message
239 - Certified Ethical Hacker (CEH) - Linux Academy's Prep Course
Seeders | 0 |
Leechers | 5 |
File Size | 14.2 GB |
Downloads | 7 |
Uploaded | Feb 19, 2020 |
Files
Trackers
More Info
239 - Certified Ethical Hacker (CEH) - Linux Academy's Prep Course
001 - About the Author.mp4 - 23.7 MB
002 - About the Course.mp4 - 84.9 MB
003 - Course Requirements.mp4 - 58.6 MB
004 - How to Get Help.mp4 - 74.7 MB
005 - About the Exam.mp4 - 141 MB
006 - Chapter Introduction.mp4 - 29.6 MB
007 - Common Terms (Hack Value, Vulnerability, Exploit, Payload).mp4 - 65.1 MB
008 - Zero Day Attack.mp4 - 67.3 MB
009 - Daisy Chaining.mp4 - 90.5 MB
010 - QUIZ SOLUTION: Overview of Information Security - Questions answered and explained.mp4 - 61 MB
011 - Chapter Introduction.mp4 - 9.27 MB
012 - Threats vs Attacks.mp4 - 30.1 MB
013 - Motives and Reasons Behind Cyber Security Attacks.mp4 - 32.2 MB
014 - What Are the Means by Which Hackers Gain Access to Systems and Networks?.mp4 - 12.9 MB
015 - Cloud Computing Threats.mp4 - 78.9 MB
016 - Advanced Presistent Threats.mp4 - 25.2 MB
017 - Viruses and Worms.mp4 - 39.7 MB
018 - Ransomware.mp4 - 63.2 MB
019 - Mobile Threats.mp4 - 44.6 MB
020 - Modern Age Information Warfare.mp4 - 55.7 MB
021 - Insider Attacks.mp4 - 21.8 MB
022 - Phishing.mp4 - 28.9 MB
023 - Web Application Threats.mp4 - 29.9 MB
024 - Classification of Threats: Network Threats.mp4 - 34.3 MB
025 - Clasification of Threats: Host Threats.mp4 - 29.1 MB
026 - Clasification of Threats: Application Threats.mp4 - 46.8 MB
027 - Classification of Attacks.mp4 - 148 MB
028 - Botnets.mp4 - 35.7 MB
029 - Laws, Standards, and Regulations.mp4 - 139 MB
030 - QUIZ SOLUTION: Overview of Information Security Threats and Attacks - Questions answered and explained.mp4 - 70.3 MB
031 - A Brief Look at the History of Hacking.mp4 - 125 MB
032 - Types of Hackers.mp4 - 90.1 MB
033 - What is Ethical Hacking? What is Its Purpose?.mp4 - 29.8 MB
034 - Scope of Ethical Hacking.mp4 - 38.4 MB
035 - Hacking Stages: Reconnaissance.mp4 - 25.9 MB
036 - Hacking Stages: Scanning.mp4 - 19.7 MB
037 - Hacking Stages: Gaining Access.mp4 - 6.84 MB
038 - Hacking Stages: Maintaining Access.mp4 - 34.4 MB
039 - Hacking Stages: Clearing Tracks.mp4 - 30.9 MB
040 - QUIZ SOLUTION: History of Hacking - Questions answered and explained.mp4 - 86.6 MB
041 - Chapter Introduction.mp4 - 60.2 MB
042 - Information Assurance.mp4 - 142 MB
043 - EISA and Information security management program.mp4 - 124 MB
044 - Network Zoning.mp4 - 163 MB
045 - Defense in Depth.mp4 - 137 MB
046 - What Sort of Things Do Policies Regulate?.mp4 - 158 MB
047 - Workplace Security Policies and Examples.mp4 - 114 MB
048 - Physical Security Controls and Risk.mp4 - 122 MB
049 - Risk Management.mp4 - 133 MB
050 - Threat Modeling and Incident Management.mp4 - 223 MB
051 - UBA - User Behavior Analytics and Network Security Controls.mp4 - 87.7 MB
052 - Access Controls.mp4 - 87.6 MB
053 - Identification Authentication Authorization Accounting and IAM.mp4 - 128 MB
054 - Data Leakage.mp4 - 103 MB
055 - Data Backup.mp4 - 234 MB
056 - Data Recovery.mp4 - 29.4 MB
057 - QUIZ SOLUTION: Protecting Information - Questions answered and explained.mp4 - 91.3 MB
058 - What Is Penetration Testing?.mp4 - 39.7 MB
059 - What Does a Good Penetration Test Consist of?.mp4 - 136 MB
060 - Why Do a Penetration Test.mp4 - 130 MB
061 - Pre-Attack Phase: Contracts.mp4 - 31.4 MB
062 - Audit vs Vulnerability Assessment vs Penetration Test.mp4 - 27.8 MB
063 - Red vs Blue Team!.mp4 - 33.7 MB
064 - Types of Penetration Testing.mp4 - 84.4 MB
065 - Pre-Attack Phase: Rules of Engagement.mp4 - 27.6 MB
066 - Pre-Attack Phase: Understanding your Client's requirements.mp4 - 45.9 MB
067 - Pre-Attack Phase: Scope of a Penetration Test.mp4 - 80.5 MB
068 - Pre-Attack Phase: Information Gathering.mp4 - 74.3 MB
069 - Pre-Attack Phase: Two Types of Information Gathering.mp4 - 63.5 MB
070 - Attack Phase.mp4 - 16.7 MB
071 - Attack Phase: Penetrating the Perimeter.mp4 - 49 MB
072 - Attack Phase: Target Acquisition.mp4 - 32.3 MB
073 - Attack Phase: Privilege Escalation.mp4 - 33.4 MB
074 - Attack Phase: Execute, Implant, Retract.mp4 - 38.4 MB
075 - Post-Attack Phase.mp4 - 24.6 MB
076 - Security Testing Methodologies.mp4 - 81.3 MB
077 - QUIZ SOLUTION: Penetration Testing - Questions answered and explained.mp4 - 68.5 MB
078 - About Footprinting.mp4 - 35.6 MB
079 - Hacker State of Mind.mp4 - 62.8 MB
080 - Search Engine and Online Resources.mp4 - 206 MB
081 - Whois GeoIpLocation and DNS Interogation.mp4 - 153 MB
082 - Email Header Analysis.mp4 - 172 MB
083 - Getting an IP Address from an Email and More.mp4 - 175 MB
084 - Quick Look at a Website Certificate, Source Code and Traffic.mp4 - 178 MB
085 - How to Clone a Website and Extract Metadata from Files.mp4 - 195 MB
086 - Nmap and Traceroute.mp4 - 211 MB
087 - QUIZ SOLUTION: Footprinting - Questions answered and explained.mp4 - 57.7 MB
088 - Countermeasures and Best Practices.mp4 - 128 MB
089 - What Goes into a Footprinting Report?.mp4 - 59.3 MB
090 - QUIZ SOLUTION: Reports and Countermeasures - Questions answered and explained.mp4 - 52.5 MB
091 - Banner Grabbing.mp4 - 57.5 MB
092 - Drawing and Mapping Out Network Topologies.mp4 - 102 MB
093 - Scanning for Vulnerabilities.mp4 - 150 MB
094 - Enumeration.mp4 - 75.8 MB
095 - QUIZ SOLUTION: Network Scanning Techniques - Questions answered and explained.mp4 - 59.8 MB
096 - Password Cracking, Crunch, and Some Basics.mp4 - 178 MB
097 - Using Hydra for online password cracking.mp4 - 191 MB
098 - Hashcat: Environment Setup.mp4 - 187 MB
099 - HashCat: Installation.mp4 - 82.8 MB
100 - HashCat: Let Us Crack Some Passwords!.mp4 - 175 MB
101 - HashCat: Results and Recap.mp4 - 129 MB
102 - QUIZ SOLUTION: Password Cracking Techniques - Questions answered and explained.mp4 - 82.2 MB
103 - Reverse Shell and Remote Service Exploitation.mp4 - 194 MB
104 - Keylogger Intro and Environment Setup.mp4 - 124 MB
105 - Keylogger Source Code Download and Import.mp4 - 53.3 MB
106 - Keylogger Configuration.mp4 - 83.5 MB
107 - Keylogger Demo.mp4 - 141 MB
108 - Decrypting Keylogger Logs.mp4 - 95.7 MB
109 - QUIZ SOLUTION: Persistent Remote Access - Questions Answered and Explained.mp4 - 57.4 MB
110 - SandBox.mp4 - 182 MB
111 - How to Create a Safe Sandbox Environment.mp4 - 140 MB
112 - Anti-Malware Software Overview.mp4 - 115 MB
113 - Packing Malware.mp4 - 132 MB
114 - Rootkits.mp4 - 72.2 MB
115 - Hiding Files and Steganography.mp4 - 122 MB
116 - QUIZ SOLUTION: Hiding Malicious Programs - Questions Answered and Explained.mp4 - 40 MB
117 - Log Files: Covering Your Tracks.mp4 - 143 MB
118 - QUIZ SOLUTION: Covering Tracks and Destroying Evidence - Questions Answered and Explained.mp4 - 71.7 MB
119 - ARP Spoofing.mp4 - 183 MB
120 - MAC Address Spoofing.mp4 - 126 MB
121 - DHCP Starvation.mp4 - 75 MB
122 - QUIZ SOLUTION: Sniffing Techniques - Questions Answered and Explained.mp4 - 106 MB
123 - Capturing the WPA2 Handshake.mp4 - 152 MB
124 - Cracking WPA2 Passkey.mp4 - 170 MB
125 - QUIZ SOLUTION: Wireless Networks - Questions Answered and Explained.mp4 - 80.6 MB
126 - Social Engineering.mp4 - 178 MB
127 - Well Known Social Engineering Attacks: A Retrospective.mp4 - 120 MB
128 - QUIZ SOLUTION: Social Engineering - Questions Answered and Explained.mp4 - 61.9 MB
129 - What Is a Firewall? How Does It Work?.mp4 - 94.6 MB
130 - Firewall Usage, Logging, and Configuration.mp4 - 116 MB
131 - Evading Firewall GeoIpBock.mp4 - 185 MB
132 - QUIZ SOLUTION: Firewalls - Questions answered and explained.mp4 - 62.5 MB
133 - How to Set Up a Honeypot.mp4 - 144 MB
134 - How to grab traffic from a Honeypot.mp4 - 137 MB
135 - QUIZ SOLUTION: Honeypots - Questions Answered and Explained.mp4 - 56.1 MB
136 - OWASP - Open Web Application Security Project.mp4 - 52.4 MB
137 - XSS Cross Site Scripting.mp4 - 134 MB
138 - SQL Injections.mp4 - 180 MB
139 - QUIZ SOLUTION: Attacking Web Servers and Web Applications - Questions Answered and Explained.mp4 - 60.6 MB
140 - Cryptography Basics.mp4 - 79.2 MB
141 - Cryptography Common Algorithms and Message Digest.mp4 - 98.5 MB
142 - PKI Public Key Infrastructure.mp4 - 76 MB
143 - Cryptanalysis and Attack Vectors.mp4 - 110 MB
144 - Checksum and File Encryption.mp4 - 138 MB
145 - SSH RSA Demo.mp4 - 154 MB
146 - Storage Medium Encryption.mp4 - 148 MB
147 - QUIZ SOLUTION: Cryptography - Questions Answered and Explained.mp4 - 57.3 MB
148 - Final Practice Exam.mp4 - 62.9 MB
149 - Final Practice Exam Question and Answer overview part 1.mp4 - 120 MB
150 - Final Practice exam Question and Answer overview part 2.mp4 - 72.2 MB
151 - Final Practice exam Question and Answer overview part 3.mp4 - 117 MB
152 - Final Practice exam Question and Answer overview part 4.mp4 - 119 MB
Tracker | Seeder | Leecher |
udp://tracker.bitsearch.to:1337/announce | 0 | 0 |
udp://tracker.moeking.me:6969/announce | 0 | 2 |
udp://tracker.opentrackr.org:1337/announce | 0 | 4 |
udp://ipv4.tracker.harry.lu:80/announce | 0 | 0 |
udp://tracker.openbittorrent.com:80/announce | 0 | 2 |
udp://tracker.torrent.eu.org:451/announce | 0 | 3 |
udp://open.stealth.si:80/announce | 0 | 2 |
udp://p4p.arenabg.com:1337/announce | 0 | 1 |
udp://tracker4.itzmx.com:2710/announce | 0 | 0 |
udp://retracker.lanta-net.ru:2710/announce | 0 | 2 |
udp://tracker.tiny-vps.com:6969/announce | 0 | 3 |
udp://exodus.desync.com:6969/announce | 0 | 4 |
udp://explodie.org:6969/announce | 0 | 2 |
udp://tracker.internetwarriors.net:1337/announce | 0 | 5 |
- InfoHash: F08B3DD1D5D3972D4E7FA44487DB42AC0EE94A01
- Last Updated: Jan 25, 2022
- File Count: 152
- File Category: 1
- Tags: certified, ethical, hacker, linux, academy, prep, course
-
Minecraft 1.13.1 Cracked [Auto Installer] [Win Mac Linux]
Other/Image5.6K3.7K11 MB -
Minecraft 1.13.1 Cracked [Auto Installer] [Win Mac Linux]
Other/Image4.8K3.2K11 MB -
Kali Linux 32 bit ISO v1.0.7
Other/Program5K3.3K9.11 MB -
XMind 7 Pro Update 1 + Crack (Windows and Linux)
Other/Program2.8K1.9K9.98 MB -
XMind 7 Pro Update 1 + Crack (Windows and Linux)
Other/Program6.7K4.4K7.95 MB -
DEFT Linux - Computer Forensics Live CD
Other/Program4.2K2.8K9.91 MB -
Sonic Academy - KICK 2 v1.0.4 macOS
Other/DiskImage6.1K4.1K11.5 MB -
SHELL SCRIPTING IN LINUX
Other/Program3.5K2.3K10.3 MB -
Kali Linux 32 bit ISO v1.0.7
Other/Program2.3K1.6K9.11 MB
Similar Torrents
Comments (0)