磁力管家

磁力管家
为您索检到268条磁力链接,耗时0毫秒。 rss

分享给好友

【文档书籍】 Developing a Cybersecurity Immune System for Industry 4.0 by Sergei Petrenko PDF
收录时间:2022-01-30 文档个数:2 文档大小:207.7 MB 最近下载:2025-05-15 人气:1469 磁力链接
  • pdfDeveloping a Cybersecurity Immune System for Industry 4.0 by Sergei Petrenko.pdf 207.7 MB
  • txtmore books, audiobooks, magazines etc..txt 932 Bytes
【影视】 Mastering Cybersecurity with Python - From Basics to Advanced Defense
收录时间:2025-01-27 文档个数:160 文档大小:1.5 GB 最近下载:2025-05-15 人气:1460 磁力链接
  • mp4Chapter 01 Introduction/001. Introduction.mp4 51.5 MB
  • mp4Chapter 10 Mini Project - File Encryption & Decryption Tool/004. Task 3 - Adding the User Interface.mp4 51.0 MB
  • mp4Chapter 12 Python Project - Build an Extensive Authentication System and Password Checker/005. Part 4 - Adding the Password Strength Checker Tool.mp4 50.0 MB
  • mp4Chapter 04 Control Flow & Loops/008. Programming Challenge.mp4 43.8 MB
  • mp4Chapter 12 Python Project - Build an Extensive Authentication System and Password Checker/007. Part 6 - Adding the Audit Tool.mp4 39.5 MB
  • mp4Chapter 06 Data Structures/008. Programming Challenge Part 2 - Dictionaries & Loops.mp4 36.7 MB
  • mp4Chapter 11 Object-Oriented Programming (OOP)/003. Creating a Basic Class.mp4 35.4 MB
  • mp4Chapter 04 Control Flow & Loops/007. The BREAK Statement.mp4 34.5 MB
  • mp4Chapter 12 Python Project - Build an Extensive Authentication System and Password Checker/006. Part 5 - Hashing the User Passwords.mp4 33.6 MB
  • mp4Chapter 12 Python Project - Build an Extensive Authentication System and Password Checker/009. Part 8 - Adding the Post Login Menu.mp4 32.5 MB
  • mp4Chapter 07 Mini Project - Build a Basic User Authentication System/004. Step 3 - Build the Authentication System.mp4 31.8 MB
  • mp4Chapter 10 Mini Project - File Encryption & Decryption Tool/003. Task 2 - Creating the Encryption & Decryption Keys.mp4 28.7 MB
  • mp4Chapter 04 Control Flow & Loops/003. IF ELSE Statements.mp4 27.4 MB
  • mp4Chapter 07 Mini Project - Build a Basic User Authentication System/003. Step 2 - Build the Login Function.mp4 26.9 MB
  • mp4Chapter 09 Libraries & Modules/007. Working with an External Library.mp4 26.6 MB
  • mp4Chapter 02 Variables & Data Types/002. Working with Strings.mp4 26.0 MB
  • mp4Chapter 12 Python Project - Build an Extensive Authentication System and Password Checker/001. Final Project Preview.mp4 26.0 MB
  • mp4Chapter 01 Introduction/002. Important Note about Replit.mp4 23.5 MB
  • mp4Chapter 12 Python Project - Build an Extensive Authentication System and Password Checker/008. Part 7 - Adding the View Logs Function.mp4 23.0 MB
  • mp4Chapter 04 Control Flow & Loops/009. Try & Except Error Handling.mp4 22.6 MB
【影视】 Lynda - Cybersecurity for Small and Medium Businesses Essential Training
收录时间:2024-12-25 文档个数:66 文档大小:358.3 MB 最近下载:2025-05-15 人气:580 磁力链接
  • mp42.1. The Basics/03.Why you should care.mp4 31.6 MB
  • mp41.Introduction/01.Welcome.mp4 21.9 MB
  • mp44.3. Protect/16.Technology solutions to protect a business.mp4 20.2 MB
  • mp47.6. Recover/28.Cybersecurity insurance.mp4 15.8 MB
  • mp44.3. Protect/15.Sharing online - How to prevent a phish.mp4 15.0 MB
  • mp42.1. The Basics/07.What are the cybersecurity threats.mp4 14.6 MB
  • mp44.3. Protect/18.Culture of security - Policies, procedures, and attitude.mp4 14.3 MB
  • mp46.5. Respond/24.Key elements of a cyber incident response.mp4 13.6 MB
  • mp44.3. Protect/17.Passphrases and authentication.mp4 13.3 MB
  • mp43.2. Identify/11.Account access best practices.mp4 12.9 MB
  • mp45.4. Detect/21.Cybersecurity assessments and detection technology solutions.mp4 12.8 MB
  • mp48.7. Resources/32.Scam and threat alerts.mp4 11.7 MB
  • mp48.7. Resources/31.More cybersecurity resources.mp4 11.5 MB
  • mp43.2. Identify/12.What about the cloud.mp4 11.3 MB
  • mp46.5. Respond/26.State breach response laws.mp4 9.6 MB
  • mp43.2. Identify/09.Step #1 - Identify key assets.mp4 9.5 MB
  • mp46.5. Respond/22.Step #4 - Respond to a cyber breach.mp4 9.3 MB
  • mp45.4. Detect/19.Step #3 - Detect a breach.mp4 9.3 MB
  • mp42.1. The Basics/05.Anyone can improve the cybersecurity of a business.mp4 9.1 MB
  • mp49.Conclusion/33.Next steps.mp4 9.0 MB
【压缩文件】 [ DevCourseWeb.com ] Udemy - Microsoft Cybersecurity Pro Track - Security in Office 365.zip
收录时间:2021-04-19 文档个数:1 文档大小:1.5 GB 最近下载:2025-05-15 人气:1213 磁力链接
  • zip[ DevCourseWeb.com ] Udemy - Microsoft Cybersecurity Pro Track - Security in Office 365.zip 1.5 GB
【影视】 Cybersecurity-The Real Agenda.wmv
收录时间:2017-02-21 文档个数:1 文档大小:148.0 MB 最近下载:2025-05-15 人气:1555 磁力链接
  • wmvCybersecurity-The Real Agenda.wmv 148.0 MB
【影视】 Coursera - IBM and ISC2 Cybersecurity Specialist Professional Certificate 2024
收录时间:2025-01-05 文档个数:1166 文档大小:3.6 GB 最近下载:2025-05-15 人气:469 磁力链接
  • mp4Coursera - Introduction to Cloud Computing 2024-4/05_cloud-security-monitoring-case-studies-jobs/02_case-studies-and-jobs/01_case-studies-in-different-industry-verticals.mp4 64.0 MB
  • mp4Coursera - Introduction to Cybersecurity Careers 2024-4/04_final-project-and-assessment/02_course-wrap-up/03_cybersecurity-career-faq.mp4 62.1 MB
  • mp4Coursera - Introduction to Cloud Computing 2024-4/04_emergent-trends-and-practices/02_cloud-native-applications-devops-and-application-modernization/04_application-modernization.mp4 54.2 MB
  • mp4Coursera - Introduction to Cloud Computing 2024-4/03_components-of-cloud-computing/01_cloud-infrastructure/06_containers.mp4 45.8 MB
  • mp4Coursera - Introduction to Cloud Computing 2024-4/04_emergent-trends-and-practices/01_hybrid-multi-cloud-microservices-and-serverless/01_hybrid-multi-cloud.mp4 40.6 MB
  • mp4Coursera - Introduction to Cloud Computing 2024-4/02_cloud-computing-models/02_deployment-models/03_hybrid-cloud.mp4 39.0 MB
  • mp4Coursera - Introduction to Cybersecurity Careers 2024-4/04_final-project-and-assessment/02_course-wrap-up/01_landing-your-first-job-in-cybersecurity.mp4 30.6 MB
  • mp4Coursera - Introduction to Cloud Computing 2024-4/01_overview-of-cloud-computing/04_emerging-technologies-accelerated-by-cloud/03_blockchain-and-analytics-in-the-cloud.mp4 27.7 MB
  • mp4Coursera - Introduction to Cloud Computing 2024-4/03_components-of-cloud-computing/01_cloud-infrastructure/02_virtualization-and-virtual-machines-explained.mp4 25.9 MB
  • mp4Coursera - Incident Response, BC, and DR Concepts 2024-4/02_incident-response-ir/01_incident-response-ir/01_incident-response.mp4 25.3 MB
  • mp4Coursera - Introduction to Cloud Computing 2024-4/03_components-of-cloud-computing/02_cloud-storage-and-content-delivery-networks/03_block-storage.mp4 23.8 MB
  • mp4Coursera - Introduction to Cloud Computing 2024-4/01_overview-of-cloud-computing/04_emerging-technologies-accelerated-by-cloud/01_internet-of-things-in-the-cloud.mp4 23.6 MB
  • mp4Coursera - Introduction to Cloud Computing 2024-4/03_components-of-cloud-computing/02_cloud-storage-and-content-delivery-networks/06_cdn-content-delivery-networks.mp4 23.5 MB
  • mp4Coursera - Introduction to Cloud Computing 2024-4/03_components-of-cloud-computing/02_cloud-storage-and-content-delivery-networks/07_expert-viewpoints-cloud-storage.mp4 23.4 MB
  • mp4Coursera - Introduction to Cloud Computing 2024-4/04_emergent-trends-and-practices/02_cloud-native-applications-devops-and-application-modernization/05_expert-viewpoints-cloud-native-and-emergent-cloud-trends.mp4 23.1 MB
  • mp4Coursera - Introduction to Cloud Computing 2024-4/04_emergent-trends-and-practices/02_cloud-native-applications-devops-and-application-modernization/01_cloud-native-applications.mp4 21.1 MB
  • mp4Coursera - Cybersecurity Capstone Breach Response Case Studies 2024-4/01_incident-management-response-and-cyberattack-frameworks/02_cyberattack-frameworks/01_ibm-x-force-iris-cyberattack-framework.mp4 20.3 MB
  • mp4Coursera - Introduction to Cloud Computing 2024-4/04_emergent-trends-and-practices/01_hybrid-multi-cloud-microservices-and-serverless/02_microservices.mp4 20.2 MB
  • mp4Coursera - Access Control Concepts 2024-4/02_key-concepts/01_key-concepts/05_user-life-cycle-management.mp4 20.0 MB
  • mp4Coursera - Security Principles 2024-4/04_security-controls/01_security-controls/01_security-controls.mp4 19.4 MB
【影视】 [CourseClub.Me] ZeroToMastery - Complete Cybersecurity Bootcamp
收录时间:2023-12-17 文档个数:98 文档大小:3.6 GB 最近下载:2025-05-15 人气:1642 磁力链接
  • mp48-Network Security/052-Network Security With Nmap.mp4 169.9 MB
  • mp45-Security Bugs & Vulnerabilities/020-Buffer Overflow Demonstration.mp4 136.7 MB
  • mp412-Appendix - Ethical Hacking/087-Msfconsole Basic Commands.mp4 97.5 MB
  • mp48-Network Security/059-Wireless Attack Demonstration.mp4 93.4 MB
  • mp47-End-Point Protection/034-Password Security and Password Managers.mp4 84.2 MB
  • mp412-Appendix - Ethical Hacking/093-Meterpreter Basic Commands Part 1.mp4 78.5 MB
  • mp47-End-Point Protection/038-Process Explorer.mp4 75.8 MB
  • mp41-Introduction/001-Cybersecurity Bootcamp - Zero to Mastery.mp4 72.4 MB
  • mp48-Network Security/057-Secure Network Architecture.mp4 66.8 MB
  • mp412-Appendix - Ethical Hacking/094-Meterpreter Basic Commands Part 2.mp4 65.7 MB
  • mp47-End-Point Protection/033-Bitdefender, Kaspersky, McAfee, Malwarebytes.mp4 63.9 MB
  • mp44-Understanding Hackers - The Biggest Threat/012-Most Common Attacks Demonstration.mp4 63.5 MB
  • mp48-Network Security/060-Network Monitoring With TCPDump.mp4 62.7 MB
  • mp48-Network Security/058-Wireless Security.mp4 59.6 MB
  • mp45-Security Bugs & Vulnerabilities/017-Unpatched Machine Exploitation Demonstration.mp4 59.1 MB
  • mp412-Appendix - Ethical Hacking/080-Whatweb Stealthy Scan.mp4 58.1 MB
  • mp412-Appendix - Ethical Hacking/091-Advance Msfvenom Usage.mp4 51.4 MB
  • mp47-End-Point Protection/043-Iptables.mp4 50.9 MB
  • mp47-End-Point Protection/028-Brave Browser Security and Privacy.mp4 50.6 MB
  • mp412-Appendix - Ethical Hacking/089-Software Vulnerability - Samba Exploitation.mp4 49.5 MB
【压缩文件】 [ CourseWikia.com ] Udemy - Fundamentals of OT Cybersecurity (ICS - SCADA).zip
收录时间:2021-03-09 文档个数:1 文档大小:2.0 GB 最近下载:2025-05-15 人气:1349 磁力链接
  • zip[ CourseWikia.com ] Udemy - Fundamentals of OT Cybersecurity (ICS - SCADA).zip 2.0 GB
【影视】 Cybersecurity for Executives
收录时间:2018-10-13 文档个数:86 文档大小:300.7 MB 最近下载:2025-05-15 人气:3241 磁力链接
  • mp45.4. Stop Malicious Code/20.How to avoid malicious code.mp4 12.5 MB
  • mp41.Introduction/01.Cybersecurity for executives.mp4 4.3 MB
  • srt1.Introduction/02.What you should know.en.srt 1.4 kB
  • mp41.Introduction/02.What you should know.mp4 1.2 MB
  • srt1.Introduction/03.How this course is organized.en.srt 1.7 kB
  • mp41.Introduction/03.How this course is organized.mp4 2.3 MB
  • srt2.1. Understand the Big Picture/04.Understand the big picture overview.en.srt 2.1 kB
  • mp42.1. Understand the Big Picture/04.Understand the big picture overview.mp4 4.8 MB
  • srt2.1. Understand the Big Picture/05.Why are you a target.en.srt 4.0 kB
  • mp42.1. Understand the Big Picture/05.Why are you a target.mp4 8.1 MB
  • srt2.1. Understand the Big Picture/06.Example - Organized crime.en.srt 4.5 kB
  • mp42.1. Understand the Big Picture/06.Example - Organized crime.mp4 9.7 MB
  • srt2.1. Understand the Big Picture/07.Why are you in the line of fire.en.srt 3.5 kB
  • mp42.1. Understand the Big Picture/07.Why are you in the line of fire.mp4 7.1 MB
  • srt2.1. Understand the Big Picture/08.Example - Cyberwar cross-fire.en.srt 3.3 kB
  • mp42.1. Understand the Big Picture/08.Example - Cyberwar cross-fire.mp4 7.6 MB
  • srt2.1. Understand the Big Picture/09.Insider threat - Cyber failure.en.srt 4.4 kB
  • mp42.1. Understand the Big Picture/09.Insider threat - Cyber failure.mp4 7.6 MB
  • srt3.2. How to Think about Cybersecurity/10.Think about cybersecurity summary.en.srt 1.7 kB
  • mp43.2. How to Think about Cybersecurity/10.Think about cybersecurity summary.mp4 2.9 MB
【影视】 [ CourseHulu.com ] Linkedin - Building an ISO 27001-Compliant Cybersecurity Program - Getting Started
收录时间:2022-02-18 文档个数:63 文档大小:580.9 MB 最近下载:2025-05-15 人气:3341 磁力链接
  • mp4~Get Your Files Here !/6. Planning (Clause 6)/016. Information security risk assessment (Clause 6.1.2).mp4 55.1 MB
  • mp4~Get Your Files Here !/2. ISO 27001 Overview/003. What is the ISO 27001 standard.mp4 45.1 MB
  • mp4~Get Your Files Here !/3. Complying with ISO 27001/009. Building your ISO 27001 compliance plan.mp4 41.8 MB
  • mp4~Get Your Files Here !/3. Complying with ISO 27001/008. What to expect when getting ISO 27001 certified.mp4 38.6 MB
  • mp4~Get Your Files Here !/8. Performance Evaluation and Improvement (Clauses 9 and 10)/024. Internal audit (Clause 9.2).mp4 34.2 MB
  • mp4~Get Your Files Here !/2. ISO 27001 Overview/004. Breaking down the ISO 27001 standard.mp4 32.4 MB
  • mp4~Get Your Files Here !/7. Support and Operation (Clauses 7 and 8)/021. Documented information (Clause 7.5).mp4 32.4 MB
  • mp4~Get Your Files Here !/5. Leadership (Clause 5)/014. Policy (Clause 5.2).mp4 32.3 MB
  • mp4~Get Your Files Here !/2. ISO 27001 Overview/006. ISO 27001 gaps and criticisms.mp4 31.3 MB
  • mp4~Get Your Files Here !/3. Complying with ISO 27001/007. ISO 27001 compliance and certification.mp4 30.8 MB
  • mp4~Get Your Files Here !/5. Leadership (Clause 5)/013. Leadership and commitment (Clause 5.1).mp4 29.4 MB
  • mp4~Get Your Files Here !/6. Planning (Clause 6)/017. Information security risk treatment (Clause 6.1.3).mp4 27.9 MB
  • mp4~Get Your Files Here !/2. ISO 27001 Overview/005. Why build an ISO 27001-compliant cybersecurity program.mp4 27.0 MB
  • mp4~Get Your Files Here !/5. Leadership (Clause 5)/015. Organizational roles, responsibilities, and authorities (Clause 5.3).mp4 26.6 MB
  • mp4~Get Your Files Here !/6. Planning (Clause 6)/018. Information security objectives and planning to achieve them (Clause 6.2).mp4 23.8 MB
  • mp4~Get Your Files Here !/8. Performance Evaluation and Improvement (Clauses 9 and 10)/025. Management review (Clause 9.3).mp4 20.6 MB
  • mp4~Get Your Files Here !/7. Support and Operation (Clauses 7 and 8)/020. Communication (Clause 7.4).mp4 19.7 MB
  • mp4~Get Your Files Here !/9. Conclusion/027. Next steps to take with ISO 27001.mp4 11.6 MB
  • mp4~Get Your Files Here !/1. Introduction/001. The international standard for information security.mp4 10.1 MB
  • mp4~Get Your Files Here !/1. Introduction/002. Who this course is for and prerequisites.mp4 9.0 MB
【影视】 [ DevCourseWeb.com ] Udemy - Ccsa - Certified Cybersecurity Analyst
收录时间:2023-12-17 文档个数:18 文档大小:1.1 GB 最近下载:2025-05-15 人气:2189 磁力链接
  • mp4~Get Your Files Here !/2 - Blue Team Principles/2 - Blue Team Principles.mp4 196.8 MB
  • mp4~Get Your Files Here !/3 - Digital Forensics/3 - Digital Forensics.mp4 172.5 MB
  • mp4~Get Your Files Here !/4 - Malware Analysis/4 - Malware Analysis.mp4 154.1 MB
  • mp4~Get Your Files Here !/7 - Leveraging SIEM for Advanced Analytics/7 - Leveraging SIEM for Advanced Analytics.mp4 134.1 MB
  • mp4~Get Your Files Here !/5 - Traffic Analysis/5 - Traffic Analysis.mp4 131.1 MB
  • mp4~Get Your Files Here !/8 - Defeating the Red Team with Purple Team Tactics/8 - Defeating the Red Team with Purple Team Tactics.mp4 129.3 MB
  • mp4~Get Your Files Here !/6 - Assessing the Current State of Defense within the Organization/6 - Assessing the Current State of Defense within the Organization.mp4 123.7 MB
  • mp4~Get Your Files Here !/1 - Introduction/1 - Introduction.mp4 87.0 MB
  • srt~Get Your Files Here !/2 - Blue Team Principles/2 - Blue Team Principles English.srt 39.2 kB
  • srt~Get Your Files Here !/3 - Digital Forensics/3 - Digital Forensics English.srt 37.2 kB
  • srt~Get Your Files Here !/4 - Malware Analysis/4 - Malware Analysis English.srt 32.9 kB
  • srt~Get Your Files Here !/5 - Traffic Analysis/5 - Traffic Analysis English.srt 26.1 kB
  • srt~Get Your Files Here !/7 - Leveraging SIEM for Advanced Analytics/7 - Leveraging SIEM for Advanced Analytics English.srt 26.0 kB
  • srt~Get Your Files Here !/1 - Introduction/1 - Introduction English.srt 22.7 kB
  • srt~Get Your Files Here !/6 - Assessing the Current State of Defense within the Organization/6 - Assessing the Current State of Defense within the Organization English.srt 18.8 kB
  • srt~Get Your Files Here !/8 - Defeating the Red Team with Purple Team Tactics/8 - Defeating the Red Team with Purple Team Tactics English.srt 18.8 kB
  • txt~Get Your Files Here !/Bonus Resources.txt 386 Bytes
  • urlGet Bonus Downloads Here.url 182 Bytes
【影视】 [CourseClub.Me] O`REILLY - The Complete Cybersecurity Bootcamp, 2nd Edition
收录时间:2023-12-23 文档个数:347 文档大小:6.7 GB 最近下载:2025-05-15 人气:2332 磁力链接
  • mp4Lesson 29 Hacking Mobile Platforms/003. 29.2 Hacking iOS.mp4 86.6 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/014. 17.13 Performing SMTP and DNS Enumeration.mp4 80.0 MB
  • mp4Lesson 21 Fundamentals of Wireless Hacking/004. 21.3 Exploring Wireless Threats.mp4 79.0 MB
  • mp4Lesson 33 Fundamentals of IoT Security/003. 33.2 Understanding IoT Attacks.mp4 76.8 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/015. 17.14 Conducting Additional Enumeration Techniques.mp4 75.8 MB
  • mp4Lesson 33 Fundamentals of IoT Security/002. 33.1 Introducing IoT Concepts.mp4 74.4 MB
  • mp4Lesson 29 Hacking Mobile Platforms/002. 29.1 Understanding Mobile Platform Attack Vectors.mp4 73.4 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/011. 17.1 Performing SNMP Enumeration.mp4 71.8 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/004. 17.3 Understanding Host Discovery.mp4 69.7 MB
  • mp4Lesson 5 Fundamentals of Incident Response/007. 5.6 Analyzing Computer Incident Response Teams (CSIRTs).mp4 68.5 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/007. 17.6 Scanning Beyond IDS and Firewall.mp4 68.2 MB
  • mp4Lesson 27 Hacking User Credentials/006. 27.5 Cracking Passwords with John the Ripper.mp4 66.1 MB
  • mp4Lesson 7 Intrusion Event Categories/009. 7.8 Understanding the MITRE ATT&CK Framework.mp4 65.8 MB
  • mp4Lesson 29 Hacking Mobile Platforms/004. 29.3 Hacking Android OS.mp4 63.8 MB
  • mp4Lesson 20 SQL Injection/005. 20.4 Exploring SQL Injection Tools.mp4 63.3 MB
  • mp4Lesson 21 Fundamentals of Wireless Hacking/003. 21.2 Understanding Wireless Encryption.mp4 62.7 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/013. 17.12 Performing NTP and NFS Enumeration.mp4 61.8 MB
  • mp4Lesson 16 Information Gathering and Passive Reconnaissance/011. 16.10 Performing Footprinting through Social Engineering.mp4 59.1 MB
  • mp4Lesson 8 Digital Forensics Fundamentals/004. 8.3 Understanding Evidence Collection.mp4 57.2 MB
  • mp4Lesson 21 Fundamentals of Wireless Hacking/007. 21.6 Hacking Bluetooth.mp4 52.3 MB
【影视】 [ DevCourseWeb.com ] Udemy - Deepfake Defense for Cybersecurity and GRC Professionals
收录时间:2024-03-22 文档个数:38 文档大小:1.4 GB 最近下载:2025-05-15 人气:3879 磁力链接
  • mp4~Get Your Files Here !/2. Detection & Mitigation/6. 20-Documenting and structuring our Deepfake mitigation strategy Report.mp4 105.7 MB
  • mp4~Get Your Files Here !/1. Course Foundation/13. 13-Assessing Your organization’s deepfake response capabilities.mp4 99.8 MB
  • mp4~Get Your Files Here !/2. Detection & Mitigation/8. 22-Action Plan for Deepfake Mitigation Strategy Implementation.mp4 93.6 MB
  • mp4~Get Your Files Here !/2. Detection & Mitigation/10. 24-Standard Operating Procedure (SOP) for Deepfake Incident Response.mp4 86.6 MB
  • mp4~Get Your Files Here !/3. Things to consider_Questions to ask/4. 29-Deepfake Mitigation Tools.mp4 80.4 MB
  • mp4~Get Your Files Here !/2. Detection & Mitigation/5. 19-Developing deepfake mitigation strategy through brainstorming.mp4 79.9 MB
  • mp4~Get Your Files Here !/1. Course Foundation/11. 11-Identifying Deepfakes.mp4 67.7 MB
  • mp4~Get Your Files Here !/1. Course Foundation/4. 4-Deepfake Assessment-Can members of your organization identify deepfakes.mp4 63.6 MB
  • mp4~Get Your Files Here !/1. Course Foundation/5. 5-Course Agenda.mp4 60.7 MB
  • mp4~Get Your Files Here !/3. Things to consider_Questions to ask/3. 28-Creating a culture of Verefication.mp4 57.2 MB
  • mp4~Get Your Files Here !/1. Course Foundation/12. 12-Testing for Deepfakes.mp4 57.1 MB
  • mp4~Get Your Files Here !/2. Detection & Mitigation/1. 15-Intro to section 2_Are there any silver bullets for deepfake mitigation.mp4 51.7 MB
  • mp4~Get Your Files Here !/1. Course Foundation/3. 3-Possible causes of deepfake Incident-News Brief Postmortem.mp4 50.1 MB
  • mp4~Get Your Files Here !/2. Detection & Mitigation/3. 17-Important considerations for developing a deepfake defense strategy.mp4 42.4 MB
  • mp4~Get Your Files Here !/1. Course Foundation/1. 1-Deepfake Defense For Cybersecurity & GRC Professionals.mp4 41.8 MB
  • mp4~Get Your Files Here !/2. Detection & Mitigation/4. 18-Key components of a deepfake mitigation strategy.mp4 41.2 MB
  • mp4~Get Your Files Here !/3. Things to consider_Questions to ask/5. 30-The most efficient measures to take against deepfake attacks.mp4 40.7 MB
  • mp4~Get Your Files Here !/1. Course Foundation/14. 14-End of Section_1.mp4 39.9 MB
  • mp4~Get Your Files Here !/1. Course Foundation/6. 6-Meet your Instructor.mp4 39.7 MB
  • mp4~Get Your Files Here !/1. Course Foundation/2. 2-Important Note about course.mp4 38.8 MB
【压缩文件】 Cybersecurity Essentials
收录时间:2021-06-07 文档个数:1 文档大小:182.1 MB 最近下载:2025-05-15 人气:600 磁力链接
  • rarCybersecurity.rar 182.1 MB
【压缩文件】 [ DevCourseWeb.com ] Cybersecurity - The Beginner's Guide - A comprehensive guide to getting started in cybersecurity.zip
收录时间:2024-01-24 文档个数:1 文档大小:114.6 MB 最近下载:2025-05-14 人气:838 磁力链接
  • zip[ DevCourseWeb.com ] Cybersecurity - The Beginner's Guide - A comprehensive guide to getting started in cybersecurity.zip 114.6 MB
【压缩文件】 [ FreeCourseWeb.com ] Udemy - Cybersecurity - From Beginner to Expert.zip
收录时间:2021-04-14 文档个数:1 文档大小:1.7 GB 最近下载:2025-05-14 人气:1267 磁力链接
  • zip[ FreeCourseWeb.com ] Udemy - Cybersecurity - From Beginner to Expert.zip 1.7 GB
【影视】 Cybersecurity Lab Environment in EVE NG
收录时间:2023-12-17 文档个数:98 文档大小:6.4 GB 最近下载:2025-05-14 人气:6032 磁力链接
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/5. Cyberattacks Lab Setup/1. Cyberattacks Lab in EVE NG.mp4 431.1 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/1. Reconnaissance Attack.mp4 351.9 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/4. Attacker OS Setup/1. Kali Linux Setup.mp4 263.4 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/12. Password Attack.mp4 261.2 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/5. Cyberattacks Lab Setup/3. Vulnerable Servers -Configuration.mp4 259.5 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/9. ARP Spoofing Attack.mp4 240.8 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/2. EVE NG Setup/5. EVE NG Qemu Image Naming.mp4 223.9 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/10. DHCP Starvation Attack.mp4 195.3 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/1. Introduction to Cybersecurity/9. Layers of the Web Terms.mp4 192.1 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/4. Attacker OS Setup/3. Parrot OS Setup.mp4 184.7 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/1. Introduction to Cybersecurity/8. Layers of the Web.mp4 170.7 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/3. Vulnerable Web Setup/2. Metasploitable Setup.mp4 164.7 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/6. Smurf Attack.mp4 162.1 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/14. SQL Injection Attack.mp4 162.0 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/1. Introduction to Cybersecurity/12. OWASP Top Ten 10.mp4 160.9 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/2. EVE NG Setup/8. EVE-NG Networks Clouds.mp4 155.5 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/5. SYN Flooding Attack.mp4 150.9 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/1. Introduction to Cybersecurity/2. Introduction to Cybersecurity.mp4 146.1 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/4. ICMP Flooding Attack.mp4 144.8 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/3. Vulnerable Web Setup/1. bWAPP Server Setup.mp4 144.8 MB
【影视】 Cybersecurity Careers and Certifications
收录时间:2023-12-20 文档个数:150 文档大小:414.1 MB 最近下载:2025-05-14 人气:2289 磁力链接
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 05 - 4. Cybersecurity Careers/17 - Cybersecurity careers overview.mp4.mp4 51.0 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 06 - 5. Cybersecurity Certifications/27 - Cybersecurity certifications overview.mp4.mp4 23.7 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 01 - Introduction/01 - Cybersecurity careers and certifications.mp4.mp4 21.7 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 02 - 1. Understanding the Cybersecurity Career Field/05 - An overview of cybersecurity key concepts.mp4.mp4 15.4 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 02 - 1. Understanding the Cybersecurity Career Field/04 - A brief history of cybersecurity.mp4.mp4 9.8 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 02 - 1. Understanding the Cybersecurity Career Field/06 - Enabling technologies for cybersecurity.mp4.mp4 8.8 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 07 - 6. Your Cybersecurity Career Path/39 - How to get cybersecurity experience.mp4.mp4 8.7 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 07 - 6. Your Cybersecurity Career Path/38 - Prerequisites.mp4.mp4 8.5 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 05 - 4. Cybersecurity Careers/19 - Cybersecurity career: Analyst.mp4.mp4 8.5 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 06 - 5. Cybersecurity Certifications/37 - Choose a cybersecurity certification.mp4.mp4 8.3 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 08 - 7. Cybersecurity Career Advice/44 - Begin with the end in mind.mp4.mp4 8.2 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 04 - 3. Cybersecurity Success Traits/14 - Analytical and technology savvy.mp4.mp4 8.1 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 05 - 4. Cybersecurity Careers/26 - Cybersecurity career: Director.mp4.mp4 8.0 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 07 - 6. Your Cybersecurity Career Path/40 - Getting started: Get certified.mp4.mp4 7.9 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 05 - 4. Cybersecurity Careers/22 - Cybersecurity career: Engineer.mp4.mp4 7.8 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 01 - Introduction/03 - Why start a career in cybersecurity?.mp4.mp4 7.8 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 03 - 2. Cybersecurity Marketplace/13 - Retail (PCI DSS).mp4.mp4 7.7 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 02 - 1. Understanding the Cybersecurity Career Field/08 - Cybersecurity career resources.mp4.mp4 7.5 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 03 - 2. Cybersecurity Marketplace/11 - Healthcare (HIPAA).mp4.mp4 7.5 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 05 - 4. Cybersecurity Careers/20 - Cybersecurity career: Auditor.mp4.mp4 7.4 MB
【影视】 [ DevCourseWeb.com ] Udemy - The Cybersecurity Consultant Mindset
收录时间:2023-12-26 文档个数:32 文档大小:3.1 GB 最近下载:2025-05-14 人气:3009 磁力链接
  • mp4~Get Your Files Here !/3. Risk Management and Assessment/2. Introduction to Risk Management.mp4 222.8 MB
  • mp4~Get Your Files Here !/2. Introduction to Cybersecurity Consulting/3. Understanding the Role of a Cyber Consultant.mp4 212.8 MB
  • mp4~Get Your Files Here !/7. Developing Soft Skills for Your Career/2. Communication and Interpersonal Skills.mp4 211.5 MB
  • mp4~Get Your Files Here !/3. Risk Management and Assessment/3. Compliance Requirements.mp4 204.7 MB
  • mp4~Get Your Files Here !/2. Introduction to Cybersecurity Consulting/2. Overview of Cybersecurity.mp4 198.8 MB
  • mp4~Get Your Files Here !/2. Introduction to Cybersecurity Consulting/5. Preparing for a Career in Cyber Consulting.mp4 196.6 MB
  • mp4~Get Your Files Here !/3. Risk Management and Assessment/5. Security Documentation Development.mp4 178.0 MB
  • mp4~Get Your Files Here !/4. Tools and Technologies/3. Vulnerability Assessment and Pentesting.mp4 177.6 MB
  • mp4~Get Your Files Here !/3. Risk Management and Assessment/4. Risk Assessment and Analysis.mp4 158.0 MB
  • mp4~Get Your Files Here !/4. Tools and Technologies/6. Cybersecurity Frameworks Selection.mp4 146.1 MB
  • mp4~Get Your Files Here !/5. Incident Response/3. Developing an Incident Response Plan.mp4 123.8 MB
  • mp4~Get Your Files Here !/4. Tools and Technologies/2. Network Scanning and Monitoring.mp4 115.2 MB
  • mp4~Get Your Files Here !/2. Introduction to Cybersecurity Consulting/4. Benefits of Cyber Consulting and Cons.mp4 102.7 MB
  • mp4~Get Your Files Here !/4. Tools and Technologies/5. Security Information and Event Management Systems.mp4 99.4 MB
  • mp4~Get Your Files Here !/6. Cybersecurity Auditing and Frameworks/4. Cybersecurity Frameworks - Implementation.mp4 81.3 MB
  • mp4~Get Your Files Here !/4. Tools and Technologies/4. Intrusion Detection and Prevention Systems.mp4 73.6 MB
  • mp4~Get Your Files Here !/6. Cybersecurity Auditing and Frameworks/3. Auditing Standards and Requirements.mp4 73.1 MB
  • mp4~Get Your Files Here !/6. Cybersecurity Auditing and Frameworks/2. Overview of IT Auditing.mp4 72.9 MB
  • mp4~Get Your Files Here !/7. Developing Soft Skills for Your Career/5. Practical Exercises and Resources.mp4 68.0 MB
  • mp4~Get Your Files Here !/5. Incident Response/2. Defining a Security Incident.mp4 67.7 MB
【影视】 [ DevCourseWeb.com ] Cfe 101 - Cybersecurity For Everyone
收录时间:2023-12-29 文档个数:31 文档大小:1.5 GB 最近下载:2025-05-14 人气:2244 磁力链接
  • mp4~Get Your Files Here !/3 - Password Email Security/6 - Password Security.mp4 149.2 MB
  • mp4~Get Your Files Here !/5 - Mobile Device Remote Working Security/12 - Keeping Your Mobile Safe.mp4 132.7 MB
  • mp4~Get Your Files Here !/1 - Introduction Threats to Information Security/3 - Everyday Information Security Threats.mp4 112.7 MB
  • mp4~Get Your Files Here !/7 - Network Security/17 - Keep Your Network Safe.mp4 92.3 MB
  • mp4~Get Your Files Here !/1 - Introduction Threats to Information Security/1 - Cybersecurity for Everyone.mp4 90.0 MB
  • mp4~Get Your Files Here !/9 - Incident Response/19 - Incident Response.mp4 86.4 MB
  • mp4~Get Your Files Here !/5 - Mobile Device Remote Working Security/13 - Keeping Your Work Safe While Working Remotely.mp4 78.6 MB
  • mp4~Get Your Files Here !/6 - Physical Security/16 - When Safety Fails in the Real World.mp4 77.3 MB
  • mp4~Get Your Files Here !/3 - Password Email Security/7 - Securing Your Email Communications.mp4 74.6 MB
  • mp4~Get Your Files Here !/2 - Malware Security Policies/4 - Understanding Malware.mp4 70.1 MB
  • mp4~Get Your Files Here !/8 - Generative AI/18 - Generative AI.mp4 70.1 MB
  • mp4~Get Your Files Here !/4 - Social Engineering Phishing/11 - Spotting Dodging Phishing Scams.mp4 64.9 MB
  • mp4~Get Your Files Here !/2 - Malware Security Policies/5 - Why Security Policies Procedures Matter.mp4 62.2 MB
  • mp4~Get Your Files Here !/6 - Physical Security/15 - Staying Safe in the Real World.mp4 59.6 MB
  • mp4~Get Your Files Here !/4 - Social Engineering Phishing/10 - Understanding Combatting Phishing Attacks.mp4 55.8 MB
  • mp4~Get Your Files Here !/4 - Social Engineering Phishing/8 - Guarding Against Social Engineering.mp4 53.9 MB
  • mp4~Get Your Files Here !/4 - Social Engineering Phishing/9 - Staying Ahead of Social Engineering Scams.mp4 40.6 MB
  • mp4~Get Your Files Here !/10 - Conclusion/20 - Course Recap Next Steps.mp4 30.6 MB
  • mp4~Get Your Files Here !/5 - Mobile Device Remote Working Security/14 - Attacks on Remote Workers.mp4 29.5 MB
  • mp4~Get Your Files Here !/1 - Introduction Threats to Information Security/2 - Making the Most of This Course.mp4 21.3 MB
共14页 上一页 5 6 7 8 9 10 11 12 13 下一页