2048BT

为您索检到299条磁力链接,耗时0毫秒。

★注意★本站地址随时可能失效

找到本站最新地址的两种方法: 1、记住地址发布页2048bt.cc2048bt.cyoubt搜索.xyzbt搜索.cc 2、发送“地址”到2048bt@gmail.com
【压缩文件】 [ DevCourseWeb.com ] Cybersecurity - The Beginner's Guide - A comprehensive guide to getting started in cybersecurity.zip
收录时间:2021-01-18 文档个数:1 文档大小:114.6 MB 最近下载:2024-10-04 人气:3745 磁力链接
  • zip[ DevCourseWeb.com ] Cybersecurity - The Beginner's Guide - A comprehensive guide to getting started in cybersecurity.zip 114.6 MB
【影视】 [ TutPig.com ] Linkedin - Cybersecurity Awareness - Cybersecurity Terminology
收录时间:2023-03-12 文档个数:34 文档大小:109.8 MB 最近下载:2024-10-05 人气:1074 磁力链接
  • mp4~Get Your Files Here !/04 - 3. Process/01 - Understanding processes and documentation.mp4 10.5 MB
  • mp4~Get Your Files Here !/05 - 4. Technology/01 - Secure practices, terms, and exercises.mp4 10.1 MB
  • mp4~Get Your Files Here !/06 - 5. Threat Actors and Risks/02 - Technical risks.mp4 8.8 MB
  • mp4~Get Your Files Here !/03 - 2. People/01 - Security awareness and leadership.mp4 8.6 MB
  • mp4~Get Your Files Here !/03 - 2. People/04 - Understanding privacy.mp4 8.3 MB
  • mp4~Get Your Files Here !/06 - 5. Threat Actors and Risks/03 - Threats that target the human element.mp4 7.7 MB
  • mp4~Get Your Files Here !/04 - 3. Process/02 - Technical controls.mp4 7.3 MB
  • mp4~Get Your Files Here !/05 - 4. Technology/02 - Network controls.mp4 7.1 MB
  • mp4~Get Your Files Here !/05 - 4. Technology/03 - Advancements in technology.mp4 7.1 MB
  • mp4~Get Your Files Here !/06 - 5. Threat Actors and Risks/01 - Threat actors and definitions.mp4 7.1 MB
  • mp4~Get Your Files Here !/02 - 1. Defining Cybersecurity and People, Process, and Technology/01 - What is cybersecurity.mp4 6.0 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Welcome to Cybersecurity Terminology 101.mp4 5.7 MB
  • mp4~Get Your Files Here !/03 - 2. People/02 - Red vs. blue vs. purple teams.mp4 5.0 MB
  • mp4~Get Your Files Here !/03 - 2. People/03 - Who are the adversaries.mp4 4.7 MB
  • mp4~Get Your Files Here !/02 - 1. Defining Cybersecurity and People, Process, and Technology/02 - People, process, and technology.mp4 2.9 MB
  • mp4~Get Your Files Here !/07 - Conclusion/01 - Apply cybersecurity terminology.mp4 2.8 MB
  • srt~Get Your Files Here !/04 - 3. Process/01 - Understanding processes and documentation.srt 6.2 kB
  • srt~Get Your Files Here !/06 - 5. Threat Actors and Risks/01 - Threat actors and definitions.srt 6.1 kB
  • srt~Get Your Files Here !/06 - 5. Threat Actors and Risks/03 - Threats that target the human element.srt 5.7 kB
  • srt~Get Your Files Here !/04 - 3. Process/02 - Technical controls.srt 5.7 kB
【影视】 [ FreeCourseWeb.com ] Cybersecurity Careers - Build Your Brand in Cybersecurity
收录时间:2024-03-28 文档个数:34 文档大小:189.3 MB 最近下载:2024-10-04 人气:752 磁力链接
  • mp4~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/04 - Optimizing your LinkedIn profile.mp4 18.6 MB
  • mp4~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/05 - Five tips for using LinkedIn effectively.mp4 17.3 MB
  • mp4~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/02 - Speaking at events and conferences.mp4 16.1 MB
  • mp4~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/01 - Creating and sharing content.mp4 16.0 MB
  • mp4~Get Your Files Here !/02 - 1. Personal Branding in Cybersecurity/03 - Benefits of building your personal brand in cybersecurity.mp4 13.9 MB
  • mp4~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/03 - Building an online presence.mp4 13.6 MB
  • mp4~Get Your Files Here !/02 - 1. Personal Branding in Cybersecurity/02 - Elements of a strong personal brand.mp4 13.1 MB
  • mp4~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/02 - Developing a personal brand statement.mp4 11.7 MB
  • mp4~Get Your Files Here !/05 - 4. Networking for Cybersecurity Professionals/03 - Staying up-to-date with industry trends.mp4 11.6 MB
  • mp4~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/03 - Contributing to open-source projects.mp4 11.0 MB
  • mp4~Get Your Files Here !/05 - 4. Networking for Cybersecurity Professionals/01 - Networking and nurturing professional relationships.mp4 10.4 MB
  • mp4~Get Your Files Here !/02 - 1. Personal Branding in Cybersecurity/01 - What is personal branding.mp4 10.1 MB
  • mp4~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/01 - Identifying your unique value proposition.mp4 10.0 MB
  • mp4~Get Your Files Here !/05 - 4. Networking for Cybersecurity Professionals/02 - Effective networking strategies.mp4 8.0 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Grow your cybersecurity career with personal branding.mp4 3.9 MB
  • mp4~Get Your Files Here !/06 - Conclusion/01 - Next steps.mp4 3.9 MB
  • srt~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/02 - Speaking at events and conferences.srt 8.6 kB
  • srt~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/01 - Creating and sharing content.srt 7.9 kB
  • srt~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/04 - Optimizing your LinkedIn profile.srt 7.5 kB
  • srt~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/03 - Building an online presence.srt 7.5 kB
【影视】 [ FreeCourseWeb.com ] Translating Cybersecurity for SMBs - Using the NIST Cybersecurity Framework 2.0
收录时间:2024-05-03 文档个数:43 文档大小:127.0 MB 最近下载:2024-10-05 人气:1083 磁力链接
  • mp4~Get Your Files Here !/05 - 4. Identify/01 - Understand what you have.mp4 10.7 MB
  • mp4~Get Your Files Here !/04 - 3. Govern/02 - Roll out your guidance.mp4 8.8 MB
  • mp4~Get Your Files Here !/11 - Conclusion/01 - Build cybersecurity into your business.mp4 8.5 MB
  • mp4~Get Your Files Here !/04 - 3. Govern/01 - Set your cyber strategy.mp4 8.1 MB
  • mp4~Get Your Files Here !/06 - 5. Protect/02 - Guard your network.mp4 7.0 MB
  • mp4~Get Your Files Here !/06 - 5. Protect/01 - Secure your system.mp4 7.0 MB
  • mp4~Get Your Files Here !/07 - 6. Detect/01 - Know when things are off.mp4 6.9 MB
  • mp4~Get Your Files Here !/08 - 7. Respond/01 - Address cyber incidents.mp4 6.7 MB
  • mp4~Get Your Files Here !/08 - 7. Respond/02 - Keep everyone in the loop.mp4 6.7 MB
  • mp4~Get Your Files Here !/09 - 8. Recover/01 - Get back to normal.mp4 6.6 MB
  • mp4~Get Your Files Here !/03 - 2. NIST Cybersecurity Framework 2.0/01 - Cybersecurity framework fundamentals.mp4 6.3 MB
  • mp4~Get Your Files Here !/10 - 9. Build Cyber Capabilities/01 - Determine your tier.mp4 6.2 MB
  • mp4~Get Your Files Here !/02 - 1. Cybersecurity in Your Business/02 - Understand your cyber risks.mp4 6.0 MB
  • mp4~Get Your Files Here !/03 - 2. NIST Cybersecurity Framework 2.0/02 - Leverage the cybersecurity framework.mp4 5.9 MB
  • mp4~Get Your Files Here !/10 - 9. Build Cyber Capabilities/02 - Define your profile.mp4 5.9 MB
  • mp4~Get Your Files Here !/02 - 1. Cybersecurity in Your Business/01 - Cornerstones of cybersecurity.mp4 5.4 MB
  • mp4~Get Your Files Here !/02 - 1. Cybersecurity in Your Business/03 - Prioritize your biggest risks.mp4 4.9 MB
  • mp4~Get Your Files Here !/10 - 9. Build Cyber Capabilities/03 - Create a plan.mp4 3.4 MB
  • mp4~Get Your Files Here !/01 - Introduction/02 - What you should know.mp4 3.0 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Leverage the NIST CSF to protect what matters most.mp4 2.7 MB
【其他】 Cybersecurity - Attack and Defense Strategies - Second Edition
收录时间:2020-01-25 文档个数:2 文档大小:141.0 MB 最近下载:2024-10-04 人气:3049 磁力链接
  • mobiCybersecurity - Attack and Defense Strategies - Second Edition.mobi 141.0 MB
  • urlVisit us on volno.org.url 108 Bytes
【影视】 Cybersecurity for Executives
收录时间:2020-01-31 文档个数:86 文档大小:300.7 MB 最近下载:2024-10-04 人气:6251 磁力链接
  • mp45.4. Stop Malicious Code/20.How to avoid malicious code.mp4 12.5 MB
  • mp49.8. Special Topics/41.Cybersecurity-related sales objectives.mp4 11.4 MB
  • mp46.5. Avoid Identity Theft/24.How to avoid identity theft.mp4 11.4 MB
  • mp43.2. How to Think about Cybersecurity/13.Where to get IT support.mp4 11.0 MB
  • mp43.2. How to Think about Cybersecurity/11.Not what you buy, how you travel.mp4 11.0 MB
  • mp49.8. Special Topics/35.Reasonable cybersecurity.mp4 10.5 MB
  • mp44.3. Avoid Phishing Attacks/15.What are phishing attacks.mp4 10.1 MB
  • mp42.1. Understand the Big Picture/06.Example - Organized crime.mp4 9.7 MB
  • mp47.6. Avoid Financial Cybertheft/27.What is financial cybertheft.mp4 9.6 MB
  • mp46.5. Avoid Identity Theft/23.What is identity theft.mp4 8.6 MB
  • mp47.6. Avoid Financial Cybertheft/28.How to avoid financial cybertheft.mp4 8.5 MB
  • mp45.4. Stop Malicious Code/19.What is malicious code.mp4 8.5 MB
  • mp46.5. Avoid Identity Theft/25.Organizational response to identity theft.mp4 8.5 MB
  • mp48.7. Avoid Cyberattacks on Long Trips/31.What are cyberattacks on long trips.mp4 8.5 MB
  • mp49.8. Special Topics/36.Cyber insurance.mp4 8.4 MB
  • mp44.3. Avoid Phishing Attacks/16.How to avoid phishing attacks.mp4 8.4 MB
  • mp42.1. Understand the Big Picture/05.Why are you a target.mp4 8.1 MB
  • mp43.2. How to Think about Cybersecurity/12.Germ theory.mp4 8.0 MB
  • mp49.8. Special Topics/40.Third-party cyber risk management.mp4 8.0 MB
  • mp47.6. Avoid Financial Cybertheft/29.Organizational response to financial cybertheft.mp4 7.8 MB
【文档书籍】 Tsukerman E. Machine Learning for Cybersecurity Cookbook 2019
收录时间:2020-02-02 文档个数:1 文档大小:52.6 MB 最近下载:2024-09-26 人气:1148 磁力链接
  • pdfTsukerman E. Machine Learning for Cybersecurity Cookbook 2019.pdf 52.6 MB
【影视】 [Lynda] Practical Cybersecurity-KTR
收录时间:2020-02-02 文档个数:44 文档大小:242.5 MB 最近下载:2024-10-04 人气:1669 磁力链接
  • mp48. Monitoring Network Activity/164982_08_03_XR15_packets.mp4 13.1 MB
  • mp47. Checking for Common Mistakes in Web Apps/164982_07_02_XR15_scan.mp4 11.9 MB
  • mp43. Personal Firewalls/164982_03_02_XR15_mswf.mp4 10.7 MB
  • mp43. Personal Firewalls/164982_03_06_XR15_iptables.mp4 9.8 MB
  • mp43. Personal Firewalls/164982_03_04_XR15_advrules.mp4 9.5 MB
  • mp47. Checking for Common Mistakes in Web Apps/164982_07_01_XR15_intro.mp4 9.4 MB
  • mp46. Checking Hosts for Known Vulnerabilities/164982_06_04_XR15_scan.mp4 8.6 MB
  • mp41. Why Cybersecurity/164982_01_03_XR15_attack.mp4 8.6 MB
  • mp41. Why Cybersecurity/164982_01_01_XR15_cyber.mp4 8.4 MB
  • mp48. Monitoring Network Activity/164982_08_05_XR151_intruder.mp4 8.3 MB
  • mp48. Monitoring Network Activity/164982_08_04_XR15_filters.mp4 8.2 MB
  • mp42. Antivirus/164982_02_06_XR15_schedule.mp4 8.2 MB
  • mp43. Personal Firewalls/164982_03_03_XR15_advfw.mp4 7.9 MB
  • mp40. Introduction/164982_00_01_WX30_welcome.mp4 6.9 MB
  • mp43. Personal Firewalls/164982_03_05_XR15_zedlan.mp4 6.7 MB
  • mp44. Knowing What Is on Your Network/164982_04_05_XR15_zenmap.mp4 6.3 MB
  • mp45. Network Communications and Detecting Intruders/164982_05_04_XR15_honeypot.mp4 6.0 MB
  • mp45. Network Communications and Detecting Intruders/164982_05_02_XR15_filexfer.mp4 5.8 MB
  • mp48. Monitoring Network Activity/164982_08_02_XR15_capture.mp4 5.6 MB
  • mp42. Antivirus/164982_02_05_XR15_avsettings.mp4 5.5 MB
【影视】 CYBERSECURITY COSE NELL'ALTRO MONDO - SPECIALE TG5.mkv
收录时间:2020-02-03 文档个数:1 文档大小:733.6 MB 最近下载:2024-09-20 人气:2398 磁力链接
  • mkvCYBERSECURITY COSE NELL'ALTRO MONDO - SPECIALE TG5.mkv 733.6 MB
【其他】 Cybersecurity - Attack and Defense Strategies, 2nd Edition
收录时间:2020-02-03 文档个数:8 文档大小:248.7 MB 最近下载:2024-10-02 人气:3825 磁力链接
  • mobiBook/Cybersecurity - Attack and Defense Strategies, 2nd Edition.mobi 141.0 MB
  • epubBook/Cybersecurity - Attack and Defense Strategies, 2nd Edition.epub 72.4 MB
  • pdfBook/Cybersecurity - Attack and Defense Strategies, 2nd Edition.pdf 35.3 MB
  • txt[TGx]Downloaded from torrentgalaxy.to.txt 585 Bytes
  • txtTorrent Downloaded from Glodls.to.txt 237 Bytes
  • txt[Bookflare.org] - Visit for more books.txt 71 Bytes
  • txtDownloaded from Demonoid - www.dnoid.to.txt 56 Bytes
  • txtBookflare.org.txt 52 Bytes
【文档书籍】 Cybersecurity presented by Wiley
收录时间:2020-02-03 文档个数:438 文档大小:1.5 GB 最近下载:2024-10-01 人气:3210 磁力链接
  • pdfpdf/applied_cryptography_protocols_algorithms_and_source_code_in_c.pdf 164.8 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/8/7/8-7.mov 131.8 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/16/8/16-8.mov 93.9 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/6/9/6-9.mov 71.4 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/17/10/17-10.mov 70.3 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/6/11/6-11.mov 64.0 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/8/1/8-1.mov 59.6 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/13/4/13-4.mov 55.4 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/15/6/prolaco.vmem.zip 45.3 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/16/7/laqma.vmem.zip 44.5 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/16/6/coreflood.vmem.zip 44.4 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/17/1/zeus.vmem.zip 43.5 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/16/6/silentbanker.vmem.zip 43.5 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/17/6/be2.vmem.zip 42.8 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/17/11/sality.vmem.zip 42.8 MB
  • zipMalware Analyst's Cookbook DVD/9780470613030/17/8/tigger.vmem.zip 42.1 MB
  • pdfpdf/ceh_v9_certified_ethical_hacker_study_guide.pdf 38.9 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/9/5/9-5.mov 30.5 MB
  • movMalware Analyst's Cookbook DVD/9780470613030/6/1/6-1.mov 30.3 MB
  • pdfpdf/unauthorised_access_physical_penetration_testing_for_it_security_teams.pdf 27.2 MB
【影视】 Pluralsight Cybersecurity Threats Ransomware
收录时间:2020-02-03 文档个数:38 文档大小:388.1 MB 最近下载:2024-10-04 人气:2330 磁力链接
  • mp45. Incident Response - Eradication and Recovery/29. NoMoreRansom.org.mp4 71.4 MB
  • mp42. What Is Ransomware/09. Demo of Real World Ransomware Attack.mp4 52.0 MB
  • mp45. Incident Response - Eradication and Recovery/30. Paying the Ransom.mp4 22.3 MB
  • mp42. What Is Ransomware/03. Definition and Types of Ransomware.mp4 20.3 MB
  • mp42. What Is Ransomware/04. The Ransomware Timeline.mp4 15.2 MB
  • mp45. Incident Response - Eradication and Recovery/27. Recovery Cloud Storage Files, Dropbox, and OneDrive.mp4 15.1 MB
  • mp42. What Is Ransomware/06. How Big Is the Problem.mp4 15.1 MB
  • mp42. What Is Ransomware/07. Ransomware Victims.mp4 11.7 MB
  • mp46. Countermeasures and Preparing Your Incident Response/33. Defending a Ransomware Attack.mp4 11.4 MB
  • mp46. Countermeasures and Preparing Your Incident Response/36. Lessons Learned and Your Incident Response Plan.mp4 10.9 MB
  • mp43. Ransomware Entry Points/14. Phishing and Email Attachments.mp4 10.6 MB
  • mp44. Incident Response - Detection and Containment/22. Containing the Attack.mp4 9.0 MB
  • mp46. Countermeasures and Preparing Your Incident Response/34. Protecting a Windows Network.mp4 8.0 MB
  • mp44. Incident Response - Detection and Containment/21. Detecting an Attack.mp4 7.3 MB
  • mp45. Incident Response - Eradication and Recovery/26. Recovery Local and Network Files.mp4 7.3 MB
  • mp43. Ransomware Entry Points/17. Command and Callback (C&C) and Indicators of Compromise.mp4 7.0 MB
  • mp45. Incident Response - Eradication and Recovery/28. Tools and Resources.mp4 6.7 MB
  • mp42. What Is Ransomware/10. Variations of Ransomware.mp4 6.4 MB
  • mp43. Ransomware Entry Points/15. Embedded Hyperlinks, Websites_downloads, and Drive-by Infections.mp4 6.2 MB
  • mp45. Incident Response - Eradication and Recovery/31. Summary.mp4 6.0 MB
【其他】 Cybersecurity - Attack and Defense Strategies - Second Edition.mobi
收录时间:2020-02-04 文档个数:1 文档大小:141.0 MB 最近下载:2024-10-04 人气:1324 磁力链接
  • mobiCybersecurity - Attack and Defense Strategies - Second Edition.mobi 141.0 MB
【音乐】 Cybersecurity Program Development for Business (Unabridged)
收录时间:2020-02-08 文档个数:17 文档大小:264.8 MB 最近下载:2024-10-05 人气:8571 磁力链接
  • mp3Cybersecurity Program Development for Business (Unabridged) - 08.mp3 26.7 MB
  • mp3Cybersecurity Program Development for Business (Unabridged) - 13.mp3 24.1 MB
  • mp3Cybersecurity Program Development for Business (Unabridged) - 14.mp3 23.7 MB
  • mp3Cybersecurity Program Development for Business (Unabridged) - 15.mp3 23.4 MB
  • mp3Cybersecurity Program Development for Business (Unabridged) - 06.mp3 21.8 MB
  • mp3Cybersecurity Program Development for Business (Unabridged) - 09.mp3 20.0 MB
  • mp3Cybersecurity Program Development for Business (Unabridged) - 07.mp3 19.9 MB
  • mp3Cybersecurity Program Development for Business (Unabridged) - 10.mp3 18.4 MB
  • mp3Cybersecurity Program Development for Business (Unabridged) - 16.mp3 17.9 MB
  • mp3Cybersecurity Program Development for Business (Unabridged) - 17.mp3 16.5 MB
  • mp3Cybersecurity Program Development for Business (Unabridged) - 11.mp3 14.7 MB
  • mp3Cybersecurity Program Development for Business (Unabridged) - 12.mp3 12.7 MB
  • mp3Cybersecurity Program Development for Business (Unabridged) - 04.mp3 9.9 MB
  • mp3Cybersecurity Program Development for Business (Unabridged) - 05.mp3 7.0 MB
  • mp3Cybersecurity Program Development for Business (Unabridged) - 01.mp3 3.4 MB
  • mp3Cybersecurity Program Development for Business (Unabridged) - 02.mp3 2.6 MB
  • mp3Cybersecurity Program Development for Business (Unabridged) - 03.mp3 2.2 MB
【文档书籍】 [FreeTutorials.Us] Cybersecurity The Beginner's Guide - Ebook [FTU]
收录时间:2020-02-08 文档个数:7 文档大小:30.5 MB 最近下载:2024-10-02 人气:4530 磁力链接
  • epubCybersecurity_The_Beginners_Guide_-_Erdal_Ozkaya.epub 30.5 MB
  • url0. Websites you may like/0. (1Hack.Us) Premium Tutorials-Guides-Articles & Community based Forum.url 377 Bytes
  • url0. Websites you may like/1. (FreeTutorials.Us) Download Udemy Paid Courses For Free.url 328 Bytes
  • url0. Websites you may like/2. (FreeCoursesOnline.Me) Download Udacity, Masterclass, Lynda, PHLearn, Pluralsight Free.url 286 Bytes
  • url0. Websites you may like/4. (FTUApps.com) Download Cracked Developers Applications For Free.url 239 Bytes
  • txt0. Websites you may like/How you can help Team-FTU.txt 229 Bytes
  • url0. Websites you may like/3. (NulledPremium.com) Download E-Learning, E-Books, Audio-Books, Comics, Articles and more... etc.url 163 Bytes
【影视】 Lynda - Cybersecurity Foundations
收录时间:2020-02-09 文档个数:28 文档大小:301.1 MB 最近下载:2024-10-04 人气:2847 磁力链接
  • mp403. Security Architecture/03_04 - Managing user access and identity.mp4 20.6 MB
  • mp403. Security Architecture/03_05 - Implementing preventative security.mp4 18.9 MB
  • mp403. Security Architecture/03_06 - Monitoring and alerts.mp4 15.7 MB
  • mp403. Security Architecture/03_01 - Describing security requirements.mp4 14.9 MB
  • mp401. Cybersecurity Foundations/01_06 - Dissecting the payment card industry and PCI DSS.mp4 14.7 MB
  • mp401. Cybersecurity Foundations/01_05 - Implementing control frameworks.mp4 14.6 MB
  • mp404. Incident Management/04_02 - Preparing for an incident.mp4 13.6 MB
  • mp402. Cybersecurity Threats/02_07 - Understanding advanced persistent threats (APTs).mp4 13.5 MB
  • mp403. Security Architecture/03_02 - Architecting security risk.mp4 13.4 MB
  • mp401. Cybersecurity Foundations/01_02 - Dissecting cyber risk.mp4 13.3 MB
  • mp401. Cybersecurity Foundations/01_01 - Understanding the NIST cybersecurity framework.mp4 12.8 MB
  • mp402. Cybersecurity Threats/02_02 - Dissecting security threats.mp4 11.7 MB
  • mp404. Incident Management/04_03 - Responding to an incident.mp4 11.7 MB
  • mp401. Cybersecurity Foundations/01_03 - Unpacking COBIT 5.mp4 10.5 MB
  • mp402. Cybersecurity Threats/02_03 - Exploring cybercrime as an industry.mp4 10.1 MB
  • mp402. Cybersecurity Threats/02_06 - Hiding malware with rootkits.mp4 9.8 MB
  • mp402. Cybersecurity Threats/02_05 - Using callbacks to capture keystrokes.mp4 9.7 MB
  • mp401. Cybersecurity Foundations/01_07 - Exploring the Cyber Essentials framework.mp4 9.4 MB
  • mp402. Cybersecurity Threats/02_04 - Hiding malware through cloaking and alternate data streams.mp4 9.0 MB
  • mp403. Security Architecture/03_03 - Selecting security controls.mp4 8.5 MB
【影视】 Pluralsight - Cybersecurity Threats: Ransomware
收录时间:2020-02-10 文档个数:37 文档大小:388.1 MB 最近下载:2024-10-04 人气:2591 磁力链接
  • mp45. Incident Response - Eradication and Recovery/29. NoMoreRansom.org.mp4 71.4 MB
  • mp42. What Is Ransomware/09. Demo of Real World Ransomware Attack.mp4 52.0 MB
  • mp45. Incident Response - Eradication and Recovery/30. Paying the Ransom.mp4 22.3 MB
  • mp42. What Is Ransomware/03. Definition and Types of Ransomware.mp4 20.3 MB
  • mp42. What Is Ransomware/04. The Ransomware Timeline.mp4 15.2 MB
  • mp45. Incident Response - Eradication and Recovery/27. Recovery Cloud Storage Files, Dropbox, and OneDrive.mp4 15.1 MB
  • mp42. What Is Ransomware/06. How Big Is the Problem.mp4 15.1 MB
  • mp42. What Is Ransomware/07. Ransomware Victims.mp4 11.7 MB
  • mp46. Countermeasures and Preparing Your Incident Response/33. Defending a Ransomware Attack.mp4 11.4 MB
  • mp46. Countermeasures and Preparing Your Incident Response/36. Lessons Learned and Your Incident Response Plan.mp4 10.9 MB
  • mp43. Ransomware Entry Points/14. Phishing and Email Attachments.mp4 10.6 MB
  • mp44. Incident Response - Detection and Containment/22. Containing the Attack.mp4 9.0 MB
  • mp46. Countermeasures and Preparing Your Incident Response/34. Protecting a Windows Network.mp4 8.0 MB
  • mp44. Incident Response - Detection and Containment/21. Detecting an Attack.mp4 7.3 MB
  • mp45. Incident Response - Eradication and Recovery/26. Recovery Local and Network Files.mp4 7.3 MB
  • mp43. Ransomware Entry Points/17. Command and Callback (C&C) and Indicators of Compromise.mp4 7.0 MB
  • mp45. Incident Response - Eradication and Recovery/28. Tools and Resources.mp4 6.7 MB
  • mp42. What Is Ransomware/10. Variations of Ransomware.mp4 6.4 MB
  • mp43. Ransomware Entry Points/15. Embedded Hyperlinks, Websites_downloads, and Drive-by Infections.mp4 6.2 MB
  • mp45. Incident Response - Eradication and Recovery/31. Summary.mp4 6.0 MB
【影视】 Cybersecurity {AM}
收录时间:2020-02-10 文档个数:39 文档大小:230.5 MB 最近下载:2024-10-03 人气:1140 磁力链接
  • mp40 Introduction/369625_00_03_XR15_Reference.mp4 10.2 MB
  • mp43 Architecting Security/369625_03_05_XR15_Cloud_Attribute_Taxonomy.mp4 10.1 MB
  • mp43 Architecting Security/369625_03_01_XR15_Introduction_to_SABSA.mp4 9.9 MB
  • mp42 Cloud Security Guidance/369625_02_16_SO30_XR30_Solution.mp4 9.9 MB
  • mp42 Cloud Security Guidance/369625_02_03_XR15_Information_Management.mp4 9.8 MB
  • mp41 Cloud Fundamentals/369625_01_01_XR15_Essential_Characteristics.mp4 9.6 MB
  • mp41 Cloud Fundamentals/369625_01_06_XR15_Cloud_Incidents.mp4 9.4 MB
  • mp42 Cloud Security Guidance/369625_02_02_XR15_Legal_Compliance_and_Audit.mp4 8.9 MB
  • mp41 Cloud Fundamentals/369625_01_09_XR15_Cloud_Trust.mp4 8.8 MB
  • mp42 Cloud Security Guidance/369625_02_07_XR15_Incident_Response.mp4 8.8 MB
  • mp42 Cloud Security Guidance/369625_02_11_XR15_Identity_in_the_Cloud.mp4 8.4 MB
  • mp42 Cloud Security Guidance/369625_02_08_XR15_Application_Security.mp4 8.3 MB
  • mp42 Cloud Security Guidance/369625_02_13_XR15_Virtualisation.mp4 8.2 MB
  • mp42 Cloud Security Guidance/369625_02_05_XR15_Traditional_Security_BCP_and_DR.mp4 8.2 MB
  • mp42 Cloud Security Guidance/369625_02_12_XR15_Cloud_Access_Control.mp4 7.9 MB
  • mp41 Cloud Fundamentals/369625_01_02_XR15_Infrastructure_as_a_Service.mp4 7.6 MB
  • mp43 Architecting Security/369625_03_02_XR15_Fast_Tracker.mp4 7.4 MB
  • mp41 Cloud Fundamentals/369625_01_05_XR151_Deployment_Models.mp4 6.7 MB
  • mp42 Cloud Security Guidance/369625_02_10_XR15_Encryption_and_Key_Management.mp4 6.6 MB
  • mp43 Architecting Security/369625_03_03_XR15_SABSA_Attributes.mp4 6.3 MB
【影视】 Lynda - Cybersecurity with Cloud Computing
收录时间:2020-02-11 文档个数:39 文档大小:371.6 MB 最近下载:2024-10-05 人气:5993 磁力链接
  • mp400. Introduction/00_01 - Welcome.mp4 17.4 MB
  • mp400. Introduction/00_03 - Reference sites.mp4 16.6 MB
  • mp401. Cloud Fundamentals/01_01 - Defining the essential characteristics of cloud.mp4 15.8 MB
  • mp402. Cloud Security Guidance/02_03 - Managing information and data security.mp4 15.6 MB
  • mp403. Architecting Security/03_05 - Introducing cloud attribute taxonomy.mp4 15.5 MB
  • mp403. Architecting Security/03_01 - Introducing SABSA.mp4 15.3 MB
  • mp401. Cloud Fundamentals/01_06 - Identifying cloud incidents.mp4 15.2 MB
  • mp401. Cloud Fundamentals/01_09 - Defining trust models for cloud.mp4 14.0 MB
  • mp402. Cloud Security Guidance/02_16 - Solution Cloud security knowledge.mp4 13.8 MB
  • mp402. Cloud Security Guidance/02_02 - Complying with legal and audit requrements.mp4 13.1 MB
  • mp402. Cloud Security Guidance/02_11 - Verifying identity in the cloud.mp4 13.1 MB
  • mp402. Cloud Security Guidance/02_07 - Managing incident response.mp4 12.9 MB
  • mp402. Cloud Security Guidance/02_13 - Implementing virtualization.mp4 12.9 MB
  • mp402. Cloud Security Guidance/02_12 - Controlling cloud access.mp4 12.5 MB
  • mp402. Cloud Security Guidance/02_08 - Maximizing application security.mp4 12.3 MB
  • mp403. Architecting Security/03_02 - Using Fast Tracker.mp4 12.0 MB
  • mp402. Cloud Security Guidance/02_05 - Comparing traditional IT, BCP, and DR.mp4 12.0 MB
  • mp401. Cloud Fundamentals/01_02 - Understanding infrastructure as a service.mp4 11.9 MB
  • mp401. Cloud Fundamentals/01_05 - Discovering deployment models.mp4 11.4 MB
  • mp402. Cloud Security Guidance/02_10 - Managing encryption and keys.mp4 10.8 MB
【影视】 Lynda - Foundations of Cybersecurity
收录时间:2020-02-14 文档个数:27 文档大小:300.9 MB 最近下载:2024-10-04 人气:1902 磁力链接
  • mp404. Security Architecture/04_04-Managing user access and identity.mp4 20.7 MB
  • mp404. Security Architecture/04_05-Implementing preventative security.mp4 18.8 MB
  • mp404. Security Architecture/04_06-Monitoring and alerts.mp4 15.7 MB
  • mp404. Security Architecture/04_01-Describing security requirements.mp4 14.9 MB
  • mp402. Cybersecurity Foundations/02_06-Dissecting the payment card industry and PCI DSS.mp4 14.6 MB
  • mp402. Cybersecurity Foundations/02_05-Implementing control frameworks.mp4 14.3 MB
  • mp405. Incident Management/05_02-Preparing for an incident.mp4 14.2 MB
  • mp404. Security Architecture/04_02-Architecting security risk.mp4 13.5 MB
  • mp403. Cybersecurity Threats/03_07-Understanding advanced persistent threats APTs.mp4 13.5 MB
  • mp402. Cybersecurity Foundations/02_02-Dissecting cyber risk.mp4 13.1 MB
  • mp402. Cybersecurity Foundations/02_01-Understanding the NIST cybersecurity framework.mp4 12.6 MB
  • mp403. Cybersecurity Threats/03_02-Dissecting security threats.mp4 11.6 MB
  • mp405. Incident Management/05_03-Responding to an incident.mp4 11.5 MB
  • mp402. Cybersecurity Foundations/02_03-Unpacking COBIT 5.mp4 10.3 MB
  • mp403. Cybersecurity Threats/03_03-Exploring cybercrime as an industry.mp4 9.9 MB
  • mp403. Cybersecurity Threats/03_05-Using callbacks to capture keystrokes.mp4 9.8 MB
  • mp403. Cybersecurity Threats/03_06-Hiding malware with rootkits.mp4 9.8 MB
  • mp402. Cybersecurity Foundations/02_07-Exploring the Cyber Essentials framework.mp4 9.3 MB
  • mp403. Cybersecurity Threats/03_04-Hiding malware through cloaking and alternate data streams.mp4 9.0 MB
  • mp404. Security Architecture/04_03-Selecting security controls.mp4 8.5 MB
共15页 上一页 1 2 3 4 5 下一页

友情链接