为您索检到186条磁力链接,耗时0毫秒。
- 【影视】 Cyber Security 2023 Bundle Fundamentals of Cybersecurity
-
收录时间:2023-12-18
文档个数:177
文档大小:1.6 GB
最近下载:2025-05-16
人气:11467
磁力链接
[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/4 - Cyber Security Networking 101/15 - Networking 03.mp4 86.7 MB
[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/10 - Web Attack 101/64 - Web Application Attack 02.mp4 62.7 MB
[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/7 - Network Security 101/42 - Network Pentesting 13.mp4 51.6 MB
[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/9 - Web Application 101/53 - Web App 02.mp4 48.5 MB
[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/8 - Security Technologies/49 - Tech 02.mp4 48.5 MB
[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/5 - Kali Linux 101/22 - Linux 03.mp4 43.9 MB
[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/7 - Network Security 101/39 - Network Pentesting 10.mp4 43.8 MB
[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/7 - Network Security 101/38 - Network Pentesting 09.mp4 39.9 MB
[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/10 - Web Attack 101/74 - Web Application Attack 12.mp4 39.8 MB
[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/7 - Network Security 101/34 - Network Pentesting 05.mp4 36.3 MB
[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/5 - Kali Linux 101/21 - Linux 02.mp4 33.9 MB
[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/4 - Cyber Security Networking 101/17 - Networking 05.mp4 31.8 MB
[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/10 - Web Attack 101/73 - Web Application Attack 11.mp4 31.4 MB
[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/7 - Network Security 101/47 - Network Pentesting 18.mp4 31.4 MB
[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/10 - Web Attack 101/68 - Web Application Attack 06.mp4 29.8 MB
[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/7 - Network Security 101/37 - Network Pentesting 08.mp4 29.1 MB
[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/7 - Network Security 101/31 - Network Pentesting 02.mp4 28.7 MB
[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/3 - Cyber Lab Environment/6 - TOOL 01.mp4 28.0 MB
[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/10 - Web Attack 101/67 - Web Application Attack 05.mp4 25.5 MB
[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/10 - Web Attack 101/71 - Web Application Attack 09.mp4 25.2 MB
猜你喜欢:
Fundamentals
Bundle
Cybersecurity
Cyber
2023
Security
- 【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity Management for New Managers
-
收录时间:2023-12-17
文档个数:46
文档大小:982.3 MB
最近下载:2025-05-16
人气:3993
磁力链接
~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/5. Cyber Incident & Data Breach Response planning ( Video from IT Web Conference ).mp4 372.8 MB
~Get Your Files Here !/2. Module 2 NIST Cybersecurity Framework (CSF)/4. Implementing the NIST CSF in your organisation.mp4 72.3 MB
~Get Your Files Here !/5. Module 5 Incident Response and Recovery/1. Creating cybersecurity strategies and action plans.mp4 52.2 MB
~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/4. Data Breaches.mp4 51.6 MB
~Get Your Files Here !/5. Module 5 Incident Response and Recovery/3. Incident detection and analysis.mp4 48.3 MB
~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/1. Understanding the importance of cybersecurity management.mp4 47.9 MB
~Get Your Files Here !/4. Module 4 Scenario Planning and Strategy/2. Identifying threats and vulnerabilities.mp4 42.2 MB
~Get Your Files Here !/5. Module 5 Incident Response and Recovery/2. Incident Response Planning.mp4 40.1 MB
~Get Your Files Here !/3. Module 3 NICE Cybersecurity Workforce Framework/3. Knowledge, skills, and abilities (KSAs).mp4 34.2 MB
~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/2. Roles and responsibilities of a cybersecurity manager.mp4 33.1 MB
~Get Your Files Here !/2. Module 2 NIST Cybersecurity Framework (CSF)/3. Tiers and profiles.mp4 32.6 MB
~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/3. NIST and NICE frameworks overview.mp4 29.3 MB
~Get Your Files Here !/2. Module 2 NIST Cybersecurity Framework (CSF)/5. Challenges of Implementing the NIST Framework.mp4 22.4 MB
~Get Your Files Here !/2. Module 2 NIST Cybersecurity Framework (CSF)/2. Core functions Identify, Protect, Detect, Respond, and Recover.mp4 18.8 MB
~Get Your Files Here !/3. Module 3 NICE Cybersecurity Workforce Framework/4. Integrating the NICE Framework into workforce development and management.mp4 18.3 MB
~Get Your Files Here !/3. Module 3 NICE Cybersecurity Workforce Framework/2. Workforce categories and specialty areas.mp4 15.7 MB
~Get Your Files Here !/5. Module 5 Incident Response and Recovery/5. Post Incident Activities and Lessons learned.mp4 14.2 MB
~Get Your Files Here !/8. Module 8 Course Wrap-up and Next Steps/1. Review of key concepts and frameworks.mp4 9.9 MB
~Get Your Files Here !/6. Module 6 Cybersecurity Metrics and Reporting/1. Selecting meaningful cybersecurity metrics.mp4 9.5 MB
~Get Your Files Here !/8. Module 8 Course Wrap-up and Next Steps/2. Developing a personal action plan for implementing cyber management practices.mp4 7.8 MB
猜你喜欢:
Management
Managers
Cybersecurity
Udemy
DevCourseWeb
New
com
- 【影视】 The Cybersecurity Threat Landscape
-
收录时间:2023-12-17
文档个数:61
文档大小:235.6 MB
最近下载:2025-05-16
人气:1474
磁力链接
[TutsNode.net] - The Cybersecurity Threat Landscape/10 - 9. Supply Chain Attacks and Third-Party Risks/01 - The threat of supply chain attacks and third-party risks.mp4 16.2 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/05 - 4. Botnets and DDoS attacks/02 - Protect against botnets and DDoS threats.mp4 15.8 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/08 - 7. Unmanaged IoT Devices/01 - Explore the threat of unmanaged IoT devices.mp4 14.4 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/09 - 8. Shadow IT/01 - Explore the threat of shadow IT.mp4 14.2 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/08 - 7. Unmanaged IoT Devices/02 - Protect against unmanaged IoT devices.mp4 12.4 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/09 - 8. Shadow IT/02 - Protect against shadow IT.mp4 12.4 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/06 - 5. Deepfakes/02 - Protect against deepfakes.mp4 12.1 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/03 - 2. Phishing and Smishing/02 - Protect against phishing and smishing.mp4 12.0 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/11 - Conclusion/01 - Stay up to date on cybersecurity.mp4 11.8 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/02 - 1. Malware and Ransomware/02 - Protect against malware and ransomware.mp4 11.7 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/02 - 1. Malware and Ransomware/01 - Explore the threat of malware and ransomware.mp4 11.6 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/03 - 2. Phishing and Smishing/01 - Explore the threat of phishing and smishing.mp4 11.3 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/05 - 4. Botnets and DDoS attacks/01 - Explore the threat of botnets and DDoS attacks.mp4 11.1 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/07 - 6. Insider Threats/01 - Explore the risk of insider threats.mp4 10.9 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/10 - 9. Supply Chain Attacks and Third-Party Risks/02 - Protect against supply chain attacks and third-party risks.mp4 10.5 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/04 - 3. Business Email Compromise/01 - Explore the threat of business email compromise.mp4 9.4 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/01 - Introduction/01 - Examine the cybersecurity threat landscape.mp4 9.4 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/04 - 3. Business Email Compromise/02 - Protect against business email compromise.mp4 9.2 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/06 - 5. Deepfakes/01 - Explore the threat of deepfakes.mp4 9.0 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/07 - 6. Insider Threats/02 - Protect against insider threats.mp4 7.0 MB
猜你喜欢:
Cybersecurity
Landscape
Threat
- 【影视】 Udemy Cybersecurity Collection
-
收录时间:2024-02-17
文档个数:7517
文档大小:115.9 GB
最近下载:2025-05-16
人气:6044
磁力链接
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/3. Cross-Site-Scripting/1. Cross-Site-Scripting - Lecture.mp4 748.2 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/8. Cross Site Request Forgery/1. CSRF - Techniques.mp4 695.8 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/2. All Interesting Tools/1. Tools I Use.mp4 632.4 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/1. Introduction/3. Recon with.mp4 608.7 MB
Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/18. Reconnaissance/8. Active Recon - Port Scanning.mp4 436.1 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/7. Open Redirect Vulnerability/1. Open Redirect Vulnerability with @hemanth1261.mp4 435.9 MB
Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/19. Exploitation/11. SQL Injection _ SQLMap.mp4 417.9 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/1. Introduction/5. Another Recon Video.mp4 398.8 MB
Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/2. Walkthrough - Legacy.mp4 348.0 MB
Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/16. Assembly Course/5. Arithmetic.mp4 331.0 MB
Udemy - The Complete Ethical Hacking Course, by Gerri Banfield _ Erman Kirkpatrick/05 How to create a bootable USB of Kali Linux ( optional )/025 How to create a bootable USB of Kali with persistent storage _ 4 GB part 4.mp4 328.9 MB
Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/6. Walkthrough - Jerry.mp4 320.2 MB
Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/25. Job Hunting/6. Analyzing the Job Post.mp4 312.1 MB
Udemy - The Complete Ethical Hacking Course, by Gerri Banfield _ Erman Kirkpatrick/04 Set up instructions for Mac users ONLY/021 Kali Linux Live USB on a MacBook Pro part 3 ( OPTIONAL ).mp4 302.6 MB
Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/7. Walkthrough - Nibbles.mp4 299.2 MB
Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/4. Walkthrough - Blue.mp4 298.0 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/6. Server Side Request Forgery/2. SSRF - Advanced Techniques.mp4 294.3 MB
Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/3. Walkthrough - Lame.mp4 293.6 MB
Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/20. Post Exploitation/1. Stabilizing Shells.mp4 285.1 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/6. Server Side Request Forgery/1. SSRF - Basic Techniques.mp4 282.4 MB
猜你喜欢:
Cybersecurity
Collection
Udemy
- 【影视】 The Absolute Beginners Guide to Cybersecurity
-
收录时间:2023-12-17
文档个数:185
文档大小:7.5 GB
最近下载:2025-05-16
人气:7723
磁力链接
Part 04 July 2023/Chapter 06 Conclusion/001. You Have Been HACKED - Now What.mp4 193.9 MB
Part 04 July 2023/Chapter 01 Introduction/002. Personal Cybersecurity - What I Do.mp4 193.1 MB
Part 01 December 2022/Chapter 07 Cyber Warfare and Cyber Attacks Against Companies/002. The Attack Against Estonia.mp4 187.3 MB
Part 01 December 2022/Chapter 05 Defenses/009. Password Management.mp4 133.9 MB
Part 03 June 2023/Chapter 03 Mobile Threats and Countermeasures/007. How to Use Malwarebytes.mp4 126.9 MB
Part 01 December 2022/Chapter 02 Hackers - Who Are They/002. What Is NOT Hacking.mp4 118.6 MB
Part 04 July 2023/Chapter 05 Mobile Security/003. Checking Default App Permissions - Android.mp4 115.6 MB
Part 03 June 2023/Chapter 02 Understanding Applications/007. Checking Default App Permissions - Android.mp4 115.4 MB
Part 02 December 2022/Chapter 01 Introduction/001. Welcome to the Course.mp4 115.3 MB
Part 04 July 2023/Chapter 01 Introduction/001. Welcome to the Course.mp4 106.5 MB
Part 01 December 2022/Chapter 07 Cyber Warfare and Cyber Attacks Against Companies/003. Stuxnet and the Attack Against Iran.mp4 105.1 MB
Part 03 June 2023/Chapter 04 Mobile Security Apps/002. How to Use NordVPN.mp4 101.4 MB
Part 02 December 2022/Chapter 07 Social Engineering - Scams, Cons, Tricks, and Fraud/003. Reconnaissance Methods.mp4 94.3 MB
Part 04 July 2023/Chapter 03 Personal Security/005. Protecting Yourself Against SIM Card Swap Fraud.mp4 93.5 MB
Part 01 December 2022/Chapter 02 Hackers - Who Are They/006. Social Engineering.mp4 89.9 MB
Part 01 December 2022/Chapter 06 Cyber Security at the Workplace/005. The Security Versus Ease of Access Paradox.mp4 88.6 MB
Part 01 December 2022/Chapter 06 Cyber Security at the Workplace/003. BYOD Management.mp4 87.6 MB
Part 04 July 2023/Chapter 05 Mobile Security/005. How to Identify Legit Apps.mp4 86.0 MB
Part 01 December 2022/Chapter 01 General Introduction to IT and Cyber Security/002. Difference Between Information Security and Cyber Security.mp4 84.6 MB
Part 03 June 2023/Chapter 02 Understanding Applications/003. How to Identify Legit Apps and Spot Fake Apps.mp4 83.4 MB
猜你喜欢:
Beginners
Cybersecurity
Guide
Absolute
- 【影视】 [ WebToolTip.com ] Udemy - Building Cybersecurity Tools with AI (ChatGPT and DeepSeek)
-
收录时间:2025-05-08
文档个数:13
文档大小:339.2 MB
最近下载:2025-05-16
人气:889
磁力链接
~Get Your Files Here !/5 - PROJECTS/3 -Deep Web Footprint Tracker.mp4 82.9 MB
~Get Your Files Here !/5 - PROJECTS/1 -Suspicious Process Detector.mp4 76.8 MB
~Get Your Files Here !/6 - Deploying kivy app to Windows Platform/1 -Deploying kivy to windows.mp4 51.6 MB
~Get Your Files Here !/5 - PROJECTS/2 -Ransomware Scanner app.mp4 36.6 MB
~Get Your Files Here !/3 - Prompt Engineering For Cybersecurity and Gui Develepment/2 -Prompt Engineering 2.mp4 18.4 MB
~Get Your Files Here !/2 - Setting up the Environment/1 -Create main.py and kivy installation.mp4 16.3 MB
~Get Your Files Here !/2 - Setting up the Environment/2 -Testing kivy environment.mp4 14.9 MB
~Get Your Files Here !/1 - Introduction/1 -Introduction.mp4 14.7 MB
~Get Your Files Here !/3 - Prompt Engineering For Cybersecurity and Gui Develepment/1 -Prompt Engineering 1.mp4 12.1 MB
~Get Your Files Here !/4 - Debugging AI Generated code/2 -installing MISSING module Error (Demo).mp4 8.4 MB
~Get Your Files Here !/4 - Debugging AI Generated code/1 -Common Errors.mp4 6.6 MB
Get Bonus Downloads Here.url 180 Bytes
~Get Your Files Here !/Bonus Resources.txt 70 Bytes
猜你喜欢:
Building
WebToolTip
Cybersecurity
com
DeepSeek
Udemy
AI
ChatGPT
Tools
- 【影视】 Lynda - Cybersecurity Foundations
-
收录时间:2017-07-23
文档个数:28
文档大小:301.1 MB
最近下载:2025-05-16
人气:1753
磁力链接
00. Introduction/00_01 - Welcome.mp4 5.8 MB
00. Introduction/00_02 - What you should know.mp4 2.0 MB
01. Cybersecurity Foundations/01_01 - Understanding the NIST cybersecurity framework.mp4 12.8 MB
01. Cybersecurity Foundations/01_02 - Dissecting cyber risk.mp4 13.3 MB
01. Cybersecurity Foundations/01_03 - Unpacking COBIT 5.mp4 10.5 MB
01. Cybersecurity Foundations/01_04 - Looking closer at DSS05.mp4 8.2 MB
01. Cybersecurity Foundations/01_05 - Implementing control frameworks.mp4 14.6 MB
01. Cybersecurity Foundations/01_06 - Dissecting the payment card industry and PCI DSS.mp4 14.7 MB
01. Cybersecurity Foundations/01_07 - Exploring the Cyber Essentials framework.mp4 9.4 MB
02. Cybersecurity Threats/02_01 - Breaking down the cybersecurity kill chain.mp4 8.2 MB
02. Cybersecurity Threats/02_02 - Dissecting security threats.mp4 11.7 MB
02. Cybersecurity Threats/02_03 - Exploring cybercrime as an industry.mp4 10.1 MB
02. Cybersecurity Threats/02_04 - Hiding malware through cloaking and alternate data streams.mp4 9.0 MB
02. Cybersecurity Threats/02_05 - Using callbacks to capture keystrokes.mp4 9.7 MB
02. Cybersecurity Threats/02_06 - Hiding malware with rootkits.mp4 9.8 MB
02. Cybersecurity Threats/02_07 - Understanding advanced persistent threats (APTs).mp4 13.5 MB
02. Cybersecurity Threats/02_08 - Exploring ransomware.mp4 8.4 MB
03. Security Architecture/03_01 - Describing security requirements.mp4 14.9 MB
03. Security Architecture/03_02 - Architecting security risk.mp4 13.4 MB
03. Security Architecture/03_03 - Selecting security controls.mp4 8.5 MB
猜你喜欢:
Cybersecurity
Lynda
Foundations
- 【影视】 [FreeTutorials.Us] cybersecurity-ultimate-ethical-hacking-boot-camp
-
收录时间:2017-08-24
文档个数:53
文档大小:3.6 GB
最近下载:2025-05-16
人气:3681
磁力链接
01 Introduction to the Ultimate Ethical Hacking Boot Camp/attached_files/001 Welcome to the Ultimate Ethical Hacking Boot Camp/Equipment.pdf 131.3 kB
02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/Kali.Backgrounds.jpg 478.6 kB
02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/Server.2008.Backgrounds.jpg 480.5 kB
02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/win7.Backgrounds.jpg 480.5 kB
02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/win8.Backgrounds.jpg 480.2 kB
02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/winxp.Backgrounds.jpg 480.2 kB
08 Password Cracking/attached_files/037 Windows Password Cracking/Wordlist-Resources.pdf 59.0 kB
01 Introduction to the Ultimate Ethical Hacking Boot Camp/001 Welcome to the Ultimate Ethical Hacking Boot Camp.mp4 71.7 MB
01 Introduction to the Ultimate Ethical Hacking Boot Camp/002 What is Ethical Hacking.mp4 149.9 MB
01 Introduction to the Ultimate Ethical Hacking Boot Camp/003 Careers for Ethical Hackers.mp4 48.9 MB
01 Introduction to the Ultimate Ethical Hacking Boot Camp/004 Wireless Lab Setup Hack.mp4 62.6 MB
01 Introduction to the Ultimate Ethical Hacking Boot Camp/005 Wireless Hacking Module Disclaimer.mp4 38.8 MB
01 Introduction to the Ultimate Ethical Hacking Boot Camp/006 Interview Oracle Shodan CNN.mp4 278.0 MB
02 Hacking Lab Setup - Windows Mac Instructions/007 Introduction to Lab Setup.mp4 31.3 MB
02 Hacking Lab Setup - Windows Mac Instructions/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines..mp4 20.7 MB
02 Hacking Lab Setup - Windows Mac Instructions/009 Installing Windows XP.mp4 133.1 MB
02 Hacking Lab Setup - Windows Mac Instructions/010 Installing Server 2008.mp4 7.7 MB
02 Hacking Lab Setup - Windows Mac Instructions/011 Installing Kali Linux from ISO.mp4 33.5 MB
02 Hacking Lab Setup - Windows Mac Instructions/012 Installing Kali Linux Prebuild Virtual Machine.mp4 29.4 MB
02 Hacking Lab Setup - Windows Mac Instructions/013 Installing Windows 7.mp4 9.8 MB
猜你喜欢:
ethical
FreeTutorials
cybersecurity
camp
boot
Us
ultimate
hacking
- 【影视】 [ FreeCourseWeb.com ] CompTIA Cybersecurity Analyst + (CySA + ) (CS0-003) - 3 Incident Response and Management
-
收录时间:2023-12-17
文档个数:94
文档大小:348.1 MB
最近下载:2025-05-16
人气:5383
磁力链接
~Get Your Files Here !/05 - 4. Forensic Techniques/09 - Password forensics.mp4 19.8 MB
~Get Your Files Here !/05 - 4. Forensic Techniques/08 - Operating system analysis.mp4 15.5 MB
~Get Your Files Here !/05 - 4. Forensic Techniques/11 - Software forensics.mp4 15.2 MB
~Get Your Files Here !/05 - 4. Forensic Techniques/05 - File carving.mp4 13.1 MB
~Get Your Files Here !/05 - 4. Forensic Techniques/10 - Network forensics.mp4 11.3 MB
~Get Your Files Here !/02 - 1. Incident Response Programs/08 - Incident eradication and recovery.mp4 11.2 MB
~Get Your Files Here !/02 - 1. Incident Response Programs/01 - Build an incident response program.mp4 10.7 MB
~Get Your Files Here !/07 - 6. Disaster Recovery/01 - Disaster recovery.mp4 10.7 MB
~Get Your Files Here !/06 - 5. Business Continuity/03 - High availability and fault tolerance.mp4 10.4 MB
~Get Your Files Here !/04 - 3. Incident Investigation/01 - Logging security information.mp4 10.2 MB
~Get Your Files Here !/05 - 4. Forensic Techniques/04 - System and file forensics.mp4 10.0 MB
~Get Your Files Here !/05 - 4. Forensic Techniques/06 - Creating forensic images.mp4 10.0 MB
~Get Your Files Here !/03 - 2. Attack Frameworks/01 - MITRE ATT&CK.mp4 9.9 MB
~Get Your Files Here !/04 - 3. Incident Investigation/03 - Cloud audits and investigations.mp4 9.9 MB
~Get Your Files Here !/02 - 1. Incident Response Programs/10 - Post-incident activities.mp4 9.4 MB
~Get Your Files Here !/02 - 1. Incident Response Programs/04 - Incident identification.mp4 9.3 MB
~Get Your Files Here !/07 - 6. Disaster Recovery/04 - Disaster recovery sites.mp4 9.3 MB
~Get Your Files Here !/05 - 4. Forensic Techniques/15 - Ediscovery and evidence production.mp4 8.2 MB
~Get Your Files Here !/06 - 5. Business Continuity/02 - Business continuity controls.mp4 8.0 MB
~Get Your Files Here !/04 - 3. Incident Investigation/02 - Security information and event management.mp4 7.9 MB
猜你喜欢:
Management
Response
Cybersecurity
CySA
CS0
003
Incident
FreeCourseWeb
CompTIA
com
- 【影视】 [ FreeCourseWeb.com ] Cisco Certified Support Technician (CCST) - Cybersecurity
-
收录时间:2023-12-30
文档个数:40
文档大小:1.6 GB
最近下载:2025-05-16
人气:4474
磁力链接
~Get Your Files Here !/4. Endpoint Security Concepts/3. NTFS and share permissions.mp4 152.4 MB
~Get Your Files Here !/4. Endpoint Security Concepts/7. Patches and updates.mp4 84.6 MB
~Get Your Files Here !/2. Essential Security Principles/5. Secure passwords.mp4 74.3 MB
~Get Your Files Here !/4. Endpoint Security Concepts/4. Netstat, nslookup, tcpdump.mp4 70.3 MB
~Get Your Files Here !/4. Endpoint Security Concepts/5. Verify that endpoint systems meet security policies and standards.mp4 66.6 MB
~Get Your Files Here !/3. Basic network security concepts/11. VPN - lab.mp4 61.4 MB
~Get Your Files Here !/4. Endpoint Security Concepts/1. Windows Firewall.mp4 60.7 MB
~Get Your Files Here !/3. Basic network security concepts/8. IPS and IDS.mp4 57.8 MB
~Get Your Files Here !/3. Basic network security concepts/6. IP addresses and NAT.mp4 53.6 MB
~Get Your Files Here !/2. Essential Security Principles/1. Basic terms.mp4 50.7 MB
~Get Your Files Here !/2. Essential Security Principles/3. RADIUS.mp4 50.4 MB
~Get Your Files Here !/5. Incident Handling/3. Malware.mp4 45.2 MB
~Get Your Files Here !/3. Basic network security concepts/2. MAC and ARP.mp4 45.0 MB
~Get Your Files Here !/3. Basic network security concepts/1. Describe TCPIP protocol vulnerabilities.mp4 44.0 MB
~Get Your Files Here !/2. Essential Security Principles/8. Hashing.mp4 43.3 MB
~Get Your Files Here !/5. Incident Handling/2. Encryption.mp4 43.2 MB
~Get Your Files Here !/2. Essential Security Principles/7. Encryption.mp4 43.2 MB
~Get Your Files Here !/2. Essential Security Principles/9. Certificates.mp4 42.7 MB
~Get Your Files Here !/2. Essential Security Principles/2. Authentication, authorization, and accounting (AAA).mp4 39.6 MB
~Get Your Files Here !/5. Incident Handling/5. Confidentiality integrity availability.mp4 39.5 MB
猜你喜欢:
Cisco
Cybersecurity
Support
FreeCourseWeb
CCST
Technician
com
Certified
- 【影视】 Real-World Ethical Hacking Hands-on Cybersecurity
-
收录时间:2022-01-15
文档个数:290
文档大小:8.1 GB
最近下载:2025-05-16
人气:6983
磁力链接
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/14. Bonus Videos National Cyber Warrior Academy, Interviews and More/3. NCWA 2017 Facebook Live Video on Car Hacking and Drone Programming.mp4 947.8 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/9. BONUS Section Car Hacking in Kali Linux!/9. Car Hacking LIVE on Dr. Payne's VW Jetta Facebook Live Video from NCWA 2017.mp4 347.6 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/14. Bonus Videos National Cyber Warrior Academy, Interviews and More/5. Dr. Payne's TEDx Talk on Coding and Cyber as the New Literacy.mp4 320.6 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/5. Social Engineering Capturing Usernames and Passwords via Phishing/3. Cloning Facebook and Harvesting User Passwords.mp4 265.0 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/1. Real-World Ethical Hacking 1 Hacking Windows!/10. BONUS Mac Root Hack!.mp4 233.2 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/3. Important Linux and Windows Terminal Commands/2. Basic Linux Commands.mp4 195.0 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/13. Mobile Hacking on Android/2. Creating the Meterpreter Payload for Android.mp4 175.7 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/3. Important Linux and Windows Terminal Commands/4. More Helpful Linux Commands.mp4 170.6 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/4. Create a Virtual Network for Ethical Hacking!/3. Connecting Your VMs to the Host-Only Network.mp4 148.8 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/8. Hacking Win10 Command & Control Phase/4. Stealing Screenshots, Keystrokes, and ,Webcams.mp4 145.4 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/10. BONUS Hacking Windows 7 with Metasploit!/4. Creating an Exploit Payload with Metasploit.mp4 144.4 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/2. Create Your Own Virtual Hacking Lab!/4. Create an Android PhoneTablet VM for Mobile Hacking!.mp4 142.1 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/13. Mobile Hacking on Android/4. Advanced Android Exploits Accessing Storage, Downloading and Uploading Files.mp4 139.2 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/9. BONUS Section Car Hacking in Kali Linux!/8. BONUS Hacking the Car Hacking Software, to 1000 mph!.mp4 125.2 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/5. Social Engineering Capturing Usernames and Passwords via Phishing/7. Capturing the User's Login and Password in Kali.mp4 116.7 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/9. BONUS Section Car Hacking in Kali Linux!/5. The Replay Attack Replaying CAN Packets with CANplayer.mp4 116.0 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/11. Password Problems - Everybody's Got 'Em Hacking, Cracking, Snacking & Hijacking/3. Sniffing the Network Installing Wireshark.mp4 114.3 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/4. Create a Virtual Network for Ethical Hacking!/5. Updating Kali and Windows VMs.mp4 112.5 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/4. Create a Virtual Network for Ethical Hacking!/4. Creating and Using a Public NAT Network in VBox.mp4 112.5 MB
[TutsNode.com] - Real-World Ethical Hacking Hands-on Cybersecurity/11. Password Problems - Everybody's Got 'Em Hacking, Cracking, Snacking & Hijacking/6. Seven Things You Can Do for Safer Passwords.mp4 111.1 MB
猜你喜欢:
Real
Ethical
Cybersecurity
Hands
World
Hacking
- 【影视】 O`REILLY - The Complete Cybersecurity Bootcamp, 2nd Edition
-
收录时间:2024-12-25
文档个数:340
文档大小:6.7 GB
最近下载:2025-05-16
人气:234
磁力链接
Lesson 29 Hacking Mobile Platforms/003. 29.2 Hacking iOS.mp4 86.6 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/014. 17.13 Performing SMTP and DNS Enumeration.mp4 80.0 MB
Lesson 21 Fundamentals of Wireless Hacking/004. 21.3 Exploring Wireless Threats.mp4 79.0 MB
Lesson 33 Fundamentals of IoT Security/003. 33.2 Understanding IoT Attacks.mp4 76.8 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/015. 17.14 Conducting Additional Enumeration Techniques.mp4 75.8 MB
Lesson 33 Fundamentals of IoT Security/002. 33.1 Introducing IoT Concepts.mp4 74.4 MB
Lesson 29 Hacking Mobile Platforms/002. 29.1 Understanding Mobile Platform Attack Vectors.mp4 73.4 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/011. 17.1 Performing SNMP Enumeration.mp4 71.8 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/004. 17.3 Understanding Host Discovery.mp4 69.7 MB
Lesson 5 Fundamentals of Incident Response/007. 5.6 Analyzing Computer Incident Response Teams (CSIRTs).mp4 68.5 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/007. 17.6 Scanning Beyond IDS and Firewall.mp4 68.2 MB
Lesson 27 Hacking User Credentials/006. 27.5 Cracking Passwords with John the Ripper.mp4 66.1 MB
Lesson 7 Intrusion Event Categories/009. 7.8 Understanding the MITRE ATT&CK Framework.mp4 65.8 MB
Lesson 29 Hacking Mobile Platforms/004. 29.3 Hacking Android OS.mp4 63.8 MB
Lesson 20 SQL Injection/005. 20.4 Exploring SQL Injection Tools.mp4 63.3 MB
Lesson 21 Fundamentals of Wireless Hacking/003. 21.2 Understanding Wireless Encryption.mp4 62.7 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/013. 17.12 Performing NTP and NFS Enumeration.mp4 61.8 MB
Lesson 16 Information Gathering and Passive Reconnaissance/011. 16.10 Performing Footprinting through Social Engineering.mp4 59.1 MB
Lesson 8 Digital Forensics Fundamentals/004. 8.3 Understanding Evidence Collection.mp4 57.2 MB
Lesson 21 Fundamentals of Wireless Hacking/007. 21.6 Hacking Bluetooth.mp4 52.3 MB
猜你喜欢:
Complete
Cybersecurity
2nd
Edition
REILLY
Bootcamp
- 【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity Meets Ai - Essentials For 2024
-
收录时间:2024-12-23
文档个数:31
文档大小:205.7 MB
最近下载:2025-05-16
人气:723
磁力链接
~Get Your Files Here !/4 - AI in Cybersecurity/26 - AI for Automating Incident Response Case Study.mp4 47.6 MB
~Get Your Files Here !/4 - AI in Cybersecurity/25 - AIPowered Threat Detection Case Study.mp4 21.6 MB
~Get Your Files Here !/6 - AI and Cybersecurity in Action/29 - Practical Demonstration Threat Detection Using AI.mp4 21.1 MB
~Get Your Files Here !/5 - Cybersecurity for AI Systems/28 - Ethical Considerations.mp4 20.2 MB
~Get Your Files Here !/5 - Cybersecurity for AI Systems/27 - Protecting AI Models.mp4 18.0 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals/24 - Key Cybersecurity Practices.mp4 17.0 MB
~Get Your Files Here !/2 - Basics of Cybersecurity and AI/7 - Cybersecurity Basics.mp4 5.7 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals/16 - Ransomware.mp4 5.6 MB
~Get Your Files Here !/2 - Basics of Cybersecurity and AI/9 - Basics of AI Key AI Concepts.mp4 5.1 MB
~Get Your Files Here !/1 - Introduction/2 - Course Objectives.mp4 3.7 MB
~Get Your Files Here !/2 - Basics of Cybersecurity and AI/11 - Cybersecurity for AI Systems.mp4 3.7 MB
~Get Your Files Here !/2 - Basics of Cybersecurity and AI/10 - AIs Role in Cybersecurity.mp4 3.6 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals/12 - Part 1 What Are Cyber Threats.mp4 3.4 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals/23 - Summary.mp4 3.3 MB
~Get Your Files Here !/1 - Introduction/3 - Course Layout.mp4 3.1 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals/15 - Phishing.mp4 2.4 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals/20 - Part 3 How Cyber Threats Work.mp4 2.1 MB
~Get Your Files Here !/1 - Introduction/1 - Introduction.mp4 1.9 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals/22 - Part 5 Mitigating Cyber Threats.mp4 1.9 MB
~Get Your Files Here !/2 - Basics of Cybersecurity and AI/8 - Why Cybersecurity Matters.mp4 1.8 MB
猜你喜欢:
Meets
Essentials
Cybersecurity
Udemy
DevCourseWeb
Ai
2024
com
- 【影视】 [ CourseMega.com ] Linkedin - Building an ISO 27001-Compliant Cybersecurity Program - The Annex A Controls
-
收录时间:2022-03-29
文档个数:110
文档大小:1.2 GB
最近下载:2025-05-16
人气:5902
磁力链接
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/013. Access control User access management.mp4 60.8 MB
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/028. System lifecycle Security in d.mp4 57.3 MB
~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/017. Physical and environmental security Equipme.mp4 57.2 MB
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/014. Access control System and application.mp4 55.8 MB
~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/032. Management of information security.mp4 54.7 MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/018. Operations security Operational procedures and responsibili.mp4 47.1 MB
~Get Your Files Here !/12. Compliance (Clause A.18)/034. Compliance Compliance with legal and contractual requirements (Claus.mp4 46.5 MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/021. Operations security Logging and monitoring (Clause A.12.4).mp4 45.6 MB
~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/033. Information security continuity an.mp4 45.5 MB
~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/016. Physical and environmental security Secure.mp4 44.8 MB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/004. Contact with auth.mp4 42.7 MB
~Get Your Files Here !/08. Communications Security (Clause A.13)/026. Communications security Information transfer (Clause A..mp4 40.7 MB
~Get Your Files Here !/04. Asset Management (Clause A.8)/010. Asset management Information classification (Clause A.8.2).mp4 40.5 MB
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/027. System lifecycle Security requ.mp4 37.2 MB
~Get Your Files Here !/03. Human Resources Security (Clause A.7)/007. Human resources security During employment (Clause A.7..mp4 34.4 MB
~Get Your Files Here !/08. Communications Security (Clause A.13)/025. Communications security Network security management (Cl.mp4 34.1 MB
~Get Your Files Here !/04. Asset Management (Clause A.8)/009. Asset management Responsibility for assets (Clause A.8.1).mp4 33.3 MB
~Get Your Files Here !/10. Supplier Relationships (Clause A.15)/030. Supplier relationships Information security in supplier.mp4 31.4 MB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/002. Management direct.mp4 31.1 MB
~Get Your Files Here !/04. Asset Management (Clause A.8)/011. Asset management Media handling (Clause A.8.3).mp4 30.4 MB
猜你喜欢:
Building
Annex
Cybersecurity
Linkedin
27001
Compliant
Program
ISO
Controls
CourseMega
- 【影视】 [FreeCoursesOnline.Me] ITProTV - NIST Cybersecurity And Risk Management Frameworks
-
收录时间:2023-12-18
文档个数:61
文档大小:11.3 GB
最近下载:2025-05-16
人气:6534
磁力链接
2. NIST Cybersecurity and Publications.mp4 298.0 MB
26. Response Training and Testing.mp4 288.9 MB
24. Incident Response Plan Examples.mp4 279.3 MB
43. Documentation and Approval.mp4 277.5 MB
20. System Auditing and Logging.mp4 258.9 MB
23. Response Planning.mp4 255.7 MB
29. Backup and Recovery.mp4 251.4 MB
9. Inventory of Critical Assets.mp4 247.4 MB
46. Documenting Controls.mp4 246.5 MB
21. Monitoring and Alerting.mp4 238.7 MB
22. Assessments.mp4 238.7 MB
42. Control Allocation and Monitoring.mp4 234.0 MB
10. Business Impact Assessment.mp4 231.6 MB
40. NIST Control Documents.mp4 230.2 MB
36. Establishing Scope.mp4 227.5 MB
44. Security Control Implementation.mp4 225.8 MB
3. NIST Relationships.mp4 222.6 MB
6. The Vocabulary of Risk.mp4 222.0 MB
25. Digital Forensics.mp4 219.4 MB
51. Assessment Documentation.mp4 219.2 MB
猜你喜欢:
FreeCoursesOnline
Me
Management
Risk
Cybersecurity
ITProTV
Frameworks
NIST
- 【影视】 [GigaCourse.Com] ZeroToMastery - Complete Cybersecurity Bootcamp
-
收录时间:2024-02-21
文档个数:107
文档大小:3.6 GB
最近下载:2025-05-16
人气:1264
磁力链接
8-Network Security/052-Network Security With Nmap.mp4 169.9 MB
5-Security Bugs & Vulnerabilities/020-Buffer Overflow Demonstration.mp4 136.7 MB
12-Appendix - Ethical Hacking/087-Msfconsole Basic Commands.mp4 97.5 MB
8-Network Security/059-Wireless Attack Demonstration.mp4 93.4 MB
7-End-Point Protection/034-Password Security and Password Managers.mp4 84.2 MB
12-Appendix - Ethical Hacking/093-Meterpreter Basic Commands Part 1.mp4 78.5 MB
7-End-Point Protection/038-Process Explorer.mp4 75.8 MB
1-Introduction/001-Cybersecurity Bootcamp - Zero to Mastery.mp4 72.4 MB
8-Network Security/057-Secure Network Architecture.mp4 66.8 MB
12-Appendix - Ethical Hacking/094-Meterpreter Basic Commands Part 2.mp4 65.7 MB
7-End-Point Protection/033-Bitdefender, Kaspersky, McAfee, Malwarebytes.mp4 63.9 MB
4-Understanding Hackers - The Biggest Threat/012-Most Common Attacks Demonstration.mp4 63.5 MB
8-Network Security/060-Network Monitoring With TCPDump.mp4 62.7 MB
8-Network Security/058-Wireless Security.mp4 59.6 MB
5-Security Bugs & Vulnerabilities/017-Unpatched Machine Exploitation Demonstration.mp4 59.1 MB
12-Appendix - Ethical Hacking/080-Whatweb Stealthy Scan.mp4 58.1 MB
12-Appendix - Ethical Hacking/091-Advance Msfvenom Usage.mp4 51.4 MB
7-End-Point Protection/043-Iptables.mp4 50.9 MB
7-End-Point Protection/028-Brave Browser Security and Privacy.mp4 50.6 MB
12-Appendix - Ethical Hacking/089-Software Vulnerability - Samba Exploitation.mp4 49.5 MB
猜你喜欢:
Complete
Cybersecurity
Bootcamp
GigaCourse
ZeroToMastery
Com
- 【影视】 MS Cybersecurity Pro Track Windows 10 Security Features
-
收录时间:2021-05-12
文档个数:58
文档大小:1.1 GB
最近下载:2025-05-16
人气:1552
磁力链接
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/1. Introduction/3. Preparing the Lab Environment.mp4 99.9 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/4. Windows 10 software security features - Part 1/1. Windows Defender Firewall and Virtual Secure Mode.mp4 95.3 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/4. Windows 10 software security features - Part 1/2. Credential Guard and Bitlocker.mp4 91.4 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/6. Windows 10 New Security Features and Capabilities/3. Ransomware Case Study.mp4 87.4 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/6. Windows 10 New Security Features and Capabilities/2. Other Security Features and Capabilities.mp4 77.3 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/3. How Windows 10 uses modern hardware features for security/3. Additional Hardware Security.mp4 76.7 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/6. Windows 10 New Security Features and Capabilities/1. Windows Hello and Hello for Business.mp4 68.3 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/5. Windows 10 software security features - Part 2/3. AppLocker with Device Guard.mp4 67.5 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/4. Windows 10 software security features - Part 1/3. Antivirus and WIndows Information Protection.mp4 67.5 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/5. Windows 10 software security features - Part 2/4. Windows Defender SmartScreen and WIndows 10 Telemetry.mp4 60.0 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/3. How Windows 10 uses modern hardware features for security/1. Secure Boot Process.mp4 58.6 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/3. How Windows 10 uses modern hardware features for security/2. Secure Boot to Trusted Boot.mp4 52.0 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/5. Windows 10 software security features - Part 2/2. Device Guard.mp4 46.9 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/5. Windows 10 software security features - Part 2/1. Windows Defender Remote Credential Guard.mp4 44.0 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/1. Introduction/2. About the Course.mp4 34.8 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/2. Built-in Windows 10 defenses/1. Evolution of attacks.mp4 24.7 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/1. Introduction/1. Instructor Introduction.mp4 10.7 MB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/4. Windows 10 software security features - Part 1/1.2 Windows PowerShell networking cmdlets.pdf 405.1 kB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/6. Windows 10 New Security Features and Capabilities/1. Windows Hello and Hello for Business.srt 23.8 kB
[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/4. Windows 10 software security features - Part 1/1. Windows Defender Firewall and Virtual Secure Mode.srt 23.3 kB
猜你喜欢:
10
Features
Cybersecurity
Pro
Track
Windows
MS
Security
- 【影视】 Lynda - Cybersecurity for IT Professionals
-
收录时间:2017-07-25
文档个数:45
文档大小:303.6 MB
最近下载:2025-05-16
人气:5438
磁力链接
00. Introduction/00_01 - Welcome.mp4 6.3 MB
00. Introduction/00_02 - What you should know before watching this course.mp4 869.2 kB
00. Introduction/00_03 - Using the exercise files.mp4 950.7 kB
01. Why Cybersecurity/01_01 - Hackers and the kill chain.mp4 14.3 MB
01. Why Cybersecurity/01_02 - The Stuxnet kill chain.mp4 8.9 MB
01. Why Cybersecurity/01_03 - Common forms of cybersecurity attack.mp4 14.1 MB
02. Antivirus/02_01 - Viruses, spyware, and adware.mp4 4.0 MB
02. Antivirus/02_02 - Using Windows Defender.mp4 3.1 MB
02. Antivirus/02_03 - Setting up real-time protection.mp4 1.0 MB
02. Antivirus/02_04 - Scanning with Windows Defender.mp4 4.3 MB
02. Antivirus/02_05 - Modifying antivirus settings in Windows Defender.mp4 5.8 MB
02. Antivirus/02_06 - Scheduling a scan with Windows Defender.mp4 9.7 MB
02. Antivirus/02_07 - Using Windows Defender offline.mp4 1.9 MB
02. Antivirus/02_08 - Exploring antivirus on Linux.mp4 1.7 MB
03. Personal Firewalls/03_01 - Why firewalls.mp4 1.5 MB
03. Personal Firewalls/03_02 - Using the Microsoft Windows Firewall.mp4 12.9 MB
03. Personal Firewalls/03_03 - Setting up advanced security notifications.mp4 9.5 MB
03. Personal Firewalls/03_04 - Setting up detailed rules.mp4 10.9 MB
03. Personal Firewalls/03_05 - Managing and analyzing log files with ZedLan.mp4 8.4 MB
03. Personal Firewalls/03_06 - Introducing iptables in Linux.mp4 10.7 MB
猜你喜欢:
Cybersecurity
Lynda
Professionals
- 【影视】 Cybersecurity Fundamentals - Become a Security Expert
-
收录时间:2023-12-18
文档个数:127
文档大小:6.5 GB
最近下载:2025-05-16
人气:8769
磁力链接
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/3. Passwords, MFA and Good Practices/2. Password Security.mp4 337.8 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/11. Test Your Environment/2. Penetration Testing Fundamentals.mp4 297.2 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/5. Protecting Servers, Computers + Smart Devices/1. Protect Your Device - Server Security.mp4 264.2 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/9. Get Compliant/1. Cybersecurity Regulations and Standards.mp4 252.5 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/6. Security When Online/3. Cloud Security.mp4 245.8 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/5. Protecting Servers, Computers + Smart Devices/4. Protect Your Device - iPhone Security.mp4 245.2 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/4. Using Firewalls, VPN, IDS/1. Network Security Top Tips.mp4 243.1 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/3. Passwords, MFA and Good Practices/1. Software Updates.mp4 234.8 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/5. Protecting Servers, Computers + Smart Devices/2. Protect Your Device - Desktop + Laptop Security.mp4 230.4 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/5. Protecting Servers, Computers + Smart Devices/5. 03 Protect Your Device - iPad Security.mp4 228.5 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/10. Training and Certifications/2. Cybersecurity Awareness and Training.mp4 227.9 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/10. Training and Certifications/1. Cybersecurity Certifications.mp4 214.9 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/2. Cybersecurity Threats and Attacks/4. Social Engineering.mp4 207.5 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/2. Cybersecurity Threats and Attacks/1. Threat and Attack Types.mp4 204.6 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/9. Get Compliant/2. Disaster Recovery and Business Continuity Planning.mp4 178.0 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/5. Protecting Servers, Computers + Smart Devices/3. Protect Your Device - macOS Security.mp4 169.2 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/6. Security When Online/1. Best Ways to Stay Safe Online.mp4 165.0 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/2. Cybersecurity Threats and Attacks/2. Malware.mp4 149.8 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/3. Passwords, MFA and Good Practices/4. Multi-Factor Authentication.mp4 145.9 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/3. Passwords, MFA and Good Practices/6. Setting up Data Encryption on Windows and Mac.mp4 143.8 MB
猜你喜欢:
Cybersecurity
Fundamentals
Security
Expert
Become
- 【影视】 Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training
-
收录时间:2023-12-24
文档个数:135
文档大小:2.5 GB
最近下载:2025-05-16
人气:10233
磁力链接
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/6. Azure Security Benchmark - Microsoft Certified Cybersecurity-1.mp4 113.5 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/2. Hybrid Environmental Security Strategies - Microsoft Certifi.mp4 63.8 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/1. Specify Priorities for Mitigating Threats to Apps - Microsof-1.mp4 62.3 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/6. Designing a Regulatory Compliance Strategy/4. Implementing Azure Policy - Microsoft Certified Cybersecurit.mp4 59.0 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/7. Evaluating and Managing Security Postures/6. Mitigating Identified Risks - Microsoft Certified Cybersecur-1.mp4 53.6 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/4. Traffic Filtering and Segmentation Strategies - Microsoft Ce-1.mp4 53.4 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/4. Priorities For Mitigating Threats To Data - Microsoft Certif-1.mp4 53.4 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/5. Azure Best Practices for Network Security - Microsoft Certif-1.mp4 52.2 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/5. Hybrid Infrastructure - Microsoft Certified Cybersecurity Ar-1.mp4 50.4 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/6. Designing a Regulatory Compliance Strategy/6. Translating Privacy Requirements - Microsoft Certified Cyber.mp4 49.7 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/9. Designing a Strategy for Securing SaaS, PaaS, and IaaS Services/1. Security Baselines for SaaS, PaaS, and IaaS services - Micro.mp4 48.3 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/3. Translating Business Goals into Security Requirements - Micr.mp4 47.9 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/7. Securing Privileged Access Using RaMP - Microsoft Certified -1.mp4 47.8 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/2. Security Operations - Microsoft Certified Cybersecurity Arch-1.mp4 47.0 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/4. Designing a Security Operations Strategy/5. SIEMSOAR Strategy - Microsoft Certified Cybersecurity Archit.mp4 46.3 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/2. Translating Requirements - Microsoft Certified Cybersecurity.mp4 46.2 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/3. Security Strategy for Applications and APIs - Microsoft Cert-1.mp4 44.6 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/5. Designing an Identity Security Strategy/1. Strategy for Access to Cloud Resources - Microsoft Certified.mp4 43.0 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/7. Evaluating and Managing Security Postures/4. Designing Security for an Azure Landing Zone - Microsoft Cer.mp4 42.8 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/4. Designing a Security Operations Strategy/3. Logging and Auditing Strategy - Microsoft Certified Cybersec.mp4 42.3 MB
猜你喜欢:
Microsoft
Training
Expert
Certification
Cybersecurity
Architect
SC
100
Certified