Filename Size 2. GETTING STARTED WITH CYBER SECURITY/1. Definition of Computer Security.mp4 28.4 MB 2. GETTING STARTED WITH CYBER SECURITY/1. Definition of Computer Security.srt 3.9 KB 2. GETTING STARTED WITH CYBER SECURITY/2. Interesting Facts about Cyber Security.mp4 42.8 MB 2. GETTING STARTED WITH CYBER SECURITY/2. Interesting Facts about Cyber Security.srt 5.3 KB 2. GETTING STARTED WITH CYBER SECURITY/3. Have a look at this!.mp4 11.7 MB 2. GETTING STARTED WITH CYBER SECURITY/3. Have a look at this!.srt 776 B 2. GETTING STARTED WITH CYBER SECURITY/4. History of Cyber Security.mp4 60.1 MB 2. GETTING STARTED WITH CYBER SECURITY/4. History of Cyber Security.srt 7.2 KB 2. GETTING STARTED WITH CYBER SECURITY/5. Scope and Career Insights in Cyber Security.mp4 48.3 MB 2. GETTING STARTED WITH CYBER SECURITY/5. Scope and Career Insights in Cyber Security.srt 10.7 KB 2. GETTING STARTED WITH CYBER SECURITY/5.1 How to Become a Cyber Security Professional.html 94 B 2. GETTING STARTED WITH CYBER SECURITY/6. GETTING STARTED WITH CYBER SECURITY QUIZ.html 661 B 2. GETTING STARTED WITH CYBER SECURITY/7. DID YOU RATE.html 2.5 KB 2. GETTING STARTED WITH CYBER SECURITY/8. Conclusion.mp4 3.6 MB 2. GETTING STARTED WITH CYBER SECURITY/8. Conclusion.srt 693 B 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/1. Introduction.mp4 5.7 MB 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/1. Introduction.srt 1.4 KB 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/10. SECTION 3 QUIZ.html 627 B 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/11. We value your feedback!.html 2.5 KB 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/12. Conclusion.mp4 2.6 MB 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/12. Conclusion.srt 785 B 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/2. Standard Definition of Cyber Security.mp4 19 MB 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/2. Standard Definition of Cyber Security.srt 3.1 KB 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/3. Types of Computer Security.mp4 25.1 MB 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/3. Types of Computer Security.srt 3.3 KB 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/4. Key Terms in Cyber Security.mp4 30.7 MB 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/4. Key Terms in Cyber Security.srt 8 KB 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/5. The Elements of Information Security.mp4 23.1 MB 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/5. The Elements of Information Security.srt 6.4 KB 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/6. Types of Attacks.mp4 43.4 MB 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/6. Types of Attacks.srt 13.3 KB 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/7. Roles in Cyber Security Part 1.mp4 49 MB 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/7. Roles in Cyber Security Part 1.srt 9.6 KB 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/8. Roles in Cyber Security Part 2.mp4 34 MB 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/8. Roles in Cyber Security Part 2.srt 6.3 KB 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/9. PRACTICAL USING OSINT FRAMEWORK FOR INFORMATION GATHERING.mp4 41.2 MB 3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/9. PRACTICAL USING OSINT FRAMEWORK FOR INFORMATION GATHERING.srt 6.4 KB 4. DIVING DEEP INTO CYBER SECURITY/1. Introduction.mp4 10.2 MB 4. DIVING DEEP INTO CYBER SECURITY/1. Introduction.srt 1.7 KB 4. DIVING DEEP INTO CYBER SECURITY/10. Symmetric Encryption.mp4 14.4 MB 4. DIVING DEEP INTO CYBER SECURITY/10. Symmetric Encryption.srt 3.5 KB 4. DIVING DEEP INTO CYBER SECURITY/11. AES and DES.mp4 44.5 MB 4. DIVING DEEP INTO CYBER SECURITY/11. AES and DES.srt 7.1 KB 4. DIVING DEEP INTO CYBER SECURITY/12. Asymmetric Encryption.mp4 16.3 MB 4. DIVING DEEP INTO CYBER SECURITY/12. Asymmetric Encryption.srt 3.1 KB 4. DIVING DEEP INTO CYBER SECURITY/13. Hey there! Support We Secure..html 2.5 KB 4. DIVING DEEP INTO CYBER SECURITY/14. RSA & Diffie Hellman.mp4 47.5 MB 4. DIVING DEEP INTO CYBER SECURITY/14. RSA & Diffie Hellman.srt 9.2 KB 4. DIVING DEEP INTO CYBER SECURITY/15. Hashing.mp4 62.1 MB 4. DIVING DEEP INTO CYBER SECURITY/15. Hashing.srt 8.4 KB 4. DIVING DEEP INTO CYBER SECURITY/16. Security Organizations.mp4 26.8 MB 4. DIVING DEEP INTO CYBER SECURITY/16. Security Organizations.srt 5.9 KB 4. DIVING DEEP INTO CYBER SECURITY/17. Critical Thinking in Cyber Security.mp4 21.7 MB 4. DIVING DEEP INTO CYBER SECURITY/17. Critical Thinking in Cyber Security.srt 4.8 KB 4. DIVING DEEP INTO CYBER SECURITY/18. The Five Critical Thinking Skills.mp4 24.1 MB 4. DIVING DEEP INTO CYBER SECURITY/18. The Five Critical Thinking Skills.srt 7.2 KB 4. DIVING DEEP INTO CYBER SECURITY/19. PRACTICAL USING NSLOOKUP TOOL.mp4 7.1 MB 4. DIVING DEEP INTO CYBER SECURITY/19. PRACTICAL USING NSLOOKUP TOOL.srt 3.1 KB 4. DIVING DEEP INTO CYBER SECURITY/2. Security Architect's View of Security.mp4 47 MB 4. DIVING DEEP INTO CYBER SECURITY/2. Security Architect's View of Security.srt 10 KB 4. DIVING DEEP INTO CYBER SECURITY/20. PRACTICAL USING NETSTAT TOOL.mp4 32.4 MB 4. DIVING DEEP INTO CYBER SECURITY/20. PRACTICAL USING NETSTAT TOOL.srt 4.4 KB 4. DIVING DEEP INTO CYBER SECURITY/21. SECTION 4 QUIZ - DIVING DEEP INTO CYBER SECURITY.html 627 B 4. DIVING DEEP INTO CYBER SECURITY/22. Conclusion.mp4 2.8 MB 4. DIVING DEEP INTO CYBER SECURITY/22. Conclusion.srt 726 B 4. DIVING DEEP INTO CYBER SECURITY/3. What is Vulnerability Assessment.mp4 37 MB 4. DIVING DEEP INTO CYBER SECURITY/3. What is Vulnerability Assessment.srt 5.8 KB 4. DIVING DEEP INTO CYBER SECURITY/4. 4 Phases of Vulnerability Assessment.mp4 40.4 MB 4. DIVING DEEP INTO CYBER SECURITY/4. 4 Phases of Vulnerability Assessment.srt 12.6 KB 4. DIVING DEEP INTO CYBER SECURITY/5. PRACTICAL DOWNLOADING NESSUS VULNERABILITY SCANNER.mp4 11.2 MB 4. DIVING DEEP INTO CYBER SECURITY/5. PRACTICAL DOWNLOADING NESSUS VULNERABILITY SCANNER.srt 2 KB 4. DIVING DEEP INTO CYBER SECURITY/6. PRACTICAL CREATING A ADVANCE NETWORK SCAN POLICY.mp4 28.8 MB 4. DIVING DEEP INTO CYBER SECURITY/6. PRACTICAL CREATING A ADVANCE NETWORK SCAN POLICY.srt 7.5 KB 4. DIVING DEEP INTO CYBER SECURITY/7. PRACTICAL INITIATING A SCAN USING USER DEFINED POLICIES.mp4 16.8 MB 4. DIVING DEEP INTO CYBER SECURITY/7. PRACTICAL INITIATING A SCAN USING USER DEFINED POLICIES.srt 3.8 KB 4. DIVING DEEP INTO CYBER SECURITY/8. PRACTICAL GOING THROUGH SCANNED RESULTS.mp4 15.1 MB 4. DIVING DEEP INTO CYBER SECURITY/8. PRACTICAL GOING THROUGH SCANNED RESULTS.srt 4.1 KB 4. DIVING DEEP INTO CYBER SECURITY/9. Introduction to Cryptography.mp4 41.9 MB 4. DIVING DEEP INTO CYBER SECURITY/9. Introduction to Cryptography.srt 5.8 KB 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/1. Introduction.mp4 7.2 MB 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/1. Introduction.srt 1 KB 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/19. PRACTICAL HOW TO FIND OUT USERNAMES AND PASSWORDS USING SOCIAL ENGINEERING.mp4 85.5 MB 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/2. Different types of Actors in Cyber Security.mp4 64.4 MB 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/2. Different types of Actors in Cyber Security.srt 11.3 KB 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/3. Types of Cyber Attacks.mp4 31.4 MB 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/3. Types of Cyber Attacks.srt 5 KB 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/4. Hacking Organizations around the Globe.mp4 27.1 MB 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/4. Hacking Organizations around the Globe.srt 5.9 KB 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/5. Security Services and Mechanisms.mp4 17.6 MB 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/5. Security Services and Mechanisms.srt 4.3 KB 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/6. Introduction to Threats.mp4 11.2 MB 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/6. Introduction to Threats.srt 4 KB 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/7. What is a Malware.mp4 47.5 MB 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/7. What is a Malware.srt 9.3 KB 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/8. Everything about Trojans.mp4 50.2 MB 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/8. Everything about Trojans.srt 8.6 KB 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/9. Types of Trojans.mp4 49.6 MB 5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/9. Types of Trojans.srt 8.1 KB Verify Files.txt 1 KB