磁力管家

磁力管家
为您索检到268条磁力链接,耗时0毫秒。 rss

分享给好友

【影视】 [ WebToolTip.com ] Udemy - GenAI Cybersecurity - OWASP Top 10, MITRE ATLAS and API Attacks
收录时间:2025-05-09 文档个数:70 文档大小:1.6 GB 最近下载:2025-05-16 人气:288 磁力链接
  • mp4~Get Your Files Here !/7 - MITRE ATLAS Mapping for LLM Attacks/2 -Mapping AI Threats with MITRE ATLAS OpenAI vs. DeepSeek Case Study.mp4 156.0 MB
  • mp4~Get Your Files Here !/6 - LLM API Security Real-World Exploitation & Mitigation Demo with OLAMA/3 -Hands-On Demo Exploiting an Insecure Ollama API Setup.mp4 135.0 MB
  • mp4~Get Your Files Here !/6 - LLM API Security Real-World Exploitation & Mitigation Demo with OLAMA/6 -Mitigating OLAMA API Risks with NGINX Authentication (Hands-On Demo).mp4 81.1 MB
  • mp4~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/9 -How Self-Attention Builds Rich Contextual Understanding in Transformers.mp4 72.5 MB
  • mp4~Get Your Files Here !/5 - OWASP Top 10 for LLMs Understanding AI-Specific Security Risks/2 -OWASP Top 10 Risks for LLMs + Case Study Mapping.mp4 52.7 MB
  • mp4~Get Your Files Here !/8 - Hands-On Lab Exploiting AI Decisions in LLM APIs/2 -Lab Demo – Exploiting LLM APIs with Excessive Agency (PortSwigger).mp4 49.4 MB
  • mp4~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/9 -Scenario 2 Deep Dive into LLM Attack Surfaces from the Provider Side.mp4 48.5 MB
  • mp4~Get Your Files Here !/3 - Anatomy of an LLM System and Its Security Attack Surface/6 -LLM Processing Unit Explained Inference Handling, Prompt Cntrl & Runtime Logic.mp4 45.0 MB
  • mp4~Get Your Files Here !/6 - LLM API Security Real-World Exploitation & Mitigation Demo with OLAMA/4 -Ollama in the Wild Real-World Exposure via Shodan + Developer Risk Behavior.mp4 44.9 MB
  • mp4~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/11 -Inference and Log Data Exposure DeepSeek’s AI Leak Case Study.mp4 42.7 MB
  • mp4~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/6 -Understanding Recurrent Neural Networks (RNNs) for Language Processing.mp4 40.8 MB
  • mp4~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/10 -Training Data Poisoning Case Study How Microsoft Tay Was Manipulated on Twitter.mp4 37.5 MB
  • mp4~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/11 -Summary of Transformer Innovations Key Concepts Behind LLMs.mp4 30.9 MB
  • mp4~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/14 -Section 3 Wrap-Up LLM Attack Surface Lessons + What’s Next with OWASP Top 10.mp4 30.3 MB
  • mp4~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/8 -Prompt Injection Demonstration How a $1 Chevy Tahoe Chatbot Reply Went Viral.mp4 29.8 MB
  • mp4~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/7 -How Transformers and LLMs Revolutionized Language Processing.mp4 27.6 MB
  • mp4~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/12 -LLM Model Exposure How Misconfigured Ollama APIs Opened the Door.mp4 27.5 MB
  • mp4~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/3 -Where Large Language Models Fit in the Generative AI Landscape.mp4 26.8 MB
  • mp4~Get Your Files Here !/6 - LLM API Security Real-World Exploitation & Mitigation Demo with OLAMA/7 -How One Misconfigured LLM API Triggers Multiple OWASP Risks.mp4 26.7 MB
  • mp4~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/7 -Scenario 1 LLM Attack Surfaces in Organizations Using AI Models.mp4 26.5 MB
【影视】 [ WebToolTip.com ] Udemy - Cybersecurity Fundamentals - A Practical Hands-On Course
收录时间:2025-05-09 文档个数:25 文档大小:1.5 GB 最近下载:2025-05-16 人气:245 磁力链接
  • mp4~Get Your Files Here !/2 - Cybersecurity Fundamentals Practical Tutorials/1 -Cybersecurity Practical Learning Part 1.mp4 147.6 MB
  • mp4~Get Your Files Here !/2 - Cybersecurity Fundamentals Practical Tutorials/2 -Cybersecurity Practical Learning Part 2.mp4 139.7 MB
  • mp4~Get Your Files Here !/5 - Start Ethical Hacking Today/1 -How To Keep Your Laptops Secure And Safe.mp4 120.4 MB
  • mp4~Get Your Files Here !/4 - Mastering Burpsuite/4 -Insecure Direct Object Reference (IDOR).mp4 120.1 MB
  • pdf~Get Your Files Here !/1 - Introduction/1 -Lecture 1.pdf 92.9 MB
  • mp4~Get Your Files Here !/2 - Cybersecurity Fundamentals Practical Tutorials/3 -Python for Cybersecurity Part 1.mp4 90.9 MB
  • mp4~Get Your Files Here !/3 - Tools for Cybersecurity Practical Guide/3 -How To Install Python On Kali Linux.mp4 89.8 MB
  • mp4~Get Your Files Here !/1 - Introduction/1 -Introduction.mp4 88.0 MB
  • mp4~Get Your Files Here !/4 - Mastering Burpsuite/3 -Live Website Scan On Burpsuite.mp4 79.7 MB
  • mp4~Get Your Files Here !/3 - Tools for Cybersecurity Practical Guide/1 -How to Download Kali Linux.mp4 74.9 MB
  • mp4~Get Your Files Here !/5 - Start Ethical Hacking Today/2 -Spiderfoot Complete Tutorial.mp4 70.5 MB
  • mp4~Get Your Files Here !/2 - Cybersecurity Fundamentals Practical Tutorials/4 -Python for Cybersecurity Part 2.mp4 70.0 MB
  • mp4~Get Your Files Here !/1 - Introduction/2 -Setting Up Your Lab Environment (VirtualBox + Kali Linux + Windows VM).mp4 61.6 MB
  • mp4~Get Your Files Here !/3 - Tools for Cybersecurity Practical Guide/5 -How To Download And Use Cherry Tree.mp4 45.4 MB
  • mp4~Get Your Files Here !/5 - Start Ethical Hacking Today/4 -The Best Website For Cybersecurity Experts.mp4 45.3 MB
  • mp4~Get Your Files Here !/4 - Mastering Burpsuite/1 -How To Download And Install Burpsuite.mp4 41.8 MB
  • mp4~Get Your Files Here !/3 - Tools for Cybersecurity Practical Guide/4 -How To Install Pycharm on Kali Linux.mp4 33.9 MB
  • mp4~Get Your Files Here !/4 - Mastering Burpsuite/2 -Website Scan Part 1.mp4 32.7 MB
  • mp4~Get Your Files Here !/3 - Tools for Cybersecurity Practical Guide/2 -How To Create Txt File In Kali Linux.mp4 18.8 MB
  • mp4~Get Your Files Here !/5 - Start Ethical Hacking Today/3 -Haveibeenpawned.mp4 15.8 MB
【影视】 [ WebToolTip.com ] Udemy - Building Cybersecurity Tools with AI (ChatGPT and DeepSeek)
收录时间:2025-05-08 文档个数:13 文档大小:339.2 MB 最近下载:2025-05-16 人气:889 磁力链接
  • mp4~Get Your Files Here !/5 - PROJECTS/3 -Deep Web Footprint Tracker.mp4 82.9 MB
  • mp4~Get Your Files Here !/5 - PROJECTS/1 -Suspicious Process Detector.mp4 76.8 MB
  • mp4~Get Your Files Here !/6 - Deploying kivy app to Windows Platform/1 -Deploying kivy to windows.mp4 51.6 MB
  • mp4~Get Your Files Here !/5 - PROJECTS/2 -Ransomware Scanner app.mp4 36.6 MB
  • mp4~Get Your Files Here !/3 - Prompt Engineering For Cybersecurity and Gui Develepment/2 -Prompt Engineering 2.mp4 18.4 MB
  • mp4~Get Your Files Here !/2 - Setting up the Environment/1 -Create main.py and kivy installation.mp4 16.3 MB
  • mp4~Get Your Files Here !/2 - Setting up the Environment/2 -Testing kivy environment.mp4 14.9 MB
  • mp4~Get Your Files Here !/1 - Introduction/1 -Introduction.mp4 14.7 MB
  • mp4~Get Your Files Here !/3 - Prompt Engineering For Cybersecurity and Gui Develepment/1 -Prompt Engineering 1.mp4 12.1 MB
  • mp4~Get Your Files Here !/4 - Debugging AI Generated code/2 -installing MISSING module Error (Demo).mp4 8.4 MB
  • mp4~Get Your Files Here !/4 - Debugging AI Generated code/1 -Common Errors.mp4 6.6 MB
  • urlGet Bonus Downloads Here.url 180 Bytes
  • txt~Get Your Files Here !/Bonus Resources.txt 70 Bytes
【影视】 [ FreeCourseWeb.com ] Udemy - Cybersecurity defenses with GenAI
收录时间:2025-05-07 文档个数:96 文档大小:856.1 MB 最近下载:2025-05-15 人气:284 磁力链接
  • mp4~Get Your Files Here !/2 - Introduction to GenAI in Cybersecurity/3 -Key differences between traditional AI and GenAI.mp4 64.1 MB
  • mp4~Get Your Files Here !/3 - Understanding Microsoft Security Copilot/2 -How Security Copilot works.mp4 41.4 MB
  • mp4~Get Your Files Here !/1 - Introduction/1 -About course.mp4 36.3 MB
  • mp4~Get Your Files Here !/3 - Understanding Microsoft Security Copilot/7 -Demo - Option 2 - Configure Microsoft Security Copilot.mp4 29.6 MB
  • mp4~Get Your Files Here !/3 - Understanding Microsoft Security Copilot/4 -Integration with Microsoft Defender XDR & Sentinel.mp4 28.7 MB
  • mp4~Get Your Files Here !/3 - Understanding Microsoft Security Copilot/1 -Architecture & Components.mp4 24.9 MB
  • mp4~Get Your Files Here !/1 - Introduction/3 -Additional courses that can help you.mp4 22.8 MB
  • mp4~Get Your Files Here !/6 - GenAI for Proactive Threat Hunting/2 -Creating Hunting Queries Using Natural Language.mp4 22.2 MB
  • mp4~Get Your Files Here !/9 - Building an AI-Powered Security Strategy/1 -Future-Ready AI-Driven SOC Vision.mp4 21.5 MB
  • mp4~Get Your Files Here !/2 - Introduction to GenAI in Cybersecurity/2 -Evolution of AI in Cybersecurity.mp4 21.4 MB
  • mp4~Get Your Files Here !/5 - Automating Security Operations with GenAI/3 -Case study Automated Incident Reporting.mp4 21.0 MB
  • mp4~Get Your Files Here !/7 - Advanced Security Reporting with GenAI/3 -Effective Communication of Security Posture.mp4 20.5 MB
  • mp4~Get Your Files Here !/9 - Building an AI-Powered Security Strategy/3 -Trends and Innovations in AI Security.mp4 20.3 MB
  • mp4~Get Your Files Here !/2 - Introduction to GenAI in Cybersecurity/4 -Introducing Microsoft Security Copilot.mp4 19.8 MB
  • mp4~Get Your Files Here !/6 - GenAI for Proactive Threat Hunting/3 -Integrating Threat Hunting with Microsoft Sentinel.mp4 19.4 MB
  • mp4~Get Your Files Here !/7 - Advanced Security Reporting with GenAI/1 -Creating Executive-Level Reports.mp4 19.2 MB
  • mp4~Get Your Files Here !/10 - Course conclusion/3 -Certification and Career Guidance.mp4 19.1 MB
  • mp4~Get Your Files Here !/1 - Introduction/5 -Important Note and considerations.mp4 18.6 MB
  • mp4~Get Your Files Here !/4 - GenAI for Threat Detection and Response/2 -Automating Threat Intelligence with GenAI.mp4 18.4 MB
  • mp4~Get Your Files Here !/9 - Building an AI-Powered Security Strategy/2 -Enhancing Existing Tools with Copilot.mp4 18.1 MB
【影视】 [ FreeCourseWeb.com ] Udemy - Cybersecurity Solution Architecture 101
收录时间:2025-05-06 文档个数:15 文档大小:1.3 GB 最近下载:2025-05-15 人气:75 磁力链接
  • mp4~Get Your Files Here !/2 -Fundamental Concepts & Terminology.mp4 157.1 MB
  • mp4~Get Your Files Here !/6 -Endpoint & Device Security.mp4 123.5 MB
  • mp4~Get Your Files Here !/5 -Identity & Access Management (IAM) Basics.mp4 111.4 MB
  • mp4~Get Your Files Here !/12 -Security Operations & Incident Response Overview.mp4 104.7 MB
  • mp4~Get Your Files Here !/7 -Infrastructure Vulnerability Management.mp4 99.1 MB
  • mp4~Get Your Files Here !/13 -Wrap-Up & Preparation for 201 Course.mp4 97.2 MB
  • mp4~Get Your Files Here !/10 -Secure Application Foundations.mp4 91.1 MB
  • mp4~Get Your Files Here !/3 -The Threat Landscape.mp4 90.2 MB
  • mp4~Get Your Files Here !/1 -Introduction to Cybersecurity & the Role of a Cybersecurity Solution Architect.mp4 86.2 MB
  • mp4~Get Your Files Here !/8 -Introduction to Cryptography.mp4 85.8 MB
  • mp4~Get Your Files Here !/9 -Cloud Security Essentials.mp4 83.0 MB
  • mp4~Get Your Files Here !/11 -Basic Governance, Risk, & Compliance (GRC).mp4 74.4 MB
  • mp4~Get Your Files Here !/4 -Networking & Network Security Fundamentals.mp4 70.6 MB
  • urlGet Bonus Downloads Here.url 183 Bytes
  • txt~Get Your Files Here !/Bonus Resources.txt 70 Bytes
【影视】 [ FreeCourseWeb.com ] Udemy - Cybersecurity Solution Architecture 201
收录时间:2025-05-01 文档个数:14 文档大小:1.4 GB 最近下载:2025-05-15 人气:830 磁力链接
  • mp4~Get Your Files Here !/10 -Advanced Governance, Risk, & Compliance (GRC).mp4 160.7 MB
  • mp4~Get Your Files Here !/11 -Advanced Incident Response & Digital Forensics.mp4 156.8 MB
  • mp4~Get Your Files Here !/6 -Advanced Identity & Access Management (IAM).mp4 133.3 MB
  • mp4~Get Your Files Here !/4 -Infrastructure as Code (IaC) & Automated Security.mp4 133.1 MB
  • mp4~Get Your Files Here !/13 -Wrap-Up & Preparation for 301.mp4 122.8 MB
  • mp4~Get Your Files Here !/8 -Cloud & Hybrid Environment Security Advanced Topics.mp4 118.3 MB
  • mp4~Get Your Files Here !/9 -Security Operations, Threat Intelligence & Threat Hunting.mp4 107.5 MB
  • mp4~Get Your Files Here !/12 -In depth enterprise cybersecurity best practices, use cases, and examples.mp4 105.3 MB
  • mp4~Get Your Files Here !/2 -Advanced Threat Modeling.mp4 100.1 MB
  • mp4~Get Your Files Here !/7 -Data Protection & Privacy by Design.mp4 97.5 MB
  • mp4~Get Your Files Here !/3 -Zero Trust Architecture.mp4 97.1 MB
  • mp4~Get Your Files Here !/1 -Course Introduction & 101 Recap.mp4 69.3 MB
  • urlGet Bonus Downloads Here.url 183 Bytes
  • txt~Get Your Files Here !/Bonus Resources.txt 70 Bytes
【影视】 [ WebToolTip.com ] Udemy - Implement Version 2 Of Nist Cybersecurity Framework
收录时间:2025-04-06 文档个数:45 文档大小:1.9 GB 最近下载:2025-05-16 人气:944 磁力链接
  • mp4~Get Your Files Here !/1 - Introduction to the NIST Cyber Security Framework/2 - Business Value of Framework.mp4 147.0 MB
  • mp4~Get Your Files Here !/1 - Introduction to the NIST Cyber Security Framework/1 - Introduction.mp4 144.2 MB
  • mp4~Get Your Files Here !/1 - Introduction to the NIST Cyber Security Framework/3 - Who Can Use The Framework.mp4 139.6 MB
  • mp4~Get Your Files Here !/5 - Implementing Phase Two of the CRMAP/34 - Business Value Analysis.mp4 106.8 MB
  • mp4~Get Your Files Here !/4 - Implementing Phase One of the CRMAP/28 - Conduct Interviews.mp4 72.2 MB
  • mp4~Get Your Files Here !/7 - Conclusion/43 - BONUS Conclusion.mp4 72.1 MB
  • mp4~Get Your Files Here !/5 - Implementing Phase Two of the CRMAP/32 - Close Your Gaps.mp4 70.9 MB
  • mp4~Get Your Files Here !/4 - Implementing Phase One of the CRMAP/29 - Compile and Analyze Scores.mp4 68.2 MB
  • mp4~Get Your Files Here !/6 - Implementing Phase Three of the CRMAP/41 - Quarterly Reviews.mp4 65.1 MB
  • mp4~Get Your Files Here !/5 - Implementing Phase Two of the CRMAP/36 - Internal Marketing.mp4 64.3 MB
  • mp4~Get Your Files Here !/4 - Implementing Phase One of the CRMAP/24 - Get BuyIn.mp4 62.7 MB
  • mp4~Get Your Files Here !/3 - Real World Case Studies/17 - Cimpress Promotional Products.mp4 61.5 MB
  • mp4~Get Your Files Here !/2 - Understanding the NIST Cybersecurity Framework/9 - Govern Function and Activities.mp4 59.1 MB
  • mp4~Get Your Files Here !/6 - Implementing Phase Three of the CRMAP/39 - Phase Three Overview.mp4 50.6 MB
  • mp4~Get Your Files Here !/6 - Implementing Phase Three of the CRMAP/40 - Monthly Checkins.mp4 46.0 MB
  • mp4~Get Your Files Here !/2 - Understanding the NIST Cybersecurity Framework/11 - Protect Function and Activities.mp4 41.4 MB
  • mp4~Get Your Files Here !/4 - Implementing Phase One of the CRMAP/26 - Generate Questionnaire.mp4 40.7 MB
  • mp4~Get Your Files Here !/1 - Introduction to the NIST Cyber Security Framework/4 - Understanding the Core.mp4 38.5 MB
  • mp4~Get Your Files Here !/3 - Real World Case Studies/18 - University of Kansas Medical Center.mp4 38.0 MB
  • mp4~Get Your Files Here !/5 - Implementing Phase Two of the CRMAP/37 - External Marketing.mp4 36.4 MB
【影视】 [ WebToolTip.com ] Udemy - Essential Cybersecurity For Everyone - Stay Safe Online
收录时间:2025-03-13 文档个数:19 文档大小:2.1 GB 最近下载:2025-05-15 人气:516 磁力链接
  • mp4~Get Your Files Here !/4 - Creating Strong Passwords and Enhancing Overall Security/9 - Password Security.mp4 250.4 MB
  • mp4~Get Your Files Here !/11 - IoT Security/16 - Securing Smart Devices in the Digital Age.mp4 235.4 MB
  • mp4~Get Your Files Here !/7 - Data Backup and Recovery Essentials/12 - Safeguarding Your Data Backup and Restoration.mp4 209.9 MB
  • mp4~Get Your Files Here !/9 - Cybersecurity for Travelers/14 - Staying Secure While Traveling Online.mp4 191.8 MB
  • mp4~Get Your Files Here !/6 - Email Security Essentials/11 - Protecting Your Email from Threats.mp4 175.4 MB
  • mp4~Get Your Files Here !/10 - Social Media Security/15 - Protecting Your Privacy on Social Media.mp4 172.2 MB
  • mp4~Get Your Files Here !/5 - Safe Internet Browsing/10 - Safe Internet Browsing.mp4 126.9 MB
  • mp4~Get Your Files Here !/12 - Steps to Take After a Cybersecurity Breach/17 - What to Do After a Cybersecurity Breach.mp4 116.9 MB
  • mp4~Get Your Files Here !/1 - Introduction Essential Cybersecurity for everyone stay safe online/1 - Introduction.mp4 107.3 MB
  • mp4~Get Your Files Here !/2 - Understanding Cyber Threats/2 - Understanding Cyber threats.mp4 98.9 MB
  • mp4~Get Your Files Here !/8 - Securing Your Online Accounts/13 - Best Practices for Protecting Online Accounts.mp4 94.5 MB
  • mp4~Get Your Files Here !/3 - Protecting Personal Devices/3 - Introduction to protecting personal devices.mp4 76.2 MB
  • mp4~Get Your Files Here !/3 - Protecting Personal Devices/6 - Keeping Software Operating Systems Updated Strengthening Your Digital Defense.mp4 58.9 MB
  • mp4~Get Your Files Here !/3 - Protecting Personal Devices/4 - Securing Computers and Laptops.mp4 43.3 MB
  • mp4~Get Your Files Here !/3 - Protecting Personal Devices/7 - Configuring Firewalls Securing Your Devices and Home Network.mp4 36.6 MB
  • mp4~Get Your Files Here !/3 - Protecting Personal Devices/5 - Securing Smartphones and Laptops.mp4 30.1 MB
  • mp4~Get Your Files Here !/3 - Protecting Personal Devices/8 - Ensuring Safe and Secure WiFi Connections.mp4 27.5 MB
  • urlGet Bonus Downloads Here.url 180 Bytes
  • txt~Get Your Files Here !/Bonus Resources.txt 70 Bytes
【影视】 [ WebToolTip.com ] Udemy - ISACA Cybersecurity Fundamentals - Complete Training Course
收录时间:2025-03-07 文档个数:45 文档大小:858.9 MB 最近下载:2025-05-16 人气:2781 磁力链接
  • mp4~Get Your Files Here !/2 - Types of Security/4 -Cybersecurity.mp4 38.9 MB
  • mp4~Get Your Files Here !/3 - Governance, Risk Management and Compliance/5 -Risk Analysis Approaches.mp4 36.9 MB
  • mp4~Get Your Files Here !/4 - Common Types of Malware/6 -Trojan Horses.mp4 34.2 MB
  • mp4~Get Your Files Here !/4 - Common Types of Malware/5 -Ransomware.mp4 34.1 MB
  • mp4~Get Your Files Here !/4 - Common Types of Malware/3 -Worms.mp4 33.9 MB
  • mp4~Get Your Files Here !/5 - Security Controls/2 -Control Functions and Types.mp4 32.8 MB
  • mp4~Get Your Files Here !/4 - Common Types of Malware/2 -Viruses.mp4 31.7 MB
  • mp4~Get Your Files Here !/2 - Types of Security/5 -Physical Security.mp4 31.6 MB
  • mp4~Get Your Files Here !/3 - Governance, Risk Management and Compliance/4 -Risk Governance.mp4 29.0 MB
  • mp4~Get Your Files Here !/4 - Common Types of Malware/8 -Adware.mp4 28.9 MB
  • mp4~Get Your Files Here !/6 - OWASP Top 10/11 -Server-Side Request Forgery.mp4 28.7 MB
  • mp4~Get Your Files Here !/6 - OWASP Top 10/9 -Software and Data Integrity Failures.mp4 28.1 MB
  • mp4~Get Your Files Here !/6 - OWASP Top 10/10 -Security Logging and Monitoring Failures.mp4 28.0 MB
  • mp4~Get Your Files Here !/6 - OWASP Top 10/3 -Cryptographic Failures.mp4 27.0 MB
  • mp4~Get Your Files Here !/6 - OWASP Top 10/7 -Vulnerable and Outdated Components.mp4 27.0 MB
  • mp4~Get Your Files Here !/1 - Introduction/3 -Integrity.mp4 26.2 MB
  • mp4~Get Your Files Here !/4 - Common Types of Malware/7 -Rootkit.mp4 25.7 MB
  • mp4~Get Your Files Here !/2 - Types of Security/3 -Information Security.mp4 23.5 MB
  • mp4~Get Your Files Here !/1 - Introduction/4 -Availability.mp4 22.1 MB
  • mp4~Get Your Files Here !/4 - Common Types of Malware/4 -Keyloggers.mp4 21.6 MB
【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity Freelancer - Become A Free Agent In 2025
收录时间:2025-02-24 文档个数:12 文档大小:1.6 GB 最近下载:2025-05-16 人气:1607 磁力链接
  • mp4~Get Your Files Here !/3 - Pricing Your Services Creating Your Service Package/4 - Pricing Your Cybsersecurity Consultancy Services.mp4 433.8 MB
  • mp4~Get Your Files Here !/2 - Becoming A Cybersecurity Enterpreneur Establishing Your Product Market Fit/3 - Establishing Your Product Market Fit.mp4 380.4 MB
  • mp4~Get Your Files Here !/3 - Pricing Your Services Creating Your Service Package/5 - Creating Your Service Package.mp4 365.0 MB
  • mp4~Get Your Files Here !/4 - Perfect Elevator Pitch Market Yourself To Sell Your Business/8 - Earn Your Expert Status To Sell.mp4 100.4 MB
  • mp4~Get Your Files Here !/6 - Course Conclusion/10 - Course Outro.mp4 86.7 MB
  • mp4~Get Your Files Here !/4 - Perfect Elevator Pitch Market Yourself To Sell Your Business/7 - The Difference Between Marketing Selling.mp4 75.1 MB
  • mp4~Get Your Files Here !/1 - Course Introduction/1 - Course Introduction.mp4 66.6 MB
  • mp4~Get Your Files Here !/4 - Perfect Elevator Pitch Market Yourself To Sell Your Business/6 - Perfect Your Elevator Pitch.mp4 42.1 MB
  • mp4~Get Your Files Here !/5 - Course Project/9 - Project Video.mp4 39.8 MB
  • mp4~Get Your Files Here !/2 - Becoming A Cybersecurity Enterpreneur Establishing Your Product Market Fit/2 - Becoming A Cybersecurity Entrepreneur.mp4 32.8 MB
  • urlGet Bonus Downloads Here.url 182 Bytes
  • txt~Get Your Files Here !/Bonus Resources.txt 70 Bytes
【影视】 [ FreeCourseWeb.com ] Linkedin - Cybersecurity For Musicians, Producers, And Studios
收录时间:2025-02-24 文档个数:17 文档大小:1.2 GB 最近下载:2025-05-15 人气:673 磁力链接
  • mp4~Get Your Files Here !/4 - Leveraging Technology for IP Protection/11 - Antipiracy software and techniques Royalty Management.mp4 173.2 MB
  • mp4~Get Your Files Here !/4 - Leveraging Technology for IP Protection/8 - Using blockchain for music rights management.mp4 123.5 MB
  • mp4~Get Your Files Here !/4 - Leveraging Technology for IP Protection/9 - Antipiracy software and techniques AI Protection Content ID Watermarking.mp4 112.9 MB
  • mp4~Get Your Files Here !/1 - Introduction/1 - Welcome and introduction.mp4 101.3 MB
  • mp4~Get Your Files Here !/4 - Leveraging Technology for IP Protection/10 - Antipiracy software and techniques Copyright PROs.mp4 95.2 MB
  • mp4~Get Your Files Here !/4 - Leveraging Technology for IP Protection/13 - Antipiracy software and techniques Direct Fan Engagement.mp4 93.6 MB
  • mp4~Get Your Files Here !/2 - Protecting Digital Assets/4 - Tools for secure data storage and sharing.mp4 70.3 MB
  • mp4~Get Your Files Here !/5 - Action Plan for Musicians and Businesses/14 - Building a cybersecurity strategy.mp4 68.4 MB
  • mp4~Get Your Files Here !/2 - Protecting Digital Assets/5 - Backup regularly.mp4 67.4 MB
  • mp4~Get Your Files Here !/4 - Leveraging Technology for IP Protection/12 - Antipiracy software and techniques Secure Distribution Platforms.mp4 57.2 MB
  • mp4~Get Your Files Here !/3 - Secure Music Streaming and Distribution/7 - Risks and best practices in streaming distribution platforms and sharing music.mp4 54.4 MB
  • mp4~Get Your Files Here !/2 - Protecting Digital Assets/3 - Steps to safeguard recordings intellectual property and creative works.mp4 49.6 MB
  • mp4~Get Your Files Here !/6 - Conclusion and Wrap Up/15 - Conclusion.mp4 48.1 MB
  • mp4~Get Your Files Here !/2 - Protecting Digital Assets/6 - Access control.mp4 35.3 MB
  • mp4~Get Your Files Here !/1 - Introduction/2 - Understanding Cybersecurity Threats in Music.mp4 25.4 MB
  • urlGet Bonus Downloads Here.url 183 Bytes
  • txt~Get Your Files Here !/Bonus Resources.txt 70 Bytes
【影视】 [ FreeCourseWeb.com ] AI Cybersecurity with DeepSeek R1 - Protect Your Digital Life
收录时间:2025-02-23 文档个数:25 文档大小:363.3 MB 最近下载:2025-05-16 人气:1236 磁力链接
  • mp4~Get Your Files Here !/5 - Digital Forensics & Investigations/2 -Analyzing Suspicious Software.mp4 46.2 MB
  • mp4~Get Your Files Here !/4 - OSINT – How Scammers Gather Your Data/3 -Romance Scams How They Manipulate Victims.mp4 43.4 MB
  • mp4~Get Your Files Here !/1 - Introduction to AI and Cybersecurity/1 -What Are Artificial Intelligence & Cybersecurity.mp4 37.4 MB
  • mp4~Get Your Files Here !/3 - Ethical Hacking Real-World Demonstrations/3 -Hacking with Advanced Malware A Demonstration.mp4 27.7 MB
  • mp4~Get Your Files Here !/7 - Final Thoughts & Cybersecurity Mindset/1 -Psychological Tricks Hackers Use & How to Avoid Scams.mp4 26.1 MB
  • mp4~Get Your Files Here !/6 - Leveraging AI for Profit and Cybersecurity/1 -Qwen 2.5 AI Video Generation.mp4 25.8 MB
  • mp4~Get Your Files Here !/3 - Ethical Hacking Real-World Demonstrations/2 -Why Do Experts Say Don't Click the Link.mp4 23.4 MB
  • mp4~Get Your Files Here !/4 - OSINT – How Scammers Gather Your Data/1 -How Scammers Steal Your Personal Data.mp4 22.6 MB
  • mp4~Get Your Files Here !/4 - OSINT – How Scammers Gather Your Data/2 -Job Scams Be Careful Where You Apply.mp4 19.7 MB
  • mp4~Get Your Files Here !/4 - OSINT – How Scammers Gather Your Data/4 -OSINT Tools SearchPeopleFree, WhitePages.mp4 15.5 MB
  • mp4~Get Your Files Here !/5 - Digital Forensics & Investigations/3 -Investigating Malicious Links.mp4 13.4 MB
  • mp4~Get Your Files Here !/5 - Digital Forensics & Investigations/4 -Verifying Email Sources for Cyber Threats.mp4 10.8 MB
  • mp4~Get Your Files Here !/3 - Ethical Hacking Real-World Demonstrations/4 -Key Takeaways & How to Protect Yourself.mp4 10.7 MB
  • mp4~Get Your Files Here !/3 - Ethical Hacking Real-World Demonstrations/1 -Advanced Phishing Attacks How They Work.mp4 9.4 MB
  • mp4~Get Your Files Here !/1 - Introduction to AI and Cybersecurity/2 -Who Is This Course For.mp4 8.7 MB
  • mp4~Get Your Files Here !/5 - Digital Forensics & Investigations/1 -Introduction to Digital Forensics.mp4 8.0 MB
  • mp4~Get Your Files Here !/2 - Cybersecurity Myths vs. Reality/2 -Why Antivirus Alone Won't Keep You Safe.mp4 7.9 MB
  • mp4~Get Your Files Here !/2 - Cybersecurity Myths vs. Reality/1 -What Are the Risks of Downloading Unknown Apps.mp4 6.7 MB
  • html~Get Your Files Here !/6 - Leveraging AI for Profit and Cybersecurity/2 - Use Google Ai studio to generate script for a video.html 11.3 kB
  • html~Get Your Files Here !/6 - Leveraging AI for Profit and Cybersecurity/2 - Whisper Free Audio Transcription for Security Experts.html 5.3 kB
【影视】 CBTNuggets - Microsoft Certified Cybersecurity Architect Expert (SC-100) Online Training 2023-2
收录时间:2025-02-15 文档个数:68 文档大小:2.5 GB 最近下载:2025-05-12 人气:259 磁力链接
  • mp42. Translating Security Requirements/6. Azure Security Benchmark - Microsoft Certified Cybersecurity-1.mp4 113.5 MB
  • mp43. Designing Security Strategies/2. Hybrid Environmental Security Strategies - Microsoft Certifi.mp4 63.8 MB
  • mp410. Design a security strategy for data and applications/1. Specify Priorities for Mitigating Threats to Apps - Microsof-1.mp4 62.3 MB
  • mp46. Designing a Regulatory Compliance Strategy/4. Implementing Azure Policy - Microsoft Certified Cybersecurit.mp4 59.0 MB
  • mp47. Evaluating and Managing Security Postures/6. Mitigating Identified Risks - Microsoft Certified Cybersecur-1.mp4 53.6 MB
  • mp43. Designing Security Strategies/4. Traffic Filtering and Segmentation Strategies - Microsoft Ce-1.mp4 53.4 MB
  • mp410. Design a security strategy for data and applications/4. Priorities For Mitigating Threats To Data - Microsoft Certif-1.mp4 53.4 MB
  • mp43. Designing Security Strategies/5. Azure Best Practices for Network Security - Microsoft Certif-1.mp4 52.2 MB
  • mp41. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/5. Hybrid Infrastructure - Microsoft Certified Cybersecurity Ar-1.mp4 50.4 MB
  • mp46. Designing a Regulatory Compliance Strategy/6. Translating Privacy Requirements - Microsoft Certified Cyber.mp4 49.7 MB
  • mp49. Designing a Strategy for Securing SaaS, PaaS, and IaaS Services/1. Security Baselines for SaaS, PaaS, and IaaS services - Micro.mp4 48.3 MB
  • mp42. Translating Security Requirements/3. Translating Business Goals into Security Requirements - Micr.mp4 47.9 MB
  • mp42. Translating Security Requirements/7. Securing Privileged Access Using RaMP - Microsoft Certified -1.mp4 47.8 MB
  • mp41. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/2. Security Operations - Microsoft Certified Cybersecurity Arch-1.mp4 47.0 MB
  • mp44. Designing a Security Operations Strategy/5. SIEMSOAR Strategy - Microsoft Certified Cybersecurity Archit.mp4 46.3 MB
  • mp42. Translating Security Requirements/2. Translating Requirements - Microsoft Certified Cybersecurity.mp4 46.2 MB
  • mp410. Design a security strategy for data and applications/3. Security Strategy for Applications and APIs - Microsoft Cert-1.mp4 44.6 MB
  • mp45. Designing an Identity Security Strategy/1. Strategy for Access to Cloud Resources - Microsoft Certified.mp4 43.0 MB
  • mp47. Evaluating and Managing Security Postures/4. Designing Security for an Azure Landing Zone - Microsoft Cer.mp4 42.8 MB
  • mp44. Designing a Security Operations Strategy/3. Logging and Auditing Strategy - Microsoft Certified Cybersec.mp4 42.3 MB
【影视】 Cybersecurity Closer Look Labs
收录时间:2025-02-05 文档个数:26 文档大小:502.3 MB 最近下载:2025-05-15 人气:1599 磁力链接
  • mp4004. 03 00 Digital Certificates.mp4 46.0 MB
  • mp4019. 18 00 Risk Terminology.mp4 45.9 MB
  • mp4020. 19 00 SSL and TLS Packet Capture.mp4 35.4 MB
  • mp4013. 12 00 Powershell.mp4 29.1 MB
  • mp4021. 20 00 Star and Simple Properties.mp4 27.5 MB
  • mp4023. 22 00 Wireless Heat Maps.mp4 26.8 MB
  • mp4015. 14 00 Pwned Passwords.mp4 26.6 MB
  • mp4007. 06 00 IPv6 Addressing.mp4 23.9 MB
  • mp4008. 07 00 Log Files.mp4 21.7 MB
  • mp4012. 11 00 Policies and Standards.mp4 21.3 MB
  • mp4010. 09 00 Passive Reconnaissance.mp4 19.3 MB
  • mp4024. 23 00 ZenMap.mp4 18.2 MB
  • mp4006. 05 00 Honeypots.mp4 18.0 MB
  • mp4009. 08 00 Malware Analysis.mp4 17.7 MB
  • mp4002. 01 00 Cloud Controls.mp4 17.3 MB
  • mp4016. 15 00 Quantitative Risk Analysis.mp4 14.3 MB
  • mp4003. 02 00 Constructing Error Messages.mp4 13.8 MB
  • mp4017. 16 00 RAID.mp4 11.8 MB
  • mp4025. 24 00 Zero-day Vulnerabilities.mp4 11.3 MB
  • mp4005. 04 00 Hashing and HMACS.mp4 10.6 MB
【影视】 Mastering Cybersecurity with Python - From Basics to Advanced Defense
收录时间:2025-01-27 文档个数:160 文档大小:1.5 GB 最近下载:2025-05-15 人气:1460 磁力链接
  • mp4Chapter 01 Introduction/001. Introduction.mp4 51.5 MB
  • mp4Chapter 10 Mini Project - File Encryption & Decryption Tool/004. Task 3 - Adding the User Interface.mp4 51.0 MB
  • mp4Chapter 12 Python Project - Build an Extensive Authentication System and Password Checker/005. Part 4 - Adding the Password Strength Checker Tool.mp4 50.0 MB
  • mp4Chapter 04 Control Flow & Loops/008. Programming Challenge.mp4 43.8 MB
  • mp4Chapter 12 Python Project - Build an Extensive Authentication System and Password Checker/007. Part 6 - Adding the Audit Tool.mp4 39.5 MB
  • mp4Chapter 06 Data Structures/008. Programming Challenge Part 2 - Dictionaries & Loops.mp4 36.7 MB
  • mp4Chapter 11 Object-Oriented Programming (OOP)/003. Creating a Basic Class.mp4 35.4 MB
  • mp4Chapter 04 Control Flow & Loops/007. The BREAK Statement.mp4 34.5 MB
  • mp4Chapter 12 Python Project - Build an Extensive Authentication System and Password Checker/006. Part 5 - Hashing the User Passwords.mp4 33.6 MB
  • mp4Chapter 12 Python Project - Build an Extensive Authentication System and Password Checker/009. Part 8 - Adding the Post Login Menu.mp4 32.5 MB
  • mp4Chapter 07 Mini Project - Build a Basic User Authentication System/004. Step 3 - Build the Authentication System.mp4 31.8 MB
  • mp4Chapter 10 Mini Project - File Encryption & Decryption Tool/003. Task 2 - Creating the Encryption & Decryption Keys.mp4 28.7 MB
  • mp4Chapter 04 Control Flow & Loops/003. IF ELSE Statements.mp4 27.4 MB
  • mp4Chapter 07 Mini Project - Build a Basic User Authentication System/003. Step 2 - Build the Login Function.mp4 26.9 MB
  • mp4Chapter 09 Libraries & Modules/007. Working with an External Library.mp4 26.6 MB
  • mp4Chapter 02 Variables & Data Types/002. Working with Strings.mp4 26.0 MB
  • mp4Chapter 12 Python Project - Build an Extensive Authentication System and Password Checker/001. Final Project Preview.mp4 26.0 MB
  • mp4Chapter 01 Introduction/002. Important Note about Replit.mp4 23.5 MB
  • mp4Chapter 12 Python Project - Build an Extensive Authentication System and Password Checker/008. Part 7 - Adding the View Logs Function.mp4 23.0 MB
  • mp4Chapter 04 Control Flow & Loops/009. Try & Except Error Handling.mp4 22.6 MB
【压缩文件】 [CourserHub.com] Coursera - IT Fundamentals for Cybersecurity Specialization
收录时间:2025-01-06 文档个数:2 文档大小:1.5 GB 最近下载:2025-04-26 人气:91 磁力链接
  • rar[CourserHub.com] Coursera - IT Fundamentals for Cybersecurity Specialization.part1.rar 1.1 GB
  • rar[CourserHub.com] Coursera - IT Fundamentals for Cybersecurity Specialization.part2.rar 403.0 MB
【影视】 Coursera - IBM and ISC2 Cybersecurity Specialist Professional Certificate 2024
收录时间:2025-01-05 文档个数:1166 文档大小:3.6 GB 最近下载:2025-05-15 人气:469 磁力链接
  • mp4Coursera - Introduction to Cloud Computing 2024-4/05_cloud-security-monitoring-case-studies-jobs/02_case-studies-and-jobs/01_case-studies-in-different-industry-verticals.mp4 64.0 MB
  • mp4Coursera - Introduction to Cybersecurity Careers 2024-4/04_final-project-and-assessment/02_course-wrap-up/03_cybersecurity-career-faq.mp4 62.1 MB
  • mp4Coursera - Introduction to Cloud Computing 2024-4/04_emergent-trends-and-practices/02_cloud-native-applications-devops-and-application-modernization/04_application-modernization.mp4 54.2 MB
  • mp4Coursera - Introduction to Cloud Computing 2024-4/03_components-of-cloud-computing/01_cloud-infrastructure/06_containers.mp4 45.8 MB
  • mp4Coursera - Introduction to Cloud Computing 2024-4/04_emergent-trends-and-practices/01_hybrid-multi-cloud-microservices-and-serverless/01_hybrid-multi-cloud.mp4 40.6 MB
  • mp4Coursera - Introduction to Cloud Computing 2024-4/02_cloud-computing-models/02_deployment-models/03_hybrid-cloud.mp4 39.0 MB
  • mp4Coursera - Introduction to Cybersecurity Careers 2024-4/04_final-project-and-assessment/02_course-wrap-up/01_landing-your-first-job-in-cybersecurity.mp4 30.6 MB
  • mp4Coursera - Introduction to Cloud Computing 2024-4/01_overview-of-cloud-computing/04_emerging-technologies-accelerated-by-cloud/03_blockchain-and-analytics-in-the-cloud.mp4 27.7 MB
  • mp4Coursera - Introduction to Cloud Computing 2024-4/03_components-of-cloud-computing/01_cloud-infrastructure/02_virtualization-and-virtual-machines-explained.mp4 25.9 MB
  • mp4Coursera - Incident Response, BC, and DR Concepts 2024-4/02_incident-response-ir/01_incident-response-ir/01_incident-response.mp4 25.3 MB
  • mp4Coursera - Introduction to Cloud Computing 2024-4/03_components-of-cloud-computing/02_cloud-storage-and-content-delivery-networks/03_block-storage.mp4 23.8 MB
  • mp4Coursera - Introduction to Cloud Computing 2024-4/01_overview-of-cloud-computing/04_emerging-technologies-accelerated-by-cloud/01_internet-of-things-in-the-cloud.mp4 23.6 MB
  • mp4Coursera - Introduction to Cloud Computing 2024-4/03_components-of-cloud-computing/02_cloud-storage-and-content-delivery-networks/06_cdn-content-delivery-networks.mp4 23.5 MB
  • mp4Coursera - Introduction to Cloud Computing 2024-4/03_components-of-cloud-computing/02_cloud-storage-and-content-delivery-networks/07_expert-viewpoints-cloud-storage.mp4 23.4 MB
  • mp4Coursera - Introduction to Cloud Computing 2024-4/04_emergent-trends-and-practices/02_cloud-native-applications-devops-and-application-modernization/05_expert-viewpoints-cloud-native-and-emergent-cloud-trends.mp4 23.1 MB
  • mp4Coursera - Introduction to Cloud Computing 2024-4/04_emergent-trends-and-practices/02_cloud-native-applications-devops-and-application-modernization/01_cloud-native-applications.mp4 21.1 MB
  • mp4Coursera - Cybersecurity Capstone Breach Response Case Studies 2024-4/01_incident-management-response-and-cyberattack-frameworks/02_cyberattack-frameworks/01_ibm-x-force-iris-cyberattack-framework.mp4 20.3 MB
  • mp4Coursera - Introduction to Cloud Computing 2024-4/04_emergent-trends-and-practices/01_hybrid-multi-cloud-microservices-and-serverless/02_microservices.mp4 20.2 MB
  • mp4Coursera - Access Control Concepts 2024-4/02_key-concepts/01_key-concepts/05_user-life-cycle-management.mp4 20.0 MB
  • mp4Coursera - Security Principles 2024-4/04_security-controls/01_security-controls/01_security-controls.mp4 19.4 MB
【影视】 Coursera - Microsoft Cybersecurity Analyst Professional Certificate 2024
收录时间:2025-01-02 文档个数:1807 文档大小:6.5 GB 最近下载:2025-05-15 人气:636 磁力链接
  • mp4Coursera - Advanced Cybersecurity Concepts and Capstone Project 2024-1/03_security-conscious-modeling/03_mitigation-strategies/06_network-security.mp4 78.1 MB
  • mp4Coursera - Cybersecurity Solutions and Microsoft Defender 2024-1/01_azure-basic-security-capabilities/03_azure-firewall-protection/11_hackers-and-firewalls.mp4 49.8 MB
  • mp4Coursera - Cybersecurity Tools and Technologies 2024-1/03_azure-penetration-testing/03_running-the-test/06_cold-wars-at-sams-scoops.mp4 38.4 MB
  • mp4Coursera - Cybersecurity Identity and Access Solutions using Azure AD 2024-1/03_active-directory-access-protection-and-governance-management/02_roles-and-role-based-access/04_roles-in-action.mp4 38.0 MB
  • mp4Coursera - Cybersecurity Solutions and Microsoft Defender 2024-1/03_microsoft-365-defender-threat-protection/03_identity-defense/07_identity-theft.mp4 33.2 MB
  • mp4Coursera - Introduction to Computers and Operating Systems and Security 2024-1/01_introduction-to-computers-and-operating-systems/01_course-introduction/01_introduction-to-the-program-microsoft-cybersecurity-analyst.mp4 33.1 MB
  • mp4Coursera - Cybersecurity Management and Compliance 2024-1/02_compliance-solutions/03_information-protection-and-data-lifecycle/03_data-concerns.mp4 30.3 MB
  • mp4Coursera - Advanced Cybersecurity Concepts and Capstone Project 2024-1/02_advanced-threats-and-mitigation/01_susceptible-infrastructure-and-types-of-attack/06_attack-techniques.mp4 30.0 MB
  • mp4Coursera - Advanced Cybersecurity Concepts and Capstone Project 2024-1/01_threat-modeling/03_threat-modeling-strategies/08_visual-agile-and-simple-threat-vast.mp4 26.3 MB
  • mp4Coursera - Introduction to Networking and Cloud Computing 2024-1/04_cloud-computing-and-networking/02_virtual-environments/03_virtual-world.mp4 26.1 MB
  • mp4Coursera - Introduction to Computers and Operating Systems and Security 2024-1/03_business-systems-applications/03_storage-solutions/06_artificial-intelligence-and-machine-learning.mp4 25.9 MB
  • mp4Coursera - Microsoft SC-900 Exam Preparation and Practice 2024-1/01_concepts-of-security-compliance-and-identity/04_identity-concepts/06_id-and-active-directory.mp4 24.6 MB
  • mp4Coursera - Cybersecurity Solutions and Microsoft Defender 2024-1/03_microsoft-365-defender-threat-protection/01_defender-services/01_introduction-to-microsoft-365-defender.mp4 23.4 MB
  • mp4Coursera - Cybersecurity Tools and Technologies 2024-1/03_azure-penetration-testing/01_the-command-line-and-windows-powershell/01_introduction-to-command-line.mp4 23.3 MB
  • mp4Coursera - Microsoft SC-900 Exam Preparation and Practice 2024-1/04_the-capabilities-of-microsoft-compliance-solutions/03_information-protection-and-data-lifecycle-management-capabilities-of-microsoft/09_module-summary-capabilities-of-microsoft-compliance-solutions.mp4 23.3 MB
  • mp4Coursera - Advanced Cybersecurity Concepts and Capstone Project 2024-1/01_threat-modeling/03_threat-modeling-strategies/04_process-for-attack-simulation-and-threat-analysis-pasta.mp4 23.2 MB
  • mp4Coursera - Advanced Cybersecurity Concepts and Capstone Project 2024-1/04_capstone-project/01_capstone-project/01_course-recap-advanced-cybersecurity-concepts.mp4 23.0 MB
  • mp4Coursera - Microsoft SC-900 Exam Preparation and Practice 2024-1/02_the-capabilities-of-microsoft-azure-active-directory/03_identity-protection-and-governance-capabilities-of-azure-ad/01_identity-governance-in-azure-ad.mp4 22.4 MB
  • mp4Coursera - Advanced Cybersecurity Concepts and Capstone Project 2024-1/01_threat-modeling/04_azure-and-threat-modeling/02_threat-modeling-for-azure-virtual-networks.mp4 22.3 MB
  • mp4Coursera - Cybersecurity Solutions and Microsoft Defender 2024-1/01_azure-basic-security-capabilities/02_distributed-denial-of-service-ddos-protection/01_azure-ddos-protection-overview.mp4 22.3 MB
【其他】 The Personal Cybersecurity Manual
收录时间:2024-12-31 文档个数:2 文档大小:125.8 MB 最近下载:2025-04-28 人气:242 磁力链接
  • m4bThe Personal Cybersecurity Manual.m4b 125.8 MB
  • jpgcover.jpg 33.6 kB
【影视】 Lynda - Risk Management for IT and Cybersecurity Managers
收录时间:2024-12-28 文档个数:22 文档大小:509.8 MB 最近下载:2025-05-14 人气:283 磁力链接
  • mp402 What Is Risk_/002 Types of risk.mp4 77.3 MB
  • mp401 Introduction/001 Risk management for IT and security managers.mp4 71.2 MB
  • mp404 Calculating Risk/003 Quantitative risk measurement.mp4 45.5 MB
  • mp402 What Is Risk_/001 What is risk_.mp4 41.2 MB
  • mp404 Calculating Risk/004 Case study_ Equifax.mp4 33.7 MB
  • mp402 What Is Risk_/003 Types of threats.mp4 30.6 MB
  • mp404 Calculating Risk/002 Qualitative risk measurement.mp4 29.9 MB
  • mp403 What Can You Do with Risk_/007 Risk responses.mp4 25.1 MB
  • mp403 What Can You Do with Risk_/006 Risk controls.mp4 24.4 MB
  • mp403 What Can You Do with Risk_/002 Risk mitigation.mp4 23.5 MB
  • mp402 What Is Risk_/004 When risk management fails.mp4 21.4 MB
  • mp403 What Can You Do with Risk_/005 Risk acceptance.mp4 20.3 MB
  • mp404 Calculating Risk/001 Calculating risk.mp4 17.8 MB
  • mp403 What Can You Do with Risk_/004 Risk avoidance.mp4 15.3 MB
  • mp403 What Can You Do with Risk_/003 Risk transference.mp4 14.1 MB
  • mp405 Conclusion/001 Next steps.mp4 10.5 MB
  • mp403 What Can You Do with Risk_/001 What can you do with risk_.mp4 7.1 MB
  • zipEx_Files_Risk_Management_IT_Cybersecurity.zip 705.0 kB
  • url0. Websites you may like/0. (1Hack.Us) Premium Tutorials-Guides-Articles _ Community based Forum.url 377 Bytes
  • url0. Websites you may like/1. (FreeCoursesOnline.Me) Download Udacity, Masterclass, Lynda, PHLearn, Pluralsight Free.url 286 Bytes
共14页 上一页 1 2 3 4 5 下一页