Aredito que é humano / I believe you're human
File/Fichero/Archivo Size/Tam Offset
1. Introduction to Current Cyber Threats.mp4 21.5 MB 0 B
1. Introduction to Current Cyber Threats.vtt 5.47 kB 21.5 MB
10. Popular Myths About Computer System Security - notes for the examination.pdf 1.01 MB 21.5 MB
11. Trends in IT Security.mp4 19.6 MB 22.5 MB
11. Trends in IT Security.vtt 3.77 kB 42.1 MB
12. The birth of technology society.mp4 19.5 MB 42.1 MB
12. The birth of technology society.vtt 3.13 kB 61.6 MB
13. EXERCISE How much info can you gather.mp4 14.4 MB 61.6 MB
13. EXERCISE How much info can you gather.vtt 3.79 kB 76 MB
14. Fake identity.mp4 22.8 MB 76 MB
14. Fake identity.vtt 5.04 kB 98.8 MB
15. Online privacy.mp4 33.6 MB 98.8 MB
15. Online privacy.vtt 6.01 kB 132 MB
16. Analyzing sniffing software.mp4 20.4 MB 132 MB
16. Analyzing sniffing software.vtt 3.37 kB 153 MB
17. Cyber War.mp4 47.6 MB 153 MB
17. Cyber War.vtt 7.93 kB 201 MB
18. Changing IT Security Trends - notes for the examination.pdf 2.14 MB 201 MB
19. Objective #1 - Data security - Introduction.mp4 40.7 MB 203 MB
19. Objective #1 - Data security - Introduction.vtt 6.58 kB 243 MB
2. IT Prehistory.mp4 27.1 MB 243 MB
2. IT Prehistory.vtt 5.12 kB 270 MB
20. Confidentiality of data.mp4 33.2 MB 270 MB
20. Confidentiality of data.vtt 5.01 kB 304 MB
21. EXERCISE Finding confidential data with search engines.mp4 24.6 MB 304 MB
21. EXERCISE Finding confidential data with search engines.vtt 5.36 kB 328 MB
22. Integrity of data.mp4 33.7 MB 328 MB
22. Integrity of data.vtt 6.34 kB 362 MB
23. Data security - notes for the examination.pdf 2.08 MB 362 MB
3. Let’s look a few years back.mp4 24.8 MB 364 MB
3. Let’s look a few years back.vtt 5.43 kB 389 MB
4. Cyber crimes - an evolution not revolution.mp4 22.3 MB 389 MB
4. Cyber crimes - an evolution not revolution.vtt 5.21 kB 411 MB
5. Current Cyber Threats - notes for the examination.pdf 1.54 MB 411 MB
6. Popular myths about IT security - origins.mp4 29.3 MB 413 MB
6. Popular myths about IT security - origins.vtt 5.78 kB 442 MB
7. Myths #1 - you’ll never be hacked.mp4 30.6 MB 442 MB
7. Myths #1 - you’ll never be hacked.vtt 6.18 kB 473 MB
8. Myths #2 - you don’t need any protection software or hardware.mp4 27 MB 473 MB
8. Myths #2 - you don’t need any protection software or hardware.vtt 5.66 kB 500 MB
9. Myths #3 - IT security is always a priority.mp4 6.29 MB 500 MB
9. Myths #3 - IT security is always a priority.vtt 1.15 kB 506 MB
1. Introduction to Risk Management.mp4 4.06 MB 506 MB
1. Introduction to Risk Management.vtt 1.48 kB 510 MB
10. DREAD Exploitability.mp4 14.6 MB 510 MB
10. DREAD Exploitability.vtt 5.37 kB 525 MB
11. EXERCISE Risk Assessment.mp4 19 MB 525 MB
11. EXERCISE Risk Assessment.vtt 7.33 kB 544 MB
12. Risk Assessment - notes for the examination.html 10 B 544 MB
12.1 03-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf 1.89 MB 544 MB
13. Introduction to Social Engineering and rogue software.mp4 12 MB 545 MB
13. Introduction to Social Engineering and rogue software.vtt 4.25 kB 557 MB
14. Manipulation tactics.mp4 23.2 MB 557 MB
14. Manipulation tactics.vtt 9.39 kB 581 MB
15. EXERCISE Social Engineering attacks.mp4 19.9 MB 581 MB
15. EXERCISE Social Engineering attacks.vtt 6.16 kB 601 MB
16. SE with KALI BackTrack.mp4 16.9 MB 601 MB
16. SE with KALI BackTrack.vtt 6.56 kB 618 MB
17. Rogue Software.mp4 7.72 MB 618 MB
17. Rogue Software.vtt 2.43 kB 625 MB
18. Fraud tools #1.mp4 21 MB 625 MB
18. Fraud tools #1.vtt 6.54 kB 646 MB
19. Fraud tools #2.mp4 18.6 MB 646 MB
19. Fraud tools #2.vtt 6.47 kB 665 MB
2. Attack methods.mp4 18.1 MB 665 MB
2. Attack methods.vtt 6.8 kB 683 MB
20. Social Engineering and Rogue Software - notes for the examination.html 10 B 683 MB
20.1 03-3-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf 3.04 MB 683 MB
3. Local attacks.mp4 8.27 MB 686 MB
3. Local attacks.vtt 3.01 kB 694 MB
4. Target scanning and enumeration techniques #1.mp4 16.6 MB 694 MB
4. Target scanning and enumeration techniques #1.vtt 5.66 kB 711 MB
5. Target scanning and enumeration techniques #2.mp4 8.81 MB 711 MB
5. Target scanning and enumeration techniques #2.vtt 3.35 kB 720 MB
6. Passive scanning.mp4 7.48 MB 720 MB
6. Passive scanning.vtt 1.89 kB 727 MB
7. Attack Methodologies - notes for the examination.html 10 B 727 MB
7.1 03-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf 1.68 MB 727 MB
8. Introduction to risk assessment.mp4 19 MB 729 MB
8. Introduction to risk assessment.vtt 6.42 kB 748 MB
9. DREAD Risk assessment model.mp4 13.3 MB 748 MB
9. DREAD Risk assessment model.vtt 4.68 kB 761 MB
1. Introduction to Defence in Depth.mp4 4.76 MB 761 MB
1. Introduction to Defence in Depth.vtt 1.51 kB 766 MB
10. Law #2.mp4 7.95 MB 766 MB
10. Law #2.vtt 2.88 kB 774 MB
11. Law #3.mp4 6.14 MB 774 MB
11. Law #3.vtt 2.23 kB 780 MB
12. Law #4.mp4 6.25 MB 780 MB
12. Law #4.vtt 1.82 kB 786 MB
13. Law #5.mp4 9.23 MB 786 MB
13. Law #5.vtt 3.19 kB 796 MB
14. Law #6.mp4 6.11 MB 796 MB
14. Law #6.vtt 2.16 kB 802 MB
15. Law #7.mp4 3.05 MB 802 MB
15. Law #7.vtt 1.23 kB 805 MB
16. Law #8.mp4 4.82 MB 805 MB
16. Law #8.vtt 1.55 kB 810 MB
17. Law #9.mp4 9.68 MB 810 MB
17. Law #9.vtt 4.15 kB 819 MB
18. Law #10.mp4 2.06 MB 819 MB
18. Law #10.vtt 716 B 821 MB
19. Laws for administrators.mp4 14.5 MB 821 MB
19. Laws for administrators.vtt 6.05 kB 836 MB
2. How to use Defence in Depth model.mp4 15.4 MB 836 MB
2. How to use Defence in Depth model.vtt 5.53 kB 851 MB
20. Immutable Laws of Security - notes for the examination.html 10 B 851 MB
20.1 04-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf 1.7 MB 851 MB
3. DiD OS and LAN Layers.mp4 16.9 MB 853 MB
3. DiD OS and LAN Layers.vtt 6.41 kB 870 MB
4. DiD Perimeter and Physical Access Layers.mp4 13.5 MB 870 MB
4. DiD Perimeter and Physical Access Layers.vtt 5.54 kB 883 MB
5. DiD Demonstration.mp4 7.32 MB 883 MB
5. DiD Demonstration.vtt 2.55 kB 891 MB
6. Automated attack targeting a service.mp4 15.9 MB 891 MB
6. Automated attack targeting a service.vtt 4.75 kB 907 MB
7. Automated user-targeting attack.mp4 14.1 MB 907 MB
7. Automated user-targeting attack.vtt 4.51 kB 921 MB
8. The Defence in Depth Model - notes for the examination.html 10 B 921 MB
8.1 04-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf 1.72 MB 921 MB
9. Introduction to Immutable laws of security - Law #1.mp4 14.7 MB 922 MB
9. Introduction to Immutable laws of security - Law #1.vtt 4.65 kB 937 MB
1. Introduction to Disaster Recovery.mp4 4.57 MB 937 MB
1. Introduction to Disaster Recovery.vtt 1.51 kB 942 MB
10. CONFICKER CASE STUDY.mp4 21 MB 942 MB
10. CONFICKER CASE STUDY.vtt 7.04 kB 963 MB
11. How to reduce losses - notes for the examination.html 10 B 963 MB
11.1 05-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf 2.56 MB 963 MB
2. How to reduce losses.mp4 15.6 MB 965 MB
2. How to reduce losses.vtt 5.38 kB 981 MB
3. Ensuring continous availability.mp4 11.3 MB 981 MB
3. Ensuring continous availability.vtt 3.95 kB 992 MB
4. Threat discovery #1.mp4 12.9 MB 992 MB
4. Threat discovery #1.vtt 4.11 kB 1 GB
5. Threat discovery #2.mp4 9.27 MB 1 GB
5. Threat discovery #2.vtt 3.55 kB 1.01 GB
6. Audit users and keep control accounts.mp4 13.9 MB 1.01 GB
6. Audit users and keep control accounts.vtt 4.63 kB 1.03 GB
7. High risk users.mp4 8.31 MB 1.03 GB
7. High risk users.vtt 3.28 kB 1.04 GB
8. Collecting and analysing evidence.mp4 19.2 MB 1.04 GB
8. Collecting and analysing evidence.vtt 6.25 kB 1.06 GB
9. Forensics example.mp4 11.1 MB 1.06 GB
9. Forensics example.vtt 3.67 kB 1.07 GB
1. Introduction to Application Security.mp4 22.3 MB 1.07 GB
1. Introduction to Application Security.vtt 8.17 kB 1.09 GB
10. Unsafe applications.mp4 26.2 MB 1.09 GB
10. Unsafe applications.vtt 10.4 kB 1.12 GB
11. Program Security Assessment - notes for the examination.html 10 B 1.12 GB
11.1 13-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf 1.11 MB 1.12 GB
12. Check your knowledge and get ready for the exam.html 153 B 1.12 GB
2. Attacks on applications.mp4 26.7 MB 1.12 GB
2. Attacks on applications.vtt 10.6 kB 1.14 GB
3. SQL Injection.mp4 18.8 MB 1.14 GB
3. SQL Injection.vtt 8.29 kB 1.16 GB
4. EXERCISE Analyze the application.mp4 30.1 MB 1.16 GB
4. EXERCISE Analyze the application.vtt 14 kB 1.19 GB
5. Blind SQL Injection.mp4 23.6 MB 1.19 GB
5. Blind SQL Injection.vtt 9.94 kB 1.22 GB
6. Automated SQL Injection.mp4 30.9 MB 1.22 GB
6. Automated SQL Injection.vtt 12.2 kB 1.25 GB
7. Cross-site scripting - XSS.mp4 30.5 MB 1.25 GB
7. Cross-site scripting - XSS.vtt 10 kB 1.28 GB
8. Application Attacks - notes for the examination.html 10 B 1.28 GB
8.1 13-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf 1.73 MB 1.28 GB
9. Program security assessment.mp4 12.7 MB 1.28 GB
9. Program security assessment.vtt 5.54 kB 1.29 GB
1. Here’s what you’ll learn in this module.mp4 3.25 MB 1.29 GB
1. Here’s what you’ll learn in this module.vtt 1.06 kB 1.29 GB
10. How to protect users without interrupting their work - notes for the examination.html 10 B 1.29 GB
10.1 14-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf 1.69 MB 1.29 GB
2. Managing applications.mp4 18 MB 1.3 GB
2. Managing applications.vtt 9.22 kB 1.31 GB
3. Software updates.mp4 6.52 MB 1.31 GB
3. Software updates.vtt 2.86 kB 1.32 GB
4. MS Update.mp4 17 MB 1.32 GB
4. MS Update.vtt 6.84 kB 1.34 GB
5. System Center Configuration Manager.mp4 6.57 MB 1.34 GB
5. System Center Configuration Manager.vtt 2.87 kB 1.34 GB
6. Blocking applications.mp4 18.9 MB 1.34 GB
6. Blocking applications.vtt 7.88 kB 1.36 GB
7. Software restrictions policies.mp4 15.2 MB 1.36 GB
7. Software restrictions policies.vtt 6.1 kB 1.38 GB
8. EXERCISE Application control rules.mp4 28.5 MB 1.38 GB
8. EXERCISE Application control rules.vtt 12 kB 1.41 GB
9. Isolating applications.mp4 17.7 MB 1.41 GB
9. Isolating applications.vtt 6.45 kB 1.43 GB
1. Introduction to cryptography.mp4 24.7 MB 1.43 GB
1. Introduction to cryptography.vtt 10.2 kB 1.45 GB
10. Stream Ciphers - RC4.mp4 9 MB 1.45 GB
10. Stream Ciphers - RC4.vtt 3.5 kB 1.46 GB
11. Asymmetric-key algorithms.mp4 20 MB 1.46 GB
11. Asymmetric-key algorithms.vtt 7.71 kB 1.48 GB
12. RSA.mp4 13.5 MB 1.48 GB
12. RSA.vtt 5.08 kB 1.49 GB
13. ELGAMAL.mp4 5.14 MB 1.49 GB
13. ELGAMAL.vtt 1.93 kB 1.5 GB
14. HASH functions.mp4 15.1 MB 1.5 GB
14. HASH functions.vtt 5.41 kB 1.51 GB
15. Digital signature.mp4 16.2 MB 1.51 GB
15. Digital signature.vtt 5.96 kB 1.53 GB
16. Hybrid Schemes.mp4 16.8 MB 1.53 GB
16. Hybrid Schemes.vtt 6.32 kB 1.55 GB
17. Symmetric and Asymmetric Ciphers - notes for the examination.html 10 B 1.55 GB
17.1 15-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf 2.63 MB 1.55 GB
2. History of ciphers.mp4 26.7 MB 1.55 GB
2. History of ciphers.vtt 11 kB 1.57 GB
3. Symmetric and asymmetric ciphers.mp4 15.8 MB 1.58 GB
3. Symmetric and asymmetric ciphers.vtt 6.07 kB 1.59 GB
4. Symmetric-key algorithms.mp4 14.2 MB 1.59 GB
4. Symmetric-key algorithms.vtt 5.48 kB 1.6 GB
5. Block ciphers.mp4 16.1 MB 1.6 GB
5. Block ciphers.vtt 5.83 kB 1.62 GB
6. Data encryption standard.mp4 17.3 MB 1.62 GB
6. Data encryption standard.vtt 6.47 kB 1.64 GB
7. DES-X.mp4 19.1 MB 1.64 GB
7. DES-X.vtt 6.85 kB 1.66 GB
8. Advanced encryption standards.mp4 13.5 MB 1.66 GB
8. Advanced encryption standards.vtt 4.92 kB 1.67 GB
9. Block cipher modes.mp4 18.3 MB 1.67 GB
9. Block cipher modes.vtt 6.92 kB 1.69 GB
1. Introduction to cryptology.mp4 6.27 MB 1.69 GB
1. Introduction to cryptology.vtt 2.42 kB 1.7 GB
10. Public Key Infrastructure - Trust but verify - notes for the examination.html 10 B 1.7 GB
10.1 16-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf 2.28 MB 1.7 GB
2. Public key infrastructure.mp4 15.5 MB 1.7 GB
2. Public key infrastructure.vtt 6.54 kB 1.71 GB
3. Implementing public key infrastructure.mp4 13.4 MB 1.71 GB
3. Implementing public key infrastructure.vtt 5.86 kB 1.73 GB
4. What will PKI allow you.mp4 15.2 MB 1.73 GB
4. What will PKI allow you.vtt 6.79 kB 1.74 GB
5. EXERCISE Certificates.mp4 21.6 MB 1.74 GB
5. EXERCISE Certificates.vtt 9.13 kB 1.76 GB
6. Planning the PKI.mp4 23.6 MB 1.76 GB
6. Planning the PKI.vtt 9.24 kB 1.79 GB
7. Certificate life cycle.mp4 17 MB 1.79 GB
7. Certificate life cycle.vtt 6.5 kB 1.8 GB
8. PKI Administration.mp4 20.6 MB 1.8 GB
8. PKI Administration.vtt 7.67 kB 1.82 GB
9. Threat Modelling and Classification - notes for the examination.html 10 B 1.82 GB
9.1 02-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf 1.49 MB 1.82 GB
1. Answer sample questions which you can find during the examination.html 152 B 1.83 GB
1. The Certificate - see how it looks like.pdf 494 kB 1.83 GB
1. BONUS Examination - your voucher.pdf 95.6 kB 1.83 GB
2. BONUS LECTURE Learn more and get to know our other courses.html 6 kB 1.83 GB
3. Thank you for joining this training.html 374 B 1.83 GB
1. Network security - introduction.mp4 23.1 MB 1.83 GB
1. Network security - introduction.vtt 5.72 kB 1.85 GB
10. OSI MODEL #4 - Transport Layer.mp4 30 MB 1.85 GB
10. OSI MODEL #4 - Transport Layer.vtt 5.74 kB 1.88 GB
11. Threats Enumerating Remote Computers.mp4 17.6 MB 1.88 GB
11. Threats Enumerating Remote Computers.vtt 3.67 kB 1.9 GB
12. EXERCISE Transport Layer Attack using METASPLOIT part 1.mp4 13.5 MB 1.9 GB
12. EXERCISE Transport Layer Attack using METASPLOIT part 1.vtt 5.29 kB 1.91 GB
13. EXERCISE Transport Layer Attack using METASPLOIT part 2.mp4 27.4 MB 1.91 GB
13. EXERCISE Transport Layer Attack using METASPLOIT part 2.vtt 5.15 kB 1.94 GB
14. OSI MODEL #5 - Session Layer.mp4 17.2 MB 1.94 GB
14. OSI MODEL #5 - Session Layer.vtt 3.69 kB 1.96 GB
15. Transport Protocols - notes for the examination.pdf 1.15 MB 1.96 GB
16. OSI MODEL #6 - Presentation Layer.mp4 39.2 MB 1.96 GB
16. OSI MODEL #6 - Presentation Layer.vtt 6.14 kB 2 GB
17. OSI MODEL #7 - Application Layer.mp4 17.7 MB 2 GB
17. OSI MODEL #7 - Application Layer.vtt 3.75 kB 2.01 GB
18. EXERCISE Application Layer Attacks.mp4 19.9 MB 2.01 GB
18. EXERCISE Application Layer Attacks.vtt 5.25 kB 2.03 GB
19. Backtrack Attack Demonstration.mp4 16.3 MB 2.03 GB
19. Backtrack Attack Demonstration.vtt 3.39 kB 2.05 GB
2. OSI MODEL #1 - Physical layer.mp4 30.4 MB 2.05 GB
2. OSI MODEL #1 - Physical layer.vtt 5.83 kB 2.08 GB
20. Man-in-the-Middle and Denial of Service Attacks.mp4 14.9 MB 2.08 GB
20. Man-in-the-Middle and Denial of Service Attacks.vtt 2.67 kB 2.1 GB
21. Modifying Transmitted Packets.mp4 28.1 MB 2.1 GB
21. Modifying Transmitted Packets.vtt 4.58 kB 2.12 GB
22. Unencrypted protocols.mp4 14.3 MB 2.12 GB
22. Unencrypted protocols.vtt 2.93 kB 2.14 GB
23. Application Protocols - notes for the examination.pdf 2.27 MB 2.14 GB
3. OSI MODEL #2 - Data link layer.mp4 23.9 MB 2.14 GB
3. OSI MODEL #2 - Data link layer.vtt 4.76 kB 2.16 GB
4. Threats MAC spoofing.mp4 28.8 MB 2.16 GB
4. Threats MAC spoofing.vtt 5.96 kB 2.19 GB
5. Threats ARP Poisoning.mp4 32.8 MB 2.19 GB
5. Threats ARP Poisoning.vtt 6.85 kB 2.23 GB
6. EXERCISE Data Link Layer Attack.mp4 37 MB 2.23 GB
6. EXERCISE Data Link Layer Attack.vtt 7.21 kB 2.26 GB
7. OSI MODEL #3 - Network layer.mp4 33.2 MB 2.26 GB
7. OSI MODEL #3 - Network layer.vtt 6.5 kB 2.3 GB
8. TCP Tunnelling over ICMP.mp4 36.7 MB 2.3 GB
8. TCP Tunnelling over ICMP.vtt 6.96 kB 2.33 GB
9. Network Protocols - notes for the examination.pdf 2.33 MB 2.33 GB
1. Designing Computer Networks - introduction.mp4 11.5 MB 2.33 GB
1. Designing Computer Networks - introduction.vtt 2.25 kB 2.35 GB
10. Network access control RADIUS.mp4 50.8 MB 2.35 GB
10. Network access control RADIUS.vtt 10.8 kB 2.4 GB
11. Protocols and Services - notes for the examination.pdf 1.25 MB 2.4 GB
2. Subnetting IPv4.mp4 30.5 MB 2.4 GB
2. Subnetting IPv4.vtt 7.13 kB 2.43 GB
3. Subnetting IPv6.mp4 18.3 MB 2.43 GB
3. Subnetting IPv6.vtt 3.17 kB 2.45 GB
4. Subnetting - notes for the examination.pdf 1.48 MB 2.45 GB
5. IPv6 address notation.mp4 28.6 MB 2.45 GB
5. IPv6 address notation.vtt 6.23 kB 2.48 GB
6. DMZ demilitarized Zone.mp4 31.7 MB 2.48 GB
6. DMZ demilitarized Zone.vtt 6.21 kB 2.51 GB
7. Protocols and services IP SEC.mp4 45.9 MB 2.51 GB
7. Protocols and services IP SEC.vtt 9.6 kB 2.55 GB
8. IP SEC Phase 1.mp4 22.8 MB 2.55 GB
8. IP SEC Phase 1.vtt 7.45 kB 2.58 GB
9. Network Address translation.mp4 55.2 MB 2.58 GB
9. Network Address translation.vtt 12.2 kB 2.63 GB
1. Introduction to Monitoring Transmitted Data.mp4 6.48 MB 2.63 GB
1. Introduction to Monitoring Transmitted Data.vtt 1.21 kB 2.64 GB
10. Scanning computers.mp4 37 MB 2.64 GB
10. Scanning computers.vtt 7.42 kB 2.68 GB
11. Monitoring transmitted data - notes for the examination.pdf 1.86 MB 2.68 GB
2. Monitoring Transmitted Data - Basic informations.mp4 43.1 MB 2.68 GB
2. Monitoring Transmitted Data - Basic informations.vtt 8.84 kB 2.72 GB
3. Intrusion detection systems.mp4 40.1 MB 2.72 GB
3. Intrusion detection systems.vtt 8.12 kB 2.76 GB
4. Why are firewalls and NDIS not enough.mp4 29.6 MB 2.76 GB
4. Why are firewalls and NDIS not enough.vtt 5.81 kB 2.79 GB
5. Wireshark - Introduction to network analysis.mp4 32.1 MB 2.79 GB
5. Wireshark - Introduction to network analysis.vtt 7.02 kB 2.82 GB
6. How to use Wireshark.mp4 45.7 MB 2.82 GB
6. How to use Wireshark.vtt 9.21 kB 2.87 GB
7. Analyzing Captured data.mp4 32.5 MB 2.87 GB
7. Analyzing Captured data.vtt 5.87 kB 2.9 GB
8. How to analyze telnet protocol.mp4 39.8 MB 2.9 GB
8. How to analyze telnet protocol.vtt 7.94 kB 2.94 GB
9. Intrusion detection.mp4 48.6 MB 2.94 GB
9. Intrusion detection.vtt 7.72 kB 2.99 GB
1. Wireless Networks.mp4 7.3 MB 2.99 GB
1. Wireless Networks.vtt 1.28 kB 3 GB
10. Standards and Security Solutions - notes for the examination.pdf 1.53 MB 3 GB
11. Threats of WIFI networks.mp4 32 MB 3 GB
11. Threats of WIFI networks.vtt 6.03 kB 3.03 GB
12. Client Attacks Launching a rogue access point.mp4 35.2 MB 3.03 GB
12. Client Attacks Launching a rogue access point.vtt 6.86 kB 3.07 GB
13. Client Attacks Evil twin.mp4 23.9 MB 3.07 GB
13. Client Attacks Evil twin.vtt 4.75 kB 3.09 GB
14. Client Attacks Denial of service.mp4 38.3 MB 3.09 GB
14. Client Attacks Denial of service.vtt 9.23 kB 3.13 GB
15. EXERCISE WPA attack.mp4 9.29 MB 3.13 GB
15. EXERCISE WPA attack.vtt 3.46 kB 3.14 GB
16. Wi-Fi Security Threats - notes for the examination.pdf 1.78 MB 3.14 GB
2. WIFI security solutions - introduction.mp4 30.6 MB 3.14 GB
2. WIFI security solutions - introduction.vtt 5.78 kB 3.17 GB
3. WIFI - working principles.mp4 30.8 MB 3.17 GB
3. WIFI - working principles.vtt 6 kB 3.2 GB
4. Other wireless technologies.mp4 13.8 MB 3.2 GB
4. Other wireless technologies.vtt 3.02 kB 3.21 GB
5. Threats and risks.mp4 19.4 MB 3.21 GB
5. Threats and risks.vtt 4.64 kB 3.23 GB
6. Ineffective solutions.mp4 19.9 MB 3.23 GB
6. Ineffective solutions.vtt 4.25 kB 3.25 GB
7. Authentication methods.mp4 38.9 MB 3.25 GB
7. Authentication methods.vtt 8.8 kB 3.29 GB
8. 802.11 WEP.mp4 32.9 MB 3.29 GB
8. 802.11 WEP.vtt 6.93 kB 3.33 GB
9. 802.11I WPA.mp4 33.1 MB 3.33 GB
9. 802.11I WPA.vtt 5.89 kB 3.36 GB
1. Operating systems security - introduction.mp4 50.4 MB 3.36 GB
1. Operating systems security - introduction.vtt 9.35 kB 3.41 GB
10. EXERCISE Vulnerability attacks.mp4 49.9 MB 3.41 GB
10. EXERCISE Vulnerability attacks.vtt 9.42 kB 3.46 GB
11. EXERCISE Identifying suspicious processes.mp4 31.4 MB 3.46 GB
11. EXERCISE Identifying suspicious processes.vtt 6.97 kB 3.49 GB
12. Demonstration Process Explorer.mp4 40 MB 3.49 GB
12. Demonstration Process Explorer.vtt 8.98 kB 3.53 GB
13. EXERCISE Removing malware.mp4 48.1 MB 3.53 GB
13. EXERCISE Removing malware.vtt 8.54 kB 3.58 GB
14. Rootkits.mp4 30.3 MB 3.58 GB
14. Rootkits.vtt 6.05 kB 3.61 GB
15. EXERCISE Detecting rootkits.mp4 61.1 MB 3.61 GB
15. EXERCISE Detecting rootkits.vtt 10.9 kB 3.67 GB
16. EXERCISE Security evaluation.mp4 18.7 MB 3.67 GB
16. EXERCISE Security evaluation.vtt 5.93 kB 3.69 GB
17. Malware - notes for the examination.pdf 2.61 MB 3.69 GB
2. Security boundaries.mp4 22.2 MB 3.69 GB
2. Security boundaries.vtt 4.86 kB 3.71 GB
3. Three core.mp4 31.2 MB 3.71 GB
3. Three core.vtt 7.46 kB 3.74 GB
4. EXERCISE OS boundaries.mp4 41 MB 3.74 GB
4. EXERCISE OS boundaries.vtt 6.96 kB 3.79 GB
5. Process isolation.mp4 28.2 MB 3.79 GB
5. Process isolation.vtt 6.52 kB 3.81 GB
6. Kernel Mode Code Signing.mp4 26.9 MB 3.81 GB
6. Kernel Mode Code Signing.vtt 6.28 kB 3.84 GB
7. Java Virtual Machine and code access security.mp4 19.5 MB 3.84 GB
7. Java Virtual Machine and code access security.vtt 4.38 kB 3.86 GB
8. OS Security Boundaries - notes for the examination.pdf 4.46 MB 3.86 GB
9. Malware.mp4 47 MB 3.86 GB
9. Malware.vtt 12.6 kB 3.91 GB
1. Authentication and authorisation - Introduction.mp4 10.1 MB 3.91 GB
1. Authentication and authorisation - Introduction.vtt 1.83 kB 3.92 GB
10. EXERCISE Offline attacks.mp4 47.9 MB 3.92 GB
10. EXERCISE Offline attacks.vtt 11.6 kB 3.97 GB
11. Using online cracking services.mp4 39.5 MB 3.97 GB
11. Using online cracking services.vtt 8.57 kB 4.01 GB
12. Identity Theft - notes for the examination.pdf 2.22 MB 4.01 GB
2. Authentication users.mp4 32.9 MB 4.01 GB
2. Authentication users.vtt 7.08 kB 4.04 GB
3. How secure is your password.mp4 16.7 MB 4.04 GB
3. How secure is your password.vtt 5.13 kB 4.06 GB
4. Authentication protocols and services.mp4 33.4 MB 4.06 GB
4. Authentication protocols and services.vtt 7.89 kB 4.09 GB
5. Authentication - notes for the examination.pdf 3 MB 4.09 GB
6. LM Hash.mp4 32.2 MB 4.1 GB
6. LM Hash.vtt 6.74 kB 4.13 GB
7. Cached Credentials.mp4 19 MB 4.13 GB
7. Cached Credentials.vtt 4.56 kB 4.15 GB
8. KERBEROS.mp4 55.1 MB 4.15 GB
8. KERBEROS.vtt 11 kB 4.2 GB
9. Identity Theft.mp4 45 MB 4.2 GB
9. Identity Theft.vtt 9.44 kB 4.25 GB
1. Windows Security - what you’ll learn.mp4 7.96 MB 4.25 GB
1. Windows Security - what you’ll learn.vtt 1.25 kB 4.26 GB
10. BitLocker To Go Reader.mp4 19.3 MB 4.26 GB
10. BitLocker To Go Reader.vtt 4.56 kB 4.28 GB
11. File and folder encryption - EFS.mp4 36.2 MB 4.28 GB
11. File and folder encryption - EFS.vtt 7.32 kB 4.31 GB
12. EXERCISE EFS.mp4 16.1 MB 4.31 GB
12. EXERCISE EFS.vtt 5.47 kB 4.33 GB
13. Encryption - notes for the examination.pdf 1.68 MB 4.33 GB
2. User Account Control.mp4 33.6 MB 4.33 GB
2. User Account Control.vtt 6.11 kB 4.36 GB
3. UAC configuration.mp4 36.8 MB 4.36 GB
3. UAC configuration.vtt 8.04 kB 4.4 GB
4. Additional Security Features - ASLR and DEP.mp4 42.9 MB 4.4 GB
4. Additional Security Features - ASLR and DEP.vtt 11.6 kB 4.44 GB
5. PatchGuard.mp4 8.24 MB 4.44 GB
5. PatchGuard.vtt 1.43 kB 4.45 GB
6. Techniques and Methods - notes for the examination.pdf 1.51 MB 4.45 GB
7. Encryption - key protection.mp4 48.6 MB 4.45 GB
7. Encryption - key protection.vtt 14.4 kB 4.5 GB
8. Drive encryption.mp4 39.2 MB 4.5 GB
8. Drive encryption.vtt 8.39 kB 4.54 GB
9. BitLocker.mp4 38.2 MB 4.54 GB
9. BitLocker.vtt 8.04 kB 4.58 GB
1. Security policies – introduction.mp4 6.15 MB 4.58 GB
1. Security policies – introduction.vtt 1.94 kB 4.59 GB
10. STRIDE Spoofing identity.mp4 14.5 MB 4.59 GB
10. STRIDE Spoofing identity.vtt 4.95 kB 4.6 GB
11. STRIDE Tampering with Data.mp4 13.5 MB 4.6 GB
11. STRIDE Tampering with Data.vtt 4.48 kB 4.61 GB
12. STRIDE Denial of Service.mp4 10.9 MB 4.61 GB
12. STRIDE Denial of Service.vtt 3.85 kB 4.62 GB
2. What is security.mp4 11.4 MB 4.62 GB
2. What is security.vtt 3.51 kB 4.64 GB
3. Information security.mp4 10.8 MB 4.64 GB
3. Information security.vtt 3.75 kB 4.65 GB
4. Information security - level up.mp4 10.3 MB 4.65 GB
4. Information security - level up.vtt 3.82 kB 4.66 GB
5. Security issues.mp4 13.5 MB 4.66 GB
5. Security issues.vtt 4.52 kB 4.67 GB
6. Why are security solutions fallible.mp4 16.2 MB 4.67 GB
6. Why are security solutions fallible.vtt 5.36 kB 4.69 GB
7. Security policy issues.mp4 13.2 MB 4.69 GB
7. Security policy issues.vtt 4.57 kB 4.7 GB
8. Introduction to threat modelling and classification.mp4 13.9 MB 4.7 GB
8. Introduction to threat modelling and classification.vtt 5.13 kB 4.71 GB
9. Threat modelling - STRIDE.mp4 11.1 MB 4.71 GB
9. Threat modelling - STRIDE.vtt 3.75 kB 4.72 GB
[DesireCourse.Com].txt 754 B 4.72 GB
[DesireCourse.Com].url 51 B 4.72 GB
[DesireCourse.Com] Udemy - Hacking in Practice Certified Ethical Hacking MEGA Course
Baixar/Download/Descargar torrent

Precisa de legendas? Need subtitles? ¿Necesita de subtitulos?
PT & PT-BR
Pesquisar
EN-US, EN-UK
Pesquisar
Español
Pesquisar
PT & PT-BR
Pesquisar InSubs
Help us Colabora