为您索检到186条磁力链接,耗时1毫秒。
- 【影视】 [FreeCoursesOnline.Me] ZeroToMastery - Complete Cybersecurity Bootcamp
-
收录时间:2023-12-20
文档个数:101
文档大小:3.6 GB
最近下载:2025-05-16
人气:7476
磁力链接
8-Network Security/052-Network Security With Nmap.mp4 169.9 MB
5-Security Bugs & Vulnerabilities/020-Buffer Overflow Demonstration.mp4 136.7 MB
12-Appendix - Ethical Hacking/087-Msfconsole Basic Commands.mp4 97.5 MB
8-Network Security/059-Wireless Attack Demonstration.mp4 93.4 MB
7-End-Point Protection/034-Password Security and Password Managers.mp4 84.2 MB
12-Appendix - Ethical Hacking/093-Meterpreter Basic Commands Part 1.mp4 78.5 MB
7-End-Point Protection/038-Process Explorer.mp4 75.8 MB
1-Introduction/001-Cybersecurity Bootcamp - Zero to Mastery.mp4 72.4 MB
8-Network Security/057-Secure Network Architecture.mp4 66.8 MB
12-Appendix - Ethical Hacking/094-Meterpreter Basic Commands Part 2.mp4 65.7 MB
7-End-Point Protection/033-Bitdefender, Kaspersky, McAfee, Malwarebytes.mp4 63.9 MB
4-Understanding Hackers - The Biggest Threat/012-Most Common Attacks Demonstration.mp4 63.5 MB
8-Network Security/060-Network Monitoring With TCPDump.mp4 62.7 MB
8-Network Security/058-Wireless Security.mp4 59.6 MB
5-Security Bugs & Vulnerabilities/017-Unpatched Machine Exploitation Demonstration.mp4 59.1 MB
12-Appendix - Ethical Hacking/080-Whatweb Stealthy Scan.mp4 58.1 MB
12-Appendix - Ethical Hacking/091-Advance Msfvenom Usage.mp4 51.4 MB
7-End-Point Protection/043-Iptables.mp4 50.9 MB
7-End-Point Protection/028-Brave Browser Security and Privacy.mp4 50.6 MB
12-Appendix - Ethical Hacking/089-Software Vulnerability - Samba Exploitation.mp4 49.5 MB
猜你喜欢:
FreeCoursesOnline
Me
Complete
Cybersecurity
Bootcamp
ZeroToMastery
- 【影视】 Real-World Ethical Hacking Hands-on Cybersecurity
-
收录时间:2022-01-15
文档个数:290
文档大小:8.1 GB
最近下载:2025-05-16
人气:6983
磁力链接
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/14. Bonus Videos National Cyber Warrior Academy, Interviews and More/3. NCWA 2017 Facebook Live Video on Car Hacking and Drone Programming.mp4 947.8 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/9. BONUS Section Car Hacking in Kali Linux!/9. Car Hacking LIVE on Dr. Payne's VW Jetta Facebook Live Video from NCWA 2017.mp4 347.6 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/14. Bonus Videos National Cyber Warrior Academy, Interviews and More/5. Dr. Payne's TEDx Talk on Coding and Cyber as the New Literacy.mp4 320.6 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/5. Social Engineering Capturing Usernames and Passwords via Phishing/3. Cloning Facebook and Harvesting User Passwords.mp4 265.0 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/1. Real-World Ethical Hacking 1 Hacking Windows!/10. BONUS Mac Root Hack!.mp4 233.2 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/3. Important Linux and Windows Terminal Commands/2. Basic Linux Commands.mp4 195.0 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/13. Mobile Hacking on Android/2. Creating the Meterpreter Payload for Android.mp4 175.7 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/3. Important Linux and Windows Terminal Commands/4. More Helpful Linux Commands.mp4 170.6 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/4. Create a Virtual Network for Ethical Hacking!/3. Connecting Your VMs to the Host-Only Network.mp4 148.8 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/8. Hacking Win10 Command & Control Phase/4. Stealing Screenshots, Keystrokes, and ,Webcams.mp4 145.4 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/10. BONUS Hacking Windows 7 with Metasploit!/4. Creating an Exploit Payload with Metasploit.mp4 144.4 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/2. Create Your Own Virtual Hacking Lab!/4. Create an Android PhoneTablet VM for Mobile Hacking!.mp4 142.1 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/13. Mobile Hacking on Android/4. Advanced Android Exploits Accessing Storage, Downloading and Uploading Files.mp4 139.2 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/9. BONUS Section Car Hacking in Kali Linux!/8. BONUS Hacking the Car Hacking Software, to 1000 mph!.mp4 125.2 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/5. Social Engineering Capturing Usernames and Passwords via Phishing/7. Capturing the User's Login and Password in Kali.mp4 116.7 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/9. BONUS Section Car Hacking in Kali Linux!/5. The Replay Attack Replaying CAN Packets with CANplayer.mp4 116.0 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/11. Password Problems - Everybody's Got 'Em Hacking, Cracking, Snacking & Hijacking/3. Sniffing the Network Installing Wireshark.mp4 114.3 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/4. Create a Virtual Network for Ethical Hacking!/5. Updating Kali and Windows VMs.mp4 112.5 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/4. Create a Virtual Network for Ethical Hacking!/4. Creating and Using a Public NAT Network in VBox.mp4 112.5 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/11. Password Problems - Everybody's Got 'Em Hacking, Cracking, Snacking & Hijacking/6. Seven Things You Can Do for Safer Passwords.mp4 111.1 MB
猜你喜欢:
Real
Ethical
Cybersecurity
Hands
World
Hacking
- 【影视】 Cybersecurity Architecture Fundamentals
-
收录时间:2023-12-26
文档个数:81
文档大小:2.4 GB
最近下载:2025-05-16
人气:6891
磁力链接
Chapter 1 Introduction/006. Security Principles and Approaches.mp4 272.7 MB
Chapter 1 Introduction/003. The Problem with Security Today.mp4 236.8 MB
Chapter 1 Introduction/009. Understanding Residual Risk.mp4 120.0 MB
Chapter 4 Cyber Architecture for Enterprise Security/006. Vulnerability, Patch, and Availability Management.mp4 102.8 MB
Chapter 1 Introduction/008. Risk Management.mp4 99.6 MB
Chapter 1 Introduction/005. Who Is a Security Architect.mp4 98.0 MB
Chapter 2 Threat Modelling/006. PASTA.mp4 94.3 MB
Chapter 4 Cyber Architecture for Enterprise Security/001. Network Security.mp4 80.3 MB
Chapter 6 Case Study/001. Case Study Preview.mp4 78.0 MB
Chapter 2 Threat Modelling/002. Threat Modelling Versus Risk Assessment.mp4 75.6 MB
Chapter 2 Threat Modelling/001. Threat Modelling - Part 1.mp4 70.2 MB
Chapter 2 Threat Modelling/009. Attack Trees.mp4 68.7 MB
Chapter 4 Cyber Architecture for Enterprise Security/005. Data Protection.mp4 56.7 MB
Chapter 5 Designing for Security/003. Reference Security Architectures.mp4 52.0 MB
Chapter 2 Threat Modelling/003. Threat Modelling - Part 2.mp4 50.8 MB
Chapter 3 Enterprise Architecture Frameworks/003. Zachman Framework.mp4 44.9 MB
Chapter 5 Designing for Security/002. Security Design Pattern Example.mp4 44.6 MB
Chapter 1 Introduction/004. Introduction to Security Architecture.mp4 42.6 MB
Chapter 5 Designing for Security/001. Security Design Patterns.mp4 41.8 MB
Chapter 3 Enterprise Architecture Frameworks/004. SABSA Framework.mp4 37.0 MB
猜你喜欢:
Cybersecurity
Fundamentals
Architecture
- 【影视】 [ DevCourseWeb.com ] CBTNuggets - (ISC)2 CC - Certified in Cybersecurity - (ISC)2 Certification Training
-
收录时间:2023-12-17
文档个数:68
文档大小:2.1 GB
最近下载:2025-05-16
人气:6852
磁力链接
~Get Your Files Here !/1. Understanding Information Assurance/1. Understanding Information Assurance - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 69.9 MB
~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/1. Power - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 65.3 MB
~Get Your Files Here !/7. Discussing Network Security Infrastructure/1. Network Segmentation - (ISC)² CC – Certified in Cybersecurity CBT Nuggets-1.mp4 58.2 MB
~Get Your Files Here !/8. Exploring Network Threats and Attacks/6. Firewalls - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 54.7 MB
~Get Your Files Here !/8. Exploring Network Threats and Attacks/3. Intrusion Detection Prevention Systems (IDSIPS) - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 54.0 MB
~Get Your Files Here !/5. Exploring Security Policies and Training/7. Security Awareness Training - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 52.0 MB
~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/3. Heating, Ventilation and Air Conditioning (HVAC) - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 48.1 MB
~Get Your Files Here !/9. Understanding Computer Networking/4. IP Addresses - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 47.5 MB
~Get Your Files Here !/6. Understanding Data Security and System Hardening/2. Types of Encryption - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 46.4 MB
~Get Your Files Here !/7. Discussing Network Security Infrastructure/7. The Cloud - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 45.7 MB
~Get Your Files Here !/8. Exploring Network Threats and Attacks/5. Vulnerability Scanning - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 45.5 MB
~Get Your Files Here !/9. Understanding Computer Networking/3. TCPIP Model - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 42.9 MB
~Get Your Files Here !/6. Understanding Data Security and System Hardening/7. Configuration Management - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 41.6 MB
~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/2. Data Centers and Closets - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 40.4 MB
~Get Your Files Here !/1. Understanding Information Assurance/2. Methods of Authentication - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 40.0 MB
~Get Your Files Here !/2. Discussing Risk Management, Controls, Ethics and Governance/4. Security Control Categories - (ISC)² CC – Certified in Cybersecurity CBT Nuggets-1.mp4 39.3 MB
~Get Your Files Here !/6. Understanding Data Security and System Hardening/3. Data Hashing with Encryption - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 38.3 MB
~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/5. Redundancy - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 38.2 MB
~Get Your Files Here !/3. Exploring BC, DR & IR Concepts/6. Incident Response - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 37.9 MB
~Get Your Files Here !/4. Reviewing Access Control Concepts/6. Types of Access Control - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 36.8 MB
猜你喜欢:
ISC
CBTNuggets
Training
Certification
CC
DevCourseWeb
Cybersecurity
com
Certified
- 【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity and Kali Linux - Hands-on course by TechLatest
-
收录时间:2023-12-29
文档个数:43
文档大小:2.6 GB
最近下载:2025-05-16
人气:6597
磁力链接
~Get Your Files Here !/7. Module 7 - Wireless Fortification Pentesting Mastery/2. Web App Pentesting Practical.mp4 636.4 MB
~Get Your Files Here !/10. Module 10 - Communicating Findings Reporting Mastery/2. Reporting Practical + Conclusion.mp4 283.4 MB
~Get Your Files Here !/6. Module 6 - Crack the Code Password Mastery/2. Password Cracking Practical.mp4 265.1 MB
~Get Your Files Here !/5. Module 5 - Hacking Mastery Strategic Exploitation/2. Exploitation Practical.mp4 222.1 MB
~Get Your Files Here !/9. Module 9 - Human Manipulation Social Engineering/2. Social Engineering Practical.mp4 198.1 MB
~Get Your Files Here !/8. Module 8 - Wireless Fortification Pentesting Mastery/2. Wireless Pentesting Practical.mp4 194.1 MB
~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/3. Social Media Reconnaissance.mp4 142.0 MB
~Get Your Files Here !/4. Module 4 - Infiltration Techniques Mastering Active Reconnaissance/2. Vulnerability Assessment.mp4 121.4 MB
~Get Your Files Here !/5. Module 5 - Hacking Mastery Strategic Exploitation/1. Exploitation Introduction.mp4 84.3 MB
~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/3. Microsoft Azure Guide..mp4 54.4 MB
~Get Your Files Here !/6. Module 6 - Crack the Code Password Mastery/1. Password Cracking Introduction.mp4 48.2 MB
~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/2. Google Cloud Platform(GCP) Guide..mp4 47.9 MB
~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/1. Amazon Web Services(AWS) Guide..mp4 46.0 MB
~Get Your Files Here !/4. Module 4 - Infiltration Techniques Mastering Active Reconnaissance/3. Scanning.mp4 44.9 MB
~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/4. Unveiling the Secrets of OS Fingerprinting in Cybersecurity with Kali Linux.mp4 44.7 MB
~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/5. Target Validation in Cybersecurity with Kali Linux.mp4 39.9 MB
~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/1. Reconnaissance — First Phase of Hacking.mp4 30.0 MB
~Get Your Files Here !/1. Module 1 - Course Introduction & Teaser/2. Course Introduction.mp4 28.4 MB
~Get Your Files Here !/8. Module 8 - Wireless Fortification Pentesting Mastery/1. Wireless Pentesting Introduction.mp4 24.5 MB
~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/6. Subdomain Discovery in Cybersecurity with Kali Linux.mp4 24.5 MB
猜你喜欢:
TechLatest
Cybersecurity
Kali
Hands
Udemy
DevCourseWeb
course
Linux
com
- 【影视】 [FreeCoursesOnline.Me] ITProTV - NIST Cybersecurity And Risk Management Frameworks
-
收录时间:2023-12-18
文档个数:61
文档大小:11.3 GB
最近下载:2025-05-16
人气:6534
磁力链接
2. NIST Cybersecurity and Publications.mp4 298.0 MB
26. Response Training and Testing.mp4 288.9 MB
24. Incident Response Plan Examples.mp4 279.3 MB
43. Documentation and Approval.mp4 277.5 MB
20. System Auditing and Logging.mp4 258.9 MB
23. Response Planning.mp4 255.7 MB
29. Backup and Recovery.mp4 251.4 MB
9. Inventory of Critical Assets.mp4 247.4 MB
46. Documenting Controls.mp4 246.5 MB
21. Monitoring and Alerting.mp4 238.7 MB
22. Assessments.mp4 238.7 MB
42. Control Allocation and Monitoring.mp4 234.0 MB
10. Business Impact Assessment.mp4 231.6 MB
40. NIST Control Documents.mp4 230.2 MB
36. Establishing Scope.mp4 227.5 MB
44. Security Control Implementation.mp4 225.8 MB
3. NIST Relationships.mp4 222.6 MB
6. The Vocabulary of Risk.mp4 222.0 MB
25. Digital Forensics.mp4 219.4 MB
51. Assessment Documentation.mp4 219.2 MB
猜你喜欢:
FreeCoursesOnline
Me
Management
Risk
Cybersecurity
ITProTV
Frameworks
NIST
- 【影视】 Udemy Cybersecurity Collection
-
收录时间:2024-02-17
文档个数:7517
文档大小:115.9 GB
最近下载:2025-05-16
人气:6044
磁力链接
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/3. Cross-Site-Scripting/1. Cross-Site-Scripting - Lecture.mp4 748.2 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/8. Cross Site Request Forgery/1. CSRF - Techniques.mp4 695.8 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/2. All Interesting Tools/1. Tools I Use.mp4 632.4 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/1. Introduction/3. Recon with.mp4 608.7 MB
Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/18. Reconnaissance/8. Active Recon - Port Scanning.mp4 436.1 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/7. Open Redirect Vulnerability/1. Open Redirect Vulnerability with @hemanth1261.mp4 435.9 MB
Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/19. Exploitation/11. SQL Injection _ SQLMap.mp4 417.9 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/1. Introduction/5. Another Recon Video.mp4 398.8 MB
Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/2. Walkthrough - Legacy.mp4 348.0 MB
Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/16. Assembly Course/5. Arithmetic.mp4 331.0 MB
Udemy - The Complete Ethical Hacking Course, by Gerri Banfield _ Erman Kirkpatrick/05 How to create a bootable USB of Kali Linux ( optional )/025 How to create a bootable USB of Kali with persistent storage _ 4 GB part 4.mp4 328.9 MB
Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/6. Walkthrough - Jerry.mp4 320.2 MB
Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/25. Job Hunting/6. Analyzing the Job Post.mp4 312.1 MB
Udemy - The Complete Ethical Hacking Course, by Gerri Banfield _ Erman Kirkpatrick/04 Set up instructions for Mac users ONLY/021 Kali Linux Live USB on a MacBook Pro part 3 ( OPTIONAL ).mp4 302.6 MB
Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/7. Walkthrough - Nibbles.mp4 299.2 MB
Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/4. Walkthrough - Blue.mp4 298.0 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/6. Server Side Request Forgery/2. SSRF - Advanced Techniques.mp4 294.3 MB
Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/3. Walkthrough - Lame.mp4 293.6 MB
Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/20. Post Exploitation/1. Stabilizing Shells.mp4 285.1 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/6. Server Side Request Forgery/1. SSRF - Basic Techniques.mp4 282.4 MB
猜你喜欢:
Cybersecurity
Collection
Udemy
- 【影视】 Cybersecurity Lab Environment in EVE NG
-
收录时间:2023-12-17
文档个数:98
文档大小:6.4 GB
最近下载:2025-05-14
人气:6032
磁力链接
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/5. Cyberattacks Lab Setup/1. Cyberattacks Lab in EVE NG.mp4 431.1 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/1. Reconnaissance Attack.mp4 351.9 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/4. Attacker OS Setup/1. Kali Linux Setup.mp4 263.4 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/12. Password Attack.mp4 261.2 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/5. Cyberattacks Lab Setup/3. Vulnerable Servers -Configuration.mp4 259.5 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/9. ARP Spoofing Attack.mp4 240.8 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/2. EVE NG Setup/5. EVE NG Qemu Image Naming.mp4 223.9 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/10. DHCP Starvation Attack.mp4 195.3 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/1. Introduction to Cybersecurity/9. Layers of the Web Terms.mp4 192.1 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/4. Attacker OS Setup/3. Parrot OS Setup.mp4 184.7 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/1. Introduction to Cybersecurity/8. Layers of the Web.mp4 170.7 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/3. Vulnerable Web Setup/2. Metasploitable Setup.mp4 164.7 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/6. Smurf Attack.mp4 162.1 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/14. SQL Injection Attack.mp4 162.0 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/1. Introduction to Cybersecurity/12. OWASP Top Ten 10.mp4 160.9 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/2. EVE NG Setup/8. EVE-NG Networks Clouds.mp4 155.5 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/5. SYN Flooding Attack.mp4 150.9 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/1. Introduction to Cybersecurity/2. Introduction to Cybersecurity.mp4 146.1 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/4. ICMP Flooding Attack.mp4 144.8 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/3. Vulnerable Web Setup/1. bWAPP Server Setup.mp4 144.8 MB
猜你喜欢:
Cybersecurity
Environment
EVE
Lab
NG
- 【影视】 [TheArtOfHacking] Cybersecurity Video Courses Collection (2018-2020) [En]
-
收录时间:2021-03-15
文档个数:1102
文档大小:115.5 GB
最近下载:2025-05-15
人气:5916
磁力链接
TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/190 - 16.5 Exploiting SQL Injection Vulnerabilities.mp4 856.8 MB
TheArtOfHacking.org - Hacking Web Applications/00044 6.4_Exploiting_SQL_Injection_Vulnerabilities.mp4 847.3 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00155 6.4_Exploiting_SQL_Injection_Vulnerabilities.mp4 847.3 MB
TheArtOfHacking.org - Hacking Web Applications/00058 8.1_Introducing_Cryptography_Encryption_and_Hashing_Protocols.mp4 757.5 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00169 8.1_Introducing_Cryptography_Encryption_and_Hashing_Protoc 757.5 MB
TheArtOfHacking.org - Hacking Web Applications/00038 5.1_Understanding_Authentication_Schemes_in_Web_Applications_and_Related_Vulnerabilities.mp4 733.0 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00149 5.1_Understanding_Authentication_Schemes_in_Web_Applicatio 733.0 MB
TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/158 - 14.15 Understanding Authentication Schemes in Web Applications.mp4 730.3 MB
TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/008 - 2.2 Threats and Attack Vectors.mp4 681.2 MB
TheArtOfHacking.org - Hacking Web Applications/00018 3.1_Exploring_Kali_Linux.mp4 586.2 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00129 3.1_Exploring_Kali_Linux.mp4 586.2 MB
TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/140 - 13.11 Introducing the Burp Suite.mp4 568.8 MB
TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/107 - 10.10 Surveying Social Engineering Case Studies.mp4 560.2 MB
TheArtOfHacking.org - Hacking Web Applications/00034 4.8_Introducing_the_Burp_Suite.mp4 549.6 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00145 4.8_Introducing_the_Burp_Suite.mp4 549.6 MB
TheArtOfHacking.org - Hacking Web Applications/00029 4.3_Exploring_Shodan_Maltego_Recon-NG_SpiderFoot_and_TheHarvester.mp4 511.9 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00140 4.3_Exploring_Shodan_Maltego_Recon-NG_SpiderFoot_and_TheHa 511.9 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00022 3.6_Surveying_Essential_Tools_for_Passive_Reconnaissance_- 489.1 MB
TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/264 - 22.5 Exploring The Android Security Model.mp4 474.0 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00061 8.10_Hacking_the_Management_Plane.mp4 469.4 MB
猜你喜欢:
TheArtOfHacking
Cybersecurity
Collection
Courses
En
Video
2018
2020
- 【影视】 Certified in Cybersecurity - CC (ISC)²
-
收录时间:2023-12-18
文档个数:68
文档大小:548.0 MB
最近下载:2025-05-15
人气:5909
磁力链接
Lesson 3 Business Continuity (BC), Disaster Recovery (DR), and Incident Response Concepts/004. 3.3 Understanding Incident Response.mp4 66.3 MB
Lesson 5 Network Security/006. 5.5 Introducing Cloud Security.mp4 51.7 MB
Lesson 5 Network Security/004. 5.3 Understanding Network Security Infrastructure.mp4 38.5 MB
Lesson 6 Security Operations/002. 6.1 Understanding Data Security.mp4 36.6 MB
Lesson 2 Security Principles/003. 2.2 Understanding the Risk Management Process.mp4 31.9 MB
Lesson 5 Network Security/003. 5.2 Understanding Network Threats and Attacks.mp4 29.4 MB
Lesson 5 Network Security/002. 5.1 Understanding Computer Networking.mp4 28.5 MB
Lesson 2 Security Principles/002. 2.1 Understanding the Security Concepts of Information Assurance.mp4 22.3 MB
Lesson 4 Access Control Concepts/006. 4.5 Understanding Mandatory Access Control (MAC).mp4 20.6 MB
Lesson 6 Security Operations/003. 6.2 Understanding Hashing.mp4 18.4 MB
Lesson 2 Security Principles/005. 2.4 Understanding Governance Processes.mp4 17.9 MB
Lesson 5 Network Security/005. 5.4 Introducing Network Segmentation.mp4 17.1 MB
Lesson 3 Business Continuity (BC), Disaster Recovery (DR), and Incident Response Concepts/003. 3.2 Understanding Disaster Recovery (DR).mp4 16.4 MB
Lesson 6 Security Operations/006. 6.5 Understanding Security Awareness Training.mp4 14.0 MB
Lesson 4 Access Control Concepts/005. 4.4 Introducing Discretionary Access Control (DAC).mp4 12.9 MB
Lesson 6 Security Operations/005. 6.4 Understanding Best Practice Security Policies.mp4 12.9 MB
Lesson 3 Business Continuity (BC), Disaster Recovery (DR), and Incident Response Concepts/002. 3.1 Understanding Business Continuity (BC).mp4 12.8 MB
Introduction/001. Certified in Cybersecurity - CC (ISC)² Introduction.mp4 11.6 MB
Lesson 1 Exam Preparation/002. 1.1 Introducing the (ISC)² Certified in Cybersecurity Exam.mp4 11.4 MB
Lesson 4 Access Control Concepts/002. 4.1 Understanding Physical Access Controls.mp4 10.0 MB
猜你喜欢:
Cybersecurity
CC
Certified
ISC
- 【影视】 [ CourseMega.com ] Linkedin - Building an ISO 27001-Compliant Cybersecurity Program - The Annex A Controls
-
收录时间:2022-03-29
文档个数:110
文档大小:1.2 GB
最近下载:2025-05-16
人气:5902
磁力链接
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/013. Access control User access management.mp4 60.8 MB
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/028. System lifecycle Security in d.mp4 57.3 MB
~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/017. Physical and environmental security Equipme.mp4 57.2 MB
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/014. Access control System and application.mp4 55.8 MB
~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/032. Management of information security.mp4 54.7 MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/018. Operations security Operational procedures and responsibili.mp4 47.1 MB
~Get Your Files Here !/12. Compliance (Clause A.18)/034. Compliance Compliance with legal and contractual requirements (Claus.mp4 46.5 MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/021. Operations security Logging and monitoring (Clause A.12.4).mp4 45.6 MB
~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/033. Information security continuity an.mp4 45.5 MB
~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/016. Physical and environmental security Secure.mp4 44.8 MB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/004. Contact with auth.mp4 42.7 MB
~Get Your Files Here !/08. Communications Security (Clause A.13)/026. Communications security Information transfer (Clause A..mp4 40.7 MB
~Get Your Files Here !/04. Asset Management (Clause A.8)/010. Asset management Information classification (Clause A.8.2).mp4 40.5 MB
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/027. System lifecycle Security requ.mp4 37.2 MB
~Get Your Files Here !/03. Human Resources Security (Clause A.7)/007. Human resources security During employment (Clause A.7..mp4 34.4 MB
~Get Your Files Here !/08. Communications Security (Clause A.13)/025. Communications security Network security management (Cl.mp4 34.1 MB
~Get Your Files Here !/04. Asset Management (Clause A.8)/009. Asset management Responsibility for assets (Clause A.8.1).mp4 33.3 MB
~Get Your Files Here !/10. Supplier Relationships (Clause A.15)/030. Supplier relationships Information security in supplier.mp4 31.4 MB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/002. Management direct.mp4 31.1 MB
~Get Your Files Here !/04. Asset Management (Clause A.8)/011. Asset management Media handling (Clause A.8.3).mp4 30.4 MB
猜你喜欢:
Building
Annex
Cybersecurity
Linkedin
27001
Compliant
Program
ISO
Controls
CourseMega
- 【影视】 TTC - Thinking about Cybersecurity
-
收录时间:2017-02-10
文档个数:19
文档大小:8.5 GB
最近下载:2025-05-16
人气:5665
磁力链接
TGC_9523_Lect18_Cybersecurity.wmv 509.4 MB
TGC_9523_Lect01_Cybersecurity.wmv 509.0 MB
TGC_9523_Lect13_Cybersecurity.wmv 508.9 MB
TGC_9523_Lect17_Cybersecurity.wmv 494.7 MB
TGC_9523_Lect08_Cybersecurity.wmv 493.5 MB
TGC_9523_Lect14_Cybersecurity.wmv 486.8 MB
TGC_9523_Lect10_Cybersecurity.wmv 486.1 MB
TGC_9523_Lect04_Cybersecurity.wmv 480.1 MB
TGC_9523_Lect15_Cybersecurity.wmv 474.7 MB
TGC_9523_Lect09_Cybersecurity.wmv 473.9 MB
TGC_9523_Lect05_Cybersecurity.wmv 472.8 MB
TGC_9523_Lect07_Cybersecurity.wmv 470.4 MB
TGC_9523_Lect06_Cybersecurity.wmv 467.2 MB
TGC_9523_Lect16_Cybersecurity.wmv 460.0 MB
TGC_9523_Lect11_Cybersecurity.wmv 453.2 MB
TGC_9523_Lect12_Cybersecurity.wmv 449.4 MB
TGC_9523_Lect03_Cybersecurity.wmv 438.7 MB
TGC_9523_Lect02_Cybersecurity.wmv 378.9 MB
DG9523_98F12.PDF 4.7 MB
猜你喜欢:
TTC
Thinking
about
Cybersecurity
- 【影视】 SC-100 Microsoft Cybersecurity Architect
-
收录时间:2023-12-22
文档个数:251
文档大小:4.6 GB
最近下载:2025-05-13
人气:5553
磁力链接
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/32. Another example on Application Objects.mp4 143.6 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/17. Lab - Microsoft Sentinel - Generating Incidents.mp4 127.1 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/29. Building a Docker Image.mp4 119.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/31. Deploying the container.mp4 113.6 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/15. Review of the Azure Firewall service.mp4 107.9 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/23. Microsoft Sentinel - Automation.mp4 107.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/32.1 AuthApp.zip 106.5 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/18. Example on using Azure Blueprints.mp4 95.8 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/7. Microsoft Defender for Cloud - Secure Management Ports.mp4 93.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/6. Microsoft Defender for Cloud - Servers.mp4 93.0 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/30. Example on using Application Objects.mp4 90.8 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/24. Storing Azure Cosmos DB keys.mp4 89.3 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/14. Microsoft Defender for Cloud - AWS resources.mp4 88.7 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/25. NSG Flow logs.mp4 86.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/15. Lab - Microsoft Sentinel - Data connectors.mp4 80.0 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/39. Review - Azure AD Privileged Identity Management.mp4 77.7 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/35. Example on Enterprise Applications.mp4 77.1 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/6. Azure Storage Accounts - Azure AD Authentication.mp4 75.1 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/3. Lab - Azure SQL database - Dynamic data masking.mp4 74.2 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/16. Lab - Microsoft Sentinel - Azure Activity.mp4 64.7 MB
猜你喜欢:
SC
Cybersecurity
100
Architect
Microsoft
- 【影视】 Palo Alto Networks Cybersecurity Fundamentals (PCCSA)
-
收录时间:2024-02-29
文档个数:52
文档大小:2.0 GB
最近下载:2025-05-16
人气:5526
磁力链接
Chapter 1 Cybersecurity Fundamentals and Threat Landscape/002. Identify Computing and Networking Trends.mp4 118.2 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/006. Identify Networking Security Technologies.mp4 114.7 MB
Chapter 1 Cybersecurity Fundamentals and Threat Landscape/003. Describe Cybersecurity Threats.mp4 108.3 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/004. Review Network Addressing.mp4 105.2 MB
Chapter 1 Cybersecurity Fundamentals and Threat Landscape/005. Identify Wi-Fi Vulnerabilities and Attacks.mp4 100.1 MB
Chapter 1 Cybersecurity Fundamentals and Threat Landscape/004. Describe Common Cyberattack Techniques.mp4 96.3 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/011. Endpoint Security.mp4 95.3 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/002. Describe Routing Protocols.mp4 91.8 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/001. Identify Basic Internet and Network Operations.mp4 90.7 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/012. Server and System Administration.mp4 90.3 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/003. Review Networking Models.mp4 88.4 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/009. Learn Basic Virtualization Security Concepts.mp4 83.8 MB
Chapter 3 Palo Alto Networks Security Solutions and Technologies/007. Describe Cortex XSOAR and AutoFocus.mp4 79.5 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/008. Learn Basic Cloud Security Concepts.mp4 75.4 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/010. Learn Basic DevOps Security Concepts.mp4 75.3 MB
Chapter 3 Palo Alto Networks Security Solutions and Technologies/001. Identify Palo Alto Networks Security Solutions.mp4 74.3 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/005. Learn Networking Security Models.mp4 72.6 MB
Chapter 3 Palo Alto Networks Security Solutions and Technologies/002. Describe Basic NGFW Components and Functions.mp4 67.1 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/007. Learn Basic Data Center Security Concepts.mp4 60.2 MB
Chapter 3 Palo Alto Networks Security Solutions and Technologies/003. Learn Basic Prisma Cloud.mp4 59.7 MB
猜你喜欢:
Alto
Cybersecurity
Fundamentals
PCCSA
Palo
Networks
- 【影视】 Lynda - Cybersecurity for IT Professionals
-
收录时间:2017-07-25
文档个数:45
文档大小:303.6 MB
最近下载:2025-05-16
人气:5438
磁力链接
00. Introduction/00_01 - Welcome.mp4 6.3 MB
00. Introduction/00_02 - What you should know before watching this course.mp4 869.2 kB
00. Introduction/00_03 - Using the exercise files.mp4 950.7 kB
01. Why Cybersecurity/01_01 - Hackers and the kill chain.mp4 14.3 MB
01. Why Cybersecurity/01_02 - The Stuxnet kill chain.mp4 8.9 MB
01. Why Cybersecurity/01_03 - Common forms of cybersecurity attack.mp4 14.1 MB
02. Antivirus/02_01 - Viruses, spyware, and adware.mp4 4.0 MB
02. Antivirus/02_02 - Using Windows Defender.mp4 3.1 MB
02. Antivirus/02_03 - Setting up real-time protection.mp4 1.0 MB
02. Antivirus/02_04 - Scanning with Windows Defender.mp4 4.3 MB
02. Antivirus/02_05 - Modifying antivirus settings in Windows Defender.mp4 5.8 MB
02. Antivirus/02_06 - Scheduling a scan with Windows Defender.mp4 9.7 MB
02. Antivirus/02_07 - Using Windows Defender offline.mp4 1.9 MB
02. Antivirus/02_08 - Exploring antivirus on Linux.mp4 1.7 MB
03. Personal Firewalls/03_01 - Why firewalls.mp4 1.5 MB
03. Personal Firewalls/03_02 - Using the Microsoft Windows Firewall.mp4 12.9 MB
03. Personal Firewalls/03_03 - Setting up advanced security notifications.mp4 9.5 MB
03. Personal Firewalls/03_04 - Setting up detailed rules.mp4 10.9 MB
03. Personal Firewalls/03_05 - Managing and analyzing log files with ZedLan.mp4 8.4 MB
03. Personal Firewalls/03_06 - Introducing iptables in Linux.mp4 10.7 MB
猜你喜欢:
Cybersecurity
Lynda
Professionals
- 【影视】 [ FreeCourseWeb.com ] CompTIA Cybersecurity Analyst + (CySA + ) (CS0-003) - 3 Incident Response and Management
-
收录时间:2023-12-17
文档个数:94
文档大小:348.1 MB
最近下载:2025-05-16
人气:5383
磁力链接
~Get Your Files Here !/05 - 4. Forensic Techniques/09 - Password forensics.mp4 19.8 MB
~Get Your Files Here !/05 - 4. Forensic Techniques/08 - Operating system analysis.mp4 15.5 MB
~Get Your Files Here !/05 - 4. Forensic Techniques/11 - Software forensics.mp4 15.2 MB
~Get Your Files Here !/05 - 4. Forensic Techniques/05 - File carving.mp4 13.1 MB
~Get Your Files Here !/05 - 4. Forensic Techniques/10 - Network forensics.mp4 11.3 MB
~Get Your Files Here !/02 - 1. Incident Response Programs/08 - Incident eradication and recovery.mp4 11.2 MB
~Get Your Files Here !/02 - 1. Incident Response Programs/01 - Build an incident response program.mp4 10.7 MB
~Get Your Files Here !/07 - 6. Disaster Recovery/01 - Disaster recovery.mp4 10.7 MB
~Get Your Files Here !/06 - 5. Business Continuity/03 - High availability and fault tolerance.mp4 10.4 MB
~Get Your Files Here !/04 - 3. Incident Investigation/01 - Logging security information.mp4 10.2 MB
~Get Your Files Here !/05 - 4. Forensic Techniques/04 - System and file forensics.mp4 10.0 MB
~Get Your Files Here !/05 - 4. Forensic Techniques/06 - Creating forensic images.mp4 10.0 MB
~Get Your Files Here !/03 - 2. Attack Frameworks/01 - MITRE ATT&CK.mp4 9.9 MB
~Get Your Files Here !/04 - 3. Incident Investigation/03 - Cloud audits and investigations.mp4 9.9 MB
~Get Your Files Here !/02 - 1. Incident Response Programs/10 - Post-incident activities.mp4 9.4 MB
~Get Your Files Here !/02 - 1. Incident Response Programs/04 - Incident identification.mp4 9.3 MB
~Get Your Files Here !/07 - 6. Disaster Recovery/04 - Disaster recovery sites.mp4 9.3 MB
~Get Your Files Here !/05 - 4. Forensic Techniques/15 - Ediscovery and evidence production.mp4 8.2 MB
~Get Your Files Here !/06 - 5. Business Continuity/02 - Business continuity controls.mp4 8.0 MB
~Get Your Files Here !/04 - 3. Incident Investigation/02 - Security information and event management.mp4 7.9 MB
猜你喜欢:
Management
Response
Cybersecurity
CySA
CS0
003
Incident
FreeCourseWeb
CompTIA
com
- 【影视】 [Coursera] Python for Cybersecurity Specialization - 5 course series
-
收录时间:2024-05-20
文档个数:290
文档大小:1.2 GB
最近下载:2025-05-15
人气:5313
磁力链接
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_03_alternative-protocol.mp4 61.8 MB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_05_network-sniffing.mp4 42.0 MB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_04_network-scanning.mp4 32.5 MB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_05_protocol-decoding.mp4 31.5 MB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_07_behavioral-analytics.mp4 29.2 MB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_03_registry-autorun.mp4 29.0 MB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_05_hijacked-execution-flow.mp4 27.5 MB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_06_dns-exploration.mp4 27.3 MB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_05_system-activity-monitoring.mp4 26.6 MB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_03_pcap-collection.mp4 26.0 MB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_03_encrypted-channel.mp4 25.8 MB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_05_scheduled-execution.mp4 25.8 MB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_03_user-account-discovery.mp4 25.4 MB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_03_logon-scripts.mp4 24.6 MB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_03_data-encryption.mp4 23.6 MB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_05_alternate-data-streams.mp4 22.4 MB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_03_default-account-discovery.mp4 21.7 MB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_05_autorun-scripts.mp4 21.2 MB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_03_impair-avs.mp4 20.8 MB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_03_credentials-from-web-browsers.mp4 20.7 MB
猜你喜欢:
Specialization
course
Python
series
Coursera
Cybersecurity
- 【影视】 [FreeCoursesOnline.Me] Lynda - Risk Management for IT and Cybersecurity Managers
-
收录时间:2021-03-08
文档个数:22
文档大小:509.8 MB
最近下载:2025-05-15
人气:5237
磁力链接
02 What Is Risk_/002 Types of risk.mp4 77.3 MB
01 Introduction/001 Risk management for IT and security managers.mp4 71.2 MB
04 Calculating Risk/003 Quantitative risk measurement.mp4 45.5 MB
02 What Is Risk_/001 What is risk_.mp4 41.2 MB
04 Calculating Risk/004 Case study_ Equifax.mp4 33.7 MB
02 What Is Risk_/003 Types of threats.mp4 30.6 MB
04 Calculating Risk/002 Qualitative risk measurement.mp4 29.9 MB
03 What Can You Do with Risk_/007 Risk responses.mp4 25.1 MB
03 What Can You Do with Risk_/006 Risk controls.mp4 24.4 MB
03 What Can You Do with Risk_/002 Risk mitigation.mp4 23.5 MB
02 What Is Risk_/004 When risk management fails.mp4 21.4 MB
03 What Can You Do with Risk_/005 Risk acceptance.mp4 20.3 MB
04 Calculating Risk/001 Calculating risk.mp4 17.8 MB
03 What Can You Do with Risk_/004 Risk avoidance.mp4 15.3 MB
03 What Can You Do with Risk_/003 Risk transference.mp4 14.1 MB
05 Conclusion/001 Next steps.mp4 10.5 MB
03 What Can You Do with Risk_/001 What can you do with risk_.mp4 7.1 MB
Ex_Files_Risk_Management_IT_Cybersecurity.zip 705.0 kB
0. Websites you may like/0. (1Hack.Us) Premium Tutorials-Guides-Articles _ Community based Forum.url 377 Bytes
0. Websites you may like/1. (FreeCoursesOnline.Me) Download Udacity, Masterclass, Lynda, PHLearn, Pluralsight Free.url 286 Bytes
猜你喜欢:
FreeCoursesOnline
Me
Management
Managers
Risk
Cybersecurity
Lynda
- 【影视】 [Coursera] Advanced Python Scripting for Cybersecurity Specialization - 3 course series
-
收录时间:2024-05-24
文档个数:97
文档大小:947.7 MB
最近下载:2025-05-15
人气:5150
磁力链接
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_04_detecting-ssh-brute-force-with-scapy.mp4 49.7 MB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_07_connection-hijacking-with-scapy.mp4 48.4 MB
python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_02_generating-password-variations-with-python.mp4 46.5 MB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_05_service-detection-with-python.mp4 45.6 MB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_05_feature-selection-for-traffic-analysis.mp4 45.2 MB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_03_searching-the-registry-with-python.mp4 45.2 MB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_02_querying-shodan-with-python.mp4 44.0 MB
establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_02_traffic-analysis-with-python.mp4 43.7 MB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_04_network-scanning-with-scapy.mp4 38.8 MB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_02_brute-force-detection-with-windows-events.mp4 38.8 MB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_03_detecting-ftp-brute-force-with-scapy.mp4 35.1 MB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_04_searching-the-system-with-python.mp4 34.9 MB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_02_dumping-chrome-credentials-with-python.mp4 34.8 MB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_06_analyzing-passwords-with-python.mp4 34.5 MB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_03_dns-queries-with-python.mp4 30.9 MB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_06_detecting-anomalous-network-traffic-with-scapy.mp4 28.8 MB
establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_05_building-c2-packets-with-python.mp4 27.1 MB
python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_04_automating-brute-force.mp4 25.9 MB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_05_cracking-the-linux-passwords-with-python.mp4 24.4 MB
establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_04_detecting-encodings-with-python.mp4 24.1 MB
猜你喜欢:
Specialization
course
Python
series
Coursera
Cybersecurity
Advanced
Scripting
- 【影视】 [FreeCoursesOnline.Me] PacktPub - Cybersecurity Attacks (Red Team Activity) [Video]
-
收录时间:2021-04-18
文档个数:41
文档大小:1.1 GB
最近下载:2025-05-15
人气:4978
磁力链接
1 - Building Our Lab/Getting Acquainted with Kali Linux Easy Way.mp4 121.1 MB
1 - Building Our Lab/Getting Acquainted with Terminal Commands.mp4 105.8 MB
4 - Breaking the Human in a Cyber Crime Attack/Playing on Human Emotions and Weaknesses to Get the Information.mp4 76.7 MB
2 - Attacking a Network/Taking Control Over Target Browser with BeEf.mp4 46.7 MB
2 - Attacking a Network/Creating Reverse Shell with Metasploit.mp4 42.0 MB
4 - Breaking the Human in a Cyber Crime Attack/Social Engineering Techniques.mp4 41.3 MB
3 - Website and Web-Application Attacks#/Proxy Attack with Burp Suite.mp4 38.5 MB
2 - Attacking a Network/Hidden Scanning Ports with Nmap.mp4 37.1 MB
1 - Building Our Lab/Installing Metasploitable 2 on Virtual Machine.mp4 34.5 MB
3 - Website and Web-Application Attacks#/Manual Testing for SQL Injection.mp4 34.3 MB
3 - Website and Web-Application Attacks#/Executing a Session Hijacking.mp4 32.0 MB
4 - Breaking the Human in a Cyber Crime Attack/How to Hack Without Getting in Touch with a Target.mp4 30.3 MB
3 - Website and Web-Application Attacks#/Exploring Target with Browser.mp4 28.8 MB
4 - Breaking the Human in a Cyber Crime Attack/Making a Phishing Email with SET.mp4 28.4 MB
1 - Building Our Lab/The Course Overview.mp4 27.1 MB
2 - Attacking a Network/Advance-Level Hacking - Scanning Hosts with Python Script.mp4 27.0 MB
2 - Attacking a Network/Intercepting Traffic with Wireshark.mp4 26.9 MB
3 - Website and Web-Application Attacks#/Infecting Website with Stored XSS.mp4 26.7 MB
4 - Breaking the Human in a Cyber Crime Attack/Looking for Secrets in Social Media with Online Tools.mp4 26.1 MB
3 - Website and Web-Application Attacks#/Scanning Web-Application with OWASP ZAP.mp4 25.5 MB
猜你喜欢:
FreeCoursesOnline
Me
Attacks
Activity
Cybersecurity
PacktPub
Video
Team
Red