为您索检到268条磁力链接,耗时0毫秒。
- 【影视】 Cybersecurity Prevention and Detection 2nd Edition (Video Collection)
-
收录时间:2024-05-31
文档个数:374
文档大小:3.8 GB
最近下载:2025-05-16
人气:4395
磁力链接
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/007. 1.6 Identity and access management.mp4 120.3 MB
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/003. 1.2 Log ingestion Part 2.mp4 117.9 MB
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/002. 1.1 Log ingestion Part 1.mp4 106.0 MB
03 Malware and Incident Response/Lesson 1 Threat Landscape/002. 1.1 Malware Threat Landscape.mp4 90.8 MB
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/005. 1.4 Infrastructure concepts.mp4 89.3 MB
04 Secure Operations and Protections/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/004. 2.3 Technology and tool integration.mp4 87.2 MB
01 Threat Intelligence and Threat Hunting/Lesson 2 Analyze Indicators of Potentially Malicious Activity/002. 2.1 Network-related.mp4 77.1 MB
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/008. 1.7 Encryption.mp4 76.0 MB
01 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/006. 3.5 Common techniques Part 3.mp4 63.7 MB
03 Malware and Incident Response/Lesson 5 PE File Identification/004. 5.3 Entry Points.mp4 62.4 MB
01 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/004. 3.3 Common techniques Part 1.mp4 56.9 MB
01 Threat Intelligence and Threat Hunting/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/002. 1.1 Threat actors Part 1.mp4 53.5 MB
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/004. 1.3 Operating system (OS) concepts.mp4 52.1 MB
01 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/005. 3.4 Common techniques Part 2.mp4 51.1 MB
02 System and Privacy Data Protection/Lesson 4 Analyzing Logs and Impact Analysis/008. 4.7 Impact Analysis.mp4 51.0 MB
01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/007. 7.6 SOC and FPGA.mp4 50.5 MB
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/006. 1.5 Network architecture.mp4 50.1 MB
01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/010. 7.9 Industrial Control Systems (ICS) and Process Automation.mp4 46.2 MB
01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/004. 7.3 Internet of Things (IoT) and Embedded Devices Part 2.mp4 45.3 MB
04 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/013. 4.12 Threat modeling.mp4 43.6 MB
猜你喜欢:
Cybersecurity
Collection
2nd
Detection
Edition
Video
Prevention
- 【影视】 [ CoursePig.com ] Linkedin - The Cybersecurity Threat Landscape (2022)
-
收录时间:2024-05-29
文档个数:42
文档大小:232.7 MB
最近下载:2025-04-21
人气:186
磁力链接
~Get Your Files Here !/10 - 9. Supply Chain Attacks and Third-Party Risks/01 - The threat of supply chain attacks and third-party risks.mp4 16.2 MB
~Get Your Files Here !/05 - 4. Botnets and DDoS attacks/02 - Protect against botnets and DDoS threats.mp4 15.8 MB
~Get Your Files Here !/08 - 7. Unmanaged IoT Devices/01 - Explore the threat of unmanaged IoT devices.mp4 14.4 MB
~Get Your Files Here !/09 - 8. Shadow IT/01 - Explore the threat of shadow IT.mp4 14.2 MB
~Get Your Files Here !/08 - 7. Unmanaged IoT Devices/02 - Protect against unmanaged IoT devices.mp4 12.4 MB
~Get Your Files Here !/09 - 8. Shadow IT/02 - Protect against shadow IT.mp4 12.4 MB
~Get Your Files Here !/06 - 5. Deepfakes/02 - Protect against deepfakes.mp4 12.1 MB
~Get Your Files Here !/03 - 2. Phishing and Smishing/02 - Protect against phishing and smishing.mp4 12.0 MB
~Get Your Files Here !/11 - Conclusion/01 - Stay up to date on cybersecurity.mp4 11.8 MB
~Get Your Files Here !/02 - 1. Malware and Ransomware/02 - Protect against malware and ransomware.mp4 11.7 MB
~Get Your Files Here !/02 - 1. Malware and Ransomware/01 - Explore the threat of malware and ransomware.mp4 11.6 MB
~Get Your Files Here !/03 - 2. Phishing and Smishing/01 - Explore the threat of phishing and smishing.mp4 11.3 MB
~Get Your Files Here !/05 - 4. Botnets and DDoS attacks/01 - Explore the threat of botnets and DDoS attacks.mp4 11.1 MB
~Get Your Files Here !/07 - 6. Insider Threats/01 - Explore the risk of insider threats.mp4 10.9 MB
~Get Your Files Here !/10 - 9. Supply Chain Attacks and Third-Party Risks/02 - Protect against supply chain attacks and third-party risks.mp4 10.5 MB
~Get Your Files Here !/04 - 3. Business Email Compromise/01 - Explore the threat of business email compromise.mp4 9.4 MB
~Get Your Files Here !/01 - Introduction/01 - Examine the cybersecurity threat landscape.mp4 9.4 MB
~Get Your Files Here !/04 - 3. Business Email Compromise/02 - Protect against business email compromise.mp4 9.2 MB
~Get Your Files Here !/06 - 5. Deepfakes/01 - Explore the threat of deepfakes.mp4 9.0 MB
~Get Your Files Here !/07 - 6. Insider Threats/02 - Protect against insider threats.mp4 7.0 MB
猜你喜欢:
2022
Cybersecurity
CoursePig
Linkedin
Threat
com
Landscape
- 【影视】 [ FreeCourseWeb.com ] Translating Cybersecurity for SMBs - Using the NIST Cybersecurity Framework 2.0
-
收录时间:2024-05-28
文档个数:43
文档大小:127.0 MB
最近下载:2025-05-11
人气:1074
磁力链接
~Get Your Files Here !/05 - 4. Identify/01 - Understand what you have.mp4 10.7 MB
~Get Your Files Here !/04 - 3. Govern/02 - Roll out your guidance.mp4 8.8 MB
~Get Your Files Here !/11 - Conclusion/01 - Build cybersecurity into your business.mp4 8.5 MB
~Get Your Files Here !/04 - 3. Govern/01 - Set your cyber strategy.mp4 8.1 MB
~Get Your Files Here !/06 - 5. Protect/02 - Guard your network.mp4 7.0 MB
~Get Your Files Here !/06 - 5. Protect/01 - Secure your system.mp4 7.0 MB
~Get Your Files Here !/07 - 6. Detect/01 - Know when things are off.mp4 6.9 MB
~Get Your Files Here !/08 - 7. Respond/01 - Address cyber incidents.mp4 6.7 MB
~Get Your Files Here !/08 - 7. Respond/02 - Keep everyone in the loop.mp4 6.7 MB
~Get Your Files Here !/09 - 8. Recover/01 - Get back to normal.mp4 6.6 MB
~Get Your Files Here !/03 - 2. NIST Cybersecurity Framework 2.0/01 - Cybersecurity framework fundamentals.mp4 6.3 MB
~Get Your Files Here !/10 - 9. Build Cyber Capabilities/01 - Determine your tier.mp4 6.2 MB
~Get Your Files Here !/02 - 1. Cybersecurity in Your Business/02 - Understand your cyber risks.mp4 6.0 MB
~Get Your Files Here !/03 - 2. NIST Cybersecurity Framework 2.0/02 - Leverage the cybersecurity framework.mp4 5.9 MB
~Get Your Files Here !/10 - 9. Build Cyber Capabilities/02 - Define your profile.mp4 5.9 MB
~Get Your Files Here !/02 - 1. Cybersecurity in Your Business/01 - Cornerstones of cybersecurity.mp4 5.4 MB
~Get Your Files Here !/02 - 1. Cybersecurity in Your Business/03 - Prioritize your biggest risks.mp4 4.9 MB
~Get Your Files Here !/10 - 9. Build Cyber Capabilities/03 - Create a plan.mp4 3.4 MB
~Get Your Files Here !/01 - Introduction/02 - What you should know.mp4 3.0 MB
~Get Your Files Here !/01 - Introduction/01 - Leverage the NIST CSF to protect what matters most.mp4 2.7 MB
猜你喜欢:
Cybersecurity
SMBs
Translating
Framework
FreeCourseWeb
Using
2.0
com
NIST
- 【影视】 [Coursera] Advanced Python Scripting for Cybersecurity Specialization - 3 course series
-
收录时间:2024-05-24
文档个数:97
文档大小:947.7 MB
最近下载:2025-05-15
人气:5150
磁力链接
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_04_detecting-ssh-brute-force-with-scapy.mp4 49.7 MB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_07_connection-hijacking-with-scapy.mp4 48.4 MB
python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_02_generating-password-variations-with-python.mp4 46.5 MB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_05_service-detection-with-python.mp4 45.6 MB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_05_feature-selection-for-traffic-analysis.mp4 45.2 MB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_03_searching-the-registry-with-python.mp4 45.2 MB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_02_querying-shodan-with-python.mp4 44.0 MB
establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_02_traffic-analysis-with-python.mp4 43.7 MB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_04_network-scanning-with-scapy.mp4 38.8 MB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_02_brute-force-detection-with-windows-events.mp4 38.8 MB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_03_detecting-ftp-brute-force-with-scapy.mp4 35.1 MB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_04_searching-the-system-with-python.mp4 34.9 MB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_02_dumping-chrome-credentials-with-python.mp4 34.8 MB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_06_analyzing-passwords-with-python.mp4 34.5 MB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_03_dns-queries-with-python.mp4 30.9 MB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_06_detecting-anomalous-network-traffic-with-scapy.mp4 28.8 MB
establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_05_building-c2-packets-with-python.mp4 27.1 MB
python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_04_automating-brute-force.mp4 25.9 MB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_05_cracking-the-linux-passwords-with-python.mp4 24.4 MB
establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_04_detecting-encodings-with-python.mp4 24.1 MB
猜你喜欢:
Specialization
course
Python
series
Coursera
Cybersecurity
Advanced
Scripting
- 【影视】 [Coursera] Python for Cybersecurity Specialization - 5 course series
-
收录时间:2024-05-20
文档个数:290
文档大小:1.2 GB
最近下载:2025-05-15
人气:5313
磁力链接
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_03_alternative-protocol.mp4 61.8 MB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_05_network-sniffing.mp4 42.0 MB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_04_network-scanning.mp4 32.5 MB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_05_protocol-decoding.mp4 31.5 MB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_07_behavioral-analytics.mp4 29.2 MB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_03_registry-autorun.mp4 29.0 MB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_05_hijacked-execution-flow.mp4 27.5 MB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_06_dns-exploration.mp4 27.3 MB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_05_system-activity-monitoring.mp4 26.6 MB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_03_pcap-collection.mp4 26.0 MB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_03_encrypted-channel.mp4 25.8 MB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_05_scheduled-execution.mp4 25.8 MB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_03_user-account-discovery.mp4 25.4 MB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_03_logon-scripts.mp4 24.6 MB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_03_data-encryption.mp4 23.6 MB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_05_alternate-data-streams.mp4 22.4 MB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_03_default-account-discovery.mp4 21.7 MB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_05_autorun-scripts.mp4 21.2 MB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_03_impair-avs.mp4 20.8 MB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_03_credentials-from-web-browsers.mp4 20.7 MB
猜你喜欢:
Specialization
course
Python
series
Coursera
Cybersecurity
- 【影视】 [ FreeCourseWeb.com ] Linkedin - The Future of Work and Cybersecurity on the Metaverse
-
收录时间:2024-05-07
文档个数:42
文档大小:101.1 MB
最近下载:2025-03-14
人气:219
磁力链接
~Get Your Files Here !/03 - 2. The Essentials/03 - The future of work potential risk categories.mp4 6.9 MB
~Get Your Files Here !/03 - 2. The Essentials/02 - The impact of cyber threats on your business or industry.mp4 6.7 MB
~Get Your Files Here !/04 - 3. Threats/10 - Does metaverse-based work need an HR redesign.mp4 6.5 MB
~Get Your Files Here !/05 - Conclusion/01 - The future of the metaverse of work.mp4 6.4 MB
~Get Your Files Here !/04 - 3. Threats/11 - Decoupling business units and needs.mp4 6.2 MB
~Get Your Files Here !/02 - 1. Defining the Metaverse/01 - What is the metaverse today.mp4 5.6 MB
~Get Your Files Here !/01 - Introduction/02 - What to know before starting this course.mp4 5.5 MB
~Get Your Files Here !/04 - 3. Threats/09 - Regulations for metaverse-based work.mp4 5.2 MB
~Get Your Files Here !/04 - 3. Threats/02 - Threats to your brand.mp4 4.9 MB
~Get Your Files Here !/04 - 3. Threats/08 - Identity theft threats.mp4 4.8 MB
~Get Your Files Here !/03 - 2. The Essentials/01 - Understanding the metaverse environment and its suitability for your industry.mp4 4.7 MB
~Get Your Files Here !/04 - 3. Threats/07 - Cybersecurity threats.mp4 4.6 MB
~Get Your Files Here !/04 - 3. Threats/03 - Threats to your job profile or role.mp4 4.6 MB
~Get Your Files Here !/04 - 3. Threats/04 - Platform-specific threats.mp4 4.6 MB
~Get Your Files Here !/04 - 3. Threats/06 - Regulatory professional threats.mp4 4.5 MB
~Get Your Files Here !/02 - 1. Defining the Metaverse/02 - The various ways in which the metaverse can impact work.mp4 4.4 MB
~Get Your Files Here !/04 - 3. Threats/01 - Threats to the profession.mp4 4.4 MB
~Get Your Files Here !/04 - 3. Threats/05 - Hardware equipment-specific threats.mp4 4.3 MB
~Get Your Files Here !/01 - Introduction/01 - Why discuss the future of work and the metaverse.mp4 3.9 MB
~Get Your Files Here !/05 - Conclusion/02 - Where to begin.mp4 2.4 MB
猜你喜欢:
Cybersecurity
Work
Linkedin
Metaverse
Future
FreeCourseWeb
com
- 【影视】 DIY Cybersecurity Degree
-
收录时间:2024-05-07
文档个数:7179
文档大小:233.4 GB
最近下载:2025-05-15
人气:1770
磁力链接
100 Days of Code The Complete Python Pro Bootcamp for 2023/101 - Final Stretch/002 Study With Me.mp4 1.9 GB
100 Days of Code The Complete Python Pro Bootcamp for 2023/101 - Final Stretch/001 Recording of our Live AMA (aka AAA - Ask Angela Anything).mp4 713.4 MB
CompTIA/CompTIA A+ Core 1 (220-1101)/5. Troubleshooting Hardware and Networking/5.2 Troubleshooting PC Components.mp4 697.8 MB
CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.1 Network Cables.mp4 637.3 MB
CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.4 Random-access Memory.mp4 579.5 MB
Job Tips/Behavioral Interview Prep/03. General Tips.mp4 571.0 MB
CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.4 Technical Controls - The Basics.mp4 551.2 MB
CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.6 Motherboards.mp4 540.8 MB
CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.5 Storage Devices.mp4 527.8 MB
CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.3 Non-Technical Controls - The Rest.mp4 526.4 MB
CompTIA/CompTIA A+ Core 1 (220-1101)/1. Mobile Devices/1.2 Laptop Hardware and Components.mp4 525.8 MB
CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.8 How do we Analyze Risk.mp4 509.3 MB
CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.23 Social Engineering and Physical Attacks.mp4 498.2 MB
CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.2 Non-Technical Controls - The Basics.mp4 486.5 MB
CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.2 Peripheral and Video Cables.mp4 485.9 MB
CompTIA/CompTIA PenTest + (PT0-002)/4. Reporting and Communication/4.3 Communication During a Pentest.mp4 478.0 MB
CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.14 Frameworks, Audits and Policy.mp4 473.1 MB
CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.10 How do we Document and Train for Risk.mp4 472.2 MB
CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.15 IAM Policies and Procedures.mp4 463.2 MB
CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.9 How do we Prioritize, Communicate Risk.mp4 460.5 MB
猜你喜欢:
Cybersecurity
DIY
Degree
- 【影视】 [ DevCourseWeb.com ] Linkedin - Leveraging ChatGPT for Smarter Cybersecurity
-
收录时间:2024-05-07
文档个数:30
文档大小:112.3 MB
最近下载:2025-05-14
人气:558
磁力链接
~Get Your Files Here !/03 - 2. ChatGPT and Security Implications/03 - Uncovering NLP-based cyber threats ChatGPT vulnerabilities.mp4 12.1 MB
~Get Your Files Here !/05 - 4. Integrating ChatGPT with Security Systems/02 - Optimizing cybersecurity with ChatGPT integration in SIEM.mp4 10.5 MB
~Get Your Files Here !/05 - 4. Integrating ChatGPT with Security Systems/04 - Securing the future with ChatGPT and OpenAI in Microsoft Security Copilot.mp4 10.1 MB
~Get Your Files Here !/05 - 4. Integrating ChatGPT with Security Systems/03 - Enhancing vulnerability management with ChatGPT.mp4 9.0 MB
~Get Your Files Here !/02 - 1. Introduction to ChatGPT and Natural Language Processing/02 - Inside ChatGPT NLP and ML uncovered for enhanced understanding.mp4 8.7 MB
~Get Your Files Here !/04 - 3. ChatGPT for Incident Response/02 - Triage potential incidents, analyze logs, and assist investigations.mp4 8.1 MB
~Get Your Files Here !/03 - 2. ChatGPT and Security Implications/02 - Guarding against NLP-based cyberattacks on ChatGPT.mp4 7.8 MB
~Get Your Files Here !/06 - Conclusion/01 - Stay vigilant, stay curious, and extend your skills.mp4 7.7 MB
~Get Your Files Here !/02 - 1. Introduction to ChatGPT and Natural Language Processing/01 - Unleashing the power of OpenAI's ChatGPT for cybersecurity.mp4 7.5 MB
~Get Your Files Here !/04 - 3. ChatGPT for Incident Response/01 - Overview of incident response and forensic analysis.mp4 7.5 MB
~Get Your Files Here !/03 - 2. ChatGPT and Security Implications/01 - Security risks associated with ChatGPT.mp4 7.1 MB
~Get Your Files Here !/05 - 4. Integrating ChatGPT with Security Systems/01 - Advanced threat detection with ChatGPT in SIEM.mp4 6.3 MB
~Get Your Files Here !/02 - 1. Introduction to ChatGPT and Natural Language Processing/03 - Inside ChatGPT Unraveling key concepts and technologies.mp4 5.9 MB
~Get Your Files Here !/01 - Introduction/01 - Leveraging AI for advanced threat detection and prevention.mp4 3.9 MB
~Get Your Files Here !/05 - 4. Integrating ChatGPT with Security Systems/03 - Enhancing vulnerability management with ChatGPT.srt 8.3 kB
~Get Your Files Here !/05 - 4. Integrating ChatGPT with Security Systems/02 - Optimizing cybersecurity with ChatGPT integration in SIEM.srt 6.4 kB
~Get Your Files Here !/03 - 2. ChatGPT and Security Implications/03 - Uncovering NLP-based cyber threats ChatGPT vulnerabilities.srt 6.4 kB
~Get Your Files Here !/04 - 3. ChatGPT for Incident Response/01 - Overview of incident response and forensic analysis.srt 6.2 kB
~Get Your Files Here !/02 - 1. Introduction to ChatGPT and Natural Language Processing/01 - Unleashing the power of OpenAI's ChatGPT for cybersecurity.srt 6.1 kB
~Get Your Files Here !/02 - 1. Introduction to ChatGPT and Natural Language Processing/02 - Inside ChatGPT NLP and ML uncovered for enhanced understanding.srt 6.0 kB
猜你喜欢:
Cybersecurity
Smarter
Leveraging
Linkedin
DevCourseWeb
ChatGPT
com
- 【压缩文件】 SEC595 - Applied Data Science and AI Machine Learning for Cybersecurity Professionals
-
收录时间:2024-05-03
文档个数:7
文档大小:26.1 GB
最近下载:2025-05-16
人气:4260
磁力链接
USB 2021/595.7z 21.3 GB
LIVE 2021/5. Day Five.mp4 1.2 GB
LIVE 2021/1. Day One.mp4 1.1 GB
LIVE 2021/2. Day Two.mp4 903.0 MB
LIVE 2021/3. Day Three.mp4 858.8 MB
LIVE 2021/4. Day Four.mp4 784.1 MB
PDF 2021/SEC595-Applied-Data-Science-and-Machine-Learning-for-Cybersecurity-Professionals.pdf 61.3 MB
猜你喜欢:
Applied
Cybersecurity
Professionals
SEC595
Science
Machine
AI
Learning
Data
- 【文档书籍】 [ FreeCourseWeb.com ] Cybersecurity Unlocked! - Strategies To Outsmart Hackers, and Online Criminals
-
收录时间:2024-04-10
文档个数:3
文档大小:95.2 MB
最近下载:2025-05-16
人气:5529
磁力链接
~Get Your Files Here !/B0CW1D7MVY.pdf 95.2 MB
~Get Your Files Here !/Bonus Resources.txt 386 Bytes
Get Bonus Downloads Here.url 183 Bytes
猜你喜欢:
Criminals
Hackers
Outsmart
Cybersecurity
Unlocked
FreeCourseWeb
Online
Strategies
com
- 【影视】 [ DevCourseWeb.com ] Udemy - ChatGPT, ML, and AI for Cybersecurity, SOCs and Business
-
收录时间:2024-04-07
文档个数:14
文档大小:3.7 GB
最近下载:2025-05-16
人气:2616
磁力链接
~Get Your Files Here !/3. AI Tools for Security.mp4 683.8 MB
~Get Your Files Here !/4. Enhancing Search Capabilities with GPT4all Plugins.mp4 576.0 MB
~Get Your Files Here !/2. Fundamentals of ChatGPT and GPT4all.mp4 553.4 MB
~Get Your Files Here !/1. Introduction to Machine Learning and AI for Security.mp4 520.6 MB
~Get Your Files Here !/8. Future Trends and Challenges in AI Security.mp4 452.9 MB
~Get Your Files Here !/6. Evaluating AI Security.mp4 379.7 MB
~Get Your Files Here !/5. Securing AI Models and Data.mp4 280.8 MB
~Get Your Files Here !/7. Case Studies of Real-World AI Applications.mp4 279.0 MB
~Get Your Files Here !/Bonus Resources.txt 386 Bytes
Get Bonus Downloads Here.url 182 Bytes
~Get Your Files Here !/9. Final Exam.html 146 Bytes
~Get Your Files Here !/4.2 Github Plugins (primarily for ChatGPT and Python implementations thereof)..html 124 Bytes
~Get Your Files Here !/4.1 ChatGPT Plugins.html 100 Bytes
~Get Your Files Here !/4.3 GPT4All Website and Downloads.html 90 Bytes
猜你喜欢:
Business
AI
ML
Udemy
DevCourseWeb
Cybersecurity
SOCs
ChatGPT
com
- 【文档书籍】 Cybersecurity Unlocked
-
收录时间:2024-04-07
文档个数:2
文档大小:95.2 MB
最近下载:2025-05-15
人气:1740
磁力链接
Cybersecurity Unlocked.pdf 95.2 MB
Readme.txt 682 Bytes
猜你喜欢:
Cybersecurity
Unlocked
- 【文档书籍】 Mastering Cybersecurity
-
收录时间:2024-04-03
文档个数:1
文档大小:153.1 MB
最近下载:2025-05-16
人气:5050
磁力链接
B0CZLYGXLN.pdf 153.1 MB
猜你喜欢:
Cybersecurity
Mastering
- 【影视】 [LiveLessons] The Complete Cybersecurity Bootcamp, 2nd Edition [En]
-
收录时间:2024-03-28
文档个数:290
文档大小:6.5 GB
最近下载:2025-05-15
人气:850
磁力链接
29.2 Hacking iOS.mp4 86.6 MB
17.13 Performing SMTP and DNS Enumeration.mp4 80.0 MB
21.3 Exploring Wireless Threats.mp4 79.0 MB
33.2 Understanding IoT Attacks.mp4 76.8 MB
17.14 Conducting Additional Enumeration Techniques.mp4 75.8 MB
33.1 Introducing IoT Concepts.mp4 74.4 MB
29.1 Understanding Mobile Platform Attack Vectors.mp4 73.4 MB
17.10 Performing SNMP Enumeration.mp4 71.8 MB
17.3 Understanding Host Discovery.mp4 69.7 MB
5.6 Analyzing Computer Incident Response Teams (CSIRTs).mp4 68.5 MB
17.6 Scanning Beyond IDS and Firewall.mp4 68.2 MB
27.5 Cracking Passwords with John the Ripper.mp4 66.1 MB
7.8 Understanding the MITRE ATT&CK Framework.mp4 65.8 MB
29.3 Hacking Android OS.mp4 63.8 MB
20.4 Exploring SQL Injection Tools.mp4 63.3 MB
21.2 Understanding Wireless Encryption.mp4 62.7 MB
17.12 Performing NTP and NFS Enumeration.mp4 61.8 MB
16.10 Performing Footprinting through Social Engineering.mp4 59.1 MB
8.3 Understanding Evidence Collection.mp4 57.2 MB
21.6 Hacking Bluetooth.mp4 52.3 MB
猜你喜欢:
En
Complete
Cybersecurity
LiveLessons
2nd
Edition
Bootcamp
- 【影视】 [ FreeCourseWeb.com ] Cybersecurity Careers - Build Your Brand in Cybersecurity
-
收录时间:2024-03-28
文档个数:34
文档大小:189.3 MB
最近下载:2025-05-11
人气:673
磁力链接
~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/04 - Optimizing your LinkedIn profile.mp4 18.6 MB
~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/05 - Five tips for using LinkedIn effectively.mp4 17.3 MB
~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/02 - Speaking at events and conferences.mp4 16.1 MB
~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/01 - Creating and sharing content.mp4 16.0 MB
~Get Your Files Here !/02 - 1. Personal Branding in Cybersecurity/03 - Benefits of building your personal brand in cybersecurity.mp4 13.9 MB
~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/03 - Building an online presence.mp4 13.6 MB
~Get Your Files Here !/02 - 1. Personal Branding in Cybersecurity/02 - Elements of a strong personal brand.mp4 13.1 MB
~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/02 - Developing a personal brand statement.mp4 11.7 MB
~Get Your Files Here !/05 - 4. Networking for Cybersecurity Professionals/03 - Staying up-to-date with industry trends.mp4 11.6 MB
~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/03 - Contributing to open-source projects.mp4 11.0 MB
~Get Your Files Here !/05 - 4. Networking for Cybersecurity Professionals/01 - Networking and nurturing professional relationships.mp4 10.4 MB
~Get Your Files Here !/02 - 1. Personal Branding in Cybersecurity/01 - What is personal branding.mp4 10.1 MB
~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/01 - Identifying your unique value proposition.mp4 10.0 MB
~Get Your Files Here !/05 - 4. Networking for Cybersecurity Professionals/02 - Effective networking strategies.mp4 8.0 MB
~Get Your Files Here !/01 - Introduction/01 - Grow your cybersecurity career with personal branding.mp4 3.9 MB
~Get Your Files Here !/06 - Conclusion/01 - Next steps.mp4 3.9 MB
~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/02 - Speaking at events and conferences.srt 8.6 kB
~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/01 - Creating and sharing content.srt 7.9 kB
~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/04 - Optimizing your LinkedIn profile.srt 7.5 kB
~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/03 - Building an online presence.srt 7.5 kB
猜你喜欢:
Cybersecurity
Brand
FreeCourseWeb
Build
com
Your
Careers
- 【文档书籍】 [ CoursePig.com ] Certificate in Cybersecurity Analysis (IIBA-CCA) - Getting Started
-
收录时间:2024-03-27
文档个数:13
文档大小:152.9 MB
最近下载:2025-05-16
人气:496
磁力链接
~Get Your Files Here !/Exercise Files/02/defining-cybersecurity-for-business-professionals-slides.pdf 42.5 MB
~Get Your Files Here !/03. Defining Cybersecurity in an Organization/04. Introduction to Cybersecurity Frameworks.mp4 20.2 MB
~Get Your Files Here !/Exercise Files/03/defining-cybersecurity-in-an-organization-slides.pdf 18.1 MB
~Get Your Files Here !/02. Defining Cybersecurity for Business Professionals/03. Cybersecurity Business Analysis and Building in Security.mp4 14.7 MB
~Get Your Files Here !/04. Describing Key Enterprise Risk Concepts/08. How to Build Disaster Recovery and Business Continuity Plans.mp4 13.7 MB
~Get Your Files Here !/02. Defining Cybersecurity for Business Professionals/02. Understanding the Business Value of Cybersecurity Today.mp4 10.5 MB
~Get Your Files Here !/03. Defining Cybersecurity in an Organization/05. Identifying What an ISMS Is and the Critical Focus on Data Privacy.mp4 9.4 MB
~Get Your Files Here !/04. Describing Key Enterprise Risk Concepts/07. Introduction to Cyber Risk Assessments.mp4 9.4 MB
~Get Your Files Here !/Exercise Files/04/describing-key-enterprise-risk-concepts-slides.pdf 6.3 MB
~Get Your Files Here !/01. Course Overview/01. Course Overview.mp4 4.0 MB
~Get Your Files Here !/03. Defining Cybersecurity in an Organization/06. Defining Data Minimization Activities and Using Security Frameworks.mp4 3.9 MB
~Get Your Files Here !/Bonus Resources.txt 386 Bytes
Get Bonus Downloads Here.url 179 Bytes
猜你喜欢:
Certificate
Getting
Cybersecurity
CCA
CoursePig
Analysis
Started
IIBA
com
- 【压缩文件】 [ CourseMega.com ] Udemy - Cybersecurity - Attack & Defense Strategies (Red & Blue Team).zip
-
收录时间:2024-03-26
文档个数:1
文档大小:3.0 GB
最近下载:2025-05-16
人气:3369
磁力链接
[ CourseMega.com ] Udemy - Cybersecurity - Attack & Defense Strategies (Red & Blue Team).zip 3.0 GB
猜你喜欢:
Blue
zip
Cybersecurity
Udemy
Attack
Defense
Team
Strategies
CourseMega
com
- 【影视】 [ DevCourseWeb.com ] Udemy - Mastering Cybersecurity and Supply Chain Risk Management
-
收录时间:2024-03-23
文档个数:41
文档大小:3.6 GB
最近下载:2025-05-15
人气:1529
磁力链接
~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/7. Recover.mp4 205.3 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/4. Network Security Controls.mp4 173.8 MB
~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/5. Incident Analysis.mp4 150.0 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/1. User and Network Infrastructure.mp4 136.2 MB
~Get Your Files Here !/1. Introduction to NIST Framework/3. NIST Framework Core.mp4 130.0 MB
~Get Your Files Here !/5. Effective Supply Chain Risk Management/4. Develop, Assess and Test Supply Chain Risks.mp4 123.4 MB
~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/3. Executable Response Plan.mp4 116.0 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/9. Information Protection.mp4 115.2 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/8. Hardware Integrity.mp4 105.7 MB
~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/1. Developing a Continuity of Operations Plan.mp4 103.2 MB
~Get Your Files Here !/2. Cybersecurity Risk Planning & Management/4. Keeping Hardware Inventory Updated.mp4 102.7 MB
~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/2. Incident Response.mp4 102.1 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/7. Data Security.mp4 101.4 MB
~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/6. Mitigation.mp4 101.0 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/2. Authentication and Access Control.mp4 100.3 MB
~Get Your Files Here !/2. Cybersecurity Risk Planning & Management/7. Personnel Security Requirements.mp4 98.1 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/10. Patch Management.mp4 97.7 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/5. Association and Authentication.mp4 91.7 MB
~Get Your Files Here !/5. Effective Supply Chain Risk Management/1. Supply Chain Risk Management.mp4 90.7 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/12. Protective Technology.mp4 88.5 MB
猜你喜欢:
Management
Risk
Chain
Supply
Cybersecurity
Udemy
DevCourseWeb
Mastering
com
- 【影视】 [ DevCourseWeb.com ] Udemy - Trustee Shield - Cybersecurity Foundation for Kids and Teens
-
收录时间:2024-03-22
文档个数:104
文档大小:4.3 GB
最近下载:2025-05-13
人气:2034
磁力链接
~Get Your Files Here !/5. Internet Cookies/6. Protection against Cookie risks.mp4 147.6 MB
~Get Your Files Here !/7. Phishing/13. Activity Revised.mp4 141.4 MB
~Get Your Files Here !/1. Passwords/5. Making unhackable password.mp4 115.0 MB
~Get Your Files Here !/5. Internet Cookies/5. Cookies Risks for Online Privacy.mp4 106.2 MB
~Get Your Files Here !/5. Internet Cookies/3. Internet Cookies.mp4 96.9 MB
~Get Your Files Here !/3. Malware/7. Trojan Horses.mp4 96.4 MB
~Get Your Files Here !/4. Insecure Websites/5. Search Engine.mp4 95.6 MB
~Get Your Files Here !/6. Online Privacy/13. How To Protect Privacy- Part (2).mp4 94.8 MB
~Get Your Files Here !/2. Multi-Factor Authentication (MFA)/8. Password Managers.mp4 90.9 MB
~Get Your Files Here !/6. Online Privacy/12. How To Protect Privacy- Part (1).mp4 81.2 MB
~Get Your Files Here !/8. Social Engineering/10. Protection against Social Engineering attacks.mp4 80.4 MB
~Get Your Files Here !/8. Social Engineering/9. Ransomwares.mp4 77.5 MB
~Get Your Files Here !/8. Social Engineering/3. What is Social Engineering.mp4 75.1 MB
~Get Your Files Here !/2. Multi-Factor Authentication (MFA)/6. Two-Factor Authentication (2FA).mp4 70.2 MB
~Get Your Files Here !/1. Passwords/3. Password Definition.mp4 68.9 MB
~Get Your Files Here !/8. Social Engineering/4. Hackers Perspective.mp4 68.3 MB
~Get Your Files Here !/3. Malware/12. Defensive Methods against Malware.mp4 62.5 MB
~Get Your Files Here !/4. Insecure Websites/7. Why HTTPS is More Secure than HTTP.mp4 62.5 MB
~Get Your Files Here !/3. Malware/6. Worms.mp4 61.9 MB
~Get Your Files Here !/6. Online Privacy/8. Digital Footprint Impacts.mp4 61.7 MB
猜你喜欢:
Foundation
Kids
Shield
Cybersecurity
Udemy
DevCourseWeb
Teens
com
Trustee
- 【影视】 [ CourseWikia.com ] Cybersecurity at Work (2023)
-
收录时间:2024-03-22
文档个数:54
文档大小:199.8 MB
最近下载:2025-05-13
人气:480
磁力链接
~Get Your Files Here !/06 - 5. Hybrid Work Security/05 - Scenario Stolen laptop.mp4 18.0 MB
~Get Your Files Here !/05 - 4. Software and Internet Security/05 - The anatomy of a cyber attack.mp4 11.6 MB
~Get Your Files Here !/04 - 3. Account Security/01 - Password security.mp4 11.5 MB
~Get Your Files Here !/06 - 5. Hybrid Work Security/01 - Physical office security.mp4 10.9 MB
~Get Your Files Here !/02 - 1. Social Engineering Scams and Attacks/05 - Scenario Voice phishing.mp4 10.1 MB
~Get Your Files Here !/02 - 1. Social Engineering Scams and Attacks/04 - Counterfeit apps.mp4 10.0 MB
~Get Your Files Here !/06 - 5. Hybrid Work Security/04 - Smartphone and mobile device attacks.mp4 9.4 MB
~Get Your Files Here !/04 - 3. Account Security/02 - Data breaches and compromised passwords.mp4 9.0 MB
~Get Your Files Here !/03 - 2. Wireless Security/01 - Public Wi-Fi.mp4 9.0 MB
~Get Your Files Here !/05 - 4. Software and Internet Security/04 - Malware Ransomware.mp4 9.0 MB
~Get Your Files Here !/06 - 5. Hybrid Work Security/03 - Laptop and desktop security.mp4 8.2 MB
~Get Your Files Here !/05 - 4. Software and Internet Security/01 - Updating software.mp4 8.1 MB
~Get Your Files Here !/02 - 1. Social Engineering Scams and Attacks/03 - Social media information (over)sharing.mp4 7.9 MB
~Get Your Files Here !/08 - Conclusion/01 - You are part of the security team.mp4 7.2 MB
~Get Your Files Here !/06 - 5. Hybrid Work Security/02 - Physical office security best practices.mp4 7.1 MB
~Get Your Files Here !/03 - 2. Wireless Security/02 - Home Wi-Fi.mp4 6.9 MB
~Get Your Files Here !/02 - 1. Social Engineering Scams and Attacks/02 - Email phishing.mp4 6.5 MB
~Get Your Files Here !/02 - 1. Social Engineering Scams and Attacks/01 - Social engineering overview.mp4 6.4 MB
~Get Your Files Here !/07 - 6. Data Security/01 - Intellectual property.mp4 5.6 MB
~Get Your Files Here !/04 - 3. Account Security/03 - Multifactor authentication.mp4 5.1 MB
猜你喜欢:
Cybersecurity
CourseWikia
com
Work
2023