The Absolute Beginners Guide to Cyber Security 2023 - part 1
- Category Other
- Type Tutorials
- Language English
- Total size 2.8 GB
- Uploaded By SeedHash
- Downloads 496
- Last checked 1 day ago
- Date uploaded 2 years ago
- Seeders 24
- Leechers 15
Infohash : E8864535701F2A3849230DB117B4BB06C200F706
The Absolute Beginners Guide to Cyber Security 2023
Join For More :- https://t.me/SeedHash
Learn Cyber Security concepts such as hacking, malware, firewalls, worms, phishing, encryption, biometrics, BYOD & more
Code:
What you'll learn
Understand the basic concepts and terminologies used in the information and cyber security fields
Take up entry roles for IT and Cybersecurity Positions
Differentiate between the various forms of malware and how they affect computers and networks
Understand the basic concepts and terminologies used in the information and cyber security fields
Take up entry roles for IT and Cybersecurity Positions
Differentiate between the various forms of malware and how they affect computers and networks
Files:
The Absolute Beginners Guide to Cyber Security - Part 1 01 - Welcome to the Course- 001 Welcome to the Course.mp4 (139.9 MB)
- 001 Welcome to the Course_en.srt (13.4 KB)
- 002 Who Am I Meet your Instructor.mp4 (26.6 MB)
- 002 Who Am I Meet your Instructor_en.srt (19.5 KB)
- 003 Connect with Me.mp4 (11.3 MB)
- 003 Connect with Me_en.srt (4.3 KB)
- 004 Download the Guide Book.html (0.1 KB)
- 004 The-Absolute-Beginners-Guide-to-Cyber-Security-Hand-Book.pdf (5.3 MB)
- 138913 (135.7 KB)
- 1034899 (1,010.6 KB)
- 435877 (425.7 KB)
- 1028644 (1,004.5 KB)
- 727716 (710.7 KB)
- 1044198 (1,019.7 KB)
- 1048487 (1,023.9 KB)
- 741622 (724.2 KB)
- 1030902 (1,006.7 KB)
- 1042062 (1,017.6 KB)
- 839752 (820.1 KB)
- 1043300 (1,018.8 KB)
- 1046118 (1,021.6 KB)
- 394089 (384.9 KB)
- 1036975 (1,012.7 KB)
- 284953 (278.3 KB)
- 1038324 (1,014.0 KB)
- 581569 (567.9 KB)
- 1042912 (1,018.5 KB)
- 1048536 (1,024.0 KB)
- 421942 (412.1 KB)
- 1047087 (1,022.5 KB)
- 577687 (564.1 KB)
- 1038222 (1,013.9 KB)
- 346572 (338.4 KB)
- 1038199 (1,013.9 KB)
- 543798 (531.1 KB)
- 1037286 (1,013.0 KB)
- 337444 (329.5 KB)
- 1038217 (1,013.9 KB)
- 543047 (530.3 KB)
- 1028229 (1,004.1 KB)
- 778039 (759.8 KB)
- 1022119 (998.2 KB)
- 999739 (976.3 KB)
- 1047418 (1,022.9 KB)
- 596592 (582.6 KB)
- 1040999 (1,016.6 KB)
- 771208 (753.1 KB)
- 1027257 (1,003.2 KB)
- 17552 (17.1 KB)
- 1029102 (1,005.0 KB)
- 8323 (8.1 KB)
- 1041127 (1,016.7 KB)
- 426422 (416.4 KB)
- 1039968 (1,015.6 KB)
- 447428 (436.9 KB)
- 1042605 (1,018.2 KB)
- 925143 (903.5 KB)
- 1041098 (1,016.7 KB)
- 268006 (261.7 KB)
- 1040320 (1,015.9 KB)
- 472717 (461.6 KB)
- 1033228 (1,009.0 KB)
- 52848 (51.6 KB)
- 1046575 (1,022.0 KB)
- 836095 (816.5 KB)
- 1040579 (1,016.2 KB)
- 519138 (507.0 KB)
- 1039027 (1,014.7 KB)
- 642554 (627.5 KB)
- 1041961 (1,017.5 KB)
- 602206 (588.1 KB)
- 1029970 (1,005.8 KB)
- 992146 (968.9 KB)
- 1041028 (1,016.6 KB)
- 956113 (933.7 KB)
- 1047293 (1,022.7 KB)
- 259719 (253.6 KB)
- 1041356 (1,016.9 KB)
- 895155 (874.2 KB)
- 1043131 (1,018.7 KB)
- 189059 (184.6 KB)
- 1042763 (1,018.3 KB)
- 539743 (527.1 KB)
- 1041110 (1,016.7 KB)
- 326569 (318.9 KB)
- 1039563 (1,015.2 KB)
- 834150 (814.6 KB)
- 1039464 (1,015.1 KB)
- 266798 (260.5 KB)
- 1037838 (1,013.5 KB)
- 527282 (514.9 KB)
- 1029835 (1,005.7 KB)
- 929933 (908.1 KB)
- 1045546 (1,021.0 KB)
- 1006778 (983.2 KB)
- 1041993 (1,017.6 KB)
- 682144 (666.2 KB)
- 1042330 (1,017.9 KB)
- 419080 (409.3 KB)
- 1034925 (1,010.7 KB)
- 40730 (39.8 KB)
- 1038848 (1,014.5 KB)
- 257399 (251.4 KB)
- 1044912 (1,020.4 KB)
- 815168 (796.1 KB)
- 1043065 (1,018.6 KB)
- 489440 (478.0 KB)
- 1044624 (1,020.1 KB)
- 73533 (71.8 KB)
- 1037121 (1,012.8 KB)
- 586396 (572.7 KB)
- 1040912 (1,016.5 KB)
- 612989 (598.6 KB)
- 1040529 (1,016.1 KB)
- 841135 (821.4 KB)
- 1042524 (1,018.1 KB)
- 1046011 (1,021.5 KB)
- 1024198 (1,000.2 KB)
- 1031471 (1,007.3 KB)
- 406694 (397.2 KB)
- 1042459 (1,018.0 KB)
- 665838 (650.2 KB)
- 1045436 (1,020.9 KB)
- 271975 (265.6 KB)
- 1036148 (1,011.9 KB)
- 001 Difference Between Information Security and Cyber Security.mp4 (78.0 MB)
- 001 Difference Between Information Security and Cyber Security_en.srt (6.4 KB)
- 002 The Trinity of IT Security - CIA.mp4 (24.2 MB)
- 002 The Trinity of IT Security - CIA_en.srt (5.2 KB)
- 003 Basic Terminologies.html (2.4 KB)
- 004 Computer Protocols.mp4 (27.6 MB)
- 004 Computer Protocols_en.srt (11.3 KB)
- 005 Cookies.mp4 (56.7 MB)
- 005 Cookies_en.srt (10.0 KB)
- 006 The TCPIP.mp4 (6.4 MB)
- 006 The TCPIP_en.srt (5.5 KB)
- Bonus Resources.txt (0.0 KB)
- 001 Section Intro.mp4 (16.6 MB)
- 001 Section Intro_en.srt (1.5 KB)
- 002 This is NOT Hacking.mp4 (68.4 MB)
- 002 This is NOT Hacking_en.srt (10.1 KB)
- 003 Types of Hackers.mp4 (19.7 MB)
- 003 Types of Hackers_en.srt (10.1 KB)
- 004 The Hacking Methodology.mp4 (53.5 MB)
- 004 The Hacking Methodology_en.srt (11.0 KB)
- 005 The WhoIS Query.mp4 (22.7 MB)
- 005 The WhoIS Query_en.srt (10.1 KB)
- 006 Social Engineering Tactics - Part 1.mp4 (122.5 MB)
- 006 Social Engineering Tactics - Part 1_en.srt (19.9 KB)
- 007 Social Engineering Tactics - Part 2.mp4 (142.3 MB)
- 007 Social Engineering Tactics - Part 2_en.srt (25.8 KB)
- 001 Intro to the Section.mp4 (14.0 MB)
- 001 Intro to the Section_en.srt (1.1 KB)
- 002 Brute Force Attacks.mp4 (13.4 MB)
- 002 Brute Force Attacks_en.srt (7.4 KB)
- 003 Phishing.mp4 (118.3 MB)
- 003 Phishing_en.srt (20.8 KB)
- 004 Phishing - Part 2.mp4 (211.0 MB)
- 004 Phishing - Part 2_en.srt (19.0 KB)
- 005 Bots and Botnets.mp4 (9.0 MB)
- 005 Bots and Botnets_en.srt (7.3 KB)
- 006 DoS and DDoS.mp4 (8.6 MB)
- 006 DoS and DDoS_en.srt (8.4 KB)
- 007 Pings.mp4 (15.6 MB)
- 007 Pings_en.srt (5.8 KB)
- 008 Man in the Middle Attacks.mp4 (7.1 MB)
- 008 Man in the Middle Attacks_en.srt (7.3 KB)
- 009 SQL Injections.mp4 (9.7 MB)
- 009 SQL Injections_en.srt (8.1 KB)
- 010 Supply Chain Attacks.mp4 (162.5 MB)
- 010 Supply Chain Attacks_en.srt (15.0 KB)
- 001 Introduction to Malware.mp4 (22.9 MB)
- 001 Introduction to Malware_en.srt (2.0 KB)
- 002 Viruses & Worms.mp4 (21.2 MB)
- 002 Viruses & Worms_en.srt (7.8 KB)
- 003 Trojans.mp4 (141.5 MB)
- 003 Trojans_en.srt (9.3 KB)
- 004 Adware and Spyware.mp4 (22.4 MB)
- 004 Adware and Spyware_en.srt (6.5 KB)
- 005 Ransomware.mp4 (211.4 MB)
- 005 Ransomware_en.srt (18.2 KB)
- 006 Other Types of Malware.mp4 (11.1 MB)
- 006 Other Types of Malware_en.srt (7.4 KB)
- 001 Section Intro.mp4 (8.1 MB)
- 001 Section Intro_en.srt (1.3 KB)
- 002 Firewalls.mp4 (8.8 MB)
- 002 Firewalls_en.srt (7.1 KB)
- 003 Encryption.mp4 (10.1 MB)
- 003 Encryption_en.srt (5.3 KB)
- 004 Biometrics.mp4 (26.8 MB)
- 004 Biometrics_en.srt (5.7 KB)
- 005 Anti Virus.mp4 (8.5 MB)
- 005 Anti Virus_en.srt (7.3 KB)
- 006 Factor Authentication Methods.mp4 (18.7 MB)
- 006 Factor Authentication Methods_en.srt (8.8 KB)
- 007 Honey Pots and DMZs.mp4 (11.2 MB)
- 007 Honey Pots and DMZs_en.srt (8.9 KB)
- 008 Security for Wireless Networks.mp4 (20.7 MB)
- 008 Security for Wireless Networks_en.srt (10.5 KB)
- 009 Password Management.mp4 (59.5 MB)
- 009 Password Management_en.srt (18.3 KB)
- 001 Section Intro.mp4 (20.1 MB)
- 001 Section Intro_en.srt (3.0 KB)
- 002 Cyber Security Policies.mp4 (11.0 MB)
- 002 Cyber Security Policies_en.srt (6.4 KB)
- 003 BYOD Management.mp4 (71.3 MB)
- 003 BYOD Management_en.srt (6.1 KB)
- 004 A Sample BYOD Policy.mp4 (11.6 MB)
- 004 A Sample BYOD Policy_en.srt (13.3 KB)
- 005 The Security vs Ease of Access Paradox.mp4 (61.0 MB)
- 005 The Security vs Ease of Access Paradox_en.srt (9.5 KB)
- 006 The Weakest Link & The Disgruntled Employee.mp4 (34.8 MB)
- 006 The Weakest Link & The Disgruntled Employee_en.srt (3.6 KB)
- 007 Review Update.mp4 (8.2 MB)
- 007 Review Update_en.srt (5.4 KB)
- 001 Introduction to Cyber Warfare.mp4 (53.5 MB)
- 001 Introduction to Cyber Warfare_en.srt (3.9 KB)
- 002 The Attack Against Estonia.mp4 (147.9 MB)
- 002 The Attack Against Estonia_en.srt (11.2 KB)
- 003 Stuxnet and the Attack Against Iran.mp4 (101.4 MB)
- 003 Stuxnet and the Attack Against Iran_en.srt (7.5 KB)
- 004 The Colonial Pipeline Attack.mp4 (13.4 MB)
- 004 The Colonial Pipeline Attack_en.srt (7.9 KB)
- 005 The Sony Hack.mp4 (75.2 MB)
- 005 The Sony Hack_en.srt (5.9 KB)
- 001 Actionable Steps for Personal Security.html (2.5 KB)
- 002 SPECIAL LESSON - How to Launch your Career in Cyber Security.mp4 (96.0 MB)
- 002 SPECIAL LESSON - How to Launch your Career in Cyber Security_en.srt (16.7 KB)
- 003 Getting your Certificate.mp4 (11.6 MB)
- 003 Getting your Certificate_en.srt (6.0 KB)
- 004 Conclusion.mp4 (18.4 MB)
- 004 Conclusion_en.srt (3.1 KB)
- 005 Course Promo.mp4 (19.7 MB)
- 005 Course Promo_en.srt (12.1 KB)
There are currently no comments. Feel free to leave one :)
Code:
- udp://tracker.opentrackr.org:1337/announce
- https://tracker2.ctix.cn:443/announce
- https://tracker1.520.jp:443/announce
- udp://opentracker.i2p.rocks:6969/announce
- udp://tracker.openbittorrent.com:6969/announce
- http://tracker.openbittorrent.com:80/announce
- udp://open.demonii.com:1337/announce
- udp://open.stealth.si:80/announce
- udp://exodus.desync.com:6969/announce
- udp://tracker.moeking.me:6969/announce
- udp://tracker.tiny-vps.com:6969/announce
- udp://tracker.bitsearch.to:1337/announce
- udp://p4p.arenabg.com:1337/announce