FileMood

Download [ DevCourseWeb.com ] Udemy - Cybersecurity and Kali Linux - Hands-on course by TechLatest

DevCourseWeb com Udemy Cybersecurity and Kali Linux Hands on course by TechLatest

Name

[ DevCourseWeb.com ] Udemy - Cybersecurity and Kali Linux - Hands-on course by TechLatest

 DOWNLOAD Copy Link

Total Size

2.6 GB

Total Files

43

Last Seen

2024-11-06 00:14

Hash

4E66578F79F246C12DC73FEBB0F375A362421A81

/

Get Bonus Downloads Here.url

0.2 KB

/.../1. Module 1 - Course Introduction & Teaser/

1. Kali Linux & Cybersecurity Course Trailer.mp4

7.6 MB

2. Course Introduction.mp4

28.4 MB

/.../10. Module 10 - Communicating Findings Reporting Mastery/

1. Reporting Introduction.mp4

2.0 MB

2. Reporting Practical + Conclusion.mp4

283.4 MB

/.../2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/

1. Amazon Web Services(AWS) Guide..mp4

46.0 MB

1.1 How to Install Browser-Based Kali Linux with 2500+ security apps On Amazon Web Services(AWS).html

0.2 KB

2. Google Cloud Platform(GCP) Guide..mp4

47.9 MB

2.1 How to Install Browser Based Kali Linux with 2500+ security apps on Google Cloud Platform(GCP).html

0.2 KB

3. Microsoft Azure Guide..mp4

54.4 MB

3.1 How to Install Browser-Based Kali Linux with 2500+ security apps From Azure Marketplace..html

0.2 KB

/.../3. Module 3 - Target Discovery The Reconnaissance Art/

1. Reconnaissance — First Phase of Hacking.mp4

30.0 MB

1.1 Reconnaissance — First Phase of Hacking.html

0.1 KB

2. Open Source Intelligence(OSINT).mp4

9.5 MB

2.1 Open Source Intelligence(OSINT).html

0.1 KB

3. Social Media Reconnaissance.mp4

142.0 MB

3.1 Social Media Reconnaissance.html

0.1 KB

4. Unveiling the Secrets of OS Fingerprinting in Cybersecurity with Kali Linux.mp4

44.7 MB

4.1 Unveiling the Secrets of OS Fingerprinting in Cybersecurity with Kali Linux.html

0.2 KB

5. Target Validation in Cybersecurity with Kali Linux.mp4

39.9 MB

5.1 Target Validation in Cybersecurity with Kali Linux.html

0.2 KB

6. Subdomain Discovery in Cybersecurity with Kali Linux.mp4

24.5 MB

6.1 Subdomain Discovery in Cybersecurity with Kali Linux.html

0.2 KB

/.../4. Module 4 - Infiltration Techniques Mastering Active Reconnaissance/

1. Active Reconnaissance Introduction.mp4

1.9 MB

2. Vulnerability Assessment.mp4

121.4 MB

3. Scanning.mp4

44.9 MB

4. Conclusion.mp4

910.1 KB

/.../5. Module 5 - Hacking Mastery Strategic Exploitation/

1. Exploitation Introduction.mp4

84.3 MB

2. Exploitation Practical.mp4

222.1 MB

3. Exploitation Conclusion.mp4

1.2 MB

/.../6. Module 6 - Crack the Code Password Mastery/

1. Password Cracking Introduction.mp4

48.2 MB

2. Password Cracking Practical.mp4

265.1 MB

3. Password Cracking Conclusion.mp4

859.8 KB

/.../7. Module 7 - Wireless Fortification Pentesting Mastery/

1. Web App Pentesting Introduction.mp4

2.7 MB

2. Web App Pentesting Practical.mp4

636.4 MB

3. Web App Pentesting Conclusion.mp4

1.4 MB

/.../8. Module 8 - Wireless Fortification Pentesting Mastery/

1. Wireless Pentesting Introduction.mp4

24.5 MB

2. Wireless Pentesting Practical.mp4

194.1 MB

3. Wireless Pentesting Conclusion.mp4

1.3 MB

/.../9. Module 9 - Human Manipulation Social Engineering/

1. Social Engineering Introduction.mp4

6.2 MB

2. Social Engineering Practical.mp4

198.1 MB

3. Social Engineering Conclusion.mp4

733.7 KB

/~Get Your Files Here !/

Bonus Resources.txt

0.4 KB

 

Total files 43


Copyright © 2024 FileMood.com