[DesireCourse.Net] Udemy - The Complete Ethical Hacking Course for 2019!

Photo unavailable
Category:
Date:
08/08/19 at 2:25pm GMT+1
Submitter:
Seeders:
0
Leechers:
1
File size:
8.2 GB in 99 files

Torrent Status:
  This torrent has NOT been verified. 

Infohash:
fad0bed4c9229fd4d79c9b03f8398aae6af7f987


File list

  • [DesireCourse.Net] Udemy - The Complete Ethical Hacking Course for 2019!
  • icon 1. Introduction to Ethical Hacking/1. What is an ethical hacker.mp4 22.7 MB
    icon 1. Introduction to Ethical Hacking/1. What is an ethical hacker.vtt 6.2 KB
    icon 1. Introduction to Ethical Hacking/1.1 Section 1 - Introduction to Ethical Hacking.pptx.pptx 38.1 KB
    icon 1. Introduction to Ethical Hacking/2. Terminology crash course pt. 1.mp4 41.6 MB
    icon 1. Introduction to Ethical Hacking/2. Terminology crash course pt. 1.vtt 8.6 KB
    icon 1. Introduction to Ethical Hacking/3. Terminology crash course pt. 2.mp4 59.7 MB
    icon 1. Introduction to Ethical Hacking/3. Terminology crash course pt. 2.vtt 13.3 KB
    icon 1. Introduction to Ethical Hacking/4. Terminology crash course pt. 3.mp4 37.3 MB
    icon 1. Introduction to Ethical Hacking/4. Terminology crash course pt. 3.vtt 7.8 KB
    icon 1. Introduction to Ethical Hacking/5. Confidentiality, integrity, and availability.mp4 45.3 MB
    icon 1. Introduction to Ethical Hacking/5. Confidentiality, integrity, and availability.vtt 12.5 KB
    icon 1. Introduction to Ethical Hacking/6. Legal considerations.mp4 38.8 MB
    icon 1. Introduction to Ethical Hacking/6. Legal considerations.vtt 10.7 KB
    icon 2. Reconnaissance - Surveying the Attack Surface/1. Surveying the attack surface.mp4 35.6 MB
    icon 2. Reconnaissance - Surveying the Attack Surface/1. Surveying the attack surface.vtt 10.5 KB
    icon 2. Reconnaissance - Surveying the Attack Surface/1.1 Section 2 - Reconnaissance.pptx.pptx 42.2 KB
    icon 2. Reconnaissance - Surveying the Attack Surface/10. DEMO - Information collection using Recon-ng.mp4 73.5 MB
    icon 2. Reconnaissance - Surveying the Attack Surface/10. DEMO - Information collection using Recon-ng.vtt 4.6 KB
    icon 2. Reconnaissance - Surveying the Attack Surface/2. Recon types and goals.mp4 36.5 MB
    icon 2. Reconnaissance - Surveying the Attack Surface/2. Recon types and goals.vtt 7.8 KB
    icon 2. Reconnaissance - Surveying the Attack Surface/3. Passive recon pt. 1.mp4 36.7 MB
    icon 2. Reconnaissance - Surveying the Attack Surface/3. Passive recon pt. 1.vtt 6.5 KB
    icon 2. Reconnaissance - Surveying the Attack Surface/4. Passive recon pt. 2.mp4 50 MB
    icon 2. Reconnaissance - Surveying the Attack Surface/4. Passive recon pt. 2.vtt 10.2 KB
    icon 2. Reconnaissance - Surveying the Attack Surface/5. Active recon.mp4 65.2 MB
    icon 2. Reconnaissance - Surveying the Attack Surface/5. Active recon.vtt 13.8 KB
    icon 2. Reconnaissance - Surveying the Attack Surface/6. Recon walk-through and tools summary.mp4 87.7 MB
    icon 2. Reconnaissance - Surveying the Attack Surface/6. Recon walk-through and tools summary.vtt 13.8 KB
    icon 2. Reconnaissance - Surveying the Attack Surface/7. DEMO - Maltego real world example.mp4 89.4 MB
    icon 2. Reconnaissance - Surveying the Attack Surface/7. DEMO - Maltego real world example.vtt 5.6 KB
    icon 2. Reconnaissance - Surveying the Attack Surface/8. DEMO - FOCA to examine metadata.mp4 53.1 MB
    icon 2. Reconnaissance - Surveying the Attack Surface/8. DEMO - FOCA to examine metadata.vtt 3.7 KB
    icon 2. Reconnaissance - Surveying the Attack Surface/9. DEMO - Harvester.mp4 17 MB
    icon 2. Reconnaissance - Surveying the Attack Surface/9. DEMO - Harvester.vtt 1.9 KB
    icon 3. Scanning and Enumeration - Getting Down to Business/1. Scanning & enumeration.mp4 31.8 MB
    icon 3. Scanning and Enumeration - Getting Down to Business/1. Scanning & enumeration.vtt 7.5 KB
    icon 3. Scanning and Enumeration - Getting Down to Business/1.1 Section 3 - Scanning and Enumeration.pptx.pptx 42.8 KB
    icon 3. Scanning and Enumeration - Getting Down to Business/10. DEMO - Nmap hosts discovery.mp4 106.9 MB
    icon 3. Scanning and Enumeration - Getting Down to Business/10. DEMO - Nmap hosts discovery.vtt 8.9 KB
    icon 3. Scanning and Enumeration - Getting Down to Business/11. DEMO - Nmap service discovery.mp4 166.6 MB
    icon 3. Scanning and Enumeration - Getting Down to Business/11. DEMO - Nmap service discovery.vtt 12.6 KB
    icon 3. Scanning and Enumeration - Getting Down to Business/12. DEMO - Nmap scripts.mp4 140.3 MB
    icon 3. Scanning and Enumeration - Getting Down to Business/12. DEMO - Nmap scripts.vtt 9.3 KB
    icon 3. Scanning and Enumeration - Getting Down to Business/13. DEMO - masscan.mp4 111.5 MB
    icon 3. Scanning and Enumeration - Getting Down to Business/13. DEMO - masscan.vtt 8.7 KB
    icon 3. Scanning and Enumeration - Getting Down to Business/2. Identifying active hosts pt. 1.mp4 41.3 MB
    icon 3. Scanning and Enumeration - Getting Down to Business/2. Identifying active hosts pt. 1.vtt 9.2 KB
    icon 3. Scanning and Enumeration - Getting Down to Business/3. Identifying active hosts pt. 2.mp4 56.3 MB
    icon 3. Scanning and Enumeration - Getting Down to Business/3. Identifying active hosts pt. 2.vtt 12.5 KB
    icon 3. Scanning and Enumeration - Getting Down to Business/4. Identifying active services.mp4 71.8 MB
    icon 3. Scanning and Enumeration - Getting Down to Business/4. Identifying active services.vtt 17.4 KB
    icon 3. Scanning and Enumeration - Getting Down to Business/5. OS and services fingerprinting.mp4 56.9 MB
    icon 3. Scanning and Enumeration - Getting Down to Business/5. OS and services fingerprinting.vtt 13.4 KB
    icon 3. Scanning and Enumeration - Getting Down to Business/6. Network mapping.mp4 37.7 MB
    icon 3. Scanning and Enumeration - Getting Down to Business/6. Network mapping.vtt 9.3 KB
    icon 3. Scanning and Enumeration - Getting Down to Business/7. Final thoughts.mp4 51 MB
    icon 3. Scanning and Enumeration - Getting Down to Business/7. Final thoughts.vtt 10.3 KB
    icon 3. Scanning and Enumeration - Getting Down to Business/8. DEMO - Nmap syntax pt. 1.mp4 143.5 MB
    icon 3. Scanning and Enumeration - Getting Down to Business/8. DEMO - Nmap syntax pt. 1.vtt 13.5 KB
    icon 3. Scanning and Enumeration - Getting Down to Business/9. DEMO - Nmap syntax pt. 2.mp4 192.3 MB
    icon 3. Scanning and Enumeration - Getting Down to Business/9. DEMO - Nmap syntax pt. 2.vtt 15.1 KB
    icon 4. Network Presence/1. Network insecurity.mp4 28.1 MB
    icon 4. Network Presence/1. Network insecurity.vtt 3.4 KB
    icon 4. Network Presence/1.1 Section 4 - Network Presence.pptx.pptx 12.2 MB
    icon 4. Network Presence/2. Sniffing and spoofing.mp4 72.2 MB
    icon 4. Network Presence/2. Sniffing and spoofing.vtt 11.6 KB
    icon 4. Network Presence/3. Sniffing tools.mp4 44.2 MB
    icon 4. Network Presence/3. Sniffing tools.vtt 8.3 KB
    icon 4. Network Presence/4. Spoofing, crypto, and wifi.mp4 62.9 MB
    icon 4. Network Presence/4. Spoofing, crypto, and wifi.vtt 14.2 KB
    icon 4. Network Presence/5. DEMO - tcpdump.mp4 131.2 MB
    icon 4. Network Presence/5. DEMO - tcpdump.vtt 7.9 KB
    icon 4. Network Presence/6. DEMO - Wireshark.mp4 112.5 MB
    icon 4. Network Presence/6. DEMO - Wireshark.vtt 9 KB
    icon 4. Network Presence/7. DEMO - Ettercap.mp4 152.6 MB
    icon 4. Network Presence/7. DEMO - Ettercap.vtt 9.9 KB
    icon 4. Network Presence/8. DEMO - Burp Suite.mp4 122.7 MB
    icon 4. Network Presence/8. DEMO - Burp Suite.vtt 13.9 KB
    icon 4. Network Presence/9. DEMO - Scapy.mp4 66.1 MB
    icon 4. Network Presence/9. DEMO - Scapy.vtt 8.1 KB
    icon 5. Attacking/1. Security overview pt. 1 Windows architecture.mp4 91.8 MB
    icon 5. Attacking/1. Security overview pt. 1 Windows architecture.vtt 15.8 KB
    icon 5. Attacking/1.1 Section 5 - Attacking.pptx.pptx 40.2 KB
    icon 5. Attacking/10. DEMO - Windows msf exploit pt. 1.mp4 141.2 MB
    icon 5. Attacking/10. DEMO - Windows msf exploit pt. 1.vtt 10.5 KB
    icon 5. Attacking/11. DEMO - Windows msf exploit pt. 2.mp4 199 MB
    icon 5. Attacking/11. DEMO - Windows msf exploit pt. 2.vtt 12.1 KB
    icon 5. Attacking/12. DEMO - Post exploitation activities.mp4 132.9 MB
    icon 5. Attacking/12. DEMO - Post exploitation activities.vtt 10.1 KB
    icon 5. Attacking/13. DEMO - Mimikatz.mp4 47.7 MB
    icon 5. Attacking/13. DEMO - Mimikatz.vtt 6.8 KB
    icon 5. Attacking/14. DEMO - Dumping hashes.mp4 27.3 MB
    icon 5. Attacking/14. DEMO - Dumping hashes.vtt 2.7 KB
    icon 5. Attacking/15. DEMO - Hashcat.mp4 94.1 MB
    icon 5. Attacking/15. DEMO - Hashcat.vtt 6.3 KB
    icon 5. Attacking/16. DEMO - Konboot.mp4 138.5 MB
    icon 5. Attacking/16. DEMO - Konboot.vtt 10.2 KB
    icon 5. Attacking/17. DEMO - Post exploitation Windows cmd.mp4 124.5 MB
    icon 5. Attacking/17. DEMO - Post exploitation Windows cmd.vtt 12.1 KB

Similar Torrents

Category
Name
Size
Date
 [DesireCourse.Com] Udemy - Become a Probability & Statistics Master 884 MB11/03/18180
 [DesireCourse.Com] Udemy - Scrum Certification Prep +Scrum Master+ Agile Scrum Training 639 MB10/27/1870
 [DesireCourse.Com] Udemy - The Digital Painting MEGA Course - Beginner to Advanced 3.2 GB10/12/1860
 [DesireCourse.Com] Udemy - An Entire MBA in 1 CourseAward Winning Business School Prof 3 GB08/07/1851
 [DesireCourse.Net] Udemy - Socket.IO (with websockets) - the details. (socket io v2) 6.9 GB06/17/1950
 [DesireCourse.Net] Udemy - Microservices Designing Highly Scalable Systems 1.1 GB10/09/1950
 [DesireCourse.Net] Udemy - The Build a SAAS App with Flask Course 1.3 GB11/13/1950
 [DesireCourse.Net] Udemy - Network Hacking Continued - Intermediate to Advanced 1.5 GB12/28/1950
 [DesireCourse.Com] Udemy - Microsoft Excel - Data Analysis with Excel Pivot Tables 1.1 GB10/30/1840
 [DesireCourse.Com] Udemy - Communication skills, cooperation and conflict management 1.6 GB11/02/1840
 [DesireCourse Com] Udemy - The Complete Digital Marketing Course 2017 – 12 Courses in 1 3.5 GB11/06/1842
 [DesireCourse.Com] Udemy - Black Algo Trading Build Your Trading Robot 3 GB11/17/1840
 [DesireCourse.Com] Udemy - Microsoft Excel - Intro to Power Query, Power Pivot & DAX 1.1 GB03/25/1940
 [DesireCourse.Com] Udemy - Kubernetes for the Absolute Beginners - Hands-on 1018 MB03/30/1940
 [DesireCourse.Net] Udemy - Character Art School Complete Character Drawing Course 4.4 GB06/22/2040