Общая информация
Название [FCO] Ethical Hacking: Social Engineering [Pluralsight] ([FreeCoursesOnline.Us] ethical-hacking-social-engineering)
Тип Книги
Размер 794.24Мб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
[FreeCoursesOnline.Us].txt 138б
[FreeCoursesOnline.Us].url 123б
[FreeTutorials.Us].txt 75б
[FreeTutorials.Us].url 119б
00.Overview.mp4 4.71Мб
00.Overview.mp4 2.77Мб
00.Overview.mp4 4.25Мб
00.Overview.mp4 4.72Мб
00.Overview.mp4 5.15Мб
00.Overview.mp4 3.34Мб
00.Overview.mp4.srt 4.36Кб
00.Overview.mp4.srt 2.35Кб
00.Overview.mp4.srt 3.80Кб
00.Overview.mp4.srt 4.11Кб
00.Overview.mp4.srt 4.68Кб
00.Overview.mp4.srt 3.01Кб
01.Case-Study-Cold-Call-Virus-Scams.mp4 14.66Мб
01.Case-Study-Cold-Call-Virus-Scams.mp4.srt 5.75Кб
01.Defenses-in-the-Browser-and-Email-Clients.mp4 12.13Мб
01.Defenses-in-the-Browser-and-Email-Clients.mp4.srt 11.91Кб
01.Social-Engineering-Through-the-Ages.mp4 27.20Мб
01.Social-Engineering-Through-the-Ages.mp4.srt 3.50Кб
01.Teach-a-Man-to-Phish-and-Hell-Eat-for-a-Lifetime.mp4 21.55Мб
01.Teach-a-Man-to-Phish-and-Hell-Eat-for-a-Lifetime.mp4.srt 12.64Кб
01.The-Impact-of-Identity-Theft.mp4 5.47Мб
01.The-Impact-of-Identity-Theft.mp4.srt 5.76Кб
01.Understanding-OSINT.mp4 56.03Мб
01.Understanding-OSINT.mp4.srt 11.10Кб
02.Call-Signs-of-a-Phishing-Email.mp4 18.55Мб
02.Call-Signs-of-a-Phishing-Email.mp4.srt 12.34Кб
02.Establishing-Authority-and-Creating-Fear.mp4 10.02Мб
02.Establishing-Authority-and-Creating-Fear.mp4.srt 4.92Кб
02.Identities-for-Sale.mp4 20.52Мб
02.Identities-for-Sale.mp4.srt 8.29Кб
02.Organizational-Reconnaissance.mp4 8.05Мб
02.Organizational-Reconnaissance.mp4.srt 6.41Кб
02.Record-Destruction.mp4 46.33Мб
02.Record-Destruction.mp4.srt 12.37Кб
02.The-Soft-Center-That-Social-Engineering-Exploits.mp4 12.12Мб
02.The-Soft-Center-That-Social-Engineering-Exploits.mp4.srt 7.43Кб
03.Call-Signs-of-a-Phishing-Page.mp4 14.43Мб
03.Call-Signs-of-a-Phishing-Page.mp4.srt 9.00Кб
03.Executing-the-Social-Engineering-Attack.mp4 20.72Мб
03.Executing-the-Social-Engineering-Attack.mp4.srt 9.84Кб
03.Human-Weaknesses-That-Enable-Social-Engineering.mp4 24.70Мб
03.Human-Weaknesses-That-Enable-Social-Engineering.mp4.srt 17.36Кб
03.Identifying-Targets-Within-an-Organization.mp4 22.92Мб
03.Identifying-Targets-Within-an-Organization.mp4.srt 8.56Кб
03.Physical-Security.mp4 19.80Мб
03.Physical-Security.mp4.srt 7.28Кб
03.The-Mechanics-of-an-Identify-Theft-Attack.mp4 19.32Мб
03.The-Mechanics-of-an-Identify-Theft-Attack.mp4.srt 16.79Кб
04.Computer-based-Versus-Human-based-Social-Engineering.mp4 4.79Мб
04.Computer-based-Versus-Human-based-Social-Engineering.mp4.srt 5.98Кб
04.Demonstrating-Authenticity.mp4 31.73Мб
04.Demonstrating-Authenticity.mp4.srt 17.74Кб
04.Identity-Reconnaissance-with-PiPL.mp4 6.52Мб
04.Identity-Reconnaissance-with-PiPL.mp4.srt 3.69Кб
04.In-person-Human-based-Identity-Theft.mp4 11.84Мб
04.In-person-Human-based-Identity-Theft.mp4.srt 7.16Кб
04.Separation-of-Duties-and-the-Principle-of-Least-Privilege.mp4 15.06Мб
04.Separation-of-Duties-and-the-Principle-of-Least-Privilege.mp4.srt 15.04Кб
04.Understanding-Spearphishing.mp4 7.04Мб
04.Understanding-Spearphishing.mp4.srt 4.31Кб
05.Creating-a-Debt.mp4 27.20Мб
05.Creating-a-Debt.mp4.srt 21.93Кб
05.Enumeration-as-a-Verification-Vector.mp4 7.35Мб
05.Enumeration-as-a-Verification-Vector.mp4.srt 5.64Кб
05.Impersonation.mp4 23.49Мб
05.Impersonation.mp4.srt 14.63Кб
05.Multi-Step-and-Side-Channel-Identity-Verification.mp4 21.82Мб
05.Multi-Step-and-Side-Channel-Identity-Verification.mp4.srt 15.85Кб
05.Shoulder-Surfing-Eavesdropping-and-Tailgating.mp4 21.67Мб
05.Shoulder-Surfing-Eavesdropping-and-Tailgating.mp4.srt 11.57Кб
05.Social-Engineering-at-Home-and-in-Popular-Culture.mp4 15.90Мб
05.Social-Engineering-at-Home-and-in-Popular-Culture.mp4.srt 6.14Кб
06.Dumpster-Diving-and-Mail-Theft.mp4 7.62Мб
06.Dumpster-Diving-and-Mail-Theft.mp4.srt 4.00Кб
06.Filter-Evasion-and-Concealment-Techniques.mp4 23.27Мб
06.Filter-Evasion-and-Concealment-Techniques.mp4.srt 12.46Кб
06.Logging-Auditing-and-Monitoring.mp4 7.57Мб
06.Logging-Auditing-and-Monitoring.mp4.srt 6.86Кб
06.Monetizing-the-Scam.mp4 33.51Мб
06.Monetizing-the-Scam.mp4.srt 16.94Кб
06.Social-Engineering-and-Impersonation-by-Example.mp4 23.01Мб
06.Social-Engineering-and-Impersonation-by-Example.mp4.srt 12.42Кб
06.Summary.mp4 2.69Мб
06.Summary.mp4.srt 2.57Кб
07.Data-Breaches.mp4 6.42Мб
07.Data-Breaches.mp4.srt 5.94Кб
07.Identifying-Attacks-with-PhishTank.mp4 7.97Мб
07.Identifying-Attacks-with-PhishTank.mp4.srt 3.24Кб
07.Identity-Monitoring.mp4 5.66Мб
07.Identity-Monitoring.mp4.srt 5.75Кб
07.Summary.mp4 4.89Мб
07.Summary.mp4 3.96Мб
07.Summary.mp4.srt 4.07Кб
07.Summary.mp4.srt 3.44Кб
08.Conditioning-the-Humans.mp4 9.32Мб
08.Conditioning-the-Humans.mp4.srt 5.44Кб
08.Phishing-with-BeEF.mp4 32.28Мб
08.Phishing-with-BeEF.mp4.srt 14.26Кб
08.Summary.mp4 2.72Мб
08.Summary.mp4.srt 2.91Кб
09.Mounting-Your-Own-Ethical-Phishing-Attack-with-Phish5.mp4 21.26Мб
09.Mounting-Your-Own-Ethical-Phishing-Attack-with-Phish5.mp4.srt 13.61Кб
09.Summary.mp4 4.30Мб
09.Summary.mp4.srt 4.09Кб
10.Summary.mp4 3.17Мб
10.Summary.mp4.srt 2.62Кб
clips-info.json 1.89Кб
clips-info.json 2.07Кб
clips-info.json 2.34Кб
clips-info.json 2.92Кб
clips-info.json 2.08Кб
clips-info.json 2.62Кб
course-info.json 1.87Кб
image.jpg 296.76Кб
module-info.json 343б
module-info.json 341б
module-info.json 301б
module-info.json 285б
module-info.json 317б
module-info.json 321б
Статистика распространения по странам
Россия (RU) 1
Македония (MK) 1
Швейцария (CH) 1
Финляндия (FI) 1
Южная Корея (KR) 1
Италия (IT) 1
Всего 6
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент