Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
001 Goals and Learning Objectives.en.srt |
1.09KB |
001 Goals and Learning Objectives.mp4 |
18.75MB |
001 Goals and Learning Objectives - Know Your Enemy.en.srt |
1.39KB |
001 Goals and Learning Objectives - Know Your Enemy.mp4 |
20.81MB |
001 What is Cybersecurity _.en.srt |
5.12KB |
001 What is Cybersecurity _.mp4 |
33.17MB |
001 Who Am I.en.srt |
1.70KB |
001 Who Am I.mp4 |
6.57MB |
002 Protect What You Value.en.srt |
9.64KB |
002 Protect What You Value.mp4 |
89.35MB |
002 What is Ethical Hacking _.en.srt |
3.90KB |
002 What is Ethical Hacking _.mp4 |
24.57MB |
002 Why You Need Security _.en.srt |
17.41KB |
002 Why You Need Security _.mp4 |
180.96MB |
003 What is Penetrating Testing _.en.srt |
2.37KB |
003 What is Penetrating Testing _.mp4 |
14.99MB |
003 What is Privacy, Anonymity and Pseudonymity _.en.srt |
12.62KB |
003 What is Privacy, Anonymity and Pseudonymity _.mp4 |
151.45MB |
004 Difference Between Ethical Hacking and Penetrating Testing.en.srt |
2.50KB |
004 Difference Between Ethical Hacking and Penetrating Testing.mp4 |
13.60MB |
004 Security, Vulnerabilities, Threats and Adversaries.en.srt |
10.04KB |
004 Security, Vulnerabilities, Threats and Adversaries.mp4 |
112.36MB |
005 Asset Selection.en.srt |
7.39KB |
005 Asset Selection.mp4 |
90.14MB |
005 Purpose of Studying Ethical Hacking and Penetrating Testing.en.srt |
3.03KB |
005 Purpose of Studying Ethical Hacking and Penetrating Testing.mp4 |
23.16MB |
006 Scope For Ethical Hackers and Penetrating Testers.en.srt |
2.49KB |
006 Scope For Ethical Hackers and Penetrating Testers.mp4 |
17.68MB |
006 Threat Modelling And Risk Assessment.en.srt |
13.84KB |
006 Threat Modelling And Risk Assessment.mp4 |
150.99MB |
007 Do Ethical Hackers And Penetrating Testers Need Permission_.en.srt |
849B |
007 Do Ethical Hackers And Penetrating Testers Need Permission_.mp4 |
6.24MB |
007 Security,Anonymity and Privacy.en.srt |
4.41KB |
007 Security,Anonymity and Privacy.mp4 |
56.99MB |
008 Confidentiality, Integrity and Availability - (Security Attributes).en.srt |
10.62KB |
008 Confidentiality, Integrity and Availability - (Security Attributes).mp4 |
135.21MB |
008 Who Conduct it _.en.srt |
3.17KB |
008 Who Conduct it _.mp4 |
25.15MB |
009 Defence in Depth.en.srt |
3.94KB |
009 Defence in Depth.mp4 |
32.57MB |
009 Who should You Choose _.en.srt |
2.29KB |
009 Who should You Choose _.mp4 |
19.63MB |
010 Closure.en.srt |
3.42KB |
010 Closure.mp4 |
22.53MB |
010 Zero Trust Model.en.srt |
7.30KB |
010 Zero Trust Model.mp4 |
81.71MB |
011 Setting up Labs.en.srt |
23.69KB |
011 Setting up Labs.mp4 |
161.67MB |
Bonus Resources.txt |
357B |
Get Bonus Downloads Here.url |
183B |