为您索检到268条磁力链接,耗时0毫秒。
- 【影视】 Cybersecurity Fundamentals - Become a Security Expert
-
收录时间:2023-12-18
文档个数:127
文档大小:6.5 GB
最近下载:2025-05-16
人气:8769
磁力链接
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/3. Passwords, MFA and Good Practices/2. Password Security.mp4 337.8 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/11. Test Your Environment/2. Penetration Testing Fundamentals.mp4 297.2 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/5. Protecting Servers, Computers + Smart Devices/1. Protect Your Device - Server Security.mp4 264.2 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/9. Get Compliant/1. Cybersecurity Regulations and Standards.mp4 252.5 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/6. Security When Online/3. Cloud Security.mp4 245.8 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/5. Protecting Servers, Computers + Smart Devices/4. Protect Your Device - iPhone Security.mp4 245.2 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/4. Using Firewalls, VPN, IDS/1. Network Security Top Tips.mp4 243.1 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/3. Passwords, MFA and Good Practices/1. Software Updates.mp4 234.8 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/5. Protecting Servers, Computers + Smart Devices/2. Protect Your Device - Desktop + Laptop Security.mp4 230.4 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/5. Protecting Servers, Computers + Smart Devices/5. 03 Protect Your Device - iPad Security.mp4 228.5 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/10. Training and Certifications/2. Cybersecurity Awareness and Training.mp4 227.9 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/10. Training and Certifications/1. Cybersecurity Certifications.mp4 214.9 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/2. Cybersecurity Threats and Attacks/4. Social Engineering.mp4 207.5 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/2. Cybersecurity Threats and Attacks/1. Threat and Attack Types.mp4 204.6 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/9. Get Compliant/2. Disaster Recovery and Business Continuity Planning.mp4 178.0 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/5. Protecting Servers, Computers + Smart Devices/3. Protect Your Device - macOS Security.mp4 169.2 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/6. Security When Online/1. Best Ways to Stay Safe Online.mp4 165.0 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/2. Cybersecurity Threats and Attacks/2. Malware.mp4 149.8 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/3. Passwords, MFA and Good Practices/4. Multi-Factor Authentication.mp4 145.9 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/3. Passwords, MFA and Good Practices/6. Setting up Data Encryption on Windows and Mac.mp4 143.8 MB
猜你喜欢:
Cybersecurity
Fundamentals
Security
Expert
Become
- 【影视】 Udemy - Sicurezza Informatica e CyberSecurity per Principianti! [Ita]
-
收录时间:2023-12-19
文档个数:211
文档大小:7.7 GB
最近下载:2025-05-15
人气:8528
磁力链接
5. HIDS - Host Intrusion DetectionPrevention System/3. Installazione OSSEC - Componente AGENT.mp4 164.1 MB
2. Analisi del Traffico di Rete/12. Analisi del Protocollo TCP.mp4 123.1 MB
11. System Inventory Tool/7. Installazione di ReactOS.mp4 105.4 MB
3. Firewalling/30. pfSense - Il servizio DNS.mp4 99.8 MB
2. Analisi del Traffico di Rete/16. Analisi della Scansione SYN SCAN con ZenMap.mp4 97.3 MB
2. Analisi del Traffico di Rete/7. Analisi del Protocollo ARP.mp4 93.6 MB
4. IDS IPS - Intrusion DetectionPrevention System/18. SNORT - Rilevamento Pacchetti ICMP.mp4 88.0 MB
16. BONUS 2 Deep Web - Un'introduzione/7. Introduzione a TAILS.mp4 85.8 MB
15. BONUS 1 Labtainers - Un Laboratorio di Cyber Security/8. Laboratorio TELNET.mp4 84.4 MB
14. Linux Hardening - Le Basi/6. Utilizzo di TCPDUMP per l'Analisi del Traffico di Rete.mp4 77.3 MB
16. BONUS 2 Deep Web - Un'introduzione/5. Rete TOR su WIndows.mp4 76.2 MB
14. Linux Hardening - Le Basi/1. Configurazione Utenti con Sudo Access.mp4 71.3 MB
12. Honeypot/5. Scansione e Rilevamento utilizzando Kali Linux e KFsensor.mp4 69.9 MB
10. SIEM - Security Information and Event Management/4. Caricamento Manuale dei Dati.mp4 67.1 MB
2. Analisi del Traffico di Rete/9. Analisi del Protocollo DNS.mp4 65.6 MB
12. Honeypot/6. Modifica delle Porte TCPUDP.mp4 65.2 MB
4. IDS IPS - Intrusion DetectionPrevention System/29. SNORT - Rilevamento Scansione FIN XMAS Scan.mp4 63.8 MB
3. Firewalling/16. Analisi del Traffico di Rete.mp4 62.9 MB
4. IDS IPS - Intrusion DetectionPrevention System/26. SNORT - Rilevamento Scansione Ping Sweep.mp4 62.0 MB
14. Linux Hardening - Le Basi/5. AbilitazioneDisabilitazione di Account.mp4 61.4 MB
猜你喜欢:
Principianti
CyberSecurity
Informatica
Sicurezza
per
Udemy
Ita
- 【影视】 Palo Alto Networks Cybersecurity Fundamentals (PCCSA)
-
收录时间:2022-02-19
文档个数:54
文档大小:4.5 GB
最近下载:2025-05-16
人气:8248
磁力链接
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/2. Identify Computing and Networking Trends.mp4 269.3 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/12. Identify Networking Security Technologies.mp4 267.8 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/3. Describe Cybersecurity Threats.mp4 243.2 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/5. Identify Wi-Fi Vulnerabilities and Attacks.mp4 231.3 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/10. Review Network Addressing.mp4 228.2 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/4. Describe Common Cyberattack Techniques.mp4 217.8 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/17. Endpoint Security.mp4 206.1 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/7. Identify Basic Internet and Network Operations.mp4 204.7 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/8. Describe Routing Protocols.mp4 196.9 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/15. Learn Basic Virtualization Security Concepts.mp4 190.8 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/9. Review Networking Models.mp4 190.3 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/18. Server and System Administration.mp4 186.8 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/26. Describe Cortex XSOAR and AutoFocus.mp4 177.9 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/16. Learn Basic DevOps Security Concepts.mp4 176.4 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/14. Learn Basic Cloud Security Concepts.mp4 169.8 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/11. Learn Networking Security Models.mp4 169.5 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/20. Identify Palo Alto Networks Security Solutions.mp4 168.8 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/21. Describe Basic NGFW Components and Functions.mp4 146.3 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/13. Learn Basic Data Center Security Concepts.mp4 134.9 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/22. Learn Basic Prisma Cloud.mp4 134.6 MB
猜你喜欢:
Alto
Cybersecurity
Fundamentals
PCCSA
Palo
Networks
- 【影视】 The Absolute Beginners Guide to Cybersecurity
-
收录时间:2023-12-17
文档个数:185
文档大小:7.5 GB
最近下载:2025-05-16
人气:7723
磁力链接
Part 04 July 2023/Chapter 06 Conclusion/001. You Have Been HACKED - Now What.mp4 193.9 MB
Part 04 July 2023/Chapter 01 Introduction/002. Personal Cybersecurity - What I Do.mp4 193.1 MB
Part 01 December 2022/Chapter 07 Cyber Warfare and Cyber Attacks Against Companies/002. The Attack Against Estonia.mp4 187.3 MB
Part 01 December 2022/Chapter 05 Defenses/009. Password Management.mp4 133.9 MB
Part 03 June 2023/Chapter 03 Mobile Threats and Countermeasures/007. How to Use Malwarebytes.mp4 126.9 MB
Part 01 December 2022/Chapter 02 Hackers - Who Are They/002. What Is NOT Hacking.mp4 118.6 MB
Part 04 July 2023/Chapter 05 Mobile Security/003. Checking Default App Permissions - Android.mp4 115.6 MB
Part 03 June 2023/Chapter 02 Understanding Applications/007. Checking Default App Permissions - Android.mp4 115.4 MB
Part 02 December 2022/Chapter 01 Introduction/001. Welcome to the Course.mp4 115.3 MB
Part 04 July 2023/Chapter 01 Introduction/001. Welcome to the Course.mp4 106.5 MB
Part 01 December 2022/Chapter 07 Cyber Warfare and Cyber Attacks Against Companies/003. Stuxnet and the Attack Against Iran.mp4 105.1 MB
Part 03 June 2023/Chapter 04 Mobile Security Apps/002. How to Use NordVPN.mp4 101.4 MB
Part 02 December 2022/Chapter 07 Social Engineering - Scams, Cons, Tricks, and Fraud/003. Reconnaissance Methods.mp4 94.3 MB
Part 04 July 2023/Chapter 03 Personal Security/005. Protecting Yourself Against SIM Card Swap Fraud.mp4 93.5 MB
Part 01 December 2022/Chapter 02 Hackers - Who Are They/006. Social Engineering.mp4 89.9 MB
Part 01 December 2022/Chapter 06 Cyber Security at the Workplace/005. The Security Versus Ease of Access Paradox.mp4 88.6 MB
Part 01 December 2022/Chapter 06 Cyber Security at the Workplace/003. BYOD Management.mp4 87.6 MB
Part 04 July 2023/Chapter 05 Mobile Security/005. How to Identify Legit Apps.mp4 86.0 MB
Part 01 December 2022/Chapter 01 General Introduction to IT and Cyber Security/002. Difference Between Information Security and Cyber Security.mp4 84.6 MB
Part 03 June 2023/Chapter 02 Understanding Applications/003. How to Identify Legit Apps and Spot Fake Apps.mp4 83.4 MB
猜你喜欢:
Beginners
Cybersecurity
Guide
Absolute
- 【压缩文件】 [FreeCoursesOnline.Me] Coursera - Cybersecurity Attack and Defense Fundamentals Specialization (by EC-Council)
-
收录时间:2023-12-17
文档个数:7
文档大小:6.1 GB
最近下载:2025-05-16
人气:7527
磁力链接
2. Network Defense Essentials (NDE).zip 2.2 GB
1. Ethical Hacking Essentials (EHE).zip 2.1 GB
3. Digital Forensics Essentials (DFE).zip 1.7 GB
0. Websites you may like/1. OneHack.us Premium Cracked Accounts-Tutorials-Guides-Articles Community Based Forum.url 377 Bytes
FreeCoursesOnline.me Download Udacity, Masterclass, Lynda, PHLearn, etc Free.url 290 Bytes
Content Info.txt 285 Bytes
0. Websites you may like/2. FTUApps.com Download Cracked Developers Applications For Free.url 239 Bytes
猜你喜欢:
FreeCoursesOnline
Me
Specialization
Cybersecurity
Coursera
EC
Fundamentals
Attack
Defense
Council
- 【影视】 [FreeCoursesOnline.Me] ZeroToMastery - Complete Cybersecurity Bootcamp
-
收录时间:2023-12-20
文档个数:101
文档大小:3.6 GB
最近下载:2025-05-16
人气:7476
磁力链接
8-Network Security/052-Network Security With Nmap.mp4 169.9 MB
5-Security Bugs & Vulnerabilities/020-Buffer Overflow Demonstration.mp4 136.7 MB
12-Appendix - Ethical Hacking/087-Msfconsole Basic Commands.mp4 97.5 MB
8-Network Security/059-Wireless Attack Demonstration.mp4 93.4 MB
7-End-Point Protection/034-Password Security and Password Managers.mp4 84.2 MB
12-Appendix - Ethical Hacking/093-Meterpreter Basic Commands Part 1.mp4 78.5 MB
7-End-Point Protection/038-Process Explorer.mp4 75.8 MB
1-Introduction/001-Cybersecurity Bootcamp - Zero to Mastery.mp4 72.4 MB
8-Network Security/057-Secure Network Architecture.mp4 66.8 MB
12-Appendix - Ethical Hacking/094-Meterpreter Basic Commands Part 2.mp4 65.7 MB
7-End-Point Protection/033-Bitdefender, Kaspersky, McAfee, Malwarebytes.mp4 63.9 MB
4-Understanding Hackers - The Biggest Threat/012-Most Common Attacks Demonstration.mp4 63.5 MB
8-Network Security/060-Network Monitoring With TCPDump.mp4 62.7 MB
8-Network Security/058-Wireless Security.mp4 59.6 MB
5-Security Bugs & Vulnerabilities/017-Unpatched Machine Exploitation Demonstration.mp4 59.1 MB
12-Appendix - Ethical Hacking/080-Whatweb Stealthy Scan.mp4 58.1 MB
12-Appendix - Ethical Hacking/091-Advance Msfvenom Usage.mp4 51.4 MB
7-End-Point Protection/043-Iptables.mp4 50.9 MB
7-End-Point Protection/028-Brave Browser Security and Privacy.mp4 50.6 MB
12-Appendix - Ethical Hacking/089-Software Vulnerability - Samba Exploitation.mp4 49.5 MB
猜你喜欢:
FreeCoursesOnline
Me
Complete
Cybersecurity
Bootcamp
ZeroToMastery
- 【影视】 Real-World Ethical Hacking Hands-on Cybersecurity
-
收录时间:2022-01-15
文档个数:290
文档大小:8.1 GB
最近下载:2025-05-16
人气:6983
磁力链接
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/14. Bonus Videos National Cyber Warrior Academy, Interviews and More/3. NCWA 2017 Facebook Live Video on Car Hacking and Drone Programming.mp4 947.8 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/9. BONUS Section Car Hacking in Kali Linux!/9. Car Hacking LIVE on Dr. Payne's VW Jetta Facebook Live Video from NCWA 2017.mp4 347.6 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/14. Bonus Videos National Cyber Warrior Academy, Interviews and More/5. Dr. Payne's TEDx Talk on Coding and Cyber as the New Literacy.mp4 320.6 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/5. Social Engineering Capturing Usernames and Passwords via Phishing/3. Cloning Facebook and Harvesting User Passwords.mp4 265.0 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/1. Real-World Ethical Hacking 1 Hacking Windows!/10. BONUS Mac Root Hack!.mp4 233.2 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/3. Important Linux and Windows Terminal Commands/2. Basic Linux Commands.mp4 195.0 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/13. Mobile Hacking on Android/2. Creating the Meterpreter Payload for Android.mp4 175.7 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/3. Important Linux and Windows Terminal Commands/4. More Helpful Linux Commands.mp4 170.6 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/4. Create a Virtual Network for Ethical Hacking!/3. Connecting Your VMs to the Host-Only Network.mp4 148.8 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/8. Hacking Win10 Command & Control Phase/4. Stealing Screenshots, Keystrokes, and ,Webcams.mp4 145.4 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/10. BONUS Hacking Windows 7 with Metasploit!/4. Creating an Exploit Payload with Metasploit.mp4 144.4 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/2. Create Your Own Virtual Hacking Lab!/4. Create an Android PhoneTablet VM for Mobile Hacking!.mp4 142.1 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/13. Mobile Hacking on Android/4. Advanced Android Exploits Accessing Storage, Downloading and Uploading Files.mp4 139.2 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/9. BONUS Section Car Hacking in Kali Linux!/8. BONUS Hacking the Car Hacking Software, to 1000 mph!.mp4 125.2 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/5. Social Engineering Capturing Usernames and Passwords via Phishing/7. Capturing the User's Login and Password in Kali.mp4 116.7 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/9. BONUS Section Car Hacking in Kali Linux!/5. The Replay Attack Replaying CAN Packets with CANplayer.mp4 116.0 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/11. Password Problems - Everybody's Got 'Em Hacking, Cracking, Snacking & Hijacking/3. Sniffing the Network Installing Wireshark.mp4 114.3 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/4. Create a Virtual Network for Ethical Hacking!/5. Updating Kali and Windows VMs.mp4 112.5 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/4. Create a Virtual Network for Ethical Hacking!/4. Creating and Using a Public NAT Network in VBox.mp4 112.5 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/11. Password Problems - Everybody's Got 'Em Hacking, Cracking, Snacking & Hijacking/6. Seven Things You Can Do for Safer Passwords.mp4 111.1 MB
猜你喜欢:
Real
Ethical
Cybersecurity
Hands
World
Hacking
- 【影视】 Cybersecurity Architecture Fundamentals
-
收录时间:2023-12-26
文档个数:81
文档大小:2.4 GB
最近下载:2025-05-16
人气:6891
磁力链接
Chapter 1 Introduction/006. Security Principles and Approaches.mp4 272.7 MB
Chapter 1 Introduction/003. The Problem with Security Today.mp4 236.8 MB
Chapter 1 Introduction/009. Understanding Residual Risk.mp4 120.0 MB
Chapter 4 Cyber Architecture for Enterprise Security/006. Vulnerability, Patch, and Availability Management.mp4 102.8 MB
Chapter 1 Introduction/008. Risk Management.mp4 99.6 MB
Chapter 1 Introduction/005. Who Is a Security Architect.mp4 98.0 MB
Chapter 2 Threat Modelling/006. PASTA.mp4 94.3 MB
Chapter 4 Cyber Architecture for Enterprise Security/001. Network Security.mp4 80.3 MB
Chapter 6 Case Study/001. Case Study Preview.mp4 78.0 MB
Chapter 2 Threat Modelling/002. Threat Modelling Versus Risk Assessment.mp4 75.6 MB
Chapter 2 Threat Modelling/001. Threat Modelling - Part 1.mp4 70.2 MB
Chapter 2 Threat Modelling/009. Attack Trees.mp4 68.7 MB
Chapter 4 Cyber Architecture for Enterprise Security/005. Data Protection.mp4 56.7 MB
Chapter 5 Designing for Security/003. Reference Security Architectures.mp4 52.0 MB
Chapter 2 Threat Modelling/003. Threat Modelling - Part 2.mp4 50.8 MB
Chapter 3 Enterprise Architecture Frameworks/003. Zachman Framework.mp4 44.9 MB
Chapter 5 Designing for Security/002. Security Design Pattern Example.mp4 44.6 MB
Chapter 1 Introduction/004. Introduction to Security Architecture.mp4 42.6 MB
Chapter 5 Designing for Security/001. Security Design Patterns.mp4 41.8 MB
Chapter 3 Enterprise Architecture Frameworks/004. SABSA Framework.mp4 37.0 MB
猜你喜欢:
Cybersecurity
Fundamentals
Architecture
- 【影视】 [ DevCourseWeb.com ] CBTNuggets - (ISC)2 CC - Certified in Cybersecurity - (ISC)2 Certification Training
-
收录时间:2023-12-17
文档个数:68
文档大小:2.1 GB
最近下载:2025-05-16
人气:6852
磁力链接
~Get Your Files Here !/1. Understanding Information Assurance/1. Understanding Information Assurance - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 69.9 MB
~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/1. Power - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 65.3 MB
~Get Your Files Here !/7. Discussing Network Security Infrastructure/1. Network Segmentation - (ISC)² CC – Certified in Cybersecurity CBT Nuggets-1.mp4 58.2 MB
~Get Your Files Here !/8. Exploring Network Threats and Attacks/6. Firewalls - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 54.7 MB
~Get Your Files Here !/8. Exploring Network Threats and Attacks/3. Intrusion Detection Prevention Systems (IDSIPS) - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 54.0 MB
~Get Your Files Here !/5. Exploring Security Policies and Training/7. Security Awareness Training - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 52.0 MB
~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/3. Heating, Ventilation and Air Conditioning (HVAC) - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 48.1 MB
~Get Your Files Here !/9. Understanding Computer Networking/4. IP Addresses - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 47.5 MB
~Get Your Files Here !/6. Understanding Data Security and System Hardening/2. Types of Encryption - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 46.4 MB
~Get Your Files Here !/7. Discussing Network Security Infrastructure/7. The Cloud - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 45.7 MB
~Get Your Files Here !/8. Exploring Network Threats and Attacks/5. Vulnerability Scanning - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 45.5 MB
~Get Your Files Here !/9. Understanding Computer Networking/3. TCPIP Model - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 42.9 MB
~Get Your Files Here !/6. Understanding Data Security and System Hardening/7. Configuration Management - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 41.6 MB
~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/2. Data Centers and Closets - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 40.4 MB
~Get Your Files Here !/1. Understanding Information Assurance/2. Methods of Authentication - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 40.0 MB
~Get Your Files Here !/2. Discussing Risk Management, Controls, Ethics and Governance/4. Security Control Categories - (ISC)² CC – Certified in Cybersecurity CBT Nuggets-1.mp4 39.3 MB
~Get Your Files Here !/6. Understanding Data Security and System Hardening/3. Data Hashing with Encryption - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 38.3 MB
~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/5. Redundancy - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 38.2 MB
~Get Your Files Here !/3. Exploring BC, DR & IR Concepts/6. Incident Response - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 37.9 MB
~Get Your Files Here !/4. Reviewing Access Control Concepts/6. Types of Access Control - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 36.8 MB
猜你喜欢:
ISC
CBTNuggets
Training
Certification
CC
DevCourseWeb
Cybersecurity
com
Certified
- 【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity and Kali Linux - Hands-on course by TechLatest
-
收录时间:2023-12-29
文档个数:43
文档大小:2.6 GB
最近下载:2025-05-16
人气:6597
磁力链接
~Get Your Files Here !/7. Module 7 - Wireless Fortification Pentesting Mastery/2. Web App Pentesting Practical.mp4 636.4 MB
~Get Your Files Here !/10. Module 10 - Communicating Findings Reporting Mastery/2. Reporting Practical + Conclusion.mp4 283.4 MB
~Get Your Files Here !/6. Module 6 - Crack the Code Password Mastery/2. Password Cracking Practical.mp4 265.1 MB
~Get Your Files Here !/5. Module 5 - Hacking Mastery Strategic Exploitation/2. Exploitation Practical.mp4 222.1 MB
~Get Your Files Here !/9. Module 9 - Human Manipulation Social Engineering/2. Social Engineering Practical.mp4 198.1 MB
~Get Your Files Here !/8. Module 8 - Wireless Fortification Pentesting Mastery/2. Wireless Pentesting Practical.mp4 194.1 MB
~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/3. Social Media Reconnaissance.mp4 142.0 MB
~Get Your Files Here !/4. Module 4 - Infiltration Techniques Mastering Active Reconnaissance/2. Vulnerability Assessment.mp4 121.4 MB
~Get Your Files Here !/5. Module 5 - Hacking Mastery Strategic Exploitation/1. Exploitation Introduction.mp4 84.3 MB
~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/3. Microsoft Azure Guide..mp4 54.4 MB
~Get Your Files Here !/6. Module 6 - Crack the Code Password Mastery/1. Password Cracking Introduction.mp4 48.2 MB
~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/2. Google Cloud Platform(GCP) Guide..mp4 47.9 MB
~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/1. Amazon Web Services(AWS) Guide..mp4 46.0 MB
~Get Your Files Here !/4. Module 4 - Infiltration Techniques Mastering Active Reconnaissance/3. Scanning.mp4 44.9 MB
~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/4. Unveiling the Secrets of OS Fingerprinting in Cybersecurity with Kali Linux.mp4 44.7 MB
~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/5. Target Validation in Cybersecurity with Kali Linux.mp4 39.9 MB
~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/1. Reconnaissance — First Phase of Hacking.mp4 30.0 MB
~Get Your Files Here !/1. Module 1 - Course Introduction & Teaser/2. Course Introduction.mp4 28.4 MB
~Get Your Files Here !/8. Module 8 - Wireless Fortification Pentesting Mastery/1. Wireless Pentesting Introduction.mp4 24.5 MB
~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/6. Subdomain Discovery in Cybersecurity with Kali Linux.mp4 24.5 MB
猜你喜欢:
TechLatest
Cybersecurity
Kali
Hands
Udemy
DevCourseWeb
course
Linux
com
- 【影视】 [FreeCoursesOnline.Me] ITProTV - NIST Cybersecurity And Risk Management Frameworks
-
收录时间:2023-12-18
文档个数:61
文档大小:11.3 GB
最近下载:2025-05-16
人气:6534
磁力链接
2. NIST Cybersecurity and Publications.mp4 298.0 MB
26. Response Training and Testing.mp4 288.9 MB
24. Incident Response Plan Examples.mp4 279.3 MB
43. Documentation and Approval.mp4 277.5 MB
20. System Auditing and Logging.mp4 258.9 MB
23. Response Planning.mp4 255.7 MB
29. Backup and Recovery.mp4 251.4 MB
9. Inventory of Critical Assets.mp4 247.4 MB
46. Documenting Controls.mp4 246.5 MB
21. Monitoring and Alerting.mp4 238.7 MB
22. Assessments.mp4 238.7 MB
42. Control Allocation and Monitoring.mp4 234.0 MB
10. Business Impact Assessment.mp4 231.6 MB
40. NIST Control Documents.mp4 230.2 MB
36. Establishing Scope.mp4 227.5 MB
44. Security Control Implementation.mp4 225.8 MB
3. NIST Relationships.mp4 222.6 MB
6. The Vocabulary of Risk.mp4 222.0 MB
25. Digital Forensics.mp4 219.4 MB
51. Assessment Documentation.mp4 219.2 MB
猜你喜欢:
FreeCoursesOnline
Me
Management
Risk
Cybersecurity
ITProTV
Frameworks
NIST
- 【文档书籍】 Heath M. CompTIA CySA+ Cybersecurity Analyst Certification...Exam Guide 3ed 2024
-
收录时间:2023-12-19
文档个数:3
文档大小:111.8 MB
最近下载:2025-05-16
人气:6459
磁力链接
Chapple M. CompTIA CySA+ Practice Tests. Exam CS0-003 3ed 2023.pdf 43.9 MB
Seidl D. CompTIA CySA+ Study Guide. Exam CS0-003 3ed 2023.pdf 43.8 MB
Heath M. CompTIA CySA+ Cybersecurity Analyst Certification...Exam Guide 3ed 2024.pdf 24.1 MB
猜你喜欢:
...
Exam
Guide
Certification
Cybersecurity
CySA
Heath
2024
3ed
CompTIA
- 【压缩文件】 [FreeCoursesOnline.Me] Coursera - Python for Cybersecurity Specialization
-
收录时间:2023-12-19
文档个数:9
文档大小:1.1 GB
最近下载:2025-05-16
人气:6218
磁力链接
5. Python for Active Defense.zip 268.9 MB
2. Execution, Persistence, Privilege escalation and Evasion.zip 251.2 MB
3. Credential Access, Discovery, Lateral Movement & Collection.zip 225.7 MB
4. Python for Command-and-Control, Exfiltration and Impact.zip 203.8 MB
1. Introduction to Python for Cybersecurity.zip 185.2 MB
0. Websites you may like/1. OneHack.us Premium Cracked Accounts-Tutorials-Guides-Articles Community Based Forum.url 377 Bytes
FreeCoursesOnline.me Download Udacity, Masterclass, Lynda, PHLearn, etc Free.url 290 Bytes
Content Info.txt 284 Bytes
0. Websites you may like/2. FTUApps.com Download Cracked Developers Applications For Free.url 239 Bytes
猜你喜欢:
FreeCoursesOnline
Me
Specialization
Python
Coursera
Cybersecurity
- 【影视】 Udemy Cybersecurity Collection
-
收录时间:2024-02-17
文档个数:7517
文档大小:115.9 GB
最近下载:2025-05-16
人气:6044
磁力链接
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/3. Cross-Site-Scripting/1. Cross-Site-Scripting - Lecture.mp4 748.2 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/8. Cross Site Request Forgery/1. CSRF - Techniques.mp4 695.8 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/2. All Interesting Tools/1. Tools I Use.mp4 632.4 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/1. Introduction/3. Recon with.mp4 608.7 MB
Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/18. Reconnaissance/8. Active Recon - Port Scanning.mp4 436.1 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/7. Open Redirect Vulnerability/1. Open Redirect Vulnerability with @hemanth1261.mp4 435.9 MB
Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/19. Exploitation/11. SQL Injection _ SQLMap.mp4 417.9 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/1. Introduction/5. Another Recon Video.mp4 398.8 MB
Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/2. Walkthrough - Legacy.mp4 348.0 MB
Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/16. Assembly Course/5. Arithmetic.mp4 331.0 MB
Udemy - The Complete Ethical Hacking Course, by Gerri Banfield _ Erman Kirkpatrick/05 How to create a bootable USB of Kali Linux ( optional )/025 How to create a bootable USB of Kali with persistent storage _ 4 GB part 4.mp4 328.9 MB
Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/6. Walkthrough - Jerry.mp4 320.2 MB
Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/25. Job Hunting/6. Analyzing the Job Post.mp4 312.1 MB
Udemy - The Complete Ethical Hacking Course, by Gerri Banfield _ Erman Kirkpatrick/04 Set up instructions for Mac users ONLY/021 Kali Linux Live USB on a MacBook Pro part 3 ( OPTIONAL ).mp4 302.6 MB
Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/7. Walkthrough - Nibbles.mp4 299.2 MB
Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/4. Walkthrough - Blue.mp4 298.0 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/6. Server Side Request Forgery/2. SSRF - Advanced Techniques.mp4 294.3 MB
Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/3. Walkthrough - Lame.mp4 293.6 MB
Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/20. Post Exploitation/1. Stabilizing Shells.mp4 285.1 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/6. Server Side Request Forgery/1. SSRF - Basic Techniques.mp4 282.4 MB
猜你喜欢:
Cybersecurity
Collection
Udemy
- 【影视】 Cybersecurity Lab Environment in EVE NG
-
收录时间:2023-12-17
文档个数:98
文档大小:6.4 GB
最近下载:2025-05-14
人气:6032
磁力链接
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/5. Cyberattacks Lab Setup/1. Cyberattacks Lab in EVE NG.mp4 431.1 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/1. Reconnaissance Attack.mp4 351.9 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/4. Attacker OS Setup/1. Kali Linux Setup.mp4 263.4 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/12. Password Attack.mp4 261.2 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/5. Cyberattacks Lab Setup/3. Vulnerable Servers -Configuration.mp4 259.5 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/9. ARP Spoofing Attack.mp4 240.8 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/2. EVE NG Setup/5. EVE NG Qemu Image Naming.mp4 223.9 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/10. DHCP Starvation Attack.mp4 195.3 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/1. Introduction to Cybersecurity/9. Layers of the Web Terms.mp4 192.1 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/4. Attacker OS Setup/3. Parrot OS Setup.mp4 184.7 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/1. Introduction to Cybersecurity/8. Layers of the Web.mp4 170.7 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/3. Vulnerable Web Setup/2. Metasploitable Setup.mp4 164.7 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/6. Smurf Attack.mp4 162.1 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/14. SQL Injection Attack.mp4 162.0 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/1. Introduction to Cybersecurity/12. OWASP Top Ten 10.mp4 160.9 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/2. EVE NG Setup/8. EVE-NG Networks Clouds.mp4 155.5 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/5. SYN Flooding Attack.mp4 150.9 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/1. Introduction to Cybersecurity/2. Introduction to Cybersecurity.mp4 146.1 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/4. ICMP Flooding Attack.mp4 144.8 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/3. Vulnerable Web Setup/1. bWAPP Server Setup.mp4 144.8 MB
猜你喜欢:
Cybersecurity
Environment
EVE
Lab
NG
- 【影视】 [TheArtOfHacking] Cybersecurity Video Courses Collection (2018-2020) [En]
-
收录时间:2021-03-15
文档个数:1102
文档大小:115.5 GB
最近下载:2025-05-15
人气:5916
磁力链接
TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/190 - 16.5 Exploiting SQL Injection Vulnerabilities.mp4 856.8 MB
TheArtOfHacking.org - Hacking Web Applications/00044 6.4_Exploiting_SQL_Injection_Vulnerabilities.mp4 847.3 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00155 6.4_Exploiting_SQL_Injection_Vulnerabilities.mp4 847.3 MB
TheArtOfHacking.org - Hacking Web Applications/00058 8.1_Introducing_Cryptography_Encryption_and_Hashing_Protocols.mp4 757.5 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00169 8.1_Introducing_Cryptography_Encryption_and_Hashing_Protoc 757.5 MB
TheArtOfHacking.org - Hacking Web Applications/00038 5.1_Understanding_Authentication_Schemes_in_Web_Applications_and_Related_Vulnerabilities.mp4 733.0 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00149 5.1_Understanding_Authentication_Schemes_in_Web_Applicatio 733.0 MB
TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/158 - 14.15 Understanding Authentication Schemes in Web Applications.mp4 730.3 MB
TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/008 - 2.2 Threats and Attack Vectors.mp4 681.2 MB
TheArtOfHacking.org - Hacking Web Applications/00018 3.1_Exploring_Kali_Linux.mp4 586.2 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00129 3.1_Exploring_Kali_Linux.mp4 586.2 MB
TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/140 - 13.11 Introducing the Burp Suite.mp4 568.8 MB
TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/107 - 10.10 Surveying Social Engineering Case Studies.mp4 560.2 MB
TheArtOfHacking.org - Hacking Web Applications/00034 4.8_Introducing_the_Burp_Suite.mp4 549.6 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00145 4.8_Introducing_the_Burp_Suite.mp4 549.6 MB
TheArtOfHacking.org - Hacking Web Applications/00029 4.3_Exploring_Shodan_Maltego_Recon-NG_SpiderFoot_and_TheHarvester.mp4 511.9 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00140 4.3_Exploring_Shodan_Maltego_Recon-NG_SpiderFoot_and_TheHa 511.9 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00022 3.6_Surveying_Essential_Tools_for_Passive_Reconnaissance_- 489.1 MB
TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/264 - 22.5 Exploring The Android Security Model.mp4 474.0 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00061 8.10_Hacking_the_Management_Plane.mp4 469.4 MB
猜你喜欢:
TheArtOfHacking
Cybersecurity
Collection
Courses
En
Video
2018
2020
- 【影视】 Certified in Cybersecurity - CC (ISC)²
-
收录时间:2023-12-18
文档个数:68
文档大小:548.0 MB
最近下载:2025-05-15
人气:5909
磁力链接
Lesson 3 Business Continuity (BC), Disaster Recovery (DR), and Incident Response Concepts/004. 3.3 Understanding Incident Response.mp4 66.3 MB
Lesson 5 Network Security/006. 5.5 Introducing Cloud Security.mp4 51.7 MB
Lesson 5 Network Security/004. 5.3 Understanding Network Security Infrastructure.mp4 38.5 MB
Lesson 6 Security Operations/002. 6.1 Understanding Data Security.mp4 36.6 MB
Lesson 2 Security Principles/003. 2.2 Understanding the Risk Management Process.mp4 31.9 MB
Lesson 5 Network Security/003. 5.2 Understanding Network Threats and Attacks.mp4 29.4 MB
Lesson 5 Network Security/002. 5.1 Understanding Computer Networking.mp4 28.5 MB
Lesson 2 Security Principles/002. 2.1 Understanding the Security Concepts of Information Assurance.mp4 22.3 MB
Lesson 4 Access Control Concepts/006. 4.5 Understanding Mandatory Access Control (MAC).mp4 20.6 MB
Lesson 6 Security Operations/003. 6.2 Understanding Hashing.mp4 18.4 MB
Lesson 2 Security Principles/005. 2.4 Understanding Governance Processes.mp4 17.9 MB
Lesson 5 Network Security/005. 5.4 Introducing Network Segmentation.mp4 17.1 MB
Lesson 3 Business Continuity (BC), Disaster Recovery (DR), and Incident Response Concepts/003. 3.2 Understanding Disaster Recovery (DR).mp4 16.4 MB
Lesson 6 Security Operations/006. 6.5 Understanding Security Awareness Training.mp4 14.0 MB
Lesson 4 Access Control Concepts/005. 4.4 Introducing Discretionary Access Control (DAC).mp4 12.9 MB
Lesson 6 Security Operations/005. 6.4 Understanding Best Practice Security Policies.mp4 12.9 MB
Lesson 3 Business Continuity (BC), Disaster Recovery (DR), and Incident Response Concepts/002. 3.1 Understanding Business Continuity (BC).mp4 12.8 MB
Introduction/001. Certified in Cybersecurity - CC (ISC)² Introduction.mp4 11.6 MB
Lesson 1 Exam Preparation/002. 1.1 Introducing the (ISC)² Certified in Cybersecurity Exam.mp4 11.4 MB
Lesson 4 Access Control Concepts/002. 4.1 Understanding Physical Access Controls.mp4 10.0 MB
猜你喜欢:
Cybersecurity
CC
Certified
ISC
- 【影视】 [ CourseMega.com ] Linkedin - Building an ISO 27001-Compliant Cybersecurity Program - The Annex A Controls
-
收录时间:2022-03-29
文档个数:110
文档大小:1.2 GB
最近下载:2025-05-16
人气:5902
磁力链接
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/013. Access control User access management.mp4 60.8 MB
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/028. System lifecycle Security in d.mp4 57.3 MB
~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/017. Physical and environmental security Equipme.mp4 57.2 MB
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/014. Access control System and application.mp4 55.8 MB
~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/032. Management of information security.mp4 54.7 MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/018. Operations security Operational procedures and responsibili.mp4 47.1 MB
~Get Your Files Here !/12. Compliance (Clause A.18)/034. Compliance Compliance with legal and contractual requirements (Claus.mp4 46.5 MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/021. Operations security Logging and monitoring (Clause A.12.4).mp4 45.6 MB
~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/033. Information security continuity an.mp4 45.5 MB
~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/016. Physical and environmental security Secure.mp4 44.8 MB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/004. Contact with auth.mp4 42.7 MB
~Get Your Files Here !/08. Communications Security (Clause A.13)/026. Communications security Information transfer (Clause A..mp4 40.7 MB
~Get Your Files Here !/04. Asset Management (Clause A.8)/010. Asset management Information classification (Clause A.8.2).mp4 40.5 MB
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/027. System lifecycle Security requ.mp4 37.2 MB
~Get Your Files Here !/03. Human Resources Security (Clause A.7)/007. Human resources security During employment (Clause A.7..mp4 34.4 MB
~Get Your Files Here !/08. Communications Security (Clause A.13)/025. Communications security Network security management (Cl.mp4 34.1 MB
~Get Your Files Here !/04. Asset Management (Clause A.8)/009. Asset management Responsibility for assets (Clause A.8.1).mp4 33.3 MB
~Get Your Files Here !/10. Supplier Relationships (Clause A.15)/030. Supplier relationships Information security in supplier.mp4 31.4 MB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/002. Management direct.mp4 31.1 MB
~Get Your Files Here !/04. Asset Management (Clause A.8)/011. Asset management Media handling (Clause A.8.3).mp4 30.4 MB
猜你喜欢:
Building
Annex
Cybersecurity
Linkedin
27001
Compliant
Program
ISO
Controls
CourseMega
- 【影视】 TTC - Thinking about Cybersecurity
-
收录时间:2017-02-10
文档个数:19
文档大小:8.5 GB
最近下载:2025-05-16
人气:5665
磁力链接
TGC_9523_Lect18_Cybersecurity.wmv 509.4 MB
TGC_9523_Lect01_Cybersecurity.wmv 509.0 MB
TGC_9523_Lect13_Cybersecurity.wmv 508.9 MB
TGC_9523_Lect17_Cybersecurity.wmv 494.7 MB
TGC_9523_Lect08_Cybersecurity.wmv 493.5 MB
TGC_9523_Lect14_Cybersecurity.wmv 486.8 MB
TGC_9523_Lect10_Cybersecurity.wmv 486.1 MB
TGC_9523_Lect04_Cybersecurity.wmv 480.1 MB
TGC_9523_Lect15_Cybersecurity.wmv 474.7 MB
TGC_9523_Lect09_Cybersecurity.wmv 473.9 MB
TGC_9523_Lect05_Cybersecurity.wmv 472.8 MB
TGC_9523_Lect07_Cybersecurity.wmv 470.4 MB
TGC_9523_Lect06_Cybersecurity.wmv 467.2 MB
TGC_9523_Lect16_Cybersecurity.wmv 460.0 MB
TGC_9523_Lect11_Cybersecurity.wmv 453.2 MB
TGC_9523_Lect12_Cybersecurity.wmv 449.4 MB
TGC_9523_Lect03_Cybersecurity.wmv 438.7 MB
TGC_9523_Lect02_Cybersecurity.wmv 378.9 MB
DG9523_98F12.PDF 4.7 MB
猜你喜欢:
TTC
Thinking
about
Cybersecurity
- 【影视】 SC-100 Microsoft Cybersecurity Architect
-
收录时间:2023-12-22
文档个数:251
文档大小:4.6 GB
最近下载:2025-05-13
人气:5553
磁力链接
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/32. Another example on Application Objects.mp4 143.6 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/17. Lab - Microsoft Sentinel - Generating Incidents.mp4 127.1 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/29. Building a Docker Image.mp4 119.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/31. Deploying the container.mp4 113.6 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/15. Review of the Azure Firewall service.mp4 107.9 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/23. Microsoft Sentinel - Automation.mp4 107.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/32.1 AuthApp.zip 106.5 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/18. Example on using Azure Blueprints.mp4 95.8 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/7. Microsoft Defender for Cloud - Secure Management Ports.mp4 93.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/6. Microsoft Defender for Cloud - Servers.mp4 93.0 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/30. Example on using Application Objects.mp4 90.8 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/24. Storing Azure Cosmos DB keys.mp4 89.3 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/14. Microsoft Defender for Cloud - AWS resources.mp4 88.7 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/25. NSG Flow logs.mp4 86.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/15. Lab - Microsoft Sentinel - Data connectors.mp4 80.0 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/39. Review - Azure AD Privileged Identity Management.mp4 77.7 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/35. Example on Enterprise Applications.mp4 77.1 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/6. Azure Storage Accounts - Azure AD Authentication.mp4 75.1 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/3. Lab - Azure SQL database - Dynamic data masking.mp4 74.2 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/16. Lab - Microsoft Sentinel - Azure Activity.mp4 64.7 MB
猜你喜欢:
SC
Cybersecurity
100
Architect
Microsoft