磁力管家

磁力管家
为您索检到268条磁力链接,耗时0毫秒。 rss

分享给好友

【影视】 [ TutPig.com ] Linkedin - Cybersecurity Awareness - Cybersecurity Terminology
收录时间:2023-12-19 文档个数:34 文档大小:109.8 MB 最近下载:2025-03-15 人气:478 磁力链接
  • mp4~Get Your Files Here !/04 - 3. Process/01 - Understanding processes and documentation.mp4 10.5 MB
  • mp4~Get Your Files Here !/05 - 4. Technology/01 - Secure practices, terms, and exercises.mp4 10.1 MB
  • mp4~Get Your Files Here !/06 - 5. Threat Actors and Risks/02 - Technical risks.mp4 8.8 MB
  • mp4~Get Your Files Here !/03 - 2. People/01 - Security awareness and leadership.mp4 8.6 MB
  • mp4~Get Your Files Here !/03 - 2. People/04 - Understanding privacy.mp4 8.3 MB
  • mp4~Get Your Files Here !/06 - 5. Threat Actors and Risks/03 - Threats that target the human element.mp4 7.7 MB
  • mp4~Get Your Files Here !/04 - 3. Process/02 - Technical controls.mp4 7.3 MB
  • mp4~Get Your Files Here !/05 - 4. Technology/02 - Network controls.mp4 7.1 MB
  • mp4~Get Your Files Here !/05 - 4. Technology/03 - Advancements in technology.mp4 7.1 MB
  • mp4~Get Your Files Here !/06 - 5. Threat Actors and Risks/01 - Threat actors and definitions.mp4 7.1 MB
  • mp4~Get Your Files Here !/02 - 1. Defining Cybersecurity and People, Process, and Technology/01 - What is cybersecurity.mp4 6.0 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Welcome to Cybersecurity Terminology 101.mp4 5.7 MB
  • mp4~Get Your Files Here !/03 - 2. People/02 - Red vs. blue vs. purple teams.mp4 5.0 MB
  • mp4~Get Your Files Here !/03 - 2. People/03 - Who are the adversaries.mp4 4.7 MB
  • mp4~Get Your Files Here !/02 - 1. Defining Cybersecurity and People, Process, and Technology/02 - People, process, and technology.mp4 2.9 MB
  • mp4~Get Your Files Here !/07 - Conclusion/01 - Apply cybersecurity terminology.mp4 2.8 MB
  • srt~Get Your Files Here !/04 - 3. Process/01 - Understanding processes and documentation.srt 6.2 kB
  • srt~Get Your Files Here !/06 - 5. Threat Actors and Risks/01 - Threat actors and definitions.srt 6.1 kB
  • srt~Get Your Files Here !/06 - 5. Threat Actors and Risks/03 - Threats that target the human element.srt 5.7 kB
  • srt~Get Your Files Here !/04 - 3. Process/02 - Technical controls.srt 5.7 kB
【压缩文件】 [ DevCourseWeb.com ] Cybersecurity - The Beginner's Guide - A comprehensive guide to getting started in cybersecurity.zip
收录时间:2024-01-24 文档个数:1 文档大小:114.6 MB 最近下载:2025-05-14 人气:838 磁力链接
  • zip[ DevCourseWeb.com ] Cybersecurity - The Beginner's Guide - A comprehensive guide to getting started in cybersecurity.zip 114.6 MB
【影视】 [ FreeCourseWeb.com ] Cybersecurity Careers - Build Your Brand in Cybersecurity
收录时间:2024-03-28 文档个数:34 文档大小:189.3 MB 最近下载:2025-05-11 人气:673 磁力链接
  • mp4~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/04 - Optimizing your LinkedIn profile.mp4 18.6 MB
  • mp4~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/05 - Five tips for using LinkedIn effectively.mp4 17.3 MB
  • mp4~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/02 - Speaking at events and conferences.mp4 16.1 MB
  • mp4~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/01 - Creating and sharing content.mp4 16.0 MB
  • mp4~Get Your Files Here !/02 - 1. Personal Branding in Cybersecurity/03 - Benefits of building your personal brand in cybersecurity.mp4 13.9 MB
  • mp4~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/03 - Building an online presence.mp4 13.6 MB
  • mp4~Get Your Files Here !/02 - 1. Personal Branding in Cybersecurity/02 - Elements of a strong personal brand.mp4 13.1 MB
  • mp4~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/02 - Developing a personal brand statement.mp4 11.7 MB
  • mp4~Get Your Files Here !/05 - 4. Networking for Cybersecurity Professionals/03 - Staying up-to-date with industry trends.mp4 11.6 MB
  • mp4~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/03 - Contributing to open-source projects.mp4 11.0 MB
  • mp4~Get Your Files Here !/05 - 4. Networking for Cybersecurity Professionals/01 - Networking and nurturing professional relationships.mp4 10.4 MB
  • mp4~Get Your Files Here !/02 - 1. Personal Branding in Cybersecurity/01 - What is personal branding.mp4 10.1 MB
  • mp4~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/01 - Identifying your unique value proposition.mp4 10.0 MB
  • mp4~Get Your Files Here !/05 - 4. Networking for Cybersecurity Professionals/02 - Effective networking strategies.mp4 8.0 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Grow your cybersecurity career with personal branding.mp4 3.9 MB
  • mp4~Get Your Files Here !/06 - Conclusion/01 - Next steps.mp4 3.9 MB
  • srt~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/02 - Speaking at events and conferences.srt 8.6 kB
  • srt~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/01 - Creating and sharing content.srt 7.9 kB
  • srt~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/04 - Optimizing your LinkedIn profile.srt 7.5 kB
  • srt~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/03 - Building an online presence.srt 7.5 kB
【影视】 [ FreeCourseWeb.com ] Translating Cybersecurity for SMBs - Using the NIST Cybersecurity Framework 2.0
收录时间:2024-05-28 文档个数:43 文档大小:127.0 MB 最近下载:2025-05-11 人气:1074 磁力链接
  • mp4~Get Your Files Here !/05 - 4. Identify/01 - Understand what you have.mp4 10.7 MB
  • mp4~Get Your Files Here !/04 - 3. Govern/02 - Roll out your guidance.mp4 8.8 MB
  • mp4~Get Your Files Here !/11 - Conclusion/01 - Build cybersecurity into your business.mp4 8.5 MB
  • mp4~Get Your Files Here !/04 - 3. Govern/01 - Set your cyber strategy.mp4 8.1 MB
  • mp4~Get Your Files Here !/06 - 5. Protect/02 - Guard your network.mp4 7.0 MB
  • mp4~Get Your Files Here !/06 - 5. Protect/01 - Secure your system.mp4 7.0 MB
  • mp4~Get Your Files Here !/07 - 6. Detect/01 - Know when things are off.mp4 6.9 MB
  • mp4~Get Your Files Here !/08 - 7. Respond/01 - Address cyber incidents.mp4 6.7 MB
  • mp4~Get Your Files Here !/08 - 7. Respond/02 - Keep everyone in the loop.mp4 6.7 MB
  • mp4~Get Your Files Here !/09 - 8. Recover/01 - Get back to normal.mp4 6.6 MB
  • mp4~Get Your Files Here !/03 - 2. NIST Cybersecurity Framework 2.0/01 - Cybersecurity framework fundamentals.mp4 6.3 MB
  • mp4~Get Your Files Here !/10 - 9. Build Cyber Capabilities/01 - Determine your tier.mp4 6.2 MB
  • mp4~Get Your Files Here !/02 - 1. Cybersecurity in Your Business/02 - Understand your cyber risks.mp4 6.0 MB
  • mp4~Get Your Files Here !/03 - 2. NIST Cybersecurity Framework 2.0/02 - Leverage the cybersecurity framework.mp4 5.9 MB
  • mp4~Get Your Files Here !/10 - 9. Build Cyber Capabilities/02 - Define your profile.mp4 5.9 MB
  • mp4~Get Your Files Here !/02 - 1. Cybersecurity in Your Business/01 - Cornerstones of cybersecurity.mp4 5.4 MB
  • mp4~Get Your Files Here !/02 - 1. Cybersecurity in Your Business/03 - Prioritize your biggest risks.mp4 4.9 MB
  • mp4~Get Your Files Here !/10 - 9. Build Cyber Capabilities/03 - Create a plan.mp4 3.4 MB
  • mp4~Get Your Files Here !/01 - Introduction/02 - What you should know.mp4 3.0 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Leverage the NIST CSF to protect what matters most.mp4 2.7 MB
【影视】 Lynda - Foundations of Cybersecurity
收录时间:2017-02-08 文档个数:27 文档大小:300.9 MB 最近下载:2025-03-22 人气:383 磁力链接
  • mp4021 Managing user access and identity.mp4 20.7 MB
  • mp4022 Implementing preventative security.mp4 18.8 MB
  • mp4023 Monitoring and alerts.mp4 15.7 MB
  • mp4018 Describing security requirements.mp4 14.9 MB
  • mp4008 Dissecting the payment card industry and PCI DSS.mp4 14.6 MB
  • mp4007 Implementing control frameworks.mp4 14.3 MB
  • mp4025 Preparing for an incident.mp4 14.2 MB
  • mp4019 Architecting security risk.mp4 13.5 MB
  • mp4016 Understanding advanced persistent threats (APTs).mp4 13.5 MB
  • mp4004 Dissecting cyber risk.mp4 13.1 MB
  • mp4003 Understanding the NIST cybersecurity framework.mp4 12.6 MB
  • mp4011 Dissecting security threats.mp4 11.6 MB
  • mp4026 Responding to an incident.mp4 11.5 MB
  • mp4005 Unpacking COBIT 5.mp4 10.3 MB
  • mp4012 Exploring cybercrime as an industry.mp4 9.9 MB
  • mp4014 Using callbacks to capture keystrokes.mp4 9.8 MB
  • mp4015 Hiding malware with rootkits.mp4 9.8 MB
  • mp4009 Exploring the Cyber Essentials framework.mp4 9.3 MB
  • mp4013 Hiding malware through cloaking and alternate data streams.mp4 9.0 MB
  • mp4020 Selecting security controls.mp4 8.5 MB
【影视】 Lynda - Foundations of Cybersecurity
收录时间:2017-02-08 文档个数:27 文档大小:300.9 MB 最近下载:2025-05-15 人气:1909 磁力链接
  • mp401. Introduction/01_01-Welcome.mp4 6.5 MB
  • mp401. Introduction/01_02-What you should know.mp4 2.0 MB
  • mp402. Cybersecurity Foundations/02_01-Understanding the NIST cybersecurity framework.mp4 12.6 MB
  • mp402. Cybersecurity Foundations/02_02-Dissecting cyber risk.mp4 13.1 MB
  • mp402. Cybersecurity Foundations/02_03-Unpacking COBIT 5.mp4 10.3 MB
  • mp402. Cybersecurity Foundations/02_04-Looking closer at DSS05.mp4 8.1 MB
  • mp402. Cybersecurity Foundations/02_05-Implementing control frameworks.mp4 14.3 MB
  • mp402. Cybersecurity Foundations/02_06-Dissecting the payment card industry and PCI DSS.mp4 14.6 MB
  • mp402. Cybersecurity Foundations/02_07-Exploring the Cyber Essentials framework.mp4 9.3 MB
  • mp403. Cybersecurity Threats/03_01-Breaking down the cybersecurity kill chain.mp4 8.1 MB
  • mp403. Cybersecurity Threats/03_02-Dissecting security threats.mp4 11.6 MB
  • mp403. Cybersecurity Threats/03_03-Exploring cybercrime as an industry.mp4 9.9 MB
  • mp403. Cybersecurity Threats/03_04-Hiding malware through cloaking and alternate data streams.mp4 9.0 MB
  • mp403. Cybersecurity Threats/03_05-Using callbacks to capture keystrokes.mp4 9.8 MB
  • mp403. Cybersecurity Threats/03_06-Hiding malware with rootkits.mp4 9.8 MB
  • mp403. Cybersecurity Threats/03_07-Understanding advanced persistent threats APTs.mp4 13.5 MB
  • mp403. Cybersecurity Threats/03_08-Exploring ransomware.mp4 8.4 MB
  • mp404. Security Architecture/04_01-Describing security requirements.mp4 14.9 MB
  • mp404. Security Architecture/04_02-Architecting security risk.mp4 13.5 MB
  • mp404. Security Architecture/04_03-Selecting security controls.mp4 8.5 MB
【影视】 Lynda - Practical Cybersecurity
收录时间:2017-02-10 文档个数:45 文档大小:244.8 MB 最近下载:2025-05-15 人气:1388 磁力链接
  • mp48. Monitoring Network Activity/164982_08_03_XR15_packets.mp4 13.1 MB
  • mp47. Checking for Common Mistakes in Web Apps/164982_07_02_XR15_scan.mp4 11.9 MB
  • mp43. Personal Firewalls/164982_03_02_XR15_mswf.mp4 10.7 MB
  • mp43. Personal Firewalls/164982_03_06_XR15_iptables.mp4 9.8 MB
  • mp43. Personal Firewalls/164982_03_04_XR15_advrules.mp4 9.5 MB
  • mp47. Checking for Common Mistakes in Web Apps/164982_07_01_XR15_intro.mp4 9.4 MB
  • mp46. Checking Hosts for Known Vulnerabilities/164982_06_04_XR15_scan.mp4 8.6 MB
  • mp41. Why Cybersecurity/164982_01_03_XR15_attack.mp4 8.6 MB
  • mp41. Why Cybersecurity/164982_01_01_XR15_cyber.mp4 8.4 MB
  • mp48. Monitoring Network Activity/164982_08_05_XR151_intruder.mp4 8.3 MB
  • mp48. Monitoring Network Activity/164982_08_04_XR15_filters.mp4 8.2 MB
  • mp42. Antivirus/164982_02_06_XR15_schedule.mp4 8.2 MB
  • mp43. Personal Firewalls/164982_03_03_XR15_advfw.mp4 7.9 MB
  • mp40. Introduction/164982_00_01_WX30_welcome.mp4 6.9 MB
  • mp43. Personal Firewalls/164982_03_05_XR15_zedlan.mp4 6.7 MB
  • mp44. Knowing What Is on Your Network/164982_04_05_XR15_zenmap.mp4 6.3 MB
  • mp45. Network Communications and Detecting Intruders/164982_05_04_XR15_honeypot.mp4 6.0 MB
  • mp45. Network Communications and Detecting Intruders/164982_05_02_XR15_filexfer.mp4 5.8 MB
  • mp48. Monitoring Network Activity/164982_08_02_XR15_capture.mp4 5.6 MB
  • mp42. Antivirus/164982_02_05_XR15_avsettings.mp4 5.5 MB
【影视】 TTC - Thinking about Cybersecurity
收录时间:2017-02-10 文档个数:19 文档大小:8.5 GB 最近下载:2025-05-16 人气:5665 磁力链接
  • wmvTGC_9523_Lect18_Cybersecurity.wmv 509.4 MB
  • wmvTGC_9523_Lect01_Cybersecurity.wmv 509.0 MB
  • wmvTGC_9523_Lect13_Cybersecurity.wmv 508.9 MB
  • wmvTGC_9523_Lect17_Cybersecurity.wmv 494.7 MB
  • wmvTGC_9523_Lect08_Cybersecurity.wmv 493.5 MB
  • wmvTGC_9523_Lect14_Cybersecurity.wmv 486.8 MB
  • wmvTGC_9523_Lect10_Cybersecurity.wmv 486.1 MB
  • wmvTGC_9523_Lect04_Cybersecurity.wmv 480.1 MB
  • wmvTGC_9523_Lect15_Cybersecurity.wmv 474.7 MB
  • wmvTGC_9523_Lect09_Cybersecurity.wmv 473.9 MB
  • wmvTGC_9523_Lect05_Cybersecurity.wmv 472.8 MB
  • wmvTGC_9523_Lect07_Cybersecurity.wmv 470.4 MB
  • wmvTGC_9523_Lect06_Cybersecurity.wmv 467.2 MB
  • wmvTGC_9523_Lect16_Cybersecurity.wmv 460.0 MB
  • wmvTGC_9523_Lect11_Cybersecurity.wmv 453.2 MB
  • wmvTGC_9523_Lect12_Cybersecurity.wmv 449.4 MB
  • wmvTGC_9523_Lect03_Cybersecurity.wmv 438.7 MB
  • wmvTGC_9523_Lect02_Cybersecurity.wmv 378.9 MB
  • PDFDG9523_98F12.PDF 4.7 MB
【影视】 Cybersecurity {AM}
收录时间:2017-02-11 文档个数:39 文档大小:230.5 MB 最近下载:2025-05-15 人气:1804 磁力链接
  • mp40 Introduction/369625_00_03_XR15_Reference.mp4 10.2 MB
  • mp43 Architecting Security/369625_03_05_XR15_Cloud_Attribute_Taxonomy.mp4 10.1 MB
  • mp43 Architecting Security/369625_03_01_XR15_Introduction_to_SABSA.mp4 9.9 MB
  • mp42 Cloud Security Guidance/369625_02_16_SO30_XR30_Solution.mp4 9.9 MB
  • mp42 Cloud Security Guidance/369625_02_03_XR15_Information_Management.mp4 9.8 MB
  • mp41 Cloud Fundamentals/369625_01_01_XR15_Essential_Characteristics.mp4 9.6 MB
  • mp41 Cloud Fundamentals/369625_01_06_XR15_Cloud_Incidents.mp4 9.4 MB
  • mp42 Cloud Security Guidance/369625_02_02_XR15_Legal_Compliance_and_Audit.mp4 8.9 MB
  • mp41 Cloud Fundamentals/369625_01_09_XR15_Cloud_Trust.mp4 8.8 MB
  • mp42 Cloud Security Guidance/369625_02_07_XR15_Incident_Response.mp4 8.8 MB
  • mp42 Cloud Security Guidance/369625_02_11_XR15_Identity_in_the_Cloud.mp4 8.4 MB
  • mp42 Cloud Security Guidance/369625_02_08_XR15_Application_Security.mp4 8.3 MB
  • mp42 Cloud Security Guidance/369625_02_13_XR15_Virtualisation.mp4 8.2 MB
  • mp42 Cloud Security Guidance/369625_02_05_XR15_Traditional_Security_BCP_and_DR.mp4 8.2 MB
  • mp42 Cloud Security Guidance/369625_02_12_XR15_Cloud_Access_Control.mp4 7.9 MB
  • mp41 Cloud Fundamentals/369625_01_02_XR15_Infrastructure_as_a_Service.mp4 7.6 MB
  • mp43 Architecting Security/369625_03_02_XR15_Fast_Tracker.mp4 7.4 MB
  • mp41 Cloud Fundamentals/369625_01_05_XR151_Deployment_Models.mp4 6.7 MB
  • mp42 Cloud Security Guidance/369625_02_10_XR15_Encryption_and_Key_Management.mp4 6.6 MB
  • mp43 Architecting Security/369625_03_03_XR15_SABSA_Attributes.mp4 6.3 MB
【影视】 Lynda - Foundations of Cybersecurity
收录时间:2017-02-19 文档个数:27 文档大小:300.9 MB 最近下载:2025-05-15 人气:2960 磁力链接
  • mp4021 Managing user access and identity.mp4 20.7 MB
  • mp4022 Implementing preventative security.mp4 18.8 MB
  • mp4023 Monitoring and alerts.mp4 15.7 MB
  • mp4018 Describing security requirements.mp4 14.9 MB
  • mp4008 Dissecting the payment card industry and PCI DSS.mp4 14.6 MB
  • mp4007 Implementing control frameworks.mp4 14.3 MB
  • mp4025 Preparing for an incident.mp4 14.2 MB
  • mp4019 Architecting security risk.mp4 13.5 MB
  • mp4016 Understanding advanced persistent threats (APTs).mp4 13.5 MB
  • mp4004 Dissecting cyber risk.mp4 13.1 MB
  • mp4003 Understanding the NIST cybersecurity framework.mp4 12.6 MB
  • mp4011 Dissecting security threats.mp4 11.6 MB
  • mp4026 Responding to an incident.mp4 11.5 MB
  • mp4005 Unpacking COBIT 5.mp4 10.3 MB
  • mp4012 Exploring cybercrime as an industry.mp4 9.9 MB
  • mp4014 Using callbacks to capture keystrokes.mp4 9.8 MB
  • mp4015 Hiding malware with rootkits.mp4 9.8 MB
  • mp4009 Exploring the Cyber Essentials framework.mp4 9.3 MB
  • mp4013 Hiding malware through cloaking and alternate data streams.mp4 9.0 MB
  • mp4020 Selecting security controls.mp4 8.5 MB
【影视】 Cybersecurity-The Real Agenda.wmv
收录时间:2017-02-21 文档个数:1 文档大小:148.0 MB 最近下载:2025-05-15 人气:1555 磁力链接
  • wmvCybersecurity-The Real Agenda.wmv 148.0 MB
【压缩文件】 Lynda Cybersecurity with Cloud Computing tutorialkhan.com.iso
收录时间:2017-02-22 文档个数:1 文档大小:359.3 MB 最近下载:2021-05-18 人气:279 磁力链接
  • isoLynda Cybersecurity with Cloud Computing tutorialkhan.com.iso 359.3 MB
【影视】 LYNDA FOUNDATIONS OF CYBERSECURITY TUTORIAL
收录时间:2017-02-24 文档个数:27 文档大小:300.9 MB 最近下载:2024-09-26 人气:1087 磁力链接
  • mp401. Introduction/01_01-Welcome.mp4 6.5 MB
  • mp401. Introduction/01_02-What you should know.mp4 2.0 MB
  • mp402. Cybersecurity Foundations/02_06-Dissecting the payment card industry and PCI DSS.mp4 14.6 MB
  • mp402. Cybersecurity Foundations/02_05-Implementing control frameworks.mp4 14.3 MB
  • mp402. Cybersecurity Foundations/02_02-Dissecting cyber risk.mp4 13.1 MB
  • mp402. Cybersecurity Foundations/02_01-Understanding the NIST cybersecurity framework.mp4 12.6 MB
  • mp402. Cybersecurity Foundations/02_03-Unpacking COBIT 5.mp4 10.3 MB
  • mp402. Cybersecurity Foundations/02_07-Exploring the Cyber Essentials framework.mp4 9.3 MB
  • mp402. Cybersecurity Foundations/02_04-Looking closer at DSS05.mp4 8.1 MB
  • mp403. Cybersecurity Threats/03_07-Understanding advanced persistent threats APTs.mp4 13.5 MB
  • mp403. Cybersecurity Threats/03_02-Dissecting security threats.mp4 11.6 MB
  • mp403. Cybersecurity Threats/03_03-Exploring cybercrime as an industry.mp4 9.9 MB
  • mp403. Cybersecurity Threats/03_05-Using callbacks to capture keystrokes.mp4 9.8 MB
  • mp403. Cybersecurity Threats/03_06-Hiding malware with rootkits.mp4 9.8 MB
  • mp403. Cybersecurity Threats/03_04-Hiding malware through cloaking and alternate data streams.mp4 9.0 MB
  • mp403. Cybersecurity Threats/03_08-Exploring ransomware.mp4 8.4 MB
  • mp403. Cybersecurity Threats/03_01-Breaking down the cybersecurity kill chain.mp4 8.1 MB
  • mp404. Security Architecture/04_04-Managing user access and identity.mp4 20.7 MB
  • mp404. Security Architecture/04_05-Implementing preventative security.mp4 18.8 MB
  • mp404. Security Architecture/04_06-Monitoring and alerts.mp4 15.7 MB
【安装包】 Eset.Cybersecurity.Pro.v6.3.70.1
收录时间:2017-02-25 文档个数:4 文档大小:98.7 MB 最近下载:2024-12-16 人气:91 磁力链接
  • txtTorrent downloaded from www.DNoid.me - Demonoid (1).txt 56 Bytes
  • txtSerials.txt 438 Bytes
  • nfoEset.Cybersecurity.Pro.v6.3.70.1..nfo 1.5 kB
  • exeeset_cybersecurity_pro_.dmg.exe 98.7 MB
【影视】 [Lynda] Practical Cybersecurity-KTR
收录时间:2017-02-26 文档个数:44 文档大小:242.5 MB 最近下载:2025-05-13 人气:1594 磁力链接
  • mp48. Monitoring Network Activity/164982_08_03_XR15_packets.mp4 13.1 MB
  • mp47. Checking for Common Mistakes in Web Apps/164982_07_02_XR15_scan.mp4 11.9 MB
  • mp43. Personal Firewalls/164982_03_02_XR15_mswf.mp4 10.7 MB
  • mp43. Personal Firewalls/164982_03_06_XR15_iptables.mp4 9.8 MB
  • mp43. Personal Firewalls/164982_03_04_XR15_advrules.mp4 9.5 MB
  • mp47. Checking for Common Mistakes in Web Apps/164982_07_01_XR15_intro.mp4 9.4 MB
  • mp46. Checking Hosts for Known Vulnerabilities/164982_06_04_XR15_scan.mp4 8.6 MB
  • mp41. Why Cybersecurity/164982_01_03_XR15_attack.mp4 8.6 MB
  • mp41. Why Cybersecurity/164982_01_01_XR15_cyber.mp4 8.4 MB
  • mp48. Monitoring Network Activity/164982_08_05_XR151_intruder.mp4 8.3 MB
  • mp48. Monitoring Network Activity/164982_08_04_XR15_filters.mp4 8.2 MB
  • mp42. Antivirus/164982_02_06_XR15_schedule.mp4 8.2 MB
  • mp43. Personal Firewalls/164982_03_03_XR15_advfw.mp4 7.9 MB
  • mp40. Introduction/164982_00_01_WX30_welcome.mp4 6.9 MB
  • mp43. Personal Firewalls/164982_03_05_XR15_zedlan.mp4 6.7 MB
  • mp44. Knowing What Is on Your Network/164982_04_05_XR15_zenmap.mp4 6.3 MB
  • mp45. Network Communications and Detecting Intruders/164982_05_04_XR15_honeypot.mp4 6.0 MB
  • mp45. Network Communications and Detecting Intruders/164982_05_02_XR15_filexfer.mp4 5.8 MB
  • mp48. Monitoring Network Activity/164982_08_02_XR15_capture.mp4 5.6 MB
  • mp42. Antivirus/164982_02_05_XR15_avsettings.mp4 5.5 MB
【其他】 TTC - Thinking about Cybersecurity audio book - sup3r edition
收录时间:2017-03-17 文档个数:19 文档大小:143.9 MB 最近下载:2025-05-14 人气:590 磁力链接
  • m4aLect.10 International Governance and the Internet.m4a 8.3 MB
  • m4aLect.01 Stuxnet—The First Cyber Guided Missile.m4a 7.8 MB
  • m4aLect.02 The Incredible Scope of Cyberspace.m4a 7.3 MB
  • m4aLect.03 The Five Gateways of Internet Vulnerability.m4a 7.2 MB
  • m4aLect.04 Of Viruses, Botnets, and Logic Bombs .m4a 7.7 MB
  • m4aLect.05 The Problem of Identity on the Network.m4a 7.9 MB
  • m4aLect.06 Cyber Fraud, Theft, and Organized Crime.m4a 7.5 MB
  • m4aLect.07 Hacktivists and Insurgency.m4a 7.5 MB
  • m4aLect.08 Nations at Cyber War.m4a 7.9 MB
  • m4aLect.09 Government Regulation of Cyberspace.m4a 7.6 MB
  • pdfCourse Guidebook.pdf 4.7 MB
  • m4aLect.11 The Constitution and Cyberspace.m4a 7.8 MB
  • m4aLect.12 Big Data—''They'' Know Everything about You.m4a 7.6 MB
  • m4aLect.13 Privacy for the Cyber Age.m4a 7.9 MB
  • m4aLect.14 Listening In and Going Dark.m4a 8.2 MB
  • m4aLect.15 The Devil in the Chips-Hardware Failures.m4a 7.6 MB
  • m4aLect.16 Protecting Yourself in Cyberspace.m4a 7.5 MB
  • m4aLect.17 Critical Infrastructure and Resiliency.m4a 7.8 MB
  • m4aLect.18 Looking Forward-What Does the Future Hold.m4a 8.2 MB
【音乐】 TTC - Thinking about Cybersecurity
收录时间:2017-03-26 文档个数:19 文档大小:422.8 MB 最近下载:2025-05-15 人气:2155 磁力链接
  • mp3TGC_9523_Lect10_Cybersecurity.mp3 24.9 MB
  • mp3TGC_9523_Lect14_Cybersecurity.mp3 24.7 MB
  • mp3TGC_9523_Lect18_Cybersecurity.mp3 24.6 MB
  • mp3TGC_9523_Lect08_Cybersecurity.mp3 23.8 MB
  • mp3TGC_9523_Lect05_Cybersecurity.mp3 23.8 MB
  • mp3TGC_9523_Lect13_Cybersecurity.mp3 23.6 MB
  • mp3TGC_9523_Lect11_Cybersecurity.mp3 23.5 MB
  • mp3TGC_9523_Lect17_Cybersecurity.mp3 23.4 MB
  • mp3TGC_9523_Lect01_Cybersecurity.mp3 23.4 MB
  • mp3TGC_9523_Lect04_Cybersecurity.mp3 23.2 MB
  • mp3TGC_9523_Lect09_Cybersecurity.mp3 22.9 MB
  • mp3TGC_9523_Lect12_Cybersecurity.mp3 22.7 MB
  • mp3TGC_9523_Lect15_Cybersecurity.mp3 22.7 MB
  • mp3TGC_9523_Lect16_Cybersecurity.mp3 22.6 MB
  • mp3TGC_9523_Lect06_Cybersecurity.mp3 22.5 MB
  • mp3TGC_9523_Lect07_Cybersecurity.mp3 22.4 MB
  • mp3TGC_9523_Lect02_Cybersecurity.mp3 21.9 MB
  • mp3TGC_9523_Lect03_Cybersecurity.mp3 21.5 MB
  • pdfCourse Guidebook.pdf 4.7 MB
【影视】 Cybersecurity Threats Ransomware
收录时间:2017-04-29 文档个数:39 文档大小:405.4 MB 最近下载:2025-05-15 人气:3100 磁力链接
  • mp401. Course Overview/01. Intro.mp4 5.4 MB
  • mp402. What Is Ransomware/01. Overview.mp4 4.1 MB
  • mp402. What Is Ransomware/02. Definition and Types of Ransomware.mp4 20.3 MB
  • mp402. What Is Ransomware/03. The Ransomware Timeline.mp4 15.2 MB
  • mp402. What Is Ransomware/04. What Is Ransomware 30,000 ft. View.mp4 5.9 MB
  • mp402. What Is Ransomware/05. How Big Is the Problem.mp4 15.1 MB
  • mp402. What Is Ransomware/06. Ransomware Victims.mp4 11.7 MB
  • mp402. What Is Ransomware/07. Module Progress Checkpoint.mp4 617.9 kB
  • mp402. What Is Ransomware/08. Demo of Real World Ransomware Attack.mp4 52.0 MB
  • mp402. What Is Ransomware/09. Variations of Ransomware.mp4 6.4 MB
  • mp402. What Is Ransomware/10. Summary.mp4 2.5 MB
  • mp403. Ransomware Entry Points/01. Overview.mp4 2.7 MB
  • mp403. Ransomware Entry Points/02. The 5 Classic Infection Vectors.mp4 3.1 MB
  • mp403. Ransomware Entry Points/03. Phishing and Email Attachments.mp4 10.6 MB
  • mp403. Ransomware Entry Points/04. Embedded Hyperlinks, Websitesdownloads, and Drive-by Infections.mp4 6.2 MB
  • mp403. Ransomware Entry Points/05. Why Common Exploit Kits Are Used.mp4 5.4 MB
  • mp403. Ransomware Entry Points/06. Command and Callback (C&C) and Indicators of Compromise.mp4 7.0 MB
  • mp403. Ransomware Entry Points/07. Summary.mp4 2.8 MB
  • mp404. Incident Response Detection and Containment/01. Overview.mp4 2.6 MB
  • mp404. Incident Response Detection and Containment/02. Indicators of Compromise.mp4 5.3 MB
【压缩文件】 Pluralsight.Cybersecurity.Threats.Ransomware-[www.allfiles.cf]-TPTORRENTS.zip
收录时间:2017-04-29 文档个数:1 文档大小:373.3 MB 最近下载:2025-05-07 人气:1589 磁力链接
  • zipPluralsight.Cybersecurity.Threats.Ransomware-[www.allfiles.cf]-TPTORRENTS.zip 373.3 MB
【影视】 Pluralsight Cybersecurity Threats Ransomware
收录时间:2017-05-13 文档个数:38 文档大小:388.1 MB 最近下载:2025-05-15 人气:1701 磁力链接
  • mp41. Course Overview/01. Course Overview.mp4 5.4 MB
  • mp42. What Is Ransomware/09. Demo of Real World Ransomware Attack.mp4 52.0 MB
  • mp42. What Is Ransomware/03. Definition and Types of Ransomware.mp4 20.3 MB
  • mp42. What Is Ransomware/04. The Ransomware Timeline.mp4 15.2 MB
  • mp42. What Is Ransomware/06. How Big Is the Problem.mp4 15.1 MB
  • mp42. What Is Ransomware/07. Ransomware Victims.mp4 11.7 MB
  • mp42. What Is Ransomware/10. Variations of Ransomware.mp4 6.4 MB
  • mp42. What Is Ransomware/05. What Is Ransomware 30,000 ft. View.mp4 5.9 MB
  • mp42. What Is Ransomware/02. Overview.mp4 4.1 MB
  • mp42. What Is Ransomware/11. Summary.mp4 2.5 MB
  • mp42. What Is Ransomware/08. Module Progress Checkpoint.mp4 617.9 kB
  • mp43. Ransomware Entry Points/14. Phishing and Email Attachments.mp4 10.6 MB
  • mp43. Ransomware Entry Points/17. Command and Callback (C&C) and Indicators of Compromise.mp4 7.0 MB
  • mp43. Ransomware Entry Points/15. Embedded Hyperlinks, Websites_downloads, and Drive-by Infections.mp4 6.2 MB
  • mp43. Ransomware Entry Points/16. Why Common Exploit Kits Are Used.mp4 5.4 MB
  • mp43. Ransomware Entry Points/13. The 5 Classic Infection Vectors.mp4 3.1 MB
  • mp43. Ransomware Entry Points/18. Summary.mp4 2.8 MB
  • mp43. Ransomware Entry Points/12. Overview.mp4 2.7 MB
  • mp44. Incident Response - Detection and Containment/22. Containing the Attack.mp4 9.0 MB
  • mp44. Incident Response - Detection and Containment/21. Detecting an Attack.mp4 7.3 MB
共14页 上一页 1 2 3 4 5 下一页