Udemy - Cybersecurity and Kali Linux - Hands-on course by TechLatest

Photo unavailable
Category:
Date:
01/01/24 at 6:06pm GMT+1
Submitter:
Seeders:
11
Leechers:
5
File size:
2.4 GB in 42 files

Torrent Status:
  This torrent has been verified.

Infohash:
4e66578f79f246c12dc73febb0f375a362421a81


File list

  • Udemy - Cybersecurity and Kali Linux - Hands-on course by TechLatest
  • icon ~Get Your Files Here !/1. Module 1 - Course Introduction & Teaser/1. Kali Linux & Cybersecurity Course Trailer.mp4 7.2 MB
    icon ~Get Your Files Here !/1. Module 1 - Course Introduction & Teaser/2. Course Introduction.mp4 27.1 MB
    icon ~Get Your Files Here !/10. Module 10 - Communicating Findings Reporting Mastery/1. Reporting Introduction.mp4 1.9 MB
    icon ~Get Your Files Here !/10. Module 10 - Communicating Findings Reporting Mastery/2. Reporting Practical + Conclusion.mp4 270.3 MB
    icon ~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/1. Amazon Web Services(AWS) Guide..mp4 43.8 MB
    icon ~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/1.1 How to Install Browser-Based Kali Linux with 2500+ security apps On Amazon Web Services(AWS).html 170 B
    icon ~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/2. Google Cloud Platform(GCP) Guide..mp4 45.6 MB
    icon ~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/2.1 How to Install Browser Based Kali Linux with 2500+ security apps on Google Cloud Platform(GCP).html 172 B
    icon ~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/3. Microsoft Azure Guide..mp4 51.9 MB
    icon ~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/3.1 How to Install Browser-Based Kali Linux with 2500+ security apps From Azure Marketplace..html 166 B
    icon ~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/1. Reconnaissance — First Phase of Hacking.mp4 28.6 MB
    icon ~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/1.1 Reconnaissance — First Phase of Hacking.html 146 B
    icon ~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/2. Open Source Intelligence(OSINT).mp4 9 MB
    icon ~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/2.1 Open Source Intelligence(OSINT).html 139 B
    icon ~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/3. Social Media Reconnaissance.mp4 135.4 MB
    icon ~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/3.1 Social Media Reconnaissance.html 136 B
    icon ~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/4. Unveiling the Secrets of OS Fingerprinting in Cybersecurity with Kali Linux.mp4 42.7 MB
    icon ~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/4.1 Unveiling the Secrets of OS Fingerprinting in Cybersecurity with Kali Linux.html 184 B
    icon ~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/5. Target Validation in Cybersecurity with Kali Linux.mp4 38 MB
    icon ~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/5.1 Target Validation in Cybersecurity with Kali Linux.html 159 B
    icon ~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/6. Subdomain Discovery in Cybersecurity with Kali Linux.mp4 23.3 MB
    icon ~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/6.1 Subdomain Discovery in Cybersecurity with Kali Linux.html 161 B
    icon ~Get Your Files Here !/4. Module 4 - Infiltration Techniques Mastering Active Reconnaissance/1. Active Reconnaissance Introduction.mp4 1.8 MB
    icon ~Get Your Files Here !/4. Module 4 - Infiltration Techniques Mastering Active Reconnaissance/2. Vulnerability Assessment.mp4 115.8 MB
    icon ~Get Your Files Here !/4. Module 4 - Infiltration Techniques Mastering Active Reconnaissance/3. Scanning.mp4 42.8 MB
    icon ~Get Your Files Here !/4. Module 4 - Infiltration Techniques Mastering Active Reconnaissance/4. Conclusion.mp4 888.8 KB
    icon ~Get Your Files Here !/5. Module 5 - Hacking Mastery Strategic Exploitation/1. Exploitation Introduction.mp4 80.4 MB
    icon ~Get Your Files Here !/5. Module 5 - Hacking Mastery Strategic Exploitation/2. Exploitation Practical.mp4 211.8 MB
    icon ~Get Your Files Here !/5. Module 5 - Hacking Mastery Strategic Exploitation/3. Exploitation Conclusion.mp4 1.2 MB
    icon ~Get Your Files Here !/6. Module 6 - Crack the Code Password Mastery/1. Password Cracking Introduction.mp4 46 MB
    icon ~Get Your Files Here !/6. Module 6 - Crack the Code Password Mastery/2. Password Cracking Practical.mp4 252.8 MB
    icon ~Get Your Files Here !/6. Module 6 - Crack the Code Password Mastery/3. Password Cracking Conclusion.mp4 839.6 KB
    icon ~Get Your Files Here !/7. Module 7 - Wireless Fortification Pentesting Mastery/1. Web App Pentesting Introduction.mp4 2.6 MB
    icon ~Get Your Files Here !/7. Module 7 - Wireless Fortification Pentesting Mastery/2. Web App Pentesting Practical.mp4 606.9 MB
    icon ~Get Your Files Here !/7. Module 7 - Wireless Fortification Pentesting Mastery/3. Web App Pentesting Conclusion.mp4 1.3 MB
    icon ~Get Your Files Here !/8. Module 8 - Wireless Fortification Pentesting Mastery/1. Wireless Pentesting Introduction.mp4 23.4 MB
    icon ~Get Your Files Here !/8. Module 8 - Wireless Fortification Pentesting Mastery/2. Wireless Pentesting Practical.mp4 185.1 MB
    icon ~Get Your Files Here !/8. Module 8 - Wireless Fortification Pentesting Mastery/3. Wireless Pentesting Conclusion.mp4 1.2 MB
    icon ~Get Your Files Here !/9. Module 9 - Human Manipulation Social Engineering/1. Social Engineering Introduction.mp4 5.9 MB
    icon ~Get Your Files Here !/9. Module 9 - Human Manipulation Social Engineering/2. Social Engineering Practical.mp4 188.9 MB
    icon ~Get Your Files Here !/9. Module 9 - Human Manipulation Social Engineering/3. Social Engineering Conclusion.mp4 716.5 KB
    icon ~Get Your Files Here !/Bonus Resources.txt 386 B

Similar Torrents