Udemy - The Ultimate Cyber Security Course For Beginners
- Category Other
 - Type Tutorials
 - Language english
 - Total size 1.2 GB
 - Uploaded By freecoursewb
 
- Downloads 945
 - Last checked 8 days ago
 - Date uploaded 8 days ago
 - Seeders 97
 - Leechers 6
 
Info Hash : 9C9859C5BDC8790887CD21752A942187BF27B9D3
Files:
Udemy - The Ultimate Cyber Security Course For Beginners- udp://tracker.torrent.eu.org:451/announce
 - udp://tracker.tiny-vps.com:6969/announce
 - http://tracker.foreverpirates.co:80/announce
 - udp://tracker.cyberia.is:6969/announce
 - udp://exodus.desync.com:6969/announce
 - udp://explodie.org:6969/announce
 - udp://tracker.opentrackr.org:1337/announce
 - udp://9.rarbg.to:2780/announce
 - udp://tracker.internetwarriors.net:1337/announce
 - udp://ipv4.tracker.harry.lu:80/announce
 - udp://open.stealth.si:80/announce
 - udp://9.rarbg.to:2900/announce
 - udp://9.rarbg.me:2720/announce
 - udp://opentor.org:2710/announce
 
Code:
- Get Bonus Downloads Here.url (0.2 KB)
 - 1 - Teaser Hacking a System Through the Outdated Software Theyre Using.mp4 (71.3 MB)
 - 2 - 1 What Is Cyber Security Why Cybersecurity.mp4 (1.9 MB)
 - 3 - Penetration Testing Ethical Hacking.mp4 (4.0 MB)
 - 4 - Cybersecurity Analyst SOC Analyst.mp4 (5.4 MB)
 - 35 - Anatomy of an email Email headers.mp4 (3.7 MB)
 - 36 - Indicators of a phishing attempt.mp4 (11.3 MB)
 - 37 - Static real phishing emailattachment analysis and find red flags.mp4 (48.7 MB)
 - 38 - Extract and scan email attachmentslinks with PhishTool.mp4 (35.3 MB)
 - 39 - What is a password cracking.mp4 (1.5 MB)
 - 40 - Common cracking methods dictionary brute force.mp4 (4.3 MB)
 - 41 - CrackBrute Force Website Login Pages Gain Access To Anyones Account.mp4 (76.8 MB)
 - 42 - How does websites work.mp4 (5.1 MB)
 - 43 - HandOn CrossSite Scripting XSS Reflected.mp4 (77.6 MB)
 - 44 - HandOn CrossSite Scripting XSS Stored.mp4 (5.6 MB)
 - 45 - HandOn SQL Injection SQLi.mp4 (51.4 MB)
 - 46 - HandOn File Inclusion Vulnerability.mp4 (72.0 MB)
 - 47 - Common-Cybersecurity-Interview-Question-Answers.pdf (88.6 KB)
 - 47 - Part 2 Common Cyber Security Interview Questions and Answers.html (4.0 KB)
 - 5 - Confidentiality.mp4 (7.6 MB)
 - 6 - Integrity.mp4 (4.6 MB)
 - 7 - Availability.mp4 (5.3 MB)
 - 8 - Summary.mp4 (713.1 KB)
 - 9 - 1 Identity and Access Management IAM.mp4 (7.9 MB)
 - 10 - Setting Up Our Cybersecurity Lab Environment.html (3.1 KB)
 - 11 - Linux Basics The Terminal and Essential Commands.mp4 (94.4 MB)
 - 12 - 1 Networking vs Network Security.mp4 (2.6 MB)
 - 13 - IP Addresses Subnets Routing Basics.mp4 (36.7 MB)
 - 13 - IP-Addresses-Subnets-Routing-Basics.pdf (162.9 KB)
 - 14 - Network Layers I OSI TCPIP Models.mp4 (24.5 MB)
 - 15 - Network Layers II OSI TCPIP Models.html (4.9 KB)
 - 16 - Common Ports In Cyber security What They Do How Theyre Used.mp4 (26.6 MB)
 - 17 - Network Scanning Ping NMAP Open Ports.mp4 (14.5 MB)
 - 18 - How to Scan for Open Ports to Hack and Gain Access to Systems.mp4 (122.9 MB)
 - 19 - What is Malware.mp4 (3.4 MB)
 - 20 - Types of Malware I Virus Worm Trojan Ransomware Adware Spyware.mp4 (8.2 MB)
 - 21 - Types of Malware II Virus Worm Trojan Ransomware Adware Spyware.mp4 (17.5 MB)
 - 22 - How Malware Spreads Detection and Prevention Techniques.mp4 (7.1 MB)
 - 23 - How to Create a Virus To CrashSlowdown a System.mp4 (7.1 MB)
 - 24 - What is a cyberattack.mp4 (2.6 MB)
 - 25 - Common types of Cyber attacs Brute force DDoS SQLi MITM Spoofing.mp4 (13.0 MB)
 - 26 - Hacking Systems Using Metasploit Hacking Laptops macOSX Android.mp4 (164.4 MB)
 - 27 - What is Endpoint Security.mp4 (2.9 MB)
 - 28 - Antivirus Antimalwalre.mp4 (1.5 MB)
 - 29 - Firewall.mp4 (1.1 MB)
 - 30 - Sandbox malware analysis Hybrid Analysis.mp4 (34.7 MB)
 - 31 - Use VirusTotal to analyze a suspicious file URL more.mp4 (21.1 MB)
 - 32 - What is social engineering.mp4 (2.4 MB)
 - 33 - Types Phishing Vishing SMShing.mp4 (14.3 MB)
 - 34 - Cloning Any Website for Phishing How to Hack Any Social Media Accounts.mp4 (65.8 MB)
 - Bonus Resources.txt (0.1 KB)