[FreeCourseSite.com] Udemy - Hacking in Practice Certified Ethical Hacking MEGA Course

Photo unavailable
Category:
Date:
01/28/19 at 7:29am GMT+1
Submitter:
Seeders:
0
Leechers:
1
File size:
2.4 GB in 99 files

Torrent Status:
  This torrent has been verified.

Infohash:
b02a9b758fcdeca6be5876911dd6ae710a07b6d3


File list

  • [FreeCourseSite.com] Udemy - Hacking in Practice Certified Ethical Hacking MEGA Course
  • icon 1. IT Security Trends/1. Introduction to Current Cyber Threats.mp4 6.7 MB
    icon 1. IT Security Trends/1. Introduction to Current Cyber Threats.vtt 5.3 KB
    icon 1. IT Security Trends/10. Popular Myths About Computer System Security - notes for the examination.pdf 988.5 KB
    icon 1. IT Security Trends/11. Trends in IT Security.mp4 5.6 MB
    icon 1. IT Security Trends/11. Trends in IT Security.vtt 3.7 KB
    icon 1. IT Security Trends/12. The birth of technology society.mp4 5.7 MB
    icon 1. IT Security Trends/12. The birth of technology society.vtt 3.1 KB
    icon 1. IT Security Trends/13. EXERCISE How much info can you gather.mp4 5.4 MB
    icon 1. IT Security Trends/13. EXERCISE How much info can you gather.vtt 3.7 KB
    icon 1. IT Security Trends/14. Fake identity.mp4 7.9 MB
    icon 1. IT Security Trends/14. Fake identity.vtt 4.9 KB
    icon 1. IT Security Trends/15. Online privacy.mp4 9.5 MB
    icon 1. IT Security Trends/15. Online privacy.vtt 5.9 KB
    icon 1. IT Security Trends/16. Analyzing sniffing software.mp4 5.8 MB
    icon 1. IT Security Trends/16. Analyzing sniffing software.vtt 3.3 KB
    icon 1. IT Security Trends/17. Cyber War.mp4 13.7 MB
    icon 1. IT Security Trends/17. Cyber War.vtt 7.7 KB
    icon 1. IT Security Trends/18. Changing IT Security Trends - notes for the examination.pdf 2.1 MB
    icon 1. IT Security Trends/19. Objective #1 - Data security - Introduction.mp4 11.4 MB
    icon 1. IT Security Trends/19. Objective #1 - Data security - Introduction.vtt 6.4 KB
    icon 1. IT Security Trends/2. IT Prehistory.mp4 7.8 MB
    icon 1. IT Security Trends/2. IT Prehistory.vtt 5 KB
    icon 1. IT Security Trends/20. Confidentiality of data.mp4 9.6 MB
    icon 1. IT Security Trends/20. Confidentiality of data.vtt 4.9 KB
    icon 1. IT Security Trends/21. EXERCISE Finding confidential data with search engines.mp4 8.9 MB
    icon 1. IT Security Trends/21. EXERCISE Finding confidential data with search engines.vtt 5.2 KB
    icon 1. IT Security Trends/22. Integrity of data.mp4 10.1 MB
    icon 1. IT Security Trends/22. Integrity of data.vtt 6.2 KB
    icon 1. IT Security Trends/23. Data security - notes for the examination.pdf 2 MB
    icon 1. IT Security Trends/3. Let’s look a few years back.mp4 7.3 MB
    icon 1. IT Security Trends/3. Let’s look a few years back.vtt 5.3 KB
    icon 1. IT Security Trends/4. Cyber crimes - an evolution not revolution.mp4 6.4 MB
    icon 1. IT Security Trends/4. Cyber crimes - an evolution not revolution.vtt 5.1 KB
    icon 1. IT Security Trends/5. Current Cyber Threats - notes for the examination.pdf 1.5 MB
    icon 1. IT Security Trends/6. Popular myths about IT security - origins.mp4 8.3 MB
    icon 1. IT Security Trends/6. Popular myths about IT security - origins.vtt 5.6 KB
    icon 1. IT Security Trends/7. Myths #1 - you’ll never be hacked.mp4 8.7 MB
    icon 1. IT Security Trends/7. Myths #1 - you’ll never be hacked.vtt 6 KB
    icon 1. IT Security Trends/8. Myths #2 - you don’t need any protection software or hardware.mp4 7.5 MB
    icon 1. IT Security Trends/8. Myths #2 - you don’t need any protection software or hardware.vtt 5.5 KB
    icon 1. IT Security Trends/9. Myths #3 - IT security is always a priority.mp4 1.6 MB
    icon 1. IT Security Trends/9. Myths #3 - IT security is always a priority.vtt 1.1 KB
    icon 10. Risk Management/1. Introduction to Risk Management.mp4 3.9 MB
    icon 10. Risk Management/1. Introduction to Risk Management.vtt 1.4 KB
    icon 10. Risk Management/10. DREAD Exploitability.mp4 13.9 MB
    icon 10. Risk Management/10. DREAD Exploitability.vtt 5.2 KB
    icon 10. Risk Management/11. EXERCISE Risk Assessment.mp4 18.1 MB
    icon 10. Risk Management/11. EXERCISE Risk Assessment.vtt 7.2 KB
    icon 10. Risk Management/12. Risk Assessment - notes for the examination.html 10 B
    icon 10. Risk Management/12.1 03-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf 1.8 MB
    icon 10. Risk Management/13. Introduction to Social Engineering and rogue software.mp4 11.4 MB
    icon 10. Risk Management/13. Introduction to Social Engineering and rogue software.vtt 4.1 KB
    icon 10. Risk Management/14. Manipulation tactics.mp4 22.2 MB
    icon 10. Risk Management/14. Manipulation tactics.vtt 9.2 KB
    icon 10. Risk Management/15. EXERCISE Social Engineering attacks.mp4 19 MB
    icon 10. Risk Management/15. EXERCISE Social Engineering attacks.vtt 6 KB
    icon 10. Risk Management/16. SE with KALI BackTrack.mp4 16.2 MB
    icon 10. Risk Management/16. SE with KALI BackTrack.vtt 6.4 KB
    icon 10. Risk Management/17. Rogue Software.mp4 7.4 MB
    icon 10. Risk Management/17. Rogue Software.vtt 7.4 MB
    icon 10. Risk Management/18. Fraud tools #1.mp4 20 MB
    icon 10. Risk Management/18. Fraud tools #1.vtt 6.4 KB
    icon 10. Risk Management/19. Fraud tools #2.mp4 17.7 MB
    icon 10. Risk Management/19. Fraud tools #2.vtt 6.3 KB
    icon 10. Risk Management/2. Attack methods.mp4 17.3 MB
    icon 10. Risk Management/2. Attack methods.vtt 6.6 KB
    icon 10. Risk Management/20. Social Engineering and Rogue Software - notes for the examination.html 10 B
    icon 10. Risk Management/20.1 03-3-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf 2.9 MB
    icon 10. Risk Management/3. Local attacks.mp4 7.9 MB
    icon 10. Risk Management/3. Local attacks.vtt 2.9 KB
    icon 10. Risk Management/4. Target scanning and enumeration techniques #1.mp4 15.9 MB
    icon 10. Risk Management/4. Target scanning and enumeration techniques #1.vtt 5.5 KB
    icon 10. Risk Management/5. Target scanning and enumeration techniques #2.mp4 8.4 MB
    icon 10. Risk Management/5. Target scanning and enumeration techniques #2.vtt 3.3 KB
    icon 10. Risk Management/6. Passive scanning.mp4 7.1 MB
    icon 10. Risk Management/6. Passive scanning.vtt 1.8 KB
    icon 10. Risk Management/7. Attack Methodologies - notes for the examination.html 10 B
    icon 10. Risk Management/7.1 03-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf 1.6 MB
    icon 10. Risk Management/8. Introduction to risk assessment.mp4 18.2 MB
    icon 10. Risk Management/8. Introduction to risk assessment.vtt 6.3 KB
    icon 10. Risk Management/9. DREAD Risk assessment model.mp4 12.6 MB
    icon 10. Risk Management/9. DREAD Risk assessment model.vtt 4.6 KB
    icon 11. Defence in Depth/1. Introduction to Defence in Depth.mp4 4.5 MB
    icon 11. Defence in Depth/1. Introduction to Defence in Depth.vtt 1.5 KB
    icon 11. Defence in Depth/10. Law #2.mp4 7.6 MB
    icon 11. Defence in Depth/10. Law #2.vtt 2.8 KB
    icon 11. Defence in Depth/11. Law #3.mp4 5.9 MB
    icon 11. Defence in Depth/11. Law #3.vtt 2.2 KB
    icon 11. Defence in Depth/12. Law #4.mp4 6 MB
    icon 11. Defence in Depth/12. Law #4.vtt 1.8 KB
    icon 11. Defence in Depth/13. Law #5.mp4 8.8 MB
    icon 11. Defence in Depth/13. Law #5.vtt 3.1 KB
    icon 11. Defence in Depth/14. Law #6.mp4 5.8 MB
    icon 11. Defence in Depth/14. Law #6.vtt 2.1 KB
    icon 11. Defence in Depth/15. Law #7.mp4 2.9 MB
    icon 11. Defence in Depth/15. Law #7.vtt 1.2 KB
    icon 11. Defence in Depth/16. Law #8.mp4 4.6 MB
    icon 11. Defence in Depth/16. Law #8.vtt 1.5 KB
    icon 11. Defence in Depth/17. Law #9.mp4 9.2 MB

Similar Torrents

Category
Name
Size
Date
 [FreeCourseSite.com] Udemy - 100 Days of Code The Complete Python Pro Bootcamp for 2023 19.7 GB06/12/234413
 [FreeCourseSite.com] Udemy - Complete Ethical Hacking Bootcamp 2023 Zero to Mastery 10.2 GB07/09/233812
 [FreeCourseSite.com] Udemy - 100 Days of Code The Complete Python Pro Bootcamp for 2023 29.6 GB01/03/233717
 [FreeCourseSite.com] Udemy - 23 Ways To Make Money Online In 2023 - Earn Money Online! 1.6 GB04/05/23311
 [FreeCourseSite.com] Udemy - 20 Great Python Projects To Help You Master It In 2023 1.5 GB06/28/23305
 [FreeCourseSite.com] Udemy - An Entire MBA in 1 Course Award Winning Business School Prof 6 GB07/13/232914
 [FreeCourseSite.com] Udemy - The Python Mega Course Learn Python in 60 Days with 20 Apps 13 GB06/09/23281
 [FreeCourseSite.com] Udemy - The Complete 2023 Web Development Bootcamp 38 GB02/19/232324
 [FreeCourseSite.com] Udemy - ChatGPT Complete Guide Learn Midjourney, ChatGPT 4 & More 9.1 GB04/24/23224
 [FreeCourseSite.com] Udemy - DevOps Beginners to Advanced Decoding DevOps with Projects 16.7 GB01/25/23214
 [FreeCourseSite.com] Udemy - The Ultimate Dark Web, Anonymity, Privacy & Security Course 6.1 GB05/08/23217
 [FreeCourseSite.com] Udemy - Microsoft Excel - Excel from Beginner to Advanced 7.9 GB01/21/23202
 [FreeCourseSite.com] Udemy - Python for Data Science and Machine Learning Bootcamp 4.2 GB02/01/23194
 [FreeCourseSite.com] Udemy - ChatGPT and Midjourney 12 Ways of Earning Money. ChatGPT AI 812 MB04/28/23181
 [FreeCourseSite.com] Udemy - Reverse Engineering & Malware Analysis in 21 Hours REMAC+ 9.1 GB10/02/23181