Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
001 Goals and Learning Objectives.en.srt |
1.09Кб |
001 Goals and Learning Objectives.mp4 |
18.75Мб |
001 Goals and Learning Objectives - Know Your Enemy.en.srt |
1.39Кб |
001 Goals and Learning Objectives - Know Your Enemy.mp4 |
20.81Мб |
001 What is Cybersecurity _.en.srt |
5.12Кб |
001 What is Cybersecurity _.mp4 |
33.17Мб |
001 Who Am I.en.srt |
1.70Кб |
001 Who Am I.mp4 |
6.57Мб |
002 Protect What You Value.en.srt |
9.64Кб |
002 Protect What You Value.mp4 |
89.35Мб |
002 What is Ethical Hacking _.en.srt |
3.90Кб |
002 What is Ethical Hacking _.mp4 |
24.57Мб |
002 Why You Need Security _.en.srt |
17.41Кб |
002 Why You Need Security _.mp4 |
180.96Мб |
003 What is Penetrating Testing _.en.srt |
2.37Кб |
003 What is Penetrating Testing _.mp4 |
14.99Мб |
003 What is Privacy, Anonymity and Pseudonymity _.en.srt |
12.62Кб |
003 What is Privacy, Anonymity and Pseudonymity _.mp4 |
151.45Мб |
004 Difference Between Ethical Hacking and Penetrating Testing.en.srt |
2.50Кб |
004 Difference Between Ethical Hacking and Penetrating Testing.mp4 |
13.60Мб |
004 Security, Vulnerabilities, Threats and Adversaries.en.srt |
10.04Кб |
004 Security, Vulnerabilities, Threats and Adversaries.mp4 |
112.36Мб |
005 Asset Selection.en.srt |
7.39Кб |
005 Asset Selection.mp4 |
90.14Мб |
005 Purpose of Studying Ethical Hacking and Penetrating Testing.en.srt |
3.03Кб |
005 Purpose of Studying Ethical Hacking and Penetrating Testing.mp4 |
23.16Мб |
006 Scope For Ethical Hackers and Penetrating Testers.en.srt |
2.49Кб |
006 Scope For Ethical Hackers and Penetrating Testers.mp4 |
17.68Мб |
006 Threat Modelling And Risk Assessment.en.srt |
13.84Кб |
006 Threat Modelling And Risk Assessment.mp4 |
150.99Мб |
007 Do Ethical Hackers And Penetrating Testers Need Permission_.en.srt |
849б |
007 Do Ethical Hackers And Penetrating Testers Need Permission_.mp4 |
6.24Мб |
007 Security,Anonymity and Privacy.en.srt |
4.41Кб |
007 Security,Anonymity and Privacy.mp4 |
56.99Мб |
008 Confidentiality, Integrity and Availability - (Security Attributes).en.srt |
10.62Кб |
008 Confidentiality, Integrity and Availability - (Security Attributes).mp4 |
135.21Мб |
008 Who Conduct it _.en.srt |
3.17Кб |
008 Who Conduct it _.mp4 |
25.15Мб |
009 Defence in Depth.en.srt |
3.94Кб |
009 Defence in Depth.mp4 |
32.57Мб |
009 Who should You Choose _.en.srt |
2.29Кб |
009 Who should You Choose _.mp4 |
19.63Мб |
010 Closure.en.srt |
3.42Кб |
010 Closure.mp4 |
22.53Мб |
010 Zero Trust Model.en.srt |
7.30Кб |
010 Zero Trust Model.mp4 |
81.71Мб |
011 Setting up Labs.en.srt |
23.69Кб |
011 Setting up Labs.mp4 |
161.67Мб |
Bonus Resources.txt |
357б |
Get Bonus Downloads Here.url |
183б |