为您索检到268条磁力链接,耗时0毫秒。
- 【影视】 [ FreeCourseWeb.com ] Udemy - The Complete Cybersecurity Awareness Course For Employees
-
收录时间:2022-02-21
文档个数:26
文档大小:1.1 GB
最近下载:2025-05-13
人气:1485
磁力链接
~Get Your Files Here !/4. Social Engineering and Countermeasures/3. Types of Social Engineering Attacks.mp4 92.1 MB
~Get Your Files Here !/1. Introduction to the Cybersecurity Space/1. Cybersecurity Introduction and Trends.mp4 81.4 MB
~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/7. Malware and Types of Malware.mp4 78.6 MB
~Get Your Files Here !/1. Introduction to the Cybersecurity Space/3. Definitions and Key Terms in Cybersecurity.mp4 74.9 MB
~Get Your Files Here !/2. Cybersecurity Roles and Actors/1. Cybersecurity Roles.mp4 72.2 MB
~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/12. Anti-Malware Protection.mp4 68.9 MB
~Get Your Files Here !/2. Cybersecurity Roles and Actors/4. Security Operations Center.mp4 56.2 MB
~Get Your Files Here !/4. Social Engineering and Countermeasures/5. Social Engineering Countermeasures.mp4 50.8 MB
~Get Your Files Here !/5. Cybersecurity Internal Affairs and Controls/11. Cybersecurity Organizations That Are Resourceful.mp4 44.7 MB
~Get Your Files Here !/5. Cybersecurity Internal Affairs and Controls/1. Privacy Policy.mp4 41.7 MB
~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/19. More Countermeasures - Vulnerability Assessments.mp4 41.1 MB
~Get Your Files Here !/5. Cybersecurity Internal Affairs and Controls/7. Incident Handling.mp4 38.9 MB
~Get Your Files Here !/5. Cybersecurity Internal Affairs and Controls/9. IT Governance.mp4 36.1 MB
~Get Your Files Here !/2. Cybersecurity Roles and Actors/7. The Different Types of Cybersecurity Actors.mp4 33.5 MB
~Get Your Files Here !/1. Introduction to the Cybersecurity Space/6. Cybersecurity and Social Media.mp4 33.5 MB
~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/17. More Countermeasures -Digital Forensics.mp4 30.5 MB
~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/23. More on Tech and Admin Controls.mp4 30.3 MB
~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/1. Security Threats.mp4 28.4 MB
~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/21. How To Start and Cybersecurity Program.mp4 27.4 MB
~Get Your Files Here !/5. Cybersecurity Internal Affairs and Controls/3. Good User Habits.mp4 27.0 MB
猜你喜欢:
Complete
Cybersecurity
Employees
Udemy
Course
FreeCourseWeb
com
Awareness
- 【影视】 Pluralsight - Cybersecurity Threats: Ransomware
-
收录时间:2022-02-22
文档个数:37
文档大小:388.1 MB
最近下载:2025-01-10
人气:15
磁力链接
5. Incident Response - Eradication and Recovery/29. NoMoreRansom.org.mp4 71.4 MB
2. What Is Ransomware/09. Demo of Real World Ransomware Attack.mp4 52.0 MB
5. Incident Response - Eradication and Recovery/30. Paying the Ransom.mp4 22.3 MB
2. What Is Ransomware/03. Definition and Types of Ransomware.mp4 20.3 MB
2. What Is Ransomware/04. The Ransomware Timeline.mp4 15.2 MB
5. Incident Response - Eradication and Recovery/27. Recovery Cloud Storage Files, Dropbox, and OneDrive.mp4 15.1 MB
2. What Is Ransomware/06. How Big Is the Problem.mp4 15.1 MB
2. What Is Ransomware/07. Ransomware Victims.mp4 11.7 MB
6. Countermeasures and Preparing Your Incident Response/33. Defending a Ransomware Attack.mp4 11.4 MB
6. Countermeasures and Preparing Your Incident Response/36. Lessons Learned and Your Incident Response Plan.mp4 10.9 MB
3. Ransomware Entry Points/14. Phishing and Email Attachments.mp4 10.6 MB
4. Incident Response - Detection and Containment/22. Containing the Attack.mp4 9.0 MB
6. Countermeasures and Preparing Your Incident Response/34. Protecting a Windows Network.mp4 8.0 MB
4. Incident Response - Detection and Containment/21. Detecting an Attack.mp4 7.3 MB
5. Incident Response - Eradication and Recovery/26. Recovery Local and Network Files.mp4 7.3 MB
3. Ransomware Entry Points/17. Command and Callback (C&C) and Indicators of Compromise.mp4 7.0 MB
5. Incident Response - Eradication and Recovery/28. Tools and Resources.mp4 6.7 MB
2. What Is Ransomware/10. Variations of Ransomware.mp4 6.4 MB
3. Ransomware Entry Points/15. Embedded Hyperlinks, Websites_downloads, and Drive-by Infections.mp4 6.2 MB
5. Incident Response - Eradication and Recovery/31. Summary.mp4 6.0 MB
猜你喜欢:
Cybersecurity
Pluralsight
Threats
Ransomware
- 【影视】 [ FreeCourseWeb.com ] Linkedin - Cybersecurity Awareness - Phishing Attacks
-
收录时间:2022-03-04
文档个数:39
文档大小:642.7 MB
最近下载:2025-05-02
人气:1592
磁力链接
~Get Your Files Here !/4. How to Catch a Phish/012. Catch a phish red-handed Common indicators of a phish.mp4 48.9 MB
~Get Your Files Here !/3. Different Types of Phishing Attacks/010. Other notable methods of phishing.mp4 47.3 MB
~Get Your Files Here !/2. An Overview of Phishing/004. How does phishing affect us.mp4 46.9 MB
~Get Your Files Here !/2. An Overview of Phishing/005. A review of the psychology behind social engineering attacks.mp4 45.0 MB
~Get Your Files Here !/5. How to Defend against Phishing Attacks/015. How technology helps with the fight against phishing attacks.mp4 41.6 MB
~Get Your Files Here !/4. How to Catch a Phish/013. Is this a phish Real-world examples of phishing attacks.mp4 38.5 MB
~Get Your Files Here !/3. Different Types of Phishing Attacks/007. Unfriended How to spot a social media phish.mp4 38.5 MB
~Get Your Files Here !/4. How to Catch a Phish/011. What makes phishing attacks successful.mp4 36.9 MB
~Get Your Files Here !/3. Different Types of Phishing Attacks/008. Getting specific with targeted phishing attacks.mp4 34.9 MB
~Get Your Files Here !/3. Different Types of Phishing Attacks/006. Is it a harmless unknown caller or vishing.mp4 34.6 MB
~Get Your Files Here !/6. What Happens If You Fall for a Phish/018. Falling for a phishing attack at home.mp4 34.5 MB
~Get Your Files Here !/2. An Overview of Phishing/003. Money is the motive The reason behind phishing.mp4 34.1 MB
~Get Your Files Here !/5. How to Defend against Phishing Attacks/016. Practice makes perfect An overview of phishing simulations.mp4 32.6 MB
~Get Your Files Here !/2. An Overview of Phishing/002. Phishing The dangers of email.mp4 32.3 MB
~Get Your Files Here !/3. Different Types of Phishing Attacks/009. SMS phishing A text-based attack.mp4 31.8 MB
~Get Your Files Here !/6. What Happens If You Fall for a Phish/017. Responding to a phishing attack at work.mp4 23.4 MB
~Get Your Files Here !/5. How to Defend against Phishing Attacks/014. The most common ways to defend against a phish.mp4 23.1 MB
~Get Your Files Here !/1. Introduction/001. About phishing attacks.mp4 9.8 MB
~Get Your Files Here !/7. Conclusion/019. Next steps and takeaways.mp4 7.8 MB
~Get Your Files Here !/Ex_Files_Cybersecurity_Awareness_Phishing_Attacks/Exercise Files/Additional Resources.pdf 47.6 kB
猜你喜欢:
Attacks
Cybersecurity
Linkedin
Phishing
FreeCourseWeb
com
Awareness
- 【音乐】 Trust Genics - 2020 - Cybersecurity (Technology)
-
收录时间:2022-03-05
文档个数:10
文档大小:109.7 MB
最近下载:2025-05-15
人气:1428
磁力链接
Cybersecurity.mp3 109.7 MB
Cybersecurity.jpg 52.5 kB
Cybersecurity - Trust Genics - 2020.txt 2.1 kB
Downloaded From TorrentGalaxy.txt 583 Bytes
Downloaded From Glodls.txt 237 Bytes
Downloaded From ETTV.txt 138 Bytes
Downloaded From ProStyleX.txt 101 Bytes
Downloaded From 1337X.txt 96 Bytes
Downloaded From Demonoid.txt 50 Bytes
Downloaded From Katcr.co.txt 43 Bytes
猜你喜欢:
Cybersecurity
Technology
Trust
2020
Genics
- 【压缩文件】 [ FreeCourseWeb.com ] Udemy - Cybersecurity fundamentals.zip
-
收录时间:2022-03-07
文档个数:1
文档大小:568.6 MB
最近下载:2025-04-26
人气:261
磁力链接
[ FreeCourseWeb.com ] Udemy - Cybersecurity fundamentals.zip 568.6 MB
猜你喜欢:
zip
Cybersecurity
Udemy
fundamentals
FreeCourseWeb
com
- 【影视】 [ FreeCourseWeb.com ] Udemy - Master Cybersecurity,Ethical Hacking and Penetrating Testing
-
收录时间:2022-03-15
文档个数:50
文档大小:1.6 GB
最近下载:2025-05-16
人气:2202
磁力链接
~Get Your Files Here !/04 Exposing Hackers - Know Your Enemy/002 Why You Need Security _.mp4 189.8 MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/011 Setting up Labs.mp4 169.5 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/003 What is Privacy, Anonymity and Pseudonymity _.mp4 158.8 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/006 Threat Modelling And Risk Assessment.mp4 158.3 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/008 Confidentiality, Integrity and Availability - (Security Attributes).mp4 141.8 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/004 Security, Vulnerabilities, Threats and Adversaries.mp4 117.8 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/005 Asset Selection.mp4 94.5 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/002 Protect What You Value.mp4 93.7 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/010 Zero Trust Model.mp4 85.7 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/007 Security,Anonymity and Privacy.mp4 59.8 MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/001 What is Cybersecurity _.mp4 34.8 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/009 Defence in Depth.mp4 34.2 MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/008 Who Conduct it _.mp4 26.4 MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/002 What is Ethical Hacking _.mp4 25.8 MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/005 Purpose of Studying Ethical Hacking and Penetrating Testing.mp4 24.3 MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/010 Closure.mp4 23.6 MB
~Get Your Files Here !/04 Exposing Hackers - Know Your Enemy/001 Goals and Learning Objectives - Know Your Enemy.mp4 21.8 MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/009 Who should You Choose _.mp4 20.6 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/001 Goals and Learning Objectives.mp4 19.7 MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/006 Scope For Ethical Hackers and Penetrating Testers.mp4 18.5 MB
猜你喜欢:
Ethical
Penetrating
Cybersecurity
Testing
Udemy
Master
FreeCourseWeb
Hacking
com
- 【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity Threat Hunting Professional
-
收录时间:2022-03-20
文档个数:36
文档大小:1.0 GB
最近下载:2025-05-15
人气:2155
磁力链接
~Get Your Files Here !/2. Time to hunt/2. Practical Threat hunting Demo.mp4 121.9 MB
~Get Your Files Here !/2. Time to hunt/1. Case Base Threat Hunting.mp4 93.6 MB
~Get Your Files Here !/2. Time to hunt/3. Indicators of threat attacksIoC.mp4 86.1 MB
~Get Your Files Here !/1. Introduction/11. 7 Effective Threat Hunting Tips.mp4 81.5 MB
~Get Your Files Here !/1. Introduction/10. Hypothesis Testing & Sources of Hypothesis.mp4 78.6 MB
~Get Your Files Here !/4. Course Resources/1. Course Resources.mp4 72.6 MB
~Get Your Files Here !/3. Course Conclusion/1. Course Review.mp4 72.6 MB
~Get Your Files Here !/1. Introduction/8. What is Required for Successful Threat Hunting.mp4 71.2 MB
~Get Your Files Here !/1. Introduction/6. Terms associated with Threat Hunting.mp4 70.5 MB
~Get Your Files Here !/1. Introduction/4. Why threat hunt and attributes of an effective threat hunter.mp4 56.2 MB
~Get Your Files Here !/1. Introduction/9. Threat Hunting Approaches.mp4 55.0 MB
~Get Your Files Here !/1. Introduction/5. Threat Hunting Skillset Requirements.mp4 40.0 MB
~Get Your Files Here !/1. Introduction/7. Threat Hunting Loop.mp4 38.6 MB
~Get Your Files Here !/1. Introduction/2. What is Threat Hunting & Its Primary objective.mp4 35.9 MB
~Get Your Files Here !/1. Introduction/1. Introduction.mp4 29.5 MB
~Get Your Files Here !/1. Introduction/3. What is Threat Hunting & Its Primary objective..mp4 23.3 MB
~Get Your Files Here !/4. Course Resources/1.1 Network Threat Hunting with Tim Crothers.mp4 10.6 MB
~Get Your Files Here !/4. Course Resources/1.2 Resources Links for Threat Hunting Course.pdf 435.7 kB
~Get Your Files Here !/2. Time to hunt/2. Practical Threat hunting Demo.srt 11.9 kB
~Get Your Files Here !/2. Time to hunt/3. Indicators of threat attacksIoC.srt 8.3 kB
猜你喜欢:
Hunting
Cybersecurity
Udemy
DevCourseWeb
Threat
Professional
com
- 【影视】 [ CourseMega.com ] Linkedin - Building an ISO 27001-Compliant Cybersecurity Program - The Annex A Controls
-
收录时间:2022-03-29
文档个数:110
文档大小:1.2 GB
最近下载:2025-05-16
人气:5902
磁力链接
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/013. Access control User access management.mp4 60.8 MB
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/028. System lifecycle Security in d.mp4 57.3 MB
~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/017. Physical and environmental security Equipme.mp4 57.2 MB
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/014. Access control System and application.mp4 55.8 MB
~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/032. Management of information security.mp4 54.7 MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/018. Operations security Operational procedures and responsibili.mp4 47.1 MB
~Get Your Files Here !/12. Compliance (Clause A.18)/034. Compliance Compliance with legal and contractual requirements (Claus.mp4 46.5 MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/021. Operations security Logging and monitoring (Clause A.12.4).mp4 45.6 MB
~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/033. Information security continuity an.mp4 45.5 MB
~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/016. Physical and environmental security Secure.mp4 44.8 MB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/004. Contact with auth.mp4 42.7 MB
~Get Your Files Here !/08. Communications Security (Clause A.13)/026. Communications security Information transfer (Clause A..mp4 40.7 MB
~Get Your Files Here !/04. Asset Management (Clause A.8)/010. Asset management Information classification (Clause A.8.2).mp4 40.5 MB
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/027. System lifecycle Security requ.mp4 37.2 MB
~Get Your Files Here !/03. Human Resources Security (Clause A.7)/007. Human resources security During employment (Clause A.7..mp4 34.4 MB
~Get Your Files Here !/08. Communications Security (Clause A.13)/025. Communications security Network security management (Cl.mp4 34.1 MB
~Get Your Files Here !/04. Asset Management (Clause A.8)/009. Asset management Responsibility for assets (Clause A.8.1).mp4 33.3 MB
~Get Your Files Here !/10. Supplier Relationships (Clause A.15)/030. Supplier relationships Information security in supplier.mp4 31.4 MB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/002. Management direct.mp4 31.1 MB
~Get Your Files Here !/04. Asset Management (Clause A.8)/011. Asset management Media handling (Clause A.8.3).mp4 30.4 MB
猜你喜欢:
Building
Annex
Cybersecurity
Linkedin
27001
Compliant
Program
ISO
Controls
CourseMega
- 【压缩文件】 [ FreeCourseWeb.com ] Udemy - Cybersecurity Data Science.zip
-
收录时间:2022-04-08
文档个数:1
文档大小:349.0 MB
最近下载:2025-05-15
人气:179
磁力链接
[ FreeCourseWeb.com ] Udemy - Cybersecurity Data Science.zip 349.0 MB
猜你喜欢:
zip
Data
Cybersecurity
Science
Udemy
FreeCourseWeb
com
- 【影视】 [ FreeCourseWeb.com ] Udemy - Cybersecurity Habits Masterclass
-
收录时间:2022-04-10
文档个数:93
文档大小:2.1 GB
最近下载:2025-05-15
人气:1566
磁力链接
~Get Your Files Here !/3. Skepticism/4. Slow Down And Frown.mp4 73.5 MB
~Get Your Files Here !/11. Conclusion/1. Well Awareiors.mp4 71.5 MB
~Get Your Files Here !/1. Introduction/1. Introduction.mp4 67.0 MB
~Get Your Files Here !/4. Vigilance/2. The Only Thing We Have To Fear.mp4 66.7 MB
~Get Your Files Here !/4. Vigilance/1. The Face Of The Enemy.mp4 66.5 MB
~Get Your Files Here !/5. Secrecy/2. Making It Personal.mp4 65.7 MB
~Get Your Files Here !/2. Literacy/5. Habits And Recipes.mp4 64.7 MB
~Get Your Files Here !/3. Skepticism/1. Zero Trust.mp4 64.5 MB
~Get Your Files Here !/8. Community/4. Habits And Recipes.mp4 57.4 MB
~Get Your Files Here !/8. Community/1. United We Stand.mp4 54.0 MB
~Get Your Files Here !/7. Diligence/3. Random Acts of Security.mp4 53.4 MB
~Get Your Files Here !/7. Diligence/2. Journaling.mp4 53.4 MB
~Get Your Files Here !/9. Mirroring/5. Habits And Recipes.mp4 52.0 MB
~Get Your Files Here !/6. Culture/1. Culture Eats Cybersecurity For Breakfast.mp4 51.4 MB
~Get Your Files Here !/10. Deception/1. Know Thy Enemy.mp4 49.4 MB
~Get Your Files Here !/9. Mirroring/3. Blindspots.mp4 49.1 MB
~Get Your Files Here !/3. Skepticism/2. The Pygmailion Effect.mp4 48.9 MB
~Get Your Files Here !/6. Culture/5. Habits And Recipes.mp4 48.0 MB
~Get Your Files Here !/2. Literacy/1. Fearless Learning.mp4 47.9 MB
~Get Your Files Here !/6. Culture/2. The Hermit Crab Shell.mp4 46.7 MB
猜你喜欢:
Cybersecurity
Masterclass
Udemy
Habits
FreeCourseWeb
com
- 【影视】 [ CourseLala.com ] Udemy - Personal Digital Security Everyone Must Have - Cybersecurity
-
收录时间:2022-04-12
文档个数:76
文档大小:1.5 GB
最近下载:2025-05-10
人气:725
磁力链接
~Get Your Files Here !/02 - Secure your computer from unauthorized access/001 Social Engineering.mp4 157.3 MB
~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/007 Secure your Wi-Fi at Home (Video HD).mp4 103.2 MB
~Get Your Files Here !/02 - Secure your computer from unauthorized access/003 Use strong passwords.mp4 93.7 MB
~Get Your Files Here !/03 - What is Malware and its types/003 Spyware.mp4 66.9 MB
~Get Your Files Here !/06 - Secure your Smartphone/003 Communicating Securely with your Smartphone.mp4 64.7 MB
~Get Your Files Here !/03 - What is Malware and its types/002 Adware.mp4 63.9 MB
~Get Your Files Here !/05 - Email Security/002 Fishing.mp4 57.8 MB
~Get Your Files Here !/02 - Secure your computer from unauthorized access/012 Be cautious.mp4 54.8 MB
~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/002 Tips for buying online.mp4 46.0 MB
~Get Your Files Here !/06 - Secure your Smartphone/001 Purses, Wallets, Smartphones.mp4 43.1 MB
~Get Your Files Here !/03 - What is Malware and its types/001 Trojan Horse.mp4 39.6 MB
~Get Your Files Here !/03 - What is Malware and its types/007 Scareware.mp4 39.5 MB
~Get Your Files Here !/03 - What is Malware and its types/004 Browser Hijacking Software.mp4 37.3 MB
~Get Your Files Here !/02 - Secure your computer from unauthorized access/008 Use a VPN.mp4 36.0 MB
~Get Your Files Here !/03 - What is Malware and its types/005 Viruses.mp4 35.6 MB
~Get Your Files Here !/01 - Introduction to Personal Digital Security/003 Some statistics.mp4 35.0 MB
~Get Your Files Here !/02 - Secure your computer from unauthorized access/004 Use password manager.mp4 33.8 MB
~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/001 Safe browsing.mp4 31.8 MB
~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/008 Safe browsing in Social Networks.mp4 31.7 MB
~Get Your Files Here !/01 - Introduction to Personal Digital Security/001 Introduction to Personal Digital Security.mp4 30.4 MB
猜你喜欢:
Everyone
Personal
CourseLala
Udemy
Cybersecurity
Digital
Security
com
Must
- 【压缩文件】 [ FreeCourseWeb.com ] Udemy - Intoduction to Cybersecurity !From beginner level to PRO !.zip
-
收录时间:2022-04-24
文档个数:1
文档大小:503.9 MB
最近下载:2025-05-14
人气:551
磁力链接
[ FreeCourseWeb.com ] Udemy - Intoduction to Cybersecurity !From beginner level to PRO !.zip 503.9 MB
猜你喜欢:
zip
beginner
level
Cybersecurity
PRO
Udemy
FreeCourseWeb
Intoduction
com
- 【影视】 Cybersecurity Threat Hunting for SOC Analysts
-
收录时间:2022-05-05
文档个数:245
文档大小:6.2 GB
最近下载:2025-05-15
人气:10475
磁力链接
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/10. Adversary Emulation Caldera.mp4 359.9 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/12. Enhanced Lab Realism Bad Blood + Microsoft ATA + Bloodhound!.mp4 338.8 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/1. Threat Hunting with Splunk + Zeek.mp4 243.3 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/7. Adversary Emulation Atomic Red Team + MITRE ATT&CK.mp4 242.7 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/6. Purple Team Scenario Meterpreter + MSFVenom + Process Injection + Velociraptor!.mp4 225.7 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/3. The Modern Threat Hunting Mindset.mp4 225.3 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/5. The Methodical Guide to Effective Threat Hunting/1. Finding Beacons Long and Cumulative Connections.mp4 201.8 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/6. Proofs Detecting False Negatives/2. Suricata vs RITA Zeus Malware.mp4 195.4 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/5. The Methodical Guide to Effective Threat Hunting/5. Finding Beacons Business Need Analysis (Part 4).mp4 194.3 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/2. Threat Hunting with Splunk + Sysmon.mp4 153.3 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/5. The Methodical Guide to Effective Threat Hunting/4. Finding Beacons Business Need Analysis (Part 3).mp4 139.4 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/5. Beaconing DNS.mp4 135.2 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/8. Beaconing Detection Session Size Analysis.mp4 133.5 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/6. Proofs Detecting False Negatives/1. Suricata Capabilities + Installation!.mp4 129.8 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/3. Tools and resources/8. zeek.mp4 126.9 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/2. The Broken Threat Hunting Mindset.mp4 126.1 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/3. Tools and resources/9. Using zeek + Rita to find Evil!.mp4 118.9 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/1. Understanding the New Adversary.mp4 118.7 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/6. Beaconing CDN.mp4 117.8 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/5. Purple Team Scenario Mimikatz.mp4 115.6 MB
猜你喜欢:
Cybersecurity
SOC
Hunting
Threat
Analysts
- 【影视】 [ FreeCourseWeb.com ] Udemy - Increasing Business Cybersecurity Standards immediately!
-
收录时间:2022-05-11
文档个数:66
文档大小:1.4 GB
最近下载:2025-05-14
人气:701
磁力链接
~Get Your Files Here !/03 Understanding Hacking Strategies/001 How does a Hacker look like_.mp4 151.3 MB
~Get Your Files Here !/03 Understanding Hacking Strategies/005 Trends & Outlook.mp4 148.7 MB
~Get Your Files Here !/07 Team Organisation/003 Sharing Files & Accounts.mp4 126.8 MB
~Get Your Files Here !/07 Team Organisation/002 Communication Channels.mp4 116.3 MB
~Get Your Files Here !/07 Team Organisation/001 Cybersecurity Awareness Communication.mp4 115.8 MB
~Get Your Files Here !/10 ADDITIONAL CONTENT/003 Kids & the digital World.mp4 113.9 MB
~Get Your Files Here !/07 Team Organisation/004 Login & Password Management.mp4 73.1 MB
~Get Your Files Here !/10 ADDITIONAL CONTENT/002 Creating safe, secure and Data Protection compliant Products.mp4 72.3 MB
~Get Your Files Here !/10 ADDITIONAL CONTENT/001 Security Standards.mp4 72.2 MB
~Get Your Files Here !/06 Admin Duties/001 ToDo List.mp4 48.8 MB
~Get Your Files Here !/02 The Data Processing Triangle/002 Data Protection.mp4 35.1 MB
~Get Your Files Here !/02 The Data Processing Triangle/001 Overview.mp4 35.1 MB
~Get Your Files Here !/09 The End/001 Closing Statement.mp4 31.3 MB
~Get Your Files Here !/01 Introduction/001 Welcome!.mp4 28.6 MB
~Get Your Files Here !/03 Understanding Hacking Strategies/004 War Stories.mp4 26.9 MB
~Get Your Files Here !/08 Managing Client Data/003 Data Science Projects.mp4 24.7 MB
~Get Your Files Here !/04 Securing Hardware/004 Your invisible Devices.mp4 21.1 MB
~Get Your Files Here !/05 Securing Software & Accounts/002 Service Providers.mp4 19.1 MB
~Get Your Files Here !/01 Introduction/002 Disclaimer.mp4 18.6 MB
~Get Your Files Here !/05 Securing Software & Accounts/001 Daily used Accounts.mp4 18.0 MB
猜你喜欢:
Business
Cybersecurity
Standards
Udemy
FreeCourseWeb
immediately
Increasing
com
- 【影视】 Practical Cybersecurity for IT Professionals
-
收录时间:2023-12-17
文档个数:119
文档大小:392.7 MB
最近下载:2025-05-15
人气:384
磁力链接
[TutsNode.com] - Practical Cybersecurity for IT Professionals/04 - 3. Firewalls/03 - Advanced Windows Firewall.mp4 27.1 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/05 - 4. Network Scanning/01 - Getting started with Nmap.mp4 22.0 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/02 - 1. Why Cybersecurity/07 - Emerging trends in cybersecurity.mp4 20.4 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/02 - 1. Why Cybersecurity/01 - A history of hackers.mp4 17.5 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/04 - 3. Firewalls/05 - Introducing Linux iptables.mp4 16.1 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/04 - 3. Firewalls/02 - Windows Firewall basics.mp4 14.5 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/09 - 8. Network Protocols/02 - Capturing packets with Wireshark.mp4 14.3 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/04 - 3. Firewalls/04 - ZedLan firewall log analyser.mp4 13.4 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/02 - 1. Why Cybersecurity/04 - Common forms of cyberattack.mp4 13.1 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/09 - 8. Network Protocols/03 - Making sense of the protocols.mp4 13.0 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/02 - 1. Why Cybersecurity/02 - The cyber kill chain.mp4 12.0 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/03 - 2. Antivirus/01 - Introducing Microsoft Defender Antivirus.mp4 11.7 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/07 - 6. Vulnerability Scanning/01 - Preparing Nessus.mp4 10.5 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/08 - 7. Web Applications/02 - Running an SQL injection attack.mp4 10.1 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/05 - 4. Network Scanning/02 - Advanced Nmap options.mp4 10.0 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/02 - 1. Why Cybersecurity/03 - Stuxnet and the kill chain.mp4 9.8 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/03 - 2. Antivirus/02 - Detecting malware with Microsoft Defender.mp4 9.5 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/04 - 3. Firewalls/06 - Setting up a simple iptables firewall.mp4 9.3 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/06 - 5. Network Connections/02 - Transferring files using netcat.mp4 9.2 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/06 - 5. Network Connections/04 - Setting up a netcat honeypot.mp4 8.9 MB
猜你喜欢:
Practical
Cybersecurity
Professionals
- 【压缩文件】 [FreeCoursesOnline.Me] Coursera - Cybersecurity Attack and Defense Fundamentals Specialization (by EC-Council)
-
收录时间:2023-12-17
文档个数:7
文档大小:6.1 GB
最近下载:2025-05-16
人气:7527
磁力链接
2. Network Defense Essentials (NDE).zip 2.2 GB
1. Ethical Hacking Essentials (EHE).zip 2.1 GB
3. Digital Forensics Essentials (DFE).zip 1.7 GB
0. Websites you may like/1. OneHack.us Premium Cracked Accounts-Tutorials-Guides-Articles Community Based Forum.url 377 Bytes
FreeCoursesOnline.me Download Udacity, Masterclass, Lynda, PHLearn, etc Free.url 290 Bytes
Content Info.txt 285 Bytes
0. Websites you may like/2. FTUApps.com Download Cracked Developers Applications For Free.url 239 Bytes
猜你喜欢:
FreeCoursesOnline
Me
Specialization
Cybersecurity
Coursera
EC
Fundamentals
Attack
Defense
Council
- 【影视】 [ DevCourseWeb.com ] CBTNuggets - (ISC)2 CC - Certified in Cybersecurity - (ISC)2 Certification Training
-
收录时间:2023-12-17
文档个数:68
文档大小:2.1 GB
最近下载:2025-05-16
人气:6852
磁力链接
~Get Your Files Here !/1. Understanding Information Assurance/1. Understanding Information Assurance - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 69.9 MB
~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/1. Power - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 65.3 MB
~Get Your Files Here !/7. Discussing Network Security Infrastructure/1. Network Segmentation - (ISC)² CC – Certified in Cybersecurity CBT Nuggets-1.mp4 58.2 MB
~Get Your Files Here !/8. Exploring Network Threats and Attacks/6. Firewalls - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 54.7 MB
~Get Your Files Here !/8. Exploring Network Threats and Attacks/3. Intrusion Detection Prevention Systems (IDSIPS) - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 54.0 MB
~Get Your Files Here !/5. Exploring Security Policies and Training/7. Security Awareness Training - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 52.0 MB
~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/3. Heating, Ventilation and Air Conditioning (HVAC) - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 48.1 MB
~Get Your Files Here !/9. Understanding Computer Networking/4. IP Addresses - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 47.5 MB
~Get Your Files Here !/6. Understanding Data Security and System Hardening/2. Types of Encryption - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 46.4 MB
~Get Your Files Here !/7. Discussing Network Security Infrastructure/7. The Cloud - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 45.7 MB
~Get Your Files Here !/8. Exploring Network Threats and Attacks/5. Vulnerability Scanning - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 45.5 MB
~Get Your Files Here !/9. Understanding Computer Networking/3. TCPIP Model - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 42.9 MB
~Get Your Files Here !/6. Understanding Data Security and System Hardening/7. Configuration Management - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 41.6 MB
~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/2. Data Centers and Closets - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 40.4 MB
~Get Your Files Here !/1. Understanding Information Assurance/2. Methods of Authentication - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 40.0 MB
~Get Your Files Here !/2. Discussing Risk Management, Controls, Ethics and Governance/4. Security Control Categories - (ISC)² CC – Certified in Cybersecurity CBT Nuggets-1.mp4 39.3 MB
~Get Your Files Here !/6. Understanding Data Security and System Hardening/3. Data Hashing with Encryption - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 38.3 MB
~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/5. Redundancy - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 38.2 MB
~Get Your Files Here !/3. Exploring BC, DR & IR Concepts/6. Incident Response - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 37.9 MB
~Get Your Files Here !/4. Reviewing Access Control Concepts/6. Types of Access Control - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 36.8 MB
猜你喜欢:
ISC
CBTNuggets
Training
Certification
CC
DevCourseWeb
Cybersecurity
com
Certified
- 【影视】 [ FreeCourseWeb.com ] CompTIA Cybersecurity Analyst + (CySA + ) (CS0-003) - 3 Incident Response and Management
-
收录时间:2023-12-17
文档个数:94
文档大小:348.1 MB
最近下载:2025-05-16
人气:5383
磁力链接
~Get Your Files Here !/05 - 4. Forensic Techniques/09 - Password forensics.mp4 19.8 MB
~Get Your Files Here !/05 - 4. Forensic Techniques/08 - Operating system analysis.mp4 15.5 MB
~Get Your Files Here !/05 - 4. Forensic Techniques/11 - Software forensics.mp4 15.2 MB
~Get Your Files Here !/05 - 4. Forensic Techniques/05 - File carving.mp4 13.1 MB
~Get Your Files Here !/05 - 4. Forensic Techniques/10 - Network forensics.mp4 11.3 MB
~Get Your Files Here !/02 - 1. Incident Response Programs/08 - Incident eradication and recovery.mp4 11.2 MB
~Get Your Files Here !/02 - 1. Incident Response Programs/01 - Build an incident response program.mp4 10.7 MB
~Get Your Files Here !/07 - 6. Disaster Recovery/01 - Disaster recovery.mp4 10.7 MB
~Get Your Files Here !/06 - 5. Business Continuity/03 - High availability and fault tolerance.mp4 10.4 MB
~Get Your Files Here !/04 - 3. Incident Investigation/01 - Logging security information.mp4 10.2 MB
~Get Your Files Here !/05 - 4. Forensic Techniques/04 - System and file forensics.mp4 10.0 MB
~Get Your Files Here !/05 - 4. Forensic Techniques/06 - Creating forensic images.mp4 10.0 MB
~Get Your Files Here !/03 - 2. Attack Frameworks/01 - MITRE ATT&CK.mp4 9.9 MB
~Get Your Files Here !/04 - 3. Incident Investigation/03 - Cloud audits and investigations.mp4 9.9 MB
~Get Your Files Here !/02 - 1. Incident Response Programs/10 - Post-incident activities.mp4 9.4 MB
~Get Your Files Here !/02 - 1. Incident Response Programs/04 - Incident identification.mp4 9.3 MB
~Get Your Files Here !/07 - 6. Disaster Recovery/04 - Disaster recovery sites.mp4 9.3 MB
~Get Your Files Here !/05 - 4. Forensic Techniques/15 - Ediscovery and evidence production.mp4 8.2 MB
~Get Your Files Here !/06 - 5. Business Continuity/02 - Business continuity controls.mp4 8.0 MB
~Get Your Files Here !/04 - 3. Incident Investigation/02 - Security information and event management.mp4 7.9 MB
猜你喜欢:
Management
Response
Cybersecurity
CySA
CS0
003
Incident
FreeCourseWeb
CompTIA
com
- 【影视】 [ DevCourseWeb.com ] Udemy - Modern Cybersecurity Fundamentals
-
收录时间:2023-12-17
文档个数:27
文档大小:2.3 GB
最近下载:2025-05-16
人气:2342
磁力链接
~Get Your Files Here !/2. History of Cybersecurity/1. History of Cybersecurity.mp4 478.1 MB
~Get Your Files Here !/3. Cybersecurity Risk Management/1. Cybersecurity Risk Management.mp4 265.3 MB
~Get Your Files Here !/13. The Future of Cybersecurity/1. The Future of Cybersecurity.mp4 186.8 MB
~Get Your Files Here !/7. Understanding Networks Part 3/1. Understanding Networks Part 3.mp4 176.6 MB
~Get Your Files Here !/11. Ransomware/1. Ransomware.mp4 159.6 MB
~Get Your Files Here !/8. Understanding Networks Part 4/1. Understanding Networks Part 4.mp4 158.3 MB
~Get Your Files Here !/12. Internet of Things (IoT)/1. Internet of Things (IoT).mp4 154.5 MB
~Get Your Files Here !/9. Domain Name System (DNS)/1. Domain Name System (DNS).mp4 145.9 MB
~Get Your Files Here !/5. Understanding Networks Part 1/1. Understanding Networks Part 1.mp4 137.5 MB
~Get Your Files Here !/4. Intrusion Detection/1. Intrusion Detection.mp4 136.3 MB
~Get Your Files Here !/6. Understanding Networks Part 2/1. Understanding Networks Part 2.mp4 126.6 MB
~Get Your Files Here !/10. Dynamic Host Configuration Protocol (DHCP)/1. Dynamic Host Configuration Protocol (DHCP).mp4 112.7 MB
~Get Your Files Here !/1. Introduction/1. Introduction.mp4 28.1 MB
~Get Your Files Here !/5. Understanding Networks Part 1/1.1 Understanding-Networks.pdf 3.5 MB
~Get Your Files Here !/6. Understanding Networks Part 2/1.1 Understanding-Networks.pdf 3.5 MB
~Get Your Files Here !/7. Understanding Networks Part 3/1.1 Understanding-Networks.pdf 3.5 MB
~Get Your Files Here !/8. Understanding Networks Part 4/1.1 Understanding-Networks.pdf 3.5 MB
~Get Your Files Here !/3. Cybersecurity Risk Management/1.1 Cybersecurity-Risk-Management.pdf 1.8 MB
~Get Your Files Here !/12. Internet of Things (IoT)/1.1 IoT.pdf 1.8 MB
~Get Your Files Here !/2. History of Cybersecurity/1.1 HISTORY-OF-CYBERSECURITY.pdf 1.7 MB
猜你喜欢:
Cybersecurity
Modern
Udemy
DevCourseWeb
Fundamentals
com
- 【影视】 The Absolute Beginners Guide to Cybersecurity
-
收录时间:2023-12-17
文档个数:185
文档大小:7.5 GB
最近下载:2025-05-16
人气:7723
磁力链接
Part 04 July 2023/Chapter 06 Conclusion/001. You Have Been HACKED - Now What.mp4 193.9 MB
Part 04 July 2023/Chapter 01 Introduction/002. Personal Cybersecurity - What I Do.mp4 193.1 MB
Part 01 December 2022/Chapter 07 Cyber Warfare and Cyber Attacks Against Companies/002. The Attack Against Estonia.mp4 187.3 MB
Part 01 December 2022/Chapter 05 Defenses/009. Password Management.mp4 133.9 MB
Part 03 June 2023/Chapter 03 Mobile Threats and Countermeasures/007. How to Use Malwarebytes.mp4 126.9 MB
Part 01 December 2022/Chapter 02 Hackers - Who Are They/002. What Is NOT Hacking.mp4 118.6 MB
Part 04 July 2023/Chapter 05 Mobile Security/003. Checking Default App Permissions - Android.mp4 115.6 MB
Part 03 June 2023/Chapter 02 Understanding Applications/007. Checking Default App Permissions - Android.mp4 115.4 MB
Part 02 December 2022/Chapter 01 Introduction/001. Welcome to the Course.mp4 115.3 MB
Part 04 July 2023/Chapter 01 Introduction/001. Welcome to the Course.mp4 106.5 MB
Part 01 December 2022/Chapter 07 Cyber Warfare and Cyber Attacks Against Companies/003. Stuxnet and the Attack Against Iran.mp4 105.1 MB
Part 03 June 2023/Chapter 04 Mobile Security Apps/002. How to Use NordVPN.mp4 101.4 MB
Part 02 December 2022/Chapter 07 Social Engineering - Scams, Cons, Tricks, and Fraud/003. Reconnaissance Methods.mp4 94.3 MB
Part 04 July 2023/Chapter 03 Personal Security/005. Protecting Yourself Against SIM Card Swap Fraud.mp4 93.5 MB
Part 01 December 2022/Chapter 02 Hackers - Who Are They/006. Social Engineering.mp4 89.9 MB
Part 01 December 2022/Chapter 06 Cyber Security at the Workplace/005. The Security Versus Ease of Access Paradox.mp4 88.6 MB
Part 01 December 2022/Chapter 06 Cyber Security at the Workplace/003. BYOD Management.mp4 87.6 MB
Part 04 July 2023/Chapter 05 Mobile Security/005. How to Identify Legit Apps.mp4 86.0 MB
Part 01 December 2022/Chapter 01 General Introduction to IT and Cyber Security/002. Difference Between Information Security and Cyber Security.mp4 84.6 MB
Part 03 June 2023/Chapter 02 Understanding Applications/003. How to Identify Legit Apps and Spot Fake Apps.mp4 83.4 MB
猜你喜欢:
Beginners
Cybersecurity
Guide
Absolute