种子简介
种子名称:
[ Torrent911.gs ] The Absolute Beginners Guide to Cyber Security 2023
文件类型:
视频
文件数目:
210个文件
文件大小:
8.57 GB
收录时间:
2025-5-15 04:39
已经下载:
3次
资源热度:
25
最近下载:
2025-5-29 17:06
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:121c99357f85529c2832c43d564f9ff01c6abb60&dn=[ Torrent911.gs ] The Absolute Beginners Guide to Cyber Security 2023
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
[ Torrent911.gs ] The Absolute Beginners Guide to Cyber Security 2023.torrent
Part 1/01 - Welcome to the Course/001 Welcome to the Course.mp4139.87MB
Part 1/01 - Welcome to the Course/002 Who Am I Meet your Instructor.mp426.58MB
Part 1/01 - Welcome to the Course/003 Connect with Me.mp411.31MB
Part 1/02 - General Introduction to IT & Cyber Security/001 Difference Between Information Security and Cyber Security.mp478.02MB
Part 1/02 - General Introduction to IT & Cyber Security/002 The Trinity of IT Security - CIA.mp424.2MB
Part 1/02 - General Introduction to IT & Cyber Security/004 Computer Protocols.mp427.62MB
Part 1/02 - General Introduction to IT & Cyber Security/005 Cookies.mp456.73MB
Part 1/02 - General Introduction to IT & Cyber Security/006 The TCPIP.mp46.45MB
Part 1/03 - Hackers - Who are They/001 Section Intro.mp416.6MB
Part 1/03 - Hackers - Who are They/002 This is NOT Hacking.mp468.45MB
Part 1/03 - Hackers - Who are They/003 Types of Hackers.mp419.67MB
Part 1/03 - Hackers - Who are They/004 The Hacking Methodology.mp453.48MB
Part 1/03 - Hackers - Who are They/005 The WhoIS Query.mp422.68MB
Part 1/03 - Hackers - Who are They/006 Social Engineering Tactics - Part 1.mp4122.48MB
Part 1/03 - Hackers - Who are They/007 Social Engineering Tactics - Part 2.mp4142.26MB
Part 1/04 - Attacks/001 Intro to the Section.mp414.05MB
Part 1/04 - Attacks/002 Brute Force Attacks.mp413.43MB
Part 1/04 - Attacks/003 Phishing.mp4118.26MB
Part 1/04 - Attacks/004 Phishing - Part 2.mp4210.98MB
Part 1/04 - Attacks/005 Bots and Botnets.mp48.99MB
Part 1/04 - Attacks/006 DoS and DDoS.mp48.59MB
Part 1/04 - Attacks/007 Pings.mp415.57MB
Part 1/04 - Attacks/008 Man in the Middle Attacks.mp47.12MB
Part 1/04 - Attacks/009 SQL Injections.mp49.74MB
Part 1/04 - Attacks/010 Supply Chain Attacks.mp4162.55MB
Part 1/05 - Malware/001 Introduction to Malware.mp422.95MB
Part 1/05 - Malware/002 Viruses & Worms.mp421.2MB
Part 1/05 - Malware/003 Trojans.mp4141.5MB
Part 1/05 - Malware/004 Adware and Spyware.mp422.39MB
Part 1/05 - Malware/005 Ransomware.mp4211.43MB
Part 1/05 - Malware/006 Other Types of Malware.mp411.05MB
Part 1/06 - Defences/001 Section Intro.mp48.09MB
Part 1/06 - Defences/002 Firewalls.mp48.75MB
Part 1/06 - Defences/003 Encryption.mp410.15MB
Part 1/06 - Defences/004 Biometrics.mp426.82MB
Part 1/06 - Defences/005 Anti Virus.mp48.49MB
Part 1/06 - Defences/006 Factor Authentication Methods.mp418.69MB
Part 1/06 - Defences/007 Honey Pots and DMZs.mp411.2MB
Part 1/06 - Defences/008 Security for Wireless Networks.mp420.75MB
Part 1/06 - Defences/009 Password Management.mp459.5MB
Part 1/07 - Cyber Security at the Work Place/001 Section Intro.mp420.11MB
Part 1/07 - Cyber Security at the Work Place/002 Cyber Security Policies.mp411.04MB
Part 1/07 - Cyber Security at the Work Place/003 BYOD Management.mp471.35MB
Part 1/07 - Cyber Security at the Work Place/004 A Sample BYOD Policy.mp411.6MB
Part 1/07 - Cyber Security at the Work Place/005 The Security vs Ease of Access Paradox.mp460.96MB
Part 1/07 - Cyber Security at the Work Place/006 The Weakest Link & The Disgruntled Employee.mp434.75MB
Part 1/07 - Cyber Security at the Work Place/007 Review Update.mp48.22MB
Part 1/08 - Cyber Warfare and Cyber Attacks Against Companies/001 Introduction to Cyber Warfare.mp453.53MB
Part 1/08 - Cyber Warfare and Cyber Attacks Against Companies/002 The Attack Against Estonia.mp4147.93MB
Part 1/08 - Cyber Warfare and Cyber Attacks Against Companies/003 Stuxnet and the Attack Against Iran.mp4101.44MB
Part 1/08 - Cyber Warfare and Cyber Attacks Against Companies/004 The Colonial Pipeline Attack.mp413.42MB
Part 1/08 - Cyber Warfare and Cyber Attacks Against Companies/005 The Sony Hack.mp475.2MB
Part 1/09 - Extras and Conclusion/002 SPECIAL LESSON - How to Launch your Career in Cyber Security.mp496.02MB
Part 1/09 - Extras and Conclusion/003 Getting your Certificate.mp411.61MB
Part 1/09 - Extras and Conclusion/004 Conclusion.mp418.37MB
Part 1/09 - Extras and Conclusion/005 Course Promo.mp419.74MB
Part 2/01 - Introduction/001 Welcome to the Course.mp4115.13MB
Part 2/01 - Introduction/002 Connect with Me.mp416.89MB
Part 2/02 - Networking 101/001 Section Preview.mp423.11MB
Part 2/02 - Networking 101/002 MAC Addresses and IP Addresses.mp472.42MB
Part 2/02 - Networking 101/003 Hubs, Switches and Routers.mp410.97MB
Part 2/02 - Networking 101/004 Ethernet 101.mp47.8MB
Part 2/02 - Networking 101/005 HTTP, HTTPS, SSL & TLS.mp426.49MB
Part 2/02 - Networking 101/006 The Internet Protocol Suite - TCPIP.mp413.75MB
Part 2/02 - Networking 101/007 Understanding the DNS System.mp416.17MB
Part 2/03 - The Internet - Privacy & Survival of the Paranoid/001 Section Preview.mp430.41MB
Part 2/03 - The Internet - Privacy & Survival of the Paranoid/002 What is Privacy, Anonymity and Pseudonymity.mp418.62MB
Part 2/03 - The Internet - Privacy & Survival of the Paranoid/003 Identity Strategies.mp429.72MB
Part 2/03 - The Internet - Privacy & Survival of the Paranoid/004 How We are Tracked Online.mp485.36MB
Part 2/03 - The Internet - Privacy & Survival of the Paranoid/005 The FaceBook Data Mining Scandal.mp4101.04MB
Part 2/03 - The Internet - Privacy & Survival of the Paranoid/006 5 Places You are Tracked Online.mp469.21MB
Part 2/03 - The Internet - Privacy & Survival of the Paranoid/008 Browsing in Icognito Mode - The Shocking Truth !!!.mp45.16MB
Part 2/03 - The Internet - Privacy & Survival of the Paranoid/009 The Brave Browser.mp446.48MB
Part 2/03 - The Internet - Privacy & Survival of the Paranoid/010 How to Disappear Online.mp431.35MB
Part 2/03 - The Internet - Privacy & Survival of the Paranoid/011 Introduction to Stylometry.mp456.84MB
Part 2/04 - Anonymizers, Proxies, Virtual Private Networks & Tor/001 Section Preview.mp415.73MB
Part 2/04 - Anonymizers, Proxies, Virtual Private Networks & Tor/002 Annonymizer.mp410.64MB
Part 2/04 - Anonymizers, Proxies, Virtual Private Networks & Tor/003 Introduction to Proxy Servers.mp425.93MB
Part 2/04 - Anonymizers, Proxies, Virtual Private Networks & Tor/004 Introduction to VPNs.mp451.76MB
Part 2/04 - Anonymizers, Proxies, Virtual Private Networks & Tor/005 Types of VPNs.mp428.13MB
Part 2/04 - Anonymizers, Proxies, Virtual Private Networks & Tor/006 NordVPN.mp436.09MB
Part 2/04 - Anonymizers, Proxies, Virtual Private Networks & Tor/007 VPN Myths Debunked.mp412.8MB
Part 2/04 - Anonymizers, Proxies, Virtual Private Networks & Tor/008 Introduction to Tor.mp457.96MB
Part 2/04 - Anonymizers, Proxies, Virtual Private Networks & Tor/009 Tor Weaknesses.mp436.87MB
Part 2/04 - Anonymizers, Proxies, Virtual Private Networks & Tor/010 Attacking Tor - The end to end Correlation Hack.mp424.87MB
Part 2/04 - Anonymizers, Proxies, Virtual Private Networks & Tor/011 Accessing the Dark Web with Tor.mp497.58MB
Part 2/04 - Anonymizers, Proxies, Virtual Private Networks & Tor/012 Darknets.mp428.49MB
Part 2/04 - Anonymizers, Proxies, Virtual Private Networks & Tor/013 VPN + Tor.mp423.52MB
Part 2/04 - Anonymizers, Proxies, Virtual Private Networks & Tor/014 Meet Eldo Kim.mp434.39MB
Part 2/05 - Malware, Viruses, Rootkits, Ransomware & Attacks/001 Section Preview.mp413.17MB
Part 2/05 - Malware, Viruses, Rootkits, Ransomware & Attacks/002 Introduction to Malware.mp412.86MB
Part 2/05 - Malware, Viruses, Rootkits, Ransomware & Attacks/003 Viruses & Worms.mp421.2MB
Part 2/05 - Malware, Viruses, Rootkits, Ransomware & Attacks/004 Antivirus.mp48.48MB
Part 2/05 - Malware, Viruses, Rootkits, Ransomware & Attacks/005 Choosing the Right Antivirus Software.mp485.92MB
Part 2/05 - Malware, Viruses, Rootkits, Ransomware & Attacks/006 Rootkits.mp421.99MB
Part 2/05 - Malware, Viruses, Rootkits, Ransomware & Attacks/007 Securing the Windows 10 Boot Process.mp435.17MB
Part 2/05 - Malware, Viruses, Rootkits, Ransomware & Attacks/008 Using GMER - Rootkit Scanner.mp47.36MB
Part 2/05 - Malware, Viruses, Rootkits, Ransomware & Attacks/009 Ransomware - Cryptolocker, WannaCry, Bad Rabbit.mp478.58MB
Part 2/05 - Malware, Viruses, Rootkits, Ransomware & Attacks/010 Using the inbuilt AntiRansomware Tool.mp43.74MB
Part 2/05 - Malware, Viruses, Rootkits, Ransomware & Attacks/011 CC Cleaner.mp436.21MB
Part 2/05 - Malware, Viruses, Rootkits, Ransomware & Attacks/012 Bleachit.mp441.29MB
Part 2/05 - Malware, Viruses, Rootkits, Ransomware & Attacks/013 Malwarebytes.mp428.47MB
Part 2/06 - Backups, Storage, The Cloud and Encryption/001 Section Preview.mp415.52MB
Part 2/06 - Backups, Storage, The Cloud and Encryption/002 How to Backup Your Computer.mp416.02MB
Part 2/06 - Backups, Storage, The Cloud and Encryption/003 What is the Cloud.mp443.29MB
Part 2/06 - Backups, Storage, The Cloud and Encryption/004 Disk Encyrption.mp417.45MB
Part 2/06 - Backups, Storage, The Cloud and Encryption/005 Encrypting with Veracrypt.mp466.89MB
Part 2/06 - Backups, Storage, The Cloud and Encryption/006 Encrypting Windows 10 with Bitlocker.mp423.91MB
Part 2/06 - Backups, Storage, The Cloud and Encryption/007 Encrypting Mac OS with FileVault.mp45.68MB
Part 2/06 - Backups, Storage, The Cloud and Encryption/008 Self Encrypting Drives.mp44.82MB
Part 2/06 - Backups, Storage, The Cloud and Encryption/009 Attacks Against Encryption.mp425.02MB
Part 2/06 - Backups, Storage, The Cloud and Encryption/010 How to Password Protect USB Drives, Files & Folders.mp474.73MB
Part 2/07 - Social engineering - Scams, cons, tricks and fraud/001 Section Preview.mp49.71MB
Part 2/07 - Social engineering - Scams, cons, tricks and fraud/002 What is Social Engineering.mp477.9MB
Part 2/07 - Social engineering - Scams, cons, tricks and fraud/003 Reconnaissance Methods.mp4123.66MB
Part 2/07 - Social engineering - Scams, cons, tricks and fraud/004 Anatomy of a Social Engineering Attack.mp458.55MB
Part 2/07 - Social engineering - Scams, cons, tricks and fraud/005 The Way Back Machine.mp429.08MB
Part 2/07 - Social engineering - Scams, cons, tricks and fraud/006 Meet Kevin Mitnick.mp425.12MB
Part 2/08 - The World of Electronic Mails - Dangers, Attacks & Protection/001 Section Preview.mp46.95MB
Part 2/08 - The World of Electronic Mails - Dangers, Attacks & Protection/002 Email Basics, Protocols & Ports.mp419.15MB
Part 2/08 - The World of Electronic Mails - Dangers, Attacks & Protection/003 How to Track Sent Emails.mp421.7MB
Part 2/08 - The World of Electronic Mails - Dangers, Attacks & Protection/004 How to Detect Email Tracking.mp423.5MB
Part 2/08 - The World of Electronic Mails - Dangers, Attacks & Protection/005 Guerrilla Mail.mp428.75MB
Part 2/08 - The World of Electronic Mails - Dangers, Attacks & Protection/006 Introducing Proton Email.mp429.08MB
Part 2/08 - The World of Electronic Mails - Dangers, Attacks & Protection/007 Review Update.mp48.22MB
Part 2/08 - The World of Electronic Mails - Dangers, Attacks & Protection/008 Phishing Attacks.mp417.62MB
Part 2/08 - The World of Electronic Mails - Dangers, Attacks & Protection/009 Scam Email Live Example.mp486.15MB
Part 2/09 - Windows 10 Hardening, Privacy & Security/001 Section Preview.mp42.07MB
Part 2/09 - Windows 10 Hardening, Privacy & Security/002 Patching and Updates.mp434.56MB
Part 2/09 - Windows 10 Hardening, Privacy & Security/003 Windows 10 Privacy - Turning off Ad Tracking.mp47.2MB
Part 2/09 - Windows 10 Hardening, Privacy & Security/004 Windows 10 Privacy - Restricting Cortana.mp418.57MB
Part 2/09 - Windows 10 Hardening, Privacy & Security/005 Windows 10 Privacy - Turning off Location Tracking.mp46.29MB
Part 2/09 - Windows 10 Hardening, Privacy & Security/006 Windows 10 Privacy - Turning off Peer Updates.mp46.39MB
Part 2/09 - Windows 10 Hardening, Privacy & Security/007 Windows 10 Hardening - The Windows 10 Firewall.mp44.28MB
Part 2/09 - Windows 10 Hardening, Privacy & Security/008 Windows 10 Hardening - Enabling the Smart Screen Filter.mp45.1MB
Part 2/09 - Windows 10 Hardening, Privacy & Security/009 Windows 10 Hardening - Randomizing the MAC Address.mp44.45MB
Part 2/10 - Final Exam & Conclusion/001 Exam Preview.mp43.82MB
Part 2/10 - Final Exam & Conclusion/002 Other Cyber Security Courses.mp448.24MB
Part 2/10 - Final Exam & Conclusion/003 Getting your Certificate.mp411.59MB
Part 2/10 - Final Exam & Conclusion/004 Conclusion.mp44.04MB
Part 3/01 - The World of the Mobile Device/001 Welcome to the Course.mp437.6MB
Part 3/01 - The World of the Mobile Device/002 Connect with Me.mp416.9MB
Part 3/01 - The World of the Mobile Device/003 Mobile Device Usage - The Astounding Number.mp419.73MB
Part 3/01 - The World of the Mobile Device/004 Android vs Apple vs Blackberry.mp432.71MB
Part 3/02 - Understanding Applications/001 Introduction.mp441.41MB
Part 3/02 - Understanding Applications/002 Google Play vs The App Store.mp493.29MB
Part 3/02 - Understanding Applications/003 How to Identify Legit Apps & Spot Fake Apps.mp4107.2MB
Part 3/02 - Understanding Applications/004 Whatsapp Scam.mp433.13MB
Part 3/02 - Understanding Applications/005 The Truth about Jail Breaking an IOS Device.mp447.56MB
Part 3/02 - Understanding Applications/006 Understanding App Permissions.mp412.31MB
Part 3/02 - Understanding Applications/007 Checking Default App Permissions - Android.mp466.88MB
Part 3/02 - Understanding Applications/008 Checking Default App Permissions - IOS.mp423.31MB
Part 3/02 - Understanding Applications/009 4 Ways to Work Safely with Mobile Applications.mp47.43MB
Part 3/03 - Mobile Threats & Countermeasures/001 Introduction to Mobile Malware.mp433.93MB
Part 3/03 - Mobile Threats & Countermeasures/002 Mobile Ransomware.mp426.45MB
Part 3/03 - Mobile Threats & Countermeasures/003 Removing Ransomware.mp433.85MB
Part 3/03 - Mobile Threats & Countermeasures/004 Trojan.mp464.01MB
Part 3/03 - Mobile Threats & Countermeasures/005 Viruses and Spyware.mp416.83MB
Part 3/03 - Mobile Threats & Countermeasures/006 The 4 Main Symptoms of Malware Infection.mp48.7MB
Part 3/03 - Mobile Threats & Countermeasures/007 How to Use Malwarebytes.mp472.78MB
Part 3/04 - Mobile Security Apps/001 Virtual Private Networks and why You Need One.mp418.23MB
Part 3/04 - Mobile Security Apps/002 How to use NordVPN.mp462.16MB
Part 3/04 - Mobile Security Apps/003 How to Safely Access Public Wifi.mp452.77MB
Part 3/04 - Mobile Security Apps/004 Android Security Tweaks.mp437.24MB
Part 3/04 - Mobile Security Apps/005 Find my Device - Android.mp418.39MB
Part 3/04 - Mobile Security Apps/006 Find my iPhone.mp424.09MB
Part 3/04 - Mobile Security Apps/007 Review Update.mp48.26MB
Part 3/05 - Conclusion/001 Top 10 Mobile Security Tips.mp428.34MB
Part 3/05 - Conclusion/002 Getting your Certificate.mp49.79MB
Part 3/05 - Conclusion/003 Other Cyber Security Courses.mp448.2MB
Part 3/05 - Conclusion/004 Conclusion.mp44.94MB
Part 4/01 - Introduction/001 Welcome to the Course.mp484.17MB
Part 4/01 - Introduction/002 Connect with Me.mp463.95MB
Part 4/01 - Introduction/003 Personal Cyber Security - What I do.mp4384.64MB
Part 4/02 - Internet & Browsing Security/001 Internet Privacy Tools.mp440.16MB
Part 4/02 - Internet & Browsing Security/002 Browser Security - Mozilla Firefox.mp487.18MB
Part 4/02 - Internet & Browsing Security/003 Browser Security - Brave Browser.mp447.88MB
Part 4/02 - Internet & Browsing Security/004 HTTP & HTTPS.mp482.54MB
Part 4/02 - Internet & Browsing Security/005 Introduction to Cookies.mp469.24MB
Part 4/02 - Internet & Browsing Security/006 Using VPNs.mp452.3MB
Part 4/02 - Internet & Browsing Security/007 Creating new Accounts & Logging In (DO NOT DO THIS).mp433.48MB
Part 4/02 - Internet & Browsing Security/008 Sextortion.mp457.09MB
Part 4/02 - Internet & Browsing Security/009 Securing your Home Router.mp415.65MB
Part 4/03 - Personal Security/001 Understanding Malware & Anti-Malware Products.mp4100.82MB
Part 4/03 - Personal Security/002 Password Management.mp4112.05MB
Part 4/03 - Personal Security/003 Introduction to Password Managers.mp416.87MB
Part 4/03 - Personal Security/004 2 Factor Authentications.mp435.51MB
Part 4/03 - Personal Security/005 Protecting yourself against SIM Card Swap Fraud.mp4151.06MB
Part 4/03 - Personal Security/006 Backups.mp427.39MB
Part 4/03 - Personal Security/007 Creating a Personal Disaster Recovery Plan.mp410.85MB
Part 4/03 - Personal Security/008 Have I been Pwned.mp425.03MB
Part 4/04 - Social Media Security & Email Security/001 Social Media Ethics.mp451.7MB
Part 4/04 - Social Media Security & Email Security/002 Social Media Ethics - Part 2.mp468.59MB
Part 4/04 - Social Media Security & Email Security/003 How to Secure your Facebook Account.mp421.39MB
Part 4/04 - Social Media Security & Email Security/004 How to Secure your LinkedIn Account.mp448.18MB
Part 4/04 - Social Media Security & Email Security/005 How to Secure your Twitter Account.mp420.09MB
Part 4/04 - Social Media Security & Email Security/006 Phishing Attacks.mp432.89MB
Part 4/04 - Social Media Security & Email Security/007 Email Data Management.mp428.25MB
Part 4/04 - Social Media Security & Email Security/008 How to Secure your Google Account.mp422MB
Part 4/04 - Social Media Security & Email Security/009 How to Secure your Google Account - Part 2.mp414.78MB
Part 4/04 - Social Media Security & Email Security/010 How to Set up a Recovery Email.mp418.19MB
Part 4/05 - Mobile Security/001 Introduction.mp421.32MB
Part 4/05 - Mobile Security/002 Understanding App Permissions.mp412.32MB
Part 4/05 - Mobile Security/003 Checking Default App Permissions - Android.mp466.48MB
Part 4/05 - Mobile Security/004 Checking Default App Permissions - IOS.mp423.16MB
Part 4/05 - Mobile Security/005 How to Identify Legit Apps.mp4113.25MB
Part 4/06 - Conclusion/001 You have been HACKED - Now What.mp485.05MB
Part 4/06 - Conclusion/004 Other Cyber Security Courses.mp478.64MB
Part 4/06 - Conclusion/005 Getting your Certificate.mp421.85MB
Part 4/06 - Conclusion/006 Bonus Lecture.mp49.59MB