Results 1 to 7 of 7

Thread: The Complete Cyber Security Course - Hackers Exposed

  1. #1

    The Complete Cyber Security Course - Hackers Exposed

    Download the magnet link here:
    **Hidden Content: Thanks to see the content**


    Content of this video training course:

    The Complete Cyber Security Course - Hackers Exposed
    01 Introduction
    001 Welcome and Introduction to the Instructor.mp459 MB
    002 Goals and Learning Objectives - Volume 1.mp470 MB
    003 Target Audience.mp450 MB
    004 Study Recommendations.mp496 MB
    005 Course s.mp419 MB
    02 know Yourself - The Threat and Vulnerability Landscape
    006 Goals and Learning Objectives.mp419 MB
    007 Protect What You Value.mp421 MB
    008 What is Privacy Anonymity and Pseudonymity.mp4108 MB
    009 Security Vulnerabilities Threats and Adversaries.mp488 MB
    010 Threat Modeling and Risk Assessments.mp4148 MB
    011 Security vs Privacy vs Anonymity - Can we have it all.mp441 MB
    012 Defense In Depth.mp47,070 KB
    013 The Zero Trust Model.mp477 MB
    The-Cyber-Security-Landscape-Diagram.jpg777 KB
    03 Know Your Enemy - The Current Threat and Vulnerability Landscape
    014 Goals and Learning Objectives.mp421 MB
    015 Why You Need Security The Value Of A Hack.mp4115 MB
    016 The Top 3 Things You Need To Stay Safe Online.mp411 MB
    017 Security Bugs and Vulnerabilities.mp4125 MB
    018 Hackers crackers and cyber criminals.mp461 MB
    019 Malware viruses rootkits and RATs.mp481 MB
    020 Spyware Adware Scareware PUPs Browser hijacking.mp472 MB
    021 What is Phishing Vishing and SMShing.mp455 MB
    022 Spamming Doxing.mp434 MB
    023 Social engineering - Scams cons tricks and fraud.mp493 MB
    024 Darknets Dark Markets and Exploit kits.mp4204 MB
    025 Governments spies and secret stuff part I.mp4136 MB
    026 Governments spies and secret stuff part II.mp4164 MB
    027 Encryption mandating insecurity legalizing spying.mp4330 MB
    028 Trust Backdoors.mp4167 MB
    029 Censorship.mp442 MB
    030 Security News and Alerts Stay Informed.mp410 MB
    04 Encryption Crash Course
    031 Goals and Learning Objectives.mp411 MB
    032 Symmetric Encryption.mp4159 MB
    033 Asymmetric Encryption.mp479 MB
    034 Hash Functions.mp4124 MB
    035 Digital Signatures.mp450 MB
    036 Secure Sockets Layer SSL and Transport layer security TLS.mp4195 MB
    037 SSL Stripping.mp4150 MB
    038 HTTPS HTTP Secure.mp4133 MB
    039 Digital Certificates.mp4119 MB
    040 Certificate Authorities and HTTPS.mp4255 MB
    041 End-to-End Encryption E2EE.mp48,690 KB
    042 Steganography.mp4173 MB
    043 How Security and Encryption is Really Attacked.mp424 MB
    05 Setting up a Testing Environment Using Virtual Machines
    044 Goals and Learning Objectives.mp413 MB

  2. The Following 52 Users Say Thank You to sec For This Useful Post:

    2015ccierns (10-18-2019) , aacdd-880 (06-27-2021) , abdulmuri (08-31-2018) , admin-jb1 (07-11-2021) , aliomdur90 (05-27-2018) , anc (05-22-2021) , artanqe (08-28-2018) , asak (05-03-2019) , azeem (08-28-2018) , ccie (09-05-2018) , CiscoSolutions (09-30-2020) , conwa (08-15-2018) , cybersh (02-17-2020) , diogomnlenzo (11-10-2019) , djaib (05-19-2019) , giantotti (09-26-2020) , goldeneyeonline1 (07-18-2018) , isaac-880 (06-11-2021) , jasica099 (05-25-2019) , jeffval8 (05-11-2018) , Keanu Reeves (03-03-2020) , kuntaox (07-03-2019) , lionelstuart (09-02-2018) , Lokiru (04-08-2021) , lubanamanjinder (02-06-2021) , lukaboban (01-08-2019) , mabus (01-10-2019) , madrapper (03-28-2021) , marumbo (05-12-2020) , masajja (05-04-2019) , mashsaba (05-28-2019) , mavutani101@gmail.com (08-31-2018) , MMZ (08-18-2019) , mobeidat (09-27-2018) , mos981 (05-15-2018) , MZIJohn (02-01-2019) , Nexus (04-25-2018) , njoy4live (06-07-2019) , rajesh.aesi (03-02-2019) , Rohan (07-06-2021) , sadia (05-11-2018) , sandeshrahate (07-04-2021) , shaminda (03-23-2019) , soso (06-20-2018) , szczuros (08-30-2018) , technician33 (10-16-2018) , thinker (08-28-2018) , tomisac (06-18-2021) , trivo (08-24-2024) , txn (05-11-2018) , vivan (06-19-2021) , wataru (08-28-2018)

  3. #2

    Re: The Complete Cyber Security Course - Hackers Exposed

    Thank you for sharing

  4. The Following User Says Thank You to Nexus For This Useful Post:

    abdulmuri (10-25-2018)

  5. #3

    Re: The Complete Cyber Security Course - Hackers Exposed

    Thanks for sharing.

  6. #4

    Re: The Complete Cyber Security Course - Hackers Exposed

    Please upload to mega.nz Thanks.

  7. #5

    Re: The Complete Cyber Security Course - Hackers Exposed

    Quote Originally Posted by sec View Post
    Download the magnet link here:
    ***Hidden content cannot be quoted.***

    Content of this video training course:

    The Complete Cyber Security Course - Hackers Exposed
    01 Introduction
    001 Welcome and Introduction to the Instructor.mp459 MB
    002 Goals and Learning Objectives - Volume 1.mp470 MB
    003 Target Audience.mp450 MB
    004 Study Recommendations.mp496 MB
    005 Course s.mp419 MB
    02 know Yourself - The Threat and Vulnerability Landscape
    006 Goals and Learning Objectives.mp419 MB
    007 Protect What You Value.mp421 MB
    008 What is Privacy Anonymity and Pseudonymity.mp4108 MB
    009 Security Vulnerabilities Threats and Adversaries.mp488 MB
    010 Threat Modeling and Risk Assessments.mp4148 MB
    011 Security vs Privacy vs Anonymity - Can we have it all.mp441 MB
    012 Defense In Depth.mp47,070 KB
    013 The Zero Trust Model.mp477 MB
    The-Cyber-Security-Landscape-Diagram.jpg777 KB
    03 Know Your Enemy - The Current Threat and Vulnerability Landscape
    014 Goals and Learning Objectives.mp421 MB
    015 Why You Need Security The Value Of A Hack.mp4115 MB
    016 The Top 3 Things You Need To Stay Safe Online.mp411 MB
    017 Security Bugs and Vulnerabilities.mp4125 MB
    018 Hackers crackers and cyber criminals.mp461 MB
    019 Malware viruses rootkits and RATs.mp481 MB
    020 Spyware Adware Scareware PUPs Browser hijacking.mp472 MB
    021 What is Phishing Vishing and SMShing.mp455 MB
    022 Spamming Doxing.mp434 MB
    023 Social engineering - Scams cons tricks and fraud.mp493 MB
    024 Darknets Dark Markets and Exploit kits.mp4204 MB
    025 Governments spies and secret stuff part I.mp4136 MB
    026 Governments spies and secret stuff part II.mp4164 MB
    027 Encryption mandating insecurity legalizing spying.mp4330 MB
    028 Trust Backdoors.mp4167 MB
    029 Censorship.mp442 MB
    030 Security News and Alerts Stay Informed.mp410 MB
    04 Encryption Crash Course
    031 Goals and Learning Objectives.mp411 MB
    032 Symmetric Encryption.mp4159 MB
    033 Asymmetric Encryption.mp479 MB
    034 Hash Functions.mp4124 MB
    035 Digital Signatures.mp450 MB
    036 Secure Sockets Layer SSL and Transport layer security TLS.mp4195 MB
    037 SSL Stripping.mp4150 MB
    038 HTTPS HTTP Secure.mp4133 MB
    039 Digital Certificates.mp4119 MB
    040 Certificate Authorities and HTTPS.mp4255 MB
    041 End-to-End Encryption E2EE.mp48,690 KB
    042 Steganography.mp4173 MB
    043 How Security and Encryption is Really Attacked.mp424 MB
    05 Setting up a Testing Environment Using Virtual Machines
    044 Goals and Learning Objectives.mp413 MB

  8. The Following 2 Users Say Thank You to artanqe For This Useful Post:

    mashsaba (05-28-2019) , shaminda (03-23-2019)

  9. #6

    Re: The Complete Cyber Security Course - Hackers Exposed

    thnaks a lot

  10. #7

    Re: The Complete Cyber Security Course - Hackers Exposed

    Thanks for sharing.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •