FileMood

Download Udemy Learn Ethical Hacking and Penetration Testing

Udemy Learn Ethical Hacking and Penetration Testing

Name

Udemy Learn Ethical Hacking and Penetration Testing

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

3.0 GB

Total Files

145

Last Seen

2025-07-19 00:51

Hash

3141B58939C02A77D4E855A41F9C27975C0450F0

/Chapter 2-Getting Started with real Metasploit/

2. Using and Understanding Important Console Commands in Metasploit.mp4

126.7 MB

2. Using and Understanding Important Console Commands in Metasploit.srt

33.7 KB

3. Variables in Metasploit Framework.mp4

40.3 MB

3. Variables in Metasploit Framework.srt

14.4 KB

/Chapter 1-Understanding Metasploit Modules/

1. The mysterious working principle of Metasploit Framework.srt

21.1 KB

1. The mysterious working principle of Metasploit Framework.mp4

91.3 MB

/Chapter 3-Understanding Internet Networks/

4. The main goal and importance of Network Security.mp4

17.7 MB

4. The main goal and importance of Network Security.srt

3.5 KB

5. 3 Main Ways to Make your Network Stronger.mp4

34.0 MB

5. 3 Main Ways to Make your Network Stronger.srt

6.4 KB

6. A Chain is no stronger than its weakest link.mp4

20.4 MB

6. A Chain is no stronger than its weakest link.srt

3.9 KB

7. What is Network Maps in Cyber Security.mp4

31.3 MB

7. What is Network Maps in Cyber Security.srt

5.5 KB

8. What is network protocol and what it does.mp4

18.3 MB

8. What is network protocol and what it does.srt

5.7 KB

9. Layers of TCPIP Model.mp4

18.2 MB

9. Layers of TCPIP Model.srt

5.6 KB

10. How emails sent and received over internet.mp4

9.0 MB

10. How emails sent and received over internet.srt

3.3 KB

11. PDU Explained.mp4

34.5 MB

11. PDU Explained.srt

6.7 KB

12. Basic Use of Switch and Data Transmission.mp4

23.9 MB

12. Basic Use of Switch and Data Transmission.srt

6.3 KB

13. 2 Networks Talking with Router in Middle.mp4

17.3 MB

13. 2 Networks Talking with Router in Middle.srt

5.6 KB

14. Main Guidelines for Network Security.mp4

45.2 MB

14. Main Guidelines for Network Security.srt

8.5 KB

15. Analysis to Consider and Action Priority.mp4

39.8 MB

15. Analysis to Consider and Action Priority.srt

7.4 KB

16. Threat Modeling.mp4

67.8 MB

16. Threat Modeling.srt

12.6 KB

/Chapter 4-Understanding Linux Commands and Terminal/

17. Understanding Linux Commands and Pipes.mp4

31.5 MB

17. Understanding Linux Commands and Pipes.srt

9.9 KB

18. What is a Command.mp4

12.5 MB

18. What is a Command.srt

4.2 KB

19. Pipeline example #1.mp4

36.6 MB

19. Pipeline example #1.srt

13.5 KB

20. Weird LS Command.mp4

18.6 MB

20. Weird LS Command.srt

4.6 KB

21. Different Linux Commands using with Pipe.mp4

42.1 MB

21. Different Linux Commands using with Pipe.srt

14.8 KB

22. Understanding key concepts.mp4

41.3 MB

22. Understanding key concepts.srt

9.5 KB

23. Finding Helpful manuals.mp4

43.2 MB

23. Finding Helpful manuals.srt

8.9 KB

24. Linux Directories.mp4

21.7 MB

24. Linux Directories.srt

7.0 KB

25. Linux Directories - Part 2.mp4

24.0 MB

25. Linux Directories - Part 2.srt

7.2 KB

/Chapter 5-Exploring Linux Shell and System Components/

26. The bridge between You and Shell.mp4

38.3 MB

26. The bridge between You and Shell.srt

10.7 KB

27. LS Command.mp4

10.8 MB

27. LS Command.srt

0.0 KB

28. RD vs APD.mp4

31.4 MB

28. RD vs APD.srt

13.8 KB

29. Filtering LS.mp4

36.8 MB

29. Filtering LS.srt

10.1 KB

30. CP Command.mp4

28.6 MB

30. CP Command.srt

9.3 KB

31. Tab Auto-completion.mp4

14.7 MB

31. Tab Auto-completion.srt

4.3 KB

32. SYM AND HRD Link Files.mp4

50.0 MB

32. SYM AND HRD Link Files.srt

17.1 KB

33. Manipulating Files.mp4

23.4 MB

33. Manipulating Files.srt

8.6 KB

34. Introduction to Shell and Expansion.mp4

24.1 MB

34. Introduction to Shell and Expansion.srt

8.9 KB

35. Arithmetic Expressions with Shell.mp4

16.7 MB

35. Arithmetic Expressions with Shell.srt

4.9 KB

36. Automating Folder Creation with Shell.mp4

36.6 MB

36. Automating Folder Creation with Shell.srt

10.4 KB

37. Quoting in Shell.mp4

40.7 MB

37. Quoting in Shell.srt

13.2 KB

/Chapter 6-Permissions and Processes in Linux/

38. Introduction to Permissions in Linux.mp4

16.1 MB

38. Introduction to Permissions in Linux.srt

6.2 KB

39. Differences between UID, GID and Shadow.mp4

25.3 MB

39. Differences between UID, GID and Shadow.srt

7.3 KB

40. File and Dir Permissions.mp4

51.0 MB

40. File and Dir Permissions.srt

10.3 KB

41. Examples with File Permissions.mp4

16.5 MB

41. Examples with File Permissions.srt

5.9 KB

42. After this video you--'ll understand all LINUX Permissions.mp4

86.4 MB

42. After this video you--'ll understand all LINUX Permissions.srt

26.3 KB

43. Chmod.mp4

59.4 MB

43. Chmod.srt

15.3 KB

/Extra_Files/

A4.txt

0.7 KB

/Chapter 7-Process Management in Linux/

44. Fundamentals of Processes in System.mp4

37.5 MB

44. Fundamentals of Processes in System.srt

9.1 KB

45. The Magic with PS Aux Command.mp4

55.1 MB

45. The Magic with PS Aux Command.srt

10.5 KB

46. The Magic with TOP Command.mp4

57.4 MB

46. The Magic with TOP Command.srt

11.0 KB

47. Foreground and Background Processes.mp4

29.1 MB

47. Foreground and Background Processes.srt

11.0 KB

48. From Background to Foreground.mp4

14.5 MB

48. From Background to Foreground.srt

6.2 KB

49. The Tutorial with Linux Process Signals.mp4

51.2 MB

49. The Tutorial with Linux Process Signals.srt

16.7 KB

50. Introduction to Packet Management Systems.mp4

23.5 MB

50. Introduction to Packet Management Systems.srt

6.6 KB

51. Why we need package management tools.mp4

20.3 MB

51. Why we need package management tools.srt

9.0 KB

52. Package Management in Linux - Final.mp4

50.1 MB

52. Package Management in Linux - Final.srt

11.0 KB

/Chapter 8-Networking in Linux/

53. Trcrt command.mp4

40.1 MB

53. Trcrt command.srt

11.4 KB

54. Networking with Linux.mp4

32.1 MB

54. Networking with Linux.srt

10.0 KB

/Chapter 9-Starting with Network Security and Networks Penetration Tests/

55. What is Wireshark and What you--'ll learn in this section.mp4

12.0 MB

55. What is Wireshark and What you--'ll learn in this section.srt

2.4 KB

56. Introduction to Interface and Important Shortcuts.mp4

75.9 MB

56. Introduction to Interface and Important Shortcuts.srt

14.1 KB

57. The Importance of Promiscous Mode.mp4

24.4 MB

57. The Importance of Promiscous Mode.srt

6.3 KB

58. Displaying the Captured Data and Plugins.mp4

65.6 MB

58. Displaying the Captured Data and Plugins.srt

11.2 KB

59. Learning Key Concepts and Tools.mp4

46.7 MB

59. Learning Key Concepts and Tools.srt

18.9 KB

60. IDS, ACL and Firewalls.mp4

18.0 MB

60. IDS, ACL and Firewalls.srt

4.6 KB

61. Starting to Capture Traffic with Wireshark and Live Filters.mp4

94.5 MB

61. Starting to Capture Traffic with Wireshark and Live Filters.srt

17.3 KB

62. Understanding Signal Types.mp4

30.8 MB

62. Understanding Signal Types.srt

7.6 KB

63. Beginning to use Wireshark Display Filters.mp4

78.3 MB

63. Beginning to use Wireshark Display Filters.srt

13.7 KB

64. Learning TCP States.mp4

11.7 MB

64. Learning TCP States.srt

5.5 KB

/Chapter 10-Vulnerability Assessment and Information Gathering with Metasploit/

65. Information Gathering on TCP and UDP Protocols using Metasploit.mp4

78.2 MB

65. Information Gathering on TCP and UDP Protocols using Metasploit.srt

17.9 KB

66. Two Methods to Hack Into FTP Servers.mp4

93.7 MB

66. Two Methods to Hack Into FTP Servers.srt

16.0 KB

67. Information Gathering and Finding Exploits of SMB.mp4

44.3 MB

67. Information Gathering and Finding Exploits of SMB.srt

9.6 KB

68. Finding Vulnerabilities in PHP and Apache.mp4

65.4 MB

68. Finding Vulnerabilities in PHP and Apache.srt

14.5 KB

69. SSH User Enumeration.mp4

59.7 MB

69. SSH User Enumeration.srt

10.3 KB

70. Brute Forcing SSH and Information Gathering.mp4

67.8 MB

70. Brute Forcing SSH and Information Gathering.srt

10.9 KB

/Chapter 11-Penetration testing on Industrial Control System (ICS Pentest)/

71. Creating Pentest Lab for Industrial Control Systems.mp4

121.6 MB

71. Creating Pentest Lab for Industrial Control Systems.srt

27.6 KB

72. Pentesting Industrial Control Systems.mp4

115.8 MB

72. Pentesting Industrial Control Systems.srt

20.0 KB

 

Total files 145


Copyright © 2025 FileMood.com