为您索检到268条磁力链接,耗时2毫秒。
- 【影视】 Coursera - Microsoft Cybersecurity Analyst Professional Certificate 2024
-
收录时间:2025-01-02
文档个数:1807
文档大小:6.5 GB
最近下载:2025-05-15
人气:636
磁力链接
Coursera - Advanced Cybersecurity Concepts and Capstone Project 2024-1/03_security-conscious-modeling/03_mitigation-strategies/06_network-security.mp4 78.1 MB
Coursera - Cybersecurity Solutions and Microsoft Defender 2024-1/01_azure-basic-security-capabilities/03_azure-firewall-protection/11_hackers-and-firewalls.mp4 49.8 MB
Coursera - Cybersecurity Tools and Technologies 2024-1/03_azure-penetration-testing/03_running-the-test/06_cold-wars-at-sams-scoops.mp4 38.4 MB
Coursera - Cybersecurity Identity and Access Solutions using Azure AD 2024-1/03_active-directory-access-protection-and-governance-management/02_roles-and-role-based-access/04_roles-in-action.mp4 38.0 MB
Coursera - Cybersecurity Solutions and Microsoft Defender 2024-1/03_microsoft-365-defender-threat-protection/03_identity-defense/07_identity-theft.mp4 33.2 MB
Coursera - Introduction to Computers and Operating Systems and Security 2024-1/01_introduction-to-computers-and-operating-systems/01_course-introduction/01_introduction-to-the-program-microsoft-cybersecurity-analyst.mp4 33.1 MB
Coursera - Cybersecurity Management and Compliance 2024-1/02_compliance-solutions/03_information-protection-and-data-lifecycle/03_data-concerns.mp4 30.3 MB
Coursera - Advanced Cybersecurity Concepts and Capstone Project 2024-1/02_advanced-threats-and-mitigation/01_susceptible-infrastructure-and-types-of-attack/06_attack-techniques.mp4 30.0 MB
Coursera - Advanced Cybersecurity Concepts and Capstone Project 2024-1/01_threat-modeling/03_threat-modeling-strategies/08_visual-agile-and-simple-threat-vast.mp4 26.3 MB
Coursera - Introduction to Networking and Cloud Computing 2024-1/04_cloud-computing-and-networking/02_virtual-environments/03_virtual-world.mp4 26.1 MB
Coursera - Introduction to Computers and Operating Systems and Security 2024-1/03_business-systems-applications/03_storage-solutions/06_artificial-intelligence-and-machine-learning.mp4 25.9 MB
Coursera - Microsoft SC-900 Exam Preparation and Practice 2024-1/01_concepts-of-security-compliance-and-identity/04_identity-concepts/06_id-and-active-directory.mp4 24.6 MB
Coursera - Cybersecurity Solutions and Microsoft Defender 2024-1/03_microsoft-365-defender-threat-protection/01_defender-services/01_introduction-to-microsoft-365-defender.mp4 23.4 MB
Coursera - Cybersecurity Tools and Technologies 2024-1/03_azure-penetration-testing/01_the-command-line-and-windows-powershell/01_introduction-to-command-line.mp4 23.3 MB
Coursera - Microsoft SC-900 Exam Preparation and Practice 2024-1/04_the-capabilities-of-microsoft-compliance-solutions/03_information-protection-and-data-lifecycle-management-capabilities-of-microsoft/09_module-summary-capabilities-of-microsoft-compliance-solutions.mp4 23.3 MB
Coursera - Advanced Cybersecurity Concepts and Capstone Project 2024-1/01_threat-modeling/03_threat-modeling-strategies/04_process-for-attack-simulation-and-threat-analysis-pasta.mp4 23.2 MB
Coursera - Advanced Cybersecurity Concepts and Capstone Project 2024-1/04_capstone-project/01_capstone-project/01_course-recap-advanced-cybersecurity-concepts.mp4 23.0 MB
Coursera - Microsoft SC-900 Exam Preparation and Practice 2024-1/02_the-capabilities-of-microsoft-azure-active-directory/03_identity-protection-and-governance-capabilities-of-azure-ad/01_identity-governance-in-azure-ad.mp4 22.4 MB
Coursera - Advanced Cybersecurity Concepts and Capstone Project 2024-1/01_threat-modeling/04_azure-and-threat-modeling/02_threat-modeling-for-azure-virtual-networks.mp4 22.3 MB
Coursera - Cybersecurity Solutions and Microsoft Defender 2024-1/01_azure-basic-security-capabilities/02_distributed-denial-of-service-ddos-protection/01_azure-ddos-protection-overview.mp4 22.3 MB
猜你喜欢:
Certificate
Cybersecurity
Coursera
Analyst
2024
Professional
Microsoft
- 【影视】 [ FreeCourseWeb.com ] Linkedin - Cybersecurity For Musicians, Producers, And Studios
-
收录时间:2025-02-24
文档个数:17
文档大小:1.2 GB
最近下载:2025-05-15
人气:673
磁力链接
~Get Your Files Here !/4 - Leveraging Technology for IP Protection/11 - Antipiracy software and techniques Royalty Management.mp4 173.2 MB
~Get Your Files Here !/4 - Leveraging Technology for IP Protection/8 - Using blockchain for music rights management.mp4 123.5 MB
~Get Your Files Here !/4 - Leveraging Technology for IP Protection/9 - Antipiracy software and techniques AI Protection Content ID Watermarking.mp4 112.9 MB
~Get Your Files Here !/1 - Introduction/1 - Welcome and introduction.mp4 101.3 MB
~Get Your Files Here !/4 - Leveraging Technology for IP Protection/10 - Antipiracy software and techniques Copyright PROs.mp4 95.2 MB
~Get Your Files Here !/4 - Leveraging Technology for IP Protection/13 - Antipiracy software and techniques Direct Fan Engagement.mp4 93.6 MB
~Get Your Files Here !/2 - Protecting Digital Assets/4 - Tools for secure data storage and sharing.mp4 70.3 MB
~Get Your Files Here !/5 - Action Plan for Musicians and Businesses/14 - Building a cybersecurity strategy.mp4 68.4 MB
~Get Your Files Here !/2 - Protecting Digital Assets/5 - Backup regularly.mp4 67.4 MB
~Get Your Files Here !/4 - Leveraging Technology for IP Protection/12 - Antipiracy software and techniques Secure Distribution Platforms.mp4 57.2 MB
~Get Your Files Here !/3 - Secure Music Streaming and Distribution/7 - Risks and best practices in streaming distribution platforms and sharing music.mp4 54.4 MB
~Get Your Files Here !/2 - Protecting Digital Assets/3 - Steps to safeguard recordings intellectual property and creative works.mp4 49.6 MB
~Get Your Files Here !/6 - Conclusion and Wrap Up/15 - Conclusion.mp4 48.1 MB
~Get Your Files Here !/2 - Protecting Digital Assets/6 - Access control.mp4 35.3 MB
~Get Your Files Here !/1 - Introduction/2 - Understanding Cybersecurity Threats in Music.mp4 25.4 MB
Get Bonus Downloads Here.url 183 Bytes
~Get Your Files Here !/Bonus Resources.txt 70 Bytes
猜你喜欢:
Studios
Cybersecurity
Linkedin
Producers
Musicians
FreeCourseWeb
com
- 【影视】 DIY Cybersecurity Degree
-
收录时间:2024-05-07
文档个数:7179
文档大小:233.4 GB
最近下载:2025-05-15
人气:1770
磁力链接
100 Days of Code The Complete Python Pro Bootcamp for 2023/101 - Final Stretch/002 Study With Me.mp4 1.9 GB
100 Days of Code The Complete Python Pro Bootcamp for 2023/101 - Final Stretch/001 Recording of our Live AMA (aka AAA - Ask Angela Anything).mp4 713.4 MB
CompTIA/CompTIA A+ Core 1 (220-1101)/5. Troubleshooting Hardware and Networking/5.2 Troubleshooting PC Components.mp4 697.8 MB
CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.1 Network Cables.mp4 637.3 MB
CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.4 Random-access Memory.mp4 579.5 MB
Job Tips/Behavioral Interview Prep/03. General Tips.mp4 571.0 MB
CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.4 Technical Controls - The Basics.mp4 551.2 MB
CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.6 Motherboards.mp4 540.8 MB
CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.5 Storage Devices.mp4 527.8 MB
CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.3 Non-Technical Controls - The Rest.mp4 526.4 MB
CompTIA/CompTIA A+ Core 1 (220-1101)/1. Mobile Devices/1.2 Laptop Hardware and Components.mp4 525.8 MB
CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.8 How do we Analyze Risk.mp4 509.3 MB
CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.23 Social Engineering and Physical Attacks.mp4 498.2 MB
CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.2 Non-Technical Controls - The Basics.mp4 486.5 MB
CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.2 Peripheral and Video Cables.mp4 485.9 MB
CompTIA/CompTIA PenTest + (PT0-002)/4. Reporting and Communication/4.3 Communication During a Pentest.mp4 478.0 MB
CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.14 Frameworks, Audits and Policy.mp4 473.1 MB
CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.10 How do we Document and Train for Risk.mp4 472.2 MB
CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.15 IAM Policies and Procedures.mp4 463.2 MB
CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.9 How do we Prioritize, Communicate Risk.mp4 460.5 MB
猜你喜欢:
Cybersecurity
DIY
Degree
- 【压缩文件】 [DesireCourse.Com] Udemy - A Hacker's Guide to Internet Safety and Cybersecurity
-
收录时间:2018-08-02
文档个数:3
文档大小:2.5 GB
最近下载:2025-05-15
人气:1467
磁力链接
[DesireCourse.Com] Udemy - A Hacker's Guide to Internet Safety and Cybersecurity.zip 2.5 GB
[DesireCourse.Com].txt 828 Bytes
[DesireCourse.Com].url 51 Bytes
猜你喜欢:
Hacker
Cybersecurity
DesireCourse
Udemy
Safety
Internet
Com
Guide
- 【影视】 Cybersecurity Foundations From Zero to Pro - Bootcamp
-
收录时间:2023-12-18
文档个数:63
文档大小:5.6 GB
最近下载:2025-05-15
人气:11512
磁力链接
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/7. PCAP Or It Didn't Happen/2. Module 7.2 Header Analysis.mp4 422.2 MB
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/3. Introduction to Networking/3. Module 3.3 Network Protocols.mp4 366.7 MB
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/8. Blue Team Operations/3. Module 8.3 Network, Encryption, and PKI.mp4 315.3 MB
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/3. Introduction to Networking/2. Module 3.2 Devices and IPs.mp4 313.0 MB
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/4. The Beast That Is The Windows Operating System/5. Module 4.5 Active Directory and Commands.mp4 312.3 MB
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/1. How Computers Function/3. Module 1.3 Hardware and Memory.mp4 265.3 MB
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/2. Computers and their Operating Systems/4. Module 2.4 The Linux Operating System.mp4 253.5 MB
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/6. Back to Networking/4. Module 6.4 How to Subnet.mp4 220.3 MB
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/3. Introduction to Networking/1. Module 3.1 Network Organization.mp4 217.5 MB
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/6. Back to Networking/1. Module 6.1 Routers and Switches, Again.mp4 213.9 MB
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/5. Hooked on Unix/2. Module 5.2 PIDs, Variables, and File System.mp4 204.3 MB
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/8. Blue Team Operations/2. Module 8.2 Methodology and Terminology.mp4 201.7 MB
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/3. Introduction to Networking/4. Module 3.4 Network Concepts.mp4 199.6 MB
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/4. The Beast That Is The Windows Operating System/1. Module 4.1 Users, Logging, and the Registry.mp4 184.9 MB
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/8. Blue Team Operations/1. Module 8.1 Vulnerability Management.mp4 171.6 MB
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/7. PCAP Or It Didn't Happen/4. Module 7.4 Attacks in PCAP.mp4 143.7 MB
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/4. The Beast That Is The Windows Operating System/2. Module 4.2 Windows Processes and Logon Activity.mp4 136.9 MB
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/4. The Beast That Is The Windows Operating System/3. Module 4.3 Windows File System.mp4 136.0 MB
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/1. How Computers Function/1. Module 1.1 Numbers.mp4 129.6 MB
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/2. Computers and their Operating Systems/3. Module 2.3 The Windows Operating System.mp4 128.6 MB
猜你喜欢:
Cybersecurity
Foundations
Zero
Pro
Bootcamp
- 【影视】 ZeroToMastery - Complete Cybersecurity Bootcamp
-
收录时间:2024-01-09
文档个数:97
文档大小:3.6 GB
最近下载:2025-05-15
人气:2777
磁力链接
8-Network Security/052-Network Security With Nmap.mp4 169.9 MB
5-Security Bugs & Vulnerabilities/020-Buffer Overflow Demonstration.mp4 136.7 MB
12-Appendix - Ethical Hacking/087-Msfconsole Basic Commands.mp4 97.5 MB
8-Network Security/059-Wireless Attack Demonstration.mp4 93.4 MB
7-End-Point Protection/034-Password Security and Password Managers.mp4 84.2 MB
12-Appendix - Ethical Hacking/093-Meterpreter Basic Commands Part 1.mp4 78.5 MB
7-End-Point Protection/038-Process Explorer.mp4 75.8 MB
1-Introduction/001-Cybersecurity Bootcamp - Zero to Mastery.mp4 72.4 MB
8-Network Security/057-Secure Network Architecture.mp4 66.8 MB
12-Appendix - Ethical Hacking/094-Meterpreter Basic Commands Part 2.mp4 65.7 MB
7-End-Point Protection/033-Bitdefender, Kaspersky, McAfee, Malwarebytes.mp4 63.9 MB
4-Understanding Hackers - The Biggest Threat/012-Most Common Attacks Demonstration.mp4 63.5 MB
8-Network Security/060-Network Monitoring With TCPDump.mp4 62.7 MB
8-Network Security/058-Wireless Security.mp4 59.6 MB
5-Security Bugs & Vulnerabilities/017-Unpatched Machine Exploitation Demonstration.mp4 59.1 MB
12-Appendix - Ethical Hacking/080-Whatweb Stealthy Scan.mp4 58.1 MB
12-Appendix - Ethical Hacking/091-Advance Msfvenom Usage.mp4 51.4 MB
7-End-Point Protection/043-Iptables.mp4 50.9 MB
7-End-Point Protection/028-Brave Browser Security and Privacy.mp4 50.6 MB
12-Appendix - Ethical Hacking/089-Software Vulnerability - Samba Exploitation.mp4 49.5 MB
猜你喜欢:
Cybersecurity
ZeroToMastery
Complete
Bootcamp
- 【压缩文件】 [ DevCourseWeb.com ] Udemy - Introduction to Cybersecurity - For Software Developers.zip
-
收录时间:2022-01-09
文档个数:1
文档大小:1.4 GB
最近下载:2025-05-15
人气:662
磁力链接
[ DevCourseWeb.com ] Udemy - Introduction to Cybersecurity - For Software Developers.zip 1.4 GB
猜你喜欢:
zip
Introduction
Udemy
DevCourseWeb
Cybersecurity
Developers
com
Software
- 【影视】 Lynda - Cybersecurity for Small and Medium Businesses Essential Training
-
收录时间:2018-07-25
文档个数:66
文档大小:358.3 MB
最近下载:2025-05-15
人气:1587
磁力链接
1.Introduction/01.Welcome.en.srt 2.1 kB
1.Introduction/01.Welcome.mp4 21.9 MB
1.Introduction/02.What you should know.en.srt 1.5 kB
1.Introduction/02.What you should know.mp4 5.0 MB
2.1. The Basics/03.Why you should care.en.srt 6.7 kB
2.1. The Basics/03.Why you should care.mp4 31.6 MB
2.1. The Basics/04.Physical security vs. cybersecurity.en.srt 1.9 kB
2.1. The Basics/04.Physical security vs. cybersecurity.mp4 4.8 MB
2.1. The Basics/05.Anyone can improve the cybersecurity of a business.en.srt 3.4 kB
2.1. The Basics/05.Anyone can improve the cybersecurity of a business.mp4 9.1 MB
2.1. The Basics/06.What are the cybersecurity threat actions facing businesses.en.srt 4.5 kB
2.1. The Basics/06.What are the cybersecurity threat actions facing businesses.mp4 6.9 MB
2.1. The Basics/07.What are the cybersecurity threats.en.srt 6.4 kB
2.1. The Basics/07.What are the cybersecurity threats.mp4 14.6 MB
2.1. The Basics/08.A five-step process to improve cybersecurity.en.srt 3.9 kB
2.1. The Basics/08.A five-step process to improve cybersecurity.mp4 7.2 MB
3.2. Identify/09.Step #1 - Identify key assets.en.srt 3.1 kB
3.2. Identify/09.Step #1 - Identify key assets.mp4 9.5 MB
3.2. Identify/10.Inventory sheet - Data and devices.en.srt 1.9 kB
3.2. Identify/10.Inventory sheet - Data and devices.mp4 3.1 MB
猜你喜欢:
Training
Medium
Cybersecurity
Lynda
Businesses
Small
Essential
- 【影视】 Cybersecurity Threat Hunting for SOC Analysts
-
收录时间:2022-05-05
文档个数:245
文档大小:6.2 GB
最近下载:2025-05-15
人气:10475
磁力链接
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/10. Adversary Emulation Caldera.mp4 359.9 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/12. Enhanced Lab Realism Bad Blood + Microsoft ATA + Bloodhound!.mp4 338.8 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/1. Threat Hunting with Splunk + Zeek.mp4 243.3 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/7. Adversary Emulation Atomic Red Team + MITRE ATT&CK.mp4 242.7 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/6. Purple Team Scenario Meterpreter + MSFVenom + Process Injection + Velociraptor!.mp4 225.7 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/3. The Modern Threat Hunting Mindset.mp4 225.3 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/5. The Methodical Guide to Effective Threat Hunting/1. Finding Beacons Long and Cumulative Connections.mp4 201.8 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/6. Proofs Detecting False Negatives/2. Suricata vs RITA Zeus Malware.mp4 195.4 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/5. The Methodical Guide to Effective Threat Hunting/5. Finding Beacons Business Need Analysis (Part 4).mp4 194.3 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/2. Threat Hunting with Splunk + Sysmon.mp4 153.3 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/5. The Methodical Guide to Effective Threat Hunting/4. Finding Beacons Business Need Analysis (Part 3).mp4 139.4 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/5. Beaconing DNS.mp4 135.2 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/8. Beaconing Detection Session Size Analysis.mp4 133.5 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/6. Proofs Detecting False Negatives/1. Suricata Capabilities + Installation!.mp4 129.8 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/3. Tools and resources/8. zeek.mp4 126.9 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/2. The Broken Threat Hunting Mindset.mp4 126.1 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/3. Tools and resources/9. Using zeek + Rita to find Evil!.mp4 118.9 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/1. Understanding the New Adversary.mp4 118.7 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/6. Beaconing CDN.mp4 117.8 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/5. Purple Team Scenario Mimikatz.mp4 115.6 MB
猜你喜欢:
Cybersecurity
SOC
Hunting
Threat
Analysts
- 【影视】 [ TutSala.com ] Udemy - Cybersecurity For Beginners - Network Architecture
-
收录时间:2022-01-09
文档个数:124
文档大小:1.0 GB
最近下载:2025-05-15
人气:3002
磁力链接
~Get Your Files Here !/17. Lab Demonstration - Scanning Networks with NMAP Pt. 1/1. Lab Demonstration - Scanning Networks with NMAP Pt. 1.mp4 477.0 MB
~Get Your Files Here !/18. Lab Demonstration - Scanning Networks with NMAP Pt. 2/1. Lab Demonstration - Scanning Networks with NMAP Pt. 2.mp4 331.7 MB
~Get Your Files Here !/11. Denial-of-Service Attack (DoS) Attack/2. The 5 Principal Differences Between DoS & DDoS Attacks.mp4 14.1 MB
~Get Your Files Here !/11. Denial-of-Service Attack (DoS) Attack/6. Common DoS Attack Pt. 2.mp4 9.8 MB
~Get Your Files Here !/7. Network Devices/1. Common Network Devices.mp4 8.9 MB
~Get Your Files Here !/1. The OSI Model/1. The OSI Model.mp4 7.8 MB
~Get Your Files Here !/11. Denial-of-Service Attack (DoS) Attack/5. Common DoS Attack Pt. 1.mp4 6.9 MB
~Get Your Files Here !/14. DNS Attacks/1. DNS Attacks.mp4 6.4 MB
~Get Your Files Here !/7. Network Devices/2. More Common Network Devices.mp4 6.2 MB
~Get Your Files Here !/11. Denial-of-Service Attack (DoS) Attack/1. DoS Vs. DDoS.mp4 6.0 MB
~Get Your Files Here !/4. IPv4 Vs. IPv6/1. IPv4.mp4 5.7 MB
~Get Your Files Here !/1. The OSI Model/3. Data Link Layer.mp4 5.7 MB
~Get Your Files Here !/10. Intrusion Detection Systems (IDS) & Intrusion Prevention Systems (IPS)/2. Behavior Based IDS Vs. Knowledge Based IDS.mp4 5.5 MB
~Get Your Files Here !/15. What is Footprinting/3. Footprinting Helps To.mp4 5.4 MB
~Get Your Files Here !/15. What is Footprinting/4. Footprinting Methodology.mp4 5.4 MB
~Get Your Files Here !/11. Denial-of-Service Attack (DoS) Attack/7. Three-Way-Handshake Importance To Network Attacks (SYN Flood).mp4 5.2 MB
~Get Your Files Here !/9. Types of Firewalls/2. Types of Firewalls Pt. 2.mp4 5.1 MB
~Get Your Files Here !/1. The OSI Model/2. Physical Layer.mp4 4.8 MB
~Get Your Files Here !/9. Types of Firewalls/1. Types of Firewalls Pt. 1.mp4 4.6 MB
~Get Your Files Here !/1. The OSI Model/4. Network Layer.mp4 4.5 MB
猜你喜欢:
Network
Cybersecurity
Udemy
Beginners
TutSala
Architecture
com
- 【影视】 [ FreeCourseWeb.com ] Udemy - Cybersecurity Solution Architecture 201
-
收录时间:2025-05-01
文档个数:14
文档大小:1.4 GB
最近下载:2025-05-15
人气:830
磁力链接
~Get Your Files Here !/10 -Advanced Governance, Risk, & Compliance (GRC).mp4 160.7 MB
~Get Your Files Here !/11 -Advanced Incident Response & Digital Forensics.mp4 156.8 MB
~Get Your Files Here !/6 -Advanced Identity & Access Management (IAM).mp4 133.3 MB
~Get Your Files Here !/4 -Infrastructure as Code (IaC) & Automated Security.mp4 133.1 MB
~Get Your Files Here !/13 -Wrap-Up & Preparation for 301.mp4 122.8 MB
~Get Your Files Here !/8 -Cloud & Hybrid Environment Security Advanced Topics.mp4 118.3 MB
~Get Your Files Here !/9 -Security Operations, Threat Intelligence & Threat Hunting.mp4 107.5 MB
~Get Your Files Here !/12 -In depth enterprise cybersecurity best practices, use cases, and examples.mp4 105.3 MB
~Get Your Files Here !/2 -Advanced Threat Modeling.mp4 100.1 MB
~Get Your Files Here !/7 -Data Protection & Privacy by Design.mp4 97.5 MB
~Get Your Files Here !/3 -Zero Trust Architecture.mp4 97.1 MB
~Get Your Files Here !/1 -Course Introduction & 101 Recap.mp4 69.3 MB
Get Bonus Downloads Here.url 183 Bytes
~Get Your Files Here !/Bonus Resources.txt 70 Bytes
猜你喜欢:
201
Cybersecurity
Solution
Udemy
FreeCourseWeb
Architecture
com
- 【压缩文件】 EC-Council - Cybersecurity attack and Defense
-
收录时间:2024-01-05
文档个数:1
文档大小:10.5 GB
最近下载:2025-05-15
人气:1293
磁力链接
EC-Council - Cybersecurity Attack and Defense Fundamentals Specialization.zip 10.5 GB
猜你喜欢:
Cybersecurity
attack
Defense
Council
EC
- 【影视】 [ TutGator.com ] Udemy - Cybersecurity For Beginners - MAC and IP Addressing
-
收录时间:2022-01-21
文档个数:66
文档大小:263.9 MB
最近下载:2025-05-15
人气:1451
磁力链接
~Get Your Files Here !/5. MAC & IP Addressing Lab Demonstration/1. Lab Demonstration - MAC & IP Addressing.mp4 159.2 MB
~Get Your Files Here !/7. Network Devices/1. Common Network Devices.mp4 8.9 MB
~Get Your Files Here !/1. The OSI Model/1. The OSI Model.mp4 7.8 MB
~Get Your Files Here !/7. Network Devices/2. Common Network Devices Pt. 2.mp4 6.2 MB
~Get Your Files Here !/4. IPv4 Vs. IPv6/1. IPv4.mp4 5.7 MB
~Get Your Files Here !/1. The OSI Model/3. Data Link Layer.mp4 5.7 MB
~Get Your Files Here !/1. The OSI Model/2. Physical Layer.mp4 4.8 MB
~Get Your Files Here !/1. The OSI Model/4. Network Layer.mp4 4.5 MB
~Get Your Files Here !/8. LAN & WAN Technologies/1. LAN & WAN Technologies.mp4 4.2 MB
~Get Your Files Here !/3. MAC Address/1. MAC Address.mp4 4.0 MB
~Get Your Files Here !/6. TCP & UDP/6. Telnet.mp4 4.0 MB
~Get Your Files Here !/1. The OSI Model/5. Transport Layer.mp4 3.6 MB
~Get Your Files Here !/4. IPv4 Vs. IPv6/2. IPv6.mp4 3.6 MB
~Get Your Files Here !/6. TCP & UDP/7. FTP.mp4 3.5 MB
~Get Your Files Here !/1. The OSI Model/8. Application Layer.mp4 3.3 MB
~Get Your Files Here !/6. TCP & UDP/8. SSH.mp4 3.2 MB
~Get Your Files Here !/1. The OSI Model/7. Presentation Layer.mp4 3.1 MB
~Get Your Files Here !/6. TCP & UDP/4. ICMP.mp4 3.0 MB
~Get Your Files Here !/8. LAN & WAN Technologies/2. LAN & WAN Technologies Packet-Switching Technologies.mp4 3.0 MB
~Get Your Files Here !/6. TCP & UDP/2. TCP Ports.mp4 2.9 MB
猜你喜欢:
Addressing
TutGator
Cybersecurity
IP
Udemy
Beginners
MAC
com
- 【影视】 Udemy - Sicurezza Informatica e CyberSecurity per Principianti! [Ita]
-
收录时间:2023-12-19
文档个数:211
文档大小:7.7 GB
最近下载:2025-05-15
人气:8528
磁力链接
5. HIDS - Host Intrusion DetectionPrevention System/3. Installazione OSSEC - Componente AGENT.mp4 164.1 MB
2. Analisi del Traffico di Rete/12. Analisi del Protocollo TCP.mp4 123.1 MB
11. System Inventory Tool/7. Installazione di ReactOS.mp4 105.4 MB
3. Firewalling/30. pfSense - Il servizio DNS.mp4 99.8 MB
2. Analisi del Traffico di Rete/16. Analisi della Scansione SYN SCAN con ZenMap.mp4 97.3 MB
2. Analisi del Traffico di Rete/7. Analisi del Protocollo ARP.mp4 93.6 MB
4. IDS IPS - Intrusion DetectionPrevention System/18. SNORT - Rilevamento Pacchetti ICMP.mp4 88.0 MB
16. BONUS 2 Deep Web - Un'introduzione/7. Introduzione a TAILS.mp4 85.8 MB
15. BONUS 1 Labtainers - Un Laboratorio di Cyber Security/8. Laboratorio TELNET.mp4 84.4 MB
14. Linux Hardening - Le Basi/6. Utilizzo di TCPDUMP per l'Analisi del Traffico di Rete.mp4 77.3 MB
16. BONUS 2 Deep Web - Un'introduzione/5. Rete TOR su WIndows.mp4 76.2 MB
14. Linux Hardening - Le Basi/1. Configurazione Utenti con Sudo Access.mp4 71.3 MB
12. Honeypot/5. Scansione e Rilevamento utilizzando Kali Linux e KFsensor.mp4 69.9 MB
10. SIEM - Security Information and Event Management/4. Caricamento Manuale dei Dati.mp4 67.1 MB
2. Analisi del Traffico di Rete/9. Analisi del Protocollo DNS.mp4 65.6 MB
12. Honeypot/6. Modifica delle Porte TCPUDP.mp4 65.2 MB
4. IDS IPS - Intrusion DetectionPrevention System/29. SNORT - Rilevamento Scansione FIN XMAS Scan.mp4 63.8 MB
3. Firewalling/16. Analisi del Traffico di Rete.mp4 62.9 MB
4. IDS IPS - Intrusion DetectionPrevention System/26. SNORT - Rilevamento Scansione Ping Sweep.mp4 62.0 MB
14. Linux Hardening - Le Basi/5. AbilitazioneDisabilitazione di Account.mp4 61.4 MB
猜你喜欢:
Principianti
CyberSecurity
Informatica
Sicurezza
per
Udemy
Ita
- 【影视】 [Coursera] Advanced Python Scripting for Cybersecurity Specialization - 3 course series
-
收录时间:2024-05-24
文档个数:97
文档大小:947.7 MB
最近下载:2025-05-15
人气:5150
磁力链接
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_04_detecting-ssh-brute-force-with-scapy.mp4 49.7 MB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_07_connection-hijacking-with-scapy.mp4 48.4 MB
python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_02_generating-password-variations-with-python.mp4 46.5 MB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_05_service-detection-with-python.mp4 45.6 MB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_05_feature-selection-for-traffic-analysis.mp4 45.2 MB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_03_searching-the-registry-with-python.mp4 45.2 MB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_02_querying-shodan-with-python.mp4 44.0 MB
establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_02_traffic-analysis-with-python.mp4 43.7 MB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_04_network-scanning-with-scapy.mp4 38.8 MB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_02_brute-force-detection-with-windows-events.mp4 38.8 MB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_03_detecting-ftp-brute-force-with-scapy.mp4 35.1 MB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_04_searching-the-system-with-python.mp4 34.9 MB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_02_dumping-chrome-credentials-with-python.mp4 34.8 MB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_06_analyzing-passwords-with-python.mp4 34.5 MB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_03_dns-queries-with-python.mp4 30.9 MB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_06_detecting-anomalous-network-traffic-with-scapy.mp4 28.8 MB
establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_05_building-c2-packets-with-python.mp4 27.1 MB
python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_04_automating-brute-force.mp4 25.9 MB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_05_cracking-the-linux-passwords-with-python.mp4 24.4 MB
establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_04_detecting-encodings-with-python.mp4 24.1 MB
猜你喜欢:
Specialization
course
Python
series
Coursera
Cybersecurity
Advanced
Scripting
- 【影视】 [ DevCourseWeb.com ] Linkedin - Exam Tips - CompTIA Cybersecurity Analyst + (CySA + ) (CS0-003)
-
收录时间:2023-12-19
文档个数:38
文档大小:240.4 MB
最近下载:2025-05-15
人气:1197
磁力链接
~Get Your Files Here !/02 - 1. Exploring the CySA+ Domains/01 - Careers in information security.mp4 36.3 MB
~Get Your Files Here !/01 - Introduction/01 - About the CYSA+ exam.mp4 33.6 MB
~Get Your Files Here !/03 - 2. Exploring the CySA+ Domains/01 - Security Operations.mp4 28.6 MB
~Get Your Files Here !/03 - 2. Exploring the CySA+ Domains/02 - Vulnerability Management.mp4 17.7 MB
~Get Your Files Here !/02 - 1. Exploring the CySA+ Domains/02 - Value of certification.mp4 14.4 MB
~Get Your Files Here !/02 - 1. Exploring the CySA+ Domains/03 - Stackable certifications.mp4 13.1 MB
~Get Your Files Here !/03 - 2. Exploring the CySA+ Domains/03 - Incident Response Management.mp4 12.5 MB
~Get Your Files Here !/01 - Introduction/02 - What's new in CS0-003.mp4 12.2 MB
~Get Your Files Here !/03 - 2. Exploring the CySA+ Domains/04 - Reporting and Communication.mp4 11.0 MB
~Get Your Files Here !/04 - 3. Inside the CySA+ Exam/02 - CySA+ in-person exam environment.mp4 10.5 MB
~Get Your Files Here !/04 - 3. Inside the CySA+ Exam/01 - The CySA+ exam.mp4 8.4 MB
~Get Your Files Here !/04 - 3. Inside the CySA+ Exam/05 - Passing the CySA+ exam.mp4 8.2 MB
~Get Your Files Here !/04 - 3. Inside the CySA+ Exam/04 - CySA+ question types.mp4 7.8 MB
~Get Your Files Here !/05 - 4. Preparing for the CySA+ Exam/01 - Study resources.mp4 6.7 MB
~Get Your Files Here !/06 - Conclusion/01 - Continuing education requirements.mp4 6.0 MB
~Get Your Files Here !/05 - 4. Preparing for the CySA+ Exam/02 - Exam tips.mp4 4.7 MB
~Get Your Files Here !/06 - Conclusion/02 - Next steps.mp4 4.3 MB
~Get Your Files Here !/04 - 3. Inside the CySA+ Exam/03 - At-home testing.mp4 4.2 MB
~Get Your Files Here !/01 - Introduction/02 - What's new in CS0-003.srt 7.4 kB
~Get Your Files Here !/02 - 1. Exploring the CySA+ Domains/01 - Careers in information security.srt 6.7 kB
猜你喜欢:
003
Exam
Cybersecurity
CySA
Linkedin
CS0
DevCourseWeb
CompTIA
Tips
com
- 【影视】 Cybersecurity Closer Look Labs
-
收录时间:2025-02-05
文档个数:26
文档大小:502.3 MB
最近下载:2025-05-15
人气:1599
磁力链接
004. 03 00 Digital Certificates.mp4 46.0 MB
019. 18 00 Risk Terminology.mp4 45.9 MB
020. 19 00 SSL and TLS Packet Capture.mp4 35.4 MB
013. 12 00 Powershell.mp4 29.1 MB
021. 20 00 Star and Simple Properties.mp4 27.5 MB
023. 22 00 Wireless Heat Maps.mp4 26.8 MB
015. 14 00 Pwned Passwords.mp4 26.6 MB
007. 06 00 IPv6 Addressing.mp4 23.9 MB
008. 07 00 Log Files.mp4 21.7 MB
012. 11 00 Policies and Standards.mp4 21.3 MB
010. 09 00 Passive Reconnaissance.mp4 19.3 MB
024. 23 00 ZenMap.mp4 18.2 MB
006. 05 00 Honeypots.mp4 18.0 MB
009. 08 00 Malware Analysis.mp4 17.7 MB
002. 01 00 Cloud Controls.mp4 17.3 MB
016. 15 00 Quantitative Risk Analysis.mp4 14.3 MB
003. 02 00 Constructing Error Messages.mp4 13.8 MB
017. 16 00 RAID.mp4 11.8 MB
025. 24 00 Zero-day Vulnerabilities.mp4 11.3 MB
005. 04 00 Hashing and HMACS.mp4 10.6 MB
猜你喜欢:
Cybersecurity
Closer
Look
Labs
- 【影视】 Certified in Cybersecurity - CC (ISC)²
-
收录时间:2023-12-18
文档个数:68
文档大小:548.0 MB
最近下载:2025-05-15
人气:5909
磁力链接
Lesson 3 Business Continuity (BC), Disaster Recovery (DR), and Incident Response Concepts/004. 3.3 Understanding Incident Response.mp4 66.3 MB
Lesson 5 Network Security/006. 5.5 Introducing Cloud Security.mp4 51.7 MB
Lesson 5 Network Security/004. 5.3 Understanding Network Security Infrastructure.mp4 38.5 MB
Lesson 6 Security Operations/002. 6.1 Understanding Data Security.mp4 36.6 MB
Lesson 2 Security Principles/003. 2.2 Understanding the Risk Management Process.mp4 31.9 MB
Lesson 5 Network Security/003. 5.2 Understanding Network Threats and Attacks.mp4 29.4 MB
Lesson 5 Network Security/002. 5.1 Understanding Computer Networking.mp4 28.5 MB
Lesson 2 Security Principles/002. 2.1 Understanding the Security Concepts of Information Assurance.mp4 22.3 MB
Lesson 4 Access Control Concepts/006. 4.5 Understanding Mandatory Access Control (MAC).mp4 20.6 MB
Lesson 6 Security Operations/003. 6.2 Understanding Hashing.mp4 18.4 MB
Lesson 2 Security Principles/005. 2.4 Understanding Governance Processes.mp4 17.9 MB
Lesson 5 Network Security/005. 5.4 Introducing Network Segmentation.mp4 17.1 MB
Lesson 3 Business Continuity (BC), Disaster Recovery (DR), and Incident Response Concepts/003. 3.2 Understanding Disaster Recovery (DR).mp4 16.4 MB
Lesson 6 Security Operations/006. 6.5 Understanding Security Awareness Training.mp4 14.0 MB
Lesson 4 Access Control Concepts/005. 4.4 Introducing Discretionary Access Control (DAC).mp4 12.9 MB
Lesson 6 Security Operations/005. 6.4 Understanding Best Practice Security Policies.mp4 12.9 MB
Lesson 3 Business Continuity (BC), Disaster Recovery (DR), and Incident Response Concepts/002. 3.1 Understanding Business Continuity (BC).mp4 12.8 MB
Introduction/001. Certified in Cybersecurity - CC (ISC)² Introduction.mp4 11.6 MB
Lesson 1 Exam Preparation/002. 1.1 Introducing the (ISC)² Certified in Cybersecurity Exam.mp4 11.4 MB
Lesson 4 Access Control Concepts/002. 4.1 Understanding Physical Access Controls.mp4 10.0 MB
猜你喜欢:
Cybersecurity
CC
Certified
ISC
- 【压缩文件】 [ FreeCourseWeb.com ] Udemy - Cybersecurity Data Science.zip
-
收录时间:2022-04-08
文档个数:1
文档大小:349.0 MB
最近下载:2025-05-15
人气:179
磁力链接
[ FreeCourseWeb.com ] Udemy - Cybersecurity Data Science.zip 349.0 MB
猜你喜欢:
zip
Data
Cybersecurity
Science
Udemy
FreeCourseWeb
com
- 【影视】 Cybersecurity and Artificial Intelligence
-
收录时间:2024-09-08
文档个数:10
文档大小:99.9 MB
最近下载:2025-05-15
人气:2532
磁力链接
01. Cybersecurity and Artificial Intelligence/01. Cybersecurity and AI Overview.mp4 24.4 MB
01. Cybersecurity and Artificial Intelligence/02. Demo- Importance of Understanding AI in Cybersecurity.mp4 23.9 MB
01. Cybersecurity and Artificial Intelligence/03. Phishing and BEC Real-world Examples.mp4 10.8 MB
01. Cybersecurity and Artificial Intelligence/08. Demo- Deepfake.mp4 8.0 MB
cybersecurity-artificial-intelligence.zip 7.4 MB
01. Cybersecurity and Artificial Intelligence/04. Voicemail Scams - Examples and How to Avoid.mp4 7.3 MB
01. Cybersecurity and Artificial Intelligence/05. Adhering to Company Policies and Guidelines.mp4 5.8 MB
01. Cybersecurity and Artificial Intelligence/06. AI Hallucinations.mp4 5.8 MB
01. Cybersecurity and Artificial Intelligence/09. Mitigating the AI Threats.mp4 3.3 MB
01. Cybersecurity and Artificial Intelligence/07. Criminal Usage of AI.mp4 3.3 MB
猜你喜欢:
Cybersecurity
Intelligence
Artificial