Torrent details for "Advanced Cybersecurity and Ethical Hacking with ChatGPT" Log in to bookmark
Controls:
×
Report Torrent
Please select a reason for reporting this torrent:
Your report will be reviewed by our moderation team.
×
Report Information
Loading report information...
This torrent has been reported 0 times.
Report Summary:
| User | Reason | Date |
|---|
Failed to load report information.
×
Success
Your report has been submitted successfully.
Checked by:
Category:
Language:
English
Total Size:
1.4 GB
Info Hash:
D5FBA13DCD920DA569E1E1C0FB389B00A92A2E6C
Added By:
Added:
Dec. 24, 2023, 2:51 a.m.
Stats:
|
(Last updated: May 10, 2025, 10:18 p.m.)
| File | Size |
|---|---|
| 48 - Introduction to Capture The Flag CTF Challenges.mp4 | 47.9 MB |
| TutsNode.org.txt | 63 bytes |
| [TGx]Downloaded from torrentgalaxy.to .txt | 585 bytes |
| 2 - Introduce Yourself To Your Fellow Students And Tell Us What You Want To Learn.html | 583 bytes |
| 0 | 85.9 KB |
| 52 - Building a Security Automation Workflow with ChatGPT.mp4 | 46.6 MB |
| 19 - Exploiting-System-and-Application-Vulnerabilities-via-ChatGPT.pdf | 369.5 KB |
| 1 | 12.9 KB |
| 55 - Navigating the Job Market and Advancing Your Cybersecurity Career.mp4 | 42.3 MB |
| 26 - Implementing-Intrusion-Detection-and-Prevention-Systems-IDPS.pdf | 113.1 KB |
| 2 | 63.6 KB |
| 53 - Penetration Testing Report Compilation with ChatGPT.mp4 | 37.5 MB |
| 3 | 6.8 KB |
| 54 - Resume Building and Interview Preparation for Ethical Hackers.mp4 | 36.6 MB |
| 31 - Exploring-AI-and-Machine-Learning-in-Cybersecurity.pdf | 425.7 KB |
| 4 | 16.8 KB |
| 7 - Operating System Fundamentals for Hacking and Penetration Testing.mp4 | 36.1 MB |
| 14 - Social-Engineering-and-Psychological-Tactics-with-ChatGPT.pdf | 418.5 KB |
| 5 | 18.6 KB |
| 49 - Solving CTF Challenges Using ChatGPT.mp4 | 35.5 MB |
| 34 - Analyzing-Real-Cyber-Attacks-and-Breaches.pdf | 469.2 KB |
| 6 | 4.2 KB |
| 17 - Network Vulnerability Scanning and Analysis with ChatGPT.mp4 | 35.1 MB |
| 55 - Navigating-the-Job-Market-and-Advancing-Your-Cybersecurity-Career.pdf | 409.9 KB |
| 7 | 3.8 KB |
| 4 - Understanding the Role of Ethical Hackers and Penetration Testers.mp4 | 34.7 MB |
| 27 - Security-Configuration-and-Patch-Management-Using-ChatGPT.pdf | 301.2 KB |
| 8 | 802 bytes |
| 36 - Ethical Hacking Case Studies Using ChatGPT.mp4 | 34.4 MB |
| 9 | 133.2 KB |
| 21 - Penetration Testing Methodologies and Reporting.mp4 | 34.0 MB |
| 13 - Active-Information-Gathering-and-Open-Source-Intelligence-OSINT.pdf | 459.4 KB |
| 10 | 2.5 KB |
| 20 - PostExploitation Techniques and Privilege Escalation.mp4 | 33.0 MB |
| 11 | 18.6 KB |
| 46 - Securing Containers and Serverless Architectures.mp4 | 32.9 MB |
| 12 | 121.3 KB |
| 10 - Setting Up and Configuring ChatGPT for Hacking Tasks.mp4 | 32.7 MB |
| 29 - Creating-Custom-ChatGPT-Models-for-Cybersecurity-Tasks.pdf | 260.5 KB |
| 13 | 2.1 KB |
| 32 - Blockchain Security and Decentralized Technologies.mp4 | 31.7 MB |
| 37 - Red-Team-vs.Blue-Team-Exercises-with-ChatGPT.pdf | 347.1 KB |
| 14 | 3.7 KB |
| 43 - Conducting Compliance Audits with ChatGPT.mp4 | 31.5 MB |
| 15 | 44.3 KB |
| 24 - Wireless Network Hacking and Countermeasures Using ChatGPT.mp4 | 30.2 MB |
| 45 - Assessing-Cloud-Infrastructure-with-ChatGPT.pdf | 282.9 KB |
| 16 | 10.8 KB |
| 16 - Web Application Vulnerability Assessment Using ChatGPT.mp4 | 29.1 MB |
| 43 - Conducting-Compliance-Audits-with-ChatGPT.pdf | 391.8 KB |
| 17 | 923 bytes |
| 28 - Leveraging ChatGPT for Threat Hunting and Analysis.mp4 | 28.7 MB |
| 23 - Network-Hacking-and-Defense-in-Depth-Approaches.pdf | 263.5 KB |
| 18 | 10.8 KB |
| 11 - Navigating the ChatGPT Interface for Cybersecurity Analysis.mp4 | 27.4 MB |
| 19 | 69.9 KB |
| 34 - Analyzing Real Cyber Attacks and Breaches.mp4 | 26.1 MB |
| 15 - Scanning-and-Enumeration-Techniques-with-ChatGPT.pdf | 407.0 KB |
| 20 | 6.3 KB |
| 40 - Continuous Monitoring and Incident Response Strategies.mp4 | 25.9 MB |
| 21 | 67.3 KB |
| 6 - Basics of Networking and Protocols for Ethical Hackers.mp4 | 25.6 MB |
| 41 - Understanding-GDPR-HIPAA-and-Other-Regulations.pdf | 402.3 KB |
| 22 | 31.8 KB |
| 39 - Integrating Security into DevOps with ChatGPT.mp4 | 23.4 MB |
| 23 | 65.9 KB |
| 9 - Introduction to Natural Language Processing and ChatGPT.mp4 | 23.1 MB |
| 51 - Designing-a-Comprehensive-Penetration-Test-Using-ChatGPT.pdf | 402.0 KB |
| 24 | 8.4 KB |
| 45 - Assessing Cloud Infrastructure with ChatGPT.mp4 | 22.8 MB |
| 25 | 187.1 KB |
| 29 - Creating Custom ChatGPT Models for Cybersecurity Tasks.mp4 | 22.7 MB |
| 20 - Post-Exploitation-Techniques-and-Privilege-Escalation.pdf | 310.8 KB |
| 26 | 2.0 KB |
| 19 - Exploiting System and Application Vulnerabilities via ChatGPT.mp4 | 22.6 MB |
| 49 - Solving-CTF-Challenges-Using-ChatGPT.pdf | 387.0 KB |
| 27 | 1.4 KB |
| 5 - The Legal and Ethical Framework of Ethical Hacking.mp4 | 22.6 MB |
| 1 - Course-Overview-and-Introduction-to-ChatGPT-in-Cybersecurity.pdf | 393.6 KB |
| 28 | 46.6 KB |
| 50 - Hosting and Managing CTF Events with ChatGPT.mp4 | 22.4 MB |
| 29 | 130.0 KB |
| 44 - Cloud Security Fundamentals and Shared Responsibility Model.mp4 | 22.3 MB |
| 30 | 164.8 KB |
| 51 - Designing a Comprehensive Penetration Test Using ChatGPT.mp4 | 22.3 MB |
| 31 | 221.8 KB |
| 38 - Secure Coding Practices and Code Review Using ChatGPT.mp4 | 21.9 MB |
| 32 | 91.7 KB |
| 8 - Introduction to Cyber Threats and Attack Vectors.mp4 | 21.9 MB |
| 33 | 128.2 KB |
| 42 - Building Compliant Systems and Applications.mp4 | 21.5 MB |
| 42 - Building-Compliant-Systems-and-Applications.pdf | 501.7 KB |
| 34 | 2.1 KB |
| 14 - Social Engineering and Psychological Tactics with ChatGPT.mp4 | 21.4 MB |
| 35 | 148.9 KB |
| 22 - Advanced Web Application Attacks and Defense Strategies.mp4 | 20.9 MB |
| 36 | 128.1 KB |
| 33 - Ethical Implications and Responsible AI Usage in Hacking.mp4 | 20.7 MB |
| 37 | 270.8 KB |
| 15 - Scanning and Enumeration Techniques with ChatGPT.mp4 | 20.7 MB |
| 5 - The-Legal-and-Ethical-Framework-of-Ethical-Hacking.pdf | 339.6 KB |
| 38 | 9.4 KB |
| 41 - Understanding GDPR HIPAA and Other Regulations.mp4 | 20.2 MB |
| 12 - Passive-Information-Gathering-Using-ChatGPT.pdf | 302.8 KB |
| 39 | 11.8 KB |
| 13 - Active Information Gathering and Open Source Intelligence OSINT.mp4 | 20.1 MB |
| 9 - Introduction-to-Natural-Language-Processing-and-ChatGPT.pdf | 352.5 KB |
| 40 | 32.1 KB |
| 27 - Security Configuration and Patch Management Using ChatGPT.mp4 | 19.9 MB |
| 41 | 118.4 KB |
| 31 - Exploring AI and Machine Learning in Cybersecurity.mp4 | 19.8 MB |
| 42 | 163.4 KB |
| 23 - Network Hacking and Defense in Depth Approaches.mp4 | 19.7 MB |
| 43 | 272.7 KB |
| 30 - Lesson 27 Automating Routine Security Tasks with ChatGPT.mp4 | 19.4 MB |
| 44 | 123.4 KB |
| 26 - Implementing Intrusion Detection and Prevention Systems IDPS.mp4 | 19.2 MB |
| 54 - Resume-Building-and-Interview-Preparation-for-Ethical-Hackers.pdf | 319.7 KB |
| 45 | 2.3 KB |
| 37 - Red Team vs Blue Team Exercises with ChatGPT.mp4 | 19.0 MB |
| 39 - Integrating-Security-into-DevOps-with-ChatGPT.pdf | 487.5 KB |
| 46 | 6.4 KB |
| 1 - Course Overview and Introduction to ChatGPT in Cybersecurity.mp4 | 18.7 MB |
| 47 | 296.9 KB |
| 12 - Passive Information Gathering Using ChatGPT.mp4 | 18.5 MB |
| 48 | 21.8 KB |
| 25 - Introduction to Defensive Security and Cyber Hygiene.mp4 | 18.4 MB |
| 49 | 99.7 KB |
| 3 - Lets Celebrate Your Progress In This Course 25 50 75 100.mp4 | 6.8 MB |
| 50 | 217.6 KB |
| 56 - Youve Achieved 100 Lets Celebrate Remember To Share Your Certificate.mp4 | 5.5 MB |
| 40 - Continuous-Monitoring-and-Incident-Response-Strategies.pdf | 474.9 KB |
| 51 | 30.2 KB |
| 47 - Youve Achieved 75 Lets Celebrate Your Progress And Keep Going To 100.mp4 | 2.6 MB |
| 46 - Securing-Containers-and-Serverless-Architectures.pdf | 352.4 KB |
| 52 | 11.5 KB |
| 35 - Youve Achieved 50 Lets Celebrate Your Progress And Keep Going To 75.mp4 | 2.4 MB |
| 53 | 98.1 KB |
| 18 - Youve Achieved 25 Lets Celebrate Your Progress And Keep Going To 50.mp4 | 2.0 MB |
| 18 - Quarter-Complete-Well-Done-Keep-Going.pdf | 464.3 KB |
| 54 | 37.6 KB |
| 3 - Lets-Celebrate-Your-Progress.pdf | 840.0 KB |
| 55 | 184.0 KB |
| 56 - All-Complete-Well-Done.pdf | 840.0 KB |
| 56 | 184.0 KB |
| 22 - Advanced-Web-Application-Attacks-and-Defense-Strategies.pdf | 651.2 KB |
| 48 - Introduction-to-Capture-The-Flag-CTF-Challenges.pdf | 342.1 KB |
| 57 | 30.7 KB |
| 36 - Ethical-Hacking-Case-Studies-Using-ChatGPT.pdf | 647.7 KB |
| 4 - Understanding-the-Role-of-Ethical-Hackers-and-Penetration-Testers.pdf | 316.6 KB |
| 58 | 59.7 KB |
| 47 - 3-Quarters-Complete-Well-Done-Keep-Going.pdf | 613.5 KB |
| 11 - Navigating-the-ChatGPT-Interface-for-Cybersecurity-Analysis.pdf | 393.5 KB |
| 59 | 17.0 KB |
| 6 - Basics-of-Networking-and-Protocols-for-Ethical-Hackers.pdf | 610.3 KB |
| 8 - Introduction-to-Cyber-Threats-and-Attack-Vectors.pdf | 389.3 KB |
| 60 | 24.3 KB |
| 7 - Operating-System-Fundamentals-for-Hacking-and-Penetration-Testing.pdf | 601.4 KB |
| 24 - Wireless-Network-Hacking-and-Countermeasures-Using-ChatGPT.pdf | 300.8 KB |
| 61 | 121.8 KB |
| 25 - Introduction-to-Defensive-Security-and-Cyber-Hygiene.pdf | 594.1 KB |
| 62 | 429.9 KB |
| 53 - Penetration-Testing-Report-Compilation-with-ChatGPT.pdf | 575.2 KB |
| 63 | 448.8 KB |
| 33 - Ethical-Implications-and-Responsible-AI-Usage-in-Hacking.pdf | 546.5 KB |
| 10 - Setting-Up-and-Configuring-ChatGPT-for-Hacking-Tasks.pdf | 455.4 KB |
| 64 | 22.1 KB |
| 28 - Leveraging-ChatGPT-for-Threat-Hunting-and-Analysis.pdf | 543.7 KB |
| 65 | 480.3 KB |
| 52 - Building-a-Security-Automation-Workflow-with-ChatGPT.pdf | 536.7 KB |
| 66 | 487.3 KB |
| 38 - Secure-Coding-Practices-and-Code-Review-Using-ChatGPT.pdf | 535.0 KB |
| 67 | 489.0 KB |
| 16 - Web-Application-Vulnerability-Assessment-Using-ChatGPT.pdf | 528.4 KB |
| 68 | 495.6 KB |
| 50 - Hosting-and-Managing-CTF-Events-with-ChatGPT.pdf | 523.2 KB |
| 69 | 500.8 KB |
| 21 - Penetration-Testing-Methodologies-and-Reporting.pdf | 521.9 KB |
| 70 | 502.1 KB |
| 17 - Network-Vulnerability-Scanning-and-Analysis-with-ChatGPT.pdf | 514.9 KB |
| 32 - Blockchain-Security-and-Decentralized-Technologies.pdf | 505.9 KB |
| 71 | 3.1 KB |
| 35 - Half-Complete-Well-Done-Keep-Going.pdf | 511.3 KB |
| 72 | 757 bytes |
| 44 - Cloud-Security-Fundamentals-and-Shared-Responsibility-Model.pdf | 510.1 KB |
Name
DL
Uploader
Size
S/L
Added
-
11.4 MB
[9
/
1]
2023-07-01
| Uploaded by FreeCourseWeb | Size 11.4 MB | Health [ 9 /1 ] | Added 2023-07-01 |
-
13.4 MB
[24
/
3]
2024-12-26
| Uploaded by indexFroggy | Size 13.4 MB | Health [ 24 /3 ] | Added 2024-12-26 |
-
14.7 MB
[49
/
3]
2023-07-01
| Uploaded by indexFroggy | Size 14.7 MB | Health [ 49 /3 ] | Added 2023-07-01 |
NOTE
SOURCE: Advanced Cybersecurity and Ethical Hacking with ChatGPT
-----------------------------------------------------------------------------------
COVER

-----------------------------------------------------------------------------------
MEDIAINFO
None
×


