Ethical Hacking Introduction to Ethical Hacking

Photo unavailable
Category:
Date:
04/15/21 at 6:12pm GMT+1
Submitter:
Seeders:
0
Leechers:
2
File size:
343 MB in 60 files

Torrent Status:
  This torrent has been verified.

Infohash:
0ab8bc526aa6f7eacb6745062f75375b451072a3


File list

  • Ethical Hacking Introduction to Ethical Hacking
  • icon .pad/0 160.4 KB
    icon .pad/1 107.2 KB
    icon .pad/10 138.8 KB
    icon .pad/11 148.8 KB
    icon .pad/12 206.9 KB
    icon .pad/13 224 KB
    icon .pad/14 197.2 KB
    icon .pad/15 51.5 KB
    icon .pad/16 181.5 KB
    icon .pad/17 90.7 KB
    icon .pad/18 120 KB
    icon .pad/19 26.6 KB
    icon .pad/2 206.8 KB
    icon .pad/20 190.7 KB
    icon .pad/21 182.3 KB
    icon .pad/22 50.5 KB
    icon .pad/23 123.7 KB
    icon .pad/24 185.7 KB
    icon .pad/25 206.8 KB
    icon .pad/26 245.8 KB
    icon .pad/27 53.2 KB
    icon .pad/28 147.9 KB
    icon .pad/3 222.2 KB
    icon .pad/4 159.5 KB
    icon .pad/5 130.2 KB
    icon .pad/6 248 KB
    icon .pad/7 158.7 KB
    icon .pad/8 208.3 KB
    icon .pad/9 238.5 KB
    icon TutsNode.com.txt 63 B
    icon [TutsNode.com] - Ethical Hacking Introduction to Ethical Hacking/1. Locking down the organization.mp4 12.1 MB
    icon [TutsNode.com] - Ethical Hacking Introduction to Ethical Hacking/10. Solution- The Cyber Kill Chain.mp4 9.1 MB
    icon [TutsNode.com] - Ethical Hacking Introduction to Ethical Hacking/11. Defining ethical hacking.mp4 15.8 MB
    icon [TutsNode.com] - Ethical Hacking Introduction to Ethical Hacking/12. Defense in depth.mp4 15.3 MB
    icon [TutsNode.com] - Ethical Hacking Introduction to Ethical Hacking/13. Managing incidents.mp4 16.5 MB
    icon [TutsNode.com] - Ethical Hacking Introduction to Ethical Hacking/14. Exploring security policies.mp4 14.5 MB
    icon [TutsNode.com] - Ethical Hacking Introduction to Ethical Hacking/15. Creating security policies.mp4 7.9 MB
    icon [TutsNode.com] - Ethical Hacking Introduction to Ethical Hacking/16. Components of a security policy.mp4 12.8 MB
    icon [TutsNode.com] - Ethical Hacking Introduction to Ethical Hacking/17. Protecting the data.mp4 12.2 MB
    icon [TutsNode.com] - Ethical Hacking Introduction to Ethical Hacking/18. Standards and regulations.mp4 15.4 MB
    icon [TutsNode.com] - Ethical Hacking Introduction to Ethical Hacking/19. The COBIT framework.mp4 7.8 MB
    icon [TutsNode.com] - Ethical Hacking Introduction to Ethical Hacking/2. What you should know.mp4 2.1 MB
    icon [TutsNode.com] - Ethical Hacking Introduction to Ethical Hacking/20. Exploring the security plan.mp4 17.9 MB
    icon [TutsNode.com] - Ethical Hacking Introduction to Ethical Hacking/21. Creating security policies_2.mp4 9.6 MB
    icon [TutsNode.com] - Ethical Hacking Introduction to Ethical Hacking/22. Recognizing components of a security policy.mp4 14.3 MB
    icon [TutsNode.com] - Ethical Hacking Introduction to Ethical Hacking/23. Challenge- Create a security policy.mp4 2 MB
    icon [TutsNode.com] - Ethical Hacking Introduction to Ethical Hacking/24. Solution- Create a security policy.mp4 14.6 MB
    icon [TutsNode.com] - Ethical Hacking Introduction to Ethical Hacking/25. Understanding vulnerabilities.mp4 13.6 MB
    icon [TutsNode.com] - Ethical Hacking Introduction to Ethical Hacking/26. Penetration testing methodology.mp4 10.9 MB
    icon [TutsNode.com] - Ethical Hacking Introduction to Ethical Hacking/27. Hacking concepts.mp4 10.6 MB
    icon [TutsNode.com] - Ethical Hacking Introduction to Ethical Hacking/28. The human factor in ethical hacking.mp4 9 MB
    icon [TutsNode.com] - Ethical Hacking Introduction to Ethical Hacking/29. Stepping through the hacking phases.mp4 16.5 MB
    icon [TutsNode.com] - Ethical Hacking Introduction to Ethical Hacking/3. Hacking ethically.mp4 3.5 MB
    icon [TutsNode.com] - Ethical Hacking Introduction to Ethical Hacking/30. Next steps.mp4 3.3 MB
    icon [TutsNode.com] - Ethical Hacking Introduction to Ethical Hacking/4. Information security overview.mp4 12.3 MB
    icon [TutsNode.com] - Ethical Hacking Introduction to Ethical Hacking/5. Today's threat landscape.mp4 10.2 MB
    icon [TutsNode.com] - Ethical Hacking Introduction to Ethical Hacking/6. Navigating attack vectors.mp4 18.1 MB
    icon [TutsNode.com] - Ethical Hacking Introduction to Ethical Hacking/7. Comparing attack types.mp4 14.1 MB
    icon [TutsNode.com] - Ethical Hacking Introduction to Ethical Hacking/8. Understanding the Cyber Kill Chain.mp4 12.8 MB
    icon [TutsNode.com] - Ethical Hacking Introduction to Ethical Hacking/9. Challenge- The Cyber Kill Chain.mp4 3.2 MB

Similar Torrents