磁力管家

磁力管家
为您索检到186条磁力链接,耗时0毫秒。 rss

分享给好友

【影视】 Cyber Security 2023 Bundle Fundamentals of Cybersecurity
收录时间:2023-12-18 文档个数:177 文档大小:1.6 GB 最近下载:2025-05-16 人气:11467 磁力链接
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/4 - Cyber Security Networking 101/15 - Networking 03.mp4 86.7 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/10 - Web Attack 101/64 - Web Application Attack 02.mp4 62.7 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/7 - Network Security 101/42 - Network Pentesting 13.mp4 51.6 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/9 - Web Application 101/53 - Web App 02.mp4 48.5 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/8 - Security Technologies/49 - Tech 02.mp4 48.5 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/5 - Kali Linux 101/22 - Linux 03.mp4 43.9 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/7 - Network Security 101/39 - Network Pentesting 10.mp4 43.8 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/7 - Network Security 101/38 - Network Pentesting 09.mp4 39.9 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/10 - Web Attack 101/74 - Web Application Attack 12.mp4 39.8 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/7 - Network Security 101/34 - Network Pentesting 05.mp4 36.3 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/5 - Kali Linux 101/21 - Linux 02.mp4 33.9 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/4 - Cyber Security Networking 101/17 - Networking 05.mp4 31.8 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/10 - Web Attack 101/73 - Web Application Attack 11.mp4 31.4 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/7 - Network Security 101/47 - Network Pentesting 18.mp4 31.4 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/10 - Web Attack 101/68 - Web Application Attack 06.mp4 29.8 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/7 - Network Security 101/37 - Network Pentesting 08.mp4 29.1 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/7 - Network Security 101/31 - Network Pentesting 02.mp4 28.7 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/3 - Cyber Lab Environment/6 - TOOL 01.mp4 28.0 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/10 - Web Attack 101/67 - Web Application Attack 05.mp4 25.5 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/10 - Web Attack 101/71 - Web Application Attack 09.mp4 25.2 MB
【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity Management for New Managers
收录时间:2023-12-17 文档个数:46 文档大小:982.3 MB 最近下载:2025-05-16 人气:3993 磁力链接
  • mp4~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/5. Cyber Incident & Data Breach Response planning ( Video from IT Web Conference ).mp4 372.8 MB
  • mp4~Get Your Files Here !/2. Module 2 NIST Cybersecurity Framework (CSF)/4. Implementing the NIST CSF in your organisation.mp4 72.3 MB
  • mp4~Get Your Files Here !/5. Module 5 Incident Response and Recovery/1. Creating cybersecurity strategies and action plans.mp4 52.2 MB
  • mp4~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/4. Data Breaches.mp4 51.6 MB
  • mp4~Get Your Files Here !/5. Module 5 Incident Response and Recovery/3. Incident detection and analysis.mp4 48.3 MB
  • mp4~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/1. Understanding the importance of cybersecurity management.mp4 47.9 MB
  • mp4~Get Your Files Here !/4. Module 4 Scenario Planning and Strategy/2. Identifying threats and vulnerabilities.mp4 42.2 MB
  • mp4~Get Your Files Here !/5. Module 5 Incident Response and Recovery/2. Incident Response Planning.mp4 40.1 MB
  • mp4~Get Your Files Here !/3. Module 3 NICE Cybersecurity Workforce Framework/3. Knowledge, skills, and abilities (KSAs).mp4 34.2 MB
  • mp4~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/2. Roles and responsibilities of a cybersecurity manager.mp4 33.1 MB
  • mp4~Get Your Files Here !/2. Module 2 NIST Cybersecurity Framework (CSF)/3. Tiers and profiles.mp4 32.6 MB
  • mp4~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/3. NIST and NICE frameworks overview.mp4 29.3 MB
  • mp4~Get Your Files Here !/2. Module 2 NIST Cybersecurity Framework (CSF)/5. Challenges of Implementing the NIST Framework.mp4 22.4 MB
  • mp4~Get Your Files Here !/2. Module 2 NIST Cybersecurity Framework (CSF)/2. Core functions Identify, Protect, Detect, Respond, and Recover.mp4 18.8 MB
  • mp4~Get Your Files Here !/3. Module 3 NICE Cybersecurity Workforce Framework/4. Integrating the NICE Framework into workforce development and management.mp4 18.3 MB
  • mp4~Get Your Files Here !/3. Module 3 NICE Cybersecurity Workforce Framework/2. Workforce categories and specialty areas.mp4 15.7 MB
  • mp4~Get Your Files Here !/5. Module 5 Incident Response and Recovery/5. Post Incident Activities and Lessons learned.mp4 14.2 MB
  • mp4~Get Your Files Here !/8. Module 8 Course Wrap-up and Next Steps/1. Review of key concepts and frameworks.mp4 9.9 MB
  • mp4~Get Your Files Here !/6. Module 6 Cybersecurity Metrics and Reporting/1. Selecting meaningful cybersecurity metrics.mp4 9.5 MB
  • mp4~Get Your Files Here !/8. Module 8 Course Wrap-up and Next Steps/2. Developing a personal action plan for implementing cyber management practices.mp4 7.8 MB
【影视】 The Cybersecurity Threat Landscape
收录时间:2023-12-17 文档个数:61 文档大小:235.6 MB 最近下载:2025-05-16 人气:1474 磁力链接
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/10 - 9. Supply Chain Attacks and Third-Party Risks/01 - The threat of supply chain attacks and third-party risks.mp4 16.2 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/05 - 4. Botnets and DDoS attacks/02 - Protect against botnets and DDoS threats.mp4 15.8 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/08 - 7. Unmanaged IoT Devices/01 - Explore the threat of unmanaged IoT devices.mp4 14.4 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/09 - 8. Shadow IT/01 - Explore the threat of shadow IT.mp4 14.2 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/08 - 7. Unmanaged IoT Devices/02 - Protect against unmanaged IoT devices.mp4 12.4 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/09 - 8. Shadow IT/02 - Protect against shadow IT.mp4 12.4 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/06 - 5. Deepfakes/02 - Protect against deepfakes.mp4 12.1 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/03 - 2. Phishing and Smishing/02 - Protect against phishing and smishing.mp4 12.0 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/11 - Conclusion/01 - Stay up to date on cybersecurity.mp4 11.8 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/02 - 1. Malware and Ransomware/02 - Protect against malware and ransomware.mp4 11.7 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/02 - 1. Malware and Ransomware/01 - Explore the threat of malware and ransomware.mp4 11.6 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/03 - 2. Phishing and Smishing/01 - Explore the threat of phishing and smishing.mp4 11.3 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/05 - 4. Botnets and DDoS attacks/01 - Explore the threat of botnets and DDoS attacks.mp4 11.1 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/07 - 6. Insider Threats/01 - Explore the risk of insider threats.mp4 10.9 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/10 - 9. Supply Chain Attacks and Third-Party Risks/02 - Protect against supply chain attacks and third-party risks.mp4 10.5 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/04 - 3. Business Email Compromise/01 - Explore the threat of business email compromise.mp4 9.4 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/01 - Introduction/01 - Examine the cybersecurity threat landscape.mp4 9.4 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/04 - 3. Business Email Compromise/02 - Protect against business email compromise.mp4 9.2 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/06 - 5. Deepfakes/01 - Explore the threat of deepfakes.mp4 9.0 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/07 - 6. Insider Threats/02 - Protect against insider threats.mp4 7.0 MB
【影视】 Udemy Cybersecurity Collection
收录时间:2024-02-17 文档个数:7517 文档大小:115.9 GB 最近下载:2025-05-16 人气:6044 磁力链接
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/3. Cross-Site-Scripting/1. Cross-Site-Scripting - Lecture.mp4 748.2 MB
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/8. Cross Site Request Forgery/1. CSRF - Techniques.mp4 695.8 MB
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/2. All Interesting Tools/1. Tools I Use.mp4 632.4 MB
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/1. Introduction/3. Recon with.mp4 608.7 MB
  • mp4Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/18. Reconnaissance/8. Active Recon - Port Scanning.mp4 436.1 MB
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/7. Open Redirect Vulnerability/1. Open Redirect Vulnerability with @hemanth1261.mp4 435.9 MB
  • mp4Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/19. Exploitation/11. SQL Injection _ SQLMap.mp4 417.9 MB
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/1. Introduction/5. Another Recon Video.mp4 398.8 MB
  • mp4Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/2. Walkthrough - Legacy.mp4 348.0 MB
  • mp4Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/16. Assembly Course/5. Arithmetic.mp4 331.0 MB
  • mp4Udemy - The Complete Ethical Hacking Course, by Gerri Banfield _ Erman Kirkpatrick/05 How to create a bootable USB of Kali Linux ( optional )/025 How to create a bootable USB of Kali with persistent storage _ 4 GB part 4.mp4 328.9 MB
  • mp4Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/6. Walkthrough - Jerry.mp4 320.2 MB
  • mp4Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/25. Job Hunting/6. Analyzing the Job Post.mp4 312.1 MB
  • mp4Udemy - The Complete Ethical Hacking Course, by Gerri Banfield _ Erman Kirkpatrick/04 Set up instructions for Mac users ONLY/021 Kali Linux Live USB on a MacBook Pro part 3 ( OPTIONAL ).mp4 302.6 MB
  • mp4Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/7. Walkthrough - Nibbles.mp4 299.2 MB
  • mp4Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/4. Walkthrough - Blue.mp4 298.0 MB
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/6. Server Side Request Forgery/2. SSRF - Advanced Techniques.mp4 294.3 MB
  • mp4Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/3. Walkthrough - Lame.mp4 293.6 MB
  • mp4Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/20. Post Exploitation/1. Stabilizing Shells.mp4 285.1 MB
  • mp4Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/6. Server Side Request Forgery/1. SSRF - Basic Techniques.mp4 282.4 MB
【影视】 The Absolute Beginners Guide to Cybersecurity
收录时间:2023-12-17 文档个数:185 文档大小:7.5 GB 最近下载:2025-05-16 人气:7723 磁力链接
  • mp4Part 04 July 2023/Chapter 06 Conclusion/001. You Have Been HACKED - Now What.mp4 193.9 MB
  • mp4Part 04 July 2023/Chapter 01 Introduction/002. Personal Cybersecurity - What I Do.mp4 193.1 MB
  • mp4Part 01 December 2022/Chapter 07 Cyber Warfare and Cyber Attacks Against Companies/002. The Attack Against Estonia.mp4 187.3 MB
  • mp4Part 01 December 2022/Chapter 05 Defenses/009. Password Management.mp4 133.9 MB
  • mp4Part 03 June 2023/Chapter 03 Mobile Threats and Countermeasures/007. How to Use Malwarebytes.mp4 126.9 MB
  • mp4Part 01 December 2022/Chapter 02 Hackers - Who Are They/002. What Is NOT Hacking.mp4 118.6 MB
  • mp4Part 04 July 2023/Chapter 05 Mobile Security/003. Checking Default App Permissions - Android.mp4 115.6 MB
  • mp4Part 03 June 2023/Chapter 02 Understanding Applications/007. Checking Default App Permissions - Android.mp4 115.4 MB
  • mp4Part 02 December 2022/Chapter 01 Introduction/001. Welcome to the Course.mp4 115.3 MB
  • mp4Part 04 July 2023/Chapter 01 Introduction/001. Welcome to the Course.mp4 106.5 MB
  • mp4Part 01 December 2022/Chapter 07 Cyber Warfare and Cyber Attacks Against Companies/003. Stuxnet and the Attack Against Iran.mp4 105.1 MB
  • mp4Part 03 June 2023/Chapter 04 Mobile Security Apps/002. How to Use NordVPN.mp4 101.4 MB
  • mp4Part 02 December 2022/Chapter 07 Social Engineering - Scams, Cons, Tricks, and Fraud/003. Reconnaissance Methods.mp4 94.3 MB
  • mp4Part 04 July 2023/Chapter 03 Personal Security/005. Protecting Yourself Against SIM Card Swap Fraud.mp4 93.5 MB
  • mp4Part 01 December 2022/Chapter 02 Hackers - Who Are They/006. Social Engineering.mp4 89.9 MB
  • mp4Part 01 December 2022/Chapter 06 Cyber Security at the Workplace/005. The Security Versus Ease of Access Paradox.mp4 88.6 MB
  • mp4Part 01 December 2022/Chapter 06 Cyber Security at the Workplace/003. BYOD Management.mp4 87.6 MB
  • mp4Part 04 July 2023/Chapter 05 Mobile Security/005. How to Identify Legit Apps.mp4 86.0 MB
  • mp4Part 01 December 2022/Chapter 01 General Introduction to IT and Cyber Security/002. Difference Between Information Security and Cyber Security.mp4 84.6 MB
  • mp4Part 03 June 2023/Chapter 02 Understanding Applications/003. How to Identify Legit Apps and Spot Fake Apps.mp4 83.4 MB
【影视】 [ WebToolTip.com ] Udemy - Building Cybersecurity Tools with AI (ChatGPT and DeepSeek)
收录时间:2025-05-08 文档个数:13 文档大小:339.2 MB 最近下载:2025-05-16 人气:889 磁力链接
  • mp4~Get Your Files Here !/5 - PROJECTS/3 -Deep Web Footprint Tracker.mp4 82.9 MB
  • mp4~Get Your Files Here !/5 - PROJECTS/1 -Suspicious Process Detector.mp4 76.8 MB
  • mp4~Get Your Files Here !/6 - Deploying kivy app to Windows Platform/1 -Deploying kivy to windows.mp4 51.6 MB
  • mp4~Get Your Files Here !/5 - PROJECTS/2 -Ransomware Scanner app.mp4 36.6 MB
  • mp4~Get Your Files Here !/3 - Prompt Engineering For Cybersecurity and Gui Develepment/2 -Prompt Engineering 2.mp4 18.4 MB
  • mp4~Get Your Files Here !/2 - Setting up the Environment/1 -Create main.py and kivy installation.mp4 16.3 MB
  • mp4~Get Your Files Here !/2 - Setting up the Environment/2 -Testing kivy environment.mp4 14.9 MB
  • mp4~Get Your Files Here !/1 - Introduction/1 -Introduction.mp4 14.7 MB
  • mp4~Get Your Files Here !/3 - Prompt Engineering For Cybersecurity and Gui Develepment/1 -Prompt Engineering 1.mp4 12.1 MB
  • mp4~Get Your Files Here !/4 - Debugging AI Generated code/2 -installing MISSING module Error (Demo).mp4 8.4 MB
  • mp4~Get Your Files Here !/4 - Debugging AI Generated code/1 -Common Errors.mp4 6.6 MB
  • urlGet Bonus Downloads Here.url 180 Bytes
  • txt~Get Your Files Here !/Bonus Resources.txt 70 Bytes
【影视】 Lynda - Cybersecurity Foundations
收录时间:2017-07-23 文档个数:28 文档大小:301.1 MB 最近下载:2025-05-16 人气:1753 磁力链接
  • mp400. Introduction/00_01 - Welcome.mp4 5.8 MB
  • mp400. Introduction/00_02 - What you should know.mp4 2.0 MB
  • mp401. Cybersecurity Foundations/01_01 - Understanding the NIST cybersecurity framework.mp4 12.8 MB
  • mp401. Cybersecurity Foundations/01_02 - Dissecting cyber risk.mp4 13.3 MB
  • mp401. Cybersecurity Foundations/01_03 - Unpacking COBIT 5.mp4 10.5 MB
  • mp401. Cybersecurity Foundations/01_04 - Looking closer at DSS05.mp4 8.2 MB
  • mp401. Cybersecurity Foundations/01_05 - Implementing control frameworks.mp4 14.6 MB
  • mp401. Cybersecurity Foundations/01_06 - Dissecting the payment card industry and PCI DSS.mp4 14.7 MB
  • mp401. Cybersecurity Foundations/01_07 - Exploring the Cyber Essentials framework.mp4 9.4 MB
  • mp402. Cybersecurity Threats/02_01 - Breaking down the cybersecurity kill chain.mp4 8.2 MB
  • mp402. Cybersecurity Threats/02_02 - Dissecting security threats.mp4 11.7 MB
  • mp402. Cybersecurity Threats/02_03 - Exploring cybercrime as an industry.mp4 10.1 MB
  • mp402. Cybersecurity Threats/02_04 - Hiding malware through cloaking and alternate data streams.mp4 9.0 MB
  • mp402. Cybersecurity Threats/02_05 - Using callbacks to capture keystrokes.mp4 9.7 MB
  • mp402. Cybersecurity Threats/02_06 - Hiding malware with rootkits.mp4 9.8 MB
  • mp402. Cybersecurity Threats/02_07 - Understanding advanced persistent threats (APTs).mp4 13.5 MB
  • mp402. Cybersecurity Threats/02_08 - Exploring ransomware.mp4 8.4 MB
  • mp403. Security Architecture/03_01 - Describing security requirements.mp4 14.9 MB
  • mp403. Security Architecture/03_02 - Architecting security risk.mp4 13.4 MB
  • mp403. Security Architecture/03_03 - Selecting security controls.mp4 8.5 MB
【影视】 [FreeTutorials.Us] cybersecurity-ultimate-ethical-hacking-boot-camp
收录时间:2017-08-24 文档个数:53 文档大小:3.6 GB 最近下载:2025-05-16 人气:3681 磁力链接
  • pdf01 Introduction to the Ultimate Ethical Hacking Boot Camp/attached_files/001 Welcome to the Ultimate Ethical Hacking Boot Camp/Equipment.pdf 131.3 kB
  • jpg02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/Kali.Backgrounds.jpg 478.6 kB
  • jpg02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/Server.2008.Backgrounds.jpg 480.5 kB
  • jpg02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/win7.Backgrounds.jpg 480.5 kB
  • jpg02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/win8.Backgrounds.jpg 480.2 kB
  • jpg02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/winxp.Backgrounds.jpg 480.2 kB
  • pdf08 Password Cracking/attached_files/037 Windows Password Cracking/Wordlist-Resources.pdf 59.0 kB
  • mp401 Introduction to the Ultimate Ethical Hacking Boot Camp/001 Welcome to the Ultimate Ethical Hacking Boot Camp.mp4 71.7 MB
  • mp401 Introduction to the Ultimate Ethical Hacking Boot Camp/002 What is Ethical Hacking.mp4 149.9 MB
  • mp401 Introduction to the Ultimate Ethical Hacking Boot Camp/003 Careers for Ethical Hackers.mp4 48.9 MB
  • mp401 Introduction to the Ultimate Ethical Hacking Boot Camp/004 Wireless Lab Setup Hack.mp4 62.6 MB
  • mp401 Introduction to the Ultimate Ethical Hacking Boot Camp/005 Wireless Hacking Module Disclaimer.mp4 38.8 MB
  • mp401 Introduction to the Ultimate Ethical Hacking Boot Camp/006 Interview Oracle Shodan CNN.mp4 278.0 MB
  • mp402 Hacking Lab Setup - Windows Mac Instructions/007 Introduction to Lab Setup.mp4 31.3 MB
  • mp402 Hacking Lab Setup - Windows Mac Instructions/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines..mp4 20.7 MB
  • mp402 Hacking Lab Setup - Windows Mac Instructions/009 Installing Windows XP.mp4 133.1 MB
  • mp402 Hacking Lab Setup - Windows Mac Instructions/010 Installing Server 2008.mp4 7.7 MB
  • mp402 Hacking Lab Setup - Windows Mac Instructions/011 Installing Kali Linux from ISO.mp4 33.5 MB
  • mp402 Hacking Lab Setup - Windows Mac Instructions/012 Installing Kali Linux Prebuild Virtual Machine.mp4 29.4 MB
  • mp402 Hacking Lab Setup - Windows Mac Instructions/013 Installing Windows 7.mp4 9.8 MB
【影视】 [ FreeCourseWeb.com ] CompTIA Cybersecurity Analyst + (CySA + ) (CS0-003) - 3 Incident Response and Management
收录时间:2023-12-17 文档个数:94 文档大小:348.1 MB 最近下载:2025-05-16 人气:5383 磁力链接
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/09 - Password forensics.mp4 19.8 MB
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/08 - Operating system analysis.mp4 15.5 MB
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/11 - Software forensics.mp4 15.2 MB
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/05 - File carving.mp4 13.1 MB
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/10 - Network forensics.mp4 11.3 MB
  • mp4~Get Your Files Here !/02 - 1. Incident Response Programs/08 - Incident eradication and recovery.mp4 11.2 MB
  • mp4~Get Your Files Here !/02 - 1. Incident Response Programs/01 - Build an incident response program.mp4 10.7 MB
  • mp4~Get Your Files Here !/07 - 6. Disaster Recovery/01 - Disaster recovery.mp4 10.7 MB
  • mp4~Get Your Files Here !/06 - 5. Business Continuity/03 - High availability and fault tolerance.mp4 10.4 MB
  • mp4~Get Your Files Here !/04 - 3. Incident Investigation/01 - Logging security information.mp4 10.2 MB
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/04 - System and file forensics.mp4 10.0 MB
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/06 - Creating forensic images.mp4 10.0 MB
  • mp4~Get Your Files Here !/03 - 2. Attack Frameworks/01 - MITRE ATT&CK.mp4 9.9 MB
  • mp4~Get Your Files Here !/04 - 3. Incident Investigation/03 - Cloud audits and investigations.mp4 9.9 MB
  • mp4~Get Your Files Here !/02 - 1. Incident Response Programs/10 - Post-incident activities.mp4 9.4 MB
  • mp4~Get Your Files Here !/02 - 1. Incident Response Programs/04 - Incident identification.mp4 9.3 MB
  • mp4~Get Your Files Here !/07 - 6. Disaster Recovery/04 - Disaster recovery sites.mp4 9.3 MB
  • mp4~Get Your Files Here !/05 - 4. Forensic Techniques/15 - Ediscovery and evidence production.mp4 8.2 MB
  • mp4~Get Your Files Here !/06 - 5. Business Continuity/02 - Business continuity controls.mp4 8.0 MB
  • mp4~Get Your Files Here !/04 - 3. Incident Investigation/02 - Security information and event management.mp4 7.9 MB
【影视】 [ FreeCourseWeb.com ] Cisco Certified Support Technician (CCST) - Cybersecurity
收录时间:2023-12-30 文档个数:40 文档大小:1.6 GB 最近下载:2025-05-16 人气:4474 磁力链接
  • mp4~Get Your Files Here !/4. Endpoint Security Concepts/3. NTFS and share permissions.mp4 152.4 MB
  • mp4~Get Your Files Here !/4. Endpoint Security Concepts/7. Patches and updates.mp4 84.6 MB
  • mp4~Get Your Files Here !/2. Essential Security Principles/5. Secure passwords.mp4 74.3 MB
  • mp4~Get Your Files Here !/4. Endpoint Security Concepts/4. Netstat, nslookup, tcpdump.mp4 70.3 MB
  • mp4~Get Your Files Here !/4. Endpoint Security Concepts/5. Verify that endpoint systems meet security policies and standards.mp4 66.6 MB
  • mp4~Get Your Files Here !/3. Basic network security concepts/11. VPN - lab.mp4 61.4 MB
  • mp4~Get Your Files Here !/4. Endpoint Security Concepts/1. Windows Firewall.mp4 60.7 MB
  • mp4~Get Your Files Here !/3. Basic network security concepts/8. IPS and IDS.mp4 57.8 MB
  • mp4~Get Your Files Here !/3. Basic network security concepts/6. IP addresses and NAT.mp4 53.6 MB
  • mp4~Get Your Files Here !/2. Essential Security Principles/1. Basic terms.mp4 50.7 MB
  • mp4~Get Your Files Here !/2. Essential Security Principles/3. RADIUS.mp4 50.4 MB
  • mp4~Get Your Files Here !/5. Incident Handling/3. Malware.mp4 45.2 MB
  • mp4~Get Your Files Here !/3. Basic network security concepts/2. MAC and ARP.mp4 45.0 MB
  • mp4~Get Your Files Here !/3. Basic network security concepts/1. Describe TCPIP protocol vulnerabilities.mp4 44.0 MB
  • mp4~Get Your Files Here !/2. Essential Security Principles/8. Hashing.mp4 43.3 MB
  • mp4~Get Your Files Here !/5. Incident Handling/2. Encryption.mp4 43.2 MB
  • mp4~Get Your Files Here !/2. Essential Security Principles/7. Encryption.mp4 43.2 MB
  • mp4~Get Your Files Here !/2. Essential Security Principles/9. Certificates.mp4 42.7 MB
  • mp4~Get Your Files Here !/2. Essential Security Principles/2. Authentication, authorization, and accounting (AAA).mp4 39.6 MB
  • mp4~Get Your Files Here !/5. Incident Handling/5. Confidentiality integrity availability.mp4 39.5 MB
【影视】 Real-World Ethical Hacking Hands-on Cybersecurity
收录时间:2022-01-15 文档个数:290 文档大小:8.1 GB 最近下载:2025-05-16 人气:6983 磁力链接
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/14. Bonus Videos National Cyber Warrior Academy, Interviews and More/3. NCWA 2017 Facebook Live Video on Car Hacking and Drone Programming.mp4 947.8 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/9. BONUS Section Car Hacking in Kali Linux!/9. Car Hacking LIVE on Dr. Payne's VW Jetta Facebook Live Video from NCWA 2017.mp4 347.6 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/14. Bonus Videos National Cyber Warrior Academy, Interviews and More/5. Dr. Payne's TEDx Talk on Coding and Cyber as the New Literacy.mp4 320.6 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/5. Social Engineering Capturing Usernames and Passwords via Phishing/3. Cloning Facebook and Harvesting User Passwords.mp4 265.0 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/1. Real-World Ethical Hacking 1 Hacking Windows!/10. BONUS Mac Root Hack!.mp4 233.2 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/3. Important Linux and Windows Terminal Commands/2. Basic Linux Commands.mp4 195.0 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/13. Mobile Hacking on Android/2. Creating the Meterpreter Payload for Android.mp4 175.7 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/3. Important Linux and Windows Terminal Commands/4. More Helpful Linux Commands.mp4 170.6 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/4. Create a Virtual Network for Ethical Hacking!/3. Connecting Your VMs to the Host-Only Network.mp4 148.8 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/8. Hacking Win10 Command & Control Phase/4. Stealing Screenshots, Keystrokes, and ,Webcams.mp4 145.4 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/10. BONUS Hacking Windows 7 with Metasploit!/4. Creating an Exploit Payload with Metasploit.mp4 144.4 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/2. Create Your Own Virtual Hacking Lab!/4. Create an Android PhoneTablet VM for Mobile Hacking!.mp4 142.1 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/13. Mobile Hacking on Android/4. Advanced Android Exploits Accessing Storage, Downloading and Uploading Files.mp4 139.2 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/9. BONUS Section Car Hacking in Kali Linux!/8. BONUS Hacking the Car Hacking Software, to 1000 mph!.mp4 125.2 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/5. Social Engineering Capturing Usernames and Passwords via Phishing/7. Capturing the User's Login and Password in Kali.mp4 116.7 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/9. BONUS Section Car Hacking in Kali Linux!/5. The Replay Attack Replaying CAN Packets with CANplayer.mp4 116.0 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/11. Password Problems - Everybody's Got 'Em Hacking, Cracking, Snacking & Hijacking/3. Sniffing the Network Installing Wireshark.mp4 114.3 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/4. Create a Virtual Network for Ethical Hacking!/5. Updating Kali and Windows VMs.mp4 112.5 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/4. Create a Virtual Network for Ethical Hacking!/4. Creating and Using a Public NAT Network in VBox.mp4 112.5 MB
  • mp4[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/11. Password Problems - Everybody's Got 'Em Hacking, Cracking, Snacking & Hijacking/6. Seven Things You Can Do for Safer Passwords.mp4 111.1 MB
【影视】 O`REILLY - The Complete Cybersecurity Bootcamp, 2nd Edition
收录时间:2024-12-25 文档个数:340 文档大小:6.7 GB 最近下载:2025-05-16 人气:234 磁力链接
  • mp4Lesson 29 Hacking Mobile Platforms/003. 29.2 Hacking iOS.mp4 86.6 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/014. 17.13 Performing SMTP and DNS Enumeration.mp4 80.0 MB
  • mp4Lesson 21 Fundamentals of Wireless Hacking/004. 21.3 Exploring Wireless Threats.mp4 79.0 MB
  • mp4Lesson 33 Fundamentals of IoT Security/003. 33.2 Understanding IoT Attacks.mp4 76.8 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/015. 17.14 Conducting Additional Enumeration Techniques.mp4 75.8 MB
  • mp4Lesson 33 Fundamentals of IoT Security/002. 33.1 Introducing IoT Concepts.mp4 74.4 MB
  • mp4Lesson 29 Hacking Mobile Platforms/002. 29.1 Understanding Mobile Platform Attack Vectors.mp4 73.4 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/011. 17.1 Performing SNMP Enumeration.mp4 71.8 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/004. 17.3 Understanding Host Discovery.mp4 69.7 MB
  • mp4Lesson 5 Fundamentals of Incident Response/007. 5.6 Analyzing Computer Incident Response Teams (CSIRTs).mp4 68.5 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/007. 17.6 Scanning Beyond IDS and Firewall.mp4 68.2 MB
  • mp4Lesson 27 Hacking User Credentials/006. 27.5 Cracking Passwords with John the Ripper.mp4 66.1 MB
  • mp4Lesson 7 Intrusion Event Categories/009. 7.8 Understanding the MITRE ATT&CK Framework.mp4 65.8 MB
  • mp4Lesson 29 Hacking Mobile Platforms/004. 29.3 Hacking Android OS.mp4 63.8 MB
  • mp4Lesson 20 SQL Injection/005. 20.4 Exploring SQL Injection Tools.mp4 63.3 MB
  • mp4Lesson 21 Fundamentals of Wireless Hacking/003. 21.2 Understanding Wireless Encryption.mp4 62.7 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/013. 17.12 Performing NTP and NFS Enumeration.mp4 61.8 MB
  • mp4Lesson 16 Information Gathering and Passive Reconnaissance/011. 16.10 Performing Footprinting through Social Engineering.mp4 59.1 MB
  • mp4Lesson 8 Digital Forensics Fundamentals/004. 8.3 Understanding Evidence Collection.mp4 57.2 MB
  • mp4Lesson 21 Fundamentals of Wireless Hacking/007. 21.6 Hacking Bluetooth.mp4 52.3 MB
【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity Meets Ai - Essentials For 2024
收录时间:2024-12-23 文档个数:31 文档大小:205.7 MB 最近下载:2025-05-16 人气:723 磁力链接
  • mp4~Get Your Files Here !/4 - AI in Cybersecurity/26 - AI for Automating Incident Response Case Study.mp4 47.6 MB
  • mp4~Get Your Files Here !/4 - AI in Cybersecurity/25 - AIPowered Threat Detection Case Study.mp4 21.6 MB
  • mp4~Get Your Files Here !/6 - AI and Cybersecurity in Action/29 - Practical Demonstration Threat Detection Using AI.mp4 21.1 MB
  • mp4~Get Your Files Here !/5 - Cybersecurity for AI Systems/28 - Ethical Considerations.mp4 20.2 MB
  • mp4~Get Your Files Here !/5 - Cybersecurity for AI Systems/27 - Protecting AI Models.mp4 18.0 MB
  • mp4~Get Your Files Here !/3 - Cybersecurity Fundamentals/24 - Key Cybersecurity Practices.mp4 17.0 MB
  • mp4~Get Your Files Here !/2 - Basics of Cybersecurity and AI/7 - Cybersecurity Basics.mp4 5.7 MB
  • mp4~Get Your Files Here !/3 - Cybersecurity Fundamentals/16 - Ransomware.mp4 5.6 MB
  • mp4~Get Your Files Here !/2 - Basics of Cybersecurity and AI/9 - Basics of AI Key AI Concepts.mp4 5.1 MB
  • mp4~Get Your Files Here !/1 - Introduction/2 - Course Objectives.mp4 3.7 MB
  • mp4~Get Your Files Here !/2 - Basics of Cybersecurity and AI/11 - Cybersecurity for AI Systems.mp4 3.7 MB
  • mp4~Get Your Files Here !/2 - Basics of Cybersecurity and AI/10 - AIs Role in Cybersecurity.mp4 3.6 MB
  • mp4~Get Your Files Here !/3 - Cybersecurity Fundamentals/12 - Part 1 What Are Cyber Threats.mp4 3.4 MB
  • mp4~Get Your Files Here !/3 - Cybersecurity Fundamentals/23 - Summary.mp4 3.3 MB
  • mp4~Get Your Files Here !/1 - Introduction/3 - Course Layout.mp4 3.1 MB
  • mp4~Get Your Files Here !/3 - Cybersecurity Fundamentals/15 - Phishing.mp4 2.4 MB
  • mp4~Get Your Files Here !/3 - Cybersecurity Fundamentals/20 - Part 3 How Cyber Threats Work.mp4 2.1 MB
  • mp4~Get Your Files Here !/1 - Introduction/1 - Introduction.mp4 1.9 MB
  • mp4~Get Your Files Here !/3 - Cybersecurity Fundamentals/22 - Part 5 Mitigating Cyber Threats.mp4 1.9 MB
  • mp4~Get Your Files Here !/2 - Basics of Cybersecurity and AI/8 - Why Cybersecurity Matters.mp4 1.8 MB
【影视】 [ CourseMega.com ] Linkedin - Building an ISO 27001-Compliant Cybersecurity Program - The Annex A Controls
收录时间:2022-03-29 文档个数:110 文档大小:1.2 GB 最近下载:2025-05-16 人气:5902 磁力链接
  • mp4~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/013. Access control User access management.mp4 60.8 MB
  • mp4~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/028. System lifecycle Security in d.mp4 57.3 MB
  • mp4~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/017. Physical and environmental security Equipme.mp4 57.2 MB
  • mp4~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/014. Access control System and application.mp4 55.8 MB
  • mp4~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/032. Management of information security.mp4 54.7 MB
  • mp4~Get Your Files Here !/07. Operations Security (Clause A.12)/018. Operations security Operational procedures and responsibili.mp4 47.1 MB
  • mp4~Get Your Files Here !/12. Compliance (Clause A.18)/034. Compliance Compliance with legal and contractual requirements (Claus.mp4 46.5 MB
  • mp4~Get Your Files Here !/07. Operations Security (Clause A.12)/021. Operations security Logging and monitoring (Clause A.12.4).mp4 45.6 MB
  • mp4~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/033. Information security continuity an.mp4 45.5 MB
  • mp4~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/016. Physical and environmental security Secure.mp4 44.8 MB
  • mp4~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/004. Contact with auth.mp4 42.7 MB
  • mp4~Get Your Files Here !/08. Communications Security (Clause A.13)/026. Communications security Information transfer (Clause A..mp4 40.7 MB
  • mp4~Get Your Files Here !/04. Asset Management (Clause A.8)/010. Asset management Information classification (Clause A.8.2).mp4 40.5 MB
  • mp4~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/027. System lifecycle Security requ.mp4 37.2 MB
  • mp4~Get Your Files Here !/03. Human Resources Security (Clause A.7)/007. Human resources security During employment (Clause A.7..mp4 34.4 MB
  • mp4~Get Your Files Here !/08. Communications Security (Clause A.13)/025. Communications security Network security management (Cl.mp4 34.1 MB
  • mp4~Get Your Files Here !/04. Asset Management (Clause A.8)/009. Asset management Responsibility for assets (Clause A.8.1).mp4 33.3 MB
  • mp4~Get Your Files Here !/10. Supplier Relationships (Clause A.15)/030. Supplier relationships Information security in supplier.mp4 31.4 MB
  • mp4~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/002. Management direct.mp4 31.1 MB
  • mp4~Get Your Files Here !/04. Asset Management (Clause A.8)/011. Asset management Media handling (Clause A.8.3).mp4 30.4 MB
【影视】 [FreeCoursesOnline.Me] ITProTV - NIST Cybersecurity And Risk Management Frameworks
收录时间:2023-12-18 文档个数:61 文档大小:11.3 GB 最近下载:2025-05-16 人气:6534 磁力链接
  • mp42. NIST Cybersecurity and Publications.mp4 298.0 MB
  • mp426. Response Training and Testing.mp4 288.9 MB
  • mp424. Incident Response Plan Examples.mp4 279.3 MB
  • mp443. Documentation and Approval.mp4 277.5 MB
  • mp420. System Auditing and Logging.mp4 258.9 MB
  • mp423. Response Planning.mp4 255.7 MB
  • mp429. Backup and Recovery.mp4 251.4 MB
  • mp49. Inventory of Critical Assets.mp4 247.4 MB
  • mp446. Documenting Controls.mp4 246.5 MB
  • mp421. Monitoring and Alerting.mp4 238.7 MB
  • mp422. Assessments.mp4 238.7 MB
  • mp442. Control Allocation and Monitoring.mp4 234.0 MB
  • mp410. Business Impact Assessment.mp4 231.6 MB
  • mp440. NIST Control Documents.mp4 230.2 MB
  • mp436. Establishing Scope.mp4 227.5 MB
  • mp444. Security Control Implementation.mp4 225.8 MB
  • mp43. NIST Relationships.mp4 222.6 MB
  • mp46. The Vocabulary of Risk.mp4 222.0 MB
  • mp425. Digital Forensics.mp4 219.4 MB
  • mp451. Assessment Documentation.mp4 219.2 MB
【影视】 [GigaCourse.Com] ZeroToMastery - Complete Cybersecurity Bootcamp
收录时间:2024-02-21 文档个数:107 文档大小:3.6 GB 最近下载:2025-05-16 人气:1264 磁力链接
  • mp48-Network Security/052-Network Security With Nmap.mp4 169.9 MB
  • mp45-Security Bugs & Vulnerabilities/020-Buffer Overflow Demonstration.mp4 136.7 MB
  • mp412-Appendix - Ethical Hacking/087-Msfconsole Basic Commands.mp4 97.5 MB
  • mp48-Network Security/059-Wireless Attack Demonstration.mp4 93.4 MB
  • mp47-End-Point Protection/034-Password Security and Password Managers.mp4 84.2 MB
  • mp412-Appendix - Ethical Hacking/093-Meterpreter Basic Commands Part 1.mp4 78.5 MB
  • mp47-End-Point Protection/038-Process Explorer.mp4 75.8 MB
  • mp41-Introduction/001-Cybersecurity Bootcamp - Zero to Mastery.mp4 72.4 MB
  • mp48-Network Security/057-Secure Network Architecture.mp4 66.8 MB
  • mp412-Appendix - Ethical Hacking/094-Meterpreter Basic Commands Part 2.mp4 65.7 MB
  • mp47-End-Point Protection/033-Bitdefender, Kaspersky, McAfee, Malwarebytes.mp4 63.9 MB
  • mp44-Understanding Hackers - The Biggest Threat/012-Most Common Attacks Demonstration.mp4 63.5 MB
  • mp48-Network Security/060-Network Monitoring With TCPDump.mp4 62.7 MB
  • mp48-Network Security/058-Wireless Security.mp4 59.6 MB
  • mp45-Security Bugs & Vulnerabilities/017-Unpatched Machine Exploitation Demonstration.mp4 59.1 MB
  • mp412-Appendix - Ethical Hacking/080-Whatweb Stealthy Scan.mp4 58.1 MB
  • mp412-Appendix - Ethical Hacking/091-Advance Msfvenom Usage.mp4 51.4 MB
  • mp47-End-Point Protection/043-Iptables.mp4 50.9 MB
  • mp47-End-Point Protection/028-Brave Browser Security and Privacy.mp4 50.6 MB
  • mp412-Appendix - Ethical Hacking/089-Software Vulnerability - Samba Exploitation.mp4 49.5 MB
【影视】 MS Cybersecurity Pro Track Windows 10 Security Features
收录时间:2021-05-12 文档个数:58 文档大小:1.1 GB 最近下载:2025-05-16 人气:1552 磁力链接
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/1. Introduction/3. Preparing the Lab Environment.mp4 99.9 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/4. Windows 10 software security features - Part 1/1. Windows Defender Firewall and Virtual Secure Mode.mp4 95.3 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/4. Windows 10 software security features - Part 1/2. Credential Guard and Bitlocker.mp4 91.4 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/6. Windows 10 New Security Features and Capabilities/3. Ransomware Case Study.mp4 87.4 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/6. Windows 10 New Security Features and Capabilities/2. Other Security Features and Capabilities.mp4 77.3 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/3. How Windows 10 uses modern hardware features for security/3. Additional Hardware Security.mp4 76.7 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/6. Windows 10 New Security Features and Capabilities/1. Windows Hello and Hello for Business.mp4 68.3 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/5. Windows 10 software security features - Part 2/3. AppLocker with Device Guard.mp4 67.5 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/4. Windows 10 software security features - Part 1/3. Antivirus and WIndows Information Protection.mp4 67.5 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/5. Windows 10 software security features - Part 2/4. Windows Defender SmartScreen and WIndows 10 Telemetry.mp4 60.0 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/3. How Windows 10 uses modern hardware features for security/1. Secure Boot Process.mp4 58.6 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/3. How Windows 10 uses modern hardware features for security/2. Secure Boot to Trusted Boot.mp4 52.0 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/5. Windows 10 software security features - Part 2/2. Device Guard.mp4 46.9 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/5. Windows 10 software security features - Part 2/1. Windows Defender Remote Credential Guard.mp4 44.0 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/1. Introduction/2. About the Course.mp4 34.8 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/2. Built-in Windows 10 defenses/1. Evolution of attacks.mp4 24.7 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/1. Introduction/1. Instructor Introduction.mp4 10.7 MB
  • pdf[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/4. Windows 10 software security features - Part 1/1.2 Windows PowerShell networking cmdlets.pdf 405.1 kB
  • srt[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/6. Windows 10 New Security Features and Capabilities/1. Windows Hello and Hello for Business.srt 23.8 kB
  • srt[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/4. Windows 10 software security features - Part 1/1. Windows Defender Firewall and Virtual Secure Mode.srt 23.3 kB
【影视】 Lynda - Cybersecurity for IT Professionals
收录时间:2017-07-25 文档个数:45 文档大小:303.6 MB 最近下载:2025-05-16 人气:5438 磁力链接
  • mp400. Introduction/00_01 - Welcome.mp4 6.3 MB
  • mp400. Introduction/00_02 - What you should know before watching this course.mp4 869.2 kB
  • mp400. Introduction/00_03 - Using the exercise files.mp4 950.7 kB
  • mp401. Why Cybersecurity/01_01 - Hackers and the kill chain.mp4 14.3 MB
  • mp401. Why Cybersecurity/01_02 - The Stuxnet kill chain.mp4 8.9 MB
  • mp401. Why Cybersecurity/01_03 - Common forms of cybersecurity attack.mp4 14.1 MB
  • mp402. Antivirus/02_01 - Viruses, spyware, and adware.mp4 4.0 MB
  • mp402. Antivirus/02_02 - Using Windows Defender.mp4 3.1 MB
  • mp402. Antivirus/02_03 - Setting up real-time protection.mp4 1.0 MB
  • mp402. Antivirus/02_04 - Scanning with Windows Defender.mp4 4.3 MB
  • mp402. Antivirus/02_05 - Modifying antivirus settings in Windows Defender.mp4 5.8 MB
  • mp402. Antivirus/02_06 - Scheduling a scan with Windows Defender.mp4 9.7 MB
  • mp402. Antivirus/02_07 - Using Windows Defender offline.mp4 1.9 MB
  • mp402. Antivirus/02_08 - Exploring antivirus on Linux.mp4 1.7 MB
  • mp403. Personal Firewalls/03_01 - Why firewalls.mp4 1.5 MB
  • mp403. Personal Firewalls/03_02 - Using the Microsoft Windows Firewall.mp4 12.9 MB
  • mp403. Personal Firewalls/03_03 - Setting up advanced security notifications.mp4 9.5 MB
  • mp403. Personal Firewalls/03_04 - Setting up detailed rules.mp4 10.9 MB
  • mp403. Personal Firewalls/03_05 - Managing and analyzing log files with ZedLan.mp4 8.4 MB
  • mp403. Personal Firewalls/03_06 - Introducing iptables in Linux.mp4 10.7 MB
【影视】 Cybersecurity Fundamentals - Become a Security Expert
收录时间:2023-12-18 文档个数:127 文档大小:6.5 GB 最近下载:2025-05-16 人气:8769 磁力链接
  • mp4[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/3. Passwords, MFA and Good Practices/2. Password Security.mp4 337.8 MB
  • mp4[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/11. Test Your Environment/2. Penetration Testing Fundamentals.mp4 297.2 MB
  • mp4[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/5. Protecting Servers, Computers + Smart Devices/1. Protect Your Device - Server Security.mp4 264.2 MB
  • mp4[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/9. Get Compliant/1. Cybersecurity Regulations and Standards.mp4 252.5 MB
  • mp4[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/6. Security When Online/3. Cloud Security.mp4 245.8 MB
  • mp4[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/5. Protecting Servers, Computers + Smart Devices/4. Protect Your Device - iPhone Security.mp4 245.2 MB
  • mp4[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/4. Using Firewalls, VPN, IDS/1. Network Security Top Tips.mp4 243.1 MB
  • mp4[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/3. Passwords, MFA and Good Practices/1. Software Updates.mp4 234.8 MB
  • mp4[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/5. Protecting Servers, Computers + Smart Devices/2. Protect Your Device - Desktop + Laptop Security.mp4 230.4 MB
  • mp4[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/5. Protecting Servers, Computers + Smart Devices/5. 03 Protect Your Device - iPad Security.mp4 228.5 MB
  • mp4[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/10. Training and Certifications/2. Cybersecurity Awareness and Training.mp4 227.9 MB
  • mp4[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/10. Training and Certifications/1. Cybersecurity Certifications.mp4 214.9 MB
  • mp4[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/2. Cybersecurity Threats and Attacks/4. Social Engineering.mp4 207.5 MB
  • mp4[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/2. Cybersecurity Threats and Attacks/1. Threat and Attack Types.mp4 204.6 MB
  • mp4[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/9. Get Compliant/2. Disaster Recovery and Business Continuity Planning.mp4 178.0 MB
  • mp4[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/5. Protecting Servers, Computers + Smart Devices/3. Protect Your Device - macOS Security.mp4 169.2 MB
  • mp4[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/6. Security When Online/1. Best Ways to Stay Safe Online.mp4 165.0 MB
  • mp4[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/2. Cybersecurity Threats and Attacks/2. Malware.mp4 149.8 MB
  • mp4[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/3. Passwords, MFA and Good Practices/4. Multi-Factor Authentication.mp4 145.9 MB
  • mp4[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/3. Passwords, MFA and Good Practices/6. Setting up Data Encryption on Windows and Mac.mp4 143.8 MB
【影视】 Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training
收录时间:2023-12-24 文档个数:135 文档大小:2.5 GB 最近下载:2025-05-16 人气:10233 磁力链接
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/6. Azure Security Benchmark - Microsoft Certified Cybersecurity-1.mp4 113.5 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/2. Hybrid Environmental Security Strategies - Microsoft Certifi.mp4 63.8 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/1. Specify Priorities for Mitigating Threats to Apps - Microsof-1.mp4 62.3 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/6. Designing a Regulatory Compliance Strategy/4. Implementing Azure Policy - Microsoft Certified Cybersecurit.mp4 59.0 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/7. Evaluating and Managing Security Postures/6. Mitigating Identified Risks - Microsoft Certified Cybersecur-1.mp4 53.6 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/4. Traffic Filtering and Segmentation Strategies - Microsoft Ce-1.mp4 53.4 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/4. Priorities For Mitigating Threats To Data - Microsoft Certif-1.mp4 53.4 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/5. Azure Best Practices for Network Security - Microsoft Certif-1.mp4 52.2 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/5. Hybrid Infrastructure - Microsoft Certified Cybersecurity Ar-1.mp4 50.4 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/6. Designing a Regulatory Compliance Strategy/6. Translating Privacy Requirements - Microsoft Certified Cyber.mp4 49.7 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/9. Designing a Strategy for Securing SaaS, PaaS, and IaaS Services/1. Security Baselines for SaaS, PaaS, and IaaS services - Micro.mp4 48.3 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/3. Translating Business Goals into Security Requirements - Micr.mp4 47.9 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/7. Securing Privileged Access Using RaMP - Microsoft Certified -1.mp4 47.8 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/2. Security Operations - Microsoft Certified Cybersecurity Arch-1.mp4 47.0 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/4. Designing a Security Operations Strategy/5. SIEMSOAR Strategy - Microsoft Certified Cybersecurity Archit.mp4 46.3 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/2. Translating Requirements - Microsoft Certified Cybersecurity.mp4 46.2 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/3. Security Strategy for Applications and APIs - Microsoft Cert-1.mp4 44.6 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/5. Designing an Identity Security Strategy/1. Strategy for Access to Cloud Resources - Microsoft Certified.mp4 43.0 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/7. Evaluating and Managing Security Postures/4. Designing Security for an Azure Landing Zone - Microsoft Cer.mp4 42.8 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/4. Designing a Security Operations Strategy/3. Logging and Auditing Strategy - Microsoft Certified Cybersec.mp4 42.3 MB
共10页 上一页 1 2 3 4 5 下一页