磁力管家

磁力管家
为您索检到186条磁力链接,耗时0毫秒。 rss

分享给好友

【影视】 [CourseClub.Me] ZeroToMastery - Complete Cybersecurity Bootcamp
收录时间:2023-12-17 文档个数:98 文档大小:3.6 GB 最近下载:2025-05-15 人气:1642 磁力链接
  • mp48-Network Security/052-Network Security With Nmap.mp4 169.9 MB
  • mp45-Security Bugs & Vulnerabilities/020-Buffer Overflow Demonstration.mp4 136.7 MB
  • mp412-Appendix - Ethical Hacking/087-Msfconsole Basic Commands.mp4 97.5 MB
  • mp48-Network Security/059-Wireless Attack Demonstration.mp4 93.4 MB
  • mp47-End-Point Protection/034-Password Security and Password Managers.mp4 84.2 MB
  • mp412-Appendix - Ethical Hacking/093-Meterpreter Basic Commands Part 1.mp4 78.5 MB
  • mp47-End-Point Protection/038-Process Explorer.mp4 75.8 MB
  • mp41-Introduction/001-Cybersecurity Bootcamp - Zero to Mastery.mp4 72.4 MB
  • mp48-Network Security/057-Secure Network Architecture.mp4 66.8 MB
  • mp412-Appendix - Ethical Hacking/094-Meterpreter Basic Commands Part 2.mp4 65.7 MB
  • mp47-End-Point Protection/033-Bitdefender, Kaspersky, McAfee, Malwarebytes.mp4 63.9 MB
  • mp44-Understanding Hackers - The Biggest Threat/012-Most Common Attacks Demonstration.mp4 63.5 MB
  • mp48-Network Security/060-Network Monitoring With TCPDump.mp4 62.7 MB
  • mp48-Network Security/058-Wireless Security.mp4 59.6 MB
  • mp45-Security Bugs & Vulnerabilities/017-Unpatched Machine Exploitation Demonstration.mp4 59.1 MB
  • mp412-Appendix - Ethical Hacking/080-Whatweb Stealthy Scan.mp4 58.1 MB
  • mp412-Appendix - Ethical Hacking/091-Advance Msfvenom Usage.mp4 51.4 MB
  • mp47-End-Point Protection/043-Iptables.mp4 50.9 MB
  • mp47-End-Point Protection/028-Brave Browser Security and Privacy.mp4 50.6 MB
  • mp412-Appendix - Ethical Hacking/089-Software Vulnerability - Samba Exploitation.mp4 49.5 MB
【影视】 [ DevCourseWeb.com ] Udemy - Python for Cybersecurity
收录时间:2023-12-17 文档个数:73 文档大小:1.3 GB 最近下载:2025-05-15 人气:4217 磁力链接
  • mp4~Get Your Files Here !/6. Sockets/7. Part 3 - Sending, Receiving, and Closing the Connection.mp4 179.3 MB
  • mp4~Get Your Files Here !/4. Object Oriented Programming/2. Creating Our First Object.mp4 97.9 MB
  • mp4~Get Your Files Here !/6. Sockets/5. Part 1 - Socket, Bind, Listen Accept.mp4 81.1 MB
  • mp4~Get Your Files Here !/6. Sockets/6. Part 2 - Socket, Connect.mp4 74.5 MB
  • mp4~Get Your Files Here !/6. Sockets/4. Why Encode.mp4 71.2 MB
  • mp4~Get Your Files Here !/6. Sockets/3. How Sockets Will Work.mp4 68.7 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/6. If Statements.mp4 64.8 MB
  • mp4~Get Your Files Here !/5. Let's Make API Requests/5. Consuming an API - Complex.mp4 62.7 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/12. Dictionaries.mp4 51.7 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/13. Functions.mp4 49.3 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/3. Variables.mp4 42.2 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/7. Error Handling Part 1.mp4 40.5 MB
  • mp4~Get Your Files Here !/2. Environment Setup/2. Installing VS Code and Extensions.mp4 37.6 MB
  • mp4~Get Your Files Here !/6. Sockets/2. What is a Socket.mp4 35.1 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/11. Lists.mp4 35.1 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/4. f Strings.mp4 32.8 MB
  • mp4~Get Your Files Here !/4. Object Oriented Programming/3. Importing Packages.mp4 31.4 MB
  • mp4~Get Your Files Here !/1. Getting Started/1. IMPORTANT!!!.mp4 30.9 MB
  • mp4~Get Your Files Here !/5. Let's Make API Requests/4. Consuming an API - Simple.mp4 26.2 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/8. While Loop.mp4 21.6 MB
【影视】 Cybersecurity Lab Environment in EVE NG
收录时间:2023-12-17 文档个数:98 文档大小:6.4 GB 最近下载:2025-05-14 人气:6032 磁力链接
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/5. Cyberattacks Lab Setup/1. Cyberattacks Lab in EVE NG.mp4 431.1 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/1. Reconnaissance Attack.mp4 351.9 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/4. Attacker OS Setup/1. Kali Linux Setup.mp4 263.4 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/12. Password Attack.mp4 261.2 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/5. Cyberattacks Lab Setup/3. Vulnerable Servers -Configuration.mp4 259.5 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/9. ARP Spoofing Attack.mp4 240.8 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/2. EVE NG Setup/5. EVE NG Qemu Image Naming.mp4 223.9 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/10. DHCP Starvation Attack.mp4 195.3 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/1. Introduction to Cybersecurity/9. Layers of the Web Terms.mp4 192.1 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/4. Attacker OS Setup/3. Parrot OS Setup.mp4 184.7 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/1. Introduction to Cybersecurity/8. Layers of the Web.mp4 170.7 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/3. Vulnerable Web Setup/2. Metasploitable Setup.mp4 164.7 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/6. Smurf Attack.mp4 162.1 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/14. SQL Injection Attack.mp4 162.0 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/1. Introduction to Cybersecurity/12. OWASP Top Ten 10.mp4 160.9 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/2. EVE NG Setup/8. EVE-NG Networks Clouds.mp4 155.5 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/5. SYN Flooding Attack.mp4 150.9 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/1. Introduction to Cybersecurity/2. Introduction to Cybersecurity.mp4 146.1 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/4. ICMP Flooding Attack.mp4 144.8 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/3. Vulnerable Web Setup/1. bWAPP Server Setup.mp4 144.8 MB
【影视】 The Absolute Beginners Guide to Cybersecurity
收录时间:2023-12-17 文档个数:185 文档大小:7.5 GB 最近下载:2025-05-16 人气:7723 磁力链接
  • mp4Part 04 July 2023/Chapter 06 Conclusion/001. You Have Been HACKED - Now What.mp4 193.9 MB
  • mp4Part 04 July 2023/Chapter 01 Introduction/002. Personal Cybersecurity - What I Do.mp4 193.1 MB
  • mp4Part 01 December 2022/Chapter 07 Cyber Warfare and Cyber Attacks Against Companies/002. The Attack Against Estonia.mp4 187.3 MB
  • mp4Part 01 December 2022/Chapter 05 Defenses/009. Password Management.mp4 133.9 MB
  • mp4Part 03 June 2023/Chapter 03 Mobile Threats and Countermeasures/007. How to Use Malwarebytes.mp4 126.9 MB
  • mp4Part 01 December 2022/Chapter 02 Hackers - Who Are They/002. What Is NOT Hacking.mp4 118.6 MB
  • mp4Part 04 July 2023/Chapter 05 Mobile Security/003. Checking Default App Permissions - Android.mp4 115.6 MB
  • mp4Part 03 June 2023/Chapter 02 Understanding Applications/007. Checking Default App Permissions - Android.mp4 115.4 MB
  • mp4Part 02 December 2022/Chapter 01 Introduction/001. Welcome to the Course.mp4 115.3 MB
  • mp4Part 04 July 2023/Chapter 01 Introduction/001. Welcome to the Course.mp4 106.5 MB
  • mp4Part 01 December 2022/Chapter 07 Cyber Warfare and Cyber Attacks Against Companies/003. Stuxnet and the Attack Against Iran.mp4 105.1 MB
  • mp4Part 03 June 2023/Chapter 04 Mobile Security Apps/002. How to Use NordVPN.mp4 101.4 MB
  • mp4Part 02 December 2022/Chapter 07 Social Engineering - Scams, Cons, Tricks, and Fraud/003. Reconnaissance Methods.mp4 94.3 MB
  • mp4Part 04 July 2023/Chapter 03 Personal Security/005. Protecting Yourself Against SIM Card Swap Fraud.mp4 93.5 MB
  • mp4Part 01 December 2022/Chapter 02 Hackers - Who Are They/006. Social Engineering.mp4 89.9 MB
  • mp4Part 01 December 2022/Chapter 06 Cyber Security at the Workplace/005. The Security Versus Ease of Access Paradox.mp4 88.6 MB
  • mp4Part 01 December 2022/Chapter 06 Cyber Security at the Workplace/003. BYOD Management.mp4 87.6 MB
  • mp4Part 04 July 2023/Chapter 05 Mobile Security/005. How to Identify Legit Apps.mp4 86.0 MB
  • mp4Part 01 December 2022/Chapter 01 General Introduction to IT and Cyber Security/002. Difference Between Information Security and Cyber Security.mp4 84.6 MB
  • mp4Part 03 June 2023/Chapter 02 Understanding Applications/003. How to Identify Legit Apps and Spot Fake Apps.mp4 83.4 MB
【影视】 [ DevCourseWeb.com ] Udemy - Modern Cybersecurity Fundamentals
收录时间:2023-12-17 文档个数:27 文档大小:2.3 GB 最近下载:2025-05-16 人气:2342 磁力链接
  • mp4~Get Your Files Here !/2. History of Cybersecurity/1. History of Cybersecurity.mp4 478.1 MB
  • mp4~Get Your Files Here !/3. Cybersecurity Risk Management/1. Cybersecurity Risk Management.mp4 265.3 MB
  • mp4~Get Your Files Here !/13. The Future of Cybersecurity/1. The Future of Cybersecurity.mp4 186.8 MB
  • mp4~Get Your Files Here !/7. Understanding Networks Part 3/1. Understanding Networks Part 3.mp4 176.6 MB
  • mp4~Get Your Files Here !/11. Ransomware/1. Ransomware.mp4 159.6 MB
  • mp4~Get Your Files Here !/8. Understanding Networks Part 4/1. Understanding Networks Part 4.mp4 158.3 MB
  • mp4~Get Your Files Here !/12. Internet of Things (IoT)/1. Internet of Things (IoT).mp4 154.5 MB
  • mp4~Get Your Files Here !/9. Domain Name System (DNS)/1. Domain Name System (DNS).mp4 145.9 MB
  • mp4~Get Your Files Here !/5. Understanding Networks Part 1/1. Understanding Networks Part 1.mp4 137.5 MB
  • mp4~Get Your Files Here !/4. Intrusion Detection/1. Intrusion Detection.mp4 136.3 MB
  • mp4~Get Your Files Here !/6. Understanding Networks Part 2/1. Understanding Networks Part 2.mp4 126.6 MB
  • mp4~Get Your Files Here !/10. Dynamic Host Configuration Protocol (DHCP)/1. Dynamic Host Configuration Protocol (DHCP).mp4 112.7 MB
  • mp4~Get Your Files Here !/1. Introduction/1. Introduction.mp4 28.1 MB
  • pdf~Get Your Files Here !/5. Understanding Networks Part 1/1.1 Understanding-Networks.pdf 3.5 MB
  • pdf~Get Your Files Here !/6. Understanding Networks Part 2/1.1 Understanding-Networks.pdf 3.5 MB
  • pdf~Get Your Files Here !/7. Understanding Networks Part 3/1.1 Understanding-Networks.pdf 3.5 MB
  • pdf~Get Your Files Here !/8. Understanding Networks Part 4/1.1 Understanding-Networks.pdf 3.5 MB
  • pdf~Get Your Files Here !/3. Cybersecurity Risk Management/1.1 Cybersecurity-Risk-Management.pdf 1.8 MB
  • pdf~Get Your Files Here !/12. Internet of Things (IoT)/1.1 IoT.pdf 1.8 MB
  • pdf~Get Your Files Here !/2. History of Cybersecurity/1.1 HISTORY-OF-CYBERSECURITY.pdf 1.7 MB
【影视】 [ FreeCourseWeb.com ] CompTIA Cybersecurity Analyst + (CySA + ) (CS0-003) - 3 Incident Response and Management
收录时间:2023-12-17 文档个数:94 文档大小:348.1 MB 最近下载:2025-05-16 人气:5383 磁力链接
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/09 - Password forensics.mp4 19.8 MB
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/08 - Operating system analysis.mp4 15.5 MB
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/11 - Software forensics.mp4 15.2 MB
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/05 - File carving.mp4 13.1 MB
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/10 - Network forensics.mp4 11.3 MB
  • mp4~Get Your Files Here !/02 - 1. Incident Response Programs/08 - Incident eradication and recovery.mp4 11.2 MB
  • mp4~Get Your Files Here !/02 - 1. Incident Response Programs/01 - Build an incident response program.mp4 10.7 MB
  • mp4~Get Your Files Here !/07 - 6. Disaster Recovery/01 - Disaster recovery.mp4 10.7 MB
  • mp4~Get Your Files Here !/06 - 5. Business Continuity/03 - High availability and fault tolerance.mp4 10.4 MB
  • mp4~Get Your Files Here !/04 - 3. Incident Investigation/01 - Logging security information.mp4 10.2 MB
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/04 - System and file forensics.mp4 10.0 MB
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/06 - Creating forensic images.mp4 10.0 MB
  • mp4~Get Your Files Here !/03 - 2. Attack Frameworks/01 - MITRE ATT&CK.mp4 9.9 MB
  • mp4~Get Your Files Here !/04 - 3. Incident Investigation/03 - Cloud audits and investigations.mp4 9.9 MB
  • mp4~Get Your Files Here !/02 - 1. Incident Response Programs/10 - Post-incident activities.mp4 9.4 MB
  • mp4~Get Your Files Here !/02 - 1. Incident Response Programs/04 - Incident identification.mp4 9.3 MB
  • mp4~Get Your Files Here !/07 - 6. Disaster Recovery/04 - Disaster recovery sites.mp4 9.3 MB
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/15 - Ediscovery and evidence production.mp4 8.2 MB
  • mp4~Get Your Files Here !/06 - 5. Business Continuity/02 - Business continuity controls.mp4 8.0 MB
  • mp4~Get Your Files Here !/04 - 3. Incident Investigation/02 - Security information and event management.mp4 7.9 MB
【影视】 [ DevCourseWeb.com ] CBTNuggets - (ISC)2 CC - Certified in Cybersecurity - (ISC)2 Certification Training
收录时间:2023-12-17 文档个数:68 文档大小:2.1 GB 最近下载:2025-05-16 人气:6852 磁力链接
  • mp4~Get Your Files Here !/1. Understanding Information Assurance/1. Understanding Information Assurance - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 69.9 MB
  • mp4~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/1. Power - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 65.3 MB
  • mp4~Get Your Files Here !/7. Discussing Network Security Infrastructure/1. Network Segmentation - (ISC)² CC – Certified in Cybersecurity CBT Nuggets-1.mp4 58.2 MB
  • mp4~Get Your Files Here !/8. Exploring Network Threats and Attacks/6. Firewalls - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 54.7 MB
  • mp4~Get Your Files Here !/8. Exploring Network Threats and Attacks/3. Intrusion Detection Prevention Systems (IDSIPS) - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 54.0 MB
  • mp4~Get Your Files Here !/5. Exploring Security Policies and Training/7. Security Awareness Training - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 52.0 MB
  • mp4~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/3. Heating, Ventilation and Air Conditioning (HVAC) - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 48.1 MB
  • mp4~Get Your Files Here !/9. Understanding Computer Networking/4. IP Addresses - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 47.5 MB
  • mp4~Get Your Files Here !/6. Understanding Data Security and System Hardening/2. Types of Encryption - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 46.4 MB
  • mp4~Get Your Files Here !/7. Discussing Network Security Infrastructure/7. The Cloud - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 45.7 MB
  • mp4~Get Your Files Here !/8. Exploring Network Threats and Attacks/5. Vulnerability Scanning - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 45.5 MB
  • mp4~Get Your Files Here !/9. Understanding Computer Networking/3. TCPIP Model - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 42.9 MB
  • mp4~Get Your Files Here !/6. Understanding Data Security and System Hardening/7. Configuration Management - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 41.6 MB
  • mp4~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/2. Data Centers and Closets - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 40.4 MB
  • mp4~Get Your Files Here !/1. Understanding Information Assurance/2. Methods of Authentication - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 40.0 MB
  • mp4~Get Your Files Here !/2. Discussing Risk Management, Controls, Ethics and Governance/4. Security Control Categories - (ISC)² CC – Certified in Cybersecurity CBT Nuggets-1.mp4 39.3 MB
  • mp4~Get Your Files Here !/6. Understanding Data Security and System Hardening/3. Data Hashing with Encryption - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 38.3 MB
  • mp4~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/5. Redundancy - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 38.2 MB
  • mp4~Get Your Files Here !/3. Exploring BC, DR & IR Concepts/6. Incident Response - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 37.9 MB
  • mp4~Get Your Files Here !/4. Reviewing Access Control Concepts/6. Types of Access Control - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 36.8 MB
【影视】 Practical Cybersecurity for IT Professionals
收录时间:2023-12-17 文档个数:119 文档大小:392.7 MB 最近下载:2025-05-15 人气:384 磁力链接
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/04 - 3. Firewalls/03 - Advanced Windows Firewall.mp4 27.1 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/05 - 4. Network Scanning/01 - Getting started with Nmap.mp4 22.0 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/02 - 1. Why Cybersecurity/07 - Emerging trends in cybersecurity.mp4 20.4 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/02 - 1. Why Cybersecurity/01 - A history of hackers.mp4 17.5 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/04 - 3. Firewalls/05 - Introducing Linux iptables.mp4 16.1 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/04 - 3. Firewalls/02 - Windows Firewall basics.mp4 14.5 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/09 - 8. Network Protocols/02 - Capturing packets with Wireshark.mp4 14.3 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/04 - 3. Firewalls/04 - ZedLan firewall log analyser.mp4 13.4 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/02 - 1. Why Cybersecurity/04 - Common forms of cyberattack.mp4 13.1 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/09 - 8. Network Protocols/03 - Making sense of the protocols.mp4 13.0 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/02 - 1. Why Cybersecurity/02 - The cyber kill chain.mp4 12.0 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/03 - 2. Antivirus/01 - Introducing Microsoft Defender Antivirus.mp4 11.7 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/07 - 6. Vulnerability Scanning/01 - Preparing Nessus.mp4 10.5 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/08 - 7. Web Applications/02 - Running an SQL injection attack.mp4 10.1 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/05 - 4. Network Scanning/02 - Advanced Nmap options.mp4 10.0 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/02 - 1. Why Cybersecurity/03 - Stuxnet and the kill chain.mp4 9.8 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/03 - 2. Antivirus/02 - Detecting malware with Microsoft Defender.mp4 9.5 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/04 - 3. Firewalls/06 - Setting up a simple iptables firewall.mp4 9.3 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/06 - 5. Network Connections/02 - Transferring files using netcat.mp4 9.2 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/06 - 5. Network Connections/04 - Setting up a netcat honeypot.mp4 8.9 MB
【影视】 [ FreeCourseWeb.com ] Udemy - Increasing Business Cybersecurity Standards immediately!
收录时间:2022-05-11 文档个数:66 文档大小:1.4 GB 最近下载:2025-05-14 人气:701 磁力链接
  • mp4~Get Your Files Here !/03 Understanding Hacking Strategies/001 How does a Hacker look like_.mp4 151.3 MB
  • mp4~Get Your Files Here !/03 Understanding Hacking Strategies/005 Trends & Outlook.mp4 148.7 MB
  • mp4~Get Your Files Here !/07 Team Organisation/003 Sharing Files & Accounts.mp4 126.8 MB
  • mp4~Get Your Files Here !/07 Team Organisation/002 Communication Channels.mp4 116.3 MB
  • mp4~Get Your Files Here !/07 Team Organisation/001 Cybersecurity Awareness Communication.mp4 115.8 MB
  • mp4~Get Your Files Here !/10 ADDITIONAL CONTENT/003 Kids & the digital World.mp4 113.9 MB
  • mp4~Get Your Files Here !/07 Team Organisation/004 Login & Password Management.mp4 73.1 MB
  • mp4~Get Your Files Here !/10 ADDITIONAL CONTENT/002 Creating safe, secure and Data Protection compliant Products.mp4 72.3 MB
  • mp4~Get Your Files Here !/10 ADDITIONAL CONTENT/001 Security Standards.mp4 72.2 MB
  • mp4~Get Your Files Here !/06 Admin Duties/001 ToDo List.mp4 48.8 MB
  • mp4~Get Your Files Here !/02 The Data Processing Triangle/002 Data Protection.mp4 35.1 MB
  • mp4~Get Your Files Here !/02 The Data Processing Triangle/001 Overview.mp4 35.1 MB
  • mp4~Get Your Files Here !/09 The End/001 Closing Statement.mp4 31.3 MB
  • mp4~Get Your Files Here !/01 Introduction/001 Welcome!.mp4 28.6 MB
  • mp4~Get Your Files Here !/03 Understanding Hacking Strategies/004 War Stories.mp4 26.9 MB
  • mp4~Get Your Files Here !/08 Managing Client Data/003 Data Science Projects.mp4 24.7 MB
  • mp4~Get Your Files Here !/04 Securing Hardware/004 Your invisible Devices.mp4 21.1 MB
  • mp4~Get Your Files Here !/05 Securing Software & Accounts/002 Service Providers.mp4 19.1 MB
  • mp4~Get Your Files Here !/01 Introduction/002 Disclaimer.mp4 18.6 MB
  • mp4~Get Your Files Here !/05 Securing Software & Accounts/001 Daily used Accounts.mp4 18.0 MB
【影视】 Cybersecurity Threat Hunting for SOC Analysts
收录时间:2022-05-05 文档个数:245 文档大小:6.2 GB 最近下载:2025-05-15 人气:10475 磁力链接
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/10. Adversary Emulation Caldera.mp4 359.9 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/12. Enhanced Lab Realism Bad Blood + Microsoft ATA + Bloodhound!.mp4 338.8 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/1. Threat Hunting with Splunk + Zeek.mp4 243.3 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/7. Adversary Emulation Atomic Red Team + MITRE ATT&CK.mp4 242.7 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/6. Purple Team Scenario Meterpreter + MSFVenom + Process Injection + Velociraptor!.mp4 225.7 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/3. The Modern Threat Hunting Mindset.mp4 225.3 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/5. The Methodical Guide to Effective Threat Hunting/1. Finding Beacons Long and Cumulative Connections.mp4 201.8 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/6. Proofs Detecting False Negatives/2. Suricata vs RITA Zeus Malware.mp4 195.4 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/5. The Methodical Guide to Effective Threat Hunting/5. Finding Beacons Business Need Analysis (Part 4).mp4 194.3 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/2. Threat Hunting with Splunk + Sysmon.mp4 153.3 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/5. The Methodical Guide to Effective Threat Hunting/4. Finding Beacons Business Need Analysis (Part 3).mp4 139.4 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/5. Beaconing DNS.mp4 135.2 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/8. Beaconing Detection Session Size Analysis.mp4 133.5 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/6. Proofs Detecting False Negatives/1. Suricata Capabilities + Installation!.mp4 129.8 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/3. Tools and resources/8. zeek.mp4 126.9 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/2. The Broken Threat Hunting Mindset.mp4 126.1 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/3. Tools and resources/9. Using zeek + Rita to find Evil!.mp4 118.9 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/1. Understanding the New Adversary.mp4 118.7 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/6. Beaconing CDN.mp4 117.8 MB
  • mp4[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/5. Purple Team Scenario Mimikatz.mp4 115.6 MB
【影视】 [ CourseLala.com ] Udemy - Personal Digital Security Everyone Must Have - Cybersecurity
收录时间:2022-04-12 文档个数:76 文档大小:1.5 GB 最近下载:2025-05-10 人气:725 磁力链接
  • mp4~Get Your Files Here !/02 - Secure your computer from unauthorized access/001 Social Engineering.mp4 157.3 MB
  • mp4~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/007 Secure your Wi-Fi at Home (Video HD).mp4 103.2 MB
  • mp4~Get Your Files Here !/02 - Secure your computer from unauthorized access/003 Use strong passwords.mp4 93.7 MB
  • mp4~Get Your Files Here !/03 - What is Malware and its types/003 Spyware.mp4 66.9 MB
  • mp4~Get Your Files Here !/06 - Secure your Smartphone/003 Communicating Securely with your Smartphone.mp4 64.7 MB
  • mp4~Get Your Files Here !/03 - What is Malware and its types/002 Adware.mp4 63.9 MB
  • mp4~Get Your Files Here !/05 - Email Security/002 Fishing.mp4 57.8 MB
  • mp4~Get Your Files Here !/02 - Secure your computer from unauthorized access/012 Be cautious.mp4 54.8 MB
  • mp4~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/002 Tips for buying online.mp4 46.0 MB
  • mp4~Get Your Files Here !/06 - Secure your Smartphone/001 Purses, Wallets, Smartphones.mp4 43.1 MB
  • mp4~Get Your Files Here !/03 - What is Malware and its types/001 Trojan Horse.mp4 39.6 MB
  • mp4~Get Your Files Here !/03 - What is Malware and its types/007 Scareware.mp4 39.5 MB
  • mp4~Get Your Files Here !/03 - What is Malware and its types/004 Browser Hijacking Software.mp4 37.3 MB
  • mp4~Get Your Files Here !/02 - Secure your computer from unauthorized access/008 Use a VPN.mp4 36.0 MB
  • mp4~Get Your Files Here !/03 - What is Malware and its types/005 Viruses.mp4 35.6 MB
  • mp4~Get Your Files Here !/01 - Introduction to Personal Digital Security/003 Some statistics.mp4 35.0 MB
  • mp4~Get Your Files Here !/02 - Secure your computer from unauthorized access/004 Use password manager.mp4 33.8 MB
  • mp4~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/001 Safe browsing.mp4 31.8 MB
  • mp4~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/008 Safe browsing in Social Networks.mp4 31.7 MB
  • mp4~Get Your Files Here !/01 - Introduction to Personal Digital Security/001 Introduction to Personal Digital Security.mp4 30.4 MB
【影视】 [ FreeCourseWeb.com ] Udemy - Cybersecurity Habits Masterclass
收录时间:2022-04-10 文档个数:93 文档大小:2.1 GB 最近下载:2025-05-15 人气:1566 磁力链接
  • mp4~Get Your Files Here !/3. Skepticism/4. Slow Down And Frown.mp4 73.5 MB
  • mp4~Get Your Files Here !/11. Conclusion/1. Well Awareiors.mp4 71.5 MB
  • mp4~Get Your Files Here !/1. Introduction/1. Introduction.mp4 67.0 MB
  • mp4~Get Your Files Here !/4. Vigilance/2. The Only Thing We Have To Fear.mp4 66.7 MB
  • mp4~Get Your Files Here !/4. Vigilance/1. The Face Of The Enemy.mp4 66.5 MB
  • mp4~Get Your Files Here !/5. Secrecy/2. Making It Personal.mp4 65.7 MB
  • mp4~Get Your Files Here !/2. Literacy/5. Habits And Recipes.mp4 64.7 MB
  • mp4~Get Your Files Here !/3. Skepticism/1. Zero Trust.mp4 64.5 MB
  • mp4~Get Your Files Here !/8. Community/4. Habits And Recipes.mp4 57.4 MB
  • mp4~Get Your Files Here !/8. Community/1. United We Stand.mp4 54.0 MB
  • mp4~Get Your Files Here !/7. Diligence/3. Random Acts of Security.mp4 53.4 MB
  • mp4~Get Your Files Here !/7. Diligence/2. Journaling.mp4 53.4 MB
  • mp4~Get Your Files Here !/9. Mirroring/5. Habits And Recipes.mp4 52.0 MB
  • mp4~Get Your Files Here !/6. Culture/1. Culture Eats Cybersecurity For Breakfast.mp4 51.4 MB
  • mp4~Get Your Files Here !/10. Deception/1. Know Thy Enemy.mp4 49.4 MB
  • mp4~Get Your Files Here !/9. Mirroring/3. Blindspots.mp4 49.1 MB
  • mp4~Get Your Files Here !/3. Skepticism/2. The Pygmailion Effect.mp4 48.9 MB
  • mp4~Get Your Files Here !/6. Culture/5. Habits And Recipes.mp4 48.0 MB
  • mp4~Get Your Files Here !/2. Literacy/1. Fearless Learning.mp4 47.9 MB
  • mp4~Get Your Files Here !/6. Culture/2. The Hermit Crab Shell.mp4 46.7 MB
【影视】 [ CourseMega.com ] Linkedin - Building an ISO 27001-Compliant Cybersecurity Program - The Annex A Controls
收录时间:2022-03-29 文档个数:110 文档大小:1.2 GB 最近下载:2025-05-16 人气:5902 磁力链接
  • mp4~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/013. Access control User access management.mp4 60.8 MB
  • mp4~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/028. System lifecycle Security in d.mp4 57.3 MB
  • mp4~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/017. Physical and environmental security Equipme.mp4 57.2 MB
  • mp4~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/014. Access control System and application.mp4 55.8 MB
  • mp4~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/032. Management of information security.mp4 54.7 MB
  • mp4~Get Your Files Here !/07. Operations Security (Clause A.12)/018. Operations security Operational procedures and responsibili.mp4 47.1 MB
  • mp4~Get Your Files Here !/12. Compliance (Clause A.18)/034. Compliance Compliance with legal and contractual requirements (Claus.mp4 46.5 MB
  • mp4~Get Your Files Here !/07. Operations Security (Clause A.12)/021. Operations security Logging and monitoring (Clause A.12.4).mp4 45.6 MB
  • mp4~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/033. Information security continuity an.mp4 45.5 MB
  • mp4~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/016. Physical and environmental security Secure.mp4 44.8 MB
  • mp4~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/004. Contact with auth.mp4 42.7 MB
  • mp4~Get Your Files Here !/08. Communications Security (Clause A.13)/026. Communications security Information transfer (Clause A..mp4 40.7 MB
  • mp4~Get Your Files Here !/04. Asset Management (Clause A.8)/010. Asset management Information classification (Clause A.8.2).mp4 40.5 MB
  • mp4~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/027. System lifecycle Security requ.mp4 37.2 MB
  • mp4~Get Your Files Here !/03. Human Resources Security (Clause A.7)/007. Human resources security During employment (Clause A.7..mp4 34.4 MB
  • mp4~Get Your Files Here !/08. Communications Security (Clause A.13)/025. Communications security Network security management (Cl.mp4 34.1 MB
  • mp4~Get Your Files Here !/04. Asset Management (Clause A.8)/009. Asset management Responsibility for assets (Clause A.8.1).mp4 33.3 MB
  • mp4~Get Your Files Here !/10. Supplier Relationships (Clause A.15)/030. Supplier relationships Information security in supplier.mp4 31.4 MB
  • mp4~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/002. Management direct.mp4 31.1 MB
  • mp4~Get Your Files Here !/04. Asset Management (Clause A.8)/011. Asset management Media handling (Clause A.8.3).mp4 30.4 MB
【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity Threat Hunting Professional
收录时间:2022-03-20 文档个数:36 文档大小:1.0 GB 最近下载:2025-05-15 人气:2155 磁力链接
  • mp4~Get Your Files Here !/2. Time to hunt/2. Practical Threat hunting Demo.mp4 121.9 MB
  • mp4~Get Your Files Here !/2. Time to hunt/1. Case Base Threat Hunting.mp4 93.6 MB
  • mp4~Get Your Files Here !/2. Time to hunt/3. Indicators of threat attacksIoC.mp4 86.1 MB
  • mp4~Get Your Files Here !/1. Introduction/11. 7 Effective Threat Hunting Tips.mp4 81.5 MB
  • mp4~Get Your Files Here !/1. Introduction/10. Hypothesis Testing & Sources of Hypothesis.mp4 78.6 MB
  • mp4~Get Your Files Here !/4. Course Resources/1. Course Resources.mp4 72.6 MB
  • mp4~Get Your Files Here !/3. Course Conclusion/1. Course Review.mp4 72.6 MB
  • mp4~Get Your Files Here !/1. Introduction/8. What is Required for Successful Threat Hunting.mp4 71.2 MB
  • mp4~Get Your Files Here !/1. Introduction/6. Terms associated with Threat Hunting.mp4 70.5 MB
  • mp4~Get Your Files Here !/1. Introduction/4. Why threat hunt and attributes of an effective threat hunter.mp4 56.2 MB
  • mp4~Get Your Files Here !/1. Introduction/9. Threat Hunting Approaches.mp4 55.0 MB
  • mp4~Get Your Files Here !/1. Introduction/5. Threat Hunting Skillset Requirements.mp4 40.0 MB
  • mp4~Get Your Files Here !/1. Introduction/7. Threat Hunting Loop.mp4 38.6 MB
  • mp4~Get Your Files Here !/1. Introduction/2. What is Threat Hunting & Its Primary objective.mp4 35.9 MB
  • mp4~Get Your Files Here !/1. Introduction/1. Introduction.mp4 29.5 MB
  • mp4~Get Your Files Here !/1. Introduction/3. What is Threat Hunting & Its Primary objective..mp4 23.3 MB
  • mp4~Get Your Files Here !/4. Course Resources/1.1 Network Threat Hunting with Tim Crothers.mp4 10.6 MB
  • pdf~Get Your Files Here !/4. Course Resources/1.2 Resources Links for Threat Hunting Course.pdf 435.7 kB
  • srt~Get Your Files Here !/2. Time to hunt/2. Practical Threat hunting Demo.srt 11.9 kB
  • srt~Get Your Files Here !/2. Time to hunt/3. Indicators of threat attacksIoC.srt 8.3 kB
【影视】 [ FreeCourseWeb.com ] Udemy - Master Cybersecurity,Ethical Hacking and Penetrating Testing
收录时间:2022-03-15 文档个数:50 文档大小:1.6 GB 最近下载:2025-05-16 人气:2202 磁力链接
  • mp4~Get Your Files Here !/04 Exposing Hackers - Know Your Enemy/002 Why You Need Security _.mp4 189.8 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/011 Setting up Labs.mp4 169.5 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/003 What is Privacy, Anonymity and Pseudonymity _.mp4 158.8 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/006 Threat Modelling And Risk Assessment.mp4 158.3 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/008 Confidentiality, Integrity and Availability - (Security Attributes).mp4 141.8 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/004 Security, Vulnerabilities, Threats and Adversaries.mp4 117.8 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/005 Asset Selection.mp4 94.5 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/002 Protect What You Value.mp4 93.7 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/010 Zero Trust Model.mp4 85.7 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/007 Security,Anonymity and Privacy.mp4 59.8 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/001 What is Cybersecurity _.mp4 34.8 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/009 Defence in Depth.mp4 34.2 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/008 Who Conduct it _.mp4 26.4 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/002 What is Ethical Hacking _.mp4 25.8 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/005 Purpose of Studying Ethical Hacking and Penetrating Testing.mp4 24.3 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/010 Closure.mp4 23.6 MB
  • mp4~Get Your Files Here !/04 Exposing Hackers - Know Your Enemy/001 Goals and Learning Objectives - Know Your Enemy.mp4 21.8 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/009 Who should You Choose _.mp4 20.6 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/001 Goals and Learning Objectives.mp4 19.7 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/006 Scope For Ethical Hackers and Penetrating Testers.mp4 18.5 MB
【影视】 [ FreeCourseWeb.com ] Linkedin - Cybersecurity Awareness - Phishing Attacks
收录时间:2022-03-04 文档个数:39 文档大小:642.7 MB 最近下载:2025-05-02 人气:1592 磁力链接
  • mp4~Get Your Files Here !/4. How to Catch a Phish/012. Catch a phish red-handed Common indicators of a phish.mp4 48.9 MB
  • mp4~Get Your Files Here !/3. Different Types of Phishing Attacks/010. Other notable methods of phishing.mp4 47.3 MB
  • mp4~Get Your Files Here !/2. An Overview of Phishing/004. How does phishing affect us.mp4 46.9 MB
  • mp4~Get Your Files Here !/2. An Overview of Phishing/005. A review of the psychology behind social engineering attacks.mp4 45.0 MB
  • mp4~Get Your Files Here !/5. How to Defend against Phishing Attacks/015. How technology helps with the fight against phishing attacks.mp4 41.6 MB
  • mp4~Get Your Files Here !/4. How to Catch a Phish/013. Is this a phish Real-world examples of phishing attacks.mp4 38.5 MB
  • mp4~Get Your Files Here !/3. Different Types of Phishing Attacks/007. Unfriended How to spot a social media phish.mp4 38.5 MB
  • mp4~Get Your Files Here !/4. How to Catch a Phish/011. What makes phishing attacks successful.mp4 36.9 MB
  • mp4~Get Your Files Here !/3. Different Types of Phishing Attacks/008. Getting specific with targeted phishing attacks.mp4 34.9 MB
  • mp4~Get Your Files Here !/3. Different Types of Phishing Attacks/006. Is it a harmless unknown caller or vishing.mp4 34.6 MB
  • mp4~Get Your Files Here !/6. What Happens If You Fall for a Phish/018. Falling for a phishing attack at home.mp4 34.5 MB
  • mp4~Get Your Files Here !/2. An Overview of Phishing/003. Money is the motive The reason behind phishing.mp4 34.1 MB
  • mp4~Get Your Files Here !/5. How to Defend against Phishing Attacks/016. Practice makes perfect An overview of phishing simulations.mp4 32.6 MB
  • mp4~Get Your Files Here !/2. An Overview of Phishing/002. Phishing The dangers of email.mp4 32.3 MB
  • mp4~Get Your Files Here !/3. Different Types of Phishing Attacks/009. SMS phishing A text-based attack.mp4 31.8 MB
  • mp4~Get Your Files Here !/6. What Happens If You Fall for a Phish/017. Responding to a phishing attack at work.mp4 23.4 MB
  • mp4~Get Your Files Here !/5. How to Defend against Phishing Attacks/014. The most common ways to defend against a phish.mp4 23.1 MB
  • mp4~Get Your Files Here !/1. Introduction/001. About phishing attacks.mp4 9.8 MB
  • mp4~Get Your Files Here !/7. Conclusion/019. Next steps and takeaways.mp4 7.8 MB
  • pdf~Get Your Files Here !/Ex_Files_Cybersecurity_Awareness_Phishing_Attacks/Exercise Files/Additional Resources.pdf 47.6 kB
【影视】 Pluralsight - Cybersecurity Threats: Ransomware
收录时间:2022-02-22 文档个数:37 文档大小:388.1 MB 最近下载:2025-01-10 人气:15 磁力链接
  • mp45. Incident Response - Eradication and Recovery/29. NoMoreRansom.org.mp4 71.4 MB
  • mp42. What Is Ransomware/09. Demo of Real World Ransomware Attack.mp4 52.0 MB
  • mp45. Incident Response - Eradication and Recovery/30. Paying the Ransom.mp4 22.3 MB
  • mp42. What Is Ransomware/03. Definition and Types of Ransomware.mp4 20.3 MB
  • mp42. What Is Ransomware/04. The Ransomware Timeline.mp4 15.2 MB
  • mp45. Incident Response - Eradication and Recovery/27. Recovery Cloud Storage Files, Dropbox, and OneDrive.mp4 15.1 MB
  • mp42. What Is Ransomware/06. How Big Is the Problem.mp4 15.1 MB
  • mp42. What Is Ransomware/07. Ransomware Victims.mp4 11.7 MB
  • mp46. Countermeasures and Preparing Your Incident Response/33. Defending a Ransomware Attack.mp4 11.4 MB
  • mp46. Countermeasures and Preparing Your Incident Response/36. Lessons Learned and Your Incident Response Plan.mp4 10.9 MB
  • mp43. Ransomware Entry Points/14. Phishing and Email Attachments.mp4 10.6 MB
  • mp44. Incident Response - Detection and Containment/22. Containing the Attack.mp4 9.0 MB
  • mp46. Countermeasures and Preparing Your Incident Response/34. Protecting a Windows Network.mp4 8.0 MB
  • mp44. Incident Response - Detection and Containment/21. Detecting an Attack.mp4 7.3 MB
  • mp45. Incident Response - Eradication and Recovery/26. Recovery Local and Network Files.mp4 7.3 MB
  • mp43. Ransomware Entry Points/17. Command and Callback (C&C) and Indicators of Compromise.mp4 7.0 MB
  • mp45. Incident Response - Eradication and Recovery/28. Tools and Resources.mp4 6.7 MB
  • mp42. What Is Ransomware/10. Variations of Ransomware.mp4 6.4 MB
  • mp43. Ransomware Entry Points/15. Embedded Hyperlinks, Websites_downloads, and Drive-by Infections.mp4 6.2 MB
  • mp45. Incident Response - Eradication and Recovery/31. Summary.mp4 6.0 MB
【影视】 [ FreeCourseWeb.com ] Udemy - The Complete Cybersecurity Awareness Course For Employees
收录时间:2022-02-21 文档个数:26 文档大小:1.1 GB 最近下载:2025-05-13 人气:1485 磁力链接
  • mp4~Get Your Files Here !/4. Social Engineering and Countermeasures/3. Types of Social Engineering Attacks.mp4 92.1 MB
  • mp4~Get Your Files Here !/1. Introduction to the Cybersecurity Space/1. Cybersecurity Introduction and Trends.mp4 81.4 MB
  • mp4~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/7. Malware and Types of Malware.mp4 78.6 MB
  • mp4~Get Your Files Here !/1. Introduction to the Cybersecurity Space/3. Definitions and Key Terms in Cybersecurity.mp4 74.9 MB
  • mp4~Get Your Files Here !/2. Cybersecurity Roles and Actors/1. Cybersecurity Roles.mp4 72.2 MB
  • mp4~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/12. Anti-Malware Protection.mp4 68.9 MB
  • mp4~Get Your Files Here !/2. Cybersecurity Roles and Actors/4. Security Operations Center.mp4 56.2 MB
  • mp4~Get Your Files Here !/4. Social Engineering and Countermeasures/5. Social Engineering Countermeasures.mp4 50.8 MB
  • mp4~Get Your Files Here !/5. Cybersecurity Internal Affairs and Controls/11. Cybersecurity Organizations That Are Resourceful.mp4 44.7 MB
  • mp4~Get Your Files Here !/5. Cybersecurity Internal Affairs and Controls/1. Privacy Policy.mp4 41.7 MB
  • mp4~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/19. More Countermeasures - Vulnerability Assessments.mp4 41.1 MB
  • mp4~Get Your Files Here !/5. Cybersecurity Internal Affairs and Controls/7. Incident Handling.mp4 38.9 MB
  • mp4~Get Your Files Here !/5. Cybersecurity Internal Affairs and Controls/9. IT Governance.mp4 36.1 MB
  • mp4~Get Your Files Here !/2. Cybersecurity Roles and Actors/7. The Different Types of Cybersecurity Actors.mp4 33.5 MB
  • mp4~Get Your Files Here !/1. Introduction to the Cybersecurity Space/6. Cybersecurity and Social Media.mp4 33.5 MB
  • mp4~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/17. More Countermeasures -Digital Forensics.mp4 30.5 MB
  • mp4~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/23. More on Tech and Admin Controls.mp4 30.3 MB
  • mp4~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/1. Security Threats.mp4 28.4 MB
  • mp4~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/21. How To Start and Cybersecurity Program.mp4 27.4 MB
  • mp4~Get Your Files Here !/5. Cybersecurity Internal Affairs and Controls/3. Good User Habits.mp4 27.0 MB
【影视】 [TutorialPace.com] Lynda - Cybersecurity with Cloud Computing - [TP]
收录时间:2022-02-20 文档个数:38 文档大小:371.6 MB 最近下载:2025-05-15 人气:2055 磁力链接
  • mp400. Introduction/00_01 - Welcome.mp4 17.4 MB
  • mp400. Introduction/00_03 - Reference sites.mp4 16.6 MB
  • mp401. Cloud Fundamentals/01_01 - Defining the essential characteristics of cloud.mp4 15.8 MB
  • mp402. Cloud Security Guidance/02_03 - Managing information and data security.mp4 15.6 MB
  • mp403. Architecting Security/03_05 - Introducing cloud attribute taxonomy.mp4 15.5 MB
  • mp403. Architecting Security/03_01 - Introducing SABSA.mp4 15.3 MB
  • mp401. Cloud Fundamentals/01_06 - Identifying cloud incidents.mp4 15.2 MB
  • mp401. Cloud Fundamentals/01_09 - Defining trust models for cloud.mp4 14.0 MB
  • mp402. Cloud Security Guidance/02_16 - Solution Cloud security knowledge.mp4 13.8 MB
  • mp402. Cloud Security Guidance/02_02 - Complying with legal and audit requrements.mp4 13.1 MB
  • mp402. Cloud Security Guidance/02_11 - Verifying identity in the cloud.mp4 13.1 MB
  • mp402. Cloud Security Guidance/02_07 - Managing incident response.mp4 12.9 MB
  • mp402. Cloud Security Guidance/02_13 - Implementing virtualization.mp4 12.9 MB
  • mp402. Cloud Security Guidance/02_12 - Controlling cloud access.mp4 12.5 MB
  • mp402. Cloud Security Guidance/02_08 - Maximizing application security.mp4 12.3 MB
  • mp403. Architecting Security/03_02 - Using Fast Tracker.mp4 12.0 MB
  • mp402. Cloud Security Guidance/02_05 - Comparing traditional IT, BCP, and DR.mp4 12.0 MB
  • mp401. Cloud Fundamentals/01_02 - Understanding infrastructure as a service.mp4 11.9 MB
  • mp401. Cloud Fundamentals/01_05 - Discovering deployment models.mp4 11.4 MB
  • mp402. Cloud Security Guidance/02_10 - Managing encryption and keys.mp4 10.8 MB
【影视】 Palo Alto Networks Cybersecurity Fundamentals (PCCSA)
收录时间:2022-02-19 文档个数:54 文档大小:4.5 GB 最近下载:2025-05-16 人气:8248 磁力链接
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/2. Identify Computing and Networking Trends.mp4 269.3 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/12. Identify Networking Security Technologies.mp4 267.8 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/3. Describe Cybersecurity Threats.mp4 243.2 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/5. Identify Wi-Fi Vulnerabilities and Attacks.mp4 231.3 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/10. Review Network Addressing.mp4 228.2 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/4. Describe Common Cyberattack Techniques.mp4 217.8 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/17. Endpoint Security.mp4 206.1 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/7. Identify Basic Internet and Network Operations.mp4 204.7 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/8. Describe Routing Protocols.mp4 196.9 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/15. Learn Basic Virtualization Security Concepts.mp4 190.8 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/9. Review Networking Models.mp4 190.3 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/18. Server and System Administration.mp4 186.8 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/26. Describe Cortex XSOAR and AutoFocus.mp4 177.9 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/16. Learn Basic DevOps Security Concepts.mp4 176.4 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/14. Learn Basic Cloud Security Concepts.mp4 169.8 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/11. Learn Networking Security Models.mp4 169.5 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/20. Identify Palo Alto Networks Security Solutions.mp4 168.8 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/21. Describe Basic NGFW Components and Functions.mp4 146.3 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/13. Learn Basic Data Center Security Concepts.mp4 134.9 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/22. Learn Basic Prisma Cloud.mp4 134.6 MB
共10页 上一页 3 4 5 6 7 8 9 10 下一页