磁力管家

磁力管家
为您索检到3555条磁力链接,耗时22毫秒。 rss

分享给好友

【影视】 Linux Security for Beginners
收录时间:2022-04-30 文档个数:342 文档大小:5.1 GB 最近下载:2025-05-16 人气:4264 磁力链接
  • mp4[TutsNode.com] - Linux Security for Beginners/11. Network Security/4. Using Wireshark and tcpdump to analyze network traffic.mp4 133.2 MB
  • mp4[TutsNode.com] - Linux Security for Beginners/12. Network Intrusion Detection/3. How to configure Snort.mp4 121.0 MB
  • mp4[TutsNode.com] - Linux Security for Beginners/4. Encrypted File Systems/5. Using dm-crypt with LUKS1.mp4 115.1 MB
  • mp4[TutsNode.com] - Linux Security for Beginners/11. Network Security/3. Configuration of FreeRADIUS for network node authentication.mp4 114.3 MB
  • mp4[TutsNode.com] - Linux Security for Beginners/2. X.509 Certificates and Public Key Infrastructures/6. Requesting, signing, managing, and revoking certificates.mp4 114.1 MB
  • mp4[TutsNode.com] - Linux Security for Beginners/8. Resource Control/4. Using systemd units to limit system resources.mp4 112.9 MB
  • mp4[TutsNode.com] - Linux Security for Beginners/3. X.509 Certificates for Encryption, Signing and Authentication/4. Configuring Apache HTTPD to serve certificate chains - Part 1.mp4 109.3 MB
  • mp4[TutsNode.com] - Linux Security for Beginners/3. X.509 Certificates for Encryption, Signing and Authentication/3. Configuring Apache HTTPD for HTTPS service (SNI and HSTS).mp4 103.0 MB
  • mp4[TutsNode.com] - Linux Security for Beginners/11. Network Security/5. Using Wireshark and tcpdump to analyze network traffic (PART 2).mp4 101.9 MB
  • mp4[TutsNode.com] - Linux Security for Beginners/7. Host Intrusion Detection/2. Using and configuring the Linux Audit system.mp4 99.9 MB
  • mp4[TutsNode.com] - Linux Security for Beginners/5. DNS and Cryptography/4. DNS with bind 1.mp4 92.9 MB
  • mp4[TutsNode.com] - Linux Security for Beginners/13. Packet Filtering/3. Using iptables.mp4 90.3 MB
  • mp4[TutsNode.com] - Linux Security for Beginners/4. Encrypted File Systems/7. File Level Encryption.mp4 88.5 MB
  • mp4[TutsNode.com] - Linux Security for Beginners/5. DNS and Cryptography/2. Understanding DNS, zones, and resource records.mp4 85.8 MB
  • mp4[TutsNode.com] - Linux Security for Beginners/2. X.509 Certificates and Public Key Infrastructures/5. Creating a certificate authority.mp4 85.8 MB
  • mp4[TutsNode.com] - Linux Security for Beginners/6. Host Hardening/2. Disabling unused software and services.mp4 84.0 MB
  • mp4[TutsNode.com] - Linux Security for Beginners/14. Virtual Private Networks/4. Understanding OpenVPN.mp4 83.4 MB
  • mp4[TutsNode.com] - Linux Security for Beginners/4. Encrypted File Systems/3. Block Level Encryption 1.mp4 78.3 MB
  • mp4[TutsNode.com] - Linux Security for Beginners/3. X.509 Certificates for Encryption, Signing and Authentication/8. Using OpenSSL for SSLTLS clients and server tests.mp4 76.9 MB
  • mp4[TutsNode.com] - Linux Security for Beginners/6. Host Hardening/6. Creating SSH certificates for SSH.mp4 76.6 MB
【影视】 [ DevCourseWeb.com ] Udemy - CompTIA Security + - Architecture and Design 2022
收录时间:2022-04-30 文档个数:23 文档大小:3.8 GB 最近下载:2025-05-15 人气:2423 磁力链接
  • mp4~Get Your Files Here !/03 - Architecture and Design/002 Summarize virtualization and cloud computing concepts.mp4 751.6 MB
  • mp4~Get Your Files Here !/03 - Architecture and Design/001 Explain the importance of security concepts in an enterprise environment.mp4 518.4 MB
  • mp4~Get Your Files Here !/03 - Architecture and Design/003 Summarize secure application development, deployment, and automation concepts.mp4 513.3 MB
  • mp4~Get Your Files Here !/03 - Architecture and Design/006 Explain the security implications of embedded and specialized systems.mp4 404.0 MB
  • mp4~Get Your Files Here !/03 - Architecture and Design/005 Given a scenario, implement cybersecurity resilience.mp4 340.1 MB
  • mp4~Get Your Files Here !/01 - Introduction to company/001 Introduction to certcop.mp4 330.6 MB
  • mp4~Get Your Files Here !/03 - Architecture and Design/004 Summarize authentication and authorization design concepts.mp4 328.8 MB
  • mp4~Get Your Files Here !/03 - Architecture and Design/008 Summarize the basics of cryptographic concepts.mp4 321.7 MB
  • mp4~Get Your Files Here !/03 - Architecture and Design/007 Explain the importance of physical security controls.mp4 222.4 MB
  • mp4~Get Your Files Here !/02 - Introduction to CompTIA/001 CompTIA Security+ and Free Flash Cards.mp4 54.4 MB
  • pdf~Get Your Files Here !/02 - Introduction to CompTIA/40656214-Security-Flsh-Cards.pdf 5.0 MB
  • vtt~Get Your Files Here !/03 - Architecture and Design/002 Summarize virtualization and cloud computing concepts_en.vtt 78.5 kB
  • vtt~Get Your Files Here !/03 - Architecture and Design/003 Summarize secure application development, deployment, and automation concepts_en.vtt 67.3 kB
  • vtt~Get Your Files Here !/03 - Architecture and Design/001 Explain the importance of security concepts in an enterprise environment_en.vtt 64.4 kB
  • vtt~Get Your Files Here !/03 - Architecture and Design/005 Given a scenario, implement cybersecurity resilience_en.vtt 59.2 kB
  • vtt~Get Your Files Here !/03 - Architecture and Design/008 Summarize the basics of cryptographic concepts_en.vtt 53.3 kB
  • vtt~Get Your Files Here !/03 - Architecture and Design/007 Explain the importance of physical security controls_en.vtt 47.7 kB
  • vtt~Get Your Files Here !/03 - Architecture and Design/006 Explain the security implications of embedded and specialized systems_en.vtt 47.6 kB
  • vtt~Get Your Files Here !/03 - Architecture and Design/004 Summarize authentication and authorization design concepts_en.vtt 43.1 kB
  • vtt~Get Your Files Here !/01 - Introduction to company/001 Introduction to certcop_en.vtt 29.5 kB
【影视】 Security (2017) 1080p H264 EAC3 5.1 Ita Eng Sub Ita Eng [NF WEBRip by Zoult MIRCrew]
收录时间:2022-04-29 文档个数:5 文档大小:1.9 GB 最近下载:2025-05-16 人气:2118 磁力链接
  • mp4Security.2017.1080p.H264.EAC3.5.1.Ita.Eng.Sub.Ita.Eng-NF.WEBRip.by.Zoult.MIRCrew.mp4 1.9 GB
  • pad/450102.pad/450102 450.1 kB
  • pad/449749.pad/449749 449.7 kB
  • srtSecurity.2017.1080p.H264.EAC3.5.1.Ita.Eng.Sub.Ita.Eng-NF.WEBRip.by.Zoult.MIRCrew.ENG.srt 74.5 kB
  • srtSecurity.2017.1080p.H264.EAC3.5.1.Ita.Eng.Sub.Ita.Eng-NF.WEBRip.by.Zoult.MIRCrew.ITA.srt 74.2 kB
【影视】 Pluralsight - Planning and Implementing Networking and Security in Office 365 by Brian Alderman
收录时间:2022-04-29 文档个数:11 文档大小:184.8 MB 最近下载:2025-05-13 人气:792 磁力链接
  • mp44.Administrating Microsoft Azure Rights Management/2.Configuring and Managing Azure Rights Management Using a GUI and PowerShell.mp4 38.0 MB
  • mp43.Enabling Client Connectivity to Office 365/2.Planning and Configuring for Client Connectivity.mp4 34.2 MB
  • mp45.Manage Administrator Roles in Office 365/1.Managing Office 365 Administrator Roles Using the Office 365 Admin Center.mp4 25.4 MB
  • mp42.Creating DNS Records for Services/1.Course Intro and Office 365 DNS Records.mp4 20.1 MB
  • mp44.Administrating Microsoft Azure Rights Management/1.Introducing and Activating Azure Rights Management.mp4 19.2 MB
  • mp43.Enabling Client Connectivity to Office 365/1.Exploring Office 365 Client Firewall and Port Settings.mp4 14.8 MB
  • mp42.Creating DNS Records for Services/2.Verifying Your Domain in Office 365.mp4 12.2 MB
  • mp45.Manage Administrator Roles in Office 365/2.Configuring Password Options and Managing Administrator Roles with PowerShell.mp4 10.6 MB
  • mp41.Course Overview/1.Course Overview.mp4 7.0 MB
  • zipplanning-implementing-networking-security-o365.zip 3.4 MB
  • txtcontent.txt 1.1 kB
【影视】 [ CourseHulu.com ] Salesforce Sharing and Security Fundamentals by Scott Lee
收录时间:2022-04-28 文档个数:269 文档大小:270.8 MB 最近下载:2025-05-16 人气:881 磁力链接
  • mp4~Get Your Files Here !/05. Sharing Records with Your Friends/26. Demo.Setting up Sharing.mp4 21.4 MB
  • mp4~Get Your Files Here !/04. Producing Profiles and Permissions/21. Demo.Configuring a Profile.mp4 20.6 MB
  • mp4~Get Your Files Here !/07. Developing Less Vulnerable Code/41. Demo.Record Sharing in Apex.mp4 19.1 MB
  • mp4~Get Your Files Here !/03. Managing Users for Security Control/09. User Administration.mp4 16.9 MB
  • mp4~Get Your Files Here !/07. Developing Less Vulnerable Code/37. Knowing Vulnerability Categories.mp4 9.5 MB
  • mp4~Get Your Files Here !/07. Developing Less Vulnerable Code/38. Lightning Component Considerations.mp4 9.4 MB
  • mp4~Get Your Files Here !/06. Avoiding Fake Security Traps on Page Layouts/34. Demo.Looking at Field Visibility.mp4 8.9 MB
  • mp4~Get Your Files Here !/05. Sharing Records with Your Friends/25. Sharing Rules.mp4 8.8 MB
  • mp4~Get Your Files Here !/07. Developing Less Vulnerable Code/39. Configuring Apex for Security.mp4 8.1 MB
  • mp4~Get Your Files Here !/06. Avoiding Fake Security Traps on Page Layouts/32. Beware the User Interface.mp4 8.1 MB
  • mp4~Get Your Files Here !/02. Introduction/03. Prerequisites.mp4 7.6 MB
  • mp4~Get Your Files Here !/03. Managing Users for Security Control/12. Demo.Setting up Users.mp4 6.8 MB
  • mp4~Get Your Files Here !/05. Sharing Records with Your Friends/29. Performance Considerations.mp4 6.8 MB
  • mp4~Get Your Files Here !/04. Producing Profiles and Permissions/20. Understanding Permission Set Groups.mp4 6.8 MB
  • mp4~Get Your Files Here !/04. Producing Profiles and Permissions/17. Permissions at a High Level.mp4 6.7 MB
  • mp4~Get Your Files Here !/03. Managing Users for Security Control/11. Using Security Controls.mp4 6.6 MB
  • mp4~Get Your Files Here !/07. Developing Less Vulnerable Code/40. Demo.Lightning App with Sharing.mp4 6.0 MB
  • mp4~Get Your Files Here !/05. Sharing Records with Your Friends/28. Thinking through Visibility.mp4 5.7 MB
  • mp4~Get Your Files Here !/03. Managing Users for Security Control/13. Demo.Using the Setup Audit Trail.mp4 5.0 MB
  • mp4~Get Your Files Here !/06. Avoiding Fake Security Traps on Page Layouts/33. Taking Advantage of Record Types.mp4 4.7 MB
【影视】 [ DevCourseWeb.com ] Udemy - Data Security strategy for organizations
收录时间:2022-04-27 文档个数:130 文档大小:1.3 GB 最近下载:2025-05-15 人气:343 磁力链接
  • mp4~Get Your Files Here !/4. Data Monitoring and Incident Response/3. Example of an Asset Management Tool.mp4 68.8 MB
  • mp4~Get Your Files Here !/5. Data Security Technical Controls/8. Office 365 DLP Example.mp4 65.9 MB
  • mp4~Get Your Files Here !/4. Data Monitoring and Incident Response/6. File Access Monitoring Tool Demonstration.mp4 64.6 MB
  • mp4~Get Your Files Here !/5. Data Security Technical Controls/3. Defence in Depth.mp4 48.0 MB
  • mp4~Get Your Files Here !/4. Data Monitoring and Incident Response/9. Incident Response Panning - Preparation phase.mp4 46.3 MB
  • mp4~Get Your Files Here !/3. Data Governance and Management/11. Risk Response.mp4 46.0 MB
  • mp4~Get Your Files Here !/2. Law and Industry Regulations/6. ISO 27001.mp4 43.6 MB
  • mp4~Get Your Files Here !/3. Data Governance and Management/3. Security policy framework.mp4 39.7 MB
  • mp4~Get Your Files Here !/4. Data Monitoring and Incident Response/10. Incident Response Panning - Identification phase.mp4 38.8 MB
  • mp4~Get Your Files Here !/5. Data Security Technical Controls/6. Data Encryption.mp4 38.3 MB
  • mp4~Get Your Files Here !/4. Data Monitoring and Incident Response/4. Structured vs Unstructured data access management and monitoring.mp4 38.0 MB
  • mp4~Get Your Files Here !/4. Data Monitoring and Incident Response/16. Data Breach Notification.mp4 36.2 MB
  • mp4~Get Your Files Here !/3. Data Governance and Management/10. Risk Assessment.mp4 35.4 MB
  • mp4~Get Your Files Here !/5. Data Security Technical Controls/2. Access Controls.mp4 33.7 MB
  • mp4~Get Your Files Here !/3. Data Governance and Management/13. Third Party Risks.mp4 32.5 MB
  • mp4~Get Your Files Here !/2. Law and Industry Regulations/3. HIPAA (Health Insurance Portability and Accountability Act).mp4 28.7 MB
  • mp4~Get Your Files Here !/5. Data Security Technical Controls/4. Data Security Technical Controls.mp4 28.4 MB
  • mp4~Get Your Files Here !/5. Data Security Technical Controls/7. Data Loss Prevention.mp4 28.2 MB
  • mp4~Get Your Files Here !/1. Introduction/8. Data Classification.mp4 27.9 MB
  • mp4~Get Your Files Here !/5. Data Security Technical Controls/5. Data Access Controls.mp4 27.0 MB
【影视】 [ CourseBoat.com ] Security Controls - CIS Controls
收录时间:2022-04-25 文档个数:34 文档大小:167.1 MB 最近下载:2025-05-16 人气:1277 磁力链接
  • mp4~Get Your Files Here !/03. Planning Your CIS Implementation/11. CIS Benchmarks.mp4 14.7 MB
  • mp4~Get Your Files Here !/06. Case Study-Implementing the CIS Controls at Globomantics/23. Globomantics Profile and Issues.mp4 13.6 MB
  • mp4~Get Your Files Here !/04. Implementing the CIS Controls/15. Integrating CIS Controls with Other Frameworks.mp4 13.5 MB
  • mp4~Get Your Files Here !/02. Understanding the CIS Controls/03. What are the CIS Controls.mp4 13.4 MB
  • mp4~Get Your Files Here !/03. Planning Your CIS Implementation/09. CIS Control Areas.mp4 9.4 MB
  • mp4~Get Your Files Here !/05. Maintaining and Assessing the CIS Controls/20. Assessing the CIS Controls.mp4 9.3 MB
  • mp4~Get Your Files Here !/04. Implementing the CIS Controls/14. Implementing the CIS Controls.mp4 8.9 MB
  • mp4~Get Your Files Here !/06. Case Study-Implementing the CIS Controls at Globomantics/24. Planning the CIS Control Implementation.mp4 7.4 MB
  • mp4~Get Your Files Here !/03. Planning Your CIS Implementation/10. Implementation Groups.mp4 7.2 MB
  • mp4~Get Your Files Here !/03. Planning Your CIS Implementation/12. Planning the CIS Control Implementation.mp4 6.6 MB
  • mp4~Get Your Files Here !/04. Implementing the CIS Controls/16. Using the CIS Benchmarks and Images.mp4 6.3 MB
  • mp4~Get Your Files Here !/04. Implementing the CIS Controls/17. Steps to Implement the CIS Controls.mp4 6.0 MB
  • mp4~Get Your Files Here !/06. Case Study-Implementing the CIS Controls at Globomantics/25. Implementing the CIS Controls in Globomantics.mp4 5.0 MB
  • mp4~Get Your Files Here !/06. Case Study-Implementing the CIS Controls at Globomantics/26. Monitoring the CIS Security Controls.mp4 4.6 MB
  • mp4~Get Your Files Here !/05. Maintaining and Assessing the CIS Controls/21. Monitoring the CIS Controls.mp4 4.6 MB
  • mp4~Get Your Files Here !/05. Maintaining and Assessing the CIS Controls/19. Maintaining the CIS Controls.mp4 4.4 MB
  • mp4~Get Your Files Here !/02. Understanding the CIS Controls/07. Who Should Implement the CIS Controls.mp4 4.4 MB
  • mp4~Get Your Files Here !/01. Course Overview/01. Security Controls Cis Controls Trailer.mp4 4.4 MB
  • mp4~Get Your Files Here !/02. Understanding the CIS Controls/04. Background of the CIS Controls.mp4 3.7 MB
  • mp4~Get Your Files Here !/02. Understanding the CIS Controls/06. CIS Control Concepts.mp4 3.1 MB
【影视】 Vanna.Bardot.Cheats.On.Her.Husband.But.He.Sees.Everything.On.Security.Cam.26.06.2020.VHQ.roleplay.mp4
收录时间:2022-04-25 文档个数:1 文档大小:537.1 MB 最近下载:2024-09-28 人气:28 磁力链接
  • mp4Vanna.Bardot.Cheats.On.Her.Husband.But.He.Sees.Everything.On.Security.Cam.26.06.2020.VHQ.roleplay.mp4 537.1 MB
【影视】 [ CourseHulu.com ] Linkedin - CompTIA Network + (N10-008) Cert Prep - 9 Network Security and Monitoring
收录时间:2022-04-25 文档个数:50 文档大小:3.0 GB 最近下载:2025-05-16 人气:2674 磁力链接
  • mp4~Get Your Files Here !/01 - 1. Protecting Networks/05 - On-path and spoofing attacks.mp4 446.6 MB
  • mp4~Get Your Files Here !/01 - 1. Protecting Networks/12 - Physical security.mp4 248.3 MB
  • mp4~Get Your Files Here !/01 - 1. Protecting Networks/04 - Denial of Service (DoS).mp4 203.2 MB
  • mp4~Get Your Files Here !/02 - 2. Network Monitoring/02 - SNMP.mp4 183.3 MB
  • mp4~Get Your Files Here !/01 - 1. Protecting Networks/13 - Network hardening.mp4 161.6 MB
  • mp4~Get Your Files Here !/02 - 2. Network Monitoring/01 - Network monitoring.mp4 158.9 MB
  • mp4~Get Your Files Here !/01 - 1. Protecting Networks/10 - Social engineering.mp4 151.6 MB
  • mp4~Get Your Files Here !/01 - 1. Protecting Networks/16 - Firewalls.mp4 127.0 MB
  • mp4~Get Your Files Here !/01 - 1. Protecting Networks/06 - Password attacks.mp4 122.9 MB
  • mp4~Get Your Files Here !/01 - 1. Protecting Networks/09 - Malware.mp4 122.6 MB
  • mp4~Get Your Files Here !/01 - 1. Protecting Networks/07 - VLAN hopping.mp4 120.7 MB
  • mp4~Get Your Files Here !/01 - 1. Protecting Networks/01 - Security concepts.mp4 113.7 MB
  • mp4~Get Your Files Here !/01 - 1. Protecting Networks/02 - Defense in depth.mp4 103.6 MB
  • mp4~Get Your Files Here !/02 - 2. Network Monitoring/04 - System monitoring.mp4 99.8 MB
  • mp4~Get Your Files Here !/02 - 2. Network Monitoring/03 - Documenting logs.mp4 91.9 MB
  • mp4~Get Your Files Here !/01 - 1. Protecting Networks/08 - System life cycle.mp4 86.8 MB
  • mp4~Get Your Files Here !/02 - 2. Network Monitoring/05 - Security information and event management (SIEM).mp4 86.5 MB
  • mp4~Get Your Files Here !/01 - 1. Protecting Networks/03 - Rogue DHCP servers.mp4 75.9 MB
  • mp4~Get Your Files Here !/01 - 1. Protecting Networks/14 - Demilitarized Zone (DMZ).mp4 65.7 MB
  • mp4~Get Your Files Here !/01 - 1. Protecting Networks/11 - Common vulnerabilities.mp4 62.3 MB
【影视】 [ DevCourseWeb.com ] Udemy - Introduction to Cloud Security with Microsoft Azure
收录时间:2022-04-24 文档个数:79 文档大小:829.1 MB 最近下载:2025-05-09 人气:1772 磁力链接
  • mp4~Get Your Files Here !/02 - Basics of the Cloud/001 Cloud Computing.mp4 149.2 MB
  • mp4~Get Your Files Here !/08 - Security in Action/001 Demo Azure Security Center (ASC).mp4 54.5 MB
  • mp4~Get Your Files Here !/04 - Virtualization/007 Demo How to Connect to your VMs.mp4 50.3 MB
  • mp4~Get Your Files Here !/09 - Conclusion/001 BONUS Where to go from here.mp4 49.3 MB
  • mp4~Get Your Files Here !/04 - Virtualization/006 Demo Creating a Linux VM and discuss Virtual Machine settings.mp4 46.3 MB
  • mp4~Get Your Files Here !/02 - Basics of the Cloud/005 Augmenting Security with Cloud Services.mp4 34.8 MB
  • mp4~Get Your Files Here !/05 - Redundancy/004 Demo Virtual Machine Backups.mp4 34.2 MB
  • mp4~Get Your Files Here !/02 - Basics of the Cloud/003 Cloud Service Models.mp4 33.8 MB
  • mp4~Get Your Files Here !/02 - Basics of the Cloud/002 On-premise vs Hosted Solutions.mp4 32.7 MB
  • mp4~Get Your Files Here !/06 - Security/005 Security Threats.mp4 30.1 MB
  • mp4~Get Your Files Here !/04 - Virtualization/005 Demo Creating a Virtual Network and Windows VM.mp4 28.2 MB
  • mp4~Get Your Files Here !/01 - Introduction/001 Welcome to the course!.mp4 26.7 MB
  • mp4~Get Your Files Here !/01 - Introduction/003 How to control this course.mp4 21.9 MB
  • mp4~Get Your Files Here !/03 - Basics of Azure/003 Demo Portal interface with customizations.mp4 21.8 MB
  • mp4~Get Your Files Here !/04 - Virtualization/002 How does storage work in Azure.mp4 21.6 MB
  • mp4~Get Your Files Here !/02 - Basics of the Cloud/004 Types of Clouds.mp4 20.6 MB
  • mp4~Get Your Files Here !/08 - Security in Action/003 Authentication Security.mp4 15.3 MB
  • mp4~Get Your Files Here !/07 - Active Directory/001 Active Directory in Azure.mp4 14.6 MB
  • mp4~Get Your Files Here !/06 - Security/004 Data Security Considerations.mp4 13.7 MB
  • mp4~Get Your Files Here !/06 - Security/002 Virtual Private Network (VPN).mp4 13.5 MB
【影视】 Pluralsight - Managing Microsoft Azure Security by Ned Bellavance
收录时间:2022-04-22 文档个数:108 文档大小:285.0 MB 最近下载:2025-05-16 人气:1815 磁力链接
  • mp43. Policies and Data Collection/4. Subscription Settings.mp4 15.2 MB
  • mp48. Advanced Cloud Defense/5. Using File Integrity Monitoring.mp4 13.0 MB
  • mp48. Advanced Cloud Defense/1. Reviewing Just in Time VM Access.mp4 12.7 MB
  • mp48. Advanced Cloud Defense/3. Reviewing Adaptive Application Controls.mp4 11.1 MB
  • mp43. Policies and Data Collection/2. Azure Policies.mp4 10.9 MB
  • mp45. Managing Security Solutions/7. Connecting to a SIEM.mp4 10.9 MB
  • mp47. Automating Security Workflows/2. Creating a New Workflow.mp4 10.7 MB
  • mp45. Managing Security Solutions/6. Adding a Non-Azure Linux Machine.mp4 10.0 MB
  • mp44. Security Assessments and Threat Prevention/2. Compute and Apps.mp4 9.9 MB
  • mp47. Automating Security Workflows/3. Triggering a Logic App from an Alert.mp4 9.9 MB
  • mp48. Advanced Cloud Defense/2. Configuring JIT VM Access.mp4 9.7 MB
  • mp45. Managing Security Solutions/5. Adding a Non-Azure Windows Machine.mp4 8.6 MB
  • mp46. Investigating Threats/3. Working with Security Incidents.mp4 8.4 MB
  • mp43. Policies and Data Collection/1. Policy and Compliance.mp4 7.9 MB
  • mp46. Investigating Threats/4. Alert Validation and Remediation.mp4 7.6 MB
  • mp42. Understanding Azure Security Center/2. Exploring the Portal.mp4 6.8 MB
  • mp44. Security Assessments and Threat Prevention/3. Network.mp4 6.2 MB
  • mp43. Policies and Data Collection/3. Regulatory Compliance.mp4 6.0 MB
  • mp47. Automating Security Workflows/1. Configuring Workflow Automation.mp4 5.7 MB
  • mp46. Investigating Threats/2. Viewing Security Alerts.mp4 5.4 MB
【影视】 Learn SQL +Security(pen) testing from Scratch
收录时间:2022-04-22 文档个数:212 文档大小:7.9 GB 最近下载:2025-05-15 人气:2995 磁力链接
  • mp413. Importance of Foreign Key and Primary key with real time examples/2. Understand Foreign key rules and constraints with examples.mp4 254.5 MB
  • mp49. SQL Joins, Inner Joins, Outer joins, Left&Right joins with Interview questions/6. Practical example on Inner joins, Left join, Right Join.mp4 251.6 MB
  • mp422. Importance of Cookies and their role in Security/4. Methods to Prevent cookie steal -Secure Attribute.mp4 221.2 MB
  • mp47. Deeper Understanding on GroupBy, Aggregate functions with practical examples/1. Importance of Group By in SQL.mp4 215.0 MB
  • mp47. Deeper Understanding on GroupBy, Aggregate functions with practical examples/4. Difference between Having and Where keyword and when to use them.mp4 204.4 MB
  • mp421. XSS - Cross Site Scripting Vulnerability Testing/5. Encoding all the inputs to avoid Attacks.mp4 191.2 MB
  • mp47. Deeper Understanding on GroupBy, Aggregate functions with practical examples/3. Usage of Having keyword with GroupBy and Aggregate functions.mp4 186.3 MB
  • mp419. Introduction to Security Testing - Phase 2/1. Why security Testing gaining Importance day by day!.mp4 184.5 MB
  • mp47. Deeper Understanding on GroupBy, Aggregate functions with practical examples/6. Practise Exercises on GroupBy,Having,Where and Aggregate functions keyword- 2.mp4 158.7 MB
  • mp421. XSS - Cross Site Scripting Vulnerability Testing/7. Types of Attack - Persisistence XSS.mp4 157.5 MB
  • mp49. SQL Joins, Inner Joins, Outer joins, Left&Right joins with Interview questions/4. Practical examples on Joins and subqueries.mp4 155.2 MB
  • mp422. Importance of Cookies and their role in Security/6. Domain and path attribute to restrict cookies.mp4 149.0 MB
  • mp422. Importance of Cookies and their role in Security/5. Preventing cookies steal -Http Attribute flag.mp4 146.7 MB
  • mp411. Miscelleanous SQL keywords(Union,Intersect,Exist, Case,UnionAll) and their usage/4. CASE Statement in SQL with example.mp4 143.5 MB
  • mp411. Miscelleanous SQL keywords(Union,Intersect,Exist, Case,UnionAll) and their usage/2. Query to intersect records from two tables.mp4 134.5 MB
  • mp47. Deeper Understanding on GroupBy, Aggregate functions with practical examples/5. Practise Exercises on GroupBy,Having,Where and Aggregate functions keyword -1.mp4 133.7 MB
  • mp49. SQL Joins, Inner Joins, Outer joins, Left&Right joins with Interview questions/3. Relation on subqueries and Joins.mp4 133.3 MB
  • mp49. SQL Joins, Inner Joins, Outer joins, Left&Right joins with Interview questions/5. Left and Right joins importance in SQL.mp4 129.5 MB
  • mp415. JDBC Connectivity for Integration with Selenium (Basic Automation knowledge req/2. Creating Database Tables and connecting to Jdbc java code.mp4 129.0 MB
  • mp45. SQL Logical operators to retrieve Data/3. Logical operators on Queries AND OR - 1.mp4 128.6 MB
【影视】 [ TutGator.com ] Skillshare - Cyber Security - Protect Your Business Against Ransomware Attack
收录时间:2022-04-22 文档个数:59 文档大小:290.9 MB 最近下载:2025-05-14 人气:691 磁力链接
  • mp4~Get Your Files Here !/07. 05 Prepare v2.mp4 50.9 MB
  • mp4~Get Your Files Here !/08. 07 Respond.mp4 48.6 MB
  • mp4~Get Your Files Here !/03. 03 Timeline v2.mp4 35.9 MB
  • mp4~Get Your Files Here !/05. 06 Passwords.mp4 31.7 MB
  • mp4~Get Your Files Here !/02. 02 History v2.mp4 29.4 MB
  • mp4~Get Your Files Here !/04. 04 Ransomware Demo Cerber.mp4 29.0 MB
  • mp4~Get Your Files Here !/01. 01 Current State of Ransomware.mp4 26.5 MB
  • mp4~Get Your Files Here !/09. 08 Recover.mp4 25.2 MB
  • mp4~Get Your Files Here !/06. 6.mp4 11.3 MB
  • docx~Get Your Files Here !/Project/Cyber Incident Response Plan.docx.docx 746.2 kB
  • pdf~Get Your Files Here !/Project/Security-Checklist.pdf.pdf 630.6 kB
  • pdf~Get Your Files Here !/Project/Recommended Software.pdf.pdf 629.3 kB
  • vtt~Get Your Files Here !/08. 07 Respond-de.vtt 21.2 kB
  • vtt~Get Your Files Here !/08. 07 Respond-fr.vtt 21.0 kB
  • vtt~Get Your Files Here !/07. 05 Prepare v2-de.vtt 21.0 kB
  • vtt~Get Your Files Here !/07. 05 Prepare v2-fr.vtt 20.9 kB
  • vtt~Get Your Files Here !/08. 07 Respond-es-MX.vtt 19.9 kB
  • vtt~Get Your Files Here !/08. 07 Respond-pt.vtt 19.8 kB
  • vtt~Get Your Files Here !/07. 05 Prepare v2-pt.vtt 19.7 kB
  • vtt~Get Your Files Here !/07. 05 Prepare v2-es-MX.vtt 19.7 kB
【影视】 Pluralsight - Creating Security Baselines in Microsoft Azure by Neil Morrissey
收录时间:2022-04-21 文档个数:58 文档大小:307.0 MB 最近下载:2025-05-15 人气:1939 磁力链接
  • mp41. Creating an Application Platform Security Baseline in Microsoft Azure/3. The Security Baseline Discipline.mp4 33.4 MB
  • mp41. Creating an Application Platform Security Baseline in Microsoft Azure/2. The 5 Disciplines of Cloud Governance.mp4 28.2 MB
  • mp41. Creating an Application Platform Security Baseline in Microsoft Azure/5. Security Baseline Tools in Azure.mp4 25.4 MB
  • mp41. Creating an Application Platform Security Baseline in Microsoft Azure/4. Creating Security Baseline Policies.mp4 23.5 MB
  • mp43. Creating a Data Security Baseline in Microsoft Azure/2. Creating a New Key Vault.mp4 21.2 MB
  • mp42. Creating a Network Security Baseline in Microsoft Azure/7. Network Monitoring and Threat Detection.mp4 20.2 MB
  • mp42. Creating a Network Security Baseline in Microsoft Azure/3. Creating User Defined Routes.mp4 18.0 MB
  • mp42. Creating a Network Security Baseline in Microsoft Azure/4. Network Access Controls with NSGs and Azure Firewall.mp4 15.3 MB
  • mp43. Creating a Data Security Baseline in Microsoft Azure/3. Encrypting Data at Rest in Azure.mp4 14.9 MB
  • mp41. Creating an Application Platform Security Baseline in Microsoft Azure/1. The Microsoft Cloud Adoption Framework.mp4 14.5 MB
  • mp43. Creating a Data Security Baseline in Microsoft Azure/4. Configure Customer-managed Keys for Azure Storage.mp4 11.6 MB
  • mp42. Creating a Network Security Baseline in Microsoft Azure/6. Publishing Web Applications with Application Gateway.mp4 9.7 MB
  • mp41. Creating an Application Platform Security Baseline in Microsoft Azure/6. Security Platform Baseline.mp4 8.6 MB
  • mp42. Creating a Network Security Baseline in Microsoft Azure/2. The Hub Spoke Model.mp4 7.8 MB
  • mp42. Creating a Network Security Baseline in Microsoft Azure/8. Azure Policy Templates for Virtual Networks.mp4 6.3 MB
  • mp42. Creating a Network Security Baseline in Microsoft Azure/1. Software Defined Networking Models in Azure.mp4 6.1 MB
  • mp43. Creating a Data Security Baseline in Microsoft Azure/1. Key Management with Azure Key Vault.mp4 5.7 MB
  • mp43. Creating a Data Security Baseline in Microsoft Azure/7. Securing Confidential Data in Email and Documents.mp4 5.3 MB
  • mp43. Creating a Data Security Baseline in Microsoft Azure/0. Introduction.mp4 4.6 MB
  • mp41. Creating an Application Platform Security Baseline in Microsoft Azure/0. Introduction.mp4 3.6 MB
【影视】 [ DevCourseWeb.com ] Udemy - Master Cyber Security A Step-by-Step Guide for 2022
收录时间:2022-04-20 文档个数:126 文档大小:669.2 MB 最近下载:2025-05-16 人气:564 磁力链接
  • mp4~Get Your Files Here !/2. Cyber Security/5. Future of Cyber Security.mp4 30.3 MB
  • mp4~Get Your Files Here !/3. Data Science/2. History of Data Science.mp4 27.5 MB
  • mp4~Get Your Files Here !/1. Introduction/1. Introduction.mp4 26.5 MB
  • mp4~Get Your Files Here !/3. Data Science/4. Careers in Data Science.mp4 26.3 MB
  • mp4~Get Your Files Here !/3. Data Science/1. What is Data Science.mp4 26.2 MB
  • mp4~Get Your Files Here !/2. Cyber Security/1. What is Cyber Security.mp4 25.0 MB
  • mp4~Get Your Files Here !/2. Cyber Security/2. History of Cyber Security.mp4 23.7 MB
  • mp4~Get Your Files Here !/3. Data Science/5. Future of Data Science.mp4 21.5 MB
  • mp4~Get Your Files Here !/2. Cyber Security/4. Careers in Cyber Security.mp4 21.2 MB
  • mp4~Get Your Files Here !/3. Data Science/3. Benefits of Data Science.mp4 20.9 MB
  • mp4~Get Your Files Here !/6. Cyber Security Examples/5. Password Attacks.mp4 16.4 MB
  • mp4~Get Your Files Here !/2. Cyber Security/3. Benefits of Cyber Security.mp4 15.2 MB
  • mp4~Get Your Files Here !/6. Cyber Security Examples/2. Ransomware Attacks.mp4 14.2 MB
  • mp4~Get Your Files Here !/10. Cyber Security Career Paths/7. Chief Information Officers (CIO).mp4 13.8 MB
  • mp4~Get Your Files Here !/10. Cyber Security Career Paths/6. Chief information security officer (CISO).mp4 13.1 MB
  • mp4~Get Your Files Here !/5. Cybersecurity Tools/4. Cofense Triage.mp4 11.6 MB
  • mp4~Get Your Files Here !/10. Cyber Security Career Paths/5. Forensics Analyst.mp4 11.1 MB
  • mp4~Get Your Files Here !/5. Cybersecurity Tools/6. Digital Gaurdian.mp4 11.1 MB
  • mp4~Get Your Files Here !/6. Cyber Security Examples/4. Distributed Denial of Service (DDoS).mp4 10.9 MB
  • mp4~Get Your Files Here !/8. Advantages of Cyber Security/5. Increase Customer Confidence.mp4 10.8 MB
【影视】 Udemy - The Ultimate Dark Web, Anonymity, Privacy & Security Course
收录时间:2022-04-19 文档个数:230 文档大小:7.6 GB 最近下载:2025-05-07 人气:224 磁力链接
  • mp4~Get Your Course Here !/12. Qubes OS/5. Installing Qubes--- [ FreeCourseWeb.com ] ---.mp4 220.8 MB
  • mp4~Get Your Course Here !/12. Qubes OS/1. What is Qubes & Why Use it--- [ FreeCourseWeb.com ] ---.mp4 214.0 MB
  • mp4~Get Your Course Here !/2. The TOR Browser/8. Virtual Private Network (VPN) - What is it & How to Use it with TOR--- [ FreeCourseWeb.com ] ---.mp4 170.5 MB
  • mp4~Get Your Course Here !/8. Encryption/2. Symmetric VS Asymmetric encryption--- [ FreeCourseWeb.com ] ---.mp4 158.7 MB
  • mp4~Get Your Course Here !/1. Introduction/1. Introduction to Privacy, Anonymity & Security--- [ FreeCourseWeb.com ] ---.mp4 156.3 MB
  • mp4~Get Your Course Here !/12. Qubes OS/11. Handling MalwareViruses & Suspicious Files Securely--- [ FreeCourseWeb.com ] ---.mp4 156.0 MB
  • mp4~Get Your Course Here !/12. Qubes OS/4. Preparing Computer For Qubes--- [ FreeCourseWeb.com ] ---.mp4 150.0 MB
  • mp4~Get Your Course Here !/2. The TOR Browser/3. Verifying & Installing TOR Browser on Windows--- [ FreeCourseWeb.com ] ---.mp4 147.2 MB
  • mp4~Get Your Course Here !/12. Qubes OS/2. Installation Options & Verifying Qubes--- [ FreeCourseWeb.com ] ---.mp4 145.6 MB
  • mp4~Get Your Course Here !/8. Encryption/9. Using Key Servers--- [ FreeCourseWeb.com ] ---.mp4 142.9 MB
  • mp4~Get Your Course Here !/12. Qubes OS/8. Working With Multiple Security Domains Simultaneously--- [ FreeCourseWeb.com ] ---.mp4 141.4 MB
  • mp4~Get Your Course Here !/10. Cryptocurrencies - Bitcoin/5. Using P2P Services--- [ FreeCourseWeb.com ] ---.mp4 137.1 MB
  • mp4~Get Your Course Here !/9. Cryptocurrencies/2. What is Cryptocurrency & How It works--- [ FreeCourseWeb.com ] ---.mp4 132.8 MB
  • mp4~Get Your Course Here !/2. The TOR Browser/10. TOR Browser Security Settings & Intro to Information Theory--- [ FreeCourseWeb.com ] ---.mp4 131.6 MB
  • mp4~Get Your Course Here !/2. The TOR Browser/5. Verifying & Installing TOR Browser on Linux--- [ FreeCourseWeb.com ] ---.mp4 129.6 MB
  • mp4~Get Your Course Here !/3. TAILS - The Amnesic Incognito Live System/4. Installing TAILS From All Operating Systems--- [ FreeCourseWeb.com ] ---.mp4 127.8 MB
  • mp4~Get Your Course Here !/2. The TOR Browser/4. Verifying & Installing TOR Browser on Mac OS X--- [ FreeCourseWeb.com ] ---.mp4 123.5 MB
  • mp4~Get Your Course Here !/8. Encryption/4. Importing & Exporting Keys--- [ FreeCourseWeb.com ] ---.mp4 121.7 MB
  • mp4~Get Your Course Here !/5. Communicating Privately & Anonymously - Using Email/3. Using Privacy Focused Email Providers--- [ FreeCourseWeb.com ] ---.mp4 121.6 MB
  • mp4~Get Your Course Here !/12. Qubes OS/10. Installing Software to Specific Domains--- [ FreeCourseWeb.com ] ---.mp4 121.2 MB
【影视】 GetFreeCourses.Co-Udemy-The Ultimate Dark Web, Anonymity, Privacy & Security Course
收录时间:2022-04-18 文档个数:103 文档大小:6.7 GB 最近下载:2025-05-16 人气:831 磁力链接
  • mkv01-Introduction_to_Privacy_Anonymity_and_Security.mkv 324.2 MB
  • mkv83-Handling_MalwareViruses_and_Suspicious_Files_Securely.mkv 295.5 MB
  • mkv15-TOR_Browser_Security_Settings_and_Intro_to_Information_Theory.mkv 285.9 MB
  • mkv77-Installing_Qubes.mkv 229.8 MB
  • mkv35-Using_Privacy_Focused_Email_Providers.mkv 227.4 MB
  • mkv82-Installing_Software_to_Specific_Domains.mkv 223.0 MB
  • mkv85-Installing_Software_on_Whonix.mkv 203.8 MB
  • mkv84-Connecting_to_TOR_From_Qubes_Using_Whonix_Gateway.mkv 186.4 MB
  • mkv19-Installing_TAILS_From_All_Operating_Systems.mkv 182.4 MB
  • mkv74-Installation_Options_and_Verifying_Qubes.mkv 154.3 MB
  • mkv80-Working_With_Multiple_Security_Domains_Simultaneously.mkv 151.2 MB
  • mkv08-Verifying_and_Installing_TOR_Browser_on_Windows.mkv 151.0 MB
  • mkv36-Using_DarkNet_Email_Providers.mkv 149.2 MB
  • mkv62-Using_P2P_Services.mkv 138.7 MB
  • mkv10-Verifying_and_Installing_TOR_Browser_on_Linux.mkv 136.2 MB
  • mkv09-Verifying_and_Installing_TOR_Browser_on_Mac_OS_X.mkv 134.1 MB
  • mkv18-TAILS_Installation_Options.mkv 123.0 MB
  • mkv31-Discovering_Hidden_Services_Using_Darknet_Search_Engines.mkv 116.2 MB
  • mkv32-Discovering_Hidden_Services_Using_Listings_and_Onion_Services.mkv 114.6 MB
  • mkv73-What_is_Qubes_and_Why_Use_it.mkv 114.1 MB
【影视】 [ DevCourseWeb.com ] Udemy - AWS Cloud Security - Learn to Protect and Defend your resources
收录时间:2022-04-18 文档个数:188 文档大小:593.6 MB 最近下载:2025-05-13 人气:1710 磁力链接
  • mp4~Get Your Files Here !/02 - Security by Design Principles/004 03 SbD Enable Traceability.mp4 49.6 MB
  • mp4~Get Your Files Here !/01 - Introduction to Cloud Security/005 04 AWS Security solution Infrastructure Security.mp4 47.9 MB
  • mp4~Get Your Files Here !/02 - Security by Design Principles/005 04 SbD Apply Security at ALL layers.mp4 41.6 MB
  • mp4~Get Your Files Here !/02 - Security by Design Principles/007 06 SbD Protect data - Encryption at rest and motion.mp4 38.3 MB
  • mp4~Get Your Files Here !/02 - Security by Design Principles/003 02 SbD Implement a Strong Identity Foundation.mp4 37.2 MB
  • mp4~Get Your Files Here !/01 - Introduction to Cloud Security/009 08 AWS Security solution NIST CyberSecurity Framework.mp4 34.1 MB
  • mp4~Get Your Files Here !/02 - Security by Design Principles/006 05 SbD Automate Security Best Practices.mp4 33.9 MB
  • mp4~Get Your Files Here !/01 - Introduction to Cloud Security/004 03 AWS Security solution Detective Control.mp4 32.7 MB
  • mp4~Get Your Files Here !/01 - Introduction to Cloud Security/006 05 AWS Security solution Data Protection.mp4 32.4 MB
  • mp4~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/002 01 Security Automation Scenario01 Cloudtrail Disabled.mp4 30.5 MB
  • mp4~Get Your Files Here !/01 - Introduction to Cloud Security/007 06 AWS Security solution Incident Response.mp4 27.3 MB
  • mp4~Get Your Files Here !/05 - AWS Security Next Steps & Call to Action/001 01 AWS Security Next Steps & Call to Action.mp4 24.0 MB
  • mp4~Get Your Files Here !/04 - AWS Security Anit-Patterns/001 01 Security Anit-Patterns.mp4 23.5 MB
  • mp4~Get Your Files Here !/03 - Security Automation Moving from Reactive to Proactive/003 02 Security Automation Scenario02 S3 Weak Bucket Policy.mp4 23.4 MB
  • mp4~Get Your Files Here !/02 - Security by Design Principles/008 07 SbD Prepare for Security Events.mp4 21.7 MB
  • mp4~Get Your Files Here !/01 - Introduction to Cloud Security/003 02 AWS Security solution Identity.mp4 16.1 MB
  • mp4~Get Your Files Here !/02 - Security by Design Principles/009 08 Security Incident Response At a glance.mp4 15.1 MB
  • mp4~Get Your Files Here !/02 - Security by Design Principles/002 01 SbD Implement a Segregated Account Environment.mp4 13.2 MB
  • mp4~Get Your Files Here !/01 - Introduction to Cloud Security/001 00 Why Cloud Security.mp4 12.5 MB
  • mp4~Get Your Files Here !/01 - Introduction to Cloud Security/008 07 AWS Security solution Well Architected Framework Security - Pillar.mp4 9.8 MB
【影视】 [FreeCourseSite.com] Udemy - The Ultimate Dark Web, Anonymity, Privacy & Security Course
收录时间:2022-04-18 文档个数:104 文档大小:6.7 GB 最近下载:2025-02-17 人气:245 磁力链接
  • mkv01-Introduction_to_Privacy_Anonymity_and_Security.mkv 324.2 MB
  • mkv83-Handling_MalwareViruses_and_Suspicious_Files_Securely.mkv 295.5 MB
  • mkv15-TOR_Browser_Security_Settings_and_Intro_to_Information_Theory.mkv 285.9 MB
  • mkv77-Installing_Qubes.mkv 229.8 MB
  • mkv35-Using_Privacy_Focused_Email_Providers.mkv 227.4 MB
  • mkv82-Installing_Software_to_Specific_Domains.mkv 223.0 MB
  • mkv85-Installing_Software_on_Whonix.mkv 203.8 MB
  • mkv84-Connecting_to_TOR_From_Qubes_Using_Whonix_Gateway.mkv 186.4 MB
  • mkv19-Installing_TAILS_From_All_Operating_Systems.mkv 182.4 MB
  • mkv74-Installation_Options_and_Verifying_Qubes.mkv 154.3 MB
  • mkv80-Working_With_Multiple_Security_Domains_Simultaneously.mkv 151.2 MB
  • mkv08-Verifying_and_Installing_TOR_Browser_on_Windows.mkv 151.0 MB
  • mkv36-Using_DarkNet_Email_Providers.mkv 149.2 MB
  • mkv62-Using_P2P_Services.mkv 138.7 MB
  • mkv10-Verifying_and_Installing_TOR_Browser_on_Linux.mkv 136.2 MB
  • mkv09-Verifying_and_Installing_TOR_Browser_on_Mac_OS_X.mkv 134.1 MB
  • mkv18-TAILS_Installation_Options.mkv 123.0 MB
  • mkv31-Discovering_Hidden_Services_Using_Darknet_Search_Engines.mkv 116.2 MB
  • mkv32-Discovering_Hidden_Services_Using_Listings_and_Onion_Services.mkv 114.6 MB
  • mkv73-What_is_Qubes_and_Why_Use_it.mkv 114.1 MB
【影视】 Ochroniarz - Security 2017 [480p.WEB-DL.Xvid-NoNaNo][Lektor PL]
收录时间:2022-04-18 文档个数:5 文档大小:914.0 MB 最近下载:2025-04-28 人气:303 磁力链接
  • aviOchroniarz - Security 2017 [480p.WEB-DL.Xvid-NoNaNo][Lektor PL].avi 914.0 MB
  • URLwww.nitro.to Zapraszam Na Darmowy Katalog Torrent - Nitro TorrenT.URL 254 Bytes
  • txtDownloaded from AuraTorrent.pl.txt 0 Bytes
  • txtDownloaded from Filetracker.pl.txt 0 Bytes
  • txtDownloaded from Nitro.to.txt 0 Bytes
共178页 上一页 46 47 48 49 50 51 52 53 54 下一页