FileMood

Download [GigaCourse.com] Udemy - Cyber Security - Go From Zero to Hero in 9 Hours

GigaCourse com Udemy Cyber Security Go From Zero to Hero in Hours

Name

[GigaCourse.com] Udemy - Cyber Security - Go From Zero to Hero in 9 Hours

 DOWNLOAD Copy Link

Total Size

3.1 GB

Total Files

226

Hash

1F45D37C288254694CE1C839314B01419D993CAD

/0. Extras (Coupons & Freebies)/

100 % OFF Lifetime Access Coupons.url

0.1 KB

Free Udemy Coupons.url

0.1 KB

Readme.txt

1.0 KB

[GigaCourse.com].url

0.0 KB

/0. Websites You May Like/

100 % OFF Lifetime Access Coupons.url

0.1 KB

Free Udemy Coupons.url

0.1 KB

Readme.txt

1.0 KB

[GigaCourse.com].url

0.0 KB

/1. BASICS OF NETWORKING/

1. ARE YOU READY.html

3.7 KB

10. BASICS OF NETWORKING Quiz 2.html

0.8 KB

11. Addressing in Computer Networks.mp4

86.4 MB

11. Addressing in Computer Networks.srt

15.5 KB

12. IP Address and IP Address Spoofing.mp4

35.2 MB

12. IP Address and IP Address Spoofing.srt

8.4 KB

13. PRACTICAL USING PING COMMAND PART 1.mp4

16.3 MB

13. PRACTICAL USING PING COMMAND PART 1.srt

3.4 KB

14. Introduction to Classes of IP Addressing.mp4

15.6 MB

14. Introduction to Classes of IP Addressing.srt

4.3 KB

15. Classes of IP Address.mp4

52.6 MB

15. Classes of IP Address.srt

9.4 KB

16. PRACTICAL USING PING COMMAND PART 2.mp4

19.8 MB

16. PRACTICAL USING PING COMMAND PART 2.srt

3.8 KB

17. The Internet Protocol (IP).mp4

30.0 MB

17. The Internet Protocol (IP).srt

7.8 KB

18. PRACTICAL HOW TO FIND OUT YOUR PC's IP & MAC ADDRESS.mp4

16.1 MB

18. PRACTICAL HOW TO FIND OUT YOUR PC's IP & MAC ADDRESS.srt

2.7 KB

19. BASICS OF NETWORKING Quiz 3.html

0.8 KB

2. Introduction.mp4

3.9 MB

2. Introduction.srt

1.4 KB

20. Address Resolution Protocol (ARP).mp4

35.6 MB

20. Address Resolution Protocol (ARP).srt

4.4 KB

21. Dynamic Host Configuration Protocol (DHCP).mp4

23.2 MB

21. Dynamic Host Configuration Protocol (DHCP).srt

5.7 KB

22. Internet Control Message Protocol (ICMP).mp4

13.1 MB

22. Internet Control Message Protocol (ICMP).srt

1.7 KB

23. RIP, OSPF and BGP Protocols.mp4

35.5 MB

23. RIP, OSPF and BGP Protocols.srt

6.8 KB

24. PRACTICAL HOW TO FIND OUT THE PATH OF DATA PACKETS USING TRACERT.mp4

5.5 MB

24. PRACTICAL HOW TO FIND OUT THE PATH OF DATA PACKETS USING TRACERT.srt

2.5 KB

25. File Transfer Protocol (FTP).mp4

19.9 MB

25. File Transfer Protocol (FTP).srt

4.4 KB

26. Domain Name System (DNS).mp4

17.1 MB

26. Domain Name System (DNS).srt

3.6 KB

27. What are Sockets.mp4

27.6 MB

27. What are Sockets.srt

7.2 KB

28. Hypertext Transfer Protocol (HTTP).mp4

25.1 MB

28. Hypertext Transfer Protocol (HTTP).srt

4.4 KB

29. Hyptertext Transfer ProtocolSecure Socket Layer (HTTPS).mp4

30.7 MB

29. Hyptertext Transfer ProtocolSecure Socket Layer (HTTPS).srt

5.6 KB

3. What is Computer Networking - Definition and Characteristics.mp4

43.9 MB

3. What is Computer Networking - Definition and Characteristics.srt

7.0 KB

30. BASICS OF NETWORKING Quiz 4.html

0.7 KB

31. Conclusion.mp4

2.3 MB

31. Conclusion.srt

0.8 KB

31.1 Atul Kahate - Cryptography and network security (2006, Tata McGraw-Hill).pdf

15.7 MB

31.2 Kurose, James F._ Ross, Keith W. - Computer networking _ a top-down approach (2017) - libgen.lc.pdf

20.9 MB

31.3 Network-Security-Essentials-4th-Edition William Stallings.pdf

3.2 MB

31.4 (McGraw-Hill Forouzan Networking) Behrouz A. Forouzan - Data Communications and Networking -McGraw-Hill Higher Education (2007).pdf

11.4 MB

4. Network Topologies.mp4

29.9 MB

4. Network Topologies.srt

10.8 KB

5. History and Applications of Computer Networking.mp4

28.7 MB

5. History and Applications of Computer Networking.srt

6.8 KB

6. Protocols and Standards.mp4

36.5 MB

6. Protocols and Standards.srt

8.9 KB

7. BASICS OF NETWORKING Quiz 1.html

0.9 KB

8. The OSI Reference Model.mp4

34.2 MB

8. The OSI Reference Model.srt

11.1 KB

9. The TCPIP Model.mp4

34.4 MB

9. The TCPIP Model.srt

10.1 KB

/2. GETTING STARTED WITH CYBER SECURITY/

1. Introduction.mp4

6.8 MB

1. Introduction.srt

1.2 KB

2. Definition of Computer Security.mp4

28.4 MB

2. Definition of Computer Security.srt

4.0 KB

3. Need of Cyber Security.mp4

29.4 MB

3. Need of Cyber Security.srt

5.3 KB

4. Interesting Facts about Cyber Security.mp4

35.1 MB

4. Interesting Facts about Cyber Security.srt

5.6 KB

5. History of Cyber Security.mp4

64.3 MB

5. History of Cyber Security.srt

9.4 KB

6. Why Should I go for Cyber Security.mp4

60.0 MB

6. Why Should I go for Cyber Security.srt

11.4 KB

7. Career and Jobs in Cyber Security.mp4

46.2 MB

7. Career and Jobs in Cyber Security.srt

10.2 KB

8. GETTING STARTED WITH CYBER SECURITY QUIZ.html

0.7 KB

9. Conclusion.mp4

3.7 MB

9. Conclusion.srt

0.7 KB

/3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/

1. Introduction.mp4

6.0 MB

1. Introduction.srt

1.5 KB

10. SECTION 3 QUIZ.html

0.6 KB

11. Conclusion.mp4

2.8 MB

11. Conclusion.srt

0.8 KB

2. Standard Definition of Cyber Security.mp4

19.9 MB

2. Standard Definition of Cyber Security.srt

3.1 KB

3. Types of Computer Security.mp4

26.3 MB

3. Types of Computer Security.srt

3.3 KB

4. Key Terms in Cyber Security.mp4

32.2 MB

4. Key Terms in Cyber Security.srt

8.2 KB

5. The Elements of Information Security.mp4

24.2 MB

5. The Elements of Information Security.srt

6.6 KB

6. Types of Attacks.mp4

45.5 MB

6. Types of Attacks.srt

13.7 KB

7. Roles in Cyber Security Part 1.mp4

51.3 MB

7. Roles in Cyber Security Part 1.srt

51.4 MB

8. Roles in Cyber Security Part 2.mp4

35.7 MB

8. Roles in Cyber Security Part 2.srt

6.4 KB

9. PRACTICAL USING OSINT FRAMEWORK FOR INFORMATION GATHERING.mp4

43.2 MB

9. PRACTICAL USING OSINT FRAMEWORK FOR INFORMATION GATHERING.srt

6.6 KB

/4. DIVING DEEP INTO CYBER SECURITY/

1. Introduction.mp4

10.7 MB

1. Introduction.srt

1.8 KB

10. Symmetric Encryption.mp4

8.1 MB

10. Symmetric Encryption.srt

3.3 KB

11. Asymmetric Encryption.mp4

11.7 MB

11. Asymmetric Encryption.srt

5.2 KB

12. Hashing.mp4

46.7 MB

12. Hashing.srt

8.6 KB

13. Security Organizations.mp4

28.1 MB

13. Security Organizations.srt

6.0 KB

14. Critical Thinking in Cyber Security.mp4

22.8 MB

14. Critical Thinking in Cyber Security.srt

4.9 KB

15. The Five Critical Thinking Skills.mp4

25.3 MB

15. The Five Critical Thinking Skills.srt

7.3 KB

16. PRACTICAL USING NSLOOKUP TOOL.mp4

7.5 MB

16. PRACTICAL USING NSLOOKUP TOOL.srt

3.2 KB

17. PRACTICAL USING NETSTAT TOOL.mp4

34.0 MB

17. PRACTICAL USING NETSTAT TOOL.srt

4.5 KB

18. SECTION 4 QUIZ - DIVING DEEP INTO CYBER SECURITY.html

0.6 KB

19. Conclusion.mp4

2.9 MB

19. Conclusion.srt

0.7 KB

2. Security Architect's View of Security.mp4

44.1 MB

2. Security Architect's View of Security.srt

10.8 KB

3. What is Vulnerability Assessment.mp4

38.8 MB

3. What is Vulnerability Assessment.srt

5.9 KB

4. 4 Phases of Vulnerability Assessment.mp4

42.3 MB

4. 4 Phases of Vulnerability Assessment.srt

12.9 KB

5. PRACTICAL DOWNLOADING NESSUS VULNERABILITY SCANNER.mp4

11.8 MB

5. PRACTICAL DOWNLOADING NESSUS VULNERABILITY SCANNER.srt

2.0 KB

6. PRACTICAL CREATING A ADVANCE NETWORK SCAN POLICY.mp4

30.2 MB

6. PRACTICAL CREATING A ADVANCE NETWORK SCAN POLICY.srt

7.7 KB

7. PRACTICAL INITIATING A SCAN USING USER DEFINED POLICIES.mp4

17.6 MB

7. PRACTICAL INITIATING A SCAN USING USER DEFINED POLICIES.srt

3.9 KB

8. PRACTICAL GOING THROUGH SCANNED RESULTS.mp4

15.8 MB

8. PRACTICAL GOING THROUGH SCANNED RESULTS.srt

4.2 KB

9. Introduction to Cryptography.mp4

35.8 MB

9. Introduction to Cryptography.srt

7.6 KB

/5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/

1. Introduction.mp4

7.6 MB

1. Introduction.srt

1.1 KB

10. Have you ever heard about a Ransomware.mp4

85.1 MB

10. Have you ever heard about a Ransomware.srt

12.7 KB

11. PRACTICAL INFORMATION GATHERING USING SHODAN.mp4

78.0 MB

11. PRACTICAL INFORMATION GATHERING USING SHODAN.srt

9.9 KB

12. The Cyber Kill Chain.mp4

32.8 MB

12. The Cyber Kill Chain.srt

10.8 KB

13. Introduction to Social Engineering.mp4

23.8 MB

13. Introduction to Social Engineering.srt

5.6 KB

14. Types of Social Engineering.mp4

52.1 MB

14. Types of Social Engineering.srt

8.0 KB

15. PRACTICAL HOW TO FIND OUT USERNAMES AND PASSWORDS USING SOCIAL ENGINEERING.mp4

89.7 MB

15. PRACTICAL HOW TO FIND OUT USERNAMES AND PASSWORDS USING SOCIAL ENGINEERING.srt

12.8 KB

16. SECTION 5 QUIZ - TYPES OF ACTORS, ATTACKS AND MALWARE.html

0.6 KB

17. Conclusion.mp4

4.3 MB

17. Conclusion.srt

0.8 KB

2. Different types of Actors in Cyber Security.mp4

67.6 MB

2. Different types of Actors in Cyber Security.srt

11.6 KB

3. Types of Cyber Attacks.mp4

32.9 MB

3. Types of Cyber Attacks.srt

5.1 KB

4. Hacking Organizations around the Globe.mp4

28.5 MB

4. Hacking Organizations around the Globe.srt

6.1 KB

5. Security Services and Mechanisms.mp4

18.5 MB

5. Security Services and Mechanisms.srt

4.4 KB

6. Introduction to Threats.mp4

11.8 MB

6. Introduction to Threats.srt

4.1 KB

7. What is a Malware.mp4

46.7 MB

7. What is a Malware.srt

9.7 KB

8. Everything about Trojans.mp4

40.1 MB

8. Everything about Trojans.srt

7.5 KB

9. Oh My God, It's the VIRUS!.mp4

30.4 MB

9. Oh My God, It's the VIRUS!.srt

8.9 KB

/6. KEY SECURITY CONCEPTS/

1. Introduction.mp4

9.1 MB

1. Introduction.srt

1.8 KB

10. The NIST Framework.mp4

22.9 MB

10. The NIST Framework.srt

3.9 KB

11. The COBIT Framework.mp4

26.8 MB

11. The COBIT Framework.srt

4.2 KB

12. Other Security Frameworks.mp4

26.4 MB

12. Other Security Frameworks.srt

5.6 KB

13. SECTION 6 QUIZ - KEY SECURITY CONCEPTS.html

0.6 KB

14. Conclusion.mp4

2.2 MB

14. Conclusion.srt

0.7 KB

2. Confidentiality - The Most Important Element of Security.mp4

27.5 MB

2. Confidentiality - The Most Important Element of Security.srt

5.2 KB

3. Integrity, Authentication, Access Control and Non-Repudiation.mp4

58.6 MB

3. Integrity, Authentication, Access Control and Non-Repudiation.srt

10.7 KB

4. Introduction to Incident Response Team.mp4

33.6 MB

4. Introduction to Incident Response Team.srt

6.6 KB

5. Phases of Incident Response.mp4

20.8 MB

5. Phases of Incident Response.srt

6.4 KB

6. Laws in Cyber Security.mp4

33.5 MB

6. Laws in Cyber Security.srt

6.4 KB

7. What are Audits in Cyber Security.mp4

47.2 MB

7. What are Audits in Cyber Security.srt

12.7 KB

8. Internal Audit vs External Audit.mp4

36.6 MB

8. Internal Audit vs External Audit.srt

5.7 KB

9. How to carry out an Internal Audit.mp4

50.9 MB

9. How to carry out an Internal Audit.srt

13.9 KB

/7. FIREWALLS AND ANTIVIRUS/

1. Introduction.mp4

13.7 MB

1. Introduction.srt

1.7 KB

10. THE FINAL QUIZ - FIREWALLS AND ANTIVIRUS.html

0.9 KB

11. CONGRATULATIONS!.mp4

19.5 MB

11. CONGRATULATIONS!.srt

2.4 KB

2. Intrusion Detection System.mp4

24.5 MB

2. Intrusion Detection System.srt

7.0 KB

3. Introduction to Firewalls.mp4

23.7 MB

3. Introduction to Firewalls.srt

5.6 KB

4. Firewall Architecture.mp4

42.3 MB

4. Firewall Architecture.srt

7.0 KB

5. What is DMZ.mp4

20.6 MB

5. What is DMZ.srt

4.5 KB

6. Different types of Firewalls.mp4

33.5 MB

6. Different types of Firewalls.srt

11.1 KB

7. The Antivirus!.mp4

21.2 MB

7. The Antivirus!.srt

3.8 KB

8. Antivirus Detection Techniques.mp4

76.2 MB

8. Antivirus Detection Techniques.srt

12.0 KB

9. Firewalls vs Antivirus.mp4

9.7 MB

9. Firewalls vs Antivirus.srt

2.3 KB

/

[GigaCourse.com].url

0.0 KB

 

Total files 226


Copyright © 2024 FileMood.com