Details for this torrent 

Udemy - Cyber Security - Go From Zero to Hero (2020)
Type:
Other > Other
Files:
244
Size:
3.47 GiB (3726507843 Bytes)
Uploaded:
2020-09-22 10:55:28 GMT
By:
cybil18
Seeders:
5
Leechers:
1
Comments
0  

Info Hash:
B82D27B09898B597445348EF07BA4B19CE6AC0B3




(Problems with magnets links are fixed by upgrading your torrent client!)
Read More At: https://getfreecourses.co/cyber-security-go-from-zero-to-hero-2020-udemy-course-free-download/

Download Paid Udemy Courses For Free: https://getfreecourses.co/

1. FUNDAMENTALS OF NETWORKING/1. ARE YOU READY.html3.64 KiB
1. FUNDAMENTALS OF NETWORKING/10. Layers of OSI Model.mp433.25 MiB
1. FUNDAMENTALS OF NETWORKING/10. Layers of OSI Model.srt10.85 KiB
1. FUNDAMENTALS OF NETWORKING/11. Introduction to TCPIP Model.mp476.04 MiB
1. FUNDAMENTALS OF NETWORKING/11. Introduction to TCPIP Model.srt11.55 KiB
1. FUNDAMENTALS OF NETWORKING/12. OSI Model vs TCPIP Model.mp424.13 MiB
1. FUNDAMENTALS OF NETWORKING/12. OSI Model vs TCPIP Model.srt4.95 KiB
1. FUNDAMENTALS OF NETWORKING/13. BASICS OF NETWORKING Quiz 2.html147 B
1. FUNDAMENTALS OF NETWORKING/14. Addressing in Computer Networks.mp453.58 MiB
1. FUNDAMENTALS OF NETWORKING/14. Addressing in Computer Networks.srt9.92 KiB
1. FUNDAMENTALS OF NETWORKING/15. IP Address- IPv4 and IPv6.mp440.64 MiB
1. FUNDAMENTALS OF NETWORKING/15. IP Address- IPv4 and IPv6.srt6.86 KiB
1. FUNDAMENTALS OF NETWORKING/16. Introduction to Classes of IP Addressing.mp414.98 MiB
1. FUNDAMENTALS OF NETWORKING/16. Introduction to Classes of IP Addressing.srt4.43 KiB
1. FUNDAMENTALS OF NETWORKING/17. Classes of IP Address.mp454.86 MiB
1. FUNDAMENTALS OF NETWORKING/17. Classes of IP Address.srt9.75 KiB
1. FUNDAMENTALS OF NETWORKING/18. PRACTICAL HOW TO FIND OUT YOUR PC's IP ADDRESS.mp422.43 MiB
1. FUNDAMENTALS OF NETWORKING/18. PRACTICAL HOW TO FIND OUT YOUR PC's IP ADDRESS.srt3.54 KiB
1. FUNDAMENTALS OF NETWORKING/19. PRACTICAL HOW TO FIND OUT YOUR PC'S MAC ADDRESS.mp441.4 MiB
1. FUNDAMENTALS OF NETWORKING/19. PRACTICAL HOW TO FIND OUT YOUR PC'S MAC ADDRESS.srt5.18 KiB
1. FUNDAMENTALS OF NETWORKING/2. What is Computer Networking - Definition and Characteristics.mp419.41 MiB
1. FUNDAMENTALS OF NETWORKING/2. What is Computer Networking - Definition and Characteristics.srt3.24 KiB
1. FUNDAMENTALS OF NETWORKING/20. The Internet Protocol (IP).mp431.93 MiB
1. FUNDAMENTALS OF NETWORKING/20. The Internet Protocol (IP).srt7.44 KiB
1. FUNDAMENTALS OF NETWORKING/21. BASICS OF NETWORKING QUIZ 3.html147 B
1. FUNDAMENTALS OF NETWORKING/22. Address Resolution Protocol (ARP).mp450.52 MiB
1. FUNDAMENTALS OF NETWORKING/22. Address Resolution Protocol (ARP).srt10.29 KiB
1. FUNDAMENTALS OF NETWORKING/23. SUPPORT WE SECURE!.html2.53 KiB
1. FUNDAMENTALS OF NETWORKING/24. Dynamic Host Configuration Protocol (DHCP).mp436.84 MiB
1. FUNDAMENTALS OF NETWORKING/24. Dynamic Host Configuration Protocol (DHCP).srt9.19 KiB
1. FUNDAMENTALS OF NETWORKING/25. Internet Control Message Protocol (ICMP).mp437.4 MiB
1. FUNDAMENTALS OF NETWORKING/25. Internet Control Message Protocol (ICMP).srt7.13 KiB
1. FUNDAMENTALS OF NETWORKING/26. RIP and OSPF Protocols.mp435.66 MiB
1. FUNDAMENTALS OF NETWORKING/26. RIP and OSPF Protocols.srt6.07 KiB
1. FUNDAMENTALS OF NETWORKING/27. PRACTICAL HOW TO FIND OUT THE PATH OF DATA PACKETS USING TRACERT.mp416.99 MiB
1. FUNDAMENTALS OF NETWORKING/27. PRACTICAL HOW TO FIND OUT THE PATH OF DATA PACKETS USING TRACERT.srt2.98 KiB
1. FUNDAMENTALS OF NETWORKING/28. What are Sockets.mp430.39 MiB
1. FUNDAMENTALS OF NETWORKING/28. What are Sockets.srt6.5 KiB
1. FUNDAMENTALS OF NETWORKING/29. File Transfer Protocol (FTP).mp427.89 MiB
1. FUNDAMENTALS OF NETWORKING/29. File Transfer Protocol (FTP).srt4.04 KiB
1. FUNDAMENTALS OF NETWORKING/3. Network Topologies.mp425.81 MiB
1. FUNDAMENTALS OF NETWORKING/3. Network Topologies.srt7.67 KiB
1. FUNDAMENTALS OF NETWORKING/30. Hypertext Transfer Protocol (HTTP).mp441.68 MiB
1. FUNDAMENTALS OF NETWORKING/30. Hypertext Transfer Protocol (HTTP).srt4.6 KiB
1. FUNDAMENTALS OF NETWORKING/31. Hyptertext Transfer ProtocolSecure Socket Layer (HTTPS).mp446.19 MiB
1. FUNDAMENTALS OF NETWORKING/31. Hyptertext Transfer ProtocolSecure Socket Layer (HTTPS).srt6.28 KiB
1. FUNDAMENTALS OF NETWORKING/32. Domain Name System (DNS).mp420.48 MiB
1. FUNDAMENTALS OF NETWORKING/32. Domain Name System (DNS).srt2.99 KiB
1. FUNDAMENTALS OF NETWORKING/33. BASICS OF NETWORKING Quiz 4.html72 B
1. FUNDAMENTALS OF NETWORKING/34. Conclusion.mp42.21 MiB
1. FUNDAMENTALS OF NETWORKING/34. Conclusion.srt849 B
1. FUNDAMENTALS OF NETWORKING/34.1 Network-Security-Essentials-4th-Edition William Stallings.pdf3.06 MiB
1. FUNDAMENTALS OF NETWORKING/34.2 (McGraw-Hill Forouzan Networking) Behrouz A. Forouzan - Data Communications and Networking -McGraw-Hill Higher Education (2007).pdf10.84 MiB
1. FUNDAMENTALS OF NETWORKING/34.3 Atul Kahate - Cryptography and network security (2006, Tata McGraw-Hill).pdf14.95 MiB
1. FUNDAMENTALS OF NETWORKING/34.4 Kurose, James F._ Ross, Keith W. - Computer networking _ a top-down approach (2017) - libgen.lc.pdf19.97 MiB
1. FUNDAMENTALS OF NETWORKING/4. Meet the instructors!.mp47.26 MiB
1. FUNDAMENTALS OF NETWORKING/4. Meet the instructors!.srt484 B
1. FUNDAMENTALS OF NETWORKING/5. History and Applications of Computer Networking.mp439.06 MiB
1. FUNDAMENTALS OF NETWORKING/5. History and Applications of Computer Networking.srt6.68 KiB
1. FUNDAMENTALS OF NETWORKING/6. Before moving ahead....html2.53 KiB
1. FUNDAMENTALS OF NETWORKING/6.1 Network-Security-Essentials-4th-Edition William Stallings.pdf3.06 MiB
1. FUNDAMENTALS OF NETWORKING/6.2 (McGraw-Hill Forouzan Networking) Behrouz A. Forouzan - Data Communications and Networking -McGraw-Hill Higher Education (2007).pdf10.83 MiB
1. FUNDAMENTALS OF NETWORKING/6.3 Ethem Mining - Kali Linux Hacking_ A Complete Step by Step Guide to Learn the Fundamentals of Cyber Security, Hacking, and Penetration Testing. Includes Valuable Basic Networking Concepts-Independentl.epub2.56 MiB
1. FUNDAMENTALS OF NETWORKING/7. Protocols and Standards.mp428.91 MiB
1. FUNDAMENTALS OF NETWORKING/7. Protocols and Standards.srt4.93 KiB
1. FUNDAMENTALS OF NETWORKING/8. BASICS OF NETWORKING Quiz 1.html147 B
1. FUNDAMENTALS OF NETWORKING/9. Introduction to OSI Model.mp432.18 MiB
1. FUNDAMENTALS OF NETWORKING/9. Introduction to OSI Model.srt5.05 KiB
2. GETTING STARTED WITH CYBER SECURITY/1. Definition of Computer Security.mp428.43 MiB
2. GETTING STARTED WITH CYBER SECURITY/1. Definition of Computer Security.srt3.92 KiB
2. GETTING STARTED WITH CYBER SECURITY/2. Interesting Facts about Cyber Security.mp442.84 MiB
2. GETTING STARTED WITH CYBER SECURITY/2. Interesting Facts about Cyber Security.srt5.31 KiB
2. GETTING STARTED WITH CYBER SECURITY/3. Have a look at this!.mp411.74 MiB
2. GETTING STARTED WITH CYBER SECURITY/3. Have a look at this!.srt776 B
2. GETTING STARTED WITH CYBER SECURITY/4. History of Cyber Security.mp460.12 MiB
2. GETTING STARTED WITH CYBER SECURITY/4. History of Cyber Security.srt7.22 KiB
2. GETTING STARTED WITH CYBER SECURITY/5. Scope and Career Insights in Cyber Security.mp448.28 MiB
2. GETTING STARTED WITH CYBER SECURITY/5. Scope and Career Insights in Cyber Security.srt10.67 KiB
2. GETTING STARTED WITH CYBER SECURITY/5.1 How to Become a Cyber Security Professional.html94 B
2. GETTING STARTED WITH CYBER SECURITY/6. GETTING STARTED WITH CYBER SECURITY QUIZ.html661 B
2. GETTING STARTED WITH CYBER SECURITY/7. DID YOU RATE.html2.53 KiB
2. GETTING STARTED WITH CYBER SECURITY/8. Conclusion.mp43.58 MiB
2. GETTING STARTED WITH CYBER SECURITY/8. Conclusion.srt693 B
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/1. Introduction.mp45.73 MiB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/1. Introduction.srt1.43 KiB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/10. SECTION 3 QUIZ.html627 B
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/11. We value your feedback!.html2.54 KiB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/12. Conclusion.mp42.62 MiB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/12. Conclusion.srt785 B
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/2. Standard Definition of Cyber Security.mp419.01 MiB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/2. Standard Definition of Cyber Security.srt3.07 KiB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/3. Types of Computer Security.mp425.09 MiB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/3. Types of Computer Security.srt3.26 KiB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/4. Key Terms in Cyber Security.mp430.67 MiB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/4. Key Terms in Cyber Security.srt7.99 KiB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/5. The Elements of Information Security.mp423.07 MiB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/5. The Elements of Information Security.srt6.44 KiB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/6. Types of Attacks.mp443.35 MiB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/6. Types of Attacks.srt13.35 KiB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/7. Roles in Cyber Security Part 1.mp448.97 MiB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/7. Roles in Cyber Security Part 1.srt9.59 KiB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/8. Roles in Cyber Security Part 2.mp434.05 MiB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/8. Roles in Cyber Security Part 2.srt6.29 KiB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/9. PRACTICAL USING OSINT FRAMEWORK FOR INFORMATION GATHERING.mp441.17 MiB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/9. PRACTICAL USING OSINT FRAMEWORK FOR INFORMATION GATHERING.srt6.4 KiB
4. DIVING DEEP INTO CYBER SECURITY/1. Introduction.mp410.16 MiB
4. DIVING DEEP INTO CYBER SECURITY/1. Introduction.srt1.72 KiB
4. DIVING DEEP INTO CYBER SECURITY/10. Symmetric Encryption.mp414.37 MiB
4. DIVING DEEP INTO CYBER SECURITY/10. Symmetric Encryption.srt3.48 KiB
4. DIVING DEEP INTO CYBER SECURITY/11. AES and DES.mp444.52 MiB
4. DIVING DEEP INTO CYBER SECURITY/11. AES and DES.srt7.12 KiB
4. DIVING DEEP INTO CYBER SECURITY/12. Asymmetric Encryption.mp416.27 MiB
4. DIVING DEEP INTO CYBER SECURITY/12. Asymmetric Encryption.srt3.12 KiB
4. DIVING DEEP INTO CYBER SECURITY/13. Hey there! Support We Secure..html2.53 KiB
4. DIVING DEEP INTO CYBER SECURITY/14. RSA & Diffie Hellman.mp447.48 MiB
4. DIVING DEEP INTO CYBER SECURITY/14. RSA & Diffie Hellman.srt9.2 KiB
4. DIVING DEEP INTO CYBER SECURITY/15. Hashing.mp462.06 MiB
4. DIVING DEEP INTO CYBER SECURITY/15. Hashing.srt8.41 KiB
4. DIVING DEEP INTO CYBER SECURITY/16. Security Organizations.mp426.77 MiB
4. DIVING DEEP INTO CYBER SECURITY/16. Security Organizations.srt5.89 KiB
4. DIVING DEEP INTO CYBER SECURITY/17. Critical Thinking in Cyber Security.mp421.72 MiB
4. DIVING DEEP INTO CYBER SECURITY/17. Critical Thinking in Cyber Security.srt4.82 KiB
4. DIVING DEEP INTO CYBER SECURITY/18. The Five Critical Thinking Skills.mp424.13 MiB
4. DIVING DEEP INTO CYBER SECURITY/18. The Five Critical Thinking Skills.srt7.16 KiB
4. DIVING DEEP INTO CYBER SECURITY/19. PRACTICAL USING NSLOOKUP TOOL.mp47.14 MiB
4. DIVING DEEP INTO CYBER SECURITY/19. PRACTICAL USING NSLOOKUP TOOL.srt3.09 KiB
4. DIVING DEEP INTO CYBER SECURITY/2. Security Architect's View of Security.mp446.98 MiB
4. DIVING DEEP INTO CYBER SECURITY/2. Security Architect's View of Security.srt10.03 KiB
4. DIVING DEEP INTO CYBER SECURITY/20. PRACTICAL USING NETSTAT TOOL.mp432.45 MiB
4. DIVING DEEP INTO CYBER SECURITY/20. PRACTICAL USING NETSTAT TOOL.srt4.37 KiB
4. DIVING DEEP INTO CYBER SECURITY/21. SECTION 4 QUIZ - DIVING DEEP INTO CYBER SECURITY.html627 B
4. DIVING DEEP INTO CYBER SECURITY/22. Conclusion.mp42.78 MiB
4. DIVING DEEP INTO CYBER SECURITY/22. Conclusion.srt726 B
4. DIVING DEEP INTO CYBER SECURITY/3. What is Vulnerability Assessment.mp436.97 MiB
4. DIVING DEEP INTO CYBER SECURITY/3. What is Vulnerability Assessment.srt5.76 KiB
4. DIVING DEEP INTO CYBER SECURITY/4. 4 Phases of Vulnerability Assessment.mp440.36 MiB
4. DIVING DEEP INTO CYBER SECURITY/4. 4 Phases of Vulnerability Assessment.srt12.64 KiB
4. DIVING DEEP INTO CYBER SECURITY/5. PRACTICAL DOWNLOADING NESSUS VULNERABILITY SCANNER.mp411.24 MiB
4. DIVING DEEP INTO CYBER SECURITY/5. PRACTICAL DOWNLOADING NESSUS VULNERABILITY SCANNER.srt1.95 KiB
4. DIVING DEEP INTO CYBER SECURITY/6. PRACTICAL CREATING A ADVANCE NETWORK SCAN POLICY.mp428.84 MiB
4. DIVING DEEP INTO CYBER SECURITY/6. PRACTICAL CREATING A ADVANCE NETWORK SCAN POLICY.srt7.48 KiB
4. DIVING DEEP INTO CYBER SECURITY/7. PRACTICAL INITIATING A SCAN USING USER DEFINED POLICIES.mp416.75 MiB
4. DIVING DEEP INTO CYBER SECURITY/7. PRACTICAL INITIATING A SCAN USING USER DEFINED POLICIES.srt3.8 KiB
4. DIVING DEEP INTO CYBER SECURITY/8. PRACTICAL GOING THROUGH SCANNED RESULTS.mp415.11 MiB
4. DIVING DEEP INTO CYBER SECURITY/8. PRACTICAL GOING THROUGH SCANNED RESULTS.srt4.06 KiB
4. DIVING DEEP INTO CYBER SECURITY/9. Introduction to Cryptography.mp441.86 MiB
4. DIVING DEEP INTO CYBER SECURITY/9. Introduction to Cryptography.srt5.81 KiB
4. DIVING DEEP INTO CYBER SECURITY/Download Paid Udemy Courses For Free.url116 B
4. DIVING DEEP INTO CYBER SECURITY/GetFreeCourses.Co.url116 B
4. DIVING DEEP INTO CYBER SECURITY/How you can help GetFreeCourses.Co.txt182 B
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/1. Introduction.mp47.23 MiB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/1. Introduction.srt1.03 KiB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/10. OH MY GOD! VIRUS!!.mp437.79 MiB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/10. OH MY GOD! VIRUS!!.srt7.55 KiB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/11. Types of Virus.mp459.33 MiB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/11. Types of Virus.srt11.32 KiB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/12. You should defend yourself!.mp445.98 MiB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/12. You should defend yourself!.srt8.95 KiB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/13. Have you ever heard about a Ransomware.mp481.12 MiB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/13. Have you ever heard about a Ransomware.srt12.43 KiB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/14. IMPORTANT!.html2.53 KiB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/15. PRACTICAL INFORMATION GATHERING USING SHODAN.mp474.34 MiB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/15. PRACTICAL INFORMATION GATHERING USING SHODAN.srt9.69 KiB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/16. The Cyber Kill Chain.mp431.3 MiB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/16. The Cyber Kill Chain.srt10.52 KiB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/17. Introduction to Social Engineering.mp428.11 MiB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/17. Introduction to Social Engineering.srt5.94 KiB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/18. Types of Social Engineering.mp457.62 MiB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/18. Types of Social Engineering.srt6.99 KiB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/19. PRACTICAL HOW TO FIND OUT USERNAMES AND PASSWORDS USING SOCIAL ENGINEERING.mp485.55 MiB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/19. PRACTICAL HOW TO FIND OUT USERNAMES AND PASSWORDS USING SOCIAL ENGINEERING.srt12.47 KiB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/2. Different types of Actors in Cyber Security.mp464.44 MiB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/2. Different types of Actors in Cyber Security.srt11.29 KiB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/20. SECTION 5 QUIZ - TYPES OF ACTORS, ATTACKS AND MALWARE.html627 B
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/21. Conclusion.mp44.15 MiB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/21. Conclusion.srt847 B
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/3. Types of Cyber Attacks.mp431.37 MiB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/3. Types of Cyber Attacks.srt4.95 KiB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/4. Hacking Organizations around the Globe.mp427.15 MiB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/4. Hacking Organizations around the Globe.srt5.91 KiB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/5. Security Services and Mechanisms.mp417.62 MiB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/5. Security Services and Mechanisms.srt4.31 KiB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/6. Introduction to Threats.mp411.24 MiB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/6. Introduction to Threats.srt3.99 KiB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/7. What is a Malware.mp447.53 MiB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/7. What is a Malware.srt9.28 KiB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/8. Everything about Trojans.mp450.19 MiB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/8. Everything about Trojans.srt8.64 KiB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/9. Types of Trojans.mp449.55 MiB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/9. Types of Trojans.srt8.11 KiB
6. KEY SECURITY CONCEPTS/1. Introduction.mp48.71 MiB
6. KEY SECURITY CONCEPTS/1. Introduction.srt1.72 KiB
6. KEY SECURITY CONCEPTS/10. The NIST Framework.mp421.87 MiB
6. KEY SECURITY CONCEPTS/10. The NIST Framework.srt3.83 KiB
6. KEY SECURITY CONCEPTS/11. The COBIT Framework.mp425.57 MiB
6. KEY SECURITY CONCEPTS/11. The COBIT Framework.srt4.07 KiB
6. KEY SECURITY CONCEPTS/12. Other Security Frameworks.mp425.21 MiB
6. KEY SECURITY CONCEPTS/12. Other Security Frameworks.srt5.43 KiB
6. KEY SECURITY CONCEPTS/13. SECTION 6 QUIZ - KEY SECURITY CONCEPTS.html627 B
6. KEY SECURITY CONCEPTS/14. Leave a Rating!.html2.53 KiB
6. KEY SECURITY CONCEPTS/15. Conclusion.mp42.13 MiB
6. KEY SECURITY CONCEPTS/15. Conclusion.srt732 B
6. KEY SECURITY CONCEPTS/2. Confidentiality - The Most Important Element of Security.mp426.2 MiB
6. KEY SECURITY CONCEPTS/2. Confidentiality - The Most Important Element of Security.srt5.07 KiB
6. KEY SECURITY CONCEPTS/3. Integrity, Authentication, Access Control and Non-Repudiation.mp455.85 MiB
6. KEY SECURITY CONCEPTS/3. Integrity, Authentication, Access Control and Non-Repudiation.srt10.41 KiB
6. KEY SECURITY CONCEPTS/4. Introduction to Incident Response Team.mp432.05 MiB
6. KEY SECURITY CONCEPTS/4. Introduction to Incident Response Team.srt6.49 KiB
6. KEY SECURITY CONCEPTS/5. Phases of Incident Response.mp419.83 MiB
6. KEY SECURITY CONCEPTS/5. Phases of Incident Response.srt6.23 KiB
6. KEY SECURITY CONCEPTS/6. Laws in Cyber Security.mp431.94 MiB
6. KEY SECURITY CONCEPTS/6. Laws in Cyber Security.srt6.23 KiB
6. KEY SECURITY CONCEPTS/7. What are Audits in Cyber Security.mp445.02 MiB
6. KEY SECURITY CONCEPTS/7. What are Audits in Cyber Security.srt12.44 KiB
6. KEY SECURITY CONCEPTS/8. Internal Audit vs External Audit.mp434.89 MiB
6. KEY SECURITY CONCEPTS/8. Internal Audit vs External Audit.srt5.57 KiB
6. KEY SECURITY CONCEPTS/9. How to carry out an Internal Audit.mp448.54 MiB
6. KEY SECURITY CONCEPTS/9. How to carry out an Internal Audit.srt13.56 KiB
7. FIREWALLS AND ANTIVIRUS/1. Introduction.mp413.02 MiB
7. FIREWALLS AND ANTIVIRUS/1. Introduction.srt1.61 KiB
7. FIREWALLS AND ANTIVIRUS/10. Firewalls vs Antivirus.mp49.27 MiB
7. FIREWALLS AND ANTIVIRUS/10. Firewalls vs Antivirus.srt2.21 KiB
7. FIREWALLS AND ANTIVIRUS/11. THE FINAL QUIZ - FIREWALLS AND ANTIVIRUS.html87 B
7. FIREWALLS AND ANTIVIRUS/12. CONGRATULATIONS!.mp418.64 MiB
7. FIREWALLS AND ANTIVIRUS/12. CONGRATULATIONS!.srt2.37 KiB
7. FIREWALLS AND ANTIVIRUS/2. Intrusion Detection System.mp459.16 MiB
7. FIREWALLS AND ANTIVIRUS/2. Intrusion Detection System.srt12.42 KiB
7. FIREWALLS AND ANTIVIRUS/3. Introduction to Firewalls.mp453.33 MiB
7. FIREWALLS AND ANTIVIRUS/3. Introduction to Firewalls.srt10.47 KiB
7. FIREWALLS AND ANTIVIRUS/4. IDS evasion techniques.mp433.93 MiB
7. FIREWALLS AND ANTIVIRUS/4. IDS evasion techniques.srt8.55 KiB
7. FIREWALLS AND ANTIVIRUS/5. What is DMZ.mp436.7 MiB
7. FIREWALLS AND ANTIVIRUS/5. What is DMZ.srt6.32 KiB
7. FIREWALLS AND ANTIVIRUS/6. Firewall evasion techniques.mp440.89 MiB
7. FIREWALLS AND ANTIVIRUS/6. Firewall evasion techniques.srt9.39 KiB
7. FIREWALLS AND ANTIVIRUS/7. Different types of Firewalls.mp431.95 MiB
7. FIREWALLS AND ANTIVIRUS/7. Different types of Firewalls.srt10.89 KiB
7. FIREWALLS AND ANTIVIRUS/8. The Antivirus!.mp420.17 MiB
7. FIREWALLS AND ANTIVIRUS/8. The Antivirus!.srt3.73 KiB
7. FIREWALLS AND ANTIVIRUS/9. Antivirus Detection Techniques.mp472.62 MiB
7. FIREWALLS AND ANTIVIRUS/9. Antivirus Detection Techniques.srt11.74 KiB
Download Paid Udemy Courses For Free.url116 B
GetFreeCourses.Co.url116 B
How you can help GetFreeCourses.Co.txt182 B