Search Torrents

Cyber Security For beginners™ 2020:Cyber Securit...


Cyber Security For beginners™ 2020:Cyber Security 0 to Hero Torrent content (File list)
1. Introduction to Cyber Space/2. History OF Internet.mp4 85.4 MB
1. Introduction to Cyber Space/1. Internet.mp4 44.0 MB
1. Introduction to Cyber Space/2. History OF Internet.srt 5.7 KB
1. Introduction to Cyber Space/1. Internet.srt 3.4 KB
10. Firewall/1. Firewall.mp4 8.7 MB
10. Firewall/5. Proxy Firewall.mp4 6.3 MB
10. Firewall/8. Hardware Firewall.mp4 4.2 MB
10. Firewall/9. Cloud Firewall.mp4 4.0 MB
10. Firewall/2. Packet Filtering Firewall.mp4 3.6 MB
10. Firewall/6. Next-Generation Firewall.mp4 3.2 MB
10. Firewall/7. Software Firewall.mp4 3.0 MB
10. Firewall/4. State Inspection Firewall.mp4 2.9 MB
10. Firewall/3. Circuit-Level Gateways.mp4 2.3 MB
10. Firewall/1. Firewall.srt 2.2 KB
10. Firewall/5. Proxy Firewall.srt 1.9 KB
10. Firewall/2. Packet Filtering Firewall.srt 1.2 KB
10. Firewall/6. Next-Generation Firewall.srt 1.1 KB
10. Firewall/8. Hardware Firewall.srt 1.0 KB
10. Firewall/9. Cloud Firewall.srt 0.9 KB
10. Firewall/3. Circuit-Level Gateways.srt 0.9 KB
10. Firewall/7. Software Firewall.srt 0.8 KB
10. Firewall/4. State Inspection Firewall.srt 0.6 KB
11. Computer Forensic/1. Computer Forensic.mp4 99.9 MB
11. Computer Forensic/1. Computer Forensic.srt 6.3 KB
12. Conclusion/2. Certified Ethical Hacker.mp4 7.6 MB
12. Conclusion/3. Comptia Security+.mp4 6.3 MB
12. Conclusion/5. Conclusion.mp4 4.5 MB
12. Conclusion/1. Certification.mp4 3.6 MB
12. Conclusion/4. CISSP.mp4 3.5 MB
12. Conclusion/1. Certification.srt 2.0 KB
12. Conclusion/2. Certified Ethical Hacker.srt 1.7 KB
12. Conclusion/3. Comptia Security+.srt 1.4 KB
12. Conclusion/4. CISSP.srt 1.2 KB
12. Conclusion/5. Conclusion.srt 0.9 KB
2. Security Model/2. Confidentiality.mp4 31.0 MB
2. Security Model/4. Availability.mp4 25.1 MB
2. Security Model/3. Integrity.mp4 20.4 MB
2. Security Model/1. Introduction.mp4 5.6 MB
2. Security Model/4. Availability.srt 2.5 KB
2. Security Model/2. Confidentiality.srt 2.4 KB
2. Security Model/3. Integrity.srt 1.5 KB
2. Security Model/1. Introduction.srt 0.9 KB
3. Cyber Attack/1. Cyber Attacks.mp4 46.9 MB
3. Cyber Attack/2. Internal Attack.mp4 32.3 MB
3. Cyber Attack/3. External Attack.mp4 17.1 MB
3. Cyber Attack/1. Cyber Attacks.srt 3.4 KB
3. Cyber Attack/2. Internal Attack.srt 2.0 KB
3. Cyber Attack/3. External Attack.srt 1.6 KB
4. Hackers and Their Job/1. What is Hacking.mp4 33.1 MB
4. Hackers and Their Job/3. WhiteHat Hacker.mp4 29.1 MB
4. Hackers and Their Job/2. BlackHat Hacker.mp4 27.4 MB
4. Hackers and Their Job/4. GrayHat Hacker.mp4 15.1 MB
4. Hackers and Their Job/1. What is Hacking.srt 2.2 KB
4. Hackers and Their Job/3. WhiteHat Hacker.srt 2.0 KB
4. Hackers and Their Job/2. BlackHat Hacker.srt 1.7 KB
4. Hackers and Their Job/4. GrayHat Hacker.srt 1.0 KB
5. Malware And Its Types/3. Spyware.mp4 58.0 MB
5. Malware And Its Types/7. Trojan Horse.mp4 54.5 MB
5. Malware And Its Types/5. Computer Browser.mp4 42.3 MB
5. Malware And Its Types/6. Computer Worm.mp4 36.3 MB
5. Malware And Its Types/2. Adware.mp4 22.2 MB
5. Malware And Its Types/1. Malware.mp4 12.5 MB
5. Malware And Its Types/4. Browser Hijacking.mp4 5.5 MB
5. Malware And Its Types/7. Trojan Horse.srt 8.5 KB
5. Malware And Its Types/5. Computer Browser.srt 5.7 KB
5. Malware And Its Types/6. Computer Worm.srt 5.4 KB
5. Malware And Its Types/3. Spyware.srt 4.5 KB
5. Malware And Its Types/2. Adware.srt 4.1 KB
5. Malware And Its Types/4. Browser Hijacking.srt 2.3 KB
5. Malware And Its Types/1. Malware.srt 1.2 KB
6. Cyber Crime/2. Cyber Stalking.mp4 97.1 MB
6. Cyber Crime/3. Software Piracy.mp4 91.1 MB
6. Cyber Crime/6. Computer Virus Spreading.mp4 90.5 MB
6. Cyber Crime/7. Spamming.mp4 62.5 MB
6. Cyber Crime/1. Cyber Crime.mp4 44.4 MB
6. Cyber Crime/5. Computer Hacking.mp4 43.8 MB
6. Cyber Crime/4. Phishing.mp4 37.5 MB
6. Cyber Crime/2. Cyber Stalking.srt 10.6 KB
6. Cyber Crime/3. Software Piracy.srt 8.6 KB
6. Cyber Crime/4. Phishing.srt 7.6 KB
6. Cyber Crime/6. Computer Virus Spreading.srt 7.3 KB
6. Cyber Crime/7. Spamming.srt 4.6 KB
6. Cyber Crime/1. Cyber Crime.srt 3.5 KB
6. Cyber Crime/5. Computer Hacking.srt 2.6 KB
7. Cyber Attacks/5. DDOS Attack.mp4 125.6 MB
7. Cyber Attacks/4. Social Engineering.mp4 79.2 MB
7. Cyber Attacks/1. Salami Attack.mp4 68.5 MB
7. Cyber Attacks/7. Email Spoofing.mp4 61.2 MB
7. Cyber Attacks/2. Cross-site Scripting.mp4 34.5 MB
7. Cyber Attacks/3. SQL Injection.mp4 33.8 MB
7. Cyber Attacks/6. MITM Attack.mp4 28.0 MB
7. Cyber Attacks/5. DDOS Attack.srt 9.9 KB
7. Cyber Attacks/4. Social Engineering.srt 9.1 KB
7. Cyber Attacks/6. MITM Attack.srt 7.6 KB
7. Cyber Attacks/2. Cross-site Scripting.srt 6.3 KB
7. Cyber Attacks/7. Email Spoofing.srt 6.1 KB
7. Cyber Attacks/3. SQL Injection.srt 5.9 KB
7. Cyber Attacks/1. Salami Attack.srt 4.6 KB
8. How to defence against Attacks/1. Authentication.mp4 44.5 MB
8. How to defence against Attacks/2. Encryption.mp4 28.0 MB
8. How to defence against Attacks/3. Digital Signature.mp4 11.7 MB
8. How to defence against Attacks/1. Authentication.srt 4.0 KB
8. How to defence against Attacks/2. Encryption.srt 2.8 KB
8. How to defence against Attacks/3. Digital Signature.srt 2.5 KB
9. Antivirus/1. Antivirus and it's Working.mp4 61.4 MB
9. Antivirus/1. Antivirus and it's Working.srt 6.1 KB
[UdemyLibrary.com] Join for free courses and tutorials.txt 0.2 KB



  • Torrent indexed: 4 years

  • Torrent updated: Tuesday 20th of October 2020 06:07:03 PM
  • Torrent hash: 591A982804DFC6F179B9D28304FBD5A0541E430E

  • Torrent size: 1.8 GB

  • Torrent category: Other




Comments



Report suspicious or fake torrent



Community - Add torrent to search results - Stats - DMCA - Removal Request - TOR - Contact
BTC: 13uHKcvKFUuJvkmX2XbDuxFHueDoqaeBSi