FileMood

Download [UdemyCourseDownloader] The Complete Cyber Security Course Hackers Exposed!

UdemyCourseDownloader The Complete Cyber Security Course Hackers Exposed

Name

[UdemyCourseDownloader] The Complete Cyber Security Course Hackers Exposed!

 DOWNLOAD Copy Link

Total Size

3.5 GB

Total Files

119

Hash

D26149BA90C8FEF99508E9899805247421B171B5

/03 Know Your Enemy - The Current Threat and Vulnerability Landscape/

028 Regulating encryption mandating insecurity legalizing spying.mp4

205.5 MB

015 Goals and Learning Objectives.mp4

3.0 MB

016 Why You Need Security The Value Of A Hack.mp4

77.2 MB

017 The Top 3 Things You Need To Stay Safe Online.mp4

3.5 MB

018 Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4

60.6 MB

019 Hackers crackers and cyber criminals.mp4

19.8 MB

020 Malware viruses rootkits and RATs.mp4

40.9 MB

021 Spyware Adware Scareware PUPs Browser hijacking.mp4

20.4 MB

022 What is Phishing Vishing and SMShing.mp4

57.1 MB

023 Spamming Doxing.mp4

9.0 MB

024 Social engineering - Scams cons tricks and fraud.mp4

18.8 MB

025 Darknets Dark Markets and Exploit kits.mp4

162.6 MB

026 Governments spies and secret stuff part I.mp4

92.9 MB

027 Governments spies and secret stuff part II.mp4

74.9 MB

029 Trust Backdoors.mp4

60.2 MB

030 Censorship.mp4

9.5 MB

031 Security News and Alerts Stay Informed.mp4

2.1 MB

/

udemycoursedownloader.com.url

0.1 KB

Udemy Course downloader.txt

0.1 KB

/01 Introduction/

001 Welcome and Introduction to the Instructor.mp4

18.0 MB

002 Security Quick Win.mp4

49.0 MB

003 Goals and Learning Objectives - Volume 1.mp4

9.5 MB

004 Target Audience.mp4

7.7 MB

005 Study Recommendations.mp4

29.2 MB

006 Course updates.mp4

2.7 MB

/02 know Yourself - The Threat and Vulnerability Landscape/

007 Goals and Learning Objectives.mp4

2.8 MB

008 Protect What You Value.mp4

4.7 MB

009 What is Privacy Anonymity and Pseudonymity.mp4

12.5 MB

010 Security Vulnerabilities Threats and Adversaries.mp4

12.4 MB

011 Threat Modeling and Risk Assessments.mp4

20.8 MB

012 Security vs Privacy vs Anonymity - Can we have it all.mp4

5.9 MB

013 Defense In Depth.mp4

2.7 MB

014 The Zero Trust Model.mp4

12.8 MB

/.../010 Security Vulnerabilities Threats and Adversaries/

The-Cyber-Security-Landscape-Diagram.jpg

795.8 KB

/04 Encryption Crash Course/

032 Goals and Learning Objectives.mp4

1.7 MB

033 Symmetric Encryption.mp4

54.9 MB

034 Asymmetric Encryption.mp4

28.7 MB

035 Hash Functions.mp4

39.0 MB

036 Digital Signatures.mp4

25.3 MB

037 Secure Sockets Layer SSL and Transport layer security TLS.mp4

92.6 MB

038 SSL Stripping.mp4

41.0 MB

039 HTTPS HTTP Secure.mp4

45.4 MB

040 Digital Certificates.mp4

24.7 MB

041 Certificate Authorities and HTTPS.mp4

62.6 MB

042 End-to-End Encryption E2EE.mp4

3.9 MB

043 Steganography.mp4

59.8 MB

044 How Security and Encryption is Really Attacked.mp4

7.1 MB

/05 Setting up a Testing Environment Using Virtual Machines/

045 Goals and Learning Objectives.mp4

1.9 MB

046 Introduction to Setting up a Testing Environment Using Virtual Machines.mp4

50.3 MB

047 Vmware.mp4

43.7 MB

048 Virtual box.mp4

51.3 MB

049 Kali Linux 2016.mp4

18.9 MB

/06 Operating System Security Privacy Windows vs Mac OS X vs Linux/

050 Goals and Learning Objectives.mp4

2.5 MB

051 Security Features and Functionality.mp4

11.1 MB

052 Security Bugs and Vulnerabilities.mp4

23.1 MB

053 Usage Share.mp4

16.1 MB

054 Windows 10 - Privacy Tracking.mp4

47.4 MB

055 Windows 10 - Disable tracking automatically.mp4

23.6 MB

056 Windows 10 - Tool Disable Windows 10 Tracking.mp4

56.2 MB

057 Windows 10 Cortana.mp4

5.5 MB

058 Windows 10 Privacy Settings.mp4

23.7 MB

059 Windows 10 - WiFi Sense.mp4

18.3 MB

060 Windows 7 8 and 8.1 - Privacy Tracking.mp4

45.8 MB

061 Mac - Privacy Tracking.mp4

44.3 MB

062 Linux and Unix like Operating systems.mp4

20.8 MB

063 Linux - Debian.mp4

2.5 MB

064 Linux - Debian 8 Jessie - Virtual box guest additions Issue.mp4

38.4 MB

065 Linux - OpenBSD and Archlinux.mp4

13.2 MB

066 Linux - Ubuntu.mp4

2.8 MB

/07 Security Bugs and Vulnerabilities/

067 Goals and Learning Objectives.mp4

1.7 MB

068 The Importance of Patching.mp4

12.2 MB

069 Windows 7 - Auto Update.mp4

5.2 MB

070 Windows 8 8.1 - Auto Update.mp4

6.9 MB

071 Windows 10 - Auto Update.mp4

5.2 MB

072 Windows - Criticality and Patch Tuesday.mp4

43.8 MB

073 Windows 7 8 8.1 10 - Automate the pain away from patching.mp4

20.3 MB

074 Linux - Debian - Patching.mp4

40.4 MB

075 Mac - Patching.mp4

58.3 MB

076 Firefox - Browser and extension updates.mp4

35.7 MB

077 Chrome - Browser and extension updates.mp4

3.7 MB

078 IE and Edge - Browser and extention updates.mp4

5.9 MB

079 Auto updates - The Impact to privacy and anonymity.mp4

4.5 MB

/08 Reducing Threat Privilege/

080 Goals and Learning Objectives Removing Privilege.mp4

14.2 MB

081 Windows 7 - Not using admin.mp4

11.5 MB

082 Windows 8 and 8.1 - Not using admin.mp4

19.1 MB

083 Windows 10 - Not using admin.mp4

14.8 MB

/09 Social Engineering and Social Media Offence and Defence/

084 Goals and Learning Objectives.mp4

1.8 MB

085 Information Disclosure and Identity Strategies for Social Media.mp4

87.9 MB

086 Identify Verification and Registration.mp4

24.5 MB

087 Behavioural Security Controls Against Social Threats Phishing Spam Part 1.mp4

24.4 MB

088 Behavioural Security Controls Against Social Threats Phishing Spam Part 2.mp4

51.7 MB

089 Technical Security Controls Against Social Threats Phishing Spam Scam Cons.mp4

15.2 MB

/10 Security Domains/

090 Goals and Learning Objectives.mp4

1.5 MB

091 Security Domains.mp4

22.9 MB

/11 Security Through Isolation and Compartmentalization/

092 Goals and Learning Objectives.mp4

2.4 MB

093 Introduction to Isolation and Compartmentalization.mp4

5.9 MB

094 Physical and Hardware Isolation - How to change the Mac Address.mp4

26.8 MB

095 Physical and Hardware Isolation - Hardware Serials.mp4

52.7 MB

096 Virtual Isolation.mp4

60.1 MB

097 Dual Boot.mp4

8.3 MB

098 Built-in Sandboxes and Application Isolation.mp4

10.9 MB

099 Windows - Sandboxes and Application Isolation.mp4

27.6 MB

100 Windows - Sandboxes and Application Isolation - Sandboxie.mp4

73.5 MB

101 Linux - Sandboxes and Application Isolation.mp4

14.5 MB

102 Mac - Sandboxes and Application Isolation.mp4

24.9 MB

103 Virtual Machines.mp4

46.6 MB

104 Virtual Machine Weaknesses.mp4

23.8 MB

105 Virtual Machine Hardening.mp4

38.8 MB

106 Whonix OS - Anonymous Operating system.mp4

92.9 MB

107 Whonix OS - Weaknesses.mp4

16.5 MB

108 Qubes OS.mp4

82.5 MB

109 Security Domains Isolation and Compartmentalization.mp4

15.7 MB

/12 Wrap Up/

110 Congratulations.mp4

5.5 MB

111 Certificate Of Completion for CPEs.mp4

2.3 MB

112 Router Vulnerability Scanning Shodan Qualys.mp4

50.4 MB

113 Password cracking part 2.mp4

25.3 MB

114 Bypassing firewalls and HTTP proxies part 3.mp4

33.3 MB

115 Email clients protocols and authentication.mp4

40.0 MB

/13 BONUS Section/

116 BONUS DISCOUNT COUPONS.html

5.8 KB

 

Total files 119


Copyright © 2024 FileMood.com