Общая информация
Название Cyber Security Awareness Secure Data & Combat Cyber Threats
Тип
Размер 8.30Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
[TGx]Downloaded from torrentgalaxy.to .txt 585б
0 1.05Кб
1 4.15Кб
1.1 Cyber Law.pdf 175.63Кб
1.1 Security Measures.pdf 140.66Кб
1.1 What is an Attack.pdf 121.61Кб
1.1 What is Cryptology.pdf 164.38Кб
1.1 What is DDOS Attack.pdf 155.13Кб
1.1 What is meant by term Digital Forensics.pdf 293.82Кб
1.1 What is Substitution Cipher.pdf 184.30Кб
1. Cyber Law.mp4 59.52Мб
1. Cyber Security Course Overview.mp4 12.84Мб
1. Definition of Digital Forensics.mp4 90.79Мб
1. Fundamentals of Networking-Overview.mp4 17.12Мб
1. Introduction.mp4 101.03Мб
1. Security Measures.mp4 64.89Мб
1. Test your knowledge.html 174б
1. Test your knowledge.html 174б
1. Test your knowledge.html 174б
1. What is an Attack.mp4 52.83Мб
1. What is Cryptology.mp4 65.08Мб
1. What is DDOS Attack.mp4 102.90Мб
1. What is Substitution Cipher.mp4 85.02Мб
10 29.77Кб
10.1 Cryptography System.pdf 112.75Кб
10.1 Cyber Crimes Against Person - Email and SMS Spoofing.pdf 133.39Кб
10.1 Networking Devices- Switch.pdf 102.52Кб
10.1 OSI Model - Physical Layer.pdf 191.36Кб
10.1 Spyware.pdf 171.96Кб
10.1 Why Asymmetric key cryptography is important.pdf 121.15Кб
10. Cryptography System.mp4 28.89Мб
10. Cyber Crimes Against Person - Email and SMS Spoofing.mp4 73.67Мб
10. Networking Devices Switch.mp4 31.04Мб
10. OSI Model Physical Layer.mp4 22.45Мб
10. Types of Malware Spyware.mp4 20.98Мб
10. Why Asymmetric key cryptography is important.mp4 17.20Мб
100 487.27Кб
101 536.37Кб
102 578.28Кб
103 711.41Кб
104 27.57Кб
105 313.83Кб
106 563.89Кб
107 793.45Кб
108 140.44Кб
109 25.35Кб
11 2.64Кб
11.1 3+Quarters+Complete+-+Well+Done+Keep+Going.pdf 623.46Кб
11.1 Advantages of Asymmetric Key Cryptography.pdf 132.71Кб
11.1 Crimeware.pdf 171.96Кб
11.1 Cryptography in everyday life.pdf 138.43Кб
11.1 OSI Layers Example.pdf 191.36Кб
11.1 What is an IP Address.pdf 153.36Кб
11. Advantages of Asymmetric Key Cryptography.mp4 69.42Мб
11. Cryptography in everyday life.mp4 143.84Мб
11. OSI Layers Example.mp4 19.43Мб
11. Types of Malware Crimeware.mp4 43.54Мб
11. What is an IP Address.mp4 46.01Мб
11. You've Achieved 75% Let's Celebrate Your Progress And Keep Going To 100% .mp4 4.71Мб
110 587.68Кб
111 815.74Кб
112 897.51Кб
113 450.03Кб
114 493.85Кб
115 632.41Кб
116 160.11Кб
117 413.49Кб
118 51.97Кб
119 16.02Кб
12 1.96Кб
12.1 Cyber Crimes Against Person - Carding.pdf 133.39Кб
12.1 Digital Signature.pdf 171.78Кб
12.1 OSI Layers Protocols.pdf 148.31Кб
12.1 Rootkit.pdf 171.96Кб
12.1 Types of Cryptography.pdf 72.48Кб
12.1 What is a MAC Address.pdf 153.36Кб
12. Cyber Crimes Against Person - Carding.mp4 27.84Мб
12. Digital Signature.mp4 55.46Мб
12. OSI Layers Protocols.mp4 48.06Мб
12. Types of Cryptography.mp4 25.48Мб
12. Types of Malware Rootkit.mp4 40.36Мб
12. What is a MAC Address.mp4 46.89Мб
120 276.74Кб
121 884.02Кб
122 447.48Кб
123 870.42Кб
124 298.76Кб
125 724.53Кб
126 141.06Кб
13 970б
13.1 Cyber Crimes Against Person - Cheating and Fraud.pdf 133.39Кб
13.1 HTTP Protocol.pdf 128.40Кб
13.1 Ransomware.pdf 171.96Кб
13.1 Signing and Verification Process.pdf 171.78Кб
13.1 Symmetric Key Cryptography.pdf 129.99Кб
13.1 What is a PORT Address.pdf 153.36Кб
13. Cyber Crimes Against Person - Cheating and Fraud.mp4 80.30Мб
13. HTTP Protocol.mp4 198.06Мб
13. Signing and Verification Process.mp4 36.49Мб
13. Symmetric Key Cryptography.mp4 56.16Мб
13. Types of Malware Ransomware.mp4 69.23Мб
13. What is a PORT Address.mp4 39.50Мб
14 40.19Кб
14.1 Asymmetric Key Cryptography.pdf 190.79Кб
14.1 Cyber Crimes Against Person - Assault by Threat.pdf 143.39Кб
14.1 How to check Integrity of Message.pdf 171.78Кб
14.1 Man in the Middle Attack.pdf 136.85Кб
14.1 Quarter+Complete+-+Well+Done+Keep+Going.pdf 464.29Кб
14.1 What is a DNS.pdf 124.58Кб
14. Asymmetric Key Cryptography.mp4 111.62Мб
14. Cyber Crimes Against Person - Assault by Threat.mp4 25.44Мб
14. How to check the Integrity of a Message.mp4 118.21Мб
14. Man in the Middle Attack.mp4 74.35Мб
14. What is a DNS.mp4 84.73Мб
14. You've Achieved 25% Let's Celebrate Your Progress And Keep Going To 50% .mp4 3.63Мб
15 67.27Кб
15.1 Cyber Crime Against Persons Property.pdf 143.98Кб
15.1 Man in the Middle Attack Example.pdf 118.73Кб
15.1 TCP Protocol.pdf 156.16Кб
15.1 What is a VPN.pdf 134.89Кб
15.1 What is Hashing.pdf 168.92Кб
15. Cyber Crime Against Persons Property.mp4 220.39Мб
15. Man in the Middle Attack Example.mp4 97.96Мб
15. TCP Protocol.mp4 90.61Мб
15. What is a VPN.mp4 38.69Мб
15. What is Hashing.mp4 127.93Мб
16 498б
16.1 Cyber Crime against Government.pdf 180.16Кб
16.1 Hashing Algorithm.pdf 168.92Кб
16.1 Sniffing Attack.pdf 181.52Кб
16.1 UDP Protocol.pdf 153.66Кб
16.1 What is a Virus.pdf 113.77Кб
16. Cyber Crime against Government.mp4 113.95Мб
16. Hashing Algorithm.mp4 9.14Мб
16. Sniffing Attack.mp4 106.73Мб
16. UDP Protocol.mp4 116.82Мб
16. What is a Virus.mp4 31.61Мб
17 46.96Кб
17.1 Cyber Crime against Society at Large.pdf 158.22Кб
17.1 Difference between UDP and TCP Protocol.pdf 118.53Кб
17.1 DOS Attack.pdf 160.29Кб
17.1 Learn Hacking and the different Types of Hackers.pdf 229.88Кб
17.1 Techniques of Hashing.pdf 141.63Кб
17. Cyber Crime against Society at Large.mp4 88.32Мб
17. Difference between UDP and TCP Protocol.mp4 46.50Мб
17. DOS Attack.mp4 202.50Мб
17. Learn Hacking and the different Types of Hackers.mp4 75.33Мб
17. Techniques of Hashing.mp4 82.69Мб
18 1.20Кб
18.1 DHCP Protocol.pdf 160.66Кб
18.1 DOS Attack Example.pdf 83.86Кб
18.1 Job Profiles in the field of Cybersecurity.pdf 146.55Кб
18. DHCP Protocol.mp4 175.37Мб
18. DOS Attack Example.mp4 44.86Мб
18. Job Profiles in the field of Cybersecurity.mp4 25.52Мб
19 48.48Кб
19.1 ARP Protocol.pdf 131.00Кб
19.1 Important Cybersecurity Skills.pdf 112.99Кб
19. ARP Protocol.mp4 50.76Мб
19. Important Cybersecurity Skills.mp4 105.48Мб
2 1.71Кб
2.1 Categories of Cyber Attacks.pdf 68.84Кб
2.1 Computer Networks.pdf 156.35Кб
2.1 DDOS Attack Example.pdf 155.13Кб
2.1 Process of Digital Forensics.pdf 112.32Кб
2.1 The Need for Cryptography.pdf 103.09Кб
2.1 What is Firewall.pdf 146.81Кб
2.1 What is Transposition Cipher.pdf 194.30Кб
2.1 Why there is a need for Cyber Law.pdf 194.51Кб
2. Assessment.html 174б
2. Assessment.html 174б
2. Assessment.html 174б
2. Categories of Cyber Attacks.mp4 174.14Мб
2. Computer Networks.mp4 46.22Мб
2. DDOS Attack Example.mp4 199.68Мб
2. Introduce Yourself To Your Fellow Students And Tell Everyone What Are Your Goals.html 611б
2. Introduction of Facilitator.mp4 57.29Мб
2. Process of Digital Forensics.mp4 160.76Мб
2. The Need for Cryptography.mp4 62.44Мб
2. What is Firewall.mp4 223.83Мб
2. What is Transposition Cipher.mp4 38.47Мб
2. Why there is a need for Cyber Law.mp4 59.35Мб
20 3.20Кб
20.1 What is an IP address and its types.pdf 144.46Кб
20. What is an IP address and its types.mp4 143.31Мб
21 298б
21.1 What is a Port Address and its types.pdf 212.52Кб
21. What is a Port Address and its types.mp4 80.74Мб
22 81б
22.1 Network Troubleshooting.pdf 126.63Кб
22. Network Troubleshooting.mp4 181.84Мб
23 3.10Кб
24 1.03Кб
25 47.14Кб
26 40.83Кб
27 32б
28 48.17Кб
29 65.95Кб
3 32.25Кб
3.1 All+Complete+-+Well+Done.pdf 839.99Кб
3.1 Basic Cryptography System.pdf 111.53Кб
3.1 Cesar Cipher and how it works.pdf 150.28Кб
3.1 Is our Data really safe on internet.pdf 155.70Кб
3.1 Let's+Celebrate+Your+Progress.pdf 840.02Кб
3.1 Phishing Attack.pdf 95.92Кб
3.1 The OSI Model.pdf 191.36Кб
3.1 Types of Attacks.pdf 164.54Кб
3.1 Types of Digital Forensics.pdf 191.62Кб
3.1 Types of Firewall- Packet Filter.pdf 83.08Кб
3.1 What is Cyber Crime.pdf 135.27Кб
3. Basic Cryptography System.mp4 22.69Мб
3. Cesar Cipher and how it works.mp4 125.69Мб
3. Is our Data really safe on internet.mp4 16.52Мб
3. Let's Celebrate Your Progress In This Course 25% 50% 75% 100%!!.mp4 11.95Мб
3. Phishing Attack.mp4 157.44Мб
3. The OSI Model.mp4 61.28Мб
3. Types of Attacks.mp4 16.56Мб
3. Types of Digital Forensics.mp4 39.42Мб
3. Types of Firewall Packet Filter.mp4 130.39Мб
3. What is Cyber Crime.mp4 72.38Мб
3. You've Achieved 100% Let's Celebrate! Remember To Share Your Certificate!!.mp4 9.73Мб
30 714б
31 16.16Кб
32 59.89Кб
33 3.65Кб
34 8.05Кб
35 860б
36 19.13Кб
37 2.61Кб
38 684б
39 13.38Кб
4 2.09Кб
4.1 Classification of Cyber Crime.pdf 114.93Кб
4.1 Cyber Security Workbook.pdf 12.60Мб
4.1 Example of Cesar Cipher.pdf 203.43Кб
4.1 OSI Model- Application Layer.pdf 191.36Кб
4.1 Password attack and its types.pdf 335.82Кб
4.1 Phishing Attack Example.pdf 126.51Кб
4.1 Types of Firewall- Stateful Inspection Firewall.pdf 83.08Кб
4.1 What is Cybersecurity.pdf 150.32Кб
4.1 What is Encryption.pdf 159.14Кб
4. Classification of Cyber Crime.mp4 26.05Мб
4. Example of Cesar Cipher.mp4 75.77Мб
4. OSI Model Application Layer.mp4 35.53Мб
4. Password attack and its types.mp4 187.35Мб
4. Phishing Attack Example.mp4 23.97Мб
4. Preview The 87 Page Cyber Security Awareness Workbook You Get With This Course.mp4 31.32Мб
4. Types of Firewall Stateful Inspection Firewall.mp4 100.79Мб
4. What is Cybersecurity.mp4 22.23Мб
4. What is Encryption.mp4 16.38Мб
40 362б
41 130б
42 74.45Кб
43 246б
44 42.03Кб
45 34.80Кб
46 395.00Кб
47 946.75Кб
48 110.07Кб
49 943.71Кб
5 2.22Кб
5.1 Cyber Crimes Against Person - Cyber Stalking.pdf 133.39Кб
5.1 Evolution of Cyber Threats.pdf 99.48Кб
5.1 Malware Attack.pdf 207.73Кб
5.1 OSI Model- Presentation Layer.pdf 201.36Кб
5.1 SQL Injection Attack.pdf 132.92Кб
5.1 Transposition Cipher.pdf 169.20Кб
5.1 Types of Firewall- Proxy-server firewall.pdf 83.08Кб
5.1 What is Decryption.pdf 159.14Кб
5. Cyber Crimes Against Person - Cyber Stalking.mp4 45.52Мб
5. Evolution of Cyber Threats.mp4 21.86Мб
5. Malware Attack.mp4 30.93Мб
5. OSI Model Presentation Layer.mp4 63.08Мб
5. SQL Injection Attack.mp4 37.42Мб
5. Transposition Cipher.mp4 30.88Мб
5. Types of Firewall Proxy-server firewall.mp4 95.04Мб
5. What is Decryption.mp4 8.56Мб
50 576.94Кб
51 733.53Кб
52 121.08Кб
53 489.83Кб
54 670.19Кб
55 727.71Кб
56 37.86Кб
57 860.67Кб
58 557.37Кб
59 515.63Кб
6 983б
6.1 Cyber Crimes Against Person - Dissemination of obscene Material.pdf 133.39Кб
6.1 Define Plain text.pdf 159.14Кб
6.1 Example of SQL Injection Attack.pdf 109.18Кб
6.1 OSI Model- Session Layer.pdf 191.36Кб
6.1 Three Types of Security Goals.pdf 95.55Кб
6.1 Worms.pdf 181.96Кб
6. Cyber Crimes Against Person - Dissemination of obscene Material.mp4 34.64Мб
6. Define Plain text.mp4 3.86Мб
6. Example of SQL Injection Attack.mp4 36.51Мб
6. Example of Transposition Cipher.mp4 88.11Мб
6. OSI Model Session Layer.mp4 71.48Мб
6. Three Types of Security Goals.mp4 89.90Мб
6. Types of Malware Worms.mp4 40.47Мб
60 51.48Кб
61 169.35Кб
62 276.43Кб
63 248.64Кб
64 814.36Кб
65 27.97Кб
66 600.31Кб
67 297.41Кб
68 959.84Кб
69 111.46Кб
7 1.06Кб
7.1 Cross-site Scripting Attack.pdf 175.29Кб
7.1 Cyber Crimes Against Person - Defamation.pdf 133.39Кб
7.1 Half+Complete+-+Well+Done+Keep+Going.pdf 511.26Кб
7.1 Importance of Cybersecurity.pdf 590.83Кб
7.1 OSI Model- Transport Layer.pdf 191.36Кб
7.1 Stream Cipher.pdf 145.17Кб
7.1 Viruses.pdf 171.96Кб
7. Cross-site Scripting Attack.mp4 43.85Мб
7. Cyber Crimes Against Person - Defamation.mp4 24.31Мб
7. Importance of Cybersecurity.mp4 56.96Мб
7. OSI Model Transport Layer.mp4 89.42Мб
7. Stream Cipher.mp4 59.88Мб
7. Types of Malware Viruses.mp4 53.50Мб
7. You've Achieved 50% Let's Celebrate Your Progress And Keep Going To 75% .mp4 4.29Мб
70 515.12Кб
71 798.25Кб
72 1016.45Кб
73 487.18Кб
74 140.69Кб
75 416.93Кб
76 157.63Кб
77 234.99Кб
78 467.84Кб
79 540.46Кб
8 43.05Кб
8.1 Block Cipher.pdf 169.28Кб
8.1 Cyber Crimes Against Person - Hacking.pdf 133.39Кб
8.1 OSI Model- Network Layer.pdf 191.36Кб
8.1 Post Scanning Attack.pdf 163.51Кб
8.1 Threat, Vulnerability, and Risk.pdf 104.82Кб
8.1 Trojan.pdf 171.96Кб
8.1 What is Secret Key.pdf 159.14Кб
8. Block Cipher.mp4 51.73Мб
8. Cyber Crimes Against Person - Hacking.mp4 27.88Мб
8. OSI Model Network Layer.mp4 48.71Мб
8. Post Scanning Attack.mp4 142.69Мб
8. Threat, Vulnerability, and Risk.mp4 38.43Мб
8. Types of Malware Trojan.mp4 49.97Мб
8. What is Secret Key.mp4 5.15Мб
80 658.71Кб
81 510.86Кб
82 591.73Кб
83 313.14Кб
84 538.18Кб
85 585.93Кб
86 592.04Кб
87 497.80Кб
88 518.61Кб
89 476.48Кб
9 14.48Кб
9.1 Advantages of Symmetric Key Cryptography.pdf 130.90Кб
9.1 Adware.pdf 171.96Кб
9.1 Cyber Crimes Against Person - Cracking.pdf 133.39Кб
9.1 Networking Devices-Router.pdf 105.74Кб
9.1 OSI Model- Data Link Layer.pdf 201.36Кб
9.1 What is Cipher text.pdf 159.14Кб
9. Advantages of Symmetric Key Cryptography.mp4 44.59Мб
9. Cyber Crimes Against Person - Cracking.mp4 52.95Мб
9. Networking Devices Router.mp4 43.77Мб
9. OSI Model Data Link Layer.mp4 49.41Мб
9. Types of Malware Adware.mp4 50.20Мб
9. What is Cipher text.mp4 10.98Мб
90 369.14Кб
91 396.39Кб
92 697.42Кб
93 978.83Кб
94 73.30Кб
95 119.88Кб
96 113.73Кб
97 127.95Кб
98 159.34Кб
99 969.74Кб
TutsNode.com.txt 63б
Статистика распространения по странам
Танзания (TZ) 2
ОАЭ (AE) 1
Румыния (RO) 1
Молдова (MD) 1
Германия (DE) 1
Бразилия (BR) 1
Всего 7
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент