磁力管家

磁力管家
为您索检到3555条磁力链接,耗时25毫秒。 rss

分享给好友

【影视】 [ CourseLala.com ] Linkedin - Learning Cloud Computing - Cloud Security (2021)
收录时间:2022-02-17 文档个数:54 文档大小:148.6 MB 最近下载:2024-07-22 人气:116 磁力链接
  • mp4~Get Your Files Here !/[2] 1. Cloud Security Basics/[4] Application-level cloud security.mp4 16.4 MB
  • mp4~Get Your Files Here !/[2] 1. Cloud Security Basics/[5] Data-level cloud security.mp4 10.0 MB
  • mp4~Get Your Files Here !/[3] 2. Cloud Security Services/[3] Third-party services.mp4 9.4 MB
  • mp4~Get Your Files Here !/[3] 2. Cloud Security Services/[4] Cloud encryption services.mp4 8.1 MB
  • mp4~Get Your Files Here !/[4] 3. Cloud Compliance Services/[1] Cloud security in healthcare.mp4 7.2 MB
  • mp4~Get Your Files Here !/[5] 4. Planning Cloud Security/[2] Selecting cloud security services.mp4 6.7 MB
  • mp4~Get Your Files Here !/[3] 2. Cloud Security Services/[8] Security management services.mp4 6.6 MB
  • mp4~Get Your Files Here !/[2] 1. Cloud Security Basics/[1] Business case for cloud security.mp4 6.3 MB
  • mp4~Get Your Files Here !/[2] 1. Cloud Security Basics/[7] Compliance and security.mp4 6.3 MB
  • mp4~Get Your Files Here !/[2] 1. Cloud Security Basics/[2] Breach scenarios and attack vectors.mp4 6.3 MB
  • mp4~Get Your Files Here !/[3] 2. Cloud Security Services/[5] Encryption at rest.mp4 6.2 MB
  • mp4~Get Your Files Here !/[2] 1. Cloud Security Basics/[6] Rise of identity and access management.mp4 5.8 MB
  • mp4~Get Your Files Here !/[3] 2. Cloud Security Services/[6] Encryption in flight.mp4 5.8 MB
  • mp4~Get Your Files Here !/[4] 3. Cloud Compliance Services/[4] Cloud security in manufacturing.mp4 4.8 MB
  • mp4~Get Your Files Here !/[3] 2. Cloud Security Services/[1] AWS cloud security services.mp4 4.8 MB
  • mp4~Get Your Files Here !/[3] 2. Cloud Security Services/[7] Security as code.mp4 4.6 MB
  • mp4~Get Your Files Here !/[5] 4. Planning Cloud Security/[1] Understanding your security requirements.mp4 4.6 MB
  • mp4~Get Your Files Here !/[4] 3. Cloud Compliance Services/[3] Cloud security in retail.mp4 4.5 MB
  • mp4~Get Your Files Here !/[4] 3. Cloud Compliance Services/[2] Cloud security in finance.mp4 3.9 MB
  • mp4~Get Your Files Here !/[5] 4. Planning Cloud Security/[4] Reference security architecture.mp4 3.8 MB
【影视】 [ TutPig.com ] EatTheBlocks - Live Training #3 - Smart Contract Security #1
收录时间:2022-02-17 文档个数:4 文档大小:356.9 MB 最近下载:2025-05-16 人气:717 磁力链接
  • mp4~Get Your Files Here !/lesson1.mp4 356.9 MB
  • txt~Get Your Files Here !/Bonus Resources.txt 386 Bytes
  • urlGet Bonus Downloads Here.url 176 Bytes
  • txt~Get Your Files Here !/Live Training #3 - Smart Contract Security #1.txt 9 Bytes
【影视】 [ CourseBoat.com ] Linkedin - Microsoft 365 Messaging - Planning, Implementation, and Security
收录时间:2022-02-17 文档个数:71 文档大小:1.1 GB 最近下载:2025-05-06 人气:474 磁力链接
  • mp4~Get Your Files Here !/5. Plan and Configure Connectors/023. Plan connectors.mp4 51.2 MB
  • mp4~Get Your Files Here !/7. Troubleshoot Mail Flow/031. Analyze message headers.mp4 51.1 MB
  • mp4~Get Your Files Here !/5. Plan and Configure Connectors/024. Create and configure connectors, including between organizations.mp4 50.6 MB
  • mp4~Get Your Files Here !/7. Troubleshoot Mail Flow/029. Trace a message.mp4 49.8 MB
  • mp4~Get Your Files Here !/2. Plan and Manage Organizational Settings/005. Manage address book policies.mp4 46.1 MB
  • mp4~Get Your Files Here !/3. Plan and Manage Client Access/010. Configure virtual directories and URLs in a hybrid environment.mp4 44.9 MB
  • mp4~Get Your Files Here !/4. Manage Recipient Resources/015. Manage resource mailboxes.mp4 41.8 MB
  • mp4~Get Your Files Here !/6. Manage Mail Flow/027. Manage accepted and remote domains.mp4 39.2 MB
  • mp4~Get Your Files Here !/2. Plan and Manage Organizational Settings/006. Manage email address policies.mp4 38.2 MB
  • mp4~Get Your Files Here !/4. Manage Recipient Resources/017. Manage user mailboxes.mp4 37.3 MB
  • mp4~Get Your Files Here !/2. Plan and Manage Organizational Settings/003. Manage a global address list.mp4 36.6 MB
  • mp4~Get Your Files Here !/4. Manage Recipient Resources/016. Manage groups.mp4 36.5 MB
  • mp4~Get Your Files Here !/2. Plan and Manage Organizational Settings/008. Manage add-ins from Microsoft 365 admin center.mp4 35.0 MB
  • mp4~Get Your Files Here !/6. Manage Mail Flow/026. Manage transport rules.mp4 34.9 MB
  • mp4~Get Your Files Here !/2. Plan and Manage Organizational Settings/007. Plan and configure organizational relationships and individual shari.mp4 33.9 MB
  • mp4~Get Your Files Here !/4. Manage Recipient Resources/014. Manage archive mailboxes.mp4 33.7 MB
  • mp4~Get Your Files Here !/3. Plan and Manage Client Access/013. Troubleshoot client access connectivity problems.mp4 32.9 MB
  • mp4~Get Your Files Here !/5. Plan and Configure Connectors/025. Configure enhanced filtering for connectors.mp4 30.5 MB
  • mp4~Get Your Files Here !/7. Troubleshoot Mail Flow/030. Analyze a message trace.mp4 30.1 MB
  • mp4~Get Your Files Here !/4. Manage Recipient Resources/021. Create and manage contacts, including Mail contacts and Mail users.mp4 29.1 MB
【影视】 Hotel security Jessica Pressley XXX.mp4
收录时间:2022-02-17 文档个数:1 文档大小:114.6 MB 最近下载:2025-05-14 人气:1289 磁力链接
  • mp4Hotel security Jessica Pressley XXX.mp4 114.6 MB
【影视】 [ DevCourseWeb.com ] Udemy - CompTIA CASP + Enterprise Security Architecture - Domain 2
收录时间:2022-02-17 文档个数:25 文档大小:3.2 GB 最近下载:2025-05-15 人气:6821 磁力链接
  • mp4~Get Your Files Here !/3. Enterprise Security Architecture/8. Given software vulnerability scenarios, select appropriate security controls.mp4 517.3 MB
  • mp4~Get Your Files Here !/3. Enterprise Security Architecture/6. Analyze a scenario to integrate security controls for mobile.mp4 460.0 MB
  • mp4~Get Your Files Here !/3. Enterprise Security Architecture/2. Analyze a scenario and integrate network and security components Part 2.mp4 457.9 MB
  • mp4~Get Your Files Here !/3. Enterprise Security Architecture/1. Analyze a scenario and integrate network and security components.mp4 408.1 MB
  • mp4~Get Your Files Here !/3. Enterprise Security Architecture/4. Analyze a scenario to integrate security controls for host devices.mp4 377.8 MB
  • mp4~Get Your Files Here !/1. Company Introduction/1. Introduction to Certcop.mp4 330.6 MB
  • mp4~Get Your Files Here !/3. Enterprise Security Architecture/5. Analyze a scenario to integrate security controls for host devices Part 2.mp4 191.0 MB
  • mp4~Get Your Files Here !/3. Enterprise Security Architecture/3. Analyze a scenario and integrate network and security components Part 3.mp4 144.2 MB
  • mp4~Get Your Files Here !/2. Introduction to CASP/1. Introduction to CASP.mp4 114.6 MB
  • mp4~Get Your Files Here !/3. Enterprise Security Architecture/7. Analyze a scenario to integrate security controls for mobile Part 2.mp4 96.4 MB
  • mp4~Get Your Files Here !/4. Free Flash Cards and Exam Certips/1. Exam Certips with Free Downloadable Flash Cards.mp4 54.4 MB
  • srt~Get Your Files Here !/3. Enterprise Security Architecture/8. Given software vulnerability scenarios, select appropriate security controls.srt 69.8 kB
  • srt~Get Your Files Here !/3. Enterprise Security Architecture/2. Analyze a scenario and integrate network and security components Part 2.srt 67.7 kB
  • srt~Get Your Files Here !/3. Enterprise Security Architecture/6. Analyze a scenario to integrate security controls for mobile.srt 65.7 kB
  • srt~Get Your Files Here !/3. Enterprise Security Architecture/4. Analyze a scenario to integrate security controls for host devices.srt 57.8 kB
  • srt~Get Your Files Here !/3. Enterprise Security Architecture/1. Analyze a scenario and integrate network and security components.srt 56.4 kB
  • srt~Get Your Files Here !/3. Enterprise Security Architecture/5. Analyze a scenario to integrate security controls for host devices Part 2.srt 33.6 kB
  • srt~Get Your Files Here !/1. Company Introduction/1. Introduction to Certcop.srt 32.7 kB
  • srt~Get Your Files Here !/3. Enterprise Security Architecture/3. Analyze a scenario and integrate network and security components Part 3.srt 25.1 kB
  • srt~Get Your Files Here !/2. Introduction to CASP/1. Introduction to CASP.srt 20.1 kB
【影视】 [ DevCourseWeb.com ] Udemy - SC-900 - Microsoft Security Fundamentals Exam Prep - NOV 2021
收录时间:2022-02-17 文档个数:200 文档大小:1.4 GB 最近下载:2025-05-16 人气:4465 磁力链接
  • mp4~Get Your Files Here !/06 - Describe the basic identity services and identity types of Azure AD/003 Users, Groups and Roles.mp4 76.7 MB
  • mp4~Get Your Files Here !/01 - Welcome to SC-900/003 SC-900 Exam Requirements.mp4 69.4 MB
  • mp4~Get Your Files Here !/04 - Describe Microsoft Security and compliance principles/002 The service trust portal.mp4 57.4 MB
  • mp4~Get Your Files Here !/02 - Describe security methodologies/001 Zero-Trust methodology.mp4 48.2 MB
  • mp4~Get Your Files Here !/11 - Describe security management capabilities of Azure/002 Azure Secure score.mp4 46.9 MB
  • mp4~Get Your Files Here !/11 - Describe security management capabilities of Azure/001 Azure Security center.mp4 43.6 MB
  • mp4~Get Your Files Here !/06 - Describe the basic identity services and identity types of Azure AD/002 First Live AzureAD Demo.mp4 36.5 MB
  • mp4~Get Your Files Here !/03 - Describe security concepts/001 Common threats.mp4 32.3 MB
  • mp4~Get Your Files Here !/21 - Describe resource governance capabilities in Azure/002 Cloud adoption framework.mp4 31.7 MB
  • mp4~Get Your Files Here !/01 - Welcome to SC-900/002 Exam Topics at a High Level.mp4 31.4 MB
  • mp4~Get Your Files Here !/06 - Describe the basic identity services and identity types of Azure AD/005 External identity types (Guest Users).mp4 28.3 MB
  • mp4~Get Your Files Here !/01 - Welcome to SC-900/004 __JULY 2021 SC-900 Updates__.mp4 28.1 MB
  • mp4~Get Your Files Here !/12 - Describe security capabilities of Azure Sentinel/001 Azure Sentinel.mp4 27.7 MB
  • mp4~Get Your Files Here !/01 - Welcome to SC-900/001 Course Welcome.mp4 23.2 MB
  • mp4~Get Your Files Here !/08 - Describe access management capabilities of Azure AD/002 Azure AD roles and Role-Based Authentication Control (RBAC).mp4 21.2 MB
  • mp4~Get Your Files Here !/02 - Describe security methodologies/002 The shared responsibility model.mp4 19.4 MB
  • mp4~Get Your Files Here !/10 - Describe basic security capabilities in Azure/001 Azure Network Security groups.mp4 18.6 MB
  • mp4~Get Your Files Here !/10 - Describe basic security capabilities in Azure/006 Ways Azure encrypts data.mp4 17.5 MB
  • mp4~Get Your Files Here !/07 - Describe the authentication capabilities of Azure AD/005 Windows Hello for Business and Passwordless.mp4 16.9 MB
  • mp4~Get Your Files Here !/06 - Describe the basic identity services and identity types of Azure AD/004 Hybrid Identity.mp4 16.3 MB
【影视】 Building Microservices with .NET - Security and Identity
收录时间:2022-02-14 文档个数:113 文档大小:1.8 GB 最近下载:2025-05-16 人气:1834 磁力链接
  • mp4[TutsNode.com] - Building Microservices with .NET - Security and Identity/02 Identity in Microservices/004 Integrating ASP.NET Core Identity with MongoDB.mp4 178.8 MB
  • mp4[TutsNode.com] - Building Microservices with .NET - Security and Identity/05 Authorization in Microservices/004 Seeding users and roles.mp4 169.8 MB
  • mp4[TutsNode.com] - Building Microservices with .NET - Security and Identity/04 Implementing Microservices Security/003 Requesting tokens via Postman.mp4 161.8 MB
  • mp4[TutsNode.com] - Building Microservices with .NET - Security and Identity/04 Implementing Microservices Security/005 Securing the Catalog microservice.mp4 128.7 MB
  • mp4[TutsNode.com] - Building Microservices with .NET - Security and Identity/05 Authorization in Microservices/006 Implementing role-based authorization.mp4 126.1 MB
  • mp4[TutsNode.com] - Building Microservices with .NET - Security and Identity/02 Identity in Microservices/005 Adding the Users REST API.mp4 115.7 MB
  • mp4[TutsNode.com] - Building Microservices with .NET - Security and Identity/04 Implementing Microservices Security/002 Setting up IdentityServer.mp4 104.4 MB
  • mp4[TutsNode.com] - Building Microservices with .NET - Security and Identity/05 Authorization in Microservices/007 Implementing claims-based authorization.mp4 94.5 MB
  • mp4[TutsNode.com] - Building Microservices with .NET - Security and Identity/04 Implementing Microservices Security/006 Generalizing how to add authentication to microservices.mp4 92.7 MB
  • mp4[TutsNode.com] - Building Microservices with .NET - Security and Identity/04 Implementing Microservices Security/007 Securing the Inventory microservice.mp4 90.3 MB
  • mp4[TutsNode.com] - Building Microservices with .NET - Security and Identity/02 Identity in Microservices/003 Creating the Identity microservice.mp4 70.7 MB
  • mp4[TutsNode.com] - Building Microservices with .NET - Security and Identity/01 Introduction/002 A look at the final solution.mp4 70.6 MB
  • mp4[TutsNode.com] - Building Microservices with .NET - Security and Identity/03 Microservices Security Patterns and Techniques/003 Introduction to OAuth 2.0.mp4 56.6 MB
  • mp4[TutsNode.com] - Building Microservices with .NET - Security and Identity/05 Authorization in Microservices/005 Adding users to the Player role.mp4 50.0 MB
  • mp4[TutsNode.com] - Building Microservices with .NET - Security and Identity/03 Microservices Security Patterns and Techniques/002 Microservices authentication.mp4 37.8 MB
  • mp4[TutsNode.com] - Building Microservices with .NET - Security and Identity/04 Implementing Microservices Security/008 Securing the Identity microservice.mp4 37.5 MB
  • mp4[TutsNode.com] - Building Microservices with .NET - Security and Identity/04 Implementing Microservices Security/004 Understanding JSON Web Tokens.mp4 37.5 MB
  • mp4[TutsNode.com] - Building Microservices with .NET - Security and Identity/03 Microservices Security Patterns and Techniques/004 Introduction to OpenID Connect.mp4 31.4 MB
  • mp4[TutsNode.com] - Building Microservices with .NET - Security and Identity/02 Identity in Microservices/002 Introduction to ASP.NET Core Identity.mp4 29.1 MB
  • mp4[TutsNode.com] - Building Microservices with .NET - Security and Identity/05 Authorization in Microservices/003 Understanding Authorization in ASP.NET Core.mp4 27.0 MB
【影视】 GetFreeCourses.Co-Udemy-The Complete Cyber Security Course End Point Protection!
收录时间:2022-02-14 文档个数:1030 文档大小:3.0 GB 最近下载:2025-05-16 人气:2544 磁力链接
  • mp48. Malware and Hacker Hunting on the End-Point/11. Windows - Malware Seek & Destroy - Process Monitor.mp4 79.9 MB
  • mp47. Threat Detection and Monitoring/4. CanaryTokens.mp4 73.7 MB
  • mp411. Email Security, Privacy and Anonymity/6. Windows - PGP & GPG.mp4 61.1 MB
  • mp48. Malware and Hacker Hunting on the End-Point/6. Windows - Malware Seek & Destroy - Process Explorer - Part 1.mp4 60.6 MB
  • mp413. Wrap Up/3. Qubes OS.mp4 59.0 MB
  • mp48. Malware and Hacker Hunting on the End-Point/10. Windows - Malware Seek & Destroy - Autoruns.mp4 50.6 MB
  • mp48. Malware and Hacker Hunting on the End-Point/7. Windows - Malware Seek & Destroy - Process Explorer - Part 2.mp4 49.0 MB
  • mp49. Operating System and Application Hardening/7. Windows - Security Compliance Manager (SCM).mp4 47.0 MB
  • mp41. Introduction/3. Security Quick Win!.mp4 46.8 MB
  • mp48. Malware and Hacker Hunting on the End-Point/15. Linux - Seek & Destroy Malware and Hackers - Csysdig.mp4 45.8 MB
  • mp48. Malware and Hacker Hunting on the End-Point/26. Mac, Linux & Windows - OSquery.mp4 44.4 MB
  • mp49. Operating System and Application Hardening/3. Hardening Standards.mp4 43.5 MB
  • mp48. Malware and Hacker Hunting on the End-Point/4. Automated Malware Removal Tools.mp4 41.9 MB
  • mp47. Threat Detection and Monitoring/5. OpenCanary.mp4 40.7 MB
  • mp43. File and Disk Encryption/4. Disk Encryption Attacks - Physical.mp4 40.2 MB
  • mp411. Email Security, Privacy and Anonymity/2. Clients, Protocols and Authentication.mp4 40.0 MB
  • mp48. Malware and Hacker Hunting on the End-Point/3. Windows - Farbar Recovery Scanner.mp4 39.9 MB
  • mp411. Email Security, Privacy and Anonymity/16. Choosing an Email Provider.mp4 39.2 MB
  • mp46. End-Point-Protection Technology/9. Windows - Exploitation Prevention - EMET.mp4 39.2 MB
  • mp44. Anti-Virus and End-Point-Protection/3. Is Anti-Virus dead - Protection Methods.mp4 38.4 MB
【影视】 WankItNow.21.08.07.Keeley.Security.Breach.XXX.1080p.MP4-WRB[rarbg]
收录时间:2022-02-13 文档个数:4 文档大小:542.0 MB 最近下载:2025-05-16 人气:786 磁力链接
  • mp4wankitnow.21.08.07.keeley.security.breach.mp4 542.0 MB
  • nfowankitnow.21.08.07.keeley.security.breach.nfo 524 Bytes
  • exeRARBG_DO_NOT_MIRROR.exe 99 Bytes
  • txtRARBG.txt 30 Bytes
【影视】 Spring Security Core Beginner to Guru
收录时间:2022-02-13 文档个数:457 文档大小:5.9 GB 最近下载:2025-05-16 人气:3969 磁力链接
  • mp4[TutsNode.com] - Spring Security Core Beginner to Guru/18 - Appendix A_ Using GitHub/002 GitHub Workflow.mp4 136.4 MB
  • mp4[TutsNode.com] - Spring Security Core Beginner to Guru/01 - Introduction/006 Github Work Flow.mp4 131.6 MB
  • mp4[TutsNode.com] - Spring Security Core Beginner to Guru/11 - Multitenancy Security/012 Spring Security with Spring Data JPA.mp4 112.5 MB
  • mp4[TutsNode.com] - Spring Security Core Beginner to Guru/11 - Multitenancy Security/007 Refactor Bootstrap Data.mp4 108.3 MB
  • mp4[TutsNode.com] - Spring Security Core Beginner to Guru/14 - Remember Me/004 Persistent Token Rememeber Me.mp4 103.9 MB
  • mp4[TutsNode.com] - Spring Security Core Beginner to Guru/04 - Spring Security Java Configuration/002 Permit All with URL Pattern Matching.mp4 100.0 MB
  • mp4[TutsNode.com] - Spring Security Core Beginner to Guru/07 - Custom Authentication Filter/008 Custom Failure Handler.mp4 98.0 MB
  • mp4[TutsNode.com] - Spring Security Core Beginner to Guru/02 - Introduction to Spring Security/002 Application Security 101.mp4 93.1 MB
  • mp4[TutsNode.com] - Spring Security Core Beginner to Guru/09 - User Roles/006 Refactor JUnit 5 Tests.mp4 92.4 MB
  • mp4[TutsNode.com] - Spring Security Core Beginner to Guru/01 - Introduction/007 Is Your IDE Free Like a Puppy_.mp4 87.5 MB
  • mp4[TutsNode.com] - Spring Security Core Beginner to Guru/08 - Database Authentication/008 Spring Security Configuration.mp4 85.1 MB
  • mp4[TutsNode.com] - Spring Security Core Beginner to Guru/15 - User Lockout Using Spring Security Events/005 Logging of Authentication Success Events.mp4 83.7 MB
  • mp4[TutsNode.com] - Spring Security Core Beginner to Guru/11 - Multitenancy Security/010 Secure Read Order.mp4 79.4 MB
  • mp4[TutsNode.com] - Spring Security Core Beginner to Guru/12 - CSRF Protection in Spring Security/004 Update Customer Forms with CSRF.mp4 76.2 MB
  • mp4[TutsNode.com] - Spring Security Core Beginner to Guru/15 - User Lockout Using Spring Security Events/008 Account Locked Message.mp4 75.7 MB
  • mp4[TutsNode.com] - Spring Security Core Beginner to Guru/13 - Login Form/004 Add Logout Action.mp4 75.3 MB
  • mp4[TutsNode.com] - Spring Security Core Beginner to Guru/16 - Two Factor Authentication/013 Java Configuration and 2FA Demo.mp4 75.3 MB
  • mp4[TutsNode.com] - Spring Security Core Beginner to Guru/15 - User Lockout Using Spring Security Events/009 Automatically Unlocking Accounts After Period of Time.mp4 71.8 MB
  • mp4[TutsNode.com] - Spring Security Core Beginner to Guru/14 - Remember Me/003 Simple Hash-Based Token Remember Me.mp4 68.7 MB
  • mp4[TutsNode.com] - Spring Security Core Beginner to Guru/07 - Custom Authentication Filter/004 Custom Authentication Filter.mp4 68.6 MB
【影视】 WankItNow.21.08.07.Keeley.Security.Breach.XXX.SD.MP4-KLEENEX
收录时间:2022-02-13 文档个数:3 文档大小:100.2 MB 最近下载:2024-10-05 人气:10 磁力链接
  • mp4WankItNow.21.08.07.Keeley.Security.Breach.XXX.SD.MP4-KLEENEX.mp4 100.2 MB
  • exeRARBG_DO_NOT_MIRROR.exe 99 Bytes
  • txtRARBG.txt 30 Bytes
【影视】 [ CourseLala.com ] Linkedin - Microsoft Azure Security Technologies (AZ-500) Cert Prep - 4 Secure Data and Applications
收录时间:2022-02-13 文档个数:41 文档大小:196.9 MB 最近下载:2025-05-15 人气:732 磁力链接
  • mp4~Get Your Files Here !/[2] 1. Configure Security for Storage/[2] Configure Storage account access keys.mp4 19.9 MB
  • mp4~Get Your Files Here !/[4] 3. Configure and Manage Azure Key Vault/[2] Configure access to Azure Key Vault.mp4 18.1 MB
  • mp4~Get Your Files Here !/[2] 1. Configure Security for Storage/[3] Configure Azure AD authentication for Azure Storage.mp4 16.3 MB
  • mp4~Get Your Files Here !/[2] 1. Configure Security for Storage/[4] Azure AD Domain Services authentication for Azure Files.mp4 16.2 MB
  • mp4~Get Your Files Here !/[2] 1. Configure Security for Storage/[1] Configure access control for Storage accounts.mp4 14.4 MB
  • mp4~Get Your Files Here !/[4] 3. Configure and Manage Azure Key Vault/[3] Manage certificates, secrets, and keys.mp4 14.2 MB
  • mp4~Get Your Files Here !/[2] 1. Configure Security for Storage/[5] Configure delegated access.mp4 12.8 MB
  • mp4~Get Your Files Here !/[3] 2. Configure Security for Databases/[1] Enable database authentication using Azure AD.mp4 11.9 MB
  • mp4~Get Your Files Here !/[3] 2. Configure Security for Databases/[4] Implement database encryption for Azure SQL Database.mp4 10.8 MB
  • mp4~Get Your Files Here !/[3] 2. Configure Security for Databases/[3] Configure dynamic masking on SQL workloads.mp4 9.7 MB
  • mp4~Get Your Files Here !/[3] 2. Configure Security for Databases/[5] Implement network isolation for data solutions.mp4 9.3 MB
  • mp4~Get Your Files Here !/[3] 2. Configure Security for Databases/[2] Enable database auditing.mp4 9.2 MB
  • mp4~Get Your Files Here !/[4] 3. Configure and Manage Azure Key Vault/[5] Backup and recovery of certificates, secrets, and keys.mp4 9.0 MB
  • mp4~Get Your Files Here !/[1] Introduction/[1] Securing data and apps in Azure.mp4 6.5 MB
  • mp4~Get Your Files Here !/[4] 3. Configure and Manage Azure Key Vault/[1] Create and configure Key Vault.mp4 6.5 MB
  • mp4~Get Your Files Here !/[4] 3. Configure and Manage Azure Key Vault/[4] Configure key rotation.mp4 5.6 MB
  • mp4~Get Your Files Here !/[5] Conclusion/[1] Next steps.mp4 3.0 MB
  • mp4~Get Your Files Here !/[1] Introduction/[3] Exam overview.mp4 1.8 MB
  • mp4~Get Your Files Here !/[1] Introduction/[2] What you should know.mp4 1.5 MB
  • pdf~Get Your Files Here !/Ex_Files_MS_Azure_Security_Tech_Cert_Prep_4/Exercise Files/Exam Study Guide AZ-500 Course 4.pdf 57.4 kB
【影视】 [FreeCoursesOnline.Me] Pluralsight - Elastic Stack Security Fundamentals
收录时间:2022-02-12 文档个数:299 文档大小:1.6 GB 最近下载:2025-05-15 人气:3087 磁力链接
  • mp403 - Perform Complex Search Functions in Kibana with Apache Lucene/2. Discovering the Functions of Lucene Query Syntax/4. Demo- Using Kibana with Apache Lucene to Perform Basic Search Functions.mp4 43.9 MB
  • mp403 - Perform Complex Search Functions in Kibana with Apache Lucene/3. Refine Search Results in Kibana with Lucene Query Syntax/3. Demo- Using Proximity, Range, Wildcard, and Existing Field Queries.mp4 36.5 MB
  • mp403 - Perform Complex Search Functions in Kibana with Apache Lucene/4. Using Regex, Boosting, and Fuzzy Searches in Kibana with Lucene/3. Demo- Using Fuzzy Searches,.mp4 34.8 MB
  • mp404 - Perform Index Management Tasks in Kibana/2. Achieving High Performance with Elasticsearch Indices/5. Understanding the Health Check Status.mp4 30.6 MB
  • mp402 - Perform Basic Search Functions in Kibana with Kibana Query Language (KQL)/5. Using KQL Advanced Features in Querying Log Data/1. IP Address Searching in KQL.mp4 28.0 MB
  • mp401 - Elastic Stack - Getting Started/5. Using Analyzers in Elasticsearch/4. Creating a Custom Analyzer and Field Mapping.mp4 27.6 MB
  • mp405 - Perform Kibana Management Tasks/3. Visualizing Data in Kibana/3. Demo- Updating the Visualization Format.mp4 26.2 MB
  • mp407 - Installing the Elastic Stack/5. Collecting Logs from Windows Servers with Winlogbeat/4. Creating Winlogbeat Visualizations and Dashboards.mp4 25.4 MB
  • mp401 - Elastic Stack - Getting Started/4. Identifying Datatypes and Document Mappings in Elasticsearch/1. Introducing Data Types and Formats.mp4 24.0 MB
  • mp402 - Perform Basic Search Functions in Kibana with Kibana Query Language (KQL)/3. Searching Logs Using KQL/4. KIbana Time Picker Functionality.mp4 22.0 MB
  • mp401 - Elastic Stack - Getting Started/3. Ingesting Data into Elasticsearch/3. A Practitioner's Look at Kibana.mp4 21.7 MB
  • mp404 - Perform Index Management Tasks in Kibana/4. Managing Index Lifecycle/2. Achieving Automated Index Rollover.mp4 21.6 MB
  • mp402 - Perform Basic Search Functions in Kibana with Kibana Query Language (KQL)/5. Using KQL Advanced Features in Querying Log Data/3. Share and Inspect Saved Query.mp4 21.5 MB
  • mp406 - Build Visualizations and Dashboards in Kibana/2. Aggregating Data in Kibana/3. Demo- Creating a Metric and Bucket Aggregation.mp4 20.9 MB
  • mp401 - Elastic Stack - Getting Started/2. Detailing Elasticsearch Foundational Functions/3. Demonstrating Index and Document Concepts in Kibana.mp4 20.8 MB
  • mp402 - Perform Basic Search Functions in Kibana with Kibana Query Language (KQL)/2. Identifying Core Kibana Components/2. Discover Application Features.mp4 20.7 MB
  • mp406 - Build Visualizations and Dashboards in Kibana/5. Creating Dashboards in Kibana/3. Navigating Between Dashboards Using Drilldown.mp4 20.1 MB
  • mp402 - Perform Basic Search Functions in Kibana with Kibana Query Language (KQL)/4. Filtering and Grouping Logs Using KQL/2. KQL Boolean Query.mp4 18.8 MB
  • mp404 - Perform Index Management Tasks in Kibana/3. Optimizing Elastisearch Indices/4. Creating Explicit Mappings.mp4 18.5 MB
  • mp406 - Build Visualizations and Dashboards in Kibana/4. Performing Complex Visualizations in Kibana/4. Creating Geo Maps in Kibana.mp4 18.3 MB
【影视】 [ CoursePig.com ] Skillshare - Cyber Security for End Users -Absolute beginners course 2022
收录时间:2022-02-12 文档个数:248 文档大小:2.5 GB 最近下载:2025-05-11 人气:1459 磁力链接
  • mp4~Get Your Files Here !/30. 30 Lab Attacking a Computer with Ransomware.mp4 150.4 MB
  • mp4~Get Your Files Here !/31. 31 Lab Attacking a Computer with Ransomware continued.mp4 147.2 MB
  • mp4~Get Your Files Here !/39. 39 The Underground Economy.mp4 133.4 MB
  • mp4~Get Your Files Here !/10. 10 What are Botnets.mp4 126.2 MB
  • mp4~Get Your Files Here !/25. 25 Modified Executable Applications.mp4 120.7 MB
  • mp4~Get Your Files Here !/40. 40 Need for Risk Management.mp4 117.0 MB
  • mp4~Get Your Files Here !/17. 17 How Malware is spread part 2.mp4 115.0 MB
  • mp4~Get Your Files Here !/33. 33 Managing Passwords.mp4 110.9 MB
  • mp4~Get Your Files Here !/16. 16 How Malware is spread part 1.mp4 101.0 MB
  • mp4~Get Your Files Here !/34. 34 Backing Up.mp4 82.8 MB
  • mp4~Get Your Files Here !/26. 26 Modified Music and Photo Files.mp4 75.3 MB
  • mp4~Get Your Files Here !/08. 8 What is Bitcoin.mp4 71.6 MB
  • mp4~Get Your Files Here !/05. 5 What is a Trojan.mp4 69.7 MB
  • mp4~Get Your Files Here !/20. 20 The HR Problem.mp4 68.4 MB
  • mp4~Get Your Files Here !/19. 19 Use genuine and updatable software.mp4 63.0 MB
  • mp4~Get Your Files Here !/27. 27 Installing Modified Executable Applications.mp4 61.3 MB
  • mp4~Get Your Files Here !/29. 29 Opening a mp3 Trojan.mp4 59.4 MB
  • mp4~Get Your Files Here !/03. 3 What is a Virus.mp4 58.2 MB
  • mp4~Get Your Files Here !/09. 9 Ransomware Cryptography.mp4 56.3 MB
  • mp4~Get Your Files Here !/11. 11 Botnets and Internet of Things Devices.mp4 55.5 MB
【影视】 [ CourseMega.com ] Linkedin - Cisco Certified CyberOps Associate Cert Prep - 5 Security Policies and Procedures
收录时间:2022-02-12 文档个数:59 文档大小:695.5 MB 最近下载:2025-05-16 人气:1782 磁力链接
  • mp4~Get Your Files Here !/4. Identifying Endpoint Vulnerabilities/018. Understanding network profiling.mp4 41.0 MB
  • mp4~Get Your Files Here !/3. Handling Incidents/014. Detecting incidents.mp4 35.9 MB
  • mp4~Get Your Files Here !/3. Handling Incidents/015. Managing incidents.mp4 35.8 MB
  • mp4~Get Your Files Here !/2. Securing Organizational Assets/07. Outlining mobile device management.mp4 34.8 MB
  • mp4~Get Your Files Here !/5. Limiting the Effects of Intrusions/024. Pivoting through the Diamond Model of Intrusion.mp4 34.3 MB
  • mp4~Get Your Files Here !/2. Securing Organizational Assets/05. Protecting assets.mp4 34.2 MB
  • mp4~Get Your Files Here !/5. Limiting the Effects of Intrusions/023. Outlining the Cyber Kill Chain Model.mp4 33.8 MB
  • mp4~Get Your Files Here !/3. Handling Incidents/016. Collecting evidence.mp4 33.3 MB
  • mp4~Get Your Files Here !/4. Identifying Endpoint Vulnerabilities/019. Profiling server behavior.mp4 33.1 MB
  • mp4~Get Your Files Here !/4. Identifying Endpoint Vulnerabilities/021. Solution Examine suspect IP addresses.mp4 33.1 MB
  • mp4~Get Your Files Here !/2. Securing Organizational Assets/04. Summarizing risk management.mp4 31.4 MB
  • mp4~Get Your Files Here !/2. Securing Organizational Assets/011. Solution Create a security policy.mp4 29.1 MB
  • mp4~Get Your Files Here !/3. Handling Incidents/012. Understanding incidents.mp4 26.5 MB
  • mp4~Get Your Files Here !/3. Handling Incidents/013. Preparing for an incident.mp4 25.8 MB
  • mp4~Get Your Files Here !/2. Securing Organizational Assets/09. Creating security policies.mp4 25.4 MB
  • mp4~Get Your Files Here !/2. Securing Organizational Assets/06. Reviewing configuration management.mp4 25.0 MB
  • mp4~Get Your Files Here !/5. Limiting the Effects of Intrusions/027. Solution The Cyber Kill Chain.mp4 24.3 MB
  • mp4~Get Your Files Here !/3. Handling Incidents/017. Closing an incident.mp4 24.1 MB
  • mp4~Get Your Files Here !/5. Limiting the Effects of Intrusions/025. Evaluating SOC key performance indicators.mp4 22.7 MB
  • mp4~Get Your Files Here !/5. Limiting the Effects of Intrusions/022. Identifying protected data.mp4 22.4 MB
【影视】 [Tutorialsplanet.NET] Udemy - The Complete Cyber Security Course Network Security!
收录时间:2022-02-11 文档个数:571 文档大小:3.6 GB 最近下载:2025-05-16 人气:2734 磁力链接
  • mp410. Browser Security and Tracking Prevention/18. Firefox Hardening.mp4 149.2 MB
  • mp410. Browser Security and Tracking Prevention/16. Browser Fingerprinting.mp4 102.8 MB
  • mp43. Routers - Port and Vulnerability scanning/4. Internal Vulnerability Scanning - MBSA, Nmap, Nessus, Fing & Superscan & OpenVAS.mp4 101.2 MB
  • mp43. Routers - Port and Vulnerability scanning/3. External Vulnerability Scanning - Shodan, Qualys & Nmap.mp4 98.0 MB
  • mp47. Network Monitoring for Threats/5. Wireshark - Finding malware and hackers - Part 1.mp4 95.4 MB
  • mp48. How We Are Tracked Online/2. Types of Tracking.mp4 94.2 MB
  • mp410. Browser Security and Tracking Prevention/3. Reducing the Browser Attack Surface.mp4 92.0 MB
  • mp410. Browser Security and Tracking Prevention/7. uBlock origin - HTTP Filters, ad and track blockers.mp4 90.5 MB
  • mp47. Network Monitoring for Threats/2. Syslog.mp4 84.0 MB
  • mp410. Browser Security and Tracking Prevention/13. History, Cookies and Super cookies Part 1.mp4 69.9 MB
  • mp410. Browser Security and Tracking Prevention/14. History, Cookies and Super cookies Part 2.mp4 69.2 MB
  • mp44. Firewalls/4. Windows - Host Based Firewalls - Windows Firewall.mp4 65.7 MB
  • mp44. Firewalls/7. Linux - Host Based Firewalls - iptables.mp4 63.7 MB
  • mp43. Routers - Port and Vulnerability scanning/2. The Home Router.mp4 63.6 MB
  • mp47. Network Monitoring for Threats/6. Wireshark - Finding malware and hackers - Part 2.mp4 58.8 MB
  • mp43. Routers - Port and Vulnerability scanning/5. Open Source Custom Router Firmware.mp4 58.7 MB
  • mp410. Browser Security and Tracking Prevention/17. Certificates and Encryption.mp4 58.2 MB
  • mp49. Search Engines and Privacy/7. Private and Anonymous Searching.mp4 57.0 MB
  • mp49. Search Engines and Privacy/2. Search Engine Tracking, Censorship and Privacy.mp4 56.2 MB
  • mp48. How We Are Tracked Online/10. More Tracking.mp4 54.6 MB
【影视】 TeamOS-HKRG.CoM_The.Complete.Cyber.Security.Course.for.Beginners
收录时间:2022-02-11 文档个数:32 文档大小:1.4 GB 最近下载:2025-02-25 人气:10 磁力链接
  • mp46. Hunting Part 2.mp4 141.5 MB
  • mp47. Features Extraction Part 1.mp4 117.3 MB
  • mp48. Features Extraction Part 2.mp4 110.0 MB
  • mp416. Taking Down.mp4 106.0 MB
  • mp44. Phases Overview Part 3.mp4 103.4 MB
  • mp411. Behavior Extraction Part 3.mp4 101.8 MB
  • mp45. Hunting Part 1.mp4 92.9 MB
  • mp43. Phases Overview Part 2.mp4 89.2 MB
  • mp49. Behavior Extraction Part 1.mp4 83.0 MB
  • mp414. Threat Actor Attribution Part 2.mp4 82.0 MB
  • mp410. Behavior Extraction Part 2.mp4 76.6 MB
  • mp412. Clustering and Correlation.mp4 75.5 MB
  • mp41. Course Intro.mp4 74.3 MB
  • mp42. Phases Overview Part 1.mp4 66.4 MB
  • mp415. Tracking.mp4 62.3 MB
  • mp413. Threat Actor Attribution Part 1.mp4 57.9 MB
  • srt6. Hunting Part 2.srt 14.0 kB
  • srt16. Taking Down.srt 12.4 kB
  • srt12. Clustering and Correlation.srt 12.2 kB
  • srt7. Features Extraction Part 1.srt 11.1 kB
【影视】 [ FreeCourseWeb.com ] Cloud Academy - CSSLP Domain 1 - 3 Security Policies and Regulations
收录时间:2022-02-11 文档个数:20 文档大小:2.2 GB 最近下载:2025-05-15 人气:987 磁力链接
  • mp4~Get Your Files Here !/8. Acquisition.mp4 480.6 MB
  • mp4~Get Your Files Here !/7. Trusted Computing Principles.mp4 344.2 MB
  • mp4~Get Your Files Here !/6. Architecture and Frameworks.mp4 299.1 MB
  • mp4~Get Your Files Here !/4. Privacy.mp4 276.3 MB
  • mp4~Get Your Files Here !/2. Examples of Regulations and Compliance.mp4 215.1 MB
  • mp4~Get Your Files Here !/1. Security Policies and Regulations - Introduction.mp4 182.4 MB
  • mp4~Get Your Files Here !/9. Security Impact of Acquired Software.mp4 179.3 MB
  • mp4~Get Your Files Here !/3. Legal Issues.mp4 116.4 MB
  • mp4~Get Your Files Here !/5. Systems Design and Engineering.mp4 94.5 MB
  • srt~Get Your Files Here !/8. Acquisition.srt 19.6 kB
  • srt~Get Your Files Here !/7. Trusted Computing Principles.srt 12.5 kB
  • srt~Get Your Files Here !/6. Architecture and Frameworks.srt 10.9 kB
  • srt~Get Your Files Here !/4. Privacy.srt 9.9 kB
  • srt~Get Your Files Here !/2. Examples of Regulations and Compliance.srt 7.5 kB
  • srt~Get Your Files Here !/9. Security Impact of Acquired Software.srt 7.0 kB
  • srt~Get Your Files Here !/1. Security Policies and Regulations - Introduction.srt 6.2 kB
  • srt~Get Your Files Here !/3. Legal Issues.srt 4.3 kB
  • srt~Get Your Files Here !/5. Systems Design and Engineering.srt 3.1 kB
  • txt~Get Your Files Here !/Bonus Resources.txt 357 Bytes
  • urlGet Bonus Downloads Here.url 183 Bytes
【影视】 GetFreeCourses.Co-Udemy-Bug Bounty A-Z - Ethical Hacking + Cyber Security Course
收录时间:2022-02-11 文档个数:186 文档大小:4.4 GB 最近下载:2025-05-15 人气:1109 磁力链接
  • mp410 SQL Injection/003 Vulnerability - Manual SQL Injection.mp4 190.1 MB
  • mp405 Scanning the Target for valuable Information/003 Using Zenmap for Network Scanning.mp4 172.9 MB
  • mp403 Setting up Penetration Testing Lab/005 How to install DVWA in Kali Linux.mp4 127.4 MB
  • mp405 Scanning the Target for valuable Information/004 Using Nmap for Network Scanning.mp4 106.0 MB
  • mp413 Password Cracking/002 Password Cracking using BurpSuite.mp4 99.5 MB
  • mp417 Social Engineering - The Art of Human Exploitation/003 Practical - Using BEEF Project to get user credentials.mp4 94.3 MB
  • mp417 Social Engineering - The Art of Human Exploitation/004 Practical - Using BEEF Project to get user credentials (Continued).mp4 93.5 MB
  • mp411 Cross Site Scripting/003 Vulnerability - Intermediate Exploitation of Cross Site Scripting.mp4 89.8 MB
  • mp409 File Upload Vulnerability/001 Configuring Burp Suite.mp4 85.4 MB
  • mp403 Setting up Penetration Testing Lab/006 How to Install Metasploitable on Virtual Box.mp4 85.0 MB
  • mp412 CSRF/002 CSRF Attack Practical.mp4 82.0 MB
  • mp403 Setting up Penetration Testing Lab/008 Kali Linux - Execute Advance Commands.mp4 78.0 MB
  • mp406 Vulnerability Assessment/005 Nessus - Analyse Results.mp4 77.0 MB
  • mp406 Vulnerability Assessment/004 Nessus - Create and Configure a Policy.mp4 72.9 MB
  • mp404 Information Gathering in Ethical Hacking/002 Information Gathering using Maltego Tool in Kali Linux.mp4 72.7 MB
  • mp408 Command Execution Vulnerability/001 Vulnerability - Basic Command Execution.mp4 72.5 MB
  • mp411 Cross Site Scripting/002 Vulnerability - Basic Exploitation of Cross Site Scripting.mp4 70.1 MB
  • mp409 File Upload Vulnerability/002 Vulnerability - Basic File Upload Vulnerability.mp4 69.3 MB
  • mp409 File Upload Vulnerability/003 Vulnerability - Advanced File Upload Vulnerability.mp4 68.0 MB
  • mp407 OWASP Top 10/002 OWASP Top 10 Vulnerabilities - Part 2.mp4 66.6 MB
【影视】 National Security (2003) 720p BluRay x264 -[MoviesFD]
收录时间:2022-02-11 文档个数:2 文档大小:641.6 MB 最近下载:2025-05-15 人气:367 磁力链接
  • mkvNational.Security.2003.720P.Bluray.X264.[Moviesfd].mkv 641.6 MB
  • txtRead Me.txt 303 Bytes
共178页 上一页 53 54 55 56 57 58 59 60 61 下一页