Torrent details for "Udemy Byte Sized Cyber Security Fundamentals" Log in to bookmark
Controls:
×
Report Torrent
Please select a reason for reporting this torrent:
Your report will be reviewed by our moderation team.
×
Report Information
Loading report information...
This torrent has been reported 0 times.
Report Summary:
| User | Reason | Date |
|---|
Failed to load report information.
×
Success
Your report has been submitted successfully.
Checked by:
Category:
Language:
English
Total Size:
2.9 GB
Info Hash:
D5572D0005A23C0846886620ED10C2CAD0C4A5B8
Added By:
Added:
Sept. 25, 2025, 11:30 p.m.
Stats:
|
(Last updated: Oct. 7, 2025, 10:34 a.m.)
| File | Size |
|---|---|
| Get Bonus Downloads Here.url | 180 bytes |
| 1 - Cybersecurity-Fundamentals.pdf | 808.2 KB |
| 1 - Lock It Down Test Your Cybersecurity Knowledge.html | 495 bytes |
| 1 - What is Cybersecurity.mp4 | 19.6 MB |
| 2 - Introduction.mp4 | 19.6 MB |
| 3 - Threat Actors Motivations.mp4 | 31.0 MB |
| 4 - The CIA Triad Protecting Data with Confidentiality Integrity Availability.mp4 | 34.7 MB |
| 5 - Common Cyber Attack Types Know Your Enemies.mp4 | 34.0 MB |
| 6 - Security Controls Technical Physical Administrative Layers.mp4 | 13.9 MB |
| 7 - The Kill Chain MITRE ATTCK Mapping Cyberattack Tactics.mp4 | 29.9 MB |
| 8 - Types of Cyber Attacks.mp4 | 23.0 MB |
| 10 - Understanding Scripts.html | 111 bytes |
| 63 - Scripting-Automation-Beginner-Level.pdf | 673.2 KB |
| 63 - What is a Script.mp4 | 24.5 MB |
| 64 - Basic Bash PowerShell Concepts.mp4 | 22.4 MB |
| 65 - Automating Recon or Scanning.mp4 | 26.2 MB |
| 66 - Getting Started with Your First Script.mp4 | 30.5 MB |
| 67 - Why Learn Python for Cybersecurity.mp4 | 15.5 MB |
| 68 - Tools of the Trade.mp4 | 17.2 MB |
| 69 - Bash Script Demo.mp4 | 38.0 MB |
| 11 - Cybersecurity Reconnaissance Intelligence Fundamentals Quiz.html | 223 bytes |
| 70 - OSINT-Resources.pdf | 371.8 KB |
| 70 - Passive vs Active Reconnaissance.mp4 | 5.8 MB |
| 70 - Reconnaissance-Intelligence-Gathering.pdf | 695.8 KB |
| 71 - WHOIS nslookup Shodan theHarvester Reconng.mp4 | 14.4 MB |
| 72 - Social Engineering Basics.mp4 | 7.7 MB |
| 73 - OSINT Open Source Intelligence.mp4 | 5.2 MB |
| 74 - More Tools of the Trade.mp4 | 12.8 MB |
| 75 - theHarvester Demo.mp4 | 54.2 MB |
| 12 - Scanning Enumeration and Vulnerability Management Quiz.html | 199 bytes |
| 76 - NMAP-commands.pdf | 95.2 KB |
| 76 - Scanning Enumeration.mp4 | 5.9 MB |
| 76 - Scanning-Enumeration.pdf | 513.6 KB |
| 77 - Port Scanning Banner Grabbing.mp4 | 6.4 MB |
| 78 - Common Scanning Tools Explained.mp4 | 8.4 MB |
| 79 - Vulnerability Scanning vs Manual Discovery.mp4 | 7.2 MB |
| 80 - Understanding CVEs The Vulnerability Playbook.mp4 | 17.7 MB |
| 81 - nmap demo.mp4 | 28.6 MB |
| 13 - Cybersecurity Exploitation Fundamentals Quiz.html | 190 bytes |
| 82 - What Is an Exploit.mp4 | 7.1 MB |
| 83 - Exploit vs Vulnerability.mp4 | 10.9 MB |
| 84 - The Ethical Hacking Process.mp4 | 20.8 MB |
| 85 - Tools Metasploit SQLmap John the Ripper Hydra.mp4 | 8.7 MB |
| 86 - Common Vulnerabilities Examples.mp4 | 8.7 MB |
| 87 - PostExploitation Essentials.mp4 | 11.1 MB |
| 88 - PostExploitation Essentials.mp4 | 11.2 MB |
| 89 - SQLMap Demo.mp4 | 29.0 MB |
| 14 - Web Application Security OWASP Fundamentals Quiz.html | 169 bytes |
| 90 - Web-Application-Attacks.pdf | 546.1 KB |
| 90 - What is OWASP.mp4 | 10.6 MB |
| 91 - OWASP Top 10 Simplified.mp4 | 20.5 MB |
| 92 - Tools Burp Suite OWASP ZAP.mp4 | 15.8 MB |
| 93 - Cookie Tampering Input Validation.mp4 | 16.6 MB |
| 94 - CrossSite Request Forgery CSRF.mp4 | 10.5 MB |
| 95 - OWASP ZAP Lab.mp4 | 61.1 MB |
| 100 - BYOD Work Phones.mp4 | 12.0 MB |
| 15 - Mobile Security Threats Best Practices Quiz.html | 195 bytes |
| 96 - Mobile-Security.pdf | 486.1 KB |
| 96 - Why Mobile Security Matters.mp4 | 12.3 MB |
| 97 - Common Mobile Threats.mp4 | 18.6 MB |
| 98 - Simple Steps to Stay Safe.mp4 | 20.7 MB |
| 99 - Spot the Signs of Trouble.mp4 | 15.1 MB |
| 101 - Cloud-Security-Fundamentals.pdf | 491.0 KB |
| 101 - What Is Cloud Computing.mp4 | 12.3 MB |
| 102 - Cloud Security Basics.mp4 | 18.7 MB |
| 103 - The Shared Responsibility Model.mp4 | 20.7 MB |
| 104 - Common Cloud Threats.mp4 | 15.1 MB |
| 105 - Best Practices for Cloud Security.mp4 | 12.0 MB |
| 16 - Cloud Security Principles Threats Quiz.html | 190 bytes |
| 106 - Wireless Standards Weaknesses.mp4 | 11.4 MB |
| 106 - Wireless-Attacks.pdf | 669.3 KB |
| 107 - Cracking WiFi with Aircrackng.mp4 | 7.9 MB |
| 108 - Evil Twin Attacks.mp4 | 6.4 MB |
| 109 - Deauthentication Deauth Attacks.mp4 | 14.9 MB |
| 110 - Tools of the Trade.mp4 | 12.6 MB |
| 17 - Wireless Network Security Attack Methods Quiz.html | 144 bytes |
| 111 - Post-Exploitation-Privilege-Escalation.pdf | 512.0 KB |
| 111 - What to Do After Access.mp4 | 10.4 MB |
| 112 - Windows vs Linux Privilege Escalation PrivEsc.mp4 | 10.1 MB |
| 113 - Mimikatz PowerView LinPEAS.mp4 | 5.9 MB |
| 114 - Honeypots Honeytokens Fake Asset.mp4 | 15.9 MB |
| 115 - Cowrei Demo.mp4 | 18.2 MB |
| 18 - PostExploitation Techniques Tools Quiz.html | 203 bytes |
| 116 - Reporting-Communication.pdf | 396.5 KB |
| 116 - Writing a Clear PenTest Report.mp4 | 8.7 MB |
| 117 - Risk Ratings Explained Simply.mp4 | 5.9 MB |
| 118 - Presenting to NonTechnical Stakeholders.mp4 | 6.4 MB |
| 119 - Provide Detailed Technical Info.mp4 | 8.9 MB |
| 19 - Effective Cybersecurity Reporting Communication Quiz.html | 218 bytes |
| 10 - The Key Components Inside a Computer.mp4 | 17.0 MB |
| 11 - How the OS Manages Processes Resources.mp4 | 17.7 MB |
| 12 - User Accounts Admins Permissions.mp4 | 19.3 MB |
| 13 - Why It Matters to Cybersecurity.mp4 | 14.2 MB |
| 14 - Build A PC.mp4 | 143.0 MB |
| 15 - BIOS Simulation.mp4 | 30.6 MB |
| 16 - What is a Virtual Machine.mp4 | 59.0 MB |
| 2 - Decoding Your Desktop A Guide to the Machine Within.html | 77 bytes |
| 9 - Beyond-the-Screen-Inside-Your-Machine.pdf | 808.4 KB |
| 9 - What Happens When You Power On.mp4 | 10.8 MB |
| 120 - Incident-Response-Forensics-Basics.pdf | 379.2 KB |
| 120 - What Is Incident Response.mp4 | 21.9 MB |
| 121 - The 6 Phases of Incident Response.mp4 | 15.9 MB |
| 122 - What Is Digital Forensics.mp4 | 17.3 MB |
| 123 - Common Forensics Techniques.mp4 | 18.1 MB |
| 124 - Best Practices RealWorld Tips.mp4 | 16.5 MB |
| 125 - Tools of the trade.mp4 | 11.3 MB |
| 20 - Incident Response Digital Forensics Fundamentals Quiz.html | 160 bytes |
| 126 - Free-Labs-to-Test-PenTest-Skills.pdf | 323.1 KB |
| 126 - What is Penetration Testing.mp4 | 14.7 MB |
| 126 - What-is-pentesting.pdf | 646.9 KB |
| 127 - Ethical Hacking vs Malicious Hacking.mp4 | 20.9 MB |
| 128 - Legal Compliance Considerations.mp4 | 17.1 MB |
| 129 - The PenTest Exam Overview.mp4 | 9.2 MB |
| 21 - Introduction to Penetration Testing Quiz.html | 180 bytes |
| 130 - AI in Cybersecurity A DoubleEdged Sword.mp4 | 11.9 MB |
| 130 - AI-in-Cybersecurity.pdf | 496.7 KB |
| 131 - How AI Defends Systems.mp4 | 17.6 MB |
| 132 - How Attackers Use AI.mp4 | 18.3 MB |
| 133 - Machine Learning in Cybersecurity.mp4 | 16.7 MB |
| 134 - The Future AI vs AI.mp4 | 16.2 MB |
| 135 - Tools of the Trade.mp4 | 11.8 MB |
| 136 - Deep Fake Voice Demo.mp4 | 35.1 MB |
| 22 - The Role of AI in Cybersecurity Quiz.html | 193 bytes |
| 137 - Certs-That-Get-You-Hired.pdf | 455.8 KB |
| 137 - Why Certifications Matter.mp4 | 12.1 MB |
| 138 - BeginnerFriendly Certifications.mp4 | 21.0 MB |
| 139 - RoleSpecific Certifications.mp4 | 11.8 MB |
| 140 - Certification Tips Mistakes to Avoid.mp4 | 15.6 MB |
| 141 - Google Dorks Your Hidden Job Search Superpower.mp4 | 14.2 MB |
| 142 - Google Dorks Your Hidden Job Search Superpower Pt 2.mp4 | 18.6 MB |
| 143 - DORKING FOR JOB HUNTING.mp4 | 81.7 MB |
| 23 - Cybersecurity Certifications Career Strategy Quiz.html | 194 bytes |
| 144 - Unlocking-Your-Cyber-Career.pdf | 573.0 KB |
| 144 - Why Cybersecurity Is a Great Career.mp4 | 15.6 MB |
| 145 - What Employers Look For.mp4 | 19.5 MB |
| 146 - Build Skills with TryHackMe Hack The Box.mp4 | 16.9 MB |
| 147 - Other Ways to Gain Experience.mp4 | 18.7 MB |
| 148 - Bug Bounties Get Paid to Hack Legally.mp4 | 14.6 MB |
| 148 - SLIDE-5.mp4 | 8.1 MB |
| 149 - Cybersecurity Career Paths Find Your Fit.mp4 | 18.3 MB |
| 150 - Your Next Steps.mp4 | 16.3 MB |
| 151 - Hack The Box Demo.mp4 | 129.4 MB |
| 24 - Launching Your Cybersecurity Career Quiz.html | 193 bytes |
| 17 - Network-Fundamentals.pdf | 651.8 KB |
| 17 - What Is an IP Address.mp4 | 27.5 MB |
| 17 - Wireshark-Filters.pdf | 267.2 KB |
| 18 - Unlocking the Digital Doors Ports Protocols Explained.mp4 | 23.4 MB |
| 19 - DNS Demystified The Internets Phonebook.mp4 | 44.3 MB |
| 20 - LAN WAN The Internet Whats the Difference.mp4 | 13.6 MB |
| 21 - Ping The Digital Echo.mp4 | 15.4 MB |
| 22 - Tools of the Trade.mp4 | 12.9 MB |
| 23 - Wireshark.mp4 | 51.2 MB |
| 3 - Unlocking the Digital World A Network Fundamentals Quiz.html | 71 bytes |
| 24 - Foundation-Boosters-Operating-System-Basics.pdf | 433.6 KB |
| 24 - Linux-Commands.pdf | 279.2 KB |
| 24 - Linux-Filesystem-Hierarchy.pdf | 183.5 KB |
| 24 - What is an Operating System Really.mp4 | 15.7 MB |
| 24 - Windows-CLI-Commands.pdf | 153.5 KB |
| 25 - Windows vs Linux A Friendly Introduction.mp4 | 18.5 MB |
| 26 - Your Digital ID Access Levels.mp4 | 19.1 MB |
| 27 - Understanding Permissions and File Structures.mp4 | 19.4 MB |
| 28 - Recognising Key System Folders and Commands.mp4 | 24.7 MB |
| 29 - Staying Safe OS Hardening Basic Security Practices.mp4 | 22.8 MB |
| 30 - Linux Terminal Demo.mp4 | 41.4 MB |
| 31 - Windows CMD Demo.mp4 | 20.0 MB |
| 32 - How Do Firewalls Protect You.mp4 | 20.0 MB |
| 33 - What Antivirus Software Does.mp4 | 23.4 MB |
| 34 - Why You Need Both Firewalls Antivirus.mp4 | 19.1 MB |
| 35 - Tips to Maximize Your Digital Security.mp4 | 21.4 MB |
| 36 - Staying Safe OS Hardening Basic Security Practices.mp4 | 20.5 MB |
| 37 - Windows Defender Demo.mp4 | 18.6 MB |
| 5 - Firewalls and Their Role in Network Protection.html | 118 bytes |
| 38 - Cryptography.pdf | 521.2 KB |
| 38 - What Is Cryptography.mp4 | 19.2 MB |
| 39 - Symmetric vs Asymmetric Encryption.mp4 | 17.6 MB |
| 40 - Common Cryptographic Algorithms.mp4 | 21.2 MB |
| 41 - Why Cryptography Matters.mp4 | 13.7 MB |
| 42 - Weaknesses Real World Risks.mp4 | 17.3 MB |
| 43 - John The Ripper Demo.mp4 | 12.7 MB |
| 6 - The Core Purpose of Cryptography.html | 640 bytes |
| 44 - Red Team Offensive Security in Action.mp4 | 7.1 MB |
| 44 - Understanding-the-Red-and-Blue-Teams.pdf | 573.9 KB |
| 45 - Blue Team Defensive Security Experts.mp4 | 8.4 MB |
| 46 - Different Goals Same Mission.mp4 | 6.0 MB |
| 47 - Tools Tactics Vary.mp4 | 10.4 MB |
| 48 - Beyond Red Blue The Lesser Known Cybersecurity Teams.mp4 | 18.4 MB |
| 49 - Understanding Hacker Roles.mp4 | 16.9 MB |
| 7 - Cybersecurity Teams Test Your Knowledge.html | 432 bytes |
| 50 - Common Endpoint Threats.mp4 | 12.2 MB |
| 50 - EndPoint-Security.pdf | 330.8 KB |
| 51 - Key Security Tools Solutions.mp4 | 16.0 MB |
| 52 - Best Practices for Users.mp4 | 12.9 MB |
| 53 - Why Endpoint Security Matters.mp4 | 12.6 MB |
| 54 - Tools of the Trade.mp4 | 12.4 MB |
| 8 - Endpoint Security Basics.html | 419 bytes |
| 55 - Social-Engineering.pdf | 484.5 KB |
| 55 - What Is Social Engineering.mp4 | 12.4 MB |
| 56 - Common Social Engineering Attacks.mp4 | 16.5 MB |
| 57 - Red Flags to Watch For.mp4 | 11.9 MB |
| 58 - The Psychology Behind It.mp4 | 10.5 MB |
| 59 - How to Defend Yourself.mp4 | 20.7 MB |
| 60 - Tools of the Trade.mp4 | 13.2 MB |
| 61 - AI Faces the Death of Anonymity.mp4 | 37.3 MB |
| 62 - Phishing Demo.mp4 | 19.7 MB |
| 9 - Human Hacking Basics.html | 155 bytes |
| Bonus Resources.txt | 70 bytes |
Name
DL
Uploader
Size
S/L
Added
-
2.9 GB
[27
/
26]
2025-09-25
| Uploaded by freecoursewb | Size 2.9 GB | Health [ 27 /26 ] | Added 2025-09-25 |
-
572.1 MB
[33
/
3]
2024-12-02
| Uploaded by FreeCourseWeb | Size 572.1 MB | Health [ 33 /3 ] | Added 2024-12-02 |
-
573.3 MB
[0
/
16]
2023-10-24
| Uploaded by freecoursewb | Size 573.3 MB | Health [ 0 /16 ] | Added 2023-10-24 |
-
2.9 GB
[10
/
11]
2023-06-01
| Uploaded by freecoursewb | Size 2.9 GB | Health [ 10 /11 ] | Added 2023-06-01 |
-
2.0 GB
[23
/
8]
2025-01-13
| Uploaded by FreeCourseWeb | Size 2.0 GB | Health [ 23 /8 ] | Added 2025-01-13 |
-
644.0 MB
[0
/
1]
2023-10-27
| Uploaded by freecoursewb | Size 644.0 MB | Health [ 0 /1 ] | Added 2023-10-27 |
NOTE
SOURCE: Udemy Byte Sized Cyber Security Fundamentals
-----------------------------------------------------------------------------------
COVER

-----------------------------------------------------------------------------------
MEDIAINFO
None
×


