:Search:

Ethical Hacking Introduction to Ethical Hacking 2023 DevCourseWeb

Torrent:
Info Hash: 83045C17DBBA01CB173AD605DB5D454F0CBFB44F
Thumbnail:
Similar Posts:
Uploader: FreeCourseWeb
Source: T Logo Torrent Galaxy
Language: English
Category: Other
Size: 217.0 MB
Added: Aug. 17, 2023, 3:33 p.m.
Peers: Seeders: 0, Leechers: 4 (Last updated: 10 months, 3 weeks ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://open.stealth.si:80/announce 0 1 0
udp://exodus.desync.com:6969/announce 0 0 0
udp://tracker.cyberia.is:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.opentrackr.org:1337/announce 0 1 0
udp://tracker.torrent.eu.org:451/announce 0 0 0
udp://explodie.org:6969/announce 0 0 0
udp://tracker.birkenwald.de:6969/announce 0 1 0
udp://tracker.moeking.me:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://ipv4.tracker.harry.lu:80/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.tiny-vps.com:6969/announce 0 0 0
udp://tracker.therarbg.to:6969/announce 0 1 0
Files:
  1. Get Bonus Downloads Here.url 182 bytes
  2. 01 - Locking down the organization.mp4 7.8 MB
  3. 01 - Locking down the organization.srt 1.2 KB
  4. 02 - Discovering resources.mp4 1.5 MB
  5. 02 - Discovering resources.srt 1.4 KB
  6. 03 - Hacking ethically.mp4 1.3 MB
  7. 03 - Hacking ethically.srt 1.3 KB
  8. 01 - Recognizing elements of information security.mp4 7.2 MB
  9. 01 - Recognizing elements of information security.srt 5.2 KB
  10. 02 - Providing information assurance.mp4 6.6 MB
  11. 02 - Providing information assurance.srt 5.1 KB
  12. 03 - Defending in depth.mp4 7.9 MB
  13. 03 - Defending in depth.srt 5.3 KB
  14. 04 - Using AI and ML in cybersecurity.mp4 6.9 MB
  15. 04 - Using AI and ML in cybersecurity.srt 5.1 KB
  16. 05 - Adapting to the threats.mp4 5.2 MB
  17. 05 - Adapting to the threats.srt 5.3 KB
  18. 06 - Leveraging event correlation.mp4 4.1 MB
  19. 06 - Leveraging event correlation.srt 3.7 KB
  20. 01 - Modeling threats.mp4 8.6 MB
  21. 01 - Modeling threats.srt 5.7 KB
  22. 02 - Using cyber threat intelligence.mp4 10.6 MB
  23. 02 - Using cyber threat intelligence.srt 5.8 KB
  24. 03 - Following the threat intelligence lifecycle.mp4 4.7 MB
  25. 03 - Following the threat intelligence lifecycle.srt 4.8 KB
  26. 04 - Managing incidents.mp4 6.8 MB
  27. 04 - Managing incidents.srt 6.1 KB
  28. 05 - Challenge Hardening guide.mp4 2.4 MB
  29. 05 - Challenge Hardening guide.srt 1.0 KB
  30. 06 - Solution Hardening guide.mp4 1.8 MB
  31. 06 - Solution Hardening guide.srt 1.6 KB
  32. 01 - Understanding the cyber kill chain.mp4 8.7 MB
  33. 01 - Understanding the cyber kill chain.srt 7.2 KB
  34. 02 - Utilizing MITRE ATT&CK.mp4 10.0 MB
  35. 02 - Utilizing MITRE ATT&CK.srt 4.8 KB
  36. 03 - Analyzing using the diamond model.mp4 7.3 MB
  37. 03 - Analyzing using the diamond model.srt 6.2 KB
  38. 04 - Identifying adversary behavior.mp4 11.5 MB
  39. 04 - Identifying adversary behavior.srt 6.9 KB
  40. 05 - Discovering indicators of compromise.mp4 11.0 MB
  41. 05 - Discovering indicators of compromise.srt 6.4 KB
  42. 06 - Challenge The cyber kill chain.mp4 3.1 MB
  43. 06 - Challenge The cyber kill chain.srt 1.9 KB
  44. 07 - Solution The cyber kill chain.mp4 4.7 MB
  45. 07 - Solution The cyber kill chain.srt 3.8 KB
  46. 01 - Managing risks.mp4 5.1 MB
  47. 01 - Managing risks.srt 4.3 KB
  48. 02 - Asset inventory.mp4 9.7 MB
  49. 02 - Asset inventory.srt 6.3 KB
  50. 03 - Defining information security standards.mp4 8.2 MB
  51. 03 - Defining information security standards.srt 5.0 KB
  52. 04 - Outlining US regulations.mp4 6.9 MB
  53. 04 - Outlining US regulations.srt 5.9 KB
  54. 05 - Exploring global cyber laws and standards.mp4 5.5 MB
  55. 05 - Exploring global cyber laws and standards.srt 5.0 KB
  56. 06 - Challenge Cyber threat information sharing.mp4 1.8 MB
  57. 06 - Challenge Cyber threat information sharing.srt 1.4 KB
  58. 07 - Solution Cyber threat information sharing.mp4 3.3 MB
  59. 07 - Solution Cyber threat information sharing.srt 3.4 KB
  60. 01 - Comparing attack types and motives.mp4 6.4 MB
  61. 01 - Comparing attack types and motives.srt 5.8 KB
  62. 02 - Outlining the types of hackers.mp4 7.9 MB
  63. 02 - Outlining the types of hackers.srt 6.0 KB
  64. 03 - Recognizing the skills of an ethical hacker.mp4 5.9 MB
  65. 03 - Recognizing the skills of an ethical hacker.srt 6.2 KB
  66. 04 - Stepping through the hacking phases.mp4 7.6 MB
  67. 04 - Stepping through the hacking phases.srt 7.1 KB
  68. 05 - Grasping the importance of ethical hacking.mp4 6.8 MB
  69. 05 - Grasping the importance of ethical hacking.srt 5.4 KB
  70. 01 - Next steps.mp4 2.0 MB
  71. 01 - Next steps.srt 2.2 KB
  72. Bonus Resources.txt 386 bytes

Discussion