The Absolute Beginners Guide to Cyber Security 2023 - part 1
- CategoryOther
- TypeTutorials
- LanguageEnglish
- Total size2.8 GB
- Uploaded BySeedHash
- Downloads54
- Last checkedDec. 08th '23
- Date uploadedDec. 08th '23
- Seeders 16
- Leechers19
The Absolute Beginners Guide to Cyber Security 2023
Join For More :- https://t.me/SeedHash
Learn Cyber Security concepts such as hacking, malware, firewalls, worms, phishing, encryption, biometrics, BYOD & more
Code:
What you'll learn
Understand the basic concepts and terminologies used in the information and cyber security fields
Take up entry roles for IT and Cybersecurity Positions
Differentiate between the various forms of malware and how they affect computers and networks
Understand the basic concepts and terminologies used in the information and cyber security fields
Take up entry roles for IT and Cybersecurity Positions
Differentiate between the various forms of malware and how they affect computers and networks
Files:
The Absolute Beginners Guide to Cyber Security - Part 1 01 - Welcome to the Course- 001 Welcome to the Course.mp4 (139.9 MB)
- 001 Welcome to the Course_en.srt (13.4 KB)
- 002 Who Am I Meet your Instructor.mp4 (26.6 MB)
- 002 Who Am I Meet your Instructor_en.srt (19.5 KB)
- 003 Connect with Me.mp4 (11.3 MB)
- 003 Connect with Me_en.srt (4.3 KB)
- 004 Download the Guide Book.html (0.1 KB)
- 004 The-Absolute-Beginners-Guide-to-Cyber-Security-Hand-Book.pdf (5.3 MB)
- 138913 (135.7 KB)
- 1034899 (1,010.6 KB)
- 435877 (425.7 KB)
- 1028644 (1,004.5 KB)
- 727716 (710.7 KB)
- 1044198 (1,019.7 KB)
- 1048487 (1,023.9 KB)
- 741622 (724.2 KB)
- 1030902 (1,006.7 KB)
- 1042062 (1,017.6 KB)
- 839752 (820.1 KB)
- 1043300 (1,018.8 KB)
- 1046118 (1,021.6 KB)
- 394089 (384.9 KB)
- 1036975 (1,012.7 KB)
- 284953 (278.3 KB)
- 1038324 (1,014.0 KB)
- 581569 (567.9 KB)
- 1042912 (1,018.5 KB)
- 1048536 (1,024.0 KB)
- 421942 (412.1 KB)
- 1047087 (1,022.5 KB)
- 577687 (564.1 KB)
- 1038222 (1,013.9 KB)
- 346572 (338.4 KB)
- 1038199 (1,013.9 KB)
- 543798 (531.1 KB)
- 1037286 (1,013.0 KB)
- 337444 (329.5 KB)
- 1038217 (1,013.9 KB)
- 543047 (530.3 KB)
- 1028229 (1,004.1 KB)
- 778039 (759.8 KB)
- 1022119 (998.2 KB)
- 999739 (976.3 KB)
- 1047418 (1,022.9 KB)
- 596592 (582.6 KB)
- 1040999 (1,016.6 KB)
- 771208 (753.1 KB)
- 1027257 (1,003.2 KB)
- 17552 (17.1 KB)
- 1029102 (1,005.0 KB)
- 8323 (8.1 KB)
- 1041127 (1,016.7 KB)
- 426422 (416.4 KB)
- 1039968 (1,015.6 KB)
- 447428 (436.9 KB)
- 1042605 (1,018.2 KB)
- 925143 (903.5 KB)
- 1041098 (1,016.7 KB)
- 268006 (261.7 KB)
- 1040320 (1,015.9 KB)
- 472717 (461.6 KB)
- 1033228 (1,009.0 KB)
- 52848 (51.6 KB)
- 1046575 (1,022.0 KB)
- 836095 (816.5 KB)
- 1040579 (1,016.2 KB)
- 519138 (507.0 KB)
- 1039027 (1,014.7 KB)
- 642554 (627.5 KB)
- 1041961 (1,017.5 KB)
- 602206 (588.1 KB)
- 1029970 (1,005.8 KB)
- 992146 (968.9 KB)
- 1041028 (1,016.6 KB)
- 956113 (933.7 KB)
- 1047293 (1,022.7 KB)
- 259719 (253.6 KB)
- 1041356 (1,016.9 KB)
- 895155 (874.2 KB)
- 1043131 (1,018.7 KB)
- 189059 (184.6 KB)
- 1042763 (1,018.3 KB)
- 539743 (527.1 KB)
- 1041110 (1,016.7 KB)
- 326569 (318.9 KB)
- 1039563 (1,015.2 KB)
- 834150 (814.6 KB)
- 1039464 (1,015.1 KB)
- 266798 (260.5 KB)
- 1037838 (1,013.5 KB)
- 527282 (514.9 KB)
- 1029835 (1,005.7 KB)
- 929933 (908.1 KB)
- 1045546 (1,021.0 KB)
- 1006778 (983.2 KB)
- 1041993 (1,017.6 KB)
- 682144 (666.2 KB)
- 1042330 (1,017.9 KB)
- 419080 (409.3 KB)
- 1034925 (1,010.7 KB)
- 40730 (39.8 KB)
- 1038848 (1,014.5 KB)
- 257399 (251.4 KB)
- 1044912 (1,020.4 KB)
- 815168 (796.1 KB)
- 1043065 (1,018.6 KB)
- 489440 (478.0 KB)
- 1044624 (1,020.1 KB)
- 73533 (71.8 KB)
- 1037121 (1,012.8 KB)
- 586396 (572.7 KB)
- 1040912 (1,016.5 KB)
- 612989 (598.6 KB)
- 1040529 (1,016.1 KB)
- 841135 (821.4 KB)
- 1042524 (1,018.1 KB)
- 1046011 (1,021.5 KB)
- 1024198 (1,000.2 KB)
- 1031471 (1,007.3 KB)
- 406694 (397.2 KB)
- 1042459 (1,018.0 KB)
- 665838 (650.2 KB)
- 1045436 (1,020.9 KB)
- 271975 (265.6 KB)
- 1036148 (1,011.9 KB)
- 001 Difference Between Information Security and Cyber Security.mp4 (78.0 MB)
- 001 Difference Between Information Security and Cyber Security_en.srt (6.4 KB)
- 002 The Trinity of IT Security - CIA.mp4 (24.2 MB)
- 002 The Trinity of IT Security - CIA_en.srt (5.2 KB)
- 003 Basic Terminologies.html (2.4 KB)
- 004 Computer Protocols.mp4 (27.6 MB)
- 004 Computer Protocols_en.srt (11.3 KB)
- 005 Cookies.mp4 (56.7 MB)
- 005 Cookies_en.srt (10.0 KB)
- 006 The TCPIP.mp4 (6.4 MB)
- 006 The TCPIP_en.srt (5.5 KB)
- Bonus Resources.txt (0.0 KB)
- 001 Section Intro.mp4 (16.6 MB)
- 001 Section Intro_en.srt (1.5 KB)
- 002 This is NOT Hacking.mp4 (68.4 MB)
Code:
- udp://tracker.opentrackr.org:1337/announce
- https://tracker2.ctix.cn:443/announce
- https://tracker1.520.jp:443/announce
- udp://opentracker.i2p.rocks:6969/announce
- udp://tracker.openbittorrent.com:6969/announce
- http://tracker.openbittorrent.com:80/announce
- udp://open.demonii.com:1337/announce
- udp://open.stealth.si:80/announce
- udp://exodus.desync.com:6969/announce
- udp://tracker.moeking.me:6969/announce
- udp://tracker.tiny-vps.com:6969/announce
- udp://tracker.bitsearch.to:1337/announce
- udp://p4p.arenabg.com:1337/announce