磁力管家

磁力管家
为您索检到268条磁力链接,耗时0毫秒。 rss

分享给好友

【压缩文件】 [CourseClub.Me] Coursera - Python for Cybersecurity Specialization
收录时间:2024-01-10 文档个数:9 文档大小:1.1 GB 最近下载:2025-05-14 人气:1314 磁力链接
  • zip5. Python for Active Defense.zip 268.9 MB
  • zip2. Execution, Persistence, Privilege escalation and Evasion.zip 251.2 MB
  • zip3. Credential Access, Discovery, Lateral Movement & Collection.zip 225.7 MB
  • zip4. Python for Command-and-Control, Exfiltration and Impact.zip 203.8 MB
  • zip1. Introduction to Python for Cybersecurity.zip 185.2 MB
  • url0. Websites you may like/[CourseClub.Me].url 122 Bytes
  • url[CourseClub.Me].url 122 Bytes
  • url0. Websites you may like/[GigaCourse.Com].url 49 Bytes
  • url[GigaCourse.Com].url 49 Bytes
【影视】 Aerospace Cybersecurity - Satellite Hacking (W53)
收录时间:2024-01-09 文档个数:28 文档大小:2.9 GB 最近下载:2025-04-09 人气:105 磁力链接
  • mp4Module 1 - Satellite Reconnaissance/7. (W53M01) Python Programs for Satellite Reconnaissance.mp4 303.7 MB
  • mp4Module 1 - Satellite Reconnaissance/6. (W53M01) OSINT Tools for Satellite Data Extraction.mp4 253.1 MB
  • mp4Module 1 - Satellite Reconnaissance/4. (W53M01) Satellite Subsystems and Attack Surfaces.mp4 206.3 MB
  • mp4Module 3 - Reverse Engineering and Decoding Communication/4. (W53M03) Decoding Satellite Communications Using SatNogs and Reverse Engineering.mp4 176.2 MB
  • mp4Module 4 - Vulnerabilities and Attacks/4. (W53M04) Dive Further Into Attacks and More CTF Practice.mp4 174.4 MB
  • mp4Module 3 - Reverse Engineering and Decoding Communication/1. (W53M03) Overview of Satellite Communications.mp4 168.9 MB
  • mp4Module 1 - Satellite Reconnaissance/2. (W53M01) Satellites and Ground Stations.mp4 168.2 MB
  • mp4Module 2 - Communication Analysis and Eavesdropping/3. (W53M02) Command & Data Handling & Payloads.mp4 162.6 MB
  • mp4Module 1 - Satellite Reconnaissance/5. (W53M01) Spherical Grid System.mp4 161.0 MB
  • mp4Module 3 - Reverse Engineering and Decoding Communication/3. (W53M03) Decoding Communications Using Wireshark and GNU Radio.mp4 148.0 MB
  • mp4Module 4 - Vulnerabilities and Attacks/1. (W53M04) Common Attacks and Interactive Labs.mp4 137.0 MB
  • mp4Module 2 - Communication Analysis and Eavesdropping/1. (W53M02) Communication Foundations.mp4 135.6 MB
  • mp4Module 3 - Reverse Engineering and Decoding Communication/2. (W53M03) Analyzing Satellite Communication Using gpredict, SatDump, & WXtolMG.mp4 135.3 MB
  • mp4Module 4 - Vulnerabilities and Attacks/3. (W53M04) Detecting Attacks and Mitigation Strategies.mp4 128.6 MB
  • mp4Module 2 - Communication Analysis and Eavesdropping/2. (W53M02) Link Design & Protocols.mp4 113.8 MB
  • mp4Module 2 - Communication Analysis and Eavesdropping/4. (W53M02) Satellite Networks & Vulnerabilities.mp4 89.2 MB
  • mp4Module 4 - Vulnerabilities and Attacks/2. (W53M04) Future of Satellite Security and Next Steps.mp4 85.1 MB
  • mp4Module 1 - Satellite Reconnaissance/1. (W53M01) Introduction.mp4 79.1 MB
  • mp4Module 1 - Satellite Reconnaissance/3. (W53M01) Information Extraction Methods.mp4 78.3 MB
  • vttModule 1 - Satellite Reconnaissance/4. (W53M01) Satellite Subsystems and Attack Surfaces.vtt 45.2 kB
【影视】 ZeroToMastery - Complete Cybersecurity Bootcamp
收录时间:2024-01-09 文档个数:97 文档大小:3.6 GB 最近下载:2025-05-15 人气:2777 磁力链接
  • mp48-Network Security/052-Network Security With Nmap.mp4 169.9 MB
  • mp45-Security Bugs & Vulnerabilities/020-Buffer Overflow Demonstration.mp4 136.7 MB
  • mp412-Appendix - Ethical Hacking/087-Msfconsole Basic Commands.mp4 97.5 MB
  • mp48-Network Security/059-Wireless Attack Demonstration.mp4 93.4 MB
  • mp47-End-Point Protection/034-Password Security and Password Managers.mp4 84.2 MB
  • mp412-Appendix - Ethical Hacking/093-Meterpreter Basic Commands Part 1.mp4 78.5 MB
  • mp47-End-Point Protection/038-Process Explorer.mp4 75.8 MB
  • mp41-Introduction/001-Cybersecurity Bootcamp - Zero to Mastery.mp4 72.4 MB
  • mp48-Network Security/057-Secure Network Architecture.mp4 66.8 MB
  • mp412-Appendix - Ethical Hacking/094-Meterpreter Basic Commands Part 2.mp4 65.7 MB
  • mp47-End-Point Protection/033-Bitdefender, Kaspersky, McAfee, Malwarebytes.mp4 63.9 MB
  • mp44-Understanding Hackers - The Biggest Threat/012-Most Common Attacks Demonstration.mp4 63.5 MB
  • mp48-Network Security/060-Network Monitoring With TCPDump.mp4 62.7 MB
  • mp48-Network Security/058-Wireless Security.mp4 59.6 MB
  • mp45-Security Bugs & Vulnerabilities/017-Unpatched Machine Exploitation Demonstration.mp4 59.1 MB
  • mp412-Appendix - Ethical Hacking/080-Whatweb Stealthy Scan.mp4 58.1 MB
  • mp412-Appendix - Ethical Hacking/091-Advance Msfvenom Usage.mp4 51.4 MB
  • mp47-End-Point Protection/043-Iptables.mp4 50.9 MB
  • mp47-End-Point Protection/028-Brave Browser Security and Privacy.mp4 50.6 MB
  • mp412-Appendix - Ethical Hacking/089-Software Vulnerability - Samba Exploitation.mp4 49.5 MB
【影视】 [ DevCourseWeb.com ] Udemy - Intro To Cybersecurity In Healthcare (1 Of 2),Plain and Simple
收录时间:2024-01-09 文档个数:19 文档大小:1.2 GB 最近下载:2025-05-14 人气:1334 磁力链接
  • mp4~Get Your Files Here !/5 - Something You Own FOB MFA.mp4 258.8 MB
  • mp4~Get Your Files Here !/6 - Something You Are Biometrics.mp4 227.0 MB
  • mp4~Get Your Files Here !/7 - Authenticating Access FIDO.mp4 184.5 MB
  • mp4~Get Your Files Here !/2 - Overview of Cyber Security.mp4 182.9 MB
  • mp4~Get Your Files Here !/8 - Phishing & Spam.mp4 145.1 MB
  • mp4~Get Your Files Here !/4 - Something You Know Passwords.mp4 70.9 MB
  • mp4~Get Your Files Here !/3 - Authenticating Mechanisms.mp4 61.8 MB
  • mp4~Get Your Files Here !/1 - Introduction.mp4 49.6 MB
  • vtt~Get Your Files Here !/5 - Something You Own FOB MFA English.vtt 22.0 kB
  • vtt~Get Your Files Here !/6 - Something You Are Biometrics English.vtt 18.2 kB
  • vtt~Get Your Files Here !/7 - Authenticating Access FIDO English.vtt 17.5 kB
  • vtt~Get Your Files Here !/2 - Overview of Cyber Security English.vtt 13.9 kB
  • vtt~Get Your Files Here !/8 - Phishing & Spam English.vtt 12.3 kB
  • vtt~Get Your Files Here !/4 - Something You Know Passwords English.vtt 6.0 kB
  • vtt~Get Your Files Here !/3 - Authenticating Mechanisms English.vtt 6.0 kB
  • vtt~Get Your Files Here !/1 - Introduction English.vtt 4.5 kB
  • txt~Get Your Files Here !/Bonus Resources.txt 386 Bytes
  • html~Get Your Files Here !/9 - BONUS SECTION.html 243 Bytes
  • urlGet Bonus Downloads Here.url 182 Bytes
【影视】 The Complete Certified in Cybersecurity course (CC) - 2022
收录时间:2024-01-07 文档个数:293 文档大小:6.7 GB 最近下载:2025-05-16 人气:902 磁力链接
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/7. The study process, material, tips, tricks and practice tests!/1. How to approach practice questions.mp4 124.3 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/6. Domain 5 Security Operations/16. Administrative (Directive) Controls.mp4 122.3 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/5. Domain 4 Network Security/5. The OSI Model - Part 1.mp4 108.0 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/7. The study process, material, tips, tricks and practice tests!/4. How to design your career and certification path..mp4 97.4 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/4. Domain 3 Access Controls Concepts/12. Logical Access Control - Part 5.mp4 89.7 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/5. Domain 4 Network Security/44. Virtualization, Cloud, and Distributed Computing - Part 5.mp4 87.1 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/5. Domain 4 Network Security/24. VPNs, NAC, and third-party connectivity.mp4 86.7 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/5. Domain 4 Network Security/43. Virtualization, Cloud, and Distributed Computing - Part 4.mp4 81.3 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/5. Domain 4 Network Security/10. IP addresses, port numbers, and MAC addresses - Part 1.mp4 80.0 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/6. Domain 5 Security Operations/19. Social Engineering attacks - Part 2.mp4 79.6 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/3. Domain 2 Business Continuity, Disaster Recovery, and Incident Response/6. DRP - Disaster Recovery Planning - Part 1.mp4 79.4 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/5. Domain 4 Network Security/2. Network Basics and Definitions - Part 1.mp4 79.0 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/3. Domain 2 Business Continuity, Disaster Recovery, and Incident Response/9. DRP - Disaster Recovery Planning - Part 4.mp4 78.9 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/4. Domain 3 Access Controls Concepts/10. Logical Access Control - Part 3.mp4 78.1 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/2. CC Domain 1 Security Principles/28. Laws and regulations - part 1.mp4 77.6 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/6. Domain 5 Security Operations/13. Data handling, data storage and data retention - Part 2.mp4 77.4 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/4. Domain 3 Access Controls Concepts/2. Physical Security - part 1.mp4 75.4 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/2. CC Domain 1 Security Principles/30. Security governance principles.mp4 75.0 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/5. Domain 4 Network Security/48. Electricity.mp4 74.7 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/5. Domain 4 Network Security/28. Attacks and attackers - Part 2.mp4 73.6 MB
【影视】 [ CourseWikia.com ] CompTIA Cybersecurity Analyst + (CySA + ) (CS0-003) - 2 Vulnerability Management
收录时间:2024-01-06 文档个数:172 文档大小:614.3 MB 最近下载:2025-05-15 人气:4833 磁力链接
  • mp4~Get Your Files Here !/09 - 8. More Cybersecurity Tools/05 - Control frameworks.mp4 21.9 MB
  • mp4~Get Your Files Here !/10 - 9. Software Development Lifecycle/02 - Development methodologies.mp4 18.1 MB
  • mp4~Get Your Files Here !/12 - 11. Software Quality Assurance/03 - Fuzzing.mp4 16.9 MB
  • mp4~Get Your Files Here !/07 - 6. Software Security Issues/16 - Interception proxies.mp4 13.7 MB
  • mp4~Get Your Files Here !/06 - 5. Common Vulnerabilities/01 - Server vulnerabilities.mp4 13.0 MB
  • mp4~Get Your Files Here !/09 - 8. More Cybersecurity Tools/02 - Cloud auditing tools.mp4 13.0 MB
  • mp4~Get Your Files Here !/15 - 14. Risk Management/05 - Risk visibility and reporting.mp4 12.7 MB
  • mp4~Get Your Files Here !/09 - 8. More Cybersecurity Tools/01 - Exploitation frameworks.mp4 12.3 MB
  • mp4~Get Your Files Here !/08 - 7. Specialized Technology Vulnerabilities/01 - Industrial control systems.mp4 11.5 MB
  • mp4~Get Your Files Here !/04 - 3. Configuring and Executing Vulnerability Scans/02 - Scan configuration.mp4 11.4 MB
  • mp4~Get Your Files Here !/03 - 2. Network Mapping/02 - Install Nmap on Windows.mp4 11.0 MB
  • mp4~Get Your Files Here !/07 - 6. Software Security Issues/01 - OWASP Top 10.mp4 10.9 MB
  • mp4~Get Your Files Here !/15 - 14. Risk Management/02 - Quantitative risk assessment.mp4 10.7 MB
  • mp4~Get Your Files Here !/08 - 7. Specialized Technology Vulnerabilities/03 - Embedded systems.mp4 10.6 MB
  • mp4~Get Your Files Here !/02 - 1. Creating a Vulnerability Management Program/03 - Scan frequency.mp4 10.5 MB
  • mp4~Get Your Files Here !/02 - 1. Creating a Vulnerability Management Program/02 - Identify scan targets.mp4 10.2 MB
  • mp4~Get Your Files Here !/07 - 6. Software Security Issues/08 - Overflow attacks.mp4 9.9 MB
  • mp4~Get Your Files Here !/07 - 6. Software Security Issues/10 - Session hijacking.mp4 9.6 MB
  • mp4~Get Your Files Here !/15 - 14. Risk Management/03 - Risk treatment options.mp4 9.5 MB
  • mp4~Get Your Files Here !/07 - 6. Software Security Issues/04 - Request forgery.mp4 9.4 MB
【其他】 Rick Howard - Cybersecurity First Principles- A Reboot of Strategy and Tactics
收录时间:2024-01-06 文档个数:3 文档大小:286.0 MB 最近下载:2025-05-16 人气:9883 磁力链接
  • m4bCybersecurity First Principles.m4b 277.0 MB
  • pdfRick Howard - Cybersecurity First Principles- A Reboot of Strategy and Tactics.pdf 9.0 MB
  • jpgCybersecurity First Principles.jpg 24.9 kB
【压缩文件】 EC-Council - Cybersecurity attack and Defense
收录时间:2024-01-05 文档个数:1 文档大小:10.5 GB 最近下载:2025-05-15 人气:1293 磁力链接
  • zipEC-Council - Cybersecurity Attack and Defense Fundamentals Specialization.zip 10.5 GB
【影视】 [ DevCourseWeb.com ] Udemy - Selection and Implementation of Cybersecurity Risks Controls
收录时间:2024-01-05 文档个数:36 文档大小:2.0 GB 最近下载:2025-05-15 人气:2662 磁力链接
  • mp4~Get Your Files Here !/2. SECTION-2/8. 19- The role of governance in the effective selection and implementation of cybe.mp4 142.9 MB
  • mp4~Get Your Files Here !/2. SECTION-2/14. 23-Selecting and implementing cybersecurity controls based on NIST CSF PT2.mp4 122.4 MB
  • mp4~Get Your Files Here !/2. SECTION-2/16. 25- Measuring the effectiveness of implemented controls.mp4 117.4 MB
  • mp4~Get Your Files Here !/2. SECTION-2/17. Putting it all together-The Selection and Implementation of Cyber Risks controls.mp4 115.7 MB
  • mp4~Get Your Files Here !/1. Introduction/10. 9-Key considerations for the identification- selection & implementation of contr.mp4 101.8 MB
  • mp4~Get Your Files Here !/1. Introduction/7. 6-Approach to Control Selection_ pt2.mp4 94.1 MB
  • mp4~Get Your Files Here !/2. SECTION-2/9. 20-Why not implement frameworks that already have recommended controls.mp4 90.3 MB
  • mp4~Get Your Files Here !/2. SECTION-2/15. 24-Implementation Plan for selected controls.mp4 87.1 MB
  • mp4~Get Your Files Here !/2. SECTION-2/11. 21-Challenges, & considerations associated with implementing frameworks-pt2.mp4 82.9 MB
  • mp4~Get Your Files Here !/1. Introduction/11. 10-Risk Assessment-BIA, Control Selection, Cost Benefit Analysis.mp4 81.1 MB
  • mp4~Get Your Files Here !/1. Introduction/9. 8-Introduction to security controls.mp4 77.4 MB
  • mp4~Get Your Files Here !/2. SECTION-2/7. 18-Documenting Cybersecurity Risk Assessment Report-Pt2.mp4 75.5 MB
  • mp4~Get Your Files Here !/2. SECTION-2/5. 17-Determine likelihood, Impact, Calculate risk.mp4 72.4 MB
  • mp4~Get Your Files Here !/2. SECTION-2/13. 23-Selecting and implementing cybersecurity controls based on NIST CSF PT1.mp4 62.9 MB
  • mp4~Get Your Files Here !/1. Introduction/12. 11-Cost Benefit Analysis associated with controls selection.mp4 58.3 MB
  • mp4~Get Your Files Here !/2. SECTION-2/3. 15-Steps involved in assessing the identified cyber risks in web server.mp4 55.0 MB
  • mp4~Get Your Files Here !/2. SECTION-2/1. 14-High-level process of selecting controls to protect ecommerce web server-Pt1.mp4 54.5 MB
  • mp4~Get Your Files Here !/1. Introduction/14. 13-Regulatory Compliance, Incident Response Planning.mp4 53.9 MB
  • mp4~Get Your Files Here !/1. Introduction/13. 12- Technology integration, operational impact, continuous monitoring, employee.mp4 52.8 MB
  • mp4~Get Your Files Here !/2. SECTION-2/6. 18- Documenting Cybersecurity Risk Assessment Report-Pt1.mp4 50.4 MB
【影视】 [CourseClub.Me] ITProTV - NIST Cybersecurity And Risk Management Frameworks
收录时间:2024-01-03 文档个数:61 文档大小:11.3 GB 最近下载:2025-05-16 人气:3755 磁力链接
  • mp42. NIST Cybersecurity and Publications.mp4 298.0 MB
  • mp426. Response Training and Testing.mp4 288.9 MB
  • mp424. Incident Response Plan Examples.mp4 279.3 MB
  • mp443. Documentation and Approval.mp4 277.5 MB
  • mp420. System Auditing and Logging.mp4 258.9 MB
  • mp423. Response Planning.mp4 255.7 MB
  • mp429. Backup and Recovery.mp4 251.4 MB
  • mp49. Inventory of Critical Assets.mp4 247.4 MB
  • mp446. Documenting Controls.mp4 246.5 MB
  • mp421. Monitoring and Alerting.mp4 238.7 MB
  • mp422. Assessments.mp4 238.7 MB
  • mp442. Control Allocation and Monitoring.mp4 234.0 MB
  • mp410. Business Impact Assessment.mp4 231.6 MB
  • mp440. NIST Control Documents.mp4 230.2 MB
  • mp436. Establishing Scope.mp4 227.5 MB
  • mp444. Security Control Implementation.mp4 225.8 MB
  • mp43. NIST Relationships.mp4 222.6 MB
  • mp46. The Vocabulary of Risk.mp4 222.0 MB
  • mp425. Digital Forensics.mp4 219.4 MB
  • mp451. Assessment Documentation.mp4 219.2 MB
【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity Exam Fundamentals
收录时间:2024-01-01 文档个数:70 文档大小:2.5 GB 最近下载:2025-05-07 人气:1486 磁力链接
  • mp4~Get Your Files Here !/05 - Nmap/001 Video and Lab - Introduction to NMap.mp4 220.2 MB
  • mp4~Get Your Files Here !/05 - Nmap/006 Video and lab - NMap Scripting Engine (NSE).mp4 209.4 MB
  • mp4~Get Your Files Here !/08 - Privilege Escalation/003 Video and Lab - Windows Privilege Escalation Unquoted Service Path.mp4 134.3 MB
  • mp4~Get Your Files Here !/07 - Reverse Shells and Persistant Connections/002 Video and Lab - Service Persistence.mp4 121.9 MB
  • mp4~Get Your Files Here !/08 - Privilege Escalation/002 Video and Lab - Verify Windows Privilege Escalation Unquoted Service Path.mp4 117.8 MB
  • mp4~Get Your Files Here !/07 - Reverse Shells and Persistant Connections/001 Video and Lab - Establish a Meterpreter Session with Windows 10 Pro.mp4 111.6 MB
  • mp4~Get Your Files Here !/09 - OWASP top 10 Mitigations/003 Video and Lab - Identify Active Network Hosts and Services Using Nmap.mp4 99.0 MB
  • mp4~Get Your Files Here !/02 - Virtual Lab Build/001 Video and Lab - Create a Virtual Install of Kali Linux.mp4 97.9 MB
  • mp4~Get Your Files Here !/02 - Virtual Lab Build/002 Video and Lab - Creating a Virtual Install of Metasploitable2 Using VirtualBox.mp4 87.9 MB
  • mp4~Get Your Files Here !/06 - 2.0 Information Gathering and Vulnerability Identification Labs/002 Video and Lab - Enumerating Windows 10 Using WinPEAS.mp4 75.0 MB
  • mp4~Get Your Files Here !/03 - Documentation/005 Video and PPT - Pentesting Final Report.mp4 65.4 MB
  • mp4~Get Your Files Here !/10 - Web Applications Penetration Testing/001 Video and Lab - Configuring BurpSuite as a Proxy.pdf.mp4 65.1 MB
  • mp4~Get Your Files Here !/09 - OWASP top 10 Mitigations/001 Video and PPT - Overview of OWASP Top 10.mp4 62.5 MB
  • mp4~Get Your Files Here !/05 - Nmap/007 Video - Analyzing NMap Results.mp4 61.0 MB
  • mp4~Get Your Files Here !/05 - Nmap/003 Video - Nmap OS Detection.mp4 59.8 MB
  • mp4~Get Your Files Here !/09 - OWASP top 10 Mitigations/004 Video and Lab - Perform a Vulnerability Scan Using OWASP Zed Attack Proxy.mp4 56.5 MB
  • mp4~Get Your Files Here !/09 - OWASP top 10 Mitigations/002 Video and Lab - Spoof Fake TCPIP Packets Using Hping3.mp4 56.2 MB
  • mp4~Get Your Files Here !/11 - Program Scripting/001 Video and Lab - Create a Windows Reverse Shell Using the PowerShell.mp4 55.9 MB
  • mp4~Get Your Files Here !/07 - Reverse Shells and Persistant Connections/003 Video and Lab - Create a Windows Reverse Shell Using PowerShell.mp4 55.9 MB
  • mp4~Get Your Files Here !/06 - 2.0 Information Gathering and Vulnerability Identification Labs/001 Video and lab - Using Banner Grabbing to Aid in Reconnaissance.mp4 55.8 MB
【影视】 [ FreeCourseWeb.com ] Cisco Certified Support Technician (CCST) - Cybersecurity
收录时间:2023-12-30 文档个数:40 文档大小:1.6 GB 最近下载:2025-05-16 人气:4474 磁力链接
  • mp4~Get Your Files Here !/4. Endpoint Security Concepts/3. NTFS and share permissions.mp4 152.4 MB
  • mp4~Get Your Files Here !/4. Endpoint Security Concepts/7. Patches and updates.mp4 84.6 MB
  • mp4~Get Your Files Here !/2. Essential Security Principles/5. Secure passwords.mp4 74.3 MB
  • mp4~Get Your Files Here !/4. Endpoint Security Concepts/4. Netstat, nslookup, tcpdump.mp4 70.3 MB
  • mp4~Get Your Files Here !/4. Endpoint Security Concepts/5. Verify that endpoint systems meet security policies and standards.mp4 66.6 MB
  • mp4~Get Your Files Here !/3. Basic network security concepts/11. VPN - lab.mp4 61.4 MB
  • mp4~Get Your Files Here !/4. Endpoint Security Concepts/1. Windows Firewall.mp4 60.7 MB
  • mp4~Get Your Files Here !/3. Basic network security concepts/8. IPS and IDS.mp4 57.8 MB
  • mp4~Get Your Files Here !/3. Basic network security concepts/6. IP addresses and NAT.mp4 53.6 MB
  • mp4~Get Your Files Here !/2. Essential Security Principles/1. Basic terms.mp4 50.7 MB
  • mp4~Get Your Files Here !/2. Essential Security Principles/3. RADIUS.mp4 50.4 MB
  • mp4~Get Your Files Here !/5. Incident Handling/3. Malware.mp4 45.2 MB
  • mp4~Get Your Files Here !/3. Basic network security concepts/2. MAC and ARP.mp4 45.0 MB
  • mp4~Get Your Files Here !/3. Basic network security concepts/1. Describe TCPIP protocol vulnerabilities.mp4 44.0 MB
  • mp4~Get Your Files Here !/2. Essential Security Principles/8. Hashing.mp4 43.3 MB
  • mp4~Get Your Files Here !/5. Incident Handling/2. Encryption.mp4 43.2 MB
  • mp4~Get Your Files Here !/2. Essential Security Principles/7. Encryption.mp4 43.2 MB
  • mp4~Get Your Files Here !/2. Essential Security Principles/9. Certificates.mp4 42.7 MB
  • mp4~Get Your Files Here !/2. Essential Security Principles/2. Authentication, authorization, and accounting (AAA).mp4 39.6 MB
  • mp4~Get Your Files Here !/5. Incident Handling/5. Confidentiality integrity availability.mp4 39.5 MB
【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity and Kali Linux - Hands-on course by TechLatest
收录时间:2023-12-29 文档个数:43 文档大小:2.6 GB 最近下载:2025-05-16 人气:6597 磁力链接
  • mp4~Get Your Files Here !/7. Module 7 - Wireless Fortification Pentesting Mastery/2. Web App Pentesting Practical.mp4 636.4 MB
  • mp4~Get Your Files Here !/10. Module 10 - Communicating Findings Reporting Mastery/2. Reporting Practical + Conclusion.mp4 283.4 MB
  • mp4~Get Your Files Here !/6. Module 6 - Crack the Code Password Mastery/2. Password Cracking Practical.mp4 265.1 MB
  • mp4~Get Your Files Here !/5. Module 5 - Hacking Mastery Strategic Exploitation/2. Exploitation Practical.mp4 222.1 MB
  • mp4~Get Your Files Here !/9. Module 9 - Human Manipulation Social Engineering/2. Social Engineering Practical.mp4 198.1 MB
  • mp4~Get Your Files Here !/8. Module 8 - Wireless Fortification Pentesting Mastery/2. Wireless Pentesting Practical.mp4 194.1 MB
  • mp4~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/3. Social Media Reconnaissance.mp4 142.0 MB
  • mp4~Get Your Files Here !/4. Module 4 - Infiltration Techniques Mastering Active Reconnaissance/2. Vulnerability Assessment.mp4 121.4 MB
  • mp4~Get Your Files Here !/5. Module 5 - Hacking Mastery Strategic Exploitation/1. Exploitation Introduction.mp4 84.3 MB
  • mp4~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/3. Microsoft Azure Guide..mp4 54.4 MB
  • mp4~Get Your Files Here !/6. Module 6 - Crack the Code Password Mastery/1. Password Cracking Introduction.mp4 48.2 MB
  • mp4~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/2. Google Cloud Platform(GCP) Guide..mp4 47.9 MB
  • mp4~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/1. Amazon Web Services(AWS) Guide..mp4 46.0 MB
  • mp4~Get Your Files Here !/4. Module 4 - Infiltration Techniques Mastering Active Reconnaissance/3. Scanning.mp4 44.9 MB
  • mp4~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/4. Unveiling the Secrets of OS Fingerprinting in Cybersecurity with Kali Linux.mp4 44.7 MB
  • mp4~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/5. Target Validation in Cybersecurity with Kali Linux.mp4 39.9 MB
  • mp4~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/1. Reconnaissance — First Phase of Hacking.mp4 30.0 MB
  • mp4~Get Your Files Here !/1. Module 1 - Course Introduction & Teaser/2. Course Introduction.mp4 28.4 MB
  • mp4~Get Your Files Here !/8. Module 8 - Wireless Fortification Pentesting Mastery/1. Wireless Pentesting Introduction.mp4 24.5 MB
  • mp4~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/6. Subdomain Discovery in Cybersecurity with Kali Linux.mp4 24.5 MB
【压缩文件】 Humble Bundle - Cybersecurity (2023) by Packt
收录时间:2023-12-29 文档个数:31 文档大小:673.5 MB 最近下载:2025-05-16 人气:4320 磁力链接
  • zipsupplement/practical_hardware_pentesting_supplement.zip 98.3 MB
  • pdfcybersecurity_attack_and_defense_strategies.pdf 84.2 MB
  • pdfnetwork_protocols_for_security_professionals.pdf 66.6 MB
  • pdfultimate_kali_linux_book.pdf 53.0 MB
  • pdfmastering_kali_linux_for_advanced_penetration_testing.pdf 48.7 MB
  • pdfmastering_malware_analysis.pdf 41.1 MB
  • pdfpractical_threat_intelligence_and_data-driven_threat_hunting.pdf 34.0 MB
  • pdfmastering_defensive_security.pdf 31.9 MB
  • pdfmastering_windows_security_and_hardening.pdf 28.8 MB
  • pdflearn_wireshark.pdf 24.4 MB
  • pdfpurple_team_strategies.pdf 20.6 MB
  • pdfvulnerability_researcher_s_handbook.pdf 18.2 MB
  • pdfcybersecurity_career_masterplan.pdf 17.8 MB
  • pdfprivilege_escalation_techniques.pdf 15.7 MB
  • pdfmalware_analysis_techniques.pdf 15.4 MB
  • pdfcertified_ethical_hacker_ceh_v12312-50_exam_guide.pdf 15.1 MB
  • pdfmastering_palo_alto_networks.pdf 13.6 MB
  • pdfcomptia_security_plus_sy0-601_certification_guide.pdf 9.8 MB
  • pdfpractical_hardware_pentesting.pdf 8.4 MB
  • zipsupplement/malware_analysis_techniques_supplement.zip 5.8 MB
【影视】 [ DevCourseWeb.com ] Cfe 101 - Cybersecurity For Everyone
收录时间:2023-12-29 文档个数:31 文档大小:1.5 GB 最近下载:2025-05-14 人气:2244 磁力链接
  • mp4~Get Your Files Here !/3 - Password Email Security/6 - Password Security.mp4 149.2 MB
  • mp4~Get Your Files Here !/5 - Mobile Device Remote Working Security/12 - Keeping Your Mobile Safe.mp4 132.7 MB
  • mp4~Get Your Files Here !/1 - Introduction Threats to Information Security/3 - Everyday Information Security Threats.mp4 112.7 MB
  • mp4~Get Your Files Here !/7 - Network Security/17 - Keep Your Network Safe.mp4 92.3 MB
  • mp4~Get Your Files Here !/1 - Introduction Threats to Information Security/1 - Cybersecurity for Everyone.mp4 90.0 MB
  • mp4~Get Your Files Here !/9 - Incident Response/19 - Incident Response.mp4 86.4 MB
  • mp4~Get Your Files Here !/5 - Mobile Device Remote Working Security/13 - Keeping Your Work Safe While Working Remotely.mp4 78.6 MB
  • mp4~Get Your Files Here !/6 - Physical Security/16 - When Safety Fails in the Real World.mp4 77.3 MB
  • mp4~Get Your Files Here !/3 - Password Email Security/7 - Securing Your Email Communications.mp4 74.6 MB
  • mp4~Get Your Files Here !/2 - Malware Security Policies/4 - Understanding Malware.mp4 70.1 MB
  • mp4~Get Your Files Here !/8 - Generative AI/18 - Generative AI.mp4 70.1 MB
  • mp4~Get Your Files Here !/4 - Social Engineering Phishing/11 - Spotting Dodging Phishing Scams.mp4 64.9 MB
  • mp4~Get Your Files Here !/2 - Malware Security Policies/5 - Why Security Policies Procedures Matter.mp4 62.2 MB
  • mp4~Get Your Files Here !/6 - Physical Security/15 - Staying Safe in the Real World.mp4 59.6 MB
  • mp4~Get Your Files Here !/4 - Social Engineering Phishing/10 - Understanding Combatting Phishing Attacks.mp4 55.8 MB
  • mp4~Get Your Files Here !/4 - Social Engineering Phishing/8 - Guarding Against Social Engineering.mp4 53.9 MB
  • mp4~Get Your Files Here !/4 - Social Engineering Phishing/9 - Staying Ahead of Social Engineering Scams.mp4 40.6 MB
  • mp4~Get Your Files Here !/10 - Conclusion/20 - Course Recap Next Steps.mp4 30.6 MB
  • mp4~Get Your Files Here !/5 - Mobile Device Remote Working Security/14 - Attacks on Remote Workers.mp4 29.5 MB
  • mp4~Get Your Files Here !/1 - Introduction Threats to Information Security/2 - Making the Most of This Course.mp4 21.3 MB
【影视】 [FreeCoursesOnline.Me] O`REILLY - The Complete Cybersecurity Bootcamp, 2nd Edition
收录时间:2023-12-27 文档个数:340 文档大小:6.7 GB 最近下载:2025-05-15 人气:10000 磁力链接
  • mp4Lesson 29 Hacking Mobile Platforms/003. 29.2 Hacking iOS.mp4 86.6 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/014. 17.13 Performing SMTP and DNS Enumeration.mp4 80.0 MB
  • mp4Lesson 21 Fundamentals of Wireless Hacking/004. 21.3 Exploring Wireless Threats.mp4 79.0 MB
  • mp4Lesson 33 Fundamentals of IoT Security/003. 33.2 Understanding IoT Attacks.mp4 76.8 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/015. 17.14 Conducting Additional Enumeration Techniques.mp4 75.8 MB
  • mp4Lesson 33 Fundamentals of IoT Security/002. 33.1 Introducing IoT Concepts.mp4 74.4 MB
  • mp4Lesson 29 Hacking Mobile Platforms/002. 29.1 Understanding Mobile Platform Attack Vectors.mp4 73.4 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/011. 17.1 Performing SNMP Enumeration.mp4 71.8 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/004. 17.3 Understanding Host Discovery.mp4 69.7 MB
  • mp4Lesson 5 Fundamentals of Incident Response/007. 5.6 Analyzing Computer Incident Response Teams (CSIRTs).mp4 68.5 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/007. 17.6 Scanning Beyond IDS and Firewall.mp4 68.2 MB
  • mp4Lesson 27 Hacking User Credentials/006. 27.5 Cracking Passwords with John the Ripper.mp4 66.1 MB
  • mp4Lesson 7 Intrusion Event Categories/009. 7.8 Understanding the MITRE ATT&CK Framework.mp4 65.8 MB
  • mp4Lesson 29 Hacking Mobile Platforms/004. 29.3 Hacking Android OS.mp4 63.8 MB
  • mp4Lesson 20 SQL Injection/005. 20.4 Exploring SQL Injection Tools.mp4 63.3 MB
  • mp4Lesson 21 Fundamentals of Wireless Hacking/003. 21.2 Understanding Wireless Encryption.mp4 62.7 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/013. 17.12 Performing NTP and NFS Enumeration.mp4 61.8 MB
  • mp4Lesson 16 Information Gathering and Passive Reconnaissance/011. 16.10 Performing Footprinting through Social Engineering.mp4 59.1 MB
  • mp4Lesson 8 Digital Forensics Fundamentals/004. 8.3 Understanding Evidence Collection.mp4 57.2 MB
  • mp4Lesson 21 Fundamentals of Wireless Hacking/007. 21.6 Hacking Bluetooth.mp4 52.3 MB
【影视】 [ DevCourseWeb.com ] Udemy - The Cybersecurity Consultant Mindset
收录时间:2023-12-26 文档个数:32 文档大小:3.1 GB 最近下载:2025-05-14 人气:3009 磁力链接
  • mp4~Get Your Files Here !/3. Risk Management and Assessment/2. Introduction to Risk Management.mp4 222.8 MB
  • mp4~Get Your Files Here !/2. Introduction to Cybersecurity Consulting/3. Understanding the Role of a Cyber Consultant.mp4 212.8 MB
  • mp4~Get Your Files Here !/7. Developing Soft Skills for Your Career/2. Communication and Interpersonal Skills.mp4 211.5 MB
  • mp4~Get Your Files Here !/3. Risk Management and Assessment/3. Compliance Requirements.mp4 204.7 MB
  • mp4~Get Your Files Here !/2. Introduction to Cybersecurity Consulting/2. Overview of Cybersecurity.mp4 198.8 MB
  • mp4~Get Your Files Here !/2. Introduction to Cybersecurity Consulting/5. Preparing for a Career in Cyber Consulting.mp4 196.6 MB
  • mp4~Get Your Files Here !/3. Risk Management and Assessment/5. Security Documentation Development.mp4 178.0 MB
  • mp4~Get Your Files Here !/4. Tools and Technologies/3. Vulnerability Assessment and Pentesting.mp4 177.6 MB
  • mp4~Get Your Files Here !/3. Risk Management and Assessment/4. Risk Assessment and Analysis.mp4 158.0 MB
  • mp4~Get Your Files Here !/4. Tools and Technologies/6. Cybersecurity Frameworks Selection.mp4 146.1 MB
  • mp4~Get Your Files Here !/5. Incident Response/3. Developing an Incident Response Plan.mp4 123.8 MB
  • mp4~Get Your Files Here !/4. Tools and Technologies/2. Network Scanning and Monitoring.mp4 115.2 MB
  • mp4~Get Your Files Here !/2. Introduction to Cybersecurity Consulting/4. Benefits of Cyber Consulting and Cons.mp4 102.7 MB
  • mp4~Get Your Files Here !/4. Tools and Technologies/5. Security Information and Event Management Systems.mp4 99.4 MB
  • mp4~Get Your Files Here !/6. Cybersecurity Auditing and Frameworks/4. Cybersecurity Frameworks - Implementation.mp4 81.3 MB
  • mp4~Get Your Files Here !/4. Tools and Technologies/4. Intrusion Detection and Prevention Systems.mp4 73.6 MB
  • mp4~Get Your Files Here !/6. Cybersecurity Auditing and Frameworks/3. Auditing Standards and Requirements.mp4 73.1 MB
  • mp4~Get Your Files Here !/6. Cybersecurity Auditing and Frameworks/2. Overview of IT Auditing.mp4 72.9 MB
  • mp4~Get Your Files Here !/7. Developing Soft Skills for Your Career/5. Practical Exercises and Resources.mp4 68.0 MB
  • mp4~Get Your Files Here !/5. Incident Response/2. Defining a Security Incident.mp4 67.7 MB
【影视】 [CourserHub.com] Coursera - Google Cybersecurity Professional Certificate
收录时间:2023-12-26 文档个数:1330 文档大小:4.1 GB 最近下载:2025-05-16 人气:11177 磁力链接
  • mp4foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/01_get-started-with-the-certificate-program/01_welcome-to-the-google-cybersecurity-certificate.mp4 49.6 MB
  • mp4assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/01_flaws-in-the-system/04_common-vulnerabilities-and-exposures.mp4 29.2 MB
  • mp4foundations-of-cybersecurity/02_the-evolution-of-cybersecurity/01_the-history-of-cybersecurity/03_attacks-in-the-digital-age.mp4 26.8 MB
  • mp4assets-threats-and-vulnerabilities/02_protect-organizational-assets/03_authentication-authorization-and-accounting/03_the-mechanisms-of-authorization.mp4 26.4 MB
  • mp4assets-threats-and-vulnerabilities/04_threats-to-asset-security/02_malware/01_malicious-software.mp4 25.7 MB
  • mp4manage-security-risks/04_use-playbooks-to-respond-to-incidents/01_phases-of-incident-response-playbooks/02_phases-of-an-incident-response-playbook.mp4 25.5 MB
  • mp4assets-threats-and-vulnerabilities/04_threats-to-asset-security/01_social-engineering/04_phishing-for-information.mp4 25.2 MB
  • mp4assets-threats-and-vulnerabilities/04_threats-to-asset-security/02_malware/03_the-rise-of-cryptojacking.mp4 24.8 MB
  • mp4foundations-of-cybersecurity/03_protect-against-threats-risks-and-vulnerabilities/01_frameworks-and-controls/02_introduction-to-security-frameworks-and-controls.mp4 24.5 MB
  • mp4foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/02_introduction-to-cybersecurity/01_introduction-to-cybersecurity.mp4 24.2 MB
  • mp4automate-cybersecurity-tasks-with-python/04_python-in-practice/03_debug-python-code/01_debugging-strategies.mp4 24.2 MB
  • mp4assets-threats-and-vulnerabilities/02_protect-organizational-assets/02_encryption-methods/01_fundamentals-of-cryptography.mp4 23.7 MB
  • mp4assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/03_cyber-attacker-mindset/01_protect-all-entry-points.mp4 23.6 MB
  • mp4foundations-of-cybersecurity/03_protect-against-threats-risks-and-vulnerabilities/02_ethics-in-cybersecurity/01_ethics-in-cybersecurity.mp4 23.6 MB
  • mp4assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/03_cyber-attacker-mindset/05_pathways-through-defenses.mp4 23.5 MB
  • mp4foundations-of-cybersecurity/02_the-evolution-of-cybersecurity/01_the-history-of-cybersecurity/02_past-cybersecurity-attacks.mp4 23.1 MB
  • mp4assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/01_flaws-in-the-system/02_vulnerability-management.mp4 23.0 MB
  • mp4networks-and-network-security/04_security-hardening/04_cloud-hardening/02_kelsey-cloud-security-explained.mp4 23.0 MB
  • mp4automate-cybersecurity-tasks-with-python/03_work-with-strings-and-lists/03_regular-expressions/01_regular-expressions-in-python.mp4 22.9 MB
  • mp4assets-threats-and-vulnerabilities/04_threats-to-asset-security/01_social-engineering/02_the-criminal-art-of-persuasion.mp4 22.7 MB
【影视】 Cybersecurity Architecture Fundamentals
收录时间:2023-12-26 文档个数:81 文档大小:2.4 GB 最近下载:2025-05-16 人气:6891 磁力链接
  • mp4Chapter 1 Introduction/006. Security Principles and Approaches.mp4 272.7 MB
  • mp4Chapter 1 Introduction/003. The Problem with Security Today.mp4 236.8 MB
  • mp4Chapter 1 Introduction/009. Understanding Residual Risk.mp4 120.0 MB
  • mp4Chapter 4 Cyber Architecture for Enterprise Security/006. Vulnerability, Patch, and Availability Management.mp4 102.8 MB
  • mp4Chapter 1 Introduction/008. Risk Management.mp4 99.6 MB
  • mp4Chapter 1 Introduction/005. Who Is a Security Architect.mp4 98.0 MB
  • mp4Chapter 2 Threat Modelling/006. PASTA.mp4 94.3 MB
  • mp4Chapter 4 Cyber Architecture for Enterprise Security/001. Network Security.mp4 80.3 MB
  • mp4Chapter 6 Case Study/001. Case Study Preview.mp4 78.0 MB
  • mp4Chapter 2 Threat Modelling/002. Threat Modelling Versus Risk Assessment.mp4 75.6 MB
  • mp4Chapter 2 Threat Modelling/001. Threat Modelling - Part 1.mp4 70.2 MB
  • mp4Chapter 2 Threat Modelling/009. Attack Trees.mp4 68.7 MB
  • mp4Chapter 4 Cyber Architecture for Enterprise Security/005. Data Protection.mp4 56.7 MB
  • mp4Chapter 5 Designing for Security/003. Reference Security Architectures.mp4 52.0 MB
  • mp4Chapter 2 Threat Modelling/003. Threat Modelling - Part 2.mp4 50.8 MB
  • mp4Chapter 3 Enterprise Architecture Frameworks/003. Zachman Framework.mp4 44.9 MB
  • mp4Chapter 5 Designing for Security/002. Security Design Pattern Example.mp4 44.6 MB
  • mp4Chapter 1 Introduction/004. Introduction to Security Architecture.mp4 42.6 MB
  • mp4Chapter 5 Designing for Security/001. Security Design Patterns.mp4 41.8 MB
  • mp4Chapter 3 Enterprise Architecture Frameworks/004. SABSA Framework.mp4 37.0 MB
【影视】 [ TutGee.com ] Linkedin - Practical Cybersecurity for IT Professionals
收录时间:2023-12-26 文档个数:81 文档大小:388.0 MB 最近下载:2025-05-08 人气:1804 磁力链接
  • mp4~Get Your Files Here !/04 - 3. Firewalls/03 - Advanced Windows Firewall.mp4 27.1 MB
  • mp4~Get Your Files Here !/05 - 4. Network Scanning/01 - Getting started with Nmap.mp4 22.0 MB
  • mp4~Get Your Files Here !/02 - 1. Why Cybersecurity/07 - Emerging trends in cybersecurity.mp4 20.4 MB
  • mp4~Get Your Files Here !/02 - 1. Why Cybersecurity/01 - A history of hackers.mp4 17.5 MB
  • mp4~Get Your Files Here !/04 - 3. Firewalls/05 - Introducing Linux iptables.mp4 16.1 MB
  • mp4~Get Your Files Here !/04 - 3. Firewalls/02 - Windows Firewall basics.mp4 14.5 MB
  • mp4~Get Your Files Here !/09 - 8. Network Protocols/02 - Capturing packets with Wireshark.mp4 14.3 MB
  • mp4~Get Your Files Here !/04 - 3. Firewalls/04 - ZedLan firewall log analyser.mp4 13.4 MB
  • mp4~Get Your Files Here !/02 - 1. Why Cybersecurity/04 - Common forms of cyberattack.mp4 13.1 MB
  • mp4~Get Your Files Here !/09 - 8. Network Protocols/03 - Making sense of the protocols.mp4 13.0 MB
  • mp4~Get Your Files Here !/02 - 1. Why Cybersecurity/02 - The cyber kill chain.mp4 12.0 MB
  • mp4~Get Your Files Here !/03 - 2. Antivirus/01 - Introducing Microsoft Defender Antivirus.mp4 11.7 MB
  • mp4~Get Your Files Here !/07 - 6. Vulnerability Scanning/01 - Preparing Nessus.mp4 10.5 MB
  • mp4~Get Your Files Here !/08 - 7. Web Applications/02 - Running an SQL injection attack.mp4 10.1 MB
  • mp4~Get Your Files Here !/05 - 4. Network Scanning/02 - Advanced Nmap options.mp4 10.0 MB
  • mp4~Get Your Files Here !/02 - 1. Why Cybersecurity/03 - Stuxnet and the kill chain.mp4 9.8 MB
  • mp4~Get Your Files Here !/03 - 2. Antivirus/02 - Detecting malware with Microsoft Defender.mp4 9.5 MB
  • mp4~Get Your Files Here !/04 - 3. Firewalls/06 - Setting up a simple iptables firewall.mp4 9.3 MB
  • mp4~Get Your Files Here !/06 - 5. Network Connections/02 - Transferring files using netcat.mp4 9.2 MB
  • mp4~Get Your Files Here !/06 - 5. Network Connections/04 - Setting up a netcat honeypot.mp4 8.9 MB
共14页 上一页 1 2 3 4 5 6 7 8 9 下一页