:Search:

Udemy Cyber Security for Absolute Beginners Essential Concepts

Torrent:
Info Hash: CF8BDB8153C3025C5A3E2F0B30E0B4E0E1BAA3C0
Similar Posts:
Uploader: freecoursewb
Source: 1 Logo 1337x
Type: Tutorials
Images:
Udemy Cyber Security for Absolute Beginners Essential Concepts
Language: English
Category: Other
Size: 1.6 GB
Added: Oct. 23, 2023, 6:20 p.m.
Peers: Seeders: 0, Leechers: 41 (Last updated: 10 months, 4 weeks ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://open.stealth.si:80/announce 0 9 0
udp://exodus.desync.com:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.cyberia.is:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.opentrackr.org:1337/announce 0 9 0
udp://tracker.torrent.eu.org:451/announce 0 9 0
udp://explodie.org:6969/announce 0 8 0
udp://tracker.birkenwald.de:6969/announce 0 2 0
udp://tracker.moeking.me:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://ipv4.tracker.harry.lu:80/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.tiny-vps.com:6969/announce 0 2 0
udp://tracker.therarbg.to:6969/announce 0 2 0
Files:
  1. Get Bonus Downloads Here.url 182 bytes
  2. 1. Welcome to the Course!.mp4 22.4 MB
  3. 1. Welcome to the Course!.mp4.jpg 140.2 KB
  4. 1. Welcome to the Course!.srt 6.1 KB
  5. 2. Why Learn Cyber Security from Me.mp4 14.7 MB
  6. 2. Why Learn Cyber Security from Me.srt 4.0 KB
  7. 3. Course Companion Study Guide.mp4 15.9 MB
  8. 3. Course Companion Study Guide.srt 1.3 KB
  9. 3.1 Course Companion Study Guide.pdf 2.2 MB
  10. 4. Course Case Studies Overview.mp4 19.1 MB
  11. 4. Course Case Studies Overview.srt 1.5 KB
  12. 5. Familiarizing Yourself with Udemy's Course Taking Interface.mp4 62.7 MB
  13. 5. Familiarizing Yourself with Udemy's Course Taking Interface.srt 11.3 KB
  14. 6. How to Access Course Subtitles & Transcripts.html 1.0 KB
  15. 7. Join our Facebook Student Community.html 1.1 KB
  16. 8. Udemy Mobile App for iOS & Android - Download & Take Course Videos On the Go!.html 1.2 KB
  17. 9. Student Exercise Introduce Yourself.html 281 bytes
  18. 1. Section Introduction.mp4 10.6 MB
  19. 1. Section Introduction.srt 832 bytes
  20. 2. Patch Management & Change Management.mp4 23.1 MB
  21. 2. Patch Management & Change Management.srt 6.9 KB
  22. 3. Incident Response.mp4 30.2 MB
  23. 3. Incident Response.srt 8.8 KB
  24. 4. Application Development Security.mp4 31.1 MB
  25. 4. Application Development Security.srt 8.3 KB
  26. 5. Security Assessments.mp4 18.8 MB
  27. 5. Security Assessments.srt 5.7 KB
  28. 6. Risk Management Program.mp4 28.8 MB
  29. 6. Risk Management Program.srt 7.7 KB
  30. 7. Personnel Policies.mp4 20.9 MB
  31. 7. Personnel Policies.srt 6.9 KB
  32. 8. Training, Eduation and Awareness.mp4 21.6 MB
  33. 8. Training, Eduation and Awareness.srt 7.2 KB
  34. 1. Congratulations.mp4 20.2 MB
  35. 1. Congratulations.srt 1.7 KB
  36. 2. How to Download Your Udemy Course Certificate of Completion.html 659 bytes
  37. 1. Section Introduction.mp4 10.7 MB
  38. 1. Section Introduction.srt 756 bytes
  39. 2. What is Cyber Security.mp4 24.4 MB
  40. 2. What is Cyber Security.srt 4.7 KB
  41. 3. Why Do We Need Cyber Security.mp4 23.3 MB
  42. 3. Why Do We Need Cyber Security.srt 7.7 KB
  43. 4. The Current State of Cybersecurity in 2021 & 2022.mp4 55.7 MB
  44. 4. The Current State of Cybersecurity in 2021 & 2022.srt 9.6 KB
  45. 1. Section Introduction.mp4 12.8 MB
  46. 1. Section Introduction.srt 1.1 KB
  47. 2. What Hacking Isn’t.mp4 40.2 MB
  48. 2. What Hacking Isn’t.srt 3.1 KB
  49. 3. Types of Hackers.mp4 10.5 MB
  50. 3. Types of Hackers.srt 3.5 KB
  51. 4. Hacker Motivations.mp4 18.0 MB
  52. 4. Hacker Motivations.srt 5.5 KB
  53. 5. The Hacking Methodology.mp4 23.6 MB
  54. 5. The Hacking Methodology.srt 11.2 KB
  55. 1. Section Introduction.mp4 20.2 MB
  56. 1. Section Introduction.srt 1.8 KB
  57. 10. Student Exercise 2 Identifying your MAC and IP Address (Windows and Mac OS).mp4 34.1 MB
  58. 10. Student Exercise 2 Identifying your MAC and IP Address (Windows and Mac OS).srt 5.7 KB
  59. 2. What is a Computer Network.mp4 8.4 MB
  60. 2. What is a Computer Network.srt 2.9 KB
  61. 3. Some Basic Networking Rules.mp4 9.4 MB
  62. 3. Some Basic Networking Rules.srt 3.0 KB
  63. 4. Computer Protocols.mp4 12.5 MB
  64. 4. Computer Protocols.srt 4.2 KB
  65. 5. LANs versus WANs.mp4 18.3 MB
  66. 5. LANs versus WANs.srt 5.7 KB
  67. 6. MAC versus IP Addresses.mp4 16.9 MB
  68. 6. MAC versus IP Addresses.srt 4.9 KB
  69. 7. Switches versus Routers.mp4 27.8 MB
  70. 7. Switches versus Routers.srt 8.0 KB
  71. 8. TCPIP Protocol Suite.mp4 21.2 MB
  72. 8. TCPIP Protocol Suite.srt 5.5 KB
  73. 9. How the Internet Works (Simplified).mp4 26.8 MB
  74. 9. How the Internet Works (Simplified).srt 6.2 KB
  75. 1. Section Introduction.mp4 7.9 MB
  76. 1. Section Introduction.srt 687 bytes
  77. 2. Viruses and Worms.mp4 20.2 MB
  78. 2. Viruses and Worms.srt 6.0 KB
  79. 3. Trojan Horses and Logic Bombs.mp4 14.0 MB
  80. 3. Trojan Horses and Logic Bombs.srt 4.9 KB
  81. 4. Spyware and Adware.mp4 11.0 MB
  82. 4. Spyware and Adware.srt 4.3 KB
  83. 5. Ransomware and Rootkits.mp4 28.5 MB
  84. 5. Ransomware and Rootkits.srt 6.3 KB
  85. 6. How Hackers Deploy Malware.mp4 20.4 MB
  86. 6. How Hackers Deploy Malware.srt 5.4 KB
  87. 7. Case Study Colonial Pipeline.html 2.5 KB
  88. 1. Section Introduction.mp4 10.0 MB
  89. 1. Section Introduction.srt 877 bytes
  90. 2. Zero-Day Attacks.mp4 15.1 MB
  91. 2. Zero-Day Attacks.srt 4.0 KB
  92. 3. Buffer Overflows.mp4 23.7 MB
  93. 3. Buffer Overflows.srt 6.7 KB
  94. 4. Protocol Spoofing.mp4 31.1 MB
  95. 4. Protocol Spoofing.srt 10.8 KB
  96. 5. DoS and DDoS Attacks.mp4 15.5 MB
  97. 5. DoS and DDoS Attacks.srt 4.8 KB
  98. 6. Weak Encryption Key & Software Vulnerability Attacks.mp4 20.9 MB
  99. 6. Weak Encryption Key & Software Vulnerability Attacks.srt 5.6 KB
  100. 7. Web-Based Attacks.mp4 23.5 MB
  101. 7. Web-Based Attacks.srt 8.0 KB
  102. 8. Evil Twin and Rogue Access Points.mp4 26.7 MB
  103. 8. Evil Twin and Rogue Access Points.srt 7.1 KB
  104. 9. Case Study TJX Companies Inc. (TJX).html 2.0 KB
  105. 1. Section Introduction.mp4 9.8 MB
  106. 1. Section Introduction.srt 964 bytes
  107. 2. Social Engineering Attacks.mp4 21.8 MB
  108. 2. Social Engineering Attacks.srt 6.6 KB
  109. 3. Social Engineering Scenarios Overview.mp4 26.5 MB
  110. 3. Social Engineering Scenarios Overview.srt 2.3 KB
  111. 4. Social Engineering Phone Call Example #1.mp4 30.0 MB
  112. 4. Social Engineering Phone Call Example #1.srt 2.4 KB
  113. 5. Social Engineering Phone Call Example #2.mp4 35.3 MB
  114. 5. Social Engineering Phone Call Example #2.srt 2.5 KB
  115. 6. Email Spam, Spoofing, Phishing, and Pharming.mp4 45.7 MB
  116. 6. Email Spam, Spoofing, Phishing, and Pharming.srt 13.0 KB
  117. 1. Section Introduction.mp4 13.2 MB
  118. 1. Section Introduction.srt 1.1 KB
  119. 2. The CIA Triad.mp4 19.2 MB
  120. 2. The CIA Triad.srt 7.6 KB
  121. 3. Defense in Depth.mp4 8.1 MB
  122. 3. Defense in Depth.srt 3.0 KB
  123. 4. Least Privilege.mp4 14.6 MB
  124. 4. Least Privilege.srt 6.0 KB
  125. 5. Risk Management.mp4 80.4 MB
  126. 5. Risk Management.srt 27.2 KB
  127. 1. Section Introduction.mp4 13.6 MB
  128. 1. Section Introduction.srt 1.0 KB
  129. 10. Virtual Private Network (VPN).mp4 19.6 MB
  130. 10. Virtual Private Network (VPN).srt 5.5 KB
  131. 11. Wireless Networking Security.mp4 31.0 MB
  132. 11. Wireless Networking Security.srt 8.1 KB
  133. 12. Student Exercise #3 Exploring the Built-In Firewall (Windows and Mac OS).mp4 49.6 MB
  134. 12. Student Exercise #3 Exploring the Built-In Firewall (Windows and Mac OS).srt 8.8 KB
  135. 2. Multi-Factor Authentication.mp4 15.1 MB
  136. 2. Multi-Factor Authentication.srt 5.5 KB
  137. 3. Password Best Practices.mp4 21.0 MB
  138. 3. Password Best Practices.srt 7.5 KB
  139. 4. Endpoint Protection.mp4 19.1 MB
  140. 4. Endpoint Protection.srt 6.3 KB
  141. 5. Encryption.mp4 30.2 MB
  142. 5. Encryption.srt 8.6 KB
  143. 6. Firewalls.mp4 24.8 MB
  144. 6. Firewalls.srt 7.2 KB
  145. 7. Intrusion Detection & Prevention Systems (IDSIPS).mp4 22.7 MB
  146. 7. Intrusion Detection & Prevention Systems (IDSIPS).srt 6.1 KB
  147. 8. Utilizing a Network DMZ.mp4 18.7 MB
  148. 8. Utilizing a Network DMZ.srt 5.3 KB
  149. 9. Honeypot Decoys.mp4 7.8 MB
  150. 9. Honeypot Decoys.srt 2.1 KB
  151. Bonus Resources.txt 386 bytes

Discussion