Udemy - Master Cybersecurity,Ethical Hacking and Penetrating Testing (Updated 09 - 2021)
Udemy - Master Cybersecurity,Ethical Hacking and Penetrating Testing (Updated 09 - 2021)
Master Cybersecurity,Ethical Hacking and Penetrating Testing (Updated 09/2021) MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + srt | Duration: 32 lectures (3h 57m) | Size: 2.1 GB
Become a Cyber Security, Ethical Hacking And Penetrating Testing Specialist, Learn How to Stop Hackers, Prevent Hacking
What you'll learn:
Intrduction to Cybersecurity,Ethical Hacking And Penetrating Testing
What is Cybersecurity?
What is Ethical Hacking?
What is Penetrating Testing?
Difference Between Penetrating Testing and Ethical Hacking
Purpose of Studying Ethical Hacking and Penetrating Testing
Scope For Ethical Hackers and Penetrating Testers
Requirements
Mac / Windows / Linux - all operating systems work with this course!
No previous programming knowledge required!
A basic understanding of using operating systems, networks, and the Internet. Be able to download and install software. A willingness to learn.
Description
Description
This course is focused on learning by doing. We are going to teach you how penetration testing works, by actually practicing the techniques and methods used by bug bounty hunters today. We will start off by creating our virtual hacking lab to make sure we keep your computers safe throughout the course, as well as doing things legally, and having our computers set up for penetrations testing. You Will also:
169
Other /Tutorials
2.5 GB
[ FreeCourseWeb.com ] Udemy - Master Cybersecurity,Ethical Hacking and Penetrating Testing (Updated 09 - 2021)
Get Bonus Downloads Here.url (0.2 KB)
~Get Your Files Here !
1. Introduction
1. Who Am I.mp4 (6.6 MB)
1. Who Am I.srt (1.6 KB)
2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing
1. What is Cybersecurity .mp4 (33.2 MB)
1. What is Cybersecurity .srt (4.9 KB)
10. Closure.mp4 (22.5 MB)
10. Closure.srt (3.3 KB)
11. Setting up Labs.mp4 (161.7 MB)
11. Setting up Labs.srt (22.7 KB)
2. What is Ethical Hacking .srt (3.7 KB)
2. What is Ethical Hacking.mp4 (5.7 MB)
3. What is Penetrating Testing .mp4 (15.0 MB)
3. What is Penetrating Testing .srt (2.3 KB)
4. Difference Between Ethical Hacking and Penetrating Testing.mp4 (13.6 MB)
4. Difference Between Ethical Hacking and Penetrating Testing.srt (2.4 KB)
5. Purpose of Studying Ethical Hacking and Penetrating Testing.mp4 (23.2 MB)
5. Purpose of Studying Ethical Hacking and Penetrating Testing.srt (2.9 KB)
6. Scope For Ethical Hackers and Penetrating Testers.mp4 (17.7 MB)
6. Scope For Ethical Hackers and Penetrating Testers.srt (2.4 KB)
7. Do Ethical Hackers And Penetrating Testers Need Permission.mp4 (6.2 MB)
7. Do Ethical Hackers And Penetrating Testers Need Permission.srt (0.8 KB)
8. Who Conduct it .mp4 (25.2 MB)
8. Who Conduct it .srt (3.1 KB)
9. Who should You Choose .mp4 (19.6 MB)
9. Who should You Choose .srt (2.2 KB)
3. Exposing Hackers - Know Yourself
1. Goals and Learning Objectives.mp4 (18.8 MB)
1. Goals and Learning Objectives.srt (1.1 KB)
10. Zero Trust Model.mp4 (81.7 MB)
10. Zero Trust Model.srt (7.0 KB)
2. Protect What You Value.mp4 (89.3 MB)
2. Protect What You Value.srt (9.3 KB)
3. What is Privacy, Anonymity and Pseudonymity .mp4 (151.5 MB)
3. What is Privacy, Anonymity and Pseudonymity .srt (12.1 KB)
4. Security, Vulnerabilities, Threats and Adversaries.mp4 (112.4 MB)
4. Security, Vulnerabilities, Threats and Adversaries.srt (9.7 KB)
5. Asset Selection.mp4 (17.4 MB)
5. Asset Selection.srt (7.1 KB)
6. Threat Modelling And Risk Assessment.mp4 (151.0 MB)
6. Threat Modelling And Risk Assessment.srt (13.3 KB)
7. Security,Anonymity and Privacy.mp4 (57.0 MB)
7. Security,Anonymity and Privacy.srt (4.3 KB)
8. Confidentiality, Integrity and Availability - (Security Attributes).mp4 (135.2 MB)
8. Confidentiality, Integrity and Availability - (Security Attributes).srt (10.2 KB)
9. Defence in Depth.mp4 (32.6 MB)
9. Defence in Depth.srt (3.8 KB)
4. Exposing Hackers - Know Your Enemy
1. Goals and Learning Objectives - Know Your Enemy.mp4 (20.8 MB)
1. Goals and Learning Objectives - Know Your Enemy.srt (1.3 KB)
10. Social Engineering - Scams, Cons, Tricks and Fraud.mp4 (155.5 MB)
10. Social Engineering - Scams, Cons, Tricks and Fraud.srt (15.3 KB)
2. Why You Need Security .mp4 (181.0 MB)
2. Why You Need Security .srt (16.8 KB)
3. The Top 3 Things You Need To Stay Safe Online.mp4 (11.7 MB)
3. The Top 3 Things You Need To Stay Safe Online.srt (7.1 KB)
4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4 (171.6 MB)
4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.srt (15.2 KB)
5. Hackers, crackers and cyber criminals.mp4 (139.7 MB)
5. Hackers, crackers and cyber criminals.srt (9.7 KB)
6. Malware, Viruses, Root kits and RATs.mp4 (145.6 MB)
6. Malware, Viruses, Root kits and RATs.srt (16.2 KB)
7. Spyware, Adware, Scareware, PUPs & Browser hijacking.mp4 (170.6 MB)
7. Spyware, Adware, Scareware, PUPs & Browser hijacking.srt (16.0 KB)
8. What is Phishing, Vishing and SMShing.mp4 (235.6 MB)
8. What is Phishing, Vishing and SMShing.srt (26.0 KB)
9. Spamming & Doxing.mp4 (160.3 MB)
9. Spamming & Doxing.srt (19.8 KB)
Bonus Resources.txt (0.3 KB)
files
2021-09-11 11:11:33
English
Seeders : 15 , Leechers : 5
Udemy - Master Cybersecurity,Ethical Hacking and Penetrating Testing (Updated 09 - 2021)
udp://tracker.torrent.eu.org:451/announce
udp://tracker.tiny-vps.com:6969/announce
http://tracker.foreverpirates.co:80/announce
udp://tracker.cyberia.is:6969/announce
udp://exodus.desync.com:6969/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2780/announce
udp://tracker.internetwarriors.net:1337/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://open.stealth.si:80/announce
udp://9.rarbg.to:2900/announce
udp://9.rarbg.me:2720/announce
udp://opentor.org:2710/announce
Back