磁力管家

磁力管家
为您索检到268条磁力链接,耗时0毫秒。 rss

分享给好友

【影视】 Cyber Security 2023 Bundle Fundamentals of Cybersecurity
收录时间:2023-12-18 文档个数:177 文档大小:1.6 GB 最近下载:2025-05-16 人气:11467 磁力链接
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/4 - Cyber Security Networking 101/15 - Networking 03.mp4 86.7 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/10 - Web Attack 101/64 - Web Application Attack 02.mp4 62.7 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/7 - Network Security 101/42 - Network Pentesting 13.mp4 51.6 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/9 - Web Application 101/53 - Web App 02.mp4 48.5 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/8 - Security Technologies/49 - Tech 02.mp4 48.5 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/5 - Kali Linux 101/22 - Linux 03.mp4 43.9 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/7 - Network Security 101/39 - Network Pentesting 10.mp4 43.8 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/7 - Network Security 101/38 - Network Pentesting 09.mp4 39.9 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/10 - Web Attack 101/74 - Web Application Attack 12.mp4 39.8 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/7 - Network Security 101/34 - Network Pentesting 05.mp4 36.3 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/5 - Kali Linux 101/21 - Linux 02.mp4 33.9 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/4 - Cyber Security Networking 101/17 - Networking 05.mp4 31.8 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/10 - Web Attack 101/73 - Web Application Attack 11.mp4 31.4 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/7 - Network Security 101/47 - Network Pentesting 18.mp4 31.4 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/10 - Web Attack 101/68 - Web Application Attack 06.mp4 29.8 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/7 - Network Security 101/37 - Network Pentesting 08.mp4 29.1 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/7 - Network Security 101/31 - Network Pentesting 02.mp4 28.7 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/3 - Cyber Lab Environment/6 - TOOL 01.mp4 28.0 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/10 - Web Attack 101/67 - Web Application Attack 05.mp4 25.5 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/10 - Web Attack 101/71 - Web Application Attack 09.mp4 25.2 MB
【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity Management for New Managers
收录时间:2023-12-17 文档个数:46 文档大小:982.3 MB 最近下载:2025-05-16 人气:3993 磁力链接
  • mp4~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/5. Cyber Incident & Data Breach Response planning ( Video from IT Web Conference ).mp4 372.8 MB
  • mp4~Get Your Files Here !/2. Module 2 NIST Cybersecurity Framework (CSF)/4. Implementing the NIST CSF in your organisation.mp4 72.3 MB
  • mp4~Get Your Files Here !/5. Module 5 Incident Response and Recovery/1. Creating cybersecurity strategies and action plans.mp4 52.2 MB
  • mp4~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/4. Data Breaches.mp4 51.6 MB
  • mp4~Get Your Files Here !/5. Module 5 Incident Response and Recovery/3. Incident detection and analysis.mp4 48.3 MB
  • mp4~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/1. Understanding the importance of cybersecurity management.mp4 47.9 MB
  • mp4~Get Your Files Here !/4. Module 4 Scenario Planning and Strategy/2. Identifying threats and vulnerabilities.mp4 42.2 MB
  • mp4~Get Your Files Here !/5. Module 5 Incident Response and Recovery/2. Incident Response Planning.mp4 40.1 MB
  • mp4~Get Your Files Here !/3. Module 3 NICE Cybersecurity Workforce Framework/3. Knowledge, skills, and abilities (KSAs).mp4 34.2 MB
  • mp4~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/2. Roles and responsibilities of a cybersecurity manager.mp4 33.1 MB
  • mp4~Get Your Files Here !/2. Module 2 NIST Cybersecurity Framework (CSF)/3. Tiers and profiles.mp4 32.6 MB
  • mp4~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/3. NIST and NICE frameworks overview.mp4 29.3 MB
  • mp4~Get Your Files Here !/2. Module 2 NIST Cybersecurity Framework (CSF)/5. Challenges of Implementing the NIST Framework.mp4 22.4 MB
  • mp4~Get Your Files Here !/2. Module 2 NIST Cybersecurity Framework (CSF)/2. Core functions Identify, Protect, Detect, Respond, and Recover.mp4 18.8 MB
  • mp4~Get Your Files Here !/3. Module 3 NICE Cybersecurity Workforce Framework/4. Integrating the NICE Framework into workforce development and management.mp4 18.3 MB
  • mp4~Get Your Files Here !/3. Module 3 NICE Cybersecurity Workforce Framework/2. Workforce categories and specialty areas.mp4 15.7 MB
  • mp4~Get Your Files Here !/5. Module 5 Incident Response and Recovery/5. Post Incident Activities and Lessons learned.mp4 14.2 MB
  • mp4~Get Your Files Here !/8. Module 8 Course Wrap-up and Next Steps/1. Review of key concepts and frameworks.mp4 9.9 MB
  • mp4~Get Your Files Here !/6. Module 6 Cybersecurity Metrics and Reporting/1. Selecting meaningful cybersecurity metrics.mp4 9.5 MB
  • mp4~Get Your Files Here !/8. Module 8 Course Wrap-up and Next Steps/2. Developing a personal action plan for implementing cyber management practices.mp4 7.8 MB
【影视】 The Cybersecurity Threat Landscape
收录时间:2023-12-17 文档个数:61 文档大小:235.6 MB 最近下载:2025-05-16 人气:1474 磁力链接
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/10 - 9. Supply Chain Attacks and Third-Party Risks/01 - The threat of supply chain attacks and third-party risks.mp4 16.2 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/05 - 4. Botnets and DDoS attacks/02 - Protect against botnets and DDoS threats.mp4 15.8 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/08 - 7. Unmanaged IoT Devices/01 - Explore the threat of unmanaged IoT devices.mp4 14.4 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/09 - 8. Shadow IT/01 - Explore the threat of shadow IT.mp4 14.2 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/08 - 7. Unmanaged IoT Devices/02 - Protect against unmanaged IoT devices.mp4 12.4 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/09 - 8. Shadow IT/02 - Protect against shadow IT.mp4 12.4 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/06 - 5. Deepfakes/02 - Protect against deepfakes.mp4 12.1 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/03 - 2. Phishing and Smishing/02 - Protect against phishing and smishing.mp4 12.0 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/11 - Conclusion/01 - Stay up to date on cybersecurity.mp4 11.8 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/02 - 1. Malware and Ransomware/02 - Protect against malware and ransomware.mp4 11.7 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/02 - 1. Malware and Ransomware/01 - Explore the threat of malware and ransomware.mp4 11.6 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/03 - 2. Phishing and Smishing/01 - Explore the threat of phishing and smishing.mp4 11.3 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/05 - 4. Botnets and DDoS attacks/01 - Explore the threat of botnets and DDoS attacks.mp4 11.1 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/07 - 6. Insider Threats/01 - Explore the risk of insider threats.mp4 10.9 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/10 - 9. Supply Chain Attacks and Third-Party Risks/02 - Protect against supply chain attacks and third-party risks.mp4 10.5 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/04 - 3. Business Email Compromise/01 - Explore the threat of business email compromise.mp4 9.4 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/01 - Introduction/01 - Examine the cybersecurity threat landscape.mp4 9.4 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/04 - 3. Business Email Compromise/02 - Protect against business email compromise.mp4 9.2 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/06 - 5. Deepfakes/01 - Explore the threat of deepfakes.mp4 9.0 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/07 - 6. Insider Threats/02 - Protect against insider threats.mp4 7.0 MB
【影视】 Udemy Cybersecurity Collection
收录时间:2024-02-17 文档个数:7517 文档大小:115.9 GB 最近下载:2025-05-16 人气:6044 磁力链接
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/3. Cross-Site-Scripting/1. Cross-Site-Scripting - Lecture.mp4 748.2 MB
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/8. Cross Site Request Forgery/1. CSRF - Techniques.mp4 695.8 MB
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/2. All Interesting Tools/1. Tools I Use.mp4 632.4 MB
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/1. Introduction/3. Recon with.mp4 608.7 MB
  • mp4Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/18. Reconnaissance/8. Active Recon - Port Scanning.mp4 436.1 MB
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/7. Open Redirect Vulnerability/1. Open Redirect Vulnerability with @hemanth1261.mp4 435.9 MB
  • mp4Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/19. Exploitation/11. SQL Injection _ SQLMap.mp4 417.9 MB
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/1. Introduction/5. Another Recon Video.mp4 398.8 MB
  • mp4Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/2. Walkthrough - Legacy.mp4 348.0 MB
  • mp4Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/16. Assembly Course/5. Arithmetic.mp4 331.0 MB
  • mp4Udemy - The Complete Ethical Hacking Course, by Gerri Banfield _ Erman Kirkpatrick/05 How to create a bootable USB of Kali Linux ( optional )/025 How to create a bootable USB of Kali with persistent storage _ 4 GB part 4.mp4 328.9 MB
  • mp4Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/6. Walkthrough - Jerry.mp4 320.2 MB
  • mp4Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/25. Job Hunting/6. Analyzing the Job Post.mp4 312.1 MB
  • mp4Udemy - The Complete Ethical Hacking Course, by Gerri Banfield _ Erman Kirkpatrick/04 Set up instructions for Mac users ONLY/021 Kali Linux Live USB on a MacBook Pro part 3 ( OPTIONAL ).mp4 302.6 MB
  • mp4Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/7. Walkthrough - Nibbles.mp4 299.2 MB
  • mp4Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/4. Walkthrough - Blue.mp4 298.0 MB
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/6. Server Side Request Forgery/2. SSRF - Advanced Techniques.mp4 294.3 MB
  • mp4Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/3. Walkthrough - Lame.mp4 293.6 MB
  • mp4Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/20. Post Exploitation/1. Stabilizing Shells.mp4 285.1 MB
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/6. Server Side Request Forgery/1. SSRF - Basic Techniques.mp4 282.4 MB
【其他】 The Personal Cybersecurity Manual A.m4b
收录时间:2024-02-13 文档个数:1 文档大小:125.7 MB 最近下载:2025-05-16 人气:4975 磁力链接
  • m4bThe Personal Cybersecurity Manual A.m4b 125.7 MB
【影视】 The Absolute Beginners Guide to Cybersecurity
收录时间:2023-12-17 文档个数:185 文档大小:7.5 GB 最近下载:2025-05-16 人气:7723 磁力链接
  • mp4Part 04 July 2023/Chapter 06 Conclusion/001. You Have Been HACKED - Now What.mp4 193.9 MB
  • mp4Part 04 July 2023/Chapter 01 Introduction/002. Personal Cybersecurity - What I Do.mp4 193.1 MB
  • mp4Part 01 December 2022/Chapter 07 Cyber Warfare and Cyber Attacks Against Companies/002. The Attack Against Estonia.mp4 187.3 MB
  • mp4Part 01 December 2022/Chapter 05 Defenses/009. Password Management.mp4 133.9 MB
  • mp4Part 03 June 2023/Chapter 03 Mobile Threats and Countermeasures/007. How to Use Malwarebytes.mp4 126.9 MB
  • mp4Part 01 December 2022/Chapter 02 Hackers - Who Are They/002. What Is NOT Hacking.mp4 118.6 MB
  • mp4Part 04 July 2023/Chapter 05 Mobile Security/003. Checking Default App Permissions - Android.mp4 115.6 MB
  • mp4Part 03 June 2023/Chapter 02 Understanding Applications/007. Checking Default App Permissions - Android.mp4 115.4 MB
  • mp4Part 02 December 2022/Chapter 01 Introduction/001. Welcome to the Course.mp4 115.3 MB
  • mp4Part 04 July 2023/Chapter 01 Introduction/001. Welcome to the Course.mp4 106.5 MB
  • mp4Part 01 December 2022/Chapter 07 Cyber Warfare and Cyber Attacks Against Companies/003. Stuxnet and the Attack Against Iran.mp4 105.1 MB
  • mp4Part 03 June 2023/Chapter 04 Mobile Security Apps/002. How to Use NordVPN.mp4 101.4 MB
  • mp4Part 02 December 2022/Chapter 07 Social Engineering - Scams, Cons, Tricks, and Fraud/003. Reconnaissance Methods.mp4 94.3 MB
  • mp4Part 04 July 2023/Chapter 03 Personal Security/005. Protecting Yourself Against SIM Card Swap Fraud.mp4 93.5 MB
  • mp4Part 01 December 2022/Chapter 02 Hackers - Who Are They/006. Social Engineering.mp4 89.9 MB
  • mp4Part 01 December 2022/Chapter 06 Cyber Security at the Workplace/005. The Security Versus Ease of Access Paradox.mp4 88.6 MB
  • mp4Part 01 December 2022/Chapter 06 Cyber Security at the Workplace/003. BYOD Management.mp4 87.6 MB
  • mp4Part 04 July 2023/Chapter 05 Mobile Security/005. How to Identify Legit Apps.mp4 86.0 MB
  • mp4Part 01 December 2022/Chapter 01 General Introduction to IT and Cyber Security/002. Difference Between Information Security and Cyber Security.mp4 84.6 MB
  • mp4Part 03 June 2023/Chapter 02 Understanding Applications/003. How to Identify Legit Apps and Spot Fake Apps.mp4 83.4 MB
【影视】 [ WebToolTip.com ] Udemy - Building Cybersecurity Tools with AI (ChatGPT and DeepSeek)
收录时间:2025-05-08 文档个数:13 文档大小:339.2 MB 最近下载:2025-05-16 人气:889 磁力链接
  • mp4~Get Your Files Here !/5 - PROJECTS/3 -Deep Web Footprint Tracker.mp4 82.9 MB
  • mp4~Get Your Files Here !/5 - PROJECTS/1 -Suspicious Process Detector.mp4 76.8 MB
  • mp4~Get Your Files Here !/6 - Deploying kivy app to Windows Platform/1 -Deploying kivy to windows.mp4 51.6 MB
  • mp4~Get Your Files Here !/5 - PROJECTS/2 -Ransomware Scanner app.mp4 36.6 MB
  • mp4~Get Your Files Here !/3 - Prompt Engineering For Cybersecurity and Gui Develepment/2 -Prompt Engineering 2.mp4 18.4 MB
  • mp4~Get Your Files Here !/2 - Setting up the Environment/1 -Create main.py and kivy installation.mp4 16.3 MB
  • mp4~Get Your Files Here !/2 - Setting up the Environment/2 -Testing kivy environment.mp4 14.9 MB
  • mp4~Get Your Files Here !/1 - Introduction/1 -Introduction.mp4 14.7 MB
  • mp4~Get Your Files Here !/3 - Prompt Engineering For Cybersecurity and Gui Develepment/1 -Prompt Engineering 1.mp4 12.1 MB
  • mp4~Get Your Files Here !/4 - Debugging AI Generated code/2 -installing MISSING module Error (Demo).mp4 8.4 MB
  • mp4~Get Your Files Here !/4 - Debugging AI Generated code/1 -Common Errors.mp4 6.6 MB
  • urlGet Bonus Downloads Here.url 180 Bytes
  • txt~Get Your Files Here !/Bonus Resources.txt 70 Bytes
【压缩文件】 [FreeCoursesOnline.Me] Coursera - Cybersecurity Attack and Defense Fundamentals Specialization (by EC-Council)
收录时间:2023-12-17 文档个数:7 文档大小:6.1 GB 最近下载:2025-05-16 人气:7527 磁力链接
  • zip2. Network Defense Essentials (NDE).zip 2.2 GB
  • zip1. Ethical Hacking Essentials (EHE).zip 2.1 GB
  • zip3. Digital Forensics Essentials (DFE).zip 1.7 GB
  • url0. Websites you may like/1. OneHack.us Premium Cracked Accounts-Tutorials-Guides-Articles Community Based Forum.url 377 Bytes
  • urlFreeCoursesOnline.me Download Udacity, Masterclass, Lynda, PHLearn, etc Free.url 290 Bytes
  • txtContent Info.txt 285 Bytes
  • url0. Websites you may like/2. FTUApps.com Download Cracked Developers Applications For Free.url 239 Bytes
【其他】 The Complete Ethical Hacking Course Bundle This Book Includes Python Machine Learning, SQL, Linux, Hacking with Kali Linux, Hack Websites, Smartphones, Coding, and Cybersecurity Fundamentals
收录时间:2024-03-01 文档个数:1 文档大小:1.4 GB 最近下载:2025-05-16 人气:13151 磁力链接
  • m4bTheCompleteEthicalHackingCourseBundleThisBookIncludesPythonMachineLearningSQLLinuxHacki_ep6.m4b 1.4 GB
【音乐】 Joseph Steinberg - 2023 - Cybersecurity All-in-One for Dummies (Technology)
收录时间:2023-12-18 文档个数:8 文档大小:715.6 MB 最近下载:2025-05-16 人气:15081 磁力链接
  • mp3Cybersecurity All-in-One for Dummies.mp3 715.6 MB
  • jpgCybersecurity All-in-One for Dummies.jpg 42.5 kB
  • txtCybersecurity All-in-One for Dummies - Joseph Steinberg - 2023.txt 1.7 kB
  • txtDownloaded From TorrentGalaxy.txt 583 Bytes
  • txtDownloaded From Glodls.txt 237 Bytes
  • txtDownloaded From 1337X.txt 96 Bytes
  • txtDownloaded From Demonoid.txt 50 Bytes
  • txtDownloaded From AngieTorrents.txt 41 Bytes
【影视】 Lynda - Cybersecurity Foundations
收录时间:2017-07-23 文档个数:28 文档大小:301.1 MB 最近下载:2025-05-16 人气:1753 磁力链接
  • mp400. Introduction/00_01 - Welcome.mp4 5.8 MB
  • mp400. Introduction/00_02 - What you should know.mp4 2.0 MB
  • mp401. Cybersecurity Foundations/01_01 - Understanding the NIST cybersecurity framework.mp4 12.8 MB
  • mp401. Cybersecurity Foundations/01_02 - Dissecting cyber risk.mp4 13.3 MB
  • mp401. Cybersecurity Foundations/01_03 - Unpacking COBIT 5.mp4 10.5 MB
  • mp401. Cybersecurity Foundations/01_04 - Looking closer at DSS05.mp4 8.2 MB
  • mp401. Cybersecurity Foundations/01_05 - Implementing control frameworks.mp4 14.6 MB
  • mp401. Cybersecurity Foundations/01_06 - Dissecting the payment card industry and PCI DSS.mp4 14.7 MB
  • mp401. Cybersecurity Foundations/01_07 - Exploring the Cyber Essentials framework.mp4 9.4 MB
  • mp402. Cybersecurity Threats/02_01 - Breaking down the cybersecurity kill chain.mp4 8.2 MB
  • mp402. Cybersecurity Threats/02_02 - Dissecting security threats.mp4 11.7 MB
  • mp402. Cybersecurity Threats/02_03 - Exploring cybercrime as an industry.mp4 10.1 MB
  • mp402. Cybersecurity Threats/02_04 - Hiding malware through cloaking and alternate data streams.mp4 9.0 MB
  • mp402. Cybersecurity Threats/02_05 - Using callbacks to capture keystrokes.mp4 9.7 MB
  • mp402. Cybersecurity Threats/02_06 - Hiding malware with rootkits.mp4 9.8 MB
  • mp402. Cybersecurity Threats/02_07 - Understanding advanced persistent threats (APTs).mp4 13.5 MB
  • mp402. Cybersecurity Threats/02_08 - Exploring ransomware.mp4 8.4 MB
  • mp403. Security Architecture/03_01 - Describing security requirements.mp4 14.9 MB
  • mp403. Security Architecture/03_02 - Architecting security risk.mp4 13.4 MB
  • mp403. Security Architecture/03_03 - Selecting security controls.mp4 8.5 MB
【影视】 [FreeTutorials.Us] cybersecurity-ultimate-ethical-hacking-boot-camp
收录时间:2017-08-24 文档个数:53 文档大小:3.6 GB 最近下载:2025-05-16 人气:3681 磁力链接
  • pdf01 Introduction to the Ultimate Ethical Hacking Boot Camp/attached_files/001 Welcome to the Ultimate Ethical Hacking Boot Camp/Equipment.pdf 131.3 kB
  • jpg02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/Kali.Backgrounds.jpg 478.6 kB
  • jpg02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/Server.2008.Backgrounds.jpg 480.5 kB
  • jpg02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/win7.Backgrounds.jpg 480.5 kB
  • jpg02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/win8.Backgrounds.jpg 480.2 kB
  • jpg02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/winxp.Backgrounds.jpg 480.2 kB
  • pdf08 Password Cracking/attached_files/037 Windows Password Cracking/Wordlist-Resources.pdf 59.0 kB
  • mp401 Introduction to the Ultimate Ethical Hacking Boot Camp/001 Welcome to the Ultimate Ethical Hacking Boot Camp.mp4 71.7 MB
  • mp401 Introduction to the Ultimate Ethical Hacking Boot Camp/002 What is Ethical Hacking.mp4 149.9 MB
  • mp401 Introduction to the Ultimate Ethical Hacking Boot Camp/003 Careers for Ethical Hackers.mp4 48.9 MB
  • mp401 Introduction to the Ultimate Ethical Hacking Boot Camp/004 Wireless Lab Setup Hack.mp4 62.6 MB
  • mp401 Introduction to the Ultimate Ethical Hacking Boot Camp/005 Wireless Hacking Module Disclaimer.mp4 38.8 MB
  • mp401 Introduction to the Ultimate Ethical Hacking Boot Camp/006 Interview Oracle Shodan CNN.mp4 278.0 MB
  • mp402 Hacking Lab Setup - Windows Mac Instructions/007 Introduction to Lab Setup.mp4 31.3 MB
  • mp402 Hacking Lab Setup - Windows Mac Instructions/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines..mp4 20.7 MB
  • mp402 Hacking Lab Setup - Windows Mac Instructions/009 Installing Windows XP.mp4 133.1 MB
  • mp402 Hacking Lab Setup - Windows Mac Instructions/010 Installing Server 2008.mp4 7.7 MB
  • mp402 Hacking Lab Setup - Windows Mac Instructions/011 Installing Kali Linux from ISO.mp4 33.5 MB
  • mp402 Hacking Lab Setup - Windows Mac Instructions/012 Installing Kali Linux Prebuild Virtual Machine.mp4 29.4 MB
  • mp402 Hacking Lab Setup - Windows Mac Instructions/013 Installing Windows 7.mp4 9.8 MB
【影视】 [ FreeCourseWeb.com ] CompTIA Cybersecurity Analyst + (CySA + ) (CS0-003) - 3 Incident Response and Management
收录时间:2023-12-17 文档个数:94 文档大小:348.1 MB 最近下载:2025-05-16 人气:5383 磁力链接
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/09 - Password forensics.mp4 19.8 MB
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/08 - Operating system analysis.mp4 15.5 MB
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/11 - Software forensics.mp4 15.2 MB
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/05 - File carving.mp4 13.1 MB
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/10 - Network forensics.mp4 11.3 MB
  • mp4~Get Your Files Here !/02 - 1. Incident Response Programs/08 - Incident eradication and recovery.mp4 11.2 MB
  • mp4~Get Your Files Here !/02 - 1. Incident Response Programs/01 - Build an incident response program.mp4 10.7 MB
  • mp4~Get Your Files Here !/07 - 6. Disaster Recovery/01 - Disaster recovery.mp4 10.7 MB
  • mp4~Get Your Files Here !/06 - 5. Business Continuity/03 - High availability and fault tolerance.mp4 10.4 MB
  • mp4~Get Your Files Here !/04 - 3. Incident Investigation/01 - Logging security information.mp4 10.2 MB
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/04 - System and file forensics.mp4 10.0 MB
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/06 - Creating forensic images.mp4 10.0 MB
  • mp4~Get Your Files Here !/03 - 2. Attack Frameworks/01 - MITRE ATT&CK.mp4 9.9 MB
  • mp4~Get Your Files Here !/04 - 3. Incident Investigation/03 - Cloud audits and investigations.mp4 9.9 MB
  • mp4~Get Your Files Here !/02 - 1. Incident Response Programs/10 - Post-incident activities.mp4 9.4 MB
  • mp4~Get Your Files Here !/02 - 1. Incident Response Programs/04 - Incident identification.mp4 9.3 MB
  • mp4~Get Your Files Here !/07 - 6. Disaster Recovery/04 - Disaster recovery sites.mp4 9.3 MB
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/15 - Ediscovery and evidence production.mp4 8.2 MB
  • mp4~Get Your Files Here !/06 - 5. Business Continuity/02 - Business continuity controls.mp4 8.0 MB
  • mp4~Get Your Files Here !/04 - 3. Incident Investigation/02 - Security information and event management.mp4 7.9 MB
【文档书籍】 [NulledPremium.com] Machine Learning for Cybersecurity
收录时间:2021-05-26 文档个数:9 文档大小:115.2 MB 最近下载:2025-05-16 人气:2172 磁力链接
  • epubMachine Learning for Cybersecurity Cookbook by Emmanuel Tsukerman.epub 62.6 MB
  • pdfMachine Learning for Cybersecurity Cookbook by Emmanuel Tsukerman.pdf 52.6 MB
  • urlWebsites you may like/1. (FreeTutorials.Us) Download Udemy Paid Courses For Free.url 328 Bytes
  • urlWebsites you may like/5. (Discuss.FTUForum.com) FTU Discussion Forum.url 294 Bytes
  • urlWebsites you may like/2. (FreeCoursesOnline.Me) Download Udacity, Masterclass, Lynda, PHLearn, Pluralsight Free.url 286 Bytes
  • urlWebsites you may like/4. (FTUApps.com) Download Cracked Developers Applications For Free.url 239 Bytes
  • txtWebsites you may like/How you can help Team-FTU.txt 237 Bytes
  • urlNulledPremium.com.url 163 Bytes
  • urlWebsites you may like/3. (NulledPremium.com) Download Cracked Website Themes, Plugins, Scripts And Stock Images.url 163 Bytes
【影视】 [ FreeCourseWeb.com ] Cisco Certified Support Technician (CCST) - Cybersecurity
收录时间:2023-12-30 文档个数:40 文档大小:1.6 GB 最近下载:2025-05-16 人气:4474 磁力链接
  • mp4~Get Your Files Here !/4. Endpoint Security Concepts/3. NTFS and share permissions.mp4 152.4 MB
  • mp4~Get Your Files Here !/4. Endpoint Security Concepts/7. Patches and updates.mp4 84.6 MB
  • mp4~Get Your Files Here !/2. Essential Security Principles/5. Secure passwords.mp4 74.3 MB
  • mp4~Get Your Files Here !/4. Endpoint Security Concepts/4. Netstat, nslookup, tcpdump.mp4 70.3 MB
  • mp4~Get Your Files Here !/4. Endpoint Security Concepts/5. Verify that endpoint systems meet security policies and standards.mp4 66.6 MB
  • mp4~Get Your Files Here !/3. Basic network security concepts/11. VPN - lab.mp4 61.4 MB
  • mp4~Get Your Files Here !/4. Endpoint Security Concepts/1. Windows Firewall.mp4 60.7 MB
  • mp4~Get Your Files Here !/3. Basic network security concepts/8. IPS and IDS.mp4 57.8 MB
  • mp4~Get Your Files Here !/3. Basic network security concepts/6. IP addresses and NAT.mp4 53.6 MB
  • mp4~Get Your Files Here !/2. Essential Security Principles/1. Basic terms.mp4 50.7 MB
  • mp4~Get Your Files Here !/2. Essential Security Principles/3. RADIUS.mp4 50.4 MB
  • mp4~Get Your Files Here !/5. Incident Handling/3. Malware.mp4 45.2 MB
  • mp4~Get Your Files Here !/3. Basic network security concepts/2. MAC and ARP.mp4 45.0 MB
  • mp4~Get Your Files Here !/3. Basic network security concepts/1. Describe TCPIP protocol vulnerabilities.mp4 44.0 MB
  • mp4~Get Your Files Here !/2. Essential Security Principles/8. Hashing.mp4 43.3 MB
  • mp4~Get Your Files Here !/5. Incident Handling/2. Encryption.mp4 43.2 MB
  • mp4~Get Your Files Here !/2. Essential Security Principles/7. Encryption.mp4 43.2 MB
  • mp4~Get Your Files Here !/2. Essential Security Principles/9. Certificates.mp4 42.7 MB
  • mp4~Get Your Files Here !/2. Essential Security Principles/2. Authentication, authorization, and accounting (AAA).mp4 39.6 MB
  • mp4~Get Your Files Here !/5. Incident Handling/5. Confidentiality integrity availability.mp4 39.5 MB
【文档书籍】 [ FreeCourseWeb.com ] Cybersecurity Unlocked! - Strategies To Outsmart Hackers, and Online Criminals
收录时间:2024-04-10 文档个数:3 文档大小:95.2 MB 最近下载:2025-05-16 人气:5529 磁力链接
  • pdf~Get Your Files Here !/B0CW1D7MVY.pdf 95.2 MB
  • txt~Get Your Files Here !/Bonus Resources.txt 386 Bytes
  • urlGet Bonus Downloads Here.url 183 Bytes
【文档书籍】 Heath M. CompTIA CySA+ Cybersecurity Analyst Certification...Exam Guide 3ed 2024
收录时间:2023-12-19 文档个数:3 文档大小:111.8 MB 最近下载:2025-05-16 人气:6459 磁力链接
  • pdfChapple M. CompTIA CySA+ Practice Tests. Exam CS0-003 3ed 2023.pdf 43.9 MB
  • pdfSeidl D. CompTIA CySA+ Study Guide. Exam CS0-003 3ed 2023.pdf 43.8 MB
  • pdfHeath M. CompTIA CySA+ Cybersecurity Analyst Certification...Exam Guide 3ed 2024.pdf 24.1 MB
【影视】 Real-World Ethical Hacking Hands-on Cybersecurity
收录时间:2022-01-15 文档个数:290 文档大小:8.1 GB 最近下载:2025-05-16 人气:6983 磁力链接
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/14. Bonus Videos National Cyber Warrior Academy, Interviews and More/3. NCWA 2017 Facebook Live Video on Car Hacking and Drone Programming.mp4 947.8 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/9. BONUS Section Car Hacking in Kali Linux!/9. Car Hacking LIVE on Dr. Payne's VW Jetta Facebook Live Video from NCWA 2017.mp4 347.6 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/14. Bonus Videos National Cyber Warrior Academy, Interviews and More/5. Dr. Payne's TEDx Talk on Coding and Cyber as the New Literacy.mp4 320.6 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/5. Social Engineering Capturing Usernames and Passwords via Phishing/3. Cloning Facebook and Harvesting User Passwords.mp4 265.0 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/1. Real-World Ethical Hacking 1 Hacking Windows!/10. BONUS Mac Root Hack!.mp4 233.2 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/3. Important Linux and Windows Terminal Commands/2. Basic Linux Commands.mp4 195.0 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/13. Mobile Hacking on Android/2. Creating the Meterpreter Payload for Android.mp4 175.7 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/3. Important Linux and Windows Terminal Commands/4. More Helpful Linux Commands.mp4 170.6 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/4. Create a Virtual Network for Ethical Hacking!/3. Connecting Your VMs to the Host-Only Network.mp4 148.8 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/8. Hacking Win10 Command & Control Phase/4. Stealing Screenshots, Keystrokes, and ,Webcams.mp4 145.4 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/10. BONUS Hacking Windows 7 with Metasploit!/4. Creating an Exploit Payload with Metasploit.mp4 144.4 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/2. Create Your Own Virtual Hacking Lab!/4. Create an Android PhoneTablet VM for Mobile Hacking!.mp4 142.1 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/13. Mobile Hacking on Android/4. Advanced Android Exploits Accessing Storage, Downloading and Uploading Files.mp4 139.2 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/9. BONUS Section Car Hacking in Kali Linux!/8. BONUS Hacking the Car Hacking Software, to 1000 mph!.mp4 125.2 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/5. Social Engineering Capturing Usernames and Passwords via Phishing/7. Capturing the User's Login and Password in Kali.mp4 116.7 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/9. BONUS Section Car Hacking in Kali Linux!/5. The Replay Attack Replaying CAN Packets with CANplayer.mp4 116.0 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/11. Password Problems - Everybody's Got 'Em Hacking, Cracking, Snacking & Hijacking/3. Sniffing the Network Installing Wireshark.mp4 114.3 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/4. Create a Virtual Network for Ethical Hacking!/5. Updating Kali and Windows VMs.mp4 112.5 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/4. Create a Virtual Network for Ethical Hacking!/4. Creating and Using a Public NAT Network in VBox.mp4 112.5 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/11. Password Problems - Everybody's Got 'Em Hacking, Cracking, Snacking & Hijacking/6. Seven Things You Can Do for Safer Passwords.mp4 111.1 MB
【影视】 O`REILLY - The Complete Cybersecurity Bootcamp, 2nd Edition
收录时间:2024-12-25 文档个数:340 文档大小:6.7 GB 最近下载:2025-05-16 人气:234 磁力链接
  • mp4Lesson 29 Hacking Mobile Platforms/003. 29.2 Hacking iOS.mp4 86.6 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/014. 17.13 Performing SMTP and DNS Enumeration.mp4 80.0 MB
  • mp4Lesson 21 Fundamentals of Wireless Hacking/004. 21.3 Exploring Wireless Threats.mp4 79.0 MB
  • mp4Lesson 33 Fundamentals of IoT Security/003. 33.2 Understanding IoT Attacks.mp4 76.8 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/015. 17.14 Conducting Additional Enumeration Techniques.mp4 75.8 MB
  • mp4Lesson 33 Fundamentals of IoT Security/002. 33.1 Introducing IoT Concepts.mp4 74.4 MB
  • mp4Lesson 29 Hacking Mobile Platforms/002. 29.1 Understanding Mobile Platform Attack Vectors.mp4 73.4 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/011. 17.1 Performing SNMP Enumeration.mp4 71.8 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/004. 17.3 Understanding Host Discovery.mp4 69.7 MB
  • mp4Lesson 5 Fundamentals of Incident Response/007. 5.6 Analyzing Computer Incident Response Teams (CSIRTs).mp4 68.5 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/007. 17.6 Scanning Beyond IDS and Firewall.mp4 68.2 MB
  • mp4Lesson 27 Hacking User Credentials/006. 27.5 Cracking Passwords with John the Ripper.mp4 66.1 MB
  • mp4Lesson 7 Intrusion Event Categories/009. 7.8 Understanding the MITRE ATT&CK Framework.mp4 65.8 MB
  • mp4Lesson 29 Hacking Mobile Platforms/004. 29.3 Hacking Android OS.mp4 63.8 MB
  • mp4Lesson 20 SQL Injection/005. 20.4 Exploring SQL Injection Tools.mp4 63.3 MB
  • mp4Lesson 21 Fundamentals of Wireless Hacking/003. 21.2 Understanding Wireless Encryption.mp4 62.7 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/013. 17.12 Performing NTP and NFS Enumeration.mp4 61.8 MB
  • mp4Lesson 16 Information Gathering and Passive Reconnaissance/011. 16.10 Performing Footprinting through Social Engineering.mp4 59.1 MB
  • mp4Lesson 8 Digital Forensics Fundamentals/004. 8.3 Understanding Evidence Collection.mp4 57.2 MB
  • mp4Lesson 21 Fundamentals of Wireless Hacking/007. 21.6 Hacking Bluetooth.mp4 52.3 MB
【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity Meets Ai - Essentials For 2024
收录时间:2024-12-23 文档个数:31 文档大小:205.7 MB 最近下载:2025-05-16 人气:723 磁力链接
  • mp4~Get Your Files Here !/4 - AI in Cybersecurity/26 - AI for Automating Incident Response Case Study.mp4 47.6 MB
  • mp4~Get Your Files Here !/4 - AI in Cybersecurity/25 - AIPowered Threat Detection Case Study.mp4 21.6 MB
  • mp4~Get Your Files Here !/6 - AI and Cybersecurity in Action/29 - Practical Demonstration Threat Detection Using AI.mp4 21.1 MB
  • mp4~Get Your Files Here !/5 - Cybersecurity for AI Systems/28 - Ethical Considerations.mp4 20.2 MB
  • mp4~Get Your Files Here !/5 - Cybersecurity for AI Systems/27 - Protecting AI Models.mp4 18.0 MB
  • mp4~Get Your Files Here !/3 - Cybersecurity Fundamentals/24 - Key Cybersecurity Practices.mp4 17.0 MB
  • mp4~Get Your Files Here !/2 - Basics of Cybersecurity and AI/7 - Cybersecurity Basics.mp4 5.7 MB
  • mp4~Get Your Files Here !/3 - Cybersecurity Fundamentals/16 - Ransomware.mp4 5.6 MB
  • mp4~Get Your Files Here !/2 - Basics of Cybersecurity and AI/9 - Basics of AI Key AI Concepts.mp4 5.1 MB
  • mp4~Get Your Files Here !/1 - Introduction/2 - Course Objectives.mp4 3.7 MB
  • mp4~Get Your Files Here !/2 - Basics of Cybersecurity and AI/11 - Cybersecurity for AI Systems.mp4 3.7 MB
  • mp4~Get Your Files Here !/2 - Basics of Cybersecurity and AI/10 - AIs Role in Cybersecurity.mp4 3.6 MB
  • mp4~Get Your Files Here !/3 - Cybersecurity Fundamentals/12 - Part 1 What Are Cyber Threats.mp4 3.4 MB
  • mp4~Get Your Files Here !/3 - Cybersecurity Fundamentals/23 - Summary.mp4 3.3 MB
  • mp4~Get Your Files Here !/1 - Introduction/3 - Course Layout.mp4 3.1 MB
  • mp4~Get Your Files Here !/3 - Cybersecurity Fundamentals/15 - Phishing.mp4 2.4 MB
  • mp4~Get Your Files Here !/3 - Cybersecurity Fundamentals/20 - Part 3 How Cyber Threats Work.mp4 2.1 MB
  • mp4~Get Your Files Here !/1 - Introduction/1 - Introduction.mp4 1.9 MB
  • mp4~Get Your Files Here !/3 - Cybersecurity Fundamentals/22 - Part 5 Mitigating Cyber Threats.mp4 1.9 MB
  • mp4~Get Your Files Here !/2 - Basics of Cybersecurity and AI/8 - Why Cybersecurity Matters.mp4 1.8 MB
共14页 上一页 1 2 3 4 5 下一页