BITCQ

2 - Network Security

Size: 3.1 GB
Magnet link

Name Size
2 - Network Security/01 Introduction/004 Study Recommendations.mp4 20.8 MB
2 - Network Security/01 Introduction/002 Introduction to the Instructor.mp4 17.3 MB
2 - Network Security/01 Introduction/003 Target Audience.mp4 8.7 MB
2 - Network Security/01 Introduction/001 Welcome to Volume 2.mp4 2.7 MB
2 - Network Security/01 Introduction/005 Course updates.mp4 2.6 MB
2 - Network Security/02 Goals and Learning Objectives - Volume 2/006 Goals and Learning Objectives - Volume 2.mp4 15.9 MB
2 - Network Security/03 Routers - Port and Vulnerability scanning/attached_files/008 The Home Router/OSI-Model-and-TCP-Model.gif 146 KB
2 - Network Security/03 Routers - Port and Vulnerability scanning/010 Internal Vulnerability Scanning - MBSA Nmap Nessus Fing Superscan OpenVAS.mp4 96.5 MB
2 - Network Security/03 Routers - Port and Vulnerability scanning/009 External Vulnerability Scanning - Shodan Qualys Nmap.mp4 93.4 MB
2 - Network Security/03 Routers - Port and Vulnerability scanning/008 The Home Router.mp4 60.6 MB
2 - Network Security/03 Routers - Port and Vulnerability scanning/011 Open Source Custom Router Firmware.mp4 56 MB
2 - Network Security/03 Routers - Port and Vulnerability scanning/007 Goals and Learning Objectives.mp4 2.3 MB
2 - Network Security/04 Firewalls/attached_files/019 Linux - Host Based Firewalls - UFW gufw nftables/iptables-frontends.txt 333 B
2 - Network Security/04 Firewalls/015 Windows - Host Based Firewalls - Windows Firewall.mp4 62.7 MB
2 - Network Security/04 Firewalls/018 Linux - Host Based Firewalls - iptables.mp4 60.8 MB
2 - Network Security/04 Firewalls/019 Linux - Host Based Firewalls - UFW gufw nftables.mp4 49.5 MB
2 - Network Security/04 Firewalls/013 Firewalls Host-based network-based and virtual Part 1.mp4 44.8 MB
2 - Network Security/04 Firewalls/020 Mac - Host based Firewalls - Application Firewall PF.mp4 43.2 MB
2 - Network Security/04 Firewalls/021 Mac - Host based Firewalls - pflist Icefloor Murus.mp4 38.1 MB
2 - Network Security/04 Firewalls/016 Windows - Host Based Firewalls - Windows Firewall Control WFC.mp4 35.7 MB
2 - Network Security/04 Firewalls/017 Windows - Host Based Firewalls - Third Party.mp4 35.3 MB
2 - Network Security/04 Firewalls/025 Network based firewalls - pfSense Smoothwall and Vyos.mp4 28.5 MB
2 - Network Security/04 Firewalls/022 Mac - Host based Firewalls - Little Snitch.mp4 25.2 MB
2 - Network Security/04 Firewalls/024 Network based firewalls - Hardware.mp4 19.7 MB
2 - Network Security/04 Firewalls/014 Firewalls Host-based network-based and virtual Part 2.mp4 16.3 MB
2 - Network Security/04 Firewalls/023 Network based firewalls - Routers - DD-WRT.mp4 15.1 MB
2 - Network Security/04 Firewalls/012 Goals and Learning Objectives.mp4 2.3 MB
2 - Network Security/05 Network Attacks Architecture and Isolation/029 Effective Network Isolation Part 1.mp4 35 MB
2 - Network Security/05 Network Attacks Architecture and Isolation/030 Effective Network Isolation Part 2.mp4 23.8 MB
2 - Network Security/05 Network Attacks Architecture and Isolation/028 Network Attacks and Network Isolation - Arp Spoofing and Switches.mp4 17.7 MB
2 - Network Security/05 Network Attacks Architecture and Isolation/027 Network Attacks and Network Isolation - Introduction and IOT.mp4 15.3 MB
2 - Network Security/05 Network Attacks Architecture and Isolation/026 Goals and Learning Objectives.mp4 1.6 MB
2 - Network Security/06 Wireless and Wi-Fi Security/033 Wi-Fi Weaknesses - WPA WPA2 TKIP and CCMP.mp4 37 MB
2 - Network Security/06 Wireless and Wi-Fi Security/036 Wireless Security - Secure Configuration and Network Isolation.mp4 31.6 MB
2 - Network Security/06 Wireless and Wi-Fi Security/035 Wi-Fi Security Testing.mp4 21.7 MB
2 - Network Security/06 Wireless and Wi-Fi Security/034 Wi-Fi Weaknesses - Wi-Fi Protected Setup WPS Evil Twin and Rouge AP.mp4 15.9 MB
2 - Network Security/06 Wireless and Wi-Fi Security/038 Wireless security - Who is on my Wi-Fi Network.mp4 11.7 MB
2 - Network Security/06 Wireless and Wi-Fi Security/037 Wireless security - RF Isolation and Reduction.mp4 9.4 MB
2 - Network Security/06 Wireless and Wi-Fi Security/032 Wi-Fi Weaknesses - WEP.mp4 8.1 MB
2 - Network Security/06 Wireless and Wi-Fi Security/031 Goals and Learning Objectives.mp4 2.1 MB
2 - Network Security/07 Network Monitoring for Threats/043 Wireshark - Finding malware and hackers - Part 1.mp4 91 MB
2 - Network Security/07 Network Monitoring for Threats/040 Syslog.mp4 80.1 MB
2 - Network Security/07 Network Monitoring for Threats/044 Wireshark - Finding malware and hackers - Part 2.mp4 56 MB
2 - Network Security/07 Network Monitoring for Threats/041 Network Monitoring - Wireshark tcpdump tshark iptables Part 1.mp4 44.6 MB
2 - Network Security/07 Network Monitoring for Threats/042 Network Monitoring - Wireshark tcpdump tshark iptables Part 2.mp4 26.5 MB
2 - Network Security/07 Network Monitoring for Threats/045 Network Monitoring - Wincap NST Netminer and NetWorx.mp4 18.8 MB
2 - Network Security/07 Network Monitoring for Threats/039 Goals and Learning Objectives.mp4 1.4 MB
2 - Network Security/08 How We Are Tracked Online/047 Types of Tracking.mp4 89.8 MB
2 - Network Security/08 How We Are Tracked Online/055 More Tracking.mp4 52 MB
2 - Network Security/08 How We Are Tracked Online/048 IP Address.mp4 46.4 MB
2 - Network Security/08 How We Are Tracked Online/056 Browser and Internet Profiling.mp4 41.8 MB
2 - Network Security/08 How We Are Tracked Online/053 Browser Fingerprinting and Browser Volunteered Information.mp4 37.2 MB
2 - Network Security/08 How We Are Tracked Online/049 3rd Party Connections.mp4 36.6 MB
2 - Network Security/08 How We Are Tracked Online/051 Cookies and Scripts.mp4 33.7 MB
2 - Network Security/08 How We Are Tracked Online/052 Super Cookies.mp4 28.7 MB
2 - Network Security/08 How We Are Tracked Online/050 HTTP Referer.mp4 14.4 MB
2 - Network Security/08 How We Are Tracked Online/054 Browser and Browser Functionality.mp4 13 MB
2 - Network Security/08 How We Are Tracked Online/046 Goals and Learning Objectives.mp4 2 MB
2 - Network Security/09 Search Engines and Privacy/063 Private and Anonymous Searching.mp4 54.3 MB
2 - Network Security/09 Search Engines and Privacy/058 Search Engine Tracking Censorship and Privacy.mp4 53.6 MB
2 - Network Security/09 Search Engines and Privacy/062 YaCy.mp4 42.1 MB
2 - Network Security/09 Search Engines and Privacy/059 Ixquick and Startpage.mp4 33.7 MB
2 - Network Security/09 Search Engines and Privacy/061 Disconnect search.mp4 16.4 MB
2 - Network Security/09 Search Engines and Privacy/060 DuckDuckGo.mp4 11.9 MB
2 - Network Security/09 Search Engines and Privacy/057 Goals and Learning Objectives.mp4 1.6 MB
2 - Network Security/10 Browser Security and Tracking Prevention/081 Firefox Hardening.mp4 142.3 MB
2 - Network Security/10 Browser Security and Tracking Prevention/079 Browser Fingerprinting.mp4 98 MB
2 - Network Security/10 Browser Security and Tracking Prevention/066 Reducing the Browser Attack Surface.mp4 87.7 MB
2 - Network Security/10 Browser Security and Tracking Prevention/070 uBlock origin - HTTP Filters ad and track blockers.mp4 86.3 MB
2 - Network Security/10 Browser Security and Tracking Prevention/076 History Cookies and Super cookies Part 1.mp4 66.7 MB
2 - Network Security/10 Browser Security and Tracking Prevention/077 History Cookies and Super cookies Part 2.mp4 66 MB
2 - Network Security/10 Browser Security and Tracking Prevention/080 Certificates and Encryption.mp4 55.5 MB
2 - Network Security/10 Browser Security and Tracking Prevention/067 Browser Hacking Demo.mp4 46.7 MB
2 - Network Security/10 Browser Security and Tracking Prevention/069 Firefox Security Privacy and Tracking.mp4 41.1 MB
2 - Network Security/10 Browser Security and Tracking Prevention/071 uMatrix - HTTP Filters ad and track blockers.mp4 29.4 MB
2 - Network Security/10 Browser Security and Tracking Prevention/073 ABP Privacy badger WOT - HTTP Filters ad and track blockers.mp4 27.6 MB
2 - Network Security/10 Browser Security and Tracking Prevention/068 Browser Isolation and Compartmentalization.mp4 24.8 MB
2 - Network Security/10 Browser Security and Tracking Prevention/072 Disconnect Ghostery Request policy - HTTP Filters ad and track blockers.mp4 24.6 MB
2 - Network Security/10 Browser Security and Tracking Prevention/074 No-script - HTTP Filters ad and track blockers.mp4 23.1 MB
2 - Network Security/10 Browser Security and Tracking Prevention/075 Policeman and others - HTTP Filters ad and track blockers.mp4 17.7 MB
2 - Network Security/10 Browser Security and Tracking Prevention/065 Which Browser Choice of Browser.mp4 16.9 MB
2 - Network Security/10 Browser Security and Tracking Prevention/078 HTTP Referer.mp4 7.6 MB
2 - Network Security/10 Browser Security and Tracking Prevention/064 Goals and Learning Objectives.mp4 1.9 MB
2 - Network Security/11 Passwords and Authentication Methods/084 How Passwords are Cracked - Hashes - Part 1.mp4 41.1 MB
2 - Network Security/11 Passwords and Authentication Methods/090 Password Managers - LastPass.mp4 26.5 MB
2 - Network Security/11 Passwords and Authentication Methods/094 Multi-Factor Authentication - Soft Tokens - Google Authenticator and Authy.mp4 24.9 MB
2 - Network Security/11 Passwords and Authentication Methods/085 How Passwords are Cracked - Hashcat - Part 2.mp4 24.2 MB
2 - Network Security/11 Passwords and Authentication Methods/093 Creating a Strong Password That You Can Remember - Part 2.mp4 22.6 MB
2 - Network Security/11 Passwords and Authentication Methods/092 Creating a Strong Password That You Can Remember - Part 1.mp4 22.1 MB
2 - Network Security/11 Passwords and Authentication Methods/091 Password Managers - Hardening Lastpass.mp4 15.6 MB
2 - Network Security/11 Passwords and Authentication Methods/095 Multi-Factor Authentication - Hard Tokens - 2FA Dongles.mp4 13.6 MB
2 - Network Security/11 Passwords and Authentication Methods/089 Password Managers - KeePass and KeePassX.mp4 13.5 MB
2 - Network Security/11 Passwords and Authentication Methods/088 Password Managers - Master Password.mp4 11.5 MB
2 - Network Security/11 Passwords and Authentication Methods/083 Password Attacks.mp4 7.5 MB
2 - Network Security/11 Passwords and Authentication Methods/086 Operating System Passwords.mp4 7 MB
2 - Network Security/11 Passwords and Authentication Methods/096 Choosing a Method of Multi-Factor Authentication.mp4 6.2 MB
2 - Network Security/11 Passwords and Authentication Methods/097 Multi-Factor Authentication - Strengths and Weaknesses.mp4 5.1 MB
2 - Network Security/11 Passwords and Authentication Methods/087 Password Managers - An Introduction.mp4 4.1 MB
2 - Network Security/11 Passwords and Authentication Methods/098 The Future of Password and Authentication.mp4 4 MB
2 - Network Security/11 Passwords and Authentication Methods/082 Goals and Learning Objectives.mp4 2.6 MB
2 - Network Security/12 BONUS Section... Whats Next...Volume 3 and 4/102 BONUS Lecture from Volume 3 - Which VPN protocol is best to use and why.mp4 34.6 MB
2 - Network Security/12 BONUS Section... Whats Next...Volume 3 and 4/103 BONUS Lecture from Volume 4 - Email Tracking and Hacking.mp4 26.8 MB
2 - Network Security/12 BONUS Section... Whats Next...Volume 3 and 4/104 BONUS Lecture from Volume 1 - Security Vulnerabilities Threats and Adversaries.mp4 11.8 MB
2 - Network Security/12 BONUS Section... Whats Next...Volume 3 and 4/100 Congratulations.mp4 11.5 MB
2 - Network Security/12 BONUS Section... Whats Next...Volume 3 and 4/099 BONUS - Important Information.mp4 4.5 MB
2 - Network Security/12 BONUS Section... Whats Next...Volume 3 and 4/105 BONUS DISCOUNT COUPONS.html 6 KB
2 - Network Security/12 BONUS Section... Whats Next...Volume 3 and 4/101 Certificate Of Completion for CPEs.html 2 KB
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers
[ FreeCourseWeb.com ] Security and Privacy for Modern Networks Application 3.4 MB 27
Kant A. Ultimate Linux Network Security for Enterprises...2024 Application 9.2 MB 11
[ FreeCourseWeb.com ] Udemy - Palo Alto Networks Firewall - Hands-On Cyber Security Course Video 679.1 MB 8
Rais R. Zero Trust Networks. Building Secure Systems...2ed 2024 Application 8.1 MB 6
[ DevCourseWeb.com ] Udemy - Securing Networks with Cisco Umbrella Video 1.5 GB 5
De Alencar M. Cryptography and Network Security 2022 Application 7.7 MB 3
[ FreeCourseWeb.com ] Admin Network & Security - Issue 71, September - October 2022 Application 58.2 MB 2
linux-basics-for-hackers-getting-started-with-networking-scripting-and-security-in-kali-1 Application 136.6 MB 2
[ FreeCourseWeb.com ] Lynda - CompTIA Cloud + Cert Prep 2 (CV0-002) - Storage, Compute, Networking, and Security.zip Application 2.2 GB 2
Viega, Messier, Chandra -- Network Security with OpenSSL -- 2009.epub Ebook 1 MB 1
Nmap Network Exploration and Security Auditing Cookbook, 3rd Edition Ebook 5.2 MB 18
[ CourseMega.com ] Admin Network & Security - Issue 68, 2022 (true PDF) Application 38.8 MB 9
Khatib M. Wireless Mesh Networks. Security, Architectures...2020 Application 19.9 MB 8
Nmap Network Exploration and Security Auditing Cookbook, 3rd Edition Application 30.2 MB 6
[ CourseMega.com ] Admin Network & Security - Issue 66, 2021 Application 76.1 MB 5
Learning Cryptography and Network Security Video 296.2 MB 75
[ FreeCourseWeb.com ] Computer Network Security and Cyber Ethics, 4th edition.zip Application 2.3 MB 46
Computer Hacking Beginners Guide How To Hack Wireless Network Basic Security And Penetration Testing Application 6.3 MB 17
Stallings W. Cryptography and Network Security 7ed 2016 Link to Sol. Man Application 9 MB 13
Achary R. Cryptography And Networking Security. An Introd. 2021 Application 20.7 MB 11

Loading...