Magnetic link has been copied to the cutting board

Name Lynda - Introduction to Ethical Hacking

File Type video

Size 134.17MB

UpdateDate 2024-7-1

hash *****7C65302FE7AD5D57CB6BE6D2EA29AF908C

Hot 5

Files 01. Introduction/01_01-Welcome.mp4 | 4.99MB 01. Introduction/01_03-Hacking ethically.mp4 | 1.63MB 01. Introduction/01_02-What you should know.mp4 | 678.55KB 02. Ethical Hacking Overview/02_01-Information security.mp4 | 9.25MB 02. Ethical Hacking Overview/02_03-Compare attack types.mp4 | 7.51MB 02. Ethical Hacking Overview/02_02-Threats and attack vectors.mp4 | 6.92MB 03. Information Security Controls/03_05-Creating security policies.mp4 | 10.51MB 03. Information Security Controls/03_03-Managing incidents.mp4 | 9.92MB 03. Information Security Controls/03_04-Exploring security policies.mp4 | 8.83MB 03. Information Security Controls/03_02-Defense in depth.mp4 | 8.35MB 03. Information Security Controls/03_01-Ethical hacking principles.mp4 | 8.28MB 04. Supporting Ethical Hacking/04_05-Hacking concepts.mp4 | 13.76MB 04. Supporting Ethical Hacking/04_02-Common vulnerabilities.mp4 | 12.64MB 04. Supporting Ethical Hacking/04_03-Protecting data.mp4 | 10.56MB 04. Supporting Ethical Hacking/04_01-Understand vulnerabilities.mp4 | 7.16MB 04. Supporting Ethical Hacking/04_06-Hacking phases.mp4 | 6.53MB 04. Supporting Ethical Hacking/04_04-Penetration testing methodology.mp4 | 5.52MB 05. Conclusion/05_01-Next steps.mp4 | 1.13MB

Recommend

Magnetic link has been copied to the cutting board