589689.xyz

[ ] Udemy - Social Engineering - Zero to Hero in Social Engineering!

  • 收录时间:2022-02-07 03:42:11
  • 文件大小:517MB
  • 下载次数:1
  • 最近下载:2022-02-07 03:42:11
  • 磁力链接:

文件列表

  1. ~Get Your Files Here !/1. Introduction/2. Security basics a brief history…..mp4 67MB
  2. ~Get Your Files Here !/2. The social engineering attacks/5. Social validation.mp4 45MB
  3. ~Get Your Files Here !/1. Introduction/1. Introduction What is social engineering.mp4 44MB
  4. ~Get Your Files Here !/3. Bonus section!/1. Shoulder surfing.mp4 38MB
  5. ~Get Your Files Here !/3. Bonus section!/2. Unclean desk.mp4 37MB
  6. ~Get Your Files Here !/2. The social engineering attacks/6. Phishing.mp4 35MB
  7. ~Get Your Files Here !/2. The social engineering attacks/11. Tailgating.mp4 29MB
  8. ~Get Your Files Here !/1. Introduction/4. Security basics what are security risks.mp4 26MB
  9. ~Get Your Files Here !/2. The social engineering attacks/7. Baiting.mp4 26MB
  10. ~Get Your Files Here !/2. The social engineering attacks/8. Pharming.mp4 26MB
  11. ~Get Your Files Here !/1. Introduction/3. A classic (and real) a social engineering attack.mp4 24MB
  12. ~Get Your Files Here !/2. The social engineering attacks/10. Quid Pro Quo.mp4 21MB
  13. ~Get Your Files Here !/2. The social engineering attacks/4. Scarcity.mp4 19MB
  14. ~Get Your Files Here !/2. The social engineering attacks/1. Authority.mp4 18MB
  15. ~Get Your Files Here !/1. Introduction/5. Security basics types of “hackers”.mp4 17MB
  16. ~Get Your Files Here !/2. The social engineering attacks/9. IVR or Phone Phishing.mp4 17MB
  17. ~Get Your Files Here !/1. Introduction/6. The weakest link.mp4 11MB
  18. ~Get Your Files Here !/2. The social engineering attacks/2. Deceptive Relationships.mp4 9MB
  19. ~Get Your Files Here !/2. The social engineering attacks/3. Overloading.mp4 8MB
  20. ~Get Your Files Here !/1. Introduction/2. Security basics a brief history…..srt 4KB
  21. ~Get Your Files Here !/2. The social engineering attacks/5. Social validation.srt 4KB
  22. ~Get Your Files Here !/3. Bonus section!/1. Shoulder surfing.srt 4KB
  23. ~Get Your Files Here !/2. The social engineering attacks/6. Phishing.srt 4KB
  24. ~Get Your Files Here !/3. Bonus section!/2. Unclean desk.srt 3KB
  25. ~Get Your Files Here !/2. The social engineering attacks/7. Baiting.srt 3KB
  26. ~Get Your Files Here !/1. Introduction/4. Security basics what are security risks.srt 3KB
  27. ~Get Your Files Here !/2. The social engineering attacks/8. Pharming.srt 3KB
  28. ~Get Your Files Here !/2. The social engineering attacks/1. Authority.srt 3KB
  29. ~Get Your Files Here !/1. Introduction/6. The weakest link.srt 3KB
  30. ~Get Your Files Here !/1. Introduction/1. Introduction What is social engineering.srt 3KB
  31. ~Get Your Files Here !/2. The social engineering attacks/11. Tailgating.srt 3KB
  32. ~Get Your Files Here !/2. The social engineering attacks/10. Quid Pro Quo.srt 3KB
  33. ~Get Your Files Here !/2. The social engineering attacks/2. Deceptive Relationships.srt 2KB
  34. ~Get Your Files Here !/1. Introduction/3. A classic (and real) a social engineering attack.srt 2KB
  35. ~Get Your Files Here !/2. The social engineering attacks/4. Scarcity.srt 2KB
  36. ~Get Your Files Here !/1. Introduction/5. Security basics types of “hackers”.srt 2KB
  37. ~Get Your Files Here !/2. The social engineering attacks/3. Overloading.srt 2KB
  38. ~Get Your Files Here !/2. The social engineering attacks/9. IVR or Phone Phishing.srt 1KB
  39. ~Get Your Files Here !/Bonus Resources.txt 357B
  40. Get Bonus Downloads Here.url 183B