为您索检到268条磁力链接,耗时0毫秒。
- 【压缩文件】 A Hacker's Guide to Internet Safety and Cybersecurity
-
收录时间:2018-07-25
文档个数:4
文档大小:2.5 GB
最近下载:2025-05-16
人气:2853
磁力链接
TutsGalaxy.com.txt 41 Bytes
Torrent_downloaded_from_Demonoid_-_www.demonoid.pw_.txt 59 Bytes
Read Me.txt 80 Bytes
A Hacker's Guide to Internet Safety and Cybersecurity.zip 2.5 GB
猜你喜欢:
Hacker
Cybersecurity
Safety
Guide
Internet
- 【影视】 Lynda - Cybersecurity for Small and Medium Businesses Essential Training
-
收录时间:2018-07-25
文档个数:66
文档大小:358.3 MB
最近下载:2025-05-15
人气:1587
磁力链接
1.Introduction/01.Welcome.en.srt 2.1 kB
1.Introduction/01.Welcome.mp4 21.9 MB
1.Introduction/02.What you should know.en.srt 1.5 kB
1.Introduction/02.What you should know.mp4 5.0 MB
2.1. The Basics/03.Why you should care.en.srt 6.7 kB
2.1. The Basics/03.Why you should care.mp4 31.6 MB
2.1. The Basics/04.Physical security vs. cybersecurity.en.srt 1.9 kB
2.1. The Basics/04.Physical security vs. cybersecurity.mp4 4.8 MB
2.1. The Basics/05.Anyone can improve the cybersecurity of a business.en.srt 3.4 kB
2.1. The Basics/05.Anyone can improve the cybersecurity of a business.mp4 9.1 MB
2.1. The Basics/06.What are the cybersecurity threat actions facing businesses.en.srt 4.5 kB
2.1. The Basics/06.What are the cybersecurity threat actions facing businesses.mp4 6.9 MB
2.1. The Basics/07.What are the cybersecurity threats.en.srt 6.4 kB
2.1. The Basics/07.What are the cybersecurity threats.mp4 14.6 MB
2.1. The Basics/08.A five-step process to improve cybersecurity.en.srt 3.9 kB
2.1. The Basics/08.A five-step process to improve cybersecurity.mp4 7.2 MB
3.2. Identify/09.Step #1 - Identify key assets.en.srt 3.1 kB
3.2. Identify/09.Step #1 - Identify key assets.mp4 9.5 MB
3.2. Identify/10.Inventory sheet - Data and devices.en.srt 1.9 kB
3.2. Identify/10.Inventory sheet - Data and devices.mp4 3.1 MB
猜你喜欢:
Training
Medium
Cybersecurity
Lynda
Businesses
Small
Essential
- 【压缩文件】 Packt - Cybersecurity Attacks (Red Team Activity).7z
-
收录时间:2018-06-09
文档个数:1
文档大小:630.7 MB
最近下载:2024-08-11
人气:159
磁力链接
Packt - Cybersecurity Attacks (Red Team Activity).7z 630.7 MB
猜你喜欢:
Packt
Cybersecurity
Team
Attacks
Activity
7z
Red
- 【影视】 CYBERSECURITY COSE NELL'ALTRO MONDO - SPECIALE TG5.mkv
-
收录时间:2018-04-09
文档个数:1
文档大小:733.6 MB
最近下载:2025-05-14
人气:1433
磁力链接
CYBERSECURITY COSE NELL'ALTRO MONDO - SPECIALE TG5.mkv 733.6 MB
猜你喜欢:
ALTRO
COSE
SPECIALE
TG5
CYBERSECURITY
NELL
mkv
MONDO
- 【影视】 [FreeTutorials.Us] cybersecurity-ultimate-ethical-hacking-boot-camp
-
收录时间:2017-08-24
文档个数:53
文档大小:3.6 GB
最近下载:2025-05-16
人气:3681
磁力链接
01 Introduction to the Ultimate Ethical Hacking Boot Camp/attached_files/001 Welcome to the Ultimate Ethical Hacking Boot Camp/Equipment.pdf 131.3 kB
02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/Kali.Backgrounds.jpg 478.6 kB
02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/Server.2008.Backgrounds.jpg 480.5 kB
02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/win7.Backgrounds.jpg 480.5 kB
02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/win8.Backgrounds.jpg 480.2 kB
02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/winxp.Backgrounds.jpg 480.2 kB
08 Password Cracking/attached_files/037 Windows Password Cracking/Wordlist-Resources.pdf 59.0 kB
01 Introduction to the Ultimate Ethical Hacking Boot Camp/001 Welcome to the Ultimate Ethical Hacking Boot Camp.mp4 71.7 MB
01 Introduction to the Ultimate Ethical Hacking Boot Camp/002 What is Ethical Hacking.mp4 149.9 MB
01 Introduction to the Ultimate Ethical Hacking Boot Camp/003 Careers for Ethical Hackers.mp4 48.9 MB
01 Introduction to the Ultimate Ethical Hacking Boot Camp/004 Wireless Lab Setup Hack.mp4 62.6 MB
01 Introduction to the Ultimate Ethical Hacking Boot Camp/005 Wireless Hacking Module Disclaimer.mp4 38.8 MB
01 Introduction to the Ultimate Ethical Hacking Boot Camp/006 Interview Oracle Shodan CNN.mp4 278.0 MB
02 Hacking Lab Setup - Windows Mac Instructions/007 Introduction to Lab Setup.mp4 31.3 MB
02 Hacking Lab Setup - Windows Mac Instructions/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines..mp4 20.7 MB
02 Hacking Lab Setup - Windows Mac Instructions/009 Installing Windows XP.mp4 133.1 MB
02 Hacking Lab Setup - Windows Mac Instructions/010 Installing Server 2008.mp4 7.7 MB
02 Hacking Lab Setup - Windows Mac Instructions/011 Installing Kali Linux from ISO.mp4 33.5 MB
02 Hacking Lab Setup - Windows Mac Instructions/012 Installing Kali Linux Prebuild Virtual Machine.mp4 29.4 MB
02 Hacking Lab Setup - Windows Mac Instructions/013 Installing Windows 7.mp4 9.8 MB
猜你喜欢:
ethical
FreeTutorials
cybersecurity
camp
boot
Us
ultimate
hacking
- 【文档书籍】 Cybersecurity presented by Wiley
-
收录时间:2017-08-06
文档个数:438
文档大小:1.5 GB
最近下载:2025-05-15
人气:1540
磁力链接
pdf/applied_cryptography_protocols_algorithms_and_source_code_in_c.pdf 164.8 MB
Malware Analyst's Cookbook DVD/9780470613030/8/7/8-7.mov 131.8 MB
Malware Analyst's Cookbook DVD/9780470613030/16/8/16-8.mov 93.9 MB
Malware Analyst's Cookbook DVD/9780470613030/6/9/6-9.mov 71.4 MB
Malware Analyst's Cookbook DVD/9780470613030/17/10/17-10.mov 70.3 MB
Malware Analyst's Cookbook DVD/9780470613030/6/11/6-11.mov 64.0 MB
Malware Analyst's Cookbook DVD/9780470613030/8/1/8-1.mov 59.6 MB
Malware Analyst's Cookbook DVD/9780470613030/13/4/13-4.mov 55.4 MB
Malware Analyst's Cookbook DVD/9780470613030/15/6/prolaco.vmem.zip 45.3 MB
Malware Analyst's Cookbook DVD/9780470613030/16/7/laqma.vmem.zip 44.5 MB
Malware Analyst's Cookbook DVD/9780470613030/16/6/coreflood.vmem.zip 44.4 MB
Malware Analyst's Cookbook DVD/9780470613030/17/1/zeus.vmem.zip 43.5 MB
Malware Analyst's Cookbook DVD/9780470613030/16/6/silentbanker.vmem.zip 43.5 MB
Malware Analyst's Cookbook DVD/9780470613030/17/6/be2.vmem.zip 42.8 MB
Malware Analyst's Cookbook DVD/9780470613030/17/11/sality.vmem.zip 42.8 MB
Malware Analyst's Cookbook DVD/9780470613030/17/8/tigger.vmem.zip 42.1 MB
pdf/ceh_v9_certified_ethical_hacker_study_guide.pdf 38.9 MB
Malware Analyst's Cookbook DVD/9780470613030/9/5/9-5.mov 30.5 MB
Malware Analyst's Cookbook DVD/9780470613030/6/1/6-1.mov 30.3 MB
pdf/unauthorised_access_physical_penetration_testing_for_it_security_teams.pdf 27.2 MB
猜你喜欢:
Cybersecurity
Wiley
presented
- 【文档书籍】 Cybersecurity presented by Wiley
-
收录时间:2017-08-04
文档个数:436
文档大小:1.4 GB
最近下载:2025-05-10
人气:177
磁力链接
pdf/applied_cryptography_protocols_algorithms_and_source_code_in_c.pdf 164.8 MB
Malware Analyst's Cookbook DVD/9780470613030/8/7/8-7.mov 131.8 MB
Malware Analyst's Cookbook DVD/9780470613030/16/8/16-8.mov 93.9 MB
Malware Analyst's Cookbook DVD/9780470613030/6/9/6-9.mov 71.4 MB
Malware Analyst's Cookbook DVD/9780470613030/17/10/17-10.mov 70.3 MB
Malware Analyst's Cookbook DVD/9780470613030/6/11/6-11.mov 64.0 MB
Malware Analyst's Cookbook DVD/9780470613030/8/1/8-1.mov 59.6 MB
Malware Analyst's Cookbook DVD/9780470613030/13/4/13-4.mov 55.4 MB
Malware Analyst's Cookbook DVD/9780470613030/15/6/prolaco.vmem.zip 45.3 MB
Malware Analyst's Cookbook DVD/9780470613030/16/7/laqma.vmem.zip 44.5 MB
Malware Analyst's Cookbook DVD/9780470613030/16/6/coreflood.vmem.zip 44.4 MB
Malware Analyst's Cookbook DVD/9780470613030/17/1/zeus.vmem.zip 43.5 MB
Malware Analyst's Cookbook DVD/9780470613030/16/6/silentbanker.vmem.zip 43.5 MB
Malware Analyst's Cookbook DVD/9780470613030/17/6/be2.vmem.zip 42.8 MB
Malware Analyst's Cookbook DVD/9780470613030/17/11/sality.vmem.zip 42.8 MB
Malware Analyst's Cookbook DVD/9780470613030/17/8/tigger.vmem.zip 42.1 MB
pdf/ceh_v9_certified_ethical_hacker_study_guide.pdf 38.9 MB
Malware Analyst's Cookbook DVD/9780470613030/9/5/9-5.mov 30.5 MB
Malware Analyst's Cookbook DVD/9780470613030/6/1/6-1.mov 30.3 MB
pdf/unauthorised_access_physical_penetration_testing_for_it_security_teams.pdf 27.2 MB
猜你喜欢:
Cybersecurity
Wiley
presented
- 【影视】 Lynda - Cybersecurity for IT Professionals
-
收录时间:2017-07-25
文档个数:45
文档大小:303.6 MB
最近下载:2025-05-16
人气:5438
磁力链接
00. Introduction/00_01 - Welcome.mp4 6.3 MB
00. Introduction/00_02 - What you should know before watching this course.mp4 869.2 kB
00. Introduction/00_03 - Using the exercise files.mp4 950.7 kB
01. Why Cybersecurity/01_01 - Hackers and the kill chain.mp4 14.3 MB
01. Why Cybersecurity/01_02 - The Stuxnet kill chain.mp4 8.9 MB
01. Why Cybersecurity/01_03 - Common forms of cybersecurity attack.mp4 14.1 MB
02. Antivirus/02_01 - Viruses, spyware, and adware.mp4 4.0 MB
02. Antivirus/02_02 - Using Windows Defender.mp4 3.1 MB
02. Antivirus/02_03 - Setting up real-time protection.mp4 1.0 MB
02. Antivirus/02_04 - Scanning with Windows Defender.mp4 4.3 MB
02. Antivirus/02_05 - Modifying antivirus settings in Windows Defender.mp4 5.8 MB
02. Antivirus/02_06 - Scheduling a scan with Windows Defender.mp4 9.7 MB
02. Antivirus/02_07 - Using Windows Defender offline.mp4 1.9 MB
02. Antivirus/02_08 - Exploring antivirus on Linux.mp4 1.7 MB
03. Personal Firewalls/03_01 - Why firewalls.mp4 1.5 MB
03. Personal Firewalls/03_02 - Using the Microsoft Windows Firewall.mp4 12.9 MB
03. Personal Firewalls/03_03 - Setting up advanced security notifications.mp4 9.5 MB
03. Personal Firewalls/03_04 - Setting up detailed rules.mp4 10.9 MB
03. Personal Firewalls/03_05 - Managing and analyzing log files with ZedLan.mp4 8.4 MB
03. Personal Firewalls/03_06 - Introducing iptables in Linux.mp4 10.7 MB
猜你喜欢:
Cybersecurity
Lynda
Professionals
- 【影视】 Lynda - Cybersecurity Foundations
-
收录时间:2017-07-23
文档个数:28
文档大小:301.1 MB
最近下载:2025-05-16
人气:1753
磁力链接
00. Introduction/00_01 - Welcome.mp4 5.8 MB
00. Introduction/00_02 - What you should know.mp4 2.0 MB
01. Cybersecurity Foundations/01_01 - Understanding the NIST cybersecurity framework.mp4 12.8 MB
01. Cybersecurity Foundations/01_02 - Dissecting cyber risk.mp4 13.3 MB
01. Cybersecurity Foundations/01_03 - Unpacking COBIT 5.mp4 10.5 MB
01. Cybersecurity Foundations/01_04 - Looking closer at DSS05.mp4 8.2 MB
01. Cybersecurity Foundations/01_05 - Implementing control frameworks.mp4 14.6 MB
01. Cybersecurity Foundations/01_06 - Dissecting the payment card industry and PCI DSS.mp4 14.7 MB
01. Cybersecurity Foundations/01_07 - Exploring the Cyber Essentials framework.mp4 9.4 MB
02. Cybersecurity Threats/02_01 - Breaking down the cybersecurity kill chain.mp4 8.2 MB
02. Cybersecurity Threats/02_02 - Dissecting security threats.mp4 11.7 MB
02. Cybersecurity Threats/02_03 - Exploring cybercrime as an industry.mp4 10.1 MB
02. Cybersecurity Threats/02_04 - Hiding malware through cloaking and alternate data streams.mp4 9.0 MB
02. Cybersecurity Threats/02_05 - Using callbacks to capture keystrokes.mp4 9.7 MB
02. Cybersecurity Threats/02_06 - Hiding malware with rootkits.mp4 9.8 MB
02. Cybersecurity Threats/02_07 - Understanding advanced persistent threats (APTs).mp4 13.5 MB
02. Cybersecurity Threats/02_08 - Exploring ransomware.mp4 8.4 MB
03. Security Architecture/03_01 - Describing security requirements.mp4 14.9 MB
03. Security Architecture/03_02 - Architecting security risk.mp4 13.4 MB
03. Security Architecture/03_03 - Selecting security controls.mp4 8.5 MB
猜你喜欢:
Cybersecurity
Lynda
Foundations
- 【影视】 Lynda - Cybersecurity with Cloud Computing
-
收录时间:2017-07-16
文档个数:39
文档大小:371.6 MB
最近下载:2025-05-15
人气:3619
磁力链接
00. Introduction/00_01 - Welcome.mp4 17.4 MB
00. Introduction/00_02 - What you should know.mp4 861.2 kB
00. Introduction/00_03 - Reference sites.mp4 16.6 MB
00. Introduction/00_04 - Using the exercise files.mp4 278.9 kB
01. Cloud Fundamentals/01_01 - Defining the essential characteristics of cloud.mp4 15.8 MB
01. Cloud Fundamentals/01_02 - Understanding infrastructure as a service.mp4 11.9 MB
01. Cloud Fundamentals/01_03 - Unraveling platform as a service.mp4 6.8 MB
01. Cloud Fundamentals/01_04 - Comprehending software as a service.mp4 8.6 MB
01. Cloud Fundamentals/01_05 - Discovering deployment models.mp4 11.4 MB
01. Cloud Fundamentals/01_06 - Identifying cloud incidents.mp4 15.2 MB
01. Cloud Fundamentals/01_07 - Dissecting the anatomy of a service failure.mp4 8.8 MB
01. Cloud Fundamentals/01_08 - Deciphering the anatomy of a business failure.mp4 8.3 MB
01. Cloud Fundamentals/01_09 - Defining trust models for cloud.mp4 14.0 MB
02. Cloud Security Guidance/02_01 - Identifying governance and risk.mp4 5.5 MB
02. Cloud Security Guidance/02_02 - Complying with legal and audit requrements.mp4 13.1 MB
02. Cloud Security Guidance/02_03 - Managing information and data security.mp4 15.6 MB
02. Cloud Security Guidance/02_04 - Providing portability and interoperability.mp4 7.5 MB
02. Cloud Security Guidance/02_05 - Comparing traditional IT, BCP, and DR.mp4 12.0 MB
02. Cloud Security Guidance/02_06 - Understanding data center operations.mp4 5.4 MB
02. Cloud Security Guidance/02_07 - Managing incident response.mp4 12.9 MB
猜你喜欢:
Cybersecurity
Lynda
Cloud
Computing
- 【影视】 Pluralsight - Cybersecurity Threats: Ransomware
-
收录时间:2017-06-08
文档个数:37
文档大小:388.1 MB
最近下载:2025-05-16
人气:2825
磁力链接
3. Ransomware Entry Points/15. Embedded Hyperlinks, Websites_downloads, and Drive-by Infections.mp4 6.2 MB
3. Ransomware Entry Points/16. Why Common Exploit Kits Are Used.mp4 5.4 MB
3. Ransomware Entry Points/14. Phishing and Email Attachments.mp4 10.6 MB
3. Ransomware Entry Points/18. Summary.mp4 2.8 MB
3. Ransomware Entry Points/12. Overview.mp4 2.7 MB
3. Ransomware Entry Points/13. The 5 Classic Infection Vectors.mp4 3.1 MB
3. Ransomware Entry Points/17. Command and Callback (C&C) and Indicators of Compromise.mp4 7.0 MB
4. Incident Response - Detection and Containment/21. Detecting an Attack.mp4 7.3 MB
4. Incident Response - Detection and Containment/20. Indicators of Compromise.mp4 5.3 MB
4. Incident Response - Detection and Containment/23. Summary.mp4 1.7 MB
4. Incident Response - Detection and Containment/19. Overview.mp4 2.6 MB
4. Incident Response - Detection and Containment/22. Containing the Attack.mp4 9.0 MB
6. Countermeasures and Preparing Your Incident Response/35. Next Generation Anti-virus_Anti-malware.mp4 5.6 MB
6. Countermeasures and Preparing Your Incident Response/37. Summary.mp4 5.5 MB
6. Countermeasures and Preparing Your Incident Response/33. Defending a Ransomware Attack.mp4 11.4 MB
6. Countermeasures and Preparing Your Incident Response/34. Protecting a Windows Network.mp4 8.0 MB
6. Countermeasures and Preparing Your Incident Response/32. Overview.mp4 5.5 MB
6. Countermeasures and Preparing Your Incident Response/36. Lessons Learned and Your Incident Response Plan.mp4 10.9 MB
2. What Is Ransomware/06. How Big Is the Problem.mp4 15.1 MB
2. What Is Ransomware/02. Overview.mp4 4.1 MB
猜你喜欢:
Cybersecurity
Pluralsight
Threats
Ransomware
- 【其他】 Lynda.com.Practical.Cybersecurity-ELOHiM
-
收录时间:2017-05-15
文档个数:18
文档大小:232.2 MB
最近下载:2018-12-01
人气:142
磁力链接
e-lprecybs.r00 15.0 MB
e-lprecybs.r01 15.0 MB
e-lprecybs.r02 15.0 MB
e-lprecybs.r03 15.0 MB
e-lprecybs.r04 15.0 MB
e-lprecybs.r05 15.0 MB
e-lprecybs.r06 15.0 MB
e-lprecybs.r07 15.0 MB
e-lprecybs.r08 15.0 MB
e-lprecybs.r09 15.0 MB
e-lprecybs.r10 15.0 MB
e-lprecybs.r11 15.0 MB
e-lprecybs.r12 15.0 MB
e-lprecybs.r13 15.0 MB
e-lprecybs.r14 7.2 MB
e-lprecybs.rar 15.0 MB
e-lprecybs.sfv 400 Bytes
elohim.nfo 2.6 kB
猜你喜欢:
Practical
Lynda
com
ELOHiM
Cybersecurity
- 【影视】 Pluralsight Cybersecurity Threats Ransomware
-
收录时间:2017-05-13
文档个数:38
文档大小:388.1 MB
最近下载:2025-05-15
人气:1701
磁力链接
1. Course Overview/01. Course Overview.mp4 5.4 MB
2. What Is Ransomware/09. Demo of Real World Ransomware Attack.mp4 52.0 MB
2. What Is Ransomware/03. Definition and Types of Ransomware.mp4 20.3 MB
2. What Is Ransomware/04. The Ransomware Timeline.mp4 15.2 MB
2. What Is Ransomware/06. How Big Is the Problem.mp4 15.1 MB
2. What Is Ransomware/07. Ransomware Victims.mp4 11.7 MB
2. What Is Ransomware/10. Variations of Ransomware.mp4 6.4 MB
2. What Is Ransomware/05. What Is Ransomware 30,000 ft. View.mp4 5.9 MB
2. What Is Ransomware/02. Overview.mp4 4.1 MB
2. What Is Ransomware/11. Summary.mp4 2.5 MB
2. What Is Ransomware/08. Module Progress Checkpoint.mp4 617.9 kB
3. Ransomware Entry Points/14. Phishing and Email Attachments.mp4 10.6 MB
3. Ransomware Entry Points/17. Command and Callback (C&C) and Indicators of Compromise.mp4 7.0 MB
3. Ransomware Entry Points/15. Embedded Hyperlinks, Websites_downloads, and Drive-by Infections.mp4 6.2 MB
3. Ransomware Entry Points/16. Why Common Exploit Kits Are Used.mp4 5.4 MB
3. Ransomware Entry Points/13. The 5 Classic Infection Vectors.mp4 3.1 MB
3. Ransomware Entry Points/18. Summary.mp4 2.8 MB
3. Ransomware Entry Points/12. Overview.mp4 2.7 MB
4. Incident Response - Detection and Containment/22. Containing the Attack.mp4 9.0 MB
4. Incident Response - Detection and Containment/21. Detecting an Attack.mp4 7.3 MB
猜你喜欢:
Cybersecurity
Pluralsight
Threats
Ransomware
- 【压缩文件】 Pluralsight.Cybersecurity.Threats.Ransomware-[www.allfiles.cf]-TPTORRENTS.zip
-
收录时间:2017-04-29
文档个数:1
文档大小:373.3 MB
最近下载:2025-05-07
人气:1589
磁力链接
Pluralsight.Cybersecurity.Threats.Ransomware-[www.allfiles.cf]-TPTORRENTS.zip 373.3 MB
猜你喜欢:
Pluralsight
Threats
zip
allfiles
Ransomware
Cybersecurity
TPTORRENTS
www
cf
- 【影视】 Cybersecurity Threats Ransomware
-
收录时间:2017-04-29
文档个数:39
文档大小:405.4 MB
最近下载:2025-05-15
人气:3100
磁力链接
01. Course Overview/01. Intro.mp4 5.4 MB
02. What Is Ransomware/01. Overview.mp4 4.1 MB
02. What Is Ransomware/02. Definition and Types of Ransomware.mp4 20.3 MB
02. What Is Ransomware/03. The Ransomware Timeline.mp4 15.2 MB
02. What Is Ransomware/04. What Is Ransomware 30,000 ft. View.mp4 5.9 MB
02. What Is Ransomware/05. How Big Is the Problem.mp4 15.1 MB
02. What Is Ransomware/06. Ransomware Victims.mp4 11.7 MB
02. What Is Ransomware/07. Module Progress Checkpoint.mp4 617.9 kB
02. What Is Ransomware/08. Demo of Real World Ransomware Attack.mp4 52.0 MB
02. What Is Ransomware/09. Variations of Ransomware.mp4 6.4 MB
02. What Is Ransomware/10. Summary.mp4 2.5 MB
03. Ransomware Entry Points/01. Overview.mp4 2.7 MB
03. Ransomware Entry Points/02. The 5 Classic Infection Vectors.mp4 3.1 MB
03. Ransomware Entry Points/03. Phishing and Email Attachments.mp4 10.6 MB
03. Ransomware Entry Points/04. Embedded Hyperlinks, Websitesdownloads, and Drive-by Infections.mp4 6.2 MB
03. Ransomware Entry Points/05. Why Common Exploit Kits Are Used.mp4 5.4 MB
03. Ransomware Entry Points/06. Command and Callback (C&C) and Indicators of Compromise.mp4 7.0 MB
03. Ransomware Entry Points/07. Summary.mp4 2.8 MB
04. Incident Response Detection and Containment/01. Overview.mp4 2.6 MB
04. Incident Response Detection and Containment/02. Indicators of Compromise.mp4 5.3 MB
猜你喜欢:
Cybersecurity
Threats
Ransomware
- 【音乐】 TTC - Thinking about Cybersecurity
-
收录时间:2017-03-26
文档个数:19
文档大小:422.8 MB
最近下载:2025-05-15
人气:2155
磁力链接
TGC_9523_Lect10_Cybersecurity.mp3 24.9 MB
TGC_9523_Lect14_Cybersecurity.mp3 24.7 MB
TGC_9523_Lect18_Cybersecurity.mp3 24.6 MB
TGC_9523_Lect08_Cybersecurity.mp3 23.8 MB
TGC_9523_Lect05_Cybersecurity.mp3 23.8 MB
TGC_9523_Lect13_Cybersecurity.mp3 23.6 MB
TGC_9523_Lect11_Cybersecurity.mp3 23.5 MB
TGC_9523_Lect17_Cybersecurity.mp3 23.4 MB
TGC_9523_Lect01_Cybersecurity.mp3 23.4 MB
TGC_9523_Lect04_Cybersecurity.mp3 23.2 MB
TGC_9523_Lect09_Cybersecurity.mp3 22.9 MB
TGC_9523_Lect12_Cybersecurity.mp3 22.7 MB
TGC_9523_Lect15_Cybersecurity.mp3 22.7 MB
TGC_9523_Lect16_Cybersecurity.mp3 22.6 MB
TGC_9523_Lect06_Cybersecurity.mp3 22.5 MB
TGC_9523_Lect07_Cybersecurity.mp3 22.4 MB
TGC_9523_Lect02_Cybersecurity.mp3 21.9 MB
TGC_9523_Lect03_Cybersecurity.mp3 21.5 MB
Course Guidebook.pdf 4.7 MB
猜你喜欢:
TTC
Thinking
about
Cybersecurity
- 【其他】 TTC - Thinking about Cybersecurity audio book - sup3r edition
-
收录时间:2017-03-17
文档个数:19
文档大小:143.9 MB
最近下载:2025-05-14
人气:590
磁力链接
Lect.10 International Governance and the Internet.m4a 8.3 MB
Lect.01 Stuxnet—The First Cyber Guided Missile.m4a 7.8 MB
Lect.02 The Incredible Scope of Cyberspace.m4a 7.3 MB
Lect.03 The Five Gateways of Internet Vulnerability.m4a 7.2 MB
Lect.04 Of Viruses, Botnets, and Logic Bombs .m4a 7.7 MB
Lect.05 The Problem of Identity on the Network.m4a 7.9 MB
Lect.06 Cyber Fraud, Theft, and Organized Crime.m4a 7.5 MB
Lect.07 Hacktivists and Insurgency.m4a 7.5 MB
Lect.08 Nations at Cyber War.m4a 7.9 MB
Lect.09 Government Regulation of Cyberspace.m4a 7.6 MB
Course Guidebook.pdf 4.7 MB
Lect.11 The Constitution and Cyberspace.m4a 7.8 MB
Lect.12 Big Data—''They'' Know Everything about You.m4a 7.6 MB
Lect.13 Privacy for the Cyber Age.m4a 7.9 MB
Lect.14 Listening In and Going Dark.m4a 8.2 MB
Lect.15 The Devil in the Chips-Hardware Failures.m4a 7.6 MB
Lect.16 Protecting Yourself in Cyberspace.m4a 7.5 MB
Lect.17 Critical Infrastructure and Resiliency.m4a 7.8 MB
Lect.18 Looking Forward-What Does the Future Hold.m4a 8.2 MB
猜你喜欢:
about
edition
Thinking
Cybersecurity
book
TTC
sup3r
audio
- 【影视】 [Lynda] Practical Cybersecurity-KTR
-
收录时间:2017-02-26
文档个数:44
文档大小:242.5 MB
最近下载:2025-05-13
人气:1594
磁力链接
8. Monitoring Network Activity/164982_08_03_XR15_packets.mp4 13.1 MB
7. Checking for Common Mistakes in Web Apps/164982_07_02_XR15_scan.mp4 11.9 MB
3. Personal Firewalls/164982_03_02_XR15_mswf.mp4 10.7 MB
3. Personal Firewalls/164982_03_06_XR15_iptables.mp4 9.8 MB
3. Personal Firewalls/164982_03_04_XR15_advrules.mp4 9.5 MB
7. Checking for Common Mistakes in Web Apps/164982_07_01_XR15_intro.mp4 9.4 MB
6. Checking Hosts for Known Vulnerabilities/164982_06_04_XR15_scan.mp4 8.6 MB
1. Why Cybersecurity/164982_01_03_XR15_attack.mp4 8.6 MB
1. Why Cybersecurity/164982_01_01_XR15_cyber.mp4 8.4 MB
8. Monitoring Network Activity/164982_08_05_XR151_intruder.mp4 8.3 MB
8. Monitoring Network Activity/164982_08_04_XR15_filters.mp4 8.2 MB
2. Antivirus/164982_02_06_XR15_schedule.mp4 8.2 MB
3. Personal Firewalls/164982_03_03_XR15_advfw.mp4 7.9 MB
0. Introduction/164982_00_01_WX30_welcome.mp4 6.9 MB
3. Personal Firewalls/164982_03_05_XR15_zedlan.mp4 6.7 MB
4. Knowing What Is on Your Network/164982_04_05_XR15_zenmap.mp4 6.3 MB
5. Network Communications and Detecting Intruders/164982_05_04_XR15_honeypot.mp4 6.0 MB
5. Network Communications and Detecting Intruders/164982_05_02_XR15_filexfer.mp4 5.8 MB
8. Monitoring Network Activity/164982_08_02_XR15_capture.mp4 5.6 MB
2. Antivirus/164982_02_05_XR15_avsettings.mp4 5.5 MB
猜你喜欢:
Practical
Lynda
KTR
Cybersecurity
- 【安装包】 Eset.Cybersecurity.Pro.v6.3.70.1
-
收录时间:2017-02-25
文档个数:4
文档大小:98.7 MB
最近下载:2024-12-16
人气:91
磁力链接
Torrent downloaded from www.DNoid.me - Demonoid (1).txt 56 Bytes
Serials.txt 438 Bytes
Eset.Cybersecurity.Pro.v6.3.70.1..nfo 1.5 kB
eset_cybersecurity_pro_.dmg.exe 98.7 MB
猜你喜欢:
Cybersecurity
Pro
Eset
3.70
v6
- 【影视】 LYNDA FOUNDATIONS OF CYBERSECURITY TUTORIAL
-
收录时间:2017-02-24
文档个数:27
文档大小:300.9 MB
最近下载:2024-09-26
人气:1087
磁力链接
01. Introduction/01_01-Welcome.mp4 6.5 MB
01. Introduction/01_02-What you should know.mp4 2.0 MB
02. Cybersecurity Foundations/02_06-Dissecting the payment card industry and PCI DSS.mp4 14.6 MB
02. Cybersecurity Foundations/02_05-Implementing control frameworks.mp4 14.3 MB
02. Cybersecurity Foundations/02_02-Dissecting cyber risk.mp4 13.1 MB
02. Cybersecurity Foundations/02_01-Understanding the NIST cybersecurity framework.mp4 12.6 MB
02. Cybersecurity Foundations/02_03-Unpacking COBIT 5.mp4 10.3 MB
02. Cybersecurity Foundations/02_07-Exploring the Cyber Essentials framework.mp4 9.3 MB
02. Cybersecurity Foundations/02_04-Looking closer at DSS05.mp4 8.1 MB
03. Cybersecurity Threats/03_07-Understanding advanced persistent threats APTs.mp4 13.5 MB
03. Cybersecurity Threats/03_02-Dissecting security threats.mp4 11.6 MB
03. Cybersecurity Threats/03_03-Exploring cybercrime as an industry.mp4 9.9 MB
03. Cybersecurity Threats/03_05-Using callbacks to capture keystrokes.mp4 9.8 MB
03. Cybersecurity Threats/03_06-Hiding malware with rootkits.mp4 9.8 MB
03. Cybersecurity Threats/03_04-Hiding malware through cloaking and alternate data streams.mp4 9.0 MB
03. Cybersecurity Threats/03_08-Exploring ransomware.mp4 8.4 MB
03. Cybersecurity Threats/03_01-Breaking down the cybersecurity kill chain.mp4 8.1 MB
04. Security Architecture/04_04-Managing user access and identity.mp4 20.7 MB
04. Security Architecture/04_05-Implementing preventative security.mp4 18.8 MB
04. Security Architecture/04_06-Monitoring and alerts.mp4 15.7 MB
猜你喜欢:
CYBERSECURITY
LYNDA
TUTORIAL
FOUNDATIONS