为您索检到268条磁力链接,耗时0毫秒。
- 【影视】 [FreeCoursesOnline.Me] O`REILLY - Building a Career in Cybersecurity
-
收录时间:2023-12-18
文档个数:75
文档大小:847.7 MB
最近下载:2025-05-16
人气:4418
磁力链接
Lesson 1 Getting Started in the Cybersecurity Field/005. 1.4 Cybersecurity Skills.mp4 65.3 MB
Lesson 2 Planning Your Cybersecurity Career/004. 2.3 The Value of Professional Certifications.mp4 60.1 MB
Lesson 3 Creating Your Own Lab/003. 3.2 Foundational Lab.mp4 48.0 MB
Lesson 5 Preparing for Your Interview/005. 5.4 Final Tips.mp4 44.9 MB
Lesson 6 Using Continuous Improvement Strategy/007. 6.6 Growing Your Career as a Remote Worker.mp4 40.3 MB
Lesson 2 Planning Your Cybersecurity Career/003. 2.2 Creating and Tracking Your Plan.mp4 36.8 MB
Lesson 5 Preparing for Your Interview/003. 5.2 Preparing for the Interview.mp4 35.5 MB
Lesson 1 Getting Started in the Cybersecurity Field/006. 1.5 Navigating through the Industry.mp4 31.9 MB
Lesson 2 Planning Your Cybersecurity Career/002. 2.1 Establishing a Plan.mp4 31.3 MB
Lesson 6 Using Continuous Improvement Strategy/008. 6.7 What’s Next.mp4 31.0 MB
Lesson 1 Getting Started in the Cybersecurity Field/004. 1.3 Cybersecurity Jobs.mp4 30.3 MB
Lesson 5 Preparing for Your Interview/004. 5.3 Advancing in the Interview Process.mp4 29.3 MB
Lesson 6 Using Continuous Improvement Strategy/006. 6.5 Keeping a Good Work-life Balance.mp4 28.2 MB
Lesson 3 Creating Your Own Lab/005. 3.4 Enabling and Using Microsoft Defender for Cloud.mp4 27.7 MB
Introduction/001. Building a Career in Cybersecurity Introduction.mp4 25.1 MB
Lesson 6 Using Continuous Improvement Strategy/003. 6.2 Responsibilities and Expectations.mp4 24.6 MB
Lesson 4 Expanding Your Networking/005. 4.4 Using LinkedIn to Expand Your Network.mp4 24.5 MB
Lesson 1 Getting Started in the Cybersecurity Field/003. 1.2 Roles and Responsibilities.mp4 22.1 MB
Lesson 4 Expanding Your Networking/002. 4.1 Understanding the Cybersecurity Community.mp4 21.9 MB
Lesson 4 Expanding Your Networking/003. 4.2 Identifying Opportunities to Contribute with the Cybersecurity Community.mp4 19.3 MB
猜你喜欢:
FreeCoursesOnline
Me
Cybersecurity
Career
REILLY
Building
- 【影视】 Cybersecurity Prevention and Detection 2nd Edition (Video Collection)
-
收录时间:2024-05-31
文档个数:374
文档大小:3.8 GB
最近下载:2025-05-16
人气:4395
磁力链接
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/007. 1.6 Identity and access management.mp4 120.3 MB
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/003. 1.2 Log ingestion Part 2.mp4 117.9 MB
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/002. 1.1 Log ingestion Part 1.mp4 106.0 MB
03 Malware and Incident Response/Lesson 1 Threat Landscape/002. 1.1 Malware Threat Landscape.mp4 90.8 MB
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/005. 1.4 Infrastructure concepts.mp4 89.3 MB
04 Secure Operations and Protections/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/004. 2.3 Technology and tool integration.mp4 87.2 MB
01 Threat Intelligence and Threat Hunting/Lesson 2 Analyze Indicators of Potentially Malicious Activity/002. 2.1 Network-related.mp4 77.1 MB
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/008. 1.7 Encryption.mp4 76.0 MB
01 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/006. 3.5 Common techniques Part 3.mp4 63.7 MB
03 Malware and Incident Response/Lesson 5 PE File Identification/004. 5.3 Entry Points.mp4 62.4 MB
01 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/004. 3.3 Common techniques Part 1.mp4 56.9 MB
01 Threat Intelligence and Threat Hunting/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/002. 1.1 Threat actors Part 1.mp4 53.5 MB
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/004. 1.3 Operating system (OS) concepts.mp4 52.1 MB
01 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/005. 3.4 Common techniques Part 2.mp4 51.1 MB
02 System and Privacy Data Protection/Lesson 4 Analyzing Logs and Impact Analysis/008. 4.7 Impact Analysis.mp4 51.0 MB
01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/007. 7.6 SOC and FPGA.mp4 50.5 MB
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/006. 1.5 Network architecture.mp4 50.1 MB
01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/010. 7.9 Industrial Control Systems (ICS) and Process Automation.mp4 46.2 MB
01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/004. 7.3 Internet of Things (IoT) and Embedded Devices Part 2.mp4 45.3 MB
04 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/013. 4.12 Threat modeling.mp4 43.6 MB
猜你喜欢:
Cybersecurity
Collection
2nd
Detection
Edition
Video
Prevention
- 【压缩文件】 Humble Bundle - Cybersecurity (2023) by Packt
-
收录时间:2023-12-29
文档个数:31
文档大小:673.5 MB
最近下载:2025-05-16
人气:4320
磁力链接
supplement/practical_hardware_pentesting_supplement.zip 98.3 MB
cybersecurity_attack_and_defense_strategies.pdf 84.2 MB
network_protocols_for_security_professionals.pdf 66.6 MB
ultimate_kali_linux_book.pdf 53.0 MB
mastering_kali_linux_for_advanced_penetration_testing.pdf 48.7 MB
mastering_malware_analysis.pdf 41.1 MB
practical_threat_intelligence_and_data-driven_threat_hunting.pdf 34.0 MB
mastering_defensive_security.pdf 31.9 MB
mastering_windows_security_and_hardening.pdf 28.8 MB
learn_wireshark.pdf 24.4 MB
purple_team_strategies.pdf 20.6 MB
vulnerability_researcher_s_handbook.pdf 18.2 MB
cybersecurity_career_masterplan.pdf 17.8 MB
privilege_escalation_techniques.pdf 15.7 MB
malware_analysis_techniques.pdf 15.4 MB
certified_ethical_hacker_ceh_v12312-50_exam_guide.pdf 15.1 MB
mastering_palo_alto_networks.pdf 13.6 MB
comptia_security_plus_sy0-601_certification_guide.pdf 9.8 MB
practical_hardware_pentesting.pdf 8.4 MB
supplement/malware_analysis_techniques_supplement.zip 5.8 MB
猜你喜欢:
Cybersecurity
Packt
Humble
Bundle
2023
- 【影视】 Microsoft Cybersecurity Pro Track Security in Office 365
-
收录时间:2021-04-22
文档个数:91
文档大小:1.5 GB
最近下载:2025-05-15
人气:4319
磁力链接
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/2. Introduction to Security in Office 365/1. Threat Vectors and Data Breaches.mp4 185.5 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/5. Implementing auditing, insights and alerts/3. Audit Log Investigations.mp4 155.5 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/3. Implementing and Managinng Microsoft Defender for Office 365 (Office 365 ATP)/1. Introduction to Exchange Online Protection.mp4 132.0 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/6. Advanced Security Management/1. Deploy Cloud Application Security.mp4 109.2 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/5. Implementing auditing, insights and alerts/5. Managing insights and alerts in the Security & Compliance Center.mp4 101.2 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/4. Using Office 365 Threat Intelligence/3. Threat Investigation and Response.mp4 91.3 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/3. Implementing and Managinng Microsoft Defender for Office 365 (Office 365 ATP)/3. Managing Safe Attachments.mp4 90.4 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/2. Introduction to Security in Office 365/3. Introduction to Secure Score.mp4 78.1 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/3. Implementing and Managinng Microsoft Defender for Office 365 (Office 365 ATP)/4. Managing Safe Links.mp4 75.1 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/3. Implementing and Managinng Microsoft Defender for Office 365 (Office 365 ATP)/2. Overview of Microsoft Defender for Office 365 (former named Office 365 ATP).mp4 64.5 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/6. Advanced Security Management/2. Use Cloud Application Security.mp4 63.1 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/4. Using Office 365 Threat Intelligence/2. Security (Threat) Dashboard.mp4 61.0 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/3. Implementing and Managinng Microsoft Defender for Office 365 (Office 365 ATP)/5. Monitoring and Reports.mp4 56.6 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/4. Using Office 365 Threat Intelligence/1. Overview of Office 365 Threat Intelligence.mp4 53.0 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/5. Implementing auditing, insights and alerts/2. Enabling mailbox auditing in Exchange Online.mp4 44.4 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/2. Introduction to Security in Office 365/2. Security Solutions in Office 365.mp4 37.2 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/5. Implementing auditing, insights and alerts/1. Overview of auditing in the Security & Compliance Center.mp4 34.8 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/1. Introduction/2. About the Course.mp4 32.8 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/5. Implementing auditing, insights and alerts/4. Enabling sharing auditing for SharePoint and OneDrive.mp4 30.7 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/1. Introduction/3. Preparing the Lab Environment.mp4 25.1 MB
猜你喜欢:
Office
Cybersecurity
Pro
Track
Security
365
Microsoft
- 【压缩文件】 [ FreeCourseWeb.com ] Pluralsight CySA+ (CompTIA Cybersecurity Analyst) CS0-001.zip
-
收录时间:2021-03-11
文档个数:1
文档大小:3.7 GB
最近下载:2025-05-14
人气:4315
磁力链接
[ FreeCourseWeb.com ] Pluralsight CySA+ (CompTIA Cybersecurity Analyst) CS0-001.zip 3.7 GB
猜你喜欢:
Pluralsight
zip
Cybersecurity
CySA
CS0
001
FreeCourseWeb
CompTIA
com
Analyst
- 【压缩文件】 SEC595 - Applied Data Science and AI Machine Learning for Cybersecurity Professionals
-
收录时间:2024-05-03
文档个数:7
文档大小:26.1 GB
最近下载:2025-05-16
人气:4260
磁力链接
USB 2021/595.7z 21.3 GB
LIVE 2021/5. Day Five.mp4 1.2 GB
LIVE 2021/1. Day One.mp4 1.1 GB
LIVE 2021/2. Day Two.mp4 903.0 MB
LIVE 2021/3. Day Three.mp4 858.8 MB
LIVE 2021/4. Day Four.mp4 784.1 MB
PDF 2021/SEC595-Applied-Data-Science-and-Machine-Learning-for-Cybersecurity-Professionals.pdf 61.3 MB
猜你喜欢:
Applied
Cybersecurity
Professionals
SEC595
Science
Machine
AI
Learning
Data
- 【影视】 [ DevCourseWeb.com ] Udemy - Python for Cybersecurity
-
收录时间:2023-12-17
文档个数:73
文档大小:1.3 GB
最近下载:2025-05-15
人气:4217
磁力链接
~Get Your Files Here !/6. Sockets/7. Part 3 - Sending, Receiving, and Closing the Connection.mp4 179.3 MB
~Get Your Files Here !/4. Object Oriented Programming/2. Creating Our First Object.mp4 97.9 MB
~Get Your Files Here !/6. Sockets/5. Part 1 - Socket, Bind, Listen Accept.mp4 81.1 MB
~Get Your Files Here !/6. Sockets/6. Part 2 - Socket, Connect.mp4 74.5 MB
~Get Your Files Here !/6. Sockets/4. Why Encode.mp4 71.2 MB
~Get Your Files Here !/6. Sockets/3. How Sockets Will Work.mp4 68.7 MB
~Get Your Files Here !/3. The Fundamentals/6. If Statements.mp4 64.8 MB
~Get Your Files Here !/5. Let's Make API Requests/5. Consuming an API - Complex.mp4 62.7 MB
~Get Your Files Here !/3. The Fundamentals/12. Dictionaries.mp4 51.7 MB
~Get Your Files Here !/3. The Fundamentals/13. Functions.mp4 49.3 MB
~Get Your Files Here !/3. The Fundamentals/3. Variables.mp4 42.2 MB
~Get Your Files Here !/3. The Fundamentals/7. Error Handling Part 1.mp4 40.5 MB
~Get Your Files Here !/2. Environment Setup/2. Installing VS Code and Extensions.mp4 37.6 MB
~Get Your Files Here !/6. Sockets/2. What is a Socket.mp4 35.1 MB
~Get Your Files Here !/3. The Fundamentals/11. Lists.mp4 35.1 MB
~Get Your Files Here !/3. The Fundamentals/4. f Strings.mp4 32.8 MB
~Get Your Files Here !/4. Object Oriented Programming/3. Importing Packages.mp4 31.4 MB
~Get Your Files Here !/1. Getting Started/1. IMPORTANT!!!.mp4 30.9 MB
~Get Your Files Here !/5. Let's Make API Requests/4. Consuming an API - Simple.mp4 26.2 MB
~Get Your Files Here !/3. The Fundamentals/8. While Loop.mp4 21.6 MB
猜你喜欢:
DevCourseWeb
Python
Cybersecurity
com
Udemy
- 【影视】 Thinking about Cybersecurity From Cyber Crime to Cyber Warfare
-
收录时间:2023-12-20
文档个数:39
文档大小:8.8 GB
最近下载:2025-05-16
人气:4027
磁力链接
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/18 Looking Forward-What Does the Future Hold.mp4 535.2 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/10 International Governance and the Internet.mp4 521.6 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/14 Listening In and Going Dark.mp4 516.5 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/08 Nations at Cyber War.mp4 496.5 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/05 The Problem of Identity on the Network.mp4 495.7 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/13 Privacy for the Cyber Age.mp4 494.0 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/11 The Constitution and Cyberspace.mp4 489.6 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/17 Critical Infrastructure and Resiliency.mp4 489.1 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/01 Stuxnet-The First Cyber Guided Missile.mp4 486.4 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/04 Of Viruses, Botnets, and Logic Bombs.mp4 483.5 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/09 Government Regulation of Cyberspace.mp4 478.0 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/12 Big Data- They Know Everything about You.mp4 474.5 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/15 The Devil in the Chips-Hardware Failures.mp4 473.9 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/16 Protecting Yourself in Cyberspace.mp4 471.4 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/06 Cyber Fraud, Theft, and Organized Crime.mp4 470.0 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/07 Hacktivists and Insurgency.mp4 469.1 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/02 The Incredible Scope of Cyberspace.mp4 456.9 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/03 The Five Gateways of Internet Vulnerability.mp4 448.1 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/NA NA.mp4 20.8 MB
.pad/9 915.0 kB
猜你喜欢:
Cyber
about
Warfare
Thinking
Crime
Cybersecurity
- 【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity Management for New Managers
-
收录时间:2023-12-17
文档个数:46
文档大小:982.3 MB
最近下载:2025-05-16
人气:3993
磁力链接
~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/5. Cyber Incident & Data Breach Response planning ( Video from IT Web Conference ).mp4 372.8 MB
~Get Your Files Here !/2. Module 2 NIST Cybersecurity Framework (CSF)/4. Implementing the NIST CSF in your organisation.mp4 72.3 MB
~Get Your Files Here !/5. Module 5 Incident Response and Recovery/1. Creating cybersecurity strategies and action plans.mp4 52.2 MB
~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/4. Data Breaches.mp4 51.6 MB
~Get Your Files Here !/5. Module 5 Incident Response and Recovery/3. Incident detection and analysis.mp4 48.3 MB
~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/1. Understanding the importance of cybersecurity management.mp4 47.9 MB
~Get Your Files Here !/4. Module 4 Scenario Planning and Strategy/2. Identifying threats and vulnerabilities.mp4 42.2 MB
~Get Your Files Here !/5. Module 5 Incident Response and Recovery/2. Incident Response Planning.mp4 40.1 MB
~Get Your Files Here !/3. Module 3 NICE Cybersecurity Workforce Framework/3. Knowledge, skills, and abilities (KSAs).mp4 34.2 MB
~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/2. Roles and responsibilities of a cybersecurity manager.mp4 33.1 MB
~Get Your Files Here !/2. Module 2 NIST Cybersecurity Framework (CSF)/3. Tiers and profiles.mp4 32.6 MB
~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/3. NIST and NICE frameworks overview.mp4 29.3 MB
~Get Your Files Here !/2. Module 2 NIST Cybersecurity Framework (CSF)/5. Challenges of Implementing the NIST Framework.mp4 22.4 MB
~Get Your Files Here !/2. Module 2 NIST Cybersecurity Framework (CSF)/2. Core functions Identify, Protect, Detect, Respond, and Recover.mp4 18.8 MB
~Get Your Files Here !/3. Module 3 NICE Cybersecurity Workforce Framework/4. Integrating the NICE Framework into workforce development and management.mp4 18.3 MB
~Get Your Files Here !/3. Module 3 NICE Cybersecurity Workforce Framework/2. Workforce categories and specialty areas.mp4 15.7 MB
~Get Your Files Here !/5. Module 5 Incident Response and Recovery/5. Post Incident Activities and Lessons learned.mp4 14.2 MB
~Get Your Files Here !/8. Module 8 Course Wrap-up and Next Steps/1. Review of key concepts and frameworks.mp4 9.9 MB
~Get Your Files Here !/6. Module 6 Cybersecurity Metrics and Reporting/1. Selecting meaningful cybersecurity metrics.mp4 9.5 MB
~Get Your Files Here !/8. Module 8 Course Wrap-up and Next Steps/2. Developing a personal action plan for implementing cyber management practices.mp4 7.8 MB
猜你喜欢:
Management
Managers
Cybersecurity
Udemy
DevCourseWeb
New
com
- 【影视】 [ DevCourseWeb.com ] Udemy - Deepfake Defense for Cybersecurity and GRC Professionals
-
收录时间:2024-03-22
文档个数:38
文档大小:1.4 GB
最近下载:2025-05-15
人气:3879
磁力链接
~Get Your Files Here !/2. Detection & Mitigation/6. 20-Documenting and structuring our Deepfake mitigation strategy Report.mp4 105.7 MB
~Get Your Files Here !/1. Course Foundation/13. 13-Assessing Your organization’s deepfake response capabilities.mp4 99.8 MB
~Get Your Files Here !/2. Detection & Mitigation/8. 22-Action Plan for Deepfake Mitigation Strategy Implementation.mp4 93.6 MB
~Get Your Files Here !/2. Detection & Mitigation/10. 24-Standard Operating Procedure (SOP) for Deepfake Incident Response.mp4 86.6 MB
~Get Your Files Here !/3. Things to consider_Questions to ask/4. 29-Deepfake Mitigation Tools.mp4 80.4 MB
~Get Your Files Here !/2. Detection & Mitigation/5. 19-Developing deepfake mitigation strategy through brainstorming.mp4 79.9 MB
~Get Your Files Here !/1. Course Foundation/11. 11-Identifying Deepfakes.mp4 67.7 MB
~Get Your Files Here !/1. Course Foundation/4. 4-Deepfake Assessment-Can members of your organization identify deepfakes.mp4 63.6 MB
~Get Your Files Here !/1. Course Foundation/5. 5-Course Agenda.mp4 60.7 MB
~Get Your Files Here !/3. Things to consider_Questions to ask/3. 28-Creating a culture of Verefication.mp4 57.2 MB
~Get Your Files Here !/1. Course Foundation/12. 12-Testing for Deepfakes.mp4 57.1 MB
~Get Your Files Here !/2. Detection & Mitigation/1. 15-Intro to section 2_Are there any silver bullets for deepfake mitigation.mp4 51.7 MB
~Get Your Files Here !/1. Course Foundation/3. 3-Possible causes of deepfake Incident-News Brief Postmortem.mp4 50.1 MB
~Get Your Files Here !/2. Detection & Mitigation/3. 17-Important considerations for developing a deepfake defense strategy.mp4 42.4 MB
~Get Your Files Here !/1. Course Foundation/1. 1-Deepfake Defense For Cybersecurity & GRC Professionals.mp4 41.8 MB
~Get Your Files Here !/2. Detection & Mitigation/4. 18-Key components of a deepfake mitigation strategy.mp4 41.2 MB
~Get Your Files Here !/3. Things to consider_Questions to ask/5. 30-The most efficient measures to take against deepfake attacks.mp4 40.7 MB
~Get Your Files Here !/1. Course Foundation/14. 14-End of Section_1.mp4 39.9 MB
~Get Your Files Here !/1. Course Foundation/6. 6-Meet your Instructor.mp4 39.7 MB
~Get Your Files Here !/1. Course Foundation/2. 2-Important Note about course.mp4 38.8 MB
猜你喜欢:
Professionals
Cybersecurity
Udemy
DevCourseWeb
Defense
GRC
com
Deepfake
- 【影视】 [CourseClub.Me] ITProTV - NIST Cybersecurity And Risk Management Frameworks
-
收录时间:2024-01-03
文档个数:61
文档大小:11.3 GB
最近下载:2025-05-16
人气:3755
磁力链接
2. NIST Cybersecurity and Publications.mp4 298.0 MB
26. Response Training and Testing.mp4 288.9 MB
24. Incident Response Plan Examples.mp4 279.3 MB
43. Documentation and Approval.mp4 277.5 MB
20. System Auditing and Logging.mp4 258.9 MB
23. Response Planning.mp4 255.7 MB
29. Backup and Recovery.mp4 251.4 MB
9. Inventory of Critical Assets.mp4 247.4 MB
46. Documenting Controls.mp4 246.5 MB
21. Monitoring and Alerting.mp4 238.7 MB
22. Assessments.mp4 238.7 MB
42. Control Allocation and Monitoring.mp4 234.0 MB
10. Business Impact Assessment.mp4 231.6 MB
40. NIST Control Documents.mp4 230.2 MB
36. Establishing Scope.mp4 227.5 MB
44. Security Control Implementation.mp4 225.8 MB
3. NIST Relationships.mp4 222.6 MB
6. The Vocabulary of Risk.mp4 222.0 MB
25. Digital Forensics.mp4 219.4 MB
51. Assessment Documentation.mp4 219.2 MB
猜你喜欢:
Me
Management
Risk
Cybersecurity
ITProTV
Frameworks
NIST
CourseClub
- 【影视】 [FreeTutorials.Us] cybersecurity-ultimate-ethical-hacking-boot-camp
-
收录时间:2017-08-24
文档个数:53
文档大小:3.6 GB
最近下载:2025-05-16
人气:3681
磁力链接
01 Introduction to the Ultimate Ethical Hacking Boot Camp/attached_files/001 Welcome to the Ultimate Ethical Hacking Boot Camp/Equipment.pdf 131.3 kB
02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/Kali.Backgrounds.jpg 478.6 kB
02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/Server.2008.Backgrounds.jpg 480.5 kB
02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/win7.Backgrounds.jpg 480.5 kB
02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/win8.Backgrounds.jpg 480.2 kB
02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/winxp.Backgrounds.jpg 480.2 kB
08 Password Cracking/attached_files/037 Windows Password Cracking/Wordlist-Resources.pdf 59.0 kB
01 Introduction to the Ultimate Ethical Hacking Boot Camp/001 Welcome to the Ultimate Ethical Hacking Boot Camp.mp4 71.7 MB
01 Introduction to the Ultimate Ethical Hacking Boot Camp/002 What is Ethical Hacking.mp4 149.9 MB
01 Introduction to the Ultimate Ethical Hacking Boot Camp/003 Careers for Ethical Hackers.mp4 48.9 MB
01 Introduction to the Ultimate Ethical Hacking Boot Camp/004 Wireless Lab Setup Hack.mp4 62.6 MB
01 Introduction to the Ultimate Ethical Hacking Boot Camp/005 Wireless Hacking Module Disclaimer.mp4 38.8 MB
01 Introduction to the Ultimate Ethical Hacking Boot Camp/006 Interview Oracle Shodan CNN.mp4 278.0 MB
02 Hacking Lab Setup - Windows Mac Instructions/007 Introduction to Lab Setup.mp4 31.3 MB
02 Hacking Lab Setup - Windows Mac Instructions/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines..mp4 20.7 MB
02 Hacking Lab Setup - Windows Mac Instructions/009 Installing Windows XP.mp4 133.1 MB
02 Hacking Lab Setup - Windows Mac Instructions/010 Installing Server 2008.mp4 7.7 MB
02 Hacking Lab Setup - Windows Mac Instructions/011 Installing Kali Linux from ISO.mp4 33.5 MB
02 Hacking Lab Setup - Windows Mac Instructions/012 Installing Kali Linux Prebuild Virtual Machine.mp4 29.4 MB
02 Hacking Lab Setup - Windows Mac Instructions/013 Installing Windows 7.mp4 9.8 MB
猜你喜欢:
ethical
FreeTutorials
cybersecurity
camp
boot
Us
ultimate
hacking
- 【其他】 Pascal Ackerman - Industrial Cybersecurity - 2017
-
收录时间:2023-12-23
文档个数:3
文档大小:117.2 MB
最近下载:2025-05-16
人气:3637
磁力链接
Pascal Ackerman - Industrial Cybersecurity - 2017.mobi 64.3 MB
Pascal Ackerman - Industrial Cybersecurity - 2017.pdf 26.8 MB
Pascal Ackerman - Industrial Cybersecurity - 2017.epub 26.1 MB
猜你喜欢:
Cybersecurity
Pascal
Industrial
Ackerman
2017
- 【压缩文件】 [ FreeCourseWeb.com ] PluralSight - Building a CyberSecurity Home Lab Environment.zip
-
收录时间:2021-04-12
文档个数:1
文档大小:376.0 MB
最近下载:2025-05-15
人气:3626
磁力链接
[ FreeCourseWeb.com ] PluralSight - Building a CyberSecurity Home Lab Environment.zip 376.0 MB
猜你喜欢:
Building
PluralSight
zip
CyberSecurity
Lab
Environment
FreeCourseWeb
Home
com
- 【影视】 Lynda - Cybersecurity with Cloud Computing
-
收录时间:2017-07-16
文档个数:39
文档大小:371.6 MB
最近下载:2025-05-15
人气:3619
磁力链接
00. Introduction/00_01 - Welcome.mp4 17.4 MB
00. Introduction/00_02 - What you should know.mp4 861.2 kB
00. Introduction/00_03 - Reference sites.mp4 16.6 MB
00. Introduction/00_04 - Using the exercise files.mp4 278.9 kB
01. Cloud Fundamentals/01_01 - Defining the essential characteristics of cloud.mp4 15.8 MB
01. Cloud Fundamentals/01_02 - Understanding infrastructure as a service.mp4 11.9 MB
01. Cloud Fundamentals/01_03 - Unraveling platform as a service.mp4 6.8 MB
01. Cloud Fundamentals/01_04 - Comprehending software as a service.mp4 8.6 MB
01. Cloud Fundamentals/01_05 - Discovering deployment models.mp4 11.4 MB
01. Cloud Fundamentals/01_06 - Identifying cloud incidents.mp4 15.2 MB
01. Cloud Fundamentals/01_07 - Dissecting the anatomy of a service failure.mp4 8.8 MB
01. Cloud Fundamentals/01_08 - Deciphering the anatomy of a business failure.mp4 8.3 MB
01. Cloud Fundamentals/01_09 - Defining trust models for cloud.mp4 14.0 MB
02. Cloud Security Guidance/02_01 - Identifying governance and risk.mp4 5.5 MB
02. Cloud Security Guidance/02_02 - Complying with legal and audit requrements.mp4 13.1 MB
02. Cloud Security Guidance/02_03 - Managing information and data security.mp4 15.6 MB
02. Cloud Security Guidance/02_04 - Providing portability and interoperability.mp4 7.5 MB
02. Cloud Security Guidance/02_05 - Comparing traditional IT, BCP, and DR.mp4 12.0 MB
02. Cloud Security Guidance/02_06 - Understanding data center operations.mp4 5.4 MB
02. Cloud Security Guidance/02_07 - Managing incident response.mp4 12.9 MB
猜你喜欢:
Cybersecurity
Lynda
Cloud
Computing
- 【其他】 Cybersecurity Essentials.m4b
-
收录时间:2018-11-14
文档个数:1
文档大小:498.9 MB
最近下载:2025-05-15
人气:3564
磁力链接
Cybersecurity Essentials.m4b 498.9 MB
猜你喜欢:
Cybersecurity
m4b
Essentials
- 【压缩文件】 [ CourseMega.com ] Udemy - Cybersecurity - Attack & Defense Strategies (Red & Blue Team).zip
-
收录时间:2024-03-26
文档个数:1
文档大小:3.0 GB
最近下载:2025-05-16
人气:3369
磁力链接
[ CourseMega.com ] Udemy - Cybersecurity - Attack & Defense Strategies (Red & Blue Team).zip 3.0 GB
猜你喜欢:
Blue
zip
Cybersecurity
Udemy
Attack
Defense
Team
Strategies
CourseMega
com
- 【影视】 [ CourseHulu.com ] Linkedin - Building an ISO 27001-Compliant Cybersecurity Program - Getting Started
-
收录时间:2022-02-18
文档个数:63
文档大小:580.9 MB
最近下载:2025-05-15
人气:3341
磁力链接
~Get Your Files Here !/6. Planning (Clause 6)/016. Information security risk assessment (Clause 6.1.2).mp4 55.1 MB
~Get Your Files Here !/2. ISO 27001 Overview/003. What is the ISO 27001 standard.mp4 45.1 MB
~Get Your Files Here !/3. Complying with ISO 27001/009. Building your ISO 27001 compliance plan.mp4 41.8 MB
~Get Your Files Here !/3. Complying with ISO 27001/008. What to expect when getting ISO 27001 certified.mp4 38.6 MB
~Get Your Files Here !/8. Performance Evaluation and Improvement (Clauses 9 and 10)/024. Internal audit (Clause 9.2).mp4 34.2 MB
~Get Your Files Here !/2. ISO 27001 Overview/004. Breaking down the ISO 27001 standard.mp4 32.4 MB
~Get Your Files Here !/7. Support and Operation (Clauses 7 and 8)/021. Documented information (Clause 7.5).mp4 32.4 MB
~Get Your Files Here !/5. Leadership (Clause 5)/014. Policy (Clause 5.2).mp4 32.3 MB
~Get Your Files Here !/2. ISO 27001 Overview/006. ISO 27001 gaps and criticisms.mp4 31.3 MB
~Get Your Files Here !/3. Complying with ISO 27001/007. ISO 27001 compliance and certification.mp4 30.8 MB
~Get Your Files Here !/5. Leadership (Clause 5)/013. Leadership and commitment (Clause 5.1).mp4 29.4 MB
~Get Your Files Here !/6. Planning (Clause 6)/017. Information security risk treatment (Clause 6.1.3).mp4 27.9 MB
~Get Your Files Here !/2. ISO 27001 Overview/005. Why build an ISO 27001-compliant cybersecurity program.mp4 27.0 MB
~Get Your Files Here !/5. Leadership (Clause 5)/015. Organizational roles, responsibilities, and authorities (Clause 5.3).mp4 26.6 MB
~Get Your Files Here !/6. Planning (Clause 6)/018. Information security objectives and planning to achieve them (Clause 6.2).mp4 23.8 MB
~Get Your Files Here !/8. Performance Evaluation and Improvement (Clauses 9 and 10)/025. Management review (Clause 9.3).mp4 20.6 MB
~Get Your Files Here !/7. Support and Operation (Clauses 7 and 8)/020. Communication (Clause 7.4).mp4 19.7 MB
~Get Your Files Here !/9. Conclusion/027. Next steps to take with ISO 27001.mp4 11.6 MB
~Get Your Files Here !/1. Introduction/001. The international standard for information security.mp4 10.1 MB
~Get Your Files Here !/1. Introduction/002. Who this course is for and prerequisites.mp4 9.0 MB
猜你喜欢:
Building
Getting
Cybersecurity
Linkedin
27001
Started
CourseHulu
Compliant
Program
ISO
- 【影视】 IGTI - Bootcamp - Analista de Cybersecurity
-
收录时间:2021-06-25
文档个数:168
文档大小:13.0 GB
最近下载:2025-05-16
人气:3297
磁力链接
Módulo 4 - Análise Computacional Forense/Segunda aula interativa.mp4 455.8 MB
Módulo 1 - Fundamentos de Cybersecurity/Segunda aula interativa - CBS211A - 1280x720 2310K.mp4 412.0 MB
Módulo 2 - Segurança de Infraestrutura de TI/Primeira aula interativa.mp4 403.8 MB
Módulo 3 - Auditoria e testes de invasão/Segunda aula interativa.mp4 392.8 MB
Módulo 3 - Auditoria e testes de invasão/Primeira aula interativa.mp4 379.2 MB
Desafio Final/Desafio Final.mp4 363.7 MB
Módulo 2 - Segurança de Infraestrutura de TI/5. Firewall, IDS e IPS/Aula 2.5.2 - IPS e IDS.mp4 363.0 MB
Módulo 2 - Segurança de Infraestrutura de TI/9. Controlador de Domínio e Group Polices/Controlador de Domínio e Group Polices.mp4 338.8 MB
Módulo 2 - Segurança de Infraestrutura de TI/Segunda aula interativa.mp4 330.3 MB
Módulo 4 - Análise Computacional Forense/Primeira aula interativa.mp4 279.1 MB
Módulo 2 - Segurança de Infraestrutura de TI/7. Monitoramento e Gerenciamento com NTOP/Monitoramento e Gerenciamento com NTOP.mp4 254.6 MB
Módulo 2 - Segurança de Infraestrutura de TI/11. Camada 5, vírus e Firewall pessoal/Camada 5, vírus e Firewall pessoal.mp4 220.2 MB
Módulo 2 - Segurança de Infraestrutura de TI/13. Camada 7, criptografia e DLP/Camada 7, criptografia e DLP.mp4 205.7 MB
Módulo 3 - Auditoria e testes de invasão/14. Metasploit - Pós-exploração e eliminação dos rastros/HAC- BTC 3.14 - 720p.mp4 198.0 MB
Módulo 2 - Segurança de Infraestrutura de TI/12. Camada 6 e WAF/Camada 6 e WAF.mp4 192.5 MB
Módulo 1 - Fundamentos de Cybersecurity/Primeira aula interativa - CBS211A - 1280x720 2310K.mp4 186.9 MB
Módulo 2 - Segurança de Infraestrutura de TI/2. Arquitetura da Estratégia de Defesa em Profundidade/Arquitetura da Estratégia de Defesa em Profundidade.mp4 175.4 MB
Módulo 2 - Segurança de Infraestrutura de TI/5. Firewall, IDS e IPS/Aula 2.4.2 - Firewall (Parte 2).mp4 158.3 MB
Módulo 3 - Auditoria e testes de invasão/8. Fingerprint e análise de vulnerabilidade/HAC 3.5 - 720p.mp4 149.2 MB
Módulo 2 - Segurança de Infraestrutura de TI/1. Defesa em Profundidade/Aula 1.3 - Elementos de Controle.mp4 147.4 MB
猜你喜欢:
Cybersecurity
de
Analista
IGTI
Bootcamp
- 【影视】 Microsoft Cybersecurity Pro Track PowerShell Security
-
收录时间:2021-03-20
文档个数:58
文档大小:1.4 GB
最近下载:2025-05-16
人气:3259
磁力链接
Course/3. PowerShell Operational Security/2. Managing Remote Execution Capabilities of Windows PowerShell.mp4 192.7 MB
Course/4. Implementing PowerShell-based Security/1. Windows Powershell DSC.mp4 146.7 MB
Course/5. Windows PowerShell-based Exploits and their Mitigation/1. Windows PowerShell-based Attacks.mp4 134.1 MB
Course/4. Implementing PowerShell-based Security/2. Just Enough Administration (JEA).mp4 123.4 MB
Course/3. PowerShell Operational Security/1. Managing Local Script Execution Policy with Windows PowerShell Execution.mp4 116.8 MB
Course/1. Introduction/3. Preparing the Lab Environment.mp4 95.2 MB
Course/2. Windows PowerShell Fundamentals/2. PowerShell Editions and Versions.mp4 88.2 MB
Course/4. Implementing PowerShell-based Security/3. Windows PowerShell Auditing and Logging.mp4 86.9 MB
Course/3. PowerShell Operational Security/4. Language Mode.mp4 79.5 MB
Course/2. Windows PowerShell Fundamentals/1. Windows PowerShell Architecture.mp4 66.6 MB
Course/5. Windows PowerShell-based Exploits and their Mitigation/3. Summary of Windows PowerShell-based Security-Related Technologies.mp4 55.5 MB
Course/2. Windows PowerShell Fundamentals/3. Running Windows Powershell.mp4 53.4 MB
Course/5. Windows PowerShell-based Exploits and their Mitigation/2. Windows PowerShell-based Security Tools.mp4 50.7 MB
Course/3. PowerShell Operational Security/5. Anti-Malware SCan Interface (AMSI).mp4 39.1 MB
Course/1. Introduction/2. About the Course.mp4 25.1 MB
Course/3. PowerShell Operational Security/3. Constrained Endpoints.mp4 24.2 MB
Course/1. Introduction/1. Instructor Introduction.mp4 10.9 MB
Course/3. PowerShell Operational Security/2. Managing Remote Execution Capabilities of Windows PowerShell.srt 43.0 kB
Course/4. Implementing PowerShell-based Security/1. Windows Powershell DSC.srt 37.5 kB
Course/4. Implementing PowerShell-based Security/2. Just Enough Administration (JEA).srt 35.1 kB
猜你喜欢:
Cybersecurity
Pro
PowerShell
Track
Security
Microsoft