zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
GetFreeCourses.Co-Udemy-Cyber Security - Go From Zero to Hero (2020)
magnet:?xt=urn:btih:b82d27b09898b597445348ef07ba4b19ce6ac0b3&dn=GetFreeCourses.Co-Udemy-Cyber Security - Go From Zero to Hero (2020)
磁力链接详情
文件列表详情
b82d27b09898b597445348ef07ba4b19ce6ac0b3
infohash:
106
文件数量
3.41 GB
文件大小
2021-9-27 18:27
创建日期
2024-11-17 12:06
最后访问
相关分词
GetFreeCourses
Co-Udemy-Cyber
Security
-
Go
From
Zero
to
Hero
2020
1. FUNDAMENTALS OF NETWORKING/10. Layers of OSI Model.mp4 33.25 MB
1. FUNDAMENTALS OF NETWORKING/11. Introduction to TCPIP Model.mp4 76.04 MB
1. FUNDAMENTALS OF NETWORKING/12. OSI Model vs TCPIP Model.mp4 24.13 MB
1. FUNDAMENTALS OF NETWORKING/14. Addressing in Computer Networks.mp4 53.58 MB
1. FUNDAMENTALS OF NETWORKING/15. IP Address- IPv4 and IPv6.mp4 40.64 MB
1. FUNDAMENTALS OF NETWORKING/16. Introduction to Classes of IP Addressing.mp4 14.98 MB
1. FUNDAMENTALS OF NETWORKING/17. Classes of IP Address.mp4 54.86 MB
1. FUNDAMENTALS OF NETWORKING/18. PRACTICAL HOW TO FIND OUT YOUR PC's IP ADDRESS.mp4 22.43 MB
1. FUNDAMENTALS OF NETWORKING/19. PRACTICAL HOW TO FIND OUT YOUR PC'S MAC ADDRESS.mp4 41.4 MB
1. FUNDAMENTALS OF NETWORKING/2. What is Computer Networking - Definition and Characteristics.mp4 19.41 MB
1. FUNDAMENTALS OF NETWORKING/20. The Internet Protocol (IP).mp4 31.93 MB
1. FUNDAMENTALS OF NETWORKING/22. Address Resolution Protocol (ARP).mp4 50.52 MB
1. FUNDAMENTALS OF NETWORKING/24. Dynamic Host Configuration Protocol (DHCP).mp4 36.84 MB
1. FUNDAMENTALS OF NETWORKING/25. Internet Control Message Protocol (ICMP).mp4 37.4 MB
1. FUNDAMENTALS OF NETWORKING/26. RIP and OSPF Protocols.mp4 35.66 MB
1. FUNDAMENTALS OF NETWORKING/27. PRACTICAL HOW TO FIND OUT THE PATH OF DATA PACKETS USING TRACERT.mp4 16.99 MB
1. FUNDAMENTALS OF NETWORKING/28. What are Sockets.mp4 30.39 MB
1. FUNDAMENTALS OF NETWORKING/29. File Transfer Protocol (FTP).mp4 27.89 MB
1. FUNDAMENTALS OF NETWORKING/3. Network Topologies.mp4 25.81 MB
1. FUNDAMENTALS OF NETWORKING/30. Hypertext Transfer Protocol (HTTP).mp4 41.68 MB
1. FUNDAMENTALS OF NETWORKING/31. Hyptertext Transfer ProtocolSecure Socket Layer (HTTPS).mp4 46.19 MB
1. FUNDAMENTALS OF NETWORKING/32. Domain Name System (DNS).mp4 20.48 MB
1. FUNDAMENTALS OF NETWORKING/34. Conclusion.mp4 2.21 MB
1. FUNDAMENTALS OF NETWORKING/4. Meet the instructors!.mp4 7.26 MB
1. FUNDAMENTALS OF NETWORKING/5. History and Applications of Computer Networking.mp4 39.06 MB
1. FUNDAMENTALS OF NETWORKING/7. Protocols and Standards.mp4 28.91 MB
1. FUNDAMENTALS OF NETWORKING/9. Introduction to OSI Model.mp4 32.18 MB
2. GETTING STARTED WITH CYBER SECURITY/1. Definition of Computer Security.mp4 28.43 MB
2. GETTING STARTED WITH CYBER SECURITY/2. Interesting Facts about Cyber Security.mp4 42.84 MB
2. GETTING STARTED WITH CYBER SECURITY/3. Have a look at this!.mp4 11.74 MB
2. GETTING STARTED WITH CYBER SECURITY/4. History of Cyber Security.mp4 60.12 MB
2. GETTING STARTED WITH CYBER SECURITY/5. Scope and Career Insights in Cyber Security.mp4 48.28 MB
2. GETTING STARTED WITH CYBER SECURITY/8. Conclusion.mp4 3.58 MB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/1. Introduction.mp4 5.73 MB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/12. Conclusion.mp4 2.62 MB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/2. Standard Definition of Cyber Security.mp4 19.01 MB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/3. Types of Computer Security.mp4 25.09 MB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/4. Key Terms in Cyber Security.mp4 30.67 MB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/5. The Elements of Information Security.mp4 23.07 MB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/6. Types of Attacks.mp4 43.35 MB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/7. Roles in Cyber Security Part 1.mp4 48.97 MB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/8. Roles in Cyber Security Part 2.mp4 34.05 MB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/9. PRACTICAL USING OSINT FRAMEWORK FOR INFORMATION GATHERING.mp4 41.17 MB
4. DIVING DEEP INTO CYBER SECURITY/1. Introduction.mp4 10.16 MB
4. DIVING DEEP INTO CYBER SECURITY/10. Symmetric Encryption.mp4 14.37 MB
4. DIVING DEEP INTO CYBER SECURITY/11. AES and DES.mp4 44.52 MB
4. DIVING DEEP INTO CYBER SECURITY/12. Asymmetric Encryption.mp4 16.27 MB
4. DIVING DEEP INTO CYBER SECURITY/14. RSA & Diffie Hellman.mp4 47.48 MB
4. DIVING DEEP INTO CYBER SECURITY/15. Hashing.mp4 62.06 MB
4. DIVING DEEP INTO CYBER SECURITY/16. Security Organizations.mp4 26.77 MB
4. DIVING DEEP INTO CYBER SECURITY/17. Critical Thinking in Cyber Security.mp4 21.72 MB
4. DIVING DEEP INTO CYBER SECURITY/18. The Five Critical Thinking Skills.mp4 24.13 MB
4. DIVING DEEP INTO CYBER SECURITY/19. PRACTICAL USING NSLOOKUP TOOL.mp4 7.14 MB
4. DIVING DEEP INTO CYBER SECURITY/2. Security Architect's View of Security.mp4 46.98 MB
4. DIVING DEEP INTO CYBER SECURITY/20. PRACTICAL USING NETSTAT TOOL.mp4 32.45 MB
4. DIVING DEEP INTO CYBER SECURITY/22. Conclusion.mp4 2.78 MB
4. DIVING DEEP INTO CYBER SECURITY/3. What is Vulnerability Assessment.mp4 36.97 MB
4. DIVING DEEP INTO CYBER SECURITY/4. 4 Phases of Vulnerability Assessment.mp4 40.36 MB
4. DIVING DEEP INTO CYBER SECURITY/5. PRACTICAL DOWNLOADING NESSUS VULNERABILITY SCANNER.mp4 11.24 MB
4. DIVING DEEP INTO CYBER SECURITY/6. PRACTICAL CREATING A ADVANCE NETWORK SCAN POLICY.mp4 28.84 MB
4. DIVING DEEP INTO CYBER SECURITY/7. PRACTICAL INITIATING A SCAN USING USER DEFINED POLICIES.mp4 16.75 MB
4. DIVING DEEP INTO CYBER SECURITY/8. PRACTICAL GOING THROUGH SCANNED RESULTS.mp4 15.11 MB
4. DIVING DEEP INTO CYBER SECURITY/9. Introduction to Cryptography.mp4 41.86 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/1. Introduction.mp4 7.23 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/10. OH MY GOD! VIRUS!!.mp4 37.79 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/11. Types of Virus.mp4 59.33 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/12. You should defend yourself!.mp4 45.98 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/13. Have you ever heard about a Ransomware.mp4 81.12 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/15. PRACTICAL INFORMATION GATHERING USING SHODAN.mp4 74.34 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/16. The Cyber Kill Chain.mp4 31.3 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/17. Introduction to Social Engineering.mp4 28.11 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/18. Types of Social Engineering.mp4 57.62 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/19. PRACTICAL HOW TO FIND OUT USERNAMES AND PASSWORDS USING SOCIAL ENGINEERING.mp4 85.55 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/2. Different types of Actors in Cyber Security.mp4 64.44 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/21. Conclusion.mp4 4.15 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/3. Types of Cyber Attacks.mp4 31.37 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/4. Hacking Organizations around the Globe.mp4 27.15 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/5. Security Services and Mechanisms.mp4 17.62 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/6. Introduction to Threats.mp4 11.24 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/7. What is a Malware.mp4 47.53 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/8. Everything about Trojans.mp4 50.19 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/9. Types of Trojans.mp4 49.55 MB
6. KEY SECURITY CONCEPTS/1. Introduction.mp4 8.71 MB
6. KEY SECURITY CONCEPTS/10. The NIST Framework.mp4 21.87 MB
6. KEY SECURITY CONCEPTS/11. The COBIT Framework.mp4 25.57 MB
6. KEY SECURITY CONCEPTS/12. Other Security Frameworks.mp4 25.21 MB
6. KEY SECURITY CONCEPTS/15. Conclusion.mp4 2.13 MB
6. KEY SECURITY CONCEPTS/2. Confidentiality - The Most Important Element of Security.mp4 26.2 MB
6. KEY SECURITY CONCEPTS/3. Integrity, Authentication, Access Control and Non-Repudiation.mp4 55.85 MB
6. KEY SECURITY CONCEPTS/4. Introduction to Incident Response Team.mp4 32.05 MB
6. KEY SECURITY CONCEPTS/5. Phases of Incident Response.mp4 19.83 MB
6. KEY SECURITY CONCEPTS/6. Laws in Cyber Security.mp4 31.94 MB
6. KEY SECURITY CONCEPTS/7. What are Audits in Cyber Security.mp4 45.02 MB
6. KEY SECURITY CONCEPTS/8. Internal Audit vs External Audit.mp4 34.89 MB
6. KEY SECURITY CONCEPTS/9. How to carry out an Internal Audit.mp4 48.54 MB
7. FIREWALLS AND ANTIVIRUS/1. Introduction.mp4 13.02 MB
7. FIREWALLS AND ANTIVIRUS/10. Firewalls vs Antivirus.mp4 9.27 MB
7. FIREWALLS AND ANTIVIRUS/12. CONGRATULATIONS!.mp4 18.64 MB
7. FIREWALLS AND ANTIVIRUS/2. Intrusion Detection System.mp4 59.16 MB
7. FIREWALLS AND ANTIVIRUS/3. Introduction to Firewalls.mp4 53.33 MB
7. FIREWALLS AND ANTIVIRUS/4. IDS evasion techniques.mp4 33.93 MB
7. FIREWALLS AND ANTIVIRUS/5. What is DMZ.mp4 36.7 MB
7. FIREWALLS AND ANTIVIRUS/6. Firewall evasion techniques.mp4 40.89 MB
7. FIREWALLS AND ANTIVIRUS/7. Different types of Firewalls.mp4 31.95 MB
7. FIREWALLS AND ANTIVIRUS/8. The Antivirus!.mp4 20.17 MB
7. FIREWALLS AND ANTIVIRUS/9. Antivirus Detection Techniques.mp4 72.62 MB
其他位置