本站已收录 番号和无损神作磁力链接/BT种子 

Udemy - A Beginners Guide To Kali Ethical Hacking And Pen Testing - TUTSEM

种子简介

种子名称: Udemy - A Beginners Guide To Kali Ethical Hacking And Pen Testing - TUTSEM
文件类型: 视频
文件数目: 42个文件
文件大小: 1.2 GB
收录时间: 2018-8-1 11:59
已经下载: 3
资源热度: 147
最近下载: 2024-5-2 10:34

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:c567f313e73194264dd452e6a6e5ce6a8527f728&dn=Udemy - A Beginners Guide To Kali Ethical Hacking And Pen Testing - TUTSEM 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

Udemy - A Beginners Guide To Kali Ethical Hacking And Pen Testing - TUTSEM.torrent
  • 01-introduction-to-ethical-hacking-and-security-industry-terminology/001-course-intro.mp423.04MB
  • 01-introduction-to-ethical-hacking-and-security-industry-terminology/002-osi-model-and-cia.mp470.59MB
  • 01-introduction-to-ethical-hacking-and-security-industry-terminology/003-spoofing-and-hijacking.mp438.71MB
  • 01-introduction-to-ethical-hacking-and-security-industry-terminology/004-cross-site-scripting-cross-site-request-forgery.mp442.99MB
  • 01-introduction-to-ethical-hacking-and-security-industry-terminology/005-sql-injection.mp417.16MB
  • 01-introduction-to-ethical-hacking-and-security-industry-terminology/006-wireless-network-security.mp430.74MB
  • 01-introduction-to-ethical-hacking-and-security-industry-terminology/007-common-malware.mp442.07MB
  • 02-kali-101/008-about-kali-and-use-cases.mp45.96MB
  • 02-kali-101/009-installing-and-configuring-kali-on-a-vmware-virtual-machine.mp410.4MB
  • 02-kali-101/010-configuring-the-network-adapter.mp48.54MB
  • 02-kali-101/011-booting-kali-for-the-first-time.mp47.49MB
  • 02-kali-101/012-basic-commands-with-kali-and-vmware.mp48.07MB
  • 02-kali-101/013-basic-kali-configuration.mp44.16MB
  • 02-kali-101/014-configuring-your-network.mp44.24MB
  • 02-kali-101/015-requesting-and-configuring-ip-addresses.mp47.94MB
  • 02-kali-101/016-managing-services-in-kali.mp45.96MB
  • 02-kali-101/017-managing-apache-in-kali.mp412.08MB
  • 02-kali-101/018-managing-ssh-in-kali.mp44.47MB
  • 02-kali-101/019-managing-mysql-in-kali.mp412.04MB
  • 02-kali-101/020-vulnerability-analysis-tools-overview.mp48.22MB
  • 02-kali-101/021-tools-overview.mp44.39MB
  • 02-kali-101/022-information-gathering-tools-overview.mp43.81MB
  • 02-kali-101/023-maltego.mp45.39MB
  • 02-kali-101/024-web-applications-tools-overview.mp46.48MB
  • 02-kali-101/025-burp-suite.mp45.06MB
  • 02-kali-101/026-password-attacks-tools-overview.mp42.93MB
  • 02-kali-101/027-ophcrack.mp44.48MB
  • 02-kali-101/028-armitage.mp46.11MB
  • 02-kali-101/029-cracking-wifi-passwords-on-a-wep-network.mp4181.96MB
  • 02-kali-101/030-top-10-security-tools-overview.mp48.5MB
  • 03-penetration-testing-methodologies/031-penetration-testing.mp455.73MB
  • 03-penetration-testing-methodologies/032-pentesting-techniques.mp475.87MB
  • 03-penetration-testing-methodologies/033-scope-of-pentesting.mp470.78MB
  • 03-penetration-testing-methodologies/034-types-of-pentesting-and-its-strategies-part-1.mp466.49MB
  • 03-penetration-testing-methodologies/035-types-of-pentesting-and-its-strategies-part-2.mp447.24MB
  • 03-penetration-testing-methodologies/036-types-of-pentesting-and-its-strategies-part-3.mp468.52MB
  • 03-penetration-testing-methodologies/037-types-of-pentesting-and-its-strategies-part-4.mp479.21MB
  • 04-bonus-labs-on-source-code-fuzzing-infecting-mysql-logs-and-more/038-injecting-mysql-logs.mp431.63MB
  • 04-bonus-labs-on-source-code-fuzzing-infecting-mysql-logs-and-more/039-threat-actor-attribution.mp424.1MB
  • 04-bonus-labs-on-source-code-fuzzing-infecting-mysql-logs-and-more/040-understanding-heap-overflow-protection.mp421.13MB
  • 04-bonus-labs-on-source-code-fuzzing-infecting-mysql-logs-and-more/041-source-code-fuzzing-lab-crash-analysis-using-american-fuzzy-lop.mp447.58MB
  • 04-bonus-labs-on-source-code-fuzzing-infecting-mysql-logs-and-more/042-intercepting-process-injection-on-suspended-threads.mp449.98MB