Certified Ethical Hacking and Cyber Security for Newbies

seeders: 28
leechers: 2
updated:
Added by Source1337 in Other > Tutorials

Download Fast Safe Anonymous
movies, software, shows...

Files

Certified ethical hacking and cyber security for newbies 02 Ethical hacking chapter 2
  • 008 Chapter 2-05 Types of Hackers.mp4 (26.9 MB)
  • 004 Chapter 2-01 Brief Background of hacking.en.srt (1.1 KB)
  • 004 Chapter 2-01 Brief Background of hacking.mp4 (6.3 MB)
  • 005 Chapter 2-02 What do ethical hackers do and their importance.en.srt (0.9 KB)
  • 005 Chapter 2-02 What do ethical hackers do and their importance.mp4 (6.2 MB)
  • 006 Chapter 2-03 Functions of Ethical hackers.en.srt (2.2 KB)
  • 006 Chapter 2-03 Functions of Ethical hackers.mp4 (13.0 MB)
  • 007 Chapter 2-04 who are ethical hackers.en.srt (3.0 KB)
  • 007 Chapter 2-04 who are ethical hackers.mp4 (18.1 MB)
  • 008 Chapter 2-05 Types of Hackers.en.srt (4.2 KB)
  • telegram channel for Hacker.html (0.1 KB)
  • 01 Ethical hacking chapter 1
    • 001 Introduction.en.srt (1.7 KB)
    • 001 Introduction.mp4 (9.0 MB)
    • 002 Disclaimer.en.srt (1.6 KB)
    • 002 Disclaimer.mp4 (7.9 MB)
    • 003 What you will learn.en.srt (1.8 KB)
    • 003 What you will learn.mp4 (8.9 MB)
    • Read me for more courses.txt (0.2 KB)
  • Read me for more courses.txt (0.2 KB)
  • 03 Ethical hacking chapter 3
    • 009 Chapter 3-01 Introduction.en.srt (0.6 KB)
    • 009 Chapter 3-01 Introduction.mp4 (3.4 MB)
    • 010 Chapter 3-02 Bait and Switch.en.srt (0.9 KB)
    • 010 Chapter 3-02 Bait and Switch.mp4 (5.3 MB)
    • 011 Chapter 3-03 Browser cookie theft.en.srt (1.0 KB)
    • 011 Chapter 3-03 Browser cookie theft.mp4 (6.8 MB)
    • 012 Chapter 3-04 Denial of service.en.srt (1.1 KB)
    • 012 Chapter 3-04 Denial of service.mp4 (8.1 MB)
    • 013 Chapter 3-05 key logging.en.srt (0.6 KB)
    • 013 Chapter 3-05 key logging.mp4 (4.1 MB)
    • 014 Chapter 3-06 malware attacks.en.srt (4.3 KB)
    • 014 Chapter 3-06 malware attacks.mp4 (25.2 MB)
    • 014 New-Text-Document.txt (0.4 KB)
    • 015 Chapter 3-07 phishing attacks.en.srt (0.6 KB)
    • 015 Chapter 3-07 phishing attacks.mp4 (3.9 MB)
    • 016 Chapter 3-08 WAP attacks.en.srt (0.6 KB)
    • 016 Chapter 3-08 WAP attacks.mp4 (4.2 MB)
    • 017 Chapter 3-09 MITM attacks.en.srt (0.7 KB)
    • 017 Chapter 3-09 MITM attacks.mp4 (5.1 MB)
    04 Ethical hacking chapter 4
    • 018 Chapter 4-01 Introduction.en.srt (0.4 KB)
    • 018 Chapter 4-01 Introduction.mp4 (2.8 MB)
    • 019 Chapter 4 - 02 Remote network analysis.en.srt (0.5 KB)
    • 019 Chapter 4 - 02 Remote network analysis.mp4 (2.4 MB)
    • 020 Chapter 4 -03 Remote dial-up network analysis.en.srt (0.4 KB)
    • 020 Chapter 4 -03 Remote dial-up network analysis.mp4 (3.3 MB)
    • 021 Chapter 4-04 Local network analysis.en.srt (0.6 KB)
    • 021 Chapter 4-04 Local network analysis.mp4 (3.6 MB)
    • 022 Chapter 4 -05 Social engineering.en.srt (1.5 KB)
    • 022 Chapter 4 -05 Social engineering.mp4 (10.1 MB)
    • 023 Chapter 4 -06 Physical entry.en.srt (2.7 KB)
    • 023 Chapter 4 -06 Physical entry.mp4 (17.2 MB)
    • Read me for more courses.txt (0.2 KB)
    05 Ethical hacking chapter 5
    • 024 Chapter 5-01 Introduction.en.srt (0.9 KB)
    • 024 Chapter 5-01 Introduction.mp4 (5.9 MB)
    • 025 Chapter 5-02 Information policies.en.srt (0.5 KB)
    • 025 Chapter 5-02 Information policies.mp4 (2.0 MB)
    • 026 Chapter 5-03 Security policies.en.srt (0.4 KB)
    • 026 Chapter 5-03 Security policies.mp4 (1.7 MB)
    • 027 Chapter 5-04 Computer use policies.en.srt (0.6 KB)
    • 027 Chapter 5-04 Computer use policies.mp4 (2.1 MB)
    • 028 Chapter 5-05 System administration procedures.en.srt (0.5 KB)
    • 028 Chapter 5-05 System administration procedures.mp4 (2.1 MB)
    • 029 Chapter 5-06 Incident response procedures.en.srt (0.6 KB)
    • 029 Chapter 5-06 Incident response procedures.mp4 (2.8 MB)
    • 030 Chapter 5-07 Configuration management.en.srt (0.6 KB)
    • 030 Chapter 5-07 Configuration management.mp4 (3.1 MB)
    • external-assets-links.txt (0.1 KB)
    • telegram channel for Hacker.html (0.1 KB)
    06 Ethical hacking chapter 6
    • 031 Chapter 6-01 Introduction.en.srt (1.3 KB)
    • 031 Chapter 6-01 Introduction.mp4 (7.5 MB)
    • 032 Chapter 6-02 Nmap.en.srt (1.3 KB)
    • 032 Chapter 6-02 Nmap.mp4 (7.9 MB)
    • 033 Chapter 6-03 Nessus.en.srt (1.4 KB)
    • 033 Chapter 6-03 Nessus.mp4 (7.0 MB)
    • 034 Chapter 6-04 Nikto.en.srt (0.5 KB)
    • 034 Chapter 6-04 Nikto.mp4 (3.5 MB)
    • 035 Chapter 6-05 Kismet.en.srt (0.7 KB)
    • 035 Chapter 6-05 Kismet.mp4 (4.5 MB)
    • 036 Chapter 6-06 MetaSploit.en.srt (1.6 KB)
    • 036 Chapter 6-06 MetaSploit.mp4 (6.8 MB)
    • 037 Chapter 6-07 NetStumbler.en.srt (0.4 KB)
    • 037 Chapter 6-07 NetStumbler.mp4 (2.1 MB)
    • external-assets-links.txt (0.3 KB)
    07 Ethical hacking chapter 7
    • 038 Chapter 7-01 Introduction.en.srt (0.7 KB)
    • 038 Chapter 7-01 Introduction.mp4 (3.6 MB)
    • 039 Chapter 7-02 Information Gathering.en.srt (1.5 KB)
    • 039 Chapter 7-02 Information Gathering.mp4 (9.4 MB)
    • 040 Chapter 7-03 Vulnerability Analysis.en.srt (0.8 KB)
    • 040 Chapter 7-03 Vulnerability Analysis.mp4 (4.2 MB)
    • 041 Chapter 7-04 Exploitation.en.srt (0.4 KB)
    • 041 Chapter 7-04 Exploitation.mp4 (2.4 MB)
    • 042 Chapter 7-05 Test analysis Phase.en.srt (0.7 KB)
    • 042 Chapter 7-05 Test analysis Phase.mp4 (3.9 MB)
    • 043 Chapter 7-06 Conclusion.en.srt (1.3 KB)
    • 043 Chapter 7-06 Conclusion.mp4 (6.3 MB)

Description

https://t.me/Source1337x

Quote:

We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without “Them”, you and we won’t be here having this conversation. Think about it! ☮️ Peace.✌️





Code:

What you’ll learn

?A comprehensive Introduction to ethical hacking
?Approaches towards hacking. How black hat hackers fool you
?Approaches towards hacking. How Ethical hackers defend you
?Minimum security policies that an organization should possess
?Various Weapons of ethical hackers
A step by step Ethical hacking session



Download torrent
291 MB
seeders:28
leechers:2
Certified Ethical Hacking and Cyber Security for Newbies


Trackers

tracker name
http://p4p.arenabg.com:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.com:2810/announce
udp://exodus.desync.com:6969/announce
http://openbittorrent.com:80/announce
udp://www.torrent.eu.org:451/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.openbittorrent.com:6969/announce
udp://wassermann.online:6969/announce
udp://vibe.sleepyinternetfun.xyz:1738/announce
µTorrent compatible trackers list

Download torrent
291 MB
seeders:28
leechers:2
Certified Ethical Hacking and Cyber Security for Newbies


Torrent hash: BBE8068A6D5A7DC5AF3401766A0195805BB5BB17