Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
1. Goals and Learning Objectives.mp4 |
18.75Мб |
1. Goals and Learning Objectives.srt |
1.06Кб |
1. Goals and Learning Objectives - Know Your Enemy.mp4 |
20.81Мб |
1. Goals and Learning Objectives - Know Your Enemy.srt |
1.35Кб |
1. What is Cybersecurity .mp4 |
33.17Мб |
1. What is Cybersecurity .srt |
4.93Кб |
1. Who Am I.mp4 |
6.57Мб |
1. Who Am I.srt |
1.63Кб |
10. Closure.mp4 |
22.53Мб |
10. Closure.srt |
3.29Кб |
10. Social Engineering - Scams, Cons, Tricks and Fraud.mp4 |
155.46Мб |
10. Social Engineering - Scams, Cons, Tricks and Fraud.srt |
15.26Кб |
10. Zero Trust Model.mp4 |
81.71Мб |
10. Zero Trust Model.srt |
7.02Кб |
11. Setting up Labs.mp4 |
161.67Мб |
11. Setting up Labs.srt |
22.69Кб |
2. Protect What You Value.mp4 |
89.35Мб |
2. Protect What You Value.srt |
9.28Кб |
2. What is Ethical Hacking.mp4 |
5.68Мб |
2. What is Ethical Hacking .srt |
3.75Кб |
2. Why You Need Security .mp4 |
180.96Мб |
2. Why You Need Security .srt |
16.75Кб |
3. The Top 3 Things You Need To Stay Safe Online.mp4 |
11.71Мб |
3. The Top 3 Things You Need To Stay Safe Online.srt |
7.11Кб |
3. What is Penetrating Testing .mp4 |
14.99Мб |
3. What is Penetrating Testing .srt |
2.29Кб |
3. What is Privacy, Anonymity and Pseudonymity .mp4 |
151.46Мб |
3. What is Privacy, Anonymity and Pseudonymity .srt |
12.13Кб |
4. Difference Between Ethical Hacking and Penetrating Testing.mp4 |
13.60Мб |
4. Difference Between Ethical Hacking and Penetrating Testing.srt |
2.42Кб |
4. Security, Vulnerabilities, Threats and Adversaries.mp4 |
112.37Мб |
4. Security, Vulnerabilities, Threats and Adversaries.srt |
9.65Кб |
4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4 |
171.63Мб |
4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.srt |
15.16Кб |
5. Asset Selection.mp4 |
17.42Мб |
5. Asset Selection.srt |
7.11Кб |
5. Hackers, crackers and cyber criminals.mp4 |
139.67Мб |
5. Hackers, crackers and cyber criminals.srt |
9.73Кб |
5. Purpose of Studying Ethical Hacking and Penetrating Testing.mp4 |
23.17Мб |
5. Purpose of Studying Ethical Hacking and Penetrating Testing.srt |
2.91Кб |
6. Malware, Viruses, Root kits and RATs.mp4 |
145.59Мб |
6. Malware, Viruses, Root kits and RATs.srt |
16.16Кб |
6. Scope For Ethical Hackers and Penetrating Testers.mp4 |
17.69Мб |
6. Scope For Ethical Hackers and Penetrating Testers.srt |
2.39Кб |
6. Threat Modelling And Risk Assessment.mp4 |
150.99Мб |
6. Threat Modelling And Risk Assessment.srt |
13.31Кб |
7. Do Ethical Hackers And Penetrating Testers Need Permission.mp4 |
6.24Мб |
7. Do Ethical Hackers And Penetrating Testers Need Permission.srt |
818б |
7. Security,Anonymity and Privacy.mp4 |
57.00Мб |
7. Security,Anonymity and Privacy.srt |
4.25Кб |
7. Spyware, Adware, Scareware, PUPs & Browser hijacking.mp4 |
170.61Мб |
7. Spyware, Adware, Scareware, PUPs & Browser hijacking.srt |
15.97Кб |
8. Confidentiality, Integrity and Availability - (Security Attributes).mp4 |
135.22Мб |
8. Confidentiality, Integrity and Availability - (Security Attributes).srt |
10.23Кб |
8. What is Phishing, Vishing and SMShing.mp4 |
235.62Мб |
8. What is Phishing, Vishing and SMShing.srt |
26.03Кб |
8. Who Conduct it .mp4 |
25.15Мб |
8. Who Conduct it .srt |
3.06Кб |
9. Defence in Depth.mp4 |
32.57Мб |
9. Defence in Depth.srt |
3.79Кб |
9. Spamming & Doxing.mp4 |
160.28Мб |
9. Spamming & Doxing.srt |
19.78Кб |
9. Who should You Choose .mp4 |
19.63Мб |
9. Who should You Choose .srt |
2.21Кб |
Bonus Resources.txt |
357б |
Get Bonus Downloads Here.url |
183б |