Certified Ethical Hacker (CEH) - Linux Academy Acloud Guru

  • Category Other
  • Type Tutorials
  • Language English
  • Total size 13.2 GB
  • Uploaded By notimmune
  • Downloads 1667
  • Last checked 2 hours ago
  • Date uploaded 11 months ago
  • Seeders 31
  • Leechers 14

Infohash : 72A9519786BD951F81D364B2264F73237898AF87



Certified Ethical Hacker (CEH) - Linux Academy Acloud Guru

Certified Ethical Hacker Course! (v10 ).
Have you always wanted to learn how to discover the weaknesses and vulnerabilities of a system? Have you always wondered how security professionals protect their systems from intruders? Do you wish to master hacking technologies? If so, then this course is for you.
With the rapid development of information technology, almost every industry in the world has some sort of information system installed and greatly depends on it. Such systems bring great value to companies. However, every system has its weaknesses and vulnerabilities which, if discovered by someone with bad intentions, can cause a lot of damage. For this reason, it has become imperative to protect these systems and the information they contain.

Files:

Certified_Ethical_Hacker_(CEH)_-_Linux_Academy_AcloudGuru 05_Protecting_Information
  • 015_Data_Backup.mp4 (222.9 MB)
  • 001_Chapter_Introduction.mp4 (57.4 MB)
  • 002_Information_Assurance.mp4 (135.0 MB)
  • 003_EISA_and_Information_security_management_program.mp4 (118.5 MB)
  • 004_Network_Zoning.mp4 (155.7 MB)
  • 005_Defense_in_Depth.mp4 (130.9 MB)
  • 006_What_Sort_of_Things_Do_Policies_Regulate.mp4 (150.1 MB)
  • 007_Workplace_Security_Policies_and_Examples.mp4 (108.2 MB)
  • 008_Physical_Security_Controls_and_Risk.mp4 (116.3 MB)
  • 009_Risk_Management.mp4 (127.2 MB)
  • 010_Threat_Modeling_and_Incident_Management.mp4 (212.6 MB)
  • 011_UBA_-_User_Behavior_Analytics_and_Network_Security_Controls.mp4 (83.5 MB)
  • 012_Access_Controls.mp4 (83.4 MB)
  • 013_Identification_Authentication_Authorization_Accounting_and_IAM.mp4 (122.2 MB)
  • 014_Data_Leakage.mp4 (98.4 MB)
  • 016_Data_Recovery.mp4 (28.0 MB)
  • 017_QUIZ_SOLUTION_Protecting_Information_-_Questions_answered_and_explained.mp4 (87.0 MB)
01_Getting_Started
  • 001_Certified_Ethical_Hacker_(CEH)_-_Linux_Academys_Prep_Course_PDF.pdf (5.5 MB)
  • 001_Module_1.docx (1.1 MB)
  • 001_Module_2.docx (23.9 KB)
  • 001_Module_3.docx (16.7 KB)
  • 001_Module_4.docx (28.5 KB)
  • 001_Module_5.docx (22.0 KB)
  • 001_Module_6.docx (19.6 KB)
  • 001_Module_7.docx (21.3 KB)
  • 001_Module_8.docx (36.3 KB)
  • 001_Module_9.docx (20.3 KB)
  • 002_About_the_Author.mp4 (22.6 MB)
  • 003_Course_Requirements.mp4 (55.8 MB)
  • 004_How_to_Get_Help.mp4 (71.2 MB)
  • 005_About_the_Exam.mp4 (134.3 MB)
  • 001_About_the_Course.mp4 (80.8 MB)
02_Overview_of_Information_Security
  • 001_Chapter_Introduction.mp4 (28.2 MB)
  • 002_Common_Terms_(Hack_Value_Vulnerability_Exploit_Payload).mp4 (62.0 MB)
  • 003_Zero_Day_Attack.mp4 (64.1 MB)
  • 004_Daisy_Chaining.mp4 (86.2 MB)
  • 005_Module_1_Study_Guide.docx (1.1 MB)
  • 005_QUIZ_SOLUTION_Overview_of_Information_Security_-_Questions_answered_and_explained.mp4 (58.1 MB)
03_Overview_of_Information_Security_Threats_and_Attacks
  • 001_Chapter_Introduction.mp4 (8.8 MB)
  • 002_Threats_vs_Attacks.mp4 (28.7 MB)
  • 003_Motives_and_Reasons_Behind_Cyber_Security_Attacks.mp4 (30.6 MB)
  • 004_What_Are_the_Means_by_Which_Hackers_Gain_Access_to_Systems_and_Networks.mp4 (29.0 MB)
  • 005_Cloud_Computing_Threats.mp4 (75.2 MB)
  • 006_Advanced_Persistent_Threats.mp4 (24.0 MB)
  • 007_Viruses_and_Worms.mp4 (37.9 MB)
  • 008_Ransomware.mp4 (60.2 MB)
  • 009_Mobile_Threats.mp4 (42.5 MB)
  • 010_Modern_Age_Information_Warfare.mp4 (53.1 MB)
  • 011_Insider_Attacks.mp4 (20.8 MB)
  • 012_Phishing.mp4 (27.5 MB)
  • 013_Web_Application_Threats.mp4 (28.5 MB)
  • 014_Classification_of_Threats_Network_Threats.mp4 (32.7 MB)
  • 015_Clasification_of_Threats_Host_Threats.mp4 (27.8 MB)
  • 016_Clasification_of_Threats_Application_Threats.mp4 (23.9 MB)
  • 017_Classification_of_Attacks.mp4 (141.1 MB)
  • 018_Botnets.mp4 (34.0 MB)
  • 019_Laws_Standards_and_Regulations.mp4 (132.6 MB)
  • 020_QUIZ_SOLUTION_Overview_of_Information_Security_Threats_and_Attacks_-_Questions_answered_and_explained.mp4 (67.0 MB)
04_History_of_Hacking
  • 001_A_Brief_Look_at_the_History_of_Hacking.mp4 (118.9 MB)
  • 002_Types_of_Hackers.mp4 (85.8 MB)
  • 003_What_is_Ethical_Hacking_What_is_Its_Purpose.mp4 (28.4 MB)
  • 004_Scope_of_Ethical_Hacking.mp4 (36.5 MB)
  • 005_Hacking_Stages_Reconnaissance.mp4 (24.7 MB)
  • 006_Hacking_Stages_Scanning.mp4 (18.8 MB)
  • 007_Hacking_Stages_Gaining_Access.mp4 (6.5 MB)
  • 008_Hacking_Stages_Maintaining_Access.mp4 (32.7 MB)
  • 009_Hacking_Stages_Clearing_Tracks.mp4 (29.5 MB)
  • 010_QUIZ_SOLUTION__History_of_Hacking_-_Questions_answered_and_explained.mp4 (82.4 MB)
06_Penetration_Testing
  • 001_What_Is_Penetration_Testing.mp4 (37.8 MB)
  • 002_What_Does_a_Good_Penetration_Test_Consist_of.mp4 (129.8 MB)
  • 003_Why_Do_a_Penetration_Test.mp4 (123.5 MB)
  • 004_Pre-Attack_Phase_Contracts.mp4 (29.9 MB)
  • 005_Audit_vs_Vulnerability_Assessment_vs_Penetration_Test.mp4 (26.5 MB)
  • 006_Red_vs_Blue_Team.mp4 (32.1 MB)
  • 007_Types_of_Penetration_Testing.mp4 (80.4 MB)
  • 008_Pre-Attack_Phase_Rules_of_Engagement.mp4 (26.3 MB)
  • 009_Pre-Attack_Phase_Understanding_your_Clients_requirements.mp4 (43.7 MB)
  • 010_Pre-Attack_Phase_Scope_of_a_Penetration_Test.mp4 (76.7 MB)
  • 011_Pre-Attack_Phase_Information_Gathering.mp4 (70.8 MB)
  • 012_Pre-Attack_Phase_Two_Types_of_Information_Gathering.mp4 (60.5 MB)
  • 013_Attack_Phase.mp4 (15.9 MB)
  • 014_Attack_Phase_Penetrating_the_Perimeter.mp4 (46.6 MB)
  • 015_Attack_Phase_Target_Acquisition.mp4 (30.7 MB)
  • 016_Attack_Phase_Privilege_Escalation.mp4 (31.8 MB)
  • 017_Attack_Phase_Execute_Implant_Retract.mp4 (36.6 MB)
  • 018_Post-Attack_Phase.mp4 (23.5 MB)
  • 019_Security_Testing_Methodologies.mp4 (77.5 MB)
  • 020_QUIZ_SOLUTION_Penetration_Testing_-_Questions_answered_and_explained.mp4 (65.2 MB)
07_Footprinting_Process
  • 001_About_Footprinting.mp4 (33.9 MB)
  • 002_Hacker_State_of_Mind.mp4 (59.9 MB)
  • 003_Search_Engine_and_Online_Resources.mp4 (196.4 MB)
  • 004_Whois_GeoIpLocation_and_DNS_Interogation.mp4 (145.6 MB)
  • 005_Email_Header_Analysis.mp4 (164.3 MB)
  • 006_Getting_an_IP_Address_from_an_Email_and_More.mp4 (167.2 MB)
  • 007_Quick_Look_at_a_Website_Certificate_Source_Code_and_Traffic.mp4 (169.7 MB)
  • 008_How_to_Clone_a_Website_and_Extract_Metadata_from_Files.mp4 (186.0 MB)
  • 009_Nmap_and_Traceroute.mp4 (201.1 MB)
  • 010_QUIZ_SOLUTION_Footprinting_-_Questions_answered_and_explained.mp4 (55.0 MB)
08_Reports_and_Countermeasures
  • 001_Countermeasures_and_Best_Practices.mp4 (121.5 MB)
  • 002_What_Goes_into_a_Footprinting_Report.mp4 (56.5 MB)
  • 003_QUIZ_SOLUTION_Reports_and_Countermeasures_-_Questions_answered_and_explained.mp4 (50.0 MB)
09_Network_Scanning_Techniques
  • 001_Banner_Grabbing.mp4 (54.8 MB)
  • 002_Drawing_and_Mapping_Out_Network_Topologies.mp4 (97.2 MB)
  • 003_Scanning_for_Vulnerabilities.mp4 (143.0 MB)
  • 004_Enumeration.mp4 (72.2 MB)
  • 005_QUIZ_SOLUTION_Network_Scanning_Techniques_-_Questions_answered_and_explained.mp4 (56.9 MB)
10_Password_Cracking_Techniques
  • 001_Password_Cracking_Crunch_and_Some_Basics.mp4 (169.8 MB)
  • 002_Using_Hydra_for_online_password_cracking.mp4 (181.5 MB)
  • 003_Hashcat_Environment_Setup.mp4 (178.2 MB)
  • 004_HashCat_Installation.mp4 (78.9 MB)
  • 005_HashCat_Let_Us_Crack_Some_Passwords.mp4 (166.3 MB)
  • 006_HashCat_Results_and_Recap.mp4 (122.9 MB)
  • 007_QUIZ_SOLUTION_Password_Cracking_Techniques_-_Questions_answered_and_explained.mp4 (78.3 MB)
11_Techniques_for_Creating_and_Maintaining_Access_to_the_Remote_System
  • 001_Reverse_Shell_and_Remote_Service_Exploitation.mp4 (185.0 MB)
  • 002_Keylogger_Intro_and_Environment_Setup.mp4 (117.9 MB)
  • 003_Keylogger_Source_Code_Download_and_Import.mp4 (50.8 MB)
  • 004_Keylogger_Configuration.mp4 (79.5 MB)
  • 005_Keylogger_Demo.mp4 (134.0 MB)
  • 006_Decrypting_Keylogger_Logs.mp4 (91.2 MB)
  • 007_QUIZ_SOLUTION_Persistent_Remote_Access_-_Questions_Answered_and_Explained.mp4 (54.7 MB)
12_Hiding_Malicious_Programs
  • 001_SandBox.mp4 (173.8 MB)
  • 002_How_to_Create_a_Safe_Sandbox_Environment.mp4 (133.0 MB)
  • 003_Anti-Malware_Software_Overview.mp4 (109.4 MB)
  • 004_Packing_Malware.mp4 (125.8 MB)
  • 005_Rootkits.mp4 (68.8 MB)
  • 006_Hiding_Files_and_Steganography.mp4 (115.9 MB)
  • 007_QUIZ_SOLUTION_Hiding_Malicious_Programs_-_Questions_Answered_and_Explained.mp4 (38.1 MB)
13_Covering_Tracks_and_Destroying_Evidence
  • 001_Log_Files_Covering_Your_Tracks.mp4 (135.9 MB)
  • 002_QUIZ_SOLUTION_Covering_Tracks_and_Destroying_Evidence_-_Questions_Answered_and_Explained.mp4 (68.3 MB)
14_Spoofing_Techniques
  • 001_ARP_Spoofing.mp4 (174.4 MB)
  • 002_MAC_Address_Spoofing.mp4 (120.1 MB)
  • 003_DHCP_Starvation.mp4 (71.4 MB)
  • 004_QUIZ_SOLUTION_Sniffing_Techniques_-_Questions_Answered_and_Explained.mp4 (101.1 MB)
15_Attacking_and_Exploiting_Wireless_Networks
  • 001_Capturing_the_WPA2_Handshake.mp4 (145.1 MB)
  • 002_Cracking_WPA2_Passkey.mp4 (161.9 MB)
  • 003_QUIZ_SOLUTION_Wireless_Networks_-_Questions_Answered_and_Explained.mp4 (76.7 MB)
16_Tip_Tricks_and_Real_Life_Scenarios
  • 001_Social_Engineering.mp4 (169.8 MB)
  • 002_Well_Known_Social_Engineering_Attacks_A_Retrospective.mp4 (114.3 MB)
  • 003_QUIZ_SOLUTION_Social_Engineering_-_Questions_Answered_and_Explained.mp4 (58.9 MB)
17_Firewalls
  • 001_What_Is_a_Firewall_How_Does_It_Work.mp4 (90.1 MB)
  • 002_Firewall_Usage_Logging_and_Configuration.mp4 (110.6 MB)
  • 003_Evading_Firewall_GeoIpBock.mp4 (176.1 MB)
  • 004_QUIZ_SOLUTION_Firewalls_-_Questions_answered_and_explained.mp4 (59.5 MB)
18_Honeypots
  • 001_How_to_Set_Up_a_Honeypot.mp4 (137.1 MB)
  • 002_How_to_grab_traffic_from_a_Honeypot.mp4 (130.3 MB)
  • 003_QUIZ_SOLUTION_Honeypots_-_Questions_Answered_and_Explained.mp4 (53.4 MB)
19_Lets_Attack_Web_Servers_and_Web_Applications
  • 001_OWASP_-_Open_Web_Application_Security_Project.mp4 (49.9 MB)
  • 002_XSS_Cross_Site_Scripting.mp4 (127.7 MB)
  • 003_SQL_Injections.mp4 (171.9 MB)
  • 004_QUIZ_SOLUTION_Attacking_Web_Servers_and_Web_Applications_-_Questions_Answered_and_Explained.mp4 (57.7 MB)
20_About_Cryptography
  • 001_Cryptography_Basics.mp4 (75.4 MB)
  • 002_Cryptography_Common_Algorithms__and_Message_Digest.mp4 (93.8 MB)
  • 003_PKI_Public_Key_Infrastructure.mp4 (72.3 MB)
21_Encryption_Decryption_Cryptanalysis_and_Attack_Vectors
  • 001_Cryptanalysis_and_Attack_Vectors.mp4 (104.9 MB)
  • 002_Checksum_and_File_Encryption.mp4 (131.6 MB)
  • 003_SSH_RSA_Demo.mp4 (146.8 MB)
  • 004_Storage_Medium_Encryption.mp4 (141.2 MB)
  • 005_QUIZ_SOLUTION_Cryptography_-_Questions_Answered_and_Explained.mp4 (54.5 MB)
22_Final
  • 001_Final_Practice_Exam.mp4 (59.9 MB)
23_Final_SOLUTIONS
  • 001_Final_Practice_Exam_Question_and_Answer_overview_part_1.mp4 (114.2 MB)
  • 002_Final_Practice_exam_Question_and_Answer_overview_part_2.mp4 (68.7 MB)
  • 003_Final_Practice_exam_Question_and_Answer_overview_part_3.mp4 (111.4 MB)
  • 004_Final_Practice_exam_Question_and_Answer_overview_part_4.mp4 (112.9 MB)

Comments

Code:

  • udp://tracker.opentrackr.org:1337/announce
  • http://bt.okmp3.ru:2710/announce
  • udp://u4.trakx.crim.ist:1337/announce
  • udp://wepzone.net:6969/announce
  • udp://ttk2.nbaonlineservice.com:6969/announce
  • https://tracker.yemekyedim.com:443/announce
  • https://tracker.gcrenwp.top:443/announce
  • https://tracker.bjut.jp:443/announce
  • https://api.ipv4online.uk:443/announce
  • https://tr.zukizuki.org:443/announce
  • https://tracker.moeking.me:443/announce
  • http://tracker.renfei.net:8080/announce
  • http://fleira.no:6969/announce
  • https://tr.nyacat.pw:443/announce
  • udp://tracker.gmi.gd:6969/announce
⚠️ Refresh failed — 1337x is temporarily unavailable. Showing cached version from Thu, 12 Mar, 2026, 00:40:27 UTC (expired Mon, 06 Apr, 2026, 00:40:27 UTC).
CACHE ❓ STALE-RP-FAILED 📄 torrent 🕐 06 Apr 2026, 04:19:51 pm IST ⏰ 07 Apr 2026, 04:19:51 pm IST ✅ Valid for 1d 0h 🔄 Wait 10m