17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
Udemy - Master Cyber Security A Step-by-Step Guide For 2022
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
Master Cyber Security | A Step-by-Step Guide for 2022 | Practice your skills with 200 (MCQs) Multiple Choice Questions.
What you'll learn: List the major application areas of Cyber Security that exist today. Familiarize yourself with examples of Cyber Security tools and examples. Recount the advantages and disadvantages of Cyber Security. Ideate a project work for practicing Cyber Security. Choose from the wide range of career options available in Cyber Security.
Requirements No prior knowledge of Cyber Security is required.
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/1. Introduction/1. Introduction.mp4
25.3 MB
~Get Your Files Here !/1. Introduction/1. Introduction.srt
3.9 KB
~Get Your Files Here !/10. Cyber Security Career Paths/1. Incident Response Analyst.mp4
10.2 MB
~Get Your Files Here !/10. Cyber Security Career Paths/1. Incident Response Analyst.srt
1.7 KB
~Get Your Files Here !/10. Cyber Security Career Paths/2. Risk Analyst.mp4
9 MB
~Get Your Files Here !/10. Cyber Security Career Paths/2. Risk Analyst.srt
1.5 KB
~Get Your Files Here !/10. Cyber Security Career Paths/3. Penetration Tester.mp4
8.9 MB
~Get Your Files Here !/10. Cyber Security Career Paths/3. Penetration Tester.srt
1.4 KB
~Get Your Files Here !/10. Cyber Security Career Paths/4. Security Engineer.mp4
8.6 MB
~Get Your Files Here !/10. Cyber Security Career Paths/4. Security Engineer.srt
1.5 KB
~Get Your Files Here !/10. Cyber Security Career Paths/5. Forensics Analyst.mp4
10.6 MB
~Get Your Files Here !/10. Cyber Security Career Paths/5. Forensics Analyst.srt
1.7 KB
~Get Your Files Here !/10. Cyber Security Career Paths/6. Chief information security officer (CISO).mp4
12.4 MB
~Get Your Files Here !/10. Cyber Security Career Paths/6. Chief information security officer (CISO).srt
1.9 KB
~Get Your Files Here !/10. Cyber Security Career Paths/7. Chief Information Officers (CIO).mp4
13.2 MB
~Get Your Files Here !/10. Cyber Security Career Paths/7. Chief Information Officers (CIO).srt
2.1 KB
~Get Your Files Here !/11. Recap/1. Recap.mp4
5.8 MB
~Get Your Files Here !/11. Recap/1. Recap.srt
1.1 KB
~Get Your Files Here !/12. Assessment on Cyber Security/1. 100 Multiple Choice Questions on Cyber Security.html
202 B
~Get Your Files Here !/12. Assessment on Cyber Security/2. 100 Multiple Choice Questions on Cyber Security.html
202 B
~Get Your Files Here !/2. Cyber Security/1. What is Cyber Security.mp4
23.8 MB
~Get Your Files Here !/2. Cyber Security/1. What is Cyber Security.srt
3.6 KB
~Get Your Files Here !/2. Cyber Security/2. History of Cyber Security.mp4
22.6 MB
~Get Your Files Here !/2. Cyber Security/2. History of Cyber Security.srt
3.8 KB
~Get Your Files Here !/2. Cyber Security/3. Benefits of Cyber Security.mp4
14.5 MB
~Get Your Files Here !/2. Cyber Security/3. Benefits of Cyber Security.srt
2.4 KB
~Get Your Files Here !/2. Cyber Security/4. Careers in Cyber Security.mp4
20.2 MB
~Get Your Files Here !/2. Cyber Security/4. Careers in Cyber Security.srt
3.3 KB
~Get Your Files Here !/2. Cyber Security/5. Future of Cyber Security.mp4
28.9 MB
~Get Your Files Here !/2. Cyber Security/5. Future of Cyber Security.srt
4.4 KB
~Get Your Files Here !/3. Data Science/1. What is Data Science.mp4
25 MB
~Get Your Files Here !/3. Data Science/1. What is Data Science.srt
3.9 KB
~Get Your Files Here !/3. Data Science/2. History of Data Science.mp4
26.3 MB
~Get Your Files Here !/3. Data Science/2. History of Data Science.srt
3.8 KB
~Get Your Files Here !/3. Data Science/3. Benefits of Data Science.mp4
20 MB
~Get Your Files Here !/3. Data Science/3. Benefits of Data Science.srt
3.2 KB
~Get Your Files Here !/3. Data Science/4. Careers in Data Science.mp4
25.1 MB
~Get Your Files Here !/3. Data Science/4. Careers in Data Science.srt
4.1 KB
~Get Your Files Here !/3. Data Science/5. Future of Data Science.mp4
20.5 MB
~Get Your Files Here !/3. Data Science/5. Future of Data Science.srt
3.3 KB
~Get Your Files Here !/4. Applications of Cyber Security/1. Backup and Data Recovery.mp4
9.4 MB
~Get Your Files Here !/4. Applications of Cyber Security/1. Backup and Data Recovery.srt
1.5 KB
~Get Your Files Here !/4. Applications of Cyber Security/10. Vulnerability Assessments and Security Training.mp4
5.5 MB
~Get Your Files Here !/4. Applications of Cyber Security/10. Vulnerability Assessments and Security Training.srt
942 B
~Get Your Files Here !/4. Applications of Cyber Security/2. Physical Access Controls.mp4
5.1 MB
~Get Your Files Here !/4. Applications of Cyber Security/2. Physical Access Controls.srt
829 B
~Get Your Files Here !/4. Applications of Cyber Security/3. Logical Access Controls.mp4
8 MB
~Get Your Files Here !/4. Applications of Cyber Security/3. Logical Access Controls.srt
1.2 KB
~Get Your Files Here !/4. Applications of Cyber Security/4. Securely Configured and Encrypted Devices.mp4
7.5 MB
~Get Your Files Here !/4. Applications of Cyber Security/4. Securely Configured and Encrypted Devices.srt
1.1 KB
~Get Your Files Here !/4. Applications of Cyber Security/5. Securely Configured Network Components.mp4
3.9 MB
~Get Your Files Here !/4. Applications of Cyber Security/5. Securely Configured Network Components.srt
661 B
~Get Your Files Here !/4. Applications of Cyber Security/6. Network segmentation.mp4
3.1 MB
~Get Your Files Here !/4. Applications of Cyber Security/6. Network segmentation.srt
607 B
~Get Your Files Here !/4. Applications of Cyber Security/7. Email and Online Protection.mp4
7.4 MB
~Get Your Files Here !/4. Applications of Cyber Security/7. Email and Online Protection.srt
1.3 KB
~Get Your Files Here !/4. Applications of Cyber Security/8. Wireless security.mp4
4.1 MB
~Get Your Files Here !/4. Applications of Cyber Security/8. Wireless security.srt
810 B
~Get Your Files Here !/4. Applications of Cyber Security/9. Maintenance, Monitoring and Patching.mp4
7.9 MB
~Get Your Files Here !/4. Applications of Cyber Security/9. Maintenance, Monitoring and Patching.srt
1.3 KB
~Get Your Files Here !/5. Cybersecurity Tools/1. BluVector.mp4
7.7 MB
~Get Your Files Here !/5. Cybersecurity Tools/1. BluVector.srt
1.4 KB
~Get Your Files Here !/5. Cybersecurity Tools/2. Bricata.mp4
10.2 MB
~Get Your Files Here !/5. Cybersecurity Tools/2. Bricata.srt
1.8 KB
~Get Your Files Here !/5. Cybersecurity Tools/3. Cloud Defender.mp4
9.7 MB
~Get Your Files Here !/5. Cybersecurity Tools/3. Cloud Defender.srt
1.7 KB
~Get Your Files Here !/5. Cybersecurity Tools/4. Cofense Triage.mp4
11.1 MB
~Get Your Files Here !/5. Cybersecurity Tools/4. Cofense Triage.srt
1.7 KB
~Get Your Files Here !/5. Cybersecurity Tools/5. Contrast Security.mp4
6.7 MB
~Get Your Files Here !/5. Cybersecurity Tools/5. Contrast Security.srt
1.1 KB
~Get Your Files Here !/5. Cybersecurity Tools/6. Digital Gaurdian.mp4
10.6 MB
~Get Your Files Here !/5. Cybersecurity Tools/6. Digital Gaurdian.srt
1.7 KB
~Get Your Files Here !/5. Cybersecurity Tools/7. Mantix4.mp4
6.3 MB
~Get Your Files Here !/5. Cybersecurity Tools/7. Mantix4.srt
1 KB
~Get Your Files Here !/5. Cybersecurity Tools/8. SecBI.mp4
9.9 MB
~Get Your Files Here !/5. Cybersecurity Tools/8. SecBI.srt
1.6 KB
~Get Your Files Here !/6. Cyber Security Examples/1. Malware.mp4
6.9 MB
~Get Your Files Here !/6. Cyber Security Examples/1. Malware.srt
1.1 KB
~Get Your Files Here !/6. Cyber Security Examples/2. Ransomware Attacks.mp4
13.6 MB
~Get Your Files Here !/6. Cyber Security Examples/2. Ransomware Attacks.srt
2.4 KB
~Get Your Files Here !/6. Cyber Security Examples/3. Man in the Middle Attacks.mp4
7.9 MB
~Get Your Files Here !/6. Cyber Security Examples/3. Man in the Middle Attacks.srt
1.4 KB
~Get Your Files Here !/6. Cyber Security Examples/4. Distributed Denial of Service (DDoS).mp4
10.4 MB
~Get Your Files Here !/6. Cyber Security Examples/4. Distributed Denial of Service (DDoS).srt
1.4 KB
~Get Your Files Here !/6. Cyber Security Examples/5. Password Attacks.mp4
15.7 MB
~Get Your Files Here !/6. Cyber Security Examples/5. Password Attacks.srt
2.3 KB
~Get Your Files Here !/6. Cyber Security Examples/6. Drive-By Download Attacks.mp4
10.2 MB
~Get Your Files Here !/6. Cyber Security Examples/6. Drive-By Download Attacks.srt
1.8 KB
~Get Your Files Here !/7. Cyber Security Project Ideas/1. Keylogging.mp4
5.8 MB
~Get Your Files Here !/7. Cyber Security Project Ideas/1. Keylogging.srt
1 KB
~Get Your Files Here !/7. Cyber Security Project Ideas/2. Packet Sniffing.mp4
9.2 MB
~Get Your Files Here !/7. Cyber Security Project Ideas/2. Packet Sniffing.srt
1.6 KB
~Get Your Files Here !/7. Cyber Security Project Ideas/3. Bug Bounties.mp4
5.8 MB
~Get Your Files Here !/7. Cyber Security Project Ideas/3. Bug Bounties.srt
1 KB
~Get Your Files Here !/7. Cyber Security Project Ideas/4. Breaking Caesar Cipher.mp4
6.3 MB
~Get Your Files Here !/7. Cyber Security Project Ideas/4. Breaking Caesar Cipher.srt
994 B
~Get Your Files Here !/7. Cyber Security Project Ideas/5. SQL Injection.mp4
6 MB
~Get Your Files Here !/7. Cyber Security Project Ideas/5. SQL Injection.srt