磁力管家

磁力管家
为您索检到268条磁力链接,耗时0毫秒。 rss

分享给好友

【影视】 Cybersecurity for Executives
收录时间:2018-10-13 文档个数:86 文档大小:300.7 MB 最近下载:2025-05-15 人气:3241 磁力链接
  • mp45.4. Stop Malicious Code/20.How to avoid malicious code.mp4 12.5 MB
  • mp41.Introduction/01.Cybersecurity for executives.mp4 4.3 MB
  • srt1.Introduction/02.What you should know.en.srt 1.4 kB
  • mp41.Introduction/02.What you should know.mp4 1.2 MB
  • srt1.Introduction/03.How this course is organized.en.srt 1.7 kB
  • mp41.Introduction/03.How this course is organized.mp4 2.3 MB
  • srt2.1. Understand the Big Picture/04.Understand the big picture overview.en.srt 2.1 kB
  • mp42.1. Understand the Big Picture/04.Understand the big picture overview.mp4 4.8 MB
  • srt2.1. Understand the Big Picture/05.Why are you a target.en.srt 4.0 kB
  • mp42.1. Understand the Big Picture/05.Why are you a target.mp4 8.1 MB
  • srt2.1. Understand the Big Picture/06.Example - Organized crime.en.srt 4.5 kB
  • mp42.1. Understand the Big Picture/06.Example - Organized crime.mp4 9.7 MB
  • srt2.1. Understand the Big Picture/07.Why are you in the line of fire.en.srt 3.5 kB
  • mp42.1. Understand the Big Picture/07.Why are you in the line of fire.mp4 7.1 MB
  • srt2.1. Understand the Big Picture/08.Example - Cyberwar cross-fire.en.srt 3.3 kB
  • mp42.1. Understand the Big Picture/08.Example - Cyberwar cross-fire.mp4 7.6 MB
  • srt2.1. Understand the Big Picture/09.Insider threat - Cyber failure.en.srt 4.4 kB
  • mp42.1. Understand the Big Picture/09.Insider threat - Cyber failure.mp4 7.6 MB
  • srt3.2. How to Think about Cybersecurity/10.Think about cybersecurity summary.en.srt 1.7 kB
  • mp43.2. How to Think about Cybersecurity/10.Think about cybersecurity summary.mp4 2.9 MB
【影视】 Cybersecurity Threats Ransomware
收录时间:2017-04-29 文档个数:39 文档大小:405.4 MB 最近下载:2025-05-15 人气:3100 磁力链接
  • mp401. Course Overview/01. Intro.mp4 5.4 MB
  • mp402. What Is Ransomware/01. Overview.mp4 4.1 MB
  • mp402. What Is Ransomware/02. Definition and Types of Ransomware.mp4 20.3 MB
  • mp402. What Is Ransomware/03. The Ransomware Timeline.mp4 15.2 MB
  • mp402. What Is Ransomware/04. What Is Ransomware 30,000 ft. View.mp4 5.9 MB
  • mp402. What Is Ransomware/05. How Big Is the Problem.mp4 15.1 MB
  • mp402. What Is Ransomware/06. Ransomware Victims.mp4 11.7 MB
  • mp402. What Is Ransomware/07. Module Progress Checkpoint.mp4 617.9 kB
  • mp402. What Is Ransomware/08. Demo of Real World Ransomware Attack.mp4 52.0 MB
  • mp402. What Is Ransomware/09. Variations of Ransomware.mp4 6.4 MB
  • mp402. What Is Ransomware/10. Summary.mp4 2.5 MB
  • mp403. Ransomware Entry Points/01. Overview.mp4 2.7 MB
  • mp403. Ransomware Entry Points/02. The 5 Classic Infection Vectors.mp4 3.1 MB
  • mp403. Ransomware Entry Points/03. Phishing and Email Attachments.mp4 10.6 MB
  • mp403. Ransomware Entry Points/04. Embedded Hyperlinks, Websitesdownloads, and Drive-by Infections.mp4 6.2 MB
  • mp403. Ransomware Entry Points/05. Why Common Exploit Kits Are Used.mp4 5.4 MB
  • mp403. Ransomware Entry Points/06. Command and Callback (C&C) and Indicators of Compromise.mp4 7.0 MB
  • mp403. Ransomware Entry Points/07. Summary.mp4 2.8 MB
  • mp404. Incident Response Detection and Containment/01. Overview.mp4 2.6 MB
  • mp404. Incident Response Detection and Containment/02. Indicators of Compromise.mp4 5.3 MB
【音乐】 TTC - Thinking about Cybersecurity
收录时间:2021-03-26 文档个数:19 文档大小:353.5 MB 最近下载:2025-05-15 人气:3035 磁力链接
  • mp3TGC_9523_Lect18_Cybersecurity.mp3 21.3 MB
  • mp3TGC_9523_Lect10_Cybersecurity.mp3 20.8 MB
  • mp3TGC_9523_Lect14_Cybersecurity.mp3 20.6 MB
  • mp3TGC_9523_Lect08_Cybersecurity.mp3 19.8 MB
  • mp3TGC_9523_Lect05_Cybersecurity.mp3 19.8 MB
  • mp3TGC_9523_Lect13_Cybersecurity.mp3 19.7 MB
  • mp3TGC_9523_Lect11_Cybersecurity.mp3 19.5 MB
  • mp3TGC_9523_Lect17_Cybersecurity.mp3 19.5 MB
  • mp3TGC_9523_Lect01_Cybersecurity.mp3 19.5 MB
  • mp3TGC_9523_Lect04_Cybersecurity.mp3 19.3 MB
  • mp3TGC_9523_Lect09_Cybersecurity.mp3 19.1 MB
  • mp3TGC_9523_Lect12_Cybersecurity.mp3 18.9 MB
  • mp3TGC_9523_Lect15_Cybersecurity.mp3 18.9 MB
  • mp3TGC_9523_Lect16_Cybersecurity.mp3 18.8 MB
  • mp3TGC_9523_Lect06_Cybersecurity.mp3 18.7 MB
  • mp3TGC_9523_Lect07_Cybersecurity.mp3 18.7 MB
  • mp3TGC_9523_Lect02_Cybersecurity.mp3 18.2 MB
  • mp3TGC_9523_Lect03_Cybersecurity.mp3 17.9 MB
  • PDFDG9523_98F12.PDF 4.7 MB
【影视】 [ DevCourseWeb.com ] Udemy - The Cybersecurity Consultant Mindset
收录时间:2023-12-26 文档个数:32 文档大小:3.1 GB 最近下载:2025-05-14 人气:3009 磁力链接
  • mp4~Get Your Files Here !/3. Risk Management and Assessment/2. Introduction to Risk Management.mp4 222.8 MB
  • mp4~Get Your Files Here !/2. Introduction to Cybersecurity Consulting/3. Understanding the Role of a Cyber Consultant.mp4 212.8 MB
  • mp4~Get Your Files Here !/7. Developing Soft Skills for Your Career/2. Communication and Interpersonal Skills.mp4 211.5 MB
  • mp4~Get Your Files Here !/3. Risk Management and Assessment/3. Compliance Requirements.mp4 204.7 MB
  • mp4~Get Your Files Here !/2. Introduction to Cybersecurity Consulting/2. Overview of Cybersecurity.mp4 198.8 MB
  • mp4~Get Your Files Here !/2. Introduction to Cybersecurity Consulting/5. Preparing for a Career in Cyber Consulting.mp4 196.6 MB
  • mp4~Get Your Files Here !/3. Risk Management and Assessment/5. Security Documentation Development.mp4 178.0 MB
  • mp4~Get Your Files Here !/4. Tools and Technologies/3. Vulnerability Assessment and Pentesting.mp4 177.6 MB
  • mp4~Get Your Files Here !/3. Risk Management and Assessment/4. Risk Assessment and Analysis.mp4 158.0 MB
  • mp4~Get Your Files Here !/4. Tools and Technologies/6. Cybersecurity Frameworks Selection.mp4 146.1 MB
  • mp4~Get Your Files Here !/5. Incident Response/3. Developing an Incident Response Plan.mp4 123.8 MB
  • mp4~Get Your Files Here !/4. Tools and Technologies/2. Network Scanning and Monitoring.mp4 115.2 MB
  • mp4~Get Your Files Here !/2. Introduction to Cybersecurity Consulting/4. Benefits of Cyber Consulting and Cons.mp4 102.7 MB
  • mp4~Get Your Files Here !/4. Tools and Technologies/5. Security Information and Event Management Systems.mp4 99.4 MB
  • mp4~Get Your Files Here !/6. Cybersecurity Auditing and Frameworks/4. Cybersecurity Frameworks - Implementation.mp4 81.3 MB
  • mp4~Get Your Files Here !/4. Tools and Technologies/4. Intrusion Detection and Prevention Systems.mp4 73.6 MB
  • mp4~Get Your Files Here !/6. Cybersecurity Auditing and Frameworks/3. Auditing Standards and Requirements.mp4 73.1 MB
  • mp4~Get Your Files Here !/6. Cybersecurity Auditing and Frameworks/2. Overview of IT Auditing.mp4 72.9 MB
  • mp4~Get Your Files Here !/7. Developing Soft Skills for Your Career/5. Practical Exercises and Resources.mp4 68.0 MB
  • mp4~Get Your Files Here !/5. Incident Response/2. Defining a Security Incident.mp4 67.7 MB
【影视】 [ TutSala.com ] Udemy - Cybersecurity For Beginners - Network Architecture
收录时间:2022-01-09 文档个数:124 文档大小:1.0 GB 最近下载:2025-05-15 人气:3002 磁力链接
  • mp4~Get Your Files Here !/17. Lab Demonstration - Scanning Networks with NMAP Pt. 1/1. Lab Demonstration - Scanning Networks with NMAP Pt. 1.mp4 477.0 MB
  • mp4~Get Your Files Here !/18. Lab Demonstration - Scanning Networks with NMAP Pt. 2/1. Lab Demonstration - Scanning Networks with NMAP Pt. 2.mp4 331.7 MB
  • mp4~Get Your Files Here !/11. Denial-of-Service Attack (DoS) Attack/2. The 5 Principal Differences Between DoS & DDoS Attacks.mp4 14.1 MB
  • mp4~Get Your Files Here !/11. Denial-of-Service Attack (DoS) Attack/6. Common DoS Attack Pt. 2.mp4 9.8 MB
  • mp4~Get Your Files Here !/7. Network Devices/1. Common Network Devices.mp4 8.9 MB
  • mp4~Get Your Files Here !/1. The OSI Model/1. The OSI Model.mp4 7.8 MB
  • mp4~Get Your Files Here !/11. Denial-of-Service Attack (DoS) Attack/5. Common DoS Attack Pt. 1.mp4 6.9 MB
  • mp4~Get Your Files Here !/14. DNS Attacks/1. DNS Attacks.mp4 6.4 MB
  • mp4~Get Your Files Here !/7. Network Devices/2. More Common Network Devices.mp4 6.2 MB
  • mp4~Get Your Files Here !/11. Denial-of-Service Attack (DoS) Attack/1. DoS Vs. DDoS.mp4 6.0 MB
  • mp4~Get Your Files Here !/4. IPv4 Vs. IPv6/1. IPv4.mp4 5.7 MB
  • mp4~Get Your Files Here !/1. The OSI Model/3. Data Link Layer.mp4 5.7 MB
  • mp4~Get Your Files Here !/10. Intrusion Detection Systems (IDS) & Intrusion Prevention Systems (IPS)/2. Behavior Based IDS Vs. Knowledge Based IDS.mp4 5.5 MB
  • mp4~Get Your Files Here !/15. What is Footprinting/3. Footprinting Helps To.mp4 5.4 MB
  • mp4~Get Your Files Here !/15. What is Footprinting/4. Footprinting Methodology.mp4 5.4 MB
  • mp4~Get Your Files Here !/11. Denial-of-Service Attack (DoS) Attack/7. Three-Way-Handshake Importance To Network Attacks (SYN Flood).mp4 5.2 MB
  • mp4~Get Your Files Here !/9. Types of Firewalls/2. Types of Firewalls Pt. 2.mp4 5.1 MB
  • mp4~Get Your Files Here !/1. The OSI Model/2. Physical Layer.mp4 4.8 MB
  • mp4~Get Your Files Here !/9. Types of Firewalls/1. Types of Firewalls Pt. 1.mp4 4.6 MB
  • mp4~Get Your Files Here !/1. The OSI Model/4. Network Layer.mp4 4.5 MB
【影视】 [ DevCourseWeb.com ] Udemy - Python for Computer Networks and cybersecurity
收录时间:2023-12-19 文档个数:18 文档大小:809.9 MB 最近下载:2025-05-13 人气:2991 磁力链接
  • mp4~Get Your Files Here !/3. Network Scanning for Defenders/1. Network Scanning for Defenders.mp4 369.1 MB
  • mp4~Get Your Files Here !/2. Fulfilling Pre-ATT&CK Objectives/1. Implementing a SYN Scan in scapy.mp4 278.3 MB
  • mp4~Get Your Files Here !/4. Gaining Initial Access_part3/1. Gaining Initial Access.mp4 127.2 MB
  • mp4~Get Your Files Here !/5. File Transfer and Plotting_E1/1. File Transfer and Plotting.mp4 21.8 MB
  • mp4~Get Your Files Here !/6. File Transfer and Plotting_Exercise2/1. File Transfer and Plotting_E1.mp4 13.4 MB
  • py~Get Your Files Here !/3. Network Scanning for Defenders/1.1 DNSExploration.py 1.6 kB
  • py~Get Your Files Here !/4. Gaining Initial Access_part3/1.1 TestDefaultCredentials.py 1.5 kB
  • py~Get Your Files Here !/2. Fulfilling Pre-ATT&CK Objectives/1.1 HoneyScan.py 1.2 kB
  • py~Get Your Files Here !/3. Network Scanning for Defenders/1.2 HoneyResolver.py 1.1 kB
  • py~Get Your Files Here !/5. File Transfer and Plotting_E1/1.2 Example 6.1.py 1.0 kB
  • html~Get Your Files Here !/1. Введение/1. Introduction.html 908 Bytes
  • py~Get Your Files Here !/2. Fulfilling Pre-ATT&CK Objectives/1.2 PortScan.py 789 Bytes
  • txt~Get Your Files Here !/Bonus Resources.txt 386 Bytes
  • py~Get Your Files Here !/6. File Transfer and Plotting_Exercise2/1.2 download.py 262 Bytes
  • py~Get Your Files Here !/6. File Transfer and Plotting_Exercise2/1.3 upload.py 256 Bytes
  • ini~Get Your Files Here !/5. File Transfer and Plotting_E1/1.1 desktop.ini 244 Bytes
  • ini~Get Your Files Here !/6. File Transfer and Plotting_Exercise2/1.1 desktop.ini 244 Bytes
  • urlGet Bonus Downloads Here.url 182 Bytes
【影视】 Lynda - Foundations of Cybersecurity
收录时间:2017-02-19 文档个数:27 文档大小:300.9 MB 最近下载:2025-05-15 人气:2960 磁力链接
  • mp4021 Managing user access and identity.mp4 20.7 MB
  • mp4022 Implementing preventative security.mp4 18.8 MB
  • mp4023 Monitoring and alerts.mp4 15.7 MB
  • mp4018 Describing security requirements.mp4 14.9 MB
  • mp4008 Dissecting the payment card industry and PCI DSS.mp4 14.6 MB
  • mp4007 Implementing control frameworks.mp4 14.3 MB
  • mp4025 Preparing for an incident.mp4 14.2 MB
  • mp4019 Architecting security risk.mp4 13.5 MB
  • mp4016 Understanding advanced persistent threats (APTs).mp4 13.5 MB
  • mp4004 Dissecting cyber risk.mp4 13.1 MB
  • mp4003 Understanding the NIST cybersecurity framework.mp4 12.6 MB
  • mp4011 Dissecting security threats.mp4 11.6 MB
  • mp4026 Responding to an incident.mp4 11.5 MB
  • mp4005 Unpacking COBIT 5.mp4 10.3 MB
  • mp4012 Exploring cybercrime as an industry.mp4 9.9 MB
  • mp4014 Using callbacks to capture keystrokes.mp4 9.8 MB
  • mp4015 Hiding malware with rootkits.mp4 9.8 MB
  • mp4009 Exploring the Cyber Essentials framework.mp4 9.3 MB
  • mp4013 Hiding malware through cloaking and alternate data streams.mp4 9.0 MB
  • mp4020 Selecting security controls.mp4 8.5 MB
【压缩文件】 A Hacker's Guide to Internet Safety and Cybersecurity
收录时间:2018-07-25 文档个数:4 文档大小:2.5 GB 最近下载:2025-05-16 人气:2853 磁力链接
  • txtTutsGalaxy.com.txt 41 Bytes
  • txtTorrent_downloaded_from_Demonoid_-_www.demonoid.pw_.txt 59 Bytes
  • txtRead Me.txt 80 Bytes
  • zipA Hacker's Guide to Internet Safety and Cybersecurity.zip 2.5 GB
【影视】 Pluralsight - Cybersecurity Threats: Ransomware
收录时间:2017-06-08 文档个数:37 文档大小:388.1 MB 最近下载:2025-05-16 人气:2825 磁力链接
  • mp43. Ransomware Entry Points/15. Embedded Hyperlinks, Websites_downloads, and Drive-by Infections.mp4 6.2 MB
  • mp43. Ransomware Entry Points/16. Why Common Exploit Kits Are Used.mp4 5.4 MB
  • mp43. Ransomware Entry Points/14. Phishing and Email Attachments.mp4 10.6 MB
  • mp43. Ransomware Entry Points/18. Summary.mp4 2.8 MB
  • mp43. Ransomware Entry Points/12. Overview.mp4 2.7 MB
  • mp43. Ransomware Entry Points/13. The 5 Classic Infection Vectors.mp4 3.1 MB
  • mp43. Ransomware Entry Points/17. Command and Callback (C&C) and Indicators of Compromise.mp4 7.0 MB
  • mp44. Incident Response - Detection and Containment/21. Detecting an Attack.mp4 7.3 MB
  • mp44. Incident Response - Detection and Containment/20. Indicators of Compromise.mp4 5.3 MB
  • mp44. Incident Response - Detection and Containment/23. Summary.mp4 1.7 MB
  • mp44. Incident Response - Detection and Containment/19. Overview.mp4 2.6 MB
  • mp44. Incident Response - Detection and Containment/22. Containing the Attack.mp4 9.0 MB
  • mp46. Countermeasures and Preparing Your Incident Response/35. Next Generation Anti-virus_Anti-malware.mp4 5.6 MB
  • mp46. Countermeasures and Preparing Your Incident Response/37. Summary.mp4 5.5 MB
  • mp46. Countermeasures and Preparing Your Incident Response/33. Defending a Ransomware Attack.mp4 11.4 MB
  • mp46. Countermeasures and Preparing Your Incident Response/34. Protecting a Windows Network.mp4 8.0 MB
  • mp46. Countermeasures and Preparing Your Incident Response/32. Overview.mp4 5.5 MB
  • mp46. Countermeasures and Preparing Your Incident Response/36. Lessons Learned and Your Incident Response Plan.mp4 10.9 MB
  • mp42. What Is Ransomware/06. How Big Is the Problem.mp4 15.1 MB
  • mp42. What Is Ransomware/02. Overview.mp4 4.1 MB
【影视】 [ WebToolTip.com ] Udemy - ISACA Cybersecurity Fundamentals - Complete Training Course
收录时间:2025-03-07 文档个数:45 文档大小:858.9 MB 最近下载:2025-05-16 人气:2781 磁力链接
  • mp4~Get Your Files Here !/2 - Types of Security/4 -Cybersecurity.mp4 38.9 MB
  • mp4~Get Your Files Here !/3 - Governance, Risk Management and Compliance/5 -Risk Analysis Approaches.mp4 36.9 MB
  • mp4~Get Your Files Here !/4 - Common Types of Malware/6 -Trojan Horses.mp4 34.2 MB
  • mp4~Get Your Files Here !/4 - Common Types of Malware/5 -Ransomware.mp4 34.1 MB
  • mp4~Get Your Files Here !/4 - Common Types of Malware/3 -Worms.mp4 33.9 MB
  • mp4~Get Your Files Here !/5 - Security Controls/2 -Control Functions and Types.mp4 32.8 MB
  • mp4~Get Your Files Here !/4 - Common Types of Malware/2 -Viruses.mp4 31.7 MB
  • mp4~Get Your Files Here !/2 - Types of Security/5 -Physical Security.mp4 31.6 MB
  • mp4~Get Your Files Here !/3 - Governance, Risk Management and Compliance/4 -Risk Governance.mp4 29.0 MB
  • mp4~Get Your Files Here !/4 - Common Types of Malware/8 -Adware.mp4 28.9 MB
  • mp4~Get Your Files Here !/6 - OWASP Top 10/11 -Server-Side Request Forgery.mp4 28.7 MB
  • mp4~Get Your Files Here !/6 - OWASP Top 10/9 -Software and Data Integrity Failures.mp4 28.1 MB
  • mp4~Get Your Files Here !/6 - OWASP Top 10/10 -Security Logging and Monitoring Failures.mp4 28.0 MB
  • mp4~Get Your Files Here !/6 - OWASP Top 10/3 -Cryptographic Failures.mp4 27.0 MB
  • mp4~Get Your Files Here !/6 - OWASP Top 10/7 -Vulnerable and Outdated Components.mp4 27.0 MB
  • mp4~Get Your Files Here !/1 - Introduction/3 -Integrity.mp4 26.2 MB
  • mp4~Get Your Files Here !/4 - Common Types of Malware/7 -Rootkit.mp4 25.7 MB
  • mp4~Get Your Files Here !/2 - Types of Security/3 -Information Security.mp4 23.5 MB
  • mp4~Get Your Files Here !/1 - Introduction/4 -Availability.mp4 22.1 MB
  • mp4~Get Your Files Here !/4 - Common Types of Malware/4 -Keyloggers.mp4 21.6 MB
【影视】 ZeroToMastery - Complete Cybersecurity Bootcamp
收录时间:2024-01-09 文档个数:97 文档大小:3.6 GB 最近下载:2025-05-15 人气:2777 磁力链接
  • mp48-Network Security/052-Network Security With Nmap.mp4 169.9 MB
  • mp45-Security Bugs & Vulnerabilities/020-Buffer Overflow Demonstration.mp4 136.7 MB
  • mp412-Appendix - Ethical Hacking/087-Msfconsole Basic Commands.mp4 97.5 MB
  • mp48-Network Security/059-Wireless Attack Demonstration.mp4 93.4 MB
  • mp47-End-Point Protection/034-Password Security and Password Managers.mp4 84.2 MB
  • mp412-Appendix - Ethical Hacking/093-Meterpreter Basic Commands Part 1.mp4 78.5 MB
  • mp47-End-Point Protection/038-Process Explorer.mp4 75.8 MB
  • mp41-Introduction/001-Cybersecurity Bootcamp - Zero to Mastery.mp4 72.4 MB
  • mp48-Network Security/057-Secure Network Architecture.mp4 66.8 MB
  • mp412-Appendix - Ethical Hacking/094-Meterpreter Basic Commands Part 2.mp4 65.7 MB
  • mp47-End-Point Protection/033-Bitdefender, Kaspersky, McAfee, Malwarebytes.mp4 63.9 MB
  • mp44-Understanding Hackers - The Biggest Threat/012-Most Common Attacks Demonstration.mp4 63.5 MB
  • mp48-Network Security/060-Network Monitoring With TCPDump.mp4 62.7 MB
  • mp48-Network Security/058-Wireless Security.mp4 59.6 MB
  • mp45-Security Bugs & Vulnerabilities/017-Unpatched Machine Exploitation Demonstration.mp4 59.1 MB
  • mp412-Appendix - Ethical Hacking/080-Whatweb Stealthy Scan.mp4 58.1 MB
  • mp412-Appendix - Ethical Hacking/091-Advance Msfvenom Usage.mp4 51.4 MB
  • mp47-End-Point Protection/043-Iptables.mp4 50.9 MB
  • mp47-End-Point Protection/028-Brave Browser Security and Privacy.mp4 50.6 MB
  • mp412-Appendix - Ethical Hacking/089-Software Vulnerability - Samba Exploitation.mp4 49.5 MB
【影视】 [ DevCourseWeb.com ] Udemy - Selection and Implementation of Cybersecurity Risks Controls
收录时间:2024-01-05 文档个数:36 文档大小:2.0 GB 最近下载:2025-05-15 人气:2662 磁力链接
  • mp4~Get Your Files Here !/2. SECTION-2/8. 19- The role of governance in the effective selection and implementation of cybe.mp4 142.9 MB
  • mp4~Get Your Files Here !/2. SECTION-2/14. 23-Selecting and implementing cybersecurity controls based on NIST CSF PT2.mp4 122.4 MB
  • mp4~Get Your Files Here !/2. SECTION-2/16. 25- Measuring the effectiveness of implemented controls.mp4 117.4 MB
  • mp4~Get Your Files Here !/2. SECTION-2/17. Putting it all together-The Selection and Implementation of Cyber Risks controls.mp4 115.7 MB
  • mp4~Get Your Files Here !/1. Introduction/10. 9-Key considerations for the identification- selection & implementation of contr.mp4 101.8 MB
  • mp4~Get Your Files Here !/1. Introduction/7. 6-Approach to Control Selection_ pt2.mp4 94.1 MB
  • mp4~Get Your Files Here !/2. SECTION-2/9. 20-Why not implement frameworks that already have recommended controls.mp4 90.3 MB
  • mp4~Get Your Files Here !/2. SECTION-2/15. 24-Implementation Plan for selected controls.mp4 87.1 MB
  • mp4~Get Your Files Here !/2. SECTION-2/11. 21-Challenges, & considerations associated with implementing frameworks-pt2.mp4 82.9 MB
  • mp4~Get Your Files Here !/1. Introduction/11. 10-Risk Assessment-BIA, Control Selection, Cost Benefit Analysis.mp4 81.1 MB
  • mp4~Get Your Files Here !/1. Introduction/9. 8-Introduction to security controls.mp4 77.4 MB
  • mp4~Get Your Files Here !/2. SECTION-2/7. 18-Documenting Cybersecurity Risk Assessment Report-Pt2.mp4 75.5 MB
  • mp4~Get Your Files Here !/2. SECTION-2/5. 17-Determine likelihood, Impact, Calculate risk.mp4 72.4 MB
  • mp4~Get Your Files Here !/2. SECTION-2/13. 23-Selecting and implementing cybersecurity controls based on NIST CSF PT1.mp4 62.9 MB
  • mp4~Get Your Files Here !/1. Introduction/12. 11-Cost Benefit Analysis associated with controls selection.mp4 58.3 MB
  • mp4~Get Your Files Here !/2. SECTION-2/3. 15-Steps involved in assessing the identified cyber risks in web server.mp4 55.0 MB
  • mp4~Get Your Files Here !/2. SECTION-2/1. 14-High-level process of selecting controls to protect ecommerce web server-Pt1.mp4 54.5 MB
  • mp4~Get Your Files Here !/1. Introduction/14. 13-Regulatory Compliance, Incident Response Planning.mp4 53.9 MB
  • mp4~Get Your Files Here !/1. Introduction/13. 12- Technology integration, operational impact, continuous monitoring, employee.mp4 52.8 MB
  • mp4~Get Your Files Here !/2. SECTION-2/6. 18- Documenting Cybersecurity Risk Assessment Report-Pt1.mp4 50.4 MB
【影视】 [ DevCourseWeb.com ] Udemy - ChatGPT, ML, and AI for Cybersecurity, SOCs and Business
收录时间:2024-04-07 文档个数:14 文档大小:3.7 GB 最近下载:2025-05-16 人气:2616 磁力链接
  • mp4~Get Your Files Here !/3. AI Tools for Security.mp4 683.8 MB
  • mp4~Get Your Files Here !/4. Enhancing Search Capabilities with GPT4all Plugins.mp4 576.0 MB
  • mp4~Get Your Files Here !/2. Fundamentals of ChatGPT and GPT4all.mp4 553.4 MB
  • mp4~Get Your Files Here !/1. Introduction to Machine Learning and AI for Security.mp4 520.6 MB
  • mp4~Get Your Files Here !/8. Future Trends and Challenges in AI Security.mp4 452.9 MB
  • mp4~Get Your Files Here !/6. Evaluating AI Security.mp4 379.7 MB
  • mp4~Get Your Files Here !/5. Securing AI Models and Data.mp4 280.8 MB
  • mp4~Get Your Files Here !/7. Case Studies of Real-World AI Applications.mp4 279.0 MB
  • txt~Get Your Files Here !/Bonus Resources.txt 386 Bytes
  • urlGet Bonus Downloads Here.url 182 Bytes
  • html~Get Your Files Here !/9. Final Exam.html 146 Bytes
  • html~Get Your Files Here !/4.2 Github Plugins (primarily for ChatGPT and Python implementations thereof)..html 124 Bytes
  • html~Get Your Files Here !/4.1 ChatGPT Plugins.html 100 Bytes
  • html~Get Your Files Here !/4.3 GPT4All Website and Downloads.html 90 Bytes
【影视】 Cybersecurity and Artificial Intelligence
收录时间:2024-09-08 文档个数:10 文档大小:99.9 MB 最近下载:2025-05-15 人气:2532 磁力链接
  • mp401. Cybersecurity and Artificial Intelligence/01. Cybersecurity and AI Overview.mp4 24.4 MB
  • mp401. Cybersecurity and Artificial Intelligence/02. Demo- Importance of Understanding AI in Cybersecurity.mp4 23.9 MB
  • mp401. Cybersecurity and Artificial Intelligence/03. Phishing and BEC Real-world Examples.mp4 10.8 MB
  • mp401. Cybersecurity and Artificial Intelligence/08. Demo- Deepfake.mp4 8.0 MB
  • zipcybersecurity-artificial-intelligence.zip 7.4 MB
  • mp401. Cybersecurity and Artificial Intelligence/04. Voicemail Scams - Examples and How to Avoid.mp4 7.3 MB
  • mp401. Cybersecurity and Artificial Intelligence/05. Adhering to Company Policies and Guidelines.mp4 5.8 MB
  • mp401. Cybersecurity and Artificial Intelligence/06. AI Hallucinations.mp4 5.8 MB
  • mp401. Cybersecurity and Artificial Intelligence/09. Mitigating the AI Threats.mp4 3.3 MB
  • mp401. Cybersecurity and Artificial Intelligence/07. Criminal Usage of AI.mp4 3.3 MB
【压缩文件】 [ FreeCourseWeb.com ] Udemy - Cybersecurity Awareness Training.zip
收录时间:2022-01-09 文档个数:1 文档大小:651.2 MB 最近下载:2025-05-15 人气:2524 磁力链接
  • zip[ FreeCourseWeb.com ] Udemy - Cybersecurity Awareness Training.zip 651.2 MB
【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity Essentials - Stay Safe and Secure Online
收录时间:2024-02-04 文档个数:39 文档大小:1.2 GB 最近下载:2025-05-14 人气:2451 磁力链接
  • mp4~Get Your Files Here !/6. Device Security/1. Introduction to Device Security.mp4 79.4 MB
  • mp4~Get Your Files Here !/2. Password Security/2. What Makes a Good Password.mp4 70.5 MB
  • mp4~Get Your Files Here !/6. Device Security/3. Mobile Security Best Practices.mp4 69.8 MB
  • mp4~Get Your Files Here !/4. Phishing/1. Introduction to Phishing.mp4 63.3 MB
  • mp4~Get Your Files Here !/5. Staying Safe on the Web/3. Identifying Suspicious Downloads.mp4 59.6 MB
  • mp4~Get Your Files Here !/6. Device Security/2. Choosing and Using an Antivirus.mp4 58.4 MB
  • mp4~Get Your Files Here !/2. Password Security/1. Introduction to Passwords.mp4 57.7 MB
  • mp4~Get Your Files Here !/5. Staying Safe on the Web/2. Inspecting URLs.mp4 57.6 MB
  • mp4~Get Your Files Here !/2. Password Security/5. Using a Password Manager.mp4 56.2 MB
  • mp4~Get Your Files Here !/7. Virtual Private Networks/4. Choosing a VPN Solution.mp4 55.5 MB
  • mp4~Get Your Files Here !/4. Phishing/4. Phishing Without Email.mp4 54.3 MB
  • mp4~Get Your Files Here !/4. Phishing/2. The Psychology of Phishing.mp4 52.3 MB
  • mp4~Get Your Files Here !/5. Staying Safe on the Web/4. Managing Trackers and Cookies.mp4 48.2 MB
  • mp4~Get Your Files Here !/3. Multi-Factor Authentication (MFA)/3. Choosing a Strong Authentication Factor.mp4 45.8 MB
  • mp4~Get Your Files Here !/7. Virtual Private Networks/2. Why Use a VPN.mp4 45.5 MB
  • mp4~Get Your Files Here !/3. Multi-Factor Authentication (MFA)/5. Identifying MFA Phishing Attacks.mp4 41.4 MB
  • mp4~Get Your Files Here !/7. Virtual Private Networks/3. How VPNs Work.mp4 38.0 MB
  • mp4~Get Your Files Here !/4. Phishing/3. Examining a Phishing Email.mp4 35.7 MB
  • mp4~Get Your Files Here !/2. Password Security/4. Checking for Compromised Accounts.mp4 33.5 MB
  • mp4~Get Your Files Here !/4. Phishing/5. Phishing Using the Cloud.mp4 31.6 MB
【音乐】 P. W. Singer, Allan Friedman - 2016 - Cybersecurity and Cyberwar (Technology)
收录时间:2022-01-19 文档个数:65 文档大小:336.6 MB 最近下载:2025-05-14 人气:2424 磁力链接
  • mp3Cybersecurity and Cyberwar (01).mp3 13.6 MB
  • mp3Cybersecurity and Cyberwar (57).mp3 12.5 MB
  • mp3Cybersecurity and Cyberwar (46).mp3 11.2 MB
  • mp3Cybersecurity and Cyberwar (48).mp3 9.6 MB
  • mp3Cybersecurity and Cyberwar (31).mp3 9.3 MB
  • mp3Cybersecurity and Cyberwar (49).mp3 8.5 MB
  • mp3Cybersecurity and Cyberwar (19).mp3 8.5 MB
  • mp3Cybersecurity and Cyberwar (51).mp3 8.5 MB
  • mp3Cybersecurity and Cyberwar (09).mp3 8.4 MB
  • mp3Cybersecurity and Cyberwar (33).mp3 8.3 MB
  • mp3Cybersecurity and Cyberwar (56).mp3 7.7 MB
  • mp3Cybersecurity and Cyberwar (52).mp3 7.6 MB
  • mp3Cybersecurity and Cyberwar (32).mp3 7.1 MB
  • mp3Cybersecurity and Cyberwar (15).mp3 6.9 MB
  • mp3Cybersecurity and Cyberwar (55).mp3 6.8 MB
  • mp3Cybersecurity and Cyberwar (20).mp3 6.8 MB
  • mp3Cybersecurity and Cyberwar (05).mp3 6.6 MB
  • mp3Cybersecurity and Cyberwar (50).mp3 6.3 MB
  • mp3Cybersecurity and Cyberwar (12).mp3 6.3 MB
  • mp3Cybersecurity and Cyberwar (45).mp3 6.2 MB
【影视】 [ DevCourseWeb.com ] Udemy - Modern Cybersecurity Fundamentals
收录时间:2023-12-17 文档个数:27 文档大小:2.3 GB 最近下载:2025-05-16 人气:2342 磁力链接
  • mp4~Get Your Files Here !/2. History of Cybersecurity/1. History of Cybersecurity.mp4 478.1 MB
  • mp4~Get Your Files Here !/3. Cybersecurity Risk Management/1. Cybersecurity Risk Management.mp4 265.3 MB
  • mp4~Get Your Files Here !/13. The Future of Cybersecurity/1. The Future of Cybersecurity.mp4 186.8 MB
  • mp4~Get Your Files Here !/7. Understanding Networks Part 3/1. Understanding Networks Part 3.mp4 176.6 MB
  • mp4~Get Your Files Here !/11. Ransomware/1. Ransomware.mp4 159.6 MB
  • mp4~Get Your Files Here !/8. Understanding Networks Part 4/1. Understanding Networks Part 4.mp4 158.3 MB
  • mp4~Get Your Files Here !/12. Internet of Things (IoT)/1. Internet of Things (IoT).mp4 154.5 MB
  • mp4~Get Your Files Here !/9. Domain Name System (DNS)/1. Domain Name System (DNS).mp4 145.9 MB
  • mp4~Get Your Files Here !/5. Understanding Networks Part 1/1. Understanding Networks Part 1.mp4 137.5 MB
  • mp4~Get Your Files Here !/4. Intrusion Detection/1. Intrusion Detection.mp4 136.3 MB
  • mp4~Get Your Files Here !/6. Understanding Networks Part 2/1. Understanding Networks Part 2.mp4 126.6 MB
  • mp4~Get Your Files Here !/10. Dynamic Host Configuration Protocol (DHCP)/1. Dynamic Host Configuration Protocol (DHCP).mp4 112.7 MB
  • mp4~Get Your Files Here !/1. Introduction/1. Introduction.mp4 28.1 MB
  • pdf~Get Your Files Here !/5. Understanding Networks Part 1/1.1 Understanding-Networks.pdf 3.5 MB
  • pdf~Get Your Files Here !/6. Understanding Networks Part 2/1.1 Understanding-Networks.pdf 3.5 MB
  • pdf~Get Your Files Here !/7. Understanding Networks Part 3/1.1 Understanding-Networks.pdf 3.5 MB
  • pdf~Get Your Files Here !/8. Understanding Networks Part 4/1.1 Understanding-Networks.pdf 3.5 MB
  • pdf~Get Your Files Here !/3. Cybersecurity Risk Management/1.1 Cybersecurity-Risk-Management.pdf 1.8 MB
  • pdf~Get Your Files Here !/12. Internet of Things (IoT)/1.1 IoT.pdf 1.8 MB
  • pdf~Get Your Files Here !/2. History of Cybersecurity/1.1 HISTORY-OF-CYBERSECURITY.pdf 1.7 MB
【影视】 [CourseClub.Me] O`REILLY - The Complete Cybersecurity Bootcamp, 2nd Edition
收录时间:2023-12-23 文档个数:347 文档大小:6.7 GB 最近下载:2025-05-15 人气:2332 磁力链接
  • mp4Lesson 29 Hacking Mobile Platforms/003. 29.2 Hacking iOS.mp4 86.6 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/014. 17.13 Performing SMTP and DNS Enumeration.mp4 80.0 MB
  • mp4Lesson 21 Fundamentals of Wireless Hacking/004. 21.3 Exploring Wireless Threats.mp4 79.0 MB
  • mp4Lesson 33 Fundamentals of IoT Security/003. 33.2 Understanding IoT Attacks.mp4 76.8 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/015. 17.14 Conducting Additional Enumeration Techniques.mp4 75.8 MB
  • mp4Lesson 33 Fundamentals of IoT Security/002. 33.1 Introducing IoT Concepts.mp4 74.4 MB
  • mp4Lesson 29 Hacking Mobile Platforms/002. 29.1 Understanding Mobile Platform Attack Vectors.mp4 73.4 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/011. 17.1 Performing SNMP Enumeration.mp4 71.8 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/004. 17.3 Understanding Host Discovery.mp4 69.7 MB
  • mp4Lesson 5 Fundamentals of Incident Response/007. 5.6 Analyzing Computer Incident Response Teams (CSIRTs).mp4 68.5 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/007. 17.6 Scanning Beyond IDS and Firewall.mp4 68.2 MB
  • mp4Lesson 27 Hacking User Credentials/006. 27.5 Cracking Passwords with John the Ripper.mp4 66.1 MB
  • mp4Lesson 7 Intrusion Event Categories/009. 7.8 Understanding the MITRE ATT&CK Framework.mp4 65.8 MB
  • mp4Lesson 29 Hacking Mobile Platforms/004. 29.3 Hacking Android OS.mp4 63.8 MB
  • mp4Lesson 20 SQL Injection/005. 20.4 Exploring SQL Injection Tools.mp4 63.3 MB
  • mp4Lesson 21 Fundamentals of Wireless Hacking/003. 21.2 Understanding Wireless Encryption.mp4 62.7 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/013. 17.12 Performing NTP and NFS Enumeration.mp4 61.8 MB
  • mp4Lesson 16 Information Gathering and Passive Reconnaissance/011. 16.10 Performing Footprinting through Social Engineering.mp4 59.1 MB
  • mp4Lesson 8 Digital Forensics Fundamentals/004. 8.3 Understanding Evidence Collection.mp4 57.2 MB
  • mp4Lesson 21 Fundamentals of Wireless Hacking/007. 21.6 Hacking Bluetooth.mp4 52.3 MB
【影视】 Cybersecurity Careers and Certifications
收录时间:2023-12-20 文档个数:150 文档大小:414.1 MB 最近下载:2025-05-14 人气:2289 磁力链接
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 05 - 4. Cybersecurity Careers/17 - Cybersecurity careers overview.mp4.mp4 51.0 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 06 - 5. Cybersecurity Certifications/27 - Cybersecurity certifications overview.mp4.mp4 23.7 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 01 - Introduction/01 - Cybersecurity careers and certifications.mp4.mp4 21.7 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 02 - 1. Understanding the Cybersecurity Career Field/05 - An overview of cybersecurity key concepts.mp4.mp4 15.4 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 02 - 1. Understanding the Cybersecurity Career Field/04 - A brief history of cybersecurity.mp4.mp4 9.8 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 02 - 1. Understanding the Cybersecurity Career Field/06 - Enabling technologies for cybersecurity.mp4.mp4 8.8 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 07 - 6. Your Cybersecurity Career Path/39 - How to get cybersecurity experience.mp4.mp4 8.7 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 07 - 6. Your Cybersecurity Career Path/38 - Prerequisites.mp4.mp4 8.5 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 05 - 4. Cybersecurity Careers/19 - Cybersecurity career: Analyst.mp4.mp4 8.5 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 06 - 5. Cybersecurity Certifications/37 - Choose a cybersecurity certification.mp4.mp4 8.3 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 08 - 7. Cybersecurity Career Advice/44 - Begin with the end in mind.mp4.mp4 8.2 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 04 - 3. Cybersecurity Success Traits/14 - Analytical and technology savvy.mp4.mp4 8.1 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 05 - 4. Cybersecurity Careers/26 - Cybersecurity career: Director.mp4.mp4 8.0 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 07 - 6. Your Cybersecurity Career Path/40 - Getting started: Get certified.mp4.mp4 7.9 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 05 - 4. Cybersecurity Careers/22 - Cybersecurity career: Engineer.mp4.mp4 7.8 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 01 - Introduction/03 - Why start a career in cybersecurity?.mp4.mp4 7.8 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 03 - 2. Cybersecurity Marketplace/13 - Retail (PCI DSS).mp4.mp4 7.7 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 02 - 1. Understanding the Cybersecurity Career Field/08 - Cybersecurity career resources.mp4.mp4 7.5 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 03 - 2. Cybersecurity Marketplace/11 - Healthcare (HIPAA).mp4.mp4 7.5 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 05 - 4. Cybersecurity Careers/20 - Cybersecurity career: Auditor.mp4.mp4 7.4 MB
共14页 上一页 1 2 3 4 5 6 7 8 9 下一页