为您索检到186条磁力链接,耗时0毫秒。
- 【影视】 [Coursera] Python for Cybersecurity Specialization - 5 course series
-
收录时间:2024-05-20
文档个数:290
文档大小:1.2 GB
最近下载:2025-05-15
人气:5313
磁力链接
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_03_alternative-protocol.mp4 61.8 MB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_05_network-sniffing.mp4 42.0 MB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_04_network-scanning.mp4 32.5 MB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_05_protocol-decoding.mp4 31.5 MB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_07_behavioral-analytics.mp4 29.2 MB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_03_registry-autorun.mp4 29.0 MB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_05_hijacked-execution-flow.mp4 27.5 MB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_06_dns-exploration.mp4 27.3 MB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_05_system-activity-monitoring.mp4 26.6 MB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_03_pcap-collection.mp4 26.0 MB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_03_encrypted-channel.mp4 25.8 MB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_05_scheduled-execution.mp4 25.8 MB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_03_user-account-discovery.mp4 25.4 MB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_03_logon-scripts.mp4 24.6 MB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_03_data-encryption.mp4 23.6 MB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_05_alternate-data-streams.mp4 22.4 MB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_03_default-account-discovery.mp4 21.7 MB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_05_autorun-scripts.mp4 21.2 MB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_03_impair-avs.mp4 20.8 MB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_03_credentials-from-web-browsers.mp4 20.7 MB
猜你喜欢:
Specialization
course
Python
series
Coursera
Cybersecurity
- 【影视】 [ FreeCourseWeb.com ] Linkedin - The Future of Work and Cybersecurity on the Metaverse
-
收录时间:2024-05-07
文档个数:42
文档大小:101.1 MB
最近下载:2025-03-14
人气:219
磁力链接
~Get Your Files Here !/03 - 2. The Essentials/03 - The future of work potential risk categories.mp4 6.9 MB
~Get Your Files Here !/03 - 2. The Essentials/02 - The impact of cyber threats on your business or industry.mp4 6.7 MB
~Get Your Files Here !/04 - 3. Threats/10 - Does metaverse-based work need an HR redesign.mp4 6.5 MB
~Get Your Files Here !/05 - Conclusion/01 - The future of the metaverse of work.mp4 6.4 MB
~Get Your Files Here !/04 - 3. Threats/11 - Decoupling business units and needs.mp4 6.2 MB
~Get Your Files Here !/02 - 1. Defining the Metaverse/01 - What is the metaverse today.mp4 5.6 MB
~Get Your Files Here !/01 - Introduction/02 - What to know before starting this course.mp4 5.5 MB
~Get Your Files Here !/04 - 3. Threats/09 - Regulations for metaverse-based work.mp4 5.2 MB
~Get Your Files Here !/04 - 3. Threats/02 - Threats to your brand.mp4 4.9 MB
~Get Your Files Here !/04 - 3. Threats/08 - Identity theft threats.mp4 4.8 MB
~Get Your Files Here !/03 - 2. The Essentials/01 - Understanding the metaverse environment and its suitability for your industry.mp4 4.7 MB
~Get Your Files Here !/04 - 3. Threats/07 - Cybersecurity threats.mp4 4.6 MB
~Get Your Files Here !/04 - 3. Threats/03 - Threats to your job profile or role.mp4 4.6 MB
~Get Your Files Here !/04 - 3. Threats/04 - Platform-specific threats.mp4 4.6 MB
~Get Your Files Here !/04 - 3. Threats/06 - Regulatory professional threats.mp4 4.5 MB
~Get Your Files Here !/02 - 1. Defining the Metaverse/02 - The various ways in which the metaverse can impact work.mp4 4.4 MB
~Get Your Files Here !/04 - 3. Threats/01 - Threats to the profession.mp4 4.4 MB
~Get Your Files Here !/04 - 3. Threats/05 - Hardware equipment-specific threats.mp4 4.3 MB
~Get Your Files Here !/01 - Introduction/01 - Why discuss the future of work and the metaverse.mp4 3.9 MB
~Get Your Files Here !/05 - Conclusion/02 - Where to begin.mp4 2.4 MB
猜你喜欢:
Cybersecurity
Work
Linkedin
Metaverse
Future
FreeCourseWeb
com
- 【影视】 DIY Cybersecurity Degree
-
收录时间:2024-05-07
文档个数:7179
文档大小:233.4 GB
最近下载:2025-05-15
人气:1770
磁力链接
100 Days of Code The Complete Python Pro Bootcamp for 2023/101 - Final Stretch/002 Study With Me.mp4 1.9 GB
100 Days of Code The Complete Python Pro Bootcamp for 2023/101 - Final Stretch/001 Recording of our Live AMA (aka AAA - Ask Angela Anything).mp4 713.4 MB
CompTIA/CompTIA A+ Core 1 (220-1101)/5. Troubleshooting Hardware and Networking/5.2 Troubleshooting PC Components.mp4 697.8 MB
CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.1 Network Cables.mp4 637.3 MB
CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.4 Random-access Memory.mp4 579.5 MB
Job Tips/Behavioral Interview Prep/03. General Tips.mp4 571.0 MB
CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.4 Technical Controls - The Basics.mp4 551.2 MB
CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.6 Motherboards.mp4 540.8 MB
CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.5 Storage Devices.mp4 527.8 MB
CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.3 Non-Technical Controls - The Rest.mp4 526.4 MB
CompTIA/CompTIA A+ Core 1 (220-1101)/1. Mobile Devices/1.2 Laptop Hardware and Components.mp4 525.8 MB
CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.8 How do we Analyze Risk.mp4 509.3 MB
CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.23 Social Engineering and Physical Attacks.mp4 498.2 MB
CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.2 Non-Technical Controls - The Basics.mp4 486.5 MB
CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.2 Peripheral and Video Cables.mp4 485.9 MB
CompTIA/CompTIA PenTest + (PT0-002)/4. Reporting and Communication/4.3 Communication During a Pentest.mp4 478.0 MB
CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.14 Frameworks, Audits and Policy.mp4 473.1 MB
CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.10 How do we Document and Train for Risk.mp4 472.2 MB
CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.15 IAM Policies and Procedures.mp4 463.2 MB
CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.9 How do we Prioritize, Communicate Risk.mp4 460.5 MB
猜你喜欢:
Cybersecurity
DIY
Degree
- 【影视】 [ DevCourseWeb.com ] Linkedin - Leveraging ChatGPT for Smarter Cybersecurity
-
收录时间:2024-05-07
文档个数:30
文档大小:112.3 MB
最近下载:2025-05-14
人气:558
磁力链接
~Get Your Files Here !/03 - 2. ChatGPT and Security Implications/03 - Uncovering NLP-based cyber threats ChatGPT vulnerabilities.mp4 12.1 MB
~Get Your Files Here !/05 - 4. Integrating ChatGPT with Security Systems/02 - Optimizing cybersecurity with ChatGPT integration in SIEM.mp4 10.5 MB
~Get Your Files Here !/05 - 4. Integrating ChatGPT with Security Systems/04 - Securing the future with ChatGPT and OpenAI in Microsoft Security Copilot.mp4 10.1 MB
~Get Your Files Here !/05 - 4. Integrating ChatGPT with Security Systems/03 - Enhancing vulnerability management with ChatGPT.mp4 9.0 MB
~Get Your Files Here !/02 - 1. Introduction to ChatGPT and Natural Language Processing/02 - Inside ChatGPT NLP and ML uncovered for enhanced understanding.mp4 8.7 MB
~Get Your Files Here !/04 - 3. ChatGPT for Incident Response/02 - Triage potential incidents, analyze logs, and assist investigations.mp4 8.1 MB
~Get Your Files Here !/03 - 2. ChatGPT and Security Implications/02 - Guarding against NLP-based cyberattacks on ChatGPT.mp4 7.8 MB
~Get Your Files Here !/06 - Conclusion/01 - Stay vigilant, stay curious, and extend your skills.mp4 7.7 MB
~Get Your Files Here !/02 - 1. Introduction to ChatGPT and Natural Language Processing/01 - Unleashing the power of OpenAI's ChatGPT for cybersecurity.mp4 7.5 MB
~Get Your Files Here !/04 - 3. ChatGPT for Incident Response/01 - Overview of incident response and forensic analysis.mp4 7.5 MB
~Get Your Files Here !/03 - 2. ChatGPT and Security Implications/01 - Security risks associated with ChatGPT.mp4 7.1 MB
~Get Your Files Here !/05 - 4. Integrating ChatGPT with Security Systems/01 - Advanced threat detection with ChatGPT in SIEM.mp4 6.3 MB
~Get Your Files Here !/02 - 1. Introduction to ChatGPT and Natural Language Processing/03 - Inside ChatGPT Unraveling key concepts and technologies.mp4 5.9 MB
~Get Your Files Here !/01 - Introduction/01 - Leveraging AI for advanced threat detection and prevention.mp4 3.9 MB
~Get Your Files Here !/05 - 4. Integrating ChatGPT with Security Systems/03 - Enhancing vulnerability management with ChatGPT.srt 8.3 kB
~Get Your Files Here !/05 - 4. Integrating ChatGPT with Security Systems/02 - Optimizing cybersecurity with ChatGPT integration in SIEM.srt 6.4 kB
~Get Your Files Here !/03 - 2. ChatGPT and Security Implications/03 - Uncovering NLP-based cyber threats ChatGPT vulnerabilities.srt 6.4 kB
~Get Your Files Here !/04 - 3. ChatGPT for Incident Response/01 - Overview of incident response and forensic analysis.srt 6.2 kB
~Get Your Files Here !/02 - 1. Introduction to ChatGPT and Natural Language Processing/01 - Unleashing the power of OpenAI's ChatGPT for cybersecurity.srt 6.1 kB
~Get Your Files Here !/02 - 1. Introduction to ChatGPT and Natural Language Processing/02 - Inside ChatGPT NLP and ML uncovered for enhanced understanding.srt 6.0 kB
猜你喜欢:
Cybersecurity
Smarter
Leveraging
Linkedin
DevCourseWeb
ChatGPT
com
- 【影视】 [ DevCourseWeb.com ] Udemy - ChatGPT, ML, and AI for Cybersecurity, SOCs and Business
-
收录时间:2024-04-07
文档个数:14
文档大小:3.7 GB
最近下载:2025-05-16
人气:2616
磁力链接
~Get Your Files Here !/3. AI Tools for Security.mp4 683.8 MB
~Get Your Files Here !/4. Enhancing Search Capabilities with GPT4all Plugins.mp4 576.0 MB
~Get Your Files Here !/2. Fundamentals of ChatGPT and GPT4all.mp4 553.4 MB
~Get Your Files Here !/1. Introduction to Machine Learning and AI for Security.mp4 520.6 MB
~Get Your Files Here !/8. Future Trends and Challenges in AI Security.mp4 452.9 MB
~Get Your Files Here !/6. Evaluating AI Security.mp4 379.7 MB
~Get Your Files Here !/5. Securing AI Models and Data.mp4 280.8 MB
~Get Your Files Here !/7. Case Studies of Real-World AI Applications.mp4 279.0 MB
~Get Your Files Here !/Bonus Resources.txt 386 Bytes
Get Bonus Downloads Here.url 182 Bytes
~Get Your Files Here !/9. Final Exam.html 146 Bytes
~Get Your Files Here !/4.2 Github Plugins (primarily for ChatGPT and Python implementations thereof)..html 124 Bytes
~Get Your Files Here !/4.1 ChatGPT Plugins.html 100 Bytes
~Get Your Files Here !/4.3 GPT4All Website and Downloads.html 90 Bytes
猜你喜欢:
Business
AI
ML
Udemy
DevCourseWeb
Cybersecurity
SOCs
ChatGPT
com
- 【影视】 [LiveLessons] The Complete Cybersecurity Bootcamp, 2nd Edition [En]
-
收录时间:2024-03-28
文档个数:290
文档大小:6.5 GB
最近下载:2025-05-15
人气:850
磁力链接
29.2 Hacking iOS.mp4 86.6 MB
17.13 Performing SMTP and DNS Enumeration.mp4 80.0 MB
21.3 Exploring Wireless Threats.mp4 79.0 MB
33.2 Understanding IoT Attacks.mp4 76.8 MB
17.14 Conducting Additional Enumeration Techniques.mp4 75.8 MB
33.1 Introducing IoT Concepts.mp4 74.4 MB
29.1 Understanding Mobile Platform Attack Vectors.mp4 73.4 MB
17.10 Performing SNMP Enumeration.mp4 71.8 MB
17.3 Understanding Host Discovery.mp4 69.7 MB
5.6 Analyzing Computer Incident Response Teams (CSIRTs).mp4 68.5 MB
17.6 Scanning Beyond IDS and Firewall.mp4 68.2 MB
27.5 Cracking Passwords with John the Ripper.mp4 66.1 MB
7.8 Understanding the MITRE ATT&CK Framework.mp4 65.8 MB
29.3 Hacking Android OS.mp4 63.8 MB
20.4 Exploring SQL Injection Tools.mp4 63.3 MB
21.2 Understanding Wireless Encryption.mp4 62.7 MB
17.12 Performing NTP and NFS Enumeration.mp4 61.8 MB
16.10 Performing Footprinting through Social Engineering.mp4 59.1 MB
8.3 Understanding Evidence Collection.mp4 57.2 MB
21.6 Hacking Bluetooth.mp4 52.3 MB
猜你喜欢:
En
Complete
Cybersecurity
LiveLessons
2nd
Edition
Bootcamp
- 【影视】 [ FreeCourseWeb.com ] Cybersecurity Careers - Build Your Brand in Cybersecurity
-
收录时间:2024-03-28
文档个数:34
文档大小:189.3 MB
最近下载:2025-05-11
人气:673
磁力链接
~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/04 - Optimizing your LinkedIn profile.mp4 18.6 MB
~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/05 - Five tips for using LinkedIn effectively.mp4 17.3 MB
~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/02 - Speaking at events and conferences.mp4 16.1 MB
~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/01 - Creating and sharing content.mp4 16.0 MB
~Get Your Files Here !/02 - 1. Personal Branding in Cybersecurity/03 - Benefits of building your personal brand in cybersecurity.mp4 13.9 MB
~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/03 - Building an online presence.mp4 13.6 MB
~Get Your Files Here !/02 - 1. Personal Branding in Cybersecurity/02 - Elements of a strong personal brand.mp4 13.1 MB
~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/02 - Developing a personal brand statement.mp4 11.7 MB
~Get Your Files Here !/05 - 4. Networking for Cybersecurity Professionals/03 - Staying up-to-date with industry trends.mp4 11.6 MB
~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/03 - Contributing to open-source projects.mp4 11.0 MB
~Get Your Files Here !/05 - 4. Networking for Cybersecurity Professionals/01 - Networking and nurturing professional relationships.mp4 10.4 MB
~Get Your Files Here !/02 - 1. Personal Branding in Cybersecurity/01 - What is personal branding.mp4 10.1 MB
~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/01 - Identifying your unique value proposition.mp4 10.0 MB
~Get Your Files Here !/05 - 4. Networking for Cybersecurity Professionals/02 - Effective networking strategies.mp4 8.0 MB
~Get Your Files Here !/01 - Introduction/01 - Grow your cybersecurity career with personal branding.mp4 3.9 MB
~Get Your Files Here !/06 - Conclusion/01 - Next steps.mp4 3.9 MB
~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/02 - Speaking at events and conferences.srt 8.6 kB
~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/01 - Creating and sharing content.srt 7.9 kB
~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/04 - Optimizing your LinkedIn profile.srt 7.5 kB
~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/03 - Building an online presence.srt 7.5 kB
猜你喜欢:
Cybersecurity
Brand
FreeCourseWeb
Build
com
Your
Careers
- 【影视】 [ DevCourseWeb.com ] Udemy - Mastering Cybersecurity and Supply Chain Risk Management
-
收录时间:2024-03-23
文档个数:41
文档大小:3.6 GB
最近下载:2025-05-15
人气:1529
磁力链接
~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/7. Recover.mp4 205.3 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/4. Network Security Controls.mp4 173.8 MB
~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/5. Incident Analysis.mp4 150.0 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/1. User and Network Infrastructure.mp4 136.2 MB
~Get Your Files Here !/1. Introduction to NIST Framework/3. NIST Framework Core.mp4 130.0 MB
~Get Your Files Here !/5. Effective Supply Chain Risk Management/4. Develop, Assess and Test Supply Chain Risks.mp4 123.4 MB
~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/3. Executable Response Plan.mp4 116.0 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/9. Information Protection.mp4 115.2 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/8. Hardware Integrity.mp4 105.7 MB
~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/1. Developing a Continuity of Operations Plan.mp4 103.2 MB
~Get Your Files Here !/2. Cybersecurity Risk Planning & Management/4. Keeping Hardware Inventory Updated.mp4 102.7 MB
~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/2. Incident Response.mp4 102.1 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/7. Data Security.mp4 101.4 MB
~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/6. Mitigation.mp4 101.0 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/2. Authentication and Access Control.mp4 100.3 MB
~Get Your Files Here !/2. Cybersecurity Risk Planning & Management/7. Personnel Security Requirements.mp4 98.1 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/10. Patch Management.mp4 97.7 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/5. Association and Authentication.mp4 91.7 MB
~Get Your Files Here !/5. Effective Supply Chain Risk Management/1. Supply Chain Risk Management.mp4 90.7 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/12. Protective Technology.mp4 88.5 MB
猜你喜欢:
Management
Risk
Chain
Supply
Cybersecurity
Udemy
DevCourseWeb
Mastering
com
- 【影视】 [ DevCourseWeb.com ] Udemy - Trustee Shield - Cybersecurity Foundation for Kids and Teens
-
收录时间:2024-03-22
文档个数:104
文档大小:4.3 GB
最近下载:2025-05-13
人气:2034
磁力链接
~Get Your Files Here !/5. Internet Cookies/6. Protection against Cookie risks.mp4 147.6 MB
~Get Your Files Here !/7. Phishing/13. Activity Revised.mp4 141.4 MB
~Get Your Files Here !/1. Passwords/5. Making unhackable password.mp4 115.0 MB
~Get Your Files Here !/5. Internet Cookies/5. Cookies Risks for Online Privacy.mp4 106.2 MB
~Get Your Files Here !/5. Internet Cookies/3. Internet Cookies.mp4 96.9 MB
~Get Your Files Here !/3. Malware/7. Trojan Horses.mp4 96.4 MB
~Get Your Files Here !/4. Insecure Websites/5. Search Engine.mp4 95.6 MB
~Get Your Files Here !/6. Online Privacy/13. How To Protect Privacy- Part (2).mp4 94.8 MB
~Get Your Files Here !/2. Multi-Factor Authentication (MFA)/8. Password Managers.mp4 90.9 MB
~Get Your Files Here !/6. Online Privacy/12. How To Protect Privacy- Part (1).mp4 81.2 MB
~Get Your Files Here !/8. Social Engineering/10. Protection against Social Engineering attacks.mp4 80.4 MB
~Get Your Files Here !/8. Social Engineering/9. Ransomwares.mp4 77.5 MB
~Get Your Files Here !/8. Social Engineering/3. What is Social Engineering.mp4 75.1 MB
~Get Your Files Here !/2. Multi-Factor Authentication (MFA)/6. Two-Factor Authentication (2FA).mp4 70.2 MB
~Get Your Files Here !/1. Passwords/3. Password Definition.mp4 68.9 MB
~Get Your Files Here !/8. Social Engineering/4. Hackers Perspective.mp4 68.3 MB
~Get Your Files Here !/3. Malware/12. Defensive Methods against Malware.mp4 62.5 MB
~Get Your Files Here !/4. Insecure Websites/7. Why HTTPS is More Secure than HTTP.mp4 62.5 MB
~Get Your Files Here !/3. Malware/6. Worms.mp4 61.9 MB
~Get Your Files Here !/6. Online Privacy/8. Digital Footprint Impacts.mp4 61.7 MB
猜你喜欢:
Foundation
Kids
Shield
Cybersecurity
Udemy
DevCourseWeb
Teens
com
Trustee
- 【影视】 [ CourseWikia.com ] Cybersecurity at Work (2023)
-
收录时间:2024-03-22
文档个数:54
文档大小:199.8 MB
最近下载:2025-05-13
人气:480
磁力链接
~Get Your Files Here !/06 - 5. Hybrid Work Security/05 - Scenario Stolen laptop.mp4 18.0 MB
~Get Your Files Here !/05 - 4. Software and Internet Security/05 - The anatomy of a cyber attack.mp4 11.6 MB
~Get Your Files Here !/04 - 3. Account Security/01 - Password security.mp4 11.5 MB
~Get Your Files Here !/06 - 5. Hybrid Work Security/01 - Physical office security.mp4 10.9 MB
~Get Your Files Here !/02 - 1. Social Engineering Scams and Attacks/05 - Scenario Voice phishing.mp4 10.1 MB
~Get Your Files Here !/02 - 1. Social Engineering Scams and Attacks/04 - Counterfeit apps.mp4 10.0 MB
~Get Your Files Here !/06 - 5. Hybrid Work Security/04 - Smartphone and mobile device attacks.mp4 9.4 MB
~Get Your Files Here !/04 - 3. Account Security/02 - Data breaches and compromised passwords.mp4 9.0 MB
~Get Your Files Here !/03 - 2. Wireless Security/01 - Public Wi-Fi.mp4 9.0 MB
~Get Your Files Here !/05 - 4. Software and Internet Security/04 - Malware Ransomware.mp4 9.0 MB
~Get Your Files Here !/06 - 5. Hybrid Work Security/03 - Laptop and desktop security.mp4 8.2 MB
~Get Your Files Here !/05 - 4. Software and Internet Security/01 - Updating software.mp4 8.1 MB
~Get Your Files Here !/02 - 1. Social Engineering Scams and Attacks/03 - Social media information (over)sharing.mp4 7.9 MB
~Get Your Files Here !/08 - Conclusion/01 - You are part of the security team.mp4 7.2 MB
~Get Your Files Here !/06 - 5. Hybrid Work Security/02 - Physical office security best practices.mp4 7.1 MB
~Get Your Files Here !/03 - 2. Wireless Security/02 - Home Wi-Fi.mp4 6.9 MB
~Get Your Files Here !/02 - 1. Social Engineering Scams and Attacks/02 - Email phishing.mp4 6.5 MB
~Get Your Files Here !/02 - 1. Social Engineering Scams and Attacks/01 - Social engineering overview.mp4 6.4 MB
~Get Your Files Here !/07 - 6. Data Security/01 - Intellectual property.mp4 5.6 MB
~Get Your Files Here !/04 - 3. Account Security/03 - Multifactor authentication.mp4 5.1 MB
猜你喜欢:
Cybersecurity
CourseWikia
com
Work
2023
- 【影视】 [ DevCourseWeb.com ] Udemy - Deepfake Defense for Cybersecurity and GRC Professionals
-
收录时间:2024-03-22
文档个数:38
文档大小:1.4 GB
最近下载:2025-05-15
人气:3879
磁力链接
~Get Your Files Here !/2. Detection & Mitigation/6. 20-Documenting and structuring our Deepfake mitigation strategy Report.mp4 105.7 MB
~Get Your Files Here !/1. Course Foundation/13. 13-Assessing Your organization’s deepfake response capabilities.mp4 99.8 MB
~Get Your Files Here !/2. Detection & Mitigation/8. 22-Action Plan for Deepfake Mitigation Strategy Implementation.mp4 93.6 MB
~Get Your Files Here !/2. Detection & Mitigation/10. 24-Standard Operating Procedure (SOP) for Deepfake Incident Response.mp4 86.6 MB
~Get Your Files Here !/3. Things to consider_Questions to ask/4. 29-Deepfake Mitigation Tools.mp4 80.4 MB
~Get Your Files Here !/2. Detection & Mitigation/5. 19-Developing deepfake mitigation strategy through brainstorming.mp4 79.9 MB
~Get Your Files Here !/1. Course Foundation/11. 11-Identifying Deepfakes.mp4 67.7 MB
~Get Your Files Here !/1. Course Foundation/4. 4-Deepfake Assessment-Can members of your organization identify deepfakes.mp4 63.6 MB
~Get Your Files Here !/1. Course Foundation/5. 5-Course Agenda.mp4 60.7 MB
~Get Your Files Here !/3. Things to consider_Questions to ask/3. 28-Creating a culture of Verefication.mp4 57.2 MB
~Get Your Files Here !/1. Course Foundation/12. 12-Testing for Deepfakes.mp4 57.1 MB
~Get Your Files Here !/2. Detection & Mitigation/1. 15-Intro to section 2_Are there any silver bullets for deepfake mitigation.mp4 51.7 MB
~Get Your Files Here !/1. Course Foundation/3. 3-Possible causes of deepfake Incident-News Brief Postmortem.mp4 50.1 MB
~Get Your Files Here !/2. Detection & Mitigation/3. 17-Important considerations for developing a deepfake defense strategy.mp4 42.4 MB
~Get Your Files Here !/1. Course Foundation/1. 1-Deepfake Defense For Cybersecurity & GRC Professionals.mp4 41.8 MB
~Get Your Files Here !/2. Detection & Mitigation/4. 18-Key components of a deepfake mitigation strategy.mp4 41.2 MB
~Get Your Files Here !/3. Things to consider_Questions to ask/5. 30-The most efficient measures to take against deepfake attacks.mp4 40.7 MB
~Get Your Files Here !/1. Course Foundation/14. 14-End of Section_1.mp4 39.9 MB
~Get Your Files Here !/1. Course Foundation/6. 6-Meet your Instructor.mp4 39.7 MB
~Get Your Files Here !/1. Course Foundation/2. 2-Important Note about course.mp4 38.8 MB
猜你喜欢:
Professionals
Cybersecurity
Udemy
DevCourseWeb
Defense
GRC
com
Deepfake
- 【影视】 [FreeCoursesOnline.Me] O`REILLY - Building a Career in Cybersecurity
-
收录时间:2024-03-05
文档个数:75
文档大小:847.7 MB
最近下载:2025-05-12
人气:550
磁力链接
Lesson 1 Getting Started in the Cybersecurity Field/005. 1.4 Cybersecurity Skills.mp4 65.3 MB
Lesson 2 Planning Your Cybersecurity Career/004. 2.3 The Value of Professional Certifications.mp4 60.1 MB
Lesson 3 Creating Your Own Lab/003. 3.2 Foundational Lab.mp4 48.0 MB
Lesson 5 Preparing for Your Interview/005. 5.4 Final Tips.mp4 44.9 MB
Lesson 6 Using Continuous Improvement Strategy/007. 6.6 Growing Your Career as a Remote Worker.mp4 40.3 MB
Lesson 2 Planning Your Cybersecurity Career/003. 2.2 Creating and Tracking Your Plan.mp4 36.8 MB
Lesson 5 Preparing for Your Interview/003. 5.2 Preparing for the Interview.mp4 35.5 MB
Lesson 1 Getting Started in the Cybersecurity Field/006. 1.5 Navigating through the Industry.mp4 31.9 MB
Lesson 2 Planning Your Cybersecurity Career/002. 2.1 Establishing a Plan.mp4 31.3 MB
Lesson 6 Using Continuous Improvement Strategy/008. 6.7 What’s Next.mp4 31.0 MB
Lesson 1 Getting Started in the Cybersecurity Field/004. 1.3 Cybersecurity Jobs.mp4 30.3 MB
Lesson 5 Preparing for Your Interview/004. 5.3 Advancing in the Interview Process.mp4 29.3 MB
Lesson 6 Using Continuous Improvement Strategy/006. 6.5 Keeping a Good Work-life Balance.mp4 28.2 MB
Lesson 3 Creating Your Own Lab/005. 3.4 Enabling and Using Microsoft Defender for Cloud.mp4 27.7 MB
Introduction/001. Building a Career in Cybersecurity Introduction.mp4 25.1 MB
Lesson 6 Using Continuous Improvement Strategy/003. 6.2 Responsibilities and Expectations.mp4 24.6 MB
Lesson 4 Expanding Your Networking/005. 4.4 Using LinkedIn to Expand Your Network.mp4 24.5 MB
Lesson 1 Getting Started in the Cybersecurity Field/003. 1.2 Roles and Responsibilities.mp4 22.1 MB
Lesson 4 Expanding Your Networking/002. 4.1 Understanding the Cybersecurity Community.mp4 21.9 MB
Lesson 4 Expanding Your Networking/003. 4.2 Identifying Opportunities to Contribute with the Cybersecurity Community.mp4 19.3 MB
猜你喜欢:
FreeCoursesOnline
Me
Cybersecurity
Career
REILLY
Building
- 【影视】 Palo Alto Networks Cybersecurity Fundamentals (PCCSA)
-
收录时间:2024-02-29
文档个数:52
文档大小:2.0 GB
最近下载:2025-05-16
人气:5526
磁力链接
Chapter 1 Cybersecurity Fundamentals and Threat Landscape/002. Identify Computing and Networking Trends.mp4 118.2 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/006. Identify Networking Security Technologies.mp4 114.7 MB
Chapter 1 Cybersecurity Fundamentals and Threat Landscape/003. Describe Cybersecurity Threats.mp4 108.3 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/004. Review Network Addressing.mp4 105.2 MB
Chapter 1 Cybersecurity Fundamentals and Threat Landscape/005. Identify Wi-Fi Vulnerabilities and Attacks.mp4 100.1 MB
Chapter 1 Cybersecurity Fundamentals and Threat Landscape/004. Describe Common Cyberattack Techniques.mp4 96.3 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/011. Endpoint Security.mp4 95.3 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/002. Describe Routing Protocols.mp4 91.8 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/001. Identify Basic Internet and Network Operations.mp4 90.7 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/012. Server and System Administration.mp4 90.3 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/003. Review Networking Models.mp4 88.4 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/009. Learn Basic Virtualization Security Concepts.mp4 83.8 MB
Chapter 3 Palo Alto Networks Security Solutions and Technologies/007. Describe Cortex XSOAR and AutoFocus.mp4 79.5 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/008. Learn Basic Cloud Security Concepts.mp4 75.4 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/010. Learn Basic DevOps Security Concepts.mp4 75.3 MB
Chapter 3 Palo Alto Networks Security Solutions and Technologies/001. Identify Palo Alto Networks Security Solutions.mp4 74.3 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/005. Learn Networking Security Models.mp4 72.6 MB
Chapter 3 Palo Alto Networks Security Solutions and Technologies/002. Describe Basic NGFW Components and Functions.mp4 67.1 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/007. Learn Basic Data Center Security Concepts.mp4 60.2 MB
Chapter 3 Palo Alto Networks Security Solutions and Technologies/003. Learn Basic Prisma Cloud.mp4 59.7 MB
猜你喜欢:
Alto
Cybersecurity
Fundamentals
PCCSA
Palo
Networks
- 【影视】 [GigaCourse.Com] ZeroToMastery - Complete Cybersecurity Bootcamp
-
收录时间:2024-02-21
文档个数:107
文档大小:3.6 GB
最近下载:2025-05-16
人气:1264
磁力链接
8-Network Security/052-Network Security With Nmap.mp4 169.9 MB
5-Security Bugs & Vulnerabilities/020-Buffer Overflow Demonstration.mp4 136.7 MB
12-Appendix - Ethical Hacking/087-Msfconsole Basic Commands.mp4 97.5 MB
8-Network Security/059-Wireless Attack Demonstration.mp4 93.4 MB
7-End-Point Protection/034-Password Security and Password Managers.mp4 84.2 MB
12-Appendix - Ethical Hacking/093-Meterpreter Basic Commands Part 1.mp4 78.5 MB
7-End-Point Protection/038-Process Explorer.mp4 75.8 MB
1-Introduction/001-Cybersecurity Bootcamp - Zero to Mastery.mp4 72.4 MB
8-Network Security/057-Secure Network Architecture.mp4 66.8 MB
12-Appendix - Ethical Hacking/094-Meterpreter Basic Commands Part 2.mp4 65.7 MB
7-End-Point Protection/033-Bitdefender, Kaspersky, McAfee, Malwarebytes.mp4 63.9 MB
4-Understanding Hackers - The Biggest Threat/012-Most Common Attacks Demonstration.mp4 63.5 MB
8-Network Security/060-Network Monitoring With TCPDump.mp4 62.7 MB
8-Network Security/058-Wireless Security.mp4 59.6 MB
5-Security Bugs & Vulnerabilities/017-Unpatched Machine Exploitation Demonstration.mp4 59.1 MB
12-Appendix - Ethical Hacking/080-Whatweb Stealthy Scan.mp4 58.1 MB
12-Appendix - Ethical Hacking/091-Advance Msfvenom Usage.mp4 51.4 MB
7-End-Point Protection/043-Iptables.mp4 50.9 MB
7-End-Point Protection/028-Brave Browser Security and Privacy.mp4 50.6 MB
12-Appendix - Ethical Hacking/089-Software Vulnerability - Samba Exploitation.mp4 49.5 MB
猜你喜欢:
Complete
Cybersecurity
Bootcamp
GigaCourse
ZeroToMastery
Com
- 【影视】 Udemy Cybersecurity Collection
-
收录时间:2024-02-17
文档个数:7517
文档大小:115.9 GB
最近下载:2025-05-16
人气:6044
磁力链接
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/3. Cross-Site-Scripting/1. Cross-Site-Scripting - Lecture.mp4 748.2 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/8. Cross Site Request Forgery/1. CSRF - Techniques.mp4 695.8 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/2. All Interesting Tools/1. Tools I Use.mp4 632.4 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/1. Introduction/3. Recon with.mp4 608.7 MB
Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/18. Reconnaissance/8. Active Recon - Port Scanning.mp4 436.1 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/7. Open Redirect Vulnerability/1. Open Redirect Vulnerability with @hemanth1261.mp4 435.9 MB
Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/19. Exploitation/11. SQL Injection _ SQLMap.mp4 417.9 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/1. Introduction/5. Another Recon Video.mp4 398.8 MB
Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/2. Walkthrough - Legacy.mp4 348.0 MB
Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/16. Assembly Course/5. Arithmetic.mp4 331.0 MB
Udemy - The Complete Ethical Hacking Course, by Gerri Banfield _ Erman Kirkpatrick/05 How to create a bootable USB of Kali Linux ( optional )/025 How to create a bootable USB of Kali with persistent storage _ 4 GB part 4.mp4 328.9 MB
Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/6. Walkthrough - Jerry.mp4 320.2 MB
Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/25. Job Hunting/6. Analyzing the Job Post.mp4 312.1 MB
Udemy - The Complete Ethical Hacking Course, by Gerri Banfield _ Erman Kirkpatrick/04 Set up instructions for Mac users ONLY/021 Kali Linux Live USB on a MacBook Pro part 3 ( OPTIONAL ).mp4 302.6 MB
Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/7. Walkthrough - Nibbles.mp4 299.2 MB
Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/4. Walkthrough - Blue.mp4 298.0 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/6. Server Side Request Forgery/2. SSRF - Advanced Techniques.mp4 294.3 MB
Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/3. Walkthrough - Lame.mp4 293.6 MB
Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/20. Post Exploitation/1. Stabilizing Shells.mp4 285.1 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/6. Server Side Request Forgery/1. SSRF - Basic Techniques.mp4 282.4 MB
猜你喜欢:
Cybersecurity
Collection
Udemy
- 【影视】 [ CoursePig.com ] Linkedin - Microsoft Cybersecurity Architect Expert (SC-100) Cert Prep - 4 Design Strategy for Data and Applications
-
收录时间:2024-02-06
文档个数:24
文档大小:153.6 MB
最近下载:2025-05-16
人气:1320
磁力链接
~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/02 - Design a strategy to identify and protect sensitive data.mp4 27.6 MB
~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/03 - Specify a security strategy for applications and APIs.mp4 24.9 MB
~Get Your Files Here !/01 - Introduction/01 - Prepping for the SC-100 exam.mp4 22.5 MB
~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/02 - Specify a security standard for onboarding a new application.mp4 18.4 MB
~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/03 - Specify an encryption standard for data at rest and in motion.mp4 16.3 MB
~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/01 - Specify priorities for mitigating threats to applications.mp4 14.2 MB
~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/01 - Specify priorities for mitigating threats to data.mp4 13.9 MB
~Get Your Files Here !/01 - Introduction/02 - What you should know.mp4 6.8 MB
~Get Your Files Here !/04 - Conclusion/01 - Next steps.mp4 5.0 MB
~Get Your Files Here !/01 - Introduction/03 - Lab setup.mp4 3.4 MB
~Get Your Files Here !/Ex_Files_MSFT_Cybersecurity_Arch_Expert_SC_100_Cert_Prep_4/Exercise Files/Sign up for a free trial.pdf 338.4 kB
~Get Your Files Here !/Ex_Files_MSFT_Cybersecurity_Arch_Expert_SC_100_Cert_Prep_4/Exercise Files/SC-100 Exam Study Guide Course 4.pdf 47.8 kB
~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/02 - Design a strategy to identify and protect sensitive data.srt 18.1 kB
~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/03 - Specify a security strategy for applications and APIs.srt 15.6 kB
~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/02 - Specify a security standard for onboarding a new application.srt 9.7 kB
~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/03 - Specify an encryption standard for data at rest and in motion.srt 9.2 kB
~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/01 - Specify priorities for mitigating threats to data.srt 9.0 kB
~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/01 - Specify priorities for mitigating threats to applications.srt 7.7 kB
~Get Your Files Here !/01 - Introduction/02 - What you should know.srt 3.4 kB
~Get Your Files Here !/04 - Conclusion/01 - Next steps.srt 2.6 kB
猜你喜欢:
Expert
Cybersecurity
Data
CoursePig
Linkedin
Prep
Applications
Cert
Architect
SC
- 【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity Essentials - Stay Safe and Secure Online
-
收录时间:2024-02-04
文档个数:39
文档大小:1.2 GB
最近下载:2025-05-14
人气:2451
磁力链接
~Get Your Files Here !/6. Device Security/1. Introduction to Device Security.mp4 79.4 MB
~Get Your Files Here !/2. Password Security/2. What Makes a Good Password.mp4 70.5 MB
~Get Your Files Here !/6. Device Security/3. Mobile Security Best Practices.mp4 69.8 MB
~Get Your Files Here !/4. Phishing/1. Introduction to Phishing.mp4 63.3 MB
~Get Your Files Here !/5. Staying Safe on the Web/3. Identifying Suspicious Downloads.mp4 59.6 MB
~Get Your Files Here !/6. Device Security/2. Choosing and Using an Antivirus.mp4 58.4 MB
~Get Your Files Here !/2. Password Security/1. Introduction to Passwords.mp4 57.7 MB
~Get Your Files Here !/5. Staying Safe on the Web/2. Inspecting URLs.mp4 57.6 MB
~Get Your Files Here !/2. Password Security/5. Using a Password Manager.mp4 56.2 MB
~Get Your Files Here !/7. Virtual Private Networks/4. Choosing a VPN Solution.mp4 55.5 MB
~Get Your Files Here !/4. Phishing/4. Phishing Without Email.mp4 54.3 MB
~Get Your Files Here !/4. Phishing/2. The Psychology of Phishing.mp4 52.3 MB
~Get Your Files Here !/5. Staying Safe on the Web/4. Managing Trackers and Cookies.mp4 48.2 MB
~Get Your Files Here !/3. Multi-Factor Authentication (MFA)/3. Choosing a Strong Authentication Factor.mp4 45.8 MB
~Get Your Files Here !/7. Virtual Private Networks/2. Why Use a VPN.mp4 45.5 MB
~Get Your Files Here !/3. Multi-Factor Authentication (MFA)/5. Identifying MFA Phishing Attacks.mp4 41.4 MB
~Get Your Files Here !/7. Virtual Private Networks/3. How VPNs Work.mp4 38.0 MB
~Get Your Files Here !/4. Phishing/3. Examining a Phishing Email.mp4 35.7 MB
~Get Your Files Here !/2. Password Security/4. Checking for Compromised Accounts.mp4 33.5 MB
~Get Your Files Here !/4. Phishing/5. Phishing Using the Cloud.mp4 31.6 MB
猜你喜欢:
Essentials
Cybersecurity
Safe
Stay
DevCourseWeb
Online
Udemy
com
Secure
- 【影视】 [ FreeCourseWeb.com ] Linkedin - Cybersecurity Careers - Become a Security Engineer
-
收录时间:2024-02-04
文档个数:28
文档大小:83.4 MB
最近下载:2025-05-08
人气:642
磁力链接
~Get Your Files Here !/05 - Conclusion/01 - The fun doesn't end.mp4 8.3 MB
~Get Your Files Here !/03 - 2. How to Become a Security Engineer/03 - Certification options.mp4 8.3 MB
~Get Your Files Here !/04 - 3. Day in the Life/01 - Day in the life of a cloud security engineer.mp4 7.7 MB
~Get Your Files Here !/02 - 1. Security Engineering Career Basics/03 - Why pursue a career in cybersecurity.mp4 7.4 MB
~Get Your Files Here !/02 - 1. Security Engineering Career Basics/02 - What's the difference.mp4 7.4 MB
~Get Your Files Here !/02 - 1. Security Engineering Career Basics/01 - What is a security engineer.mp4 7.4 MB
~Get Your Files Here !/03 - 2. How to Become a Security Engineer/04 - Benefits of networking.mp4 7.1 MB
~Get Your Files Here !/04 - 3. Day in the Life/02 - Common challenges.mp4 5.8 MB
~Get Your Files Here !/03 - 2. How to Become a Security Engineer/02 - Develop your skill set.mp4 5.3 MB
~Get Your Files Here !/04 - 3. Day in the Life/03 - Solving problems.mp4 5.2 MB
~Get Your Files Here !/03 - 2. How to Become a Security Engineer/05 - Interviewing for a security engineering position.mp4 5.0 MB
~Get Your Files Here !/03 - 2. How to Become a Security Engineer/01 - Do your research.mp4 4.8 MB
~Get Your Files Here !/01 - 0. Introduction/01 - Becoming a security engineer.mp4 3.7 MB
~Get Your Files Here !/03 - 2. How to Become a Security Engineer/03 - Certification options.srt 8.1 kB
~Get Your Files Here !/03 - 2. How to Become a Security Engineer/04 - Benefits of networking.srt 7.7 kB
~Get Your Files Here !/03 - 2. How to Become a Security Engineer/05 - Interviewing for a security engineering position.srt 6.5 kB
~Get Your Files Here !/02 - 1. Security Engineering Career Basics/02 - What's the difference.srt 6.3 kB
~Get Your Files Here !/04 - 3. Day in the Life/02 - Common challenges.srt 5.7 kB
~Get Your Files Here !/04 - 3. Day in the Life/03 - Solving problems.srt 5.3 kB
~Get Your Files Here !/02 - 1. Security Engineering Career Basics/01 - What is a security engineer.srt 5.3 kB
猜你喜欢:
Cybersecurity
Linkedin
FreeCourseWeb
Become
Security
com
Careers
Engineer
- 【影视】 [ DevCourseWeb.com ] Udemy - Intro To Cybersecurity In Healthcare (2 Of 2),Plain and Simple
-
收录时间:2024-02-03
文档个数:26
文档大小:953.6 MB
最近下载:2025-05-15
人气:1322
磁力链接
~Get Your Files Here !/3 - Ransomware and Cryptocurrency.mp4 309.9 MB
~Get Your Files Here !/7 - Testing Your Vulnerabilities.mp4 150.2 MB
~Get Your Files Here !/2 - Malware.mp4 136.5 MB
~Get Your Files Here !/5 - Boston Childrens Hack The Response.mp4 123.0 MB
~Get Your Files Here !/8 - HIPAA.mp4 70.3 MB
~Get Your Files Here !/4 - Boston Childrens Hack The Issue.mp4 52.4 MB
~Get Your Files Here !/6 - Boston Childrens Hack Lessons Learned.mp4 50.7 MB
~Get Your Files Here !/1 - Introduction.mp4 49.6 MB
~Get Your Files Here !/9 - Conclusions.mp4 10.9 MB
~Get Your Files Here !/3 - Ransomware and Cryptocurrency English.vtt 24.5 kB
~Get Your Files Here !/7 - Testing Your Vulnerabilities English.vtt 12.5 kB
~Get Your Files Here !/13 - IN THE NEWS Some Straight Talk on Ransomware in Health Care.html 11.3 kB
~Get Your Files Here !/2 - Malware English.vtt 10.7 kB
~Get Your Files Here !/5 - Boston Childrens Hack The Response English.vtt 10.1 kB
~Get Your Files Here !/8 - HIPAA English.vtt 5.9 kB
~Get Your Files Here !/12 - IN THE NEWS.html 5.8 kB
~Get Your Files Here !/6 - Boston Childrens Hack Lessons Learned English.vtt 4.6 kB
~Get Your Files Here !/1 - Introduction English.vtt 4.5 kB
~Get Your Files Here !/4 - Boston Childrens Hack The Issue English.vtt 4.3 kB
~Get Your Files Here !/10 - IN THE NEWS Cyberattacks hit midsize hospitals hardest.html 4.2 kB
猜你喜欢:
Cybersecurity
Plain
Udemy
DevCourseWeb
Simple
Intro
Healthcare
com
- 【影视】 [ DevCourseWeb.com ] Udemy - Industrial Cybersecurity Controls As per IEC62443
-
收录时间:2024-01-31
文档个数:24
文档大小:1.8 GB
最近下载:2025-05-11
人气:1472
磁力链接
~Get Your Files Here !/2. Authentication & Authorization Technologies/3. Password Authentication.mp4 269.6 MB
~Get Your Files Here !/1. IEC 62443 Basic Introduction/1. Introduction About IEC.mp4 214.6 MB
~Get Your Files Here !/2. Authentication & Authorization Technologies/2. Role Based Access Control.mp4 200.8 MB
~Get Your Files Here !/2. Authentication & Authorization Technologies/4. Challengeresponse Authentication.mp4 199.5 MB
~Get Your Files Here !/2. Authentication & Authorization Technologies/5. Physical Token Authentication.mp4 182.0 MB
~Get Your Files Here !/2. Authentication & Authorization Technologies/6. Smart Card Authentication.mp4 181.6 MB
~Get Your Files Here !/2. Authentication & Authorization Technologies/7. Biometric Authentication.mp4 178.0 MB
~Get Your Files Here !/2. Authentication & Authorization Technologies/9. Password Distribution & Management.mp4 131.1 MB
~Get Your Files Here !/2. Authentication & Authorization Technologies/8. Location Based Authentication.mp4 101.2 MB
~Get Your Files Here !/2. Authentication & Authorization Technologies/1. Authentication & Authorization Briefing.mp4 99.7 MB
~Get Your Files Here !/2. Authentication & Authorization Technologies/10. Device to Device Authentication.mp4 57.7 MB
~Get Your Files Here !/2. Authentication & Authorization Technologies/3. Password Authentication.srt 22.9 kB
~Get Your Files Here !/2. Authentication & Authorization Technologies/9. Password Distribution & Management.srt 22.1 kB
~Get Your Files Here !/2. Authentication & Authorization Technologies/6. Smart Card Authentication.srt 17.2 kB
~Get Your Files Here !/2. Authentication & Authorization Technologies/7. Biometric Authentication.srt 14.9 kB
~Get Your Files Here !/2. Authentication & Authorization Technologies/4. Challengeresponse Authentication.srt 13.8 kB
~Get Your Files Here !/1. IEC 62443 Basic Introduction/1. Introduction About IEC.srt 13.5 kB
~Get Your Files Here !/2. Authentication & Authorization Technologies/8. Location Based Authentication.srt 13.1 kB
~Get Your Files Here !/2. Authentication & Authorization Technologies/2. Role Based Access Control.srt 13.0 kB
~Get Your Files Here !/2. Authentication & Authorization Technologies/5. Physical Token Authentication.srt 11.9 kB
猜你喜欢:
Industrial
Cybersecurity
Controls
Udemy
DevCourseWeb
IEC62443
per
com