磁力管家

磁力管家
为您索检到268条磁力链接,耗时0毫秒。 rss

分享给好友

【影视】 Cybersecurity Prevention and Detection 2nd Edition (Video Collection)
收录时间:2024-05-31 文档个数:374 文档大小:3.8 GB 最近下载:2025-05-16 人气:4395 磁力链接
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/007. 1.6 Identity and access management.mp4 120.3 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/003. 1.2 Log ingestion Part 2.mp4 117.9 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/002. 1.1 Log ingestion Part 1.mp4 106.0 MB
  • mp403 Malware and Incident Response/Lesson 1 Threat Landscape/002. 1.1 Malware Threat Landscape.mp4 90.8 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/005. 1.4 Infrastructure concepts.mp4 89.3 MB
  • mp404 Secure Operations and Protections/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/004. 2.3 Technology and tool integration.mp4 87.2 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 2 Analyze Indicators of Potentially Malicious Activity/002. 2.1 Network-related.mp4 77.1 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/008. 1.7 Encryption.mp4 76.0 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/006. 3.5 Common techniques Part 3.mp4 63.7 MB
  • mp403 Malware and Incident Response/Lesson 5 PE File Identification/004. 5.3 Entry Points.mp4 62.4 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/004. 3.3 Common techniques Part 1.mp4 56.9 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/002. 1.1 Threat actors Part 1.mp4 53.5 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/004. 1.3 Operating system (OS) concepts.mp4 52.1 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/005. 3.4 Common techniques Part 2.mp4 51.1 MB
  • mp402 System and Privacy Data Protection/Lesson 4 Analyzing Logs and Impact Analysis/008. 4.7 Impact Analysis.mp4 51.0 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/007. 7.6 SOC and FPGA.mp4 50.5 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/006. 1.5 Network architecture.mp4 50.1 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/010. 7.9 Industrial Control Systems (ICS) and Process Automation.mp4 46.2 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/004. 7.3 Internet of Things (IoT) and Embedded Devices Part 2.mp4 45.3 MB
  • mp404 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/013. 4.12 Threat modeling.mp4 43.6 MB
【影视】 [ CoursePig.com ] Linkedin - The Cybersecurity Threat Landscape (2022)
收录时间:2024-05-29 文档个数:42 文档大小:232.7 MB 最近下载:2025-04-21 人气:186 磁力链接
  • mp4~Get Your Files Here !/10 - 9. Supply Chain Attacks and Third-Party Risks/01 - The threat of supply chain attacks and third-party risks.mp4 16.2 MB
  • mp4~Get Your Files Here !/05 - 4. Botnets and DDoS attacks/02 - Protect against botnets and DDoS threats.mp4 15.8 MB
  • mp4~Get Your Files Here !/08 - 7. Unmanaged IoT Devices/01 - Explore the threat of unmanaged IoT devices.mp4 14.4 MB
  • mp4~Get Your Files Here !/09 - 8. Shadow IT/01 - Explore the threat of shadow IT.mp4 14.2 MB
  • mp4~Get Your Files Here !/08 - 7. Unmanaged IoT Devices/02 - Protect against unmanaged IoT devices.mp4 12.4 MB
  • mp4~Get Your Files Here !/09 - 8. Shadow IT/02 - Protect against shadow IT.mp4 12.4 MB
  • mp4~Get Your Files Here !/06 - 5. Deepfakes/02 - Protect against deepfakes.mp4 12.1 MB
  • mp4~Get Your Files Here !/03 - 2. Phishing and Smishing/02 - Protect against phishing and smishing.mp4 12.0 MB
  • mp4~Get Your Files Here !/11 - Conclusion/01 - Stay up to date on cybersecurity.mp4 11.8 MB
  • mp4~Get Your Files Here !/02 - 1. Malware and Ransomware/02 - Protect against malware and ransomware.mp4 11.7 MB
  • mp4~Get Your Files Here !/02 - 1. Malware and Ransomware/01 - Explore the threat of malware and ransomware.mp4 11.6 MB
  • mp4~Get Your Files Here !/03 - 2. Phishing and Smishing/01 - Explore the threat of phishing and smishing.mp4 11.3 MB
  • mp4~Get Your Files Here !/05 - 4. Botnets and DDoS attacks/01 - Explore the threat of botnets and DDoS attacks.mp4 11.1 MB
  • mp4~Get Your Files Here !/07 - 6. Insider Threats/01 - Explore the risk of insider threats.mp4 10.9 MB
  • mp4~Get Your Files Here !/10 - 9. Supply Chain Attacks and Third-Party Risks/02 - Protect against supply chain attacks and third-party risks.mp4 10.5 MB
  • mp4~Get Your Files Here !/04 - 3. Business Email Compromise/01 - Explore the threat of business email compromise.mp4 9.4 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Examine the cybersecurity threat landscape.mp4 9.4 MB
  • mp4~Get Your Files Here !/04 - 3. Business Email Compromise/02 - Protect against business email compromise.mp4 9.2 MB
  • mp4~Get Your Files Here !/06 - 5. Deepfakes/01 - Explore the threat of deepfakes.mp4 9.0 MB
  • mp4~Get Your Files Here !/07 - 6. Insider Threats/02 - Protect against insider threats.mp4 7.0 MB
【影视】 [ FreeCourseWeb.com ] Translating Cybersecurity for SMBs - Using the NIST Cybersecurity Framework 2.0
收录时间:2024-05-28 文档个数:43 文档大小:127.0 MB 最近下载:2025-05-11 人气:1074 磁力链接
  • mp4~Get Your Files Here !/05 - 4. Identify/01 - Understand what you have.mp4 10.7 MB
  • mp4~Get Your Files Here !/04 - 3. Govern/02 - Roll out your guidance.mp4 8.8 MB
  • mp4~Get Your Files Here !/11 - Conclusion/01 - Build cybersecurity into your business.mp4 8.5 MB
  • mp4~Get Your Files Here !/04 - 3. Govern/01 - Set your cyber strategy.mp4 8.1 MB
  • mp4~Get Your Files Here !/06 - 5. Protect/02 - Guard your network.mp4 7.0 MB
  • mp4~Get Your Files Here !/06 - 5. Protect/01 - Secure your system.mp4 7.0 MB
  • mp4~Get Your Files Here !/07 - 6. Detect/01 - Know when things are off.mp4 6.9 MB
  • mp4~Get Your Files Here !/08 - 7. Respond/01 - Address cyber incidents.mp4 6.7 MB
  • mp4~Get Your Files Here !/08 - 7. Respond/02 - Keep everyone in the loop.mp4 6.7 MB
  • mp4~Get Your Files Here !/09 - 8. Recover/01 - Get back to normal.mp4 6.6 MB
  • mp4~Get Your Files Here !/03 - 2. NIST Cybersecurity Framework 2.0/01 - Cybersecurity framework fundamentals.mp4 6.3 MB
  • mp4~Get Your Files Here !/10 - 9. Build Cyber Capabilities/01 - Determine your tier.mp4 6.2 MB
  • mp4~Get Your Files Here !/02 - 1. Cybersecurity in Your Business/02 - Understand your cyber risks.mp4 6.0 MB
  • mp4~Get Your Files Here !/03 - 2. NIST Cybersecurity Framework 2.0/02 - Leverage the cybersecurity framework.mp4 5.9 MB
  • mp4~Get Your Files Here !/10 - 9. Build Cyber Capabilities/02 - Define your profile.mp4 5.9 MB
  • mp4~Get Your Files Here !/02 - 1. Cybersecurity in Your Business/01 - Cornerstones of cybersecurity.mp4 5.4 MB
  • mp4~Get Your Files Here !/02 - 1. Cybersecurity in Your Business/03 - Prioritize your biggest risks.mp4 4.9 MB
  • mp4~Get Your Files Here !/10 - 9. Build Cyber Capabilities/03 - Create a plan.mp4 3.4 MB
  • mp4~Get Your Files Here !/01 - Introduction/02 - What you should know.mp4 3.0 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Leverage the NIST CSF to protect what matters most.mp4 2.7 MB
【影视】 [Coursera] Advanced Python Scripting for Cybersecurity Specialization - 3 course series
收录时间:2024-05-24 文档个数:97 文档大小:947.7 MB 最近下载:2025-05-15 人气:5150 磁力链接
  • mp4defensive-python/01_defensive-python onehack.us/01_defensive-python/01_04_detecting-ssh-brute-force-with-scapy.mp4 49.7 MB
  • mp4defensive-python/01_defensive-python onehack.us/01_defensive-python/01_07_connection-hijacking-with-scapy.mp4 48.4 MB
  • mp4python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_02_generating-password-variations-with-python.mp4 46.5 MB
  • mp4python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_05_service-detection-with-python.mp4 45.6 MB
  • mp4defensive-python/01_defensive-python onehack.us/01_defensive-python/01_05_feature-selection-for-traffic-analysis.mp4 45.2 MB
  • mp4establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_03_searching-the-registry-with-python.mp4 45.2 MB
  • mp4python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_02_querying-shodan-with-python.mp4 44.0 MB
  • mp4establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_02_traffic-analysis-with-python.mp4 43.7 MB
  • mp4python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_04_network-scanning-with-scapy.mp4 38.8 MB
  • mp4defensive-python/01_defensive-python onehack.us/01_defensive-python/01_02_brute-force-detection-with-windows-events.mp4 38.8 MB
  • mp4defensive-python/01_defensive-python onehack.us/01_defensive-python/01_03_detecting-ftp-brute-force-with-scapy.mp4 35.1 MB
  • mp4establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_04_searching-the-system-with-python.mp4 34.9 MB
  • mp4establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_02_dumping-chrome-credentials-with-python.mp4 34.8 MB
  • mp4establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_06_analyzing-passwords-with-python.mp4 34.5 MB
  • mp4python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_03_dns-queries-with-python.mp4 30.9 MB
  • mp4defensive-python/01_defensive-python onehack.us/01_defensive-python/01_06_detecting-anomalous-network-traffic-with-scapy.mp4 28.8 MB
  • mp4establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_05_building-c2-packets-with-python.mp4 27.1 MB
  • mp4python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_04_automating-brute-force.mp4 25.9 MB
  • mp4establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_05_cracking-the-linux-passwords-with-python.mp4 24.4 MB
  • mp4establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_04_detecting-encodings-with-python.mp4 24.1 MB
【影视】 [Coursera] Python for Cybersecurity Specialization - 5 course series
收录时间:2024-05-20 文档个数:290 文档大小:1.2 GB 最近下载:2025-05-15 人气:5313 磁力链接
  • mp4command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_03_alternative-protocol.mp4 61.8 MB
  • mp4credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_05_network-sniffing.mp4 42.0 MB
  • mp4pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_04_network-scanning.mp4 32.5 MB
  • mp4python-for-active-defense/02_python-for-active-defense-network/01_network/01_05_protocol-decoding.mp4 31.5 MB
  • mp4python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_07_behavioral-analytics.mp4 29.2 MB
  • mp4execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_03_registry-autorun.mp4 29.0 MB
  • mp4execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_05_hijacked-execution-flow.mp4 27.5 MB
  • mp4pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_06_dns-exploration.mp4 27.3 MB
  • mp4python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_05_system-activity-monitoring.mp4 26.6 MB
  • mp4python-for-active-defense/02_python-for-active-defense-network/01_network/01_03_pcap-collection.mp4 26.0 MB
  • mp4command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_03_encrypted-channel.mp4 25.8 MB
  • mp4execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_05_scheduled-execution.mp4 25.8 MB
  • mp4credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_03_user-account-discovery.mp4 25.4 MB
  • mp4execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_03_logon-scripts.mp4 24.6 MB
  • mp4command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_03_data-encryption.mp4 23.6 MB
  • mp4execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_05_alternate-data-streams.mp4 22.4 MB
  • mp4pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_03_default-account-discovery.mp4 21.7 MB
  • mp4pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_05_autorun-scripts.mp4 21.2 MB
  • mp4execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_03_impair-avs.mp4 20.8 MB
  • mp4credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_03_credentials-from-web-browsers.mp4 20.7 MB
【影视】 [ FreeCourseWeb.com ] Linkedin - The Future of Work and Cybersecurity on the Metaverse
收录时间:2024-05-07 文档个数:42 文档大小:101.1 MB 最近下载:2025-03-14 人气:219 磁力链接
  • mp4~Get Your Files Here !/03 - 2. The Essentials/03 - The future of work potential risk categories.mp4 6.9 MB
  • mp4~Get Your Files Here !/03 - 2. The Essentials/02 - The impact of cyber threats on your business or industry.mp4 6.7 MB
  • mp4~Get Your Files Here !/04 - 3. Threats/10 - Does metaverse-based work need an HR redesign.mp4 6.5 MB
  • mp4~Get Your Files Here !/05 - Conclusion/01 - The future of the metaverse of work.mp4 6.4 MB
  • mp4~Get Your Files Here !/04 - 3. Threats/11 - Decoupling business units and needs.mp4 6.2 MB
  • mp4~Get Your Files Here !/02 - 1. Defining the Metaverse/01 - What is the metaverse today.mp4 5.6 MB
  • mp4~Get Your Files Here !/01 - Introduction/02 - What to know before starting this course.mp4 5.5 MB
  • mp4~Get Your Files Here !/04 - 3. Threats/09 - Regulations for metaverse-based work.mp4 5.2 MB
  • mp4~Get Your Files Here !/04 - 3. Threats/02 - Threats to your brand.mp4 4.9 MB
  • mp4~Get Your Files Here !/04 - 3. Threats/08 - Identity theft threats.mp4 4.8 MB
  • mp4~Get Your Files Here !/03 - 2. The Essentials/01 - Understanding the metaverse environment and its suitability for your industry.mp4 4.7 MB
  • mp4~Get Your Files Here !/04 - 3. Threats/07 - Cybersecurity threats.mp4 4.6 MB
  • mp4~Get Your Files Here !/04 - 3. Threats/03 - Threats to your job profile or role.mp4 4.6 MB
  • mp4~Get Your Files Here !/04 - 3. Threats/04 - Platform-specific threats.mp4 4.6 MB
  • mp4~Get Your Files Here !/04 - 3. Threats/06 - Regulatory professional threats.mp4 4.5 MB
  • mp4~Get Your Files Here !/02 - 1. Defining the Metaverse/02 - The various ways in which the metaverse can impact work.mp4 4.4 MB
  • mp4~Get Your Files Here !/04 - 3. Threats/01 - Threats to the profession.mp4 4.4 MB
  • mp4~Get Your Files Here !/04 - 3. Threats/05 - Hardware equipment-specific threats.mp4 4.3 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Why discuss the future of work and the metaverse.mp4 3.9 MB
  • mp4~Get Your Files Here !/05 - Conclusion/02 - Where to begin.mp4 2.4 MB
【影视】 DIY Cybersecurity Degree
收录时间:2024-05-07 文档个数:7179 文档大小:233.4 GB 最近下载:2025-05-15 人气:1770 磁力链接
  • mp4100 Days of Code The Complete Python Pro Bootcamp for 2023/101 - Final Stretch/002 Study With Me.mp4 1.9 GB
  • mp4100 Days of Code The Complete Python Pro Bootcamp for 2023/101 - Final Stretch/001 Recording of our Live AMA (aka AAA - Ask Angela Anything).mp4 713.4 MB
  • mp4CompTIA/CompTIA A+ Core 1 (220-1101)/5. Troubleshooting Hardware and Networking/5.2 Troubleshooting PC Components.mp4 697.8 MB
  • mp4CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.1 Network Cables.mp4 637.3 MB
  • mp4CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.4 Random-access Memory.mp4 579.5 MB
  • mp4Job Tips/Behavioral Interview Prep/03. General Tips.mp4 571.0 MB
  • mp4CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.4 Technical Controls - The Basics.mp4 551.2 MB
  • mp4CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.6 Motherboards.mp4 540.8 MB
  • mp4CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.5 Storage Devices.mp4 527.8 MB
  • mp4CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.3 Non-Technical Controls - The Rest.mp4 526.4 MB
  • mp4CompTIA/CompTIA A+ Core 1 (220-1101)/1. Mobile Devices/1.2 Laptop Hardware and Components.mp4 525.8 MB
  • mp4CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.8 How do we Analyze Risk.mp4 509.3 MB
  • mp4CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.23 Social Engineering and Physical Attacks.mp4 498.2 MB
  • mp4CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.2 Non-Technical Controls - The Basics.mp4 486.5 MB
  • mp4CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.2 Peripheral and Video Cables.mp4 485.9 MB
  • mp4CompTIA/CompTIA PenTest + (PT0-002)/4. Reporting and Communication/4.3 Communication During a Pentest.mp4 478.0 MB
  • mp4CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.14 Frameworks, Audits and Policy.mp4 473.1 MB
  • mp4CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.10 How do we Document and Train for Risk.mp4 472.2 MB
  • mp4CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.15 IAM Policies and Procedures.mp4 463.2 MB
  • mp4CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.9 How do we Prioritize, Communicate Risk.mp4 460.5 MB
【影视】 [ DevCourseWeb.com ] Linkedin - Leveraging ChatGPT for Smarter Cybersecurity
收录时间:2024-05-07 文档个数:30 文档大小:112.3 MB 最近下载:2025-05-14 人气:558 磁力链接
  • mp4~Get Your Files Here !/03 - 2. ChatGPT and Security Implications/03 - Uncovering NLP-based cyber threats ChatGPT vulnerabilities.mp4 12.1 MB
  • mp4~Get Your Files Here !/05 - 4. Integrating ChatGPT with Security Systems/02 - Optimizing cybersecurity with ChatGPT integration in SIEM.mp4 10.5 MB
  • mp4~Get Your Files Here !/05 - 4. Integrating ChatGPT with Security Systems/04 - Securing the future with ChatGPT and OpenAI in Microsoft Security Copilot.mp4 10.1 MB
  • mp4~Get Your Files Here !/05 - 4. Integrating ChatGPT with Security Systems/03 - Enhancing vulnerability management with ChatGPT.mp4 9.0 MB
  • mp4~Get Your Files Here !/02 - 1. Introduction to ChatGPT and Natural Language Processing/02 - Inside ChatGPT NLP and ML uncovered for enhanced understanding.mp4 8.7 MB
  • mp4~Get Your Files Here !/04 - 3. ChatGPT for Incident Response/02 - Triage potential incidents, analyze logs, and assist investigations.mp4 8.1 MB
  • mp4~Get Your Files Here !/03 - 2. ChatGPT and Security Implications/02 - Guarding against NLP-based cyberattacks on ChatGPT.mp4 7.8 MB
  • mp4~Get Your Files Here !/06 - Conclusion/01 - Stay vigilant, stay curious, and extend your skills.mp4 7.7 MB
  • mp4~Get Your Files Here !/02 - 1. Introduction to ChatGPT and Natural Language Processing/01 - Unleashing the power of OpenAI's ChatGPT for cybersecurity.mp4 7.5 MB
  • mp4~Get Your Files Here !/04 - 3. ChatGPT for Incident Response/01 - Overview of incident response and forensic analysis.mp4 7.5 MB
  • mp4~Get Your Files Here !/03 - 2. ChatGPT and Security Implications/01 - Security risks associated with ChatGPT.mp4 7.1 MB
  • mp4~Get Your Files Here !/05 - 4. Integrating ChatGPT with Security Systems/01 - Advanced threat detection with ChatGPT in SIEM.mp4 6.3 MB
  • mp4~Get Your Files Here !/02 - 1. Introduction to ChatGPT and Natural Language Processing/03 - Inside ChatGPT Unraveling key concepts and technologies.mp4 5.9 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Leveraging AI for advanced threat detection and prevention.mp4 3.9 MB
  • srt~Get Your Files Here !/05 - 4. Integrating ChatGPT with Security Systems/03 - Enhancing vulnerability management with ChatGPT.srt 8.3 kB
  • srt~Get Your Files Here !/05 - 4. Integrating ChatGPT with Security Systems/02 - Optimizing cybersecurity with ChatGPT integration in SIEM.srt 6.4 kB
  • srt~Get Your Files Here !/03 - 2. ChatGPT and Security Implications/03 - Uncovering NLP-based cyber threats ChatGPT vulnerabilities.srt 6.4 kB
  • srt~Get Your Files Here !/04 - 3. ChatGPT for Incident Response/01 - Overview of incident response and forensic analysis.srt 6.2 kB
  • srt~Get Your Files Here !/02 - 1. Introduction to ChatGPT and Natural Language Processing/01 - Unleashing the power of OpenAI's ChatGPT for cybersecurity.srt 6.1 kB
  • srt~Get Your Files Here !/02 - 1. Introduction to ChatGPT and Natural Language Processing/02 - Inside ChatGPT NLP and ML uncovered for enhanced understanding.srt 6.0 kB
【压缩文件】 SEC595 - Applied Data Science and AI Machine Learning for Cybersecurity Professionals
收录时间:2024-05-03 文档个数:7 文档大小:26.1 GB 最近下载:2025-05-16 人气:4260 磁力链接
  • 7zUSB 2021/595.7z 21.3 GB
  • mp4LIVE 2021/5. Day Five.mp4 1.2 GB
  • mp4LIVE 2021/1. Day One.mp4 1.1 GB
  • mp4LIVE 2021/2. Day Two.mp4 903.0 MB
  • mp4LIVE 2021/3. Day Three.mp4 858.8 MB
  • mp4LIVE 2021/4. Day Four.mp4 784.1 MB
  • pdfPDF 2021/SEC595-Applied-Data-Science-and-Machine-Learning-for-Cybersecurity-Professionals.pdf 61.3 MB
【文档书籍】 [ FreeCourseWeb.com ] Cybersecurity Unlocked! - Strategies To Outsmart Hackers, and Online Criminals
收录时间:2024-04-10 文档个数:3 文档大小:95.2 MB 最近下载:2025-05-16 人气:5529 磁力链接
  • pdf~Get Your Files Here !/B0CW1D7MVY.pdf 95.2 MB
  • txt~Get Your Files Here !/Bonus Resources.txt 386 Bytes
  • urlGet Bonus Downloads Here.url 183 Bytes
【影视】 [ DevCourseWeb.com ] Udemy - ChatGPT, ML, and AI for Cybersecurity, SOCs and Business
收录时间:2024-04-07 文档个数:14 文档大小:3.7 GB 最近下载:2025-05-16 人气:2616 磁力链接
  • mp4~Get Your Files Here !/3. AI Tools for Security.mp4 683.8 MB
  • mp4~Get Your Files Here !/4. Enhancing Search Capabilities with GPT4all Plugins.mp4 576.0 MB
  • mp4~Get Your Files Here !/2. Fundamentals of ChatGPT and GPT4all.mp4 553.4 MB
  • mp4~Get Your Files Here !/1. Introduction to Machine Learning and AI for Security.mp4 520.6 MB
  • mp4~Get Your Files Here !/8. Future Trends and Challenges in AI Security.mp4 452.9 MB
  • mp4~Get Your Files Here !/6. Evaluating AI Security.mp4 379.7 MB
  • mp4~Get Your Files Here !/5. Securing AI Models and Data.mp4 280.8 MB
  • mp4~Get Your Files Here !/7. Case Studies of Real-World AI Applications.mp4 279.0 MB
  • txt~Get Your Files Here !/Bonus Resources.txt 386 Bytes
  • urlGet Bonus Downloads Here.url 182 Bytes
  • html~Get Your Files Here !/9. Final Exam.html 146 Bytes
  • html~Get Your Files Here !/4.2 Github Plugins (primarily for ChatGPT and Python implementations thereof)..html 124 Bytes
  • html~Get Your Files Here !/4.1 ChatGPT Plugins.html 100 Bytes
  • html~Get Your Files Here !/4.3 GPT4All Website and Downloads.html 90 Bytes
【文档书籍】 Cybersecurity Unlocked
收录时间:2024-04-07 文档个数:2 文档大小:95.2 MB 最近下载:2025-05-15 人气:1740 磁力链接
  • pdfCybersecurity Unlocked.pdf 95.2 MB
  • txtReadme.txt 682 Bytes
【文档书籍】 Mastering Cybersecurity
收录时间:2024-04-03 文档个数:1 文档大小:153.1 MB 最近下载:2025-05-16 人气:5050 磁力链接
  • pdfB0CZLYGXLN.pdf 153.1 MB
【影视】 [LiveLessons] The Complete Cybersecurity Bootcamp, 2nd Edition [En]
收录时间:2024-03-28 文档个数:290 文档大小:6.5 GB 最近下载:2025-05-15 人气:850 磁力链接
  • mp429.2 Hacking iOS.mp4 86.6 MB
  • mp417.13 Performing SMTP and DNS Enumeration.mp4 80.0 MB
  • mp421.3 Exploring Wireless Threats.mp4 79.0 MB
  • mp433.2 Understanding IoT Attacks.mp4 76.8 MB
  • mp417.14 Conducting Additional Enumeration Techniques.mp4 75.8 MB
  • mp433.1 Introducing IoT Concepts.mp4 74.4 MB
  • mp429.1 Understanding Mobile Platform Attack Vectors.mp4 73.4 MB
  • mp417.10 Performing SNMP Enumeration.mp4 71.8 MB
  • mp417.3 Understanding Host Discovery.mp4 69.7 MB
  • mp45.6 Analyzing Computer Incident Response Teams (CSIRTs).mp4 68.5 MB
  • mp417.6 Scanning Beyond IDS and Firewall.mp4 68.2 MB
  • mp427.5 Cracking Passwords with John the Ripper.mp4 66.1 MB
  • mp47.8 Understanding the MITRE ATT&CK Framework.mp4 65.8 MB
  • mp429.3 Hacking Android OS.mp4 63.8 MB
  • mp420.4 Exploring SQL Injection Tools.mp4 63.3 MB
  • mp421.2 Understanding Wireless Encryption.mp4 62.7 MB
  • mp417.12 Performing NTP and NFS Enumeration.mp4 61.8 MB
  • mp416.10 Performing Footprinting through Social Engineering.mp4 59.1 MB
  • mp48.3 Understanding Evidence Collection.mp4 57.2 MB
  • mp421.6 Hacking Bluetooth.mp4 52.3 MB
【影视】 [ FreeCourseWeb.com ] Cybersecurity Careers - Build Your Brand in Cybersecurity
收录时间:2024-03-28 文档个数:34 文档大小:189.3 MB 最近下载:2025-05-11 人气:673 磁力链接
  • mp4~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/04 - Optimizing your LinkedIn profile.mp4 18.6 MB
  • mp4~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/05 - Five tips for using LinkedIn effectively.mp4 17.3 MB
  • mp4~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/02 - Speaking at events and conferences.mp4 16.1 MB
  • mp4~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/01 - Creating and sharing content.mp4 16.0 MB
  • mp4~Get Your Files Here !/02 - 1. Personal Branding in Cybersecurity/03 - Benefits of building your personal brand in cybersecurity.mp4 13.9 MB
  • mp4~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/03 - Building an online presence.mp4 13.6 MB
  • mp4~Get Your Files Here !/02 - 1. Personal Branding in Cybersecurity/02 - Elements of a strong personal brand.mp4 13.1 MB
  • mp4~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/02 - Developing a personal brand statement.mp4 11.7 MB
  • mp4~Get Your Files Here !/05 - 4. Networking for Cybersecurity Professionals/03 - Staying up-to-date with industry trends.mp4 11.6 MB
  • mp4~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/03 - Contributing to open-source projects.mp4 11.0 MB
  • mp4~Get Your Files Here !/05 - 4. Networking for Cybersecurity Professionals/01 - Networking and nurturing professional relationships.mp4 10.4 MB
  • mp4~Get Your Files Here !/02 - 1. Personal Branding in Cybersecurity/01 - What is personal branding.mp4 10.1 MB
  • mp4~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/01 - Identifying your unique value proposition.mp4 10.0 MB
  • mp4~Get Your Files Here !/05 - 4. Networking for Cybersecurity Professionals/02 - Effective networking strategies.mp4 8.0 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Grow your cybersecurity career with personal branding.mp4 3.9 MB
  • mp4~Get Your Files Here !/06 - Conclusion/01 - Next steps.mp4 3.9 MB
  • srt~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/02 - Speaking at events and conferences.srt 8.6 kB
  • srt~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/01 - Creating and sharing content.srt 7.9 kB
  • srt~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/04 - Optimizing your LinkedIn profile.srt 7.5 kB
  • srt~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/03 - Building an online presence.srt 7.5 kB
【文档书籍】 [ CoursePig.com ] Certificate in Cybersecurity Analysis (IIBA-CCA) - Getting Started
收录时间:2024-03-27 文档个数:13 文档大小:152.9 MB 最近下载:2025-05-16 人气:496 磁力链接
  • pdf~Get Your Files Here !/Exercise Files/02/defining-cybersecurity-for-business-professionals-slides.pdf 42.5 MB
  • mp4~Get Your Files Here !/03. Defining Cybersecurity in an Organization/04. Introduction to Cybersecurity Frameworks.mp4 20.2 MB
  • pdf~Get Your Files Here !/Exercise Files/03/defining-cybersecurity-in-an-organization-slides.pdf 18.1 MB
  • mp4~Get Your Files Here !/02. Defining Cybersecurity for Business Professionals/03. Cybersecurity Business Analysis and Building in Security.mp4 14.7 MB
  • mp4~Get Your Files Here !/04. Describing Key Enterprise Risk Concepts/08. How to Build Disaster Recovery and Business Continuity Plans.mp4 13.7 MB
  • mp4~Get Your Files Here !/02. Defining Cybersecurity for Business Professionals/02. Understanding the Business Value of Cybersecurity Today.mp4 10.5 MB
  • mp4~Get Your Files Here !/03. Defining Cybersecurity in an Organization/05. Identifying What an ISMS Is and the Critical Focus on Data Privacy.mp4 9.4 MB
  • mp4~Get Your Files Here !/04. Describing Key Enterprise Risk Concepts/07. Introduction to Cyber Risk Assessments.mp4 9.4 MB
  • pdf~Get Your Files Here !/Exercise Files/04/describing-key-enterprise-risk-concepts-slides.pdf 6.3 MB
  • mp4~Get Your Files Here !/01. Course Overview/01. Course Overview.mp4 4.0 MB
  • mp4~Get Your Files Here !/03. Defining Cybersecurity in an Organization/06. Defining Data Minimization Activities and Using Security Frameworks.mp4 3.9 MB
  • txt~Get Your Files Here !/Bonus Resources.txt 386 Bytes
  • urlGet Bonus Downloads Here.url 179 Bytes
【压缩文件】 [ CourseMega.com ] Udemy - Cybersecurity - Attack & Defense Strategies (Red & Blue Team).zip
收录时间:2024-03-26 文档个数:1 文档大小:3.0 GB 最近下载:2025-05-16 人气:3369 磁力链接
  • zip[ CourseMega.com ] Udemy - Cybersecurity - Attack & Defense Strategies (Red & Blue Team).zip 3.0 GB
【影视】 [ DevCourseWeb.com ] Udemy - Mastering Cybersecurity and Supply Chain Risk Management
收录时间:2024-03-23 文档个数:41 文档大小:3.6 GB 最近下载:2025-05-15 人气:1529 磁力链接
  • mp4~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/7. Recover.mp4 205.3 MB
  • mp4~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/4. Network Security Controls.mp4 173.8 MB
  • mp4~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/5. Incident Analysis.mp4 150.0 MB
  • mp4~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/1. User and Network Infrastructure.mp4 136.2 MB
  • mp4~Get Your Files Here !/1. Introduction to NIST Framework/3. NIST Framework Core.mp4 130.0 MB
  • mp4~Get Your Files Here !/5. Effective Supply Chain Risk Management/4. Develop, Assess and Test Supply Chain Risks.mp4 123.4 MB
  • mp4~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/3. Executable Response Plan.mp4 116.0 MB
  • mp4~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/9. Information Protection.mp4 115.2 MB
  • mp4~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/8. Hardware Integrity.mp4 105.7 MB
  • mp4~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/1. Developing a Continuity of Operations Plan.mp4 103.2 MB
  • mp4~Get Your Files Here !/2. Cybersecurity Risk Planning & Management/4. Keeping Hardware Inventory Updated.mp4 102.7 MB
  • mp4~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/2. Incident Response.mp4 102.1 MB
  • mp4~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/7. Data Security.mp4 101.4 MB
  • mp4~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/6. Mitigation.mp4 101.0 MB
  • mp4~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/2. Authentication and Access Control.mp4 100.3 MB
  • mp4~Get Your Files Here !/2. Cybersecurity Risk Planning & Management/7. Personnel Security Requirements.mp4 98.1 MB
  • mp4~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/10. Patch Management.mp4 97.7 MB
  • mp4~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/5. Association and Authentication.mp4 91.7 MB
  • mp4~Get Your Files Here !/5. Effective Supply Chain Risk Management/1. Supply Chain Risk Management.mp4 90.7 MB
  • mp4~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/12. Protective Technology.mp4 88.5 MB
【影视】 [ DevCourseWeb.com ] Udemy - Trustee Shield - Cybersecurity Foundation for Kids and Teens
收录时间:2024-03-22 文档个数:104 文档大小:4.3 GB 最近下载:2025-05-13 人气:2034 磁力链接
  • mp4~Get Your Files Here !/5. Internet Cookies/6. Protection against Cookie risks.mp4 147.6 MB
  • mp4~Get Your Files Here !/7. Phishing/13. Activity Revised.mp4 141.4 MB
  • mp4~Get Your Files Here !/1. Passwords/5. Making unhackable password.mp4 115.0 MB
  • mp4~Get Your Files Here !/5. Internet Cookies/5. Cookies Risks for Online Privacy.mp4 106.2 MB
  • mp4~Get Your Files Here !/5. Internet Cookies/3. Internet Cookies.mp4 96.9 MB
  • mp4~Get Your Files Here !/3. Malware/7. Trojan Horses.mp4 96.4 MB
  • mp4~Get Your Files Here !/4. Insecure Websites/5. Search Engine.mp4 95.6 MB
  • mp4~Get Your Files Here !/6. Online Privacy/13. How To Protect Privacy- Part (2).mp4 94.8 MB
  • mp4~Get Your Files Here !/2. Multi-Factor Authentication (MFA)/8. Password Managers.mp4 90.9 MB
  • mp4~Get Your Files Here !/6. Online Privacy/12. How To Protect Privacy- Part (1).mp4 81.2 MB
  • mp4~Get Your Files Here !/8. Social Engineering/10. Protection against Social Engineering attacks.mp4 80.4 MB
  • mp4~Get Your Files Here !/8. Social Engineering/9. Ransomwares.mp4 77.5 MB
  • mp4~Get Your Files Here !/8. Social Engineering/3. What is Social Engineering.mp4 75.1 MB
  • mp4~Get Your Files Here !/2. Multi-Factor Authentication (MFA)/6. Two-Factor Authentication (2FA).mp4 70.2 MB
  • mp4~Get Your Files Here !/1. Passwords/3. Password Definition.mp4 68.9 MB
  • mp4~Get Your Files Here !/8. Social Engineering/4. Hackers Perspective.mp4 68.3 MB
  • mp4~Get Your Files Here !/3. Malware/12. Defensive Methods against Malware.mp4 62.5 MB
  • mp4~Get Your Files Here !/4. Insecure Websites/7. Why HTTPS is More Secure than HTTP.mp4 62.5 MB
  • mp4~Get Your Files Here !/3. Malware/6. Worms.mp4 61.9 MB
  • mp4~Get Your Files Here !/6. Online Privacy/8. Digital Footprint Impacts.mp4 61.7 MB
【影视】 [ CourseWikia.com ] Cybersecurity at Work (2023)
收录时间:2024-03-22 文档个数:54 文档大小:199.8 MB 最近下载:2025-05-13 人气:480 磁力链接
  • mp4~Get Your Files Here !/06 - 5. Hybrid Work Security/05 - Scenario Stolen laptop.mp4 18.0 MB
  • mp4~Get Your Files Here !/05 - 4. Software and Internet Security/05 - The anatomy of a cyber attack.mp4 11.6 MB
  • mp4~Get Your Files Here !/04 - 3. Account Security/01 - Password security.mp4 11.5 MB
  • mp4~Get Your Files Here !/06 - 5. Hybrid Work Security/01 - Physical office security.mp4 10.9 MB
  • mp4~Get Your Files Here !/02 - 1. Social Engineering Scams and Attacks/05 - Scenario Voice phishing.mp4 10.1 MB
  • mp4~Get Your Files Here !/02 - 1. Social Engineering Scams and Attacks/04 - Counterfeit apps.mp4 10.0 MB
  • mp4~Get Your Files Here !/06 - 5. Hybrid Work Security/04 - Smartphone and mobile device attacks.mp4 9.4 MB
  • mp4~Get Your Files Here !/04 - 3. Account Security/02 - Data breaches and compromised passwords.mp4 9.0 MB
  • mp4~Get Your Files Here !/03 - 2. Wireless Security/01 - Public Wi-Fi.mp4 9.0 MB
  • mp4~Get Your Files Here !/05 - 4. Software and Internet Security/04 - Malware Ransomware.mp4 9.0 MB
  • mp4~Get Your Files Here !/06 - 5. Hybrid Work Security/03 - Laptop and desktop security.mp4 8.2 MB
  • mp4~Get Your Files Here !/05 - 4. Software and Internet Security/01 - Updating software.mp4 8.1 MB
  • mp4~Get Your Files Here !/02 - 1. Social Engineering Scams and Attacks/03 - Social media information (over)sharing.mp4 7.9 MB
  • mp4~Get Your Files Here !/08 - Conclusion/01 - You are part of the security team.mp4 7.2 MB
  • mp4~Get Your Files Here !/06 - 5. Hybrid Work Security/02 - Physical office security best practices.mp4 7.1 MB
  • mp4~Get Your Files Here !/03 - 2. Wireless Security/02 - Home Wi-Fi.mp4 6.9 MB
  • mp4~Get Your Files Here !/02 - 1. Social Engineering Scams and Attacks/02 - Email phishing.mp4 6.5 MB
  • mp4~Get Your Files Here !/02 - 1. Social Engineering Scams and Attacks/01 - Social engineering overview.mp4 6.4 MB
  • mp4~Get Your Files Here !/07 - 6. Data Security/01 - Intellectual property.mp4 5.6 MB
  • mp4~Get Your Files Here !/04 - 3. Account Security/03 - Multifactor authentication.mp4 5.1 MB
共14页 上一页 1 2 3 4 5 6 7 下一页