磁力管家

磁力管家
为您索检到186条磁力链接,耗时0毫秒。 rss

分享给好友

【影视】 [ FreeCourseWeb.com ] Translating Cybersecurity for SMBs - Using the NIST Cybersecurity Framework 2.0
收录时间:2024-05-28 文档个数:43 文档大小:127.0 MB 最近下载:2025-05-11 人气:1074 磁力链接
  • mp4~Get Your Files Here !/05 - 4. Identify/01 - Understand what you have.mp4 10.7 MB
  • mp4~Get Your Files Here !/04 - 3. Govern/02 - Roll out your guidance.mp4 8.8 MB
  • mp4~Get Your Files Here !/11 - Conclusion/01 - Build cybersecurity into your business.mp4 8.5 MB
  • mp4~Get Your Files Here !/04 - 3. Govern/01 - Set your cyber strategy.mp4 8.1 MB
  • mp4~Get Your Files Here !/06 - 5. Protect/02 - Guard your network.mp4 7.0 MB
  • mp4~Get Your Files Here !/06 - 5. Protect/01 - Secure your system.mp4 7.0 MB
  • mp4~Get Your Files Here !/07 - 6. Detect/01 - Know when things are off.mp4 6.9 MB
  • mp4~Get Your Files Here !/08 - 7. Respond/01 - Address cyber incidents.mp4 6.7 MB
  • mp4~Get Your Files Here !/08 - 7. Respond/02 - Keep everyone in the loop.mp4 6.7 MB
  • mp4~Get Your Files Here !/09 - 8. Recover/01 - Get back to normal.mp4 6.6 MB
  • mp4~Get Your Files Here !/03 - 2. NIST Cybersecurity Framework 2.0/01 - Cybersecurity framework fundamentals.mp4 6.3 MB
  • mp4~Get Your Files Here !/10 - 9. Build Cyber Capabilities/01 - Determine your tier.mp4 6.2 MB
  • mp4~Get Your Files Here !/02 - 1. Cybersecurity in Your Business/02 - Understand your cyber risks.mp4 6.0 MB
  • mp4~Get Your Files Here !/03 - 2. NIST Cybersecurity Framework 2.0/02 - Leverage the cybersecurity framework.mp4 5.9 MB
  • mp4~Get Your Files Here !/10 - 9. Build Cyber Capabilities/02 - Define your profile.mp4 5.9 MB
  • mp4~Get Your Files Here !/02 - 1. Cybersecurity in Your Business/01 - Cornerstones of cybersecurity.mp4 5.4 MB
  • mp4~Get Your Files Here !/02 - 1. Cybersecurity in Your Business/03 - Prioritize your biggest risks.mp4 4.9 MB
  • mp4~Get Your Files Here !/10 - 9. Build Cyber Capabilities/03 - Create a plan.mp4 3.4 MB
  • mp4~Get Your Files Here !/01 - Introduction/02 - What you should know.mp4 3.0 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Leverage the NIST CSF to protect what matters most.mp4 2.7 MB
【影视】 [ CourseLala.com ] Linkedin - Cybersecurity Awareness - Web3, Crypto, and NFTs
收录时间:2024-07-23 文档个数:34 文档大小:85.2 MB 最近下载:2025-05-10 人气:485 磁力链接
  • mp4~Get Your Files Here !/02 - 1. CYA Cover Your Assets/04 - Thinking like an attacker.mp4 8.7 MB
  • mp4~Get Your Files Here !/03 - 2. Wallet Security/01 - Custodial wallets.mp4 7.7 MB
  • mp4~Get Your Files Here !/03 - 2. Wallet Security/04 - Hardware wallets.mp4 7.3 MB
  • mp4~Get Your Files Here !/03 - 2. Wallet Security/02 - Hot wallets.mp4 6.9 MB
  • mp4~Get Your Files Here !/05 - 4. Traditional Web2 Attacks Used in Web3/02 - Website hijacking Spoofing.mp4 6.2 MB
  • mp4~Get Your Files Here !/06 - Conclusion/01 - Key takeaways.mp4 5.7 MB
  • mp4~Get Your Files Here !/02 - 1. CYA Cover Your Assets/02 - Digital assets, part 2 NFTs.mp4 5.5 MB
  • mp4~Get Your Files Here !/04 - 3. Blockchain Specific AttacksScams/02 - Interacting with scam dappssmart contracts, part 2.mp4 5.5 MB
  • mp4~Get Your Files Here !/05 - 4. Traditional Web2 Attacks Used in Web3/01 - Phishing.mp4 5.4 MB
  • mp4~Get Your Files Here !/03 - 2. Wallet Security/03 - Demo Installing a hot wallet.mp4 5.4 MB
  • mp4~Get Your Files Here !/02 - 1. CYA Cover Your Assets/03 - Crypto wallets.mp4 5.2 MB
  • mp4~Get Your Files Here !/04 - 3. Blockchain Specific AttacksScams/01 - Interacting with scam dappssmart contracts, part 1.mp4 4.6 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Staying safe on your journey into Web3.mp4 3.4 MB
  • mp4~Get Your Files Here !/02 - 1. CYA Cover Your Assets/01 - Digital assets, part 1 Cryptocurrencies.mp4 3.3 MB
  • mp4~Get Your Files Here !/01 - Introduction/02 - What to know before you begin.mp4 2.6 MB
  • mp4~Get Your Files Here !/06 - Conclusion/02 - Next steps.mp4 1.7 MB
  • srt~Get Your Files Here !/03 - 2. Wallet Security/02 - Hot wallets.srt 6.2 kB
  • srt~Get Your Files Here !/03 - 2. Wallet Security/04 - Hardware wallets.srt 6.1 kB
  • srt~Get Your Files Here !/03 - 2. Wallet Security/01 - Custodial wallets.srt 5.1 kB
  • srt~Get Your Files Here !/04 - 3. Blockchain Specific AttacksScams/02 - Interacting with scam dappssmart contracts, part 2.srt 4.9 kB
【影视】 [FreeCoursesOnline.Me] [Skillshare] Cybersecurity Data Science [FCO]
收录时间:2021-05-07 文档个数:32 文档大小:353.4 MB 最近下载:2025-05-10 人气:829 磁力链接
  • mp42-Obtaining a malware dataset.mp4 37.9 MB
  • mp48-Tfidf.mp4 25.9 MB
  • mp41-Downloading and installing virtual box and windows image.mp4 24.9 MB
  • mp416-Malconv.mp4 23.7 MB
  • mp415-Ngram classifier.mp4 22.9 MB
  • mp44-Static and dynamic analysis.mp4 21.3 MB
  • mp414-Hash grams.mp4 18.3 MB
  • mp40-Course introduction.mp4 15.7 MB
  • mp47-Dumping using pefile.mp4 14.3 MB
  • mp419-Isolation forest.mp4 13.3 MB
  • mp417-Section 1 end.mp4 12.7 MB
  • mp420-Section 2 end.mp4 12.4 MB
  • mp49-Train test split.mp4 11.7 MB
  • mp413-N gram background.mp4 11.4 MB
  • mp410-Training a classifier.mp4 10.3 MB
  • mp412-Thresholding.mp4 10.0 MB
  • mp43-Obtaining a benign dataset.mp4 9.5 MB
  • mp423-CAPTCHA recognizer.mp4 9.3 MB
  • mp418-Kdd cup dataset.mp4 8.4 MB
  • mp424-Course end.mp4 8.4 MB
【影视】 [ CourseLala.com ] Udemy - Personal Digital Security Everyone Must Have - Cybersecurity
收录时间:2022-04-12 文档个数:76 文档大小:1.5 GB 最近下载:2025-05-10 人气:725 磁力链接
  • mp4~Get Your Files Here !/02 - Secure your computer from unauthorized access/001 Social Engineering.mp4 157.3 MB
  • mp4~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/007 Secure your Wi-Fi at Home (Video HD).mp4 103.2 MB
  • mp4~Get Your Files Here !/02 - Secure your computer from unauthorized access/003 Use strong passwords.mp4 93.7 MB
  • mp4~Get Your Files Here !/03 - What is Malware and its types/003 Spyware.mp4 66.9 MB
  • mp4~Get Your Files Here !/06 - Secure your Smartphone/003 Communicating Securely with your Smartphone.mp4 64.7 MB
  • mp4~Get Your Files Here !/03 - What is Malware and its types/002 Adware.mp4 63.9 MB
  • mp4~Get Your Files Here !/05 - Email Security/002 Fishing.mp4 57.8 MB
  • mp4~Get Your Files Here !/02 - Secure your computer from unauthorized access/012 Be cautious.mp4 54.8 MB
  • mp4~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/002 Tips for buying online.mp4 46.0 MB
  • mp4~Get Your Files Here !/06 - Secure your Smartphone/001 Purses, Wallets, Smartphones.mp4 43.1 MB
  • mp4~Get Your Files Here !/03 - What is Malware and its types/001 Trojan Horse.mp4 39.6 MB
  • mp4~Get Your Files Here !/03 - What is Malware and its types/007 Scareware.mp4 39.5 MB
  • mp4~Get Your Files Here !/03 - What is Malware and its types/004 Browser Hijacking Software.mp4 37.3 MB
  • mp4~Get Your Files Here !/02 - Secure your computer from unauthorized access/008 Use a VPN.mp4 36.0 MB
  • mp4~Get Your Files Here !/03 - What is Malware and its types/005 Viruses.mp4 35.6 MB
  • mp4~Get Your Files Here !/01 - Introduction to Personal Digital Security/003 Some statistics.mp4 35.0 MB
  • mp4~Get Your Files Here !/02 - Secure your computer from unauthorized access/004 Use password manager.mp4 33.8 MB
  • mp4~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/001 Safe browsing.mp4 31.8 MB
  • mp4~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/008 Safe browsing in Social Networks.mp4 31.7 MB
  • mp4~Get Your Files Here !/01 - Introduction to Personal Digital Security/001 Introduction to Personal Digital Security.mp4 30.4 MB
【影视】 [ CourseWikia.com ] Linkedin - Landing Your First Cybersecurity Job
收录时间:2023-12-18 文档个数:44 文档大小:292.1 MB 最近下载:2025-05-09 人气:1417 磁力链接
  • mp4~Get Your Files Here !/02 - 1. Cybersecurity Careers/04 - PIVOT into cyber A framework to live by.mp4 36.8 MB
  • mp4~Get Your Files Here !/05 - 4. The Power of Networking/02 - Mentoring with a purpose.mp4 35.2 MB
  • mp4~Get Your Files Here !/06 - 5. Landing the Role/03 - Negotiating your benefits.mp4 34.8 MB
  • mp4~Get Your Files Here !/03 - 2. Basic Steps to Launching Your Career/02 - Your current skill set has value.mp4 25.8 MB
  • mp4~Get Your Files Here !/04 - 3. Building Your Brand in Cyber/01 - Marketing your skills.mp4 25.8 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Your future in cybersecurity.mp4 23.0 MB
  • mp4~Get Your Files Here !/07 - Conclusion/01 - Continue to grow.mp4 16.0 MB
  • mp4~Get Your Files Here !/04 - 3. Building Your Brand in Cyber/02 - Volunteering for success.mp4 11.2 MB
  • mp4~Get Your Files Here !/05 - 4. The Power of Networking/01 - Building your network.mp4 10.8 MB
  • mp4~Get Your Files Here !/03 - 2. Basic Steps to Launching Your Career/05 - Create your cyber roadmap.mp4 10.4 MB
  • mp4~Get Your Files Here !/03 - 2. Basic Steps to Launching Your Career/03 - Which roles map to your skill sets.mp4 8.6 MB
  • mp4~Get Your Files Here !/02 - 1. Cybersecurity Careers/02 - Popular roles in cyber.mp4 8.4 MB
  • mp4~Get Your Files Here !/03 - 2. Basic Steps to Launching Your Career/01 - Why do you want to be a cyber professional.mp4 8.0 MB
  • mp4~Get Your Files Here !/06 - 5. Landing the Role/02 - Acing your interview.mp4 7.9 MB
  • mp4~Get Your Files Here !/02 - 1. Cybersecurity Careers/03 - Cyberseek demo.mp4 7.9 MB
  • mp4~Get Your Files Here !/02 - 1. Cybersecurity Careers/01 - Cyber domains explained.mp4 7.5 MB
  • mp4~Get Your Files Here !/06 - 5. Landing the Role/01 - Finding a role that fits your skills and goals.mp4 7.5 MB
  • mp4~Get Your Files Here !/03 - 2. Basic Steps to Launching Your Career/04 - What are you missing.mp4 6.4 MB
  • pdf~Get Your Files Here !/Ex_Files_Landing_Your_First_Cybersecurity_Job/Exercise Files/Personal Skills Inventory.pdf 93.0 kB
  • pdf~Get Your Files Here !/Ex_Files_Landing_Your_First_Cybersecurity_Job/Exercise Files/Roadmap Form.pdf 31.9 kB
【影视】 [ FreeCourseWeb.com ] Ace Your Cybersecurity Interview - The Ultimate Crash Course
收录时间:2024-09-22 文档个数:14 文档大小:582.2 MB 最近下载:2025-05-09 人气:1143 磁力链接
  • mp4~Get Your Files Here !/1 - Cyber Security Technical Interview Questions Answers/3 - Network security interview questions.mp4 119.8 MB
  • mp4~Get Your Files Here !/1 - Cyber Security Technical Interview Questions Answers/1 - Application Security interview questions.mp4 91.2 MB
  • mp4~Get Your Files Here !/1 - Cyber Security Technical Interview Questions Answers/2 - Penetration Testing Vulnerability assessment interview questions.mp4 68.0 MB
  • mp4~Get Your Files Here !/1 - Cyber Security Technical Interview Questions Answers/4 - Cloud Security Interview questions.mp4 64.6 MB
  • mp4~Get Your Files Here !/3 - Cyber Security Skills Certification for Resume/12 - Role based certification for resume.mp4 54.4 MB
  • mp4~Get Your Files Here !/1 - Cyber Security Technical Interview Questions Answers/8 - Network Security Protocols interview questions.mp4 39.0 MB
  • mp4~Get Your Files Here !/1 - Cyber Security Technical Interview Questions Answers/9 - VPN Interview questions.mp4 35.8 MB
  • mp4~Get Your Files Here !/1 - Cyber Security Technical Interview Questions Answers/7 - Cyber Security Fundamentals interview questions.mp4 29.1 MB
  • mp4~Get Your Files Here !/2 - Cyber Security Soft Skills interview questions/10 - Soft Skills.mp4 24.8 MB
  • mp4~Get Your Files Here !/3 - Cyber Security Skills Certification for Resume/11 - Role based resume skills.mp4 20.1 MB
  • mp4~Get Your Files Here !/1 - Cyber Security Technical Interview Questions Answers/6 - Networking Concepts for Cyber Security.mp4 18.6 MB
  • mp4~Get Your Files Here !/1 - Cyber Security Technical Interview Questions Answers/5 - Hacking Concepts interview questions.mp4 16.8 MB
  • txt~Get Your Files Here !/Bonus Resources.txt 386 Bytes
  • urlGet Bonus Downloads Here.url 183 Bytes
【影视】 [ CourseBoat.com ] Linkedin - Building the Next Generation of Cybersecurity Professionals
收录时间:2023-12-19 文档个数:50 文档大小:836.2 MB 最近下载:2025-05-09 人气:1169 磁力链接
  • mp4~Get Your Files Here !/04 - 3. Dispelling Common Myths in Cybersecurity/02 - Myth number two Cybersecurity is difficult to learn.mp4 53.8 MB
  • mp4~Get Your Files Here !/03 - 2. Discovering Hidden Potential to Find Your Next Superstars/03 - Ask better questions to get better answers.mp4 52.0 MB
  • mp4~Get Your Files Here !/03 - 2. Discovering Hidden Potential to Find Your Next Superstars/01 - Unconventional talent is everywhere.mp4 49.8 MB
  • mp4~Get Your Files Here !/02 - 1. Why We Need to Rethink Cybersecurity Hiring and Team Building/01 - Why the war on cybercrime is being lost.mp4 48.1 MB
  • mp4~Get Your Files Here !/02 - 1. Why We Need to Rethink Cybersecurity Hiring and Team Building/02 - The role and roles of the modern cybersecurity team.mp4 47.9 MB
  • mp4~Get Your Files Here !/06 - 5. Rethinking Technical Interviews to Assess Hands-on Ability and Not Book Knowledge/01 - The purpose of technical interviews.mp4 45.4 MB
  • mp4~Get Your Files Here !/05 - 4. Writing Foolproof Job Descriptions that Appeal to Great Candidates/02 - What great candidates look for.mp4 45.1 MB
  • mp4~Get Your Files Here !/03 - 2. Discovering Hidden Potential to Find Your Next Superstars/02 - Hire for potential.mp4 43.1 MB
  • mp4~Get Your Files Here !/02 - 1. Why We Need to Rethink Cybersecurity Hiring and Team Building/03 - Determine how important security is at your company.mp4 41.4 MB
  • mp4~Get Your Files Here !/04 - 3. Dispelling Common Myths in Cybersecurity/01 - Myth number one You must have years of experience first.mp4 40.7 MB
  • mp4~Get Your Files Here !/05 - 4. Writing Foolproof Job Descriptions that Appeal to Great Candidates/01 - Job descriptions that get you what you want.mp4 40.6 MB
  • mp4~Get Your Files Here !/04 - 3. Dispelling Common Myths in Cybersecurity/04 - Challenge What other myths exist.mp4 40.4 MB
  • mp4~Get Your Files Here !/02 - 1. Why We Need to Rethink Cybersecurity Hiring and Team Building/04 - Start building trust today.mp4 39.0 MB
  • mp4~Get Your Files Here !/06 - 5. Rethinking Technical Interviews to Assess Hands-on Ability and Not Book Knowledge/02 - Take-home projects A better way.mp4 38.6 MB
  • mp4~Get Your Files Here !/07 - 6. Setting Up New Hires for Future Success and Beyond/01 - The first 90 days The most important period.mp4 38.1 MB
  • mp4~Get Your Files Here !/04 - 3. Dispelling Common Myths in Cybersecurity/03 - Myth number three You need IT fundamentals.mp4 36.0 MB
  • mp4~Get Your Files Here !/07 - 6. Setting Up New Hires for Future Success and Beyond/02 - Three habits of the highly effective cybersecurity manager.mp4 32.2 MB
  • mp4~Get Your Files Here !/05 - 4. Writing Foolproof Job Descriptions that Appeal to Great Candidates/03 - Challenge Review your most recent job description.mp4 31.1 MB
  • mp4~Get Your Files Here !/08 - Conclusion/01 - Next steps.mp4 29.0 MB
  • mp4~Get Your Files Here !/03 - 2. Discovering Hidden Potential to Find Your Next Superstars/04 - Challenge Reflect on your interview questions.mp4 28.5 MB
【影视】 [ TutGee.com ] Linkedin - Practical Cybersecurity for IT Professionals
收录时间:2023-12-26 文档个数:81 文档大小:388.0 MB 最近下载:2025-05-08 人气:1804 磁力链接
  • mp4~Get Your Files Here !/04 - 3. Firewalls/03 - Advanced Windows Firewall.mp4 27.1 MB
  • mp4~Get Your Files Here !/05 - 4. Network Scanning/01 - Getting started with Nmap.mp4 22.0 MB
  • mp4~Get Your Files Here !/02 - 1. Why Cybersecurity/07 - Emerging trends in cybersecurity.mp4 20.4 MB
  • mp4~Get Your Files Here !/02 - 1. Why Cybersecurity/01 - A history of hackers.mp4 17.5 MB
  • mp4~Get Your Files Here !/04 - 3. Firewalls/05 - Introducing Linux iptables.mp4 16.1 MB
  • mp4~Get Your Files Here !/04 - 3. Firewalls/02 - Windows Firewall basics.mp4 14.5 MB
  • mp4~Get Your Files Here !/09 - 8. Network Protocols/02 - Capturing packets with Wireshark.mp4 14.3 MB
  • mp4~Get Your Files Here !/04 - 3. Firewalls/04 - ZedLan firewall log analyser.mp4 13.4 MB
  • mp4~Get Your Files Here !/02 - 1. Why Cybersecurity/04 - Common forms of cyberattack.mp4 13.1 MB
  • mp4~Get Your Files Here !/09 - 8. Network Protocols/03 - Making sense of the protocols.mp4 13.0 MB
  • mp4~Get Your Files Here !/02 - 1. Why Cybersecurity/02 - The cyber kill chain.mp4 12.0 MB
  • mp4~Get Your Files Here !/03 - 2. Antivirus/01 - Introducing Microsoft Defender Antivirus.mp4 11.7 MB
  • mp4~Get Your Files Here !/07 - 6. Vulnerability Scanning/01 - Preparing Nessus.mp4 10.5 MB
  • mp4~Get Your Files Here !/08 - 7. Web Applications/02 - Running an SQL injection attack.mp4 10.1 MB
  • mp4~Get Your Files Here !/05 - 4. Network Scanning/02 - Advanced Nmap options.mp4 10.0 MB
  • mp4~Get Your Files Here !/02 - 1. Why Cybersecurity/03 - Stuxnet and the kill chain.mp4 9.8 MB
  • mp4~Get Your Files Here !/03 - 2. Antivirus/02 - Detecting malware with Microsoft Defender.mp4 9.5 MB
  • mp4~Get Your Files Here !/04 - 3. Firewalls/06 - Setting up a simple iptables firewall.mp4 9.3 MB
  • mp4~Get Your Files Here !/06 - 5. Network Connections/02 - Transferring files using netcat.mp4 9.2 MB
  • mp4~Get Your Files Here !/06 - 5. Network Connections/04 - Setting up a netcat honeypot.mp4 8.9 MB
【影视】 [ FreeCourseWeb.com ] Linkedin - Cybersecurity Careers - Become a Security Engineer
收录时间:2024-02-04 文档个数:28 文档大小:83.4 MB 最近下载:2025-05-08 人气:642 磁力链接
  • mp4~Get Your Files Here !/05 - Conclusion/01 - The fun doesn't end.mp4 8.3 MB
  • mp4~Get Your Files Here !/03 - 2. How to Become a Security Engineer/03 - Certification options.mp4 8.3 MB
  • mp4~Get Your Files Here !/04 - 3. Day in the Life/01 - Day in the life of a cloud security engineer.mp4 7.7 MB
  • mp4~Get Your Files Here !/02 - 1. Security Engineering Career Basics/03 - Why pursue a career in cybersecurity.mp4 7.4 MB
  • mp4~Get Your Files Here !/02 - 1. Security Engineering Career Basics/02 - What's the difference.mp4 7.4 MB
  • mp4~Get Your Files Here !/02 - 1. Security Engineering Career Basics/01 - What is a security engineer.mp4 7.4 MB
  • mp4~Get Your Files Here !/03 - 2. How to Become a Security Engineer/04 - Benefits of networking.mp4 7.1 MB
  • mp4~Get Your Files Here !/04 - 3. Day in the Life/02 - Common challenges.mp4 5.8 MB
  • mp4~Get Your Files Here !/03 - 2. How to Become a Security Engineer/02 - Develop your skill set.mp4 5.3 MB
  • mp4~Get Your Files Here !/04 - 3. Day in the Life/03 - Solving problems.mp4 5.2 MB
  • mp4~Get Your Files Here !/03 - 2. How to Become a Security Engineer/05 - Interviewing for a security engineering position.mp4 5.0 MB
  • mp4~Get Your Files Here !/03 - 2. How to Become a Security Engineer/01 - Do your research.mp4 4.8 MB
  • mp4~Get Your Files Here !/01 - 0. Introduction/01 - Becoming a security engineer.mp4 3.7 MB
  • srt~Get Your Files Here !/03 - 2. How to Become a Security Engineer/03 - Certification options.srt 8.1 kB
  • srt~Get Your Files Here !/03 - 2. How to Become a Security Engineer/04 - Benefits of networking.srt 7.7 kB
  • srt~Get Your Files Here !/03 - 2. How to Become a Security Engineer/05 - Interviewing for a security engineering position.srt 6.5 kB
  • srt~Get Your Files Here !/02 - 1. Security Engineering Career Basics/02 - What's the difference.srt 6.3 kB
  • srt~Get Your Files Here !/04 - 3. Day in the Life/02 - Common challenges.srt 5.7 kB
  • srt~Get Your Files Here !/04 - 3. Day in the Life/03 - Solving problems.srt 5.3 kB
  • srt~Get Your Files Here !/02 - 1. Security Engineering Career Basics/01 - What is a security engineer.srt 5.3 kB
【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity Exam Fundamentals
收录时间:2024-01-01 文档个数:70 文档大小:2.5 GB 最近下载:2025-05-07 人气:1486 磁力链接
  • mp4~Get Your Files Here !/05 - Nmap/001 Video and Lab - Introduction to NMap.mp4 220.2 MB
  • mp4~Get Your Files Here !/05 - Nmap/006 Video and lab - NMap Scripting Engine (NSE).mp4 209.4 MB
  • mp4~Get Your Files Here !/08 - Privilege Escalation/003 Video and Lab - Windows Privilege Escalation Unquoted Service Path.mp4 134.3 MB
  • mp4~Get Your Files Here !/07 - Reverse Shells and Persistant Connections/002 Video and Lab - Service Persistence.mp4 121.9 MB
  • mp4~Get Your Files Here !/08 - Privilege Escalation/002 Video and Lab - Verify Windows Privilege Escalation Unquoted Service Path.mp4 117.8 MB
  • mp4~Get Your Files Here !/07 - Reverse Shells and Persistant Connections/001 Video and Lab - Establish a Meterpreter Session with Windows 10 Pro.mp4 111.6 MB
  • mp4~Get Your Files Here !/09 - OWASP top 10 Mitigations/003 Video and Lab - Identify Active Network Hosts and Services Using Nmap.mp4 99.0 MB
  • mp4~Get Your Files Here !/02 - Virtual Lab Build/001 Video and Lab - Create a Virtual Install of Kali Linux.mp4 97.9 MB
  • mp4~Get Your Files Here !/02 - Virtual Lab Build/002 Video and Lab - Creating a Virtual Install of Metasploitable2 Using VirtualBox.mp4 87.9 MB
  • mp4~Get Your Files Here !/06 - 2.0 Information Gathering and Vulnerability Identification Labs/002 Video and Lab - Enumerating Windows 10 Using WinPEAS.mp4 75.0 MB
  • mp4~Get Your Files Here !/03 - Documentation/005 Video and PPT - Pentesting Final Report.mp4 65.4 MB
  • mp4~Get Your Files Here !/10 - Web Applications Penetration Testing/001 Video and Lab - Configuring BurpSuite as a Proxy.pdf.mp4 65.1 MB
  • mp4~Get Your Files Here !/09 - OWASP top 10 Mitigations/001 Video and PPT - Overview of OWASP Top 10.mp4 62.5 MB
  • mp4~Get Your Files Here !/05 - Nmap/007 Video - Analyzing NMap Results.mp4 61.0 MB
  • mp4~Get Your Files Here !/05 - Nmap/003 Video - Nmap OS Detection.mp4 59.8 MB
  • mp4~Get Your Files Here !/09 - OWASP top 10 Mitigations/004 Video and Lab - Perform a Vulnerability Scan Using OWASP Zed Attack Proxy.mp4 56.5 MB
  • mp4~Get Your Files Here !/09 - OWASP top 10 Mitigations/002 Video and Lab - Spoof Fake TCPIP Packets Using Hping3.mp4 56.2 MB
  • mp4~Get Your Files Here !/11 - Program Scripting/001 Video and Lab - Create a Windows Reverse Shell Using the PowerShell.mp4 55.9 MB
  • mp4~Get Your Files Here !/07 - Reverse Shells and Persistant Connections/003 Video and Lab - Create a Windows Reverse Shell Using PowerShell.mp4 55.9 MB
  • mp4~Get Your Files Here !/06 - 2.0 Information Gathering and Vulnerability Identification Labs/001 Video and lab - Using Banner Grabbing to Aid in Reconnaissance.mp4 55.8 MB
【影视】 Coursera - Cybersecurity Operations Fundamentals Specialization 2024
收录时间:2024-06-03 文档个数:1754 文档大小:2.0 GB 最近下载:2025-05-04 人气:717 磁力链接
  • mp4Coursera - Security Operations Center (SOC) 2024-1/01_introduction-to-security-operations-center/03_soc-environment-today/01_soc-environment-today.mp4 32.8 MB
  • mp4Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/04_linux-file-system-overview/01_linux-file-system-overview.mp4 26.4 MB
  • mp4Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/15_linux-command-shell-concepts/01_linux-command-shell-concepts.mp4 25.9 MB
  • mp4Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/16_controlling-services-and-processes/01_controlling-services-and-processes.mp4 22.4 MB
  • mp4Coursera - Data Security 2024-1/01_exploring-data-type-categories/08_packet-capture-using-tcpdump/01_packet-capture-using-tcpdump.mp4 19.3 MB
  • mp4Coursera - Security Operations Center (SOC) 2024-1/04_staffing-an-effective-soc-team/03_interaction-of-different-roles-within-the-soc/02_interaction-of-various-roles-within-the-soc.mp4 18.9 MB
  • mp4Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/21_viewing-running-network-services/01_viewing-running-network-services.mp4 18.0 MB
  • mp4Coursera - Security Operations Center (SOC) 2024-1/03_soc-deployment-models-and-types/02_soc-types-and-staffing-considerations/02_soc-types-and-staffing-considerations.mp4 17.8 MB
  • mp4Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/20_windows-netstat-command/01_windows-netstat-command.mp4 17.7 MB
  • mp4Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/04_ip-vulnerabilities/02_ip-vulnerabilities.mp4 16.6 MB
  • mp4Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/02_host-based-personal-firewall/01_host-based-personal-firewall.mp4 16.3 MB
  • mp4Coursera - Security Operations Center (SOC) 2024-1/03_soc-deployment-models-and-types/03_soc-models-and-their-consumers/02_soc-models-and-their-consumers.mp4 16.1 MB
  • mp4Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/13_system-processes/01_system-processes.mp4 15.9 MB
  • mp4Coursera - Security Operations Center (SOC) 2024-1/06_developing-key-relationships-with-internal-and-external-stakeholders/03_external-stakeholders/02_external-stakeholders.mp4 15.3 MB
  • mp4Coursera - Security Operations Center (SOC) 2024-1/01_introduction-to-security-operations-center/04_goal-of-a-soc/01_goal-of-a-soc.mp4 15.0 MB
  • mp4Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/05_http-operations/02_http-operations.mp4 14.5 MB
  • mp4Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/16_netflow-as-a-security-tool/01_netflow-as-a-security-tool.mp4 14.5 MB
  • mp4Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/08_windows-file-system-structure/01_windows-file-system-structure.mp4 14.3 MB
  • mp4Coursera - Security Operations Center (SOC) 2024-1/05_security-events-data-and-soc-analyst-tools/02_soc-relevant-data-and-security-event-data/01_soc-relevant-data-and-security-event-data-introduction.mp4 14.0 MB
  • mp4Coursera - Security Operations Center (SOC) 2024-1/06_developing-key-relationships-with-internal-and-external-stakeholders/02_internal-stakeholders/02_internal-stakeholders.mp4 13.7 MB
【影视】 [ CourseLala.com ] Linkedin - IT and Cybersecurity Risk Management Essential Training
收录时间:2022-02-10 文档个数:52 文档大小:904.4 MB 最近下载:2025-05-02 人气:1812 磁力链接
  • mp4~Get Your Files Here !/4. IT Risk Management in Practice/019. IT risk management techniques.mp4 60.9 MB
  • mp4~Get Your Files Here !/3. IT Risk Management in Context/009. IT risk management in medium companies.mp4 58.5 MB
  • mp4~Get Your Files Here !/3. IT Risk Management in Context/010. IT risk management in large companies.mp4 57.2 MB
  • mp4~Get Your Files Here !/5. IT Risk Management on the Job/020. Choosing the right IT risk management technique.mp4 52.4 MB
  • mp4~Get Your Files Here !/5. IT Risk Management on the Job/023. Operating controls.mp4 47.2 MB
  • mp4~Get Your Files Here !/2. What Is IT Risk Management/002. What is IT risk.mp4 42.6 MB
  • mp4~Get Your Files Here !/4. IT Risk Management in Practice/014. Performing the IT risk assessment.mp4 41.3 MB
  • mp4~Get Your Files Here !/4. IT Risk Management in Practice/018. Using an IT risk register.mp4 40.9 MB
  • mp4~Get Your Files Here !/4. IT Risk Management in Practice/015. Choosing an IT risk management framework.mp4 40.0 MB
  • mp4~Get Your Files Here !/3. IT Risk Management in Context/008. IT risk management in small companies.mp4 39.5 MB
  • mp4~Get Your Files Here !/5. IT Risk Management on the Job/022. Implementing controls.mp4 35.1 MB
  • mp4~Get Your Files Here !/2. What Is IT Risk Management/006. IT risk management roles and responsibilities.mp4 34.9 MB
  • mp4~Get Your Files Here !/5. IT Risk Management on the Job/021. Choosing controls.mp4 34.4 MB
  • mp4~Get Your Files Here !/2. What Is IT Risk Management/007. Making an IT risk decision.mp4 33.9 MB
  • mp4~Get Your Files Here !/2. What Is IT Risk Management/005. Types of IT risks.mp4 33.3 MB
  • mp4~Get Your Files Here !/3. IT Risk Management in Context/013. The minimum viable approach.mp4 32.7 MB
  • mp4~Get Your Files Here !/3. IT Risk Management in Context/011. Quantitative vs. qualitative risk assessments.mp4 32.6 MB
  • mp4~Get Your Files Here !/4. IT Risk Management in Practice/017. Determining an acceptable level of IT risk.mp4 30.3 MB
  • mp4~Get Your Files Here !/5. IT Risk Management on the Job/024. Validating controls.mp4 29.9 MB
  • mp4~Get Your Files Here !/2. What Is IT Risk Management/004. What is IT risk tolerance.mp4 28.4 MB
【影视】 [ FreeCourseWeb.com ] Linkedin - Cybersecurity Awareness - Phishing Attacks
收录时间:2022-03-04 文档个数:39 文档大小:642.7 MB 最近下载:2025-05-02 人气:1592 磁力链接
  • mp4~Get Your Files Here !/4. How to Catch a Phish/012. Catch a phish red-handed Common indicators of a phish.mp4 48.9 MB
  • mp4~Get Your Files Here !/3. Different Types of Phishing Attacks/010. Other notable methods of phishing.mp4 47.3 MB
  • mp4~Get Your Files Here !/2. An Overview of Phishing/004. How does phishing affect us.mp4 46.9 MB
  • mp4~Get Your Files Here !/2. An Overview of Phishing/005. A review of the psychology behind social engineering attacks.mp4 45.0 MB
  • mp4~Get Your Files Here !/5. How to Defend against Phishing Attacks/015. How technology helps with the fight against phishing attacks.mp4 41.6 MB
  • mp4~Get Your Files Here !/4. How to Catch a Phish/013. Is this a phish Real-world examples of phishing attacks.mp4 38.5 MB
  • mp4~Get Your Files Here !/3. Different Types of Phishing Attacks/007. Unfriended How to spot a social media phish.mp4 38.5 MB
  • mp4~Get Your Files Here !/4. How to Catch a Phish/011. What makes phishing attacks successful.mp4 36.9 MB
  • mp4~Get Your Files Here !/3. Different Types of Phishing Attacks/008. Getting specific with targeted phishing attacks.mp4 34.9 MB
  • mp4~Get Your Files Here !/3. Different Types of Phishing Attacks/006. Is it a harmless unknown caller or vishing.mp4 34.6 MB
  • mp4~Get Your Files Here !/6. What Happens If You Fall for a Phish/018. Falling for a phishing attack at home.mp4 34.5 MB
  • mp4~Get Your Files Here !/2. An Overview of Phishing/003. Money is the motive The reason behind phishing.mp4 34.1 MB
  • mp4~Get Your Files Here !/5. How to Defend against Phishing Attacks/016. Practice makes perfect An overview of phishing simulations.mp4 32.6 MB
  • mp4~Get Your Files Here !/2. An Overview of Phishing/002. Phishing The dangers of email.mp4 32.3 MB
  • mp4~Get Your Files Here !/3. Different Types of Phishing Attacks/009. SMS phishing A text-based attack.mp4 31.8 MB
  • mp4~Get Your Files Here !/6. What Happens If You Fall for a Phish/017. Responding to a phishing attack at work.mp4 23.4 MB
  • mp4~Get Your Files Here !/5. How to Defend against Phishing Attacks/014. The most common ways to defend against a phish.mp4 23.1 MB
  • mp4~Get Your Files Here !/1. Introduction/001. About phishing attacks.mp4 9.8 MB
  • mp4~Get Your Files Here !/7. Conclusion/019. Next steps and takeaways.mp4 7.8 MB
  • pdf~Get Your Files Here !/Ex_Files_Cybersecurity_Awareness_Phishing_Attacks/Exercise Files/Additional Resources.pdf 47.6 kB
【影视】 [Tutorialsplanet.NET] Udemy - Real-World Ethical Hacking Hands-on Cybersecurity
收录时间:2021-05-01 文档个数:179 文档大小:4.7 GB 最近下载:2025-05-01 人气:171 磁力链接
  • mp413. Bonus Videos National Cyber Warrior Academy, Interviews and More/3. NCWA 2017 Facebook Live Video on Car Hacking and Drone Programming.mp4 441.0 MB
  • mp413. Bonus Videos National Cyber Warrior Academy, Interviews and More/5. Dr. Payne's TEDx Talk on Coding and Cyber as the New Literacy.mp4 320.7 MB
  • mp47. BONUS Section Car Hacking in Kali Linux!/9. Car Hacking LIVE on Dr. Payne's VW Jetta Facebook Live Video from NCWA 2017.mp4 168.6 MB
  • mp43. Important Linux and Windows Terminal Commands/5. BONUS Fun Linux Terminal Commands (Optional).mp4 166.3 MB
  • mp46. Recon Information Gathering, Scanning and Enumeration/3. theHarvester How hackers find users and email information for phishing.mp4 157.5 MB
  • mp46. Recon Information Gathering, Scanning and Enumeration/6. Legion Active network and vulnerability scanning with LEGION GUI.mp4 149.2 MB
  • mp44. Create a Virtual Network for Ethical Hacking!/3. Connecting Your VMs to the Host-Only Network.mp4 148.8 MB
  • mp46. Recon Information Gathering, Scanning and Enumeration/5. nmap Active Scanning with nmap.mp4 148.0 MB
  • mp42. Create Your Own Virtual Hacking Lab!/4. Create an Android PhoneTablet VM for Mobile Hacking!.mp4 142.1 MB
  • mp43. Important Linux and Windows Terminal Commands/2. Basic Linux Commands.mp4 112.6 MB
  • mp44. Create a Virtual Network for Ethical Hacking!/4. Creating and Using a Public NAT Network in VBox.mp4 112.5 MB
  • mp44. Create a Virtual Network for Ethical Hacking!/5. Updating Kali and Windows VMs.mp4 110.5 MB
  • mp44. Create a Virtual Network for Ethical Hacking!/2. Creating the Private, Host-Only 10.0.3.x Network.mp4 105.2 MB
  • mp42. Create Your Own Virtual Hacking Lab!/3. Create a Windows 10 VM.mp4 104.9 MB
  • mp43. Important Linux and Windows Terminal Commands/4. More Helpful Linux Commands.mp4 100.4 MB
  • mp46. Recon Information Gathering, Scanning and Enumeration/4. Recon-ng Enumeration of servershosts with Recon-ng.mp4 91.4 MB
  • mp42. Create Your Own Virtual Hacking Lab!/2. Building a Kali Linux Virtual Machine.mp4 88.0 MB
  • mp46. Recon Information Gathering, Scanning and Enumeration/2. OSINT (Open-Source INTelligence) Framework Domain Dossier.mp4 76.8 MB
  • mp42. Create Your Own Virtual Hacking Lab!/5. The Ultimately Hackable Metasploitable!.mp4 70.2 MB
  • mp42. Create Your Own Virtual Hacking Lab!/1. Virtual Lab Intro and VirtualBox Installation.mp4 66.7 MB
【影视】 [ CoursePig.com ] Linkedin - The Cybersecurity Threat Landscape (2022)
收录时间:2024-05-29 文档个数:42 文档大小:232.7 MB 最近下载:2025-04-21 人气:186 磁力链接
  • mp4~Get Your Files Here !/10 - 9. Supply Chain Attacks and Third-Party Risks/01 - The threat of supply chain attacks and third-party risks.mp4 16.2 MB
  • mp4~Get Your Files Here !/05 - 4. Botnets and DDoS attacks/02 - Protect against botnets and DDoS threats.mp4 15.8 MB
  • mp4~Get Your Files Here !/08 - 7. Unmanaged IoT Devices/01 - Explore the threat of unmanaged IoT devices.mp4 14.4 MB
  • mp4~Get Your Files Here !/09 - 8. Shadow IT/01 - Explore the threat of shadow IT.mp4 14.2 MB
  • mp4~Get Your Files Here !/08 - 7. Unmanaged IoT Devices/02 - Protect against unmanaged IoT devices.mp4 12.4 MB
  • mp4~Get Your Files Here !/09 - 8. Shadow IT/02 - Protect against shadow IT.mp4 12.4 MB
  • mp4~Get Your Files Here !/06 - 5. Deepfakes/02 - Protect against deepfakes.mp4 12.1 MB
  • mp4~Get Your Files Here !/03 - 2. Phishing and Smishing/02 - Protect against phishing and smishing.mp4 12.0 MB
  • mp4~Get Your Files Here !/11 - Conclusion/01 - Stay up to date on cybersecurity.mp4 11.8 MB
  • mp4~Get Your Files Here !/02 - 1. Malware and Ransomware/02 - Protect against malware and ransomware.mp4 11.7 MB
  • mp4~Get Your Files Here !/02 - 1. Malware and Ransomware/01 - Explore the threat of malware and ransomware.mp4 11.6 MB
  • mp4~Get Your Files Here !/03 - 2. Phishing and Smishing/01 - Explore the threat of phishing and smishing.mp4 11.3 MB
  • mp4~Get Your Files Here !/05 - 4. Botnets and DDoS attacks/01 - Explore the threat of botnets and DDoS attacks.mp4 11.1 MB
  • mp4~Get Your Files Here !/07 - 6. Insider Threats/01 - Explore the risk of insider threats.mp4 10.9 MB
  • mp4~Get Your Files Here !/10 - 9. Supply Chain Attacks and Third-Party Risks/02 - Protect against supply chain attacks and third-party risks.mp4 10.5 MB
  • mp4~Get Your Files Here !/04 - 3. Business Email Compromise/01 - Explore the threat of business email compromise.mp4 9.4 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Examine the cybersecurity threat landscape.mp4 9.4 MB
  • mp4~Get Your Files Here !/04 - 3. Business Email Compromise/02 - Protect against business email compromise.mp4 9.2 MB
  • mp4~Get Your Files Here !/06 - 5. Deepfakes/01 - Explore the threat of deepfakes.mp4 9.0 MB
  • mp4~Get Your Files Here !/07 - 6. Insider Threats/02 - Protect against insider threats.mp4 7.0 MB
【影视】 Aerospace Cybersecurity - Satellite Hacking (W53)
收录时间:2024-01-09 文档个数:28 文档大小:2.9 GB 最近下载:2025-04-09 人气:105 磁力链接
  • mp4Module 1 - Satellite Reconnaissance/7. (W53M01) Python Programs for Satellite Reconnaissance.mp4 303.7 MB
  • mp4Module 1 - Satellite Reconnaissance/6. (W53M01) OSINT Tools for Satellite Data Extraction.mp4 253.1 MB
  • mp4Module 1 - Satellite Reconnaissance/4. (W53M01) Satellite Subsystems and Attack Surfaces.mp4 206.3 MB
  • mp4Module 3 - Reverse Engineering and Decoding Communication/4. (W53M03) Decoding Satellite Communications Using SatNogs and Reverse Engineering.mp4 176.2 MB
  • mp4Module 4 - Vulnerabilities and Attacks/4. (W53M04) Dive Further Into Attacks and More CTF Practice.mp4 174.4 MB
  • mp4Module 3 - Reverse Engineering and Decoding Communication/1. (W53M03) Overview of Satellite Communications.mp4 168.9 MB
  • mp4Module 1 - Satellite Reconnaissance/2. (W53M01) Satellites and Ground Stations.mp4 168.2 MB
  • mp4Module 2 - Communication Analysis and Eavesdropping/3. (W53M02) Command & Data Handling & Payloads.mp4 162.6 MB
  • mp4Module 1 - Satellite Reconnaissance/5. (W53M01) Spherical Grid System.mp4 161.0 MB
  • mp4Module 3 - Reverse Engineering and Decoding Communication/3. (W53M03) Decoding Communications Using Wireshark and GNU Radio.mp4 148.0 MB
  • mp4Module 4 - Vulnerabilities and Attacks/1. (W53M04) Common Attacks and Interactive Labs.mp4 137.0 MB
  • mp4Module 2 - Communication Analysis and Eavesdropping/1. (W53M02) Communication Foundations.mp4 135.6 MB
  • mp4Module 3 - Reverse Engineering and Decoding Communication/2. (W53M03) Analyzing Satellite Communication Using gpredict, SatDump, & WXtolMG.mp4 135.3 MB
  • mp4Module 4 - Vulnerabilities and Attacks/3. (W53M04) Detecting Attacks and Mitigation Strategies.mp4 128.6 MB
  • mp4Module 2 - Communication Analysis and Eavesdropping/2. (W53M02) Link Design & Protocols.mp4 113.8 MB
  • mp4Module 2 - Communication Analysis and Eavesdropping/4. (W53M02) Satellite Networks & Vulnerabilities.mp4 89.2 MB
  • mp4Module 4 - Vulnerabilities and Attacks/2. (W53M04) Future of Satellite Security and Next Steps.mp4 85.1 MB
  • mp4Module 1 - Satellite Reconnaissance/1. (W53M01) Introduction.mp4 79.1 MB
  • mp4Module 1 - Satellite Reconnaissance/3. (W53M01) Information Extraction Methods.mp4 78.3 MB
  • vttModule 1 - Satellite Reconnaissance/4. (W53M01) Satellite Subsystems and Attack Surfaces.vtt 45.2 kB
【影视】 Lynda - Foundations of Cybersecurity
收录时间:2017-02-08 文档个数:27 文档大小:300.9 MB 最近下载:2025-03-22 人气:383 磁力链接
  • mp4021 Managing user access and identity.mp4 20.7 MB
  • mp4022 Implementing preventative security.mp4 18.8 MB
  • mp4023 Monitoring and alerts.mp4 15.7 MB
  • mp4018 Describing security requirements.mp4 14.9 MB
  • mp4008 Dissecting the payment card industry and PCI DSS.mp4 14.6 MB
  • mp4007 Implementing control frameworks.mp4 14.3 MB
  • mp4025 Preparing for an incident.mp4 14.2 MB
  • mp4019 Architecting security risk.mp4 13.5 MB
  • mp4016 Understanding advanced persistent threats (APTs).mp4 13.5 MB
  • mp4004 Dissecting cyber risk.mp4 13.1 MB
  • mp4003 Understanding the NIST cybersecurity framework.mp4 12.6 MB
  • mp4011 Dissecting security threats.mp4 11.6 MB
  • mp4026 Responding to an incident.mp4 11.5 MB
  • mp4005 Unpacking COBIT 5.mp4 10.3 MB
  • mp4012 Exploring cybercrime as an industry.mp4 9.9 MB
  • mp4014 Using callbacks to capture keystrokes.mp4 9.8 MB
  • mp4015 Hiding malware with rootkits.mp4 9.8 MB
  • mp4009 Exploring the Cyber Essentials framework.mp4 9.3 MB
  • mp4013 Hiding malware through cloaking and alternate data streams.mp4 9.0 MB
  • mp4020 Selecting security controls.mp4 8.5 MB
【影视】 MalTrak - Cybersecurity ATTACK & DEFENSE The Foundations
收录时间:2023-12-18 文档个数:22 文档大小:2.6 GB 最近下载:2025-03-20 人气:126 磁力链接
  • mp4Module 01 - ATTACK/01 - Targeted Attack Real Scenario.mp4 423.3 MB
  • mp4Module 01 - ATTACK/02 - Advanced Penetration Testing & Red Team Operations (Hands-On).mp4 362.7 MB
  • mp4Bonus Module - Advanced Attacks/Fileless Attacks and Targeted Ransomware Attacks.mp4 339.9 MB
  • mp4Module 02 - RESPOND/02 - Log Analysis With Splunk (Hands-On).mp4 255.3 MB
  • mp4Module 03 - INVESTIGATE/05 - Behavioral and Code Analysis.mp4 242.3 MB
  • mp4Module 02 - RESPOND/01 - Incident Response Process & Log Analysis.mp4 224.2 MB
  • mp4Module 03 - INVESTIGATE/04 - Basic Static Analysis - PE Headers.mp4 215.0 MB
  • mp4Module 02 - RESPOND/03 - Live Forensics and System Triage (Hands-On).mp4 212.1 MB
  • mp4Module 03 - INVESTIGATE/01 - Malware Analysis Intro.mp4 124.1 MB
  • mp4Module 03 - INVESTIGATE/03 - Basic Static Analysis (Hands-On).mp4 89.5 MB
  • mp4Module 03 - INVESTIGATE/02 - Basic Static Analysis - Finding Clues in Text.mp4 67.8 MB
  • pptxModule 01 - ATTACK/Resources/Module01 - Real Attack Scenario.pptx 5.6 MB
  • pptxModule 03 - INVESTIGATE/Resources/Module03 - Malware Analysis.pptx 4.1 MB
  • pdfModule 03 - INVESTIGATE/Resources/Module03 - Malware Analysis.pdf 3.0 MB
  • zipModule 03 - INVESTIGATE/Resources/iranian_apt_docx_with_macro.zip 2.7 MB
  • pdfModule 01 - ATTACK/Resources/Module01 - Real Attack Scenario.pdf 2.6 MB
  • pptxModule 02 - RESPOND/Resources/Module02 - Incident Response & Forensics.pptx 1.8 MB
  • pptxBonus Module - Advanced Attacks/Resources/Module04 - Fileless Attacks, Targeted Ransomware & Yara Rules.pptx 1.7 MB
  • logModule 02 - RESPOND/Resources/drupal_webattack.log 1.4 MB
  • pdfBonus Module - Advanced Attacks/Resources/Module04 - Fileless Attacks, Targeted Ransomware & Yara Rules.pdf 1.2 MB
【影视】 [ TutPig.com ] Linkedin - Cybersecurity Awareness - Cybersecurity Terminology
收录时间:2023-12-19 文档个数:34 文档大小:109.8 MB 最近下载:2025-03-15 人气:478 磁力链接
  • mp4~Get Your Files Here !/04 - 3. Process/01 - Understanding processes and documentation.mp4 10.5 MB
  • mp4~Get Your Files Here !/05 - 4. Technology/01 - Secure practices, terms, and exercises.mp4 10.1 MB
  • mp4~Get Your Files Here !/06 - 5. Threat Actors and Risks/02 - Technical risks.mp4 8.8 MB
  • mp4~Get Your Files Here !/03 - 2. People/01 - Security awareness and leadership.mp4 8.6 MB
  • mp4~Get Your Files Here !/03 - 2. People/04 - Understanding privacy.mp4 8.3 MB
  • mp4~Get Your Files Here !/06 - 5. Threat Actors and Risks/03 - Threats that target the human element.mp4 7.7 MB
  • mp4~Get Your Files Here !/04 - 3. Process/02 - Technical controls.mp4 7.3 MB
  • mp4~Get Your Files Here !/05 - 4. Technology/02 - Network controls.mp4 7.1 MB
  • mp4~Get Your Files Here !/05 - 4. Technology/03 - Advancements in technology.mp4 7.1 MB
  • mp4~Get Your Files Here !/06 - 5. Threat Actors and Risks/01 - Threat actors and definitions.mp4 7.1 MB
  • mp4~Get Your Files Here !/02 - 1. Defining Cybersecurity and People, Process, and Technology/01 - What is cybersecurity.mp4 6.0 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Welcome to Cybersecurity Terminology 101.mp4 5.7 MB
  • mp4~Get Your Files Here !/03 - 2. People/02 - Red vs. blue vs. purple teams.mp4 5.0 MB
  • mp4~Get Your Files Here !/03 - 2. People/03 - Who are the adversaries.mp4 4.7 MB
  • mp4~Get Your Files Here !/02 - 1. Defining Cybersecurity and People, Process, and Technology/02 - People, process, and technology.mp4 2.9 MB
  • mp4~Get Your Files Here !/07 - Conclusion/01 - Apply cybersecurity terminology.mp4 2.8 MB
  • srt~Get Your Files Here !/04 - 3. Process/01 - Understanding processes and documentation.srt 6.2 kB
  • srt~Get Your Files Here !/06 - 5. Threat Actors and Risks/01 - Threat actors and definitions.srt 6.1 kB
  • srt~Get Your Files Here !/06 - 5. Threat Actors and Risks/03 - Threats that target the human element.srt 5.7 kB
  • srt~Get Your Files Here !/04 - 3. Process/02 - Technical controls.srt 5.7 kB
【影视】 [ FreeCourseWeb.com ] Linkedin - The Future of Work and Cybersecurity on the Metaverse
收录时间:2024-05-07 文档个数:42 文档大小:101.1 MB 最近下载:2025-03-14 人气:219 磁力链接
  • mp4~Get Your Files Here !/03 - 2. The Essentials/03 - The future of work potential risk categories.mp4 6.9 MB
  • mp4~Get Your Files Here !/03 - 2. The Essentials/02 - The impact of cyber threats on your business or industry.mp4 6.7 MB
  • mp4~Get Your Files Here !/04 - 3. Threats/10 - Does metaverse-based work need an HR redesign.mp4 6.5 MB
  • mp4~Get Your Files Here !/05 - Conclusion/01 - The future of the metaverse of work.mp4 6.4 MB
  • mp4~Get Your Files Here !/04 - 3. Threats/11 - Decoupling business units and needs.mp4 6.2 MB
  • mp4~Get Your Files Here !/02 - 1. Defining the Metaverse/01 - What is the metaverse today.mp4 5.6 MB
  • mp4~Get Your Files Here !/01 - Introduction/02 - What to know before starting this course.mp4 5.5 MB
  • mp4~Get Your Files Here !/04 - 3. Threats/09 - Regulations for metaverse-based work.mp4 5.2 MB
  • mp4~Get Your Files Here !/04 - 3. Threats/02 - Threats to your brand.mp4 4.9 MB
  • mp4~Get Your Files Here !/04 - 3. Threats/08 - Identity theft threats.mp4 4.8 MB
  • mp4~Get Your Files Here !/03 - 2. The Essentials/01 - Understanding the metaverse environment and its suitability for your industry.mp4 4.7 MB
  • mp4~Get Your Files Here !/04 - 3. Threats/07 - Cybersecurity threats.mp4 4.6 MB
  • mp4~Get Your Files Here !/04 - 3. Threats/03 - Threats to your job profile or role.mp4 4.6 MB
  • mp4~Get Your Files Here !/04 - 3. Threats/04 - Platform-specific threats.mp4 4.6 MB
  • mp4~Get Your Files Here !/04 - 3. Threats/06 - Regulatory professional threats.mp4 4.5 MB
  • mp4~Get Your Files Here !/02 - 1. Defining the Metaverse/02 - The various ways in which the metaverse can impact work.mp4 4.4 MB
  • mp4~Get Your Files Here !/04 - 3. Threats/01 - Threats to the profession.mp4 4.4 MB
  • mp4~Get Your Files Here !/04 - 3. Threats/05 - Hardware equipment-specific threats.mp4 4.3 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Why discuss the future of work and the metaverse.mp4 3.9 MB
  • mp4~Get Your Files Here !/05 - Conclusion/02 - Where to begin.mp4 2.4 MB
共10页 上一页 5 6 7 8 9 10 下一页