MuerBT磁力搜索 BT种子搜索利器 免费下载BT种子,超5000万条种子数据

[FreeAllCourse.Com] Udemy - Hacking in Practice Certified Ethical Hacking MEGA Course

磁力链接/BT种子名称

[FreeAllCourse.Com] Udemy - Hacking in Practice Certified Ethical Hacking MEGA Course

磁力链接/BT种子简介

种子哈希:f9a76b3330f136f3d27ceaf9507ff46d71cd13dd
文件大小: 4.79G
已经下载:602次
下载速度:极快
收录时间:2021-03-22
最近下载:2025-10-23

移花宫入口

移花宫.com邀月.com怜星.com花无缺.comyhgbt.icuyhgbt.top

磁力链接下载

magnet:?xt=urn:btih:F9A76B3330F136F3D27CEAF9507FF46D71CD13DD
推荐使用PIKPAK网盘下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看

下载BT种子文件

磁力链接 迅雷下载 PIKPAK在线播放 世界之窗 小蓝俱乐部 含羞草 欲漫涩 逼哩逼哩 成人快手 51品茶 母狗园 51动漫 91短视频 抖音Max 海王TV TikTok成人版 PornHub 暗网Xvideo 草榴社区 哆哔涩漫 呦乐园 萝莉岛 搜同 91暗网

最近搜索

明日见未来 复仇者联盟5 ftht-039 白洁 高颜值学院 avop-237 推特骚咪 美丽教师+1975 铃木美咲神里铃华 windows+server 疯狂动物城 李寻欢+甜甜女孩似初恋 骄阳似我 暗水 ssni-864 医院偷拍 91晚晚 dbw-03 hjmo-484 sone-929 laohucai hairy+pussy+vr 淫妻「ivy31330」 wanz-254 華町ココ 芭蕾 女尸 sone-842 教父探花 女鞋

文件列表

  • 01 Lets start/003 Course preview 15 min. long demo lecture. The whole training is 27 hours long.mp4 223.9 MB
  • 23 Rootkits and Stealth Apps Creating and Revealing v2.0 (course preview)/243 Wiriting a Shellcode.mp4 188.6 MB
  • 11 Operating Systems Security/114 EXERCISE Detecting rootkits.mp4 61.1 MB
  • 08 Designing Secure Computer Networks/070 Network Address translation.mp4 55.2 MB
  • 12 Access Control/124 KERBEROS.mp4 55.1 MB
  • 08 Designing Secure Computer Networks/071 Network access control RADIUS.mp4 50.8 MB
  • 11 Operating Systems Security/100 Operating systems security - introduction.mp4 50.4 MB
  • 11 Operating Systems Security/109 EXERCISE Vulnerability attacks.mp4 49.9 MB
  • 09 Network administration/081 Intrusion detection.mp4 48.6 MB
  • 13 Windows Security/135 Encryption - key protection.mp4 48.6 MB
  • 11 Operating Systems Security/112 EXERCISE Removing malware.mp4 48.1 MB
  • 12 Access Control/126 EXERCISE Offline attacks.mp4 47.9 MB
  • 05 IT Security Trends/032 Cyber War.mp4 47.6 MB
  • 11 Operating Systems Security/108 Malware.mp4 47.0 MB
  • 08 Designing Secure Computer Networks/068 Protocols and services IP SEC.mp4 45.9 MB
  • 09 Network administration/078 How to use Wireshark.mp4 45.7 MB
  • 12 Access Control/125 Identity Theft.mp4 45.0 MB
  • 09 Network administration/074 Monitoring Transmitted Data - Basic informations.mp4 43.1 MB
  • 13 Windows Security/132 Additional Security Features - ASLR and DEP.mp4 42.9 MB
  • 11 Operating Systems Security/103 EXERCISE OS boundaries.mp4 41.0 MB
  • 06 Data Security/034 Objective 1 - Data security - Introduction.mp4 40.7 MB
  • 09 Network administration/075 Intrusion detection systems.mp4 40.1 MB
  • 11 Operating Systems Security/111 Demonstration Process Explorer.mp4 40.0 MB
  • 09 Network administration/080 How to analyze telnet protocol.mp4 39.8 MB
  • 12 Access Control/127 Using online cracking services.mp4 39.5 MB
  • 07 Computer Network Security/054 OSI MODEL 6 - Presentation Layer.mp4 39.2 MB
  • 13 Windows Security/136 Drive encryption.mp4 39.1 MB
  • 10 Wireless Networks Security/090 Authentication methods.mp4 38.9 MB
  • 10 Wireless Networks Security/097 Client Attacks Denial of service.mp4 38.3 MB
  • 13 Windows Security/137 BitLocker.mp4 38.2 MB
  • 07 Computer Network Security/044 EXERCISE Data Link Layer Attack.mp4 37.0 MB
  • 09 Network administration/082 Scanning computers.mp4 37.0 MB
  • 13 Windows Security/131 UAC configuration.mp4 36.8 MB
  • 07 Computer Network Security/046 TCP Tunnelling over ICMP.mp4 36.7 MB
  • 13 Windows Security/139 File and folder encryption - EFS.mp4 36.2 MB
  • 10 Wireless Networks Security/095 Client Attacks Launching a rogue access point.mp4 35.2 MB
  • 06 Data Security/035 Integrity of data.mp4 33.7 MB
  • 05 IT Security Trends/030 Online privacy.mp4 33.6 MB
  • 13 Windows Security/130 User Account Control.mp4 33.6 MB
  • 12 Access Control/120 Authentication protocols and services.mp4 33.4 MB
  • 07 Computer Network Security/045 OSI MODEL 3 - Network layer.mp4 33.2 MB
  • 06 Data Security/037 Confidentiality of data.mp4 33.2 MB
  • 10 Wireless Networks Security/092 802.11I WPA.mp4 33.1 MB
  • 10 Wireless Networks Security/091 802.11 WEP.mp4 32.9 MB
  • 12 Access Control/118 Authentication users.mp4 32.9 MB
  • 07 Computer Network Security/043 Threats ARP Poisoning.mp4 32.8 MB
  • 09 Network administration/079 Analyzing Captured data.mp4 32.5 MB
  • 12 Access Control/122 LM Hash.mp4 32.2 MB
  • 09 Network administration/077 Wireshark - Introduction to network analysis.mp4 32.1 MB
  • 10 Wireless Networks Security/094 Threats of WIFI networks.mp4 32.0 MB
  • 08 Designing Secure Computer Networks/067 DMZ demilitarized Zone.mp4 31.7 MB
  • 11 Operating Systems Security/110 EXERCISE Identifying suspicious processes.mp4 31.4 MB
  • 11 Operating Systems Security/102 Three core.mp4 31.2 MB
  • 02 Application Security/010 Automated SQL Injection.mp4 30.9 MB
  • 10 Wireless Networks Security/086 WIFI - working principles.mp4 30.8 MB
  • 04 Popular IT Security Myths/022 Myths 1 - youll never be hacked.mp4 30.6 MB
  • 10 Wireless Networks Security/085 WIFI security solutions - introduction.mp4 30.6 MB
  • 08 Designing Secure Computer Networks/063 Subnetting IPv4.mp4 30.5 MB
  • 02 Application Security/011 Cross-site scripting - XSS.mp4 30.5 MB
  • 07 Computer Network Security/040 OSI MODEL 1 - Physical layer.mp4 30.4 MB
  • 11 Operating Systems Security/113 Rootkits.mp4 30.3 MB
  • 02 Application Security/008 EXERCISE Analyze the application.mp4 30.1 MB
  • 07 Computer Network Security/048 OSI MODEL 4 - Transport Layer.mp4 30.0 MB
  • 09 Network administration/076 Why are firewalls and NDIS not enough.mp4 29.6 MB
  • 04 Popular IT Security Myths/021 Popular myths about IT security - origins.mp4 29.3 MB
  • 07 Computer Network Security/042 Threats MAC spoofing.mp4 28.8 MB
  • 08 Designing Secure Computer Networks/066 IPv6 address notation.mp4 28.6 MB
  • 18 Application Security - Configuration and Management/212 EXERCISE Application control rules.mp4 28.5 MB
  • 11 Operating Systems Security/104 Process isolation.mp4 28.2 MB
  • 07 Computer Network Security/059 Modifying Transmitted Packets.mp4 28.1 MB
  • 07 Computer Network Security/051 EXERCISE Transport Layer Attack using METASPLOIT part 2.mp4 27.4 MB
  • 03 Introduction to Cyber Threats/017 IT Prehistory.mp4 27.1 MB
  • 04 Popular IT Security Myths/023 Myths 2 - you dont need any protection software or hardware.mp4 27.0 MB
  • 11 Operating Systems Security/105 Kernel Mode Code Signing.mp4 26.9 MB
  • 02 Application Security/006 Attacks on applications.mp4 26.7 MB
  • 19 Cryptography/216 History of ciphers.mp4 26.7 MB
  • 02 Application Security/014 Unsafe applications.mp4 26.2 MB
  • 03 Introduction to Cyber Threats/018 Lets look a few years back.mp4 24.8 MB
  • 19 Cryptography/215 Introduction to cryptography.mp4 24.7 MB
  • 06 Data Security/038 EXERCISE Finding confidential data with search engines.mp4 24.6 MB
  • 10 Wireless Networks Security/096 Client Attacks Evil twin.mp4 23.9 MB
  • 07 Computer Network Security/041 OSI MODEL 2 - Data link layer.mp4 23.9 MB
  • 20 Public Key Infrastructure/237 Planning the PKI.mp4 23.6 MB
  • 02 Application Security/009 Blind SQL Injection.mp4 23.6 MB
  • 15 Risk Management/167 Manipulation tactics.mp4 23.2 MB
  • 07 Computer Network Security/039 Network security - introduction.mp4 23.1 MB
  • 05 IT Security Trends/029 Fake identity.mp4 22.8 MB
  • 08 Designing Secure Computer Networks/069 IP SEC Phase 1.mp4 22.8 MB
  • 03 Introduction to Cyber Threats/019 Cyber crimes - an evolution not revolution.mp4 22.3 MB
  • 02 Application Security/005 Introduction to Application Security.mp4 22.3 MB
  • 11 Operating Systems Security/101 Security boundaries.mp4 22.2 MB
  • 20 Public Key Infrastructure/236 EXERCISE Certificates.mp4 21.6 MB
  • 03 Introduction to Cyber Threats/016 Introduction to Current Cyber Threats.mp4 21.5 MB
  • 15 Risk Management/171 Fraud tools 1.mp4 21.0 MB
  • 17 Disaster Recovery/203 CONFICKER CASE STUDY.mp4 21.0 MB
  • 20 Public Key Infrastructure/239 PKI Administration.mp4 20.6 MB
  • 05 IT Security Trends/031 Analyzing sniffing software.mp4 20.4 MB
  • 19 Cryptography/225 Asymmetric-key algorithms.mp4 20.0 MB
  • 15 Risk Management/168 EXERCISE Social Engineering attacks.mp4 19.9 MB
  • 07 Computer Network Security/056 EXERCISE Application Layer Attacks.mp4 19.9 MB
  • 10 Wireless Networks Security/089 Ineffective solutions.mp4 19.9 MB
  • 05 IT Security Trends/026 Trends in IT Security.mp4 19.6 MB
  • 11 Operating Systems Security/106 Java Virtual Machine and code access security.mp4 19.5 MB
  • 05 IT Security Trends/027 The birth of technology society.mp4 19.5 MB
  • 10 Wireless Networks Security/088 Threats and risks.mp4 19.4 MB
  • 13 Windows Security/138 BitLocker To Go Reader.mp4 19.3 MB
  • 17 Disaster Recovery/201 Collecting and analysing evidence.mp4 19.2 MB
  • 19 Cryptography/221 DES-X.mp4 19.1 MB
  • 15 Risk Management/161 Introduction to risk assessment.mp4 19.0 MB
  • 15 Risk Management/164 EXERCISE Risk Assessment.mp4 19.0 MB
  • 12 Access Control/123 Cached Credentials.mp4 19.0 MB
  • 18 Application Security - Configuration and Management/210 Blocking applications.mp4 18.9 MB
  • 02 Application Security/007 SQL Injection.mp4 18.8 MB
  • 11 Operating Systems Security/115 EXERCISE Security evaluation.mp4 18.7 MB
  • 15 Risk Management/172 Fraud tools 2.mp4 18.6 MB
  • 19 Cryptography/223 Block cipher modes.mp4 18.3 MB
  • 08 Designing Secure Computer Networks/064 Subnetting IPv6.mp4 18.3 MB
  • 15 Risk Management/155 Attack methods.mp4 18.1 MB
  • 18 Application Security - Configuration and Management/206 Managing applications.mp4 18.0 MB
  • 07 Computer Network Security/055 OSI MODEL 7 - Application Layer.mp4 17.7 MB
  • 18 Application Security - Configuration and Management/213 Isolating applications.mp4 17.7 MB
  • 07 Computer Network Security/049 Threats Enumerating Remote Computers.mp4 17.6 MB
  • 19 Cryptography/220 Data encryption standard.mp4 17.3 MB
  • 07 Computer Network Security/052 OSI MODEL 5 - Session Layer.mp4 17.2 MB
  • 18 Application Security - Configuration and Management/208 MS Update.mp4 17.0 MB
  • 20 Public Key Infrastructure/238 Certificate life cycle.mp4 17.0 MB
  • 15 Risk Management/169 SE with KALI BackTrack.mp4 16.9 MB
  • 16 Defence in Depth/176 DiD OS and LAN Layers.mp4 16.9 MB
  • 19 Cryptography/230 Hybrid Schemes.mp4 16.8 MB
  • 12 Access Control/119 How secure is your password.mp4 16.7 MB
  • 15 Risk Management/157 Target scanning and enumeration techniques 1.mp4 16.6 MB
  • 07 Computer Network Security/057 Backtrack Attack Demonstration.mp4 16.3 MB
  • 14 Security Policies/147 Why are security solutions fallible.mp4 16.2 MB
  • 19 Cryptography/229 Digital signature.mp4 16.2 MB
  • 19 Cryptography/219 Block ciphers.mp4 16.1 MB
  • 13 Windows Security/140 EXERCISE EFS.mp4 16.1 MB
  • 16 Defence in Depth/179 Automated attack targeting a service.mp4 15.9 MB
  • 19 Cryptography/217 Symmetric and asymmetric ciphers.mp4 15.8 MB
  • 17 Disaster Recovery/195 How to reduce losses.mp4 15.6 MB
  • 20 Public Key Infrastructure/233 Public key infrastructure.mp4 15.5 MB
  • 16 Defence in Depth/175 How to use Defence in Depth model.mp4 15.4 MB
  • 18 Application Security - Configuration and Management/211 Software restrictions policies.mp4 15.2 MB
  • 20 Public Key Infrastructure/235 What will PKI allow you.mp4 15.2 MB
  • 19 Cryptography/228 HASH functions.mp4 15.1 MB
  • 07 Computer Network Security/058 Man-in-the-Middle and Denial of Service Attacks.mp4 14.9 MB
  • 16 Defence in Depth/182 Introduction to Immutable laws of security - Law 1.mp4 14.7 MB
  • 15 Risk Management/163 DREAD Exploitability.mp4 14.6 MB
  • 16 Defence in Depth/192 Laws for administrators.mp4 14.5 MB
  • 14 Security Policies/151 STRIDE Spoofing identity.mp4 14.5 MB
  • 05 IT Security Trends/028 EXERCISE How much info can you gather.mp4 14.4 MB
  • 07 Computer Network Security/060 Unencrypted protocols.mp4 14.3 MB
  • 19 Cryptography/218 Symmetric-key algorithms.mp4 14.2 MB
  • 16 Defence in Depth/180 Automated user-targeting attack.mp4 14.1 MB
  • 14 Security Policies/149 Introduction to threat modelling and classification.mp4 13.9 MB
  • 17 Disaster Recovery/199 Audit users and keep control accounts.mp4 13.9 MB
  • 10 Wireless Networks Security/087 Other wireless technologies.mp4 13.8 MB
  • 16 Defence in Depth/177 DiD Perimeter and Physical Access Layers.mp4 13.5 MB
  • 14 Security Policies/152 STRIDE Tampering with Data.mp4 13.5 MB
  • 07 Computer Network Security/050 EXERCISE Transport Layer Attack using METASPLOIT part 1.mp4 13.5 MB
  • 14 Security Policies/146 Security issues.mp4 13.5 MB
  • 19 Cryptography/226 RSA.mp4 13.5 MB
  • 19 Cryptography/222 Advanced encryption standards.mp4 13.5 MB
  • 20 Public Key Infrastructure/234 Implementing public key infrastructure.mp4 13.4 MB
  • 15 Risk Management/162 DREAD Risk assessment model.mp4 13.3 MB
  • 14 Security Policies/148 Security policy issues.mp4 13.2 MB
  • 17 Disaster Recovery/197 Threat discovery 1.mp4 12.9 MB
  • 02 Application Security/013 Program security assessment.mp4 12.7 MB
  • 15 Risk Management/166 Introduction to Social Engineering and rogue software.mp4 12.0 MB
  • 08 Designing Secure Computer Networks/062 Designing Computer Networks - introduction.mp4 11.5 MB
  • 14 Security Policies/143 What is security.mp4 11.4 MB
  • 17 Disaster Recovery/196 Ensuring continous availability.mp4 11.3 MB
  • 17 Disaster Recovery/202 Forensics example.mp4 11.1 MB
  • 14 Security Policies/150 Threat modelling - STRIDE.mp4 11.1 MB
  • 14 Security Policies/153 STRIDE Denial of Service.mp4 10.9 MB
  • 14 Security Policies/144 Information security.mp4 10.8 MB
  • 14 Security Policies/145 Information security - level up.mp4 10.3 MB
  • 12 Access Control/117 Authentication and authorisation - Introduction.mp4 10.1 MB
  • 16 Defence in Depth/190 Law 9.mp4 9.7 MB
  • 10 Wireless Networks Security/098 EXERCISE WPA attack.mp4 9.3 MB
  • 17 Disaster Recovery/198 Threat discovery 2.mp4 9.3 MB
  • 16 Defence in Depth/186 Law 5.mp4 9.2 MB
  • 19 Cryptography/224 Stream Ciphers - RC4.mp4 9.0 MB
  • 15 Risk Management/158 Target scanning and enumeration techniques 2.mp4 8.8 MB
  • 17 Disaster Recovery/200 High risk users.mp4 8.3 MB
  • 15 Risk Management/156 Local attacks.mp4 8.3 MB
  • 13 Windows Security/133 PatchGuard.mp4 8.2 MB
  • 13 Windows Security/129 Windows Security - what youll learn.mp4 8.0 MB
  • 16 Defence in Depth/183 Law 2.mp4 8.0 MB
  • 15 Risk Management/170 Rogue Software.mp4 7.7 MB
  • 15 Risk Management/159 Passive scanning.mp4 7.5 MB
  • 16 Defence in Depth/178 DiD Demonstration.mp4 7.3 MB
  • 10 Wireless Networks Security/084 Wireless Networks.mp4 7.3 MB
  • 18 Application Security - Configuration and Management/209 System Center Configuration Manager.mp4 6.6 MB
  • 18 Application Security - Configuration and Management/207 Software updates.mp4 6.5 MB
  • 09 Network administration/073 Introduction to Monitoring Transmitted Data.mp4 6.5 MB
  • 04 Popular IT Security Myths/024 Myths 3 - IT security is always a priority.mp4 6.3 MB
  • 20 Public Key Infrastructure/232 Introduction to cryptology.mp4 6.3 MB
  • 16 Defence in Depth/185 Law 4.mp4 6.2 MB
  • 14 Security Policies/142 Security policies introduction.mp4 6.2 MB
  • 16 Defence in Depth/184 Law 3.mp4 6.1 MB
  • 16 Defence in Depth/187 Law 6.mp4 6.1 MB
  • 19 Cryptography/227 ELGAMAL.mp4 5.1 MB
  • 16 Defence in Depth/189 Law 8.mp4 4.8 MB
  • 16 Defence in Depth/174 Introduction to Defence in Depth.mp4 4.8 MB
  • 17 Disaster Recovery/194 Introduction to Disaster Recovery.mp4 4.6 MB
  • 11 Operating Systems Security/107 10-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 4.5 MB
  • 15 Risk Management/154 Introduction to Risk Management.mp4 4.1 MB
  • 18 Application Security - Configuration and Management/205 Heres what youll learn in this module.mp4 3.3 MB
  • 16 Defence in Depth/188 Law 7.mp4 3.0 MB
  • 15 Risk Management/173 03-3-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 3.0 MB
  • 12 Access Control/121 11-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 3.0 MB
  • 19 Cryptography/231 15-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 2.6 MB
  • 11 Operating Systems Security/116 10-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 2.6 MB
  • 17 Disaster Recovery/204 05-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 2.6 MB
  • 07 Computer Network Security/047 06-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 2.3 MB
  • 20 Public Key Infrastructure/241 16-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 2.3 MB
  • 07 Computer Network Security/061 06-3-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 2.3 MB
  • 12 Access Control/128 11-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 2.2 MB
  • 05 IT Security Trends/033 01-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 2.1 MB
  • 06 Data Security/036 01-3-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 2.1 MB
  • 16 Defence in Depth/191 Law 10.mp4 2.1 MB
  • 15 Risk Management/165 03-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.9 MB
  • 09 Network administration/083 08-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.9 MB
  • 10 Wireless Networks Security/099 09-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.8 MB
  • 02 Application Security/012 13-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.7 MB
  • 16 Defence in Depth/181 04-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.7 MB
  • 16 Defence in Depth/193 04-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.7 MB
  • 18 Application Security - Configuration and Management/214 14-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.7 MB
  • 15 Risk Management/160 03-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.7 MB
  • 13 Windows Security/141 12-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.7 MB
  • 03 Introduction to Cyber Threats/020 01-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.5 MB
  • 10 Wireless Networks Security/093 09-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.5 MB
  • 13 Windows Security/134 12-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.5 MB
  • 20 Public Key Infrastructure/240 02-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.5 MB
  • 08 Designing Secure Computer Networks/065 07-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.5 MB
  • 08 Designing Secure Computer Networks/072 07-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.3 MB
  • 07 Computer Network Security/053 06-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.2 MB
  • 02 Application Security/015 13-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.1 MB
  • 04 Popular IT Security Myths/025 01-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf 1.0 MB
  • 22 Certificate/242 Certificate-Itsec.pdf 494.0 kB
  • 24 BONUS Section/244 Secacademy-Voucher.pdf 95.6 kB
  • 01 Lets start/003 Course preview 15 min. long demo lecture. The whole training is 27 hours long.it.srt 27.7 kB
  • 01 Lets start/003 Course preview 15 min. long demo lecture. The whole training is 27 hours long.en.srt 25.7 kB
  • 23 Rootkits and Stealth Apps Creating and Revealing v2.0 (course preview)/243 Wiriting a Shellcode.it.srt 18.1 kB
  • 13 Windows Security/135 Encryption - key protection.it.srt 17.9 kB
  • 02 Application Security/008 EXERCISE Analyze the application.it.srt 17.1 kB
  • 23 Rootkits and Stealth Apps Creating and Revealing v2.0 (course preview)/243 Wiriting a Shellcode.en.srt 16.8 kB
  • 13 Windows Security/135 Encryption - key protection.en.srt 16.5 kB
  • 02 Application Security/008 EXERCISE Analyze the application.en.srt 16.1 kB
  • 11 Operating Systems Security/108 Malware.it.srt 15.5 kB
  • 02 Application Security/010 Automated SQL Injection.it.srt 15.3 kB
  • 18 Application Security - Configuration and Management/212 EXERCISE Application control rules.it.srt 15.2 kB
  • 08 Designing Secure Computer Networks/070 Network Address translation.it.srt 14.6 kB
  • 11 Operating Systems Security/108 Malware.en.srt 14.4 kB
  • 13 Windows Security/132 Additional Security Features - ASLR and DEP.it.srt 14.2 kB
  • 12 Access Control/126 EXERCISE Offline attacks.it.srt 14.1 kB
  • 02 Application Security/010 Automated SQL Injection.en.srt 14.0 kB
  • 08 Designing Secure Computer Networks/070 Network Address translation.en.srt 13.8 kB
  • 18 Application Security - Configuration and Management/212 EXERCISE Application control rules.en.srt 13.7 kB
  • 12 Access Control/124 KERBEROS.it.srt 13.6 kB
  • 11 Operating Systems Security/114 EXERCISE Detecting rootkits.it.srt 13.5 kB
  • 19 Cryptography/216 History of ciphers.it.srt 13.4 kB
  • 12 Access Control/126 EXERCISE Offline attacks.en.srt 13.2 kB
  • 13 Windows Security/132 Additional Security Features - ASLR and DEP.en.srt 13.2 kB
  • 02 Application Security/006 Attacks on applications.it.srt 13.1 kB
  • 08 Designing Secure Computer Networks/071 Network access control RADIUS.it.srt 13.0 kB
  • 02 Application Security/014 Unsafe applications.it.srt 12.9 kB
  • 19 Cryptography/215 Introduction to cryptography.it.srt 12.7 kB
  • 19 Cryptography/216 History of ciphers.en.srt 12.5 kB
  • 02 Application Security/011 Cross-site scripting - XSS.it.srt 12.5 kB
  • 12 Access Control/124 KERBEROS.en.srt 12.5 kB
  • 02 Application Security/009 Blind SQL Injection.it.srt 12.4 kB
  • 11 Operating Systems Security/114 EXERCISE Detecting rootkits.en.srt 12.4 kB
  • 08 Designing Secure Computer Networks/071 Network access control RADIUS.en.srt 12.3 kB
  • 02 Application Security/006 Attacks on applications.en.srt 12.0 kB
  • 02 Application Security/014 Unsafe applications.en.srt 11.9 kB
  • 08 Designing Secure Computer Networks/068 Protocols and services IP SEC.it.srt 11.7 kB
  • 12 Access Control/125 Identity Theft.it.srt 11.6 kB
  • 19 Cryptography/215 Introduction to cryptography.en.srt 11.6 kB
  • 11 Operating Systems Security/109 EXERCISE Vulnerability attacks.it.srt 11.6 kB
  • 18 Application Security - Configuration and Management/206 Managing applications.it.srt 11.4 kB
  • 10 Wireless Networks Security/097 Client Attacks Denial of service.it.srt 11.4 kB
  • 02 Application Security/011 Cross-site scripting - XSS.en.srt 11.4 kB
  • 02 Application Security/009 Blind SQL Injection.en.srt 11.3 kB
  • 11 Operating Systems Security/100 Operating systems security - introduction.it.srt 11.3 kB
  • 09 Network administration/078 How to use Wireshark.it.srt 11.3 kB
  • 15 Risk Management/167 Manipulation tactics.it.srt 11.1 kB
  • 20 Public Key Infrastructure/237 Planning the PKI.it.srt 11.1 kB
  • 11 Operating Systems Security/111 Demonstration Process Explorer.it.srt 11.0 kB
  • 20 Public Key Infrastructure/236 EXERCISE Certificates.it.srt 11.0 kB
  • 08 Designing Secure Computer Networks/068 Protocols and services IP SEC.en.srt 10.8 kB
  • 09 Network administration/074 Monitoring Transmitted Data - Basic informations.it.srt 10.8 kB
  • 12 Access Control/125 Identity Theft.en.srt 10.7 kB
  • 11 Operating Systems Security/109 EXERCISE Vulnerability attacks.en.srt 10.7 kB
  • 15 Risk Management/167 Manipulation tactics.en.srt 10.7 kB
  • 10 Wireless Networks Security/090 Authentication methods.it.srt 10.7 kB
  • 11 Operating Systems Security/112 EXERCISE Removing malware.it.srt 10.6 kB
  • 10 Wireless Networks Security/097 Client Attacks Denial of service.en.srt 10.6 kB
  • 11 Operating Systems Security/100 Operating systems security - introduction.en.srt 10.5 kB
  • 12 Access Control/127 Using online cracking services.it.srt 10.5 kB
  • 20 Public Key Infrastructure/237 Planning the PKI.en.srt 10.5 kB
  • 18 Application Security - Configuration and Management/206 Managing applications.en.srt 10.5 kB
  • 09 Network administration/078 How to use Wireshark.en.srt 10.4 kB
  • 20 Public Key Infrastructure/236 EXERCISE Certificates.en.srt 10.4 kB
  • 02 Application Security/007 SQL Injection.it.srt 10.2 kB
  • 11 Operating Systems Security/111 Demonstration Process Explorer.en.srt 10.1 kB
  • 13 Windows Security/136 Drive encryption.it.srt 10.1 kB
  • 02 Application Security/005 Introduction to Application Security.it.srt 10.1 kB
  • 10 Wireless Networks Security/090 Authentication methods.en.srt 10.0 kB
  • 09 Network administration/074 Monitoring Transmitted Data - Basic informations.en.srt 10.0 kB
  • 09 Network administration/075 Intrusion detection systems.it.srt 9.9 kB
  • 13 Windows Security/131 UAC configuration.it.srt 9.9 kB
  • 18 Application Security - Configuration and Management/210 Blocking applications.it.srt 9.8 kB
  • 12 Access Control/127 Using online cracking services.en.srt 9.8 kB
  • 05 IT Security Trends/032 Cyber War.it.srt 9.8 kB
  • 13 Windows Security/137 BitLocker.it.srt 9.7 kB
  • 11 Operating Systems Security/112 EXERCISE Removing malware.en.srt 9.7 kB
  • 09 Network administration/080 How to analyze telnet protocol.it.srt 9.7 kB
  • 09 Network administration/081 Intrusion detection.it.srt 9.6 kB
  • 12 Access Control/120 Authentication protocols and services.it.srt 9.6 kB
  • 13 Windows Security/136 Drive encryption.en.srt 9.5 kB
  • 02 Application Security/007 SQL Injection.en.srt 9.4 kB
  • 19 Cryptography/225 Asymmetric-key algorithms.it.srt 9.4 kB
  • 20 Public Key Infrastructure/239 PKI Administration.it.srt 9.3 kB
  • 02 Application Security/005 Introduction to Application Security.en.srt 9.2 kB
  • 09 Network administration/075 Intrusion detection systems.en.srt 9.2 kB
  • 13 Windows Security/131 UAC configuration.en.srt 9.2 kB
  • 13 Windows Security/137 BitLocker.en.srt 9.2 kB
  • 09 Network administration/080 How to analyze telnet protocol.en.srt 9.1 kB
  • 09 Network administration/082 Scanning computers.it.srt 9.1 kB
  • 11 Operating Systems Security/102 Three core.it.srt 9.1 kB
  • 05 IT Security Trends/032 Cyber War.en.srt 9.0 kB
  • 08 Designing Secure Computer Networks/069 IP SEC Phase 1.it.srt 9.0 kB
  • 07 Computer Network Security/044 EXERCISE Data Link Layer Attack.it.srt 9.0 kB
  • 13 Windows Security/139 File and folder encryption - EFS.it.srt 9.0 kB
  • 12 Access Control/120 Authentication protocols and services.en.srt 8.9 kB
  • 18 Application Security - Configuration and Management/210 Blocking applications.en.srt 8.9 kB
  • 09 Network administration/081 Intrusion detection.en.srt 8.9 kB
  • 15 Risk Management/164 EXERCISE Risk Assessment.it.srt 8.8 kB
  • 17 Disaster Recovery/203 CONFICKER CASE STUDY.it.srt 8.7 kB
  • 19 Cryptography/225 Asymmetric-key algorithms.en.srt 8.7 kB
  • 12 Access Control/118 Authentication users.it.srt 8.7 kB
  • 20 Public Key Infrastructure/239 PKI Administration.en.srt 8.7 kB
  • 11 Operating Systems Security/103 EXERCISE OS boundaries.it.srt 8.7 kB
  • 09 Network administration/077 Wireshark - Introduction to network analysis.it.srt 8.6 kB
  • 19 Cryptography/223 Block cipher modes.it.srt 8.5 kB
  • 19 Cryptography/221 DES-X.it.srt 8.5 kB
  • 07 Computer Network Security/046 TCP Tunnelling over ICMP.it.srt 8.5 kB
  • 11 Operating Systems Security/110 EXERCISE Identifying suspicious processes.it.srt 8.4 kB
  • 10 Wireless Networks Security/091 802.11 WEP.it.srt 8.4 kB
  • 08 Designing Secure Computer Networks/069 IP SEC Phase 1.en.srt 8.4 kB
  • 11 Operating Systems Security/102 Three core.en.srt 8.4 kB
  • 10 Wireless Networks Security/095 Client Attacks Launching a rogue access point.it.srt 8.4 kB
  • 09 Network administration/082 Scanning computers.en.srt 8.4 kB
  • 08 Designing Secure Computer Networks/063 Subnetting IPv4.it.srt 8.4 kB
  • 18 Application Security - Configuration and Management/208 MS Update.it.srt 8.3 kB
  • 13 Windows Security/139 File and folder encryption - EFS.en.srt 8.3 kB
  • 15 Risk Management/155 Attack methods.it.srt 8.3 kB
  • 20 Public Key Infrastructure/235 What will PKI allow you.it.srt 8.3 kB
  • 15 Risk Management/164 EXERCISE Risk Assessment.en.srt 8.3 kB
  • 07 Computer Network Security/043 Threats ARP Poisoning.it.srt 8.2 kB
  • 12 Access Control/122 LM Hash.it.srt 8.2 kB
  • 07 Computer Network Security/044 EXERCISE Data Link Layer Attack.en.srt 8.2 kB
  • 06 Data Security/034 Objective 1 - Data security - Introduction.it.srt 8.2 kB
  • 15 Risk Management/171 Fraud tools 1.it.srt 8.1 kB
  • 12 Access Control/118 Authentication users.en.srt 8.1 kB
  • 18 Application Security - Configuration and Management/213 Isolating applications.it.srt 8.0 kB
  • 08 Designing Secure Computer Networks/063 Subnetting IPv4.en.srt 8.0 kB
  • 17 Disaster Recovery/203 CONFICKER CASE STUDY.en.srt 8.0 kB
  • 09 Network administration/077 Wireshark - Introduction to network analysis.en.srt 8.0 kB
  • 11 Operating Systems Security/103 EXERCISE OS boundaries.en.srt 7.9 kB
  • 11 Operating Systems Security/105 Kernel Mode Code Signing.it.srt 7.9 kB
  • 11 Operating Systems Security/104 Process isolation.it.srt 7.9 kB
  • 10 Wireless Networks Security/091 802.11 WEP.en.srt 7.9 kB
  • 15 Risk Management/169 SE with KALI BackTrack.it.srt 7.9 kB
  • 20 Public Key Infrastructure/233 Public key infrastructure.it.srt 7.9 kB
  • 19 Cryptography/223 Block cipher modes.en.srt 7.9 kB
  • 11 Operating Systems Security/110 EXERCISE Identifying suspicious processes.en.srt 7.9 kB
  • 19 Cryptography/220 Data encryption standard.it.srt 7.9 kB
  • 07 Computer Network Security/046 TCP Tunnelling over ICMP.en.srt 7.9 kB
  • 15 Risk Management/172 Fraud tools 2.it.srt 7.9 kB
  • 07 Computer Network Security/045 OSI MODEL 3 - Network layer.it.srt 7.8 kB
  • 20 Public Key Infrastructure/238 Certificate life cycle.it.srt 7.8 kB
  • 19 Cryptography/221 DES-X.en.srt 7.8 kB
  • 07 Computer Network Security/043 Threats ARP Poisoning.en.srt 7.8 kB
  • 06 Data Security/035 Integrity of data.it.srt 7.8 kB
  • 15 Risk Management/161 Introduction to risk assessment.it.srt 7.8 kB
  • 18 Application Security - Configuration and Management/211 Software restrictions policies.it.srt 7.7 kB
  • 19 Cryptography/230 Hybrid Schemes.it.srt 7.7 kB
  • 10 Wireless Networks Security/095 Client Attacks Launching a rogue access point.en.srt 7.7 kB
  • 15 Risk Management/155 Attack methods.en.srt 7.7 kB
  • 16 Defence in Depth/176 DiD OS and LAN Layers.it.srt 7.7 kB
  • 18 Application Security - Configuration and Management/208 MS Update.en.srt 7.7 kB
  • 12 Access Control/122 LM Hash.en.srt 7.7 kB
  • 20 Public Key Infrastructure/235 What will PKI allow you.en.srt 7.7 kB
  • 17 Disaster Recovery/201 Collecting and analysing evidence.it.srt 7.6 kB
  • 10 Wireless Networks Security/094 Threats of WIFI networks.it.srt 7.6 kB
  • 04 Popular IT Security Myths/022 Myths 1 - youll never be hacked.it.srt 7.6 kB
  • 08 Designing Secure Computer Networks/066 IPv6 address notation.it.srt 7.5 kB
  • 15 Risk Management/169 SE with KALI BackTrack.en.srt 7.5 kB
  • 11 Operating Systems Security/113 Rootkits.it.srt 7.5 kB
  • 15 Risk Management/171 Fraud tools 1.en.srt 7.5 kB
  • 07 Computer Network Security/054 OSI MODEL 6 - Presentation Layer.it.srt 7.5 kB
  • 06 Data Security/034 Objective 1 - Data security - Introduction.en.srt 7.5 kB
  • 20 Public Key Infrastructure/233 Public key infrastructure.en.srt 7.5 kB
  • 13 Windows Security/130 User Account Control.it.srt 7.4 kB
  • 15 Risk Management/168 EXERCISE Social Engineering attacks.it.srt 7.4 kB
  • 05 IT Security Trends/030 Online privacy.it.srt 7.4 kB
  • 10 Wireless Networks Security/086 WIFI - working principles.it.srt 7.4 kB
  • 19 Cryptography/229 Digital signature.it.srt 7.4 kB
  • 20 Public Key Infrastructure/238 Certificate life cycle.en.srt 7.4 kB
  • 16 Defence in Depth/192 Laws for administrators.it.srt 7.3 kB
  • 08 Designing Secure Computer Networks/067 DMZ demilitarized Zone.it.srt 7.3 kB
  • 11 Operating Systems Security/104 Process isolation.en.srt 7.3 kB
  • 07 Computer Network Security/045 OSI MODEL 3 - Network layer.en.srt 7.3 kB
  • 18 Application Security - Configuration and Management/213 Isolating applications.en.srt 7.3 kB
  • 19 Cryptography/220 Data encryption standard.en.srt 7.3 kB
  • 15 Risk Management/172 Fraud tools 2.en.srt 7.3 kB
  • 11 Operating Systems Security/115 EXERCISE Security evaluation.it.srt 7.3 kB
  • 07 Computer Network Security/042 Threats MAC spoofing.it.srt 7.3 kB
  • 16 Defence in Depth/176 DiD OS and LAN Layers.en.srt 7.3 kB
  • 19 Cryptography/217 Symmetric and asymmetric ciphers.it.srt 7.3 kB
  • 10 Wireless Networks Security/092 802.11I WPA.it.srt 7.2 kB
  • 15 Risk Management/161 Introduction to risk assessment.en.srt 7.2 kB
  • 06 Data Security/035 Integrity of data.en.srt 7.2 kB
  • 19 Cryptography/230 Hybrid Schemes.en.srt 7.2 kB
  • 20 Public Key Infrastructure/234 Implementing public key infrastructure.it.srt 7.1 kB
  • 11 Operating Systems Security/105 Kernel Mode Code Signing.en.srt 7.1 kB
  • 19 Cryptography/219 Block ciphers.it.srt 7.1 kB
  • 17 Disaster Recovery/201 Collecting and analysing evidence.en.srt 7.1 kB
  • 08 Designing Secure Computer Networks/066 IPv6 address notation.en.srt 7.1 kB
  • 07 Computer Network Security/048 OSI MODEL 4 - Transport Layer.it.srt 7.0 kB
  • 04 Popular IT Security Myths/022 Myths 1 - youll never be hacked.en.srt 7.0 kB
  • 07 Computer Network Security/040 OSI MODEL 1 - Physical layer.it.srt 7.0 kB
  • 08 Designing Secure Computer Networks/067 DMZ demilitarized Zone.en.srt 7.0 kB
  • 15 Risk Management/168 EXERCISE Social Engineering attacks.en.srt 7.0 kB
  • 04 Popular IT Security Myths/021 Popular myths about IT security - origins.it.srt 7.0 kB
  • 07 Computer Network Security/054 OSI MODEL 6 - Presentation Layer.en.srt 7.0 kB
  • 10 Wireless Networks Security/085 WIFI security solutions - introduction.it.srt 7.0 kB
  • 09 Network administration/079 Analyzing Captured data.it.srt 6.9 kB
  • 13 Windows Security/130 User Account Control.en.srt 6.9 kB
  • 18 Application Security - Configuration and Management/211 Software restrictions policies.en.srt 6.9 kB
  • 19 Cryptography/217 Symmetric and asymmetric ciphers.en.srt 6.9 kB
  • 11 Operating Systems Security/113 Rootkits.en.srt 6.9 kB
  • 16 Defence in Depth/192 Laws for administrators.en.srt 6.9 kB
  • 07 Computer Network Security/039 Network security - introduction.it.srt 6.9 kB
  • 10 Wireless Networks Security/094 Threats of WIFI networks.en.srt 6.9 kB
  • 05 IT Security Trends/030 Online privacy.en.srt 6.8 kB
  • 19 Cryptography/229 Digital signature.en.srt 6.8 kB
  • 02 Application Security/013 Program security assessment.it.srt 6.8 kB
  • 19 Cryptography/218 Symmetric-key algorithms.it.srt 6.8 kB
  • 15 Risk Management/157 Target scanning and enumeration techniques 1.it.srt 6.8 kB
  • 04 Popular IT Security Myths/023 Myths 2 - you dont need any protection software or hardware.it.srt 6.8 kB
  • 10 Wireless Networks Security/086 WIFI - working principles.en.srt 6.8 kB
  • 07 Computer Network Security/042 Threats MAC spoofing.en.srt 6.8 kB
  • 16 Defence in Depth/177 DiD Perimeter and Physical Access Layers.it.srt 6.8 kB
  • 16 Defence in Depth/175 How to use Defence in Depth model.it.srt 6.7 kB
  • 10 Wireless Networks Security/092 802.11I WPA.en.srt 6.7 kB
  • 09 Network administration/076 Why are firewalls and NDIS not enough.it.srt 6.7 kB
  • 11 Operating Systems Security/115 EXERCISE Security evaluation.en.srt 6.7 kB
  • 03 Introduction to Cyber Threats/018 Lets look a few years back.it.srt 6.7 kB
  • 09 Network administration/079 Analyzing Captured data.en.srt 6.7 kB
  • 03 Introduction to Cyber Threats/016 Introduction to Current Cyber Threats.it.srt 6.7 kB
  • 13 Windows Security/140 EXERCISE EFS.it.srt 6.7 kB
  • 14 Security Policies/147 Why are security solutions fallible.it.srt 6.6 kB
  • 07 Computer Network Security/040 OSI MODEL 1 - Physical layer.en.srt 6.6 kB
  • 19 Cryptography/219 Block ciphers.en.srt 6.6 kB
  • 20 Public Key Infrastructure/234 Implementing public key infrastructure.en.srt 6.6 kB
  • 04 Popular IT Security Myths/021 Popular myths about IT security - origins.en.srt 6.6 kB
  • 09 Network administration/076 Why are firewalls and NDIS not enough.en.srt 6.5 kB
  • 17 Disaster Recovery/195 How to reduce losses.it.srt 6.5 kB
  • 10 Wireless Networks Security/085 WIFI security solutions - introduction.en.srt 6.5 kB
  • 15 Risk Management/163 DREAD Exploitability.it.srt 6.5 kB
  • 07 Computer Network Security/048 OSI MODEL 4 - Transport Layer.en.srt 6.5 kB
  • 19 Cryptography/228 HASH functions.it.srt 6.5 kB
  • 07 Computer Network Security/039 Network security - introduction.en.srt 6.5 kB
  • 06 Data Security/038 EXERCISE Finding confidential data with search engines.it.srt 6.4 kB
  • 15 Risk Management/157 Target scanning and enumeration techniques 1.en.srt 6.4 kB
  • 04 Popular IT Security Myths/023 Myths 2 - you dont need any protection software or hardware.en.srt 6.4 kB
  • 07 Computer Network Security/050 EXERCISE Transport Layer Attack using METASPLOIT part 1.it.srt 6.4 kB
  • 16 Defence in Depth/177 DiD Perimeter and Physical Access Layers.en.srt 6.3 kB
  • 14 Security Policies/149 Introduction to threat modelling and classification.it.srt 6.3 kB
  • 16 Defence in Depth/175 How to use Defence in Depth model.en.srt 6.3 kB
  • 07 Computer Network Security/051 EXERCISE Transport Layer Attack using METASPLOIT part 2.it.srt 6.2 kB
  • 03 Introduction to Cyber Threats/017 IT Prehistory.it.srt 6.2 kB
  • 02 Application Security/013 Program security assessment.en.srt 6.2 kB
  • 07 Computer Network Security/056 EXERCISE Application Layer Attacks.it.srt 6.2 kB
  • 03 Introduction to Cyber Threats/016 Introduction to Current Cyber Threats.en.srt 6.2 kB
  • 13 Windows Security/140 EXERCISE EFS.en.srt 6.2 kB
  • 19 Cryptography/218 Symmetric-key algorithms.en.srt 6.2 kB
  • 12 Access Control/119 How secure is your password.it.srt 6.2 kB
  • 19 Cryptography/228 HASH functions.en.srt 6.2 kB
  • 19 Cryptography/226 RSA.it.srt 6.2 kB
  • 03 Introduction to Cyber Threats/018 Lets look a few years back.en.srt 6.2 kB
  • 03 Introduction to Cyber Threats/019 Cyber crimes - an evolution not revolution.it.srt 6.2 kB
  • 06 Data Security/037 Confidentiality of data.it.srt 6.1 kB
  • 06 Data Security/038 EXERCISE Finding confidential data with search engines.en.srt 6.1 kB
  • 14 Security Policies/147 Why are security solutions fallible.en.srt 6.1 kB
  • 17 Disaster Recovery/195 How to reduce losses.en.srt 6.1 kB
  • 14 Security Policies/151 STRIDE Spoofing identity.it.srt 6.1 kB
  • 05 IT Security Trends/029 Fake identity.it.srt 6.1 kB
  • 15 Risk Management/163 DREAD Exploitability.en.srt 6.1 kB
  • 07 Computer Network Security/050 EXERCISE Transport Layer Attack using METASPLOIT part 1.en.srt 6.0 kB
  • 07 Computer Network Security/056 EXERCISE Application Layer Attacks.en.srt 6.0 kB
  • 19 Cryptography/222 Advanced encryption standards.it.srt 5.9 kB
  • 03 Introduction to Cyber Threats/019 Cyber crimes - an evolution not revolution.en.srt 5.9 kB
  • 10 Wireless Networks Security/096 Client Attacks Evil twin.it.srt 5.9 kB
  • 11 Operating Systems Security/101 Security boundaries.it.srt 5.9 kB
  • 12 Access Control/119 How secure is your password.en.srt 5.8 kB
  • 17 Disaster Recovery/199 Audit users and keep control accounts.it.srt 5.8 kB
  • 07 Computer Network Security/051 EXERCISE Transport Layer Attack using METASPLOIT part 2.en.srt 5.8 kB
  • 07 Computer Network Security/041 OSI MODEL 2 - Data link layer.it.srt 5.8 kB
  • 19 Cryptography/226 RSA.en.srt 5.8 kB
  • 14 Security Policies/149 Introduction to threat modelling and classification.en.srt 5.8 kB
  • 03 Introduction to Cyber Threats/017 IT Prehistory.en.srt 5.8 kB
  • 16 Defence in Depth/179 Automated attack targeting a service.it.srt 5.8 kB
  • 05 IT Security Trends/029 Fake identity.en.srt 5.7 kB
  • 10 Wireless Networks Security/088 Threats and risks.it.srt 5.7 kB
  • 06 Data Security/037 Confidentiality of data.en.srt 5.7 kB
  • 14 Security Policies/151 STRIDE Spoofing identity.en.srt 5.7 kB
  • 15 Risk Management/162 DREAD Risk assessment model.it.srt 5.6 kB
  • 14 Security Policies/148 Security policy issues.it.srt 5.6 kB
  • 14 Security Policies/146 Security issues.it.srt 5.6 kB
  • 19 Cryptography/222 Advanced encryption standards.en.srt 5.6 kB
  • 13 Windows Security/138 BitLocker To Go Reader.it.srt 5.6 kB
  • 14 Security Policies/152 STRIDE Tampering with Data.it.srt 5.5 kB
  • 16 Defence in Depth/182 Introduction to Immutable laws of security - Law 1.it.srt 5.5 kB
  • 12 Access Control/123 Cached Credentials.it.srt 5.5 kB
  • 07 Computer Network Security/059 Modifying Transmitted Packets.it.srt 5.5 kB
  • 11 Operating Systems Security/101 Security boundaries.en.srt 5.5 kB
  • 11 Operating Systems Security/106 Java Virtual Machine and code access security.it.srt 5.5 kB
  • 16 Defence in Depth/180 Automated user-targeting attack.it.srt 5.4 kB
  • 24 BONUS Section/245 BONUS LECTURE Learn more and get to know our other courses.html 5.4 kB
  • 10 Wireless Networks Security/096 Client Attacks Evil twin.en.srt 5.4 kB
  • 16 Defence in Depth/179 Automated attack targeting a service.en.srt 5.4 kB
  • 07 Computer Network Security/041 OSI MODEL 2 - Data link layer.en.srt 5.4 kB
  • 17 Disaster Recovery/197 Threat discovery 1.it.srt 5.3 kB
  • 17 Disaster Recovery/199 Audit users and keep control accounts.en.srt 5.3 kB
  • 15 Risk Management/162 DREAD Risk assessment model.en.srt 5.3 kB
  • 16 Defence in Depth/182 Introduction to Immutable laws of security - Law 1.en.srt 5.3 kB
  • 10 Wireless Networks Security/088 Threats and risks.en.srt 5.2 kB
  • 14 Security Policies/148 Security policy issues.en.srt 5.2 kB
  • 10 Wireless Networks Security/089 Ineffective solutions.it.srt 5.2 kB
  • 07 Computer Network Security/059 Modifying Transmitted Packets.en.srt 5.2 kB
  • 13 Windows Security/138 BitLocker To Go Reader.en.srt 5.2 kB
  • 12 Access Control/123 Cached Credentials.en.srt 5.2 kB
  • 14 Security Policies/146 Security issues.en.srt 5.1 kB
  • 15 Risk Management/166 Introduction to Social Engineering and rogue software.it.srt 5.1 kB
  • 16 Defence in Depth/180 Automated user-targeting attack.en.srt 5.1 kB
  • 14 Security Policies/152 STRIDE Tampering with Data.en.srt 5.1 kB
  • 11 Operating Systems Security/106 Java Virtual Machine and code access security.en.srt 5.0 kB
  • 16 Defence in Depth/190 Law 9.it.srt 4.9 kB
  • 10 Wireless Networks Security/089 Ineffective solutions.en.srt 4.8 kB
  • 15 Risk Management/166 Introduction to Social Engineering and rogue software.en.srt 4.8 kB
  • 17 Disaster Recovery/196 Ensuring continous availability.it.srt 4.8 kB
  • 14 Security Policies/153 STRIDE Denial of Service.it.srt 4.8 kB
  • 14 Security Policies/145 Information security - level up.it.srt 4.7 kB
  • 16 Defence in Depth/190 Law 9.en.srt 4.7 kB
  • 17 Disaster Recovery/197 Threat discovery 1.en.srt 4.7 kB
  • 05 IT Security Trends/026 Trends in IT Security.it.srt 4.6 kB
  • 05 IT Security Trends/028 EXERCISE How much info can you gather.it.srt 4.6 kB
  • 14 Security Policies/144 Information security.it.srt 4.6 kB
  • 07 Computer Network Security/049 Threats Enumerating Remote Computers.it.srt 4.5 kB
  • 14 Security Policies/150 Threat modelling - STRIDE.it.srt 4.5 kB
  • 17 Disaster Recovery/196 Ensuring continous availability.en.srt 4.5 kB
  • 07 Computer Network Security/052 OSI MODEL 5 - Session Layer.it.srt 4.5 kB
  • 17 Disaster Recovery/202 Forensics example.it.srt 4.4 kB
  • 17 Disaster Recovery/198 Threat discovery 2.it.srt 4.4 kB
  • 14 Security Policies/145 Information security - level up.en.srt 4.4 kB
  • 14 Security Policies/153 STRIDE Denial of Service.en.srt 4.3 kB
  • 05 IT Security Trends/028 EXERCISE How much info can you gather.en.srt 4.3 kB
  • 07 Computer Network Security/055 OSI MODEL 7 - Application Layer.it.srt 4.3 kB
  • 05 IT Security Trends/026 Trends in IT Security.en.srt 4.3 kB
  • 07 Computer Network Security/055 OSI MODEL 7 - Application Layer.en.srt 4.3 kB
  • 14 Security Policies/143 What is security.it.srt 4.2 kB
  • 14 Security Policies/150 Threat modelling - STRIDE.en.srt 4.2 kB
  • 19 Cryptography/224 Stream Ciphers - RC4.it.srt 4.2 kB
  • 14 Security Policies/144 Information security.en.srt 4.2 kB
  • 05 IT Security Trends/031 Analyzing sniffing software.it.srt 4.2 kB
  • 10 Wireless Networks Security/098 EXERCISE WPA attack.it.srt 4.2 kB
  • 07 Computer Network Security/052 OSI MODEL 5 - Session Layer.en.srt 4.2 kB
  • 17 Disaster Recovery/202 Forensics example.en.srt 4.1 kB
  • 17 Disaster Recovery/200 High risk users.it.srt 4.1 kB
  • 07 Computer Network Security/049 Threats Enumerating Remote Computers.en.srt 4.1 kB
  • 17 Disaster Recovery/198 Threat discovery 2.en.srt 4.0 kB
  • 15 Risk Management/158 Target scanning and enumeration techniques 2.it.srt 4.0 kB
  • 07 Computer Network Security/057 Backtrack Attack Demonstration.it.srt 4.0 kB
  • 14 Security Policies/143 What is security.en.srt 4.0 kB
  • 19 Cryptography/224 Stream Ciphers - RC4.en.srt 4.0 kB
  • 10 Wireless Networks Security/098 EXERCISE WPA attack.en.srt 4.0 kB
  • 16 Defence in Depth/186 Law 5.it.srt 3.9 kB
  • 05 IT Security Trends/027 The birth of technology society.it.srt 3.8 kB
  • 07 Computer Network Security/057 Backtrack Attack Demonstration.en.srt 3.8 kB
  • 05 IT Security Trends/031 Analyzing sniffing software.en.srt 3.8 kB
  • 15 Risk Management/156 Local attacks.it.srt 3.8 kB
  • 15 Risk Management/158 Target scanning and enumeration techniques 2.en.srt 3.8 kB
  • 08 Designing Secure Computer Networks/064 Subnetting IPv6.it.srt 3.7 kB
  • 17 Disaster Recovery/200 High risk users.en.srt 3.7 kB
  • 10 Wireless Networks Security/087 Other wireless technologies.it.srt 3.7 kB
  • 16 Defence in Depth/186 Law 5.en.srt 3.6 kB
  • 08 Designing Secure Computer Networks/064 Subnetting IPv6.en.srt 3.6 kB
  • 16 Defence in Depth/183 Law 2.it.srt 3.6 kB
  • 05 IT Security Trends/027 The birth of technology society.en.srt 3.5 kB
  • 07 Computer Network Security/060 Unencrypted protocols.it.srt 3.5 kB
  • 01 Lets start/002 Foreword FAQ.html 3.5 kB
  • 18 Application Security - Configuration and Management/207 Software updates.it.srt 3.4 kB
  • 18 Application Security - Configuration and Management/209 System Center Configuration Manager.it.srt 3.4 kB
  • 10 Wireless Networks Security/087 Other wireless technologies.en.srt 3.4 kB
  • 15 Risk Management/156 Local attacks.en.srt 3.4 kB
  • 07 Computer Network Security/060 Unencrypted protocols.en.srt 3.3 kB
  • 16 Defence in Depth/183 Law 2.en.srt 3.3 kB
  • 18 Application Security - Configuration and Management/209 System Center Configuration Manager.en.srt 3.2 kB
  • 18 Application Security - Configuration and Management/207 Software updates.en.srt 3.2 kB
  • 16 Defence in Depth/178 DiD Demonstration.it.srt 3.2 kB
  • 07 Computer Network Security/058 Man-in-the-Middle and Denial of Service Attacks.it.srt 3.1 kB
  • 07 Computer Network Security/058 Man-in-the-Middle and Denial of Service Attacks.en.srt 3.0 kB
  • 15 Risk Management/170 Rogue Software.it.srt 2.9 kB
  • 16 Defence in Depth/178 DiD Demonstration.en.srt 2.9 kB
  • 20 Public Key Infrastructure/232 Introduction to cryptology.it.srt 2.9 kB
  • 15 Risk Management/170 Rogue Software.en.srt 2.8 kB
  • 20 Public Key Infrastructure/232 Introduction to cryptology.en.srt 2.7 kB
  • 16 Defence in Depth/187 Law 6.it.srt 2.7 kB
  • 08 Designing Secure Computer Networks/062 Designing Computer Networks - introduction.it.srt 2.7 kB
  • 16 Defence in Depth/184 Law 3.it.srt 2.7 kB
  • 16 Defence in Depth/184 Law 3.en.srt 2.5 kB
  • 08 Designing Secure Computer Networks/062 Designing Computer Networks - introduction.en.srt 2.5 kB
  • 16 Defence in Depth/187 Law 6.en.srt 2.5 kB
  • 14 Security Policies/142 Security policies introduction.it.srt 2.4 kB
  • 19 Cryptography/227 ELGAMAL.it.srt 2.4 kB
  • 15 Risk Management/159 Passive scanning.it.srt 2.3 kB
  • 12 Access Control/117 Authentication and authorisation - Introduction.it.srt 2.2 kB
  • 19 Cryptography/227 ELGAMAL.en.srt 2.2 kB
  • 16 Defence in Depth/185 Law 4.it.srt 2.2 kB
  • 14 Security Policies/142 Security policies introduction.en.srt 2.2 kB
  • 15 Risk Management/159 Passive scanning.en.srt 2.1 kB
  • 12 Access Control/117 Authentication and authorisation - Introduction.en.srt 2.0 kB
  • 16 Defence in Depth/185 Law 4.en.srt 2.0 kB
  • 17 Disaster Recovery/194 Introduction to Disaster Recovery.it.srt 1.9 kB
  • 16 Defence in Depth/189 Law 8.it.srt 1.8 kB
  • 16 Defence in Depth/174 Introduction to Defence in Depth.it.srt 1.8 kB
  • 16 Defence in Depth/189 Law 8.en.srt 1.8 kB
  • 15 Risk Management/154 Introduction to Risk Management.it.srt 1.8 kB
  • 13 Windows Security/133 PatchGuard.it.srt 1.8 kB
  • 17 Disaster Recovery/194 Introduction to Disaster Recovery.en.srt 1.7 kB
  • 16 Defence in Depth/174 Introduction to Defence in Depth.en.srt 1.7 kB
  • 15 Risk Management/154 Introduction to Risk Management.en.srt 1.7 kB
  • 13 Windows Security/133 PatchGuard.en.srt 1.6 kB
  • 10 Wireless Networks Security/084 Wireless Networks.it.srt 1.5 kB
  • 16 Defence in Depth/188 Law 7.it.srt 1.5 kB
  • 13 Windows Security/129 Windows Security - what youll learn.it.srt 1.5 kB
  • 04 Popular IT Security Myths/024 Myths 3 - IT security is always a priority.it.srt 1.5 kB
  • 10 Wireless Networks Security/084 Wireless Networks.en.srt 1.4 kB
  • 13 Windows Security/129 Windows Security - what youll learn.en.srt 1.4 kB
  • 16 Defence in Depth/188 Law 7.en.srt 1.4 kB
  • 09 Network administration/073 Introduction to Monitoring Transmitted Data.it.srt 1.4 kB
  • 09 Network administration/073 Introduction to Monitoring Transmitted Data.en.srt 1.3 kB
  • 04 Popular IT Security Myths/024 Myths 3 - IT security is always a priority.en.srt 1.3 kB
  • 18 Application Security - Configuration and Management/205 Heres what youll learn in this module.it.srt 1.3 kB
  • 02 Application Security/004 Why is this section here.html 1.2 kB
  • 24 BONUS Section/246 Thank you.html 1.2 kB
  • 01 Lets start/001 Welcome to the course.html 1.2 kB
  • 18 Application Security - Configuration and Management/205 Heres what youll learn in this module.en.srt 1.2 kB
  • Read Me.txt 1.0 kB
  • 18 Application Security - Configuration and Management/214 How to protect users without interrupting their work - notes for the examination.html 931 Bytes
  • 20 Public Key Infrastructure/241 Public Key Infrastructure - Trust but verify - notes for the examination.html 923 Bytes
  • 15 Risk Management/173 Social Engineering and Rogue Software - notes for the examination.html 916 Bytes
  • 20 Public Key Infrastructure/240 Threat Modelling and Classification - notes for the examination.html 914 Bytes
  • 19 Cryptography/231 Symmetric and Asymmetric Ciphers - notes for the examination.html 911 Bytes
  • 02 Application Security/015 Program Security Assessment - notes for the examination.html 906 Bytes
  • 16 Defence in Depth/181 The Defence in Depth Model - notes for the examination.html 905 Bytes
  • 16 Defence in Depth/193 Immutable Laws of Security - notes for the examination.html 905 Bytes
  • 15 Risk Management/160 Attack Methodologies - notes for the examination.html 899 Bytes
  • 17 Disaster Recovery/204 How to reduce losses - notes for the examination.html 899 Bytes
  • 02 Application Security/012 Application Attacks - notes for the examination.html 898 Bytes
  • 15 Risk Management/165 Risk Assessment - notes for the examination.html 894 Bytes
  • 16 Defence in Depth/191 Law 10.it.srt 865 Bytes
  • 16 Defence in Depth/191 Law 10.en.srt 791 Bytes
  • 02 Application Security/external-assets-links.txt 137 Bytes
  • [FreeAllCourse.Com].url 52 Bytes

随机展示

相关说明

本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!