[FreeUdemy Me] Kali Linux, Ethical Hacking And Pen Testing For Beginners

Torrent Details

[FreeUdemy Me] Kali Linux, Ethical Hacking and Pen Testing for Beginners[FreeUdemy Me] Kali Linux, Ethical Hacking and Pen Testing for Beginners

NAME
[FreeUdemy Me] Kali Linux, Ethical Hacking and Pen Testing for Beginners.torrent
CATEGORY
eBooks
INFOHASH
a89ef6b3df1bb9eff52bbe1380cdee01797f7c60
SIZE
1.2 GB in 44 files
ADDED
Uploaded on 19-05-2017 by our crawler pet called "Spidey".
SWARM
0 seeders & 1 peers
RATING
This torrent has a good rating! This torrent has a good rating. It has 1 good vote.

Please login to vote for this torrent.


Description

Folder Name:
[FreeUdemyMe] Kali Linux, Ethical Hacking and Pen Testing for Beginners

Course Description:
Learn what it takes to become an Ethical Hacker. Discover the world of Ethical Hacking and Penetration Testing.

udemy:
https://www.udemy.com/a-beginners-guide-to-kali-ethical-hacking-and-pen-testing/

Credits:
Admin: FreeUdemy.Me & Our CONTRIBUTOR: Lihua GoogleDrive. :)

Something to Say: ;)
PM us "SUPPORT for FreeUdemy.Me" to motivate us! :)

DOWNLOAD PAID UDEMY COURSES FOR FREE!!!
https://www.freeudemy.me/

Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
01 Introduction to Ethical Hacking and Security Industry Terminology/001 Course Intro.mp423 MB
01 Introduction to Ethical Hacking and Security Industry Terminology/002 OSI Model and CIA.mp470.6 MB
01 Introduction to Ethical Hacking and Security Industry Terminology/003 Spoofing and Hijacking.mp438.7 MB
01 Introduction to Ethical Hacking and Security Industry Terminology/004 Cross Site Scripting Cross Site Request Forgery.mp443 MB
01 Introduction to Ethical Hacking and Security Industry Terminology/005 SQL Injection.mp417.2 MB
01 Introduction to Ethical Hacking and Security Industry Terminology/006 Wireless Network Security.mp430.7 MB
01 Introduction to Ethical Hacking and Security Industry Terminology/007 Common Malware.mp442.1 MB
02 Kali 101/008 About Kali and use cases.mp46 MB
02 Kali 101/009 Installing and configuring Kali on a VMware Virtual Machine.mp410.4 MB
02 Kali 101/010 Configuring the network adapter.mp48.5 MB
02 Kali 101/011 Booting Kali for the first time.mp47.5 MB
02 Kali 101/012 Basic commands with Kali and VMware.mp48.1 MB
02 Kali 101/013 Basic Kali Configuration.mp44.2 MB
02 Kali 101/014 Configuring your network.mp44.2 MB
02 Kali 101/015 Requesting and Configuring IP Addresses.mp47.9 MB
02 Kali 101/016 Managing services in Kali.mp46 MB
02 Kali 101/017 Managing Apache in Kali.mp412.1 MB
02 Kali 101/018 Managing SSH in Kali.mp44.5 MB
02 Kali 101/019 Managing MySQL in Kali.mp412 MB
02 Kali 101/020 Vulnerability Analysis Tools Overview.mp48.2 MB
02 Kali 101/021 Tools Overview.mp44.4 MB
02 Kali 101/022 Information Gathering Tools Overview.mp43.8 MB
02 Kali 101/023 Maltego.mp45.4 MB
02 Kali 101/024 Web Applications Tools Overview.mp46.5 MB
02 Kali 101/025 Burp Suite.mp45.1 MB
02 Kali 101/026 Password Attacks Tools Overview.mp42.9 MB
02 Kali 101/027 Ophcrack.mp44.5 MB
02 Kali 101/028 Armitage.mp46.1 MB
02 Kali 101/029 Cracking Wi-Fi Passwords on a WEP Network.mp4182 MB
02 Kali 101/030 Top 10 Security Tools Overview.mp48.5 MB
03 Penetration Testing Methodologies/031 Penetration Testing.mp455.7 MB
03 Penetration Testing Methodologies/032 Pen-Testing Techniques.mp475.9 MB
03 Penetration Testing Methodologies/033 Scope of Pen-Testing.mp470.8 MB
03 Penetration Testing Methodologies/034 Types of Pen-Testing and its Strategies Part 1.mp466.5 MB
03 Penetration Testing Methodologies/035 Types of Pen-Testing and its Strategies Part 2.mp447.2 MB
03 Penetration Testing Methodologies/036 Types of Pen-Testing and its Strategies Part 3.mp468.5 MB
03 Penetration Testing Methodologies/037 Types of Pen-Testing and its Strategies Part 4.mp479.2 MB
04 BONUS Labs on Source Code Fuzzing Infecting MySQL logs and more/038 Injecting MySQL Logs.mp431.6 MB
04 BONUS Labs on Source Code Fuzzing Infecting MySQL logs and more/039 Threat Actor Attribution.mp424.1 MB
04 BONUS Labs on Source Code Fuzzing Infecting MySQL logs and more/040 Understanding Heap Overflow Protection.mp421.1 MB
04 BONUS Labs on Source Code Fuzzing Infecting MySQL logs and more/041 Source Code Fuzzing Lab Crash Analysis using American Fuzzy Lop.mp447.6 MB
04 BONUS Labs on Source Code Fuzzing Infecting MySQL logs and more/042 Intercepting Process Injection on Suspended Threads.mp450 MB
04 BONUS Labs on Source Code Fuzzing Infecting MySQL logs and more/043 Bonus Lecture Get access to all our cybersecurity courses with a deep discount.html502 B
FreeUdemy.Me.html113 B

Alternative Torrents for 'FreeUdemy Me Kali Linux Ethical Hacking and Pen Testing for Beginners'.

There are no alternative torrents found.