Cyber Security For beginners™ 2020Cyber Security 0 to Hero


Cyber Security For beginners™ 2020Cyber Security 0 to Hero
Category:
Date:
10/20/20 at 10:31pm GMT+1
Submitter:
Seeders:
0
Leechers:
1
File size:
1.8 GB in 99 files

Torrent Status:
  This torrent has been verified.

Infohash:
591a982804dfc6f179b9d28304fbd5a0541e430e


File list

  • Cyber Security For beginners™ 2020Cyber Security 0 to Hero
  • icon 1. Introduction to Cyber Space/1. Internet.mp4 44 MB
    icon 1. Introduction to Cyber Space/1. Internet.srt 3.4 KB
    icon 1. Introduction to Cyber Space/2. History OF Internet.mp4 85.4 MB
    icon 1. Introduction to Cyber Space/2. History OF Internet.srt 5.7 KB
    icon 10. Firewall/1. Firewall.mp4 8.7 MB
    icon 10. Firewall/1. Firewall.srt 2.2 KB
    icon 10. Firewall/2. Packet Filtering Firewall.mp4 3.6 MB
    icon 10. Firewall/2. Packet Filtering Firewall.srt 1.2 KB
    icon 10. Firewall/3. Circuit-Level Gateways.mp4 2.3 MB
    icon 10. Firewall/3. Circuit-Level Gateways.srt 883 B
    icon 10. Firewall/4. State Inspection Firewall.mp4 2.9 MB
    icon 10. Firewall/4. State Inspection Firewall.srt 581 B
    icon 10. Firewall/5. Proxy Firewall.mp4 6.3 MB
    icon 10. Firewall/5. Proxy Firewall.srt 1.9 KB
    icon 10. Firewall/6. Next-Generation Firewall.mp4 3.2 MB
    icon 10. Firewall/6. Next-Generation Firewall.srt 1.1 KB
    icon 10. Firewall/7. Software Firewall.mp4 3 MB
    icon 10. Firewall/7. Software Firewall.srt 868 B
    icon 10. Firewall/8. Hardware Firewall.mp4 4.2 MB
    icon 10. Firewall/8. Hardware Firewall.srt 1 KB
    icon 10. Firewall/9. Cloud Firewall.mp4 4 MB
    icon 10. Firewall/9. Cloud Firewall.srt 932 B
    icon 11. Computer Forensic/1. Computer Forensic.mp4 99.9 MB
    icon 11. Computer Forensic/1. Computer Forensic.srt 6.3 KB
    icon 12. Conclusion/1. Certification.mp4 3.6 MB
    icon 12. Conclusion/1. Certification.srt 2 KB
    icon 12. Conclusion/2. Certified Ethical Hacker.mp4 7.6 MB
    icon 12. Conclusion/2. Certified Ethical Hacker.srt 1.7 KB
    icon 12. Conclusion/3. Comptia Security+.mp4 6.3 MB
    icon 12. Conclusion/3. Comptia Security+.srt 1.4 KB
    icon 12. Conclusion/4. CISSP.mp4 3.5 MB
    icon 12. Conclusion/4. CISSP.srt 1.2 KB
    icon 12. Conclusion/5. Conclusion.mp4 4.5 MB
    icon 12. Conclusion/5. Conclusion.srt 900 B
    icon 2. Security Model/1. Introduction.mp4 5.6 MB
    icon 2. Security Model/1. Introduction.srt 926 B
    icon 2. Security Model/2. Confidentiality.mp4 31 MB
    icon 2. Security Model/2. Confidentiality.srt 2.4 KB
    icon 2. Security Model/3. Integrity.mp4 20.4 MB
    icon 2. Security Model/3. Integrity.srt 1.5 KB
    icon 2. Security Model/4. Availability.mp4 25.1 MB
    icon 2. Security Model/4. Availability.srt 2.5 KB
    icon 3. Cyber Attack/1. Cyber Attacks.mp4 46.9 MB
    icon 3. Cyber Attack/1. Cyber Attacks.srt 3.4 KB
    icon 3. Cyber Attack/2. Internal Attack.mp4 32.3 MB
    icon 3. Cyber Attack/2. Internal Attack.srt 2 KB
    icon 3. Cyber Attack/3. External Attack.mp4 17.1 MB
    icon 3. Cyber Attack/3. External Attack.srt 1.6 KB
    icon 4. Hackers and Their Job/1. What is Hacking.mp4 33.1 MB
    icon 4. Hackers and Their Job/1. What is Hacking.srt 2.2 KB
    icon 4. Hackers and Their Job/2. BlackHat Hacker.mp4 27.4 MB
    icon 4. Hackers and Their Job/2. BlackHat Hacker.srt 1.7 KB
    icon 4. Hackers and Their Job/3. WhiteHat Hacker.mp4 29.1 MB
    icon 4. Hackers and Their Job/3. WhiteHat Hacker.srt 2 KB
    icon 4. Hackers and Their Job/4. GrayHat Hacker.mp4 15.1 MB
    icon 4. Hackers and Their Job/4. GrayHat Hacker.srt 1 KB
    icon 5. Malware And Its Types/1. Malware.mp4 12.5 MB
    icon 5. Malware And Its Types/1. Malware.srt 1.2 KB
    icon 5. Malware And Its Types/2. Adware.mp4 22.2 MB
    icon 5. Malware And Its Types/2. Adware.srt 4.1 KB
    icon 5. Malware And Its Types/3. Spyware.mp4 58 MB
    icon 5. Malware And Its Types/3. Spyware.srt 4.5 KB
    icon 5. Malware And Its Types/4. Browser Hijacking.mp4 5.5 MB
    icon 5. Malware And Its Types/4. Browser Hijacking.srt 2.3 KB
    icon 5. Malware And Its Types/5. Computer Browser.mp4 42.3 MB
    icon 5. Malware And Its Types/5. Computer Browser.srt 5.7 KB
    icon 5. Malware And Its Types/6. Computer Worm.mp4 36.3 MB
    icon 5. Malware And Its Types/6. Computer Worm.srt 5.4 KB
    icon 5. Malware And Its Types/7. Trojan Horse.mp4 54.5 MB
    icon 5. Malware And Its Types/7. Trojan Horse.srt 8.5 KB
    icon 6. Cyber Crime/1. Cyber Crime.mp4 44.4 MB
    icon 6. Cyber Crime/1. Cyber Crime.srt 3.5 KB
    icon 6. Cyber Crime/2. Cyber Stalking.mp4 97.1 MB
    icon 6. Cyber Crime/2. Cyber Stalking.srt 10.6 KB
    icon 6. Cyber Crime/3. Software Piracy.mp4 91.1 MB
    icon 6. Cyber Crime/3. Software Piracy.srt 8.6 KB
    icon 6. Cyber Crime/4. Phishing.mp4 37.5 MB
    icon 6. Cyber Crime/4. Phishing.srt 7.6 KB
    icon 6. Cyber Crime/5. Computer Hacking.mp4 43.8 MB
    icon 6. Cyber Crime/5. Computer Hacking.srt 2.6 KB
    icon 6. Cyber Crime/6. Computer Virus Spreading.mp4 90.5 MB
    icon 6. Cyber Crime/6. Computer Virus Spreading.srt 7.3 KB
    icon 6. Cyber Crime/7. Spamming.mp4 62.5 MB
    icon 6. Cyber Crime/7. Spamming.srt 4.6 KB
    icon 7. Cyber Attacks/1. Salami Attack.mp4 68.5 MB
    icon 7. Cyber Attacks/1. Salami Attack.srt 4.6 KB
    icon 7. Cyber Attacks/2. Cross-site Scripting.mp4 34.5 MB
    icon 7. Cyber Attacks/2. Cross-site Scripting.srt 6.3 KB
    icon 7. Cyber Attacks/3. SQL Injection.mp4 33.8 MB
    icon 7. Cyber Attacks/3. SQL Injection.srt 5.9 KB
    icon 7. Cyber Attacks/4. Social Engineering.mp4 79.2 MB
    icon 7. Cyber Attacks/4. Social Engineering.srt 9.1 KB
    icon 7. Cyber Attacks/5. DDOS Attack.mp4 125.6 MB
    icon 7. Cyber Attacks/5. DDOS Attack.srt 9.9 KB
    icon 7. Cyber Attacks/6. MITM Attack.mp4 28 MB
    icon 7. Cyber Attacks/6. MITM Attack.srt 7.6 KB
    icon 7. Cyber Attacks/7. Email Spoofing.mp4 61.2 MB
    icon 7. Cyber Attacks/7. Email Spoofing.srt 6.1 KB
    icon 8. How to defence against Attacks/1. Authentication.mp4 44.5 MB

Similar Torrents