磁力管家

磁力管家
为您索检到186条磁力链接,耗时1毫秒。 rss

分享给好友

【影视】 [ FreeCourseWeb.com ] ISO 27001 - 2022-Compliant Cybersecurity - The Annex A Controls
收录时间:2024-01-12 文档个数:97 文档大小:310.4 MB 最近下载:2025-05-16 人气:10551 磁力链接
  • mp4~Get Your Files Here !/13 - 12. Threat and Vulnerability Management and Secure Configuration/02 - Secure configuration (Controls 8.9, 8.19, and 8.24).mp4 14.2 MB
  • mp4~Get Your Files Here !/07 - 6. Information Security Event Management/01 - Information security incident management (Controls 5.24–5.28, and 6.8).mp4 13.3 MB
  • mp4~Get Your Files Here !/05 - 4. Identity and Access Management/01 - Access management (Controls 5.15–5.18).mp4 12.9 MB
  • mp4~Get Your Files Here !/04 - 3. Information Protection/02 - Deletion, masking, DLP, and test data (Controls 8.10–8.12, and 8.33).mp4 12.7 MB
  • mp4~Get Your Files Here !/08 - 7. Continuity/01 - Continuity (Controls 5.29, 5.30, and 8.13).mp4 12.4 MB
  • mp4~Get Your Files Here !/14 - 13. Application Security/01 - Secure development (Controls 8.25–8.28).mp4 12.4 MB
  • mp4~Get Your Files Here !/10 - 9. Human Resource Security/02 - During employment (Controls 6.3–6.6).mp4 12.3 MB
  • mp4~Get Your Files Here !/12 - 11. System and Network Security/01 - Network security management (Controls 8.20–8.23).mp4 12.1 MB
  • mp4~Get Your Files Here !/12 - 11. System and Network Security/02 - Protection of information systems (Controls 8.7, 8.18, 8.30, and 8.34).mp4 11.8 MB
  • mp4~Get Your Files Here !/14 - 13. Application Security/02 - Testing, separate environments, and change management (Controls 8.29, 8.31, and 8.32).mp4 11.7 MB
  • mp4~Get Your Files Here !/05 - 4. Identity and Access Management/02 - System and application access control (Controls 8.2–8.5).mp4 11.6 MB
  • mp4~Get Your Files Here !/02 - 1. Governance/03 - Contacts and project management (Controls 5.5, 5.6, and 5.8).mp4 11.0 MB
  • mp4~Get Your Files Here !/03 - 2. Asset Management/01 - Responsibility for information assets (Controls 5.9, 5.10, 6.7, and 8.1).mp4 10.8 MB
  • mp4~Get Your Files Here !/04 - 3. Information Protection/01 - Classification, labeling, and privacy (Controls 5.12, 5.13, and 5.34).mp4 10.8 MB
  • mp4~Get Your Files Here !/02 - 1. Governance/02 - Roles, responsibilities, and duties (Controls 5.2–5.4).mp4 10.4 MB
  • mp4~Get Your Files Here !/02 - 1. Governance/01 - Policies for information security (Control 5.1).mp4 10.1 MB
  • mp4~Get Your Files Here !/07 - 6. Information Security Event Management/02 - Logging and monitoring (Controls 8.15–8.17).mp4 9.9 MB
  • mp4~Get Your Files Here !/06 - 5. Supplier Relationships Security/01 - Supplier relationships security (Controls 5.19–5.21).mp4 9.6 MB
  • mp4~Get Your Files Here !/06 - 5. Supplier Relationships Security/02 - Managing supplier service delivery and cloud services security (Controls 5.22 and 5.23).mp4 9.6 MB
  • mp4~Get Your Files Here !/13 - 12. Threat and Vulnerability Management and Secure Configuration/01 - Threat and vulnerability management (Controls 5.7 and 8.8).mp4 9.5 MB
【影视】 [ CoursePig.com ] Linkedin - Microsoft Cybersecurity Architect Expert (SC-100) Cert Prep - 4 Design Strategy for Data and Applications
收录时间:2024-02-06 文档个数:24 文档大小:153.6 MB 最近下载:2025-05-16 人气:1320 磁力链接
  • mp4~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/02 - Design a strategy to identify and protect sensitive data.mp4 27.6 MB
  • mp4~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/03 - Specify a security strategy for applications and APIs.mp4 24.9 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Prepping for the SC-100 exam.mp4 22.5 MB
  • mp4~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/02 - Specify a security standard for onboarding a new application.mp4 18.4 MB
  • mp4~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/03 - Specify an encryption standard for data at rest and in motion.mp4 16.3 MB
  • mp4~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/01 - Specify priorities for mitigating threats to applications.mp4 14.2 MB
  • mp4~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/01 - Specify priorities for mitigating threats to data.mp4 13.9 MB
  • mp4~Get Your Files Here !/01 - Introduction/02 - What you should know.mp4 6.8 MB
  • mp4~Get Your Files Here !/04 - Conclusion/01 - Next steps.mp4 5.0 MB
  • mp4~Get Your Files Here !/01 - Introduction/03 - Lab setup.mp4 3.4 MB
  • pdf~Get Your Files Here !/Ex_Files_MSFT_Cybersecurity_Arch_Expert_SC_100_Cert_Prep_4/Exercise Files/Sign up for a free trial.pdf 338.4 kB
  • pdf~Get Your Files Here !/Ex_Files_MSFT_Cybersecurity_Arch_Expert_SC_100_Cert_Prep_4/Exercise Files/SC-100 Exam Study Guide Course 4.pdf 47.8 kB
  • srt~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/02 - Design a strategy to identify and protect sensitive data.srt 18.1 kB
  • srt~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/03 - Specify a security strategy for applications and APIs.srt 15.6 kB
  • srt~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/02 - Specify a security standard for onboarding a new application.srt 9.7 kB
  • srt~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/03 - Specify an encryption standard for data at rest and in motion.srt 9.2 kB
  • srt~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/01 - Specify priorities for mitigating threats to data.srt 9.0 kB
  • srt~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/01 - Specify priorities for mitigating threats to applications.srt 7.7 kB
  • srt~Get Your Files Here !/01 - Introduction/02 - What you should know.srt 3.4 kB
  • srt~Get Your Files Here !/04 - Conclusion/01 - Next steps.srt 2.6 kB
【影视】 Demystifying Cybersecurity Fundamentals-Learning with Demos
收录时间:2023-12-18 文档个数:208 文档大小:3.6 GB 最近下载:2025-05-16 人气:8876 磁力链接
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/1. Introduction/1. Top 10 Cyber Attacks of 21st Century.mp4 106.2 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/5. Deep Dive into Various Algorithms/9. What is Deffie-Hellman Algorithm .mp4 100.7 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/5. Deep Dive into Various Algorithms/7. Understanding RSA Algorithm with Example.mp4 94.6 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/7. Networking Basics/15. How a Packet Travels from Source to Destination.mp4 88.0 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/5. Deep Dive into Various Algorithms/6. What is the RSA Algorithm .mp4 82.1 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/6. Public Key Infrastructure - PKI/2. What is PKI .mp4 76.1 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/7. Networking Basics/9. Understanding an IP address.mp4 69.7 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/3. Types of Hackers/5. Hacktivist.mp4 67.5 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/3. Types of Hackers/6. Script Kiddie.mp4 66.2 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/2. Types of Cyber Attacks/6. Demo A Dictionary Attack - Password Attack.mp4 62.2 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/5. Deep Dive into Various Algorithms/10. Understanding DH Algorithm with an Example.mp4 59.6 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/5. Deep Dive into Various Algorithms/2. What is Cipher Algorithm & Key.mp4 59.3 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/2. Types of Cyber Attacks/8. Demo MITM Attack using ARP Poisoning.mp4 54.4 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/1. Introduction/4. What is Cybersecurity .mp4 54.3 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/5. Deep Dive into Various Algorithms/12. What is Elliptic Curve Algorithm .mp4 53.6 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/4. Basics of Cryptography/11. DemoAsymmetric encryption using openssl.mp4 53.1 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/5. Deep Dive into Various Algorithms/8. What is DSA Algorithm .mp4 51.7 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/4. Basics of Cryptography/8. What is Asymmetric Encryption.mp4 50.9 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/3. Types of Hackers/3. Black Hat Hacker.mp4 50.7 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/2. Types of Cyber Attacks/4. Demo How attackers use Phishing Attack .mp4 50.5 MB
【影视】 [ CourseMega.com ] Udemy - Interview Skills - How To Interview For Cybersecurity Jobs
收录时间:2023-12-18 文档个数:25 文档大小:406.9 MB 最近下载:2025-05-16 人气:1389 磁力链接
  • mp4~Get Your Files Here !/5 - Unpacking Interview Bias Understanding Its Impact and How to Overcome It/5 - Unpacking Interview Bias Understanding Its Impact and How to Overcome It.mp4 154.0 MB
  • mp4~Get Your Files Here !/4 - Inside the Interviewers Mind Exploring Their Biggest Fears/4 - Inside the Interviewers Mind Exploring Their Biggest Fears.mp4 108.3 MB
  • mp4~Get Your Files Here !/6 - Mastering Behavioral Interview Questions Tips for Crafting Effective Responses/6 - Mastering Behavioral Interview Questions Tips for Crafting Effective Responses.mp4 55.8 MB
  • mp4~Get Your Files Here !/2 - Decoding the Mystery Behind a WorldFamous Question/2 - Decoding the Mystery Behind a WorldFamous Question.mp4 27.5 MB
  • mp4~Get Your Files Here !/3 - Mastering the Mental Game/3 - Mastering the Mental Game.mp4 26.3 MB
  • mp4~Get Your Files Here !/1 - Course Introduction/1 - Introduction to this course.mp4 15.0 MB
  • mp4~Get Your Files Here !/7 - Avoiding SelfSabotage Tips to Enhance Your Job Interview/7 - Avoiding SelfSabotage Tips to Enhance Your Job Interview.mp4 15.0 MB
  • pdf~Get Your Files Here !/1 - Course Introduction/1 - hackthecybersecurityinterview.pdf 3.7 MB
  • pdf~Get Your Files Here !/5 - Unpacking Interview Bias Understanding Its Impact and How to Overcome It/5 - 5-Interview-Bias-Transcript.pdf 346.1 kB
  • pdf~Get Your Files Here !/4 - Inside the Interviewers Mind Exploring Their Biggest Fears/4 - 4-Interviewer-Mind-Transcript.pdf 289.2 kB
  • pdf~Get Your Files Here !/6 - Mastering Behavioral Interview Questions Tips for Crafting Effective Responses/6 - 6-Behavioral-Interview-Questions-Transcript.pdf 174.9 kB
  • pdf~Get Your Files Here !/3 - Mastering the Mental Game/3 - 3-Mental-Game-Mastery-Transcript.pdf 128.8 kB
  • pdf~Get Your Files Here !/1 - Course Introduction/1 - Complete-List-of-Behavioral-Interview-Questions.pdf 127.3 kB
  • pdf~Get Your Files Here !/2 - Decoding the Mystery Behind a WorldFamous Question/2 - 2-Famous-Question-Transcript.pdf 75.2 kB
  • pdf~Get Your Files Here !/7 - Avoiding SelfSabotage Tips to Enhance Your Job Interview/7 - 7-Self-Sabotage-Transcript.pdf 54.5 kB
  • vtt~Get Your Files Here !/5 - Unpacking Interview Bias Understanding Its Impact and How to Overcome It/5 - Unpacking Interview Bias Understanding Its Impact and How to Overcome It English.vtt 49.3 kB
  • pdf~Get Your Files Here !/1 - Course Introduction/1 - 1-Introduction-Transcript.pdf 41.9 kB
  • vtt~Get Your Files Here !/4 - Inside the Interviewers Mind Exploring Their Biggest Fears/4 - Inside the Interviewers Mind Exploring Their Biggest Fears English.vtt 41.0 kB
  • vtt~Get Your Files Here !/6 - Mastering Behavioral Interview Questions Tips for Crafting Effective Responses/6 - Mastering Behavioral Interview Questions Tips for Crafting Effective Responses English.vtt 24.5 kB
  • vtt~Get Your Files Here !/3 - Mastering the Mental Game/3 - Mastering the Mental Game English.vtt 17.2 kB
【影视】 [ DevCourseWeb.com ] Udemy - Master ICS - OT Cybersecurity - Fundamental to Advanced-Part 2
收录时间:2023-12-20 文档个数:44 文档大小:3.2 GB 最近下载:2025-05-16 人气:1951 磁力链接
  • mp4~Get Your Files Here !/01 - Introduction/002 Filesystem.mp4 154.3 MB
  • mp4~Get Your Files Here !/03 - Network Architecture Design Considerations/005 Reference Architecture-2.mp4 127.4 MB
  • mp4~Get Your Files Here !/04 - OT Cybersecurity Management/003 Manufacturing Impact Levels.mp4 124.9 MB
  • mp4~Get Your Files Here !/02 - Cryptography -Lab/011 Cyberland Usecase-OpenSSL.mp4 123.1 MB
  • mp4~Get Your Files Here !/02 - Cryptography -Lab/004 Hashing.mp4 120.2 MB
  • mp4~Get Your Files Here !/02 - Cryptography -Lab/002 Symmetric.mp4 112.3 MB
  • mp4~Get Your Files Here !/03 - Network Architecture Design Considerations/004 Reference Architecture-1.mp4 110.3 MB
  • mp4~Get Your Files Here !/06 - Contingency & Continuity Planning/005 Disaster Recovery Plan.mp4 106.3 MB
  • mp4~Get Your Files Here !/04 - OT Cybersecurity Management/002 Industry Profiling.mp4 103.1 MB
  • mp4~Get Your Files Here !/01 - Introduction/001 Linux.mp4 100.8 MB
  • mp4~Get Your Files Here !/02 - Cryptography -Lab/010 Binwalk Firmware Analysis.mp4 99.1 MB
  • mp4~Get Your Files Here !/02 - Cryptography -Lab/006 Cyberchef-1-Basic.mp4 98.9 MB
  • mp4~Get Your Files Here !/06 - Contingency & Continuity Planning/001 Types of Plan.mp4 94.8 MB
  • mp4~Get Your Files Here !/04 - OT Cybersecurity Management/004 Cybersecurity Framework.mp4 94.8 MB
  • mp4~Get Your Files Here !/02 - Cryptography -Lab/001 Cryptography.mp4 92.1 MB
  • mp4~Get Your Files Here !/03 - Network Architecture Design Considerations/006 Reference Architecture-3.mp4 89.4 MB
  • mp4~Get Your Files Here !/01 - Introduction/003 Filesystem Lab.mp4 86.1 MB
  • mp4~Get Your Files Here !/01 - Introduction/007 Linux File Ownership Lab-4.mp4 84.3 MB
  • mp4~Get Your Files Here !/03 - Network Architecture Design Considerations/001 Functional Difference.mp4 82.0 MB
  • mp4~Get Your Files Here !/04 - OT Cybersecurity Management/001 NIST Cybersecurity Program.mp4 81.7 MB
【影视】 [CourserHub.com] Coursera - Google Cybersecurity Professional Certificate
收录时间:2023-12-26 文档个数:1330 文档大小:4.1 GB 最近下载:2025-05-16 人气:11177 磁力链接
  • mp4foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/01_get-started-with-the-certificate-program/01_welcome-to-the-google-cybersecurity-certificate.mp4 49.6 MB
  • mp4assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/01_flaws-in-the-system/04_common-vulnerabilities-and-exposures.mp4 29.2 MB
  • mp4foundations-of-cybersecurity/02_the-evolution-of-cybersecurity/01_the-history-of-cybersecurity/03_attacks-in-the-digital-age.mp4 26.8 MB
  • mp4assets-threats-and-vulnerabilities/02_protect-organizational-assets/03_authentication-authorization-and-accounting/03_the-mechanisms-of-authorization.mp4 26.4 MB
  • mp4assets-threats-and-vulnerabilities/04_threats-to-asset-security/02_malware/01_malicious-software.mp4 25.7 MB
  • mp4manage-security-risks/04_use-playbooks-to-respond-to-incidents/01_phases-of-incident-response-playbooks/02_phases-of-an-incident-response-playbook.mp4 25.5 MB
  • mp4assets-threats-and-vulnerabilities/04_threats-to-asset-security/01_social-engineering/04_phishing-for-information.mp4 25.2 MB
  • mp4assets-threats-and-vulnerabilities/04_threats-to-asset-security/02_malware/03_the-rise-of-cryptojacking.mp4 24.8 MB
  • mp4foundations-of-cybersecurity/03_protect-against-threats-risks-and-vulnerabilities/01_frameworks-and-controls/02_introduction-to-security-frameworks-and-controls.mp4 24.5 MB
  • mp4foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/02_introduction-to-cybersecurity/01_introduction-to-cybersecurity.mp4 24.2 MB
  • mp4automate-cybersecurity-tasks-with-python/04_python-in-practice/03_debug-python-code/01_debugging-strategies.mp4 24.2 MB
  • mp4assets-threats-and-vulnerabilities/02_protect-organizational-assets/02_encryption-methods/01_fundamentals-of-cryptography.mp4 23.7 MB
  • mp4assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/03_cyber-attacker-mindset/01_protect-all-entry-points.mp4 23.6 MB
  • mp4foundations-of-cybersecurity/03_protect-against-threats-risks-and-vulnerabilities/02_ethics-in-cybersecurity/01_ethics-in-cybersecurity.mp4 23.6 MB
  • mp4assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/03_cyber-attacker-mindset/05_pathways-through-defenses.mp4 23.5 MB
  • mp4foundations-of-cybersecurity/02_the-evolution-of-cybersecurity/01_the-history-of-cybersecurity/02_past-cybersecurity-attacks.mp4 23.1 MB
  • mp4assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/01_flaws-in-the-system/02_vulnerability-management.mp4 23.0 MB
  • mp4networks-and-network-security/04_security-hardening/04_cloud-hardening/02_kelsey-cloud-security-explained.mp4 23.0 MB
  • mp4automate-cybersecurity-tasks-with-python/03_work-with-strings-and-lists/03_regular-expressions/01_regular-expressions-in-python.mp4 22.9 MB
  • mp4assets-threats-and-vulnerabilities/04_threats-to-asset-security/01_social-engineering/02_the-criminal-art-of-persuasion.mp4 22.7 MB
【影视】 [ FreeCourseWeb.com ] Udemy - Cybersecurity For Beginners - Network Attacks
收录时间:2022-01-18 文档个数:44 文档大小:901.0 MB 最近下载:2025-05-16 人气:792 磁力链接
  • mp4~Get Your Files Here !/7. Lab Demonstration - Scanning Networks with NMAP Pt. 1/1. Lab Demonstration - Scanning Networks with NMAP Pt. 1.mp4 477.1 MB
  • mp4~Get Your Files Here !/8. Lab Demonstration - Scanning Networks with NMAP Pt. 2/1. Lab Demonstration - Scanning Networks with NMAP Pt. 2.mp4 331.8 MB
  • mp4~Get Your Files Here !/1. Denial-of-Service Attack (DoS) Attack/2. The 5 Principal Differences Between DoS & DDoS Attacks.mp4 14.1 MB
  • mp4~Get Your Files Here !/1. Denial-of-Service Attack (DoS) Attack/6. Common DoS Attack Pt. 2.mp4 9.8 MB
  • mp4~Get Your Files Here !/1. Denial-of-Service Attack (DoS) Attack/5. Common DoS Attack Pt. 1.mp4 6.9 MB
  • mp4~Get Your Files Here !/4. DNS Attacks/1. DNS Attacks.mp4 6.4 MB
  • mp4~Get Your Files Here !/1. Denial-of-Service Attack (DoS) Attack/1. DoS Vs. DDoS.mp4 6.0 MB
  • mp4~Get Your Files Here !/5. Footprinting/3. Footprinting Helps To.mp4 5.4 MB
  • mp4~Get Your Files Here !/5. Footprinting/4. Footprinting Methodology.mp4 5.4 MB
  • mp4~Get Your Files Here !/1. Denial-of-Service Attack (DoS) Attack/7. Three-Way-Handshake Importance To Network Attacks (SYN Flood).mp4 5.2 MB
  • mp4~Get Your Files Here !/1. Denial-of-Service Attack (DoS) Attack/4. Botnets, Controllers, and Bot Herders.mp4 4.1 MB
  • mp4~Get Your Files Here !/5. Footprinting/1. What is Footprinting.mp4 3.8 MB
  • mp4~Get Your Files Here !/6. What is Sniffing/1. What is Sniffing.mp4 3.3 MB
  • mp4~Get Your Files Here !/6. What is Sniffing/2. Passive & Active Sniffing.mp4 3.3 MB
  • mp4~Get Your Files Here !/4. DNS Attacks/2. Homograph Attack.mp4 3.2 MB
  • mp4~Get Your Files Here !/4. DNS Attacks/3. Hyperlink Spoofing.mp4 3.1 MB
  • mp4~Get Your Files Here !/2. Eavesdropping/1. Eavesdropping.mp4 3.0 MB
  • mp4~Get Your Files Here !/5. Footprinting/2. What Types of Information to Look For.mp4 2.8 MB
  • mp4~Get Your Files Here !/1. Denial-of-Service Attack (DoS) Attack/3. DoS & DDoS Countermeasures.mp4 2.6 MB
  • mp4~Get Your Files Here !/3. Impersonation/2. Impersonation Pt. 2.mp4 2.5 MB
【影视】 [ DevCourseWeb.com ] Udemy - Modern Cybersecurity Fundamentals
收录时间:2023-12-17 文档个数:27 文档大小:2.3 GB 最近下载:2025-05-16 人气:2342 磁力链接
  • mp4~Get Your Files Here !/2. History of Cybersecurity/1. History of Cybersecurity.mp4 478.1 MB
  • mp4~Get Your Files Here !/3. Cybersecurity Risk Management/1. Cybersecurity Risk Management.mp4 265.3 MB
  • mp4~Get Your Files Here !/13. The Future of Cybersecurity/1. The Future of Cybersecurity.mp4 186.8 MB
  • mp4~Get Your Files Here !/7. Understanding Networks Part 3/1. Understanding Networks Part 3.mp4 176.6 MB
  • mp4~Get Your Files Here !/11. Ransomware/1. Ransomware.mp4 159.6 MB
  • mp4~Get Your Files Here !/8. Understanding Networks Part 4/1. Understanding Networks Part 4.mp4 158.3 MB
  • mp4~Get Your Files Here !/12. Internet of Things (IoT)/1. Internet of Things (IoT).mp4 154.5 MB
  • mp4~Get Your Files Here !/9. Domain Name System (DNS)/1. Domain Name System (DNS).mp4 145.9 MB
  • mp4~Get Your Files Here !/5. Understanding Networks Part 1/1. Understanding Networks Part 1.mp4 137.5 MB
  • mp4~Get Your Files Here !/4. Intrusion Detection/1. Intrusion Detection.mp4 136.3 MB
  • mp4~Get Your Files Here !/6. Understanding Networks Part 2/1. Understanding Networks Part 2.mp4 126.6 MB
  • mp4~Get Your Files Here !/10. Dynamic Host Configuration Protocol (DHCP)/1. Dynamic Host Configuration Protocol (DHCP).mp4 112.7 MB
  • mp4~Get Your Files Here !/1. Introduction/1. Introduction.mp4 28.1 MB
  • pdf~Get Your Files Here !/5. Understanding Networks Part 1/1.1 Understanding-Networks.pdf 3.5 MB
  • pdf~Get Your Files Here !/6. Understanding Networks Part 2/1.1 Understanding-Networks.pdf 3.5 MB
  • pdf~Get Your Files Here !/7. Understanding Networks Part 3/1.1 Understanding-Networks.pdf 3.5 MB
  • pdf~Get Your Files Here !/8. Understanding Networks Part 4/1.1 Understanding-Networks.pdf 3.5 MB
  • pdf~Get Your Files Here !/3. Cybersecurity Risk Management/1.1 Cybersecurity-Risk-Management.pdf 1.8 MB
  • pdf~Get Your Files Here !/12. Internet of Things (IoT)/1.1 IoT.pdf 1.8 MB
  • pdf~Get Your Files Here !/2. History of Cybersecurity/1.1 HISTORY-OF-CYBERSECURITY.pdf 1.7 MB
【影视】 Cybersecurity Architecture Fundamentals
收录时间:2023-12-26 文档个数:81 文档大小:2.4 GB 最近下载:2025-05-16 人气:6891 磁力链接
  • mp4Chapter 1 Introduction/006. Security Principles and Approaches.mp4 272.7 MB
  • mp4Chapter 1 Introduction/003. The Problem with Security Today.mp4 236.8 MB
  • mp4Chapter 1 Introduction/009. Understanding Residual Risk.mp4 120.0 MB
  • mp4Chapter 4 Cyber Architecture for Enterprise Security/006. Vulnerability, Patch, and Availability Management.mp4 102.8 MB
  • mp4Chapter 1 Introduction/008. Risk Management.mp4 99.6 MB
  • mp4Chapter 1 Introduction/005. Who Is a Security Architect.mp4 98.0 MB
  • mp4Chapter 2 Threat Modelling/006. PASTA.mp4 94.3 MB
  • mp4Chapter 4 Cyber Architecture for Enterprise Security/001. Network Security.mp4 80.3 MB
  • mp4Chapter 6 Case Study/001. Case Study Preview.mp4 78.0 MB
  • mp4Chapter 2 Threat Modelling/002. Threat Modelling Versus Risk Assessment.mp4 75.6 MB
  • mp4Chapter 2 Threat Modelling/001. Threat Modelling - Part 1.mp4 70.2 MB
  • mp4Chapter 2 Threat Modelling/009. Attack Trees.mp4 68.7 MB
  • mp4Chapter 4 Cyber Architecture for Enterprise Security/005. Data Protection.mp4 56.7 MB
  • mp4Chapter 5 Designing for Security/003. Reference Security Architectures.mp4 52.0 MB
  • mp4Chapter 2 Threat Modelling/003. Threat Modelling - Part 2.mp4 50.8 MB
  • mp4Chapter 3 Enterprise Architecture Frameworks/003. Zachman Framework.mp4 44.9 MB
  • mp4Chapter 5 Designing for Security/002. Security Design Pattern Example.mp4 44.6 MB
  • mp4Chapter 1 Introduction/004. Introduction to Security Architecture.mp4 42.6 MB
  • mp4Chapter 5 Designing for Security/001. Security Design Patterns.mp4 41.8 MB
  • mp4Chapter 3 Enterprise Architecture Frameworks/004. SABSA Framework.mp4 37.0 MB
【影视】 [ FreeCourseWeb.com ] EC-Council - Introduction to Cybersecurity
收录时间:2024-01-16 文档个数:49 文档大小:1.2 GB 最近下载:2025-05-16 人气:1606 磁力链接
  • mp4~Get Your Files Here !/38 - Know Your Options for Data Encryption.mp4 63.3 MB
  • mp4~Get Your Files Here !/35 - Looking at an Application Designed to Help Secure Your Phone.mp4 39.8 MB
  • mp4~Get Your Files Here !/9 - Using a Password Manager.mp4 39.7 MB
  • mp4~Get Your Files Here !/40 - Checking if Your Cloud Server is Leaking Data.mp4 39.5 MB
  • mp4~Get Your Files Here !/23 - Understanding How Computers Can Become Infected.mp4 38.9 MB
  • mp4~Get Your Files Here !/26 - Being Careful of What You Post.mp4 36.8 MB
  • mp4~Get Your Files Here !/19 - Looking at Fake Error Messages (Scareware).mp4 35.8 MB
  • mp4~Get Your Files Here !/14 - USB Safety with Examples.mp4 34.9 MB
  • mp4~Get Your Files Here !/20 - Exploring Useful Browser Plugins.mp4 34.2 MB
  • mp4~Get Your Files Here !/41 - Getting to Know Everything about VPN.mp4 34.0 MB
  • mp4~Get Your Files Here !/8 - Exploring What Makes a Good Password.mp4 34.0 MB
  • mp4~Get Your Files Here !/25 - What to Do If You Are Infected with Cryptoware.mp4 34.0 MB
  • mp4~Get Your Files Here !/42 - Changing Your DNS Connection to Avoid ISP Snooping.mp4 33.5 MB
  • mp4~Get Your Files Here !/32 - Understanding Best Practices for Unusual E-mails.mp4 31.1 MB
  • mp4~Get Your Files Here !/31 - Learning How to Identify and Find Phishing E-mails.mp4 30.9 MB
  • mp4~Get Your Files Here !/44 - Learning How to Use TorGhost.mp4 30.3 MB
  • mp4~Get Your Files Here !/18 - Downloading Precautions and Hash Checking.mp4 30.3 MB
  • mp4~Get Your Files Here !/24 - Learning Best Practices for Antivirus Software and Malware Scanners.mp4 27.8 MB
  • mp4~Get Your Files Here !/37 - Additional Settings.mp4 27.6 MB
  • mp4~Get Your Files Here !/47 - Understanding Backup Methods.mp4 26.3 MB
【影视】 TTC - Thinking about Cybersecurity
收录时间:2017-02-10 文档个数:19 文档大小:8.5 GB 最近下载:2025-05-16 人气:5665 磁力链接
  • wmvTGC_9523_Lect18_Cybersecurity.wmv 509.4 MB
  • wmvTGC_9523_Lect01_Cybersecurity.wmv 509.0 MB
  • wmvTGC_9523_Lect13_Cybersecurity.wmv 508.9 MB
  • wmvTGC_9523_Lect17_Cybersecurity.wmv 494.7 MB
  • wmvTGC_9523_Lect08_Cybersecurity.wmv 493.5 MB
  • wmvTGC_9523_Lect14_Cybersecurity.wmv 486.8 MB
  • wmvTGC_9523_Lect10_Cybersecurity.wmv 486.1 MB
  • wmvTGC_9523_Lect04_Cybersecurity.wmv 480.1 MB
  • wmvTGC_9523_Lect15_Cybersecurity.wmv 474.7 MB
  • wmvTGC_9523_Lect09_Cybersecurity.wmv 473.9 MB
  • wmvTGC_9523_Lect05_Cybersecurity.wmv 472.8 MB
  • wmvTGC_9523_Lect07_Cybersecurity.wmv 470.4 MB
  • wmvTGC_9523_Lect06_Cybersecurity.wmv 467.2 MB
  • wmvTGC_9523_Lect16_Cybersecurity.wmv 460.0 MB
  • wmvTGC_9523_Lect11_Cybersecurity.wmv 453.2 MB
  • wmvTGC_9523_Lect12_Cybersecurity.wmv 449.4 MB
  • wmvTGC_9523_Lect03_Cybersecurity.wmv 438.7 MB
  • wmvTGC_9523_Lect02_Cybersecurity.wmv 378.9 MB
  • PDFDG9523_98F12.PDF 4.7 MB
【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity Freelancer - Become A Free Agent In 2025
收录时间:2025-02-24 文档个数:12 文档大小:1.6 GB 最近下载:2025-05-16 人气:1607 磁力链接
  • mp4~Get Your Files Here !/3 - Pricing Your Services Creating Your Service Package/4 - Pricing Your Cybsersecurity Consultancy Services.mp4 433.8 MB
  • mp4~Get Your Files Here !/2 - Becoming A Cybersecurity Enterpreneur Establishing Your Product Market Fit/3 - Establishing Your Product Market Fit.mp4 380.4 MB
  • mp4~Get Your Files Here !/3 - Pricing Your Services Creating Your Service Package/5 - Creating Your Service Package.mp4 365.0 MB
  • mp4~Get Your Files Here !/4 - Perfect Elevator Pitch Market Yourself To Sell Your Business/8 - Earn Your Expert Status To Sell.mp4 100.4 MB
  • mp4~Get Your Files Here !/6 - Course Conclusion/10 - Course Outro.mp4 86.7 MB
  • mp4~Get Your Files Here !/4 - Perfect Elevator Pitch Market Yourself To Sell Your Business/7 - The Difference Between Marketing Selling.mp4 75.1 MB
  • mp4~Get Your Files Here !/1 - Course Introduction/1 - Course Introduction.mp4 66.6 MB
  • mp4~Get Your Files Here !/4 - Perfect Elevator Pitch Market Yourself To Sell Your Business/6 - Perfect Your Elevator Pitch.mp4 42.1 MB
  • mp4~Get Your Files Here !/5 - Course Project/9 - Project Video.mp4 39.8 MB
  • mp4~Get Your Files Here !/2 - Becoming A Cybersecurity Enterpreneur Establishing Your Product Market Fit/2 - Becoming A Cybersecurity Entrepreneur.mp4 32.8 MB
  • urlGet Bonus Downloads Here.url 182 Bytes
  • txt~Get Your Files Here !/Bonus Resources.txt 70 Bytes
【影视】 [ DevCourseWeb.com ] CBTNuggets - (ISC)2 CC - Certified in Cybersecurity - (ISC)2 Certification Training
收录时间:2023-12-17 文档个数:68 文档大小:2.1 GB 最近下载:2025-05-16 人气:6852 磁力链接
  • mp4~Get Your Files Here !/1. Understanding Information Assurance/1. Understanding Information Assurance - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 69.9 MB
  • mp4~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/1. Power - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 65.3 MB
  • mp4~Get Your Files Here !/7. Discussing Network Security Infrastructure/1. Network Segmentation - (ISC)² CC – Certified in Cybersecurity CBT Nuggets-1.mp4 58.2 MB
  • mp4~Get Your Files Here !/8. Exploring Network Threats and Attacks/6. Firewalls - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 54.7 MB
  • mp4~Get Your Files Here !/8. Exploring Network Threats and Attacks/3. Intrusion Detection Prevention Systems (IDSIPS) - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 54.0 MB
  • mp4~Get Your Files Here !/5. Exploring Security Policies and Training/7. Security Awareness Training - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 52.0 MB
  • mp4~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/3. Heating, Ventilation and Air Conditioning (HVAC) - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 48.1 MB
  • mp4~Get Your Files Here !/9. Understanding Computer Networking/4. IP Addresses - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 47.5 MB
  • mp4~Get Your Files Here !/6. Understanding Data Security and System Hardening/2. Types of Encryption - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 46.4 MB
  • mp4~Get Your Files Here !/7. Discussing Network Security Infrastructure/7. The Cloud - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 45.7 MB
  • mp4~Get Your Files Here !/8. Exploring Network Threats and Attacks/5. Vulnerability Scanning - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 45.5 MB
  • mp4~Get Your Files Here !/9. Understanding Computer Networking/3. TCPIP Model - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 42.9 MB
  • mp4~Get Your Files Here !/6. Understanding Data Security and System Hardening/7. Configuration Management - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 41.6 MB
  • mp4~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/2. Data Centers and Closets - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 40.4 MB
  • mp4~Get Your Files Here !/1. Understanding Information Assurance/2. Methods of Authentication - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 40.0 MB
  • mp4~Get Your Files Here !/2. Discussing Risk Management, Controls, Ethics and Governance/4. Security Control Categories - (ISC)² CC – Certified in Cybersecurity CBT Nuggets-1.mp4 39.3 MB
  • mp4~Get Your Files Here !/6. Understanding Data Security and System Hardening/3. Data Hashing with Encryption - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 38.3 MB
  • mp4~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/5. Redundancy - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 38.2 MB
  • mp4~Get Your Files Here !/3. Exploring BC, DR & IR Concepts/6. Incident Response - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 37.9 MB
  • mp4~Get Your Files Here !/4. Reviewing Access Control Concepts/6. Types of Access Control - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 36.8 MB
【影视】 Palo Alto Networks Cybersecurity Fundamentals (PCCSA)
收录时间:2022-02-19 文档个数:54 文档大小:4.5 GB 最近下载:2025-05-16 人气:8248 磁力链接
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/2. Identify Computing and Networking Trends.mp4 269.3 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/12. Identify Networking Security Technologies.mp4 267.8 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/3. Describe Cybersecurity Threats.mp4 243.2 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/5. Identify Wi-Fi Vulnerabilities and Attacks.mp4 231.3 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/10. Review Network Addressing.mp4 228.2 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/4. Describe Common Cyberattack Techniques.mp4 217.8 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/17. Endpoint Security.mp4 206.1 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/7. Identify Basic Internet and Network Operations.mp4 204.7 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/8. Describe Routing Protocols.mp4 196.9 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/15. Learn Basic Virtualization Security Concepts.mp4 190.8 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/9. Review Networking Models.mp4 190.3 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/18. Server and System Administration.mp4 186.8 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/26. Describe Cortex XSOAR and AutoFocus.mp4 177.9 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/16. Learn Basic DevOps Security Concepts.mp4 176.4 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/14. Learn Basic Cloud Security Concepts.mp4 169.8 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/11. Learn Networking Security Models.mp4 169.5 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/20. Identify Palo Alto Networks Security Solutions.mp4 168.8 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/21. Describe Basic NGFW Components and Functions.mp4 146.3 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/13. Learn Basic Data Center Security Concepts.mp4 134.9 MB
  • mp4[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/22. Learn Basic Prisma Cloud.mp4 134.6 MB
【影视】 [ FreeCourseWeb.com ] Udemy - Master Cybersecurity,Ethical Hacking and Penetrating Testing
收录时间:2022-03-15 文档个数:50 文档大小:1.6 GB 最近下载:2025-05-16 人气:2202 磁力链接
  • mp4~Get Your Files Here !/04 Exposing Hackers - Know Your Enemy/002 Why You Need Security _.mp4 189.8 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/011 Setting up Labs.mp4 169.5 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/003 What is Privacy, Anonymity and Pseudonymity _.mp4 158.8 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/006 Threat Modelling And Risk Assessment.mp4 158.3 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/008 Confidentiality, Integrity and Availability - (Security Attributes).mp4 141.8 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/004 Security, Vulnerabilities, Threats and Adversaries.mp4 117.8 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/005 Asset Selection.mp4 94.5 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/002 Protect What You Value.mp4 93.7 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/010 Zero Trust Model.mp4 85.7 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/007 Security,Anonymity and Privacy.mp4 59.8 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/001 What is Cybersecurity _.mp4 34.8 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/009 Defence in Depth.mp4 34.2 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/008 Who Conduct it _.mp4 26.4 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/002 What is Ethical Hacking _.mp4 25.8 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/005 Purpose of Studying Ethical Hacking and Penetrating Testing.mp4 24.3 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/010 Closure.mp4 23.6 MB
  • mp4~Get Your Files Here !/04 Exposing Hackers - Know Your Enemy/001 Goals and Learning Objectives - Know Your Enemy.mp4 21.8 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/009 Who should You Choose _.mp4 20.6 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/001 Goals and Learning Objectives.mp4 19.7 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/006 Scope For Ethical Hackers and Penetrating Testers.mp4 18.5 MB
【影视】 The Complete Certified in Cybersecurity course (CC) - 2022
收录时间:2024-01-07 文档个数:293 文档大小:6.7 GB 最近下载:2025-05-16 人气:902 磁力链接
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/7. The study process, material, tips, tricks and practice tests!/1. How to approach practice questions.mp4 124.3 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/6. Domain 5 Security Operations/16. Administrative (Directive) Controls.mp4 122.3 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/5. Domain 4 Network Security/5. The OSI Model - Part 1.mp4 108.0 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/7. The study process, material, tips, tricks and practice tests!/4. How to design your career and certification path..mp4 97.4 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/4. Domain 3 Access Controls Concepts/12. Logical Access Control - Part 5.mp4 89.7 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/5. Domain 4 Network Security/44. Virtualization, Cloud, and Distributed Computing - Part 5.mp4 87.1 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/5. Domain 4 Network Security/24. VPNs, NAC, and third-party connectivity.mp4 86.7 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/5. Domain 4 Network Security/43. Virtualization, Cloud, and Distributed Computing - Part 4.mp4 81.3 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/5. Domain 4 Network Security/10. IP addresses, port numbers, and MAC addresses - Part 1.mp4 80.0 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/6. Domain 5 Security Operations/19. Social Engineering attacks - Part 2.mp4 79.6 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/3. Domain 2 Business Continuity, Disaster Recovery, and Incident Response/6. DRP - Disaster Recovery Planning - Part 1.mp4 79.4 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/5. Domain 4 Network Security/2. Network Basics and Definitions - Part 1.mp4 79.0 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/3. Domain 2 Business Continuity, Disaster Recovery, and Incident Response/9. DRP - Disaster Recovery Planning - Part 4.mp4 78.9 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/4. Domain 3 Access Controls Concepts/10. Logical Access Control - Part 3.mp4 78.1 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/2. CC Domain 1 Security Principles/28. Laws and regulations - part 1.mp4 77.6 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/6. Domain 5 Security Operations/13. Data handling, data storage and data retention - Part 2.mp4 77.4 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/4. Domain 3 Access Controls Concepts/2. Physical Security - part 1.mp4 75.4 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/2. CC Domain 1 Security Principles/30. Security governance principles.mp4 75.0 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/5. Domain 4 Network Security/48. Electricity.mp4 74.7 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/5. Domain 4 Network Security/28. Attacks and attackers - Part 2.mp4 73.6 MB
【影视】 Pluralsight - Cybersecurity Threats: Ransomware
收录时间:2017-06-08 文档个数:37 文档大小:388.1 MB 最近下载:2025-05-16 人气:2825 磁力链接
  • mp43. Ransomware Entry Points/15. Embedded Hyperlinks, Websites_downloads, and Drive-by Infections.mp4 6.2 MB
  • mp43. Ransomware Entry Points/16. Why Common Exploit Kits Are Used.mp4 5.4 MB
  • mp43. Ransomware Entry Points/14. Phishing and Email Attachments.mp4 10.6 MB
  • mp43. Ransomware Entry Points/18. Summary.mp4 2.8 MB
  • mp43. Ransomware Entry Points/12. Overview.mp4 2.7 MB
  • mp43. Ransomware Entry Points/13. The 5 Classic Infection Vectors.mp4 3.1 MB
  • mp43. Ransomware Entry Points/17. Command and Callback (C&C) and Indicators of Compromise.mp4 7.0 MB
  • mp44. Incident Response - Detection and Containment/21. Detecting an Attack.mp4 7.3 MB
  • mp44. Incident Response - Detection and Containment/20. Indicators of Compromise.mp4 5.3 MB
  • mp44. Incident Response - Detection and Containment/23. Summary.mp4 1.7 MB
  • mp44. Incident Response - Detection and Containment/19. Overview.mp4 2.6 MB
  • mp44. Incident Response - Detection and Containment/22. Containing the Attack.mp4 9.0 MB
  • mp46. Countermeasures and Preparing Your Incident Response/35. Next Generation Anti-virus_Anti-malware.mp4 5.6 MB
  • mp46. Countermeasures and Preparing Your Incident Response/37. Summary.mp4 5.5 MB
  • mp46. Countermeasures and Preparing Your Incident Response/33. Defending a Ransomware Attack.mp4 11.4 MB
  • mp46. Countermeasures and Preparing Your Incident Response/34. Protecting a Windows Network.mp4 8.0 MB
  • mp46. Countermeasures and Preparing Your Incident Response/32. Overview.mp4 5.5 MB
  • mp46. Countermeasures and Preparing Your Incident Response/36. Lessons Learned and Your Incident Response Plan.mp4 10.9 MB
  • mp42. What Is Ransomware/06. How Big Is the Problem.mp4 15.1 MB
  • mp42. What Is Ransomware/02. Overview.mp4 4.1 MB
【影视】 The Complete Cybersecurity Bootcamp, 2nd Edition
收录时间:2023-12-17 文档个数:674 文档大小:6.7 GB 最近下载:2025-05-16 人气:11266 磁力链接
  • mp4Module 5 Mobile Device Security/Lesson 29 Hacking Mobile Platforms/003. 29.2 Hacking iOS.mp4 86.6 MB
  • mp4Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/014. 17.13 Performing SMTP and DNS Enumeration.mp4 80.0 MB
  • mp4Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 21 Fundamentals of Wireless Hacking/004. 21.3 Exploring Wireless Threats.mp4 79.0 MB
  • mp4Module 6 Internet of Things (IoT) Security/Lesson 33 Fundamentals of IoT Security/003. 33.2 Understanding IoT Attacks.mp4 76.8 MB
  • mp4Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/015. 17.14 Conducting Additional Enumeration Techniques.mp4 75.8 MB
  • mp4Module 6 Internet of Things (IoT) Security/Lesson 33 Fundamentals of IoT Security/002. 33.1 Introducing IoT Concepts.mp4 74.4 MB
  • mp4Module 5 Mobile Device Security/Lesson 29 Hacking Mobile Platforms/002. 29.1 Understanding Mobile Platform Attack Vectors.mp4 73.4 MB
  • mp4Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/011. 17.1 Performing SNMP Enumeration.mp4 71.8 MB
  • mp4Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/004. 17.3 Understanding Host Discovery.mp4 69.7 MB
  • mp4Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 5 Fundamentals of Incident Response/007. 5.6 Analyzing Computer Incident Response Teams (CSIRTs).mp4 68.5 MB
  • mp4Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/007. 17.6 Scanning Beyond IDS and Firewall.mp4 68.2 MB
  • mp4Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 27 Hacking User Credentials/006. 27.5 Cracking Passwords with John the Ripper.mp4 66.1 MB
  • mp4Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 7 Intrusion Event Categories/009. 7.8 Understanding the MITRE ATT&CK Framework.mp4 65.8 MB
  • mp4Module 5 Mobile Device Security/Lesson 29 Hacking Mobile Platforms/004. 29.3 Hacking Android OS.mp4 63.8 MB
  • mp4Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 20 SQL Injection/005. 20.4 Exploring SQL Injection Tools.mp4 63.3 MB
  • mp4Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 21 Fundamentals of Wireless Hacking/003. 21.2 Understanding Wireless Encryption.mp4 62.7 MB
  • mp4Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/013. 17.12 Performing NTP and NFS Enumeration.mp4 61.8 MB
  • mp4Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 16 Information Gathering and Passive Reconnaissance/011. 16.10 Performing Footprinting through Social Engineering.mp4 59.1 MB
  • mp4Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 8 Digital Forensics Fundamentals/004. 8.3 Understanding Evidence Collection.mp4 57.2 MB
  • mp4Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 21 Fundamentals of Wireless Hacking/007. 21.6 Hacking Bluetooth.mp4 52.3 MB
【影视】 [ DevCourseWeb.com ] Udemy - ChatGPT, ML, and AI for Cybersecurity, SOCs and Business
收录时间:2024-04-07 文档个数:14 文档大小:3.7 GB 最近下载:2025-05-16 人气:2616 磁力链接
  • mp4~Get Your Files Here !/3. AI Tools for Security.mp4 683.8 MB
  • mp4~Get Your Files Here !/4. Enhancing Search Capabilities with GPT4all Plugins.mp4 576.0 MB
  • mp4~Get Your Files Here !/2. Fundamentals of ChatGPT and GPT4all.mp4 553.4 MB
  • mp4~Get Your Files Here !/1. Introduction to Machine Learning and AI for Security.mp4 520.6 MB
  • mp4~Get Your Files Here !/8. Future Trends and Challenges in AI Security.mp4 452.9 MB
  • mp4~Get Your Files Here !/6. Evaluating AI Security.mp4 379.7 MB
  • mp4~Get Your Files Here !/5. Securing AI Models and Data.mp4 280.8 MB
  • mp4~Get Your Files Here !/7. Case Studies of Real-World AI Applications.mp4 279.0 MB
  • txt~Get Your Files Here !/Bonus Resources.txt 386 Bytes
  • urlGet Bonus Downloads Here.url 182 Bytes
  • html~Get Your Files Here !/9. Final Exam.html 146 Bytes
  • html~Get Your Files Here !/4.2 Github Plugins (primarily for ChatGPT and Python implementations thereof)..html 124 Bytes
  • html~Get Your Files Here !/4.1 ChatGPT Plugins.html 100 Bytes
  • html~Get Your Files Here !/4.3 GPT4All Website and Downloads.html 90 Bytes
【影视】 [FreeCoursesOnline.Me] ZeroToMastery - Complete Cybersecurity Bootcamp
收录时间:2023-12-20 文档个数:101 文档大小:3.6 GB 最近下载:2025-05-16 人气:7476 磁力链接
  • mp48-Network Security/052-Network Security With Nmap.mp4 169.9 MB
  • mp45-Security Bugs & Vulnerabilities/020-Buffer Overflow Demonstration.mp4 136.7 MB
  • mp412-Appendix - Ethical Hacking/087-Msfconsole Basic Commands.mp4 97.5 MB
  • mp48-Network Security/059-Wireless Attack Demonstration.mp4 93.4 MB
  • mp47-End-Point Protection/034-Password Security and Password Managers.mp4 84.2 MB
  • mp412-Appendix - Ethical Hacking/093-Meterpreter Basic Commands Part 1.mp4 78.5 MB
  • mp47-End-Point Protection/038-Process Explorer.mp4 75.8 MB
  • mp41-Introduction/001-Cybersecurity Bootcamp - Zero to Mastery.mp4 72.4 MB
  • mp48-Network Security/057-Secure Network Architecture.mp4 66.8 MB
  • mp412-Appendix - Ethical Hacking/094-Meterpreter Basic Commands Part 2.mp4 65.7 MB
  • mp47-End-Point Protection/033-Bitdefender, Kaspersky, McAfee, Malwarebytes.mp4 63.9 MB
  • mp44-Understanding Hackers - The Biggest Threat/012-Most Common Attacks Demonstration.mp4 63.5 MB
  • mp48-Network Security/060-Network Monitoring With TCPDump.mp4 62.7 MB
  • mp48-Network Security/058-Wireless Security.mp4 59.6 MB
  • mp45-Security Bugs & Vulnerabilities/017-Unpatched Machine Exploitation Demonstration.mp4 59.1 MB
  • mp412-Appendix - Ethical Hacking/080-Whatweb Stealthy Scan.mp4 58.1 MB
  • mp412-Appendix - Ethical Hacking/091-Advance Msfvenom Usage.mp4 51.4 MB
  • mp47-End-Point Protection/043-Iptables.mp4 50.9 MB
  • mp47-End-Point Protection/028-Brave Browser Security and Privacy.mp4 50.6 MB
  • mp412-Appendix - Ethical Hacking/089-Software Vulnerability - Samba Exploitation.mp4 49.5 MB
共10页 上一页 1 2 3 4 5 6 7 下一页