[UdemyCourseDownloader] Hacking in Practice Certified Ethical Hacking MEGA Course

Photo unavailable
Category:
Date:
02/03/19 at 1:15pm GMT+1
Submitter:
Seeders:
0
Leechers:
1
File size:
2.4 GB in 98 files

Torrent Status:
  This torrent has been verified.

Infohash:
27d35914096953d1230a19bf5d3cc5ff63c8ebb5


File list

  • [UdemyCourseDownloader] Hacking in Practice Certified Ethical Hacking MEGA Course
  • icon 01. IT Security Trends/1. Introduction to Current Cyber Threats.mp4 6.7 MB
    icon 01. IT Security Trends/1. Introduction to Current Cyber Threats.vtt 5.3 KB
    icon 01. IT Security Trends/10. Popular Myths About Computer System Security - notes for the examination.pdf 988.5 KB
    icon 01. IT Security Trends/11. Trends in IT Security.mp4 5.6 MB
    icon 01. IT Security Trends/11. Trends in IT Security.vtt 3.7 KB
    icon 01. IT Security Trends/12. The birth of technology society.mp4 5.7 MB
    icon 01. IT Security Trends/12. The birth of technology society.vtt 3.1 KB
    icon 01. IT Security Trends/13. EXERCISE How much info can you gather.mp4 5.4 MB
    icon 01. IT Security Trends/13. EXERCISE How much info can you gather.vtt 3.7 KB
    icon 01. IT Security Trends/14. Fake identity.mp4 7.9 MB
    icon 01. IT Security Trends/14. Fake identity.vtt 4.9 KB
    icon 01. IT Security Trends/15. Online privacy.mp4 9.5 MB
    icon 01. IT Security Trends/15. Online privacy.vtt 5.9 KB
    icon 01. IT Security Trends/16. Analyzing sniffing software.mp4 5.8 MB
    icon 01. IT Security Trends/16. Analyzing sniffing software.vtt 3.3 KB
    icon 01. IT Security Trends/17. Cyber War.mp4 13.7 MB
    icon 01. IT Security Trends/17. Cyber War.vtt 7.7 KB
    icon 01. IT Security Trends/18. Changing IT Security Trends - notes for the examination.pdf 2.1 MB
    icon 01. IT Security Trends/19. Objective #1 - Data security - Introduction.mp4 11.4 MB
    icon 01. IT Security Trends/19. Objective #1 - Data security - Introduction.vtt 6.4 KB
    icon 01. IT Security Trends/2. IT Prehistory.mp4 7.8 MB
    icon 01. IT Security Trends/2. IT Prehistory.vtt 5 KB
    icon 01. IT Security Trends/20. Confidentiality of data.mp4 9.6 MB
    icon 01. IT Security Trends/20. Confidentiality of data.vtt 4.9 KB
    icon 01. IT Security Trends/21. EXERCISE Finding confidential data with search engines.mp4 8.9 MB
    icon 01. IT Security Trends/21. EXERCISE Finding confidential data with search engines.vtt 5.2 KB
    icon 01. IT Security Trends/22. Integrity of data.mp4 10.1 MB
    icon 01. IT Security Trends/22. Integrity of data.vtt 6.2 KB
    icon 01. IT Security Trends/23. Data security - notes for the examination.pdf 2 MB
    icon 01. IT Security Trends/3. Let’s look a few years back.mp4 7.3 MB
    icon 01. IT Security Trends/3. Let’s look a few years back.vtt 5.3 KB
    icon 01. IT Security Trends/4. Cyber crimes - an evolution not revolution.mp4 6.4 MB
    icon 01. IT Security Trends/4. Cyber crimes - an evolution not revolution.vtt 5.1 KB
    icon 01. IT Security Trends/5. Current Cyber Threats - notes for the examination.pdf 1.5 MB
    icon 01. IT Security Trends/6. Popular myths about IT security - origins.mp4 8.3 MB
    icon 01. IT Security Trends/6. Popular myths about IT security - origins.vtt 5.6 KB
    icon 01. IT Security Trends/7. Myths #1 - you’ll never be hacked.mp4 8.7 MB
    icon 01. IT Security Trends/7. Myths #1 - you’ll never be hacked.vtt 6 KB
    icon 01. IT Security Trends/8. Myths #2 - you don’t need any protection software or hardware.mp4 7.5 MB
    icon 01. IT Security Trends/8. Myths #2 - you don’t need any protection software or hardware.vtt 5.5 KB
    icon 01. IT Security Trends/9. Myths #3 - IT security is always a priority.mp4 1.6 MB
    icon 01. IT Security Trends/9. Myths #3 - IT security is always a priority.vtt 1.1 KB
    icon 02. Computer Network Security/1. Network security - introduction.mp4 6.9 MB
    icon 02. Computer Network Security/1. Network security - introduction.vtt 5.6 KB
    icon 02. Computer Network Security/10. OSI MODEL #4 - Transport Layer.mp4 8.4 MB
    icon 02. Computer Network Security/10. OSI MODEL #4 - Transport Layer.vtt 5.6 KB
    icon 02. Computer Network Security/11. Threats Enumerating Remote Computers.mp4 4.7 MB
    icon 02. Computer Network Security/11. Threats Enumerating Remote Computers.vtt 3.6 KB
    icon 02. Computer Network Security/12. EXERCISE Transport Layer Attack using METASPLOIT part 1.mp4 4.8 MB
    icon 02. Computer Network Security/12. EXERCISE Transport Layer Attack using METASPLOIT part 1.vtt 5.2 KB
    icon 02. Computer Network Security/13. EXERCISE Transport Layer Attack using METASPLOIT part 2.mp4 9.1 MB
    icon 02. Computer Network Security/13. EXERCISE Transport Layer Attack using METASPLOIT part 2.vtt 5 KB
    icon 02. Computer Network Security/14. OSI MODEL #5 - Session Layer.mp4 4.9 MB
    icon 02. Computer Network Security/14. OSI MODEL #5 - Session Layer.vtt 3.6 KB
    icon 02. Computer Network Security/15. Transport Protocols - notes for the examination.pdf 1.1 MB
    icon 02. Computer Network Security/16. OSI MODEL #6 - Presentation Layer.mp4 11.2 MB
    icon 02. Computer Network Security/16. OSI MODEL #6 - Presentation Layer.vtt 6 KB
    icon 02. Computer Network Security/17. OSI MODEL #7 - Application Layer.mp4 5.4 MB
    icon 02. Computer Network Security/17. OSI MODEL #7 - Application Layer.vtt 3.7 KB
    icon 02. Computer Network Security/18. EXERCISE Application Layer Attacks.mp4 7.6 MB
    icon 02. Computer Network Security/18. EXERCISE Application Layer Attacks.vtt 5.1 KB
    icon 02. Computer Network Security/19. Backtrack Attack Demonstration.mp4 5.9 MB
    icon 02. Computer Network Security/19. Backtrack Attack Demonstration.vtt 3.3 KB
    icon 02. Computer Network Security/2. OSI MODEL #1 - Physical layer.mp4 9 MB
    icon 02. Computer Network Security/2. OSI MODEL #1 - Physical layer.vtt 5.7 KB
    icon 02. Computer Network Security/20. Man-in-the-Middle and Denial of Service Attacks.mp4 4.4 MB
    icon 02. Computer Network Security/20. Man-in-the-Middle and Denial of Service Attacks.vtt 2.6 KB
    icon 02. Computer Network Security/21. Modifying Transmitted Packets.mp4 8.5 MB
    icon 02. Computer Network Security/21. Modifying Transmitted Packets.vtt 4.5 KB
    icon 02. Computer Network Security/22. Unencrypted protocols.mp4 4.3 MB
    icon 02. Computer Network Security/22. Unencrypted protocols.vtt 2.9 KB
    icon 02. Computer Network Security/23. Application Protocols - notes for the examination.pdf 2.2 MB
    icon 02. Computer Network Security/3. OSI MODEL #2 - Data link layer.mp4 7.1 MB
    icon 02. Computer Network Security/3. OSI MODEL #2 - Data link layer.vtt 4.6 KB
    icon 02. Computer Network Security/4. Threats MAC spoofing.mp4 8.6 MB
    icon 02. Computer Network Security/4. Threats MAC spoofing.vtt 5.8 KB
    icon 02. Computer Network Security/5. Threats ARP Poisoning.mp4 9.8 MB
    icon 02. Computer Network Security/5. Threats ARP Poisoning.vtt 6.7 KB
    icon 02. Computer Network Security/6. EXERCISE Data Link Layer Attack.mp4 12.4 MB
    icon 02. Computer Network Security/6. EXERCISE Data Link Layer Attack.vtt 7 KB
    icon 02. Computer Network Security/7. OSI MODEL #3 - Network layer.mp4 9.8 MB
    icon 02. Computer Network Security/7. OSI MODEL #3 - Network layer.vtt 6.3 KB
    icon 02. Computer Network Security/8. TCP Tunnelling over ICMP.mp4 11.1 MB
    icon 02. Computer Network Security/8. TCP Tunnelling over ICMP.vtt 6.8 KB
    icon 02. Computer Network Security/9. Network Protocols - notes for the examination.pdf 2.2 MB
    icon 03. Designing Secure Computer Networks/1. Designing Computer Networks - introduction.mp4 3.2 MB
    icon 03. Designing Secure Computer Networks/1. Designing Computer Networks - introduction.vtt 2.2 KB
    icon 03. Designing Secure Computer Networks/2. Subnetting IPv4.mp4 9 MB
    icon 03. Designing Secure Computer Networks/2. Subnetting IPv4.vtt 7 KB
    icon 03. Designing Secure Computer Networks/3. Subnetting IPv6.mp4 5.2 MB
    icon 03. Designing Secure Computer Networks/3. Subnetting IPv6.vtt 3.1 KB
    icon 03. Designing Secure Computer Networks/4. Subnetting - notes for the examination.pdf 1.4 MB
    icon 03. Designing Secure Computer Networks/5. IPv6 address notation.mp4 9 MB
    icon 03. Designing Secure Computer Networks/5. IPv6 address notation.vtt 6.1 KB
    icon 03. Designing Secure Computer Networks/6. DMZ demilitarized Zone.mp4 9.6 MB
    icon 03. Designing Secure Computer Networks/6. DMZ demilitarized Zone.vtt 6.1 KB
    icon 03. Designing Secure Computer Networks/7. Protocols and services IP SEC.mp4 13.2 MB
    icon 13. Application Security/6. Automated SQL Injection.mp4 29.5 MB

Similar Torrents