首页
磁力链接怎么用
한국어
English
日本語
简体中文
繁體中文
[FreeAllCourse.Com] Udemy - Hacking in Practice Certified Ethical Hacking MEGA Course
文件类型
收录时间
最后活跃
资源热度
文件大小
文件数量
视频
2021-4-20 03:59
2024-12-27 01:47
217
4.73 GB
209
磁力链接
magnet:?xt=urn:btih:f9a76b3330f136f3d27ceaf9507ff46d71cd13dd
迅雷链接
thunder://QUFtYWduZXQ6P3h0PXVybjpidGloOmY5YTc2YjMzMzBmMTM2ZjNkMjdjZWFmOTUwN2ZmNDZkNzFjZDEzZGRaWg==
二维码链接
种子下载(838888不存储任何种子文件)
种子下载线路1(迅雷)--推荐
种子下载线路2(比特彗星)
种子下载线路3(torcache)
3条线路均为国内外知名下载网站种子链接,内容跟本站无关!
相关链接
FreeAllCourse
Com
Udemy
-
Hacking
in
Practice
Certified
Ethical
Hacking
MEGA
Course
文件列表
01 Lets start/003 Course preview 15 min. long demo lecture. The whole training is 27 hours long.mp4
213.49MB
02 Application Security/005 Introduction to Application Security.mp4
21.26MB
02 Application Security/006 Attacks on applications.mp4
25.5MB
02 Application Security/007 SQL Injection.mp4
17.96MB
02 Application Security/008 EXERCISE Analyze the application.mp4
28.74MB
02 Application Security/009 Blind SQL Injection.mp4
22.47MB
02 Application Security/010 Automated SQL Injection.mp4
29.48MB
02 Application Security/011 Cross-site scripting - XSS.mp4
29.1MB
02 Application Security/013 Program security assessment.mp4
12.15MB
02 Application Security/014 Unsafe applications.mp4
24.95MB
03 Introduction to Cyber Threats/016 Introduction to Current Cyber Threats.mp4
20.46MB
03 Introduction to Cyber Threats/017 IT Prehistory.mp4
25.8MB
03 Introduction to Cyber Threats/018 Lets look a few years back.mp4
23.63MB
03 Introduction to Cyber Threats/019 Cyber crimes - an evolution not revolution.mp4
21.26MB
04 Popular IT Security Myths/021 Popular myths about IT security - origins.mp4
27.92MB
04 Popular IT Security Myths/022 Myths 1 - youll never be hacked.mp4
29.18MB
04 Popular IT Security Myths/023 Myths 2 - you dont need any protection software or hardware.mp4
25.77MB
04 Popular IT Security Myths/024 Myths 3 - IT security is always a priority.mp4
6MB
05 IT Security Trends/026 Trends in IT Security.mp4
18.7MB
05 IT Security Trends/027 The birth of technology society.mp4
18.58MB
05 IT Security Trends/028 EXERCISE How much info can you gather.mp4
13.78MB
05 IT Security Trends/029 Fake identity.mp4
21.76MB
05 IT Security Trends/030 Online privacy.mp4
32.04MB
05 IT Security Trends/031 Analyzing sniffing software.mp4
19.5MB
05 IT Security Trends/032 Cyber War.mp4
45.4MB
06 Data Security/034 Objective 1 - Data security - Introduction.mp4
38.83MB
06 Data Security/035 Integrity of data.mp4
32.11MB
06 Data Security/037 Confidentiality of data.mp4
31.65MB
06 Data Security/038 EXERCISE Finding confidential data with search engines.mp4
23.49MB
07 Computer Network Security/039 Network security - introduction.mp4
22.04MB
07 Computer Network Security/040 OSI MODEL 1 - Physical layer.mp4
28.95MB
07 Computer Network Security/041 OSI MODEL 2 - Data link layer.mp4
22.75MB
07 Computer Network Security/042 Threats MAC spoofing.mp4
27.46MB
07 Computer Network Security/043 Threats ARP Poisoning.mp4
31.29MB
07 Computer Network Security/044 EXERCISE Data Link Layer Attack.mp4
35.27MB
07 Computer Network Security/045 OSI MODEL 3 - Network layer.mp4
31.7MB
07 Computer Network Security/046 TCP Tunnelling over ICMP.mp4
34.99MB
07 Computer Network Security/048 OSI MODEL 4 - Transport Layer.mp4
28.63MB
07 Computer Network Security/049 Threats Enumerating Remote Computers.mp4
16.81MB
07 Computer Network Security/050 EXERCISE Transport Layer Attack using METASPLOIT part 1.mp4
12.84MB
07 Computer Network Security/051 EXERCISE Transport Layer Attack using METASPLOIT part 2.mp4
26.08MB
07 Computer Network Security/052 OSI MODEL 5 - Session Layer.mp4
16.38MB
07 Computer Network Security/054 OSI MODEL 6 - Presentation Layer.mp4
37.43MB
07 Computer Network Security/055 OSI MODEL 7 - Application Layer.mp4
16.92MB
07 Computer Network Security/056 EXERCISE Application Layer Attacks.mp4
18.99MB
07 Computer Network Security/057 Backtrack Attack Demonstration.mp4
15.59MB
07 Computer Network Security/058 Man-in-the-Middle and Denial of Service Attacks.mp4
14.2MB
07 Computer Network Security/059 Modifying Transmitted Packets.mp4
26.76MB
07 Computer Network Security/060 Unencrypted protocols.mp4
13.64MB
08 Designing Secure Computer Networks/062 Designing Computer Networks - introduction.mp4
10.93MB
08 Designing Secure Computer Networks/063 Subnetting IPv4.mp4
29.12MB
08 Designing Secure Computer Networks/064 Subnetting IPv6.mp4
17.45MB
08 Designing Secure Computer Networks/066 IPv6 address notation.mp4
27.31MB
08 Designing Secure Computer Networks/067 DMZ demilitarized Zone.mp4
30.28MB
08 Designing Secure Computer Networks/068 Protocols and services IP SEC.mp4
43.74MB
08 Designing Secure Computer Networks/069 IP SEC Phase 1.mp4
21.71MB
08 Designing Secure Computer Networks/070 Network Address translation.mp4
52.64MB
08 Designing Secure Computer Networks/071 Network access control RADIUS.mp4
48.43MB
09 Network administration/073 Introduction to Monitoring Transmitted Data.mp4
6.18MB
09 Network administration/074 Monitoring Transmitted Data - Basic informations.mp4
41.07MB
09 Network administration/075 Intrusion detection systems.mp4
38.23MB
09 Network administration/076 Why are firewalls and NDIS not enough.mp4
28.19MB
09 Network administration/077 Wireshark - Introduction to network analysis.mp4
30.65MB
09 Network administration/078 How to use Wireshark.mp4
43.55MB
09 Network administration/079 Analyzing Captured data.mp4
31.01MB
09 Network administration/080 How to analyze telnet protocol.mp4
37.99MB
09 Network administration/081 Intrusion detection.mp4
46.35MB
09 Network administration/082 Scanning computers.mp4
35.27MB
10 Wireless Networks Security/084 Wireless Networks.mp4
6.96MB
10 Wireless Networks Security/085 WIFI security solutions - introduction.mp4
29.17MB
10 Wireless Networks Security/086 WIFI - working principles.mp4
29.36MB
10 Wireless Networks Security/087 Other wireless technologies.mp4
13.16MB
10 Wireless Networks Security/088 Threats and risks.mp4
18.49MB
10 Wireless Networks Security/089 Ineffective solutions.mp4
18.98MB
10 Wireless Networks Security/090 Authentication methods.mp4
37.13MB
10 Wireless Networks Security/091 802.11 WEP.mp4
31.39MB
10 Wireless Networks Security/092 802.11I WPA.mp4
31.59MB
10 Wireless Networks Security/094 Threats of WIFI networks.mp4
30.54MB
10 Wireless Networks Security/095 Client Attacks Launching a rogue access point.mp4
33.57MB
10 Wireless Networks Security/096 Client Attacks Evil twin.mp4
22.76MB
10 Wireless Networks Security/097 Client Attacks Denial of service.mp4
36.52MB
10 Wireless Networks Security/098 EXERCISE WPA attack.mp4
8.86MB
11 Operating Systems Security/100 Operating systems security - introduction.mp4
48.07MB
11 Operating Systems Security/101 Security boundaries.mp4
21.2MB
11 Operating Systems Security/102 Three core.mp4
29.75MB
11 Operating Systems Security/103 EXERCISE OS boundaries.mp4
39.1MB
11 Operating Systems Security/104 Process isolation.mp4
26.85MB
11 Operating Systems Security/105 Kernel Mode Code Signing.mp4
25.68MB
11 Operating Systems Security/106 Java Virtual Machine and code access security.mp4
18.64MB
11 Operating Systems Security/108 Malware.mp4
44.86MB
11 Operating Systems Security/109 EXERCISE Vulnerability attacks.mp4
47.61MB
11 Operating Systems Security/110 EXERCISE Identifying suspicious processes.mp4
29.97MB
11 Operating Systems Security/111 Demonstration Process Explorer.mp4
38.13MB
11 Operating Systems Security/112 EXERCISE Removing malware.mp4
45.85MB
11 Operating Systems Security/113 Rootkits.mp4
28.94MB
11 Operating Systems Security/114 EXERCISE Detecting rootkits.mp4
58.29MB
11 Operating Systems Security/115 EXERCISE Security evaluation.mp4
17.82MB
12 Access Control/117 Authentication and authorisation - Introduction.mp4
9.63MB
12 Access Control/118 Authentication users.mp4
31.37MB
12 Access Control/119 How secure is your password.mp4
15.97MB
12 Access Control/120 Authentication protocols and services.mp4
31.82MB
12 Access Control/122 LM Hash.mp4
30.7MB
12 Access Control/123 Cached Credentials.mp4
18.08MB
12 Access Control/124 KERBEROS.mp4
52.56MB
12 Access Control/125 Identity Theft.mp4
42.95MB
12 Access Control/126 EXERCISE Offline attacks.mp4
45.63MB
12 Access Control/127 Using online cracking services.mp4
37.65MB
13 Windows Security/129 Windows Security - what youll learn.mp4
7.59MB
13 Windows Security/130 User Account Control.mp4
32.01MB
13 Windows Security/131 UAC configuration.mp4
35.1MB
13 Windows Security/132 Additional Security Features - ASLR and DEP.mp4
40.91MB
13 Windows Security/133 PatchGuard.mp4
7.86MB
13 Windows Security/135 Encryption - key protection.mp4
46.34MB
13 Windows Security/136 Drive encryption.mp4
37.33MB
13 Windows Security/137 BitLocker.mp4
36.43MB
13 Windows Security/138 BitLocker To Go Reader.mp4
18.44MB
13 Windows Security/139 File and folder encryption - EFS.mp4
34.52MB
13 Windows Security/140 EXERCISE EFS.mp4
15.35MB
14 Security Policies/142 Security policies introduction.mp4
5.87MB
14 Security Policies/143 What is security.mp4
10.89MB
14 Security Policies/144 Information security.mp4
10.26MB
14 Security Policies/145 Information security - level up.mp4
9.87MB
14 Security Policies/146 Security issues.mp4
12.84MB
14 Security Policies/147 Why are security solutions fallible.mp4
15.48MB
14 Security Policies/148 Security policy issues.mp4
12.6MB
14 Security Policies/149 Introduction to threat modelling and classification.mp4
13.3MB
14 Security Policies/150 Threat modelling - STRIDE.mp4
10.58MB
14 Security Policies/151 STRIDE Spoofing identity.mp4
13.84MB
14 Security Policies/152 STRIDE Tampering with Data.mp4
12.84MB
14 Security Policies/153 STRIDE Denial of Service.mp4
10.39MB
15 Risk Management/154 Introduction to Risk Management.mp4
3.87MB
15 Risk Management/155 Attack methods.mp4
17.28MB
15 Risk Management/156 Local attacks.mp4
7.88MB
15 Risk Management/157 Target scanning and enumeration techniques 1.mp4
15.84MB
15 Risk Management/158 Target scanning and enumeration techniques 2.mp4
8.4MB
15 Risk Management/159 Passive scanning.mp4
7.13MB
15 Risk Management/161 Introduction to risk assessment.mp4
18.15MB
15 Risk Management/162 DREAD Risk assessment model.mp4
12.64MB
15 Risk Management/163 DREAD Exploitability.mp4
13.9MB
15 Risk Management/164 EXERCISE Risk Assessment.mp4
18.11MB
15 Risk Management/166 Introduction to Social Engineering and rogue software.mp4
11.41MB
15 Risk Management/167 Manipulation tactics.mp4
22.17MB
15 Risk Management/168 EXERCISE Social Engineering attacks.mp4
19.02MB
15 Risk Management/169 SE with KALI BackTrack.mp4
16.16MB
15 Risk Management/170 Rogue Software.mp4
7.37MB
15 Risk Management/171 Fraud tools 1.mp4
20.02MB
15 Risk Management/172 Fraud tools 2.mp4
17.72MB
16 Defence in Depth/174 Introduction to Defence in Depth.mp4
4.54MB
16 Defence in Depth/175 How to use Defence in Depth model.mp4
14.67MB
16 Defence in Depth/176 DiD OS and LAN Layers.mp4
16.13MB
16 Defence in Depth/177 DiD Perimeter and Physical Access Layers.mp4
12.92MB
16 Defence in Depth/178 DiD Demonstration.mp4
6.98MB
16 Defence in Depth/179 Automated attack targeting a service.mp4
15.14MB
16 Defence in Depth/180 Automated user-targeting attack.mp4
13.43MB
16 Defence in Depth/182 Introduction to Immutable laws of security - Law 1.mp4
13.99MB
16 Defence in Depth/183 Law 2.mp4
7.58MB
16 Defence in Depth/184 Law 3.mp4
5.86MB
16 Defence in Depth/185 Law 4.mp4
5.96MB
16 Defence in Depth/186 Law 5.mp4
8.81MB
16 Defence in Depth/187 Law 6.mp4
5.82MB
16 Defence in Depth/188 Law 7.mp4
2.9MB
16 Defence in Depth/189 Law 8.mp4
4.59MB
16 Defence in Depth/190 Law 9.mp4
9.23MB
16 Defence in Depth/191 Law 10.mp4
1.96MB
16 Defence in Depth/192 Laws for administrators.mp4
13.86MB
17 Disaster Recovery/194 Introduction to Disaster Recovery.mp4
4.36MB
17 Disaster Recovery/195 How to reduce losses.mp4
14.85MB
17 Disaster Recovery/196 Ensuring continous availability.mp4
10.78MB
17 Disaster Recovery/197 Threat discovery 1.mp4
12.28MB
17 Disaster Recovery/198 Threat discovery 2.mp4
8.84MB
17 Disaster Recovery/199 Audit users and keep control accounts.mp4
13.3MB
17 Disaster Recovery/200 High risk users.mp4
7.92MB
17 Disaster Recovery/201 Collecting and analysing evidence.mp4
18.29MB
17 Disaster Recovery/202 Forensics example.mp4
10.61MB
17 Disaster Recovery/203 CONFICKER CASE STUDY.mp4
20.02MB
18 Application Security - Configuration and Management/205 Heres what youll learn in this module.mp4
3.1MB
18 Application Security - Configuration and Management/206 Managing applications.mp4
17.21MB
18 Application Security - Configuration and Management/207 Software updates.mp4
6.22MB
18 Application Security - Configuration and Management/208 MS Update.mp4
16.24MB
18 Application Security - Configuration and Management/209 System Center Configuration Manager.mp4
6.27MB
18 Application Security - Configuration and Management/210 Blocking applications.mp4
17.98MB
18 Application Security - Configuration and Management/211 Software restrictions policies.mp4
14.49MB
18 Application Security - Configuration and Management/212 EXERCISE Application control rules.mp4
27.19MB
18 Application Security - Configuration and Management/213 Isolating applications.mp4
16.88MB
19 Cryptography/215 Introduction to cryptography.mp4
23.58MB
19 Cryptography/216 History of ciphers.mp4
25.5MB
19 Cryptography/217 Symmetric and asymmetric ciphers.mp4
15.06MB
19 Cryptography/218 Symmetric-key algorithms.mp4
13.51MB
19 Cryptography/219 Block ciphers.mp4
15.35MB
19 Cryptography/220 Data encryption standard.mp4
16.54MB
19 Cryptography/221 DES-X.mp4
18.22MB
19 Cryptography/222 Advanced encryption standards.mp4
12.83MB
19 Cryptography/223 Block cipher modes.mp4
17.49MB
19 Cryptography/224 Stream Ciphers - RC4.mp4
8.59MB
19 Cryptography/225 Asymmetric-key algorithms.mp4
19.08MB
19 Cryptography/226 RSA.mp4
12.83MB
19 Cryptography/227 ELGAMAL.mp4
4.9MB
19 Cryptography/228 HASH functions.mp4
14.43MB
19 Cryptography/229 Digital signature.mp4
15.45MB
19 Cryptography/230 Hybrid Schemes.mp4
16.06MB
20 Public Key Infrastructure/232 Introduction to cryptology.mp4
5.98MB
20 Public Key Infrastructure/233 Public key infrastructure.mp4
14.8MB
20 Public Key Infrastructure/234 Implementing public key infrastructure.mp4
12.74MB
20 Public Key Infrastructure/235 What will PKI allow you.mp4
14.46MB
20 Public Key Infrastructure/236 EXERCISE Certificates.mp4
20.63MB
20 Public Key Infrastructure/237 Planning the PKI.mp4
22.55MB
20 Public Key Infrastructure/238 Certificate life cycle.mp4
16.19MB
20 Public Key Infrastructure/239 PKI Administration.mp4
19.69MB
23 Rootkits and Stealth Apps Creating and Revealing v2.0 (course preview)/243 Wiriting a Shellcode.mp4
179.9MB
友情提示
不会用的朋友看这里 把磁力链接复制到离线下载,或者bt下载软件里即可下载文件,或者直接复制迅雷链接到迅雷里下载! 亲,你造吗?将网页分享给您的基友,下载的人越多速度越快哦!
违规内容投诉邮箱:
[email protected]
概述 838888磁力搜索是一个磁力链接搜索引擎,是学术研究的副产品,用于解决资源过度分散的问题 它通过BitTorrent协议加入DHT网络,实时的自动采集数据,仅存储文件的标题、大小、文件列表、文件标识符(磁力链接)等基础信息 838888磁力搜索不下载任何真实资源,无法判断资源的合法性及真实性,使用838888磁力搜索服务的用户需自行鉴别内容的真伪 838888磁力搜索不上传任何资源,不提供Tracker服务,不提供种子文件的下载,这意味着838888磁力搜索 838888磁力搜索是一个完全合法的系统