[ ] Udemy - Social Engineering - Zero to Hero in Social Engineering!
- 收录时间:2022-02-07 03:42:11
- 文件大小:517MB
- 下载次数:1
- 最近下载:2022-02-07 03:42:11
- 磁力链接:
-
文件列表
- ~Get Your Files Here !/1. Introduction/2. Security basics a brief history…..mp4 67MB
- ~Get Your Files Here !/2. The social engineering attacks/5. Social validation.mp4 45MB
- ~Get Your Files Here !/1. Introduction/1. Introduction What is social engineering.mp4 44MB
- ~Get Your Files Here !/3. Bonus section!/1. Shoulder surfing.mp4 38MB
- ~Get Your Files Here !/3. Bonus section!/2. Unclean desk.mp4 37MB
- ~Get Your Files Here !/2. The social engineering attacks/6. Phishing.mp4 35MB
- ~Get Your Files Here !/2. The social engineering attacks/11. Tailgating.mp4 29MB
- ~Get Your Files Here !/1. Introduction/4. Security basics what are security risks.mp4 26MB
- ~Get Your Files Here !/2. The social engineering attacks/7. Baiting.mp4 26MB
- ~Get Your Files Here !/2. The social engineering attacks/8. Pharming.mp4 26MB
- ~Get Your Files Here !/1. Introduction/3. A classic (and real) a social engineering attack.mp4 24MB
- ~Get Your Files Here !/2. The social engineering attacks/10. Quid Pro Quo.mp4 21MB
- ~Get Your Files Here !/2. The social engineering attacks/4. Scarcity.mp4 19MB
- ~Get Your Files Here !/2. The social engineering attacks/1. Authority.mp4 18MB
- ~Get Your Files Here !/1. Introduction/5. Security basics types of “hackers”.mp4 17MB
- ~Get Your Files Here !/2. The social engineering attacks/9. IVR or Phone Phishing.mp4 17MB
- ~Get Your Files Here !/1. Introduction/6. The weakest link.mp4 11MB
- ~Get Your Files Here !/2. The social engineering attacks/2. Deceptive Relationships.mp4 9MB
- ~Get Your Files Here !/2. The social engineering attacks/3. Overloading.mp4 8MB
- ~Get Your Files Here !/1. Introduction/2. Security basics a brief history…..srt 4KB
- ~Get Your Files Here !/2. The social engineering attacks/5. Social validation.srt 4KB
- ~Get Your Files Here !/3. Bonus section!/1. Shoulder surfing.srt 4KB
- ~Get Your Files Here !/2. The social engineering attacks/6. Phishing.srt 4KB
- ~Get Your Files Here !/3. Bonus section!/2. Unclean desk.srt 3KB
- ~Get Your Files Here !/2. The social engineering attacks/7. Baiting.srt 3KB
- ~Get Your Files Here !/1. Introduction/4. Security basics what are security risks.srt 3KB
- ~Get Your Files Here !/2. The social engineering attacks/8. Pharming.srt 3KB
- ~Get Your Files Here !/2. The social engineering attacks/1. Authority.srt 3KB
- ~Get Your Files Here !/1. Introduction/6. The weakest link.srt 3KB
- ~Get Your Files Here !/1. Introduction/1. Introduction What is social engineering.srt 3KB
- ~Get Your Files Here !/2. The social engineering attacks/11. Tailgating.srt 3KB
- ~Get Your Files Here !/2. The social engineering attacks/10. Quid Pro Quo.srt 3KB
- ~Get Your Files Here !/2. The social engineering attacks/2. Deceptive Relationships.srt 2KB
- ~Get Your Files Here !/1. Introduction/3. A classic (and real) a social engineering attack.srt 2KB
- ~Get Your Files Here !/2. The social engineering attacks/4. Scarcity.srt 2KB
- ~Get Your Files Here !/1. Introduction/5. Security basics types of “hackers”.srt 2KB
- ~Get Your Files Here !/2. The social engineering attacks/3. Overloading.srt 2KB
- ~Get Your Files Here !/2. The social engineering attacks/9. IVR or Phone Phishing.srt 1KB
- ~Get Your Files Here !/Bonus Resources.txt 357B
- Get Bonus Downloads Here.url 183B