磁力管家

磁力管家
为您索检到186条磁力链接,耗时1毫秒。 rss

分享给好友

【影视】 [FreeCoursesOnline.Me] ZeroToMastery - Complete Cybersecurity Bootcamp
收录时间:2023-12-20 文档个数:101 文档大小:3.6 GB 最近下载:2025-05-16 人气:7476 磁力链接
  • mp48-Network Security/052-Network Security With Nmap.mp4 169.9 MB
  • mp45-Security Bugs & Vulnerabilities/020-Buffer Overflow Demonstration.mp4 136.7 MB
  • mp412-Appendix - Ethical Hacking/087-Msfconsole Basic Commands.mp4 97.5 MB
  • mp48-Network Security/059-Wireless Attack Demonstration.mp4 93.4 MB
  • mp47-End-Point Protection/034-Password Security and Password Managers.mp4 84.2 MB
  • mp412-Appendix - Ethical Hacking/093-Meterpreter Basic Commands Part 1.mp4 78.5 MB
  • mp47-End-Point Protection/038-Process Explorer.mp4 75.8 MB
  • mp41-Introduction/001-Cybersecurity Bootcamp - Zero to Mastery.mp4 72.4 MB
  • mp48-Network Security/057-Secure Network Architecture.mp4 66.8 MB
  • mp412-Appendix - Ethical Hacking/094-Meterpreter Basic Commands Part 2.mp4 65.7 MB
  • mp47-End-Point Protection/033-Bitdefender, Kaspersky, McAfee, Malwarebytes.mp4 63.9 MB
  • mp44-Understanding Hackers - The Biggest Threat/012-Most Common Attacks Demonstration.mp4 63.5 MB
  • mp48-Network Security/060-Network Monitoring With TCPDump.mp4 62.7 MB
  • mp48-Network Security/058-Wireless Security.mp4 59.6 MB
  • mp45-Security Bugs & Vulnerabilities/017-Unpatched Machine Exploitation Demonstration.mp4 59.1 MB
  • mp412-Appendix - Ethical Hacking/080-Whatweb Stealthy Scan.mp4 58.1 MB
  • mp412-Appendix - Ethical Hacking/091-Advance Msfvenom Usage.mp4 51.4 MB
  • mp47-End-Point Protection/043-Iptables.mp4 50.9 MB
  • mp47-End-Point Protection/028-Brave Browser Security and Privacy.mp4 50.6 MB
  • mp412-Appendix - Ethical Hacking/089-Software Vulnerability - Samba Exploitation.mp4 49.5 MB
【影视】 Real-World Ethical Hacking Hands-on Cybersecurity
收录时间:2022-01-15 文档个数:290 文档大小:8.1 GB 最近下载:2025-05-16 人气:6983 磁力链接
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/14. Bonus Videos National Cyber Warrior Academy, Interviews and More/3. NCWA 2017 Facebook Live Video on Car Hacking and Drone Programming.mp4 947.8 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/9. BONUS Section Car Hacking in Kali Linux!/9. Car Hacking LIVE on Dr. Payne's VW Jetta Facebook Live Video from NCWA 2017.mp4 347.6 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/14. Bonus Videos National Cyber Warrior Academy, Interviews and More/5. Dr. Payne's TEDx Talk on Coding and Cyber as the New Literacy.mp4 320.6 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/5. Social Engineering Capturing Usernames and Passwords via Phishing/3. Cloning Facebook and Harvesting User Passwords.mp4 265.0 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/1. Real-World Ethical Hacking 1 Hacking Windows!/10. BONUS Mac Root Hack!.mp4 233.2 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/3. Important Linux and Windows Terminal Commands/2. Basic Linux Commands.mp4 195.0 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/13. Mobile Hacking on Android/2. Creating the Meterpreter Payload for Android.mp4 175.7 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/3. Important Linux and Windows Terminal Commands/4. More Helpful Linux Commands.mp4 170.6 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/4. Create a Virtual Network for Ethical Hacking!/3. Connecting Your VMs to the Host-Only Network.mp4 148.8 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/8. Hacking Win10 Command & Control Phase/4. Stealing Screenshots, Keystrokes, and ,Webcams.mp4 145.4 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/10. BONUS Hacking Windows 7 with Metasploit!/4. Creating an Exploit Payload with Metasploit.mp4 144.4 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/2. Create Your Own Virtual Hacking Lab!/4. Create an Android PhoneTablet VM for Mobile Hacking!.mp4 142.1 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/13. Mobile Hacking on Android/4. Advanced Android Exploits Accessing Storage, Downloading and Uploading Files.mp4 139.2 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/9. BONUS Section Car Hacking in Kali Linux!/8. BONUS Hacking the Car Hacking Software, to 1000 mph!.mp4 125.2 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/5. Social Engineering Capturing Usernames and Passwords via Phishing/7. Capturing the User's Login and Password in Kali.mp4 116.7 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/9. BONUS Section Car Hacking in Kali Linux!/5. The Replay Attack Replaying CAN Packets with CANplayer.mp4 116.0 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/11. Password Problems - Everybody's Got 'Em Hacking, Cracking, Snacking & Hijacking/3. Sniffing the Network Installing Wireshark.mp4 114.3 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/4. Create a Virtual Network for Ethical Hacking!/5. Updating Kali and Windows VMs.mp4 112.5 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/4. Create a Virtual Network for Ethical Hacking!/4. Creating and Using a Public NAT Network in VBox.mp4 112.5 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/11. Password Problems - Everybody's Got 'Em Hacking, Cracking, Snacking & Hijacking/6. Seven Things You Can Do for Safer Passwords.mp4 111.1 MB
【影视】 Cybersecurity Architecture Fundamentals
收录时间:2023-12-26 文档个数:81 文档大小:2.4 GB 最近下载:2025-05-16 人气:6891 磁力链接
  • mp4Chapter 1 Introduction/006. Security Principles and Approaches.mp4 272.7 MB
  • mp4Chapter 1 Introduction/003. The Problem with Security Today.mp4 236.8 MB
  • mp4Chapter 1 Introduction/009. Understanding Residual Risk.mp4 120.0 MB
  • mp4Chapter 4 Cyber Architecture for Enterprise Security/006. Vulnerability, Patch, and Availability Management.mp4 102.8 MB
  • mp4Chapter 1 Introduction/008. Risk Management.mp4 99.6 MB
  • mp4Chapter 1 Introduction/005. Who Is a Security Architect.mp4 98.0 MB
  • mp4Chapter 2 Threat Modelling/006. PASTA.mp4 94.3 MB
  • mp4Chapter 4 Cyber Architecture for Enterprise Security/001. Network Security.mp4 80.3 MB
  • mp4Chapter 6 Case Study/001. Case Study Preview.mp4 78.0 MB
  • mp4Chapter 2 Threat Modelling/002. Threat Modelling Versus Risk Assessment.mp4 75.6 MB
  • mp4Chapter 2 Threat Modelling/001. Threat Modelling - Part 1.mp4 70.2 MB
  • mp4Chapter 2 Threat Modelling/009. Attack Trees.mp4 68.7 MB
  • mp4Chapter 4 Cyber Architecture for Enterprise Security/005. Data Protection.mp4 56.7 MB
  • mp4Chapter 5 Designing for Security/003. Reference Security Architectures.mp4 52.0 MB
  • mp4Chapter 2 Threat Modelling/003. Threat Modelling - Part 2.mp4 50.8 MB
  • mp4Chapter 3 Enterprise Architecture Frameworks/003. Zachman Framework.mp4 44.9 MB
  • mp4Chapter 5 Designing for Security/002. Security Design Pattern Example.mp4 44.6 MB
  • mp4Chapter 1 Introduction/004. Introduction to Security Architecture.mp4 42.6 MB
  • mp4Chapter 5 Designing for Security/001. Security Design Patterns.mp4 41.8 MB
  • mp4Chapter 3 Enterprise Architecture Frameworks/004. SABSA Framework.mp4 37.0 MB
【影视】 [ DevCourseWeb.com ] CBTNuggets - (ISC)2 CC - Certified in Cybersecurity - (ISC)2 Certification Training
收录时间:2023-12-17 文档个数:68 文档大小:2.1 GB 最近下载:2025-05-16 人气:6852 磁力链接
  • mp4~Get Your Files Here !/1. Understanding Information Assurance/1. Understanding Information Assurance - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 69.9 MB
  • mp4~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/1. Power - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 65.3 MB
  • mp4~Get Your Files Here !/7. Discussing Network Security Infrastructure/1. Network Segmentation - (ISC)² CC – Certified in Cybersecurity CBT Nuggets-1.mp4 58.2 MB
  • mp4~Get Your Files Here !/8. Exploring Network Threats and Attacks/6. Firewalls - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 54.7 MB
  • mp4~Get Your Files Here !/8. Exploring Network Threats and Attacks/3. Intrusion Detection Prevention Systems (IDSIPS) - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 54.0 MB
  • mp4~Get Your Files Here !/5. Exploring Security Policies and Training/7. Security Awareness Training - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 52.0 MB
  • mp4~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/3. Heating, Ventilation and Air Conditioning (HVAC) - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 48.1 MB
  • mp4~Get Your Files Here !/9. Understanding Computer Networking/4. IP Addresses - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 47.5 MB
  • mp4~Get Your Files Here !/6. Understanding Data Security and System Hardening/2. Types of Encryption - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 46.4 MB
  • mp4~Get Your Files Here !/7. Discussing Network Security Infrastructure/7. The Cloud - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 45.7 MB
  • mp4~Get Your Files Here !/8. Exploring Network Threats and Attacks/5. Vulnerability Scanning - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 45.5 MB
  • mp4~Get Your Files Here !/9. Understanding Computer Networking/3. TCPIP Model - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 42.9 MB
  • mp4~Get Your Files Here !/6. Understanding Data Security and System Hardening/7. Configuration Management - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 41.6 MB
  • mp4~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/2. Data Centers and Closets - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 40.4 MB
  • mp4~Get Your Files Here !/1. Understanding Information Assurance/2. Methods of Authentication - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 40.0 MB
  • mp4~Get Your Files Here !/2. Discussing Risk Management, Controls, Ethics and Governance/4. Security Control Categories - (ISC)² CC – Certified in Cybersecurity CBT Nuggets-1.mp4 39.3 MB
  • mp4~Get Your Files Here !/6. Understanding Data Security and System Hardening/3. Data Hashing with Encryption - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 38.3 MB
  • mp4~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/5. Redundancy - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 38.2 MB
  • mp4~Get Your Files Here !/3. Exploring BC, DR & IR Concepts/6. Incident Response - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 37.9 MB
  • mp4~Get Your Files Here !/4. Reviewing Access Control Concepts/6. Types of Access Control - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 36.8 MB
【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity and Kali Linux - Hands-on course by TechLatest
收录时间:2023-12-29 文档个数:43 文档大小:2.6 GB 最近下载:2025-05-16 人气:6597 磁力链接
  • mp4~Get Your Files Here !/7. Module 7 - Wireless Fortification Pentesting Mastery/2. Web App Pentesting Practical.mp4 636.4 MB
  • mp4~Get Your Files Here !/10. Module 10 - Communicating Findings Reporting Mastery/2. Reporting Practical + Conclusion.mp4 283.4 MB
  • mp4~Get Your Files Here !/6. Module 6 - Crack the Code Password Mastery/2. Password Cracking Practical.mp4 265.1 MB
  • mp4~Get Your Files Here !/5. Module 5 - Hacking Mastery Strategic Exploitation/2. Exploitation Practical.mp4 222.1 MB
  • mp4~Get Your Files Here !/9. Module 9 - Human Manipulation Social Engineering/2. Social Engineering Practical.mp4 198.1 MB
  • mp4~Get Your Files Here !/8. Module 8 - Wireless Fortification Pentesting Mastery/2. Wireless Pentesting Practical.mp4 194.1 MB
  • mp4~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/3. Social Media Reconnaissance.mp4 142.0 MB
  • mp4~Get Your Files Here !/4. Module 4 - Infiltration Techniques Mastering Active Reconnaissance/2. Vulnerability Assessment.mp4 121.4 MB
  • mp4~Get Your Files Here !/5. Module 5 - Hacking Mastery Strategic Exploitation/1. Exploitation Introduction.mp4 84.3 MB
  • mp4~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/3. Microsoft Azure Guide..mp4 54.4 MB
  • mp4~Get Your Files Here !/6. Module 6 - Crack the Code Password Mastery/1. Password Cracking Introduction.mp4 48.2 MB
  • mp4~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/2. Google Cloud Platform(GCP) Guide..mp4 47.9 MB
  • mp4~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/1. Amazon Web Services(AWS) Guide..mp4 46.0 MB
  • mp4~Get Your Files Here !/4. Module 4 - Infiltration Techniques Mastering Active Reconnaissance/3. Scanning.mp4 44.9 MB
  • mp4~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/4. Unveiling the Secrets of OS Fingerprinting in Cybersecurity with Kali Linux.mp4 44.7 MB
  • mp4~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/5. Target Validation in Cybersecurity with Kali Linux.mp4 39.9 MB
  • mp4~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/1. Reconnaissance — First Phase of Hacking.mp4 30.0 MB
  • mp4~Get Your Files Here !/1. Module 1 - Course Introduction & Teaser/2. Course Introduction.mp4 28.4 MB
  • mp4~Get Your Files Here !/8. Module 8 - Wireless Fortification Pentesting Mastery/1. Wireless Pentesting Introduction.mp4 24.5 MB
  • mp4~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/6. Subdomain Discovery in Cybersecurity with Kali Linux.mp4 24.5 MB
【影视】 [FreeCoursesOnline.Me] ITProTV - NIST Cybersecurity And Risk Management Frameworks
收录时间:2023-12-18 文档个数:61 文档大小:11.3 GB 最近下载:2025-05-16 人气:6534 磁力链接
  • mp42. NIST Cybersecurity and Publications.mp4 298.0 MB
  • mp426. Response Training and Testing.mp4 288.9 MB
  • mp424. Incident Response Plan Examples.mp4 279.3 MB
  • mp443. Documentation and Approval.mp4 277.5 MB
  • mp420. System Auditing and Logging.mp4 258.9 MB
  • mp423. Response Planning.mp4 255.7 MB
  • mp429. Backup and Recovery.mp4 251.4 MB
  • mp49. Inventory of Critical Assets.mp4 247.4 MB
  • mp446. Documenting Controls.mp4 246.5 MB
  • mp421. Monitoring and Alerting.mp4 238.7 MB
  • mp422. Assessments.mp4 238.7 MB
  • mp442. Control Allocation and Monitoring.mp4 234.0 MB
  • mp410. Business Impact Assessment.mp4 231.6 MB
  • mp440. NIST Control Documents.mp4 230.2 MB
  • mp436. Establishing Scope.mp4 227.5 MB
  • mp444. Security Control Implementation.mp4 225.8 MB
  • mp43. NIST Relationships.mp4 222.6 MB
  • mp46. The Vocabulary of Risk.mp4 222.0 MB
  • mp425. Digital Forensics.mp4 219.4 MB
  • mp451. Assessment Documentation.mp4 219.2 MB
【影视】 Udemy Cybersecurity Collection
收录时间:2024-02-17 文档个数:7517 文档大小:115.9 GB 最近下载:2025-05-16 人气:6044 磁力链接
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/3. Cross-Site-Scripting/1. Cross-Site-Scripting - Lecture.mp4 748.2 MB
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/8. Cross Site Request Forgery/1. CSRF - Techniques.mp4 695.8 MB
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/2. All Interesting Tools/1. Tools I Use.mp4 632.4 MB
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/1. Introduction/3. Recon with.mp4 608.7 MB
  • mp4Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/18. Reconnaissance/8. Active Recon - Port Scanning.mp4 436.1 MB
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/7. Open Redirect Vulnerability/1. Open Redirect Vulnerability with @hemanth1261.mp4 435.9 MB
  • mp4Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/19. Exploitation/11. SQL Injection _ SQLMap.mp4 417.9 MB
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/1. Introduction/5. Another Recon Video.mp4 398.8 MB
  • mp4Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/2. Walkthrough - Legacy.mp4 348.0 MB
  • mp4Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/16. Assembly Course/5. Arithmetic.mp4 331.0 MB
  • mp4Udemy - The Complete Ethical Hacking Course, by Gerri Banfield _ Erman Kirkpatrick/05 How to create a bootable USB of Kali Linux ( optional )/025 How to create a bootable USB of Kali with persistent storage _ 4 GB part 4.mp4 328.9 MB
  • mp4Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/6. Walkthrough - Jerry.mp4 320.2 MB
  • mp4Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/25. Job Hunting/6. Analyzing the Job Post.mp4 312.1 MB
  • mp4Udemy - The Complete Ethical Hacking Course, by Gerri Banfield _ Erman Kirkpatrick/04 Set up instructions for Mac users ONLY/021 Kali Linux Live USB on a MacBook Pro part 3 ( OPTIONAL ).mp4 302.6 MB
  • mp4Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/7. Walkthrough - Nibbles.mp4 299.2 MB
  • mp4Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/4. Walkthrough - Blue.mp4 298.0 MB
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/6. Server Side Request Forgery/2. SSRF - Advanced Techniques.mp4 294.3 MB
  • mp4Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/3. Walkthrough - Lame.mp4 293.6 MB
  • mp4Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/20. Post Exploitation/1. Stabilizing Shells.mp4 285.1 MB
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/6. Server Side Request Forgery/1. SSRF - Basic Techniques.mp4 282.4 MB
【影视】 Cybersecurity Lab Environment in EVE NG
收录时间:2023-12-17 文档个数:98 文档大小:6.4 GB 最近下载:2025-05-14 人气:6032 磁力链接
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/5. Cyberattacks Lab Setup/1. Cyberattacks Lab in EVE NG.mp4 431.1 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/1. Reconnaissance Attack.mp4 351.9 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/4. Attacker OS Setup/1. Kali Linux Setup.mp4 263.4 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/12. Password Attack.mp4 261.2 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/5. Cyberattacks Lab Setup/3. Vulnerable Servers -Configuration.mp4 259.5 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/9. ARP Spoofing Attack.mp4 240.8 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/2. EVE NG Setup/5. EVE NG Qemu Image Naming.mp4 223.9 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/10. DHCP Starvation Attack.mp4 195.3 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/1. Introduction to Cybersecurity/9. Layers of the Web Terms.mp4 192.1 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/4. Attacker OS Setup/3. Parrot OS Setup.mp4 184.7 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/1. Introduction to Cybersecurity/8. Layers of the Web.mp4 170.7 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/3. Vulnerable Web Setup/2. Metasploitable Setup.mp4 164.7 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/6. Smurf Attack.mp4 162.1 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/14. SQL Injection Attack.mp4 162.0 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/1. Introduction to Cybersecurity/12. OWASP Top Ten 10.mp4 160.9 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/2. EVE NG Setup/8. EVE-NG Networks Clouds.mp4 155.5 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/5. SYN Flooding Attack.mp4 150.9 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/1. Introduction to Cybersecurity/2. Introduction to Cybersecurity.mp4 146.1 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/4. ICMP Flooding Attack.mp4 144.8 MB
  • mp4[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/3. Vulnerable Web Setup/1. bWAPP Server Setup.mp4 144.8 MB
【影视】 [TheArtOfHacking] Cybersecurity Video Courses Collection (2018-2020) [En]
收录时间:2021-03-15 文档个数:1102 文档大小:115.5 GB 最近下载:2025-05-15 人气:5916 磁力链接
  • mp4TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/190 - 16.5 Exploiting SQL Injection Vulnerabilities.mp4 856.8 MB
  • mp4TheArtOfHacking.org - Hacking Web Applications/00044 6.4_Exploiting_SQL_Injection_Vulnerabilities.mp4 847.3 MB
  • mp4TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00155 6.4_Exploiting_SQL_Injection_Vulnerabilities.mp4 847.3 MB
  • mp4TheArtOfHacking.org - Hacking Web Applications/00058 8.1_Introducing_Cryptography_Encryption_and_Hashing_Protocols.mp4 757.5 MB
  • 1_Introducing_Cryptography_Encryption_and_Hashing_ProtocTheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00169 8.1_Introducing_Cryptography_Encryption_and_Hashing_Protoc 757.5 MB
  • mp4TheArtOfHacking.org - Hacking Web Applications/00038 5.1_Understanding_Authentication_Schemes_in_Web_Applications_and_Related_Vulnerabilities.mp4 733.0 MB
  • 1_Understanding_Authentication_Schemes_in_Web_ApplicatioTheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00149 5.1_Understanding_Authentication_Schemes_in_Web_Applicatio 733.0 MB
  • mp4TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/158 - 14.15 Understanding Authentication Schemes in Web Applications.mp4 730.3 MB
  • mp4TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/008 - 2.2 Threats and Attack Vectors.mp4 681.2 MB
  • mp4TheArtOfHacking.org - Hacking Web Applications/00018 3.1_Exploring_Kali_Linux.mp4 586.2 MB
  • mp4TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00129 3.1_Exploring_Kali_Linux.mp4 586.2 MB
  • mp4TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/140 - 13.11 Introducing the Burp Suite.mp4 568.8 MB
  • mp4TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/107 - 10.10 Surveying Social Engineering Case Studies.mp4 560.2 MB
  • mp4TheArtOfHacking.org - Hacking Web Applications/00034 4.8_Introducing_the_Burp_Suite.mp4 549.6 MB
  • mp4TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00145 4.8_Introducing_the_Burp_Suite.mp4 549.6 MB
  • mp4TheArtOfHacking.org - Hacking Web Applications/00029 4.3_Exploring_Shodan_Maltego_Recon-NG_SpiderFoot_and_TheHarvester.mp4 511.9 MB
  • 3_Exploring_Shodan_Maltego_Recon-NG_SpiderFoot_and_TheHaTheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00140 4.3_Exploring_Shodan_Maltego_Recon-NG_SpiderFoot_and_TheHa 511.9 MB
  • 6_Surveying_Essential_Tools_for_Passive_Reconnaissance_-TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00022 3.6_Surveying_Essential_Tools_for_Passive_Reconnaissance_- 489.1 MB
  • mp4TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/264 - 22.5 Exploring The Android Security Model.mp4 474.0 MB
  • mp4TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00061 8.10_Hacking_the_Management_Plane.mp4 469.4 MB
【影视】 Certified in Cybersecurity - CC (ISC)²
收录时间:2023-12-18 文档个数:68 文档大小:548.0 MB 最近下载:2025-05-15 人气:5909 磁力链接
  • mp4Lesson 3 Business Continuity (BC), Disaster Recovery (DR), and Incident Response Concepts/004. 3.3 Understanding Incident Response.mp4 66.3 MB
  • mp4Lesson 5 Network Security/006. 5.5 Introducing Cloud Security.mp4 51.7 MB
  • mp4Lesson 5 Network Security/004. 5.3 Understanding Network Security Infrastructure.mp4 38.5 MB
  • mp4Lesson 6 Security Operations/002. 6.1 Understanding Data Security.mp4 36.6 MB
  • mp4Lesson 2 Security Principles/003. 2.2 Understanding the Risk Management Process.mp4 31.9 MB
  • mp4Lesson 5 Network Security/003. 5.2 Understanding Network Threats and Attacks.mp4 29.4 MB
  • mp4Lesson 5 Network Security/002. 5.1 Understanding Computer Networking.mp4 28.5 MB
  • mp4Lesson 2 Security Principles/002. 2.1 Understanding the Security Concepts of Information Assurance.mp4 22.3 MB
  • mp4Lesson 4 Access Control Concepts/006. 4.5 Understanding Mandatory Access Control (MAC).mp4 20.6 MB
  • mp4Lesson 6 Security Operations/003. 6.2 Understanding Hashing.mp4 18.4 MB
  • mp4Lesson 2 Security Principles/005. 2.4 Understanding Governance Processes.mp4 17.9 MB
  • mp4Lesson 5 Network Security/005. 5.4 Introducing Network Segmentation.mp4 17.1 MB
  • mp4Lesson 3 Business Continuity (BC), Disaster Recovery (DR), and Incident Response Concepts/003. 3.2 Understanding Disaster Recovery (DR).mp4 16.4 MB
  • mp4Lesson 6 Security Operations/006. 6.5 Understanding Security Awareness Training.mp4 14.0 MB
  • mp4Lesson 4 Access Control Concepts/005. 4.4 Introducing Discretionary Access Control (DAC).mp4 12.9 MB
  • mp4Lesson 6 Security Operations/005. 6.4 Understanding Best Practice Security Policies.mp4 12.9 MB
  • mp4Lesson 3 Business Continuity (BC), Disaster Recovery (DR), and Incident Response Concepts/002. 3.1 Understanding Business Continuity (BC).mp4 12.8 MB
  • mp4Introduction/001. Certified in Cybersecurity - CC (ISC)² Introduction.mp4 11.6 MB
  • mp4Lesson 1 Exam Preparation/002. 1.1 Introducing the (ISC)² Certified in Cybersecurity Exam.mp4 11.4 MB
  • mp4Lesson 4 Access Control Concepts/002. 4.1 Understanding Physical Access Controls.mp4 10.0 MB
【影视】 [ CourseMega.com ] Linkedin - Building an ISO 27001-Compliant Cybersecurity Program - The Annex A Controls
收录时间:2022-03-29 文档个数:110 文档大小:1.2 GB 最近下载:2025-05-16 人气:5902 磁力链接
  • mp4~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/013. Access control User access management.mp4 60.8 MB
  • mp4~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/028. System lifecycle Security in d.mp4 57.3 MB
  • mp4~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/017. Physical and environmental security Equipme.mp4 57.2 MB
  • mp4~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/014. Access control System and application.mp4 55.8 MB
  • mp4~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/032. Management of information security.mp4 54.7 MB
  • mp4~Get Your Files Here !/07. Operations Security (Clause A.12)/018. Operations security Operational procedures and responsibili.mp4 47.1 MB
  • mp4~Get Your Files Here !/12. Compliance (Clause A.18)/034. Compliance Compliance with legal and contractual requirements (Claus.mp4 46.5 MB
  • mp4~Get Your Files Here !/07. Operations Security (Clause A.12)/021. Operations security Logging and monitoring (Clause A.12.4).mp4 45.6 MB
  • mp4~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/033. Information security continuity an.mp4 45.5 MB
  • mp4~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/016. Physical and environmental security Secure.mp4 44.8 MB
  • mp4~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/004. Contact with auth.mp4 42.7 MB
  • mp4~Get Your Files Here !/08. Communications Security (Clause A.13)/026. Communications security Information transfer (Clause A..mp4 40.7 MB
  • mp4~Get Your Files Here !/04. Asset Management (Clause A.8)/010. Asset management Information classification (Clause A.8.2).mp4 40.5 MB
  • mp4~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/027. System lifecycle Security requ.mp4 37.2 MB
  • mp4~Get Your Files Here !/03. Human Resources Security (Clause A.7)/007. Human resources security During employment (Clause A.7..mp4 34.4 MB
  • mp4~Get Your Files Here !/08. Communications Security (Clause A.13)/025. Communications security Network security management (Cl.mp4 34.1 MB
  • mp4~Get Your Files Here !/04. Asset Management (Clause A.8)/009. Asset management Responsibility for assets (Clause A.8.1).mp4 33.3 MB
  • mp4~Get Your Files Here !/10. Supplier Relationships (Clause A.15)/030. Supplier relationships Information security in supplier.mp4 31.4 MB
  • mp4~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/002. Management direct.mp4 31.1 MB
  • mp4~Get Your Files Here !/04. Asset Management (Clause A.8)/011. Asset management Media handling (Clause A.8.3).mp4 30.4 MB
【影视】 TTC - Thinking about Cybersecurity
收录时间:2017-02-10 文档个数:19 文档大小:8.5 GB 最近下载:2025-05-16 人气:5665 磁力链接
  • wmvTGC_9523_Lect18_Cybersecurity.wmv 509.4 MB
  • wmvTGC_9523_Lect01_Cybersecurity.wmv 509.0 MB
  • wmvTGC_9523_Lect13_Cybersecurity.wmv 508.9 MB
  • wmvTGC_9523_Lect17_Cybersecurity.wmv 494.7 MB
  • wmvTGC_9523_Lect08_Cybersecurity.wmv 493.5 MB
  • wmvTGC_9523_Lect14_Cybersecurity.wmv 486.8 MB
  • wmvTGC_9523_Lect10_Cybersecurity.wmv 486.1 MB
  • wmvTGC_9523_Lect04_Cybersecurity.wmv 480.1 MB
  • wmvTGC_9523_Lect15_Cybersecurity.wmv 474.7 MB
  • wmvTGC_9523_Lect09_Cybersecurity.wmv 473.9 MB
  • wmvTGC_9523_Lect05_Cybersecurity.wmv 472.8 MB
  • wmvTGC_9523_Lect07_Cybersecurity.wmv 470.4 MB
  • wmvTGC_9523_Lect06_Cybersecurity.wmv 467.2 MB
  • wmvTGC_9523_Lect16_Cybersecurity.wmv 460.0 MB
  • wmvTGC_9523_Lect11_Cybersecurity.wmv 453.2 MB
  • wmvTGC_9523_Lect12_Cybersecurity.wmv 449.4 MB
  • wmvTGC_9523_Lect03_Cybersecurity.wmv 438.7 MB
  • wmvTGC_9523_Lect02_Cybersecurity.wmv 378.9 MB
  • PDFDG9523_98F12.PDF 4.7 MB
【影视】 SC-100 Microsoft Cybersecurity Architect
收录时间:2023-12-22 文档个数:251 文档大小:4.6 GB 最近下载:2025-05-13 人气:5553 磁力链接
  • mp4[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/32. Another example on Application Objects.mp4 143.6 MB
  • mp4[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/17. Lab - Microsoft Sentinel - Generating Incidents.mp4 127.1 MB
  • mp4[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/29. Building a Docker Image.mp4 119.4 MB
  • mp4[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/31. Deploying the container.mp4 113.6 MB
  • mp4[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/15. Review of the Azure Firewall service.mp4 107.9 MB
  • mp4[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/23. Microsoft Sentinel - Automation.mp4 107.4 MB
  • zip[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/32.1 AuthApp.zip 106.5 MB
  • mp4[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/18. Example on using Azure Blueprints.mp4 95.8 MB
  • mp4[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/7. Microsoft Defender for Cloud - Secure Management Ports.mp4 93.4 MB
  • mp4[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/6. Microsoft Defender for Cloud - Servers.mp4 93.0 MB
  • mp4[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/30. Example on using Application Objects.mp4 90.8 MB
  • mp4[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/24. Storing Azure Cosmos DB keys.mp4 89.3 MB
  • mp4[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/14. Microsoft Defender for Cloud - AWS resources.mp4 88.7 MB
  • mp4[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/25. NSG Flow logs.mp4 86.4 MB
  • mp4[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/15. Lab - Microsoft Sentinel - Data connectors.mp4 80.0 MB
  • mp4[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/39. Review - Azure AD Privileged Identity Management.mp4 77.7 MB
  • mp4[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/35. Example on Enterprise Applications.mp4 77.1 MB
  • mp4[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/6. Azure Storage Accounts - Azure AD Authentication.mp4 75.1 MB
  • mp4[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/3. Lab - Azure SQL database - Dynamic data masking.mp4 74.2 MB
  • mp4[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/16. Lab - Microsoft Sentinel - Azure Activity.mp4 64.7 MB
【影视】 Palo Alto Networks Cybersecurity Fundamentals (PCCSA)
收录时间:2024-02-29 文档个数:52 文档大小:2.0 GB 最近下载:2025-05-16 人气:5526 磁力链接
  • mp4Chapter 1 Cybersecurity Fundamentals and Threat Landscape/002. Identify Computing and Networking Trends.mp4 118.2 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/006. Identify Networking Security Technologies.mp4 114.7 MB
  • mp4Chapter 1 Cybersecurity Fundamentals and Threat Landscape/003. Describe Cybersecurity Threats.mp4 108.3 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/004. Review Network Addressing.mp4 105.2 MB
  • mp4Chapter 1 Cybersecurity Fundamentals and Threat Landscape/005. Identify Wi-Fi Vulnerabilities and Attacks.mp4 100.1 MB
  • mp4Chapter 1 Cybersecurity Fundamentals and Threat Landscape/004. Describe Common Cyberattack Techniques.mp4 96.3 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/011. Endpoint Security.mp4 95.3 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/002. Describe Routing Protocols.mp4 91.8 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/001. Identify Basic Internet and Network Operations.mp4 90.7 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/012. Server and System Administration.mp4 90.3 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/003. Review Networking Models.mp4 88.4 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/009. Learn Basic Virtualization Security Concepts.mp4 83.8 MB
  • mp4Chapter 3 Palo Alto Networks Security Solutions and Technologies/007. Describe Cortex XSOAR and AutoFocus.mp4 79.5 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/008. Learn Basic Cloud Security Concepts.mp4 75.4 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/010. Learn Basic DevOps Security Concepts.mp4 75.3 MB
  • mp4Chapter 3 Palo Alto Networks Security Solutions and Technologies/001. Identify Palo Alto Networks Security Solutions.mp4 74.3 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/005. Learn Networking Security Models.mp4 72.6 MB
  • mp4Chapter 3 Palo Alto Networks Security Solutions and Technologies/002. Describe Basic NGFW Components and Functions.mp4 67.1 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/007. Learn Basic Data Center Security Concepts.mp4 60.2 MB
  • mp4Chapter 3 Palo Alto Networks Security Solutions and Technologies/003. Learn Basic Prisma Cloud.mp4 59.7 MB
【影视】 Lynda - Cybersecurity for IT Professionals
收录时间:2017-07-25 文档个数:45 文档大小:303.6 MB 最近下载:2025-05-16 人气:5438 磁力链接
  • mp400. Introduction/00_01 - Welcome.mp4 6.3 MB
  • mp400. Introduction/00_02 - What you should know before watching this course.mp4 869.2 kB
  • mp400. Introduction/00_03 - Using the exercise files.mp4 950.7 kB
  • mp401. Why Cybersecurity/01_01 - Hackers and the kill chain.mp4 14.3 MB
  • mp401. Why Cybersecurity/01_02 - The Stuxnet kill chain.mp4 8.9 MB
  • mp401. Why Cybersecurity/01_03 - Common forms of cybersecurity attack.mp4 14.1 MB
  • mp402. Antivirus/02_01 - Viruses, spyware, and adware.mp4 4.0 MB
  • mp402. Antivirus/02_02 - Using Windows Defender.mp4 3.1 MB
  • mp402. Antivirus/02_03 - Setting up real-time protection.mp4 1.0 MB
  • mp402. Antivirus/02_04 - Scanning with Windows Defender.mp4 4.3 MB
  • mp402. Antivirus/02_05 - Modifying antivirus settings in Windows Defender.mp4 5.8 MB
  • mp402. Antivirus/02_06 - Scheduling a scan with Windows Defender.mp4 9.7 MB
  • mp402. Antivirus/02_07 - Using Windows Defender offline.mp4 1.9 MB
  • mp402. Antivirus/02_08 - Exploring antivirus on Linux.mp4 1.7 MB
  • mp403. Personal Firewalls/03_01 - Why firewalls.mp4 1.5 MB
  • mp403. Personal Firewalls/03_02 - Using the Microsoft Windows Firewall.mp4 12.9 MB
  • mp403. Personal Firewalls/03_03 - Setting up advanced security notifications.mp4 9.5 MB
  • mp403. Personal Firewalls/03_04 - Setting up detailed rules.mp4 10.9 MB
  • mp403. Personal Firewalls/03_05 - Managing and analyzing log files with ZedLan.mp4 8.4 MB
  • mp403. Personal Firewalls/03_06 - Introducing iptables in Linux.mp4 10.7 MB
【影视】 [ FreeCourseWeb.com ] CompTIA Cybersecurity Analyst + (CySA + ) (CS0-003) - 3 Incident Response and Management
收录时间:2023-12-17 文档个数:94 文档大小:348.1 MB 最近下载:2025-05-16 人气:5383 磁力链接
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/09 - Password forensics.mp4 19.8 MB
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/08 - Operating system analysis.mp4 15.5 MB
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/11 - Software forensics.mp4 15.2 MB
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/05 - File carving.mp4 13.1 MB
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/10 - Network forensics.mp4 11.3 MB
  • mp4~Get Your Files Here !/02 - 1. Incident Response Programs/08 - Incident eradication and recovery.mp4 11.2 MB
  • mp4~Get Your Files Here !/02 - 1. Incident Response Programs/01 - Build an incident response program.mp4 10.7 MB
  • mp4~Get Your Files Here !/07 - 6. Disaster Recovery/01 - Disaster recovery.mp4 10.7 MB
  • mp4~Get Your Files Here !/06 - 5. Business Continuity/03 - High availability and fault tolerance.mp4 10.4 MB
  • mp4~Get Your Files Here !/04 - 3. Incident Investigation/01 - Logging security information.mp4 10.2 MB
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/04 - System and file forensics.mp4 10.0 MB
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/06 - Creating forensic images.mp4 10.0 MB
  • mp4~Get Your Files Here !/03 - 2. Attack Frameworks/01 - MITRE ATT&CK.mp4 9.9 MB
  • mp4~Get Your Files Here !/04 - 3. Incident Investigation/03 - Cloud audits and investigations.mp4 9.9 MB
  • mp4~Get Your Files Here !/02 - 1. Incident Response Programs/10 - Post-incident activities.mp4 9.4 MB
  • mp4~Get Your Files Here !/02 - 1. Incident Response Programs/04 - Incident identification.mp4 9.3 MB
  • mp4~Get Your Files Here !/07 - 6. Disaster Recovery/04 - Disaster recovery sites.mp4 9.3 MB
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/15 - Ediscovery and evidence production.mp4 8.2 MB
  • mp4~Get Your Files Here !/06 - 5. Business Continuity/02 - Business continuity controls.mp4 8.0 MB
  • mp4~Get Your Files Here !/04 - 3. Incident Investigation/02 - Security information and event management.mp4 7.9 MB
【影视】 [Coursera] Python for Cybersecurity Specialization - 5 course series
收录时间:2024-05-20 文档个数:290 文档大小:1.2 GB 最近下载:2025-05-15 人气:5313 磁力链接
  • mp4command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_03_alternative-protocol.mp4 61.8 MB
  • mp4credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_05_network-sniffing.mp4 42.0 MB
  • mp4pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_04_network-scanning.mp4 32.5 MB
  • mp4python-for-active-defense/02_python-for-active-defense-network/01_network/01_05_protocol-decoding.mp4 31.5 MB
  • mp4python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_07_behavioral-analytics.mp4 29.2 MB
  • mp4execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_03_registry-autorun.mp4 29.0 MB
  • mp4execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_05_hijacked-execution-flow.mp4 27.5 MB
  • mp4pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_06_dns-exploration.mp4 27.3 MB
  • mp4python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_05_system-activity-monitoring.mp4 26.6 MB
  • mp4python-for-active-defense/02_python-for-active-defense-network/01_network/01_03_pcap-collection.mp4 26.0 MB
  • mp4command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_03_encrypted-channel.mp4 25.8 MB
  • mp4execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_05_scheduled-execution.mp4 25.8 MB
  • mp4credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_03_user-account-discovery.mp4 25.4 MB
  • mp4execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_03_logon-scripts.mp4 24.6 MB
  • mp4command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_03_data-encryption.mp4 23.6 MB
  • mp4execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_05_alternate-data-streams.mp4 22.4 MB
  • mp4pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_03_default-account-discovery.mp4 21.7 MB
  • mp4pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_05_autorun-scripts.mp4 21.2 MB
  • mp4execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_03_impair-avs.mp4 20.8 MB
  • mp4credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_03_credentials-from-web-browsers.mp4 20.7 MB
【影视】 [FreeCoursesOnline.Me] Lynda - Risk Management for IT and Cybersecurity Managers
收录时间:2021-03-08 文档个数:22 文档大小:509.8 MB 最近下载:2025-05-15 人气:5237 磁力链接
  • mp402 What Is Risk_/002 Types of risk.mp4 77.3 MB
  • mp401 Introduction/001 Risk management for IT and security managers.mp4 71.2 MB
  • mp404 Calculating Risk/003 Quantitative risk measurement.mp4 45.5 MB
  • mp402 What Is Risk_/001 What is risk_.mp4 41.2 MB
  • mp404 Calculating Risk/004 Case study_ Equifax.mp4 33.7 MB
  • mp402 What Is Risk_/003 Types of threats.mp4 30.6 MB
  • mp404 Calculating Risk/002 Qualitative risk measurement.mp4 29.9 MB
  • mp403 What Can You Do with Risk_/007 Risk responses.mp4 25.1 MB
  • mp403 What Can You Do with Risk_/006 Risk controls.mp4 24.4 MB
  • mp403 What Can You Do with Risk_/002 Risk mitigation.mp4 23.5 MB
  • mp402 What Is Risk_/004 When risk management fails.mp4 21.4 MB
  • mp403 What Can You Do with Risk_/005 Risk acceptance.mp4 20.3 MB
  • mp404 Calculating Risk/001 Calculating risk.mp4 17.8 MB
  • mp403 What Can You Do with Risk_/004 Risk avoidance.mp4 15.3 MB
  • mp403 What Can You Do with Risk_/003 Risk transference.mp4 14.1 MB
  • mp405 Conclusion/001 Next steps.mp4 10.5 MB
  • mp403 What Can You Do with Risk_/001 What can you do with risk_.mp4 7.1 MB
  • zipEx_Files_Risk_Management_IT_Cybersecurity.zip 705.0 kB
  • url0. Websites you may like/0. (1Hack.Us) Premium Tutorials-Guides-Articles _ Community based Forum.url 377 Bytes
  • url0. Websites you may like/1. (FreeCoursesOnline.Me) Download Udacity, Masterclass, Lynda, PHLearn, Pluralsight Free.url 286 Bytes
【影视】 [Coursera] Advanced Python Scripting for Cybersecurity Specialization - 3 course series
收录时间:2024-05-24 文档个数:97 文档大小:947.7 MB 最近下载:2025-05-15 人气:5150 磁力链接
  • mp4defensive-python/01_defensive-python onehack.us/01_defensive-python/01_04_detecting-ssh-brute-force-with-scapy.mp4 49.7 MB
  • mp4defensive-python/01_defensive-python onehack.us/01_defensive-python/01_07_connection-hijacking-with-scapy.mp4 48.4 MB
  • mp4python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_02_generating-password-variations-with-python.mp4 46.5 MB
  • mp4python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_05_service-detection-with-python.mp4 45.6 MB
  • mp4defensive-python/01_defensive-python onehack.us/01_defensive-python/01_05_feature-selection-for-traffic-analysis.mp4 45.2 MB
  • mp4establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_03_searching-the-registry-with-python.mp4 45.2 MB
  • mp4python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_02_querying-shodan-with-python.mp4 44.0 MB
  • mp4establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_02_traffic-analysis-with-python.mp4 43.7 MB
  • mp4python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_04_network-scanning-with-scapy.mp4 38.8 MB
  • mp4defensive-python/01_defensive-python onehack.us/01_defensive-python/01_02_brute-force-detection-with-windows-events.mp4 38.8 MB
  • mp4defensive-python/01_defensive-python onehack.us/01_defensive-python/01_03_detecting-ftp-brute-force-with-scapy.mp4 35.1 MB
  • mp4establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_04_searching-the-system-with-python.mp4 34.9 MB
  • mp4establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_02_dumping-chrome-credentials-with-python.mp4 34.8 MB
  • mp4establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_06_analyzing-passwords-with-python.mp4 34.5 MB
  • mp4python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_03_dns-queries-with-python.mp4 30.9 MB
  • mp4defensive-python/01_defensive-python onehack.us/01_defensive-python/01_06_detecting-anomalous-network-traffic-with-scapy.mp4 28.8 MB
  • mp4establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_05_building-c2-packets-with-python.mp4 27.1 MB
  • mp4python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_04_automating-brute-force.mp4 25.9 MB
  • mp4establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_05_cracking-the-linux-passwords-with-python.mp4 24.4 MB
  • mp4establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_04_detecting-encodings-with-python.mp4 24.1 MB
【影视】 [FreeCoursesOnline.Me] PacktPub - Cybersecurity Attacks (Red Team Activity) [Video]
收录时间:2021-04-18 文档个数:41 文档大小:1.1 GB 最近下载:2025-05-15 人气:4978 磁力链接
  • mp41 - Building Our Lab/Getting Acquainted with Kali Linux Easy Way.mp4 121.1 MB
  • mp41 - Building Our Lab/Getting Acquainted with Terminal Commands.mp4 105.8 MB
  • mp44 - Breaking the Human in a Cyber Crime Attack/Playing on Human Emotions and Weaknesses to Get the Information.mp4 76.7 MB
  • mp42 - Attacking a Network/Taking Control Over Target Browser with BeEf.mp4 46.7 MB
  • mp42 - Attacking a Network/Creating Reverse Shell with Metasploit.mp4 42.0 MB
  • mp44 - Breaking the Human in a Cyber Crime Attack/Social Engineering Techniques.mp4 41.3 MB
  • mp43 - Website and Web-Application Attacks#/Proxy Attack with Burp Suite.mp4 38.5 MB
  • mp42 - Attacking a Network/Hidden Scanning Ports with Nmap.mp4 37.1 MB
  • mp41 - Building Our Lab/Installing Metasploitable 2 on Virtual Machine.mp4 34.5 MB
  • mp43 - Website and Web-Application Attacks#/Manual Testing for SQL Injection.mp4 34.3 MB
  • mp43 - Website and Web-Application Attacks#/Executing a Session Hijacking.mp4 32.0 MB
  • mp44 - Breaking the Human in a Cyber Crime Attack/How to Hack Without Getting in Touch with a Target.mp4 30.3 MB
  • mp43 - Website and Web-Application Attacks#/Exploring Target with Browser.mp4 28.8 MB
  • mp44 - Breaking the Human in a Cyber Crime Attack/Making a Phishing Email with SET.mp4 28.4 MB
  • mp41 - Building Our Lab/The Course Overview.mp4 27.1 MB
  • mp42 - Attacking a Network/Advance-Level Hacking - Scanning Hosts with Python Script.mp4 27.0 MB
  • mp42 - Attacking a Network/Intercepting Traffic with Wireshark.mp4 26.9 MB
  • mp43 - Website and Web-Application Attacks#/Infecting Website with Stored XSS.mp4 26.7 MB
  • mp44 - Breaking the Human in a Cyber Crime Attack/Looking for Secrets in Social Media with Online Tools.mp4 26.1 MB
  • mp43 - Website and Web-Application Attacks#/Scanning Web-Application with OWASP ZAP.mp4 25.5 MB
共10页 上一页 1 2 3 4 5 6 下一页