https://i120.fastpic.org/thumb/2022/0926/cc/_ff752dc68452a94b8a896866e6c492cc.jpeg


UDEMY.Cyber.Security.Building.a.CyberWarrior.Certification.   
Language: English
Files Type:mp4, sfv, nfo| Size:1.68 GB
Video:12:10:33 |  1280X720 | 1563 Kbps
Audio:mp4a-40-2 | 128 Kbps | AAC
Genre:eLearning

Videos Files :
1. Welcome!.mp4 (18.74 MB)
10. NETWORK PROTOCOLS.mp4 (4.94 MB)
11. ARP   ADDRESS RESOLUTION PROTOCOL.mp4 (4.52 MB)
12. DNS   DOMAIN NAME SYSTEM.mp4 (6.46 MB)
13. TFTP   TRIVIAL FILE TRANSFER PROTOCOL.mp4 (4.86 MB)
14. TCP   TRANSMISSION CONTROL PROTOCOL.mp4 (9.03 MB)
15. TCP DATA FLOW.mp4 (8.84 MB)
16. DEMO   WIRESHARK.mp4 (144.41 MB)
17. QUESTIONS.mp4 (9.34 MB)
18. TMI   GOOD AND THE BAD.mp4 (11.49 MB)
19. THE BAD AND THE UGLY.mp4 (9.33 MB)
2. Developing Security Skills   Skill Deficiencies.mp4 (7.6 MB)
20. VULNERABILITY MANAGEMENT.mp4 (5.22 MB)
21. INGRESS   EGRESS FILTERING.mp4 (7.43 MB)
22. SECURE NETWORK ARCHITECTURES.mp4 (49.84 MB)
23. DEMO AND QUESTIONS.mp4 (13.66 MB)
24. VULNERABILITY SITES   LAB   VIRTUAL MACHINES.mp4 (12.79 MB)
25. VIRTUAL MACHINE CREATION   COMPONENTS OF VIRTUAL NETWORK.mp4 (10.85 MB)
26. MORE COMPONENTS.mp4 (9.93 MB)
27. NETWORK SECURITY TOOLKIT   FOLDERS   PLANNING.mp4 (6.86 MB)
28. VIRTUAL DESIGN   REPLAYING CAPTURED TRAFFIC.mp4 (5.81 MB)
29. DEMO.mp4 (96.64 MB)
3. SECURITY SKILLS   COMMAND LINE   CODE   TCP IP.mp4 (10.69 MB)
30. PENETRATION TESTING UNVEILED.mp4 (8.84 MB)
31. SECURITY TESTING PLAN   ABSTRACT METHODOLOGY.mp4 (9.45 MB)
32. NON INTRUSIVE.mp4 (8.18 MB)
33. GOOGLE HACKING BASICS   INTRUSIVE   EXPLOIT.mp4 (12.19 MB)
34. PENTEST FRAMEWORK   SAMPLE ARCHITECTURE.mp4 (9.83 MB)
35. DETAILED FINDINGS   CONCLUSION.mp4 (7.87 MB)
36. DEMO.mp4 (91.43 MB)
37. QUESTIONS.mp4 (4.69 MB)
38. INTRUSION DETECTION.mp4 (10.55 MB)
39. FUNCTIONS OF IDS.mp4 (12.02 MB)
4. TYPICAL SECURITY MODEL   SECURITY POSTURE   SECURITY POLICY.mp4 (9.33 MB)
40. UNDER ATTACK.mp4 (13.7 MB)
41. STOP THE ATTACK   INTRUSION PREVENTION.mp4 (7.96 MB)
42. TYPES OF IPS.mp4 (9.1 MB)
43. IDENTIFYING THE OS   METHODOLOGY OF NETWORK ANALYSIS.mp4 (7.14 MB)
44. DEMO.mp4 (79.64 MB)
45. QUESTIONS.mp4 (4.25 MB)
46. FILTER   SESSION CONTENT   INTERFACE CUSTOMIZATION.mp4 (15.13 MB)
47. STATISTICS.mp4 (9.69 MB)
48. COMPUTER INCIDENTS.mp4 (6.1 MB)
49. ESTABLISHING A COMPUTER FORENSIC METHODOLOGY I.mp4 (5.26 MB)
5. NETWORK PROTOCOLS   TRANSPORT PROTOCOLS.mp4 (10.68 MB)
50. ESTABLISHING A COMPUTER FORENSIC METHODOLOGY II.mp4 (10.07 MB)
51. DEMO.mp4 (119.25 MB)
52. Building a Security Skills Foundation.mp4 (91.31 MB)
53. Leveraging Wireshark for Security.mp4 (103.52 MB)
54. Essential Defensive Strategies.mp4 (116.43 MB)
55. Building a Cyber Range   Part 1.mp4 (45.97 MB)
56. Building a Cyber Range   Part 2.mp4 (33.62 MB)
57. Penetration Testing.mp4 (102.78 MB)
58. Intrusion Analysis.mp4 (100.74 MB)
59. Intrusion Handling.mp4 (83.72 MB)
6. FLOW OF DATA.mp4 (11.34 MB)
60. Take aways.mp4 (53 MB)
7. UNIX AND LINUX.mp4 (12.21 MB)
8. VIRTUALIZATION.mp4 (18.99 MB)
9. QUESTIONS.mp4 (7.9 MB)