Name [ DevCourseWeb.com ] Ethical Hacking - Introduction to Ethical Hacking (2023)
File Type video
Size 216.99MB
UpdateDate 2025-3-28
hash *****C17DBBA01CB173AD605DB5D454F0CBFB44
Hot 3
Files Get Bonus Downloads Here.url | 182B ~Get Your Files Here !/01 - Introduction/01 - Locking down the organization.mp4 | 7.78MB ~Get Your Files Here !/01 - Introduction/01 - Locking down the organization.srt | 1.23KB ~Get Your Files Here !/01 - Introduction/02 - Discovering resources.mp4 | 1.47MB ~Get Your Files Here !/01 - Introduction/02 - Discovering resources.srt | 1.40KB ~Get Your Files Here !/01 - Introduction/03 - Hacking ethically.mp4 | 1.34MB ~Get Your Files Here !/01 - Introduction/03 - Hacking ethically.srt | 1.28KB ~Get Your Files Here !/02 - 1. Protect Data in a Digital World/01 - Recognizing elements of information security.mp4 | 7.22MB ~Get Your Files Here !/02 - 1. Protect Data in a Digital World/01 - Recognizing elements of information security.srt | 5.20KB ~Get Your Files Here !/02 - 1. Protect Data in a Digital World/02 - Providing information assurance.mp4 | 6.56MB ~Get Your Files Here !/02 - 1. Protect Data in a Digital World/02 - Providing information assurance.srt | 5.05KB ~Get Your Files Here !/02 - 1. Protect Data in a Digital World/03 - Defending in depth.mp4 | 7.94MB ~Get Your Files Here !/02 - 1. Protect Data in a Digital World/03 - Defending in depth.srt | 5.25KB ~Get Your Files Here !/02 - 1. Protect Data in a Digital World/04 - Using AI and ML in cybersecurity.mp4 | 6.86MB ~Get Your Files Here !/02 - 1. Protect Data in a Digital World/04 - Using AI and ML in cybersecurity.srt | 5.08KB ~Get Your Files Here !/02 - 1. Protect Data in a Digital World/05 - Adapting to the threats.mp4 | 5.16MB ~Get Your Files Here !/02 - 1. Protect Data in a Digital World/05 - Adapting to the threats.srt | 5.28KB ~Get Your Files Here !/02 - 1. Protect Data in a Digital World/06 - Leveraging event correlation.mp4 | 4.13MB ~Get Your Files Here !/02 - 1. Protect Data in a Digital World/06 - Leveraging event correlation.srt | 3.71KB ~Get Your Files Here !/03 - 2. Maintain a Vigilant Posture/01 - Modeling threats.mp4 | 8.57MB ~Get Your Files Here !/03 - 2. Maintain a Vigilant Posture/01 - Modeling threats.srt | 5.70KB ~Get Your Files Here !/03 - 2. Maintain a Vigilant Posture/02 - Using cyber threat intelligence.mp4 | 10.61MB ~Get Your Files Here !/03 - 2. Maintain a Vigilant Posture/02 - Using cyber threat intelligence.srt | 5.83KB ~Get Your Files Here !/03 - 2. Maintain a Vigilant Posture/03 - Following the threat intelligence lifecycle.mp4 | 4.66MB ~Get Your Files Here !/03 - 2. Maintain a Vigilant Posture/03 - Following the threat intelligence lifecycle.srt | 4.80KB ~Get Your Files Here !/03 - 2. Maintain a Vigilant Posture/04 - Managing incidents.mp4 | 6.81MB ~Get Your Files Here !/03 - 2. Maintain a Vigilant Posture/04 - Managing incidents.srt | 6.12KB ~Get Your Files Here !/03 - 2. Maintain a Vigilant Posture/05 - Challenge Hardening guide.mp4 | 2.43MB ~Get Your Files Here !/03 - 2. Maintain a Vigilant Posture/05 - Challenge Hardening guide.srt | 1.00KB ~Get Your Files Here !/03 - 2. Maintain a Vigilant Posture/06 - Solution Hardening guide.mp4 | 1.78MB ~Get Your Files Here !/03 - 2. Maintain a Vigilant Posture/06 - Solution Hardening guide.srt | 1.64KB ~Get Your Files Here !/04 - 3. Summarize Hacking Frameworks/01 - Understanding the cyber kill chain.mp4 | 8.71MB ~Get Your Files Here !/04 - 3. Summarize Hacking Frameworks/01 - Understanding the cyber kill chain.srt | 7.15KB ~Get Your Files Here !/04 - 3. Summarize Hacking Frameworks/02 - Utilizing MITRE ATT&CK.mp4 | 10.02MB ~Get Your Files Here !/04 - 3. Summarize Hacking Frameworks/02 - Utilizing MITRE ATT&CK.srt | 4.81KB ~Get Your Files Here !/04 - 3. Summarize Hacking Frameworks/03 - Analyzing using the diamond model.mp4 | 7.32MB ~Get Your Files Here !/04 - 3. Summarize Hacking Frameworks/03 - Analyzing using the diamond model.srt | 6.23KB ~Get Your Files Here !/04 - 3. Summarize Hacking Frameworks/04 - Identifying adversary behavior.mp4 | 11.54MB ~Get Your Files Here !/04 - 3. Summarize Hacking Frameworks/04 - Identifying adversary behavior.srt | 6.88KB ~Get Your Files Here !/04 - 3. Summarize Hacking Frameworks/05 - Discovering indicators of compromise.mp4 | 10.96MB ~Get Your Files Here !/04 - 3. Summarize Hacking Frameworks/05 - Discovering indicators of compromise.srt | 6.40KB ~Get Your Files Here !/04 - 3. Summarize Hacking Frameworks/06 - Challenge The cyber kill chain.mp4 | 3.07MB ~Get Your Files Here !/04 - 3. Summarize Hacking Frameworks/06 - Challenge The cyber kill chain.srt | 1.92KB ~Get Your Files Here !/04 - 3. Summarize Hacking Frameworks/07 - Solution The cyber kill chain.mp4 | 4.75MB ~Get Your Files Here !/04 - 3. Summarize Hacking Frameworks/07 - Solution The cyber kill chain.srt | 3.79KB ~Get Your Files Here !/05 - 4. Review Security Laws and Standards/01 - Managing risks.mp4 | 5.10MB ~Get Your Files Here !/05 - 4. Review Security Laws and Standards/01 - Managing risks.srt | 4.34KB ~Get Your Files Here !/05 - 4. Review Security Laws and Standards/02 - Asset inventory.mp4 | 9.70MB ~Get Your Files Here !/05 - 4. Review Security Laws and Standards/02 - Asset inventory.srt | 6.35KB ~Get Your Files Here !/05 - 4. Review Security Laws and Standards/03 - Defining information security standards.mp4 | 8.21MB ~Get Your Files Here !/05 - 4. Review Security Laws and Standards/03 - Defining information security standards.srt | 4.98KB ~Get Your Files Here !/05 - 4. Review Security Laws and Standards/04 - Outlining US regulations.mp4 | 6.94MB ~Get Your Files Here !/05 - 4. Review Security Laws and Standards/04 - Outlining US regulations.srt | 5.91KB ~Get Your Files Here !/05 - 4. Review Security Laws and Standards/05 - Exploring global cyber laws and standards.mp4 | 5.53MB ~Get Your Files Here !/05 - 4. Review Security Laws and Standards/05 - Exploring global cyber laws and standards.srt | 5.03KB ~Get Your Files Here !/05 - 4. Review Security Laws and Standards/06 - Challenge Cyber threat information sharing.mp4 | 1.77MB ~Get Your Files Here !/05 - 4. Review Security Laws and Standards/06 - Challenge Cyber threat information sharing.srt | 1.42KB ~Get Your Files Here !/05 - 4. Review Security Laws and Standards/07 - Solution Cyber threat information sharing.mp4 | 3.28MB ~Get Your Files Here !/05 - 4. Review Security Laws and Standards/07 - Solution Cyber threat information sharing.srt | 3.41KB ~Get Your Files Here !/06 - 5. Support Ethical Hacking/01 - Comparing attack types and motives.mp4 | 6.39MB ~Get Your Files Here !/06 - 5. Support Ethical Hacking/01 - Comparing attack types and motives.srt | 5.76KB ~Get Your Files Here !/06 - 5. Support Ethical Hacking/02 - Outlining the types of hackers.mp4 | 7.92MB ~Get Your Files Here !/06 - 5. Support Ethical Hacking/02 - Outlining the types of hackers.srt | 5.96KB ~Get Your Files Here !/06 - 5. Support Ethical Hacking/03 - Recognizing the skills of an ethical hacker.mp4 | 5.91MB ~Get Your Files Here !/06 - 5. Support Ethical Hacking/03 - Recognizing the skills of an ethical hacker.srt | 6.22KB ~Get Your Files Here !/06 - 5. Support Ethical Hacking/04 - Stepping through the hacking phases.mp4 | 7.65MB ~Get Your Files Here !/06 - 5. Support Ethical Hacking/04 - Stepping through the hacking phases.srt | 7.12KB ~Get Your Files Here !/06 - 5. Support Ethical Hacking/05 - Grasping the importance of ethical hacking.mp4 | 6.75MB ~Get Your Files Here !/06 - 5. Support Ethical Hacking/05 - Grasping the importance of ethical hacking.srt | 5.40KB ~Get Your Files Here !/07 - Conclusion/01 - Next steps.mp4 | 2.02MB ~Get Your Files Here !/07 - Conclusion/01 - Next steps.srt | 2.19KB ~Get Your Files Here !/Bonus Resources.txt | 386B