Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585B |
0 |
1.05KB |
1 |
4.15KB |
1.1 Cyber Law.pdf |
175.63KB |
1.1 Security Measures.pdf |
140.66KB |
1.1 What is an Attack.pdf |
121.61KB |
1.1 What is Cryptology.pdf |
164.38KB |
1.1 What is DDOS Attack.pdf |
155.13KB |
1.1 What is meant by term Digital Forensics.pdf |
293.82KB |
1.1 What is Substitution Cipher.pdf |
184.30KB |
1. Cyber Law.mp4 |
59.52MB |
1. Cyber Security Course Overview.mp4 |
12.84MB |
1. Definition of Digital Forensics.mp4 |
90.79MB |
1. Fundamentals of Networking-Overview.mp4 |
17.12MB |
1. Introduction.mp4 |
101.03MB |
1. Security Measures.mp4 |
64.89MB |
1. Test your knowledge.html |
174B |
1. Test your knowledge.html |
174B |
1. Test your knowledge.html |
174B |
1. What is an Attack.mp4 |
52.83MB |
1. What is Cryptology.mp4 |
65.08MB |
1. What is DDOS Attack.mp4 |
102.90MB |
1. What is Substitution Cipher.mp4 |
85.02MB |
10 |
29.77KB |
10.1 Cryptography System.pdf |
112.75KB |
10.1 Cyber Crimes Against Person - Email and SMS Spoofing.pdf |
133.39KB |
10.1 Networking Devices- Switch.pdf |
102.52KB |
10.1 OSI Model - Physical Layer.pdf |
191.36KB |
10.1 Spyware.pdf |
171.96KB |
10.1 Why Asymmetric key cryptography is important.pdf |
121.15KB |
10. Cryptography System.mp4 |
28.89MB |
10. Cyber Crimes Against Person - Email and SMS Spoofing.mp4 |
73.67MB |
10. Networking Devices Switch.mp4 |
31.04MB |
10. OSI Model Physical Layer.mp4 |
22.45MB |
10. Types of Malware Spyware.mp4 |
20.98MB |
10. Why Asymmetric key cryptography is important.mp4 |
17.20MB |
100 |
487.27KB |
101 |
536.37KB |
102 |
578.28KB |
103 |
711.41KB |
104 |
27.57KB |
105 |
313.83KB |
106 |
563.89KB |
107 |
793.45KB |
108 |
140.44KB |
109 |
25.35KB |
11 |
2.64KB |
11.1 3+Quarters+Complete+-+Well+Done+Keep+Going.pdf |
623.46KB |
11.1 Advantages of Asymmetric Key Cryptography.pdf |
132.71KB |
11.1 Crimeware.pdf |
171.96KB |
11.1 Cryptography in everyday life.pdf |
138.43KB |
11.1 OSI Layers Example.pdf |
191.36KB |
11.1 What is an IP Address.pdf |
153.36KB |
11. Advantages of Asymmetric Key Cryptography.mp4 |
69.42MB |
11. Cryptography in everyday life.mp4 |
143.84MB |
11. OSI Layers Example.mp4 |
19.43MB |
11. Types of Malware Crimeware.mp4 |
43.54MB |
11. What is an IP Address.mp4 |
46.01MB |
11. You've Achieved 75% Let's Celebrate Your Progress And Keep Going To 100% .mp4 |
4.71MB |
110 |
587.68KB |
111 |
815.74KB |
112 |
897.51KB |
113 |
450.03KB |
114 |
493.85KB |
115 |
632.41KB |
116 |
160.11KB |
117 |
413.49KB |
118 |
51.97KB |
119 |
16.02KB |
12 |
1.96KB |
12.1 Cyber Crimes Against Person - Carding.pdf |
133.39KB |
12.1 Digital Signature.pdf |
171.78KB |
12.1 OSI Layers Protocols.pdf |
148.31KB |
12.1 Rootkit.pdf |
171.96KB |
12.1 Types of Cryptography.pdf |
72.48KB |
12.1 What is a MAC Address.pdf |
153.36KB |
12. Cyber Crimes Against Person - Carding.mp4 |
27.84MB |
12. Digital Signature.mp4 |
55.46MB |
12. OSI Layers Protocols.mp4 |
48.06MB |
12. Types of Cryptography.mp4 |
25.48MB |
12. Types of Malware Rootkit.mp4 |
40.36MB |
12. What is a MAC Address.mp4 |
46.89MB |
120 |
276.74KB |
121 |
884.02KB |
122 |
447.48KB |
123 |
870.42KB |
124 |
298.76KB |
125 |
724.53KB |
126 |
141.06KB |
13 |
970B |
13.1 Cyber Crimes Against Person - Cheating and Fraud.pdf |
133.39KB |
13.1 HTTP Protocol.pdf |
128.40KB |
13.1 Ransomware.pdf |
171.96KB |
13.1 Signing and Verification Process.pdf |
171.78KB |
13.1 Symmetric Key Cryptography.pdf |
129.99KB |
13.1 What is a PORT Address.pdf |
153.36KB |
13. Cyber Crimes Against Person - Cheating and Fraud.mp4 |
80.30MB |
13. HTTP Protocol.mp4 |
198.06MB |
13. Signing and Verification Process.mp4 |
36.49MB |
13. Symmetric Key Cryptography.mp4 |
56.16MB |
13. Types of Malware Ransomware.mp4 |
69.23MB |
13. What is a PORT Address.mp4 |
39.50MB |
14 |
40.19KB |
14.1 Asymmetric Key Cryptography.pdf |
190.79KB |
14.1 Cyber Crimes Against Person - Assault by Threat.pdf |
143.39KB |
14.1 How to check Integrity of Message.pdf |
171.78KB |
14.1 Man in the Middle Attack.pdf |
136.85KB |
14.1 Quarter+Complete+-+Well+Done+Keep+Going.pdf |
464.29KB |
14.1 What is a DNS.pdf |
124.58KB |
14. Asymmetric Key Cryptography.mp4 |
111.62MB |
14. Cyber Crimes Against Person - Assault by Threat.mp4 |
25.44MB |
14. How to check the Integrity of a Message.mp4 |
118.21MB |
14. Man in the Middle Attack.mp4 |
74.35MB |
14. What is a DNS.mp4 |
84.73MB |
14. You've Achieved 25% Let's Celebrate Your Progress And Keep Going To 50% .mp4 |
3.63MB |
15 |
67.27KB |
15.1 Cyber Crime Against Persons Property.pdf |
143.98KB |
15.1 Man in the Middle Attack Example.pdf |
118.73KB |
15.1 TCP Protocol.pdf |
156.16KB |
15.1 What is a VPN.pdf |
134.89KB |
15.1 What is Hashing.pdf |
168.92KB |
15. Cyber Crime Against Persons Property.mp4 |
220.39MB |
15. Man in the Middle Attack Example.mp4 |
97.96MB |
15. TCP Protocol.mp4 |
90.61MB |
15. What is a VPN.mp4 |
38.69MB |
15. What is Hashing.mp4 |
127.93MB |
16 |
498B |
16.1 Cyber Crime against Government.pdf |
180.16KB |
16.1 Hashing Algorithm.pdf |
168.92KB |
16.1 Sniffing Attack.pdf |
181.52KB |
16.1 UDP Protocol.pdf |
153.66KB |
16.1 What is a Virus.pdf |
113.77KB |
16. Cyber Crime against Government.mp4 |
113.95MB |
16. Hashing Algorithm.mp4 |
9.14MB |
16. Sniffing Attack.mp4 |
106.73MB |
16. UDP Protocol.mp4 |
116.82MB |
16. What is a Virus.mp4 |
31.61MB |
17 |
46.96KB |
17.1 Cyber Crime against Society at Large.pdf |
158.22KB |
17.1 Difference between UDP and TCP Protocol.pdf |
118.53KB |
17.1 DOS Attack.pdf |
160.29KB |
17.1 Learn Hacking and the different Types of Hackers.pdf |
229.88KB |
17.1 Techniques of Hashing.pdf |
141.63KB |
17. Cyber Crime against Society at Large.mp4 |
88.32MB |
17. Difference between UDP and TCP Protocol.mp4 |
46.50MB |
17. DOS Attack.mp4 |
202.50MB |
17. Learn Hacking and the different Types of Hackers.mp4 |
75.33MB |
17. Techniques of Hashing.mp4 |
82.69MB |
18 |
1.20KB |
18.1 DHCP Protocol.pdf |
160.66KB |
18.1 DOS Attack Example.pdf |
83.86KB |
18.1 Job Profiles in the field of Cybersecurity.pdf |
146.55KB |
18. DHCP Protocol.mp4 |
175.37MB |
18. DOS Attack Example.mp4 |
44.86MB |
18. Job Profiles in the field of Cybersecurity.mp4 |
25.52MB |
19 |
48.48KB |
19.1 ARP Protocol.pdf |
131.00KB |
19.1 Important Cybersecurity Skills.pdf |
112.99KB |
19. ARP Protocol.mp4 |
50.76MB |
19. Important Cybersecurity Skills.mp4 |
105.48MB |
2 |
1.71KB |
2.1 Categories of Cyber Attacks.pdf |
68.84KB |
2.1 Computer Networks.pdf |
156.35KB |
2.1 DDOS Attack Example.pdf |
155.13KB |
2.1 Process of Digital Forensics.pdf |
112.32KB |
2.1 The Need for Cryptography.pdf |
103.09KB |
2.1 What is Firewall.pdf |
146.81KB |
2.1 What is Transposition Cipher.pdf |
194.30KB |
2.1 Why there is a need for Cyber Law.pdf |
194.51KB |
2. Assessment.html |
174B |
2. Assessment.html |
174B |
2. Assessment.html |
174B |
2. Categories of Cyber Attacks.mp4 |
174.14MB |
2. Computer Networks.mp4 |
46.22MB |
2. DDOS Attack Example.mp4 |
199.68MB |
2. Introduce Yourself To Your Fellow Students And Tell Everyone What Are Your Goals.html |
611B |
2. Introduction of Facilitator.mp4 |
57.29MB |
2. Process of Digital Forensics.mp4 |
160.76MB |
2. The Need for Cryptography.mp4 |
62.44MB |
2. What is Firewall.mp4 |
223.83MB |
2. What is Transposition Cipher.mp4 |
38.47MB |
2. Why there is a need for Cyber Law.mp4 |
59.35MB |
20 |
3.20KB |
20.1 What is an IP address and its types.pdf |
144.46KB |
20. What is an IP address and its types.mp4 |
143.31MB |
21 |
298B |
21.1 What is a Port Address and its types.pdf |
212.52KB |
21. What is a Port Address and its types.mp4 |
80.74MB |
22 |
81B |
22.1 Network Troubleshooting.pdf |
126.63KB |
22. Network Troubleshooting.mp4 |
181.84MB |
23 |
3.10KB |
24 |
1.03KB |
25 |
47.14KB |
26 |
40.83KB |
27 |
32B |
28 |
48.17KB |
29 |
65.95KB |
3 |
32.25KB |
3.1 All+Complete+-+Well+Done.pdf |
839.99KB |
3.1 Basic Cryptography System.pdf |
111.53KB |
3.1 Cesar Cipher and how it works.pdf |
150.28KB |
3.1 Is our Data really safe on internet.pdf |
155.70KB |
3.1 Let's+Celebrate+Your+Progress.pdf |
840.02KB |
3.1 Phishing Attack.pdf |
95.92KB |
3.1 The OSI Model.pdf |
191.36KB |
3.1 Types of Attacks.pdf |
164.54KB |
3.1 Types of Digital Forensics.pdf |
191.62KB |
3.1 Types of Firewall- Packet Filter.pdf |
83.08KB |
3.1 What is Cyber Crime.pdf |
135.27KB |
3. Basic Cryptography System.mp4 |
22.69MB |
3. Cesar Cipher and how it works.mp4 |
125.69MB |
3. Is our Data really safe on internet.mp4 |
16.52MB |
3. Let's Celebrate Your Progress In This Course 25% 50% 75% 100%!!.mp4 |
11.95MB |
3. Phishing Attack.mp4 |
157.44MB |
3. The OSI Model.mp4 |
61.28MB |
3. Types of Attacks.mp4 |
16.56MB |
3. Types of Digital Forensics.mp4 |
39.42MB |
3. Types of Firewall Packet Filter.mp4 |
130.39MB |
3. What is Cyber Crime.mp4 |
72.38MB |
3. You've Achieved 100% Let's Celebrate! Remember To Share Your Certificate!!.mp4 |
9.73MB |
30 |
714B |
31 |
16.16KB |
32 |
59.89KB |
33 |
3.65KB |
34 |
8.05KB |
35 |
860B |
36 |
19.13KB |
37 |
2.61KB |
38 |
684B |
39 |
13.38KB |
4 |
2.09KB |
4.1 Classification of Cyber Crime.pdf |
114.93KB |
4.1 Cyber Security Workbook.pdf |
12.60MB |
4.1 Example of Cesar Cipher.pdf |
203.43KB |
4.1 OSI Model- Application Layer.pdf |
191.36KB |
4.1 Password attack and its types.pdf |
335.82KB |
4.1 Phishing Attack Example.pdf |
126.51KB |
4.1 Types of Firewall- Stateful Inspection Firewall.pdf |
83.08KB |
4.1 What is Cybersecurity.pdf |
150.32KB |
4.1 What is Encryption.pdf |
159.14KB |
4. Classification of Cyber Crime.mp4 |
26.05MB |
4. Example of Cesar Cipher.mp4 |
75.77MB |
4. OSI Model Application Layer.mp4 |
35.53MB |
4. Password attack and its types.mp4 |
187.35MB |
4. Phishing Attack Example.mp4 |
23.97MB |
4. Preview The 87 Page Cyber Security Awareness Workbook You Get With This Course.mp4 |
31.32MB |
4. Types of Firewall Stateful Inspection Firewall.mp4 |
100.79MB |
4. What is Cybersecurity.mp4 |
22.23MB |
4. What is Encryption.mp4 |
16.38MB |
40 |
362B |
41 |
130B |
42 |
74.45KB |
43 |
246B |
44 |
42.03KB |
45 |
34.80KB |
46 |
395.00KB |
47 |
946.75KB |
48 |
110.07KB |
49 |
943.71KB |
5 |
2.22KB |
5.1 Cyber Crimes Against Person - Cyber Stalking.pdf |
133.39KB |
5.1 Evolution of Cyber Threats.pdf |
99.48KB |
5.1 Malware Attack.pdf |
207.73KB |
5.1 OSI Model- Presentation Layer.pdf |
201.36KB |
5.1 SQL Injection Attack.pdf |
132.92KB |
5.1 Transposition Cipher.pdf |
169.20KB |
5.1 Types of Firewall- Proxy-server firewall.pdf |
83.08KB |
5.1 What is Decryption.pdf |
159.14KB |
5. Cyber Crimes Against Person - Cyber Stalking.mp4 |
45.52MB |
5. Evolution of Cyber Threats.mp4 |
21.86MB |
5. Malware Attack.mp4 |
30.93MB |
5. OSI Model Presentation Layer.mp4 |
63.08MB |
5. SQL Injection Attack.mp4 |
37.42MB |
5. Transposition Cipher.mp4 |
30.88MB |
5. Types of Firewall Proxy-server firewall.mp4 |
95.04MB |
5. What is Decryption.mp4 |
8.56MB |
50 |
576.94KB |
51 |
733.53KB |
52 |
121.08KB |
53 |
489.83KB |
54 |
670.19KB |
55 |
727.71KB |
56 |
37.86KB |
57 |
860.67KB |
58 |
557.37KB |
59 |
515.63KB |
6 |
983B |
6.1 Cyber Crimes Against Person - Dissemination of obscene Material.pdf |
133.39KB |
6.1 Define Plain text.pdf |
159.14KB |
6.1 Example of SQL Injection Attack.pdf |
109.18KB |
6.1 OSI Model- Session Layer.pdf |
191.36KB |
6.1 Three Types of Security Goals.pdf |
95.55KB |
6.1 Worms.pdf |
181.96KB |
6. Cyber Crimes Against Person - Dissemination of obscene Material.mp4 |
34.64MB |
6. Define Plain text.mp4 |
3.86MB |
6. Example of SQL Injection Attack.mp4 |
36.51MB |
6. Example of Transposition Cipher.mp4 |
88.11MB |
6. OSI Model Session Layer.mp4 |
71.48MB |
6. Three Types of Security Goals.mp4 |
89.90MB |
6. Types of Malware Worms.mp4 |
40.47MB |
60 |
51.48KB |
61 |
169.35KB |
62 |
276.43KB |
63 |
248.64KB |
64 |
814.36KB |
65 |
27.97KB |
66 |
600.31KB |
67 |
297.41KB |
68 |
959.84KB |
69 |
111.46KB |
7 |
1.06KB |
7.1 Cross-site Scripting Attack.pdf |
175.29KB |
7.1 Cyber Crimes Against Person - Defamation.pdf |
133.39KB |
7.1 Half+Complete+-+Well+Done+Keep+Going.pdf |
511.26KB |
7.1 Importance of Cybersecurity.pdf |
590.83KB |
7.1 OSI Model- Transport Layer.pdf |
191.36KB |
7.1 Stream Cipher.pdf |
145.17KB |
7.1 Viruses.pdf |
171.96KB |
7. Cross-site Scripting Attack.mp4 |
43.85MB |
7. Cyber Crimes Against Person - Defamation.mp4 |
24.31MB |
7. Importance of Cybersecurity.mp4 |
56.96MB |
7. OSI Model Transport Layer.mp4 |
89.42MB |
7. Stream Cipher.mp4 |
59.88MB |
7. Types of Malware Viruses.mp4 |
53.50MB |
7. You've Achieved 50% Let's Celebrate Your Progress And Keep Going To 75% .mp4 |
4.29MB |
70 |
515.12KB |
71 |
798.25KB |
72 |
1016.45KB |
73 |
487.18KB |
74 |
140.69KB |
75 |
416.93KB |
76 |
157.63KB |
77 |
234.99KB |
78 |
467.84KB |
79 |
540.46KB |
8 |
43.05KB |
8.1 Block Cipher.pdf |
169.28KB |
8.1 Cyber Crimes Against Person - Hacking.pdf |
133.39KB |
8.1 OSI Model- Network Layer.pdf |
191.36KB |
8.1 Post Scanning Attack.pdf |
163.51KB |
8.1 Threat, Vulnerability, and Risk.pdf |
104.82KB |
8.1 Trojan.pdf |
171.96KB |
8.1 What is Secret Key.pdf |
159.14KB |
8. Block Cipher.mp4 |
51.73MB |
8. Cyber Crimes Against Person - Hacking.mp4 |
27.88MB |
8. OSI Model Network Layer.mp4 |
48.71MB |
8. Post Scanning Attack.mp4 |
142.69MB |
8. Threat, Vulnerability, and Risk.mp4 |
38.43MB |
8. Types of Malware Trojan.mp4 |
49.97MB |
8. What is Secret Key.mp4 |
5.15MB |
80 |
658.71KB |
81 |
510.86KB |
82 |
591.73KB |
83 |
313.14KB |
84 |
538.18KB |
85 |
585.93KB |
86 |
592.04KB |
87 |
497.80KB |
88 |
518.61KB |
89 |
476.48KB |
9 |
14.48KB |
9.1 Advantages of Symmetric Key Cryptography.pdf |
130.90KB |
9.1 Adware.pdf |
171.96KB |
9.1 Cyber Crimes Against Person - Cracking.pdf |
133.39KB |
9.1 Networking Devices-Router.pdf |
105.74KB |
9.1 OSI Model- Data Link Layer.pdf |
201.36KB |
9.1 What is Cipher text.pdf |
159.14KB |
9. Advantages of Symmetric Key Cryptography.mp4 |
44.59MB |
9. Cyber Crimes Against Person - Cracking.mp4 |
52.95MB |
9. Networking Devices Router.mp4 |
43.77MB |
9. OSI Model Data Link Layer.mp4 |
49.41MB |
9. Types of Malware Adware.mp4 |
50.20MB |
9. What is Cipher text.mp4 |
10.98MB |
90 |
369.14KB |
91 |
396.39KB |
92 |
697.42KB |
93 |
978.83KB |
94 |
73.30KB |
95 |
119.88KB |
96 |
113.73KB |
97 |
127.95KB |
98 |
159.34KB |
99 |
969.74KB |
TutsNode.com.txt |
63B |