磁力管家

磁力管家
为您索检到3555条磁力链接,耗时24毫秒。 rss

分享给好友

【影视】 Cyber Security - VOLUME 3
收录时间:2021-03-15 文档个数:570 文档大小:3.1 GB 最近下载:2025-05-15 人气:1879 磁力链接
  • mp43. OPSEC (Operational Security)/6. 10 Rules of OPSEC.mp4 194.3 MB
  • mp416. Wrap Up/4. Firefox Hardening.mp4 149.2 MB
  • mp46. Tor/12. Conclusions on Tor and mitigation to reduce risk.mp4 128.6 MB
  • mp46. Tor/10. Tor Weaknesses Part 1.mp4 91.5 MB
  • mp45. Virtual Private Networks (VPNs)/7. Setting up an OpenVPN client in Windows, Mac, iPhone and Android.mp4 91.1 MB
  • mp44. Live Operating Systems – Tails, Knoppix, Puppy linux, Jondo live, Tiny core linu/3. Knoppix, Puppy linux, Jondo live, Tiny core linux, Window To Go.mp4 67.0 MB
  • mp44. Live Operating Systems – Tails, Knoppix, Puppy linux, Jondo live, Tiny core linu/4. Tails.mp4 66.7 MB
  • mp43. OPSEC (Operational Security)/4. Establishing Cover.mp4 63.0 MB
  • mp410. I2P - The Invisible Internet Project/3. I2P Installing and Secure Configuration Part 1.mp4 61.7 MB
  • mp45. Virtual Private Networks (VPNs)/8. Setting up an OpenVPN client on Linux.mp4 61.5 MB
  • mp46. Tor/3. The Tor Network and Browser.mp4 59.4 MB
  • mp45. Virtual Private Networks (VPNs)/11. Setting up an OpenVPN server Part 1 - The fast and easy way.mp4 58.0 MB
  • mp45. Virtual Private Networks (VPNs)/9. Preventing VPN Leaks - Firewalls and kill switches.mp4 57.3 MB
  • mp43. OPSEC (Operational Security)/5. Identify Cross Contamination.mp4 53.6 MB
  • mp413. ChainingNesting Privacy and Anonymising Services/12. How to setup - (User - Tor - SSHVPNJonDoym - Internet) with transproxy.mp4 52.8 MB
  • mp410. I2P - The Invisible Internet Project/4. I2P Installing and Secure Configuration Part 2.mp4 49.3 MB
  • mp44. Live Operating Systems – Tails, Knoppix, Puppy linux, Jondo live, Tiny core linu/2. Introduction to live operating systems.mp4 48.4 MB
  • mp46. Tor/8. Torrc Configuration File.mp4 48.2 MB
  • mp41. Introduction/3. Security Quick Win!.mp4 46.8 MB
  • mp44. Live Operating Systems – Tails, Knoppix, Puppy linux, Jondo live, Tiny core linu/5. Tails Demo.mp4 46.4 MB
【影视】 LinuxAcademy AZ-500 Microsoft Azure Security Technologies
收录时间:2021-03-15 文档个数:62 文档大小:4.8 GB 最近下载:2025-05-15 人气:4130 磁力链接
  • mp47. Working with Azure AD Connect.mp4 371.1 MB
  • mp48. Azure AD Connect Authentication Methods Explained.mp4 212.3 MB
  • mp410. Multi-Factor Authentication Part II.mp4 164.8 MB
  • mp417. PIM Configuration, Access Requests and Approval Part I.mp4 152.8 MB
  • mp414. Azure AD Identity Protection Part I.mp4 148.0 MB
  • mp412. Conditional Access Part II.mp4 138.5 MB
  • mp413. Conditional Access Part III.mp4 135.4 MB
  • mp424. Azure Firewall.mp4 133.1 MB
  • mp44. Azure AD Users.mp4 119.8 MB
  • mp49. Multi-Factor Authentication Part I.mp4 118.5 MB
  • mp443. Data Classification Using Azure Information Protection.mp4 117.4 MB
  • mp416. AD PIM Overview and Activation.mp4 116.9 MB
  • mp419. Reviewing Access in PIM.mp4 115.2 MB
  • mp425. Resource Firewalls.mp4 110.8 MB
  • mp446. Working with Azure Key Vault.mp4 109.7 MB
  • mp45. Azure AD Groups.mp4 109.0 MB
  • mp415. Azure AD Identity Protection Part II.mp4 108.8 MB
  • mp432. Azure Policies.mp4 105.5 MB
  • mp447. Database Authentication and Auditing.mp4 104.1 MB
  • mp46. App Registrations, Permissions, Scopes, and Consent.mp4 103.9 MB
【影视】 Introduction to Cyber Security in Maritime and Offshore (1080p_25fps_H264-128kbit_AAC).mp4
收录时间:2021-03-15 文档个数:1 文档大小:75.8 MB 最近下载:2025-05-14 人气:2136 磁力链接
  • mp4Introduction to Cyber Security in Maritime and Offshore (1080p_25fps_H264-128kbit_AAC).mp4 75.8 MB
【影视】 Cyber Security - VOLUME 1
收录时间:2021-03-15 文档个数:352 文档大小:3.7 GB 最近下载:2025-05-16 人气:2707 磁力链接
  • mp44. Encryption Crash Course/10. Certificate Authorities and HTTPS.mp4 209.0 MB
  • mp44. Encryption Crash Course/6. Secure Sockets Layer (SSL) and Transport layer security (TLS).mp4 168.7 MB
  • mp45. Setting up a Testing Environment Using Virtual Machines (Lab)/4. Virtual box.mp4 151.2 MB
  • mp44. Encryption Crash Course/7. SSL Stripping.mp4 120.1 MB
  • mp45. Setting up a Testing Environment Using Virtual Machines (Lab)/3. Vmware.mp4 115.9 MB
  • mp46. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/11. Windows 7, 8 and 8.1 - Privacy & Tracking.mp4 110.7 MB
  • mp44. Encryption Crash Course/12. Steganography.mp4 109.4 MB
  • mp46. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/7. Windows 10 - Tool Disable Windows 10 Tracking.mp4 103.2 MB
  • mp44. Encryption Crash Course/4. Hash Functions.mp4 93.6 MB
  • mp411. Security Through Isolation and Compartmentalization/15. Whonix OS - Anonymous Operating system.mp4 92.9 MB
  • mp46. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/9. Windows 10 – Privacy Settings.mp4 90.7 MB
  • mp46. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/3. Security Bugs and Vulnerabilities.mp4 88.0 MB
  • mp44. Encryption Crash Course/9. Digital Certificates.mp4 85.9 MB
  • mp44. Encryption Crash Course/8. HTTPS (HTTP Secure).mp4 85.9 MB
  • mp46. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/5. Windows 10 - Privacy & Tracking.mp4 83.8 MB
  • mp411. Security Through Isolation and Compartmentalization/17. Qubes OS.mp4 82.6 MB
  • mp44. Encryption Crash Course/3. Asymmetric Encryption.mp4 75.8 MB
  • mp411. Security Through Isolation and Compartmentalization/9. Windows - Sandboxes and Application Isolation - Sandboxie.mp4 73.5 MB
  • mp46. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/6. Windows 10 - Disable tracking automatically.mp4 71.2 MB
  • mp46. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/10. Windows 10 - WiFi Sense.mp4 62.7 MB
【影视】 5G and Cyber Security First Look
收录时间:2021-03-15 文档个数:69 文档大小:125.5 MB 最近下载:2025-05-16 人气:1959 磁力链接
  • mp4[TutsNode.com] - 5G and Cyber Security First Look/06. Decoding Cyber Security and Its protocols/28. 5G Security Measures.mp4 10.9 MB
  • mp4[TutsNode.com] - 5G and Cyber Security First Look/03. Implementing Network Slicing and Virtualization/12. 5G Network Functions.mp4 8.6 MB
  • mp4[TutsNode.com] - 5G and Cyber Security First Look/06. Decoding Cyber Security and Its protocols/26. LTE Network Security.mp4 8.6 MB
  • mp4[TutsNode.com] - 5G and Cyber Security First Look/05. Interworking between 5G and the Previous Generation Network/21. 5G GUTI vs. 4G GUTI.mp4 7.6 MB
  • mp4[TutsNode.com] - 5G and Cyber Security First Look/05. Interworking between 5G and the Previous Generation Network/20. Introduction to 5G Identifiers.mp4 7.1 MB
  • mp4[TutsNode.com] - 5G and Cyber Security First Look/06. Decoding Cyber Security and Its protocols/27. 5G Network Security Enhancements.mp4 6.0 MB
  • mp4[TutsNode.com] - 5G and Cyber Security First Look/04. Analyzing 5G Security/16. Introduction to 5G Security.mp4 5.7 MB
  • mp4[TutsNode.com] - 5G and Cyber Security First Look/02. Understanding 5G and Its Architecture/06. Key Enablers of 5G.mp4 5.7 MB
  • mp4[TutsNode.com] - 5G and Cyber Security First Look/05. Interworking between 5G and the Previous Generation Network/22. Interworking Mechanism.mp4 5.7 MB
  • mp4[TutsNode.com] - 5G and Cyber Security First Look/02. Understanding 5G and Its Architecture/02. Introduction to the Course.mp4 5.2 MB
  • mp4[TutsNode.com] - 5G and Cyber Security First Look/03. Implementing Network Slicing and Virtualization/11. Protocol Data Unit Sessions.mp4 4.9 MB
  • mp4[TutsNode.com] - 5G and Cyber Security First Look/02. Understanding 5G and Its Architecture/04. Key Aspects of 5G.mp4 4.5 MB
  • mp4[TutsNode.com] - 5G and Cyber Security First Look/02. Understanding 5G and Its Architecture/05. 5G Architecture.mp4 4.2 MB
  • mp4[TutsNode.com] - 5G and Cyber Security First Look/03. Implementing Network Slicing and Virtualization/13. Network Function Virtualization.mp4 3.9 MB
  • mp4[TutsNode.com] - 5G and Cyber Security First Look/04. Analyzing 5G Security/17. Logical Entities of Network Access Security.mp4 3.6 MB
  • mp4[TutsNode.com] - 5G and Cyber Security First Look/03. Implementing Network Slicing and Virtualization/14. 5G Network Slicing.mp4 3.5 MB
  • mp4[TutsNode.com] - 5G and Cyber Security First Look/06. Decoding Cyber Security and Its protocols/24. Introduction to 5G Threats.mp4 3.0 MB
  • mp4[TutsNode.com] - 5G and Cyber Security First Look/01. Course Overview/01. Course Overview.mp4 2.9 MB
  • mp4[TutsNode.com] - 5G and Cyber Security First Look/02. Understanding 5G and Its Architecture/09. Core 5G Features.mp4 2.8 MB
  • mp4[TutsNode.com] - 5G and Cyber Security First Look/06. Decoding Cyber Security and Its protocols/25. 5G Threats Landscape.mp4 2.7 MB
【影视】 [FreeCourseSite.com] Udemy - The Complete Cyber Security Course Hackers Exposed!
收录时间:2021-03-15 文档个数:564 文档大小:4.5 GB 最近下载:2025-05-15 人气:4319 磁力链接
  • mp44. Encryption Crash Course/10. Certificate Authorities and HTTPS.mp4 209.0 MB
  • mp44. Encryption Crash Course/6. Secure Sockets Layer (SSL) and Transport layer security (TLS).mp4 168.7 MB
  • mp45. Setting up a Testing Environment Using Virtual Machines (Lab)/4. Virtual box.mp4 151.2 MB
  • mp44. Encryption Crash Course/7. SSL Stripping.mp4 120.1 MB
  • mp45. Setting up a Testing Environment Using Virtual Machines (Lab)/2. Introduction to Setting up a Testing Environment Using Virtual Machines.mp4 118.9 MB
  • mp45. Setting up a Testing Environment Using Virtual Machines (Lab)/3. Vmware.mp4 115.9 MB
  • mp46. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/11. Windows 7, 8 and 8.1 - Privacy & Tracking.mp4 110.7 MB
  • mp44. Encryption Crash Course/12. Steganography.mp4 109.4 MB
  • mp46. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/7. Windows 10 - Tool Disable Windows 10 Tracking.mp4 103.2 MB
  • mp44. Encryption Crash Course/4. Hash Functions.mp4 93.6 MB
  • mp411. Security Through Isolation and Compartmentalization/15. Whonix OS - Anonymous Operating system.mp4 93.0 MB
  • mp46. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/9. Windows 10 – Privacy Settings.mp4 90.7 MB
  • mp46. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/3. Security Bugs and Vulnerabilities.mp4 88.0 MB
  • mp49. Social Engineering and Social Media Offence and Defence/2. Information Disclosure and Identity Strategies for Social Media.mp4 87.9 MB
  • mp44. Encryption Crash Course/9. Digital Certificates.mp4 85.9 MB
  • mp44. Encryption Crash Course/8. HTTPS (HTTP Secure).mp4 85.9 MB
  • mp46. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/5. Windows 10 - Privacy & Tracking.mp4 83.8 MB
  • mp411. Security Through Isolation and Compartmentalization/17. Qubes OS.mp4 82.6 MB
  • mp44. Encryption Crash Course/3. Asymmetric Encryption.mp4 75.8 MB
  • mp411. Security Through Isolation and Compartmentalization/9. Windows - Sandboxes and Application Isolation - Sandboxie.mp4 73.5 MB
【影视】 Our.Cartoon.President.S03E03.Election.Security.720p.AMZN.WEBRip.DDP2.0.x264-monkee[rarbg]
收录时间:2021-03-15 文档个数:3 文档大小:403.4 MB 最近下载:2025-05-11 人气:70 磁力链接
  • mkvOur.Cartoon.President.S03E03.Election.Security.720p.AMZN.WEB-DL.DD+2.0.H.264-monkee.mkv 403.4 MB
  • exeRARBG_DO_NOT_MIRROR.exe 99 Bytes
  • txtRARBG.txt 30 Bytes
【影视】 Young.Justice.S03E04.Private.Security.1080p.DCU.WEBRip.AAC2.0.H264-NTb[TGx]
收录时间:2021-03-15 文档个数:2 文档大小:811.7 MB 最近下载:2025-02-27 人气:19 磁力链接
  • mkvYoung.Justice.S03E04.Private.Security.1080p.DCU.WEB-DL.AAC2.0.H264-NTb.mkv 811.7 MB
  • txt[TGx]Downloaded from torrentgalaxy.org .txt 691 Bytes
【影视】 [FreeCourseSite.com] Udemy - The Complete Cyber Security Course End Point Protection!
收录时间:2021-03-15 文档个数:1026 文档大小:3.0 GB 最近下载:2025-05-16 人气:3641 磁力链接
  • mp48. Malware and Hacker Hunting on the End-Point/11. Windows - Malware Seek & Destroy - Process Monitor.mp4 79.9 MB
  • mp47. Threat Detection and Monitoring/4. CanaryTokens.mp4 73.7 MB
  • mp411. Email Security, Privacy and Anonymity/6. Windows - PGP & GPG.mp4 61.1 MB
  • mp48. Malware and Hacker Hunting on the End-Point/6. Windows - Malware Seek & Destroy - Process Explorer - Part 1.mp4 60.6 MB
  • mp413. Wrap Up/3. Qubes OS.mp4 59.0 MB
  • mp48. Malware and Hacker Hunting on the End-Point/10. Windows - Malware Seek & Destroy - Autoruns.mp4 50.6 MB
  • mp48. Malware and Hacker Hunting on the End-Point/7. Windows - Malware Seek & Destroy - Process Explorer - Part 2.mp4 49.0 MB
  • mp49. Operating System and Application Hardening/7. Windows - Security Compliance Manager (SCM).mp4 47.0 MB
  • mp41. Introduction/3. Security Quick Win!.mp4 46.8 MB
  • mp48. Malware and Hacker Hunting on the End-Point/15. Linux - Seek & Destroy Malware and Hackers - Csysdig.mp4 45.8 MB
  • mp48. Malware and Hacker Hunting on the End-Point/26. Mac, Linux & Windows - OSquery.mp4 44.4 MB
  • mp49. Operating System and Application Hardening/3. Hardening Standards.mp4 43.5 MB
  • mp48. Malware and Hacker Hunting on the End-Point/4. Automated Malware Removal Tools.mp4 41.9 MB
  • mp47. Threat Detection and Monitoring/5. OpenCanary.mp4 40.7 MB
  • mp43. File and Disk Encryption/4. Disk Encryption Attacks - Physical.mp4 40.2 MB
  • mp411. Email Security, Privacy and Anonymity/2. Clients, Protocols and Authentication.mp4 40.0 MB
  • mp48. Malware and Hacker Hunting on the End-Point/3. Windows - Farbar Recovery Scanner.mp4 39.9 MB
  • mp411. Email Security, Privacy and Anonymity/16. Choosing an Email Provider.mp4 39.2 MB
  • mp46. End-Point-Protection Technology/9. Windows - Exploitation Prevention - EMET.mp4 39.2 MB
  • mp44. Anti-Virus and End-Point-Protection/3. Is Anti-Virus dead - Protection Methods.mp4 38.4 MB
【影视】 Cyber Security Awareness - Full video 20min_HD_DOWNLOAD.mp4
收录时间:2021-03-15 文档个数:1 文档大小:331.3 MB 最近下载:2025-05-12 人气:1283 磁力链接
  • mp4Cyber Security Awareness - Full video 20min_HD_DOWNLOAD.mp4 331.3 MB
【影视】 Security.Unlimited.1981.1080p.mkv
收录时间:2021-03-15 文档个数:1 文档大小:2.2 GB 最近下载:2025-05-15 人气:5418 磁力链接
  • mkvSecurity.Unlimited.1981.1080p.mkv 2.2 GB
【影视】 Border.Security.Americas.Front.Line.S01E11.720p.WEB.x264-CRiMSON[eztv].mkv
收录时间:2021-03-15 文档个数:1 文档大小:334.0 MB 最近下载:2025-05-15 人气:9348 磁力链接
  • mkvBorder.Security.Americas.Front.Line.S01E11.720p.WEB.x264-CRiMSON[eztv].mkv 334.0 MB
【影视】 Security Fest
收录时间:2021-03-15 文档个数:38 文档大小:3.2 GB 最近下载:2025-05-08 人气:36 磁力链接
  • mp4Security Fest 2018/Security Fest 2018 Livestream #2.mp4 356.3 MB
  • mp4Security Fest 2018/Security Fest 2018 Livestream #1 morning.mp4 274.6 MB
  • mp4Security Fest 2016/Feedback Security - Mark Hillick, Riot Games - Security Fest 2016.mp4 241.0 MB
  • mp4Security Fest 2016/Frans Rosén The Secret life of a Bug Bounty Hunter - Security Fest 2016.mp4 194.4 MB
  • mp4Security Fest 2016/Dave Lewis Barbarians at the Gateway - Security Fest 2016.mp4 193.8 MB
  • mp4Security Fest 2016/Veit Hailperin, The Tale of a Fameless but Widespread Web Vulnerability Class - Security Fest 2016.mp4 141.3 MB
  • mp4Security Fest 2016/Hacking Mattermost - Open Source Messaging Platform for Hipsters Andreas Lindh - Security Fest 2016.mp4 129.2 MB
  • mp4Security Fest 2016/Panel Debate on Bug bounties - Security Fest 2016.mp4 127.7 MB
  • mp4Security Fest 2018/Solomon Sonya - Advanced Memory Forensics NextGen Actionable Threat Intelligence - SecurityFest 2018.mp4 113.7 MB
  • mp4Security Fest 2016/James Powell Shall We Play a Game - Better Living Through Wargames - Security Fest 2016.mp4 106.5 MB
  • mp4Security Fest 2018/Tanya Janca - Insecurity in Information Technology - SecurityFest 2018.mp4 101.6 MB
  • mp4Security Fest 2018/Aaron Guzman - Finessing fake firmware security for Friday fun - SecurityFest 2018.mp4 92.6 MB
  • mp4Security Fest 2017/Embedded Security - Jesper Larsson, Aaron Guzman, Emma Lilliestam, Dave Lewis - Security Fest 2017.mp4 85.0 MB
  • mp4Security Fest 2018/Irena Damsky - Detecting Phishing from pDNS - SecurityFest 2018.mp4 81.1 MB
  • mp4Security Fest 2017/How to convince a malware to avoid us - Csaba Fitzl - Security Fest 2017.mp4 80.2 MB
  • mp4Security Fest 2017/Of Unicorns and Replicants - Steve Lord - Security Fest 2017.mp4 79.6 MB
  • mp4Security Fest 2018/Rachel Tobac - Hacking the Wetware - SecurityFest 2018.mp4 78.7 MB
  • mp4Security Fest 2017/Internet of Scientific Curiosity - Emma Lilliestam - Security Fest 2017.mp4 74.7 MB
  • mp4Security Fest 2018/Security Fest 2018 Live.mp4 74.3 MB
  • mp4Security Fest 2017/Dont get caught in Em-bed - Aaron Guzman - Security Fest 2017.mp4 73.9 MB
【影视】 [Udemy] The Information Security Masterclass Course Zero to Hero (2021) [En]
收录时间:2021-03-14 文档个数:335 文档大小:7.3 GB 最近下载:2025-05-15 人气:1072 磁力链接
  • mp48. Scanning and Enumeration/3. ZenMap GUI.mp4 182.4 MB
  • mp414. SQL Injection/3. Manual SQL Injection.mp4 147.4 MB
  • mp46. Setting up your lab!/6. Install DVWA in Kali.mp4 140.7 MB
  • mp47. Information Gathering/9. SHODAN Search Engine.mp4 129.3 MB
  • mp417. Password Cracking/2. Password Cracking - Live practical.mp4 120.3 MB
  • mp413. File Upload Vulnerabilities/1. Configuring Burp Suite.mp4 108.5 MB
  • mp414. SQL Injection/4. Automating SQL Injection - SQLmap.mp4 102.5 MB
  • mp419. Social Engineering/4. Getting User credentials using BeEF Framework.mp4 94.4 MB
  • mp46. Setting up your lab!/5. Install Metasploitable on Virtual Box.mp4 90.4 MB
  • mp46. Setting up your lab!/4. Kali Linux Installation in Virtual Box.mp4 89.9 MB
  • mp419. Social Engineering/3. Installing BeEF Framework.mp4 87.5 MB
  • mp47. Information Gathering/3. Maltego - Part 2.mp4 87.3 MB
  • mp415. XSS - Cross Site Scripting/3. Exploiting XSS - Low.mp4 87.1 MB
  • mp49. Vulnerability Assessment/6. Nessus Launch Scan and Analyze Results.mp4 86.4 MB
  • mp47. Information Gathering/2. Maltego - Part 1.mp4 82.5 MB
  • mp49. Vulnerability Assessment/3. Vulnerability Scoring Systems.mp4 79.6 MB
  • mp46. Setting up your lab!/9. Executing Advance Commands in Kali.mp4 78.9 MB
  • mp49. Vulnerability Assessment/5. Create and Configure Nessus Network Policy.mp4 76.1 MB
  • mp45. Hacking Terminology/2. Vulnerability Assessment Vs Penetration Testing.mp4 73.7 MB
  • mp415. XSS - Cross Site Scripting/5. Exploiting XSS - High.mp4 72.4 MB
【影视】 Pluralsight - CCSP- Cloud Platform Security by Lyron Andrews
收录时间:2021-03-14 文档个数:36 文档大小:76.4 MB 最近下载:2025-05-16 人气:2551 磁力链接
  • mp42. Designing Cloud IAM Controls/2. Selecting Federated Protocols.mp4 8.2 MB
  • mp42. Designing Cloud IAM Controls/0. Designing IAM Controls.mp4 6.8 MB
  • mp41. Using Cloud Components that Provide Service/0. Utilizing Cloud Service Components.mp4 6.1 MB
  • mp43. Implementing Cloud Security Controls/0. Implementing Cloud Security Controls.mp4 6.1 MB
  • mp41. Using Cloud Components that Provide Service/3. Reviewing Virtualized Network Services.mp4 5.7 MB
  • mp42. Designing Cloud IAM Controls/1. Understanding Federated Identities and Entitlement.mp4 5.0 MB
  • mp42. Designing Cloud IAM Controls/3. Evaluating CASBs and IDaaS.mp4 4.8 MB
  • mp43. Implementing Cloud Security Controls/3. Trusted Platform Module.mp4 4.6 MB
  • mp41. Using Cloud Components that Provide Service/4. Understanding the Cloud Management Plane.mp4 4.4 MB
  • mp40. Course Overview/0. Course Overview.mp4 4.1 MB
  • mp43. Implementing Cloud Security Controls/1. Virtual Private Cloud.mp4 3.4 MB
  • mp43. Implementing Cloud Security Controls/2. Security Groups.mp4 3.1 MB
  • mp41. Using Cloud Components that Provide Service/2. Examining Cloud Storage Options.mp4 3.1 MB
  • zipccsp-cloud-platform-security.zip 2.8 MB
  • mp41. Using Cloud Components that Provide Service/1. Understanding Cloud Compute Options.mp4 2.4 MB
  • mp41. Using Cloud Components that Provide Service/5. Summary.mp4 2.3 MB
  • mp43. Implementing Cloud Security Controls/4. Summary.mp4 2.1 MB
  • mp42. Designing Cloud IAM Controls/4. Summary.mp4 1.3 MB
  • srt2. Designing Cloud IAM Controls/2. Selecting Federated Protocols.srt 12.2 kB
  • srt2. Designing Cloud IAM Controls/0. Designing IAM Controls.srt 7.9 kB
【影视】 MS Cybersecurity Pro Track Enterprise Security Fundamentals
收录时间:2021-03-14 文档个数:91 文档大小:1.0 GB 最近下载:2025-05-15 人气:1875 磁力链接
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/02 Understanding the cybersecurity landscape/003 Current Cybersecurity Landscape.mp4 169.2 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/03 Red Team_ Penetration, lateral movement, escalation, and exfiltration/008 Red Team Kill Chain.mp4 142.4 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/014 Attack Detection.mp4 89.9 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/011 Blue Team Kill Chain.mp4 70.3 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/05 Beyond The Breach/016 Organization Preparations.mp4 68.5 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/012 Restrict Privilege Escalation.mp4 59.9 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/02 Understanding the cybersecurity landscape/005 Cost of Breach.mp4 59.5 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/03 Red Team_ Penetration, lateral movement, escalation, and exfiltration/007 The Attacker's Objective.mp4 55.8 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/02 Understanding the cybersecurity landscape/004 Assume Compromise Philosophy.mp4 53.5 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/05 Beyond The Breach/017 Developing and Maintaining Policies.mp4 50.7 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/013 Restrict Lateral Movement.mp4 43.0 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/05 Beyond The Breach/015 CIA Triad.mp4 30.7 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/03 Red Team_ Penetration, lateral movement, escalation, and exfiltration/006 Red Team versus Blue Team exercises.mp4 30.4 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/01 Introduction/002 Course overview.mp4 25.3 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/010 Blue Team.mp4 22.9 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/03 Red Team_ Penetration, lateral movement, escalation, and exfiltration/009 Document Vulnerabilities.mp4 10.6 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/01 Introduction/001 Instructor introduction.mp4 9.3 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/07 Conclusion/018 Bonus Lecture_ What Next_.mp4 3.2 MB
  • pdf[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/014 AttackDetection.pdf 709.3 kB
  • pdf[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/011 BlueTeamKillChain.pdf 695.5 kB
【影视】 Joint Security Area (2000) [1080p] [BluRay] [5.1] [YTS.MX]
收录时间:2021-03-14 文档个数:3 文档大小:2.2 GB 最近下载:2025-05-15 人气:13542 磁力链接
  • mp4Joint.Security.Area.2000.1080p.BluRay.x264.AAC5.1-[YTS.MX].mp4 2.2 GB
  • jpgwww.YTS.MX.jpg 53.2 kB
  • srtJoint.Security.Area.2000.1080p.BluRay.x264.AAC5.1-[YTS.MX].srt 44.9 kB
【影视】 Security.2017.BGAUDIO.720p.BluRay.x264.AC3-AVS.mkv
收录时间:2021-03-14 文档个数:1 文档大小:2.2 GB 最近下载:2025-04-26 人气:597 磁力链接
  • mkvSecurity.2017.BGAUDIO.720p.BluRay.x264.AC3-AVS.mkv 2.2 GB
【影视】 [FreeAllCourse.Com] Udemy - Cyber Security - Go From Zero to Hero (2020)
收录时间:2021-03-13 文档个数:240 文档大小:3.7 GB 最近下载:2025-03-14 人气:824 磁力链接
  • mp45. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/19. PRACTICAL HOW TO FIND OUT USERNAMES AND PASSWORDS USING SOCIAL ENGINEERING.mp4 89.7 MB
  • mp45. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/13. Have you ever heard about a Ransomware.mp4 85.1 MB
  • mp41. FUNDAMENTALS OF NETWORKING/11. Introduction to TCPIP Model.mp4 79.7 MB
  • mp45. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/15. PRACTICAL INFORMATION GATHERING USING SHODAN.mp4 78.0 MB
  • mp47. FIREWALLS AND ANTIVIRUS/9. Antivirus Detection Techniques.mp4 76.2 MB
  • mp45. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/2. Different types of Actors in Cyber Security.mp4 67.6 MB
  • mp44. DIVING DEEP INTO CYBER SECURITY/15. Hashing.mp4 65.1 MB
  • mp42. GETTING STARTED WITH CYBER SECURITY/4. History of Cyber Security.mp4 63.0 MB
  • mp45. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/11. Types of Virus.mp4 62.2 MB
  • mp47. FIREWALLS AND ANTIVIRUS/2. Intrusion Detection System.mp4 62.0 MB
  • mp45. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/18. Types of Social Engineering.mp4 60.4 MB
  • mp46. KEY SECURITY CONCEPTS/3. Integrity, Authentication, Access Control and Non-Repudiation.mp4 58.6 MB
  • mp41. FUNDAMENTALS OF NETWORKING/17. Classes of IP Address.mp4 57.5 MB
  • mp41. FUNDAMENTALS OF NETWORKING/14. Addressing in Computer Networks.mp4 56.2 MB
  • mp47. FIREWALLS AND ANTIVIRUS/3. Introduction to Firewalls.mp4 55.9 MB
  • mp41. FUNDAMENTALS OF NETWORKING/22. Address Resolution Protocol (ARP).mp4 53.0 MB
  • mp45. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/8. Everything about Trojans.mp4 52.6 MB
  • mp45. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/9. Types of Trojans.mp4 52.0 MB
  • mp43. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/7. Roles in Cyber Security Part 1.mp4 51.3 MB
  • mp46. KEY SECURITY CONCEPTS/9. How to carry out an Internal Audit.mp4 50.9 MB
【影视】 Security Guard Fucks My Mom For Stealing.mp4
收录时间:2021-03-13 文档个数:1 文档大小:288.9 MB 最近下载:2025-04-23 人气:153 磁力链接
  • mp4Security Guard Fucks My Mom For Stealing.mp4 288.9 MB
共178页 上一页 78 79 80 81 82 83 84 85 86 下一页