[FreeTutorials.Eu] [UDEMY] Hacking in Practice Certified Ethical Hacking MEGA Course - [FTU]


[FreeTutorials.Eu] [UDEMY] Hacking in Practice Certified Ethical Hacking MEGA Course - [FTU]
Category:
Date:
01/02/19 at 5:41pm GMT+1
Submitter:
Seeders:
0
Leechers:
1
File size:
4.4 GB in 99 files

Torrent Status:
  This torrent has been verified.

Infohash:
1f7be78867964ee1a13dfeaa241b297dc976317e


File list

  • [FreeTutorials.Eu] [UDEMY] Hacking in Practice Certified Ethical Hacking MEGA Course - [FTU]
  • icon 10. Risk Management/1. Introduction to Risk Management.mp4 3.9 MB
    icon 10. Risk Management/1. Introduction to Risk Management.vtt 1.4 KB
    icon 10. Risk Management/10. DREAD Exploitability.mp4 13.9 MB
    icon 10. Risk Management/10. DREAD Exploitability.vtt 5.2 KB
    icon 10. Risk Management/11. EXERCISE Risk Assessment.mp4 18.1 MB
    icon 10. Risk Management/11. EXERCISE Risk Assessment.vtt 7.2 KB
    icon 10. Risk Management/12. Risk Assessment - notes for the examination.html 10 B
    icon 10. Risk Management/12.1 03-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf 1.8 MB
    icon 10. Risk Management/13. Introduction to Social Engineering and rogue software.mp4 11.4 MB
    icon 10. Risk Management/13. Introduction to Social Engineering and rogue software.vtt 4.1 KB
    icon 10. Risk Management/14. Manipulation tactics.mp4 22.2 MB
    icon 10. Risk Management/14. Manipulation tactics.vtt 9.2 KB
    icon 10. Risk Management/15. EXERCISE Social Engineering attacks.mp4 19 MB
    icon 10. Risk Management/15. EXERCISE Social Engineering attacks.vtt 6 KB
    icon 10. Risk Management/16. SE with KALI BackTrack.mp4 16.2 MB
    icon 10. Risk Management/16. SE with KALI BackTrack.vtt 6.4 KB
    icon 10. Risk Management/17. Rogue Software.mp4 7.4 MB
    icon 10. Risk Management/17. Rogue Software.vtt 2.4 KB
    icon 10. Risk Management/18. Fraud tools #1.mp4 20 MB
    icon 10. Risk Management/18. Fraud tools #1.vtt 6.4 KB
    icon 10. Risk Management/19. Fraud tools #2.mp4 17.7 MB
    icon 10. Risk Management/19. Fraud tools #2.vtt 6.3 KB
    icon 10. Risk Management/2. Attack methods.mp4 17.3 MB
    icon 10. Risk Management/2. Attack methods.vtt 6.6 KB
    icon 10. Risk Management/20. Social Engineering and Rogue Software - notes for the examination.html 10 B
    icon 10. Risk Management/20.1 03-3-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf 2.9 MB
    icon 10. Risk Management/3. Local attacks.mp4 7.9 MB
    icon 10. Risk Management/3. Local attacks.vtt 2.9 KB
    icon 10. Risk Management/4. Target scanning and enumeration techniques #1.mp4 15.8 MB
    icon 10. Risk Management/4. Target scanning and enumeration techniques #1.vtt 5.5 KB
    icon 10. Risk Management/5. Target scanning and enumeration techniques #2.mp4 8.4 MB
    icon 10. Risk Management/5. Target scanning and enumeration techniques #2.vtt 3.3 KB
    icon 10. Risk Management/6. Passive scanning.mp4 7.1 MB
    icon 10. Risk Management/6. Passive scanning.vtt 1.8 KB
    icon 10. Risk Management/7. Attack Methodologies - notes for the examination.html 10 B
    icon 10. Risk Management/7.1 03-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf 1.6 MB
    icon 10. Risk Management/8. Introduction to risk assessment.mp4 18.1 MB
    icon 10. Risk Management/8. Introduction to risk assessment.vtt 6.3 KB
    icon 10. Risk Management/9. DREAD Risk assessment model.mp4 12.7 MB
    icon 10. Risk Management/9. DREAD Risk assessment model.vtt 4.6 KB
    icon 11. Defence in Depth/1. Introduction to Defence in Depth.mp4 4.5 MB
    icon 11. Defence in Depth/1. Introduction to Defence in Depth.vtt 1.5 KB
    icon 11. Defence in Depth/10. Law #2.mp4 7.6 MB
    icon 11. Defence in Depth/10. Law #2.vtt 2.8 KB
    icon 11. Defence in Depth/11. Law #3.mp4 5.9 MB
    icon 11. Defence in Depth/11. Law #3.vtt 2.2 KB
    icon 11. Defence in Depth/12. Law #4.mp4 6 MB
    icon 11. Defence in Depth/12. Law #4.vtt 1.8 KB
    icon 11. Defence in Depth/13. Law #5.mp4 8.8 MB
    icon 11. Defence in Depth/13. Law #5.vtt 3.1 KB
    icon 11. Defence in Depth/14. Law #6.mp4 5.8 MB
    icon 11. Defence in Depth/14. Law #6.vtt 2.1 KB
    icon 11. Defence in Depth/15. Law #7.mp4 2.9 MB
    icon 11. Defence in Depth/15. Law #7.vtt 1.2 KB
    icon 11. Defence in Depth/16. Law #8.mp4 4.6 MB
    icon 11. Defence in Depth/16. Law #8.vtt 1.5 KB
    icon 11. Defence in Depth/17. Law #9.mp4 9.2 MB
    icon 11. Defence in Depth/17. Law #9.vtt 4.1 KB
    icon 11. Defence in Depth/18. Law #10.mp4 2 MB
    icon 11. Defence in Depth/18. Law #10.vtt 716 B
    icon 11. Defence in Depth/19. Laws for administrators.mp4 13.9 MB
    icon 11. Defence in Depth/19. Laws for administrators.vtt 5.9 KB
    icon 11. Defence in Depth/2. How to use Defence in Depth model.mp4 14.7 MB
    icon 11. Defence in Depth/2. How to use Defence in Depth model.vtt 5.4 KB
    icon 11. Defence in Depth/20. Immutable Laws of Security - notes for the examination.html 10 B
    icon 11. Defence in Depth/20.1 04-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf 1.6 MB
    icon 11. Defence in Depth/3. DiD OS and LAN Layers.mp4 16.1 MB
    icon 11. Defence in Depth/3. DiD OS and LAN Layers.vtt 6.3 KB
    icon 11. Defence in Depth/4. DiD Perimeter and Physical Access Layers.mp4 12.9 MB
    icon 11. Defence in Depth/4. DiD Perimeter and Physical Access Layers.vtt 5.4 KB
    icon 11. Defence in Depth/5. DiD Demonstration.mp4 7 MB
    icon 11. Defence in Depth/5. DiD Demonstration.vtt 2.5 KB
    icon 11. Defence in Depth/6. Automated attack targeting a service.mp4 15.2 MB
    icon 11. Defence in Depth/6. Automated attack targeting a service.vtt 4.6 KB
    icon 11. Defence in Depth/7. Automated user-targeting attack.mp4 13.4 MB
    icon 11. Defence in Depth/7. Automated user-targeting attack.vtt 4.4 KB
    icon 11. Defence in Depth/8. The Defence in Depth Model - notes for the examination.html 10 B
    icon 11. Defence in Depth/8.1 04-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf 1.6 MB
    icon 11. Defence in Depth/9. Introduction to Immutable laws of security - Law #1.mp4 14 MB
    icon 11. Defence in Depth/9. Introduction to Immutable laws of security - Law #1.vtt 4.5 KB
    icon 12. Disaster Recovery/1. Introduction to Disaster Recovery.mp4 4.4 MB
    icon 12. Disaster Recovery/1. Introduction to Disaster Recovery.vtt 1.5 KB
    icon 12. Disaster Recovery/10. CONFICKER CASE STUDY.mp4 20 MB
    icon 12. Disaster Recovery/10. CONFICKER CASE STUDY.vtt 6.9 KB
    icon 12. Disaster Recovery/11. How to reduce losses - notes for the examination.html 10 B
    icon 12. Disaster Recovery/11.1 05-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf 2.4 MB
    icon 12. Disaster Recovery/2. How to reduce losses.mp4 14.9 MB
    icon 12. Disaster Recovery/2. How to reduce losses.vtt 5.3 KB
    icon 12. Disaster Recovery/3. Ensuring continous availability.mp4 10.8 MB
    icon 12. Disaster Recovery/3. Ensuring continous availability.vtt 3.9 KB
    icon 12. Disaster Recovery/4. Threat discovery #1.mp4 12.3 MB
    icon 12. Disaster Recovery/4. Threat discovery #1.vtt 4 KB
    icon 12. Disaster Recovery/5. Threat discovery #2.mp4 8.8 MB
    icon 12. Disaster Recovery/5. Threat discovery #2.vtt 3.5 KB
    icon 12. Disaster Recovery/6. Audit users and keep control accounts.mp4 13.3 MB
    icon 12. Disaster Recovery/6. Audit users and keep control accounts.vtt 4.5 KB
    icon 12. Disaster Recovery/7. High risk users.mp4 7.9 MB
    icon 12. Disaster Recovery/7. High risk users.vtt 3.2 KB
    icon 12. Disaster Recovery/8. Collecting and analysing evidence.mp4 18.3 MB

Similar Torrents