:Search:

Udemy Cybersecurity Basics Ethical Hacking For Everyone

Torrent:
Info Hash: 827BF580E97EB440DC1A5C12BCA363243176CAC7
Similar Posts:
Uploader: freecoursewb
Source: 1 Logo 1337x
Downloads: 694
Type: Tutorials
Language: English
Category: Other
Size: 1.9 GB
Added: March 2, 2026, 3:22 a.m.
Peers: Seeders: 3, Leechers: 3 (Last updated: 2 months ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://tracker.therarbg.to:6969/announce 0 1 0
udp://tracker.opentrackr.org:1337/announce (Failed to scrape UDP tracker) 0 0 0
udp://open.demonoid.ch:6969/announce 0 0 0
udp://open.demonii.com:1337/announce (Failed to scrape UDP tracker) 0 0 0
udp://open.stealth.si:80/announce 2 1 693
udp://explodie.org:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://exodus.desync.com:6969/announce 1 1 1
udp://wepzone.net:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker1.myporn.club:9337/announce 0 0 0
udp://tracker.srv00.com:6969/announce (Failed to scrape UDP tracker) 0 0 0
Files:
  1. Get Bonus Downloads Here.url 180 bytes
  2. 1 - What is cybersecurity and why does it matter today.mp4 62.1 MB
  3. 2 - Hackers Heroes or villains.mp4 27.6 MB
  4. 3 - Basic cybersecurity concepts.mp4 58.9 MB
  5. 4 - Identification Authentication and Authorization.mp4 49.9 MB
  6. 5 - The CIA Triad Confidentiality Integrity Availability.mp4 17.2 MB
  7. 6 - Who attacks and why.mp4 31.4 MB
  8. 7 - Career paths in cybersecurity What can you become.mp4 31.4 MB
  9. 10 - DDoS attacks and botnets zombie armies.mp4 33.2 MB
  10. 11 - ManintheMiddle MitM attacks.mp4 22.5 MB
  11. 12 - OSINT Using public information in attacks.mp4 83.4 MB
  12. 13 - Web attacks OWASP Top vulnerabilities.mp4 132.5 MB
  13. 14 - Deepfakes and AIpowered attacks.mp4 15.2 MB
  14. 8 - Phishing and social engineering realworld scam examples.mp4 41.8 MB
  15. 9 - Malware viruses trojans ransomware how do they work.mp4 170.0 MB
  16. 15 - What is encryption and why is it important.mp4 22.0 MB
  17. 16 - Symmetric vs asymmetric encryption Differences and use cases.mp4 78.0 MB
  18. 17 - Data hashing SHA MD5 bcrypt and other algorithms.mp4 41.5 MB
  19. 18 - Bruteforce and dictionary attacks how passwords are cracked.mp4 33.4 MB
  20. 19 - Endtoend encryption in messaging apps.mp4 19.0 MB
  21. 20 - Password management password managers and best practices.mp4 37.6 MB
  22. 21 - Password leaks how to check if your data is safe.mp4 76.1 MB
  23. 22 - The cloud or just someone elses computer.mp4 25.7 MB
  24. 23 - Data backups and best practices.mp4 15.9 MB
  25. 24 - Disk encryption BitLocker VeraCrypt.mp4 59.1 MB
  26. 25 - IP addresses the basics of networking.mp4 48.0 MB
  27. 26 - Network protocols TCP UDP and ports.mp4 36.5 MB
  28. 27 - DNS Why dont we need to remember IP addresses.mp4 33.4 MB
  29. 28 - Email security SPF DKIM DMARC.mp4 82.1 MB
  30. 29 - How websites work basic web architecture.mp4 44.7 MB
  31. 30 - SSLTLS What does the green padlock mean.mp4 43.7 MB
  32. 31 - Cookies and user tracking what data do websites collect.mp4 49.5 MB
  33. 32 - Online anonymity VPNs and proxies.mp4 62.7 MB
  34. 33 - The Tor network the hidden side of the internet.mp4 85.2 MB
  35. 34 - WiFi security WPA2 WPA3 and how to secure your network.mp4 142.9 MB
  36. 35 - IoT threats how hackers exploit smart devices.mp4 42.8 MB
  37. 36 - Firewalls and antivirus software are they effective.mp4 36.7 MB
  38. 37 - Attack detection and analysis in companies IDS IPS and SIEM.mp4 48.9 MB
  39. Bonus Resources.txt 70 bytes

Discussion