Udemy - Cyber Security for Absolute Beginners - Essential Concepts
- CategoryOther
- TypeTutorials
- LanguageEnglish
- Total size1.6 GB
- Uploaded Byfreecoursewb
- Downloads78
- Last checkedMay. 08th '22
- Date uploadedMay. 06th '22
- Seeders 13
- Leechers12
Infohash : CF8BDB8153C3025C5A3E2F0B30E0B4E0E1BAA3C0
Cyber Security for Absolute Beginners: Essential Concepts 
https://DevCourseWeb.com
Published 04/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + srt | Duration: 77 lectures (4h 1m) | Size: 1.6 GB
Learn Vital Cyber Security Concepts: Understanding Hackers & Cyber Threats, Cyber Security Countermeasures & Much More!
What you'll learn
Understand the Fundamentals of Cyber Security Threats & Countermeasures
Have a Strong Fundamental Understanding of Cyber Security
Be Prepared for More Advanced Cyber Security Courses
Better Protect Your Business & I.T. Infrastructure
Requirements
Understand the Fundamentals of Cyber Security Threats & Countermeasures
Have a Strong Fundamental Understanding of Cyber Security
Be Prepared for More Advanced Cyber Security Courses
Better Protect Your Business & I.T. Infrastructure
Files:
[ DevCourseWeb.com ] Udemy - Cyber Security for Absolute Beginners - Essential Concepts- Get Bonus Downloads Here.url (0.2 KB) ~Get Your Files Here ! 1. Course Introduction
- 1. Welcome to the Course!.mp4 (22.4 MB)
- 1. Welcome to the Course!.mp4.jpg?v=2 (140.2 KB)
- 1. Welcome to the Course!.srt (6.1 KB)
- 2. Why Learn Cyber Security from Me.mp4 (14.7 MB)
- 2. Why Learn Cyber Security from Me.srt (4.0 KB)
- 3. Course Companion Study Guide.mp4 (15.9 MB)
- 3. Course Companion Study Guide.srt (1.3 KB)
- 3.1 Course Companion Study Guide.pdf (2.2 MB)
- 4. Course Case Studies Overview.mp4 (19.1 MB)
- 4. Course Case Studies Overview.srt (1.5 KB)
- 5. Familiarizing Yourself with Udemy's Course Taking Interface.mp4 (62.7 MB)
- 5. Familiarizing Yourself with Udemy's Course Taking Interface.srt (11.3 KB)
- 6. How to Access Course Subtitles & Transcripts.html (1.0 KB)
- 7. Join our Facebook Student Community.html (1.1 KB)
- 8. Udemy Mobile App for iOS & Android - Download & Take Course Videos On the Go!.html (1.2 KB)
- 9. Student Exercise Introduce Yourself.html (0.3 KB)
- 1. Section Introduction.mp4 (10.6 MB)
- 1. Section Introduction.srt (0.8 KB)
- 2. Patch Management & Change Management.mp4 (23.1 MB)
- 2. Patch Management & Change Management.srt (6.9 KB)
- 3. Incident Response.mp4 (30.2 MB)
- 3. Incident Response.srt (8.8 KB)
- 4. Application Development Security.mp4 (31.1 MB)
- 4. Application Development Security.srt (8.3 KB)
- 5. Security Assessments.mp4 (18.8 MB)
- 5. Security Assessments.srt (5.7 KB)
- 6. Risk Management Program.mp4 (28.8 MB)
- 6. Risk Management Program.srt (7.7 KB)
- 7. Personnel Policies.mp4 (20.9 MB)
- 7. Personnel Policies.srt (6.9 KB)
- 8. Training, Eduation and Awareness.mp4 (21.6 MB)
- 8. Training, Eduation and Awareness.srt (7.2 KB)
- 1. Congratulations.mp4 (20.2 MB)
- 1. Congratulations.srt (1.7 KB)
- 2. How to Download Your Udemy Course Certificate of Completion.html (0.6 KB)
- 1. Section Introduction.mp4 (10.7 MB)
- 1. Section Introduction.srt (0.7 KB)
- 2. What is Cyber Security.mp4 (24.4 MB)
- 2. What is Cyber Security.srt (4.7 KB)
- 3. Why Do We Need Cyber Security.mp4 (23.3 MB)
- 3. Why Do We Need Cyber Security.srt (7.7 KB)
- 4. The Current State of Cybersecurity in 2021 & 2022.mp4 (55.7 MB)
- 4. The Current State of Cybersecurity in 2021 & 2022.srt (9.6 KB)
- 1. Section Introduction.mp4 (12.8 MB)
- 1. Section Introduction.srt (1.1 KB)
- 2. What Hacking Isn’t.mp4 (40.2 MB)
- 2. What Hacking Isn’t.srt (3.1 KB)
- 3. Types of Hackers.mp4 (10.5 MB)
- 3. Types of Hackers.srt (3.5 KB)
- 4. Hacker Motivations.mp4 (18.0 MB)
- 4. Hacker Motivations.srt (5.5 KB)
- 5. The Hacking Methodology.mp4 (23.6 MB)
- 5. The Hacking Methodology.srt (11.2 KB)
- 1. Section Introduction.mp4 (20.2 MB)
- 1. Section Introduction.srt (1.8 KB)
- 10. Student Exercise 2 Identifying your MAC and IP Address (Windows and Mac OS).mp4 (34.1 MB)
- 10. Student Exercise 2 Identifying your MAC and IP Address (Windows and Mac OS).srt (5.7 KB)
- 2. What is a Computer Network.mp4 (8.4 MB)
- 2. What is a Computer Network.srt (2.9 KB)
- 3. Some Basic Networking Rules.mp4 (9.4 MB)
- 3. Some Basic Networking Rules.srt (3.0 KB)
- 4. Computer Protocols.mp4 (12.5 MB)
- 4. Computer Protocols.srt (4.2 KB)
- 5. LANs versus WANs.mp4 (18.3 MB)
- 5. LANs versus WANs.srt (5.7 KB)
- 6. MAC versus IP Addresses.mp4 (16.9 MB)
- 6. MAC versus IP Addresses.srt (4.9 KB)
- 7. Switches versus Routers.mp4 (27.8 MB)
- 7. Switches versus Routers.srt (8.0 KB)
- 8. TCPIP Protocol Suite.mp4 (21.2 MB)
- 8. TCPIP Protocol Suite.srt (5.5 KB)
- 9. How the Internet Works (Simplified).mp4 (26.8 MB)
- 9. How the Internet Works (Simplified).srt (6.2 KB)
- 1. Section Introduction.mp4 (7.9 MB)
- 1. Section Introduction.srt (0.7 KB)
- 2. Viruses and Worms.mp4 (20.2 MB)
- 2. Viruses and Worms.srt (6.0 KB)
- 3. Trojan Horses and Logic Bombs.mp4 (14.0 MB)
- 3. Trojan Horses and Logic Bombs.srt (4.9 KB)
- 4. Spyware and Adware.mp4 (11.0 MB)
- 4. Spyware and Adware.srt (4.3 KB)
- 5. Ransomware and Rootkits.mp4 (28.5 MB)
- 5. Ransomware and Rootkits.srt (6.3 KB)
- 6. How Hackers Deploy Malware.mp4 (20.4 MB)
- 6. How Hackers Deploy Malware.srt (5.4 KB)
- 7. Case Study Colonial Pipeline.html (2.5 KB)
- 1. Section Introduction.mp4 (10.0 MB)
- 1. Section Introduction.srt (0.9 KB)
- 2. Zero-Day Attacks.mp4 (15.1 MB)
- 2. Zero-Day Attacks.srt (4.0 KB)
- 3. Buffer Overflows.mp4 (23.7 MB)
- 3. Buffer Overflows.srt (6.7 KB)
- 4. Protocol Spoofing.mp4 (31.1 MB)
- 4. Protocol Spoofing.srt (10.8 KB)
- 5. DoS and DDoS Attacks.mp4 (15.5 MB)
- 5. DoS and DDoS Attacks.srt (4.8 KB)
- 6. Weak Encryption Key & Software Vulnerability Attacks.mp4 (20.9 MB)
- 6. Weak Encryption Key & Software Vulnerability Attacks.srt (5.6 KB)
- 7. Web-Based Attacks.mp4 (23.5 MB)
- 7. Web-Based Attacks.srt (8.0 KB)
- 8. Evil Twin and Rogue Access Points.mp4 (26.7 MB)
- 8. Evil Twin and Rogue Access Points.srt (7.1 KB)
- 9. Case Study TJX Companies Inc. (TJX).html (2.0 KB)
Code:
- udp://tracker.torrent.eu.org:451/announce
- udp://tracker.tiny-vps.com:6969/announce
- http://tracker.foreverpirates.co:80/announce
- udp://tracker.cyberia.is:6969/announce
- udp://exodus.desync.com:6969/announce
- udp://explodie.org:6969/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://9.rarbg.to:2780/announce
- udp://tracker.internetwarriors.net:1337/announce
- udp://ipv4.tracker.harry.lu:80/announce
- udp://open.stealth.si:80/announce
- udp://9.rarbg.to:2900/announce
- udp://9.rarbg.me:2720/announce
- udp://opentor.org:2710/announce