为您索检到268条磁力链接,耗时0毫秒。
- 【影视】 [ WebToolTip.com ] Udemy - GenAI Cybersecurity - OWASP Top 10, MITRE ATLAS and API Attacks
-
收录时间:2025-05-09
文档个数:70
文档大小:1.6 GB
最近下载:2025-05-16
人气:288
磁力链接
~Get Your Files Here !/7 - MITRE ATLAS Mapping for LLM Attacks/2 -Mapping AI Threats with MITRE ATLAS OpenAI vs. DeepSeek Case Study.mp4 156.0 MB
~Get Your Files Here !/6 - LLM API Security Real-World Exploitation & Mitigation Demo with OLAMA/3 -Hands-On Demo Exploiting an Insecure Ollama API Setup.mp4 135.0 MB
~Get Your Files Here !/6 - LLM API Security Real-World Exploitation & Mitigation Demo with OLAMA/6 -Mitigating OLAMA API Risks with NGINX Authentication (Hands-On Demo).mp4 81.1 MB
~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/9 -How Self-Attention Builds Rich Contextual Understanding in Transformers.mp4 72.5 MB
~Get Your Files Here !/5 - OWASP Top 10 for LLMs Understanding AI-Specific Security Risks/2 -OWASP Top 10 Risks for LLMs + Case Study Mapping.mp4 52.7 MB
~Get Your Files Here !/8 - Hands-On Lab Exploiting AI Decisions in LLM APIs/2 -Lab Demo – Exploiting LLM APIs with Excessive Agency (PortSwigger).mp4 49.4 MB
~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/9 -Scenario 2 Deep Dive into LLM Attack Surfaces from the Provider Side.mp4 48.5 MB
~Get Your Files Here !/3 - Anatomy of an LLM System and Its Security Attack Surface/6 -LLM Processing Unit Explained Inference Handling, Prompt Cntrl & Runtime Logic.mp4 45.0 MB
~Get Your Files Here !/6 - LLM API Security Real-World Exploitation & Mitigation Demo with OLAMA/4 -Ollama in the Wild Real-World Exposure via Shodan + Developer Risk Behavior.mp4 44.9 MB
~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/11 -Inference and Log Data Exposure DeepSeek’s AI Leak Case Study.mp4 42.7 MB
~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/6 -Understanding Recurrent Neural Networks (RNNs) for Language Processing.mp4 40.8 MB
~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/10 -Training Data Poisoning Case Study How Microsoft Tay Was Manipulated on Twitter.mp4 37.5 MB
~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/11 -Summary of Transformer Innovations Key Concepts Behind LLMs.mp4 30.9 MB
~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/14 -Section 3 Wrap-Up LLM Attack Surface Lessons + What’s Next with OWASP Top 10.mp4 30.3 MB
~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/8 -Prompt Injection Demonstration How a $1 Chevy Tahoe Chatbot Reply Went Viral.mp4 29.8 MB
~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/7 -How Transformers and LLMs Revolutionized Language Processing.mp4 27.6 MB
~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/12 -LLM Model Exposure How Misconfigured Ollama APIs Opened the Door.mp4 27.5 MB
~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/3 -Where Large Language Models Fit in the Generative AI Landscape.mp4 26.8 MB
~Get Your Files Here !/6 - LLM API Security Real-World Exploitation & Mitigation Demo with OLAMA/7 -How One Misconfigured LLM API Triggers Multiple OWASP Risks.mp4 26.7 MB
~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/7 -Scenario 1 LLM Attack Surfaces in Organizations Using AI Models.mp4 26.5 MB
猜你喜欢:
10
WebToolTip
Cybersecurity
Top
OWASP
ATLAS
API
Attacks
MITRE
Udemy
- 【影视】 [ WebToolTip.com ] Udemy - Cybersecurity Fundamentals - A Practical Hands-On Course
-
收录时间:2025-05-09
文档个数:25
文档大小:1.5 GB
最近下载:2025-05-16
人气:245
磁力链接
~Get Your Files Here !/2 - Cybersecurity Fundamentals Practical Tutorials/1 -Cybersecurity Practical Learning Part 1.mp4 147.6 MB
~Get Your Files Here !/2 - Cybersecurity Fundamentals Practical Tutorials/2 -Cybersecurity Practical Learning Part 2.mp4 139.7 MB
~Get Your Files Here !/5 - Start Ethical Hacking Today/1 -How To Keep Your Laptops Secure And Safe.mp4 120.4 MB
~Get Your Files Here !/4 - Mastering Burpsuite/4 -Insecure Direct Object Reference (IDOR).mp4 120.1 MB
~Get Your Files Here !/1 - Introduction/1 -Lecture 1.pdf 92.9 MB
~Get Your Files Here !/2 - Cybersecurity Fundamentals Practical Tutorials/3 -Python for Cybersecurity Part 1.mp4 90.9 MB
~Get Your Files Here !/3 - Tools for Cybersecurity Practical Guide/3 -How To Install Python On Kali Linux.mp4 89.8 MB
~Get Your Files Here !/1 - Introduction/1 -Introduction.mp4 88.0 MB
~Get Your Files Here !/4 - Mastering Burpsuite/3 -Live Website Scan On Burpsuite.mp4 79.7 MB
~Get Your Files Here !/3 - Tools for Cybersecurity Practical Guide/1 -How to Download Kali Linux.mp4 74.9 MB
~Get Your Files Here !/5 - Start Ethical Hacking Today/2 -Spiderfoot Complete Tutorial.mp4 70.5 MB
~Get Your Files Here !/2 - Cybersecurity Fundamentals Practical Tutorials/4 -Python for Cybersecurity Part 2.mp4 70.0 MB
~Get Your Files Here !/1 - Introduction/2 -Setting Up Your Lab Environment (VirtualBox + Kali Linux + Windows VM).mp4 61.6 MB
~Get Your Files Here !/3 - Tools for Cybersecurity Practical Guide/5 -How To Download And Use Cherry Tree.mp4 45.4 MB
~Get Your Files Here !/5 - Start Ethical Hacking Today/4 -The Best Website For Cybersecurity Experts.mp4 45.3 MB
~Get Your Files Here !/4 - Mastering Burpsuite/1 -How To Download And Install Burpsuite.mp4 41.8 MB
~Get Your Files Here !/3 - Tools for Cybersecurity Practical Guide/4 -How To Install Pycharm on Kali Linux.mp4 33.9 MB
~Get Your Files Here !/4 - Mastering Burpsuite/2 -Website Scan Part 1.mp4 32.7 MB
~Get Your Files Here !/3 - Tools for Cybersecurity Practical Guide/2 -How To Create Txt File In Kali Linux.mp4 18.8 MB
~Get Your Files Here !/5 - Start Ethical Hacking Today/3 -Haveibeenpawned.mp4 15.8 MB
猜你喜欢:
WebToolTip
Course
Cybersecurity
Udemy
Practical
Fundamentals
Hands
com
- 【影视】 [ WebToolTip.com ] Udemy - Building Cybersecurity Tools with AI (ChatGPT and DeepSeek)
-
收录时间:2025-05-08
文档个数:13
文档大小:339.2 MB
最近下载:2025-05-16
人气:889
磁力链接
~Get Your Files Here !/5 - PROJECTS/3 -Deep Web Footprint Tracker.mp4 82.9 MB
~Get Your Files Here !/5 - PROJECTS/1 -Suspicious Process Detector.mp4 76.8 MB
~Get Your Files Here !/6 - Deploying kivy app to Windows Platform/1 -Deploying kivy to windows.mp4 51.6 MB
~Get Your Files Here !/5 - PROJECTS/2 -Ransomware Scanner app.mp4 36.6 MB
~Get Your Files Here !/3 - Prompt Engineering For Cybersecurity and Gui Develepment/2 -Prompt Engineering 2.mp4 18.4 MB
~Get Your Files Here !/2 - Setting up the Environment/1 -Create main.py and kivy installation.mp4 16.3 MB
~Get Your Files Here !/2 - Setting up the Environment/2 -Testing kivy environment.mp4 14.9 MB
~Get Your Files Here !/1 - Introduction/1 -Introduction.mp4 14.7 MB
~Get Your Files Here !/3 - Prompt Engineering For Cybersecurity and Gui Develepment/1 -Prompt Engineering 1.mp4 12.1 MB
~Get Your Files Here !/4 - Debugging AI Generated code/2 -installing MISSING module Error (Demo).mp4 8.4 MB
~Get Your Files Here !/4 - Debugging AI Generated code/1 -Common Errors.mp4 6.6 MB
Get Bonus Downloads Here.url 180 Bytes
~Get Your Files Here !/Bonus Resources.txt 70 Bytes
猜你喜欢:
Building
WebToolTip
Cybersecurity
com
DeepSeek
Udemy
AI
ChatGPT
Tools
- 【影视】 [ FreeCourseWeb.com ] Udemy - Cybersecurity defenses with GenAI
-
收录时间:2025-05-07
文档个数:96
文档大小:856.1 MB
最近下载:2025-05-15
人气:284
磁力链接
~Get Your Files Here !/2 - Introduction to GenAI in Cybersecurity/3 -Key differences between traditional AI and GenAI.mp4 64.1 MB
~Get Your Files Here !/3 - Understanding Microsoft Security Copilot/2 -How Security Copilot works.mp4 41.4 MB
~Get Your Files Here !/1 - Introduction/1 -About course.mp4 36.3 MB
~Get Your Files Here !/3 - Understanding Microsoft Security Copilot/7 -Demo - Option 2 - Configure Microsoft Security Copilot.mp4 29.6 MB
~Get Your Files Here !/3 - Understanding Microsoft Security Copilot/4 -Integration with Microsoft Defender XDR & Sentinel.mp4 28.7 MB
~Get Your Files Here !/3 - Understanding Microsoft Security Copilot/1 -Architecture & Components.mp4 24.9 MB
~Get Your Files Here !/1 - Introduction/3 -Additional courses that can help you.mp4 22.8 MB
~Get Your Files Here !/6 - GenAI for Proactive Threat Hunting/2 -Creating Hunting Queries Using Natural Language.mp4 22.2 MB
~Get Your Files Here !/9 - Building an AI-Powered Security Strategy/1 -Future-Ready AI-Driven SOC Vision.mp4 21.5 MB
~Get Your Files Here !/2 - Introduction to GenAI in Cybersecurity/2 -Evolution of AI in Cybersecurity.mp4 21.4 MB
~Get Your Files Here !/5 - Automating Security Operations with GenAI/3 -Case study Automated Incident Reporting.mp4 21.0 MB
~Get Your Files Here !/7 - Advanced Security Reporting with GenAI/3 -Effective Communication of Security Posture.mp4 20.5 MB
~Get Your Files Here !/9 - Building an AI-Powered Security Strategy/3 -Trends and Innovations in AI Security.mp4 20.3 MB
~Get Your Files Here !/2 - Introduction to GenAI in Cybersecurity/4 -Introducing Microsoft Security Copilot.mp4 19.8 MB
~Get Your Files Here !/6 - GenAI for Proactive Threat Hunting/3 -Integrating Threat Hunting with Microsoft Sentinel.mp4 19.4 MB
~Get Your Files Here !/7 - Advanced Security Reporting with GenAI/1 -Creating Executive-Level Reports.mp4 19.2 MB
~Get Your Files Here !/10 - Course conclusion/3 -Certification and Career Guidance.mp4 19.1 MB
~Get Your Files Here !/1 - Introduction/5 -Important Note and considerations.mp4 18.6 MB
~Get Your Files Here !/4 - GenAI for Threat Detection and Response/2 -Automating Threat Intelligence with GenAI.mp4 18.4 MB
~Get Your Files Here !/9 - Building an AI-Powered Security Strategy/2 -Enhancing Existing Tools with Copilot.mp4 18.1 MB
猜你喜欢:
defenses
Cybersecurity
Udemy
FreeCourseWeb
com
GenAI
- 【影视】 [ FreeCourseWeb.com ] Udemy - Cybersecurity Solution Architecture 101
-
收录时间:2025-05-06
文档个数:15
文档大小:1.3 GB
最近下载:2025-05-15
人气:75
磁力链接
~Get Your Files Here !/2 -Fundamental Concepts & Terminology.mp4 157.1 MB
~Get Your Files Here !/6 -Endpoint & Device Security.mp4 123.5 MB
~Get Your Files Here !/5 -Identity & Access Management (IAM) Basics.mp4 111.4 MB
~Get Your Files Here !/12 -Security Operations & Incident Response Overview.mp4 104.7 MB
~Get Your Files Here !/7 -Infrastructure Vulnerability Management.mp4 99.1 MB
~Get Your Files Here !/13 -Wrap-Up & Preparation for 201 Course.mp4 97.2 MB
~Get Your Files Here !/10 -Secure Application Foundations.mp4 91.1 MB
~Get Your Files Here !/3 -The Threat Landscape.mp4 90.2 MB
~Get Your Files Here !/1 -Introduction to Cybersecurity & the Role of a Cybersecurity Solution Architect.mp4 86.2 MB
~Get Your Files Here !/8 -Introduction to Cryptography.mp4 85.8 MB
~Get Your Files Here !/9 -Cloud Security Essentials.mp4 83.0 MB
~Get Your Files Here !/11 -Basic Governance, Risk, & Compliance (GRC).mp4 74.4 MB
~Get Your Files Here !/4 -Networking & Network Security Fundamentals.mp4 70.6 MB
Get Bonus Downloads Here.url 183 Bytes
~Get Your Files Here !/Bonus Resources.txt 70 Bytes
猜你喜欢:
Cybersecurity
Solution
Udemy
FreeCourseWeb
Architecture
101
com
- 【影视】 [ FreeCourseWeb.com ] Udemy - Cybersecurity Solution Architecture 201
-
收录时间:2025-05-01
文档个数:14
文档大小:1.4 GB
最近下载:2025-05-15
人气:830
磁力链接
~Get Your Files Here !/10 -Advanced Governance, Risk, & Compliance (GRC).mp4 160.7 MB
~Get Your Files Here !/11 -Advanced Incident Response & Digital Forensics.mp4 156.8 MB
~Get Your Files Here !/6 -Advanced Identity & Access Management (IAM).mp4 133.3 MB
~Get Your Files Here !/4 -Infrastructure as Code (IaC) & Automated Security.mp4 133.1 MB
~Get Your Files Here !/13 -Wrap-Up & Preparation for 301.mp4 122.8 MB
~Get Your Files Here !/8 -Cloud & Hybrid Environment Security Advanced Topics.mp4 118.3 MB
~Get Your Files Here !/9 -Security Operations, Threat Intelligence & Threat Hunting.mp4 107.5 MB
~Get Your Files Here !/12 -In depth enterprise cybersecurity best practices, use cases, and examples.mp4 105.3 MB
~Get Your Files Here !/2 -Advanced Threat Modeling.mp4 100.1 MB
~Get Your Files Here !/7 -Data Protection & Privacy by Design.mp4 97.5 MB
~Get Your Files Here !/3 -Zero Trust Architecture.mp4 97.1 MB
~Get Your Files Here !/1 -Course Introduction & 101 Recap.mp4 69.3 MB
Get Bonus Downloads Here.url 183 Bytes
~Get Your Files Here !/Bonus Resources.txt 70 Bytes
猜你喜欢:
201
Cybersecurity
Solution
Udemy
FreeCourseWeb
Architecture
com
- 【影视】 [ WebToolTip.com ] Udemy - Implement Version 2 Of Nist Cybersecurity Framework
-
收录时间:2025-04-06
文档个数:45
文档大小:1.9 GB
最近下载:2025-05-16
人气:944
磁力链接
~Get Your Files Here !/1 - Introduction to the NIST Cyber Security Framework/2 - Business Value of Framework.mp4 147.0 MB
~Get Your Files Here !/1 - Introduction to the NIST Cyber Security Framework/1 - Introduction.mp4 144.2 MB
~Get Your Files Here !/1 - Introduction to the NIST Cyber Security Framework/3 - Who Can Use The Framework.mp4 139.6 MB
~Get Your Files Here !/5 - Implementing Phase Two of the CRMAP/34 - Business Value Analysis.mp4 106.8 MB
~Get Your Files Here !/4 - Implementing Phase One of the CRMAP/28 - Conduct Interviews.mp4 72.2 MB
~Get Your Files Here !/7 - Conclusion/43 - BONUS Conclusion.mp4 72.1 MB
~Get Your Files Here !/5 - Implementing Phase Two of the CRMAP/32 - Close Your Gaps.mp4 70.9 MB
~Get Your Files Here !/4 - Implementing Phase One of the CRMAP/29 - Compile and Analyze Scores.mp4 68.2 MB
~Get Your Files Here !/6 - Implementing Phase Three of the CRMAP/41 - Quarterly Reviews.mp4 65.1 MB
~Get Your Files Here !/5 - Implementing Phase Two of the CRMAP/36 - Internal Marketing.mp4 64.3 MB
~Get Your Files Here !/4 - Implementing Phase One of the CRMAP/24 - Get BuyIn.mp4 62.7 MB
~Get Your Files Here !/3 - Real World Case Studies/17 - Cimpress Promotional Products.mp4 61.5 MB
~Get Your Files Here !/2 - Understanding the NIST Cybersecurity Framework/9 - Govern Function and Activities.mp4 59.1 MB
~Get Your Files Here !/6 - Implementing Phase Three of the CRMAP/39 - Phase Three Overview.mp4 50.6 MB
~Get Your Files Here !/6 - Implementing Phase Three of the CRMAP/40 - Monthly Checkins.mp4 46.0 MB
~Get Your Files Here !/2 - Understanding the NIST Cybersecurity Framework/11 - Protect Function and Activities.mp4 41.4 MB
~Get Your Files Here !/4 - Implementing Phase One of the CRMAP/26 - Generate Questionnaire.mp4 40.7 MB
~Get Your Files Here !/1 - Introduction to the NIST Cyber Security Framework/4 - Understanding the Core.mp4 38.5 MB
~Get Your Files Here !/3 - Real World Case Studies/18 - University of Kansas Medical Center.mp4 38.0 MB
~Get Your Files Here !/5 - Implementing Phase Two of the CRMAP/37 - External Marketing.mp4 36.4 MB
猜你喜欢:
WebToolTip
Cybersecurity
Udemy
Framework
Version
Implement
com
Nist
- 【影视】 [ WebToolTip.com ] Udemy - Essential Cybersecurity For Everyone - Stay Safe Online
-
收录时间:2025-03-13
文档个数:19
文档大小:2.1 GB
最近下载:2025-05-15
人气:516
磁力链接
~Get Your Files Here !/4 - Creating Strong Passwords and Enhancing Overall Security/9 - Password Security.mp4 250.4 MB
~Get Your Files Here !/11 - IoT Security/16 - Securing Smart Devices in the Digital Age.mp4 235.4 MB
~Get Your Files Here !/7 - Data Backup and Recovery Essentials/12 - Safeguarding Your Data Backup and Restoration.mp4 209.9 MB
~Get Your Files Here !/9 - Cybersecurity for Travelers/14 - Staying Secure While Traveling Online.mp4 191.8 MB
~Get Your Files Here !/6 - Email Security Essentials/11 - Protecting Your Email from Threats.mp4 175.4 MB
~Get Your Files Here !/10 - Social Media Security/15 - Protecting Your Privacy on Social Media.mp4 172.2 MB
~Get Your Files Here !/5 - Safe Internet Browsing/10 - Safe Internet Browsing.mp4 126.9 MB
~Get Your Files Here !/12 - Steps to Take After a Cybersecurity Breach/17 - What to Do After a Cybersecurity Breach.mp4 116.9 MB
~Get Your Files Here !/1 - Introduction Essential Cybersecurity for everyone stay safe online/1 - Introduction.mp4 107.3 MB
~Get Your Files Here !/2 - Understanding Cyber Threats/2 - Understanding Cyber threats.mp4 98.9 MB
~Get Your Files Here !/8 - Securing Your Online Accounts/13 - Best Practices for Protecting Online Accounts.mp4 94.5 MB
~Get Your Files Here !/3 - Protecting Personal Devices/3 - Introduction to protecting personal devices.mp4 76.2 MB
~Get Your Files Here !/3 - Protecting Personal Devices/6 - Keeping Software Operating Systems Updated Strengthening Your Digital Defense.mp4 58.9 MB
~Get Your Files Here !/3 - Protecting Personal Devices/4 - Securing Computers and Laptops.mp4 43.3 MB
~Get Your Files Here !/3 - Protecting Personal Devices/7 - Configuring Firewalls Securing Your Devices and Home Network.mp4 36.6 MB
~Get Your Files Here !/3 - Protecting Personal Devices/5 - Securing Smartphones and Laptops.mp4 30.1 MB
~Get Your Files Here !/3 - Protecting Personal Devices/8 - Ensuring Safe and Secure WiFi Connections.mp4 27.5 MB
Get Bonus Downloads Here.url 180 Bytes
~Get Your Files Here !/Bonus Resources.txt 70 Bytes
猜你喜欢:
Everyone
WebToolTip
Cybersecurity
Safe
Udemy
Online
Stay
com
Essential
- 【影视】 [ WebToolTip.com ] Udemy - ISACA Cybersecurity Fundamentals - Complete Training Course
-
收录时间:2025-03-07
文档个数:45
文档大小:858.9 MB
最近下载:2025-05-16
人气:2781
磁力链接
~Get Your Files Here !/2 - Types of Security/4 -Cybersecurity.mp4 38.9 MB
~Get Your Files Here !/3 - Governance, Risk Management and Compliance/5 -Risk Analysis Approaches.mp4 36.9 MB
~Get Your Files Here !/4 - Common Types of Malware/6 -Trojan Horses.mp4 34.2 MB
~Get Your Files Here !/4 - Common Types of Malware/5 -Ransomware.mp4 34.1 MB
~Get Your Files Here !/4 - Common Types of Malware/3 -Worms.mp4 33.9 MB
~Get Your Files Here !/5 - Security Controls/2 -Control Functions and Types.mp4 32.8 MB
~Get Your Files Here !/4 - Common Types of Malware/2 -Viruses.mp4 31.7 MB
~Get Your Files Here !/2 - Types of Security/5 -Physical Security.mp4 31.6 MB
~Get Your Files Here !/3 - Governance, Risk Management and Compliance/4 -Risk Governance.mp4 29.0 MB
~Get Your Files Here !/4 - Common Types of Malware/8 -Adware.mp4 28.9 MB
~Get Your Files Here !/6 - OWASP Top 10/11 -Server-Side Request Forgery.mp4 28.7 MB
~Get Your Files Here !/6 - OWASP Top 10/9 -Software and Data Integrity Failures.mp4 28.1 MB
~Get Your Files Here !/6 - OWASP Top 10/10 -Security Logging and Monitoring Failures.mp4 28.0 MB
~Get Your Files Here !/6 - OWASP Top 10/3 -Cryptographic Failures.mp4 27.0 MB
~Get Your Files Here !/6 - OWASP Top 10/7 -Vulnerable and Outdated Components.mp4 27.0 MB
~Get Your Files Here !/1 - Introduction/3 -Integrity.mp4 26.2 MB
~Get Your Files Here !/4 - Common Types of Malware/7 -Rootkit.mp4 25.7 MB
~Get Your Files Here !/2 - Types of Security/3 -Information Security.mp4 23.5 MB
~Get Your Files Here !/1 - Introduction/4 -Availability.mp4 22.1 MB
~Get Your Files Here !/4 - Common Types of Malware/4 -Keyloggers.mp4 21.6 MB
猜你喜欢:
Training
WebToolTip
Course
Cybersecurity
com
Udemy
Fundamentals
ISACA
Complete
- 【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity Freelancer - Become A Free Agent In 2025
-
收录时间:2025-02-24
文档个数:12
文档大小:1.6 GB
最近下载:2025-05-16
人气:1607
磁力链接
~Get Your Files Here !/3 - Pricing Your Services Creating Your Service Package/4 - Pricing Your Cybsersecurity Consultancy Services.mp4 433.8 MB
~Get Your Files Here !/2 - Becoming A Cybersecurity Enterpreneur Establishing Your Product Market Fit/3 - Establishing Your Product Market Fit.mp4 380.4 MB
~Get Your Files Here !/3 - Pricing Your Services Creating Your Service Package/5 - Creating Your Service Package.mp4 365.0 MB
~Get Your Files Here !/4 - Perfect Elevator Pitch Market Yourself To Sell Your Business/8 - Earn Your Expert Status To Sell.mp4 100.4 MB
~Get Your Files Here !/6 - Course Conclusion/10 - Course Outro.mp4 86.7 MB
~Get Your Files Here !/4 - Perfect Elevator Pitch Market Yourself To Sell Your Business/7 - The Difference Between Marketing Selling.mp4 75.1 MB
~Get Your Files Here !/1 - Course Introduction/1 - Course Introduction.mp4 66.6 MB
~Get Your Files Here !/4 - Perfect Elevator Pitch Market Yourself To Sell Your Business/6 - Perfect Your Elevator Pitch.mp4 42.1 MB
~Get Your Files Here !/5 - Course Project/9 - Project Video.mp4 39.8 MB
~Get Your Files Here !/2 - Becoming A Cybersecurity Enterpreneur Establishing Your Product Market Fit/2 - Becoming A Cybersecurity Entrepreneur.mp4 32.8 MB
Get Bonus Downloads Here.url 182 Bytes
~Get Your Files Here !/Bonus Resources.txt 70 Bytes
猜你喜欢:
2025
Cybersecurity
Free
Udemy
DevCourseWeb
Freelancer
Agent
Become
com
- 【影视】 [ FreeCourseWeb.com ] Linkedin - Cybersecurity For Musicians, Producers, And Studios
-
收录时间:2025-02-24
文档个数:17
文档大小:1.2 GB
最近下载:2025-05-15
人气:673
磁力链接
~Get Your Files Here !/4 - Leveraging Technology for IP Protection/11 - Antipiracy software and techniques Royalty Management.mp4 173.2 MB
~Get Your Files Here !/4 - Leveraging Technology for IP Protection/8 - Using blockchain for music rights management.mp4 123.5 MB
~Get Your Files Here !/4 - Leveraging Technology for IP Protection/9 - Antipiracy software and techniques AI Protection Content ID Watermarking.mp4 112.9 MB
~Get Your Files Here !/1 - Introduction/1 - Welcome and introduction.mp4 101.3 MB
~Get Your Files Here !/4 - Leveraging Technology for IP Protection/10 - Antipiracy software and techniques Copyright PROs.mp4 95.2 MB
~Get Your Files Here !/4 - Leveraging Technology for IP Protection/13 - Antipiracy software and techniques Direct Fan Engagement.mp4 93.6 MB
~Get Your Files Here !/2 - Protecting Digital Assets/4 - Tools for secure data storage and sharing.mp4 70.3 MB
~Get Your Files Here !/5 - Action Plan for Musicians and Businesses/14 - Building a cybersecurity strategy.mp4 68.4 MB
~Get Your Files Here !/2 - Protecting Digital Assets/5 - Backup regularly.mp4 67.4 MB
~Get Your Files Here !/4 - Leveraging Technology for IP Protection/12 - Antipiracy software and techniques Secure Distribution Platforms.mp4 57.2 MB
~Get Your Files Here !/3 - Secure Music Streaming and Distribution/7 - Risks and best practices in streaming distribution platforms and sharing music.mp4 54.4 MB
~Get Your Files Here !/2 - Protecting Digital Assets/3 - Steps to safeguard recordings intellectual property and creative works.mp4 49.6 MB
~Get Your Files Here !/6 - Conclusion and Wrap Up/15 - Conclusion.mp4 48.1 MB
~Get Your Files Here !/2 - Protecting Digital Assets/6 - Access control.mp4 35.3 MB
~Get Your Files Here !/1 - Introduction/2 - Understanding Cybersecurity Threats in Music.mp4 25.4 MB
Get Bonus Downloads Here.url 183 Bytes
~Get Your Files Here !/Bonus Resources.txt 70 Bytes
猜你喜欢:
Studios
Cybersecurity
Linkedin
Producers
Musicians
FreeCourseWeb
com
- 【影视】 [ FreeCourseWeb.com ] AI Cybersecurity with DeepSeek R1 - Protect Your Digital Life
-
收录时间:2025-02-23
文档个数:25
文档大小:363.3 MB
最近下载:2025-05-16
人气:1236
磁力链接
~Get Your Files Here !/5 - Digital Forensics & Investigations/2 -Analyzing Suspicious Software.mp4 46.2 MB
~Get Your Files Here !/4 - OSINT – How Scammers Gather Your Data/3 -Romance Scams How They Manipulate Victims.mp4 43.4 MB
~Get Your Files Here !/1 - Introduction to AI and Cybersecurity/1 -What Are Artificial Intelligence & Cybersecurity.mp4 37.4 MB
~Get Your Files Here !/3 - Ethical Hacking Real-World Demonstrations/3 -Hacking with Advanced Malware A Demonstration.mp4 27.7 MB
~Get Your Files Here !/7 - Final Thoughts & Cybersecurity Mindset/1 -Psychological Tricks Hackers Use & How to Avoid Scams.mp4 26.1 MB
~Get Your Files Here !/6 - Leveraging AI for Profit and Cybersecurity/1 -Qwen 2.5 AI Video Generation.mp4 25.8 MB
~Get Your Files Here !/3 - Ethical Hacking Real-World Demonstrations/2 -Why Do Experts Say Don't Click the Link.mp4 23.4 MB
~Get Your Files Here !/4 - OSINT – How Scammers Gather Your Data/1 -How Scammers Steal Your Personal Data.mp4 22.6 MB
~Get Your Files Here !/4 - OSINT – How Scammers Gather Your Data/2 -Job Scams Be Careful Where You Apply.mp4 19.7 MB
~Get Your Files Here !/4 - OSINT – How Scammers Gather Your Data/4 -OSINT Tools SearchPeopleFree, WhitePages.mp4 15.5 MB
~Get Your Files Here !/5 - Digital Forensics & Investigations/3 -Investigating Malicious Links.mp4 13.4 MB
~Get Your Files Here !/5 - Digital Forensics & Investigations/4 -Verifying Email Sources for Cyber Threats.mp4 10.8 MB
~Get Your Files Here !/3 - Ethical Hacking Real-World Demonstrations/4 -Key Takeaways & How to Protect Yourself.mp4 10.7 MB
~Get Your Files Here !/3 - Ethical Hacking Real-World Demonstrations/1 -Advanced Phishing Attacks How They Work.mp4 9.4 MB
~Get Your Files Here !/1 - Introduction to AI and Cybersecurity/2 -Who Is This Course For.mp4 8.7 MB
~Get Your Files Here !/5 - Digital Forensics & Investigations/1 -Introduction to Digital Forensics.mp4 8.0 MB
~Get Your Files Here !/2 - Cybersecurity Myths vs. Reality/2 -Why Antivirus Alone Won't Keep You Safe.mp4 7.9 MB
~Get Your Files Here !/2 - Cybersecurity Myths vs. Reality/1 -What Are the Risks of Downloading Unknown Apps.mp4 6.7 MB
~Get Your Files Here !/6 - Leveraging AI for Profit and Cybersecurity/2 - Use Google Ai studio to generate script for a video.html 11.3 kB
~Get Your Files Here !/6 - Leveraging AI for Profit and Cybersecurity/2 - Whisper Free Audio Transcription for Security Experts.html 5.3 kB
猜你喜欢:
Protect
R1
AI
DeepSeek
Life
Cybersecurity
FreeCourseWeb
Digital
com
Your
- 【影视】 CBTNuggets - Microsoft Certified Cybersecurity Architect Expert (SC-100) Online Training 2023-2
-
收录时间:2025-02-15
文档个数:68
文档大小:2.5 GB
最近下载:2025-05-12
人气:259
磁力链接
2. Translating Security Requirements/6. Azure Security Benchmark - Microsoft Certified Cybersecurity-1.mp4 113.5 MB
3. Designing Security Strategies/2. Hybrid Environmental Security Strategies - Microsoft Certifi.mp4 63.8 MB
10. Design a security strategy for data and applications/1. Specify Priorities for Mitigating Threats to Apps - Microsof-1.mp4 62.3 MB
6. Designing a Regulatory Compliance Strategy/4. Implementing Azure Policy - Microsoft Certified Cybersecurit.mp4 59.0 MB
7. Evaluating and Managing Security Postures/6. Mitigating Identified Risks - Microsoft Certified Cybersecur-1.mp4 53.6 MB
3. Designing Security Strategies/4. Traffic Filtering and Segmentation Strategies - Microsoft Ce-1.mp4 53.4 MB
10. Design a security strategy for data and applications/4. Priorities For Mitigating Threats To Data - Microsoft Certif-1.mp4 53.4 MB
3. Designing Security Strategies/5. Azure Best Practices for Network Security - Microsoft Certif-1.mp4 52.2 MB
1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/5. Hybrid Infrastructure - Microsoft Certified Cybersecurity Ar-1.mp4 50.4 MB
6. Designing a Regulatory Compliance Strategy/6. Translating Privacy Requirements - Microsoft Certified Cyber.mp4 49.7 MB
9. Designing a Strategy for Securing SaaS, PaaS, and IaaS Services/1. Security Baselines for SaaS, PaaS, and IaaS services - Micro.mp4 48.3 MB
2. Translating Security Requirements/3. Translating Business Goals into Security Requirements - Micr.mp4 47.9 MB
2. Translating Security Requirements/7. Securing Privileged Access Using RaMP - Microsoft Certified -1.mp4 47.8 MB
1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/2. Security Operations - Microsoft Certified Cybersecurity Arch-1.mp4 47.0 MB
4. Designing a Security Operations Strategy/5. SIEMSOAR Strategy - Microsoft Certified Cybersecurity Archit.mp4 46.3 MB
2. Translating Security Requirements/2. Translating Requirements - Microsoft Certified Cybersecurity.mp4 46.2 MB
10. Design a security strategy for data and applications/3. Security Strategy for Applications and APIs - Microsoft Cert-1.mp4 44.6 MB
5. Designing an Identity Security Strategy/1. Strategy for Access to Cloud Resources - Microsoft Certified.mp4 43.0 MB
7. Evaluating and Managing Security Postures/4. Designing Security for an Azure Landing Zone - Microsoft Cer.mp4 42.8 MB
4. Designing a Security Operations Strategy/3. Logging and Auditing Strategy - Microsoft Certified Cybersec.mp4 42.3 MB
猜你喜欢:
CBTNuggets
Training
Expert
Cybersecurity
2023
Architect
Online
SC
100
Microsoft
- 【影视】 Cybersecurity Closer Look Labs
-
收录时间:2025-02-05
文档个数:26
文档大小:502.3 MB
最近下载:2025-05-15
人气:1599
磁力链接
004. 03 00 Digital Certificates.mp4 46.0 MB
019. 18 00 Risk Terminology.mp4 45.9 MB
020. 19 00 SSL and TLS Packet Capture.mp4 35.4 MB
013. 12 00 Powershell.mp4 29.1 MB
021. 20 00 Star and Simple Properties.mp4 27.5 MB
023. 22 00 Wireless Heat Maps.mp4 26.8 MB
015. 14 00 Pwned Passwords.mp4 26.6 MB
007. 06 00 IPv6 Addressing.mp4 23.9 MB
008. 07 00 Log Files.mp4 21.7 MB
012. 11 00 Policies and Standards.mp4 21.3 MB
010. 09 00 Passive Reconnaissance.mp4 19.3 MB
024. 23 00 ZenMap.mp4 18.2 MB
006. 05 00 Honeypots.mp4 18.0 MB
009. 08 00 Malware Analysis.mp4 17.7 MB
002. 01 00 Cloud Controls.mp4 17.3 MB
016. 15 00 Quantitative Risk Analysis.mp4 14.3 MB
003. 02 00 Constructing Error Messages.mp4 13.8 MB
017. 16 00 RAID.mp4 11.8 MB
025. 24 00 Zero-day Vulnerabilities.mp4 11.3 MB
005. 04 00 Hashing and HMACS.mp4 10.6 MB
猜你喜欢:
Cybersecurity
Closer
Look
Labs
- 【影视】 Mastering Cybersecurity with Python - From Basics to Advanced Defense
-
收录时间:2025-01-27
文档个数:160
文档大小:1.5 GB
最近下载:2025-05-15
人气:1460
磁力链接
Chapter 01 Introduction/001. Introduction.mp4 51.5 MB
Chapter 10 Mini Project - File Encryption & Decryption Tool/004. Task 3 - Adding the User Interface.mp4 51.0 MB
Chapter 12 Python Project - Build an Extensive Authentication System and Password Checker/005. Part 4 - Adding the Password Strength Checker Tool.mp4 50.0 MB
Chapter 04 Control Flow & Loops/008. Programming Challenge.mp4 43.8 MB
Chapter 12 Python Project - Build an Extensive Authentication System and Password Checker/007. Part 6 - Adding the Audit Tool.mp4 39.5 MB
Chapter 06 Data Structures/008. Programming Challenge Part 2 - Dictionaries & Loops.mp4 36.7 MB
Chapter 11 Object-Oriented Programming (OOP)/003. Creating a Basic Class.mp4 35.4 MB
Chapter 04 Control Flow & Loops/007. The BREAK Statement.mp4 34.5 MB
Chapter 12 Python Project - Build an Extensive Authentication System and Password Checker/006. Part 5 - Hashing the User Passwords.mp4 33.6 MB
Chapter 12 Python Project - Build an Extensive Authentication System and Password Checker/009. Part 8 - Adding the Post Login Menu.mp4 32.5 MB
Chapter 07 Mini Project - Build a Basic User Authentication System/004. Step 3 - Build the Authentication System.mp4 31.8 MB
Chapter 10 Mini Project - File Encryption & Decryption Tool/003. Task 2 - Creating the Encryption & Decryption Keys.mp4 28.7 MB
Chapter 04 Control Flow & Loops/003. IF ELSE Statements.mp4 27.4 MB
Chapter 07 Mini Project - Build a Basic User Authentication System/003. Step 2 - Build the Login Function.mp4 26.9 MB
Chapter 09 Libraries & Modules/007. Working with an External Library.mp4 26.6 MB
Chapter 02 Variables & Data Types/002. Working with Strings.mp4 26.0 MB
Chapter 12 Python Project - Build an Extensive Authentication System and Password Checker/001. Final Project Preview.mp4 26.0 MB
Chapter 01 Introduction/002. Important Note about Replit.mp4 23.5 MB
Chapter 12 Python Project - Build an Extensive Authentication System and Password Checker/008. Part 7 - Adding the View Logs Function.mp4 23.0 MB
Chapter 04 Control Flow & Loops/009. Try & Except Error Handling.mp4 22.6 MB
猜你喜欢:
Basics
Cybersecurity
Python
Defense
Mastering
Advanced
- 【压缩文件】 [CourserHub.com] Coursera - IT Fundamentals for Cybersecurity Specialization
-
收录时间:2025-01-06
文档个数:2
文档大小:1.5 GB
最近下载:2025-04-26
人气:91
磁力链接
[CourserHub.com] Coursera - IT Fundamentals for Cybersecurity Specialization.part1.rar 1.1 GB
[CourserHub.com] Coursera - IT Fundamentals for Cybersecurity Specialization.part2.rar 403.0 MB
猜你喜欢:
Specialization
Fundamentals
Coursera
Cybersecurity
com
CourserHub
- 【影视】 Coursera - IBM and ISC2 Cybersecurity Specialist Professional Certificate 2024
-
收录时间:2025-01-05
文档个数:1166
文档大小:3.6 GB
最近下载:2025-05-15
人气:469
磁力链接
Coursera - Introduction to Cloud Computing 2024-4/05_cloud-security-monitoring-case-studies-jobs/02_case-studies-and-jobs/01_case-studies-in-different-industry-verticals.mp4 64.0 MB
Coursera - Introduction to Cybersecurity Careers 2024-4/04_final-project-and-assessment/02_course-wrap-up/03_cybersecurity-career-faq.mp4 62.1 MB
Coursera - Introduction to Cloud Computing 2024-4/04_emergent-trends-and-practices/02_cloud-native-applications-devops-and-application-modernization/04_application-modernization.mp4 54.2 MB
Coursera - Introduction to Cloud Computing 2024-4/03_components-of-cloud-computing/01_cloud-infrastructure/06_containers.mp4 45.8 MB
Coursera - Introduction to Cloud Computing 2024-4/04_emergent-trends-and-practices/01_hybrid-multi-cloud-microservices-and-serverless/01_hybrid-multi-cloud.mp4 40.6 MB
Coursera - Introduction to Cloud Computing 2024-4/02_cloud-computing-models/02_deployment-models/03_hybrid-cloud.mp4 39.0 MB
Coursera - Introduction to Cybersecurity Careers 2024-4/04_final-project-and-assessment/02_course-wrap-up/01_landing-your-first-job-in-cybersecurity.mp4 30.6 MB
Coursera - Introduction to Cloud Computing 2024-4/01_overview-of-cloud-computing/04_emerging-technologies-accelerated-by-cloud/03_blockchain-and-analytics-in-the-cloud.mp4 27.7 MB
Coursera - Introduction to Cloud Computing 2024-4/03_components-of-cloud-computing/01_cloud-infrastructure/02_virtualization-and-virtual-machines-explained.mp4 25.9 MB
Coursera - Incident Response, BC, and DR Concepts 2024-4/02_incident-response-ir/01_incident-response-ir/01_incident-response.mp4 25.3 MB
Coursera - Introduction to Cloud Computing 2024-4/03_components-of-cloud-computing/02_cloud-storage-and-content-delivery-networks/03_block-storage.mp4 23.8 MB
Coursera - Introduction to Cloud Computing 2024-4/01_overview-of-cloud-computing/04_emerging-technologies-accelerated-by-cloud/01_internet-of-things-in-the-cloud.mp4 23.6 MB
Coursera - Introduction to Cloud Computing 2024-4/03_components-of-cloud-computing/02_cloud-storage-and-content-delivery-networks/06_cdn-content-delivery-networks.mp4 23.5 MB
Coursera - Introduction to Cloud Computing 2024-4/03_components-of-cloud-computing/02_cloud-storage-and-content-delivery-networks/07_expert-viewpoints-cloud-storage.mp4 23.4 MB
Coursera - Introduction to Cloud Computing 2024-4/04_emergent-trends-and-practices/02_cloud-native-applications-devops-and-application-modernization/05_expert-viewpoints-cloud-native-and-emergent-cloud-trends.mp4 23.1 MB
Coursera - Introduction to Cloud Computing 2024-4/04_emergent-trends-and-practices/02_cloud-native-applications-devops-and-application-modernization/01_cloud-native-applications.mp4 21.1 MB
Coursera - Cybersecurity Capstone Breach Response Case Studies 2024-4/01_incident-management-response-and-cyberattack-frameworks/02_cyberattack-frameworks/01_ibm-x-force-iris-cyberattack-framework.mp4 20.3 MB
Coursera - Introduction to Cloud Computing 2024-4/04_emergent-trends-and-practices/01_hybrid-multi-cloud-microservices-and-serverless/02_microservices.mp4 20.2 MB
Coursera - Access Control Concepts 2024-4/02_key-concepts/01_key-concepts/05_user-life-cycle-management.mp4 20.0 MB
Coursera - Security Principles 2024-4/04_security-controls/01_security-controls/01_security-controls.mp4 19.4 MB
猜你喜欢:
Specialist
IBM
Certificate
ISC2
Cybersecurity
Coursera
2024
Professional
- 【影视】 Coursera - Microsoft Cybersecurity Analyst Professional Certificate 2024
-
收录时间:2025-01-02
文档个数:1807
文档大小:6.5 GB
最近下载:2025-05-15
人气:636
磁力链接
Coursera - Advanced Cybersecurity Concepts and Capstone Project 2024-1/03_security-conscious-modeling/03_mitigation-strategies/06_network-security.mp4 78.1 MB
Coursera - Cybersecurity Solutions and Microsoft Defender 2024-1/01_azure-basic-security-capabilities/03_azure-firewall-protection/11_hackers-and-firewalls.mp4 49.8 MB
Coursera - Cybersecurity Tools and Technologies 2024-1/03_azure-penetration-testing/03_running-the-test/06_cold-wars-at-sams-scoops.mp4 38.4 MB
Coursera - Cybersecurity Identity and Access Solutions using Azure AD 2024-1/03_active-directory-access-protection-and-governance-management/02_roles-and-role-based-access/04_roles-in-action.mp4 38.0 MB
Coursera - Cybersecurity Solutions and Microsoft Defender 2024-1/03_microsoft-365-defender-threat-protection/03_identity-defense/07_identity-theft.mp4 33.2 MB
Coursera - Introduction to Computers and Operating Systems and Security 2024-1/01_introduction-to-computers-and-operating-systems/01_course-introduction/01_introduction-to-the-program-microsoft-cybersecurity-analyst.mp4 33.1 MB
Coursera - Cybersecurity Management and Compliance 2024-1/02_compliance-solutions/03_information-protection-and-data-lifecycle/03_data-concerns.mp4 30.3 MB
Coursera - Advanced Cybersecurity Concepts and Capstone Project 2024-1/02_advanced-threats-and-mitigation/01_susceptible-infrastructure-and-types-of-attack/06_attack-techniques.mp4 30.0 MB
Coursera - Advanced Cybersecurity Concepts and Capstone Project 2024-1/01_threat-modeling/03_threat-modeling-strategies/08_visual-agile-and-simple-threat-vast.mp4 26.3 MB
Coursera - Introduction to Networking and Cloud Computing 2024-1/04_cloud-computing-and-networking/02_virtual-environments/03_virtual-world.mp4 26.1 MB
Coursera - Introduction to Computers and Operating Systems and Security 2024-1/03_business-systems-applications/03_storage-solutions/06_artificial-intelligence-and-machine-learning.mp4 25.9 MB
Coursera - Microsoft SC-900 Exam Preparation and Practice 2024-1/01_concepts-of-security-compliance-and-identity/04_identity-concepts/06_id-and-active-directory.mp4 24.6 MB
Coursera - Cybersecurity Solutions and Microsoft Defender 2024-1/03_microsoft-365-defender-threat-protection/01_defender-services/01_introduction-to-microsoft-365-defender.mp4 23.4 MB
Coursera - Cybersecurity Tools and Technologies 2024-1/03_azure-penetration-testing/01_the-command-line-and-windows-powershell/01_introduction-to-command-line.mp4 23.3 MB
Coursera - Microsoft SC-900 Exam Preparation and Practice 2024-1/04_the-capabilities-of-microsoft-compliance-solutions/03_information-protection-and-data-lifecycle-management-capabilities-of-microsoft/09_module-summary-capabilities-of-microsoft-compliance-solutions.mp4 23.3 MB
Coursera - Advanced Cybersecurity Concepts and Capstone Project 2024-1/01_threat-modeling/03_threat-modeling-strategies/04_process-for-attack-simulation-and-threat-analysis-pasta.mp4 23.2 MB
Coursera - Advanced Cybersecurity Concepts and Capstone Project 2024-1/04_capstone-project/01_capstone-project/01_course-recap-advanced-cybersecurity-concepts.mp4 23.0 MB
Coursera - Microsoft SC-900 Exam Preparation and Practice 2024-1/02_the-capabilities-of-microsoft-azure-active-directory/03_identity-protection-and-governance-capabilities-of-azure-ad/01_identity-governance-in-azure-ad.mp4 22.4 MB
Coursera - Advanced Cybersecurity Concepts and Capstone Project 2024-1/01_threat-modeling/04_azure-and-threat-modeling/02_threat-modeling-for-azure-virtual-networks.mp4 22.3 MB
Coursera - Cybersecurity Solutions and Microsoft Defender 2024-1/01_azure-basic-security-capabilities/02_distributed-denial-of-service-ddos-protection/01_azure-ddos-protection-overview.mp4 22.3 MB
猜你喜欢:
Certificate
Cybersecurity
Coursera
Analyst
2024
Professional
Microsoft
- 【其他】 The Personal Cybersecurity Manual
-
收录时间:2024-12-31
文档个数:2
文档大小:125.8 MB
最近下载:2025-04-28
人气:242
磁力链接
The Personal Cybersecurity Manual.m4b 125.8 MB
cover.jpg 33.6 kB
猜你喜欢:
Personal
Cybersecurity
Manual
- 【影视】 Lynda - Risk Management for IT and Cybersecurity Managers
-
收录时间:2024-12-28
文档个数:22
文档大小:509.8 MB
最近下载:2025-05-14
人气:283
磁力链接
02 What Is Risk_/002 Types of risk.mp4 77.3 MB
01 Introduction/001 Risk management for IT and security managers.mp4 71.2 MB
04 Calculating Risk/003 Quantitative risk measurement.mp4 45.5 MB
02 What Is Risk_/001 What is risk_.mp4 41.2 MB
04 Calculating Risk/004 Case study_ Equifax.mp4 33.7 MB
02 What Is Risk_/003 Types of threats.mp4 30.6 MB
04 Calculating Risk/002 Qualitative risk measurement.mp4 29.9 MB
03 What Can You Do with Risk_/007 Risk responses.mp4 25.1 MB
03 What Can You Do with Risk_/006 Risk controls.mp4 24.4 MB
03 What Can You Do with Risk_/002 Risk mitigation.mp4 23.5 MB
02 What Is Risk_/004 When risk management fails.mp4 21.4 MB
03 What Can You Do with Risk_/005 Risk acceptance.mp4 20.3 MB
04 Calculating Risk/001 Calculating risk.mp4 17.8 MB
03 What Can You Do with Risk_/004 Risk avoidance.mp4 15.3 MB
03 What Can You Do with Risk_/003 Risk transference.mp4 14.1 MB
05 Conclusion/001 Next steps.mp4 10.5 MB
03 What Can You Do with Risk_/001 What can you do with risk_.mp4 7.1 MB
Ex_Files_Risk_Management_IT_Cybersecurity.zip 705.0 kB
0. Websites you may like/0. (1Hack.Us) Premium Tutorials-Guides-Articles _ Community based Forum.url 377 Bytes
0. Websites you may like/1. (FreeCoursesOnline.Me) Download Udacity, Masterclass, Lynda, PHLearn, Pluralsight Free.url 286 Bytes
猜你喜欢:
Cybersecurity
Lynda
Management
Managers
Risk