为您索检到268条磁力链接,耗时0毫秒。
- 【影视】 [ TutPig.com ] Linkedin - Cybersecurity Awareness - Cybersecurity Terminology
-
收录时间:2023-12-19
文档个数:34
文档大小:109.8 MB
最近下载:2025-03-15
人气:478
磁力链接
~Get Your Files Here !/04 - 3. Process/01 - Understanding processes and documentation.mp4 10.5 MB
~Get Your Files Here !/05 - 4. Technology/01 - Secure practices, terms, and exercises.mp4 10.1 MB
~Get Your Files Here !/06 - 5. Threat Actors and Risks/02 - Technical risks.mp4 8.8 MB
~Get Your Files Here !/03 - 2. People/01 - Security awareness and leadership.mp4 8.6 MB
~Get Your Files Here !/03 - 2. People/04 - Understanding privacy.mp4 8.3 MB
~Get Your Files Here !/06 - 5. Threat Actors and Risks/03 - Threats that target the human element.mp4 7.7 MB
~Get Your Files Here !/04 - 3. Process/02 - Technical controls.mp4 7.3 MB
~Get Your Files Here !/05 - 4. Technology/02 - Network controls.mp4 7.1 MB
~Get Your Files Here !/05 - 4. Technology/03 - Advancements in technology.mp4 7.1 MB
~Get Your Files Here !/06 - 5. Threat Actors and Risks/01 - Threat actors and definitions.mp4 7.1 MB
~Get Your Files Here !/02 - 1. Defining Cybersecurity and People, Process, and Technology/01 - What is cybersecurity.mp4 6.0 MB
~Get Your Files Here !/01 - Introduction/01 - Welcome to Cybersecurity Terminology 101.mp4 5.7 MB
~Get Your Files Here !/03 - 2. People/02 - Red vs. blue vs. purple teams.mp4 5.0 MB
~Get Your Files Here !/03 - 2. People/03 - Who are the adversaries.mp4 4.7 MB
~Get Your Files Here !/02 - 1. Defining Cybersecurity and People, Process, and Technology/02 - People, process, and technology.mp4 2.9 MB
~Get Your Files Here !/07 - Conclusion/01 - Apply cybersecurity terminology.mp4 2.8 MB
~Get Your Files Here !/04 - 3. Process/01 - Understanding processes and documentation.srt 6.2 kB
~Get Your Files Here !/06 - 5. Threat Actors and Risks/01 - Threat actors and definitions.srt 6.1 kB
~Get Your Files Here !/06 - 5. Threat Actors and Risks/03 - Threats that target the human element.srt 5.7 kB
~Get Your Files Here !/04 - 3. Process/02 - Technical controls.srt 5.7 kB
猜你喜欢:
Cybersecurity
Linkedin
Awareness
TutPig
com
Terminology
- 【压缩文件】 [ DevCourseWeb.com ] Cybersecurity - The Beginner's Guide - A comprehensive guide to getting started in cybersecurity.zip
-
收录时间:2024-01-24
文档个数:1
文档大小:114.6 MB
最近下载:2025-05-14
人气:838
磁力链接
[ DevCourseWeb.com ] Cybersecurity - The Beginner's Guide - A comprehensive guide to getting started in cybersecurity.zip 114.6 MB
猜你喜欢:
zip
Beginner
getting
Cybersecurity
comprehensive
cybersecurity
guide
DevCourseWeb
started
com
- 【影视】 [ FreeCourseWeb.com ] Cybersecurity Careers - Build Your Brand in Cybersecurity
-
收录时间:2024-03-28
文档个数:34
文档大小:189.3 MB
最近下载:2025-05-11
人气:673
磁力链接
~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/04 - Optimizing your LinkedIn profile.mp4 18.6 MB
~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/05 - Five tips for using LinkedIn effectively.mp4 17.3 MB
~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/02 - Speaking at events and conferences.mp4 16.1 MB
~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/01 - Creating and sharing content.mp4 16.0 MB
~Get Your Files Here !/02 - 1. Personal Branding in Cybersecurity/03 - Benefits of building your personal brand in cybersecurity.mp4 13.9 MB
~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/03 - Building an online presence.mp4 13.6 MB
~Get Your Files Here !/02 - 1. Personal Branding in Cybersecurity/02 - Elements of a strong personal brand.mp4 13.1 MB
~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/02 - Developing a personal brand statement.mp4 11.7 MB
~Get Your Files Here !/05 - 4. Networking for Cybersecurity Professionals/03 - Staying up-to-date with industry trends.mp4 11.6 MB
~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/03 - Contributing to open-source projects.mp4 11.0 MB
~Get Your Files Here !/05 - 4. Networking for Cybersecurity Professionals/01 - Networking and nurturing professional relationships.mp4 10.4 MB
~Get Your Files Here !/02 - 1. Personal Branding in Cybersecurity/01 - What is personal branding.mp4 10.1 MB
~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/01 - Identifying your unique value proposition.mp4 10.0 MB
~Get Your Files Here !/05 - 4. Networking for Cybersecurity Professionals/02 - Effective networking strategies.mp4 8.0 MB
~Get Your Files Here !/01 - Introduction/01 - Grow your cybersecurity career with personal branding.mp4 3.9 MB
~Get Your Files Here !/06 - Conclusion/01 - Next steps.mp4 3.9 MB
~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/02 - Speaking at events and conferences.srt 8.6 kB
~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/01 - Creating and sharing content.srt 7.9 kB
~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/04 - Optimizing your LinkedIn profile.srt 7.5 kB
~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/03 - Building an online presence.srt 7.5 kB
猜你喜欢:
Cybersecurity
Brand
FreeCourseWeb
Build
com
Your
Careers
- 【影视】 [ FreeCourseWeb.com ] Translating Cybersecurity for SMBs - Using the NIST Cybersecurity Framework 2.0
-
收录时间:2024-05-28
文档个数:43
文档大小:127.0 MB
最近下载:2025-05-11
人气:1074
磁力链接
~Get Your Files Here !/05 - 4. Identify/01 - Understand what you have.mp4 10.7 MB
~Get Your Files Here !/04 - 3. Govern/02 - Roll out your guidance.mp4 8.8 MB
~Get Your Files Here !/11 - Conclusion/01 - Build cybersecurity into your business.mp4 8.5 MB
~Get Your Files Here !/04 - 3. Govern/01 - Set your cyber strategy.mp4 8.1 MB
~Get Your Files Here !/06 - 5. Protect/02 - Guard your network.mp4 7.0 MB
~Get Your Files Here !/06 - 5. Protect/01 - Secure your system.mp4 7.0 MB
~Get Your Files Here !/07 - 6. Detect/01 - Know when things are off.mp4 6.9 MB
~Get Your Files Here !/08 - 7. Respond/01 - Address cyber incidents.mp4 6.7 MB
~Get Your Files Here !/08 - 7. Respond/02 - Keep everyone in the loop.mp4 6.7 MB
~Get Your Files Here !/09 - 8. Recover/01 - Get back to normal.mp4 6.6 MB
~Get Your Files Here !/03 - 2. NIST Cybersecurity Framework 2.0/01 - Cybersecurity framework fundamentals.mp4 6.3 MB
~Get Your Files Here !/10 - 9. Build Cyber Capabilities/01 - Determine your tier.mp4 6.2 MB
~Get Your Files Here !/02 - 1. Cybersecurity in Your Business/02 - Understand your cyber risks.mp4 6.0 MB
~Get Your Files Here !/03 - 2. NIST Cybersecurity Framework 2.0/02 - Leverage the cybersecurity framework.mp4 5.9 MB
~Get Your Files Here !/10 - 9. Build Cyber Capabilities/02 - Define your profile.mp4 5.9 MB
~Get Your Files Here !/02 - 1. Cybersecurity in Your Business/01 - Cornerstones of cybersecurity.mp4 5.4 MB
~Get Your Files Here !/02 - 1. Cybersecurity in Your Business/03 - Prioritize your biggest risks.mp4 4.9 MB
~Get Your Files Here !/10 - 9. Build Cyber Capabilities/03 - Create a plan.mp4 3.4 MB
~Get Your Files Here !/01 - Introduction/02 - What you should know.mp4 3.0 MB
~Get Your Files Here !/01 - Introduction/01 - Leverage the NIST CSF to protect what matters most.mp4 2.7 MB
猜你喜欢:
Cybersecurity
SMBs
Translating
Framework
FreeCourseWeb
Using
2.0
com
NIST
- 【影视】 Lynda - Foundations of Cybersecurity
-
收录时间:2017-02-08
文档个数:27
文档大小:300.9 MB
最近下载:2025-03-22
人气:383
磁力链接
021 Managing user access and identity.mp4 20.7 MB
022 Implementing preventative security.mp4 18.8 MB
023 Monitoring and alerts.mp4 15.7 MB
018 Describing security requirements.mp4 14.9 MB
008 Dissecting the payment card industry and PCI DSS.mp4 14.6 MB
007 Implementing control frameworks.mp4 14.3 MB
025 Preparing for an incident.mp4 14.2 MB
019 Architecting security risk.mp4 13.5 MB
016 Understanding advanced persistent threats (APTs).mp4 13.5 MB
004 Dissecting cyber risk.mp4 13.1 MB
003 Understanding the NIST cybersecurity framework.mp4 12.6 MB
011 Dissecting security threats.mp4 11.6 MB
026 Responding to an incident.mp4 11.5 MB
005 Unpacking COBIT 5.mp4 10.3 MB
012 Exploring cybercrime as an industry.mp4 9.9 MB
014 Using callbacks to capture keystrokes.mp4 9.8 MB
015 Hiding malware with rootkits.mp4 9.8 MB
009 Exploring the Cyber Essentials framework.mp4 9.3 MB
013 Hiding malware through cloaking and alternate data streams.mp4 9.0 MB
020 Selecting security controls.mp4 8.5 MB
猜你喜欢:
Cybersecurity
Lynda
Foundations
- 【影视】 Lynda - Foundations of Cybersecurity
-
收录时间:2017-02-08
文档个数:27
文档大小:300.9 MB
最近下载:2025-05-15
人气:1909
磁力链接
01. Introduction/01_01-Welcome.mp4 6.5 MB
01. Introduction/01_02-What you should know.mp4 2.0 MB
02. Cybersecurity Foundations/02_01-Understanding the NIST cybersecurity framework.mp4 12.6 MB
02. Cybersecurity Foundations/02_02-Dissecting cyber risk.mp4 13.1 MB
02. Cybersecurity Foundations/02_03-Unpacking COBIT 5.mp4 10.3 MB
02. Cybersecurity Foundations/02_04-Looking closer at DSS05.mp4 8.1 MB
02. Cybersecurity Foundations/02_05-Implementing control frameworks.mp4 14.3 MB
02. Cybersecurity Foundations/02_06-Dissecting the payment card industry and PCI DSS.mp4 14.6 MB
02. Cybersecurity Foundations/02_07-Exploring the Cyber Essentials framework.mp4 9.3 MB
03. Cybersecurity Threats/03_01-Breaking down the cybersecurity kill chain.mp4 8.1 MB
03. Cybersecurity Threats/03_02-Dissecting security threats.mp4 11.6 MB
03. Cybersecurity Threats/03_03-Exploring cybercrime as an industry.mp4 9.9 MB
03. Cybersecurity Threats/03_04-Hiding malware through cloaking and alternate data streams.mp4 9.0 MB
03. Cybersecurity Threats/03_05-Using callbacks to capture keystrokes.mp4 9.8 MB
03. Cybersecurity Threats/03_06-Hiding malware with rootkits.mp4 9.8 MB
03. Cybersecurity Threats/03_07-Understanding advanced persistent threats APTs.mp4 13.5 MB
03. Cybersecurity Threats/03_08-Exploring ransomware.mp4 8.4 MB
04. Security Architecture/04_01-Describing security requirements.mp4 14.9 MB
04. Security Architecture/04_02-Architecting security risk.mp4 13.5 MB
04. Security Architecture/04_03-Selecting security controls.mp4 8.5 MB
猜你喜欢:
Cybersecurity
Lynda
Foundations
- 【影视】 Lynda - Practical Cybersecurity
-
收录时间:2017-02-10
文档个数:45
文档大小:244.8 MB
最近下载:2025-05-15
人气:1388
磁力链接
8. Monitoring Network Activity/164982_08_03_XR15_packets.mp4 13.1 MB
7. Checking for Common Mistakes in Web Apps/164982_07_02_XR15_scan.mp4 11.9 MB
3. Personal Firewalls/164982_03_02_XR15_mswf.mp4 10.7 MB
3. Personal Firewalls/164982_03_06_XR15_iptables.mp4 9.8 MB
3. Personal Firewalls/164982_03_04_XR15_advrules.mp4 9.5 MB
7. Checking for Common Mistakes in Web Apps/164982_07_01_XR15_intro.mp4 9.4 MB
6. Checking Hosts for Known Vulnerabilities/164982_06_04_XR15_scan.mp4 8.6 MB
1. Why Cybersecurity/164982_01_03_XR15_attack.mp4 8.6 MB
1. Why Cybersecurity/164982_01_01_XR15_cyber.mp4 8.4 MB
8. Monitoring Network Activity/164982_08_05_XR151_intruder.mp4 8.3 MB
8. Monitoring Network Activity/164982_08_04_XR15_filters.mp4 8.2 MB
2. Antivirus/164982_02_06_XR15_schedule.mp4 8.2 MB
3. Personal Firewalls/164982_03_03_XR15_advfw.mp4 7.9 MB
0. Introduction/164982_00_01_WX30_welcome.mp4 6.9 MB
3. Personal Firewalls/164982_03_05_XR15_zedlan.mp4 6.7 MB
4. Knowing What Is on Your Network/164982_04_05_XR15_zenmap.mp4 6.3 MB
5. Network Communications and Detecting Intruders/164982_05_04_XR15_honeypot.mp4 6.0 MB
5. Network Communications and Detecting Intruders/164982_05_02_XR15_filexfer.mp4 5.8 MB
8. Monitoring Network Activity/164982_08_02_XR15_capture.mp4 5.6 MB
2. Antivirus/164982_02_05_XR15_avsettings.mp4 5.5 MB
猜你喜欢:
Practical
Lynda
Cybersecurity
- 【影视】 TTC - Thinking about Cybersecurity
-
收录时间:2017-02-10
文档个数:19
文档大小:8.5 GB
最近下载:2025-05-16
人气:5665
磁力链接
TGC_9523_Lect18_Cybersecurity.wmv 509.4 MB
TGC_9523_Lect01_Cybersecurity.wmv 509.0 MB
TGC_9523_Lect13_Cybersecurity.wmv 508.9 MB
TGC_9523_Lect17_Cybersecurity.wmv 494.7 MB
TGC_9523_Lect08_Cybersecurity.wmv 493.5 MB
TGC_9523_Lect14_Cybersecurity.wmv 486.8 MB
TGC_9523_Lect10_Cybersecurity.wmv 486.1 MB
TGC_9523_Lect04_Cybersecurity.wmv 480.1 MB
TGC_9523_Lect15_Cybersecurity.wmv 474.7 MB
TGC_9523_Lect09_Cybersecurity.wmv 473.9 MB
TGC_9523_Lect05_Cybersecurity.wmv 472.8 MB
TGC_9523_Lect07_Cybersecurity.wmv 470.4 MB
TGC_9523_Lect06_Cybersecurity.wmv 467.2 MB
TGC_9523_Lect16_Cybersecurity.wmv 460.0 MB
TGC_9523_Lect11_Cybersecurity.wmv 453.2 MB
TGC_9523_Lect12_Cybersecurity.wmv 449.4 MB
TGC_9523_Lect03_Cybersecurity.wmv 438.7 MB
TGC_9523_Lect02_Cybersecurity.wmv 378.9 MB
DG9523_98F12.PDF 4.7 MB
猜你喜欢:
TTC
Thinking
about
Cybersecurity
- 【影视】 Cybersecurity {AM}
-
收录时间:2017-02-11
文档个数:39
文档大小:230.5 MB
最近下载:2025-05-15
人气:1804
磁力链接
0 Introduction/369625_00_03_XR15_Reference.mp4 10.2 MB
3 Architecting Security/369625_03_05_XR15_Cloud_Attribute_Taxonomy.mp4 10.1 MB
3 Architecting Security/369625_03_01_XR15_Introduction_to_SABSA.mp4 9.9 MB
2 Cloud Security Guidance/369625_02_16_SO30_XR30_Solution.mp4 9.9 MB
2 Cloud Security Guidance/369625_02_03_XR15_Information_Management.mp4 9.8 MB
1 Cloud Fundamentals/369625_01_01_XR15_Essential_Characteristics.mp4 9.6 MB
1 Cloud Fundamentals/369625_01_06_XR15_Cloud_Incidents.mp4 9.4 MB
2 Cloud Security Guidance/369625_02_02_XR15_Legal_Compliance_and_Audit.mp4 8.9 MB
1 Cloud Fundamentals/369625_01_09_XR15_Cloud_Trust.mp4 8.8 MB
2 Cloud Security Guidance/369625_02_07_XR15_Incident_Response.mp4 8.8 MB
2 Cloud Security Guidance/369625_02_11_XR15_Identity_in_the_Cloud.mp4 8.4 MB
2 Cloud Security Guidance/369625_02_08_XR15_Application_Security.mp4 8.3 MB
2 Cloud Security Guidance/369625_02_13_XR15_Virtualisation.mp4 8.2 MB
2 Cloud Security Guidance/369625_02_05_XR15_Traditional_Security_BCP_and_DR.mp4 8.2 MB
2 Cloud Security Guidance/369625_02_12_XR15_Cloud_Access_Control.mp4 7.9 MB
1 Cloud Fundamentals/369625_01_02_XR15_Infrastructure_as_a_Service.mp4 7.6 MB
3 Architecting Security/369625_03_02_XR15_Fast_Tracker.mp4 7.4 MB
1 Cloud Fundamentals/369625_01_05_XR151_Deployment_Models.mp4 6.7 MB
2 Cloud Security Guidance/369625_02_10_XR15_Encryption_and_Key_Management.mp4 6.6 MB
3 Architecting Security/369625_03_03_XR15_SABSA_Attributes.mp4 6.3 MB
猜你喜欢:
Cybersecurity
AM
- 【影视】 Lynda - Foundations of Cybersecurity
-
收录时间:2017-02-19
文档个数:27
文档大小:300.9 MB
最近下载:2025-05-15
人气:2960
磁力链接
021 Managing user access and identity.mp4 20.7 MB
022 Implementing preventative security.mp4 18.8 MB
023 Monitoring and alerts.mp4 15.7 MB
018 Describing security requirements.mp4 14.9 MB
008 Dissecting the payment card industry and PCI DSS.mp4 14.6 MB
007 Implementing control frameworks.mp4 14.3 MB
025 Preparing for an incident.mp4 14.2 MB
019 Architecting security risk.mp4 13.5 MB
016 Understanding advanced persistent threats (APTs).mp4 13.5 MB
004 Dissecting cyber risk.mp4 13.1 MB
003 Understanding the NIST cybersecurity framework.mp4 12.6 MB
011 Dissecting security threats.mp4 11.6 MB
026 Responding to an incident.mp4 11.5 MB
005 Unpacking COBIT 5.mp4 10.3 MB
012 Exploring cybercrime as an industry.mp4 9.9 MB
014 Using callbacks to capture keystrokes.mp4 9.8 MB
015 Hiding malware with rootkits.mp4 9.8 MB
009 Exploring the Cyber Essentials framework.mp4 9.3 MB
013 Hiding malware through cloaking and alternate data streams.mp4 9.0 MB
020 Selecting security controls.mp4 8.5 MB
猜你喜欢:
Cybersecurity
Lynda
Foundations
- 【影视】 Cybersecurity-The Real Agenda.wmv
-
收录时间:2017-02-21
文档个数:1
文档大小:148.0 MB
最近下载:2025-05-15
人气:1555
磁力链接
Cybersecurity-The Real Agenda.wmv 148.0 MB
猜你喜欢:
Cybersecurity
Real
wmv
Agenda
- 【压缩文件】 Lynda Cybersecurity with Cloud Computing tutorialkhan.com.iso
-
收录时间:2017-02-22
文档个数:1
文档大小:359.3 MB
最近下载:2021-05-18
人气:279
磁力链接
Lynda Cybersecurity with Cloud Computing tutorialkhan.com.iso 359.3 MB
猜你喜欢:
Computing
Cybersecurity
Lynda
tutorialkhan
iso
com
Cloud
- 【影视】 LYNDA FOUNDATIONS OF CYBERSECURITY TUTORIAL
-
收录时间:2017-02-24
文档个数:27
文档大小:300.9 MB
最近下载:2024-09-26
人气:1087
磁力链接
01. Introduction/01_01-Welcome.mp4 6.5 MB
01. Introduction/01_02-What you should know.mp4 2.0 MB
02. Cybersecurity Foundations/02_06-Dissecting the payment card industry and PCI DSS.mp4 14.6 MB
02. Cybersecurity Foundations/02_05-Implementing control frameworks.mp4 14.3 MB
02. Cybersecurity Foundations/02_02-Dissecting cyber risk.mp4 13.1 MB
02. Cybersecurity Foundations/02_01-Understanding the NIST cybersecurity framework.mp4 12.6 MB
02. Cybersecurity Foundations/02_03-Unpacking COBIT 5.mp4 10.3 MB
02. Cybersecurity Foundations/02_07-Exploring the Cyber Essentials framework.mp4 9.3 MB
02. Cybersecurity Foundations/02_04-Looking closer at DSS05.mp4 8.1 MB
03. Cybersecurity Threats/03_07-Understanding advanced persistent threats APTs.mp4 13.5 MB
03. Cybersecurity Threats/03_02-Dissecting security threats.mp4 11.6 MB
03. Cybersecurity Threats/03_03-Exploring cybercrime as an industry.mp4 9.9 MB
03. Cybersecurity Threats/03_05-Using callbacks to capture keystrokes.mp4 9.8 MB
03. Cybersecurity Threats/03_06-Hiding malware with rootkits.mp4 9.8 MB
03. Cybersecurity Threats/03_04-Hiding malware through cloaking and alternate data streams.mp4 9.0 MB
03. Cybersecurity Threats/03_08-Exploring ransomware.mp4 8.4 MB
03. Cybersecurity Threats/03_01-Breaking down the cybersecurity kill chain.mp4 8.1 MB
04. Security Architecture/04_04-Managing user access and identity.mp4 20.7 MB
04. Security Architecture/04_05-Implementing preventative security.mp4 18.8 MB
04. Security Architecture/04_06-Monitoring and alerts.mp4 15.7 MB
猜你喜欢:
CYBERSECURITY
LYNDA
TUTORIAL
FOUNDATIONS
- 【安装包】 Eset.Cybersecurity.Pro.v6.3.70.1
-
收录时间:2017-02-25
文档个数:4
文档大小:98.7 MB
最近下载:2024-12-16
人气:91
磁力链接
Torrent downloaded from www.DNoid.me - Demonoid (1).txt 56 Bytes
Serials.txt 438 Bytes
Eset.Cybersecurity.Pro.v6.3.70.1..nfo 1.5 kB
eset_cybersecurity_pro_.dmg.exe 98.7 MB
猜你喜欢:
Cybersecurity
Pro
Eset
3.70
v6
- 【影视】 [Lynda] Practical Cybersecurity-KTR
-
收录时间:2017-02-26
文档个数:44
文档大小:242.5 MB
最近下载:2025-05-13
人气:1594
磁力链接
8. Monitoring Network Activity/164982_08_03_XR15_packets.mp4 13.1 MB
7. Checking for Common Mistakes in Web Apps/164982_07_02_XR15_scan.mp4 11.9 MB
3. Personal Firewalls/164982_03_02_XR15_mswf.mp4 10.7 MB
3. Personal Firewalls/164982_03_06_XR15_iptables.mp4 9.8 MB
3. Personal Firewalls/164982_03_04_XR15_advrules.mp4 9.5 MB
7. Checking for Common Mistakes in Web Apps/164982_07_01_XR15_intro.mp4 9.4 MB
6. Checking Hosts for Known Vulnerabilities/164982_06_04_XR15_scan.mp4 8.6 MB
1. Why Cybersecurity/164982_01_03_XR15_attack.mp4 8.6 MB
1. Why Cybersecurity/164982_01_01_XR15_cyber.mp4 8.4 MB
8. Monitoring Network Activity/164982_08_05_XR151_intruder.mp4 8.3 MB
8. Monitoring Network Activity/164982_08_04_XR15_filters.mp4 8.2 MB
2. Antivirus/164982_02_06_XR15_schedule.mp4 8.2 MB
3. Personal Firewalls/164982_03_03_XR15_advfw.mp4 7.9 MB
0. Introduction/164982_00_01_WX30_welcome.mp4 6.9 MB
3. Personal Firewalls/164982_03_05_XR15_zedlan.mp4 6.7 MB
4. Knowing What Is on Your Network/164982_04_05_XR15_zenmap.mp4 6.3 MB
5. Network Communications and Detecting Intruders/164982_05_04_XR15_honeypot.mp4 6.0 MB
5. Network Communications and Detecting Intruders/164982_05_02_XR15_filexfer.mp4 5.8 MB
8. Monitoring Network Activity/164982_08_02_XR15_capture.mp4 5.6 MB
2. Antivirus/164982_02_05_XR15_avsettings.mp4 5.5 MB
猜你喜欢:
Practical
Lynda
KTR
Cybersecurity
- 【其他】 TTC - Thinking about Cybersecurity audio book - sup3r edition
-
收录时间:2017-03-17
文档个数:19
文档大小:143.9 MB
最近下载:2025-05-14
人气:590
磁力链接
Lect.10 International Governance and the Internet.m4a 8.3 MB
Lect.01 Stuxnet—The First Cyber Guided Missile.m4a 7.8 MB
Lect.02 The Incredible Scope of Cyberspace.m4a 7.3 MB
Lect.03 The Five Gateways of Internet Vulnerability.m4a 7.2 MB
Lect.04 Of Viruses, Botnets, and Logic Bombs .m4a 7.7 MB
Lect.05 The Problem of Identity on the Network.m4a 7.9 MB
Lect.06 Cyber Fraud, Theft, and Organized Crime.m4a 7.5 MB
Lect.07 Hacktivists and Insurgency.m4a 7.5 MB
Lect.08 Nations at Cyber War.m4a 7.9 MB
Lect.09 Government Regulation of Cyberspace.m4a 7.6 MB
Course Guidebook.pdf 4.7 MB
Lect.11 The Constitution and Cyberspace.m4a 7.8 MB
Lect.12 Big Data—''They'' Know Everything about You.m4a 7.6 MB
Lect.13 Privacy for the Cyber Age.m4a 7.9 MB
Lect.14 Listening In and Going Dark.m4a 8.2 MB
Lect.15 The Devil in the Chips-Hardware Failures.m4a 7.6 MB
Lect.16 Protecting Yourself in Cyberspace.m4a 7.5 MB
Lect.17 Critical Infrastructure and Resiliency.m4a 7.8 MB
Lect.18 Looking Forward-What Does the Future Hold.m4a 8.2 MB
猜你喜欢:
about
edition
Thinking
Cybersecurity
book
TTC
sup3r
audio
- 【音乐】 TTC - Thinking about Cybersecurity
-
收录时间:2017-03-26
文档个数:19
文档大小:422.8 MB
最近下载:2025-05-15
人气:2155
磁力链接
TGC_9523_Lect10_Cybersecurity.mp3 24.9 MB
TGC_9523_Lect14_Cybersecurity.mp3 24.7 MB
TGC_9523_Lect18_Cybersecurity.mp3 24.6 MB
TGC_9523_Lect08_Cybersecurity.mp3 23.8 MB
TGC_9523_Lect05_Cybersecurity.mp3 23.8 MB
TGC_9523_Lect13_Cybersecurity.mp3 23.6 MB
TGC_9523_Lect11_Cybersecurity.mp3 23.5 MB
TGC_9523_Lect17_Cybersecurity.mp3 23.4 MB
TGC_9523_Lect01_Cybersecurity.mp3 23.4 MB
TGC_9523_Lect04_Cybersecurity.mp3 23.2 MB
TGC_9523_Lect09_Cybersecurity.mp3 22.9 MB
TGC_9523_Lect12_Cybersecurity.mp3 22.7 MB
TGC_9523_Lect15_Cybersecurity.mp3 22.7 MB
TGC_9523_Lect16_Cybersecurity.mp3 22.6 MB
TGC_9523_Lect06_Cybersecurity.mp3 22.5 MB
TGC_9523_Lect07_Cybersecurity.mp3 22.4 MB
TGC_9523_Lect02_Cybersecurity.mp3 21.9 MB
TGC_9523_Lect03_Cybersecurity.mp3 21.5 MB
Course Guidebook.pdf 4.7 MB
猜你喜欢:
TTC
Thinking
about
Cybersecurity
- 【影视】 Cybersecurity Threats Ransomware
-
收录时间:2017-04-29
文档个数:39
文档大小:405.4 MB
最近下载:2025-05-15
人气:3100
磁力链接
01. Course Overview/01. Intro.mp4 5.4 MB
02. What Is Ransomware/01. Overview.mp4 4.1 MB
02. What Is Ransomware/02. Definition and Types of Ransomware.mp4 20.3 MB
02. What Is Ransomware/03. The Ransomware Timeline.mp4 15.2 MB
02. What Is Ransomware/04. What Is Ransomware 30,000 ft. View.mp4 5.9 MB
02. What Is Ransomware/05. How Big Is the Problem.mp4 15.1 MB
02. What Is Ransomware/06. Ransomware Victims.mp4 11.7 MB
02. What Is Ransomware/07. Module Progress Checkpoint.mp4 617.9 kB
02. What Is Ransomware/08. Demo of Real World Ransomware Attack.mp4 52.0 MB
02. What Is Ransomware/09. Variations of Ransomware.mp4 6.4 MB
02. What Is Ransomware/10. Summary.mp4 2.5 MB
03. Ransomware Entry Points/01. Overview.mp4 2.7 MB
03. Ransomware Entry Points/02. The 5 Classic Infection Vectors.mp4 3.1 MB
03. Ransomware Entry Points/03. Phishing and Email Attachments.mp4 10.6 MB
03. Ransomware Entry Points/04. Embedded Hyperlinks, Websitesdownloads, and Drive-by Infections.mp4 6.2 MB
03. Ransomware Entry Points/05. Why Common Exploit Kits Are Used.mp4 5.4 MB
03. Ransomware Entry Points/06. Command and Callback (C&C) and Indicators of Compromise.mp4 7.0 MB
03. Ransomware Entry Points/07. Summary.mp4 2.8 MB
04. Incident Response Detection and Containment/01. Overview.mp4 2.6 MB
04. Incident Response Detection and Containment/02. Indicators of Compromise.mp4 5.3 MB
猜你喜欢:
Cybersecurity
Threats
Ransomware
- 【压缩文件】 Pluralsight.Cybersecurity.Threats.Ransomware-[www.allfiles.cf]-TPTORRENTS.zip
-
收录时间:2017-04-29
文档个数:1
文档大小:373.3 MB
最近下载:2025-05-07
人气:1589
磁力链接
Pluralsight.Cybersecurity.Threats.Ransomware-[www.allfiles.cf]-TPTORRENTS.zip 373.3 MB
猜你喜欢:
Pluralsight
Threats
zip
allfiles
Ransomware
Cybersecurity
TPTORRENTS
www
cf
- 【影视】 Pluralsight Cybersecurity Threats Ransomware
-
收录时间:2017-05-13
文档个数:38
文档大小:388.1 MB
最近下载:2025-05-15
人气:1701
磁力链接
1. Course Overview/01. Course Overview.mp4 5.4 MB
2. What Is Ransomware/09. Demo of Real World Ransomware Attack.mp4 52.0 MB
2. What Is Ransomware/03. Definition and Types of Ransomware.mp4 20.3 MB
2. What Is Ransomware/04. The Ransomware Timeline.mp4 15.2 MB
2. What Is Ransomware/06. How Big Is the Problem.mp4 15.1 MB
2. What Is Ransomware/07. Ransomware Victims.mp4 11.7 MB
2. What Is Ransomware/10. Variations of Ransomware.mp4 6.4 MB
2. What Is Ransomware/05. What Is Ransomware 30,000 ft. View.mp4 5.9 MB
2. What Is Ransomware/02. Overview.mp4 4.1 MB
2. What Is Ransomware/11. Summary.mp4 2.5 MB
2. What Is Ransomware/08. Module Progress Checkpoint.mp4 617.9 kB
3. Ransomware Entry Points/14. Phishing and Email Attachments.mp4 10.6 MB
3. Ransomware Entry Points/17. Command and Callback (C&C) and Indicators of Compromise.mp4 7.0 MB
3. Ransomware Entry Points/15. Embedded Hyperlinks, Websites_downloads, and Drive-by Infections.mp4 6.2 MB
3. Ransomware Entry Points/16. Why Common Exploit Kits Are Used.mp4 5.4 MB
3. Ransomware Entry Points/13. The 5 Classic Infection Vectors.mp4 3.1 MB
3. Ransomware Entry Points/18. Summary.mp4 2.8 MB
3. Ransomware Entry Points/12. Overview.mp4 2.7 MB
4. Incident Response - Detection and Containment/22. Containing the Attack.mp4 9.0 MB
4. Incident Response - Detection and Containment/21. Detecting an Attack.mp4 7.3 MB
猜你喜欢:
Cybersecurity
Pluralsight
Threats
Ransomware