17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
Udemy - Cyber Security For Absolute Beginners - Essential Concepts
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
What you'll learn Understand the Fundamentals of Cyber Security Threats & Countermeasures Have a Strong Fundamental Understanding of Cyber Security Be Prepared for More Advanced Cyber Security Courses Better Protect Your Business & I.T. Infrastructure
Requirements Understand the Fundamentals of Cyber Security Threats & Countermeasures Have a Strong Fundamental Understanding of Cyber Security Be Prepared for More Advanced Cyber Security Courses Better Protect Your Business & I.T. Infrastructure
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/1. Course Introduction/1. Welcome to the Course!.mp4
22.4 MB
~Get Your Files Here !/1. Course Introduction/1. Welcome to the Course!.mp4.jpg
140.2 KB
~Get Your Files Here !/1. Course Introduction/1. Welcome to the Course!.srt
6.1 KB
~Get Your Files Here !/1. Course Introduction/2. Why Learn Cyber Security from Me.mp4
14.7 MB
~Get Your Files Here !/1. Course Introduction/2. Why Learn Cyber Security from Me.srt
4 KB
~Get Your Files Here !/1. Course Introduction/3. Course Companion Study Guide.mp4
15.9 MB
~Get Your Files Here !/1. Course Introduction/3. Course Companion Study Guide.srt
1.3 KB
~Get Your Files Here !/1. Course Introduction/3.1 Course Companion Study Guide.pdf
2.2 MB
~Get Your Files Here !/1. Course Introduction/4. Course Case Studies Overview.mp4
19.1 MB
~Get Your Files Here !/1. Course Introduction/4. Course Case Studies Overview.srt
1.5 KB
~Get Your Files Here !/1. Course Introduction/5. Familiarizing Yourself with Udemy's Course Taking Interface.mp4
62.7 MB
~Get Your Files Here !/1. Course Introduction/5. Familiarizing Yourself with Udemy's Course Taking Interface.srt
11.3 KB
~Get Your Files Here !/1. Course Introduction/6. How to Access Course Subtitles & Transcripts.html
1 KB
~Get Your Files Here !/1. Course Introduction/7. Join our Facebook Student Community.html
1.1 KB
~Get Your Files Here !/1. Course Introduction/8. Udemy Mobile App for iOS & Android - Download & Take Course Videos On the Go!.html
1.2 KB
~Get Your Files Here !/1. Course Introduction/9. Student Exercise Introduce Yourself.html
281 B
~Get Your Files Here !/10. Cyber Security in the Workplace/1. Section Introduction.mp4
10.6 MB
~Get Your Files Here !/10. Cyber Security in the Workplace/1. Section Introduction.srt
832 B
~Get Your Files Here !/10. Cyber Security in the Workplace/2. Patch Management & Change Management.mp4
23.1 MB
~Get Your Files Here !/10. Cyber Security in the Workplace/2. Patch Management & Change Management.srt
6.9 KB
~Get Your Files Here !/10. Cyber Security in the Workplace/3. Incident Response.mp4
30.2 MB
~Get Your Files Here !/10. Cyber Security in the Workplace/3. Incident Response.srt
8.8 KB
~Get Your Files Here !/10. Cyber Security in the Workplace/4. Application Development Security.mp4
31.1 MB
~Get Your Files Here !/10. Cyber Security in the Workplace/4. Application Development Security.srt
8.3 KB
~Get Your Files Here !/10. Cyber Security in the Workplace/5. Security Assessments.mp4
18.8 MB
~Get Your Files Here !/10. Cyber Security in the Workplace/5. Security Assessments.srt
5.7 KB
~Get Your Files Here !/10. Cyber Security in the Workplace/6. Risk Management Program.mp4
28.8 MB
~Get Your Files Here !/10. Cyber Security in the Workplace/6. Risk Management Program.srt
7.7 KB
~Get Your Files Here !/10. Cyber Security in the Workplace/7. Personnel Policies.mp4
20.9 MB
~Get Your Files Here !/10. Cyber Security in the Workplace/7. Personnel Policies.srt
6.9 KB
~Get Your Files Here !/10. Cyber Security in the Workplace/8. Training, Eduation and Awareness.mp4
21.6 MB
~Get Your Files Here !/10. Cyber Security in the Workplace/8. Training, Eduation and Awareness.srt
7.2 KB
~Get Your Files Here !/11. Conclusion & Next Steps/1. Congratulations.mp4
20.2 MB
~Get Your Files Here !/11. Conclusion & Next Steps/1. Congratulations.srt
1.7 KB
~Get Your Files Here !/11. Conclusion & Next Steps/2. How to Download Your Udemy Course Certificate of Completion.html
659 B
~Get Your Files Here !/2. Introduction to Cyber Security/1. Section Introduction.mp4
10.7 MB
~Get Your Files Here !/2. Introduction to Cyber Security/1. Section Introduction.srt
756 B
~Get Your Files Here !/2. Introduction to Cyber Security/2. What is Cyber Security.mp4
24.4 MB
~Get Your Files Here !/2. Introduction to Cyber Security/2. What is Cyber Security.srt
4.7 KB
~Get Your Files Here !/2. Introduction to Cyber Security/3. Why Do We Need Cyber Security.mp4
23.3 MB
~Get Your Files Here !/2. Introduction to Cyber Security/3. Why Do We Need Cyber Security.srt
7.7 KB
~Get Your Files Here !/2. Introduction to Cyber Security/4. The Current State of Cybersecurity in 2021 & 2022.mp4
55.7 MB
~Get Your Files Here !/2. Introduction to Cyber Security/4. The Current State of Cybersecurity in 2021 & 2022.srt
9.6 KB
~Get Your Files Here !/3. Understanding Hackers/1. Section Introduction.mp4
12.8 MB
~Get Your Files Here !/3. Understanding Hackers/1. Section Introduction.srt
1.1 KB
~Get Your Files Here !/3. Understanding Hackers/2. What Hacking Isn’t.mp4
40.2 MB
~Get Your Files Here !/3. Understanding Hackers/2. What Hacking Isn’t.srt
3.1 KB
~Get Your Files Here !/3. Understanding Hackers/3. Types of Hackers.mp4
10.5 MB
~Get Your Files Here !/3. Understanding Hackers/3. Types of Hackers.srt
3.5 KB
~Get Your Files Here !/3. Understanding Hackers/4. Hacker Motivations.mp4
18 MB
~Get Your Files Here !/3. Understanding Hackers/4. Hacker Motivations.srt
5.5 KB
~Get Your Files Here !/3. Understanding Hackers/5. The Hacking Methodology.mp4
23.6 MB
~Get Your Files Here !/3. Understanding Hackers/5. The Hacking Methodology.srt
11.2 KB
~Get Your Files Here !/4. Networking 101/1. Section Introduction.mp4
20.2 MB
~Get Your Files Here !/4. Networking 101/1. Section Introduction.srt
1.8 KB
~Get Your Files Here !/4. Networking 101/10. Student Exercise 2 Identifying your MAC and IP Address (Windows and Mac OS).mp4
34.1 MB
~Get Your Files Here !/4. Networking 101/10. Student Exercise 2 Identifying your MAC and IP Address (Windows and Mac OS).srt
5.7 KB
~Get Your Files Here !/4. Networking 101/2. What is a Computer Network.mp4
8.4 MB
~Get Your Files Here !/4. Networking 101/2. What is a Computer Network.srt
2.9 KB
~Get Your Files Here !/4. Networking 101/3. Some Basic Networking Rules.mp4
9.4 MB
~Get Your Files Here !/4. Networking 101/3. Some Basic Networking Rules.srt
3 KB
~Get Your Files Here !/4. Networking 101/4. Computer Protocols.mp4
12.5 MB
~Get Your Files Here !/4. Networking 101/4. Computer Protocols.srt
4.2 KB
~Get Your Files Here !/4. Networking 101/5. LANs versus WANs.mp4
18.3 MB
~Get Your Files Here !/4. Networking 101/5. LANs versus WANs.srt
5.7 KB
~Get Your Files Here !/4. Networking 101/6. MAC versus IP Addresses.mp4
16.9 MB
~Get Your Files Here !/4. Networking 101/6. MAC versus IP Addresses.srt
4.9 KB
~Get Your Files Here !/4. Networking 101/7. Switches versus Routers.mp4
27.8 MB
~Get Your Files Here !/4. Networking 101/7. Switches versus Routers.srt
8 KB
~Get Your Files Here !/4. Networking 101/8. TCPIP Protocol Suite.mp4
21.2 MB
~Get Your Files Here !/4. Networking 101/8. TCPIP Protocol Suite.srt
5.5 KB
~Get Your Files Here !/4. Networking 101/9. How the Internet Works (Simplified).mp4
26.8 MB
~Get Your Files Here !/4. Networking 101/9. How the Internet Works (Simplified).srt
6.2 KB
~Get Your Files Here !/5. Malware Threats/1. Section Introduction.mp4
7.9 MB
~Get Your Files Here !/5. Malware Threats/1. Section Introduction.srt
687 B
~Get Your Files Here !/5. Malware Threats/2. Viruses and Worms.mp4
20.2 MB
~Get Your Files Here !/5. Malware Threats/2. Viruses and Worms.srt
6 KB
~Get Your Files Here !/5. Malware Threats/3. Trojan Horses and Logic Bombs.mp4
14 MB
~Get Your Files Here !/5. Malware Threats/3. Trojan Horses and Logic Bombs.srt
4.9 KB
~Get Your Files Here !/5. Malware Threats/4. Spyware and Adware.mp4
11 MB
~Get Your Files Here !/5. Malware Threats/4. Spyware and Adware.srt
4.3 KB
~Get Your Files Here !/5. Malware Threats/5. Ransomware and Rootkits.mp4
28.5 MB
~Get Your Files Here !/5. Malware Threats/5. Ransomware and Rootkits.srt
6.3 KB
~Get Your Files Here !/5. Malware Threats/6. How Hackers Deploy Malware.mp4
20.4 MB
~Get Your Files Here !/5. Malware Threats/6. How Hackers Deploy Malware.srt
5.4 KB
~Get Your Files Here !/5. Malware Threats/7. Case Study Colonial Pipeline.html
2.5 KB
~Get Your Files Here !/6. Additional Threats & Vulnerabilities/1. Section Introduction.mp4
10 MB
~Get Your Files Here !/6. Additional Threats & Vulnerabilities/1. Section Introduction.srt
877 B
~Get Your Files Here !/6. Additional Threats & Vulnerabilities/2. Zero-Day Attacks.mp4
15.1 MB
~Get Your Files Here !/6. Additional Threats & Vulnerabilities/2. Zero-Day Attacks.srt
4 KB
~Get Your Files Here !/6. Additional Threats & Vulnerabilities/3. Buffer Overflows.mp4
23.7 MB
~Get Your Files Here !/6. Additional Threats & Vulnerabilities/3. Buffer Overflows.srt
6.7 KB
~Get Your Files Here !/6. Additional Threats & Vulnerabilities/4. Protocol Spoofing.mp4
31.1 MB
~Get Your Files Here !/6. Additional Threats & Vulnerabilities/4. Protocol Spoofing.srt
10.8 KB
~Get Your Files Here !/6. Additional Threats & Vulnerabilities/5. DoS and DDoS Attacks.mp4
15.5 MB
~Get Your Files Here !/6. Additional Threats & Vulnerabilities/5. DoS and DDoS Attacks.srt
4.8 KB
~Get Your Files Here !/6. Additional Threats & Vulnerabilities/6. Weak Encryption Key & Software Vulnerability Attacks.mp4
20.9 MB
~Get Your Files Here !/6. Additional Threats & Vulnerabilities/6. Weak Encryption Key & Software Vulnerability Attacks.srt