589689.xyz

[ ] Udemy - Cyber Security for Absolute Beginners - Essential Concepts

  • 收录时间:2023-05-25 12:27:21
  • 文件大小:2GB
  • 下载次数:1
  • 最近下载:2023-05-25 12:27:21
  • 磁力链接:

文件列表

  1. ~Get Your Files Here !/8. Core Cyber Security Principles/5. Risk Management.mp4 80MB
  2. ~Get Your Files Here !/1. Course Introduction/5. Familiarizing Yourself with Udemy's Course Taking Interface.mp4 63MB
  3. ~Get Your Files Here !/2. Introduction to Cyber Security/4. The Current State of Cybersecurity in 2021 & 2022.mp4 56MB
  4. ~Get Your Files Here !/9. Fundamental Threat Countermeasures/12. Student Exercise #3 Exploring the Built-In Firewall (Windows and Mac OS).mp4 50MB
  5. ~Get Your Files Here !/7. Social Engineering & Email Based Threats/6. Email Spam, Spoofing, Phishing, and Pharming.mp4 46MB
  6. ~Get Your Files Here !/3. Understanding Hackers/2. What Hacking Isn’t.mp4 40MB
  7. ~Get Your Files Here !/7. Social Engineering & Email Based Threats/5. Social Engineering Phone Call Example #2.mp4 35MB
  8. ~Get Your Files Here !/4. Networking 101/10. Student Exercise 2 Identifying your MAC and IP Address (Windows and Mac OS).mp4 34MB
  9. ~Get Your Files Here !/10. Cyber Security in the Workplace/4. Application Development Security.mp4 31MB
  10. ~Get Your Files Here !/6. Additional Threats & Vulnerabilities/4. Protocol Spoofing.mp4 31MB
  11. ~Get Your Files Here !/9. Fundamental Threat Countermeasures/11. Wireless Networking Security.mp4 31MB
  12. ~Get Your Files Here !/10. Cyber Security in the Workplace/3. Incident Response.mp4 30MB
  13. ~Get Your Files Here !/9. Fundamental Threat Countermeasures/5. Encryption.mp4 30MB
  14. ~Get Your Files Here !/7. Social Engineering & Email Based Threats/4. Social Engineering Phone Call Example #1.mp4 30MB
  15. ~Get Your Files Here !/10. Cyber Security in the Workplace/6. Risk Management Program.mp4 29MB
  16. ~Get Your Files Here !/5. Malware Threats/5. Ransomware and Rootkits.mp4 28MB
  17. ~Get Your Files Here !/4. Networking 101/7. Switches versus Routers.mp4 28MB
  18. ~Get Your Files Here !/4. Networking 101/9. How the Internet Works (Simplified).mp4 27MB
  19. ~Get Your Files Here !/6. Additional Threats & Vulnerabilities/8. Evil Twin and Rogue Access Points.mp4 27MB
  20. ~Get Your Files Here !/7. Social Engineering & Email Based Threats/3. Social Engineering Scenarios Overview.mp4 27MB
  21. ~Get Your Files Here !/9. Fundamental Threat Countermeasures/6. Firewalls.mp4 25MB
  22. ~Get Your Files Here !/2. Introduction to Cyber Security/2. What is Cyber Security.mp4 24MB
  23. ~Get Your Files Here !/6. Additional Threats & Vulnerabilities/3. Buffer Overflows.mp4 24MB
  24. ~Get Your Files Here !/3. Understanding Hackers/5. The Hacking Methodology.mp4 24MB
  25. ~Get Your Files Here !/6. Additional Threats & Vulnerabilities/7. Web-Based Attacks.mp4 24MB
  26. ~Get Your Files Here !/2. Introduction to Cyber Security/3. Why Do We Need Cyber Security.mp4 23MB
  27. ~Get Your Files Here !/10. Cyber Security in the Workplace/2. Patch Management & Change Management.mp4 23MB
  28. ~Get Your Files Here !/9. Fundamental Threat Countermeasures/7. Intrusion Detection & Prevention Systems (IDSIPS).mp4 23MB
  29. ~Get Your Files Here !/1. Course Introduction/1. Welcome to the Course!.mp4 22MB
  30. ~Get Your Files Here !/7. Social Engineering & Email Based Threats/2. Social Engineering Attacks.mp4 22MB
  31. ~Get Your Files Here !/10. Cyber Security in the Workplace/8. Training, Eduation and Awareness.mp4 22MB
  32. ~Get Your Files Here !/4. Networking 101/8. TCPIP Protocol Suite.mp4 21MB
  33. ~Get Your Files Here !/9. Fundamental Threat Countermeasures/3. Password Best Practices.mp4 21MB
  34. ~Get Your Files Here !/6. Additional Threats & Vulnerabilities/6. Weak Encryption Key & Software Vulnerability Attacks.mp4 21MB
  35. ~Get Your Files Here !/10. Cyber Security in the Workplace/7. Personnel Policies.mp4 21MB
  36. ~Get Your Files Here !/5. Malware Threats/6. How Hackers Deploy Malware.mp4 20MB
  37. ~Get Your Files Here !/4. Networking 101/1. Section Introduction.mp4 20MB
  38. ~Get Your Files Here !/5. Malware Threats/2. Viruses and Worms.mp4 20MB
  39. ~Get Your Files Here !/11. Conclusion & Next Steps/1. Congratulations.mp4 20MB
  40. ~Get Your Files Here !/9. Fundamental Threat Countermeasures/10. Virtual Private Network (VPN).mp4 20MB
  41. ~Get Your Files Here !/8. Core Cyber Security Principles/2. The CIA Triad.mp4 19MB
  42. ~Get Your Files Here !/9. Fundamental Threat Countermeasures/4. Endpoint Protection.mp4 19MB
  43. ~Get Your Files Here !/1. Course Introduction/4. Course Case Studies Overview.mp4 19MB
  44. ~Get Your Files Here !/10. Cyber Security in the Workplace/5. Security Assessments.mp4 19MB
  45. ~Get Your Files Here !/9. Fundamental Threat Countermeasures/8. Utilizing a Network DMZ.mp4 19MB
  46. ~Get Your Files Here !/4. Networking 101/5. LANs versus WANs.mp4 18MB
  47. ~Get Your Files Here !/3. Understanding Hackers/4. Hacker Motivations.mp4 18MB
  48. ~Get Your Files Here !/4. Networking 101/6. MAC versus IP Addresses.mp4 17MB
  49. ~Get Your Files Here !/1. Course Introduction/3. Course Companion Study Guide.mp4 16MB
  50. ~Get Your Files Here !/6. Additional Threats & Vulnerabilities/5. DoS and DDoS Attacks.mp4 16MB
  51. ~Get Your Files Here !/6. Additional Threats & Vulnerabilities/2. Zero-Day Attacks.mp4 15MB
  52. ~Get Your Files Here !/9. Fundamental Threat Countermeasures/2. Multi-Factor Authentication.mp4 15MB
  53. ~Get Your Files Here !/1. Course Introduction/2. Why Learn Cyber Security from Me.mp4 15MB
  54. ~Get Your Files Here !/8. Core Cyber Security Principles/4. Least Privilege.mp4 15MB
  55. ~Get Your Files Here !/5. Malware Threats/3. Trojan Horses and Logic Bombs.mp4 14MB
  56. ~Get Your Files Here !/9. Fundamental Threat Countermeasures/1. Section Introduction.mp4 14MB
  57. ~Get Your Files Here !/8. Core Cyber Security Principles/1. Section Introduction.mp4 13MB
  58. ~Get Your Files Here !/3. Understanding Hackers/1. Section Introduction.mp4 13MB
  59. ~Get Your Files Here !/4. Networking 101/4. Computer Protocols.mp4 13MB
  60. ~Get Your Files Here !/5. Malware Threats/4. Spyware and Adware.mp4 11MB
  61. ~Get Your Files Here !/2. Introduction to Cyber Security/1. Section Introduction.mp4 11MB
  62. ~Get Your Files Here !/10. Cyber Security in the Workplace/1. Section Introduction.mp4 11MB
  63. ~Get Your Files Here !/3. Understanding Hackers/3. Types of Hackers.mp4 10MB
  64. ~Get Your Files Here !/6. Additional Threats & Vulnerabilities/1. Section Introduction.mp4 10MB
  65. ~Get Your Files Here !/7. Social Engineering & Email Based Threats/1. Section Introduction.mp4 10MB
  66. ~Get Your Files Here !/4. Networking 101/3. Some Basic Networking Rules.mp4 9MB
  67. ~Get Your Files Here !/4. Networking 101/2. What is a Computer Network.mp4 8MB
  68. ~Get Your Files Here !/8. Core Cyber Security Principles/3. Defense in Depth.mp4 8MB
  69. ~Get Your Files Here !/5. Malware Threats/1. Section Introduction.mp4 8MB
  70. ~Get Your Files Here !/9. Fundamental Threat Countermeasures/9. Honeypot Decoys.mp4 8MB
  71. ~Get Your Files Here !/1. Course Introduction/3.1 Course Companion Study Guide.pdf 2MB
  72. ~Get Your Files Here !/1. Course Introduction/1. Welcome to the Course!.mp4.jpg 140KB
  73. ~Get Your Files Here !/8. Core Cyber Security Principles/5. Risk Management.srt 27KB
  74. ~Get Your Files Here !/7. Social Engineering & Email Based Threats/6. Email Spam, Spoofing, Phishing, and Pharming.srt 13KB
  75. ~Get Your Files Here !/1. Course Introduction/5. Familiarizing Yourself with Udemy's Course Taking Interface.srt 11KB
  76. ~Get Your Files Here !/3. Understanding Hackers/5. The Hacking Methodology.srt 11KB
  77. ~Get Your Files Here !/6. Additional Threats & Vulnerabilities/4. Protocol Spoofing.srt 11KB
  78. ~Get Your Files Here !/2. Introduction to Cyber Security/4. The Current State of Cybersecurity in 2021 & 2022.srt 10KB
  79. ~Get Your Files Here !/9. Fundamental Threat Countermeasures/12. Student Exercise #3 Exploring the Built-In Firewall (Windows and Mac OS).srt 9KB
  80. ~Get Your Files Here !/10. Cyber Security in the Workplace/3. Incident Response.srt 9KB
  81. ~Get Your Files Here !/9. Fundamental Threat Countermeasures/5. Encryption.srt 9KB
  82. ~Get Your Files Here !/10. Cyber Security in the Workplace/4. Application Development Security.srt 8KB
  83. ~Get Your Files Here !/9. Fundamental Threat Countermeasures/11. Wireless Networking Security.srt 8KB
  84. ~Get Your Files Here !/4. Networking 101/7. Switches versus Routers.srt 8KB
  85. ~Get Your Files Here !/6. Additional Threats & Vulnerabilities/7. Web-Based Attacks.srt 8KB
  86. ~Get Your Files Here !/10. Cyber Security in the Workplace/6. Risk Management Program.srt 8KB
  87. ~Get Your Files Here !/2. Introduction to Cyber Security/3. Why Do We Need Cyber Security.srt 8KB
  88. ~Get Your Files Here !/8. Core Cyber Security Principles/2. The CIA Triad.srt 8KB
  89. ~Get Your Files Here !/9. Fundamental Threat Countermeasures/3. Password Best Practices.srt 7KB
  90. ~Get Your Files Here !/9. Fundamental Threat Countermeasures/6. Firewalls.srt 7KB
  91. ~Get Your Files Here !/10. Cyber Security in the Workplace/8. Training, Eduation and Awareness.srt 7KB
  92. ~Get Your Files Here !/6. Additional Threats & Vulnerabilities/8. Evil Twin and Rogue Access Points.srt 7KB
  93. ~Get Your Files Here !/10. Cyber Security in the Workplace/7. Personnel Policies.srt 7KB
  94. ~Get Your Files Here !/10. Cyber Security in the Workplace/2. Patch Management & Change Management.srt 7KB
  95. ~Get Your Files Here !/6. Additional Threats & Vulnerabilities/3. Buffer Overflows.srt 7KB
  96. ~Get Your Files Here !/7. Social Engineering & Email Based Threats/2. Social Engineering Attacks.srt 7KB
  97. ~Get Your Files Here !/5. Malware Threats/5. Ransomware and Rootkits.srt 6KB
  98. ~Get Your Files Here !/9. Fundamental Threat Countermeasures/4. Endpoint Protection.srt 6KB
  99. ~Get Your Files Here !/4. Networking 101/9. How the Internet Works (Simplified).srt 6KB
  100. ~Get Your Files Here !/9. Fundamental Threat Countermeasures/7. Intrusion Detection & Prevention Systems (IDSIPS).srt 6KB
  101. ~Get Your Files Here !/1. Course Introduction/1. Welcome to the Course!.srt 6KB
  102. ~Get Your Files Here !/8. Core Cyber Security Principles/4. Least Privilege.srt 6KB
  103. ~Get Your Files Here !/5. Malware Threats/2. Viruses and Worms.srt 6KB
  104. ~Get Your Files Here !/10. Cyber Security in the Workplace/5. Security Assessments.srt 6KB
  105. ~Get Your Files Here !/4. Networking 101/5. LANs versus WANs.srt 6KB
  106. ~Get Your Files Here !/4. Networking 101/10. Student Exercise 2 Identifying your MAC and IP Address (Windows and Mac OS).srt 6KB
  107. ~Get Your Files Here !/6. Additional Threats & Vulnerabilities/6. Weak Encryption Key & Software Vulnerability Attacks.srt 6KB
  108. ~Get Your Files Here !/4. Networking 101/8. TCPIP Protocol Suite.srt 6KB
  109. ~Get Your Files Here !/9. Fundamental Threat Countermeasures/2. Multi-Factor Authentication.srt 6KB
  110. ~Get Your Files Here !/3. Understanding Hackers/4. Hacker Motivations.srt 5KB
  111. ~Get Your Files Here !/9. Fundamental Threat Countermeasures/10. Virtual Private Network (VPN).srt 5KB
  112. ~Get Your Files Here !/5. Malware Threats/6. How Hackers Deploy Malware.srt 5KB
  113. ~Get Your Files Here !/9. Fundamental Threat Countermeasures/8. Utilizing a Network DMZ.srt 5KB
  114. ~Get Your Files Here !/5. Malware Threats/3. Trojan Horses and Logic Bombs.srt 5KB
  115. ~Get Your Files Here !/4. Networking 101/6. MAC versus IP Addresses.srt 5KB
  116. ~Get Your Files Here !/6. Additional Threats & Vulnerabilities/5. DoS and DDoS Attacks.srt 5KB
  117. ~Get Your Files Here !/2. Introduction to Cyber Security/2. What is Cyber Security.srt 5KB
  118. ~Get Your Files Here !/5. Malware Threats/4. Spyware and Adware.srt 4KB
  119. ~Get Your Files Here !/4. Networking 101/4. Computer Protocols.srt 4KB
  120. ~Get Your Files Here !/1. Course Introduction/2. Why Learn Cyber Security from Me.srt 4KB
  121. ~Get Your Files Here !/6. Additional Threats & Vulnerabilities/2. Zero-Day Attacks.srt 4KB
  122. ~Get Your Files Here !/3. Understanding Hackers/3. Types of Hackers.srt 4KB
  123. ~Get Your Files Here !/3. Understanding Hackers/2. What Hacking Isn’t.srt 3KB
  124. ~Get Your Files Here !/8. Core Cyber Security Principles/3. Defense in Depth.srt 3KB
  125. ~Get Your Files Here !/4. Networking 101/3. Some Basic Networking Rules.srt 3KB
  126. ~Get Your Files Here !/4. Networking 101/2. What is a Computer Network.srt 3KB
  127. ~Get Your Files Here !/5. Malware Threats/7. Case Study Colonial Pipeline.html 2KB
  128. ~Get Your Files Here !/7. Social Engineering & Email Based Threats/5. Social Engineering Phone Call Example #2.srt 2KB
  129. ~Get Your Files Here !/7. Social Engineering & Email Based Threats/4. Social Engineering Phone Call Example #1.srt 2KB
  130. ~Get Your Files Here !/7. Social Engineering & Email Based Threats/3. Social Engineering Scenarios Overview.srt 2KB
  131. ~Get Your Files Here !/9. Fundamental Threat Countermeasures/9. Honeypot Decoys.srt 2KB
  132. ~Get Your Files Here !/6. Additional Threats & Vulnerabilities/9. Case Study TJX Companies Inc. (TJX).html 2KB
  133. ~Get Your Files Here !/4. Networking 101/1. Section Introduction.srt 2KB
  134. ~Get Your Files Here !/11. Conclusion & Next Steps/1. Congratulations.srt 2KB
  135. ~Get Your Files Here !/1. Course Introduction/4. Course Case Studies Overview.srt 1KB
  136. ~Get Your Files Here !/1. Course Introduction/3. Course Companion Study Guide.srt 1KB
  137. ~Get Your Files Here !/1. Course Introduction/8. Udemy Mobile App for iOS & Android - Download & Take Course Videos On the Go!.html 1KB
  138. ~Get Your Files Here !/3. Understanding Hackers/1. Section Introduction.srt 1KB
  139. ~Get Your Files Here !/1. Course Introduction/7. Join our Facebook Student Community.html 1KB
  140. ~Get Your Files Here !/8. Core Cyber Security Principles/1. Section Introduction.srt 1KB
  141. ~Get Your Files Here !/1. Course Introduction/6. How to Access Course Subtitles & Transcripts.html 1KB
  142. ~Get Your Files Here !/9. Fundamental Threat Countermeasures/1. Section Introduction.srt 1KB
  143. ~Get Your Files Here !/7. Social Engineering & Email Based Threats/1. Section Introduction.srt 964B
  144. ~Get Your Files Here !/6. Additional Threats & Vulnerabilities/1. Section Introduction.srt 877B
  145. ~Get Your Files Here !/10. Cyber Security in the Workplace/1. Section Introduction.srt 832B
  146. ~Get Your Files Here !/2. Introduction to Cyber Security/1. Section Introduction.srt 756B
  147. ~Get Your Files Here !/5. Malware Threats/1. Section Introduction.srt 687B
  148. ~Get Your Files Here !/11. Conclusion & Next Steps/2. How to Download Your Udemy Course Certificate of Completion.html 659B
  149. ~Get Your Files Here !/Bonus Resources.txt 386B
  150. ~Get Your Files Here !/1. Course Introduction/9. Student Exercise Introduce Yourself.html 281B
  151. Get Bonus Downloads Here.url 182B