Certified Ethical Hacker (CEH) - Linux Academy Acloud Guru

  • Category Other
  • Type Tutorials
  • Language english
  • Total size 13.2 GB
  • Uploaded By notimmune
  • Downloads 936
  • Last checked 22 hours ago
  • Date uploaded 22 hours ago
  • Seeders 31
  • Leechers 14


Info Hash : 72A9519786BD951F81D364B2264F73237898AF87


Files:

Certified Ethical Hacker (CEH) - Linux Academy Acloud Guru
  • udp://tracker.opentrackr.org:1337/announce
  • http://bt.okmp3.ru:2710/announce
  • udp://u4.trakx.crim.ist:1337/announce
  • udp://wepzone.net:6969/announce
  • udp://ttk2.nbaonlineservice.com:6969/announce
  • https://tracker.yemekyedim.com:443/announce
  • https://tracker.gcrenwp.top:443/announce
  • https://tracker.bjut.jp:443/announce
  • https://api.ipv4online.uk:443/announce
  • https://tr.zukizuki.org:443/announce
  • https://tracker.moeking.me:443/announce
  • http://tracker.renfei.net:8080/announce
  • http://fleira.no:6969/announce
  • https://tr.nyacat.pw:443/announce
  • udp://tracker.gmi.gd:6969/announce

Code:

  • 015_Data_Backup.mp4 (222.9 MB)
  • 001_Chapter_Introduction.mp4 (57.4 MB)
  • 002_Information_Assurance.mp4 (135.0 MB)
  • 003_EISA_and_Information_security_management_program.mp4 (118.5 MB)
  • 004_Network_Zoning.mp4 (155.7 MB)
  • 005_Defense_in_Depth.mp4 (130.9 MB)
  • 006_What_Sort_of_Things_Do_Policies_Regulate.mp4 (150.1 MB)
  • 007_Workplace_Security_Policies_and_Examples.mp4 (108.2 MB)
  • 008_Physical_Security_Controls_and_Risk.mp4 (116.3 MB)
  • 009_Risk_Management.mp4 (127.2 MB)
  • 010_Threat_Modeling_and_Incident_Management.mp4 (212.6 MB)
  • 011_UBA_-_User_Behavior_Analytics_and_Network_Security_Controls.mp4 (83.5 MB)
  • 012_Access_Controls.mp4 (83.4 MB)
  • 013_Identification_Authentication_Authorization_Accounting_and_IAM.mp4 (122.2 MB)
  • 014_Data_Leakage.mp4 (98.4 MB)
  • 016_Data_Recovery.mp4 (28.0 MB)
  • 017_QUIZ_SOLUTION_Protecting_Information_-_Questions_answered_and_explained.mp4 (87.0 MB)
  • 001_Certified_Ethical_Hacker_(CEH)_-_Linux_Academys_Prep_Course_PDF.pdf (5.5 MB)
  • 001_Module_1.docx (1.1 MB)
  • 001_Module_2.docx (23.9 KB)
  • 001_Module_3.docx (16.7 KB)
  • 001_Module_4.docx (28.5 KB)
  • 001_Module_5.docx (22.0 KB)
  • 001_Module_6.docx (19.6 KB)
  • 001_Module_7.docx (21.3 KB)
  • 001_Module_8.docx (36.3 KB)
  • 001_Module_9.docx (20.3 KB)
  • 002_About_the_Author.mp4 (22.6 MB)
  • 003_Course_Requirements.mp4 (55.8 MB)
  • 004_How_to_Get_Help.mp4 (71.2 MB)
  • 005_About_the_Exam.mp4 (134.3 MB)
  • 001_About_the_Course.mp4 (80.8 MB)
  • 001_Chapter_Introduction.mp4 (28.2 MB)
  • 002_Common_Terms_(Hack_Value_Vulnerability_Exploit_Payload).mp4 (62.0 MB)
  • 003_Zero_Day_Attack.mp4 (64.1 MB)
  • 004_Daisy_Chaining.mp4 (86.2 MB)
  • 005_Module_1_Study_Guide.docx (1.1 MB)
  • 005_QUIZ_SOLUTION_Overview_of_Information_Security_-_Questions_answered_and_explained.mp4 (58.1 MB)
  • 001_Chapter_Introduction.mp4 (8.8 MB)
  • 002_Threats_vs_Attacks.mp4 (28.7 MB)
  • 003_Motives_and_Reasons_Behind_Cyber_Security_Attacks.mp4 (30.6 MB)
  • 004_What_Are_the_Means_by_Which_Hackers_Gain_Access_to_Systems_and_Networks.mp4 (29.0 MB)
  • 005_Cloud_Computing_Threats.mp4 (75.2 MB)
  • 006_Advanced_Persistent_Threats.mp4 (24.0 MB)
  • 007_Viruses_and_Worms.mp4 (37.9 MB)
  • 008_Ransomware.mp4 (60.2 MB)
  • 009_Mobile_Threats.mp4 (42.5 MB)
  • 010_Modern_Age_Information_Warfare.mp4 (53.1 MB)
  • 011_Insider_Attacks.mp4 (20.8 MB)
  • 012_Phishing.mp4 (27.5 MB)
  • 013_Web_Application_Threats.mp4 (28.5 MB)
  • 014_Classification_of_Threats_Network_Threats.mp4 (32.7 MB)
  • 015_Clasification_of_Threats_Host_Threats.mp4 (27.8 MB)
  • 016_Clasification_of_Threats_Application_Threats.mp4 (23.9 MB)
  • 017_Classification_of_Attacks.mp4 (141.1 MB)
  • 018_Botnets.mp4 (34.0 MB)
  • 019_Laws_Standards_and_Regulations.mp4 (132.6 MB)
  • 020_QUIZ_SOLUTION_Overview_of_Information_Security_Threats_and_Attacks_-_Questions_answered_and_explained.mp4 (67.0 MB)
  • 001_A_Brief_Look_at_the_History_of_Hacking.mp4 (118.9 MB)
  • 002_Types_of_Hackers.mp4 (85.8 MB)
  • 003_What_is_Ethical_Hacking_What_is_Its_Purpose.mp4 (28.4 MB)
  • 004_Scope_of_Ethical_Hacking.mp4 (36.5 MB)
  • 005_Hacking_Stages_Reconnaissance.mp4 (24.7 MB)
  • 006_Hacking_Stages_Scanning.mp4 (18.8 MB)
  • 007_Hacking_Stages_Gaining_Access.mp4 (6.5 MB)
  • 008_Hacking_Stages_Maintaining_Access.mp4 (32.7 MB)
  • 009_Hacking_Stages_Clearing_Tracks.mp4 (29.5 MB)
  • 010_QUIZ_SOLUTION__History_of_Hacking_-_Questions_answered_and_explained.mp4 (82.4 MB)
  • 001_What_Is_Penetration_Testing.mp4 (37.8 MB)
  • 002_What_Does_a_Good_Penetration_Test_Consist_of.mp4 (129.8 MB)
  • 003_Why_Do_a_Penetration_Test.mp4 (123.5 MB)
  • 004_Pre-Attack_Phase_Contracts.mp4 (29.9 MB)
  • 005_Audit_vs_Vulnerability_Assessment_vs_Penetration_Test.mp4 (26.5 MB)
  • 006_Red_vs_Blue_Team.mp4 (32.1 MB)
  • 007_Types_of_Penetration_Testing.mp4 (80.4 MB)
  • 008_Pre-Attack_Phase_Rules_of_Engagement.mp4 (26.3 MB)
  • 009_Pre-Attack_Phase_Understanding_your_Clients_requirements.mp4 (43.7 MB)
  • 010_Pre-Attack_Phase_Scope_of_a_Penetration_Test.mp4 (76.7 MB)
  • 011_Pre-Attack_Phase_Information_Gathering.mp4 (70.8 MB)
  • 012_Pre-Attack_Phase_Two_Types_of_Information_Gathering.mp4 (60.5 MB)
  • 013_Attack_Phase.mp4 (15.9 MB)
  • 014_Attack_Phase_Penetrating_the_Perimeter.mp4 (46.6 MB)
  • 015_Attack_Phase_Target_Acquisition.mp4 (30.7 MB)
  • 016_Attack_Phase_Privilege_Escalation.mp4 (31.8 MB)
  • 017_Attack_Phase_Execute_Implant_Retract.mp4 (36.6 MB)
  • 018_Post-Attack_Phase.mp4 (23.5 MB)
  • 019_Security_Testing_Methodologies.mp4 (77.5 MB)
  • 020_QUIZ_SOLUTION_Penetration_Testing_-_Questions_answered_and_explained.mp4 (65.2 MB)
  • 001_About_Footprinting.mp4 (33.9 MB)
  • 002_Hacker_State_of_Mind.mp4 (59.9 MB)
  • 003_Search_Engine_and_Online_Resources.mp4 (196.4 MB)
  • 004_Whois_GeoIpLocation_and_DNS_Interogation.mp4 (145.6 MB)
  • 005_Email_Header_Analysis.mp4 (164.3 MB)
  • 006_Getting_an_IP_Address_from_an_Email_and_More.mp4 (167.2 MB)
  • 007_Quick_Look_at_a_Website_Certificate_Source_Code_and_Traffic.mp4 (169.7 MB)
  • 008_How_to_Clone_a_Website_and_Extract_Metadata_from_Files.mp4 (186.0 MB)
  • 009_Nmap_and_Traceroute.mp4 (201.1 MB)
  • 010_QUIZ_SOLUTION_Footprinting_-_Questions_answered_and_explained.mp4 (55.0 MB)
  • 001_Countermeasures_and_Best_Practices.mp4 (121.5 MB)
  • 002_What_Goes_into_a_Footprinting_Report.mp4 (56.5 MB)
  • 003_QUIZ_SOLUTION_Reports_and_Countermeasures_-_Questions_answered_and_explained.mp4 (50.0 MB)
  • 001_Banner_Grabbing.mp4 (54.8 MB)
  • 002_Drawing_and_Mapping_Out_Network_Topologies.mp4 (97.2 MB)
  • 003_Scanning_for_Vulnerabilities.mp4 (143.0 MB)
  • 004_Enumeration.mp4 (72.2 MB)
  • 005_QUIZ_SOLUTION_Network_Scanning_Techniques_-_Questions_answered_and_explained.mp4 (56.9 MB)
  • 001_Password_Cracking_Crunch_and_Some_Basics.mp4 (169.8 MB)
  • 002_Using_Hydra_for_online_password_cracking.mp4 (181.5 MB)
  • 003_Hashcat_Environment_Setup.mp4 (178.2 MB)
  • 004_HashCat_Installation.mp4 (78.9 MB)
  • 005_HashCat_Let_Us_Crack_Some_Passwords.mp4 (166.3 MB)
  • 006_HashCat_Results_and_Recap.mp4 (122.9 MB)
  • 007_QUIZ_SOLUTION_Password_Cracking_Techniques_-_Questions_answered_and_explained.mp4 (78.3 MB)
  • 001_Reverse_Shell_and_Remote_Service_Exploitation.mp4 (185.0 MB)
  • 002_Keylogger_Intro_and_Environment_Setup.mp4 (117.9 MB)
  • 003_Keylogger_Source_Code_Download_and_Import.mp4 (50.8 MB)
  • 004_Keylogger_Configuration.mp4 (79.5 MB)
  • 005_Keylogger_Demo.mp4 (134.0 MB)
  • 006_Decrypting_Keylogger_Logs.mp4 (91.2 MB)
  • 007_QUIZ_SOLUTION_Persistent_Remote_Access_-_Questions_Answered_and_Explained.mp4 (54.7 MB)
  • 001_SandBox.mp4 (173.8 MB)
  • 002_How_to_Create_a_Safe_Sandbox_Environment.mp4 (133.0 MB)
  • 003_Anti-Malware_Software_Overview.mp4 (109.4 MB)
  • 004_Packing_Malware.mp4 (125.8 MB)
  • 005_Rootkits.mp4 (68.8 MB)
  • 006_Hiding_Files_and_Steganography.mp4 (115.9 MB)
  • 007_QUIZ_SOLUTION_Hiding_Malicious_Programs_-_Questions_Answered_and_Explained.mp4 (38.1 MB)
  • 001_Log_Files_Covering_Your_Tracks.mp4 (135.9 MB)
  • 002_QUIZ_SOLUTION_Covering_Tracks_and_Destroying_Evidence_-_Questions_Answered_and_Explained.mp4 (68.3 MB)
  • 001_ARP_Spoofing.mp4 (174.4 MB)
  • 002_MAC_Address_Spoofing.mp4 (120.1 MB)
  • 003_DHCP_Starvation.mp4 (71.4 MB)
  • 004_QUIZ_SOLUTION_Sniffing_Techniques_-_Questions_Answered_and_Explained.mp4 (101.1 MB)
  • 001_Capturing_the_WPA2_Handshake.mp4 (145.1 MB)
  • 002_Cracking_WPA2_Passkey.mp4 (161.9 MB)
  • 003_QUIZ_SOLUTION_Wireless_Networks_-_Questions_Answered_and_Explained.mp4 (76.7 MB)
  • 001_Social_Engineering.mp4 (169.8 MB)
  • 002_Well_Known_Social_Engineering_Attacks_A_Retrospective.mp4 (114.3 MB)
  • 003_QUIZ_SOLUTION_Social_Engineering_-_Questions_Answered_and_Explained.mp4 (58.9 MB)
  • 001_What_Is_a_Firewall_How_Does_It_Work.mp4 (90.1 MB)
  • 002_Firewall_Usage_Logging_and_Configuration.mp4 (110.6 MB)
  • 003_Evading_Firewall_GeoIpBock.mp4 (176.1 MB)
  • 004_QUIZ_SOLUTION_Firewalls_-_Questions_answered_and_explained.mp4 (59.5 MB)
  • 001_How_to_Set_Up_a_Honeypot.mp4 (137.1 MB)
  • 002_How_to_grab_traffic_from_a_Honeypot.mp4 (130.3 MB)
  • 003_QUIZ_SOLUTION_Honeypots_-_Questions_Answered_and_Explained.mp4 (53.4 MB)
  • 001_OWASP_-_Open_Web_Application_Security_Project.mp4 (49.9 MB)
  • 002_XSS_Cross_Site_Scripting.mp4 (127.7 MB)
  • 003_SQL_Injections.mp4 (171.9 MB)
  • 004_QUIZ_SOLUTION_Attacking_Web_Servers_and_Web_Applications_-_Questions_Answered_and_Explained.mp4 (57.7 MB)
  • 001_Cryptography_Basics.mp4 (75.4 MB)
  • 002_Cryptography_Common_Algorithms__and_Message_Digest.mp4 (93.8 MB)
  • 003_PKI_Public_Key_Infrastructure.mp4 (72.3 MB)
  • 001_Cryptanalysis_and_Attack_Vectors.mp4 (104.9 MB)
  • 002_Checksum_and_File_Encryption.mp4 (131.6 MB)
  • 003_SSH_RSA_Demo.mp4 (146.8 MB)
  • 004_Storage_Medium_Encryption.mp4 (141.2 MB)
  • 005_QUIZ_SOLUTION_Cryptography_-_Questions_Answered_and_Explained.mp4 (54.5 MB)
  • 001_Final_Practice_Exam.mp4 (59.9 MB)
  • 001_Final_Practice_Exam_Question_and_Answer_overview_part_1.mp4 (114.2 MB)
  • 002_Final_Practice_exam_Question_and_Answer_overview_part_2.mp4 (68.7 MB)
  • 003_Final_Practice_exam_Question_and_Answer_overview_part_3.mp4 (111.4 MB)
  • 004_Final_Practice_exam_Question_and_Answer_overview_part_4.mp4 (112.9 MB)