zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
[Tutorialsplanet.NET] Udemy - The Complete Cyber Security Course Network Security!
magnet:?xt=urn:btih:8879676368f7d6c120c316cc1a4cb80c8ffb0663&dn=[Tutorialsplanet.NET] Udemy - The Complete Cyber Security Course Network Security!
磁力链接详情
文件列表详情
8879676368f7d6c120c316cc1a4cb80c8ffb0663
infohash:
104
文件数量
3.19 GB
文件大小
2020-7-12 17:24
创建日期
2024-12-10 16:27
最后访问
相关分词
Tutorialsplanet
NET
Udemy
-
The
Complete
Cyber
Security
Course
Network
Security!
1. Introduction/1. Welcome to Volume 2.mp4 2.75 MB
1. Introduction/2. Introduction to the Instructor!.mp4 17.13 MB
1. Introduction/3. Security Quick Win!.mp4 44.61 MB
1. Introduction/4. Target Audience.mp4 8.67 MB
1. Introduction/5. Study Recommendations.mp4 27.9 MB
1. Introduction/6. Course updates.mp4 2.56 MB
10. Browser Security and Tracking Prevention/1. Goals and Learning Objectives.mp4 1.85 MB
10. Browser Security and Tracking Prevention/10. ABP, Privacy badger, WOT - HTTP Filters, ad and track blockers.mp4 27.63 MB
10. Browser Security and Tracking Prevention/11. No-script - HTTP Filters, ad and track blockers.mp4 23.09 MB
10. Browser Security and Tracking Prevention/12. Policeman and others - HTTP Filters, ad and track blockers.mp4 17.67 MB
10. Browser Security and Tracking Prevention/13. History, Cookies and Super cookies Part 1.mp4 66.67 MB
10. Browser Security and Tracking Prevention/14. History, Cookies and Super cookies Part 2.mp4 66.03 MB
10. Browser Security and Tracking Prevention/15. HTTP Referer.mp4 7.56 MB
10. Browser Security and Tracking Prevention/16. Browser Fingerprinting.mp4 98.01 MB
10. Browser Security and Tracking Prevention/17. Certificates and Encryption.mp4 55.51 MB
10. Browser Security and Tracking Prevention/18. Firefox Hardening.mp4 142.28 MB
10. Browser Security and Tracking Prevention/2. Which Browser – Choice of Browser.mp4 16.96 MB
10. Browser Security and Tracking Prevention/3. Reducing the Browser Attack Surface.mp4 87.75 MB
10. Browser Security and Tracking Prevention/4. Browser Hacking Demo.mp4 46.75 MB
10. Browser Security and Tracking Prevention/5. Browser Isolation and Compartmentalization.mp4 24.85 MB
10. Browser Security and Tracking Prevention/6. Firefox Security, Privacy and Tracking.mp4 41.11 MB
10. Browser Security and Tracking Prevention/7. uBlock origin - HTTP Filters, ad and track blockers.mp4 86.32 MB
10. Browser Security and Tracking Prevention/8. uMatrix - HTTP Filters, ad and track blockers.mp4 29.37 MB
10. Browser Security and Tracking Prevention/9. Disconnect, Ghostery, Request policy - HTTP Filters, ad and track blockers.mp4 24.6 MB
11. Passwords and Authentication Methods/1. Goals and Learning Objectives.mp4 2.6 MB
11. Passwords and Authentication Methods/10. Password Managers - Hardening Lastpass.mp4 15.56 MB
11. Passwords and Authentication Methods/11. Creating a Strong Password That You Can Remember - Part 1.mp4 22.14 MB
11. Passwords and Authentication Methods/12. Creating a Strong Password That You Can Remember - Part 2.mp4 22.55 MB
11. Passwords and Authentication Methods/13. Multi-Factor Authentication - Soft Tokens - Google Authenticator and Authy.mp4 24.9 MB
11. Passwords and Authentication Methods/14. Multi-Factor Authentication - Hard Tokens - 2FA Dongles.mp4 13.62 MB
11. Passwords and Authentication Methods/15. Choosing a Method of Multi-Factor Authentication.mp4 6.24 MB
11. Passwords and Authentication Methods/16. Multi-Factor Authentication - Strengths and Weaknesses.mp4 5.11 MB
11. Passwords and Authentication Methods/17. The Future of Password and Authentication.mp4 4.05 MB
11. Passwords and Authentication Methods/2. Password Attacks.mp4 7.49 MB
11. Passwords and Authentication Methods/3. How Passwords are Cracked - Hashes - Part 1.mp4 41.14 MB
11. Passwords and Authentication Methods/4. How Passwords are Cracked - Hashcat - Part 2.mp4 24.16 MB
11. Passwords and Authentication Methods/5. Operating System Passwords.mp4 7.02 MB
11. Passwords and Authentication Methods/6. Password Managers - An Introduction.mp4 4.16 MB
11. Passwords and Authentication Methods/7. Password Managers - Master Password.mp4 11.5 MB
11. Passwords and Authentication Methods/8. Password Managers - KeePass, KeePassX and KeyPassXC.mp4 15.6 MB
11. Passwords and Authentication Methods/9. Password Managers - LastPass.mp4 26.48 MB
12. Wrap Up/1. Congratulations.mp4 11.54 MB
12. Wrap Up/2. Certificate Of Completion for CPEs.mp4 2.06 MB
12. Wrap Up/3. Which VPN protocol is best to use and why.mp4 34.61 MB
12. Wrap Up/4. Email Tracking and Hacking.mp4 26.78 MB
12. Wrap Up/5. Security Vulnerabilities, Threats and Adversaries.mp4 11.83 MB
2. Goals and Learning Objectives - Volume 2/1. Goals and Learning Objectives - Volume 2.mp4 15.92 MB
3. Routers - Port and Vulnerability scanning/1. Goals and Learning Objectives.mp4 2.32 MB
3. Routers - Port and Vulnerability scanning/2. The Home Router.mp4 60.63 MB
3. Routers - Port and Vulnerability scanning/3. External Vulnerability Scanning - Shodan, Qualys & Nmap.mp4 93.44 MB
3. Routers - Port and Vulnerability scanning/4. Internal Vulnerability Scanning - MBSA, Nmap, Nessus, Fing & Superscan & OpenVAS.mp4 96.47 MB
3. Routers - Port and Vulnerability scanning/5. Open Source Custom Router Firmware.mp4 56 MB
4. Firewalls/1. Goals and Learning Objectives.mp4 2.27 MB
4. Firewalls/10. Mac - Host based Firewalls - pflist, Icefloor & Murus.mp4 38.14 MB
4. Firewalls/11. Mac - Host based Firewalls - Little Snitch.mp4 25.2 MB
4. Firewalls/12. Network based firewalls - Routers - DD-WRT.mp4 15.08 MB
4. Firewalls/13. Network based firewalls - Hardware.mp4 19.7 MB
4. Firewalls/14. Network based firewalls - pfSense, Smoothwall and Vyos.mp4 28.56 MB
4. Firewalls/2. Firewalls – Host-based, network-based and virtual Part 1.mp4 44.79 MB
4. Firewalls/3. Firewalls – Host-based, network-based and virtual Part 2.mp4 16.34 MB
4. Firewalls/4. Windows - Host Based Firewalls - Windows Firewall.mp4 62.67 MB
4. Firewalls/5. Windows - Host Based Firewalls - Windows Firewall Control (WFC).mp4 35.68 MB
4. Firewalls/6. Windows - Host Based Firewalls - Third Party.mp4 35.26 MB
4. Firewalls/7. Linux - Host Based Firewalls - iptables.mp4 60.79 MB
4. Firewalls/8. Linux - Host Based Firewalls - UFW, gufw & nftables.mp4 49.5 MB
4. Firewalls/9. Mac - Host based Firewalls - Application Firewall & PF.mp4 43.19 MB
5. Network Attacks, Architecture and Isolation/1. Goals and Learning Objectives.mp4 1.58 MB
5. Network Attacks, Architecture and Isolation/2. Network Attacks and Network Isolation - Introduction and IOT.mp4 15.32 MB
5. Network Attacks, Architecture and Isolation/3. Network Attacks and Network Isolation - Arp Spoofing and Switches.mp4 17.68 MB
5. Network Attacks, Architecture and Isolation/4. Effective Network Isolation Part 1.mp4 34.98 MB
5. Network Attacks, Architecture and Isolation/5. Effective Network Isolation Part 2.mp4 23.78 MB
6. Wireless and Wi-Fi Security/1. Goals and Learning Objectives.mp4 2.1 MB
6. Wireless and Wi-Fi Security/2. Wi-Fi Weaknesses - WEP.mp4 8.15 MB
6. Wireless and Wi-Fi Security/3. Wi-Fi Weaknesses - WPA, WPA2, TKIP and CCMP.mp4 37 MB
6. Wireless and Wi-Fi Security/4. Wi-Fi Weaknesses - Wi-Fi Protected Setup WPS, Evil Twin and Rouge AP.mp4 15.94 MB
6. Wireless and Wi-Fi Security/5. Wi-Fi Security Testing.mp4 21.72 MB
6. Wireless and Wi-Fi Security/6. Wireless Security - Secure Configuration and Network Isolation.mp4 31.61 MB
6. Wireless and Wi-Fi Security/7. Wireless security - RF Isolation and Reduction.mp4 9.42 MB
6. Wireless and Wi-Fi Security/8. Wireless security - Who is on my Wi-Fi Network.mp4 11.7 MB
7. Network Monitoring for Threats/1. Goals and Learning Objectives.mp4 1.38 MB
7. Network Monitoring for Threats/2. Syslog.mp4 80.08 MB
7. Network Monitoring for Threats/3. Network Monitoring - Wireshark, tcpdump, tshark, iptables Part 1.mp4 44.59 MB
7. Network Monitoring for Threats/4. Network Monitoring - Wireshark, tcpdump, tshark, iptables Part 2.mp4 26.47 MB
7. Network Monitoring for Threats/5. Wireshark - Finding malware and hackers - Part 1.mp4 91.01 MB
7. Network Monitoring for Threats/6. Wireshark - Finding malware and hackers - Part 2.mp4 56.04 MB
7. Network Monitoring for Threats/7. Network Monitoring - Wincap, NST, Netminer and NetWorx.mp4 18.82 MB
8. How We Are Tracked Online/1. Goals and Learning Objectives.mp4 1.98 MB
8. How We Are Tracked Online/10. More Tracking.mp4 52.06 MB
8. How We Are Tracked Online/11. Browser and Internet Profiling.mp4 41.77 MB
8. How We Are Tracked Online/2. Types of Tracking.mp4 89.85 MB
8. How We Are Tracked Online/3. IP Address.mp4 46.36 MB
8. How We Are Tracked Online/4. 3rd Party Connections.mp4 36.56 MB
8. How We Are Tracked Online/5. HTTP Referer.mp4 14.42 MB
8. How We Are Tracked Online/6. Cookies and Scripts.mp4 33.75 MB
8. How We Are Tracked Online/7. Super Cookies.mp4 28.72 MB
8. How We Are Tracked Online/8. Browser Fingerprinting and Browser Volunteered Information.mp4 37.15 MB
8. How We Are Tracked Online/9. Browser and Browser Functionality.mp4 12.99 MB
9. Search Engines and Privacy/1. Goals and Learning Objectives.mp4 1.63 MB
9. Search Engines and Privacy/2. Search Engine Tracking, Censorship and Privacy.mp4 53.64 MB
9. Search Engines and Privacy/3. Ixquick and Startpage.mp4 33.71 MB
9. Search Engines and Privacy/4. DuckDuckGo.mp4 11.95 MB
9. Search Engines and Privacy/5. Disconnect search.mp4 16.44 MB
9. Search Engines and Privacy/6. YaCy.mp4 42.15 MB
9. Search Engines and Privacy/7. Private and Anonymous Searching.mp4 54.34 MB
其他位置