Category:Other
Torrent Name:
Torrent Hash:2482412513166861abb3db1c378d5acbe6e36918
Date Added:2024-10-06 10:15:02
Size2.06 GB
Seeders:35
Leechers:2
Uploader:autonomous-prime

 |-- $10 ChatGPT for 1 Year & More.txt - 209 Bytes
 | Module 1 | 2. Introduction |-- subtitle.txt - 694 Bytes
 | Module 1 | 2. Introduction |-- subtitles-en.vtt - 1.24 KB
 | Module 1 | 5. Understanding Motives, Goals, and Objectives of Information Security Attacks |-- subtitle.txt - 1.89 KB
 | Module 1 | 3. Understanding the Need for Security |-- subtitle.txt - 1.95 KB
 | Module 1 | 4. Understanding the Security, Functionality, and Usability Triangle |-- subtitle.txt - 3.1 KB
 | Module 1 | 5. Understanding Motives, Goals, and Objectives of Information Security Attacks |-- subtitles-en.vtt - 3.18 KB
 | Module 1 | 3. Understanding the Need for Security |-- subtitles-en.vtt - 3.71 KB
 | Module 1 | 6. Overview of Classification of Attacks |-- subtitle.txt - 4.42 KB
 | Module 1 | 1. Index |-- subtitle.txt - 5 KB
 | Module 1 | 4. Understanding the Security, Functionality, and Usability Triangle |-- subtitles-en.vtt - 5.92 KB
 | Module 1 | 7. Overview of Information Security Attack Vectors |-- subtitle.txt - 6.1 KB
 | Module 1 | 1. Index |-- subtitles-en.vtt - 8.12 KB
 | Module 1 | 6. Overview of Classification of Attacks |-- subtitles-en.vtt - 8.55 KB
 | Module 1 | 7. Overview of Information Security Attack Vectors |-- subtitles-en(1).vtt - 12.05 KB
 | Module 1 | 8. Overview of Various Information Security Laws and Regulations |-- subtitle.txt - 15.22 KB
 | Module 1 | 8. Overview of Various Information Security Laws and Regulations |-- subtitles-en(1).vtt - 25.31 KB
 | Module 11 |-- 2024-07-02_04-23-15_Video 11.7 Overview of Various Cloud Computing Security Tools - Coursera.mp4 - 4.02 MB
 | Module 4 |-- 2024-07-02_04-13-04_Video 4.5 Overview of Password Cracking Tools - Coursera - OneHack.us.mp4 - 4.3 MB
 | Module 11 |-- 2024-07-02_04-22-24_Video 11.1 Introduction - Coursera.mp4 - 4.41 MB
 | Module 12 |-- 2024-07-02_04-24-00_Video 12.5 Overview of Penetration Testing Methodologies - Coursera.mp4 - 4.49 MB
 | Module 5 |-- 2024-07-02_04-13-59_Video 5.1 Introduction - Coursera.mp4 - 4.95 MB
 | Module 8 |-- 2024-07-02_04-18-26_Video 8.1 Introduction - Coursera.mp4 - 5 MB
 | Module 1 | 2. Introduction |-- 2. Introduction.mp4 - 5.18 MB
 | Module 4 |-- 2024-07-02_04-12-35_Introduction - Coursera.mp4 - 5.18 MB
 | Module 2 |-- 1. Introduction - Coursera^.mp4 - 5.36 MB
 | Module 12 |-- 2024-07-02_04-23-36_Video 12.1 Introduction - Coursera.mp4 - 5.42 MB
 | Module 6 |-- 2024-07-02_04-15-34_Video 6.1 Introduction - Coursera.mp4 - 5.58 MB
 | Module 3 |-- 2024-07-02_04-10-11_Introduction - Coursera.mp4 - 5.77 MB
 | Module 6 |-- 2024-07-02_04-16-17_Video 6.7 Understanding Different DoS-DDoS Attack Countermeasures and Protection Tools - Coursera.mp4 - 5.97 MB
 | Module 7 |-- 2024-07-02_04-17-51_Video 7.8 Understanding Different SQL Injection Tools - Coursera.mp4 - 6.03 MB
 | Module 8 |-- 2024-07-02_04-19-20_Video 8.8 Overview of Different Wireless Security Tools - Coursera.mp4 - 6.04 MB
 | Module 1 | 5. Understanding Motives, Goals, and Objectives of Information Security Attacks |-- 5. Understanding Motives, Goals, and Objectives of Information Security Attacks.mp4 - 6.12 MB
 | Module 9 |-- 2024-07-02_04-19-54_Video 9.1 Introduction - Coursera.mp4 - 6.25 MB
 | Module 7 |-- 2024-07-02_04-16-57_Video 7.1 Introduction - Coursera.mp4 - 6.35 MB
 | Module 10 |-- 2024-07-02_04-20-47_Video 10.1 Introduction - Coursera.mp4 - 6.47 MB
 | Module 4 |-- 2024-07-02_04-12-50_Understanding Microsoft Authentication - Coursera.mp4 - 6.56 MB
 | Module 1 | 3. Understanding the Need for Security |-- 3. Understanding the Need for Security.mp4 - 6.61 MB
 | Module 6 |-- 2024-07-02_04-16-10_Video 6.6 Understanding Different DoS-DDoS Attack Tools - Coursera.mp4 - 7.48 MB
 | Module 4 |-- 2024-07-02_04-12-44_Understanding the Password Cracking and Password Complexity - Coursera.mp4 - 7.9 MB
 | Module 1 | 4. Understanding the Security, Functionality, and Usability Triangle |-- 4. Understanding the Security, Functionality, and Usability Triangle.mp4 - 9.15 MB
 | Module 9 |-- 2024-07-02_04-20-13_Video 9.3 Understanding Mobile Platform Attack Vectors - Coursera.mp4 - 9.15 MB
 | Module 2 |-- 4. Overview of Indicators of Compromise (IoCs) - Coursera.mp4 - 9.39 MB
 | Module 2 |-- 2. Understanding the Cyber Kill Chain Methodology - Coursera.mp4 - 9.51 MB
 | Module 7 |-- 2024-07-02_04-17-14_Video 7.3 Understanding Different Web Server Attack Tools and Countermeasures - Coursera.mp4 - 10.05 MB
 | Module 10 |-- 2024-07-02_04-21-28_Video 10.4 Overview of IoT Attack Countermeasures and Security Tools - Coursera.mp4 - 10.22 MB
 | Module 7 |-- 2024-07-02_04-17-59_Video 7.9 Understanding Different SQL Injection Attack Countermeasures - Coursera.mp4 - 10.52 MB
 | Module 8 |-- 2024-07-02_04-19-13_Video 8.7 Overview of Various Wireless Attack Countermeasures - Coursera.mp4 - 10.56 MB
 | Module 10 |-- 2024-07-02_04-21-46_Video 10.7 Overview of OT Attack Countermeasures and Security Tools - Coursera.mp4 - 10.89 MB
 | Module 5 |-- 2024-07-02_04-14-34_Video 5.5 Understanding Identity Theft - Coursera.mp4 - 11.22 MB
 | Module 2 |-- 3. Understanding Tactics, Techniques, and Procedures (TTPs) - Coursera.mp4 - 11.4 MB
 | Module 2 |-- 6. Understanding Different Phases of Hacking Cycle - Coursera.mp4 - 11.96 MB
 | Module 6 |-- 2024-07-02_04-16-33_Video 6.9 Understanding Different Session Hijacking Tools and Countermeasures - Coursera.mp4 - 11.99 MB
 | Module 12 |-- 2024-07-02_04-23-54_Video 12.4 Understanding Phases of Penetration Testing - Coursera.mp4 - 13.55 MB
 | Module 1 | 6. Overview of Classification of Attacks |-- 6. Overview of Classification of Attacks.mp4 - 13.67 MB
 | Module 9 |-- 2024-07-02_04-20-31_Video 9.6 Overview of Mobile Security Guidelines and Security Tools - Coursera.mp4 - 14.43 MB
 | Module 8 |-- 2024-07-02_04-18-39_Video 8.2 Overview of Wireless Terminology - Coursera.mp4 - 15.03 MB
 | Module 6 |-- 2024-07-02_04-16-23_Video 6.8 Overview of Session Hijacking and Types of Session Hijacking - Coursera.mp4 - 15.05 MB
 | Module 6 |-- 2024-07-02_04-15-58_Video 6.4 Understanding Different Sniffing Countermeasures - Coursera.mp4 - 15.29 MB
 | Module 12 |-- 2024-07-02_04-23-49_Video 12.3 Understanding Types of Penetration Testing - Coursera.mp4 - 15.64 MB
 | Module 7 |-- 2024-07-02_04-17-36_Video 7.6 Understanding Different Web Application Attack Tools and Countermeasures - Coursera.mp4 - 15.66 MB
 | Module 9 |-- 2024-07-02_04-20-24_Video 9.5 Understanding Mobile Device Management - Coursera.mp4 - 16.13 MB
 | Module 8 |-- 2024-07-02_04-18-59_Video 8.5 Overview of Different Wireless Attack Tools - Coursera.mp4 - 16.27 MB
 | Module 1 | 1. Index |-- 1. Index - OneHack.us.mp4 - 16.31 MB
 | Module 3 |-- 2024-07-02_04-10-20_Understanding the Threat and Threat Sources - Coursera.mp4 - 17.21 MB
 | Module 2 |-- 8. Overview of Ethical Hacking Tools - Coursera.mp4 - 17.69 MB
 | Module 3 |-- 58_Understanding Vulnerability Assessment Tools and Vulnerability Exploitation - Coursera - OneHack.us.mp4 - 18.31 MB
 | Module 12 |-- 2024-07-02_04-24-15_Video 12.7 Understanding Risks Associated with Penetration Testing - Coursera.mp4 - 19 MB
 | Module 11 |-- 2024-07-02_04-23-05_Video 11.6 Understanding Cloud Attack Countermeasures - Coursera.mp4 - 20.66 MB
 | Module 9 |-- 2024-07-02_04-20-07_Video 9.2 Understanding Anatomy of a Mobile Attack - Coursera.mp4 - 21.19 MB
 | Module 1 | 7. Overview of Information Security Attack Vectors |-- 7. Overview of Information Security Attack Vectors.mp4 - 21.44 MB
 | Module 11 |-- 2024-07-02_04-23-00_Video 11.5 Overview of Cloud Attacks and Tools - Coursera.mp4 - 21.51 MB
 | Module 10 |-- 2024-07-02_04-21-14_Video 10.2 Understanding IoT Concepts - Coursera.mp4 - 21.53 MB
 | Module 8 |-- 2024-07-02_04-18-46_Video 8.3 Overview of Wireless Encryption Algorithms - Coursera.mp4 - 21.74 MB
 | Module 4 |-- 2024-07-02_04-13-12_Video 4.6 Understanding Countermeasures against Password Attacks - Coursera.mp4 - 21.84 MB
 | Module 12 |-- 2024-07-02_04-23-42_Video 12.2 Understanding Penetration Testing and its Benefits - Coursera.mp4 - 22.36 MB
 | Module 5 |-- 2024-07-02_04-14-26_Video 5.4 Understanding Insider Threats - Coursera.mp4 - 22.48 MB
 | Module 2 |-- 5. Overview of Hacking Concepts and Hacker Classes - Coursera.mp4 - 22.91 MB
 | Module 6 |-- 2024-07-02_04-16-04_Video 6.5 Overview of Different Types of DoS and DDoS Attacks - Coursera.mp4 - 24.58 MB
 | Module 7 |-- 2024-07-02_04-17-21_Video 7.4 Overview of Web Application Architecture and Vulnerability Stack - Coursera.mp4 - 28.15 MB
 | Module 6 |-- 2024-07-02_04-15-51_Video 6.3 Understanding Various Sniffing Techniques and Tools - Coursera.mp4 - 28.73 MB
 | Module 8 |-- 2024-07-02_04-19-05_Video 8.6 Understanding Bluetooth Attack Techniques - Coursera.mp4 - 29.41 MB
 | Module 7 |-- 2024-07-02_04-17-30_Video 7.5 Understanding Different Web Application Threats and Attacks - Coursera.mp4 - 30.14 MB
 | Module 6 |-- 2024-07-02_04-15-44_Video 6.2 Understanding Packet Sniffing and Types of Sniffing - Coursera.mp4 - 31.14 MB
 | Module 5 |-- 2024-07-02_04-14-43_Video 5.6 Understanding Different Social Engineering, Insider Threats and Identity Theft Countermeasures - Coursera.mp4 - 34.35 MB
 | Module 3 |-- 2024-07-02_04-10-43_Understanding Vulnerability and Vulnerability Classification - Coursera.mp4 - 37.53 MB
 | Module 5 |-- 2024-07-02_04-14-17_Video 5.3 Understanding Various Social Engineering Techniques - Coursera.mp4 - 38.83 MB
 | Module 3 |-- 2024-07-02_04-10-25_Understanding Malware and Common Techniques Attackers use to Distribute Malware on the Web - Coursera.mp4 - 39.42 MB
 | Module 11 |-- 2024-07-02_04-22-53_Video 11.4 Understanding Cloud Computing Threats - Coursera.mp4 - 39.6 MB
 | Module 10 |-- 2024-07-02_04-21-34_Video 10.5 Understanding OT Concepts - Coursera.mp4 - 43.12 MB
 | Module 4 |-- 2024-07-02_04-12-59_Understanding Various Types of Password Attacks - Coursera.mp4 - 43.42 MB
 | Module 5 |-- 2024-07-02_04-14-11_Video 5.2 Understanding Social Engineering Concepts - Coursera.mp4 - 43.43 MB
 | Module 9 |-- 2024-07-02_04-20-18_Video 9.4 Understanding Mobile Platform Vulnerabilities - Coursera.mp4 - 44.32 MB
 | Module 2 |-- 7. Understanding Ethical Hacking Concepts and Its Scope - Coursera.mp4 - 45.87 MB
 | Module 8 |-- 2024-07-02_04-18-51_Video 8.4 Understanding Wireless Network-Specific Attack Techniques - Coursera.mp4 - 46.97 MB
 | Module 1 | 8. Overview of Various Information Security Laws and Regulations |-- 8. Overview of Various Information Security Laws and Regulations.mp4 - 48.16 MB
 | Module 3 |-- 2024-07-02_04-10-52_Understanding Vulnerability Assessment and Vulnerability Management Life Cycle - Coursera.mp4 - 48.43 MB
 | Module 11 |-- 2024-07-02_04-22-47_Video 11.3 Overview of Container Technology - Coursera.mp4 - 51.38 MB
 | Module 11 |-- 2024-07-02_04-22-40_Video 11.2 Understanding Cloud Computing Concepts - Coursera.mp4 - 52.53 MB
 | Module 10 |-- 2024-07-02_04-21-40_Video 10.6 Understanding OT Attacks and OT Attack Tools - Coursera.mp4 - 52.63 MB
 | Module 7 |-- 2024-07-02_04-17-44_Video 7.7 Overview of Different Types of SQL Injection Attacks - Coursera.mp4 - 53.62 MB
 | Module 10 |-- 2024-07-02_04-21-21_Video 10.3 Understanding IoT attacks and IoT attack Tools - Coursera.mp4 - 74.59 MB
 | Module 7 |-- 2024-07-02_04-17-09_Video 7.2 Understanding Web Server Concepts and Attacks - Coursera.mp4 - 74.86 MB
 | Module 12 |-- 2024-07-02_04-24-07_Video 12.6 Overview of Guidelines and Recommendations for Penetration Testing - Coursera.mp4 - 131.96 MB
 | Module 3 |-- 2024-07-02_04-10-32_Overview of Different Types of Malware and Malware Countermeasures - Coursera.mp4 - 169.7 MB

udp://open.tracker.cl:1337/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.cyberia.is:6969/announce
udp://open.demonii.si:1337/announce
udp://open.stealth.si/announce
udp://exodus.desync.com:6969/announce
udp://tracker.moeking.me:6969/announce
udp://explodie.org:6969/announce
udp://9.rarbg.me:2740/announce
udp://9.rarbg.to:2790/announce

Torrent Download

Magnet Download