"Dont ask to ask, just ask" -- Skalman
  • U: Anonymous
  • D: 2019-04-22 21:19:43
  • C: Unknown

RELEASE >

ReScene version pyReScene Auto 0.7 BiFiSO File size CRC
Download
24,594
Stored files
389 99EE8787
1,375 BA62E774
RAR-files
bif-cybersecurity-for-it-professionals-2.rar 15,000,000 7F0A0AE6
bif-cybersecurity-for-it-professionals-2.r00 15,000,000 AA7DF44B
bif-cybersecurity-for-it-professionals-2.r01 15,000,000 49694018
bif-cybersecurity-for-it-professionals-2.r02 15,000,000 CB06E1E1
bif-cybersecurity-for-it-professionals-2.r03 15,000,000 E348125C
bif-cybersecurity-for-it-professionals-2.r04 15,000,000 52A71953
bif-cybersecurity-for-it-professionals-2.r05 15,000,000 1C100DE1
bif-cybersecurity-for-it-professionals-2.r06 15,000,000 F6BBED17
bif-cybersecurity-for-it-professionals-2.r07 15,000,000 27FC8C01
bif-cybersecurity-for-it-professionals-2.r08 15,000,000 B651347A
bif-cybersecurity-for-it-professionals-2.r09 15,000,000 C9600465
bif-cybersecurity-for-it-professionals-2.r10 15,000,000 0C7829B7
bif-cybersecurity-for-it-professionals-2.r11 15,000,000 68DCCA1B
bif-cybersecurity-for-it-professionals-2.r12 15,000,000 95DA23D0
bif-cybersecurity-for-it-professionals-2.r13 15,000,000 861634DE
bif-cybersecurity-for-it-professionals-2.r14 15,000,000 E384CE0B
bif-cybersecurity-for-it-professionals-2.r15 15,000,000 340060CD
bif-cybersecurity-for-it-professionals-2.r16 15,000,000 750E4308
bif-cybersecurity-for-it-professionals-2.r17 15,000,000 527EA36A
bif-cybersecurity-for-it-professionals-2.r18 15,000,000 49F42165
bif-cybersecurity-for-it-professionals-2.r19 15,000,000 F3BF3F4B
bif-cybersecurity-for-it-professionals-2.r20 15,000,000 6D42973E
bif-cybersecurity-for-it-professionals-2.r21 15,000,000 B17B336D
bif-cybersecurity-for-it-professionals-2.r22 15,000,000 D5C125B8
bif-cybersecurity-for-it-professionals-2.r23 4,701,434 3A442DF4

Total size: 364,701,434
Archived files
LinkedIn Learning Cybersecurity for IT Professionals\01.Introduction\01.01.Learn the basics and common tools of cybersecurity.mp4 [ecaec58c5f71475e] 4,624,864 23878788
LinkedIn Learning Cybersecurity for IT Professionals\01.Introduction\01.01.Learn the basics and common tools of cybersecurity.srt 1,289 0D3B7136
LinkedIn Learning Cybersecurity for IT Professionals\01.Introduction\01.02.What you should know.mp4 [62fb986d505a05a2] 3,013,077 6F7A7AAA
LinkedIn Learning Cybersecurity for IT Professionals\01.Introduction\01.02.What you should know.srt 3,652 E1F7F186
LinkedIn Learning Cybersecurity for IT Professionals\01.Introduction\01.03.Disclaimer.mp4 [7855318d04b89149] 1,736,448 EF90D856
LinkedIn Learning Cybersecurity for IT Professionals\01.Introduction\01.03.Disclaimer.srt 2,280 36AE0A8C
LinkedIn Learning Cybersecurity for IT Professionals\02.Why Cybersecurity\02.04.A history of hackers.mp4 [7e66f96a45b3d8e2] 8,033,769 3722D77E
LinkedIn Learning Cybersecurity for IT Professionals\02.Why Cybersecurity\02.04.A history of hackers.srt 8,169 F1303573
LinkedIn Learning Cybersecurity for IT Professionals\02.Why Cybersecurity\02.05.The cyber kill chain.mp4 [8f7eda7c4a64e5c0] 9,661,710 D23A7893
LinkedIn Learning Cybersecurity for IT Professionals\02.Why Cybersecurity\02.05.The cyber kill chain.srt 9,763 E124123F
LinkedIn Learning Cybersecurity for IT Professionals\02.Why Cybersecurity\02.06.Stuxnet and the kill chain.mp4 [b8dcdffc651ff540] 5,488,348 89B8F549
LinkedIn Learning Cybersecurity for IT Professionals\02.Why Cybersecurity\02.06.Stuxnet and the kill chain.srt 6,506 ED74F66C
LinkedIn Learning Cybersecurity for IT Professionals\02.Why Cybersecurity\02.07.Common forms of cyber attack.mp4 [3eec0b6bde6be260] 9,913,843 41D8BB74
LinkedIn Learning Cybersecurity for IT Professionals\02.Why Cybersecurity\02.07.Common forms of cyber attack.srt 11,707 113401E7
LinkedIn Learning Cybersecurity for IT Professionals\03.Antivirus\03.08.Viruses, spyware, and adware.mp4 [b5fd852e9ec005a9] 2,722,224 DBA6F3CA
LinkedIn Learning Cybersecurity for IT Professionals\03.Antivirus\03.08.Viruses, spyware, and adware.srt 2,922 029926F4
LinkedIn Learning Cybersecurity for IT Professionals\03.Antivirus\03.09.Introducing Microsoft Windows Defender.mp4 [9e0cda729fe97193] 7,008,842 6FAE4BD9
LinkedIn Learning Cybersecurity for IT Professionals\03.Antivirus\03.09.Introducing Microsoft Windows Defender.srt 5,359 B495FB55
LinkedIn Learning Cybersecurity for IT Professionals\03.Antivirus\03.10.Detecting malware with Defender.mp4 [2873b6317989a043] 6,281,724 F518057E
LinkedIn Learning Cybersecurity for IT Professionals\03.Antivirus\03.11.Defender advanced settings.mp4 [639acab5f085cd28] 5,798,076 266DF363
LinkedIn Learning Cybersecurity for IT Professionals\03.Antivirus\03.11.Defender advanced settings.srt 2,618 CB639E75
LinkedIn Learning Cybersecurity for IT Professionals\03.Antivirus\03.12.Automating scans with task scheduler.mp4 [6d5841eca63909f9] 8,826,816 357889BE
LinkedIn Learning Cybersecurity for IT Professionals\03.Antivirus\03.12.Automating scans with task scheduler.srt 5,781 EE6664C4
LinkedIn Learning Cybersecurity for IT Professionals\03.Antivirus\03.13.Other antivirus solutions.mp4 [bb57fb1575606618] 4,070,058 3ABCF3A5
LinkedIn Learning Cybersecurity for IT Professionals\03.Antivirus\03.13.Other antivirus solutions.srt 2,779 58341905
LinkedIn Learning Cybersecurity for IT Professionals\04.Firewalls\04.14.Why firewalls.mp4 [e4dc1419d7a6f776] 3,545,513 3D57199E
LinkedIn Learning Cybersecurity for IT Professionals\04.Firewalls\04.14.Why firewalls.srt 3,923 C94AB514
LinkedIn Learning Cybersecurity for IT Professionals\04.Firewalls\04.15.Windows firewall basics.mp4 [244aefe05b0b834] 11,596,506 34E6EF28
LinkedIn Learning Cybersecurity for IT Professionals\04.Firewalls\04.15.Windows firewall basics.srt 7,475 9AC61716
LinkedIn Learning Cybersecurity for IT Professionals\04.Firewalls\04.16.Advanced Windows firewall.mp4 [7794c632e350ceec] 20,178,160 1C2344A8
LinkedIn Learning Cybersecurity for IT Professionals\04.Firewalls\04.16.Advanced Windows firewall.srt 11,821 44B2CC4C
LinkedIn Learning Cybersecurity for IT Professionals\04.Firewalls\04.17.ZedLan firewall log analyzer.mp4 [f01e53abe1d737aa] 9,958,840 AA0BAF32
LinkedIn Learning Cybersecurity for IT Professionals\04.Firewalls\04.17.ZedLan firewall log analyzer.srt 6,679 199A26B8
LinkedIn Learning Cybersecurity for IT Professionals\04.Firewalls\04.18.Introducing Linux iptables.mp4 [454a84ffc84051c5] 17,726,781 4D913CF9
LinkedIn Learning Cybersecurity for IT Professionals\04.Firewalls\04.18.Introducing Linux iptables.srt 6,936 997C82EF
LinkedIn Learning Cybersecurity for IT Professionals\04.Firewalls\04.19.Setting up a simple iptables firewall.mp4 [511b4fbe47b614f2] 7,831,972 BB7022DA
LinkedIn Learning Cybersecurity for IT Professionals\04.Firewalls\04.19.Setting up a simple iptables firewall.srt 2,728 19E0EFE6
LinkedIn Learning Cybersecurity for IT Professionals\05.Network Scanning\05.20.Getting started with Nmap.mp4 [f41351dfad5f5cf1] 24,750,337 C17E9C31
LinkedIn Learning Cybersecurity for IT Professionals\05.Network Scanning\05.20.Getting started with Nmap.srt 10,152 BB78E0D3
LinkedIn Learning Cybersecurity for IT Professionals\05.Network Scanning\05.21.Advanced Nmap options.mp4 [2ecb1fb8c1fcbfea] 10,930,591 3C27841C
LinkedIn Learning Cybersecurity for IT Professionals\05.Network Scanning\05.21.Advanced Nmap options.srt 4,922 76AFD929
LinkedIn Learning Cybersecurity for IT Professionals\05.Network Scanning\05.22.GUI scanning with Zenmap.mp4 [f45995aef4e91680] 9,993,182 E14879A0
LinkedIn Learning Cybersecurity for IT Professionals\05.Network Scanning\05.22.GUI scanning with Zenmap.srt 4,391 56E6C8AB
LinkedIn Learning Cybersecurity for IT Professionals\06.Network Connections\06.23.Getting started with netcat.mp4 [ffc7501fbb108853] 8,015,482 9B574CEA
LinkedIn Learning Cybersecurity for IT Professionals\06.Network Connections\06.23.Getting started with netcat.srt 4,533 230F2319
LinkedIn Learning Cybersecurity for IT Professionals\06.Network Connections\06.24.Transferring files using netcat.mp4 [b19b9e080172d6f9] 11,259,776 30BEFBCA
LinkedIn Learning Cybersecurity for IT Professionals\06.Network Connections\06.24.Transferring files using netcat.srt 5,157 D4D9B51F
LinkedIn Learning Cybersecurity for IT Professionals\06.Network Connections\06.25.Connecting to services.mp4 [94f2b71c9a97f3ac] 9,646,449 756723F0
LinkedIn Learning Cybersecurity for IT Professionals\06.Network Connections\06.25.Connecting to services.srt 3,869 37B65797
LinkedIn Learning Cybersecurity for IT Professionals\06.Network Connections\06.26.Setting up a netcat honeypot.mp4 [c0ccb22c5f96dfad] 10,109,069 5D167C4C
LinkedIn Learning Cybersecurity for IT Professionals\06.Network Connections\06.26.Setting up a netcat honeypot.srt 5,165 B38D813A
LinkedIn Learning Cybersecurity for IT Professionals\07.Vulnerability Scanning\07.27.Preparing Nessus to do scanning.mp4 [807664ea624c5b6] 12,444,260 60715185
LinkedIn Learning Cybersecurity for IT Professionals\07.Vulnerability Scanning\07.27.Preparing Nessus to do scanning.srt 8,992 B99960CA
LinkedIn Learning Cybersecurity for IT Professionals\07.Vulnerability Scanning\07.28.Setting up a Nessus policy.mp4 [fae063b9ad70c384] 5,483,138 450ECDA6
LinkedIn Learning Cybersecurity for IT Professionals\07.Vulnerability Scanning\07.28.Setting up a Nessus policy.srt 3,860 7D6D957C
LinkedIn Learning Cybersecurity for IT Professionals\07.Vulnerability Scanning\07.29.Running a Nessus scan.mp4 [8963e5a286bdf49] 10,034,374 F91D8348
LinkedIn Learning Cybersecurity for IT Professionals\07.Vulnerability Scanning\07.30.Scheduling scans.mp4 [5607e615726fbd35] 2,509,264 5A4B65A2
LinkedIn Learning Cybersecurity for IT Professionals\07.Vulnerability Scanning\07.30.Scheduling scans.srt 2,260 0D4C7AA7
LinkedIn Learning Cybersecurity for IT Professionals\08.Web Applications\08.31.Combating application level threats.mp4 [8f6fc91b050ed84] 2,979,544 4BD94D9A
LinkedIn Learning Cybersecurity for IT Professionals\08.Web Applications\08.31.Combating application level threats.srt 1,611 67258D18
LinkedIn Learning Cybersecurity for IT Professionals\08.Web Applications\08.32.Running an SQL injection attack.mp4 [e25ab3613e17415e] 9,974,418 57F14CCD
LinkedIn Learning Cybersecurity for IT Professionals\08.Web Applications\08.33.Cross-site scripting.mp4 [b1bc837f819fcc5f] 3,929,799 44CC2EE7
LinkedIn Learning Cybersecurity for IT Professionals\08.Web Applications\08.33.Cross-site scripting.srt 2,556 7E8981BD
LinkedIn Learning Cybersecurity for IT Professionals\08.Web Applications\08.34.Installing a web scanner.mp4 [b0c9a453025ecd38] 7,027,273 EDD41B9A
LinkedIn Learning Cybersecurity for IT Professionals\08.Web Applications\08.34.Installing a web scanner.srt 2,954 41486DC7
LinkedIn Learning Cybersecurity for IT Professionals\08.Web Applications\08.35.Scanning a website.mp4 [5127017a187afd95] 13,170,963 5B188807
LinkedIn Learning Cybersecurity for IT Professionals\08.Web Applications\08.35.Scanning a website.srt 9,898 9B800EA8
LinkedIn Learning Cybersecurity for IT Professionals\08.Web Applications\08.36.Using a web proxy to inspect traffic.mp4 [259be0173496ebd5] 8,510,890 BFA37931
LinkedIn Learning Cybersecurity for IT Professionals\08.Web Applications\08.36.Using a web proxy to inspect traffic.srt 5,915 2DC35089
LinkedIn Learning Cybersecurity for IT Professionals\09.Monitoring Packets\09.37.Explaining networks.mp4 [f8c406ab1a6a6318] 8,311,426 8B56BCE7
LinkedIn Learning Cybersecurity for IT Professionals\09.Monitoring Packets\09.37.Explaining networks.srt 8,864 D506523A
LinkedIn Learning Cybersecurity for IT Professionals\09.Monitoring Packets\09.38.Capturing packets with Wireshark.mp4 [8dfa50d0e83c3647] 9,861,083 BDB9C9C8
LinkedIn Learning Cybersecurity for IT Professionals\09.Monitoring Packets\09.38.Capturing packets with Wireshark.srt 4,625 0F2C1234
LinkedIn Learning Cybersecurity for IT Professionals\09.Monitoring Packets\09.39.Making sense of the protocols.mp4 [d91a1e46a293c1ac] 12,708,009 7B8415F1
LinkedIn Learning Cybersecurity for IT Professionals\09.Monitoring Packets\09.39.Making sense of the protocols.srt 6,212 683EAD6D
LinkedIn Learning Cybersecurity for IT Professionals\09.Monitoring Packets\09.40.Using Wireshark filters.mp4 [383ace26ed3bd492] 10,767,095 DAD59CDB
LinkedIn Learning Cybersecurity for IT Professionals\09.Monitoring Packets\09.40.Using Wireshark filters.srt 3,921 9EDA1277
LinkedIn Learning Cybersecurity for IT Professionals\09.Monitoring Packets\09.41.Capturing intruders with packets.mp4 [a084ab8a5a2da40d] 7,440,639 CF41044B
LinkedIn Learning Cybersecurity for IT Professionals\09.Monitoring Packets\09.41.Capturing intruders with packets.srt 5,004 BAC0D046
LinkedIn Learning Cybersecurity for IT Professionals\10.Conclusion\10.42.Next steps.mp4 [a83705e04b75cf8e] 2,935,325 9FB5B87C
LinkedIn Learning Cybersecurity for IT Professionals\10.Conclusion\10.42.Next steps.srt 2,600 683A4660
LinkedIn Learning Cybersecurity for IT Professionals\Ex_Files_Cybersecurity_IT_Professionals.zip 48,116 5E6FCD1B
LinkedIn Learning Cybersecurity for IT Professionals\01.Introduction 0 00000000
LinkedIn Learning Cybersecurity for IT Professionals\02.Why Cybersecurity 0 00000000
LinkedIn Learning Cybersecurity for IT Professionals\03.Antivirus 0 00000000
LinkedIn Learning Cybersecurity for IT Professionals\04.Firewalls 0 00000000
LinkedIn Learning Cybersecurity for IT Professionals\05.Network Scanning 0 00000000
LinkedIn Learning Cybersecurity for IT Professionals\06.Network Connections 0 00000000
LinkedIn Learning Cybersecurity for IT Professionals\07.Vulnerability Scanning 0 00000000
LinkedIn Learning Cybersecurity for IT Professionals\08.Web Applications 0 00000000
LinkedIn Learning Cybersecurity for IT Professionals\09.Monitoring Packets 0 00000000
LinkedIn Learning Cybersecurity for IT Professionals\10.Conclusion 0 00000000
LinkedIn Learning Cybersecurity for IT Professionals 0 00000000

Total size: 361,067,921
RAR Recovery
Present (Protect+) 3,614,676
Labels UNKNOWN