Torrent details for "Ethical Hacking Introduction to Ethical Hacking 2023 DevCourseWeb" Log in to bookmark
Controls:
×
Report Torrent
Please select a reason for reporting this torrent:
Your report will be reviewed by our moderation team.
×
Report Information
Loading report information...
This torrent has been reported 0 times.
Report Summary:
| User | Reason | Date |
|---|
Failed to load report information.
×
Success
Your report has been submitted successfully.
Checked by:
Category:
Language:
English
Total Size:
217.0 MB
Info Hash:
83045C17DBBA01CB173AD605DB5D454F0CBFB44F
Added By:
Added:
Aug. 17, 2023, 3:33 p.m.
Stats:
|
(Last updated: May 21, 2025, 12:08 a.m.)
| File | Size |
|---|---|
| Get Bonus Downloads Here.url | 182 bytes |
| 01 - Locking down the organization.mp4 | 7.8 MB |
| 01 - Locking down the organization.srt | 1.2 KB |
| 02 - Discovering resources.mp4 | 1.5 MB |
| 02 - Discovering resources.srt | 1.4 KB |
| 03 - Hacking ethically.mp4 | 1.3 MB |
| 03 - Hacking ethically.srt | 1.3 KB |
| 01 - Recognizing elements of information security.mp4 | 7.2 MB |
| 01 - Recognizing elements of information security.srt | 5.2 KB |
| 02 - Providing information assurance.mp4 | 6.6 MB |
| 02 - Providing information assurance.srt | 5.1 KB |
| 03 - Defending in depth.mp4 | 7.9 MB |
| 03 - Defending in depth.srt | 5.3 KB |
| 04 - Using AI and ML in cybersecurity.mp4 | 6.9 MB |
| 04 - Using AI and ML in cybersecurity.srt | 5.1 KB |
| 05 - Adapting to the threats.mp4 | 5.2 MB |
| 05 - Adapting to the threats.srt | 5.3 KB |
| 06 - Leveraging event correlation.mp4 | 4.1 MB |
| 06 - Leveraging event correlation.srt | 3.7 KB |
| 01 - Modeling threats.mp4 | 8.6 MB |
| 01 - Modeling threats.srt | 5.7 KB |
| 02 - Using cyber threat intelligence.mp4 | 10.6 MB |
| 02 - Using cyber threat intelligence.srt | 5.8 KB |
| 03 - Following the threat intelligence lifecycle.mp4 | 4.7 MB |
| 03 - Following the threat intelligence lifecycle.srt | 4.8 KB |
| 04 - Managing incidents.mp4 | 6.8 MB |
| 04 - Managing incidents.srt | 6.1 KB |
| 05 - Challenge Hardening guide.mp4 | 2.4 MB |
| 05 - Challenge Hardening guide.srt | 1.0 KB |
| 06 - Solution Hardening guide.mp4 | 1.8 MB |
| 06 - Solution Hardening guide.srt | 1.6 KB |
| 01 - Understanding the cyber kill chain.mp4 | 8.7 MB |
| 01 - Understanding the cyber kill chain.srt | 7.2 KB |
| 02 - Utilizing MITRE ATT&CK.mp4 | 10.0 MB |
| 02 - Utilizing MITRE ATT&CK.srt | 4.8 KB |
| 03 - Analyzing using the diamond model.mp4 | 7.3 MB |
| 03 - Analyzing using the diamond model.srt | 6.2 KB |
| 04 - Identifying adversary behavior.mp4 | 11.5 MB |
| 04 - Identifying adversary behavior.srt | 6.9 KB |
| 05 - Discovering indicators of compromise.mp4 | 11.0 MB |
| 05 - Discovering indicators of compromise.srt | 6.4 KB |
| 06 - Challenge The cyber kill chain.mp4 | 3.1 MB |
| 06 - Challenge The cyber kill chain.srt | 1.9 KB |
| 07 - Solution The cyber kill chain.mp4 | 4.7 MB |
| 07 - Solution The cyber kill chain.srt | 3.8 KB |
| 01 - Managing risks.mp4 | 5.1 MB |
| 01 - Managing risks.srt | 4.3 KB |
| 02 - Asset inventory.mp4 | 9.7 MB |
| 02 - Asset inventory.srt | 6.3 KB |
| 03 - Defining information security standards.mp4 | 8.2 MB |
| 03 - Defining information security standards.srt | 5.0 KB |
| 04 - Outlining US regulations.mp4 | 6.9 MB |
| 04 - Outlining US regulations.srt | 5.9 KB |
| 05 - Exploring global cyber laws and standards.mp4 | 5.5 MB |
| 05 - Exploring global cyber laws and standards.srt | 5.0 KB |
| 06 - Challenge Cyber threat information sharing.mp4 | 1.8 MB |
| 06 - Challenge Cyber threat information sharing.srt | 1.4 KB |
| 07 - Solution Cyber threat information sharing.mp4 | 3.3 MB |
| 07 - Solution Cyber threat information sharing.srt | 3.4 KB |
| 01 - Comparing attack types and motives.mp4 | 6.4 MB |
| 01 - Comparing attack types and motives.srt | 5.8 KB |
| 02 - Outlining the types of hackers.mp4 | 7.9 MB |
| 02 - Outlining the types of hackers.srt | 6.0 KB |
| 03 - Recognizing the skills of an ethical hacker.mp4 | 5.9 MB |
| 03 - Recognizing the skills of an ethical hacker.srt | 6.2 KB |
| 04 - Stepping through the hacking phases.mp4 | 7.6 MB |
| 04 - Stepping through the hacking phases.srt | 7.1 KB |
| 05 - Grasping the importance of ethical hacking.mp4 | 6.8 MB |
| 05 - Grasping the importance of ethical hacking.srt | 5.4 KB |
| 01 - Next steps.mp4 | 2.0 MB |
| 01 - Next steps.srt | 2.2 KB |
| Bonus Resources.txt | 386 bytes |
Name
DL
Uploader
Size
S/L
Added
-
1001.0 KB
[10
/
0]
2023-07-01
| Uploaded by nico1899 | Size 1001.0 KB | Health [ 10 /0 ] | Added 2023-07-01 |
-
27.7 MB
[2
/
10]
2023-12-11
| Uploaded by FreeCourseWeb | Size 27.7 MB | Health [ 2 /10 ] | Added 2023-12-11 |
NOTE
SOURCE: Ethical Hacking Introduction to Ethical Hacking 2023 DevCourseWeb
-----------------------------------------------------------------------------------
COVER

-----------------------------------------------------------------------------------
MEDIAINFO
None
×


