为您索检到186条磁力链接,耗时0毫秒。
- 【影视】 [ CourseHulu.com ] Linkedin - Building an ISO 27001-Compliant Cybersecurity Program - Getting Started
-
收录时间:2022-02-18
文档个数:63
文档大小:580.9 MB
最近下载:2025-05-15
人气:3341
磁力链接
~Get Your Files Here !/6. Planning (Clause 6)/016. Information security risk assessment (Clause 6.1.2).mp4 55.1 MB
~Get Your Files Here !/2. ISO 27001 Overview/003. What is the ISO 27001 standard.mp4 45.1 MB
~Get Your Files Here !/3. Complying with ISO 27001/009. Building your ISO 27001 compliance plan.mp4 41.8 MB
~Get Your Files Here !/3. Complying with ISO 27001/008. What to expect when getting ISO 27001 certified.mp4 38.6 MB
~Get Your Files Here !/8. Performance Evaluation and Improvement (Clauses 9 and 10)/024. Internal audit (Clause 9.2).mp4 34.2 MB
~Get Your Files Here !/2. ISO 27001 Overview/004. Breaking down the ISO 27001 standard.mp4 32.4 MB
~Get Your Files Here !/7. Support and Operation (Clauses 7 and 8)/021. Documented information (Clause 7.5).mp4 32.4 MB
~Get Your Files Here !/5. Leadership (Clause 5)/014. Policy (Clause 5.2).mp4 32.3 MB
~Get Your Files Here !/2. ISO 27001 Overview/006. ISO 27001 gaps and criticisms.mp4 31.3 MB
~Get Your Files Here !/3. Complying with ISO 27001/007. ISO 27001 compliance and certification.mp4 30.8 MB
~Get Your Files Here !/5. Leadership (Clause 5)/013. Leadership and commitment (Clause 5.1).mp4 29.4 MB
~Get Your Files Here !/6. Planning (Clause 6)/017. Information security risk treatment (Clause 6.1.3).mp4 27.9 MB
~Get Your Files Here !/2. ISO 27001 Overview/005. Why build an ISO 27001-compliant cybersecurity program.mp4 27.0 MB
~Get Your Files Here !/5. Leadership (Clause 5)/015. Organizational roles, responsibilities, and authorities (Clause 5.3).mp4 26.6 MB
~Get Your Files Here !/6. Planning (Clause 6)/018. Information security objectives and planning to achieve them (Clause 6.2).mp4 23.8 MB
~Get Your Files Here !/8. Performance Evaluation and Improvement (Clauses 9 and 10)/025. Management review (Clause 9.3).mp4 20.6 MB
~Get Your Files Here !/7. Support and Operation (Clauses 7 and 8)/020. Communication (Clause 7.4).mp4 19.7 MB
~Get Your Files Here !/9. Conclusion/027. Next steps to take with ISO 27001.mp4 11.6 MB
~Get Your Files Here !/1. Introduction/001. The international standard for information security.mp4 10.1 MB
~Get Your Files Here !/1. Introduction/002. Who this course is for and prerequisites.mp4 9.0 MB
猜你喜欢:
Building
Getting
Cybersecurity
Linkedin
27001
Started
CourseHulu
Compliant
Program
ISO
- 【影视】 [ CourseLala.com ] Linkedin - IT and Cybersecurity Risk Management Essential Training
-
收录时间:2022-02-10
文档个数:52
文档大小:904.4 MB
最近下载:2025-05-02
人气:1812
磁力链接
~Get Your Files Here !/4. IT Risk Management in Practice/019. IT risk management techniques.mp4 60.9 MB
~Get Your Files Here !/3. IT Risk Management in Context/009. IT risk management in medium companies.mp4 58.5 MB
~Get Your Files Here !/3. IT Risk Management in Context/010. IT risk management in large companies.mp4 57.2 MB
~Get Your Files Here !/5. IT Risk Management on the Job/020. Choosing the right IT risk management technique.mp4 52.4 MB
~Get Your Files Here !/5. IT Risk Management on the Job/023. Operating controls.mp4 47.2 MB
~Get Your Files Here !/2. What Is IT Risk Management/002. What is IT risk.mp4 42.6 MB
~Get Your Files Here !/4. IT Risk Management in Practice/014. Performing the IT risk assessment.mp4 41.3 MB
~Get Your Files Here !/4. IT Risk Management in Practice/018. Using an IT risk register.mp4 40.9 MB
~Get Your Files Here !/4. IT Risk Management in Practice/015. Choosing an IT risk management framework.mp4 40.0 MB
~Get Your Files Here !/3. IT Risk Management in Context/008. IT risk management in small companies.mp4 39.5 MB
~Get Your Files Here !/5. IT Risk Management on the Job/022. Implementing controls.mp4 35.1 MB
~Get Your Files Here !/2. What Is IT Risk Management/006. IT risk management roles and responsibilities.mp4 34.9 MB
~Get Your Files Here !/5. IT Risk Management on the Job/021. Choosing controls.mp4 34.4 MB
~Get Your Files Here !/2. What Is IT Risk Management/007. Making an IT risk decision.mp4 33.9 MB
~Get Your Files Here !/2. What Is IT Risk Management/005. Types of IT risks.mp4 33.3 MB
~Get Your Files Here !/3. IT Risk Management in Context/013. The minimum viable approach.mp4 32.7 MB
~Get Your Files Here !/3. IT Risk Management in Context/011. Quantitative vs. qualitative risk assessments.mp4 32.6 MB
~Get Your Files Here !/4. IT Risk Management in Practice/017. Determining an acceptable level of IT risk.mp4 30.3 MB
~Get Your Files Here !/5. IT Risk Management on the Job/024. Validating controls.mp4 29.9 MB
~Get Your Files Here !/2. What Is IT Risk Management/004. What is IT risk tolerance.mp4 28.4 MB
猜你喜欢:
Training
Management
Risk
Cybersecurity
CourseLala
Linkedin
com
Essential
- 【影视】 [ DevCourseWeb.com ] Udemy - Find Cybersecurity Jobs Using LinkedIn
-
收录时间:2022-02-10
文档个数:29
文档大小:1.7 GB
最近下载:2025-05-14
人气:885
磁力链接
~Get Your Files Here !/02 - Reviewing Cybersecurity Jobs/001 Reviewing a Junior Penetration Testing (Ethical Hacking) Job.mp4 398.9 MB
~Get Your Files Here !/05 - Personal Branding/001 Personal Branding.mp4 397.6 MB
~Get Your Files Here !/02 - Reviewing Cybersecurity Jobs/002 Reviewing a GRC Analyst and Auditor Role.mp4 333.9 MB
~Get Your Files Here !/03 - Your LinkedIn Profile/001 LinkedIn Profile Overview.mp4 183.6 MB
~Get Your Files Here !/06 - LinkedIn Messaging and the Power of Networking/001 LinkedIn Messaging and the Power of Proper Networking.mp4 89.5 MB
~Get Your Files Here !/07 - What did you learn in this course_/001 What did you learn in this course_.mp4 80.3 MB
~Get Your Files Here !/05 - Personal Branding/37808632-Personal-Branding.mp3 55.3 MB
~Get Your Files Here !/02 - Reviewing Cybersecurity Jobs/37807394-Pentester-search.mp3 48.8 MB
~Get Your Files Here !/02 - Reviewing Cybersecurity Jobs/37807890-GRC-1.mp3 44.6 MB
~Get Your Files Here !/04 - Using Canva for Your Cover Photo/001 How to use Canva for your LinkedIn cover photo.mp4 41.1 MB
~Get Your Files Here !/01 - Introduction/001 Welcome and What You Will Learn in this Course.mp4 29.2 MB
~Get Your Files Here !/04 - Using Canva for Your Cover Photo/37808202-Canva-audio-file.mp3 4.5 MB
~Get Your Files Here !/01 - Introduction/37806270-Course-Introduction-1.mp3 1.2 MB
~Get Your Files Here !/05 - Personal Branding/001 Personal Branding_en.vtt 95.6 kB
~Get Your Files Here !/02 - Reviewing Cybersecurity Jobs/001 Reviewing a Junior Penetration Testing (Ethical Hacking) Job_en.vtt 85.1 kB
~Get Your Files Here !/05 - Personal Branding/37808618-Personal-Branding-1.mp4.docx 82.5 kB
~Get Your Files Here !/02 - Reviewing Cybersecurity Jobs/002 Reviewing a GRC Analyst and Auditor Role_en.vtt 77.3 kB
~Get Your Files Here !/02 - Reviewing Cybersecurity Jobs/37807406-Pentester-search-1.mp4.docx 74.7 kB
~Get Your Files Here !/02 - Reviewing Cybersecurity Jobs/37807876-GRC.mp4.docx 68.1 kB
~Get Your Files Here !/03 - Your LinkedIn Profile/001 LinkedIn Profile Overview_en.vtt 53.7 kB
猜你喜欢:
Jobs
Cybersecurity
LinkedIn
Udemy
DevCourseWeb
Using
com
Find
- 【影视】 [ FreeCourseWeb.com ] Udemy - Master Cybersecurity,Ethical Hacking and Penetrating Testing (Updated 09 - 2021)
-
收录时间:2022-02-08
文档个数:66
文档大小:2.7 GB
最近下载:2025-05-15
人气:1511
磁力链接
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/8. What is Phishing, Vishing and SMShing.mp4 247.1 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/2. Why You Need Security .mp4 189.8 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4 180.0 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/7. Spyware, Adware, Scareware, PUPs & Browser hijacking.mp4 178.9 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/11. Setting up Labs.mp4 169.5 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/9. Spamming & Doxing.mp4 168.1 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/10. Social Engineering - Scams, Cons, Tricks and Fraud.mp4 163.0 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/3. What is Privacy, Anonymity and Pseudonymity .mp4 158.8 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/6. Threat Modelling And Risk Assessment.mp4 158.3 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/6. Malware, Viruses, Root kits and RATs.mp4 152.7 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/5. Hackers, crackers and cyber criminals.mp4 146.5 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/8. Confidentiality, Integrity and Availability - (Security Attributes).mp4 141.8 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/4. Security, Vulnerabilities, Threats and Adversaries.mp4 117.8 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/2. Protect What You Value.mp4 93.7 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/10. Zero Trust Model.mp4 85.7 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/7. Security,Anonymity and Privacy.mp4 59.8 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/1. What is Cybersecurity .mp4 34.8 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/9. Defence in Depth.mp4 34.2 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/8. Who Conduct it .mp4 26.4 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/5. Purpose of Studying Ethical Hacking and Penetrating Testing.mp4 24.3 MB
猜你喜欢:
Ethical
Penetrating
09
Cybersecurity
Testing
Updated
Udemy
Master
2021
FreeCourseWeb
- 【影视】 [ FreeCourseWeb.com ] Udemy - Cybersecurity For Beginners - Network Devices
-
收录时间:2022-01-31
文档个数:79
文档大小:980.5 MB
最近下载:2025-05-15
人气:1051
磁力链接
~Get Your Files Here !/12. Lab Demonstration - Scanning Networks with NMAP/1. Lab Demonstration - Scanning Networks with NMAP Pt. 1.mp4 477.1 MB
~Get Your Files Here !/12. Lab Demonstration - Scanning Networks with NMAP/2. Lab Demonstration - Scanning Networks with NMAP Pt. 2.mp4 331.7 MB
~Get Your Files Here !/6. Denial-of-Service Attack (DoS) Attack/2. The 5 Principal Differences Between DoS & DDoS Attacks.mp4 14.1 MB
~Get Your Files Here !/6. Denial-of-Service Attack (DoS) Attack/6. Common DoS Attack Pt. 2.mp4 9.8 MB
~Get Your Files Here !/2. Network Devices/1. Common Network Devices.mp4 8.9 MB
~Get Your Files Here !/1. The OSI Model/1. The OSI Model.mp4 7.8 MB
~Get Your Files Here !/6. Denial-of-Service Attack (DoS) Attack/5. Common DoS Attack Pt. 1.mp4 6.9 MB
~Get Your Files Here !/9. DNS Attacks/1. DNS Attacks.mp4 6.4 MB
~Get Your Files Here !/2. Network Devices/2. More Common Network Devices.mp4 6.2 MB
~Get Your Files Here !/6. Denial-of-Service Attack (DoS) Attack/1. DoS Vs. DDoS.mp4 6.0 MB
~Get Your Files Here !/1. The OSI Model/3. Data Link Layer.mp4 5.7 MB
~Get Your Files Here !/5. Intrusion Detection Systems (IDS) & Intrusion Prevention Systems (IPS)/2. Behavior Based IDS Vs. Knowledge Based IDS.mp4 5.5 MB
~Get Your Files Here !/10. Footprinting/3. Footprinting Helps To.mp4 5.4 MB
~Get Your Files Here !/10. Footprinting/4. Footprinting Methodology.mp4 5.4 MB
~Get Your Files Here !/6. Denial-of-Service Attack (DoS) Attack/7. Three-Way-Handshake Importance To Network Attacks (SYN Flood).mp4 5.2 MB
~Get Your Files Here !/4. Types of Firewalls/2. Types of Firewalls Pt. 2.mp4 5.1 MB
~Get Your Files Here !/1. The OSI Model/2. Physical Layer.mp4 4.8 MB
~Get Your Files Here !/4. Types of Firewalls/1. Types of Firewalls Pt. 1.mp4 4.6 MB
~Get Your Files Here !/1. The OSI Model/4. Network Layer.mp4 4.5 MB
~Get Your Files Here !/3. LAN & WAN Technologies/1. LAN & WAN Technologies.mp4 4.2 MB
猜你喜欢:
Network
Cybersecurity
Devices
Udemy
Beginners
FreeCourseWeb
com
- 【影视】 [ TutGator.com ] Udemy - Cybersecurity For Beginners - MAC and IP Addressing
-
收录时间:2022-01-21
文档个数:66
文档大小:263.9 MB
最近下载:2025-05-15
人气:1451
磁力链接
~Get Your Files Here !/5. MAC & IP Addressing Lab Demonstration/1. Lab Demonstration - MAC & IP Addressing.mp4 159.2 MB
~Get Your Files Here !/7. Network Devices/1. Common Network Devices.mp4 8.9 MB
~Get Your Files Here !/1. The OSI Model/1. The OSI Model.mp4 7.8 MB
~Get Your Files Here !/7. Network Devices/2. Common Network Devices Pt. 2.mp4 6.2 MB
~Get Your Files Here !/4. IPv4 Vs. IPv6/1. IPv4.mp4 5.7 MB
~Get Your Files Here !/1. The OSI Model/3. Data Link Layer.mp4 5.7 MB
~Get Your Files Here !/1. The OSI Model/2. Physical Layer.mp4 4.8 MB
~Get Your Files Here !/1. The OSI Model/4. Network Layer.mp4 4.5 MB
~Get Your Files Here !/8. LAN & WAN Technologies/1. LAN & WAN Technologies.mp4 4.2 MB
~Get Your Files Here !/3. MAC Address/1. MAC Address.mp4 4.0 MB
~Get Your Files Here !/6. TCP & UDP/6. Telnet.mp4 4.0 MB
~Get Your Files Here !/1. The OSI Model/5. Transport Layer.mp4 3.6 MB
~Get Your Files Here !/4. IPv4 Vs. IPv6/2. IPv6.mp4 3.6 MB
~Get Your Files Here !/6. TCP & UDP/7. FTP.mp4 3.5 MB
~Get Your Files Here !/1. The OSI Model/8. Application Layer.mp4 3.3 MB
~Get Your Files Here !/6. TCP & UDP/8. SSH.mp4 3.2 MB
~Get Your Files Here !/1. The OSI Model/7. Presentation Layer.mp4 3.1 MB
~Get Your Files Here !/6. TCP & UDP/4. ICMP.mp4 3.0 MB
~Get Your Files Here !/8. LAN & WAN Technologies/2. LAN & WAN Technologies Packet-Switching Technologies.mp4 3.0 MB
~Get Your Files Here !/6. TCP & UDP/2. TCP Ports.mp4 2.9 MB
猜你喜欢:
Addressing
TutGator
Cybersecurity
IP
Udemy
Beginners
MAC
com
- 【影视】 [ FreeCourseWeb.com ] Udemy - Cybersecurity For Beginners - Network Attacks
-
收录时间:2022-01-18
文档个数:44
文档大小:901.0 MB
最近下载:2025-05-16
人气:792
磁力链接
~Get Your Files Here !/7. Lab Demonstration - Scanning Networks with NMAP Pt. 1/1. Lab Demonstration - Scanning Networks with NMAP Pt. 1.mp4 477.1 MB
~Get Your Files Here !/8. Lab Demonstration - Scanning Networks with NMAP Pt. 2/1. Lab Demonstration - Scanning Networks with NMAP Pt. 2.mp4 331.8 MB
~Get Your Files Here !/1. Denial-of-Service Attack (DoS) Attack/2. The 5 Principal Differences Between DoS & DDoS Attacks.mp4 14.1 MB
~Get Your Files Here !/1. Denial-of-Service Attack (DoS) Attack/6. Common DoS Attack Pt. 2.mp4 9.8 MB
~Get Your Files Here !/1. Denial-of-Service Attack (DoS) Attack/5. Common DoS Attack Pt. 1.mp4 6.9 MB
~Get Your Files Here !/4. DNS Attacks/1. DNS Attacks.mp4 6.4 MB
~Get Your Files Here !/1. Denial-of-Service Attack (DoS) Attack/1. DoS Vs. DDoS.mp4 6.0 MB
~Get Your Files Here !/5. Footprinting/3. Footprinting Helps To.mp4 5.4 MB
~Get Your Files Here !/5. Footprinting/4. Footprinting Methodology.mp4 5.4 MB
~Get Your Files Here !/1. Denial-of-Service Attack (DoS) Attack/7. Three-Way-Handshake Importance To Network Attacks (SYN Flood).mp4 5.2 MB
~Get Your Files Here !/1. Denial-of-Service Attack (DoS) Attack/4. Botnets, Controllers, and Bot Herders.mp4 4.1 MB
~Get Your Files Here !/5. Footprinting/1. What is Footprinting.mp4 3.8 MB
~Get Your Files Here !/6. What is Sniffing/1. What is Sniffing.mp4 3.3 MB
~Get Your Files Here !/6. What is Sniffing/2. Passive & Active Sniffing.mp4 3.3 MB
~Get Your Files Here !/4. DNS Attacks/2. Homograph Attack.mp4 3.2 MB
~Get Your Files Here !/4. DNS Attacks/3. Hyperlink Spoofing.mp4 3.1 MB
~Get Your Files Here !/2. Eavesdropping/1. Eavesdropping.mp4 3.0 MB
~Get Your Files Here !/5. Footprinting/2. What Types of Information to Look For.mp4 2.8 MB
~Get Your Files Here !/1. Denial-of-Service Attack (DoS) Attack/3. DoS & DDoS Countermeasures.mp4 2.6 MB
~Get Your Files Here !/3. Impersonation/2. Impersonation Pt. 2.mp4 2.5 MB
猜你喜欢:
Network
Cybersecurity
Udemy
Beginners
Attacks
FreeCourseWeb
com
- 【影视】 Real-World Ethical Hacking Hands-on Cybersecurity
-
收录时间:2022-01-15
文档个数:290
文档大小:8.1 GB
最近下载:2025-05-16
人气:6983
磁力链接
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/14. Bonus Videos National Cyber Warrior Academy, Interviews and More/3. NCWA 2017 Facebook Live Video on Car Hacking and Drone Programming.mp4 947.8 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/9. BONUS Section Car Hacking in Kali Linux!/9. Car Hacking LIVE on Dr. Payne's VW Jetta Facebook Live Video from NCWA 2017.mp4 347.6 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/14. Bonus Videos National Cyber Warrior Academy, Interviews and More/5. Dr. Payne's TEDx Talk on Coding and Cyber as the New Literacy.mp4 320.6 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/5. Social Engineering Capturing Usernames and Passwords via Phishing/3. Cloning Facebook and Harvesting User Passwords.mp4 265.0 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/1. Real-World Ethical Hacking 1 Hacking Windows!/10. BONUS Mac Root Hack!.mp4 233.2 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/3. Important Linux and Windows Terminal Commands/2. Basic Linux Commands.mp4 195.0 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/13. Mobile Hacking on Android/2. Creating the Meterpreter Payload for Android.mp4 175.7 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/3. Important Linux and Windows Terminal Commands/4. More Helpful Linux Commands.mp4 170.6 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/4. Create a Virtual Network for Ethical Hacking!/3. Connecting Your VMs to the Host-Only Network.mp4 148.8 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/8. Hacking Win10 Command & Control Phase/4. Stealing Screenshots, Keystrokes, and ,Webcams.mp4 145.4 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/10. BONUS Hacking Windows 7 with Metasploit!/4. Creating an Exploit Payload with Metasploit.mp4 144.4 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/2. Create Your Own Virtual Hacking Lab!/4. Create an Android PhoneTablet VM for Mobile Hacking!.mp4 142.1 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/13. Mobile Hacking on Android/4. Advanced Android Exploits Accessing Storage, Downloading and Uploading Files.mp4 139.2 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/9. BONUS Section Car Hacking in Kali Linux!/8. BONUS Hacking the Car Hacking Software, to 1000 mph!.mp4 125.2 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/5. Social Engineering Capturing Usernames and Passwords via Phishing/7. Capturing the User's Login and Password in Kali.mp4 116.7 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/9. BONUS Section Car Hacking in Kali Linux!/5. The Replay Attack Replaying CAN Packets with CANplayer.mp4 116.0 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/11. Password Problems - Everybody's Got 'Em Hacking, Cracking, Snacking & Hijacking/3. Sniffing the Network Installing Wireshark.mp4 114.3 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/4. Create a Virtual Network for Ethical Hacking!/5. Updating Kali and Windows VMs.mp4 112.5 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/4. Create a Virtual Network for Ethical Hacking!/4. Creating and Using a Public NAT Network in VBox.mp4 112.5 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/11. Password Problems - Everybody's Got 'Em Hacking, Cracking, Snacking & Hijacking/6. Seven Things You Can Do for Safer Passwords.mp4 111.1 MB
猜你喜欢:
Real
Ethical
Cybersecurity
Hands
World
Hacking
- 【影视】 [ FreeCourseWeb.com ] Udemy - Cybersecurity Foundation
-
收录时间:2022-01-09
文档个数:18
文档大小:2.3 GB
最近下载:2025-05-16
人气:1583
磁力链接
~Get Your Files Here !/6. Continuous Risk Awareness and Monitoring/2. Malware Attacks and Defenses.mp4 328.2 MB
~Get Your Files Here !/4. Identify and Access Management & Data Security/3. User Identification, Authentication, and Session Protection.mp4 259.5 MB
~Get Your Files Here !/6. Continuous Risk Awareness and Monitoring/1. Risk Management.mp4 235.0 MB
~Get Your Files Here !/8. Cloud Platforms and Data Management/1. Cloud Computing.mp4 228.7 MB
~Get Your Files Here !/7. Cyber Hygiene/1. Cyber Hygiene.mp4 179.6 MB
~Get Your Files Here !/4. Identify and Access Management & Data Security/1. Business, Governance.mp4 166.2 MB
~Get Your Files Here !/5. Data and Information Lifecycle Process/2. Data and Information Lifecycle Process - Part 2.mp4 159.0 MB
~Get Your Files Here !/5. Data and Information Lifecycle Process/1. Data and Information Lifecycle Process - Part 1.mp4 158.9 MB
~Get Your Files Here !/4. Identify and Access Management & Data Security/4. Access Control Authorization Systems.mp4 143.3 MB
~Get Your Files Here !/8. Cloud Platforms and Data Management/2. Leveraging the Cloud for Business and Traffic Light Protocol.mp4 133.7 MB
~Get Your Files Here !/4. Identify and Access Management & Data Security/2. Access control concepts.mp4 116.0 MB
~Get Your Files Here !/2. Confidentiality, Integrity, and Availability (CIA)/1. Confidentiality, Integrity, and Availability (CIA).mp4 83.3 MB
~Get Your Files Here !/9. Summary/1. Summary.mp4 65.3 MB
~Get Your Files Here !/3. Information security and Cybersecurity Definitions/1. Information security and Cybersecurity Definitions.mp4 60.1 MB
~Get Your Files Here !/1. Introduction/1. Introduction.mp4 8.7 MB
~Get Your Files Here !/2. Data and Information Lifecycle Process - Part 2.jpeg 197.8 kB
~Get Your Files Here !/Bonus Resources.txt 357 Bytes
Get Bonus Downloads Here.url 183 Bytes
猜你喜欢:
Cybersecurity
com
FreeCourseWeb
Foundation
Udemy
- 【影视】 [Udemy] Real-World Ethical Hacking Hands-on Cybersecurity (2021) [En]
-
收录时间:2022-01-09
文档个数:194
文档大小:8.1 GB
最近下载:2025-05-15
人气:4571
磁力链接
14. Bonus Videos National Cyber Warrior Academy, Interviews and More/3. NCWA 2017 Facebook Live Video on Car Hacking and Drone Programming.mp4 947.8 MB
9. BONUS Section Car Hacking in Kali Linux!/9. Car Hacking LIVE on Dr. Payne's VW Jetta Facebook Live Video from NCWA 2017.mp4 347.6 MB
14. Bonus Videos National Cyber Warrior Academy, Interviews and More/5. Dr. Payne's TEDx Talk on Coding and Cyber as the New Literacy.mp4 320.6 MB
5. Social Engineering Capturing Usernames and Passwords via Phishing/3. Cloning Facebook and Harvesting User Passwords.mp4 265.0 MB
1. Real-World Ethical Hacking 1 Hacking Windows!/10. BONUS Mac Root Hack!.mp4 233.2 MB
3. Important Linux and Windows Terminal Commands/2. Basic Linux Commands.mp4 195.0 MB
13. Mobile Hacking on Android/2. Creating the Meterpreter Payload for Android.mp4 175.7 MB
3. Important Linux and Windows Terminal Commands/4. More Helpful Linux Commands.mp4 170.6 MB
4. Create a Virtual Network for Ethical Hacking!/3. Connecting Your VMs to the Host-Only Network.mp4 148.8 MB
8. Hacking Win10 Command & Control Phase/4. Stealing Screenshots, Keystrokes, and ,Webcams.mp4 145.4 MB
10. BONUS Hacking Windows 7 with Metasploit!/4. Creating an Exploit Payload with Metasploit.mp4 144.4 MB
2. Create Your Own Virtual Hacking Lab!/4. Create an Android PhoneTablet VM for Mobile Hacking!.mp4 142.1 MB
13. Mobile Hacking on Android/4. Advanced Android Exploits Accessing Storage, Downloading and Uploading Files.mp4 139.2 MB
9. BONUS Section Car Hacking in Kali Linux!/8. BONUS Hacking the Car Hacking Software, to 1000 mph!.mp4 125.2 MB
5. Social Engineering Capturing Usernames and Passwords via Phishing/7. Capturing the User's Login and Password in Kali.mp4 116.7 MB
9. BONUS Section Car Hacking in Kali Linux!/5. The Replay Attack Replaying CAN Packets with CANplayer.mp4 116.0 MB
11. Password Problems - Everybody's Got 'Em Hacking, Cracking, Snacking & Hijacking/3. Sniffing the Network Installing Wireshark.mp4 114.3 MB
4. Create a Virtual Network for Ethical Hacking!/5. Updating Kali and Windows VMs.mp4 112.5 MB
4. Create a Virtual Network for Ethical Hacking!/4. Creating and Using a Public NAT Network in VBox.mp4 112.5 MB
11. Password Problems - Everybody's Got 'Em Hacking, Cracking, Snacking & Hijacking/6. Seven Things You Can Do for Safer Passwords.mp4 111.1 MB
猜你喜欢:
Real
Ethical
En
Cybersecurity
Udemy
2021
Hands
World
Hacking
- 【影视】 [ TutSala.com ] Udemy - Cybersecurity For Beginners - Network Architecture
-
收录时间:2022-01-09
文档个数:124
文档大小:1.0 GB
最近下载:2025-05-15
人气:3002
磁力链接
~Get Your Files Here !/17. Lab Demonstration - Scanning Networks with NMAP Pt. 1/1. Lab Demonstration - Scanning Networks with NMAP Pt. 1.mp4 477.0 MB
~Get Your Files Here !/18. Lab Demonstration - Scanning Networks with NMAP Pt. 2/1. Lab Demonstration - Scanning Networks with NMAP Pt. 2.mp4 331.7 MB
~Get Your Files Here !/11. Denial-of-Service Attack (DoS) Attack/2. The 5 Principal Differences Between DoS & DDoS Attacks.mp4 14.1 MB
~Get Your Files Here !/11. Denial-of-Service Attack (DoS) Attack/6. Common DoS Attack Pt. 2.mp4 9.8 MB
~Get Your Files Here !/7. Network Devices/1. Common Network Devices.mp4 8.9 MB
~Get Your Files Here !/1. The OSI Model/1. The OSI Model.mp4 7.8 MB
~Get Your Files Here !/11. Denial-of-Service Attack (DoS) Attack/5. Common DoS Attack Pt. 1.mp4 6.9 MB
~Get Your Files Here !/14. DNS Attacks/1. DNS Attacks.mp4 6.4 MB
~Get Your Files Here !/7. Network Devices/2. More Common Network Devices.mp4 6.2 MB
~Get Your Files Here !/11. Denial-of-Service Attack (DoS) Attack/1. DoS Vs. DDoS.mp4 6.0 MB
~Get Your Files Here !/4. IPv4 Vs. IPv6/1. IPv4.mp4 5.7 MB
~Get Your Files Here !/1. The OSI Model/3. Data Link Layer.mp4 5.7 MB
~Get Your Files Here !/10. Intrusion Detection Systems (IDS) & Intrusion Prevention Systems (IPS)/2. Behavior Based IDS Vs. Knowledge Based IDS.mp4 5.5 MB
~Get Your Files Here !/15. What is Footprinting/3. Footprinting Helps To.mp4 5.4 MB
~Get Your Files Here !/15. What is Footprinting/4. Footprinting Methodology.mp4 5.4 MB
~Get Your Files Here !/11. Denial-of-Service Attack (DoS) Attack/7. Three-Way-Handshake Importance To Network Attacks (SYN Flood).mp4 5.2 MB
~Get Your Files Here !/9. Types of Firewalls/2. Types of Firewalls Pt. 2.mp4 5.1 MB
~Get Your Files Here !/1. The OSI Model/2. Physical Layer.mp4 4.8 MB
~Get Your Files Here !/9. Types of Firewalls/1. Types of Firewalls Pt. 1.mp4 4.6 MB
~Get Your Files Here !/1. The OSI Model/4. Network Layer.mp4 4.5 MB
猜你喜欢:
Network
Cybersecurity
Udemy
Beginners
TutSala
Architecture
com
- 【影视】 IGTI - Bootcamp - Analista de Cybersecurity
-
收录时间:2021-06-25
文档个数:168
文档大小:13.0 GB
最近下载:2025-05-16
人气:3297
磁力链接
Módulo 4 - Análise Computacional Forense/Segunda aula interativa.mp4 455.8 MB
Módulo 1 - Fundamentos de Cybersecurity/Segunda aula interativa - CBS211A - 1280x720 2310K.mp4 412.0 MB
Módulo 2 - Segurança de Infraestrutura de TI/Primeira aula interativa.mp4 403.8 MB
Módulo 3 - Auditoria e testes de invasão/Segunda aula interativa.mp4 392.8 MB
Módulo 3 - Auditoria e testes de invasão/Primeira aula interativa.mp4 379.2 MB
Desafio Final/Desafio Final.mp4 363.7 MB
Módulo 2 - Segurança de Infraestrutura de TI/5. Firewall, IDS e IPS/Aula 2.5.2 - IPS e IDS.mp4 363.0 MB
Módulo 2 - Segurança de Infraestrutura de TI/9. Controlador de Domínio e Group Polices/Controlador de Domínio e Group Polices.mp4 338.8 MB
Módulo 2 - Segurança de Infraestrutura de TI/Segunda aula interativa.mp4 330.3 MB
Módulo 4 - Análise Computacional Forense/Primeira aula interativa.mp4 279.1 MB
Módulo 2 - Segurança de Infraestrutura de TI/7. Monitoramento e Gerenciamento com NTOP/Monitoramento e Gerenciamento com NTOP.mp4 254.6 MB
Módulo 2 - Segurança de Infraestrutura de TI/11. Camada 5, vírus e Firewall pessoal/Camada 5, vírus e Firewall pessoal.mp4 220.2 MB
Módulo 2 - Segurança de Infraestrutura de TI/13. Camada 7, criptografia e DLP/Camada 7, criptografia e DLP.mp4 205.7 MB
Módulo 3 - Auditoria e testes de invasão/14. Metasploit - Pós-exploração e eliminação dos rastros/HAC- BTC 3.14 - 720p.mp4 198.0 MB
Módulo 2 - Segurança de Infraestrutura de TI/12. Camada 6 e WAF/Camada 6 e WAF.mp4 192.5 MB
Módulo 1 - Fundamentos de Cybersecurity/Primeira aula interativa - CBS211A - 1280x720 2310K.mp4 186.9 MB
Módulo 2 - Segurança de Infraestrutura de TI/2. Arquitetura da Estratégia de Defesa em Profundidade/Arquitetura da Estratégia de Defesa em Profundidade.mp4 175.4 MB
Módulo 2 - Segurança de Infraestrutura de TI/5. Firewall, IDS e IPS/Aula 2.4.2 - Firewall (Parte 2).mp4 158.3 MB
Módulo 3 - Auditoria e testes de invasão/8. Fingerprint e análise de vulnerabilidade/HAC 3.5 - 720p.mp4 149.2 MB
Módulo 2 - Segurança de Infraestrutura de TI/1. Defesa em Profundidade/Aula 1.3 - Elementos de Controle.mp4 147.4 MB
猜你喜欢:
Cybersecurity
de
Analista
IGTI
Bootcamp
- 【影视】 MS Cybersecurity Pro Track Windows 10 Security Features
-
收录时间:2021-05-12
文档个数:58
文档大小:1.1 GB
最近下载:2025-05-16
人气:1552
磁力链接
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/1. Introduction/3. Preparing the Lab Environment.mp4 99.9 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/4. Windows 10 software security features - Part 1/1. Windows Defender Firewall and Virtual Secure Mode.mp4 95.3 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/4. Windows 10 software security features - Part 1/2. Credential Guard and Bitlocker.mp4 91.4 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/6. Windows 10 New Security Features and Capabilities/3. Ransomware Case Study.mp4 87.4 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/6. Windows 10 New Security Features and Capabilities/2. Other Security Features and Capabilities.mp4 77.3 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/3. How Windows 10 uses modern hardware features for security/3. Additional Hardware Security.mp4 76.7 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/6. Windows 10 New Security Features and Capabilities/1. Windows Hello and Hello for Business.mp4 68.3 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/5. Windows 10 software security features - Part 2/3. AppLocker with Device Guard.mp4 67.5 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/4. Windows 10 software security features - Part 1/3. Antivirus and WIndows Information Protection.mp4 67.5 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/5. Windows 10 software security features - Part 2/4. Windows Defender SmartScreen and WIndows 10 Telemetry.mp4 60.0 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/3. How Windows 10 uses modern hardware features for security/1. Secure Boot Process.mp4 58.6 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/3. How Windows 10 uses modern hardware features for security/2. Secure Boot to Trusted Boot.mp4 52.0 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/5. Windows 10 software security features - Part 2/2. Device Guard.mp4 46.9 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/5. Windows 10 software security features - Part 2/1. Windows Defender Remote Credential Guard.mp4 44.0 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/1. Introduction/2. About the Course.mp4 34.8 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/2. Built-in Windows 10 defenses/1. Evolution of attacks.mp4 24.7 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/1. Introduction/1. Instructor Introduction.mp4 10.7 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/4. Windows 10 software security features - Part 1/1.2 Windows PowerShell networking cmdlets.pdf 405.1 kB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/6. Windows 10 New Security Features and Capabilities/1. Windows Hello and Hello for Business.srt 23.8 kB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/4. Windows 10 software security features - Part 1/1. Windows Defender Firewall and Virtual Secure Mode.srt 23.3 kB
猜你喜欢:
10
Features
Cybersecurity
Pro
Track
Windows
MS
Security
- 【影视】 [FreeCoursesOnline.Me] [Skillshare] Cybersecurity Data Science [FCO]
-
收录时间:2021-05-07
文档个数:32
文档大小:353.4 MB
最近下载:2025-05-10
人气:829
磁力链接
2-Obtaining a malware dataset.mp4 37.9 MB
8-Tfidf.mp4 25.9 MB
1-Downloading and installing virtual box and windows image.mp4 24.9 MB
16-Malconv.mp4 23.7 MB
15-Ngram classifier.mp4 22.9 MB
4-Static and dynamic analysis.mp4 21.3 MB
14-Hash grams.mp4 18.3 MB
0-Course introduction.mp4 15.7 MB
7-Dumping using pefile.mp4 14.3 MB
19-Isolation forest.mp4 13.3 MB
17-Section 1 end.mp4 12.7 MB
20-Section 2 end.mp4 12.4 MB
9-Train test split.mp4 11.7 MB
13-N gram background.mp4 11.4 MB
10-Training a classifier.mp4 10.3 MB
12-Thresholding.mp4 10.0 MB
3-Obtaining a benign dataset.mp4 9.5 MB
23-CAPTCHA recognizer.mp4 9.3 MB
18-Kdd cup dataset.mp4 8.4 MB
24-Course end.mp4 8.4 MB
猜你喜欢:
FreeCoursesOnline
Me
Cybersecurity
Science
Skillshare
Data
FCO
- 【影视】 [Tutorialsplanet.NET] Udemy - Real-World Ethical Hacking Hands-on Cybersecurity
-
收录时间:2021-05-01
文档个数:179
文档大小:4.7 GB
最近下载:2025-05-01
人气:171
磁力链接
13. Bonus Videos National Cyber Warrior Academy, Interviews and More/3. NCWA 2017 Facebook Live Video on Car Hacking and Drone Programming.mp4 441.0 MB
13. Bonus Videos National Cyber Warrior Academy, Interviews and More/5. Dr. Payne's TEDx Talk on Coding and Cyber as the New Literacy.mp4 320.7 MB
7. BONUS Section Car Hacking in Kali Linux!/9. Car Hacking LIVE on Dr. Payne's VW Jetta Facebook Live Video from NCWA 2017.mp4 168.6 MB
3. Important Linux and Windows Terminal Commands/5. BONUS Fun Linux Terminal Commands (Optional).mp4 166.3 MB
6. Recon Information Gathering, Scanning and Enumeration/3. theHarvester How hackers find users and email information for phishing.mp4 157.5 MB
6. Recon Information Gathering, Scanning and Enumeration/6. Legion Active network and vulnerability scanning with LEGION GUI.mp4 149.2 MB
4. Create a Virtual Network for Ethical Hacking!/3. Connecting Your VMs to the Host-Only Network.mp4 148.8 MB
6. Recon Information Gathering, Scanning and Enumeration/5. nmap Active Scanning with nmap.mp4 148.0 MB
2. Create Your Own Virtual Hacking Lab!/4. Create an Android PhoneTablet VM for Mobile Hacking!.mp4 142.1 MB
3. Important Linux and Windows Terminal Commands/2. Basic Linux Commands.mp4 112.6 MB
4. Create a Virtual Network for Ethical Hacking!/4. Creating and Using a Public NAT Network in VBox.mp4 112.5 MB
4. Create a Virtual Network for Ethical Hacking!/5. Updating Kali and Windows VMs.mp4 110.5 MB
4. Create a Virtual Network for Ethical Hacking!/2. Creating the Private, Host-Only 10.0.3.x Network.mp4 105.2 MB
2. Create Your Own Virtual Hacking Lab!/3. Create a Windows 10 VM.mp4 104.9 MB
3. Important Linux and Windows Terminal Commands/4. More Helpful Linux Commands.mp4 100.4 MB
6. Recon Information Gathering, Scanning and Enumeration/4. Recon-ng Enumeration of servershosts with Recon-ng.mp4 91.4 MB
2. Create Your Own Virtual Hacking Lab!/2. Building a Kali Linux Virtual Machine.mp4 88.0 MB
6. Recon Information Gathering, Scanning and Enumeration/2. OSINT (Open-Source INTelligence) Framework Domain Dossier.mp4 76.8 MB
2. Create Your Own Virtual Hacking Lab!/5. The Ultimately Hackable Metasploitable!.mp4 70.2 MB
2. Create Your Own Virtual Hacking Lab!/1. Virtual Lab Intro and VirtualBox Installation.mp4 66.7 MB
猜你喜欢:
Tutorialsplanet
Real
Ethical
Cybersecurity
Udemy
Hands
World
NET
Hacking
- 【影视】 Microsoft Cybersecurity Pro Track Security in Office 365
-
收录时间:2021-04-22
文档个数:91
文档大小:1.5 GB
最近下载:2025-05-15
人气:4319
磁力链接
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/2. Introduction to Security in Office 365/1. Threat Vectors and Data Breaches.mp4 185.5 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/5. Implementing auditing, insights and alerts/3. Audit Log Investigations.mp4 155.5 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/3. Implementing and Managinng Microsoft Defender for Office 365 (Office 365 ATP)/1. Introduction to Exchange Online Protection.mp4 132.0 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/6. Advanced Security Management/1. Deploy Cloud Application Security.mp4 109.2 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/5. Implementing auditing, insights and alerts/5. Managing insights and alerts in the Security & Compliance Center.mp4 101.2 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/4. Using Office 365 Threat Intelligence/3. Threat Investigation and Response.mp4 91.3 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/3. Implementing and Managinng Microsoft Defender for Office 365 (Office 365 ATP)/3. Managing Safe Attachments.mp4 90.4 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/2. Introduction to Security in Office 365/3. Introduction to Secure Score.mp4 78.1 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/3. Implementing and Managinng Microsoft Defender for Office 365 (Office 365 ATP)/4. Managing Safe Links.mp4 75.1 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/3. Implementing and Managinng Microsoft Defender for Office 365 (Office 365 ATP)/2. Overview of Microsoft Defender for Office 365 (former named Office 365 ATP).mp4 64.5 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/6. Advanced Security Management/2. Use Cloud Application Security.mp4 63.1 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/4. Using Office 365 Threat Intelligence/2. Security (Threat) Dashboard.mp4 61.0 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/3. Implementing and Managinng Microsoft Defender for Office 365 (Office 365 ATP)/5. Monitoring and Reports.mp4 56.6 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/4. Using Office 365 Threat Intelligence/1. Overview of Office 365 Threat Intelligence.mp4 53.0 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/5. Implementing auditing, insights and alerts/2. Enabling mailbox auditing in Exchange Online.mp4 44.4 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/2. Introduction to Security in Office 365/2. Security Solutions in Office 365.mp4 37.2 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/5. Implementing auditing, insights and alerts/1. Overview of auditing in the Security & Compliance Center.mp4 34.8 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/1. Introduction/2. About the Course.mp4 32.8 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/5. Implementing auditing, insights and alerts/4. Enabling sharing auditing for SharePoint and OneDrive.mp4 30.7 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/1. Introduction/3. Preparing the Lab Environment.mp4 25.1 MB
猜你喜欢:
Office
Cybersecurity
Pro
Track
Security
365
Microsoft
- 【影视】 [FreeCoursesOnline.Me] PacktPub - Cybersecurity Attacks (Red Team Activity) [Video]
-
收录时间:2021-04-18
文档个数:41
文档大小:1.1 GB
最近下载:2025-05-15
人气:4978
磁力链接
1 - Building Our Lab/Getting Acquainted with Kali Linux Easy Way.mp4 121.1 MB
1 - Building Our Lab/Getting Acquainted with Terminal Commands.mp4 105.8 MB
4 - Breaking the Human in a Cyber Crime Attack/Playing on Human Emotions and Weaknesses to Get the Information.mp4 76.7 MB
2 - Attacking a Network/Taking Control Over Target Browser with BeEf.mp4 46.7 MB
2 - Attacking a Network/Creating Reverse Shell with Metasploit.mp4 42.0 MB
4 - Breaking the Human in a Cyber Crime Attack/Social Engineering Techniques.mp4 41.3 MB
3 - Website and Web-Application Attacks#/Proxy Attack with Burp Suite.mp4 38.5 MB
2 - Attacking a Network/Hidden Scanning Ports with Nmap.mp4 37.1 MB
1 - Building Our Lab/Installing Metasploitable 2 on Virtual Machine.mp4 34.5 MB
3 - Website and Web-Application Attacks#/Manual Testing for SQL Injection.mp4 34.3 MB
3 - Website and Web-Application Attacks#/Executing a Session Hijacking.mp4 32.0 MB
4 - Breaking the Human in a Cyber Crime Attack/How to Hack Without Getting in Touch with a Target.mp4 30.3 MB
3 - Website and Web-Application Attacks#/Exploring Target with Browser.mp4 28.8 MB
4 - Breaking the Human in a Cyber Crime Attack/Making a Phishing Email with SET.mp4 28.4 MB
1 - Building Our Lab/The Course Overview.mp4 27.1 MB
2 - Attacking a Network/Advance-Level Hacking - Scanning Hosts with Python Script.mp4 27.0 MB
2 - Attacking a Network/Intercepting Traffic with Wireshark.mp4 26.9 MB
3 - Website and Web-Application Attacks#/Infecting Website with Stored XSS.mp4 26.7 MB
4 - Breaking the Human in a Cyber Crime Attack/Looking for Secrets in Social Media with Online Tools.mp4 26.1 MB
3 - Website and Web-Application Attacks#/Scanning Web-Application with OWASP ZAP.mp4 25.5 MB
猜你喜欢:
FreeCoursesOnline
Me
Attacks
Activity
Cybersecurity
PacktPub
Video
Team
Red
- 【影视】 Microsoft Cybersecurity Pro Track PowerShell Security
-
收录时间:2021-03-20
文档个数:58
文档大小:1.4 GB
最近下载:2025-05-16
人气:3259
磁力链接
Course/3. PowerShell Operational Security/2. Managing Remote Execution Capabilities of Windows PowerShell.mp4 192.7 MB
Course/4. Implementing PowerShell-based Security/1. Windows Powershell DSC.mp4 146.7 MB
Course/5. Windows PowerShell-based Exploits and their Mitigation/1. Windows PowerShell-based Attacks.mp4 134.1 MB
Course/4. Implementing PowerShell-based Security/2. Just Enough Administration (JEA).mp4 123.4 MB
Course/3. PowerShell Operational Security/1. Managing Local Script Execution Policy with Windows PowerShell Execution.mp4 116.8 MB
Course/1. Introduction/3. Preparing the Lab Environment.mp4 95.2 MB
Course/2. Windows PowerShell Fundamentals/2. PowerShell Editions and Versions.mp4 88.2 MB
Course/4. Implementing PowerShell-based Security/3. Windows PowerShell Auditing and Logging.mp4 86.9 MB
Course/3. PowerShell Operational Security/4. Language Mode.mp4 79.5 MB
Course/2. Windows PowerShell Fundamentals/1. Windows PowerShell Architecture.mp4 66.6 MB
Course/5. Windows PowerShell-based Exploits and their Mitigation/3. Summary of Windows PowerShell-based Security-Related Technologies.mp4 55.5 MB
Course/2. Windows PowerShell Fundamentals/3. Running Windows Powershell.mp4 53.4 MB
Course/5. Windows PowerShell-based Exploits and their Mitigation/2. Windows PowerShell-based Security Tools.mp4 50.7 MB
Course/3. PowerShell Operational Security/5. Anti-Malware SCan Interface (AMSI).mp4 39.1 MB
Course/1. Introduction/2. About the Course.mp4 25.1 MB
Course/3. PowerShell Operational Security/3. Constrained Endpoints.mp4 24.2 MB
Course/1. Introduction/1. Instructor Introduction.mp4 10.9 MB
Course/3. PowerShell Operational Security/2. Managing Remote Execution Capabilities of Windows PowerShell.srt 43.0 kB
Course/4. Implementing PowerShell-based Security/1. Windows Powershell DSC.srt 37.5 kB
Course/4. Implementing PowerShell-based Security/2. Just Enough Administration (JEA).srt 35.1 kB
猜你喜欢:
Cybersecurity
Pro
PowerShell
Track
Security
Microsoft
- 【影视】 [TheArtOfHacking] Cybersecurity Video Courses Collection (2018-2020) [En]
-
收录时间:2021-03-15
文档个数:1102
文档大小:115.5 GB
最近下载:2025-05-15
人气:5916
磁力链接
TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/190 - 16.5 Exploiting SQL Injection Vulnerabilities.mp4 856.8 MB
TheArtOfHacking.org - Hacking Web Applications/00044 6.4_Exploiting_SQL_Injection_Vulnerabilities.mp4 847.3 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00155 6.4_Exploiting_SQL_Injection_Vulnerabilities.mp4 847.3 MB
TheArtOfHacking.org - Hacking Web Applications/00058 8.1_Introducing_Cryptography_Encryption_and_Hashing_Protocols.mp4 757.5 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00169 8.1_Introducing_Cryptography_Encryption_and_Hashing_Protoc 757.5 MB
TheArtOfHacking.org - Hacking Web Applications/00038 5.1_Understanding_Authentication_Schemes_in_Web_Applications_and_Related_Vulnerabilities.mp4 733.0 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00149 5.1_Understanding_Authentication_Schemes_in_Web_Applicatio 733.0 MB
TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/158 - 14.15 Understanding Authentication Schemes in Web Applications.mp4 730.3 MB
TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/008 - 2.2 Threats and Attack Vectors.mp4 681.2 MB
TheArtOfHacking.org - Hacking Web Applications/00018 3.1_Exploring_Kali_Linux.mp4 586.2 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00129 3.1_Exploring_Kali_Linux.mp4 586.2 MB
TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/140 - 13.11 Introducing the Burp Suite.mp4 568.8 MB
TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/107 - 10.10 Surveying Social Engineering Case Studies.mp4 560.2 MB
TheArtOfHacking.org - Hacking Web Applications/00034 4.8_Introducing_the_Burp_Suite.mp4 549.6 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00145 4.8_Introducing_the_Burp_Suite.mp4 549.6 MB
TheArtOfHacking.org - Hacking Web Applications/00029 4.3_Exploring_Shodan_Maltego_Recon-NG_SpiderFoot_and_TheHarvester.mp4 511.9 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00140 4.3_Exploring_Shodan_Maltego_Recon-NG_SpiderFoot_and_TheHa 511.9 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00022 3.6_Surveying_Essential_Tools_for_Passive_Reconnaissance_- 489.1 MB
TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/264 - 22.5 Exploring The Android Security Model.mp4 474.0 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00061 8.10_Hacking_the_Management_Plane.mp4 469.4 MB
猜你喜欢:
TheArtOfHacking
Cybersecurity
Collection
Courses
En
Video
2018
2020
- 【影视】 MS Cybersecurity Pro Track Enterprise Security Fundamentals
-
收录时间:2021-03-14
文档个数:91
文档大小:1.0 GB
最近下载:2025-05-15
人气:1875
磁力链接
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/02 Understanding the cybersecurity landscape/003 Current Cybersecurity Landscape.mp4 169.2 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/03 Red Team_ Penetration, lateral movement, escalation, and exfiltration/008 Red Team Kill Chain.mp4 142.4 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/014 Attack Detection.mp4 89.9 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/011 Blue Team Kill Chain.mp4 70.3 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/05 Beyond The Breach/016 Organization Preparations.mp4 68.5 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/012 Restrict Privilege Escalation.mp4 59.9 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/02 Understanding the cybersecurity landscape/005 Cost of Breach.mp4 59.5 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/03 Red Team_ Penetration, lateral movement, escalation, and exfiltration/007 The Attacker's Objective.mp4 55.8 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/02 Understanding the cybersecurity landscape/004 Assume Compromise Philosophy.mp4 53.5 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/05 Beyond The Breach/017 Developing and Maintaining Policies.mp4 50.7 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/013 Restrict Lateral Movement.mp4 43.0 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/05 Beyond The Breach/015 CIA Triad.mp4 30.7 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/03 Red Team_ Penetration, lateral movement, escalation, and exfiltration/006 Red Team versus Blue Team exercises.mp4 30.4 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/01 Introduction/002 Course overview.mp4 25.3 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/010 Blue Team.mp4 22.9 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/03 Red Team_ Penetration, lateral movement, escalation, and exfiltration/009 Document Vulnerabilities.mp4 10.6 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/01 Introduction/001 Instructor introduction.mp4 9.3 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/07 Conclusion/018 Bonus Lecture_ What Next_.mp4 3.2 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/014 AttackDetection.pdf 709.3 kB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/011 BlueTeamKillChain.pdf 695.5 kB
猜你喜欢:
Fundamentals
Cybersecurity
Pro
Track
MS
Enterprise
Security