磁力管家

磁力管家
为您索检到186条磁力链接,耗时1毫秒。 rss

分享给好友

【影视】 Thinking about Cybersecurity From Cyber Crime to Cyber Warfare
收录时间:2023-12-20 文档个数:39 文档大小:8.8 GB 最近下载:2025-05-16 人气:4027 磁力链接
  • mp4[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/18 Looking Forward-What Does the Future Hold.mp4 535.2 MB
  • mp4[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/10 International Governance and the Internet.mp4 521.6 MB
  • mp4[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/14 Listening In and Going Dark.mp4 516.5 MB
  • mp4[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/08 Nations at Cyber War.mp4 496.5 MB
  • mp4[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/05 The Problem of Identity on the Network.mp4 495.7 MB
  • mp4[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/13 Privacy for the Cyber Age.mp4 494.0 MB
  • mp4[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/11 The Constitution and Cyberspace.mp4 489.6 MB
  • mp4[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/17 Critical Infrastructure and Resiliency.mp4 489.1 MB
  • mp4[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/01 Stuxnet-The First Cyber Guided Missile.mp4 486.4 MB
  • mp4[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/04 Of Viruses, Botnets, and Logic Bombs.mp4 483.5 MB
  • mp4[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/09 Government Regulation of Cyberspace.mp4 478.0 MB
  • mp4[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/12 Big Data- They Know Everything about You.mp4 474.5 MB
  • mp4[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/15 The Devil in the Chips-Hardware Failures.mp4 473.9 MB
  • mp4[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/16 Protecting Yourself in Cyberspace.mp4 471.4 MB
  • mp4[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/06 Cyber Fraud, Theft, and Organized Crime.mp4 470.0 MB
  • mp4[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/07 Hacktivists and Insurgency.mp4 469.1 MB
  • mp4[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/02 The Incredible Scope of Cyberspace.mp4 456.9 MB
  • mp4[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/03 The Five Gateways of Internet Vulnerability.mp4 448.1 MB
  • mp4[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/NA NA.mp4 20.8 MB
  • pad/9.pad/9 915.0 kB
【影视】 [ FreeCourseWeb.com ] Udemy - Cybersecurity Foundation
收录时间:2022-01-09 文档个数:18 文档大小:2.3 GB 最近下载:2025-05-16 人气:1583 磁力链接
  • mp4~Get Your Files Here !/6. Continuous Risk Awareness and Monitoring/2. Malware Attacks and Defenses.mp4 328.2 MB
  • mp4~Get Your Files Here !/4. Identify and Access Management & Data Security/3. User Identification, Authentication, and Session Protection.mp4 259.5 MB
  • mp4~Get Your Files Here !/6. Continuous Risk Awareness and Monitoring/1. Risk Management.mp4 235.0 MB
  • mp4~Get Your Files Here !/8. Cloud Platforms and Data Management/1. Cloud Computing.mp4 228.7 MB
  • mp4~Get Your Files Here !/7. Cyber Hygiene/1. Cyber Hygiene.mp4 179.6 MB
  • mp4~Get Your Files Here !/4. Identify and Access Management & Data Security/1. Business, Governance.mp4 166.2 MB
  • mp4~Get Your Files Here !/5. Data and Information Lifecycle Process/2. Data and Information Lifecycle Process - Part 2.mp4 159.0 MB
  • mp4~Get Your Files Here !/5. Data and Information Lifecycle Process/1. Data and Information Lifecycle Process - Part 1.mp4 158.9 MB
  • mp4~Get Your Files Here !/4. Identify and Access Management & Data Security/4. Access Control Authorization Systems.mp4 143.3 MB
  • mp4~Get Your Files Here !/8. Cloud Platforms and Data Management/2. Leveraging the Cloud for Business and Traffic Light Protocol.mp4 133.7 MB
  • mp4~Get Your Files Here !/4. Identify and Access Management & Data Security/2. Access control concepts.mp4 116.0 MB
  • mp4~Get Your Files Here !/2. Confidentiality, Integrity, and Availability (CIA)/1. Confidentiality, Integrity, and Availability (CIA).mp4 83.3 MB
  • mp4~Get Your Files Here !/9. Summary/1. Summary.mp4 65.3 MB
  • mp4~Get Your Files Here !/3. Information security and Cybersecurity Definitions/1. Information security and Cybersecurity Definitions.mp4 60.1 MB
  • mp4~Get Your Files Here !/1. Introduction/1. Introduction.mp4 8.7 MB
  • jpeg~Get Your Files Here !/2. Data and Information Lifecycle Process - Part 2.jpeg 197.8 kB
  • txt~Get Your Files Here !/Bonus Resources.txt 357 Bytes
  • urlGet Bonus Downloads Here.url 183 Bytes
【影视】 [ CourseLala.com ] Linkedin - Cybersecurity Careers - Getting Started as a CISO
收录时间:2023-12-18 文档个数:34 文档大小:893.5 MB 最近下载:2025-05-16 人气:1242 磁力链接
  • mp4~Get Your Files Here !/01 - Introduction/02 - You need a foundational knowledge of cyber security.mp4 76.1 MB
  • mp4~Get Your Files Here !/05 - 4. CISO Best Practices/01 - Relationship building.mp4 73.1 MB
  • mp4~Get Your Files Here !/03 - 2. Getting Hired and Getting Started/04 - First 90 days.mp4 70.3 MB
  • mp4~Get Your Files Here !/03 - 2. Getting Hired and Getting Started/03 - The CISO interview.mp4 68.6 MB
  • mp4~Get Your Files Here !/04 - 3. Building Your Strategic Plan/03 - Prioritize areas for improvement.mp4 66.4 MB
  • mp4~Get Your Files Here !/03 - 2. Getting Hired and Getting Started/01 - Before the interview.mp4 66.0 MB
  • mp4~Get Your Files Here !/04 - 3. Building Your Strategic Plan/01 - Select a security framework.mp4 62.2 MB
  • mp4~Get Your Files Here !/04 - 3. Building Your Strategic Plan/02 - Complete an assessment.mp4 61.5 MB
  • mp4~Get Your Files Here !/02 - 1. About the Role/02 - What type of CISO do you want to be.mp4 61.2 MB
  • mp4~Get Your Files Here !/05 - 4. CISO Best Practices/02 - PRIME framework.mp4 56.9 MB
  • mp4~Get Your Files Here !/02 - 1. About the Role/01 - What does a CISO do.mp4 54.6 MB
  • mp4~Get Your Files Here !/04 - 3. Building Your Strategic Plan/05 - Put it on paper and socialize.mp4 48.5 MB
  • mp4~Get Your Files Here !/06 - Conclusion/01 - Make the CISO dream come true.mp4 46.4 MB
  • mp4~Get Your Files Here !/03 - 2. Getting Hired and Getting Started/02 - The CISO resume.mp4 39.6 MB
  • mp4~Get Your Files Here !/04 - 3. Building Your Strategic Plan/04 - Set a mission and vision for your department.mp4 27.7 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - So you want to be a CISO.mp4 14.5 MB
  • srt~Get Your Files Here !/04 - 3. Building Your Strategic Plan/01 - Select a security framework.srt 8.2 kB
  • srt~Get Your Files Here !/03 - 2. Getting Hired and Getting Started/01 - Before the interview.srt 7.4 kB
  • srt~Get Your Files Here !/01 - Introduction/02 - You need a foundational knowledge of cyber security.srt 6.5 kB
  • srt~Get Your Files Here !/02 - 1. About the Role/02 - What type of CISO do you want to be.srt 6.5 kB
【影视】 [FreeCourseSite.com] Udemy - The Complete Certified in Cybersecurity (CC) course ISC2 '23
收录时间:2023-12-18 文档个数:294 文档大小:5.8 GB 最近下载:2025-05-16 人气:10921 磁力链接
  • mp407 - Domain recaps/004 Domain 4 recap Certified in Cybersecurity (CC).mp4 427.8 MB
  • mp407 - Domain recaps/005 Domain 5 recap Certified in Cybersecurity (CC).mp4 169.4 MB
  • mp407 - Domain recaps/001 Domain 1 recap Certified in Cybersecurity (CC).mp4 126.1 MB
  • mp408 - The study process, material, tips, tricks and practice tests!/006 How to approach practice questions.mp4 124.3 MB
  • mp405 - Domain 4 Network Security/004 The OSI Model - Part 1.mp4 105.9 MB
  • mp407 - Domain recaps/003 Domain 3 recap Certified in Cybersecurity (CC).mp4 92.9 MB
  • mp406 - Domain 5 Security Operations/013 Administrative (Directive) Controls.mp4 92.2 MB
  • mp407 - Domain recaps/002 Domain 2 recap Certified in Cybersecurity (CC).mp4 91.8 MB
  • mp405 - Domain 4 Network Security/038 Virtualization, Cloud, and Distributed Computing - Part 5.mp4 91.7 MB
  • mp404 - Domain 3 Access Controls Concepts/011 Logical Access Control - Part 5.mp4 85.1 MB
  • mp404 - Domain 3 Access Controls Concepts/009 Logical Access Control - Part 3.mp4 82.3 MB
  • mp402 - Domain 1 Security Principles/024 Laws and regulations - part 1.mp4 81.2 MB
  • mp408 - The study process, material, tips, tricks and practice tests!/007 How to design your career and certification path.mp4 78.0 MB
  • mp402 - Domain 1 Security Principles/011 IAAA -Identification, Authentication, Authorization, and Accountability - part 4.mp4 71.2 MB
  • mp405 - Domain 4 Network Security/025 Attacks and attackers - Part 3.mp4 67.7 MB
  • mp403 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/008 DRP - Disaster Recovery Planning - Part 4.mp4 67.6 MB
  • mp402 - Domain 1 Security Principles/026 Security governance principles.mp4 63.2 MB
  • mp405 - Domain 4 Network Security/037 Virtualization, Cloud, and Distributed Computing - Part 4.mp4 61.4 MB
  • mp405 - Domain 4 Network Security/041 Electricity.mp4 61.0 MB
  • mp405 - Domain 4 Network Security/049 Secure design principles - Part 1.mp4 60.1 MB
【影视】 [FreeCoursesOnline.Me] O`REILLY - Building a Career in Cybersecurity
收录时间:2023-12-18 文档个数:75 文档大小:847.7 MB 最近下载:2025-05-16 人气:4418 磁力链接
  • mp4Lesson 1 Getting Started in the Cybersecurity Field/005. 1.4 Cybersecurity Skills.mp4 65.3 MB
  • mp4Lesson 2 Planning Your Cybersecurity Career/004. 2.3 The Value of Professional Certifications.mp4 60.1 MB
  • mp4Lesson 3 Creating Your Own Lab/003. 3.2 Foundational Lab.mp4 48.0 MB
  • mp4Lesson 5 Preparing for Your Interview/005. 5.4 Final Tips.mp4 44.9 MB
  • mp4Lesson 6 Using Continuous Improvement Strategy/007. 6.6 Growing Your Career as a Remote Worker.mp4 40.3 MB
  • mp4Lesson 2 Planning Your Cybersecurity Career/003. 2.2 Creating and Tracking Your Plan.mp4 36.8 MB
  • mp4Lesson 5 Preparing for Your Interview/003. 5.2 Preparing for the Interview.mp4 35.5 MB
  • mp4Lesson 1 Getting Started in the Cybersecurity Field/006. 1.5 Navigating through the Industry.mp4 31.9 MB
  • mp4Lesson 2 Planning Your Cybersecurity Career/002. 2.1 Establishing a Plan.mp4 31.3 MB
  • mp4Lesson 6 Using Continuous Improvement Strategy/008. 6.7 What’s Next.mp4 31.0 MB
  • mp4Lesson 1 Getting Started in the Cybersecurity Field/004. 1.3 Cybersecurity Jobs.mp4 30.3 MB
  • mp4Lesson 5 Preparing for Your Interview/004. 5.3 Advancing in the Interview Process.mp4 29.3 MB
  • mp4Lesson 6 Using Continuous Improvement Strategy/006. 6.5 Keeping a Good Work-life Balance.mp4 28.2 MB
  • mp4Lesson 3 Creating Your Own Lab/005. 3.4 Enabling and Using Microsoft Defender for Cloud.mp4 27.7 MB
  • mp4Introduction/001. Building a Career in Cybersecurity Introduction.mp4 25.1 MB
  • mp4Lesson 6 Using Continuous Improvement Strategy/003. 6.2 Responsibilities and Expectations.mp4 24.6 MB
  • mp4Lesson 4 Expanding Your Networking/005. 4.4 Using LinkedIn to Expand Your Network.mp4 24.5 MB
  • mp4Lesson 1 Getting Started in the Cybersecurity Field/003. 1.2 Roles and Responsibilities.mp4 22.1 MB
  • mp4Lesson 4 Expanding Your Networking/002. 4.1 Understanding the Cybersecurity Community.mp4 21.9 MB
  • mp4Lesson 4 Expanding Your Networking/003. 4.2 Identifying Opportunities to Contribute with the Cybersecurity Community.mp4 19.3 MB
【影视】 Advanced Cybersecurity and Ethical Hacking with ChatGPT
收录时间:2023-12-25 文档个数:185 文档大小:1.5 GB 最近下载:2025-05-16 人气:13554 磁力链接
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/15 - CTF Challenges and Capture The Flag Events/48 - Introduction to Capture The Flag CTF Challenges.mp4 50.2 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/16 - Final Projects and Practical Assessments/52 - Building a Security Automation Workflow with ChatGPT.mp4 48.9 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/17 - Professional Development and Career Insights/55 - Navigating the Job Market and Advancing Your Cybersecurity Career.mp4 44.4 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/16 - Final Projects and Practical Assessments/53 - Penetration Testing Report Compilation with ChatGPT.mp4 39.3 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/17 - Professional Development and Career Insights/54 - Resume Building and Interview Preparation for Ethical Hackers.mp4 38.3 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/2 - Foundations of Cybersecurity and Hacking/7 - Operating System Fundamentals for Hacking and Penetration Testing.mp4 37.8 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/15 - CTF Challenges and Capture The Flag Events/49 - Solving CTF Challenges Using ChatGPT.mp4 37.3 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/5 - Vulnerability Identification and Assessment/17 - Network Vulnerability Scanning and Analysis with ChatGPT.mp4 36.8 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/1 - Section 1 Introduction to Cybersecurity and Ethical Hacking/4 - Understanding the Role of Ethical Hackers and Penetration Testers.mp4 36.4 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/11 - Case Studies and RealWorld Scenarios/36 - Ethical Hacking Case Studies Using ChatGPT.mp4 36.0 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/6 - Exploitation and Penetration Testing/21 - Penetration Testing Methodologies and Reporting.mp4 35.7 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/6 - Exploitation and Penetration Testing/20 - PostExploitation Techniques and Privilege Escalation.mp4 34.6 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/14 - Ethical Hacking in Cloud Environments/46 - Securing Containers and Serverless Architectures.mp4 34.5 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/3 - Getting Started with ChatGPT/10 - Setting Up and Configuring ChatGPT for Hacking Tasks.mp4 34.3 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/10 - Emerging Trends and Future of Cybersecurity/32 - Blockchain Security and Decentralized Technologies.mp4 33.2 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/13 - Cybersecurity Regulations and Compliance/43 - Conducting Compliance Audits with ChatGPT.mp4 33.0 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/7 - Advanced Ethical Hacking Techniques/24 - Wireless Network Hacking and Countermeasures Using ChatGPT.mp4 31.7 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/5 - Vulnerability Identification and Assessment/16 - Web Application Vulnerability Assessment Using ChatGPT.mp4 30.5 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/9 - ChatGPT for Security Innovation/28 - Leveraging ChatGPT for Threat Hunting and Analysis.mp4 30.1 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/3 - Getting Started with ChatGPT/11 - Navigating the ChatGPT Interface for Cybersecurity Analysis.mp4 28.8 MB
【影视】 [ WebToolTip.com ] Udemy - Implement Version 2 Of Nist Cybersecurity Framework
收录时间:2025-04-06 文档个数:45 文档大小:1.9 GB 最近下载:2025-05-16 人气:944 磁力链接
  • mp4~Get Your Files Here !/1 - Introduction to the NIST Cyber Security Framework/2 - Business Value of Framework.mp4 147.0 MB
  • mp4~Get Your Files Here !/1 - Introduction to the NIST Cyber Security Framework/1 - Introduction.mp4 144.2 MB
  • mp4~Get Your Files Here !/1 - Introduction to the NIST Cyber Security Framework/3 - Who Can Use The Framework.mp4 139.6 MB
  • mp4~Get Your Files Here !/5 - Implementing Phase Two of the CRMAP/34 - Business Value Analysis.mp4 106.8 MB
  • mp4~Get Your Files Here !/4 - Implementing Phase One of the CRMAP/28 - Conduct Interviews.mp4 72.2 MB
  • mp4~Get Your Files Here !/7 - Conclusion/43 - BONUS Conclusion.mp4 72.1 MB
  • mp4~Get Your Files Here !/5 - Implementing Phase Two of the CRMAP/32 - Close Your Gaps.mp4 70.9 MB
  • mp4~Get Your Files Here !/4 - Implementing Phase One of the CRMAP/29 - Compile and Analyze Scores.mp4 68.2 MB
  • mp4~Get Your Files Here !/6 - Implementing Phase Three of the CRMAP/41 - Quarterly Reviews.mp4 65.1 MB
  • mp4~Get Your Files Here !/5 - Implementing Phase Two of the CRMAP/36 - Internal Marketing.mp4 64.3 MB
  • mp4~Get Your Files Here !/4 - Implementing Phase One of the CRMAP/24 - Get BuyIn.mp4 62.7 MB
  • mp4~Get Your Files Here !/3 - Real World Case Studies/17 - Cimpress Promotional Products.mp4 61.5 MB
  • mp4~Get Your Files Here !/2 - Understanding the NIST Cybersecurity Framework/9 - Govern Function and Activities.mp4 59.1 MB
  • mp4~Get Your Files Here !/6 - Implementing Phase Three of the CRMAP/39 - Phase Three Overview.mp4 50.6 MB
  • mp4~Get Your Files Here !/6 - Implementing Phase Three of the CRMAP/40 - Monthly Checkins.mp4 46.0 MB
  • mp4~Get Your Files Here !/2 - Understanding the NIST Cybersecurity Framework/11 - Protect Function and Activities.mp4 41.4 MB
  • mp4~Get Your Files Here !/4 - Implementing Phase One of the CRMAP/26 - Generate Questionnaire.mp4 40.7 MB
  • mp4~Get Your Files Here !/1 - Introduction to the NIST Cyber Security Framework/4 - Understanding the Core.mp4 38.5 MB
  • mp4~Get Your Files Here !/3 - Real World Case Studies/18 - University of Kansas Medical Center.mp4 38.0 MB
  • mp4~Get Your Files Here !/5 - Implementing Phase Two of the CRMAP/37 - External Marketing.mp4 36.4 MB
【影视】 [CourseClub.Me] ITProTV - NIST Cybersecurity And Risk Management Frameworks
收录时间:2024-01-03 文档个数:61 文档大小:11.3 GB 最近下载:2025-05-16 人气:3755 磁力链接
  • mp42. NIST Cybersecurity and Publications.mp4 298.0 MB
  • mp426. Response Training and Testing.mp4 288.9 MB
  • mp424. Incident Response Plan Examples.mp4 279.3 MB
  • mp443. Documentation and Approval.mp4 277.5 MB
  • mp420. System Auditing and Logging.mp4 258.9 MB
  • mp423. Response Planning.mp4 255.7 MB
  • mp429. Backup and Recovery.mp4 251.4 MB
  • mp49. Inventory of Critical Assets.mp4 247.4 MB
  • mp446. Documenting Controls.mp4 246.5 MB
  • mp421. Monitoring and Alerting.mp4 238.7 MB
  • mp422. Assessments.mp4 238.7 MB
  • mp442. Control Allocation and Monitoring.mp4 234.0 MB
  • mp410. Business Impact Assessment.mp4 231.6 MB
  • mp440. NIST Control Documents.mp4 230.2 MB
  • mp436. Establishing Scope.mp4 227.5 MB
  • mp444. Security Control Implementation.mp4 225.8 MB
  • mp43. NIST Relationships.mp4 222.6 MB
  • mp46. The Vocabulary of Risk.mp4 222.0 MB
  • mp425. Digital Forensics.mp4 219.4 MB
  • mp451. Assessment Documentation.mp4 219.2 MB
【影视】 Microsoft Cybersecurity Pro Track Managing Identity
收录时间:2021-03-09 文档个数:34 文档大小:850.9 MB 最近下载:2025-05-16 人气:1812 磁力链接
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/03 Securing Active Directory/006 Active Directory Security.mp4 212.7 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/05 Active Directory & Kerberos Protocol/009 Authentication and Authorization in Active Directory.mp4 155.1 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/04 Azure Active Directory (AAD)/008 Azure Security Architecture.mp4 122.3 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/01 Introduction/003 Preparing the Lab Environment.mp4 92.3 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/02 Managing Identity/005 Security Privileged Access Roadmap Stage 2.mp4 81.3 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/02 Managing Identity/004 Identity as a Service, the new Control Plane.mp4 76.2 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/04 Azure Active Directory (AAD)/007 Identity Federation and Access Solutions for the Cloud.mp4 63.6 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/01 Introduction/002 About the Course.mp4 33.8 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/01 Introduction/001 Instructor Introduction.mp4 11.0 MB
  • pad/3.pad/3 488.8 kB
  • pad/4.pad/4 442.3 kB
  • pad/2.pad/2 358.5 kB
  • pad/6.pad/6 355.4 kB
  • pad/5.pad/5 338.9 kB
  • pad/7.pad/7 245.6 kB
  • srt[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/03 Securing Active Directory/006 Active Directory Security.en.srt 56.2 kB
  • srt[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/05 Active Directory & Kerberos Protocol/009 Authentication and Authorization in Active Directory.en.srt 53.0 kB
  • srt[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/04 Azure Active Directory (AAD)/008 Azure Security Architecture.en.srt 37.5 kB
  • srt[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/02 Managing Identity/005 Security Privileged Access Roadmap Stage 2.en.srt 26.4 kB
  • srt[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/01 Introduction/003 Preparing the Lab Environment.en.srt 24.9 kB
【影视】 [ WebToolTip.com ] Udemy - ISACA Cybersecurity Fundamentals - Complete Training Course
收录时间:2025-03-07 文档个数:45 文档大小:858.9 MB 最近下载:2025-05-16 人气:2781 磁力链接
  • mp4~Get Your Files Here !/2 - Types of Security/4 -Cybersecurity.mp4 38.9 MB
  • mp4~Get Your Files Here !/3 - Governance, Risk Management and Compliance/5 -Risk Analysis Approaches.mp4 36.9 MB
  • mp4~Get Your Files Here !/4 - Common Types of Malware/6 -Trojan Horses.mp4 34.2 MB
  • mp4~Get Your Files Here !/4 - Common Types of Malware/5 -Ransomware.mp4 34.1 MB
  • mp4~Get Your Files Here !/4 - Common Types of Malware/3 -Worms.mp4 33.9 MB
  • mp4~Get Your Files Here !/5 - Security Controls/2 -Control Functions and Types.mp4 32.8 MB
  • mp4~Get Your Files Here !/4 - Common Types of Malware/2 -Viruses.mp4 31.7 MB
  • mp4~Get Your Files Here !/2 - Types of Security/5 -Physical Security.mp4 31.6 MB
  • mp4~Get Your Files Here !/3 - Governance, Risk Management and Compliance/4 -Risk Governance.mp4 29.0 MB
  • mp4~Get Your Files Here !/4 - Common Types of Malware/8 -Adware.mp4 28.9 MB
  • mp4~Get Your Files Here !/6 - OWASP Top 10/11 -Server-Side Request Forgery.mp4 28.7 MB
  • mp4~Get Your Files Here !/6 - OWASP Top 10/9 -Software and Data Integrity Failures.mp4 28.1 MB
  • mp4~Get Your Files Here !/6 - OWASP Top 10/10 -Security Logging and Monitoring Failures.mp4 28.0 MB
  • mp4~Get Your Files Here !/6 - OWASP Top 10/3 -Cryptographic Failures.mp4 27.0 MB
  • mp4~Get Your Files Here !/6 - OWASP Top 10/7 -Vulnerable and Outdated Components.mp4 27.0 MB
  • mp4~Get Your Files Here !/1 - Introduction/3 -Integrity.mp4 26.2 MB
  • mp4~Get Your Files Here !/4 - Common Types of Malware/7 -Rootkit.mp4 25.7 MB
  • mp4~Get Your Files Here !/2 - Types of Security/3 -Information Security.mp4 23.5 MB
  • mp4~Get Your Files Here !/1 - Introduction/4 -Availability.mp4 22.1 MB
  • mp4~Get Your Files Here !/4 - Common Types of Malware/4 -Keyloggers.mp4 21.6 MB
【影视】 IGTI - Bootcamp - Analista de Cybersecurity
收录时间:2021-06-25 文档个数:168 文档大小:13.0 GB 最近下载:2025-05-16 人气:3297 磁力链接
  • mp4Módulo 4 - Análise Computacional Forense/Segunda aula interativa.mp4 455.8 MB
  • mp4Módulo 1 - Fundamentos de Cybersecurity/Segunda aula interativa - CBS211A - 1280x720 2310K.mp4 412.0 MB
  • mp4Módulo 2 - Segurança de Infraestrutura de TI/Primeira aula interativa.mp4 403.8 MB
  • mp4Módulo 3 - Auditoria e testes de invasão/Segunda aula interativa.mp4 392.8 MB
  • mp4Módulo 3 - Auditoria e testes de invasão/Primeira aula interativa.mp4 379.2 MB
  • mp4Desafio Final/Desafio Final.mp4 363.7 MB
  • mp4Módulo 2 - Segurança de Infraestrutura de TI/5. Firewall, IDS e IPS/Aula 2.5.2 - IPS e IDS.mp4 363.0 MB
  • mp4Módulo 2 - Segurança de Infraestrutura de TI/9. Controlador de Domínio e Group Polices/Controlador de Domínio e Group Polices.mp4 338.8 MB
  • mp4Módulo 2 - Segurança de Infraestrutura de TI/Segunda aula interativa.mp4 330.3 MB
  • mp4Módulo 4 - Análise Computacional Forense/Primeira aula interativa.mp4 279.1 MB
  • mp4Módulo 2 - Segurança de Infraestrutura de TI/7. Monitoramento e Gerenciamento com NTOP/Monitoramento e Gerenciamento com NTOP.mp4 254.6 MB
  • mp4Módulo 2 - Segurança de Infraestrutura de TI/11. Camada 5, vírus e Firewall pessoal/Camada 5, vírus e Firewall pessoal.mp4 220.2 MB
  • mp4Módulo 2 - Segurança de Infraestrutura de TI/13. Camada 7, criptografia e DLP/Camada 7, criptografia e DLP.mp4 205.7 MB
  • mp4Módulo 3 - Auditoria e testes de invasão/14. Metasploit - Pós-exploração e eliminação dos rastros/HAC- BTC 3.14 - 720p.mp4 198.0 MB
  • mp4Módulo 2 - Segurança de Infraestrutura de TI/12. Camada 6 e WAF/Camada 6 e WAF.mp4 192.5 MB
  • mp4Módulo 1 - Fundamentos de Cybersecurity/Primeira aula interativa - CBS211A - 1280x720 2310K.mp4 186.9 MB
  • mp4Módulo 2 - Segurança de Infraestrutura de TI/2. Arquitetura da Estratégia de Defesa em Profundidade/Arquitetura da Estratégia de Defesa em Profundidade.mp4 175.4 MB
  • mp4Módulo 2 - Segurança de Infraestrutura de TI/5. Firewall, IDS e IPS/Aula 2.4.2 - Firewall (Parte 2).mp4 158.3 MB
  • mp4Módulo 3 - Auditoria e testes de invasão/8. Fingerprint e análise de vulnerabilidade/HAC 3.5 - 720p.mp4 149.2 MB
  • mp4Módulo 2 - Segurança de Infraestrutura de TI/1. Defesa em Profundidade/Aula 1.3 - Elementos de Controle.mp4 147.4 MB
【影视】 Microsoft Cybersecurity Architect SC 100 Exam Prep
收录时间:2023-12-23 文档个数:271 文档大小:10.3 GB 最近下载:2025-05-16 人气:9458 磁力链接
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/21 - CAF Governance.mp4 293.3 MB
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/19 - CAF Landing Zone Deployment Lab Step By StepII.mp4 286.7 MB
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/16 - CAF Readyness Azure setup guide.mp4 231.2 MB
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/41 - SecOps Best practices for SIEM SOAR.mp4 202.4 MB
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/12 - MCRA IoT and IT Security II.mp4 161.1 MB
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/78 - Pass Through Authentication PTA.mp4 160.2 MB
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/4 - Design security for infrastructure/103 - Plan and Implement a security strategy across teams.mp4 157.6 MB
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/17 - CAF Readyness Azure Landing Zone.mp4 154.3 MB
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/72 - Zero trust Security strategy for Identities.mp4 152.4 MB
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/27 - SC 100 Case Study.mp4 149.8 MB
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/11 - MCRA People Security.mp4 141.5 MB
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/3 - Evaluate Governance Risk Compliance GRCstrategies/93 - Encryption Support for various services.mp4 137.3 MB
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/79 - Azure AD Roles Best Practices.mp4 136.1 MB
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/35 - Recommendations for Designing a logging and auditing security strategy.mp4 133.8 MB
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/4 - Design security for infrastructure/124 - Securing Domain Controllers.mp4 127.6 MB
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/4 - Design security for infrastructure/118 - Securing Member Servers.mp4 124.1 MB
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/40 - Azure Tools for SecOps.mp4 123.5 MB
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/48 - Incident Management process Overview.mp4 122.3 MB
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/82 - Develop a Roadmap Explained.mp4 119.6 MB
  • mp4[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/74 - Conditional Access Personas.mp4 118.4 MB
【影视】 [ FreeCourseWeb.com ] AI Cybersecurity with DeepSeek R1 - Protect Your Digital Life
收录时间:2025-02-23 文档个数:25 文档大小:363.3 MB 最近下载:2025-05-16 人气:1236 磁力链接
  • mp4~Get Your Files Here !/5 - Digital Forensics & Investigations/2 -Analyzing Suspicious Software.mp4 46.2 MB
  • mp4~Get Your Files Here !/4 - OSINT – How Scammers Gather Your Data/3 -Romance Scams How They Manipulate Victims.mp4 43.4 MB
  • mp4~Get Your Files Here !/1 - Introduction to AI and Cybersecurity/1 -What Are Artificial Intelligence & Cybersecurity.mp4 37.4 MB
  • mp4~Get Your Files Here !/3 - Ethical Hacking Real-World Demonstrations/3 -Hacking with Advanced Malware A Demonstration.mp4 27.7 MB
  • mp4~Get Your Files Here !/7 - Final Thoughts & Cybersecurity Mindset/1 -Psychological Tricks Hackers Use & How to Avoid Scams.mp4 26.1 MB
  • mp4~Get Your Files Here !/6 - Leveraging AI for Profit and Cybersecurity/1 -Qwen 2.5 AI Video Generation.mp4 25.8 MB
  • mp4~Get Your Files Here !/3 - Ethical Hacking Real-World Demonstrations/2 -Why Do Experts Say Don't Click the Link.mp4 23.4 MB
  • mp4~Get Your Files Here !/4 - OSINT – How Scammers Gather Your Data/1 -How Scammers Steal Your Personal Data.mp4 22.6 MB
  • mp4~Get Your Files Here !/4 - OSINT – How Scammers Gather Your Data/2 -Job Scams Be Careful Where You Apply.mp4 19.7 MB
  • mp4~Get Your Files Here !/4 - OSINT – How Scammers Gather Your Data/4 -OSINT Tools SearchPeopleFree, WhitePages.mp4 15.5 MB
  • mp4~Get Your Files Here !/5 - Digital Forensics & Investigations/3 -Investigating Malicious Links.mp4 13.4 MB
  • mp4~Get Your Files Here !/5 - Digital Forensics & Investigations/4 -Verifying Email Sources for Cyber Threats.mp4 10.8 MB
  • mp4~Get Your Files Here !/3 - Ethical Hacking Real-World Demonstrations/4 -Key Takeaways & How to Protect Yourself.mp4 10.7 MB
  • mp4~Get Your Files Here !/3 - Ethical Hacking Real-World Demonstrations/1 -Advanced Phishing Attacks How They Work.mp4 9.4 MB
  • mp4~Get Your Files Here !/1 - Introduction to AI and Cybersecurity/2 -Who Is This Course For.mp4 8.7 MB
  • mp4~Get Your Files Here !/5 - Digital Forensics & Investigations/1 -Introduction to Digital Forensics.mp4 8.0 MB
  • mp4~Get Your Files Here !/2 - Cybersecurity Myths vs. Reality/2 -Why Antivirus Alone Won't Keep You Safe.mp4 7.9 MB
  • mp4~Get Your Files Here !/2 - Cybersecurity Myths vs. Reality/1 -What Are the Risks of Downloading Unknown Apps.mp4 6.7 MB
  • html~Get Your Files Here !/6 - Leveraging AI for Profit and Cybersecurity/2 - Use Google Ai studio to generate script for a video.html 11.3 kB
  • html~Get Your Files Here !/6 - Leveraging AI for Profit and Cybersecurity/2 - Whisper Free Audio Transcription for Security Experts.html 5.3 kB
【影视】 [ WebToolTip.com ] Udemy - GenAI Cybersecurity - OWASP Top 10, MITRE ATLAS and API Attacks
收录时间:2025-05-09 文档个数:70 文档大小:1.6 GB 最近下载:2025-05-16 人气:288 磁力链接
  • mp4~Get Your Files Here !/7 - MITRE ATLAS Mapping for LLM Attacks/2 -Mapping AI Threats with MITRE ATLAS OpenAI vs. DeepSeek Case Study.mp4 156.0 MB
  • mp4~Get Your Files Here !/6 - LLM API Security Real-World Exploitation & Mitigation Demo with OLAMA/3 -Hands-On Demo Exploiting an Insecure Ollama API Setup.mp4 135.0 MB
  • mp4~Get Your Files Here !/6 - LLM API Security Real-World Exploitation & Mitigation Demo with OLAMA/6 -Mitigating OLAMA API Risks with NGINX Authentication (Hands-On Demo).mp4 81.1 MB
  • mp4~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/9 -How Self-Attention Builds Rich Contextual Understanding in Transformers.mp4 72.5 MB
  • mp4~Get Your Files Here !/5 - OWASP Top 10 for LLMs Understanding AI-Specific Security Risks/2 -OWASP Top 10 Risks for LLMs + Case Study Mapping.mp4 52.7 MB
  • mp4~Get Your Files Here !/8 - Hands-On Lab Exploiting AI Decisions in LLM APIs/2 -Lab Demo – Exploiting LLM APIs with Excessive Agency (PortSwigger).mp4 49.4 MB
  • mp4~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/9 -Scenario 2 Deep Dive into LLM Attack Surfaces from the Provider Side.mp4 48.5 MB
  • mp4~Get Your Files Here !/3 - Anatomy of an LLM System and Its Security Attack Surface/6 -LLM Processing Unit Explained Inference Handling, Prompt Cntrl & Runtime Logic.mp4 45.0 MB
  • mp4~Get Your Files Here !/6 - LLM API Security Real-World Exploitation & Mitigation Demo with OLAMA/4 -Ollama in the Wild Real-World Exposure via Shodan + Developer Risk Behavior.mp4 44.9 MB
  • mp4~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/11 -Inference and Log Data Exposure DeepSeek’s AI Leak Case Study.mp4 42.7 MB
  • mp4~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/6 -Understanding Recurrent Neural Networks (RNNs) for Language Processing.mp4 40.8 MB
  • mp4~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/10 -Training Data Poisoning Case Study How Microsoft Tay Was Manipulated on Twitter.mp4 37.5 MB
  • mp4~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/11 -Summary of Transformer Innovations Key Concepts Behind LLMs.mp4 30.9 MB
  • mp4~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/14 -Section 3 Wrap-Up LLM Attack Surface Lessons + What’s Next with OWASP Top 10.mp4 30.3 MB
  • mp4~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/8 -Prompt Injection Demonstration How a $1 Chevy Tahoe Chatbot Reply Went Viral.mp4 29.8 MB
  • mp4~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/7 -How Transformers and LLMs Revolutionized Language Processing.mp4 27.6 MB
  • mp4~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/12 -LLM Model Exposure How Misconfigured Ollama APIs Opened the Door.mp4 27.5 MB
  • mp4~Get Your Files Here !/2 - Introduction to Large Language Models (LLMs)/3 -Where Large Language Models Fit in the Generative AI Landscape.mp4 26.8 MB
  • mp4~Get Your Files Here !/6 - LLM API Security Real-World Exploitation & Mitigation Demo with OLAMA/7 -How One Misconfigured LLM API Triggers Multiple OWASP Risks.mp4 26.7 MB
  • mp4~Get Your Files Here !/4 - Understanding LLM Attack Surfaces/7 -Scenario 1 LLM Attack Surfaces in Organizations Using AI Models.mp4 26.5 MB
【影视】 Python for Cybersecurity Specialization
收录时间:2023-12-18 文档个数:366 文档大小:1.2 GB 最近下载:2025-05-16 人气:13373 磁力链接
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/03_alternative-protocol.mp4 61.8 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/05_network-sniffing.mp4 42.0 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/04_network-scanning.mp4 32.5 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/05_protocol-decoding.mp4 31.5 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/07_behavioral-analytics.mp4 29.2 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/03_registry-autorun.mp4 29.0 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/05_hijacked-execution-flow.mp4 27.5 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/06_dns-exploration.mp4 27.3 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/05_system-activity-monitoring.mp4 26.6 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/03_pcap-collection.mp4 26.0 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/03_encrypted-channel.mp4 25.8 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/05_scheduled-execution.mp4 25.8 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/03_user-account-discovery.mp4 25.4 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/03_logon-scripts.mp4 24.6 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/03_data-encryption.mp4 23.6 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/05_alternate-data-streams.mp4 22.4 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/03_default-account-discovery.mp4 21.7 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/05_autorun-scripts.mp4 21.2 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/03_impair-avs.mp4 20.8 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/03_credentials-from-web-browsers.mp4 20.7 MB
【影视】 Implementing the NIST Cybersecurity Framework
收录时间:2024-01-10 文档个数:127 文档大小:4.3 GB 最近下载:2025-05-16 人气:874 磁力链接
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/2. Using the NIST Cybersecurity Framework/5. Finding the Controls.mp4 307.2 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/6. Five Functions.mp4 231.8 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/7. Controls and Outcomes.mp4 205.8 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/5. Framework Components.mp4 197.5 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/3. Value Proposition.mp4 181.0 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/1. Welcome.mp4 161.5 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/5. Generate Questionnaire.mp4 153.5 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/2. Using the NIST Cybersecurity Framework/1. Using the Core.mp4 149.0 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/2. Intel (Microchip Manufacturing).mp4 143.5 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/5. Implementing Phase Two of the CR-MAP/4. Business Value Analysis.mp4 139.8 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/4. DOE (Energy Industry).mp4 139.0 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/7. Conduct Interviews.mp4 136.2 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/7. Conclusion/1. BONUS - Conclusion.mp4 126.4 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/3. Cimpress (Promotional Products).mp4 123.9 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/6. Saudi Aramco (Oil Industry).mp4 118.9 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/4. Intended Audience.mp4 112.2 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/5. Western Australia (Local Government).mp4 112.1 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/6. Choose Target Scores.mp4 100.5 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/6. Implementing Phase Three of the CR-MAP/3. Quarterly Reviews.mp4 99.8 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/1. Phase One.mp4 93.8 MB
【影视】 Cybersecurity Monitoring & Detection Lab
收录时间:2023-12-20 文档个数:71 文档大小:2.7 GB 最近下载:2025-05-16 人气:10002 磁力链接
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/28. Attacks and Monitor in Splunk.mp4 216.4 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/26. Attacks & Security Onion Monitoring.mp4 213.9 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/27. Introduction to Splunk.mp4 147.7 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/25. Introduction to Security Onion.mp4 134.2 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/9. Install Security Onion.mp4 127.0 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/1. Introduction to Cybersecurity/2. Cyber Security Monitoring & Detection.mp4 108.8 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/8. Install Ubuntu Server.mp4 108.1 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/1. Introduction to Cybersecurity/1. Introduction Cyber Security.mp4 108.0 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/5. PfSense Firewall Wizard, Naming & Rules.mp4 98.8 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/30. Configure WAZUH Agent on Windows.mp4 85.7 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/4. PfSense Firewall Initial Configuration.mp4 84.5 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/29. Install WAZUH Manager.mp4 76.9 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/12. Install Windows Server 2019 Advanced Method.mp4 73.6 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/2. Install Windows 11.mp4 72.7 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/21. Setting IP Address on Ubuntu Server.mp4 70.4 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/18. Install Splunk on Linux Ubuntu Server.mp4 68.9 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/19. Install Splunk on Linux CentOS.mp4 67.3 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/1. Introduction to Cybersecurity/3. Cyber Security Monitoring & Detection Lab.mp4 66.9 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/13. Configure Active Directory AD.mp4 65.8 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/11. Install Windows Server 2019 Typical Method.mp4 64.3 MB
【影视】 Palo Alto Networks Cybersecurity Fundamentals (PCCSA)
收录时间:2024-02-29 文档个数:52 文档大小:2.0 GB 最近下载:2025-05-16 人气:5526 磁力链接
  • mp4Chapter 1 Cybersecurity Fundamentals and Threat Landscape/002. Identify Computing and Networking Trends.mp4 118.2 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/006. Identify Networking Security Technologies.mp4 114.7 MB
  • mp4Chapter 1 Cybersecurity Fundamentals and Threat Landscape/003. Describe Cybersecurity Threats.mp4 108.3 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/004. Review Network Addressing.mp4 105.2 MB
  • mp4Chapter 1 Cybersecurity Fundamentals and Threat Landscape/005. Identify Wi-Fi Vulnerabilities and Attacks.mp4 100.1 MB
  • mp4Chapter 1 Cybersecurity Fundamentals and Threat Landscape/004. Describe Common Cyberattack Techniques.mp4 96.3 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/011. Endpoint Security.mp4 95.3 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/002. Describe Routing Protocols.mp4 91.8 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/001. Identify Basic Internet and Network Operations.mp4 90.7 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/012. Server and System Administration.mp4 90.3 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/003. Review Networking Models.mp4 88.4 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/009. Learn Basic Virtualization Security Concepts.mp4 83.8 MB
  • mp4Chapter 3 Palo Alto Networks Security Solutions and Technologies/007. Describe Cortex XSOAR and AutoFocus.mp4 79.5 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/008. Learn Basic Cloud Security Concepts.mp4 75.4 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/010. Learn Basic DevOps Security Concepts.mp4 75.3 MB
  • mp4Chapter 3 Palo Alto Networks Security Solutions and Technologies/001. Identify Palo Alto Networks Security Solutions.mp4 74.3 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/005. Learn Networking Security Models.mp4 72.6 MB
  • mp4Chapter 3 Palo Alto Networks Security Solutions and Technologies/002. Describe Basic NGFW Components and Functions.mp4 67.1 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/007. Learn Basic Data Center Security Concepts.mp4 60.2 MB
  • mp4Chapter 3 Palo Alto Networks Security Solutions and Technologies/003. Learn Basic Prisma Cloud.mp4 59.7 MB
【影视】 Cybersecurity Prevention and Detection 2nd Edition (Video Collection)
收录时间:2024-05-31 文档个数:374 文档大小:3.8 GB 最近下载:2025-05-16 人气:4395 磁力链接
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/007. 1.6 Identity and access management.mp4 120.3 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/003. 1.2 Log ingestion Part 2.mp4 117.9 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/002. 1.1 Log ingestion Part 1.mp4 106.0 MB
  • mp403 Malware and Incident Response/Lesson 1 Threat Landscape/002. 1.1 Malware Threat Landscape.mp4 90.8 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/005. 1.4 Infrastructure concepts.mp4 89.3 MB
  • mp404 Secure Operations and Protections/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/004. 2.3 Technology and tool integration.mp4 87.2 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 2 Analyze Indicators of Potentially Malicious Activity/002. 2.1 Network-related.mp4 77.1 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/008. 1.7 Encryption.mp4 76.0 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/006. 3.5 Common techniques Part 3.mp4 63.7 MB
  • mp403 Malware and Incident Response/Lesson 5 PE File Identification/004. 5.3 Entry Points.mp4 62.4 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/004. 3.3 Common techniques Part 1.mp4 56.9 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/002. 1.1 Threat actors Part 1.mp4 53.5 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/004. 1.3 Operating system (OS) concepts.mp4 52.1 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/005. 3.4 Common techniques Part 2.mp4 51.1 MB
  • mp402 System and Privacy Data Protection/Lesson 4 Analyzing Logs and Impact Analysis/008. 4.7 Impact Analysis.mp4 51.0 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/007. 7.6 SOC and FPGA.mp4 50.5 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/006. 1.5 Network architecture.mp4 50.1 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/010. 7.9 Industrial Control Systems (ICS) and Process Automation.mp4 46.2 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/004. 7.3 Internet of Things (IoT) and Embedded Devices Part 2.mp4 45.3 MB
  • mp404 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/013. 4.12 Threat modeling.mp4 43.6 MB
【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity and Kali Linux - Hands-on course by TechLatest
收录时间:2023-12-29 文档个数:43 文档大小:2.6 GB 最近下载:2025-05-16 人气:6597 磁力链接
  • mp4~Get Your Files Here !/7. Module 7 - Wireless Fortification Pentesting Mastery/2. Web App Pentesting Practical.mp4 636.4 MB
  • mp4~Get Your Files Here !/10. Module 10 - Communicating Findings Reporting Mastery/2. Reporting Practical + Conclusion.mp4 283.4 MB
  • mp4~Get Your Files Here !/6. Module 6 - Crack the Code Password Mastery/2. Password Cracking Practical.mp4 265.1 MB
  • mp4~Get Your Files Here !/5. Module 5 - Hacking Mastery Strategic Exploitation/2. Exploitation Practical.mp4 222.1 MB
  • mp4~Get Your Files Here !/9. Module 9 - Human Manipulation Social Engineering/2. Social Engineering Practical.mp4 198.1 MB
  • mp4~Get Your Files Here !/8. Module 8 - Wireless Fortification Pentesting Mastery/2. Wireless Pentesting Practical.mp4 194.1 MB
  • mp4~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/3. Social Media Reconnaissance.mp4 142.0 MB
  • mp4~Get Your Files Here !/4. Module 4 - Infiltration Techniques Mastering Active Reconnaissance/2. Vulnerability Assessment.mp4 121.4 MB
  • mp4~Get Your Files Here !/5. Module 5 - Hacking Mastery Strategic Exploitation/1. Exploitation Introduction.mp4 84.3 MB
  • mp4~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/3. Microsoft Azure Guide..mp4 54.4 MB
  • mp4~Get Your Files Here !/6. Module 6 - Crack the Code Password Mastery/1. Password Cracking Introduction.mp4 48.2 MB
  • mp4~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/2. Google Cloud Platform(GCP) Guide..mp4 47.9 MB
  • mp4~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/1. Amazon Web Services(AWS) Guide..mp4 46.0 MB
  • mp4~Get Your Files Here !/4. Module 4 - Infiltration Techniques Mastering Active Reconnaissance/3. Scanning.mp4 44.9 MB
  • mp4~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/4. Unveiling the Secrets of OS Fingerprinting in Cybersecurity with Kali Linux.mp4 44.7 MB
  • mp4~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/5. Target Validation in Cybersecurity with Kali Linux.mp4 39.9 MB
  • mp4~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/1. Reconnaissance — First Phase of Hacking.mp4 30.0 MB
  • mp4~Get Your Files Here !/1. Module 1 - Course Introduction & Teaser/2. Course Introduction.mp4 28.4 MB
  • mp4~Get Your Files Here !/8. Module 8 - Wireless Fortification Pentesting Mastery/1. Wireless Pentesting Introduction.mp4 24.5 MB
  • mp4~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/6. Subdomain Discovery in Cybersecurity with Kali Linux.mp4 24.5 MB
共10页 上一页 1 2 3 4 5 6 下一页