17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
[UdemyCourseDownloader] Hacking In Practice Certified Ethical Hacking MEGA Course
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
Ethical Hacking in Practice: Certified Ethical Hacking MEGA Course
Practical ethical hacking techniques. This is one of the best and the most extensive ethical hacking courses on-line. 27+ HOURS
New course edition: 3.0 (LAST UPDATED: 01/2019)
BONUS: Finishing this ethical hacking course, you will get a free voucher for ISA CISS Examination!
This EXTENDED version contains over 239+ detailed lectures and over 27+ HOURS of VIDEO training. It's one of the most comprehensive ITsec and ethical hacking courses on Udemy.
Before we begin: the practical use of the course you are going to see has been proven by thousands of people all over the world. People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. Please, read carefully what we’d like to share with you.
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
01. IT Security Trends/1. Introduction to Current Cyber Threats.mp4
6.7 MB
01. IT Security Trends/1. Introduction to Current Cyber Threats.vtt
5.3 KB
01. IT Security Trends/10. Popular Myths About Computer System Security - notes for the examination.pdf
988.5 KB
01. IT Security Trends/11. Trends in IT Security.mp4
5.6 MB
01. IT Security Trends/11. Trends in IT Security.vtt
3.7 KB
01. IT Security Trends/12. The birth of technology society.mp4
5.7 MB
01. IT Security Trends/12. The birth of technology society.vtt
3.1 KB
01. IT Security Trends/13. EXERCISE How much info can you gather.mp4
5.4 MB
01. IT Security Trends/13. EXERCISE How much info can you gather.vtt
3.7 KB
01. IT Security Trends/14. Fake identity.mp4
7.9 MB
01. IT Security Trends/14. Fake identity.vtt
4.9 KB
01. IT Security Trends/15. Online privacy.mp4
9.5 MB
01. IT Security Trends/15. Online privacy.vtt
5.9 KB
01. IT Security Trends/16. Analyzing sniffing software.mp4
5.8 MB
01. IT Security Trends/16. Analyzing sniffing software.vtt
3.3 KB
01. IT Security Trends/17. Cyber War.mp4
13.7 MB
01. IT Security Trends/17. Cyber War.vtt
7.7 KB
01. IT Security Trends/18. Changing IT Security Trends - notes for the examination.pdf
2.1 MB
01. IT Security Trends/19. Objective #1 - Data security - Introduction.mp4
11.4 MB
01. IT Security Trends/19. Objective #1 - Data security - Introduction.vtt
6.4 KB
01. IT Security Trends/2. IT Prehistory.mp4
7.8 MB
01. IT Security Trends/2. IT Prehistory.vtt
5 KB
01. IT Security Trends/20. Confidentiality of data.mp4
9.6 MB
01. IT Security Trends/20. Confidentiality of data.vtt
4.9 KB
01. IT Security Trends/21. EXERCISE Finding confidential data with search engines.mp4
8.9 MB
01. IT Security Trends/21. EXERCISE Finding confidential data with search engines.vtt
5.2 KB
01. IT Security Trends/22. Integrity of data.mp4
10.1 MB
01. IT Security Trends/22. Integrity of data.vtt
6.2 KB
01. IT Security Trends/23. Data security - notes for the examination.pdf
2 MB
01. IT Security Trends/3. Let’s look a few years back.mp4
7.3 MB
01. IT Security Trends/3. Let’s look a few years back.vtt
5.3 KB
01. IT Security Trends/4. Cyber crimes - an evolution not revolution.mp4
6.4 MB
01. IT Security Trends/4. Cyber crimes - an evolution not revolution.vtt
5.1 KB
01. IT Security Trends/5. Current Cyber Threats - notes for the examination.pdf
1.5 MB
01. IT Security Trends/6. Popular myths about IT security - origins.mp4
8.3 MB
01. IT Security Trends/6. Popular myths about IT security - origins.vtt
5.6 KB
01. IT Security Trends/7. Myths #1 - you’ll never be hacked.mp4
8.7 MB
01. IT Security Trends/7. Myths #1 - you’ll never be hacked.vtt
6 KB
01. IT Security Trends/8. Myths #2 - you don’t need any protection software or hardware.mp4
7.5 MB
01. IT Security Trends/8. Myths #2 - you don’t need any protection software or hardware.vtt
5.5 KB
01. IT Security Trends/9. Myths #3 - IT security is always a priority.mp4
1.6 MB
01. IT Security Trends/9. Myths #3 - IT security is always a priority.vtt