为您索检到268条磁力链接,耗时1毫秒。
- 【影视】 [ CourseMega.com ] Linkedin - Building an ISO 27001-Compliant Cybersecurity Program - The Annex A Controls
-
收录时间:2022-03-29
文档个数:110
文档大小:1.2 GB
最近下载:2025-05-16
人气:5902
磁力链接
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/013. Access control User access management.mp4 60.8 MB
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/028. System lifecycle Security in d.mp4 57.3 MB
~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/017. Physical and environmental security Equipme.mp4 57.2 MB
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/014. Access control System and application.mp4 55.8 MB
~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/032. Management of information security.mp4 54.7 MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/018. Operations security Operational procedures and responsibili.mp4 47.1 MB
~Get Your Files Here !/12. Compliance (Clause A.18)/034. Compliance Compliance with legal and contractual requirements (Claus.mp4 46.5 MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/021. Operations security Logging and monitoring (Clause A.12.4).mp4 45.6 MB
~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/033. Information security continuity an.mp4 45.5 MB
~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/016. Physical and environmental security Secure.mp4 44.8 MB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/004. Contact with auth.mp4 42.7 MB
~Get Your Files Here !/08. Communications Security (Clause A.13)/026. Communications security Information transfer (Clause A..mp4 40.7 MB
~Get Your Files Here !/04. Asset Management (Clause A.8)/010. Asset management Information classification (Clause A.8.2).mp4 40.5 MB
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/027. System lifecycle Security requ.mp4 37.2 MB
~Get Your Files Here !/03. Human Resources Security (Clause A.7)/007. Human resources security During employment (Clause A.7..mp4 34.4 MB
~Get Your Files Here !/08. Communications Security (Clause A.13)/025. Communications security Network security management (Cl.mp4 34.1 MB
~Get Your Files Here !/04. Asset Management (Clause A.8)/009. Asset management Responsibility for assets (Clause A.8.1).mp4 33.3 MB
~Get Your Files Here !/10. Supplier Relationships (Clause A.15)/030. Supplier relationships Information security in supplier.mp4 31.4 MB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/002. Management direct.mp4 31.1 MB
~Get Your Files Here !/04. Asset Management (Clause A.8)/011. Asset management Media handling (Clause A.8.3).mp4 30.4 MB
猜你喜欢:
Building
Annex
Cybersecurity
Linkedin
27001
Compliant
Program
ISO
Controls
CourseMega
- 【影视】 [FreeCoursesOnline.Me] ITProTV - NIST Cybersecurity And Risk Management Frameworks
-
收录时间:2023-12-18
文档个数:61
文档大小:11.3 GB
最近下载:2025-05-16
人气:6534
磁力链接
2. NIST Cybersecurity and Publications.mp4 298.0 MB
26. Response Training and Testing.mp4 288.9 MB
24. Incident Response Plan Examples.mp4 279.3 MB
43. Documentation and Approval.mp4 277.5 MB
20. System Auditing and Logging.mp4 258.9 MB
23. Response Planning.mp4 255.7 MB
29. Backup and Recovery.mp4 251.4 MB
9. Inventory of Critical Assets.mp4 247.4 MB
46. Documenting Controls.mp4 246.5 MB
21. Monitoring and Alerting.mp4 238.7 MB
22. Assessments.mp4 238.7 MB
42. Control Allocation and Monitoring.mp4 234.0 MB
10. Business Impact Assessment.mp4 231.6 MB
40. NIST Control Documents.mp4 230.2 MB
36. Establishing Scope.mp4 227.5 MB
44. Security Control Implementation.mp4 225.8 MB
3. NIST Relationships.mp4 222.6 MB
6. The Vocabulary of Risk.mp4 222.0 MB
25. Digital Forensics.mp4 219.4 MB
51. Assessment Documentation.mp4 219.2 MB
猜你喜欢:
FreeCoursesOnline
Me
Management
Risk
Cybersecurity
ITProTV
Frameworks
NIST
- 【影视】 [GigaCourse.Com] ZeroToMastery - Complete Cybersecurity Bootcamp
-
收录时间:2024-02-21
文档个数:107
文档大小:3.6 GB
最近下载:2025-05-16
人气:1264
磁力链接
8-Network Security/052-Network Security With Nmap.mp4 169.9 MB
5-Security Bugs & Vulnerabilities/020-Buffer Overflow Demonstration.mp4 136.7 MB
12-Appendix - Ethical Hacking/087-Msfconsole Basic Commands.mp4 97.5 MB
8-Network Security/059-Wireless Attack Demonstration.mp4 93.4 MB
7-End-Point Protection/034-Password Security and Password Managers.mp4 84.2 MB
12-Appendix - Ethical Hacking/093-Meterpreter Basic Commands Part 1.mp4 78.5 MB
7-End-Point Protection/038-Process Explorer.mp4 75.8 MB
1-Introduction/001-Cybersecurity Bootcamp - Zero to Mastery.mp4 72.4 MB
8-Network Security/057-Secure Network Architecture.mp4 66.8 MB
12-Appendix - Ethical Hacking/094-Meterpreter Basic Commands Part 2.mp4 65.7 MB
7-End-Point Protection/033-Bitdefender, Kaspersky, McAfee, Malwarebytes.mp4 63.9 MB
4-Understanding Hackers - The Biggest Threat/012-Most Common Attacks Demonstration.mp4 63.5 MB
8-Network Security/060-Network Monitoring With TCPDump.mp4 62.7 MB
8-Network Security/058-Wireless Security.mp4 59.6 MB
5-Security Bugs & Vulnerabilities/017-Unpatched Machine Exploitation Demonstration.mp4 59.1 MB
12-Appendix - Ethical Hacking/080-Whatweb Stealthy Scan.mp4 58.1 MB
12-Appendix - Ethical Hacking/091-Advance Msfvenom Usage.mp4 51.4 MB
7-End-Point Protection/043-Iptables.mp4 50.9 MB
7-End-Point Protection/028-Brave Browser Security and Privacy.mp4 50.6 MB
12-Appendix - Ethical Hacking/089-Software Vulnerability - Samba Exploitation.mp4 49.5 MB
猜你喜欢:
Complete
Cybersecurity
Bootcamp
GigaCourse
ZeroToMastery
Com
- 【影视】 MS Cybersecurity Pro Track Windows 10 Security Features
-
收录时间:2021-05-12
文档个数:58
文档大小:1.1 GB
最近下载:2025-05-16
人气:1552
磁力链接
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/1. Introduction/3. Preparing the Lab Environment.mp4 99.9 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/4. Windows 10 software security features - Part 1/1. Windows Defender Firewall and Virtual Secure Mode.mp4 95.3 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/4. Windows 10 software security features - Part 1/2. Credential Guard and Bitlocker.mp4 91.4 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/6. Windows 10 New Security Features and Capabilities/3. Ransomware Case Study.mp4 87.4 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/6. Windows 10 New Security Features and Capabilities/2. Other Security Features and Capabilities.mp4 77.3 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/3. How Windows 10 uses modern hardware features for security/3. Additional Hardware Security.mp4 76.7 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/6. Windows 10 New Security Features and Capabilities/1. Windows Hello and Hello for Business.mp4 68.3 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/5. Windows 10 software security features - Part 2/3. AppLocker with Device Guard.mp4 67.5 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/4. Windows 10 software security features - Part 1/3. Antivirus and WIndows Information Protection.mp4 67.5 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/5. Windows 10 software security features - Part 2/4. Windows Defender SmartScreen and WIndows 10 Telemetry.mp4 60.0 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/3. How Windows 10 uses modern hardware features for security/1. Secure Boot Process.mp4 58.6 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/3. How Windows 10 uses modern hardware features for security/2. Secure Boot to Trusted Boot.mp4 52.0 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/5. Windows 10 software security features - Part 2/2. Device Guard.mp4 46.9 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/5. Windows 10 software security features - Part 2/1. Windows Defender Remote Credential Guard.mp4 44.0 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/1. Introduction/2. About the Course.mp4 34.8 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/2. Built-in Windows 10 defenses/1. Evolution of attacks.mp4 24.7 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/1. Introduction/1. Instructor Introduction.mp4 10.7 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/4. Windows 10 software security features - Part 1/1.2 Windows PowerShell networking cmdlets.pdf 405.1 kB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/6. Windows 10 New Security Features and Capabilities/1. Windows Hello and Hello for Business.srt 23.8 kB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/4. Windows 10 software security features - Part 1/1. Windows Defender Firewall and Virtual Secure Mode.srt 23.3 kB
猜你喜欢:
10
Features
Cybersecurity
Pro
Track
Windows
MS
Security
- 【影视】 Lynda - Cybersecurity for IT Professionals
-
收录时间:2017-07-25
文档个数:45
文档大小:303.6 MB
最近下载:2025-05-16
人气:5438
磁力链接
00. Introduction/00_01 - Welcome.mp4 6.3 MB
00. Introduction/00_02 - What you should know before watching this course.mp4 869.2 kB
00. Introduction/00_03 - Using the exercise files.mp4 950.7 kB
01. Why Cybersecurity/01_01 - Hackers and the kill chain.mp4 14.3 MB
01. Why Cybersecurity/01_02 - The Stuxnet kill chain.mp4 8.9 MB
01. Why Cybersecurity/01_03 - Common forms of cybersecurity attack.mp4 14.1 MB
02. Antivirus/02_01 - Viruses, spyware, and adware.mp4 4.0 MB
02. Antivirus/02_02 - Using Windows Defender.mp4 3.1 MB
02. Antivirus/02_03 - Setting up real-time protection.mp4 1.0 MB
02. Antivirus/02_04 - Scanning with Windows Defender.mp4 4.3 MB
02. Antivirus/02_05 - Modifying antivirus settings in Windows Defender.mp4 5.8 MB
02. Antivirus/02_06 - Scheduling a scan with Windows Defender.mp4 9.7 MB
02. Antivirus/02_07 - Using Windows Defender offline.mp4 1.9 MB
02. Antivirus/02_08 - Exploring antivirus on Linux.mp4 1.7 MB
03. Personal Firewalls/03_01 - Why firewalls.mp4 1.5 MB
03. Personal Firewalls/03_02 - Using the Microsoft Windows Firewall.mp4 12.9 MB
03. Personal Firewalls/03_03 - Setting up advanced security notifications.mp4 9.5 MB
03. Personal Firewalls/03_04 - Setting up detailed rules.mp4 10.9 MB
03. Personal Firewalls/03_05 - Managing and analyzing log files with ZedLan.mp4 8.4 MB
03. Personal Firewalls/03_06 - Introducing iptables in Linux.mp4 10.7 MB
猜你喜欢:
Cybersecurity
Lynda
Professionals
- 【影视】 Cybersecurity Fundamentals - Become a Security Expert
-
收录时间:2023-12-18
文档个数:127
文档大小:6.5 GB
最近下载:2025-05-16
人气:8769
磁力链接
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/3. Passwords, MFA and Good Practices/2. Password Security.mp4 337.8 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/11. Test Your Environment/2. Penetration Testing Fundamentals.mp4 297.2 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/5. Protecting Servers, Computers + Smart Devices/1. Protect Your Device - Server Security.mp4 264.2 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/9. Get Compliant/1. Cybersecurity Regulations and Standards.mp4 252.5 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/6. Security When Online/3. Cloud Security.mp4 245.8 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/5. Protecting Servers, Computers + Smart Devices/4. Protect Your Device - iPhone Security.mp4 245.2 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/4. Using Firewalls, VPN, IDS/1. Network Security Top Tips.mp4 243.1 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/3. Passwords, MFA and Good Practices/1. Software Updates.mp4 234.8 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/5. Protecting Servers, Computers + Smart Devices/2. Protect Your Device - Desktop + Laptop Security.mp4 230.4 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/5. Protecting Servers, Computers + Smart Devices/5. 03 Protect Your Device - iPad Security.mp4 228.5 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/10. Training and Certifications/2. Cybersecurity Awareness and Training.mp4 227.9 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/10. Training and Certifications/1. Cybersecurity Certifications.mp4 214.9 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/2. Cybersecurity Threats and Attacks/4. Social Engineering.mp4 207.5 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/2. Cybersecurity Threats and Attacks/1. Threat and Attack Types.mp4 204.6 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/9. Get Compliant/2. Disaster Recovery and Business Continuity Planning.mp4 178.0 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/5. Protecting Servers, Computers + Smart Devices/3. Protect Your Device - macOS Security.mp4 169.2 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/6. Security When Online/1. Best Ways to Stay Safe Online.mp4 165.0 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/2. Cybersecurity Threats and Attacks/2. Malware.mp4 149.8 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/3. Passwords, MFA and Good Practices/4. Multi-Factor Authentication.mp4 145.9 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/3. Passwords, MFA and Good Practices/6. Setting up Data Encryption on Windows and Mac.mp4 143.8 MB
猜你喜欢:
Cybersecurity
Fundamentals
Security
Expert
Become
- 【影视】 Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training
-
收录时间:2023-12-24
文档个数:135
文档大小:2.5 GB
最近下载:2025-05-16
人气:10233
磁力链接
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/6. Azure Security Benchmark - Microsoft Certified Cybersecurity-1.mp4 113.5 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/2. Hybrid Environmental Security Strategies - Microsoft Certifi.mp4 63.8 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/1. Specify Priorities for Mitigating Threats to Apps - Microsof-1.mp4 62.3 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/6. Designing a Regulatory Compliance Strategy/4. Implementing Azure Policy - Microsoft Certified Cybersecurit.mp4 59.0 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/7. Evaluating and Managing Security Postures/6. Mitigating Identified Risks - Microsoft Certified Cybersecur-1.mp4 53.6 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/4. Traffic Filtering and Segmentation Strategies - Microsoft Ce-1.mp4 53.4 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/4. Priorities For Mitigating Threats To Data - Microsoft Certif-1.mp4 53.4 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/5. Azure Best Practices for Network Security - Microsoft Certif-1.mp4 52.2 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/5. Hybrid Infrastructure - Microsoft Certified Cybersecurity Ar-1.mp4 50.4 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/6. Designing a Regulatory Compliance Strategy/6. Translating Privacy Requirements - Microsoft Certified Cyber.mp4 49.7 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/9. Designing a Strategy for Securing SaaS, PaaS, and IaaS Services/1. Security Baselines for SaaS, PaaS, and IaaS services - Micro.mp4 48.3 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/3. Translating Business Goals into Security Requirements - Micr.mp4 47.9 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/7. Securing Privileged Access Using RaMP - Microsoft Certified -1.mp4 47.8 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/2. Security Operations - Microsoft Certified Cybersecurity Arch-1.mp4 47.0 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/4. Designing a Security Operations Strategy/5. SIEMSOAR Strategy - Microsoft Certified Cybersecurity Archit.mp4 46.3 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/2. Translating Requirements - Microsoft Certified Cybersecurity.mp4 46.2 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/3. Security Strategy for Applications and APIs - Microsoft Cert-1.mp4 44.6 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/5. Designing an Identity Security Strategy/1. Strategy for Access to Cloud Resources - Microsoft Certified.mp4 43.0 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/7. Evaluating and Managing Security Postures/4. Designing Security for an Azure Landing Zone - Microsoft Cer.mp4 42.8 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/4. Designing a Security Operations Strategy/3. Logging and Auditing Strategy - Microsoft Certified Cybersec.mp4 42.3 MB
猜你喜欢:
Microsoft
Training
Expert
Certification
Cybersecurity
Architect
SC
100
Certified
- 【影视】 Thinking about Cybersecurity From Cyber Crime to Cyber Warfare
-
收录时间:2023-12-20
文档个数:39
文档大小:8.8 GB
最近下载:2025-05-16
人气:4027
磁力链接
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/18 Looking Forward-What Does the Future Hold.mp4 535.2 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/10 International Governance and the Internet.mp4 521.6 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/14 Listening In and Going Dark.mp4 516.5 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/08 Nations at Cyber War.mp4 496.5 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/05 The Problem of Identity on the Network.mp4 495.7 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/13 Privacy for the Cyber Age.mp4 494.0 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/11 The Constitution and Cyberspace.mp4 489.6 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/17 Critical Infrastructure and Resiliency.mp4 489.1 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/01 Stuxnet-The First Cyber Guided Missile.mp4 486.4 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/04 Of Viruses, Botnets, and Logic Bombs.mp4 483.5 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/09 Government Regulation of Cyberspace.mp4 478.0 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/12 Big Data- They Know Everything about You.mp4 474.5 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/15 The Devil in the Chips-Hardware Failures.mp4 473.9 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/16 Protecting Yourself in Cyberspace.mp4 471.4 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/06 Cyber Fraud, Theft, and Organized Crime.mp4 470.0 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/07 Hacktivists and Insurgency.mp4 469.1 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/02 The Incredible Scope of Cyberspace.mp4 456.9 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/03 The Five Gateways of Internet Vulnerability.mp4 448.1 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/NA NA.mp4 20.8 MB
.pad/9 915.0 kB
猜你喜欢:
Cyber
about
Warfare
Thinking
Crime
Cybersecurity
- 【影视】 [ FreeCourseWeb.com ] Udemy - Cybersecurity Foundation
-
收录时间:2022-01-09
文档个数:18
文档大小:2.3 GB
最近下载:2025-05-16
人气:1583
磁力链接
~Get Your Files Here !/6. Continuous Risk Awareness and Monitoring/2. Malware Attacks and Defenses.mp4 328.2 MB
~Get Your Files Here !/4. Identify and Access Management & Data Security/3. User Identification, Authentication, and Session Protection.mp4 259.5 MB
~Get Your Files Here !/6. Continuous Risk Awareness and Monitoring/1. Risk Management.mp4 235.0 MB
~Get Your Files Here !/8. Cloud Platforms and Data Management/1. Cloud Computing.mp4 228.7 MB
~Get Your Files Here !/7. Cyber Hygiene/1. Cyber Hygiene.mp4 179.6 MB
~Get Your Files Here !/4. Identify and Access Management & Data Security/1. Business, Governance.mp4 166.2 MB
~Get Your Files Here !/5. Data and Information Lifecycle Process/2. Data and Information Lifecycle Process - Part 2.mp4 159.0 MB
~Get Your Files Here !/5. Data and Information Lifecycle Process/1. Data and Information Lifecycle Process - Part 1.mp4 158.9 MB
~Get Your Files Here !/4. Identify and Access Management & Data Security/4. Access Control Authorization Systems.mp4 143.3 MB
~Get Your Files Here !/8. Cloud Platforms and Data Management/2. Leveraging the Cloud for Business and Traffic Light Protocol.mp4 133.7 MB
~Get Your Files Here !/4. Identify and Access Management & Data Security/2. Access control concepts.mp4 116.0 MB
~Get Your Files Here !/2. Confidentiality, Integrity, and Availability (CIA)/1. Confidentiality, Integrity, and Availability (CIA).mp4 83.3 MB
~Get Your Files Here !/9. Summary/1. Summary.mp4 65.3 MB
~Get Your Files Here !/3. Information security and Cybersecurity Definitions/1. Information security and Cybersecurity Definitions.mp4 60.1 MB
~Get Your Files Here !/1. Introduction/1. Introduction.mp4 8.7 MB
~Get Your Files Here !/2. Data and Information Lifecycle Process - Part 2.jpeg 197.8 kB
~Get Your Files Here !/Bonus Resources.txt 357 Bytes
Get Bonus Downloads Here.url 183 Bytes
猜你喜欢:
Cybersecurity
com
FreeCourseWeb
Foundation
Udemy
- 【压缩文件】 [ FreeCourseWeb.com ] Lynda - Nail Your Cybersecurity Interview.zip
-
收录时间:2022-01-26
文档个数:1
文档大小:127.9 MB
最近下载:2025-05-16
人气:543
磁力链接
[ FreeCourseWeb.com ] Lynda - Nail Your Cybersecurity Interview.zip 127.9 MB
猜你喜欢:
zip
Cybersecurity
Lynda
Nail
FreeCourseWeb
Interview
com
Your
- 【影视】 [ CourseLala.com ] Linkedin - Cybersecurity Careers - Getting Started as a CISO
-
收录时间:2023-12-18
文档个数:34
文档大小:893.5 MB
最近下载:2025-05-16
人气:1242
磁力链接
~Get Your Files Here !/01 - Introduction/02 - You need a foundational knowledge of cyber security.mp4 76.1 MB
~Get Your Files Here !/05 - 4. CISO Best Practices/01 - Relationship building.mp4 73.1 MB
~Get Your Files Here !/03 - 2. Getting Hired and Getting Started/04 - First 90 days.mp4 70.3 MB
~Get Your Files Here !/03 - 2. Getting Hired and Getting Started/03 - The CISO interview.mp4 68.6 MB
~Get Your Files Here !/04 - 3. Building Your Strategic Plan/03 - Prioritize areas for improvement.mp4 66.4 MB
~Get Your Files Here !/03 - 2. Getting Hired and Getting Started/01 - Before the interview.mp4 66.0 MB
~Get Your Files Here !/04 - 3. Building Your Strategic Plan/01 - Select a security framework.mp4 62.2 MB
~Get Your Files Here !/04 - 3. Building Your Strategic Plan/02 - Complete an assessment.mp4 61.5 MB
~Get Your Files Here !/02 - 1. About the Role/02 - What type of CISO do you want to be.mp4 61.2 MB
~Get Your Files Here !/05 - 4. CISO Best Practices/02 - PRIME framework.mp4 56.9 MB
~Get Your Files Here !/02 - 1. About the Role/01 - What does a CISO do.mp4 54.6 MB
~Get Your Files Here !/04 - 3. Building Your Strategic Plan/05 - Put it on paper and socialize.mp4 48.5 MB
~Get Your Files Here !/06 - Conclusion/01 - Make the CISO dream come true.mp4 46.4 MB
~Get Your Files Here !/03 - 2. Getting Hired and Getting Started/02 - The CISO resume.mp4 39.6 MB
~Get Your Files Here !/04 - 3. Building Your Strategic Plan/04 - Set a mission and vision for your department.mp4 27.7 MB
~Get Your Files Here !/01 - Introduction/01 - So you want to be a CISO.mp4 14.5 MB
~Get Your Files Here !/04 - 3. Building Your Strategic Plan/01 - Select a security framework.srt 8.2 kB
~Get Your Files Here !/03 - 2. Getting Hired and Getting Started/01 - Before the interview.srt 7.4 kB
~Get Your Files Here !/01 - Introduction/02 - You need a foundational knowledge of cyber security.srt 6.5 kB
~Get Your Files Here !/02 - 1. About the Role/02 - What type of CISO do you want to be.srt 6.5 kB
猜你喜欢:
Getting
Cybersecurity
CourseLala
Linkedin
Started
CISO
com
Careers
- 【音乐】 Cybersecurity Program Development for Business (Unabridged)
-
收录时间:2021-03-24
文档个数:17
文档大小:264.8 MB
最近下载:2025-05-16
人气:4432
磁力链接
Cybersecurity Program Development for Business (Unabridged) - 08.mp3 26.7 MB
Cybersecurity Program Development for Business (Unabridged) - 13.mp3 24.1 MB
Cybersecurity Program Development for Business (Unabridged) - 14.mp3 23.7 MB
Cybersecurity Program Development for Business (Unabridged) - 15.mp3 23.4 MB
Cybersecurity Program Development for Business (Unabridged) - 06.mp3 21.8 MB
Cybersecurity Program Development for Business (Unabridged) - 09.mp3 20.0 MB
Cybersecurity Program Development for Business (Unabridged) - 07.mp3 19.9 MB
Cybersecurity Program Development for Business (Unabridged) - 10.mp3 18.4 MB
Cybersecurity Program Development for Business (Unabridged) - 16.mp3 17.9 MB
Cybersecurity Program Development for Business (Unabridged) - 17.mp3 16.5 MB
Cybersecurity Program Development for Business (Unabridged) - 11.mp3 14.7 MB
Cybersecurity Program Development for Business (Unabridged) - 12.mp3 12.7 MB
Cybersecurity Program Development for Business (Unabridged) - 04.mp3 9.9 MB
Cybersecurity Program Development for Business (Unabridged) - 05.mp3 7.0 MB
Cybersecurity Program Development for Business (Unabridged) - 01.mp3 3.4 MB
Cybersecurity Program Development for Business (Unabridged) - 02.mp3 2.6 MB
Cybersecurity Program Development for Business (Unabridged) - 03.mp3 2.2 MB
猜你喜欢:
Cybersecurity
Development
Program
Business
Unabridged
- 【影视】 [FreeCourseSite.com] Udemy - The Complete Certified in Cybersecurity (CC) course ISC2 '23
-
收录时间:2023-12-18
文档个数:294
文档大小:5.8 GB
最近下载:2025-05-16
人气:10921
磁力链接
07 - Domain recaps/004 Domain 4 recap Certified in Cybersecurity (CC).mp4 427.8 MB
07 - Domain recaps/005 Domain 5 recap Certified in Cybersecurity (CC).mp4 169.4 MB
07 - Domain recaps/001 Domain 1 recap Certified in Cybersecurity (CC).mp4 126.1 MB
08 - The study process, material, tips, tricks and practice tests!/006 How to approach practice questions.mp4 124.3 MB
05 - Domain 4 Network Security/004 The OSI Model - Part 1.mp4 105.9 MB
07 - Domain recaps/003 Domain 3 recap Certified in Cybersecurity (CC).mp4 92.9 MB
06 - Domain 5 Security Operations/013 Administrative (Directive) Controls.mp4 92.2 MB
07 - Domain recaps/002 Domain 2 recap Certified in Cybersecurity (CC).mp4 91.8 MB
05 - Domain 4 Network Security/038 Virtualization, Cloud, and Distributed Computing - Part 5.mp4 91.7 MB
04 - Domain 3 Access Controls Concepts/011 Logical Access Control - Part 5.mp4 85.1 MB
04 - Domain 3 Access Controls Concepts/009 Logical Access Control - Part 3.mp4 82.3 MB
02 - Domain 1 Security Principles/024 Laws and regulations - part 1.mp4 81.2 MB
08 - The study process, material, tips, tricks and practice tests!/007 How to design your career and certification path.mp4 78.0 MB
02 - Domain 1 Security Principles/011 IAAA -Identification, Authentication, Authorization, and Accountability - part 4.mp4 71.2 MB
05 - Domain 4 Network Security/025 Attacks and attackers - Part 3.mp4 67.7 MB
03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/008 DRP - Disaster Recovery Planning - Part 4.mp4 67.6 MB
02 - Domain 1 Security Principles/026 Security governance principles.mp4 63.2 MB
05 - Domain 4 Network Security/037 Virtualization, Cloud, and Distributed Computing - Part 4.mp4 61.4 MB
05 - Domain 4 Network Security/041 Electricity.mp4 61.0 MB
05 - Domain 4 Network Security/049 Secure design principles - Part 1.mp4 60.1 MB
猜你喜欢:
Complete
FreeCourseSite
course
Cybersecurity
23
ISC2
Udemy
CC
com
Certified
- 【影视】 [FreeCoursesOnline.Me] O`REILLY - Building a Career in Cybersecurity
-
收录时间:2023-12-18
文档个数:75
文档大小:847.7 MB
最近下载:2025-05-16
人气:4418
磁力链接
Lesson 1 Getting Started in the Cybersecurity Field/005. 1.4 Cybersecurity Skills.mp4 65.3 MB
Lesson 2 Planning Your Cybersecurity Career/004. 2.3 The Value of Professional Certifications.mp4 60.1 MB
Lesson 3 Creating Your Own Lab/003. 3.2 Foundational Lab.mp4 48.0 MB
Lesson 5 Preparing for Your Interview/005. 5.4 Final Tips.mp4 44.9 MB
Lesson 6 Using Continuous Improvement Strategy/007. 6.6 Growing Your Career as a Remote Worker.mp4 40.3 MB
Lesson 2 Planning Your Cybersecurity Career/003. 2.2 Creating and Tracking Your Plan.mp4 36.8 MB
Lesson 5 Preparing for Your Interview/003. 5.2 Preparing for the Interview.mp4 35.5 MB
Lesson 1 Getting Started in the Cybersecurity Field/006. 1.5 Navigating through the Industry.mp4 31.9 MB
Lesson 2 Planning Your Cybersecurity Career/002. 2.1 Establishing a Plan.mp4 31.3 MB
Lesson 6 Using Continuous Improvement Strategy/008. 6.7 What’s Next.mp4 31.0 MB
Lesson 1 Getting Started in the Cybersecurity Field/004. 1.3 Cybersecurity Jobs.mp4 30.3 MB
Lesson 5 Preparing for Your Interview/004. 5.3 Advancing in the Interview Process.mp4 29.3 MB
Lesson 6 Using Continuous Improvement Strategy/006. 6.5 Keeping a Good Work-life Balance.mp4 28.2 MB
Lesson 3 Creating Your Own Lab/005. 3.4 Enabling and Using Microsoft Defender for Cloud.mp4 27.7 MB
Introduction/001. Building a Career in Cybersecurity Introduction.mp4 25.1 MB
Lesson 6 Using Continuous Improvement Strategy/003. 6.2 Responsibilities and Expectations.mp4 24.6 MB
Lesson 4 Expanding Your Networking/005. 4.4 Using LinkedIn to Expand Your Network.mp4 24.5 MB
Lesson 1 Getting Started in the Cybersecurity Field/003. 1.2 Roles and Responsibilities.mp4 22.1 MB
Lesson 4 Expanding Your Networking/002. 4.1 Understanding the Cybersecurity Community.mp4 21.9 MB
Lesson 4 Expanding Your Networking/003. 4.2 Identifying Opportunities to Contribute with the Cybersecurity Community.mp4 19.3 MB
猜你喜欢:
FreeCoursesOnline
Me
Cybersecurity
Career
REILLY
Building
- 【影视】 Advanced Cybersecurity and Ethical Hacking with ChatGPT
-
收录时间:2023-12-25
文档个数:185
文档大小:1.5 GB
最近下载:2025-05-16
人气:13554
磁力链接
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/15 - CTF Challenges and Capture The Flag Events/48 - Introduction to Capture The Flag CTF Challenges.mp4 50.2 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/16 - Final Projects and Practical Assessments/52 - Building a Security Automation Workflow with ChatGPT.mp4 48.9 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/17 - Professional Development and Career Insights/55 - Navigating the Job Market and Advancing Your Cybersecurity Career.mp4 44.4 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/16 - Final Projects and Practical Assessments/53 - Penetration Testing Report Compilation with ChatGPT.mp4 39.3 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/17 - Professional Development and Career Insights/54 - Resume Building and Interview Preparation for Ethical Hackers.mp4 38.3 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/2 - Foundations of Cybersecurity and Hacking/7 - Operating System Fundamentals for Hacking and Penetration Testing.mp4 37.8 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/15 - CTF Challenges and Capture The Flag Events/49 - Solving CTF Challenges Using ChatGPT.mp4 37.3 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/5 - Vulnerability Identification and Assessment/17 - Network Vulnerability Scanning and Analysis with ChatGPT.mp4 36.8 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/1 - Section 1 Introduction to Cybersecurity and Ethical Hacking/4 - Understanding the Role of Ethical Hackers and Penetration Testers.mp4 36.4 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/11 - Case Studies and RealWorld Scenarios/36 - Ethical Hacking Case Studies Using ChatGPT.mp4 36.0 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/6 - Exploitation and Penetration Testing/21 - Penetration Testing Methodologies and Reporting.mp4 35.7 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/6 - Exploitation and Penetration Testing/20 - PostExploitation Techniques and Privilege Escalation.mp4 34.6 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/14 - Ethical Hacking in Cloud Environments/46 - Securing Containers and Serverless Architectures.mp4 34.5 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/3 - Getting Started with ChatGPT/10 - Setting Up and Configuring ChatGPT for Hacking Tasks.mp4 34.3 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/10 - Emerging Trends and Future of Cybersecurity/32 - Blockchain Security and Decentralized Technologies.mp4 33.2 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/13 - Cybersecurity Regulations and Compliance/43 - Conducting Compliance Audits with ChatGPT.mp4 33.0 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/7 - Advanced Ethical Hacking Techniques/24 - Wireless Network Hacking and Countermeasures Using ChatGPT.mp4 31.7 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/5 - Vulnerability Identification and Assessment/16 - Web Application Vulnerability Assessment Using ChatGPT.mp4 30.5 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/9 - ChatGPT for Security Innovation/28 - Leveraging ChatGPT for Threat Hunting and Analysis.mp4 30.1 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/3 - Getting Started with ChatGPT/11 - Navigating the ChatGPT Interface for Cybersecurity Analysis.mp4 28.8 MB
猜你喜欢:
Cybersecurity
Ethical
Hacking
ChatGPT
Advanced
- 【影视】 [ WebToolTip.com ] Udemy - Implement Version 2 Of Nist Cybersecurity Framework
-
收录时间:2025-04-06
文档个数:45
文档大小:1.9 GB
最近下载:2025-05-16
人气:944
磁力链接
~Get Your Files Here !/1 - Introduction to the NIST Cyber Security Framework/2 - Business Value of Framework.mp4 147.0 MB
~Get Your Files Here !/1 - Introduction to the NIST Cyber Security Framework/1 - Introduction.mp4 144.2 MB
~Get Your Files Here !/1 - Introduction to the NIST Cyber Security Framework/3 - Who Can Use The Framework.mp4 139.6 MB
~Get Your Files Here !/5 - Implementing Phase Two of the CRMAP/34 - Business Value Analysis.mp4 106.8 MB
~Get Your Files Here !/4 - Implementing Phase One of the CRMAP/28 - Conduct Interviews.mp4 72.2 MB
~Get Your Files Here !/7 - Conclusion/43 - BONUS Conclusion.mp4 72.1 MB
~Get Your Files Here !/5 - Implementing Phase Two of the CRMAP/32 - Close Your Gaps.mp4 70.9 MB
~Get Your Files Here !/4 - Implementing Phase One of the CRMAP/29 - Compile and Analyze Scores.mp4 68.2 MB
~Get Your Files Here !/6 - Implementing Phase Three of the CRMAP/41 - Quarterly Reviews.mp4 65.1 MB
~Get Your Files Here !/5 - Implementing Phase Two of the CRMAP/36 - Internal Marketing.mp4 64.3 MB
~Get Your Files Here !/4 - Implementing Phase One of the CRMAP/24 - Get BuyIn.mp4 62.7 MB
~Get Your Files Here !/3 - Real World Case Studies/17 - Cimpress Promotional Products.mp4 61.5 MB
~Get Your Files Here !/2 - Understanding the NIST Cybersecurity Framework/9 - Govern Function and Activities.mp4 59.1 MB
~Get Your Files Here !/6 - Implementing Phase Three of the CRMAP/39 - Phase Three Overview.mp4 50.6 MB
~Get Your Files Here !/6 - Implementing Phase Three of the CRMAP/40 - Monthly Checkins.mp4 46.0 MB
~Get Your Files Here !/2 - Understanding the NIST Cybersecurity Framework/11 - Protect Function and Activities.mp4 41.4 MB
~Get Your Files Here !/4 - Implementing Phase One of the CRMAP/26 - Generate Questionnaire.mp4 40.7 MB
~Get Your Files Here !/1 - Introduction to the NIST Cyber Security Framework/4 - Understanding the Core.mp4 38.5 MB
~Get Your Files Here !/3 - Real World Case Studies/18 - University of Kansas Medical Center.mp4 38.0 MB
~Get Your Files Here !/5 - Implementing Phase Two of the CRMAP/37 - External Marketing.mp4 36.4 MB
猜你喜欢:
WebToolTip
Cybersecurity
Udemy
Framework
Version
Implement
com
Nist
- 【影视】 [CourseClub.Me] ITProTV - NIST Cybersecurity And Risk Management Frameworks
-
收录时间:2024-01-03
文档个数:61
文档大小:11.3 GB
最近下载:2025-05-16
人气:3755
磁力链接
2. NIST Cybersecurity and Publications.mp4 298.0 MB
26. Response Training and Testing.mp4 288.9 MB
24. Incident Response Plan Examples.mp4 279.3 MB
43. Documentation and Approval.mp4 277.5 MB
20. System Auditing and Logging.mp4 258.9 MB
23. Response Planning.mp4 255.7 MB
29. Backup and Recovery.mp4 251.4 MB
9. Inventory of Critical Assets.mp4 247.4 MB
46. Documenting Controls.mp4 246.5 MB
21. Monitoring and Alerting.mp4 238.7 MB
22. Assessments.mp4 238.7 MB
42. Control Allocation and Monitoring.mp4 234.0 MB
10. Business Impact Assessment.mp4 231.6 MB
40. NIST Control Documents.mp4 230.2 MB
36. Establishing Scope.mp4 227.5 MB
44. Security Control Implementation.mp4 225.8 MB
3. NIST Relationships.mp4 222.6 MB
6. The Vocabulary of Risk.mp4 222.0 MB
25. Digital Forensics.mp4 219.4 MB
51. Assessment Documentation.mp4 219.2 MB
猜你喜欢:
Me
Management
Risk
Cybersecurity
ITProTV
Frameworks
NIST
CourseClub
- 【影视】 Microsoft Cybersecurity Pro Track Managing Identity
-
收录时间:2021-03-09
文档个数:34
文档大小:850.9 MB
最近下载:2025-05-16
人气:1812
磁力链接
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/03 Securing Active Directory/006 Active Directory Security.mp4 212.7 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/05 Active Directory & Kerberos Protocol/009 Authentication and Authorization in Active Directory.mp4 155.1 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/04 Azure Active Directory (AAD)/008 Azure Security Architecture.mp4 122.3 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/01 Introduction/003 Preparing the Lab Environment.mp4 92.3 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/02 Managing Identity/005 Security Privileged Access Roadmap Stage 2.mp4 81.3 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/02 Managing Identity/004 Identity as a Service, the new Control Plane.mp4 76.2 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/04 Azure Active Directory (AAD)/007 Identity Federation and Access Solutions for the Cloud.mp4 63.6 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/01 Introduction/002 About the Course.mp4 33.8 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/01 Introduction/001 Instructor Introduction.mp4 11.0 MB
.pad/3 488.8 kB
.pad/4 442.3 kB
.pad/2 358.5 kB
.pad/6 355.4 kB
.pad/5 338.9 kB
.pad/7 245.6 kB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/03 Securing Active Directory/006 Active Directory Security.en.srt 56.2 kB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/05 Active Directory & Kerberos Protocol/009 Authentication and Authorization in Active Directory.en.srt 53.0 kB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/04 Azure Active Directory (AAD)/008 Azure Security Architecture.en.srt 37.5 kB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/02 Managing Identity/005 Security Privileged Access Roadmap Stage 2.en.srt 26.4 kB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/01 Introduction/003 Preparing the Lab Environment.en.srt 24.9 kB
猜你喜欢:
Cybersecurity
Pro
Managing
Track
Microsoft
Identity
- 【压缩文件】 [ FreeCourseWeb.com ] Lynda - Risk Management for IT and Cybersecurity Managers (2020).zip
-
收录时间:2021-03-15
文档个数:1
文档大小:532.5 MB
最近下载:2025-05-16
人气:1273
磁力链接
[ FreeCourseWeb.com ] Lynda - Risk Management for IT and Cybersecurity Managers (2020).zip 532.5 MB
猜你喜欢:
Management
Managers
Risk
zip
Cybersecurity
Lynda
FreeCourseWeb
2020
com
- 【影视】 [ WebToolTip.com ] Udemy - ISACA Cybersecurity Fundamentals - Complete Training Course
-
收录时间:2025-03-07
文档个数:45
文档大小:858.9 MB
最近下载:2025-05-16
人气:2781
磁力链接
~Get Your Files Here !/2 - Types of Security/4 -Cybersecurity.mp4 38.9 MB
~Get Your Files Here !/3 - Governance, Risk Management and Compliance/5 -Risk Analysis Approaches.mp4 36.9 MB
~Get Your Files Here !/4 - Common Types of Malware/6 -Trojan Horses.mp4 34.2 MB
~Get Your Files Here !/4 - Common Types of Malware/5 -Ransomware.mp4 34.1 MB
~Get Your Files Here !/4 - Common Types of Malware/3 -Worms.mp4 33.9 MB
~Get Your Files Here !/5 - Security Controls/2 -Control Functions and Types.mp4 32.8 MB
~Get Your Files Here !/4 - Common Types of Malware/2 -Viruses.mp4 31.7 MB
~Get Your Files Here !/2 - Types of Security/5 -Physical Security.mp4 31.6 MB
~Get Your Files Here !/3 - Governance, Risk Management and Compliance/4 -Risk Governance.mp4 29.0 MB
~Get Your Files Here !/4 - Common Types of Malware/8 -Adware.mp4 28.9 MB
~Get Your Files Here !/6 - OWASP Top 10/11 -Server-Side Request Forgery.mp4 28.7 MB
~Get Your Files Here !/6 - OWASP Top 10/9 -Software and Data Integrity Failures.mp4 28.1 MB
~Get Your Files Here !/6 - OWASP Top 10/10 -Security Logging and Monitoring Failures.mp4 28.0 MB
~Get Your Files Here !/6 - OWASP Top 10/3 -Cryptographic Failures.mp4 27.0 MB
~Get Your Files Here !/6 - OWASP Top 10/7 -Vulnerable and Outdated Components.mp4 27.0 MB
~Get Your Files Here !/1 - Introduction/3 -Integrity.mp4 26.2 MB
~Get Your Files Here !/4 - Common Types of Malware/7 -Rootkit.mp4 25.7 MB
~Get Your Files Here !/2 - Types of Security/3 -Information Security.mp4 23.5 MB
~Get Your Files Here !/1 - Introduction/4 -Availability.mp4 22.1 MB
~Get Your Files Here !/4 - Common Types of Malware/4 -Keyloggers.mp4 21.6 MB
猜你喜欢:
Training
WebToolTip
Course
Cybersecurity
com
Udemy
Fundamentals
ISACA
Complete