RAR-files |
skillshare.cyber.security.cadet.ethical.hacking.2021.latest.edition-skilledhares.rar |
500,000,000 |
1EF401C5 |
skillshare.cyber.security.cadet.ethical.hacking.2021.latest.edition-skilledhares.r00 |
500,000,000 |
52582693 |
skillshare.cyber.security.cadet.ethical.hacking.2021.latest.edition-skilledhares.r01 |
500,000,000 |
C740AF52 |
skillshare.cyber.security.cadet.ethical.hacking.2021.latest.edition-skilledhares.r02 |
500,000,000 |
03B48E47 |
skillshare.cyber.security.cadet.ethical.hacking.2021.latest.edition-skilledhares.r03 |
500,000,000 |
A783B55B |
skillshare.cyber.security.cadet.ethical.hacking.2021.latest.edition-skilledhares.r04 |
500,000,000 |
D54E1103 |
skillshare.cyber.security.cadet.ethical.hacking.2021.latest.edition-skilledhares.r05 |
500,000,000 |
B0EAA8D0 |
skillshare.cyber.security.cadet.ethical.hacking.2021.latest.edition-skilledhares.r06 |
500,000,000 |
326130B6 |
skillshare.cyber.security.cadet.ethical.hacking.2021.latest.edition-skilledhares.r07 |
500,000,000 |
78E88AA4 |
skillshare.cyber.security.cadet.ethical.hacking.2021.latest.edition-skilledhares.r08 |
484,595,873 |
D4E8F728 |
|
Total size: |
4,984,595,873 |
|
|
Archived
files |
01-what_is_cyber_security.mkv
[58bfe31d8e4becd2]
|
40,473,882 |
782756D4 |
02-why_cyber_security.mkv
[ea653c094d20ec7d]
|
54,120,312 |
5157CD71 |
03-opportunity_in_cyber_security.mkv
[868ded5d416f71cb]
|
41,071,832 |
E1539288 |
04-job_roles_in_cyber_security.mkv
[8bc22f2d2c778655]
|
48,506,602 |
A3A01B30 |
05-cyber_security_cadet-a_walk-through.mkv
[e4d43dd6edb20f2a]
|
30,477,598 |
6A0E8C81 |
06-why_note_taking.mkv
[84d21541ef39da88]
|
59,709,577 |
ACC2C561 |
07-how_to_take_notes.mkv
[e565e0a8fbf53441]
|
114,288,776 |
8783691A |
08-using_note_taking_tools.mkv
[ec977bc6e103f352]
|
144,351,113 |
560A0CEA |
09-what_is_vm.mkv
[43150f2d302bd83b]
|
48,321,110 |
D4158C75 |
10-setting_up_virtualbox.mkv
[8dedcc5b2405d2bf]
|
57,063,913 |
A2045AFC |
11-installing_from_ova.mkv
[8df58516661825f0]
|
58,090,829 |
DA61A14F |
12-installing_from_iso.mkv
[bd8587e420ded301]
|
156,424,589 |
8ED8CC60 |
13-installing_metasploitable_2.mkv
[d42eccc476301976]
|
54,366,496 |
D8312C86 |
14-creating_isolated_network.mkv
[5dfc330c73b093d7]
|
76,901,162 |
E67FFDA4 |
15-introduction_to_snapshot.mkv
[273e21a74dac4a47]
|
46,514,255 |
AB29047D |
16-creating_snapshot.mkv
[6a00c8f9f106bc2]
|
78,454,594 |
99B757D0 |
17-what_is_kali_linux.mkv
[7cb766842c21e762]
|
43,270,407 |
6D2551D2 |
18-kali_linux_overview.mkv
[56cc4d29349a938e]
|
132,622,143 |
3F644DC4 |
19-gui_vs_cli.mkv
[3b8b47fce70e1b85]
|
47,843,206 |
D7EBCBF0 |
20-basic_commands.mkv
[3be46124340035ca]
|
113,472,015 |
3BDC6032 |
21-information_gathering.mkv
[6a14b1e42e4bd4ce]
|
53,187,219 |
3E43136B |
22-scanning_networks.mkv
[b9006b9c6b40ef38]
|
62,125,058 |
E10D008D |
23-vulnerability_assessment.mkv
[e58a1d22b50e0b22]
|
45,608,286 |
EA3AB30E |
24-gaining_access.mkv
[1b660bbf1fc83abe]
|
104,577,226 |
59648142 |
25-clearing_tracks.mkv
[f7b725fa6d1615ae]
|
50,104,303 |
8B23DF42 |
26-introduction_to_osint.mkv
[43172436f29b7030]
|
57,564,442 |
9D9322C0 |
27-osint_hands-on.mkv
[977f837d07f1a7b5]
|
158,179,301 |
2E50161E |
28-recon-ng.mkv
[3ebaaa5be00b6be5]
|
306,874,045 |
101D2B2A |
29-introduction_to_metadata.mkv
[c7f15253d6bfa3c1]
|
41,030,566 |
7F9D814E |
30-introduction_to_bug_hunting.mkv
[d4e0e6a85ecc86d4]
|
53,763,702 |
5BBB87A1 |
31-testing_for_metadata_bug.mkv
[bcb959f7b314af22]
|
148,723,235 |
449F44D1 |
32-what_is_a_network.mkv
[870871a8038bdfd9]
|
51,630,989 |
8812597E |
33-concept_of_ip_address.mkv
[d386265c8e15b76c]
|
52,108,105 |
62BFBF80 |
34-tcp_protocol.mkv
[277753ca0b10f473]
|
50,043,552 |
C4C8DF8D |
35-nmap.mkv
[fc445b2243fb5234]
|
48,195,801 |
40985E6D |
36-various_nmap_scanning.mkv
[b37dd8f2ca114533]
|
131,806,768 |
5C5A7659 |
37-nmap_scanning_hands-on.mkv
[5d34ab7ce93d40ad]
|
87,935,815 |
F84F2BA9 |
38-various_output_formats_in_nmap.mkv
[bd8a44f9f781bda8]
|
86,937,187 |
AFCFB38C |
39-webmap.mkv
[64c6275fcf602b12]
|
116,805,272 |
F951B90F |
40-introduction_to_nse.mkv
[7921f79c5a8bc915]
|
58,333,002 |
4AE48E21 |
41-using_nse_scripts.mkv
[1c434cc4e5055983]
|
71,813,875 |
E1DBDDE2 |
42-vulnerability_management_life_cycle_(vmlc).mkv
[792c23098a083d47]
|
89,976,535 |
62AA4C60 |
43-identifying_vulnerabilities_using_nmap.mkv
[4762a7a67fabfe89]
|
91,348,286 |
FFAB3D3A |
44-nessus_installation.mkv
[c0d703f33a771323]
|
70,415,919 |
99F0F2CF |
45-nessus_overview.mkv
[a39b26bdd43665b6]
|
115,810,604 |
5A028287 |
46-nessus_assessment_and_output.mkv
[3761582ae681c19a]
|
103,294,793 |
4094EBBD |
47-various_exploitation_methods.mkv
[c01aa9e75186ed92]
|
55,476,982 |
D97DC6B7 |
48-password_cracking.mkv
[30f33ff20e4487d2]
|
134,142,863 |
5EA50307 |
49-manual_vulnerability_exploitation.mkv
[dafb1b69599d5632]
|
89,496,130 |
AD83DF38 |
50-automated_vulnerability_exploitation.mkv
[b1e291f90f2b4cf2]
|
80,071,490 |
E6BE1EC5 |
51-how_to_set_a_secure_password.mkv
[a186373125767ff7]
|
83,471,261 |
4471C997 |
52-what_is_a_log_file.mkv
[d4c57601615c3355]
|
40,397,327 |
F45F69CE |
53-clearing_logs_from_windows.mkv
[ade1dae737a60a3f]
|
49,294,803 |
221DA7D8 |
54-clearing_logs_from_linux.mkv
[1ac881640ce5de43]
|
52,618,777 |
48756248 |
55-capstone_challenge-hands_on.mkv
[ec2382327d8ad55f]
|
298,304,483 |
B3D26937 |
56-what_is_ctf.mkv
[31df9031f98daf82]
|
52,210,172 |
FE22D7D0 |
57-ctf_platforms.mkv
[90bb923b1533c364]
|
99,516,939 |
A98FE2E1 |
58-ctf_hands-on.mkv
[8af0125ff4677003]
|
102,838,493 |
2BC31899 |
59-ctf_challenge_overview.mkv
[6a4d535df9da78c1]
|
20,917,250 |
FAD41275 |
60-what_we_have_learned.mkv
[f50276f0197c6390]
|
34,195,913 |
989BD269 |
61-whats_next.mkv
[421e6b03413ae68e]
|
37,099,754 |
50619008 |
|
Total size: |
4,984,590,934 |
|
|