为您索检到186条磁力链接,耗时0毫秒。
- 【影视】 Lynda - Foundations of Cybersecurity
-
收录时间:2017-02-08
文档个数:27
文档大小:300.9 MB
最近下载:2025-05-15
人气:1909
磁力链接
01. Introduction/01_01-Welcome.mp4 6.5 MB
01. Introduction/01_02-What you should know.mp4 2.0 MB
02. Cybersecurity Foundations/02_01-Understanding the NIST cybersecurity framework.mp4 12.6 MB
02. Cybersecurity Foundations/02_02-Dissecting cyber risk.mp4 13.1 MB
02. Cybersecurity Foundations/02_03-Unpacking COBIT 5.mp4 10.3 MB
02. Cybersecurity Foundations/02_04-Looking closer at DSS05.mp4 8.1 MB
02. Cybersecurity Foundations/02_05-Implementing control frameworks.mp4 14.3 MB
02. Cybersecurity Foundations/02_06-Dissecting the payment card industry and PCI DSS.mp4 14.6 MB
02. Cybersecurity Foundations/02_07-Exploring the Cyber Essentials framework.mp4 9.3 MB
03. Cybersecurity Threats/03_01-Breaking down the cybersecurity kill chain.mp4 8.1 MB
03. Cybersecurity Threats/03_02-Dissecting security threats.mp4 11.6 MB
03. Cybersecurity Threats/03_03-Exploring cybercrime as an industry.mp4 9.9 MB
03. Cybersecurity Threats/03_04-Hiding malware through cloaking and alternate data streams.mp4 9.0 MB
03. Cybersecurity Threats/03_05-Using callbacks to capture keystrokes.mp4 9.8 MB
03. Cybersecurity Threats/03_06-Hiding malware with rootkits.mp4 9.8 MB
03. Cybersecurity Threats/03_07-Understanding advanced persistent threats APTs.mp4 13.5 MB
03. Cybersecurity Threats/03_08-Exploring ransomware.mp4 8.4 MB
04. Security Architecture/04_01-Describing security requirements.mp4 14.9 MB
04. Security Architecture/04_02-Architecting security risk.mp4 13.5 MB
04. Security Architecture/04_03-Selecting security controls.mp4 8.5 MB
猜你喜欢:
Cybersecurity
Lynda
Foundations
- 【影视】 Lynda - Cybersecurity with Cloud Computing
-
收录时间:2017-07-16
文档个数:39
文档大小:371.6 MB
最近下载:2025-05-15
人气:3619
磁力链接
00. Introduction/00_01 - Welcome.mp4 17.4 MB
00. Introduction/00_02 - What you should know.mp4 861.2 kB
00. Introduction/00_03 - Reference sites.mp4 16.6 MB
00. Introduction/00_04 - Using the exercise files.mp4 278.9 kB
01. Cloud Fundamentals/01_01 - Defining the essential characteristics of cloud.mp4 15.8 MB
01. Cloud Fundamentals/01_02 - Understanding infrastructure as a service.mp4 11.9 MB
01. Cloud Fundamentals/01_03 - Unraveling platform as a service.mp4 6.8 MB
01. Cloud Fundamentals/01_04 - Comprehending software as a service.mp4 8.6 MB
01. Cloud Fundamentals/01_05 - Discovering deployment models.mp4 11.4 MB
01. Cloud Fundamentals/01_06 - Identifying cloud incidents.mp4 15.2 MB
01. Cloud Fundamentals/01_07 - Dissecting the anatomy of a service failure.mp4 8.8 MB
01. Cloud Fundamentals/01_08 - Deciphering the anatomy of a business failure.mp4 8.3 MB
01. Cloud Fundamentals/01_09 - Defining trust models for cloud.mp4 14.0 MB
02. Cloud Security Guidance/02_01 - Identifying governance and risk.mp4 5.5 MB
02. Cloud Security Guidance/02_02 - Complying with legal and audit requrements.mp4 13.1 MB
02. Cloud Security Guidance/02_03 - Managing information and data security.mp4 15.6 MB
02. Cloud Security Guidance/02_04 - Providing portability and interoperability.mp4 7.5 MB
02. Cloud Security Guidance/02_05 - Comparing traditional IT, BCP, and DR.mp4 12.0 MB
02. Cloud Security Guidance/02_06 - Understanding data center operations.mp4 5.4 MB
02. Cloud Security Guidance/02_07 - Managing incident response.mp4 12.9 MB
猜你喜欢:
Cybersecurity
Lynda
Cloud
Computing
- 【影视】 [FreeCoursesOnline.Me] Lynda - Risk Management for IT and Cybersecurity Managers
-
收录时间:2021-03-08
文档个数:22
文档大小:509.8 MB
最近下载:2025-05-15
人气:5237
磁力链接
02 What Is Risk_/002 Types of risk.mp4 77.3 MB
01 Introduction/001 Risk management for IT and security managers.mp4 71.2 MB
04 Calculating Risk/003 Quantitative risk measurement.mp4 45.5 MB
02 What Is Risk_/001 What is risk_.mp4 41.2 MB
04 Calculating Risk/004 Case study_ Equifax.mp4 33.7 MB
02 What Is Risk_/003 Types of threats.mp4 30.6 MB
04 Calculating Risk/002 Qualitative risk measurement.mp4 29.9 MB
03 What Can You Do with Risk_/007 Risk responses.mp4 25.1 MB
03 What Can You Do with Risk_/006 Risk controls.mp4 24.4 MB
03 What Can You Do with Risk_/002 Risk mitigation.mp4 23.5 MB
02 What Is Risk_/004 When risk management fails.mp4 21.4 MB
03 What Can You Do with Risk_/005 Risk acceptance.mp4 20.3 MB
04 Calculating Risk/001 Calculating risk.mp4 17.8 MB
03 What Can You Do with Risk_/004 Risk avoidance.mp4 15.3 MB
03 What Can You Do with Risk_/003 Risk transference.mp4 14.1 MB
05 Conclusion/001 Next steps.mp4 10.5 MB
03 What Can You Do with Risk_/001 What can you do with risk_.mp4 7.1 MB
Ex_Files_Risk_Management_IT_Cybersecurity.zip 705.0 kB
0. Websites you may like/0. (1Hack.Us) Premium Tutorials-Guides-Articles _ Community based Forum.url 377 Bytes
0. Websites you may like/1. (FreeCoursesOnline.Me) Download Udacity, Masterclass, Lynda, PHLearn, Pluralsight Free.url 286 Bytes
猜你喜欢:
FreeCoursesOnline
Me
Management
Managers
Risk
Cybersecurity
Lynda
- 【影视】 [ FreeCourseWeb.com ] Udemy - Cybersecurity For Beginners - Network Devices
-
收录时间:2022-01-31
文档个数:79
文档大小:980.5 MB
最近下载:2025-05-15
人气:1051
磁力链接
~Get Your Files Here !/12. Lab Demonstration - Scanning Networks with NMAP/1. Lab Demonstration - Scanning Networks with NMAP Pt. 1.mp4 477.1 MB
~Get Your Files Here !/12. Lab Demonstration - Scanning Networks with NMAP/2. Lab Demonstration - Scanning Networks with NMAP Pt. 2.mp4 331.7 MB
~Get Your Files Here !/6. Denial-of-Service Attack (DoS) Attack/2. The 5 Principal Differences Between DoS & DDoS Attacks.mp4 14.1 MB
~Get Your Files Here !/6. Denial-of-Service Attack (DoS) Attack/6. Common DoS Attack Pt. 2.mp4 9.8 MB
~Get Your Files Here !/2. Network Devices/1. Common Network Devices.mp4 8.9 MB
~Get Your Files Here !/1. The OSI Model/1. The OSI Model.mp4 7.8 MB
~Get Your Files Here !/6. Denial-of-Service Attack (DoS) Attack/5. Common DoS Attack Pt. 1.mp4 6.9 MB
~Get Your Files Here !/9. DNS Attacks/1. DNS Attacks.mp4 6.4 MB
~Get Your Files Here !/2. Network Devices/2. More Common Network Devices.mp4 6.2 MB
~Get Your Files Here !/6. Denial-of-Service Attack (DoS) Attack/1. DoS Vs. DDoS.mp4 6.0 MB
~Get Your Files Here !/1. The OSI Model/3. Data Link Layer.mp4 5.7 MB
~Get Your Files Here !/5. Intrusion Detection Systems (IDS) & Intrusion Prevention Systems (IPS)/2. Behavior Based IDS Vs. Knowledge Based IDS.mp4 5.5 MB
~Get Your Files Here !/10. Footprinting/3. Footprinting Helps To.mp4 5.4 MB
~Get Your Files Here !/10. Footprinting/4. Footprinting Methodology.mp4 5.4 MB
~Get Your Files Here !/6. Denial-of-Service Attack (DoS) Attack/7. Three-Way-Handshake Importance To Network Attacks (SYN Flood).mp4 5.2 MB
~Get Your Files Here !/4. Types of Firewalls/2. Types of Firewalls Pt. 2.mp4 5.1 MB
~Get Your Files Here !/1. The OSI Model/2. Physical Layer.mp4 4.8 MB
~Get Your Files Here !/4. Types of Firewalls/1. Types of Firewalls Pt. 1.mp4 4.6 MB
~Get Your Files Here !/1. The OSI Model/4. Network Layer.mp4 4.5 MB
~Get Your Files Here !/3. LAN & WAN Technologies/1. LAN & WAN Technologies.mp4 4.2 MB
猜你喜欢:
Network
Cybersecurity
Devices
Udemy
Beginners
FreeCourseWeb
com
- 【影视】 Cybersecurity Basics Securing your life in the digital age
-
收录时间:2021-03-08
文档个数:107
文档大小:718.3 MB
最近下载:2025-05-15
人气:1559
磁力链接
Course/8. Email/2. Creating your email.mp4 58.6 MB
Course/5. Securing your computer/1. The basics of securing your computer.mp4 46.3 MB
Course/4. Securing your Phone/4. Walkthrough Steps to take when downloading an app.mp4 41.6 MB
Course/7. Surfing the Internet Securely/2. Google, Search, and Cookies.mp4 34.8 MB
Course/5. Securing your computer/4. Non-obvious basic essentials for securing your computer.mp4 34.0 MB
Course/6. Password and Accounts/4. Security questions & Birthday for your accounts.mp4 33.8 MB
Course/7. Surfing the Internet Securely/3. Drive by downloads, HTTPs, and Internet Trackers.mp4 31.7 MB
Course/4. Securing your Phone/9. Phishing attacks on your phone.mp4 29.3 MB
Course/8. Email/4. Email activity.mp4 28.6 MB
Course/5. Securing your computer/3. Protecting your home internet.mp4 26.0 MB
Course/7. Surfing the Internet Securely/5. Google Maps and Child Filters.mp4 25.6 MB
Course/3. Cyber Attacks/2. PhishingWhaling.mp4 24.6 MB
Course/3. Cyber Attacks/4. Ransomware.mp4 24.0 MB
Course/6. Password and Accounts/1. Rules for creating passwords.mp4 23.8 MB
Course/4. Securing your Phone/3. Downloading Apps.mp4 23.2 MB
Course/2. Mindset of Cybersecurity Professional/3. Convenience vs Friction.mp4 22.5 MB
Course/2. Mindset of Cybersecurity Professional/5. Classifying your data.mp4 22.3 MB
Course/4. Securing your Phone/7. Mobile Carrier Security.mp4 21.9 MB
Course/4. Securing your Phone/6. Two Factor Authentication.mp4 19.2 MB
Course/1. Introduction/1. Introduction - Getting Startaed.mp4 18.4 MB
猜你喜欢:
life
Basics
Securing
Cybersecurity
age
digital
your
- 【影视】 [ FreeCourseWeb.com ] Udemy - Cybersecurity defenses with GenAI
-
收录时间:2025-05-07
文档个数:96
文档大小:856.1 MB
最近下载:2025-05-15
人气:284
磁力链接
~Get Your Files Here !/2 - Introduction to GenAI in Cybersecurity/3 -Key differences between traditional AI and GenAI.mp4 64.1 MB
~Get Your Files Here !/3 - Understanding Microsoft Security Copilot/2 -How Security Copilot works.mp4 41.4 MB
~Get Your Files Here !/1 - Introduction/1 -About course.mp4 36.3 MB
~Get Your Files Here !/3 - Understanding Microsoft Security Copilot/7 -Demo - Option 2 - Configure Microsoft Security Copilot.mp4 29.6 MB
~Get Your Files Here !/3 - Understanding Microsoft Security Copilot/4 -Integration with Microsoft Defender XDR & Sentinel.mp4 28.7 MB
~Get Your Files Here !/3 - Understanding Microsoft Security Copilot/1 -Architecture & Components.mp4 24.9 MB
~Get Your Files Here !/1 - Introduction/3 -Additional courses that can help you.mp4 22.8 MB
~Get Your Files Here !/6 - GenAI for Proactive Threat Hunting/2 -Creating Hunting Queries Using Natural Language.mp4 22.2 MB
~Get Your Files Here !/9 - Building an AI-Powered Security Strategy/1 -Future-Ready AI-Driven SOC Vision.mp4 21.5 MB
~Get Your Files Here !/2 - Introduction to GenAI in Cybersecurity/2 -Evolution of AI in Cybersecurity.mp4 21.4 MB
~Get Your Files Here !/5 - Automating Security Operations with GenAI/3 -Case study Automated Incident Reporting.mp4 21.0 MB
~Get Your Files Here !/7 - Advanced Security Reporting with GenAI/3 -Effective Communication of Security Posture.mp4 20.5 MB
~Get Your Files Here !/9 - Building an AI-Powered Security Strategy/3 -Trends and Innovations in AI Security.mp4 20.3 MB
~Get Your Files Here !/2 - Introduction to GenAI in Cybersecurity/4 -Introducing Microsoft Security Copilot.mp4 19.8 MB
~Get Your Files Here !/6 - GenAI for Proactive Threat Hunting/3 -Integrating Threat Hunting with Microsoft Sentinel.mp4 19.4 MB
~Get Your Files Here !/7 - Advanced Security Reporting with GenAI/1 -Creating Executive-Level Reports.mp4 19.2 MB
~Get Your Files Here !/10 - Course conclusion/3 -Certification and Career Guidance.mp4 19.1 MB
~Get Your Files Here !/1 - Introduction/5 -Important Note and considerations.mp4 18.6 MB
~Get Your Files Here !/4 - GenAI for Threat Detection and Response/2 -Automating Threat Intelligence with GenAI.mp4 18.4 MB
~Get Your Files Here !/9 - Building an AI-Powered Security Strategy/2 -Enhancing Existing Tools with Copilot.mp4 18.1 MB
猜你喜欢:
defenses
Cybersecurity
Udemy
FreeCourseWeb
com
GenAI
- 【影视】 [Coursera] Python for Cybersecurity Specialization - 5 course series
-
收录时间:2024-05-20
文档个数:290
文档大小:1.2 GB
最近下载:2025-05-15
人气:5313
磁力链接
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_03_alternative-protocol.mp4 61.8 MB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_05_network-sniffing.mp4 42.0 MB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_04_network-scanning.mp4 32.5 MB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_05_protocol-decoding.mp4 31.5 MB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_07_behavioral-analytics.mp4 29.2 MB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_03_registry-autorun.mp4 29.0 MB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_05_hijacked-execution-flow.mp4 27.5 MB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_06_dns-exploration.mp4 27.3 MB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_05_system-activity-monitoring.mp4 26.6 MB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_03_pcap-collection.mp4 26.0 MB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_03_encrypted-channel.mp4 25.8 MB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_05_scheduled-execution.mp4 25.8 MB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_03_user-account-discovery.mp4 25.4 MB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_03_logon-scripts.mp4 24.6 MB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_03_data-encryption.mp4 23.6 MB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_05_alternate-data-streams.mp4 22.4 MB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_03_default-account-discovery.mp4 21.7 MB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_05_autorun-scripts.mp4 21.2 MB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_03_impair-avs.mp4 20.8 MB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_03_credentials-from-web-browsers.mp4 20.7 MB
猜你喜欢:
Specialization
course
Python
series
Coursera
Cybersecurity
- 【影视】 [LiveLessons] The Complete Cybersecurity Bootcamp, 2nd Edition [En]
-
收录时间:2024-03-28
文档个数:290
文档大小:6.5 GB
最近下载:2025-05-15
人气:850
磁力链接
29.2 Hacking iOS.mp4 86.6 MB
17.13 Performing SMTP and DNS Enumeration.mp4 80.0 MB
21.3 Exploring Wireless Threats.mp4 79.0 MB
33.2 Understanding IoT Attacks.mp4 76.8 MB
17.14 Conducting Additional Enumeration Techniques.mp4 75.8 MB
33.1 Introducing IoT Concepts.mp4 74.4 MB
29.1 Understanding Mobile Platform Attack Vectors.mp4 73.4 MB
17.10 Performing SNMP Enumeration.mp4 71.8 MB
17.3 Understanding Host Discovery.mp4 69.7 MB
5.6 Analyzing Computer Incident Response Teams (CSIRTs).mp4 68.5 MB
17.6 Scanning Beyond IDS and Firewall.mp4 68.2 MB
27.5 Cracking Passwords with John the Ripper.mp4 66.1 MB
7.8 Understanding the MITRE ATT&CK Framework.mp4 65.8 MB
29.3 Hacking Android OS.mp4 63.8 MB
20.4 Exploring SQL Injection Tools.mp4 63.3 MB
21.2 Understanding Wireless Encryption.mp4 62.7 MB
17.12 Performing NTP and NFS Enumeration.mp4 61.8 MB
16.10 Performing Footprinting through Social Engineering.mp4 59.1 MB
8.3 Understanding Evidence Collection.mp4 57.2 MB
21.6 Hacking Bluetooth.mp4 52.3 MB
猜你喜欢:
En
Complete
Cybersecurity
LiveLessons
2nd
Edition
Bootcamp
- 【影视】 [ WebToolTip.com ] Udemy - Essential Cybersecurity For Everyone - Stay Safe Online
-
收录时间:2025-03-13
文档个数:19
文档大小:2.1 GB
最近下载:2025-05-15
人气:516
磁力链接
~Get Your Files Here !/4 - Creating Strong Passwords and Enhancing Overall Security/9 - Password Security.mp4 250.4 MB
~Get Your Files Here !/11 - IoT Security/16 - Securing Smart Devices in the Digital Age.mp4 235.4 MB
~Get Your Files Here !/7 - Data Backup and Recovery Essentials/12 - Safeguarding Your Data Backup and Restoration.mp4 209.9 MB
~Get Your Files Here !/9 - Cybersecurity for Travelers/14 - Staying Secure While Traveling Online.mp4 191.8 MB
~Get Your Files Here !/6 - Email Security Essentials/11 - Protecting Your Email from Threats.mp4 175.4 MB
~Get Your Files Here !/10 - Social Media Security/15 - Protecting Your Privacy on Social Media.mp4 172.2 MB
~Get Your Files Here !/5 - Safe Internet Browsing/10 - Safe Internet Browsing.mp4 126.9 MB
~Get Your Files Here !/12 - Steps to Take After a Cybersecurity Breach/17 - What to Do After a Cybersecurity Breach.mp4 116.9 MB
~Get Your Files Here !/1 - Introduction Essential Cybersecurity for everyone stay safe online/1 - Introduction.mp4 107.3 MB
~Get Your Files Here !/2 - Understanding Cyber Threats/2 - Understanding Cyber threats.mp4 98.9 MB
~Get Your Files Here !/8 - Securing Your Online Accounts/13 - Best Practices for Protecting Online Accounts.mp4 94.5 MB
~Get Your Files Here !/3 - Protecting Personal Devices/3 - Introduction to protecting personal devices.mp4 76.2 MB
~Get Your Files Here !/3 - Protecting Personal Devices/6 - Keeping Software Operating Systems Updated Strengthening Your Digital Defense.mp4 58.9 MB
~Get Your Files Here !/3 - Protecting Personal Devices/4 - Securing Computers and Laptops.mp4 43.3 MB
~Get Your Files Here !/3 - Protecting Personal Devices/7 - Configuring Firewalls Securing Your Devices and Home Network.mp4 36.6 MB
~Get Your Files Here !/3 - Protecting Personal Devices/5 - Securing Smartphones and Laptops.mp4 30.1 MB
~Get Your Files Here !/3 - Protecting Personal Devices/8 - Ensuring Safe and Secure WiFi Connections.mp4 27.5 MB
Get Bonus Downloads Here.url 180 Bytes
~Get Your Files Here !/Bonus Resources.txt 70 Bytes
猜你喜欢:
Everyone
WebToolTip
Cybersecurity
Safe
Udemy
Online
Stay
com
Essential
- 【影视】 Theoretical Foundations of AI in Cybersecurity
-
收录时间:2024-07-08
文档个数:362
文档大小:6.1 GB
最近下载:2025-05-15
人气:11053
磁力链接
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/3. Fundamental Theories of AI/7. Case Study Revolutionizing Cybersecurity with Natural Language Processing.mp4 57.4 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/7. Deep Learning for Cyber Defense/11. Case Study Unraveling the Challenges of Deploying Deep Learning Models.mp4 52.3 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/7. Deep Learning for Cyber Defense/3. Case Study Enhancing Cybersecurity with Neural Networks.mp4 49.2 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/13. AI in Vulnerability Management/9. Case Study AI-Driven Transformation in Vulnerability Management.mp4 48.5 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/4. Cybersecurity Fundamentals/4. Types of Cyber Threats.mp4 48.4 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/15. AI in Network Security/9. Case Study AI in Network Security.mp4 48.1 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/2. Introduction to Cybersecurity and AI/8. Key Concepts and Terminologies.mp4 47.1 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/10. AI for Intrusion Detection Systems (IDS)/7. Case Study Implementing AI-Based Intrusion Detection Systems.mp4 46.9 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/2. Introduction to Cybersecurity and AI/4. Overview of Cybersecurity.mp4 46.5 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/10. AI for Intrusion Detection Systems (IDS)/9. Case Study Enhancing Cybersecurity with AI-Powered Intrusion Detection Systems.mp4 46.2 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/4. Cybersecurity Fundamentals/11. Case Study Revamping Cybersecurity Strategy at TechNova.mp4 44.9 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/5. Intersection of AI and Cybersecurity/11. Case Study Integrating AI for Enhanced Cybersecurity.mp4 44.4 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/7. Deep Learning for Cyber Defense/2. Neural Networks in Cybersecurity.mp4 44.2 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/11. AI for Threat Hunting/8. Case Studies and Examples.mp4 43.8 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/8. Natural Language Processing in Cybersecurity/3. Case Study Enhancing Cybersecurity Threat Intelligence.mp4 43.7 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/6. Machine Learning in Cybersecurity/2. Supervised Learning for Threat Detection.mp4 43.5 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/8. Natural Language Processing in Cybersecurity/11. Case Study Overcoming NLP Limitations in Cybersecurity.mp4 43.5 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/14. AI and Cyber Threat Intelligence/6. Theoretical Models and Techniques.mp4 43.4 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/9. Reinforcement Learning in Cyber Defense/5. Case Study Revolutionizing Cybersecurity with Reinforcement Learning.mp4 43.2 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/2. Introduction to Cybersecurity and AI/7. Case Study AI in Cybersecurity.mp4 42.9 MB
猜你喜欢:
AI
Foundations
Theoretical
Cybersecurity
- 【影视】 [ DevCourseWeb.com ] Udemy - Intro To Cybersecurity In Healthcare (2 Of 2),Plain and Simple
-
收录时间:2024-02-03
文档个数:26
文档大小:953.6 MB
最近下载:2025-05-15
人气:1322
磁力链接
~Get Your Files Here !/3 - Ransomware and Cryptocurrency.mp4 309.9 MB
~Get Your Files Here !/7 - Testing Your Vulnerabilities.mp4 150.2 MB
~Get Your Files Here !/2 - Malware.mp4 136.5 MB
~Get Your Files Here !/5 - Boston Childrens Hack The Response.mp4 123.0 MB
~Get Your Files Here !/8 - HIPAA.mp4 70.3 MB
~Get Your Files Here !/4 - Boston Childrens Hack The Issue.mp4 52.4 MB
~Get Your Files Here !/6 - Boston Childrens Hack Lessons Learned.mp4 50.7 MB
~Get Your Files Here !/1 - Introduction.mp4 49.6 MB
~Get Your Files Here !/9 - Conclusions.mp4 10.9 MB
~Get Your Files Here !/3 - Ransomware and Cryptocurrency English.vtt 24.5 kB
~Get Your Files Here !/7 - Testing Your Vulnerabilities English.vtt 12.5 kB
~Get Your Files Here !/13 - IN THE NEWS Some Straight Talk on Ransomware in Health Care.html 11.3 kB
~Get Your Files Here !/2 - Malware English.vtt 10.7 kB
~Get Your Files Here !/5 - Boston Childrens Hack The Response English.vtt 10.1 kB
~Get Your Files Here !/8 - HIPAA English.vtt 5.9 kB
~Get Your Files Here !/12 - IN THE NEWS.html 5.8 kB
~Get Your Files Here !/6 - Boston Childrens Hack Lessons Learned English.vtt 4.6 kB
~Get Your Files Here !/1 - Introduction English.vtt 4.5 kB
~Get Your Files Here !/4 - Boston Childrens Hack The Issue English.vtt 4.3 kB
~Get Your Files Here !/10 - IN THE NEWS Cyberattacks hit midsize hospitals hardest.html 4.2 kB
猜你喜欢:
Cybersecurity
Plain
Udemy
DevCourseWeb
Simple
Intro
Healthcare
com
- 【影视】 Lynda - Practical Cybersecurity
-
收录时间:2017-02-10
文档个数:45
文档大小:244.8 MB
最近下载:2025-05-15
人气:1388
磁力链接
8. Monitoring Network Activity/164982_08_03_XR15_packets.mp4 13.1 MB
7. Checking for Common Mistakes in Web Apps/164982_07_02_XR15_scan.mp4 11.9 MB
3. Personal Firewalls/164982_03_02_XR15_mswf.mp4 10.7 MB
3. Personal Firewalls/164982_03_06_XR15_iptables.mp4 9.8 MB
3. Personal Firewalls/164982_03_04_XR15_advrules.mp4 9.5 MB
7. Checking for Common Mistakes in Web Apps/164982_07_01_XR15_intro.mp4 9.4 MB
6. Checking Hosts for Known Vulnerabilities/164982_06_04_XR15_scan.mp4 8.6 MB
1. Why Cybersecurity/164982_01_03_XR15_attack.mp4 8.6 MB
1. Why Cybersecurity/164982_01_01_XR15_cyber.mp4 8.4 MB
8. Monitoring Network Activity/164982_08_05_XR151_intruder.mp4 8.3 MB
8. Monitoring Network Activity/164982_08_04_XR15_filters.mp4 8.2 MB
2. Antivirus/164982_02_06_XR15_schedule.mp4 8.2 MB
3. Personal Firewalls/164982_03_03_XR15_advfw.mp4 7.9 MB
0. Introduction/164982_00_01_WX30_welcome.mp4 6.9 MB
3. Personal Firewalls/164982_03_05_XR15_zedlan.mp4 6.7 MB
4. Knowing What Is on Your Network/164982_04_05_XR15_zenmap.mp4 6.3 MB
5. Network Communications and Detecting Intruders/164982_05_04_XR15_honeypot.mp4 6.0 MB
5. Network Communications and Detecting Intruders/164982_05_02_XR15_filexfer.mp4 5.8 MB
8. Monitoring Network Activity/164982_08_02_XR15_capture.mp4 5.6 MB
2. Antivirus/164982_02_05_XR15_avsettings.mp4 5.5 MB
猜你喜欢:
Practical
Lynda
Cybersecurity
- 【影视】 Cybersecurity {AM}
-
收录时间:2017-02-11
文档个数:39
文档大小:230.5 MB
最近下载:2025-05-15
人气:1804
磁力链接
0 Introduction/369625_00_03_XR15_Reference.mp4 10.2 MB
3 Architecting Security/369625_03_05_XR15_Cloud_Attribute_Taxonomy.mp4 10.1 MB
3 Architecting Security/369625_03_01_XR15_Introduction_to_SABSA.mp4 9.9 MB
2 Cloud Security Guidance/369625_02_16_SO30_XR30_Solution.mp4 9.9 MB
2 Cloud Security Guidance/369625_02_03_XR15_Information_Management.mp4 9.8 MB
1 Cloud Fundamentals/369625_01_01_XR15_Essential_Characteristics.mp4 9.6 MB
1 Cloud Fundamentals/369625_01_06_XR15_Cloud_Incidents.mp4 9.4 MB
2 Cloud Security Guidance/369625_02_02_XR15_Legal_Compliance_and_Audit.mp4 8.9 MB
1 Cloud Fundamentals/369625_01_09_XR15_Cloud_Trust.mp4 8.8 MB
2 Cloud Security Guidance/369625_02_07_XR15_Incident_Response.mp4 8.8 MB
2 Cloud Security Guidance/369625_02_11_XR15_Identity_in_the_Cloud.mp4 8.4 MB
2 Cloud Security Guidance/369625_02_08_XR15_Application_Security.mp4 8.3 MB
2 Cloud Security Guidance/369625_02_13_XR15_Virtualisation.mp4 8.2 MB
2 Cloud Security Guidance/369625_02_05_XR15_Traditional_Security_BCP_and_DR.mp4 8.2 MB
2 Cloud Security Guidance/369625_02_12_XR15_Cloud_Access_Control.mp4 7.9 MB
1 Cloud Fundamentals/369625_01_02_XR15_Infrastructure_as_a_Service.mp4 7.6 MB
3 Architecting Security/369625_03_02_XR15_Fast_Tracker.mp4 7.4 MB
1 Cloud Fundamentals/369625_01_05_XR151_Deployment_Models.mp4 6.7 MB
2 Cloud Security Guidance/369625_02_10_XR15_Encryption_and_Key_Management.mp4 6.6 MB
3 Architecting Security/369625_03_03_XR15_SABSA_Attributes.mp4 6.3 MB
猜你喜欢:
Cybersecurity
AM
- 【影视】 [ FreeCourseWeb.com ] Udemy - Cybersecurity Habits Masterclass
-
收录时间:2022-04-10
文档个数:93
文档大小:2.1 GB
最近下载:2025-05-15
人气:1566
磁力链接
~Get Your Files Here !/3. Skepticism/4. Slow Down And Frown.mp4 73.5 MB
~Get Your Files Here !/11. Conclusion/1. Well Awareiors.mp4 71.5 MB
~Get Your Files Here !/1. Introduction/1. Introduction.mp4 67.0 MB
~Get Your Files Here !/4. Vigilance/2. The Only Thing We Have To Fear.mp4 66.7 MB
~Get Your Files Here !/4. Vigilance/1. The Face Of The Enemy.mp4 66.5 MB
~Get Your Files Here !/5. Secrecy/2. Making It Personal.mp4 65.7 MB
~Get Your Files Here !/2. Literacy/5. Habits And Recipes.mp4 64.7 MB
~Get Your Files Here !/3. Skepticism/1. Zero Trust.mp4 64.5 MB
~Get Your Files Here !/8. Community/4. Habits And Recipes.mp4 57.4 MB
~Get Your Files Here !/8. Community/1. United We Stand.mp4 54.0 MB
~Get Your Files Here !/7. Diligence/3. Random Acts of Security.mp4 53.4 MB
~Get Your Files Here !/7. Diligence/2. Journaling.mp4 53.4 MB
~Get Your Files Here !/9. Mirroring/5. Habits And Recipes.mp4 52.0 MB
~Get Your Files Here !/6. Culture/1. Culture Eats Cybersecurity For Breakfast.mp4 51.4 MB
~Get Your Files Here !/10. Deception/1. Know Thy Enemy.mp4 49.4 MB
~Get Your Files Here !/9. Mirroring/3. Blindspots.mp4 49.1 MB
~Get Your Files Here !/3. Skepticism/2. The Pygmailion Effect.mp4 48.9 MB
~Get Your Files Here !/6. Culture/5. Habits And Recipes.mp4 48.0 MB
~Get Your Files Here !/2. Literacy/1. Fearless Learning.mp4 47.9 MB
~Get Your Files Here !/6. Culture/2. The Hermit Crab Shell.mp4 46.7 MB
猜你喜欢:
Cybersecurity
Masterclass
Udemy
Habits
FreeCourseWeb
com
- 【影视】 [TutorialPace.com] Lynda - Cybersecurity with Cloud Computing - [TP]
-
收录时间:2022-02-20
文档个数:38
文档大小:371.6 MB
最近下载:2025-05-15
人气:2055
磁力链接
00. Introduction/00_01 - Welcome.mp4 17.4 MB
00. Introduction/00_03 - Reference sites.mp4 16.6 MB
01. Cloud Fundamentals/01_01 - Defining the essential characteristics of cloud.mp4 15.8 MB
02. Cloud Security Guidance/02_03 - Managing information and data security.mp4 15.6 MB
03. Architecting Security/03_05 - Introducing cloud attribute taxonomy.mp4 15.5 MB
03. Architecting Security/03_01 - Introducing SABSA.mp4 15.3 MB
01. Cloud Fundamentals/01_06 - Identifying cloud incidents.mp4 15.2 MB
01. Cloud Fundamentals/01_09 - Defining trust models for cloud.mp4 14.0 MB
02. Cloud Security Guidance/02_16 - Solution Cloud security knowledge.mp4 13.8 MB
02. Cloud Security Guidance/02_02 - Complying with legal and audit requrements.mp4 13.1 MB
02. Cloud Security Guidance/02_11 - Verifying identity in the cloud.mp4 13.1 MB
02. Cloud Security Guidance/02_07 - Managing incident response.mp4 12.9 MB
02. Cloud Security Guidance/02_13 - Implementing virtualization.mp4 12.9 MB
02. Cloud Security Guidance/02_12 - Controlling cloud access.mp4 12.5 MB
02. Cloud Security Guidance/02_08 - Maximizing application security.mp4 12.3 MB
03. Architecting Security/03_02 - Using Fast Tracker.mp4 12.0 MB
02. Cloud Security Guidance/02_05 - Comparing traditional IT, BCP, and DR.mp4 12.0 MB
01. Cloud Fundamentals/01_02 - Understanding infrastructure as a service.mp4 11.9 MB
01. Cloud Fundamentals/01_05 - Discovering deployment models.mp4 11.4 MB
02. Cloud Security Guidance/02_10 - Managing encryption and keys.mp4 10.8 MB
猜你喜欢:
Computing
Cybersecurity
Lynda
TP
TutorialPace
com
Cloud
- 【影视】 Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training
-
收录时间:2024-07-04
文档个数:135
文档大小:2.5 GB
最近下载:2025-05-15
人气:946
磁力链接
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/6. Azure Security Benchmark - Microsoft Certified Cybersecurity-1.mp4 113.5 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/2. Hybrid Environmental Security Strategies - Microsoft Certifi.mp4 63.8 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/1. Specify Priorities for Mitigating Threats to Apps - Microsof-1.mp4 62.3 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/6. Designing a Regulatory Compliance Strategy/4. Implementing Azure Policy - Microsoft Certified Cybersecurit.mp4 59.0 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/7. Evaluating and Managing Security Postures/6. Mitigating Identified Risks - Microsoft Certified Cybersecur-1.mp4 53.6 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/4. Traffic Filtering and Segmentation Strategies - Microsoft Ce-1.mp4 53.4 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/4. Priorities For Mitigating Threats To Data - Microsoft Certif-1.mp4 53.4 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/5. Azure Best Practices for Network Security - Microsoft Certif-1.mp4 52.2 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/5. Hybrid Infrastructure - Microsoft Certified Cybersecurity Ar-1.mp4 50.4 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/6. Designing a Regulatory Compliance Strategy/6. Translating Privacy Requirements - Microsoft Certified Cyber.mp4 49.7 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/9. Designing a Strategy for Securing SaaS, PaaS, and IaaS Services/1. Security Baselines for SaaS, PaaS, and IaaS services - Micro.mp4 48.3 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/3. Translating Business Goals into Security Requirements - Micr.mp4 47.9 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/7. Securing Privileged Access Using RaMP - Microsoft Certified -1.mp4 47.8 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/2. Security Operations - Microsoft Certified Cybersecurity Arch-1.mp4 47.0 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/4. Designing a Security Operations Strategy/5. SIEMSOAR Strategy - Microsoft Certified Cybersecurity Archit.mp4 46.3 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/2. Translating Requirements - Microsoft Certified Cybersecurity.mp4 46.2 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/3. Security Strategy for Applications and APIs - Microsoft Cert-1.mp4 44.6 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/5. Designing an Identity Security Strategy/1. Strategy for Access to Cloud Resources - Microsoft Certified.mp4 43.0 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/7. Evaluating and Managing Security Postures/4. Designing Security for an Azure Landing Zone - Microsoft Cer.mp4 42.8 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/4. Designing a Security Operations Strategy/3. Logging and Auditing Strategy - Microsoft Certified Cybersec.mp4 42.3 MB
猜你喜欢:
Microsoft
Training
Expert
Certification
Cybersecurity
Architect
SC
100
Certified
- 【影视】 [ TutSala.com ] Linkedin - Crisis Communication Planning After a Ransomware or Other Cybersecurity Attack
-
收录时间:2023-12-17
文档个数:23
文档大小:83.2 MB
最近下载:2025-05-15
人气:459
磁力链接
~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/02 - Prepare your team to address a crisis.mp4 14.0 MB
~Get Your Files Here !/02 - 1. The Impact of Cyberattacks/02 - Determining who is on your team when a cyberattack occurs.mp4 11.4 MB
~Get Your Files Here !/02 - 1. The Impact of Cyberattacks/01 - Why cyberattacks impact every organization.mp4 11.1 MB
~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/01 - What to say and to whom at onset.mp4 10.7 MB
~Get Your Files Here !/04 - 3. Evaluate and Train/01 - Continue to evaluate after a training.mp4 9.1 MB
~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/04 - What to tell people after the attack.mp4 7.4 MB
~Get Your Files Here !/04 - 3. Evaluate and Train/02 - Design crisis scenario-based training for higher retention.mp4 6.8 MB
~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/03 - Practice to improve crisis communications.mp4 5.3 MB
~Get Your Files Here !/01 - Introduction/01 - Anyone can suffer a ransomware or other cyberattack.mp4 5.0 MB
~Get Your Files Here !/05 - Conclusion/01 - You can do this.mp4 2.3 MB
~Get Your Files Here !/Ex_Files_Crisis_Communication_Planning_Cybersecurity/Exercise Files/Questions to Ask Your Team.pdf 31.1 kB
~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/02 - Prepare your team to address a crisis.srt 10.6 kB
~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/01 - What to say and to whom at onset.srt 8.6 kB
~Get Your Files Here !/02 - 1. The Impact of Cyberattacks/02 - Determining who is on your team when a cyberattack occurs.srt 7.3 kB
~Get Your Files Here !/02 - 1. The Impact of Cyberattacks/01 - Why cyberattacks impact every organization.srt 7.0 kB
~Get Your Files Here !/04 - 3. Evaluate and Train/02 - Design crisis scenario-based training for higher retention.srt 6.3 kB
~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/04 - What to tell people after the attack.srt 5.5 kB
~Get Your Files Here !/04 - 3. Evaluate and Train/01 - Continue to evaluate after a training.srt 5.2 kB
~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/03 - Practice to improve crisis communications.srt 3.8 kB
~Get Your Files Here !/01 - Introduction/01 - Anyone can suffer a ransomware or other cyberattack.srt 2.5 kB
猜你喜欢:
Ransomware
Cybersecurity
Communication
After
Linkedin
TutSala
Attack
Planning
Other
com
- 【影视】 MS Cybersecurity Pro Track Enterprise Security Fundamentals
-
收录时间:2021-03-14
文档个数:91
文档大小:1.0 GB
最近下载:2025-05-15
人气:1875
磁力链接
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/02 Understanding the cybersecurity landscape/003 Current Cybersecurity Landscape.mp4 169.2 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/03 Red Team_ Penetration, lateral movement, escalation, and exfiltration/008 Red Team Kill Chain.mp4 142.4 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/014 Attack Detection.mp4 89.9 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/011 Blue Team Kill Chain.mp4 70.3 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/05 Beyond The Breach/016 Organization Preparations.mp4 68.5 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/012 Restrict Privilege Escalation.mp4 59.9 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/02 Understanding the cybersecurity landscape/005 Cost of Breach.mp4 59.5 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/03 Red Team_ Penetration, lateral movement, escalation, and exfiltration/007 The Attacker's Objective.mp4 55.8 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/02 Understanding the cybersecurity landscape/004 Assume Compromise Philosophy.mp4 53.5 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/05 Beyond The Breach/017 Developing and Maintaining Policies.mp4 50.7 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/013 Restrict Lateral Movement.mp4 43.0 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/05 Beyond The Breach/015 CIA Triad.mp4 30.7 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/03 Red Team_ Penetration, lateral movement, escalation, and exfiltration/006 Red Team versus Blue Team exercises.mp4 30.4 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/01 Introduction/002 Course overview.mp4 25.3 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/010 Blue Team.mp4 22.9 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/03 Red Team_ Penetration, lateral movement, escalation, and exfiltration/009 Document Vulnerabilities.mp4 10.6 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/01 Introduction/001 Instructor introduction.mp4 9.3 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/07 Conclusion/018 Bonus Lecture_ What Next_.mp4 3.2 MB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/014 AttackDetection.pdf 709.3 kB
[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/011 BlueTeamKillChain.pdf 695.5 kB
猜你喜欢:
Fundamentals
Cybersecurity
Pro
Track
MS
Enterprise
Security
- 【影视】 AI-Enabled Programming, Networking, and Cybersecurity
-
收录时间:2024-11-28
文档个数:33
文档大小:690.1 MB
最近下载:2025-05-15
人气:1797
磁力链接
Lesson 2 Using AI for Cybersecurity/004. 2.3 Securing AI Implementations.mp4 66.1 MB
Lesson 1 Introduction to AI-powered Tools/007. 1.6 Introducing Embedding Models.mp4 41.5 MB
Lesson 1 Introduction to AI-powered Tools/006. 1.5 Introducing Retrieval Augmented Generation (RAG).mp4 39.5 MB
Lesson 2 Using AI for Cybersecurity/005. 2.4 Exploring Network Security Processes Incorporating AI Tools.mp4 33.3 MB
Lesson 1 Introduction to AI-powered Tools/003. 1.2 Large Language Models (LLMs) and Small Language Models (SLMs).mp4 31.4 MB
Lesson 3 Using AI for Software Development/008. 3.7 Prompt Engineering for Software Development.mp4 31.0 MB
Lesson 1 Introduction to AI-powered Tools/004. 1.3 Introducing LangChain, LangGraph, Llama Index, and Other Orchestration Frameworks.mp4 28.4 MB
Lesson 4 Using AI for Networking/002. 4.1 Exploring how AI is Revolutionizing Networking.mp4 26.9 MB
Lesson 1 Introduction to AI-powered Tools/009. 1.8 Introducing Semantic Search.mp4 25.6 MB
Lesson 4 Using AI for Networking/003. 4.2 Using GitHub Copilot for Programming Tasks Related to Networking.mp4 23.8 MB
Lesson 4 Using AI for Networking/005. 4.4 Prompt Engineering for Networking.mp4 23.6 MB
Lesson 5 Future Trends and Additional Emerging Technologies/003. 5.2 Regulatory and Policy Frameworks.mp4 23.0 MB
Lesson 3 Using AI for Software Development/005. 3.4 Generating Code from a Prompt.mp4 22.0 MB
Introduction/001. AI-Enabled Programming, Networking, and Cybersecurity Introduction.mp4 21.4 MB
Lesson 1 Introduction to AI-powered Tools/001. Learning objectives.mp4 19.7 MB
Lesson 1 Introduction to AI-powered Tools/008. 1.7 Introducing Vector Databases - pgvector, Chroma, MongoDB Atlas Vector Search, and others.mp4 18.5 MB
Lesson 1 Introduction to AI-powered Tools/002. 1.1 Overview of the Evolution of AI-driven Tools.mp4 18.4 MB
Summary/001. AI-Enabled Programming, Networking, and Cybersecurity Summary.mp4 18.1 MB
Lesson 1 Introduction to AI-powered Tools/005. 1.4 An Overview of Open-source AI Models and Hugging Face.mp4 17.9 MB
Lesson 5 Future Trends and Additional Emerging Technologies/002. 5.1 Exploring Additional Applications of AI in Emerging Technologies.mp4 16.9 MB
猜你喜欢:
AI
Programming
Networking
Enabled
Cybersecurity
- 【影视】 [ FreeCourseWeb.com ] Udemy - Cybersecurity Solution Architecture 101
-
收录时间:2025-05-06
文档个数:15
文档大小:1.3 GB
最近下载:2025-05-15
人气:75
磁力链接
~Get Your Files Here !/2 -Fundamental Concepts & Terminology.mp4 157.1 MB
~Get Your Files Here !/6 -Endpoint & Device Security.mp4 123.5 MB
~Get Your Files Here !/5 -Identity & Access Management (IAM) Basics.mp4 111.4 MB
~Get Your Files Here !/12 -Security Operations & Incident Response Overview.mp4 104.7 MB
~Get Your Files Here !/7 -Infrastructure Vulnerability Management.mp4 99.1 MB
~Get Your Files Here !/13 -Wrap-Up & Preparation for 201 Course.mp4 97.2 MB
~Get Your Files Here !/10 -Secure Application Foundations.mp4 91.1 MB
~Get Your Files Here !/3 -The Threat Landscape.mp4 90.2 MB
~Get Your Files Here !/1 -Introduction to Cybersecurity & the Role of a Cybersecurity Solution Architect.mp4 86.2 MB
~Get Your Files Here !/8 -Introduction to Cryptography.mp4 85.8 MB
~Get Your Files Here !/9 -Cloud Security Essentials.mp4 83.0 MB
~Get Your Files Here !/11 -Basic Governance, Risk, & Compliance (GRC).mp4 74.4 MB
~Get Your Files Here !/4 -Networking & Network Security Fundamentals.mp4 70.6 MB
Get Bonus Downloads Here.url 183 Bytes
~Get Your Files Here !/Bonus Resources.txt 70 Bytes
猜你喜欢:
Cybersecurity
Solution
Udemy
FreeCourseWeb
Architecture
101
com