[DesireCourse.Net] Udemy - Learn Ethical Hacking in 2020 Beginner to Advanced!

Photo unavailable
Category:
Date:
01/22/20 at 1:23pm GMT+1
Submitter:
Seeders:
0
Leechers:
1
File size:
13.7 GB in 99 files

Torrent Status:
  This torrent has NOT been verified. 

Infohash:
d4d1ebe2ffb829f97deba4160587645f40eb367c


File list

  • [DesireCourse.Net] Udemy - Learn Ethical Hacking in 2020 Beginner to Advanced!
  • icon 1. Introduction and Installation/1. Introduction to the course.mp4 59 MB
    icon 1. Introduction and Installation/1. Introduction to the course.srt 6.2 KB
    icon 1. Introduction and Installation/2. VirtualBox installation.mp4 228.3 MB
    icon 1. Introduction and Installation/2. VirtualBox installation.srt 20.6 KB
    icon 1. Introduction and Installation/3. Kali Linux installation.mp4 213.8 MB
    icon 1. Introduction and Installation/3. Kali Linux installation.srt 18 KB
    icon 1. Introduction and Installation/4. Enabling full-screen.mp4 101.5 MB
    icon 1. Introduction and Installation/4. Enabling full-screen.srt 21.7 KB
    icon 10. Python Crash Course/1. Variables.mp4 63.9 MB
    icon 10. Python Crash Course/1. Variables.srt 17.3 KB
    icon 10. Python Crash Course/10. Files in Python.mp4 48.8 MB
    icon 10. Python Crash Course/10. Files in Python.srt 15.5 KB
    icon 10. Python Crash Course/11. Try and except rule.mp4 27.2 MB
    icon 10. Python Crash Course/11. Try and except rule.srt 6.1 KB
    icon 10. Python Crash Course/2. Raw input.mp4 35.2 MB
    icon 10. Python Crash Course/2. Raw input.srt 14.1 KB
    icon 10. Python Crash Course/3. If-else statements.mp4 35.1 MB
    icon 10. Python Crash Course/3. If-else statements.srt 12.5 KB
    icon 10. Python Crash Course/4. For loops.mp4 22 MB
    icon 10. Python Crash Course/4. For loops.srt 8.1 KB
    icon 10. Python Crash Course/5. While loops.mp4 29.2 MB
    icon 10. Python Crash Course/5. While loops.srt 9.8 KB
    icon 10. Python Crash Course/6. Python lists.mp4 27.1 MB
    icon 10. Python Crash Course/6. Python lists.srt 10.5 KB
    icon 10. Python Crash Course/7. Functions.mp4 60.5 MB
    icon 10. Python Crash Course/7. Functions.srt 18.6 KB
    icon 10. Python Crash Course/8. Classes.mp4 38.6 MB
    icon 10. Python Crash Course/8. Classes.srt 13.4 KB
    icon 10. Python Crash Course/9. Importing libraries.mp4 33 MB
    icon 10. Python Crash Course/9. Importing libraries.srt 9 KB
    icon 11. Coding an Advanced Backdoor/1. Theory behind reverse shells.mp4 26.5 MB
    icon 11. Coding an Advanced Backdoor/1. Theory behind reverse shells.srt 8.6 KB
    icon 11. Coding an Advanced Backdoor/10. Creating persistence part 1.mp4 54.2 MB
    icon 11. Coding an Advanced Backdoor/10. Creating persistence part 1.srt 8.1 KB
    icon 11. Coding an Advanced Backdoor/11. Creating persistence part 2.mp4 124.2 MB
    icon 11. Coding an Advanced Backdoor/11. Creating persistence part 2.srt 21 KB
    icon 11. Coding an Advanced Backdoor/12. Changing directory.mp4 83 MB
    icon 11. Coding an Advanced Backdoor/12. Changing directory.srt 14.8 KB
    icon 11. Coding an Advanced Backdoor/13. Uploading and downloading files.mp4 208 MB
    icon 11. Coding an Advanced Backdoor/13. Uploading and downloading files.srt 27.5 KB
    icon 11. Coding an Advanced Backdoor/14. Downloading files from the internet.mp4 154.4 MB
    icon 11. Coding an Advanced Backdoor/14. Downloading files from the internet.srt 28.5 KB
    icon 11. Coding an Advanced Backdoor/15. Starting programs using our backdoor.mp4 45.9 MB
    icon 11. Coding an Advanced Backdoor/15. Starting programs using our backdoor.srt 8.7 KB
    icon 11. Coding an Advanced Backdoor/16. Capturing screenshot on the target PC.mp4 147.5 MB
    icon 11. Coding an Advanced Backdoor/16. Capturing screenshot on the target PC.srt 21.8 KB
    icon 11. Coding an Advanced Backdoor/17. Embedding backdoor in an image part 1.mp4 91.9 MB
    icon 11. Coding an Advanced Backdoor/17. Embedding backdoor in an image part 1.srt 15.8 KB
    icon 11. Coding an Advanced Backdoor/18. Embedding backdoor in an image part 2.mp4 85.7 MB
    icon 11. Coding an Advanced Backdoor/18. Embedding backdoor in an image part 2.srt 10.8 KB
    icon 11. Coding an Advanced Backdoor/19. Checking for administrator privileges.mp4 67.3 MB
    icon 11. Coding an Advanced Backdoor/19. Checking for administrator privileges.srt 15 KB
    icon 11. Coding an Advanced Backdoor/2. Simple server code.mp4 57.4 MB
    icon 11. Coding an Advanced Backdoor/2. Simple server code.srt 15.6 KB
    icon 11. Coding an Advanced Backdoor/20. Adding help option.mp4 60.6 MB
    icon 11. Coding an Advanced Backdoor/20. Adding help option.srt 9.8 KB
    icon 11. Coding an Advanced Backdoor/3. Connection with reverse shell.mp4 43.6 MB
    icon 11. Coding an Advanced Backdoor/3. Connection with reverse shell.srt 9.2 KB
    icon 11. Coding an Advanced Backdoor/4. Sending and receiving messages.mp4 66.7 MB
    icon 11. Coding an Advanced Backdoor/4. Sending and receiving messages.srt 14 KB
    icon 11. Coding an Advanced Backdoor/5. Sending messages with while true loop.mp4 54 MB
    icon 11. Coding an Advanced Backdoor/5. Sending messages with while true loop.srt 10.7 KB
    icon 11. Coding an Advanced Backdoor/6. Executing commands on target system.mp4 64 MB
    icon 11. Coding an Advanced Backdoor/6. Executing commands on target system.srt 11.6 KB
    icon 11. Coding an Advanced Backdoor/7. Fixing backdoor bugs and adding functions.mp4 139.8 MB
    icon 11. Coding an Advanced Backdoor/7. Fixing backdoor bugs and adding functions.srt 25.6 KB
    icon 11. Coding an Advanced Backdoor/8. First test using our backdoor.mp4 127.7 MB
    icon 11. Coding an Advanced Backdoor/8. First test using our backdoor.srt 24.8 KB
    icon 11. Coding an Advanced Backdoor/9. Trying to connect every 20 seconds.mp4 92 MB
    icon 11. Coding an Advanced Backdoor/9. Trying to connect every 20 seconds.srt 16.1 KB
    icon 12. Creating a Keylogger for the Backdoor/1. Importing Pynput.mp4 43.1 MB
    icon 12. Creating a Keylogger for the Backdoor/1. Importing Pynput.srt 13.4 KB
    icon 12. Creating a Keylogger for the Backdoor/2. Simple keylogger.mp4 47.8 MB
    icon 12. Creating a Keylogger for the Backdoor/2. Simple keylogger.srt 11.8 KB
    icon 12. Creating a Keylogger for the Backdoor/3. Adding report function.mp4 54.7 MB
    icon 12. Creating a Keylogger for the Backdoor/3. Adding report function.srt 12.8 KB
    icon 12. Creating a Keylogger for the Backdoor/4. Writing keystrokes to a file.mp4 73.6 MB
    icon 12. Creating a Keylogger for the Backdoor/4. Writing keystrokes to a file.srt 16.3 KB
    icon 12. Creating a Keylogger for the Backdoor/5. Adding the keylogger to our reverse shell part 1.mp4 159.3 MB
    icon 12. Creating a Keylogger for the Backdoor/5. Adding the keylogger to our reverse shell part 1.srt 25.7 KB
    icon 12. Creating a Keylogger for the Backdoor/6. Adding the keylogger to our reverse shell part 2.mp4 45.4 MB
    icon 12. Creating a Keylogger for the Backdoor/6. Adding the keylogger to our reverse shell part 2.srt 8.8 KB
    icon 12. Creating a Keylogger for the Backdoor/7. Final project test.mp4 126.7 MB
    icon 12. Creating a Keylogger for the Backdoor/7. Final project test.srt 18 KB
    icon 13. Basic Authentication Bruteforcer/1. Printing banner.mp4 59.9 MB
    icon 13. Basic Authentication Bruteforcer/1. Printing banner.srt 14.9 KB
    icon 13. Basic Authentication Bruteforcer/2. Adding available options.mp4 57.3 MB
    icon 13. Basic Authentication Bruteforcer/2. Adding available options.srt 13.8 KB
    icon 13. Basic Authentication Bruteforcer/3. Starting threads for bruteforce.mp4 43.6 MB
    icon 13. Basic Authentication Bruteforcer/3. Starting threads for bruteforce.srt 10.5 KB
    icon 13. Basic Authentication Bruteforcer/4. Writing function to run the attack.mp4 65.1 MB
    icon 13. Basic Authentication Bruteforcer/4. Writing function to run the attack.srt 14 KB
    icon 13. Basic Authentication Bruteforcer/5. Bruteforcing router login.mp4 49.2 MB
    icon 13. Basic Authentication Bruteforcer/5. Bruteforcing router login.srt 11.8 KB
    icon 13. Basic Authentication Bruteforcer/6. Bypassing antivirus with your future programs.mp4 103.8 MB
    icon 13. Basic Authentication Bruteforcer/6. Bypassing antivirus with your future programs.srt 16.9 KB
    icon 13. Basic Authentication Bruteforcer/7. Sending malware with spoofed email.mp4 77.9 MB
    icon 13. Basic Authentication Bruteforcer/7. Sending malware with spoofed email.srt 19.8 KB
    icon 14. BONUS - Building a Career in Cyber Security/1. What will you learn in this section.mp4 4.7 MB

Similar Torrents

Category
Name
Size
Date
 [DesireCourse.Com] Udemy - Become a Probability & Statistics Master 884 MB11/03/18180
 [DesireCourse.Com] Udemy - Scrum Certification Prep +Scrum Master+ Agile Scrum Training 639 MB10/27/1870
 [DesireCourse.Com] Udemy - The Digital Painting MEGA Course - Beginner to Advanced 3.2 GB10/12/1860
 [DesireCourse.Com] Udemy - An Entire MBA in 1 CourseAward Winning Business School Prof 3 GB08/07/1851
 [DesireCourse.Net] Udemy - Socket.IO (with websockets) - the details. (socket io v2) 6.9 GB06/17/1950
 [DesireCourse.Net] Udemy - Microservices Designing Highly Scalable Systems 1.1 GB10/09/1950
 [DesireCourse.Net] Udemy - The Build a SAAS App with Flask Course 1.3 GB11/13/1950
 [DesireCourse.Net] Udemy - Network Hacking Continued - Intermediate to Advanced 1.5 GB12/28/1950
 [DesireCourse.Com] Udemy - Microsoft Excel - Data Analysis with Excel Pivot Tables 1.1 GB10/30/1840
 [DesireCourse.Com] Udemy - Communication skills, cooperation and conflict management 1.6 GB11/02/1840
 [DesireCourse Com] Udemy - The Complete Digital Marketing Course 2017 – 12 Courses in 1 3.5 GB11/06/1842
 [DesireCourse.Com] Udemy - Black Algo Trading Build Your Trading Robot 3 GB11/17/1840
 [DesireCourse.Com] Udemy - Microsoft Excel - Intro to Power Query, Power Pivot & DAX 1.1 GB03/25/1940
 [DesireCourse.Com] Udemy - Kubernetes for the Absolute Beginners - Hands-on 1018 MB03/30/1940
 [DesireCourse.Net] Udemy - Character Art School Complete Character Drawing Course 4.4 GB06/22/2040