磁力管家

磁力管家
为您索检到268条磁力链接,耗时1毫秒。 rss

分享给好友

【影视】 [ CourseWikia.com ] Linkedin - Cybersecurity Careers and Certifications
收录时间:2023-12-18 文档个数:125 文档大小:408.1 MB 最近下载:2025-05-14 人气:1615 磁力链接
  • mp4~Get Your Files Here !/05 - 4. Cybersecurity Careers/17 - Cybersecurity careers overview.mp4.mp4 51.0 MB
  • mp4~Get Your Files Here !/06 - 5. Cybersecurity Certifications/27 - Cybersecurity certifications overview.mp4.mp4 23.7 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Cybersecurity careers and certifications.mp4.mp4 21.7 MB
  • mp4~Get Your Files Here !/02 - 1. Understanding the Cybersecurity Career Field/05 - An overview of cybersecurity key concepts.mp4.mp4 15.4 MB
  • mp4~Get Your Files Here !/02 - 1. Understanding the Cybersecurity Career Field/04 - A brief history of cybersecurity.mp4.mp4 9.8 MB
  • mp4~Get Your Files Here !/02 - 1. Understanding the Cybersecurity Career Field/06 - Enabling technologies for cybersecurity.mp4.mp4 8.8 MB
  • mp4~Get Your Files Here !/07 - 6. Your Cybersecurity Career Path/39 - How to get cybersecurity experience.mp4.mp4 8.7 MB
  • mp4~Get Your Files Here !/07 - 6. Your Cybersecurity Career Path/38 - Prerequisites.mp4.mp4 8.5 MB
  • mp4~Get Your Files Here !/05 - 4. Cybersecurity Careers/19 - Cybersecurity career: Analyst.mp4.mp4 8.5 MB
  • mp4~Get Your Files Here !/06 - 5. Cybersecurity Certifications/37 - Choose a cybersecurity certification.mp4.mp4 8.3 MB
  • mp4~Get Your Files Here !/08 - 7. Cybersecurity Career Advice/44 - Begin with the end in mind.mp4.mp4 8.2 MB
  • mp4~Get Your Files Here !/04 - 3. Cybersecurity Success Traits/14 - Analytical and technology savvy.mp4.mp4 8.1 MB
  • mp4~Get Your Files Here !/05 - 4. Cybersecurity Careers/26 - Cybersecurity career: Director.mp4.mp4 8.0 MB
  • mp4~Get Your Files Here !/07 - 6. Your Cybersecurity Career Path/40 - Getting started: Get certified.mp4.mp4 7.9 MB
  • mp4~Get Your Files Here !/05 - 4. Cybersecurity Careers/22 - Cybersecurity career: Engineer.mp4.mp4 7.8 MB
  • mp4~Get Your Files Here !/01 - Introduction/03 - Why start a career in cybersecurity?.mp4.mp4 7.8 MB
  • mp4~Get Your Files Here !/03 - 2. Cybersecurity Marketplace/13 - Retail (PCI DSS).mp4.mp4 7.7 MB
  • mp4~Get Your Files Here !/02 - 1. Understanding the Cybersecurity Career Field/08 - Cybersecurity career resources.mp4.mp4 7.5 MB
  • mp4~Get Your Files Here !/03 - 2. Cybersecurity Marketplace/11 - Healthcare (HIPAA).mp4.mp4 7.5 MB
  • mp4~Get Your Files Here !/05 - 4. Cybersecurity Careers/20 - Cybersecurity career: Auditor.mp4.mp4 7.4 MB
【影视】 Certified in Cybersecurity - CC (ISC)²
收录时间:2023-12-18 文档个数:68 文档大小:548.0 MB 最近下载:2025-05-15 人气:5909 磁力链接
  • mp4Lesson 3 Business Continuity (BC), Disaster Recovery (DR), and Incident Response Concepts/004. 3.3 Understanding Incident Response.mp4 66.3 MB
  • mp4Lesson 5 Network Security/006. 5.5 Introducing Cloud Security.mp4 51.7 MB
  • mp4Lesson 5 Network Security/004. 5.3 Understanding Network Security Infrastructure.mp4 38.5 MB
  • mp4Lesson 6 Security Operations/002. 6.1 Understanding Data Security.mp4 36.6 MB
  • mp4Lesson 2 Security Principles/003. 2.2 Understanding the Risk Management Process.mp4 31.9 MB
  • mp4Lesson 5 Network Security/003. 5.2 Understanding Network Threats and Attacks.mp4 29.4 MB
  • mp4Lesson 5 Network Security/002. 5.1 Understanding Computer Networking.mp4 28.5 MB
  • mp4Lesson 2 Security Principles/002. 2.1 Understanding the Security Concepts of Information Assurance.mp4 22.3 MB
  • mp4Lesson 4 Access Control Concepts/006. 4.5 Understanding Mandatory Access Control (MAC).mp4 20.6 MB
  • mp4Lesson 6 Security Operations/003. 6.2 Understanding Hashing.mp4 18.4 MB
  • mp4Lesson 2 Security Principles/005. 2.4 Understanding Governance Processes.mp4 17.9 MB
  • mp4Lesson 5 Network Security/005. 5.4 Introducing Network Segmentation.mp4 17.1 MB
  • mp4Lesson 3 Business Continuity (BC), Disaster Recovery (DR), and Incident Response Concepts/003. 3.2 Understanding Disaster Recovery (DR).mp4 16.4 MB
  • mp4Lesson 6 Security Operations/006. 6.5 Understanding Security Awareness Training.mp4 14.0 MB
  • mp4Lesson 4 Access Control Concepts/005. 4.4 Introducing Discretionary Access Control (DAC).mp4 12.9 MB
  • mp4Lesson 6 Security Operations/005. 6.4 Understanding Best Practice Security Policies.mp4 12.9 MB
  • mp4Lesson 3 Business Continuity (BC), Disaster Recovery (DR), and Incident Response Concepts/002. 3.1 Understanding Business Continuity (BC).mp4 12.8 MB
  • mp4Introduction/001. Certified in Cybersecurity - CC (ISC)² Introduction.mp4 11.6 MB
  • mp4Lesson 1 Exam Preparation/002. 1.1 Introducing the (ISC)² Certified in Cybersecurity Exam.mp4 11.4 MB
  • mp4Lesson 4 Access Control Concepts/002. 4.1 Understanding Physical Access Controls.mp4 10.0 MB
【影视】 [ CourseWikia.com ] Linkedin - Landing Your First Cybersecurity Job
收录时间:2023-12-18 文档个数:44 文档大小:292.1 MB 最近下载:2025-05-09 人气:1417 磁力链接
  • mp4~Get Your Files Here !/02 - 1. Cybersecurity Careers/04 - PIVOT into cyber A framework to live by.mp4 36.8 MB
  • mp4~Get Your Files Here !/05 - 4. The Power of Networking/02 - Mentoring with a purpose.mp4 35.2 MB
  • mp4~Get Your Files Here !/06 - 5. Landing the Role/03 - Negotiating your benefits.mp4 34.8 MB
  • mp4~Get Your Files Here !/03 - 2. Basic Steps to Launching Your Career/02 - Your current skill set has value.mp4 25.8 MB
  • mp4~Get Your Files Here !/04 - 3. Building Your Brand in Cyber/01 - Marketing your skills.mp4 25.8 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Your future in cybersecurity.mp4 23.0 MB
  • mp4~Get Your Files Here !/07 - Conclusion/01 - Continue to grow.mp4 16.0 MB
  • mp4~Get Your Files Here !/04 - 3. Building Your Brand in Cyber/02 - Volunteering for success.mp4 11.2 MB
  • mp4~Get Your Files Here !/05 - 4. The Power of Networking/01 - Building your network.mp4 10.8 MB
  • mp4~Get Your Files Here !/03 - 2. Basic Steps to Launching Your Career/05 - Create your cyber roadmap.mp4 10.4 MB
  • mp4~Get Your Files Here !/03 - 2. Basic Steps to Launching Your Career/03 - Which roles map to your skill sets.mp4 8.6 MB
  • mp4~Get Your Files Here !/02 - 1. Cybersecurity Careers/02 - Popular roles in cyber.mp4 8.4 MB
  • mp4~Get Your Files Here !/03 - 2. Basic Steps to Launching Your Career/01 - Why do you want to be a cyber professional.mp4 8.0 MB
  • mp4~Get Your Files Here !/06 - 5. Landing the Role/02 - Acing your interview.mp4 7.9 MB
  • mp4~Get Your Files Here !/02 - 1. Cybersecurity Careers/03 - Cyberseek demo.mp4 7.9 MB
  • mp4~Get Your Files Here !/02 - 1. Cybersecurity Careers/01 - Cyber domains explained.mp4 7.5 MB
  • mp4~Get Your Files Here !/06 - 5. Landing the Role/01 - Finding a role that fits your skills and goals.mp4 7.5 MB
  • mp4~Get Your Files Here !/03 - 2. Basic Steps to Launching Your Career/04 - What are you missing.mp4 6.4 MB
  • pdf~Get Your Files Here !/Ex_Files_Landing_Your_First_Cybersecurity_Job/Exercise Files/Personal Skills Inventory.pdf 93.0 kB
  • pdf~Get Your Files Here !/Ex_Files_Landing_Your_First_Cybersecurity_Job/Exercise Files/Roadmap Form.pdf 31.9 kB
【影视】 The Complete Cybersecurity Bootcamp, 2nd Edition
收录时间:2023-12-17 文档个数:674 文档大小:6.7 GB 最近下载:2025-05-16 人气:11266 磁力链接
  • mp4Module 5 Mobile Device Security/Lesson 29 Hacking Mobile Platforms/003. 29.2 Hacking iOS.mp4 86.6 MB
  • mp4Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/014. 17.13 Performing SMTP and DNS Enumeration.mp4 80.0 MB
  • mp4Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 21 Fundamentals of Wireless Hacking/004. 21.3 Exploring Wireless Threats.mp4 79.0 MB
  • mp4Module 6 Internet of Things (IoT) Security/Lesson 33 Fundamentals of IoT Security/003. 33.2 Understanding IoT Attacks.mp4 76.8 MB
  • mp4Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/015. 17.14 Conducting Additional Enumeration Techniques.mp4 75.8 MB
  • mp4Module 6 Internet of Things (IoT) Security/Lesson 33 Fundamentals of IoT Security/002. 33.1 Introducing IoT Concepts.mp4 74.4 MB
  • mp4Module 5 Mobile Device Security/Lesson 29 Hacking Mobile Platforms/002. 29.1 Understanding Mobile Platform Attack Vectors.mp4 73.4 MB
  • mp4Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/011. 17.1 Performing SNMP Enumeration.mp4 71.8 MB
  • mp4Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/004. 17.3 Understanding Host Discovery.mp4 69.7 MB
  • mp4Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 5 Fundamentals of Incident Response/007. 5.6 Analyzing Computer Incident Response Teams (CSIRTs).mp4 68.5 MB
  • mp4Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/007. 17.6 Scanning Beyond IDS and Firewall.mp4 68.2 MB
  • mp4Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 27 Hacking User Credentials/006. 27.5 Cracking Passwords with John the Ripper.mp4 66.1 MB
  • mp4Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 7 Intrusion Event Categories/009. 7.8 Understanding the MITRE ATT&CK Framework.mp4 65.8 MB
  • mp4Module 5 Mobile Device Security/Lesson 29 Hacking Mobile Platforms/004. 29.3 Hacking Android OS.mp4 63.8 MB
  • mp4Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 20 SQL Injection/005. 20.4 Exploring SQL Injection Tools.mp4 63.3 MB
  • mp4Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 21 Fundamentals of Wireless Hacking/003. 21.2 Understanding Wireless Encryption.mp4 62.7 MB
  • mp4Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/013. 17.12 Performing NTP and NFS Enumeration.mp4 61.8 MB
  • mp4Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 16 Information Gathering and Passive Reconnaissance/011. 16.10 Performing Footprinting through Social Engineering.mp4 59.1 MB
  • mp4Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 8 Digital Forensics Fundamentals/004. 8.3 Understanding Evidence Collection.mp4 57.2 MB
  • mp4Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 21 Fundamentals of Wireless Hacking/007. 21.6 Hacking Bluetooth.mp4 52.3 MB
【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity Management for New Managers
收录时间:2023-12-17 文档个数:46 文档大小:982.3 MB 最近下载:2025-05-16 人气:3993 磁力链接
  • mp4~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/5. Cyber Incident & Data Breach Response planning ( Video from IT Web Conference ).mp4 372.8 MB
  • mp4~Get Your Files Here !/2. Module 2 NIST Cybersecurity Framework (CSF)/4. Implementing the NIST CSF in your organisation.mp4 72.3 MB
  • mp4~Get Your Files Here !/5. Module 5 Incident Response and Recovery/1. Creating cybersecurity strategies and action plans.mp4 52.2 MB
  • mp4~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/4. Data Breaches.mp4 51.6 MB
  • mp4~Get Your Files Here !/5. Module 5 Incident Response and Recovery/3. Incident detection and analysis.mp4 48.3 MB
  • mp4~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/1. Understanding the importance of cybersecurity management.mp4 47.9 MB
  • mp4~Get Your Files Here !/4. Module 4 Scenario Planning and Strategy/2. Identifying threats and vulnerabilities.mp4 42.2 MB
  • mp4~Get Your Files Here !/5. Module 5 Incident Response and Recovery/2. Incident Response Planning.mp4 40.1 MB
  • mp4~Get Your Files Here !/3. Module 3 NICE Cybersecurity Workforce Framework/3. Knowledge, skills, and abilities (KSAs).mp4 34.2 MB
  • mp4~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/2. Roles and responsibilities of a cybersecurity manager.mp4 33.1 MB
  • mp4~Get Your Files Here !/2. Module 2 NIST Cybersecurity Framework (CSF)/3. Tiers and profiles.mp4 32.6 MB
  • mp4~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/3. NIST and NICE frameworks overview.mp4 29.3 MB
  • mp4~Get Your Files Here !/2. Module 2 NIST Cybersecurity Framework (CSF)/5. Challenges of Implementing the NIST Framework.mp4 22.4 MB
  • mp4~Get Your Files Here !/2. Module 2 NIST Cybersecurity Framework (CSF)/2. Core functions Identify, Protect, Detect, Respond, and Recover.mp4 18.8 MB
  • mp4~Get Your Files Here !/3. Module 3 NICE Cybersecurity Workforce Framework/4. Integrating the NICE Framework into workforce development and management.mp4 18.3 MB
  • mp4~Get Your Files Here !/3. Module 3 NICE Cybersecurity Workforce Framework/2. Workforce categories and specialty areas.mp4 15.7 MB
  • mp4~Get Your Files Here !/5. Module 5 Incident Response and Recovery/5. Post Incident Activities and Lessons learned.mp4 14.2 MB
  • mp4~Get Your Files Here !/8. Module 8 Course Wrap-up and Next Steps/1. Review of key concepts and frameworks.mp4 9.9 MB
  • mp4~Get Your Files Here !/6. Module 6 Cybersecurity Metrics and Reporting/1. Selecting meaningful cybersecurity metrics.mp4 9.5 MB
  • mp4~Get Your Files Here !/8. Module 8 Course Wrap-up and Next Steps/2. Developing a personal action plan for implementing cyber management practices.mp4 7.8 MB
【影视】 The Cybersecurity Threat Landscape
收录时间:2023-12-17 文档个数:61 文档大小:235.6 MB 最近下载:2025-05-16 人气:1474 磁力链接
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/10 - 9. Supply Chain Attacks and Third-Party Risks/01 - The threat of supply chain attacks and third-party risks.mp4 16.2 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/05 - 4. Botnets and DDoS attacks/02 - Protect against botnets and DDoS threats.mp4 15.8 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/08 - 7. Unmanaged IoT Devices/01 - Explore the threat of unmanaged IoT devices.mp4 14.4 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/09 - 8. Shadow IT/01 - Explore the threat of shadow IT.mp4 14.2 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/08 - 7. Unmanaged IoT Devices/02 - Protect against unmanaged IoT devices.mp4 12.4 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/09 - 8. Shadow IT/02 - Protect against shadow IT.mp4 12.4 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/06 - 5. Deepfakes/02 - Protect against deepfakes.mp4 12.1 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/03 - 2. Phishing and Smishing/02 - Protect against phishing and smishing.mp4 12.0 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/11 - Conclusion/01 - Stay up to date on cybersecurity.mp4 11.8 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/02 - 1. Malware and Ransomware/02 - Protect against malware and ransomware.mp4 11.7 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/02 - 1. Malware and Ransomware/01 - Explore the threat of malware and ransomware.mp4 11.6 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/03 - 2. Phishing and Smishing/01 - Explore the threat of phishing and smishing.mp4 11.3 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/05 - 4. Botnets and DDoS attacks/01 - Explore the threat of botnets and DDoS attacks.mp4 11.1 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/07 - 6. Insider Threats/01 - Explore the risk of insider threats.mp4 10.9 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/10 - 9. Supply Chain Attacks and Third-Party Risks/02 - Protect against supply chain attacks and third-party risks.mp4 10.5 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/04 - 3. Business Email Compromise/01 - Explore the threat of business email compromise.mp4 9.4 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/01 - Introduction/01 - Examine the cybersecurity threat landscape.mp4 9.4 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/04 - 3. Business Email Compromise/02 - Protect against business email compromise.mp4 9.2 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/06 - 5. Deepfakes/01 - Explore the threat of deepfakes.mp4 9.0 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/07 - 6. Insider Threats/02 - Protect against insider threats.mp4 7.0 MB
【其他】 Joseph Steinberg - Cybersecurity All-in-One for Dummies
收录时间:2023-12-17 文档个数:3 文档大小:760.9 MB 最近下载:2025-05-15 人气:5510 磁力链接
  • m4bCybersecurity All-in-One for Dummies.m4b 752.7 MB
  • epubCybersecurity All-In-One for Dummies by Joseph Steinberg.epub 8.1 MB
  • jpgCybersecurity All-in-One for Dummies.jpg 33.6 kB
【影视】 [ DevCourseWeb.com ] Udemy - Ccsa - Certified Cybersecurity Analyst
收录时间:2023-12-17 文档个数:18 文档大小:1.1 GB 最近下载:2025-05-15 人气:2189 磁力链接
  • mp4~Get Your Files Here !/2 - Blue Team Principles/2 - Blue Team Principles.mp4 196.8 MB
  • mp4~Get Your Files Here !/3 - Digital Forensics/3 - Digital Forensics.mp4 172.5 MB
  • mp4~Get Your Files Here !/4 - Malware Analysis/4 - Malware Analysis.mp4 154.1 MB
  • mp4~Get Your Files Here !/7 - Leveraging SIEM for Advanced Analytics/7 - Leveraging SIEM for Advanced Analytics.mp4 134.1 MB
  • mp4~Get Your Files Here !/5 - Traffic Analysis/5 - Traffic Analysis.mp4 131.1 MB
  • mp4~Get Your Files Here !/8 - Defeating the Red Team with Purple Team Tactics/8 - Defeating the Red Team with Purple Team Tactics.mp4 129.3 MB
  • mp4~Get Your Files Here !/6 - Assessing the Current State of Defense within the Organization/6 - Assessing the Current State of Defense within the Organization.mp4 123.7 MB
  • mp4~Get Your Files Here !/1 - Introduction/1 - Introduction.mp4 87.0 MB
  • srt~Get Your Files Here !/2 - Blue Team Principles/2 - Blue Team Principles English.srt 39.2 kB
  • srt~Get Your Files Here !/3 - Digital Forensics/3 - Digital Forensics English.srt 37.2 kB
  • srt~Get Your Files Here !/4 - Malware Analysis/4 - Malware Analysis English.srt 32.9 kB
  • srt~Get Your Files Here !/5 - Traffic Analysis/5 - Traffic Analysis English.srt 26.1 kB
  • srt~Get Your Files Here !/7 - Leveraging SIEM for Advanced Analytics/7 - Leveraging SIEM for Advanced Analytics English.srt 26.0 kB
  • srt~Get Your Files Here !/1 - Introduction/1 - Introduction English.srt 22.7 kB
  • srt~Get Your Files Here !/6 - Assessing the Current State of Defense within the Organization/6 - Assessing the Current State of Defense within the Organization English.srt 18.8 kB
  • srt~Get Your Files Here !/8 - Defeating the Red Team with Purple Team Tactics/8 - Defeating the Red Team with Purple Team Tactics English.srt 18.8 kB
  • txt~Get Your Files Here !/Bonus Resources.txt 386 Bytes
  • urlGet Bonus Downloads Here.url 182 Bytes
【影视】 [ TutSala.com ] Linkedin - Crisis Communication Planning After a Ransomware or Other Cybersecurity Attack
收录时间:2023-12-17 文档个数:23 文档大小:83.2 MB 最近下载:2025-05-15 人气:459 磁力链接
  • mp4~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/02 - Prepare your team to address a crisis.mp4 14.0 MB
  • mp4~Get Your Files Here !/02 - 1. The Impact of Cyberattacks/02 - Determining who is on your team when a cyberattack occurs.mp4 11.4 MB
  • mp4~Get Your Files Here !/02 - 1. The Impact of Cyberattacks/01 - Why cyberattacks impact every organization.mp4 11.1 MB
  • mp4~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/01 - What to say and to whom at onset.mp4 10.7 MB
  • mp4~Get Your Files Here !/04 - 3. Evaluate and Train/01 - Continue to evaluate after a training.mp4 9.1 MB
  • mp4~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/04 - What to tell people after the attack.mp4 7.4 MB
  • mp4~Get Your Files Here !/04 - 3. Evaluate and Train/02 - Design crisis scenario-based training for higher retention.mp4 6.8 MB
  • mp4~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/03 - Practice to improve crisis communications.mp4 5.3 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Anyone can suffer a ransomware or other cyberattack.mp4 5.0 MB
  • mp4~Get Your Files Here !/05 - Conclusion/01 - You can do this.mp4 2.3 MB
  • pdf~Get Your Files Here !/Ex_Files_Crisis_Communication_Planning_Cybersecurity/Exercise Files/Questions to Ask Your Team.pdf 31.1 kB
  • srt~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/02 - Prepare your team to address a crisis.srt 10.6 kB
  • srt~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/01 - What to say and to whom at onset.srt 8.6 kB
  • srt~Get Your Files Here !/02 - 1. The Impact of Cyberattacks/02 - Determining who is on your team when a cyberattack occurs.srt 7.3 kB
  • srt~Get Your Files Here !/02 - 1. The Impact of Cyberattacks/01 - Why cyberattacks impact every organization.srt 7.0 kB
  • srt~Get Your Files Here !/04 - 3. Evaluate and Train/02 - Design crisis scenario-based training for higher retention.srt 6.3 kB
  • srt~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/04 - What to tell people after the attack.srt 5.5 kB
  • srt~Get Your Files Here !/04 - 3. Evaluate and Train/01 - Continue to evaluate after a training.srt 5.2 kB
  • srt~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/03 - Practice to improve crisis communications.srt 3.8 kB
  • srt~Get Your Files Here !/01 - Introduction/01 - Anyone can suffer a ransomware or other cyberattack.srt 2.5 kB
【影视】 [CourseClub.Me] ZeroToMastery - Complete Cybersecurity Bootcamp
收录时间:2023-12-17 文档个数:98 文档大小:3.6 GB 最近下载:2025-05-15 人气:1642 磁力链接
  • mp48-Network Security/052-Network Security With Nmap.mp4 169.9 MB
  • mp45-Security Bugs & Vulnerabilities/020-Buffer Overflow Demonstration.mp4 136.7 MB
  • mp412-Appendix - Ethical Hacking/087-Msfconsole Basic Commands.mp4 97.5 MB
  • mp48-Network Security/059-Wireless Attack Demonstration.mp4 93.4 MB
  • mp47-End-Point Protection/034-Password Security and Password Managers.mp4 84.2 MB
  • mp412-Appendix - Ethical Hacking/093-Meterpreter Basic Commands Part 1.mp4 78.5 MB
  • mp47-End-Point Protection/038-Process Explorer.mp4 75.8 MB
  • mp41-Introduction/001-Cybersecurity Bootcamp - Zero to Mastery.mp4 72.4 MB
  • mp48-Network Security/057-Secure Network Architecture.mp4 66.8 MB
  • mp412-Appendix - Ethical Hacking/094-Meterpreter Basic Commands Part 2.mp4 65.7 MB
  • mp47-End-Point Protection/033-Bitdefender, Kaspersky, McAfee, Malwarebytes.mp4 63.9 MB
  • mp44-Understanding Hackers - The Biggest Threat/012-Most Common Attacks Demonstration.mp4 63.5 MB
  • mp48-Network Security/060-Network Monitoring With TCPDump.mp4 62.7 MB
  • mp48-Network Security/058-Wireless Security.mp4 59.6 MB
  • mp45-Security Bugs & Vulnerabilities/017-Unpatched Machine Exploitation Demonstration.mp4 59.1 MB
  • mp412-Appendix - Ethical Hacking/080-Whatweb Stealthy Scan.mp4 58.1 MB
  • mp412-Appendix - Ethical Hacking/091-Advance Msfvenom Usage.mp4 51.4 MB
  • mp47-End-Point Protection/043-Iptables.mp4 50.9 MB
  • mp47-End-Point Protection/028-Brave Browser Security and Privacy.mp4 50.6 MB
  • mp412-Appendix - Ethical Hacking/089-Software Vulnerability - Samba Exploitation.mp4 49.5 MB
【影视】 [ DevCourseWeb.com ] Udemy - Python for Cybersecurity
收录时间:2023-12-17 文档个数:73 文档大小:1.3 GB 最近下载:2025-05-15 人气:4217 磁力链接
  • mp4~Get Your Files Here !/6. Sockets/7. Part 3 - Sending, Receiving, and Closing the Connection.mp4 179.3 MB
  • mp4~Get Your Files Here !/4. Object Oriented Programming/2. Creating Our First Object.mp4 97.9 MB
  • mp4~Get Your Files Here !/6. Sockets/5. Part 1 - Socket, Bind, Listen Accept.mp4 81.1 MB
  • mp4~Get Your Files Here !/6. Sockets/6. Part 2 - Socket, Connect.mp4 74.5 MB
  • mp4~Get Your Files Here !/6. Sockets/4. Why Encode.mp4 71.2 MB
  • mp4~Get Your Files Here !/6. Sockets/3. How Sockets Will Work.mp4 68.7 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/6. If Statements.mp4 64.8 MB
  • mp4~Get Your Files Here !/5. Let's Make API Requests/5. Consuming an API - Complex.mp4 62.7 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/12. Dictionaries.mp4 51.7 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/13. Functions.mp4 49.3 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/3. Variables.mp4 42.2 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/7. Error Handling Part 1.mp4 40.5 MB
  • mp4~Get Your Files Here !/2. Environment Setup/2. Installing VS Code and Extensions.mp4 37.6 MB
  • mp4~Get Your Files Here !/6. Sockets/2. What is a Socket.mp4 35.1 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/11. Lists.mp4 35.1 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/4. f Strings.mp4 32.8 MB
  • mp4~Get Your Files Here !/4. Object Oriented Programming/3. Importing Packages.mp4 31.4 MB
  • mp4~Get Your Files Here !/1. Getting Started/1. IMPORTANT!!!.mp4 30.9 MB
  • mp4~Get Your Files Here !/5. Let's Make API Requests/4. Consuming an API - Simple.mp4 26.2 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/8. While Loop.mp4 21.6 MB
【影视】 Cybersecurity Lab Environment in EVE NG
收录时间:2023-12-17 文档个数:98 文档大小:6.4 GB 最近下载:2025-05-14 人气:6032 磁力链接
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/5. Cyberattacks Lab Setup/1. Cyberattacks Lab in EVE NG.mp4 431.1 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/1. Reconnaissance Attack.mp4 351.9 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/4. Attacker OS Setup/1. Kali Linux Setup.mp4 263.4 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/12. Password Attack.mp4 261.2 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/5. Cyberattacks Lab Setup/3. Vulnerable Servers -Configuration.mp4 259.5 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/9. ARP Spoofing Attack.mp4 240.8 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/2. EVE NG Setup/5. EVE NG Qemu Image Naming.mp4 223.9 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/10. DHCP Starvation Attack.mp4 195.3 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/1. Introduction to Cybersecurity/9. Layers of the Web Terms.mp4 192.1 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/4. Attacker OS Setup/3. Parrot OS Setup.mp4 184.7 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/1. Introduction to Cybersecurity/8. Layers of the Web.mp4 170.7 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/3. Vulnerable Web Setup/2. Metasploitable Setup.mp4 164.7 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/6. Smurf Attack.mp4 162.1 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/14. SQL Injection Attack.mp4 162.0 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/1. Introduction to Cybersecurity/12. OWASP Top Ten 10.mp4 160.9 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/2. EVE NG Setup/8. EVE-NG Networks Clouds.mp4 155.5 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/5. SYN Flooding Attack.mp4 150.9 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/1. Introduction to Cybersecurity/2. Introduction to Cybersecurity.mp4 146.1 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/4. ICMP Flooding Attack.mp4 144.8 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/3. Vulnerable Web Setup/1. bWAPP Server Setup.mp4 144.8 MB
【影视】 The Absolute Beginners Guide to Cybersecurity
收录时间:2023-12-17 文档个数:185 文档大小:7.5 GB 最近下载:2025-05-16 人气:7723 磁力链接
  • mp4Part 04 July 2023/Chapter 06 Conclusion/001. You Have Been HACKED - Now What.mp4 193.9 MB
  • mp4Part 04 July 2023/Chapter 01 Introduction/002. Personal Cybersecurity - What I Do.mp4 193.1 MB
  • mp4Part 01 December 2022/Chapter 07 Cyber Warfare and Cyber Attacks Against Companies/002. The Attack Against Estonia.mp4 187.3 MB
  • mp4Part 01 December 2022/Chapter 05 Defenses/009. Password Management.mp4 133.9 MB
  • mp4Part 03 June 2023/Chapter 03 Mobile Threats and Countermeasures/007. How to Use Malwarebytes.mp4 126.9 MB
  • mp4Part 01 December 2022/Chapter 02 Hackers - Who Are They/002. What Is NOT Hacking.mp4 118.6 MB
  • mp4Part 04 July 2023/Chapter 05 Mobile Security/003. Checking Default App Permissions - Android.mp4 115.6 MB
  • mp4Part 03 June 2023/Chapter 02 Understanding Applications/007. Checking Default App Permissions - Android.mp4 115.4 MB
  • mp4Part 02 December 2022/Chapter 01 Introduction/001. Welcome to the Course.mp4 115.3 MB
  • mp4Part 04 July 2023/Chapter 01 Introduction/001. Welcome to the Course.mp4 106.5 MB
  • mp4Part 01 December 2022/Chapter 07 Cyber Warfare and Cyber Attacks Against Companies/003. Stuxnet and the Attack Against Iran.mp4 105.1 MB
  • mp4Part 03 June 2023/Chapter 04 Mobile Security Apps/002. How to Use NordVPN.mp4 101.4 MB
  • mp4Part 02 December 2022/Chapter 07 Social Engineering - Scams, Cons, Tricks, and Fraud/003. Reconnaissance Methods.mp4 94.3 MB
  • mp4Part 04 July 2023/Chapter 03 Personal Security/005. Protecting Yourself Against SIM Card Swap Fraud.mp4 93.5 MB
  • mp4Part 01 December 2022/Chapter 02 Hackers - Who Are They/006. Social Engineering.mp4 89.9 MB
  • mp4Part 01 December 2022/Chapter 06 Cyber Security at the Workplace/005. The Security Versus Ease of Access Paradox.mp4 88.6 MB
  • mp4Part 01 December 2022/Chapter 06 Cyber Security at the Workplace/003. BYOD Management.mp4 87.6 MB
  • mp4Part 04 July 2023/Chapter 05 Mobile Security/005. How to Identify Legit Apps.mp4 86.0 MB
  • mp4Part 01 December 2022/Chapter 01 General Introduction to IT and Cyber Security/002. Difference Between Information Security and Cyber Security.mp4 84.6 MB
  • mp4Part 03 June 2023/Chapter 02 Understanding Applications/003. How to Identify Legit Apps and Spot Fake Apps.mp4 83.4 MB
【影视】 [ DevCourseWeb.com ] Udemy - Modern Cybersecurity Fundamentals
收录时间:2023-12-17 文档个数:27 文档大小:2.3 GB 最近下载:2025-05-16 人气:2342 磁力链接
  • mp4~Get Your Files Here !/2. History of Cybersecurity/1. History of Cybersecurity.mp4 478.1 MB
  • mp4~Get Your Files Here !/3. Cybersecurity Risk Management/1. Cybersecurity Risk Management.mp4 265.3 MB
  • mp4~Get Your Files Here !/13. The Future of Cybersecurity/1. The Future of Cybersecurity.mp4 186.8 MB
  • mp4~Get Your Files Here !/7. Understanding Networks Part 3/1. Understanding Networks Part 3.mp4 176.6 MB
  • mp4~Get Your Files Here !/11. Ransomware/1. Ransomware.mp4 159.6 MB
  • mp4~Get Your Files Here !/8. Understanding Networks Part 4/1. Understanding Networks Part 4.mp4 158.3 MB
  • mp4~Get Your Files Here !/12. Internet of Things (IoT)/1. Internet of Things (IoT).mp4 154.5 MB
  • mp4~Get Your Files Here !/9. Domain Name System (DNS)/1. Domain Name System (DNS).mp4 145.9 MB
  • mp4~Get Your Files Here !/5. Understanding Networks Part 1/1. Understanding Networks Part 1.mp4 137.5 MB
  • mp4~Get Your Files Here !/4. Intrusion Detection/1. Intrusion Detection.mp4 136.3 MB
  • mp4~Get Your Files Here !/6. Understanding Networks Part 2/1. Understanding Networks Part 2.mp4 126.6 MB
  • mp4~Get Your Files Here !/10. Dynamic Host Configuration Protocol (DHCP)/1. Dynamic Host Configuration Protocol (DHCP).mp4 112.7 MB
  • mp4~Get Your Files Here !/1. Introduction/1. Introduction.mp4 28.1 MB
  • pdf~Get Your Files Here !/5. Understanding Networks Part 1/1.1 Understanding-Networks.pdf 3.5 MB
  • pdf~Get Your Files Here !/6. Understanding Networks Part 2/1.1 Understanding-Networks.pdf 3.5 MB
  • pdf~Get Your Files Here !/7. Understanding Networks Part 3/1.1 Understanding-Networks.pdf 3.5 MB
  • pdf~Get Your Files Here !/8. Understanding Networks Part 4/1.1 Understanding-Networks.pdf 3.5 MB
  • pdf~Get Your Files Here !/3. Cybersecurity Risk Management/1.1 Cybersecurity-Risk-Management.pdf 1.8 MB
  • pdf~Get Your Files Here !/12. Internet of Things (IoT)/1.1 IoT.pdf 1.8 MB
  • pdf~Get Your Files Here !/2. History of Cybersecurity/1.1 HISTORY-OF-CYBERSECURITY.pdf 1.7 MB
【影视】 [ FreeCourseWeb.com ] CompTIA Cybersecurity Analyst + (CySA + ) (CS0-003) - 3 Incident Response and Management
收录时间:2023-12-17 文档个数:94 文档大小:348.1 MB 最近下载:2025-05-16 人气:5383 磁力链接
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/09 - Password forensics.mp4 19.8 MB
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/08 - Operating system analysis.mp4 15.5 MB
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/11 - Software forensics.mp4 15.2 MB
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/05 - File carving.mp4 13.1 MB
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/10 - Network forensics.mp4 11.3 MB
  • mp4~Get Your Files Here !/02 - 1. Incident Response Programs/08 - Incident eradication and recovery.mp4 11.2 MB
  • mp4~Get Your Files Here !/02 - 1. Incident Response Programs/01 - Build an incident response program.mp4 10.7 MB
  • mp4~Get Your Files Here !/07 - 6. Disaster Recovery/01 - Disaster recovery.mp4 10.7 MB
  • mp4~Get Your Files Here !/06 - 5. Business Continuity/03 - High availability and fault tolerance.mp4 10.4 MB
  • mp4~Get Your Files Here !/04 - 3. Incident Investigation/01 - Logging security information.mp4 10.2 MB
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/04 - System and file forensics.mp4 10.0 MB
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/06 - Creating forensic images.mp4 10.0 MB
  • mp4~Get Your Files Here !/03 - 2. Attack Frameworks/01 - MITRE ATT&CK.mp4 9.9 MB
  • mp4~Get Your Files Here !/04 - 3. Incident Investigation/03 - Cloud audits and investigations.mp4 9.9 MB
  • mp4~Get Your Files Here !/02 - 1. Incident Response Programs/10 - Post-incident activities.mp4 9.4 MB
  • mp4~Get Your Files Here !/02 - 1. Incident Response Programs/04 - Incident identification.mp4 9.3 MB
  • mp4~Get Your Files Here !/07 - 6. Disaster Recovery/04 - Disaster recovery sites.mp4 9.3 MB
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/15 - Ediscovery and evidence production.mp4 8.2 MB
  • mp4~Get Your Files Here !/06 - 5. Business Continuity/02 - Business continuity controls.mp4 8.0 MB
  • mp4~Get Your Files Here !/04 - 3. Incident Investigation/02 - Security information and event management.mp4 7.9 MB
【影视】 [ DevCourseWeb.com ] CBTNuggets - (ISC)2 CC - Certified in Cybersecurity - (ISC)2 Certification Training
收录时间:2023-12-17 文档个数:68 文档大小:2.1 GB 最近下载:2025-05-16 人气:6852 磁力链接
  • mp4~Get Your Files Here !/1. Understanding Information Assurance/1. Understanding Information Assurance - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 69.9 MB
  • mp4~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/1. Power - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 65.3 MB
  • mp4~Get Your Files Here !/7. Discussing Network Security Infrastructure/1. Network Segmentation - (ISC)² CC – Certified in Cybersecurity CBT Nuggets-1.mp4 58.2 MB
  • mp4~Get Your Files Here !/8. Exploring Network Threats and Attacks/6. Firewalls - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 54.7 MB
  • mp4~Get Your Files Here !/8. Exploring Network Threats and Attacks/3. Intrusion Detection Prevention Systems (IDSIPS) - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 54.0 MB
  • mp4~Get Your Files Here !/5. Exploring Security Policies and Training/7. Security Awareness Training - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 52.0 MB
  • mp4~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/3. Heating, Ventilation and Air Conditioning (HVAC) - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 48.1 MB
  • mp4~Get Your Files Here !/9. Understanding Computer Networking/4. IP Addresses - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 47.5 MB
  • mp4~Get Your Files Here !/6. Understanding Data Security and System Hardening/2. Types of Encryption - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 46.4 MB
  • mp4~Get Your Files Here !/7. Discussing Network Security Infrastructure/7. The Cloud - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 45.7 MB
  • mp4~Get Your Files Here !/8. Exploring Network Threats and Attacks/5. Vulnerability Scanning - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 45.5 MB
  • mp4~Get Your Files Here !/9. Understanding Computer Networking/3. TCPIP Model - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 42.9 MB
  • mp4~Get Your Files Here !/6. Understanding Data Security and System Hardening/7. Configuration Management - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 41.6 MB
  • mp4~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/2. Data Centers and Closets - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 40.4 MB
  • mp4~Get Your Files Here !/1. Understanding Information Assurance/2. Methods of Authentication - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 40.0 MB
  • mp4~Get Your Files Here !/2. Discussing Risk Management, Controls, Ethics and Governance/4. Security Control Categories - (ISC)² CC – Certified in Cybersecurity CBT Nuggets-1.mp4 39.3 MB
  • mp4~Get Your Files Here !/6. Understanding Data Security and System Hardening/3. Data Hashing with Encryption - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 38.3 MB
  • mp4~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/5. Redundancy - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 38.2 MB
  • mp4~Get Your Files Here !/3. Exploring BC, DR & IR Concepts/6. Incident Response - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 37.9 MB
  • mp4~Get Your Files Here !/4. Reviewing Access Control Concepts/6. Types of Access Control - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 36.8 MB
【压缩文件】 [FreeCoursesOnline.Me] Coursera - Cybersecurity Attack and Defense Fundamentals Specialization (by EC-Council)
收录时间:2023-12-17 文档个数:7 文档大小:6.1 GB 最近下载:2025-05-16 人气:7527 磁力链接
  • zip2. Network Defense Essentials (NDE).zip 2.2 GB
  • zip1. Ethical Hacking Essentials (EHE).zip 2.1 GB
  • zip3. Digital Forensics Essentials (DFE).zip 1.7 GB
  • url0. Websites you may like/1. OneHack.us Premium Cracked Accounts-Tutorials-Guides-Articles Community Based Forum.url 377 Bytes
  • urlFreeCoursesOnline.me Download Udacity, Masterclass, Lynda, PHLearn, etc Free.url 290 Bytes
  • txtContent Info.txt 285 Bytes
  • url0. Websites you may like/2. FTUApps.com Download Cracked Developers Applications For Free.url 239 Bytes
【影视】 Practical Cybersecurity for IT Professionals
收录时间:2023-12-17 文档个数:119 文档大小:392.7 MB 最近下载:2025-05-15 人气:384 磁力链接
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/04 - 3. Firewalls/03 - Advanced Windows Firewall.mp4 27.1 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/05 - 4. Network Scanning/01 - Getting started with Nmap.mp4 22.0 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/02 - 1. Why Cybersecurity/07 - Emerging trends in cybersecurity.mp4 20.4 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/02 - 1. Why Cybersecurity/01 - A history of hackers.mp4 17.5 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/04 - 3. Firewalls/05 - Introducing Linux iptables.mp4 16.1 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/04 - 3. Firewalls/02 - Windows Firewall basics.mp4 14.5 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/09 - 8. Network Protocols/02 - Capturing packets with Wireshark.mp4 14.3 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/04 - 3. Firewalls/04 - ZedLan firewall log analyser.mp4 13.4 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/02 - 1. Why Cybersecurity/04 - Common forms of cyberattack.mp4 13.1 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/09 - 8. Network Protocols/03 - Making sense of the protocols.mp4 13.0 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/02 - 1. Why Cybersecurity/02 - The cyber kill chain.mp4 12.0 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/03 - 2. Antivirus/01 - Introducing Microsoft Defender Antivirus.mp4 11.7 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/07 - 6. Vulnerability Scanning/01 - Preparing Nessus.mp4 10.5 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/08 - 7. Web Applications/02 - Running an SQL injection attack.mp4 10.1 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/05 - 4. Network Scanning/02 - Advanced Nmap options.mp4 10.0 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/02 - 1. Why Cybersecurity/03 - Stuxnet and the kill chain.mp4 9.8 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/03 - 2. Antivirus/02 - Detecting malware with Microsoft Defender.mp4 9.5 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/04 - 3. Firewalls/06 - Setting up a simple iptables firewall.mp4 9.3 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/06 - 5. Network Connections/02 - Transferring files using netcat.mp4 9.2 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/06 - 5. Network Connections/04 - Setting up a netcat honeypot.mp4 8.9 MB
【影视】 [ FreeCourseWeb.com ] Udemy - Increasing Business Cybersecurity Standards immediately!
收录时间:2022-05-11 文档个数:66 文档大小:1.4 GB 最近下载:2025-05-14 人气:701 磁力链接
  • mp4~Get Your Files Here !/03 Understanding Hacking Strategies/001 How does a Hacker look like_.mp4 151.3 MB
  • mp4~Get Your Files Here !/03 Understanding Hacking Strategies/005 Trends & Outlook.mp4 148.7 MB
  • mp4~Get Your Files Here !/07 Team Organisation/003 Sharing Files & Accounts.mp4 126.8 MB
  • mp4~Get Your Files Here !/07 Team Organisation/002 Communication Channels.mp4 116.3 MB
  • mp4~Get Your Files Here !/07 Team Organisation/001 Cybersecurity Awareness Communication.mp4 115.8 MB
  • mp4~Get Your Files Here !/10 ADDITIONAL CONTENT/003 Kids & the digital World.mp4 113.9 MB
  • mp4~Get Your Files Here !/07 Team Organisation/004 Login & Password Management.mp4 73.1 MB
  • mp4~Get Your Files Here !/10 ADDITIONAL CONTENT/002 Creating safe, secure and Data Protection compliant Products.mp4 72.3 MB
  • mp4~Get Your Files Here !/10 ADDITIONAL CONTENT/001 Security Standards.mp4 72.2 MB
  • mp4~Get Your Files Here !/06 Admin Duties/001 ToDo List.mp4 48.8 MB
  • mp4~Get Your Files Here !/02 The Data Processing Triangle/002 Data Protection.mp4 35.1 MB
  • mp4~Get Your Files Here !/02 The Data Processing Triangle/001 Overview.mp4 35.1 MB
  • mp4~Get Your Files Here !/09 The End/001 Closing Statement.mp4 31.3 MB
  • mp4~Get Your Files Here !/01 Introduction/001 Welcome!.mp4 28.6 MB
  • mp4~Get Your Files Here !/03 Understanding Hacking Strategies/004 War Stories.mp4 26.9 MB
  • mp4~Get Your Files Here !/08 Managing Client Data/003 Data Science Projects.mp4 24.7 MB
  • mp4~Get Your Files Here !/04 Securing Hardware/004 Your invisible Devices.mp4 21.1 MB
  • mp4~Get Your Files Here !/05 Securing Software & Accounts/002 Service Providers.mp4 19.1 MB
  • mp4~Get Your Files Here !/01 Introduction/002 Disclaimer.mp4 18.6 MB
  • mp4~Get Your Files Here !/05 Securing Software & Accounts/001 Daily used Accounts.mp4 18.0 MB
【影视】 Cybersecurity Threat Hunting for SOC Analysts
收录时间:2022-05-05 文档个数:245 文档大小:6.2 GB 最近下载:2025-05-15 人气:10475 磁力链接
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/10. Adversary Emulation Caldera.mp4 359.9 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/12. Enhanced Lab Realism Bad Blood + Microsoft ATA + Bloodhound!.mp4 338.8 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/1. Threat Hunting with Splunk + Zeek.mp4 243.3 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/7. Adversary Emulation Atomic Red Team + MITRE ATT&CK.mp4 242.7 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/6. Purple Team Scenario Meterpreter + MSFVenom + Process Injection + Velociraptor!.mp4 225.7 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/3. The Modern Threat Hunting Mindset.mp4 225.3 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/5. The Methodical Guide to Effective Threat Hunting/1. Finding Beacons Long and Cumulative Connections.mp4 201.8 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/6. Proofs Detecting False Negatives/2. Suricata vs RITA Zeus Malware.mp4 195.4 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/5. The Methodical Guide to Effective Threat Hunting/5. Finding Beacons Business Need Analysis (Part 4).mp4 194.3 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/2. Threat Hunting with Splunk + Sysmon.mp4 153.3 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/5. The Methodical Guide to Effective Threat Hunting/4. Finding Beacons Business Need Analysis (Part 3).mp4 139.4 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/5. Beaconing DNS.mp4 135.2 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/8. Beaconing Detection Session Size Analysis.mp4 133.5 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/6. Proofs Detecting False Negatives/1. Suricata Capabilities + Installation!.mp4 129.8 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/3. Tools and resources/8. zeek.mp4 126.9 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/2. The Broken Threat Hunting Mindset.mp4 126.1 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/3. Tools and resources/9. Using zeek + Rita to find Evil!.mp4 118.9 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/1. Understanding the New Adversary.mp4 118.7 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/6. Beaconing CDN.mp4 117.8 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/5. Purple Team Scenario Mimikatz.mp4 115.6 MB
共14页 上一页 4 5 6 7 8 9 10 11 12 下一页