磁力管家

磁力管家
为您索检到186条磁力链接,耗时0毫秒。 rss

分享给好友

【影视】 Lynda - Foundations of Cybersecurity
收录时间:2017-02-08 文档个数:27 文档大小:300.9 MB 最近下载:2025-05-15 人气:1909 磁力链接
  • mp401. Introduction/01_01-Welcome.mp4 6.5 MB
  • mp401. Introduction/01_02-What you should know.mp4 2.0 MB
  • mp402. Cybersecurity Foundations/02_01-Understanding the NIST cybersecurity framework.mp4 12.6 MB
  • mp402. Cybersecurity Foundations/02_02-Dissecting cyber risk.mp4 13.1 MB
  • mp402. Cybersecurity Foundations/02_03-Unpacking COBIT 5.mp4 10.3 MB
  • mp402. Cybersecurity Foundations/02_04-Looking closer at DSS05.mp4 8.1 MB
  • mp402. Cybersecurity Foundations/02_05-Implementing control frameworks.mp4 14.3 MB
  • mp402. Cybersecurity Foundations/02_06-Dissecting the payment card industry and PCI DSS.mp4 14.6 MB
  • mp402. Cybersecurity Foundations/02_07-Exploring the Cyber Essentials framework.mp4 9.3 MB
  • mp403. Cybersecurity Threats/03_01-Breaking down the cybersecurity kill chain.mp4 8.1 MB
  • mp403. Cybersecurity Threats/03_02-Dissecting security threats.mp4 11.6 MB
  • mp403. Cybersecurity Threats/03_03-Exploring cybercrime as an industry.mp4 9.9 MB
  • mp403. Cybersecurity Threats/03_04-Hiding malware through cloaking and alternate data streams.mp4 9.0 MB
  • mp403. Cybersecurity Threats/03_05-Using callbacks to capture keystrokes.mp4 9.8 MB
  • mp403. Cybersecurity Threats/03_06-Hiding malware with rootkits.mp4 9.8 MB
  • mp403. Cybersecurity Threats/03_07-Understanding advanced persistent threats APTs.mp4 13.5 MB
  • mp403. Cybersecurity Threats/03_08-Exploring ransomware.mp4 8.4 MB
  • mp404. Security Architecture/04_01-Describing security requirements.mp4 14.9 MB
  • mp404. Security Architecture/04_02-Architecting security risk.mp4 13.5 MB
  • mp404. Security Architecture/04_03-Selecting security controls.mp4 8.5 MB
【影视】 Lynda - Cybersecurity with Cloud Computing
收录时间:2017-07-16 文档个数:39 文档大小:371.6 MB 最近下载:2025-05-15 人气:3619 磁力链接
  • mp400. Introduction/00_01 - Welcome.mp4 17.4 MB
  • mp400. Introduction/00_02 - What you should know.mp4 861.2 kB
  • mp400. Introduction/00_03 - Reference sites.mp4 16.6 MB
  • mp400. Introduction/00_04 - Using the exercise files.mp4 278.9 kB
  • mp401. Cloud Fundamentals/01_01 - Defining the essential characteristics of cloud.mp4 15.8 MB
  • mp401. Cloud Fundamentals/01_02 - Understanding infrastructure as a service.mp4 11.9 MB
  • mp401. Cloud Fundamentals/01_03 - Unraveling platform as a service.mp4 6.8 MB
  • mp401. Cloud Fundamentals/01_04 - Comprehending software as a service.mp4 8.6 MB
  • mp401. Cloud Fundamentals/01_05 - Discovering deployment models.mp4 11.4 MB
  • mp401. Cloud Fundamentals/01_06 - Identifying cloud incidents.mp4 15.2 MB
  • mp401. Cloud Fundamentals/01_07 - Dissecting the anatomy of a service failure.mp4 8.8 MB
  • mp401. Cloud Fundamentals/01_08 - Deciphering the anatomy of a business failure.mp4 8.3 MB
  • mp401. Cloud Fundamentals/01_09 - Defining trust models for cloud.mp4 14.0 MB
  • mp402. Cloud Security Guidance/02_01 - Identifying governance and risk.mp4 5.5 MB
  • mp402. Cloud Security Guidance/02_02 - Complying with legal and audit requrements.mp4 13.1 MB
  • mp402. Cloud Security Guidance/02_03 - Managing information and data security.mp4 15.6 MB
  • mp402. Cloud Security Guidance/02_04 - Providing portability and interoperability.mp4 7.5 MB
  • mp402. Cloud Security Guidance/02_05 - Comparing traditional IT, BCP, and DR.mp4 12.0 MB
  • mp402. Cloud Security Guidance/02_06 - Understanding data center operations.mp4 5.4 MB
  • mp402. Cloud Security Guidance/02_07 - Managing incident response.mp4 12.9 MB
【影视】 [FreeCoursesOnline.Me] Lynda - Risk Management for IT and Cybersecurity Managers
收录时间:2021-03-08 文档个数:22 文档大小:509.8 MB 最近下载:2025-05-15 人气:5237 磁力链接
  • mp402 What Is Risk_/002 Types of risk.mp4 77.3 MB
  • mp401 Introduction/001 Risk management for IT and security managers.mp4 71.2 MB
  • mp404 Calculating Risk/003 Quantitative risk measurement.mp4 45.5 MB
  • mp402 What Is Risk_/001 What is risk_.mp4 41.2 MB
  • mp404 Calculating Risk/004 Case study_ Equifax.mp4 33.7 MB
  • mp402 What Is Risk_/003 Types of threats.mp4 30.6 MB
  • mp404 Calculating Risk/002 Qualitative risk measurement.mp4 29.9 MB
  • mp403 What Can You Do with Risk_/007 Risk responses.mp4 25.1 MB
  • mp403 What Can You Do with Risk_/006 Risk controls.mp4 24.4 MB
  • mp403 What Can You Do with Risk_/002 Risk mitigation.mp4 23.5 MB
  • mp402 What Is Risk_/004 When risk management fails.mp4 21.4 MB
  • mp403 What Can You Do with Risk_/005 Risk acceptance.mp4 20.3 MB
  • mp404 Calculating Risk/001 Calculating risk.mp4 17.8 MB
  • mp403 What Can You Do with Risk_/004 Risk avoidance.mp4 15.3 MB
  • mp403 What Can You Do with Risk_/003 Risk transference.mp4 14.1 MB
  • mp405 Conclusion/001 Next steps.mp4 10.5 MB
  • mp403 What Can You Do with Risk_/001 What can you do with risk_.mp4 7.1 MB
  • zipEx_Files_Risk_Management_IT_Cybersecurity.zip 705.0 kB
  • url0. Websites you may like/0. (1Hack.Us) Premium Tutorials-Guides-Articles _ Community based Forum.url 377 Bytes
  • url0. Websites you may like/1. (FreeCoursesOnline.Me) Download Udacity, Masterclass, Lynda, PHLearn, Pluralsight Free.url 286 Bytes
【影视】 [ FreeCourseWeb.com ] Udemy - Cybersecurity For Beginners - Network Devices
收录时间:2022-01-31 文档个数:79 文档大小:980.5 MB 最近下载:2025-05-15 人气:1051 磁力链接
  • mp4~Get Your Files Here !/12. Lab Demonstration - Scanning Networks with NMAP/1. Lab Demonstration - Scanning Networks with NMAP Pt. 1.mp4 477.1 MB
  • mp4~Get Your Files Here !/12. Lab Demonstration - Scanning Networks with NMAP/2. Lab Demonstration - Scanning Networks with NMAP Pt. 2.mp4 331.7 MB
  • mp4~Get Your Files Here !/6. Denial-of-Service Attack (DoS) Attack/2. The 5 Principal Differences Between DoS & DDoS Attacks.mp4 14.1 MB
  • mp4~Get Your Files Here !/6. Denial-of-Service Attack (DoS) Attack/6. Common DoS Attack Pt. 2.mp4 9.8 MB
  • mp4~Get Your Files Here !/2. Network Devices/1. Common Network Devices.mp4 8.9 MB
  • mp4~Get Your Files Here !/1. The OSI Model/1. The OSI Model.mp4 7.8 MB
  • mp4~Get Your Files Here !/6. Denial-of-Service Attack (DoS) Attack/5. Common DoS Attack Pt. 1.mp4 6.9 MB
  • mp4~Get Your Files Here !/9. DNS Attacks/1. DNS Attacks.mp4 6.4 MB
  • mp4~Get Your Files Here !/2. Network Devices/2. More Common Network Devices.mp4 6.2 MB
  • mp4~Get Your Files Here !/6. Denial-of-Service Attack (DoS) Attack/1. DoS Vs. DDoS.mp4 6.0 MB
  • mp4~Get Your Files Here !/1. The OSI Model/3. Data Link Layer.mp4 5.7 MB
  • mp4~Get Your Files Here !/5. Intrusion Detection Systems (IDS) & Intrusion Prevention Systems (IPS)/2. Behavior Based IDS Vs. Knowledge Based IDS.mp4 5.5 MB
  • mp4~Get Your Files Here !/10. Footprinting/3. Footprinting Helps To.mp4 5.4 MB
  • mp4~Get Your Files Here !/10. Footprinting/4. Footprinting Methodology.mp4 5.4 MB
  • mp4~Get Your Files Here !/6. Denial-of-Service Attack (DoS) Attack/7. Three-Way-Handshake Importance To Network Attacks (SYN Flood).mp4 5.2 MB
  • mp4~Get Your Files Here !/4. Types of Firewalls/2. Types of Firewalls Pt. 2.mp4 5.1 MB
  • mp4~Get Your Files Here !/1. The OSI Model/2. Physical Layer.mp4 4.8 MB
  • mp4~Get Your Files Here !/4. Types of Firewalls/1. Types of Firewalls Pt. 1.mp4 4.6 MB
  • mp4~Get Your Files Here !/1. The OSI Model/4. Network Layer.mp4 4.5 MB
  • mp4~Get Your Files Here !/3. LAN & WAN Technologies/1. LAN & WAN Technologies.mp4 4.2 MB
【影视】 Cybersecurity Basics Securing your life in the digital age
收录时间:2021-03-08 文档个数:107 文档大小:718.3 MB 最近下载:2025-05-15 人气:1559 磁力链接
  • mp4Course/8. Email/2. Creating your email.mp4 58.6 MB
  • mp4Course/5. Securing your computer/1. The basics of securing your computer.mp4 46.3 MB
  • mp4Course/4. Securing your Phone/4. Walkthrough Steps to take when downloading an app.mp4 41.6 MB
  • mp4Course/7. Surfing the Internet Securely/2. Google, Search, and Cookies.mp4 34.8 MB
  • mp4Course/5. Securing your computer/4. Non-obvious basic essentials for securing your computer.mp4 34.0 MB
  • mp4Course/6. Password and Accounts/4. Security questions & Birthday for your accounts.mp4 33.8 MB
  • mp4Course/7. Surfing the Internet Securely/3. Drive by downloads, HTTPs, and Internet Trackers.mp4 31.7 MB
  • mp4Course/4. Securing your Phone/9. Phishing attacks on your phone.mp4 29.3 MB
  • mp4Course/8. Email/4. Email activity.mp4 28.6 MB
  • mp4Course/5. Securing your computer/3. Protecting your home internet.mp4 26.0 MB
  • mp4Course/7. Surfing the Internet Securely/5. Google Maps and Child Filters.mp4 25.6 MB
  • mp4Course/3. Cyber Attacks/2. PhishingWhaling.mp4 24.6 MB
  • mp4Course/3. Cyber Attacks/4. Ransomware.mp4 24.0 MB
  • mp4Course/6. Password and Accounts/1. Rules for creating passwords.mp4 23.8 MB
  • mp4Course/4. Securing your Phone/3. Downloading Apps.mp4 23.2 MB
  • mp4Course/2. Mindset of Cybersecurity Professional/3. Convenience vs Friction.mp4 22.5 MB
  • mp4Course/2. Mindset of Cybersecurity Professional/5. Classifying your data.mp4 22.3 MB
  • mp4Course/4. Securing your Phone/7. Mobile Carrier Security.mp4 21.9 MB
  • mp4Course/4. Securing your Phone/6. Two Factor Authentication.mp4 19.2 MB
  • mp4Course/1. Introduction/1. Introduction - Getting Startaed.mp4 18.4 MB
【影视】 [ FreeCourseWeb.com ] Udemy - Cybersecurity defenses with GenAI
收录时间:2025-05-07 文档个数:96 文档大小:856.1 MB 最近下载:2025-05-15 人气:284 磁力链接
  • mp4~Get Your Files Here !/2 - Introduction to GenAI in Cybersecurity/3 -Key differences between traditional AI and GenAI.mp4 64.1 MB
  • mp4~Get Your Files Here !/3 - Understanding Microsoft Security Copilot/2 -How Security Copilot works.mp4 41.4 MB
  • mp4~Get Your Files Here !/1 - Introduction/1 -About course.mp4 36.3 MB
  • mp4~Get Your Files Here !/3 - Understanding Microsoft Security Copilot/7 -Demo - Option 2 - Configure Microsoft Security Copilot.mp4 29.6 MB
  • mp4~Get Your Files Here !/3 - Understanding Microsoft Security Copilot/4 -Integration with Microsoft Defender XDR & Sentinel.mp4 28.7 MB
  • mp4~Get Your Files Here !/3 - Understanding Microsoft Security Copilot/1 -Architecture & Components.mp4 24.9 MB
  • mp4~Get Your Files Here !/1 - Introduction/3 -Additional courses that can help you.mp4 22.8 MB
  • mp4~Get Your Files Here !/6 - GenAI for Proactive Threat Hunting/2 -Creating Hunting Queries Using Natural Language.mp4 22.2 MB
  • mp4~Get Your Files Here !/9 - Building an AI-Powered Security Strategy/1 -Future-Ready AI-Driven SOC Vision.mp4 21.5 MB
  • mp4~Get Your Files Here !/2 - Introduction to GenAI in Cybersecurity/2 -Evolution of AI in Cybersecurity.mp4 21.4 MB
  • mp4~Get Your Files Here !/5 - Automating Security Operations with GenAI/3 -Case study Automated Incident Reporting.mp4 21.0 MB
  • mp4~Get Your Files Here !/7 - Advanced Security Reporting with GenAI/3 -Effective Communication of Security Posture.mp4 20.5 MB
  • mp4~Get Your Files Here !/9 - Building an AI-Powered Security Strategy/3 -Trends and Innovations in AI Security.mp4 20.3 MB
  • mp4~Get Your Files Here !/2 - Introduction to GenAI in Cybersecurity/4 -Introducing Microsoft Security Copilot.mp4 19.8 MB
  • mp4~Get Your Files Here !/6 - GenAI for Proactive Threat Hunting/3 -Integrating Threat Hunting with Microsoft Sentinel.mp4 19.4 MB
  • mp4~Get Your Files Here !/7 - Advanced Security Reporting with GenAI/1 -Creating Executive-Level Reports.mp4 19.2 MB
  • mp4~Get Your Files Here !/10 - Course conclusion/3 -Certification and Career Guidance.mp4 19.1 MB
  • mp4~Get Your Files Here !/1 - Introduction/5 -Important Note and considerations.mp4 18.6 MB
  • mp4~Get Your Files Here !/4 - GenAI for Threat Detection and Response/2 -Automating Threat Intelligence with GenAI.mp4 18.4 MB
  • mp4~Get Your Files Here !/9 - Building an AI-Powered Security Strategy/2 -Enhancing Existing Tools with Copilot.mp4 18.1 MB
【影视】 [Coursera] Python for Cybersecurity Specialization - 5 course series
收录时间:2024-05-20 文档个数:290 文档大小:1.2 GB 最近下载:2025-05-15 人气:5313 磁力链接
  • mp4command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_03_alternative-protocol.mp4 61.8 MB
  • mp4credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_05_network-sniffing.mp4 42.0 MB
  • mp4pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_04_network-scanning.mp4 32.5 MB
  • mp4python-for-active-defense/02_python-for-active-defense-network/01_network/01_05_protocol-decoding.mp4 31.5 MB
  • mp4python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_07_behavioral-analytics.mp4 29.2 MB
  • mp4execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_03_registry-autorun.mp4 29.0 MB
  • mp4execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_05_hijacked-execution-flow.mp4 27.5 MB
  • mp4pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_06_dns-exploration.mp4 27.3 MB
  • mp4python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_05_system-activity-monitoring.mp4 26.6 MB
  • mp4python-for-active-defense/02_python-for-active-defense-network/01_network/01_03_pcap-collection.mp4 26.0 MB
  • mp4command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_03_encrypted-channel.mp4 25.8 MB
  • mp4execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_05_scheduled-execution.mp4 25.8 MB
  • mp4credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_03_user-account-discovery.mp4 25.4 MB
  • mp4execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_03_logon-scripts.mp4 24.6 MB
  • mp4command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_03_data-encryption.mp4 23.6 MB
  • mp4execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_05_alternate-data-streams.mp4 22.4 MB
  • mp4pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_03_default-account-discovery.mp4 21.7 MB
  • mp4pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_05_autorun-scripts.mp4 21.2 MB
  • mp4execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_03_impair-avs.mp4 20.8 MB
  • mp4credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_03_credentials-from-web-browsers.mp4 20.7 MB
【影视】 [LiveLessons] The Complete Cybersecurity Bootcamp, 2nd Edition [En]
收录时间:2024-03-28 文档个数:290 文档大小:6.5 GB 最近下载:2025-05-15 人气:850 磁力链接
  • mp429.2 Hacking iOS.mp4 86.6 MB
  • mp417.13 Performing SMTP and DNS Enumeration.mp4 80.0 MB
  • mp421.3 Exploring Wireless Threats.mp4 79.0 MB
  • mp433.2 Understanding IoT Attacks.mp4 76.8 MB
  • mp417.14 Conducting Additional Enumeration Techniques.mp4 75.8 MB
  • mp433.1 Introducing IoT Concepts.mp4 74.4 MB
  • mp429.1 Understanding Mobile Platform Attack Vectors.mp4 73.4 MB
  • mp417.10 Performing SNMP Enumeration.mp4 71.8 MB
  • mp417.3 Understanding Host Discovery.mp4 69.7 MB
  • mp45.6 Analyzing Computer Incident Response Teams (CSIRTs).mp4 68.5 MB
  • mp417.6 Scanning Beyond IDS and Firewall.mp4 68.2 MB
  • mp427.5 Cracking Passwords with John the Ripper.mp4 66.1 MB
  • mp47.8 Understanding the MITRE ATT&CK Framework.mp4 65.8 MB
  • mp429.3 Hacking Android OS.mp4 63.8 MB
  • mp420.4 Exploring SQL Injection Tools.mp4 63.3 MB
  • mp421.2 Understanding Wireless Encryption.mp4 62.7 MB
  • mp417.12 Performing NTP and NFS Enumeration.mp4 61.8 MB
  • mp416.10 Performing Footprinting through Social Engineering.mp4 59.1 MB
  • mp48.3 Understanding Evidence Collection.mp4 57.2 MB
  • mp421.6 Hacking Bluetooth.mp4 52.3 MB
【影视】 [ WebToolTip.com ] Udemy - Essential Cybersecurity For Everyone - Stay Safe Online
收录时间:2025-03-13 文档个数:19 文档大小:2.1 GB 最近下载:2025-05-15 人气:516 磁力链接
  • mp4~Get Your Files Here !/4 - Creating Strong Passwords and Enhancing Overall Security/9 - Password Security.mp4 250.4 MB
  • mp4~Get Your Files Here !/11 - IoT Security/16 - Securing Smart Devices in the Digital Age.mp4 235.4 MB
  • mp4~Get Your Files Here !/7 - Data Backup and Recovery Essentials/12 - Safeguarding Your Data Backup and Restoration.mp4 209.9 MB
  • mp4~Get Your Files Here !/9 - Cybersecurity for Travelers/14 - Staying Secure While Traveling Online.mp4 191.8 MB
  • mp4~Get Your Files Here !/6 - Email Security Essentials/11 - Protecting Your Email from Threats.mp4 175.4 MB
  • mp4~Get Your Files Here !/10 - Social Media Security/15 - Protecting Your Privacy on Social Media.mp4 172.2 MB
  • mp4~Get Your Files Here !/5 - Safe Internet Browsing/10 - Safe Internet Browsing.mp4 126.9 MB
  • mp4~Get Your Files Here !/12 - Steps to Take After a Cybersecurity Breach/17 - What to Do After a Cybersecurity Breach.mp4 116.9 MB
  • mp4~Get Your Files Here !/1 - Introduction Essential Cybersecurity for everyone stay safe online/1 - Introduction.mp4 107.3 MB
  • mp4~Get Your Files Here !/2 - Understanding Cyber Threats/2 - Understanding Cyber threats.mp4 98.9 MB
  • mp4~Get Your Files Here !/8 - Securing Your Online Accounts/13 - Best Practices for Protecting Online Accounts.mp4 94.5 MB
  • mp4~Get Your Files Here !/3 - Protecting Personal Devices/3 - Introduction to protecting personal devices.mp4 76.2 MB
  • mp4~Get Your Files Here !/3 - Protecting Personal Devices/6 - Keeping Software Operating Systems Updated Strengthening Your Digital Defense.mp4 58.9 MB
  • mp4~Get Your Files Here !/3 - Protecting Personal Devices/4 - Securing Computers and Laptops.mp4 43.3 MB
  • mp4~Get Your Files Here !/3 - Protecting Personal Devices/7 - Configuring Firewalls Securing Your Devices and Home Network.mp4 36.6 MB
  • mp4~Get Your Files Here !/3 - Protecting Personal Devices/5 - Securing Smartphones and Laptops.mp4 30.1 MB
  • mp4~Get Your Files Here !/3 - Protecting Personal Devices/8 - Ensuring Safe and Secure WiFi Connections.mp4 27.5 MB
  • urlGet Bonus Downloads Here.url 180 Bytes
  • txt~Get Your Files Here !/Bonus Resources.txt 70 Bytes
【影视】 Theoretical Foundations of AI in Cybersecurity
收录时间:2024-07-08 文档个数:362 文档大小:6.1 GB 最近下载:2025-05-15 人气:11053 磁力链接
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/3. Fundamental Theories of AI/7. Case Study Revolutionizing Cybersecurity with Natural Language Processing.mp4 57.4 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/7. Deep Learning for Cyber Defense/11. Case Study Unraveling the Challenges of Deploying Deep Learning Models.mp4 52.3 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/7. Deep Learning for Cyber Defense/3. Case Study Enhancing Cybersecurity with Neural Networks.mp4 49.2 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/13. AI in Vulnerability Management/9. Case Study AI-Driven Transformation in Vulnerability Management.mp4 48.5 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/4. Cybersecurity Fundamentals/4. Types of Cyber Threats.mp4 48.4 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/15. AI in Network Security/9. Case Study AI in Network Security.mp4 48.1 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/2. Introduction to Cybersecurity and AI/8. Key Concepts and Terminologies.mp4 47.1 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/10. AI for Intrusion Detection Systems (IDS)/7. Case Study Implementing AI-Based Intrusion Detection Systems.mp4 46.9 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/2. Introduction to Cybersecurity and AI/4. Overview of Cybersecurity.mp4 46.5 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/10. AI for Intrusion Detection Systems (IDS)/9. Case Study Enhancing Cybersecurity with AI-Powered Intrusion Detection Systems.mp4 46.2 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/4. Cybersecurity Fundamentals/11. Case Study Revamping Cybersecurity Strategy at TechNova.mp4 44.9 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/5. Intersection of AI and Cybersecurity/11. Case Study Integrating AI for Enhanced Cybersecurity.mp4 44.4 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/7. Deep Learning for Cyber Defense/2. Neural Networks in Cybersecurity.mp4 44.2 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/11. AI for Threat Hunting/8. Case Studies and Examples.mp4 43.8 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/8. Natural Language Processing in Cybersecurity/3. Case Study Enhancing Cybersecurity Threat Intelligence.mp4 43.7 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/6. Machine Learning in Cybersecurity/2. Supervised Learning for Threat Detection.mp4 43.5 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/8. Natural Language Processing in Cybersecurity/11. Case Study Overcoming NLP Limitations in Cybersecurity.mp4 43.5 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/14. AI and Cyber Threat Intelligence/6. Theoretical Models and Techniques.mp4 43.4 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/9. Reinforcement Learning in Cyber Defense/5. Case Study Revolutionizing Cybersecurity with Reinforcement Learning.mp4 43.2 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/2. Introduction to Cybersecurity and AI/7. Case Study AI in Cybersecurity.mp4 42.9 MB
【影视】 [ DevCourseWeb.com ] Udemy - Intro To Cybersecurity In Healthcare (2 Of 2),Plain and Simple
收录时间:2024-02-03 文档个数:26 文档大小:953.6 MB 最近下载:2025-05-15 人气:1322 磁力链接
  • mp4~Get Your Files Here !/3 - Ransomware and Cryptocurrency.mp4 309.9 MB
  • mp4~Get Your Files Here !/7 - Testing Your Vulnerabilities.mp4 150.2 MB
  • mp4~Get Your Files Here !/2 - Malware.mp4 136.5 MB
  • mp4~Get Your Files Here !/5 - Boston Childrens Hack The Response.mp4 123.0 MB
  • mp4~Get Your Files Here !/8 - HIPAA.mp4 70.3 MB
  • mp4~Get Your Files Here !/4 - Boston Childrens Hack The Issue.mp4 52.4 MB
  • mp4~Get Your Files Here !/6 - Boston Childrens Hack Lessons Learned.mp4 50.7 MB
  • mp4~Get Your Files Here !/1 - Introduction.mp4 49.6 MB
  • mp4~Get Your Files Here !/9 - Conclusions.mp4 10.9 MB
  • vtt~Get Your Files Here !/3 - Ransomware and Cryptocurrency English.vtt 24.5 kB
  • vtt~Get Your Files Here !/7 - Testing Your Vulnerabilities English.vtt 12.5 kB
  • html~Get Your Files Here !/13 - IN THE NEWS Some Straight Talk on Ransomware in Health Care.html 11.3 kB
  • vtt~Get Your Files Here !/2 - Malware English.vtt 10.7 kB
  • vtt~Get Your Files Here !/5 - Boston Childrens Hack The Response English.vtt 10.1 kB
  • vtt~Get Your Files Here !/8 - HIPAA English.vtt 5.9 kB
  • html~Get Your Files Here !/12 - IN THE NEWS.html 5.8 kB
  • vtt~Get Your Files Here !/6 - Boston Childrens Hack Lessons Learned English.vtt 4.6 kB
  • vtt~Get Your Files Here !/1 - Introduction English.vtt 4.5 kB
  • vtt~Get Your Files Here !/4 - Boston Childrens Hack The Issue English.vtt 4.3 kB
  • html~Get Your Files Here !/10 - IN THE NEWS Cyberattacks hit midsize hospitals hardest.html 4.2 kB
【影视】 Lynda - Practical Cybersecurity
收录时间:2017-02-10 文档个数:45 文档大小:244.8 MB 最近下载:2025-05-15 人气:1388 磁力链接
  • mp48. Monitoring Network Activity/164982_08_03_XR15_packets.mp4 13.1 MB
  • mp47. Checking for Common Mistakes in Web Apps/164982_07_02_XR15_scan.mp4 11.9 MB
  • mp43. Personal Firewalls/164982_03_02_XR15_mswf.mp4 10.7 MB
  • mp43. Personal Firewalls/164982_03_06_XR15_iptables.mp4 9.8 MB
  • mp43. Personal Firewalls/164982_03_04_XR15_advrules.mp4 9.5 MB
  • mp47. Checking for Common Mistakes in Web Apps/164982_07_01_XR15_intro.mp4 9.4 MB
  • mp46. Checking Hosts for Known Vulnerabilities/164982_06_04_XR15_scan.mp4 8.6 MB
  • mp41. Why Cybersecurity/164982_01_03_XR15_attack.mp4 8.6 MB
  • mp41. Why Cybersecurity/164982_01_01_XR15_cyber.mp4 8.4 MB
  • mp48. Monitoring Network Activity/164982_08_05_XR151_intruder.mp4 8.3 MB
  • mp48. Monitoring Network Activity/164982_08_04_XR15_filters.mp4 8.2 MB
  • mp42. Antivirus/164982_02_06_XR15_schedule.mp4 8.2 MB
  • mp43. Personal Firewalls/164982_03_03_XR15_advfw.mp4 7.9 MB
  • mp40. Introduction/164982_00_01_WX30_welcome.mp4 6.9 MB
  • mp43. Personal Firewalls/164982_03_05_XR15_zedlan.mp4 6.7 MB
  • mp44. Knowing What Is on Your Network/164982_04_05_XR15_zenmap.mp4 6.3 MB
  • mp45. Network Communications and Detecting Intruders/164982_05_04_XR15_honeypot.mp4 6.0 MB
  • mp45. Network Communications and Detecting Intruders/164982_05_02_XR15_filexfer.mp4 5.8 MB
  • mp48. Monitoring Network Activity/164982_08_02_XR15_capture.mp4 5.6 MB
  • mp42. Antivirus/164982_02_05_XR15_avsettings.mp4 5.5 MB
【影视】 Cybersecurity {AM}
收录时间:2017-02-11 文档个数:39 文档大小:230.5 MB 最近下载:2025-05-15 人气:1804 磁力链接
  • mp40 Introduction/369625_00_03_XR15_Reference.mp4 10.2 MB
  • mp43 Architecting Security/369625_03_05_XR15_Cloud_Attribute_Taxonomy.mp4 10.1 MB
  • mp43 Architecting Security/369625_03_01_XR15_Introduction_to_SABSA.mp4 9.9 MB
  • mp42 Cloud Security Guidance/369625_02_16_SO30_XR30_Solution.mp4 9.9 MB
  • mp42 Cloud Security Guidance/369625_02_03_XR15_Information_Management.mp4 9.8 MB
  • mp41 Cloud Fundamentals/369625_01_01_XR15_Essential_Characteristics.mp4 9.6 MB
  • mp41 Cloud Fundamentals/369625_01_06_XR15_Cloud_Incidents.mp4 9.4 MB
  • mp42 Cloud Security Guidance/369625_02_02_XR15_Legal_Compliance_and_Audit.mp4 8.9 MB
  • mp41 Cloud Fundamentals/369625_01_09_XR15_Cloud_Trust.mp4 8.8 MB
  • mp42 Cloud Security Guidance/369625_02_07_XR15_Incident_Response.mp4 8.8 MB
  • mp42 Cloud Security Guidance/369625_02_11_XR15_Identity_in_the_Cloud.mp4 8.4 MB
  • mp42 Cloud Security Guidance/369625_02_08_XR15_Application_Security.mp4 8.3 MB
  • mp42 Cloud Security Guidance/369625_02_13_XR15_Virtualisation.mp4 8.2 MB
  • mp42 Cloud Security Guidance/369625_02_05_XR15_Traditional_Security_BCP_and_DR.mp4 8.2 MB
  • mp42 Cloud Security Guidance/369625_02_12_XR15_Cloud_Access_Control.mp4 7.9 MB
  • mp41 Cloud Fundamentals/369625_01_02_XR15_Infrastructure_as_a_Service.mp4 7.6 MB
  • mp43 Architecting Security/369625_03_02_XR15_Fast_Tracker.mp4 7.4 MB
  • mp41 Cloud Fundamentals/369625_01_05_XR151_Deployment_Models.mp4 6.7 MB
  • mp42 Cloud Security Guidance/369625_02_10_XR15_Encryption_and_Key_Management.mp4 6.6 MB
  • mp43 Architecting Security/369625_03_03_XR15_SABSA_Attributes.mp4 6.3 MB
【影视】 [ FreeCourseWeb.com ] Udemy - Cybersecurity Habits Masterclass
收录时间:2022-04-10 文档个数:93 文档大小:2.1 GB 最近下载:2025-05-15 人气:1566 磁力链接
  • mp4~Get Your Files Here !/3. Skepticism/4. Slow Down And Frown.mp4 73.5 MB
  • mp4~Get Your Files Here !/11. Conclusion/1. Well Awareiors.mp4 71.5 MB
  • mp4~Get Your Files Here !/1. Introduction/1. Introduction.mp4 67.0 MB
  • mp4~Get Your Files Here !/4. Vigilance/2. The Only Thing We Have To Fear.mp4 66.7 MB
  • mp4~Get Your Files Here !/4. Vigilance/1. The Face Of The Enemy.mp4 66.5 MB
  • mp4~Get Your Files Here !/5. Secrecy/2. Making It Personal.mp4 65.7 MB
  • mp4~Get Your Files Here !/2. Literacy/5. Habits And Recipes.mp4 64.7 MB
  • mp4~Get Your Files Here !/3. Skepticism/1. Zero Trust.mp4 64.5 MB
  • mp4~Get Your Files Here !/8. Community/4. Habits And Recipes.mp4 57.4 MB
  • mp4~Get Your Files Here !/8. Community/1. United We Stand.mp4 54.0 MB
  • mp4~Get Your Files Here !/7. Diligence/3. Random Acts of Security.mp4 53.4 MB
  • mp4~Get Your Files Here !/7. Diligence/2. Journaling.mp4 53.4 MB
  • mp4~Get Your Files Here !/9. Mirroring/5. Habits And Recipes.mp4 52.0 MB
  • mp4~Get Your Files Here !/6. Culture/1. Culture Eats Cybersecurity For Breakfast.mp4 51.4 MB
  • mp4~Get Your Files Here !/10. Deception/1. Know Thy Enemy.mp4 49.4 MB
  • mp4~Get Your Files Here !/9. Mirroring/3. Blindspots.mp4 49.1 MB
  • mp4~Get Your Files Here !/3. Skepticism/2. The Pygmailion Effect.mp4 48.9 MB
  • mp4~Get Your Files Here !/6. Culture/5. Habits And Recipes.mp4 48.0 MB
  • mp4~Get Your Files Here !/2. Literacy/1. Fearless Learning.mp4 47.9 MB
  • mp4~Get Your Files Here !/6. Culture/2. The Hermit Crab Shell.mp4 46.7 MB
【影视】 [TutorialPace.com] Lynda - Cybersecurity with Cloud Computing - [TP]
收录时间:2022-02-20 文档个数:38 文档大小:371.6 MB 最近下载:2025-05-15 人气:2055 磁力链接
  • mp400. Introduction/00_01 - Welcome.mp4 17.4 MB
  • mp400. Introduction/00_03 - Reference sites.mp4 16.6 MB
  • mp401. Cloud Fundamentals/01_01 - Defining the essential characteristics of cloud.mp4 15.8 MB
  • mp402. Cloud Security Guidance/02_03 - Managing information and data security.mp4 15.6 MB
  • mp403. Architecting Security/03_05 - Introducing cloud attribute taxonomy.mp4 15.5 MB
  • mp403. Architecting Security/03_01 - Introducing SABSA.mp4 15.3 MB
  • mp401. Cloud Fundamentals/01_06 - Identifying cloud incidents.mp4 15.2 MB
  • mp401. Cloud Fundamentals/01_09 - Defining trust models for cloud.mp4 14.0 MB
  • mp402. Cloud Security Guidance/02_16 - Solution Cloud security knowledge.mp4 13.8 MB
  • mp402. Cloud Security Guidance/02_02 - Complying with legal and audit requrements.mp4 13.1 MB
  • mp402. Cloud Security Guidance/02_11 - Verifying identity in the cloud.mp4 13.1 MB
  • mp402. Cloud Security Guidance/02_07 - Managing incident response.mp4 12.9 MB
  • mp402. Cloud Security Guidance/02_13 - Implementing virtualization.mp4 12.9 MB
  • mp402. Cloud Security Guidance/02_12 - Controlling cloud access.mp4 12.5 MB
  • mp402. Cloud Security Guidance/02_08 - Maximizing application security.mp4 12.3 MB
  • mp403. Architecting Security/03_02 - Using Fast Tracker.mp4 12.0 MB
  • mp402. Cloud Security Guidance/02_05 - Comparing traditional IT, BCP, and DR.mp4 12.0 MB
  • mp401. Cloud Fundamentals/01_02 - Understanding infrastructure as a service.mp4 11.9 MB
  • mp401. Cloud Fundamentals/01_05 - Discovering deployment models.mp4 11.4 MB
  • mp402. Cloud Security Guidance/02_10 - Managing encryption and keys.mp4 10.8 MB
【影视】 Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training
收录时间:2024-07-04 文档个数:135 文档大小:2.5 GB 最近下载:2025-05-15 人气:946 磁力链接
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/6. Azure Security Benchmark - Microsoft Certified Cybersecurity-1.mp4 113.5 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/2. Hybrid Environmental Security Strategies - Microsoft Certifi.mp4 63.8 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/1. Specify Priorities for Mitigating Threats to Apps - Microsof-1.mp4 62.3 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/6. Designing a Regulatory Compliance Strategy/4. Implementing Azure Policy - Microsoft Certified Cybersecurit.mp4 59.0 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/7. Evaluating and Managing Security Postures/6. Mitigating Identified Risks - Microsoft Certified Cybersecur-1.mp4 53.6 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/4. Traffic Filtering and Segmentation Strategies - Microsoft Ce-1.mp4 53.4 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/4. Priorities For Mitigating Threats To Data - Microsoft Certif-1.mp4 53.4 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/5. Azure Best Practices for Network Security - Microsoft Certif-1.mp4 52.2 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/5. Hybrid Infrastructure - Microsoft Certified Cybersecurity Ar-1.mp4 50.4 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/6. Designing a Regulatory Compliance Strategy/6. Translating Privacy Requirements - Microsoft Certified Cyber.mp4 49.7 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/9. Designing a Strategy for Securing SaaS, PaaS, and IaaS Services/1. Security Baselines for SaaS, PaaS, and IaaS services - Micro.mp4 48.3 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/3. Translating Business Goals into Security Requirements - Micr.mp4 47.9 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/7. Securing Privileged Access Using RaMP - Microsoft Certified -1.mp4 47.8 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/2. Security Operations - Microsoft Certified Cybersecurity Arch-1.mp4 47.0 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/4. Designing a Security Operations Strategy/5. SIEMSOAR Strategy - Microsoft Certified Cybersecurity Archit.mp4 46.3 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/2. Translating Requirements - Microsoft Certified Cybersecurity.mp4 46.2 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/3. Security Strategy for Applications and APIs - Microsoft Cert-1.mp4 44.6 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/5. Designing an Identity Security Strategy/1. Strategy for Access to Cloud Resources - Microsoft Certified.mp4 43.0 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/7. Evaluating and Managing Security Postures/4. Designing Security for an Azure Landing Zone - Microsoft Cer.mp4 42.8 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/4. Designing a Security Operations Strategy/3. Logging and Auditing Strategy - Microsoft Certified Cybersec.mp4 42.3 MB
【影视】 [ TutSala.com ] Linkedin - Crisis Communication Planning After a Ransomware or Other Cybersecurity Attack
收录时间:2023-12-17 文档个数:23 文档大小:83.2 MB 最近下载:2025-05-15 人气:459 磁力链接
  • mp4~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/02 - Prepare your team to address a crisis.mp4 14.0 MB
  • mp4~Get Your Files Here !/02 - 1. The Impact of Cyberattacks/02 - Determining who is on your team when a cyberattack occurs.mp4 11.4 MB
  • mp4~Get Your Files Here !/02 - 1. The Impact of Cyberattacks/01 - Why cyberattacks impact every organization.mp4 11.1 MB
  • mp4~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/01 - What to say and to whom at onset.mp4 10.7 MB
  • mp4~Get Your Files Here !/04 - 3. Evaluate and Train/01 - Continue to evaluate after a training.mp4 9.1 MB
  • mp4~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/04 - What to tell people after the attack.mp4 7.4 MB
  • mp4~Get Your Files Here !/04 - 3. Evaluate and Train/02 - Design crisis scenario-based training for higher retention.mp4 6.8 MB
  • mp4~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/03 - Practice to improve crisis communications.mp4 5.3 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Anyone can suffer a ransomware or other cyberattack.mp4 5.0 MB
  • mp4~Get Your Files Here !/05 - Conclusion/01 - You can do this.mp4 2.3 MB
  • pdf~Get Your Files Here !/Ex_Files_Crisis_Communication_Planning_Cybersecurity/Exercise Files/Questions to Ask Your Team.pdf 31.1 kB
  • srt~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/02 - Prepare your team to address a crisis.srt 10.6 kB
  • srt~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/01 - What to say and to whom at onset.srt 8.6 kB
  • srt~Get Your Files Here !/02 - 1. The Impact of Cyberattacks/02 - Determining who is on your team when a cyberattack occurs.srt 7.3 kB
  • srt~Get Your Files Here !/02 - 1. The Impact of Cyberattacks/01 - Why cyberattacks impact every organization.srt 7.0 kB
  • srt~Get Your Files Here !/04 - 3. Evaluate and Train/02 - Design crisis scenario-based training for higher retention.srt 6.3 kB
  • srt~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/04 - What to tell people after the attack.srt 5.5 kB
  • srt~Get Your Files Here !/04 - 3. Evaluate and Train/01 - Continue to evaluate after a training.srt 5.2 kB
  • srt~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/03 - Practice to improve crisis communications.srt 3.8 kB
  • srt~Get Your Files Here !/01 - Introduction/01 - Anyone can suffer a ransomware or other cyberattack.srt 2.5 kB
【影视】 MS Cybersecurity Pro Track Enterprise Security Fundamentals
收录时间:2021-03-14 文档个数:91 文档大小:1.0 GB 最近下载:2025-05-15 人气:1875 磁力链接
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/02 Understanding the cybersecurity landscape/003 Current Cybersecurity Landscape.mp4 169.2 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/03 Red Team_ Penetration, lateral movement, escalation, and exfiltration/008 Red Team Kill Chain.mp4 142.4 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/014 Attack Detection.mp4 89.9 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/011 Blue Team Kill Chain.mp4 70.3 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/05 Beyond The Breach/016 Organization Preparations.mp4 68.5 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/012 Restrict Privilege Escalation.mp4 59.9 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/02 Understanding the cybersecurity landscape/005 Cost of Breach.mp4 59.5 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/03 Red Team_ Penetration, lateral movement, escalation, and exfiltration/007 The Attacker's Objective.mp4 55.8 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/02 Understanding the cybersecurity landscape/004 Assume Compromise Philosophy.mp4 53.5 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/05 Beyond The Breach/017 Developing and Maintaining Policies.mp4 50.7 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/013 Restrict Lateral Movement.mp4 43.0 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/05 Beyond The Breach/015 CIA Triad.mp4 30.7 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/03 Red Team_ Penetration, lateral movement, escalation, and exfiltration/006 Red Team versus Blue Team exercises.mp4 30.4 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/01 Introduction/002 Course overview.mp4 25.3 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/010 Blue Team.mp4 22.9 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/03 Red Team_ Penetration, lateral movement, escalation, and exfiltration/009 Document Vulnerabilities.mp4 10.6 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/01 Introduction/001 Instructor introduction.mp4 9.3 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/07 Conclusion/018 Bonus Lecture_ What Next_.mp4 3.2 MB
  • pdf[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/014 AttackDetection.pdf 709.3 kB
  • pdf[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/011 BlueTeamKillChain.pdf 695.5 kB
【影视】 AI-Enabled Programming, Networking, and Cybersecurity
收录时间:2024-11-28 文档个数:33 文档大小:690.1 MB 最近下载:2025-05-15 人气:1797 磁力链接
  • mp4Lesson 2 Using AI for Cybersecurity/004. 2.3 Securing AI Implementations.mp4 66.1 MB
  • mp4Lesson 1 Introduction to AI-powered Tools/007. 1.6 Introducing Embedding Models.mp4 41.5 MB
  • mp4Lesson 1 Introduction to AI-powered Tools/006. 1.5 Introducing Retrieval Augmented Generation (RAG).mp4 39.5 MB
  • mp4Lesson 2 Using AI for Cybersecurity/005. 2.4 Exploring Network Security Processes Incorporating AI Tools.mp4 33.3 MB
  • mp4Lesson 1 Introduction to AI-powered Tools/003. 1.2 Large Language Models (LLMs) and Small Language Models (SLMs).mp4 31.4 MB
  • mp4Lesson 3 Using AI for Software Development/008. 3.7 Prompt Engineering for Software Development.mp4 31.0 MB
  • mp4Lesson 1 Introduction to AI-powered Tools/004. 1.3 Introducing LangChain, LangGraph, Llama Index, and Other Orchestration Frameworks.mp4 28.4 MB
  • mp4Lesson 4 Using AI for Networking/002. 4.1 Exploring how AI is Revolutionizing Networking.mp4 26.9 MB
  • mp4Lesson 1 Introduction to AI-powered Tools/009. 1.8 Introducing Semantic Search.mp4 25.6 MB
  • mp4Lesson 4 Using AI for Networking/003. 4.2 Using GitHub Copilot for Programming Tasks Related to Networking.mp4 23.8 MB
  • mp4Lesson 4 Using AI for Networking/005. 4.4 Prompt Engineering for Networking.mp4 23.6 MB
  • mp4Lesson 5 Future Trends and Additional Emerging Technologies/003. 5.2 Regulatory and Policy Frameworks.mp4 23.0 MB
  • mp4Lesson 3 Using AI for Software Development/005. 3.4 Generating Code from a Prompt.mp4 22.0 MB
  • mp4Introduction/001. AI-Enabled Programming, Networking, and Cybersecurity Introduction.mp4 21.4 MB
  • mp4Lesson 1 Introduction to AI-powered Tools/001. Learning objectives.mp4 19.7 MB
  • mp4Lesson 1 Introduction to AI-powered Tools/008. 1.7 Introducing Vector Databases - pgvector, Chroma, MongoDB Atlas Vector Search, and others.mp4 18.5 MB
  • mp4Lesson 1 Introduction to AI-powered Tools/002. 1.1 Overview of the Evolution of AI-driven Tools.mp4 18.4 MB
  • mp4Summary/001. AI-Enabled Programming, Networking, and Cybersecurity Summary.mp4 18.1 MB
  • mp4Lesson 1 Introduction to AI-powered Tools/005. 1.4 An Overview of Open-source AI Models and Hugging Face.mp4 17.9 MB
  • mp4Lesson 5 Future Trends and Additional Emerging Technologies/002. 5.1 Exploring Additional Applications of AI in Emerging Technologies.mp4 16.9 MB
【影视】 [ FreeCourseWeb.com ] Udemy - Cybersecurity Solution Architecture 101
收录时间:2025-05-06 文档个数:15 文档大小:1.3 GB 最近下载:2025-05-15 人气:75 磁力链接
  • mp4~Get Your Files Here !/2 -Fundamental Concepts & Terminology.mp4 157.1 MB
  • mp4~Get Your Files Here !/6 -Endpoint & Device Security.mp4 123.5 MB
  • mp4~Get Your Files Here !/5 -Identity & Access Management (IAM) Basics.mp4 111.4 MB
  • mp4~Get Your Files Here !/12 -Security Operations & Incident Response Overview.mp4 104.7 MB
  • mp4~Get Your Files Here !/7 -Infrastructure Vulnerability Management.mp4 99.1 MB
  • mp4~Get Your Files Here !/13 -Wrap-Up & Preparation for 201 Course.mp4 97.2 MB
  • mp4~Get Your Files Here !/10 -Secure Application Foundations.mp4 91.1 MB
  • mp4~Get Your Files Here !/3 -The Threat Landscape.mp4 90.2 MB
  • mp4~Get Your Files Here !/1 -Introduction to Cybersecurity & the Role of a Cybersecurity Solution Architect.mp4 86.2 MB
  • mp4~Get Your Files Here !/8 -Introduction to Cryptography.mp4 85.8 MB
  • mp4~Get Your Files Here !/9 -Cloud Security Essentials.mp4 83.0 MB
  • mp4~Get Your Files Here !/11 -Basic Governance, Risk, & Compliance (GRC).mp4 74.4 MB
  • mp4~Get Your Files Here !/4 -Networking & Network Security Fundamentals.mp4 70.6 MB
  • urlGet Bonus Downloads Here.url 183 Bytes
  • txt~Get Your Files Here !/Bonus Resources.txt 70 Bytes
共10页 上一页 1 2 3 4 5 6 7 8 9 下一页