239 - Certified Ethical Hacker (CEH) - Linux Academy's Prep Course

Photo unavailable
Category:
Date:
01/26/20 at 12:13pm GMT+1
Submitter:
Seeders:
0
Leechers:
1
File size:
13.2 GB in 99 files

Torrent Status:
  This torrent has NOT been verified. 

Infohash:
f08b3dd1d5d3972d4e7fa44487db42ac0ee94a01


File list

  • 239 - Certified Ethical Hacker (CEH) - Linux Academy's Prep Course
  • icon 001 - About the Author.mp4 22.6 MB
    icon 002 - About the Course.mp4 80.9 MB
    icon 003 - Course Requirements.mp4 55.9 MB
    icon 004 - How to Get Help.mp4 71.3 MB
    icon 005 - About the Exam.mp4 134.5 MB
    icon 006 - Chapter Introduction.mp4 28.3 MB
    icon 007 - Common Terms (Hack Value, Vulnerability, Exploit, Payload).mp4 62.1 MB
    icon 008 - Zero Day Attack.mp4 64.2 MB
    icon 009 - Daisy Chaining.mp4 86.3 MB
    icon 010 - QUIZ SOLUTION: Overview of Information Security - Questions answered and explained.mp4 58.2 MB
    icon 011 - Chapter Introduction.mp4 8.8 MB
    icon 012 - Threats vs Attacks.mp4 28.7 MB
    icon 013 - Motives and Reasons Behind Cyber Security Attacks.mp4 30.7 MB
    icon 014 - What Are the Means by Which Hackers Gain Access to Systems and Networks?.mp4 12.3 MB
    icon 015 - Cloud Computing Threats.mp4 75.2 MB
    icon 016 - Advanced Presistent Threats.mp4 24.1 MB
    icon 017 - Viruses and Worms.mp4 37.9 MB
    icon 018 - Ransomware.mp4 60.2 MB
    icon 019 - Mobile Threats.mp4 42.6 MB
    icon 020 - Modern Age Information Warfare.mp4 53.1 MB
    icon 021 - Insider Attacks.mp4 20.8 MB
    icon 022 - Phishing.mp4 27.5 MB
    icon 023 - Web Application Threats.mp4 28.5 MB
    icon 024 - Classification of Threats: Network Threats.mp4 32.8 MB
    icon 025 - Clasification of Threats: Host Threats.mp4 27.8 MB
    icon 026 - Clasification of Threats: Application Threats.mp4 44.7 MB
    icon 027 - Classification of Attacks.mp4 141.3 MB
    icon 028 - Botnets.mp4 34.1 MB
    icon 029 - Laws, Standards, and Regulations.mp4 132.8 MB
    icon 030 - QUIZ SOLUTION: Overview of Information Security Threats and Attacks - Questions answered and explained.mp4 67.1 MB
    icon 031 - A Brief Look at the History of Hacking.mp4 119 MB
    icon 032 - Types of Hackers.mp4 85.9 MB
    icon 033 - What is Ethical Hacking? What is Its Purpose?.mp4 28.4 MB
    icon 034 - Scope of Ethical Hacking.mp4 36.6 MB
    icon 035 - Hacking Stages: Reconnaissance.mp4 24.7 MB
    icon 036 - Hacking Stages: Scanning.mp4 18.8 MB
    icon 037 - Hacking Stages: Gaining Access.mp4 6.5 MB
    icon 038 - Hacking Stages: Maintaining Access.mp4 32.8 MB
    icon 039 - Hacking Stages: Clearing Tracks.mp4 29.5 MB
    icon 040 - QUIZ SOLUTION: History of Hacking - Questions answered and explained.mp4 82.6 MB
    icon 041 - Chapter Introduction.mp4 57.4 MB
    icon 042 - Information Assurance.mp4 135.2 MB
    icon 043 - EISA and Information security management program.mp4 118.6 MB
    icon 044 - Network Zoning.mp4 155.9 MB
    icon 045 - Defense in Depth.mp4 131 MB
    icon 046 - What Sort of Things Do Policies Regulate?.mp4 150.3 MB
    icon 047 - Workplace Security Policies and Examples.mp4 108.3 MB
    icon 048 - Physical Security Controls and Risk.mp4 116.4 MB
    icon 049 - Risk Management.mp4 127.3 MB
    icon 050 - Threat Modeling and Incident Management.mp4 212.9 MB
    icon 051 - UBA - User Behavior Analytics and Network Security Controls.mp4 83.6 MB
    icon 052 - Access Controls.mp4 83.5 MB
    icon 053 - Identification Authentication Authorization Accounting and IAM.mp4 122.3 MB
    icon 054 - Data Leakage.mp4 98.5 MB
    icon 055 - Data Backup.mp4 223.1 MB
    icon 056 - Data Recovery.mp4 28.1 MB
    icon 057 - QUIZ SOLUTION: Protecting Information - Questions answered and explained.mp4 87.1 MB
    icon 058 - What Is Penetration Testing?.mp4 37.9 MB
    icon 059 - What Does a Good Penetration Test Consist of?.mp4 130 MB
    icon 060 - Why Do a Penetration Test.mp4 123.6 MB
    icon 061 - Pre-Attack Phase: Contracts.mp4 29.9 MB
    icon 062 - Audit vs Vulnerability Assessment vs Penetration Test.mp4 26.5 MB
    icon 063 - Red vs Blue Team!.mp4 32.2 MB
    icon 064 - Types of Penetration Testing.mp4 80.5 MB
    icon 065 - Pre-Attack Phase: Rules of Engagement.mp4 26.3 MB
    icon 066 - Pre-Attack Phase: Understanding your Client's requirements.mp4 43.7 MB
    icon 067 - Pre-Attack Phase: Scope of a Penetration Test.mp4 76.8 MB
    icon 068 - Pre-Attack Phase: Information Gathering.mp4 70.8 MB
    icon 069 - Pre-Attack Phase: Two Types of Information Gathering.mp4 60.5 MB
    icon 070 - Attack Phase.mp4 15.9 MB
    icon 071 - Attack Phase: Penetrating the Perimeter.mp4 46.7 MB
    icon 072 - Attack Phase: Target Acquisition.mp4 30.8 MB
    icon 073 - Attack Phase: Privilege Escalation.mp4 31.8 MB
    icon 074 - Attack Phase: Execute, Implant, Retract.mp4 36.6 MB
    icon 075 - Post-Attack Phase.mp4 23.5 MB
    icon 076 - Security Testing Methodologies.mp4 77.5 MB
    icon 077 - QUIZ SOLUTION: Penetration Testing - Questions answered and explained.mp4 65.3 MB
    icon 078 - About Footprinting.mp4 34 MB
    icon 079 - Hacker State of Mind.mp4 59.9 MB
    icon 080 - Search Engine and Online Resources.mp4 196.7 MB
    icon 081 - Whois GeoIpLocation and DNS Interogation.mp4 145.8 MB
    icon 082 - Email Header Analysis.mp4 164.5 MB
    icon 083 - Getting an IP Address from an Email and More.mp4 167.4 MB
    icon 084 - Quick Look at a Website Certificate, Source Code and Traffic.mp4 169.9 MB
    icon 085 - How to Clone a Website and Extract Metadata from Files.mp4 186.2 MB
    icon 086 - Nmap and Traceroute.mp4 201.3 MB
    icon 087 - QUIZ SOLUTION: Footprinting - Questions answered and explained.mp4 55.1 MB
    icon 088 - Countermeasures and Best Practices.mp4 121.6 MB
    icon 089 - What Goes into a Footprinting Report?.mp4 56.5 MB
    icon 090 - QUIZ SOLUTION: Reports and Countermeasures - Questions answered and explained.mp4 50.1 MB
    icon 091 - Banner Grabbing.mp4 54.8 MB
    icon 092 - Drawing and Mapping Out Network Topologies.mp4 97.3 MB
    icon 093 - Scanning for Vulnerabilities.mp4 143.2 MB
    icon 094 - Enumeration.mp4 72.3 MB
    icon 095 - QUIZ SOLUTION: Network Scanning Techniques - Questions answered and explained.mp4 57 MB
    icon 096 - Password Cracking, Crunch, and Some Basics.mp4 170 MB
    icon 097 - Using Hydra for online password cracking.mp4 181.7 MB
    icon 098 - Hashcat: Environment Setup.mp4 178.4 MB
    icon 099 - HashCat: Installation.mp4 79 MB

No Similar Torrents Found

If we find similar torrents, we normally show them right here. We couldn't find anything for "Certified Ethical Hacker CEH Linux Academy's Prep Course".