sec
04-25-2018, 11:52 AM
Download the magnet link here:
**Hidden Content: Check the thread to see hidden data.**
Content of this video training course:
The Complete Cyber Security Course - Hackers Exposed
01 Introduction
001 Welcome and Introduction to the Instructor.mp459 MB
002 Goals and Learning Objectives - Volume 1.mp470 MB
003 Target Audience.mp450 MB
004 Study Recommendations.mp496 MB
005 Course s.mp419 MB
02 know Yourself - The Threat and Vulnerability Landscape
006 Goals and Learning Objectives.mp419 MB
007 Protect What You Value.mp421 MB
008 What is Privacy Anonymity and Pseudonymity.mp4108 MB
009 Security Vulnerabilities Threats and Adversaries.mp488 MB
010 Threat Modeling and Risk Assessments.mp4148 MB
011 Security vs Privacy vs Anonymity - Can we have it all.mp441 MB
012 Defense In Depth.mp47,070 KB
013 The Zero Trust Model.mp477 MB
The-Cyber-Security-Landscape-Diagram.jpg777 KB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape
014 Goals and Learning Objectives.mp421 MB
015 Why You Need Security The Value Of A Hack.mp4115 MB
016 The Top 3 Things You Need To Stay Safe Online.mp411 MB
017 Security Bugs and Vulnerabilities.mp4125 MB
018 Hackers crackers and cyber criminals.mp461 MB
019 Malware viruses rootkits and RATs.mp481 MB
020 Spyware Adware Scareware PUPs Browser hijacking.mp472 MB
021 What is Phishing Vishing and SMShing.mp455 MB
022 Spamming Doxing.mp434 MB
023 Social engineering - Scams cons tricks and fraud.mp493 MB
024 Darknets Dark Markets and Exploit kits.mp4204 MB
025 Governments spies and secret stuff part I.mp4136 MB
026 Governments spies and secret stuff part II.mp4164 MB
027 Encryption mandating insecurity legalizing spying.mp4330 MB
028 Trust Backdoors.mp4167 MB
029 Censorship.mp442 MB
030 Security News and Alerts Stay Informed.mp410 MB
04 Encryption Crash Course
031 Goals and Learning Objectives.mp411 MB
032 Symmetric Encryption.mp4159 MB
033 Asymmetric Encryption.mp479 MB
034 Hash Functions.mp4124 MB
035 Digital Signatures.mp450 MB
036 Secure Sockets Layer SSL and Transport layer security TLS.mp4195 MB
037 SSL Stripping.mp4150 MB
038 HTTPS HTTP Secure.mp4133 MB
039 Digital Certificates.mp4119 MB
040 Certificate Authorities and HTTPS.mp4255 MB
041 End-to-End Encryption E2EE.mp48,690 KB
042 Steganography.mp4173 MB
043 How Security and Encryption is Really Attacked.mp424 MB
05 Setting up a Testing Environment Using Virtual Machines
044 Goals and Learning Objectives.mp413 MB
**Hidden Content: Check the thread to see hidden data.**
Content of this video training course:
The Complete Cyber Security Course - Hackers Exposed
01 Introduction
001 Welcome and Introduction to the Instructor.mp459 MB
002 Goals and Learning Objectives - Volume 1.mp470 MB
003 Target Audience.mp450 MB
004 Study Recommendations.mp496 MB
005 Course s.mp419 MB
02 know Yourself - The Threat and Vulnerability Landscape
006 Goals and Learning Objectives.mp419 MB
007 Protect What You Value.mp421 MB
008 What is Privacy Anonymity and Pseudonymity.mp4108 MB
009 Security Vulnerabilities Threats and Adversaries.mp488 MB
010 Threat Modeling and Risk Assessments.mp4148 MB
011 Security vs Privacy vs Anonymity - Can we have it all.mp441 MB
012 Defense In Depth.mp47,070 KB
013 The Zero Trust Model.mp477 MB
The-Cyber-Security-Landscape-Diagram.jpg777 KB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape
014 Goals and Learning Objectives.mp421 MB
015 Why You Need Security The Value Of A Hack.mp4115 MB
016 The Top 3 Things You Need To Stay Safe Online.mp411 MB
017 Security Bugs and Vulnerabilities.mp4125 MB
018 Hackers crackers and cyber criminals.mp461 MB
019 Malware viruses rootkits and RATs.mp481 MB
020 Spyware Adware Scareware PUPs Browser hijacking.mp472 MB
021 What is Phishing Vishing and SMShing.mp455 MB
022 Spamming Doxing.mp434 MB
023 Social engineering - Scams cons tricks and fraud.mp493 MB
024 Darknets Dark Markets and Exploit kits.mp4204 MB
025 Governments spies and secret stuff part I.mp4136 MB
026 Governments spies and secret stuff part II.mp4164 MB
027 Encryption mandating insecurity legalizing spying.mp4330 MB
028 Trust Backdoors.mp4167 MB
029 Censorship.mp442 MB
030 Security News and Alerts Stay Informed.mp410 MB
04 Encryption Crash Course
031 Goals and Learning Objectives.mp411 MB
032 Symmetric Encryption.mp4159 MB
033 Asymmetric Encryption.mp479 MB
034 Hash Functions.mp4124 MB
035 Digital Signatures.mp450 MB
036 Secure Sockets Layer SSL and Transport layer security TLS.mp4195 MB
037 SSL Stripping.mp4150 MB
038 HTTPS HTTP Secure.mp4133 MB
039 Digital Certificates.mp4119 MB
040 Certificate Authorities and HTTPS.mp4255 MB
041 End-to-End Encryption E2EE.mp48,690 KB
042 Steganography.mp4173 MB
043 How Security and Encryption is Really Attacked.mp424 MB
05 Setting up a Testing Environment Using Virtual Machines
044 Goals and Learning Objectives.mp413 MB