为您索检到186条磁力链接,耗时0毫秒。
- 【影视】 [ FreeCourseWeb.com ] Translating Cybersecurity for SMBs - Using the NIST Cybersecurity Framework 2.0
-
收录时间:2024-05-28
文档个数:43
文档大小:127.0 MB
最近下载:2025-05-11
人气:1074
磁力链接
~Get Your Files Here !/05 - 4. Identify/01 - Understand what you have.mp4 10.7 MB
~Get Your Files Here !/04 - 3. Govern/02 - Roll out your guidance.mp4 8.8 MB
~Get Your Files Here !/11 - Conclusion/01 - Build cybersecurity into your business.mp4 8.5 MB
~Get Your Files Here !/04 - 3. Govern/01 - Set your cyber strategy.mp4 8.1 MB
~Get Your Files Here !/06 - 5. Protect/02 - Guard your network.mp4 7.0 MB
~Get Your Files Here !/06 - 5. Protect/01 - Secure your system.mp4 7.0 MB
~Get Your Files Here !/07 - 6. Detect/01 - Know when things are off.mp4 6.9 MB
~Get Your Files Here !/08 - 7. Respond/01 - Address cyber incidents.mp4 6.7 MB
~Get Your Files Here !/08 - 7. Respond/02 - Keep everyone in the loop.mp4 6.7 MB
~Get Your Files Here !/09 - 8. Recover/01 - Get back to normal.mp4 6.6 MB
~Get Your Files Here !/03 - 2. NIST Cybersecurity Framework 2.0/01 - Cybersecurity framework fundamentals.mp4 6.3 MB
~Get Your Files Here !/10 - 9. Build Cyber Capabilities/01 - Determine your tier.mp4 6.2 MB
~Get Your Files Here !/02 - 1. Cybersecurity in Your Business/02 - Understand your cyber risks.mp4 6.0 MB
~Get Your Files Here !/03 - 2. NIST Cybersecurity Framework 2.0/02 - Leverage the cybersecurity framework.mp4 5.9 MB
~Get Your Files Here !/10 - 9. Build Cyber Capabilities/02 - Define your profile.mp4 5.9 MB
~Get Your Files Here !/02 - 1. Cybersecurity in Your Business/01 - Cornerstones of cybersecurity.mp4 5.4 MB
~Get Your Files Here !/02 - 1. Cybersecurity in Your Business/03 - Prioritize your biggest risks.mp4 4.9 MB
~Get Your Files Here !/10 - 9. Build Cyber Capabilities/03 - Create a plan.mp4 3.4 MB
~Get Your Files Here !/01 - Introduction/02 - What you should know.mp4 3.0 MB
~Get Your Files Here !/01 - Introduction/01 - Leverage the NIST CSF to protect what matters most.mp4 2.7 MB
猜你喜欢:
Cybersecurity
SMBs
Translating
Framework
FreeCourseWeb
Using
2.0
com
NIST
- 【影视】 [ CourseLala.com ] Linkedin - Cybersecurity Awareness - Web3, Crypto, and NFTs
-
收录时间:2024-07-23
文档个数:34
文档大小:85.2 MB
最近下载:2025-05-10
人气:485
磁力链接
~Get Your Files Here !/02 - 1. CYA Cover Your Assets/04 - Thinking like an attacker.mp4 8.7 MB
~Get Your Files Here !/03 - 2. Wallet Security/01 - Custodial wallets.mp4 7.7 MB
~Get Your Files Here !/03 - 2. Wallet Security/04 - Hardware wallets.mp4 7.3 MB
~Get Your Files Here !/03 - 2. Wallet Security/02 - Hot wallets.mp4 6.9 MB
~Get Your Files Here !/05 - 4. Traditional Web2 Attacks Used in Web3/02 - Website hijacking Spoofing.mp4 6.2 MB
~Get Your Files Here !/06 - Conclusion/01 - Key takeaways.mp4 5.7 MB
~Get Your Files Here !/02 - 1. CYA Cover Your Assets/02 - Digital assets, part 2 NFTs.mp4 5.5 MB
~Get Your Files Here !/04 - 3. Blockchain Specific AttacksScams/02 - Interacting with scam dappssmart contracts, part 2.mp4 5.5 MB
~Get Your Files Here !/05 - 4. Traditional Web2 Attacks Used in Web3/01 - Phishing.mp4 5.4 MB
~Get Your Files Here !/03 - 2. Wallet Security/03 - Demo Installing a hot wallet.mp4 5.4 MB
~Get Your Files Here !/02 - 1. CYA Cover Your Assets/03 - Crypto wallets.mp4 5.2 MB
~Get Your Files Here !/04 - 3. Blockchain Specific AttacksScams/01 - Interacting with scam dappssmart contracts, part 1.mp4 4.6 MB
~Get Your Files Here !/01 - Introduction/01 - Staying safe on your journey into Web3.mp4 3.4 MB
~Get Your Files Here !/02 - 1. CYA Cover Your Assets/01 - Digital assets, part 1 Cryptocurrencies.mp4 3.3 MB
~Get Your Files Here !/01 - Introduction/02 - What to know before you begin.mp4 2.6 MB
~Get Your Files Here !/06 - Conclusion/02 - Next steps.mp4 1.7 MB
~Get Your Files Here !/03 - 2. Wallet Security/02 - Hot wallets.srt 6.2 kB
~Get Your Files Here !/03 - 2. Wallet Security/04 - Hardware wallets.srt 6.1 kB
~Get Your Files Here !/03 - 2. Wallet Security/01 - Custodial wallets.srt 5.1 kB
~Get Your Files Here !/04 - 3. Blockchain Specific AttacksScams/02 - Interacting with scam dappssmart contracts, part 2.srt 4.9 kB
猜你喜欢:
NFTs
Cybersecurity
CourseLala
Linkedin
Crypto
Web3
com
Awareness
- 【影视】 [FreeCoursesOnline.Me] [Skillshare] Cybersecurity Data Science [FCO]
-
收录时间:2021-05-07
文档个数:32
文档大小:353.4 MB
最近下载:2025-05-10
人气:829
磁力链接
2-Obtaining a malware dataset.mp4 37.9 MB
8-Tfidf.mp4 25.9 MB
1-Downloading and installing virtual box and windows image.mp4 24.9 MB
16-Malconv.mp4 23.7 MB
15-Ngram classifier.mp4 22.9 MB
4-Static and dynamic analysis.mp4 21.3 MB
14-Hash grams.mp4 18.3 MB
0-Course introduction.mp4 15.7 MB
7-Dumping using pefile.mp4 14.3 MB
19-Isolation forest.mp4 13.3 MB
17-Section 1 end.mp4 12.7 MB
20-Section 2 end.mp4 12.4 MB
9-Train test split.mp4 11.7 MB
13-N gram background.mp4 11.4 MB
10-Training a classifier.mp4 10.3 MB
12-Thresholding.mp4 10.0 MB
3-Obtaining a benign dataset.mp4 9.5 MB
23-CAPTCHA recognizer.mp4 9.3 MB
18-Kdd cup dataset.mp4 8.4 MB
24-Course end.mp4 8.4 MB
猜你喜欢:
FreeCoursesOnline
Me
Cybersecurity
Science
Skillshare
Data
FCO
- 【影视】 [ CourseLala.com ] Udemy - Personal Digital Security Everyone Must Have - Cybersecurity
-
收录时间:2022-04-12
文档个数:76
文档大小:1.5 GB
最近下载:2025-05-10
人气:725
磁力链接
~Get Your Files Here !/02 - Secure your computer from unauthorized access/001 Social Engineering.mp4 157.3 MB
~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/007 Secure your Wi-Fi at Home (Video HD).mp4 103.2 MB
~Get Your Files Here !/02 - Secure your computer from unauthorized access/003 Use strong passwords.mp4 93.7 MB
~Get Your Files Here !/03 - What is Malware and its types/003 Spyware.mp4 66.9 MB
~Get Your Files Here !/06 - Secure your Smartphone/003 Communicating Securely with your Smartphone.mp4 64.7 MB
~Get Your Files Here !/03 - What is Malware and its types/002 Adware.mp4 63.9 MB
~Get Your Files Here !/05 - Email Security/002 Fishing.mp4 57.8 MB
~Get Your Files Here !/02 - Secure your computer from unauthorized access/012 Be cautious.mp4 54.8 MB
~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/002 Tips for buying online.mp4 46.0 MB
~Get Your Files Here !/06 - Secure your Smartphone/001 Purses, Wallets, Smartphones.mp4 43.1 MB
~Get Your Files Here !/03 - What is Malware and its types/001 Trojan Horse.mp4 39.6 MB
~Get Your Files Here !/03 - What is Malware and its types/007 Scareware.mp4 39.5 MB
~Get Your Files Here !/03 - What is Malware and its types/004 Browser Hijacking Software.mp4 37.3 MB
~Get Your Files Here !/02 - Secure your computer from unauthorized access/008 Use a VPN.mp4 36.0 MB
~Get Your Files Here !/03 - What is Malware and its types/005 Viruses.mp4 35.6 MB
~Get Your Files Here !/01 - Introduction to Personal Digital Security/003 Some statistics.mp4 35.0 MB
~Get Your Files Here !/02 - Secure your computer from unauthorized access/004 Use password manager.mp4 33.8 MB
~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/001 Safe browsing.mp4 31.8 MB
~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/008 Safe browsing in Social Networks.mp4 31.7 MB
~Get Your Files Here !/01 - Introduction to Personal Digital Security/001 Introduction to Personal Digital Security.mp4 30.4 MB
猜你喜欢:
Everyone
Personal
CourseLala
Udemy
Cybersecurity
Digital
Security
com
Must
- 【影视】 [ CourseWikia.com ] Linkedin - Landing Your First Cybersecurity Job
-
收录时间:2023-12-18
文档个数:44
文档大小:292.1 MB
最近下载:2025-05-09
人气:1417
磁力链接
~Get Your Files Here !/02 - 1. Cybersecurity Careers/04 - PIVOT into cyber A framework to live by.mp4 36.8 MB
~Get Your Files Here !/05 - 4. The Power of Networking/02 - Mentoring with a purpose.mp4 35.2 MB
~Get Your Files Here !/06 - 5. Landing the Role/03 - Negotiating your benefits.mp4 34.8 MB
~Get Your Files Here !/03 - 2. Basic Steps to Launching Your Career/02 - Your current skill set has value.mp4 25.8 MB
~Get Your Files Here !/04 - 3. Building Your Brand in Cyber/01 - Marketing your skills.mp4 25.8 MB
~Get Your Files Here !/01 - Introduction/01 - Your future in cybersecurity.mp4 23.0 MB
~Get Your Files Here !/07 - Conclusion/01 - Continue to grow.mp4 16.0 MB
~Get Your Files Here !/04 - 3. Building Your Brand in Cyber/02 - Volunteering for success.mp4 11.2 MB
~Get Your Files Here !/05 - 4. The Power of Networking/01 - Building your network.mp4 10.8 MB
~Get Your Files Here !/03 - 2. Basic Steps to Launching Your Career/05 - Create your cyber roadmap.mp4 10.4 MB
~Get Your Files Here !/03 - 2. Basic Steps to Launching Your Career/03 - Which roles map to your skill sets.mp4 8.6 MB
~Get Your Files Here !/02 - 1. Cybersecurity Careers/02 - Popular roles in cyber.mp4 8.4 MB
~Get Your Files Here !/03 - 2. Basic Steps to Launching Your Career/01 - Why do you want to be a cyber professional.mp4 8.0 MB
~Get Your Files Here !/06 - 5. Landing the Role/02 - Acing your interview.mp4 7.9 MB
~Get Your Files Here !/02 - 1. Cybersecurity Careers/03 - Cyberseek demo.mp4 7.9 MB
~Get Your Files Here !/02 - 1. Cybersecurity Careers/01 - Cyber domains explained.mp4 7.5 MB
~Get Your Files Here !/06 - 5. Landing the Role/01 - Finding a role that fits your skills and goals.mp4 7.5 MB
~Get Your Files Here !/03 - 2. Basic Steps to Launching Your Career/04 - What are you missing.mp4 6.4 MB
~Get Your Files Here !/Ex_Files_Landing_Your_First_Cybersecurity_Job/Exercise Files/Personal Skills Inventory.pdf 93.0 kB
~Get Your Files Here !/Ex_Files_Landing_Your_First_Cybersecurity_Job/Exercise Files/Roadmap Form.pdf 31.9 kB
猜你喜欢:
Cybersecurity
CourseWikia
Landing
Job
Linkedin
com
Your
First
- 【影视】 [ FreeCourseWeb.com ] Ace Your Cybersecurity Interview - The Ultimate Crash Course
-
收录时间:2024-09-22
文档个数:14
文档大小:582.2 MB
最近下载:2025-05-09
人气:1143
磁力链接
~Get Your Files Here !/1 - Cyber Security Technical Interview Questions Answers/3 - Network security interview questions.mp4 119.8 MB
~Get Your Files Here !/1 - Cyber Security Technical Interview Questions Answers/1 - Application Security interview questions.mp4 91.2 MB
~Get Your Files Here !/1 - Cyber Security Technical Interview Questions Answers/2 - Penetration Testing Vulnerability assessment interview questions.mp4 68.0 MB
~Get Your Files Here !/1 - Cyber Security Technical Interview Questions Answers/4 - Cloud Security Interview questions.mp4 64.6 MB
~Get Your Files Here !/3 - Cyber Security Skills Certification for Resume/12 - Role based certification for resume.mp4 54.4 MB
~Get Your Files Here !/1 - Cyber Security Technical Interview Questions Answers/8 - Network Security Protocols interview questions.mp4 39.0 MB
~Get Your Files Here !/1 - Cyber Security Technical Interview Questions Answers/9 - VPN Interview questions.mp4 35.8 MB
~Get Your Files Here !/1 - Cyber Security Technical Interview Questions Answers/7 - Cyber Security Fundamentals interview questions.mp4 29.1 MB
~Get Your Files Here !/2 - Cyber Security Soft Skills interview questions/10 - Soft Skills.mp4 24.8 MB
~Get Your Files Here !/3 - Cyber Security Skills Certification for Resume/11 - Role based resume skills.mp4 20.1 MB
~Get Your Files Here !/1 - Cyber Security Technical Interview Questions Answers/6 - Networking Concepts for Cyber Security.mp4 18.6 MB
~Get Your Files Here !/1 - Cyber Security Technical Interview Questions Answers/5 - Hacking Concepts interview questions.mp4 16.8 MB
~Get Your Files Here !/Bonus Resources.txt 386 Bytes
Get Bonus Downloads Here.url 183 Bytes
猜你喜欢:
Crash
Ace
Cybersecurity
Course
FreeCourseWeb
Ultimate
Interview
com
Your
- 【影视】 [ CourseBoat.com ] Linkedin - Building the Next Generation of Cybersecurity Professionals
-
收录时间:2023-12-19
文档个数:50
文档大小:836.2 MB
最近下载:2025-05-09
人气:1169
磁力链接
~Get Your Files Here !/04 - 3. Dispelling Common Myths in Cybersecurity/02 - Myth number two Cybersecurity is difficult to learn.mp4 53.8 MB
~Get Your Files Here !/03 - 2. Discovering Hidden Potential to Find Your Next Superstars/03 - Ask better questions to get better answers.mp4 52.0 MB
~Get Your Files Here !/03 - 2. Discovering Hidden Potential to Find Your Next Superstars/01 - Unconventional talent is everywhere.mp4 49.8 MB
~Get Your Files Here !/02 - 1. Why We Need to Rethink Cybersecurity Hiring and Team Building/01 - Why the war on cybercrime is being lost.mp4 48.1 MB
~Get Your Files Here !/02 - 1. Why We Need to Rethink Cybersecurity Hiring and Team Building/02 - The role and roles of the modern cybersecurity team.mp4 47.9 MB
~Get Your Files Here !/06 - 5. Rethinking Technical Interviews to Assess Hands-on Ability and Not Book Knowledge/01 - The purpose of technical interviews.mp4 45.4 MB
~Get Your Files Here !/05 - 4. Writing Foolproof Job Descriptions that Appeal to Great Candidates/02 - What great candidates look for.mp4 45.1 MB
~Get Your Files Here !/03 - 2. Discovering Hidden Potential to Find Your Next Superstars/02 - Hire for potential.mp4 43.1 MB
~Get Your Files Here !/02 - 1. Why We Need to Rethink Cybersecurity Hiring and Team Building/03 - Determine how important security is at your company.mp4 41.4 MB
~Get Your Files Here !/04 - 3. Dispelling Common Myths in Cybersecurity/01 - Myth number one You must have years of experience first.mp4 40.7 MB
~Get Your Files Here !/05 - 4. Writing Foolproof Job Descriptions that Appeal to Great Candidates/01 - Job descriptions that get you what you want.mp4 40.6 MB
~Get Your Files Here !/04 - 3. Dispelling Common Myths in Cybersecurity/04 - Challenge What other myths exist.mp4 40.4 MB
~Get Your Files Here !/02 - 1. Why We Need to Rethink Cybersecurity Hiring and Team Building/04 - Start building trust today.mp4 39.0 MB
~Get Your Files Here !/06 - 5. Rethinking Technical Interviews to Assess Hands-on Ability and Not Book Knowledge/02 - Take-home projects A better way.mp4 38.6 MB
~Get Your Files Here !/07 - 6. Setting Up New Hires for Future Success and Beyond/01 - The first 90 days The most important period.mp4 38.1 MB
~Get Your Files Here !/04 - 3. Dispelling Common Myths in Cybersecurity/03 - Myth number three You need IT fundamentals.mp4 36.0 MB
~Get Your Files Here !/07 - 6. Setting Up New Hires for Future Success and Beyond/02 - Three habits of the highly effective cybersecurity manager.mp4 32.2 MB
~Get Your Files Here !/05 - 4. Writing Foolproof Job Descriptions that Appeal to Great Candidates/03 - Challenge Review your most recent job description.mp4 31.1 MB
~Get Your Files Here !/08 - Conclusion/01 - Next steps.mp4 29.0 MB
~Get Your Files Here !/03 - 2. Discovering Hidden Potential to Find Your Next Superstars/04 - Challenge Reflect on your interview questions.mp4 28.5 MB
猜你喜欢:
Building
Professionals
Generation
Linkedin
Next
Cybersecurity
CourseBoat
com
- 【影视】 [ TutGee.com ] Linkedin - Practical Cybersecurity for IT Professionals
-
收录时间:2023-12-26
文档个数:81
文档大小:388.0 MB
最近下载:2025-05-08
人气:1804
磁力链接
~Get Your Files Here !/04 - 3. Firewalls/03 - Advanced Windows Firewall.mp4 27.1 MB
~Get Your Files Here !/05 - 4. Network Scanning/01 - Getting started with Nmap.mp4 22.0 MB
~Get Your Files Here !/02 - 1. Why Cybersecurity/07 - Emerging trends in cybersecurity.mp4 20.4 MB
~Get Your Files Here !/02 - 1. Why Cybersecurity/01 - A history of hackers.mp4 17.5 MB
~Get Your Files Here !/04 - 3. Firewalls/05 - Introducing Linux iptables.mp4 16.1 MB
~Get Your Files Here !/04 - 3. Firewalls/02 - Windows Firewall basics.mp4 14.5 MB
~Get Your Files Here !/09 - 8. Network Protocols/02 - Capturing packets with Wireshark.mp4 14.3 MB
~Get Your Files Here !/04 - 3. Firewalls/04 - ZedLan firewall log analyser.mp4 13.4 MB
~Get Your Files Here !/02 - 1. Why Cybersecurity/04 - Common forms of cyberattack.mp4 13.1 MB
~Get Your Files Here !/09 - 8. Network Protocols/03 - Making sense of the protocols.mp4 13.0 MB
~Get Your Files Here !/02 - 1. Why Cybersecurity/02 - The cyber kill chain.mp4 12.0 MB
~Get Your Files Here !/03 - 2. Antivirus/01 - Introducing Microsoft Defender Antivirus.mp4 11.7 MB
~Get Your Files Here !/07 - 6. Vulnerability Scanning/01 - Preparing Nessus.mp4 10.5 MB
~Get Your Files Here !/08 - 7. Web Applications/02 - Running an SQL injection attack.mp4 10.1 MB
~Get Your Files Here !/05 - 4. Network Scanning/02 - Advanced Nmap options.mp4 10.0 MB
~Get Your Files Here !/02 - 1. Why Cybersecurity/03 - Stuxnet and the kill chain.mp4 9.8 MB
~Get Your Files Here !/03 - 2. Antivirus/02 - Detecting malware with Microsoft Defender.mp4 9.5 MB
~Get Your Files Here !/04 - 3. Firewalls/06 - Setting up a simple iptables firewall.mp4 9.3 MB
~Get Your Files Here !/06 - 5. Network Connections/02 - Transferring files using netcat.mp4 9.2 MB
~Get Your Files Here !/06 - 5. Network Connections/04 - Setting up a netcat honeypot.mp4 8.9 MB
猜你喜欢:
Professionals
Cybersecurity
Linkedin
Practical
TutGee
com
- 【影视】 [ FreeCourseWeb.com ] Linkedin - Cybersecurity Careers - Become a Security Engineer
-
收录时间:2024-02-04
文档个数:28
文档大小:83.4 MB
最近下载:2025-05-08
人气:642
磁力链接
~Get Your Files Here !/05 - Conclusion/01 - The fun doesn't end.mp4 8.3 MB
~Get Your Files Here !/03 - 2. How to Become a Security Engineer/03 - Certification options.mp4 8.3 MB
~Get Your Files Here !/04 - 3. Day in the Life/01 - Day in the life of a cloud security engineer.mp4 7.7 MB
~Get Your Files Here !/02 - 1. Security Engineering Career Basics/03 - Why pursue a career in cybersecurity.mp4 7.4 MB
~Get Your Files Here !/02 - 1. Security Engineering Career Basics/02 - What's the difference.mp4 7.4 MB
~Get Your Files Here !/02 - 1. Security Engineering Career Basics/01 - What is a security engineer.mp4 7.4 MB
~Get Your Files Here !/03 - 2. How to Become a Security Engineer/04 - Benefits of networking.mp4 7.1 MB
~Get Your Files Here !/04 - 3. Day in the Life/02 - Common challenges.mp4 5.8 MB
~Get Your Files Here !/03 - 2. How to Become a Security Engineer/02 - Develop your skill set.mp4 5.3 MB
~Get Your Files Here !/04 - 3. Day in the Life/03 - Solving problems.mp4 5.2 MB
~Get Your Files Here !/03 - 2. How to Become a Security Engineer/05 - Interviewing for a security engineering position.mp4 5.0 MB
~Get Your Files Here !/03 - 2. How to Become a Security Engineer/01 - Do your research.mp4 4.8 MB
~Get Your Files Here !/01 - 0. Introduction/01 - Becoming a security engineer.mp4 3.7 MB
~Get Your Files Here !/03 - 2. How to Become a Security Engineer/03 - Certification options.srt 8.1 kB
~Get Your Files Here !/03 - 2. How to Become a Security Engineer/04 - Benefits of networking.srt 7.7 kB
~Get Your Files Here !/03 - 2. How to Become a Security Engineer/05 - Interviewing for a security engineering position.srt 6.5 kB
~Get Your Files Here !/02 - 1. Security Engineering Career Basics/02 - What's the difference.srt 6.3 kB
~Get Your Files Here !/04 - 3. Day in the Life/02 - Common challenges.srt 5.7 kB
~Get Your Files Here !/04 - 3. Day in the Life/03 - Solving problems.srt 5.3 kB
~Get Your Files Here !/02 - 1. Security Engineering Career Basics/01 - What is a security engineer.srt 5.3 kB
猜你喜欢:
Cybersecurity
Linkedin
FreeCourseWeb
Become
Security
com
Careers
Engineer
- 【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity Exam Fundamentals
-
收录时间:2024-01-01
文档个数:70
文档大小:2.5 GB
最近下载:2025-05-07
人气:1486
磁力链接
~Get Your Files Here !/05 - Nmap/001 Video and Lab - Introduction to NMap.mp4 220.2 MB
~Get Your Files Here !/05 - Nmap/006 Video and lab - NMap Scripting Engine (NSE).mp4 209.4 MB
~Get Your Files Here !/08 - Privilege Escalation/003 Video and Lab - Windows Privilege Escalation Unquoted Service Path.mp4 134.3 MB
~Get Your Files Here !/07 - Reverse Shells and Persistant Connections/002 Video and Lab - Service Persistence.mp4 121.9 MB
~Get Your Files Here !/08 - Privilege Escalation/002 Video and Lab - Verify Windows Privilege Escalation Unquoted Service Path.mp4 117.8 MB
~Get Your Files Here !/07 - Reverse Shells and Persistant Connections/001 Video and Lab - Establish a Meterpreter Session with Windows 10 Pro.mp4 111.6 MB
~Get Your Files Here !/09 - OWASP top 10 Mitigations/003 Video and Lab - Identify Active Network Hosts and Services Using Nmap.mp4 99.0 MB
~Get Your Files Here !/02 - Virtual Lab Build/001 Video and Lab - Create a Virtual Install of Kali Linux.mp4 97.9 MB
~Get Your Files Here !/02 - Virtual Lab Build/002 Video and Lab - Creating a Virtual Install of Metasploitable2 Using VirtualBox.mp4 87.9 MB
~Get Your Files Here !/06 - 2.0 Information Gathering and Vulnerability Identification Labs/002 Video and Lab - Enumerating Windows 10 Using WinPEAS.mp4 75.0 MB
~Get Your Files Here !/03 - Documentation/005 Video and PPT - Pentesting Final Report.mp4 65.4 MB
~Get Your Files Here !/10 - Web Applications Penetration Testing/001 Video and Lab - Configuring BurpSuite as a Proxy.pdf.mp4 65.1 MB
~Get Your Files Here !/09 - OWASP top 10 Mitigations/001 Video and PPT - Overview of OWASP Top 10.mp4 62.5 MB
~Get Your Files Here !/05 - Nmap/007 Video - Analyzing NMap Results.mp4 61.0 MB
~Get Your Files Here !/05 - Nmap/003 Video - Nmap OS Detection.mp4 59.8 MB
~Get Your Files Here !/09 - OWASP top 10 Mitigations/004 Video and Lab - Perform a Vulnerability Scan Using OWASP Zed Attack Proxy.mp4 56.5 MB
~Get Your Files Here !/09 - OWASP top 10 Mitigations/002 Video and Lab - Spoof Fake TCPIP Packets Using Hping3.mp4 56.2 MB
~Get Your Files Here !/11 - Program Scripting/001 Video and Lab - Create a Windows Reverse Shell Using the PowerShell.mp4 55.9 MB
~Get Your Files Here !/07 - Reverse Shells and Persistant Connections/003 Video and Lab - Create a Windows Reverse Shell Using PowerShell.mp4 55.9 MB
~Get Your Files Here !/06 - 2.0 Information Gathering and Vulnerability Identification Labs/001 Video and lab - Using Banner Grabbing to Aid in Reconnaissance.mp4 55.8 MB
猜你喜欢:
Exam
Cybersecurity
Udemy
DevCourseWeb
Fundamentals
com
- 【影视】 Coursera - Cybersecurity Operations Fundamentals Specialization 2024
-
收录时间:2024-06-03
文档个数:1754
文档大小:2.0 GB
最近下载:2025-05-04
人气:717
磁力链接
Coursera - Security Operations Center (SOC) 2024-1/01_introduction-to-security-operations-center/03_soc-environment-today/01_soc-environment-today.mp4 32.8 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/04_linux-file-system-overview/01_linux-file-system-overview.mp4 26.4 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/15_linux-command-shell-concepts/01_linux-command-shell-concepts.mp4 25.9 MB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/16_controlling-services-and-processes/01_controlling-services-and-processes.mp4 22.4 MB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/08_packet-capture-using-tcpdump/01_packet-capture-using-tcpdump.mp4 19.3 MB
Coursera - Security Operations Center (SOC) 2024-1/04_staffing-an-effective-soc-team/03_interaction-of-different-roles-within-the-soc/02_interaction-of-various-roles-within-the-soc.mp4 18.9 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/21_viewing-running-network-services/01_viewing-running-network-services.mp4 18.0 MB
Coursera - Security Operations Center (SOC) 2024-1/03_soc-deployment-models-and-types/02_soc-types-and-staffing-considerations/02_soc-types-and-staffing-considerations.mp4 17.8 MB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/20_windows-netstat-command/01_windows-netstat-command.mp4 17.7 MB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/04_ip-vulnerabilities/02_ip-vulnerabilities.mp4 16.6 MB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/02_host-based-personal-firewall/01_host-based-personal-firewall.mp4 16.3 MB
Coursera - Security Operations Center (SOC) 2024-1/03_soc-deployment-models-and-types/03_soc-models-and-their-consumers/02_soc-models-and-their-consumers.mp4 16.1 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/13_system-processes/01_system-processes.mp4 15.9 MB
Coursera - Security Operations Center (SOC) 2024-1/06_developing-key-relationships-with-internal-and-external-stakeholders/03_external-stakeholders/02_external-stakeholders.mp4 15.3 MB
Coursera - Security Operations Center (SOC) 2024-1/01_introduction-to-security-operations-center/04_goal-of-a-soc/01_goal-of-a-soc.mp4 15.0 MB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/05_http-operations/02_http-operations.mp4 14.5 MB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/16_netflow-as-a-security-tool/01_netflow-as-a-security-tool.mp4 14.5 MB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/08_windows-file-system-structure/01_windows-file-system-structure.mp4 14.3 MB
Coursera - Security Operations Center (SOC) 2024-1/05_security-events-data-and-soc-analyst-tools/02_soc-relevant-data-and-security-event-data/01_soc-relevant-data-and-security-event-data-introduction.mp4 14.0 MB
Coursera - Security Operations Center (SOC) 2024-1/06_developing-key-relationships-with-internal-and-external-stakeholders/02_internal-stakeholders/02_internal-stakeholders.mp4 13.7 MB
猜你喜欢:
Operations
Specialization
Cybersecurity
Coursera
2024
Fundamentals
- 【影视】 [ CourseLala.com ] Linkedin - IT and Cybersecurity Risk Management Essential Training
-
收录时间:2022-02-10
文档个数:52
文档大小:904.4 MB
最近下载:2025-05-02
人气:1812
磁力链接
~Get Your Files Here !/4. IT Risk Management in Practice/019. IT risk management techniques.mp4 60.9 MB
~Get Your Files Here !/3. IT Risk Management in Context/009. IT risk management in medium companies.mp4 58.5 MB
~Get Your Files Here !/3. IT Risk Management in Context/010. IT risk management in large companies.mp4 57.2 MB
~Get Your Files Here !/5. IT Risk Management on the Job/020. Choosing the right IT risk management technique.mp4 52.4 MB
~Get Your Files Here !/5. IT Risk Management on the Job/023. Operating controls.mp4 47.2 MB
~Get Your Files Here !/2. What Is IT Risk Management/002. What is IT risk.mp4 42.6 MB
~Get Your Files Here !/4. IT Risk Management in Practice/014. Performing the IT risk assessment.mp4 41.3 MB
~Get Your Files Here !/4. IT Risk Management in Practice/018. Using an IT risk register.mp4 40.9 MB
~Get Your Files Here !/4. IT Risk Management in Practice/015. Choosing an IT risk management framework.mp4 40.0 MB
~Get Your Files Here !/3. IT Risk Management in Context/008. IT risk management in small companies.mp4 39.5 MB
~Get Your Files Here !/5. IT Risk Management on the Job/022. Implementing controls.mp4 35.1 MB
~Get Your Files Here !/2. What Is IT Risk Management/006. IT risk management roles and responsibilities.mp4 34.9 MB
~Get Your Files Here !/5. IT Risk Management on the Job/021. Choosing controls.mp4 34.4 MB
~Get Your Files Here !/2. What Is IT Risk Management/007. Making an IT risk decision.mp4 33.9 MB
~Get Your Files Here !/2. What Is IT Risk Management/005. Types of IT risks.mp4 33.3 MB
~Get Your Files Here !/3. IT Risk Management in Context/013. The minimum viable approach.mp4 32.7 MB
~Get Your Files Here !/3. IT Risk Management in Context/011. Quantitative vs. qualitative risk assessments.mp4 32.6 MB
~Get Your Files Here !/4. IT Risk Management in Practice/017. Determining an acceptable level of IT risk.mp4 30.3 MB
~Get Your Files Here !/5. IT Risk Management on the Job/024. Validating controls.mp4 29.9 MB
~Get Your Files Here !/2. What Is IT Risk Management/004. What is IT risk tolerance.mp4 28.4 MB
猜你喜欢:
Training
Management
Risk
Cybersecurity
CourseLala
Linkedin
com
Essential
- 【影视】 [ FreeCourseWeb.com ] Linkedin - Cybersecurity Awareness - Phishing Attacks
-
收录时间:2022-03-04
文档个数:39
文档大小:642.7 MB
最近下载:2025-05-02
人气:1592
磁力链接
~Get Your Files Here !/4. How to Catch a Phish/012. Catch a phish red-handed Common indicators of a phish.mp4 48.9 MB
~Get Your Files Here !/3. Different Types of Phishing Attacks/010. Other notable methods of phishing.mp4 47.3 MB
~Get Your Files Here !/2. An Overview of Phishing/004. How does phishing affect us.mp4 46.9 MB
~Get Your Files Here !/2. An Overview of Phishing/005. A review of the psychology behind social engineering attacks.mp4 45.0 MB
~Get Your Files Here !/5. How to Defend against Phishing Attacks/015. How technology helps with the fight against phishing attacks.mp4 41.6 MB
~Get Your Files Here !/4. How to Catch a Phish/013. Is this a phish Real-world examples of phishing attacks.mp4 38.5 MB
~Get Your Files Here !/3. Different Types of Phishing Attacks/007. Unfriended How to spot a social media phish.mp4 38.5 MB
~Get Your Files Here !/4. How to Catch a Phish/011. What makes phishing attacks successful.mp4 36.9 MB
~Get Your Files Here !/3. Different Types of Phishing Attacks/008. Getting specific with targeted phishing attacks.mp4 34.9 MB
~Get Your Files Here !/3. Different Types of Phishing Attacks/006. Is it a harmless unknown caller or vishing.mp4 34.6 MB
~Get Your Files Here !/6. What Happens If You Fall for a Phish/018. Falling for a phishing attack at home.mp4 34.5 MB
~Get Your Files Here !/2. An Overview of Phishing/003. Money is the motive The reason behind phishing.mp4 34.1 MB
~Get Your Files Here !/5. How to Defend against Phishing Attacks/016. Practice makes perfect An overview of phishing simulations.mp4 32.6 MB
~Get Your Files Here !/2. An Overview of Phishing/002. Phishing The dangers of email.mp4 32.3 MB
~Get Your Files Here !/3. Different Types of Phishing Attacks/009. SMS phishing A text-based attack.mp4 31.8 MB
~Get Your Files Here !/6. What Happens If You Fall for a Phish/017. Responding to a phishing attack at work.mp4 23.4 MB
~Get Your Files Here !/5. How to Defend against Phishing Attacks/014. The most common ways to defend against a phish.mp4 23.1 MB
~Get Your Files Here !/1. Introduction/001. About phishing attacks.mp4 9.8 MB
~Get Your Files Here !/7. Conclusion/019. Next steps and takeaways.mp4 7.8 MB
~Get Your Files Here !/Ex_Files_Cybersecurity_Awareness_Phishing_Attacks/Exercise Files/Additional Resources.pdf 47.6 kB
猜你喜欢:
Attacks
Cybersecurity
Linkedin
Phishing
FreeCourseWeb
com
Awareness
- 【影视】 [Tutorialsplanet.NET] Udemy - Real-World Ethical Hacking Hands-on Cybersecurity
-
收录时间:2021-05-01
文档个数:179
文档大小:4.7 GB
最近下载:2025-05-01
人气:171
磁力链接
13. Bonus Videos National Cyber Warrior Academy, Interviews and More/3. NCWA 2017 Facebook Live Video on Car Hacking and Drone Programming.mp4 441.0 MB
13. Bonus Videos National Cyber Warrior Academy, Interviews and More/5. Dr. Payne's TEDx Talk on Coding and Cyber as the New Literacy.mp4 320.7 MB
7. BONUS Section Car Hacking in Kali Linux!/9. Car Hacking LIVE on Dr. Payne's VW Jetta Facebook Live Video from NCWA 2017.mp4 168.6 MB
3. Important Linux and Windows Terminal Commands/5. BONUS Fun Linux Terminal Commands (Optional).mp4 166.3 MB
6. Recon Information Gathering, Scanning and Enumeration/3. theHarvester How hackers find users and email information for phishing.mp4 157.5 MB
6. Recon Information Gathering, Scanning and Enumeration/6. Legion Active network and vulnerability scanning with LEGION GUI.mp4 149.2 MB
4. Create a Virtual Network for Ethical Hacking!/3. Connecting Your VMs to the Host-Only Network.mp4 148.8 MB
6. Recon Information Gathering, Scanning and Enumeration/5. nmap Active Scanning with nmap.mp4 148.0 MB
2. Create Your Own Virtual Hacking Lab!/4. Create an Android PhoneTablet VM for Mobile Hacking!.mp4 142.1 MB
3. Important Linux and Windows Terminal Commands/2. Basic Linux Commands.mp4 112.6 MB
4. Create a Virtual Network for Ethical Hacking!/4. Creating and Using a Public NAT Network in VBox.mp4 112.5 MB
4. Create a Virtual Network for Ethical Hacking!/5. Updating Kali and Windows VMs.mp4 110.5 MB
4. Create a Virtual Network for Ethical Hacking!/2. Creating the Private, Host-Only 10.0.3.x Network.mp4 105.2 MB
2. Create Your Own Virtual Hacking Lab!/3. Create a Windows 10 VM.mp4 104.9 MB
3. Important Linux and Windows Terminal Commands/4. More Helpful Linux Commands.mp4 100.4 MB
6. Recon Information Gathering, Scanning and Enumeration/4. Recon-ng Enumeration of servershosts with Recon-ng.mp4 91.4 MB
2. Create Your Own Virtual Hacking Lab!/2. Building a Kali Linux Virtual Machine.mp4 88.0 MB
6. Recon Information Gathering, Scanning and Enumeration/2. OSINT (Open-Source INTelligence) Framework Domain Dossier.mp4 76.8 MB
2. Create Your Own Virtual Hacking Lab!/5. The Ultimately Hackable Metasploitable!.mp4 70.2 MB
2. Create Your Own Virtual Hacking Lab!/1. Virtual Lab Intro and VirtualBox Installation.mp4 66.7 MB
猜你喜欢:
Tutorialsplanet
Real
Ethical
Cybersecurity
Udemy
Hands
World
NET
Hacking
- 【影视】 [ CoursePig.com ] Linkedin - The Cybersecurity Threat Landscape (2022)
-
收录时间:2024-05-29
文档个数:42
文档大小:232.7 MB
最近下载:2025-04-21
人气:186
磁力链接
~Get Your Files Here !/10 - 9. Supply Chain Attacks and Third-Party Risks/01 - The threat of supply chain attacks and third-party risks.mp4 16.2 MB
~Get Your Files Here !/05 - 4. Botnets and DDoS attacks/02 - Protect against botnets and DDoS threats.mp4 15.8 MB
~Get Your Files Here !/08 - 7. Unmanaged IoT Devices/01 - Explore the threat of unmanaged IoT devices.mp4 14.4 MB
~Get Your Files Here !/09 - 8. Shadow IT/01 - Explore the threat of shadow IT.mp4 14.2 MB
~Get Your Files Here !/08 - 7. Unmanaged IoT Devices/02 - Protect against unmanaged IoT devices.mp4 12.4 MB
~Get Your Files Here !/09 - 8. Shadow IT/02 - Protect against shadow IT.mp4 12.4 MB
~Get Your Files Here !/06 - 5. Deepfakes/02 - Protect against deepfakes.mp4 12.1 MB
~Get Your Files Here !/03 - 2. Phishing and Smishing/02 - Protect against phishing and smishing.mp4 12.0 MB
~Get Your Files Here !/11 - Conclusion/01 - Stay up to date on cybersecurity.mp4 11.8 MB
~Get Your Files Here !/02 - 1. Malware and Ransomware/02 - Protect against malware and ransomware.mp4 11.7 MB
~Get Your Files Here !/02 - 1. Malware and Ransomware/01 - Explore the threat of malware and ransomware.mp4 11.6 MB
~Get Your Files Here !/03 - 2. Phishing and Smishing/01 - Explore the threat of phishing and smishing.mp4 11.3 MB
~Get Your Files Here !/05 - 4. Botnets and DDoS attacks/01 - Explore the threat of botnets and DDoS attacks.mp4 11.1 MB
~Get Your Files Here !/07 - 6. Insider Threats/01 - Explore the risk of insider threats.mp4 10.9 MB
~Get Your Files Here !/10 - 9. Supply Chain Attacks and Third-Party Risks/02 - Protect against supply chain attacks and third-party risks.mp4 10.5 MB
~Get Your Files Here !/04 - 3. Business Email Compromise/01 - Explore the threat of business email compromise.mp4 9.4 MB
~Get Your Files Here !/01 - Introduction/01 - Examine the cybersecurity threat landscape.mp4 9.4 MB
~Get Your Files Here !/04 - 3. Business Email Compromise/02 - Protect against business email compromise.mp4 9.2 MB
~Get Your Files Here !/06 - 5. Deepfakes/01 - Explore the threat of deepfakes.mp4 9.0 MB
~Get Your Files Here !/07 - 6. Insider Threats/02 - Protect against insider threats.mp4 7.0 MB
猜你喜欢:
2022
Cybersecurity
CoursePig
Linkedin
Threat
com
Landscape
- 【影视】 Aerospace Cybersecurity - Satellite Hacking (W53)
-
收录时间:2024-01-09
文档个数:28
文档大小:2.9 GB
最近下载:2025-04-09
人气:105
磁力链接
Module 1 - Satellite Reconnaissance/7. (W53M01) Python Programs for Satellite Reconnaissance.mp4 303.7 MB
Module 1 - Satellite Reconnaissance/6. (W53M01) OSINT Tools for Satellite Data Extraction.mp4 253.1 MB
Module 1 - Satellite Reconnaissance/4. (W53M01) Satellite Subsystems and Attack Surfaces.mp4 206.3 MB
Module 3 - Reverse Engineering and Decoding Communication/4. (W53M03) Decoding Satellite Communications Using SatNogs and Reverse Engineering.mp4 176.2 MB
Module 4 - Vulnerabilities and Attacks/4. (W53M04) Dive Further Into Attacks and More CTF Practice.mp4 174.4 MB
Module 3 - Reverse Engineering and Decoding Communication/1. (W53M03) Overview of Satellite Communications.mp4 168.9 MB
Module 1 - Satellite Reconnaissance/2. (W53M01) Satellites and Ground Stations.mp4 168.2 MB
Module 2 - Communication Analysis and Eavesdropping/3. (W53M02) Command & Data Handling & Payloads.mp4 162.6 MB
Module 1 - Satellite Reconnaissance/5. (W53M01) Spherical Grid System.mp4 161.0 MB
Module 3 - Reverse Engineering and Decoding Communication/3. (W53M03) Decoding Communications Using Wireshark and GNU Radio.mp4 148.0 MB
Module 4 - Vulnerabilities and Attacks/1. (W53M04) Common Attacks and Interactive Labs.mp4 137.0 MB
Module 2 - Communication Analysis and Eavesdropping/1. (W53M02) Communication Foundations.mp4 135.6 MB
Module 3 - Reverse Engineering and Decoding Communication/2. (W53M03) Analyzing Satellite Communication Using gpredict, SatDump, & WXtolMG.mp4 135.3 MB
Module 4 - Vulnerabilities and Attacks/3. (W53M04) Detecting Attacks and Mitigation Strategies.mp4 128.6 MB
Module 2 - Communication Analysis and Eavesdropping/2. (W53M02) Link Design & Protocols.mp4 113.8 MB
Module 2 - Communication Analysis and Eavesdropping/4. (W53M02) Satellite Networks & Vulnerabilities.mp4 89.2 MB
Module 4 - Vulnerabilities and Attacks/2. (W53M04) Future of Satellite Security and Next Steps.mp4 85.1 MB
Module 1 - Satellite Reconnaissance/1. (W53M01) Introduction.mp4 79.1 MB
Module 1 - Satellite Reconnaissance/3. (W53M01) Information Extraction Methods.mp4 78.3 MB
Module 1 - Satellite Reconnaissance/4. (W53M01) Satellite Subsystems and Attack Surfaces.vtt 45.2 kB
猜你喜欢:
Cybersecurity
W53
Satellite
Hacking
Aerospace
- 【影视】 Lynda - Foundations of Cybersecurity
-
收录时间:2017-02-08
文档个数:27
文档大小:300.9 MB
最近下载:2025-03-22
人气:383
磁力链接
021 Managing user access and identity.mp4 20.7 MB
022 Implementing preventative security.mp4 18.8 MB
023 Monitoring and alerts.mp4 15.7 MB
018 Describing security requirements.mp4 14.9 MB
008 Dissecting the payment card industry and PCI DSS.mp4 14.6 MB
007 Implementing control frameworks.mp4 14.3 MB
025 Preparing for an incident.mp4 14.2 MB
019 Architecting security risk.mp4 13.5 MB
016 Understanding advanced persistent threats (APTs).mp4 13.5 MB
004 Dissecting cyber risk.mp4 13.1 MB
003 Understanding the NIST cybersecurity framework.mp4 12.6 MB
011 Dissecting security threats.mp4 11.6 MB
026 Responding to an incident.mp4 11.5 MB
005 Unpacking COBIT 5.mp4 10.3 MB
012 Exploring cybercrime as an industry.mp4 9.9 MB
014 Using callbacks to capture keystrokes.mp4 9.8 MB
015 Hiding malware with rootkits.mp4 9.8 MB
009 Exploring the Cyber Essentials framework.mp4 9.3 MB
013 Hiding malware through cloaking and alternate data streams.mp4 9.0 MB
020 Selecting security controls.mp4 8.5 MB
猜你喜欢:
Cybersecurity
Lynda
Foundations
- 【影视】 MalTrak - Cybersecurity ATTACK & DEFENSE The Foundations
-
收录时间:2023-12-18
文档个数:22
文档大小:2.6 GB
最近下载:2025-03-20
人气:126
磁力链接
Module 01 - ATTACK/01 - Targeted Attack Real Scenario.mp4 423.3 MB
Module 01 - ATTACK/02 - Advanced Penetration Testing & Red Team Operations (Hands-On).mp4 362.7 MB
Bonus Module - Advanced Attacks/Fileless Attacks and Targeted Ransomware Attacks.mp4 339.9 MB
Module 02 - RESPOND/02 - Log Analysis With Splunk (Hands-On).mp4 255.3 MB
Module 03 - INVESTIGATE/05 - Behavioral and Code Analysis.mp4 242.3 MB
Module 02 - RESPOND/01 - Incident Response Process & Log Analysis.mp4 224.2 MB
Module 03 - INVESTIGATE/04 - Basic Static Analysis - PE Headers.mp4 215.0 MB
Module 02 - RESPOND/03 - Live Forensics and System Triage (Hands-On).mp4 212.1 MB
Module 03 - INVESTIGATE/01 - Malware Analysis Intro.mp4 124.1 MB
Module 03 - INVESTIGATE/03 - Basic Static Analysis (Hands-On).mp4 89.5 MB
Module 03 - INVESTIGATE/02 - Basic Static Analysis - Finding Clues in Text.mp4 67.8 MB
Module 01 - ATTACK/Resources/Module01 - Real Attack Scenario.pptx 5.6 MB
Module 03 - INVESTIGATE/Resources/Module03 - Malware Analysis.pptx 4.1 MB
Module 03 - INVESTIGATE/Resources/Module03 - Malware Analysis.pdf 3.0 MB
Module 03 - INVESTIGATE/Resources/iranian_apt_docx_with_macro.zip 2.7 MB
Module 01 - ATTACK/Resources/Module01 - Real Attack Scenario.pdf 2.6 MB
Module 02 - RESPOND/Resources/Module02 - Incident Response & Forensics.pptx 1.8 MB
Bonus Module - Advanced Attacks/Resources/Module04 - Fileless Attacks, Targeted Ransomware & Yara Rules.pptx 1.7 MB
Module 02 - RESPOND/Resources/drupal_webattack.log 1.4 MB
Bonus Module - Advanced Attacks/Resources/Module04 - Fileless Attacks, Targeted Ransomware & Yara Rules.pdf 1.2 MB
猜你喜欢:
Cybersecurity
Foundations
ATTACK
DEFENSE
MalTrak
- 【影视】 [ TutPig.com ] Linkedin - Cybersecurity Awareness - Cybersecurity Terminology
-
收录时间:2023-12-19
文档个数:34
文档大小:109.8 MB
最近下载:2025-03-15
人气:478
磁力链接
~Get Your Files Here !/04 - 3. Process/01 - Understanding processes and documentation.mp4 10.5 MB
~Get Your Files Here !/05 - 4. Technology/01 - Secure practices, terms, and exercises.mp4 10.1 MB
~Get Your Files Here !/06 - 5. Threat Actors and Risks/02 - Technical risks.mp4 8.8 MB
~Get Your Files Here !/03 - 2. People/01 - Security awareness and leadership.mp4 8.6 MB
~Get Your Files Here !/03 - 2. People/04 - Understanding privacy.mp4 8.3 MB
~Get Your Files Here !/06 - 5. Threat Actors and Risks/03 - Threats that target the human element.mp4 7.7 MB
~Get Your Files Here !/04 - 3. Process/02 - Technical controls.mp4 7.3 MB
~Get Your Files Here !/05 - 4. Technology/02 - Network controls.mp4 7.1 MB
~Get Your Files Here !/05 - 4. Technology/03 - Advancements in technology.mp4 7.1 MB
~Get Your Files Here !/06 - 5. Threat Actors and Risks/01 - Threat actors and definitions.mp4 7.1 MB
~Get Your Files Here !/02 - 1. Defining Cybersecurity and People, Process, and Technology/01 - What is cybersecurity.mp4 6.0 MB
~Get Your Files Here !/01 - Introduction/01 - Welcome to Cybersecurity Terminology 101.mp4 5.7 MB
~Get Your Files Here !/03 - 2. People/02 - Red vs. blue vs. purple teams.mp4 5.0 MB
~Get Your Files Here !/03 - 2. People/03 - Who are the adversaries.mp4 4.7 MB
~Get Your Files Here !/02 - 1. Defining Cybersecurity and People, Process, and Technology/02 - People, process, and technology.mp4 2.9 MB
~Get Your Files Here !/07 - Conclusion/01 - Apply cybersecurity terminology.mp4 2.8 MB
~Get Your Files Here !/04 - 3. Process/01 - Understanding processes and documentation.srt 6.2 kB
~Get Your Files Here !/06 - 5. Threat Actors and Risks/01 - Threat actors and definitions.srt 6.1 kB
~Get Your Files Here !/06 - 5. Threat Actors and Risks/03 - Threats that target the human element.srt 5.7 kB
~Get Your Files Here !/04 - 3. Process/02 - Technical controls.srt 5.7 kB
猜你喜欢:
Cybersecurity
Linkedin
Awareness
TutPig
com
Terminology
- 【影视】 [ FreeCourseWeb.com ] Linkedin - The Future of Work and Cybersecurity on the Metaverse
-
收录时间:2024-05-07
文档个数:42
文档大小:101.1 MB
最近下载:2025-03-14
人气:219
磁力链接
~Get Your Files Here !/03 - 2. The Essentials/03 - The future of work potential risk categories.mp4 6.9 MB
~Get Your Files Here !/03 - 2. The Essentials/02 - The impact of cyber threats on your business or industry.mp4 6.7 MB
~Get Your Files Here !/04 - 3. Threats/10 - Does metaverse-based work need an HR redesign.mp4 6.5 MB
~Get Your Files Here !/05 - Conclusion/01 - The future of the metaverse of work.mp4 6.4 MB
~Get Your Files Here !/04 - 3. Threats/11 - Decoupling business units and needs.mp4 6.2 MB
~Get Your Files Here !/02 - 1. Defining the Metaverse/01 - What is the metaverse today.mp4 5.6 MB
~Get Your Files Here !/01 - Introduction/02 - What to know before starting this course.mp4 5.5 MB
~Get Your Files Here !/04 - 3. Threats/09 - Regulations for metaverse-based work.mp4 5.2 MB
~Get Your Files Here !/04 - 3. Threats/02 - Threats to your brand.mp4 4.9 MB
~Get Your Files Here !/04 - 3. Threats/08 - Identity theft threats.mp4 4.8 MB
~Get Your Files Here !/03 - 2. The Essentials/01 - Understanding the metaverse environment and its suitability for your industry.mp4 4.7 MB
~Get Your Files Here !/04 - 3. Threats/07 - Cybersecurity threats.mp4 4.6 MB
~Get Your Files Here !/04 - 3. Threats/03 - Threats to your job profile or role.mp4 4.6 MB
~Get Your Files Here !/04 - 3. Threats/04 - Platform-specific threats.mp4 4.6 MB
~Get Your Files Here !/04 - 3. Threats/06 - Regulatory professional threats.mp4 4.5 MB
~Get Your Files Here !/02 - 1. Defining the Metaverse/02 - The various ways in which the metaverse can impact work.mp4 4.4 MB
~Get Your Files Here !/04 - 3. Threats/01 - Threats to the profession.mp4 4.4 MB
~Get Your Files Here !/04 - 3. Threats/05 - Hardware equipment-specific threats.mp4 4.3 MB
~Get Your Files Here !/01 - Introduction/01 - Why discuss the future of work and the metaverse.mp4 3.9 MB
~Get Your Files Here !/05 - Conclusion/02 - Where to begin.mp4 2.4 MB
猜你喜欢:
Cybersecurity
Work
Linkedin
Metaverse
Future
FreeCourseWeb
com