磁力管家

磁力管家
为您索检到186条磁力链接,耗时1毫秒。 rss

分享给好友

【影视】 [ DevCourseWeb.com ] Udemy - The Cybersecurity Consultant Mindset
收录时间:2023-12-26 文档个数:32 文档大小:3.1 GB 最近下载:2025-05-14 人气:3009 磁力链接
  • mp4~Get Your Files Here !/3. Risk Management and Assessment/2. Introduction to Risk Management.mp4 222.8 MB
  • mp4~Get Your Files Here !/2. Introduction to Cybersecurity Consulting/3. Understanding the Role of a Cyber Consultant.mp4 212.8 MB
  • mp4~Get Your Files Here !/7. Developing Soft Skills for Your Career/2. Communication and Interpersonal Skills.mp4 211.5 MB
  • mp4~Get Your Files Here !/3. Risk Management and Assessment/3. Compliance Requirements.mp4 204.7 MB
  • mp4~Get Your Files Here !/2. Introduction to Cybersecurity Consulting/2. Overview of Cybersecurity.mp4 198.8 MB
  • mp4~Get Your Files Here !/2. Introduction to Cybersecurity Consulting/5. Preparing for a Career in Cyber Consulting.mp4 196.6 MB
  • mp4~Get Your Files Here !/3. Risk Management and Assessment/5. Security Documentation Development.mp4 178.0 MB
  • mp4~Get Your Files Here !/4. Tools and Technologies/3. Vulnerability Assessment and Pentesting.mp4 177.6 MB
  • mp4~Get Your Files Here !/3. Risk Management and Assessment/4. Risk Assessment and Analysis.mp4 158.0 MB
  • mp4~Get Your Files Here !/4. Tools and Technologies/6. Cybersecurity Frameworks Selection.mp4 146.1 MB
  • mp4~Get Your Files Here !/5. Incident Response/3. Developing an Incident Response Plan.mp4 123.8 MB
  • mp4~Get Your Files Here !/4. Tools and Technologies/2. Network Scanning and Monitoring.mp4 115.2 MB
  • mp4~Get Your Files Here !/2. Introduction to Cybersecurity Consulting/4. Benefits of Cyber Consulting and Cons.mp4 102.7 MB
  • mp4~Get Your Files Here !/4. Tools and Technologies/5. Security Information and Event Management Systems.mp4 99.4 MB
  • mp4~Get Your Files Here !/6. Cybersecurity Auditing and Frameworks/4. Cybersecurity Frameworks - Implementation.mp4 81.3 MB
  • mp4~Get Your Files Here !/4. Tools and Technologies/4. Intrusion Detection and Prevention Systems.mp4 73.6 MB
  • mp4~Get Your Files Here !/6. Cybersecurity Auditing and Frameworks/3. Auditing Standards and Requirements.mp4 73.1 MB
  • mp4~Get Your Files Here !/6. Cybersecurity Auditing and Frameworks/2. Overview of IT Auditing.mp4 72.9 MB
  • mp4~Get Your Files Here !/7. Developing Soft Skills for Your Career/5. Practical Exercises and Resources.mp4 68.0 MB
  • mp4~Get Your Files Here !/5. Incident Response/2. Defining a Security Incident.mp4 67.7 MB
【影视】 [ TutSala.com ] Udemy - Cybersecurity For Beginners - Network Architecture
收录时间:2022-01-09 文档个数:124 文档大小:1.0 GB 最近下载:2025-05-15 人气:3002 磁力链接
  • mp4~Get Your Files Here !/17. Lab Demonstration - Scanning Networks with NMAP Pt. 1/1. Lab Demonstration - Scanning Networks with NMAP Pt. 1.mp4 477.0 MB
  • mp4~Get Your Files Here !/18. Lab Demonstration - Scanning Networks with NMAP Pt. 2/1. Lab Demonstration - Scanning Networks with NMAP Pt. 2.mp4 331.7 MB
  • mp4~Get Your Files Here !/11. Denial-of-Service Attack (DoS) Attack/2. The 5 Principal Differences Between DoS & DDoS Attacks.mp4 14.1 MB
  • mp4~Get Your Files Here !/11. Denial-of-Service Attack (DoS) Attack/6. Common DoS Attack Pt. 2.mp4 9.8 MB
  • mp4~Get Your Files Here !/7. Network Devices/1. Common Network Devices.mp4 8.9 MB
  • mp4~Get Your Files Here !/1. The OSI Model/1. The OSI Model.mp4 7.8 MB
  • mp4~Get Your Files Here !/11. Denial-of-Service Attack (DoS) Attack/5. Common DoS Attack Pt. 1.mp4 6.9 MB
  • mp4~Get Your Files Here !/14. DNS Attacks/1. DNS Attacks.mp4 6.4 MB
  • mp4~Get Your Files Here !/7. Network Devices/2. More Common Network Devices.mp4 6.2 MB
  • mp4~Get Your Files Here !/11. Denial-of-Service Attack (DoS) Attack/1. DoS Vs. DDoS.mp4 6.0 MB
  • mp4~Get Your Files Here !/4. IPv4 Vs. IPv6/1. IPv4.mp4 5.7 MB
  • mp4~Get Your Files Here !/1. The OSI Model/3. Data Link Layer.mp4 5.7 MB
  • mp4~Get Your Files Here !/10. Intrusion Detection Systems (IDS) & Intrusion Prevention Systems (IPS)/2. Behavior Based IDS Vs. Knowledge Based IDS.mp4 5.5 MB
  • mp4~Get Your Files Here !/15. What is Footprinting/3. Footprinting Helps To.mp4 5.4 MB
  • mp4~Get Your Files Here !/15. What is Footprinting/4. Footprinting Methodology.mp4 5.4 MB
  • mp4~Get Your Files Here !/11. Denial-of-Service Attack (DoS) Attack/7. Three-Way-Handshake Importance To Network Attacks (SYN Flood).mp4 5.2 MB
  • mp4~Get Your Files Here !/9. Types of Firewalls/2. Types of Firewalls Pt. 2.mp4 5.1 MB
  • mp4~Get Your Files Here !/1. The OSI Model/2. Physical Layer.mp4 4.8 MB
  • mp4~Get Your Files Here !/9. Types of Firewalls/1. Types of Firewalls Pt. 1.mp4 4.6 MB
  • mp4~Get Your Files Here !/1. The OSI Model/4. Network Layer.mp4 4.5 MB
【影视】 [ DevCourseWeb.com ] Udemy - Python for Computer Networks and cybersecurity
收录时间:2023-12-19 文档个数:18 文档大小:809.9 MB 最近下载:2025-05-13 人气:2991 磁力链接
  • mp4~Get Your Files Here !/3. Network Scanning for Defenders/1. Network Scanning for Defenders.mp4 369.1 MB
  • mp4~Get Your Files Here !/2. Fulfilling Pre-ATT&CK Objectives/1. Implementing a SYN Scan in scapy.mp4 278.3 MB
  • mp4~Get Your Files Here !/4. Gaining Initial Access_part3/1. Gaining Initial Access.mp4 127.2 MB
  • mp4~Get Your Files Here !/5. File Transfer and Plotting_E1/1. File Transfer and Plotting.mp4 21.8 MB
  • mp4~Get Your Files Here !/6. File Transfer and Plotting_Exercise2/1. File Transfer and Plotting_E1.mp4 13.4 MB
  • py~Get Your Files Here !/3. Network Scanning for Defenders/1.1 DNSExploration.py 1.6 kB
  • py~Get Your Files Here !/4. Gaining Initial Access_part3/1.1 TestDefaultCredentials.py 1.5 kB
  • py~Get Your Files Here !/2. Fulfilling Pre-ATT&CK Objectives/1.1 HoneyScan.py 1.2 kB
  • py~Get Your Files Here !/3. Network Scanning for Defenders/1.2 HoneyResolver.py 1.1 kB
  • py~Get Your Files Here !/5. File Transfer and Plotting_E1/1.2 Example 6.1.py 1.0 kB
  • html~Get Your Files Here !/1. Введение/1. Introduction.html 908 Bytes
  • py~Get Your Files Here !/2. Fulfilling Pre-ATT&CK Objectives/1.2 PortScan.py 789 Bytes
  • txt~Get Your Files Here !/Bonus Resources.txt 386 Bytes
  • py~Get Your Files Here !/6. File Transfer and Plotting_Exercise2/1.2 download.py 262 Bytes
  • py~Get Your Files Here !/6. File Transfer and Plotting_Exercise2/1.3 upload.py 256 Bytes
  • ini~Get Your Files Here !/5. File Transfer and Plotting_E1/1.1 desktop.ini 244 Bytes
  • ini~Get Your Files Here !/6. File Transfer and Plotting_Exercise2/1.1 desktop.ini 244 Bytes
  • urlGet Bonus Downloads Here.url 182 Bytes
【影视】 Lynda - Foundations of Cybersecurity
收录时间:2017-02-19 文档个数:27 文档大小:300.9 MB 最近下载:2025-05-15 人气:2960 磁力链接
  • mp4021 Managing user access and identity.mp4 20.7 MB
  • mp4022 Implementing preventative security.mp4 18.8 MB
  • mp4023 Monitoring and alerts.mp4 15.7 MB
  • mp4018 Describing security requirements.mp4 14.9 MB
  • mp4008 Dissecting the payment card industry and PCI DSS.mp4 14.6 MB
  • mp4007 Implementing control frameworks.mp4 14.3 MB
  • mp4025 Preparing for an incident.mp4 14.2 MB
  • mp4019 Architecting security risk.mp4 13.5 MB
  • mp4016 Understanding advanced persistent threats (APTs).mp4 13.5 MB
  • mp4004 Dissecting cyber risk.mp4 13.1 MB
  • mp4003 Understanding the NIST cybersecurity framework.mp4 12.6 MB
  • mp4011 Dissecting security threats.mp4 11.6 MB
  • mp4026 Responding to an incident.mp4 11.5 MB
  • mp4005 Unpacking COBIT 5.mp4 10.3 MB
  • mp4012 Exploring cybercrime as an industry.mp4 9.9 MB
  • mp4014 Using callbacks to capture keystrokes.mp4 9.8 MB
  • mp4015 Hiding malware with rootkits.mp4 9.8 MB
  • mp4009 Exploring the Cyber Essentials framework.mp4 9.3 MB
  • mp4013 Hiding malware through cloaking and alternate data streams.mp4 9.0 MB
  • mp4020 Selecting security controls.mp4 8.5 MB
【影视】 Pluralsight - Cybersecurity Threats: Ransomware
收录时间:2017-06-08 文档个数:37 文档大小:388.1 MB 最近下载:2025-05-16 人气:2825 磁力链接
  • mp43. Ransomware Entry Points/15. Embedded Hyperlinks, Websites_downloads, and Drive-by Infections.mp4 6.2 MB
  • mp43. Ransomware Entry Points/16. Why Common Exploit Kits Are Used.mp4 5.4 MB
  • mp43. Ransomware Entry Points/14. Phishing and Email Attachments.mp4 10.6 MB
  • mp43. Ransomware Entry Points/18. Summary.mp4 2.8 MB
  • mp43. Ransomware Entry Points/12. Overview.mp4 2.7 MB
  • mp43. Ransomware Entry Points/13. The 5 Classic Infection Vectors.mp4 3.1 MB
  • mp43. Ransomware Entry Points/17. Command and Callback (C&C) and Indicators of Compromise.mp4 7.0 MB
  • mp44. Incident Response - Detection and Containment/21. Detecting an Attack.mp4 7.3 MB
  • mp44. Incident Response - Detection and Containment/20. Indicators of Compromise.mp4 5.3 MB
  • mp44. Incident Response - Detection and Containment/23. Summary.mp4 1.7 MB
  • mp44. Incident Response - Detection and Containment/19. Overview.mp4 2.6 MB
  • mp44. Incident Response - Detection and Containment/22. Containing the Attack.mp4 9.0 MB
  • mp46. Countermeasures and Preparing Your Incident Response/35. Next Generation Anti-virus_Anti-malware.mp4 5.6 MB
  • mp46. Countermeasures and Preparing Your Incident Response/37. Summary.mp4 5.5 MB
  • mp46. Countermeasures and Preparing Your Incident Response/33. Defending a Ransomware Attack.mp4 11.4 MB
  • mp46. Countermeasures and Preparing Your Incident Response/34. Protecting a Windows Network.mp4 8.0 MB
  • mp46. Countermeasures and Preparing Your Incident Response/32. Overview.mp4 5.5 MB
  • mp46. Countermeasures and Preparing Your Incident Response/36. Lessons Learned and Your Incident Response Plan.mp4 10.9 MB
  • mp42. What Is Ransomware/06. How Big Is the Problem.mp4 15.1 MB
  • mp42. What Is Ransomware/02. Overview.mp4 4.1 MB
【影视】 [ WebToolTip.com ] Udemy - ISACA Cybersecurity Fundamentals - Complete Training Course
收录时间:2025-03-07 文档个数:45 文档大小:858.9 MB 最近下载:2025-05-16 人气:2781 磁力链接
  • mp4~Get Your Files Here !/2 - Types of Security/4 -Cybersecurity.mp4 38.9 MB
  • mp4~Get Your Files Here !/3 - Governance, Risk Management and Compliance/5 -Risk Analysis Approaches.mp4 36.9 MB
  • mp4~Get Your Files Here !/4 - Common Types of Malware/6 -Trojan Horses.mp4 34.2 MB
  • mp4~Get Your Files Here !/4 - Common Types of Malware/5 -Ransomware.mp4 34.1 MB
  • mp4~Get Your Files Here !/4 - Common Types of Malware/3 -Worms.mp4 33.9 MB
  • mp4~Get Your Files Here !/5 - Security Controls/2 -Control Functions and Types.mp4 32.8 MB
  • mp4~Get Your Files Here !/4 - Common Types of Malware/2 -Viruses.mp4 31.7 MB
  • mp4~Get Your Files Here !/2 - Types of Security/5 -Physical Security.mp4 31.6 MB
  • mp4~Get Your Files Here !/3 - Governance, Risk Management and Compliance/4 -Risk Governance.mp4 29.0 MB
  • mp4~Get Your Files Here !/4 - Common Types of Malware/8 -Adware.mp4 28.9 MB
  • mp4~Get Your Files Here !/6 - OWASP Top 10/11 -Server-Side Request Forgery.mp4 28.7 MB
  • mp4~Get Your Files Here !/6 - OWASP Top 10/9 -Software and Data Integrity Failures.mp4 28.1 MB
  • mp4~Get Your Files Here !/6 - OWASP Top 10/10 -Security Logging and Monitoring Failures.mp4 28.0 MB
  • mp4~Get Your Files Here !/6 - OWASP Top 10/3 -Cryptographic Failures.mp4 27.0 MB
  • mp4~Get Your Files Here !/6 - OWASP Top 10/7 -Vulnerable and Outdated Components.mp4 27.0 MB
  • mp4~Get Your Files Here !/1 - Introduction/3 -Integrity.mp4 26.2 MB
  • mp4~Get Your Files Here !/4 - Common Types of Malware/7 -Rootkit.mp4 25.7 MB
  • mp4~Get Your Files Here !/2 - Types of Security/3 -Information Security.mp4 23.5 MB
  • mp4~Get Your Files Here !/1 - Introduction/4 -Availability.mp4 22.1 MB
  • mp4~Get Your Files Here !/4 - Common Types of Malware/4 -Keyloggers.mp4 21.6 MB
【影视】 ZeroToMastery - Complete Cybersecurity Bootcamp
收录时间:2024-01-09 文档个数:97 文档大小:3.6 GB 最近下载:2025-05-15 人气:2777 磁力链接
  • mp48-Network Security/052-Network Security With Nmap.mp4 169.9 MB
  • mp45-Security Bugs & Vulnerabilities/020-Buffer Overflow Demonstration.mp4 136.7 MB
  • mp412-Appendix - Ethical Hacking/087-Msfconsole Basic Commands.mp4 97.5 MB
  • mp48-Network Security/059-Wireless Attack Demonstration.mp4 93.4 MB
  • mp47-End-Point Protection/034-Password Security and Password Managers.mp4 84.2 MB
  • mp412-Appendix - Ethical Hacking/093-Meterpreter Basic Commands Part 1.mp4 78.5 MB
  • mp47-End-Point Protection/038-Process Explorer.mp4 75.8 MB
  • mp41-Introduction/001-Cybersecurity Bootcamp - Zero to Mastery.mp4 72.4 MB
  • mp48-Network Security/057-Secure Network Architecture.mp4 66.8 MB
  • mp412-Appendix - Ethical Hacking/094-Meterpreter Basic Commands Part 2.mp4 65.7 MB
  • mp47-End-Point Protection/033-Bitdefender, Kaspersky, McAfee, Malwarebytes.mp4 63.9 MB
  • mp44-Understanding Hackers - The Biggest Threat/012-Most Common Attacks Demonstration.mp4 63.5 MB
  • mp48-Network Security/060-Network Monitoring With TCPDump.mp4 62.7 MB
  • mp48-Network Security/058-Wireless Security.mp4 59.6 MB
  • mp45-Security Bugs & Vulnerabilities/017-Unpatched Machine Exploitation Demonstration.mp4 59.1 MB
  • mp412-Appendix - Ethical Hacking/080-Whatweb Stealthy Scan.mp4 58.1 MB
  • mp412-Appendix - Ethical Hacking/091-Advance Msfvenom Usage.mp4 51.4 MB
  • mp47-End-Point Protection/043-Iptables.mp4 50.9 MB
  • mp47-End-Point Protection/028-Brave Browser Security and Privacy.mp4 50.6 MB
  • mp412-Appendix - Ethical Hacking/089-Software Vulnerability - Samba Exploitation.mp4 49.5 MB
【影视】 [ DevCourseWeb.com ] Udemy - Selection and Implementation of Cybersecurity Risks Controls
收录时间:2024-01-05 文档个数:36 文档大小:2.0 GB 最近下载:2025-05-15 人气:2662 磁力链接
  • mp4~Get Your Files Here !/2. SECTION-2/8. 19- The role of governance in the effective selection and implementation of cybe.mp4 142.9 MB
  • mp4~Get Your Files Here !/2. SECTION-2/14. 23-Selecting and implementing cybersecurity controls based on NIST CSF PT2.mp4 122.4 MB
  • mp4~Get Your Files Here !/2. SECTION-2/16. 25- Measuring the effectiveness of implemented controls.mp4 117.4 MB
  • mp4~Get Your Files Here !/2. SECTION-2/17. Putting it all together-The Selection and Implementation of Cyber Risks controls.mp4 115.7 MB
  • mp4~Get Your Files Here !/1. Introduction/10. 9-Key considerations for the identification- selection & implementation of contr.mp4 101.8 MB
  • mp4~Get Your Files Here !/1. Introduction/7. 6-Approach to Control Selection_ pt2.mp4 94.1 MB
  • mp4~Get Your Files Here !/2. SECTION-2/9. 20-Why not implement frameworks that already have recommended controls.mp4 90.3 MB
  • mp4~Get Your Files Here !/2. SECTION-2/15. 24-Implementation Plan for selected controls.mp4 87.1 MB
  • mp4~Get Your Files Here !/2. SECTION-2/11. 21-Challenges, & considerations associated with implementing frameworks-pt2.mp4 82.9 MB
  • mp4~Get Your Files Here !/1. Introduction/11. 10-Risk Assessment-BIA, Control Selection, Cost Benefit Analysis.mp4 81.1 MB
  • mp4~Get Your Files Here !/1. Introduction/9. 8-Introduction to security controls.mp4 77.4 MB
  • mp4~Get Your Files Here !/2. SECTION-2/7. 18-Documenting Cybersecurity Risk Assessment Report-Pt2.mp4 75.5 MB
  • mp4~Get Your Files Here !/2. SECTION-2/5. 17-Determine likelihood, Impact, Calculate risk.mp4 72.4 MB
  • mp4~Get Your Files Here !/2. SECTION-2/13. 23-Selecting and implementing cybersecurity controls based on NIST CSF PT1.mp4 62.9 MB
  • mp4~Get Your Files Here !/1. Introduction/12. 11-Cost Benefit Analysis associated with controls selection.mp4 58.3 MB
  • mp4~Get Your Files Here !/2. SECTION-2/3. 15-Steps involved in assessing the identified cyber risks in web server.mp4 55.0 MB
  • mp4~Get Your Files Here !/2. SECTION-2/1. 14-High-level process of selecting controls to protect ecommerce web server-Pt1.mp4 54.5 MB
  • mp4~Get Your Files Here !/1. Introduction/14. 13-Regulatory Compliance, Incident Response Planning.mp4 53.9 MB
  • mp4~Get Your Files Here !/1. Introduction/13. 12- Technology integration, operational impact, continuous monitoring, employee.mp4 52.8 MB
  • mp4~Get Your Files Here !/2. SECTION-2/6. 18- Documenting Cybersecurity Risk Assessment Report-Pt1.mp4 50.4 MB
【影视】 [ DevCourseWeb.com ] Udemy - ChatGPT, ML, and AI for Cybersecurity, SOCs and Business
收录时间:2024-04-07 文档个数:14 文档大小:3.7 GB 最近下载:2025-05-16 人气:2616 磁力链接
  • mp4~Get Your Files Here !/3. AI Tools for Security.mp4 683.8 MB
  • mp4~Get Your Files Here !/4. Enhancing Search Capabilities with GPT4all Plugins.mp4 576.0 MB
  • mp4~Get Your Files Here !/2. Fundamentals of ChatGPT and GPT4all.mp4 553.4 MB
  • mp4~Get Your Files Here !/1. Introduction to Machine Learning and AI for Security.mp4 520.6 MB
  • mp4~Get Your Files Here !/8. Future Trends and Challenges in AI Security.mp4 452.9 MB
  • mp4~Get Your Files Here !/6. Evaluating AI Security.mp4 379.7 MB
  • mp4~Get Your Files Here !/5. Securing AI Models and Data.mp4 280.8 MB
  • mp4~Get Your Files Here !/7. Case Studies of Real-World AI Applications.mp4 279.0 MB
  • txt~Get Your Files Here !/Bonus Resources.txt 386 Bytes
  • urlGet Bonus Downloads Here.url 182 Bytes
  • html~Get Your Files Here !/9. Final Exam.html 146 Bytes
  • html~Get Your Files Here !/4.2 Github Plugins (primarily for ChatGPT and Python implementations thereof)..html 124 Bytes
  • html~Get Your Files Here !/4.1 ChatGPT Plugins.html 100 Bytes
  • html~Get Your Files Here !/4.3 GPT4All Website and Downloads.html 90 Bytes
【影视】 Cybersecurity and Artificial Intelligence
收录时间:2024-09-08 文档个数:10 文档大小:99.9 MB 最近下载:2025-05-15 人气:2532 磁力链接
  • mp401. Cybersecurity and Artificial Intelligence/01. Cybersecurity and AI Overview.mp4 24.4 MB
  • mp401. Cybersecurity and Artificial Intelligence/02. Demo- Importance of Understanding AI in Cybersecurity.mp4 23.9 MB
  • mp401. Cybersecurity and Artificial Intelligence/03. Phishing and BEC Real-world Examples.mp4 10.8 MB
  • mp401. Cybersecurity and Artificial Intelligence/08. Demo- Deepfake.mp4 8.0 MB
  • zipcybersecurity-artificial-intelligence.zip 7.4 MB
  • mp401. Cybersecurity and Artificial Intelligence/04. Voicemail Scams - Examples and How to Avoid.mp4 7.3 MB
  • mp401. Cybersecurity and Artificial Intelligence/05. Adhering to Company Policies and Guidelines.mp4 5.8 MB
  • mp401. Cybersecurity and Artificial Intelligence/06. AI Hallucinations.mp4 5.8 MB
  • mp401. Cybersecurity and Artificial Intelligence/09. Mitigating the AI Threats.mp4 3.3 MB
  • mp401. Cybersecurity and Artificial Intelligence/07. Criminal Usage of AI.mp4 3.3 MB
【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity Essentials - Stay Safe and Secure Online
收录时间:2024-02-04 文档个数:39 文档大小:1.2 GB 最近下载:2025-05-14 人气:2451 磁力链接
  • mp4~Get Your Files Here !/6. Device Security/1. Introduction to Device Security.mp4 79.4 MB
  • mp4~Get Your Files Here !/2. Password Security/2. What Makes a Good Password.mp4 70.5 MB
  • mp4~Get Your Files Here !/6. Device Security/3. Mobile Security Best Practices.mp4 69.8 MB
  • mp4~Get Your Files Here !/4. Phishing/1. Introduction to Phishing.mp4 63.3 MB
  • mp4~Get Your Files Here !/5. Staying Safe on the Web/3. Identifying Suspicious Downloads.mp4 59.6 MB
  • mp4~Get Your Files Here !/6. Device Security/2. Choosing and Using an Antivirus.mp4 58.4 MB
  • mp4~Get Your Files Here !/2. Password Security/1. Introduction to Passwords.mp4 57.7 MB
  • mp4~Get Your Files Here !/5. Staying Safe on the Web/2. Inspecting URLs.mp4 57.6 MB
  • mp4~Get Your Files Here !/2. Password Security/5. Using a Password Manager.mp4 56.2 MB
  • mp4~Get Your Files Here !/7. Virtual Private Networks/4. Choosing a VPN Solution.mp4 55.5 MB
  • mp4~Get Your Files Here !/4. Phishing/4. Phishing Without Email.mp4 54.3 MB
  • mp4~Get Your Files Here !/4. Phishing/2. The Psychology of Phishing.mp4 52.3 MB
  • mp4~Get Your Files Here !/5. Staying Safe on the Web/4. Managing Trackers and Cookies.mp4 48.2 MB
  • mp4~Get Your Files Here !/3. Multi-Factor Authentication (MFA)/3. Choosing a Strong Authentication Factor.mp4 45.8 MB
  • mp4~Get Your Files Here !/7. Virtual Private Networks/2. Why Use a VPN.mp4 45.5 MB
  • mp4~Get Your Files Here !/3. Multi-Factor Authentication (MFA)/5. Identifying MFA Phishing Attacks.mp4 41.4 MB
  • mp4~Get Your Files Here !/7. Virtual Private Networks/3. How VPNs Work.mp4 38.0 MB
  • mp4~Get Your Files Here !/4. Phishing/3. Examining a Phishing Email.mp4 35.7 MB
  • mp4~Get Your Files Here !/2. Password Security/4. Checking for Compromised Accounts.mp4 33.5 MB
  • mp4~Get Your Files Here !/4. Phishing/5. Phishing Using the Cloud.mp4 31.6 MB
【影视】 [ DevCourseWeb.com ] Udemy - Modern Cybersecurity Fundamentals
收录时间:2023-12-17 文档个数:27 文档大小:2.3 GB 最近下载:2025-05-16 人气:2342 磁力链接
  • mp4~Get Your Files Here !/2. History of Cybersecurity/1. History of Cybersecurity.mp4 478.1 MB
  • mp4~Get Your Files Here !/3. Cybersecurity Risk Management/1. Cybersecurity Risk Management.mp4 265.3 MB
  • mp4~Get Your Files Here !/13. The Future of Cybersecurity/1. The Future of Cybersecurity.mp4 186.8 MB
  • mp4~Get Your Files Here !/7. Understanding Networks Part 3/1. Understanding Networks Part 3.mp4 176.6 MB
  • mp4~Get Your Files Here !/11. Ransomware/1. Ransomware.mp4 159.6 MB
  • mp4~Get Your Files Here !/8. Understanding Networks Part 4/1. Understanding Networks Part 4.mp4 158.3 MB
  • mp4~Get Your Files Here !/12. Internet of Things (IoT)/1. Internet of Things (IoT).mp4 154.5 MB
  • mp4~Get Your Files Here !/9. Domain Name System (DNS)/1. Domain Name System (DNS).mp4 145.9 MB
  • mp4~Get Your Files Here !/5. Understanding Networks Part 1/1. Understanding Networks Part 1.mp4 137.5 MB
  • mp4~Get Your Files Here !/4. Intrusion Detection/1. Intrusion Detection.mp4 136.3 MB
  • mp4~Get Your Files Here !/6. Understanding Networks Part 2/1. Understanding Networks Part 2.mp4 126.6 MB
  • mp4~Get Your Files Here !/10. Dynamic Host Configuration Protocol (DHCP)/1. Dynamic Host Configuration Protocol (DHCP).mp4 112.7 MB
  • mp4~Get Your Files Here !/1. Introduction/1. Introduction.mp4 28.1 MB
  • pdf~Get Your Files Here !/5. Understanding Networks Part 1/1.1 Understanding-Networks.pdf 3.5 MB
  • pdf~Get Your Files Here !/6. Understanding Networks Part 2/1.1 Understanding-Networks.pdf 3.5 MB
  • pdf~Get Your Files Here !/7. Understanding Networks Part 3/1.1 Understanding-Networks.pdf 3.5 MB
  • pdf~Get Your Files Here !/8. Understanding Networks Part 4/1.1 Understanding-Networks.pdf 3.5 MB
  • pdf~Get Your Files Here !/3. Cybersecurity Risk Management/1.1 Cybersecurity-Risk-Management.pdf 1.8 MB
  • pdf~Get Your Files Here !/12. Internet of Things (IoT)/1.1 IoT.pdf 1.8 MB
  • pdf~Get Your Files Here !/2. History of Cybersecurity/1.1 HISTORY-OF-CYBERSECURITY.pdf 1.7 MB
【影视】 [CourseClub.Me] O`REILLY - The Complete Cybersecurity Bootcamp, 2nd Edition
收录时间:2023-12-23 文档个数:347 文档大小:6.7 GB 最近下载:2025-05-15 人气:2332 磁力链接
  • mp4Lesson 29 Hacking Mobile Platforms/003. 29.2 Hacking iOS.mp4 86.6 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/014. 17.13 Performing SMTP and DNS Enumeration.mp4 80.0 MB
  • mp4Lesson 21 Fundamentals of Wireless Hacking/004. 21.3 Exploring Wireless Threats.mp4 79.0 MB
  • mp4Lesson 33 Fundamentals of IoT Security/003. 33.2 Understanding IoT Attacks.mp4 76.8 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/015. 17.14 Conducting Additional Enumeration Techniques.mp4 75.8 MB
  • mp4Lesson 33 Fundamentals of IoT Security/002. 33.1 Introducing IoT Concepts.mp4 74.4 MB
  • mp4Lesson 29 Hacking Mobile Platforms/002. 29.1 Understanding Mobile Platform Attack Vectors.mp4 73.4 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/011. 17.1 Performing SNMP Enumeration.mp4 71.8 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/004. 17.3 Understanding Host Discovery.mp4 69.7 MB
  • mp4Lesson 5 Fundamentals of Incident Response/007. 5.6 Analyzing Computer Incident Response Teams (CSIRTs).mp4 68.5 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/007. 17.6 Scanning Beyond IDS and Firewall.mp4 68.2 MB
  • mp4Lesson 27 Hacking User Credentials/006. 27.5 Cracking Passwords with John the Ripper.mp4 66.1 MB
  • mp4Lesson 7 Intrusion Event Categories/009. 7.8 Understanding the MITRE ATT&CK Framework.mp4 65.8 MB
  • mp4Lesson 29 Hacking Mobile Platforms/004. 29.3 Hacking Android OS.mp4 63.8 MB
  • mp4Lesson 20 SQL Injection/005. 20.4 Exploring SQL Injection Tools.mp4 63.3 MB
  • mp4Lesson 21 Fundamentals of Wireless Hacking/003. 21.2 Understanding Wireless Encryption.mp4 62.7 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/013. 17.12 Performing NTP and NFS Enumeration.mp4 61.8 MB
  • mp4Lesson 16 Information Gathering and Passive Reconnaissance/011. 16.10 Performing Footprinting through Social Engineering.mp4 59.1 MB
  • mp4Lesson 8 Digital Forensics Fundamentals/004. 8.3 Understanding Evidence Collection.mp4 57.2 MB
  • mp4Lesson 21 Fundamentals of Wireless Hacking/007. 21.6 Hacking Bluetooth.mp4 52.3 MB
【影视】 Cybersecurity Careers and Certifications
收录时间:2023-12-20 文档个数:150 文档大小:414.1 MB 最近下载:2025-05-14 人气:2289 磁力链接
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 05 - 4. Cybersecurity Careers/17 - Cybersecurity careers overview.mp4.mp4 51.0 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 06 - 5. Cybersecurity Certifications/27 - Cybersecurity certifications overview.mp4.mp4 23.7 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 01 - Introduction/01 - Cybersecurity careers and certifications.mp4.mp4 21.7 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 02 - 1. Understanding the Cybersecurity Career Field/05 - An overview of cybersecurity key concepts.mp4.mp4 15.4 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 02 - 1. Understanding the Cybersecurity Career Field/04 - A brief history of cybersecurity.mp4.mp4 9.8 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 02 - 1. Understanding the Cybersecurity Career Field/06 - Enabling technologies for cybersecurity.mp4.mp4 8.8 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 07 - 6. Your Cybersecurity Career Path/39 - How to get cybersecurity experience.mp4.mp4 8.7 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 07 - 6. Your Cybersecurity Career Path/38 - Prerequisites.mp4.mp4 8.5 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 05 - 4. Cybersecurity Careers/19 - Cybersecurity career: Analyst.mp4.mp4 8.5 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 06 - 5. Cybersecurity Certifications/37 - Choose a cybersecurity certification.mp4.mp4 8.3 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 08 - 7. Cybersecurity Career Advice/44 - Begin with the end in mind.mp4.mp4 8.2 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 04 - 3. Cybersecurity Success Traits/14 - Analytical and technology savvy.mp4.mp4 8.1 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 05 - 4. Cybersecurity Careers/26 - Cybersecurity career: Director.mp4.mp4 8.0 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 07 - 6. Your Cybersecurity Career Path/40 - Getting started: Get certified.mp4.mp4 7.9 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 05 - 4. Cybersecurity Careers/22 - Cybersecurity career: Engineer.mp4.mp4 7.8 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 01 - Introduction/03 - Why start a career in cybersecurity?.mp4.mp4 7.8 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 03 - 2. Cybersecurity Marketplace/13 - Retail (PCI DSS).mp4.mp4 7.7 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 02 - 1. Understanding the Cybersecurity Career Field/08 - Cybersecurity career resources.mp4.mp4 7.5 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 03 - 2. Cybersecurity Marketplace/11 - Healthcare (HIPAA).mp4.mp4 7.5 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 05 - 4. Cybersecurity Careers/20 - Cybersecurity career: Auditor.mp4.mp4 7.4 MB
【影视】 [ DevCourseWeb.com ] Cfe 101 - Cybersecurity For Everyone
收录时间:2023-12-29 文档个数:31 文档大小:1.5 GB 最近下载:2025-05-14 人气:2244 磁力链接
  • mp4~Get Your Files Here !/3 - Password Email Security/6 - Password Security.mp4 149.2 MB
  • mp4~Get Your Files Here !/5 - Mobile Device Remote Working Security/12 - Keeping Your Mobile Safe.mp4 132.7 MB
  • mp4~Get Your Files Here !/1 - Introduction Threats to Information Security/3 - Everyday Information Security Threats.mp4 112.7 MB
  • mp4~Get Your Files Here !/7 - Network Security/17 - Keep Your Network Safe.mp4 92.3 MB
  • mp4~Get Your Files Here !/1 - Introduction Threats to Information Security/1 - Cybersecurity for Everyone.mp4 90.0 MB
  • mp4~Get Your Files Here !/9 - Incident Response/19 - Incident Response.mp4 86.4 MB
  • mp4~Get Your Files Here !/5 - Mobile Device Remote Working Security/13 - Keeping Your Work Safe While Working Remotely.mp4 78.6 MB
  • mp4~Get Your Files Here !/6 - Physical Security/16 - When Safety Fails in the Real World.mp4 77.3 MB
  • mp4~Get Your Files Here !/3 - Password Email Security/7 - Securing Your Email Communications.mp4 74.6 MB
  • mp4~Get Your Files Here !/2 - Malware Security Policies/4 - Understanding Malware.mp4 70.1 MB
  • mp4~Get Your Files Here !/8 - Generative AI/18 - Generative AI.mp4 70.1 MB
  • mp4~Get Your Files Here !/4 - Social Engineering Phishing/11 - Spotting Dodging Phishing Scams.mp4 64.9 MB
  • mp4~Get Your Files Here !/2 - Malware Security Policies/5 - Why Security Policies Procedures Matter.mp4 62.2 MB
  • mp4~Get Your Files Here !/6 - Physical Security/15 - Staying Safe in the Real World.mp4 59.6 MB
  • mp4~Get Your Files Here !/4 - Social Engineering Phishing/10 - Understanding Combatting Phishing Attacks.mp4 55.8 MB
  • mp4~Get Your Files Here !/4 - Social Engineering Phishing/8 - Guarding Against Social Engineering.mp4 53.9 MB
  • mp4~Get Your Files Here !/4 - Social Engineering Phishing/9 - Staying Ahead of Social Engineering Scams.mp4 40.6 MB
  • mp4~Get Your Files Here !/10 - Conclusion/20 - Course Recap Next Steps.mp4 30.6 MB
  • mp4~Get Your Files Here !/5 - Mobile Device Remote Working Security/14 - Attacks on Remote Workers.mp4 29.5 MB
  • mp4~Get Your Files Here !/1 - Introduction Threats to Information Security/2 - Making the Most of This Course.mp4 21.3 MB
【影视】 [ FreeCourseWeb.com ] Udemy - Master Cybersecurity,Ethical Hacking and Penetrating Testing
收录时间:2022-03-15 文档个数:50 文档大小:1.6 GB 最近下载:2025-05-16 人气:2202 磁力链接
  • mp4~Get Your Files Here !/04 Exposing Hackers - Know Your Enemy/002 Why You Need Security _.mp4 189.8 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/011 Setting up Labs.mp4 169.5 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/003 What is Privacy, Anonymity and Pseudonymity _.mp4 158.8 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/006 Threat Modelling And Risk Assessment.mp4 158.3 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/008 Confidentiality, Integrity and Availability - (Security Attributes).mp4 141.8 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/004 Security, Vulnerabilities, Threats and Adversaries.mp4 117.8 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/005 Asset Selection.mp4 94.5 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/002 Protect What You Value.mp4 93.7 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/010 Zero Trust Model.mp4 85.7 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/007 Security,Anonymity and Privacy.mp4 59.8 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/001 What is Cybersecurity _.mp4 34.8 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/009 Defence in Depth.mp4 34.2 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/008 Who Conduct it _.mp4 26.4 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/002 What is Ethical Hacking _.mp4 25.8 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/005 Purpose of Studying Ethical Hacking and Penetrating Testing.mp4 24.3 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/010 Closure.mp4 23.6 MB
  • mp4~Get Your Files Here !/04 Exposing Hackers - Know Your Enemy/001 Goals and Learning Objectives - Know Your Enemy.mp4 21.8 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/009 Who should You Choose _.mp4 20.6 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/001 Goals and Learning Objectives.mp4 19.7 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/006 Scope For Ethical Hackers and Penetrating Testers.mp4 18.5 MB
【影视】 [ DevCourseWeb.com ] Udemy - Ccsa - Certified Cybersecurity Analyst
收录时间:2023-12-17 文档个数:18 文档大小:1.1 GB 最近下载:2025-05-15 人气:2189 磁力链接
  • mp4~Get Your Files Here !/2 - Blue Team Principles/2 - Blue Team Principles.mp4 196.8 MB
  • mp4~Get Your Files Here !/3 - Digital Forensics/3 - Digital Forensics.mp4 172.5 MB
  • mp4~Get Your Files Here !/4 - Malware Analysis/4 - Malware Analysis.mp4 154.1 MB
  • mp4~Get Your Files Here !/7 - Leveraging SIEM for Advanced Analytics/7 - Leveraging SIEM for Advanced Analytics.mp4 134.1 MB
  • mp4~Get Your Files Here !/5 - Traffic Analysis/5 - Traffic Analysis.mp4 131.1 MB
  • mp4~Get Your Files Here !/8 - Defeating the Red Team with Purple Team Tactics/8 - Defeating the Red Team with Purple Team Tactics.mp4 129.3 MB
  • mp4~Get Your Files Here !/6 - Assessing the Current State of Defense within the Organization/6 - Assessing the Current State of Defense within the Organization.mp4 123.7 MB
  • mp4~Get Your Files Here !/1 - Introduction/1 - Introduction.mp4 87.0 MB
  • srt~Get Your Files Here !/2 - Blue Team Principles/2 - Blue Team Principles English.srt 39.2 kB
  • srt~Get Your Files Here !/3 - Digital Forensics/3 - Digital Forensics English.srt 37.2 kB
  • srt~Get Your Files Here !/4 - Malware Analysis/4 - Malware Analysis English.srt 32.9 kB
  • srt~Get Your Files Here !/5 - Traffic Analysis/5 - Traffic Analysis English.srt 26.1 kB
  • srt~Get Your Files Here !/7 - Leveraging SIEM for Advanced Analytics/7 - Leveraging SIEM for Advanced Analytics English.srt 26.0 kB
  • srt~Get Your Files Here !/1 - Introduction/1 - Introduction English.srt 22.7 kB
  • srt~Get Your Files Here !/6 - Assessing the Current State of Defense within the Organization/6 - Assessing the Current State of Defense within the Organization English.srt 18.8 kB
  • srt~Get Your Files Here !/8 - Defeating the Red Team with Purple Team Tactics/8 - Defeating the Red Team with Purple Team Tactics English.srt 18.8 kB
  • txt~Get Your Files Here !/Bonus Resources.txt 386 Bytes
  • urlGet Bonus Downloads Here.url 182 Bytes
【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity Threat Hunting Professional
收录时间:2022-03-20 文档个数:36 文档大小:1.0 GB 最近下载:2025-05-15 人气:2155 磁力链接
  • mp4~Get Your Files Here !/2. Time to hunt/2. Practical Threat hunting Demo.mp4 121.9 MB
  • mp4~Get Your Files Here !/2. Time to hunt/1. Case Base Threat Hunting.mp4 93.6 MB
  • mp4~Get Your Files Here !/2. Time to hunt/3. Indicators of threat attacksIoC.mp4 86.1 MB
  • mp4~Get Your Files Here !/1. Introduction/11. 7 Effective Threat Hunting Tips.mp4 81.5 MB
  • mp4~Get Your Files Here !/1. Introduction/10. Hypothesis Testing & Sources of Hypothesis.mp4 78.6 MB
  • mp4~Get Your Files Here !/4. Course Resources/1. Course Resources.mp4 72.6 MB
  • mp4~Get Your Files Here !/3. Course Conclusion/1. Course Review.mp4 72.6 MB
  • mp4~Get Your Files Here !/1. Introduction/8. What is Required for Successful Threat Hunting.mp4 71.2 MB
  • mp4~Get Your Files Here !/1. Introduction/6. Terms associated with Threat Hunting.mp4 70.5 MB
  • mp4~Get Your Files Here !/1. Introduction/4. Why threat hunt and attributes of an effective threat hunter.mp4 56.2 MB
  • mp4~Get Your Files Here !/1. Introduction/9. Threat Hunting Approaches.mp4 55.0 MB
  • mp4~Get Your Files Here !/1. Introduction/5. Threat Hunting Skillset Requirements.mp4 40.0 MB
  • mp4~Get Your Files Here !/1. Introduction/7. Threat Hunting Loop.mp4 38.6 MB
  • mp4~Get Your Files Here !/1. Introduction/2. What is Threat Hunting & Its Primary objective.mp4 35.9 MB
  • mp4~Get Your Files Here !/1. Introduction/1. Introduction.mp4 29.5 MB
  • mp4~Get Your Files Here !/1. Introduction/3. What is Threat Hunting & Its Primary objective..mp4 23.3 MB
  • mp4~Get Your Files Here !/4. Course Resources/1.1 Network Threat Hunting with Tim Crothers.mp4 10.6 MB
  • pdf~Get Your Files Here !/4. Course Resources/1.2 Resources Links for Threat Hunting Course.pdf 435.7 kB
  • srt~Get Your Files Here !/2. Time to hunt/2. Practical Threat hunting Demo.srt 11.9 kB
  • srt~Get Your Files Here !/2. Time to hunt/3. Indicators of threat attacksIoC.srt 8.3 kB
【影视】 Google Cybersecurity Professional Certificate
收录时间:2023-12-22 文档个数:1670 文档大小:4.3 GB 最近下载:2025-05-12 人气:2063 磁力链接
  • mp4[TutsNode.net] - Google Cybersecurity Professional Certificate/foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/01_get-started-with-the-certificate-program/01_welcome-to-the-google-cybersecurity-certificate.mp4 49.6 MB
  • mp4[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/01_flaws-in-the-system/04_common-vulnerabilities-and-exposures.mp4 29.2 MB
  • mp4[TutsNode.net] - Google Cybersecurity Professional Certificate/foundations-of-cybersecurity/02_the-evolution-of-cybersecurity/01_the-history-of-cybersecurity/03_attacks-in-the-digital-age.mp4 26.8 MB
  • mp4[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/02_protect-organizational-assets/03_authentication-authorization-and-accounting/03_the-mechanisms-of-authorization.mp4 26.4 MB
  • mp4[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/04_threats-to-asset-security/02_malware/01_malicious-software.mp4 25.7 MB
  • mp4[TutsNode.net] - Google Cybersecurity Professional Certificate/manage-security-risks/04_use-playbooks-to-respond-to-incidents/01_phases-of-incident-response-playbooks/02_phases-of-an-incident-response-playbook.mp4 25.5 MB
  • mp4[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/04_threats-to-asset-security/01_social-engineering/04_phishing-for-information.mp4 25.2 MB
  • mp4[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/04_threats-to-asset-security/02_malware/03_the-rise-of-cryptojacking.mp4 24.8 MB
  • mp4[TutsNode.net] - Google Cybersecurity Professional Certificate/foundations-of-cybersecurity/03_protect-against-threats-risks-and-vulnerabilities/01_frameworks-and-controls/02_introduction-to-security-frameworks-and-controls.mp4 24.5 MB
  • mp4[TutsNode.net] - Google Cybersecurity Professional Certificate/foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/02_introduction-to-cybersecurity/01_introduction-to-cybersecurity.mp4 24.2 MB
  • mp4[TutsNode.net] - Google Cybersecurity Professional Certificate/automate-cybersecurity-tasks-with-python/04_python-in-practice/03_debug-python-code/01_debugging-strategies.mp4 24.2 MB
  • mp4[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/02_protect-organizational-assets/02_encryption-methods/01_fundamentals-of-cryptography.mp4 23.7 MB
  • mp4[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/03_cyber-attacker-mindset/01_protect-all-entry-points.mp4 23.6 MB
  • mp4[TutsNode.net] - Google Cybersecurity Professional Certificate/foundations-of-cybersecurity/03_protect-against-threats-risks-and-vulnerabilities/02_ethics-in-cybersecurity/01_ethics-in-cybersecurity.mp4 23.6 MB
  • mp4[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/03_cyber-attacker-mindset/05_pathways-through-defenses.mp4 23.5 MB
  • mp4[TutsNode.net] - Google Cybersecurity Professional Certificate/foundations-of-cybersecurity/02_the-evolution-of-cybersecurity/01_the-history-of-cybersecurity/02_past-cybersecurity-attacks.mp4 23.1 MB
  • mp4[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/01_flaws-in-the-system/02_vulnerability-management.mp4 23.0 MB
  • mp4[TutsNode.net] - Google Cybersecurity Professional Certificate/networks-and-network-security/04_security-hardening/04_cloud-hardening/02_kelsey-cloud-security-explained.mp4 23.0 MB
  • mp4[TutsNode.net] - Google Cybersecurity Professional Certificate/automate-cybersecurity-tasks-with-python/03_work-with-strings-and-lists/03_regular-expressions/01_regular-expressions-in-python.mp4 22.9 MB
  • mp4[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/04_threats-to-asset-security/01_social-engineering/02_the-criminal-art-of-persuasion.mp4 22.7 MB
【影视】 [TutorialPace.com] Lynda - Cybersecurity with Cloud Computing - [TP]
收录时间:2022-02-20 文档个数:38 文档大小:371.6 MB 最近下载:2025-05-15 人气:2055 磁力链接
  • mp400. Introduction/00_01 - Welcome.mp4 17.4 MB
  • mp400. Introduction/00_03 - Reference sites.mp4 16.6 MB
  • mp401. Cloud Fundamentals/01_01 - Defining the essential characteristics of cloud.mp4 15.8 MB
  • mp402. Cloud Security Guidance/02_03 - Managing information and data security.mp4 15.6 MB
  • mp403. Architecting Security/03_05 - Introducing cloud attribute taxonomy.mp4 15.5 MB
  • mp403. Architecting Security/03_01 - Introducing SABSA.mp4 15.3 MB
  • mp401. Cloud Fundamentals/01_06 - Identifying cloud incidents.mp4 15.2 MB
  • mp401. Cloud Fundamentals/01_09 - Defining trust models for cloud.mp4 14.0 MB
  • mp402. Cloud Security Guidance/02_16 - Solution Cloud security knowledge.mp4 13.8 MB
  • mp402. Cloud Security Guidance/02_02 - Complying with legal and audit requrements.mp4 13.1 MB
  • mp402. Cloud Security Guidance/02_11 - Verifying identity in the cloud.mp4 13.1 MB
  • mp402. Cloud Security Guidance/02_07 - Managing incident response.mp4 12.9 MB
  • mp402. Cloud Security Guidance/02_13 - Implementing virtualization.mp4 12.9 MB
  • mp402. Cloud Security Guidance/02_12 - Controlling cloud access.mp4 12.5 MB
  • mp402. Cloud Security Guidance/02_08 - Maximizing application security.mp4 12.3 MB
  • mp403. Architecting Security/03_02 - Using Fast Tracker.mp4 12.0 MB
  • mp402. Cloud Security Guidance/02_05 - Comparing traditional IT, BCP, and DR.mp4 12.0 MB
  • mp401. Cloud Fundamentals/01_02 - Understanding infrastructure as a service.mp4 11.9 MB
  • mp401. Cloud Fundamentals/01_05 - Discovering deployment models.mp4 11.4 MB
  • mp402. Cloud Security Guidance/02_10 - Managing encryption and keys.mp4 10.8 MB
共10页 上一页 1 2 3 4 5 6 7 8 下一页