FileMood

Download [DesireCourse.Net] Udemy - Cyber Security - Go From Zero to Hero (2020)

DesireCourse Net Udemy Cyber Security Go From Zero to Hero 2020

Name

[DesireCourse.Net] Udemy - Cyber Security - Go From Zero to Hero (2020)

 DOWNLOAD Copy Link

Total Size

3.7 GB

Total Files

244

Hash

7B542E62C481649D20D8D4C392AA54D1CF80C4DF

/0. Websites you may like/

[CourseClub.Me].url

0.0 KB

[DesireCourse.Net].url

0.1 KB

/1. FUNDAMENTALS OF NETWORKING/

1. ARE YOU READY.html

3.7 KB

10. Layers of OSI Model.mp4

34.9 MB

10. Layers of OSI Model.srt

11.1 KB

11. Introduction to TCPIP Model.mp4

79.7 MB

11. Introduction to TCPIP Model.srt

11.8 KB

12. OSI Model vs TCPIP Model.mp4

25.3 MB

12. OSI Model vs TCPIP Model.srt

5.1 KB

13. BASICS OF NETWORKING Quiz 2.html

0.1 KB

14. Addressing in Computer Networks.mp4

56.2 MB

14. Addressing in Computer Networks.srt

10.2 KB

15. IP Address- IPv4 and IPv6.mp4

42.6 MB

15. IP Address- IPv4 and IPv6.srt

7.0 KB

16. Introduction to Classes of IP Addressing.mp4

15.7 MB

16. Introduction to Classes of IP Addressing.srt

4.5 KB

17. Classes of IP Address.mp4

57.5 MB

17. Classes of IP Address.srt

10.0 KB

18. PRACTICAL HOW TO FIND OUT YOUR PC's IP ADDRESS.mp4

23.5 MB

18. PRACTICAL HOW TO FIND OUT YOUR PC's IP ADDRESS.srt

3.6 KB

19. PRACTICAL HOW TO FIND OUT YOUR PC'S MAC ADDRESS.mp4

43.4 MB

19. PRACTICAL HOW TO FIND OUT YOUR PC'S MAC ADDRESS.srt

5.3 KB

2. What is Computer Networking - Definition and Characteristics.mp4

20.4 MB

2. What is Computer Networking - Definition and Characteristics.srt

3.3 KB

20. The Internet Protocol (IP).mp4

33.5 MB

20. The Internet Protocol (IP).srt

7.6 KB

21. BASICS OF NETWORKING QUIZ 3.html

0.1 KB

22. Address Resolution Protocol (ARP).mp4

53.0 MB

22. Address Resolution Protocol (ARP).srt

10.5 KB

23. SUPPORT WE SECURE!.html

2.6 KB

24. Dynamic Host Configuration Protocol (DHCP).mp4

38.6 MB

24. Dynamic Host Configuration Protocol (DHCP).srt

9.4 KB

25. Internet Control Message Protocol (ICMP).mp4

39.2 MB

25. Internet Control Message Protocol (ICMP).srt

7.3 KB

26. RIP and OSPF Protocols.mp4

37.4 MB

26. RIP and OSPF Protocols.srt

6.2 KB

27. PRACTICAL HOW TO FIND OUT THE PATH OF DATA PACKETS USING TRACERT.mp4

17.8 MB

27. PRACTICAL HOW TO FIND OUT THE PATH OF DATA PACKETS USING TRACERT.srt

3.1 KB

28. What are Sockets.mp4

31.9 MB

28. What are Sockets.srt

6.7 KB

29. File Transfer Protocol (FTP).mp4

29.2 MB

29. File Transfer Protocol (FTP).srt

4.1 KB

3. Network Topologies.mp4

27.1 MB

3. Network Topologies.srt

7.9 KB

30. Hypertext Transfer Protocol (HTTP).mp4

43.7 MB

30. Hypertext Transfer Protocol (HTTP).srt

4.7 KB

31. Hyptertext Transfer ProtocolSecure Socket Layer (HTTPS).mp4

48.4 MB

31. Hyptertext Transfer ProtocolSecure Socket Layer (HTTPS).srt

6.4 KB

32. Domain Name System (DNS).mp4

21.5 MB

32. Domain Name System (DNS).srt

3.1 KB

33. BASICS OF NETWORKING Quiz 4.html

0.7 KB

34. Conclusion.mp4

2.3 MB

34. Conclusion.srt

0.8 KB

34.1 Network-Security-Essentials-4th-Edition William Stallings.pdf

3.2 MB

34.2 (McGraw-Hill Forouzan Networking) Behrouz A. Forouzan - Data Communications and Networking -McGraw-Hill Higher Education (2007).pdf

11.4 MB

34.3 Atul Kahate - Cryptography and network security (2006, Tata McGraw-Hill).pdf

15.7 MB

34.4 Kurose, James F._ Ross, Keith W. - Computer networking _ a top-down approach (2017) - libgen.lc.pdf

20.9 MB

4. Meet the instructors!.mp4

7.6 MB

4. Meet the instructors!.srt

0.5 KB

5. History and Applications of Computer Networking.mp4

41.0 MB

5. History and Applications of Computer Networking.srt

6.8 KB

6. Before moving ahead....html

2.6 KB

6.1 Network-Security-Essentials-4th-Edition William Stallings.pdf

3.2 MB

6.2 (McGraw-Hill Forouzan Networking) Behrouz A. Forouzan - Data Communications and Networking -McGraw-Hill Higher Education (2007).pdf

11.4 MB

6.3 Ethem Mining - Kali Linux Hacking_ A Complete Step by Step Guide to Learn the Fundamentals of Cyber Security, Hacking, and Penetration Testing. Includes Valuable Basic Networking Concepts-Independentl.epub

2.7 MB

7. Protocols and Standards.mp4

30.3 MB

7. Protocols and Standards.srt

5.1 KB

8. BASICS OF NETWORKING Quiz 1.html

0.1 KB

9. Introduction to OSI Model.mp4

33.7 MB

9. Introduction to OSI Model.srt

5.2 KB

/2. GETTING STARTED WITH CYBER SECURITY/

1. Definition of Computer Security.mp4

29.8 MB

1. Definition of Computer Security.srt

4.0 KB

2. Interesting Facts about Cyber Security.mp4

44.9 MB

2. Interesting Facts about Cyber Security.srt

5.4 KB

3. Have a look at this!.mp4

12.3 MB

3. Have a look at this!.srt

0.8 KB

4. History of Cyber Security.mp4

63.0 MB

4. History of Cyber Security.srt

7.4 KB

5. Scope and Career Insights in Cyber Security.mp4

50.6 MB

5. Scope and Career Insights in Cyber Security.srt

10.9 KB

5.1 How to Become a Cyber Security Professional.html

0.1 KB

6. GETTING STARTED WITH CYBER SECURITY QUIZ.html

0.7 KB

7. DID YOU RATE.html

2.6 KB

8. Conclusion.mp4

3.8 MB

8. Conclusion.srt

0.7 KB

/3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/

1. Introduction.mp4

6.0 MB

1. Introduction.srt

1.5 KB

10. SECTION 3 QUIZ.html

0.6 KB

11. We value your feedback!.html

2.6 KB

12. Conclusion.mp4

2.7 MB

12. Conclusion.srt

0.8 KB

2. Standard Definition of Cyber Security.mp4

19.9 MB

2. Standard Definition of Cyber Security.srt

3.1 KB

3. Types of Computer Security.mp4

26.3 MB

3. Types of Computer Security.srt

3.3 KB

4. Key Terms in Cyber Security.mp4

32.2 MB

4. Key Terms in Cyber Security.srt

8.2 KB

5. The Elements of Information Security.mp4

24.2 MB

5. The Elements of Information Security.srt

6.6 KB

6. Types of Attacks.mp4

45.5 MB

6. Types of Attacks.srt

13.7 KB

7. Roles in Cyber Security Part 1.mp4

51.3 MB

7. Roles in Cyber Security Part 1.srt

9.8 KB

8. Roles in Cyber Security Part 2.mp4

35.7 MB

8. Roles in Cyber Security Part 2.srt

6.4 KB

9. PRACTICAL USING OSINT FRAMEWORK FOR INFORMATION GATHERING.mp4

43.2 MB

9. PRACTICAL USING OSINT FRAMEWORK FOR INFORMATION GATHERING.srt

6.6 KB

[CourseClub.Me].url

0.0 KB

[DesireCourse.Net].url

0.1 KB

/4. DIVING DEEP INTO CYBER SECURITY/

1. Introduction.mp4

10.7 MB

1. Introduction.srt

1.8 KB

10. Symmetric Encryption.mp4

15.1 MB

10. Symmetric Encryption.srt

3.6 KB

11. AES and DES.mp4

46.7 MB

11. AES and DES.srt

7.3 KB

12. Asymmetric Encryption.mp4

17.1 MB

12. Asymmetric Encryption.srt

3.2 KB

13. Hey there! Support We Secure..html

2.6 KB

14. RSA & Diffie Hellman.mp4

49.8 MB

14. RSA & Diffie Hellman.srt

9.4 KB

15. Hashing.mp4

65.1 MB

15. Hashing.srt

8.6 KB

16. Security Organizations.mp4

28.1 MB

16. Security Organizations.srt

6.0 KB

17. Critical Thinking in Cyber Security.mp4

22.8 MB

17. Critical Thinking in Cyber Security.srt

4.9 KB

18. The Five Critical Thinking Skills.mp4

25.3 MB

18. The Five Critical Thinking Skills.srt

7.3 KB

19. PRACTICAL USING NSLOOKUP TOOL.mp4

7.5 MB

19. PRACTICAL USING NSLOOKUP TOOL.srt

3.2 KB

2. Security Architect's View of Security.mp4

49.3 MB

2. Security Architect's View of Security.srt

10.3 KB

20. PRACTICAL USING NETSTAT TOOL.mp4

34.0 MB

20. PRACTICAL USING NETSTAT TOOL.srt

4.5 KB

21. SECTION 4 QUIZ - DIVING DEEP INTO CYBER SECURITY.html

0.6 KB

22. Conclusion.mp4

2.9 MB

22. Conclusion.srt

0.7 KB

3. What is Vulnerability Assessment.mp4

38.8 MB

3. What is Vulnerability Assessment.srt

5.9 KB

4. 4 Phases of Vulnerability Assessment.mp4

42.3 MB

4. 4 Phases of Vulnerability Assessment.srt

12.9 KB

5. PRACTICAL DOWNLOADING NESSUS VULNERABILITY SCANNER.mp4

11.8 MB

5. PRACTICAL DOWNLOADING NESSUS VULNERABILITY SCANNER.srt

2.0 KB

6. PRACTICAL CREATING A ADVANCE NETWORK SCAN POLICY.mp4

30.2 MB

6. PRACTICAL CREATING A ADVANCE NETWORK SCAN POLICY.srt

7.7 KB

7. PRACTICAL INITIATING A SCAN USING USER DEFINED POLICIES.mp4

17.6 MB

7. PRACTICAL INITIATING A SCAN USING USER DEFINED POLICIES.srt

3.9 KB

8. PRACTICAL GOING THROUGH SCANNED RESULTS.mp4

15.8 MB

8. PRACTICAL GOING THROUGH SCANNED RESULTS.srt

4.2 KB

9. Introduction to Cryptography.mp4

43.9 MB

9. Introduction to Cryptography.srt

5.9 KB

/5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/

1. Introduction.mp4

7.6 MB

1. Introduction.srt

1.1 KB

10. OH MY GOD! VIRUS!!.mp4

39.6 MB

10. OH MY GOD! VIRUS!!.srt

7.7 KB

11. Types of Virus.mp4

62.2 MB

11. Types of Virus.srt

11.6 KB

12. You should defend yourself!.mp4

48.2 MB

12. You should defend yourself!.srt

9.2 KB

13. Have you ever heard about a Ransomware.mp4

85.1 MB

13. Have you ever heard about a Ransomware.srt

12.7 KB

14. IMPORTANT!.html

2.6 KB

15. PRACTICAL INFORMATION GATHERING USING SHODAN.mp4

78.0 MB

15. PRACTICAL INFORMATION GATHERING USING SHODAN.srt

9.9 KB

16. The Cyber Kill Chain.mp4

32.8 MB

16. The Cyber Kill Chain.srt

10.8 KB

17. Introduction to Social Engineering.mp4

29.5 MB

17. Introduction to Social Engineering.srt

6.1 KB

18. Types of Social Engineering.mp4

60.4 MB

18. Types of Social Engineering.srt

7.2 KB

19. PRACTICAL HOW TO FIND OUT USERNAMES AND PASSWORDS USING SOCIAL ENGINEERING.mp4

89.7 MB

19. PRACTICAL HOW TO FIND OUT USERNAMES AND PASSWORDS USING SOCIAL ENGINEERING.srt

12.8 KB

2. Different types of Actors in Cyber Security.mp4

67.6 MB

2. Different types of Actors in Cyber Security.srt

11.6 KB

20. SECTION 5 QUIZ - TYPES OF ACTORS, ATTACKS AND MALWARE.html

0.6 KB

21. Conclusion.mp4

4.3 MB

21. Conclusion.srt

0.8 KB

3. Types of Cyber Attacks.mp4

32.9 MB

3. Types of Cyber Attacks.srt

5.1 KB

4. Hacking Organizations around the Globe.mp4

28.5 MB

4. Hacking Organizations around the Globe.srt

6.1 KB

5. Security Services and Mechanisms.mp4

18.5 MB

5. Security Services and Mechanisms.srt

4.4 KB

6. Introduction to Threats.mp4

11.8 MB

6. Introduction to Threats.srt

4.1 KB

7. What is a Malware.mp4

49.8 MB

7. What is a Malware.srt

9.5 KB

8. Everything about Trojans.mp4

52.6 MB

8. Everything about Trojans.srt

8.8 KB

9. Types of Trojans.mp4

52.0 MB

9. Types of Trojans.srt

8.3 KB

/6. KEY SECURITY CONCEPTS/

1. Introduction.mp4

9.1 MB

1. Introduction.srt

1.8 KB

10. The NIST Framework.mp4

22.9 MB

10. The NIST Framework.srt

3.9 KB

11. The COBIT Framework.mp4

26.8 MB

11. The COBIT Framework.srt

4.2 KB

12. Other Security Frameworks.mp4

26.4 MB

12. Other Security Frameworks.srt

5.6 KB

13. SECTION 6 QUIZ - KEY SECURITY CONCEPTS.html

0.6 KB

14. Leave a Rating!.html

2.6 KB

15. Conclusion.mp4

2.2 MB

15. Conclusion.srt

0.7 KB

2. Confidentiality - The Most Important Element of Security.mp4

27.5 MB

2. Confidentiality - The Most Important Element of Security.srt

5.2 KB

3. Integrity, Authentication, Access Control and Non-Repudiation.mp4

58.6 MB

3. Integrity, Authentication, Access Control and Non-Repudiation.srt

10.7 KB

4. Introduction to Incident Response Team.mp4

33.6 MB

4. Introduction to Incident Response Team.srt

6.6 KB

5. Phases of Incident Response.mp4

20.8 MB

5. Phases of Incident Response.srt

6.4 KB

6. Laws in Cyber Security.mp4

33.5 MB

6. Laws in Cyber Security.srt

6.4 KB

7. What are Audits in Cyber Security.mp4

47.2 MB

7. What are Audits in Cyber Security.srt

12.7 KB

8. Internal Audit vs External Audit.mp4

36.6 MB

8. Internal Audit vs External Audit.srt

5.7 KB

9. How to carry out an Internal Audit.mp4

50.9 MB

9. How to carry out an Internal Audit.srt

13.9 KB

/7. FIREWALLS AND ANTIVIRUS/

1. Introduction.mp4

13.7 MB

1. Introduction.srt

1.7 KB

10. Firewalls vs Antivirus.mp4

9.7 MB

10. Firewalls vs Antivirus.srt

2.3 KB

11. THE FINAL QUIZ - FIREWALLS AND ANTIVIRUS.html

0.9 KB

12. CONGRATULATIONS!.mp4

19.5 MB

12. CONGRATULATIONS!.srt

2.4 KB

2. Intrusion Detection System.mp4

62.0 MB

2. Intrusion Detection System.srt

12.7 KB

3. Introduction to Firewalls.mp4

55.9 MB

3. Introduction to Firewalls.srt

10.7 KB

4. IDS evasion techniques.mp4

35.6 MB

4. IDS evasion techniques.srt

8.8 KB

5. What is DMZ.mp4

38.5 MB

5. What is DMZ.srt

6.5 KB

6. Firewall evasion techniques.mp4

42.9 MB

6. Firewall evasion techniques.srt

9.6 KB

7. Different types of Firewalls.mp4

33.5 MB

7. Different types of Firewalls.srt

11.1 KB

8. The Antivirus!.mp4

21.1 MB

8. The Antivirus!.srt

3.8 KB

9. Antivirus Detection Techniques.mp4

76.2 MB

9. Antivirus Detection Techniques.srt

12.0 KB

/

[CourseClub.Me].url

0.0 KB

[DesireCourse.Net].url

0.1 KB

 

Total files 244


Copyright © 2024 FileMood.com