[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f6Y9A1k_Zt2scHNXDg8xzMdjQgotV6IuxYhEVCESj-oM":3},{"id":4,"name":5,"category_id":6,"subcategory_id":7,"uploaded_by":8,"downloads":9,"size":10,"seeders":11,"leechers":12,"infohash":13,"language":14,"title":15,"slogan":15,"poster_alt":16,"description":15,"cover_image":15,"magnet_link":17,"stream_link":16,"content":18,"files":19,"comments_count":20,"tracker_list":21,"date_uploaded":22,"last_checked":22,"last_checked_at":16,"user_id":16,"submit_flag":20,"uploaded_at":23,"created_at":24,"updated_at":24,"slugged_title":25,"category_name":26,"subcategory_name":27,"uploaded_ago":28,"category":29,"subcategory":30,"comments":32},6579949,"Complete Introduction to Cybersecurity 2026 by Grant Collins",9,34,"freecoursewb",47821,"968.9 MB",25324,11614,"44812FEFAB3C82007CC7493FA2D25F52E23E3B6A","English","",null,"magnet:?xt=urn:btih:44812FEFAB3C82007CC7493FA2D25F52E23E3B6A&dn=Complete+Introduction+to+Cybersecurity+2026+by+Grant+Collins&tr=udp%3A%2F%2Ftracker.torrent.eu.org%3A451%2Fannounce&tr=udp%3A%2F%2Ftracker.tiny-vps.com%3A6969%2Fannounce&tr=http%3A%2F%2Ftracker.foreverpirates.co%3A80%2Fannounce&tr=udp%3A%2F%2Ftracker.cyberia.is%3A6969%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce&tr=udp%3A%2F%2Fexplodie.org%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=udp%3A%2F%2F9.rarbg.to%3A2780%2Fannounce&tr=udp%3A%2F%2Ftracker.internetwarriors.net%3A1337%2Fannounce&tr=udp%3A%2F%2Fipv4.tracker.harry.lu%3A80%2Fannounce&tr=udp%3A%2F%2Fopen.stealth.si%3A80%2Fannounce&tr=udp%3A%2F%2F9.rarbg.to%3A2900%2Fannounce&tr=udp%3A%2F%2F9.rarbg.me%3A2720%2Fannounce&tr=udp%3A%2F%2Fopentor.org%3A2710%2Fannounce&tr=udp%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=http%3A%2F%2Ftracker.openbittorrent.com%3A80%2Fannounce&tr=udp%3A%2F%2Fopentracker.i2p.rocks%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.internetwarriors.net%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.leechers-paradise.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fcoppersurfer.tk%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.zer0day.to%3A1337%2Fannounce","\u003Cp>\u003Cstrong> Complete Introduction to Cybersecurity 2026 by Grant Collins  \u003C/strong>\n\u003Cbr>\u003Cbr>\u003Cspan style=\"font-size: 16px\">\u003Cstrong>\u003Ca target=\"_blank\" href=\"https://WebToolTip.com\">https://WebToolTip.com\u003C/a> \u003C/strong>\u003C/span>\n\u003Cbr>\u003Cbr>Last updated 1/2026\n\u003Cbr>Created by Grant Collins\n\u003Cbr>MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz, 2 Ch\n\u003Cbr>Level: Beginner | Genre: eLearning | Language: English + subtitle | Duration: 40 Lectures ( 2h 39m ) | Size: 969 MB\n\u003Cbr>\u003Cbr>Learn the basics of I.T. and fundamentals cybersecurity. Complete Beginner Course!\n\u003Cbr>\u003Cbr>What you'll learn\n\u003Cbr>✓ High-level overview of cybersecurity concepts, technologies, and principles\n\u003Cbr>✓ Understand what cybersecurity is and where its implemented\n\u003Cbr>✓ Cybersecurity Attacks and Defenses\n\u003Cbr>✓ Hands-on Cyber Attack  - A Basic Overview of Password Cracking\n\u003Cbr>✓ Fundamentals of I.T., including hardware, software, operating systems, and computer networks\n\u003Cbr>✓ Very basics of what malware and virus is\n\u003Cbr>✓ Very basics of cybersecurity defenses\n\u003Cbr>✓ Develop a next-step plan to continue your learning journey\n\u003Cbr>\u003Cbr>Requirements\n\u003Cbr>● No prerequisites required. Just a willingness to learn!\u003C/p>","\u003Ch2>Files: \u003C/h2>\n                            \u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>[ WebToolTip.com ] Complete Introduction to Cybersecurity 2026 by Grant Collins\u003C/span>\n\u003Cul>\n\u003Cli>\n\u003Ci class=\"flaticon-other-file\">\u003C/i>Get Bonus Downloads Here.url (0.2 KB)\u003C/li>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>~Get Your Files Here !\u003C/span>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>1 - Course Overview\u003C/span>\n\u003Cul>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>1. Course Introduction.en_US.srt (4.2 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>1. Course Introduction.mp4 (33.8 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>2. Course Objectives.en_US.srt (2.3 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>2. Course Objectives.mp4 (13.4 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>3. Effective Note Taking.en_US.srt (2.9 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>3. Effective Note Taking.mp4 (43.2 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-script\">\u003C/i>4. Download Course Files (Description).html (1.0 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-script\">\u003C/i>4. Download Course Files.html (5.5 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-script\">\u003C/i>5. Hands-on Attack Scenario Download Virtual Machine.html (7.5 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-book\">\u003C/i>Section 1 - Course Overview.pdf (260.3 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-book\">\u003C/i>Section 2 - Cybersecurity Introduction.pdf (148.0 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-book\">\u003C/i>Section 3 - I.T. Terminologies and Concepts.pdf (337.3 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-book\">\u003C/i>Section 4 - Cyber Attacks.pdf (315.7 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-book\">\u003C/i>Section 5- Cyber Defenses.pdf (285.5 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-book\">\u003C/i>Section 6 - Packet Analyzer and Encryption Demo.pdf (129.1 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>2 - Section 2 Cybersecurity Introduction\u003C/span>\n\u003Cul>\n\u003Cli>\n\u003Ci class=\"flaticon-script\">\u003C/i>1. Section 2 Quiz (Description).html (0.7 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-script\">\u003C/i>1. Section 2 Quiz.html (19.2 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>6. What is Cybersecurity.en_US.srt (4.3 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>6. What is Cybersecurity.mp4 (18.0 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>7. Where is Cybersecurity Implemented.en_US.srt (2.6 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>7. Where is Cybersecurity Implemented.mp4 (3.5 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>8. The Six Cybersecurity Domains.en_US.srt (8.7 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>8. The Six Cybersecurity Domains.mp4 (17.2 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-script\">\u003C/i>9. Hands-on Attack Scenario Introduction (Description).html (2.5 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>9. Hands-on Attack Scenario Introduction.en_US.srt (3.3 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>9. Hands-on Attack Scenario Introduction.mp4 (5.1 MB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>3 - Section 3 The I T Fundamentals\u003C/span>\n\u003Cul>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>10. Section 3 Overview.en_US.srt (1.4 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>10. Section 3 Overview.mp4 (4.6 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>11. Computer Hardware.en_US.srt (4.2 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>11. Computer Hardware.mp4 (25.5 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>12. Internal Computing Components.en_US.srt (6.5 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>12. Internal Computing Components.mp4 (65.0 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>13. Demo of Hardware Components in PC.en_US.srt (3.0 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>13. Demo of Hardware Components in PC.mp4 (60.5 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>14. Data Storage Devices.en_US.srt (3.2 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>14. Data Storage Devices.mp4 (5.4 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>15. Software.en_US.srt (5.2 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>15. Software.mp4 (19.0 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>16. Computer Networks and Networking.en_US.srt (6.9 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>16. Computer Networks and Networking.mp4 (15.9 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>17. MAC and IP Addresses.en_US.srt (2.4 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>17. MAC and IP Addresses.mp4 (3.6 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>18. Network Devices.en_US.srt (7.4 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>18. Network Devices.mp4 (15.9 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>19. The TCP IP Model.en_US.srt (5.1 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>19. The TCP IP Model.mp4 (6.4 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-script\">\u003C/i>2. Section 3 Quiz (Description).html (0.7 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-script\">\u003C/i>2. Section 3 Quiz.html (23.7 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>20. The OSI Model.en_US.srt (5.5 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>20. The OSI Model.mp4 (16.5 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>21. Network Protocols.en_US.srt (12.1 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>21. Network Protocols.mp4 (29.1 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>22. Intro to the Cloud.en_US.srt (8.8 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>22. Intro to the Cloud.mp4 (27.7 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>23. Hands-on Attack Scenario Setting Up The Attack.en_US.srt (9.7 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>23. Hands-on Attack Scenario Setting Up The Attack.mp4 (112.0 MB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>4 - Section 4 Cyber Attacks\u003C/span>\n\u003Cul>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>24. Section 4 Overview.en_US.srt (0.8 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>24. Section 4 Overview.mp4 (8.1 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>25. Why do hackers attack.en_US.srt (1.9 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>25. Why do hackers attack.mp4 (3.5 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>26. Network Attacks.en_US.srt (9.9 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>26. Network Attacks.mp4 (29.0 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>27. Social Engineering Attacks.en_US.srt (4.5 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>27. Social Engineering Attacks.mp4 (6.8 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>28. Hands-on Attack Scenario The Email Initial Access.en_US.srt (3.9 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>28. Hands-on Attack Scenario The Email Initial Access.mp4 (12.0 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>29. Physical Attacks.en_US.srt (4.7 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>29. Physical Attacks.mp4 (21.5 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-script\">\u003C/i>3. Section 4 Quiz (Description).html (0.7 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-script\">\u003C/i>3. Section 4 Quiz.html (20.8 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>30. Overview of Malware.en_US.srt (9.1 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>30. Overview of Malware.mp4 (45.8 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-script\">\u003C/i>31. Hands-on Attack Scenario The Attack - Gathering Passwords (Description).html (2.6 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>31. Hands-on Attack Scenario The Attack - Gathering Passwords.en_US.srt (12.6 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>31. Hands-on Attack Scenario The Attack - Gathering Passwords.mp4 (151.6 MB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>5 - Section 5 Cyber Defenses\u003C/span>\n\u003Cul>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>32. Section 5 Overview.en_US.srt (1.1 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>32. Section 5 Overview.mp4 (6.4 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>33. General Cybersecurity Defenses.en_US.srt (8.9 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>33. General Cybersecurity Defenses.mp4 (15.8 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>34. Defensive Cybersecurity Technologies.en_US.srt (7.8 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>34. Defensive Cybersecurity Technologies.mp4 (16.6 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>35. Defensive Cybersecurity Software.en_US.srt (6.6 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>35. Defensive Cybersecurity Software.mp4 (28.7 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-script\">\u003C/i>4. Section 5 Quiz (Description).html (0.7 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-script\">\u003C/i>4. Section 5 Quiz.html (20.0 KB)\u003C/li>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>images\u003C/span>\n\u003Cul>\n\u003Cli>\n\u003Ci class=\"flaticon-images\">\u003C/i>img_1762074349.PNG (7.9 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-images\">\u003C/i>img_283906243.png (60.3 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>6 - Section 6 Packet Analysis and Encryption Demo Conclusion\u003C/span>\n\u003Cul>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>36. Section 6 Overview.en_US.srt (5.7 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>36. Section 6 Overview.mp4 (25.6 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>37. Demo Download Wireshark.en_US.srt (2.1 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>37. Demo Download Wireshark.mp4 (9.0 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>38. Demo HTTP vs HTTPS - Encryption Demo.en_US.srt (5.9 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>38. Demo HTTP vs HTTPS - Encryption Demo.mp4 (23.1 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>39. Practical Application in Cybersecurity.en_US.srt (3.1 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>39. Practical Application in Cybersecurity.mp4 (20.2 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>40. Course Conclusion - Where to Go Next.en_US.srt (0.9 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>40. Course Conclusion - Where to Go Next.mp4 (1.9 MB)\u003C/li>\n\u003C/ul>\n\u003Cul>\n\u003Cli>\n\u003Ci class=\"flaticon-book\">\u003C/i>Bonus Resources.txt (0.1 KB)\u003C/li>\n\n              \u003C/ul>\n\u003C/ul>\n\u003C/ul>",0,"\u003Ch3>\n                                Code:\n                            \u003C/h3>\n                            \u003Cul>\n                                \u003Cli>\n                                        \u003Cspan class=\"icon\">\n                                            \u003Ci class=\"flaticon-href-link\">\n                                            \u003C/i>\n                                        \u003C/span>\n                                        udp://tracker.torrent.eu.org:451/announce                                    \u003C/li>\u003Cli>\n                                        \u003Cspan class=\"icon\">\n                                            \u003Ci class=\"flaticon-href-link\">\n                                            \u003C/i>\n                                        \u003C/span>\n                                        udp://tracker.tiny-vps.com:6969/announce                                    \u003C/li>\u003Cli>\n                                        \u003Cspan class=\"icon\">\n                                            \u003Ci class=\"flaticon-href-link\">\n                                            \u003C/i>\n                                        \u003C/span>\n                                        http://tracker.foreverpirates.co:80/announce                                    \u003C/li>\u003Cli>\n                                        \u003Cspan class=\"icon\">\n                                            \u003Ci class=\"flaticon-href-link\">\n                                            \u003C/i>\n                                        \u003C/span>\n                                        udp://tracker.cyberia.is:6969/announce                                    \u003C/li>\u003Cli>\n                                        \u003Cspan class=\"icon\">\n                                            \u003Ci class=\"flaticon-href-link\">\n                                            \u003C/i>\n                                        \u003C/span>\n                                        udp://exodus.desync.com:6969/announce                                    \u003C/li>\u003Cli>\n                                        \u003Cspan class=\"icon\">\n                                            \u003Ci class=\"flaticon-href-link\">\n                                            \u003C/i>\n                                        \u003C/span>\n                                        udp://explodie.org:6969/announce                                    \u003C/li>\u003Cli>\n                                        \u003Cspan class=\"icon\">\n                                            \u003Ci class=\"flaticon-href-link\">\n                                            \u003C/i>\n                                        \u003C/span>\n                                        udp://tracker.opentrackr.org:1337/announce                                    \u003C/li>\u003Cli>\n                                        \u003Cspan class=\"icon\">\n                                            \u003Ci class=\"flaticon-href-link\">\n                                            \u003C/i>\n                                        \u003C/span>\n                                        udp://9.rarbg.to:2780/announce                                    \u003C/li>\u003Cli>\n                                        \u003Cspan class=\"icon\">\n                                            \u003Ci class=\"flaticon-href-link\">\n                                            \u003C/i>\n                                        \u003C/span>\n                                        udp://tracker.internetwarriors.net:1337/announce                                    \u003C/li>\u003Cli>\n                                        \u003Cspan class=\"icon\">\n                                            \u003Ci class=\"flaticon-href-link\">\n                                            \u003C/i>\n                                        \u003C/span>\n                                        udp://ipv4.tracker.harry.lu:80/announce                                    \u003C/li>\u003Cli>\n                                        \u003Cspan class=\"icon\">\n                                            \u003Ci class=\"flaticon-href-link\">\n                                            \u003C/i>\n                                        \u003C/span>\n                                        udp://open.stealth.si:80/announce                                    \u003C/li>\u003Cli>\n                                        \u003Cspan class=\"icon\">\n                                            \u003Ci class=\"flaticon-href-link\">\n                                            \u003C/i>\n                                        \u003C/span>\n                                        udp://9.rarbg.to:2900/announce                                    \u003C/li>\u003Cli>\n                                        \u003Cspan class=\"icon\">\n                                            \u003Ci class=\"flaticon-href-link\">\n                                            \u003C/i>\n                                        \u003C/span>\n                                        udp://9.rarbg.me:2720/announce                                    \u003C/li>\u003Cli>\n                                        \u003Cspan class=\"icon\">\n                                            \u003Ci class=\"flaticon-href-link\">\n                                            \u003C/i>\n                                        \u003C/span>\n                                        udp://opentor.org:2710/announce                                    \u003C/li>                            \u003C/ul>","Feb. 06th '26","2026-02-10 10:32:21","2026-02-10T10:32:21.000000Z","complete-introduction-to-cybersecurity-2026-by-grant-collins","Other","Tutorials","Feb. 10th '26",{"id":6,"name":26},{"id":7,"name":27,"icon":31},"flaticon-tutorial",[]]