磁力管家

磁力管家
为您索检到268条磁力链接,耗时0毫秒。 rss

分享给好友

【影视】 [ DevCourseWeb.com ] Udemy - Deepfake Defense for Cybersecurity and GRC Professionals
收录时间:2024-03-22 文档个数:38 文档大小:1.4 GB 最近下载:2025-05-15 人气:3879 磁力链接
  • mp4~Get Your Files Here !/2. Detection & Mitigation/6. 20-Documenting and structuring our Deepfake mitigation strategy Report.mp4 105.7 MB
  • mp4~Get Your Files Here !/1. Course Foundation/13. 13-Assessing Your organization’s deepfake response capabilities.mp4 99.8 MB
  • mp4~Get Your Files Here !/2. Detection & Mitigation/8. 22-Action Plan for Deepfake Mitigation Strategy Implementation.mp4 93.6 MB
  • mp4~Get Your Files Here !/2. Detection & Mitigation/10. 24-Standard Operating Procedure (SOP) for Deepfake Incident Response.mp4 86.6 MB
  • mp4~Get Your Files Here !/3. Things to consider_Questions to ask/4. 29-Deepfake Mitigation Tools.mp4 80.4 MB
  • mp4~Get Your Files Here !/2. Detection & Mitigation/5. 19-Developing deepfake mitigation strategy through brainstorming.mp4 79.9 MB
  • mp4~Get Your Files Here !/1. Course Foundation/11. 11-Identifying Deepfakes.mp4 67.7 MB
  • mp4~Get Your Files Here !/1. Course Foundation/4. 4-Deepfake Assessment-Can members of your organization identify deepfakes.mp4 63.6 MB
  • mp4~Get Your Files Here !/1. Course Foundation/5. 5-Course Agenda.mp4 60.7 MB
  • mp4~Get Your Files Here !/3. Things to consider_Questions to ask/3. 28-Creating a culture of Verefication.mp4 57.2 MB
  • mp4~Get Your Files Here !/1. Course Foundation/12. 12-Testing for Deepfakes.mp4 57.1 MB
  • mp4~Get Your Files Here !/2. Detection & Mitigation/1. 15-Intro to section 2_Are there any silver bullets for deepfake mitigation.mp4 51.7 MB
  • mp4~Get Your Files Here !/1. Course Foundation/3. 3-Possible causes of deepfake Incident-News Brief Postmortem.mp4 50.1 MB
  • mp4~Get Your Files Here !/2. Detection & Mitigation/3. 17-Important considerations for developing a deepfake defense strategy.mp4 42.4 MB
  • mp4~Get Your Files Here !/1. Course Foundation/1. 1-Deepfake Defense For Cybersecurity & GRC Professionals.mp4 41.8 MB
  • mp4~Get Your Files Here !/2. Detection & Mitigation/4. 18-Key components of a deepfake mitigation strategy.mp4 41.2 MB
  • mp4~Get Your Files Here !/3. Things to consider_Questions to ask/5. 30-The most efficient measures to take against deepfake attacks.mp4 40.7 MB
  • mp4~Get Your Files Here !/1. Course Foundation/14. 14-End of Section_1.mp4 39.9 MB
  • mp4~Get Your Files Here !/1. Course Foundation/6. 6-Meet your Instructor.mp4 39.7 MB
  • mp4~Get Your Files Here !/1. Course Foundation/2. 2-Important Note about course.mp4 38.8 MB
【压缩文件】 [CourserHub.com] Coursera - Cybersecurity Specialization
收录时间:2024-03-21 文档个数:2 文档大小:5.9 GB 最近下载:2025-05-12 人气:289 磁力链接
  • rar[CourserHub.com] Coursera - Cybersecurity Specialization.part1.rar 3.2 GB
  • rar[CourserHub.com] Coursera - Cybersecurity Specialization.part2.rar 2.7 GB
【影视】 [FreeCoursesOnline.Me] O`REILLY - Building a Career in Cybersecurity
收录时间:2024-03-05 文档个数:75 文档大小:847.7 MB 最近下载:2025-05-12 人气:550 磁力链接
  • mp4Lesson 1 Getting Started in the Cybersecurity Field/005. 1.4 Cybersecurity Skills.mp4 65.3 MB
  • mp4Lesson 2 Planning Your Cybersecurity Career/004. 2.3 The Value of Professional Certifications.mp4 60.1 MB
  • mp4Lesson 3 Creating Your Own Lab/003. 3.2 Foundational Lab.mp4 48.0 MB
  • mp4Lesson 5 Preparing for Your Interview/005. 5.4 Final Tips.mp4 44.9 MB
  • mp4Lesson 6 Using Continuous Improvement Strategy/007. 6.6 Growing Your Career as a Remote Worker.mp4 40.3 MB
  • mp4Lesson 2 Planning Your Cybersecurity Career/003. 2.2 Creating and Tracking Your Plan.mp4 36.8 MB
  • mp4Lesson 5 Preparing for Your Interview/003. 5.2 Preparing for the Interview.mp4 35.5 MB
  • mp4Lesson 1 Getting Started in the Cybersecurity Field/006. 1.5 Navigating through the Industry.mp4 31.9 MB
  • mp4Lesson 2 Planning Your Cybersecurity Career/002. 2.1 Establishing a Plan.mp4 31.3 MB
  • mp4Lesson 6 Using Continuous Improvement Strategy/008. 6.7 What’s Next.mp4 31.0 MB
  • mp4Lesson 1 Getting Started in the Cybersecurity Field/004. 1.3 Cybersecurity Jobs.mp4 30.3 MB
  • mp4Lesson 5 Preparing for Your Interview/004. 5.3 Advancing in the Interview Process.mp4 29.3 MB
  • mp4Lesson 6 Using Continuous Improvement Strategy/006. 6.5 Keeping a Good Work-life Balance.mp4 28.2 MB
  • mp4Lesson 3 Creating Your Own Lab/005. 3.4 Enabling and Using Microsoft Defender for Cloud.mp4 27.7 MB
  • mp4Introduction/001. Building a Career in Cybersecurity Introduction.mp4 25.1 MB
  • mp4Lesson 6 Using Continuous Improvement Strategy/003. 6.2 Responsibilities and Expectations.mp4 24.6 MB
  • mp4Lesson 4 Expanding Your Networking/005. 4.4 Using LinkedIn to Expand Your Network.mp4 24.5 MB
  • mp4Lesson 1 Getting Started in the Cybersecurity Field/003. 1.2 Roles and Responsibilities.mp4 22.1 MB
  • mp4Lesson 4 Expanding Your Networking/002. 4.1 Understanding the Cybersecurity Community.mp4 21.9 MB
  • mp4Lesson 4 Expanding Your Networking/003. 4.2 Identifying Opportunities to Contribute with the Cybersecurity Community.mp4 19.3 MB
【其他】 The Complete Ethical Hacking Course Bundle This Book Includes Python Machine Learning, SQL, Linux, Hacking with Kali Linux, Hack Websites, Smartphones, Coding, and Cybersecurity Fundamentals
收录时间:2024-03-01 文档个数:1 文档大小:1.4 GB 最近下载:2025-05-16 人气:13151 磁力链接
  • m4bTheCompleteEthicalHackingCourseBundleThisBookIncludesPythonMachineLearningSQLLinuxHacki_ep6.m4b 1.4 GB
【影视】 Palo Alto Networks Cybersecurity Fundamentals (PCCSA)
收录时间:2024-02-29 文档个数:52 文档大小:2.0 GB 最近下载:2025-05-16 人气:5526 磁力链接
  • mp4Chapter 1 Cybersecurity Fundamentals and Threat Landscape/002. Identify Computing and Networking Trends.mp4 118.2 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/006. Identify Networking Security Technologies.mp4 114.7 MB
  • mp4Chapter 1 Cybersecurity Fundamentals and Threat Landscape/003. Describe Cybersecurity Threats.mp4 108.3 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/004. Review Network Addressing.mp4 105.2 MB
  • mp4Chapter 1 Cybersecurity Fundamentals and Threat Landscape/005. Identify Wi-Fi Vulnerabilities and Attacks.mp4 100.1 MB
  • mp4Chapter 1 Cybersecurity Fundamentals and Threat Landscape/004. Describe Common Cyberattack Techniques.mp4 96.3 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/011. Endpoint Security.mp4 95.3 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/002. Describe Routing Protocols.mp4 91.8 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/001. Identify Basic Internet and Network Operations.mp4 90.7 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/012. Server and System Administration.mp4 90.3 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/003. Review Networking Models.mp4 88.4 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/009. Learn Basic Virtualization Security Concepts.mp4 83.8 MB
  • mp4Chapter 3 Palo Alto Networks Security Solutions and Technologies/007. Describe Cortex XSOAR and AutoFocus.mp4 79.5 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/008. Learn Basic Cloud Security Concepts.mp4 75.4 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/010. Learn Basic DevOps Security Concepts.mp4 75.3 MB
  • mp4Chapter 3 Palo Alto Networks Security Solutions and Technologies/001. Identify Palo Alto Networks Security Solutions.mp4 74.3 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/005. Learn Networking Security Models.mp4 72.6 MB
  • mp4Chapter 3 Palo Alto Networks Security Solutions and Technologies/002. Describe Basic NGFW Components and Functions.mp4 67.1 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/007. Learn Basic Data Center Security Concepts.mp4 60.2 MB
  • mp4Chapter 3 Palo Alto Networks Security Solutions and Technologies/003. Learn Basic Prisma Cloud.mp4 59.7 MB
【影视】 [GigaCourse.Com] ZeroToMastery - Complete Cybersecurity Bootcamp
收录时间:2024-02-21 文档个数:107 文档大小:3.6 GB 最近下载:2025-05-16 人气:1264 磁力链接
  • mp48-Network Security/052-Network Security With Nmap.mp4 169.9 MB
  • mp45-Security Bugs & Vulnerabilities/020-Buffer Overflow Demonstration.mp4 136.7 MB
  • mp412-Appendix - Ethical Hacking/087-Msfconsole Basic Commands.mp4 97.5 MB
  • mp48-Network Security/059-Wireless Attack Demonstration.mp4 93.4 MB
  • mp47-End-Point Protection/034-Password Security and Password Managers.mp4 84.2 MB
  • mp412-Appendix - Ethical Hacking/093-Meterpreter Basic Commands Part 1.mp4 78.5 MB
  • mp47-End-Point Protection/038-Process Explorer.mp4 75.8 MB
  • mp41-Introduction/001-Cybersecurity Bootcamp - Zero to Mastery.mp4 72.4 MB
  • mp48-Network Security/057-Secure Network Architecture.mp4 66.8 MB
  • mp412-Appendix - Ethical Hacking/094-Meterpreter Basic Commands Part 2.mp4 65.7 MB
  • mp47-End-Point Protection/033-Bitdefender, Kaspersky, McAfee, Malwarebytes.mp4 63.9 MB
  • mp44-Understanding Hackers - The Biggest Threat/012-Most Common Attacks Demonstration.mp4 63.5 MB
  • mp48-Network Security/060-Network Monitoring With TCPDump.mp4 62.7 MB
  • mp48-Network Security/058-Wireless Security.mp4 59.6 MB
  • mp45-Security Bugs & Vulnerabilities/017-Unpatched Machine Exploitation Demonstration.mp4 59.1 MB
  • mp412-Appendix - Ethical Hacking/080-Whatweb Stealthy Scan.mp4 58.1 MB
  • mp412-Appendix - Ethical Hacking/091-Advance Msfvenom Usage.mp4 51.4 MB
  • mp47-End-Point Protection/043-Iptables.mp4 50.9 MB
  • mp47-End-Point Protection/028-Brave Browser Security and Privacy.mp4 50.6 MB
  • mp412-Appendix - Ethical Hacking/089-Software Vulnerability - Samba Exploitation.mp4 49.5 MB
【压缩文件】 [ TutPig.com ] Udemy - Cybersecurity for Artificial Intelligence (A.I).zip
收录时间:2024-02-20 文档个数:1 文档大小:280.8 MB 最近下载:2025-03-01 人气:281 磁力链接
  • zip[ TutPig.com ] Udemy - Cybersecurity for Artificial Intelligence (A.I).zip 280.8 MB
【影视】 Udemy Cybersecurity Collection
收录时间:2024-02-17 文档个数:7517 文档大小:115.9 GB 最近下载:2025-05-16 人气:6044 磁力链接
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/3. Cross-Site-Scripting/1. Cross-Site-Scripting - Lecture.mp4 748.2 MB
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/8. Cross Site Request Forgery/1. CSRF - Techniques.mp4 695.8 MB
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/2. All Interesting Tools/1. Tools I Use.mp4 632.4 MB
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/1. Introduction/3. Recon with.mp4 608.7 MB
  • mp4Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/18. Reconnaissance/8. Active Recon - Port Scanning.mp4 436.1 MB
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/7. Open Redirect Vulnerability/1. Open Redirect Vulnerability with @hemanth1261.mp4 435.9 MB
  • mp4Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/19. Exploitation/11. SQL Injection _ SQLMap.mp4 417.9 MB
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/1. Introduction/5. Another Recon Video.mp4 398.8 MB
  • mp4Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/2. Walkthrough - Legacy.mp4 348.0 MB
  • mp4Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/16. Assembly Course/5. Arithmetic.mp4 331.0 MB
  • mp4Udemy - The Complete Ethical Hacking Course, by Gerri Banfield _ Erman Kirkpatrick/05 How to create a bootable USB of Kali Linux ( optional )/025 How to create a bootable USB of Kali with persistent storage _ 4 GB part 4.mp4 328.9 MB
  • mp4Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/6. Walkthrough - Jerry.mp4 320.2 MB
  • mp4Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/25. Job Hunting/6. Analyzing the Job Post.mp4 312.1 MB
  • mp4Udemy - The Complete Ethical Hacking Course, by Gerri Banfield _ Erman Kirkpatrick/04 Set up instructions for Mac users ONLY/021 Kali Linux Live USB on a MacBook Pro part 3 ( OPTIONAL ).mp4 302.6 MB
  • mp4Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/7. Walkthrough - Nibbles.mp4 299.2 MB
  • mp4Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/4. Walkthrough - Blue.mp4 298.0 MB
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/6. Server Side Request Forgery/2. SSRF - Advanced Techniques.mp4 294.3 MB
  • mp4Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/3. Walkthrough - Lame.mp4 293.6 MB
  • mp4Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/20. Post Exploitation/1. Stabilizing Shells.mp4 285.1 MB
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/6. Server Side Request Forgery/1. SSRF - Basic Techniques.mp4 282.4 MB
【其他】 The Personal Cybersecurity Manual A.m4b
收录时间:2024-02-13 文档个数:1 文档大小:125.7 MB 最近下载:2025-05-16 人气:4975 磁力链接
  • m4bThe Personal Cybersecurity Manual A.m4b 125.7 MB
【影视】 [ CoursePig.com ] Linkedin - Microsoft Cybersecurity Architect Expert (SC-100) Cert Prep - 4 Design Strategy for Data and Applications
收录时间:2024-02-06 文档个数:24 文档大小:153.6 MB 最近下载:2025-05-16 人气:1320 磁力链接
  • mp4~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/02 - Design a strategy to identify and protect sensitive data.mp4 27.6 MB
  • mp4~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/03 - Specify a security strategy for applications and APIs.mp4 24.9 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Prepping for the SC-100 exam.mp4 22.5 MB
  • mp4~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/02 - Specify a security standard for onboarding a new application.mp4 18.4 MB
  • mp4~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/03 - Specify an encryption standard for data at rest and in motion.mp4 16.3 MB
  • mp4~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/01 - Specify priorities for mitigating threats to applications.mp4 14.2 MB
  • mp4~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/01 - Specify priorities for mitigating threats to data.mp4 13.9 MB
  • mp4~Get Your Files Here !/01 - Introduction/02 - What you should know.mp4 6.8 MB
  • mp4~Get Your Files Here !/04 - Conclusion/01 - Next steps.mp4 5.0 MB
  • mp4~Get Your Files Here !/01 - Introduction/03 - Lab setup.mp4 3.4 MB
  • pdf~Get Your Files Here !/Ex_Files_MSFT_Cybersecurity_Arch_Expert_SC_100_Cert_Prep_4/Exercise Files/Sign up for a free trial.pdf 338.4 kB
  • pdf~Get Your Files Here !/Ex_Files_MSFT_Cybersecurity_Arch_Expert_SC_100_Cert_Prep_4/Exercise Files/SC-100 Exam Study Guide Course 4.pdf 47.8 kB
  • srt~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/02 - Design a strategy to identify and protect sensitive data.srt 18.1 kB
  • srt~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/03 - Specify a security strategy for applications and APIs.srt 15.6 kB
  • srt~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/02 - Specify a security standard for onboarding a new application.srt 9.7 kB
  • srt~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/03 - Specify an encryption standard for data at rest and in motion.srt 9.2 kB
  • srt~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/01 - Specify priorities for mitigating threats to data.srt 9.0 kB
  • srt~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/01 - Specify priorities for mitigating threats to applications.srt 7.7 kB
  • srt~Get Your Files Here !/01 - Introduction/02 - What you should know.srt 3.4 kB
  • srt~Get Your Files Here !/04 - Conclusion/01 - Next steps.srt 2.6 kB
【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity Essentials - Stay Safe and Secure Online
收录时间:2024-02-04 文档个数:39 文档大小:1.2 GB 最近下载:2025-05-14 人气:2451 磁力链接
  • mp4~Get Your Files Here !/6. Device Security/1. Introduction to Device Security.mp4 79.4 MB
  • mp4~Get Your Files Here !/2. Password Security/2. What Makes a Good Password.mp4 70.5 MB
  • mp4~Get Your Files Here !/6. Device Security/3. Mobile Security Best Practices.mp4 69.8 MB
  • mp4~Get Your Files Here !/4. Phishing/1. Introduction to Phishing.mp4 63.3 MB
  • mp4~Get Your Files Here !/5. Staying Safe on the Web/3. Identifying Suspicious Downloads.mp4 59.6 MB
  • mp4~Get Your Files Here !/6. Device Security/2. Choosing and Using an Antivirus.mp4 58.4 MB
  • mp4~Get Your Files Here !/2. Password Security/1. Introduction to Passwords.mp4 57.7 MB
  • mp4~Get Your Files Here !/5. Staying Safe on the Web/2. Inspecting URLs.mp4 57.6 MB
  • mp4~Get Your Files Here !/2. Password Security/5. Using a Password Manager.mp4 56.2 MB
  • mp4~Get Your Files Here !/7. Virtual Private Networks/4. Choosing a VPN Solution.mp4 55.5 MB
  • mp4~Get Your Files Here !/4. Phishing/4. Phishing Without Email.mp4 54.3 MB
  • mp4~Get Your Files Here !/4. Phishing/2. The Psychology of Phishing.mp4 52.3 MB
  • mp4~Get Your Files Here !/5. Staying Safe on the Web/4. Managing Trackers and Cookies.mp4 48.2 MB
  • mp4~Get Your Files Here !/3. Multi-Factor Authentication (MFA)/3. Choosing a Strong Authentication Factor.mp4 45.8 MB
  • mp4~Get Your Files Here !/7. Virtual Private Networks/2. Why Use a VPN.mp4 45.5 MB
  • mp4~Get Your Files Here !/3. Multi-Factor Authentication (MFA)/5. Identifying MFA Phishing Attacks.mp4 41.4 MB
  • mp4~Get Your Files Here !/7. Virtual Private Networks/3. How VPNs Work.mp4 38.0 MB
  • mp4~Get Your Files Here !/4. Phishing/3. Examining a Phishing Email.mp4 35.7 MB
  • mp4~Get Your Files Here !/2. Password Security/4. Checking for Compromised Accounts.mp4 33.5 MB
  • mp4~Get Your Files Here !/4. Phishing/5. Phishing Using the Cloud.mp4 31.6 MB
【影视】 [ FreeCourseWeb.com ] Linkedin - Cybersecurity Careers - Become a Security Engineer
收录时间:2024-02-04 文档个数:28 文档大小:83.4 MB 最近下载:2025-05-08 人气:642 磁力链接
  • mp4~Get Your Files Here !/05 - Conclusion/01 - The fun doesn't end.mp4 8.3 MB
  • mp4~Get Your Files Here !/03 - 2. How to Become a Security Engineer/03 - Certification options.mp4 8.3 MB
  • mp4~Get Your Files Here !/04 - 3. Day in the Life/01 - Day in the life of a cloud security engineer.mp4 7.7 MB
  • mp4~Get Your Files Here !/02 - 1. Security Engineering Career Basics/03 - Why pursue a career in cybersecurity.mp4 7.4 MB
  • mp4~Get Your Files Here !/02 - 1. Security Engineering Career Basics/02 - What's the difference.mp4 7.4 MB
  • mp4~Get Your Files Here !/02 - 1. Security Engineering Career Basics/01 - What is a security engineer.mp4 7.4 MB
  • mp4~Get Your Files Here !/03 - 2. How to Become a Security Engineer/04 - Benefits of networking.mp4 7.1 MB
  • mp4~Get Your Files Here !/04 - 3. Day in the Life/02 - Common challenges.mp4 5.8 MB
  • mp4~Get Your Files Here !/03 - 2. How to Become a Security Engineer/02 - Develop your skill set.mp4 5.3 MB
  • mp4~Get Your Files Here !/04 - 3. Day in the Life/03 - Solving problems.mp4 5.2 MB
  • mp4~Get Your Files Here !/03 - 2. How to Become a Security Engineer/05 - Interviewing for a security engineering position.mp4 5.0 MB
  • mp4~Get Your Files Here !/03 - 2. How to Become a Security Engineer/01 - Do your research.mp4 4.8 MB
  • mp4~Get Your Files Here !/01 - 0. Introduction/01 - Becoming a security engineer.mp4 3.7 MB
  • srt~Get Your Files Here !/03 - 2. How to Become a Security Engineer/03 - Certification options.srt 8.1 kB
  • srt~Get Your Files Here !/03 - 2. How to Become a Security Engineer/04 - Benefits of networking.srt 7.7 kB
  • srt~Get Your Files Here !/03 - 2. How to Become a Security Engineer/05 - Interviewing for a security engineering position.srt 6.5 kB
  • srt~Get Your Files Here !/02 - 1. Security Engineering Career Basics/02 - What's the difference.srt 6.3 kB
  • srt~Get Your Files Here !/04 - 3. Day in the Life/02 - Common challenges.srt 5.7 kB
  • srt~Get Your Files Here !/04 - 3. Day in the Life/03 - Solving problems.srt 5.3 kB
  • srt~Get Your Files Here !/02 - 1. Security Engineering Career Basics/01 - What is a security engineer.srt 5.3 kB
【影视】 [ DevCourseWeb.com ] Udemy - Intro To Cybersecurity In Healthcare (2 Of 2),Plain and Simple
收录时间:2024-02-03 文档个数:26 文档大小:953.6 MB 最近下载:2025-05-15 人气:1322 磁力链接
  • mp4~Get Your Files Here !/3 - Ransomware and Cryptocurrency.mp4 309.9 MB
  • mp4~Get Your Files Here !/7 - Testing Your Vulnerabilities.mp4 150.2 MB
  • mp4~Get Your Files Here !/2 - Malware.mp4 136.5 MB
  • mp4~Get Your Files Here !/5 - Boston Childrens Hack The Response.mp4 123.0 MB
  • mp4~Get Your Files Here !/8 - HIPAA.mp4 70.3 MB
  • mp4~Get Your Files Here !/4 - Boston Childrens Hack The Issue.mp4 52.4 MB
  • mp4~Get Your Files Here !/6 - Boston Childrens Hack Lessons Learned.mp4 50.7 MB
  • mp4~Get Your Files Here !/1 - Introduction.mp4 49.6 MB
  • mp4~Get Your Files Here !/9 - Conclusions.mp4 10.9 MB
  • vtt~Get Your Files Here !/3 - Ransomware and Cryptocurrency English.vtt 24.5 kB
  • vtt~Get Your Files Here !/7 - Testing Your Vulnerabilities English.vtt 12.5 kB
  • html~Get Your Files Here !/13 - IN THE NEWS Some Straight Talk on Ransomware in Health Care.html 11.3 kB
  • vtt~Get Your Files Here !/2 - Malware English.vtt 10.7 kB
  • vtt~Get Your Files Here !/5 - Boston Childrens Hack The Response English.vtt 10.1 kB
  • vtt~Get Your Files Here !/8 - HIPAA English.vtt 5.9 kB
  • html~Get Your Files Here !/12 - IN THE NEWS.html 5.8 kB
  • vtt~Get Your Files Here !/6 - Boston Childrens Hack Lessons Learned English.vtt 4.6 kB
  • vtt~Get Your Files Here !/1 - Introduction English.vtt 4.5 kB
  • vtt~Get Your Files Here !/4 - Boston Childrens Hack The Issue English.vtt 4.3 kB
  • html~Get Your Files Here !/10 - IN THE NEWS Cyberattacks hit midsize hospitals hardest.html 4.2 kB
【影视】 [ DevCourseWeb.com ] Udemy - Industrial Cybersecurity Controls As per IEC62443
收录时间:2024-01-31 文档个数:24 文档大小:1.8 GB 最近下载:2025-05-11 人气:1472 磁力链接
  • mp4~Get Your Files Here !/2. Authentication & Authorization Technologies/3. Password Authentication.mp4 269.6 MB
  • mp4~Get Your Files Here !/1. IEC 62443 Basic Introduction/1. Introduction About IEC.mp4 214.6 MB
  • mp4~Get Your Files Here !/2. Authentication & Authorization Technologies/2. Role Based Access Control.mp4 200.8 MB
  • mp4~Get Your Files Here !/2. Authentication & Authorization Technologies/4. Challengeresponse Authentication.mp4 199.5 MB
  • mp4~Get Your Files Here !/2. Authentication & Authorization Technologies/5. Physical Token Authentication.mp4 182.0 MB
  • mp4~Get Your Files Here !/2. Authentication & Authorization Technologies/6. Smart Card Authentication.mp4 181.6 MB
  • mp4~Get Your Files Here !/2. Authentication & Authorization Technologies/7. Biometric Authentication.mp4 178.0 MB
  • mp4~Get Your Files Here !/2. Authentication & Authorization Technologies/9. Password Distribution & Management.mp4 131.1 MB
  • mp4~Get Your Files Here !/2. Authentication & Authorization Technologies/8. Location Based Authentication.mp4 101.2 MB
  • mp4~Get Your Files Here !/2. Authentication & Authorization Technologies/1. Authentication & Authorization Briefing.mp4 99.7 MB
  • mp4~Get Your Files Here !/2. Authentication & Authorization Technologies/10. Device to Device Authentication.mp4 57.7 MB
  • srt~Get Your Files Here !/2. Authentication & Authorization Technologies/3. Password Authentication.srt 22.9 kB
  • srt~Get Your Files Here !/2. Authentication & Authorization Technologies/9. Password Distribution & Management.srt 22.1 kB
  • srt~Get Your Files Here !/2. Authentication & Authorization Technologies/6. Smart Card Authentication.srt 17.2 kB
  • srt~Get Your Files Here !/2. Authentication & Authorization Technologies/7. Biometric Authentication.srt 14.9 kB
  • srt~Get Your Files Here !/2. Authentication & Authorization Technologies/4. Challengeresponse Authentication.srt 13.8 kB
  • srt~Get Your Files Here !/1. IEC 62443 Basic Introduction/1. Introduction About IEC.srt 13.5 kB
  • srt~Get Your Files Here !/2. Authentication & Authorization Technologies/8. Location Based Authentication.srt 13.1 kB
  • srt~Get Your Files Here !/2. Authentication & Authorization Technologies/2. Role Based Access Control.srt 13.0 kB
  • srt~Get Your Files Here !/2. Authentication & Authorization Technologies/5. Physical Token Authentication.srt 11.9 kB
【压缩文件】 Pós Graduação em Ethical Hacking e CyberSecurity - Julio Della Flora
收录时间:2024-01-27 文档个数:326 文档大小:57.7 GB 最近下载:2025-04-20 人气:182 磁力链接
  • rar05 - Análise Forense Computacional/Conteudo de forense-026.rar 5.6 GB
  • rar01 - Introdução à Segurança Ofensiva/maquinas virtuais-027.rar 3.6 GB
  • mp413 - Introdução à Eletrônica e Hardware Hacking/EHC Introdução à Eletrônica e Hardware Hacking aula 4.7.mp4 1.7 GB
  • mp407 - Introdução à Segurança da Informação/Modulo 05 - Criptografia e Esteganografia-015.mp4 1.2 GB
  • mp413 - Introdução à Eletrônica e Hardware Hacking/EHC Introdução à Eletrônica e Hardware Hacking aula 4.3.mp4 946.0 MB
  • mp412 - Exploração de Software/EXPS - UN01 - 01.mp4 878.8 MB
  • mp406 - Teste de Invasão em Redes e Sistemas/Teste de Invasão em Redes e Sistemas - Aula 3 - Metasploit Nessus Meterpreter John.mp4 710.4 MB
  • mp413 - Introdução à Eletrônica e Hardware Hacking/EHC Introdução à Eletrônica e Hardware Hacking aula 5.2.mp4 598.9 MB
  • mp413 - Introdução à Eletrônica e Hardware Hacking/#04 -Gadgets para Pentesters-.mp4 585.5 MB
  • mp413 - Introdução à Eletrônica e Hardware Hacking/[SecurityCast] WebCast #54 - Hardware Hacking.mp4 574.7 MB
  • mp413 - Introdução à Eletrônica e Hardware Hacking/EHC Introdução à Eletrônica e Hardware Hacking aula 4.6.mp4 553.0 MB
  • mp404 - Fundamentos de Redes de Computadores/EHC Introdução à Redes de Computadores Aula 4.3.mp4 524.2 MB
  • mp413 - Introdução à Eletrônica e Hardware Hacking/20º Hangout - Gadgets Malignos para -Hackers do Bem- - Jullio Della Flora.mp4 509.6 MB
  • mp410 - Administração de Sistemas Operacionais Linux/Administração de Sistemas Linux - Aula 6.mp4 504.4 MB
  • mp405 - Análise Forense Computacional/Análise Forense Computacional - 10 - Forense em Windows - ARTEFATOS.mp4 484.1 MB
  • mp413 - Introdução à Eletrônica e Hardware Hacking/EHC Introdução à Eletrônica e Hardware Hacking aula 1.2.mp4 478.2 MB
  • mp410 - Administração de Sistemas Operacionais Linux/Administração de Sistemas Linux - Aula 2.mp4 463.4 MB
  • mp405 - Análise Forense Computacional/Análise Forense Computacional - aula 9.mp4 463.0 MB
  • mp410 - Administração de Sistemas Operacionais Linux/Administração de Sistemas Linux - Aula 3.mp4 435.1 MB
  • mp413 - Introdução à Eletrônica e Hardware Hacking/Fault Injection Attacks com Enfase em Ultrassom Julio Della Flora H2HC University 2018 1080p 30f_2.mp4 427.8 MB
【压缩文件】 [ DevCourseWeb.com ] Cybersecurity - The Beginner's Guide - A comprehensive guide to getting started in cybersecurity.zip
收录时间:2024-01-24 文档个数:1 文档大小:114.6 MB 最近下载:2025-05-14 人气:838 磁力链接
  • zip[ DevCourseWeb.com ] Cybersecurity - The Beginner's Guide - A comprehensive guide to getting started in cybersecurity.zip 114.6 MB
【影视】 [ FreeCourseWeb.com ] EC-Council - Introduction to Cybersecurity
收录时间:2024-01-16 文档个数:49 文档大小:1.2 GB 最近下载:2025-05-16 人气:1606 磁力链接
  • mp4~Get Your Files Here !/38 - Know Your Options for Data Encryption.mp4 63.3 MB
  • mp4~Get Your Files Here !/35 - Looking at an Application Designed to Help Secure Your Phone.mp4 39.8 MB
  • mp4~Get Your Files Here !/9 - Using a Password Manager.mp4 39.7 MB
  • mp4~Get Your Files Here !/40 - Checking if Your Cloud Server is Leaking Data.mp4 39.5 MB
  • mp4~Get Your Files Here !/23 - Understanding How Computers Can Become Infected.mp4 38.9 MB
  • mp4~Get Your Files Here !/26 - Being Careful of What You Post.mp4 36.8 MB
  • mp4~Get Your Files Here !/19 - Looking at Fake Error Messages (Scareware).mp4 35.8 MB
  • mp4~Get Your Files Here !/14 - USB Safety with Examples.mp4 34.9 MB
  • mp4~Get Your Files Here !/20 - Exploring Useful Browser Plugins.mp4 34.2 MB
  • mp4~Get Your Files Here !/41 - Getting to Know Everything about VPN.mp4 34.0 MB
  • mp4~Get Your Files Here !/8 - Exploring What Makes a Good Password.mp4 34.0 MB
  • mp4~Get Your Files Here !/25 - What to Do If You Are Infected with Cryptoware.mp4 34.0 MB
  • mp4~Get Your Files Here !/42 - Changing Your DNS Connection to Avoid ISP Snooping.mp4 33.5 MB
  • mp4~Get Your Files Here !/32 - Understanding Best Practices for Unusual E-mails.mp4 31.1 MB
  • mp4~Get Your Files Here !/31 - Learning How to Identify and Find Phishing E-mails.mp4 30.9 MB
  • mp4~Get Your Files Here !/44 - Learning How to Use TorGhost.mp4 30.3 MB
  • mp4~Get Your Files Here !/18 - Downloading Precautions and Hash Checking.mp4 30.3 MB
  • mp4~Get Your Files Here !/24 - Learning Best Practices for Antivirus Software and Malware Scanners.mp4 27.8 MB
  • mp4~Get Your Files Here !/37 - Additional Settings.mp4 27.6 MB
  • mp4~Get Your Files Here !/47 - Understanding Backup Methods.mp4 26.3 MB
【压缩文件】 [FreeCoursesOnline.Me] Coursera - Python for Cybersecurity Specialization
收录时间:2024-01-14 文档个数:9 文档大小:1.1 GB 最近下载:2025-04-05 人气:545 磁力链接
  • zip5. Python for Active Defense.zip 268.9 MB
  • zip2. Execution, Persistence, Privilege escalation and Evasion.zip 251.2 MB
  • zip3. Credential Access, Discovery, Lateral Movement & Collection.zip 225.7 MB
  • zip4. Python for Command-and-Control, Exfiltration and Impact.zip 203.8 MB
  • zip1. Introduction to Python for Cybersecurity.zip 185.2 MB
  • url0. Websites you may like/1. OneHack.us Premium Cracked Accounts-Tutorials-Guides-Articles Community Based Forum.url 377 Bytes
  • urlFreeCoursesOnline.me Download Udacity, Masterclass, Lynda, PHLearn, etc Free.url 290 Bytes
  • txtContent Info.txt 284 Bytes
  • url0. Websites you may like/2. FTUApps.com Download Cracked Developers Applications For Free.url 239 Bytes
【影视】 [ FreeCourseWeb.com ] ISO 27001 - 2022-Compliant Cybersecurity - The Annex A Controls
收录时间:2024-01-12 文档个数:97 文档大小:310.4 MB 最近下载:2025-05-16 人气:10551 磁力链接
  • mp4~Get Your Files Here !/13 - 12. Threat and Vulnerability Management and Secure Configuration/02 - Secure configuration (Controls 8.9, 8.19, and 8.24).mp4 14.2 MB
  • mp4~Get Your Files Here !/07 - 6. Information Security Event Management/01 - Information security incident management (Controls 5.24–5.28, and 6.8).mp4 13.3 MB
  • mp4~Get Your Files Here !/05 - 4. Identity and Access Management/01 - Access management (Controls 5.15–5.18).mp4 12.9 MB
  • mp4~Get Your Files Here !/04 - 3. Information Protection/02 - Deletion, masking, DLP, and test data (Controls 8.10–8.12, and 8.33).mp4 12.7 MB
  • mp4~Get Your Files Here !/08 - 7. Continuity/01 - Continuity (Controls 5.29, 5.30, and 8.13).mp4 12.4 MB
  • mp4~Get Your Files Here !/14 - 13. Application Security/01 - Secure development (Controls 8.25–8.28).mp4 12.4 MB
  • mp4~Get Your Files Here !/10 - 9. Human Resource Security/02 - During employment (Controls 6.3–6.6).mp4 12.3 MB
  • mp4~Get Your Files Here !/12 - 11. System and Network Security/01 - Network security management (Controls 8.20–8.23).mp4 12.1 MB
  • mp4~Get Your Files Here !/12 - 11. System and Network Security/02 - Protection of information systems (Controls 8.7, 8.18, 8.30, and 8.34).mp4 11.8 MB
  • mp4~Get Your Files Here !/14 - 13. Application Security/02 - Testing, separate environments, and change management (Controls 8.29, 8.31, and 8.32).mp4 11.7 MB
  • mp4~Get Your Files Here !/05 - 4. Identity and Access Management/02 - System and application access control (Controls 8.2–8.5).mp4 11.6 MB
  • mp4~Get Your Files Here !/02 - 1. Governance/03 - Contacts and project management (Controls 5.5, 5.6, and 5.8).mp4 11.0 MB
  • mp4~Get Your Files Here !/03 - 2. Asset Management/01 - Responsibility for information assets (Controls 5.9, 5.10, 6.7, and 8.1).mp4 10.8 MB
  • mp4~Get Your Files Here !/04 - 3. Information Protection/01 - Classification, labeling, and privacy (Controls 5.12, 5.13, and 5.34).mp4 10.8 MB
  • mp4~Get Your Files Here !/02 - 1. Governance/02 - Roles, responsibilities, and duties (Controls 5.2–5.4).mp4 10.4 MB
  • mp4~Get Your Files Here !/02 - 1. Governance/01 - Policies for information security (Control 5.1).mp4 10.1 MB
  • mp4~Get Your Files Here !/07 - 6. Information Security Event Management/02 - Logging and monitoring (Controls 8.15–8.17).mp4 9.9 MB
  • mp4~Get Your Files Here !/06 - 5. Supplier Relationships Security/01 - Supplier relationships security (Controls 5.19–5.21).mp4 9.6 MB
  • mp4~Get Your Files Here !/06 - 5. Supplier Relationships Security/02 - Managing supplier service delivery and cloud services security (Controls 5.22 and 5.23).mp4 9.6 MB
  • mp4~Get Your Files Here !/13 - 12. Threat and Vulnerability Management and Secure Configuration/01 - Threat and vulnerability management (Controls 5.7 and 8.8).mp4 9.5 MB
【影视】 Implementing the NIST Cybersecurity Framework
收录时间:2024-01-10 文档个数:127 文档大小:4.3 GB 最近下载:2025-05-16 人气:874 磁力链接
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/2. Using the NIST Cybersecurity Framework/5. Finding the Controls.mp4 307.2 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/6. Five Functions.mp4 231.8 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/7. Controls and Outcomes.mp4 205.8 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/5. Framework Components.mp4 197.5 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/3. Value Proposition.mp4 181.0 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/1. Welcome.mp4 161.5 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/5. Generate Questionnaire.mp4 153.5 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/2. Using the NIST Cybersecurity Framework/1. Using the Core.mp4 149.0 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/2. Intel (Microchip Manufacturing).mp4 143.5 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/5. Implementing Phase Two of the CR-MAP/4. Business Value Analysis.mp4 139.8 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/4. DOE (Energy Industry).mp4 139.0 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/7. Conduct Interviews.mp4 136.2 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/7. Conclusion/1. BONUS - Conclusion.mp4 126.4 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/3. Cimpress (Promotional Products).mp4 123.9 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/6. Saudi Aramco (Oil Industry).mp4 118.9 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/4. Intended Audience.mp4 112.2 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/5. Western Australia (Local Government).mp4 112.1 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/6. Choose Target Scores.mp4 100.5 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/6. Implementing Phase Three of the CR-MAP/3. Quarterly Reviews.mp4 99.8 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/1. Phase One.mp4 93.8 MB
共14页 上一页 1 2 3 4 5 6 7 8 下一页