为您索检到268条磁力链接,耗时0毫秒。
- 【影视】 [ DevCourseWeb.com ] Udemy - Deepfake Defense for Cybersecurity and GRC Professionals
-
收录时间:2024-03-22
文档个数:38
文档大小:1.4 GB
最近下载:2025-05-15
人气:3879
磁力链接
~Get Your Files Here !/2. Detection & Mitigation/6. 20-Documenting and structuring our Deepfake mitigation strategy Report.mp4 105.7 MB
~Get Your Files Here !/1. Course Foundation/13. 13-Assessing Your organization’s deepfake response capabilities.mp4 99.8 MB
~Get Your Files Here !/2. Detection & Mitigation/8. 22-Action Plan for Deepfake Mitigation Strategy Implementation.mp4 93.6 MB
~Get Your Files Here !/2. Detection & Mitigation/10. 24-Standard Operating Procedure (SOP) for Deepfake Incident Response.mp4 86.6 MB
~Get Your Files Here !/3. Things to consider_Questions to ask/4. 29-Deepfake Mitigation Tools.mp4 80.4 MB
~Get Your Files Here !/2. Detection & Mitigation/5. 19-Developing deepfake mitigation strategy through brainstorming.mp4 79.9 MB
~Get Your Files Here !/1. Course Foundation/11. 11-Identifying Deepfakes.mp4 67.7 MB
~Get Your Files Here !/1. Course Foundation/4. 4-Deepfake Assessment-Can members of your organization identify deepfakes.mp4 63.6 MB
~Get Your Files Here !/1. Course Foundation/5. 5-Course Agenda.mp4 60.7 MB
~Get Your Files Here !/3. Things to consider_Questions to ask/3. 28-Creating a culture of Verefication.mp4 57.2 MB
~Get Your Files Here !/1. Course Foundation/12. 12-Testing for Deepfakes.mp4 57.1 MB
~Get Your Files Here !/2. Detection & Mitigation/1. 15-Intro to section 2_Are there any silver bullets for deepfake mitigation.mp4 51.7 MB
~Get Your Files Here !/1. Course Foundation/3. 3-Possible causes of deepfake Incident-News Brief Postmortem.mp4 50.1 MB
~Get Your Files Here !/2. Detection & Mitigation/3. 17-Important considerations for developing a deepfake defense strategy.mp4 42.4 MB
~Get Your Files Here !/1. Course Foundation/1. 1-Deepfake Defense For Cybersecurity & GRC Professionals.mp4 41.8 MB
~Get Your Files Here !/2. Detection & Mitigation/4. 18-Key components of a deepfake mitigation strategy.mp4 41.2 MB
~Get Your Files Here !/3. Things to consider_Questions to ask/5. 30-The most efficient measures to take against deepfake attacks.mp4 40.7 MB
~Get Your Files Here !/1. Course Foundation/14. 14-End of Section_1.mp4 39.9 MB
~Get Your Files Here !/1. Course Foundation/6. 6-Meet your Instructor.mp4 39.7 MB
~Get Your Files Here !/1. Course Foundation/2. 2-Important Note about course.mp4 38.8 MB
猜你喜欢:
Professionals
Cybersecurity
Udemy
DevCourseWeb
Defense
GRC
com
Deepfake
- 【压缩文件】 [CourserHub.com] Coursera - Cybersecurity Specialization
-
收录时间:2024-03-21
文档个数:2
文档大小:5.9 GB
最近下载:2025-05-12
人气:289
磁力链接
[CourserHub.com] Coursera - Cybersecurity Specialization.part1.rar 3.2 GB
[CourserHub.com] Coursera - Cybersecurity Specialization.part2.rar 2.7 GB
猜你喜欢:
Cybersecurity
Coursera
com
Specialization
CourserHub
- 【影视】 [FreeCoursesOnline.Me] O`REILLY - Building a Career in Cybersecurity
-
收录时间:2024-03-05
文档个数:75
文档大小:847.7 MB
最近下载:2025-05-12
人气:550
磁力链接
Lesson 1 Getting Started in the Cybersecurity Field/005. 1.4 Cybersecurity Skills.mp4 65.3 MB
Lesson 2 Planning Your Cybersecurity Career/004. 2.3 The Value of Professional Certifications.mp4 60.1 MB
Lesson 3 Creating Your Own Lab/003. 3.2 Foundational Lab.mp4 48.0 MB
Lesson 5 Preparing for Your Interview/005. 5.4 Final Tips.mp4 44.9 MB
Lesson 6 Using Continuous Improvement Strategy/007. 6.6 Growing Your Career as a Remote Worker.mp4 40.3 MB
Lesson 2 Planning Your Cybersecurity Career/003. 2.2 Creating and Tracking Your Plan.mp4 36.8 MB
Lesson 5 Preparing for Your Interview/003. 5.2 Preparing for the Interview.mp4 35.5 MB
Lesson 1 Getting Started in the Cybersecurity Field/006. 1.5 Navigating through the Industry.mp4 31.9 MB
Lesson 2 Planning Your Cybersecurity Career/002. 2.1 Establishing a Plan.mp4 31.3 MB
Lesson 6 Using Continuous Improvement Strategy/008. 6.7 What’s Next.mp4 31.0 MB
Lesson 1 Getting Started in the Cybersecurity Field/004. 1.3 Cybersecurity Jobs.mp4 30.3 MB
Lesson 5 Preparing for Your Interview/004. 5.3 Advancing in the Interview Process.mp4 29.3 MB
Lesson 6 Using Continuous Improvement Strategy/006. 6.5 Keeping a Good Work-life Balance.mp4 28.2 MB
Lesson 3 Creating Your Own Lab/005. 3.4 Enabling and Using Microsoft Defender for Cloud.mp4 27.7 MB
Introduction/001. Building a Career in Cybersecurity Introduction.mp4 25.1 MB
Lesson 6 Using Continuous Improvement Strategy/003. 6.2 Responsibilities and Expectations.mp4 24.6 MB
Lesson 4 Expanding Your Networking/005. 4.4 Using LinkedIn to Expand Your Network.mp4 24.5 MB
Lesson 1 Getting Started in the Cybersecurity Field/003. 1.2 Roles and Responsibilities.mp4 22.1 MB
Lesson 4 Expanding Your Networking/002. 4.1 Understanding the Cybersecurity Community.mp4 21.9 MB
Lesson 4 Expanding Your Networking/003. 4.2 Identifying Opportunities to Contribute with the Cybersecurity Community.mp4 19.3 MB
猜你喜欢:
FreeCoursesOnline
Me
Cybersecurity
Career
REILLY
Building
- 【其他】 The Complete Ethical Hacking Course Bundle This Book Includes Python Machine Learning, SQL, Linux, Hacking with Kali Linux, Hack Websites, Smartphones, Coding, and Cybersecurity Fundamentals
-
收录时间:2024-03-01
文档个数:1
文档大小:1.4 GB
最近下载:2025-05-16
人气:13151
磁力链接
TheCompleteEthicalHackingCourseBundleThisBookIncludesPythonMachineLearningSQLLinuxHacki_ep6.m4b 1.4 GB
猜你喜欢:
Linux
Hacking
Ethical
Smartphones
Fundamentals
Complete
Python
Kali
Coding
Bundle
- 【影视】 Palo Alto Networks Cybersecurity Fundamentals (PCCSA)
-
收录时间:2024-02-29
文档个数:52
文档大小:2.0 GB
最近下载:2025-05-16
人气:5526
磁力链接
Chapter 1 Cybersecurity Fundamentals and Threat Landscape/002. Identify Computing and Networking Trends.mp4 118.2 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/006. Identify Networking Security Technologies.mp4 114.7 MB
Chapter 1 Cybersecurity Fundamentals and Threat Landscape/003. Describe Cybersecurity Threats.mp4 108.3 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/004. Review Network Addressing.mp4 105.2 MB
Chapter 1 Cybersecurity Fundamentals and Threat Landscape/005. Identify Wi-Fi Vulnerabilities and Attacks.mp4 100.1 MB
Chapter 1 Cybersecurity Fundamentals and Threat Landscape/004. Describe Common Cyberattack Techniques.mp4 96.3 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/011. Endpoint Security.mp4 95.3 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/002. Describe Routing Protocols.mp4 91.8 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/001. Identify Basic Internet and Network Operations.mp4 90.7 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/012. Server and System Administration.mp4 90.3 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/003. Review Networking Models.mp4 88.4 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/009. Learn Basic Virtualization Security Concepts.mp4 83.8 MB
Chapter 3 Palo Alto Networks Security Solutions and Technologies/007. Describe Cortex XSOAR and AutoFocus.mp4 79.5 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/008. Learn Basic Cloud Security Concepts.mp4 75.4 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/010. Learn Basic DevOps Security Concepts.mp4 75.3 MB
Chapter 3 Palo Alto Networks Security Solutions and Technologies/001. Identify Palo Alto Networks Security Solutions.mp4 74.3 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/005. Learn Networking Security Models.mp4 72.6 MB
Chapter 3 Palo Alto Networks Security Solutions and Technologies/002. Describe Basic NGFW Components and Functions.mp4 67.1 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/007. Learn Basic Data Center Security Concepts.mp4 60.2 MB
Chapter 3 Palo Alto Networks Security Solutions and Technologies/003. Learn Basic Prisma Cloud.mp4 59.7 MB
猜你喜欢:
Alto
Cybersecurity
Fundamentals
PCCSA
Palo
Networks
- 【影视】 [GigaCourse.Com] ZeroToMastery - Complete Cybersecurity Bootcamp
-
收录时间:2024-02-21
文档个数:107
文档大小:3.6 GB
最近下载:2025-05-16
人气:1264
磁力链接
8-Network Security/052-Network Security With Nmap.mp4 169.9 MB
5-Security Bugs & Vulnerabilities/020-Buffer Overflow Demonstration.mp4 136.7 MB
12-Appendix - Ethical Hacking/087-Msfconsole Basic Commands.mp4 97.5 MB
8-Network Security/059-Wireless Attack Demonstration.mp4 93.4 MB
7-End-Point Protection/034-Password Security and Password Managers.mp4 84.2 MB
12-Appendix - Ethical Hacking/093-Meterpreter Basic Commands Part 1.mp4 78.5 MB
7-End-Point Protection/038-Process Explorer.mp4 75.8 MB
1-Introduction/001-Cybersecurity Bootcamp - Zero to Mastery.mp4 72.4 MB
8-Network Security/057-Secure Network Architecture.mp4 66.8 MB
12-Appendix - Ethical Hacking/094-Meterpreter Basic Commands Part 2.mp4 65.7 MB
7-End-Point Protection/033-Bitdefender, Kaspersky, McAfee, Malwarebytes.mp4 63.9 MB
4-Understanding Hackers - The Biggest Threat/012-Most Common Attacks Demonstration.mp4 63.5 MB
8-Network Security/060-Network Monitoring With TCPDump.mp4 62.7 MB
8-Network Security/058-Wireless Security.mp4 59.6 MB
5-Security Bugs & Vulnerabilities/017-Unpatched Machine Exploitation Demonstration.mp4 59.1 MB
12-Appendix - Ethical Hacking/080-Whatweb Stealthy Scan.mp4 58.1 MB
12-Appendix - Ethical Hacking/091-Advance Msfvenom Usage.mp4 51.4 MB
7-End-Point Protection/043-Iptables.mp4 50.9 MB
7-End-Point Protection/028-Brave Browser Security and Privacy.mp4 50.6 MB
12-Appendix - Ethical Hacking/089-Software Vulnerability - Samba Exploitation.mp4 49.5 MB
猜你喜欢:
Complete
Cybersecurity
Bootcamp
GigaCourse
ZeroToMastery
Com
- 【压缩文件】 [ TutPig.com ] Udemy - Cybersecurity for Artificial Intelligence (A.I).zip
-
收录时间:2024-02-20
文档个数:1
文档大小:280.8 MB
最近下载:2025-03-01
人气:281
磁力链接
[ TutPig.com ] Udemy - Cybersecurity for Artificial Intelligence (A.I).zip 280.8 MB
猜你喜欢:
zip
Cybersecurity
Intelligence
Artificial
Udemy
TutPig
com
- 【影视】 Udemy Cybersecurity Collection
-
收录时间:2024-02-17
文档个数:7517
文档大小:115.9 GB
最近下载:2025-05-16
人气:6044
磁力链接
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/3. Cross-Site-Scripting/1. Cross-Site-Scripting - Lecture.mp4 748.2 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/8. Cross Site Request Forgery/1. CSRF - Techniques.mp4 695.8 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/2. All Interesting Tools/1. Tools I Use.mp4 632.4 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/1. Introduction/3. Recon with.mp4 608.7 MB
Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/18. Reconnaissance/8. Active Recon - Port Scanning.mp4 436.1 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/7. Open Redirect Vulnerability/1. Open Redirect Vulnerability with @hemanth1261.mp4 435.9 MB
Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/19. Exploitation/11. SQL Injection _ SQLMap.mp4 417.9 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/1. Introduction/5. Another Recon Video.mp4 398.8 MB
Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/2. Walkthrough - Legacy.mp4 348.0 MB
Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/16. Assembly Course/5. Arithmetic.mp4 331.0 MB
Udemy - The Complete Ethical Hacking Course, by Gerri Banfield _ Erman Kirkpatrick/05 How to create a bootable USB of Kali Linux ( optional )/025 How to create a bootable USB of Kali with persistent storage _ 4 GB part 4.mp4 328.9 MB
Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/6. Walkthrough - Jerry.mp4 320.2 MB
Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/25. Job Hunting/6. Analyzing the Job Post.mp4 312.1 MB
Udemy - The Complete Ethical Hacking Course, by Gerri Banfield _ Erman Kirkpatrick/04 Set up instructions for Mac users ONLY/021 Kali Linux Live USB on a MacBook Pro part 3 ( OPTIONAL ).mp4 302.6 MB
Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/7. Walkthrough - Nibbles.mp4 299.2 MB
Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/4. Walkthrough - Blue.mp4 298.0 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/6. Server Side Request Forgery/2. SSRF - Advanced Techniques.mp4 294.3 MB
Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/3. Walkthrough - Lame.mp4 293.6 MB
Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/20. Post Exploitation/1. Stabilizing Shells.mp4 285.1 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/6. Server Side Request Forgery/1. SSRF - Basic Techniques.mp4 282.4 MB
猜你喜欢:
Cybersecurity
Collection
Udemy
- 【其他】 The Personal Cybersecurity Manual A.m4b
-
收录时间:2024-02-13
文档个数:1
文档大小:125.7 MB
最近下载:2025-05-16
人气:4975
磁力链接
The Personal Cybersecurity Manual A.m4b 125.7 MB
猜你喜欢:
Personal
Cybersecurity
Manual
m4b
- 【影视】 [ CoursePig.com ] Linkedin - Microsoft Cybersecurity Architect Expert (SC-100) Cert Prep - 4 Design Strategy for Data and Applications
-
收录时间:2024-02-06
文档个数:24
文档大小:153.6 MB
最近下载:2025-05-16
人气:1320
磁力链接
~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/02 - Design a strategy to identify and protect sensitive data.mp4 27.6 MB
~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/03 - Specify a security strategy for applications and APIs.mp4 24.9 MB
~Get Your Files Here !/01 - Introduction/01 - Prepping for the SC-100 exam.mp4 22.5 MB
~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/02 - Specify a security standard for onboarding a new application.mp4 18.4 MB
~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/03 - Specify an encryption standard for data at rest and in motion.mp4 16.3 MB
~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/01 - Specify priorities for mitigating threats to applications.mp4 14.2 MB
~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/01 - Specify priorities for mitigating threats to data.mp4 13.9 MB
~Get Your Files Here !/01 - Introduction/02 - What you should know.mp4 6.8 MB
~Get Your Files Here !/04 - Conclusion/01 - Next steps.mp4 5.0 MB
~Get Your Files Here !/01 - Introduction/03 - Lab setup.mp4 3.4 MB
~Get Your Files Here !/Ex_Files_MSFT_Cybersecurity_Arch_Expert_SC_100_Cert_Prep_4/Exercise Files/Sign up for a free trial.pdf 338.4 kB
~Get Your Files Here !/Ex_Files_MSFT_Cybersecurity_Arch_Expert_SC_100_Cert_Prep_4/Exercise Files/SC-100 Exam Study Guide Course 4.pdf 47.8 kB
~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/02 - Design a strategy to identify and protect sensitive data.srt 18.1 kB
~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/03 - Specify a security strategy for applications and APIs.srt 15.6 kB
~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/02 - Specify a security standard for onboarding a new application.srt 9.7 kB
~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/03 - Specify an encryption standard for data at rest and in motion.srt 9.2 kB
~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/01 - Specify priorities for mitigating threats to data.srt 9.0 kB
~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/01 - Specify priorities for mitigating threats to applications.srt 7.7 kB
~Get Your Files Here !/01 - Introduction/02 - What you should know.srt 3.4 kB
~Get Your Files Here !/04 - Conclusion/01 - Next steps.srt 2.6 kB
猜你喜欢:
Expert
Cybersecurity
Data
CoursePig
Linkedin
Prep
Applications
Cert
Architect
SC
- 【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity Essentials - Stay Safe and Secure Online
-
收录时间:2024-02-04
文档个数:39
文档大小:1.2 GB
最近下载:2025-05-14
人气:2451
磁力链接
~Get Your Files Here !/6. Device Security/1. Introduction to Device Security.mp4 79.4 MB
~Get Your Files Here !/2. Password Security/2. What Makes a Good Password.mp4 70.5 MB
~Get Your Files Here !/6. Device Security/3. Mobile Security Best Practices.mp4 69.8 MB
~Get Your Files Here !/4. Phishing/1. Introduction to Phishing.mp4 63.3 MB
~Get Your Files Here !/5. Staying Safe on the Web/3. Identifying Suspicious Downloads.mp4 59.6 MB
~Get Your Files Here !/6. Device Security/2. Choosing and Using an Antivirus.mp4 58.4 MB
~Get Your Files Here !/2. Password Security/1. Introduction to Passwords.mp4 57.7 MB
~Get Your Files Here !/5. Staying Safe on the Web/2. Inspecting URLs.mp4 57.6 MB
~Get Your Files Here !/2. Password Security/5. Using a Password Manager.mp4 56.2 MB
~Get Your Files Here !/7. Virtual Private Networks/4. Choosing a VPN Solution.mp4 55.5 MB
~Get Your Files Here !/4. Phishing/4. Phishing Without Email.mp4 54.3 MB
~Get Your Files Here !/4. Phishing/2. The Psychology of Phishing.mp4 52.3 MB
~Get Your Files Here !/5. Staying Safe on the Web/4. Managing Trackers and Cookies.mp4 48.2 MB
~Get Your Files Here !/3. Multi-Factor Authentication (MFA)/3. Choosing a Strong Authentication Factor.mp4 45.8 MB
~Get Your Files Here !/7. Virtual Private Networks/2. Why Use a VPN.mp4 45.5 MB
~Get Your Files Here !/3. Multi-Factor Authentication (MFA)/5. Identifying MFA Phishing Attacks.mp4 41.4 MB
~Get Your Files Here !/7. Virtual Private Networks/3. How VPNs Work.mp4 38.0 MB
~Get Your Files Here !/4. Phishing/3. Examining a Phishing Email.mp4 35.7 MB
~Get Your Files Here !/2. Password Security/4. Checking for Compromised Accounts.mp4 33.5 MB
~Get Your Files Here !/4. Phishing/5. Phishing Using the Cloud.mp4 31.6 MB
猜你喜欢:
Essentials
Cybersecurity
Safe
Stay
DevCourseWeb
Online
Udemy
com
Secure
- 【影视】 [ FreeCourseWeb.com ] Linkedin - Cybersecurity Careers - Become a Security Engineer
-
收录时间:2024-02-04
文档个数:28
文档大小:83.4 MB
最近下载:2025-05-08
人气:642
磁力链接
~Get Your Files Here !/05 - Conclusion/01 - The fun doesn't end.mp4 8.3 MB
~Get Your Files Here !/03 - 2. How to Become a Security Engineer/03 - Certification options.mp4 8.3 MB
~Get Your Files Here !/04 - 3. Day in the Life/01 - Day in the life of a cloud security engineer.mp4 7.7 MB
~Get Your Files Here !/02 - 1. Security Engineering Career Basics/03 - Why pursue a career in cybersecurity.mp4 7.4 MB
~Get Your Files Here !/02 - 1. Security Engineering Career Basics/02 - What's the difference.mp4 7.4 MB
~Get Your Files Here !/02 - 1. Security Engineering Career Basics/01 - What is a security engineer.mp4 7.4 MB
~Get Your Files Here !/03 - 2. How to Become a Security Engineer/04 - Benefits of networking.mp4 7.1 MB
~Get Your Files Here !/04 - 3. Day in the Life/02 - Common challenges.mp4 5.8 MB
~Get Your Files Here !/03 - 2. How to Become a Security Engineer/02 - Develop your skill set.mp4 5.3 MB
~Get Your Files Here !/04 - 3. Day in the Life/03 - Solving problems.mp4 5.2 MB
~Get Your Files Here !/03 - 2. How to Become a Security Engineer/05 - Interviewing for a security engineering position.mp4 5.0 MB
~Get Your Files Here !/03 - 2. How to Become a Security Engineer/01 - Do your research.mp4 4.8 MB
~Get Your Files Here !/01 - 0. Introduction/01 - Becoming a security engineer.mp4 3.7 MB
~Get Your Files Here !/03 - 2. How to Become a Security Engineer/03 - Certification options.srt 8.1 kB
~Get Your Files Here !/03 - 2. How to Become a Security Engineer/04 - Benefits of networking.srt 7.7 kB
~Get Your Files Here !/03 - 2. How to Become a Security Engineer/05 - Interviewing for a security engineering position.srt 6.5 kB
~Get Your Files Here !/02 - 1. Security Engineering Career Basics/02 - What's the difference.srt 6.3 kB
~Get Your Files Here !/04 - 3. Day in the Life/02 - Common challenges.srt 5.7 kB
~Get Your Files Here !/04 - 3. Day in the Life/03 - Solving problems.srt 5.3 kB
~Get Your Files Here !/02 - 1. Security Engineering Career Basics/01 - What is a security engineer.srt 5.3 kB
猜你喜欢:
Cybersecurity
Linkedin
FreeCourseWeb
Become
Security
com
Careers
Engineer
- 【影视】 [ DevCourseWeb.com ] Udemy - Intro To Cybersecurity In Healthcare (2 Of 2),Plain and Simple
-
收录时间:2024-02-03
文档个数:26
文档大小:953.6 MB
最近下载:2025-05-15
人气:1322
磁力链接
~Get Your Files Here !/3 - Ransomware and Cryptocurrency.mp4 309.9 MB
~Get Your Files Here !/7 - Testing Your Vulnerabilities.mp4 150.2 MB
~Get Your Files Here !/2 - Malware.mp4 136.5 MB
~Get Your Files Here !/5 - Boston Childrens Hack The Response.mp4 123.0 MB
~Get Your Files Here !/8 - HIPAA.mp4 70.3 MB
~Get Your Files Here !/4 - Boston Childrens Hack The Issue.mp4 52.4 MB
~Get Your Files Here !/6 - Boston Childrens Hack Lessons Learned.mp4 50.7 MB
~Get Your Files Here !/1 - Introduction.mp4 49.6 MB
~Get Your Files Here !/9 - Conclusions.mp4 10.9 MB
~Get Your Files Here !/3 - Ransomware and Cryptocurrency English.vtt 24.5 kB
~Get Your Files Here !/7 - Testing Your Vulnerabilities English.vtt 12.5 kB
~Get Your Files Here !/13 - IN THE NEWS Some Straight Talk on Ransomware in Health Care.html 11.3 kB
~Get Your Files Here !/2 - Malware English.vtt 10.7 kB
~Get Your Files Here !/5 - Boston Childrens Hack The Response English.vtt 10.1 kB
~Get Your Files Here !/8 - HIPAA English.vtt 5.9 kB
~Get Your Files Here !/12 - IN THE NEWS.html 5.8 kB
~Get Your Files Here !/6 - Boston Childrens Hack Lessons Learned English.vtt 4.6 kB
~Get Your Files Here !/1 - Introduction English.vtt 4.5 kB
~Get Your Files Here !/4 - Boston Childrens Hack The Issue English.vtt 4.3 kB
~Get Your Files Here !/10 - IN THE NEWS Cyberattacks hit midsize hospitals hardest.html 4.2 kB
猜你喜欢:
Cybersecurity
Plain
Udemy
DevCourseWeb
Simple
Intro
Healthcare
com
- 【影视】 [ DevCourseWeb.com ] Udemy - Industrial Cybersecurity Controls As per IEC62443
-
收录时间:2024-01-31
文档个数:24
文档大小:1.8 GB
最近下载:2025-05-11
人气:1472
磁力链接
~Get Your Files Here !/2. Authentication & Authorization Technologies/3. Password Authentication.mp4 269.6 MB
~Get Your Files Here !/1. IEC 62443 Basic Introduction/1. Introduction About IEC.mp4 214.6 MB
~Get Your Files Here !/2. Authentication & Authorization Technologies/2. Role Based Access Control.mp4 200.8 MB
~Get Your Files Here !/2. Authentication & Authorization Technologies/4. Challengeresponse Authentication.mp4 199.5 MB
~Get Your Files Here !/2. Authentication & Authorization Technologies/5. Physical Token Authentication.mp4 182.0 MB
~Get Your Files Here !/2. Authentication & Authorization Technologies/6. Smart Card Authentication.mp4 181.6 MB
~Get Your Files Here !/2. Authentication & Authorization Technologies/7. Biometric Authentication.mp4 178.0 MB
~Get Your Files Here !/2. Authentication & Authorization Technologies/9. Password Distribution & Management.mp4 131.1 MB
~Get Your Files Here !/2. Authentication & Authorization Technologies/8. Location Based Authentication.mp4 101.2 MB
~Get Your Files Here !/2. Authentication & Authorization Technologies/1. Authentication & Authorization Briefing.mp4 99.7 MB
~Get Your Files Here !/2. Authentication & Authorization Technologies/10. Device to Device Authentication.mp4 57.7 MB
~Get Your Files Here !/2. Authentication & Authorization Technologies/3. Password Authentication.srt 22.9 kB
~Get Your Files Here !/2. Authentication & Authorization Technologies/9. Password Distribution & Management.srt 22.1 kB
~Get Your Files Here !/2. Authentication & Authorization Technologies/6. Smart Card Authentication.srt 17.2 kB
~Get Your Files Here !/2. Authentication & Authorization Technologies/7. Biometric Authentication.srt 14.9 kB
~Get Your Files Here !/2. Authentication & Authorization Technologies/4. Challengeresponse Authentication.srt 13.8 kB
~Get Your Files Here !/1. IEC 62443 Basic Introduction/1. Introduction About IEC.srt 13.5 kB
~Get Your Files Here !/2. Authentication & Authorization Technologies/8. Location Based Authentication.srt 13.1 kB
~Get Your Files Here !/2. Authentication & Authorization Technologies/2. Role Based Access Control.srt 13.0 kB
~Get Your Files Here !/2. Authentication & Authorization Technologies/5. Physical Token Authentication.srt 11.9 kB
猜你喜欢:
Industrial
Cybersecurity
Controls
Udemy
DevCourseWeb
IEC62443
per
com
- 【压缩文件】 Pós Graduação em Ethical Hacking e CyberSecurity - Julio Della Flora
-
收录时间:2024-01-27
文档个数:326
文档大小:57.7 GB
最近下载:2025-04-20
人气:182
磁力链接
05 - Análise Forense Computacional/Conteudo de forense-026.rar 5.6 GB
01 - Introdução à Segurança Ofensiva/maquinas virtuais-027.rar 3.6 GB
13 - Introdução à Eletrônica e Hardware Hacking/EHC Introdução à Eletrônica e Hardware Hacking aula 4.7.mp4 1.7 GB
07 - Introdução à Segurança da Informação/Modulo 05 - Criptografia e Esteganografia-015.mp4 1.2 GB
13 - Introdução à Eletrônica e Hardware Hacking/EHC Introdução à Eletrônica e Hardware Hacking aula 4.3.mp4 946.0 MB
12 - Exploração de Software/EXPS - UN01 - 01.mp4 878.8 MB
06 - Teste de Invasão em Redes e Sistemas/Teste de Invasão em Redes e Sistemas - Aula 3 - Metasploit Nessus Meterpreter John.mp4 710.4 MB
13 - Introdução à Eletrônica e Hardware Hacking/EHC Introdução à Eletrônica e Hardware Hacking aula 5.2.mp4 598.9 MB
13 - Introdução à Eletrônica e Hardware Hacking/#04 -Gadgets para Pentesters-.mp4 585.5 MB
13 - Introdução à Eletrônica e Hardware Hacking/[SecurityCast] WebCast #54 - Hardware Hacking.mp4 574.7 MB
13 - Introdução à Eletrônica e Hardware Hacking/EHC Introdução à Eletrônica e Hardware Hacking aula 4.6.mp4 553.0 MB
04 - Fundamentos de Redes de Computadores/EHC Introdução à Redes de Computadores Aula 4.3.mp4 524.2 MB
13 - Introdução à Eletrônica e Hardware Hacking/20º Hangout - Gadgets Malignos para -Hackers do Bem- - Jullio Della Flora.mp4 509.6 MB
10 - Administração de Sistemas Operacionais Linux/Administração de Sistemas Linux - Aula 6.mp4 504.4 MB
05 - Análise Forense Computacional/Análise Forense Computacional - 10 - Forense em Windows - ARTEFATOS.mp4 484.1 MB
13 - Introdução à Eletrônica e Hardware Hacking/EHC Introdução à Eletrônica e Hardware Hacking aula 1.2.mp4 478.2 MB
10 - Administração de Sistemas Operacionais Linux/Administração de Sistemas Linux - Aula 2.mp4 463.4 MB
05 - Análise Forense Computacional/Análise Forense Computacional - aula 9.mp4 463.0 MB
10 - Administração de Sistemas Operacionais Linux/Administração de Sistemas Linux - Aula 3.mp4 435.1 MB
13 - Introdução à Eletrônica e Hardware Hacking/Fault Injection Attacks com Enfase em Ultrassom Julio Della Flora H2HC University 2018 1080p 30f_2.mp4 427.8 MB
猜你喜欢:
em
Julio
Flora
Ethical
CyberSecurity
Gradua
Hacking
Della
- 【压缩文件】 [ DevCourseWeb.com ] Cybersecurity - The Beginner's Guide - A comprehensive guide to getting started in cybersecurity.zip
-
收录时间:2024-01-24
文档个数:1
文档大小:114.6 MB
最近下载:2025-05-14
人气:838
磁力链接
[ DevCourseWeb.com ] Cybersecurity - The Beginner's Guide - A comprehensive guide to getting started in cybersecurity.zip 114.6 MB
猜你喜欢:
zip
Beginner
getting
Cybersecurity
comprehensive
cybersecurity
guide
DevCourseWeb
started
com
- 【影视】 [ FreeCourseWeb.com ] EC-Council - Introduction to Cybersecurity
-
收录时间:2024-01-16
文档个数:49
文档大小:1.2 GB
最近下载:2025-05-16
人气:1606
磁力链接
~Get Your Files Here !/38 - Know Your Options for Data Encryption.mp4 63.3 MB
~Get Your Files Here !/35 - Looking at an Application Designed to Help Secure Your Phone.mp4 39.8 MB
~Get Your Files Here !/9 - Using a Password Manager.mp4 39.7 MB
~Get Your Files Here !/40 - Checking if Your Cloud Server is Leaking Data.mp4 39.5 MB
~Get Your Files Here !/23 - Understanding How Computers Can Become Infected.mp4 38.9 MB
~Get Your Files Here !/26 - Being Careful of What You Post.mp4 36.8 MB
~Get Your Files Here !/19 - Looking at Fake Error Messages (Scareware).mp4 35.8 MB
~Get Your Files Here !/14 - USB Safety with Examples.mp4 34.9 MB
~Get Your Files Here !/20 - Exploring Useful Browser Plugins.mp4 34.2 MB
~Get Your Files Here !/41 - Getting to Know Everything about VPN.mp4 34.0 MB
~Get Your Files Here !/8 - Exploring What Makes a Good Password.mp4 34.0 MB
~Get Your Files Here !/25 - What to Do If You Are Infected with Cryptoware.mp4 34.0 MB
~Get Your Files Here !/42 - Changing Your DNS Connection to Avoid ISP Snooping.mp4 33.5 MB
~Get Your Files Here !/32 - Understanding Best Practices for Unusual E-mails.mp4 31.1 MB
~Get Your Files Here !/31 - Learning How to Identify and Find Phishing E-mails.mp4 30.9 MB
~Get Your Files Here !/44 - Learning How to Use TorGhost.mp4 30.3 MB
~Get Your Files Here !/18 - Downloading Precautions and Hash Checking.mp4 30.3 MB
~Get Your Files Here !/24 - Learning Best Practices for Antivirus Software and Malware Scanners.mp4 27.8 MB
~Get Your Files Here !/37 - Additional Settings.mp4 27.6 MB
~Get Your Files Here !/47 - Understanding Backup Methods.mp4 26.3 MB
猜你喜欢:
Introduction
EC
Cybersecurity
FreeCourseWeb
Council
com
- 【压缩文件】 [FreeCoursesOnline.Me] Coursera - Python for Cybersecurity Specialization
-
收录时间:2024-01-14
文档个数:9
文档大小:1.1 GB
最近下载:2025-04-05
人气:545
磁力链接
5. Python for Active Defense.zip 268.9 MB
2. Execution, Persistence, Privilege escalation and Evasion.zip 251.2 MB
3. Credential Access, Discovery, Lateral Movement & Collection.zip 225.7 MB
4. Python for Command-and-Control, Exfiltration and Impact.zip 203.8 MB
1. Introduction to Python for Cybersecurity.zip 185.2 MB
0. Websites you may like/1. OneHack.us Premium Cracked Accounts-Tutorials-Guides-Articles Community Based Forum.url 377 Bytes
FreeCoursesOnline.me Download Udacity, Masterclass, Lynda, PHLearn, etc Free.url 290 Bytes
Content Info.txt 284 Bytes
0. Websites you may like/2. FTUApps.com Download Cracked Developers Applications For Free.url 239 Bytes
猜你喜欢:
FreeCoursesOnline
Me
Specialization
Python
Coursera
Cybersecurity
- 【影视】 [ FreeCourseWeb.com ] ISO 27001 - 2022-Compliant Cybersecurity - The Annex A Controls
-
收录时间:2024-01-12
文档个数:97
文档大小:310.4 MB
最近下载:2025-05-16
人气:10551
磁力链接
~Get Your Files Here !/13 - 12. Threat and Vulnerability Management and Secure Configuration/02 - Secure configuration (Controls 8.9, 8.19, and 8.24).mp4 14.2 MB
~Get Your Files Here !/07 - 6. Information Security Event Management/01 - Information security incident management (Controls 5.24–5.28, and 6.8).mp4 13.3 MB
~Get Your Files Here !/05 - 4. Identity and Access Management/01 - Access management (Controls 5.15–5.18).mp4 12.9 MB
~Get Your Files Here !/04 - 3. Information Protection/02 - Deletion, masking, DLP, and test data (Controls 8.10–8.12, and 8.33).mp4 12.7 MB
~Get Your Files Here !/08 - 7. Continuity/01 - Continuity (Controls 5.29, 5.30, and 8.13).mp4 12.4 MB
~Get Your Files Here !/14 - 13. Application Security/01 - Secure development (Controls 8.25–8.28).mp4 12.4 MB
~Get Your Files Here !/10 - 9. Human Resource Security/02 - During employment (Controls 6.3–6.6).mp4 12.3 MB
~Get Your Files Here !/12 - 11. System and Network Security/01 - Network security management (Controls 8.20–8.23).mp4 12.1 MB
~Get Your Files Here !/12 - 11. System and Network Security/02 - Protection of information systems (Controls 8.7, 8.18, 8.30, and 8.34).mp4 11.8 MB
~Get Your Files Here !/14 - 13. Application Security/02 - Testing, separate environments, and change management (Controls 8.29, 8.31, and 8.32).mp4 11.7 MB
~Get Your Files Here !/05 - 4. Identity and Access Management/02 - System and application access control (Controls 8.2–8.5).mp4 11.6 MB
~Get Your Files Here !/02 - 1. Governance/03 - Contacts and project management (Controls 5.5, 5.6, and 5.8).mp4 11.0 MB
~Get Your Files Here !/03 - 2. Asset Management/01 - Responsibility for information assets (Controls 5.9, 5.10, 6.7, and 8.1).mp4 10.8 MB
~Get Your Files Here !/04 - 3. Information Protection/01 - Classification, labeling, and privacy (Controls 5.12, 5.13, and 5.34).mp4 10.8 MB
~Get Your Files Here !/02 - 1. Governance/02 - Roles, responsibilities, and duties (Controls 5.2–5.4).mp4 10.4 MB
~Get Your Files Here !/02 - 1. Governance/01 - Policies for information security (Control 5.1).mp4 10.1 MB
~Get Your Files Here !/07 - 6. Information Security Event Management/02 - Logging and monitoring (Controls 8.15–8.17).mp4 9.9 MB
~Get Your Files Here !/06 - 5. Supplier Relationships Security/01 - Supplier relationships security (Controls 5.19–5.21).mp4 9.6 MB
~Get Your Files Here !/06 - 5. Supplier Relationships Security/02 - Managing supplier service delivery and cloud services security (Controls 5.22 and 5.23).mp4 9.6 MB
~Get Your Files Here !/13 - 12. Threat and Vulnerability Management and Secure Configuration/01 - Threat and vulnerability management (Controls 5.7 and 8.8).mp4 9.5 MB
猜你喜欢:
Annex
Cybersecurity
Controls
27001
Compliant
FreeCourseWeb
2022
ISO
com
- 【影视】 Implementing the NIST Cybersecurity Framework
-
收录时间:2024-01-10
文档个数:127
文档大小:4.3 GB
最近下载:2025-05-16
人气:874
磁力链接
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/2. Using the NIST Cybersecurity Framework/5. Finding the Controls.mp4 307.2 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/6. Five Functions.mp4 231.8 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/7. Controls and Outcomes.mp4 205.8 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/5. Framework Components.mp4 197.5 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/3. Value Proposition.mp4 181.0 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/1. Welcome.mp4 161.5 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/5. Generate Questionnaire.mp4 153.5 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/2. Using the NIST Cybersecurity Framework/1. Using the Core.mp4 149.0 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/2. Intel (Microchip Manufacturing).mp4 143.5 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/5. Implementing Phase Two of the CR-MAP/4. Business Value Analysis.mp4 139.8 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/4. DOE (Energy Industry).mp4 139.0 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/7. Conduct Interviews.mp4 136.2 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/7. Conclusion/1. BONUS - Conclusion.mp4 126.4 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/3. Cimpress (Promotional Products).mp4 123.9 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/6. Saudi Aramco (Oil Industry).mp4 118.9 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/4. Intended Audience.mp4 112.2 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/5. Western Australia (Local Government).mp4 112.1 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/6. Choose Target Scores.mp4 100.5 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/6. Implementing Phase Three of the CR-MAP/3. Quarterly Reviews.mp4 99.8 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/1. Phase One.mp4 93.8 MB
猜你喜欢:
Cybersecurity
Implementing
NIST
Framework