磁力管家

磁力管家
为您索检到268条磁力链接,耗时1毫秒。 rss

分享给好友

【影视】 [ DevCourseWeb.com ] Udemy - Master ICS - OT Cybersecurity - Fundamental to Advanced-Part 2
收录时间:2023-12-20 文档个数:44 文档大小:3.2 GB 最近下载:2025-05-16 人气:1951 磁力链接
  • mp4~Get Your Files Here !/01 - Introduction/002 Filesystem.mp4 154.3 MB
  • mp4~Get Your Files Here !/03 - Network Architecture Design Considerations/005 Reference Architecture-2.mp4 127.4 MB
  • mp4~Get Your Files Here !/04 - OT Cybersecurity Management/003 Manufacturing Impact Levels.mp4 124.9 MB
  • mp4~Get Your Files Here !/02 - Cryptography -Lab/011 Cyberland Usecase-OpenSSL.mp4 123.1 MB
  • mp4~Get Your Files Here !/02 - Cryptography -Lab/004 Hashing.mp4 120.2 MB
  • mp4~Get Your Files Here !/02 - Cryptography -Lab/002 Symmetric.mp4 112.3 MB
  • mp4~Get Your Files Here !/03 - Network Architecture Design Considerations/004 Reference Architecture-1.mp4 110.3 MB
  • mp4~Get Your Files Here !/06 - Contingency & Continuity Planning/005 Disaster Recovery Plan.mp4 106.3 MB
  • mp4~Get Your Files Here !/04 - OT Cybersecurity Management/002 Industry Profiling.mp4 103.1 MB
  • mp4~Get Your Files Here !/01 - Introduction/001 Linux.mp4 100.8 MB
  • mp4~Get Your Files Here !/02 - Cryptography -Lab/010 Binwalk Firmware Analysis.mp4 99.1 MB
  • mp4~Get Your Files Here !/02 - Cryptography -Lab/006 Cyberchef-1-Basic.mp4 98.9 MB
  • mp4~Get Your Files Here !/06 - Contingency & Continuity Planning/001 Types of Plan.mp4 94.8 MB
  • mp4~Get Your Files Here !/04 - OT Cybersecurity Management/004 Cybersecurity Framework.mp4 94.8 MB
  • mp4~Get Your Files Here !/02 - Cryptography -Lab/001 Cryptography.mp4 92.1 MB
  • mp4~Get Your Files Here !/03 - Network Architecture Design Considerations/006 Reference Architecture-3.mp4 89.4 MB
  • mp4~Get Your Files Here !/01 - Introduction/003 Filesystem Lab.mp4 86.1 MB
  • mp4~Get Your Files Here !/01 - Introduction/007 Linux File Ownership Lab-4.mp4 84.3 MB
  • mp4~Get Your Files Here !/03 - Network Architecture Design Considerations/001 Functional Difference.mp4 82.0 MB
  • mp4~Get Your Files Here !/04 - OT Cybersecurity Management/001 NIST Cybersecurity Program.mp4 81.7 MB
【影视】 [CourserHub.com] Coursera - Google Cybersecurity Professional Certificate
收录时间:2023-12-26 文档个数:1330 文档大小:4.1 GB 最近下载:2025-05-16 人气:11177 磁力链接
  • mp4foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/01_get-started-with-the-certificate-program/01_welcome-to-the-google-cybersecurity-certificate.mp4 49.6 MB
  • mp4assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/01_flaws-in-the-system/04_common-vulnerabilities-and-exposures.mp4 29.2 MB
  • mp4foundations-of-cybersecurity/02_the-evolution-of-cybersecurity/01_the-history-of-cybersecurity/03_attacks-in-the-digital-age.mp4 26.8 MB
  • mp4assets-threats-and-vulnerabilities/02_protect-organizational-assets/03_authentication-authorization-and-accounting/03_the-mechanisms-of-authorization.mp4 26.4 MB
  • mp4assets-threats-and-vulnerabilities/04_threats-to-asset-security/02_malware/01_malicious-software.mp4 25.7 MB
  • mp4manage-security-risks/04_use-playbooks-to-respond-to-incidents/01_phases-of-incident-response-playbooks/02_phases-of-an-incident-response-playbook.mp4 25.5 MB
  • mp4assets-threats-and-vulnerabilities/04_threats-to-asset-security/01_social-engineering/04_phishing-for-information.mp4 25.2 MB
  • mp4assets-threats-and-vulnerabilities/04_threats-to-asset-security/02_malware/03_the-rise-of-cryptojacking.mp4 24.8 MB
  • mp4foundations-of-cybersecurity/03_protect-against-threats-risks-and-vulnerabilities/01_frameworks-and-controls/02_introduction-to-security-frameworks-and-controls.mp4 24.5 MB
  • mp4foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/02_introduction-to-cybersecurity/01_introduction-to-cybersecurity.mp4 24.2 MB
  • mp4automate-cybersecurity-tasks-with-python/04_python-in-practice/03_debug-python-code/01_debugging-strategies.mp4 24.2 MB
  • mp4assets-threats-and-vulnerabilities/02_protect-organizational-assets/02_encryption-methods/01_fundamentals-of-cryptography.mp4 23.7 MB
  • mp4assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/03_cyber-attacker-mindset/01_protect-all-entry-points.mp4 23.6 MB
  • mp4foundations-of-cybersecurity/03_protect-against-threats-risks-and-vulnerabilities/02_ethics-in-cybersecurity/01_ethics-in-cybersecurity.mp4 23.6 MB
  • mp4assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/03_cyber-attacker-mindset/05_pathways-through-defenses.mp4 23.5 MB
  • mp4foundations-of-cybersecurity/02_the-evolution-of-cybersecurity/01_the-history-of-cybersecurity/02_past-cybersecurity-attacks.mp4 23.1 MB
  • mp4assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/01_flaws-in-the-system/02_vulnerability-management.mp4 23.0 MB
  • mp4networks-and-network-security/04_security-hardening/04_cloud-hardening/02_kelsey-cloud-security-explained.mp4 23.0 MB
  • mp4automate-cybersecurity-tasks-with-python/03_work-with-strings-and-lists/03_regular-expressions/01_regular-expressions-in-python.mp4 22.9 MB
  • mp4assets-threats-and-vulnerabilities/04_threats-to-asset-security/01_social-engineering/02_the-criminal-art-of-persuasion.mp4 22.7 MB
【压缩文件】 A Hacker's Guide to Internet Safety and Cybersecurity
收录时间:2018-07-25 文档个数:4 文档大小:2.5 GB 最近下载:2025-05-16 人气:2853 磁力链接
  • txtTutsGalaxy.com.txt 41 Bytes
  • txtTorrent_downloaded_from_Demonoid_-_www.demonoid.pw_.txt 59 Bytes
  • txtRead Me.txt 80 Bytes
  • zipA Hacker's Guide to Internet Safety and Cybersecurity.zip 2.5 GB
【影视】 [ FreeCourseWeb.com ] Udemy - Cybersecurity For Beginners - Network Attacks
收录时间:2022-01-18 文档个数:44 文档大小:901.0 MB 最近下载:2025-05-16 人气:792 磁力链接
  • mp4~Get Your Files Here !/7. Lab Demonstration - Scanning Networks with NMAP Pt. 1/1. Lab Demonstration - Scanning Networks with NMAP Pt. 1.mp4 477.1 MB
  • mp4~Get Your Files Here !/8. Lab Demonstration - Scanning Networks with NMAP Pt. 2/1. Lab Demonstration - Scanning Networks with NMAP Pt. 2.mp4 331.8 MB
  • mp4~Get Your Files Here !/1. Denial-of-Service Attack (DoS) Attack/2. The 5 Principal Differences Between DoS & DDoS Attacks.mp4 14.1 MB
  • mp4~Get Your Files Here !/1. Denial-of-Service Attack (DoS) Attack/6. Common DoS Attack Pt. 2.mp4 9.8 MB
  • mp4~Get Your Files Here !/1. Denial-of-Service Attack (DoS) Attack/5. Common DoS Attack Pt. 1.mp4 6.9 MB
  • mp4~Get Your Files Here !/4. DNS Attacks/1. DNS Attacks.mp4 6.4 MB
  • mp4~Get Your Files Here !/1. Denial-of-Service Attack (DoS) Attack/1. DoS Vs. DDoS.mp4 6.0 MB
  • mp4~Get Your Files Here !/5. Footprinting/3. Footprinting Helps To.mp4 5.4 MB
  • mp4~Get Your Files Here !/5. Footprinting/4. Footprinting Methodology.mp4 5.4 MB
  • mp4~Get Your Files Here !/1. Denial-of-Service Attack (DoS) Attack/7. Three-Way-Handshake Importance To Network Attacks (SYN Flood).mp4 5.2 MB
  • mp4~Get Your Files Here !/1. Denial-of-Service Attack (DoS) Attack/4. Botnets, Controllers, and Bot Herders.mp4 4.1 MB
  • mp4~Get Your Files Here !/5. Footprinting/1. What is Footprinting.mp4 3.8 MB
  • mp4~Get Your Files Here !/6. What is Sniffing/1. What is Sniffing.mp4 3.3 MB
  • mp4~Get Your Files Here !/6. What is Sniffing/2. Passive & Active Sniffing.mp4 3.3 MB
  • mp4~Get Your Files Here !/4. DNS Attacks/2. Homograph Attack.mp4 3.2 MB
  • mp4~Get Your Files Here !/4. DNS Attacks/3. Hyperlink Spoofing.mp4 3.1 MB
  • mp4~Get Your Files Here !/2. Eavesdropping/1. Eavesdropping.mp4 3.0 MB
  • mp4~Get Your Files Here !/5. Footprinting/2. What Types of Information to Look For.mp4 2.8 MB
  • mp4~Get Your Files Here !/1. Denial-of-Service Attack (DoS) Attack/3. DoS & DDoS Countermeasures.mp4 2.6 MB
  • mp4~Get Your Files Here !/3. Impersonation/2. Impersonation Pt. 2.mp4 2.5 MB
【影视】 [ DevCourseWeb.com ] Udemy - Modern Cybersecurity Fundamentals
收录时间:2023-12-17 文档个数:27 文档大小:2.3 GB 最近下载:2025-05-16 人气:2342 磁力链接
  • mp4~Get Your Files Here !/2. History of Cybersecurity/1. History of Cybersecurity.mp4 478.1 MB
  • mp4~Get Your Files Here !/3. Cybersecurity Risk Management/1. Cybersecurity Risk Management.mp4 265.3 MB
  • mp4~Get Your Files Here !/13. The Future of Cybersecurity/1. The Future of Cybersecurity.mp4 186.8 MB
  • mp4~Get Your Files Here !/7. Understanding Networks Part 3/1. Understanding Networks Part 3.mp4 176.6 MB
  • mp4~Get Your Files Here !/11. Ransomware/1. Ransomware.mp4 159.6 MB
  • mp4~Get Your Files Here !/8. Understanding Networks Part 4/1. Understanding Networks Part 4.mp4 158.3 MB
  • mp4~Get Your Files Here !/12. Internet of Things (IoT)/1. Internet of Things (IoT).mp4 154.5 MB
  • mp4~Get Your Files Here !/9. Domain Name System (DNS)/1. Domain Name System (DNS).mp4 145.9 MB
  • mp4~Get Your Files Here !/5. Understanding Networks Part 1/1. Understanding Networks Part 1.mp4 137.5 MB
  • mp4~Get Your Files Here !/4. Intrusion Detection/1. Intrusion Detection.mp4 136.3 MB
  • mp4~Get Your Files Here !/6. Understanding Networks Part 2/1. Understanding Networks Part 2.mp4 126.6 MB
  • mp4~Get Your Files Here !/10. Dynamic Host Configuration Protocol (DHCP)/1. Dynamic Host Configuration Protocol (DHCP).mp4 112.7 MB
  • mp4~Get Your Files Here !/1. Introduction/1. Introduction.mp4 28.1 MB
  • pdf~Get Your Files Here !/5. Understanding Networks Part 1/1.1 Understanding-Networks.pdf 3.5 MB
  • pdf~Get Your Files Here !/6. Understanding Networks Part 2/1.1 Understanding-Networks.pdf 3.5 MB
  • pdf~Get Your Files Here !/7. Understanding Networks Part 3/1.1 Understanding-Networks.pdf 3.5 MB
  • pdf~Get Your Files Here !/8. Understanding Networks Part 4/1.1 Understanding-Networks.pdf 3.5 MB
  • pdf~Get Your Files Here !/3. Cybersecurity Risk Management/1.1 Cybersecurity-Risk-Management.pdf 1.8 MB
  • pdf~Get Your Files Here !/12. Internet of Things (IoT)/1.1 IoT.pdf 1.8 MB
  • pdf~Get Your Files Here !/2. History of Cybersecurity/1.1 HISTORY-OF-CYBERSECURITY.pdf 1.7 MB
【其他】 Rick Howard - Cybersecurity First Principles- A Reboot of Strategy and Tactics
收录时间:2024-01-06 文档个数:3 文档大小:286.0 MB 最近下载:2025-05-16 人气:9883 磁力链接
  • m4bCybersecurity First Principles.m4b 277.0 MB
  • pdfRick Howard - Cybersecurity First Principles- A Reboot of Strategy and Tactics.pdf 9.0 MB
  • jpgCybersecurity First Principles.jpg 24.9 kB
【影视】 Cybersecurity Architecture Fundamentals
收录时间:2023-12-26 文档个数:81 文档大小:2.4 GB 最近下载:2025-05-16 人气:6891 磁力链接
  • mp4Chapter 1 Introduction/006. Security Principles and Approaches.mp4 272.7 MB
  • mp4Chapter 1 Introduction/003. The Problem with Security Today.mp4 236.8 MB
  • mp4Chapter 1 Introduction/009. Understanding Residual Risk.mp4 120.0 MB
  • mp4Chapter 4 Cyber Architecture for Enterprise Security/006. Vulnerability, Patch, and Availability Management.mp4 102.8 MB
  • mp4Chapter 1 Introduction/008. Risk Management.mp4 99.6 MB
  • mp4Chapter 1 Introduction/005. Who Is a Security Architect.mp4 98.0 MB
  • mp4Chapter 2 Threat Modelling/006. PASTA.mp4 94.3 MB
  • mp4Chapter 4 Cyber Architecture for Enterprise Security/001. Network Security.mp4 80.3 MB
  • mp4Chapter 6 Case Study/001. Case Study Preview.mp4 78.0 MB
  • mp4Chapter 2 Threat Modelling/002. Threat Modelling Versus Risk Assessment.mp4 75.6 MB
  • mp4Chapter 2 Threat Modelling/001. Threat Modelling - Part 1.mp4 70.2 MB
  • mp4Chapter 2 Threat Modelling/009. Attack Trees.mp4 68.7 MB
  • mp4Chapter 4 Cyber Architecture for Enterprise Security/005. Data Protection.mp4 56.7 MB
  • mp4Chapter 5 Designing for Security/003. Reference Security Architectures.mp4 52.0 MB
  • mp4Chapter 2 Threat Modelling/003. Threat Modelling - Part 2.mp4 50.8 MB
  • mp4Chapter 3 Enterprise Architecture Frameworks/003. Zachman Framework.mp4 44.9 MB
  • mp4Chapter 5 Designing for Security/002. Security Design Pattern Example.mp4 44.6 MB
  • mp4Chapter 1 Introduction/004. Introduction to Security Architecture.mp4 42.6 MB
  • mp4Chapter 5 Designing for Security/001. Security Design Patterns.mp4 41.8 MB
  • mp4Chapter 3 Enterprise Architecture Frameworks/004. SABSA Framework.mp4 37.0 MB
【影视】 [ FreeCourseWeb.com ] EC-Council - Introduction to Cybersecurity
收录时间:2024-01-16 文档个数:49 文档大小:1.2 GB 最近下载:2025-05-16 人气:1606 磁力链接
  • mp4~Get Your Files Here !/38 - Know Your Options for Data Encryption.mp4 63.3 MB
  • mp4~Get Your Files Here !/35 - Looking at an Application Designed to Help Secure Your Phone.mp4 39.8 MB
  • mp4~Get Your Files Here !/9 - Using a Password Manager.mp4 39.7 MB
  • mp4~Get Your Files Here !/40 - Checking if Your Cloud Server is Leaking Data.mp4 39.5 MB
  • mp4~Get Your Files Here !/23 - Understanding How Computers Can Become Infected.mp4 38.9 MB
  • mp4~Get Your Files Here !/26 - Being Careful of What You Post.mp4 36.8 MB
  • mp4~Get Your Files Here !/19 - Looking at Fake Error Messages (Scareware).mp4 35.8 MB
  • mp4~Get Your Files Here !/14 - USB Safety with Examples.mp4 34.9 MB
  • mp4~Get Your Files Here !/20 - Exploring Useful Browser Plugins.mp4 34.2 MB
  • mp4~Get Your Files Here !/41 - Getting to Know Everything about VPN.mp4 34.0 MB
  • mp4~Get Your Files Here !/8 - Exploring What Makes a Good Password.mp4 34.0 MB
  • mp4~Get Your Files Here !/25 - What to Do If You Are Infected with Cryptoware.mp4 34.0 MB
  • mp4~Get Your Files Here !/42 - Changing Your DNS Connection to Avoid ISP Snooping.mp4 33.5 MB
  • mp4~Get Your Files Here !/32 - Understanding Best Practices for Unusual E-mails.mp4 31.1 MB
  • mp4~Get Your Files Here !/31 - Learning How to Identify and Find Phishing E-mails.mp4 30.9 MB
  • mp4~Get Your Files Here !/44 - Learning How to Use TorGhost.mp4 30.3 MB
  • mp4~Get Your Files Here !/18 - Downloading Precautions and Hash Checking.mp4 30.3 MB
  • mp4~Get Your Files Here !/24 - Learning Best Practices for Antivirus Software and Malware Scanners.mp4 27.8 MB
  • mp4~Get Your Files Here !/37 - Additional Settings.mp4 27.6 MB
  • mp4~Get Your Files Here !/47 - Understanding Backup Methods.mp4 26.3 MB
【影视】 TTC - Thinking about Cybersecurity
收录时间:2017-02-10 文档个数:19 文档大小:8.5 GB 最近下载:2025-05-16 人气:5665 磁力链接
  • wmvTGC_9523_Lect18_Cybersecurity.wmv 509.4 MB
  • wmvTGC_9523_Lect01_Cybersecurity.wmv 509.0 MB
  • wmvTGC_9523_Lect13_Cybersecurity.wmv 508.9 MB
  • wmvTGC_9523_Lect17_Cybersecurity.wmv 494.7 MB
  • wmvTGC_9523_Lect08_Cybersecurity.wmv 493.5 MB
  • wmvTGC_9523_Lect14_Cybersecurity.wmv 486.8 MB
  • wmvTGC_9523_Lect10_Cybersecurity.wmv 486.1 MB
  • wmvTGC_9523_Lect04_Cybersecurity.wmv 480.1 MB
  • wmvTGC_9523_Lect15_Cybersecurity.wmv 474.7 MB
  • wmvTGC_9523_Lect09_Cybersecurity.wmv 473.9 MB
  • wmvTGC_9523_Lect05_Cybersecurity.wmv 472.8 MB
  • wmvTGC_9523_Lect07_Cybersecurity.wmv 470.4 MB
  • wmvTGC_9523_Lect06_Cybersecurity.wmv 467.2 MB
  • wmvTGC_9523_Lect16_Cybersecurity.wmv 460.0 MB
  • wmvTGC_9523_Lect11_Cybersecurity.wmv 453.2 MB
  • wmvTGC_9523_Lect12_Cybersecurity.wmv 449.4 MB
  • wmvTGC_9523_Lect03_Cybersecurity.wmv 438.7 MB
  • wmvTGC_9523_Lect02_Cybersecurity.wmv 378.9 MB
  • PDFDG9523_98F12.PDF 4.7 MB
【其他】 Cybersecurity and Cyberwar.m4b
收录时间:2023-12-23 文档个数:1 文档大小:328.4 MB 最近下载:2025-05-16 人气:4874 磁力链接
  • m4bCybersecurity and Cyberwar.m4b 328.4 MB
【其他】 Yuri Diogenes, Erdal Ozkaya - Cybersecurity - Attack and Defense Strategies, Second Edition - 2019
收录时间:2023-12-20 文档个数:3 文档大小:249.3 MB 最近下载:2025-05-16 人气:4537 磁力链接
  • mobiYuri Diogenes, Erdal Ozkaya - Cybersecurity - Attack and Defense Strategies, Second Edition - 2019.mobi 141.5 MB
  • epubYuri Diogenes, Erdal Ozkaya - Cybersecurity - Attack and Defense Strategies, Second Edition - 2019.epub 72.4 MB
  • pdfYuri Diogenes, Erdal Ozkaya - Cybersecurity - Attack and Defense Strategies, Second Edition - 2019.pdf 35.3 MB
【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity Freelancer - Become A Free Agent In 2025
收录时间:2025-02-24 文档个数:12 文档大小:1.6 GB 最近下载:2025-05-16 人气:1607 磁力链接
  • mp4~Get Your Files Here !/3 - Pricing Your Services Creating Your Service Package/4 - Pricing Your Cybsersecurity Consultancy Services.mp4 433.8 MB
  • mp4~Get Your Files Here !/2 - Becoming A Cybersecurity Enterpreneur Establishing Your Product Market Fit/3 - Establishing Your Product Market Fit.mp4 380.4 MB
  • mp4~Get Your Files Here !/3 - Pricing Your Services Creating Your Service Package/5 - Creating Your Service Package.mp4 365.0 MB
  • mp4~Get Your Files Here !/4 - Perfect Elevator Pitch Market Yourself To Sell Your Business/8 - Earn Your Expert Status To Sell.mp4 100.4 MB
  • mp4~Get Your Files Here !/6 - Course Conclusion/10 - Course Outro.mp4 86.7 MB
  • mp4~Get Your Files Here !/4 - Perfect Elevator Pitch Market Yourself To Sell Your Business/7 - The Difference Between Marketing Selling.mp4 75.1 MB
  • mp4~Get Your Files Here !/1 - Course Introduction/1 - Course Introduction.mp4 66.6 MB
  • mp4~Get Your Files Here !/4 - Perfect Elevator Pitch Market Yourself To Sell Your Business/6 - Perfect Your Elevator Pitch.mp4 42.1 MB
  • mp4~Get Your Files Here !/5 - Course Project/9 - Project Video.mp4 39.8 MB
  • mp4~Get Your Files Here !/2 - Becoming A Cybersecurity Enterpreneur Establishing Your Product Market Fit/2 - Becoming A Cybersecurity Entrepreneur.mp4 32.8 MB
  • urlGet Bonus Downloads Here.url 182 Bytes
  • txt~Get Your Files Here !/Bonus Resources.txt 70 Bytes
【文档书籍】 Mastering Cybersecurity
收录时间:2024-04-03 文档个数:1 文档大小:153.1 MB 最近下载:2025-05-16 人气:5050 磁力链接
  • pdfB0CZLYGXLN.pdf 153.1 MB
【影视】 [ DevCourseWeb.com ] CBTNuggets - (ISC)2 CC - Certified in Cybersecurity - (ISC)2 Certification Training
收录时间:2023-12-17 文档个数:68 文档大小:2.1 GB 最近下载:2025-05-16 人气:6852 磁力链接
  • mp4~Get Your Files Here !/1. Understanding Information Assurance/1. Understanding Information Assurance - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 69.9 MB
  • mp4~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/1. Power - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 65.3 MB
  • mp4~Get Your Files Here !/7. Discussing Network Security Infrastructure/1. Network Segmentation - (ISC)² CC – Certified in Cybersecurity CBT Nuggets-1.mp4 58.2 MB
  • mp4~Get Your Files Here !/8. Exploring Network Threats and Attacks/6. Firewalls - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 54.7 MB
  • mp4~Get Your Files Here !/8. Exploring Network Threats and Attacks/3. Intrusion Detection Prevention Systems (IDSIPS) - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 54.0 MB
  • mp4~Get Your Files Here !/5. Exploring Security Policies and Training/7. Security Awareness Training - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 52.0 MB
  • mp4~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/3. Heating, Ventilation and Air Conditioning (HVAC) - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 48.1 MB
  • mp4~Get Your Files Here !/9. Understanding Computer Networking/4. IP Addresses - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 47.5 MB
  • mp4~Get Your Files Here !/6. Understanding Data Security and System Hardening/2. Types of Encryption - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 46.4 MB
  • mp4~Get Your Files Here !/7. Discussing Network Security Infrastructure/7. The Cloud - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 45.7 MB
  • mp4~Get Your Files Here !/8. Exploring Network Threats and Attacks/5. Vulnerability Scanning - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 45.5 MB
  • mp4~Get Your Files Here !/9. Understanding Computer Networking/3. TCPIP Model - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 42.9 MB
  • mp4~Get Your Files Here !/6. Understanding Data Security and System Hardening/7. Configuration Management - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 41.6 MB
  • mp4~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/2. Data Centers and Closets - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 40.4 MB
  • mp4~Get Your Files Here !/1. Understanding Information Assurance/2. Methods of Authentication - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 40.0 MB
  • mp4~Get Your Files Here !/2. Discussing Risk Management, Controls, Ethics and Governance/4. Security Control Categories - (ISC)² CC – Certified in Cybersecurity CBT Nuggets-1.mp4 39.3 MB
  • mp4~Get Your Files Here !/6. Understanding Data Security and System Hardening/3. Data Hashing with Encryption - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 38.3 MB
  • mp4~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/5. Redundancy - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 38.2 MB
  • mp4~Get Your Files Here !/3. Exploring BC, DR & IR Concepts/6. Incident Response - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 37.9 MB
  • mp4~Get Your Files Here !/4. Reviewing Access Control Concepts/6. Types of Access Control - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 36.8 MB
【影视】 Palo Alto Networks Cybersecurity Fundamentals (PCCSA)
收录时间:2022-02-19 文档个数:54 文档大小:4.5 GB 最近下载:2025-05-16 人气:8248 磁力链接
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/2. Identify Computing and Networking Trends.mp4 269.3 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/12. Identify Networking Security Technologies.mp4 267.8 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/3. Describe Cybersecurity Threats.mp4 243.2 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/5. Identify Wi-Fi Vulnerabilities and Attacks.mp4 231.3 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/10. Review Network Addressing.mp4 228.2 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/4. Describe Common Cyberattack Techniques.mp4 217.8 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/17. Endpoint Security.mp4 206.1 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/7. Identify Basic Internet and Network Operations.mp4 204.7 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/8. Describe Routing Protocols.mp4 196.9 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/15. Learn Basic Virtualization Security Concepts.mp4 190.8 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/9. Review Networking Models.mp4 190.3 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/18. Server and System Administration.mp4 186.8 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/26. Describe Cortex XSOAR and AutoFocus.mp4 177.9 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/16. Learn Basic DevOps Security Concepts.mp4 176.4 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/14. Learn Basic Cloud Security Concepts.mp4 169.8 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/11. Learn Networking Security Models.mp4 169.5 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/20. Identify Palo Alto Networks Security Solutions.mp4 168.8 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/21. Describe Basic NGFW Components and Functions.mp4 146.3 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/13. Learn Basic Data Center Security Concepts.mp4 134.9 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/22. Learn Basic Prisma Cloud.mp4 134.6 MB
【文档书籍】 cybersecurity-essentials.pdf
收录时间:2022-01-11 文档个数:1 文档大小:99.7 MB 最近下载:2025-05-16 人气:1294 磁力链接
  • pdfcybersecurity-essentials.pdf 99.7 MB
【影视】 [ FreeCourseWeb.com ] Udemy - Master Cybersecurity,Ethical Hacking and Penetrating Testing
收录时间:2022-03-15 文档个数:50 文档大小:1.6 GB 最近下载:2025-05-16 人气:2202 磁力链接
  • mp4~Get Your Files Here !/04 Exposing Hackers - Know Your Enemy/002 Why You Need Security _.mp4 189.8 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/011 Setting up Labs.mp4 169.5 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/003 What is Privacy, Anonymity and Pseudonymity _.mp4 158.8 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/006 Threat Modelling And Risk Assessment.mp4 158.3 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/008 Confidentiality, Integrity and Availability - (Security Attributes).mp4 141.8 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/004 Security, Vulnerabilities, Threats and Adversaries.mp4 117.8 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/005 Asset Selection.mp4 94.5 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/002 Protect What You Value.mp4 93.7 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/010 Zero Trust Model.mp4 85.7 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/007 Security,Anonymity and Privacy.mp4 59.8 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/001 What is Cybersecurity _.mp4 34.8 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/009 Defence in Depth.mp4 34.2 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/008 Who Conduct it _.mp4 26.4 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/002 What is Ethical Hacking _.mp4 25.8 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/005 Purpose of Studying Ethical Hacking and Penetrating Testing.mp4 24.3 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/010 Closure.mp4 23.6 MB
  • mp4~Get Your Files Here !/04 Exposing Hackers - Know Your Enemy/001 Goals and Learning Objectives - Know Your Enemy.mp4 21.8 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/009 Who should You Choose _.mp4 20.6 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/001 Goals and Learning Objectives.mp4 19.7 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/006 Scope For Ethical Hackers and Penetrating Testers.mp4 18.5 MB
【影视】 The Complete Certified in Cybersecurity course (CC) - 2022
收录时间:2024-01-07 文档个数:293 文档大小:6.7 GB 最近下载:2025-05-16 人气:902 磁力链接
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/7. The study process, material, tips, tricks and practice tests!/1. How to approach practice questions.mp4 124.3 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/6. Domain 5 Security Operations/16. Administrative (Directive) Controls.mp4 122.3 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/5. Domain 4 Network Security/5. The OSI Model - Part 1.mp4 108.0 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/7. The study process, material, tips, tricks and practice tests!/4. How to design your career and certification path..mp4 97.4 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/4. Domain 3 Access Controls Concepts/12. Logical Access Control - Part 5.mp4 89.7 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/5. Domain 4 Network Security/44. Virtualization, Cloud, and Distributed Computing - Part 5.mp4 87.1 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/5. Domain 4 Network Security/24. VPNs, NAC, and third-party connectivity.mp4 86.7 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/5. Domain 4 Network Security/43. Virtualization, Cloud, and Distributed Computing - Part 4.mp4 81.3 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/5. Domain 4 Network Security/10. IP addresses, port numbers, and MAC addresses - Part 1.mp4 80.0 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/6. Domain 5 Security Operations/19. Social Engineering attacks - Part 2.mp4 79.6 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/3. Domain 2 Business Continuity, Disaster Recovery, and Incident Response/6. DRP - Disaster Recovery Planning - Part 1.mp4 79.4 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/5. Domain 4 Network Security/2. Network Basics and Definitions - Part 1.mp4 79.0 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/3. Domain 2 Business Continuity, Disaster Recovery, and Incident Response/9. DRP - Disaster Recovery Planning - Part 4.mp4 78.9 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/4. Domain 3 Access Controls Concepts/10. Logical Access Control - Part 3.mp4 78.1 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/2. CC Domain 1 Security Principles/28. Laws and regulations - part 1.mp4 77.6 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/6. Domain 5 Security Operations/13. Data handling, data storage and data retention - Part 2.mp4 77.4 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/4. Domain 3 Access Controls Concepts/2. Physical Security - part 1.mp4 75.4 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/2. CC Domain 1 Security Principles/30. Security governance principles.mp4 75.0 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/5. Domain 4 Network Security/48. Electricity.mp4 74.7 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/5. Domain 4 Network Security/28. Attacks and attackers - Part 2.mp4 73.6 MB
【影视】 Pluralsight - Cybersecurity Threats: Ransomware
收录时间:2017-06-08 文档个数:37 文档大小:388.1 MB 最近下载:2025-05-16 人气:2825 磁力链接
  • mp43. Ransomware Entry Points/15. Embedded Hyperlinks, Websites_downloads, and Drive-by Infections.mp4 6.2 MB
  • mp43. Ransomware Entry Points/16. Why Common Exploit Kits Are Used.mp4 5.4 MB
  • mp43. Ransomware Entry Points/14. Phishing and Email Attachments.mp4 10.6 MB
  • mp43. Ransomware Entry Points/18. Summary.mp4 2.8 MB
  • mp43. Ransomware Entry Points/12. Overview.mp4 2.7 MB
  • mp43. Ransomware Entry Points/13. The 5 Classic Infection Vectors.mp4 3.1 MB
  • mp43. Ransomware Entry Points/17. Command and Callback (C&C) and Indicators of Compromise.mp4 7.0 MB
  • mp44. Incident Response - Detection and Containment/21. Detecting an Attack.mp4 7.3 MB
  • mp44. Incident Response - Detection and Containment/20. Indicators of Compromise.mp4 5.3 MB
  • mp44. Incident Response - Detection and Containment/23. Summary.mp4 1.7 MB
  • mp44. Incident Response - Detection and Containment/19. Overview.mp4 2.6 MB
  • mp44. Incident Response - Detection and Containment/22. Containing the Attack.mp4 9.0 MB
  • mp46. Countermeasures and Preparing Your Incident Response/35. Next Generation Anti-virus_Anti-malware.mp4 5.6 MB
  • mp46. Countermeasures and Preparing Your Incident Response/37. Summary.mp4 5.5 MB
  • mp46. Countermeasures and Preparing Your Incident Response/33. Defending a Ransomware Attack.mp4 11.4 MB
  • mp46. Countermeasures and Preparing Your Incident Response/34. Protecting a Windows Network.mp4 8.0 MB
  • mp46. Countermeasures and Preparing Your Incident Response/32. Overview.mp4 5.5 MB
  • mp46. Countermeasures and Preparing Your Incident Response/36. Lessons Learned and Your Incident Response Plan.mp4 10.9 MB
  • mp42. What Is Ransomware/06. How Big Is the Problem.mp4 15.1 MB
  • mp42. What Is Ransomware/02. Overview.mp4 4.1 MB
【影视】 The Complete Cybersecurity Bootcamp, 2nd Edition
收录时间:2023-12-17 文档个数:674 文档大小:6.7 GB 最近下载:2025-05-16 人气:11266 磁力链接
  • mp4Module 5 Mobile Device Security/Lesson 29 Hacking Mobile Platforms/003. 29.2 Hacking iOS.mp4 86.6 MB
  • mp4Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/014. 17.13 Performing SMTP and DNS Enumeration.mp4 80.0 MB
  • mp4Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 21 Fundamentals of Wireless Hacking/004. 21.3 Exploring Wireless Threats.mp4 79.0 MB
  • mp4Module 6 Internet of Things (IoT) Security/Lesson 33 Fundamentals of IoT Security/003. 33.2 Understanding IoT Attacks.mp4 76.8 MB
  • mp4Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/015. 17.14 Conducting Additional Enumeration Techniques.mp4 75.8 MB
  • mp4Module 6 Internet of Things (IoT) Security/Lesson 33 Fundamentals of IoT Security/002. 33.1 Introducing IoT Concepts.mp4 74.4 MB
  • mp4Module 5 Mobile Device Security/Lesson 29 Hacking Mobile Platforms/002. 29.1 Understanding Mobile Platform Attack Vectors.mp4 73.4 MB
  • mp4Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/011. 17.1 Performing SNMP Enumeration.mp4 71.8 MB
  • mp4Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/004. 17.3 Understanding Host Discovery.mp4 69.7 MB
  • mp4Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 5 Fundamentals of Incident Response/007. 5.6 Analyzing Computer Incident Response Teams (CSIRTs).mp4 68.5 MB
  • mp4Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/007. 17.6 Scanning Beyond IDS and Firewall.mp4 68.2 MB
  • mp4Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 27 Hacking User Credentials/006. 27.5 Cracking Passwords with John the Ripper.mp4 66.1 MB
  • mp4Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 7 Intrusion Event Categories/009. 7.8 Understanding the MITRE ATT&CK Framework.mp4 65.8 MB
  • mp4Module 5 Mobile Device Security/Lesson 29 Hacking Mobile Platforms/004. 29.3 Hacking Android OS.mp4 63.8 MB
  • mp4Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 20 SQL Injection/005. 20.4 Exploring SQL Injection Tools.mp4 63.3 MB
  • mp4Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 21 Fundamentals of Wireless Hacking/003. 21.2 Understanding Wireless Encryption.mp4 62.7 MB
  • mp4Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/013. 17.12 Performing NTP and NFS Enumeration.mp4 61.8 MB
  • mp4Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 16 Information Gathering and Passive Reconnaissance/011. 16.10 Performing Footprinting through Social Engineering.mp4 59.1 MB
  • mp4Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 8 Digital Forensics Fundamentals/004. 8.3 Understanding Evidence Collection.mp4 57.2 MB
  • mp4Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 21 Fundamentals of Wireless Hacking/007. 21.6 Hacking Bluetooth.mp4 52.3 MB
共14页 上一页 1 2 3 4 5 6 7 8 下一页