磁力管家

磁力管家
为您索检到186条磁力链接,耗时1毫秒。 rss

分享给好友

【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity Meets Ai - Essentials For 2024
收录时间:2024-12-23 文档个数:31 文档大小:205.7 MB 最近下载:2025-05-16 人气:723 磁力链接
  • mp4~Get Your Files Here !/4 - AI in Cybersecurity/26 - AI for Automating Incident Response Case Study.mp4 47.6 MB
  • mp4~Get Your Files Here !/4 - AI in Cybersecurity/25 - AIPowered Threat Detection Case Study.mp4 21.6 MB
  • mp4~Get Your Files Here !/6 - AI and Cybersecurity in Action/29 - Practical Demonstration Threat Detection Using AI.mp4 21.1 MB
  • mp4~Get Your Files Here !/5 - Cybersecurity for AI Systems/28 - Ethical Considerations.mp4 20.2 MB
  • mp4~Get Your Files Here !/5 - Cybersecurity for AI Systems/27 - Protecting AI Models.mp4 18.0 MB
  • mp4~Get Your Files Here !/3 - Cybersecurity Fundamentals/24 - Key Cybersecurity Practices.mp4 17.0 MB
  • mp4~Get Your Files Here !/2 - Basics of Cybersecurity and AI/7 - Cybersecurity Basics.mp4 5.7 MB
  • mp4~Get Your Files Here !/3 - Cybersecurity Fundamentals/16 - Ransomware.mp4 5.6 MB
  • mp4~Get Your Files Here !/2 - Basics of Cybersecurity and AI/9 - Basics of AI Key AI Concepts.mp4 5.1 MB
  • mp4~Get Your Files Here !/1 - Introduction/2 - Course Objectives.mp4 3.7 MB
  • mp4~Get Your Files Here !/2 - Basics of Cybersecurity and AI/11 - Cybersecurity for AI Systems.mp4 3.7 MB
  • mp4~Get Your Files Here !/2 - Basics of Cybersecurity and AI/10 - AIs Role in Cybersecurity.mp4 3.6 MB
  • mp4~Get Your Files Here !/3 - Cybersecurity Fundamentals/12 - Part 1 What Are Cyber Threats.mp4 3.4 MB
  • mp4~Get Your Files Here !/3 - Cybersecurity Fundamentals/23 - Summary.mp4 3.3 MB
  • mp4~Get Your Files Here !/1 - Introduction/3 - Course Layout.mp4 3.1 MB
  • mp4~Get Your Files Here !/3 - Cybersecurity Fundamentals/15 - Phishing.mp4 2.4 MB
  • mp4~Get Your Files Here !/3 - Cybersecurity Fundamentals/20 - Part 3 How Cyber Threats Work.mp4 2.1 MB
  • mp4~Get Your Files Here !/1 - Introduction/1 - Introduction.mp4 1.9 MB
  • mp4~Get Your Files Here !/3 - Cybersecurity Fundamentals/22 - Part 5 Mitigating Cyber Threats.mp4 1.9 MB
  • mp4~Get Your Files Here !/2 - Basics of Cybersecurity and AI/8 - Why Cybersecurity Matters.mp4 1.8 MB
【影视】 AI-Enabled Programming, Networking, and Cybersecurity
收录时间:2024-11-28 文档个数:33 文档大小:690.1 MB 最近下载:2025-05-15 人气:1797 磁力链接
  • mp4Lesson 2 Using AI for Cybersecurity/004. 2.3 Securing AI Implementations.mp4 66.1 MB
  • mp4Lesson 1 Introduction to AI-powered Tools/007. 1.6 Introducing Embedding Models.mp4 41.5 MB
  • mp4Lesson 1 Introduction to AI-powered Tools/006. 1.5 Introducing Retrieval Augmented Generation (RAG).mp4 39.5 MB
  • mp4Lesson 2 Using AI for Cybersecurity/005. 2.4 Exploring Network Security Processes Incorporating AI Tools.mp4 33.3 MB
  • mp4Lesson 1 Introduction to AI-powered Tools/003. 1.2 Large Language Models (LLMs) and Small Language Models (SLMs).mp4 31.4 MB
  • mp4Lesson 3 Using AI for Software Development/008. 3.7 Prompt Engineering for Software Development.mp4 31.0 MB
  • mp4Lesson 1 Introduction to AI-powered Tools/004. 1.3 Introducing LangChain, LangGraph, Llama Index, and Other Orchestration Frameworks.mp4 28.4 MB
  • mp4Lesson 4 Using AI for Networking/002. 4.1 Exploring how AI is Revolutionizing Networking.mp4 26.9 MB
  • mp4Lesson 1 Introduction to AI-powered Tools/009. 1.8 Introducing Semantic Search.mp4 25.6 MB
  • mp4Lesson 4 Using AI for Networking/003. 4.2 Using GitHub Copilot for Programming Tasks Related to Networking.mp4 23.8 MB
  • mp4Lesson 4 Using AI for Networking/005. 4.4 Prompt Engineering for Networking.mp4 23.6 MB
  • mp4Lesson 5 Future Trends and Additional Emerging Technologies/003. 5.2 Regulatory and Policy Frameworks.mp4 23.0 MB
  • mp4Lesson 3 Using AI for Software Development/005. 3.4 Generating Code from a Prompt.mp4 22.0 MB
  • mp4Introduction/001. AI-Enabled Programming, Networking, and Cybersecurity Introduction.mp4 21.4 MB
  • mp4Lesson 1 Introduction to AI-powered Tools/001. Learning objectives.mp4 19.7 MB
  • mp4Lesson 1 Introduction to AI-powered Tools/008. 1.7 Introducing Vector Databases - pgvector, Chroma, MongoDB Atlas Vector Search, and others.mp4 18.5 MB
  • mp4Lesson 1 Introduction to AI-powered Tools/002. 1.1 Overview of the Evolution of AI-driven Tools.mp4 18.4 MB
  • mp4Summary/001. AI-Enabled Programming, Networking, and Cybersecurity Summary.mp4 18.1 MB
  • mp4Lesson 1 Introduction to AI-powered Tools/005. 1.4 An Overview of Open-source AI Models and Hugging Face.mp4 17.9 MB
  • mp4Lesson 5 Future Trends and Additional Emerging Technologies/002. 5.1 Exploring Additional Applications of AI in Emerging Technologies.mp4 16.9 MB
【影视】 [ DevCourseWeb.com ] Udemy - Trustee Shield - Cybersecurity Foundation for Kids and Teens
收录时间:2024-11-03 文档个数:104 文档大小:4.3 GB 最近下载:2024-11-18 人气:39 磁力链接
  • mp4~Get Your Files Here !/5. Internet Cookies/6. Protection against Cookie risks.mp4 147.6 MB
  • mp4~Get Your Files Here !/7. Phishing/13. Activity Revised.mp4 141.4 MB
  • mp4~Get Your Files Here !/1. Passwords/5. Making unhackable password.mp4 115.0 MB
  • mp4~Get Your Files Here !/5. Internet Cookies/5. Cookies Risks for Online Privacy.mp4 106.2 MB
  • mp4~Get Your Files Here !/5. Internet Cookies/3. Internet Cookies.mp4 96.9 MB
  • mp4~Get Your Files Here !/3. Malware/7. Trojan Horses.mp4 96.4 MB
  • mp4~Get Your Files Here !/4. Insecure Websites/5. Search Engine.mp4 95.6 MB
  • mp4~Get Your Files Here !/6. Online Privacy/13. How To Protect Privacy- Part (2).mp4 94.8 MB
  • mp4~Get Your Files Here !/2. Multi-Factor Authentication (MFA)/8. Password Managers.mp4 90.9 MB
  • mp4~Get Your Files Here !/6. Online Privacy/12. How To Protect Privacy- Part (1).mp4 81.2 MB
  • mp4~Get Your Files Here !/8. Social Engineering/10. Protection against Social Engineering attacks.mp4 80.4 MB
  • mp4~Get Your Files Here !/8. Social Engineering/9. Ransomwares.mp4 77.5 MB
  • mp4~Get Your Files Here !/8. Social Engineering/3. What is Social Engineering.mp4 75.1 MB
  • mp4~Get Your Files Here !/2. Multi-Factor Authentication (MFA)/6. Two-Factor Authentication (2FA).mp4 70.2 MB
  • mp4~Get Your Files Here !/1. Passwords/3. Password Definition.mp4 68.9 MB
  • mp4~Get Your Files Here !/8. Social Engineering/4. Hackers Perspective.mp4 68.3 MB
  • mp4~Get Your Files Here !/3. Malware/12. Defensive Methods against Malware.mp4 62.5 MB
  • mp4~Get Your Files Here !/4. Insecure Websites/7. Why HTTPS is More Secure than HTTP.mp4 62.5 MB
  • mp4~Get Your Files Here !/3. Malware/6. Worms.mp4 61.9 MB
  • mp4~Get Your Files Here !/6. Online Privacy/8. Digital Footprint Impacts.mp4 61.7 MB
【影视】 PacktPub - Cybersecurity Attacks (Red Team Activity)
收录时间:2024-10-11 文档个数:41 文档大小:1.1 GB 最近下载:2025-05-12 人气:463 磁力链接
  • mp41 - Building Our Lab/Getting Acquainted with Kali Linux Easy Way.mp4 121.1 MB
  • mp41 - Building Our Lab/Getting Acquainted with Terminal Commands.mp4 105.8 MB
  • mp44 - Breaking the Human in a Cyber Crime Attack/Playing on Human Emotions and Weaknesses to Get the Information.mp4 76.7 MB
  • mp42 - Attacking a Network/Taking Control Over Target Browser with BeEf.mp4 46.7 MB
  • mp42 - Attacking a Network/Creating Reverse Shell with Metasploit.mp4 42.0 MB
  • mp44 - Breaking the Human in a Cyber Crime Attack/Social Engineering Techniques.mp4 41.3 MB
  • mp43 - Website and Web-Application Attacks#/Proxy Attack with Burp Suite.mp4 38.5 MB
  • mp42 - Attacking a Network/Hidden Scanning Ports with Nmap.mp4 37.1 MB
  • mp41 - Building Our Lab/Installing Metasploitable 2 on Virtual Machine.mp4 34.5 MB
  • mp43 - Website and Web-Application Attacks#/Manual Testing for SQL Injection.mp4 34.3 MB
  • mp43 - Website and Web-Application Attacks#/Executing a Session Hijacking.mp4 32.0 MB
  • mp44 - Breaking the Human in a Cyber Crime Attack/How to Hack Without Getting in Touch with a Target.mp4 30.3 MB
  • mp43 - Website and Web-Application Attacks#/Exploring Target with Browser.mp4 28.8 MB
  • mp44 - Breaking the Human in a Cyber Crime Attack/Making a Phishing Email with SET.mp4 28.4 MB
  • mp41 - Building Our Lab/The Course Overview.mp4 27.1 MB
  • mp42 - Attacking a Network/Advance-Level Hacking - Scanning Hosts with Python Script.mp4 27.0 MB
  • mp42 - Attacking a Network/Intercepting Traffic with Wireshark.mp4 26.9 MB
  • mp43 - Website and Web-Application Attacks#/Infecting Website with Stored XSS.mp4 26.7 MB
  • mp44 - Breaking the Human in a Cyber Crime Attack/Looking for Secrets in Social Media with Online Tools.mp4 26.1 MB
  • mp43 - Website and Web-Application Attacks#/Scanning Web-Application with OWASP ZAP.mp4 25.5 MB
【影视】 CompTIA CySA+ Cybersecurity Analyst (CS0-003)
收录时间:2024-09-27 文档个数:179 文档大小:4.4 GB 最近下载:2025-05-15 人气:4800 磁力链接
  • mp4Chapter 06 Techniques for Malicious Activity Analysis/003. A Day in the Life of a Cybersecurity Analyst.mp4 157.6 MB
  • mp4Chapter 10 Vulnerability Scanning Methods and Concepts/002. Industry Frameworks.mp4 149.6 MB
  • mp4Chapter 10 Vulnerability Scanning Methods and Concepts/001. Asset Discovery.mp4 133.9 MB
  • mp4Chapter 01 About the CySA Exam/003. How to Take Your CompTIA CySA+ Exam.mp4 125.1 MB
  • mp4Chapter 02 System and Network Architectures/002. Operating System Concepts.mp4 108.3 MB
  • mp4Chapter 02 System and Network Architectures/001. Logging.mp4 104.1 MB
  • mp4Chapter 09 Applying Threat Intelligence in Support of Organizational Security/002. Threat Modeling.mp4 97.3 MB
  • mp4Chapter 06 Techniques for Malicious Activity Analysis/002. Log Analysis (SIEM and SOAR).mp4 94.0 MB
  • mp4Chapter 06 Techniques for Malicious Activity Analysis/005. File Analysis.mp4 85.6 MB
  • mp4Chapter 05 Analyzing Potentially Malicious Activity/003. Application Symptoms.mp4 75.8 MB
  • mp4Chapter 03 Threat Intelligence in Support of Organizational Security/001. Standardized Processes.mp4 70.1 MB
  • mp4Chapter 16 Post-Incident Response Activities/002. Reporting and Communication.mp4 69.7 MB
  • mp4Chapter 14 Vulnerability Handling and Response/009. Vulnerability Management.mp4 68.7 MB
  • mp4Chapter 10 Vulnerability Scanning Methods and Concepts/004. Vulnerability Identification and Scanning.mp4 68.4 MB
  • mp4Chapter 08 Fundamentals of Threat Intelligence/002. Supply, TTP, and Intelligence.mp4 68.1 MB
  • mp4Chapter 09 Applying Threat Intelligence in Support of Organizational Security/005. Integrating Vulnerability Management with Threat Hunting.mp4 68.1 MB
  • mp4Chapter 14 Vulnerability Handling and Response/012. Inhibitors to Remediation.mp4 67.9 MB
  • mp4Chapter 05 Analyzing Potentially Malicious Activity/001. Network Symptoms.mp4 66.7 MB
  • mp4Chapter 09 Applying Threat Intelligence in Support of Organizational Security/004. Threat Hunting.mp4 64.1 MB
  • mp4Chapter 10 Vulnerability Scanning Methods and Concepts/003. Critical Infrastructure.mp4 63.2 MB
【影视】 [ FreeCourseWeb.com ] Ace Your Cybersecurity Interview - The Ultimate Crash Course
收录时间:2024-09-22 文档个数:14 文档大小:582.2 MB 最近下载:2025-05-09 人气:1143 磁力链接
  • mp4~Get Your Files Here !/1 - Cyber Security Technical Interview Questions Answers/3 - Network security interview questions.mp4 119.8 MB
  • mp4~Get Your Files Here !/1 - Cyber Security Technical Interview Questions Answers/1 - Application Security interview questions.mp4 91.2 MB
  • mp4~Get Your Files Here !/1 - Cyber Security Technical Interview Questions Answers/2 - Penetration Testing Vulnerability assessment interview questions.mp4 68.0 MB
  • mp4~Get Your Files Here !/1 - Cyber Security Technical Interview Questions Answers/4 - Cloud Security Interview questions.mp4 64.6 MB
  • mp4~Get Your Files Here !/3 - Cyber Security Skills Certification for Resume/12 - Role based certification for resume.mp4 54.4 MB
  • mp4~Get Your Files Here !/1 - Cyber Security Technical Interview Questions Answers/8 - Network Security Protocols interview questions.mp4 39.0 MB
  • mp4~Get Your Files Here !/1 - Cyber Security Technical Interview Questions Answers/9 - VPN Interview questions.mp4 35.8 MB
  • mp4~Get Your Files Here !/1 - Cyber Security Technical Interview Questions Answers/7 - Cyber Security Fundamentals interview questions.mp4 29.1 MB
  • mp4~Get Your Files Here !/2 - Cyber Security Soft Skills interview questions/10 - Soft Skills.mp4 24.8 MB
  • mp4~Get Your Files Here !/3 - Cyber Security Skills Certification for Resume/11 - Role based resume skills.mp4 20.1 MB
  • mp4~Get Your Files Here !/1 - Cyber Security Technical Interview Questions Answers/6 - Networking Concepts for Cyber Security.mp4 18.6 MB
  • mp4~Get Your Files Here !/1 - Cyber Security Technical Interview Questions Answers/5 - Hacking Concepts interview questions.mp4 16.8 MB
  • txt~Get Your Files Here !/Bonus Resources.txt 386 Bytes
  • urlGet Bonus Downloads Here.url 183 Bytes
【影视】 Cybersecurity and Artificial Intelligence
收录时间:2024-09-08 文档个数:10 文档大小:99.9 MB 最近下载:2025-05-15 人气:2532 磁力链接
  • mp401. Cybersecurity and Artificial Intelligence/01. Cybersecurity and AI Overview.mp4 24.4 MB
  • mp401. Cybersecurity and Artificial Intelligence/02. Demo- Importance of Understanding AI in Cybersecurity.mp4 23.9 MB
  • mp401. Cybersecurity and Artificial Intelligence/03. Phishing and BEC Real-world Examples.mp4 10.8 MB
  • mp401. Cybersecurity and Artificial Intelligence/08. Demo- Deepfake.mp4 8.0 MB
  • zipcybersecurity-artificial-intelligence.zip 7.4 MB
  • mp401. Cybersecurity and Artificial Intelligence/04. Voicemail Scams - Examples and How to Avoid.mp4 7.3 MB
  • mp401. Cybersecurity and Artificial Intelligence/05. Adhering to Company Policies and Guidelines.mp4 5.8 MB
  • mp401. Cybersecurity and Artificial Intelligence/06. AI Hallucinations.mp4 5.8 MB
  • mp401. Cybersecurity and Artificial Intelligence/09. Mitigating the AI Threats.mp4 3.3 MB
  • mp401. Cybersecurity and Artificial Intelligence/07. Criminal Usage of AI.mp4 3.3 MB
【影视】 [ DevCourseWeb.com ] China's Cybersecurity and Privacy Regulations - Essential Training
收录时间:2024-09-02 文档个数:49 文档大小:237.4 MB 最近下载:2025-05-15 人气:431 磁力链接
  • mp4~Get Your Files Here !/05 - 4.Personal Information Protection Law/01 - Personal Information Protection Law breakdown.mp4 29.7 MB
  • mp4~Get Your Files Here !/05 - 4.Personal Information Protection Law/02 - Legal basis and consent.mp4 16.8 MB
  • mp4~Get Your Files Here !/05 - 4.Personal Information Protection Law/04 - Personal information handler obligations.mp4 15.5 MB
  • mp4~Get Your Files Here !/05 - 4.Personal Information Protection Law/05 - Cross-border data transfer and updates to the regulation.mp4 15.2 MB
  • mp4~Get Your Files Here !/03 - 2. Cybersecurity Law/01 - Cybersecurity Law breakdown.mp4 13.6 MB
  • mp4~Get Your Files Here !/05 - 4.Personal Information Protection Law/03 - Data subject rights.mp4 13.3 MB
  • mp4~Get Your Files Here !/03 - 2. Cybersecurity Law/02 - Multilevel protection scheme.mp4 13.2 MB
  • mp4~Get Your Files Here !/04 - 3. Data Security Law/01 - Data Security Law breakdown.mp4 12.8 MB
  • mp4~Get Your Files Here !/03 - 2. Cybersecurity Law/03 - Multilevel protection scheme technical components.mp4 10.7 MB
  • mp4~Get Your Files Here !/02 - 1. China Regulation Basics/02 - Scope.mp4 10.7 MB
  • mp4~Get Your Files Here !/02 - 1. China Regulation Basics/03 - Important dates.mp4 10.6 MB
  • mp4~Get Your Files Here !/06 - 5. Real-World Guidance/02 - Enforcement action examples.mp4 10.2 MB
  • mp4~Get Your Files Here !/04 - 3. Data Security Law/03 - Key provisions of the Data Security Law.mp4 9.7 MB
  • mp4~Get Your Files Here !/04 - 3. Data Security Law/02 - Data classification and cross-border transfer guidelines.mp4 8.6 MB
  • mp4~Get Your Files Here !/01 - Introduction/03 - Definitions.mp4 7.3 MB
  • mp4~Get Your Files Here !/07 - Conclusion/02 - Additional resources.mp4 6.8 MB
  • mp4~Get Your Files Here !/02 - 1. China Regulation Basics/01 - Overview of the recent cybersecurity and privacy regulations.mp4 6.7 MB
  • mp4~Get Your Files Here !/07 - Conclusion/01 - How to get started.mp4 6.5 MB
  • mp4~Get Your Files Here !/06 - 5. Real-World Guidance/01 - Successful certification examples.mp4 6.0 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Cybersecurity and privacy regulation in China.mp4 4.7 MB
【影视】 [ FreeCourseWeb.com ] Udemy - Cybersecurity Assessment For Small And Mid Size Business
收录时间:2024-07-26 文档个数:29 文档大小:824.7 MB 最近下载:2025-05-12 人气:1017 磁力链接
  • mp4~Get Your Files Here !/2 - Physical Security HardwareSoftware Personnel/5 - Is there an inventory of all equipment.mp4 66.2 MB
  • mp4~Get Your Files Here !/5 - Website Social Media/17 - Do all employees have web access and is it monitored.mp4 64.1 MB
  • mp4~Get Your Files Here !/4 - Login Password/12 - Can employees reset passwords lock out owners.mp4 64.1 MB
  • mp4~Get Your Files Here !/2 - Physical Security HardwareSoftware Personnel/3 - Is hardware software maintained internally.mp4 57.0 MB
  • mp4~Get Your Files Here !/8 - Conclusion whats next/21 - Conclusion.mp4 51.8 MB
  • mp4~Get Your Files Here !/3 - Mobile Devices BYOD/8 - Who owns the mobile devices used within the company.mp4 50.3 MB
  • mp4~Get Your Files Here !/2 - Physical Security HardwareSoftware Personnel/6 - Does the company know who report an incident to and the procedure to do so.mp4 50.1 MB
  • mp4~Get Your Files Here !/2 - Physical Security HardwareSoftware Personnel/4 - Hardware or software older than 5 years old.mp4 49.2 MB
  • mp4~Get Your Files Here !/7 - Analyze the risk/20 - What are the threats you face.mp4 40.2 MB
  • mp4~Get Your Files Here !/3 - Mobile Devices BYOD/11 - VPN solution.mp4 37.1 MB
  • mp4~Get Your Files Here !/4 - Login Password/15 - Is there a strict password creation and update policy in place.mp4 35.9 MB
  • mp4~Get Your Files Here !/6 - Data Storage Backup/18 - Does the company use cloud based backup services.mp4 33.8 MB
  • mp4~Get Your Files Here !/5 - Website Social Media/16 - Who has access and authorization to distribute websocial media content.mp4 33.8 MB
  • mp4~Get Your Files Here !/4 - Login Password/13 - Does someone monitor login activity.mp4 33.2 MB
  • mp4~Get Your Files Here !/4 - Login Password/14 - SEIM solution for SMB.mp4 30.7 MB
  • mp4~Get Your Files Here !/6 - Data Storage Backup/19 - Are regulatory guidelines being followed HIPPA DoD PCI.mp4 28.1 MB
  • mp4~Get Your Files Here !/3 - Mobile Devices BYOD/9 - Are devices set to auto connect to Bluetooth and WiFi networks.mp4 25.2 MB
  • mp4~Get Your Files Here !/3 - Mobile Devices BYOD/10 - Is a VPN being used for remote access.mp4 23.8 MB
  • mp4~Get Your Files Here !/1 - Introduction/2 - Frameworks.mp4 23.2 MB
  • mp4~Get Your Files Here !/2 - Physical Security HardwareSoftware Personnel/7 - A possible solution.mp4 11.0 MB
【影视】 [ CourseLala.com ] Linkedin - Cybersecurity Awareness - Web3, Crypto, and NFTs
收录时间:2024-07-23 文档个数:34 文档大小:85.2 MB 最近下载:2025-05-10 人气:485 磁力链接
  • mp4~Get Your Files Here !/02 - 1. CYA Cover Your Assets/04 - Thinking like an attacker.mp4 8.7 MB
  • mp4~Get Your Files Here !/03 - 2. Wallet Security/01 - Custodial wallets.mp4 7.7 MB
  • mp4~Get Your Files Here !/03 - 2. Wallet Security/04 - Hardware wallets.mp4 7.3 MB
  • mp4~Get Your Files Here !/03 - 2. Wallet Security/02 - Hot wallets.mp4 6.9 MB
  • mp4~Get Your Files Here !/05 - 4. Traditional Web2 Attacks Used in Web3/02 - Website hijacking Spoofing.mp4 6.2 MB
  • mp4~Get Your Files Here !/06 - Conclusion/01 - Key takeaways.mp4 5.7 MB
  • mp4~Get Your Files Here !/02 - 1. CYA Cover Your Assets/02 - Digital assets, part 2 NFTs.mp4 5.5 MB
  • mp4~Get Your Files Here !/04 - 3. Blockchain Specific AttacksScams/02 - Interacting with scam dappssmart contracts, part 2.mp4 5.5 MB
  • mp4~Get Your Files Here !/05 - 4. Traditional Web2 Attacks Used in Web3/01 - Phishing.mp4 5.4 MB
  • mp4~Get Your Files Here !/03 - 2. Wallet Security/03 - Demo Installing a hot wallet.mp4 5.4 MB
  • mp4~Get Your Files Here !/02 - 1. CYA Cover Your Assets/03 - Crypto wallets.mp4 5.2 MB
  • mp4~Get Your Files Here !/04 - 3. Blockchain Specific AttacksScams/01 - Interacting with scam dappssmart contracts, part 1.mp4 4.6 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Staying safe on your journey into Web3.mp4 3.4 MB
  • mp4~Get Your Files Here !/02 - 1. CYA Cover Your Assets/01 - Digital assets, part 1 Cryptocurrencies.mp4 3.3 MB
  • mp4~Get Your Files Here !/01 - Introduction/02 - What to know before you begin.mp4 2.6 MB
  • mp4~Get Your Files Here !/06 - Conclusion/02 - Next steps.mp4 1.7 MB
  • srt~Get Your Files Here !/03 - 2. Wallet Security/02 - Hot wallets.srt 6.2 kB
  • srt~Get Your Files Here !/03 - 2. Wallet Security/04 - Hardware wallets.srt 6.1 kB
  • srt~Get Your Files Here !/03 - 2. Wallet Security/01 - Custodial wallets.srt 5.1 kB
  • srt~Get Your Files Here !/04 - 3. Blockchain Specific AttacksScams/02 - Interacting with scam dappssmart contracts, part 2.srt 4.9 kB
【影视】 sccnc-Cybersecurity
收录时间:2024-07-12 文档个数:8 文档大小:51.0 MB 最近下载:2024-07-24 人气:4 磁力链接
  • movCybersecurity.HD.mov 42.6 MB
  • mp4Cybersecurity.mp4 7.4 MB
  • mp3Cybersecurity.mp3 886.9 kB
  • pngCybersecurity.png 40.9 kB
  • sqlitesccnc-Cybersecurity_meta.sqlite 20.5 kB
  • vttCybersecurity.es.vtt 9.7 kB
  • vttCybersecurity.en.vtt 8.2 kB
  • xmlsccnc-Cybersecurity_meta.xml 1.6 kB
【影视】 Theoretical Foundations of AI in Cybersecurity
收录时间:2024-07-08 文档个数:362 文档大小:6.1 GB 最近下载:2025-05-15 人气:11053 磁力链接
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/3. Fundamental Theories of AI/7. Case Study Revolutionizing Cybersecurity with Natural Language Processing.mp4 57.4 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/7. Deep Learning for Cyber Defense/11. Case Study Unraveling the Challenges of Deploying Deep Learning Models.mp4 52.3 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/7. Deep Learning for Cyber Defense/3. Case Study Enhancing Cybersecurity with Neural Networks.mp4 49.2 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/13. AI in Vulnerability Management/9. Case Study AI-Driven Transformation in Vulnerability Management.mp4 48.5 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/4. Cybersecurity Fundamentals/4. Types of Cyber Threats.mp4 48.4 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/15. AI in Network Security/9. Case Study AI in Network Security.mp4 48.1 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/2. Introduction to Cybersecurity and AI/8. Key Concepts and Terminologies.mp4 47.1 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/10. AI for Intrusion Detection Systems (IDS)/7. Case Study Implementing AI-Based Intrusion Detection Systems.mp4 46.9 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/2. Introduction to Cybersecurity and AI/4. Overview of Cybersecurity.mp4 46.5 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/10. AI for Intrusion Detection Systems (IDS)/9. Case Study Enhancing Cybersecurity with AI-Powered Intrusion Detection Systems.mp4 46.2 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/4. Cybersecurity Fundamentals/11. Case Study Revamping Cybersecurity Strategy at TechNova.mp4 44.9 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/5. Intersection of AI and Cybersecurity/11. Case Study Integrating AI for Enhanced Cybersecurity.mp4 44.4 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/7. Deep Learning for Cyber Defense/2. Neural Networks in Cybersecurity.mp4 44.2 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/11. AI for Threat Hunting/8. Case Studies and Examples.mp4 43.8 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/8. Natural Language Processing in Cybersecurity/3. Case Study Enhancing Cybersecurity Threat Intelligence.mp4 43.7 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/6. Machine Learning in Cybersecurity/2. Supervised Learning for Threat Detection.mp4 43.5 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/8. Natural Language Processing in Cybersecurity/11. Case Study Overcoming NLP Limitations in Cybersecurity.mp4 43.5 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/14. AI and Cyber Threat Intelligence/6. Theoretical Models and Techniques.mp4 43.4 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/9. Reinforcement Learning in Cyber Defense/5. Case Study Revolutionizing Cybersecurity with Reinforcement Learning.mp4 43.2 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/2. Introduction to Cybersecurity and AI/7. Case Study AI in Cybersecurity.mp4 42.9 MB
【影视】 Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training
收录时间:2024-07-04 文档个数:135 文档大小:2.5 GB 最近下载:2025-05-15 人气:946 磁力链接
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/6. Azure Security Benchmark - Microsoft Certified Cybersecurity-1.mp4 113.5 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/2. Hybrid Environmental Security Strategies - Microsoft Certifi.mp4 63.8 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/1. Specify Priorities for Mitigating Threats to Apps - Microsof-1.mp4 62.3 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/6. Designing a Regulatory Compliance Strategy/4. Implementing Azure Policy - Microsoft Certified Cybersecurit.mp4 59.0 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/7. Evaluating and Managing Security Postures/6. Mitigating Identified Risks - Microsoft Certified Cybersecur-1.mp4 53.6 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/4. Traffic Filtering and Segmentation Strategies - Microsoft Ce-1.mp4 53.4 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/4. Priorities For Mitigating Threats To Data - Microsoft Certif-1.mp4 53.4 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/5. Azure Best Practices for Network Security - Microsoft Certif-1.mp4 52.2 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/5. Hybrid Infrastructure - Microsoft Certified Cybersecurity Ar-1.mp4 50.4 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/6. Designing a Regulatory Compliance Strategy/6. Translating Privacy Requirements - Microsoft Certified Cyber.mp4 49.7 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/9. Designing a Strategy for Securing SaaS, PaaS, and IaaS Services/1. Security Baselines for SaaS, PaaS, and IaaS services - Micro.mp4 48.3 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/3. Translating Business Goals into Security Requirements - Micr.mp4 47.9 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/7. Securing Privileged Access Using RaMP - Microsoft Certified -1.mp4 47.8 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/2. Security Operations - Microsoft Certified Cybersecurity Arch-1.mp4 47.0 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/4. Designing a Security Operations Strategy/5. SIEMSOAR Strategy - Microsoft Certified Cybersecurity Archit.mp4 46.3 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/2. Translating Requirements - Microsoft Certified Cybersecurity.mp4 46.2 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/3. Security Strategy for Applications and APIs - Microsoft Cert-1.mp4 44.6 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/5. Designing an Identity Security Strategy/1. Strategy for Access to Cloud Resources - Microsoft Certified.mp4 43.0 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/7. Evaluating and Managing Security Postures/4. Designing Security for an Azure Landing Zone - Microsoft Cer.mp4 42.8 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/4. Designing a Security Operations Strategy/3. Logging and Auditing Strategy - Microsoft Certified Cybersec.mp4 42.3 MB
【影视】 [ FreeCourseWeb.com ] Oreilly - Cybersecurity and Cloud Computing Challenges
收录时间:2024-07-03 文档个数:18 文档大小:135.9 MB 最近下载:2025-03-07 人气:211 磁力链接
  • mp4~Get Your Course Here !/08 - Technology Services.mp4 25.6 MB
  • mp4~Get Your Course Here !/12 - Cloud Attack Vectors and Security Considerations by Service Model.mp4 17.2 MB
  • mp4~Get Your Course Here !/04 - Cloud Service Models.mp4 14.6 MB
  • mp4~Get Your Course Here !/10 - STRIDE Threat Model and Top Threats.mp4 13.7 MB
  • mp4~Get Your Course Here !/09 - Notional Cloud Service Provide.mp4 11.4 MB
  • mp4~Get Your Course Here !/01 - Cloud Data Security.mp4 9.9 MB
  • mp4~Get Your Course Here !/05 - NIST Cloud Reference Model and Key Ecosystem Roles.mp4 9.1 MB
  • mp4~Get Your Course Here !/07 - Cloud Cross-cutting Aspects.mp4 8.8 MB
  • mp4~Get Your Course Here !/03 - Cloud Deployment Models.mp4 8.1 MB
  • mp4~Get Your Course Here !/06 - Cloud Computing Team Functions.mp4 7.4 MB
  • mp4~Get Your Course Here !/11 - Treacherous 12.mp4 6.2 MB
  • mp4~Get Your Course Here !/02 - Transparency Reports Database.mp4 3.9 MB
  • txtHow to Support [ FreeCourseWeb.com ] for Free.txt 450 Bytes
  • txt~Get Your Course Here !/How to Support [ FreeCourseWeb.com ] for Free.txt 450 Bytes
  • urlGet More App Tips and Secrets!.url 177 Bytes
  • url~Get Your Course Here !/Resources.url 177 Bytes
  • url~Get All Courses Here !.url 175 Bytes
  • url~Get Your Course Here !/Bonus Courses + Project Files.url 173 Bytes
【影视】 Coursera - Cybersecurity Operations Fundamentals Specialization 2024
收录时间:2024-06-03 文档个数:1754 文档大小:2.0 GB 最近下载:2025-05-04 人气:717 磁力链接
  • mp4Coursera - Security Operations Center (SOC) 2024-1/01_introduction-to-security-operations-center/03_soc-environment-today/01_soc-environment-today.mp4 32.8 MB
  • mp4Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/04_linux-file-system-overview/01_linux-file-system-overview.mp4 26.4 MB
  • mp4Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/15_linux-command-shell-concepts/01_linux-command-shell-concepts.mp4 25.9 MB
  • mp4Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/16_controlling-services-and-processes/01_controlling-services-and-processes.mp4 22.4 MB
  • mp4Coursera - Data Security 2024-1/01_exploring-data-type-categories/08_packet-capture-using-tcpdump/01_packet-capture-using-tcpdump.mp4 19.3 MB
  • mp4Coursera - Security Operations Center (SOC) 2024-1/04_staffing-an-effective-soc-team/03_interaction-of-different-roles-within-the-soc/02_interaction-of-various-roles-within-the-soc.mp4 18.9 MB
  • mp4Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/21_viewing-running-network-services/01_viewing-running-network-services.mp4 18.0 MB
  • mp4Coursera - Security Operations Center (SOC) 2024-1/03_soc-deployment-models-and-types/02_soc-types-and-staffing-considerations/02_soc-types-and-staffing-considerations.mp4 17.8 MB
  • mp4Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/20_windows-netstat-command/01_windows-netstat-command.mp4 17.7 MB
  • mp4Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/04_ip-vulnerabilities/02_ip-vulnerabilities.mp4 16.6 MB
  • mp4Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/02_host-based-personal-firewall/01_host-based-personal-firewall.mp4 16.3 MB
  • mp4Coursera - Security Operations Center (SOC) 2024-1/03_soc-deployment-models-and-types/03_soc-models-and-their-consumers/02_soc-models-and-their-consumers.mp4 16.1 MB
  • mp4Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/13_system-processes/01_system-processes.mp4 15.9 MB
  • mp4Coursera - Security Operations Center (SOC) 2024-1/06_developing-key-relationships-with-internal-and-external-stakeholders/03_external-stakeholders/02_external-stakeholders.mp4 15.3 MB
  • mp4Coursera - Security Operations Center (SOC) 2024-1/01_introduction-to-security-operations-center/04_goal-of-a-soc/01_goal-of-a-soc.mp4 15.0 MB
  • mp4Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/05_http-operations/02_http-operations.mp4 14.5 MB
  • mp4Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/16_netflow-as-a-security-tool/01_netflow-as-a-security-tool.mp4 14.5 MB
  • mp4Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/08_windows-file-system-structure/01_windows-file-system-structure.mp4 14.3 MB
  • mp4Coursera - Security Operations Center (SOC) 2024-1/05_security-events-data-and-soc-analyst-tools/02_soc-relevant-data-and-security-event-data/01_soc-relevant-data-and-security-event-data-introduction.mp4 14.0 MB
  • mp4Coursera - Security Operations Center (SOC) 2024-1/06_developing-key-relationships-with-internal-and-external-stakeholders/02_internal-stakeholders/02_internal-stakeholders.mp4 13.7 MB
【影视】 [ DevCourseWeb.com ] Udemy - Crush Any Cybersecurity Exam!
收录时间:2024-06-02 文档个数:37 文档大小:448.8 MB 最近下载:2025-05-12 人气:527 磁力链接
  • mp4~Get Your Files Here !/2. The Blue Print/9. Exam Tips.mp4 247.1 MB
  • mp4~Get Your Files Here !/2. The Blue Print/2. Soft Commit & Motivation.mp4 59.0 MB
  • mp4~Get Your Files Here !/2. The Blue Print/1. Do This First!.mp4 35.4 MB
  • mp4~Get Your Files Here !/1. Introduction/1. Welcome!.mp4 29.1 MB
  • mp4~Get Your Files Here !/1. Introduction/3. What you'll learn in this course.mp4 25.9 MB
  • mp4~Get Your Files Here !/2. The Blue Print/4. Must Have Tools.mp4 12.8 MB
  • mp4~Get Your Files Here !/2. The Blue Print/8. Practice Tests (Gamify).mp4 9.5 MB
  • mp4~Get Your Files Here !/2. The Blue Print/5. Study Plan & Schedule.mp4 9.5 MB
  • mp4~Get Your Files Here !/2. The Blue Print/11. Beyond The Exam.mp4 9.2 MB
  • mp4~Get Your Files Here !/2. The Blue Print/10. Exam Tips - Continued.mp4 7.3 MB
  • mp4~Get Your Files Here !/2. The Blue Print/6. Hard Commit ($$$).mp4 3.7 MB
  • pdf~Get Your Files Here !/1. Introduction/3.1 What you'll learn in this course.pdf 271.1 kB
  • xlsx~Get Your Files Here !/2. The Blue Print/2.1 CertificationNameHere_Study Matrix-Template.xlsx 12.8 kB
  • srt~Get Your Files Here !/2. The Blue Print/9. Exam Tips.srt 12.1 kB
  • srt~Get Your Files Here !/2. The Blue Print/2. Soft Commit & Motivation.srt 10.0 kB
  • srt~Get Your Files Here !/2. The Blue Print/1. Do This First!.srt 8.4 kB
  • srt~Get Your Files Here !/2. The Blue Print/4. Must Have Tools.srt 3.7 kB
  • srt~Get Your Files Here !/2. The Blue Print/11. Beyond The Exam.srt 2.8 kB
  • srt~Get Your Files Here !/1. Introduction/3. What you'll learn in this course.srt 2.2 kB
  • srt~Get Your Files Here !/1. Introduction/1. Welcome!.srt 1.6 kB
【影视】 Cybersecurity Prevention and Detection 2nd Edition (Video Collection)
收录时间:2024-05-31 文档个数:374 文档大小:3.8 GB 最近下载:2025-05-16 人气:4395 磁力链接
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/007. 1.6 Identity and access management.mp4 120.3 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/003. 1.2 Log ingestion Part 2.mp4 117.9 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/002. 1.1 Log ingestion Part 1.mp4 106.0 MB
  • mp403 Malware and Incident Response/Lesson 1 Threat Landscape/002. 1.1 Malware Threat Landscape.mp4 90.8 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/005. 1.4 Infrastructure concepts.mp4 89.3 MB
  • mp404 Secure Operations and Protections/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/004. 2.3 Technology and tool integration.mp4 87.2 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 2 Analyze Indicators of Potentially Malicious Activity/002. 2.1 Network-related.mp4 77.1 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/008. 1.7 Encryption.mp4 76.0 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/006. 3.5 Common techniques Part 3.mp4 63.7 MB
  • mp403 Malware and Incident Response/Lesson 5 PE File Identification/004. 5.3 Entry Points.mp4 62.4 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/004. 3.3 Common techniques Part 1.mp4 56.9 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/002. 1.1 Threat actors Part 1.mp4 53.5 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/004. 1.3 Operating system (OS) concepts.mp4 52.1 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/005. 3.4 Common techniques Part 2.mp4 51.1 MB
  • mp402 System and Privacy Data Protection/Lesson 4 Analyzing Logs and Impact Analysis/008. 4.7 Impact Analysis.mp4 51.0 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/007. 7.6 SOC and FPGA.mp4 50.5 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/006. 1.5 Network architecture.mp4 50.1 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/010. 7.9 Industrial Control Systems (ICS) and Process Automation.mp4 46.2 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/004. 7.3 Internet of Things (IoT) and Embedded Devices Part 2.mp4 45.3 MB
  • mp404 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/013. 4.12 Threat modeling.mp4 43.6 MB
【影视】 [ CoursePig.com ] Linkedin - The Cybersecurity Threat Landscape (2022)
收录时间:2024-05-29 文档个数:42 文档大小:232.7 MB 最近下载:2025-04-21 人气:186 磁力链接
  • mp4~Get Your Files Here !/10 - 9. Supply Chain Attacks and Third-Party Risks/01 - The threat of supply chain attacks and third-party risks.mp4 16.2 MB
  • mp4~Get Your Files Here !/05 - 4. Botnets and DDoS attacks/02 - Protect against botnets and DDoS threats.mp4 15.8 MB
  • mp4~Get Your Files Here !/08 - 7. Unmanaged IoT Devices/01 - Explore the threat of unmanaged IoT devices.mp4 14.4 MB
  • mp4~Get Your Files Here !/09 - 8. Shadow IT/01 - Explore the threat of shadow IT.mp4 14.2 MB
  • mp4~Get Your Files Here !/08 - 7. Unmanaged IoT Devices/02 - Protect against unmanaged IoT devices.mp4 12.4 MB
  • mp4~Get Your Files Here !/09 - 8. Shadow IT/02 - Protect against shadow IT.mp4 12.4 MB
  • mp4~Get Your Files Here !/06 - 5. Deepfakes/02 - Protect against deepfakes.mp4 12.1 MB
  • mp4~Get Your Files Here !/03 - 2. Phishing and Smishing/02 - Protect against phishing and smishing.mp4 12.0 MB
  • mp4~Get Your Files Here !/11 - Conclusion/01 - Stay up to date on cybersecurity.mp4 11.8 MB
  • mp4~Get Your Files Here !/02 - 1. Malware and Ransomware/02 - Protect against malware and ransomware.mp4 11.7 MB
  • mp4~Get Your Files Here !/02 - 1. Malware and Ransomware/01 - Explore the threat of malware and ransomware.mp4 11.6 MB
  • mp4~Get Your Files Here !/03 - 2. Phishing and Smishing/01 - Explore the threat of phishing and smishing.mp4 11.3 MB
  • mp4~Get Your Files Here !/05 - 4. Botnets and DDoS attacks/01 - Explore the threat of botnets and DDoS attacks.mp4 11.1 MB
  • mp4~Get Your Files Here !/07 - 6. Insider Threats/01 - Explore the risk of insider threats.mp4 10.9 MB
  • mp4~Get Your Files Here !/10 - 9. Supply Chain Attacks and Third-Party Risks/02 - Protect against supply chain attacks and third-party risks.mp4 10.5 MB
  • mp4~Get Your Files Here !/04 - 3. Business Email Compromise/01 - Explore the threat of business email compromise.mp4 9.4 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Examine the cybersecurity threat landscape.mp4 9.4 MB
  • mp4~Get Your Files Here !/04 - 3. Business Email Compromise/02 - Protect against business email compromise.mp4 9.2 MB
  • mp4~Get Your Files Here !/06 - 5. Deepfakes/01 - Explore the threat of deepfakes.mp4 9.0 MB
  • mp4~Get Your Files Here !/07 - 6. Insider Threats/02 - Protect against insider threats.mp4 7.0 MB
【影视】 [ FreeCourseWeb.com ] Translating Cybersecurity for SMBs - Using the NIST Cybersecurity Framework 2.0
收录时间:2024-05-28 文档个数:43 文档大小:127.0 MB 最近下载:2025-05-11 人气:1074 磁力链接
  • mp4~Get Your Files Here !/05 - 4. Identify/01 - Understand what you have.mp4 10.7 MB
  • mp4~Get Your Files Here !/04 - 3. Govern/02 - Roll out your guidance.mp4 8.8 MB
  • mp4~Get Your Files Here !/11 - Conclusion/01 - Build cybersecurity into your business.mp4 8.5 MB
  • mp4~Get Your Files Here !/04 - 3. Govern/01 - Set your cyber strategy.mp4 8.1 MB
  • mp4~Get Your Files Here !/06 - 5. Protect/02 - Guard your network.mp4 7.0 MB
  • mp4~Get Your Files Here !/06 - 5. Protect/01 - Secure your system.mp4 7.0 MB
  • mp4~Get Your Files Here !/07 - 6. Detect/01 - Know when things are off.mp4 6.9 MB
  • mp4~Get Your Files Here !/08 - 7. Respond/01 - Address cyber incidents.mp4 6.7 MB
  • mp4~Get Your Files Here !/08 - 7. Respond/02 - Keep everyone in the loop.mp4 6.7 MB
  • mp4~Get Your Files Here !/09 - 8. Recover/01 - Get back to normal.mp4 6.6 MB
  • mp4~Get Your Files Here !/03 - 2. NIST Cybersecurity Framework 2.0/01 - Cybersecurity framework fundamentals.mp4 6.3 MB
  • mp4~Get Your Files Here !/10 - 9. Build Cyber Capabilities/01 - Determine your tier.mp4 6.2 MB
  • mp4~Get Your Files Here !/02 - 1. Cybersecurity in Your Business/02 - Understand your cyber risks.mp4 6.0 MB
  • mp4~Get Your Files Here !/03 - 2. NIST Cybersecurity Framework 2.0/02 - Leverage the cybersecurity framework.mp4 5.9 MB
  • mp4~Get Your Files Here !/10 - 9. Build Cyber Capabilities/02 - Define your profile.mp4 5.9 MB
  • mp4~Get Your Files Here !/02 - 1. Cybersecurity in Your Business/01 - Cornerstones of cybersecurity.mp4 5.4 MB
  • mp4~Get Your Files Here !/02 - 1. Cybersecurity in Your Business/03 - Prioritize your biggest risks.mp4 4.9 MB
  • mp4~Get Your Files Here !/10 - 9. Build Cyber Capabilities/03 - Create a plan.mp4 3.4 MB
  • mp4~Get Your Files Here !/01 - Introduction/02 - What you should know.mp4 3.0 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Leverage the NIST CSF to protect what matters most.mp4 2.7 MB
【影视】 [Coursera] Advanced Python Scripting for Cybersecurity Specialization - 3 course series
收录时间:2024-05-24 文档个数:97 文档大小:947.7 MB 最近下载:2025-05-15 人气:5150 磁力链接
  • mp4defensive-python/01_defensive-python onehack.us/01_defensive-python/01_04_detecting-ssh-brute-force-with-scapy.mp4 49.7 MB
  • mp4defensive-python/01_defensive-python onehack.us/01_defensive-python/01_07_connection-hijacking-with-scapy.mp4 48.4 MB
  • mp4python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_02_generating-password-variations-with-python.mp4 46.5 MB
  • mp4python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_05_service-detection-with-python.mp4 45.6 MB
  • mp4defensive-python/01_defensive-python onehack.us/01_defensive-python/01_05_feature-selection-for-traffic-analysis.mp4 45.2 MB
  • mp4establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_03_searching-the-registry-with-python.mp4 45.2 MB
  • mp4python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_02_querying-shodan-with-python.mp4 44.0 MB
  • mp4establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_02_traffic-analysis-with-python.mp4 43.7 MB
  • mp4python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_04_network-scanning-with-scapy.mp4 38.8 MB
  • mp4defensive-python/01_defensive-python onehack.us/01_defensive-python/01_02_brute-force-detection-with-windows-events.mp4 38.8 MB
  • mp4defensive-python/01_defensive-python onehack.us/01_defensive-python/01_03_detecting-ftp-brute-force-with-scapy.mp4 35.1 MB
  • mp4establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_04_searching-the-system-with-python.mp4 34.9 MB
  • mp4establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_02_dumping-chrome-credentials-with-python.mp4 34.8 MB
  • mp4establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_06_analyzing-passwords-with-python.mp4 34.5 MB
  • mp4python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_03_dns-queries-with-python.mp4 30.9 MB
  • mp4defensive-python/01_defensive-python onehack.us/01_defensive-python/01_06_detecting-anomalous-network-traffic-with-scapy.mp4 28.8 MB
  • mp4establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_05_building-c2-packets-with-python.mp4 27.1 MB
  • mp4python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_04_automating-brute-force.mp4 25.9 MB
  • mp4establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_05_cracking-the-linux-passwords-with-python.mp4 24.4 MB
  • mp4establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_04_detecting-encodings-with-python.mp4 24.1 MB
共10页 上一页 1 2 3 4 5 6 下一页