磁力管家

磁力管家
为您索检到268条磁力链接,耗时2毫秒。 rss

分享给好友

【影视】 Coursera - Microsoft Cybersecurity Analyst Professional Certificate 2024
收录时间:2025-01-02 文档个数:1807 文档大小:6.5 GB 最近下载:2025-05-15 人气:636 磁力链接
  • mp4Coursera - Advanced Cybersecurity Concepts and Capstone Project 2024-1/03_security-conscious-modeling/03_mitigation-strategies/06_network-security.mp4 78.1 MB
  • mp4Coursera - Cybersecurity Solutions and Microsoft Defender 2024-1/01_azure-basic-security-capabilities/03_azure-firewall-protection/11_hackers-and-firewalls.mp4 49.8 MB
  • mp4Coursera - Cybersecurity Tools and Technologies 2024-1/03_azure-penetration-testing/03_running-the-test/06_cold-wars-at-sams-scoops.mp4 38.4 MB
  • mp4Coursera - Cybersecurity Identity and Access Solutions using Azure AD 2024-1/03_active-directory-access-protection-and-governance-management/02_roles-and-role-based-access/04_roles-in-action.mp4 38.0 MB
  • mp4Coursera - Cybersecurity Solutions and Microsoft Defender 2024-1/03_microsoft-365-defender-threat-protection/03_identity-defense/07_identity-theft.mp4 33.2 MB
  • mp4Coursera - Introduction to Computers and Operating Systems and Security 2024-1/01_introduction-to-computers-and-operating-systems/01_course-introduction/01_introduction-to-the-program-microsoft-cybersecurity-analyst.mp4 33.1 MB
  • mp4Coursera - Cybersecurity Management and Compliance 2024-1/02_compliance-solutions/03_information-protection-and-data-lifecycle/03_data-concerns.mp4 30.3 MB
  • mp4Coursera - Advanced Cybersecurity Concepts and Capstone Project 2024-1/02_advanced-threats-and-mitigation/01_susceptible-infrastructure-and-types-of-attack/06_attack-techniques.mp4 30.0 MB
  • mp4Coursera - Advanced Cybersecurity Concepts and Capstone Project 2024-1/01_threat-modeling/03_threat-modeling-strategies/08_visual-agile-and-simple-threat-vast.mp4 26.3 MB
  • mp4Coursera - Introduction to Networking and Cloud Computing 2024-1/04_cloud-computing-and-networking/02_virtual-environments/03_virtual-world.mp4 26.1 MB
  • mp4Coursera - Introduction to Computers and Operating Systems and Security 2024-1/03_business-systems-applications/03_storage-solutions/06_artificial-intelligence-and-machine-learning.mp4 25.9 MB
  • mp4Coursera - Microsoft SC-900 Exam Preparation and Practice 2024-1/01_concepts-of-security-compliance-and-identity/04_identity-concepts/06_id-and-active-directory.mp4 24.6 MB
  • mp4Coursera - Cybersecurity Solutions and Microsoft Defender 2024-1/03_microsoft-365-defender-threat-protection/01_defender-services/01_introduction-to-microsoft-365-defender.mp4 23.4 MB
  • mp4Coursera - Cybersecurity Tools and Technologies 2024-1/03_azure-penetration-testing/01_the-command-line-and-windows-powershell/01_introduction-to-command-line.mp4 23.3 MB
  • mp4Coursera - Microsoft SC-900 Exam Preparation and Practice 2024-1/04_the-capabilities-of-microsoft-compliance-solutions/03_information-protection-and-data-lifecycle-management-capabilities-of-microsoft/09_module-summary-capabilities-of-microsoft-compliance-solutions.mp4 23.3 MB
  • mp4Coursera - Advanced Cybersecurity Concepts and Capstone Project 2024-1/01_threat-modeling/03_threat-modeling-strategies/04_process-for-attack-simulation-and-threat-analysis-pasta.mp4 23.2 MB
  • mp4Coursera - Advanced Cybersecurity Concepts and Capstone Project 2024-1/04_capstone-project/01_capstone-project/01_course-recap-advanced-cybersecurity-concepts.mp4 23.0 MB
  • mp4Coursera - Microsoft SC-900 Exam Preparation and Practice 2024-1/02_the-capabilities-of-microsoft-azure-active-directory/03_identity-protection-and-governance-capabilities-of-azure-ad/01_identity-governance-in-azure-ad.mp4 22.4 MB
  • mp4Coursera - Advanced Cybersecurity Concepts and Capstone Project 2024-1/01_threat-modeling/04_azure-and-threat-modeling/02_threat-modeling-for-azure-virtual-networks.mp4 22.3 MB
  • mp4Coursera - Cybersecurity Solutions and Microsoft Defender 2024-1/01_azure-basic-security-capabilities/02_distributed-denial-of-service-ddos-protection/01_azure-ddos-protection-overview.mp4 22.3 MB
【影视】 [ FreeCourseWeb.com ] Linkedin - Cybersecurity For Musicians, Producers, And Studios
收录时间:2025-02-24 文档个数:17 文档大小:1.2 GB 最近下载:2025-05-15 人气:673 磁力链接
  • mp4~Get Your Files Here !/4 - Leveraging Technology for IP Protection/11 - Antipiracy software and techniques Royalty Management.mp4 173.2 MB
  • mp4~Get Your Files Here !/4 - Leveraging Technology for IP Protection/8 - Using blockchain for music rights management.mp4 123.5 MB
  • mp4~Get Your Files Here !/4 - Leveraging Technology for IP Protection/9 - Antipiracy software and techniques AI Protection Content ID Watermarking.mp4 112.9 MB
  • mp4~Get Your Files Here !/1 - Introduction/1 - Welcome and introduction.mp4 101.3 MB
  • mp4~Get Your Files Here !/4 - Leveraging Technology for IP Protection/10 - Antipiracy software and techniques Copyright PROs.mp4 95.2 MB
  • mp4~Get Your Files Here !/4 - Leveraging Technology for IP Protection/13 - Antipiracy software and techniques Direct Fan Engagement.mp4 93.6 MB
  • mp4~Get Your Files Here !/2 - Protecting Digital Assets/4 - Tools for secure data storage and sharing.mp4 70.3 MB
  • mp4~Get Your Files Here !/5 - Action Plan for Musicians and Businesses/14 - Building a cybersecurity strategy.mp4 68.4 MB
  • mp4~Get Your Files Here !/2 - Protecting Digital Assets/5 - Backup regularly.mp4 67.4 MB
  • mp4~Get Your Files Here !/4 - Leveraging Technology for IP Protection/12 - Antipiracy software and techniques Secure Distribution Platforms.mp4 57.2 MB
  • mp4~Get Your Files Here !/3 - Secure Music Streaming and Distribution/7 - Risks and best practices in streaming distribution platforms and sharing music.mp4 54.4 MB
  • mp4~Get Your Files Here !/2 - Protecting Digital Assets/3 - Steps to safeguard recordings intellectual property and creative works.mp4 49.6 MB
  • mp4~Get Your Files Here !/6 - Conclusion and Wrap Up/15 - Conclusion.mp4 48.1 MB
  • mp4~Get Your Files Here !/2 - Protecting Digital Assets/6 - Access control.mp4 35.3 MB
  • mp4~Get Your Files Here !/1 - Introduction/2 - Understanding Cybersecurity Threats in Music.mp4 25.4 MB
  • urlGet Bonus Downloads Here.url 183 Bytes
  • txt~Get Your Files Here !/Bonus Resources.txt 70 Bytes
【影视】 DIY Cybersecurity Degree
收录时间:2024-05-07 文档个数:7179 文档大小:233.4 GB 最近下载:2025-05-15 人气:1770 磁力链接
  • mp4100 Days of Code The Complete Python Pro Bootcamp for 2023/101 - Final Stretch/002 Study With Me.mp4 1.9 GB
  • mp4100 Days of Code The Complete Python Pro Bootcamp for 2023/101 - Final Stretch/001 Recording of our Live AMA (aka AAA - Ask Angela Anything).mp4 713.4 MB
  • mp4CompTIA/CompTIA A+ Core 1 (220-1101)/5. Troubleshooting Hardware and Networking/5.2 Troubleshooting PC Components.mp4 697.8 MB
  • mp4CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.1 Network Cables.mp4 637.3 MB
  • mp4CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.4 Random-access Memory.mp4 579.5 MB
  • mp4Job Tips/Behavioral Interview Prep/03. General Tips.mp4 571.0 MB
  • mp4CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.4 Technical Controls - The Basics.mp4 551.2 MB
  • mp4CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.6 Motherboards.mp4 540.8 MB
  • mp4CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.5 Storage Devices.mp4 527.8 MB
  • mp4CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.3 Non-Technical Controls - The Rest.mp4 526.4 MB
  • mp4CompTIA/CompTIA A+ Core 1 (220-1101)/1. Mobile Devices/1.2 Laptop Hardware and Components.mp4 525.8 MB
  • mp4CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.8 How do we Analyze Risk.mp4 509.3 MB
  • mp4CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.23 Social Engineering and Physical Attacks.mp4 498.2 MB
  • mp4CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.2 Non-Technical Controls - The Basics.mp4 486.5 MB
  • mp4CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.2 Peripheral and Video Cables.mp4 485.9 MB
  • mp4CompTIA/CompTIA PenTest + (PT0-002)/4. Reporting and Communication/4.3 Communication During a Pentest.mp4 478.0 MB
  • mp4CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.14 Frameworks, Audits and Policy.mp4 473.1 MB
  • mp4CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.10 How do we Document and Train for Risk.mp4 472.2 MB
  • mp4CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.15 IAM Policies and Procedures.mp4 463.2 MB
  • mp4CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.9 How do we Prioritize, Communicate Risk.mp4 460.5 MB
【压缩文件】 [DesireCourse.Com] Udemy - A Hacker's Guide to Internet Safety and Cybersecurity
收录时间:2018-08-02 文档个数:3 文档大小:2.5 GB 最近下载:2025-05-15 人气:1467 磁力链接
  • zip[DesireCourse.Com] Udemy - A Hacker's Guide to Internet Safety and Cybersecurity.zip 2.5 GB
  • txt[DesireCourse.Com].txt 828 Bytes
  • url[DesireCourse.Com].url 51 Bytes
【影视】 Cybersecurity Foundations From Zero to Pro - Bootcamp
收录时间:2023-12-18 文档个数:63 文档大小:5.6 GB 最近下载:2025-05-15 人气:11512 磁力链接
  • mp4[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/7. PCAP Or It Didn't Happen/2. Module 7.2 Header Analysis.mp4 422.2 MB
  • mp4[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/3. Introduction to Networking/3. Module 3.3 Network Protocols.mp4 366.7 MB
  • mp4[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/8. Blue Team Operations/3. Module 8.3 Network, Encryption, and PKI.mp4 315.3 MB
  • mp4[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/3. Introduction to Networking/2. Module 3.2 Devices and IPs.mp4 313.0 MB
  • mp4[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/4. The Beast That Is The Windows Operating System/5. Module 4.5 Active Directory and Commands.mp4 312.3 MB
  • mp4[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/1. How Computers Function/3. Module 1.3 Hardware and Memory.mp4 265.3 MB
  • mp4[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/2. Computers and their Operating Systems/4. Module 2.4 The Linux Operating System.mp4 253.5 MB
  • mp4[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/6. Back to Networking/4. Module 6.4 How to Subnet.mp4 220.3 MB
  • mp4[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/3. Introduction to Networking/1. Module 3.1 Network Organization.mp4 217.5 MB
  • mp4[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/6. Back to Networking/1. Module 6.1 Routers and Switches, Again.mp4 213.9 MB
  • mp4[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/5. Hooked on Unix/2. Module 5.2 PIDs, Variables, and File System.mp4 204.3 MB
  • mp4[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/8. Blue Team Operations/2. Module 8.2 Methodology and Terminology.mp4 201.7 MB
  • mp4[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/3. Introduction to Networking/4. Module 3.4 Network Concepts.mp4 199.6 MB
  • mp4[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/4. The Beast That Is The Windows Operating System/1. Module 4.1 Users, Logging, and the Registry.mp4 184.9 MB
  • mp4[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/8. Blue Team Operations/1. Module 8.1 Vulnerability Management.mp4 171.6 MB
  • mp4[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/7. PCAP Or It Didn't Happen/4. Module 7.4 Attacks in PCAP.mp4 143.7 MB
  • mp4[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/4. The Beast That Is The Windows Operating System/2. Module 4.2 Windows Processes and Logon Activity.mp4 136.9 MB
  • mp4[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/4. The Beast That Is The Windows Operating System/3. Module 4.3 Windows File System.mp4 136.0 MB
  • mp4[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/1. How Computers Function/1. Module 1.1 Numbers.mp4 129.6 MB
  • mp4[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/2. Computers and their Operating Systems/3. Module 2.3 The Windows Operating System.mp4 128.6 MB
【影视】 ZeroToMastery - Complete Cybersecurity Bootcamp
收录时间:2024-01-09 文档个数:97 文档大小:3.6 GB 最近下载:2025-05-15 人气:2777 磁力链接
  • mp48-Network Security/052-Network Security With Nmap.mp4 169.9 MB
  • mp45-Security Bugs & Vulnerabilities/020-Buffer Overflow Demonstration.mp4 136.7 MB
  • mp412-Appendix - Ethical Hacking/087-Msfconsole Basic Commands.mp4 97.5 MB
  • mp48-Network Security/059-Wireless Attack Demonstration.mp4 93.4 MB
  • mp47-End-Point Protection/034-Password Security and Password Managers.mp4 84.2 MB
  • mp412-Appendix - Ethical Hacking/093-Meterpreter Basic Commands Part 1.mp4 78.5 MB
  • mp47-End-Point Protection/038-Process Explorer.mp4 75.8 MB
  • mp41-Introduction/001-Cybersecurity Bootcamp - Zero to Mastery.mp4 72.4 MB
  • mp48-Network Security/057-Secure Network Architecture.mp4 66.8 MB
  • mp412-Appendix - Ethical Hacking/094-Meterpreter Basic Commands Part 2.mp4 65.7 MB
  • mp47-End-Point Protection/033-Bitdefender, Kaspersky, McAfee, Malwarebytes.mp4 63.9 MB
  • mp44-Understanding Hackers - The Biggest Threat/012-Most Common Attacks Demonstration.mp4 63.5 MB
  • mp48-Network Security/060-Network Monitoring With TCPDump.mp4 62.7 MB
  • mp48-Network Security/058-Wireless Security.mp4 59.6 MB
  • mp45-Security Bugs & Vulnerabilities/017-Unpatched Machine Exploitation Demonstration.mp4 59.1 MB
  • mp412-Appendix - Ethical Hacking/080-Whatweb Stealthy Scan.mp4 58.1 MB
  • mp412-Appendix - Ethical Hacking/091-Advance Msfvenom Usage.mp4 51.4 MB
  • mp47-End-Point Protection/043-Iptables.mp4 50.9 MB
  • mp47-End-Point Protection/028-Brave Browser Security and Privacy.mp4 50.6 MB
  • mp412-Appendix - Ethical Hacking/089-Software Vulnerability - Samba Exploitation.mp4 49.5 MB
【压缩文件】 [ DevCourseWeb.com ] Udemy - Introduction to Cybersecurity - For Software Developers.zip
收录时间:2022-01-09 文档个数:1 文档大小:1.4 GB 最近下载:2025-05-15 人气:662 磁力链接
  • zip[ DevCourseWeb.com ] Udemy - Introduction to Cybersecurity - For Software Developers.zip 1.4 GB
【影视】 Lynda - Cybersecurity for Small and Medium Businesses Essential Training
收录时间:2018-07-25 文档个数:66 文档大小:358.3 MB 最近下载:2025-05-15 人气:1587 磁力链接
  • srt1.Introduction/01.Welcome.en.srt 2.1 kB
  • mp41.Introduction/01.Welcome.mp4 21.9 MB
  • srt1.Introduction/02.What you should know.en.srt 1.5 kB
  • mp41.Introduction/02.What you should know.mp4 5.0 MB
  • srt2.1. The Basics/03.Why you should care.en.srt 6.7 kB
  • mp42.1. The Basics/03.Why you should care.mp4 31.6 MB
  • srt2.1. The Basics/04.Physical security vs. cybersecurity.en.srt 1.9 kB
  • mp42.1. The Basics/04.Physical security vs. cybersecurity.mp4 4.8 MB
  • srt2.1. The Basics/05.Anyone can improve the cybersecurity of a business.en.srt 3.4 kB
  • mp42.1. The Basics/05.Anyone can improve the cybersecurity of a business.mp4 9.1 MB
  • srt2.1. The Basics/06.What are the cybersecurity threat actions facing businesses.en.srt 4.5 kB
  • mp42.1. The Basics/06.What are the cybersecurity threat actions facing businesses.mp4 6.9 MB
  • srt2.1. The Basics/07.What are the cybersecurity threats.en.srt 6.4 kB
  • mp42.1. The Basics/07.What are the cybersecurity threats.mp4 14.6 MB
  • srt2.1. The Basics/08.A five-step process to improve cybersecurity.en.srt 3.9 kB
  • mp42.1. The Basics/08.A five-step process to improve cybersecurity.mp4 7.2 MB
  • srt3.2. Identify/09.Step #1 - Identify key assets.en.srt 3.1 kB
  • mp43.2. Identify/09.Step #1 - Identify key assets.mp4 9.5 MB
  • srt3.2. Identify/10.Inventory sheet - Data and devices.en.srt 1.9 kB
  • mp43.2. Identify/10.Inventory sheet - Data and devices.mp4 3.1 MB
【影视】 Cybersecurity Threat Hunting for SOC Analysts
收录时间:2022-05-05 文档个数:245 文档大小:6.2 GB 最近下载:2025-05-15 人气:10475 磁力链接
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/10. Adversary Emulation Caldera.mp4 359.9 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/12. Enhanced Lab Realism Bad Blood + Microsoft ATA + Bloodhound!.mp4 338.8 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/1. Threat Hunting with Splunk + Zeek.mp4 243.3 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/7. Adversary Emulation Atomic Red Team + MITRE ATT&CK.mp4 242.7 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/6. Purple Team Scenario Meterpreter + MSFVenom + Process Injection + Velociraptor!.mp4 225.7 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/3. The Modern Threat Hunting Mindset.mp4 225.3 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/5. The Methodical Guide to Effective Threat Hunting/1. Finding Beacons Long and Cumulative Connections.mp4 201.8 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/6. Proofs Detecting False Negatives/2. Suricata vs RITA Zeus Malware.mp4 195.4 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/5. The Methodical Guide to Effective Threat Hunting/5. Finding Beacons Business Need Analysis (Part 4).mp4 194.3 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/2. Threat Hunting with Splunk + Sysmon.mp4 153.3 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/5. The Methodical Guide to Effective Threat Hunting/4. Finding Beacons Business Need Analysis (Part 3).mp4 139.4 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/5. Beaconing DNS.mp4 135.2 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/8. Beaconing Detection Session Size Analysis.mp4 133.5 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/6. Proofs Detecting False Negatives/1. Suricata Capabilities + Installation!.mp4 129.8 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/3. Tools and resources/8. zeek.mp4 126.9 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/2. The Broken Threat Hunting Mindset.mp4 126.1 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/3. Tools and resources/9. Using zeek + Rita to find Evil!.mp4 118.9 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/1. Understanding the New Adversary.mp4 118.7 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/6. Beaconing CDN.mp4 117.8 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/5. Purple Team Scenario Mimikatz.mp4 115.6 MB
【影视】 [ TutSala.com ] Udemy - Cybersecurity For Beginners - Network Architecture
收录时间:2022-01-09 文档个数:124 文档大小:1.0 GB 最近下载:2025-05-15 人气:3002 磁力链接
  • mp4~Get Your Files Here !/17. Lab Demonstration - Scanning Networks with NMAP Pt. 1/1. Lab Demonstration - Scanning Networks with NMAP Pt. 1.mp4 477.0 MB
  • mp4~Get Your Files Here !/18. Lab Demonstration - Scanning Networks with NMAP Pt. 2/1. Lab Demonstration - Scanning Networks with NMAP Pt. 2.mp4 331.7 MB
  • mp4~Get Your Files Here !/11. Denial-of-Service Attack (DoS) Attack/2. The 5 Principal Differences Between DoS & DDoS Attacks.mp4 14.1 MB
  • mp4~Get Your Files Here !/11. Denial-of-Service Attack (DoS) Attack/6. Common DoS Attack Pt. 2.mp4 9.8 MB
  • mp4~Get Your Files Here !/7. Network Devices/1. Common Network Devices.mp4 8.9 MB
  • mp4~Get Your Files Here !/1. The OSI Model/1. The OSI Model.mp4 7.8 MB
  • mp4~Get Your Files Here !/11. Denial-of-Service Attack (DoS) Attack/5. Common DoS Attack Pt. 1.mp4 6.9 MB
  • mp4~Get Your Files Here !/14. DNS Attacks/1. DNS Attacks.mp4 6.4 MB
  • mp4~Get Your Files Here !/7. Network Devices/2. More Common Network Devices.mp4 6.2 MB
  • mp4~Get Your Files Here !/11. Denial-of-Service Attack (DoS) Attack/1. DoS Vs. DDoS.mp4 6.0 MB
  • mp4~Get Your Files Here !/4. IPv4 Vs. IPv6/1. IPv4.mp4 5.7 MB
  • mp4~Get Your Files Here !/1. The OSI Model/3. Data Link Layer.mp4 5.7 MB
  • mp4~Get Your Files Here !/10. Intrusion Detection Systems (IDS) & Intrusion Prevention Systems (IPS)/2. Behavior Based IDS Vs. Knowledge Based IDS.mp4 5.5 MB
  • mp4~Get Your Files Here !/15. What is Footprinting/3. Footprinting Helps To.mp4 5.4 MB
  • mp4~Get Your Files Here !/15. What is Footprinting/4. Footprinting Methodology.mp4 5.4 MB
  • mp4~Get Your Files Here !/11. Denial-of-Service Attack (DoS) Attack/7. Three-Way-Handshake Importance To Network Attacks (SYN Flood).mp4 5.2 MB
  • mp4~Get Your Files Here !/9. Types of Firewalls/2. Types of Firewalls Pt. 2.mp4 5.1 MB
  • mp4~Get Your Files Here !/1. The OSI Model/2. Physical Layer.mp4 4.8 MB
  • mp4~Get Your Files Here !/9. Types of Firewalls/1. Types of Firewalls Pt. 1.mp4 4.6 MB
  • mp4~Get Your Files Here !/1. The OSI Model/4. Network Layer.mp4 4.5 MB
【影视】 [ FreeCourseWeb.com ] Udemy - Cybersecurity Solution Architecture 201
收录时间:2025-05-01 文档个数:14 文档大小:1.4 GB 最近下载:2025-05-15 人气:830 磁力链接
  • mp4~Get Your Files Here !/10 -Advanced Governance, Risk, & Compliance (GRC).mp4 160.7 MB
  • mp4~Get Your Files Here !/11 -Advanced Incident Response & Digital Forensics.mp4 156.8 MB
  • mp4~Get Your Files Here !/6 -Advanced Identity & Access Management (IAM).mp4 133.3 MB
  • mp4~Get Your Files Here !/4 -Infrastructure as Code (IaC) & Automated Security.mp4 133.1 MB
  • mp4~Get Your Files Here !/13 -Wrap-Up & Preparation for 301.mp4 122.8 MB
  • mp4~Get Your Files Here !/8 -Cloud & Hybrid Environment Security Advanced Topics.mp4 118.3 MB
  • mp4~Get Your Files Here !/9 -Security Operations, Threat Intelligence & Threat Hunting.mp4 107.5 MB
  • mp4~Get Your Files Here !/12 -In depth enterprise cybersecurity best practices, use cases, and examples.mp4 105.3 MB
  • mp4~Get Your Files Here !/2 -Advanced Threat Modeling.mp4 100.1 MB
  • mp4~Get Your Files Here !/7 -Data Protection & Privacy by Design.mp4 97.5 MB
  • mp4~Get Your Files Here !/3 -Zero Trust Architecture.mp4 97.1 MB
  • mp4~Get Your Files Here !/1 -Course Introduction & 101 Recap.mp4 69.3 MB
  • urlGet Bonus Downloads Here.url 183 Bytes
  • txt~Get Your Files Here !/Bonus Resources.txt 70 Bytes
【压缩文件】 EC-Council - Cybersecurity attack and Defense
收录时间:2024-01-05 文档个数:1 文档大小:10.5 GB 最近下载:2025-05-15 人气:1293 磁力链接
  • zipEC-Council - Cybersecurity Attack and Defense Fundamentals Specialization.zip 10.5 GB
【影视】 [ TutGator.com ] Udemy - Cybersecurity For Beginners - MAC and IP Addressing
收录时间:2022-01-21 文档个数:66 文档大小:263.9 MB 最近下载:2025-05-15 人气:1451 磁力链接
  • mp4~Get Your Files Here !/5. MAC & IP Addressing Lab Demonstration/1. Lab Demonstration - MAC & IP Addressing.mp4 159.2 MB
  • mp4~Get Your Files Here !/7. Network Devices/1. Common Network Devices.mp4 8.9 MB
  • mp4~Get Your Files Here !/1. The OSI Model/1. The OSI Model.mp4 7.8 MB
  • mp4~Get Your Files Here !/7. Network Devices/2. Common Network Devices Pt. 2.mp4 6.2 MB
  • mp4~Get Your Files Here !/4. IPv4 Vs. IPv6/1. IPv4.mp4 5.7 MB
  • mp4~Get Your Files Here !/1. The OSI Model/3. Data Link Layer.mp4 5.7 MB
  • mp4~Get Your Files Here !/1. The OSI Model/2. Physical Layer.mp4 4.8 MB
  • mp4~Get Your Files Here !/1. The OSI Model/4. Network Layer.mp4 4.5 MB
  • mp4~Get Your Files Here !/8. LAN & WAN Technologies/1. LAN & WAN Technologies.mp4 4.2 MB
  • mp4~Get Your Files Here !/3. MAC Address/1. MAC Address.mp4 4.0 MB
  • mp4~Get Your Files Here !/6. TCP & UDP/6. Telnet.mp4 4.0 MB
  • mp4~Get Your Files Here !/1. The OSI Model/5. Transport Layer.mp4 3.6 MB
  • mp4~Get Your Files Here !/4. IPv4 Vs. IPv6/2. IPv6.mp4 3.6 MB
  • mp4~Get Your Files Here !/6. TCP & UDP/7. FTP.mp4 3.5 MB
  • mp4~Get Your Files Here !/1. The OSI Model/8. Application Layer.mp4 3.3 MB
  • mp4~Get Your Files Here !/6. TCP & UDP/8. SSH.mp4 3.2 MB
  • mp4~Get Your Files Here !/1. The OSI Model/7. Presentation Layer.mp4 3.1 MB
  • mp4~Get Your Files Here !/6. TCP & UDP/4. ICMP.mp4 3.0 MB
  • mp4~Get Your Files Here !/8. LAN & WAN Technologies/2. LAN & WAN Technologies Packet-Switching Technologies.mp4 3.0 MB
  • mp4~Get Your Files Here !/6. TCP & UDP/2. TCP Ports.mp4 2.9 MB
【影视】 Udemy - Sicurezza Informatica e CyberSecurity per Principianti! [Ita]
收录时间:2023-12-19 文档个数:211 文档大小:7.7 GB 最近下载:2025-05-15 人气:8528 磁力链接
  • mp45. HIDS - Host Intrusion DetectionPrevention System/3. Installazione OSSEC - Componente AGENT.mp4 164.1 MB
  • mp42. Analisi del Traffico di Rete/12. Analisi del Protocollo TCP.mp4 123.1 MB
  • mp411. System Inventory Tool/7. Installazione di ReactOS.mp4 105.4 MB
  • mp43. Firewalling/30. pfSense - Il servizio DNS.mp4 99.8 MB
  • mp42. Analisi del Traffico di Rete/16. Analisi della Scansione SYN SCAN con ZenMap.mp4 97.3 MB
  • mp42. Analisi del Traffico di Rete/7. Analisi del Protocollo ARP.mp4 93.6 MB
  • mp44. IDS IPS - Intrusion DetectionPrevention System/18. SNORT - Rilevamento Pacchetti ICMP.mp4 88.0 MB
  • mp416. BONUS 2 Deep Web - Un'introduzione/7. Introduzione a TAILS.mp4 85.8 MB
  • mp415. BONUS 1 Labtainers - Un Laboratorio di Cyber Security/8. Laboratorio TELNET.mp4 84.4 MB
  • mp414. Linux Hardening - Le Basi/6. Utilizzo di TCPDUMP per l'Analisi del Traffico di Rete.mp4 77.3 MB
  • mp416. BONUS 2 Deep Web - Un'introduzione/5. Rete TOR su WIndows.mp4 76.2 MB
  • mp414. Linux Hardening - Le Basi/1. Configurazione Utenti con Sudo Access.mp4 71.3 MB
  • mp412. Honeypot/5. Scansione e Rilevamento utilizzando Kali Linux e KFsensor.mp4 69.9 MB
  • mp410. SIEM - Security Information and Event Management/4. Caricamento Manuale dei Dati.mp4 67.1 MB
  • mp42. Analisi del Traffico di Rete/9. Analisi del Protocollo DNS.mp4 65.6 MB
  • mp412. Honeypot/6. Modifica delle Porte TCPUDP.mp4 65.2 MB
  • mp44. IDS IPS - Intrusion DetectionPrevention System/29. SNORT - Rilevamento Scansione FIN XMAS Scan.mp4 63.8 MB
  • mp43. Firewalling/16. Analisi del Traffico di Rete.mp4 62.9 MB
  • mp44. IDS IPS - Intrusion DetectionPrevention System/26. SNORT - Rilevamento Scansione Ping Sweep.mp4 62.0 MB
  • mp414. Linux Hardening - Le Basi/5. AbilitazioneDisabilitazione di Account.mp4 61.4 MB
【影视】 [Coursera] Advanced Python Scripting for Cybersecurity Specialization - 3 course series
收录时间:2024-05-24 文档个数:97 文档大小:947.7 MB 最近下载:2025-05-15 人气:5150 磁力链接
  • mp4defensive-python/01_defensive-python onehack.us/01_defensive-python/01_04_detecting-ssh-brute-force-with-scapy.mp4 49.7 MB
  • mp4defensive-python/01_defensive-python onehack.us/01_defensive-python/01_07_connection-hijacking-with-scapy.mp4 48.4 MB
  • mp4python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_02_generating-password-variations-with-python.mp4 46.5 MB
  • mp4python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_05_service-detection-with-python.mp4 45.6 MB
  • mp4defensive-python/01_defensive-python onehack.us/01_defensive-python/01_05_feature-selection-for-traffic-analysis.mp4 45.2 MB
  • mp4establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_03_searching-the-registry-with-python.mp4 45.2 MB
  • mp4python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_02_querying-shodan-with-python.mp4 44.0 MB
  • mp4establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_02_traffic-analysis-with-python.mp4 43.7 MB
  • mp4python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_04_network-scanning-with-scapy.mp4 38.8 MB
  • mp4defensive-python/01_defensive-python onehack.us/01_defensive-python/01_02_brute-force-detection-with-windows-events.mp4 38.8 MB
  • mp4defensive-python/01_defensive-python onehack.us/01_defensive-python/01_03_detecting-ftp-brute-force-with-scapy.mp4 35.1 MB
  • mp4establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_04_searching-the-system-with-python.mp4 34.9 MB
  • mp4establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_02_dumping-chrome-credentials-with-python.mp4 34.8 MB
  • mp4establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_06_analyzing-passwords-with-python.mp4 34.5 MB
  • mp4python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_03_dns-queries-with-python.mp4 30.9 MB
  • mp4defensive-python/01_defensive-python onehack.us/01_defensive-python/01_06_detecting-anomalous-network-traffic-with-scapy.mp4 28.8 MB
  • mp4establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_05_building-c2-packets-with-python.mp4 27.1 MB
  • mp4python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_04_automating-brute-force.mp4 25.9 MB
  • mp4establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_05_cracking-the-linux-passwords-with-python.mp4 24.4 MB
  • mp4establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_04_detecting-encodings-with-python.mp4 24.1 MB
【影视】 [ DevCourseWeb.com ] Linkedin - Exam Tips - CompTIA Cybersecurity Analyst + (CySA + ) (CS0-003)
收录时间:2023-12-19 文档个数:38 文档大小:240.4 MB 最近下载:2025-05-15 人气:1197 磁力链接
  • mp4~Get Your Files Here !/02 - 1. Exploring the CySA+ Domains/01 - Careers in information security.mp4 36.3 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - About the CYSA+ exam.mp4 33.6 MB
  • mp4~Get Your Files Here !/03 - 2. Exploring the CySA+ Domains/01 - Security Operations.mp4 28.6 MB
  • mp4~Get Your Files Here !/03 - 2. Exploring the CySA+ Domains/02 - Vulnerability Management.mp4 17.7 MB
  • mp4~Get Your Files Here !/02 - 1. Exploring the CySA+ Domains/02 - Value of certification.mp4 14.4 MB
  • mp4~Get Your Files Here !/02 - 1. Exploring the CySA+ Domains/03 - Stackable certifications.mp4 13.1 MB
  • mp4~Get Your Files Here !/03 - 2. Exploring the CySA+ Domains/03 - Incident Response Management.mp4 12.5 MB
  • mp4~Get Your Files Here !/01 - Introduction/02 - What's new in CS0-003.mp4 12.2 MB
  • mp4~Get Your Files Here !/03 - 2. Exploring the CySA+ Domains/04 - Reporting and Communication.mp4 11.0 MB
  • mp4~Get Your Files Here !/04 - 3. Inside the CySA+ Exam/02 - CySA+ in-person exam environment.mp4 10.5 MB
  • mp4~Get Your Files Here !/04 - 3. Inside the CySA+ Exam/01 - The CySA+ exam.mp4 8.4 MB
  • mp4~Get Your Files Here !/04 - 3. Inside the CySA+ Exam/05 - Passing the CySA+ exam.mp4 8.2 MB
  • mp4~Get Your Files Here !/04 - 3. Inside the CySA+ Exam/04 - CySA+ question types.mp4 7.8 MB
  • mp4~Get Your Files Here !/05 - 4. Preparing for the CySA+ Exam/01 - Study resources.mp4 6.7 MB
  • mp4~Get Your Files Here !/06 - Conclusion/01 - Continuing education requirements.mp4 6.0 MB
  • mp4~Get Your Files Here !/05 - 4. Preparing for the CySA+ Exam/02 - Exam tips.mp4 4.7 MB
  • mp4~Get Your Files Here !/06 - Conclusion/02 - Next steps.mp4 4.3 MB
  • mp4~Get Your Files Here !/04 - 3. Inside the CySA+ Exam/03 - At-home testing.mp4 4.2 MB
  • srt~Get Your Files Here !/01 - Introduction/02 - What's new in CS0-003.srt 7.4 kB
  • srt~Get Your Files Here !/02 - 1. Exploring the CySA+ Domains/01 - Careers in information security.srt 6.7 kB
【影视】 Cybersecurity Closer Look Labs
收录时间:2025-02-05 文档个数:26 文档大小:502.3 MB 最近下载:2025-05-15 人气:1599 磁力链接
  • mp4004. 03 00 Digital Certificates.mp4 46.0 MB
  • mp4019. 18 00 Risk Terminology.mp4 45.9 MB
  • mp4020. 19 00 SSL and TLS Packet Capture.mp4 35.4 MB
  • mp4013. 12 00 Powershell.mp4 29.1 MB
  • mp4021. 20 00 Star and Simple Properties.mp4 27.5 MB
  • mp4023. 22 00 Wireless Heat Maps.mp4 26.8 MB
  • mp4015. 14 00 Pwned Passwords.mp4 26.6 MB
  • mp4007. 06 00 IPv6 Addressing.mp4 23.9 MB
  • mp4008. 07 00 Log Files.mp4 21.7 MB
  • mp4012. 11 00 Policies and Standards.mp4 21.3 MB
  • mp4010. 09 00 Passive Reconnaissance.mp4 19.3 MB
  • mp4024. 23 00 ZenMap.mp4 18.2 MB
  • mp4006. 05 00 Honeypots.mp4 18.0 MB
  • mp4009. 08 00 Malware Analysis.mp4 17.7 MB
  • mp4002. 01 00 Cloud Controls.mp4 17.3 MB
  • mp4016. 15 00 Quantitative Risk Analysis.mp4 14.3 MB
  • mp4003. 02 00 Constructing Error Messages.mp4 13.8 MB
  • mp4017. 16 00 RAID.mp4 11.8 MB
  • mp4025. 24 00 Zero-day Vulnerabilities.mp4 11.3 MB
  • mp4005. 04 00 Hashing and HMACS.mp4 10.6 MB
【影视】 Certified in Cybersecurity - CC (ISC)²
收录时间:2023-12-18 文档个数:68 文档大小:548.0 MB 最近下载:2025-05-15 人气:5909 磁力链接
  • mp4Lesson 3 Business Continuity (BC), Disaster Recovery (DR), and Incident Response Concepts/004. 3.3 Understanding Incident Response.mp4 66.3 MB
  • mp4Lesson 5 Network Security/006. 5.5 Introducing Cloud Security.mp4 51.7 MB
  • mp4Lesson 5 Network Security/004. 5.3 Understanding Network Security Infrastructure.mp4 38.5 MB
  • mp4Lesson 6 Security Operations/002. 6.1 Understanding Data Security.mp4 36.6 MB
  • mp4Lesson 2 Security Principles/003. 2.2 Understanding the Risk Management Process.mp4 31.9 MB
  • mp4Lesson 5 Network Security/003. 5.2 Understanding Network Threats and Attacks.mp4 29.4 MB
  • mp4Lesson 5 Network Security/002. 5.1 Understanding Computer Networking.mp4 28.5 MB
  • mp4Lesson 2 Security Principles/002. 2.1 Understanding the Security Concepts of Information Assurance.mp4 22.3 MB
  • mp4Lesson 4 Access Control Concepts/006. 4.5 Understanding Mandatory Access Control (MAC).mp4 20.6 MB
  • mp4Lesson 6 Security Operations/003. 6.2 Understanding Hashing.mp4 18.4 MB
  • mp4Lesson 2 Security Principles/005. 2.4 Understanding Governance Processes.mp4 17.9 MB
  • mp4Lesson 5 Network Security/005. 5.4 Introducing Network Segmentation.mp4 17.1 MB
  • mp4Lesson 3 Business Continuity (BC), Disaster Recovery (DR), and Incident Response Concepts/003. 3.2 Understanding Disaster Recovery (DR).mp4 16.4 MB
  • mp4Lesson 6 Security Operations/006. 6.5 Understanding Security Awareness Training.mp4 14.0 MB
  • mp4Lesson 4 Access Control Concepts/005. 4.4 Introducing Discretionary Access Control (DAC).mp4 12.9 MB
  • mp4Lesson 6 Security Operations/005. 6.4 Understanding Best Practice Security Policies.mp4 12.9 MB
  • mp4Lesson 3 Business Continuity (BC), Disaster Recovery (DR), and Incident Response Concepts/002. 3.1 Understanding Business Continuity (BC).mp4 12.8 MB
  • mp4Introduction/001. Certified in Cybersecurity - CC (ISC)² Introduction.mp4 11.6 MB
  • mp4Lesson 1 Exam Preparation/002. 1.1 Introducing the (ISC)² Certified in Cybersecurity Exam.mp4 11.4 MB
  • mp4Lesson 4 Access Control Concepts/002. 4.1 Understanding Physical Access Controls.mp4 10.0 MB
【压缩文件】 [ FreeCourseWeb.com ] Udemy - Cybersecurity Data Science.zip
收录时间:2022-04-08 文档个数:1 文档大小:349.0 MB 最近下载:2025-05-15 人气:179 磁力链接
  • zip[ FreeCourseWeb.com ] Udemy - Cybersecurity Data Science.zip 349.0 MB
【影视】 Cybersecurity and Artificial Intelligence
收录时间:2024-09-08 文档个数:10 文档大小:99.9 MB 最近下载:2025-05-15 人气:2532 磁力链接
  • mp401. Cybersecurity and Artificial Intelligence/01. Cybersecurity and AI Overview.mp4 24.4 MB
  • mp401. Cybersecurity and Artificial Intelligence/02. Demo- Importance of Understanding AI in Cybersecurity.mp4 23.9 MB
  • mp401. Cybersecurity and Artificial Intelligence/03. Phishing and BEC Real-world Examples.mp4 10.8 MB
  • mp401. Cybersecurity and Artificial Intelligence/08. Demo- Deepfake.mp4 8.0 MB
  • zipcybersecurity-artificial-intelligence.zip 7.4 MB
  • mp401. Cybersecurity and Artificial Intelligence/04. Voicemail Scams - Examples and How to Avoid.mp4 7.3 MB
  • mp401. Cybersecurity and Artificial Intelligence/05. Adhering to Company Policies and Guidelines.mp4 5.8 MB
  • mp401. Cybersecurity and Artificial Intelligence/06. AI Hallucinations.mp4 5.8 MB
  • mp401. Cybersecurity and Artificial Intelligence/09. Mitigating the AI Threats.mp4 3.3 MB
  • mp401. Cybersecurity and Artificial Intelligence/07. Criminal Usage of AI.mp4 3.3 MB
共14页 上一页 4 5 6 7 8 9 10 11 12 下一页