https://img87.pixhost.to/images/599/359020115_tuto.jpg
1.58 GB | 00:23:26 | mp4 | 1280X720  | 16:9
Genre:eLearning |Language:English


Files Included :
01 introduction-to-cloud-computing  (8.26 MB)
02 types-of-cloud-computing-services  (6.61 MB)
03 responsibilities-in-on-premises  (10.12 MB)
04 responsibilities-in-cloud  (7.97 MB)
05 cloud-deployment-models  (6.69 MB)
06 understanding-virtualization  (6.36 MB)
07 cloud-security-control-layers  (11.5 MB)
08 benefits-of-virtualization-in-the-cloud  (4.88 MB)
09 cloud-computing-threats  (9.85 MB)
10 cloud-computing-attacks  (7.74 MB)
11 cloud-computing-security-tools  (4.22 MB)
01 hacking-mobile-platforms  (4.3 MB)
02 vulnerable-areas-for-mobiles  (7.13 MB)
03 mobile-platform-vulnerabilities-and-risks  (16.21 MB)
04 demo-hacking-mobile-phone  (40.46 MB)
05 android-os  (6.63 MB)
06 architecture-of-android-os  (9.14 MB)
07 android-rooting-tools  (7.8 MB)
08 android-pen-testing  (5.1 MB)
09 counter-measures-for-mobile-security  (14.24 MB)
01 what-is-cryptography  (5.12 MB)
02 types-of-cryptography  (16.35 MB)
03 demo-cryptographic-techniques  (22.09 MB)
04 rsa-algorithm  (8.92 MB)
05 steganography-and-its-types  (9.45 MB)
06 how-steganography-works  (8.77 MB)
07 use-of-algorithms-and-transformation  (4.64 MB)
08 demo-perform-stegnography-using-open-stego  (21.06 MB)
09 demo-perform-stegnography-using-snow-tool  (17.46 MB)
01 denial-of-service-dos-attack  (4.8 MB)
02 distributed-denial-of-service-ddos-attack  (5.06 MB)
03 symptoms-of-dos-and-ddos-attacks  (3 MB)
04 how-ddos-attacks-work  (2.6 MB)
05 demo-perform-a-dos-attack-on-a-virtual-machine  (27.97 MB)
06 categories-of-dos-and-ddos-attack-vectors  (5.97 MB)
07 techniques-of-dos-and-ddos-attacks  (12 MB)
08 what-is-botnet  (5.52 MB)
09 techniques-to-protect-against-botnets  (4.65 MB)
10 dos-and-ddos-protection-tools  (3.87 MB)
01 sql-injection  (4.79 MB)
02 scope-of-sql-injections  (7.93 MB)
03 how-sql-query-works  (10.46 MB)
04 types-of-sql-injection  (6.46 MB)
05 demo-sql-injections  (31.35 MB)
06 extract-information-through-error-messages  (5.05 MB)
07 sql-injection-tools  (8.85 MB)
08 how-to-defend-from-an-sql-injection-attack  (12.36 MB)
09 demo-sql-injection-using-havij-tool  (27.49 MB)
03 certificate-introduction-and-exam-details  (17.01 MB)
04 course-introduction  (8.65 MB)
05 course-outline  (9.75 MB)
01 what-is-hacking  (12.76 MB)
02 types-of-hackers  (12.32 MB)
03 hacking-legal-or-illegal  (7.59 MB)
01 introduction-to-cyber-security  (9.22 MB)
02 stages-of-hacking  (15.09 MB)
03 terminology-in-cyber-security-and-hacking  (11.68 MB)
04 security-elements-in-cyber-security  (9.41 MB)
05 penetration-testing  (7.71 MB)
01 footprinting-or-reconnaissance  (4.09 MB)
02 demo-gathering-information-from-various-online-resources  (59.45 MB)
03 types-of-footprinting  (8.16 MB)
04 website-footprinting  (11.1 MB)
05 footprinting-methodology  (9.43 MB)
06 e-mail-footprinting-methodology  (10.87 MB)
07 finding-a-companys-public-and-restricted-data  (12.59 MB)
08 footprinting-through-job-sites  (6.33 MB)
09 archive-org-and-google-dorks  (3.92 MB)
10 footprinting-pen-test-process  (12.88 MB)
01 introduction-to-network-scanning  (8.1 MB)
02 identify-targets-from-system-os  (6.61 MB)
03 objectives-of-network-scanning  (4.91 MB)
04 check-for-live-system  (5.58 MB)
05 network-scanning-tool  (3.22 MB)
06 demo-networking-scanning-with-advanced-ip-scanner-tool  (13.59 MB)
07 vulnerability-scanning  (6.38 MB)
08 what-is-enumeration  (12.14 MB)
09 vulnerability-assessment  (9.42 MB)
10 scanning-pen-testing  (8.3 MB)
11 countermeasures-for-port-scanning  (4.4 MB)
12 demo-port-scanning-using-nmap-tool  (27.57 MB)
01 social-engineering  (3.74 MB)
02 types-of-social-engineering  (5 MB)
03 human-based-social-engineering  (8 MB)
04 phishing  (10.07 MB)
05 computer-based-social-engineering  (4.86 MB)
06 mobile-based-social-engineering  (13.95 MB)
08 phases-of-social-engineering-attacks  (4.94 MB)
09 insider-threats  (5.44 MB)
10 common-social-engineering-targets-and-defense-strategies  (6.76 MB)
11 risk-of-social-engineering  (4.23 MB)
12 demo-manual-phishing-attacks  (31.86 MB)
13 tools-to-detect-phishing  (4.24 MB)
14 how-to-detect-phishing-e-mails  (5.15 MB)
15 how-to-defend-against-phishing-attacks  (3.71 MB)
16 demo-phishing-attacks-using-kali-linux-automation-tools  (24.17 MB)
01 web-penetration-testing  (3.61 MB)
02 web-server-layers  (13.78 MB)
03 web-application-attacks  (6.78 MB)
04 why-do-web-servers-get-hacked  (7.99 MB)
05 web-servers-architecture  (7.8 MB)
06 web-application  (6.91 MB)
07 web-application-architecture  (11.34 MB)
08 demo-bypass-authentication  (33.62 MB)
02 problem-statement  (24.22 MB)
03 task-1  (11.81 MB)
04 task-2  (21.94 MB)
05 task-3  (13.53 MB)
06 task-4  (26.51 MB)
07 task-5  (18.14 MB)
08 task-6  (7.73 MB)
09 task-7  (21.77 MB)
10 task-8  (5.6 MB)
11 task-9  (10.04 MB)
12 task-10  (7.09 MB)
01 introduction-to-system-hacking  (5.16 MB)
02 system-hacking-methodology  (11.39 MB)
03 types-of-password-attacks  (15.44 MB)
04 tools-for-password-attack  (3.11 MB)
05 microsoft-authentication  (7.84 MB)
06 password-salting  (5.23 MB)
07 demo-how-attackers-crack-passwords-with-virtual-machines  (44.3 MB)
01 malware-threats  (6.38 MB)
02 ways-of-malware-propagation  (8.65 MB)
03 what-is-a-virus  (4.35 MB)
04 types-of-virus  (7.28 MB)
05 how-does-a-computer-get-infected  (4.91 MB)
06 how-to-defend-against-a-virus-attack  (7.91 MB)
07 what-is-rootkit  (5.95 MB)
08 what-is-a-worm  (4.66 MB)
09 difference-between-worm-and-virus  (4.64 MB)
10 trojan-and-trojan-horse  (4.75 MB)
11 types-of-trojan  (6.78 MB)
12 how-to-infect-systems-using-trojan  (5.82 MB)
13 how-to-identify-trojan-infections  (8.18 MB)
14 how-to-protect-from-trojans  (3.92 MB)
15 malware-pen-testing  (4.19 MB)
16 introduction-to-network-sniffing  (6.98 MB)
17 working-of-network-sniffing  (4.08 MB)
18 types-of-sniffing  (5.88 MB)
19 vulnerable-protocols-in-sniffing  (4.89 MB)
20 arp-poisoning  (6.88 MB)
01 firewall-evading-ids-and-honeypots  (6.25 MB)
02 types-of-firewalls  (13.48 MB)
03 uses-of-firewall  (10.35 MB)
04 what-is-an-ids-intrusion-detection-system  (14.49 MB)
05 general-indications-of-system-intrusions  (3.9 MB)
06 types-of-ids  (5.8 MB)
07 intrusion-detection-tool-snort  (5.23 MB)
08 what-is-honeypot  (2.75 MB)
09 types-of-honeypots  (6.78 MB)
10 detecting-honeypots  (5.69 MB)
01 iot-hacking  (3.69 MB)
02 how-does-iot-work  (5.47 MB)
03 architecture-of-iot  (5.4 MB)
04 iot-technologies-and-protocols  (8.09 MB)
05 iot-communication-models  (9.4 MB)
06 understanding-iot-attacks  (10.66 MB)
07 iot-attack  (9.77 MB)
08 iot-hacking-methodology  (11.42 MB)
[align=center]
Screenshot
https://images2.imgbox.com/c3/c3/CppcQukr_o.jpg

[/align]

Код:
https://ddownload.com/iuue6hwe2tfw/Coursera_Certified_Ethical_Hacking_v12_Specialization.rar
Код:
https://rapidgator.net/file/f7bb2c042648c8eee079d7054a4d40f4/Coursera_Certified_Ethical_Hacking_v12_Specialization.rar
Код:
https://turbobit.net/qscvjnng660w/Coursera_Certified_Ethical_Hacking_v12_Specialization.rar.html