17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
For more Courses & Tutorials Visit: CourseDevil.com
★★★★★ Join over 3,000 students in this hands-on Ethical Hacking and Cybersecurity course! ★★★★★
Learn Ethical Hacking, one of the fastest-growing and highest-paying careers, with over 1 Million cybersecurity job openings available this year! Learn practical, useful cybersecurity step-by-step from Computer Science Professor Dr. Bryson Payne, a SANS|GIAC Certified Pen Tester (GPEN), Certified Ethical Hacker (CEH) and Certified Information Systems Security Professional (CISSP), and author of the Amazon #1 New Release and Top 10 Best Seller in Children's Programming Books, Teach Your Kids to Code (2015, No Starch Press). Dr. Payne is also the Director of the Center for Cyber Operations Education at the University of North Georgia and directs the National Cyber Warrior Academy summer program.
Who is the target audience? > Anyone who wants to protect their information, their family, their business, or their country from online attacks. > If you want to learn useful, real-world ethical hacking skills, this is the course for you. > This is NOT a certification course, but most skills will transfer to CEH, OSCP, and other hands-on certifications. > Perfect for beginners, or for competent computer users who want to learn how and why to protect themselves online.
Requirements > You should feel comfortable installing new software. > Some experience entering commands in the Linux, Mac, or Windows command-line terminal is helpful. > A PC, Mac, or Linux computer with up to 100 GB of free disk space to set up your FREE virtual lab. > No programming experience required.
What Will I Learn? > Secure your computer, your network, and your data from 99% of all attacks on the Internet. > Test for security vulnerabilities using the tricks the bad guys use. > Find and fix weaknesses and harden your computer's security. > Avoid phishing, viruses, ransomware, and online scams. > Keep yourself safe online, at home, at school, or at work.
02 Create Your Own Virtual Hacking Lab!/011 VM Lab Introduction and Virtual Box Installation-subtitle-en.vtt
4.5 KB
02 Create Your Own Virtual Hacking Lab!/012 Building a Kali Linux 2_0 Virtual Machine-subtitle-en.vtt
6.5 KB
02 Create Your Own Virtual Hacking Lab!/013 Create a Windows 10 VM-subtitle-en.vtt
9.2 KB
02 Create Your Own Virtual Hacking Lab!/014 Add a Windows 7 or 8 Virtual Machine-subtitle-en.vtt
3.9 KB
02 Create Your Own Virtual Hacking Lab!/014 Add a Windows 7 or 8 Virtual Machine.mp4
15.3 MB
02 Create Your Own Virtual Hacking Lab!/015 Create an Android Phone_Tablet VM for Mobile Hacking!-subtitle-en.vtt
8.2 KB
02 Create Your Own Virtual Hacking Lab!/016 The Ultimately Hackable Metasploitable!-subtitle-en.vtt
3.1 KB
02 Create Your Own Virtual Hacking Lab!/016 The Ultimately Hackable Metasploitable!.mp4
12.7 MB
03 Important Linux and Windows Terminal Commands/017 Intro to Command-Line Linux and Windows-subtitle-en.vtt
1.9 KB
03 Important Linux and Windows Terminal Commands/017 Intro to Command-Line Linux and Windows.mp4
5.4 MB
03 Important Linux and Windows Terminal Commands/017 Real-World-Linux-and-Windows-Commands.pdf
84.4 KB
03 Important Linux and Windows Terminal Commands/018 Basic Linux Commands-subtitle-en.vtt
8.5 KB
03 Important Linux and Windows Terminal Commands/019 Command-Line Linux File Magic!-subtitle-en.vtt
5.8 KB
03 Important Linux and Windows Terminal Commands/020 Advanced Linux Commands-subtitle-en.vtt
7.6 KB
03 Important Linux and Windows Terminal Commands/021 Basic Command-Line Commands for Windows-subtitle-en.vtt
5.5 KB
03 Important Linux and Windows Terminal Commands/022 Windows File Commands-subtitle-en.vtt
4.9 KB
03 Important Linux and Windows Terminal Commands/023 Advanced Windows Command-Line Commands-subtitle-en.vtt
5.4 KB
03 Important Linux and Windows Terminal Commands/024 Command-Line Review for Linux and Windows-subtitle-en.vtt
5.8 KB
03 Important Linux and Windows Terminal Commands/024 Real-World-Linux-and-Windows-Commands.pdf
84.4 KB
04 Create a Virtual Network for Ethical Hacking!/025 Virtual Networking in VirtualBox-subtitle-en.vtt
4.9 KB
04 Create a Virtual Network for Ethical Hacking!/025 Virtual Networking in VirtualBox.mp4
14.3 MB
04 Create a Virtual Network for Ethical Hacking!/026 Creating the Private_ Host-Only 10_0_3_x Network-subtitle-en.vtt
4.8 KB
04 Create a Virtual Network for Ethical Hacking!/026 Creating the Private_ Host-Only 10_0_3_x Network.mp4
14.8 MB
04 Create a Virtual Network for Ethical Hacking!/027 Connecting Your VMs to the Host-Only Network-subtitle-en.vtt
10.2 KB
04 Create a Virtual Network for Ethical Hacking!/028 Creating and Using a Public NAT Network in VBox-subtitle-en.vtt
7.4 KB
05 Social Engineering_ Capturing Usernames and Passwords via Phishing/029 Intro to Social Engineering-subtitle-en.vtt
10.1 KB
05 Social Engineering_ Capturing Usernames and Passwords via Phishing/030 The Social Engineer's Toolkit in Kali Linux-subtitle-en.vtt
5.4 KB
05 Social Engineering_ Capturing Usernames and Passwords via Phishing/031 Cloning Facebook and Harvesting User Passwords-subtitle-en.vtt
11.3 KB
05 Social Engineering_ Capturing Usernames and Passwords via Phishing/032 Intro to Spear-Phishing-subtitle-en.vtt
7.3 KB
05 Social Engineering_ Capturing Usernames and Passwords via Phishing/033 Advanced IP Address Masking_ Hiding Your Real URL-subtitle-en.vtt
8.5 KB
05 Social Engineering_ Capturing Usernames and Passwords via Phishing/034 Crafting the Perfect Spear-Phishing Email-subtitle-en.vtt
8.2 KB
05 Social Engineering_ Capturing Usernames and Passwords via Phishing/035 Capturing the User's Login and Password in Kali-subtitle-en.vtt
8.4 KB
05 Social Engineering_ Capturing Usernames and Passwords via Phishing/036 Review_ Social Engineering Techniques-subtitle-en.vtt
8.4 KB
05 Social Engineering_ Capturing Usernames and Passwords via Phishing/037 Stopping Phishing at Work and at Home-subtitle-en.vtt
10.8 KB
06 BONUS Section_ Car Hacking in Kali Linux!/038 Intro to Car Hacking!-subtitle-en.vtt
5.7 KB
06 BONUS Section_ Car Hacking in Kali Linux!/039 Installing the CAN-utils on Kali-subtitle-en.vtt
9.2 KB
06 BONUS Section_ Car Hacking in Kali Linux!/040 Using git to Install ICSim Instrument Cluster Simulator-subtitle-en.vtt
6.5 KB
06 BONUS Section_ Car Hacking in Kali Linux!/041 Running the ICSimulator-subtitle-en.vtt
10.7 KB
06 BONUS Section_ Car Hacking in Kali Linux!/042 Capturing CAN Traffic with CanSniffer-subtitle-en.vtt
6.6 KB
06 BONUS Section_ Car Hacking in Kali Linux!/043 The Replay Attack_ Replaying CAN Packets with CANplayer-subtitle-en.vtt
8.4 KB
06 BONUS Section_ Car Hacking in Kali Linux!/044 Car Hacking Review-subtitle-en.vtt
9.6 KB
06 BONUS Section_ Car Hacking in Kali Linux!/045 BONUS_ Hacking the Car Hacking Software_ to 1000 mph!-subtitle-en.vtt
12.7 KB
06 BONUS Section_ Car Hacking in Kali Linux!/046 Car Hacking LIVE on Dr_ Payne's VW Jetta_ Facebook Live Video from NCWA E7-subtitle-en.vtt
12.8 KB
07 Hacking Windows 7 with Metasploit!/047 Intro to Metasploit-subtitle-en.vtt
4.6 KB
07 Hacking Windows 7 with Metasploit!/048 Setting up Guest Additions in VirtualBox-subtitle-en.vtt
7.1 KB
07 Hacking Windows 7 with Metasploit!/049 Creating an Exploit Payload with Metasploit-subtitle-en.vtt
6.7 KB
07 Hacking Windows 7 with Metasploit!/050 Sharing the Exploit over the Web-subtitle-en.vtt
4.3 KB
07 Hacking Windows 7 with Metasploit!/051 Running the Exploit to Hack Windows 7-subtitle-en.vtt
4.4 KB
07 Hacking Windows 7 with Metasploit!/052 Intro to Meterpreter_ Your Remote Attack Shell!-subtitle-en.vtt
2.9 KB
07 Hacking Windows 7 with Metasploit!/052 Intro to Meterpreter_ Your Remote Attack Shell!.mp4
12.8 MB
07 Hacking Windows 7 with Metasploit!/053 Privilege Escalation_ Gaining Root Access and Dumping Password Hashes-subtitle-en.vtt
9 KB
07 Hacking Windows 7 with Metasploit!/054 Metasploit & Meterpreter Review-subtitle-en.vtt
5.2 KB
08 Hacking Windows 10 with Metasploit and Meterpreter in Kali Linux/055 Hacking Windows 10 with Metasploit-subtitle-en.vtt
6 KB
08 Hacking Windows 10 with Metasploit and Meterpreter in Kali Linux/056 Viewing and Downloading Files from a Victim Computer in Meterpreter-subtitle-en.vtt
5.1 KB
08 Hacking Windows 10 with Metasploit and Meterpreter in Kali Linux/057 Grabbing Screenshots_ Logging Keystrokes_ and Shutting Down Windows 10 Remotely-subtitle-en.vtt
6.4 KB
09 Password Problems - Everybody's Got 'Em_ Hacking_ Cracking_ Snacking & Hijacking/058 Six Problems with Passwords-subtitle-en.vtt
5.6 KB
09 Password Problems - Everybody's Got 'Em_ Hacking_ Cracking_ Snacking & Hijacking/058 Six Problems with Passwords.mp4
15.5 MB
09 Password Problems - Everybody's Got 'Em_ Hacking_ Cracking_ Snacking & Hijacking/059 Hijacking Stored Passwords from Chrome and Firefox-subtitle-en.vtt
09 Password Problems - Everybody's Got 'Em_ Hacking_ Cracking_ Snacking & Hijacking/062 Cracking Passwords with Kali and Online Tools-subtitle-en.vtt
10.5 KB
09 Password Problems - Everybody's Got 'Em_ Hacking_ Cracking_ Snacking & Hijacking/063 Seven Things You Can Do for Safer Passwords-subtitle-en.vtt
11.3 KB
10 Web Hacking - Testing and Securing Web Applications/064 Intro to Web Hacking-subtitle-en.vtt
4.4 KB
10 Web Hacking - Testing and Securing Web Applications/064 Intro to Web Hacking.mp4
15.6 MB
10 Web Hacking - Testing and Securing Web Applications/065 Hands-on Cross-Site Scripting (XSS) Attacks That Work!-subtitle-en.vtt
9.3 KB
10 Web Hacking - Testing and Securing Web Applications/066 SQL (Structured Query Language) Injection_ Messing with Databases-subtitle-en.vtt
4.7 KB
10 Web Hacking - Testing and Securing Web Applications/066 SQL (Structured Query Language) Injection_ Messing with Databases.mp4
15.7 MB
10 Web Hacking - Testing and Securing Web Applications/067 Advanced SQLi Attacks-subtitle-en.vtt
6.4 KB
10 Web Hacking - Testing and Securing Web Applications/068 Securing Web Applications from XSS_ SQLi and More-subtitle-en.vtt
7.3 KB
11 Mobile Hacking on Android/069 Intro to Hacking Android with Metasploit-subtitle-en.vtt
2.2 KB
11 Mobile Hacking on Android/069 Intro to Hacking Android with Metasploit.mp4
7.3 MB
11 Mobile Hacking on Android/070 Creating the Meterpreter Payload for Android-subtitle-en.vtt
5.6 KB
11 Mobile Hacking on Android/071 Exploiting Android from Kali Linux using Meterpreter-subtitle-en.vtt
6.9 KB
11 Mobile Hacking on Android/072 Advanced Android Exploits_ Accessing Storage_ Downloading and Uploading Files-subtitle-en.vtt
8.6 KB
12 Bonus Videos_ National Cyber Warrior Academy_ Interviews and More/073 Bonus videos from the National Cyber Warrior Academy-subtitle-en.vtt
1.3 KB
12 Bonus Videos_ National Cyber Warrior Academy_ Interviews and More/073 Bonus videos from the National Cyber Warrior Academy.mp4
9.3 MB
12 Bonus Videos_ National Cyber Warrior Academy_ Interviews and More/074 NCWA E6-subtitle-en.vtt
1.1 KB
12 Bonus Videos_ National Cyber Warrior Academy_ Interviews and More/074 NCWA E6.mp4
13.2 MB
12 Bonus Videos_ National Cyber Warrior Academy_ Interviews and More/075 NCWA E7 Facebook Live Video on Car Hacking and Drone Programming-subtitle-en.vtt
25.5 KB
12 Bonus Videos_ National Cyber Warrior Academy_ Interviews and More/076 WDUN Radio Interview July E7 on Cybersecurity Jobs and NCWA-subtitle-en.vtt
11 KB
12 Bonus Videos_ National Cyber Warrior Academy_ Interviews and More/076 WDUN Radio Interview July E7 on Cybersecurity Jobs and NCWA.mp4