为您索检到3555条磁力链接,耗时26毫秒。
- 【影视】 ITpro.tv MTA - Security Fundamentals - 98-367 (2018)
-
收录时间:2022-02-10
文档个数:27
文档大小:3.8 GB
最近下载:2025-05-16
人气:302
磁力链接
02 Core Security Principles.mp4 258.3 MB
03 Physical Security.mp4 233.0 MB
13 Password Policies.mp4 209.1 MB
20 Dedicated Firewalls.mp4 199.6 MB
22 Protocol Security.mp4 195.0 MB
25 Server Protection.mp4 189.7 MB
23 Client Protection.mp4 177.3 MB
06 Wireless Security.mp4 170.4 MB
07 Wireless Security Part 2.mp4 167.7 MB
08 User Authentication.mp4 165.0 MB
09 User Authentication Part 2.mp4 155.0 MB
24 Email Protection.mp4 154.5 MB
18 Malware.mp4 151.2 MB
15 Encryption.mp4 149.6 MB
05 Internet Browser Security Part 2.mp4 135.3 MB
10 Permissions.mp4 131.7 MB
14 Audit Policies.mp4 130.3 MB
11 Permissions Part 2.mp4 122.4 MB
21 Network Isolation.mp4 120.8 MB
17 Digital Certificates.mp4 119.1 MB
猜你喜欢:
ITpro
98
tv
Fundamentals
2018
367
Security
MTA
- 【影视】 [ FreeCourseWeb.com ] Udemy - How To Become A Cyber Security Consultant
-
收录时间:2022-02-10
文档个数:17
文档大小:1.2 GB
最近下载:2025-05-15
人气:1384
磁力链接
~Get Your Files Here !/2. What Is A Cyber Security Consulting Methodology/3. How To Perform A Cyber Security Risk Assessment.mp4 260.8 MB
~Get Your Files Here !/2. What Is A Cyber Security Consulting Methodology/1. How To Initiate and Organize Your Cyber Security Consulting Engagements.mp4 245.1 MB
~Get Your Files Here !/2. What Is A Cyber Security Consulting Methodology/2. How To Standardize & Align Cyber Security Objectives.mp4 238.0 MB
~Get Your Files Here !/1. What Does It Take To Become a Cyber Security Consultant/1. How To Become and Operate Like The Industry Leading Cyber Security Consultants.mp4 217.0 MB
~Get Your Files Here !/2. What Is A Cyber Security Consulting Methodology/4. How To Align To Cyber Security Standards & Objectives.mp4 147.2 MB
~Get Your Files Here !/1. What Does It Take To Become a Cyber Security Consultant/2. How To Find Cyber Security Consulting Engagements.mp4 52.4 MB
~Get Your Files Here !/2. What Is A Cyber Security Consulting Methodology/5. How To Perform & Inform The Cyber Security Consulting Objectives & Outcomes.mp4 51.1 MB
~Get Your Files Here !/2. What Is A Cyber Security Consulting Methodology/NIST-CSF-Risk-Assessment-Questionnaire-Template-v1.2.xlsm 555.5 kB
~Get Your Files Here !/2. What Is A Cyber Security Consulting Methodology/1. How To Initiate and Organize Your Cyber Security Consulting Engagements-en_US.srt 40.4 kB
~Get Your Files Here !/1. What Does It Take To Become a Cyber Security Consultant/1. How To Become and Operate Like The Industry Leading Cyber Security Consultants-en_US.srt 37.7 kB
~Get Your Files Here !/2. What Is A Cyber Security Consulting Methodology/3. How To Perform A Cyber Security Risk Assessment-en_US.srt 34.5 kB
~Get Your Files Here !/2. What Is A Cyber Security Consulting Methodology/2. How To Standardize & Align Cyber Security Objectives-en_US.srt 33.4 kB
~Get Your Files Here !/2. What Is A Cyber Security Consulting Methodology/4. How To Align To Cyber Security Standards & Objectives-en_US.srt 20.4 kB
~Get Your Files Here !/1. What Does It Take To Become a Cyber Security Consultant/2. How To Find Cyber Security Consulting Engagements-en_US.srt 8.0 kB
~Get Your Files Here !/2. What Is A Cyber Security Consulting Methodology/5. How To Perform & Inform The Cyber Security Consulting Objectives & Outcomes-en_US.srt 7.1 kB
~Get Your Files Here !/Bonus Resources.txt 357 Bytes
Get Bonus Downloads Here.url 183 Bytes
猜你喜欢:
Consultant
Cyber
Udemy
How
FreeCourseWeb
Become
Security
com
- 【影视】 GetFreeCourses.Co-Udemy-Spring Security Core Beginner to Guru
-
收录时间:2022-02-10
文档个数:309
文档大小:5.8 GB
最近下载:2025-05-15
人气:929
磁力链接
18 - Appendix A_ Using GitHub/002 GitHub Workflow.mp4 136.4 MB
01 - Introduction/006 Github Work Flow.mp4 131.6 MB
11 - Multitenancy Security/012 Spring Security with Spring Data JPA.mp4 112.5 MB
11 - Multitenancy Security/007 Refactor Bootstrap Data.mp4 108.3 MB
14 - Remember Me/004 Persistent Token Rememeber Me.mp4 103.9 MB
04 - Spring Security Java Configuration/002 Permit All with URL Pattern Matching.mp4 100.0 MB
07 - Custom Authentication Filter/008 Custom Failure Handler.mp4 98.0 MB
02 - Introduction to Spring Security/002 Application Security 101.mp4 93.1 MB
09 - User Roles/006 Refactor JUnit 5 Tests.mp4 92.4 MB
01 - Introduction/007 Is Your IDE Free Like a Puppy_.mp4 87.5 MB
08 - Database Authentication/008 Spring Security Configuration.mp4 85.1 MB
15 - User Lockout Using Spring Security Events/005 Logging of Authentication Success Events.mp4 83.7 MB
11 - Multitenancy Security/010 Secure Read Order.mp4 79.4 MB
12 - CSRF Protection in Spring Security/004 Update Customer Forms with CSRF.mp4 76.2 MB
15 - User Lockout Using Spring Security Events/008 Account Locked Message.mp4 75.7 MB
13 - Login Form/004 Add Logout Action.mp4 75.3 MB
16 - Two Factor Authentication/013 Java Configuration and 2FA Demo.mp4 75.3 MB
15 - User Lockout Using Spring Security Events/009 Automatically Unlocking Accounts After Period of Time.mp4 71.8 MB
14 - Remember Me/003 Simple Hash-Based Token Remember Me.mp4 68.7 MB
07 - Custom Authentication Filter/004 Custom Authentication Filter.mp4 68.6 MB
猜你喜欢:
Core
Co
Beginner
Guru
Spring
Udemy
GetFreeCourses
Security
- 【影视】 [ CourseBoat.com ] Udemy - Basic Electronics for Security Professionals
-
收录时间:2022-02-10
文档个数:21
文档大小:1.7 GB
最近下载:2025-05-15
人气:1944
磁力链接
~Get Your Files Here !/05 - Multimeters/001 Multimeters.mp4 362.8 MB
~Get Your Files Here !/04 - Power Requirements/001 Power Requirements.mp4 344.7 MB
~Get Your Files Here !/03 - Circuits, Components & Relays oh my!/002 Electronic Components.mp4 229.5 MB
~Get Your Files Here !/02 - Ohms Law/001 Ohms Law.mp4 201.8 MB
~Get Your Files Here !/03 - Circuits, Components & Relays oh my!/003 Relays.mp4 159.7 MB
~Get Your Files Here !/03 - Circuits, Components & Relays oh my!/001 Circuits.mp4 125.2 MB
~Get Your Files Here !/02 - Ohms Law/002 Ohms Calculations.mp4 116.9 MB
~Get Your Files Here !/01 - Introduction/002 Meet your Instructor.mp4 81.6 MB
~Get Your Files Here !/01 - Introduction/001 Introduction.mp4 22.3 MB
~Get Your Files Here !/01 - Introduction/001 Momentum-Security-Training-Basic-Electronics-v1.pdf 5.6 MB
~Get Your Files Here !/05 - Multimeters/001 Multimeters_en.srt 25.7 kB
~Get Your Files Here !/04 - Power Requirements/001 Power Requirements_en.srt 22.7 kB
~Get Your Files Here !/03 - Circuits, Components & Relays oh my!/002 Electronic Components_en.srt 15.2 kB
~Get Your Files Here !/02 - Ohms Law/001 Ohms Law_en.srt 14.0 kB
~Get Your Files Here !/03 - Circuits, Components & Relays oh my!/003 Relays_en.srt 10.2 kB
~Get Your Files Here !/03 - Circuits, Components & Relays oh my!/001 Circuits_en.srt 8.7 kB
~Get Your Files Here !/02 - Ohms Law/002 Ohms Calculations_en.srt 8.0 kB
~Get Your Files Here !/01 - Introduction/002 Meet your Instructor_en.srt 6.1 kB
~Get Your Files Here !/01 - Introduction/001 Introduction_en.srt 1.9 kB
~Get Your Files Here !/Bonus Resources.txt 386 Bytes
猜你喜欢:
Professionals
Udemy
CourseBoat
Basic
Electronics
com
Security
- 【影视】 Pluralsight - Managing Microsoft Azure Identity and Security series 2018-2021
-
收录时间:2022-02-09
文档个数:687
文档大小:3.1 GB
最近下载:2025-05-16
人气:5789
磁力链接
Implementing Managed Identities for Microsoft Azure Resources/3. Configure Managed Identities for Azure Resources/7. Demo- Access Azure SQL Database Using a Managed Identity.mp4 48.7 MB
Implementing Managed Identities for Microsoft Azure Resources/3. Configure Managed Identities for Azure Resources/2. Demo- Accessing Azure Storage Using a Managed Identity.mp4 43.7 MB
Implementing Managed Identities for Microsoft Azure Resources/3. Configure Managed Identities for Azure Resources/3. Demo- Creating an User-assigned Managed Identity.mp4 43.1 MB
Implementing and Managing Microsoft Azure Multi-factor Authentication/05. Integrating Azure MFA with On-premises Systems/06. ADFS with Cloud-based MFA.mp4 39.7 MB
Implementing Managed Identities for Microsoft Azure Resources/3. Configure Managed Identities for Azure Resources/6. Demo- Connect to Azure Event Hubs Using a Managed Identity.mp4 38.0 MB
Implementing Managed Identities for Microsoft Azure Resources/3. Configure Managed Identities for Azure Resources/8. Demo- Enable Managed Identity on an Azure Function.mp4 35.6 MB
Implementing and Managing Microsoft Azure Multi-factor Authentication/05. Integrating Azure MFA with On-premises Systems/09. Configuring the NPS Extension for Azure MFA.mp4 33.9 MB
Implementing and Managing Microsoft Azure Multi-factor Authentication/03. Configuring Azure MFA in the Cloud/13. Exploring MFA Configuration Settings.mp4 30.4 MB
Managing Identities in Microsoft Azure Active Directory/2. Managing Azure Active Directory Users and Groups/4. Managing Groups.mp4 29.7 MB
Implementing and Managing Microsoft Azure Multi-factor Authentication/05. Integrating Azure MFA with On-premises Systems/03. Creating a Relying Party Web App for ADFS.mp4 29.0 MB
Implementing and Managing Microsoft Azure Multi-factor Authentication/05. Integrating Azure MFA with On-premises Systems/05. ADFS with Azure MFA Server.mp4 27.0 MB
Implementing and Managing Microsoft Azure Multi-factor Authentication/05. Integrating Azure MFA with On-premises Systems/08. Remote Desktop Gateway with Azure MFA Server.mp4 26.6 MB
Managing Microsoft Azure Information Protection/7. Monitoring Azure Information Protection/3. Demonstration.mp4 26.4 MB
Microsoft Azure Hybrid Identity Overview/3. Setting up Users and Applications for Hybrid Identity/1. Assigning Azure Licenses to User Accounts.mp4 23.5 MB
Implementing and Managing Microsoft Azure Multi-factor Authentication/04. Implementing Azure MFA Server On-premises/03. Installing Azure MFA Server.mp4 23.3 MB
Implementing and Managing Microsoft Azure Multi-factor Authentication/05. Integrating Azure MFA with On-premises Systems/11. Custom Development with the Web Service SDK.mp4 22.9 MB
Implementing Managed Identities for Microsoft Azure Resources/2. Introducing Managed Identities for Azure Resources/7. Demo- Acquiring Access Token Using Managed Identity.mp4 21.5 MB
Managing Identities in Microsoft Azure Active Directory/1. Configuring Directories in Azure AD/4. Managing Role-based Access Control.mp4 21.5 MB
Implementing and Managing Microsoft Azure Multi-factor Authentication/08. Protecting Cloud-based Applications/06. Publishing Apps with Azure AD Application Proxy.mp4 21.2 MB
Managing Identities in Microsoft Azure Active Directory/3. Managing Azure AD Devices and Applications/5. Managing Applications.mp4 21.0 MB
猜你喜欢:
Pluralsight
Managing
series
2018
Azure
Security
Microsoft
Identity
2021
- 【影视】 [UdemyCourseDownloader] Learning Threat Modeling for Security Professionals
-
收录时间:2022-02-09
文档个数:32
文档大小:310.0 MB
最近下载:2025-05-06
人气:962
磁力链接
3 - 2._STRIDE/08. Spoofing_a_specific_server.mp4 32.0 MB
3 - 2._STRIDE/11. Repudiating_an_order.mp4 28.8 MB
2 - 1._The_Four_Question_Framework/06. What_are_we_going_to_do_about_it.mp4 27.8 MB
2 - 1._The_Four_Question_Framework/05. What_can_go_wrong.mp4 26.9 MB
2 - 1._The_Four_Question_Framework/07. Did_we_do_a_good_job.mp4 25.8 MB
3 - 2._STRIDE/13. Denial_of_service.mp4 21.7 MB
3 - 2._STRIDE/09. Tampering_with_a_file.mp4 21.0 MB
3 - 2._STRIDE/12. Information_disclosure.mp4 19.8 MB
3 - 2._STRIDE/14. Elevation_of_privilege.mp4 18.6 MB
1 - Introduction/01. Develop_secure_products.mp4 18.4 MB
1 - Introduction/03. A_simple_approach_to_threat_modeling.mp4 17.9 MB
3 - 2._STRIDE/10. Interlude_-_Scope_and_timing.mp4 17.8 MB
1 - Introduction/02. Why_would_you_threat_model.mp4 12.9 MB
2 - 1._The_Four_Question_Framework/04. What_are_we_working_on.mp4 11.7 MB
4 - Conclusion/15. Next_steps.mp4 9.0 MB
3 - 2._STRIDE/08. Spoofing_a_specific_server.en.srt 6.9 kB
3 - 2._STRIDE/11. Repudiating_an_order.en.srt 5.8 kB
3 - 2._STRIDE/13. Denial_of_service.en.srt 5.5 kB
2 - 1._The_Four_Question_Framework/05. What_can_go_wrong.en.srt 5.3 kB
2 - 1._The_Four_Question_Framework/06. What_are_we_going_to_do_about_it.en.srt 5.1 kB
猜你喜欢:
UdemyCourseDownloader
Learning
Professionals
Threat
Modeling
Security
- 【影视】 [ FreeCourseWeb.com ] Linkedin - Top 10 Security Features to Enable within Microsoft 365
-
收录时间:2022-02-09
文档个数:72
文档大小:585.3 MB
最近下载:2025-05-16
人气:520
磁力链接
~Get Your Files Here !/[7] 6. Managing External Sharing Capabilities/[3] Controlling external access.mp4 45.6 MB
~Get Your Files Here !/[2] 1. Security Features within Microsoft 365/[5] Protecting external access.mp4 35.6 MB
~Get Your Files Here !/[5] 4. Blocking Data Leakage/[2] Exchange Online core protections.mp4 29.9 MB
~Get Your Files Here !/[2] 1. Security Features within Microsoft 365/[4] Controlling the flow of data.mp4 26.7 MB
~Get Your Files Here !/[3] 2. Protecting User Accounts and Passwords/[2] Multi-factor authentication advantages.mp4 26.3 MB
~Get Your Files Here !/[4] 3. Controlling Access to Microsoft 365/[6] Create base Conditional Access policies.mp4 23.9 MB
~Get Your Files Here !/[3] 2. Protecting User Accounts and Passwords/[3] Enabling multi-factor authentication.mp4 23.6 MB
~Get Your Files Here !/[7] 6. Managing External Sharing Capabilities/[1] Understanding external sharing in Microsoft 365.mp4 23.5 MB
~Get Your Files Here !/[6] 5. Controlling Device Access/[3] Mobile device management capabilities.mp4 22.9 MB
~Get Your Files Here !/[6] 5. Controlling Device Access/[1] Mobile device management within Microsoft 365.mp4 22.8 MB
~Get Your Files Here !/[2] 1. Security Features within Microsoft 365/[3] Blocking access to applications and services.mp4 21.4 MB
~Get Your Files Here !/[2] 1. Security Features within Microsoft 365/[2] Protecting account logins.mp4 20.9 MB
~Get Your Files Here !/[2] 1. Security Features within Microsoft 365/[1] Understanding core Microsoft 365 security.mp4 19.7 MB
~Get Your Files Here !/[4] 3. Controlling Access to Microsoft 365/[1] Understanding Conditional Access.mp4 19.6 MB
~Get Your Files Here !/[7] 6. Managing External Sharing Capabilities/[4] Restricting external access within SharePoint Online.mp4 19.1 MB
~Get Your Files Here !/[4] 3. Controlling Access to Microsoft 365/[2] Blocking legacy authentication.mp4 18.1 MB
~Get Your Files Here !/[5] 4. Blocking Data Leakage/[4] Blocking forwarding of email.mp4 16.1 MB
~Get Your Files Here !/[4] 3. Controlling Access to Microsoft 365/[5] Managing access with Conditional Access.mp4 16.1 MB
~Get Your Files Here !/[6] 5. Controlling Device Access/[5] Creating mobile application policies.mp4 15.7 MB
~Get Your Files Here !/[3] 2. Protecting User Accounts and Passwords/[1] Managing and protecting user accounts.mp4 15.6 MB
猜你喜欢:
10
Enable
Features
Top
within
Linkedin
FreeCourseWeb
Security
365
com
- 【影视】 [ CoursePig.com ] Advanced Salesforce Data Sharing and Security Administration
-
收录时间:2022-02-09
文档个数:44
文档大小:268.0 MB
最近下载:2025-05-16
人气:1076
磁力链接
~Get Your Files Here !/03. Object and Field Security with Profiles and Permission Sets/10. Demo.mp4 27.2 MB
~Get Your Files Here !/06. Additional Types of Record Sharing in Salesforce/25. Team Sharing Demo.mp4 22.7 MB
~Get Your Files Here !/04. Default Record Access in Salesforce/15. Organzation-wide Defaults Demo.mp4 19.7 MB
~Get Your Files Here !/05. Show Me the Data with Salesforce Record Sharing/21. Sharing Rules and Manual Sharing Demo.mp4 17.0 MB
~Get Your Files Here !/07. Take Control with Salesforce Org Security Features and Delegated Administration/30. Org Restriction Demo.mp4 14.2 MB
~Get Your Files Here !/05. Show Me the Data with Salesforce Record Sharing/19. Role Hierarchy Demo.mp4 12.2 MB
~Get Your Files Here !/07. Take Control with Salesforce Org Security Features and Delegated Administration/29. Restrict the Org.mp4 10.7 MB
~Get Your Files Here !/05. Show Me the Data with Salesforce Record Sharing/20. Horizontal Record Sharing.mp4 10.5 MB
~Get Your Files Here !/03. Object and Field Security with Profiles and Permission Sets/07. Profile Access.mp4 10.3 MB
~Get Your Files Here !/04. Default Record Access in Salesforce/13. Organization-wide Defaults.mp4 10.0 MB
~Get Your Files Here !/06. Additional Types of Record Sharing in Salesforce/24. Team Sharing.mp4 8.9 MB
~Get Your Files Here !/06. Additional Types of Record Sharing in Salesforce/26. Enterprise Territory Management.mp4 8.6 MB
~Get Your Files Here !/05. Show Me the Data with Salesforce Record Sharing/18. Role Hierarchy.mp4 7.3 MB
~Get Your Files Here !/03. Object and Field Security with Profiles and Permission Sets/09. Permission Set Groups.mp4 6.7 MB
~Get Your Files Here !/08. Wrap Up/34. Key Takeaways.mp4 6.4 MB
~Get Your Files Here !/03. Object and Field Security with Profiles and Permission Sets/08. Permission Sets.mp4 6.0 MB
~Get Your Files Here !/04. Default Record Access in Salesforce/14. External Sharing Model.mp4 5.7 MB
~Get Your Files Here !/02. Introduction to Salesforce Data Security/04. Course Objectives.mp4 5.0 MB
~Get Your Files Here !/07. Take Control with Salesforce Org Security Features and Delegated Administration/31. Delegated Administration.mp4 4.5 MB
~Get Your Files Here !/Exercise Files/06/additional-types-of-record-sharing-in-salesforce-slides.pdf 3.7 MB
猜你喜欢:
Salesforce
Administration
Data
CoursePig
Sharing
Security
com
Advanced
- 【影视】 Security Cam Chronicles Pack
-
收录时间:2022-02-08
文档个数:93
文档大小:6.4 GB
最近下载:2025-05-15
人气:979
磁力链接
Security Cam Chronicles 7 Scene 8 .wmv 466.8 MB
Security Cam Chronicles 7 Scene 4 .wmv 391.6 MB
Security Cam Chronicles 7 Scene 3 .wmv 351.8 MB
Security Cam Chronicles 3 Scene 3 .wmv 342.1 MB
Security Cam Chronicles 3 Scene 8 .wmv 303.0 MB
Security Cam Chronicles 3 Scene 10 .wmv 290.8 MB
Security Cam Chronicles 7 Scene 1 .wmv 239.9 MB
Security Cam Chronicles 3 Scene 5 .wmv 235.2 MB
Security Cam Chronicles 7 Scene 6 .wmv 222.7 MB
Security Cam Chronicles 3 Scene 7 .wmv 214.9 MB
Security Cam Chronicles 4 Scene 4 .wmv 175.7 MB
Security Cam Chronicles 3 Scene 1 .wmv 169.7 MB
Security Cam Chronicles 3 Scene 9 .wmv 168.9 MB
Security Cam Chronicles 4 Scene 1 .wmv 168.9 MB
Security Cam Chronicles 4 Scene 8 .wmv 167.4 MB
Security Cam Chronicles 2 Scene 9 .wmv 159.4 MB
Security Cam Chronicles 4 Scene 9 .wmv 137.2 MB
Security Cam Chronicles 1 Scene 6 .wmv 130.6 MB
Security Cam Chronicles 2 Scene 8 .wmv 123.0 MB
Security Cam Chronicles 1 Scene 4 .wmv 119.4 MB
猜你喜欢:
Security
Chronicles
Cam
Pack
- 【影视】 System Hacking + Mobile Hacking and Security v3.0
-
收录时间:2022-02-08
文档个数:229
文档大小:2.3 GB
最近下载:2025-05-12
人气:1164
磁力链接
[TutsNode.com] - System Hacking + Mobile Hacking and Security v3.0/3. Ethical Hacking/31. Best Keylogger.mp4 77.1 MB
[TutsNode.com] - System Hacking + Mobile Hacking and Security v3.0/3. Ethical Hacking/33. Gaining Remote Access.mp4 71.7 MB
[TutsNode.com] - System Hacking + Mobile Hacking and Security v3.0/3. Ethical Hacking/32. System Hacking.mp4 68.9 MB
[TutsNode.com] - System Hacking + Mobile Hacking and Security v3.0/3. Ethical Hacking/12. Google Hacking.mp4 68.5 MB
[TutsNode.com] - System Hacking + Mobile Hacking and Security v3.0/3. Ethical Hacking/22. Generating Undetectable Backdoor.mp4 67.1 MB
[TutsNode.com] - System Hacking + Mobile Hacking and Security v3.0/3. Ethical Hacking/24. Using Backdoor to Gain Access.mp4 66.8 MB
[TutsNode.com] - System Hacking + Mobile Hacking and Security v3.0/3. Ethical Hacking/38. Social Engineering- I.mp4 60.2 MB
[TutsNode.com] - System Hacking + Mobile Hacking and Security v3.0/3. Ethical Hacking/5. Check for Traget Reachability.mp4 59.7 MB
[TutsNode.com] - System Hacking + Mobile Hacking and Security v3.0/3. Ethical Hacking/21. Installing Veil.mp4 56.8 MB
[TutsNode.com] - System Hacking + Mobile Hacking and Security v3.0/3. Ethical Hacking/25. Email Spoofing.mp4 55.7 MB
[TutsNode.com] - System Hacking + Mobile Hacking and Security v3.0/3. Ethical Hacking/23. Backdoor Modification and Testing.mp4 52.6 MB
[TutsNode.com] - System Hacking + Mobile Hacking and Security v3.0/3. Ethical Hacking/37. Password Breaking of Win 10.mp4 52.4 MB
[TutsNode.com] - System Hacking + Mobile Hacking and Security v3.0/3. Ethical Hacking/26. Steganography- I.mp4 51.6 MB
[TutsNode.com] - System Hacking + Mobile Hacking and Security v3.0/3. Ethical Hacking/34. Trojan Creation and Hacking.mp4 50.1 MB
[TutsNode.com] - System Hacking + Mobile Hacking and Security v3.0/5. Doing more with Mobile/3. Data Recovery.mp4 45.3 MB
[TutsNode.com] - System Hacking + Mobile Hacking and Security v3.0/1. Introduction to System Hacking/2. Learn Hacking- II.mp4 43.4 MB
[TutsNode.com] - System Hacking + Mobile Hacking and Security v3.0/3. Ethical Hacking/46. Pentesting Reports- II.mp4 42.7 MB
[TutsNode.com] - System Hacking + Mobile Hacking and Security v3.0/2. Creating Virtual Lab/2. Kali Installation.mp4 42.6 MB
[TutsNode.com] - System Hacking + Mobile Hacking and Security v3.0/2. Creating Virtual Lab/1. Oracle VirtualBox.mp4 41.0 MB
[TutsNode.com] - System Hacking + Mobile Hacking and Security v3.0/3. Ethical Hacking/18. Zenmap.mp4 40.6 MB
猜你喜欢:
Hacking
Mobile
Security
System
v3
- 【影视】 [CourseClub.Me] TCM Security Academy - Practical Ethical Hacking [2021]
-
收录时间:2022-02-08
文档个数:441
文档大小:12.8 GB
最近下载:2025-05-15
人气:2233
磁力链接
13. Mid-Course Capstone/2. Walkthrough - Legacy.mp4 348.0 MB
13. Mid-Course Capstone/6. Walkthrough - Jerry.mp4 320.2 MB
13. Mid-Course Capstone/7. Walkthrough - Nibbles.mp4 299.2 MB
13. Mid-Course Capstone/4. Walkthrough - Blue.mp4 298.0 MB
13. Mid-Course Capstone/3. Walkthrough - Lame.mp4 293.6 MB
7. Introduction to Python/16. Building a Port Scanner.mp4 282.7 MB
13. Mid-Course Capstone/5. Walkthrough - Devel.mp4 258.7 MB
13. Mid-Course Capstone/9. Walkthrough - Bashed.mp4 254.0 MB
13. Mid-Course Capstone/8. Walkthrough - Optimum.mp4 247.0 MB
13. Mid-Course Capstone/11. Walkthrough - Netmon.mp4 245.3 MB
4. Networking Refresher/7. Subnetting Part 1 - Methodology.mp4 218.0 MB
13. Mid-Course Capstone/10. Walkthrough - Grandpa.mp4 171.2 MB
12. Exploitation Basics/6. Password Spraying and Credential Stuffing.mp4 164.3 MB
17. Attacking Active Directory Initial Attack Vectors/4. Password Cracking with Hashcat.mp4 161.8 MB
10. Scanning & Enumeration/4. Enumerating HTTPHTTPS - Part 2.mp4 157.9 MB
7. Introduction to Python/13. Advanced Strings.mp4 152.5 MB
7. Introduction to Python/9. Lists.mp4 150.1 MB
18. Attacking Active Directory Post-Compromise Enumeration/3. Domain Enumeration with PowerView.mp4 146.3 MB
10. Scanning & Enumeration/7. Researching Potential Vulnerabilities.mp4 145.3 MB
12. Exploitation Basics/4. Manual Exploitation.mp4 142.9 MB
猜你喜欢:
Me
Ethical
CourseClub
Academy
Practical
TCM
2021
Security
Hacking
- 【影视】 GetFreeCourses.Co-Udemy-The Complete Cyber Security Course Network Security!
-
收录时间:2022-02-08
文档个数:113
文档大小:3.4 GB
最近下载:2025-05-16
人气:3236
磁力链接
10 Browser Security and Tracking Prevention/081 Firefox Hardening.mp4 149.2 MB
10 Browser Security and Tracking Prevention/079 Browser Fingerprinting.mp4 102.8 MB
03 Routers - Port and Vulnerability scanning/010 Internal Vulnerability Scanning - MBSA Nmap Nessus Fing Superscan OpenVAS.mp4 101.1 MB
03 Routers - Port and Vulnerability scanning/009 External Vulnerability Scanning - Shodan Qualys Nmap.mp4 98.0 MB
07 Network Monitoring for Threats/043 Wireshark - Finding malware and hackers - Part 1.mp4 95.4 MB
08 How We Are Tracked Online/047 Types of Tracking.mp4 94.2 MB
10 Browser Security and Tracking Prevention/066 Reducing the Browser Attack Surface.mp4 92.0 MB
10 Browser Security and Tracking Prevention/070 uBlock origin - HTTP Filters ad and track blockers.mp4 90.5 MB
07 Network Monitoring for Threats/040 Syslog.mp4 84.0 MB
10 Browser Security and Tracking Prevention/076 History Cookies and Super cookies Part 1.mp4 69.9 MB
10 Browser Security and Tracking Prevention/077 History Cookies and Super cookies Part 2.mp4 69.2 MB
04 Firewalls/015 Windows - Host Based Firewalls - Windows Firewall.mp4 65.7 MB
04 Firewalls/018 Linux - Host Based Firewalls - iptables.mp4 63.7 MB
03 Routers - Port and Vulnerability scanning/008 The Home Router.mp4 63.6 MB
07 Network Monitoring for Threats/044 Wireshark - Finding malware and hackers - Part 2.mp4 58.7 MB
03 Routers - Port and Vulnerability scanning/011 Open Source Custom Router Firmware.mp4 58.7 MB
10 Browser Security and Tracking Prevention/080 Certificates and Encryption.mp4 58.2 MB
09 Search Engines and Privacy/063 Private and Anonymous Searching.mp4 57.0 MB
09 Search Engines and Privacy/058 Search Engine Tracking Censorship and Privacy.mp4 56.2 MB
08 How We Are Tracked Online/055 More Tracking.mp4 54.6 MB
猜你喜欢:
Security
Co
Complete
Cyber
Udemy
Course
GetFreeCourses
Network
- 【影视】 [ FreeCourseWeb.com ] Udemy - NIST(800-82) Industrial Control system(ICS) Security
-
收录时间:2022-02-07
文档个数:40
文档大小:982.3 MB
最近下载:2025-05-16
人气:2252
磁力链接
~Get Your Files Here !/01 Introduction/004 NIST 800-82 - IT Security vs ICS Security.mp4 92.0 MB
~Get Your Files Here !/03 ICS Security Architecture/002 NIST 800-82 - ICS Security Architecture Part-2.mp4 84.7 MB
~Get Your Files Here !/03 ICS Security Architecture/005 NIST 800-82 - ICS Security Architecture Part-5.mp4 76.2 MB
~Get Your Files Here !/03 ICS Security Architecture/008 NIST 800-82- Security Control Family AC(Access Control).mp4 73.1 MB
~Get Your Files Here !/02 ICS Security Program/002 NIST 800-82 - ICS Security Program Part-2.mp4 66.8 MB
~Get Your Files Here !/01 Introduction/001 Introduction to NIST 800-82.mp4 60.5 MB
~Get Your Files Here !/01 Introduction/002 NIST 800-82- SCADA.mp4 60.1 MB
~Get Your Files Here !/03 ICS Security Architecture/013 NIST 800-82- Security Control Family 800-53-PE(Physical and Environmental Protec.mp4 58.0 MB
~Get Your Files Here !/03 ICS Security Architecture/006 NIST 800-82 - ICS Security Architecture Part-6.mp4 56.9 MB
~Get Your Files Here !/03 ICS Security Architecture/001 NIST 800-82 - ICS Security Architecture Part-1.mp4 56.9 MB
~Get Your Files Here !/03 ICS Security Architecture/012 NIST 800-82- Security Control Family CM(Configuration Management).mp4 55.6 MB
~Get Your Files Here !/03 ICS Security Architecture/010 NIST 800-82- Security Control Family AU(Auditing & Accountability).mp4 49.8 MB
~Get Your Files Here !/03 ICS Security Architecture/003 NIST 800-82 - ICS Security Architecture Part-3.mp4 43.2 MB
~Get Your Files Here !/03 ICS Security Architecture/011 NIST 800-82- Security Control Family CA(Security Assessment & Authorization).mp4 32.0 MB
~Get Your Files Here !/01 Introduction/003 NIST 800-82 - DCS & PLC.mp4 29.4 MB
~Get Your Files Here !/03 ICS Security Architecture/007 NIST 800-82 - ICS Security Architecture Part-7.mp4 27.1 MB
~Get Your Files Here !/03 ICS Security Architecture/004 NIST 800-82 - ICS Security Architecture Part-4.mp4 26.4 MB
~Get Your Files Here !/02 ICS Security Program/001 NIST 800-82 - ICS Security Program Part-1.mp4 18.0 MB
~Get Your Files Here !/03 ICS Security Architecture/009 NIST 800-82- Security Control Family AT(Awareness & Training).mp4 15.3 MB
~Get Your Files Here !/03 ICS Security Architecture/008 NIST 800-82- Security Control Family AC(Access Control).en.srt 19.6 kB
猜你喜欢:
Control
Industrial
system
Udemy
ICS
FreeCourseWeb
82
Security
800
com
- 【影视】 INE CCIE Security v6 Complete (New 2020)
-
收录时间:2022-02-07
文档个数:737
文档大小:52.0 GB
最近下载:2025-05-16
人气:1986
磁力链接
10. Additional Resources/01. Using INE & VIRL for CCNA, CCNP, and CCIE Preparation/01. Using INE & VIRL - For CCNA, CCNP and CCIE Preparation.mp4 544.0 MB
9-Final Preparation V5/4-VPN/14. Task 3.11 - GET VPN.mp4 399.3 MB
9-Final Preparation V5/6-ISE/8. Task 4.8 - Wired Central WebAuth, Employee BYOD, Self and Sponsored Guest.mp4 375.5 MB
9-Final Preparation V5/6-ISE/6. Task 4.6 - MAB for IP Phone.mp4 336.7 MB
5-Infrastructure Security, Attacks and Mitigation/5-IPv6 First Hop Security vSeminar/2-IPv6 First Hop Security - Part 2.ts 300.7 MB
9-Final Preparation V5/6-ISE/2. Task 4.2 - Device login using Radius Protocol.mp4 273.1 MB
9-Final Preparation V5/2-ASA/13. Task 1.13 - Transparent Firewall.mp4 262.9 MB
6-Access Control and Identity Services Engine/2-Advanced Identity Services Engine (ISE)/2-common confguration/3. Advanced Profiling.mp4 253.3 MB
4-Cryptography and Virtual Private Networks/5-Secure Connectivity/5-Dynamic Multipoint VPN/2. Implementing DMVPN.mp4 248.7 MB
9-Final Preparation V5/2-ASA/10. Task 1.10 - Static NAT, Static Policy NAT & Static PAT.mp4 241.4 MB
5-Infrastructure Security, Attacks and Mitigation/5-IPv6 First Hop Security vSeminar/1-IPv6 First Hop Security - Part 1.ts 231.7 MB
4-Cryptography and Virtual Private Networks/5-Secure Connectivity/5-Dynamic Multipoint VPN/3. DMVPN for IPv6.mp4 230.7 MB
9-Final Preparation V5/2-ASA/18. Task 1.18 - Virtual Firewalls.mp4 227.7 MB
9-Final Preparation V5/2-ASA/24. Task 1.23 - Clustering in Multi-Context.mp4 227.5 MB
9-Final Preparation V5/2-ASA/3. Task 1.3 - Configuring Access-list.mp4 221.7 MB
4-Cryptography and Virtual Private Networks/5-Secure Connectivity/3-IKE version 2/4. Cisco FlexVPN - Client-Server.mp4 215.7 MB
2-Routing & Switching Technologies Review/2-Routing Technologies for Beginners/3-Routing Protocols/4. The OSPF Protocol.mp4 214.6 MB
4-Cryptography and Virtual Private Networks/5-Secure Connectivity/2-Virtual Private Networks _ IP Security/3. IPsec VPN - L2L IOS-ASA.mp4 208.1 MB
4-Cryptography and Virtual Private Networks/5-Secure Connectivity/2-Virtual Private Networks _ IP Security/6. IOS Advanced IPsec Solutions.mp4 200.6 MB
9-Final Preparation V5/4-VPN/2. Task 3.1 - Legacy LAN-to-LAN VPN between IOS Routers using IKEv1 - Part 2.mp4 195.3 MB
猜你喜欢:
CCIE
Complete
2020
v6
New
INE
Security
- 【影视】 WWW.TORRENTING.COM - Tomorrows World Today S04E16 Cyber Security 480p x264-mS
-
收录时间:2022-02-07
文档个数:6
文档大小:73.6 MB
最近下载:2025-05-15
人气:355
磁力链接
Tomorrows.World.Today.S04E16.Cyber.Security.480p.x264-mSD.mkv 72.9 MB
Screens/screen0003.png 315.1 kB
Screens/screen0001.png 229.5 kB
Screens/screen0002.png 187.1 kB
Tomorrows.World.Today.S04E16.Cyber.Security.480p.x264-mSD.nfo 1.0 kB
Torrent Downloaded From www.Torrenting.com.txt 86 Bytes
猜你喜欢:
480p
WWW
Tomorrows
TORRENTING
S04E16
Cyber
mS
x264
World
Security
- 【影视】 Curso completo de Linux Security! - Qualquer Distribuição
-
收录时间:2022-02-07
文档个数:69
文档大小:1.1 GB
最近下载:2025-05-13
人气:530
磁力链接
2. Instalação e customização/1.1 Aula 1 - Instalar o VirtualBox.mp4.mp4 178.3 MB
2. Instalação e customização/1. Instalar o VirtualBox.mp4 63.0 MB
9. Ferramentas de Seguranças/2. PortSentry.mp4 55.4 MB
3. Problemas de segurança do Linux/5. Criptografando discos com LUKS.mp4 43.1 MB
8. Monitoramento e registro de segurança/5. Usando o Lynis.mp4 39.5 MB
6. Segurança na Autenticação Remota/4. Fortalecimento do SSH com Fail2Ban.mp4 37.1 MB
7. Linux Firewall/5. Configurando e usando o Wrapper TCP.mp4 36.7 MB
5. Segurança na Autenticação local no Linux/4. Autenticação de login usando um dispositivo USB e PAM.mp4 34.7 MB
8. Monitoramento e registro de segurança/1. Administração de arquivos de log usando Logcheck.mp4 31.9 MB
7. Linux Firewall/2. Usando Iptables para configurar um firewall.mp4 31.0 MB
2. Instalação e customização/4. Instalando o Debian 9.mp4 29.9 MB
2. Instalação e customização/3. Instalação do CentOS.mp4 29.3 MB
6. Segurança na Autenticação Remota/1. Acesso remoto do servidor e host usando SSH.mp4 29.1 MB
4. Segurança do sistema de arquivos locais/3. Implementando a lista de controle de acesso (ACL).mp4 28.3 MB
9. Ferramentas de Seguranças/3. Tripwire.mp4 28.3 MB
5. Segurança na Autenticação local no Linux/1. Autenticação e log de usuário.mp4 27.4 MB
2. Instalação e customização/2. Instalar o Ubuntu Server.mp4 27.3 MB
4. Segurança do sistema de arquivos locais/4. Instale e configure um servidor LDAP básico.mp4 26.7 MB
6. Segurança na Autenticação Remota/3. SSH Port Forwarding.mp4 25.7 MB
8. Monitoramento e registro de segurança/2. Monitorando uma rede usando Nmap.mp4 24.1 MB
猜你喜欢:
Curso
de
completo
Qualquer
Linux
Distribui
Security
- 【影视】 Docker Build Security 101
-
收录时间:2022-02-06
文档个数:50
文档大小:365.6 MB
最近下载:2025-05-11
人气:1364
磁力链接
[TutsNode.com] - Docker Build Security 101/3. Docker Build Security Best Practices/3. Building a Docker Image.mp4 51.0 MB
[TutsNode.com] - Docker Build Security 101/2. Lab setup/1. Installing Docker.mp4 49.8 MB
[TutsNode.com] - Docker Build Security 101/3. Docker Build Security Best Practices/10. The use of latest tag.mp4 48.8 MB
[TutsNode.com] - Docker Build Security 101/3. Docker Build Security Best Practices/14. The use of Multi Stage Builds.mp4 45.9 MB
[TutsNode.com] - Docker Build Security 101/3. Docker Build Security Best Practices/5. The use of root accounts.mp4 39.8 MB
[TutsNode.com] - Docker Build Security 101/3. Docker Build Security Best Practices/11. Limiting write access.mp4 34.2 MB
[TutsNode.com] - Docker Build Security 101/3. Docker Build Security Best Practices/6. The use of COPY.mp4 30.9 MB
[TutsNode.com] - Docker Build Security 101/3. Docker Build Security Best Practices/12. The use of secrets.mp4 24.1 MB
[TutsNode.com] - Docker Build Security 101/3. Docker Build Security Best Practices/9. Use of minimal Base Images.mp4 17.2 MB
[TutsNode.com] - Docker Build Security 101/3. Docker Build Security Best Practices/1. Need for build security.mp4 7.1 MB
[TutsNode.com] - Docker Build Security 101/3. Docker Build Security Best Practices/8. Untrusted Base Images.mp4 4.8 MB
[TutsNode.com] - Docker Build Security 101/3. Docker Build Security Best Practices/13. The use of administrative services.mp4 3.8 MB
[TutsNode.com] - Docker Build Security 101/3. Docker Build Security Best Practices/7. The use of ADD.mp4 3.0 MB
[TutsNode.com] - Docker Build Security 101/1. Course Introduction/1. Introduction.mp4 2.7 MB
[TutsNode.com] - Docker Build Security 101/4. Conclusion/1. Conclusion.mp4 691.1 kB
.pad/9 223.6 kB
.pad/2 219.8 kB
.pad/13 213.7 kB
.pad/3 208.4 kB
.pad/10 203.5 kB
猜你喜欢:
Security
Docker
101
Build
- 【影视】 [ DevCourseWeb.com ] Udemy - Comprehensive Introduction to Cyber Security
-
收录时间:2022-02-05
文档个数:27
文档大小:1.6 GB
最近下载:2025-05-14
人气:3459
磁力链接
~Get Your Files Here !/4. Understanding the Attackers/2. Cyber Threat Intelligence and APTs - Homework.mp4 488.3 MB
~Get Your Files Here !/6. Study of real-life Attacks Scenarios/2. Spear-Phishing.mp4 136.3 MB
~Get Your Files Here !/2. Understanding the Landscape/4. Massive and growing threats.mp4 122.0 MB
~Get Your Files Here !/6. Study of real-life Attacks Scenarios/4. Browser Exploitation.mp4 95.0 MB
~Get Your Files Here !/6. Study of real-life Attacks Scenarios/5. Exposed service compromise.mp4 85.4 MB
~Get Your Files Here !/6. Study of real-life Attacks Scenarios/3. Infected USB drive.mp4 84.3 MB
~Get Your Files Here !/5. Understanding the Attacks/4. The Diamond Model - Homework.mp4 82.9 MB
~Get Your Files Here !/2. Understanding the Landscape/2. Well-funded states are able to breach anything.mp4 76.1 MB
~Get Your Files Here !/2. Understanding the Landscape/1. Rise in sophisticated and targeted attacks.mp4 61.8 MB
~Get Your Files Here !/5. Understanding the Attacks/2. The “MITRE ATT&CK” framework.mp4 57.9 MB
~Get Your Files Here !/2. Understanding the Landscape/6. Zero-days are a juicy (dark) business.mp4 49.4 MB
~Get Your Files Here !/3. Understanding the Threats/1. The security Threats.mp4 38.0 MB
~Get Your Files Here !/4. Understanding the Attackers/1. Who are they What are their motivations and targets.mp4 37.6 MB
~Get Your Files Here !/5. Understanding the Attacks/1. The “Intrusion Kill Chain” model.mp4 37.1 MB
~Get Your Files Here !/8. Working in ITCyber Security/1. Working in ITCyber Security.mp4 31.3 MB
~Get Your Files Here !/2. Understanding the Landscape/7. Cybercriminals will stop at nothing for profit.mp4 26.7 MB
~Get Your Files Here !/2. Understanding the Landscape/3. Theft and resale of data on the rise.mp4 22.3 MB
~Get Your Files Here !/1. Course Introduction/1. Introduction.mp4 12.7 MB
~Get Your Files Here !/6. Study of real-life Attacks Scenarios/7. Notes on detection and mitigation.mp4 12.5 MB
~Get Your Files Here !/6. Study of real-life Attacks Scenarios/6. Real APT study case.mp4 11.7 MB
猜你喜欢:
Introduction
Comprehensive
Cyber
Udemy
DevCourseWeb
Security
com
- 【影视】 Udemy - MikroTik Security Engineer with LABS
-
收录时间:2022-02-04
文档个数:92
文档大小:9.8 GB
最近下载:2025-05-16
人气:6888
磁力链接
7. Firewall on MikroTik - The full story (Filter Rules, Mangle, NAT, RAW)/6. Brute Force attack and Prevention.mp4 493.9 MB
5. DHCP attacks and Prevention/1. Preventing DHCP Starvation attack.mp4 389.8 MB
8. Encrypted Tunnels on RouterOS/4. Configuring L2TP site to site VPN (wo IPSEC).mp4 379.1 MB
7. Firewall on MikroTik - The full story (Filter Rules, Mangle, NAT, RAW)/14. Preventing UDP Flood Attack.mp4 373.6 MB
7. Firewall on MikroTik - The full story (Filter Rules, Mangle, NAT, RAW)/8. Accept important ICMP types in your MikroTik Firewall.mp4 356.9 MB
7. Firewall on MikroTik - The full story (Filter Rules, Mangle, NAT, RAW)/5. Protect your MikroTik router using connection state in the Firewall.mp4 344.2 MB
8. Encrypted Tunnels on RouterOS/8. Configuring SSTP site to site VPN (with Certificates).mp4 339.0 MB
7. Firewall on MikroTik - The full story (Filter Rules, Mangle, NAT, RAW)/12. Block Syn Flood and DDOS using the MikroTik Firewall.mp4 326.5 MB
4. LockDown the Mikrotik Router - Disable unnecessary tools/1. Disable MAC Winbox, MAC Ping & neighbor discovery.mp4 322.6 MB
7. Firewall on MikroTik - The full story (Filter Rules, Mangle, NAT, RAW)/2. Overview of the Firewall on the MikroTik RouterOS.mp4 310.2 MB
5. DHCP attacks and Prevention/2. Protect your network with DHCP Snooping to avoid DHCP rogue server.mp4 309.9 MB
1. Disable unnecessary protocols on the MikroTik Router/2. Turn off unnecessary packages, scan for open protocols and disable them.mp4 298.0 MB
7. Firewall on MikroTik - The full story (Filter Rules, Mangle, NAT, RAW)/18. Use Mangle to mark connections and packets.mp4 292.9 MB
3. Get the right people to login into your MikroTik Router/2. User Management on Mikrotik.mp4 282.7 MB
1. Disable unnecessary protocols on the MikroTik Router/3. Protect the access on the Mikrotik Router using SSH and Winbox.mp4 278.4 MB
7. Firewall on MikroTik - The full story (Filter Rules, Mangle, NAT, RAW)/15. MNDP Attacks Prevention.mp4 269.0 MB
8. Encrypted Tunnels on RouterOS/2. What is VPN and why is it important to use it in our network.mp4 267.5 MB
8. Encrypted Tunnels on RouterOS/9. Configuring SSTP client to site VPN.mp4 264.7 MB
7. Firewall on MikroTik - The full story (Filter Rules, Mangle, NAT, RAW)/7. Use the Firewall to Protect your MikroTik router from PingICMP flood.mp4 260.6 MB
7. Firewall on MikroTik - The full story (Filter Rules, Mangle, NAT, RAW)/11. Drop port scan attacks using the MikroTik firewall.mp4 248.4 MB
猜你喜欢:
MikroTik
LABS
Security
Engineer
Udemy
- 【影视】 [ CoursePig.com ] Securing a Spring Boot REST API Using Spring Security with iPad Pro and Raspberry Pi 4
-
收录时间:2022-02-04
文档个数:18
文档大小:745.3 MB
最近下载:2025-05-11
人气:1275
磁力链接
~Get Your Files Here !/04-Secure the API.mp4 163.3 MB
~Get Your Files Here !/06-Add Authentication Support to Services.mp4 158.0 MB
~Get Your Files Here !/07-Add Authentication Support to Controllers.mp4 157.1 MB
~Get Your Files Here !/03-Build JWT Support.mp4 137.0 MB
~Get Your Files Here !/05-Overview of Security Payload.mp4 50.9 MB
~Get Your Files Here !/08-Testing the API.mp4 43.7 MB
~Get Your Files Here !/02-Introduction.mp4 30.1 MB
~Get Your Files Here !/01-Summary.mp4 5.1 MB
~Get Your Files Here !/04-Secure the API.en.srt 14.4 kB
~Get Your Files Here !/03-Build JWT Support.en.srt 13.7 kB
~Get Your Files Here !/07-Add Authentication Support to Controllers.en.srt 12.5 kB
~Get Your Files Here !/06-Add Authentication Support to Services.en.srt 11.5 kB
~Get Your Files Here !/08-Testing the API.en.srt 7.6 kB
~Get Your Files Here !/02-Introduction.en.srt 6.9 kB
~Get Your Files Here !/05-Overview of Security Payload.en.srt 6.7 kB
~Get Your Files Here !/01-Summary.en.srt 1.2 kB
~Get Your Files Here !/Bonus Resources.txt 386 Bytes
Get Bonus Downloads Here.url 179 Bytes
猜你喜欢:
Spring
iPad
Pi
Securing
CoursePig
Pro
Boot
REST
API
Using