Общая информация
Название GetFreeCourses.Co-Udemy-Cyber Security - Go From Zero to Hero (2020)
Тип
Размер 3.47Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
1. ARE YOU READY.html 3.64Кб
1. Definition of Computer Security.mp4 28.43Мб
1. Definition of Computer Security.srt 3.92Кб
1. Introduction.mp4 5.73Мб
1. Introduction.mp4 10.16Мб
1. Introduction.mp4 7.23Мб
1. Introduction.mp4 8.71Мб
1. Introduction.mp4 13.02Мб
1. Introduction.srt 1.43Кб
1. Introduction.srt 1.72Кб
1. Introduction.srt 1.03Кб
1. Introduction.srt 1.72Кб
1. Introduction.srt 1.61Кб
10. Firewalls vs Antivirus.mp4 9.27Мб
10. Firewalls vs Antivirus.srt 2.21Кб
10. Layers of OSI Model.mp4 33.25Мб
10. Layers of OSI Model.srt 10.85Кб
10. OH MY GOD! VIRUS!!.mp4 37.79Мб
10. OH MY GOD! VIRUS!!.srt 7.55Кб
10. SECTION 3 QUIZ.html 627б
10. Symmetric Encryption.mp4 14.37Мб
10. Symmetric Encryption.srt 3.48Кб
10. The NIST Framework.mp4 21.87Мб
10. The NIST Framework.srt 3.83Кб
11. AES and DES.mp4 44.52Мб
11. AES and DES.srt 7.12Кб
11. Introduction to TCPIP Model.mp4 76.04Мб
11. Introduction to TCPIP Model.srt 11.55Кб
11. The COBIT Framework.mp4 25.57Мб
11. The COBIT Framework.srt 4.07Кб
11. THE FINAL QUIZ - FIREWALLS AND ANTIVIRUS.html 870б
11. Types of Virus.mp4 59.33Мб
11. Types of Virus.srt 11.32Кб
11. We value your feedback!.html 2.54Кб
12. Asymmetric Encryption.mp4 16.27Мб
12. Asymmetric Encryption.srt 3.12Кб
12. Conclusion.mp4 2.62Мб
12. Conclusion.srt 785б
12. CONGRATULATIONS!.mp4 18.64Мб
12. CONGRATULATIONS!.srt 2.37Кб
12. OSI Model vs TCPIP Model.mp4 24.13Мб
12. OSI Model vs TCPIP Model.srt 4.95Кб
12. Other Security Frameworks.mp4 25.21Мб
12. Other Security Frameworks.srt 5.43Кб
12. You should defend yourself!.mp4 45.98Мб
12. You should defend yourself!.srt 8.95Кб
13. BASICS OF NETWORKING Quiz 2.html 147б
13. Have you ever heard about a Ransomware.mp4 81.12Мб
13. Have you ever heard about a Ransomware.srt 12.43Кб
13. Hey there! Support We Secure..html 2.53Кб
13. SECTION 6 QUIZ - KEY SECURITY CONCEPTS.html 627б
14. Addressing in Computer Networks.mp4 53.58Мб
14. Addressing in Computer Networks.srt 9.92Кб
14. IMPORTANT!.html 2.53Кб
14. Leave a Rating!.html 2.53Кб
14. RSA & Diffie Hellman.mp4 47.48Мб
14. RSA & Diffie Hellman.srt 9.20Кб
15. Conclusion.mp4 2.13Мб
15. Conclusion.srt 732б
15. Hashing.mp4 62.06Мб
15. Hashing.srt 8.41Кб
15. IP Address- IPv4 and IPv6.mp4 40.64Мб
15. IP Address- IPv4 and IPv6.srt 6.86Кб
15. PRACTICAL INFORMATION GATHERING USING SHODAN.mp4 74.34Мб
15. PRACTICAL INFORMATION GATHERING USING SHODAN.srt 9.69Кб
16. Introduction to Classes of IP Addressing.mp4 14.98Мб
16. Introduction to Classes of IP Addressing.srt 4.43Кб
16. Security Organizations.mp4 26.77Мб
16. Security Organizations.srt 5.89Кб
16. The Cyber Kill Chain.mp4 31.30Мб
16. The Cyber Kill Chain.srt 10.52Кб
17. Classes of IP Address.mp4 54.86Мб
17. Classes of IP Address.srt 9.75Кб
17. Critical Thinking in Cyber Security.mp4 21.72Мб
17. Critical Thinking in Cyber Security.srt 4.82Кб
17. Introduction to Social Engineering.mp4 28.11Мб
17. Introduction to Social Engineering.srt 5.94Кб
18. PRACTICAL HOW TO FIND OUT YOUR PC's IP ADDRESS.mp4 22.43Мб
18. PRACTICAL HOW TO FIND OUT YOUR PC's IP ADDRESS.srt 3.54Кб
18. The Five Critical Thinking Skills.mp4 24.13Мб
18. The Five Critical Thinking Skills.srt 7.16Кб
18. Types of Social Engineering.mp4 57.62Мб
18. Types of Social Engineering.srt 6.99Кб
19. PRACTICAL HOW TO FIND OUT USERNAMES AND PASSWORDS USING SOCIAL ENGINEERING.mp4 85.55Мб
19. PRACTICAL HOW TO FIND OUT USERNAMES AND PASSWORDS USING SOCIAL ENGINEERING.srt 12.47Кб
19. PRACTICAL HOW TO FIND OUT YOUR PC'S MAC ADDRESS.mp4 41.40Мб
19. PRACTICAL HOW TO FIND OUT YOUR PC'S MAC ADDRESS.srt 5.18Кб
19. PRACTICAL USING NSLOOKUP TOOL.mp4 7.14Мб
19. PRACTICAL USING NSLOOKUP TOOL.srt 3.09Кб
2. Confidentiality - The Most Important Element of Security.mp4 26.20Мб
2. Confidentiality - The Most Important Element of Security.srt 5.07Кб
2. Different types of Actors in Cyber Security.mp4 64.44Мб
2. Different types of Actors in Cyber Security.srt 11.29Кб
2. Interesting Facts about Cyber Security.mp4 42.84Мб
2. Interesting Facts about Cyber Security.srt 5.31Кб
2. Intrusion Detection System.mp4 59.16Мб
2. Intrusion Detection System.srt 12.42Кб
2. Security Architect's View of Security.mp4 46.98Мб
2. Security Architect's View of Security.srt 10.03Кб
2. Standard Definition of Cyber Security.mp4 19.01Мб
2. Standard Definition of Cyber Security.srt 3.07Кб
2. What is Computer Networking - Definition and Characteristics.mp4 19.41Мб
2. What is Computer Networking - Definition and Characteristics.srt 3.24Кб
20. PRACTICAL USING NETSTAT TOOL.mp4 32.45Мб
20. PRACTICAL USING NETSTAT TOOL.srt 4.37Кб
20. SECTION 5 QUIZ - TYPES OF ACTORS, ATTACKS AND MALWARE.html 627б
20. The Internet Protocol (IP).mp4 31.93Мб
20. The Internet Protocol (IP).srt 7.44Кб
21. BASICS OF NETWORKING QUIZ 3.html 147б
21. Conclusion.mp4 4.15Мб
21. Conclusion.srt 847б
21. SECTION 4 QUIZ - DIVING DEEP INTO CYBER SECURITY.html 627б
22. Address Resolution Protocol (ARP).mp4 50.52Мб
22. Address Resolution Protocol (ARP).srt 10.29Кб
22. Conclusion.mp4 2.78Мб
22. Conclusion.srt 726б
23. SUPPORT WE SECURE!.html 2.53Кб
24. Dynamic Host Configuration Protocol (DHCP).mp4 36.84Мб
24. Dynamic Host Configuration Protocol (DHCP).srt 9.19Кб
25. Internet Control Message Protocol (ICMP).mp4 37.40Мб
25. Internet Control Message Protocol (ICMP).srt 7.13Кб
26. RIP and OSPF Protocols.mp4 35.66Мб
26. RIP and OSPF Protocols.srt 6.07Кб
27. PRACTICAL HOW TO FIND OUT THE PATH OF DATA PACKETS USING TRACERT.mp4 16.99Мб
27. PRACTICAL HOW TO FIND OUT THE PATH OF DATA PACKETS USING TRACERT.srt 2.98Кб
28. What are Sockets.mp4 30.39Мб
28. What are Sockets.srt 6.50Кб
29. File Transfer Protocol (FTP).mp4 27.89Мб
29. File Transfer Protocol (FTP).srt 4.04Кб
3. Have a look at this!.mp4 11.74Мб
3. Have a look at this!.srt 776б
3. Integrity, Authentication, Access Control and Non-Repudiation.mp4 55.85Мб
3. Integrity, Authentication, Access Control and Non-Repudiation.srt 10.41Кб
3. Introduction to Firewalls.mp4 53.33Мб
3. Introduction to Firewalls.srt 10.47Кб
3. Network Topologies.mp4 25.81Мб
3. Network Topologies.srt 7.67Кб
3. Types of Computer Security.mp4 25.09Мб
3. Types of Computer Security.srt 3.26Кб
3. Types of Cyber Attacks.mp4 31.37Мб
3. Types of Cyber Attacks.srt 4.95Кб
3. What is Vulnerability Assessment.mp4 36.97Мб
3. What is Vulnerability Assessment.srt 5.76Кб
30. Hypertext Transfer Protocol (HTTP).mp4 41.68Мб
30. Hypertext Transfer Protocol (HTTP).srt 4.60Кб
31. Hyptertext Transfer ProtocolSecure Socket Layer (HTTPS).mp4 46.19Мб
31. Hyptertext Transfer ProtocolSecure Socket Layer (HTTPS).srt 6.28Кб
32. Domain Name System (DNS).mp4 20.48Мб
32. Domain Name System (DNS).srt 2.99Кб
33. BASICS OF NETWORKING Quiz 4.html 720б
34.1 Network-Security-Essentials-4th-Edition William Stallings.pdf 3.06Мб
34.2 (McGraw-Hill Forouzan Networking) Behrouz A. Forouzan - Data Communications and Networking -McGraw-Hill Higher Education (2007).pdf 10.84Мб
34.3 Atul Kahate - Cryptography and network security (2006, Tata McGraw-Hill).pdf 14.95Мб
34.4 Kurose, James F._ Ross, Keith W. - Computer networking _ a top-down approach (2017) - libgen.lc.pdf 19.97Мб
34. Conclusion.mp4 2.21Мб
34. Conclusion.srt 849б
4. 4 Phases of Vulnerability Assessment.mp4 40.36Мб
4. 4 Phases of Vulnerability Assessment.srt 12.64Кб
4. Hacking Organizations around the Globe.mp4 27.15Мб
4. Hacking Organizations around the Globe.srt 5.91Кб
4. History of Cyber Security.mp4 60.12Мб
4. History of Cyber Security.srt 7.22Кб
4. IDS evasion techniques.mp4 33.93Мб
4. IDS evasion techniques.srt 8.55Кб
4. Introduction to Incident Response Team.mp4 32.05Мб
4. Introduction to Incident Response Team.srt 6.49Кб
4. Key Terms in Cyber Security.mp4 30.67Мб
4. Key Terms in Cyber Security.srt 7.99Кб
4. Meet the instructors!.mp4 7.26Мб
4. Meet the instructors!.srt 484б
5.1 How to Become a Cyber Security Professional.html 94б
5. History and Applications of Computer Networking.mp4 39.06Мб
5. History and Applications of Computer Networking.srt 6.68Кб
5. Phases of Incident Response.mp4 19.83Мб
5. Phases of Incident Response.srt 6.23Кб
5. PRACTICAL DOWNLOADING NESSUS VULNERABILITY SCANNER.mp4 11.24Мб
5. PRACTICAL DOWNLOADING NESSUS VULNERABILITY SCANNER.srt 1.95Кб
5. Scope and Career Insights in Cyber Security.mp4 48.28Мб
5. Scope and Career Insights in Cyber Security.srt 10.67Кб
5. Security Services and Mechanisms.mp4 17.62Мб
5. Security Services and Mechanisms.srt 4.31Кб
5. The Elements of Information Security.mp4 23.07Мб
5. The Elements of Information Security.srt 6.44Кб
5. What is DMZ.mp4 36.70Мб
5. What is DMZ.srt 6.32Кб
6.1 Network-Security-Essentials-4th-Edition William Stallings.pdf 3.06Мб
6.2 (McGraw-Hill Forouzan Networking) Behrouz A. Forouzan - Data Communications and Networking -McGraw-Hill Higher Education (2007).pdf 10.83Мб
6.3 Ethem Mining - Kali Linux Hacking_ A Complete Step by Step Guide to Learn the Fundamentals of Cyber Security, Hacking, and Penetration Testing. Includes Valuable Basic Networking Concepts-Independentl.epub 2.56Мб
6. Before moving ahead....html 2.53Кб
6. Firewall evasion techniques.mp4 40.89Мб
6. Firewall evasion techniques.srt 9.39Кб
6. GETTING STARTED WITH CYBER SECURITY QUIZ.html 661б
6. Introduction to Threats.mp4 11.24Мб
6. Introduction to Threats.srt 3.99Кб
6. Laws in Cyber Security.mp4 31.94Мб
6. Laws in Cyber Security.srt 6.23Кб
6. PRACTICAL CREATING A ADVANCE NETWORK SCAN POLICY.mp4 28.84Мб
6. PRACTICAL CREATING A ADVANCE NETWORK SCAN POLICY.srt 7.48Кб
6. Types of Attacks.mp4 43.35Мб
6. Types of Attacks.srt 13.35Кб
7. DID YOU RATE.html 2.53Кб
7. Different types of Firewalls.mp4 31.95Мб
7. Different types of Firewalls.srt 10.89Кб
7. PRACTICAL INITIATING A SCAN USING USER DEFINED POLICIES.mp4 16.75Мб
7. PRACTICAL INITIATING A SCAN USING USER DEFINED POLICIES.srt 3.80Кб
7. Protocols and Standards.mp4 28.91Мб
7. Protocols and Standards.srt 4.93Кб
7. Roles in Cyber Security Part 1.mp4 48.97Мб
7. Roles in Cyber Security Part 1.srt 9.59Кб
7. What are Audits in Cyber Security.mp4 45.02Мб
7. What are Audits in Cyber Security.srt 12.44Кб
7. What is a Malware.mp4 47.53Мб
7. What is a Malware.srt 9.28Кб
8. BASICS OF NETWORKING Quiz 1.html 147б
8. Conclusion.mp4 3.58Мб
8. Conclusion.srt 693б
8. Everything about Trojans.mp4 50.19Мб
8. Everything about Trojans.srt 8.64Кб
8. Internal Audit vs External Audit.mp4 34.89Мб
8. Internal Audit vs External Audit.srt 5.57Кб
8. PRACTICAL GOING THROUGH SCANNED RESULTS.mp4 15.11Мб
8. PRACTICAL GOING THROUGH SCANNED RESULTS.srt 4.06Кб
8. Roles in Cyber Security Part 2.mp4 34.05Мб
8. Roles in Cyber Security Part 2.srt 6.29Кб
8. The Antivirus!.mp4 20.17Мб
8. The Antivirus!.srt 3.73Кб
9. Antivirus Detection Techniques.mp4 72.62Мб
9. Antivirus Detection Techniques.srt 11.74Кб
9. How to carry out an Internal Audit.mp4 48.54Мб
9. How to carry out an Internal Audit.srt 13.56Кб
9. Introduction to Cryptography.mp4 41.86Мб
9. Introduction to Cryptography.srt 5.81Кб
9. Introduction to OSI Model.mp4 32.18Мб
9. Introduction to OSI Model.srt 5.05Кб
9. PRACTICAL USING OSINT FRAMEWORK FOR INFORMATION GATHERING.mp4 41.17Мб
9. PRACTICAL USING OSINT FRAMEWORK FOR INFORMATION GATHERING.srt 6.40Кб
9. Types of Trojans.mp4 49.55Мб
9. Types of Trojans.srt 8.11Кб
Download Paid Udemy Courses For Free.url 116б
Download Paid Udemy Courses For Free.url 116б
GetFreeCourses.Co.url 116б
GetFreeCourses.Co.url 116б
How you can help GetFreeCourses.Co.txt 182б
How you can help GetFreeCourses.Co.txt 182б
Статистика распространения по странам
Великобритания (GB) 2
Румыния (RO) 1
Нигерия (NG) 1
Словакия (SK) 1
Индия (IN) 1
Всего 6
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент