为您索检到268条磁力链接,耗时0毫秒。
- 【影视】 [ DevCourseWeb.com ] Udemy - ChatGPT, ML, and AI for Cybersecurity, SOCs and Business
-
收录时间:2024-04-07
文档个数:14
文档大小:3.7 GB
最近下载:2025-05-16
人气:2616
磁力链接
~Get Your Files Here !/3. AI Tools for Security.mp4 683.8 MB
~Get Your Files Here !/4. Enhancing Search Capabilities with GPT4all Plugins.mp4 576.0 MB
~Get Your Files Here !/2. Fundamentals of ChatGPT and GPT4all.mp4 553.4 MB
~Get Your Files Here !/1. Introduction to Machine Learning and AI for Security.mp4 520.6 MB
~Get Your Files Here !/8. Future Trends and Challenges in AI Security.mp4 452.9 MB
~Get Your Files Here !/6. Evaluating AI Security.mp4 379.7 MB
~Get Your Files Here !/5. Securing AI Models and Data.mp4 280.8 MB
~Get Your Files Here !/7. Case Studies of Real-World AI Applications.mp4 279.0 MB
~Get Your Files Here !/Bonus Resources.txt 386 Bytes
Get Bonus Downloads Here.url 182 Bytes
~Get Your Files Here !/9. Final Exam.html 146 Bytes
~Get Your Files Here !/4.2 Github Plugins (primarily for ChatGPT and Python implementations thereof)..html 124 Bytes
~Get Your Files Here !/4.1 ChatGPT Plugins.html 100 Bytes
~Get Your Files Here !/4.3 GPT4All Website and Downloads.html 90 Bytes
猜你喜欢:
Business
AI
ML
Udemy
DevCourseWeb
Cybersecurity
SOCs
ChatGPT
com
- 【影视】 [FreeCoursesOnline.Me] ZeroToMastery - Complete Cybersecurity Bootcamp
-
收录时间:2023-12-20
文档个数:101
文档大小:3.6 GB
最近下载:2025-05-16
人气:7476
磁力链接
8-Network Security/052-Network Security With Nmap.mp4 169.9 MB
5-Security Bugs & Vulnerabilities/020-Buffer Overflow Demonstration.mp4 136.7 MB
12-Appendix - Ethical Hacking/087-Msfconsole Basic Commands.mp4 97.5 MB
8-Network Security/059-Wireless Attack Demonstration.mp4 93.4 MB
7-End-Point Protection/034-Password Security and Password Managers.mp4 84.2 MB
12-Appendix - Ethical Hacking/093-Meterpreter Basic Commands Part 1.mp4 78.5 MB
7-End-Point Protection/038-Process Explorer.mp4 75.8 MB
1-Introduction/001-Cybersecurity Bootcamp - Zero to Mastery.mp4 72.4 MB
8-Network Security/057-Secure Network Architecture.mp4 66.8 MB
12-Appendix - Ethical Hacking/094-Meterpreter Basic Commands Part 2.mp4 65.7 MB
7-End-Point Protection/033-Bitdefender, Kaspersky, McAfee, Malwarebytes.mp4 63.9 MB
4-Understanding Hackers - The Biggest Threat/012-Most Common Attacks Demonstration.mp4 63.5 MB
8-Network Security/060-Network Monitoring With TCPDump.mp4 62.7 MB
8-Network Security/058-Wireless Security.mp4 59.6 MB
5-Security Bugs & Vulnerabilities/017-Unpatched Machine Exploitation Demonstration.mp4 59.1 MB
12-Appendix - Ethical Hacking/080-Whatweb Stealthy Scan.mp4 58.1 MB
12-Appendix - Ethical Hacking/091-Advance Msfvenom Usage.mp4 51.4 MB
7-End-Point Protection/043-Iptables.mp4 50.9 MB
7-End-Point Protection/028-Brave Browser Security and Privacy.mp4 50.6 MB
12-Appendix - Ethical Hacking/089-Software Vulnerability - Samba Exploitation.mp4 49.5 MB
猜你喜欢:
FreeCoursesOnline
Me
Complete
Cybersecurity
Bootcamp
ZeroToMastery
- 【压缩文件】 [FreeCoursesOnline.Me] Coursera - Python for Cybersecurity Specialization
-
收录时间:2023-12-19
文档个数:9
文档大小:1.1 GB
最近下载:2025-05-16
人气:6218
磁力链接
5. Python for Active Defense.zip 268.9 MB
2. Execution, Persistence, Privilege escalation and Evasion.zip 251.2 MB
3. Credential Access, Discovery, Lateral Movement & Collection.zip 225.7 MB
4. Python for Command-and-Control, Exfiltration and Impact.zip 203.8 MB
1. Introduction to Python for Cybersecurity.zip 185.2 MB
0. Websites you may like/1. OneHack.us Premium Cracked Accounts-Tutorials-Guides-Articles Community Based Forum.url 377 Bytes
FreeCoursesOnline.me Download Udacity, Masterclass, Lynda, PHLearn, etc Free.url 290 Bytes
Content Info.txt 284 Bytes
0. Websites you may like/2. FTUApps.com Download Cracked Developers Applications For Free.url 239 Bytes
猜你喜欢:
FreeCoursesOnline
Me
Specialization
Python
Coursera
Cybersecurity
- 【影视】 Microsoft Cybersecurity Pro Track PowerShell Security
-
收录时间:2021-03-20
文档个数:58
文档大小:1.4 GB
最近下载:2025-05-16
人气:3259
磁力链接
Course/3. PowerShell Operational Security/2. Managing Remote Execution Capabilities of Windows PowerShell.mp4 192.7 MB
Course/4. Implementing PowerShell-based Security/1. Windows Powershell DSC.mp4 146.7 MB
Course/5. Windows PowerShell-based Exploits and their Mitigation/1. Windows PowerShell-based Attacks.mp4 134.1 MB
Course/4. Implementing PowerShell-based Security/2. Just Enough Administration (JEA).mp4 123.4 MB
Course/3. PowerShell Operational Security/1. Managing Local Script Execution Policy with Windows PowerShell Execution.mp4 116.8 MB
Course/1. Introduction/3. Preparing the Lab Environment.mp4 95.2 MB
Course/2. Windows PowerShell Fundamentals/2. PowerShell Editions and Versions.mp4 88.2 MB
Course/4. Implementing PowerShell-based Security/3. Windows PowerShell Auditing and Logging.mp4 86.9 MB
Course/3. PowerShell Operational Security/4. Language Mode.mp4 79.5 MB
Course/2. Windows PowerShell Fundamentals/1. Windows PowerShell Architecture.mp4 66.6 MB
Course/5. Windows PowerShell-based Exploits and their Mitigation/3. Summary of Windows PowerShell-based Security-Related Technologies.mp4 55.5 MB
Course/2. Windows PowerShell Fundamentals/3. Running Windows Powershell.mp4 53.4 MB
Course/5. Windows PowerShell-based Exploits and their Mitigation/2. Windows PowerShell-based Security Tools.mp4 50.7 MB
Course/3. PowerShell Operational Security/5. Anti-Malware SCan Interface (AMSI).mp4 39.1 MB
Course/1. Introduction/2. About the Course.mp4 25.1 MB
Course/3. PowerShell Operational Security/3. Constrained Endpoints.mp4 24.2 MB
Course/1. Introduction/1. Instructor Introduction.mp4 10.9 MB
Course/3. PowerShell Operational Security/2. Managing Remote Execution Capabilities of Windows PowerShell.srt 43.0 kB
Course/4. Implementing PowerShell-based Security/1. Windows Powershell DSC.srt 37.5 kB
Course/4. Implementing PowerShell-based Security/2. Just Enough Administration (JEA).srt 35.1 kB
猜你喜欢:
Cybersecurity
Pro
PowerShell
Track
Security
Microsoft
- 【压缩文件】 [ FreeCourseWeb.com ] Cybersecurity Attacks - Red Team Strategies- A guide to building a pentest program and elevating your red teaming skills.zip
-
收录时间:2021-03-14
文档个数:1
文档大小:171.8 MB
最近下载:2025-05-16
人气:1410
磁力链接
[ FreeCourseWeb.com ] Cybersecurity Attacks - Red Team Strategies- A guide to building a pentest program and elevating your red teaming skills.zip 171.8 MB
猜你喜欢:
building
zip
skills
Cybersecurity
teaming
elevating
your
Attacks
program
FreeCourseWeb
- 【影视】 [ WebToolTip.com ] Udemy - Cybersecurity Fundamentals - A Practical Hands-On Course
-
收录时间:2025-05-09
文档个数:25
文档大小:1.5 GB
最近下载:2025-05-16
人气:245
磁力链接
~Get Your Files Here !/2 - Cybersecurity Fundamentals Practical Tutorials/1 -Cybersecurity Practical Learning Part 1.mp4 147.6 MB
~Get Your Files Here !/2 - Cybersecurity Fundamentals Practical Tutorials/2 -Cybersecurity Practical Learning Part 2.mp4 139.7 MB
~Get Your Files Here !/5 - Start Ethical Hacking Today/1 -How To Keep Your Laptops Secure And Safe.mp4 120.4 MB
~Get Your Files Here !/4 - Mastering Burpsuite/4 -Insecure Direct Object Reference (IDOR).mp4 120.1 MB
~Get Your Files Here !/1 - Introduction/1 -Lecture 1.pdf 92.9 MB
~Get Your Files Here !/2 - Cybersecurity Fundamentals Practical Tutorials/3 -Python for Cybersecurity Part 1.mp4 90.9 MB
~Get Your Files Here !/3 - Tools for Cybersecurity Practical Guide/3 -How To Install Python On Kali Linux.mp4 89.8 MB
~Get Your Files Here !/1 - Introduction/1 -Introduction.mp4 88.0 MB
~Get Your Files Here !/4 - Mastering Burpsuite/3 -Live Website Scan On Burpsuite.mp4 79.7 MB
~Get Your Files Here !/3 - Tools for Cybersecurity Practical Guide/1 -How to Download Kali Linux.mp4 74.9 MB
~Get Your Files Here !/5 - Start Ethical Hacking Today/2 -Spiderfoot Complete Tutorial.mp4 70.5 MB
~Get Your Files Here !/2 - Cybersecurity Fundamentals Practical Tutorials/4 -Python for Cybersecurity Part 2.mp4 70.0 MB
~Get Your Files Here !/1 - Introduction/2 -Setting Up Your Lab Environment (VirtualBox + Kali Linux + Windows VM).mp4 61.6 MB
~Get Your Files Here !/3 - Tools for Cybersecurity Practical Guide/5 -How To Download And Use Cherry Tree.mp4 45.4 MB
~Get Your Files Here !/5 - Start Ethical Hacking Today/4 -The Best Website For Cybersecurity Experts.mp4 45.3 MB
~Get Your Files Here !/4 - Mastering Burpsuite/1 -How To Download And Install Burpsuite.mp4 41.8 MB
~Get Your Files Here !/3 - Tools for Cybersecurity Practical Guide/4 -How To Install Pycharm on Kali Linux.mp4 33.9 MB
~Get Your Files Here !/4 - Mastering Burpsuite/2 -Website Scan Part 1.mp4 32.7 MB
~Get Your Files Here !/3 - Tools for Cybersecurity Practical Guide/2 -How To Create Txt File In Kali Linux.mp4 18.8 MB
~Get Your Files Here !/5 - Start Ethical Hacking Today/3 -Haveibeenpawned.mp4 15.8 MB
猜你喜欢:
WebToolTip
Course
Cybersecurity
Udemy
Practical
Fundamentals
Hands
com
- 【影视】 Microsoft Cybersecurity Pro Track Security in Office 365
-
收录时间:2021-04-22
文档个数:91
文档大小:1.5 GB
最近下载:2025-05-15
人气:4319
磁力链接
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/2. Introduction to Security in Office 365/1. Threat Vectors and Data Breaches.mp4 185.5 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/5. Implementing auditing, insights and alerts/3. Audit Log Investigations.mp4 155.5 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/3. Implementing and Managinng Microsoft Defender for Office 365 (Office 365 ATP)/1. Introduction to Exchange Online Protection.mp4 132.0 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/6. Advanced Security Management/1. Deploy Cloud Application Security.mp4 109.2 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/5. Implementing auditing, insights and alerts/5. Managing insights and alerts in the Security & Compliance Center.mp4 101.2 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/4. Using Office 365 Threat Intelligence/3. Threat Investigation and Response.mp4 91.3 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/3. Implementing and Managinng Microsoft Defender for Office 365 (Office 365 ATP)/3. Managing Safe Attachments.mp4 90.4 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/2. Introduction to Security in Office 365/3. Introduction to Secure Score.mp4 78.1 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/3. Implementing and Managinng Microsoft Defender for Office 365 (Office 365 ATP)/4. Managing Safe Links.mp4 75.1 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/3. Implementing and Managinng Microsoft Defender for Office 365 (Office 365 ATP)/2. Overview of Microsoft Defender for Office 365 (former named Office 365 ATP).mp4 64.5 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/6. Advanced Security Management/2. Use Cloud Application Security.mp4 63.1 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/4. Using Office 365 Threat Intelligence/2. Security (Threat) Dashboard.mp4 61.0 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/3. Implementing and Managinng Microsoft Defender for Office 365 (Office 365 ATP)/5. Monitoring and Reports.mp4 56.6 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/4. Using Office 365 Threat Intelligence/1. Overview of Office 365 Threat Intelligence.mp4 53.0 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/5. Implementing auditing, insights and alerts/2. Enabling mailbox auditing in Exchange Online.mp4 44.4 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/2. Introduction to Security in Office 365/2. Security Solutions in Office 365.mp4 37.2 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/5. Implementing auditing, insights and alerts/1. Overview of auditing in the Security & Compliance Center.mp4 34.8 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/1. Introduction/2. About the Course.mp4 32.8 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/5. Implementing auditing, insights and alerts/4. Enabling sharing auditing for SharePoint and OneDrive.mp4 30.7 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/1. Introduction/3. Preparing the Lab Environment.mp4 25.1 MB
猜你喜欢:
Office
Cybersecurity
Pro
Track
Security
365
Microsoft
- 【影视】 Certified in Cybersecurity 2023 - ISC2-CC Complete Training
-
收录时间:2023-12-18
文档个数:51
文档大小:1.2 GB
最近下载:2025-05-15
人气:14622
磁力链接
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/9. Security Controls Examples.mp4 119.4 MB
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/3. Domain 2 Business Continuity (BC), Disaster Recovery (DR) & Incident Response/1. Cyber Threats.mp4 109.6 MB
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/4. Risk Analaysis.mp4 106.8 MB
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/7. Risk Monitoring.mp4 91.3 MB
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/3. Risk Management Overview.mp4 68.8 MB
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/3. Domain 2 Business Continuity (BC), Disaster Recovery (DR) & Incident Response/2. Cyber Attacks 1.mp4 67.5 MB
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/12. Governance Overview.mp4 57.5 MB
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/8. Security Controls.mp4 56.7 MB
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/2. Privacy.mp4 55.2 MB
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/6. Risk Response.mp4 52.3 MB
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/20. Laws and Regulations in Cybersecurity.mp4 46.8 MB
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/10. Defense in Depth.mp4 42.9 MB
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/14. Policies.mp4 42.3 MB
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/19. Procedures and Guidelines.mp4 38.5 MB
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/1. CIA Triad and Security Objectives.mp4 35.6 MB
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/15. Policies Examples.mp4 33.0 MB
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/5. Types of Risk.mp4 29.0 MB
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/18. Standards.mp4 27.4 MB
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/16. Acceptable use policy.mp4 22.7 MB
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/13. Information Security Governance.mp4 18.1 MB
猜你喜欢:
Training
Complete
ISC2
Cybersecurity
CC
2023
Certified
- 【影视】 Lynda - Foundations of Cybersecurity
-
收录时间:2017-02-19
文档个数:27
文档大小:300.9 MB
最近下载:2025-05-15
人气:2960
磁力链接
021 Managing user access and identity.mp4 20.7 MB
022 Implementing preventative security.mp4 18.8 MB
023 Monitoring and alerts.mp4 15.7 MB
018 Describing security requirements.mp4 14.9 MB
008 Dissecting the payment card industry and PCI DSS.mp4 14.6 MB
007 Implementing control frameworks.mp4 14.3 MB
025 Preparing for an incident.mp4 14.2 MB
019 Architecting security risk.mp4 13.5 MB
016 Understanding advanced persistent threats (APTs).mp4 13.5 MB
004 Dissecting cyber risk.mp4 13.1 MB
003 Understanding the NIST cybersecurity framework.mp4 12.6 MB
011 Dissecting security threats.mp4 11.6 MB
026 Responding to an incident.mp4 11.5 MB
005 Unpacking COBIT 5.mp4 10.3 MB
012 Exploring cybercrime as an industry.mp4 9.9 MB
014 Using callbacks to capture keystrokes.mp4 9.8 MB
015 Hiding malware with rootkits.mp4 9.8 MB
009 Exploring the Cyber Essentials framework.mp4 9.3 MB
013 Hiding malware through cloaking and alternate data streams.mp4 9.0 MB
020 Selecting security controls.mp4 8.5 MB
猜你喜欢:
Cybersecurity
Lynda
Foundations
- 【文档书籍】 Port Cybersecurity (N.Polemi 2018).pdf
-
收录时间:2021-03-24
文档个数:1
文档大小:82.3 MB
最近下载:2025-05-15
人气:560
磁力链接
Port Cybersecurity (N.Polemi 2018).pdf 82.3 MB
猜你喜欢:
Cybersecurity
pdf
Polemi
Port
2018
- 【影视】 Cybersecurity for Small and Medium Businesses - Essential Training
-
收录时间:2018-09-09
文档个数:66
文档大小:358.3 MB
最近下载:2025-05-15
人气:2022
磁力链接
2.1. The Basics/03.Why you should care.mp4 31.6 MB
1.Introduction/01.Welcome.mp4 21.9 MB
1.Introduction/02.What you should know.en.srt 1.5 kB
1.Introduction/02.What you should know.mp4 5.0 MB
2.1. The Basics/03.Why you should care.en.srt 6.7 kB
1.Introduction/01.Welcome.en.srt 2.1 kB
2.1. The Basics/04.Physical security vs. cybersecurity.en.srt 1.9 kB
2.1. The Basics/04.Physical security vs. cybersecurity.mp4 4.8 MB
2.1. The Basics/05.Anyone can improve the cybersecurity of a business.en.srt 3.4 kB
2.1. The Basics/05.Anyone can improve the cybersecurity of a business.mp4 9.1 MB
2.1. The Basics/06.What are the cybersecurity threat actions facing businesses.en.srt 4.5 kB
2.1. The Basics/06.What are the cybersecurity threat actions facing businesses.mp4 6.9 MB
2.1. The Basics/07.What are the cybersecurity threats.en.srt 6.4 kB
2.1. The Basics/07.What are the cybersecurity threats.mp4 14.6 MB
2.1. The Basics/08.A five-step process to improve cybersecurity.en.srt 3.9 kB
2.1. The Basics/08.A five-step process to improve cybersecurity.mp4 7.2 MB
3.2. Identify/09.Step #1 - Identify key assets.en.srt 3.1 kB
3.2. Identify/09.Step #1 - Identify key assets.mp4 9.5 MB
3.2. Identify/10.Inventory sheet - Data and devices.en.srt 1.9 kB
3.2. Identify/10.Inventory sheet - Data and devices.mp4 3.1 MB
猜你喜欢:
Training
Medium
Cybersecurity
Businesses
Small
Essential
- 【影视】 [ DevCourseWeb.com ] Udemy - Selection and Implementation of Cybersecurity Risks Controls
-
收录时间:2024-01-05
文档个数:36
文档大小:2.0 GB
最近下载:2025-05-15
人气:2662
磁力链接
~Get Your Files Here !/2. SECTION-2/8. 19- The role of governance in the effective selection and implementation of cybe.mp4 142.9 MB
~Get Your Files Here !/2. SECTION-2/14. 23-Selecting and implementing cybersecurity controls based on NIST CSF PT2.mp4 122.4 MB
~Get Your Files Here !/2. SECTION-2/16. 25- Measuring the effectiveness of implemented controls.mp4 117.4 MB
~Get Your Files Here !/2. SECTION-2/17. Putting it all together-The Selection and Implementation of Cyber Risks controls.mp4 115.7 MB
~Get Your Files Here !/1. Introduction/10. 9-Key considerations for the identification- selection & implementation of contr.mp4 101.8 MB
~Get Your Files Here !/1. Introduction/7. 6-Approach to Control Selection_ pt2.mp4 94.1 MB
~Get Your Files Here !/2. SECTION-2/9. 20-Why not implement frameworks that already have recommended controls.mp4 90.3 MB
~Get Your Files Here !/2. SECTION-2/15. 24-Implementation Plan for selected controls.mp4 87.1 MB
~Get Your Files Here !/2. SECTION-2/11. 21-Challenges, & considerations associated with implementing frameworks-pt2.mp4 82.9 MB
~Get Your Files Here !/1. Introduction/11. 10-Risk Assessment-BIA, Control Selection, Cost Benefit Analysis.mp4 81.1 MB
~Get Your Files Here !/1. Introduction/9. 8-Introduction to security controls.mp4 77.4 MB
~Get Your Files Here !/2. SECTION-2/7. 18-Documenting Cybersecurity Risk Assessment Report-Pt2.mp4 75.5 MB
~Get Your Files Here !/2. SECTION-2/5. 17-Determine likelihood, Impact, Calculate risk.mp4 72.4 MB
~Get Your Files Here !/2. SECTION-2/13. 23-Selecting and implementing cybersecurity controls based on NIST CSF PT1.mp4 62.9 MB
~Get Your Files Here !/1. Introduction/12. 11-Cost Benefit Analysis associated with controls selection.mp4 58.3 MB
~Get Your Files Here !/2. SECTION-2/3. 15-Steps involved in assessing the identified cyber risks in web server.mp4 55.0 MB
~Get Your Files Here !/2. SECTION-2/1. 14-High-level process of selecting controls to protect ecommerce web server-Pt1.mp4 54.5 MB
~Get Your Files Here !/1. Introduction/14. 13-Regulatory Compliance, Incident Response Planning.mp4 53.9 MB
~Get Your Files Here !/1. Introduction/13. 12- Technology integration, operational impact, continuous monitoring, employee.mp4 52.8 MB
~Get Your Files Here !/2. SECTION-2/6. 18- Documenting Cybersecurity Risk Assessment Report-Pt1.mp4 50.4 MB
猜你喜欢:
Selection
Implementation
Controls
Udemy
DevCourseWeb
Cybersecurity
Risks
com
- 【影视】 [TheArtOfHacking] Cybersecurity Video Courses Collection (2018-2020) [En]
-
收录时间:2021-03-15
文档个数:1102
文档大小:115.5 GB
最近下载:2025-05-15
人气:5916
磁力链接
TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/190 - 16.5 Exploiting SQL Injection Vulnerabilities.mp4 856.8 MB
TheArtOfHacking.org - Hacking Web Applications/00044 6.4_Exploiting_SQL_Injection_Vulnerabilities.mp4 847.3 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00155 6.4_Exploiting_SQL_Injection_Vulnerabilities.mp4 847.3 MB
TheArtOfHacking.org - Hacking Web Applications/00058 8.1_Introducing_Cryptography_Encryption_and_Hashing_Protocols.mp4 757.5 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00169 8.1_Introducing_Cryptography_Encryption_and_Hashing_Protoc 757.5 MB
TheArtOfHacking.org - Hacking Web Applications/00038 5.1_Understanding_Authentication_Schemes_in_Web_Applications_and_Related_Vulnerabilities.mp4 733.0 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00149 5.1_Understanding_Authentication_Schemes_in_Web_Applicatio 733.0 MB
TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/158 - 14.15 Understanding Authentication Schemes in Web Applications.mp4 730.3 MB
TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/008 - 2.2 Threats and Attack Vectors.mp4 681.2 MB
TheArtOfHacking.org - Hacking Web Applications/00018 3.1_Exploring_Kali_Linux.mp4 586.2 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00129 3.1_Exploring_Kali_Linux.mp4 586.2 MB
TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/140 - 13.11 Introducing the Burp Suite.mp4 568.8 MB
TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/107 - 10.10 Surveying Social Engineering Case Studies.mp4 560.2 MB
TheArtOfHacking.org - Hacking Web Applications/00034 4.8_Introducing_the_Burp_Suite.mp4 549.6 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00145 4.8_Introducing_the_Burp_Suite.mp4 549.6 MB
TheArtOfHacking.org - Hacking Web Applications/00029 4.3_Exploring_Shodan_Maltego_Recon-NG_SpiderFoot_and_TheHarvester.mp4 511.9 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00140 4.3_Exploring_Shodan_Maltego_Recon-NG_SpiderFoot_and_TheHa 511.9 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00022 3.6_Surveying_Essential_Tools_for_Passive_Reconnaissance_- 489.1 MB
TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/264 - 22.5 Exploring The Android Security Model.mp4 474.0 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00061 8.10_Hacking_the_Management_Plane.mp4 469.4 MB
猜你喜欢:
TheArtOfHacking
Cybersecurity
Collection
Courses
En
Video
2018
2020
- 【影视】 [ DevCourseWeb.com ] Udemy - Mastering Cybersecurity and Supply Chain Risk Management
-
收录时间:2024-03-23
文档个数:41
文档大小:3.6 GB
最近下载:2025-05-15
人气:1529
磁力链接
~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/7. Recover.mp4 205.3 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/4. Network Security Controls.mp4 173.8 MB
~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/5. Incident Analysis.mp4 150.0 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/1. User and Network Infrastructure.mp4 136.2 MB
~Get Your Files Here !/1. Introduction to NIST Framework/3. NIST Framework Core.mp4 130.0 MB
~Get Your Files Here !/5. Effective Supply Chain Risk Management/4. Develop, Assess and Test Supply Chain Risks.mp4 123.4 MB
~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/3. Executable Response Plan.mp4 116.0 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/9. Information Protection.mp4 115.2 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/8. Hardware Integrity.mp4 105.7 MB
~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/1. Developing a Continuity of Operations Plan.mp4 103.2 MB
~Get Your Files Here !/2. Cybersecurity Risk Planning & Management/4. Keeping Hardware Inventory Updated.mp4 102.7 MB
~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/2. Incident Response.mp4 102.1 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/7. Data Security.mp4 101.4 MB
~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/6. Mitigation.mp4 101.0 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/2. Authentication and Access Control.mp4 100.3 MB
~Get Your Files Here !/2. Cybersecurity Risk Planning & Management/7. Personnel Security Requirements.mp4 98.1 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/10. Patch Management.mp4 97.7 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/5. Association and Authentication.mp4 91.7 MB
~Get Your Files Here !/5. Effective Supply Chain Risk Management/1. Supply Chain Risk Management.mp4 90.7 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/12. Protective Technology.mp4 88.5 MB
猜你喜欢:
Management
Risk
Chain
Supply
Cybersecurity
Udemy
DevCourseWeb
Mastering
com
- 【影视】 Cybersecurity Threats Ransomware
-
收录时间:2017-04-29
文档个数:39
文档大小:405.4 MB
最近下载:2025-05-15
人气:3100
磁力链接
01. Course Overview/01. Intro.mp4 5.4 MB
02. What Is Ransomware/01. Overview.mp4 4.1 MB
02. What Is Ransomware/02. Definition and Types of Ransomware.mp4 20.3 MB
02. What Is Ransomware/03. The Ransomware Timeline.mp4 15.2 MB
02. What Is Ransomware/04. What Is Ransomware 30,000 ft. View.mp4 5.9 MB
02. What Is Ransomware/05. How Big Is the Problem.mp4 15.1 MB
02. What Is Ransomware/06. Ransomware Victims.mp4 11.7 MB
02. What Is Ransomware/07. Module Progress Checkpoint.mp4 617.9 kB
02. What Is Ransomware/08. Demo of Real World Ransomware Attack.mp4 52.0 MB
02. What Is Ransomware/09. Variations of Ransomware.mp4 6.4 MB
02. What Is Ransomware/10. Summary.mp4 2.5 MB
03. Ransomware Entry Points/01. Overview.mp4 2.7 MB
03. Ransomware Entry Points/02. The 5 Classic Infection Vectors.mp4 3.1 MB
03. Ransomware Entry Points/03. Phishing and Email Attachments.mp4 10.6 MB
03. Ransomware Entry Points/04. Embedded Hyperlinks, Websitesdownloads, and Drive-by Infections.mp4 6.2 MB
03. Ransomware Entry Points/05. Why Common Exploit Kits Are Used.mp4 5.4 MB
03. Ransomware Entry Points/06. Command and Callback (C&C) and Indicators of Compromise.mp4 7.0 MB
03. Ransomware Entry Points/07. Summary.mp4 2.8 MB
04. Incident Response Detection and Containment/01. Overview.mp4 2.6 MB
04. Incident Response Detection and Containment/02. Indicators of Compromise.mp4 5.3 MB
猜你喜欢:
Cybersecurity
Threats
Ransomware
- 【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity Threat Hunting Professional
-
收录时间:2022-03-20
文档个数:36
文档大小:1.0 GB
最近下载:2025-05-15
人气:2155
磁力链接
~Get Your Files Here !/2. Time to hunt/2. Practical Threat hunting Demo.mp4 121.9 MB
~Get Your Files Here !/2. Time to hunt/1. Case Base Threat Hunting.mp4 93.6 MB
~Get Your Files Here !/2. Time to hunt/3. Indicators of threat attacksIoC.mp4 86.1 MB
~Get Your Files Here !/1. Introduction/11. 7 Effective Threat Hunting Tips.mp4 81.5 MB
~Get Your Files Here !/1. Introduction/10. Hypothesis Testing & Sources of Hypothesis.mp4 78.6 MB
~Get Your Files Here !/4. Course Resources/1. Course Resources.mp4 72.6 MB
~Get Your Files Here !/3. Course Conclusion/1. Course Review.mp4 72.6 MB
~Get Your Files Here !/1. Introduction/8. What is Required for Successful Threat Hunting.mp4 71.2 MB
~Get Your Files Here !/1. Introduction/6. Terms associated with Threat Hunting.mp4 70.5 MB
~Get Your Files Here !/1. Introduction/4. Why threat hunt and attributes of an effective threat hunter.mp4 56.2 MB
~Get Your Files Here !/1. Introduction/9. Threat Hunting Approaches.mp4 55.0 MB
~Get Your Files Here !/1. Introduction/5. Threat Hunting Skillset Requirements.mp4 40.0 MB
~Get Your Files Here !/1. Introduction/7. Threat Hunting Loop.mp4 38.6 MB
~Get Your Files Here !/1. Introduction/2. What is Threat Hunting & Its Primary objective.mp4 35.9 MB
~Get Your Files Here !/1. Introduction/1. Introduction.mp4 29.5 MB
~Get Your Files Here !/1. Introduction/3. What is Threat Hunting & Its Primary objective..mp4 23.3 MB
~Get Your Files Here !/4. Course Resources/1.1 Network Threat Hunting with Tim Crothers.mp4 10.6 MB
~Get Your Files Here !/4. Course Resources/1.2 Resources Links for Threat Hunting Course.pdf 435.7 kB
~Get Your Files Here !/2. Time to hunt/2. Practical Threat hunting Demo.srt 11.9 kB
~Get Your Files Here !/2. Time to hunt/3. Indicators of threat attacksIoC.srt 8.3 kB
猜你喜欢:
Hunting
Cybersecurity
Udemy
DevCourseWeb
Threat
Professional
com
- 【影视】 [FreeCoursesOnline.Me] [Packtpub.Com] Cybersecurity - Methods of Protection (Blue Team Activity) - [FCO]
-
收录时间:2018-11-13
文档个数:35
文档大小:1.3 GB
最近下载:2025-05-15
人气:1742
磁力链接
01.Securing Your Network/0101.The Course Overview.mp4 22.8 MB
01.Securing Your Network/0102.Understanding Firewalls and Tuning Them Up.mp4 28.7 MB
01.Securing Your Network/0103.How to Work with IDSIPS.mp4 24.0 MB
01.Securing Your Network/0104.Securing Your Wi-Fi Network.mp4 90.9 MB
01.Securing Your Network/0105.Ferreting out a Hacker by IP.mp4 101.3 MB
01.Securing Your Network/0106.Analyzing Traffic Wireshark.mp4 25.3 MB
01.Securing Your Network/0107.The Fastest Way to Detect ARP Poisoning Attack.mp4 21.8 MB
01.Securing Your Network/0108.Analyzing Your Traffic to Catch a Spy with Wireshark.mp4 35.4 MB
01.Securing Your Network/0109.Looking for Spies with a Python Script.mp4 50.2 MB
01.Securing Your Network/0110.How to Outfox Ransomware.mp4 28.9 MB
01.Securing Your Network/0111.Advanced-level Techniques What to Do If Hackers Already in Your Network.mp4 40.3 MB
02.Securing Your Website/0201.Brute-Forcing Website Passwords with OWASP ZAP.mp4 45.6 MB
02.Securing Your Website/0202.How to Create a Bulletproof Password in a Second.mp4 68.9 MB
02.Securing Your Website/0203.Testing a Website for SQL Injection with Burp Suite.mp4 30.9 MB
02.Securing Your Website/0204.Testing a Website for XSS Vulnerability.mp4 29.8 MB
02.Securing Your Website/0205.Building Fortifications – Input Validation and Whitelisting.mp4 99.3 MB
02.Securing Your Website/0206.Testing Your SSLTLS Connection.mp4 21.2 MB
02.Securing Your Website/0207.Scanning Your Website for Malicious Scripts.mp4 91.1 MB
02.Securing Your Website/0208.Protecting from a Session Hijacking Attack.mp4 27.7 MB
02.Securing Your Website/0209.The Big Strategy – Three Shortcuts to Secure a Web Application.mp4 68.6 MB
猜你喜欢:
FreeCoursesOnline
Me
Methods
Cybersecurity
Activity
Packtpub
Protection
Blue
Team
Com
- 【音乐】 Trust Genics - 2020 - Cybersecurity (Technology)
-
收录时间:2022-03-05
文档个数:10
文档大小:109.7 MB
最近下载:2025-05-15
人气:1428
磁力链接
Cybersecurity.mp3 109.7 MB
Cybersecurity.jpg 52.5 kB
Cybersecurity - Trust Genics - 2020.txt 2.1 kB
Downloaded From TorrentGalaxy.txt 583 Bytes
Downloaded From Glodls.txt 237 Bytes
Downloaded From ETTV.txt 138 Bytes
Downloaded From ProStyleX.txt 101 Bytes
Downloaded From 1337X.txt 96 Bytes
Downloaded From Demonoid.txt 50 Bytes
Downloaded From Katcr.co.txt 43 Bytes
猜你喜欢:
Cybersecurity
Technology
Trust
2020
Genics
- 【影视】 [Udemy] Real-World Ethical Hacking Hands-on Cybersecurity (2021) [En]
-
收录时间:2022-01-09
文档个数:194
文档大小:8.1 GB
最近下载:2025-05-15
人气:4571
磁力链接
14. Bonus Videos National Cyber Warrior Academy, Interviews and More/3. NCWA 2017 Facebook Live Video on Car Hacking and Drone Programming.mp4 947.8 MB
9. BONUS Section Car Hacking in Kali Linux!/9. Car Hacking LIVE on Dr. Payne's VW Jetta Facebook Live Video from NCWA 2017.mp4 347.6 MB
14. Bonus Videos National Cyber Warrior Academy, Interviews and More/5. Dr. Payne's TEDx Talk on Coding and Cyber as the New Literacy.mp4 320.6 MB
5. Social Engineering Capturing Usernames and Passwords via Phishing/3. Cloning Facebook and Harvesting User Passwords.mp4 265.0 MB
1. Real-World Ethical Hacking 1 Hacking Windows!/10. BONUS Mac Root Hack!.mp4 233.2 MB
3. Important Linux and Windows Terminal Commands/2. Basic Linux Commands.mp4 195.0 MB
13. Mobile Hacking on Android/2. Creating the Meterpreter Payload for Android.mp4 175.7 MB
3. Important Linux and Windows Terminal Commands/4. More Helpful Linux Commands.mp4 170.6 MB
4. Create a Virtual Network for Ethical Hacking!/3. Connecting Your VMs to the Host-Only Network.mp4 148.8 MB
8. Hacking Win10 Command & Control Phase/4. Stealing Screenshots, Keystrokes, and ,Webcams.mp4 145.4 MB
10. BONUS Hacking Windows 7 with Metasploit!/4. Creating an Exploit Payload with Metasploit.mp4 144.4 MB
2. Create Your Own Virtual Hacking Lab!/4. Create an Android PhoneTablet VM for Mobile Hacking!.mp4 142.1 MB
13. Mobile Hacking on Android/4. Advanced Android Exploits Accessing Storage, Downloading and Uploading Files.mp4 139.2 MB
9. BONUS Section Car Hacking in Kali Linux!/8. BONUS Hacking the Car Hacking Software, to 1000 mph!.mp4 125.2 MB
5. Social Engineering Capturing Usernames and Passwords via Phishing/7. Capturing the User's Login and Password in Kali.mp4 116.7 MB
9. BONUS Section Car Hacking in Kali Linux!/5. The Replay Attack Replaying CAN Packets with CANplayer.mp4 116.0 MB
11. Password Problems - Everybody's Got 'Em Hacking, Cracking, Snacking & Hijacking/3. Sniffing the Network Installing Wireshark.mp4 114.3 MB
4. Create a Virtual Network for Ethical Hacking!/5. Updating Kali and Windows VMs.mp4 112.5 MB
4. Create a Virtual Network for Ethical Hacking!/4. Creating and Using a Public NAT Network in VBox.mp4 112.5 MB
11. Password Problems - Everybody's Got 'Em Hacking, Cracking, Snacking & Hijacking/6. Seven Things You Can Do for Safer Passwords.mp4 111.1 MB
猜你喜欢:
Real
Ethical
En
Cybersecurity
Udemy
2021
Hands
World
Hacking
- 【影视】 [ DevCourseWeb.com ] China's Cybersecurity and Privacy Regulations - Essential Training
-
收录时间:2024-09-02
文档个数:49
文档大小:237.4 MB
最近下载:2025-05-15
人气:431
磁力链接
~Get Your Files Here !/05 - 4.Personal Information Protection Law/01 - Personal Information Protection Law breakdown.mp4 29.7 MB
~Get Your Files Here !/05 - 4.Personal Information Protection Law/02 - Legal basis and consent.mp4 16.8 MB
~Get Your Files Here !/05 - 4.Personal Information Protection Law/04 - Personal information handler obligations.mp4 15.5 MB
~Get Your Files Here !/05 - 4.Personal Information Protection Law/05 - Cross-border data transfer and updates to the regulation.mp4 15.2 MB
~Get Your Files Here !/03 - 2. Cybersecurity Law/01 - Cybersecurity Law breakdown.mp4 13.6 MB
~Get Your Files Here !/05 - 4.Personal Information Protection Law/03 - Data subject rights.mp4 13.3 MB
~Get Your Files Here !/03 - 2. Cybersecurity Law/02 - Multilevel protection scheme.mp4 13.2 MB
~Get Your Files Here !/04 - 3. Data Security Law/01 - Data Security Law breakdown.mp4 12.8 MB
~Get Your Files Here !/03 - 2. Cybersecurity Law/03 - Multilevel protection scheme technical components.mp4 10.7 MB
~Get Your Files Here !/02 - 1. China Regulation Basics/02 - Scope.mp4 10.7 MB
~Get Your Files Here !/02 - 1. China Regulation Basics/03 - Important dates.mp4 10.6 MB
~Get Your Files Here !/06 - 5. Real-World Guidance/02 - Enforcement action examples.mp4 10.2 MB
~Get Your Files Here !/04 - 3. Data Security Law/03 - Key provisions of the Data Security Law.mp4 9.7 MB
~Get Your Files Here !/04 - 3. Data Security Law/02 - Data classification and cross-border transfer guidelines.mp4 8.6 MB
~Get Your Files Here !/01 - Introduction/03 - Definitions.mp4 7.3 MB
~Get Your Files Here !/07 - Conclusion/02 - Additional resources.mp4 6.8 MB
~Get Your Files Here !/02 - 1. China Regulation Basics/01 - Overview of the recent cybersecurity and privacy regulations.mp4 6.7 MB
~Get Your Files Here !/07 - Conclusion/01 - How to get started.mp4 6.5 MB
~Get Your Files Here !/06 - 5. Real-World Guidance/01 - Successful certification examples.mp4 6.0 MB
~Get Your Files Here !/01 - Introduction/01 - Cybersecurity and privacy regulation in China.mp4 4.7 MB
猜你喜欢:
Regulations
Training
Privacy
Cybersecurity
DevCourseWeb
China
com
Essential