:Search:

Udemy Byte Sized Cyber Security Fundamentals

Torrent:
Info Hash: D5572D0005A23C0846886620ED10C2CAD0C4A5B8
Similar Posts:
Uploader: freecoursewb
Source: 1 Logo 1337x
Downloads: 694
Type: Tutorials
Language: English
Category: Other
Size: 2.9 GB
Added: Sept. 25, 2025, 11:30 p.m.
Peers: Seeders: 27, Leechers: 26 (Last updated: 6 months, 1 week ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://tracker.opentrackr.org:1337/announce 10 9 438
udp://tracker.openbittorrent.com:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.internetwarriors.net:1337/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.leechers-paradise.org:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.coppersurfer.tk:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://exodus.desync.com:6969/announce 8 10 1
udp://tracker.rarbg.torrentbay.st:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.tiny-vps.com:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://open.demonii.si:1337/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.torrent.eu.org:451/announce 9 7 255
Files:
  1. Get Bonus Downloads Here.url 180 bytes
  2. 1 - Cybersecurity-Fundamentals.pdf 808.2 KB
  3. 1 - Lock It Down Test Your Cybersecurity Knowledge.html 495 bytes
  4. 1 - What is Cybersecurity.mp4 19.6 MB
  5. 2 - Introduction.mp4 19.6 MB
  6. 3 - Threat Actors Motivations.mp4 31.0 MB
  7. 4 - The CIA Triad Protecting Data with Confidentiality Integrity Availability.mp4 34.7 MB
  8. 5 - Common Cyber Attack Types Know Your Enemies.mp4 34.0 MB
  9. 6 - Security Controls Technical Physical Administrative Layers.mp4 13.9 MB
  10. 7 - The Kill Chain MITRE ATTCK Mapping Cyberattack Tactics.mp4 29.9 MB
  11. 8 - Types of Cyber Attacks.mp4 23.0 MB
  12. 10 - Understanding Scripts.html 111 bytes
  13. 63 - Scripting-Automation-Beginner-Level.pdf 673.2 KB
  14. 63 - What is a Script.mp4 24.5 MB
  15. 64 - Basic Bash PowerShell Concepts.mp4 22.4 MB
  16. 65 - Automating Recon or Scanning.mp4 26.2 MB
  17. 66 - Getting Started with Your First Script.mp4 30.5 MB
  18. 67 - Why Learn Python for Cybersecurity.mp4 15.5 MB
  19. 68 - Tools of the Trade.mp4 17.2 MB
  20. 69 - Bash Script Demo.mp4 38.0 MB
  21. 11 - Cybersecurity Reconnaissance Intelligence Fundamentals Quiz.html 223 bytes
  22. 70 - OSINT-Resources.pdf 371.8 KB
  23. 70 - Passive vs Active Reconnaissance.mp4 5.8 MB
  24. 70 - Reconnaissance-Intelligence-Gathering.pdf 695.8 KB
  25. 71 - WHOIS nslookup Shodan theHarvester Reconng.mp4 14.4 MB
  26. 72 - Social Engineering Basics.mp4 7.7 MB
  27. 73 - OSINT Open Source Intelligence.mp4 5.2 MB
  28. 74 - More Tools of the Trade.mp4 12.8 MB
  29. 75 - theHarvester Demo.mp4 54.2 MB
  30. 12 - Scanning Enumeration and Vulnerability Management Quiz.html 199 bytes
  31. 76 - NMAP-commands.pdf 95.2 KB
  32. 76 - Scanning Enumeration.mp4 5.9 MB
  33. 76 - Scanning-Enumeration.pdf 513.6 KB
  34. 77 - Port Scanning Banner Grabbing.mp4 6.4 MB
  35. 78 - Common Scanning Tools Explained.mp4 8.4 MB
  36. 79 - Vulnerability Scanning vs Manual Discovery.mp4 7.2 MB
  37. 80 - Understanding CVEs The Vulnerability Playbook.mp4 17.7 MB
  38. 81 - nmap demo.mp4 28.6 MB
  39. 13 - Cybersecurity Exploitation Fundamentals Quiz.html 190 bytes
  40. 82 - What Is an Exploit.mp4 7.1 MB
  41. 83 - Exploit vs Vulnerability.mp4 10.9 MB
  42. 84 - The Ethical Hacking Process.mp4 20.8 MB
  43. 85 - Tools Metasploit SQLmap John the Ripper Hydra.mp4 8.7 MB
  44. 86 - Common Vulnerabilities Examples.mp4 8.7 MB
  45. 87 - PostExploitation Essentials.mp4 11.1 MB
  46. 88 - PostExploitation Essentials.mp4 11.2 MB
  47. 89 - SQLMap Demo.mp4 29.0 MB
  48. 14 - Web Application Security OWASP Fundamentals Quiz.html 169 bytes
  49. 90 - Web-Application-Attacks.pdf 546.1 KB
  50. 90 - What is OWASP.mp4 10.6 MB
  51. 91 - OWASP Top 10 Simplified.mp4 20.5 MB
  52. 92 - Tools Burp Suite OWASP ZAP.mp4 15.8 MB
  53. 93 - Cookie Tampering Input Validation.mp4 16.6 MB
  54. 94 - CrossSite Request Forgery CSRF.mp4 10.5 MB
  55. 95 - OWASP ZAP Lab.mp4 61.1 MB
  56. 100 - BYOD Work Phones.mp4 12.0 MB
  57. 15 - Mobile Security Threats Best Practices Quiz.html 195 bytes
  58. 96 - Mobile-Security.pdf 486.1 KB
  59. 96 - Why Mobile Security Matters.mp4 12.3 MB
  60. 97 - Common Mobile Threats.mp4 18.6 MB
  61. 98 - Simple Steps to Stay Safe.mp4 20.7 MB
  62. 99 - Spot the Signs of Trouble.mp4 15.1 MB
  63. 101 - Cloud-Security-Fundamentals.pdf 491.0 KB
  64. 101 - What Is Cloud Computing.mp4 12.3 MB
  65. 102 - Cloud Security Basics.mp4 18.7 MB
  66. 103 - The Shared Responsibility Model.mp4 20.7 MB
  67. 104 - Common Cloud Threats.mp4 15.1 MB
  68. 105 - Best Practices for Cloud Security.mp4 12.0 MB
  69. 16 - Cloud Security Principles Threats Quiz.html 190 bytes
  70. 106 - Wireless Standards Weaknesses.mp4 11.4 MB
  71. 106 - Wireless-Attacks.pdf 669.3 KB
  72. 107 - Cracking WiFi with Aircrackng.mp4 7.9 MB
  73. 108 - Evil Twin Attacks.mp4 6.4 MB
  74. 109 - Deauthentication Deauth Attacks.mp4 14.9 MB
  75. 110 - Tools of the Trade.mp4 12.6 MB
  76. 17 - Wireless Network Security Attack Methods Quiz.html 144 bytes
  77. 111 - Post-Exploitation-Privilege-Escalation.pdf 512.0 KB
  78. 111 - What to Do After Access.mp4 10.4 MB
  79. 112 - Windows vs Linux Privilege Escalation PrivEsc.mp4 10.1 MB
  80. 113 - Mimikatz PowerView LinPEAS.mp4 5.9 MB
  81. 114 - Honeypots Honeytokens Fake Asset.mp4 15.9 MB
  82. 115 - Cowrei Demo.mp4 18.2 MB
  83. 18 - PostExploitation Techniques Tools Quiz.html 203 bytes
  84. 116 - Reporting-Communication.pdf 396.5 KB
  85. 116 - Writing a Clear PenTest Report.mp4 8.7 MB
  86. 117 - Risk Ratings Explained Simply.mp4 5.9 MB
  87. 118 - Presenting to NonTechnical Stakeholders.mp4 6.4 MB
  88. 119 - Provide Detailed Technical Info.mp4 8.9 MB
  89. 19 - Effective Cybersecurity Reporting Communication Quiz.html 218 bytes
  90. 10 - The Key Components Inside a Computer.mp4 17.0 MB
  91. 11 - How the OS Manages Processes Resources.mp4 17.7 MB
  92. 12 - User Accounts Admins Permissions.mp4 19.3 MB
  93. 13 - Why It Matters to Cybersecurity.mp4 14.2 MB
  94. 14 - Build A PC.mp4 143.0 MB
  95. 15 - BIOS Simulation.mp4 30.6 MB
  96. 16 - What is a Virtual Machine.mp4 59.0 MB
  97. 2 - Decoding Your Desktop A Guide to the Machine Within.html 77 bytes
  98. 9 - Beyond-the-Screen-Inside-Your-Machine.pdf 808.4 KB
  99. 9 - What Happens When You Power On.mp4 10.8 MB
  100. 120 - Incident-Response-Forensics-Basics.pdf 379.2 KB
  101. 120 - What Is Incident Response.mp4 21.9 MB
  102. 121 - The 6 Phases of Incident Response.mp4 15.9 MB
  103. 122 - What Is Digital Forensics.mp4 17.3 MB
  104. 123 - Common Forensics Techniques.mp4 18.1 MB
  105. 124 - Best Practices RealWorld Tips.mp4 16.5 MB
  106. 125 - Tools of the trade.mp4 11.3 MB
  107. 20 - Incident Response Digital Forensics Fundamentals Quiz.html 160 bytes
  108. 126 - Free-Labs-to-Test-PenTest-Skills.pdf 323.1 KB
  109. 126 - What is Penetration Testing.mp4 14.7 MB
  110. 126 - What-is-pentesting.pdf 646.9 KB
  111. 127 - Ethical Hacking vs Malicious Hacking.mp4 20.9 MB
  112. 128 - Legal Compliance Considerations.mp4 17.1 MB
  113. 129 - The PenTest Exam Overview.mp4 9.2 MB
  114. 21 - Introduction to Penetration Testing Quiz.html 180 bytes
  115. 130 - AI in Cybersecurity A DoubleEdged Sword.mp4 11.9 MB
  116. 130 - AI-in-Cybersecurity.pdf 496.7 KB
  117. 131 - How AI Defends Systems.mp4 17.6 MB
  118. 132 - How Attackers Use AI.mp4 18.3 MB
  119. 133 - Machine Learning in Cybersecurity.mp4 16.7 MB
  120. 134 - The Future AI vs AI.mp4 16.2 MB
  121. 135 - Tools of the Trade.mp4 11.8 MB
  122. 136 - Deep Fake Voice Demo.mp4 35.1 MB
  123. 22 - The Role of AI in Cybersecurity Quiz.html 193 bytes
  124. 137 - Certs-That-Get-You-Hired.pdf 455.8 KB
  125. 137 - Why Certifications Matter.mp4 12.1 MB
  126. 138 - BeginnerFriendly Certifications.mp4 21.0 MB
  127. 139 - RoleSpecific Certifications.mp4 11.8 MB
  128. 140 - Certification Tips Mistakes to Avoid.mp4 15.6 MB
  129. 141 - Google Dorks Your Hidden Job Search Superpower.mp4 14.2 MB
  130. 142 - Google Dorks Your Hidden Job Search Superpower Pt 2.mp4 18.6 MB
  131. 143 - DORKING FOR JOB HUNTING.mp4 81.7 MB
  132. 23 - Cybersecurity Certifications Career Strategy Quiz.html 194 bytes
  133. 144 - Unlocking-Your-Cyber-Career.pdf 573.0 KB
  134. 144 - Why Cybersecurity Is a Great Career.mp4 15.6 MB
  135. 145 - What Employers Look For.mp4 19.5 MB
  136. 146 - Build Skills with TryHackMe Hack The Box.mp4 16.9 MB
  137. 147 - Other Ways to Gain Experience.mp4 18.7 MB
  138. 148 - Bug Bounties Get Paid to Hack Legally.mp4 14.6 MB
  139. 148 - SLIDE-5.mp4 8.1 MB
  140. 149 - Cybersecurity Career Paths Find Your Fit.mp4 18.3 MB
  141. 150 - Your Next Steps.mp4 16.3 MB
  142. 151 - Hack The Box Demo.mp4 129.4 MB
  143. 24 - Launching Your Cybersecurity Career Quiz.html 193 bytes
  144. 17 - Network-Fundamentals.pdf 651.8 KB
  145. 17 - What Is an IP Address.mp4 27.5 MB
  146. 17 - Wireshark-Filters.pdf 267.2 KB
  147. 18 - Unlocking the Digital Doors Ports Protocols Explained.mp4 23.4 MB
  148. 19 - DNS Demystified The Internets Phonebook.mp4 44.3 MB
  149. 20 - LAN WAN The Internet Whats the Difference.mp4 13.6 MB
  150. 21 - Ping The Digital Echo.mp4 15.4 MB
  151. 22 - Tools of the Trade.mp4 12.9 MB
  152. 23 - Wireshark.mp4 51.2 MB
  153. 3 - Unlocking the Digital World A Network Fundamentals Quiz.html 71 bytes
  154. 24 - Foundation-Boosters-Operating-System-Basics.pdf 433.6 KB
  155. 24 - Linux-Commands.pdf 279.2 KB
  156. 24 - Linux-Filesystem-Hierarchy.pdf 183.5 KB
  157. 24 - What is an Operating System Really.mp4 15.7 MB
  158. 24 - Windows-CLI-Commands.pdf 153.5 KB
  159. 25 - Windows vs Linux A Friendly Introduction.mp4 18.5 MB
  160. 26 - Your Digital ID Access Levels.mp4 19.1 MB
  161. 27 - Understanding Permissions and File Structures.mp4 19.4 MB
  162. 28 - Recognising Key System Folders and Commands.mp4 24.7 MB
  163. 29 - Staying Safe OS Hardening Basic Security Practices.mp4 22.8 MB
  164. 30 - Linux Terminal Demo.mp4 41.4 MB
  165. 31 - Windows CMD Demo.mp4 20.0 MB
  166. 32 - How Do Firewalls Protect You.mp4 20.0 MB
  167. 33 - What Antivirus Software Does.mp4 23.4 MB
  168. 34 - Why You Need Both Firewalls Antivirus.mp4 19.1 MB
  169. 35 - Tips to Maximize Your Digital Security.mp4 21.4 MB
  170. 36 - Staying Safe OS Hardening Basic Security Practices.mp4 20.5 MB
  171. 37 - Windows Defender Demo.mp4 18.6 MB
  172. 5 - Firewalls and Their Role in Network Protection.html 118 bytes
  173. 38 - Cryptography.pdf 521.2 KB
  174. 38 - What Is Cryptography.mp4 19.2 MB
  175. 39 - Symmetric vs Asymmetric Encryption.mp4 17.6 MB
  176. 40 - Common Cryptographic Algorithms.mp4 21.2 MB
  177. 41 - Why Cryptography Matters.mp4 13.7 MB
  178. 42 - Weaknesses Real World Risks.mp4 17.3 MB
  179. 43 - John The Ripper Demo.mp4 12.7 MB
  180. 6 - The Core Purpose of Cryptography.html 640 bytes
  181. 44 - Red Team Offensive Security in Action.mp4 7.1 MB
  182. 44 - Understanding-the-Red-and-Blue-Teams.pdf 573.9 KB
  183. 45 - Blue Team Defensive Security Experts.mp4 8.4 MB
  184. 46 - Different Goals Same Mission.mp4 6.0 MB
  185. 47 - Tools Tactics Vary.mp4 10.4 MB
  186. 48 - Beyond Red Blue The Lesser Known Cybersecurity Teams.mp4 18.4 MB
  187. 49 - Understanding Hacker Roles.mp4 16.9 MB
  188. 7 - Cybersecurity Teams Test Your Knowledge.html 432 bytes
  189. 50 - Common Endpoint Threats.mp4 12.2 MB
  190. 50 - EndPoint-Security.pdf 330.8 KB
  191. 51 - Key Security Tools Solutions.mp4 16.0 MB
  192. 52 - Best Practices for Users.mp4 12.9 MB
  193. 53 - Why Endpoint Security Matters.mp4 12.6 MB
  194. 54 - Tools of the Trade.mp4 12.4 MB
  195. 8 - Endpoint Security Basics.html 419 bytes
  196. 55 - Social-Engineering.pdf 484.5 KB
  197. 55 - What Is Social Engineering.mp4 12.4 MB
  198. 56 - Common Social Engineering Attacks.mp4 16.5 MB
  199. 57 - Red Flags to Watch For.mp4 11.9 MB
  200. 58 - The Psychology Behind It.mp4 10.5 MB
  201. 59 - How to Defend Yourself.mp4 20.7 MB
  202. 60 - Tools of the Trade.mp4 13.2 MB
  203. 61 - AI Faces the Death of Anonymity.mp4 37.3 MB
  204. 62 - Phishing Demo.mp4 19.7 MB
  205. 9 - Human Hacking Basics.html 155 bytes
  206. Bonus Resources.txt 70 bytes

Discussion