Torrent details for "Udemy Cyber Security for Absolute Beginners Essential Concepts" Log in to bookmark
Controls:
×
Report Torrent
Please select a reason for reporting this torrent:
Your report will be reviewed by our moderation team.
×
Report Information
Loading report information...
This torrent has been reported 0 times.
Report Summary:
| User | Reason | Date |
|---|
Failed to load report information.
×
Success
Your report has been submitted successfully.
Checked by:
Category:
Language:
English
Total Size:
1.6 GB
Info Hash:
CF8BDB8153C3025C5A3E2F0B30E0B4E0E1BAA3C0
Added By:
Added:
Oct. 23, 2023, 6:20 p.m.
Stats:
|
(Last updated: May 16, 2025, 2:07 p.m.)
| File | Size |
|---|---|
| Get Bonus Downloads Here.url | 182 bytes |
| 1. Welcome to the Course!.mp4 | 22.4 MB |
| 1. Welcome to the Course!.mp4.jpg | 140.2 KB |
| 1. Welcome to the Course!.srt | 6.1 KB |
| 2. Why Learn Cyber Security from Me.mp4 | 14.7 MB |
| 2. Why Learn Cyber Security from Me.srt | 4.0 KB |
| 3. Course Companion Study Guide.mp4 | 15.9 MB |
| 3. Course Companion Study Guide.srt | 1.3 KB |
| 3.1 Course Companion Study Guide.pdf | 2.2 MB |
| 4. Course Case Studies Overview.mp4 | 19.1 MB |
| 4. Course Case Studies Overview.srt | 1.5 KB |
| 5. Familiarizing Yourself with Udemy's Course Taking Interface.mp4 | 62.7 MB |
| 5. Familiarizing Yourself with Udemy's Course Taking Interface.srt | 11.3 KB |
| 6. How to Access Course Subtitles & Transcripts.html | 1.0 KB |
| 7. Join our Facebook Student Community.html | 1.1 KB |
| 8. Udemy Mobile App for iOS & Android - Download & Take Course Videos On the Go!.html | 1.2 KB |
| 9. Student Exercise Introduce Yourself.html | 281 bytes |
| 1. Section Introduction.mp4 | 10.6 MB |
| 1. Section Introduction.srt | 832 bytes |
| 2. Patch Management & Change Management.mp4 | 23.1 MB |
| 2. Patch Management & Change Management.srt | 6.9 KB |
| 3. Incident Response.mp4 | 30.2 MB |
| 3. Incident Response.srt | 8.8 KB |
| 4. Application Development Security.mp4 | 31.1 MB |
| 4. Application Development Security.srt | 8.3 KB |
| 5. Security Assessments.mp4 | 18.8 MB |
| 5. Security Assessments.srt | 5.7 KB |
| 6. Risk Management Program.mp4 | 28.8 MB |
| 6. Risk Management Program.srt | 7.7 KB |
| 7. Personnel Policies.mp4 | 20.9 MB |
| 7. Personnel Policies.srt | 6.9 KB |
| 8. Training, Eduation and Awareness.mp4 | 21.6 MB |
| 8. Training, Eduation and Awareness.srt | 7.2 KB |
| 1. Congratulations.mp4 | 20.2 MB |
| 1. Congratulations.srt | 1.7 KB |
| 2. How to Download Your Udemy Course Certificate of Completion.html | 659 bytes |
| 1. Section Introduction.mp4 | 10.7 MB |
| 1. Section Introduction.srt | 756 bytes |
| 2. What is Cyber Security.mp4 | 24.4 MB |
| 2. What is Cyber Security.srt | 4.7 KB |
| 3. Why Do We Need Cyber Security.mp4 | 23.3 MB |
| 3. Why Do We Need Cyber Security.srt | 7.7 KB |
| 4. The Current State of Cybersecurity in 2021 & 2022.mp4 | 55.7 MB |
| 4. The Current State of Cybersecurity in 2021 & 2022.srt | 9.6 KB |
| 1. Section Introduction.mp4 | 12.8 MB |
| 1. Section Introduction.srt | 1.1 KB |
| 2. What Hacking Isn’t.mp4 | 40.2 MB |
| 2. What Hacking Isn’t.srt | 3.1 KB |
| 3. Types of Hackers.mp4 | 10.5 MB |
| 3. Types of Hackers.srt | 3.5 KB |
| 4. Hacker Motivations.mp4 | 18.0 MB |
| 4. Hacker Motivations.srt | 5.5 KB |
| 5. The Hacking Methodology.mp4 | 23.6 MB |
| 5. The Hacking Methodology.srt | 11.2 KB |
| 1. Section Introduction.mp4 | 20.2 MB |
| 1. Section Introduction.srt | 1.8 KB |
| 10. Student Exercise 2 Identifying your MAC and IP Address (Windows and Mac OS).mp4 | 34.1 MB |
| 10. Student Exercise 2 Identifying your MAC and IP Address (Windows and Mac OS).srt | 5.7 KB |
| 2. What is a Computer Network.mp4 | 8.4 MB |
| 2. What is a Computer Network.srt | 2.9 KB |
| 3. Some Basic Networking Rules.mp4 | 9.4 MB |
| 3. Some Basic Networking Rules.srt | 3.0 KB |
| 4. Computer Protocols.mp4 | 12.5 MB |
| 4. Computer Protocols.srt | 4.2 KB |
| 5. LANs versus WANs.mp4 | 18.3 MB |
| 5. LANs versus WANs.srt | 5.7 KB |
| 6. MAC versus IP Addresses.mp4 | 16.9 MB |
| 6. MAC versus IP Addresses.srt | 4.9 KB |
| 7. Switches versus Routers.mp4 | 27.8 MB |
| 7. Switches versus Routers.srt | 8.0 KB |
| 8. TCPIP Protocol Suite.mp4 | 21.2 MB |
| 8. TCPIP Protocol Suite.srt | 5.5 KB |
| 9. How the Internet Works (Simplified).mp4 | 26.8 MB |
| 9. How the Internet Works (Simplified).srt | 6.2 KB |
| 1. Section Introduction.mp4 | 7.9 MB |
| 1. Section Introduction.srt | 687 bytes |
| 2. Viruses and Worms.mp4 | 20.2 MB |
| 2. Viruses and Worms.srt | 6.0 KB |
| 3. Trojan Horses and Logic Bombs.mp4 | 14.0 MB |
| 3. Trojan Horses and Logic Bombs.srt | 4.9 KB |
| 4. Spyware and Adware.mp4 | 11.0 MB |
| 4. Spyware and Adware.srt | 4.3 KB |
| 5. Ransomware and Rootkits.mp4 | 28.5 MB |
| 5. Ransomware and Rootkits.srt | 6.3 KB |
| 6. How Hackers Deploy Malware.mp4 | 20.4 MB |
| 6. How Hackers Deploy Malware.srt | 5.4 KB |
| 7. Case Study Colonial Pipeline.html | 2.5 KB |
| 1. Section Introduction.mp4 | 10.0 MB |
| 1. Section Introduction.srt | 877 bytes |
| 2. Zero-Day Attacks.mp4 | 15.1 MB |
| 2. Zero-Day Attacks.srt | 4.0 KB |
| 3. Buffer Overflows.mp4 | 23.7 MB |
| 3. Buffer Overflows.srt | 6.7 KB |
| 4. Protocol Spoofing.mp4 | 31.1 MB |
| 4. Protocol Spoofing.srt | 10.8 KB |
| 5. DoS and DDoS Attacks.mp4 | 15.5 MB |
| 5. DoS and DDoS Attacks.srt | 4.8 KB |
| 6. Weak Encryption Key & Software Vulnerability Attacks.mp4 | 20.9 MB |
| 6. Weak Encryption Key & Software Vulnerability Attacks.srt | 5.6 KB |
| 7. Web-Based Attacks.mp4 | 23.5 MB |
| 7. Web-Based Attacks.srt | 8.0 KB |
| 8. Evil Twin and Rogue Access Points.mp4 | 26.7 MB |
| 8. Evil Twin and Rogue Access Points.srt | 7.1 KB |
| 9. Case Study TJX Companies Inc. (TJX).html | 2.0 KB |
| 1. Section Introduction.mp4 | 9.8 MB |
| 1. Section Introduction.srt | 964 bytes |
| 2. Social Engineering Attacks.mp4 | 21.8 MB |
| 2. Social Engineering Attacks.srt | 6.6 KB |
| 3. Social Engineering Scenarios Overview.mp4 | 26.5 MB |
| 3. Social Engineering Scenarios Overview.srt | 2.3 KB |
| 4. Social Engineering Phone Call Example #1.mp4 | 30.0 MB |
| 4. Social Engineering Phone Call Example #1.srt | 2.4 KB |
| 5. Social Engineering Phone Call Example #2.mp4 | 35.3 MB |
| 5. Social Engineering Phone Call Example #2.srt | 2.5 KB |
| 6. Email Spam, Spoofing, Phishing, and Pharming.mp4 | 45.7 MB |
| 6. Email Spam, Spoofing, Phishing, and Pharming.srt | 13.0 KB |
| 1. Section Introduction.mp4 | 13.2 MB |
| 1. Section Introduction.srt | 1.1 KB |
| 2. The CIA Triad.mp4 | 19.2 MB |
| 2. The CIA Triad.srt | 7.6 KB |
| 3. Defense in Depth.mp4 | 8.1 MB |
| 3. Defense in Depth.srt | 3.0 KB |
| 4. Least Privilege.mp4 | 14.6 MB |
| 4. Least Privilege.srt | 6.0 KB |
| 5. Risk Management.mp4 | 80.4 MB |
| 5. Risk Management.srt | 27.2 KB |
| 1. Section Introduction.mp4 | 13.6 MB |
| 1. Section Introduction.srt | 1.0 KB |
| 10. Virtual Private Network (VPN).mp4 | 19.6 MB |
| 10. Virtual Private Network (VPN).srt | 5.5 KB |
| 11. Wireless Networking Security.mp4 | 31.0 MB |
| 11. Wireless Networking Security.srt | 8.1 KB |
| 12. Student Exercise #3 Exploring the Built-In Firewall (Windows and Mac OS).mp4 | 49.6 MB |
| 12. Student Exercise #3 Exploring the Built-In Firewall (Windows and Mac OS).srt | 8.8 KB |
| 2. Multi-Factor Authentication.mp4 | 15.1 MB |
| 2. Multi-Factor Authentication.srt | 5.5 KB |
| 3. Password Best Practices.mp4 | 21.0 MB |
| 3. Password Best Practices.srt | 7.5 KB |
| 4. Endpoint Protection.mp4 | 19.1 MB |
| 4. Endpoint Protection.srt | 6.3 KB |
| 5. Encryption.mp4 | 30.2 MB |
| 5. Encryption.srt | 8.6 KB |
| 6. Firewalls.mp4 | 24.8 MB |
| 6. Firewalls.srt | 7.2 KB |
| 7. Intrusion Detection & Prevention Systems (IDSIPS).mp4 | 22.7 MB |
| 7. Intrusion Detection & Prevention Systems (IDSIPS).srt | 6.1 KB |
| 8. Utilizing a Network DMZ.mp4 | 18.7 MB |
| 8. Utilizing a Network DMZ.srt | 5.3 KB |
| 9. Honeypot Decoys.mp4 | 7.8 MB |
| 9. Honeypot Decoys.srt | 2.1 KB |
| Bonus Resources.txt | 386 bytes |
Name
DL
Uploader
Size
S/L
Added
-
333.6 MB
[12
/
6]
2023-10-24
| Uploaded by freecoursewb | Size 333.6 MB | Health [ 12 /6 ] | Added 2023-10-24 |
-
690.1 MB
[0
/
2]
2023-10-23
| Uploaded by freecoursewb | Size 690.1 MB | Health [ 0 /2 ] | Added 2023-10-23 |
-
897.2 MB
[14
/
8]
2023-10-23
| Uploaded by freecoursewb | Size 897.2 MB | Health [ 14 /8 ] | Added 2023-10-23 |
-
2.9 GB
[39
/
39]
2023-10-23
| Uploaded by freecoursewb | Size 2.9 GB | Health [ 39 /39 ] | Added 2023-10-23 |
NOTE
SOURCE: Udemy Cyber Security for Absolute Beginners Essential Concepts
-----------------------------------------------------------------------------------
COVER

-----------------------------------------------------------------------------------
MEDIAINFO
None
×



