FileMood

Download [FreeAllCourse.Com] Udemy - Cyber Security - Go From Zero to Hero (2020)

FreeAllCourse Com Udemy Cyber Security Go From Zero to Hero 2020

Name

[FreeAllCourse.Com] Udemy - Cyber Security - Go From Zero to Hero (2020)

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

2.7 GB

Total Files

172

Hash

09C737EF475C1138C0BF5F582113BA0A46E41EBF

/5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/

19. PRACTICAL HOW TO FIND OUT USERNAMES AND PASSWORDS USING SOCIAL ENGINEERING.mp4

89.7 MB

1. Introduction.mp4

7.6 MB

1. Introduction.srt

1.1 KB

2. Different types of Actors in Cyber Security.mp4

67.6 MB

2. Different types of Actors in Cyber Security.srt

11.6 KB

3. Types of Cyber Attacks.mp4

32.9 MB

3. Types of Cyber Attacks.srt

5.1 KB

4. Hacking Organizations around the Globe.mp4

28.5 MB

4. Hacking Organizations around the Globe.srt

6.1 KB

5. Security Services and Mechanisms.mp4

18.5 MB

5. Security Services and Mechanisms.srt

4.4 KB

6. Introduction to Threats.mp4

11.8 MB

6. Introduction to Threats.srt

4.1 KB

7. What is a Malware.mp4

49.8 MB

7. What is a Malware.srt

9.5 KB

8. Everything about Trojans.mp4

52.6 MB

8. Everything about Trojans.srt

8.8 KB

9. Types of Trojans.mp4

52.0 MB

9. Types of Trojans.srt

8.3 KB

10. OH MY GOD! VIRUS!!.mp4

39.6 MB

10. OH MY GOD! VIRUS!!.srt

7.7 KB

11. Types of Virus.mp4

62.2 MB

11. Types of Virus.srt

11.6 KB

12. You should defend yourself!.mp4

48.2 MB

12. You should defend yourself!.srt

9.2 KB

13. Have you ever heard about a Ransomware.mp4

85.1 MB

13. Have you ever heard about a Ransomware.srt

12.7 KB

14. IMPORTANT!.html

2.6 KB

15. PRACTICAL INFORMATION GATHERING USING SHODAN.mp4

78.0 MB

15. PRACTICAL INFORMATION GATHERING USING SHODAN.srt

9.9 KB

16. The Cyber Kill Chain.mp4

32.8 MB

16. The Cyber Kill Chain.srt

10.8 KB

17. Introduction to Social Engineering.mp4

29.5 MB

17. Introduction to Social Engineering.srt

6.1 KB

18. Types of Social Engineering.mp4

60.4 MB

18. Types of Social Engineering.srt

7.2 KB

19. PRACTICAL HOW TO FIND OUT USERNAMES AND PASSWORDS USING SOCIAL ENGINEERING.srt

12.8 KB

20. SECTION 5 QUIZ - TYPES OF ACTORS, ATTACKS AND MALWARE.html

0.6 KB

21. Conclusion.mp4

4.3 MB

21. Conclusion.srt

0.8 KB

/

Verify Files.txt

1.1 KB

[FreeAllCourse.Com].url

0.1 KB

/2. GETTING STARTED WITH CYBER SECURITY/

1. Definition of Computer Security.mp4

29.8 MB

1. Definition of Computer Security.srt

4.0 KB

2. Interesting Facts about Cyber Security.mp4

44.9 MB

2. Interesting Facts about Cyber Security.srt

5.4 KB

3. Have a look at this!.mp4

12.3 MB

3. Have a look at this!.srt

0.8 KB

4. History of Cyber Security.mp4

63.0 MB

4. History of Cyber Security.srt

7.4 KB

5. Scope and Career Insights in Cyber Security.mp4

50.6 MB

5. Scope and Career Insights in Cyber Security.srt

10.9 KB

5.1 How to Become a Cyber Security Professional.html

0.1 KB

6. GETTING STARTED WITH CYBER SECURITY QUIZ.html

0.7 KB

7. DID YOU RATE.html

2.6 KB

8. Conclusion.mp4

3.8 MB

8. Conclusion.srt

0.7 KB

/3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/

1. Introduction.mp4

6.0 MB

1. Introduction.srt

1.5 KB

2. Standard Definition of Cyber Security.mp4

19.9 MB

2. Standard Definition of Cyber Security.srt

3.1 KB

3. Types of Computer Security.mp4

26.3 MB

3. Types of Computer Security.srt

3.3 KB

4. Key Terms in Cyber Security.mp4

32.2 MB

4. Key Terms in Cyber Security.srt

8.2 KB

5. The Elements of Information Security.mp4

24.2 MB

5. The Elements of Information Security.srt

6.6 KB

6. Types of Attacks.mp4

45.5 MB

6. Types of Attacks.srt

13.7 KB

7. Roles in Cyber Security Part 1.mp4

51.3 MB

7. Roles in Cyber Security Part 1.srt

9.8 KB

8. Roles in Cyber Security Part 2.mp4

35.7 MB

8. Roles in Cyber Security Part 2.srt

6.4 KB

9. PRACTICAL USING OSINT FRAMEWORK FOR INFORMATION GATHERING.mp4

43.2 MB

9. PRACTICAL USING OSINT FRAMEWORK FOR INFORMATION GATHERING.srt

6.6 KB

10. SECTION 3 QUIZ.html

0.6 KB

11. We value your feedback!.html

2.6 KB

12. Conclusion.mp4

2.7 MB

12. Conclusion.srt

0.8 KB

/4. DIVING DEEP INTO CYBER SECURITY/

1. Introduction.mp4

10.7 MB

1. Introduction.srt

1.8 KB

2. Security Architect's View of Security.mp4

49.3 MB

2. Security Architect's View of Security.srt

10.3 KB

3. What is Vulnerability Assessment.mp4

38.8 MB

3. What is Vulnerability Assessment.srt

5.9 KB

4. 4 Phases of Vulnerability Assessment.mp4

42.3 MB

4. 4 Phases of Vulnerability Assessment.srt

12.9 KB

5. PRACTICAL DOWNLOADING NESSUS VULNERABILITY SCANNER.mp4

11.8 MB

5. PRACTICAL DOWNLOADING NESSUS VULNERABILITY SCANNER.srt

2.0 KB

6. PRACTICAL CREATING A ADVANCE NETWORK SCAN POLICY.mp4

30.2 MB

6. PRACTICAL CREATING A ADVANCE NETWORK SCAN POLICY.srt

7.7 KB

7. PRACTICAL INITIATING A SCAN USING USER DEFINED POLICIES.mp4

17.6 MB

7. PRACTICAL INITIATING A SCAN USING USER DEFINED POLICIES.srt

3.9 KB

8. PRACTICAL GOING THROUGH SCANNED RESULTS.mp4

15.8 MB

8. PRACTICAL GOING THROUGH SCANNED RESULTS.srt

4.2 KB

9. Introduction to Cryptography.mp4

43.9 MB

9. Introduction to Cryptography.srt

5.9 KB

10. Symmetric Encryption.mp4

15.1 MB

10. Symmetric Encryption.srt

3.6 KB

11. AES and DES.mp4

46.7 MB

11. AES and DES.srt

7.3 KB

12. Asymmetric Encryption.mp4

17.1 MB

12. Asymmetric Encryption.srt

3.2 KB

13. Hey there! Support We Secure..html

2.6 KB

14. RSA & Diffie Hellman.mp4

49.8 MB

14. RSA & Diffie Hellman.srt

9.4 KB

15. Hashing.mp4

65.1 MB

15. Hashing.srt

8.6 KB

16. Security Organizations.mp4

28.1 MB

16. Security Organizations.srt

6.0 KB

17. Critical Thinking in Cyber Security.mp4

22.8 MB

17. Critical Thinking in Cyber Security.srt

4.9 KB

18. The Five Critical Thinking Skills.mp4

25.3 MB

18. The Five Critical Thinking Skills.srt

7.3 KB

19. PRACTICAL USING NSLOOKUP TOOL.mp4

7.5 MB

19. PRACTICAL USING NSLOOKUP TOOL.srt

3.2 KB

20. PRACTICAL USING NETSTAT TOOL.mp4

34.0 MB

20. PRACTICAL USING NETSTAT TOOL.srt

4.5 KB

21. SECTION 4 QUIZ - DIVING DEEP INTO CYBER SECURITY.html

0.6 KB

22. Conclusion.mp4

2.9 MB

22. Conclusion.srt

0.7 KB

/6. KEY SECURITY CONCEPTS/

1. Introduction.mp4

9.1 MB

1. Introduction.srt

1.8 KB

2. Confidentiality - The Most Important Element of Security.mp4

27.5 MB

2. Confidentiality - The Most Important Element of Security.srt

5.2 KB

3. Integrity, Authentication, Access Control and Non-Repudiation.mp4

58.6 MB

3. Integrity, Authentication, Access Control and Non-Repudiation.srt

10.7 KB

4. Introduction to Incident Response Team.mp4

33.6 MB

4. Introduction to Incident Response Team.srt

6.6 KB

5. Phases of Incident Response.mp4

20.8 MB

5. Phases of Incident Response.srt

6.4 KB

6. Laws in Cyber Security.mp4

33.5 MB

6. Laws in Cyber Security.srt

6.4 KB

7. What are Audits in Cyber Security.mp4

47.2 MB

7. What are Audits in Cyber Security.srt

12.7 KB

8. Internal Audit vs External Audit.mp4

36.6 MB

8. Internal Audit vs External Audit.srt

5.7 KB

9. How to carry out an Internal Audit.mp4

50.9 MB

9. How to carry out an Internal Audit.srt

13.9 KB

10. The NIST Framework.mp4

22.9 MB

10. The NIST Framework.srt

3.9 KB

11. The COBIT Framework.mp4

26.8 MB

11. The COBIT Framework.srt

4.2 KB

12. Other Security Frameworks.mp4

26.4 MB

12. Other Security Frameworks.srt

5.6 KB

13. SECTION 6 QUIZ - KEY SECURITY CONCEPTS.html

0.6 KB

14. Leave a Rating!.html

2.6 KB

15. Conclusion.mp4

2.2 MB

15. Conclusion.srt

0.7 KB

/7. FIREWALLS AND ANTIVIRUS/

1. Introduction.mp4

13.7 MB

1. Introduction.srt

1.7 KB

2. Intrusion Detection System.mp4

62.0 MB

2. Intrusion Detection System.srt

12.7 KB

3. Introduction to Firewalls.mp4

55.9 MB

3. Introduction to Firewalls.srt

10.7 KB

4. IDS evasion techniques.mp4

35.6 MB

4. IDS evasion techniques.srt

8.8 KB

5. What is DMZ.mp4

38.5 MB

5. What is DMZ.srt

6.5 KB

6. Firewall evasion techniques.mp4

42.9 MB

6. Firewall evasion techniques.srt

9.6 KB

7. Different types of Firewalls.mp4

33.5 MB

7. Different types of Firewalls.srt

11.1 KB

8. The Antivirus!.mp4

21.1 MB

8. The Antivirus!.srt

3.8 KB

9. Antivirus Detection Techniques.mp4

76.2 MB

9. Antivirus Detection Techniques.srt

12.0 KB

10. Firewalls vs Antivirus.mp4

9.7 MB

10. Firewalls vs Antivirus.srt

2.3 KB

11. THE FINAL QUIZ - FIREWALLS AND ANTIVIRUS.html

0.9 KB

12. CONGRATULATIONS!.mp4

19.5 MB

12. CONGRATULATIONS!.srt

2.4 KB

 

Total files 172


Copyright © 2025 FileMood.com