[ ] Udemy - Cyber Security for Absolute Beginners - Essential Concepts 收录时间:2023-05-25 12:27:21 文件大小:2GB 下载次数:1 最近下载:2023-05-25 12:27:21 磁力链接: magnet:?xt=urn:btih:cf8bdb8153c3025c5a3e2f0b30e0b4e0e1baa3c0 立即下载 复制链接 文件列表 ~Get Your Files Here !/8. Core Cyber Security Principles/5. Risk Management.mp4 80MB ~Get Your Files Here !/1. Course Introduction/5. Familiarizing Yourself with Udemy's Course Taking Interface.mp4 63MB ~Get Your Files Here !/2. Introduction to Cyber Security/4. The Current State of Cybersecurity in 2021 & 2022.mp4 56MB ~Get Your Files Here !/9. Fundamental Threat Countermeasures/12. Student Exercise #3 Exploring the Built-In Firewall (Windows and Mac OS).mp4 50MB ~Get Your Files Here !/7. Social Engineering & Email Based Threats/6. Email Spam, Spoofing, Phishing, and Pharming.mp4 46MB ~Get Your Files Here !/3. Understanding Hackers/2. What Hacking Isn’t.mp4 40MB ~Get Your Files Here !/7. Social Engineering & Email Based Threats/5. Social Engineering Phone Call Example #2.mp4 35MB ~Get Your Files Here !/4. Networking 101/10. Student Exercise 2 Identifying your MAC and IP Address (Windows and Mac OS).mp4 34MB ~Get Your Files Here !/10. Cyber Security in the Workplace/4. Application Development Security.mp4 31MB ~Get Your Files Here !/6. Additional Threats & Vulnerabilities/4. Protocol Spoofing.mp4 31MB ~Get Your Files Here !/9. Fundamental Threat Countermeasures/11. Wireless Networking Security.mp4 31MB ~Get Your Files Here !/10. Cyber Security in the Workplace/3. Incident Response.mp4 30MB ~Get Your Files Here !/9. Fundamental Threat Countermeasures/5. Encryption.mp4 30MB ~Get Your Files Here !/7. Social Engineering & Email Based Threats/4. Social Engineering Phone Call Example #1.mp4 30MB ~Get Your Files Here !/10. Cyber Security in the Workplace/6. Risk Management Program.mp4 29MB ~Get Your Files Here !/5. Malware Threats/5. Ransomware and Rootkits.mp4 28MB ~Get Your Files Here !/4. Networking 101/7. Switches versus Routers.mp4 28MB ~Get Your Files Here !/4. Networking 101/9. How the Internet Works (Simplified).mp4 27MB ~Get Your Files Here !/6. Additional Threats & Vulnerabilities/8. Evil Twin and Rogue Access Points.mp4 27MB ~Get Your Files Here !/7. Social Engineering & Email Based Threats/3. Social Engineering Scenarios Overview.mp4 27MB ~Get Your Files Here !/9. Fundamental Threat Countermeasures/6. Firewalls.mp4 25MB ~Get Your Files Here !/2. Introduction to Cyber Security/2. What is Cyber Security.mp4 24MB ~Get Your Files Here !/6. Additional Threats & Vulnerabilities/3. Buffer Overflows.mp4 24MB ~Get Your Files Here !/3. Understanding Hackers/5. The Hacking Methodology.mp4 24MB ~Get Your Files Here !/6. Additional Threats & Vulnerabilities/7. Web-Based Attacks.mp4 24MB ~Get Your Files Here !/2. Introduction to Cyber Security/3. Why Do We Need Cyber Security.mp4 23MB ~Get Your Files Here !/10. Cyber Security in the Workplace/2. Patch Management & Change Management.mp4 23MB ~Get Your Files Here !/9. Fundamental Threat Countermeasures/7. Intrusion Detection & Prevention Systems (IDSIPS).mp4 23MB ~Get Your Files Here !/1. Course Introduction/1. Welcome to the Course!.mp4 22MB ~Get Your Files Here !/7. Social Engineering & Email Based Threats/2. Social Engineering Attacks.mp4 22MB ~Get Your Files Here !/10. Cyber Security in the Workplace/8. Training, Eduation and Awareness.mp4 22MB ~Get Your Files Here !/4. Networking 101/8. TCPIP Protocol Suite.mp4 21MB ~Get Your Files Here !/9. Fundamental Threat Countermeasures/3. Password Best Practices.mp4 21MB ~Get Your Files Here !/6. Additional Threats & Vulnerabilities/6. Weak Encryption Key & Software Vulnerability Attacks.mp4 21MB ~Get Your Files Here !/10. Cyber Security in the Workplace/7. Personnel Policies.mp4 21MB ~Get Your Files Here !/5. Malware Threats/6. How Hackers Deploy Malware.mp4 20MB ~Get Your Files Here !/4. Networking 101/1. Section Introduction.mp4 20MB ~Get Your Files Here !/5. Malware Threats/2. Viruses and Worms.mp4 20MB ~Get Your Files Here !/11. Conclusion & Next Steps/1. Congratulations.mp4 20MB ~Get Your Files Here !/9. Fundamental Threat Countermeasures/10. Virtual Private Network (VPN).mp4 20MB ~Get Your Files Here !/8. Core Cyber Security Principles/2. The CIA Triad.mp4 19MB ~Get Your Files Here !/9. Fundamental Threat Countermeasures/4. Endpoint Protection.mp4 19MB ~Get Your Files Here !/1. Course Introduction/4. Course Case Studies Overview.mp4 19MB ~Get Your Files Here !/10. Cyber Security in the Workplace/5. Security Assessments.mp4 19MB ~Get Your Files Here !/9. Fundamental Threat Countermeasures/8. Utilizing a Network DMZ.mp4 19MB ~Get Your Files Here !/4. Networking 101/5. LANs versus WANs.mp4 18MB ~Get Your Files Here !/3. Understanding Hackers/4. Hacker Motivations.mp4 18MB ~Get Your Files Here !/4. Networking 101/6. MAC versus IP Addresses.mp4 17MB ~Get Your Files Here !/1. Course Introduction/3. Course Companion Study Guide.mp4 16MB ~Get Your Files Here !/6. Additional Threats & Vulnerabilities/5. DoS and DDoS Attacks.mp4 16MB ~Get Your Files Here !/6. Additional Threats & Vulnerabilities/2. Zero-Day Attacks.mp4 15MB ~Get Your Files Here !/9. Fundamental Threat Countermeasures/2. Multi-Factor Authentication.mp4 15MB ~Get Your Files Here !/1. Course Introduction/2. Why Learn Cyber Security from Me.mp4 15MB ~Get Your Files Here !/8. Core Cyber Security Principles/4. Least Privilege.mp4 15MB ~Get Your Files Here !/5. Malware Threats/3. Trojan Horses and Logic Bombs.mp4 14MB ~Get Your Files Here !/9. Fundamental Threat Countermeasures/1. Section Introduction.mp4 14MB ~Get Your Files Here !/8. Core Cyber Security Principles/1. Section Introduction.mp4 13MB ~Get Your Files Here !/3. Understanding Hackers/1. Section Introduction.mp4 13MB ~Get Your Files Here !/4. Networking 101/4. Computer Protocols.mp4 13MB ~Get Your Files Here !/5. Malware Threats/4. Spyware and Adware.mp4 11MB ~Get Your Files Here !/2. Introduction to Cyber Security/1. Section Introduction.mp4 11MB ~Get Your Files Here !/10. Cyber Security in the Workplace/1. Section Introduction.mp4 11MB ~Get Your Files Here !/3. Understanding Hackers/3. Types of Hackers.mp4 10MB ~Get Your Files Here !/6. Additional Threats & Vulnerabilities/1. Section Introduction.mp4 10MB ~Get Your Files Here !/7. Social Engineering & Email Based Threats/1. Section Introduction.mp4 10MB ~Get Your Files Here !/4. Networking 101/3. Some Basic Networking Rules.mp4 9MB ~Get Your Files Here !/4. Networking 101/2. What is a Computer Network.mp4 8MB ~Get Your Files Here !/8. Core Cyber Security Principles/3. Defense in Depth.mp4 8MB ~Get Your Files Here !/5. Malware Threats/1. Section Introduction.mp4 8MB ~Get Your Files Here !/9. Fundamental Threat Countermeasures/9. Honeypot Decoys.mp4 8MB ~Get Your Files Here !/1. Course Introduction/3.1 Course Companion Study Guide.pdf 2MB ~Get Your Files Here !/1. Course Introduction/1. Welcome to the Course!.mp4.jpg 140KB ~Get Your Files Here !/8. Core Cyber Security Principles/5. Risk Management.srt 27KB ~Get Your Files Here !/7. Social Engineering & Email Based Threats/6. Email Spam, Spoofing, Phishing, and Pharming.srt 13KB ~Get Your Files Here !/1. Course Introduction/5. Familiarizing Yourself with Udemy's Course Taking Interface.srt 11KB ~Get Your Files Here !/3. Understanding Hackers/5. The Hacking Methodology.srt 11KB ~Get Your Files Here !/6. Additional Threats & Vulnerabilities/4. Protocol Spoofing.srt 11KB ~Get Your Files Here !/2. Introduction to Cyber Security/4. The Current State of Cybersecurity in 2021 & 2022.srt 10KB ~Get Your Files Here !/9. Fundamental Threat Countermeasures/12. Student Exercise #3 Exploring the Built-In Firewall (Windows and Mac OS).srt 9KB ~Get Your Files Here !/10. Cyber Security in the Workplace/3. Incident Response.srt 9KB ~Get Your Files Here !/9. Fundamental Threat Countermeasures/5. Encryption.srt 9KB ~Get Your Files Here !/10. Cyber Security in the Workplace/4. Application Development Security.srt 8KB ~Get Your Files Here !/9. Fundamental Threat Countermeasures/11. Wireless Networking Security.srt 8KB ~Get Your Files Here !/4. Networking 101/7. Switches versus Routers.srt 8KB ~Get Your Files Here !/6. Additional Threats & Vulnerabilities/7. Web-Based Attacks.srt 8KB ~Get Your Files Here !/10. Cyber Security in the Workplace/6. Risk Management Program.srt 8KB ~Get Your Files Here !/2. Introduction to Cyber Security/3. Why Do We Need Cyber Security.srt 8KB ~Get Your Files Here !/8. Core Cyber Security Principles/2. The CIA Triad.srt 8KB ~Get Your Files Here !/9. Fundamental Threat Countermeasures/3. Password Best Practices.srt 7KB ~Get Your Files Here !/9. Fundamental Threat Countermeasures/6. Firewalls.srt 7KB ~Get Your Files Here !/10. Cyber Security in the Workplace/8. Training, Eduation and Awareness.srt 7KB ~Get Your Files Here !/6. Additional Threats & Vulnerabilities/8. Evil Twin and Rogue Access Points.srt 7KB ~Get Your Files Here !/10. Cyber Security in the Workplace/7. Personnel Policies.srt 7KB ~Get Your Files Here !/10. Cyber Security in the Workplace/2. Patch Management & Change Management.srt 7KB ~Get Your Files Here !/6. Additional Threats & Vulnerabilities/3. Buffer Overflows.srt 7KB ~Get Your Files Here !/7. Social Engineering & Email Based Threats/2. Social Engineering Attacks.srt 7KB ~Get Your Files Here !/5. Malware Threats/5. Ransomware and Rootkits.srt 6KB ~Get Your Files Here !/9. Fundamental Threat Countermeasures/4. Endpoint Protection.srt 6KB ~Get Your Files Here !/4. Networking 101/9. How the Internet Works (Simplified).srt 6KB ~Get Your Files Here !/9. Fundamental Threat Countermeasures/7. Intrusion Detection & Prevention Systems (IDSIPS).srt 6KB ~Get Your Files Here !/1. Course Introduction/1. Welcome to the Course!.srt 6KB ~Get Your Files Here !/8. Core Cyber Security Principles/4. Least Privilege.srt 6KB ~Get Your Files Here !/5. Malware Threats/2. Viruses and Worms.srt 6KB ~Get Your Files Here !/10. Cyber Security in the Workplace/5. Security Assessments.srt 6KB ~Get Your Files Here !/4. Networking 101/5. LANs versus WANs.srt 6KB ~Get Your Files Here !/4. Networking 101/10. Student Exercise 2 Identifying your MAC and IP Address (Windows and Mac OS).srt 6KB ~Get Your Files Here !/6. Additional Threats & Vulnerabilities/6. Weak Encryption Key & Software Vulnerability Attacks.srt 6KB ~Get Your Files Here !/4. Networking 101/8. TCPIP Protocol Suite.srt 6KB ~Get Your Files Here !/9. Fundamental Threat Countermeasures/2. Multi-Factor Authentication.srt 6KB ~Get Your Files Here !/3. Understanding Hackers/4. Hacker Motivations.srt 5KB ~Get Your Files Here !/9. Fundamental Threat Countermeasures/10. Virtual Private Network (VPN).srt 5KB ~Get Your Files Here !/5. Malware Threats/6. How Hackers Deploy Malware.srt 5KB ~Get Your Files Here !/9. Fundamental Threat Countermeasures/8. Utilizing a Network DMZ.srt 5KB ~Get Your Files Here !/5. Malware Threats/3. Trojan Horses and Logic Bombs.srt 5KB ~Get Your Files Here !/4. Networking 101/6. MAC versus IP Addresses.srt 5KB ~Get Your Files Here !/6. Additional Threats & Vulnerabilities/5. DoS and DDoS Attacks.srt 5KB ~Get Your Files Here !/2. Introduction to Cyber Security/2. What is Cyber Security.srt 5KB ~Get Your Files Here !/5. Malware Threats/4. Spyware and Adware.srt 4KB ~Get Your Files Here !/4. Networking 101/4. Computer Protocols.srt 4KB ~Get Your Files Here !/1. Course Introduction/2. Why Learn Cyber Security from Me.srt 4KB ~Get Your Files Here !/6. Additional Threats & Vulnerabilities/2. Zero-Day Attacks.srt 4KB ~Get Your Files Here !/3. Understanding Hackers/3. Types of Hackers.srt 4KB ~Get Your Files Here !/3. Understanding Hackers/2. What Hacking Isn’t.srt 3KB ~Get Your Files Here !/8. Core Cyber Security Principles/3. Defense in Depth.srt 3KB ~Get Your Files Here !/4. Networking 101/3. Some Basic Networking Rules.srt 3KB ~Get Your Files Here !/4. Networking 101/2. What is a Computer Network.srt 3KB ~Get Your Files Here !/5. Malware Threats/7. Case Study Colonial Pipeline.html 2KB ~Get Your Files Here !/7. Social Engineering & Email Based Threats/5. Social Engineering Phone Call Example #2.srt 2KB ~Get Your Files Here !/7. Social Engineering & Email Based Threats/4. Social Engineering Phone Call Example #1.srt 2KB ~Get Your Files Here !/7. Social Engineering & Email Based Threats/3. Social Engineering Scenarios Overview.srt 2KB ~Get Your Files Here !/9. Fundamental Threat Countermeasures/9. Honeypot Decoys.srt 2KB ~Get Your Files Here !/6. Additional Threats & Vulnerabilities/9. Case Study TJX Companies Inc. (TJX).html 2KB ~Get Your Files Here !/4. Networking 101/1. Section Introduction.srt 2KB ~Get Your Files Here !/11. Conclusion & Next Steps/1. Congratulations.srt 2KB ~Get Your Files Here !/1. Course Introduction/4. Course Case Studies Overview.srt 1KB ~Get Your Files Here !/1. Course Introduction/3. Course Companion Study Guide.srt 1KB ~Get Your Files Here !/1. Course Introduction/8. Udemy Mobile App for iOS & Android - Download & Take Course Videos On the Go!.html 1KB ~Get Your Files Here !/3. Understanding Hackers/1. Section Introduction.srt 1KB ~Get Your Files Here !/1. Course Introduction/7. Join our Facebook Student Community.html 1KB ~Get Your Files Here !/8. Core Cyber Security Principles/1. Section Introduction.srt 1KB ~Get Your Files Here !/1. Course Introduction/6. How to Access Course Subtitles & Transcripts.html 1KB ~Get Your Files Here !/9. Fundamental Threat Countermeasures/1. Section Introduction.srt 1KB ~Get Your Files Here !/7. Social Engineering & Email Based Threats/1. Section Introduction.srt 964B ~Get Your Files Here !/6. Additional Threats & Vulnerabilities/1. Section Introduction.srt 877B ~Get Your Files Here !/10. Cyber Security in the Workplace/1. Section Introduction.srt 832B ~Get Your Files Here !/2. Introduction to Cyber Security/1. Section Introduction.srt 756B ~Get Your Files Here !/5. Malware Threats/1. Section Introduction.srt 687B ~Get Your Files Here !/11. Conclusion & Next Steps/2. How to Download Your Udemy Course Certificate of Completion.html 659B ~Get Your Files Here !/Bonus Resources.txt 386B ~Get Your Files Here !/1. Course Introduction/9. Student Exercise Introduce Yourself.html 281B Get Bonus Downloads Here.url 182B