磁力管家

磁力管家
为您索检到268条磁力链接,耗时0毫秒。 rss

分享给好友

【影视】 [FreeCoursesOnline.Me] O`REILLY - Building a Career in Cybersecurity
收录时间:2023-12-18 文档个数:75 文档大小:847.7 MB 最近下载:2025-05-16 人气:4418 磁力链接
  • mp4Lesson 1 Getting Started in the Cybersecurity Field/005. 1.4 Cybersecurity Skills.mp4 65.3 MB
  • mp4Lesson 2 Planning Your Cybersecurity Career/004. 2.3 The Value of Professional Certifications.mp4 60.1 MB
  • mp4Lesson 3 Creating Your Own Lab/003. 3.2 Foundational Lab.mp4 48.0 MB
  • mp4Lesson 5 Preparing for Your Interview/005. 5.4 Final Tips.mp4 44.9 MB
  • mp4Lesson 6 Using Continuous Improvement Strategy/007. 6.6 Growing Your Career as a Remote Worker.mp4 40.3 MB
  • mp4Lesson 2 Planning Your Cybersecurity Career/003. 2.2 Creating and Tracking Your Plan.mp4 36.8 MB
  • mp4Lesson 5 Preparing for Your Interview/003. 5.2 Preparing for the Interview.mp4 35.5 MB
  • mp4Lesson 1 Getting Started in the Cybersecurity Field/006. 1.5 Navigating through the Industry.mp4 31.9 MB
  • mp4Lesson 2 Planning Your Cybersecurity Career/002. 2.1 Establishing a Plan.mp4 31.3 MB
  • mp4Lesson 6 Using Continuous Improvement Strategy/008. 6.7 What’s Next.mp4 31.0 MB
  • mp4Lesson 1 Getting Started in the Cybersecurity Field/004. 1.3 Cybersecurity Jobs.mp4 30.3 MB
  • mp4Lesson 5 Preparing for Your Interview/004. 5.3 Advancing in the Interview Process.mp4 29.3 MB
  • mp4Lesson 6 Using Continuous Improvement Strategy/006. 6.5 Keeping a Good Work-life Balance.mp4 28.2 MB
  • mp4Lesson 3 Creating Your Own Lab/005. 3.4 Enabling and Using Microsoft Defender for Cloud.mp4 27.7 MB
  • mp4Introduction/001. Building a Career in Cybersecurity Introduction.mp4 25.1 MB
  • mp4Lesson 6 Using Continuous Improvement Strategy/003. 6.2 Responsibilities and Expectations.mp4 24.6 MB
  • mp4Lesson 4 Expanding Your Networking/005. 4.4 Using LinkedIn to Expand Your Network.mp4 24.5 MB
  • mp4Lesson 1 Getting Started in the Cybersecurity Field/003. 1.2 Roles and Responsibilities.mp4 22.1 MB
  • mp4Lesson 4 Expanding Your Networking/002. 4.1 Understanding the Cybersecurity Community.mp4 21.9 MB
  • mp4Lesson 4 Expanding Your Networking/003. 4.2 Identifying Opportunities to Contribute with the Cybersecurity Community.mp4 19.3 MB
【影视】 Cybersecurity Prevention and Detection 2nd Edition (Video Collection)
收录时间:2024-05-31 文档个数:374 文档大小:3.8 GB 最近下载:2025-05-16 人气:4395 磁力链接
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/007. 1.6 Identity and access management.mp4 120.3 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/003. 1.2 Log ingestion Part 2.mp4 117.9 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/002. 1.1 Log ingestion Part 1.mp4 106.0 MB
  • mp403 Malware and Incident Response/Lesson 1 Threat Landscape/002. 1.1 Malware Threat Landscape.mp4 90.8 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/005. 1.4 Infrastructure concepts.mp4 89.3 MB
  • mp404 Secure Operations and Protections/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/004. 2.3 Technology and tool integration.mp4 87.2 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 2 Analyze Indicators of Potentially Malicious Activity/002. 2.1 Network-related.mp4 77.1 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/008. 1.7 Encryption.mp4 76.0 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/006. 3.5 Common techniques Part 3.mp4 63.7 MB
  • mp403 Malware and Incident Response/Lesson 5 PE File Identification/004. 5.3 Entry Points.mp4 62.4 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/004. 3.3 Common techniques Part 1.mp4 56.9 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/002. 1.1 Threat actors Part 1.mp4 53.5 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/004. 1.3 Operating system (OS) concepts.mp4 52.1 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/005. 3.4 Common techniques Part 2.mp4 51.1 MB
  • mp402 System and Privacy Data Protection/Lesson 4 Analyzing Logs and Impact Analysis/008. 4.7 Impact Analysis.mp4 51.0 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/007. 7.6 SOC and FPGA.mp4 50.5 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/006. 1.5 Network architecture.mp4 50.1 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/010. 7.9 Industrial Control Systems (ICS) and Process Automation.mp4 46.2 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/004. 7.3 Internet of Things (IoT) and Embedded Devices Part 2.mp4 45.3 MB
  • mp404 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/013. 4.12 Threat modeling.mp4 43.6 MB
【压缩文件】 Humble Bundle - Cybersecurity (2023) by Packt
收录时间:2023-12-29 文档个数:31 文档大小:673.5 MB 最近下载:2025-05-16 人气:4320 磁力链接
  • zipsupplement/practical_hardware_pentesting_supplement.zip 98.3 MB
  • pdfcybersecurity_attack_and_defense_strategies.pdf 84.2 MB
  • pdfnetwork_protocols_for_security_professionals.pdf 66.6 MB
  • pdfultimate_kali_linux_book.pdf 53.0 MB
  • pdfmastering_kali_linux_for_advanced_penetration_testing.pdf 48.7 MB
  • pdfmastering_malware_analysis.pdf 41.1 MB
  • pdfpractical_threat_intelligence_and_data-driven_threat_hunting.pdf 34.0 MB
  • pdfmastering_defensive_security.pdf 31.9 MB
  • pdfmastering_windows_security_and_hardening.pdf 28.8 MB
  • pdflearn_wireshark.pdf 24.4 MB
  • pdfpurple_team_strategies.pdf 20.6 MB
  • pdfvulnerability_researcher_s_handbook.pdf 18.2 MB
  • pdfcybersecurity_career_masterplan.pdf 17.8 MB
  • pdfprivilege_escalation_techniques.pdf 15.7 MB
  • pdfmalware_analysis_techniques.pdf 15.4 MB
  • pdfcertified_ethical_hacker_ceh_v12312-50_exam_guide.pdf 15.1 MB
  • pdfmastering_palo_alto_networks.pdf 13.6 MB
  • pdfcomptia_security_plus_sy0-601_certification_guide.pdf 9.8 MB
  • pdfpractical_hardware_pentesting.pdf 8.4 MB
  • zipsupplement/malware_analysis_techniques_supplement.zip 5.8 MB
【影视】 Microsoft Cybersecurity Pro Track Security in Office 365
收录时间:2021-04-22 文档个数:91 文档大小:1.5 GB 最近下载:2025-05-15 人气:4319 磁力链接
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/2. Introduction to Security in Office 365/1. Threat Vectors and Data Breaches.mp4 185.5 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/5. Implementing auditing, insights and alerts/3. Audit Log Investigations.mp4 155.5 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/3. Implementing and Managinng Microsoft Defender for Office 365 (Office 365 ATP)/1. Introduction to Exchange Online Protection.mp4 132.0 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/6. Advanced Security Management/1. Deploy Cloud Application Security.mp4 109.2 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/5. Implementing auditing, insights and alerts/5. Managing insights and alerts in the Security & Compliance Center.mp4 101.2 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/4. Using Office 365 Threat Intelligence/3. Threat Investigation and Response.mp4 91.3 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/3. Implementing and Managinng Microsoft Defender for Office 365 (Office 365 ATP)/3. Managing Safe Attachments.mp4 90.4 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/2. Introduction to Security in Office 365/3. Introduction to Secure Score.mp4 78.1 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/3. Implementing and Managinng Microsoft Defender for Office 365 (Office 365 ATP)/4. Managing Safe Links.mp4 75.1 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/3. Implementing and Managinng Microsoft Defender for Office 365 (Office 365 ATP)/2. Overview of Microsoft Defender for Office 365 (former named Office 365 ATP).mp4 64.5 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/6. Advanced Security Management/2. Use Cloud Application Security.mp4 63.1 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/4. Using Office 365 Threat Intelligence/2. Security (Threat) Dashboard.mp4 61.0 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/3. Implementing and Managinng Microsoft Defender for Office 365 (Office 365 ATP)/5. Monitoring and Reports.mp4 56.6 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/4. Using Office 365 Threat Intelligence/1. Overview of Office 365 Threat Intelligence.mp4 53.0 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/5. Implementing auditing, insights and alerts/2. Enabling mailbox auditing in Exchange Online.mp4 44.4 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/2. Introduction to Security in Office 365/2. Security Solutions in Office 365.mp4 37.2 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/5. Implementing auditing, insights and alerts/1. Overview of auditing in the Security & Compliance Center.mp4 34.8 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/1. Introduction/2. About the Course.mp4 32.8 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/5. Implementing auditing, insights and alerts/4. Enabling sharing auditing for SharePoint and OneDrive.mp4 30.7 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/1. Introduction/3. Preparing the Lab Environment.mp4 25.1 MB
【压缩文件】 [ FreeCourseWeb.com ] Pluralsight CySA+ (CompTIA Cybersecurity Analyst) CS0-001.zip
收录时间:2021-03-11 文档个数:1 文档大小:3.7 GB 最近下载:2025-05-14 人气:4315 磁力链接
  • zip[ FreeCourseWeb.com ] Pluralsight CySA+ (CompTIA Cybersecurity Analyst) CS0-001.zip 3.7 GB
【压缩文件】 SEC595 - Applied Data Science and AI Machine Learning for Cybersecurity Professionals
收录时间:2024-05-03 文档个数:7 文档大小:26.1 GB 最近下载:2025-05-16 人气:4260 磁力链接
  • 7zUSB 2021/595.7z 21.3 GB
  • mp4LIVE 2021/5. Day Five.mp4 1.2 GB
  • mp4LIVE 2021/1. Day One.mp4 1.1 GB
  • mp4LIVE 2021/2. Day Two.mp4 903.0 MB
  • mp4LIVE 2021/3. Day Three.mp4 858.8 MB
  • mp4LIVE 2021/4. Day Four.mp4 784.1 MB
  • pdfPDF 2021/SEC595-Applied-Data-Science-and-Machine-Learning-for-Cybersecurity-Professionals.pdf 61.3 MB
【影视】 [ DevCourseWeb.com ] Udemy - Python for Cybersecurity
收录时间:2023-12-17 文档个数:73 文档大小:1.3 GB 最近下载:2025-05-15 人气:4217 磁力链接
  • mp4~Get Your Files Here !/6. Sockets/7. Part 3 - Sending, Receiving, and Closing the Connection.mp4 179.3 MB
  • mp4~Get Your Files Here !/4. Object Oriented Programming/2. Creating Our First Object.mp4 97.9 MB
  • mp4~Get Your Files Here !/6. Sockets/5. Part 1 - Socket, Bind, Listen Accept.mp4 81.1 MB
  • mp4~Get Your Files Here !/6. Sockets/6. Part 2 - Socket, Connect.mp4 74.5 MB
  • mp4~Get Your Files Here !/6. Sockets/4. Why Encode.mp4 71.2 MB
  • mp4~Get Your Files Here !/6. Sockets/3. How Sockets Will Work.mp4 68.7 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/6. If Statements.mp4 64.8 MB
  • mp4~Get Your Files Here !/5. Let's Make API Requests/5. Consuming an API - Complex.mp4 62.7 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/12. Dictionaries.mp4 51.7 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/13. Functions.mp4 49.3 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/3. Variables.mp4 42.2 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/7. Error Handling Part 1.mp4 40.5 MB
  • mp4~Get Your Files Here !/2. Environment Setup/2. Installing VS Code and Extensions.mp4 37.6 MB
  • mp4~Get Your Files Here !/6. Sockets/2. What is a Socket.mp4 35.1 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/11. Lists.mp4 35.1 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/4. f Strings.mp4 32.8 MB
  • mp4~Get Your Files Here !/4. Object Oriented Programming/3. Importing Packages.mp4 31.4 MB
  • mp4~Get Your Files Here !/1. Getting Started/1. IMPORTANT!!!.mp4 30.9 MB
  • mp4~Get Your Files Here !/5. Let's Make API Requests/4. Consuming an API - Simple.mp4 26.2 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/8. While Loop.mp4 21.6 MB
【影视】 Thinking about Cybersecurity From Cyber Crime to Cyber Warfare
收录时间:2023-12-20 文档个数:39 文档大小:8.8 GB 最近下载:2025-05-16 人气:4027 磁力链接
  • mp4[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/18 Looking Forward-What Does the Future Hold.mp4 535.2 MB
  • mp4[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/10 International Governance and the Internet.mp4 521.6 MB
  • mp4[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/14 Listening In and Going Dark.mp4 516.5 MB
  • mp4[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/08 Nations at Cyber War.mp4 496.5 MB
  • mp4[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/05 The Problem of Identity on the Network.mp4 495.7 MB
  • mp4[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/13 Privacy for the Cyber Age.mp4 494.0 MB
  • mp4[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/11 The Constitution and Cyberspace.mp4 489.6 MB
  • mp4[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/17 Critical Infrastructure and Resiliency.mp4 489.1 MB
  • mp4[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/01 Stuxnet-The First Cyber Guided Missile.mp4 486.4 MB
  • mp4[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/04 Of Viruses, Botnets, and Logic Bombs.mp4 483.5 MB
  • mp4[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/09 Government Regulation of Cyberspace.mp4 478.0 MB
  • mp4[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/12 Big Data- They Know Everything about You.mp4 474.5 MB
  • mp4[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/15 The Devil in the Chips-Hardware Failures.mp4 473.9 MB
  • mp4[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/16 Protecting Yourself in Cyberspace.mp4 471.4 MB
  • mp4[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/06 Cyber Fraud, Theft, and Organized Crime.mp4 470.0 MB
  • mp4[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/07 Hacktivists and Insurgency.mp4 469.1 MB
  • mp4[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/02 The Incredible Scope of Cyberspace.mp4 456.9 MB
  • mp4[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/03 The Five Gateways of Internet Vulnerability.mp4 448.1 MB
  • mp4[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/NA NA.mp4 20.8 MB
  • pad/9.pad/9 915.0 kB
【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity Management for New Managers
收录时间:2023-12-17 文档个数:46 文档大小:982.3 MB 最近下载:2025-05-16 人气:3993 磁力链接
  • mp4~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/5. Cyber Incident & Data Breach Response planning ( Video from IT Web Conference ).mp4 372.8 MB
  • mp4~Get Your Files Here !/2. Module 2 NIST Cybersecurity Framework (CSF)/4. Implementing the NIST CSF in your organisation.mp4 72.3 MB
  • mp4~Get Your Files Here !/5. Module 5 Incident Response and Recovery/1. Creating cybersecurity strategies and action plans.mp4 52.2 MB
  • mp4~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/4. Data Breaches.mp4 51.6 MB
  • mp4~Get Your Files Here !/5. Module 5 Incident Response and Recovery/3. Incident detection and analysis.mp4 48.3 MB
  • mp4~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/1. Understanding the importance of cybersecurity management.mp4 47.9 MB
  • mp4~Get Your Files Here !/4. Module 4 Scenario Planning and Strategy/2. Identifying threats and vulnerabilities.mp4 42.2 MB
  • mp4~Get Your Files Here !/5. Module 5 Incident Response and Recovery/2. Incident Response Planning.mp4 40.1 MB
  • mp4~Get Your Files Here !/3. Module 3 NICE Cybersecurity Workforce Framework/3. Knowledge, skills, and abilities (KSAs).mp4 34.2 MB
  • mp4~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/2. Roles and responsibilities of a cybersecurity manager.mp4 33.1 MB
  • mp4~Get Your Files Here !/2. Module 2 NIST Cybersecurity Framework (CSF)/3. Tiers and profiles.mp4 32.6 MB
  • mp4~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/3. NIST and NICE frameworks overview.mp4 29.3 MB
  • mp4~Get Your Files Here !/2. Module 2 NIST Cybersecurity Framework (CSF)/5. Challenges of Implementing the NIST Framework.mp4 22.4 MB
  • mp4~Get Your Files Here !/2. Module 2 NIST Cybersecurity Framework (CSF)/2. Core functions Identify, Protect, Detect, Respond, and Recover.mp4 18.8 MB
  • mp4~Get Your Files Here !/3. Module 3 NICE Cybersecurity Workforce Framework/4. Integrating the NICE Framework into workforce development and management.mp4 18.3 MB
  • mp4~Get Your Files Here !/3. Module 3 NICE Cybersecurity Workforce Framework/2. Workforce categories and specialty areas.mp4 15.7 MB
  • mp4~Get Your Files Here !/5. Module 5 Incident Response and Recovery/5. Post Incident Activities and Lessons learned.mp4 14.2 MB
  • mp4~Get Your Files Here !/8. Module 8 Course Wrap-up and Next Steps/1. Review of key concepts and frameworks.mp4 9.9 MB
  • mp4~Get Your Files Here !/6. Module 6 Cybersecurity Metrics and Reporting/1. Selecting meaningful cybersecurity metrics.mp4 9.5 MB
  • mp4~Get Your Files Here !/8. Module 8 Course Wrap-up and Next Steps/2. Developing a personal action plan for implementing cyber management practices.mp4 7.8 MB
【影视】 [ DevCourseWeb.com ] Udemy - Deepfake Defense for Cybersecurity and GRC Professionals
收录时间:2024-03-22 文档个数:38 文档大小:1.4 GB 最近下载:2025-05-15 人气:3879 磁力链接
  • mp4~Get Your Files Here !/2. Detection & Mitigation/6. 20-Documenting and structuring our Deepfake mitigation strategy Report.mp4 105.7 MB
  • mp4~Get Your Files Here !/1. Course Foundation/13. 13-Assessing Your organization’s deepfake response capabilities.mp4 99.8 MB
  • mp4~Get Your Files Here !/2. Detection & Mitigation/8. 22-Action Plan for Deepfake Mitigation Strategy Implementation.mp4 93.6 MB
  • mp4~Get Your Files Here !/2. Detection & Mitigation/10. 24-Standard Operating Procedure (SOP) for Deepfake Incident Response.mp4 86.6 MB
  • mp4~Get Your Files Here !/3. Things to consider_Questions to ask/4. 29-Deepfake Mitigation Tools.mp4 80.4 MB
  • mp4~Get Your Files Here !/2. Detection & Mitigation/5. 19-Developing deepfake mitigation strategy through brainstorming.mp4 79.9 MB
  • mp4~Get Your Files Here !/1. Course Foundation/11. 11-Identifying Deepfakes.mp4 67.7 MB
  • mp4~Get Your Files Here !/1. Course Foundation/4. 4-Deepfake Assessment-Can members of your organization identify deepfakes.mp4 63.6 MB
  • mp4~Get Your Files Here !/1. Course Foundation/5. 5-Course Agenda.mp4 60.7 MB
  • mp4~Get Your Files Here !/3. Things to consider_Questions to ask/3. 28-Creating a culture of Verefication.mp4 57.2 MB
  • mp4~Get Your Files Here !/1. Course Foundation/12. 12-Testing for Deepfakes.mp4 57.1 MB
  • mp4~Get Your Files Here !/2. Detection & Mitigation/1. 15-Intro to section 2_Are there any silver bullets for deepfake mitigation.mp4 51.7 MB
  • mp4~Get Your Files Here !/1. Course Foundation/3. 3-Possible causes of deepfake Incident-News Brief Postmortem.mp4 50.1 MB
  • mp4~Get Your Files Here !/2. Detection & Mitigation/3. 17-Important considerations for developing a deepfake defense strategy.mp4 42.4 MB
  • mp4~Get Your Files Here !/1. Course Foundation/1. 1-Deepfake Defense For Cybersecurity & GRC Professionals.mp4 41.8 MB
  • mp4~Get Your Files Here !/2. Detection & Mitigation/4. 18-Key components of a deepfake mitigation strategy.mp4 41.2 MB
  • mp4~Get Your Files Here !/3. Things to consider_Questions to ask/5. 30-The most efficient measures to take against deepfake attacks.mp4 40.7 MB
  • mp4~Get Your Files Here !/1. Course Foundation/14. 14-End of Section_1.mp4 39.9 MB
  • mp4~Get Your Files Here !/1. Course Foundation/6. 6-Meet your Instructor.mp4 39.7 MB
  • mp4~Get Your Files Here !/1. Course Foundation/2. 2-Important Note about course.mp4 38.8 MB
【影视】 [CourseClub.Me] ITProTV - NIST Cybersecurity And Risk Management Frameworks
收录时间:2024-01-03 文档个数:61 文档大小:11.3 GB 最近下载:2025-05-16 人气:3755 磁力链接
  • mp42. NIST Cybersecurity and Publications.mp4 298.0 MB
  • mp426. Response Training and Testing.mp4 288.9 MB
  • mp424. Incident Response Plan Examples.mp4 279.3 MB
  • mp443. Documentation and Approval.mp4 277.5 MB
  • mp420. System Auditing and Logging.mp4 258.9 MB
  • mp423. Response Planning.mp4 255.7 MB
  • mp429. Backup and Recovery.mp4 251.4 MB
  • mp49. Inventory of Critical Assets.mp4 247.4 MB
  • mp446. Documenting Controls.mp4 246.5 MB
  • mp421. Monitoring and Alerting.mp4 238.7 MB
  • mp422. Assessments.mp4 238.7 MB
  • mp442. Control Allocation and Monitoring.mp4 234.0 MB
  • mp410. Business Impact Assessment.mp4 231.6 MB
  • mp440. NIST Control Documents.mp4 230.2 MB
  • mp436. Establishing Scope.mp4 227.5 MB
  • mp444. Security Control Implementation.mp4 225.8 MB
  • mp43. NIST Relationships.mp4 222.6 MB
  • mp46. The Vocabulary of Risk.mp4 222.0 MB
  • mp425. Digital Forensics.mp4 219.4 MB
  • mp451. Assessment Documentation.mp4 219.2 MB
【影视】 [FreeTutorials.Us] cybersecurity-ultimate-ethical-hacking-boot-camp
收录时间:2017-08-24 文档个数:53 文档大小:3.6 GB 最近下载:2025-05-16 人气:3681 磁力链接
  • pdf01 Introduction to the Ultimate Ethical Hacking Boot Camp/attached_files/001 Welcome to the Ultimate Ethical Hacking Boot Camp/Equipment.pdf 131.3 kB
  • jpg02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/Kali.Backgrounds.jpg 478.6 kB
  • jpg02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/Server.2008.Backgrounds.jpg 480.5 kB
  • jpg02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/win7.Backgrounds.jpg 480.5 kB
  • jpg02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/win8.Backgrounds.jpg 480.2 kB
  • jpg02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/winxp.Backgrounds.jpg 480.2 kB
  • pdf08 Password Cracking/attached_files/037 Windows Password Cracking/Wordlist-Resources.pdf 59.0 kB
  • mp401 Introduction to the Ultimate Ethical Hacking Boot Camp/001 Welcome to the Ultimate Ethical Hacking Boot Camp.mp4 71.7 MB
  • mp401 Introduction to the Ultimate Ethical Hacking Boot Camp/002 What is Ethical Hacking.mp4 149.9 MB
  • mp401 Introduction to the Ultimate Ethical Hacking Boot Camp/003 Careers for Ethical Hackers.mp4 48.9 MB
  • mp401 Introduction to the Ultimate Ethical Hacking Boot Camp/004 Wireless Lab Setup Hack.mp4 62.6 MB
  • mp401 Introduction to the Ultimate Ethical Hacking Boot Camp/005 Wireless Hacking Module Disclaimer.mp4 38.8 MB
  • mp401 Introduction to the Ultimate Ethical Hacking Boot Camp/006 Interview Oracle Shodan CNN.mp4 278.0 MB
  • mp402 Hacking Lab Setup - Windows Mac Instructions/007 Introduction to Lab Setup.mp4 31.3 MB
  • mp402 Hacking Lab Setup - Windows Mac Instructions/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines..mp4 20.7 MB
  • mp402 Hacking Lab Setup - Windows Mac Instructions/009 Installing Windows XP.mp4 133.1 MB
  • mp402 Hacking Lab Setup - Windows Mac Instructions/010 Installing Server 2008.mp4 7.7 MB
  • mp402 Hacking Lab Setup - Windows Mac Instructions/011 Installing Kali Linux from ISO.mp4 33.5 MB
  • mp402 Hacking Lab Setup - Windows Mac Instructions/012 Installing Kali Linux Prebuild Virtual Machine.mp4 29.4 MB
  • mp402 Hacking Lab Setup - Windows Mac Instructions/013 Installing Windows 7.mp4 9.8 MB
【其他】 Pascal Ackerman - Industrial Cybersecurity - 2017
收录时间:2023-12-23 文档个数:3 文档大小:117.2 MB 最近下载:2025-05-16 人气:3637 磁力链接
  • mobiPascal Ackerman - Industrial Cybersecurity - 2017.mobi 64.3 MB
  • pdfPascal Ackerman - Industrial Cybersecurity - 2017.pdf 26.8 MB
  • epubPascal Ackerman - Industrial Cybersecurity - 2017.epub 26.1 MB
【压缩文件】 [ FreeCourseWeb.com ] PluralSight - Building a CyberSecurity Home Lab Environment.zip
收录时间:2021-04-12 文档个数:1 文档大小:376.0 MB 最近下载:2025-05-15 人气:3626 磁力链接
  • zip[ FreeCourseWeb.com ] PluralSight - Building a CyberSecurity Home Lab Environment.zip 376.0 MB
【影视】 Lynda - Cybersecurity with Cloud Computing
收录时间:2017-07-16 文档个数:39 文档大小:371.6 MB 最近下载:2025-05-15 人气:3619 磁力链接
  • mp400. Introduction/00_01 - Welcome.mp4 17.4 MB
  • mp400. Introduction/00_02 - What you should know.mp4 861.2 kB
  • mp400. Introduction/00_03 - Reference sites.mp4 16.6 MB
  • mp400. Introduction/00_04 - Using the exercise files.mp4 278.9 kB
  • mp401. Cloud Fundamentals/01_01 - Defining the essential characteristics of cloud.mp4 15.8 MB
  • mp401. Cloud Fundamentals/01_02 - Understanding infrastructure as a service.mp4 11.9 MB
  • mp401. Cloud Fundamentals/01_03 - Unraveling platform as a service.mp4 6.8 MB
  • mp401. Cloud Fundamentals/01_04 - Comprehending software as a service.mp4 8.6 MB
  • mp401. Cloud Fundamentals/01_05 - Discovering deployment models.mp4 11.4 MB
  • mp401. Cloud Fundamentals/01_06 - Identifying cloud incidents.mp4 15.2 MB
  • mp401. Cloud Fundamentals/01_07 - Dissecting the anatomy of a service failure.mp4 8.8 MB
  • mp401. Cloud Fundamentals/01_08 - Deciphering the anatomy of a business failure.mp4 8.3 MB
  • mp401. Cloud Fundamentals/01_09 - Defining trust models for cloud.mp4 14.0 MB
  • mp402. Cloud Security Guidance/02_01 - Identifying governance and risk.mp4 5.5 MB
  • mp402. Cloud Security Guidance/02_02 - Complying with legal and audit requrements.mp4 13.1 MB
  • mp402. Cloud Security Guidance/02_03 - Managing information and data security.mp4 15.6 MB
  • mp402. Cloud Security Guidance/02_04 - Providing portability and interoperability.mp4 7.5 MB
  • mp402. Cloud Security Guidance/02_05 - Comparing traditional IT, BCP, and DR.mp4 12.0 MB
  • mp402. Cloud Security Guidance/02_06 - Understanding data center operations.mp4 5.4 MB
  • mp402. Cloud Security Guidance/02_07 - Managing incident response.mp4 12.9 MB
【其他】 Cybersecurity Essentials.m4b
收录时间:2018-11-14 文档个数:1 文档大小:498.9 MB 最近下载:2025-05-15 人气:3564 磁力链接
  • m4bCybersecurity Essentials.m4b 498.9 MB
【压缩文件】 [ CourseMega.com ] Udemy - Cybersecurity - Attack & Defense Strategies (Red & Blue Team).zip
收录时间:2024-03-26 文档个数:1 文档大小:3.0 GB 最近下载:2025-05-16 人气:3369 磁力链接
  • zip[ CourseMega.com ] Udemy - Cybersecurity - Attack & Defense Strategies (Red & Blue Team).zip 3.0 GB
【影视】 [ CourseHulu.com ] Linkedin - Building an ISO 27001-Compliant Cybersecurity Program - Getting Started
收录时间:2022-02-18 文档个数:63 文档大小:580.9 MB 最近下载:2025-05-15 人气:3341 磁力链接
  • mp4~Get Your Files Here !/6. Planning (Clause 6)/016. Information security risk assessment (Clause 6.1.2).mp4 55.1 MB
  • mp4~Get Your Files Here !/2. ISO 27001 Overview/003. What is the ISO 27001 standard.mp4 45.1 MB
  • mp4~Get Your Files Here !/3. Complying with ISO 27001/009. Building your ISO 27001 compliance plan.mp4 41.8 MB
  • mp4~Get Your Files Here !/3. Complying with ISO 27001/008. What to expect when getting ISO 27001 certified.mp4 38.6 MB
  • mp4~Get Your Files Here !/8. Performance Evaluation and Improvement (Clauses 9 and 10)/024. Internal audit (Clause 9.2).mp4 34.2 MB
  • mp4~Get Your Files Here !/2. ISO 27001 Overview/004. Breaking down the ISO 27001 standard.mp4 32.4 MB
  • mp4~Get Your Files Here !/7. Support and Operation (Clauses 7 and 8)/021. Documented information (Clause 7.5).mp4 32.4 MB
  • mp4~Get Your Files Here !/5. Leadership (Clause 5)/014. Policy (Clause 5.2).mp4 32.3 MB
  • mp4~Get Your Files Here !/2. ISO 27001 Overview/006. ISO 27001 gaps and criticisms.mp4 31.3 MB
  • mp4~Get Your Files Here !/3. Complying with ISO 27001/007. ISO 27001 compliance and certification.mp4 30.8 MB
  • mp4~Get Your Files Here !/5. Leadership (Clause 5)/013. Leadership and commitment (Clause 5.1).mp4 29.4 MB
  • mp4~Get Your Files Here !/6. Planning (Clause 6)/017. Information security risk treatment (Clause 6.1.3).mp4 27.9 MB
  • mp4~Get Your Files Here !/2. ISO 27001 Overview/005. Why build an ISO 27001-compliant cybersecurity program.mp4 27.0 MB
  • mp4~Get Your Files Here !/5. Leadership (Clause 5)/015. Organizational roles, responsibilities, and authorities (Clause 5.3).mp4 26.6 MB
  • mp4~Get Your Files Here !/6. Planning (Clause 6)/018. Information security objectives and planning to achieve them (Clause 6.2).mp4 23.8 MB
  • mp4~Get Your Files Here !/8. Performance Evaluation and Improvement (Clauses 9 and 10)/025. Management review (Clause 9.3).mp4 20.6 MB
  • mp4~Get Your Files Here !/7. Support and Operation (Clauses 7 and 8)/020. Communication (Clause 7.4).mp4 19.7 MB
  • mp4~Get Your Files Here !/9. Conclusion/027. Next steps to take with ISO 27001.mp4 11.6 MB
  • mp4~Get Your Files Here !/1. Introduction/001. The international standard for information security.mp4 10.1 MB
  • mp4~Get Your Files Here !/1. Introduction/002. Who this course is for and prerequisites.mp4 9.0 MB
【影视】 IGTI - Bootcamp - Analista de Cybersecurity
收录时间:2021-06-25 文档个数:168 文档大小:13.0 GB 最近下载:2025-05-16 人气:3297 磁力链接
  • mp4Módulo 4 - Análise Computacional Forense/Segunda aula interativa.mp4 455.8 MB
  • mp4Módulo 1 - Fundamentos de Cybersecurity/Segunda aula interativa - CBS211A - 1280x720 2310K.mp4 412.0 MB
  • mp4Módulo 2 - Segurança de Infraestrutura de TI/Primeira aula interativa.mp4 403.8 MB
  • mp4Módulo 3 - Auditoria e testes de invasão/Segunda aula interativa.mp4 392.8 MB
  • mp4Módulo 3 - Auditoria e testes de invasão/Primeira aula interativa.mp4 379.2 MB
  • mp4Desafio Final/Desafio Final.mp4 363.7 MB
  • mp4Módulo 2 - Segurança de Infraestrutura de TI/5. Firewall, IDS e IPS/Aula 2.5.2 - IPS e IDS.mp4 363.0 MB
  • mp4Módulo 2 - Segurança de Infraestrutura de TI/9. Controlador de Domínio e Group Polices/Controlador de Domínio e Group Polices.mp4 338.8 MB
  • mp4Módulo 2 - Segurança de Infraestrutura de TI/Segunda aula interativa.mp4 330.3 MB
  • mp4Módulo 4 - Análise Computacional Forense/Primeira aula interativa.mp4 279.1 MB
  • mp4Módulo 2 - Segurança de Infraestrutura de TI/7. Monitoramento e Gerenciamento com NTOP/Monitoramento e Gerenciamento com NTOP.mp4 254.6 MB
  • mp4Módulo 2 - Segurança de Infraestrutura de TI/11. Camada 5, vírus e Firewall pessoal/Camada 5, vírus e Firewall pessoal.mp4 220.2 MB
  • mp4Módulo 2 - Segurança de Infraestrutura de TI/13. Camada 7, criptografia e DLP/Camada 7, criptografia e DLP.mp4 205.7 MB
  • mp4Módulo 3 - Auditoria e testes de invasão/14. Metasploit - Pós-exploração e eliminação dos rastros/HAC- BTC 3.14 - 720p.mp4 198.0 MB
  • mp4Módulo 2 - Segurança de Infraestrutura de TI/12. Camada 6 e WAF/Camada 6 e WAF.mp4 192.5 MB
  • mp4Módulo 1 - Fundamentos de Cybersecurity/Primeira aula interativa - CBS211A - 1280x720 2310K.mp4 186.9 MB
  • mp4Módulo 2 - Segurança de Infraestrutura de TI/2. Arquitetura da Estratégia de Defesa em Profundidade/Arquitetura da Estratégia de Defesa em Profundidade.mp4 175.4 MB
  • mp4Módulo 2 - Segurança de Infraestrutura de TI/5. Firewall, IDS e IPS/Aula 2.4.2 - Firewall (Parte 2).mp4 158.3 MB
  • mp4Módulo 3 - Auditoria e testes de invasão/8. Fingerprint e análise de vulnerabilidade/HAC 3.5 - 720p.mp4 149.2 MB
  • mp4Módulo 2 - Segurança de Infraestrutura de TI/1. Defesa em Profundidade/Aula 1.3 - Elementos de Controle.mp4 147.4 MB
【影视】 Microsoft Cybersecurity Pro Track PowerShell Security
收录时间:2021-03-20 文档个数:58 文档大小:1.4 GB 最近下载:2025-05-16 人气:3259 磁力链接
  • mp4Course/3. PowerShell Operational Security/2. Managing Remote Execution Capabilities of Windows PowerShell.mp4 192.7 MB
  • mp4Course/4. Implementing PowerShell-based Security/1. Windows Powershell DSC.mp4 146.7 MB
  • mp4Course/5. Windows PowerShell-based Exploits and their Mitigation/1. Windows PowerShell-based Attacks.mp4 134.1 MB
  • mp4Course/4. Implementing PowerShell-based Security/2. Just Enough Administration (JEA).mp4 123.4 MB
  • mp4Course/3. PowerShell Operational Security/1. Managing Local Script Execution Policy with Windows PowerShell Execution.mp4 116.8 MB
  • mp4Course/1. Introduction/3. Preparing the Lab Environment.mp4 95.2 MB
  • mp4Course/2. Windows PowerShell Fundamentals/2. PowerShell Editions and Versions.mp4 88.2 MB
  • mp4Course/4. Implementing PowerShell-based Security/3. Windows PowerShell Auditing and Logging.mp4 86.9 MB
  • mp4Course/3. PowerShell Operational Security/4. Language Mode.mp4 79.5 MB
  • mp4Course/2. Windows PowerShell Fundamentals/1. Windows PowerShell Architecture.mp4 66.6 MB
  • mp4Course/5. Windows PowerShell-based Exploits and their Mitigation/3. Summary of Windows PowerShell-based Security-Related Technologies.mp4 55.5 MB
  • mp4Course/2. Windows PowerShell Fundamentals/3. Running Windows Powershell.mp4 53.4 MB
  • mp4Course/5. Windows PowerShell-based Exploits and their Mitigation/2. Windows PowerShell-based Security Tools.mp4 50.7 MB
  • mp4Course/3. PowerShell Operational Security/5. Anti-Malware SCan Interface (AMSI).mp4 39.1 MB
  • mp4Course/1. Introduction/2. About the Course.mp4 25.1 MB
  • mp4Course/3. PowerShell Operational Security/3. Constrained Endpoints.mp4 24.2 MB
  • mp4Course/1. Introduction/1. Instructor Introduction.mp4 10.9 MB
  • srtCourse/3. PowerShell Operational Security/2. Managing Remote Execution Capabilities of Windows PowerShell.srt 43.0 kB
  • srtCourse/4. Implementing PowerShell-based Security/1. Windows Powershell DSC.srt 37.5 kB
  • srtCourse/4. Implementing PowerShell-based Security/2. Just Enough Administration (JEA).srt 35.1 kB
共14页 上一页 1 2 3 4 5 6 7 8 下一页