[ DevCourseWeb.com ] Udemy - Cybersecurity and Kali Linux - Hands-on course by TechLatest
File List
- ~Get Your Files Here !/7. Module 7 - Wireless Fortification Pentesting Mastery/2. Web App Pentesting Practical.mp4 606.9 MB
- ~Get Your Files Here !/10. Module 10 - Communicating Findings Reporting Mastery/2. Reporting Practical + Conclusion.mp4 270.3 MB
- ~Get Your Files Here !/6. Module 6 - Crack the Code Password Mastery/2. Password Cracking Practical.mp4 252.8 MB
- ~Get Your Files Here !/5. Module 5 - Hacking Mastery Strategic Exploitation/2. Exploitation Practical.mp4 211.8 MB
- ~Get Your Files Here !/9. Module 9 - Human Manipulation Social Engineering/2. Social Engineering Practical.mp4 188.9 MB
- ~Get Your Files Here !/8. Module 8 - Wireless Fortification Pentesting Mastery/2. Wireless Pentesting Practical.mp4 185.1 MB
- ~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/3. Social Media Reconnaissance.mp4 135.4 MB
- ~Get Your Files Here !/4. Module 4 - Infiltration Techniques Mastering Active Reconnaissance/2. Vulnerability Assessment.mp4 115.8 MB
- ~Get Your Files Here !/5. Module 5 - Hacking Mastery Strategic Exploitation/1. Exploitation Introduction.mp4 80.4 MB
- ~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/3. Microsoft Azure Guide..mp4 51.9 MB
- ~Get Your Files Here !/6. Module 6 - Crack the Code Password Mastery/1. Password Cracking Introduction.mp4 46.0 MB
- ~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/2. Google Cloud Platform(GCP) Guide..mp4 45.6 MB
- ~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/1. Amazon Web Services(AWS) Guide..mp4 43.8 MB
- ~Get Your Files Here !/4. Module 4 - Infiltration Techniques Mastering Active Reconnaissance/3. Scanning.mp4 42.8 MB
- ~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/4. Unveiling the Secrets of OS Fingerprinting in Cybersecurity with Kali Linux.mp4 42.7 MB
- ~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/5. Target Validation in Cybersecurity with Kali Linux.mp4 38.0 MB
- ~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/1. Reconnaissance — First Phase of Hacking.mp4 28.6 MB
- ~Get Your Files Here !/1. Module 1 - Course Introduction & Teaser/2. Course Introduction.mp4 27.1 MB
- ~Get Your Files Here !/8. Module 8 - Wireless Fortification Pentesting Mastery/1. Wireless Pentesting Introduction.mp4 23.4 MB
- ~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/6. Subdomain Discovery in Cybersecurity with Kali Linux.mp4 23.3 MB
- ~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/2. Open Source Intelligence(OSINT).mp4 9.0 MB
- ~Get Your Files Here !/1. Module 1 - Course Introduction & Teaser/1. Kali Linux & Cybersecurity Course Trailer.mp4 7.2 MB
- ~Get Your Files Here !/9. Module 9 - Human Manipulation Social Engineering/1. Social Engineering Introduction.mp4 5.9 MB
- ~Get Your Files Here !/7. Module 7 - Wireless Fortification Pentesting Mastery/1. Web App Pentesting Introduction.mp4 2.6 MB
- ~Get Your Files Here !/10. Module 10 - Communicating Findings Reporting Mastery/1. Reporting Introduction.mp4 1.9 MB
- ~Get Your Files Here !/4. Module 4 - Infiltration Techniques Mastering Active Reconnaissance/1. Active Reconnaissance Introduction.mp4 1.8 MB
- ~Get Your Files Here !/7. Module 7 - Wireless Fortification Pentesting Mastery/3. Web App Pentesting Conclusion.mp4 1.3 MB
- ~Get Your Files Here !/8. Module 8 - Wireless Fortification Pentesting Mastery/3. Wireless Pentesting Conclusion.mp4 1.2 MB
- ~Get Your Files Here !/5. Module 5 - Hacking Mastery Strategic Exploitation/3. Exploitation Conclusion.mp4 1.2 MB
- ~Get Your Files Here !/4. Module 4 - Infiltration Techniques Mastering Active Reconnaissance/4. Conclusion.mp4 888.8 KB
- ~Get Your Files Here !/6. Module 6 - Crack the Code Password Mastery/3. Password Cracking Conclusion.mp4 839.6 KB
- ~Get Your Files Here !/9. Module 9 - Human Manipulation Social Engineering/3. Social Engineering Conclusion.mp4 716.5 KB
- ~Get Your Files Here !/Bonus Resources.txt 386 bytes
- ~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/4.1 Unveiling the Secrets of OS Fingerprinting in Cybersecurity with Kali Linux.html 184 bytes
- Get Bonus Downloads Here.url 182 bytes
- ~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/2.1 How to Install Browser Based Kali Linux with 2500+ security apps on Google Cloud Platform(GCP).html 172 bytes
- ~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/1.1 How to Install Browser-Based Kali Linux with 2500+ security apps On Amazon Web Services(AWS).html 170 bytes
- ~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/3.1 How to Install Browser-Based Kali Linux with 2500+ security apps From Azure Marketplace..html 166 bytes
- ~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/6.1 Subdomain Discovery in Cybersecurity with Kali Linux.html 161 bytes
- ~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/5.1 Target Validation in Cybersecurity with Kali Linux.html 159 bytes
- ~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/1.1 Reconnaissance — First Phase of Hacking.html 146 bytes
- ~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/2.1 Open Source Intelligence(OSINT).html 139 bytes
- ~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/3.1 Social Media Reconnaissance.html 136 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.