[EC-Council] Ethical Hacking Essentials ?
- CategoryOther
- TypeTutorials
- LanguageEnglish
- Total size2.1 GB
- Uploaded BySunRiseZone
- Downloads59
- Last checkedSep. 10th '24
- Date uploadedSep. 09th '24
- Seeders 16
- Leechers7
- Ethical hacking
- Cyber defense
- Net security
- Cloud security
- Pen test
- Cyber threats
- Proctored exam
- Real-world CTF
Infohash : 2482412513166861ABB3DB1C378D5ACBE6E36918
Original course: https://www.eccouncil.org/train-certify/ethical-hacking-essentials-ehe/ or https://www.coursera.org/learn/ethical-hacking-essentials-ehe
Course Overview:
Ethical Hacking Essentials
is an introductory course that covers cybersecurity fundamentals and ethical hacking. This hands-on program provides 15+ hours of video lessons, 11 labs, 12 modules, and real-world CTF challenges to give you a solid foundation in computer and network security.
What You'll Learn:
- ? Security Fundamentals: Learn key concepts like password cracking, vulnerabilities, and threats.
- ? Ethical Hacking Techniques: Master social engineering, network attacks, and countermeasures.
- ?️ Web, Mobile, & IoT Attacks: Understand web, mobile, cloud, and IoT vulnerabilities and how to secure them.
- ?️ Proctored Exam Certification: Get certified in cybersecurity essentials with a globally recognized certification.
- ? Capstone Projects & CTF Challenges: Test your knowledge with real-world scenarios in capture-the-flag tasks.
- ? Advanced Learning: Develop skills in penetration testing, cloud computing security, and mobile threats.
Your Certification:
Earn a certification approved by multiple state Departments of Education , including Florida, Virginia, Ohio, and Arkansas, to boost your resume and gain job market value.
Files:
[EC-Council] Ethical Hacking Essentials ������- $10 ChatGPT for 1 Year & More.txt (0.2 KB) Module 1 2. Introduction
- subtitle.txt (0.7 KB)
- subtitles-en.vtt (1.2 KB)
- 2. Introduction.mp4 (5.2 MB)
- subtitle.txt (1.9 KB)
- subtitles-en.vtt (3.2 KB)
- 5. Understanding Motives, Goals, and Objectives of Information Security Attacks.mp4 (6.1 MB)
- subtitle.txt (2.0 KB)
- subtitles-en.vtt (3.7 KB)
- 3. Understanding the Need for Security.mp4 (6.6 MB)
- subtitle.txt (3.1 KB)
- subtitles-en.vtt (5.9 KB)
- 4. Understanding the Security, Functionality, and Usability Triangle.mp4 (9.1 MB)
- subtitle.txt (4.4 KB)
- subtitles-en.vtt (8.6 KB)
- 6. Overview of Classification of Attacks.mp4 (13.7 MB)
- subtitle.txt (5.0 KB)
- subtitles-en.vtt (8.1 KB)
- 1. Index - OneHack.us.mp4 (16.3 MB)
- subtitle.txt (6.1 KB)
- subtitles-en(1).vtt (12.0 KB)
- 7. Overview of Information Security Attack Vectors.mp4 (21.4 MB)
- subtitle.txt (15.2 KB)
- subtitles-en(1).vtt (25.3 KB)
- 8. Overview of Various Information Security Laws and Regulations.mp4 (48.2 MB)
- 2024-07-02_04-23-15_Video 11.7 Overview of Various Cloud Computing Security Tools - Coursera.mp4 (4.0 MB)
- 2024-07-02_04-22-24_Video 11.1 Introduction - Coursera.mp4 (4.4 MB)
- 2024-07-02_04-23-05_Video 11.6 Understanding Cloud Attack Countermeasures - Coursera.mp4 (20.7 MB)
- 2024-07-02_04-23-00_Video 11.5 Overview of Cloud Attacks and Tools - Coursera.mp4 (21.5 MB)
- 2024-07-02_04-22-53_Video 11.4 Understanding Cloud Computing Threats - Coursera.mp4 (39.6 MB)
- 2024-07-02_04-22-47_Video 11.3 Overview of Container Technology - Coursera.mp4 (51.4 MB)
- 2024-07-02_04-22-40_Video 11.2 Understanding Cloud Computing Concepts - Coursera.mp4 (52.5 MB)
- 2024-07-02_04-13-04_Video 4.5 Overview of Password Cracking Tools - Coursera - OneHack.us.mp4 (4.3 MB)
- 2024-07-02_04-12-35_Introduction - Coursera.mp4 (5.2 MB)
- 2024-07-02_04-12-50_Understanding Microsoft Authentication - Coursera.mp4 (6.6 MB)
- 2024-07-02_04-12-44_Understanding the Password Cracking and Password Complexity - Coursera.mp4 (7.9 MB)
- 2024-07-02_04-13-12_Video 4.6 Understanding Countermeasures against Password Attacks - Coursera.mp4 (21.8 MB)
- 2024-07-02_04-12-59_Understanding Various Types of Password Attacks - Coursera.mp4 (43.4 MB)
- 2024-07-02_04-24-00_Video 12.5 Overview of Penetration Testing Methodologies - Coursera.mp4 (4.5 MB)
- 2024-07-02_04-23-36_Video 12.1 Introduction - Coursera.mp4 (5.4 MB)
- 2024-07-02_04-23-54_Video 12.4 Understanding Phases of Penetration Testing - Coursera.mp4 (13.6 MB)
- 2024-07-02_04-23-49_Video 12.3 Understanding Types of Penetration Testing - Coursera.mp4 (15.6 MB)
- 2024-07-02_04-24-15_Video 12.7 Understanding Risks Associated with Penetration Testing - Coursera.mp4 (19.0 MB)
- 2024-07-02_04-23-42_Video 12.2 Understanding Penetration Testing and its Benefits - Coursera.mp4 (22.4 MB)
- 2024-07-02_04-24-07_Video 12.6 Overview of Guidelines and Recommendations for Penetration Testing - Coursera.mp4 (132.0 MB)
- 2024-07-02_04-13-59_Video 5.1 Introduction - Coursera.mp4 (5.0 MB)
- 2024-07-02_04-14-34_Video 5.5 Understanding Identity Theft - Coursera.mp4 (11.2 MB)
- 2024-07-02_04-14-26_Video 5.4 Understanding Insider Threats - Coursera.mp4 (22.5 MB)
- 2024-07-02_04-14-43_Video 5.6 Understanding Different Social Engineering, Insider Threats and Identity Theft Countermeasures - Coursera.mp4 (34.4 MB)
- 2024-07-02_04-14-17_Video 5.3 Understanding Various Social Engineering Techniques - Coursera.mp4 (38.8 MB)
- 2024-07-02_04-14-11_Video 5.2 Understanding Social Engineering Concepts - Coursera.mp4 (43.4 MB)
- 2024-07-02_04-18-26_Video 8.1 Introduction - Coursera.mp4 (5.0 MB)
- 2024-07-02_04-19-20_Video 8.8 Overview of Different Wireless Security Tools - Coursera.mp4 (6.0 MB)
- 2024-07-02_04-19-13_Video 8.7 Overview of Various Wireless Attack Countermeasures - Coursera.mp4 (10.6 MB)
- 2024-07-02_04-18-39_Video 8.2 Overview of Wireless Terminology - Coursera.mp4 (15.0 MB)
- 2024-07-02_04-18-59_Video 8.5 Overview of Different Wireless Attack Tools - Coursera.mp4 (16.3 MB)
- 2024-07-02_04-18-46_Video 8.3 Overview of Wireless Encryption Algorithms - Coursera.mp4 (21.7 MB)
- 2024-07-02_04-19-05_Video 8.6 Understanding Bluetooth Attack Techniques - Coursera.mp4 (29.4 MB)
- 2024-07-02_04-18-51_Video 8.4 Understanding Wireless Network-Specific Attack Techniques - Coursera.mp4 (47.0 MB)
- 1. Introduction - Coursera^.mp4 (5.4 MB)
- 4. Overview of Indicators of Compromise (IoCs) - Coursera.mp4 (9.4 MB)
- 2. Understanding the Cyber Kill Chain Methodology - Coursera.mp4 (9.5 MB)
- 3. Understanding Tactics, Techniques, and Procedures (TTPs) - Coursera.mp4 (11.4 MB)
- 6. Understanding Different Phases of Hacking Cycle - Coursera.mp4 (12.0 MB)
- 8. Overview of Ethical Hacking Tools - Coursera.mp4 (17.7 MB)
- 5. Overview of Hacking Concepts and Hacker Classes - Coursera.mp4 (22.9 MB)
- 7. Understanding Ethical Hacking Concepts and Its Scope - Coursera.mp4 (45.9 MB)
- 2024-07-02_04-15-34_Video 6.1 Introduction - Coursera.mp4 (5.6 MB)
- 2024-07-02_04-16-17_Video 6.7 Understanding Different DoS-DDoS Attack Countermeasures and Protection Tools - Coursera.mp4 (6.0 MB)
- 2024-07-02_04-16-10_Video 6.6 Understanding Different DoS-DDoS Attack Tools - Coursera.mp4 (7.5 MB)
- 2024-07-02_04-16-33_Video 6.9 Understanding Different Session Hijacking Tools and Countermeasures - Coursera.mp4 (12.0 MB)
- 2024-07-02_04-16-23_Video 6.8 Overview of Session Hijacking and Types of Session Hijacking - Coursera.mp4 (15.0 MB)
- 2024-07-02_04-15-58_Video 6.4 Understanding Different Sniffing Countermeasure
Code:
- udp://tracker.opentrackr.org:1337/announce
- udp://open.stealth.si:80/announce
- udp://tracker.torrent.eu.org:451/announce
- udp://explodie.org:6969/announce
- udp://p4p.arenabg.com:1337/announce
- udp://tracker.tiny-vps.com:6969/announce
- udp://tracker.dler.org:6969/announce
- https://tracker.tamersunion.org:443/announce
- http://bt.okmp3.ru:2710/announce
- https://tracker.yemekyedim.com/announce