Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585B |
0 |
221.56KB |
1 |
260.02KB |
1. Congratulations.mp4 |
20.15MB |
1. Congratulations.srt |
1.67KB |
1. Section Introduction.mp4 |
20.24MB |
1. Section Introduction.mp4 |
13.59MB |
1. Section Introduction.mp4 |
13.23MB |
1. Section Introduction.mp4 |
12.83MB |
1. Section Introduction.mp4 |
10.74MB |
1. Section Introduction.mp4 |
10.62MB |
1. Section Introduction.mp4 |
9.98MB |
1. Section Introduction.mp4 |
9.76MB |
1. Section Introduction.mp4 |
7.92MB |
1. Section Introduction.srt |
756B |
1. Section Introduction.srt |
1.09KB |
1. Section Introduction.srt |
1.79KB |
1. Section Introduction.srt |
687B |
1. Section Introduction.srt |
877B |
1. Section Introduction.srt |
1.07KB |
1. Section Introduction.srt |
1.00KB |
1. Section Introduction.srt |
964B |
1. Section Introduction.srt |
832B |
1. Welcome to the Course!.mp4 |
22.40MB |
1. Welcome to the Course!.srt |
6.06KB |
10 |
467.21KB |
10. Student Exercise 2 Identifying your MAC and IP Address (Windows and Mac OS).mp4 |
34.13MB |
10. Student Exercise 2 Identifying your MAC and IP Address (Windows and Mac OS).srt |
5.67KB |
10. Virtual Private Network (VPN).mp4 |
19.64MB |
10. Virtual Private Network (VPN).srt |
5.45KB |
11 |
276.17KB |
11. Wireless Networking Security.mp4 |
31.04MB |
11. Wireless Networking Security.srt |
8.10KB |
12 |
278.55KB |
12. Student Exercise #3 Exploring the Built-In Firewall (Windows and Mac OS).mp4 |
49.60MB |
12. Student Exercise #3 Exploring the Built-In Firewall (Windows and Mac OS).srt |
8.79KB |
13 |
44.24KB |
14 |
211.93KB |
15 |
28.33KB |
16 |
204.52KB |
17 |
227.35KB |
18 |
333.13KB |
19 |
505.54KB |
2 |
279.09KB |
2. How to Download Your Udemy Course Certificate of Completion.html |
659B |
2. Multi-Factor Authentication.mp4 |
15.10MB |
2. Multi-Factor Authentication.srt |
5.53KB |
2. Patch Management & Change Management.mp4 |
23.09MB |
2. Patch Management & Change Management.srt |
6.86KB |
2. Social Engineering Attacks.mp4 |
21.83MB |
2. Social Engineering Attacks.srt |
6.59KB |
2. The CIA Triad.mp4 |
19.25MB |
2. The CIA Triad.srt |
7.56KB |
2. Viruses and Worms.mp4 |
20.19MB |
2. Viruses and Worms.srt |
5.98KB |
2. What Hacking Isn’t.mp4 |
40.24MB |
2. What Hacking Isn’t.srt |
3.08KB |
2. What is a Computer Network.mp4 |
8.43MB |
2. What is a Computer Network.srt |
2.87KB |
2. What is Cyber Security.mp4 |
24.36MB |
2. What is Cyber Security.srt |
4.73KB |
2. Why Learn Cyber Security from Me.mp4 |
14.69MB |
2. Why Learn Cyber Security from Me.srt |
4.03KB |
2. Zero-Day Attacks.mp4 |
15.13MB |
2. Zero-Day Attacks.srt |
3.97KB |
20 |
241.08KB |
21 |
143.26KB |
22 |
262.41KB |
23 |
452.62KB |
24 |
488.87KB |
25 |
247.13KB |
26 |
422.99KB |
27 |
332.53KB |
28 |
105.99KB |
29 |
177.24KB |
3 |
406.30KB |
3.1 Course Companion Study Guide.pdf |
2.18MB |
3. Buffer Overflows.mp4 |
23.74MB |
3. Buffer Overflows.srt |
6.70KB |
3. Course Companion Study Guide.mp4 |
15.87MB |
3. Course Companion Study Guide.srt |
1.32KB |
3. Defense in Depth.mp4 |
8.12MB |
3. Defense in Depth.srt |
3.04KB |
3. Incident Response.mp4 |
30.23MB |
3. Incident Response.srt |
8.75KB |
3. Password Best Practices.mp4 |
21.04MB |
3. Password Best Practices.srt |
7.46KB |
3. Social Engineering Scenarios Overview.mp4 |
26.51MB |
3. Social Engineering Scenarios Overview.srt |
2.26KB |
3. Some Basic Networking Rules.mp4 |
9.39MB |
3. Some Basic Networking Rules.srt |
2.99KB |
3. Trojan Horses and Logic Bombs.mp4 |
13.97MB |
3. Trojan Horses and Logic Bombs.srt |
4.94KB |
3. Types of Hackers.mp4 |
10.49MB |
3. Types of Hackers.srt |
3.51KB |
3. Why Do We Need Cyber Security.mp4 |
23.26MB |
3. Why Do We Need Cyber Security.srt |
7.66KB |
30 |
446.93KB |
31 |
357.17KB |
32 |
468.29KB |
33 |
139.67KB |
34 |
149.39KB |
35 |
93.54KB |
36 |
261.30KB |
37 |
318.33KB |
38 |
355.93KB |
39 |
368.69KB |
4 |
347.27KB |
4. Application Development Security.mp4 |
31.10MB |
4. Application Development Security.srt |
8.32KB |
4. Computer Protocols.mp4 |
12.52MB |
4. Computer Protocols.srt |
4.23KB |
4. Course Case Studies Overview.mp4 |
19.08MB |
4. Course Case Studies Overview.srt |
1.47KB |
4. Endpoint Protection.mp4 |
19.10MB |
4. Endpoint Protection.srt |
6.26KB |
4. Hacker Motivations.mp4 |
17.99MB |
4. Hacker Motivations.srt |
5.49KB |
4. Least Privilege.mp4 |
14.60MB |
4. Least Privilege.srt |
6.00KB |
4. Protocol Spoofing.mp4 |
31.05MB |
4. Protocol Spoofing.srt |
10.85KB |
4. Social Engineering Phone Call Example #1.mp4 |
29.96MB |
4. Social Engineering Phone Call Example #1.srt |
2.40KB |
4. Spyware and Adware.mp4 |
11.03MB |
4. Spyware and Adware.srt |
4.32KB |
4. The Current State of Cybersecurity in 2021 & 2022.mp4 |
55.73MB |
4. The Current State of Cybersecurity in 2021 & 2022.srt |
9.64KB |
40 |
259.28KB |
41 |
410.09KB |
42 |
434.45KB |
43 |
232.99KB |
44 |
338.68KB |
45 |
172.50KB |
46 |
7.74KB |
47 |
144.19KB |
48 |
137.54KB |
49 |
474.79KB |
5 |
270.58KB |
5. DoS and DDoS Attacks.mp4 |
15.54MB |
5. DoS and DDoS Attacks.srt |
4.82KB |
5. Encryption.mp4 |
30.23MB |
5. Encryption.srt |
8.61KB |
5. Familiarizing Yourself with Udemy's Course Taking Interface.mp4 |
62.75MB |
5. Familiarizing Yourself with Udemy's Course Taking Interface.srt |
11.25KB |
5. LANs versus WANs.mp4 |
18.33MB |
5. LANs versus WANs.srt |
5.72KB |
5. Ransomware and Rootkits.mp4 |
28.47MB |
5. Ransomware and Rootkits.srt |
6.30KB |
5. Risk Management.mp4 |
80.39MB |
5. Risk Management.srt |
27.17KB |
5. Security Assessments.mp4 |
18.77MB |
5. Security Assessments.srt |
5.73KB |
5. Social Engineering Phone Call Example #2.mp4 |
35.31MB |
5. Social Engineering Phone Call Example #2.srt |
2.48KB |
5. The Hacking Methodology.mp4 |
23.56MB |
5. The Hacking Methodology.srt |
11.24KB |
50 |
380.01KB |
51 |
413.41KB |
52 |
318.45KB |
53 |
411.29KB |
54 |
33.95KB |
55 |
414.96KB |
56 |
281.21KB |
57 |
177.74KB |
58 |
491.27KB |
59 |
480.20KB |
6 |
193.02KB |
6. Email Spam, Spoofing, Phishing, and Pharming.mp4 |
45.66MB |
6. Email Spam, Spoofing, Phishing, and Pharming.srt |
13.01KB |
6. Firewalls.mp4 |
24.76MB |
6. Firewalls.srt |
7.24KB |
6. How Hackers Deploy Malware.mp4 |
20.41MB |
6. How Hackers Deploy Malware.srt |
5.45KB |
6. How to Access Course Subtitles & Transcripts.html |
1.04KB |
6. MAC versus IP Addresses.mp4 |
16.86MB |
6. MAC versus IP Addresses.srt |
4.87KB |
6. Risk Management Program.mp4 |
28.79MB |
6. Risk Management Program.srt |
7.73KB |
6. Weak Encryption Key & Software Vulnerability Attacks.mp4 |
20.86MB |
6. Weak Encryption Key & Software Vulnerability Attacks.srt |
5.60KB |
60 |
269.69KB |
61 |
393.58KB |
62 |
6.17KB |
63 |
21.43KB |
64 |
248.91KB |
65 |
112.33KB |
66 |
67.84KB |
67 |
384.11KB |
68 |
77.73KB |
69 |
180.19KB |
7 |
379.43KB |
7. Case Study Colonial Pipeline.html |
2.49KB |
7. Intrusion Detection & Prevention Systems (IDSIPS).mp4 |
22.68MB |
7. Intrusion Detection & Prevention Systems (IDSIPS).srt |
6.08KB |
7. Join our Facebook Student Community.html |
1.07KB |
7. Personnel Policies.mp4 |
20.85MB |
7. Personnel Policies.srt |
6.89KB |
7. Switches versus Routers.mp4 |
27.80MB |
7. Switches versus Routers.srt |
8.02KB |
7. Web-Based Attacks.mp4 |
23.52MB |
7. Web-Based Attacks.srt |
7.96KB |
8 |
414.66KB |
8. Evil Twin and Rogue Access Points.mp4 |
26.67MB |
8. Evil Twin and Rogue Access Points.srt |
7.12KB |
8. TCPIP Protocol Suite.mp4 |
21.15MB |
8. TCPIP Protocol Suite.srt |
5.55KB |
8. Training, Eduation and Awareness.mp4 |
21.56MB |
8. Training, Eduation and Awareness.srt |
7.17KB |
8. Udemy Mobile App for iOS & Android - Download & Take Course Videos On the Go!.html |
1.19KB |
8. Utilizing a Network DMZ.mp4 |
18.67MB |
8. Utilizing a Network DMZ.srt |
5.29KB |
9 |
459.35KB |
9. Case Study TJX Companies Inc. (TJX).html |
2.00KB |
9. Honeypot Decoys.mp4 |
7.82MB |
9. Honeypot Decoys.srt |
2.08KB |
9. How the Internet Works (Simplified).mp4 |
26.78MB |
9. How the Internet Works (Simplified).srt |
6.19KB |
9. Student Exercise Introduce Yourself.html |
281B |
TutsNode.com.txt |
63B |