UDEMY.Cyber.Security.Building.a.CyberWarrior.Certification.
Language: English
Files Type:mp4, sfv, nfo| Size:1.68 GB
Video:12:10:33 | 1280X720 | 1563 Kbps
Audio:mp4a-40-2 | 128 Kbps | AAC
Genre:eLearning
Videos Files :
1. Welcome!.mp4 (18.74 MB)
10. NETWORK PROTOCOLS.mp4 (4.94 MB)
11. ARP ADDRESS RESOLUTION PROTOCOL.mp4 (4.52 MB)
12. DNS DOMAIN NAME SYSTEM.mp4 (6.46 MB)
13. TFTP TRIVIAL FILE TRANSFER PROTOCOL.mp4 (4.86 MB)
14. TCP TRANSMISSION CONTROL PROTOCOL.mp4 (9.03 MB)
15. TCP DATA FLOW.mp4 (8.84 MB)
16. DEMO WIRESHARK.mp4 (144.41 MB)
17. QUESTIONS.mp4 (9.34 MB)
18. TMI GOOD AND THE BAD.mp4 (11.49 MB)
19. THE BAD AND THE UGLY.mp4 (9.33 MB)
2. Developing Security Skills Skill Deficiencies.mp4 (7.6 MB)
20. VULNERABILITY MANAGEMENT.mp4 (5.22 MB)
21. INGRESS EGRESS FILTERING.mp4 (7.43 MB)
22. SECURE NETWORK ARCHITECTURES.mp4 (49.84 MB)
23. DEMO AND QUESTIONS.mp4 (13.66 MB)
24. VULNERABILITY SITES LAB VIRTUAL MACHINES.mp4 (12.79 MB)
25. VIRTUAL MACHINE CREATION COMPONENTS OF VIRTUAL NETWORK.mp4 (10.85 MB)
26. MORE COMPONENTS.mp4 (9.93 MB)
27. NETWORK SECURITY TOOLKIT FOLDERS PLANNING.mp4 (6.86 MB)
28. VIRTUAL DESIGN REPLAYING CAPTURED TRAFFIC.mp4 (5.81 MB)
29. DEMO.mp4 (96.64 MB)
3. SECURITY SKILLS COMMAND LINE CODE TCP IP.mp4 (10.69 MB)
30. PENETRATION TESTING UNVEILED.mp4 (8.84 MB)
31. SECURITY TESTING PLAN ABSTRACT METHODOLOGY.mp4 (9.45 MB)
32. NON INTRUSIVE.mp4 (8.18 MB)
33. GOOGLE HACKING BASICS INTRUSIVE EXPLOIT.mp4 (12.19 MB)
34. PENTEST FRAMEWORK SAMPLE ARCHITECTURE.mp4 (9.83 MB)
35. DETAILED FINDINGS CONCLUSION.mp4 (7.87 MB)
36. DEMO.mp4 (91.43 MB)
37. QUESTIONS.mp4 (4.69 MB)
38. INTRUSION DETECTION.mp4 (10.55 MB)
39. FUNCTIONS OF IDS.mp4 (12.02 MB)
4. TYPICAL SECURITY MODEL SECURITY POSTURE SECURITY POLICY.mp4 (9.33 MB)
40. UNDER ATTACK.mp4 (13.7 MB)
41. STOP THE ATTACK INTRUSION PREVENTION.mp4 (7.96 MB)
42. TYPES OF IPS.mp4 (9.1 MB)
43. IDENTIFYING THE OS METHODOLOGY OF NETWORK ANALYSIS.mp4 (7.14 MB)
44. DEMO.mp4 (79.64 MB)
45. QUESTIONS.mp4 (4.25 MB)
46. FILTER SESSION CONTENT INTERFACE CUSTOMIZATION.mp4 (15.13 MB)
47. STATISTICS.mp4 (9.69 MB)
48. COMPUTER INCIDENTS.mp4 (6.1 MB)
49. ESTABLISHING A COMPUTER FORENSIC METHODOLOGY I.mp4 (5.26 MB)
5. NETWORK PROTOCOLS TRANSPORT PROTOCOLS.mp4 (10.68 MB)
50. ESTABLISHING A COMPUTER FORENSIC METHODOLOGY II.mp4 (10.07 MB)
51. DEMO.mp4 (119.25 MB)
52. Building a Security Skills Foundation.mp4 (91.31 MB)
53. Leveraging Wireshark for Security.mp4 (103.52 MB)
54. Essential Defensive Strategies.mp4 (116.43 MB)
55. Building a Cyber Range Part 1.mp4 (45.97 MB)
56. Building a Cyber Range Part 2.mp4 (33.62 MB)
57. Penetration Testing.mp4 (102.78 MB)
58. Intrusion Analysis.mp4 (100.74 MB)
59. Intrusion Handling.mp4 (83.72 MB)
6. FLOW OF DATA.mp4 (11.34 MB)
60. Take aways.mp4 (53 MB)
7. UNIX AND LINUX.mp4 (12.21 MB)
8. VIRTUALIZATION.mp4 (18.99 MB)
9. QUESTIONS.mp4 (7.9 MB)