Warning: Undefined variable $details in /home/yb/core/torrent.php on line 574
Warning: Trying to access array offset on null in /home/yb/core/torrent.php on line 574
Deprecated: substr(): Passing null to parameter #1 ($string) of type string is deprecated in /home/yb/core/torrent.php on line 574
Warning: Undefined variable $details in /home/yb/core/torrent.php on line 574
Warning: Trying to access array offset on null in /home/yb/core/torrent.php on line 574
Deprecated: substr(): Passing null to parameter #1 ($string) of type string is deprecated in /home/yb/core/torrent.php on line 574
Warning: Undefined variable $details in /home/yb/core/torrent.php on line 574
Warning: Trying to access array offset on null in /home/yb/core/torrent.php on line 574 [GigaCourse.Com] Udemy - Real Ethical Hacking in 43 Hours Certificated CSEH+CEH 2024 Torrent Download
[GigaCourse.Com] Udemy - Real Ethical Hacking in 43 Hours Certificated CSEH+CEH 2024
[GigaCourse.Com] Udemy - Real Ethical Hacking in 43 Hours Certificated CSEH+CEH 2024
1. Introduction and First Steps/1. Being an Ethical Hacker.mp4 38.1 MB 1. Introduction and First Steps/1. Being an Ethical Hacker.srt 2.9 KB 10. Storage Media - Module 2/1. Flash Storage Media.mp4 48.7 MB 10. Storage Media - Module 2/1. Flash Storage Media.srt 3.4 KB 10. Storage Media - Module 2/2. USB Flash Drives.mp4 20.1 MB 10. Storage Media - Module 2/2. USB Flash Drives.srt 1.6 KB 10. Storage Media - Module 2/3. Flash Memory Card.mp4 83.3 MB 10. Storage Media - Module 2/3. Flash Memory Card.srt 5.2 KB 11. Storage Media - Module 3/1. Hard Disk Drives (HDD).mp4 110.8 MB 11. Storage Media - Module 3/1. Hard Disk Drives (HDD).srt 6.9 KB 11. Storage Media - Module 3/2. Solid State Drives (SSD).mp4 59 MB 11. Storage Media - Module 3/2. Solid State Drives (SSD).srt 3.6 KB 12. Starting with Basic Linux Commands - CSEH/1. Understanding Linux Commands and Pipes.mp4 75.3 MB 12. Starting with Basic Linux Commands - CSEH/1. Understanding Linux Commands and Pipes.srt 9.3 KB 12. Starting with Basic Linux Commands - CSEH/2. What is a Command.mp4 16.2 MB 12. Starting with Basic Linux Commands - CSEH/2. What is a Command.srt 3.8 KB 12. Starting with Basic Linux Commands - CSEH/3. Pipeline example #1.mp4 47.6 MB 12. Starting with Basic Linux Commands - CSEH/3. Pipeline example #1.srt 13.2 KB 12. Starting with Basic Linux Commands - CSEH/4. Weird LS Command.mp4 28 MB 12. Starting with Basic Linux Commands - CSEH/4. Weird LS Command.srt 4.1 KB 12. Starting with Basic Linux Commands - CSEH/5. Different Linux Commands using with Pipe.mp4 58.5 MB 12. Starting with Basic Linux Commands - CSEH/5. Different Linux Commands using with Pipe.srt 12.8 KB 13. Starting with Linux Terminal - CSEH/1. Understanding key concepts.mp4 77.3 MB 13. Starting with Linux Terminal - CSEH/1. Understanding key concepts.srt 8.4 KB 13. Starting with Linux Terminal - CSEH/2. Finding Helpful manuals.mp4 77.3 MB 13. Starting with Linux Terminal - CSEH/2. Finding Helpful manuals.srt 7.6 KB 13. Starting with Linux Terminal - CSEH/3. Linux Directories.mp4 62.1 MB 13. Starting with Linux Terminal - CSEH/3. Linux Directories.srt 5.9 KB 13. Starting with Linux Terminal - CSEH/4. Linux Directories - Part 2.mp4 65 MB 13. Starting with Linux Terminal - CSEH/4. Linux Directories - Part 2.srt 6.5 KB 14. Starting with Linux Shell - CSEH/1. The bridge between You and Shell.mp4 52.4 MB 14. Starting with Linux Shell - CSEH/1. The bridge between You and Shell.srt 9.9 KB 15. Exploring the Linux System - CSEH/1. LS Command.mp4 15.9 MB 15. Exploring the Linux System - CSEH/1. LS Command.srt 0 B 15. Exploring the Linux System - CSEH/2. RD vs APD.mp4 47.2 MB 15. Exploring the Linux System - CSEH/2. RD vs APD.srt 11.3 KB 15. Exploring the Linux System - CSEH/3. Filtering LS.mp4 62 MB 15. Exploring the Linux System - CSEH/3. Filtering LS.srt 9.1 KB 15. Exploring the Linux System - CSEH/4. CP Command.mp4 41.1 MB 15. Exploring the Linux System - CSEH/4. CP Command.srt 7.7 KB 15. Exploring the Linux System - CSEH/5. Tab Auto-completion.mp4 28.9 MB 15. Exploring the Linux System - CSEH/5. Tab Auto-completion.srt 3.8 KB 15. Exploring the Linux System - CSEH/6. SYM AND HRD Link Files.mp4 79.8 MB 15. Exploring the Linux System - CSEH/6. SYM AND HRD Link Files.srt 15.1 KB 15. Exploring the Linux System - CSEH/7. Manipulating Files.mp4 32 MB 15. Exploring the Linux System - CSEH/7. Manipulating Files.srt 8.1 KB 16. Starting with Linux Shell - CSEH/1. Introduction to Shell and Expansion.mp4 35.3 MB 16. Starting with Linux Shell - CSEH/1. Introduction to Shell and Expansion.srt 8.6 KB 16. Starting with Linux Shell - CSEH/2. Arithmetic Expressions with Shell.mp4 17.6 MB 16. Starting with Linux Shell - CSEH/2. Arithmetic Expressions with Shell.srt 4.4 KB 16. Starting with Linux Shell - CSEH/3. Automating Folder Creation with Shell.mp4 53.3 MB 16. Starting with Linux Shell - CSEH/3. Automating Folder Creation with Shell.srt 9.7 KB 16. Starting with Linux Shell - CSEH/4. Quoting in Shell.mp4 60.3 MB 16. Starting with Linux Shell - CSEH/4. Quoting in Shell.srt 11.6 KB 17. Permissions - CSEH/1. Introduction to Permissions in Linux.mp4 20.2 MB 17. Permissions - CSEH/1. Introduction to Permissions in Linux.srt 5.6 KB 17. Permissions - CSEH/2. Differences between UID, GID and Shadow.mp4 37 MB 17. Permissions - CSEH/2. Differences between UID, GID and Shadow.srt 6.5 KB 17. Permissions - CSEH/3. File and Dir Permissions.mp4 86.7 MB 17. Permissions - CSEH/3. File and Dir Permissions.srt 9.7 KB 17. Permissions - CSEH/4. Examples with File Permissions.mp4 17.7 MB 17. Permissions - CSEH/4. Examples with File Permissions.srt 5.6 KB 17. Permissions - CSEH/4.1 A4.txt 669 B 17. Permissions - CSEH/5. After this video you'll understand all LINUX Permissions.mp4 140.8 MB 17. Permissions - CSEH/5. After this video you'll understand all LINUX Permissions.srt 23.7 KB 17. Permissions - CSEH/5.1 A5.txt 669 B 17. Permissions - CSEH/6. Chmod.mp4 93.1 MB 17. Permissions - CSEH/6. Chmod.srt 14.7 KB 18. Processes in Linux - CSEH/1. Fundamentals of Processes in System.mp4 62.6 MB 18. Processes in Linux - CSEH/1. Fundamentals of Processes in System.srt 7.8 KB 18. Processes in Linux - CSEH/2. The Magic with PS Aux Command.mp4 82.3 MB 18. Processes in Linux - CSEH/2. The Magic with PS Aux Command.srt 8.8 KB 18. Processes in Linux - CSEH/3. The Magic with TOP Command.mp4 93.7 MB 18. Processes in Linux - CSEH/3. The Magic with TOP Command.srt 9.7 KB 18. Processes in Linux - CSEH/4. Foreground and Background Processes.mp4 44.9 MB 18. Processes in Linux - CSEH/4. Foreground and Background Processes.srt 10 KB 18. Processes in Linux - CSEH/5. From Background to Foreground.mp4 24.6 MB 18. Processes in Linux - CSEH/5. From Background to Foreground.srt 5.4 KB 18. Processes in Linux - CSEH/6. The Tutorial with Linux Process Signals.mp4 77.8 MB 18. Processes in Linux - CSEH/6. The Tutorial with Linux Process Signals.srt 15.2 KB 19. Packet Management Systems in Linux - CSEH/1. Introduction to Packet Management Systems.mp4 48.1 MB 19. Packet Management Systems in Linux - CSEH/1. Introduction to Packet Management Systems.srt 5.7 KB 19. Packet Management Systems in Linux - CSEH/2. Why we need package management tools.mp4 21.9 MB 19. Packet Management Systems in Linux - CSEH/2. Why we need package management tools.srt 7.8 KB 19. Packet Management Systems in Linux - CSEH/3. Package Management in Linux - Final.mp4 69.4 MB 19. Packet Management Systems in Linux - CSEH/3. Package Management in Linux - Final.srt 9.7 KB 2. Operating System/1. Mastering Boot Starting Firmware Interfaces.mp4 133.1 MB 2. Operating System/1. Mastering Boot Starting Firmware Interfaces.srt 13.8 KB 2. Operating System/2. File Allocation Tables.mp4 138.6 MB 2. Operating System/2. File Allocation Tables.srt 11.4 KB 20. Network Security Cyber Security/1. The main goal and importance of Network Security.mp4 46.6 MB 20. Network Security Cyber Security/1. The main goal and importance of Network Security.srt 3 KB 20. Network Security Cyber Security/2. 3 Main Ways to Make your Network Stronger.mp4 93.9 MB 20. Network Security Cyber Security/2. 3 Main Ways to Make your Network Stronger.srt 5.7 KB 20. Network Security Cyber Security/3. A Chain is no stronger than its weakest link.mp4 55.6 MB