[DesireCourse Com] Udemy - The Complete Cyber Security Course Hackers Exposed!

Torrent Details

[DesireCourse Com] Udemy - The Complete Cyber Security Course  Hackers Exposed![DesireCourse Com] Udemy - The Complete Cyber Security Course  Hackers Exposed!

NAME
[DesireCourse Com] Udemy - The Complete Cyber Security Course Hackers Exposed!.torrent
CATEGORY
eBooks
INFOHASH
561401b89e2b770c43e7dfa9484cdb3d0c62526e
SIZE
3.2 GB in 99 files
ADDED
Uploaded on 01-08-2018 by our crawler pet called "Spidey".
SWARM
0 seeders & 1 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description

The Complete Cyber Security Course : Hackers Exposed!

Volume 1 : Become a Cyber Security Specialist, Learn How to Stop Hackers, Prevent Hacking, Learn IT Security & INFOSEC

For More Courses Visit: https://desirecourse.com

Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
01 Introduction/001 Welcome and Introduction to the Instructor.mp417.1 MB
01 Introduction/002 Security Quick Win.mp446.7 MB
01 Introduction/003 Goals and Learning Objectives - Volume 1.mp49.1 MB
01 Introduction/004 Target Audience.mp47.3 MB
01 Introduction/005 Study Recommendations.mp427.9 MB
01 Introduction/006 Course updates.mp42.6 MB
02 know Yourself - The Threat and Vulnerability Landscape/007 Goals and Learning Objectives.mp42.7 MB
02 know Yourself - The Threat and Vulnerability Landscape/008 Protect What You Value.mp44.5 MB
02 know Yourself - The Threat and Vulnerability Landscape/009 What is Privacy Anonymity and Pseudonymity.mp411.9 MB
02 know Yourself - The Threat and Vulnerability Landscape/010 Security Vulnerabilities Threats and Adversaries.mp411.8 MB
02 know Yourself - The Threat and Vulnerability Landscape/011 Threat Modeling and Risk Assessments.mp419.8 MB
02 know Yourself - The Threat and Vulnerability Landscape/012 Security vs Privacy vs Anonymity - Can we have it all.mp45.6 MB
02 know Yourself - The Threat and Vulnerability Landscape/013 Defense In Depth.mp42.6 MB
02 know Yourself - The Threat and Vulnerability Landscape/014 The Zero Trust Model.mp412.2 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/015 Goals and Learning Objectives.mp42.9 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/016 Why You Need Security The Value Of A Hack.mp473.6 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/017 The Top 3 Things You Need To Stay Safe Online.mp43.3 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/018 Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp457.8 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/019 Hackers crackers and cyber criminals.mp418.8 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/020 Malware viruses rootkits and RATs.mp439 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/021 Spyware Adware Scareware PUPs Browser hijacking.mp419.4 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/022 What is Phishing Vishing and SMShing.mp454.5 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/023 Spamming Doxing.mp48.5 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/024 Social engineering - Scams cons tricks and fraud.mp418 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/025 Darknets Dark Markets and Exploit kits.mp4155.1 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/026 Governments spies and secret stuff part I.mp488.6 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/027 Governments spies and secret stuff part II.mp471.4 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/028 Regulating encryption mandating insecurity legalizing spying.mp4196 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/029 Trust Backdoors.mp457.4 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/030 Censorship.mp49 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/031 Security News and Alerts Stay Informed.mp42 MB
04 Encryption Crash Course/032 Goals and Learning Objectives.mp41.6 MB
04 Encryption Crash Course/033 Symmetric Encryption.mp452.3 MB
04 Encryption Crash Course/034 Asymmetric Encryption.mp427.4 MB
04 Encryption Crash Course/035 Hash Functions.mp437.2 MB
04 Encryption Crash Course/036 Digital Signatures.mp424.1 MB
04 Encryption Crash Course/037 Secure Sockets Layer SSL and Transport layer security TLS.mp488.3 MB
04 Encryption Crash Course/038 SSL Stripping.mp439.1 MB
04 Encryption Crash Course/039 HTTPS HTTP Secure.mp443.3 MB
04 Encryption Crash Course/040 Digital Certificates.mp423.6 MB
04 Encryption Crash Course/041 Certificate Authorities and HTTPS.mp459.7 MB
04 Encryption Crash Course/042 End-to-End Encryption E2EE.mp43.7 MB
04 Encryption Crash Course/043 Steganography.mp457 MB
04 Encryption Crash Course/044 How Security and Encryption is Really Attacked.mp46.8 MB
05 Setting up a Testing Environment Using Virtual Machines/045 Goals and Learning Objectives.mp41.8 MB
05 Setting up a Testing Environment Using Virtual Machines/046 Introduction to Setting up a Testing Environment Using Virtual Machines.mp448 MB
05 Setting up a Testing Environment Using Virtual Machines/047 Vmware.mp441.7 MB
05 Setting up a Testing Environment Using Virtual Machines/048 Virtual box.mp448.9 MB
05 Setting up a Testing Environment Using Virtual Machines/049 Kali Linux 2016.mp418.1 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/050 Goals and Learning Objectives.mp42.4 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/051 Security Features and Functionality.mp410.6 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/052 Security Bugs and Vulnerabilities.mp422.1 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/053 Usage Share.mp415.4 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/054 Windows 10 - Privacy Tracking.mp445.2 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/055 Windows 10 - Disable tracking automatically.mp422.5 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/056 Windows 10 - Tool Disable Windows 10 Tracking.mp453.6 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/057 Windows 10 Cortana.mp45.3 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/058 Windows 10 Privacy Settings.mp422.6 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/059 Windows 10 - WiFi Sense.mp417.5 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/060 Windows 7 8 and 8.1 - Privacy Tracking.mp443.7 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/061 Mac - Privacy Tracking.mp442.3 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/062 Linux and Unix like Operating systems.mp419.9 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/063 Linux - Debian.mp42.4 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/064 Linux - Debian 8 Jessie - Virtual box guest additions Issue.mp436.6 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/065 Linux - OpenBSD and Archlinux.mp412.6 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/066 Linux - Ubuntu.mp42.7 MB
07 Security Bugs and Vulnerabilities/067 Goals and Learning Objectives.mp41.7 MB
07 Security Bugs and Vulnerabilities/068 The Importance of Patching.mp411.7 MB
07 Security Bugs and Vulnerabilities/069 Windows 7 - Auto Update.mp44.9 MB
07 Security Bugs and Vulnerabilities/070 Windows 8 8.1 - Auto Update.mp46.5 MB
07 Security Bugs and Vulnerabilities/071 Windows 10 - Auto Update.mp44.9 MB
07 Security Bugs and Vulnerabilities/072 Windows - Criticality and Patch Tuesday.mp441.8 MB
07 Security Bugs and Vulnerabilities/073 Windows 7 8 8.1 10 - Automate the pain away from patching.mp419.4 MB
07 Security Bugs and Vulnerabilities/074 Linux - Debian - Patching.mp438.5 MB
07 Security Bugs and Vulnerabilities/075 Mac - Patching.mp455.6 MB
07 Security Bugs and Vulnerabilities/076 Firefox - Browser and extension updates.mp434 MB
07 Security Bugs and Vulnerabilities/077 Chrome - Browser and extension updates.mp43.6 MB
07 Security Bugs and Vulnerabilities/078 IE and Edge - Browser and extention updates.mp45.6 MB
07 Security Bugs and Vulnerabilities/079 Auto updates - The Impact to privacy and anonymity.mp44.3 MB
08 Reducing Threat Privilege/080 Goals and Learning Objectives Removing Privilege.mp413.6 MB
08 Reducing Threat Privilege/081 Windows 7 - Not using admin.mp411 MB
08 Reducing Threat Privilege/082 Windows 8 and 8.1 - Not using admin.mp418.2 MB
08 Reducing Threat Privilege/083 Windows 10 - Not using admin.mp414.1 MB
09 Social Engineering and Social Media Offence and Defence/084 Goals and Learning Objectives.mp41.7 MB
09 Social Engineering and Social Media Offence and Defence/085 Information Disclosure and Identity Strategies for Social Media.mp483.8 MB
09 Social Engineering and Social Media Offence and Defence/086 Identify Verification and Registration.mp423.4 MB
09 Social Engineering and Social Media Offence and Defence/087 Behavioural Security Controls Against Social Threats Phishing Spam Part 1.mp423.3 MB
09 Social Engineering and Social Media Offence and Defence/088 Behavioural Security Controls Against Social Threats Phishing Spam Part 2.mp449.3 MB
09 Social Engineering and Social Media Offence and Defence/089 Technical Security Controls Against Social Threats Phishing Spam Scam Cons.mp414.5 MB
10 Security Domains/090 Goals and Learning Objectives.mp41.4 MB
10 Security Domains/091 Security Domains.mp421.8 MB
11 Security Through Isolation and Compartmentalization/092 Goals and Learning Objectives.mp42.3 MB
11 Security Through Isolation and Compartmentalization/093 Introduction to Isolation and Compartmentalization.mp45.7 MB
11 Security Through Isolation and Compartmentalization/094 Physical and Hardware Isolation - How to change the Mac Address.mp425.6 MB
11 Security Through Isolation and Compartmentalization/095 Physical and Hardware Isolation - Hardware Serials.mp450.2 MB
11 Security Through Isolation and Compartmentalization/096 Virtual Isolation.mp457.3 MB
11 Security Through Isolation and Compartmentalization/097 Dual Boot.mp47.9 MB
11 Security Through Isolation and Compartmentalization/098 Built-in Sandboxes and Application Isolation.mp410.4 MB
11 Security Through Isolation and Compartmentalization/099 Windows - Sandboxes and Application Isolation.mp426.4 MB

Alternative Torrents for 'DesireCourse Com Udemy Complete Cyber Security Course Hackers Exposed'.

There are no alternative torrents found.