Certified Ethical Hacker (CEH) - Linux Academy Acloud Guru

seeders: 58
leechers: 36
updated:

Download Fast Safe Anonymous
movies, software, shows...

Files

Certified_Ethical_Hacker_(CEH)_-_Linux_Academy_AcloudGuru 05_Protecting_Information
  • 015_Data_Backup.mp4 (222.9 MB)
  • 001_Chapter_Introduction.mp4 (57.4 MB)
  • 002_Information_Assurance.mp4 (135.0 MB)
  • 003_EISA_and_Information_security_management_program.mp4 (118.5 MB)
  • 004_Network_Zoning.mp4 (155.7 MB)
  • 005_Defense_in_Depth.mp4 (130.9 MB)
  • 006_What_Sort_of_Things_Do_Policies_Regulate.mp4 (150.1 MB)
  • 007_Workplace_Security_Policies_and_Examples.mp4 (108.2 MB)
  • 008_Physical_Security_Controls_and_Risk.mp4 (116.3 MB)
  • 009_Risk_Management.mp4 (127.2 MB)
  • 010_Threat_Modeling_and_Incident_Management.mp4 (212.6 MB)
  • 011_UBA_-_User_Behavior_Analytics_and_Network_Security_Controls.mp4 (83.5 MB)
  • 012_Access_Controls.mp4 (83.4 MB)
  • 013_Identification_Authentication_Authorization_Accounting_and_IAM.mp4 (122.2 MB)
  • 014_Data_Leakage.mp4 (98.4 MB)
  • 016_Data_Recovery.mp4 (28.0 MB)
  • 017_QUIZ_SOLUTION_Protecting_Information_-_Questions_answered_and_explained.mp4 (87.0 MB)
01_Getting_Started
  • 001_Certified_Ethical_Hacker_(CEH)_-_Linux_Academys_Prep_Course_PDF.pdf (5.5 MB)
  • 001_Module_1.docx (1.1 MB)
  • 001_Module_2.docx (23.9 KB)
  • 001_Module_3.docx (16.7 KB)
  • 001_Module_4.docx (28.5 KB)
  • 001_Module_5.docx (22.0 KB)
  • 001_Module_6.docx (19.6 KB)
  • 001_Module_7.docx (21.3 KB)
  • 001_Module_8.docx (36.3 KB)
  • 001_Module_9.docx (20.3 KB)
  • 002_About_the_Author.mp4 (22.6 MB)
  • 003_Course_Requirements.mp4 (55.8 MB)
  • 004_How_to_Get_Help.mp4 (71.2 MB)
  • 005_About_the_Exam.mp4 (134.3 MB)
  • 001_About_the_Course.mp4 (80.8 MB)
02_Overview_of_Information_Security
  • 001_Chapter_Introduction.mp4 (28.2 MB)
  • 002_Common_Terms_(Hack_Value_Vulnerability_Exploit_Payload).mp4 (62.0 MB)
  • 003_Zero_Day_Attack.mp4 (64.1 MB)
  • 004_Daisy_Chaining.mp4 (86.2 MB)
  • 005_Module_1_Study_Guide.docx (1.1 MB)
  • 005_QUIZ_SOLUTION_Overview_of_Information_Security_-_Questions_answered_and_explained.mp4 (58.1 MB)
03_Overview_of_Information_Security_Threats_and_Attacks
  • 001_Chapter_Introduction.mp4 (8.8 MB)
  • 002_Threats_vs_Attacks.mp4 (28.7 MB)
  • 003_Motives_and_Reasons_Behind_Cyber_Security_Attacks.mp4 (30.6 MB)
  • 004_What_Are_the_Means_by_Which_Hackers_Gain_Access_to_Systems_and_Networks.mp4 (29.0 MB)
  • 005_Cloud_Computing_Threats.mp4 (75.2 MB)
  • 006_Advanced_Persistent_Threats.mp4 (24.0 MB)
  • 007_Viruses_and_Worms.mp4 (37.9 MB)
  • 008_Ransomware.mp4 (60.2 MB)
  • 009_Mobile_Threats.mp4 (42.5 MB)
  • 010_Modern_Age_Information_Warfare.mp4 (53.1 MB)
  • 011_Insider_Attacks.mp4 (20.8 MB)
  • 012_Phishing.mp4 (27.5 MB)
  • 013_Web_Application_Threats.mp4 (28.5 MB)
  • 014_Classification_of_Threats_Network_Threats.mp4 (32.7 MB)
  • 015_Clasification_of_Threats_Host_Threats.mp4 (27.8 MB)
  • 016_Clasification_of_Threats_Application_Threats.mp4 (23.9 MB)
  • 017_Classification_of_Attacks.mp4 (141.1 MB)
  • 018_Botnets.mp4 (34.0 MB)
  • 019_Laws_Standards_and_Regulations.mp4 (132.6 MB)
  • 020_QUIZ_SOLUTION_Overview_of_Information_Security_Threats_and_Attacks_-_Questions_answered_and_explained.mp4 (67.0 MB)
04_History_of_Hacking
  • 001_A_Brief_Look_at_the_History_of_Hacking.mp4 (118.9 MB)
  • 002_Types_of_Hackers.mp4 (85.8 MB)
  • 003_What_is_Ethical_Hacking_What_is_Its_Purpose.mp4 (28.4 MB)
  • 004_Scope_of_Ethical_Hacking.mp4 (36.5 MB)
  • 005_Hacking_Stages_Reconnaissance.mp4 (24.7 MB)
  • 006_Hacking_Stages_Scanning.mp4 (18.8 MB)
  • 007_Hacking_Stages_Gaining_Access.mp4 (6.5 MB)
  • 008_Hacking_Stages_Maintaining_Access.mp4 (32.7 MB)
  • 009_Hacking_Stages_Clearing_Tracks.mp4 (29.5 MB)
  • 010_QUIZ_SOLUTION__History_of_Hacking_-_Questions_answered_and_explained.mp4 (82.4 MB)
06_Penetration_Testing
  • 001_What_Is_Penetration_Testing.mp4 (37.8 MB)
  • 002_What_Does_a_Good_Penetration_Test_Consist_of.mp4 (129.8 MB)
  • 003_Why_Do_a_Penetration_Test.mp4 (123.5 MB)
  • 004_Pre-Attack_Phase_Contracts.mp4 (29.9 MB)
  • 005_Audit_vs_Vulnerability_Assessment_vs_Penetration_Test.mp4 (26.5 MB)
  • 006_Red_vs_Blue_Team.mp4 (32.1 MB)
  • 007_Types_of_Penetration_Testing.mp4 (80.4 MB)
  • 008_Pre-Attack_Phase_Rules_of_Engagement.mp4 (26.3 MB)
  • 009_Pre-Attack_Phase_Understanding_your_Clients_requirements.mp4 (43.7 MB)
  • 010_Pre-Attack_Phase_Scope_of_a_Penetration_Test.mp4 (76.7 MB)
  • 011_Pre-Attack_Phase_Information_Gathering.mp4 (70.8 MB)
  • 012_Pre-Attack_Phase_Two_Types_of_Information_Gathering.mp4 (60.5 MB)
  • 013_Attack_Phase.mp4 (15.9 MB)
  • 014_Attack_Phase_Penetrating_the_Perimeter.mp4 (46.6 MB)
  • 015_Attack_Phase_Target_Acquisition.mp4 (30.7 MB)
  • 016_Attack_Phase_Privilege_Escalation.mp4 (31.8 MB)
  • 017_Attack_Phase_Execute_Implant_Retract.mp4 (36.6 MB)
  • 018_Post-Attack_Phase.mp4 (23.5 MB)
  • 019_Security_Testing_Methodologies.mp4 (77.5 MB)
  • 020_QUIZ_SOLUTION_Penetration_Testing_-_Questions_answered_and_explained.mp4 (65.2 MB)
07_Footprinting_Process
  • 001_About_Footprinting.mp4 (33.9 MB)
  • 002_Hacker_State_of_Mind.mp4 (59.9 MB)
  • 003_Search_Engine_and_Online_Resources.mp4 (196.4 MB)
  • 004_Whois_GeoIpLocation_and_DNS_Interogation.mp4 (145.6 MB)
  • 005_Email_Header_Analysis.mp4 (164.3 MB)
  • 006_Getting_an_IP_Address_from_an_Email_and_More.mp4 (167.2 MB)
  • 007_Quick_Look_at_a_Website_Certificate_Source_Code_and_Traffic.mp4 (169.7 MB)
  • 008_How_to_Clone_a_Website_and_Extract_Metadata_from_Files.mp4 (186.0 MB)
  • 009_Nmap_and_Traceroute.mp4 (201.1 MB)
  • 010_QUIZ_SOLUTION_Footprinting_-_Questions_answered_and_explained.mp4 (55.0 MB)
08_Reports_and_Countermeasures
  • 001_Countermeasures_and_Best_Practices.mp4 (121.5 MB)
  • 002_What_Goes_into_a_Footprinting_Report.mp4 (56.5 MB)
  • 003_QUIZ_SOLUTION_Repor

Description

Certified Ethical Hacker (CEH) - Linux Academy Acloud Guru

Certified Ethical Hacker Course! (v10 ).
Have you always wanted to learn how to discover the weaknesses and vulnerabilities of a system? Have you always wondered how security professionals protect their systems from intruders? Do you wish to master hacking technologies? If so, then this course is for you.
With the rapid development of information technology, almost every industry in the world has some sort of information system installed and greatly depends on it. Such systems bring great value to companies. However, every system has its weaknesses and vulnerabilities which, if discovered by someone with bad intentions, can cause a lot of damage. For this reason, it has become imperative to protect these systems and the information they contain.



Download torrent
13.2 GB
seeders:58
leechers:36
Certified Ethical Hacker (CEH) - Linux Academy Acloud Guru


Trackers

tracker name
udp://tracker.opentrackr.org:1337/announce
http://bt.okmp3.ru:2710/announce
udp://u4.trakx.crim.ist:1337/announce
udp://wepzone.net:6969/announce
udp://ttk2.nbaonlineservice.com:6969/announce
https://tracker.yemekyedim.com:443/announce
https://tracker.gcrenwp.top:443/announce
https://tracker.bjut.jp:443/announce
https://api.ipv4online.uk:443/announce
https://tr.zukizuki.org:443/announce
https://tracker.moeking.me:443/announce
http://tracker.renfei.net:8080/announce
http://fleira.no:6969/announce
https://tr.nyacat.pw:443/announce
udp://tracker.gmi.gd:6969/announce
µTorrent compatible trackers list

Download torrent
13.2 GB
seeders:58
leechers:36
Certified Ethical Hacker (CEH) - Linux Academy Acloud Guru


Torrent hash: 72A9519786BD951F81D364B2264F73237898AF87