Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
1. ARE YOU READY.html |
3.64KB |
1. Definition of Computer Security.mp4 |
28.43MB |
1. Definition of Computer Security.srt |
3.92KB |
1. Introduction.mp4 |
5.73MB |
1. Introduction.mp4 |
10.16MB |
1. Introduction.mp4 |
7.23MB |
1. Introduction.mp4 |
8.71MB |
1. Introduction.mp4 |
13.02MB |
1. Introduction.srt |
1.43KB |
1. Introduction.srt |
1.72KB |
1. Introduction.srt |
1.03KB |
1. Introduction.srt |
1.72KB |
1. Introduction.srt |
1.61KB |
10. Firewalls vs Antivirus.mp4 |
9.27MB |
10. Firewalls vs Antivirus.srt |
2.21KB |
10. Layers of OSI Model.mp4 |
33.25MB |
10. Layers of OSI Model.srt |
10.85KB |
10. OH MY GOD! VIRUS!!.mp4 |
37.79MB |
10. OH MY GOD! VIRUS!!.srt |
7.55KB |
10. SECTION 3 QUIZ.html |
627B |
10. Symmetric Encryption.mp4 |
14.37MB |
10. Symmetric Encryption.srt |
3.48KB |
10. The NIST Framework.mp4 |
21.87MB |
10. The NIST Framework.srt |
3.83KB |
11. AES and DES.mp4 |
44.52MB |
11. AES and DES.srt |
7.12KB |
11. Introduction to TCPIP Model.mp4 |
76.04MB |
11. Introduction to TCPIP Model.srt |
11.55KB |
11. The COBIT Framework.mp4 |
25.57MB |
11. The COBIT Framework.srt |
4.07KB |
11. THE FINAL QUIZ - FIREWALLS AND ANTIVIRUS.html |
870B |
11. Types of Virus.mp4 |
59.33MB |
11. Types of Virus.srt |
11.32KB |
11. We value your feedback!.html |
2.54KB |
12. Asymmetric Encryption.mp4 |
16.27MB |
12. Asymmetric Encryption.srt |
3.12KB |
12. Conclusion.mp4 |
2.62MB |
12. Conclusion.srt |
785B |
12. CONGRATULATIONS!.mp4 |
18.64MB |
12. CONGRATULATIONS!.srt |
2.37KB |
12. OSI Model vs TCPIP Model.mp4 |
24.13MB |
12. OSI Model vs TCPIP Model.srt |
4.95KB |
12. Other Security Frameworks.mp4 |
25.21MB |
12. Other Security Frameworks.srt |
5.43KB |
12. You should defend yourself!.mp4 |
45.98MB |
12. You should defend yourself!.srt |
8.95KB |
13. BASICS OF NETWORKING Quiz 2.html |
147B |
13. Have you ever heard about a Ransomware.mp4 |
81.12MB |
13. Have you ever heard about a Ransomware.srt |
12.43KB |
13. Hey there! Support We Secure..html |
2.53KB |
13. SECTION 6 QUIZ - KEY SECURITY CONCEPTS.html |
627B |
14. Addressing in Computer Networks.mp4 |
53.58MB |
14. Addressing in Computer Networks.srt |
9.92KB |
14. IMPORTANT!.html |
2.53KB |
14. Leave a Rating!.html |
2.53KB |
14. RSA & Diffie Hellman.mp4 |
47.48MB |
14. RSA & Diffie Hellman.srt |
9.20KB |
15. Conclusion.mp4 |
2.13MB |
15. Conclusion.srt |
732B |
15. Hashing.mp4 |
62.06MB |
15. Hashing.srt |
8.41KB |
15. IP Address- IPv4 and IPv6.mp4 |
40.64MB |
15. IP Address- IPv4 and IPv6.srt |
6.86KB |
15. PRACTICAL INFORMATION GATHERING USING SHODAN.mp4 |
74.34MB |
15. PRACTICAL INFORMATION GATHERING USING SHODAN.srt |
9.69KB |
16. Introduction to Classes of IP Addressing.mp4 |
14.98MB |
16. Introduction to Classes of IP Addressing.srt |
4.43KB |
16. Security Organizations.mp4 |
26.77MB |
16. Security Organizations.srt |
5.89KB |
16. The Cyber Kill Chain.mp4 |
31.30MB |
16. The Cyber Kill Chain.srt |
10.52KB |
17. Classes of IP Address.mp4 |
54.86MB |
17. Classes of IP Address.srt |
9.75KB |
17. Critical Thinking in Cyber Security.mp4 |
21.72MB |
17. Critical Thinking in Cyber Security.srt |
4.82KB |
17. Introduction to Social Engineering.mp4 |
28.11MB |
17. Introduction to Social Engineering.srt |
5.94KB |
18. PRACTICAL HOW TO FIND OUT YOUR PC's IP ADDRESS.mp4 |
22.43MB |
18. PRACTICAL HOW TO FIND OUT YOUR PC's IP ADDRESS.srt |
3.54KB |
18. The Five Critical Thinking Skills.mp4 |
24.13MB |
18. The Five Critical Thinking Skills.srt |
7.16KB |
18. Types of Social Engineering.mp4 |
57.62MB |
18. Types of Social Engineering.srt |
6.99KB |
19. PRACTICAL HOW TO FIND OUT USERNAMES AND PASSWORDS USING SOCIAL ENGINEERING.mp4 |
85.55MB |
19. PRACTICAL HOW TO FIND OUT USERNAMES AND PASSWORDS USING SOCIAL ENGINEERING.srt |
12.47KB |
19. PRACTICAL HOW TO FIND OUT YOUR PC'S MAC ADDRESS.mp4 |
41.40MB |
19. PRACTICAL HOW TO FIND OUT YOUR PC'S MAC ADDRESS.srt |
5.18KB |
19. PRACTICAL USING NSLOOKUP TOOL.mp4 |
7.14MB |
19. PRACTICAL USING NSLOOKUP TOOL.srt |
3.09KB |
2. Confidentiality - The Most Important Element of Security.mp4 |
26.20MB |
2. Confidentiality - The Most Important Element of Security.srt |
5.07KB |
2. Different types of Actors in Cyber Security.mp4 |
64.44MB |
2. Different types of Actors in Cyber Security.srt |
11.29KB |
2. Interesting Facts about Cyber Security.mp4 |
42.84MB |
2. Interesting Facts about Cyber Security.srt |
5.31KB |
2. Intrusion Detection System.mp4 |
59.16MB |
2. Intrusion Detection System.srt |
12.42KB |
2. Security Architect's View of Security.mp4 |
46.98MB |
2. Security Architect's View of Security.srt |
10.03KB |
2. Standard Definition of Cyber Security.mp4 |
19.01MB |
2. Standard Definition of Cyber Security.srt |
3.07KB |
2. What is Computer Networking - Definition and Characteristics.mp4 |
19.41MB |
2. What is Computer Networking - Definition and Characteristics.srt |
3.24KB |
20. PRACTICAL USING NETSTAT TOOL.mp4 |
32.45MB |
20. PRACTICAL USING NETSTAT TOOL.srt |
4.37KB |
20. SECTION 5 QUIZ - TYPES OF ACTORS, ATTACKS AND MALWARE.html |
627B |
20. The Internet Protocol (IP).mp4 |
31.93MB |
20. The Internet Protocol (IP).srt |
7.44KB |
21. BASICS OF NETWORKING QUIZ 3.html |
147B |
21. Conclusion.mp4 |
4.15MB |
21. Conclusion.srt |
847B |
21. SECTION 4 QUIZ - DIVING DEEP INTO CYBER SECURITY.html |
627B |
22. Address Resolution Protocol (ARP).mp4 |
50.52MB |
22. Address Resolution Protocol (ARP).srt |
10.29KB |
22. Conclusion.mp4 |
2.78MB |
22. Conclusion.srt |
726B |
23. SUPPORT WE SECURE!.html |
2.53KB |
24. Dynamic Host Configuration Protocol (DHCP).mp4 |
36.84MB |
24. Dynamic Host Configuration Protocol (DHCP).srt |
9.19KB |
25. Internet Control Message Protocol (ICMP).mp4 |
37.40MB |
25. Internet Control Message Protocol (ICMP).srt |
7.13KB |
26. RIP and OSPF Protocols.mp4 |
35.66MB |
26. RIP and OSPF Protocols.srt |
6.07KB |
27. PRACTICAL HOW TO FIND OUT THE PATH OF DATA PACKETS USING TRACERT.mp4 |
16.99MB |
27. PRACTICAL HOW TO FIND OUT THE PATH OF DATA PACKETS USING TRACERT.srt |
2.98KB |
28. What are Sockets.mp4 |
30.39MB |
28. What are Sockets.srt |
6.50KB |
29. File Transfer Protocol (FTP).mp4 |
27.89MB |
29. File Transfer Protocol (FTP).srt |
4.04KB |
3. Have a look at this!.mp4 |
11.74MB |
3. Have a look at this!.srt |
776B |
3. Integrity, Authentication, Access Control and Non-Repudiation.mp4 |
55.85MB |
3. Integrity, Authentication, Access Control and Non-Repudiation.srt |
10.41KB |
3. Introduction to Firewalls.mp4 |
53.33MB |
3. Introduction to Firewalls.srt |
10.47KB |
3. Network Topologies.mp4 |
25.81MB |
3. Network Topologies.srt |
7.67KB |
3. Types of Computer Security.mp4 |
25.09MB |
3. Types of Computer Security.srt |
3.26KB |
3. Types of Cyber Attacks.mp4 |
31.37MB |
3. Types of Cyber Attacks.srt |
4.95KB |
3. What is Vulnerability Assessment.mp4 |
36.97MB |
3. What is Vulnerability Assessment.srt |
5.76KB |
30. Hypertext Transfer Protocol (HTTP).mp4 |
41.68MB |
30. Hypertext Transfer Protocol (HTTP).srt |
4.60KB |
31. Hyptertext Transfer ProtocolSecure Socket Layer (HTTPS).mp4 |
46.19MB |
31. Hyptertext Transfer ProtocolSecure Socket Layer (HTTPS).srt |
6.28KB |
32. Domain Name System (DNS).mp4 |
20.48MB |
32. Domain Name System (DNS).srt |
2.99KB |
33. BASICS OF NETWORKING Quiz 4.html |
720B |
34.1 Network-Security-Essentials-4th-Edition William Stallings.pdf |
3.06MB |
34.2 (McGraw-Hill Forouzan Networking) Behrouz A. Forouzan - Data Communications and Networking -McGraw-Hill Higher Education (2007).pdf |
10.84MB |
34.3 Atul Kahate - Cryptography and network security (2006, Tata McGraw-Hill).pdf |
14.95MB |
34.4 Kurose, James F._ Ross, Keith W. - Computer networking _ a top-down approach (2017) - libgen.lc.pdf |
19.97MB |
34. Conclusion.mp4 |
2.21MB |
34. Conclusion.srt |
849B |
4. 4 Phases of Vulnerability Assessment.mp4 |
40.36MB |
4. 4 Phases of Vulnerability Assessment.srt |
12.64KB |
4. Hacking Organizations around the Globe.mp4 |
27.15MB |
4. Hacking Organizations around the Globe.srt |
5.91KB |
4. History of Cyber Security.mp4 |
60.12MB |
4. History of Cyber Security.srt |
7.22KB |
4. IDS evasion techniques.mp4 |
33.93MB |
4. IDS evasion techniques.srt |
8.55KB |
4. Introduction to Incident Response Team.mp4 |
32.05MB |
4. Introduction to Incident Response Team.srt |
6.49KB |
4. Key Terms in Cyber Security.mp4 |
30.67MB |
4. Key Terms in Cyber Security.srt |
7.99KB |
4. Meet the instructors!.mp4 |
7.26MB |
4. Meet the instructors!.srt |
484B |
5.1 How to Become a Cyber Security Professional.html |
94B |
5. History and Applications of Computer Networking.mp4 |
39.06MB |
5. History and Applications of Computer Networking.srt |
6.68KB |
5. Phases of Incident Response.mp4 |
19.83MB |
5. Phases of Incident Response.srt |
6.23KB |
5. PRACTICAL DOWNLOADING NESSUS VULNERABILITY SCANNER.mp4 |
11.24MB |
5. PRACTICAL DOWNLOADING NESSUS VULNERABILITY SCANNER.srt |
1.95KB |
5. Scope and Career Insights in Cyber Security.mp4 |
48.28MB |
5. Scope and Career Insights in Cyber Security.srt |
10.67KB |
5. Security Services and Mechanisms.mp4 |
17.62MB |
5. Security Services and Mechanisms.srt |
4.31KB |
5. The Elements of Information Security.mp4 |
23.07MB |
5. The Elements of Information Security.srt |
6.44KB |
5. What is DMZ.mp4 |
36.70MB |
5. What is DMZ.srt |
6.32KB |
6.1 Network-Security-Essentials-4th-Edition William Stallings.pdf |
3.06MB |
6.2 (McGraw-Hill Forouzan Networking) Behrouz A. Forouzan - Data Communications and Networking -McGraw-Hill Higher Education (2007).pdf |
10.83MB |
6.3 Ethem Mining - Kali Linux Hacking_ A Complete Step by Step Guide to Learn the Fundamentals of Cyber Security, Hacking, and Penetration Testing. Includes Valuable Basic Networking Concepts-Independentl.epub |
2.56MB |
6. Before moving ahead....html |
2.53KB |
6. Firewall evasion techniques.mp4 |
40.89MB |
6. Firewall evasion techniques.srt |
9.39KB |
6. GETTING STARTED WITH CYBER SECURITY QUIZ.html |
661B |
6. Introduction to Threats.mp4 |
11.24MB |
6. Introduction to Threats.srt |
3.99KB |
6. Laws in Cyber Security.mp4 |
31.94MB |
6. Laws in Cyber Security.srt |
6.23KB |
6. PRACTICAL CREATING A ADVANCE NETWORK SCAN POLICY.mp4 |
28.84MB |
6. PRACTICAL CREATING A ADVANCE NETWORK SCAN POLICY.srt |
7.48KB |
6. Types of Attacks.mp4 |
43.35MB |
6. Types of Attacks.srt |
13.35KB |
7. DID YOU RATE.html |
2.53KB |
7. Different types of Firewalls.mp4 |
31.95MB |
7. Different types of Firewalls.srt |
10.89KB |
7. PRACTICAL INITIATING A SCAN USING USER DEFINED POLICIES.mp4 |
16.75MB |
7. PRACTICAL INITIATING A SCAN USING USER DEFINED POLICIES.srt |
3.80KB |
7. Protocols and Standards.mp4 |
28.91MB |
7. Protocols and Standards.srt |
4.93KB |
7. Roles in Cyber Security Part 1.mp4 |
48.97MB |
7. Roles in Cyber Security Part 1.srt |
9.59KB |
7. What are Audits in Cyber Security.mp4 |
45.02MB |
7. What are Audits in Cyber Security.srt |
12.44KB |
7. What is a Malware.mp4 |
47.53MB |
7. What is a Malware.srt |
9.28KB |
8. BASICS OF NETWORKING Quiz 1.html |
147B |
8. Conclusion.mp4 |
3.58MB |
8. Conclusion.srt |
693B |
8. Everything about Trojans.mp4 |
50.19MB |
8. Everything about Trojans.srt |
8.64KB |
8. Internal Audit vs External Audit.mp4 |
34.89MB |
8. Internal Audit vs External Audit.srt |
5.57KB |
8. PRACTICAL GOING THROUGH SCANNED RESULTS.mp4 |
15.11MB |
8. PRACTICAL GOING THROUGH SCANNED RESULTS.srt |
4.06KB |
8. Roles in Cyber Security Part 2.mp4 |
34.05MB |
8. Roles in Cyber Security Part 2.srt |
6.29KB |
8. The Antivirus!.mp4 |
20.17MB |
8. The Antivirus!.srt |
3.73KB |
9. Antivirus Detection Techniques.mp4 |
72.62MB |
9. Antivirus Detection Techniques.srt |
11.74KB |
9. How to carry out an Internal Audit.mp4 |
48.54MB |
9. How to carry out an Internal Audit.srt |
13.56KB |
9. Introduction to Cryptography.mp4 |
41.86MB |
9. Introduction to Cryptography.srt |
5.81KB |
9. Introduction to OSI Model.mp4 |
32.18MB |
9. Introduction to OSI Model.srt |
5.05KB |
9. PRACTICAL USING OSINT FRAMEWORK FOR INFORMATION GATHERING.mp4 |
41.17MB |
9. PRACTICAL USING OSINT FRAMEWORK FOR INFORMATION GATHERING.srt |
6.40KB |
9. Types of Trojans.mp4 |
49.55MB |
9. Types of Trojans.srt |
8.11KB |
Download Paid Udemy Courses For Free.url |
116B |
Download Paid Udemy Courses For Free.url |
116B |
GetFreeCourses.Co.url |
116B |
GetFreeCourses.Co.url |
116B |
How you can help GetFreeCourses.Co.txt |
182B |
How you can help GetFreeCourses.Co.txt |
182B |