为您索检到268条磁力链接,耗时1毫秒。
- 【压缩文件】 [ FreeCourseWeb.com ] Udemy - Intoduction to Cybersecurity !From beginner level to PRO !.zip
-
收录时间:2022-04-24
文档个数:1
文档大小:503.9 MB
最近下载:2025-05-14
人气:551
磁力链接
[ FreeCourseWeb.com ] Udemy - Intoduction to Cybersecurity !From beginner level to PRO !.zip 503.9 MB
猜你喜欢:
zip
beginner
level
Cybersecurity
PRO
Udemy
FreeCourseWeb
Intoduction
com
- 【影视】 [ CourseLala.com ] Udemy - Personal Digital Security Everyone Must Have - Cybersecurity
-
收录时间:2022-04-12
文档个数:76
文档大小:1.5 GB
最近下载:2025-05-10
人气:725
磁力链接
~Get Your Files Here !/02 - Secure your computer from unauthorized access/001 Social Engineering.mp4 157.3 MB
~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/007 Secure your Wi-Fi at Home (Video HD).mp4 103.2 MB
~Get Your Files Here !/02 - Secure your computer from unauthorized access/003 Use strong passwords.mp4 93.7 MB
~Get Your Files Here !/03 - What is Malware and its types/003 Spyware.mp4 66.9 MB
~Get Your Files Here !/06 - Secure your Smartphone/003 Communicating Securely with your Smartphone.mp4 64.7 MB
~Get Your Files Here !/03 - What is Malware and its types/002 Adware.mp4 63.9 MB
~Get Your Files Here !/05 - Email Security/002 Fishing.mp4 57.8 MB
~Get Your Files Here !/02 - Secure your computer from unauthorized access/012 Be cautious.mp4 54.8 MB
~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/002 Tips for buying online.mp4 46.0 MB
~Get Your Files Here !/06 - Secure your Smartphone/001 Purses, Wallets, Smartphones.mp4 43.1 MB
~Get Your Files Here !/03 - What is Malware and its types/001 Trojan Horse.mp4 39.6 MB
~Get Your Files Here !/03 - What is Malware and its types/007 Scareware.mp4 39.5 MB
~Get Your Files Here !/03 - What is Malware and its types/004 Browser Hijacking Software.mp4 37.3 MB
~Get Your Files Here !/02 - Secure your computer from unauthorized access/008 Use a VPN.mp4 36.0 MB
~Get Your Files Here !/03 - What is Malware and its types/005 Viruses.mp4 35.6 MB
~Get Your Files Here !/01 - Introduction to Personal Digital Security/003 Some statistics.mp4 35.0 MB
~Get Your Files Here !/02 - Secure your computer from unauthorized access/004 Use password manager.mp4 33.8 MB
~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/001 Safe browsing.mp4 31.8 MB
~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/008 Safe browsing in Social Networks.mp4 31.7 MB
~Get Your Files Here !/01 - Introduction to Personal Digital Security/001 Introduction to Personal Digital Security.mp4 30.4 MB
猜你喜欢:
Everyone
Personal
CourseLala
Udemy
Cybersecurity
Digital
Security
com
Must
- 【影视】 [ FreeCourseWeb.com ] Udemy - Cybersecurity Habits Masterclass
-
收录时间:2022-04-10
文档个数:93
文档大小:2.1 GB
最近下载:2025-05-15
人气:1566
磁力链接
~Get Your Files Here !/3. Skepticism/4. Slow Down And Frown.mp4 73.5 MB
~Get Your Files Here !/11. Conclusion/1. Well Awareiors.mp4 71.5 MB
~Get Your Files Here !/1. Introduction/1. Introduction.mp4 67.0 MB
~Get Your Files Here !/4. Vigilance/2. The Only Thing We Have To Fear.mp4 66.7 MB
~Get Your Files Here !/4. Vigilance/1. The Face Of The Enemy.mp4 66.5 MB
~Get Your Files Here !/5. Secrecy/2. Making It Personal.mp4 65.7 MB
~Get Your Files Here !/2. Literacy/5. Habits And Recipes.mp4 64.7 MB
~Get Your Files Here !/3. Skepticism/1. Zero Trust.mp4 64.5 MB
~Get Your Files Here !/8. Community/4. Habits And Recipes.mp4 57.4 MB
~Get Your Files Here !/8. Community/1. United We Stand.mp4 54.0 MB
~Get Your Files Here !/7. Diligence/3. Random Acts of Security.mp4 53.4 MB
~Get Your Files Here !/7. Diligence/2. Journaling.mp4 53.4 MB
~Get Your Files Here !/9. Mirroring/5. Habits And Recipes.mp4 52.0 MB
~Get Your Files Here !/6. Culture/1. Culture Eats Cybersecurity For Breakfast.mp4 51.4 MB
~Get Your Files Here !/10. Deception/1. Know Thy Enemy.mp4 49.4 MB
~Get Your Files Here !/9. Mirroring/3. Blindspots.mp4 49.1 MB
~Get Your Files Here !/3. Skepticism/2. The Pygmailion Effect.mp4 48.9 MB
~Get Your Files Here !/6. Culture/5. Habits And Recipes.mp4 48.0 MB
~Get Your Files Here !/2. Literacy/1. Fearless Learning.mp4 47.9 MB
~Get Your Files Here !/6. Culture/2. The Hermit Crab Shell.mp4 46.7 MB
猜你喜欢:
Cybersecurity
Masterclass
Udemy
Habits
FreeCourseWeb
com
- 【压缩文件】 [ FreeCourseWeb.com ] Udemy - Cybersecurity Data Science.zip
-
收录时间:2022-04-08
文档个数:1
文档大小:349.0 MB
最近下载:2025-05-15
人气:179
磁力链接
[ FreeCourseWeb.com ] Udemy - Cybersecurity Data Science.zip 349.0 MB
猜你喜欢:
zip
Data
Cybersecurity
Science
Udemy
FreeCourseWeb
com
- 【影视】 [ CourseMega.com ] Linkedin - Building an ISO 27001-Compliant Cybersecurity Program - The Annex A Controls
-
收录时间:2022-03-29
文档个数:110
文档大小:1.2 GB
最近下载:2025-05-16
人气:5902
磁力链接
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/013. Access control User access management.mp4 60.8 MB
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/028. System lifecycle Security in d.mp4 57.3 MB
~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/017. Physical and environmental security Equipme.mp4 57.2 MB
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/014. Access control System and application.mp4 55.8 MB
~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/032. Management of information security.mp4 54.7 MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/018. Operations security Operational procedures and responsibili.mp4 47.1 MB
~Get Your Files Here !/12. Compliance (Clause A.18)/034. Compliance Compliance with legal and contractual requirements (Claus.mp4 46.5 MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/021. Operations security Logging and monitoring (Clause A.12.4).mp4 45.6 MB
~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/033. Information security continuity an.mp4 45.5 MB
~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/016. Physical and environmental security Secure.mp4 44.8 MB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/004. Contact with auth.mp4 42.7 MB
~Get Your Files Here !/08. Communications Security (Clause A.13)/026. Communications security Information transfer (Clause A..mp4 40.7 MB
~Get Your Files Here !/04. Asset Management (Clause A.8)/010. Asset management Information classification (Clause A.8.2).mp4 40.5 MB
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/027. System lifecycle Security requ.mp4 37.2 MB
~Get Your Files Here !/03. Human Resources Security (Clause A.7)/007. Human resources security During employment (Clause A.7..mp4 34.4 MB
~Get Your Files Here !/08. Communications Security (Clause A.13)/025. Communications security Network security management (Cl.mp4 34.1 MB
~Get Your Files Here !/04. Asset Management (Clause A.8)/009. Asset management Responsibility for assets (Clause A.8.1).mp4 33.3 MB
~Get Your Files Here !/10. Supplier Relationships (Clause A.15)/030. Supplier relationships Information security in supplier.mp4 31.4 MB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/002. Management direct.mp4 31.1 MB
~Get Your Files Here !/04. Asset Management (Clause A.8)/011. Asset management Media handling (Clause A.8.3).mp4 30.4 MB
猜你喜欢:
Building
Annex
Cybersecurity
Linkedin
27001
Compliant
Program
ISO
Controls
CourseMega
- 【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity Threat Hunting Professional
-
收录时间:2022-03-20
文档个数:36
文档大小:1.0 GB
最近下载:2025-05-15
人气:2155
磁力链接
~Get Your Files Here !/2. Time to hunt/2. Practical Threat hunting Demo.mp4 121.9 MB
~Get Your Files Here !/2. Time to hunt/1. Case Base Threat Hunting.mp4 93.6 MB
~Get Your Files Here !/2. Time to hunt/3. Indicators of threat attacksIoC.mp4 86.1 MB
~Get Your Files Here !/1. Introduction/11. 7 Effective Threat Hunting Tips.mp4 81.5 MB
~Get Your Files Here !/1. Introduction/10. Hypothesis Testing & Sources of Hypothesis.mp4 78.6 MB
~Get Your Files Here !/4. Course Resources/1. Course Resources.mp4 72.6 MB
~Get Your Files Here !/3. Course Conclusion/1. Course Review.mp4 72.6 MB
~Get Your Files Here !/1. Introduction/8. What is Required for Successful Threat Hunting.mp4 71.2 MB
~Get Your Files Here !/1. Introduction/6. Terms associated with Threat Hunting.mp4 70.5 MB
~Get Your Files Here !/1. Introduction/4. Why threat hunt and attributes of an effective threat hunter.mp4 56.2 MB
~Get Your Files Here !/1. Introduction/9. Threat Hunting Approaches.mp4 55.0 MB
~Get Your Files Here !/1. Introduction/5. Threat Hunting Skillset Requirements.mp4 40.0 MB
~Get Your Files Here !/1. Introduction/7. Threat Hunting Loop.mp4 38.6 MB
~Get Your Files Here !/1. Introduction/2. What is Threat Hunting & Its Primary objective.mp4 35.9 MB
~Get Your Files Here !/1. Introduction/1. Introduction.mp4 29.5 MB
~Get Your Files Here !/1. Introduction/3. What is Threat Hunting & Its Primary objective..mp4 23.3 MB
~Get Your Files Here !/4. Course Resources/1.1 Network Threat Hunting with Tim Crothers.mp4 10.6 MB
~Get Your Files Here !/4. Course Resources/1.2 Resources Links for Threat Hunting Course.pdf 435.7 kB
~Get Your Files Here !/2. Time to hunt/2. Practical Threat hunting Demo.srt 11.9 kB
~Get Your Files Here !/2. Time to hunt/3. Indicators of threat attacksIoC.srt 8.3 kB
猜你喜欢:
Hunting
Cybersecurity
Udemy
DevCourseWeb
Threat
Professional
com
- 【影视】 [ FreeCourseWeb.com ] Udemy - Master Cybersecurity,Ethical Hacking and Penetrating Testing
-
收录时间:2022-03-15
文档个数:50
文档大小:1.6 GB
最近下载:2025-05-16
人气:2202
磁力链接
~Get Your Files Here !/04 Exposing Hackers - Know Your Enemy/002 Why You Need Security _.mp4 189.8 MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/011 Setting up Labs.mp4 169.5 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/003 What is Privacy, Anonymity and Pseudonymity _.mp4 158.8 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/006 Threat Modelling And Risk Assessment.mp4 158.3 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/008 Confidentiality, Integrity and Availability - (Security Attributes).mp4 141.8 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/004 Security, Vulnerabilities, Threats and Adversaries.mp4 117.8 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/005 Asset Selection.mp4 94.5 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/002 Protect What You Value.mp4 93.7 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/010 Zero Trust Model.mp4 85.7 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/007 Security,Anonymity and Privacy.mp4 59.8 MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/001 What is Cybersecurity _.mp4 34.8 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/009 Defence in Depth.mp4 34.2 MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/008 Who Conduct it _.mp4 26.4 MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/002 What is Ethical Hacking _.mp4 25.8 MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/005 Purpose of Studying Ethical Hacking and Penetrating Testing.mp4 24.3 MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/010 Closure.mp4 23.6 MB
~Get Your Files Here !/04 Exposing Hackers - Know Your Enemy/001 Goals and Learning Objectives - Know Your Enemy.mp4 21.8 MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/009 Who should You Choose _.mp4 20.6 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/001 Goals and Learning Objectives.mp4 19.7 MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/006 Scope For Ethical Hackers and Penetrating Testers.mp4 18.5 MB
猜你喜欢:
Ethical
Penetrating
Cybersecurity
Testing
Udemy
Master
FreeCourseWeb
Hacking
com
- 【压缩文件】 [ FreeCourseWeb.com ] Udemy - Cybersecurity fundamentals.zip
-
收录时间:2022-03-07
文档个数:1
文档大小:568.6 MB
最近下载:2025-04-26
人气:261
磁力链接
[ FreeCourseWeb.com ] Udemy - Cybersecurity fundamentals.zip 568.6 MB
猜你喜欢:
zip
Cybersecurity
Udemy
fundamentals
FreeCourseWeb
com
- 【音乐】 Trust Genics - 2020 - Cybersecurity (Technology)
-
收录时间:2022-03-05
文档个数:10
文档大小:109.7 MB
最近下载:2025-05-15
人气:1428
磁力链接
Cybersecurity.mp3 109.7 MB
Cybersecurity.jpg 52.5 kB
Cybersecurity - Trust Genics - 2020.txt 2.1 kB
Downloaded From TorrentGalaxy.txt 583 Bytes
Downloaded From Glodls.txt 237 Bytes
Downloaded From ETTV.txt 138 Bytes
Downloaded From ProStyleX.txt 101 Bytes
Downloaded From 1337X.txt 96 Bytes
Downloaded From Demonoid.txt 50 Bytes
Downloaded From Katcr.co.txt 43 Bytes
猜你喜欢:
Cybersecurity
Technology
Trust
2020
Genics
- 【影视】 [ FreeCourseWeb.com ] Linkedin - Cybersecurity Awareness - Phishing Attacks
-
收录时间:2022-03-04
文档个数:39
文档大小:642.7 MB
最近下载:2025-05-02
人气:1592
磁力链接
~Get Your Files Here !/4. How to Catch a Phish/012. Catch a phish red-handed Common indicators of a phish.mp4 48.9 MB
~Get Your Files Here !/3. Different Types of Phishing Attacks/010. Other notable methods of phishing.mp4 47.3 MB
~Get Your Files Here !/2. An Overview of Phishing/004. How does phishing affect us.mp4 46.9 MB
~Get Your Files Here !/2. An Overview of Phishing/005. A review of the psychology behind social engineering attacks.mp4 45.0 MB
~Get Your Files Here !/5. How to Defend against Phishing Attacks/015. How technology helps with the fight against phishing attacks.mp4 41.6 MB
~Get Your Files Here !/4. How to Catch a Phish/013. Is this a phish Real-world examples of phishing attacks.mp4 38.5 MB
~Get Your Files Here !/3. Different Types of Phishing Attacks/007. Unfriended How to spot a social media phish.mp4 38.5 MB
~Get Your Files Here !/4. How to Catch a Phish/011. What makes phishing attacks successful.mp4 36.9 MB
~Get Your Files Here !/3. Different Types of Phishing Attacks/008. Getting specific with targeted phishing attacks.mp4 34.9 MB
~Get Your Files Here !/3. Different Types of Phishing Attacks/006. Is it a harmless unknown caller or vishing.mp4 34.6 MB
~Get Your Files Here !/6. What Happens If You Fall for a Phish/018. Falling for a phishing attack at home.mp4 34.5 MB
~Get Your Files Here !/2. An Overview of Phishing/003. Money is the motive The reason behind phishing.mp4 34.1 MB
~Get Your Files Here !/5. How to Defend against Phishing Attacks/016. Practice makes perfect An overview of phishing simulations.mp4 32.6 MB
~Get Your Files Here !/2. An Overview of Phishing/002. Phishing The dangers of email.mp4 32.3 MB
~Get Your Files Here !/3. Different Types of Phishing Attacks/009. SMS phishing A text-based attack.mp4 31.8 MB
~Get Your Files Here !/6. What Happens If You Fall for a Phish/017. Responding to a phishing attack at work.mp4 23.4 MB
~Get Your Files Here !/5. How to Defend against Phishing Attacks/014. The most common ways to defend against a phish.mp4 23.1 MB
~Get Your Files Here !/1. Introduction/001. About phishing attacks.mp4 9.8 MB
~Get Your Files Here !/7. Conclusion/019. Next steps and takeaways.mp4 7.8 MB
~Get Your Files Here !/Ex_Files_Cybersecurity_Awareness_Phishing_Attacks/Exercise Files/Additional Resources.pdf 47.6 kB
猜你喜欢:
Attacks
Cybersecurity
Linkedin
Phishing
FreeCourseWeb
com
Awareness
- 【影视】 Pluralsight - Cybersecurity Threats: Ransomware
-
收录时间:2022-02-22
文档个数:37
文档大小:388.1 MB
最近下载:2025-01-10
人气:15
磁力链接
5. Incident Response - Eradication and Recovery/29. NoMoreRansom.org.mp4 71.4 MB
2. What Is Ransomware/09. Demo of Real World Ransomware Attack.mp4 52.0 MB
5. Incident Response - Eradication and Recovery/30. Paying the Ransom.mp4 22.3 MB
2. What Is Ransomware/03. Definition and Types of Ransomware.mp4 20.3 MB
2. What Is Ransomware/04. The Ransomware Timeline.mp4 15.2 MB
5. Incident Response - Eradication and Recovery/27. Recovery Cloud Storage Files, Dropbox, and OneDrive.mp4 15.1 MB
2. What Is Ransomware/06. How Big Is the Problem.mp4 15.1 MB
2. What Is Ransomware/07. Ransomware Victims.mp4 11.7 MB
6. Countermeasures and Preparing Your Incident Response/33. Defending a Ransomware Attack.mp4 11.4 MB
6. Countermeasures and Preparing Your Incident Response/36. Lessons Learned and Your Incident Response Plan.mp4 10.9 MB
3. Ransomware Entry Points/14. Phishing and Email Attachments.mp4 10.6 MB
4. Incident Response - Detection and Containment/22. Containing the Attack.mp4 9.0 MB
6. Countermeasures and Preparing Your Incident Response/34. Protecting a Windows Network.mp4 8.0 MB
4. Incident Response - Detection and Containment/21. Detecting an Attack.mp4 7.3 MB
5. Incident Response - Eradication and Recovery/26. Recovery Local and Network Files.mp4 7.3 MB
3. Ransomware Entry Points/17. Command and Callback (C&C) and Indicators of Compromise.mp4 7.0 MB
5. Incident Response - Eradication and Recovery/28. Tools and Resources.mp4 6.7 MB
2. What Is Ransomware/10. Variations of Ransomware.mp4 6.4 MB
3. Ransomware Entry Points/15. Embedded Hyperlinks, Websites_downloads, and Drive-by Infections.mp4 6.2 MB
5. Incident Response - Eradication and Recovery/31. Summary.mp4 6.0 MB
猜你喜欢:
Cybersecurity
Pluralsight
Threats
Ransomware
- 【影视】 [ FreeCourseWeb.com ] Udemy - The Complete Cybersecurity Awareness Course For Employees
-
收录时间:2022-02-21
文档个数:26
文档大小:1.1 GB
最近下载:2025-05-13
人气:1485
磁力链接
~Get Your Files Here !/4. Social Engineering and Countermeasures/3. Types of Social Engineering Attacks.mp4 92.1 MB
~Get Your Files Here !/1. Introduction to the Cybersecurity Space/1. Cybersecurity Introduction and Trends.mp4 81.4 MB
~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/7. Malware and Types of Malware.mp4 78.6 MB
~Get Your Files Here !/1. Introduction to the Cybersecurity Space/3. Definitions and Key Terms in Cybersecurity.mp4 74.9 MB
~Get Your Files Here !/2. Cybersecurity Roles and Actors/1. Cybersecurity Roles.mp4 72.2 MB
~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/12. Anti-Malware Protection.mp4 68.9 MB
~Get Your Files Here !/2. Cybersecurity Roles and Actors/4. Security Operations Center.mp4 56.2 MB
~Get Your Files Here !/4. Social Engineering and Countermeasures/5. Social Engineering Countermeasures.mp4 50.8 MB
~Get Your Files Here !/5. Cybersecurity Internal Affairs and Controls/11. Cybersecurity Organizations That Are Resourceful.mp4 44.7 MB
~Get Your Files Here !/5. Cybersecurity Internal Affairs and Controls/1. Privacy Policy.mp4 41.7 MB
~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/19. More Countermeasures - Vulnerability Assessments.mp4 41.1 MB
~Get Your Files Here !/5. Cybersecurity Internal Affairs and Controls/7. Incident Handling.mp4 38.9 MB
~Get Your Files Here !/5. Cybersecurity Internal Affairs and Controls/9. IT Governance.mp4 36.1 MB
~Get Your Files Here !/2. Cybersecurity Roles and Actors/7. The Different Types of Cybersecurity Actors.mp4 33.5 MB
~Get Your Files Here !/1. Introduction to the Cybersecurity Space/6. Cybersecurity and Social Media.mp4 33.5 MB
~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/17. More Countermeasures -Digital Forensics.mp4 30.5 MB
~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/23. More on Tech and Admin Controls.mp4 30.3 MB
~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/1. Security Threats.mp4 28.4 MB
~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/21. How To Start and Cybersecurity Program.mp4 27.4 MB
~Get Your Files Here !/5. Cybersecurity Internal Affairs and Controls/3. Good User Habits.mp4 27.0 MB
猜你喜欢:
Complete
Cybersecurity
Employees
Udemy
Course
FreeCourseWeb
com
Awareness
- 【影视】 [TutorialPace.com] Lynda - Cybersecurity with Cloud Computing - [TP]
-
收录时间:2022-02-20
文档个数:38
文档大小:371.6 MB
最近下载:2025-05-15
人气:2055
磁力链接
00. Introduction/00_01 - Welcome.mp4 17.4 MB
00. Introduction/00_03 - Reference sites.mp4 16.6 MB
01. Cloud Fundamentals/01_01 - Defining the essential characteristics of cloud.mp4 15.8 MB
02. Cloud Security Guidance/02_03 - Managing information and data security.mp4 15.6 MB
03. Architecting Security/03_05 - Introducing cloud attribute taxonomy.mp4 15.5 MB
03. Architecting Security/03_01 - Introducing SABSA.mp4 15.3 MB
01. Cloud Fundamentals/01_06 - Identifying cloud incidents.mp4 15.2 MB
01. Cloud Fundamentals/01_09 - Defining trust models for cloud.mp4 14.0 MB
02. Cloud Security Guidance/02_16 - Solution Cloud security knowledge.mp4 13.8 MB
02. Cloud Security Guidance/02_02 - Complying with legal and audit requrements.mp4 13.1 MB
02. Cloud Security Guidance/02_11 - Verifying identity in the cloud.mp4 13.1 MB
02. Cloud Security Guidance/02_07 - Managing incident response.mp4 12.9 MB
02. Cloud Security Guidance/02_13 - Implementing virtualization.mp4 12.9 MB
02. Cloud Security Guidance/02_12 - Controlling cloud access.mp4 12.5 MB
02. Cloud Security Guidance/02_08 - Maximizing application security.mp4 12.3 MB
03. Architecting Security/03_02 - Using Fast Tracker.mp4 12.0 MB
02. Cloud Security Guidance/02_05 - Comparing traditional IT, BCP, and DR.mp4 12.0 MB
01. Cloud Fundamentals/01_02 - Understanding infrastructure as a service.mp4 11.9 MB
01. Cloud Fundamentals/01_05 - Discovering deployment models.mp4 11.4 MB
02. Cloud Security Guidance/02_10 - Managing encryption and keys.mp4 10.8 MB
猜你喜欢:
Computing
Cybersecurity
Lynda
TP
TutorialPace
com
Cloud
- 【影视】 Palo Alto Networks Cybersecurity Fundamentals (PCCSA)
-
收录时间:2022-02-19
文档个数:54
文档大小:4.5 GB
最近下载:2025-05-16
人气:8248
磁力链接
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/2. Identify Computing and Networking Trends.mp4 269.3 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/12. Identify Networking Security Technologies.mp4 267.8 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/3. Describe Cybersecurity Threats.mp4 243.2 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/5. Identify Wi-Fi Vulnerabilities and Attacks.mp4 231.3 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/10. Review Network Addressing.mp4 228.2 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/4. Describe Common Cyberattack Techniques.mp4 217.8 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/17. Endpoint Security.mp4 206.1 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/7. Identify Basic Internet and Network Operations.mp4 204.7 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/8. Describe Routing Protocols.mp4 196.9 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/15. Learn Basic Virtualization Security Concepts.mp4 190.8 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/9. Review Networking Models.mp4 190.3 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/18. Server and System Administration.mp4 186.8 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/26. Describe Cortex XSOAR and AutoFocus.mp4 177.9 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/16. Learn Basic DevOps Security Concepts.mp4 176.4 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/14. Learn Basic Cloud Security Concepts.mp4 169.8 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/11. Learn Networking Security Models.mp4 169.5 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/20. Identify Palo Alto Networks Security Solutions.mp4 168.8 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/21. Describe Basic NGFW Components and Functions.mp4 146.3 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/13. Learn Basic Data Center Security Concepts.mp4 134.9 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/22. Learn Basic Prisma Cloud.mp4 134.6 MB
猜你喜欢:
Alto
Cybersecurity
Fundamentals
PCCSA
Palo
Networks
- 【影视】 [ CourseHulu.com ] Linkedin - Building an ISO 27001-Compliant Cybersecurity Program - Getting Started
-
收录时间:2022-02-18
文档个数:63
文档大小:580.9 MB
最近下载:2025-05-15
人气:3341
磁力链接
~Get Your Files Here !/6. Planning (Clause 6)/016. Information security risk assessment (Clause 6.1.2).mp4 55.1 MB
~Get Your Files Here !/2. ISO 27001 Overview/003. What is the ISO 27001 standard.mp4 45.1 MB
~Get Your Files Here !/3. Complying with ISO 27001/009. Building your ISO 27001 compliance plan.mp4 41.8 MB
~Get Your Files Here !/3. Complying with ISO 27001/008. What to expect when getting ISO 27001 certified.mp4 38.6 MB
~Get Your Files Here !/8. Performance Evaluation and Improvement (Clauses 9 and 10)/024. Internal audit (Clause 9.2).mp4 34.2 MB
~Get Your Files Here !/2. ISO 27001 Overview/004. Breaking down the ISO 27001 standard.mp4 32.4 MB
~Get Your Files Here !/7. Support and Operation (Clauses 7 and 8)/021. Documented information (Clause 7.5).mp4 32.4 MB
~Get Your Files Here !/5. Leadership (Clause 5)/014. Policy (Clause 5.2).mp4 32.3 MB
~Get Your Files Here !/2. ISO 27001 Overview/006. ISO 27001 gaps and criticisms.mp4 31.3 MB
~Get Your Files Here !/3. Complying with ISO 27001/007. ISO 27001 compliance and certification.mp4 30.8 MB
~Get Your Files Here !/5. Leadership (Clause 5)/013. Leadership and commitment (Clause 5.1).mp4 29.4 MB
~Get Your Files Here !/6. Planning (Clause 6)/017. Information security risk treatment (Clause 6.1.3).mp4 27.9 MB
~Get Your Files Here !/2. ISO 27001 Overview/005. Why build an ISO 27001-compliant cybersecurity program.mp4 27.0 MB
~Get Your Files Here !/5. Leadership (Clause 5)/015. Organizational roles, responsibilities, and authorities (Clause 5.3).mp4 26.6 MB
~Get Your Files Here !/6. Planning (Clause 6)/018. Information security objectives and planning to achieve them (Clause 6.2).mp4 23.8 MB
~Get Your Files Here !/8. Performance Evaluation and Improvement (Clauses 9 and 10)/025. Management review (Clause 9.3).mp4 20.6 MB
~Get Your Files Here !/7. Support and Operation (Clauses 7 and 8)/020. Communication (Clause 7.4).mp4 19.7 MB
~Get Your Files Here !/9. Conclusion/027. Next steps to take with ISO 27001.mp4 11.6 MB
~Get Your Files Here !/1. Introduction/001. The international standard for information security.mp4 10.1 MB
~Get Your Files Here !/1. Introduction/002. Who this course is for and prerequisites.mp4 9.0 MB
猜你喜欢:
Building
Getting
Cybersecurity
Linkedin
27001
Started
CourseHulu
Compliant
Program
ISO
- 【影视】 [ CourseLala.com ] Linkedin - IT and Cybersecurity Risk Management Essential Training
-
收录时间:2022-02-10
文档个数:52
文档大小:904.4 MB
最近下载:2025-05-02
人气:1812
磁力链接
~Get Your Files Here !/4. IT Risk Management in Practice/019. IT risk management techniques.mp4 60.9 MB
~Get Your Files Here !/3. IT Risk Management in Context/009. IT risk management in medium companies.mp4 58.5 MB
~Get Your Files Here !/3. IT Risk Management in Context/010. IT risk management in large companies.mp4 57.2 MB
~Get Your Files Here !/5. IT Risk Management on the Job/020. Choosing the right IT risk management technique.mp4 52.4 MB
~Get Your Files Here !/5. IT Risk Management on the Job/023. Operating controls.mp4 47.2 MB
~Get Your Files Here !/2. What Is IT Risk Management/002. What is IT risk.mp4 42.6 MB
~Get Your Files Here !/4. IT Risk Management in Practice/014. Performing the IT risk assessment.mp4 41.3 MB
~Get Your Files Here !/4. IT Risk Management in Practice/018. Using an IT risk register.mp4 40.9 MB
~Get Your Files Here !/4. IT Risk Management in Practice/015. Choosing an IT risk management framework.mp4 40.0 MB
~Get Your Files Here !/3. IT Risk Management in Context/008. IT risk management in small companies.mp4 39.5 MB
~Get Your Files Here !/5. IT Risk Management on the Job/022. Implementing controls.mp4 35.1 MB
~Get Your Files Here !/2. What Is IT Risk Management/006. IT risk management roles and responsibilities.mp4 34.9 MB
~Get Your Files Here !/5. IT Risk Management on the Job/021. Choosing controls.mp4 34.4 MB
~Get Your Files Here !/2. What Is IT Risk Management/007. Making an IT risk decision.mp4 33.9 MB
~Get Your Files Here !/2. What Is IT Risk Management/005. Types of IT risks.mp4 33.3 MB
~Get Your Files Here !/3. IT Risk Management in Context/013. The minimum viable approach.mp4 32.7 MB
~Get Your Files Here !/3. IT Risk Management in Context/011. Quantitative vs. qualitative risk assessments.mp4 32.6 MB
~Get Your Files Here !/4. IT Risk Management in Practice/017. Determining an acceptable level of IT risk.mp4 30.3 MB
~Get Your Files Here !/5. IT Risk Management on the Job/024. Validating controls.mp4 29.9 MB
~Get Your Files Here !/2. What Is IT Risk Management/004. What is IT risk tolerance.mp4 28.4 MB
猜你喜欢:
Training
Management
Risk
Cybersecurity
CourseLala
Linkedin
com
Essential
- 【影视】 [ DevCourseWeb.com ] Udemy - Find Cybersecurity Jobs Using LinkedIn
-
收录时间:2022-02-10
文档个数:29
文档大小:1.7 GB
最近下载:2025-05-14
人气:885
磁力链接
~Get Your Files Here !/02 - Reviewing Cybersecurity Jobs/001 Reviewing a Junior Penetration Testing (Ethical Hacking) Job.mp4 398.9 MB
~Get Your Files Here !/05 - Personal Branding/001 Personal Branding.mp4 397.6 MB
~Get Your Files Here !/02 - Reviewing Cybersecurity Jobs/002 Reviewing a GRC Analyst and Auditor Role.mp4 333.9 MB
~Get Your Files Here !/03 - Your LinkedIn Profile/001 LinkedIn Profile Overview.mp4 183.6 MB
~Get Your Files Here !/06 - LinkedIn Messaging and the Power of Networking/001 LinkedIn Messaging and the Power of Proper Networking.mp4 89.5 MB
~Get Your Files Here !/07 - What did you learn in this course_/001 What did you learn in this course_.mp4 80.3 MB
~Get Your Files Here !/05 - Personal Branding/37808632-Personal-Branding.mp3 55.3 MB
~Get Your Files Here !/02 - Reviewing Cybersecurity Jobs/37807394-Pentester-search.mp3 48.8 MB
~Get Your Files Here !/02 - Reviewing Cybersecurity Jobs/37807890-GRC-1.mp3 44.6 MB
~Get Your Files Here !/04 - Using Canva for Your Cover Photo/001 How to use Canva for your LinkedIn cover photo.mp4 41.1 MB
~Get Your Files Here !/01 - Introduction/001 Welcome and What You Will Learn in this Course.mp4 29.2 MB
~Get Your Files Here !/04 - Using Canva for Your Cover Photo/37808202-Canva-audio-file.mp3 4.5 MB
~Get Your Files Here !/01 - Introduction/37806270-Course-Introduction-1.mp3 1.2 MB
~Get Your Files Here !/05 - Personal Branding/001 Personal Branding_en.vtt 95.6 kB
~Get Your Files Here !/02 - Reviewing Cybersecurity Jobs/001 Reviewing a Junior Penetration Testing (Ethical Hacking) Job_en.vtt 85.1 kB
~Get Your Files Here !/05 - Personal Branding/37808618-Personal-Branding-1.mp4.docx 82.5 kB
~Get Your Files Here !/02 - Reviewing Cybersecurity Jobs/002 Reviewing a GRC Analyst and Auditor Role_en.vtt 77.3 kB
~Get Your Files Here !/02 - Reviewing Cybersecurity Jobs/37807406-Pentester-search-1.mp4.docx 74.7 kB
~Get Your Files Here !/02 - Reviewing Cybersecurity Jobs/37807876-GRC.mp4.docx 68.1 kB
~Get Your Files Here !/03 - Your LinkedIn Profile/001 LinkedIn Profile Overview_en.vtt 53.7 kB
猜你喜欢:
Jobs
Cybersecurity
LinkedIn
Udemy
DevCourseWeb
Using
com
Find
- 【影视】 [ FreeCourseWeb.com ] Udemy - Master Cybersecurity,Ethical Hacking and Penetrating Testing (Updated 09 - 2021)
-
收录时间:2022-02-08
文档个数:66
文档大小:2.7 GB
最近下载:2025-05-15
人气:1511
磁力链接
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/8. What is Phishing, Vishing and SMShing.mp4 247.1 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/2. Why You Need Security .mp4 189.8 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4 180.0 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/7. Spyware, Adware, Scareware, PUPs & Browser hijacking.mp4 178.9 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/11. Setting up Labs.mp4 169.5 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/9. Spamming & Doxing.mp4 168.1 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/10. Social Engineering - Scams, Cons, Tricks and Fraud.mp4 163.0 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/3. What is Privacy, Anonymity and Pseudonymity .mp4 158.8 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/6. Threat Modelling And Risk Assessment.mp4 158.3 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/6. Malware, Viruses, Root kits and RATs.mp4 152.7 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/5. Hackers, crackers and cyber criminals.mp4 146.5 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/8. Confidentiality, Integrity and Availability - (Security Attributes).mp4 141.8 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/4. Security, Vulnerabilities, Threats and Adversaries.mp4 117.8 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/2. Protect What You Value.mp4 93.7 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/10. Zero Trust Model.mp4 85.7 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/7. Security,Anonymity and Privacy.mp4 59.8 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/1. What is Cybersecurity .mp4 34.8 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/9. Defence in Depth.mp4 34.2 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/8. Who Conduct it .mp4 26.4 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/5. Purpose of Studying Ethical Hacking and Penetrating Testing.mp4 24.3 MB
猜你喜欢:
Ethical
Penetrating
09
Cybersecurity
Testing
Updated
Udemy
Master
2021
FreeCourseWeb
- 【影视】 [ FreeCourseWeb.com ] Udemy - Cybersecurity For Beginners - Network Devices
-
收录时间:2022-01-31
文档个数:79
文档大小:980.5 MB
最近下载:2025-05-15
人气:1051
磁力链接
~Get Your Files Here !/12. Lab Demonstration - Scanning Networks with NMAP/1. Lab Demonstration - Scanning Networks with NMAP Pt. 1.mp4 477.1 MB
~Get Your Files Here !/12. Lab Demonstration - Scanning Networks with NMAP/2. Lab Demonstration - Scanning Networks with NMAP Pt. 2.mp4 331.7 MB
~Get Your Files Here !/6. Denial-of-Service Attack (DoS) Attack/2. The 5 Principal Differences Between DoS & DDoS Attacks.mp4 14.1 MB
~Get Your Files Here !/6. Denial-of-Service Attack (DoS) Attack/6. Common DoS Attack Pt. 2.mp4 9.8 MB
~Get Your Files Here !/2. Network Devices/1. Common Network Devices.mp4 8.9 MB
~Get Your Files Here !/1. The OSI Model/1. The OSI Model.mp4 7.8 MB
~Get Your Files Here !/6. Denial-of-Service Attack (DoS) Attack/5. Common DoS Attack Pt. 1.mp4 6.9 MB
~Get Your Files Here !/9. DNS Attacks/1. DNS Attacks.mp4 6.4 MB
~Get Your Files Here !/2. Network Devices/2. More Common Network Devices.mp4 6.2 MB
~Get Your Files Here !/6. Denial-of-Service Attack (DoS) Attack/1. DoS Vs. DDoS.mp4 6.0 MB
~Get Your Files Here !/1. The OSI Model/3. Data Link Layer.mp4 5.7 MB
~Get Your Files Here !/5. Intrusion Detection Systems (IDS) & Intrusion Prevention Systems (IPS)/2. Behavior Based IDS Vs. Knowledge Based IDS.mp4 5.5 MB
~Get Your Files Here !/10. Footprinting/3. Footprinting Helps To.mp4 5.4 MB
~Get Your Files Here !/10. Footprinting/4. Footprinting Methodology.mp4 5.4 MB
~Get Your Files Here !/6. Denial-of-Service Attack (DoS) Attack/7. Three-Way-Handshake Importance To Network Attacks (SYN Flood).mp4 5.2 MB
~Get Your Files Here !/4. Types of Firewalls/2. Types of Firewalls Pt. 2.mp4 5.1 MB
~Get Your Files Here !/1. The OSI Model/2. Physical Layer.mp4 4.8 MB
~Get Your Files Here !/4. Types of Firewalls/1. Types of Firewalls Pt. 1.mp4 4.6 MB
~Get Your Files Here !/1. The OSI Model/4. Network Layer.mp4 4.5 MB
~Get Your Files Here !/3. LAN & WAN Technologies/1. LAN & WAN Technologies.mp4 4.2 MB
猜你喜欢:
Network
Cybersecurity
Devices
Udemy
Beginners
FreeCourseWeb
com
- 【文档书籍】 Developing a Cybersecurity Immune System for Industry 4.0 by Sergei Petrenko PDF
-
收录时间:2022-01-30
文档个数:2
文档大小:207.7 MB
最近下载:2025-05-15
人气:1469
磁力链接
Developing a Cybersecurity Immune System for Industry 4.0 by Sergei Petrenko.pdf 207.7 MB
more books, audiobooks, magazines etc..txt 932 Bytes
猜你喜欢:
Sergei
4.0
Developing
Cybersecurity
Industry
System
Immune
PDF
Petrenko