10-30-2024, 10:22 PM
6.21 GB | 00:22:55 | mp4 | 1280X720 | 16:9
Genre:eLearning |Language:English
Files Included :
1 Welcome & Introduction to this course (12.41 MB)
2 Your Instructor is a Grey Hat Hacker (53.59 MB)
3 FREE 7 Defence Resources For Ultimate Knowledge (66.99 MB)
5 Goals & Objectives Of this Course (58.26 MB)
6 IMPORTANT!! Some Advice before starting this course (65.36 MB)
1 Goals & Objectives (9.67 MB)
2 What are Google Dorks (31.4 MB)
3 Most Popular & Useful Google Dorks (175.55 MB)
4 Google Hacking Database (GHDB) (41.82 MB)
1 Goals & Objectives (12.57 MB)
3 ILOVEYOU (43.41 MB)
4 CryptoLocker (66.61 MB)
5 Code Red (21.98 MB)
6 Best books In Cyber Security (117.06 MB)
7 How I made a Scammer Pay Back $1350 (101.24 MB)
1 Goals & Objectives (9.95 MB)
2 How to make money ethically from Cyber Security (59.16 MB)
4 Top Cyber Security Jobs, Requirements & Salary (71.14 MB)
5 How I made $10,000 From Bug Bounty Programs (64.33 MB)
1 Something I wanted to tell You (77.34 MB)
2 3 Levels Of Cyber Security Learning (148.8 MB)
3 You Need to Have This (44.99 MB)
4 PART 2 Would be RELEASING SOON!! (58.25 MB)
1 Goals & Objectives (9.93 MB)
10 Tojans (35.58 MB)
11 Ransomware (91.97 MB)
12 Spyware (35.2 MB)
13 Rootkits (14.7 MB)
15 NIST Cyber Security Framework (18.76 MB)
16 Zero Trust Model (NO Trust Framework) (20.85 MB)
2 Security, Vulnerability, Risks & Threats (20.61 MB)
3 CIA Triad (37.13 MB)
4 Computer Protocols (69.59 MB)
5 What is Malware It's types (7.99 MB)
6 Computer Viruses Part-1 (70.36 MB)
7 Computer Viruses Part-2 (64.12 MB)
8 Computer Viruses Part-3 (41.95 MB)
9 Worms (51.94 MB)
1 Goals & Objectives (12.23 MB)
10 Most Popular Hackers Of All Time (94.4 MB)
12 Scareware (26.47 MB)
14 Browser Hijacking (82.57 MB)
15 URL Spoofing (42.66 MB)
16 MITM (MAN-IN-THE-MIDDLE-ATTACK) (35.57 MB)
17 Botnets (24.62 MB)
18 SQL Injection (25.59 MB)
19 IP Spoofing (31.03 MB)
2 Why you need security (29.05 MB)
20 Brute Force Attack (BFA) (24.23 MB)
21 Phishing Part-1 (86.11 MB)
22 Phishing Part-2 (87.7 MB)
24 Have Hackers hacked your E-mail (65.69 MB)
25 Doxing (17.36 MB)
26 A Message from my student! (13.09 MB)
27 DOS & DDOS Attack (107.69 MB)
29 Virtual Private Network (VPN) (129.87 MB)
3 An Important Cyber Security Survey (18.06 MB)
31 Social Engineering (74.79 MB)
34 Deep Web & Dark Web (85.82 MB)
35 The Five Eyes (59.72 MB)
37 Vault 7 (74.06 MB)
38 Special Surveillance Projects Of Different Countries (86.08 MB)
4 Hackers & Their Types (32.25 MB)
40 Send self-destructive messages (24.54 MB)
41 A Small Review System (24.53 MB)
6 Top 5 Hollywood Movies On Hacking (41.49 MB)
7 Most Dangerous Vulnerabilities Part-1 (89.75 MB)
8 Most Dangerous Vulnerabilities Part-2 (88.03 MB)
1 Goals & Objectives (9.54 MB)
10 HEARTBLEED (37.06 MB)
11 SSL Stripping (46.81 MB)
12 SSL Sniffing (49.49 MB)
13 HTTP & HTTPS (21.84 MB)
14 Digital Certificates (92.37 MB)
2 What is Encryption (30.14 MB)
3 Symmetric Encryption (47.03 MB)
4 Asymmetric Encryption (83.42 MB)
5 End to End Encryption (54.16 MB)
6 Secure Socket Layer (SSL) (54.09 MB)
7 Transport Layer Security (TLS) (115.31 MB)
8 POODLE (99.28 MB)
9 BEAST (42.43 MB)
1 Goals & Objectives (5.09 MB)
2 What are Virtual Machines (106.72 MB)
3 Downloading & Installing VirtualBox (26.41 MB)
4 Downloading & Installing VMware (34.2 MB)
5 Setting Up Testing Environment using VirtualBox (135.67 MB)
6 Setting Up Testing Environment using VMware (70.6 MB)
1 Goals & Objectives (4.86 MB)
2 Firewalls (33.99 MB)
3 2FA (2 Factor Authentication) (25.45 MB)
4 Antivirus & Sandbox Testing (80.3 MB)
7 DMZ & Honey Pots (46.27 MB)
1 Goals & Objectives (7.14 MB)
12 CVE (Common Vulnerabilities & Exposures) (72.54 MB)
2 What are Operating Systems (53.89 MB)
3 Most Popular OS For Mobile Phones (24.53 MB)
4 Most Popular OS For Computers & Laptops (33.37 MB)
5 Windows 7 (62.38 MB)
6 Windows 8 (38.28 MB)
7 Windows 10 (61.29 MB)
8 Linux (40.92 MB)
9 MacOS (57.37 MB)
1 Goals & Objectives (15.61 MB)
10 Scamwatch & Scambusters (63.22 MB)
3 How your data is collected online (58.67 MB)
4 Problem With Survey (86.36 MB)
5 Sign Up Without Revealing Your True Identity (49.64 MB)
6 A Social Engineering Scamming Method (174.19 MB)
7 WhoIs (43.96 MB)
8 VirusTotal- An Interesting FREE Service (19.9 MB)
9 Most Secure Email Providers (88.74 MB)
1 Goals & Objectives (11.08 MB)
2 What is WordPress (21.5 MB)
3 Find WordPress Vulnerabilities on Your Own (65.58 MB)
4 FREE Subdomain Research Tools (48.91 MB)
5 Find Out What Websites Are Built With (34.92 MB)
6 A New Way To Find Weakness In an Organization's Network Of Websites (41.16 MB)
8 Top 3 Plugins for Better WordPress Security (62.76 MB)
1 Welcome & Introduction to this course (12.41 MB)
2 Your Instructor is a Grey Hat Hacker (53.59 MB)
3 FREE 7 Defence Resources For Ultimate Knowledge (66.99 MB)
5 Goals & Objectives Of this Course (58.26 MB)
6 IMPORTANT!! Some Advice before starting this course (65.36 MB)
1 Goals & Objectives (9.67 MB)
2 What are Google Dorks (31.4 MB)
3 Most Popular & Useful Google Dorks (175.55 MB)
4 Google Hacking Database (GHDB) (41.82 MB)
1 Goals & Objectives (12.57 MB)
3 ILOVEYOU (43.41 MB)
4 CryptoLocker (66.61 MB)
5 Code Red (21.98 MB)
6 Best books In Cyber Security (117.06 MB)
7 How I made a Scammer Pay Back $1350 (101.24 MB)
1 Goals & Objectives (9.95 MB)
2 How to make money ethically from Cyber Security (59.16 MB)
4 Top Cyber Security Jobs, Requirements & Salary (71.14 MB)
5 How I made $10,000 From Bug Bounty Programs (64.33 MB)
1 Something I wanted to tell You (77.34 MB)
2 3 Levels Of Cyber Security Learning (148.8 MB)
3 You Need to Have This (44.99 MB)
4 PART 2 Would be RELEASING SOON!! (58.25 MB)
1 Goals & Objectives (9.93 MB)
10 Tojans (35.58 MB)
11 Ransomware (91.97 MB)
12 Spyware (35.2 MB)
13 Rootkits (14.7 MB)
15 NIST Cyber Security Framework (18.76 MB)
16 Zero Trust Model (NO Trust Framework) (20.85 MB)
2 Security, Vulnerability, Risks & Threats (20.61 MB)
3 CIA Triad (37.13 MB)
4 Computer Protocols (69.59 MB)
5 What is Malware It's types (7.99 MB)
6 Computer Viruses Part-1 (70.36 MB)
7 Computer Viruses Part-2 (64.12 MB)
8 Computer Viruses Part-3 (41.95 MB)
9 Worms (51.94 MB)
1 Goals & Objectives (12.23 MB)
10 Most Popular Hackers Of All Time (94.4 MB)
12 Scareware (26.47 MB)
14 Browser Hijacking (82.57 MB)
15 URL Spoofing (42.66 MB)
16 MITM (MAN-IN-THE-MIDDLE-ATTACK) (35.57 MB)
17 Botnets (24.62 MB)
18 SQL Injection (25.59 MB)
19 IP Spoofing (31.03 MB)
2 Why you need security (29.05 MB)
20 Brute Force Attack (BFA) (24.23 MB)
21 Phishing Part-1 (86.11 MB)
22 Phishing Part-2 (87.7 MB)
24 Have Hackers hacked your E-mail (65.69 MB)
25 Doxing (17.36 MB)
26 A Message from my student! (13.09 MB)
27 DOS & DDOS Attack (107.69 MB)
29 Virtual Private Network (VPN) (129.87 MB)
3 An Important Cyber Security Survey (18.06 MB)
31 Social Engineering (74.79 MB)
34 Deep Web & Dark Web (85.82 MB)
35 The Five Eyes (59.72 MB)
37 Vault 7 (74.06 MB)
38 Special Surveillance Projects Of Different Countries (86.08 MB)
4 Hackers & Their Types (32.25 MB)
40 Send self-destructive messages (24.54 MB)
41 A Small Review System (24.53 MB)
6 Top 5 Hollywood Movies On Hacking (41.49 MB)
7 Most Dangerous Vulnerabilities Part-1 (89.75 MB)
8 Most Dangerous Vulnerabilities Part-2 (88.03 MB)
1 Goals & Objectives (9.54 MB)
10 HEARTBLEED (37.06 MB)
11 SSL Stripping (46.81 MB)
12 SSL Sniffing (49.49 MB)
13 HTTP & HTTPS (21.84 MB)
14 Digital Certificates (92.37 MB)
2 What is Encryption (30.14 MB)
3 Symmetric Encryption (47.03 MB)
4 Asymmetric Encryption (83.42 MB)
5 End to End Encryption (54.16 MB)
6 Secure Socket Layer (SSL) (54.09 MB)
7 Transport Layer Security (TLS) (115.31 MB)
8 POODLE (99.28 MB)
9 BEAST (42.43 MB)
1 Goals & Objectives (5.09 MB)
2 What are Virtual Machines (106.72 MB)
3 Downloading & Installing VirtualBox (26.41 MB)
4 Downloading & Installing VMware (34.2 MB)
5 Setting Up Testing Environment using VirtualBox (135.67 MB)
6 Setting Up Testing Environment using VMware (70.6 MB)
1 Goals & Objectives (4.86 MB)
2 Firewalls (33.99 MB)
3 2FA (2 Factor Authentication) (25.45 MB)
4 Antivirus & Sandbox Testing (80.3 MB)
7 DMZ & Honey Pots (46.27 MB)
1 Goals & Objectives (7.14 MB)
12 CVE (Common Vulnerabilities & Exposures) (72.54 MB)
2 What are Operating Systems (53.89 MB)
3 Most Popular OS For Mobile Phones (24.53 MB)
4 Most Popular OS For Computers & Laptops (33.37 MB)
5 Windows 7 (62.38 MB)
6 Windows 8 (38.28 MB)
7 Windows 10 (61.29 MB)
8 Linux (40.92 MB)
9 MacOS (57.37 MB)
1 Goals & Objectives (15.61 MB)
10 Scamwatch & Scambusters (63.22 MB)
3 How your data is collected online (58.67 MB)
4 Problem With Survey (86.36 MB)
5 Sign Up Without Revealing Your True Identity (49.64 MB)
6 A Social Engineering Scamming Method (174.19 MB)
7 WhoIs (43.96 MB)
8 VirusTotal- An Interesting FREE Service (19.9 MB)
9 Most Secure Email Providers (88.74 MB)
1 Goals & Objectives (11.08 MB)
2 What is WordPress (21.5 MB)
3 Find WordPress Vulnerabilities on Your Own (65.58 MB)
4 FREE Subdomain Research Tools (48.91 MB)
5 Find Out What Websites Are Built With (34.92 MB)
6 A New Way To Find Weakness In an Organization's Network Of Websites (41.16 MB)
8 Top 3 Plugins for Better WordPress Security (62.76 MB)
Screenshot