磁力管家

磁力管家
为您索检到186条磁力链接,耗时1毫秒。 rss

分享给好友

【影视】 Microsoft Cybersecurity Pro Track PowerShell Security
收录时间:2021-03-20 文档个数:58 文档大小:1.4 GB 最近下载:2025-05-16 人气:3259 磁力链接
  • mp4Course/3. PowerShell Operational Security/2. Managing Remote Execution Capabilities of Windows PowerShell.mp4 192.7 MB
  • mp4Course/4. Implementing PowerShell-based Security/1. Windows Powershell DSC.mp4 146.7 MB
  • mp4Course/5. Windows PowerShell-based Exploits and their Mitigation/1. Windows PowerShell-based Attacks.mp4 134.1 MB
  • mp4Course/4. Implementing PowerShell-based Security/2. Just Enough Administration (JEA).mp4 123.4 MB
  • mp4Course/3. PowerShell Operational Security/1. Managing Local Script Execution Policy with Windows PowerShell Execution.mp4 116.8 MB
  • mp4Course/1. Introduction/3. Preparing the Lab Environment.mp4 95.2 MB
  • mp4Course/2. Windows PowerShell Fundamentals/2. PowerShell Editions and Versions.mp4 88.2 MB
  • mp4Course/4. Implementing PowerShell-based Security/3. Windows PowerShell Auditing and Logging.mp4 86.9 MB
  • mp4Course/3. PowerShell Operational Security/4. Language Mode.mp4 79.5 MB
  • mp4Course/2. Windows PowerShell Fundamentals/1. Windows PowerShell Architecture.mp4 66.6 MB
  • mp4Course/5. Windows PowerShell-based Exploits and their Mitigation/3. Summary of Windows PowerShell-based Security-Related Technologies.mp4 55.5 MB
  • mp4Course/2. Windows PowerShell Fundamentals/3. Running Windows Powershell.mp4 53.4 MB
  • mp4Course/5. Windows PowerShell-based Exploits and their Mitigation/2. Windows PowerShell-based Security Tools.mp4 50.7 MB
  • mp4Course/3. PowerShell Operational Security/5. Anti-Malware SCan Interface (AMSI).mp4 39.1 MB
  • mp4Course/1. Introduction/2. About the Course.mp4 25.1 MB
  • mp4Course/3. PowerShell Operational Security/3. Constrained Endpoints.mp4 24.2 MB
  • mp4Course/1. Introduction/1. Instructor Introduction.mp4 10.9 MB
  • srtCourse/3. PowerShell Operational Security/2. Managing Remote Execution Capabilities of Windows PowerShell.srt 43.0 kB
  • srtCourse/4. Implementing PowerShell-based Security/1. Windows Powershell DSC.srt 37.5 kB
  • srtCourse/4. Implementing PowerShell-based Security/2. Just Enough Administration (JEA).srt 35.1 kB
【影视】 [ WebToolTip.com ] Udemy - Cybersecurity Fundamentals - A Practical Hands-On Course
收录时间:2025-05-09 文档个数:25 文档大小:1.5 GB 最近下载:2025-05-16 人气:245 磁力链接
  • mp4~Get Your Files Here !/2 - Cybersecurity Fundamentals Practical Tutorials/1 -Cybersecurity Practical Learning Part 1.mp4 147.6 MB
  • mp4~Get Your Files Here !/2 - Cybersecurity Fundamentals Practical Tutorials/2 -Cybersecurity Practical Learning Part 2.mp4 139.7 MB
  • mp4~Get Your Files Here !/5 - Start Ethical Hacking Today/1 -How To Keep Your Laptops Secure And Safe.mp4 120.4 MB
  • mp4~Get Your Files Here !/4 - Mastering Burpsuite/4 -Insecure Direct Object Reference (IDOR).mp4 120.1 MB
  • pdf~Get Your Files Here !/1 - Introduction/1 -Lecture 1.pdf 92.9 MB
  • mp4~Get Your Files Here !/2 - Cybersecurity Fundamentals Practical Tutorials/3 -Python for Cybersecurity Part 1.mp4 90.9 MB
  • mp4~Get Your Files Here !/3 - Tools for Cybersecurity Practical Guide/3 -How To Install Python On Kali Linux.mp4 89.8 MB
  • mp4~Get Your Files Here !/1 - Introduction/1 -Introduction.mp4 88.0 MB
  • mp4~Get Your Files Here !/4 - Mastering Burpsuite/3 -Live Website Scan On Burpsuite.mp4 79.7 MB
  • mp4~Get Your Files Here !/3 - Tools for Cybersecurity Practical Guide/1 -How to Download Kali Linux.mp4 74.9 MB
  • mp4~Get Your Files Here !/5 - Start Ethical Hacking Today/2 -Spiderfoot Complete Tutorial.mp4 70.5 MB
  • mp4~Get Your Files Here !/2 - Cybersecurity Fundamentals Practical Tutorials/4 -Python for Cybersecurity Part 2.mp4 70.0 MB
  • mp4~Get Your Files Here !/1 - Introduction/2 -Setting Up Your Lab Environment (VirtualBox + Kali Linux + Windows VM).mp4 61.6 MB
  • mp4~Get Your Files Here !/3 - Tools for Cybersecurity Practical Guide/5 -How To Download And Use Cherry Tree.mp4 45.4 MB
  • mp4~Get Your Files Here !/5 - Start Ethical Hacking Today/4 -The Best Website For Cybersecurity Experts.mp4 45.3 MB
  • mp4~Get Your Files Here !/4 - Mastering Burpsuite/1 -How To Download And Install Burpsuite.mp4 41.8 MB
  • mp4~Get Your Files Here !/3 - Tools for Cybersecurity Practical Guide/4 -How To Install Pycharm on Kali Linux.mp4 33.9 MB
  • mp4~Get Your Files Here !/4 - Mastering Burpsuite/2 -Website Scan Part 1.mp4 32.7 MB
  • mp4~Get Your Files Here !/3 - Tools for Cybersecurity Practical Guide/2 -How To Create Txt File In Kali Linux.mp4 18.8 MB
  • mp4~Get Your Files Here !/5 - Start Ethical Hacking Today/3 -Haveibeenpawned.mp4 15.8 MB
【影视】 Microsoft Cybersecurity Pro Track Security in Office 365
收录时间:2021-04-22 文档个数:91 文档大小:1.5 GB 最近下载:2025-05-15 人气:4319 磁力链接
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/2. Introduction to Security in Office 365/1. Threat Vectors and Data Breaches.mp4 185.5 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/5. Implementing auditing, insights and alerts/3. Audit Log Investigations.mp4 155.5 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/3. Implementing and Managinng Microsoft Defender for Office 365 (Office 365 ATP)/1. Introduction to Exchange Online Protection.mp4 132.0 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/6. Advanced Security Management/1. Deploy Cloud Application Security.mp4 109.2 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/5. Implementing auditing, insights and alerts/5. Managing insights and alerts in the Security & Compliance Center.mp4 101.2 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/4. Using Office 365 Threat Intelligence/3. Threat Investigation and Response.mp4 91.3 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/3. Implementing and Managinng Microsoft Defender for Office 365 (Office 365 ATP)/3. Managing Safe Attachments.mp4 90.4 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/2. Introduction to Security in Office 365/3. Introduction to Secure Score.mp4 78.1 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/3. Implementing and Managinng Microsoft Defender for Office 365 (Office 365 ATP)/4. Managing Safe Links.mp4 75.1 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/3. Implementing and Managinng Microsoft Defender for Office 365 (Office 365 ATP)/2. Overview of Microsoft Defender for Office 365 (former named Office 365 ATP).mp4 64.5 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/6. Advanced Security Management/2. Use Cloud Application Security.mp4 63.1 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/4. Using Office 365 Threat Intelligence/2. Security (Threat) Dashboard.mp4 61.0 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/3. Implementing and Managinng Microsoft Defender for Office 365 (Office 365 ATP)/5. Monitoring and Reports.mp4 56.6 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/4. Using Office 365 Threat Intelligence/1. Overview of Office 365 Threat Intelligence.mp4 53.0 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/5. Implementing auditing, insights and alerts/2. Enabling mailbox auditing in Exchange Online.mp4 44.4 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/2. Introduction to Security in Office 365/2. Security Solutions in Office 365.mp4 37.2 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/5. Implementing auditing, insights and alerts/1. Overview of auditing in the Security & Compliance Center.mp4 34.8 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/1. Introduction/2. About the Course.mp4 32.8 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/5. Implementing auditing, insights and alerts/4. Enabling sharing auditing for SharePoint and OneDrive.mp4 30.7 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/1. Introduction/3. Preparing the Lab Environment.mp4 25.1 MB
【影视】 Certified in Cybersecurity 2023 - ISC2-CC Complete Training
收录时间:2023-12-18 文档个数:51 文档大小:1.2 GB 最近下载:2025-05-15 人气:14622 磁力链接
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/9. Security Controls Examples.mp4 119.4 MB
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/3. Domain 2 Business Continuity (BC), Disaster Recovery (DR) & Incident Response/1. Cyber Threats.mp4 109.6 MB
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/4. Risk Analaysis.mp4 106.8 MB
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/7. Risk Monitoring.mp4 91.3 MB
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/3. Risk Management Overview.mp4 68.8 MB
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/3. Domain 2 Business Continuity (BC), Disaster Recovery (DR) & Incident Response/2. Cyber Attacks 1.mp4 67.5 MB
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/12. Governance Overview.mp4 57.5 MB
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/8. Security Controls.mp4 56.7 MB
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/2. Privacy.mp4 55.2 MB
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/6. Risk Response.mp4 52.3 MB
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/20. Laws and Regulations in Cybersecurity.mp4 46.8 MB
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/10. Defense in Depth.mp4 42.9 MB
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/14. Policies.mp4 42.3 MB
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/19. Procedures and Guidelines.mp4 38.5 MB
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/1. CIA Triad and Security Objectives.mp4 35.6 MB
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/15. Policies Examples.mp4 33.0 MB
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/5. Types of Risk.mp4 29.0 MB
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/18. Standards.mp4 27.4 MB
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/16. Acceptable use policy.mp4 22.7 MB
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/13. Information Security Governance.mp4 18.1 MB
【影视】 Lynda - Foundations of Cybersecurity
收录时间:2017-02-19 文档个数:27 文档大小:300.9 MB 最近下载:2025-05-15 人气:2960 磁力链接
  • mp4021 Managing user access and identity.mp4 20.7 MB
  • mp4022 Implementing preventative security.mp4 18.8 MB
  • mp4023 Monitoring and alerts.mp4 15.7 MB
  • mp4018 Describing security requirements.mp4 14.9 MB
  • mp4008 Dissecting the payment card industry and PCI DSS.mp4 14.6 MB
  • mp4007 Implementing control frameworks.mp4 14.3 MB
  • mp4025 Preparing for an incident.mp4 14.2 MB
  • mp4019 Architecting security risk.mp4 13.5 MB
  • mp4016 Understanding advanced persistent threats (APTs).mp4 13.5 MB
  • mp4004 Dissecting cyber risk.mp4 13.1 MB
  • mp4003 Understanding the NIST cybersecurity framework.mp4 12.6 MB
  • mp4011 Dissecting security threats.mp4 11.6 MB
  • mp4026 Responding to an incident.mp4 11.5 MB
  • mp4005 Unpacking COBIT 5.mp4 10.3 MB
  • mp4012 Exploring cybercrime as an industry.mp4 9.9 MB
  • mp4014 Using callbacks to capture keystrokes.mp4 9.8 MB
  • mp4015 Hiding malware with rootkits.mp4 9.8 MB
  • mp4009 Exploring the Cyber Essentials framework.mp4 9.3 MB
  • mp4013 Hiding malware through cloaking and alternate data streams.mp4 9.0 MB
  • mp4020 Selecting security controls.mp4 8.5 MB
【影视】 Cybersecurity for Small and Medium Businesses - Essential Training
收录时间:2018-09-09 文档个数:66 文档大小:358.3 MB 最近下载:2025-05-15 人气:2022 磁力链接
  • mp42.1. The Basics/03.Why you should care.mp4 31.6 MB
  • mp41.Introduction/01.Welcome.mp4 21.9 MB
  • srt1.Introduction/02.What you should know.en.srt 1.5 kB
  • mp41.Introduction/02.What you should know.mp4 5.0 MB
  • srt2.1. The Basics/03.Why you should care.en.srt 6.7 kB
  • srt1.Introduction/01.Welcome.en.srt 2.1 kB
  • srt2.1. The Basics/04.Physical security vs. cybersecurity.en.srt 1.9 kB
  • mp42.1. The Basics/04.Physical security vs. cybersecurity.mp4 4.8 MB
  • srt2.1. The Basics/05.Anyone can improve the cybersecurity of a business.en.srt 3.4 kB
  • mp42.1. The Basics/05.Anyone can improve the cybersecurity of a business.mp4 9.1 MB
  • srt2.1. The Basics/06.What are the cybersecurity threat actions facing businesses.en.srt 4.5 kB
  • mp42.1. The Basics/06.What are the cybersecurity threat actions facing businesses.mp4 6.9 MB
  • srt2.1. The Basics/07.What are the cybersecurity threats.en.srt 6.4 kB
  • mp42.1. The Basics/07.What are the cybersecurity threats.mp4 14.6 MB
  • srt2.1. The Basics/08.A five-step process to improve cybersecurity.en.srt 3.9 kB
  • mp42.1. The Basics/08.A five-step process to improve cybersecurity.mp4 7.2 MB
  • srt3.2. Identify/09.Step #1 - Identify key assets.en.srt 3.1 kB
  • mp43.2. Identify/09.Step #1 - Identify key assets.mp4 9.5 MB
  • srt3.2. Identify/10.Inventory sheet - Data and devices.en.srt 1.9 kB
  • mp43.2. Identify/10.Inventory sheet - Data and devices.mp4 3.1 MB
【影视】 [ DevCourseWeb.com ] Udemy - Selection and Implementation of Cybersecurity Risks Controls
收录时间:2024-01-05 文档个数:36 文档大小:2.0 GB 最近下载:2025-05-15 人气:2662 磁力链接
  • mp4~Get Your Files Here !/2. SECTION-2/8. 19- The role of governance in the effective selection and implementation of cybe.mp4 142.9 MB
  • mp4~Get Your Files Here !/2. SECTION-2/14. 23-Selecting and implementing cybersecurity controls based on NIST CSF PT2.mp4 122.4 MB
  • mp4~Get Your Files Here !/2. SECTION-2/16. 25- Measuring the effectiveness of implemented controls.mp4 117.4 MB
  • mp4~Get Your Files Here !/2. SECTION-2/17. Putting it all together-The Selection and Implementation of Cyber Risks controls.mp4 115.7 MB
  • mp4~Get Your Files Here !/1. Introduction/10. 9-Key considerations for the identification- selection & implementation of contr.mp4 101.8 MB
  • mp4~Get Your Files Here !/1. Introduction/7. 6-Approach to Control Selection_ pt2.mp4 94.1 MB
  • mp4~Get Your Files Here !/2. SECTION-2/9. 20-Why not implement frameworks that already have recommended controls.mp4 90.3 MB
  • mp4~Get Your Files Here !/2. SECTION-2/15. 24-Implementation Plan for selected controls.mp4 87.1 MB
  • mp4~Get Your Files Here !/2. SECTION-2/11. 21-Challenges, & considerations associated with implementing frameworks-pt2.mp4 82.9 MB
  • mp4~Get Your Files Here !/1. Introduction/11. 10-Risk Assessment-BIA, Control Selection, Cost Benefit Analysis.mp4 81.1 MB
  • mp4~Get Your Files Here !/1. Introduction/9. 8-Introduction to security controls.mp4 77.4 MB
  • mp4~Get Your Files Here !/2. SECTION-2/7. 18-Documenting Cybersecurity Risk Assessment Report-Pt2.mp4 75.5 MB
  • mp4~Get Your Files Here !/2. SECTION-2/5. 17-Determine likelihood, Impact, Calculate risk.mp4 72.4 MB
  • mp4~Get Your Files Here !/2. SECTION-2/13. 23-Selecting and implementing cybersecurity controls based on NIST CSF PT1.mp4 62.9 MB
  • mp4~Get Your Files Here !/1. Introduction/12. 11-Cost Benefit Analysis associated with controls selection.mp4 58.3 MB
  • mp4~Get Your Files Here !/2. SECTION-2/3. 15-Steps involved in assessing the identified cyber risks in web server.mp4 55.0 MB
  • mp4~Get Your Files Here !/2. SECTION-2/1. 14-High-level process of selecting controls to protect ecommerce web server-Pt1.mp4 54.5 MB
  • mp4~Get Your Files Here !/1. Introduction/14. 13-Regulatory Compliance, Incident Response Planning.mp4 53.9 MB
  • mp4~Get Your Files Here !/1. Introduction/13. 12- Technology integration, operational impact, continuous monitoring, employee.mp4 52.8 MB
  • mp4~Get Your Files Here !/2. SECTION-2/6. 18- Documenting Cybersecurity Risk Assessment Report-Pt1.mp4 50.4 MB
【影视】 [TheArtOfHacking] Cybersecurity Video Courses Collection (2018-2020) [En]
收录时间:2021-03-15 文档个数:1102 文档大小:115.5 GB 最近下载:2025-05-15 人气:5916 磁力链接
  • mp4TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/190 - 16.5 Exploiting SQL Injection Vulnerabilities.mp4 856.8 MB
  • mp4TheArtOfHacking.org - Hacking Web Applications/00044 6.4_Exploiting_SQL_Injection_Vulnerabilities.mp4 847.3 MB
  • mp4TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00155 6.4_Exploiting_SQL_Injection_Vulnerabilities.mp4 847.3 MB
  • mp4TheArtOfHacking.org - Hacking Web Applications/00058 8.1_Introducing_Cryptography_Encryption_and_Hashing_Protocols.mp4 757.5 MB
  • 1_Introducing_Cryptography_Encryption_and_Hashing_ProtocTheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00169 8.1_Introducing_Cryptography_Encryption_and_Hashing_Protoc 757.5 MB
  • mp4TheArtOfHacking.org - Hacking Web Applications/00038 5.1_Understanding_Authentication_Schemes_in_Web_Applications_and_Related_Vulnerabilities.mp4 733.0 MB
  • 1_Understanding_Authentication_Schemes_in_Web_ApplicatioTheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00149 5.1_Understanding_Authentication_Schemes_in_Web_Applicatio 733.0 MB
  • mp4TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/158 - 14.15 Understanding Authentication Schemes in Web Applications.mp4 730.3 MB
  • mp4TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/008 - 2.2 Threats and Attack Vectors.mp4 681.2 MB
  • mp4TheArtOfHacking.org - Hacking Web Applications/00018 3.1_Exploring_Kali_Linux.mp4 586.2 MB
  • mp4TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00129 3.1_Exploring_Kali_Linux.mp4 586.2 MB
  • mp4TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/140 - 13.11 Introducing the Burp Suite.mp4 568.8 MB
  • mp4TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/107 - 10.10 Surveying Social Engineering Case Studies.mp4 560.2 MB
  • mp4TheArtOfHacking.org - Hacking Web Applications/00034 4.8_Introducing_the_Burp_Suite.mp4 549.6 MB
  • mp4TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00145 4.8_Introducing_the_Burp_Suite.mp4 549.6 MB
  • mp4TheArtOfHacking.org - Hacking Web Applications/00029 4.3_Exploring_Shodan_Maltego_Recon-NG_SpiderFoot_and_TheHarvester.mp4 511.9 MB
  • 3_Exploring_Shodan_Maltego_Recon-NG_SpiderFoot_and_TheHaTheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00140 4.3_Exploring_Shodan_Maltego_Recon-NG_SpiderFoot_and_TheHa 511.9 MB
  • 6_Surveying_Essential_Tools_for_Passive_Reconnaissance_-TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00022 3.6_Surveying_Essential_Tools_for_Passive_Reconnaissance_- 489.1 MB
  • mp4TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/264 - 22.5 Exploring The Android Security Model.mp4 474.0 MB
  • mp4TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00061 8.10_Hacking_the_Management_Plane.mp4 469.4 MB
【影视】 [ DevCourseWeb.com ] Udemy - Mastering Cybersecurity and Supply Chain Risk Management
收录时间:2024-03-23 文档个数:41 文档大小:3.6 GB 最近下载:2025-05-15 人气:1529 磁力链接
  • mp4~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/7. Recover.mp4 205.3 MB
  • mp4~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/4. Network Security Controls.mp4 173.8 MB
  • mp4~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/5. Incident Analysis.mp4 150.0 MB
  • mp4~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/1. User and Network Infrastructure.mp4 136.2 MB
  • mp4~Get Your Files Here !/1. Introduction to NIST Framework/3. NIST Framework Core.mp4 130.0 MB
  • mp4~Get Your Files Here !/5. Effective Supply Chain Risk Management/4. Develop, Assess and Test Supply Chain Risks.mp4 123.4 MB
  • mp4~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/3. Executable Response Plan.mp4 116.0 MB
  • mp4~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/9. Information Protection.mp4 115.2 MB
  • mp4~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/8. Hardware Integrity.mp4 105.7 MB
  • mp4~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/1. Developing a Continuity of Operations Plan.mp4 103.2 MB
  • mp4~Get Your Files Here !/2. Cybersecurity Risk Planning & Management/4. Keeping Hardware Inventory Updated.mp4 102.7 MB
  • mp4~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/2. Incident Response.mp4 102.1 MB
  • mp4~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/7. Data Security.mp4 101.4 MB
  • mp4~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/6. Mitigation.mp4 101.0 MB
  • mp4~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/2. Authentication and Access Control.mp4 100.3 MB
  • mp4~Get Your Files Here !/2. Cybersecurity Risk Planning & Management/7. Personnel Security Requirements.mp4 98.1 MB
  • mp4~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/10. Patch Management.mp4 97.7 MB
  • mp4~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/5. Association and Authentication.mp4 91.7 MB
  • mp4~Get Your Files Here !/5. Effective Supply Chain Risk Management/1. Supply Chain Risk Management.mp4 90.7 MB
  • mp4~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/12. Protective Technology.mp4 88.5 MB
【影视】 Cybersecurity Threats Ransomware
收录时间:2017-04-29 文档个数:39 文档大小:405.4 MB 最近下载:2025-05-15 人气:3100 磁力链接
  • mp401. Course Overview/01. Intro.mp4 5.4 MB
  • mp402. What Is Ransomware/01. Overview.mp4 4.1 MB
  • mp402. What Is Ransomware/02. Definition and Types of Ransomware.mp4 20.3 MB
  • mp402. What Is Ransomware/03. The Ransomware Timeline.mp4 15.2 MB
  • mp402. What Is Ransomware/04. What Is Ransomware 30,000 ft. View.mp4 5.9 MB
  • mp402. What Is Ransomware/05. How Big Is the Problem.mp4 15.1 MB
  • mp402. What Is Ransomware/06. Ransomware Victims.mp4 11.7 MB
  • mp402. What Is Ransomware/07. Module Progress Checkpoint.mp4 617.9 kB
  • mp402. What Is Ransomware/08. Demo of Real World Ransomware Attack.mp4 52.0 MB
  • mp402. What Is Ransomware/09. Variations of Ransomware.mp4 6.4 MB
  • mp402. What Is Ransomware/10. Summary.mp4 2.5 MB
  • mp403. Ransomware Entry Points/01. Overview.mp4 2.7 MB
  • mp403. Ransomware Entry Points/02. The 5 Classic Infection Vectors.mp4 3.1 MB
  • mp403. Ransomware Entry Points/03. Phishing and Email Attachments.mp4 10.6 MB
  • mp403. Ransomware Entry Points/04. Embedded Hyperlinks, Websitesdownloads, and Drive-by Infections.mp4 6.2 MB
  • mp403. Ransomware Entry Points/05. Why Common Exploit Kits Are Used.mp4 5.4 MB
  • mp403. Ransomware Entry Points/06. Command and Callback (C&C) and Indicators of Compromise.mp4 7.0 MB
  • mp403. Ransomware Entry Points/07. Summary.mp4 2.8 MB
  • mp404. Incident Response Detection and Containment/01. Overview.mp4 2.6 MB
  • mp404. Incident Response Detection and Containment/02. Indicators of Compromise.mp4 5.3 MB
【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity Threat Hunting Professional
收录时间:2022-03-20 文档个数:36 文档大小:1.0 GB 最近下载:2025-05-15 人气:2155 磁力链接
  • mp4~Get Your Files Here !/2. Time to hunt/2. Practical Threat hunting Demo.mp4 121.9 MB
  • mp4~Get Your Files Here !/2. Time to hunt/1. Case Base Threat Hunting.mp4 93.6 MB
  • mp4~Get Your Files Here !/2. Time to hunt/3. Indicators of threat attacksIoC.mp4 86.1 MB
  • mp4~Get Your Files Here !/1. Introduction/11. 7 Effective Threat Hunting Tips.mp4 81.5 MB
  • mp4~Get Your Files Here !/1. Introduction/10. Hypothesis Testing & Sources of Hypothesis.mp4 78.6 MB
  • mp4~Get Your Files Here !/4. Course Resources/1. Course Resources.mp4 72.6 MB
  • mp4~Get Your Files Here !/3. Course Conclusion/1. Course Review.mp4 72.6 MB
  • mp4~Get Your Files Here !/1. Introduction/8. What is Required for Successful Threat Hunting.mp4 71.2 MB
  • mp4~Get Your Files Here !/1. Introduction/6. Terms associated with Threat Hunting.mp4 70.5 MB
  • mp4~Get Your Files Here !/1. Introduction/4. Why threat hunt and attributes of an effective threat hunter.mp4 56.2 MB
  • mp4~Get Your Files Here !/1. Introduction/9. Threat Hunting Approaches.mp4 55.0 MB
  • mp4~Get Your Files Here !/1. Introduction/5. Threat Hunting Skillset Requirements.mp4 40.0 MB
  • mp4~Get Your Files Here !/1. Introduction/7. Threat Hunting Loop.mp4 38.6 MB
  • mp4~Get Your Files Here !/1. Introduction/2. What is Threat Hunting & Its Primary objective.mp4 35.9 MB
  • mp4~Get Your Files Here !/1. Introduction/1. Introduction.mp4 29.5 MB
  • mp4~Get Your Files Here !/1. Introduction/3. What is Threat Hunting & Its Primary objective..mp4 23.3 MB
  • mp4~Get Your Files Here !/4. Course Resources/1.1 Network Threat Hunting with Tim Crothers.mp4 10.6 MB
  • pdf~Get Your Files Here !/4. Course Resources/1.2 Resources Links for Threat Hunting Course.pdf 435.7 kB
  • srt~Get Your Files Here !/2. Time to hunt/2. Practical Threat hunting Demo.srt 11.9 kB
  • srt~Get Your Files Here !/2. Time to hunt/3. Indicators of threat attacksIoC.srt 8.3 kB
【影视】 [FreeCoursesOnline.Me] [Packtpub.Com] Cybersecurity - Methods of Protection (Blue Team Activity) - [FCO]
收录时间:2018-11-13 文档个数:35 文档大小:1.3 GB 最近下载:2025-05-15 人气:1742 磁力链接
  • mp401.Securing Your Network/0101.The Course Overview.mp4 22.8 MB
  • mp401.Securing Your Network/0102.Understanding Firewalls and Tuning Them Up.mp4 28.7 MB
  • mp401.Securing Your Network/0103.How to Work with IDSIPS.mp4 24.0 MB
  • mp401.Securing Your Network/0104.Securing Your Wi-Fi Network.mp4 90.9 MB
  • mp401.Securing Your Network/0105.Ferreting out a Hacker by IP.mp4 101.3 MB
  • mp401.Securing Your Network/0106.Analyzing Traffic Wireshark.mp4 25.3 MB
  • mp401.Securing Your Network/0107.The Fastest Way to Detect ARP Poisoning Attack.mp4 21.8 MB
  • mp401.Securing Your Network/0108.Analyzing Your Traffic to Catch a Spy with Wireshark.mp4 35.4 MB
  • mp401.Securing Your Network/0109.Looking for Spies with a Python Script.mp4 50.2 MB
  • mp401.Securing Your Network/0110.How to Outfox Ransomware.mp4 28.9 MB
  • mp401.Securing Your Network/0111.Advanced-level Techniques What to Do If Hackers Already in Your Network.mp4 40.3 MB
  • mp402.Securing Your Website/0201.Brute-Forcing Website Passwords with OWASP ZAP.mp4 45.6 MB
  • mp402.Securing Your Website/0202.How to Create a Bulletproof Password in a Second.mp4 68.9 MB
  • mp402.Securing Your Website/0203.Testing a Website for SQL Injection with Burp Suite.mp4 30.9 MB
  • mp402.Securing Your Website/0204.Testing a Website for XSS Vulnerability.mp4 29.8 MB
  • mp402.Securing Your Website/0205.Building Fortifications – Input Validation and Whitelisting.mp4 99.3 MB
  • mp402.Securing Your Website/0206.Testing Your SSLTLS Connection.mp4 21.2 MB
  • mp402.Securing Your Website/0207.Scanning Your Website for Malicious Scripts.mp4 91.1 MB
  • mp402.Securing Your Website/0208.Protecting from a Session Hijacking Attack.mp4 27.7 MB
  • mp402.Securing Your Website/0209.The Big Strategy – Three Shortcuts to Secure a Web Application.mp4 68.6 MB
【影视】 [Udemy] Real-World Ethical Hacking Hands-on Cybersecurity (2021) [En]
收录时间:2022-01-09 文档个数:194 文档大小:8.1 GB 最近下载:2025-05-15 人气:4571 磁力链接
  • mp414. Bonus Videos National Cyber Warrior Academy, Interviews and More/3. NCWA 2017 Facebook Live Video on Car Hacking and Drone Programming.mp4 947.8 MB
  • mp49. BONUS Section Car Hacking in Kali Linux!/9. Car Hacking LIVE on Dr. Payne's VW Jetta Facebook Live Video from NCWA 2017.mp4 347.6 MB
  • mp414. Bonus Videos National Cyber Warrior Academy, Interviews and More/5. Dr. Payne's TEDx Talk on Coding and Cyber as the New Literacy.mp4 320.6 MB
  • mp45. Social Engineering Capturing Usernames and Passwords via Phishing/3. Cloning Facebook and Harvesting User Passwords.mp4 265.0 MB
  • mp41. Real-World Ethical Hacking 1 Hacking Windows!/10. BONUS Mac Root Hack!.mp4 233.2 MB
  • mp43. Important Linux and Windows Terminal Commands/2. Basic Linux Commands.mp4 195.0 MB
  • mp413. Mobile Hacking on Android/2. Creating the Meterpreter Payload for Android.mp4 175.7 MB
  • mp43. Important Linux and Windows Terminal Commands/4. More Helpful Linux Commands.mp4 170.6 MB
  • mp44. Create a Virtual Network for Ethical Hacking!/3. Connecting Your VMs to the Host-Only Network.mp4 148.8 MB
  • mp48. Hacking Win10 Command & Control Phase/4. Stealing Screenshots, Keystrokes, and ,Webcams.mp4 145.4 MB
  • mp410. BONUS Hacking Windows 7 with Metasploit!/4. Creating an Exploit Payload with Metasploit.mp4 144.4 MB
  • mp42. Create Your Own Virtual Hacking Lab!/4. Create an Android PhoneTablet VM for Mobile Hacking!.mp4 142.1 MB
  • mp413. Mobile Hacking on Android/4. Advanced Android Exploits Accessing Storage, Downloading and Uploading Files.mp4 139.2 MB
  • mp49. BONUS Section Car Hacking in Kali Linux!/8. BONUS Hacking the Car Hacking Software, to 1000 mph!.mp4 125.2 MB
  • mp45. Social Engineering Capturing Usernames and Passwords via Phishing/7. Capturing the User's Login and Password in Kali.mp4 116.7 MB
  • mp49. BONUS Section Car Hacking in Kali Linux!/5. The Replay Attack Replaying CAN Packets with CANplayer.mp4 116.0 MB
  • mp411. Password Problems - Everybody's Got 'Em Hacking, Cracking, Snacking & Hijacking/3. Sniffing the Network Installing Wireshark.mp4 114.3 MB
  • mp44. Create a Virtual Network for Ethical Hacking!/5. Updating Kali and Windows VMs.mp4 112.5 MB
  • mp44. Create a Virtual Network for Ethical Hacking!/4. Creating and Using a Public NAT Network in VBox.mp4 112.5 MB
  • mp411. Password Problems - Everybody's Got 'Em Hacking, Cracking, Snacking & Hijacking/6. Seven Things You Can Do for Safer Passwords.mp4 111.1 MB
【影视】 [ DevCourseWeb.com ] China's Cybersecurity and Privacy Regulations - Essential Training
收录时间:2024-09-02 文档个数:49 文档大小:237.4 MB 最近下载:2025-05-15 人气:431 磁力链接
  • mp4~Get Your Files Here !/05 - 4.Personal Information Protection Law/01 - Personal Information Protection Law breakdown.mp4 29.7 MB
  • mp4~Get Your Files Here !/05 - 4.Personal Information Protection Law/02 - Legal basis and consent.mp4 16.8 MB
  • mp4~Get Your Files Here !/05 - 4.Personal Information Protection Law/04 - Personal information handler obligations.mp4 15.5 MB
  • mp4~Get Your Files Here !/05 - 4.Personal Information Protection Law/05 - Cross-border data transfer and updates to the regulation.mp4 15.2 MB
  • mp4~Get Your Files Here !/03 - 2. Cybersecurity Law/01 - Cybersecurity Law breakdown.mp4 13.6 MB
  • mp4~Get Your Files Here !/05 - 4.Personal Information Protection Law/03 - Data subject rights.mp4 13.3 MB
  • mp4~Get Your Files Here !/03 - 2. Cybersecurity Law/02 - Multilevel protection scheme.mp4 13.2 MB
  • mp4~Get Your Files Here !/04 - 3. Data Security Law/01 - Data Security Law breakdown.mp4 12.8 MB
  • mp4~Get Your Files Here !/03 - 2. Cybersecurity Law/03 - Multilevel protection scheme technical components.mp4 10.7 MB
  • mp4~Get Your Files Here !/02 - 1. China Regulation Basics/02 - Scope.mp4 10.7 MB
  • mp4~Get Your Files Here !/02 - 1. China Regulation Basics/03 - Important dates.mp4 10.6 MB
  • mp4~Get Your Files Here !/06 - 5. Real-World Guidance/02 - Enforcement action examples.mp4 10.2 MB
  • mp4~Get Your Files Here !/04 - 3. Data Security Law/03 - Key provisions of the Data Security Law.mp4 9.7 MB
  • mp4~Get Your Files Here !/04 - 3. Data Security Law/02 - Data classification and cross-border transfer guidelines.mp4 8.6 MB
  • mp4~Get Your Files Here !/01 - Introduction/03 - Definitions.mp4 7.3 MB
  • mp4~Get Your Files Here !/07 - Conclusion/02 - Additional resources.mp4 6.8 MB
  • mp4~Get Your Files Here !/02 - 1. China Regulation Basics/01 - Overview of the recent cybersecurity and privacy regulations.mp4 6.7 MB
  • mp4~Get Your Files Here !/07 - Conclusion/01 - How to get started.mp4 6.5 MB
  • mp4~Get Your Files Here !/06 - 5. Real-World Guidance/01 - Successful certification examples.mp4 6.0 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Cybersecurity and privacy regulation in China.mp4 4.7 MB
【影视】 [FreeCoursesOnline.Me] PacktPub - Cybersecurity Attacks (Red Team Activity) [Video]
收录时间:2021-04-18 文档个数:41 文档大小:1.1 GB 最近下载:2025-05-15 人气:4978 磁力链接
  • mp41 - Building Our Lab/Getting Acquainted with Kali Linux Easy Way.mp4 121.1 MB
  • mp41 - Building Our Lab/Getting Acquainted with Terminal Commands.mp4 105.8 MB
  • mp44 - Breaking the Human in a Cyber Crime Attack/Playing on Human Emotions and Weaknesses to Get the Information.mp4 76.7 MB
  • mp42 - Attacking a Network/Taking Control Over Target Browser with BeEf.mp4 46.7 MB
  • mp42 - Attacking a Network/Creating Reverse Shell with Metasploit.mp4 42.0 MB
  • mp44 - Breaking the Human in a Cyber Crime Attack/Social Engineering Techniques.mp4 41.3 MB
  • mp43 - Website and Web-Application Attacks#/Proxy Attack with Burp Suite.mp4 38.5 MB
  • mp42 - Attacking a Network/Hidden Scanning Ports with Nmap.mp4 37.1 MB
  • mp41 - Building Our Lab/Installing Metasploitable 2 on Virtual Machine.mp4 34.5 MB
  • mp43 - Website and Web-Application Attacks#/Manual Testing for SQL Injection.mp4 34.3 MB
  • mp43 - Website and Web-Application Attacks#/Executing a Session Hijacking.mp4 32.0 MB
  • mp44 - Breaking the Human in a Cyber Crime Attack/How to Hack Without Getting in Touch with a Target.mp4 30.3 MB
  • mp43 - Website and Web-Application Attacks#/Exploring Target with Browser.mp4 28.8 MB
  • mp44 - Breaking the Human in a Cyber Crime Attack/Making a Phishing Email with SET.mp4 28.4 MB
  • mp41 - Building Our Lab/The Course Overview.mp4 27.1 MB
  • mp42 - Attacking a Network/Advance-Level Hacking - Scanning Hosts with Python Script.mp4 27.0 MB
  • mp42 - Attacking a Network/Intercepting Traffic with Wireshark.mp4 26.9 MB
  • mp43 - Website and Web-Application Attacks#/Infecting Website with Stored XSS.mp4 26.7 MB
  • mp44 - Breaking the Human in a Cyber Crime Attack/Looking for Secrets in Social Media with Online Tools.mp4 26.1 MB
  • mp43 - Website and Web-Application Attacks#/Scanning Web-Application with OWASP ZAP.mp4 25.5 MB
【影视】 CompTIA CySA+ Cybersecurity Analyst (CS0-003)
收录时间:2024-09-27 文档个数:179 文档大小:4.4 GB 最近下载:2025-05-15 人气:4800 磁力链接
  • mp4Chapter 06 Techniques for Malicious Activity Analysis/003. A Day in the Life of a Cybersecurity Analyst.mp4 157.6 MB
  • mp4Chapter 10 Vulnerability Scanning Methods and Concepts/002. Industry Frameworks.mp4 149.6 MB
  • mp4Chapter 10 Vulnerability Scanning Methods and Concepts/001. Asset Discovery.mp4 133.9 MB
  • mp4Chapter 01 About the CySA Exam/003. How to Take Your CompTIA CySA+ Exam.mp4 125.1 MB
  • mp4Chapter 02 System and Network Architectures/002. Operating System Concepts.mp4 108.3 MB
  • mp4Chapter 02 System and Network Architectures/001. Logging.mp4 104.1 MB
  • mp4Chapter 09 Applying Threat Intelligence in Support of Organizational Security/002. Threat Modeling.mp4 97.3 MB
  • mp4Chapter 06 Techniques for Malicious Activity Analysis/002. Log Analysis (SIEM and SOAR).mp4 94.0 MB
  • mp4Chapter 06 Techniques for Malicious Activity Analysis/005. File Analysis.mp4 85.6 MB
  • mp4Chapter 05 Analyzing Potentially Malicious Activity/003. Application Symptoms.mp4 75.8 MB
  • mp4Chapter 03 Threat Intelligence in Support of Organizational Security/001. Standardized Processes.mp4 70.1 MB
  • mp4Chapter 16 Post-Incident Response Activities/002. Reporting and Communication.mp4 69.7 MB
  • mp4Chapter 14 Vulnerability Handling and Response/009. Vulnerability Management.mp4 68.7 MB
  • mp4Chapter 10 Vulnerability Scanning Methods and Concepts/004. Vulnerability Identification and Scanning.mp4 68.4 MB
  • mp4Chapter 08 Fundamentals of Threat Intelligence/002. Supply, TTP, and Intelligence.mp4 68.1 MB
  • mp4Chapter 09 Applying Threat Intelligence in Support of Organizational Security/005. Integrating Vulnerability Management with Threat Hunting.mp4 68.1 MB
  • mp4Chapter 14 Vulnerability Handling and Response/012. Inhibitors to Remediation.mp4 67.9 MB
  • mp4Chapter 05 Analyzing Potentially Malicious Activity/001. Network Symptoms.mp4 66.7 MB
  • mp4Chapter 09 Applying Threat Intelligence in Support of Organizational Security/004. Threat Hunting.mp4 64.1 MB
  • mp4Chapter 10 Vulnerability Scanning Methods and Concepts/003. Critical Infrastructure.mp4 63.2 MB
【影视】 [ DevCourseWeb.com ] Udemy - Python for Cybersecurity
收录时间:2023-12-17 文档个数:73 文档大小:1.3 GB 最近下载:2025-05-15 人气:4217 磁力链接
  • mp4~Get Your Files Here !/6. Sockets/7. Part 3 - Sending, Receiving, and Closing the Connection.mp4 179.3 MB
  • mp4~Get Your Files Here !/4. Object Oriented Programming/2. Creating Our First Object.mp4 97.9 MB
  • mp4~Get Your Files Here !/6. Sockets/5. Part 1 - Socket, Bind, Listen Accept.mp4 81.1 MB
  • mp4~Get Your Files Here !/6. Sockets/6. Part 2 - Socket, Connect.mp4 74.5 MB
  • mp4~Get Your Files Here !/6. Sockets/4. Why Encode.mp4 71.2 MB
  • mp4~Get Your Files Here !/6. Sockets/3. How Sockets Will Work.mp4 68.7 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/6. If Statements.mp4 64.8 MB
  • mp4~Get Your Files Here !/5. Let's Make API Requests/5. Consuming an API - Complex.mp4 62.7 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/12. Dictionaries.mp4 51.7 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/13. Functions.mp4 49.3 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/3. Variables.mp4 42.2 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/7. Error Handling Part 1.mp4 40.5 MB
  • mp4~Get Your Files Here !/2. Environment Setup/2. Installing VS Code and Extensions.mp4 37.6 MB
  • mp4~Get Your Files Here !/6. Sockets/2. What is a Socket.mp4 35.1 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/11. Lists.mp4 35.1 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/4. f Strings.mp4 32.8 MB
  • mp4~Get Your Files Here !/4. Object Oriented Programming/3. Importing Packages.mp4 31.4 MB
  • mp4~Get Your Files Here !/1. Getting Started/1. IMPORTANT!!!.mp4 30.9 MB
  • mp4~Get Your Files Here !/5. Let's Make API Requests/4. Consuming an API - Simple.mp4 26.2 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/8. While Loop.mp4 21.6 MB
【影视】 Pluralsight Cybersecurity Threats Ransomware
收录时间:2017-05-13 文档个数:38 文档大小:388.1 MB 最近下载:2025-05-15 人气:1701 磁力链接
  • mp41. Course Overview/01. Course Overview.mp4 5.4 MB
  • mp42. What Is Ransomware/09. Demo of Real World Ransomware Attack.mp4 52.0 MB
  • mp42. What Is Ransomware/03. Definition and Types of Ransomware.mp4 20.3 MB
  • mp42. What Is Ransomware/04. The Ransomware Timeline.mp4 15.2 MB
  • mp42. What Is Ransomware/06. How Big Is the Problem.mp4 15.1 MB
  • mp42. What Is Ransomware/07. Ransomware Victims.mp4 11.7 MB
  • mp42. What Is Ransomware/10. Variations of Ransomware.mp4 6.4 MB
  • mp42. What Is Ransomware/05. What Is Ransomware 30,000 ft. View.mp4 5.9 MB
  • mp42. What Is Ransomware/02. Overview.mp4 4.1 MB
  • mp42. What Is Ransomware/11. Summary.mp4 2.5 MB
  • mp42. What Is Ransomware/08. Module Progress Checkpoint.mp4 617.9 kB
  • mp43. Ransomware Entry Points/14. Phishing and Email Attachments.mp4 10.6 MB
  • mp43. Ransomware Entry Points/17. Command and Callback (C&C) and Indicators of Compromise.mp4 7.0 MB
  • mp43. Ransomware Entry Points/15. Embedded Hyperlinks, Websites_downloads, and Drive-by Infections.mp4 6.2 MB
  • mp43. Ransomware Entry Points/16. Why Common Exploit Kits Are Used.mp4 5.4 MB
  • mp43. Ransomware Entry Points/13. The 5 Classic Infection Vectors.mp4 3.1 MB
  • mp43. Ransomware Entry Points/18. Summary.mp4 2.8 MB
  • mp43. Ransomware Entry Points/12. Overview.mp4 2.7 MB
  • mp44. Incident Response - Detection and Containment/22. Containing the Attack.mp4 9.0 MB
  • mp44. Incident Response - Detection and Containment/21. Detecting an Attack.mp4 7.3 MB
【影视】 [FreeCoursesOnline.Me] O`REILLY - The Complete Cybersecurity Bootcamp, 2nd Edition
收录时间:2023-12-27 文档个数:340 文档大小:6.7 GB 最近下载:2025-05-15 人气:10000 磁力链接
  • mp4Lesson 29 Hacking Mobile Platforms/003. 29.2 Hacking iOS.mp4 86.6 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/014. 17.13 Performing SMTP and DNS Enumeration.mp4 80.0 MB
  • mp4Lesson 21 Fundamentals of Wireless Hacking/004. 21.3 Exploring Wireless Threats.mp4 79.0 MB
  • mp4Lesson 33 Fundamentals of IoT Security/003. 33.2 Understanding IoT Attacks.mp4 76.8 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/015. 17.14 Conducting Additional Enumeration Techniques.mp4 75.8 MB
  • mp4Lesson 33 Fundamentals of IoT Security/002. 33.1 Introducing IoT Concepts.mp4 74.4 MB
  • mp4Lesson 29 Hacking Mobile Platforms/002. 29.1 Understanding Mobile Platform Attack Vectors.mp4 73.4 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/011. 17.1 Performing SNMP Enumeration.mp4 71.8 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/004. 17.3 Understanding Host Discovery.mp4 69.7 MB
  • mp4Lesson 5 Fundamentals of Incident Response/007. 5.6 Analyzing Computer Incident Response Teams (CSIRTs).mp4 68.5 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/007. 17.6 Scanning Beyond IDS and Firewall.mp4 68.2 MB
  • mp4Lesson 27 Hacking User Credentials/006. 27.5 Cracking Passwords with John the Ripper.mp4 66.1 MB
  • mp4Lesson 7 Intrusion Event Categories/009. 7.8 Understanding the MITRE ATT&CK Framework.mp4 65.8 MB
  • mp4Lesson 29 Hacking Mobile Platforms/004. 29.3 Hacking Android OS.mp4 63.8 MB
  • mp4Lesson 20 SQL Injection/005. 20.4 Exploring SQL Injection Tools.mp4 63.3 MB
  • mp4Lesson 21 Fundamentals of Wireless Hacking/003. 21.2 Understanding Wireless Encryption.mp4 62.7 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/013. 17.12 Performing NTP and NFS Enumeration.mp4 61.8 MB
  • mp4Lesson 16 Information Gathering and Passive Reconnaissance/011. 16.10 Performing Footprinting through Social Engineering.mp4 59.1 MB
  • mp4Lesson 8 Digital Forensics Fundamentals/004. 8.3 Understanding Evidence Collection.mp4 57.2 MB
  • mp4Lesson 21 Fundamentals of Wireless Hacking/007. 21.6 Hacking Bluetooth.mp4 52.3 MB
【影视】 [ DevCourseWeb.com ] Udemy - Ultimate Cybersecurity - Uncovering Hacker Strategies
收录时间:2023-12-20 文档个数:64 文档大小:3.4 GB 最近下载:2025-05-15 人气:4969 磁力链接
  • mp4~Get Your Files Here !/8 - Conclusion/56 - 82 Staying Informed and UptoDate.mp4 99.4 MB
  • mp4~Get Your Files Here !/8 - Conclusion/57 - 83 Next Steps for Advancing Your Cybersecurity Knowledge.mp4 91.7 MB
  • mp4~Get Your Files Here !/6 - Cybersecurity Laws Regulations and Compliance/40 - Cybersecurity Laws Regulations and Compliance Video.mp4 84.9 MB
  • mp4~Get Your Files Here !/4 - Cybersecurity Best Practices/33 - 452 Intrusion Detection and Prevention Systems IDPS.mp4 82.9 MB
  • mp4~Get Your Files Here !/6 - Cybersecurity Laws Regulations and Compliance/42 - 62 Compliance with Industry Standards.mp4 82.9 MB
  • mp4~Get Your Files Here !/7 - Cybersecurity Tools and Resources/52 - 73 Monitoring and Logging Tools.mp4 81.4 MB
  • mp4~Get Your Files Here !/4 - Cybersecurity Best Practices/34 - 453 Virtual Private Networks VPNs.mp4 80.2 MB
  • mp4~Get Your Files Here !/5 - Incident Response and Recovery/37 - 52 Identifying and Analyzing Security Incidents.mp4 80.2 MB
  • mp4~Get Your Files Here !/4 - Cybersecurity Best Practices/32 - 451 Firewalls.mp4 80.1 MB
  • mp4~Get Your Files Here !/5 - Incident Response and Recovery/35 - Incident Response and Recovery Video.mp4 79.6 MB
  • mp4~Get Your Files Here !/6 - Cybersecurity Laws Regulations and Compliance/46 - 63 Cybersecurity Frameworks.mp4 79.3 MB
  • mp4~Get Your Files Here !/7 - Cybersecurity Tools and Resources/50 - 71 Security Assessment and Testing Tools.mp4 79.1 MB
  • mp4~Get Your Files Here !/7 - Cybersecurity Tools and Resources/49 - Cybersecurity Tools and Resources Video.mp4 79.1 MB
  • mp4~Get Your Files Here !/7 - Cybersecurity Tools and Resources/51 - 72 OpenSource Security Tools.mp4 78.3 MB
  • mp4~Get Your Files Here !/8 - Conclusion/55 - 81 Course Summary.mp4 78.1 MB
  • mp4~Get Your Files Here !/4 - Cybersecurity Best Practices/31 - 45 Network Security Measures.mp4 77.8 MB
  • mp4~Get Your Files Here !/6 - Cybersecurity Laws Regulations and Compliance/41 - 61 Understanding Data Privacy Laws.mp4 77.5 MB
  • mp4~Get Your Files Here !/4 - Cybersecurity Best Practices/30 - 44 Data Encryption and Secure Communication.mp4 77.1 MB
  • mp4~Get Your Files Here !/8 - Conclusion/54 - Conclusion Video.mp4 77.0 MB
  • mp4~Get Your Files Here !/4 - Cybersecurity Best Practices/29 - 43 MultiFactor Authentication MFA.mp4 71.9 MB
共10页 上一页 1 2 3 4 5 6 7 8 下一页