Torrent Info
Title Cyber Security Awareness Secure Data & Combat Cyber Threats
Category
Size 8.30GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
[TGx]Downloaded from torrentgalaxy.to .txt 585B
0 1.05KB
1 4.15KB
1.1 Cyber Law.pdf 175.63KB
1.1 Security Measures.pdf 140.66KB
1.1 What is an Attack.pdf 121.61KB
1.1 What is Cryptology.pdf 164.38KB
1.1 What is DDOS Attack.pdf 155.13KB
1.1 What is meant by term Digital Forensics.pdf 293.82KB
1.1 What is Substitution Cipher.pdf 184.30KB
1. Cyber Law.mp4 59.52MB
1. Cyber Security Course Overview.mp4 12.84MB
1. Definition of Digital Forensics.mp4 90.79MB
1. Fundamentals of Networking-Overview.mp4 17.12MB
1. Introduction.mp4 101.03MB
1. Security Measures.mp4 64.89MB
1. Test your knowledge.html 174B
1. Test your knowledge.html 174B
1. Test your knowledge.html 174B
1. What is an Attack.mp4 52.83MB
1. What is Cryptology.mp4 65.08MB
1. What is DDOS Attack.mp4 102.90MB
1. What is Substitution Cipher.mp4 85.02MB
10 29.77KB
10.1 Cryptography System.pdf 112.75KB
10.1 Cyber Crimes Against Person - Email and SMS Spoofing.pdf 133.39KB
10.1 Networking Devices- Switch.pdf 102.52KB
10.1 OSI Model - Physical Layer.pdf 191.36KB
10.1 Spyware.pdf 171.96KB
10.1 Why Asymmetric key cryptography is important.pdf 121.15KB
10. Cryptography System.mp4 28.89MB
10. Cyber Crimes Against Person - Email and SMS Spoofing.mp4 73.67MB
10. Networking Devices Switch.mp4 31.04MB
10. OSI Model Physical Layer.mp4 22.45MB
10. Types of Malware Spyware.mp4 20.98MB
10. Why Asymmetric key cryptography is important.mp4 17.20MB
100 487.27KB
101 536.37KB
102 578.28KB
103 711.41KB
104 27.57KB
105 313.83KB
106 563.89KB
107 793.45KB
108 140.44KB
109 25.35KB
11 2.64KB
11.1 3+Quarters+Complete+-+Well+Done+Keep+Going.pdf 623.46KB
11.1 Advantages of Asymmetric Key Cryptography.pdf 132.71KB
11.1 Crimeware.pdf 171.96KB
11.1 Cryptography in everyday life.pdf 138.43KB
11.1 OSI Layers Example.pdf 191.36KB
11.1 What is an IP Address.pdf 153.36KB
11. Advantages of Asymmetric Key Cryptography.mp4 69.42MB
11. Cryptography in everyday life.mp4 143.84MB
11. OSI Layers Example.mp4 19.43MB
11. Types of Malware Crimeware.mp4 43.54MB
11. What is an IP Address.mp4 46.01MB
11. You've Achieved 75% Let's Celebrate Your Progress And Keep Going To 100% .mp4 4.71MB
110 587.68KB
111 815.74KB
112 897.51KB
113 450.03KB
114 493.85KB
115 632.41KB
116 160.11KB
117 413.49KB
118 51.97KB
119 16.02KB
12 1.96KB
12.1 Cyber Crimes Against Person - Carding.pdf 133.39KB
12.1 Digital Signature.pdf 171.78KB
12.1 OSI Layers Protocols.pdf 148.31KB
12.1 Rootkit.pdf 171.96KB
12.1 Types of Cryptography.pdf 72.48KB
12.1 What is a MAC Address.pdf 153.36KB
12. Cyber Crimes Against Person - Carding.mp4 27.84MB
12. Digital Signature.mp4 55.46MB
12. OSI Layers Protocols.mp4 48.06MB
12. Types of Cryptography.mp4 25.48MB
12. Types of Malware Rootkit.mp4 40.36MB
12. What is a MAC Address.mp4 46.89MB
120 276.74KB
121 884.02KB
122 447.48KB
123 870.42KB
124 298.76KB
125 724.53KB
126 141.06KB
13 970B
13.1 Cyber Crimes Against Person - Cheating and Fraud.pdf 133.39KB
13.1 HTTP Protocol.pdf 128.40KB
13.1 Ransomware.pdf 171.96KB
13.1 Signing and Verification Process.pdf 171.78KB
13.1 Symmetric Key Cryptography.pdf 129.99KB
13.1 What is a PORT Address.pdf 153.36KB
13. Cyber Crimes Against Person - Cheating and Fraud.mp4 80.30MB
13. HTTP Protocol.mp4 198.06MB
13. Signing and Verification Process.mp4 36.49MB
13. Symmetric Key Cryptography.mp4 56.16MB
13. Types of Malware Ransomware.mp4 69.23MB
13. What is a PORT Address.mp4 39.50MB
14 40.19KB
14.1 Asymmetric Key Cryptography.pdf 190.79KB
14.1 Cyber Crimes Against Person - Assault by Threat.pdf 143.39KB
14.1 How to check Integrity of Message.pdf 171.78KB
14.1 Man in the Middle Attack.pdf 136.85KB
14.1 Quarter+Complete+-+Well+Done+Keep+Going.pdf 464.29KB
14.1 What is a DNS.pdf 124.58KB
14. Asymmetric Key Cryptography.mp4 111.62MB
14. Cyber Crimes Against Person - Assault by Threat.mp4 25.44MB
14. How to check the Integrity of a Message.mp4 118.21MB
14. Man in the Middle Attack.mp4 74.35MB
14. What is a DNS.mp4 84.73MB
14. You've Achieved 25% Let's Celebrate Your Progress And Keep Going To 50% .mp4 3.63MB
15 67.27KB
15.1 Cyber Crime Against Persons Property.pdf 143.98KB
15.1 Man in the Middle Attack Example.pdf 118.73KB
15.1 TCP Protocol.pdf 156.16KB
15.1 What is a VPN.pdf 134.89KB
15.1 What is Hashing.pdf 168.92KB
15. Cyber Crime Against Persons Property.mp4 220.39MB
15. Man in the Middle Attack Example.mp4 97.96MB
15. TCP Protocol.mp4 90.61MB
15. What is a VPN.mp4 38.69MB
15. What is Hashing.mp4 127.93MB
16 498B
16.1 Cyber Crime against Government.pdf 180.16KB
16.1 Hashing Algorithm.pdf 168.92KB
16.1 Sniffing Attack.pdf 181.52KB
16.1 UDP Protocol.pdf 153.66KB
16.1 What is a Virus.pdf 113.77KB
16. Cyber Crime against Government.mp4 113.95MB
16. Hashing Algorithm.mp4 9.14MB
16. Sniffing Attack.mp4 106.73MB
16. UDP Protocol.mp4 116.82MB
16. What is a Virus.mp4 31.61MB
17 46.96KB
17.1 Cyber Crime against Society at Large.pdf 158.22KB
17.1 Difference between UDP and TCP Protocol.pdf 118.53KB
17.1 DOS Attack.pdf 160.29KB
17.1 Learn Hacking and the different Types of Hackers.pdf 229.88KB
17.1 Techniques of Hashing.pdf 141.63KB
17. Cyber Crime against Society at Large.mp4 88.32MB
17. Difference between UDP and TCP Protocol.mp4 46.50MB
17. DOS Attack.mp4 202.50MB
17. Learn Hacking and the different Types of Hackers.mp4 75.33MB
17. Techniques of Hashing.mp4 82.69MB
18 1.20KB
18.1 DHCP Protocol.pdf 160.66KB
18.1 DOS Attack Example.pdf 83.86KB
18.1 Job Profiles in the field of Cybersecurity.pdf 146.55KB
18. DHCP Protocol.mp4 175.37MB
18. DOS Attack Example.mp4 44.86MB
18. Job Profiles in the field of Cybersecurity.mp4 25.52MB
19 48.48KB
19.1 ARP Protocol.pdf 131.00KB
19.1 Important Cybersecurity Skills.pdf 112.99KB
19. ARP Protocol.mp4 50.76MB
19. Important Cybersecurity Skills.mp4 105.48MB
2 1.71KB
2.1 Categories of Cyber Attacks.pdf 68.84KB
2.1 Computer Networks.pdf 156.35KB
2.1 DDOS Attack Example.pdf 155.13KB
2.1 Process of Digital Forensics.pdf 112.32KB
2.1 The Need for Cryptography.pdf 103.09KB
2.1 What is Firewall.pdf 146.81KB
2.1 What is Transposition Cipher.pdf 194.30KB
2.1 Why there is a need for Cyber Law.pdf 194.51KB
2. Assessment.html 174B
2. Assessment.html 174B
2. Assessment.html 174B
2. Categories of Cyber Attacks.mp4 174.14MB
2. Computer Networks.mp4 46.22MB
2. DDOS Attack Example.mp4 199.68MB
2. Introduce Yourself To Your Fellow Students And Tell Everyone What Are Your Goals.html 611B
2. Introduction of Facilitator.mp4 57.29MB
2. Process of Digital Forensics.mp4 160.76MB
2. The Need for Cryptography.mp4 62.44MB
2. What is Firewall.mp4 223.83MB
2. What is Transposition Cipher.mp4 38.47MB
2. Why there is a need for Cyber Law.mp4 59.35MB
20 3.20KB
20.1 What is an IP address and its types.pdf 144.46KB
20. What is an IP address and its types.mp4 143.31MB
21 298B
21.1 What is a Port Address and its types.pdf 212.52KB
21. What is a Port Address and its types.mp4 80.74MB
22 81B
22.1 Network Troubleshooting.pdf 126.63KB
22. Network Troubleshooting.mp4 181.84MB
23 3.10KB
24 1.03KB
25 47.14KB
26 40.83KB
27 32B
28 48.17KB
29 65.95KB
3 32.25KB
3.1 All+Complete+-+Well+Done.pdf 839.99KB
3.1 Basic Cryptography System.pdf 111.53KB
3.1 Cesar Cipher and how it works.pdf 150.28KB
3.1 Is our Data really safe on internet.pdf 155.70KB
3.1 Let's+Celebrate+Your+Progress.pdf 840.02KB
3.1 Phishing Attack.pdf 95.92KB
3.1 The OSI Model.pdf 191.36KB
3.1 Types of Attacks.pdf 164.54KB
3.1 Types of Digital Forensics.pdf 191.62KB
3.1 Types of Firewall- Packet Filter.pdf 83.08KB
3.1 What is Cyber Crime.pdf 135.27KB
3. Basic Cryptography System.mp4 22.69MB
3. Cesar Cipher and how it works.mp4 125.69MB
3. Is our Data really safe on internet.mp4 16.52MB
3. Let's Celebrate Your Progress In This Course 25% 50% 75% 100%!!.mp4 11.95MB
3. Phishing Attack.mp4 157.44MB
3. The OSI Model.mp4 61.28MB
3. Types of Attacks.mp4 16.56MB
3. Types of Digital Forensics.mp4 39.42MB
3. Types of Firewall Packet Filter.mp4 130.39MB
3. What is Cyber Crime.mp4 72.38MB
3. You've Achieved 100% Let's Celebrate! Remember To Share Your Certificate!!.mp4 9.73MB
30 714B
31 16.16KB
32 59.89KB
33 3.65KB
34 8.05KB
35 860B
36 19.13KB
37 2.61KB
38 684B
39 13.38KB
4 2.09KB
4.1 Classification of Cyber Crime.pdf 114.93KB
4.1 Cyber Security Workbook.pdf 12.60MB
4.1 Example of Cesar Cipher.pdf 203.43KB
4.1 OSI Model- Application Layer.pdf 191.36KB
4.1 Password attack and its types.pdf 335.82KB
4.1 Phishing Attack Example.pdf 126.51KB
4.1 Types of Firewall- Stateful Inspection Firewall.pdf 83.08KB
4.1 What is Cybersecurity.pdf 150.32KB
4.1 What is Encryption.pdf 159.14KB
4. Classification of Cyber Crime.mp4 26.05MB
4. Example of Cesar Cipher.mp4 75.77MB
4. OSI Model Application Layer.mp4 35.53MB
4. Password attack and its types.mp4 187.35MB
4. Phishing Attack Example.mp4 23.97MB
4. Preview The 87 Page Cyber Security Awareness Workbook You Get With This Course.mp4 31.32MB
4. Types of Firewall Stateful Inspection Firewall.mp4 100.79MB
4. What is Cybersecurity.mp4 22.23MB
4. What is Encryption.mp4 16.38MB
40 362B
41 130B
42 74.45KB
43 246B
44 42.03KB
45 34.80KB
46 395.00KB
47 946.75KB
48 110.07KB
49 943.71KB
5 2.22KB
5.1 Cyber Crimes Against Person - Cyber Stalking.pdf 133.39KB
5.1 Evolution of Cyber Threats.pdf 99.48KB
5.1 Malware Attack.pdf 207.73KB
5.1 OSI Model- Presentation Layer.pdf 201.36KB
5.1 SQL Injection Attack.pdf 132.92KB
5.1 Transposition Cipher.pdf 169.20KB
5.1 Types of Firewall- Proxy-server firewall.pdf 83.08KB
5.1 What is Decryption.pdf 159.14KB
5. Cyber Crimes Against Person - Cyber Stalking.mp4 45.52MB
5. Evolution of Cyber Threats.mp4 21.86MB
5. Malware Attack.mp4 30.93MB
5. OSI Model Presentation Layer.mp4 63.08MB
5. SQL Injection Attack.mp4 37.42MB
5. Transposition Cipher.mp4 30.88MB
5. Types of Firewall Proxy-server firewall.mp4 95.04MB
5. What is Decryption.mp4 8.56MB
50 576.94KB
51 733.53KB
52 121.08KB
53 489.83KB
54 670.19KB
55 727.71KB
56 37.86KB
57 860.67KB
58 557.37KB
59 515.63KB
6 983B
6.1 Cyber Crimes Against Person - Dissemination of obscene Material.pdf 133.39KB
6.1 Define Plain text.pdf 159.14KB
6.1 Example of SQL Injection Attack.pdf 109.18KB
6.1 OSI Model- Session Layer.pdf 191.36KB
6.1 Three Types of Security Goals.pdf 95.55KB
6.1 Worms.pdf 181.96KB
6. Cyber Crimes Against Person - Dissemination of obscene Material.mp4 34.64MB
6. Define Plain text.mp4 3.86MB
6. Example of SQL Injection Attack.mp4 36.51MB
6. Example of Transposition Cipher.mp4 88.11MB
6. OSI Model Session Layer.mp4 71.48MB
6. Three Types of Security Goals.mp4 89.90MB
6. Types of Malware Worms.mp4 40.47MB
60 51.48KB
61 169.35KB
62 276.43KB
63 248.64KB
64 814.36KB
65 27.97KB
66 600.31KB
67 297.41KB
68 959.84KB
69 111.46KB
7 1.06KB
7.1 Cross-site Scripting Attack.pdf 175.29KB
7.1 Cyber Crimes Against Person - Defamation.pdf 133.39KB
7.1 Half+Complete+-+Well+Done+Keep+Going.pdf 511.26KB
7.1 Importance of Cybersecurity.pdf 590.83KB
7.1 OSI Model- Transport Layer.pdf 191.36KB
7.1 Stream Cipher.pdf 145.17KB
7.1 Viruses.pdf 171.96KB
7. Cross-site Scripting Attack.mp4 43.85MB
7. Cyber Crimes Against Person - Defamation.mp4 24.31MB
7. Importance of Cybersecurity.mp4 56.96MB
7. OSI Model Transport Layer.mp4 89.42MB
7. Stream Cipher.mp4 59.88MB
7. Types of Malware Viruses.mp4 53.50MB
7. You've Achieved 50% Let's Celebrate Your Progress And Keep Going To 75% .mp4 4.29MB
70 515.12KB
71 798.25KB
72 1016.45KB
73 487.18KB
74 140.69KB
75 416.93KB
76 157.63KB
77 234.99KB
78 467.84KB
79 540.46KB
8 43.05KB
8.1 Block Cipher.pdf 169.28KB
8.1 Cyber Crimes Against Person - Hacking.pdf 133.39KB
8.1 OSI Model- Network Layer.pdf 191.36KB
8.1 Post Scanning Attack.pdf 163.51KB
8.1 Threat, Vulnerability, and Risk.pdf 104.82KB
8.1 Trojan.pdf 171.96KB
8.1 What is Secret Key.pdf 159.14KB
8. Block Cipher.mp4 51.73MB
8. Cyber Crimes Against Person - Hacking.mp4 27.88MB
8. OSI Model Network Layer.mp4 48.71MB
8. Post Scanning Attack.mp4 142.69MB
8. Threat, Vulnerability, and Risk.mp4 38.43MB
8. Types of Malware Trojan.mp4 49.97MB
8. What is Secret Key.mp4 5.15MB
80 658.71KB
81 510.86KB
82 591.73KB
83 313.14KB
84 538.18KB
85 585.93KB
86 592.04KB
87 497.80KB
88 518.61KB
89 476.48KB
9 14.48KB
9.1 Advantages of Symmetric Key Cryptography.pdf 130.90KB
9.1 Adware.pdf 171.96KB
9.1 Cyber Crimes Against Person - Cracking.pdf 133.39KB
9.1 Networking Devices-Router.pdf 105.74KB
9.1 OSI Model- Data Link Layer.pdf 201.36KB
9.1 What is Cipher text.pdf 159.14KB
9. Advantages of Symmetric Key Cryptography.mp4 44.59MB
9. Cyber Crimes Against Person - Cracking.mp4 52.95MB
9. Networking Devices Router.mp4 43.77MB
9. OSI Model Data Link Layer.mp4 49.41MB
9. Types of Malware Adware.mp4 50.20MB
9. What is Cipher text.mp4 10.98MB
90 369.14KB
91 396.39KB
92 697.42KB
93 978.83KB
94 73.30KB
95 119.88KB
96 113.73KB
97 127.95KB
98 159.34KB
99 969.74KB
TutsNode.com.txt 63B
Distribution statistics by country
Romania (RO) 2
France (FR) 1
Albania (AL) 1
India (IN) 1
Total 5
IP List List of IP addresses which were distributed this torrent