BITCQ

2 - Network Security

Size: 3.1 GB
Magnet link

Name Size
2 - Network Security/01 Introduction/004 Study Recommendations.mp4 20.8 MB
2 - Network Security/01 Introduction/002 Introduction to the Instructor.mp4 17.3 MB
2 - Network Security/01 Introduction/003 Target Audience.mp4 8.7 MB
2 - Network Security/01 Introduction/001 Welcome to Volume 2.mp4 2.7 MB
2 - Network Security/01 Introduction/005 Course updates.mp4 2.6 MB
2 - Network Security/02 Goals and Learning Objectives - Volume 2/006 Goals and Learning Objectives - Volume 2.mp4 15.9 MB
2 - Network Security/03 Routers - Port and Vulnerability scanning/attached_files/008 The Home Router/OSI-Model-and-TCP-Model.gif 146 KB
2 - Network Security/03 Routers - Port and Vulnerability scanning/010 Internal Vulnerability Scanning - MBSA Nmap Nessus Fing Superscan OpenVAS.mp4 96.5 MB
2 - Network Security/03 Routers - Port and Vulnerability scanning/009 External Vulnerability Scanning - Shodan Qualys Nmap.mp4 93.4 MB
2 - Network Security/03 Routers - Port and Vulnerability scanning/008 The Home Router.mp4 60.6 MB
2 - Network Security/03 Routers - Port and Vulnerability scanning/011 Open Source Custom Router Firmware.mp4 56 MB
2 - Network Security/03 Routers - Port and Vulnerability scanning/007 Goals and Learning Objectives.mp4 2.3 MB
2 - Network Security/04 Firewalls/attached_files/019 Linux - Host Based Firewalls - UFW gufw nftables/iptables-frontends.txt 333 B
2 - Network Security/04 Firewalls/015 Windows - Host Based Firewalls - Windows Firewall.mp4 62.7 MB
2 - Network Security/04 Firewalls/018 Linux - Host Based Firewalls - iptables.mp4 60.8 MB
2 - Network Security/04 Firewalls/019 Linux - Host Based Firewalls - UFW gufw nftables.mp4 49.5 MB
2 - Network Security/04 Firewalls/013 Firewalls Host-based network-based and virtual Part 1.mp4 44.8 MB
2 - Network Security/04 Firewalls/020 Mac - Host based Firewalls - Application Firewall PF.mp4 43.2 MB
2 - Network Security/04 Firewalls/021 Mac - Host based Firewalls - pflist Icefloor Murus.mp4 38.1 MB
2 - Network Security/04 Firewalls/016 Windows - Host Based Firewalls - Windows Firewall Control WFC.mp4 35.7 MB
2 - Network Security/04 Firewalls/017 Windows - Host Based Firewalls - Third Party.mp4 35.3 MB
2 - Network Security/04 Firewalls/025 Network based firewalls - pfSense Smoothwall and Vyos.mp4 28.5 MB
2 - Network Security/04 Firewalls/022 Mac - Host based Firewalls - Little Snitch.mp4 25.2 MB
2 - Network Security/04 Firewalls/024 Network based firewalls - Hardware.mp4 19.7 MB
2 - Network Security/04 Firewalls/014 Firewalls Host-based network-based and virtual Part 2.mp4 16.3 MB
2 - Network Security/04 Firewalls/023 Network based firewalls - Routers - DD-WRT.mp4 15.1 MB
2 - Network Security/04 Firewalls/012 Goals and Learning Objectives.mp4 2.3 MB
2 - Network Security/05 Network Attacks Architecture and Isolation/029 Effective Network Isolation Part 1.mp4 35 MB
2 - Network Security/05 Network Attacks Architecture and Isolation/030 Effective Network Isolation Part 2.mp4 23.8 MB
2 - Network Security/05 Network Attacks Architecture and Isolation/028 Network Attacks and Network Isolation - Arp Spoofing and Switches.mp4 17.7 MB
2 - Network Security/05 Network Attacks Architecture and Isolation/027 Network Attacks and Network Isolation - Introduction and IOT.mp4 15.3 MB
2 - Network Security/05 Network Attacks Architecture and Isolation/026 Goals and Learning Objectives.mp4 1.6 MB
2 - Network Security/06 Wireless and Wi-Fi Security/033 Wi-Fi Weaknesses - WPA WPA2 TKIP and CCMP.mp4 37 MB
2 - Network Security/06 Wireless and Wi-Fi Security/036 Wireless Security - Secure Configuration and Network Isolation.mp4 31.6 MB
2 - Network Security/06 Wireless and Wi-Fi Security/035 Wi-Fi Security Testing.mp4 21.7 MB
2 - Network Security/06 Wireless and Wi-Fi Security/034 Wi-Fi Weaknesses - Wi-Fi Protected Setup WPS Evil Twin and Rouge AP.mp4 15.9 MB
2 - Network Security/06 Wireless and Wi-Fi Security/038 Wireless security - Who is on my Wi-Fi Network.mp4 11.7 MB
2 - Network Security/06 Wireless and Wi-Fi Security/037 Wireless security - RF Isolation and Reduction.mp4 9.4 MB
2 - Network Security/06 Wireless and Wi-Fi Security/032 Wi-Fi Weaknesses - WEP.mp4 8.1 MB
2 - Network Security/06 Wireless and Wi-Fi Security/031 Goals and Learning Objectives.mp4 2.1 MB
2 - Network Security/07 Network Monitoring for Threats/043 Wireshark - Finding malware and hackers - Part 1.mp4 91 MB
2 - Network Security/07 Network Monitoring for Threats/040 Syslog.mp4 80.1 MB
2 - Network Security/07 Network Monitoring for Threats/044 Wireshark - Finding malware and hackers - Part 2.mp4 56 MB
2 - Network Security/07 Network Monitoring for Threats/041 Network Monitoring - Wireshark tcpdump tshark iptables Part 1.mp4 44.6 MB
2 - Network Security/07 Network Monitoring for Threats/042 Network Monitoring - Wireshark tcpdump tshark iptables Part 2.mp4 26.5 MB
2 - Network Security/07 Network Monitoring for Threats/045 Network Monitoring - Wincap NST Netminer and NetWorx.mp4 18.8 MB
2 - Network Security/07 Network Monitoring for Threats/039 Goals and Learning Objectives.mp4 1.4 MB
2 - Network Security/08 How We Are Tracked Online/047 Types of Tracking.mp4 89.8 MB
2 - Network Security/08 How We Are Tracked Online/055 More Tracking.mp4 52 MB
2 - Network Security/08 How We Are Tracked Online/048 IP Address.mp4 46.4 MB
2 - Network Security/08 How We Are Tracked Online/056 Browser and Internet Profiling.mp4 41.8 MB
2 - Network Security/08 How We Are Tracked Online/053 Browser Fingerprinting and Browser Volunteered Information.mp4 37.2 MB
2 - Network Security/08 How We Are Tracked Online/049 3rd Party Connections.mp4 36.6 MB
2 - Network Security/08 How We Are Tracked Online/051 Cookies and Scripts.mp4 33.7 MB
2 - Network Security/08 How We Are Tracked Online/052 Super Cookies.mp4 28.7 MB
2 - Network Security/08 How We Are Tracked Online/050 HTTP Referer.mp4 14.4 MB
2 - Network Security/08 How We Are Tracked Online/054 Browser and Browser Functionality.mp4 13 MB
2 - Network Security/08 How We Are Tracked Online/046 Goals and Learning Objectives.mp4 2 MB
2 - Network Security/09 Search Engines and Privacy/063 Private and Anonymous Searching.mp4 54.3 MB
2 - Network Security/09 Search Engines and Privacy/058 Search Engine Tracking Censorship and Privacy.mp4 53.6 MB
2 - Network Security/09 Search Engines and Privacy/062 YaCy.mp4 42.1 MB
2 - Network Security/09 Search Engines and Privacy/059 Ixquick and Startpage.mp4 33.7 MB
2 - Network Security/09 Search Engines and Privacy/061 Disconnect search.mp4 16.4 MB
2 - Network Security/09 Search Engines and Privacy/060 DuckDuckGo.mp4 11.9 MB
2 - Network Security/09 Search Engines and Privacy/057 Goals and Learning Objectives.mp4 1.6 MB
2 - Network Security/10 Browser Security and Tracking Prevention/081 Firefox Hardening.mp4 142.3 MB
2 - Network Security/10 Browser Security and Tracking Prevention/079 Browser Fingerprinting.mp4 98 MB
2 - Network Security/10 Browser Security and Tracking Prevention/066 Reducing the Browser Attack Surface.mp4 87.7 MB
2 - Network Security/10 Browser Security and Tracking Prevention/070 uBlock origin - HTTP Filters ad and track blockers.mp4 86.3 MB
2 - Network Security/10 Browser Security and Tracking Prevention/076 History Cookies and Super cookies Part 1.mp4 66.7 MB
2 - Network Security/10 Browser Security and Tracking Prevention/077 History Cookies and Super cookies Part 2.mp4 66 MB
2 - Network Security/10 Browser Security and Tracking Prevention/080 Certificates and Encryption.mp4 55.5 MB
2 - Network Security/10 Browser Security and Tracking Prevention/067 Browser Hacking Demo.mp4 46.7 MB
2 - Network Security/10 Browser Security and Tracking Prevention/069 Firefox Security Privacy and Tracking.mp4 41.1 MB
2 - Network Security/10 Browser Security and Tracking Prevention/071 uMatrix - HTTP Filters ad and track blockers.mp4 29.4 MB
2 - Network Security/10 Browser Security and Tracking Prevention/073 ABP Privacy badger WOT - HTTP Filters ad and track blockers.mp4 27.6 MB
2 - Network Security/10 Browser Security and Tracking Prevention/068 Browser Isolation and Compartmentalization.mp4 24.8 MB
2 - Network Security/10 Browser Security and Tracking Prevention/072 Disconnect Ghostery Request policy - HTTP Filters ad and track blockers.mp4 24.6 MB
2 - Network Security/10 Browser Security and Tracking Prevention/074 No-script - HTTP Filters ad and track blockers.mp4 23.1 MB
2 - Network Security/10 Browser Security and Tracking Prevention/075 Policeman and others - HTTP Filters ad and track blockers.mp4 17.7 MB
2 - Network Security/10 Browser Security and Tracking Prevention/065 Which Browser Choice of Browser.mp4 16.9 MB
2 - Network Security/10 Browser Security and Tracking Prevention/078 HTTP Referer.mp4 7.6 MB
2 - Network Security/10 Browser Security and Tracking Prevention/064 Goals and Learning Objectives.mp4 1.9 MB
2 - Network Security/11 Passwords and Authentication Methods/084 How Passwords are Cracked - Hashes - Part 1.mp4 41.1 MB
2 - Network Security/11 Passwords and Authentication Methods/090 Password Managers - LastPass.mp4 26.5 MB
2 - Network Security/11 Passwords and Authentication Methods/094 Multi-Factor Authentication - Soft Tokens - Google Authenticator and Authy.mp4 24.9 MB
2 - Network Security/11 Passwords and Authentication Methods/085 How Passwords are Cracked - Hashcat - Part 2.mp4 24.2 MB
2 - Network Security/11 Passwords and Authentication Methods/093 Creating a Strong Password That You Can Remember - Part 2.mp4 22.6 MB
2 - Network Security/11 Passwords and Authentication Methods/092 Creating a Strong Password That You Can Remember - Part 1.mp4 22.1 MB
2 - Network Security/11 Passwords and Authentication Methods/091 Password Managers - Hardening Lastpass.mp4 15.6 MB
2 - Network Security/11 Passwords and Authentication Methods/095 Multi-Factor Authentication - Hard Tokens - 2FA Dongles.mp4 13.6 MB
2 - Network Security/11 Passwords and Authentication Methods/089 Password Managers - KeePass and KeePassX.mp4 13.5 MB
2 - Network Security/11 Passwords and Authentication Methods/088 Password Managers - Master Password.mp4 11.5 MB
2 - Network Security/11 Passwords and Authentication Methods/083 Password Attacks.mp4 7.5 MB
2 - Network Security/11 Passwords and Authentication Methods/086 Operating System Passwords.mp4 7 MB
2 - Network Security/11 Passwords and Authentication Methods/096 Choosing a Method of Multi-Factor Authentication.mp4 6.2 MB
2 - Network Security/11 Passwords and Authentication Methods/097 Multi-Factor Authentication - Strengths and Weaknesses.mp4 5.1 MB
2 - Network Security/11 Passwords and Authentication Methods/087 Password Managers - An Introduction.mp4 4.1 MB
2 - Network Security/11 Passwords and Authentication Methods/098 The Future of Password and Authentication.mp4 4 MB
2 - Network Security/11 Passwords and Authentication Methods/082 Goals and Learning Objectives.mp4 2.6 MB
2 - Network Security/12 BONUS Section... Whats Next...Volume 3 and 4/102 BONUS Lecture from Volume 3 - Which VPN protocol is best to use and why.mp4 34.6 MB
2 - Network Security/12 BONUS Section... Whats Next...Volume 3 and 4/103 BONUS Lecture from Volume 4 - Email Tracking and Hacking.mp4 26.8 MB
2 - Network Security/12 BONUS Section... Whats Next...Volume 3 and 4/104 BONUS Lecture from Volume 1 - Security Vulnerabilities Threats and Adversaries.mp4 11.8 MB
2 - Network Security/12 BONUS Section... Whats Next...Volume 3 and 4/100 Congratulations.mp4 11.5 MB
2 - Network Security/12 BONUS Section... Whats Next...Volume 3 and 4/099 BONUS - Important Information.mp4 4.5 MB
2 - Network Security/12 BONUS Section... Whats Next...Volume 3 and 4/105 BONUS DISCOUNT COUPONS.html 6 KB
2 - Network Security/12 BONUS Section... Whats Next...Volume 3 and 4/101 Certificate Of Completion for CPEs.html 2 KB
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers
Microsoft Access Networking 2 Maximum Security 337.5 MB 10
[computer-internet] Cryptography and Network Security by Bhushan Trivedi and more EPUB Ebook 6.7 MB 8
[ FreeCourseWeb.com ] Learning eBPF - Programming the Linux Kernel for Enhanced Observability, Networking, and Security (True PDF) Application 4.3 MB 8
[@CyberBankSa] - Fortinet - Network Security Expert (NSE) certifications Bundle - 2023.zip Application 54.6 GB 4
[FTUApps.com] - Nsauditor Network Security Auditor v3.2.6.0 Portable Application 39.2 MB 2
Nsauditor Network Security Auditor 5.1.28.3 + Portable Application 16.5 MB 2
[ FreeCryptoLearn.com ] Proceedings of International Conference on Network Security and Blockchain Technology - ICNSBT 2024 Application 18.4 MB 2
[1Hack.Us] Nmap Network Exploration and Security Auditing Cookbook - Third Edition [eBook] Application 30.2 MB 1
[ FreeCourseWeb.com ] Security and Privacy for Modern Networks Application 3.4 MB 27
Kant A. Ultimate Linux Network Security for Enterprises...2024 Application 9.2 MB 11
[ FreeCourseWeb.com ] Udemy - Palo Alto Networks Firewall - Hands-On Cyber Security Course Video 679.1 MB 8
Rais R. Zero Trust Networks. Building Secure Systems...2ed 2024 Application 8.1 MB 6
[ DevCourseWeb.com ] Udemy - Securing Networks with Cisco Umbrella Video 1.5 GB 5
De Alencar M. Cryptography and Network Security 2022 Application 7.7 MB 3
Network and System Security Application 4.9 MB 3
[ FreeCourseWeb.com ] Admin Network & Security - Issue 71, September - October 2022 Application 58.2 MB 2
McClure S. Hacking Exposed 7. Network Security Secrets & Solutions 7ed 2012 Application 84.3 MB 2
linux-basics-for-hackers-getting-started-with-networking-scripting-and-security-in-kali-1 Application 136.6 MB 2
[ FreeCourseWeb.com ] Lynda - CompTIA Cloud + Cert Prep 2 (CV0-002) - Storage, Compute, Networking, and Security.zip Application 2.2 GB 2
Viega, Messier, Chandra -- Network Security with OpenSSL -- 2009.epub Ebook 1 MB 1

Loading...