磁力管家

磁力管家
为您索检到268条磁力链接,耗时0毫秒。 rss

分享给好友

【其他】 Lynda.com.Practical.Cybersecurity-ELOHiM
收录时间:2017-05-15 文档个数:18 文档大小:232.2 MB 最近下载:2018-12-01 人气:142 磁力链接
  • r00e-lprecybs.r00 15.0 MB
  • r01e-lprecybs.r01 15.0 MB
  • r02e-lprecybs.r02 15.0 MB
  • r03e-lprecybs.r03 15.0 MB
  • r04e-lprecybs.r04 15.0 MB
  • r05e-lprecybs.r05 15.0 MB
  • r06e-lprecybs.r06 15.0 MB
  • r07e-lprecybs.r07 15.0 MB
  • r08e-lprecybs.r08 15.0 MB
  • r09e-lprecybs.r09 15.0 MB
  • r10e-lprecybs.r10 15.0 MB
  • r11e-lprecybs.r11 15.0 MB
  • r12e-lprecybs.r12 15.0 MB
  • r13e-lprecybs.r13 15.0 MB
  • r14e-lprecybs.r14 7.2 MB
  • rare-lprecybs.rar 15.0 MB
  • sfve-lprecybs.sfv 400 Bytes
  • nfoelohim.nfo 2.6 kB
【影视】 Pluralsight - Cybersecurity Threats: Ransomware
收录时间:2017-06-08 文档个数:37 文档大小:388.1 MB 最近下载:2025-05-16 人气:2825 磁力链接
  • mp43. Ransomware Entry Points/15. Embedded Hyperlinks, Websites_downloads, and Drive-by Infections.mp4 6.2 MB
  • mp43. Ransomware Entry Points/16. Why Common Exploit Kits Are Used.mp4 5.4 MB
  • mp43. Ransomware Entry Points/14. Phishing and Email Attachments.mp4 10.6 MB
  • mp43. Ransomware Entry Points/18. Summary.mp4 2.8 MB
  • mp43. Ransomware Entry Points/12. Overview.mp4 2.7 MB
  • mp43. Ransomware Entry Points/13. The 5 Classic Infection Vectors.mp4 3.1 MB
  • mp43. Ransomware Entry Points/17. Command and Callback (C&C) and Indicators of Compromise.mp4 7.0 MB
  • mp44. Incident Response - Detection and Containment/21. Detecting an Attack.mp4 7.3 MB
  • mp44. Incident Response - Detection and Containment/20. Indicators of Compromise.mp4 5.3 MB
  • mp44. Incident Response - Detection and Containment/23. Summary.mp4 1.7 MB
  • mp44. Incident Response - Detection and Containment/19. Overview.mp4 2.6 MB
  • mp44. Incident Response - Detection and Containment/22. Containing the Attack.mp4 9.0 MB
  • mp46. Countermeasures and Preparing Your Incident Response/35. Next Generation Anti-virus_Anti-malware.mp4 5.6 MB
  • mp46. Countermeasures and Preparing Your Incident Response/37. Summary.mp4 5.5 MB
  • mp46. Countermeasures and Preparing Your Incident Response/33. Defending a Ransomware Attack.mp4 11.4 MB
  • mp46. Countermeasures and Preparing Your Incident Response/34. Protecting a Windows Network.mp4 8.0 MB
  • mp46. Countermeasures and Preparing Your Incident Response/32. Overview.mp4 5.5 MB
  • mp46. Countermeasures and Preparing Your Incident Response/36. Lessons Learned and Your Incident Response Plan.mp4 10.9 MB
  • mp42. What Is Ransomware/06. How Big Is the Problem.mp4 15.1 MB
  • mp42. What Is Ransomware/02. Overview.mp4 4.1 MB
【影视】 Lynda - Cybersecurity with Cloud Computing
收录时间:2017-07-16 文档个数:39 文档大小:371.6 MB 最近下载:2025-05-15 人气:3619 磁力链接
  • mp400. Introduction/00_01 - Welcome.mp4 17.4 MB
  • mp400. Introduction/00_02 - What you should know.mp4 861.2 kB
  • mp400. Introduction/00_03 - Reference sites.mp4 16.6 MB
  • mp400. Introduction/00_04 - Using the exercise files.mp4 278.9 kB
  • mp401. Cloud Fundamentals/01_01 - Defining the essential characteristics of cloud.mp4 15.8 MB
  • mp401. Cloud Fundamentals/01_02 - Understanding infrastructure as a service.mp4 11.9 MB
  • mp401. Cloud Fundamentals/01_03 - Unraveling platform as a service.mp4 6.8 MB
  • mp401. Cloud Fundamentals/01_04 - Comprehending software as a service.mp4 8.6 MB
  • mp401. Cloud Fundamentals/01_05 - Discovering deployment models.mp4 11.4 MB
  • mp401. Cloud Fundamentals/01_06 - Identifying cloud incidents.mp4 15.2 MB
  • mp401. Cloud Fundamentals/01_07 - Dissecting the anatomy of a service failure.mp4 8.8 MB
  • mp401. Cloud Fundamentals/01_08 - Deciphering the anatomy of a business failure.mp4 8.3 MB
  • mp401. Cloud Fundamentals/01_09 - Defining trust models for cloud.mp4 14.0 MB
  • mp402. Cloud Security Guidance/02_01 - Identifying governance and risk.mp4 5.5 MB
  • mp402. Cloud Security Guidance/02_02 - Complying with legal and audit requrements.mp4 13.1 MB
  • mp402. Cloud Security Guidance/02_03 - Managing information and data security.mp4 15.6 MB
  • mp402. Cloud Security Guidance/02_04 - Providing portability and interoperability.mp4 7.5 MB
  • mp402. Cloud Security Guidance/02_05 - Comparing traditional IT, BCP, and DR.mp4 12.0 MB
  • mp402. Cloud Security Guidance/02_06 - Understanding data center operations.mp4 5.4 MB
  • mp402. Cloud Security Guidance/02_07 - Managing incident response.mp4 12.9 MB
【影视】 Lynda - Cybersecurity Foundations
收录时间:2017-07-23 文档个数:28 文档大小:301.1 MB 最近下载:2025-05-16 人气:1753 磁力链接
  • mp400. Introduction/00_01 - Welcome.mp4 5.8 MB
  • mp400. Introduction/00_02 - What you should know.mp4 2.0 MB
  • mp401. Cybersecurity Foundations/01_01 - Understanding the NIST cybersecurity framework.mp4 12.8 MB
  • mp401. Cybersecurity Foundations/01_02 - Dissecting cyber risk.mp4 13.3 MB
  • mp401. Cybersecurity Foundations/01_03 - Unpacking COBIT 5.mp4 10.5 MB
  • mp401. Cybersecurity Foundations/01_04 - Looking closer at DSS05.mp4 8.2 MB
  • mp401. Cybersecurity Foundations/01_05 - Implementing control frameworks.mp4 14.6 MB
  • mp401. Cybersecurity Foundations/01_06 - Dissecting the payment card industry and PCI DSS.mp4 14.7 MB
  • mp401. Cybersecurity Foundations/01_07 - Exploring the Cyber Essentials framework.mp4 9.4 MB
  • mp402. Cybersecurity Threats/02_01 - Breaking down the cybersecurity kill chain.mp4 8.2 MB
  • mp402. Cybersecurity Threats/02_02 - Dissecting security threats.mp4 11.7 MB
  • mp402. Cybersecurity Threats/02_03 - Exploring cybercrime as an industry.mp4 10.1 MB
  • mp402. Cybersecurity Threats/02_04 - Hiding malware through cloaking and alternate data streams.mp4 9.0 MB
  • mp402. Cybersecurity Threats/02_05 - Using callbacks to capture keystrokes.mp4 9.7 MB
  • mp402. Cybersecurity Threats/02_06 - Hiding malware with rootkits.mp4 9.8 MB
  • mp402. Cybersecurity Threats/02_07 - Understanding advanced persistent threats (APTs).mp4 13.5 MB
  • mp402. Cybersecurity Threats/02_08 - Exploring ransomware.mp4 8.4 MB
  • mp403. Security Architecture/03_01 - Describing security requirements.mp4 14.9 MB
  • mp403. Security Architecture/03_02 - Architecting security risk.mp4 13.4 MB
  • mp403. Security Architecture/03_03 - Selecting security controls.mp4 8.5 MB
【影视】 Lynda - Cybersecurity for IT Professionals
收录时间:2017-07-25 文档个数:45 文档大小:303.6 MB 最近下载:2025-05-16 人气:5438 磁力链接
  • mp400. Introduction/00_01 - Welcome.mp4 6.3 MB
  • mp400. Introduction/00_02 - What you should know before watching this course.mp4 869.2 kB
  • mp400. Introduction/00_03 - Using the exercise files.mp4 950.7 kB
  • mp401. Why Cybersecurity/01_01 - Hackers and the kill chain.mp4 14.3 MB
  • mp401. Why Cybersecurity/01_02 - The Stuxnet kill chain.mp4 8.9 MB
  • mp401. Why Cybersecurity/01_03 - Common forms of cybersecurity attack.mp4 14.1 MB
  • mp402. Antivirus/02_01 - Viruses, spyware, and adware.mp4 4.0 MB
  • mp402. Antivirus/02_02 - Using Windows Defender.mp4 3.1 MB
  • mp402. Antivirus/02_03 - Setting up real-time protection.mp4 1.0 MB
  • mp402. Antivirus/02_04 - Scanning with Windows Defender.mp4 4.3 MB
  • mp402. Antivirus/02_05 - Modifying antivirus settings in Windows Defender.mp4 5.8 MB
  • mp402. Antivirus/02_06 - Scheduling a scan with Windows Defender.mp4 9.7 MB
  • mp402. Antivirus/02_07 - Using Windows Defender offline.mp4 1.9 MB
  • mp402. Antivirus/02_08 - Exploring antivirus on Linux.mp4 1.7 MB
  • mp403. Personal Firewalls/03_01 - Why firewalls.mp4 1.5 MB
  • mp403. Personal Firewalls/03_02 - Using the Microsoft Windows Firewall.mp4 12.9 MB
  • mp403. Personal Firewalls/03_03 - Setting up advanced security notifications.mp4 9.5 MB
  • mp403. Personal Firewalls/03_04 - Setting up detailed rules.mp4 10.9 MB
  • mp403. Personal Firewalls/03_05 - Managing and analyzing log files with ZedLan.mp4 8.4 MB
  • mp403. Personal Firewalls/03_06 - Introducing iptables in Linux.mp4 10.7 MB
【文档书籍】 Cybersecurity presented by Wiley
收录时间:2017-08-04 文档个数:436 文档大小:1.4 GB 最近下载:2025-05-10 人气:177 磁力链接
  • pdfpdf/applied_cryptography_protocols_algorithms_and_source_code_in_c.pdf 164.8 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/8/7/8-7.mov 131.8 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/16/8/16-8.mov 93.9 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/6/9/6-9.mov 71.4 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/17/10/17-10.mov 70.3 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/6/11/6-11.mov 64.0 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/8/1/8-1.mov 59.6 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/13/4/13-4.mov 55.4 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/15/6/prolaco.vmem.zip 45.3 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/16/7/laqma.vmem.zip 44.5 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/16/6/coreflood.vmem.zip 44.4 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/17/1/zeus.vmem.zip 43.5 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/16/6/silentbanker.vmem.zip 43.5 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/17/6/be2.vmem.zip 42.8 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/17/11/sality.vmem.zip 42.8 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/17/8/tigger.vmem.zip 42.1 MB
  • pdfpdf/ceh_v9_certified_ethical_hacker_study_guide.pdf 38.9 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/9/5/9-5.mov 30.5 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/6/1/6-1.mov 30.3 MB
  • pdfpdf/unauthorised_access_physical_penetration_testing_for_it_security_teams.pdf 27.2 MB
【文档书籍】 Cybersecurity presented by Wiley
收录时间:2017-08-06 文档个数:438 文档大小:1.5 GB 最近下载:2025-05-15 人气:1540 磁力链接
  • pdfpdf/applied_cryptography_protocols_algorithms_and_source_code_in_c.pdf 164.8 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/8/7/8-7.mov 131.8 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/16/8/16-8.mov 93.9 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/6/9/6-9.mov 71.4 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/17/10/17-10.mov 70.3 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/6/11/6-11.mov 64.0 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/8/1/8-1.mov 59.6 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/13/4/13-4.mov 55.4 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/15/6/prolaco.vmem.zip 45.3 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/16/7/laqma.vmem.zip 44.5 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/16/6/coreflood.vmem.zip 44.4 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/17/1/zeus.vmem.zip 43.5 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/16/6/silentbanker.vmem.zip 43.5 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/17/6/be2.vmem.zip 42.8 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/17/11/sality.vmem.zip 42.8 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/17/8/tigger.vmem.zip 42.1 MB
  • pdfpdf/ceh_v9_certified_ethical_hacker_study_guide.pdf 38.9 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/9/5/9-5.mov 30.5 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/6/1/6-1.mov 30.3 MB
  • pdfpdf/unauthorised_access_physical_penetration_testing_for_it_security_teams.pdf 27.2 MB
【影视】 [FreeTutorials.Us] cybersecurity-ultimate-ethical-hacking-boot-camp
收录时间:2017-08-24 文档个数:53 文档大小:3.6 GB 最近下载:2025-05-16 人气:3681 磁力链接
  • pdf01 Introduction to the Ultimate Ethical Hacking Boot Camp/attached_files/001 Welcome to the Ultimate Ethical Hacking Boot Camp/Equipment.pdf 131.3 kB
  • jpg02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/Kali.Backgrounds.jpg 478.6 kB
  • jpg02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/Server.2008.Backgrounds.jpg 480.5 kB
  • jpg02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/win7.Backgrounds.jpg 480.5 kB
  • jpg02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/win8.Backgrounds.jpg 480.2 kB
  • jpg02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/winxp.Backgrounds.jpg 480.2 kB
  • pdf08 Password Cracking/attached_files/037 Windows Password Cracking/Wordlist-Resources.pdf 59.0 kB
  • mp401 Introduction to the Ultimate Ethical Hacking Boot Camp/001 Welcome to the Ultimate Ethical Hacking Boot Camp.mp4 71.7 MB
  • mp401 Introduction to the Ultimate Ethical Hacking Boot Camp/002 What is Ethical Hacking.mp4 149.9 MB
  • mp401 Introduction to the Ultimate Ethical Hacking Boot Camp/003 Careers for Ethical Hackers.mp4 48.9 MB
  • mp401 Introduction to the Ultimate Ethical Hacking Boot Camp/004 Wireless Lab Setup Hack.mp4 62.6 MB
  • mp401 Introduction to the Ultimate Ethical Hacking Boot Camp/005 Wireless Hacking Module Disclaimer.mp4 38.8 MB
  • mp401 Introduction to the Ultimate Ethical Hacking Boot Camp/006 Interview Oracle Shodan CNN.mp4 278.0 MB
  • mp402 Hacking Lab Setup - Windows Mac Instructions/007 Introduction to Lab Setup.mp4 31.3 MB
  • mp402 Hacking Lab Setup - Windows Mac Instructions/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines..mp4 20.7 MB
  • mp402 Hacking Lab Setup - Windows Mac Instructions/009 Installing Windows XP.mp4 133.1 MB
  • mp402 Hacking Lab Setup - Windows Mac Instructions/010 Installing Server 2008.mp4 7.7 MB
  • mp402 Hacking Lab Setup - Windows Mac Instructions/011 Installing Kali Linux from ISO.mp4 33.5 MB
  • mp402 Hacking Lab Setup - Windows Mac Instructions/012 Installing Kali Linux Prebuild Virtual Machine.mp4 29.4 MB
  • mp402 Hacking Lab Setup - Windows Mac Instructions/013 Installing Windows 7.mp4 9.8 MB
【影视】 CYBERSECURITY COSE NELL'ALTRO MONDO - SPECIALE TG5.mkv
收录时间:2018-04-09 文档个数:1 文档大小:733.6 MB 最近下载:2025-05-14 人气:1433 磁力链接
  • mkvCYBERSECURITY COSE NELL'ALTRO MONDO - SPECIALE TG5.mkv 733.6 MB
【压缩文件】 Packt - Cybersecurity Attacks (Red Team Activity).7z
收录时间:2018-06-09 文档个数:1 文档大小:630.7 MB 最近下载:2024-08-11 人气:159 磁力链接
  • 7zPackt - Cybersecurity Attacks (Red Team Activity).7z 630.7 MB
【影视】 Lynda - Cybersecurity for Small and Medium Businesses Essential Training
收录时间:2018-07-25 文档个数:66 文档大小:358.3 MB 最近下载:2025-05-15 人气:1587 磁力链接
  • srt1.Introduction/01.Welcome.en.srt 2.1 kB
  • mp41.Introduction/01.Welcome.mp4 21.9 MB
  • srt1.Introduction/02.What you should know.en.srt 1.5 kB
  • mp41.Introduction/02.What you should know.mp4 5.0 MB
  • srt2.1. The Basics/03.Why you should care.en.srt 6.7 kB
  • mp42.1. The Basics/03.Why you should care.mp4 31.6 MB
  • srt2.1. The Basics/04.Physical security vs. cybersecurity.en.srt 1.9 kB
  • mp42.1. The Basics/04.Physical security vs. cybersecurity.mp4 4.8 MB
  • srt2.1. The Basics/05.Anyone can improve the cybersecurity of a business.en.srt 3.4 kB
  • mp42.1. The Basics/05.Anyone can improve the cybersecurity of a business.mp4 9.1 MB
  • srt2.1. The Basics/06.What are the cybersecurity threat actions facing businesses.en.srt 4.5 kB
  • mp42.1. The Basics/06.What are the cybersecurity threat actions facing businesses.mp4 6.9 MB
  • srt2.1. The Basics/07.What are the cybersecurity threats.en.srt 6.4 kB
  • mp42.1. The Basics/07.What are the cybersecurity threats.mp4 14.6 MB
  • srt2.1. The Basics/08.A five-step process to improve cybersecurity.en.srt 3.9 kB
  • mp42.1. The Basics/08.A five-step process to improve cybersecurity.mp4 7.2 MB
  • srt3.2. Identify/09.Step #1 - Identify key assets.en.srt 3.1 kB
  • mp43.2. Identify/09.Step #1 - Identify key assets.mp4 9.5 MB
  • srt3.2. Identify/10.Inventory sheet - Data and devices.en.srt 1.9 kB
  • mp43.2. Identify/10.Inventory sheet - Data and devices.mp4 3.1 MB
【压缩文件】 A Hacker's Guide to Internet Safety and Cybersecurity
收录时间:2018-07-25 文档个数:4 文档大小:2.5 GB 最近下载:2025-05-16 人气:2853 磁力链接
  • txtTutsGalaxy.com.txt 41 Bytes
  • txtTorrent_downloaded_from_Demonoid_-_www.demonoid.pw_.txt 59 Bytes
  • txtRead Me.txt 80 Bytes
  • zipA Hacker's Guide to Internet Safety and Cybersecurity.zip 2.5 GB
【压缩文件】 [DesireCourse.Com] Udemy - A Hacker's Guide to Internet Safety and Cybersecurity
收录时间:2018-08-02 文档个数:3 文档大小:2.5 GB 最近下载:2025-05-15 人气:1467 磁力链接
  • zip[DesireCourse.Com] Udemy - A Hacker's Guide to Internet Safety and Cybersecurity.zip 2.5 GB
  • txt[DesireCourse.Com].txt 828 Bytes
  • url[DesireCourse.Com].url 51 Bytes
【影视】 Cybersecurity for Small and Medium Businesses - Essential Training
收录时间:2018-09-09 文档个数:66 文档大小:358.3 MB 最近下载:2025-05-15 人气:2022 磁力链接
  • mp42.1. The Basics/03.Why you should care.mp4 31.6 MB
  • mp41.Introduction/01.Welcome.mp4 21.9 MB
  • srt1.Introduction/02.What you should know.en.srt 1.5 kB
  • mp41.Introduction/02.What you should know.mp4 5.0 MB
  • srt2.1. The Basics/03.Why you should care.en.srt 6.7 kB
  • srt1.Introduction/01.Welcome.en.srt 2.1 kB
  • srt2.1. The Basics/04.Physical security vs. cybersecurity.en.srt 1.9 kB
  • mp42.1. The Basics/04.Physical security vs. cybersecurity.mp4 4.8 MB
  • srt2.1. The Basics/05.Anyone can improve the cybersecurity of a business.en.srt 3.4 kB
  • mp42.1. The Basics/05.Anyone can improve the cybersecurity of a business.mp4 9.1 MB
  • srt2.1. The Basics/06.What are the cybersecurity threat actions facing businesses.en.srt 4.5 kB
  • mp42.1. The Basics/06.What are the cybersecurity threat actions facing businesses.mp4 6.9 MB
  • srt2.1. The Basics/07.What are the cybersecurity threats.en.srt 6.4 kB
  • mp42.1. The Basics/07.What are the cybersecurity threats.mp4 14.6 MB
  • srt2.1. The Basics/08.A five-step process to improve cybersecurity.en.srt 3.9 kB
  • mp42.1. The Basics/08.A five-step process to improve cybersecurity.mp4 7.2 MB
  • srt3.2. Identify/09.Step #1 - Identify key assets.en.srt 3.1 kB
  • mp43.2. Identify/09.Step #1 - Identify key assets.mp4 9.5 MB
  • srt3.2. Identify/10.Inventory sheet - Data and devices.en.srt 1.9 kB
  • mp43.2. Identify/10.Inventory sheet - Data and devices.mp4 3.1 MB
【影视】 Cybersecurity for Executives
收录时间:2018-10-13 文档个数:86 文档大小:300.7 MB 最近下载:2025-05-15 人气:3241 磁力链接
  • mp45.4. Stop Malicious Code/20.How to avoid malicious code.mp4 12.5 MB
  • mp41.Introduction/01.Cybersecurity for executives.mp4 4.3 MB
  • srt1.Introduction/02.What you should know.en.srt 1.4 kB
  • mp41.Introduction/02.What you should know.mp4 1.2 MB
  • srt1.Introduction/03.How this course is organized.en.srt 1.7 kB
  • mp41.Introduction/03.How this course is organized.mp4 2.3 MB
  • srt2.1. Understand the Big Picture/04.Understand the big picture overview.en.srt 2.1 kB
  • mp42.1. Understand the Big Picture/04.Understand the big picture overview.mp4 4.8 MB
  • srt2.1. Understand the Big Picture/05.Why are you a target.en.srt 4.0 kB
  • mp42.1. Understand the Big Picture/05.Why are you a target.mp4 8.1 MB
  • srt2.1. Understand the Big Picture/06.Example - Organized crime.en.srt 4.5 kB
  • mp42.1. Understand the Big Picture/06.Example - Organized crime.mp4 9.7 MB
  • srt2.1. Understand the Big Picture/07.Why are you in the line of fire.en.srt 3.5 kB
  • mp42.1. Understand the Big Picture/07.Why are you in the line of fire.mp4 7.1 MB
  • srt2.1. Understand the Big Picture/08.Example - Cyberwar cross-fire.en.srt 3.3 kB
  • mp42.1. Understand the Big Picture/08.Example - Cyberwar cross-fire.mp4 7.6 MB
  • srt2.1. Understand the Big Picture/09.Insider threat - Cyber failure.en.srt 4.4 kB
  • mp42.1. Understand the Big Picture/09.Insider threat - Cyber failure.mp4 7.6 MB
  • srt3.2. How to Think about Cybersecurity/10.Think about cybersecurity summary.en.srt 1.7 kB
  • mp43.2. How to Think about Cybersecurity/10.Think about cybersecurity summary.mp4 2.9 MB
【影视】 CyberRange : la solution de cyber-entraînement et de tests Cyber d’Airbus Cybersecurity - Fabien Lorc’h 1080p.mp4
收录时间:2018-10-31 文档个数:1 文档大小:301.1 MB 最近下载:2018-11-01 人气:4 磁力链接
  • mp4 CyberRange : la solution de cyber-entraînement et de tests Cyber d’Airbus Cybersecurity - Fabien Lorc’h 1080p.mp4 301.1 MB
【其他】 Cybersecurity Program Development for Business The Essential Planning Guide.m4b
收录时间:2018-11-03 文档个数:1 文档大小:261.8 MB 最近下载:2025-05-16 人气:1529 磁力链接
  • m4bCybersecurity Program Development for Business The Essential Planning Guide.m4b 261.8 MB
【影视】 [FreeCoursesOnline.Me] [Packtpub.Com] Cybersecurity - Methods of Protection (Blue Team Activity) - [FCO]
收录时间:2018-11-13 文档个数:35 文档大小:1.3 GB 最近下载:2025-05-15 人气:1742 磁力链接
  • mp401.Securing Your Network/0101.The Course Overview.mp4 22.8 MB
  • mp401.Securing Your Network/0102.Understanding Firewalls and Tuning Them Up.mp4 28.7 MB
  • mp401.Securing Your Network/0103.How to Work with IDSIPS.mp4 24.0 MB
  • mp401.Securing Your Network/0104.Securing Your Wi-Fi Network.mp4 90.9 MB
  • mp401.Securing Your Network/0105.Ferreting out a Hacker by IP.mp4 101.3 MB
  • mp401.Securing Your Network/0106.Analyzing Traffic Wireshark.mp4 25.3 MB
  • mp401.Securing Your Network/0107.The Fastest Way to Detect ARP Poisoning Attack.mp4 21.8 MB
  • mp401.Securing Your Network/0108.Analyzing Your Traffic to Catch a Spy with Wireshark.mp4 35.4 MB
  • mp401.Securing Your Network/0109.Looking for Spies with a Python Script.mp4 50.2 MB
  • mp401.Securing Your Network/0110.How to Outfox Ransomware.mp4 28.9 MB
  • mp401.Securing Your Network/0111.Advanced-level Techniques What to Do If Hackers Already in Your Network.mp4 40.3 MB
  • mp402.Securing Your Website/0201.Brute-Forcing Website Passwords with OWASP ZAP.mp4 45.6 MB
  • mp402.Securing Your Website/0202.How to Create a Bulletproof Password in a Second.mp4 68.9 MB
  • mp402.Securing Your Website/0203.Testing a Website for SQL Injection with Burp Suite.mp4 30.9 MB
  • mp402.Securing Your Website/0204.Testing a Website for XSS Vulnerability.mp4 29.8 MB
  • mp402.Securing Your Website/0205.Building Fortifications – Input Validation and Whitelisting.mp4 99.3 MB
  • mp402.Securing Your Website/0206.Testing Your SSLTLS Connection.mp4 21.2 MB
  • mp402.Securing Your Website/0207.Scanning Your Website for Malicious Scripts.mp4 91.1 MB
  • mp402.Securing Your Website/0208.Protecting from a Session Hijacking Attack.mp4 27.7 MB
  • mp402.Securing Your Website/0209.The Big Strategy – Three Shortcuts to Secure a Web Application.mp4 68.6 MB
【其他】 Cybersecurity Essentials.m4b
收录时间:2018-11-14 文档个数:1 文档大小:498.9 MB 最近下载:2025-05-15 人气:3564 磁力链接
  • m4bCybersecurity Essentials.m4b 498.9 MB
【其他】 ICOLLEGE.COMPTIA.CYBERSECURITY.ANALYST.CSA.PLUS-iLLiTERATE
收录时间:2018-11-17 文档个数:59 文档大小:2.8 GB 最近下载:2025-05-14 人气:115 磁力链接
  • r00icollege.comptia.cybersecurity.analyst.csa.plus-illiterate.r00 50.0 MB
  • r01icollege.comptia.cybersecurity.analyst.csa.plus-illiterate.r01 50.0 MB
  • r02icollege.comptia.cybersecurity.analyst.csa.plus-illiterate.r02 50.0 MB
  • r03icollege.comptia.cybersecurity.analyst.csa.plus-illiterate.r03 50.0 MB
  • r04icollege.comptia.cybersecurity.analyst.csa.plus-illiterate.r04 50.0 MB
  • r05icollege.comptia.cybersecurity.analyst.csa.plus-illiterate.r05 50.0 MB
  • r06icollege.comptia.cybersecurity.analyst.csa.plus-illiterate.r06 50.0 MB
  • r07icollege.comptia.cybersecurity.analyst.csa.plus-illiterate.r07 50.0 MB
  • r08icollege.comptia.cybersecurity.analyst.csa.plus-illiterate.r08 50.0 MB
  • r09icollege.comptia.cybersecurity.analyst.csa.plus-illiterate.r09 50.0 MB
  • r10icollege.comptia.cybersecurity.analyst.csa.plus-illiterate.r10 50.0 MB
  • r11icollege.comptia.cybersecurity.analyst.csa.plus-illiterate.r11 50.0 MB
  • r12icollege.comptia.cybersecurity.analyst.csa.plus-illiterate.r12 50.0 MB
  • r13icollege.comptia.cybersecurity.analyst.csa.plus-illiterate.r13 50.0 MB
  • r14icollege.comptia.cybersecurity.analyst.csa.plus-illiterate.r14 50.0 MB
  • r15icollege.comptia.cybersecurity.analyst.csa.plus-illiterate.r15 50.0 MB
  • r16icollege.comptia.cybersecurity.analyst.csa.plus-illiterate.r16 50.0 MB
  • r17icollege.comptia.cybersecurity.analyst.csa.plus-illiterate.r17 50.0 MB
  • r18icollege.comptia.cybersecurity.analyst.csa.plus-illiterate.r18 50.0 MB
  • r19icollege.comptia.cybersecurity.analyst.csa.plus-illiterate.r19 50.0 MB
共14页 上一页 1 2 3 4 5 6 下一页