кб |
090 Authentication methods.it.srt |
10.41Кб |
090 Authentication methods.mp4 |
37.13Мб |
091 802.11 WEP.en.srt |
7.73Кб |
091 802.11 WEP.it.srt |
8.24Кб |
091 802.11 WEP.mp4 |
31.39Мб |
092 802.11I WPA.en.srt |
6.57Кб |
092 802.11I WPA.it.srt |
7.06Кб |
092 802.11I WPA.mp4 |
31.59Мб |
093 09-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf |
1.46Мб |
094 Threats of WIFI networks.en.srt |
6.70Кб |
094 Threats of WIFI networks.it.srt |
7.39Кб |
094 Threats of WIFI networks.mp4 |
30.54Мб |
095 Client Attacks Launching a rogue access point.en.srt |
7.55Кб |
095 Client Attacks Launching a rogue access point.it.srt |
8.21Кб |
095 Client Attacks Launching a rogue access point.mp4 |
33.57Мб |
096 Client Attacks Evil twin.en.srt |
5.27Кб |
096 Client Attacks Evil twin.it.srt |
5.75Кб |
096 Client Attacks Evil twin.mp4 |
22.76Мб |
097 Client Attacks Denial of service.en.srt |
10.32Кб |
097 Client Attacks Denial of service.it.srt |
11.17Кб |
097 Client Attacks Denial of service.mp4 |
36.52Мб |
098 EXERCISE WPA attack.en.srt |
3.88Кб |
098 EXERCISE WPA attack.it.srt |
4.09Кб |
098 EXERCISE WPA attack.mp4 |
8.86Мб |
099 09-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf |
1.70Мб |
100 Operating systems security - introduction.en.srt |
10.30Кб |
100 Operating systems security - introduction.it.srt |
11.02Кб |
100 Operating systems security - introduction.mp4 |
48.07Мб |
101 Security boundaries.en.srt |
5.32Кб |
101 Security boundaries.it.srt |
5.74Кб |
101 Security boundaries.mp4 |
21.20Мб |
102 Three core.en.srt |
8.22Кб |
102 Three core.it.srt |
8.85Кб |
102 Three core.mp4 |
29.75Мб |
103 EXERCISE OS boundaries.en.srt |
7.76Кб |
103 EXERCISE OS boundaries.it.srt |
8.46Кб |
103 EXERCISE OS boundaries.mp4 |
39.10Мб |
104 Process isolation.en.srt |
7.16Кб |
104 Process isolation.it.srt |
7.74Кб |
104 Process isolation.mp4 |
26.85Мб |
105 Kernel Mode Code Signing.en.srt |
6.94Кб |
105 Kernel Mode Code Signing.it.srt |
7.75Кб |
105 Kernel Mode Code Signing.mp4 |
25.68Мб |
106 Java Virtual Machine and code access security.en.srt |
4.86Кб |
106 Java Virtual Machine and code access security.it.srt |
5.32Кб |
106 Java Virtual Machine and code access security.mp4 |
18.64Мб |
107 10-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf |
4.25Мб |
108 Malware.en.srt |
14.09Кб |
108 Malware.it.srt |
15.14Кб |
108 Malware.mp4 |
44.86Мб |
109 EXERCISE Vulnerability attacks.en.srt |
10.48Кб |
109 EXERCISE Vulnerability attacks.it.srt |
11.31Кб |
109 EXERCISE Vulnerability attacks.mp4 |
47.61Мб |
110 EXERCISE Identifying suspicious processes.en.srt |
7.70Кб |
110 EXERCISE Identifying suspicious processes.it.srt |
8.25Кб |
110 EXERCISE Identifying suspicious processes.mp4 |
29.97Мб |
111 Demonstration Process Explorer.en.srt |
9.91Кб |
111 Demonstration Process Explorer.it.srt |
10.73Кб |
111 Demonstration Process Explorer.mp4 |
38.13Мб |
112 EXERCISE Removing malware.en.srt |
9.47Кб |
112 EXERCISE Removing malware.it.srt |
10.34Кб |
112 EXERCISE Removing malware.mp4 |
45.85Мб |
113 Rootkits.en.srt |
6.71Кб |
113 Rootkits.it.srt |
7.33Кб |
113 Rootkits.mp4 |
28.94Мб |
114 EXERCISE Detecting rootkits.en.srt |
12.13Кб |
114 EXERCISE Detecting rootkits.it.srt |
13.15Кб |
114 EXERCISE Detecting rootkits.mp4 |
58.29Мб |
115 EXERCISE Security evaluation.en.srt |
6.54Кб |
115 EXERCISE Security evaluation.it.srt |
7.12Кб |
115 EXERCISE Security evaluation.mp4 |
17.82Мб |
116 10-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf |
2.49Мб |
117 Authentication and authorisation - Introduction.en.srt |
2.00Кб |
117 Authentication and authorisation - Introduction.it.srt |
2.16Кб |
117 Authentication and authorisation - Introduction.mp4 |
9.63Мб |
118 Authentication users.en.srt |
7.86Кб |
118 Authentication users.it.srt |
8.48Кб |
118 Authentication users.mp4 |
31.37Мб |
119 How secure is your password.en.srt |
5.70Кб |
119 How secure is your password.it.srt |
6.05Кб |
119 How secure is your password.mp4 |
15.97Мб |
120 Authentication protocols and services.en.srt |
8.70Кб |
120 Authentication protocols and services.it.srt |
9.35Кб |
120 Authentication protocols and services.mp4 |
31.82Мб |
121 11-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf |
2.86Мб |
122 LM Hash.en.srt |
7.51Кб |
122 LM Hash.it.srt |
8.02Кб |
122 LM Hash.mp4 |
30.70Мб |
123 Cached Credentials.en.srt |
5.03Кб |
123 Cached Credentials.it.srt |
5.36Кб |
123 Cached Credentials.mp4 |
18.08Мб |
124 KERBEROS.en.srt |
12.17Кб |
124 KERBEROS.it.srt |
13.32Кб |
124 KERBEROS.mp4 |
52.56Мб |
125 Identity Theft.en.srt |
10.49Кб |
125 Identity Theft.it.srt |
11.35Кб |
125 Identity Theft.mp4 |
42.95Мб |
126 EXERCISE Offline attacks.en.srt |
12.91Кб |
126 EXERCISE Offline attacks.it.srt |
13.81Кб |
126 EXERCISE Offline attacks.mp4 |
45.63Мб |
127 Using online cracking services.en.srt |
9.53Кб |
127 Using online cracking services.it.srt |
10.28Кб |
127 Using online cracking services.mp4 |
37.65Мб |
128 11-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf |
2.12Мб |
129 Windows Security - what youll learn.en.srt |
1.38Кб |
129 Windows Security - what youll learn.it.srt |
1.45Кб |
129 Windows Security - what youll learn.mp4 |
7.59Мб |
130 User Account Control.en.srt |
6.77Кб |
130 User Account Control.it.srt |
7.27Кб |
130 User Account Control.mp4 |
32.01Мб |
131 UAC configuration.en.srt |
8.94Кб |
131 UAC configuration.it.srt |
9.67Кб |
131 UAC configuration.mp4 |
35.10Мб |
132 Additional Security Features - ASLR and DEP.en.srt |
12.89Кб |
132 Additional Security Features - ASLR and DEP.it.srt |
13.86Кб |
132 Additional Security Features - ASLR and DEP.mp4 |
40.91Мб |
133 PatchGuard.en.srt |
1.57Кб |
133 PatchGuard.it.srt |
1.71Кб |
133 PatchGuard.mp4 |
7.86Мб |
134 12-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf |
1.44Мб |
135 Encryption - key protection.en.srt |
16.07Кб |
135 Encryption - key protection.it.srt |
17.44Кб |
135 Encryption - key protection.mp4 |
46.34Мб |
136 Drive encryption.en.srt |
9.31Кб |
136 Drive encryption.it.srt |
9.87Кб |
136 Drive encryption.mp4 |
37.33Мб |
137 BitLocker.en.srt |
8.94Кб |
137 BitLocker.it.srt |
9.49Кб |
137 BitLocker.mp4 |
36.43Мб |
138 BitLocker To Go Reader.en.srt |
5.04Кб |
138 BitLocker To Go Reader.it.srt |
5.43Кб |
138 BitLocker To Go Reader.mp4 |
18.44Мб |
139 File and folder encryption - EFS.en.srt |
8.13Кб |
139 File and folder encryption - EFS.it.srt |
8.74Кб |
139 File and folder encryption - EFS.mp4 |
34.52Мб |
140 EXERCISE EFS.en.srt |
6.07Кб |
140 EXERCISE EFS.it.srt |
6.51Кб |
140 EXERCISE EFS.mp4 |
15.35Мб |
141 12-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf |
1.60Мб |
142 Security policies introduction.en.srt |
2.13Кб |
142 Security policies introduction.it.srt |
2.33Кб |
142 Security policies introduction.mp4 |
5.87Мб |
143 What is security.en.srt |
3.89Кб |
143 What is security.it.srt |
4.15Кб |
143 What is security.mp4 |
10.89Мб |
144 Information security.en.srt |
4.12Кб |
144 Information security.it.srt |
4.46Кб |
144 Information security.mp4 |
10.26Мб |
145 Information security - level up.en.srt |
4.26Кб |
145 Information security - level up.it.srt |
4.61Кб |
145 Information security - level up.mp4 |
9.87Мб |
146 Security issues.en.srt |
5.02Кб |
146 Security issues.it.srt |
5.48Кб |
146 Security issues.mp4 |
12.84Мб |
147 Why are security solutions fallible.en.srt |
5.96Кб |
147 Why are security solutions fallible.it.srt |
6.44Кб |
147 Why are security solutions fallible.mp4 |
15.48Мб |
148 Security policy issues.en.srt |
5.07Кб |
148 Security policy issues.it.srt |
5.48Кб |
148 Security policy issues.mp4 |
12.60Мб |
149 Introduction to threat modelling and classification.en.srt |
5.66Кб |
149 Introduction to threat modelling and classification.it.srt |
6.17Кб |
149 Introduction to threat modelling and classification.mp4 |
13.30Мб |
150 Threat modelling - STRIDE.en.srt |
4.14Кб |
150 Threat modelling - STRIDE.it.srt |
4.38Кб |
150 Threat modelling - STRIDE.mp4 |
10.58Мб |
151 STRIDE Spoofing identity.en.srt |
5.53Кб |
151 STRIDE Spoofing identity.it.srt |
5.95Кб |
151 STRIDE Spoofing identity.mp4 |
13.84Мб |
152 STRIDE Tampering with Data.en.srt |
4.98Кб |
152 STRIDE Tampering with Data.it.srt |
5.40Кб |
152 STRIDE Tampering with Data.mp4 |
12.84Мб |
153 STRIDE Denial of Service.en.srt |
4.24Кб |
153 STRIDE Denial of Service.it.srt |
4.67Кб |
153 STRIDE Denial of Service.mp4 |
10.39Мб |
154 Introduction to Risk Management.en.srt |
1.63Кб |
154 Introduction to Risk Management.it.srt |
1.71Кб |
154 Introduction to Risk Management.mp4 |
3.87Мб |
155 Attack methods.en.srt |
7.53Кб |
155 Attack methods.it.srt |
8.12Кб |
155 Attack methods.mp4 |
17.28Мб |
156 Local attacks.en.srt |
3.30Кб |
156 Local attacks.it.srt |
3.70Кб |
156 Local attacks.mp4 |
7.88Мб |
157 Target scanning and enumeration techniques 1.en.srt |
6.26Кб |
157 Target scanning and enumeration techniques 1.it.srt |
6.64Кб |
157 Target scanning and enumeration techniques 1.mp4 |
15.84Мб |
158 Target scanning and enumeration techniques 2.en.srt |
3.68Кб |
158 Target scanning and enumeration techniques 2.it.srt |
3.93Кб |
158 Target scanning and enumeration techniques 2.mp4 |
8.40Мб |
159 Passive scanning.en.srt |
2.08Кб |
159 Passive scanning.it.srt |
2.24Кб |
159 Passive scanning.mp4 |
7.13Мб |
160 03-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf |
1.61Мб |
160 Attack Methodologies - notes for the examination.html |
899б |
161 Introduction to risk assessment.en.srt |
7.05Кб |
161 Introduction to risk assessment.it.srt |
7.58Кб |
161 Introduction to risk assessment.mp4 |
18.15Мб |
162 DREAD Risk assessment model.en.srt |
5.16Кб |
162 DREAD Risk assessment model.it.srt |
5.49Кб |
162 DREAD Risk assessment model.mp4 |
12.64Мб |
163 DREAD Exploitability.en.srt |
5.93Кб |
163 DREAD Exploitability.it.srt |
6.33Кб |
163 DREAD Exploitability.mp4 |
13.90Мб |
164 EXERCISE Risk Assessment.en.srt |
8.11Кб |
164 EXERCISE Risk Assessment.it.srt |
8.63Кб |
164 EXERCISE Risk Assessment.mp4 |
18.11Мб |
165 03-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf |
1.81Мб |
165 Risk Assessment - notes for the examination.html |
894б |
166 Introduction to Social Engineering and rogue software.en.srt |
4.69Кб |
166 Introduction to Social Engineering and rogue software.it.srt |
5.01Кб |
166 Introduction to Social Engineering and rogue software.mp4 |
11.41Мб |
167 Manipulation tactics.en.srt |
10.42Кб |
167 Manipulation tactics.it.srt |
10.85Кб |
167 Manipulation tactics.mp4 |
22.17Мб |
168 EXERCISE Social Engineering attacks.en.srt |
6.83Кб |
168 EXERCISE Social Engineering attacks.it.srt |
7.27Кб |
168 EXERCISE Social Engineering attacks.mp4 |
19.02Мб |
169 SE with KALI BackTrack.en.srt |
7.34Кб |
169 SE with KALI BackTrack.it.srt |
7.73Кб |
169 SE with KALI BackTrack.mp4 |
16.16Мб |
170 Rogue Software.en.srt |
2.70Кб |
170 Rogue Software.it.srt |
2.84Кб |
170 Rogue Software.mp4 |
7.37Мб |
171 Fraud tools 1.en.srt |
7.32Кб |
171 Fraud tools 1.it.srt |
7.94Кб |
171 Fraud tools 1.mp4 |
20.02Мб |
172 Fraud tools 2.en.srt |
7.15Кб |
172 Fraud tools 2.it.srt |
7.68Кб |
172 Fraud tools 2.mp4 |
17.72Мб |
173 03-3-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf |
2.90Мб |
173 Social Engineering and Rogue Software - notes for the examination.html |
916б |
174 Introduction to Defence in Depth.en.srt |
1.63Кб |
174 Introduction to Defence in Depth.it.srt |
1.79Кб |
174 Introduction to Defence in Depth.mp4 |
4.54Мб |
175 How to use Defence in Depth model.en.srt |
6.11Кб |
175 How to use Defence in Depth model.it.srt |
6.58Кб |
175 How to use Defence in Depth model.mp4 |
14.67Мб |
176 DiD OS and LAN Layers.en.srt |
7.08Кб |
176 DiD OS and LAN Layers.it.srt |
7.53Кб |
176 DiD OS and LAN Layers.mp4 |
16.13Мб |
177 DiD Perimeter and Physical Access Layers.en.srt |
6.19Кб |
177 DiD Perimeter and Physical Access Layers.it.srt |
6.59Кб |
177 DiD Perimeter and Physical Access Layers.mp4 |
12.92Мб |
178 DiD Demonstration.en.srt |
2.84Кб |
178 DiD Demonstration.it.srt |
3.08Кб |
178 DiD Demonstration.mp4 |
6.98Мб |
179 Automated attack targeting a service.en.srt |
5.26Кб |
179 Automated attack targeting a service.it.srt |
5.63Кб |
179 Automated attack targeting a service.mp4 |
15.14Мб |
180 Automated user-targeting attack.en.srt |
4.99Кб |
180 Automated user-targeting attack.it.srt |
5.31Кб |
180 Automated user-targeting attack.mp4 |
13.43Мб |
181 04-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf |
1.64Мб |
181 The Defence in Depth Model - notes for the examination.html |
905б |
182 Introduction to Immutable laws of security - Law 1.en.srt |
5.13Кб |
182 Introduction to Immutable laws of security - Law 1.it.srt |
5.38Кб |
182 Introduction to Immutable laws of security - Law 1.mp4 |
13.99Мб |
183 Law 2.en.srt |
3.18Кб |
183 Law 2.it.srt |
3.51Кб |
183 Law 2.mp4 |
7.58Мб |
184 Law 3.en.srt |
2.48Кб |
184 Law 3.it.srt |
2.62Кб |
184 Law 3.mp4 |
5.86Мб |
185 Law 4.en.srt |
1.99Кб |
185 Law 4.it.srt |
2.15Кб |
185 Law 4.mp4 |
5.96Мб |
186 Law 5.en.srt |
3.52Кб |
186 Law 5.it.srt |
3.80Кб |
186 Law 5.mp4 |
8.81Мб |
187 Law 6.en.srt |
2.40Кб |
187 Law 6.it.srt |
2.66Кб |
187 Law 6.mp4 |
5.82Мб |
188 Law 7.en.srt |
1.36Кб |
188 Law 7.it.srt |
1.49Кб |
188 Law 7.mp4 |
2.90Мб |
189 Law 8.en.srt |
1.71Кб |
189 Law 8.it.srt |
1.80Кб |
189 Law 8.mp4 |
4.59Мб |
190 Law 9.en.srt |
4.60Кб |
190 Law 9.it.srt |
4.79Кб |
190 Law 9.mp4 |
9.23Мб |
191 Law 10.en.srt |
791б |
191 Law 10.it.srt |
865б |
191 Law 10.mp4 |
1.96Мб |
192 Laws for administrators.en.srt |
6.71Кб |
192 Laws for administrators.it.srt |
7.18Кб |
192 Laws for administrators.mp4 |
13.86Мб |
193 04-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf |
1.62Мб |
193 Immutable Laws of Security - notes for the examination.html |
905б |
194 Introduction to Disaster Recovery.en.srt |
1.67Кб |
194 Introduction to Disaster Recovery.it.srt |
1.81Кб |
194 Introduction to Disaster Recovery.mp4 |
4.36Мб |
195 How to reduce losses.en.srt |
5.95Кб |
195 How to reduce losses.it.srt |
6.39Кб |
195 How to reduce losses.mp4 |
14.85Мб |
196 Ensuring continous availability.en.srt |
4.36Кб |
196 Ensuring continous availability.it.srt |
4.67Кб |
196 Ensuring continous availability.mp4 |
10.78Мб |
197 Threat discovery 1.en.srt |
4.54Кб |
197 Threat discovery 1.it.srt |
5.20Кб |
197 Threat discovery 1.mp4 |
12.28Мб |
198 Threat discovery 2.en.srt |
3.93Кб |
198 Threat discovery 2.it.srt |
4.31Кб |
198 Threat discovery 2.mp4 |
8.84Мб |
199 Audit users and keep control accounts.en.srt |
5.17Кб |
199 Audit users and keep control accounts.it.srt |
5.69Кб |
199 Audit users and keep control accounts.mp4 |
13.30Мб |
200 High risk users.en.srt |
3.64Кб |
200 High risk users.it.srt |
4.04Кб |
200 High risk users.mp4 |
7.92Мб |
201 Collecting and analysing evidence.en.srt |
6.91Кб |
201 Collecting and analysing evidence.it.srt |
7.41Кб |
201 Collecting and analysing evidence.mp4 |
18.29Мб |
202 Forensics example.en.srt |
4.05Кб |
202 Forensics example.it.srt |
4.32Кб |
202 Forensics example.mp4 |
10.61Мб |
203 CONFICKER CASE STUDY.en.srt |
7.80Кб |
203 CONFICKER CASE STUDY.it.srt |
8.51Кб |
203 CONFICKER CASE STUDY.mp4 |
20.02Мб |
204 05-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf |
2.44Мб |
204 How to reduce losses - notes for the examination.html |
899б |
205 Heres what youll learn in this module.en.srt |
1.15Кб |
205 Heres what youll learn in this module.it.srt |
1.29Кб |
205 Heres what youll learn in this module.mp4 |
3.10Мб |
206 Managing applications.en.srt |
10.22Кб |
206 Managing applications.it.srt |
11.17Кб |
206 Managing applications.mp4 |
17.21Мб |
207 Software updates.en.srt |
3.16Кб |
207 Software updates.it.srt |
3.34Кб |
207 Software updates.mp4 |
6.22Мб |
208 MS Update.en.srt |
7.51Кб |
208 MS Update.it.srt |
8.14Кб |
208 MS Update.mp4 |
16.24Мб |
209 System Center Configuration Manager.en.srt |
3.17Кб |
209 System Center Configuration Manager.it.srt |
3.34Кб |
209 System Center Configuration Manager.mp4 |
6.27Мб |
210 Blocking applications.en.srt |
8.70Кб |
210 Blocking applications.it.srt |
9.54Кб |
210 Blocking applications.mp4 |
17.98Мб |
211 Software restrictions policies.en.srt |
6.76Кб |
211 Software restrictions policies.it.srt |
7.56Кб |
211 Software restrictions policies.mp4 |
14.49Мб |
212 EXERCISE Application control rules.en.srt |
13.40Кб |
212 EXERCISE Application control rules.it.srt |
14.88Кб |
212 EXERCISE Application control rules.mp4 |
27.19Мб |
213 Isolating applications.en.srt |
7.16Кб |
213 Isolating applications.it.srt |
7.85Кб |
213 Isolating applications.mp4 |
16.88Мб |
214 14-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf |
1.61Мб |
214 How to protect users without interrupting their work - notes for the examination.html |
931б |
215 Introduction to cryptography.en.srt |
11.32Кб |
215 Introduction to cryptography.it.srt |
12.42Кб |
215 Introduction to cryptography.mp4 |
23.58Мб |
216 History of ciphers.en.srt |
12.21Кб |
216 History of ciphers.it.srt |
13.13Кб |
216 History of ciphers.mp4 |
25.50Мб |
217 Symmetric and asymmetric ciphers.en.srt |
6.74Кб |
217 Symmetric and asymmetric ciphers.it.srt |
7.08Кб |
217 Symmetric and asymmetric ciphers.mp4 |
15.06Мб |
218 Symmetric-key algorithms.en.srt |
6.06Кб |
218 Symmetric-key algorithms.it.srt |
6.66Кб |
218 Symmetric-key algorithms.mp4 |
13.51Мб |
219 Block ciphers.en.srt |
6.43Кб |
219 Block ciphers.it.srt |
6.92Кб |
219 Block ciphers.mp4 |
15.35Мб |
220 Data encryption standard.en.srt |
7.16Кб |
220 Data encryption standard.it.srt |
7.70Кб |
220 Data encryption standard.mp4 |
16.54Мб |
221 DES-X.en.srt |
7.65Кб |
221 DES-X.it.srt |
8.33Кб |
221 DES-X.mp4 |
18.22Мб |
222 Advanced encryption standards.en.srt |
5.47Кб |
222 Advanced encryption standards.it.srt |
5.79Кб |
222 Advanced encryption standards.mp4 |
12.83Мб |
223 Block cipher modes.en.srt |
7.72Кб |
223 Block cipher modes.it.srt |
8.35Кб |
223 Block cipher modes.mp4 |
17.49Мб |
224 Stream Ciphers - RC4.en.srt |
3.88Кб |
224 Stream Ciphers - RC4.it.srt |
4.14Кб |
224 Stream Ciphers - RC4.mp4 |
8.59Мб |
225 Asymmetric-key algorithms.en.srt |
8.51Кб |
225 Asymmetric-key algorithms.it.srt |
9.17Кб |
225 Asymmetric-key algorithms.mp4 |
19.08Мб |
226 RSA.en.srt |
5.68Кб |
226 RSA.it.srt |
6.03Кб |
226 RSA.mp4 |
12.83Мб |
227 ELGAMAL.en.srt |
2.16Кб |
227 ELGAMAL.it.srt |
2.33Кб |
227 ELGAMAL.mp4 |
4.90Мб |
228 HASH functions.en.srt |
6.04Кб |
228 HASH functions.it.srt |
6.31Кб |
228 HASH functions.mp4 |
14.43Мб |
229 Digital signature.en.srt |
6.67Кб |
229 Digital signature.it.srt |
7.21Кб |
229 Digital signature.mp4 |
15.45Мб |
230 Hybrid Schemes.en.srt |
7.00Кб |
230 Hybrid Schemes.it.srt |
7.55Кб |
230 Hybrid Schemes.mp4 |
16.06Мб |
231 15-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf |
2.51Мб |
231 Symmetric and Asymmetric Ciphers - notes for the examination.html |
911б |
232 Introduction to cryptology.en.srt |
2.66Кб |
232 Introduction to cryptology.it.srt |
2.83Кб |
232 Introduction to cryptology.mp4 |
5.98Мб |
233 Public key infrastructure.en.srt |
7.28Кб |
233 Public key infrastructure.it.srt |
7.72Кб |
233 Public key infrastructure.mp4 |
14.80Мб |
234 Implementing public key infrastructure.en.srt |
6.41Кб |
234 Implementing public key infrastructure.it.srt |
6.97Кб |
234 Implementing public key infrastructure.mp4 |
12.74Мб |
235 What will PKI allow you.en.srt |
7.50Кб |
235 What will PKI allow you.it.srt |
8.12Кб |
235 What will PKI allow you.mp4 |
14.46Мб |
236 EXERCISE Certificates.en.srt |
10.12Кб |
236 EXERCISE Certificates.it.srt |
10.70Кб |
236 EXERCISE Certificates.mp4 |
20.63Мб |
237 Planning the PKI.en.srt |
10.28Кб |
237 Planning the PKI.it.srt |
10.80Кб |
237 Planning the PKI.mp4 |
22.55Мб |
238 Certificate life cycle.en.srt |
7.18Кб |
238 Certificate life cycle.it.srt |
7.65Кб |
238 Certificate life cycle.mp4 |
16.19Мб |
239 PKI Administration.en.srt |
8.47Кб |
239 PKI Administration.it.srt |
9.06Кб |
239 PKI Administration.mp4 |
19.69Мб |
240 02-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf |
1.42Мб |
240 Threat Modelling and Classification - notes for the examination.html |
914б |
241 16-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf |
2.18Мб |
241 Public Key Infrastructure - Trust but verify - notes for the examination.html |
923б |
242 Certificate-Itsec.pdf |
482.37Кб |
243 Wiriting a Shellcode.en.srt |
16.44Кб |
243 Wiriting a Shellcode.it.srt |
17.65Кб |
243 Wiriting a Shellcode.mp4 |
179.90Мб |
244 Secacademy-Voucher.pdf |
93.40Кб |
245 BONUS LECTURE Learn more and get to know our other courses.html |
5.30Кб |
246 Thank you.html |
1.20Кб |
external-assets-links.txt |
137б |
Read Me.txt |
1.02Кб |