磁力管家

磁力管家
为您索检到268条磁力链接,耗时1毫秒。 rss

分享给好友

【压缩文件】 [ FreeCourseWeb.com ] Udemy - Intoduction to Cybersecurity !From beginner level to PRO !.zip
收录时间:2022-04-24 文档个数:1 文档大小:503.9 MB 最近下载:2025-05-14 人气:551 磁力链接
  • zip[ FreeCourseWeb.com ] Udemy - Intoduction to Cybersecurity !From beginner level to PRO !.zip 503.9 MB
【影视】 [ CourseLala.com ] Udemy - Personal Digital Security Everyone Must Have - Cybersecurity
收录时间:2022-04-12 文档个数:76 文档大小:1.5 GB 最近下载:2025-05-10 人气:725 磁力链接
  • mp4~Get Your Files Here !/02 - Secure your computer from unauthorized access/001 Social Engineering.mp4 157.3 MB
  • mp4~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/007 Secure your Wi-Fi at Home (Video HD).mp4 103.2 MB
  • mp4~Get Your Files Here !/02 - Secure your computer from unauthorized access/003 Use strong passwords.mp4 93.7 MB
  • mp4~Get Your Files Here !/03 - What is Malware and its types/003 Spyware.mp4 66.9 MB
  • mp4~Get Your Files Here !/06 - Secure your Smartphone/003 Communicating Securely with your Smartphone.mp4 64.7 MB
  • mp4~Get Your Files Here !/03 - What is Malware and its types/002 Adware.mp4 63.9 MB
  • mp4~Get Your Files Here !/05 - Email Security/002 Fishing.mp4 57.8 MB
  • mp4~Get Your Files Here !/02 - Secure your computer from unauthorized access/012 Be cautious.mp4 54.8 MB
  • mp4~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/002 Tips for buying online.mp4 46.0 MB
  • mp4~Get Your Files Here !/06 - Secure your Smartphone/001 Purses, Wallets, Smartphones.mp4 43.1 MB
  • mp4~Get Your Files Here !/03 - What is Malware and its types/001 Trojan Horse.mp4 39.6 MB
  • mp4~Get Your Files Here !/03 - What is Malware and its types/007 Scareware.mp4 39.5 MB
  • mp4~Get Your Files Here !/03 - What is Malware and its types/004 Browser Hijacking Software.mp4 37.3 MB
  • mp4~Get Your Files Here !/02 - Secure your computer from unauthorized access/008 Use a VPN.mp4 36.0 MB
  • mp4~Get Your Files Here !/03 - What is Malware and its types/005 Viruses.mp4 35.6 MB
  • mp4~Get Your Files Here !/01 - Introduction to Personal Digital Security/003 Some statistics.mp4 35.0 MB
  • mp4~Get Your Files Here !/02 - Secure your computer from unauthorized access/004 Use password manager.mp4 33.8 MB
  • mp4~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/001 Safe browsing.mp4 31.8 MB
  • mp4~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/008 Safe browsing in Social Networks.mp4 31.7 MB
  • mp4~Get Your Files Here !/01 - Introduction to Personal Digital Security/001 Introduction to Personal Digital Security.mp4 30.4 MB
【影视】 [ FreeCourseWeb.com ] Udemy - Cybersecurity Habits Masterclass
收录时间:2022-04-10 文档个数:93 文档大小:2.1 GB 最近下载:2025-05-15 人气:1566 磁力链接
  • mp4~Get Your Files Here !/3. Skepticism/4. Slow Down And Frown.mp4 73.5 MB
  • mp4~Get Your Files Here !/11. Conclusion/1. Well Awareiors.mp4 71.5 MB
  • mp4~Get Your Files Here !/1. Introduction/1. Introduction.mp4 67.0 MB
  • mp4~Get Your Files Here !/4. Vigilance/2. The Only Thing We Have To Fear.mp4 66.7 MB
  • mp4~Get Your Files Here !/4. Vigilance/1. The Face Of The Enemy.mp4 66.5 MB
  • mp4~Get Your Files Here !/5. Secrecy/2. Making It Personal.mp4 65.7 MB
  • mp4~Get Your Files Here !/2. Literacy/5. Habits And Recipes.mp4 64.7 MB
  • mp4~Get Your Files Here !/3. Skepticism/1. Zero Trust.mp4 64.5 MB
  • mp4~Get Your Files Here !/8. Community/4. Habits And Recipes.mp4 57.4 MB
  • mp4~Get Your Files Here !/8. Community/1. United We Stand.mp4 54.0 MB
  • mp4~Get Your Files Here !/7. Diligence/3. Random Acts of Security.mp4 53.4 MB
  • mp4~Get Your Files Here !/7. Diligence/2. Journaling.mp4 53.4 MB
  • mp4~Get Your Files Here !/9. Mirroring/5. Habits And Recipes.mp4 52.0 MB
  • mp4~Get Your Files Here !/6. Culture/1. Culture Eats Cybersecurity For Breakfast.mp4 51.4 MB
  • mp4~Get Your Files Here !/10. Deception/1. Know Thy Enemy.mp4 49.4 MB
  • mp4~Get Your Files Here !/9. Mirroring/3. Blindspots.mp4 49.1 MB
  • mp4~Get Your Files Here !/3. Skepticism/2. The Pygmailion Effect.mp4 48.9 MB
  • mp4~Get Your Files Here !/6. Culture/5. Habits And Recipes.mp4 48.0 MB
  • mp4~Get Your Files Here !/2. Literacy/1. Fearless Learning.mp4 47.9 MB
  • mp4~Get Your Files Here !/6. Culture/2. The Hermit Crab Shell.mp4 46.7 MB
【压缩文件】 [ FreeCourseWeb.com ] Udemy - Cybersecurity Data Science.zip
收录时间:2022-04-08 文档个数:1 文档大小:349.0 MB 最近下载:2025-05-15 人气:179 磁力链接
  • zip[ FreeCourseWeb.com ] Udemy - Cybersecurity Data Science.zip 349.0 MB
【影视】 [ CourseMega.com ] Linkedin - Building an ISO 27001-Compliant Cybersecurity Program - The Annex A Controls
收录时间:2022-03-29 文档个数:110 文档大小:1.2 GB 最近下载:2025-05-16 人气:5902 磁力链接
  • mp4~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/013. Access control User access management.mp4 60.8 MB
  • mp4~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/028. System lifecycle Security in d.mp4 57.3 MB
  • mp4~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/017. Physical and environmental security Equipme.mp4 57.2 MB
  • mp4~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/014. Access control System and application.mp4 55.8 MB
  • mp4~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/032. Management of information security.mp4 54.7 MB
  • mp4~Get Your Files Here !/07. Operations Security (Clause A.12)/018. Operations security Operational procedures and responsibili.mp4 47.1 MB
  • mp4~Get Your Files Here !/12. Compliance (Clause A.18)/034. Compliance Compliance with legal and contractual requirements (Claus.mp4 46.5 MB
  • mp4~Get Your Files Here !/07. Operations Security (Clause A.12)/021. Operations security Logging and monitoring (Clause A.12.4).mp4 45.6 MB
  • mp4~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/033. Information security continuity an.mp4 45.5 MB
  • mp4~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/016. Physical and environmental security Secure.mp4 44.8 MB
  • mp4~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/004. Contact with auth.mp4 42.7 MB
  • mp4~Get Your Files Here !/08. Communications Security (Clause A.13)/026. Communications security Information transfer (Clause A..mp4 40.7 MB
  • mp4~Get Your Files Here !/04. Asset Management (Clause A.8)/010. Asset management Information classification (Clause A.8.2).mp4 40.5 MB
  • mp4~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/027. System lifecycle Security requ.mp4 37.2 MB
  • mp4~Get Your Files Here !/03. Human Resources Security (Clause A.7)/007. Human resources security During employment (Clause A.7..mp4 34.4 MB
  • mp4~Get Your Files Here !/08. Communications Security (Clause A.13)/025. Communications security Network security management (Cl.mp4 34.1 MB
  • mp4~Get Your Files Here !/04. Asset Management (Clause A.8)/009. Asset management Responsibility for assets (Clause A.8.1).mp4 33.3 MB
  • mp4~Get Your Files Here !/10. Supplier Relationships (Clause A.15)/030. Supplier relationships Information security in supplier.mp4 31.4 MB
  • mp4~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/002. Management direct.mp4 31.1 MB
  • mp4~Get Your Files Here !/04. Asset Management (Clause A.8)/011. Asset management Media handling (Clause A.8.3).mp4 30.4 MB
【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity Threat Hunting Professional
收录时间:2022-03-20 文档个数:36 文档大小:1.0 GB 最近下载:2025-05-15 人气:2155 磁力链接
  • mp4~Get Your Files Here !/2. Time to hunt/2. Practical Threat hunting Demo.mp4 121.9 MB
  • mp4~Get Your Files Here !/2. Time to hunt/1. Case Base Threat Hunting.mp4 93.6 MB
  • mp4~Get Your Files Here !/2. Time to hunt/3. Indicators of threat attacksIoC.mp4 86.1 MB
  • mp4~Get Your Files Here !/1. Introduction/11. 7 Effective Threat Hunting Tips.mp4 81.5 MB
  • mp4~Get Your Files Here !/1. Introduction/10. Hypothesis Testing & Sources of Hypothesis.mp4 78.6 MB
  • mp4~Get Your Files Here !/4. Course Resources/1. Course Resources.mp4 72.6 MB
  • mp4~Get Your Files Here !/3. Course Conclusion/1. Course Review.mp4 72.6 MB
  • mp4~Get Your Files Here !/1. Introduction/8. What is Required for Successful Threat Hunting.mp4 71.2 MB
  • mp4~Get Your Files Here !/1. Introduction/6. Terms associated with Threat Hunting.mp4 70.5 MB
  • mp4~Get Your Files Here !/1. Introduction/4. Why threat hunt and attributes of an effective threat hunter.mp4 56.2 MB
  • mp4~Get Your Files Here !/1. Introduction/9. Threat Hunting Approaches.mp4 55.0 MB
  • mp4~Get Your Files Here !/1. Introduction/5. Threat Hunting Skillset Requirements.mp4 40.0 MB
  • mp4~Get Your Files Here !/1. Introduction/7. Threat Hunting Loop.mp4 38.6 MB
  • mp4~Get Your Files Here !/1. Introduction/2. What is Threat Hunting & Its Primary objective.mp4 35.9 MB
  • mp4~Get Your Files Here !/1. Introduction/1. Introduction.mp4 29.5 MB
  • mp4~Get Your Files Here !/1. Introduction/3. What is Threat Hunting & Its Primary objective..mp4 23.3 MB
  • mp4~Get Your Files Here !/4. Course Resources/1.1 Network Threat Hunting with Tim Crothers.mp4 10.6 MB
  • pdf~Get Your Files Here !/4. Course Resources/1.2 Resources Links for Threat Hunting Course.pdf 435.7 kB
  • srt~Get Your Files Here !/2. Time to hunt/2. Practical Threat hunting Demo.srt 11.9 kB
  • srt~Get Your Files Here !/2. Time to hunt/3. Indicators of threat attacksIoC.srt 8.3 kB
【影视】 [ FreeCourseWeb.com ] Udemy - Master Cybersecurity,Ethical Hacking and Penetrating Testing
收录时间:2022-03-15 文档个数:50 文档大小:1.6 GB 最近下载:2025-05-16 人气:2202 磁力链接
  • mp4~Get Your Files Here !/04 Exposing Hackers - Know Your Enemy/002 Why You Need Security _.mp4 189.8 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/011 Setting up Labs.mp4 169.5 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/003 What is Privacy, Anonymity and Pseudonymity _.mp4 158.8 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/006 Threat Modelling And Risk Assessment.mp4 158.3 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/008 Confidentiality, Integrity and Availability - (Security Attributes).mp4 141.8 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/004 Security, Vulnerabilities, Threats and Adversaries.mp4 117.8 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/005 Asset Selection.mp4 94.5 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/002 Protect What You Value.mp4 93.7 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/010 Zero Trust Model.mp4 85.7 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/007 Security,Anonymity and Privacy.mp4 59.8 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/001 What is Cybersecurity _.mp4 34.8 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/009 Defence in Depth.mp4 34.2 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/008 Who Conduct it _.mp4 26.4 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/002 What is Ethical Hacking _.mp4 25.8 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/005 Purpose of Studying Ethical Hacking and Penetrating Testing.mp4 24.3 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/010 Closure.mp4 23.6 MB
  • mp4~Get Your Files Here !/04 Exposing Hackers - Know Your Enemy/001 Goals and Learning Objectives - Know Your Enemy.mp4 21.8 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/009 Who should You Choose _.mp4 20.6 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/001 Goals and Learning Objectives.mp4 19.7 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/006 Scope For Ethical Hackers and Penetrating Testers.mp4 18.5 MB
【压缩文件】 [ FreeCourseWeb.com ] Udemy - Cybersecurity fundamentals.zip
收录时间:2022-03-07 文档个数:1 文档大小:568.6 MB 最近下载:2025-04-26 人气:261 磁力链接
  • zip[ FreeCourseWeb.com ] Udemy - Cybersecurity fundamentals.zip 568.6 MB
【音乐】 Trust Genics - 2020 - Cybersecurity (Technology)
收录时间:2022-03-05 文档个数:10 文档大小:109.7 MB 最近下载:2025-05-15 人气:1428 磁力链接
  • mp3Cybersecurity.mp3 109.7 MB
  • jpgCybersecurity.jpg 52.5 kB
  • txtCybersecurity - Trust Genics - 2020.txt 2.1 kB
  • txtDownloaded From TorrentGalaxy.txt 583 Bytes
  • txtDownloaded From Glodls.txt 237 Bytes
  • txtDownloaded From ETTV.txt 138 Bytes
  • txtDownloaded From ProStyleX.txt 101 Bytes
  • txtDownloaded From 1337X.txt 96 Bytes
  • txtDownloaded From Demonoid.txt 50 Bytes
  • txtDownloaded From Katcr.co.txt 43 Bytes
【影视】 [ FreeCourseWeb.com ] Linkedin - Cybersecurity Awareness - Phishing Attacks
收录时间:2022-03-04 文档个数:39 文档大小:642.7 MB 最近下载:2025-05-02 人气:1592 磁力链接
  • mp4~Get Your Files Here !/4. How to Catch a Phish/012. Catch a phish red-handed Common indicators of a phish.mp4 48.9 MB
  • mp4~Get Your Files Here !/3. Different Types of Phishing Attacks/010. Other notable methods of phishing.mp4 47.3 MB
  • mp4~Get Your Files Here !/2. An Overview of Phishing/004. How does phishing affect us.mp4 46.9 MB
  • mp4~Get Your Files Here !/2. An Overview of Phishing/005. A review of the psychology behind social engineering attacks.mp4 45.0 MB
  • mp4~Get Your Files Here !/5. How to Defend against Phishing Attacks/015. How technology helps with the fight against phishing attacks.mp4 41.6 MB
  • mp4~Get Your Files Here !/4. How to Catch a Phish/013. Is this a phish Real-world examples of phishing attacks.mp4 38.5 MB
  • mp4~Get Your Files Here !/3. Different Types of Phishing Attacks/007. Unfriended How to spot a social media phish.mp4 38.5 MB
  • mp4~Get Your Files Here !/4. How to Catch a Phish/011. What makes phishing attacks successful.mp4 36.9 MB
  • mp4~Get Your Files Here !/3. Different Types of Phishing Attacks/008. Getting specific with targeted phishing attacks.mp4 34.9 MB
  • mp4~Get Your Files Here !/3. Different Types of Phishing Attacks/006. Is it a harmless unknown caller or vishing.mp4 34.6 MB
  • mp4~Get Your Files Here !/6. What Happens If You Fall for a Phish/018. Falling for a phishing attack at home.mp4 34.5 MB
  • mp4~Get Your Files Here !/2. An Overview of Phishing/003. Money is the motive The reason behind phishing.mp4 34.1 MB
  • mp4~Get Your Files Here !/5. How to Defend against Phishing Attacks/016. Practice makes perfect An overview of phishing simulations.mp4 32.6 MB
  • mp4~Get Your Files Here !/2. An Overview of Phishing/002. Phishing The dangers of email.mp4 32.3 MB
  • mp4~Get Your Files Here !/3. Different Types of Phishing Attacks/009. SMS phishing A text-based attack.mp4 31.8 MB
  • mp4~Get Your Files Here !/6. What Happens If You Fall for a Phish/017. Responding to a phishing attack at work.mp4 23.4 MB
  • mp4~Get Your Files Here !/5. How to Defend against Phishing Attacks/014. The most common ways to defend against a phish.mp4 23.1 MB
  • mp4~Get Your Files Here !/1. Introduction/001. About phishing attacks.mp4 9.8 MB
  • mp4~Get Your Files Here !/7. Conclusion/019. Next steps and takeaways.mp4 7.8 MB
  • pdf~Get Your Files Here !/Ex_Files_Cybersecurity_Awareness_Phishing_Attacks/Exercise Files/Additional Resources.pdf 47.6 kB
【影视】 Pluralsight - Cybersecurity Threats: Ransomware
收录时间:2022-02-22 文档个数:37 文档大小:388.1 MB 最近下载:2025-01-10 人气:15 磁力链接
  • mp45. Incident Response - Eradication and Recovery/29. NoMoreRansom.org.mp4 71.4 MB
  • mp42. What Is Ransomware/09. Demo of Real World Ransomware Attack.mp4 52.0 MB
  • mp45. Incident Response - Eradication and Recovery/30. Paying the Ransom.mp4 22.3 MB
  • mp42. What Is Ransomware/03. Definition and Types of Ransomware.mp4 20.3 MB
  • mp42. What Is Ransomware/04. The Ransomware Timeline.mp4 15.2 MB
  • mp45. Incident Response - Eradication and Recovery/27. Recovery Cloud Storage Files, Dropbox, and OneDrive.mp4 15.1 MB
  • mp42. What Is Ransomware/06. How Big Is the Problem.mp4 15.1 MB
  • mp42. What Is Ransomware/07. Ransomware Victims.mp4 11.7 MB
  • mp46. Countermeasures and Preparing Your Incident Response/33. Defending a Ransomware Attack.mp4 11.4 MB
  • mp46. Countermeasures and Preparing Your Incident Response/36. Lessons Learned and Your Incident Response Plan.mp4 10.9 MB
  • mp43. Ransomware Entry Points/14. Phishing and Email Attachments.mp4 10.6 MB
  • mp44. Incident Response - Detection and Containment/22. Containing the Attack.mp4 9.0 MB
  • mp46. Countermeasures and Preparing Your Incident Response/34. Protecting a Windows Network.mp4 8.0 MB
  • mp44. Incident Response - Detection and Containment/21. Detecting an Attack.mp4 7.3 MB
  • mp45. Incident Response - Eradication and Recovery/26. Recovery Local and Network Files.mp4 7.3 MB
  • mp43. Ransomware Entry Points/17. Command and Callback (C&C) and Indicators of Compromise.mp4 7.0 MB
  • mp45. Incident Response - Eradication and Recovery/28. Tools and Resources.mp4 6.7 MB
  • mp42. What Is Ransomware/10. Variations of Ransomware.mp4 6.4 MB
  • mp43. Ransomware Entry Points/15. Embedded Hyperlinks, Websites_downloads, and Drive-by Infections.mp4 6.2 MB
  • mp45. Incident Response - Eradication and Recovery/31. Summary.mp4 6.0 MB
【影视】 [ FreeCourseWeb.com ] Udemy - The Complete Cybersecurity Awareness Course For Employees
收录时间:2022-02-21 文档个数:26 文档大小:1.1 GB 最近下载:2025-05-13 人气:1485 磁力链接
  • mp4~Get Your Files Here !/4. Social Engineering and Countermeasures/3. Types of Social Engineering Attacks.mp4 92.1 MB
  • mp4~Get Your Files Here !/1. Introduction to the Cybersecurity Space/1. Cybersecurity Introduction and Trends.mp4 81.4 MB
  • mp4~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/7. Malware and Types of Malware.mp4 78.6 MB
  • mp4~Get Your Files Here !/1. Introduction to the Cybersecurity Space/3. Definitions and Key Terms in Cybersecurity.mp4 74.9 MB
  • mp4~Get Your Files Here !/2. Cybersecurity Roles and Actors/1. Cybersecurity Roles.mp4 72.2 MB
  • mp4~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/12. Anti-Malware Protection.mp4 68.9 MB
  • mp4~Get Your Files Here !/2. Cybersecurity Roles and Actors/4. Security Operations Center.mp4 56.2 MB
  • mp4~Get Your Files Here !/4. Social Engineering and Countermeasures/5. Social Engineering Countermeasures.mp4 50.8 MB
  • mp4~Get Your Files Here !/5. Cybersecurity Internal Affairs and Controls/11. Cybersecurity Organizations That Are Resourceful.mp4 44.7 MB
  • mp4~Get Your Files Here !/5. Cybersecurity Internal Affairs and Controls/1. Privacy Policy.mp4 41.7 MB
  • mp4~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/19. More Countermeasures - Vulnerability Assessments.mp4 41.1 MB
  • mp4~Get Your Files Here !/5. Cybersecurity Internal Affairs and Controls/7. Incident Handling.mp4 38.9 MB
  • mp4~Get Your Files Here !/5. Cybersecurity Internal Affairs and Controls/9. IT Governance.mp4 36.1 MB
  • mp4~Get Your Files Here !/2. Cybersecurity Roles and Actors/7. The Different Types of Cybersecurity Actors.mp4 33.5 MB
  • mp4~Get Your Files Here !/1. Introduction to the Cybersecurity Space/6. Cybersecurity and Social Media.mp4 33.5 MB
  • mp4~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/17. More Countermeasures -Digital Forensics.mp4 30.5 MB
  • mp4~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/23. More on Tech and Admin Controls.mp4 30.3 MB
  • mp4~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/1. Security Threats.mp4 28.4 MB
  • mp4~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/21. How To Start and Cybersecurity Program.mp4 27.4 MB
  • mp4~Get Your Files Here !/5. Cybersecurity Internal Affairs and Controls/3. Good User Habits.mp4 27.0 MB
【影视】 [TutorialPace.com] Lynda - Cybersecurity with Cloud Computing - [TP]
收录时间:2022-02-20 文档个数:38 文档大小:371.6 MB 最近下载:2025-05-15 人气:2055 磁力链接
  • mp400. Introduction/00_01 - Welcome.mp4 17.4 MB
  • mp400. Introduction/00_03 - Reference sites.mp4 16.6 MB
  • mp401. Cloud Fundamentals/01_01 - Defining the essential characteristics of cloud.mp4 15.8 MB
  • mp402. Cloud Security Guidance/02_03 - Managing information and data security.mp4 15.6 MB
  • mp403. Architecting Security/03_05 - Introducing cloud attribute taxonomy.mp4 15.5 MB
  • mp403. Architecting Security/03_01 - Introducing SABSA.mp4 15.3 MB
  • mp401. Cloud Fundamentals/01_06 - Identifying cloud incidents.mp4 15.2 MB
  • mp401. Cloud Fundamentals/01_09 - Defining trust models for cloud.mp4 14.0 MB
  • mp402. Cloud Security Guidance/02_16 - Solution Cloud security knowledge.mp4 13.8 MB
  • mp402. Cloud Security Guidance/02_02 - Complying with legal and audit requrements.mp4 13.1 MB
  • mp402. Cloud Security Guidance/02_11 - Verifying identity in the cloud.mp4 13.1 MB
  • mp402. Cloud Security Guidance/02_07 - Managing incident response.mp4 12.9 MB
  • mp402. Cloud Security Guidance/02_13 - Implementing virtualization.mp4 12.9 MB
  • mp402. Cloud Security Guidance/02_12 - Controlling cloud access.mp4 12.5 MB
  • mp402. Cloud Security Guidance/02_08 - Maximizing application security.mp4 12.3 MB
  • mp403. Architecting Security/03_02 - Using Fast Tracker.mp4 12.0 MB
  • mp402. Cloud Security Guidance/02_05 - Comparing traditional IT, BCP, and DR.mp4 12.0 MB
  • mp401. Cloud Fundamentals/01_02 - Understanding infrastructure as a service.mp4 11.9 MB
  • mp401. Cloud Fundamentals/01_05 - Discovering deployment models.mp4 11.4 MB
  • mp402. Cloud Security Guidance/02_10 - Managing encryption and keys.mp4 10.8 MB
【影视】 Palo Alto Networks Cybersecurity Fundamentals (PCCSA)
收录时间:2022-02-19 文档个数:54 文档大小:4.5 GB 最近下载:2025-05-16 人气:8248 磁力链接
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/2. Identify Computing and Networking Trends.mp4 269.3 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/12. Identify Networking Security Technologies.mp4 267.8 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/3. Describe Cybersecurity Threats.mp4 243.2 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/5. Identify Wi-Fi Vulnerabilities and Attacks.mp4 231.3 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/10. Review Network Addressing.mp4 228.2 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/4. Describe Common Cyberattack Techniques.mp4 217.8 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/17. Endpoint Security.mp4 206.1 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/7. Identify Basic Internet and Network Operations.mp4 204.7 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/8. Describe Routing Protocols.mp4 196.9 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/15. Learn Basic Virtualization Security Concepts.mp4 190.8 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/9. Review Networking Models.mp4 190.3 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/18. Server and System Administration.mp4 186.8 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/26. Describe Cortex XSOAR and AutoFocus.mp4 177.9 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/16. Learn Basic DevOps Security Concepts.mp4 176.4 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/14. Learn Basic Cloud Security Concepts.mp4 169.8 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/11. Learn Networking Security Models.mp4 169.5 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/20. Identify Palo Alto Networks Security Solutions.mp4 168.8 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/21. Describe Basic NGFW Components and Functions.mp4 146.3 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/13. Learn Basic Data Center Security Concepts.mp4 134.9 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/22. Learn Basic Prisma Cloud.mp4 134.6 MB
【影视】 [ CourseHulu.com ] Linkedin - Building an ISO 27001-Compliant Cybersecurity Program - Getting Started
收录时间:2022-02-18 文档个数:63 文档大小:580.9 MB 最近下载:2025-05-15 人气:3341 磁力链接
  • mp4~Get Your Files Here !/6. Planning (Clause 6)/016. Information security risk assessment (Clause 6.1.2).mp4 55.1 MB
  • mp4~Get Your Files Here !/2. ISO 27001 Overview/003. What is the ISO 27001 standard.mp4 45.1 MB
  • mp4~Get Your Files Here !/3. Complying with ISO 27001/009. Building your ISO 27001 compliance plan.mp4 41.8 MB
  • mp4~Get Your Files Here !/3. Complying with ISO 27001/008. What to expect when getting ISO 27001 certified.mp4 38.6 MB
  • mp4~Get Your Files Here !/8. Performance Evaluation and Improvement (Clauses 9 and 10)/024. Internal audit (Clause 9.2).mp4 34.2 MB
  • mp4~Get Your Files Here !/2. ISO 27001 Overview/004. Breaking down the ISO 27001 standard.mp4 32.4 MB
  • mp4~Get Your Files Here !/7. Support and Operation (Clauses 7 and 8)/021. Documented information (Clause 7.5).mp4 32.4 MB
  • mp4~Get Your Files Here !/5. Leadership (Clause 5)/014. Policy (Clause 5.2).mp4 32.3 MB
  • mp4~Get Your Files Here !/2. ISO 27001 Overview/006. ISO 27001 gaps and criticisms.mp4 31.3 MB
  • mp4~Get Your Files Here !/3. Complying with ISO 27001/007. ISO 27001 compliance and certification.mp4 30.8 MB
  • mp4~Get Your Files Here !/5. Leadership (Clause 5)/013. Leadership and commitment (Clause 5.1).mp4 29.4 MB
  • mp4~Get Your Files Here !/6. Planning (Clause 6)/017. Information security risk treatment (Clause 6.1.3).mp4 27.9 MB
  • mp4~Get Your Files Here !/2. ISO 27001 Overview/005. Why build an ISO 27001-compliant cybersecurity program.mp4 27.0 MB
  • mp4~Get Your Files Here !/5. Leadership (Clause 5)/015. Organizational roles, responsibilities, and authorities (Clause 5.3).mp4 26.6 MB
  • mp4~Get Your Files Here !/6. Planning (Clause 6)/018. Information security objectives and planning to achieve them (Clause 6.2).mp4 23.8 MB
  • mp4~Get Your Files Here !/8. Performance Evaluation and Improvement (Clauses 9 and 10)/025. Management review (Clause 9.3).mp4 20.6 MB
  • mp4~Get Your Files Here !/7. Support and Operation (Clauses 7 and 8)/020. Communication (Clause 7.4).mp4 19.7 MB
  • mp4~Get Your Files Here !/9. Conclusion/027. Next steps to take with ISO 27001.mp4 11.6 MB
  • mp4~Get Your Files Here !/1. Introduction/001. The international standard for information security.mp4 10.1 MB
  • mp4~Get Your Files Here !/1. Introduction/002. Who this course is for and prerequisites.mp4 9.0 MB
【影视】 [ CourseLala.com ] Linkedin - IT and Cybersecurity Risk Management Essential Training
收录时间:2022-02-10 文档个数:52 文档大小:904.4 MB 最近下载:2025-05-02 人气:1812 磁力链接
  • mp4~Get Your Files Here !/4. IT Risk Management in Practice/019. IT risk management techniques.mp4 60.9 MB
  • mp4~Get Your Files Here !/3. IT Risk Management in Context/009. IT risk management in medium companies.mp4 58.5 MB
  • mp4~Get Your Files Here !/3. IT Risk Management in Context/010. IT risk management in large companies.mp4 57.2 MB
  • mp4~Get Your Files Here !/5. IT Risk Management on the Job/020. Choosing the right IT risk management technique.mp4 52.4 MB
  • mp4~Get Your Files Here !/5. IT Risk Management on the Job/023. Operating controls.mp4 47.2 MB
  • mp4~Get Your Files Here !/2. What Is IT Risk Management/002. What is IT risk.mp4 42.6 MB
  • mp4~Get Your Files Here !/4. IT Risk Management in Practice/014. Performing the IT risk assessment.mp4 41.3 MB
  • mp4~Get Your Files Here !/4. IT Risk Management in Practice/018. Using an IT risk register.mp4 40.9 MB
  • mp4~Get Your Files Here !/4. IT Risk Management in Practice/015. Choosing an IT risk management framework.mp4 40.0 MB
  • mp4~Get Your Files Here !/3. IT Risk Management in Context/008. IT risk management in small companies.mp4 39.5 MB
  • mp4~Get Your Files Here !/5. IT Risk Management on the Job/022. Implementing controls.mp4 35.1 MB
  • mp4~Get Your Files Here !/2. What Is IT Risk Management/006. IT risk management roles and responsibilities.mp4 34.9 MB
  • mp4~Get Your Files Here !/5. IT Risk Management on the Job/021. Choosing controls.mp4 34.4 MB
  • mp4~Get Your Files Here !/2. What Is IT Risk Management/007. Making an IT risk decision.mp4 33.9 MB
  • mp4~Get Your Files Here !/2. What Is IT Risk Management/005. Types of IT risks.mp4 33.3 MB
  • mp4~Get Your Files Here !/3. IT Risk Management in Context/013. The minimum viable approach.mp4 32.7 MB
  • mp4~Get Your Files Here !/3. IT Risk Management in Context/011. Quantitative vs. qualitative risk assessments.mp4 32.6 MB
  • mp4~Get Your Files Here !/4. IT Risk Management in Practice/017. Determining an acceptable level of IT risk.mp4 30.3 MB
  • mp4~Get Your Files Here !/5. IT Risk Management on the Job/024. Validating controls.mp4 29.9 MB
  • mp4~Get Your Files Here !/2. What Is IT Risk Management/004. What is IT risk tolerance.mp4 28.4 MB
【影视】 [ DevCourseWeb.com ] Udemy - Find Cybersecurity Jobs Using LinkedIn
收录时间:2022-02-10 文档个数:29 文档大小:1.7 GB 最近下载:2025-05-14 人气:885 磁力链接
  • mp4~Get Your Files Here !/02 - Reviewing Cybersecurity Jobs/001 Reviewing a Junior Penetration Testing (Ethical Hacking) Job.mp4 398.9 MB
  • mp4~Get Your Files Here !/05 - Personal Branding/001 Personal Branding.mp4 397.6 MB
  • mp4~Get Your Files Here !/02 - Reviewing Cybersecurity Jobs/002 Reviewing a GRC Analyst and Auditor Role.mp4 333.9 MB
  • mp4~Get Your Files Here !/03 - Your LinkedIn Profile/001 LinkedIn Profile Overview.mp4 183.6 MB
  • mp4~Get Your Files Here !/06 - LinkedIn Messaging and the Power of Networking/001 LinkedIn Messaging and the Power of Proper Networking.mp4 89.5 MB
  • mp4~Get Your Files Here !/07 - What did you learn in this course_/001 What did you learn in this course_.mp4 80.3 MB
  • mp3~Get Your Files Here !/05 - Personal Branding/37808632-Personal-Branding.mp3 55.3 MB
  • mp3~Get Your Files Here !/02 - Reviewing Cybersecurity Jobs/37807394-Pentester-search.mp3 48.8 MB
  • mp3~Get Your Files Here !/02 - Reviewing Cybersecurity Jobs/37807890-GRC-1.mp3 44.6 MB
  • mp4~Get Your Files Here !/04 - Using Canva for Your Cover Photo/001 How to use Canva for your LinkedIn cover photo.mp4 41.1 MB
  • mp4~Get Your Files Here !/01 - Introduction/001 Welcome and What You Will Learn in this Course.mp4 29.2 MB
  • mp3~Get Your Files Here !/04 - Using Canva for Your Cover Photo/37808202-Canva-audio-file.mp3 4.5 MB
  • mp3~Get Your Files Here !/01 - Introduction/37806270-Course-Introduction-1.mp3 1.2 MB
  • vtt~Get Your Files Here !/05 - Personal Branding/001 Personal Branding_en.vtt 95.6 kB
  • vtt~Get Your Files Here !/02 - Reviewing Cybersecurity Jobs/001 Reviewing a Junior Penetration Testing (Ethical Hacking) Job_en.vtt 85.1 kB
  • docx~Get Your Files Here !/05 - Personal Branding/37808618-Personal-Branding-1.mp4.docx 82.5 kB
  • vtt~Get Your Files Here !/02 - Reviewing Cybersecurity Jobs/002 Reviewing a GRC Analyst and Auditor Role_en.vtt 77.3 kB
  • docx~Get Your Files Here !/02 - Reviewing Cybersecurity Jobs/37807406-Pentester-search-1.mp4.docx 74.7 kB
  • docx~Get Your Files Here !/02 - Reviewing Cybersecurity Jobs/37807876-GRC.mp4.docx 68.1 kB
  • vtt~Get Your Files Here !/03 - Your LinkedIn Profile/001 LinkedIn Profile Overview_en.vtt 53.7 kB
【影视】 [ FreeCourseWeb.com ] Udemy - Master Cybersecurity,Ethical Hacking and Penetrating Testing (Updated 09 - 2021)
收录时间:2022-02-08 文档个数:66 文档大小:2.7 GB 最近下载:2025-05-15 人气:1511 磁力链接
  • mp4~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/8. What is Phishing, Vishing and SMShing.mp4 247.1 MB
  • mp4~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/2. Why You Need Security .mp4 189.8 MB
  • mp4~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4 180.0 MB
  • mp4~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/7. Spyware, Adware, Scareware, PUPs & Browser hijacking.mp4 178.9 MB
  • mp4~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/11. Setting up Labs.mp4 169.5 MB
  • mp4~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/9. Spamming & Doxing.mp4 168.1 MB
  • mp4~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/10. Social Engineering - Scams, Cons, Tricks and Fraud.mp4 163.0 MB
  • mp4~Get Your Files Here !/3. Exposing Hackers - Know Yourself/3. What is Privacy, Anonymity and Pseudonymity .mp4 158.8 MB
  • mp4~Get Your Files Here !/3. Exposing Hackers - Know Yourself/6. Threat Modelling And Risk Assessment.mp4 158.3 MB
  • mp4~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/6. Malware, Viruses, Root kits and RATs.mp4 152.7 MB
  • mp4~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/5. Hackers, crackers and cyber criminals.mp4 146.5 MB
  • mp4~Get Your Files Here !/3. Exposing Hackers - Know Yourself/8. Confidentiality, Integrity and Availability - (Security Attributes).mp4 141.8 MB
  • mp4~Get Your Files Here !/3. Exposing Hackers - Know Yourself/4. Security, Vulnerabilities, Threats and Adversaries.mp4 117.8 MB
  • mp4~Get Your Files Here !/3. Exposing Hackers - Know Yourself/2. Protect What You Value.mp4 93.7 MB
  • mp4~Get Your Files Here !/3. Exposing Hackers - Know Yourself/10. Zero Trust Model.mp4 85.7 MB
  • mp4~Get Your Files Here !/3. Exposing Hackers - Know Yourself/7. Security,Anonymity and Privacy.mp4 59.8 MB
  • mp4~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/1. What is Cybersecurity .mp4 34.8 MB
  • mp4~Get Your Files Here !/3. Exposing Hackers - Know Yourself/9. Defence in Depth.mp4 34.2 MB
  • mp4~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/8. Who Conduct it .mp4 26.4 MB
  • mp4~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/5. Purpose of Studying Ethical Hacking and Penetrating Testing.mp4 24.3 MB
【影视】 [ FreeCourseWeb.com ] Udemy - Cybersecurity For Beginners - Network Devices
收录时间:2022-01-31 文档个数:79 文档大小:980.5 MB 最近下载:2025-05-15 人气:1051 磁力链接
  • mp4~Get Your Files Here !/12. Lab Demonstration - Scanning Networks with NMAP/1. Lab Demonstration - Scanning Networks with NMAP Pt. 1.mp4 477.1 MB
  • mp4~Get Your Files Here !/12. Lab Demonstration - Scanning Networks with NMAP/2. Lab Demonstration - Scanning Networks with NMAP Pt. 2.mp4 331.7 MB
  • mp4~Get Your Files Here !/6. Denial-of-Service Attack (DoS) Attack/2. The 5 Principal Differences Between DoS & DDoS Attacks.mp4 14.1 MB
  • mp4~Get Your Files Here !/6. Denial-of-Service Attack (DoS) Attack/6. Common DoS Attack Pt. 2.mp4 9.8 MB
  • mp4~Get Your Files Here !/2. Network Devices/1. Common Network Devices.mp4 8.9 MB
  • mp4~Get Your Files Here !/1. The OSI Model/1. The OSI Model.mp4 7.8 MB
  • mp4~Get Your Files Here !/6. Denial-of-Service Attack (DoS) Attack/5. Common DoS Attack Pt. 1.mp4 6.9 MB
  • mp4~Get Your Files Here !/9. DNS Attacks/1. DNS Attacks.mp4 6.4 MB
  • mp4~Get Your Files Here !/2. Network Devices/2. More Common Network Devices.mp4 6.2 MB
  • mp4~Get Your Files Here !/6. Denial-of-Service Attack (DoS) Attack/1. DoS Vs. DDoS.mp4 6.0 MB
  • mp4~Get Your Files Here !/1. The OSI Model/3. Data Link Layer.mp4 5.7 MB
  • mp4~Get Your Files Here !/5. Intrusion Detection Systems (IDS) & Intrusion Prevention Systems (IPS)/2. Behavior Based IDS Vs. Knowledge Based IDS.mp4 5.5 MB
  • mp4~Get Your Files Here !/10. Footprinting/3. Footprinting Helps To.mp4 5.4 MB
  • mp4~Get Your Files Here !/10. Footprinting/4. Footprinting Methodology.mp4 5.4 MB
  • mp4~Get Your Files Here !/6. Denial-of-Service Attack (DoS) Attack/7. Three-Way-Handshake Importance To Network Attacks (SYN Flood).mp4 5.2 MB
  • mp4~Get Your Files Here !/4. Types of Firewalls/2. Types of Firewalls Pt. 2.mp4 5.1 MB
  • mp4~Get Your Files Here !/1. The OSI Model/2. Physical Layer.mp4 4.8 MB
  • mp4~Get Your Files Here !/4. Types of Firewalls/1. Types of Firewalls Pt. 1.mp4 4.6 MB
  • mp4~Get Your Files Here !/1. The OSI Model/4. Network Layer.mp4 4.5 MB
  • mp4~Get Your Files Here !/3. LAN & WAN Technologies/1. LAN & WAN Technologies.mp4 4.2 MB
【文档书籍】 Developing a Cybersecurity Immune System for Industry 4.0 by Sergei Petrenko PDF
收录时间:2022-01-30 文档个数:2 文档大小:207.7 MB 最近下载:2025-05-15 人气:1469 磁力链接
  • pdfDeveloping a Cybersecurity Immune System for Industry 4.0 by Sergei Petrenko.pdf 207.7 MB
  • txtmore books, audiobooks, magazines etc..txt 932 Bytes
共14页 上一页 5 6 7 8 9 10 11 12 13 下一页