磁力管家

磁力管家
为您索检到186条磁力链接,耗时0毫秒。 rss

分享给好友

【影视】 [Coursera] Python for Cybersecurity Specialization - 5 course series
收录时间:2024-05-20 文档个数:290 文档大小:1.2 GB 最近下载:2025-05-15 人气:5313 磁力链接
  • mp4command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_03_alternative-protocol.mp4 61.8 MB
  • mp4credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_05_network-sniffing.mp4 42.0 MB
  • mp4pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_04_network-scanning.mp4 32.5 MB
  • mp4python-for-active-defense/02_python-for-active-defense-network/01_network/01_05_protocol-decoding.mp4 31.5 MB
  • mp4python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_07_behavioral-analytics.mp4 29.2 MB
  • mp4execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_03_registry-autorun.mp4 29.0 MB
  • mp4execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_05_hijacked-execution-flow.mp4 27.5 MB
  • mp4pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_06_dns-exploration.mp4 27.3 MB
  • mp4python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_05_system-activity-monitoring.mp4 26.6 MB
  • mp4python-for-active-defense/02_python-for-active-defense-network/01_network/01_03_pcap-collection.mp4 26.0 MB
  • mp4command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_03_encrypted-channel.mp4 25.8 MB
  • mp4execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_05_scheduled-execution.mp4 25.8 MB
  • mp4credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_03_user-account-discovery.mp4 25.4 MB
  • mp4execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_03_logon-scripts.mp4 24.6 MB
  • mp4command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_03_data-encryption.mp4 23.6 MB
  • mp4execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_05_alternate-data-streams.mp4 22.4 MB
  • mp4pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_03_default-account-discovery.mp4 21.7 MB
  • mp4pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_05_autorun-scripts.mp4 21.2 MB
  • mp4execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_03_impair-avs.mp4 20.8 MB
  • mp4credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_03_credentials-from-web-browsers.mp4 20.7 MB
【影视】 [ FreeCourseWeb.com ] Linkedin - The Future of Work and Cybersecurity on the Metaverse
收录时间:2024-05-07 文档个数:42 文档大小:101.1 MB 最近下载:2025-03-14 人气:219 磁力链接
  • mp4~Get Your Files Here !/03 - 2. The Essentials/03 - The future of work potential risk categories.mp4 6.9 MB
  • mp4~Get Your Files Here !/03 - 2. The Essentials/02 - The impact of cyber threats on your business or industry.mp4 6.7 MB
  • mp4~Get Your Files Here !/04 - 3. Threats/10 - Does metaverse-based work need an HR redesign.mp4 6.5 MB
  • mp4~Get Your Files Here !/05 - Conclusion/01 - The future of the metaverse of work.mp4 6.4 MB
  • mp4~Get Your Files Here !/04 - 3. Threats/11 - Decoupling business units and needs.mp4 6.2 MB
  • mp4~Get Your Files Here !/02 - 1. Defining the Metaverse/01 - What is the metaverse today.mp4 5.6 MB
  • mp4~Get Your Files Here !/01 - Introduction/02 - What to know before starting this course.mp4 5.5 MB
  • mp4~Get Your Files Here !/04 - 3. Threats/09 - Regulations for metaverse-based work.mp4 5.2 MB
  • mp4~Get Your Files Here !/04 - 3. Threats/02 - Threats to your brand.mp4 4.9 MB
  • mp4~Get Your Files Here !/04 - 3. Threats/08 - Identity theft threats.mp4 4.8 MB
  • mp4~Get Your Files Here !/03 - 2. The Essentials/01 - Understanding the metaverse environment and its suitability for your industry.mp4 4.7 MB
  • mp4~Get Your Files Here !/04 - 3. Threats/07 - Cybersecurity threats.mp4 4.6 MB
  • mp4~Get Your Files Here !/04 - 3. Threats/03 - Threats to your job profile or role.mp4 4.6 MB
  • mp4~Get Your Files Here !/04 - 3. Threats/04 - Platform-specific threats.mp4 4.6 MB
  • mp4~Get Your Files Here !/04 - 3. Threats/06 - Regulatory professional threats.mp4 4.5 MB
  • mp4~Get Your Files Here !/02 - 1. Defining the Metaverse/02 - The various ways in which the metaverse can impact work.mp4 4.4 MB
  • mp4~Get Your Files Here !/04 - 3. Threats/01 - Threats to the profession.mp4 4.4 MB
  • mp4~Get Your Files Here !/04 - 3. Threats/05 - Hardware equipment-specific threats.mp4 4.3 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Why discuss the future of work and the metaverse.mp4 3.9 MB
  • mp4~Get Your Files Here !/05 - Conclusion/02 - Where to begin.mp4 2.4 MB
【影视】 DIY Cybersecurity Degree
收录时间:2024-05-07 文档个数:7179 文档大小:233.4 GB 最近下载:2025-05-15 人气:1770 磁力链接
  • mp4100 Days of Code The Complete Python Pro Bootcamp for 2023/101 - Final Stretch/002 Study With Me.mp4 1.9 GB
  • mp4100 Days of Code The Complete Python Pro Bootcamp for 2023/101 - Final Stretch/001 Recording of our Live AMA (aka AAA - Ask Angela Anything).mp4 713.4 MB
  • mp4CompTIA/CompTIA A+ Core 1 (220-1101)/5. Troubleshooting Hardware and Networking/5.2 Troubleshooting PC Components.mp4 697.8 MB
  • mp4CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.1 Network Cables.mp4 637.3 MB
  • mp4CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.4 Random-access Memory.mp4 579.5 MB
  • mp4Job Tips/Behavioral Interview Prep/03. General Tips.mp4 571.0 MB
  • mp4CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.4 Technical Controls - The Basics.mp4 551.2 MB
  • mp4CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.6 Motherboards.mp4 540.8 MB
  • mp4CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.5 Storage Devices.mp4 527.8 MB
  • mp4CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.3 Non-Technical Controls - The Rest.mp4 526.4 MB
  • mp4CompTIA/CompTIA A+ Core 1 (220-1101)/1. Mobile Devices/1.2 Laptop Hardware and Components.mp4 525.8 MB
  • mp4CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.8 How do we Analyze Risk.mp4 509.3 MB
  • mp4CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.23 Social Engineering and Physical Attacks.mp4 498.2 MB
  • mp4CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.2 Non-Technical Controls - The Basics.mp4 486.5 MB
  • mp4CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.2 Peripheral and Video Cables.mp4 485.9 MB
  • mp4CompTIA/CompTIA PenTest + (PT0-002)/4. Reporting and Communication/4.3 Communication During a Pentest.mp4 478.0 MB
  • mp4CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.14 Frameworks, Audits and Policy.mp4 473.1 MB
  • mp4CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.10 How do we Document and Train for Risk.mp4 472.2 MB
  • mp4CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.15 IAM Policies and Procedures.mp4 463.2 MB
  • mp4CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.9 How do we Prioritize, Communicate Risk.mp4 460.5 MB
【影视】 [ DevCourseWeb.com ] Linkedin - Leveraging ChatGPT for Smarter Cybersecurity
收录时间:2024-05-07 文档个数:30 文档大小:112.3 MB 最近下载:2025-05-14 人气:558 磁力链接
  • mp4~Get Your Files Here !/03 - 2. ChatGPT and Security Implications/03 - Uncovering NLP-based cyber threats ChatGPT vulnerabilities.mp4 12.1 MB
  • mp4~Get Your Files Here !/05 - 4. Integrating ChatGPT with Security Systems/02 - Optimizing cybersecurity with ChatGPT integration in SIEM.mp4 10.5 MB
  • mp4~Get Your Files Here !/05 - 4. Integrating ChatGPT with Security Systems/04 - Securing the future with ChatGPT and OpenAI in Microsoft Security Copilot.mp4 10.1 MB
  • mp4~Get Your Files Here !/05 - 4. Integrating ChatGPT with Security Systems/03 - Enhancing vulnerability management with ChatGPT.mp4 9.0 MB
  • mp4~Get Your Files Here !/02 - 1. Introduction to ChatGPT and Natural Language Processing/02 - Inside ChatGPT NLP and ML uncovered for enhanced understanding.mp4 8.7 MB
  • mp4~Get Your Files Here !/04 - 3. ChatGPT for Incident Response/02 - Triage potential incidents, analyze logs, and assist investigations.mp4 8.1 MB
  • mp4~Get Your Files Here !/03 - 2. ChatGPT and Security Implications/02 - Guarding against NLP-based cyberattacks on ChatGPT.mp4 7.8 MB
  • mp4~Get Your Files Here !/06 - Conclusion/01 - Stay vigilant, stay curious, and extend your skills.mp4 7.7 MB
  • mp4~Get Your Files Here !/02 - 1. Introduction to ChatGPT and Natural Language Processing/01 - Unleashing the power of OpenAI's ChatGPT for cybersecurity.mp4 7.5 MB
  • mp4~Get Your Files Here !/04 - 3. ChatGPT for Incident Response/01 - Overview of incident response and forensic analysis.mp4 7.5 MB
  • mp4~Get Your Files Here !/03 - 2. ChatGPT and Security Implications/01 - Security risks associated with ChatGPT.mp4 7.1 MB
  • mp4~Get Your Files Here !/05 - 4. Integrating ChatGPT with Security Systems/01 - Advanced threat detection with ChatGPT in SIEM.mp4 6.3 MB
  • mp4~Get Your Files Here !/02 - 1. Introduction to ChatGPT and Natural Language Processing/03 - Inside ChatGPT Unraveling key concepts and technologies.mp4 5.9 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Leveraging AI for advanced threat detection and prevention.mp4 3.9 MB
  • srt~Get Your Files Here !/05 - 4. Integrating ChatGPT with Security Systems/03 - Enhancing vulnerability management with ChatGPT.srt 8.3 kB
  • srt~Get Your Files Here !/05 - 4. Integrating ChatGPT with Security Systems/02 - Optimizing cybersecurity with ChatGPT integration in SIEM.srt 6.4 kB
  • srt~Get Your Files Here !/03 - 2. ChatGPT and Security Implications/03 - Uncovering NLP-based cyber threats ChatGPT vulnerabilities.srt 6.4 kB
  • srt~Get Your Files Here !/04 - 3. ChatGPT for Incident Response/01 - Overview of incident response and forensic analysis.srt 6.2 kB
  • srt~Get Your Files Here !/02 - 1. Introduction to ChatGPT and Natural Language Processing/01 - Unleashing the power of OpenAI's ChatGPT for cybersecurity.srt 6.1 kB
  • srt~Get Your Files Here !/02 - 1. Introduction to ChatGPT and Natural Language Processing/02 - Inside ChatGPT NLP and ML uncovered for enhanced understanding.srt 6.0 kB
【影视】 [ DevCourseWeb.com ] Udemy - ChatGPT, ML, and AI for Cybersecurity, SOCs and Business
收录时间:2024-04-07 文档个数:14 文档大小:3.7 GB 最近下载:2025-05-16 人气:2616 磁力链接
  • mp4~Get Your Files Here !/3. AI Tools for Security.mp4 683.8 MB
  • mp4~Get Your Files Here !/4. Enhancing Search Capabilities with GPT4all Plugins.mp4 576.0 MB
  • mp4~Get Your Files Here !/2. Fundamentals of ChatGPT and GPT4all.mp4 553.4 MB
  • mp4~Get Your Files Here !/1. Introduction to Machine Learning and AI for Security.mp4 520.6 MB
  • mp4~Get Your Files Here !/8. Future Trends and Challenges in AI Security.mp4 452.9 MB
  • mp4~Get Your Files Here !/6. Evaluating AI Security.mp4 379.7 MB
  • mp4~Get Your Files Here !/5. Securing AI Models and Data.mp4 280.8 MB
  • mp4~Get Your Files Here !/7. Case Studies of Real-World AI Applications.mp4 279.0 MB
  • txt~Get Your Files Here !/Bonus Resources.txt 386 Bytes
  • urlGet Bonus Downloads Here.url 182 Bytes
  • html~Get Your Files Here !/9. Final Exam.html 146 Bytes
  • html~Get Your Files Here !/4.2 Github Plugins (primarily for ChatGPT and Python implementations thereof)..html 124 Bytes
  • html~Get Your Files Here !/4.1 ChatGPT Plugins.html 100 Bytes
  • html~Get Your Files Here !/4.3 GPT4All Website and Downloads.html 90 Bytes
【影视】 [LiveLessons] The Complete Cybersecurity Bootcamp, 2nd Edition [En]
收录时间:2024-03-28 文档个数:290 文档大小:6.5 GB 最近下载:2025-05-15 人气:850 磁力链接
  • mp429.2 Hacking iOS.mp4 86.6 MB
  • mp417.13 Performing SMTP and DNS Enumeration.mp4 80.0 MB
  • mp421.3 Exploring Wireless Threats.mp4 79.0 MB
  • mp433.2 Understanding IoT Attacks.mp4 76.8 MB
  • mp417.14 Conducting Additional Enumeration Techniques.mp4 75.8 MB
  • mp433.1 Introducing IoT Concepts.mp4 74.4 MB
  • mp429.1 Understanding Mobile Platform Attack Vectors.mp4 73.4 MB
  • mp417.10 Performing SNMP Enumeration.mp4 71.8 MB
  • mp417.3 Understanding Host Discovery.mp4 69.7 MB
  • mp45.6 Analyzing Computer Incident Response Teams (CSIRTs).mp4 68.5 MB
  • mp417.6 Scanning Beyond IDS and Firewall.mp4 68.2 MB
  • mp427.5 Cracking Passwords with John the Ripper.mp4 66.1 MB
  • mp47.8 Understanding the MITRE ATT&CK Framework.mp4 65.8 MB
  • mp429.3 Hacking Android OS.mp4 63.8 MB
  • mp420.4 Exploring SQL Injection Tools.mp4 63.3 MB
  • mp421.2 Understanding Wireless Encryption.mp4 62.7 MB
  • mp417.12 Performing NTP and NFS Enumeration.mp4 61.8 MB
  • mp416.10 Performing Footprinting through Social Engineering.mp4 59.1 MB
  • mp48.3 Understanding Evidence Collection.mp4 57.2 MB
  • mp421.6 Hacking Bluetooth.mp4 52.3 MB
【影视】 [ FreeCourseWeb.com ] Cybersecurity Careers - Build Your Brand in Cybersecurity
收录时间:2024-03-28 文档个数:34 文档大小:189.3 MB 最近下载:2025-05-11 人气:673 磁力链接
  • mp4~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/04 - Optimizing your LinkedIn profile.mp4 18.6 MB
  • mp4~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/05 - Five tips for using LinkedIn effectively.mp4 17.3 MB
  • mp4~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/02 - Speaking at events and conferences.mp4 16.1 MB
  • mp4~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/01 - Creating and sharing content.mp4 16.0 MB
  • mp4~Get Your Files Here !/02 - 1. Personal Branding in Cybersecurity/03 - Benefits of building your personal brand in cybersecurity.mp4 13.9 MB
  • mp4~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/03 - Building an online presence.mp4 13.6 MB
  • mp4~Get Your Files Here !/02 - 1. Personal Branding in Cybersecurity/02 - Elements of a strong personal brand.mp4 13.1 MB
  • mp4~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/02 - Developing a personal brand statement.mp4 11.7 MB
  • mp4~Get Your Files Here !/05 - 4. Networking for Cybersecurity Professionals/03 - Staying up-to-date with industry trends.mp4 11.6 MB
  • mp4~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/03 - Contributing to open-source projects.mp4 11.0 MB
  • mp4~Get Your Files Here !/05 - 4. Networking for Cybersecurity Professionals/01 - Networking and nurturing professional relationships.mp4 10.4 MB
  • mp4~Get Your Files Here !/02 - 1. Personal Branding in Cybersecurity/01 - What is personal branding.mp4 10.1 MB
  • mp4~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/01 - Identifying your unique value proposition.mp4 10.0 MB
  • mp4~Get Your Files Here !/05 - 4. Networking for Cybersecurity Professionals/02 - Effective networking strategies.mp4 8.0 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Grow your cybersecurity career with personal branding.mp4 3.9 MB
  • mp4~Get Your Files Here !/06 - Conclusion/01 - Next steps.mp4 3.9 MB
  • srt~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/02 - Speaking at events and conferences.srt 8.6 kB
  • srt~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/01 - Creating and sharing content.srt 7.9 kB
  • srt~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/04 - Optimizing your LinkedIn profile.srt 7.5 kB
  • srt~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/03 - Building an online presence.srt 7.5 kB
【影视】 [ DevCourseWeb.com ] Udemy - Mastering Cybersecurity and Supply Chain Risk Management
收录时间:2024-03-23 文档个数:41 文档大小:3.6 GB 最近下载:2025-05-15 人气:1529 磁力链接
  • mp4~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/7. Recover.mp4 205.3 MB
  • mp4~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/4. Network Security Controls.mp4 173.8 MB
  • mp4~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/5. Incident Analysis.mp4 150.0 MB
  • mp4~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/1. User and Network Infrastructure.mp4 136.2 MB
  • mp4~Get Your Files Here !/1. Introduction to NIST Framework/3. NIST Framework Core.mp4 130.0 MB
  • mp4~Get Your Files Here !/5. Effective Supply Chain Risk Management/4. Develop, Assess and Test Supply Chain Risks.mp4 123.4 MB
  • mp4~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/3. Executable Response Plan.mp4 116.0 MB
  • mp4~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/9. Information Protection.mp4 115.2 MB
  • mp4~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/8. Hardware Integrity.mp4 105.7 MB
  • mp4~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/1. Developing a Continuity of Operations Plan.mp4 103.2 MB
  • mp4~Get Your Files Here !/2. Cybersecurity Risk Planning & Management/4. Keeping Hardware Inventory Updated.mp4 102.7 MB
  • mp4~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/2. Incident Response.mp4 102.1 MB
  • mp4~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/7. Data Security.mp4 101.4 MB
  • mp4~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/6. Mitigation.mp4 101.0 MB
  • mp4~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/2. Authentication and Access Control.mp4 100.3 MB
  • mp4~Get Your Files Here !/2. Cybersecurity Risk Planning & Management/7. Personnel Security Requirements.mp4 98.1 MB
  • mp4~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/10. Patch Management.mp4 97.7 MB
  • mp4~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/5. Association and Authentication.mp4 91.7 MB
  • mp4~Get Your Files Here !/5. Effective Supply Chain Risk Management/1. Supply Chain Risk Management.mp4 90.7 MB
  • mp4~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/12. Protective Technology.mp4 88.5 MB
【影视】 [ DevCourseWeb.com ] Udemy - Trustee Shield - Cybersecurity Foundation for Kids and Teens
收录时间:2024-03-22 文档个数:104 文档大小:4.3 GB 最近下载:2025-05-13 人气:2034 磁力链接
  • mp4~Get Your Files Here !/5. Internet Cookies/6. Protection against Cookie risks.mp4 147.6 MB
  • mp4~Get Your Files Here !/7. Phishing/13. Activity Revised.mp4 141.4 MB
  • mp4~Get Your Files Here !/1. Passwords/5. Making unhackable password.mp4 115.0 MB
  • mp4~Get Your Files Here !/5. Internet Cookies/5. Cookies Risks for Online Privacy.mp4 106.2 MB
  • mp4~Get Your Files Here !/5. Internet Cookies/3. Internet Cookies.mp4 96.9 MB
  • mp4~Get Your Files Here !/3. Malware/7. Trojan Horses.mp4 96.4 MB
  • mp4~Get Your Files Here !/4. Insecure Websites/5. Search Engine.mp4 95.6 MB
  • mp4~Get Your Files Here !/6. Online Privacy/13. How To Protect Privacy- Part (2).mp4 94.8 MB
  • mp4~Get Your Files Here !/2. Multi-Factor Authentication (MFA)/8. Password Managers.mp4 90.9 MB
  • mp4~Get Your Files Here !/6. Online Privacy/12. How To Protect Privacy- Part (1).mp4 81.2 MB
  • mp4~Get Your Files Here !/8. Social Engineering/10. Protection against Social Engineering attacks.mp4 80.4 MB
  • mp4~Get Your Files Here !/8. Social Engineering/9. Ransomwares.mp4 77.5 MB
  • mp4~Get Your Files Here !/8. Social Engineering/3. What is Social Engineering.mp4 75.1 MB
  • mp4~Get Your Files Here !/2. Multi-Factor Authentication (MFA)/6. Two-Factor Authentication (2FA).mp4 70.2 MB
  • mp4~Get Your Files Here !/1. Passwords/3. Password Definition.mp4 68.9 MB
  • mp4~Get Your Files Here !/8. Social Engineering/4. Hackers Perspective.mp4 68.3 MB
  • mp4~Get Your Files Here !/3. Malware/12. Defensive Methods against Malware.mp4 62.5 MB
  • mp4~Get Your Files Here !/4. Insecure Websites/7. Why HTTPS is More Secure than HTTP.mp4 62.5 MB
  • mp4~Get Your Files Here !/3. Malware/6. Worms.mp4 61.9 MB
  • mp4~Get Your Files Here !/6. Online Privacy/8. Digital Footprint Impacts.mp4 61.7 MB
【影视】 [ CourseWikia.com ] Cybersecurity at Work (2023)
收录时间:2024-03-22 文档个数:54 文档大小:199.8 MB 最近下载:2025-05-13 人气:480 磁力链接
  • mp4~Get Your Files Here !/06 - 5. Hybrid Work Security/05 - Scenario Stolen laptop.mp4 18.0 MB
  • mp4~Get Your Files Here !/05 - 4. Software and Internet Security/05 - The anatomy of a cyber attack.mp4 11.6 MB
  • mp4~Get Your Files Here !/04 - 3. Account Security/01 - Password security.mp4 11.5 MB
  • mp4~Get Your Files Here !/06 - 5. Hybrid Work Security/01 - Physical office security.mp4 10.9 MB
  • mp4~Get Your Files Here !/02 - 1. Social Engineering Scams and Attacks/05 - Scenario Voice phishing.mp4 10.1 MB
  • mp4~Get Your Files Here !/02 - 1. Social Engineering Scams and Attacks/04 - Counterfeit apps.mp4 10.0 MB
  • mp4~Get Your Files Here !/06 - 5. Hybrid Work Security/04 - Smartphone and mobile device attacks.mp4 9.4 MB
  • mp4~Get Your Files Here !/04 - 3. Account Security/02 - Data breaches and compromised passwords.mp4 9.0 MB
  • mp4~Get Your Files Here !/03 - 2. Wireless Security/01 - Public Wi-Fi.mp4 9.0 MB
  • mp4~Get Your Files Here !/05 - 4. Software and Internet Security/04 - Malware Ransomware.mp4 9.0 MB
  • mp4~Get Your Files Here !/06 - 5. Hybrid Work Security/03 - Laptop and desktop security.mp4 8.2 MB
  • mp4~Get Your Files Here !/05 - 4. Software and Internet Security/01 - Updating software.mp4 8.1 MB
  • mp4~Get Your Files Here !/02 - 1. Social Engineering Scams and Attacks/03 - Social media information (over)sharing.mp4 7.9 MB
  • mp4~Get Your Files Here !/08 - Conclusion/01 - You are part of the security team.mp4 7.2 MB
  • mp4~Get Your Files Here !/06 - 5. Hybrid Work Security/02 - Physical office security best practices.mp4 7.1 MB
  • mp4~Get Your Files Here !/03 - 2. Wireless Security/02 - Home Wi-Fi.mp4 6.9 MB
  • mp4~Get Your Files Here !/02 - 1. Social Engineering Scams and Attacks/02 - Email phishing.mp4 6.5 MB
  • mp4~Get Your Files Here !/02 - 1. Social Engineering Scams and Attacks/01 - Social engineering overview.mp4 6.4 MB
  • mp4~Get Your Files Here !/07 - 6. Data Security/01 - Intellectual property.mp4 5.6 MB
  • mp4~Get Your Files Here !/04 - 3. Account Security/03 - Multifactor authentication.mp4 5.1 MB
【影视】 [ DevCourseWeb.com ] Udemy - Deepfake Defense for Cybersecurity and GRC Professionals
收录时间:2024-03-22 文档个数:38 文档大小:1.4 GB 最近下载:2025-05-15 人气:3879 磁力链接
  • mp4~Get Your Files Here !/2. Detection & Mitigation/6. 20-Documenting and structuring our Deepfake mitigation strategy Report.mp4 105.7 MB
  • mp4~Get Your Files Here !/1. Course Foundation/13. 13-Assessing Your organization’s deepfake response capabilities.mp4 99.8 MB
  • mp4~Get Your Files Here !/2. Detection & Mitigation/8. 22-Action Plan for Deepfake Mitigation Strategy Implementation.mp4 93.6 MB
  • mp4~Get Your Files Here !/2. Detection & Mitigation/10. 24-Standard Operating Procedure (SOP) for Deepfake Incident Response.mp4 86.6 MB
  • mp4~Get Your Files Here !/3. Things to consider_Questions to ask/4. 29-Deepfake Mitigation Tools.mp4 80.4 MB
  • mp4~Get Your Files Here !/2. Detection & Mitigation/5. 19-Developing deepfake mitigation strategy through brainstorming.mp4 79.9 MB
  • mp4~Get Your Files Here !/1. Course Foundation/11. 11-Identifying Deepfakes.mp4 67.7 MB
  • mp4~Get Your Files Here !/1. Course Foundation/4. 4-Deepfake Assessment-Can members of your organization identify deepfakes.mp4 63.6 MB
  • mp4~Get Your Files Here !/1. Course Foundation/5. 5-Course Agenda.mp4 60.7 MB
  • mp4~Get Your Files Here !/3. Things to consider_Questions to ask/3. 28-Creating a culture of Verefication.mp4 57.2 MB
  • mp4~Get Your Files Here !/1. Course Foundation/12. 12-Testing for Deepfakes.mp4 57.1 MB
  • mp4~Get Your Files Here !/2. Detection & Mitigation/1. 15-Intro to section 2_Are there any silver bullets for deepfake mitigation.mp4 51.7 MB
  • mp4~Get Your Files Here !/1. Course Foundation/3. 3-Possible causes of deepfake Incident-News Brief Postmortem.mp4 50.1 MB
  • mp4~Get Your Files Here !/2. Detection & Mitigation/3. 17-Important considerations for developing a deepfake defense strategy.mp4 42.4 MB
  • mp4~Get Your Files Here !/1. Course Foundation/1. 1-Deepfake Defense For Cybersecurity & GRC Professionals.mp4 41.8 MB
  • mp4~Get Your Files Here !/2. Detection & Mitigation/4. 18-Key components of a deepfake mitigation strategy.mp4 41.2 MB
  • mp4~Get Your Files Here !/3. Things to consider_Questions to ask/5. 30-The most efficient measures to take against deepfake attacks.mp4 40.7 MB
  • mp4~Get Your Files Here !/1. Course Foundation/14. 14-End of Section_1.mp4 39.9 MB
  • mp4~Get Your Files Here !/1. Course Foundation/6. 6-Meet your Instructor.mp4 39.7 MB
  • mp4~Get Your Files Here !/1. Course Foundation/2. 2-Important Note about course.mp4 38.8 MB
【影视】 [FreeCoursesOnline.Me] O`REILLY - Building a Career in Cybersecurity
收录时间:2024-03-05 文档个数:75 文档大小:847.7 MB 最近下载:2025-05-12 人气:550 磁力链接
  • mp4Lesson 1 Getting Started in the Cybersecurity Field/005. 1.4 Cybersecurity Skills.mp4 65.3 MB
  • mp4Lesson 2 Planning Your Cybersecurity Career/004. 2.3 The Value of Professional Certifications.mp4 60.1 MB
  • mp4Lesson 3 Creating Your Own Lab/003. 3.2 Foundational Lab.mp4 48.0 MB
  • mp4Lesson 5 Preparing for Your Interview/005. 5.4 Final Tips.mp4 44.9 MB
  • mp4Lesson 6 Using Continuous Improvement Strategy/007. 6.6 Growing Your Career as a Remote Worker.mp4 40.3 MB
  • mp4Lesson 2 Planning Your Cybersecurity Career/003. 2.2 Creating and Tracking Your Plan.mp4 36.8 MB
  • mp4Lesson 5 Preparing for Your Interview/003. 5.2 Preparing for the Interview.mp4 35.5 MB
  • mp4Lesson 1 Getting Started in the Cybersecurity Field/006. 1.5 Navigating through the Industry.mp4 31.9 MB
  • mp4Lesson 2 Planning Your Cybersecurity Career/002. 2.1 Establishing a Plan.mp4 31.3 MB
  • mp4Lesson 6 Using Continuous Improvement Strategy/008. 6.7 What’s Next.mp4 31.0 MB
  • mp4Lesson 1 Getting Started in the Cybersecurity Field/004. 1.3 Cybersecurity Jobs.mp4 30.3 MB
  • mp4Lesson 5 Preparing for Your Interview/004. 5.3 Advancing in the Interview Process.mp4 29.3 MB
  • mp4Lesson 6 Using Continuous Improvement Strategy/006. 6.5 Keeping a Good Work-life Balance.mp4 28.2 MB
  • mp4Lesson 3 Creating Your Own Lab/005. 3.4 Enabling and Using Microsoft Defender for Cloud.mp4 27.7 MB
  • mp4Introduction/001. Building a Career in Cybersecurity Introduction.mp4 25.1 MB
  • mp4Lesson 6 Using Continuous Improvement Strategy/003. 6.2 Responsibilities and Expectations.mp4 24.6 MB
  • mp4Lesson 4 Expanding Your Networking/005. 4.4 Using LinkedIn to Expand Your Network.mp4 24.5 MB
  • mp4Lesson 1 Getting Started in the Cybersecurity Field/003. 1.2 Roles and Responsibilities.mp4 22.1 MB
  • mp4Lesson 4 Expanding Your Networking/002. 4.1 Understanding the Cybersecurity Community.mp4 21.9 MB
  • mp4Lesson 4 Expanding Your Networking/003. 4.2 Identifying Opportunities to Contribute with the Cybersecurity Community.mp4 19.3 MB
【影视】 Palo Alto Networks Cybersecurity Fundamentals (PCCSA)
收录时间:2024-02-29 文档个数:52 文档大小:2.0 GB 最近下载:2025-05-16 人气:5526 磁力链接
  • mp4Chapter 1 Cybersecurity Fundamentals and Threat Landscape/002. Identify Computing and Networking Trends.mp4 118.2 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/006. Identify Networking Security Technologies.mp4 114.7 MB
  • mp4Chapter 1 Cybersecurity Fundamentals and Threat Landscape/003. Describe Cybersecurity Threats.mp4 108.3 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/004. Review Network Addressing.mp4 105.2 MB
  • mp4Chapter 1 Cybersecurity Fundamentals and Threat Landscape/005. Identify Wi-Fi Vulnerabilities and Attacks.mp4 100.1 MB
  • mp4Chapter 1 Cybersecurity Fundamentals and Threat Landscape/004. Describe Common Cyberattack Techniques.mp4 96.3 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/011. Endpoint Security.mp4 95.3 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/002. Describe Routing Protocols.mp4 91.8 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/001. Identify Basic Internet and Network Operations.mp4 90.7 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/012. Server and System Administration.mp4 90.3 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/003. Review Networking Models.mp4 88.4 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/009. Learn Basic Virtualization Security Concepts.mp4 83.8 MB
  • mp4Chapter 3 Palo Alto Networks Security Solutions and Technologies/007. Describe Cortex XSOAR and AutoFocus.mp4 79.5 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/008. Learn Basic Cloud Security Concepts.mp4 75.4 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/010. Learn Basic DevOps Security Concepts.mp4 75.3 MB
  • mp4Chapter 3 Palo Alto Networks Security Solutions and Technologies/001. Identify Palo Alto Networks Security Solutions.mp4 74.3 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/005. Learn Networking Security Models.mp4 72.6 MB
  • mp4Chapter 3 Palo Alto Networks Security Solutions and Technologies/002. Describe Basic NGFW Components and Functions.mp4 67.1 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/007. Learn Basic Data Center Security Concepts.mp4 60.2 MB
  • mp4Chapter 3 Palo Alto Networks Security Solutions and Technologies/003. Learn Basic Prisma Cloud.mp4 59.7 MB
【影视】 [GigaCourse.Com] ZeroToMastery - Complete Cybersecurity Bootcamp
收录时间:2024-02-21 文档个数:107 文档大小:3.6 GB 最近下载:2025-05-16 人气:1264 磁力链接
  • mp48-Network Security/052-Network Security With Nmap.mp4 169.9 MB
  • mp45-Security Bugs & Vulnerabilities/020-Buffer Overflow Demonstration.mp4 136.7 MB
  • mp412-Appendix - Ethical Hacking/087-Msfconsole Basic Commands.mp4 97.5 MB
  • mp48-Network Security/059-Wireless Attack Demonstration.mp4 93.4 MB
  • mp47-End-Point Protection/034-Password Security and Password Managers.mp4 84.2 MB
  • mp412-Appendix - Ethical Hacking/093-Meterpreter Basic Commands Part 1.mp4 78.5 MB
  • mp47-End-Point Protection/038-Process Explorer.mp4 75.8 MB
  • mp41-Introduction/001-Cybersecurity Bootcamp - Zero to Mastery.mp4 72.4 MB
  • mp48-Network Security/057-Secure Network Architecture.mp4 66.8 MB
  • mp412-Appendix - Ethical Hacking/094-Meterpreter Basic Commands Part 2.mp4 65.7 MB
  • mp47-End-Point Protection/033-Bitdefender, Kaspersky, McAfee, Malwarebytes.mp4 63.9 MB
  • mp44-Understanding Hackers - The Biggest Threat/012-Most Common Attacks Demonstration.mp4 63.5 MB
  • mp48-Network Security/060-Network Monitoring With TCPDump.mp4 62.7 MB
  • mp48-Network Security/058-Wireless Security.mp4 59.6 MB
  • mp45-Security Bugs & Vulnerabilities/017-Unpatched Machine Exploitation Demonstration.mp4 59.1 MB
  • mp412-Appendix - Ethical Hacking/080-Whatweb Stealthy Scan.mp4 58.1 MB
  • mp412-Appendix - Ethical Hacking/091-Advance Msfvenom Usage.mp4 51.4 MB
  • mp47-End-Point Protection/043-Iptables.mp4 50.9 MB
  • mp47-End-Point Protection/028-Brave Browser Security and Privacy.mp4 50.6 MB
  • mp412-Appendix - Ethical Hacking/089-Software Vulnerability - Samba Exploitation.mp4 49.5 MB
【影视】 Udemy Cybersecurity Collection
收录时间:2024-02-17 文档个数:7517 文档大小:115.9 GB 最近下载:2025-05-16 人气:6044 磁力链接
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/3. Cross-Site-Scripting/1. Cross-Site-Scripting - Lecture.mp4 748.2 MB
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/8. Cross Site Request Forgery/1. CSRF - Techniques.mp4 695.8 MB
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/2. All Interesting Tools/1. Tools I Use.mp4 632.4 MB
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/1. Introduction/3. Recon with.mp4 608.7 MB
  • mp4Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/18. Reconnaissance/8. Active Recon - Port Scanning.mp4 436.1 MB
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/7. Open Redirect Vulnerability/1. Open Redirect Vulnerability with @hemanth1261.mp4 435.9 MB
  • mp4Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/19. Exploitation/11. SQL Injection _ SQLMap.mp4 417.9 MB
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/1. Introduction/5. Another Recon Video.mp4 398.8 MB
  • mp4Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/2. Walkthrough - Legacy.mp4 348.0 MB
  • mp4Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/16. Assembly Course/5. Arithmetic.mp4 331.0 MB
  • mp4Udemy - The Complete Ethical Hacking Course, by Gerri Banfield _ Erman Kirkpatrick/05 How to create a bootable USB of Kali Linux ( optional )/025 How to create a bootable USB of Kali with persistent storage _ 4 GB part 4.mp4 328.9 MB
  • mp4Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/6. Walkthrough - Jerry.mp4 320.2 MB
  • mp4Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/25. Job Hunting/6. Analyzing the Job Post.mp4 312.1 MB
  • mp4Udemy - The Complete Ethical Hacking Course, by Gerri Banfield _ Erman Kirkpatrick/04 Set up instructions for Mac users ONLY/021 Kali Linux Live USB on a MacBook Pro part 3 ( OPTIONAL ).mp4 302.6 MB
  • mp4Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/7. Walkthrough - Nibbles.mp4 299.2 MB
  • mp4Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/4. Walkthrough - Blue.mp4 298.0 MB
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/6. Server Side Request Forgery/2. SSRF - Advanced Techniques.mp4 294.3 MB
  • mp4Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/3. Walkthrough - Lame.mp4 293.6 MB
  • mp4Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/20. Post Exploitation/1. Stabilizing Shells.mp4 285.1 MB
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/6. Server Side Request Forgery/1. SSRF - Basic Techniques.mp4 282.4 MB
【影视】 [ CoursePig.com ] Linkedin - Microsoft Cybersecurity Architect Expert (SC-100) Cert Prep - 4 Design Strategy for Data and Applications
收录时间:2024-02-06 文档个数:24 文档大小:153.6 MB 最近下载:2025-05-16 人气:1320 磁力链接
  • mp4~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/02 - Design a strategy to identify and protect sensitive data.mp4 27.6 MB
  • mp4~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/03 - Specify a security strategy for applications and APIs.mp4 24.9 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Prepping for the SC-100 exam.mp4 22.5 MB
  • mp4~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/02 - Specify a security standard for onboarding a new application.mp4 18.4 MB
  • mp4~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/03 - Specify an encryption standard for data at rest and in motion.mp4 16.3 MB
  • mp4~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/01 - Specify priorities for mitigating threats to applications.mp4 14.2 MB
  • mp4~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/01 - Specify priorities for mitigating threats to data.mp4 13.9 MB
  • mp4~Get Your Files Here !/01 - Introduction/02 - What you should know.mp4 6.8 MB
  • mp4~Get Your Files Here !/04 - Conclusion/01 - Next steps.mp4 5.0 MB
  • mp4~Get Your Files Here !/01 - Introduction/03 - Lab setup.mp4 3.4 MB
  • pdf~Get Your Files Here !/Ex_Files_MSFT_Cybersecurity_Arch_Expert_SC_100_Cert_Prep_4/Exercise Files/Sign up for a free trial.pdf 338.4 kB
  • pdf~Get Your Files Here !/Ex_Files_MSFT_Cybersecurity_Arch_Expert_SC_100_Cert_Prep_4/Exercise Files/SC-100 Exam Study Guide Course 4.pdf 47.8 kB
  • srt~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/02 - Design a strategy to identify and protect sensitive data.srt 18.1 kB
  • srt~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/03 - Specify a security strategy for applications and APIs.srt 15.6 kB
  • srt~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/02 - Specify a security standard for onboarding a new application.srt 9.7 kB
  • srt~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/03 - Specify an encryption standard for data at rest and in motion.srt 9.2 kB
  • srt~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/01 - Specify priorities for mitigating threats to data.srt 9.0 kB
  • srt~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/01 - Specify priorities for mitigating threats to applications.srt 7.7 kB
  • srt~Get Your Files Here !/01 - Introduction/02 - What you should know.srt 3.4 kB
  • srt~Get Your Files Here !/04 - Conclusion/01 - Next steps.srt 2.6 kB
【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity Essentials - Stay Safe and Secure Online
收录时间:2024-02-04 文档个数:39 文档大小:1.2 GB 最近下载:2025-05-14 人气:2451 磁力链接
  • mp4~Get Your Files Here !/6. Device Security/1. Introduction to Device Security.mp4 79.4 MB
  • mp4~Get Your Files Here !/2. Password Security/2. What Makes a Good Password.mp4 70.5 MB
  • mp4~Get Your Files Here !/6. Device Security/3. Mobile Security Best Practices.mp4 69.8 MB
  • mp4~Get Your Files Here !/4. Phishing/1. Introduction to Phishing.mp4 63.3 MB
  • mp4~Get Your Files Here !/5. Staying Safe on the Web/3. Identifying Suspicious Downloads.mp4 59.6 MB
  • mp4~Get Your Files Here !/6. Device Security/2. Choosing and Using an Antivirus.mp4 58.4 MB
  • mp4~Get Your Files Here !/2. Password Security/1. Introduction to Passwords.mp4 57.7 MB
  • mp4~Get Your Files Here !/5. Staying Safe on the Web/2. Inspecting URLs.mp4 57.6 MB
  • mp4~Get Your Files Here !/2. Password Security/5. Using a Password Manager.mp4 56.2 MB
  • mp4~Get Your Files Here !/7. Virtual Private Networks/4. Choosing a VPN Solution.mp4 55.5 MB
  • mp4~Get Your Files Here !/4. Phishing/4. Phishing Without Email.mp4 54.3 MB
  • mp4~Get Your Files Here !/4. Phishing/2. The Psychology of Phishing.mp4 52.3 MB
  • mp4~Get Your Files Here !/5. Staying Safe on the Web/4. Managing Trackers and Cookies.mp4 48.2 MB
  • mp4~Get Your Files Here !/3. Multi-Factor Authentication (MFA)/3. Choosing a Strong Authentication Factor.mp4 45.8 MB
  • mp4~Get Your Files Here !/7. Virtual Private Networks/2. Why Use a VPN.mp4 45.5 MB
  • mp4~Get Your Files Here !/3. Multi-Factor Authentication (MFA)/5. Identifying MFA Phishing Attacks.mp4 41.4 MB
  • mp4~Get Your Files Here !/7. Virtual Private Networks/3. How VPNs Work.mp4 38.0 MB
  • mp4~Get Your Files Here !/4. Phishing/3. Examining a Phishing Email.mp4 35.7 MB
  • mp4~Get Your Files Here !/2. Password Security/4. Checking for Compromised Accounts.mp4 33.5 MB
  • mp4~Get Your Files Here !/4. Phishing/5. Phishing Using the Cloud.mp4 31.6 MB
【影视】 [ FreeCourseWeb.com ] Linkedin - Cybersecurity Careers - Become a Security Engineer
收录时间:2024-02-04 文档个数:28 文档大小:83.4 MB 最近下载:2025-05-08 人气:642 磁力链接
  • mp4~Get Your Files Here !/05 - Conclusion/01 - The fun doesn't end.mp4 8.3 MB
  • mp4~Get Your Files Here !/03 - 2. How to Become a Security Engineer/03 - Certification options.mp4 8.3 MB
  • mp4~Get Your Files Here !/04 - 3. Day in the Life/01 - Day in the life of a cloud security engineer.mp4 7.7 MB
  • mp4~Get Your Files Here !/02 - 1. Security Engineering Career Basics/03 - Why pursue a career in cybersecurity.mp4 7.4 MB
  • mp4~Get Your Files Here !/02 - 1. Security Engineering Career Basics/02 - What's the difference.mp4 7.4 MB
  • mp4~Get Your Files Here !/02 - 1. Security Engineering Career Basics/01 - What is a security engineer.mp4 7.4 MB
  • mp4~Get Your Files Here !/03 - 2. How to Become a Security Engineer/04 - Benefits of networking.mp4 7.1 MB
  • mp4~Get Your Files Here !/04 - 3. Day in the Life/02 - Common challenges.mp4 5.8 MB
  • mp4~Get Your Files Here !/03 - 2. How to Become a Security Engineer/02 - Develop your skill set.mp4 5.3 MB
  • mp4~Get Your Files Here !/04 - 3. Day in the Life/03 - Solving problems.mp4 5.2 MB
  • mp4~Get Your Files Here !/03 - 2. How to Become a Security Engineer/05 - Interviewing for a security engineering position.mp4 5.0 MB
  • mp4~Get Your Files Here !/03 - 2. How to Become a Security Engineer/01 - Do your research.mp4 4.8 MB
  • mp4~Get Your Files Here !/01 - 0. Introduction/01 - Becoming a security engineer.mp4 3.7 MB
  • srt~Get Your Files Here !/03 - 2. How to Become a Security Engineer/03 - Certification options.srt 8.1 kB
  • srt~Get Your Files Here !/03 - 2. How to Become a Security Engineer/04 - Benefits of networking.srt 7.7 kB
  • srt~Get Your Files Here !/03 - 2. How to Become a Security Engineer/05 - Interviewing for a security engineering position.srt 6.5 kB
  • srt~Get Your Files Here !/02 - 1. Security Engineering Career Basics/02 - What's the difference.srt 6.3 kB
  • srt~Get Your Files Here !/04 - 3. Day in the Life/02 - Common challenges.srt 5.7 kB
  • srt~Get Your Files Here !/04 - 3. Day in the Life/03 - Solving problems.srt 5.3 kB
  • srt~Get Your Files Here !/02 - 1. Security Engineering Career Basics/01 - What is a security engineer.srt 5.3 kB
【影视】 [ DevCourseWeb.com ] Udemy - Intro To Cybersecurity In Healthcare (2 Of 2),Plain and Simple
收录时间:2024-02-03 文档个数:26 文档大小:953.6 MB 最近下载:2025-05-15 人气:1322 磁力链接
  • mp4~Get Your Files Here !/3 - Ransomware and Cryptocurrency.mp4 309.9 MB
  • mp4~Get Your Files Here !/7 - Testing Your Vulnerabilities.mp4 150.2 MB
  • mp4~Get Your Files Here !/2 - Malware.mp4 136.5 MB
  • mp4~Get Your Files Here !/5 - Boston Childrens Hack The Response.mp4 123.0 MB
  • mp4~Get Your Files Here !/8 - HIPAA.mp4 70.3 MB
  • mp4~Get Your Files Here !/4 - Boston Childrens Hack The Issue.mp4 52.4 MB
  • mp4~Get Your Files Here !/6 - Boston Childrens Hack Lessons Learned.mp4 50.7 MB
  • mp4~Get Your Files Here !/1 - Introduction.mp4 49.6 MB
  • mp4~Get Your Files Here !/9 - Conclusions.mp4 10.9 MB
  • vtt~Get Your Files Here !/3 - Ransomware and Cryptocurrency English.vtt 24.5 kB
  • vtt~Get Your Files Here !/7 - Testing Your Vulnerabilities English.vtt 12.5 kB
  • html~Get Your Files Here !/13 - IN THE NEWS Some Straight Talk on Ransomware in Health Care.html 11.3 kB
  • vtt~Get Your Files Here !/2 - Malware English.vtt 10.7 kB
  • vtt~Get Your Files Here !/5 - Boston Childrens Hack The Response English.vtt 10.1 kB
  • vtt~Get Your Files Here !/8 - HIPAA English.vtt 5.9 kB
  • html~Get Your Files Here !/12 - IN THE NEWS.html 5.8 kB
  • vtt~Get Your Files Here !/6 - Boston Childrens Hack Lessons Learned English.vtt 4.6 kB
  • vtt~Get Your Files Here !/1 - Introduction English.vtt 4.5 kB
  • vtt~Get Your Files Here !/4 - Boston Childrens Hack The Issue English.vtt 4.3 kB
  • html~Get Your Files Here !/10 - IN THE NEWS Cyberattacks hit midsize hospitals hardest.html 4.2 kB
【影视】 [ DevCourseWeb.com ] Udemy - Industrial Cybersecurity Controls As per IEC62443
收录时间:2024-01-31 文档个数:24 文档大小:1.8 GB 最近下载:2025-05-11 人气:1472 磁力链接
  • mp4~Get Your Files Here !/2. Authentication & Authorization Technologies/3. Password Authentication.mp4 269.6 MB
  • mp4~Get Your Files Here !/1. IEC 62443 Basic Introduction/1. Introduction About IEC.mp4 214.6 MB
  • mp4~Get Your Files Here !/2. Authentication & Authorization Technologies/2. Role Based Access Control.mp4 200.8 MB
  • mp4~Get Your Files Here !/2. Authentication & Authorization Technologies/4. Challengeresponse Authentication.mp4 199.5 MB
  • mp4~Get Your Files Here !/2. Authentication & Authorization Technologies/5. Physical Token Authentication.mp4 182.0 MB
  • mp4~Get Your Files Here !/2. Authentication & Authorization Technologies/6. Smart Card Authentication.mp4 181.6 MB
  • mp4~Get Your Files Here !/2. Authentication & Authorization Technologies/7. Biometric Authentication.mp4 178.0 MB
  • mp4~Get Your Files Here !/2. Authentication & Authorization Technologies/9. Password Distribution & Management.mp4 131.1 MB
  • mp4~Get Your Files Here !/2. Authentication & Authorization Technologies/8. Location Based Authentication.mp4 101.2 MB
  • mp4~Get Your Files Here !/2. Authentication & Authorization Technologies/1. Authentication & Authorization Briefing.mp4 99.7 MB
  • mp4~Get Your Files Here !/2. Authentication & Authorization Technologies/10. Device to Device Authentication.mp4 57.7 MB
  • srt~Get Your Files Here !/2. Authentication & Authorization Technologies/3. Password Authentication.srt 22.9 kB
  • srt~Get Your Files Here !/2. Authentication & Authorization Technologies/9. Password Distribution & Management.srt 22.1 kB
  • srt~Get Your Files Here !/2. Authentication & Authorization Technologies/6. Smart Card Authentication.srt 17.2 kB
  • srt~Get Your Files Here !/2. Authentication & Authorization Technologies/7. Biometric Authentication.srt 14.9 kB
  • srt~Get Your Files Here !/2. Authentication & Authorization Technologies/4. Challengeresponse Authentication.srt 13.8 kB
  • srt~Get Your Files Here !/1. IEC 62443 Basic Introduction/1. Introduction About IEC.srt 13.5 kB
  • srt~Get Your Files Here !/2. Authentication & Authorization Technologies/8. Location Based Authentication.srt 13.1 kB
  • srt~Get Your Files Here !/2. Authentication & Authorization Technologies/2. Role Based Access Control.srt 13.0 kB
  • srt~Get Your Files Here !/2. Authentication & Authorization Technologies/5. Physical Token Authentication.srt 11.9 kB
共10页 上一页 1 2 3 4 5 6 7 下一页