[ CourseLala.com ] Ethical Hacking - Understanding Ethical Hacking (11 - 2021)


[ CourseLala.com ] Ethical Hacking - Understanding Ethical Hacking (11 - 2021)
Category:
Date:
01/18/22 at 1:44am GMT+1
Submitter:
Seeders:
0
Leechers:
1
File size:
313 MB in 46 files

Torrent Status:
  This torrent has been verified.

Infohash:
b52404f63cf41231c36f4613767ca90a4f48f73d


File list

  • [ CourseLala.com ] Ethical Hacking - Understanding Ethical Hacking (11 - 2021)
  • icon ~Get Your Files Here !/03. Understanding the Attackers and Their Methods/11. Cyber Kill Chain Methodology.mp4 9.5 MB
    icon ~Get Your Files Here !/04. Comparing Hacking and Ethical Hacking/22. So Whats Ethical Hacking.mp4 9.5 MB
    icon ~Get Your Files Here !/05. Describing Information Security Controls/32. The Role of AI and MI.mp4 9.1 MB
    icon ~Get Your Files Here !/02. Classifying Information Security/08. Types of Attacks.mp4 9.1 MB
    icon ~Get Your Files Here !/05. Describing Information Security Controls/25. What Ethical Hackers Do.mp4 8.1 MB
    icon ~Get Your Files Here !/02. Classifying Information Security/07. Understanding Information Security.mp4 7.9 MB
    icon ~Get Your Files Here !/Exercise Files/02/classifying-information-security-slides.pdf 7.8 MB
    icon ~Get Your Files Here !/02. Classifying Information Security/03. CEH Exam Study Tips.mp4 7.4 MB
    icon ~Get Your Files Here !/03. Understanding the Attackers and Their Methods/12. Tactics Techniques and Procedures TTPs.mp4 7.2 MB
    icon ~Get Your Files Here !/05. Describing Information Security Controls/30. Incident Management.mp4 6.6 MB
    icon ~Get Your Files Here !/04. Comparing Hacking and Ethical Hacking/18. Phase 2-Scanning.mp4 6.1 MB
    icon ~Get Your Files Here !/Exercise Files/07/domain-summary-slides.pdf 565.3 KB
    icon ~Get Your Files Here !/Exercise Files/05/describing-information-security-controls-slides.pdf 5.9 MB
    icon ~Get Your Files Here !/05. Describing Information Security Controls/31. The Incident Handling and Response IHR.mp4 5.5 MB
    icon ~Get Your Files Here !/03. Understanding the Attackers and Their Methods/14. Indicators of Compromise IoC.mp4 5.4 MB
    icon ~Get Your Files Here !/05. Describing Information Security Controls/29. Threat Modeling.mp4 5.3 MB
    icon ~Get Your Files Here !/02. Classifying Information Security/04. Ethical Hacking.mp4 5.1 MB
    icon ~Get Your Files Here !/04. Comparing Hacking and Ethical Hacking/23. Lets Talk About Labs.mp4 5 MB
    icon ~Get Your Files Here !/Exercise Files/Study Guide.docx 42.1 KB
    icon ~Get Your Files Here !/02. Classifying Information Security/09. The Technology Triangle.mp4 4.9 MB
    icon ~Get Your Files Here !/05. Describing Information Security Controls/27. The Levels of Defense in Depth.mp4 4.7 MB
    icon ~Get Your Files Here !/01. Course Overview/01. Course Overview.mp4 4.6 MB
    icon ~Get Your Files Here !/07. Domain Summary/38. Domain Summary.mp4 4.6 MB
    icon ~Get Your Files Here !/05. Describing Information Security Controls/33. Can AI and MI Stop Attacks.mp4 4.5 MB
    icon ~Get Your Files Here !/06. Differentiate Information Security Laws and Standards/36. GDPR and DPA.mp4 4.4 MB
    icon ~Get Your Files Here !/02. Classifying Information Security/05. A Little About the CEH Program.mp4 4.4 MB
    icon ~Get Your Files Here !/02. Classifying Information Security/06. Whats Expected of You.mp4 4.1 MB
    icon ~Get Your Files Here !/Bonus Resources.txt 386 B
    icon ~Get Your Files Here !/Exercise Files/03/understanding-the-attackers-and-their-methods-slides.pdf 3.8 MB
    icon ~Get Your Files Here !/04. Comparing Hacking and Ethical Hacking/24. Learning Check.mp4 3.5 MB
    icon ~Get Your Files Here !/05. Describing Information Security Controls/34. Learning Check.mp4 3.5 MB
    icon ~Get Your Files Here !/03. Understanding the Attackers and Their Methods/15. Learning Check.mp4 3.3 MB
    icon ~Get Your Files Here !/04. Comparing Hacking and Ethical Hacking/20. Phase 4-Maintaining Access.mp4 3 MB
    icon ~Get Your Files Here !/06. Differentiate Information Security Laws and Standards/35. The Basics.mp4 20.8 MB
    icon ~Get Your Files Here !/02. Classifying Information Security/10. Learning Check.mp4 2.5 MB
    icon ~Get Your Files Here !/04. Comparing Hacking and Ethical Hacking/21. Phase 5-Clearing Tracks.mp4 2.4 MB
    icon ~Get Your Files Here !/Exercise Files/06/differentiate-information-security-laws-and-standards-slides.pdf 2.3 MB
    icon ~Get Your Files Here !/05. Describing Information Security Controls/28. What Is the Risk.mp4 2.1 MB
    icon ~Get Your Files Here !/04. Comparing Hacking and Ethical Hacking/16. Hacking Concepts.mp4 19.4 MB
    icon ~Get Your Files Here !/04. Comparing Hacking and Ethical Hacking/17. Phase 1-Reconnaissance.mp4 18.4 MB
    icon ~Get Your Files Here !/05. Describing Information Security Controls/26. What Is Defense in Depth.mp4 18.1 MB
    icon ~Get Your Files Here !/02. Classifying Information Security/02. Classifying Information Security.mp4 16.1 MB
    icon ~Get Your Files Here !/06. Differentiate Information Security Laws and Standards/37. Learning Check.mp4 12 MB
    icon ~Get Your Files Here !/Exercise Files/04/comparing-hacking-and-ethical-hacking-slides.pdf 12 MB
    icon ~Get Your Files Here !/03. Understanding the Attackers and Their Methods/13. Adversary Behavioral Identification.mp4 10.7 MB
    icon ~Get Your Files Here !/04. Comparing Hacking and Ethical Hacking/19. Phase 3-Gaining Access.mp4 1.8 MB

Similar Torrents