磁力管家

磁力管家
为您索检到268条磁力链接,耗时0毫秒。 rss

分享给好友

【压缩文件】 A Hacker's Guide to Internet Safety and Cybersecurity
收录时间:2018-07-25 文档个数:4 文档大小:2.5 GB 最近下载:2025-05-16 人气:2853 磁力链接
  • txtTutsGalaxy.com.txt 41 Bytes
  • txtTorrent_downloaded_from_Demonoid_-_www.demonoid.pw_.txt 59 Bytes
  • txtRead Me.txt 80 Bytes
  • zipA Hacker's Guide to Internet Safety and Cybersecurity.zip 2.5 GB
【影视】 Lynda - Cybersecurity for Small and Medium Businesses Essential Training
收录时间:2018-07-25 文档个数:66 文档大小:358.3 MB 最近下载:2025-05-15 人气:1587 磁力链接
  • srt1.Introduction/01.Welcome.en.srt 2.1 kB
  • mp41.Introduction/01.Welcome.mp4 21.9 MB
  • srt1.Introduction/02.What you should know.en.srt 1.5 kB
  • mp41.Introduction/02.What you should know.mp4 5.0 MB
  • srt2.1. The Basics/03.Why you should care.en.srt 6.7 kB
  • mp42.1. The Basics/03.Why you should care.mp4 31.6 MB
  • srt2.1. The Basics/04.Physical security vs. cybersecurity.en.srt 1.9 kB
  • mp42.1. The Basics/04.Physical security vs. cybersecurity.mp4 4.8 MB
  • srt2.1. The Basics/05.Anyone can improve the cybersecurity of a business.en.srt 3.4 kB
  • mp42.1. The Basics/05.Anyone can improve the cybersecurity of a business.mp4 9.1 MB
  • srt2.1. The Basics/06.What are the cybersecurity threat actions facing businesses.en.srt 4.5 kB
  • mp42.1. The Basics/06.What are the cybersecurity threat actions facing businesses.mp4 6.9 MB
  • srt2.1. The Basics/07.What are the cybersecurity threats.en.srt 6.4 kB
  • mp42.1. The Basics/07.What are the cybersecurity threats.mp4 14.6 MB
  • srt2.1. The Basics/08.A five-step process to improve cybersecurity.en.srt 3.9 kB
  • mp42.1. The Basics/08.A five-step process to improve cybersecurity.mp4 7.2 MB
  • srt3.2. Identify/09.Step #1 - Identify key assets.en.srt 3.1 kB
  • mp43.2. Identify/09.Step #1 - Identify key assets.mp4 9.5 MB
  • srt3.2. Identify/10.Inventory sheet - Data and devices.en.srt 1.9 kB
  • mp43.2. Identify/10.Inventory sheet - Data and devices.mp4 3.1 MB
【压缩文件】 Packt - Cybersecurity Attacks (Red Team Activity).7z
收录时间:2018-06-09 文档个数:1 文档大小:630.7 MB 最近下载:2024-08-11 人气:159 磁力链接
  • 7zPackt - Cybersecurity Attacks (Red Team Activity).7z 630.7 MB
【影视】 CYBERSECURITY COSE NELL'ALTRO MONDO - SPECIALE TG5.mkv
收录时间:2018-04-09 文档个数:1 文档大小:733.6 MB 最近下载:2025-05-14 人气:1433 磁力链接
  • mkvCYBERSECURITY COSE NELL'ALTRO MONDO - SPECIALE TG5.mkv 733.6 MB
【影视】 [FreeTutorials.Us] cybersecurity-ultimate-ethical-hacking-boot-camp
收录时间:2017-08-24 文档个数:53 文档大小:3.6 GB 最近下载:2025-05-16 人气:3681 磁力链接
  • pdf01 Introduction to the Ultimate Ethical Hacking Boot Camp/attached_files/001 Welcome to the Ultimate Ethical Hacking Boot Camp/Equipment.pdf 131.3 kB
  • jpg02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/Kali.Backgrounds.jpg 478.6 kB
  • jpg02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/Server.2008.Backgrounds.jpg 480.5 kB
  • jpg02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/win7.Backgrounds.jpg 480.5 kB
  • jpg02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/win8.Backgrounds.jpg 480.2 kB
  • jpg02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/winxp.Backgrounds.jpg 480.2 kB
  • pdf08 Password Cracking/attached_files/037 Windows Password Cracking/Wordlist-Resources.pdf 59.0 kB
  • mp401 Introduction to the Ultimate Ethical Hacking Boot Camp/001 Welcome to the Ultimate Ethical Hacking Boot Camp.mp4 71.7 MB
  • mp401 Introduction to the Ultimate Ethical Hacking Boot Camp/002 What is Ethical Hacking.mp4 149.9 MB
  • mp401 Introduction to the Ultimate Ethical Hacking Boot Camp/003 Careers for Ethical Hackers.mp4 48.9 MB
  • mp401 Introduction to the Ultimate Ethical Hacking Boot Camp/004 Wireless Lab Setup Hack.mp4 62.6 MB
  • mp401 Introduction to the Ultimate Ethical Hacking Boot Camp/005 Wireless Hacking Module Disclaimer.mp4 38.8 MB
  • mp401 Introduction to the Ultimate Ethical Hacking Boot Camp/006 Interview Oracle Shodan CNN.mp4 278.0 MB
  • mp402 Hacking Lab Setup - Windows Mac Instructions/007 Introduction to Lab Setup.mp4 31.3 MB
  • mp402 Hacking Lab Setup - Windows Mac Instructions/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines..mp4 20.7 MB
  • mp402 Hacking Lab Setup - Windows Mac Instructions/009 Installing Windows XP.mp4 133.1 MB
  • mp402 Hacking Lab Setup - Windows Mac Instructions/010 Installing Server 2008.mp4 7.7 MB
  • mp402 Hacking Lab Setup - Windows Mac Instructions/011 Installing Kali Linux from ISO.mp4 33.5 MB
  • mp402 Hacking Lab Setup - Windows Mac Instructions/012 Installing Kali Linux Prebuild Virtual Machine.mp4 29.4 MB
  • mp402 Hacking Lab Setup - Windows Mac Instructions/013 Installing Windows 7.mp4 9.8 MB
【文档书籍】 Cybersecurity presented by Wiley
收录时间:2017-08-06 文档个数:438 文档大小:1.5 GB 最近下载:2025-05-15 人气:1540 磁力链接
  • pdfpdf/applied_cryptography_protocols_algorithms_and_source_code_in_c.pdf 164.8 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/8/7/8-7.mov 131.8 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/16/8/16-8.mov 93.9 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/6/9/6-9.mov 71.4 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/17/10/17-10.mov 70.3 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/6/11/6-11.mov 64.0 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/8/1/8-1.mov 59.6 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/13/4/13-4.mov 55.4 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/15/6/prolaco.vmem.zip 45.3 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/16/7/laqma.vmem.zip 44.5 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/16/6/coreflood.vmem.zip 44.4 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/17/1/zeus.vmem.zip 43.5 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/16/6/silentbanker.vmem.zip 43.5 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/17/6/be2.vmem.zip 42.8 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/17/11/sality.vmem.zip 42.8 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/17/8/tigger.vmem.zip 42.1 MB
  • pdfpdf/ceh_v9_certified_ethical_hacker_study_guide.pdf 38.9 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/9/5/9-5.mov 30.5 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/6/1/6-1.mov 30.3 MB
  • pdfpdf/unauthorised_access_physical_penetration_testing_for_it_security_teams.pdf 27.2 MB
【文档书籍】 Cybersecurity presented by Wiley
收录时间:2017-08-04 文档个数:436 文档大小:1.4 GB 最近下载:2025-05-10 人气:177 磁力链接
  • pdfpdf/applied_cryptography_protocols_algorithms_and_source_code_in_c.pdf 164.8 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/8/7/8-7.mov 131.8 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/16/8/16-8.mov 93.9 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/6/9/6-9.mov 71.4 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/17/10/17-10.mov 70.3 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/6/11/6-11.mov 64.0 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/8/1/8-1.mov 59.6 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/13/4/13-4.mov 55.4 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/15/6/prolaco.vmem.zip 45.3 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/16/7/laqma.vmem.zip 44.5 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/16/6/coreflood.vmem.zip 44.4 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/17/1/zeus.vmem.zip 43.5 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/16/6/silentbanker.vmem.zip 43.5 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/17/6/be2.vmem.zip 42.8 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/17/11/sality.vmem.zip 42.8 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/17/8/tigger.vmem.zip 42.1 MB
  • pdfpdf/ceh_v9_certified_ethical_hacker_study_guide.pdf 38.9 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/9/5/9-5.mov 30.5 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/6/1/6-1.mov 30.3 MB
  • pdfpdf/unauthorised_access_physical_penetration_testing_for_it_security_teams.pdf 27.2 MB
【影视】 Lynda - Cybersecurity for IT Professionals
收录时间:2017-07-25 文档个数:45 文档大小:303.6 MB 最近下载:2025-05-16 人气:5438 磁力链接
  • mp400. Introduction/00_01 - Welcome.mp4 6.3 MB
  • mp400. Introduction/00_02 - What you should know before watching this course.mp4 869.2 kB
  • mp400. Introduction/00_03 - Using the exercise files.mp4 950.7 kB
  • mp401. Why Cybersecurity/01_01 - Hackers and the kill chain.mp4 14.3 MB
  • mp401. Why Cybersecurity/01_02 - The Stuxnet kill chain.mp4 8.9 MB
  • mp401. Why Cybersecurity/01_03 - Common forms of cybersecurity attack.mp4 14.1 MB
  • mp402. Antivirus/02_01 - Viruses, spyware, and adware.mp4 4.0 MB
  • mp402. Antivirus/02_02 - Using Windows Defender.mp4 3.1 MB
  • mp402. Antivirus/02_03 - Setting up real-time protection.mp4 1.0 MB
  • mp402. Antivirus/02_04 - Scanning with Windows Defender.mp4 4.3 MB
  • mp402. Antivirus/02_05 - Modifying antivirus settings in Windows Defender.mp4 5.8 MB
  • mp402. Antivirus/02_06 - Scheduling a scan with Windows Defender.mp4 9.7 MB
  • mp402. Antivirus/02_07 - Using Windows Defender offline.mp4 1.9 MB
  • mp402. Antivirus/02_08 - Exploring antivirus on Linux.mp4 1.7 MB
  • mp403. Personal Firewalls/03_01 - Why firewalls.mp4 1.5 MB
  • mp403. Personal Firewalls/03_02 - Using the Microsoft Windows Firewall.mp4 12.9 MB
  • mp403. Personal Firewalls/03_03 - Setting up advanced security notifications.mp4 9.5 MB
  • mp403. Personal Firewalls/03_04 - Setting up detailed rules.mp4 10.9 MB
  • mp403. Personal Firewalls/03_05 - Managing and analyzing log files with ZedLan.mp4 8.4 MB
  • mp403. Personal Firewalls/03_06 - Introducing iptables in Linux.mp4 10.7 MB
【影视】 Lynda - Cybersecurity Foundations
收录时间:2017-07-23 文档个数:28 文档大小:301.1 MB 最近下载:2025-05-16 人气:1753 磁力链接
  • mp400. Introduction/00_01 - Welcome.mp4 5.8 MB
  • mp400. Introduction/00_02 - What you should know.mp4 2.0 MB
  • mp401. Cybersecurity Foundations/01_01 - Understanding the NIST cybersecurity framework.mp4 12.8 MB
  • mp401. Cybersecurity Foundations/01_02 - Dissecting cyber risk.mp4 13.3 MB
  • mp401. Cybersecurity Foundations/01_03 - Unpacking COBIT 5.mp4 10.5 MB
  • mp401. Cybersecurity Foundations/01_04 - Looking closer at DSS05.mp4 8.2 MB
  • mp401. Cybersecurity Foundations/01_05 - Implementing control frameworks.mp4 14.6 MB
  • mp401. Cybersecurity Foundations/01_06 - Dissecting the payment card industry and PCI DSS.mp4 14.7 MB
  • mp401. Cybersecurity Foundations/01_07 - Exploring the Cyber Essentials framework.mp4 9.4 MB
  • mp402. Cybersecurity Threats/02_01 - Breaking down the cybersecurity kill chain.mp4 8.2 MB
  • mp402. Cybersecurity Threats/02_02 - Dissecting security threats.mp4 11.7 MB
  • mp402. Cybersecurity Threats/02_03 - Exploring cybercrime as an industry.mp4 10.1 MB
  • mp402. Cybersecurity Threats/02_04 - Hiding malware through cloaking and alternate data streams.mp4 9.0 MB
  • mp402. Cybersecurity Threats/02_05 - Using callbacks to capture keystrokes.mp4 9.7 MB
  • mp402. Cybersecurity Threats/02_06 - Hiding malware with rootkits.mp4 9.8 MB
  • mp402. Cybersecurity Threats/02_07 - Understanding advanced persistent threats (APTs).mp4 13.5 MB
  • mp402. Cybersecurity Threats/02_08 - Exploring ransomware.mp4 8.4 MB
  • mp403. Security Architecture/03_01 - Describing security requirements.mp4 14.9 MB
  • mp403. Security Architecture/03_02 - Architecting security risk.mp4 13.4 MB
  • mp403. Security Architecture/03_03 - Selecting security controls.mp4 8.5 MB
【影视】 Lynda - Cybersecurity with Cloud Computing
收录时间:2017-07-16 文档个数:39 文档大小:371.6 MB 最近下载:2025-05-15 人气:3619 磁力链接
  • mp400. Introduction/00_01 - Welcome.mp4 17.4 MB
  • mp400. Introduction/00_02 - What you should know.mp4 861.2 kB
  • mp400. Introduction/00_03 - Reference sites.mp4 16.6 MB
  • mp400. Introduction/00_04 - Using the exercise files.mp4 278.9 kB
  • mp401. Cloud Fundamentals/01_01 - Defining the essential characteristics of cloud.mp4 15.8 MB
  • mp401. Cloud Fundamentals/01_02 - Understanding infrastructure as a service.mp4 11.9 MB
  • mp401. Cloud Fundamentals/01_03 - Unraveling platform as a service.mp4 6.8 MB
  • mp401. Cloud Fundamentals/01_04 - Comprehending software as a service.mp4 8.6 MB
  • mp401. Cloud Fundamentals/01_05 - Discovering deployment models.mp4 11.4 MB
  • mp401. Cloud Fundamentals/01_06 - Identifying cloud incidents.mp4 15.2 MB
  • mp401. Cloud Fundamentals/01_07 - Dissecting the anatomy of a service failure.mp4 8.8 MB
  • mp401. Cloud Fundamentals/01_08 - Deciphering the anatomy of a business failure.mp4 8.3 MB
  • mp401. Cloud Fundamentals/01_09 - Defining trust models for cloud.mp4 14.0 MB
  • mp402. Cloud Security Guidance/02_01 - Identifying governance and risk.mp4 5.5 MB
  • mp402. Cloud Security Guidance/02_02 - Complying with legal and audit requrements.mp4 13.1 MB
  • mp402. Cloud Security Guidance/02_03 - Managing information and data security.mp4 15.6 MB
  • mp402. Cloud Security Guidance/02_04 - Providing portability and interoperability.mp4 7.5 MB
  • mp402. Cloud Security Guidance/02_05 - Comparing traditional IT, BCP, and DR.mp4 12.0 MB
  • mp402. Cloud Security Guidance/02_06 - Understanding data center operations.mp4 5.4 MB
  • mp402. Cloud Security Guidance/02_07 - Managing incident response.mp4 12.9 MB
【影视】 Pluralsight - Cybersecurity Threats: Ransomware
收录时间:2017-06-08 文档个数:37 文档大小:388.1 MB 最近下载:2025-05-16 人气:2825 磁力链接
  • mp43. Ransomware Entry Points/15. Embedded Hyperlinks, Websites_downloads, and Drive-by Infections.mp4 6.2 MB
  • mp43. Ransomware Entry Points/16. Why Common Exploit Kits Are Used.mp4 5.4 MB
  • mp43. Ransomware Entry Points/14. Phishing and Email Attachments.mp4 10.6 MB
  • mp43. Ransomware Entry Points/18. Summary.mp4 2.8 MB
  • mp43. Ransomware Entry Points/12. Overview.mp4 2.7 MB
  • mp43. Ransomware Entry Points/13. The 5 Classic Infection Vectors.mp4 3.1 MB
  • mp43. Ransomware Entry Points/17. Command and Callback (C&C) and Indicators of Compromise.mp4 7.0 MB
  • mp44. Incident Response - Detection and Containment/21. Detecting an Attack.mp4 7.3 MB
  • mp44. Incident Response - Detection and Containment/20. Indicators of Compromise.mp4 5.3 MB
  • mp44. Incident Response - Detection and Containment/23. Summary.mp4 1.7 MB
  • mp44. Incident Response - Detection and Containment/19. Overview.mp4 2.6 MB
  • mp44. Incident Response - Detection and Containment/22. Containing the Attack.mp4 9.0 MB
  • mp46. Countermeasures and Preparing Your Incident Response/35. Next Generation Anti-virus_Anti-malware.mp4 5.6 MB
  • mp46. Countermeasures and Preparing Your Incident Response/37. Summary.mp4 5.5 MB
  • mp46. Countermeasures and Preparing Your Incident Response/33. Defending a Ransomware Attack.mp4 11.4 MB
  • mp46. Countermeasures and Preparing Your Incident Response/34. Protecting a Windows Network.mp4 8.0 MB
  • mp46. Countermeasures and Preparing Your Incident Response/32. Overview.mp4 5.5 MB
  • mp46. Countermeasures and Preparing Your Incident Response/36. Lessons Learned and Your Incident Response Plan.mp4 10.9 MB
  • mp42. What Is Ransomware/06. How Big Is the Problem.mp4 15.1 MB
  • mp42. What Is Ransomware/02. Overview.mp4 4.1 MB
【其他】 Lynda.com.Practical.Cybersecurity-ELOHiM
收录时间:2017-05-15 文档个数:18 文档大小:232.2 MB 最近下载:2018-12-01 人气:142 磁力链接
  • r00e-lprecybs.r00 15.0 MB
  • r01e-lprecybs.r01 15.0 MB
  • r02e-lprecybs.r02 15.0 MB
  • r03e-lprecybs.r03 15.0 MB
  • r04e-lprecybs.r04 15.0 MB
  • r05e-lprecybs.r05 15.0 MB
  • r06e-lprecybs.r06 15.0 MB
  • r07e-lprecybs.r07 15.0 MB
  • r08e-lprecybs.r08 15.0 MB
  • r09e-lprecybs.r09 15.0 MB
  • r10e-lprecybs.r10 15.0 MB
  • r11e-lprecybs.r11 15.0 MB
  • r12e-lprecybs.r12 15.0 MB
  • r13e-lprecybs.r13 15.0 MB
  • r14e-lprecybs.r14 7.2 MB
  • rare-lprecybs.rar 15.0 MB
  • sfve-lprecybs.sfv 400 Bytes
  • nfoelohim.nfo 2.6 kB
【影视】 Pluralsight Cybersecurity Threats Ransomware
收录时间:2017-05-13 文档个数:38 文档大小:388.1 MB 最近下载:2025-05-15 人气:1701 磁力链接
  • mp41. Course Overview/01. Course Overview.mp4 5.4 MB
  • mp42. What Is Ransomware/09. Demo of Real World Ransomware Attack.mp4 52.0 MB
  • mp42. What Is Ransomware/03. Definition and Types of Ransomware.mp4 20.3 MB
  • mp42. What Is Ransomware/04. The Ransomware Timeline.mp4 15.2 MB
  • mp42. What Is Ransomware/06. How Big Is the Problem.mp4 15.1 MB
  • mp42. What Is Ransomware/07. Ransomware Victims.mp4 11.7 MB
  • mp42. What Is Ransomware/10. Variations of Ransomware.mp4 6.4 MB
  • mp42. What Is Ransomware/05. What Is Ransomware 30,000 ft. View.mp4 5.9 MB
  • mp42. What Is Ransomware/02. Overview.mp4 4.1 MB
  • mp42. What Is Ransomware/11. Summary.mp4 2.5 MB
  • mp42. What Is Ransomware/08. Module Progress Checkpoint.mp4 617.9 kB
  • mp43. Ransomware Entry Points/14. Phishing and Email Attachments.mp4 10.6 MB
  • mp43. Ransomware Entry Points/17. Command and Callback (C&C) and Indicators of Compromise.mp4 7.0 MB
  • mp43. Ransomware Entry Points/15. Embedded Hyperlinks, Websites_downloads, and Drive-by Infections.mp4 6.2 MB
  • mp43. Ransomware Entry Points/16. Why Common Exploit Kits Are Used.mp4 5.4 MB
  • mp43. Ransomware Entry Points/13. The 5 Classic Infection Vectors.mp4 3.1 MB
  • mp43. Ransomware Entry Points/18. Summary.mp4 2.8 MB
  • mp43. Ransomware Entry Points/12. Overview.mp4 2.7 MB
  • mp44. Incident Response - Detection and Containment/22. Containing the Attack.mp4 9.0 MB
  • mp44. Incident Response - Detection and Containment/21. Detecting an Attack.mp4 7.3 MB
【压缩文件】 Pluralsight.Cybersecurity.Threats.Ransomware-[www.allfiles.cf]-TPTORRENTS.zip
收录时间:2017-04-29 文档个数:1 文档大小:373.3 MB 最近下载:2025-05-07 人气:1589 磁力链接
  • zipPluralsight.Cybersecurity.Threats.Ransomware-[www.allfiles.cf]-TPTORRENTS.zip 373.3 MB
【影视】 Cybersecurity Threats Ransomware
收录时间:2017-04-29 文档个数:39 文档大小:405.4 MB 最近下载:2025-05-15 人气:3100 磁力链接
  • mp401. Course Overview/01. Intro.mp4 5.4 MB
  • mp402. What Is Ransomware/01. Overview.mp4 4.1 MB
  • mp402. What Is Ransomware/02. Definition and Types of Ransomware.mp4 20.3 MB
  • mp402. What Is Ransomware/03. The Ransomware Timeline.mp4 15.2 MB
  • mp402. What Is Ransomware/04. What Is Ransomware 30,000 ft. View.mp4 5.9 MB
  • mp402. What Is Ransomware/05. How Big Is the Problem.mp4 15.1 MB
  • mp402. What Is Ransomware/06. Ransomware Victims.mp4 11.7 MB
  • mp402. What Is Ransomware/07. Module Progress Checkpoint.mp4 617.9 kB
  • mp402. What Is Ransomware/08. Demo of Real World Ransomware Attack.mp4 52.0 MB
  • mp402. What Is Ransomware/09. Variations of Ransomware.mp4 6.4 MB
  • mp402. What Is Ransomware/10. Summary.mp4 2.5 MB
  • mp403. Ransomware Entry Points/01. Overview.mp4 2.7 MB
  • mp403. Ransomware Entry Points/02. The 5 Classic Infection Vectors.mp4 3.1 MB
  • mp403. Ransomware Entry Points/03. Phishing and Email Attachments.mp4 10.6 MB
  • mp403. Ransomware Entry Points/04. Embedded Hyperlinks, Websitesdownloads, and Drive-by Infections.mp4 6.2 MB
  • mp403. Ransomware Entry Points/05. Why Common Exploit Kits Are Used.mp4 5.4 MB
  • mp403. Ransomware Entry Points/06. Command and Callback (C&C) and Indicators of Compromise.mp4 7.0 MB
  • mp403. Ransomware Entry Points/07. Summary.mp4 2.8 MB
  • mp404. Incident Response Detection and Containment/01. Overview.mp4 2.6 MB
  • mp404. Incident Response Detection and Containment/02. Indicators of Compromise.mp4 5.3 MB
【音乐】 TTC - Thinking about Cybersecurity
收录时间:2017-03-26 文档个数:19 文档大小:422.8 MB 最近下载:2025-05-15 人气:2155 磁力链接
  • mp3TGC_9523_Lect10_Cybersecurity.mp3 24.9 MB
  • mp3TGC_9523_Lect14_Cybersecurity.mp3 24.7 MB
  • mp3TGC_9523_Lect18_Cybersecurity.mp3 24.6 MB
  • mp3TGC_9523_Lect08_Cybersecurity.mp3 23.8 MB
  • mp3TGC_9523_Lect05_Cybersecurity.mp3 23.8 MB
  • mp3TGC_9523_Lect13_Cybersecurity.mp3 23.6 MB
  • mp3TGC_9523_Lect11_Cybersecurity.mp3 23.5 MB
  • mp3TGC_9523_Lect17_Cybersecurity.mp3 23.4 MB
  • mp3TGC_9523_Lect01_Cybersecurity.mp3 23.4 MB
  • mp3TGC_9523_Lect04_Cybersecurity.mp3 23.2 MB
  • mp3TGC_9523_Lect09_Cybersecurity.mp3 22.9 MB
  • mp3TGC_9523_Lect12_Cybersecurity.mp3 22.7 MB
  • mp3TGC_9523_Lect15_Cybersecurity.mp3 22.7 MB
  • mp3TGC_9523_Lect16_Cybersecurity.mp3 22.6 MB
  • mp3TGC_9523_Lect06_Cybersecurity.mp3 22.5 MB
  • mp3TGC_9523_Lect07_Cybersecurity.mp3 22.4 MB
  • mp3TGC_9523_Lect02_Cybersecurity.mp3 21.9 MB
  • mp3TGC_9523_Lect03_Cybersecurity.mp3 21.5 MB
  • pdfCourse Guidebook.pdf 4.7 MB
【其他】 TTC - Thinking about Cybersecurity audio book - sup3r edition
收录时间:2017-03-17 文档个数:19 文档大小:143.9 MB 最近下载:2025-05-14 人气:590 磁力链接
  • m4aLect.10 International Governance and the Internet.m4a 8.3 MB
  • m4aLect.01 Stuxnet—The First Cyber Guided Missile.m4a 7.8 MB
  • m4aLect.02 The Incredible Scope of Cyberspace.m4a 7.3 MB
  • m4aLect.03 The Five Gateways of Internet Vulnerability.m4a 7.2 MB
  • m4aLect.04 Of Viruses, Botnets, and Logic Bombs .m4a 7.7 MB
  • m4aLect.05 The Problem of Identity on the Network.m4a 7.9 MB
  • m4aLect.06 Cyber Fraud, Theft, and Organized Crime.m4a 7.5 MB
  • m4aLect.07 Hacktivists and Insurgency.m4a 7.5 MB
  • m4aLect.08 Nations at Cyber War.m4a 7.9 MB
  • m4aLect.09 Government Regulation of Cyberspace.m4a 7.6 MB
  • pdfCourse Guidebook.pdf 4.7 MB
  • m4aLect.11 The Constitution and Cyberspace.m4a 7.8 MB
  • m4aLect.12 Big Data—''They'' Know Everything about You.m4a 7.6 MB
  • m4aLect.13 Privacy for the Cyber Age.m4a 7.9 MB
  • m4aLect.14 Listening In and Going Dark.m4a 8.2 MB
  • m4aLect.15 The Devil in the Chips-Hardware Failures.m4a 7.6 MB
  • m4aLect.16 Protecting Yourself in Cyberspace.m4a 7.5 MB
  • m4aLect.17 Critical Infrastructure and Resiliency.m4a 7.8 MB
  • m4aLect.18 Looking Forward-What Does the Future Hold.m4a 8.2 MB
【影视】 [Lynda] Practical Cybersecurity-KTR
收录时间:2017-02-26 文档个数:44 文档大小:242.5 MB 最近下载:2025-05-13 人气:1594 磁力链接
  • mp48. Monitoring Network Activity/164982_08_03_XR15_packets.mp4 13.1 MB
  • mp47. Checking for Common Mistakes in Web Apps/164982_07_02_XR15_scan.mp4 11.9 MB
  • mp43. Personal Firewalls/164982_03_02_XR15_mswf.mp4 10.7 MB
  • mp43. Personal Firewalls/164982_03_06_XR15_iptables.mp4 9.8 MB
  • mp43. Personal Firewalls/164982_03_04_XR15_advrules.mp4 9.5 MB
  • mp47. Checking for Common Mistakes in Web Apps/164982_07_01_XR15_intro.mp4 9.4 MB
  • mp46. Checking Hosts for Known Vulnerabilities/164982_06_04_XR15_scan.mp4 8.6 MB
  • mp41. Why Cybersecurity/164982_01_03_XR15_attack.mp4 8.6 MB
  • mp41. Why Cybersecurity/164982_01_01_XR15_cyber.mp4 8.4 MB
  • mp48. Monitoring Network Activity/164982_08_05_XR151_intruder.mp4 8.3 MB
  • mp48. Monitoring Network Activity/164982_08_04_XR15_filters.mp4 8.2 MB
  • mp42. Antivirus/164982_02_06_XR15_schedule.mp4 8.2 MB
  • mp43. Personal Firewalls/164982_03_03_XR15_advfw.mp4 7.9 MB
  • mp40. Introduction/164982_00_01_WX30_welcome.mp4 6.9 MB
  • mp43. Personal Firewalls/164982_03_05_XR15_zedlan.mp4 6.7 MB
  • mp44. Knowing What Is on Your Network/164982_04_05_XR15_zenmap.mp4 6.3 MB
  • mp45. Network Communications and Detecting Intruders/164982_05_04_XR15_honeypot.mp4 6.0 MB
  • mp45. Network Communications and Detecting Intruders/164982_05_02_XR15_filexfer.mp4 5.8 MB
  • mp48. Monitoring Network Activity/164982_08_02_XR15_capture.mp4 5.6 MB
  • mp42. Antivirus/164982_02_05_XR15_avsettings.mp4 5.5 MB
【安装包】 Eset.Cybersecurity.Pro.v6.3.70.1
收录时间:2017-02-25 文档个数:4 文档大小:98.7 MB 最近下载:2024-12-16 人气:91 磁力链接
  • txtTorrent downloaded from www.DNoid.me - Demonoid (1).txt 56 Bytes
  • txtSerials.txt 438 Bytes
  • nfoEset.Cybersecurity.Pro.v6.3.70.1..nfo 1.5 kB
  • exeeset_cybersecurity_pro_.dmg.exe 98.7 MB
【影视】 LYNDA FOUNDATIONS OF CYBERSECURITY TUTORIAL
收录时间:2017-02-24 文档个数:27 文档大小:300.9 MB 最近下载:2024-09-26 人气:1087 磁力链接
  • mp401. Introduction/01_01-Welcome.mp4 6.5 MB
  • mp401. Introduction/01_02-What you should know.mp4 2.0 MB
  • mp402. Cybersecurity Foundations/02_06-Dissecting the payment card industry and PCI DSS.mp4 14.6 MB
  • mp402. Cybersecurity Foundations/02_05-Implementing control frameworks.mp4 14.3 MB
  • mp402. Cybersecurity Foundations/02_02-Dissecting cyber risk.mp4 13.1 MB
  • mp402. Cybersecurity Foundations/02_01-Understanding the NIST cybersecurity framework.mp4 12.6 MB
  • mp402. Cybersecurity Foundations/02_03-Unpacking COBIT 5.mp4 10.3 MB
  • mp402. Cybersecurity Foundations/02_07-Exploring the Cyber Essentials framework.mp4 9.3 MB
  • mp402. Cybersecurity Foundations/02_04-Looking closer at DSS05.mp4 8.1 MB
  • mp403. Cybersecurity Threats/03_07-Understanding advanced persistent threats APTs.mp4 13.5 MB
  • mp403. Cybersecurity Threats/03_02-Dissecting security threats.mp4 11.6 MB
  • mp403. Cybersecurity Threats/03_03-Exploring cybercrime as an industry.mp4 9.9 MB
  • mp403. Cybersecurity Threats/03_05-Using callbacks to capture keystrokes.mp4 9.8 MB
  • mp403. Cybersecurity Threats/03_06-Hiding malware with rootkits.mp4 9.8 MB
  • mp403. Cybersecurity Threats/03_04-Hiding malware through cloaking and alternate data streams.mp4 9.0 MB
  • mp403. Cybersecurity Threats/03_08-Exploring ransomware.mp4 8.4 MB
  • mp403. Cybersecurity Threats/03_01-Breaking down the cybersecurity kill chain.mp4 8.1 MB
  • mp404. Security Architecture/04_04-Managing user access and identity.mp4 20.7 MB
  • mp404. Security Architecture/04_05-Implementing preventative security.mp4 18.8 MB
  • mp404. Security Architecture/04_06-Monitoring and alerts.mp4 15.7 MB
共14页 上一页 9 10 11 12 13 14 下一页