Udemy - Ultimate Cybersecurity - Uncovering Hacker Strategies

Photo unavailable
Category:
Date:
07/06/23 at 10:12pm GMT+1
Submitter:
Seeders:
11
Leechers:
1
File size:
3.2 GB in 63 files

Torrent Status:
  This torrent has been verified.

Infohash:
3517d90134a84fecb424e9d7bf0422b8b24ec325


File list

  • Udemy - Ultimate Cybersecurity - Uncovering Hacker Strategies
  • icon ~Get Your Files Here !/1 - Introduction/1 - Introduction Video.mp4 42.2 MB
    icon ~Get Your Files Here !/1 - Introduction/2 - 11 Course Overview.mp4 43.2 MB
    icon ~Get Your Files Here !/1 - Introduction/3 - 12 Importance of Cybersecurity.mp4 50.9 MB
    icon ~Get Your Files Here !/1 - Introduction/4 - 13 Course Objectives and Expectations.mp4 47 MB
    icon ~Get Your Files Here !/2 - Fundamentals of Cybersecurity/5 - Fundamentals of Cybersecurity Video.mp4 28.9 MB
    icon ~Get Your Files Here !/2 - Fundamentals of Cybersecurity/6 - 21 Key Concepts and Terminologies.mp4 57.2 MB
    icon ~Get Your Files Here !/2 - Fundamentals of Cybersecurity/7 - 22 Understanding Threats Vulnerabilities and Risks.mp4 62 MB
    icon ~Get Your Files Here !/2 - Fundamentals of Cybersecurity/8 - 23 The CIA Triad Confidentiality Integrity Availability.mp4 45.8 MB
    icon ~Get Your Files Here !/3 - Common Hacker Strategies/10 - 31 Social Engineering Attacks.mp4 53.8 MB
    icon ~Get Your Files Here !/3 - Common Hacker Strategies/11 - 311 Phishing.mp4 59.3 MB
    icon ~Get Your Files Here !/3 - Common Hacker Strategies/12 - 312 Pretexting.mp4 61.7 MB
    icon ~Get Your Files Here !/3 - Common Hacker Strategies/13 - 313 Baiting.mp4 55.6 MB
    icon ~Get Your Files Here !/3 - Common Hacker Strategies/14 - 32 Malware Attacks.mp4 67.1 MB
    icon ~Get Your Files Here !/3 - Common Hacker Strategies/15 - 321 Viruses.mp4 59.4 MB
    icon ~Get Your Files Here !/3 - Common Hacker Strategies/16 - 322 Worms.mp4 61.9 MB
    icon ~Get Your Files Here !/3 - Common Hacker Strategies/17 - 323 Ransomware.mp4 58.7 MB
    icon ~Get Your Files Here !/3 - Common Hacker Strategies/18 - 33 Networkbased Attacks.mp4 63.7 MB
    icon ~Get Your Files Here !/3 - Common Hacker Strategies/19 - 331 ManintheMiddle.mp4 58.1 MB
    icon ~Get Your Files Here !/3 - Common Hacker Strategies/20 - 332 Denial of Service DoS.mp4 61.4 MB
    icon ~Get Your Files Here !/3 - Common Hacker Strategies/21 - 333 Distributed Denial of Service DDoS.mp4 65.2 MB
    icon ~Get Your Files Here !/3 - Common Hacker Strategies/22 - 34 Exploiting Vulnerabilities.mp4 64.2 MB
    icon ~Get Your Files Here !/3 - Common Hacker Strategies/23 - 341 SQL Injection.mp4 58.9 MB
    icon ~Get Your Files Here !/3 - Common Hacker Strategies/24 - 342 CrossSite Scripting XSS.mp4 66.7 MB
    icon ~Get Your Files Here !/3 - Common Hacker Strategies/25 - 343 ZeroDay Exploits.mp4 67.2 MB
    icon ~Get Your Files Here !/3 - Common Hacker Strategies/9 - Common Hacker Strategies Video.mp4 54.5 MB
    icon ~Get Your Files Here !/4 - Cybersecurity Best Practices/26 - Cybersecurity Best Practices Video.mp4 63.6 MB
    icon ~Get Your Files Here !/4 - Cybersecurity Best Practices/27 - 41 Implementing Strong Password Policies.mp4 61.1 MB
    icon ~Get Your Files Here !/4 - Cybersecurity Best Practices/28 - 42 Regular Software Updates and Patch Management.mp4 62.6 MB
    icon ~Get Your Files Here !/4 - Cybersecurity Best Practices/29 - 43 MultiFactor Authentication MFA.mp4 68.6 MB
    icon ~Get Your Files Here !/4 - Cybersecurity Best Practices/30 - 44 Data Encryption and Secure Communication.mp4 73.5 MB
    icon ~Get Your Files Here !/4 - Cybersecurity Best Practices/31 - 45 Network Security Measures.mp4 74.2 MB
    icon ~Get Your Files Here !/4 - Cybersecurity Best Practices/32 - 451 Firewalls.mp4 76.4 MB
    icon ~Get Your Files Here !/4 - Cybersecurity Best Practices/33 - 452 Intrusion Detection and Prevention Systems IDPS.mp4 79.1 MB
    icon ~Get Your Files Here !/4 - Cybersecurity Best Practices/34 - 453 Virtual Private Networks VPNs.mp4 76.5 MB
    icon ~Get Your Files Here !/5 - Incident Response and Recovery/35 - Incident Response and Recovery Video.mp4 75.9 MB
    icon ~Get Your Files Here !/5 - Incident Response and Recovery/36 - 51 Creating an Incident Response Plan.html 8.6 KB
    icon ~Get Your Files Here !/5 - Incident Response and Recovery/37 - 52 Identifying and Analyzing Security Incidents.mp4 76.5 MB
    icon ~Get Your Files Here !/5 - Incident Response and Recovery/38 - 53 Containment Eradication and Recovery.mp4 62.9 MB
    icon ~Get Your Files Here !/5 - Incident Response and Recovery/39 - 54 PostIncident Review and Lessons Learned.mp4 63.8 MB
    icon ~Get Your Files Here !/6 - Cybersecurity Laws Regulations and Compliance/40 - Cybersecurity Laws Regulations and Compliance Video.mp4 81 MB
    icon ~Get Your Files Here !/6 - Cybersecurity Laws Regulations and Compliance/41 - 61 Understanding Data Privacy Laws.mp4 73.9 MB
    icon ~Get Your Files Here !/6 - Cybersecurity Laws Regulations and Compliance/42 - 62 Compliance with Industry Standards.mp4 79.1 MB
    icon ~Get Your Files Here !/6 - Cybersecurity Laws Regulations and Compliance/43 - 621 GDPR.html 3.3 KB
    icon ~Get Your Files Here !/6 - Cybersecurity Laws Regulations and Compliance/44 - 622 HIPAA.html 2.6 KB
    icon ~Get Your Files Here !/6 - Cybersecurity Laws Regulations and Compliance/45 - 623 PCI DSS.html 2.9 KB
    icon ~Get Your Files Here !/6 - Cybersecurity Laws Regulations and Compliance/46 - 63 Cybersecurity Frameworks.mp4 75.6 MB
    icon ~Get Your Files Here !/6 - Cybersecurity Laws Regulations and Compliance/47 - 631 NIST.html 3.3 KB
    icon ~Get Your Files Here !/6 - Cybersecurity Laws Regulations and Compliance/48 - 632 ISOIEC 27001.html 3.2 KB
    icon ~Get Your Files Here !/7 - Cybersecurity Tools and Resources/49 - Cybersecurity Tools and Resources Video.mp4 75.4 MB
    icon ~Get Your Files Here !/7 - Cybersecurity Tools and Resources/50 - 71 Security Assessment and Testing Tools.mp4 75.5 MB
    icon ~Get Your Files Here !/7 - Cybersecurity Tools and Resources/51 - 72 OpenSource Security Tools.mp4 74.6 MB
    icon ~Get Your Files Here !/7 - Cybersecurity Tools and Resources/52 - 73 Monitoring and Logging Tools.mp4 77.6 MB
    icon ~Get Your Files Here !/7 - Cybersecurity Tools and Resources/53 - 74 Essential Security Resources and Communities.html 8.4 KB
    icon ~Get Your Files Here !/8 - Conclusion/54 - Conclusion Video.mp4 73.4 MB
    icon ~Get Your Files Here !/8 - Conclusion/55 - 81 Course Summary.mp4 74.5 MB
    icon ~Get Your Files Here !/8 - Conclusion/56 - 82 Staying Informed and UptoDate.mp4 94.8 MB
    icon ~Get Your Files Here !/8 - Conclusion/57 - 83 Next Steps for Advancing Your Cybersecurity Knowledge.mp4 87.5 MB
    icon ~Get Your Files Here !/9 - Supplementary Materials/58 - Glossary of Cybersecurity Terms.html 9.8 KB
    icon ~Get Your Files Here !/9 - Supplementary Materials/59 - Security Incident Response Plan Template.html 5.8 KB
    icon ~Get Your Files Here !/9 - Supplementary Materials/60 - List of Recommended Cybersecurity Books and Online Resources.html 2.6 KB
    icon ~Get Your Files Here !/9 - Supplementary Materials/61 - Practical Exercises and Case Studies.html 9.3 KB
    icon ~Get Your Files Here !/9 - Supplementary Materials/62 - Assessment Cybersecurity Quiz.html 30 KB
    icon ~Get Your Files Here !/Bonus Resources.txt 386 B

Similar Torrents