[FreeTutorials.Us] Udemy - Hacking in Practice Certified Ethical Hacking MEGA Course


[FreeTutorials.Us] Udemy - Hacking in Practice Certified Ethical Hacking MEGA Course
Category:
Date:
09/01/19 at 4:10pm GMT+1
Submitter:
Seeders:
0
Leechers:
1
File size:
4.6 GB in 94 files

Torrent Status:
  This torrent has been verified.

Infohash:
46372d4af2827b138ba968e537bff5be8f7c94ff


File list

  • [FreeTutorials.Us] Udemy - Hacking in Practice Certified Ethical Hacking MEGA Course
  • icon 0. Websites you may like/How you can help Team-FTU.txt 237 B
    icon 1. IT Security Trends/1. Introduction to Current Cyber Threats.mp4 39 MB
    icon 1. IT Security Trends/1. Introduction to Current Cyber Threats.srt 6.1 KB
    icon 1. IT Security Trends/1. Introduction to Current Cyber Threats.vtt 5.3 KB
    icon 1. IT Security Trends/10. Popular Myths About Computer System Security - notes for the examination.pdf 988.5 KB
    icon 1. IT Security Trends/11. Trends in IT Security.mp4 18.7 MB
    icon 1. IT Security Trends/11. Trends in IT Security.srt 4.2 KB
    icon 1. IT Security Trends/11. Trends in IT Security.vtt 3.7 KB
    icon 1. IT Security Trends/12. The birth of technology society.mp4 18.6 MB
    icon 1. IT Security Trends/12. The birth of technology society.srt 3.4 KB
    icon 1. IT Security Trends/12. The birth of technology society.vtt 3.1 KB
    icon 1. IT Security Trends/13. EXERCISE How much info can you gather.mp4 13.8 MB
    icon 1. IT Security Trends/13. EXERCISE How much info can you gather.srt 4.2 KB
    icon 1. IT Security Trends/13. EXERCISE How much info can you gather.vtt 3.7 KB
    icon 1. IT Security Trends/14. Fake identity.mp4 21.8 MB
    icon 1. IT Security Trends/14. Fake identity.srt 5.6 KB
    icon 1. IT Security Trends/14. Fake identity.vtt 4.9 KB
    icon 1. IT Security Trends/15. Online privacy.mp4 32 MB
    icon 1. IT Security Trends/15. Online privacy.srt 6.7 KB
    icon 1. IT Security Trends/15. Online privacy.vtt 5.9 KB
    icon 1. IT Security Trends/16. Analyzing sniffing software.mp4 19.5 MB
    icon 1. IT Security Trends/16. Analyzing sniffing software.srt 3.7 KB
    icon 1. IT Security Trends/16. Analyzing sniffing software.vtt 3.3 KB
    icon 1. IT Security Trends/17. Cyber War.mp4 45.4 MB
    icon 1. IT Security Trends/17. Cyber War.srt 8.8 KB
    icon 1. IT Security Trends/17. Cyber War.vtt 7.7 KB
    icon 1. IT Security Trends/18. Changing IT Security Trends - notes for the examination.pdf 2 MB
    icon 1. IT Security Trends/19. Objective #1 - Data security - Introduction.mp4 38.8 MB
    icon 1. IT Security Trends/19. Objective #1 - Data security - Introduction.srt 7.3 KB
    icon 1. IT Security Trends/19. Objective #1 - Data security - Introduction.vtt 6.4 KB
    icon 1. IT Security Trends/2. IT Prehistory.mp4 44.2 MB
    icon 1. IT Security Trends/2. IT Prehistory.srt 5.7 KB
    icon 1. IT Security Trends/2. IT Prehistory.vtt 5 KB
    icon 1. IT Security Trends/20. Confidentiality of data.mp4 31.7 MB
    icon 1. IT Security Trends/20. Confidentiality of data.srt 5.6 KB
    icon 1. IT Security Trends/20. Confidentiality of data.vtt 4.9 KB
    icon 1. IT Security Trends/21. EXERCISE Finding confidential data with search engines.mp4 23.5 MB
    icon 1. IT Security Trends/21. EXERCISE Finding confidential data with search engines.srt 6 KB
    icon 1. IT Security Trends/21. EXERCISE Finding confidential data with search engines.vtt 5.2 KB
    icon 1. IT Security Trends/22. Integrity of data.mp4 32.1 MB
    icon 1. IT Security Trends/22. Integrity of data.srt 7 KB
    icon 1. IT Security Trends/22. Integrity of data.vtt 6.2 KB
    icon 1. IT Security Trends/23. Data security - notes for the examination.pdf 2 MB
    icon 1. IT Security Trends/3. Let’s look a few years back.mp4 36 MB
    icon 1. IT Security Trends/3. Let’s look a few years back.srt 6 KB
    icon 1. IT Security Trends/3. Let’s look a few years back.vtt 5.3 KB
    icon 1. IT Security Trends/4. Cyber crimes - an evolution not revolution.mp4 30.8 MB
    icon 1. IT Security Trends/4. Cyber crimes - an evolution not revolution.srt 5.8 KB
    icon 1. IT Security Trends/4. Cyber crimes - an evolution not revolution.vtt 5.1 KB
    icon 1. IT Security Trends/5. Current Cyber Threats - notes for the examination.pdf 1.5 MB
    icon 1. IT Security Trends/6. Popular myths about IT security - origins.mp4 44.2 MB
    icon 1. IT Security Trends/6. Popular myths about IT security - origins.srt 6.4 KB
    icon 1. IT Security Trends/6. Popular myths about IT security - origins.vtt 5.6 KB
    icon 1. IT Security Trends/7. Myths #1 - you’ll never be hacked.mp4 29.2 MB
    icon 1. IT Security Trends/7. Myths #1 - you’ll never be hacked.srt 6.9 KB
    icon 1. IT Security Trends/7. Myths #1 - you’ll never be hacked.vtt 6 KB
    icon 1. IT Security Trends/8. Myths #2 - you don’t need any protection software or hardware.mp4 25.8 MB
    icon 1. IT Security Trends/8. Myths #2 - you don’t need any protection software or hardware.srt 6.3 KB
    icon 1. IT Security Trends/8. Myths #2 - you don’t need any protection software or hardware.vtt 5.5 KB
    icon 1. IT Security Trends/9. Myths #3 - IT security is always a priority.mp4 6 MB
    icon 1. IT Security Trends/9. Myths #3 - IT security is always a priority.srt 1.3 KB
    icon 1. IT Security Trends/9. Myths #3 - IT security is always a priority.vtt 1.1 KB
    icon 10. Risk Management/1. Introduction to Risk Management.mp4 3.9 MB
    icon 10. Risk Management/1. Introduction to Risk Management.srt 1.6 KB
    icon 10. Risk Management/1. Introduction to Risk Management.vtt 1.4 KB
    icon 10. Risk Management/10. DREAD Exploitability.mp4 13.9 MB
    icon 10. Risk Management/10. DREAD Exploitability.srt 5.9 KB
    icon 10. Risk Management/10. DREAD Exploitability.vtt 5.2 KB
    icon 10. Risk Management/11. EXERCISE Risk Assessment.mp4 18.1 MB
    icon 10. Risk Management/11. EXERCISE Risk Assessment.srt 8.1 KB
    icon 10. Risk Management/11. EXERCISE Risk Assessment.vtt 7.2 KB
    icon 10. Risk Management/12. Risk Assessment - notes for the examination.html 10 B
    icon 10. Risk Management/12.1 03-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf 1.8 MB
    icon 10. Risk Management/13. Introduction to Social Engineering and rogue software.mp4 11.4 MB
    icon 10. Risk Management/13. Introduction to Social Engineering and rogue software.srt 4.7 KB
    icon 10. Risk Management/13. Introduction to Social Engineering and rogue software.vtt 4.1 KB
    icon 10. Risk Management/14. Manipulation tactics.mp4 22.2 MB
    icon 10. Risk Management/14. Manipulation tactics.srt 10.4 KB
    icon 10. Risk Management/14. Manipulation tactics.vtt 9.2 KB
    icon 10. Risk Management/15. EXERCISE Social Engineering attacks.mp4 19 MB
    icon 10. Risk Management/15. EXERCISE Social Engineering attacks.srt 6.8 KB
    icon 10. Risk Management/15. EXERCISE Social Engineering attacks.vtt 6 KB
    icon 10. Risk Management/16. SE with KALI BackTrack.mp4 16.2 MB
    icon 10. Risk Management/16. SE with KALI BackTrack.srt 7.3 KB
    icon 10. Risk Management/16. SE with KALI BackTrack.vtt 6.4 KB
    icon 10. Risk Management/17. Rogue Software.mp4 7.4 MB
    icon 10. Risk Management/17. Rogue Software.srt 2.7 KB
    icon 10. Risk Management/17. Rogue Software.vtt 2.4 KB
    icon 10. Risk Management/18. Fraud tools #1.mp4 20 MB
    icon 10. Risk Management/18. Fraud tools #1.srt 7.3 KB
    icon 10. Risk Management/18. Fraud tools #1.vtt 6.4 KB
    icon 10. Risk Management/19. Fraud tools #2.mp4 17.7 MB
    icon 10. Risk Management/19. Fraud tools #2.srt 7.2 KB
    icon 10. Risk Management/19. Fraud tools #2.vtt 6.3 KB

Similar Torrents