磁力管家

磁力管家
为您索检到275条磁力链接,耗时0毫秒。 rss

分享给好友

【影视】 Pluralsight - Cybersecurity Threats: Ransomware
收录时间:2017-06-08 文档个数:37 文档大小:388.1 MB 最近下载:2026-01-24 人气:3172 磁力链接
  • mp43. Ransomware Entry Points/15. Embedded Hyperlinks, Websites_downloads, and Drive-by Infections.mp4 6.2 MB
  • mp43. Ransomware Entry Points/16. Why Common Exploit Kits Are Used.mp4 5.4 MB
  • mp43. Ransomware Entry Points/14. Phishing and Email Attachments.mp4 10.6 MB
  • mp43. Ransomware Entry Points/18. Summary.mp4 2.8 MB
  • mp43. Ransomware Entry Points/12. Overview.mp4 2.7 MB
  • mp43. Ransomware Entry Points/13. The 5 Classic Infection Vectors.mp4 3.1 MB
  • mp43. Ransomware Entry Points/17. Command and Callback (C&C) and Indicators of Compromise.mp4 7.0 MB
  • mp44. Incident Response - Detection and Containment/21. Detecting an Attack.mp4 7.3 MB
  • mp44. Incident Response - Detection and Containment/20. Indicators of Compromise.mp4 5.3 MB
  • mp44. Incident Response - Detection and Containment/23. Summary.mp4 1.7 MB
  • mp44. Incident Response - Detection and Containment/19. Overview.mp4 2.6 MB
  • mp44. Incident Response - Detection and Containment/22. Containing the Attack.mp4 9.0 MB
  • mp46. Countermeasures and Preparing Your Incident Response/35. Next Generation Anti-virus_Anti-malware.mp4 5.6 MB
  • mp46. Countermeasures and Preparing Your Incident Response/37. Summary.mp4 5.5 MB
  • mp46. Countermeasures and Preparing Your Incident Response/33. Defending a Ransomware Attack.mp4 11.4 MB
  • mp46. Countermeasures and Preparing Your Incident Response/34. Protecting a Windows Network.mp4 8.0 MB
  • mp46. Countermeasures and Preparing Your Incident Response/32. Overview.mp4 5.5 MB
  • mp46. Countermeasures and Preparing Your Incident Response/36. Lessons Learned and Your Incident Response Plan.mp4 10.9 MB
  • mp42. What Is Ransomware/06. How Big Is the Problem.mp4 15.1 MB
  • mp42. What Is Ransomware/02. Overview.mp4 4.1 MB
【影视】 Pluralsight Cybersecurity Threats Ransomware
收录时间:2017-05-13 文档个数:38 文档大小:388.1 MB 最近下载:2025-12-12 人气:1780 磁力链接
  • mp41. Course Overview/01. Course Overview.mp4 5.4 MB
  • mp42. What Is Ransomware/09. Demo of Real World Ransomware Attack.mp4 52.0 MB
  • mp42. What Is Ransomware/03. Definition and Types of Ransomware.mp4 20.3 MB
  • mp42. What Is Ransomware/04. The Ransomware Timeline.mp4 15.2 MB
  • mp42. What Is Ransomware/06. How Big Is the Problem.mp4 15.1 MB
  • mp42. What Is Ransomware/07. Ransomware Victims.mp4 11.7 MB
  • mp42. What Is Ransomware/10. Variations of Ransomware.mp4 6.4 MB
  • mp42. What Is Ransomware/05. What Is Ransomware 30,000 ft. View.mp4 5.9 MB
  • mp42. What Is Ransomware/02. Overview.mp4 4.1 MB
  • mp42. What Is Ransomware/11. Summary.mp4 2.5 MB
  • mp42. What Is Ransomware/08. Module Progress Checkpoint.mp4 617.9 kB
  • mp43. Ransomware Entry Points/14. Phishing and Email Attachments.mp4 10.6 MB
  • mp43. Ransomware Entry Points/17. Command and Callback (C&C) and Indicators of Compromise.mp4 7.0 MB
  • mp43. Ransomware Entry Points/15. Embedded Hyperlinks, Websites_downloads, and Drive-by Infections.mp4 6.2 MB
  • mp43. Ransomware Entry Points/16. Why Common Exploit Kits Are Used.mp4 5.4 MB
  • mp43. Ransomware Entry Points/13. The 5 Classic Infection Vectors.mp4 3.1 MB
  • mp43. Ransomware Entry Points/18. Summary.mp4 2.8 MB
  • mp43. Ransomware Entry Points/12. Overview.mp4 2.7 MB
  • mp44. Incident Response - Detection and Containment/22. Containing the Attack.mp4 9.0 MB
  • mp44. Incident Response - Detection and Containment/21. Detecting an Attack.mp4 7.3 MB
【压缩文件】 Pluralsight.Cybersecurity.Threats.Ransomware-[www.allfiles.cf]-TPTORRENTS.zip
收录时间:2017-04-29 文档个数:1 文档大小:373.3 MB 最近下载:2026-01-19 人气:1737 磁力链接
  • zipPluralsight.Cybersecurity.Threats.Ransomware-[www.allfiles.cf]-TPTORRENTS.zip 373.3 MB
【影视】 Cybersecurity Threats Ransomware
收录时间:2017-04-29 文档个数:39 文档大小:405.4 MB 最近下载:2025-12-24 人气:3341 磁力链接
  • mp401. Course Overview/01. Intro.mp4 5.4 MB
  • mp402. What Is Ransomware/01. Overview.mp4 4.1 MB
  • mp402. What Is Ransomware/02. Definition and Types of Ransomware.mp4 20.3 MB
  • mp402. What Is Ransomware/03. The Ransomware Timeline.mp4 15.2 MB
  • mp402. What Is Ransomware/04. What Is Ransomware 30,000 ft. View.mp4 5.9 MB
  • mp402. What Is Ransomware/05. How Big Is the Problem.mp4 15.1 MB
  • mp402. What Is Ransomware/06. Ransomware Victims.mp4 11.7 MB
  • mp402. What Is Ransomware/07. Module Progress Checkpoint.mp4 617.9 kB
  • mp402. What Is Ransomware/08. Demo of Real World Ransomware Attack.mp4 52.0 MB
  • mp402. What Is Ransomware/09. Variations of Ransomware.mp4 6.4 MB
  • mp402. What Is Ransomware/10. Summary.mp4 2.5 MB
  • mp403. Ransomware Entry Points/01. Overview.mp4 2.7 MB
  • mp403. Ransomware Entry Points/02. The 5 Classic Infection Vectors.mp4 3.1 MB
  • mp403. Ransomware Entry Points/03. Phishing and Email Attachments.mp4 10.6 MB
  • mp403. Ransomware Entry Points/04. Embedded Hyperlinks, Websitesdownloads, and Drive-by Infections.mp4 6.2 MB
  • mp403. Ransomware Entry Points/05. Why Common Exploit Kits Are Used.mp4 5.4 MB
  • mp403. Ransomware Entry Points/06. Command and Callback (C&C) and Indicators of Compromise.mp4 7.0 MB
  • mp403. Ransomware Entry Points/07. Summary.mp4 2.8 MB
  • mp404. Incident Response Detection and Containment/01. Overview.mp4 2.6 MB
  • mp404. Incident Response Detection and Containment/02. Indicators of Compromise.mp4 5.3 MB
【音乐】 TTC - Thinking about Cybersecurity
收录时间:2017-03-26 文档个数:19 文档大小:422.8 MB 最近下载:2026-01-17 人气:2520 磁力链接
  • mp3TGC_9523_Lect10_Cybersecurity.mp3 24.9 MB
  • mp3TGC_9523_Lect14_Cybersecurity.mp3 24.7 MB
  • mp3TGC_9523_Lect18_Cybersecurity.mp3 24.6 MB
  • mp3TGC_9523_Lect08_Cybersecurity.mp3 23.8 MB
  • mp3TGC_9523_Lect05_Cybersecurity.mp3 23.8 MB
  • mp3TGC_9523_Lect13_Cybersecurity.mp3 23.6 MB
  • mp3TGC_9523_Lect11_Cybersecurity.mp3 23.5 MB
  • mp3TGC_9523_Lect17_Cybersecurity.mp3 23.4 MB
  • mp3TGC_9523_Lect01_Cybersecurity.mp3 23.4 MB
  • mp3TGC_9523_Lect04_Cybersecurity.mp3 23.2 MB
  • mp3TGC_9523_Lect09_Cybersecurity.mp3 22.9 MB
  • mp3TGC_9523_Lect12_Cybersecurity.mp3 22.7 MB
  • mp3TGC_9523_Lect15_Cybersecurity.mp3 22.7 MB
  • mp3TGC_9523_Lect16_Cybersecurity.mp3 22.6 MB
  • mp3TGC_9523_Lect06_Cybersecurity.mp3 22.5 MB
  • mp3TGC_9523_Lect07_Cybersecurity.mp3 22.4 MB
  • mp3TGC_9523_Lect02_Cybersecurity.mp3 21.9 MB
  • mp3TGC_9523_Lect03_Cybersecurity.mp3 21.5 MB
  • pdfCourse Guidebook.pdf 4.7 MB
【影视】 [Lynda] Practical Cybersecurity-KTR
收录时间:2017-02-26 文档个数:44 文档大小:242.5 MB 最近下载:2026-01-26 人气:1957 磁力链接
  • mp48. Monitoring Network Activity/164982_08_03_XR15_packets.mp4 13.1 MB
  • mp47. Checking for Common Mistakes in Web Apps/164982_07_02_XR15_scan.mp4 11.9 MB
  • mp43. Personal Firewalls/164982_03_02_XR15_mswf.mp4 10.7 MB
  • mp43. Personal Firewalls/164982_03_06_XR15_iptables.mp4 9.8 MB
  • mp43. Personal Firewalls/164982_03_04_XR15_advrules.mp4 9.5 MB
  • mp47. Checking for Common Mistakes in Web Apps/164982_07_01_XR15_intro.mp4 9.4 MB
  • mp46. Checking Hosts for Known Vulnerabilities/164982_06_04_XR15_scan.mp4 8.6 MB
  • mp41. Why Cybersecurity/164982_01_03_XR15_attack.mp4 8.6 MB
  • mp41. Why Cybersecurity/164982_01_01_XR15_cyber.mp4 8.4 MB
  • mp48. Monitoring Network Activity/164982_08_05_XR151_intruder.mp4 8.3 MB
  • mp48. Monitoring Network Activity/164982_08_04_XR15_filters.mp4 8.2 MB
  • mp42. Antivirus/164982_02_06_XR15_schedule.mp4 8.2 MB
  • mp43. Personal Firewalls/164982_03_03_XR15_advfw.mp4 7.9 MB
  • mp40. Introduction/164982_00_01_WX30_welcome.mp4 6.9 MB
  • mp43. Personal Firewalls/164982_03_05_XR15_zedlan.mp4 6.7 MB
  • mp44. Knowing What Is on Your Network/164982_04_05_XR15_zenmap.mp4 6.3 MB
  • mp45. Network Communications and Detecting Intruders/164982_05_04_XR15_honeypot.mp4 6.0 MB
  • mp45. Network Communications and Detecting Intruders/164982_05_02_XR15_filexfer.mp4 5.8 MB
  • mp48. Monitoring Network Activity/164982_08_02_XR15_capture.mp4 5.6 MB
  • mp42. Antivirus/164982_02_05_XR15_avsettings.mp4 5.5 MB
【影视】 LYNDA FOUNDATIONS OF CYBERSECURITY TUTORIAL
收录时间:2017-02-24 文档个数:27 文档大小:300.9 MB 最近下载:2026-01-26 人气:1107 磁力链接
  • mp401. Introduction/01_01-Welcome.mp4 6.5 MB
  • mp401. Introduction/01_02-What you should know.mp4 2.0 MB
  • mp402. Cybersecurity Foundations/02_06-Dissecting the payment card industry and PCI DSS.mp4 14.6 MB
  • mp402. Cybersecurity Foundations/02_05-Implementing control frameworks.mp4 14.3 MB
  • mp402. Cybersecurity Foundations/02_02-Dissecting cyber risk.mp4 13.1 MB
  • mp402. Cybersecurity Foundations/02_01-Understanding the NIST cybersecurity framework.mp4 12.6 MB
  • mp402. Cybersecurity Foundations/02_03-Unpacking COBIT 5.mp4 10.3 MB
  • mp402. Cybersecurity Foundations/02_07-Exploring the Cyber Essentials framework.mp4 9.3 MB
  • mp402. Cybersecurity Foundations/02_04-Looking closer at DSS05.mp4 8.1 MB
  • mp403. Cybersecurity Threats/03_07-Understanding advanced persistent threats APTs.mp4 13.5 MB
  • mp403. Cybersecurity Threats/03_02-Dissecting security threats.mp4 11.6 MB
  • mp403. Cybersecurity Threats/03_03-Exploring cybercrime as an industry.mp4 9.9 MB
  • mp403. Cybersecurity Threats/03_05-Using callbacks to capture keystrokes.mp4 9.8 MB
  • mp403. Cybersecurity Threats/03_06-Hiding malware with rootkits.mp4 9.8 MB
  • mp403. Cybersecurity Threats/03_04-Hiding malware through cloaking and alternate data streams.mp4 9.0 MB
  • mp403. Cybersecurity Threats/03_08-Exploring ransomware.mp4 8.4 MB
  • mp403. Cybersecurity Threats/03_01-Breaking down the cybersecurity kill chain.mp4 8.1 MB
  • mp404. Security Architecture/04_04-Managing user access and identity.mp4 20.7 MB
  • mp404. Security Architecture/04_05-Implementing preventative security.mp4 18.8 MB
  • mp404. Security Architecture/04_06-Monitoring and alerts.mp4 15.7 MB
【压缩文件】 Lynda Cybersecurity with Cloud Computing tutorialkhan.com.iso
收录时间:2017-02-22 文档个数:1 文档大小:359.3 MB 最近下载:2021-05-18 人气:279 磁力链接
  • isoLynda Cybersecurity with Cloud Computing tutorialkhan.com.iso 359.3 MB
【影视】 Cybersecurity-The Real Agenda.wmv
收录时间:2017-02-21 文档个数:1 文档大小:148.0 MB 最近下载:2025-09-27 人气:1562 磁力链接
  • wmvCybersecurity-The Real Agenda.wmv 148.0 MB
【影视】 Lynda - Foundations of Cybersecurity
收录时间:2017-02-19 文档个数:27 文档大小:300.9 MB 最近下载:2026-01-21 人气:3281 磁力链接
  • mp4021 Managing user access and identity.mp4 20.7 MB
  • mp4022 Implementing preventative security.mp4 18.8 MB
  • mp4023 Monitoring and alerts.mp4 15.7 MB
  • mp4018 Describing security requirements.mp4 14.9 MB
  • mp4008 Dissecting the payment card industry and PCI DSS.mp4 14.6 MB
  • mp4007 Implementing control frameworks.mp4 14.3 MB
  • mp4025 Preparing for an incident.mp4 14.2 MB
  • mp4019 Architecting security risk.mp4 13.5 MB
  • mp4016 Understanding advanced persistent threats (APTs).mp4 13.5 MB
  • mp4004 Dissecting cyber risk.mp4 13.1 MB
  • mp4003 Understanding the NIST cybersecurity framework.mp4 12.6 MB
  • mp4011 Dissecting security threats.mp4 11.6 MB
  • mp4026 Responding to an incident.mp4 11.5 MB
  • mp4005 Unpacking COBIT 5.mp4 10.3 MB
  • mp4012 Exploring cybercrime as an industry.mp4 9.9 MB
  • mp4014 Using callbacks to capture keystrokes.mp4 9.8 MB
  • mp4015 Hiding malware with rootkits.mp4 9.8 MB
  • mp4009 Exploring the Cyber Essentials framework.mp4 9.3 MB
  • mp4013 Hiding malware through cloaking and alternate data streams.mp4 9.0 MB
  • mp4020 Selecting security controls.mp4 8.5 MB
【影视】 Cybersecurity {AM}
收录时间:2017-02-11 文档个数:39 文档大小:230.5 MB 最近下载:2026-01-21 人气:2076 磁力链接
  • mp40 Introduction/369625_00_03_XR15_Reference.mp4 10.2 MB
  • mp43 Architecting Security/369625_03_05_XR15_Cloud_Attribute_Taxonomy.mp4 10.1 MB
  • mp43 Architecting Security/369625_03_01_XR15_Introduction_to_SABSA.mp4 9.9 MB
  • mp42 Cloud Security Guidance/369625_02_16_SO30_XR30_Solution.mp4 9.9 MB
  • mp42 Cloud Security Guidance/369625_02_03_XR15_Information_Management.mp4 9.8 MB
  • mp41 Cloud Fundamentals/369625_01_01_XR15_Essential_Characteristics.mp4 9.6 MB
  • mp41 Cloud Fundamentals/369625_01_06_XR15_Cloud_Incidents.mp4 9.4 MB
  • mp42 Cloud Security Guidance/369625_02_02_XR15_Legal_Compliance_and_Audit.mp4 8.9 MB
  • mp41 Cloud Fundamentals/369625_01_09_XR15_Cloud_Trust.mp4 8.8 MB
  • mp42 Cloud Security Guidance/369625_02_07_XR15_Incident_Response.mp4 8.8 MB
  • mp42 Cloud Security Guidance/369625_02_11_XR15_Identity_in_the_Cloud.mp4 8.4 MB
  • mp42 Cloud Security Guidance/369625_02_08_XR15_Application_Security.mp4 8.3 MB
  • mp42 Cloud Security Guidance/369625_02_13_XR15_Virtualisation.mp4 8.2 MB
  • mp42 Cloud Security Guidance/369625_02_05_XR15_Traditional_Security_BCP_and_DR.mp4 8.2 MB
  • mp42 Cloud Security Guidance/369625_02_12_XR15_Cloud_Access_Control.mp4 7.9 MB
  • mp41 Cloud Fundamentals/369625_01_02_XR15_Infrastructure_as_a_Service.mp4 7.6 MB
  • mp43 Architecting Security/369625_03_02_XR15_Fast_Tracker.mp4 7.4 MB
  • mp41 Cloud Fundamentals/369625_01_05_XR151_Deployment_Models.mp4 6.7 MB
  • mp42 Cloud Security Guidance/369625_02_10_XR15_Encryption_and_Key_Management.mp4 6.6 MB
  • mp43 Architecting Security/369625_03_03_XR15_SABSA_Attributes.mp4 6.3 MB
【影视】 TTC - Thinking about Cybersecurity
收录时间:2017-02-10 文档个数:19 文档大小:8.5 GB 最近下载:2026-01-18 人气:6269 磁力链接
  • wmvTGC_9523_Lect18_Cybersecurity.wmv 509.4 MB
  • wmvTGC_9523_Lect01_Cybersecurity.wmv 509.0 MB
  • wmvTGC_9523_Lect13_Cybersecurity.wmv 508.9 MB
  • wmvTGC_9523_Lect17_Cybersecurity.wmv 494.7 MB
  • wmvTGC_9523_Lect08_Cybersecurity.wmv 493.5 MB
  • wmvTGC_9523_Lect14_Cybersecurity.wmv 486.8 MB
  • wmvTGC_9523_Lect10_Cybersecurity.wmv 486.1 MB
  • wmvTGC_9523_Lect04_Cybersecurity.wmv 480.1 MB
  • wmvTGC_9523_Lect15_Cybersecurity.wmv 474.7 MB
  • wmvTGC_9523_Lect09_Cybersecurity.wmv 473.9 MB
  • wmvTGC_9523_Lect05_Cybersecurity.wmv 472.8 MB
  • wmvTGC_9523_Lect07_Cybersecurity.wmv 470.4 MB
  • wmvTGC_9523_Lect06_Cybersecurity.wmv 467.2 MB
  • wmvTGC_9523_Lect16_Cybersecurity.wmv 460.0 MB
  • wmvTGC_9523_Lect11_Cybersecurity.wmv 453.2 MB
  • wmvTGC_9523_Lect12_Cybersecurity.wmv 449.4 MB
  • wmvTGC_9523_Lect03_Cybersecurity.wmv 438.7 MB
  • wmvTGC_9523_Lect02_Cybersecurity.wmv 378.9 MB
  • PDFDG9523_98F12.PDF 4.7 MB
【影视】 Lynda - Practical Cybersecurity
收录时间:2017-02-10 文档个数:45 文档大小:244.8 MB 最近下载:2026-01-23 人气:1514 磁力链接
  • mp48. Monitoring Network Activity/164982_08_03_XR15_packets.mp4 13.1 MB
  • mp47. Checking for Common Mistakes in Web Apps/164982_07_02_XR15_scan.mp4 11.9 MB
  • mp43. Personal Firewalls/164982_03_02_XR15_mswf.mp4 10.7 MB
  • mp43. Personal Firewalls/164982_03_06_XR15_iptables.mp4 9.8 MB
  • mp43. Personal Firewalls/164982_03_04_XR15_advrules.mp4 9.5 MB
  • mp47. Checking for Common Mistakes in Web Apps/164982_07_01_XR15_intro.mp4 9.4 MB
  • mp46. Checking Hosts for Known Vulnerabilities/164982_06_04_XR15_scan.mp4 8.6 MB
  • mp41. Why Cybersecurity/164982_01_03_XR15_attack.mp4 8.6 MB
  • mp41. Why Cybersecurity/164982_01_01_XR15_cyber.mp4 8.4 MB
  • mp48. Monitoring Network Activity/164982_08_05_XR151_intruder.mp4 8.3 MB
  • mp48. Monitoring Network Activity/164982_08_04_XR15_filters.mp4 8.2 MB
  • mp42. Antivirus/164982_02_06_XR15_schedule.mp4 8.2 MB
  • mp43. Personal Firewalls/164982_03_03_XR15_advfw.mp4 7.9 MB
  • mp40. Introduction/164982_00_01_WX30_welcome.mp4 6.9 MB
  • mp43. Personal Firewalls/164982_03_05_XR15_zedlan.mp4 6.7 MB
  • mp44. Knowing What Is on Your Network/164982_04_05_XR15_zenmap.mp4 6.3 MB
  • mp45. Network Communications and Detecting Intruders/164982_05_04_XR15_honeypot.mp4 6.0 MB
  • mp45. Network Communications and Detecting Intruders/164982_05_02_XR15_filexfer.mp4 5.8 MB
  • mp48. Monitoring Network Activity/164982_08_02_XR15_capture.mp4 5.6 MB
  • mp42. Antivirus/164982_02_05_XR15_avsettings.mp4 5.5 MB
【影视】 Lynda - Foundations of Cybersecurity
收录时间:2017-02-08 文档个数:27 文档大小:300.9 MB 最近下载:2026-01-25 人气:2401 磁力链接
  • mp401. Introduction/01_01-Welcome.mp4 6.5 MB
  • mp401. Introduction/01_02-What you should know.mp4 2.0 MB
  • mp402. Cybersecurity Foundations/02_01-Understanding the NIST cybersecurity framework.mp4 12.6 MB
  • mp402. Cybersecurity Foundations/02_02-Dissecting cyber risk.mp4 13.1 MB
  • mp402. Cybersecurity Foundations/02_03-Unpacking COBIT 5.mp4 10.3 MB
  • mp402. Cybersecurity Foundations/02_04-Looking closer at DSS05.mp4 8.1 MB
  • mp402. Cybersecurity Foundations/02_05-Implementing control frameworks.mp4 14.3 MB
  • mp402. Cybersecurity Foundations/02_06-Dissecting the payment card industry and PCI DSS.mp4 14.6 MB
  • mp402. Cybersecurity Foundations/02_07-Exploring the Cyber Essentials framework.mp4 9.3 MB
  • mp403. Cybersecurity Threats/03_01-Breaking down the cybersecurity kill chain.mp4 8.1 MB
  • mp403. Cybersecurity Threats/03_02-Dissecting security threats.mp4 11.6 MB
  • mp403. Cybersecurity Threats/03_03-Exploring cybercrime as an industry.mp4 9.9 MB
  • mp403. Cybersecurity Threats/03_04-Hiding malware through cloaking and alternate data streams.mp4 9.0 MB
  • mp403. Cybersecurity Threats/03_05-Using callbacks to capture keystrokes.mp4 9.8 MB
  • mp403. Cybersecurity Threats/03_06-Hiding malware with rootkits.mp4 9.8 MB
  • mp403. Cybersecurity Threats/03_07-Understanding advanced persistent threats APTs.mp4 13.5 MB
  • mp403. Cybersecurity Threats/03_08-Exploring ransomware.mp4 8.4 MB
  • mp404. Security Architecture/04_01-Describing security requirements.mp4 14.9 MB
  • mp404. Security Architecture/04_02-Architecting security risk.mp4 13.5 MB
  • mp404. Security Architecture/04_03-Selecting security controls.mp4 8.5 MB
【影视】 Lynda - Foundations of Cybersecurity
收录时间:2017-02-08 文档个数:27 文档大小:300.9 MB 最近下载:2025-03-22 人气:383 磁力链接
  • mp4021 Managing user access and identity.mp4 20.7 MB
  • mp4022 Implementing preventative security.mp4 18.8 MB
  • mp4023 Monitoring and alerts.mp4 15.7 MB
  • mp4018 Describing security requirements.mp4 14.9 MB
  • mp4008 Dissecting the payment card industry and PCI DSS.mp4 14.6 MB
  • mp4007 Implementing control frameworks.mp4 14.3 MB
  • mp4025 Preparing for an incident.mp4 14.2 MB
  • mp4019 Architecting security risk.mp4 13.5 MB
  • mp4016 Understanding advanced persistent threats (APTs).mp4 13.5 MB
  • mp4004 Dissecting cyber risk.mp4 13.1 MB
  • mp4003 Understanding the NIST cybersecurity framework.mp4 12.6 MB
  • mp4011 Dissecting security threats.mp4 11.6 MB
  • mp4026 Responding to an incident.mp4 11.5 MB
  • mp4005 Unpacking COBIT 5.mp4 10.3 MB
  • mp4012 Exploring cybercrime as an industry.mp4 9.9 MB
  • mp4014 Using callbacks to capture keystrokes.mp4 9.8 MB
  • mp4015 Hiding malware with rootkits.mp4 9.8 MB
  • mp4009 Exploring the Cyber Essentials framework.mp4 9.3 MB
  • mp4013 Hiding malware through cloaking and alternate data streams.mp4 9.0 MB
  • mp4020 Selecting security controls.mp4 8.5 MB
共14页 上一页 10 11 12 13 14 下一页