Torrent Info
Title Cyber Security for Absolute Beginners Essential Concepts
Category
Size 1.58GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
[TGx]Downloaded from torrentgalaxy.to .txt 585B
0 221.56KB
1 260.02KB
1. Congratulations.mp4 20.15MB
1. Congratulations.srt 1.67KB
1. Section Introduction.mp4 20.24MB
1. Section Introduction.mp4 13.59MB
1. Section Introduction.mp4 13.23MB
1. Section Introduction.mp4 12.83MB
1. Section Introduction.mp4 10.74MB
1. Section Introduction.mp4 10.62MB
1. Section Introduction.mp4 9.98MB
1. Section Introduction.mp4 9.76MB
1. Section Introduction.mp4 7.92MB
1. Section Introduction.srt 756B
1. Section Introduction.srt 1.09KB
1. Section Introduction.srt 1.79KB
1. Section Introduction.srt 687B
1. Section Introduction.srt 877B
1. Section Introduction.srt 1.07KB
1. Section Introduction.srt 1.00KB
1. Section Introduction.srt 964B
1. Section Introduction.srt 832B
1. Welcome to the Course!.mp4 22.40MB
1. Welcome to the Course!.srt 6.06KB
10 467.21KB
10. Student Exercise 2 Identifying your MAC and IP Address (Windows and Mac OS).mp4 34.13MB
10. Student Exercise 2 Identifying your MAC and IP Address (Windows and Mac OS).srt 5.67KB
10. Virtual Private Network (VPN).mp4 19.64MB
10. Virtual Private Network (VPN).srt 5.45KB
11 276.17KB
11. Wireless Networking Security.mp4 31.04MB
11. Wireless Networking Security.srt 8.10KB
12 278.55KB
12. Student Exercise #3 Exploring the Built-In Firewall (Windows and Mac OS).mp4 49.60MB
12. Student Exercise #3 Exploring the Built-In Firewall (Windows and Mac OS).srt 8.79KB
13 44.24KB
14 211.93KB
15 28.33KB
16 204.52KB
17 227.35KB
18 333.13KB
19 505.54KB
2 279.09KB
2. How to Download Your Udemy Course Certificate of Completion.html 659B
2. Multi-Factor Authentication.mp4 15.10MB
2. Multi-Factor Authentication.srt 5.53KB
2. Patch Management & Change Management.mp4 23.09MB
2. Patch Management & Change Management.srt 6.86KB
2. Social Engineering Attacks.mp4 21.83MB
2. Social Engineering Attacks.srt 6.59KB
2. The CIA Triad.mp4 19.25MB
2. The CIA Triad.srt 7.56KB
2. Viruses and Worms.mp4 20.19MB
2. Viruses and Worms.srt 5.98KB
2. What Hacking Isn’t.mp4 40.24MB
2. What Hacking Isn’t.srt 3.08KB
2. What is a Computer Network.mp4 8.43MB
2. What is a Computer Network.srt 2.87KB
2. What is Cyber Security.mp4 24.36MB
2. What is Cyber Security.srt 4.73KB
2. Why Learn Cyber Security from Me.mp4 14.69MB
2. Why Learn Cyber Security from Me.srt 4.03KB
2. Zero-Day Attacks.mp4 15.13MB
2. Zero-Day Attacks.srt 3.97KB
20 241.08KB
21 143.26KB
22 262.41KB
23 452.62KB
24 488.87KB
25 247.13KB
26 422.99KB
27 332.53KB
28 105.99KB
29 177.24KB
3 406.30KB
3.1 Course Companion Study Guide.pdf 2.18MB
3. Buffer Overflows.mp4 23.74MB
3. Buffer Overflows.srt 6.70KB
3. Course Companion Study Guide.mp4 15.87MB
3. Course Companion Study Guide.srt 1.32KB
3. Defense in Depth.mp4 8.12MB
3. Defense in Depth.srt 3.04KB
3. Incident Response.mp4 30.23MB
3. Incident Response.srt 8.75KB
3. Password Best Practices.mp4 21.04MB
3. Password Best Practices.srt 7.46KB
3. Social Engineering Scenarios Overview.mp4 26.51MB
3. Social Engineering Scenarios Overview.srt 2.26KB
3. Some Basic Networking Rules.mp4 9.39MB
3. Some Basic Networking Rules.srt 2.99KB
3. Trojan Horses and Logic Bombs.mp4 13.97MB
3. Trojan Horses and Logic Bombs.srt 4.94KB
3. Types of Hackers.mp4 10.49MB
3. Types of Hackers.srt 3.51KB
3. Why Do We Need Cyber Security.mp4 23.26MB
3. Why Do We Need Cyber Security.srt 7.66KB
30 446.93KB
31 357.17KB
32 468.29KB
33 139.67KB
34 149.39KB
35 93.54KB
36 261.30KB
37 318.33KB
38 355.93KB
39 368.69KB
4 347.27KB
4. Application Development Security.mp4 31.10MB
4. Application Development Security.srt 8.32KB
4. Computer Protocols.mp4 12.52MB
4. Computer Protocols.srt 4.23KB
4. Course Case Studies Overview.mp4 19.08MB
4. Course Case Studies Overview.srt 1.47KB
4. Endpoint Protection.mp4 19.10MB
4. Endpoint Protection.srt 6.26KB
4. Hacker Motivations.mp4 17.99MB
4. Hacker Motivations.srt 5.49KB
4. Least Privilege.mp4 14.60MB
4. Least Privilege.srt 6.00KB
4. Protocol Spoofing.mp4 31.05MB
4. Protocol Spoofing.srt 10.85KB
4. Social Engineering Phone Call Example #1.mp4 29.96MB
4. Social Engineering Phone Call Example #1.srt 2.40KB
4. Spyware and Adware.mp4 11.03MB
4. Spyware and Adware.srt 4.32KB
4. The Current State of Cybersecurity in 2021 & 2022.mp4 55.73MB
4. The Current State of Cybersecurity in 2021 & 2022.srt 9.64KB
40 259.28KB
41 410.09KB
42 434.45KB
43 232.99KB
44 338.68KB
45 172.50KB
46 7.74KB
47 144.19KB
48 137.54KB
49 474.79KB
5 270.58KB
5. DoS and DDoS Attacks.mp4 15.54MB
5. DoS and DDoS Attacks.srt 4.82KB
5. Encryption.mp4 30.23MB
5. Encryption.srt 8.61KB
5. Familiarizing Yourself with Udemy's Course Taking Interface.mp4 62.75MB
5. Familiarizing Yourself with Udemy's Course Taking Interface.srt 11.25KB
5. LANs versus WANs.mp4 18.33MB
5. LANs versus WANs.srt 5.72KB
5. Ransomware and Rootkits.mp4 28.47MB
5. Ransomware and Rootkits.srt 6.30KB
5. Risk Management.mp4 80.39MB
5. Risk Management.srt 27.17KB
5. Security Assessments.mp4 18.77MB
5. Security Assessments.srt 5.73KB
5. Social Engineering Phone Call Example #2.mp4 35.31MB
5. Social Engineering Phone Call Example #2.srt 2.48KB
5. The Hacking Methodology.mp4 23.56MB
5. The Hacking Methodology.srt 11.24KB
50 380.01KB
51 413.41KB
52 318.45KB
53 411.29KB
54 33.95KB
55 414.96KB
56 281.21KB
57 177.74KB
58 491.27KB
59 480.20KB
6 193.02KB
6. Email Spam, Spoofing, Phishing, and Pharming.mp4 45.66MB
6. Email Spam, Spoofing, Phishing, and Pharming.srt 13.01KB
6. Firewalls.mp4 24.76MB
6. Firewalls.srt 7.24KB
6. How Hackers Deploy Malware.mp4 20.41MB
6. How Hackers Deploy Malware.srt 5.45KB
6. How to Access Course Subtitles & Transcripts.html 1.04KB
6. MAC versus IP Addresses.mp4 16.86MB
6. MAC versus IP Addresses.srt 4.87KB
6. Risk Management Program.mp4 28.79MB
6. Risk Management Program.srt 7.73KB
6. Weak Encryption Key & Software Vulnerability Attacks.mp4 20.86MB
6. Weak Encryption Key & Software Vulnerability Attacks.srt 5.60KB
60 269.69KB
61 393.58KB
62 6.17KB
63 21.43KB
64 248.91KB
65 112.33KB
66 67.84KB
67 384.11KB
68 77.73KB
69 180.19KB
7 379.43KB
7. Case Study Colonial Pipeline.html 2.49KB
7. Intrusion Detection & Prevention Systems (IDSIPS).mp4 22.68MB
7. Intrusion Detection & Prevention Systems (IDSIPS).srt 6.08KB
7. Join our Facebook Student Community.html 1.07KB
7. Personnel Policies.mp4 20.85MB
7. Personnel Policies.srt 6.89KB
7. Switches versus Routers.mp4 27.80MB
7. Switches versus Routers.srt 8.02KB
7. Web-Based Attacks.mp4 23.52MB
7. Web-Based Attacks.srt 7.96KB
8 414.66KB
8. Evil Twin and Rogue Access Points.mp4 26.67MB
8. Evil Twin and Rogue Access Points.srt 7.12KB
8. TCPIP Protocol Suite.mp4 21.15MB
8. TCPIP Protocol Suite.srt 5.55KB
8. Training, Eduation and Awareness.mp4 21.56MB
8. Training, Eduation and Awareness.srt 7.17KB
8. Udemy Mobile App for iOS & Android - Download & Take Course Videos On the Go!.html 1.19KB
8. Utilizing a Network DMZ.mp4 18.67MB
8. Utilizing a Network DMZ.srt 5.29KB
9 459.35KB
9. Case Study TJX Companies Inc. (TJX).html 2.00KB
9. Honeypot Decoys.mp4 7.82MB
9. Honeypot Decoys.srt 2.08KB
9. How the Internet Works (Simplified).mp4 26.78MB
9. How the Internet Works (Simplified).srt 6.19KB
9. Student Exercise Introduce Yourself.html 281B
TutsNode.com.txt 63B
Distribution statistics by country
France (FR) 1
Poland (PL) 1
Lebanon (LB) 1
Brazil (BR) 1
United States (US) 1
Belarus (BY) 1
Russia (RU) 1
Bahamas (BS) 1
Total 8
IP List List of IP addresses which were distributed this torrent