zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
[Tutorialsplanet.NET] Udemy - The Complete Cyber Security Course Hackers Exposed!
magnet:?xt=urn:btih:91355981ca6d9687f04dd1b93edeb20300a8cb0b&dn=[Tutorialsplanet.NET] Udemy - The Complete Cyber Security Course Hackers Exposed!
磁力链接详情
文件列表详情
91355981ca6d9687f04dd1b93edeb20300a8cb0b
infohash:
122
文件数量
4.21 GB
文件大小
2020-7-10 16:20
创建日期
2024-12-10 16:20
最后访问
相关分词
Tutorialsplanet
NET
Udemy
-
The
Complete
Cyber
Security
Course
Hackers
Exposed!
1. Introduction/1. Welcome and Introduction to the Instructor!.mp4 19.9 MB
1. Introduction/2. Security Quick Win!.mp4 43.2 MB
1. Introduction/3. Goals and Learning Objectives - Volume 1.mp4 16.11 MB
1. Introduction/4. Target Audience.mp4 7.33 MB
1. Introduction/5. Study Recommendations.mp4 17.95 MB
1. Introduction/6. Course updates.mp4 4.39 MB
10. Security Domains/1. Goals and Learning Objectives.mp4 1.43 MB
10. Security Domains/2. Security Domains.mp4 21.84 MB
11. Security Through Isolation and Compartmentalization/1. Goals and Learning Objectives.mp4 2.3 MB
11. Security Through Isolation and Compartmentalization/10. Linux - Sandboxes and Application Isolation.mp4 13.86 MB
11. Security Through Isolation and Compartmentalization/11. Mac - Sandboxes and Application Isolation.mp4 23.8 MB
11. Security Through Isolation and Compartmentalization/12. Virtual Machines.mp4 44.44 MB
11. Security Through Isolation and Compartmentalization/13. Virtual Machine Weaknesses.mp4 22.74 MB
11. Security Through Isolation and Compartmentalization/14. Virtual Machine Hardening.mp4 36.97 MB
11. Security Through Isolation and Compartmentalization/15. Whonix OS - Anonymous Operating system.mp4 88.65 MB
11. Security Through Isolation and Compartmentalization/16. Whonix OS - Weaknesses.mp4 15.79 MB
11. Security Through Isolation and Compartmentalization/17. Qubes OS.mp4 78.73 MB
11. Security Through Isolation and Compartmentalization/18. Security Domains, Isolation and Compartmentalization.mp4 14.98 MB
11. Security Through Isolation and Compartmentalization/2. Introduction to Isolation and Compartmentalization.mp4 5.67 MB
11. Security Through Isolation and Compartmentalization/3. Physical and Hardware Isolation - How to change the Mac Address.mp4 25.58 MB
11. Security Through Isolation and Compartmentalization/4. Physical and Hardware Isolation - Hardware Serials.mp4 50.25 MB
11. Security Through Isolation and Compartmentalization/5. Virtual Isolation.mp4 57.32 MB
11. Security Through Isolation and Compartmentalization/6. Dual Boot.mp4 7.93 MB
11. Security Through Isolation and Compartmentalization/7. Built-in Sandboxes and Application Isolation.mp4 10.4 MB
11. Security Through Isolation and Compartmentalization/8. Windows - Sandboxes and Application Isolation.mp4 26.36 MB
11. Security Through Isolation and Compartmentalization/9. Windows - Sandboxes and Application Isolation - Sandboxie.mp4 70.12 MB
12. Wrap Up/1. Congratulations.mp4 5.29 MB
12. Wrap Up/2. Certificate Of Completion for CPEs.mp4 2.2 MB
12. Wrap Up/3. Sample from Vol 2 - Router Vulnerability Scanning (Shodan, Qualys).mp4 48.07 MB
12. Wrap Up/4. Sample from Vol 2 - Password cracking part 2.mp4 24.16 MB
12. Wrap Up/5. Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3.mp4 31.76 MB
12. Wrap Up/6. Sample from Vol 4 - Email clients, protocols and authentication.mp4 38.19 MB
2. know Yourself - The Threat and Vulnerability Landscape/1. Theory and Practical.mp4 2.25 MB
2. know Yourself - The Threat and Vulnerability Landscape/10. Defense In Depth.mp4 3 MB
2. know Yourself - The Threat and Vulnerability Landscape/11. The Zero Trust Model.mp4 10.27 MB
2. know Yourself - The Threat and Vulnerability Landscape/2. Goals and Learning Objectives.mp4 2.7 MB
2. know Yourself - The Threat and Vulnerability Landscape/3. Protect What You Value.mp4 8.94 MB
2. know Yourself - The Threat and Vulnerability Landscape/4. What is Privacy, Anonymity and Pseudonymity.mp4 11.87 MB
2. know Yourself - The Threat and Vulnerability Landscape/5. Security, Vulnerabilities, Threats and Adversaries.mp4 11.23 MB
2. know Yourself - The Threat and Vulnerability Landscape/6. Asset Selection.mp4 7.68 MB
2. know Yourself - The Threat and Vulnerability Landscape/7. Threat Modeling and Risk Assessments.mp4 18.03 MB
2. know Yourself - The Threat and Vulnerability Landscape/8. Security vs Privacy vs Anonymity - Can we have it all.mp4 5.44 MB
2. know Yourself - The Threat and Vulnerability Landscape/9. Confidentiality, Integrity and Availability - (Security Attributes).mp4 19.34 MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/1. Goals and Learning Objectives.mp4 2.9 MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/10. Social engineering - Scams, cons, tricks and fraud.mp4 11.92 MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.mp4 16.19 MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/12. Darknets, Dark Markets and Exploit kits.mp4 32.43 MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/13. Governments, spies and secret stuff part I.mp4 27.03 MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14. Governments, spies and secret stuff part II.mp4 30.24 MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15. Regulating encryption, mandating insecurity & legalizing spying.mp4 42.74 MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16. Trust & Backdoors.mp4 24.49 MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/17. Censorship.mp4 6.49 MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/18. Cyber Threat Intelligence – Stay Informed.mp4 2.61 MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/2. Why You Need Security – The Value Of A Hack.mp4 28.93 MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/3. The Top 3 Things You Need To Stay Safe Online.mp4 2.5 MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4 38.11 MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/5. Hackers, crackers and cyber criminals.mp4 7.7 MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/6. Malware, viruses, rootkits and RATs.mp4 12.14 MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/7. Spyware, Adware, Scareware, PUPs & Browser hijacking.mp4 10.77 MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/8. What is Phishing, Vishing and SMShing.mp4 25.99 MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/9. Spamming & Doxing.mp4 4.79 MB
4. Encryption Crash Course/1. Goals and Learning Objectives.mp4 1.63 MB
4. Encryption Crash Course/10. Certificate Authorities and HTTPS.mp4 199.31 MB
4. Encryption Crash Course/11. End-to-End Encryption (E2EE).mp4 8.19 MB
4. Encryption Crash Course/12. Steganography.mp4 104.31 MB
4. Encryption Crash Course/13. How Security and Encryption is Really Attacked.mp4 17.36 MB
4. Encryption Crash Course/2. Symmetric Encryption.mp4 32.31 MB
4. Encryption Crash Course/3. Asymmetric Encryption.mp4 72.32 MB
4. Encryption Crash Course/4. Hash Functions.mp4 89.24 MB
4. Encryption Crash Course/5. Digital Signatures.mp4 42.73 MB
4. Encryption Crash Course/6. Secure Sockets Layer (SSL) and Transport layer security (TLS).mp4 160.85 MB
4. Encryption Crash Course/7. SSL Stripping.mp4 114.51 MB
4. Encryption Crash Course/8. HTTPS (HTTP Secure).mp4 81.9 MB
4. Encryption Crash Course/9. Digital Certificates.mp4 81.97 MB
5. Setting up a Testing Environment Using Virtual Machines (Lab)/1. Goals and Learning Objectives.mp4 1.84 MB
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2. Introduction to Setting up a Testing Environment Using Virtual Machines.mp4 113.36 MB
5. Setting up a Testing Environment Using Virtual Machines (Lab)/3. Vmware.mp4 110.48 MB
5. Setting up a Testing Environment Using Virtual Machines (Lab)/4. Virtual box.mp4 144.16 MB
5. Setting up a Testing Environment Using Virtual Machines (Lab)/5. Kali Linux 2018.mp4 59.63 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/1. Goals and Learning Objectives.mp4 2.43 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/10. Windows 10 - WiFi Sense.mp4 59.76 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/11. Windows 7, 8 and 8.1 - Privacy & Tracking.mp4 105.52 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/12. Mac - Privacy & Tracking.mp4 57.97 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/13. Linux and Unix “like” Operating systems.mp4 46.23 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/14. General Use Operating Systems (Windows, MacOS and Linux).mp4 46.91 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/15. General Use Operating Systems With a Security and Privacy Focus (Debian, Arch).mp4 39.41 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/16. Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS).mp4 32.32 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/17. Anonymity Focused Operating Systems (Tails and Whonix OS).mp4 21.54 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/18. Penetration Testing and Ethical Hacking Focused Operating Systems.mp4 13.38 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19. Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish).mp4 46.71 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/2. Security Features and Functionality.mp4 57.9 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/20. Linux - Debian 8 Jessie - Virtual box guest additions Issue.mp4 57.78 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/3. Security Bugs and Vulnerabilities.mp4 83.9 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/4. Usage Share.mp4 34.29 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/5. Windows 10 - Privacy & Tracking.mp4 79.95 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/6. Windows 10 - Disable tracking automatically.mp4 67.89 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/7. Windows 10 - Tool Disable Windows 10 Tracking.mp4 98.43 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/8. Windows 10 – Cortana.mp4 41.02 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/9. Windows 10 – Privacy Settings.mp4 86.46 MB
7. Security Bugs and Vulnerabilities/1. Goals and Learning Objectives.mp4 1.66 MB
7. Security Bugs and Vulnerabilities/10. Firefox - Browser and extension updates.mp4 34.02 MB
7. Security Bugs and Vulnerabilities/11. Chrome - Browser and extension updates.mp4 3.57 MB
7. Security Bugs and Vulnerabilities/12. IE and Edge - Browser and extention updates.mp4 5.64 MB
7. Security Bugs and Vulnerabilities/13. Auto updates - The Impact to privacy and anonymity.mp4 4.3 MB
7. Security Bugs and Vulnerabilities/2. The Importance of Patching.mp4 11.66 MB
7. Security Bugs and Vulnerabilities/3. Windows 7 - Auto Update.mp4 4.94 MB
7. Security Bugs and Vulnerabilities/4. Windows 8 & 8.1 - Auto Update.mp4 6.54 MB
7. Security Bugs and Vulnerabilities/5. Windows 10 - Auto Update.mp4 4.94 MB
7. Security Bugs and Vulnerabilities/6. Windows - Criticality and Patch Tuesday.mp4 41.81 MB
7. Security Bugs and Vulnerabilities/7. Windows 7, 8, 8.1 & 10 - Automate the pain away from patching.mp4 19.36 MB
7. Security Bugs and Vulnerabilities/8. Linux - Debian - Patching.mp4 38.49 MB
7. Security Bugs and Vulnerabilities/9. Mac - Patching.mp4 55.58 MB
8. Reducing Threat Privilege/1. Goals and Learning Objectives - Removing Privilege.mp4 13.59 MB
8. Reducing Threat Privilege/2. Windows 7 - Not using admin.mp4 11 MB
8. Reducing Threat Privilege/3. Windows 8 and 8.1 - Not using admin.mp4 18.24 MB
8. Reducing Threat Privilege/4. Windows 10 - Not using admin.mp4 14.15 MB
9. Social Engineering and Social Media Offence and Defence/1. Goals and Learning Objectives.mp4 1.73 MB
9. Social Engineering and Social Media Offence and Defence/2. Information Disclosure and Identity Strategies for Social Media.mp4 83.82 MB
9. Social Engineering and Social Media Offence and Defence/3. Identify Verification and Registration.mp4 23.4 MB
9. Social Engineering and Social Media Offence and Defence/4. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1.mp4 23.3 MB
9. Social Engineering and Social Media Offence and Defence/5. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2.mp4 49.31 MB
9. Social Engineering and Social Media Offence and Defence/6. Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons).mp4 14.52 MB
其他位置