Details for:

Type:
Files:
Size:

Uploaded On:
Added By:
Trusted

Seeders:
Leechers:
Info Hash:
2482412513166861ABB3DB1C378D5ACBE6E36918
  1. $10 ChatGPT for 1 Year & More.txt 209 bytes
  2. Module 1/2. Introduction/subtitle.txt 694 bytes
  3. Module 1/2. Introduction/subtitles-en.vtt 1.2 KB
  4. Module 1/5. Understanding Motives, Goals, and Objectives of Information Security Attacks/subtitle.txt 1.9 KB
  5. Module 1/3. Understanding the Need for Security/subtitle.txt 2.0 KB
  6. Module 1/4. Understanding the Security, Functionality, and Usability Triangle/subtitle.txt 3.1 KB
  7. Module 1/5. Understanding Motives, Goals, and Objectives of Information Security Attacks/subtitles-en.vtt 3.2 KB
  8. Module 1/3. Understanding the Need for Security/subtitles-en.vtt 3.7 KB
  9. Module 1/6. Overview of Classification of Attacks/subtitle.txt 4.4 KB
  10. Module 1/1. Index/subtitle.txt 5.0 KB
  11. Module 1/4. Understanding the Security, Functionality, and Usability Triangle/subtitles-en.vtt 5.9 KB
  12. Module 1/7. Overview of Information Security Attack Vectors/subtitle.txt 6.1 KB
  13. Module 1/1. Index/subtitles-en.vtt 8.1 KB
  14. Module 1/6. Overview of Classification of Attacks/subtitles-en.vtt 8.6 KB
  15. Module 1/7. Overview of Information Security Attack Vectors/subtitles-en(1).vtt 12.0 KB
  16. Module 1/8. Overview of Various Information Security Laws and Regulations/subtitle.txt 15.2 KB
  17. Module 1/8. Overview of Various Information Security Laws and Regulations/subtitles-en(1).vtt 25.3 KB
  18. Module 11/2024-07-02_04-23-15_Video 11.7 Overview of Various Cloud Computing Security Tools - Coursera.mp4 4.0 MB
  19. Module 4/2024-07-02_04-13-04_Video 4.5 Overview of Password Cracking Tools - Coursera - OneHack.us.mp4 4.3 MB
  20. Module 11/2024-07-02_04-22-24_Video 11.1 Introduction - Coursera.mp4 4.4 MB
  21. Module 12/2024-07-02_04-24-00_Video 12.5 Overview of Penetration Testing Methodologies - Coursera.mp4 4.5 MB
  22. Module 5/2024-07-02_04-13-59_Video 5.1 Introduction - Coursera.mp4 5.0 MB
  23. Module 8/2024-07-02_04-18-26_Video 8.1 Introduction - Coursera.mp4 5.0 MB
  24. Module 1/2. Introduction/2. Introduction.mp4 5.2 MB
  25. Module 4/2024-07-02_04-12-35_Introduction - Coursera.mp4 5.2 MB
  26. Module 2/1. Introduction - Coursera^.mp4 5.4 MB
  27. Module 12/2024-07-02_04-23-36_Video 12.1 Introduction - Coursera.mp4 5.4 MB
  28. Module 6/2024-07-02_04-15-34_Video 6.1 Introduction - Coursera.mp4 5.6 MB
  29. Module 3/2024-07-02_04-10-11_Introduction - Coursera.mp4 5.8 MB
  30. Module 6/2024-07-02_04-16-17_Video 6.7 Understanding Different DoS-DDoS Attack Countermeasures and Protection Tools - Coursera.mp4 6.0 MB
  31. Module 7/2024-07-02_04-17-51_Video 7.8 Understanding Different SQL Injection Tools - Coursera.mp4 6.0 MB
  32. Module 8/2024-07-02_04-19-20_Video 8.8 Overview of Different Wireless Security Tools - Coursera.mp4 6.0 MB
  33. Module 1/5. Understanding Motives, Goals, and Objectives of Information Security Attacks/5. Understanding Motives, Goals, and Objectives of Information Security Attacks.mp4 6.1 MB
  34. Module 9/2024-07-02_04-19-54_Video 9.1 Introduction - Coursera.mp4 6.2 MB
  35. Module 7/2024-07-02_04-16-57_Video 7.1 Introduction - Coursera.mp4 6.4 MB
  36. Module 10/2024-07-02_04-20-47_Video 10.1 Introduction - Coursera.mp4 6.5 MB
  37. Module 4/2024-07-02_04-12-50_Understanding Microsoft Authentication - Coursera.mp4 6.6 MB
  38. Module 1/3. Understanding the Need for Security/3. Understanding the Need for Security.mp4 6.6 MB
  39. Module 6/2024-07-02_04-16-10_Video 6.6 Understanding Different DoS-DDoS Attack Tools - Coursera.mp4 7.5 MB
  40. Module 4/2024-07-02_04-12-44_Understanding the Password Cracking and Password Complexity - Coursera.mp4 7.9 MB
  41. Module 1/4. Understanding the Security, Functionality, and Usability Triangle/4. Understanding the Security, Functionality, and Usability Triangle.mp4 9.1 MB
  42. Module 9/2024-07-02_04-20-13_Video 9.3 Understanding Mobile Platform Attack Vectors - Coursera.mp4 9.1 MB
  43. Module 2/4. Overview of Indicators of Compromise (IoCs) - Coursera.mp4 9.4 MB
  44. Module 2/2. Understanding the Cyber Kill Chain Methodology - Coursera.mp4 9.5 MB
  45. Module 7/2024-07-02_04-17-14_Video 7.3 Understanding Different Web Server Attack Tools and Countermeasures - Coursera.mp4 10.1 MB
  46. Module 10/2024-07-02_04-21-28_Video 10.4 Overview of IoT Attack Countermeasures and Security Tools - Coursera.mp4 10.2 MB
  47. Module 7/2024-07-02_04-17-59_Video 7.9 Understanding Different SQL Injection Attack Countermeasures - Coursera.mp4 10.5 MB
  48. Module 8/2024-07-02_04-19-13_Video 8.7 Overview of Various Wireless Attack Countermeasures - Coursera.mp4 10.6 MB
  49. Module 10/2024-07-02_04-21-46_Video 10.7 Overview of OT Attack Countermeasures and Security Tools - Coursera.mp4 10.9 MB
  50. Module 5/2024-07-02_04-14-34_Video 5.5 Understanding Identity Theft - Coursera.mp4 11.2 MB
  51. Module 2/3. Understanding Tactics, Techniques, and Procedures (TTPs) - Coursera.mp4 11.4 MB
  52. Module 2/6. Understanding Different Phases of Hacking Cycle - Coursera.mp4 12.0 MB
  53. Module 6/2024-07-02_04-16-33_Video 6.9 Understanding Different Session Hijacking Tools and Countermeasures - Coursera.mp4 12.0 MB
  54. Module 12/2024-07-02_04-23-54_Video 12.4 Understanding Phases of Penetration Testing - Coursera.mp4 13.6 MB
  55. Module 1/6. Overview of Classification of Attacks/6. Overview of Classification of Attacks.mp4 13.7 MB
  56. Module 9/2024-07-02_04-20-31_Video 9.6 Overview of Mobile Security Guidelines and Security Tools - Coursera.mp4 14.4 MB
  57. Module 8/2024-07-02_04-18-39_Video 8.2 Overview of Wireless Terminology - Coursera.mp4 15.0 MB
  58. Module 6/2024-07-02_04-16-23_Video 6.8 Overview of Session Hijacking and Types of Session Hijacking - Coursera.mp4 15.0 MB
  59. Module 6/2024-07-02_04-15-58_Video 6.4 Understanding Different Sniffing Countermeasures - Coursera.mp4 15.3 MB
  60. Module 12/2024-07-02_04-23-49_Video 12.3 Understanding Types of Penetration Testing - Coursera.mp4 15.6 MB
  61. Module 7/2024-07-02_04-17-36_Video 7.6 Understanding Different Web Application Attack Tools and Countermeasures - Coursera.mp4 15.7 MB
  62. Module 9/2024-07-02_04-20-24_Video 9.5 Understanding Mobile Device Management - Coursera.mp4 16.1 MB
  63. Module 8/2024-07-02_04-18-59_Video 8.5 Overview of Different Wireless Attack Tools - Coursera.mp4 16.3 MB
  64. Module 1/1. Index/1. Index - OneHack.us.mp4 16.3 MB
  65. Module 3/2024-07-02_04-10-20_Understanding the Threat and Threat Sources - Coursera.mp4 17.2 MB
  66. Module 2/8. Overview of Ethical Hacking Tools - Coursera.mp4 17.7 MB
  67. Module 3/58_Understanding Vulnerability Assessment Tools and Vulnerability Exploitation - Coursera - OneHack.us.mp4 18.3 MB
  68. Module 12/2024-07-02_04-24-15_Video 12.7 Understanding Risks Associated with Penetration Testing - Coursera.mp4 19.0 MB
  69. Module 11/2024-07-02_04-23-05_Video 11.6 Understanding Cloud Attack Countermeasures - Coursera.mp4 20.7 MB
  70. Module 9/2024-07-02_04-20-07_Video 9.2 Understanding Anatomy of a Mobile Attack - Coursera.mp4 21.2 MB
  71. Module 1/7. Overview of Information Security Attack Vectors/7. Overview of Information Security Attack Vectors.mp4 21.4 MB
  72. Module 11/2024-07-02_04-23-00_Video 11.5 Overview of Cloud Attacks and Tools - Coursera.mp4 21.5 MB
  73. Module 10/2024-07-02_04-21-14_Video 10.2 Understanding IoT Concepts - Coursera.mp4 21.5 MB
  74. Module 8/2024-07-02_04-18-46_Video 8.3 Overview of Wireless Encryption Algorithms - Coursera.mp4 21.7 MB
  75. Module 4/2024-07-02_04-13-12_Video 4.6 Understanding Countermeasures against Password Attacks - Coursera.mp4 21.8 MB
  76. Module 12/2024-07-02_04-23-42_Video 12.2 Understanding Penetration Testing and its Benefits - Coursera.mp4 22.4 MB
  77. Module 5/2024-07-02_04-14-26_Video 5.4 Understanding Insider Threats - Coursera.mp4 22.5 MB
  78. Module 2/5. Overview of Hacking Concepts and Hacker Classes - Coursera.mp4 22.9 MB
  79. Module 6/2024-07-02_04-16-04_Video 6.5 Overview of Different Types of DoS and DDoS Attacks - Coursera.mp4 24.6 MB
  80. Module 7/2024-07-02_04-17-21_Video 7.4 Overview of Web Application Architecture and Vulnerability Stack - Coursera.mp4 28.2 MB
  81. Module 6/2024-07-02_04-15-51_Video 6.3 Understanding Various Sniffing Techniques and Tools - Coursera.mp4 28.7 MB
  82. Module 8/2024-07-02_04-19-05_Video 8.6 Understanding Bluetooth Attack Techniques - Coursera.mp4 29.4 MB
  83. Module 7/2024-07-02_04-17-30_Video 7.5 Understanding Different Web Application Threats and Attacks - Coursera.mp4 30.1 MB
  84. Module 6/2024-07-02_04-15-44_Video 6.2 Understanding Packet Sniffing and Types of Sniffing - Coursera.mp4 31.1 MB
  85. Module 5/2024-07-02_04-14-43_Video 5.6 Understanding Different Social Engineering, Insider Threats and Identity Theft Countermeasures - Coursera.mp4 34.4 MB
  86. Module 3/2024-07-02_04-10-43_Understanding Vulnerability and Vulnerability Classification - Coursera.mp4 37.5 MB
  87. Module 5/2024-07-02_04-14-17_Video 5.3 Understanding Various Social Engineering Techniques - Coursera.mp4 38.8 MB
  88. Module 3/2024-07-02_04-10-25_Understanding Malware and Common Techniques Attackers use to Distribute Malware on the Web - Coursera.mp4 39.4 MB
  89. Module 11/2024-07-02_04-22-53_Video 11.4 Understanding Cloud Computing Threats - Coursera.mp4 39.6 MB
  90. Module 10/2024-07-02_04-21-34_Video 10.5 Understanding OT Concepts - Coursera.mp4 43.1 MB
  91. Module 4/2024-07-02_04-12-59_Understanding Various Types of Password Attacks - Coursera.mp4 43.4 MB
  92. Module 5/2024-07-02_04-14-11_Video 5.2 Understanding Social Engineering Concepts - Coursera.mp4 43.4 MB
  93. Module 9/2024-07-02_04-20-18_Video 9.4 Understanding Mobile Platform Vulnerabilities - Coursera.mp4 44.3 MB
  94. Module 2/7. Understanding Ethical Hacking Concepts and Its Scope - Coursera.mp4 45.9 MB
  95. Module 8/2024-07-02_04-18-51_Video 8.4 Understanding Wireless Network-Specific Attack Techniques - Coursera.mp4 47.0 MB
  96. Module 1/8. Overview of Various Information Security Laws and Regulations/8. Overview of Various Information Security Laws and Regulations.mp4 48.2 MB
  97. Module 3/2024-07-02_04-10-52_Understanding Vulnerability Assessment and Vulnerability Management Life Cycle - Coursera.mp4 48.4 MB
  98. Module 11/2024-07-02_04-22-47_Video 11.3 Overview of Container Technology - Coursera.mp4 51.4 MB
  99. Module 11/2024-07-02_04-22-40_Video 11.2 Understanding Cloud Computing Concepts - Coursera.mp4 52.5 MB
  100. Module 10/2024-07-02_04-21-40_Video 10.6 Understanding OT Attacks and OT Attack Tools - Coursera.mp4 52.6 MB
  101. Module 7/2024-07-02_04-17-44_Video 7.7 Overview of Different Types of SQL Injection Attacks - Coursera.mp4 53.6 MB
  102. Module 10/2024-07-02_04-21-21_Video 10.3 Understanding IoT attacks and IoT attack Tools - Coursera.mp4 74.6 MB
  103. Module 7/2024-07-02_04-17-09_Video 7.2 Understanding Web Server Concepts and Attacks - Coursera.mp4 74.9 MB
  104. Module 12/2024-07-02_04-24-07_Video 12.6 Overview of Guidelines and Recommendations for Penetration Testing - Coursera.mp4 132.0 MB
  105. Module 3/2024-07-02_04-10-32_Overview of Different Types of Malware and Malware Countermeasures - Coursera.mp4 169.7 MB

Similar Posts:

  1. E-books EC-Council. Ethical Hacking and Countermeasures CEH v12 Lab modules 14-20. 2022 Jan. 28, 2023, 2:36 p.m.
  2. E-books EC-Council. Ethical Hacking and Countermeasures CEH v12 Lab modules 8-13. 2022 Jan. 28, 2023, 2:36 p.m.
  3. E-books EC-Council. Ethical Hacking and Countermeasures CEH v12 Lab modules 6-7. 2022 Jan. 28, 2023, 2:37 p.m.
  4. E-books EC-Council. Ethical Hacking and Countermeasures CEH v12 Lab modules 2-5. 2022 Jan. 28, 2023, 2:37 p.m.
  5. E-books EC-Council. Ethical Hacking and Countermeasures. CEH v12. Modules 19-20. 2022 Jan. 28, 2023, 2:37 p.m.