为您索检到186条磁力链接,耗时1毫秒。
- 【影视】 [ DevCourseWeb.com ] Udemy - The Cybersecurity Consultant Mindset
-
收录时间:2023-12-26
文档个数:32
文档大小:3.1 GB
最近下载:2025-05-14
人气:3009
磁力链接
~Get Your Files Here !/3. Risk Management and Assessment/2. Introduction to Risk Management.mp4 222.8 MB
~Get Your Files Here !/2. Introduction to Cybersecurity Consulting/3. Understanding the Role of a Cyber Consultant.mp4 212.8 MB
~Get Your Files Here !/7. Developing Soft Skills for Your Career/2. Communication and Interpersonal Skills.mp4 211.5 MB
~Get Your Files Here !/3. Risk Management and Assessment/3. Compliance Requirements.mp4 204.7 MB
~Get Your Files Here !/2. Introduction to Cybersecurity Consulting/2. Overview of Cybersecurity.mp4 198.8 MB
~Get Your Files Here !/2. Introduction to Cybersecurity Consulting/5. Preparing for a Career in Cyber Consulting.mp4 196.6 MB
~Get Your Files Here !/3. Risk Management and Assessment/5. Security Documentation Development.mp4 178.0 MB
~Get Your Files Here !/4. Tools and Technologies/3. Vulnerability Assessment and Pentesting.mp4 177.6 MB
~Get Your Files Here !/3. Risk Management and Assessment/4. Risk Assessment and Analysis.mp4 158.0 MB
~Get Your Files Here !/4. Tools and Technologies/6. Cybersecurity Frameworks Selection.mp4 146.1 MB
~Get Your Files Here !/5. Incident Response/3. Developing an Incident Response Plan.mp4 123.8 MB
~Get Your Files Here !/4. Tools and Technologies/2. Network Scanning and Monitoring.mp4 115.2 MB
~Get Your Files Here !/2. Introduction to Cybersecurity Consulting/4. Benefits of Cyber Consulting and Cons.mp4 102.7 MB
~Get Your Files Here !/4. Tools and Technologies/5. Security Information and Event Management Systems.mp4 99.4 MB
~Get Your Files Here !/6. Cybersecurity Auditing and Frameworks/4. Cybersecurity Frameworks - Implementation.mp4 81.3 MB
~Get Your Files Here !/4. Tools and Technologies/4. Intrusion Detection and Prevention Systems.mp4 73.6 MB
~Get Your Files Here !/6. Cybersecurity Auditing and Frameworks/3. Auditing Standards and Requirements.mp4 73.1 MB
~Get Your Files Here !/6. Cybersecurity Auditing and Frameworks/2. Overview of IT Auditing.mp4 72.9 MB
~Get Your Files Here !/7. Developing Soft Skills for Your Career/5. Practical Exercises and Resources.mp4 68.0 MB
~Get Your Files Here !/5. Incident Response/2. Defining a Security Incident.mp4 67.7 MB
猜你喜欢:
Cybersecurity
Consultant
Udemy
DevCourseWeb
com
Mindset
- 【影视】 [ TutSala.com ] Udemy - Cybersecurity For Beginners - Network Architecture
-
收录时间:2022-01-09
文档个数:124
文档大小:1.0 GB
最近下载:2025-05-15
人气:3002
磁力链接
~Get Your Files Here !/17. Lab Demonstration - Scanning Networks with NMAP Pt. 1/1. Lab Demonstration - Scanning Networks with NMAP Pt. 1.mp4 477.0 MB
~Get Your Files Here !/18. Lab Demonstration - Scanning Networks with NMAP Pt. 2/1. Lab Demonstration - Scanning Networks with NMAP Pt. 2.mp4 331.7 MB
~Get Your Files Here !/11. Denial-of-Service Attack (DoS) Attack/2. The 5 Principal Differences Between DoS & DDoS Attacks.mp4 14.1 MB
~Get Your Files Here !/11. Denial-of-Service Attack (DoS) Attack/6. Common DoS Attack Pt. 2.mp4 9.8 MB
~Get Your Files Here !/7. Network Devices/1. Common Network Devices.mp4 8.9 MB
~Get Your Files Here !/1. The OSI Model/1. The OSI Model.mp4 7.8 MB
~Get Your Files Here !/11. Denial-of-Service Attack (DoS) Attack/5. Common DoS Attack Pt. 1.mp4 6.9 MB
~Get Your Files Here !/14. DNS Attacks/1. DNS Attacks.mp4 6.4 MB
~Get Your Files Here !/7. Network Devices/2. More Common Network Devices.mp4 6.2 MB
~Get Your Files Here !/11. Denial-of-Service Attack (DoS) Attack/1. DoS Vs. DDoS.mp4 6.0 MB
~Get Your Files Here !/4. IPv4 Vs. IPv6/1. IPv4.mp4 5.7 MB
~Get Your Files Here !/1. The OSI Model/3. Data Link Layer.mp4 5.7 MB
~Get Your Files Here !/10. Intrusion Detection Systems (IDS) & Intrusion Prevention Systems (IPS)/2. Behavior Based IDS Vs. Knowledge Based IDS.mp4 5.5 MB
~Get Your Files Here !/15. What is Footprinting/3. Footprinting Helps To.mp4 5.4 MB
~Get Your Files Here !/15. What is Footprinting/4. Footprinting Methodology.mp4 5.4 MB
~Get Your Files Here !/11. Denial-of-Service Attack (DoS) Attack/7. Three-Way-Handshake Importance To Network Attacks (SYN Flood).mp4 5.2 MB
~Get Your Files Here !/9. Types of Firewalls/2. Types of Firewalls Pt. 2.mp4 5.1 MB
~Get Your Files Here !/1. The OSI Model/2. Physical Layer.mp4 4.8 MB
~Get Your Files Here !/9. Types of Firewalls/1. Types of Firewalls Pt. 1.mp4 4.6 MB
~Get Your Files Here !/1. The OSI Model/4. Network Layer.mp4 4.5 MB
猜你喜欢:
Network
Cybersecurity
Udemy
Beginners
TutSala
Architecture
com
- 【影视】 [ DevCourseWeb.com ] Udemy - Python for Computer Networks and cybersecurity
-
收录时间:2023-12-19
文档个数:18
文档大小:809.9 MB
最近下载:2025-05-13
人气:2991
磁力链接
~Get Your Files Here !/3. Network Scanning for Defenders/1. Network Scanning for Defenders.mp4 369.1 MB
~Get Your Files Here !/2. Fulfilling Pre-ATT&CK Objectives/1. Implementing a SYN Scan in scapy.mp4 278.3 MB
~Get Your Files Here !/4. Gaining Initial Access_part3/1. Gaining Initial Access.mp4 127.2 MB
~Get Your Files Here !/5. File Transfer and Plotting_E1/1. File Transfer and Plotting.mp4 21.8 MB
~Get Your Files Here !/6. File Transfer and Plotting_Exercise2/1. File Transfer and Plotting_E1.mp4 13.4 MB
~Get Your Files Here !/3. Network Scanning for Defenders/1.1 DNSExploration.py 1.6 kB
~Get Your Files Here !/4. Gaining Initial Access_part3/1.1 TestDefaultCredentials.py 1.5 kB
~Get Your Files Here !/2. Fulfilling Pre-ATT&CK Objectives/1.1 HoneyScan.py 1.2 kB
~Get Your Files Here !/3. Network Scanning for Defenders/1.2 HoneyResolver.py 1.1 kB
~Get Your Files Here !/5. File Transfer and Plotting_E1/1.2 Example 6.1.py 1.0 kB
~Get Your Files Here !/1. Введение/1. Introduction.html 908 Bytes
~Get Your Files Here !/2. Fulfilling Pre-ATT&CK Objectives/1.2 PortScan.py 789 Bytes
~Get Your Files Here !/Bonus Resources.txt 386 Bytes
~Get Your Files Here !/6. File Transfer and Plotting_Exercise2/1.2 download.py 262 Bytes
~Get Your Files Here !/6. File Transfer and Plotting_Exercise2/1.3 upload.py 256 Bytes
~Get Your Files Here !/5. File Transfer and Plotting_E1/1.1 desktop.ini 244 Bytes
~Get Your Files Here !/6. File Transfer and Plotting_Exercise2/1.1 desktop.ini 244 Bytes
Get Bonus Downloads Here.url 182 Bytes
猜你喜欢:
Python
Udemy
DevCourseWeb
cybersecurity
Computer
com
Networks
- 【影视】 Lynda - Foundations of Cybersecurity
-
收录时间:2017-02-19
文档个数:27
文档大小:300.9 MB
最近下载:2025-05-15
人气:2960
磁力链接
021 Managing user access and identity.mp4 20.7 MB
022 Implementing preventative security.mp4 18.8 MB
023 Monitoring and alerts.mp4 15.7 MB
018 Describing security requirements.mp4 14.9 MB
008 Dissecting the payment card industry and PCI DSS.mp4 14.6 MB
007 Implementing control frameworks.mp4 14.3 MB
025 Preparing for an incident.mp4 14.2 MB
019 Architecting security risk.mp4 13.5 MB
016 Understanding advanced persistent threats (APTs).mp4 13.5 MB
004 Dissecting cyber risk.mp4 13.1 MB
003 Understanding the NIST cybersecurity framework.mp4 12.6 MB
011 Dissecting security threats.mp4 11.6 MB
026 Responding to an incident.mp4 11.5 MB
005 Unpacking COBIT 5.mp4 10.3 MB
012 Exploring cybercrime as an industry.mp4 9.9 MB
014 Using callbacks to capture keystrokes.mp4 9.8 MB
015 Hiding malware with rootkits.mp4 9.8 MB
009 Exploring the Cyber Essentials framework.mp4 9.3 MB
013 Hiding malware through cloaking and alternate data streams.mp4 9.0 MB
020 Selecting security controls.mp4 8.5 MB
猜你喜欢:
Cybersecurity
Lynda
Foundations
- 【影视】 Pluralsight - Cybersecurity Threats: Ransomware
-
收录时间:2017-06-08
文档个数:37
文档大小:388.1 MB
最近下载:2025-05-16
人气:2825
磁力链接
3. Ransomware Entry Points/15. Embedded Hyperlinks, Websites_downloads, and Drive-by Infections.mp4 6.2 MB
3. Ransomware Entry Points/16. Why Common Exploit Kits Are Used.mp4 5.4 MB
3. Ransomware Entry Points/14. Phishing and Email Attachments.mp4 10.6 MB
3. Ransomware Entry Points/18. Summary.mp4 2.8 MB
3. Ransomware Entry Points/12. Overview.mp4 2.7 MB
3. Ransomware Entry Points/13. The 5 Classic Infection Vectors.mp4 3.1 MB
3. Ransomware Entry Points/17. Command and Callback (C&C) and Indicators of Compromise.mp4 7.0 MB
4. Incident Response - Detection and Containment/21. Detecting an Attack.mp4 7.3 MB
4. Incident Response - Detection and Containment/20. Indicators of Compromise.mp4 5.3 MB
4. Incident Response - Detection and Containment/23. Summary.mp4 1.7 MB
4. Incident Response - Detection and Containment/19. Overview.mp4 2.6 MB
4. Incident Response - Detection and Containment/22. Containing the Attack.mp4 9.0 MB
6. Countermeasures and Preparing Your Incident Response/35. Next Generation Anti-virus_Anti-malware.mp4 5.6 MB
6. Countermeasures and Preparing Your Incident Response/37. Summary.mp4 5.5 MB
6. Countermeasures and Preparing Your Incident Response/33. Defending a Ransomware Attack.mp4 11.4 MB
6. Countermeasures and Preparing Your Incident Response/34. Protecting a Windows Network.mp4 8.0 MB
6. Countermeasures and Preparing Your Incident Response/32. Overview.mp4 5.5 MB
6. Countermeasures and Preparing Your Incident Response/36. Lessons Learned and Your Incident Response Plan.mp4 10.9 MB
2. What Is Ransomware/06. How Big Is the Problem.mp4 15.1 MB
2. What Is Ransomware/02. Overview.mp4 4.1 MB
猜你喜欢:
Cybersecurity
Pluralsight
Threats
Ransomware
- 【影视】 [ WebToolTip.com ] Udemy - ISACA Cybersecurity Fundamentals - Complete Training Course
-
收录时间:2025-03-07
文档个数:45
文档大小:858.9 MB
最近下载:2025-05-16
人气:2781
磁力链接
~Get Your Files Here !/2 - Types of Security/4 -Cybersecurity.mp4 38.9 MB
~Get Your Files Here !/3 - Governance, Risk Management and Compliance/5 -Risk Analysis Approaches.mp4 36.9 MB
~Get Your Files Here !/4 - Common Types of Malware/6 -Trojan Horses.mp4 34.2 MB
~Get Your Files Here !/4 - Common Types of Malware/5 -Ransomware.mp4 34.1 MB
~Get Your Files Here !/4 - Common Types of Malware/3 -Worms.mp4 33.9 MB
~Get Your Files Here !/5 - Security Controls/2 -Control Functions and Types.mp4 32.8 MB
~Get Your Files Here !/4 - Common Types of Malware/2 -Viruses.mp4 31.7 MB
~Get Your Files Here !/2 - Types of Security/5 -Physical Security.mp4 31.6 MB
~Get Your Files Here !/3 - Governance, Risk Management and Compliance/4 -Risk Governance.mp4 29.0 MB
~Get Your Files Here !/4 - Common Types of Malware/8 -Adware.mp4 28.9 MB
~Get Your Files Here !/6 - OWASP Top 10/11 -Server-Side Request Forgery.mp4 28.7 MB
~Get Your Files Here !/6 - OWASP Top 10/9 -Software and Data Integrity Failures.mp4 28.1 MB
~Get Your Files Here !/6 - OWASP Top 10/10 -Security Logging and Monitoring Failures.mp4 28.0 MB
~Get Your Files Here !/6 - OWASP Top 10/3 -Cryptographic Failures.mp4 27.0 MB
~Get Your Files Here !/6 - OWASP Top 10/7 -Vulnerable and Outdated Components.mp4 27.0 MB
~Get Your Files Here !/1 - Introduction/3 -Integrity.mp4 26.2 MB
~Get Your Files Here !/4 - Common Types of Malware/7 -Rootkit.mp4 25.7 MB
~Get Your Files Here !/2 - Types of Security/3 -Information Security.mp4 23.5 MB
~Get Your Files Here !/1 - Introduction/4 -Availability.mp4 22.1 MB
~Get Your Files Here !/4 - Common Types of Malware/4 -Keyloggers.mp4 21.6 MB
猜你喜欢:
Training
WebToolTip
Course
Cybersecurity
com
Udemy
Fundamentals
ISACA
Complete
- 【影视】 ZeroToMastery - Complete Cybersecurity Bootcamp
-
收录时间:2024-01-09
文档个数:97
文档大小:3.6 GB
最近下载:2025-05-15
人气:2777
磁力链接
8-Network Security/052-Network Security With Nmap.mp4 169.9 MB
5-Security Bugs & Vulnerabilities/020-Buffer Overflow Demonstration.mp4 136.7 MB
12-Appendix - Ethical Hacking/087-Msfconsole Basic Commands.mp4 97.5 MB
8-Network Security/059-Wireless Attack Demonstration.mp4 93.4 MB
7-End-Point Protection/034-Password Security and Password Managers.mp4 84.2 MB
12-Appendix - Ethical Hacking/093-Meterpreter Basic Commands Part 1.mp4 78.5 MB
7-End-Point Protection/038-Process Explorer.mp4 75.8 MB
1-Introduction/001-Cybersecurity Bootcamp - Zero to Mastery.mp4 72.4 MB
8-Network Security/057-Secure Network Architecture.mp4 66.8 MB
12-Appendix - Ethical Hacking/094-Meterpreter Basic Commands Part 2.mp4 65.7 MB
7-End-Point Protection/033-Bitdefender, Kaspersky, McAfee, Malwarebytes.mp4 63.9 MB
4-Understanding Hackers - The Biggest Threat/012-Most Common Attacks Demonstration.mp4 63.5 MB
8-Network Security/060-Network Monitoring With TCPDump.mp4 62.7 MB
8-Network Security/058-Wireless Security.mp4 59.6 MB
5-Security Bugs & Vulnerabilities/017-Unpatched Machine Exploitation Demonstration.mp4 59.1 MB
12-Appendix - Ethical Hacking/080-Whatweb Stealthy Scan.mp4 58.1 MB
12-Appendix - Ethical Hacking/091-Advance Msfvenom Usage.mp4 51.4 MB
7-End-Point Protection/043-Iptables.mp4 50.9 MB
7-End-Point Protection/028-Brave Browser Security and Privacy.mp4 50.6 MB
12-Appendix - Ethical Hacking/089-Software Vulnerability - Samba Exploitation.mp4 49.5 MB
猜你喜欢:
Cybersecurity
ZeroToMastery
Complete
Bootcamp
- 【影视】 [ DevCourseWeb.com ] Udemy - Selection and Implementation of Cybersecurity Risks Controls
-
收录时间:2024-01-05
文档个数:36
文档大小:2.0 GB
最近下载:2025-05-15
人气:2662
磁力链接
~Get Your Files Here !/2. SECTION-2/8. 19- The role of governance in the effective selection and implementation of cybe.mp4 142.9 MB
~Get Your Files Here !/2. SECTION-2/14. 23-Selecting and implementing cybersecurity controls based on NIST CSF PT2.mp4 122.4 MB
~Get Your Files Here !/2. SECTION-2/16. 25- Measuring the effectiveness of implemented controls.mp4 117.4 MB
~Get Your Files Here !/2. SECTION-2/17. Putting it all together-The Selection and Implementation of Cyber Risks controls.mp4 115.7 MB
~Get Your Files Here !/1. Introduction/10. 9-Key considerations for the identification- selection & implementation of contr.mp4 101.8 MB
~Get Your Files Here !/1. Introduction/7. 6-Approach to Control Selection_ pt2.mp4 94.1 MB
~Get Your Files Here !/2. SECTION-2/9. 20-Why not implement frameworks that already have recommended controls.mp4 90.3 MB
~Get Your Files Here !/2. SECTION-2/15. 24-Implementation Plan for selected controls.mp4 87.1 MB
~Get Your Files Here !/2. SECTION-2/11. 21-Challenges, & considerations associated with implementing frameworks-pt2.mp4 82.9 MB
~Get Your Files Here !/1. Introduction/11. 10-Risk Assessment-BIA, Control Selection, Cost Benefit Analysis.mp4 81.1 MB
~Get Your Files Here !/1. Introduction/9. 8-Introduction to security controls.mp4 77.4 MB
~Get Your Files Here !/2. SECTION-2/7. 18-Documenting Cybersecurity Risk Assessment Report-Pt2.mp4 75.5 MB
~Get Your Files Here !/2. SECTION-2/5. 17-Determine likelihood, Impact, Calculate risk.mp4 72.4 MB
~Get Your Files Here !/2. SECTION-2/13. 23-Selecting and implementing cybersecurity controls based on NIST CSF PT1.mp4 62.9 MB
~Get Your Files Here !/1. Introduction/12. 11-Cost Benefit Analysis associated with controls selection.mp4 58.3 MB
~Get Your Files Here !/2. SECTION-2/3. 15-Steps involved in assessing the identified cyber risks in web server.mp4 55.0 MB
~Get Your Files Here !/2. SECTION-2/1. 14-High-level process of selecting controls to protect ecommerce web server-Pt1.mp4 54.5 MB
~Get Your Files Here !/1. Introduction/14. 13-Regulatory Compliance, Incident Response Planning.mp4 53.9 MB
~Get Your Files Here !/1. Introduction/13. 12- Technology integration, operational impact, continuous monitoring, employee.mp4 52.8 MB
~Get Your Files Here !/2. SECTION-2/6. 18- Documenting Cybersecurity Risk Assessment Report-Pt1.mp4 50.4 MB
猜你喜欢:
Selection
Implementation
Controls
Udemy
DevCourseWeb
Cybersecurity
Risks
com
- 【影视】 [ DevCourseWeb.com ] Udemy - ChatGPT, ML, and AI for Cybersecurity, SOCs and Business
-
收录时间:2024-04-07
文档个数:14
文档大小:3.7 GB
最近下载:2025-05-16
人气:2616
磁力链接
~Get Your Files Here !/3. AI Tools for Security.mp4 683.8 MB
~Get Your Files Here !/4. Enhancing Search Capabilities with GPT4all Plugins.mp4 576.0 MB
~Get Your Files Here !/2. Fundamentals of ChatGPT and GPT4all.mp4 553.4 MB
~Get Your Files Here !/1. Introduction to Machine Learning and AI for Security.mp4 520.6 MB
~Get Your Files Here !/8. Future Trends and Challenges in AI Security.mp4 452.9 MB
~Get Your Files Here !/6. Evaluating AI Security.mp4 379.7 MB
~Get Your Files Here !/5. Securing AI Models and Data.mp4 280.8 MB
~Get Your Files Here !/7. Case Studies of Real-World AI Applications.mp4 279.0 MB
~Get Your Files Here !/Bonus Resources.txt 386 Bytes
Get Bonus Downloads Here.url 182 Bytes
~Get Your Files Here !/9. Final Exam.html 146 Bytes
~Get Your Files Here !/4.2 Github Plugins (primarily for ChatGPT and Python implementations thereof)..html 124 Bytes
~Get Your Files Here !/4.1 ChatGPT Plugins.html 100 Bytes
~Get Your Files Here !/4.3 GPT4All Website and Downloads.html 90 Bytes
猜你喜欢:
Business
AI
ML
Udemy
DevCourseWeb
Cybersecurity
SOCs
ChatGPT
com
- 【影视】 Cybersecurity and Artificial Intelligence
-
收录时间:2024-09-08
文档个数:10
文档大小:99.9 MB
最近下载:2025-05-15
人气:2532
磁力链接
01. Cybersecurity and Artificial Intelligence/01. Cybersecurity and AI Overview.mp4 24.4 MB
01. Cybersecurity and Artificial Intelligence/02. Demo- Importance of Understanding AI in Cybersecurity.mp4 23.9 MB
01. Cybersecurity and Artificial Intelligence/03. Phishing and BEC Real-world Examples.mp4 10.8 MB
01. Cybersecurity and Artificial Intelligence/08. Demo- Deepfake.mp4 8.0 MB
cybersecurity-artificial-intelligence.zip 7.4 MB
01. Cybersecurity and Artificial Intelligence/04. Voicemail Scams - Examples and How to Avoid.mp4 7.3 MB
01. Cybersecurity and Artificial Intelligence/05. Adhering to Company Policies and Guidelines.mp4 5.8 MB
01. Cybersecurity and Artificial Intelligence/06. AI Hallucinations.mp4 5.8 MB
01. Cybersecurity and Artificial Intelligence/09. Mitigating the AI Threats.mp4 3.3 MB
01. Cybersecurity and Artificial Intelligence/07. Criminal Usage of AI.mp4 3.3 MB
猜你喜欢:
Cybersecurity
Intelligence
Artificial
- 【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity Essentials - Stay Safe and Secure Online
-
收录时间:2024-02-04
文档个数:39
文档大小:1.2 GB
最近下载:2025-05-14
人气:2451
磁力链接
~Get Your Files Here !/6. Device Security/1. Introduction to Device Security.mp4 79.4 MB
~Get Your Files Here !/2. Password Security/2. What Makes a Good Password.mp4 70.5 MB
~Get Your Files Here !/6. Device Security/3. Mobile Security Best Practices.mp4 69.8 MB
~Get Your Files Here !/4. Phishing/1. Introduction to Phishing.mp4 63.3 MB
~Get Your Files Here !/5. Staying Safe on the Web/3. Identifying Suspicious Downloads.mp4 59.6 MB
~Get Your Files Here !/6. Device Security/2. Choosing and Using an Antivirus.mp4 58.4 MB
~Get Your Files Here !/2. Password Security/1. Introduction to Passwords.mp4 57.7 MB
~Get Your Files Here !/5. Staying Safe on the Web/2. Inspecting URLs.mp4 57.6 MB
~Get Your Files Here !/2. Password Security/5. Using a Password Manager.mp4 56.2 MB
~Get Your Files Here !/7. Virtual Private Networks/4. Choosing a VPN Solution.mp4 55.5 MB
~Get Your Files Here !/4. Phishing/4. Phishing Without Email.mp4 54.3 MB
~Get Your Files Here !/4. Phishing/2. The Psychology of Phishing.mp4 52.3 MB
~Get Your Files Here !/5. Staying Safe on the Web/4. Managing Trackers and Cookies.mp4 48.2 MB
~Get Your Files Here !/3. Multi-Factor Authentication (MFA)/3. Choosing a Strong Authentication Factor.mp4 45.8 MB
~Get Your Files Here !/7. Virtual Private Networks/2. Why Use a VPN.mp4 45.5 MB
~Get Your Files Here !/3. Multi-Factor Authentication (MFA)/5. Identifying MFA Phishing Attacks.mp4 41.4 MB
~Get Your Files Here !/7. Virtual Private Networks/3. How VPNs Work.mp4 38.0 MB
~Get Your Files Here !/4. Phishing/3. Examining a Phishing Email.mp4 35.7 MB
~Get Your Files Here !/2. Password Security/4. Checking for Compromised Accounts.mp4 33.5 MB
~Get Your Files Here !/4. Phishing/5. Phishing Using the Cloud.mp4 31.6 MB
猜你喜欢:
Essentials
Cybersecurity
Safe
Stay
DevCourseWeb
Online
Udemy
com
Secure
- 【影视】 [ DevCourseWeb.com ] Udemy - Modern Cybersecurity Fundamentals
-
收录时间:2023-12-17
文档个数:27
文档大小:2.3 GB
最近下载:2025-05-16
人气:2342
磁力链接
~Get Your Files Here !/2. History of Cybersecurity/1. History of Cybersecurity.mp4 478.1 MB
~Get Your Files Here !/3. Cybersecurity Risk Management/1. Cybersecurity Risk Management.mp4 265.3 MB
~Get Your Files Here !/13. The Future of Cybersecurity/1. The Future of Cybersecurity.mp4 186.8 MB
~Get Your Files Here !/7. Understanding Networks Part 3/1. Understanding Networks Part 3.mp4 176.6 MB
~Get Your Files Here !/11. Ransomware/1. Ransomware.mp4 159.6 MB
~Get Your Files Here !/8. Understanding Networks Part 4/1. Understanding Networks Part 4.mp4 158.3 MB
~Get Your Files Here !/12. Internet of Things (IoT)/1. Internet of Things (IoT).mp4 154.5 MB
~Get Your Files Here !/9. Domain Name System (DNS)/1. Domain Name System (DNS).mp4 145.9 MB
~Get Your Files Here !/5. Understanding Networks Part 1/1. Understanding Networks Part 1.mp4 137.5 MB
~Get Your Files Here !/4. Intrusion Detection/1. Intrusion Detection.mp4 136.3 MB
~Get Your Files Here !/6. Understanding Networks Part 2/1. Understanding Networks Part 2.mp4 126.6 MB
~Get Your Files Here !/10. Dynamic Host Configuration Protocol (DHCP)/1. Dynamic Host Configuration Protocol (DHCP).mp4 112.7 MB
~Get Your Files Here !/1. Introduction/1. Introduction.mp4 28.1 MB
~Get Your Files Here !/5. Understanding Networks Part 1/1.1 Understanding-Networks.pdf 3.5 MB
~Get Your Files Here !/6. Understanding Networks Part 2/1.1 Understanding-Networks.pdf 3.5 MB
~Get Your Files Here !/7. Understanding Networks Part 3/1.1 Understanding-Networks.pdf 3.5 MB
~Get Your Files Here !/8. Understanding Networks Part 4/1.1 Understanding-Networks.pdf 3.5 MB
~Get Your Files Here !/3. Cybersecurity Risk Management/1.1 Cybersecurity-Risk-Management.pdf 1.8 MB
~Get Your Files Here !/12. Internet of Things (IoT)/1.1 IoT.pdf 1.8 MB
~Get Your Files Here !/2. History of Cybersecurity/1.1 HISTORY-OF-CYBERSECURITY.pdf 1.7 MB
猜你喜欢:
Cybersecurity
Modern
Udemy
DevCourseWeb
Fundamentals
com
- 【影视】 [CourseClub.Me] O`REILLY - The Complete Cybersecurity Bootcamp, 2nd Edition
-
收录时间:2023-12-23
文档个数:347
文档大小:6.7 GB
最近下载:2025-05-15
人气:2332
磁力链接
Lesson 29 Hacking Mobile Platforms/003. 29.2 Hacking iOS.mp4 86.6 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/014. 17.13 Performing SMTP and DNS Enumeration.mp4 80.0 MB
Lesson 21 Fundamentals of Wireless Hacking/004. 21.3 Exploring Wireless Threats.mp4 79.0 MB
Lesson 33 Fundamentals of IoT Security/003. 33.2 Understanding IoT Attacks.mp4 76.8 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/015. 17.14 Conducting Additional Enumeration Techniques.mp4 75.8 MB
Lesson 33 Fundamentals of IoT Security/002. 33.1 Introducing IoT Concepts.mp4 74.4 MB
Lesson 29 Hacking Mobile Platforms/002. 29.1 Understanding Mobile Platform Attack Vectors.mp4 73.4 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/011. 17.1 Performing SNMP Enumeration.mp4 71.8 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/004. 17.3 Understanding Host Discovery.mp4 69.7 MB
Lesson 5 Fundamentals of Incident Response/007. 5.6 Analyzing Computer Incident Response Teams (CSIRTs).mp4 68.5 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/007. 17.6 Scanning Beyond IDS and Firewall.mp4 68.2 MB
Lesson 27 Hacking User Credentials/006. 27.5 Cracking Passwords with John the Ripper.mp4 66.1 MB
Lesson 7 Intrusion Event Categories/009. 7.8 Understanding the MITRE ATT&CK Framework.mp4 65.8 MB
Lesson 29 Hacking Mobile Platforms/004. 29.3 Hacking Android OS.mp4 63.8 MB
Lesson 20 SQL Injection/005. 20.4 Exploring SQL Injection Tools.mp4 63.3 MB
Lesson 21 Fundamentals of Wireless Hacking/003. 21.2 Understanding Wireless Encryption.mp4 62.7 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/013. 17.12 Performing NTP and NFS Enumeration.mp4 61.8 MB
Lesson 16 Information Gathering and Passive Reconnaissance/011. 16.10 Performing Footprinting through Social Engineering.mp4 59.1 MB
Lesson 8 Digital Forensics Fundamentals/004. 8.3 Understanding Evidence Collection.mp4 57.2 MB
Lesson 21 Fundamentals of Wireless Hacking/007. 21.6 Hacking Bluetooth.mp4 52.3 MB
猜你喜欢:
Me
Complete
Cybersecurity
Bootcamp
Edition
REILLY
2nd
CourseClub
- 【影视】 Cybersecurity Careers and Certifications
-
收录时间:2023-12-20
文档个数:150
文档大小:414.1 MB
最近下载:2025-05-14
人气:2289
磁力链接
[TutsNode.net] - Cybersecurity Careers and Certifications/ 05 - 4. Cybersecurity Careers/17 - Cybersecurity careers overview.mp4.mp4 51.0 MB
[TutsNode.net] - Cybersecurity Careers and Certifications/ 06 - 5. Cybersecurity Certifications/27 - Cybersecurity certifications overview.mp4.mp4 23.7 MB
[TutsNode.net] - Cybersecurity Careers and Certifications/ 01 - Introduction/01 - Cybersecurity careers and certifications.mp4.mp4 21.7 MB
[TutsNode.net] - Cybersecurity Careers and Certifications/ 02 - 1. Understanding the Cybersecurity Career Field/05 - An overview of cybersecurity key concepts.mp4.mp4 15.4 MB
[TutsNode.net] - Cybersecurity Careers and Certifications/ 02 - 1. Understanding the Cybersecurity Career Field/04 - A brief history of cybersecurity.mp4.mp4 9.8 MB
[TutsNode.net] - Cybersecurity Careers and Certifications/ 02 - 1. Understanding the Cybersecurity Career Field/06 - Enabling technologies for cybersecurity.mp4.mp4 8.8 MB
[TutsNode.net] - Cybersecurity Careers and Certifications/ 07 - 6. Your Cybersecurity Career Path/39 - How to get cybersecurity experience.mp4.mp4 8.7 MB
[TutsNode.net] - Cybersecurity Careers and Certifications/ 07 - 6. Your Cybersecurity Career Path/38 - Prerequisites.mp4.mp4 8.5 MB
[TutsNode.net] - Cybersecurity Careers and Certifications/ 05 - 4. Cybersecurity Careers/19 - Cybersecurity career: Analyst.mp4.mp4 8.5 MB
[TutsNode.net] - Cybersecurity Careers and Certifications/ 06 - 5. Cybersecurity Certifications/37 - Choose a cybersecurity certification.mp4.mp4 8.3 MB
[TutsNode.net] - Cybersecurity Careers and Certifications/ 08 - 7. Cybersecurity Career Advice/44 - Begin with the end in mind.mp4.mp4 8.2 MB
[TutsNode.net] - Cybersecurity Careers and Certifications/ 04 - 3. Cybersecurity Success Traits/14 - Analytical and technology savvy.mp4.mp4 8.1 MB
[TutsNode.net] - Cybersecurity Careers and Certifications/ 05 - 4. Cybersecurity Careers/26 - Cybersecurity career: Director.mp4.mp4 8.0 MB
[TutsNode.net] - Cybersecurity Careers and Certifications/ 07 - 6. Your Cybersecurity Career Path/40 - Getting started: Get certified.mp4.mp4 7.9 MB
[TutsNode.net] - Cybersecurity Careers and Certifications/ 05 - 4. Cybersecurity Careers/22 - Cybersecurity career: Engineer.mp4.mp4 7.8 MB
[TutsNode.net] - Cybersecurity Careers and Certifications/ 01 - Introduction/03 - Why start a career in cybersecurity?.mp4.mp4 7.8 MB
[TutsNode.net] - Cybersecurity Careers and Certifications/ 03 - 2. Cybersecurity Marketplace/13 - Retail (PCI DSS).mp4.mp4 7.7 MB
[TutsNode.net] - Cybersecurity Careers and Certifications/ 02 - 1. Understanding the Cybersecurity Career Field/08 - Cybersecurity career resources.mp4.mp4 7.5 MB
[TutsNode.net] - Cybersecurity Careers and Certifications/ 03 - 2. Cybersecurity Marketplace/11 - Healthcare (HIPAA).mp4.mp4 7.5 MB
[TutsNode.net] - Cybersecurity Careers and Certifications/ 05 - 4. Cybersecurity Careers/20 - Cybersecurity career: Auditor.mp4.mp4 7.4 MB
猜你喜欢:
Cybersecurity
Certifications
Careers
- 【影视】 [ DevCourseWeb.com ] Cfe 101 - Cybersecurity For Everyone
-
收录时间:2023-12-29
文档个数:31
文档大小:1.5 GB
最近下载:2025-05-14
人气:2244
磁力链接
~Get Your Files Here !/3 - Password Email Security/6 - Password Security.mp4 149.2 MB
~Get Your Files Here !/5 - Mobile Device Remote Working Security/12 - Keeping Your Mobile Safe.mp4 132.7 MB
~Get Your Files Here !/1 - Introduction Threats to Information Security/3 - Everyday Information Security Threats.mp4 112.7 MB
~Get Your Files Here !/7 - Network Security/17 - Keep Your Network Safe.mp4 92.3 MB
~Get Your Files Here !/1 - Introduction Threats to Information Security/1 - Cybersecurity for Everyone.mp4 90.0 MB
~Get Your Files Here !/9 - Incident Response/19 - Incident Response.mp4 86.4 MB
~Get Your Files Here !/5 - Mobile Device Remote Working Security/13 - Keeping Your Work Safe While Working Remotely.mp4 78.6 MB
~Get Your Files Here !/6 - Physical Security/16 - When Safety Fails in the Real World.mp4 77.3 MB
~Get Your Files Here !/3 - Password Email Security/7 - Securing Your Email Communications.mp4 74.6 MB
~Get Your Files Here !/2 - Malware Security Policies/4 - Understanding Malware.mp4 70.1 MB
~Get Your Files Here !/8 - Generative AI/18 - Generative AI.mp4 70.1 MB
~Get Your Files Here !/4 - Social Engineering Phishing/11 - Spotting Dodging Phishing Scams.mp4 64.9 MB
~Get Your Files Here !/2 - Malware Security Policies/5 - Why Security Policies Procedures Matter.mp4 62.2 MB
~Get Your Files Here !/6 - Physical Security/15 - Staying Safe in the Real World.mp4 59.6 MB
~Get Your Files Here !/4 - Social Engineering Phishing/10 - Understanding Combatting Phishing Attacks.mp4 55.8 MB
~Get Your Files Here !/4 - Social Engineering Phishing/8 - Guarding Against Social Engineering.mp4 53.9 MB
~Get Your Files Here !/4 - Social Engineering Phishing/9 - Staying Ahead of Social Engineering Scams.mp4 40.6 MB
~Get Your Files Here !/10 - Conclusion/20 - Course Recap Next Steps.mp4 30.6 MB
~Get Your Files Here !/5 - Mobile Device Remote Working Security/14 - Attacks on Remote Workers.mp4 29.5 MB
~Get Your Files Here !/1 - Introduction Threats to Information Security/2 - Making the Most of This Course.mp4 21.3 MB
猜你喜欢:
Everyone
Cybersecurity
Cfe
DevCourseWeb
101
com
- 【影视】 [ FreeCourseWeb.com ] Udemy - Master Cybersecurity,Ethical Hacking and Penetrating Testing
-
收录时间:2022-03-15
文档个数:50
文档大小:1.6 GB
最近下载:2025-05-16
人气:2202
磁力链接
~Get Your Files Here !/04 Exposing Hackers - Know Your Enemy/002 Why You Need Security _.mp4 189.8 MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/011 Setting up Labs.mp4 169.5 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/003 What is Privacy, Anonymity and Pseudonymity _.mp4 158.8 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/006 Threat Modelling And Risk Assessment.mp4 158.3 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/008 Confidentiality, Integrity and Availability - (Security Attributes).mp4 141.8 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/004 Security, Vulnerabilities, Threats and Adversaries.mp4 117.8 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/005 Asset Selection.mp4 94.5 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/002 Protect What You Value.mp4 93.7 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/010 Zero Trust Model.mp4 85.7 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/007 Security,Anonymity and Privacy.mp4 59.8 MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/001 What is Cybersecurity _.mp4 34.8 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/009 Defence in Depth.mp4 34.2 MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/008 Who Conduct it _.mp4 26.4 MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/002 What is Ethical Hacking _.mp4 25.8 MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/005 Purpose of Studying Ethical Hacking and Penetrating Testing.mp4 24.3 MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/010 Closure.mp4 23.6 MB
~Get Your Files Here !/04 Exposing Hackers - Know Your Enemy/001 Goals and Learning Objectives - Know Your Enemy.mp4 21.8 MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/009 Who should You Choose _.mp4 20.6 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/001 Goals and Learning Objectives.mp4 19.7 MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/006 Scope For Ethical Hackers and Penetrating Testers.mp4 18.5 MB
猜你喜欢:
Ethical
Penetrating
Cybersecurity
Testing
Udemy
Master
FreeCourseWeb
Hacking
com
- 【影视】 [ DevCourseWeb.com ] Udemy - Ccsa - Certified Cybersecurity Analyst
-
收录时间:2023-12-17
文档个数:18
文档大小:1.1 GB
最近下载:2025-05-15
人气:2189
磁力链接
~Get Your Files Here !/2 - Blue Team Principles/2 - Blue Team Principles.mp4 196.8 MB
~Get Your Files Here !/3 - Digital Forensics/3 - Digital Forensics.mp4 172.5 MB
~Get Your Files Here !/4 - Malware Analysis/4 - Malware Analysis.mp4 154.1 MB
~Get Your Files Here !/7 - Leveraging SIEM for Advanced Analytics/7 - Leveraging SIEM for Advanced Analytics.mp4 134.1 MB
~Get Your Files Here !/5 - Traffic Analysis/5 - Traffic Analysis.mp4 131.1 MB
~Get Your Files Here !/8 - Defeating the Red Team with Purple Team Tactics/8 - Defeating the Red Team with Purple Team Tactics.mp4 129.3 MB
~Get Your Files Here !/6 - Assessing the Current State of Defense within the Organization/6 - Assessing the Current State of Defense within the Organization.mp4 123.7 MB
~Get Your Files Here !/1 - Introduction/1 - Introduction.mp4 87.0 MB
~Get Your Files Here !/2 - Blue Team Principles/2 - Blue Team Principles English.srt 39.2 kB
~Get Your Files Here !/3 - Digital Forensics/3 - Digital Forensics English.srt 37.2 kB
~Get Your Files Here !/4 - Malware Analysis/4 - Malware Analysis English.srt 32.9 kB
~Get Your Files Here !/5 - Traffic Analysis/5 - Traffic Analysis English.srt 26.1 kB
~Get Your Files Here !/7 - Leveraging SIEM for Advanced Analytics/7 - Leveraging SIEM for Advanced Analytics English.srt 26.0 kB
~Get Your Files Here !/1 - Introduction/1 - Introduction English.srt 22.7 kB
~Get Your Files Here !/6 - Assessing the Current State of Defense within the Organization/6 - Assessing the Current State of Defense within the Organization English.srt 18.8 kB
~Get Your Files Here !/8 - Defeating the Red Team with Purple Team Tactics/8 - Defeating the Red Team with Purple Team Tactics English.srt 18.8 kB
~Get Your Files Here !/Bonus Resources.txt 386 Bytes
Get Bonus Downloads Here.url 182 Bytes
猜你喜欢:
Ccsa
Cybersecurity
Udemy
DevCourseWeb
com
Analyst
Certified
- 【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity Threat Hunting Professional
-
收录时间:2022-03-20
文档个数:36
文档大小:1.0 GB
最近下载:2025-05-15
人气:2155
磁力链接
~Get Your Files Here !/2. Time to hunt/2. Practical Threat hunting Demo.mp4 121.9 MB
~Get Your Files Here !/2. Time to hunt/1. Case Base Threat Hunting.mp4 93.6 MB
~Get Your Files Here !/2. Time to hunt/3. Indicators of threat attacksIoC.mp4 86.1 MB
~Get Your Files Here !/1. Introduction/11. 7 Effective Threat Hunting Tips.mp4 81.5 MB
~Get Your Files Here !/1. Introduction/10. Hypothesis Testing & Sources of Hypothesis.mp4 78.6 MB
~Get Your Files Here !/4. Course Resources/1. Course Resources.mp4 72.6 MB
~Get Your Files Here !/3. Course Conclusion/1. Course Review.mp4 72.6 MB
~Get Your Files Here !/1. Introduction/8. What is Required for Successful Threat Hunting.mp4 71.2 MB
~Get Your Files Here !/1. Introduction/6. Terms associated with Threat Hunting.mp4 70.5 MB
~Get Your Files Here !/1. Introduction/4. Why threat hunt and attributes of an effective threat hunter.mp4 56.2 MB
~Get Your Files Here !/1. Introduction/9. Threat Hunting Approaches.mp4 55.0 MB
~Get Your Files Here !/1. Introduction/5. Threat Hunting Skillset Requirements.mp4 40.0 MB
~Get Your Files Here !/1. Introduction/7. Threat Hunting Loop.mp4 38.6 MB
~Get Your Files Here !/1. Introduction/2. What is Threat Hunting & Its Primary objective.mp4 35.9 MB
~Get Your Files Here !/1. Introduction/1. Introduction.mp4 29.5 MB
~Get Your Files Here !/1. Introduction/3. What is Threat Hunting & Its Primary objective..mp4 23.3 MB
~Get Your Files Here !/4. Course Resources/1.1 Network Threat Hunting with Tim Crothers.mp4 10.6 MB
~Get Your Files Here !/4. Course Resources/1.2 Resources Links for Threat Hunting Course.pdf 435.7 kB
~Get Your Files Here !/2. Time to hunt/2. Practical Threat hunting Demo.srt 11.9 kB
~Get Your Files Here !/2. Time to hunt/3. Indicators of threat attacksIoC.srt 8.3 kB
猜你喜欢:
Hunting
Cybersecurity
Udemy
DevCourseWeb
Threat
Professional
com
- 【影视】 Google Cybersecurity Professional Certificate
-
收录时间:2023-12-22
文档个数:1670
文档大小:4.3 GB
最近下载:2025-05-12
人气:2063
磁力链接
[TutsNode.net] - Google Cybersecurity Professional Certificate/foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/01_get-started-with-the-certificate-program/01_welcome-to-the-google-cybersecurity-certificate.mp4 49.6 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/01_flaws-in-the-system/04_common-vulnerabilities-and-exposures.mp4 29.2 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/foundations-of-cybersecurity/02_the-evolution-of-cybersecurity/01_the-history-of-cybersecurity/03_attacks-in-the-digital-age.mp4 26.8 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/02_protect-organizational-assets/03_authentication-authorization-and-accounting/03_the-mechanisms-of-authorization.mp4 26.4 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/04_threats-to-asset-security/02_malware/01_malicious-software.mp4 25.7 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/manage-security-risks/04_use-playbooks-to-respond-to-incidents/01_phases-of-incident-response-playbooks/02_phases-of-an-incident-response-playbook.mp4 25.5 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/04_threats-to-asset-security/01_social-engineering/04_phishing-for-information.mp4 25.2 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/04_threats-to-asset-security/02_malware/03_the-rise-of-cryptojacking.mp4 24.8 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/foundations-of-cybersecurity/03_protect-against-threats-risks-and-vulnerabilities/01_frameworks-and-controls/02_introduction-to-security-frameworks-and-controls.mp4 24.5 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/02_introduction-to-cybersecurity/01_introduction-to-cybersecurity.mp4 24.2 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/automate-cybersecurity-tasks-with-python/04_python-in-practice/03_debug-python-code/01_debugging-strategies.mp4 24.2 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/02_protect-organizational-assets/02_encryption-methods/01_fundamentals-of-cryptography.mp4 23.7 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/03_cyber-attacker-mindset/01_protect-all-entry-points.mp4 23.6 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/foundations-of-cybersecurity/03_protect-against-threats-risks-and-vulnerabilities/02_ethics-in-cybersecurity/01_ethics-in-cybersecurity.mp4 23.6 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/03_cyber-attacker-mindset/05_pathways-through-defenses.mp4 23.5 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/foundations-of-cybersecurity/02_the-evolution-of-cybersecurity/01_the-history-of-cybersecurity/02_past-cybersecurity-attacks.mp4 23.1 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/01_flaws-in-the-system/02_vulnerability-management.mp4 23.0 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/networks-and-network-security/04_security-hardening/04_cloud-hardening/02_kelsey-cloud-security-explained.mp4 23.0 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/automate-cybersecurity-tasks-with-python/03_work-with-strings-and-lists/03_regular-expressions/01_regular-expressions-in-python.mp4 22.9 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/04_threats-to-asset-security/01_social-engineering/02_the-criminal-art-of-persuasion.mp4 22.7 MB
猜你喜欢:
Cybersecurity
Professional
Google
Certificate
- 【影视】 [TutorialPace.com] Lynda - Cybersecurity with Cloud Computing - [TP]
-
收录时间:2022-02-20
文档个数:38
文档大小:371.6 MB
最近下载:2025-05-15
人气:2055
磁力链接
00. Introduction/00_01 - Welcome.mp4 17.4 MB
00. Introduction/00_03 - Reference sites.mp4 16.6 MB
01. Cloud Fundamentals/01_01 - Defining the essential characteristics of cloud.mp4 15.8 MB
02. Cloud Security Guidance/02_03 - Managing information and data security.mp4 15.6 MB
03. Architecting Security/03_05 - Introducing cloud attribute taxonomy.mp4 15.5 MB
03. Architecting Security/03_01 - Introducing SABSA.mp4 15.3 MB
01. Cloud Fundamentals/01_06 - Identifying cloud incidents.mp4 15.2 MB
01. Cloud Fundamentals/01_09 - Defining trust models for cloud.mp4 14.0 MB
02. Cloud Security Guidance/02_16 - Solution Cloud security knowledge.mp4 13.8 MB
02. Cloud Security Guidance/02_02 - Complying with legal and audit requrements.mp4 13.1 MB
02. Cloud Security Guidance/02_11 - Verifying identity in the cloud.mp4 13.1 MB
02. Cloud Security Guidance/02_07 - Managing incident response.mp4 12.9 MB
02. Cloud Security Guidance/02_13 - Implementing virtualization.mp4 12.9 MB
02. Cloud Security Guidance/02_12 - Controlling cloud access.mp4 12.5 MB
02. Cloud Security Guidance/02_08 - Maximizing application security.mp4 12.3 MB
03. Architecting Security/03_02 - Using Fast Tracker.mp4 12.0 MB
02. Cloud Security Guidance/02_05 - Comparing traditional IT, BCP, and DR.mp4 12.0 MB
01. Cloud Fundamentals/01_02 - Understanding infrastructure as a service.mp4 11.9 MB
01. Cloud Fundamentals/01_05 - Discovering deployment models.mp4 11.4 MB
02. Cloud Security Guidance/02_10 - Managing encryption and keys.mp4 10.8 MB
猜你喜欢:
Computing
Cybersecurity
Lynda
TP
TutorialPace
com
Cloud