本站已收录 番号和无损神作磁力链接/BT种子 

[Tutorialsplanet.NET] Udemy - The Complete Cyber Security Course Hackers Exposed!

种子简介

种子名称: [Tutorialsplanet.NET] Udemy - The Complete Cyber Security Course Hackers Exposed!
文件类型: 视频
文件数目: 123个文件
文件大小: 4.25 GB
收录时间: 2020-11-19 17:28
已经下载: 3
资源热度: 120
最近下载: 2024-5-5 08:38

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:64d59dde6e3532c61393ce6a98430aa27fd47fcd&dn=[Tutorialsplanet.NET] Udemy - The Complete Cyber Security Course Hackers Exposed! 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

[Tutorialsplanet.NET] Udemy - The Complete Cyber Security Course Hackers Exposed!.torrent
  • 1. Introduction/1. Welcome and Introduction to the Instructor!.mp419.91MB
  • 1. Introduction/2. Security Quick Win!.mp443.19MB
  • 1. Introduction/3. Goals and Learning Objectives - Volume 1.mp416.11MB
  • 1. Introduction/4. Target Audience.mp47.33MB
  • 1. Introduction/5. Study Recommendations.mp417.95MB
  • 1. Introduction/6. Course updates.mp413.94MB
  • 1. Introduction/7. Cyber Security and Ethical Hacking Careers.mp431.23MB
  • 10. Security Domains/1. Goals and Learning Objectives.mp41.43MB
  • 10. Security Domains/2. Security Domains.mp421.84MB
  • 11. Security Through Isolation and Compartmentalization/1. Goals and Learning Objectives.mp42.3MB
  • 11. Security Through Isolation and Compartmentalization/10. Linux - Sandboxes and Application Isolation.mp413.85MB
  • 11. Security Through Isolation and Compartmentalization/11. Mac - Sandboxes and Application Isolation.mp423.79MB
  • 11. Security Through Isolation and Compartmentalization/12. Virtual Machines.mp444.44MB
  • 11. Security Through Isolation and Compartmentalization/13. Virtual Machine Weaknesses.mp422.74MB
  • 11. Security Through Isolation and Compartmentalization/14. Virtual Machine Hardening.mp436.96MB
  • 11. Security Through Isolation and Compartmentalization/15. Whonix OS - Anonymous Operating system.mp488.64MB
  • 11. Security Through Isolation and Compartmentalization/16. Whonix OS - Weaknesses.mp415.78MB
  • 11. Security Through Isolation and Compartmentalization/17. Qubes OS.mp478.73MB
  • 11. Security Through Isolation and Compartmentalization/18. Security Domains, Isolation and Compartmentalization.mp414.98MB
  • 11. Security Through Isolation and Compartmentalization/2. Introduction to Isolation and Compartmentalization.mp45.66MB
  • 11. Security Through Isolation and Compartmentalization/3. Physical and Hardware Isolation - How to change the Mac Address.mp425.58MB
  • 11. Security Through Isolation and Compartmentalization/4. Physical and Hardware Isolation - Hardware Serials.mp450.24MB
  • 11. Security Through Isolation and Compartmentalization/5. Virtual Isolation.mp457.32MB
  • 11. Security Through Isolation and Compartmentalization/6. Dual Boot.mp47.93MB
  • 11. Security Through Isolation and Compartmentalization/7. Built-in Sandboxes and Application Isolation.mp410.4MB
  • 11. Security Through Isolation and Compartmentalization/8. Windows - Sandboxes and Application Isolation.mp426.36MB
  • 11. Security Through Isolation and Compartmentalization/9. Windows - Sandboxes and Application Isolation - Sandboxie.mp470.12MB
  • 12. Wrap Up/1. Congratulations.mp45.28MB
  • 12. Wrap Up/2. Certificate Of Completion for CPEs.mp42.2MB
  • 12. Wrap Up/3. Sample from Vol 2 - Router Vulnerability Scanning (Shodan, Qualys).mp448.08MB
  • 12. Wrap Up/4. Sample from Vol 2 - Password cracking part 2.mp424.15MB
  • 12. Wrap Up/5. Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3.mp431.75MB
  • 12. Wrap Up/6. Sample from Vol 4 - Email clients, protocols and authentication.mp438.19MB
  • 2/1. Theory and Practical.mp42.25MB
  • 2/10. Defense In Depth.mp43MB
  • 2/11. The Zero Trust Model.mp410.28MB
  • 2/2. Goals and Learning Objectives.mp42.71MB
  • 2/3. Protect What You Value.mp48.94MB
  • 2/4. What is Privacy, Anonymity and Pseudonymity.mp411.88MB
  • 2/5. Security, Vulnerabilities, Threats and Adversaries.mp411.24MB
  • 2/6. Asset Selection.mp47.69MB
  • 2/7. Threat Modeling and Risk Assessments.mp418.04MB
  • 2/8. Security vs Privacy vs Anonymity - Can we have it all.mp45.43MB
  • 2/9. Confidentiality, Integrity and Availability - (Security Attributes).mp419.34MB
  • 3/1. Goals and Learning Objectives.mp42.9MB
  • 3/10. Social engineering - Scams, cons, tricks and fraud.mp411.92MB
  • 3/11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.mp416.2MB
  • 3/12. Darknets, Dark Markets and Exploit kits.mp432.43MB
  • 3/13. Governments, spies and secret stuff part I.mp427.03MB
  • 3/14. Governments, spies and secret stuff part II.mp430.23MB
  • 3/15. Regulating encryption, mandating insecurity & legalizing spying.mp442.74MB
  • 3/16. Trust & Backdoors.mp424.49MB
  • 3/17. Censorship.mp46.48MB
  • 3/18. Cyber Threat Intelligence – Stay Informed.mp42.61MB
  • 3/2. Why You Need Security – The Value Of A Hack.mp428.93MB
  • 3/3. The Top 3 Things You Need To Stay Safe Online.mp42.51MB
  • 3/4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp438.1MB
  • 3/5. Hackers, crackers and cyber criminals.mp47.71MB
  • 3/6. Malware, viruses, rootkits and RATs.mp412.15MB
  • 3/7. Spyware, Adware, Scareware, PUPs & Browser hijacking.mp410.78MB
  • 3/8. What is Phishing, Vishing and SMShing.mp425.99MB
  • 3/9. Spamming & Doxing.mp44.79MB
  • 4. Encryption Crash Course/1. Goals and Learning Objectives.mp41.63MB
  • 4. Encryption Crash Course/10. Certificate Authorities and HTTPS.mp4199.31MB
  • 4. Encryption Crash Course/11. End-to-End Encryption (E2EE).mp48.19MB
  • 4. Encryption Crash Course/12. Steganography.mp4104.31MB
  • 4. Encryption Crash Course/13. How Security and Encryption is Really Attacked.mp417.37MB
  • 4. Encryption Crash Course/2. Symmetric Encryption.mp432.31MB
  • 4. Encryption Crash Course/3. Asymmetric Encryption.mp472.32MB
  • 4. Encryption Crash Course/4. Hash Functions.mp489.24MB
  • 4. Encryption Crash Course/5. Digital Signatures.mp442.74MB
  • 4. Encryption Crash Course/6. Secure Sockets Layer (SSL) and Transport layer security (TLS).mp4160.85MB
  • 4. Encryption Crash Course/7. SSL Stripping.mp4114.52MB
  • 4. Encryption Crash Course/8. HTTPS (HTTP Secure).mp481.9MB
  • 4. Encryption Crash Course/9. Digital Certificates.mp481.97MB
  • 5/1. Goals and Learning Objectives.mp41.84MB
  • 5/2. Introduction to Setting up a Testing Environment Using Virtual Machines.mp4113.36MB
  • 5/3. Vmware.mp4110.48MB
  • 5/4. Virtual box.mp4144.16MB
  • 5/5. Kali Linux 2018.mp459.62MB
  • 6/1. Goals and Learning Objectives.mp42.44MB
  • 6/10. Windows 10 - WiFi Sense.mp459.76MB
  • 6/11. Windows 7, 8 and 8.1 - Privacy & Tracking.mp4105.53MB
  • 6/12. Mac - Privacy & Tracking.mp457.98MB
  • 6/13. Linux and Unix “like” Operating systems.mp446.23MB
  • 6/14. General Use Operating Systems (Windows, MacOS and Linux).mp446.91MB
  • 6/15. General Use Operating Systems With a Security and Privacy Focus (Debian, Arch).mp439.41MB
  • 6/16. Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS).mp432.32MB
  • 6/17. Anonymity Focused Operating Systems (Tails and Whonix OS).mp421.55MB
  • 6/18. Penetration Testing and Ethical Hacking Focused Operating Systems.mp413.37MB
  • 6/19. Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish).mp446.72MB
  • 6/2. Security Features and Functionality.mp457.9MB
  • 6/20. Linux - Debian 8 Jessie - Virtual box guest additions Issue.mp457.78MB
  • 6/3. Security Bugs and Vulnerabilities.mp483.9MB
  • 6/4. Usage Share.mp434.29MB
  • 6/5. Windows 10 - Privacy & Tracking.mp479.95MB
  • 6/6. Windows 10 - Disable tracking automatically.mp467.89MB
  • 6/7. Windows 10 - Tool Disable Windows 10 Tracking.mp498.42MB
  • 6/8. Windows 10 – Cortana.mp441.03MB
  • 6/9. Windows 10 – Privacy Settings.mp486.47MB
  • 7. Security Bugs and Vulnerabilities/1. Goals and Learning Objectives.mp41.66MB
  • 7. Security Bugs and Vulnerabilities/10. Firefox - Browser and extension updates.mp434.02MB
  • 7. Security Bugs and Vulnerabilities/11. Chrome - Browser and extension updates.mp43.58MB
  • 7. Security Bugs and Vulnerabilities/12. IE and Edge - Browser and extention updates.mp45.64MB
  • 7. Security Bugs and Vulnerabilities/13. Auto updates - The Impact to privacy and anonymity.mp44.31MB
  • 7. Security Bugs and Vulnerabilities/2. The Importance of Patching.mp411.66MB
  • 7. Security Bugs and Vulnerabilities/3. Windows 7 - Auto Update.mp44.94MB
  • 7. Security Bugs and Vulnerabilities/4. Windows 8 & 8.1 - Auto Update.mp46.55MB
  • 7. Security Bugs and Vulnerabilities/5. Windows 10 - Auto Update.mp44.93MB
  • 7. Security Bugs and Vulnerabilities/6. Windows - Criticality and Patch Tuesday.mp441.82MB
  • 7. Security Bugs and Vulnerabilities/7. Windows 7, 8, 8.1 & 10 - Automate the pain away from patching.mp419.36MB
  • 7. Security Bugs and Vulnerabilities/8. Linux - Debian - Patching.mp438.5MB
  • 7. Security Bugs and Vulnerabilities/9. Mac - Patching.mp455.59MB
  • 8. Reducing Threat Privilege/1. Goals and Learning Objectives - Removing Privilege.mp413.59MB
  • 8. Reducing Threat Privilege/2. Windows 7 - Not using admin.mp411MB
  • 8. Reducing Threat Privilege/3. Windows 8 and 8.1 - Not using admin.mp418.25MB
  • 8. Reducing Threat Privilege/4. Windows 10 - Not using admin.mp414.15MB
  • 9/1. Goals and Learning Objectives.mp41.73MB
  • 9/2. Information Disclosure and Identity Strategies for Social Media.mp483.82MB
  • 9/3. Identify Verification and Registration.mp423.4MB
  • 9/4. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1.mp423.3MB
  • 9/5. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2.mp449.31MB
  • 9/6. Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons).mp414.51MB