DesireCourse Net Udemy Cyber Security Go From Zero to Hero 2020 |
||
Name |
[DesireCourse.Net] Udemy - Cyber Security - Go From Zero to Hero (2020) |
DOWNLOAD Copy Link |
Total Size |
3.7 GB |
|
Total Files |
244 |
|
Hash |
7B542E62C481649D20D8D4C392AA54D1CF80C4DF |
/0. Websites you may like/ |
|
|
0.0 KB |
|
0.1 KB |
/1. FUNDAMENTALS OF NETWORKING/ |
|
|
3.7 KB |
|
34.9 MB |
|
11.1 KB |
|
79.7 MB |
|
11.8 KB |
|
25.3 MB |
|
5.1 KB |
|
0.1 KB |
|
56.2 MB |
|
10.2 KB |
|
42.6 MB |
|
7.0 KB |
|
15.7 MB |
|
4.5 KB |
|
57.5 MB |
|
10.0 KB |
|
23.5 MB |
|
3.6 KB |
|
43.4 MB |
|
5.3 KB |
2. What is Computer Networking - Definition and Characteristics.mp4 |
20.4 MB |
2. What is Computer Networking - Definition and Characteristics.srt |
3.3 KB |
|
33.5 MB |
|
7.6 KB |
|
0.1 KB |
|
53.0 MB |
|
10.5 KB |
|
2.6 KB |
|
38.6 MB |
|
9.4 KB |
|
39.2 MB |
|
7.3 KB |
|
37.4 MB |
|
6.2 KB |
27. PRACTICAL HOW TO FIND OUT THE PATH OF DATA PACKETS USING TRACERT.mp4 |
17.8 MB |
27. PRACTICAL HOW TO FIND OUT THE PATH OF DATA PACKETS USING TRACERT.srt |
3.1 KB |
|
31.9 MB |
|
6.7 KB |
|
29.2 MB |
|
4.1 KB |
|
27.1 MB |
|
7.9 KB |
|
43.7 MB |
|
4.7 KB |
31. Hyptertext Transfer ProtocolSecure Socket Layer (HTTPS).mp4 |
48.4 MB |
31. Hyptertext Transfer ProtocolSecure Socket Layer (HTTPS).srt |
6.4 KB |
|
21.5 MB |
|
3.1 KB |
|
0.7 KB |
|
2.3 MB |
|
0.8 KB |
34.1 Network-Security-Essentials-4th-Edition William Stallings.pdf |
3.2 MB |
|
11.4 MB |
34.3 Atul Kahate - Cryptography and network security (2006, Tata McGraw-Hill).pdf |
15.7 MB |
|
20.9 MB |
|
7.6 MB |
|
0.5 KB |
|
41.0 MB |
|
6.8 KB |
|
2.6 KB |
6.1 Network-Security-Essentials-4th-Edition William Stallings.pdf |
3.2 MB |
|
11.4 MB |
|
2.7 MB |
|
30.3 MB |
|
5.1 KB |
|
0.1 KB |
|
33.7 MB |
|
5.2 KB |
/2. GETTING STARTED WITH CYBER SECURITY/ |
|
|
29.8 MB |
|
4.0 KB |
|
44.9 MB |
|
5.4 KB |
|
12.3 MB |
|
0.8 KB |
|
63.0 MB |
|
7.4 KB |
|
50.6 MB |
|
10.9 KB |
|
0.1 KB |
|
0.7 KB |
|
2.6 KB |
|
3.8 MB |
|
0.7 KB |
/3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/ |
|
|
6.0 MB |
|
1.5 KB |
|
0.6 KB |
|
2.6 KB |
|
2.7 MB |
|
0.8 KB |
|
19.9 MB |
|
3.1 KB |
|
26.3 MB |
|
3.3 KB |
|
32.2 MB |
|
8.2 KB |
|
24.2 MB |
|
6.6 KB |
|
45.5 MB |
|
13.7 KB |
|
51.3 MB |
|
9.8 KB |
|
35.7 MB |
|
6.4 KB |
9. PRACTICAL USING OSINT FRAMEWORK FOR INFORMATION GATHERING.mp4 |
43.2 MB |
9. PRACTICAL USING OSINT FRAMEWORK FOR INFORMATION GATHERING.srt |
6.6 KB |
|
0.0 KB |
|
0.1 KB |
/4. DIVING DEEP INTO CYBER SECURITY/ |
|
|
10.7 MB |
|
1.8 KB |
|
15.1 MB |
|
3.6 KB |
|
46.7 MB |
|
7.3 KB |
|
17.1 MB |
|
3.2 KB |
|
2.6 KB |
|
49.8 MB |
|
9.4 KB |
|
65.1 MB |
|
8.6 KB |
|
28.1 MB |
|
6.0 KB |
|
22.8 MB |
|
4.9 KB |
|
25.3 MB |
|
7.3 KB |
|
7.5 MB |
|
3.2 KB |
|
49.3 MB |
|
10.3 KB |
|
34.0 MB |
|
4.5 KB |
|
0.6 KB |
|
2.9 MB |
|
0.7 KB |
|
38.8 MB |
|
5.9 KB |
|
42.3 MB |
|
12.9 KB |
|
11.8 MB |
|
2.0 KB |
|
30.2 MB |
|
7.7 KB |
7. PRACTICAL INITIATING A SCAN USING USER DEFINED POLICIES.mp4 |
17.6 MB |
7. PRACTICAL INITIATING A SCAN USING USER DEFINED POLICIES.srt |
3.9 KB |
|
15.8 MB |
|
4.2 KB |
|
43.9 MB |
|
5.9 KB |
/5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/ |
|
|
7.6 MB |
|
1.1 KB |
|
39.6 MB |
|
7.7 KB |
|
62.2 MB |
|
11.6 KB |
|
48.2 MB |
|
9.2 KB |
|
85.1 MB |
|
12.7 KB |
|
2.6 KB |
|
78.0 MB |
|
9.9 KB |
|
32.8 MB |
|
10.8 KB |
|
29.5 MB |
|
6.1 KB |
|
60.4 MB |
|
7.2 KB |
19. PRACTICAL HOW TO FIND OUT USERNAMES AND PASSWORDS USING SOCIAL ENGINEERING.mp4 |
89.7 MB |
19. PRACTICAL HOW TO FIND OUT USERNAMES AND PASSWORDS USING SOCIAL ENGINEERING.srt |
12.8 KB |
|
67.6 MB |
|
11.6 KB |
20. SECTION 5 QUIZ - TYPES OF ACTORS, ATTACKS AND MALWARE.html |
0.6 KB |
|
4.3 MB |
|
0.8 KB |
|
32.9 MB |
|
5.1 KB |
|
28.5 MB |
|
6.1 KB |
|
18.5 MB |
|
4.4 KB |
|
11.8 MB |
|
4.1 KB |
|
49.8 MB |
|
9.5 KB |
|
52.6 MB |
|
8.8 KB |
|
52.0 MB |
|
8.3 KB |
/6. KEY SECURITY CONCEPTS/ |
|
|
9.1 MB |
|
1.8 KB |
|
22.9 MB |
|
3.9 KB |
|
26.8 MB |
|
4.2 KB |
|
26.4 MB |
|
5.6 KB |
|
0.6 KB |
|
2.6 KB |
|
2.2 MB |
|
0.7 KB |
2. Confidentiality - The Most Important Element of Security.mp4 |
27.5 MB |
2. Confidentiality - The Most Important Element of Security.srt |
5.2 KB |
3. Integrity, Authentication, Access Control and Non-Repudiation.mp4 |
58.6 MB |
3. Integrity, Authentication, Access Control and Non-Repudiation.srt |
10.7 KB |
|
33.6 MB |
|
6.6 KB |
|
20.8 MB |
|
6.4 KB |
|
33.5 MB |
|
6.4 KB |
|
47.2 MB |
|
12.7 KB |
|
36.6 MB |
|
5.7 KB |
|
50.9 MB |
|
13.9 KB |
/7. FIREWALLS AND ANTIVIRUS/ |
|
|
13.7 MB |
|
1.7 KB |
|
9.7 MB |
|
2.3 KB |
|
0.9 KB |
|
19.5 MB |
|
2.4 KB |
|
62.0 MB |
|
12.7 KB |
|
55.9 MB |
|
10.7 KB |
|
35.6 MB |
|
8.8 KB |
|
38.5 MB |
|
6.5 KB |
|
42.9 MB |
|
9.6 KB |
|
33.5 MB |
|
11.1 KB |
|
21.1 MB |
|
3.8 KB |
|
76.2 MB |
|
12.0 KB |
/ |
|
|
0.0 KB |
|
0.1 KB |
Total files 244 |
Copyright © 2024 FileMood.com