message

239 - Certified Ethical Hacker (CEH) - Linux Academy's Prep Course

Likes 0 Dislikes 0
Seeders 0
Leechers 5
File Size 14.2 GB
Downloads 7
Uploaded Feb 19, 2020
Files
Trackers
More Info
Folder239 - Certified Ethical Hacker (CEH) - Linux Academy's Prep Course
File001 - About the Author.mp4 - 23.7 MB
File002 - About the Course.mp4 - 84.9 MB
File003 - Course Requirements.mp4 - 58.6 MB
File004 - How to Get Help.mp4 - 74.7 MB
File005 - About the Exam.mp4 - 141 MB
File006 - Chapter Introduction.mp4 - 29.6 MB
File007 - Common Terms (Hack Value, Vulnerability, Exploit, Payload).mp4 - 65.1 MB
File008 - Zero Day Attack.mp4 - 67.3 MB
File009 - Daisy Chaining.mp4 - 90.5 MB
File010 - QUIZ SOLUTION: Overview of Information Security - Questions answered and explained.mp4 - 61 MB
File011 - Chapter Introduction.mp4 - 9.27 MB
File012 - Threats vs Attacks.mp4 - 30.1 MB
File013 - Motives and Reasons Behind Cyber Security Attacks.mp4 - 32.2 MB
File014 - What Are the Means by Which Hackers Gain Access to Systems and Networks?.mp4 - 12.9 MB
File015 - Cloud Computing Threats.mp4 - 78.9 MB
File016 - Advanced Presistent Threats.mp4 - 25.2 MB
File017 - Viruses and Worms.mp4 - 39.7 MB
File018 - Ransomware.mp4 - 63.2 MB
File019 - Mobile Threats.mp4 - 44.6 MB
File020 - Modern Age Information Warfare.mp4 - 55.7 MB
File021 - Insider Attacks.mp4 - 21.8 MB
File022 - Phishing.mp4 - 28.9 MB
File023 - Web Application Threats.mp4 - 29.9 MB
File024 - Classification of Threats: Network Threats.mp4 - 34.3 MB
File025 - Clasification of Threats: Host Threats.mp4 - 29.1 MB
File026 - Clasification of Threats: Application Threats.mp4 - 46.8 MB
File027 - Classification of Attacks.mp4 - 148 MB
File028 - Botnets.mp4 - 35.7 MB
File029 - Laws, Standards, and Regulations.mp4 - 139 MB
File030 - QUIZ SOLUTION: Overview of Information Security Threats and Attacks - Questions answered and explained.mp4 - 70.3 MB
File031 - A Brief Look at the History of Hacking.mp4 - 125 MB
File032 - Types of Hackers.mp4 - 90.1 MB
File033 - What is Ethical Hacking? What is Its Purpose?.mp4 - 29.8 MB
File034 - Scope of Ethical Hacking.mp4 - 38.4 MB
File035 - Hacking Stages: Reconnaissance.mp4 - 25.9 MB
File036 - Hacking Stages: Scanning.mp4 - 19.7 MB
File037 - Hacking Stages: Gaining Access.mp4 - 6.84 MB
File038 - Hacking Stages: Maintaining Access.mp4 - 34.4 MB
File039 - Hacking Stages: Clearing Tracks.mp4 - 30.9 MB
File040 - QUIZ SOLUTION: History of Hacking - Questions answered and explained.mp4 - 86.6 MB
File041 - Chapter Introduction.mp4 - 60.2 MB
File042 - Information Assurance.mp4 - 142 MB
File043 - EISA and Information security management program.mp4 - 124 MB
File044 - Network Zoning.mp4 - 163 MB
File045 - Defense in Depth.mp4 - 137 MB
File046 - What Sort of Things Do Policies Regulate?.mp4 - 158 MB
File047 - Workplace Security Policies and Examples.mp4 - 114 MB
File048 - Physical Security Controls and Risk.mp4 - 122 MB
File049 - Risk Management.mp4 - 133 MB
File050 - Threat Modeling and Incident Management.mp4 - 223 MB
File051 - UBA - User Behavior Analytics and Network Security Controls.mp4 - 87.7 MB
File052 - Access Controls.mp4 - 87.6 MB
File053 - Identification Authentication Authorization Accounting and IAM.mp4 - 128 MB
File054 - Data Leakage.mp4 - 103 MB
File055 - Data Backup.mp4 - 234 MB
File056 - Data Recovery.mp4 - 29.4 MB
File057 - QUIZ SOLUTION: Protecting Information - Questions answered and explained.mp4 - 91.3 MB
File058 - What Is Penetration Testing?.mp4 - 39.7 MB
File059 - What Does a Good Penetration Test Consist of?.mp4 - 136 MB
File060 - Why Do a Penetration Test.mp4 - 130 MB
File061 - Pre-Attack Phase: Contracts.mp4 - 31.4 MB
File062 - Audit vs Vulnerability Assessment vs Penetration Test.mp4 - 27.8 MB
File063 - Red vs Blue Team!.mp4 - 33.7 MB
File064 - Types of Penetration Testing.mp4 - 84.4 MB
File065 - Pre-Attack Phase: Rules of Engagement.mp4 - 27.6 MB
File066 - Pre-Attack Phase: Understanding your Client's requirements.mp4 - 45.9 MB
File067 - Pre-Attack Phase: Scope of a Penetration Test.mp4 - 80.5 MB
File068 - Pre-Attack Phase: Information Gathering.mp4 - 74.3 MB
File069 - Pre-Attack Phase: Two Types of Information Gathering.mp4 - 63.5 MB
File070 - Attack Phase.mp4 - 16.7 MB
File071 - Attack Phase: Penetrating the Perimeter.mp4 - 49 MB
File072 - Attack Phase: Target Acquisition.mp4 - 32.3 MB
File073 - Attack Phase: Privilege Escalation.mp4 - 33.4 MB
File074 - Attack Phase: Execute, Implant, Retract.mp4 - 38.4 MB
File075 - Post-Attack Phase.mp4 - 24.6 MB
File076 - Security Testing Methodologies.mp4 - 81.3 MB
File077 - QUIZ SOLUTION: Penetration Testing - Questions answered and explained.mp4 - 68.5 MB
File078 - About Footprinting.mp4 - 35.6 MB
File079 - Hacker State of Mind.mp4 - 62.8 MB
File080 - Search Engine and Online Resources.mp4 - 206 MB
File081 - Whois GeoIpLocation and DNS Interogation.mp4 - 153 MB
File082 - Email Header Analysis.mp4 - 172 MB
File083 - Getting an IP Address from an Email and More.mp4 - 175 MB
File084 - Quick Look at a Website Certificate, Source Code and Traffic.mp4 - 178 MB
File085 - How to Clone a Website and Extract Metadata from Files.mp4 - 195 MB
File086 - Nmap and Traceroute.mp4 - 211 MB
File087 - QUIZ SOLUTION: Footprinting - Questions answered and explained.mp4 - 57.7 MB
File088 - Countermeasures and Best Practices.mp4 - 128 MB
File089 - What Goes into a Footprinting Report?.mp4 - 59.3 MB
File090 - QUIZ SOLUTION: Reports and Countermeasures - Questions answered and explained.mp4 - 52.5 MB
File091 - Banner Grabbing.mp4 - 57.5 MB
File092 - Drawing and Mapping Out Network Topologies.mp4 - 102 MB
File093 - Scanning for Vulnerabilities.mp4 - 150 MB
File094 - Enumeration.mp4 - 75.8 MB
File095 - QUIZ SOLUTION: Network Scanning Techniques - Questions answered and explained.mp4 - 59.8 MB
File096 - Password Cracking, Crunch, and Some Basics.mp4 - 178 MB
File097 - Using Hydra for online password cracking.mp4 - 191 MB
File098 - Hashcat: Environment Setup.mp4 - 187 MB
File099 - HashCat: Installation.mp4 - 82.8 MB
File100 - HashCat: Let Us Crack Some Passwords!.mp4 - 175 MB
File101 - HashCat: Results and Recap.mp4 - 129 MB
File102 - QUIZ SOLUTION: Password Cracking Techniques - Questions answered and explained.mp4 - 82.2 MB
File103 - Reverse Shell and Remote Service Exploitation.mp4 - 194 MB
File104 - Keylogger Intro and Environment Setup.mp4 - 124 MB
File105 - Keylogger Source Code Download and Import.mp4 - 53.3 MB
File106 - Keylogger Configuration.mp4 - 83.5 MB
File107 - Keylogger Demo.mp4 - 141 MB
File108 - Decrypting Keylogger Logs.mp4 - 95.7 MB
File109 - QUIZ SOLUTION: Persistent Remote Access - Questions Answered and Explained.mp4 - 57.4 MB
File110 - SandBox.mp4 - 182 MB
File111 - How to Create a Safe Sandbox Environment.mp4 - 140 MB
File112 - Anti-Malware Software Overview.mp4 - 115 MB
File113 - Packing Malware.mp4 - 132 MB
File114 - Rootkits.mp4 - 72.2 MB
File115 - Hiding Files and Steganography.mp4 - 122 MB
File116 - QUIZ SOLUTION: Hiding Malicious Programs - Questions Answered and Explained.mp4 - 40 MB
File117 - Log Files: Covering Your Tracks.mp4 - 143 MB
File118 - QUIZ SOLUTION: Covering Tracks and Destroying Evidence - Questions Answered and Explained.mp4 - 71.7 MB
File119 - ARP Spoofing.mp4 - 183 MB
File120 - MAC Address Spoofing.mp4 - 126 MB
File121 - DHCP Starvation.mp4 - 75 MB
File122 - QUIZ SOLUTION: Sniffing Techniques - Questions Answered and Explained.mp4 - 106 MB
File123 - Capturing the WPA2 Handshake.mp4 - 152 MB
File124 - Cracking WPA2 Passkey.mp4 - 170 MB
File125 - QUIZ SOLUTION: Wireless Networks - Questions Answered and Explained.mp4 - 80.6 MB
File126 - Social Engineering.mp4 - 178 MB
File127 - Well Known Social Engineering Attacks: A Retrospective.mp4 - 120 MB
File128 - QUIZ SOLUTION: Social Engineering - Questions Answered and Explained.mp4 - 61.9 MB
File129 - What Is a Firewall? How Does It Work?.mp4 - 94.6 MB
File130 - Firewall Usage, Logging, and Configuration.mp4 - 116 MB
File131 - Evading Firewall GeoIpBock.mp4 - 185 MB
File132 - QUIZ SOLUTION: Firewalls - Questions answered and explained.mp4 - 62.5 MB
File133 - How to Set Up a Honeypot.mp4 - 144 MB
File134 - How to grab traffic from a Honeypot.mp4 - 137 MB
File135 - QUIZ SOLUTION: Honeypots - Questions Answered and Explained.mp4 - 56.1 MB
File136 - OWASP - Open Web Application Security Project.mp4 - 52.4 MB
File137 - XSS Cross Site Scripting.mp4 - 134 MB
File138 - SQL Injections.mp4 - 180 MB
File139 - QUIZ SOLUTION: Attacking Web Servers and Web Applications - Questions Answered and Explained.mp4 - 60.6 MB
File140 - Cryptography Basics.mp4 - 79.2 MB
File141 - Cryptography Common Algorithms and Message Digest.mp4 - 98.5 MB
File142 - PKI Public Key Infrastructure.mp4 - 76 MB
File143 - Cryptanalysis and Attack Vectors.mp4 - 110 MB
File144 - Checksum and File Encryption.mp4 - 138 MB
File145 - SSH RSA Demo.mp4 - 154 MB
File146 - Storage Medium Encryption.mp4 - 148 MB
File147 - QUIZ SOLUTION: Cryptography - Questions Answered and Explained.mp4 - 57.3 MB
File148 - Final Practice Exam.mp4 - 62.9 MB
File149 - Final Practice Exam Question and Answer overview part 1.mp4 - 120 MB
File150 - Final Practice exam Question and Answer overview part 2.mp4 - 72.2 MB
File151 - Final Practice exam Question and Answer overview part 3.mp4 - 117 MB
File152 - Final Practice exam Question and Answer overview part 4.mp4 - 119 MB
Tracker Seeder Leecher
udp://tracker.bitsearch.to:1337/announce 0 0
udp://tracker.moeking.me:6969/announce 0 2
udp://tracker.opentrackr.org:1337/announce 0 4
udp://ipv4.tracker.harry.lu:80/announce 0 0
udp://tracker.openbittorrent.com:80/announce 0 2
udp://tracker.torrent.eu.org:451/announce 0 3
udp://open.stealth.si:80/announce 0 2
udp://p4p.arenabg.com:1337/announce 0 1
udp://tracker4.itzmx.com:2710/announce 0 0
udp://retracker.lanta-net.ru:2710/announce 0 2
udp://tracker.tiny-vps.com:6969/announce 0 3
udp://exodus.desync.com:6969/announce 0 4
udp://explodie.org:6969/announce 0 2
udp://tracker.internetwarriors.net:1337/announce 0 5
  • InfoHash: F08B3DD1D5D3972D4E7FA44487DB42AC0EE94A01
  • Last Updated: Jan 25, 2022
  • File Count: 152
  • File Category: 1
  • Tags: certified, ethical, hacker, linux, academy, prep, course
Comments (0)
 

Write your comment

Did you like this torrent? [Optional]