为您索检到186条磁力链接,耗时1毫秒。
- 【影视】 Thinking about Cybersecurity From Cyber Crime to Cyber Warfare
-
收录时间:2023-12-20
文档个数:39
文档大小:8.8 GB
最近下载:2025-05-16
人气:4027
磁力链接
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/18 Looking Forward-What Does the Future Hold.mp4 535.2 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/10 International Governance and the Internet.mp4 521.6 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/14 Listening In and Going Dark.mp4 516.5 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/08 Nations at Cyber War.mp4 496.5 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/05 The Problem of Identity on the Network.mp4 495.7 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/13 Privacy for the Cyber Age.mp4 494.0 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/11 The Constitution and Cyberspace.mp4 489.6 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/17 Critical Infrastructure and Resiliency.mp4 489.1 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/01 Stuxnet-The First Cyber Guided Missile.mp4 486.4 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/04 Of Viruses, Botnets, and Logic Bombs.mp4 483.5 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/09 Government Regulation of Cyberspace.mp4 478.0 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/12 Big Data- They Know Everything about You.mp4 474.5 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/15 The Devil in the Chips-Hardware Failures.mp4 473.9 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/16 Protecting Yourself in Cyberspace.mp4 471.4 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/06 Cyber Fraud, Theft, and Organized Crime.mp4 470.0 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/07 Hacktivists and Insurgency.mp4 469.1 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/02 The Incredible Scope of Cyberspace.mp4 456.9 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/03 The Five Gateways of Internet Vulnerability.mp4 448.1 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/NA NA.mp4 20.8 MB
.pad/9 915.0 kB
猜你喜欢:
Cyber
about
Warfare
Thinking
Crime
Cybersecurity
- 【影视】 [ FreeCourseWeb.com ] Udemy - Cybersecurity Foundation
-
收录时间:2022-01-09
文档个数:18
文档大小:2.3 GB
最近下载:2025-05-16
人气:1583
磁力链接
~Get Your Files Here !/6. Continuous Risk Awareness and Monitoring/2. Malware Attacks and Defenses.mp4 328.2 MB
~Get Your Files Here !/4. Identify and Access Management & Data Security/3. User Identification, Authentication, and Session Protection.mp4 259.5 MB
~Get Your Files Here !/6. Continuous Risk Awareness and Monitoring/1. Risk Management.mp4 235.0 MB
~Get Your Files Here !/8. Cloud Platforms and Data Management/1. Cloud Computing.mp4 228.7 MB
~Get Your Files Here !/7. Cyber Hygiene/1. Cyber Hygiene.mp4 179.6 MB
~Get Your Files Here !/4. Identify and Access Management & Data Security/1. Business, Governance.mp4 166.2 MB
~Get Your Files Here !/5. Data and Information Lifecycle Process/2. Data and Information Lifecycle Process - Part 2.mp4 159.0 MB
~Get Your Files Here !/5. Data and Information Lifecycle Process/1. Data and Information Lifecycle Process - Part 1.mp4 158.9 MB
~Get Your Files Here !/4. Identify and Access Management & Data Security/4. Access Control Authorization Systems.mp4 143.3 MB
~Get Your Files Here !/8. Cloud Platforms and Data Management/2. Leveraging the Cloud for Business and Traffic Light Protocol.mp4 133.7 MB
~Get Your Files Here !/4. Identify and Access Management & Data Security/2. Access control concepts.mp4 116.0 MB
~Get Your Files Here !/2. Confidentiality, Integrity, and Availability (CIA)/1. Confidentiality, Integrity, and Availability (CIA).mp4 83.3 MB
~Get Your Files Here !/9. Summary/1. Summary.mp4 65.3 MB
~Get Your Files Here !/3. Information security and Cybersecurity Definitions/1. Information security and Cybersecurity Definitions.mp4 60.1 MB
~Get Your Files Here !/1. Introduction/1. Introduction.mp4 8.7 MB
~Get Your Files Here !/2. Data and Information Lifecycle Process - Part 2.jpeg 197.8 kB
~Get Your Files Here !/Bonus Resources.txt 357 Bytes
Get Bonus Downloads Here.url 183 Bytes
猜你喜欢:
Cybersecurity
com
FreeCourseWeb
Foundation
Udemy
- 【影视】 [ CourseLala.com ] Linkedin - Cybersecurity Careers - Getting Started as a CISO
-
收录时间:2023-12-18
文档个数:34
文档大小:893.5 MB
最近下载:2025-05-16
人气:1242
磁力链接
~Get Your Files Here !/01 - Introduction/02 - You need a foundational knowledge of cyber security.mp4 76.1 MB
~Get Your Files Here !/05 - 4. CISO Best Practices/01 - Relationship building.mp4 73.1 MB
~Get Your Files Here !/03 - 2. Getting Hired and Getting Started/04 - First 90 days.mp4 70.3 MB
~Get Your Files Here !/03 - 2. Getting Hired and Getting Started/03 - The CISO interview.mp4 68.6 MB
~Get Your Files Here !/04 - 3. Building Your Strategic Plan/03 - Prioritize areas for improvement.mp4 66.4 MB
~Get Your Files Here !/03 - 2. Getting Hired and Getting Started/01 - Before the interview.mp4 66.0 MB
~Get Your Files Here !/04 - 3. Building Your Strategic Plan/01 - Select a security framework.mp4 62.2 MB
~Get Your Files Here !/04 - 3. Building Your Strategic Plan/02 - Complete an assessment.mp4 61.5 MB
~Get Your Files Here !/02 - 1. About the Role/02 - What type of CISO do you want to be.mp4 61.2 MB
~Get Your Files Here !/05 - 4. CISO Best Practices/02 - PRIME framework.mp4 56.9 MB
~Get Your Files Here !/02 - 1. About the Role/01 - What does a CISO do.mp4 54.6 MB
~Get Your Files Here !/04 - 3. Building Your Strategic Plan/05 - Put it on paper and socialize.mp4 48.5 MB
~Get Your Files Here !/06 - Conclusion/01 - Make the CISO dream come true.mp4 46.4 MB
~Get Your Files Here !/03 - 2. Getting Hired and Getting Started/02 - The CISO resume.mp4 39.6 MB
~Get Your Files Here !/04 - 3. Building Your Strategic Plan/04 - Set a mission and vision for your department.mp4 27.7 MB
~Get Your Files Here !/01 - Introduction/01 - So you want to be a CISO.mp4 14.5 MB
~Get Your Files Here !/04 - 3. Building Your Strategic Plan/01 - Select a security framework.srt 8.2 kB
~Get Your Files Here !/03 - 2. Getting Hired and Getting Started/01 - Before the interview.srt 7.4 kB
~Get Your Files Here !/01 - Introduction/02 - You need a foundational knowledge of cyber security.srt 6.5 kB
~Get Your Files Here !/02 - 1. About the Role/02 - What type of CISO do you want to be.srt 6.5 kB
猜你喜欢:
Getting
Cybersecurity
CourseLala
Linkedin
Started
CISO
com
Careers
- 【影视】 [FreeCourseSite.com] Udemy - The Complete Certified in Cybersecurity (CC) course ISC2 '23
-
收录时间:2023-12-18
文档个数:294
文档大小:5.8 GB
最近下载:2025-05-16
人气:10921
磁力链接
07 - Domain recaps/004 Domain 4 recap Certified in Cybersecurity (CC).mp4 427.8 MB
07 - Domain recaps/005 Domain 5 recap Certified in Cybersecurity (CC).mp4 169.4 MB
07 - Domain recaps/001 Domain 1 recap Certified in Cybersecurity (CC).mp4 126.1 MB
08 - The study process, material, tips, tricks and practice tests!/006 How to approach practice questions.mp4 124.3 MB
05 - Domain 4 Network Security/004 The OSI Model - Part 1.mp4 105.9 MB
07 - Domain recaps/003 Domain 3 recap Certified in Cybersecurity (CC).mp4 92.9 MB
06 - Domain 5 Security Operations/013 Administrative (Directive) Controls.mp4 92.2 MB
07 - Domain recaps/002 Domain 2 recap Certified in Cybersecurity (CC).mp4 91.8 MB
05 - Domain 4 Network Security/038 Virtualization, Cloud, and Distributed Computing - Part 5.mp4 91.7 MB
04 - Domain 3 Access Controls Concepts/011 Logical Access Control - Part 5.mp4 85.1 MB
04 - Domain 3 Access Controls Concepts/009 Logical Access Control - Part 3.mp4 82.3 MB
02 - Domain 1 Security Principles/024 Laws and regulations - part 1.mp4 81.2 MB
08 - The study process, material, tips, tricks and practice tests!/007 How to design your career and certification path.mp4 78.0 MB
02 - Domain 1 Security Principles/011 IAAA -Identification, Authentication, Authorization, and Accountability - part 4.mp4 71.2 MB
05 - Domain 4 Network Security/025 Attacks and attackers - Part 3.mp4 67.7 MB
03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/008 DRP - Disaster Recovery Planning - Part 4.mp4 67.6 MB
02 - Domain 1 Security Principles/026 Security governance principles.mp4 63.2 MB
05 - Domain 4 Network Security/037 Virtualization, Cloud, and Distributed Computing - Part 4.mp4 61.4 MB
05 - Domain 4 Network Security/041 Electricity.mp4 61.0 MB
05 - Domain 4 Network Security/049 Secure design principles - Part 1.mp4 60.1 MB
猜你喜欢:
Complete
FreeCourseSite
course
Cybersecurity
23
ISC2
Udemy
CC
com
Certified
- 【影视】 [FreeCoursesOnline.Me] O`REILLY - Building a Career in Cybersecurity
-
收录时间:2023-12-18
文档个数:75
文档大小:847.7 MB
最近下载:2025-05-16
人气:4418
磁力链接
Lesson 1 Getting Started in the Cybersecurity Field/005. 1.4 Cybersecurity Skills.mp4 65.3 MB
Lesson 2 Planning Your Cybersecurity Career/004. 2.3 The Value of Professional Certifications.mp4 60.1 MB
Lesson 3 Creating Your Own Lab/003. 3.2 Foundational Lab.mp4 48.0 MB
Lesson 5 Preparing for Your Interview/005. 5.4 Final Tips.mp4 44.9 MB
Lesson 6 Using Continuous Improvement Strategy/007. 6.6 Growing Your Career as a Remote Worker.mp4 40.3 MB
Lesson 2 Planning Your Cybersecurity Career/003. 2.2 Creating and Tracking Your Plan.mp4 36.8 MB
Lesson 5 Preparing for Your Interview/003. 5.2 Preparing for the Interview.mp4 35.5 MB
Lesson 1 Getting Started in the Cybersecurity Field/006. 1.5 Navigating through the Industry.mp4 31.9 MB
Lesson 2 Planning Your Cybersecurity Career/002. 2.1 Establishing a Plan.mp4 31.3 MB
Lesson 6 Using Continuous Improvement Strategy/008. 6.7 What’s Next.mp4 31.0 MB
Lesson 1 Getting Started in the Cybersecurity Field/004. 1.3 Cybersecurity Jobs.mp4 30.3 MB
Lesson 5 Preparing for Your Interview/004. 5.3 Advancing in the Interview Process.mp4 29.3 MB
Lesson 6 Using Continuous Improvement Strategy/006. 6.5 Keeping a Good Work-life Balance.mp4 28.2 MB
Lesson 3 Creating Your Own Lab/005. 3.4 Enabling and Using Microsoft Defender for Cloud.mp4 27.7 MB
Introduction/001. Building a Career in Cybersecurity Introduction.mp4 25.1 MB
Lesson 6 Using Continuous Improvement Strategy/003. 6.2 Responsibilities and Expectations.mp4 24.6 MB
Lesson 4 Expanding Your Networking/005. 4.4 Using LinkedIn to Expand Your Network.mp4 24.5 MB
Lesson 1 Getting Started in the Cybersecurity Field/003. 1.2 Roles and Responsibilities.mp4 22.1 MB
Lesson 4 Expanding Your Networking/002. 4.1 Understanding the Cybersecurity Community.mp4 21.9 MB
Lesson 4 Expanding Your Networking/003. 4.2 Identifying Opportunities to Contribute with the Cybersecurity Community.mp4 19.3 MB
猜你喜欢:
FreeCoursesOnline
Me
Cybersecurity
Career
REILLY
Building
- 【影视】 Advanced Cybersecurity and Ethical Hacking with ChatGPT
-
收录时间:2023-12-25
文档个数:185
文档大小:1.5 GB
最近下载:2025-05-16
人气:13554
磁力链接
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/15 - CTF Challenges and Capture The Flag Events/48 - Introduction to Capture The Flag CTF Challenges.mp4 50.2 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/16 - Final Projects and Practical Assessments/52 - Building a Security Automation Workflow with ChatGPT.mp4 48.9 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/17 - Professional Development and Career Insights/55 - Navigating the Job Market and Advancing Your Cybersecurity Career.mp4 44.4 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/16 - Final Projects and Practical Assessments/53 - Penetration Testing Report Compilation with ChatGPT.mp4 39.3 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/17 - Professional Development and Career Insights/54 - Resume Building and Interview Preparation for Ethical Hackers.mp4 38.3 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/2 - Foundations of Cybersecurity and Hacking/7 - Operating System Fundamentals for Hacking and Penetration Testing.mp4 37.8 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/15 - CTF Challenges and Capture The Flag Events/49 - Solving CTF Challenges Using ChatGPT.mp4 37.3 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/5 - Vulnerability Identification and Assessment/17 - Network Vulnerability Scanning and Analysis with ChatGPT.mp4 36.8 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/1 - Section 1 Introduction to Cybersecurity and Ethical Hacking/4 - Understanding the Role of Ethical Hackers and Penetration Testers.mp4 36.4 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/11 - Case Studies and RealWorld Scenarios/36 - Ethical Hacking Case Studies Using ChatGPT.mp4 36.0 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/6 - Exploitation and Penetration Testing/21 - Penetration Testing Methodologies and Reporting.mp4 35.7 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/6 - Exploitation and Penetration Testing/20 - PostExploitation Techniques and Privilege Escalation.mp4 34.6 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/14 - Ethical Hacking in Cloud Environments/46 - Securing Containers and Serverless Architectures.mp4 34.5 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/3 - Getting Started with ChatGPT/10 - Setting Up and Configuring ChatGPT for Hacking Tasks.mp4 34.3 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/10 - Emerging Trends and Future of Cybersecurity/32 - Blockchain Security and Decentralized Technologies.mp4 33.2 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/13 - Cybersecurity Regulations and Compliance/43 - Conducting Compliance Audits with ChatGPT.mp4 33.0 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/7 - Advanced Ethical Hacking Techniques/24 - Wireless Network Hacking and Countermeasures Using ChatGPT.mp4 31.7 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/5 - Vulnerability Identification and Assessment/16 - Web Application Vulnerability Assessment Using ChatGPT.mp4 30.5 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/9 - ChatGPT for Security Innovation/28 - Leveraging ChatGPT for Threat Hunting and Analysis.mp4 30.1 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/3 - Getting Started with ChatGPT/11 - Navigating the ChatGPT Interface for Cybersecurity Analysis.mp4 28.8 MB
猜你喜欢:
Cybersecurity
Ethical
Hacking
ChatGPT
Advanced
- 【影视】 [ WebToolTip.com ] Udemy - Implement Version 2 Of Nist Cybersecurity Framework
-
收录时间:2025-04-06
文档个数:45
文档大小:1.9 GB
最近下载:2025-05-16
人气:944
磁力链接
~Get Your Files Here !/1 - Introduction to the NIST Cyber Security Framework/2 - Business Value of Framework.mp4 147.0 MB
~Get Your Files Here !/1 - Introduction to the NIST Cyber Security Framework/1 - Introduction.mp4 144.2 MB
~Get Your Files Here !/1 - Introduction to the NIST Cyber Security Framework/3 - Who Can Use The Framework.mp4 139.6 MB
~Get Your Files Here !/5 - Implementing Phase Two of the CRMAP/34 - Business Value Analysis.mp4 106.8 MB
~Get Your Files Here !/4 - Implementing Phase One of the CRMAP/28 - Conduct Interviews.mp4 72.2 MB
~Get Your Files Here !/7 - Conclusion/43 - BONUS Conclusion.mp4 72.1 MB
~Get Your Files Here !/5 - Implementing Phase Two of the CRMAP/32 - Close Your Gaps.mp4 70.9 MB
~Get Your Files Here !/4 - Implementing Phase One of the CRMAP/29 - Compile and Analyze Scores.mp4 68.2 MB
~Get Your Files Here !/6 - Implementing Phase Three of the CRMAP/41 - Quarterly Reviews.mp4 65.1 MB
~Get Your Files Here !/5 - Implementing Phase Two of the CRMAP/36 - Internal Marketing.mp4 64.3 MB
~Get Your Files Here !/4 - Implementing Phase One of the CRMAP/24 - Get BuyIn.mp4 62.7 MB
~Get Your Files Here !/3 - Real World Case Studies/17 - Cimpress Promotional Products.mp4 61.5 MB
~Get Your Files Here !/2 - Understanding the NIST Cybersecurity Framework/9 - Govern Function and Activities.mp4 59.1 MB
~Get Your Files Here !/6 - Implementing Phase Three of the CRMAP/39 - Phase Three Overview.mp4 50.6 MB
~Get Your Files Here !/6 - Implementing Phase Three of the CRMAP/40 - Monthly Checkins.mp4 46.0 MB
~Get Your Files Here !/2 - Understanding the NIST Cybersecurity Framework/11 - Protect Function and Activities.mp4 41.4 MB
~Get Your Files Here !/4 - Implementing Phase One of the CRMAP/26 - Generate Questionnaire.mp4 40.7 MB
~Get Your Files Here !/1 - Introduction to the NIST Cyber Security Framework/4 - Understanding the Core.mp4 38.5 MB
~Get Your Files Here !/3 - Real World Case Studies/18 - University of Kansas Medical Center.mp4 38.0 MB
~Get Your Files Here !/5 - Implementing Phase Two of the CRMAP/37 - External Marketing.mp4 36.4 MB
猜你喜欢:
WebToolTip
Cybersecurity
Udemy
Framework
Version
Implement
com
Nist
- 【影视】 [CourseClub.Me] ITProTV - NIST Cybersecurity And Risk Management Frameworks
-
收录时间:2024-01-03
文档个数:61
文档大小:11.3 GB
最近下载:2025-05-16
人气:3755
磁力链接
2. NIST Cybersecurity and Publications.mp4 298.0 MB
26. Response Training and Testing.mp4 288.9 MB
24. Incident Response Plan Examples.mp4 279.3 MB
43. Documentation and Approval.mp4 277.5 MB
20. System Auditing and Logging.mp4 258.9 MB
23. Response Planning.mp4 255.7 MB
29. Backup and Recovery.mp4 251.4 MB
9. Inventory of Critical Assets.mp4 247.4 MB
46. Documenting Controls.mp4 246.5 MB
21. Monitoring and Alerting.mp4 238.7 MB
22. Assessments.mp4 238.7 MB
42. Control Allocation and Monitoring.mp4 234.0 MB
10. Business Impact Assessment.mp4 231.6 MB
40. NIST Control Documents.mp4 230.2 MB
36. Establishing Scope.mp4 227.5 MB
44. Security Control Implementation.mp4 225.8 MB
3. NIST Relationships.mp4 222.6 MB
6. The Vocabulary of Risk.mp4 222.0 MB
25. Digital Forensics.mp4 219.4 MB
51. Assessment Documentation.mp4 219.2 MB
猜你喜欢:
Me
Management
Risk
Cybersecurity
ITProTV
Frameworks
NIST
CourseClub
- 【影视】 Microsoft Cybersecurity Pro Track Managing Identity
-
收录时间:2021-03-09
文档个数:34
文档大小:850.9 MB
最近下载:2025-05-16
人气:1812
磁力链接
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/03 Securing Active Directory/006 Active Directory Security.mp4 212.7 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/05 Active Directory & Kerberos Protocol/009 Authentication and Authorization in Active Directory.mp4 155.1 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/04 Azure Active Directory (AAD)/008 Azure Security Architecture.mp4 122.3 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/01 Introduction/003 Preparing the Lab Environment.mp4 92.3 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/02 Managing Identity/005 Security Privileged Access Roadmap Stage 2.mp4 81.3 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/02 Managing Identity/004 Identity as a Service, the new Control Plane.mp4 76.2 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/04 Azure Active Directory (AAD)/007 Identity Federation and Access Solutions for the Cloud.mp4 63.6 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/01 Introduction/002 About the Course.mp4 33.8 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/01 Introduction/001 Instructor Introduction.mp4 11.0 MB
.pad/3 488.8 kB
.pad/4 442.3 kB
.pad/2 358.5 kB
.pad/6 355.4 kB
.pad/5 338.9 kB
.pad/7 245.6 kB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/03 Securing Active Directory/006 Active Directory Security.en.srt 56.2 kB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/05 Active Directory & Kerberos Protocol/009 Authentication and Authorization in Active Directory.en.srt 53.0 kB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/04 Azure Active Directory (AAD)/008 Azure Security Architecture.en.srt 37.5 kB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/02 Managing Identity/005 Security Privileged Access Roadmap Stage 2.en.srt 26.4 kB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/01 Introduction/003 Preparing the Lab Environment.en.srt 24.9 kB
猜你喜欢:
Cybersecurity
Pro
Managing
Track
Microsoft
Identity
- 【影视】 [ WebToolTip.com ] Udemy - ISACA Cybersecurity Fundamentals - Complete Training Course
-
收录时间:2025-03-07
文档个数:45
文档大小:858.9 MB
最近下载:2025-05-16
人气:2781
磁力链接
~Get Your Files Here !/2 - Types of Security/4 -Cybersecurity.mp4 38.9 MB
~Get Your Files Here !/3 - Governance, Risk Management and Compliance/5 -Risk Analysis Approaches.mp4 36.9 MB
~Get Your Files Here !/4 - Common Types of Malware/6 -Trojan Horses.mp4 34.2 MB
~Get Your Files Here !/4 - Common Types of Malware/5 -Ransomware.mp4 34.1 MB
~Get Your Files Here !/4 - Common Types of Malware/3 -Worms.mp4 33.9 MB
~Get Your Files Here !/5 - Security Controls/2 -Control Functions and Types.mp4 32.8 MB
~Get Your Files Here !/4 - Common Types of Malware/2 -Viruses.mp4 31.7 MB
~Get Your Files Here !/2 - Types of Security/5 -Physical Security.mp4 31.6 MB
~Get Your Files Here !/3 - Governance, Risk Management and Compliance/4 -Risk Governance.mp4 29.0 MB
~Get Your Files Here !/4 - Common Types of Malware/8 -Adware.mp4 28.9 MB
~Get Your Files Here !/6 - OWASP Top 10/11 -Server-Side Request Forgery.mp4 28.7 MB
~Get Your Files Here !/6 - OWASP Top 10/9 -Software and Data Integrity Failures.mp4 28.1 MB
~Get Your Files Here !/6 - OWASP Top 10/10 -Security Logging and Monitoring Failures.mp4 28.0 MB
~Get Your Files Here !/6 - OWASP Top 10/3 -Cryptographic Failures.mp4 27.0 MB
~Get Your Files Here !/6 - OWASP Top 10/7 -Vulnerable and Outdated Components.mp4 27.0 MB
~Get Your Files Here !/1 - Introduction/3 -Integrity.mp4 26.2 MB
~Get Your Files Here !/4 - Common Types of Malware/7 -Rootkit.mp4 25.7 MB
~Get Your Files Here !/2 - Types of Security/3 -Information Security.mp4 23.5 MB
~Get Your Files Here !/1 - Introduction/4 -Availability.mp4 22.1 MB
~Get Your Files Here !/4 - Common Types of Malware/4 -Keyloggers.mp4 21.6 MB
猜你喜欢:
Training
WebToolTip
Course
Cybersecurity
com
Udemy
Fundamentals
ISACA
Complete
- 【影视】 IGTI - Bootcamp - Analista de Cybersecurity
-
收录时间:2021-06-25
文档个数:168
文档大小:13.0 GB
最近下载:2025-05-16
人气:3297
磁力链接
Módulo 4 - Análise Computacional Forense/Segunda aula interativa.mp4 455.8 MB
Módulo 1 - Fundamentos de Cybersecurity/Segunda aula interativa - CBS211A - 1280x720 2310K.mp4 412.0 MB
Módulo 2 - Segurança de Infraestrutura de TI/Primeira aula interativa.mp4 403.8 MB
Módulo 3 - Auditoria e testes de invasão/Segunda aula interativa.mp4 392.8 MB
Módulo 3 - Auditoria e testes de invasão/Primeira aula interativa.mp4 379.2 MB
Desafio Final/Desafio Final.mp4 363.7 MB
Módulo 2 - Segurança de Infraestrutura de TI/5. Firewall, IDS e IPS/Aula 2.5.2 - IPS e IDS.mp4 363.0 MB
Módulo 2 - Segurança de Infraestrutura de TI/9. Controlador de Domínio e Group Polices/Controlador de Domínio e Group Polices.mp4 338.8 MB
Módulo 2 - Segurança de Infraestrutura de TI/Segunda aula interativa.mp4 330.3 MB
Módulo 4 - Análise Computacional Forense/Primeira aula interativa.mp4 279.1 MB
Módulo 2 - Segurança de Infraestrutura de TI/7. Monitoramento e Gerenciamento com NTOP/Monitoramento e Gerenciamento com NTOP.mp4 254.6 MB
Módulo 2 - Segurança de Infraestrutura de TI/11. Camada 5, vírus e Firewall pessoal/Camada 5, vírus e Firewall pessoal.mp4 220.2 MB
Módulo 2 - Segurança de Infraestrutura de TI/13. Camada 7, criptografia e DLP/Camada 7, criptografia e DLP.mp4 205.7 MB
Módulo 3 - Auditoria e testes de invasão/14. Metasploit - Pós-exploração e eliminação dos rastros/HAC- BTC 3.14 - 720p.mp4 198.0 MB
Módulo 2 - Segurança de Infraestrutura de TI/12. Camada 6 e WAF/Camada 6 e WAF.mp4 192.5 MB
Módulo 1 - Fundamentos de Cybersecurity/Primeira aula interativa - CBS211A - 1280x720 2310K.mp4 186.9 MB
Módulo 2 - Segurança de Infraestrutura de TI/2. Arquitetura da Estratégia de Defesa em Profundidade/Arquitetura da Estratégia de Defesa em Profundidade.mp4 175.4 MB
Módulo 2 - Segurança de Infraestrutura de TI/5. Firewall, IDS e IPS/Aula 2.4.2 - Firewall (Parte 2).mp4 158.3 MB
Módulo 3 - Auditoria e testes de invasão/8. Fingerprint e análise de vulnerabilidade/HAC 3.5 - 720p.mp4 149.2 MB
Módulo 2 - Segurança de Infraestrutura de TI/1. Defesa em Profundidade/Aula 1.3 - Elementos de Controle.mp4 147.4 MB
猜你喜欢:
Cybersecurity
de
Analista
IGTI
Bootcamp
- 【影视】 Microsoft Cybersecurity Architect SC 100 Exam Prep
-
收录时间:2023-12-23
文档个数:271
文档大小:10.3 GB
最近下载:2025-05-16
人气:9458
磁力链接
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/21 - CAF Governance.mp4 293.3 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/19 - CAF Landing Zone Deployment Lab Step By StepII.mp4 286.7 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/16 - CAF Readyness Azure setup guide.mp4 231.2 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/41 - SecOps Best practices for SIEM SOAR.mp4 202.4 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/12 - MCRA IoT and IT Security II.mp4 161.1 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/78 - Pass Through Authentication PTA.mp4 160.2 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/4 - Design security for infrastructure/103 - Plan and Implement a security strategy across teams.mp4 157.6 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/17 - CAF Readyness Azure Landing Zone.mp4 154.3 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/72 - Zero trust Security strategy for Identities.mp4 152.4 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/27 - SC 100 Case Study.mp4 149.8 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/11 - MCRA People Security.mp4 141.5 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/3 - Evaluate Governance Risk Compliance GRCstrategies/93 - Encryption Support for various services.mp4 137.3 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/79 - Azure AD Roles Best Practices.mp4 136.1 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/35 - Recommendations for Designing a logging and auditing security strategy.mp4 133.8 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/4 - Design security for infrastructure/124 - Securing Domain Controllers.mp4 127.6 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/4 - Design security for infrastructure/118 - Securing Member Servers.mp4 124.1 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/40 - Azure Tools for SecOps.mp4 123.5 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/48 - Incident Management process Overview.mp4 122.3 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/82 - Develop a Roadmap Explained.mp4 119.6 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/74 - Conditional Access Personas.mp4 118.4 MB
猜你喜欢:
Exam
Cybersecurity
Prep
Architect
SC
100
Microsoft
- 【影视】 [ FreeCourseWeb.com ] AI Cybersecurity with DeepSeek R1 - Protect Your Digital Life
-
收录时间:2025-02-23
文档个数:25
文档大小:363.3 MB
最近下载:2025-05-16
人气:1236
磁力链接
~Get Your Files Here !/5 - Digital Forensics & Investigations/2 -Analyzing Suspicious Software.mp4 46.2 MB
~Get Your Files Here !/4 - OSINT – How Scammers Gather Your Data/3 -Romance Scams How They Manipulate Victims.mp4 43.4 MB
~Get Your Files Here !/1 - Introduction to AI and Cybersecurity/1 -What Are Artificial Intelligence & Cybersecurity.mp4 37.4 MB
~Get Your Files Here !/3 - Ethical Hacking Real-World Demonstrations/3 -Hacking with Advanced Malware A Demonstration.mp4 27.7 MB
~Get Your Files Here !/7 - Final Thoughts & Cybersecurity Mindset/1 -Psychological Tricks Hackers Use & How to Avoid Scams.mp4 26.1 MB
~Get Your Files Here !/6 - Leveraging AI for Profit and Cybersecurity/1 -Qwen 2.5 AI Video Generation.mp4 25.8 MB
~Get Your Files Here !/3 - Ethical Hacking Real-World Demonstrations/2 -Why Do Experts Say Don't Click the Link.mp4 23.4 MB
~Get Your Files Here !/4 - OSINT – How Scammers Gather Your Data/1 -How Scammers Steal Your Personal Data.mp4 22.6 MB
~Get Your Files Here !/4 - OSINT – How Scammers Gather Your Data/2 -Job Scams Be Careful Where You Apply.mp4 19.7 MB
~Get Your Files Here !/4 - OSINT – How Scammers Gather Your Data/4 -OSINT Tools SearchPeopleFree, WhitePages.mp4 15.5 MB
~Get Your Files Here !/5 - Digital Forensics & Investigations/3 -Investigating Malicious Links.mp4 13.4 MB
~Get Your Files Here !/5 - Digital Forensics & Investigations/4 -Verifying Email Sources for Cyber Threats.mp4 10.8 MB
~Get Your Files Here !/3 - Ethical Hacking Real-World Demonstrations/4 -Key Takeaways & How to Protect Yourself.mp4 10.7 MB
~Get Your Files Here !/3 - Ethical Hacking Real-World Demonstrations/1 -Advanced Phishing Attacks How They Work.mp4 9.4 MB
~Get Your Files Here !/1 - Introduction to AI and Cybersecurity/2 -Who Is This Course For.mp4 8.7 MB
~Get Your Files Here !/5 - Digital Forensics & Investigations/1 -Introduction to Digital Forensics.mp4 8.0 MB
~Get Your Files Here !/2 - Cybersecurity Myths vs. Reality/2 -Why Antivirus Alone Won't Keep You Safe.mp4 7.9 MB
~Get Your Files Here !/2 - Cybersecurity Myths vs. Reality/1 -What Are the Risks of Downloading Unknown Apps.mp4 6.7 MB
~Get Your Files Here !/6 - Leveraging AI for Profit and Cybersecurity/2 - Use Google Ai studio to generate script for a video.html 11.3 kB
~Get Your Files Here !/6 - Leveraging AI for Profit and Cybersecurity/2 - Whisper Free Audio Transcription for Security Experts.html 5.3 kB
猜你喜欢:
Protect
R1
AI
DeepSeek
Life
Cybersecurity
FreeCourseWeb
Digital
com
Your
- 【影视】 [ WebToolTip.com ] Udemy - GenAI Cybersecurity - OWASP Top 10, MITRE ATLAS and API Attacks
-
收录时间:2025-05-09
文档个数:70
文档大小:1.6 GB
最近下载:2025-05-16
人气:288
磁力链接
~Get Your Files Here !/7 - MITRE ATLAS Mapping for LLM Attacks/2 -Mapping AI Threats with MITRE ATLAS OpenAI vs. DeepSeek Case Study.mp4 156.0 MB
~Get Your Files Here !/6 - LLM API Security Real-World Exploitation & Mitigation Demo with OLAMA/3 -Hands-On Demo Exploiting an Insecure Ollama API Setup.mp4 135.0 MB
~Get Your Files Here !/6 - LLM API Security Real-World Exploitation & Mitigation Demo with OLAMA/6 -Mitigating OLAMA API Risks with NGINX Authentication (Hands-On Demo).mp4 81.1 MB
~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/9 -How Self-Attention Builds Rich Contextual Understanding in Transformers.mp4 72.5 MB
~Get Your Files Here !/5 - OWASP Top 10 for LLMs Understanding AI-Specific Security Risks/2 -OWASP Top 10 Risks for LLMs + Case Study Mapping.mp4 52.7 MB
~Get Your Files Here !/8 - Hands-On Lab Exploiting AI Decisions in LLM APIs/2 -Lab Demo – Exploiting LLM APIs with Excessive Agency (PortSwigger).mp4 49.4 MB
~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/9 -Scenario 2 Deep Dive into LLM Attack Surfaces from the Provider Side.mp4 48.5 MB
~Get Your Files Here !/3 - Anatomy of an LLM System and Its Security Attack Surface/6 -LLM Processing Unit Explained Inference Handling, Prompt Cntrl & Runtime Logic.mp4 45.0 MB
~Get Your Files Here !/6 - LLM API Security Real-World Exploitation & Mitigation Demo with OLAMA/4 -Ollama in the Wild Real-World Exposure via Shodan + Developer Risk Behavior.mp4 44.9 MB
~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/11 -Inference and Log Data Exposure DeepSeek’s AI Leak Case Study.mp4 42.7 MB
~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/6 -Understanding Recurrent Neural Networks (RNNs) for Language Processing.mp4 40.8 MB
~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/10 -Training Data Poisoning Case Study How Microsoft Tay Was Manipulated on Twitter.mp4 37.5 MB
~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/11 -Summary of Transformer Innovations Key Concepts Behind LLMs.mp4 30.9 MB
~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/14 -Section 3 Wrap-Up LLM Attack Surface Lessons + What’s Next with OWASP Top 10.mp4 30.3 MB
~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/8 -Prompt Injection Demonstration How a $1 Chevy Tahoe Chatbot Reply Went Viral.mp4 29.8 MB
~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/7 -How Transformers and LLMs Revolutionized Language Processing.mp4 27.6 MB
~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/12 -LLM Model Exposure How Misconfigured Ollama APIs Opened the Door.mp4 27.5 MB
~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/3 -Where Large Language Models Fit in the Generative AI Landscape.mp4 26.8 MB
~Get Your Files Here !/6 - LLM API Security Real-World Exploitation & Mitigation Demo with OLAMA/7 -How One Misconfigured LLM API Triggers Multiple OWASP Risks.mp4 26.7 MB
~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/7 -Scenario 1 LLM Attack Surfaces in Organizations Using AI Models.mp4 26.5 MB
猜你喜欢:
10
WebToolTip
Cybersecurity
Top
OWASP
ATLAS
API
Attacks
MITRE
Udemy
- 【影视】 Python for Cybersecurity Specialization
-
收录时间:2023-12-18
文档个数:366
文档大小:1.2 GB
最近下载:2025-05-16
人气:13373
磁力链接
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/03_alternative-protocol.mp4 61.8 MB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/05_network-sniffing.mp4 42.0 MB
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/04_network-scanning.mp4 32.5 MB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/05_protocol-decoding.mp4 31.5 MB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/07_behavioral-analytics.mp4 29.2 MB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/03_registry-autorun.mp4 29.0 MB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/05_hijacked-execution-flow.mp4 27.5 MB
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/06_dns-exploration.mp4 27.3 MB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/05_system-activity-monitoring.mp4 26.6 MB
[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/03_pcap-collection.mp4 26.0 MB
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/03_encrypted-channel.mp4 25.8 MB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/05_scheduled-execution.mp4 25.8 MB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/03_user-account-discovery.mp4 25.4 MB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/03_logon-scripts.mp4 24.6 MB
[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/03_data-encryption.mp4 23.6 MB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/05_alternate-data-streams.mp4 22.4 MB
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/03_default-account-discovery.mp4 21.7 MB
[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/05_autorun-scripts.mp4 21.2 MB
[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/03_impair-avs.mp4 20.8 MB
[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/03_credentials-from-web-browsers.mp4 20.7 MB
猜你喜欢:
Python
Cybersecurity
Specialization
- 【影视】 Implementing the NIST Cybersecurity Framework
-
收录时间:2024-01-10
文档个数:127
文档大小:4.3 GB
最近下载:2025-05-16
人气:874
磁力链接
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/2. Using the NIST Cybersecurity Framework/5. Finding the Controls.mp4 307.2 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/6. Five Functions.mp4 231.8 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/7. Controls and Outcomes.mp4 205.8 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/5. Framework Components.mp4 197.5 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/3. Value Proposition.mp4 181.0 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/1. Welcome.mp4 161.5 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/5. Generate Questionnaire.mp4 153.5 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/2. Using the NIST Cybersecurity Framework/1. Using the Core.mp4 149.0 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/2. Intel (Microchip Manufacturing).mp4 143.5 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/5. Implementing Phase Two of the CR-MAP/4. Business Value Analysis.mp4 139.8 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/4. DOE (Energy Industry).mp4 139.0 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/7. Conduct Interviews.mp4 136.2 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/7. Conclusion/1. BONUS - Conclusion.mp4 126.4 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/3. Cimpress (Promotional Products).mp4 123.9 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/6. Saudi Aramco (Oil Industry).mp4 118.9 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/4. Intended Audience.mp4 112.2 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/5. Western Australia (Local Government).mp4 112.1 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/6. Choose Target Scores.mp4 100.5 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/6. Implementing Phase Three of the CR-MAP/3. Quarterly Reviews.mp4 99.8 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/1. Phase One.mp4 93.8 MB
猜你喜欢:
Cybersecurity
Implementing
NIST
Framework
- 【影视】 Cybersecurity Monitoring & Detection Lab
-
收录时间:2023-12-20
文档个数:71
文档大小:2.7 GB
最近下载:2025-05-16
人气:10002
磁力链接
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/28. Attacks and Monitor in Splunk.mp4 216.4 MB
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/26. Attacks & Security Onion Monitoring.mp4 213.9 MB
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/27. Introduction to Splunk.mp4 147.7 MB
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/25. Introduction to Security Onion.mp4 134.2 MB
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/9. Install Security Onion.mp4 127.0 MB
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/1. Introduction to Cybersecurity/2. Cyber Security Monitoring & Detection.mp4 108.8 MB
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/8. Install Ubuntu Server.mp4 108.1 MB
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/1. Introduction to Cybersecurity/1. Introduction Cyber Security.mp4 108.0 MB
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/5. PfSense Firewall Wizard, Naming & Rules.mp4 98.8 MB
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/30. Configure WAZUH Agent on Windows.mp4 85.7 MB
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/4. PfSense Firewall Initial Configuration.mp4 84.5 MB
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/29. Install WAZUH Manager.mp4 76.9 MB
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/12. Install Windows Server 2019 Advanced Method.mp4 73.6 MB
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/2. Install Windows 11.mp4 72.7 MB
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/21. Setting IP Address on Ubuntu Server.mp4 70.4 MB
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/18. Install Splunk on Linux Ubuntu Server.mp4 68.9 MB
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/19. Install Splunk on Linux CentOS.mp4 67.3 MB
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/1. Introduction to Cybersecurity/3. Cyber Security Monitoring & Detection Lab.mp4 66.9 MB
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/13. Configure Active Directory AD.mp4 65.8 MB
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/11. Install Windows Server 2019 Typical Method.mp4 64.3 MB
猜你喜欢:
Cybersecurity
Detection
Monitoring
Lab
- 【影视】 Palo Alto Networks Cybersecurity Fundamentals (PCCSA)
-
收录时间:2024-02-29
文档个数:52
文档大小:2.0 GB
最近下载:2025-05-16
人气:5526
磁力链接
Chapter 1 Cybersecurity Fundamentals and Threat Landscape/002. Identify Computing and Networking Trends.mp4 118.2 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/006. Identify Networking Security Technologies.mp4 114.7 MB
Chapter 1 Cybersecurity Fundamentals and Threat Landscape/003. Describe Cybersecurity Threats.mp4 108.3 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/004. Review Network Addressing.mp4 105.2 MB
Chapter 1 Cybersecurity Fundamentals and Threat Landscape/005. Identify Wi-Fi Vulnerabilities and Attacks.mp4 100.1 MB
Chapter 1 Cybersecurity Fundamentals and Threat Landscape/004. Describe Common Cyberattack Techniques.mp4 96.3 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/011. Endpoint Security.mp4 95.3 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/002. Describe Routing Protocols.mp4 91.8 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/001. Identify Basic Internet and Network Operations.mp4 90.7 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/012. Server and System Administration.mp4 90.3 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/003. Review Networking Models.mp4 88.4 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/009. Learn Basic Virtualization Security Concepts.mp4 83.8 MB
Chapter 3 Palo Alto Networks Security Solutions and Technologies/007. Describe Cortex XSOAR and AutoFocus.mp4 79.5 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/008. Learn Basic Cloud Security Concepts.mp4 75.4 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/010. Learn Basic DevOps Security Concepts.mp4 75.3 MB
Chapter 3 Palo Alto Networks Security Solutions and Technologies/001. Identify Palo Alto Networks Security Solutions.mp4 74.3 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/005. Learn Networking Security Models.mp4 72.6 MB
Chapter 3 Palo Alto Networks Security Solutions and Technologies/002. Describe Basic NGFW Components and Functions.mp4 67.1 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/007. Learn Basic Data Center Security Concepts.mp4 60.2 MB
Chapter 3 Palo Alto Networks Security Solutions and Technologies/003. Learn Basic Prisma Cloud.mp4 59.7 MB
猜你喜欢:
Alto
Cybersecurity
Fundamentals
PCCSA
Palo
Networks
- 【影视】 Cybersecurity Prevention and Detection 2nd Edition (Video Collection)
-
收录时间:2024-05-31
文档个数:374
文档大小:3.8 GB
最近下载:2025-05-16
人气:4395
磁力链接
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/007. 1.6 Identity and access management.mp4 120.3 MB
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/003. 1.2 Log ingestion Part 2.mp4 117.9 MB
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/002. 1.1 Log ingestion Part 1.mp4 106.0 MB
03 Malware and Incident Response/Lesson 1 Threat Landscape/002. 1.1 Malware Threat Landscape.mp4 90.8 MB
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/005. 1.4 Infrastructure concepts.mp4 89.3 MB
04 Secure Operations and Protections/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/004. 2.3 Technology and tool integration.mp4 87.2 MB
01 Threat Intelligence and Threat Hunting/Lesson 2 Analyze Indicators of Potentially Malicious Activity/002. 2.1 Network-related.mp4 77.1 MB
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/008. 1.7 Encryption.mp4 76.0 MB
01 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/006. 3.5 Common techniques Part 3.mp4 63.7 MB
03 Malware and Incident Response/Lesson 5 PE File Identification/004. 5.3 Entry Points.mp4 62.4 MB
01 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/004. 3.3 Common techniques Part 1.mp4 56.9 MB
01 Threat Intelligence and Threat Hunting/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/002. 1.1 Threat actors Part 1.mp4 53.5 MB
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/004. 1.3 Operating system (OS) concepts.mp4 52.1 MB
01 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/005. 3.4 Common techniques Part 2.mp4 51.1 MB
02 System and Privacy Data Protection/Lesson 4 Analyzing Logs and Impact Analysis/008. 4.7 Impact Analysis.mp4 51.0 MB
01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/007. 7.6 SOC and FPGA.mp4 50.5 MB
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/006. 1.5 Network architecture.mp4 50.1 MB
01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/010. 7.9 Industrial Control Systems (ICS) and Process Automation.mp4 46.2 MB
01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/004. 7.3 Internet of Things (IoT) and Embedded Devices Part 2.mp4 45.3 MB
04 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/013. 4.12 Threat modeling.mp4 43.6 MB
猜你喜欢:
Cybersecurity
Collection
2nd
Detection
Edition
Video
Prevention
- 【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity and Kali Linux - Hands-on course by TechLatest
-
收录时间:2023-12-29
文档个数:43
文档大小:2.6 GB
最近下载:2025-05-16
人气:6597
磁力链接
~Get Your Files Here !/7. Module 7 - Wireless Fortification Pentesting Mastery/2. Web App Pentesting Practical.mp4 636.4 MB
~Get Your Files Here !/10. Module 10 - Communicating Findings Reporting Mastery/2. Reporting Practical + Conclusion.mp4 283.4 MB
~Get Your Files Here !/6. Module 6 - Crack the Code Password Mastery/2. Password Cracking Practical.mp4 265.1 MB
~Get Your Files Here !/5. Module 5 - Hacking Mastery Strategic Exploitation/2. Exploitation Practical.mp4 222.1 MB
~Get Your Files Here !/9. Module 9 - Human Manipulation Social Engineering/2. Social Engineering Practical.mp4 198.1 MB
~Get Your Files Here !/8. Module 8 - Wireless Fortification Pentesting Mastery/2. Wireless Pentesting Practical.mp4 194.1 MB
~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/3. Social Media Reconnaissance.mp4 142.0 MB
~Get Your Files Here !/4. Module 4 - Infiltration Techniques Mastering Active Reconnaissance/2. Vulnerability Assessment.mp4 121.4 MB
~Get Your Files Here !/5. Module 5 - Hacking Mastery Strategic Exploitation/1. Exploitation Introduction.mp4 84.3 MB
~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/3. Microsoft Azure Guide..mp4 54.4 MB
~Get Your Files Here !/6. Module 6 - Crack the Code Password Mastery/1. Password Cracking Introduction.mp4 48.2 MB
~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/2. Google Cloud Platform(GCP) Guide..mp4 47.9 MB
~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/1. Amazon Web Services(AWS) Guide..mp4 46.0 MB
~Get Your Files Here !/4. Module 4 - Infiltration Techniques Mastering Active Reconnaissance/3. Scanning.mp4 44.9 MB
~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/4. Unveiling the Secrets of OS Fingerprinting in Cybersecurity with Kali Linux.mp4 44.7 MB
~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/5. Target Validation in Cybersecurity with Kali Linux.mp4 39.9 MB
~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/1. Reconnaissance — First Phase of Hacking.mp4 30.0 MB
~Get Your Files Here !/1. Module 1 - Course Introduction & Teaser/2. Course Introduction.mp4 28.4 MB
~Get Your Files Here !/8. Module 8 - Wireless Fortification Pentesting Mastery/1. Wireless Pentesting Introduction.mp4 24.5 MB
~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/6. Subdomain Discovery in Cybersecurity with Kali Linux.mp4 24.5 MB
猜你喜欢:
TechLatest
Cybersecurity
Kali
Hands
Udemy
DevCourseWeb
course
Linux
com