磁力管家

磁力管家
为您索检到268条磁力链接,耗时0毫秒。 rss

分享给好友

【影视】 IGTI - Bootcamp - Analista de Cybersecurity
收录时间:2021-06-25 文档个数:168 文档大小:13.0 GB 最近下载:2025-05-16 人气:3297 磁力链接
  • mp4Módulo 4 - Análise Computacional Forense/Segunda aula interativa.mp4 455.8 MB
  • mp4Módulo 1 - Fundamentos de Cybersecurity/Segunda aula interativa - CBS211A - 1280x720 2310K.mp4 412.0 MB
  • mp4Módulo 2 - Segurança de Infraestrutura de TI/Primeira aula interativa.mp4 403.8 MB
  • mp4Módulo 3 - Auditoria e testes de invasão/Segunda aula interativa.mp4 392.8 MB
  • mp4Módulo 3 - Auditoria e testes de invasão/Primeira aula interativa.mp4 379.2 MB
  • mp4Desafio Final/Desafio Final.mp4 363.7 MB
  • mp4Módulo 2 - Segurança de Infraestrutura de TI/5. Firewall, IDS e IPS/Aula 2.5.2 - IPS e IDS.mp4 363.0 MB
  • mp4Módulo 2 - Segurança de Infraestrutura de TI/9. Controlador de Domínio e Group Polices/Controlador de Domínio e Group Polices.mp4 338.8 MB
  • mp4Módulo 2 - Segurança de Infraestrutura de TI/Segunda aula interativa.mp4 330.3 MB
  • mp4Módulo 4 - Análise Computacional Forense/Primeira aula interativa.mp4 279.1 MB
  • mp4Módulo 2 - Segurança de Infraestrutura de TI/7. Monitoramento e Gerenciamento com NTOP/Monitoramento e Gerenciamento com NTOP.mp4 254.6 MB
  • mp4Módulo 2 - Segurança de Infraestrutura de TI/11. Camada 5, vírus e Firewall pessoal/Camada 5, vírus e Firewall pessoal.mp4 220.2 MB
  • mp4Módulo 2 - Segurança de Infraestrutura de TI/13. Camada 7, criptografia e DLP/Camada 7, criptografia e DLP.mp4 205.7 MB
  • mp4Módulo 3 - Auditoria e testes de invasão/14. Metasploit - Pós-exploração e eliminação dos rastros/HAC- BTC 3.14 - 720p.mp4 198.0 MB
  • mp4Módulo 2 - Segurança de Infraestrutura de TI/12. Camada 6 e WAF/Camada 6 e WAF.mp4 192.5 MB
  • mp4Módulo 1 - Fundamentos de Cybersecurity/Primeira aula interativa - CBS211A - 1280x720 2310K.mp4 186.9 MB
  • mp4Módulo 2 - Segurança de Infraestrutura de TI/2. Arquitetura da Estratégia de Defesa em Profundidade/Arquitetura da Estratégia de Defesa em Profundidade.mp4 175.4 MB
  • mp4Módulo 2 - Segurança de Infraestrutura de TI/5. Firewall, IDS e IPS/Aula 2.4.2 - Firewall (Parte 2).mp4 158.3 MB
  • mp4Módulo 3 - Auditoria e testes de invasão/8. Fingerprint e análise de vulnerabilidade/HAC 3.5 - 720p.mp4 149.2 MB
  • mp4Módulo 2 - Segurança de Infraestrutura de TI/1. Defesa em Profundidade/Aula 1.3 - Elementos de Controle.mp4 147.4 MB
【影视】 Microsoft Cybersecurity Architect SC 100 Exam Prep
收录时间:2023-12-23 文档个数:271 文档大小:10.3 GB 最近下载:2025-05-16 人气:9458 磁力链接
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/21 - CAF Governance.mp4 293.3 MB
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/19 - CAF Landing Zone Deployment Lab Step By StepII.mp4 286.7 MB
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/16 - CAF Readyness Azure setup guide.mp4 231.2 MB
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/41 - SecOps Best practices for SIEM SOAR.mp4 202.4 MB
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/12 - MCRA IoT and IT Security II.mp4 161.1 MB
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/78 - Pass Through Authentication PTA.mp4 160.2 MB
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/4 - Design security for infrastructure/103 - Plan and Implement a security strategy across teams.mp4 157.6 MB
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/17 - CAF Readyness Azure Landing Zone.mp4 154.3 MB
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/72 - Zero trust Security strategy for Identities.mp4 152.4 MB
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/27 - SC 100 Case Study.mp4 149.8 MB
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/11 - MCRA People Security.mp4 141.5 MB
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/3 - Evaluate Governance Risk Compliance GRCstrategies/93 - Encryption Support for various services.mp4 137.3 MB
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/79 - Azure AD Roles Best Practices.mp4 136.1 MB
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/35 - Recommendations for Designing a logging and auditing security strategy.mp4 133.8 MB
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/4 - Design security for infrastructure/124 - Securing Domain Controllers.mp4 127.6 MB
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/4 - Design security for infrastructure/118 - Securing Member Servers.mp4 124.1 MB
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/40 - Azure Tools for SecOps.mp4 123.5 MB
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/48 - Incident Management process Overview.mp4 122.3 MB
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/82 - Develop a Roadmap Explained.mp4 119.6 MB
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/74 - Conditional Access Personas.mp4 118.4 MB
【其他】 Pascal Ackerman - Industrial Cybersecurity - 2017
收录时间:2023-12-23 文档个数:3 文档大小:117.2 MB 最近下载:2025-05-16 人气:3637 磁力链接
  • mobiPascal Ackerman - Industrial Cybersecurity - 2017.mobi 64.3 MB
  • pdfPascal Ackerman - Industrial Cybersecurity - 2017.pdf 26.8 MB
  • epubPascal Ackerman - Industrial Cybersecurity - 2017.epub 26.1 MB
【影视】 [ FreeCourseWeb.com ] AI Cybersecurity with DeepSeek R1 - Protect Your Digital Life
收录时间:2025-02-23 文档个数:25 文档大小:363.3 MB 最近下载:2025-05-16 人气:1236 磁力链接
  • mp4~Get Your Files Here !/5 - Digital Forensics & Investigations/2 -Analyzing Suspicious Software.mp4 46.2 MB
  • mp4~Get Your Files Here !/4 - OSINT – How Scammers Gather Your Data/3 -Romance Scams How They Manipulate Victims.mp4 43.4 MB
  • mp4~Get Your Files Here !/1 - Introduction to AI and Cybersecurity/1 -What Are Artificial Intelligence & Cybersecurity.mp4 37.4 MB
  • mp4~Get Your Files Here !/3 - Ethical Hacking Real-World Demonstrations/3 -Hacking with Advanced Malware A Demonstration.mp4 27.7 MB
  • mp4~Get Your Files Here !/7 - Final Thoughts & Cybersecurity Mindset/1 -Psychological Tricks Hackers Use & How to Avoid Scams.mp4 26.1 MB
  • mp4~Get Your Files Here !/6 - Leveraging AI for Profit and Cybersecurity/1 -Qwen 2.5 AI Video Generation.mp4 25.8 MB
  • mp4~Get Your Files Here !/3 - Ethical Hacking Real-World Demonstrations/2 -Why Do Experts Say Don't Click the Link.mp4 23.4 MB
  • mp4~Get Your Files Here !/4 - OSINT – How Scammers Gather Your Data/1 -How Scammers Steal Your Personal Data.mp4 22.6 MB
  • mp4~Get Your Files Here !/4 - OSINT – How Scammers Gather Your Data/2 -Job Scams Be Careful Where You Apply.mp4 19.7 MB
  • mp4~Get Your Files Here !/4 - OSINT – How Scammers Gather Your Data/4 -OSINT Tools SearchPeopleFree, WhitePages.mp4 15.5 MB
  • mp4~Get Your Files Here !/5 - Digital Forensics & Investigations/3 -Investigating Malicious Links.mp4 13.4 MB
  • mp4~Get Your Files Here !/5 - Digital Forensics & Investigations/4 -Verifying Email Sources for Cyber Threats.mp4 10.8 MB
  • mp4~Get Your Files Here !/3 - Ethical Hacking Real-World Demonstrations/4 -Key Takeaways & How to Protect Yourself.mp4 10.7 MB
  • mp4~Get Your Files Here !/3 - Ethical Hacking Real-World Demonstrations/1 -Advanced Phishing Attacks How They Work.mp4 9.4 MB
  • mp4~Get Your Files Here !/1 - Introduction to AI and Cybersecurity/2 -Who Is This Course For.mp4 8.7 MB
  • mp4~Get Your Files Here !/5 - Digital Forensics & Investigations/1 -Introduction to Digital Forensics.mp4 8.0 MB
  • mp4~Get Your Files Here !/2 - Cybersecurity Myths vs. Reality/2 -Why Antivirus Alone Won't Keep You Safe.mp4 7.9 MB
  • mp4~Get Your Files Here !/2 - Cybersecurity Myths vs. Reality/1 -What Are the Risks of Downloading Unknown Apps.mp4 6.7 MB
  • html~Get Your Files Here !/6 - Leveraging AI for Profit and Cybersecurity/2 - Use Google Ai studio to generate script for a video.html 11.3 kB
  • html~Get Your Files Here !/6 - Leveraging AI for Profit and Cybersecurity/2 - Whisper Free Audio Transcription for Security Experts.html 5.3 kB
【影视】 [ WebToolTip.com ] Udemy - GenAI Cybersecurity - OWASP Top 10, MITRE ATLAS and API Attacks
收录时间:2025-05-09 文档个数:70 文档大小:1.6 GB 最近下载:2025-05-16 人气:288 磁力链接
  • mp4~Get Your Files Here !/7 - MITRE ATLAS Mapping for LLM Attacks/2 -Mapping AI Threats with MITRE ATLAS OpenAI vs. DeepSeek Case Study.mp4 156.0 MB
  • mp4~Get Your Files Here !/6 - LLM API Security Real-World Exploitation & Mitigation Demo with OLAMA/3 -Hands-On Demo Exploiting an Insecure Ollama API Setup.mp4 135.0 MB
  • mp4~Get Your Files Here !/6 - LLM API Security Real-World Exploitation & Mitigation Demo with OLAMA/6 -Mitigating OLAMA API Risks with NGINX Authentication (Hands-On Demo).mp4 81.1 MB
  • mp4~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/9 -How Self-Attention Builds Rich Contextual Understanding in Transformers.mp4 72.5 MB
  • mp4~Get Your Files Here !/5 - OWASP Top 10 for LLMs Understanding AI-Specific Security Risks/2 -OWASP Top 10 Risks for LLMs + Case Study Mapping.mp4 52.7 MB
  • mp4~Get Your Files Here !/8 - Hands-On Lab Exploiting AI Decisions in LLM APIs/2 -Lab Demo – Exploiting LLM APIs with Excessive Agency (PortSwigger).mp4 49.4 MB
  • mp4~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/9 -Scenario 2 Deep Dive into LLM Attack Surfaces from the Provider Side.mp4 48.5 MB
  • mp4~Get Your Files Here !/3 - Anatomy of an LLM System and Its Security Attack Surface/6 -LLM Processing Unit Explained Inference Handling, Prompt Cntrl & Runtime Logic.mp4 45.0 MB
  • mp4~Get Your Files Here !/6 - LLM API Security Real-World Exploitation & Mitigation Demo with OLAMA/4 -Ollama in the Wild Real-World Exposure via Shodan + Developer Risk Behavior.mp4 44.9 MB
  • mp4~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/11 -Inference and Log Data Exposure DeepSeek’s AI Leak Case Study.mp4 42.7 MB
  • mp4~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/6 -Understanding Recurrent Neural Networks (RNNs) for Language Processing.mp4 40.8 MB
  • mp4~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/10 -Training Data Poisoning Case Study How Microsoft Tay Was Manipulated on Twitter.mp4 37.5 MB
  • mp4~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/11 -Summary of Transformer Innovations Key Concepts Behind LLMs.mp4 30.9 MB
  • mp4~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/14 -Section 3 Wrap-Up LLM Attack Surface Lessons + What’s Next with OWASP Top 10.mp4 30.3 MB
  • mp4~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/8 -Prompt Injection Demonstration How a $1 Chevy Tahoe Chatbot Reply Went Viral.mp4 29.8 MB
  • mp4~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/7 -How Transformers and LLMs Revolutionized Language Processing.mp4 27.6 MB
  • mp4~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/12 -LLM Model Exposure How Misconfigured Ollama APIs Opened the Door.mp4 27.5 MB
  • mp4~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/3 -Where Large Language Models Fit in the Generative AI Landscape.mp4 26.8 MB
  • mp4~Get Your Files Here !/6 - LLM API Security Real-World Exploitation & Mitigation Demo with OLAMA/7 -How One Misconfigured LLM API Triggers Multiple OWASP Risks.mp4 26.7 MB
  • mp4~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/7 -Scenario 1 LLM Attack Surfaces in Organizations Using AI Models.mp4 26.5 MB
【影视】 Python for Cybersecurity Specialization
收录时间:2023-12-18 文档个数:366 文档大小:1.2 GB 最近下载:2025-05-16 人气:13373 磁力链接
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/03_alternative-protocol.mp4 61.8 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/05_network-sniffing.mp4 42.0 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/04_network-scanning.mp4 32.5 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/05_protocol-decoding.mp4 31.5 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/07_behavioral-analytics.mp4 29.2 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/03_registry-autorun.mp4 29.0 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/05_hijacked-execution-flow.mp4 27.5 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/06_dns-exploration.mp4 27.3 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/05_system-activity-monitoring.mp4 26.6 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/03_pcap-collection.mp4 26.0 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/03_encrypted-channel.mp4 25.8 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/05_scheduled-execution.mp4 25.8 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/03_user-account-discovery.mp4 25.4 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/03_logon-scripts.mp4 24.6 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/03_data-encryption.mp4 23.6 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/05_alternate-data-streams.mp4 22.4 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/03_default-account-discovery.mp4 21.7 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/05_autorun-scripts.mp4 21.2 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/03_impair-avs.mp4 20.8 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/03_credentials-from-web-browsers.mp4 20.7 MB
【影视】 Implementing the NIST Cybersecurity Framework
收录时间:2024-01-10 文档个数:127 文档大小:4.3 GB 最近下载:2025-05-16 人气:874 磁力链接
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/2. Using the NIST Cybersecurity Framework/5. Finding the Controls.mp4 307.2 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/6. Five Functions.mp4 231.8 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/7. Controls and Outcomes.mp4 205.8 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/5. Framework Components.mp4 197.5 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/3. Value Proposition.mp4 181.0 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/1. Welcome.mp4 161.5 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/5. Generate Questionnaire.mp4 153.5 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/2. Using the NIST Cybersecurity Framework/1. Using the Core.mp4 149.0 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/2. Intel (Microchip Manufacturing).mp4 143.5 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/5. Implementing Phase Two of the CR-MAP/4. Business Value Analysis.mp4 139.8 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/4. DOE (Energy Industry).mp4 139.0 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/7. Conduct Interviews.mp4 136.2 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/7. Conclusion/1. BONUS - Conclusion.mp4 126.4 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/3. Cimpress (Promotional Products).mp4 123.9 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/6. Saudi Aramco (Oil Industry).mp4 118.9 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/4. Intended Audience.mp4 112.2 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/5. Western Australia (Local Government).mp4 112.1 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/6. Choose Target Scores.mp4 100.5 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/6. Implementing Phase Three of the CR-MAP/3. Quarterly Reviews.mp4 99.8 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/1. Phase One.mp4 93.8 MB
【影视】 Cybersecurity Monitoring & Detection Lab
收录时间:2023-12-20 文档个数:71 文档大小:2.7 GB 最近下载:2025-05-16 人气:10002 磁力链接
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/28. Attacks and Monitor in Splunk.mp4 216.4 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/26. Attacks & Security Onion Monitoring.mp4 213.9 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/27. Introduction to Splunk.mp4 147.7 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/25. Introduction to Security Onion.mp4 134.2 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/9. Install Security Onion.mp4 127.0 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/1. Introduction to Cybersecurity/2. Cyber Security Monitoring & Detection.mp4 108.8 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/8. Install Ubuntu Server.mp4 108.1 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/1. Introduction to Cybersecurity/1. Introduction Cyber Security.mp4 108.0 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/5. PfSense Firewall Wizard, Naming & Rules.mp4 98.8 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/30. Configure WAZUH Agent on Windows.mp4 85.7 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/4. PfSense Firewall Initial Configuration.mp4 84.5 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/29. Install WAZUH Manager.mp4 76.9 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/12. Install Windows Server 2019 Advanced Method.mp4 73.6 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/2. Install Windows 11.mp4 72.7 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/21. Setting IP Address on Ubuntu Server.mp4 70.4 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/18. Install Splunk on Linux Ubuntu Server.mp4 68.9 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/19. Install Splunk on Linux CentOS.mp4 67.3 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/1. Introduction to Cybersecurity/3. Cyber Security Monitoring & Detection Lab.mp4 66.9 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/13. Configure Active Directory AD.mp4 65.8 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/11. Install Windows Server 2019 Typical Method.mp4 64.3 MB
【压缩文件】 [ CourseMega.com ] Udemy - Cybersecurity - Attack & Defense Strategies (Red & Blue Team).zip
收录时间:2024-03-26 文档个数:1 文档大小:3.0 GB 最近下载:2025-05-16 人气:3369 磁力链接
  • zip[ CourseMega.com ] Udemy - Cybersecurity - Attack & Defense Strategies (Red & Blue Team).zip 3.0 GB
【影视】 Palo Alto Networks Cybersecurity Fundamentals (PCCSA)
收录时间:2024-02-29 文档个数:52 文档大小:2.0 GB 最近下载:2025-05-16 人气:5526 磁力链接
  • mp4Chapter 1 Cybersecurity Fundamentals and Threat Landscape/002. Identify Computing and Networking Trends.mp4 118.2 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/006. Identify Networking Security Technologies.mp4 114.7 MB
  • mp4Chapter 1 Cybersecurity Fundamentals and Threat Landscape/003. Describe Cybersecurity Threats.mp4 108.3 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/004. Review Network Addressing.mp4 105.2 MB
  • mp4Chapter 1 Cybersecurity Fundamentals and Threat Landscape/005. Identify Wi-Fi Vulnerabilities and Attacks.mp4 100.1 MB
  • mp4Chapter 1 Cybersecurity Fundamentals and Threat Landscape/004. Describe Common Cyberattack Techniques.mp4 96.3 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/011. Endpoint Security.mp4 95.3 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/002. Describe Routing Protocols.mp4 91.8 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/001. Identify Basic Internet and Network Operations.mp4 90.7 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/012. Server and System Administration.mp4 90.3 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/003. Review Networking Models.mp4 88.4 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/009. Learn Basic Virtualization Security Concepts.mp4 83.8 MB
  • mp4Chapter 3 Palo Alto Networks Security Solutions and Technologies/007. Describe Cortex XSOAR and AutoFocus.mp4 79.5 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/008. Learn Basic Cloud Security Concepts.mp4 75.4 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/010. Learn Basic DevOps Security Concepts.mp4 75.3 MB
  • mp4Chapter 3 Palo Alto Networks Security Solutions and Technologies/001. Identify Palo Alto Networks Security Solutions.mp4 74.3 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/005. Learn Networking Security Models.mp4 72.6 MB
  • mp4Chapter 3 Palo Alto Networks Security Solutions and Technologies/002. Describe Basic NGFW Components and Functions.mp4 67.1 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/007. Learn Basic Data Center Security Concepts.mp4 60.2 MB
  • mp4Chapter 3 Palo Alto Networks Security Solutions and Technologies/003. Learn Basic Prisma Cloud.mp4 59.7 MB
【影视】 Cybersecurity Prevention and Detection 2nd Edition (Video Collection)
收录时间:2024-05-31 文档个数:374 文档大小:3.8 GB 最近下载:2025-05-16 人气:4395 磁力链接
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/007. 1.6 Identity and access management.mp4 120.3 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/003. 1.2 Log ingestion Part 2.mp4 117.9 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/002. 1.1 Log ingestion Part 1.mp4 106.0 MB
  • mp403 Malware and Incident Response/Lesson 1 Threat Landscape/002. 1.1 Malware Threat Landscape.mp4 90.8 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/005. 1.4 Infrastructure concepts.mp4 89.3 MB
  • mp404 Secure Operations and Protections/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/004. 2.3 Technology and tool integration.mp4 87.2 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 2 Analyze Indicators of Potentially Malicious Activity/002. 2.1 Network-related.mp4 77.1 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/008. 1.7 Encryption.mp4 76.0 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/006. 3.5 Common techniques Part 3.mp4 63.7 MB
  • mp403 Malware and Incident Response/Lesson 5 PE File Identification/004. 5.3 Entry Points.mp4 62.4 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/004. 3.3 Common techniques Part 1.mp4 56.9 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/002. 1.1 Threat actors Part 1.mp4 53.5 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/004. 1.3 Operating system (OS) concepts.mp4 52.1 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/005. 3.4 Common techniques Part 2.mp4 51.1 MB
  • mp402 System and Privacy Data Protection/Lesson 4 Analyzing Logs and Impact Analysis/008. 4.7 Impact Analysis.mp4 51.0 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/007. 7.6 SOC and FPGA.mp4 50.5 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/006. 1.5 Network architecture.mp4 50.1 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/010. 7.9 Industrial Control Systems (ICS) and Process Automation.mp4 46.2 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/004. 7.3 Internet of Things (IoT) and Embedded Devices Part 2.mp4 45.3 MB
  • mp404 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/013. 4.12 Threat modeling.mp4 43.6 MB
【压缩文件】 SEC595 - Applied Data Science and AI Machine Learning for Cybersecurity Professionals
收录时间:2024-05-03 文档个数:7 文档大小:26.1 GB 最近下载:2025-05-16 人气:4260 磁力链接
  • 7zUSB 2021/595.7z 21.3 GB
  • mp4LIVE 2021/5. Day Five.mp4 1.2 GB
  • mp4LIVE 2021/1. Day One.mp4 1.1 GB
  • mp4LIVE 2021/2. Day Two.mp4 903.0 MB
  • mp4LIVE 2021/3. Day Three.mp4 858.8 MB
  • mp4LIVE 2021/4. Day Four.mp4 784.1 MB
  • pdfPDF 2021/SEC595-Applied-Data-Science-and-Machine-Learning-for-Cybersecurity-Professionals.pdf 61.3 MB
【文档书籍】 [ CoursePig.com ] Certificate in Cybersecurity Analysis (IIBA-CCA) - Getting Started
收录时间:2024-03-27 文档个数:13 文档大小:152.9 MB 最近下载:2025-05-16 人气:496 磁力链接
  • pdf~Get Your Files Here !/Exercise Files/02/defining-cybersecurity-for-business-professionals-slides.pdf 42.5 MB
  • mp4~Get Your Files Here !/03. Defining Cybersecurity in an Organization/04. Introduction to Cybersecurity Frameworks.mp4 20.2 MB
  • pdf~Get Your Files Here !/Exercise Files/03/defining-cybersecurity-in-an-organization-slides.pdf 18.1 MB
  • mp4~Get Your Files Here !/02. Defining Cybersecurity for Business Professionals/03. Cybersecurity Business Analysis and Building in Security.mp4 14.7 MB
  • mp4~Get Your Files Here !/04. Describing Key Enterprise Risk Concepts/08. How to Build Disaster Recovery and Business Continuity Plans.mp4 13.7 MB
  • mp4~Get Your Files Here !/02. Defining Cybersecurity for Business Professionals/02. Understanding the Business Value of Cybersecurity Today.mp4 10.5 MB
  • mp4~Get Your Files Here !/03. Defining Cybersecurity in an Organization/05. Identifying What an ISMS Is and the Critical Focus on Data Privacy.mp4 9.4 MB
  • mp4~Get Your Files Here !/04. Describing Key Enterprise Risk Concepts/07. Introduction to Cyber Risk Assessments.mp4 9.4 MB
  • pdf~Get Your Files Here !/Exercise Files/04/describing-key-enterprise-risk-concepts-slides.pdf 6.3 MB
  • mp4~Get Your Files Here !/01. Course Overview/01. Course Overview.mp4 4.0 MB
  • mp4~Get Your Files Here !/03. Defining Cybersecurity in an Organization/06. Defining Data Minimization Activities and Using Security Frameworks.mp4 3.9 MB
  • txt~Get Your Files Here !/Bonus Resources.txt 386 Bytes
  • urlGet Bonus Downloads Here.url 179 Bytes
【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity and Kali Linux - Hands-on course by TechLatest
收录时间:2023-12-29 文档个数:43 文档大小:2.6 GB 最近下载:2025-05-16 人气:6597 磁力链接
  • mp4~Get Your Files Here !/7. Module 7 - Wireless Fortification Pentesting Mastery/2. Web App Pentesting Practical.mp4 636.4 MB
  • mp4~Get Your Files Here !/10. Module 10 - Communicating Findings Reporting Mastery/2. Reporting Practical + Conclusion.mp4 283.4 MB
  • mp4~Get Your Files Here !/6. Module 6 - Crack the Code Password Mastery/2. Password Cracking Practical.mp4 265.1 MB
  • mp4~Get Your Files Here !/5. Module 5 - Hacking Mastery Strategic Exploitation/2. Exploitation Practical.mp4 222.1 MB
  • mp4~Get Your Files Here !/9. Module 9 - Human Manipulation Social Engineering/2. Social Engineering Practical.mp4 198.1 MB
  • mp4~Get Your Files Here !/8. Module 8 - Wireless Fortification Pentesting Mastery/2. Wireless Pentesting Practical.mp4 194.1 MB
  • mp4~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/3. Social Media Reconnaissance.mp4 142.0 MB
  • mp4~Get Your Files Here !/4. Module 4 - Infiltration Techniques Mastering Active Reconnaissance/2. Vulnerability Assessment.mp4 121.4 MB
  • mp4~Get Your Files Here !/5. Module 5 - Hacking Mastery Strategic Exploitation/1. Exploitation Introduction.mp4 84.3 MB
  • mp4~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/3. Microsoft Azure Guide..mp4 54.4 MB
  • mp4~Get Your Files Here !/6. Module 6 - Crack the Code Password Mastery/1. Password Cracking Introduction.mp4 48.2 MB
  • mp4~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/2. Google Cloud Platform(GCP) Guide..mp4 47.9 MB
  • mp4~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/1. Amazon Web Services(AWS) Guide..mp4 46.0 MB
  • mp4~Get Your Files Here !/4. Module 4 - Infiltration Techniques Mastering Active Reconnaissance/3. Scanning.mp4 44.9 MB
  • mp4~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/4. Unveiling the Secrets of OS Fingerprinting in Cybersecurity with Kali Linux.mp4 44.7 MB
  • mp4~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/5. Target Validation in Cybersecurity with Kali Linux.mp4 39.9 MB
  • mp4~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/1. Reconnaissance — First Phase of Hacking.mp4 30.0 MB
  • mp4~Get Your Files Here !/1. Module 1 - Course Introduction & Teaser/2. Course Introduction.mp4 28.4 MB
  • mp4~Get Your Files Here !/8. Module 8 - Wireless Fortification Pentesting Mastery/1. Wireless Pentesting Introduction.mp4 24.5 MB
  • mp4~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/6. Subdomain Discovery in Cybersecurity with Kali Linux.mp4 24.5 MB
【影视】 [ FreeCourseWeb.com ] ISO 27001 - 2022-Compliant Cybersecurity - The Annex A Controls
收录时间:2024-01-12 文档个数:97 文档大小:310.4 MB 最近下载:2025-05-16 人气:10551 磁力链接
  • mp4~Get Your Files Here !/13 - 12. Threat and Vulnerability Management and Secure Configuration/02 - Secure configuration (Controls 8.9, 8.19, and 8.24).mp4 14.2 MB
  • mp4~Get Your Files Here !/07 - 6. Information Security Event Management/01 - Information security incident management (Controls 5.24–5.28, and 6.8).mp4 13.3 MB
  • mp4~Get Your Files Here !/05 - 4. Identity and Access Management/01 - Access management (Controls 5.15–5.18).mp4 12.9 MB
  • mp4~Get Your Files Here !/04 - 3. Information Protection/02 - Deletion, masking, DLP, and test data (Controls 8.10–8.12, and 8.33).mp4 12.7 MB
  • mp4~Get Your Files Here !/08 - 7. Continuity/01 - Continuity (Controls 5.29, 5.30, and 8.13).mp4 12.4 MB
  • mp4~Get Your Files Here !/14 - 13. Application Security/01 - Secure development (Controls 8.25–8.28).mp4 12.4 MB
  • mp4~Get Your Files Here !/10 - 9. Human Resource Security/02 - During employment (Controls 6.3–6.6).mp4 12.3 MB
  • mp4~Get Your Files Here !/12 - 11. System and Network Security/01 - Network security management (Controls 8.20–8.23).mp4 12.1 MB
  • mp4~Get Your Files Here !/12 - 11. System and Network Security/02 - Protection of information systems (Controls 8.7, 8.18, 8.30, and 8.34).mp4 11.8 MB
  • mp4~Get Your Files Here !/14 - 13. Application Security/02 - Testing, separate environments, and change management (Controls 8.29, 8.31, and 8.32).mp4 11.7 MB
  • mp4~Get Your Files Here !/05 - 4. Identity and Access Management/02 - System and application access control (Controls 8.2–8.5).mp4 11.6 MB
  • mp4~Get Your Files Here !/02 - 1. Governance/03 - Contacts and project management (Controls 5.5, 5.6, and 5.8).mp4 11.0 MB
  • mp4~Get Your Files Here !/03 - 2. Asset Management/01 - Responsibility for information assets (Controls 5.9, 5.10, 6.7, and 8.1).mp4 10.8 MB
  • mp4~Get Your Files Here !/04 - 3. Information Protection/01 - Classification, labeling, and privacy (Controls 5.12, 5.13, and 5.34).mp4 10.8 MB
  • mp4~Get Your Files Here !/02 - 1. Governance/02 - Roles, responsibilities, and duties (Controls 5.2–5.4).mp4 10.4 MB
  • mp4~Get Your Files Here !/02 - 1. Governance/01 - Policies for information security (Control 5.1).mp4 10.1 MB
  • mp4~Get Your Files Here !/07 - 6. Information Security Event Management/02 - Logging and monitoring (Controls 8.15–8.17).mp4 9.9 MB
  • mp4~Get Your Files Here !/06 - 5. Supplier Relationships Security/01 - Supplier relationships security (Controls 5.19–5.21).mp4 9.6 MB
  • mp4~Get Your Files Here !/06 - 5. Supplier Relationships Security/02 - Managing supplier service delivery and cloud services security (Controls 5.22 and 5.23).mp4 9.6 MB
  • mp4~Get Your Files Here !/13 - 12. Threat and Vulnerability Management and Secure Configuration/01 - Threat and vulnerability management (Controls 5.7 and 8.8).mp4 9.5 MB
【影视】 [ CoursePig.com ] Linkedin - Microsoft Cybersecurity Architect Expert (SC-100) Cert Prep - 4 Design Strategy for Data and Applications
收录时间:2024-02-06 文档个数:24 文档大小:153.6 MB 最近下载:2025-05-16 人气:1320 磁力链接
  • mp4~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/02 - Design a strategy to identify and protect sensitive data.mp4 27.6 MB
  • mp4~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/03 - Specify a security strategy for applications and APIs.mp4 24.9 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Prepping for the SC-100 exam.mp4 22.5 MB
  • mp4~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/02 - Specify a security standard for onboarding a new application.mp4 18.4 MB
  • mp4~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/03 - Specify an encryption standard for data at rest and in motion.mp4 16.3 MB
  • mp4~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/01 - Specify priorities for mitigating threats to applications.mp4 14.2 MB
  • mp4~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/01 - Specify priorities for mitigating threats to data.mp4 13.9 MB
  • mp4~Get Your Files Here !/01 - Introduction/02 - What you should know.mp4 6.8 MB
  • mp4~Get Your Files Here !/04 - Conclusion/01 - Next steps.mp4 5.0 MB
  • mp4~Get Your Files Here !/01 - Introduction/03 - Lab setup.mp4 3.4 MB
  • pdf~Get Your Files Here !/Ex_Files_MSFT_Cybersecurity_Arch_Expert_SC_100_Cert_Prep_4/Exercise Files/Sign up for a free trial.pdf 338.4 kB
  • pdf~Get Your Files Here !/Ex_Files_MSFT_Cybersecurity_Arch_Expert_SC_100_Cert_Prep_4/Exercise Files/SC-100 Exam Study Guide Course 4.pdf 47.8 kB
  • srt~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/02 - Design a strategy to identify and protect sensitive data.srt 18.1 kB
  • srt~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/03 - Specify a security strategy for applications and APIs.srt 15.6 kB
  • srt~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/02 - Specify a security standard for onboarding a new application.srt 9.7 kB
  • srt~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/03 - Specify an encryption standard for data at rest and in motion.srt 9.2 kB
  • srt~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/01 - Specify priorities for mitigating threats to data.srt 9.0 kB
  • srt~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/01 - Specify priorities for mitigating threats to applications.srt 7.7 kB
  • srt~Get Your Files Here !/01 - Introduction/02 - What you should know.srt 3.4 kB
  • srt~Get Your Files Here !/04 - Conclusion/01 - Next steps.srt 2.6 kB
【其他】 Cybersecurity Program Development for Business The Essential Planning Guide.m4b
收录时间:2018-11-03 文档个数:1 文档大小:261.8 MB 最近下载:2025-05-16 人气:1529 磁力链接
  • m4bCybersecurity Program Development for Business The Essential Planning Guide.m4b 261.8 MB
【影视】 Demystifying Cybersecurity Fundamentals-Learning with Demos
收录时间:2023-12-18 文档个数:208 文档大小:3.6 GB 最近下载:2025-05-16 人气:8876 磁力链接
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/1. Introduction/1. Top 10 Cyber Attacks of 21st Century.mp4 106.2 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/5. Deep Dive into Various Algorithms/9. What is Deffie-Hellman Algorithm .mp4 100.7 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/5. Deep Dive into Various Algorithms/7. Understanding RSA Algorithm with Example.mp4 94.6 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/7. Networking Basics/15. How a Packet Travels from Source to Destination.mp4 88.0 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/5. Deep Dive into Various Algorithms/6. What is the RSA Algorithm .mp4 82.1 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/6. Public Key Infrastructure - PKI/2. What is PKI .mp4 76.1 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/7. Networking Basics/9. Understanding an IP address.mp4 69.7 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/3. Types of Hackers/5. Hacktivist.mp4 67.5 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/3. Types of Hackers/6. Script Kiddie.mp4 66.2 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/2. Types of Cyber Attacks/6. Demo A Dictionary Attack - Password Attack.mp4 62.2 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/5. Deep Dive into Various Algorithms/10. Understanding DH Algorithm with an Example.mp4 59.6 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/5. Deep Dive into Various Algorithms/2. What is Cipher Algorithm & Key.mp4 59.3 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/2. Types of Cyber Attacks/8. Demo MITM Attack using ARP Poisoning.mp4 54.4 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/1. Introduction/4. What is Cybersecurity .mp4 54.3 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/5. Deep Dive into Various Algorithms/12. What is Elliptic Curve Algorithm .mp4 53.6 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/4. Basics of Cryptography/11. DemoAsymmetric encryption using openssl.mp4 53.1 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/5. Deep Dive into Various Algorithms/8. What is DSA Algorithm .mp4 51.7 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/4. Basics of Cryptography/8. What is Asymmetric Encryption.mp4 50.9 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/3. Types of Hackers/3. Black Hat Hacker.mp4 50.7 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/2. Types of Cyber Attacks/4. Demo How attackers use Phishing Attack .mp4 50.5 MB
【压缩文件】 Humble Bundle - Cybersecurity (2023) by Packt
收录时间:2023-12-29 文档个数:31 文档大小:673.5 MB 最近下载:2025-05-16 人气:4320 磁力链接
  • zipsupplement/practical_hardware_pentesting_supplement.zip 98.3 MB
  • pdfcybersecurity_attack_and_defense_strategies.pdf 84.2 MB
  • pdfnetwork_protocols_for_security_professionals.pdf 66.6 MB
  • pdfultimate_kali_linux_book.pdf 53.0 MB
  • pdfmastering_kali_linux_for_advanced_penetration_testing.pdf 48.7 MB
  • pdfmastering_malware_analysis.pdf 41.1 MB
  • pdfpractical_threat_intelligence_and_data-driven_threat_hunting.pdf 34.0 MB
  • pdfmastering_defensive_security.pdf 31.9 MB
  • pdfmastering_windows_security_and_hardening.pdf 28.8 MB
  • pdflearn_wireshark.pdf 24.4 MB
  • pdfpurple_team_strategies.pdf 20.6 MB
  • pdfvulnerability_researcher_s_handbook.pdf 18.2 MB
  • pdfcybersecurity_career_masterplan.pdf 17.8 MB
  • pdfprivilege_escalation_techniques.pdf 15.7 MB
  • pdfmalware_analysis_techniques.pdf 15.4 MB
  • pdfcertified_ethical_hacker_ceh_v12312-50_exam_guide.pdf 15.1 MB
  • pdfmastering_palo_alto_networks.pdf 13.6 MB
  • pdfcomptia_security_plus_sy0-601_certification_guide.pdf 9.8 MB
  • pdfpractical_hardware_pentesting.pdf 8.4 MB
  • zipsupplement/malware_analysis_techniques_supplement.zip 5.8 MB
【影视】 [ CourseMega.com ] Udemy - Interview Skills - How To Interview For Cybersecurity Jobs
收录时间:2023-12-18 文档个数:25 文档大小:406.9 MB 最近下载:2025-05-16 人气:1389 磁力链接
  • mp4~Get Your Files Here !/5 - Unpacking Interview Bias Understanding Its Impact and How to Overcome It/5 - Unpacking Interview Bias Understanding Its Impact and How to Overcome It.mp4 154.0 MB
  • mp4~Get Your Files Here !/4 - Inside the Interviewers Mind Exploring Their Biggest Fears/4 - Inside the Interviewers Mind Exploring Their Biggest Fears.mp4 108.3 MB
  • mp4~Get Your Files Here !/6 - Mastering Behavioral Interview Questions Tips for Crafting Effective Responses/6 - Mastering Behavioral Interview Questions Tips for Crafting Effective Responses.mp4 55.8 MB
  • mp4~Get Your Files Here !/2 - Decoding the Mystery Behind a WorldFamous Question/2 - Decoding the Mystery Behind a WorldFamous Question.mp4 27.5 MB
  • mp4~Get Your Files Here !/3 - Mastering the Mental Game/3 - Mastering the Mental Game.mp4 26.3 MB
  • mp4~Get Your Files Here !/1 - Course Introduction/1 - Introduction to this course.mp4 15.0 MB
  • mp4~Get Your Files Here !/7 - Avoiding SelfSabotage Tips to Enhance Your Job Interview/7 - Avoiding SelfSabotage Tips to Enhance Your Job Interview.mp4 15.0 MB
  • pdf~Get Your Files Here !/1 - Course Introduction/1 - hackthecybersecurityinterview.pdf 3.7 MB
  • pdf~Get Your Files Here !/5 - Unpacking Interview Bias Understanding Its Impact and How to Overcome It/5 - 5-Interview-Bias-Transcript.pdf 346.1 kB
  • pdf~Get Your Files Here !/4 - Inside the Interviewers Mind Exploring Their Biggest Fears/4 - 4-Interviewer-Mind-Transcript.pdf 289.2 kB
  • pdf~Get Your Files Here !/6 - Mastering Behavioral Interview Questions Tips for Crafting Effective Responses/6 - 6-Behavioral-Interview-Questions-Transcript.pdf 174.9 kB
  • pdf~Get Your Files Here !/3 - Mastering the Mental Game/3 - 3-Mental-Game-Mastery-Transcript.pdf 128.8 kB
  • pdf~Get Your Files Here !/1 - Course Introduction/1 - Complete-List-of-Behavioral-Interview-Questions.pdf 127.3 kB
  • pdf~Get Your Files Here !/2 - Decoding the Mystery Behind a WorldFamous Question/2 - 2-Famous-Question-Transcript.pdf 75.2 kB
  • pdf~Get Your Files Here !/7 - Avoiding SelfSabotage Tips to Enhance Your Job Interview/7 - 7-Self-Sabotage-Transcript.pdf 54.5 kB
  • vtt~Get Your Files Here !/5 - Unpacking Interview Bias Understanding Its Impact and How to Overcome It/5 - Unpacking Interview Bias Understanding Its Impact and How to Overcome It English.vtt 49.3 kB
  • pdf~Get Your Files Here !/1 - Course Introduction/1 - 1-Introduction-Transcript.pdf 41.9 kB
  • vtt~Get Your Files Here !/4 - Inside the Interviewers Mind Exploring Their Biggest Fears/4 - Inside the Interviewers Mind Exploring Their Biggest Fears English.vtt 41.0 kB
  • vtt~Get Your Files Here !/6 - Mastering Behavioral Interview Questions Tips for Crafting Effective Responses/6 - Mastering Behavioral Interview Questions Tips for Crafting Effective Responses English.vtt 24.5 kB
  • vtt~Get Your Files Here !/3 - Mastering the Mental Game/3 - Mastering the Mental Game English.vtt 17.2 kB
共14页 上一页 1 2 3 4 5 6 7 下一页