为您索检到186条磁力链接,耗时1毫秒。
- 【影视】 Microsoft Cybersecurity Pro Track PowerShell Security
-
收录时间:2021-03-20
文档个数:58
文档大小:1.4 GB
最近下载:2025-05-16
人气:3259
磁力链接
Course/3. PowerShell Operational Security/2. Managing Remote Execution Capabilities of Windows PowerShell.mp4 192.7 MB
Course/4. Implementing PowerShell-based Security/1. Windows Powershell DSC.mp4 146.7 MB
Course/5. Windows PowerShell-based Exploits and their Mitigation/1. Windows PowerShell-based Attacks.mp4 134.1 MB
Course/4. Implementing PowerShell-based Security/2. Just Enough Administration (JEA).mp4 123.4 MB
Course/3. PowerShell Operational Security/1. Managing Local Script Execution Policy with Windows PowerShell Execution.mp4 116.8 MB
Course/1. Introduction/3. Preparing the Lab Environment.mp4 95.2 MB
Course/2. Windows PowerShell Fundamentals/2. PowerShell Editions and Versions.mp4 88.2 MB
Course/4. Implementing PowerShell-based Security/3. Windows PowerShell Auditing and Logging.mp4 86.9 MB
Course/3. PowerShell Operational Security/4. Language Mode.mp4 79.5 MB
Course/2. Windows PowerShell Fundamentals/1. Windows PowerShell Architecture.mp4 66.6 MB
Course/5. Windows PowerShell-based Exploits and their Mitigation/3. Summary of Windows PowerShell-based Security-Related Technologies.mp4 55.5 MB
Course/2. Windows PowerShell Fundamentals/3. Running Windows Powershell.mp4 53.4 MB
Course/5. Windows PowerShell-based Exploits and their Mitigation/2. Windows PowerShell-based Security Tools.mp4 50.7 MB
Course/3. PowerShell Operational Security/5. Anti-Malware SCan Interface (AMSI).mp4 39.1 MB
Course/1. Introduction/2. About the Course.mp4 25.1 MB
Course/3. PowerShell Operational Security/3. Constrained Endpoints.mp4 24.2 MB
Course/1. Introduction/1. Instructor Introduction.mp4 10.9 MB
Course/3. PowerShell Operational Security/2. Managing Remote Execution Capabilities of Windows PowerShell.srt 43.0 kB
Course/4. Implementing PowerShell-based Security/1. Windows Powershell DSC.srt 37.5 kB
Course/4. Implementing PowerShell-based Security/2. Just Enough Administration (JEA).srt 35.1 kB
猜你喜欢:
Cybersecurity
Pro
PowerShell
Track
Security
Microsoft
- 【影视】 [ WebToolTip.com ] Udemy - Cybersecurity Fundamentals - A Practical Hands-On Course
-
收录时间:2025-05-09
文档个数:25
文档大小:1.5 GB
最近下载:2025-05-16
人气:245
磁力链接
~Get Your Files Here !/2 - Cybersecurity Fundamentals Practical Tutorials/1 -Cybersecurity Practical Learning Part 1.mp4 147.6 MB
~Get Your Files Here !/2 - Cybersecurity Fundamentals Practical Tutorials/2 -Cybersecurity Practical Learning Part 2.mp4 139.7 MB
~Get Your Files Here !/5 - Start Ethical Hacking Today/1 -How To Keep Your Laptops Secure And Safe.mp4 120.4 MB
~Get Your Files Here !/4 - Mastering Burpsuite/4 -Insecure Direct Object Reference (IDOR).mp4 120.1 MB
~Get Your Files Here !/1 - Introduction/1 -Lecture 1.pdf 92.9 MB
~Get Your Files Here !/2 - Cybersecurity Fundamentals Practical Tutorials/3 -Python for Cybersecurity Part 1.mp4 90.9 MB
~Get Your Files Here !/3 - Tools for Cybersecurity Practical Guide/3 -How To Install Python On Kali Linux.mp4 89.8 MB
~Get Your Files Here !/1 - Introduction/1 -Introduction.mp4 88.0 MB
~Get Your Files Here !/4 - Mastering Burpsuite/3 -Live Website Scan On Burpsuite.mp4 79.7 MB
~Get Your Files Here !/3 - Tools for Cybersecurity Practical Guide/1 -How to Download Kali Linux.mp4 74.9 MB
~Get Your Files Here !/5 - Start Ethical Hacking Today/2 -Spiderfoot Complete Tutorial.mp4 70.5 MB
~Get Your Files Here !/2 - Cybersecurity Fundamentals Practical Tutorials/4 -Python for Cybersecurity Part 2.mp4 70.0 MB
~Get Your Files Here !/1 - Introduction/2 -Setting Up Your Lab Environment (VirtualBox + Kali Linux + Windows VM).mp4 61.6 MB
~Get Your Files Here !/3 - Tools for Cybersecurity Practical Guide/5 -How To Download And Use Cherry Tree.mp4 45.4 MB
~Get Your Files Here !/5 - Start Ethical Hacking Today/4 -The Best Website For Cybersecurity Experts.mp4 45.3 MB
~Get Your Files Here !/4 - Mastering Burpsuite/1 -How To Download And Install Burpsuite.mp4 41.8 MB
~Get Your Files Here !/3 - Tools for Cybersecurity Practical Guide/4 -How To Install Pycharm on Kali Linux.mp4 33.9 MB
~Get Your Files Here !/4 - Mastering Burpsuite/2 -Website Scan Part 1.mp4 32.7 MB
~Get Your Files Here !/3 - Tools for Cybersecurity Practical Guide/2 -How To Create Txt File In Kali Linux.mp4 18.8 MB
~Get Your Files Here !/5 - Start Ethical Hacking Today/3 -Haveibeenpawned.mp4 15.8 MB
猜你喜欢:
WebToolTip
Course
Cybersecurity
Udemy
Practical
Fundamentals
Hands
com
- 【影视】 Microsoft Cybersecurity Pro Track Security in Office 365
-
收录时间:2021-04-22
文档个数:91
文档大小:1.5 GB
最近下载:2025-05-15
人气:4319
磁力链接
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/2. Introduction to Security in Office 365/1. Threat Vectors and Data Breaches.mp4 185.5 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/5. Implementing auditing, insights and alerts/3. Audit Log Investigations.mp4 155.5 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/3. Implementing and Managinng Microsoft Defender for Office 365 (Office 365 ATP)/1. Introduction to Exchange Online Protection.mp4 132.0 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/6. Advanced Security Management/1. Deploy Cloud Application Security.mp4 109.2 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/5. Implementing auditing, insights and alerts/5. Managing insights and alerts in the Security & Compliance Center.mp4 101.2 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/4. Using Office 365 Threat Intelligence/3. Threat Investigation and Response.mp4 91.3 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/3. Implementing and Managinng Microsoft Defender for Office 365 (Office 365 ATP)/3. Managing Safe Attachments.mp4 90.4 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/2. Introduction to Security in Office 365/3. Introduction to Secure Score.mp4 78.1 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/3. Implementing and Managinng Microsoft Defender for Office 365 (Office 365 ATP)/4. Managing Safe Links.mp4 75.1 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/3. Implementing and Managinng Microsoft Defender for Office 365 (Office 365 ATP)/2. Overview of Microsoft Defender for Office 365 (former named Office 365 ATP).mp4 64.5 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/6. Advanced Security Management/2. Use Cloud Application Security.mp4 63.1 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/4. Using Office 365 Threat Intelligence/2. Security (Threat) Dashboard.mp4 61.0 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/3. Implementing and Managinng Microsoft Defender for Office 365 (Office 365 ATP)/5. Monitoring and Reports.mp4 56.6 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/4. Using Office 365 Threat Intelligence/1. Overview of Office 365 Threat Intelligence.mp4 53.0 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/5. Implementing auditing, insights and alerts/2. Enabling mailbox auditing in Exchange Online.mp4 44.4 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/2. Introduction to Security in Office 365/2. Security Solutions in Office 365.mp4 37.2 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/5. Implementing auditing, insights and alerts/1. Overview of auditing in the Security & Compliance Center.mp4 34.8 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/1. Introduction/2. About the Course.mp4 32.8 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/5. Implementing auditing, insights and alerts/4. Enabling sharing auditing for SharePoint and OneDrive.mp4 30.7 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/1. Introduction/3. Preparing the Lab Environment.mp4 25.1 MB
猜你喜欢:
Office
Cybersecurity
Pro
Track
Security
365
Microsoft
- 【影视】 Certified in Cybersecurity 2023 - ISC2-CC Complete Training
-
收录时间:2023-12-18
文档个数:51
文档大小:1.2 GB
最近下载:2025-05-15
人气:14622
磁力链接
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/9. Security Controls Examples.mp4 119.4 MB
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/3. Domain 2 Business Continuity (BC), Disaster Recovery (DR) & Incident Response/1. Cyber Threats.mp4 109.6 MB
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/4. Risk Analaysis.mp4 106.8 MB
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/7. Risk Monitoring.mp4 91.3 MB
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/3. Risk Management Overview.mp4 68.8 MB
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/3. Domain 2 Business Continuity (BC), Disaster Recovery (DR) & Incident Response/2. Cyber Attacks 1.mp4 67.5 MB
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/12. Governance Overview.mp4 57.5 MB
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/8. Security Controls.mp4 56.7 MB
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/2. Privacy.mp4 55.2 MB
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/6. Risk Response.mp4 52.3 MB
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/20. Laws and Regulations in Cybersecurity.mp4 46.8 MB
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/10. Defense in Depth.mp4 42.9 MB
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/14. Policies.mp4 42.3 MB
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/19. Procedures and Guidelines.mp4 38.5 MB
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/1. CIA Triad and Security Objectives.mp4 35.6 MB
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/15. Policies Examples.mp4 33.0 MB
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/5. Types of Risk.mp4 29.0 MB
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/18. Standards.mp4 27.4 MB
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/16. Acceptable use policy.mp4 22.7 MB
[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/13. Information Security Governance.mp4 18.1 MB
猜你喜欢:
Training
Complete
ISC2
Cybersecurity
CC
2023
Certified
- 【影视】 Lynda - Foundations of Cybersecurity
-
收录时间:2017-02-19
文档个数:27
文档大小:300.9 MB
最近下载:2025-05-15
人气:2960
磁力链接
021 Managing user access and identity.mp4 20.7 MB
022 Implementing preventative security.mp4 18.8 MB
023 Monitoring and alerts.mp4 15.7 MB
018 Describing security requirements.mp4 14.9 MB
008 Dissecting the payment card industry and PCI DSS.mp4 14.6 MB
007 Implementing control frameworks.mp4 14.3 MB
025 Preparing for an incident.mp4 14.2 MB
019 Architecting security risk.mp4 13.5 MB
016 Understanding advanced persistent threats (APTs).mp4 13.5 MB
004 Dissecting cyber risk.mp4 13.1 MB
003 Understanding the NIST cybersecurity framework.mp4 12.6 MB
011 Dissecting security threats.mp4 11.6 MB
026 Responding to an incident.mp4 11.5 MB
005 Unpacking COBIT 5.mp4 10.3 MB
012 Exploring cybercrime as an industry.mp4 9.9 MB
014 Using callbacks to capture keystrokes.mp4 9.8 MB
015 Hiding malware with rootkits.mp4 9.8 MB
009 Exploring the Cyber Essentials framework.mp4 9.3 MB
013 Hiding malware through cloaking and alternate data streams.mp4 9.0 MB
020 Selecting security controls.mp4 8.5 MB
猜你喜欢:
Cybersecurity
Lynda
Foundations
- 【影视】 Cybersecurity for Small and Medium Businesses - Essential Training
-
收录时间:2018-09-09
文档个数:66
文档大小:358.3 MB
最近下载:2025-05-15
人气:2022
磁力链接
2.1. The Basics/03.Why you should care.mp4 31.6 MB
1.Introduction/01.Welcome.mp4 21.9 MB
1.Introduction/02.What you should know.en.srt 1.5 kB
1.Introduction/02.What you should know.mp4 5.0 MB
2.1. The Basics/03.Why you should care.en.srt 6.7 kB
1.Introduction/01.Welcome.en.srt 2.1 kB
2.1. The Basics/04.Physical security vs. cybersecurity.en.srt 1.9 kB
2.1. The Basics/04.Physical security vs. cybersecurity.mp4 4.8 MB
2.1. The Basics/05.Anyone can improve the cybersecurity of a business.en.srt 3.4 kB
2.1. The Basics/05.Anyone can improve the cybersecurity of a business.mp4 9.1 MB
2.1. The Basics/06.What are the cybersecurity threat actions facing businesses.en.srt 4.5 kB
2.1. The Basics/06.What are the cybersecurity threat actions facing businesses.mp4 6.9 MB
2.1. The Basics/07.What are the cybersecurity threats.en.srt 6.4 kB
2.1. The Basics/07.What are the cybersecurity threats.mp4 14.6 MB
2.1. The Basics/08.A five-step process to improve cybersecurity.en.srt 3.9 kB
2.1. The Basics/08.A five-step process to improve cybersecurity.mp4 7.2 MB
3.2. Identify/09.Step #1 - Identify key assets.en.srt 3.1 kB
3.2. Identify/09.Step #1 - Identify key assets.mp4 9.5 MB
3.2. Identify/10.Inventory sheet - Data and devices.en.srt 1.9 kB
3.2. Identify/10.Inventory sheet - Data and devices.mp4 3.1 MB
猜你喜欢:
Training
Medium
Cybersecurity
Businesses
Small
Essential
- 【影视】 [ DevCourseWeb.com ] Udemy - Selection and Implementation of Cybersecurity Risks Controls
-
收录时间:2024-01-05
文档个数:36
文档大小:2.0 GB
最近下载:2025-05-15
人气:2662
磁力链接
~Get Your Files Here !/2. SECTION-2/8. 19- The role of governance in the effective selection and implementation of cybe.mp4 142.9 MB
~Get Your Files Here !/2. SECTION-2/14. 23-Selecting and implementing cybersecurity controls based on NIST CSF PT2.mp4 122.4 MB
~Get Your Files Here !/2. SECTION-2/16. 25- Measuring the effectiveness of implemented controls.mp4 117.4 MB
~Get Your Files Here !/2. SECTION-2/17. Putting it all together-The Selection and Implementation of Cyber Risks controls.mp4 115.7 MB
~Get Your Files Here !/1. Introduction/10. 9-Key considerations for the identification- selection & implementation of contr.mp4 101.8 MB
~Get Your Files Here !/1. Introduction/7. 6-Approach to Control Selection_ pt2.mp4 94.1 MB
~Get Your Files Here !/2. SECTION-2/9. 20-Why not implement frameworks that already have recommended controls.mp4 90.3 MB
~Get Your Files Here !/2. SECTION-2/15. 24-Implementation Plan for selected controls.mp4 87.1 MB
~Get Your Files Here !/2. SECTION-2/11. 21-Challenges, & considerations associated with implementing frameworks-pt2.mp4 82.9 MB
~Get Your Files Here !/1. Introduction/11. 10-Risk Assessment-BIA, Control Selection, Cost Benefit Analysis.mp4 81.1 MB
~Get Your Files Here !/1. Introduction/9. 8-Introduction to security controls.mp4 77.4 MB
~Get Your Files Here !/2. SECTION-2/7. 18-Documenting Cybersecurity Risk Assessment Report-Pt2.mp4 75.5 MB
~Get Your Files Here !/2. SECTION-2/5. 17-Determine likelihood, Impact, Calculate risk.mp4 72.4 MB
~Get Your Files Here !/2. SECTION-2/13. 23-Selecting and implementing cybersecurity controls based on NIST CSF PT1.mp4 62.9 MB
~Get Your Files Here !/1. Introduction/12. 11-Cost Benefit Analysis associated with controls selection.mp4 58.3 MB
~Get Your Files Here !/2. SECTION-2/3. 15-Steps involved in assessing the identified cyber risks in web server.mp4 55.0 MB
~Get Your Files Here !/2. SECTION-2/1. 14-High-level process of selecting controls to protect ecommerce web server-Pt1.mp4 54.5 MB
~Get Your Files Here !/1. Introduction/14. 13-Regulatory Compliance, Incident Response Planning.mp4 53.9 MB
~Get Your Files Here !/1. Introduction/13. 12- Technology integration, operational impact, continuous monitoring, employee.mp4 52.8 MB
~Get Your Files Here !/2. SECTION-2/6. 18- Documenting Cybersecurity Risk Assessment Report-Pt1.mp4 50.4 MB
猜你喜欢:
Selection
Implementation
Controls
Udemy
DevCourseWeb
Cybersecurity
Risks
com
- 【影视】 [TheArtOfHacking] Cybersecurity Video Courses Collection (2018-2020) [En]
-
收录时间:2021-03-15
文档个数:1102
文档大小:115.5 GB
最近下载:2025-05-15
人气:5916
磁力链接
TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/190 - 16.5 Exploiting SQL Injection Vulnerabilities.mp4 856.8 MB
TheArtOfHacking.org - Hacking Web Applications/00044 6.4_Exploiting_SQL_Injection_Vulnerabilities.mp4 847.3 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00155 6.4_Exploiting_SQL_Injection_Vulnerabilities.mp4 847.3 MB
TheArtOfHacking.org - Hacking Web Applications/00058 8.1_Introducing_Cryptography_Encryption_and_Hashing_Protocols.mp4 757.5 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00169 8.1_Introducing_Cryptography_Encryption_and_Hashing_Protoc 757.5 MB
TheArtOfHacking.org - Hacking Web Applications/00038 5.1_Understanding_Authentication_Schemes_in_Web_Applications_and_Related_Vulnerabilities.mp4 733.0 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00149 5.1_Understanding_Authentication_Schemes_in_Web_Applicatio 733.0 MB
TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/158 - 14.15 Understanding Authentication Schemes in Web Applications.mp4 730.3 MB
TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/008 - 2.2 Threats and Attack Vectors.mp4 681.2 MB
TheArtOfHacking.org - Hacking Web Applications/00018 3.1_Exploring_Kali_Linux.mp4 586.2 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00129 3.1_Exploring_Kali_Linux.mp4 586.2 MB
TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/140 - 13.11 Introducing the Burp Suite.mp4 568.8 MB
TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/107 - 10.10 Surveying Social Engineering Case Studies.mp4 560.2 MB
TheArtOfHacking.org - Hacking Web Applications/00034 4.8_Introducing_the_Burp_Suite.mp4 549.6 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00145 4.8_Introducing_the_Burp_Suite.mp4 549.6 MB
TheArtOfHacking.org - Hacking Web Applications/00029 4.3_Exploring_Shodan_Maltego_Recon-NG_SpiderFoot_and_TheHarvester.mp4 511.9 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00140 4.3_Exploring_Shodan_Maltego_Recon-NG_SpiderFoot_and_TheHa 511.9 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00022 3.6_Surveying_Essential_Tools_for_Passive_Reconnaissance_- 489.1 MB
TheArtOfHacking.org - Certified-Ethical-Hacker-CEH-2nd-Edition/264 - 22.5 Exploring The Android Security Model.mp4 474.0 MB
TheArtOfHacking.org - The ART Of Hacking (VIDEO COLLECTION)/00061 8.10_Hacking_the_Management_Plane.mp4 469.4 MB
猜你喜欢:
TheArtOfHacking
Cybersecurity
Collection
Courses
En
Video
2018
2020
- 【影视】 [ DevCourseWeb.com ] Udemy - Mastering Cybersecurity and Supply Chain Risk Management
-
收录时间:2024-03-23
文档个数:41
文档大小:3.6 GB
最近下载:2025-05-15
人气:1529
磁力链接
~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/7. Recover.mp4 205.3 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/4. Network Security Controls.mp4 173.8 MB
~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/5. Incident Analysis.mp4 150.0 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/1. User and Network Infrastructure.mp4 136.2 MB
~Get Your Files Here !/1. Introduction to NIST Framework/3. NIST Framework Core.mp4 130.0 MB
~Get Your Files Here !/5. Effective Supply Chain Risk Management/4. Develop, Assess and Test Supply Chain Risks.mp4 123.4 MB
~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/3. Executable Response Plan.mp4 116.0 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/9. Information Protection.mp4 115.2 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/8. Hardware Integrity.mp4 105.7 MB
~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/1. Developing a Continuity of Operations Plan.mp4 103.2 MB
~Get Your Files Here !/2. Cybersecurity Risk Planning & Management/4. Keeping Hardware Inventory Updated.mp4 102.7 MB
~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/2. Incident Response.mp4 102.1 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/7. Data Security.mp4 101.4 MB
~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/6. Mitigation.mp4 101.0 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/2. Authentication and Access Control.mp4 100.3 MB
~Get Your Files Here !/2. Cybersecurity Risk Planning & Management/7. Personnel Security Requirements.mp4 98.1 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/10. Patch Management.mp4 97.7 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/5. Association and Authentication.mp4 91.7 MB
~Get Your Files Here !/5. Effective Supply Chain Risk Management/1. Supply Chain Risk Management.mp4 90.7 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/12. Protective Technology.mp4 88.5 MB
猜你喜欢:
Management
Risk
Chain
Supply
Cybersecurity
Udemy
DevCourseWeb
Mastering
com
- 【影视】 Cybersecurity Threats Ransomware
-
收录时间:2017-04-29
文档个数:39
文档大小:405.4 MB
最近下载:2025-05-15
人气:3100
磁力链接
01. Course Overview/01. Intro.mp4 5.4 MB
02. What Is Ransomware/01. Overview.mp4 4.1 MB
02. What Is Ransomware/02. Definition and Types of Ransomware.mp4 20.3 MB
02. What Is Ransomware/03. The Ransomware Timeline.mp4 15.2 MB
02. What Is Ransomware/04. What Is Ransomware 30,000 ft. View.mp4 5.9 MB
02. What Is Ransomware/05. How Big Is the Problem.mp4 15.1 MB
02. What Is Ransomware/06. Ransomware Victims.mp4 11.7 MB
02. What Is Ransomware/07. Module Progress Checkpoint.mp4 617.9 kB
02. What Is Ransomware/08. Demo of Real World Ransomware Attack.mp4 52.0 MB
02. What Is Ransomware/09. Variations of Ransomware.mp4 6.4 MB
02. What Is Ransomware/10. Summary.mp4 2.5 MB
03. Ransomware Entry Points/01. Overview.mp4 2.7 MB
03. Ransomware Entry Points/02. The 5 Classic Infection Vectors.mp4 3.1 MB
03. Ransomware Entry Points/03. Phishing and Email Attachments.mp4 10.6 MB
03. Ransomware Entry Points/04. Embedded Hyperlinks, Websitesdownloads, and Drive-by Infections.mp4 6.2 MB
03. Ransomware Entry Points/05. Why Common Exploit Kits Are Used.mp4 5.4 MB
03. Ransomware Entry Points/06. Command and Callback (C&C) and Indicators of Compromise.mp4 7.0 MB
03. Ransomware Entry Points/07. Summary.mp4 2.8 MB
04. Incident Response Detection and Containment/01. Overview.mp4 2.6 MB
04. Incident Response Detection and Containment/02. Indicators of Compromise.mp4 5.3 MB
猜你喜欢:
Cybersecurity
Threats
Ransomware
- 【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity Threat Hunting Professional
-
收录时间:2022-03-20
文档个数:36
文档大小:1.0 GB
最近下载:2025-05-15
人气:2155
磁力链接
~Get Your Files Here !/2. Time to hunt/2. Practical Threat hunting Demo.mp4 121.9 MB
~Get Your Files Here !/2. Time to hunt/1. Case Base Threat Hunting.mp4 93.6 MB
~Get Your Files Here !/2. Time to hunt/3. Indicators of threat attacksIoC.mp4 86.1 MB
~Get Your Files Here !/1. Introduction/11. 7 Effective Threat Hunting Tips.mp4 81.5 MB
~Get Your Files Here !/1. Introduction/10. Hypothesis Testing & Sources of Hypothesis.mp4 78.6 MB
~Get Your Files Here !/4. Course Resources/1. Course Resources.mp4 72.6 MB
~Get Your Files Here !/3. Course Conclusion/1. Course Review.mp4 72.6 MB
~Get Your Files Here !/1. Introduction/8. What is Required for Successful Threat Hunting.mp4 71.2 MB
~Get Your Files Here !/1. Introduction/6. Terms associated with Threat Hunting.mp4 70.5 MB
~Get Your Files Here !/1. Introduction/4. Why threat hunt and attributes of an effective threat hunter.mp4 56.2 MB
~Get Your Files Here !/1. Introduction/9. Threat Hunting Approaches.mp4 55.0 MB
~Get Your Files Here !/1. Introduction/5. Threat Hunting Skillset Requirements.mp4 40.0 MB
~Get Your Files Here !/1. Introduction/7. Threat Hunting Loop.mp4 38.6 MB
~Get Your Files Here !/1. Introduction/2. What is Threat Hunting & Its Primary objective.mp4 35.9 MB
~Get Your Files Here !/1. Introduction/1. Introduction.mp4 29.5 MB
~Get Your Files Here !/1. Introduction/3. What is Threat Hunting & Its Primary objective..mp4 23.3 MB
~Get Your Files Here !/4. Course Resources/1.1 Network Threat Hunting with Tim Crothers.mp4 10.6 MB
~Get Your Files Here !/4. Course Resources/1.2 Resources Links for Threat Hunting Course.pdf 435.7 kB
~Get Your Files Here !/2. Time to hunt/2. Practical Threat hunting Demo.srt 11.9 kB
~Get Your Files Here !/2. Time to hunt/3. Indicators of threat attacksIoC.srt 8.3 kB
猜你喜欢:
Hunting
Cybersecurity
Udemy
DevCourseWeb
Threat
Professional
com
- 【影视】 [FreeCoursesOnline.Me] [Packtpub.Com] Cybersecurity - Methods of Protection (Blue Team Activity) - [FCO]
-
收录时间:2018-11-13
文档个数:35
文档大小:1.3 GB
最近下载:2025-05-15
人气:1742
磁力链接
01.Securing Your Network/0101.The Course Overview.mp4 22.8 MB
01.Securing Your Network/0102.Understanding Firewalls and Tuning Them Up.mp4 28.7 MB
01.Securing Your Network/0103.How to Work with IDSIPS.mp4 24.0 MB
01.Securing Your Network/0104.Securing Your Wi-Fi Network.mp4 90.9 MB
01.Securing Your Network/0105.Ferreting out a Hacker by IP.mp4 101.3 MB
01.Securing Your Network/0106.Analyzing Traffic Wireshark.mp4 25.3 MB
01.Securing Your Network/0107.The Fastest Way to Detect ARP Poisoning Attack.mp4 21.8 MB
01.Securing Your Network/0108.Analyzing Your Traffic to Catch a Spy with Wireshark.mp4 35.4 MB
01.Securing Your Network/0109.Looking for Spies with a Python Script.mp4 50.2 MB
01.Securing Your Network/0110.How to Outfox Ransomware.mp4 28.9 MB
01.Securing Your Network/0111.Advanced-level Techniques What to Do If Hackers Already in Your Network.mp4 40.3 MB
02.Securing Your Website/0201.Brute-Forcing Website Passwords with OWASP ZAP.mp4 45.6 MB
02.Securing Your Website/0202.How to Create a Bulletproof Password in a Second.mp4 68.9 MB
02.Securing Your Website/0203.Testing a Website for SQL Injection with Burp Suite.mp4 30.9 MB
02.Securing Your Website/0204.Testing a Website for XSS Vulnerability.mp4 29.8 MB
02.Securing Your Website/0205.Building Fortifications – Input Validation and Whitelisting.mp4 99.3 MB
02.Securing Your Website/0206.Testing Your SSLTLS Connection.mp4 21.2 MB
02.Securing Your Website/0207.Scanning Your Website for Malicious Scripts.mp4 91.1 MB
02.Securing Your Website/0208.Protecting from a Session Hijacking Attack.mp4 27.7 MB
02.Securing Your Website/0209.The Big Strategy – Three Shortcuts to Secure a Web Application.mp4 68.6 MB
猜你喜欢:
FreeCoursesOnline
Me
Methods
Cybersecurity
Activity
Packtpub
Protection
Blue
Team
Com
- 【影视】 [Udemy] Real-World Ethical Hacking Hands-on Cybersecurity (2021) [En]
-
收录时间:2022-01-09
文档个数:194
文档大小:8.1 GB
最近下载:2025-05-15
人气:4571
磁力链接
14. Bonus Videos National Cyber Warrior Academy, Interviews and More/3. NCWA 2017 Facebook Live Video on Car Hacking and Drone Programming.mp4 947.8 MB
9. BONUS Section Car Hacking in Kali Linux!/9. Car Hacking LIVE on Dr. Payne's VW Jetta Facebook Live Video from NCWA 2017.mp4 347.6 MB
14. Bonus Videos National Cyber Warrior Academy, Interviews and More/5. Dr. Payne's TEDx Talk on Coding and Cyber as the New Literacy.mp4 320.6 MB
5. Social Engineering Capturing Usernames and Passwords via Phishing/3. Cloning Facebook and Harvesting User Passwords.mp4 265.0 MB
1. Real-World Ethical Hacking 1 Hacking Windows!/10. BONUS Mac Root Hack!.mp4 233.2 MB
3. Important Linux and Windows Terminal Commands/2. Basic Linux Commands.mp4 195.0 MB
13. Mobile Hacking on Android/2. Creating the Meterpreter Payload for Android.mp4 175.7 MB
3. Important Linux and Windows Terminal Commands/4. More Helpful Linux Commands.mp4 170.6 MB
4. Create a Virtual Network for Ethical Hacking!/3. Connecting Your VMs to the Host-Only Network.mp4 148.8 MB
8. Hacking Win10 Command & Control Phase/4. Stealing Screenshots, Keystrokes, and ,Webcams.mp4 145.4 MB
10. BONUS Hacking Windows 7 with Metasploit!/4. Creating an Exploit Payload with Metasploit.mp4 144.4 MB
2. Create Your Own Virtual Hacking Lab!/4. Create an Android PhoneTablet VM for Mobile Hacking!.mp4 142.1 MB
13. Mobile Hacking on Android/4. Advanced Android Exploits Accessing Storage, Downloading and Uploading Files.mp4 139.2 MB
9. BONUS Section Car Hacking in Kali Linux!/8. BONUS Hacking the Car Hacking Software, to 1000 mph!.mp4 125.2 MB
5. Social Engineering Capturing Usernames and Passwords via Phishing/7. Capturing the User's Login and Password in Kali.mp4 116.7 MB
9. BONUS Section Car Hacking in Kali Linux!/5. The Replay Attack Replaying CAN Packets with CANplayer.mp4 116.0 MB
11. Password Problems - Everybody's Got 'Em Hacking, Cracking, Snacking & Hijacking/3. Sniffing the Network Installing Wireshark.mp4 114.3 MB
4. Create a Virtual Network for Ethical Hacking!/5. Updating Kali and Windows VMs.mp4 112.5 MB
4. Create a Virtual Network for Ethical Hacking!/4. Creating and Using a Public NAT Network in VBox.mp4 112.5 MB
11. Password Problems - Everybody's Got 'Em Hacking, Cracking, Snacking & Hijacking/6. Seven Things You Can Do for Safer Passwords.mp4 111.1 MB
猜你喜欢:
Real
Ethical
En
Cybersecurity
Udemy
2021
Hands
World
Hacking
- 【影视】 [ DevCourseWeb.com ] China's Cybersecurity and Privacy Regulations - Essential Training
-
收录时间:2024-09-02
文档个数:49
文档大小:237.4 MB
最近下载:2025-05-15
人气:431
磁力链接
~Get Your Files Here !/05 - 4.Personal Information Protection Law/01 - Personal Information Protection Law breakdown.mp4 29.7 MB
~Get Your Files Here !/05 - 4.Personal Information Protection Law/02 - Legal basis and consent.mp4 16.8 MB
~Get Your Files Here !/05 - 4.Personal Information Protection Law/04 - Personal information handler obligations.mp4 15.5 MB
~Get Your Files Here !/05 - 4.Personal Information Protection Law/05 - Cross-border data transfer and updates to the regulation.mp4 15.2 MB
~Get Your Files Here !/03 - 2. Cybersecurity Law/01 - Cybersecurity Law breakdown.mp4 13.6 MB
~Get Your Files Here !/05 - 4.Personal Information Protection Law/03 - Data subject rights.mp4 13.3 MB
~Get Your Files Here !/03 - 2. Cybersecurity Law/02 - Multilevel protection scheme.mp4 13.2 MB
~Get Your Files Here !/04 - 3. Data Security Law/01 - Data Security Law breakdown.mp4 12.8 MB
~Get Your Files Here !/03 - 2. Cybersecurity Law/03 - Multilevel protection scheme technical components.mp4 10.7 MB
~Get Your Files Here !/02 - 1. China Regulation Basics/02 - Scope.mp4 10.7 MB
~Get Your Files Here !/02 - 1. China Regulation Basics/03 - Important dates.mp4 10.6 MB
~Get Your Files Here !/06 - 5. Real-World Guidance/02 - Enforcement action examples.mp4 10.2 MB
~Get Your Files Here !/04 - 3. Data Security Law/03 - Key provisions of the Data Security Law.mp4 9.7 MB
~Get Your Files Here !/04 - 3. Data Security Law/02 - Data classification and cross-border transfer guidelines.mp4 8.6 MB
~Get Your Files Here !/01 - Introduction/03 - Definitions.mp4 7.3 MB
~Get Your Files Here !/07 - Conclusion/02 - Additional resources.mp4 6.8 MB
~Get Your Files Here !/02 - 1. China Regulation Basics/01 - Overview of the recent cybersecurity and privacy regulations.mp4 6.7 MB
~Get Your Files Here !/07 - Conclusion/01 - How to get started.mp4 6.5 MB
~Get Your Files Here !/06 - 5. Real-World Guidance/01 - Successful certification examples.mp4 6.0 MB
~Get Your Files Here !/01 - Introduction/01 - Cybersecurity and privacy regulation in China.mp4 4.7 MB
猜你喜欢:
Regulations
Training
Privacy
Cybersecurity
DevCourseWeb
China
com
Essential
- 【影视】 [FreeCoursesOnline.Me] PacktPub - Cybersecurity Attacks (Red Team Activity) [Video]
-
收录时间:2021-04-18
文档个数:41
文档大小:1.1 GB
最近下载:2025-05-15
人气:4978
磁力链接
1 - Building Our Lab/Getting Acquainted with Kali Linux Easy Way.mp4 121.1 MB
1 - Building Our Lab/Getting Acquainted with Terminal Commands.mp4 105.8 MB
4 - Breaking the Human in a Cyber Crime Attack/Playing on Human Emotions and Weaknesses to Get the Information.mp4 76.7 MB
2 - Attacking a Network/Taking Control Over Target Browser with BeEf.mp4 46.7 MB
2 - Attacking a Network/Creating Reverse Shell with Metasploit.mp4 42.0 MB
4 - Breaking the Human in a Cyber Crime Attack/Social Engineering Techniques.mp4 41.3 MB
3 - Website and Web-Application Attacks#/Proxy Attack with Burp Suite.mp4 38.5 MB
2 - Attacking a Network/Hidden Scanning Ports with Nmap.mp4 37.1 MB
1 - Building Our Lab/Installing Metasploitable 2 on Virtual Machine.mp4 34.5 MB
3 - Website and Web-Application Attacks#/Manual Testing for SQL Injection.mp4 34.3 MB
3 - Website and Web-Application Attacks#/Executing a Session Hijacking.mp4 32.0 MB
4 - Breaking the Human in a Cyber Crime Attack/How to Hack Without Getting in Touch with a Target.mp4 30.3 MB
3 - Website and Web-Application Attacks#/Exploring Target with Browser.mp4 28.8 MB
4 - Breaking the Human in a Cyber Crime Attack/Making a Phishing Email with SET.mp4 28.4 MB
1 - Building Our Lab/The Course Overview.mp4 27.1 MB
2 - Attacking a Network/Advance-Level Hacking - Scanning Hosts with Python Script.mp4 27.0 MB
2 - Attacking a Network/Intercepting Traffic with Wireshark.mp4 26.9 MB
3 - Website and Web-Application Attacks#/Infecting Website with Stored XSS.mp4 26.7 MB
4 - Breaking the Human in a Cyber Crime Attack/Looking for Secrets in Social Media with Online Tools.mp4 26.1 MB
3 - Website and Web-Application Attacks#/Scanning Web-Application with OWASP ZAP.mp4 25.5 MB
猜你喜欢:
FreeCoursesOnline
Me
Attacks
Activity
Cybersecurity
PacktPub
Video
Team
Red
- 【影视】 CompTIA CySA+ Cybersecurity Analyst (CS0-003)
-
收录时间:2024-09-27
文档个数:179
文档大小:4.4 GB
最近下载:2025-05-15
人气:4800
磁力链接
Chapter 06 Techniques for Malicious Activity Analysis/003. A Day in the Life of a Cybersecurity Analyst.mp4 157.6 MB
Chapter 10 Vulnerability Scanning Methods and Concepts/002. Industry Frameworks.mp4 149.6 MB
Chapter 10 Vulnerability Scanning Methods and Concepts/001. Asset Discovery.mp4 133.9 MB
Chapter 01 About the CySA Exam/003. How to Take Your CompTIA CySA+ Exam.mp4 125.1 MB
Chapter 02 System and Network Architectures/002. Operating System Concepts.mp4 108.3 MB
Chapter 02 System and Network Architectures/001. Logging.mp4 104.1 MB
Chapter 09 Applying Threat Intelligence in Support of Organizational Security/002. Threat Modeling.mp4 97.3 MB
Chapter 06 Techniques for Malicious Activity Analysis/002. Log Analysis (SIEM and SOAR).mp4 94.0 MB
Chapter 06 Techniques for Malicious Activity Analysis/005. File Analysis.mp4 85.6 MB
Chapter 05 Analyzing Potentially Malicious Activity/003. Application Symptoms.mp4 75.8 MB
Chapter 03 Threat Intelligence in Support of Organizational Security/001. Standardized Processes.mp4 70.1 MB
Chapter 16 Post-Incident Response Activities/002. Reporting and Communication.mp4 69.7 MB
Chapter 14 Vulnerability Handling and Response/009. Vulnerability Management.mp4 68.7 MB
Chapter 10 Vulnerability Scanning Methods and Concepts/004. Vulnerability Identification and Scanning.mp4 68.4 MB
Chapter 08 Fundamentals of Threat Intelligence/002. Supply, TTP, and Intelligence.mp4 68.1 MB
Chapter 09 Applying Threat Intelligence in Support of Organizational Security/005. Integrating Vulnerability Management with Threat Hunting.mp4 68.1 MB
Chapter 14 Vulnerability Handling and Response/012. Inhibitors to Remediation.mp4 67.9 MB
Chapter 05 Analyzing Potentially Malicious Activity/001. Network Symptoms.mp4 66.7 MB
Chapter 09 Applying Threat Intelligence in Support of Organizational Security/004. Threat Hunting.mp4 64.1 MB
Chapter 10 Vulnerability Scanning Methods and Concepts/003. Critical Infrastructure.mp4 63.2 MB
猜你喜欢:
Cybersecurity
CySA
CS0
003
CompTIA
Analyst
- 【影视】 [ DevCourseWeb.com ] Udemy - Python for Cybersecurity
-
收录时间:2023-12-17
文档个数:73
文档大小:1.3 GB
最近下载:2025-05-15
人气:4217
磁力链接
~Get Your Files Here !/6. Sockets/7. Part 3 - Sending, Receiving, and Closing the Connection.mp4 179.3 MB
~Get Your Files Here !/4. Object Oriented Programming/2. Creating Our First Object.mp4 97.9 MB
~Get Your Files Here !/6. Sockets/5. Part 1 - Socket, Bind, Listen Accept.mp4 81.1 MB
~Get Your Files Here !/6. Sockets/6. Part 2 - Socket, Connect.mp4 74.5 MB
~Get Your Files Here !/6. Sockets/4. Why Encode.mp4 71.2 MB
~Get Your Files Here !/6. Sockets/3. How Sockets Will Work.mp4 68.7 MB
~Get Your Files Here !/3. The Fundamentals/6. If Statements.mp4 64.8 MB
~Get Your Files Here !/5. Let's Make API Requests/5. Consuming an API - Complex.mp4 62.7 MB
~Get Your Files Here !/3. The Fundamentals/12. Dictionaries.mp4 51.7 MB
~Get Your Files Here !/3. The Fundamentals/13. Functions.mp4 49.3 MB
~Get Your Files Here !/3. The Fundamentals/3. Variables.mp4 42.2 MB
~Get Your Files Here !/3. The Fundamentals/7. Error Handling Part 1.mp4 40.5 MB
~Get Your Files Here !/2. Environment Setup/2. Installing VS Code and Extensions.mp4 37.6 MB
~Get Your Files Here !/6. Sockets/2. What is a Socket.mp4 35.1 MB
~Get Your Files Here !/3. The Fundamentals/11. Lists.mp4 35.1 MB
~Get Your Files Here !/3. The Fundamentals/4. f Strings.mp4 32.8 MB
~Get Your Files Here !/4. Object Oriented Programming/3. Importing Packages.mp4 31.4 MB
~Get Your Files Here !/1. Getting Started/1. IMPORTANT!!!.mp4 30.9 MB
~Get Your Files Here !/5. Let's Make API Requests/4. Consuming an API - Simple.mp4 26.2 MB
~Get Your Files Here !/3. The Fundamentals/8. While Loop.mp4 21.6 MB
猜你喜欢:
DevCourseWeb
Python
Cybersecurity
com
Udemy
- 【影视】 Pluralsight Cybersecurity Threats Ransomware
-
收录时间:2017-05-13
文档个数:38
文档大小:388.1 MB
最近下载:2025-05-15
人气:1701
磁力链接
1. Course Overview/01. Course Overview.mp4 5.4 MB
2. What Is Ransomware/09. Demo of Real World Ransomware Attack.mp4 52.0 MB
2. What Is Ransomware/03. Definition and Types of Ransomware.mp4 20.3 MB
2. What Is Ransomware/04. The Ransomware Timeline.mp4 15.2 MB
2. What Is Ransomware/06. How Big Is the Problem.mp4 15.1 MB
2. What Is Ransomware/07. Ransomware Victims.mp4 11.7 MB
2. What Is Ransomware/10. Variations of Ransomware.mp4 6.4 MB
2. What Is Ransomware/05. What Is Ransomware 30,000 ft. View.mp4 5.9 MB
2. What Is Ransomware/02. Overview.mp4 4.1 MB
2. What Is Ransomware/11. Summary.mp4 2.5 MB
2. What Is Ransomware/08. Module Progress Checkpoint.mp4 617.9 kB
3. Ransomware Entry Points/14. Phishing and Email Attachments.mp4 10.6 MB
3. Ransomware Entry Points/17. Command and Callback (C&C) and Indicators of Compromise.mp4 7.0 MB
3. Ransomware Entry Points/15. Embedded Hyperlinks, Websites_downloads, and Drive-by Infections.mp4 6.2 MB
3. Ransomware Entry Points/16. Why Common Exploit Kits Are Used.mp4 5.4 MB
3. Ransomware Entry Points/13. The 5 Classic Infection Vectors.mp4 3.1 MB
3. Ransomware Entry Points/18. Summary.mp4 2.8 MB
3. Ransomware Entry Points/12. Overview.mp4 2.7 MB
4. Incident Response - Detection and Containment/22. Containing the Attack.mp4 9.0 MB
4. Incident Response - Detection and Containment/21. Detecting an Attack.mp4 7.3 MB
猜你喜欢:
Cybersecurity
Pluralsight
Threats
Ransomware
- 【影视】 [FreeCoursesOnline.Me] O`REILLY - The Complete Cybersecurity Bootcamp, 2nd Edition
-
收录时间:2023-12-27
文档个数:340
文档大小:6.7 GB
最近下载:2025-05-15
人气:10000
磁力链接
Lesson 29 Hacking Mobile Platforms/003. 29.2 Hacking iOS.mp4 86.6 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/014. 17.13 Performing SMTP and DNS Enumeration.mp4 80.0 MB
Lesson 21 Fundamentals of Wireless Hacking/004. 21.3 Exploring Wireless Threats.mp4 79.0 MB
Lesson 33 Fundamentals of IoT Security/003. 33.2 Understanding IoT Attacks.mp4 76.8 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/015. 17.14 Conducting Additional Enumeration Techniques.mp4 75.8 MB
Lesson 33 Fundamentals of IoT Security/002. 33.1 Introducing IoT Concepts.mp4 74.4 MB
Lesson 29 Hacking Mobile Platforms/002. 29.1 Understanding Mobile Platform Attack Vectors.mp4 73.4 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/011. 17.1 Performing SNMP Enumeration.mp4 71.8 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/004. 17.3 Understanding Host Discovery.mp4 69.7 MB
Lesson 5 Fundamentals of Incident Response/007. 5.6 Analyzing Computer Incident Response Teams (CSIRTs).mp4 68.5 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/007. 17.6 Scanning Beyond IDS and Firewall.mp4 68.2 MB
Lesson 27 Hacking User Credentials/006. 27.5 Cracking Passwords with John the Ripper.mp4 66.1 MB
Lesson 7 Intrusion Event Categories/009. 7.8 Understanding the MITRE ATT&CK Framework.mp4 65.8 MB
Lesson 29 Hacking Mobile Platforms/004. 29.3 Hacking Android OS.mp4 63.8 MB
Lesson 20 SQL Injection/005. 20.4 Exploring SQL Injection Tools.mp4 63.3 MB
Lesson 21 Fundamentals of Wireless Hacking/003. 21.2 Understanding Wireless Encryption.mp4 62.7 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/013. 17.12 Performing NTP and NFS Enumeration.mp4 61.8 MB
Lesson 16 Information Gathering and Passive Reconnaissance/011. 16.10 Performing Footprinting through Social Engineering.mp4 59.1 MB
Lesson 8 Digital Forensics Fundamentals/004. 8.3 Understanding Evidence Collection.mp4 57.2 MB
Lesson 21 Fundamentals of Wireless Hacking/007. 21.6 Hacking Bluetooth.mp4 52.3 MB
猜你喜欢:
FreeCoursesOnline
Me
Complete
Cybersecurity
Bootcamp
Edition
REILLY
2nd
- 【影视】 [ DevCourseWeb.com ] Udemy - Ultimate Cybersecurity - Uncovering Hacker Strategies
-
收录时间:2023-12-20
文档个数:64
文档大小:3.4 GB
最近下载:2025-05-15
人气:4969
磁力链接
~Get Your Files Here !/8 - Conclusion/56 - 82 Staying Informed and UptoDate.mp4 99.4 MB
~Get Your Files Here !/8 - Conclusion/57 - 83 Next Steps for Advancing Your Cybersecurity Knowledge.mp4 91.7 MB
~Get Your Files Here !/6 - Cybersecurity Laws Regulations and Compliance/40 - Cybersecurity Laws Regulations and Compliance Video.mp4 84.9 MB
~Get Your Files Here !/4 - Cybersecurity Best Practices/33 - 452 Intrusion Detection and Prevention Systems IDPS.mp4 82.9 MB
~Get Your Files Here !/6 - Cybersecurity Laws Regulations and Compliance/42 - 62 Compliance with Industry Standards.mp4 82.9 MB
~Get Your Files Here !/7 - Cybersecurity Tools and Resources/52 - 73 Monitoring and Logging Tools.mp4 81.4 MB
~Get Your Files Here !/4 - Cybersecurity Best Practices/34 - 453 Virtual Private Networks VPNs.mp4 80.2 MB
~Get Your Files Here !/5 - Incident Response and Recovery/37 - 52 Identifying and Analyzing Security Incidents.mp4 80.2 MB
~Get Your Files Here !/4 - Cybersecurity Best Practices/32 - 451 Firewalls.mp4 80.1 MB
~Get Your Files Here !/5 - Incident Response and Recovery/35 - Incident Response and Recovery Video.mp4 79.6 MB
~Get Your Files Here !/6 - Cybersecurity Laws Regulations and Compliance/46 - 63 Cybersecurity Frameworks.mp4 79.3 MB
~Get Your Files Here !/7 - Cybersecurity Tools and Resources/50 - 71 Security Assessment and Testing Tools.mp4 79.1 MB
~Get Your Files Here !/7 - Cybersecurity Tools and Resources/49 - Cybersecurity Tools and Resources Video.mp4 79.1 MB
~Get Your Files Here !/7 - Cybersecurity Tools and Resources/51 - 72 OpenSource Security Tools.mp4 78.3 MB
~Get Your Files Here !/8 - Conclusion/55 - 81 Course Summary.mp4 78.1 MB
~Get Your Files Here !/4 - Cybersecurity Best Practices/31 - 45 Network Security Measures.mp4 77.8 MB
~Get Your Files Here !/6 - Cybersecurity Laws Regulations and Compliance/41 - 61 Understanding Data Privacy Laws.mp4 77.5 MB
~Get Your Files Here !/4 - Cybersecurity Best Practices/30 - 44 Data Encryption and Secure Communication.mp4 77.1 MB
~Get Your Files Here !/8 - Conclusion/54 - Conclusion Video.mp4 77.0 MB
~Get Your Files Here !/4 - Cybersecurity Best Practices/29 - 43 MultiFactor Authentication MFA.mp4 71.9 MB
猜你喜欢:
Hacker
Cybersecurity
Udemy
DevCourseWeb
Uncovering
Ultimate
Strategies
com