:Search:

Certified Ethical Hacker CEH Linux Academy Acloud Guru

Torrent:
Info Hash: 72A9519786BD951F81D364B2264F73237898AF87
Similar Posts:
Uploader: notimmune
Source: 1 Logo 1337x
Downloads: 2832
Type: Tutorials
Language: English
Category: Other
Size: 13.2 GB
Added: Feb. 19, 2025, 9:10 a.m.
Peers: Seeders: 45, Leechers: 6 (Last updated: 11 months, 2 weeks ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://open.stealth.si:80/announce 10 2 324
udp://exodus.desync.com:6969/announce 2 0 7
udp://tracker.cyberia.is:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.opentrackr.org:1337/announce 20 2 2335
udp://tracker.torrent.eu.org:451/announce 10 0 161
udp://explodie.org:6969/announce 3 0 0
udp://tracker.birkenwald.de:6969/announce 0 1 0
udp://tracker.moeking.me:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://ipv4.tracker.harry.lu:80/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.tiny-vps.com:6969/announce 0 0 5
udp://tracker.therarbg.to:6969/announce 0 1 0
Files:
  1. 015_Data_Backup.mp4 222.9 MB
  2. 001_Certified_Ethical_Hacker_(CEH)_-_Linux_Academys_Prep_Course_PDF.pdf 5.5 MB
  3. 001_Module_1.docx 1.1 MB
  4. 001_Module_2.docx 23.9 KB
  5. 001_Module_3.docx 16.7 KB
  6. 001_Module_4.docx 28.5 KB
  7. 001_Module_5.docx 22.0 KB
  8. 001_Module_6.docx 19.6 KB
  9. 001_Module_7.docx 21.3 KB
  10. 001_Module_8.docx 36.3 KB
  11. 001_Module_9.docx 20.3 KB
  12. 002_About_the_Author.mp4 22.6 MB
  13. 003_Course_Requirements.mp4 55.8 MB
  14. 004_How_to_Get_Help.mp4 71.2 MB
  15. 005_About_the_Exam.mp4 134.3 MB
  16. 001_Chapter_Introduction.mp4 28.2 MB
  17. 002_Common_Terms_(Hack_Value_Vulnerability_Exploit_Payload).mp4 62.0 MB
  18. 003_Zero_Day_Attack.mp4 64.1 MB
  19. 004_Daisy_Chaining.mp4 86.2 MB
  20. 005_Module_1_Study_Guide.docx 1.1 MB
  21. 005_QUIZ_SOLUTION_Overview_of_Information_Security_-_Questions_answered_and_explained.mp4 58.1 MB
  22. 001_Chapter_Introduction.mp4 8.8 MB
  23. 002_Threats_vs_Attacks.mp4 28.7 MB
  24. 003_Motives_and_Reasons_Behind_Cyber_Security_Attacks.mp4 30.6 MB
  25. 004_What_Are_the_Means_by_Which_Hackers_Gain_Access_to_Systems_and_Networks.mp4 29.0 MB
  26. 005_Cloud_Computing_Threats.mp4 75.2 MB
  27. 006_Advanced_Persistent_Threats.mp4 24.0 MB
  28. 007_Viruses_and_Worms.mp4 37.9 MB
  29. 008_Ransomware.mp4 60.2 MB
  30. 009_Mobile_Threats.mp4 42.5 MB
  31. 010_Modern_Age_Information_Warfare.mp4 53.1 MB
  32. 011_Insider_Attacks.mp4 20.8 MB
  33. 012_Phishing.mp4 27.5 MB
  34. 013_Web_Application_Threats.mp4 28.5 MB
  35. 014_Classification_of_Threats_Network_Threats.mp4 32.7 MB
  36. 015_Clasification_of_Threats_Host_Threats.mp4 27.8 MB
  37. 016_Clasification_of_Threats_Application_Threats.mp4 23.9 MB
  38. 017_Classification_of_Attacks.mp4 141.1 MB
  39. 018_Botnets.mp4 34.0 MB
  40. 019_Laws_Standards_and_Regulations.mp4 132.6 MB
  41. 020_QUIZ_SOLUTION_Overview_of_Information_Security_Threats_and_Attacks_-_Questions_answered_and_explained.mp4 67.0 MB
  42. 001_A_Brief_Look_at_the_History_of_Hacking.mp4 118.9 MB
  43. 002_Types_of_Hackers.mp4 85.8 MB
  44. 003_What_is_Ethical_Hacking_What_is_Its_Purpose.mp4 28.4 MB
  45. 004_Scope_of_Ethical_Hacking.mp4 36.5 MB
  46. 005_Hacking_Stages_Reconnaissance.mp4 24.7 MB
  47. 006_Hacking_Stages_Scanning.mp4 18.8 MB
  48. 007_Hacking_Stages_Gaining_Access.mp4 6.5 MB
  49. 008_Hacking_Stages_Maintaining_Access.mp4 32.7 MB
  50. 009_Hacking_Stages_Clearing_Tracks.mp4 29.5 MB
  51. 010_QUIZ_SOLUTION__History_of_Hacking_-_Questions_answered_and_explained.mp4 82.4 MB
  52. 001_Chapter_Introduction.mp4 57.4 MB
  53. 002_Information_Assurance.mp4 135.0 MB
  54. 003_EISA_and_Information_security_management_program.mp4 118.5 MB
  55. 004_Network_Zoning.mp4 155.7 MB
  56. 005_Defense_in_Depth.mp4 130.9 MB
  57. 006_What_Sort_of_Things_Do_Policies_Regulate.mp4 150.1 MB
  58. 007_Workplace_Security_Policies_and_Examples.mp4 108.2 MB
  59. 008_Physical_Security_Controls_and_Risk.mp4 116.3 MB
  60. 009_Risk_Management.mp4 127.2 MB
  61. 010_Threat_Modeling_and_Incident_Management.mp4 212.6 MB
  62. 011_UBA_-_User_Behavior_Analytics_and_Network_Security_Controls.mp4 83.5 MB
  63. 012_Access_Controls.mp4 83.4 MB
  64. 013_Identification_Authentication_Authorization_Accounting_and_IAM.mp4 122.2 MB
  65. 014_Data_Leakage.mp4 98.4 MB
  66. 001_About_the_Course.mp4 80.8 MB
  67. 016_Data_Recovery.mp4 28.0 MB
  68. 017_QUIZ_SOLUTION_Protecting_Information_-_Questions_answered_and_explained.mp4 87.0 MB
  69. 001_What_Is_Penetration_Testing.mp4 37.8 MB
  70. 002_What_Does_a_Good_Penetration_Test_Consist_of.mp4 129.8 MB
  71. 003_Why_Do_a_Penetration_Test.mp4 123.5 MB
  72. 004_Pre-Attack_Phase_Contracts.mp4 29.9 MB
  73. 005_Audit_vs_Vulnerability_Assessment_vs_Penetration_Test.mp4 26.5 MB
  74. 006_Red_vs_Blue_Team.mp4 32.1 MB
  75. 007_Types_of_Penetration_Testing.mp4 80.4 MB
  76. 008_Pre-Attack_Phase_Rules_of_Engagement.mp4 26.3 MB
  77. 009_Pre-Attack_Phase_Understanding_your_Clients_requirements.mp4 43.7 MB
  78. 010_Pre-Attack_Phase_Scope_of_a_Penetration_Test.mp4 76.7 MB
  79. 011_Pre-Attack_Phase_Information_Gathering.mp4 70.8 MB
  80. 012_Pre-Attack_Phase_Two_Types_of_Information_Gathering.mp4 60.5 MB
  81. 013_Attack_Phase.mp4 15.9 MB
  82. 014_Attack_Phase_Penetrating_the_Perimeter.mp4 46.6 MB
  83. 015_Attack_Phase_Target_Acquisition.mp4 30.7 MB
  84. 016_Attack_Phase_Privilege_Escalation.mp4 31.8 MB
  85. 017_Attack_Phase_Execute_Implant_Retract.mp4 36.6 MB
  86. 018_Post-Attack_Phase.mp4 23.5 MB
  87. 019_Security_Testing_Methodologies.mp4 77.5 MB
  88. 020_QUIZ_SOLUTION_Penetration_Testing_-_Questions_answered_and_explained.mp4 65.2 MB
  89. 001_About_Footprinting.mp4 33.9 MB
  90. 002_Hacker_State_of_Mind.mp4 59.9 MB
  91. 003_Search_Engine_and_Online_Resources.mp4 196.4 MB
  92. 004_Whois_GeoIpLocation_and_DNS_Interogation.mp4 145.6 MB
  93. 005_Email_Header_Analysis.mp4 164.3 MB
  94. 006_Getting_an_IP_Address_from_an_Email_and_More.mp4 167.2 MB
  95. 007_Quick_Look_at_a_Website_Certificate_Source_Code_and_Traffic.mp4 169.7 MB
  96. 008_How_to_Clone_a_Website_and_Extract_Metadata_from_Files.mp4 186.0 MB
  97. 009_Nmap_and_Traceroute.mp4 201.1 MB
  98. 010_QUIZ_SOLUTION_Footprinting_-_Questions_answered_and_explained.mp4 55.0 MB
  99. 001_Countermeasures_and_Best_Practices.mp4 121.5 MB
  100. 002_What_Goes_into_a_Footprinting_Report.mp4 56.5 MB
  101. 003_QUIZ_SOLUTION_Reports_and_Countermeasures_-_Questions_answered_and_explained.mp4 50.0 MB
  102. 001_Banner_Grabbing.mp4 54.8 MB
  103. 002_Drawing_and_Mapping_Out_Network_Topologies.mp4 97.2 MB
  104. 003_Scanning_for_Vulnerabilities.mp4 143.0 MB
  105. 004_Enumeration.mp4 72.2 MB
  106. 005_QUIZ_SOLUTION_Network_Scanning_Techniques_-_Questions_answered_and_explained.mp4 56.9 MB
  107. 001_Password_Cracking_Crunch_and_Some_Basics.mp4 169.8 MB
  108. 002_Using_Hydra_for_online_password_cracking.mp4 181.5 MB
  109. 003_Hashcat_Environment_Setup.mp4 178.2 MB
  110. 004_HashCat_Installation.mp4 78.9 MB
  111. 005_HashCat_Let_Us_Crack_Some_Passwords.mp4 166.3 MB
  112. 006_HashCat_Results_and_Recap.mp4 122.9 MB
  113. 007_QUIZ_SOLUTION_Password_Cracking_Techniques_-_Questions_answered_and_explained.mp4 78.3 MB
  114. 001_Reverse_Shell_and_Remote_Service_Exploitation.mp4 185.0 MB
  115. 002_Keylogger_Intro_and_Environment_Setup.mp4 117.9 MB
  116. 003_Keylogger_Source_Code_Download_and_Import.mp4 50.8 MB
  117. 004_Keylogger_Configuration.mp4 79.5 MB
  118. 005_Keylogger_Demo.mp4 134.0 MB
  119. 006_Decrypting_Keylogger_Logs.mp4 91.2 MB
  120. 007_QUIZ_SOLUTION_Persistent_Remote_Access_-_Questions_Answered_and_Explained.mp4 54.7 MB
  121. 001_SandBox.mp4 173.8 MB
  122. 002_How_to_Create_a_Safe_Sandbox_Environment.mp4 133.0 MB
  123. 003_Anti-Malware_Software_Overview.mp4 109.4 MB
  124. 004_Packing_Malware.mp4 125.8 MB
  125. 005_Rootkits.mp4 68.8 MB
  126. 006_Hiding_Files_and_Steganography.mp4 115.9 MB
  127. 007_QUIZ_SOLUTION_Hiding_Malicious_Programs_-_Questions_Answered_and_Explained.mp4 38.1 MB
  128. 001_Log_Files_Covering_Your_Tracks.mp4 135.9 MB
  129. 002_QUIZ_SOLUTION_Covering_Tracks_and_Destroying_Evidence_-_Questions_Answered_and_Explained.mp4 68.3 MB
  130. 001_ARP_Spoofing.mp4 174.4 MB
  131. 002_MAC_Address_Spoofing.mp4 120.1 MB
  132. 003_DHCP_Starvation.mp4 71.4 MB
  133. 004_QUIZ_SOLUTION_Sniffing_Techniques_-_Questions_Answered_and_Explained.mp4 101.1 MB
  134. 001_Capturing_the_WPA2_Handshake.mp4 145.1 MB
  135. 002_Cracking_WPA2_Passkey.mp4 161.9 MB
  136. 003_QUIZ_SOLUTION_Wireless_Networks_-_Questions_Answered_and_Explained.mp4 76.7 MB
  137. 001_Social_Engineering.mp4 169.8 MB
  138. 002_Well_Known_Social_Engineering_Attacks_A_Retrospective.mp4 114.3 MB
  139. 003_QUIZ_SOLUTION_Social_Engineering_-_Questions_Answered_and_Explained.mp4 58.9 MB
  140. 001_What_Is_a_Firewall_How_Does_It_Work.mp4 90.1 MB
  141. 002_Firewall_Usage_Logging_and_Configuration.mp4 110.6 MB
  142. 003_Evading_Firewall_GeoIpBock.mp4 176.1 MB
  143. 004_QUIZ_SOLUTION_Firewalls_-_Questions_answered_and_explained.mp4 59.5 MB
  144. 001_How_to_Set_Up_a_Honeypot.mp4 137.1 MB
  145. 002_How_to_grab_traffic_from_a_Honeypot.mp4 130.3 MB
  146. 003_QUIZ_SOLUTION_Honeypots_-_Questions_Answered_and_Explained.mp4 53.4 MB
  147. 001_OWASP_-_Open_Web_Application_Security_Project.mp4 49.9 MB
  148. 002_XSS_Cross_Site_Scripting.mp4 127.7 MB
  149. 003_SQL_Injections.mp4 171.9 MB
  150. 004_QUIZ_SOLUTION_Attacking_Web_Servers_and_Web_Applications_-_Questions_Answered_and_Explained.mp4 57.7 MB
  151. 001_Cryptography_Basics.mp4 75.4 MB
  152. 002_Cryptography_Common_Algorithms__and_Message_Digest.mp4 93.8 MB
  153. 003_PKI_Public_Key_Infrastructure.mp4 72.3 MB
  154. 001_Cryptanalysis_and_Attack_Vectors.mp4 104.9 MB
  155. 002_Checksum_and_File_Encryption.mp4 131.6 MB
  156. 003_SSH_RSA_Demo.mp4 146.8 MB
  157. 004_Storage_Medium_Encryption.mp4 141.2 MB
  158. 005_QUIZ_SOLUTION_Cryptography_-_Questions_Answered_and_Explained.mp4 54.5 MB
  159. 001_Final_Practice_Exam.mp4 59.9 MB
  160. 001_Final_Practice_Exam_Question_and_Answer_overview_part_1.mp4 114.2 MB
  161. 002_Final_Practice_exam_Question_and_Answer_overview_part_2.mp4 68.7 MB
  162. 003_Final_Practice_exam_Question_and_Answer_overview_part_3.mp4 111.4 MB
  163. 004_Final_Practice_exam_Question_and_Answer_overview_part_4.mp4 112.9 MB

Discussion