2048BT

为您索检到299条磁力链接,耗时0毫秒。

★注意★本站地址随时可能失效

找到本站最新地址的两种方法: 1、记住地址发布页2048bt.cc2048bt.cyoubt搜索.xyzbt搜索.cc 2、发送“地址”到2048bt@gmail.com
【影视】 [CourserHub.com] Coursera - Google Cybersecurity Professional Certificate
收录时间:2023-06-22 文档个数:1 文档大小:4.1 GB 最近下载:2024-10-05 人气:12155 磁力链接
  • com] Coursera - Google Cybersecurity Professional Certificate[CourserHub.com] Coursera - Google Cybersecurity Professional Certificate 4.1 GB
【影视】 Google Cybersecurity Professional Certificate
收录时间:2023-07-12 文档个数:1 文档大小:4.1 GB 最近下载:2024-10-04 人气:602 磁力链接
  • Google Cybersecurity Professional CertificateGoogle Cybersecurity Professional Certificate 4.1 GB
【影视】 Cybersecurity Prevention and Detection 2nd Edition (Video Collection)
收录时间:2024-06-02 文档个数:374 文档大小:3.8 GB 最近下载:2024-10-04 人气:1018 磁力链接
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/007. 1.6 Identity and access management.mp4 120.3 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/003. 1.2 Log ingestion Part 2.mp4 117.9 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/002. 1.1 Log ingestion Part 1.mp4 106.0 MB
  • mp403 Malware and Incident Response/Lesson 1 Threat Landscape/002. 1.1 Malware Threat Landscape.mp4 90.8 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/005. 1.4 Infrastructure concepts.mp4 89.3 MB
  • mp404 Secure Operations and Protections/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/004. 2.3 Technology and tool integration.mp4 87.2 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 2 Analyze Indicators of Potentially Malicious Activity/002. 2.1 Network-related.mp4 77.1 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/008. 1.7 Encryption.mp4 76.0 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/006. 3.5 Common techniques Part 3.mp4 63.7 MB
  • mp403 Malware and Incident Response/Lesson 5 PE File Identification/004. 5.3 Entry Points.mp4 62.4 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/004. 3.3 Common techniques Part 1.mp4 56.9 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/002. 1.1 Threat actors Part 1.mp4 53.5 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/004. 1.3 Operating system (OS) concepts.mp4 52.1 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/005. 3.4 Common techniques Part 2.mp4 51.1 MB
  • mp402 System and Privacy Data Protection/Lesson 4 Analyzing Logs and Impact Analysis/008. 4.7 Impact Analysis.mp4 51.0 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/007. 7.6 SOC and FPGA.mp4 50.5 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/006. 1.5 Network architecture.mp4 50.1 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/010. 7.9 Industrial Control Systems (ICS) and Process Automation.mp4 46.2 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/004. 7.3 Internet of Things (IoT) and Embedded Devices Part 2.mp4 45.3 MB
  • mp404 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/013. 4.12 Threat modeling.mp4 43.6 MB
【影视】 [ DevCourseWeb.com ] Udemy - ChatGPT, ML, and AI for Cybersecurity, SOCs and Business
收录时间:2023-11-17 文档个数:14 文档大小:3.7 GB 最近下载:2024-10-05 人气:6348 磁力链接
  • mp4~Get Your Files Here !/3. AI Tools for Security.mp4 683.8 MB
  • mp4~Get Your Files Here !/4. Enhancing Search Capabilities with GPT4all Plugins.mp4 576.0 MB
  • mp4~Get Your Files Here !/2. Fundamentals of ChatGPT and GPT4all.mp4 553.4 MB
  • mp4~Get Your Files Here !/1. Introduction to Machine Learning and AI for Security.mp4 520.6 MB
  • mp4~Get Your Files Here !/8. Future Trends and Challenges in AI Security.mp4 452.9 MB
  • mp4~Get Your Files Here !/6. Evaluating AI Security.mp4 379.7 MB
  • mp4~Get Your Files Here !/5. Securing AI Models and Data.mp4 280.8 MB
  • mp4~Get Your Files Here !/7. Case Studies of Real-World AI Applications.mp4 279.0 MB
  • txt~Get Your Files Here !/Bonus Resources.txt 386 Bytes
  • urlGet Bonus Downloads Here.url 182 Bytes
  • html~Get Your Files Here !/9. Final Exam.html 146 Bytes
  • html~Get Your Files Here !/4.2 Github Plugins (primarily for ChatGPT and Python implementations thereof)..html 124 Bytes
  • html~Get Your Files Here !/4.1 ChatGPT Plugins.html 100 Bytes
  • html~Get Your Files Here !/4.3 GPT4All Website and Downloads.html 90 Bytes
【压缩文件】 [ FreeCourseWeb.com ] Pluralsight CySA+ (CompTIA Cybersecurity Analyst) CS0-001.zip
收录时间:2020-05-14 文档个数:1 文档大小:3.7 GB 最近下载:2024-10-04 人气:12010 磁力链接
  • zip[ FreeCourseWeb.com ] Pluralsight CySA+ (CompTIA Cybersecurity Analyst) CS0-001.zip 3.7 GB
【影视】 [FreeCoursesOnline.Me] ZeroToMastery - Complete Cybersecurity Bootcamp
收录时间:2022-10-01 文档个数:101 文档大小:3.6 GB 最近下载:2024-10-05 人气:15656 磁力链接
  • mp48-Network Security/052-Network Security With Nmap.mp4 169.9 MB
  • mp45-Security Bugs & Vulnerabilities/020-Buffer Overflow Demonstration.mp4 136.7 MB
  • mp412-Appendix - Ethical Hacking/087-Msfconsole Basic Commands.mp4 97.5 MB
  • mp48-Network Security/059-Wireless Attack Demonstration.mp4 93.4 MB
  • mp47-End-Point Protection/034-Password Security and Password Managers.mp4 84.2 MB
  • mp412-Appendix - Ethical Hacking/093-Meterpreter Basic Commands Part 1.mp4 78.5 MB
  • mp47-End-Point Protection/038-Process Explorer.mp4 75.8 MB
  • mp41-Introduction/001-Cybersecurity Bootcamp - Zero to Mastery.mp4 72.4 MB
  • mp48-Network Security/057-Secure Network Architecture.mp4 66.8 MB
  • mp412-Appendix - Ethical Hacking/094-Meterpreter Basic Commands Part 2.mp4 65.7 MB
  • mp47-End-Point Protection/033-Bitdefender, Kaspersky, McAfee, Malwarebytes.mp4 63.9 MB
  • mp44-Understanding Hackers - The Biggest Threat/012-Most Common Attacks Demonstration.mp4 63.5 MB
  • mp48-Network Security/060-Network Monitoring With TCPDump.mp4 62.7 MB
  • mp48-Network Security/058-Wireless Security.mp4 59.6 MB
  • mp45-Security Bugs & Vulnerabilities/017-Unpatched Machine Exploitation Demonstration.mp4 59.1 MB
  • mp412-Appendix - Ethical Hacking/080-Whatweb Stealthy Scan.mp4 58.1 MB
  • mp412-Appendix - Ethical Hacking/091-Advance Msfvenom Usage.mp4 51.4 MB
  • mp47-End-Point Protection/043-Iptables.mp4 50.9 MB
  • mp47-End-Point Protection/028-Brave Browser Security and Privacy.mp4 50.6 MB
  • mp412-Appendix - Ethical Hacking/089-Software Vulnerability - Samba Exploitation.mp4 49.5 MB
【影视】 [GigaCourse.Com] ZeroToMastery - Complete Cybersecurity Bootcamp
收录时间:2022-09-29 文档个数:107 文档大小:3.6 GB 最近下载:2024-10-04 人气:5661 磁力链接
  • mp48-Network Security/052-Network Security With Nmap.mp4 169.9 MB
  • mp45-Security Bugs & Vulnerabilities/020-Buffer Overflow Demonstration.mp4 136.7 MB
  • mp412-Appendix - Ethical Hacking/087-Msfconsole Basic Commands.mp4 97.5 MB
  • mp48-Network Security/059-Wireless Attack Demonstration.mp4 93.4 MB
  • mp47-End-Point Protection/034-Password Security and Password Managers.mp4 84.2 MB
  • mp412-Appendix - Ethical Hacking/093-Meterpreter Basic Commands Part 1.mp4 78.5 MB
  • mp47-End-Point Protection/038-Process Explorer.mp4 75.8 MB
  • mp41-Introduction/001-Cybersecurity Bootcamp - Zero to Mastery.mp4 72.4 MB
  • mp48-Network Security/057-Secure Network Architecture.mp4 66.8 MB
  • mp412-Appendix - Ethical Hacking/094-Meterpreter Basic Commands Part 2.mp4 65.7 MB
  • mp47-End-Point Protection/033-Bitdefender, Kaspersky, McAfee, Malwarebytes.mp4 63.9 MB
  • mp44-Understanding Hackers - The Biggest Threat/012-Most Common Attacks Demonstration.mp4 63.5 MB
  • mp48-Network Security/060-Network Monitoring With TCPDump.mp4 62.7 MB
  • mp48-Network Security/058-Wireless Security.mp4 59.6 MB
  • mp45-Security Bugs & Vulnerabilities/017-Unpatched Machine Exploitation Demonstration.mp4 59.1 MB
  • mp412-Appendix - Ethical Hacking/080-Whatweb Stealthy Scan.mp4 58.1 MB
  • mp412-Appendix - Ethical Hacking/091-Advance Msfvenom Usage.mp4 51.4 MB
  • mp47-End-Point Protection/043-Iptables.mp4 50.9 MB
  • mp47-End-Point Protection/028-Brave Browser Security and Privacy.mp4 50.6 MB
  • mp412-Appendix - Ethical Hacking/089-Software Vulnerability - Samba Exploitation.mp4 49.5 MB
【影视】 ZeroToMastery - Complete Cybersecurity Bootcamp
收录时间:2022-10-28 文档个数:103 文档大小:3.6 GB 最近下载:2024-09-13 人气:313 磁力链接
  • mp48-Network Security/052-Network Security With Nmap.mp4 169.9 MB
  • mp45-Security Bugs & Vulnerabilities/020-Buffer Overflow Demonstration.mp4 136.7 MB
  • mp412-Appendix - Ethical Hacking/087-Msfconsole Basic Commands.mp4 97.5 MB
  • mp48-Network Security/059-Wireless Attack Demonstration.mp4 93.4 MB
  • mp47-End-Point Protection/034-Password Security and Password Managers.mp4 84.2 MB
  • mp412-Appendix - Ethical Hacking/093-Meterpreter Basic Commands Part 1.mp4 78.5 MB
  • mp47-End-Point Protection/038-Process Explorer.mp4 75.8 MB
  • mp41-Introduction/001-Cybersecurity Bootcamp - Zero to Mastery.mp4 72.4 MB
  • mp48-Network Security/057-Secure Network Architecture.mp4 66.8 MB
  • mp412-Appendix - Ethical Hacking/094-Meterpreter Basic Commands Part 2.mp4 65.7 MB
  • mp47-End-Point Protection/033-Bitdefender, Kaspersky, McAfee, Malwarebytes.mp4 63.9 MB
  • mp44-Understanding Hackers - The Biggest Threat/012-Most Common Attacks Demonstration.mp4 63.5 MB
  • mp48-Network Security/060-Network Monitoring With TCPDump.mp4 62.7 MB
  • mp48-Network Security/058-Wireless Security.mp4 59.6 MB
  • mp45-Security Bugs & Vulnerabilities/017-Unpatched Machine Exploitation Demonstration.mp4 59.1 MB
  • mp412-Appendix - Ethical Hacking/080-Whatweb Stealthy Scan.mp4 58.1 MB
  • mp412-Appendix - Ethical Hacking/091-Advance Msfvenom Usage.mp4 51.4 MB
  • mp47-End-Point Protection/043-Iptables.mp4 50.9 MB
  • mp47-End-Point Protection/028-Brave Browser Security and Privacy.mp4 50.6 MB
  • mp412-Appendix - Ethical Hacking/089-Software Vulnerability - Samba Exploitation.mp4 49.5 MB
【影视】 [CourseClub.Me] ZeroToMastery - Complete Cybersecurity Bootcamp
收录时间:2022-10-28 文档个数:98 文档大小:3.6 GB 最近下载:2024-10-05 人气:3322 磁力链接
  • mp48-Network Security/052-Network Security With Nmap.mp4 169.9 MB
  • mp45-Security Bugs & Vulnerabilities/020-Buffer Overflow Demonstration.mp4 136.7 MB
  • mp412-Appendix - Ethical Hacking/087-Msfconsole Basic Commands.mp4 97.5 MB
  • mp48-Network Security/059-Wireless Attack Demonstration.mp4 93.4 MB
  • mp47-End-Point Protection/034-Password Security and Password Managers.mp4 84.2 MB
  • mp412-Appendix - Ethical Hacking/093-Meterpreter Basic Commands Part 1.mp4 78.5 MB
  • mp47-End-Point Protection/038-Process Explorer.mp4 75.8 MB
  • mp41-Introduction/001-Cybersecurity Bootcamp - Zero to Mastery.mp4 72.4 MB
  • mp48-Network Security/057-Secure Network Architecture.mp4 66.8 MB
  • mp412-Appendix - Ethical Hacking/094-Meterpreter Basic Commands Part 2.mp4 65.7 MB
  • mp47-End-Point Protection/033-Bitdefender, Kaspersky, McAfee, Malwarebytes.mp4 63.9 MB
  • mp44-Understanding Hackers - The Biggest Threat/012-Most Common Attacks Demonstration.mp4 63.5 MB
  • mp48-Network Security/060-Network Monitoring With TCPDump.mp4 62.7 MB
  • mp48-Network Security/058-Wireless Security.mp4 59.6 MB
  • mp45-Security Bugs & Vulnerabilities/017-Unpatched Machine Exploitation Demonstration.mp4 59.1 MB
  • mp412-Appendix - Ethical Hacking/080-Whatweb Stealthy Scan.mp4 58.1 MB
  • mp412-Appendix - Ethical Hacking/091-Advance Msfvenom Usage.mp4 51.4 MB
  • mp47-End-Point Protection/043-Iptables.mp4 50.9 MB
  • mp47-End-Point Protection/028-Brave Browser Security and Privacy.mp4 50.6 MB
  • mp412-Appendix - Ethical Hacking/089-Software Vulnerability - Samba Exploitation.mp4 49.5 MB
【影视】 ZeroToMastery - Complete Cybersecurity Bootcamp
收录时间:2022-10-02 文档个数:97 文档大小:3.6 GB 最近下载:2024-10-04 人气:6507 磁力链接
  • mp48-Network Security/052-Network Security With Nmap.mp4 169.9 MB
  • mp45-Security Bugs & Vulnerabilities/020-Buffer Overflow Demonstration.mp4 136.7 MB
  • mp412-Appendix - Ethical Hacking/087-Msfconsole Basic Commands.mp4 97.5 MB
  • mp48-Network Security/059-Wireless Attack Demonstration.mp4 93.4 MB
  • mp47-End-Point Protection/034-Password Security and Password Managers.mp4 84.2 MB
  • mp412-Appendix - Ethical Hacking/093-Meterpreter Basic Commands Part 1.mp4 78.5 MB
  • mp47-End-Point Protection/038-Process Explorer.mp4 75.8 MB
  • mp41-Introduction/001-Cybersecurity Bootcamp - Zero to Mastery.mp4 72.4 MB
  • mp48-Network Security/057-Secure Network Architecture.mp4 66.8 MB
  • mp412-Appendix - Ethical Hacking/094-Meterpreter Basic Commands Part 2.mp4 65.7 MB
  • mp47-End-Point Protection/033-Bitdefender, Kaspersky, McAfee, Malwarebytes.mp4 63.9 MB
  • mp44-Understanding Hackers - The Biggest Threat/012-Most Common Attacks Demonstration.mp4 63.5 MB
  • mp48-Network Security/060-Network Monitoring With TCPDump.mp4 62.7 MB
  • mp48-Network Security/058-Wireless Security.mp4 59.6 MB
  • mp45-Security Bugs & Vulnerabilities/017-Unpatched Machine Exploitation Demonstration.mp4 59.1 MB
  • mp412-Appendix - Ethical Hacking/080-Whatweb Stealthy Scan.mp4 58.1 MB
  • mp412-Appendix - Ethical Hacking/091-Advance Msfvenom Usage.mp4 51.4 MB
  • mp47-End-Point Protection/043-Iptables.mp4 50.9 MB
  • mp47-End-Point Protection/028-Brave Browser Security and Privacy.mp4 50.6 MB
  • mp412-Appendix - Ethical Hacking/089-Software Vulnerability - Samba Exploitation.mp4 49.5 MB
【影视】 [FreeTutorials.Us] cybersecurity-ultimate-ethical-hacking-boot-camp
收录时间:2020-04-09 文档个数:53 文档大小:3.6 GB 最近下载:2024-10-05 人气:4517 磁力链接
  • mp404 Scanning Phase 2 of the Hacking Process/028 Demo Explore how to use NMap.mp4 399.8 MB
  • mp403 Recon Phase 1 of the Hacking Process/024 Interview Google Maps Scientology.mp4 381.5 MB
  • mp401 Introduction to the Ultimate Ethical Hacking Boot Camp/006 Interview Oracle Shodan CNN.mp4 278.0 MB
  • mp409 Social Engineering/043 Demo Social Engineers Toolkit.mp4 179.2 MB
  • mp405 Enumeration Phase 3 of the Hacking Process/029 Enumeration.mp4 158.0 MB
  • mp401 Introduction to the Ultimate Ethical Hacking Boot Camp/002 What is Ethical Hacking.mp4 149.9 MB
  • mp402 Hacking Lab Setup - Windows Mac Instructions/009 Installing Windows XP.mp4 133.1 MB
  • mp409 Social Engineering/042 Demo Maltego.mp4 129.6 MB
  • mp409 Social Engineering/041 Phishing Spear Phishing.mp4 114.6 MB
  • mp403 Recon Phase 1 of the Hacking Process/019 Know the Process Methodology of Footprinting.mp4 97.0 MB
  • mp402 Hacking Lab Setup - Windows Mac Instructions/015 MAC USERS-----OSX-Virtual Box - Setup Kali Linux VM Installation.mp4 90.8 MB
  • mp403 Recon Phase 1 of the Hacking Process/021 Demo Explore Google Hacking.mp4 90.4 MB
  • mp403 Recon Phase 1 of the Hacking Process/018 Introduction to Recon Footprinting.mp4 78.4 MB
  • mp408 Password Cracking/037 Windows Password Cracking.mp4 76.4 MB
  • mp404 Scanning Phase 2 of the Hacking Process/026 Types of Scans.mp4 75.5 MB
  • mp403 Recon Phase 1 of the Hacking Process/022 Recon via Social Networking.mp4 73.1 MB
  • mp401 Introduction to the Ultimate Ethical Hacking Boot Camp/001 Welcome to the Ultimate Ethical Hacking Boot Camp.mp4 71.7 MB
  • mp408 Password Cracking/038 Demo Cracking Passwords.mp4 71.6 MB
  • mp403 Recon Phase 1 of the Hacking Process/020 Google Hacking Secrets.mp4 67.4 MB
  • mp407 Hacking Wireless Networks/034 Demo Hacking WEP.mp4 65.6 MB
【影视】 Demystifying Cybersecurity Fundamentals-Learning with Demos
收录时间:2023-09-21 文档个数:208 文档大小:3.6 GB 最近下载:2024-10-04 人气:9564 磁力链接
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/1. Introduction/1. Top 10 Cyber Attacks of 21st Century.mp4 106.2 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/5. Deep Dive into Various Algorithms/9. What is Deffie-Hellman Algorithm .mp4 100.7 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/5. Deep Dive into Various Algorithms/7. Understanding RSA Algorithm with Example.mp4 94.6 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/7. Networking Basics/15. How a Packet Travels from Source to Destination.mp4 88.0 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/5. Deep Dive into Various Algorithms/6. What is the RSA Algorithm .mp4 82.1 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/6. Public Key Infrastructure - PKI/2. What is PKI .mp4 76.1 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/7. Networking Basics/9. Understanding an IP address.mp4 69.7 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/3. Types of Hackers/5. Hacktivist.mp4 67.5 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/3. Types of Hackers/6. Script Kiddie.mp4 66.2 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/2. Types of Cyber Attacks/6. Demo A Dictionary Attack - Password Attack.mp4 62.2 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/5. Deep Dive into Various Algorithms/10. Understanding DH Algorithm with an Example.mp4 59.6 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/5. Deep Dive into Various Algorithms/2. What is Cipher Algorithm & Key.mp4 59.3 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/2. Types of Cyber Attacks/8. Demo MITM Attack using ARP Poisoning.mp4 54.4 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/1. Introduction/4. What is Cybersecurity .mp4 54.3 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/5. Deep Dive into Various Algorithms/12. What is Elliptic Curve Algorithm .mp4 53.6 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/4. Basics of Cryptography/11. DemoAsymmetric encryption using openssl.mp4 53.1 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/5. Deep Dive into Various Algorithms/8. What is DSA Algorithm .mp4 51.7 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/4. Basics of Cryptography/8. What is Asymmetric Encryption.mp4 50.9 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/3. Types of Hackers/3. Black Hat Hacker.mp4 50.7 MB
  • mp4[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/2. Types of Cyber Attacks/4. Demo How attackers use Phishing Attack .mp4 50.5 MB
【影视】 [ DevCourseWeb.com ] Udemy - Mastering Cybersecurity and Supply Chain Risk Management
收录时间:2023-10-20 文档个数:41 文档大小:3.6 GB 最近下载:2024-10-04 人气:4110 磁力链接
  • mp4~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/7. Recover.mp4 205.3 MB
  • mp4~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/4. Network Security Controls.mp4 173.8 MB
  • mp4~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/5. Incident Analysis.mp4 150.0 MB
  • mp4~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/1. User and Network Infrastructure.mp4 136.2 MB
  • mp4~Get Your Files Here !/1. Introduction to NIST Framework/3. NIST Framework Core.mp4 130.0 MB
  • mp4~Get Your Files Here !/5. Effective Supply Chain Risk Management/4. Develop, Assess and Test Supply Chain Risks.mp4 123.4 MB
  • mp4~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/3. Executable Response Plan.mp4 116.0 MB
  • mp4~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/9. Information Protection.mp4 115.2 MB
  • mp4~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/8. Hardware Integrity.mp4 105.7 MB
  • mp4~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/1. Developing a Continuity of Operations Plan.mp4 103.2 MB
  • mp4~Get Your Files Here !/2. Cybersecurity Risk Planning & Management/4. Keeping Hardware Inventory Updated.mp4 102.7 MB
  • mp4~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/2. Incident Response.mp4 102.1 MB
  • mp4~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/7. Data Security.mp4 101.4 MB
  • mp4~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/6. Mitigation.mp4 101.0 MB
  • mp4~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/2. Authentication and Access Control.mp4 100.3 MB
  • mp4~Get Your Files Here !/2. Cybersecurity Risk Planning & Management/7. Personnel Security Requirements.mp4 98.1 MB
  • mp4~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/10. Patch Management.mp4 97.7 MB
  • mp4~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/5. Association and Authentication.mp4 91.7 MB
  • mp4~Get Your Files Here !/5. Effective Supply Chain Risk Management/1. Supply Chain Risk Management.mp4 90.7 MB
  • mp4~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/12. Protective Technology.mp4 88.5 MB
【影视】 [ DevCourseWeb.com ] Udemy - Ultimate Cybersecurity - Uncovering Hacker Strategies
收录时间:2023-07-09 文档个数:64 文档大小:3.4 GB 最近下载:2024-10-01 人气:9786 磁力链接
  • mp4~Get Your Files Here !/8 - Conclusion/56 - 82 Staying Informed and UptoDate.mp4 99.4 MB
  • mp4~Get Your Files Here !/8 - Conclusion/57 - 83 Next Steps for Advancing Your Cybersecurity Knowledge.mp4 91.7 MB
  • mp4~Get Your Files Here !/6 - Cybersecurity Laws Regulations and Compliance/40 - Cybersecurity Laws Regulations and Compliance Video.mp4 84.9 MB
  • mp4~Get Your Files Here !/4 - Cybersecurity Best Practices/33 - 452 Intrusion Detection and Prevention Systems IDPS.mp4 82.9 MB
  • mp4~Get Your Files Here !/6 - Cybersecurity Laws Regulations and Compliance/42 - 62 Compliance with Industry Standards.mp4 82.9 MB
  • mp4~Get Your Files Here !/7 - Cybersecurity Tools and Resources/52 - 73 Monitoring and Logging Tools.mp4 81.4 MB
  • mp4~Get Your Files Here !/4 - Cybersecurity Best Practices/34 - 453 Virtual Private Networks VPNs.mp4 80.2 MB
  • mp4~Get Your Files Here !/5 - Incident Response and Recovery/37 - 52 Identifying and Analyzing Security Incidents.mp4 80.2 MB
  • mp4~Get Your Files Here !/4 - Cybersecurity Best Practices/32 - 451 Firewalls.mp4 80.1 MB
  • mp4~Get Your Files Here !/5 - Incident Response and Recovery/35 - Incident Response and Recovery Video.mp4 79.6 MB
  • mp4~Get Your Files Here !/6 - Cybersecurity Laws Regulations and Compliance/46 - 63 Cybersecurity Frameworks.mp4 79.3 MB
  • mp4~Get Your Files Here !/7 - Cybersecurity Tools and Resources/50 - 71 Security Assessment and Testing Tools.mp4 79.1 MB
  • mp4~Get Your Files Here !/7 - Cybersecurity Tools and Resources/49 - Cybersecurity Tools and Resources Video.mp4 79.1 MB
  • mp4~Get Your Files Here !/7 - Cybersecurity Tools and Resources/51 - 72 OpenSource Security Tools.mp4 78.3 MB
  • mp4~Get Your Files Here !/8 - Conclusion/55 - 81 Course Summary.mp4 78.1 MB
  • mp4~Get Your Files Here !/4 - Cybersecurity Best Practices/31 - 45 Network Security Measures.mp4 77.8 MB
  • mp4~Get Your Files Here !/6 - Cybersecurity Laws Regulations and Compliance/41 - 61 Understanding Data Privacy Laws.mp4 77.5 MB
  • mp4~Get Your Files Here !/4 - Cybersecurity Best Practices/30 - 44 Data Encryption and Secure Communication.mp4 77.1 MB
  • mp4~Get Your Files Here !/8 - Conclusion/54 - Conclusion Video.mp4 77.0 MB
  • mp4~Get Your Files Here !/4 - Cybersecurity Best Practices/29 - 43 MultiFactor Authentication MFA.mp4 71.9 MB
【影视】 [ DevCourseWeb.com ] Udemy - Master ICS - OT Cybersecurity - Fundamental to Advanced-Part 2
收录时间:2023-06-09 文档个数:44 文档大小:3.2 GB 最近下载:2024-10-04 人气:4052 磁力链接
  • mp4~Get Your Files Here !/01 - Introduction/002 Filesystem.mp4 154.3 MB
  • mp4~Get Your Files Here !/03 - Network Architecture Design Considerations/005 Reference Architecture-2.mp4 127.4 MB
  • mp4~Get Your Files Here !/04 - OT Cybersecurity Management/003 Manufacturing Impact Levels.mp4 124.9 MB
  • mp4~Get Your Files Here !/02 - Cryptography -Lab/011 Cyberland Usecase-OpenSSL.mp4 123.1 MB
  • mp4~Get Your Files Here !/02 - Cryptography -Lab/004 Hashing.mp4 120.2 MB
  • mp4~Get Your Files Here !/02 - Cryptography -Lab/002 Symmetric.mp4 112.3 MB
  • mp4~Get Your Files Here !/03 - Network Architecture Design Considerations/004 Reference Architecture-1.mp4 110.3 MB
  • mp4~Get Your Files Here !/06 - Contingency & Continuity Planning/005 Disaster Recovery Plan.mp4 106.3 MB
  • mp4~Get Your Files Here !/04 - OT Cybersecurity Management/002 Industry Profiling.mp4 103.1 MB
  • mp4~Get Your Files Here !/01 - Introduction/001 Linux.mp4 100.8 MB
  • mp4~Get Your Files Here !/02 - Cryptography -Lab/010 Binwalk Firmware Analysis.mp4 99.1 MB
  • mp4~Get Your Files Here !/02 - Cryptography -Lab/006 Cyberchef-1-Basic.mp4 98.9 MB
  • mp4~Get Your Files Here !/06 - Contingency & Continuity Planning/001 Types of Plan.mp4 94.8 MB
  • mp4~Get Your Files Here !/04 - OT Cybersecurity Management/004 Cybersecurity Framework.mp4 94.8 MB
  • mp4~Get Your Files Here !/02 - Cryptography -Lab/001 Cryptography.mp4 92.1 MB
  • mp4~Get Your Files Here !/03 - Network Architecture Design Considerations/006 Reference Architecture-3.mp4 89.4 MB
  • mp4~Get Your Files Here !/01 - Introduction/003 Filesystem Lab.mp4 86.1 MB
  • mp4~Get Your Files Here !/01 - Introduction/007 Linux File Ownership Lab-4.mp4 84.3 MB
  • mp4~Get Your Files Here !/03 - Network Architecture Design Considerations/001 Functional Difference.mp4 82.0 MB
  • mp4~Get Your Files Here !/04 - OT Cybersecurity Management/001 NIST Cybersecurity Program.mp4 81.7 MB
【影视】 [ DevCourseWeb.com ] Udemy - The Cybersecurity Consultant Mindset
收录时间:2023-08-21 文档个数:32 文档大小:3.1 GB 最近下载:2024-10-03 人气:4929 磁力链接
  • mp4~Get Your Files Here !/3. Risk Management and Assessment/2. Introduction to Risk Management.mp4 222.8 MB
  • mp4~Get Your Files Here !/2. Introduction to Cybersecurity Consulting/3. Understanding the Role of a Cyber Consultant.mp4 212.8 MB
  • mp4~Get Your Files Here !/7. Developing Soft Skills for Your Career/2. Communication and Interpersonal Skills.mp4 211.5 MB
  • mp4~Get Your Files Here !/3. Risk Management and Assessment/3. Compliance Requirements.mp4 204.7 MB
  • mp4~Get Your Files Here !/2. Introduction to Cybersecurity Consulting/2. Overview of Cybersecurity.mp4 198.8 MB
  • mp4~Get Your Files Here !/2. Introduction to Cybersecurity Consulting/5. Preparing for a Career in Cyber Consulting.mp4 196.6 MB
  • mp4~Get Your Files Here !/3. Risk Management and Assessment/5. Security Documentation Development.mp4 178.0 MB
  • mp4~Get Your Files Here !/4. Tools and Technologies/3. Vulnerability Assessment and Pentesting.mp4 177.6 MB
  • mp4~Get Your Files Here !/3. Risk Management and Assessment/4. Risk Assessment and Analysis.mp4 158.0 MB
  • mp4~Get Your Files Here !/4. Tools and Technologies/6. Cybersecurity Frameworks Selection.mp4 146.1 MB
  • mp4~Get Your Files Here !/5. Incident Response/3. Developing an Incident Response Plan.mp4 123.8 MB
  • mp4~Get Your Files Here !/4. Tools and Technologies/2. Network Scanning and Monitoring.mp4 115.2 MB
  • mp4~Get Your Files Here !/2. Introduction to Cybersecurity Consulting/4. Benefits of Cyber Consulting and Cons.mp4 102.7 MB
  • mp4~Get Your Files Here !/4. Tools and Technologies/5. Security Information and Event Management Systems.mp4 99.4 MB
  • mp4~Get Your Files Here !/6. Cybersecurity Auditing and Frameworks/4. Cybersecurity Frameworks - Implementation.mp4 81.3 MB
  • mp4~Get Your Files Here !/4. Tools and Technologies/4. Intrusion Detection and Prevention Systems.mp4 73.6 MB
  • mp4~Get Your Files Here !/6. Cybersecurity Auditing and Frameworks/3. Auditing Standards and Requirements.mp4 73.1 MB
  • mp4~Get Your Files Here !/6. Cybersecurity Auditing and Frameworks/2. Overview of IT Auditing.mp4 72.9 MB
  • mp4~Get Your Files Here !/7. Developing Soft Skills for Your Career/5. Practical Exercises and Resources.mp4 68.0 MB
  • mp4~Get Your Files Here !/5. Incident Response/2. Defining a Security Incident.mp4 67.7 MB
【压缩文件】 [ CourseMega.com ] Udemy - Cybersecurity - Attack & Defense Strategies (Red & Blue Team).zip
收录时间:2021-08-01 文档个数:1 文档大小:3.0 GB 最近下载:2024-10-04 人气:13095 磁力链接
  • zip[ CourseMega.com ] Udemy - Cybersecurity - Attack & Defense Strategies (Red & Blue Team).zip 3.0 GB
【影视】 Aerospace Cybersecurity - Satellite Hacking (W53)
收录时间:2024-01-06 文档个数:28 文档大小:2.9 GB 最近下载:2024-07-14 人气:153 磁力链接
  • mp4Module 1 - Satellite Reconnaissance/7. (W53M01) Python Programs for Satellite Reconnaissance.mp4 303.7 MB
  • mp4Module 1 - Satellite Reconnaissance/6. (W53M01) OSINT Tools for Satellite Data Extraction.mp4 253.1 MB
  • mp4Module 1 - Satellite Reconnaissance/4. (W53M01) Satellite Subsystems and Attack Surfaces.mp4 206.3 MB
  • mp4Module 3 - Reverse Engineering and Decoding Communication/4. (W53M03) Decoding Satellite Communications Using SatNogs and Reverse Engineering.mp4 176.2 MB
  • mp4Module 4 - Vulnerabilities and Attacks/4. (W53M04) Dive Further Into Attacks and More CTF Practice.mp4 174.4 MB
  • mp4Module 3 - Reverse Engineering and Decoding Communication/1. (W53M03) Overview of Satellite Communications.mp4 168.9 MB
  • mp4Module 1 - Satellite Reconnaissance/2. (W53M01) Satellites and Ground Stations.mp4 168.2 MB
  • mp4Module 2 - Communication Analysis and Eavesdropping/3. (W53M02) Command & Data Handling & Payloads.mp4 162.6 MB
  • mp4Module 1 - Satellite Reconnaissance/5. (W53M01) Spherical Grid System.mp4 161.0 MB
  • mp4Module 3 - Reverse Engineering and Decoding Communication/3. (W53M03) Decoding Communications Using Wireshark and GNU Radio.mp4 148.0 MB
  • mp4Module 4 - Vulnerabilities and Attacks/1. (W53M04) Common Attacks and Interactive Labs.mp4 137.0 MB
  • mp4Module 2 - Communication Analysis and Eavesdropping/1. (W53M02) Communication Foundations.mp4 135.6 MB
  • mp4Module 3 - Reverse Engineering and Decoding Communication/2. (W53M03) Analyzing Satellite Communication Using gpredict, SatDump, & WXtolMG.mp4 135.3 MB
  • mp4Module 4 - Vulnerabilities and Attacks/3. (W53M04) Detecting Attacks and Mitigation Strategies.mp4 128.6 MB
  • mp4Module 2 - Communication Analysis and Eavesdropping/2. (W53M02) Link Design & Protocols.mp4 113.8 MB
  • mp4Module 2 - Communication Analysis and Eavesdropping/4. (W53M02) Satellite Networks & Vulnerabilities.mp4 89.2 MB
  • mp4Module 4 - Vulnerabilities and Attacks/2. (W53M04) Future of Satellite Security and Next Steps.mp4 85.1 MB
  • mp4Module 1 - Satellite Reconnaissance/1. (W53M01) Introduction.mp4 79.1 MB
  • mp4Module 1 - Satellite Reconnaissance/3. (W53M01) Information Extraction Methods.mp4 78.3 MB
  • vttModule 1 - Satellite Reconnaissance/4. (W53M01) Satellite Subsystems and Attack Surfaces.vtt 45.2 kB
【影视】 Formação Cybersecurity Specialist
收录时间:2023-03-14 文档个数:93 文档大小:2.8 GB 最近下载:2024-10-01 人气:457 磁力链接
  • mp403. Pentest e busca de vulnerabilidades/02. OSINT/06. Maltego.mp4 99.0 MB
  • mp404. Exploração e Pós-Exploração/03. Man in the middle/03. Capturando dados da rede.mp4 94.9 MB
  • mp404. Exploração e Pós-Exploração/02. Pós Exploração/02. Escalonamento de privilégios no Windows.mp4 84.5 MB
  • mp402. Fundamentos de cibersegurança/04. Deep Web e Anonimização/02. Dark Web ou Deep Web, o que é-.mp4 84.2 MB
  • mp403. Pentest e busca de vulnerabilidades/04. Varreduras de Rede/03. Encontrando dispositivos com o NMap.mp4 80.1 MB
  • mp402. Fundamentos de cibersegurança/01. Iniciando no Mundo da Cibersegurança/02. Cibersegurança, o que é-.mp4 69.1 MB
  • mp404. Exploração e Pós-Exploração/02. Pós Exploração/05. Persistência de sessão no Metasploit.mp4 66.5 MB
  • mp404. Exploração e Pós-Exploração/02. Pós Exploração/04. Módulos de pós exploração.mp4 66.0 MB
  • mp404. Exploração e Pós-Exploração/01. Exploração/05. Adicionando backdoor em um executável.mp4 64.3 MB
  • mp402. Fundamentos de cibersegurança/04. Deep Web e Anonimização/03. Navegando na Deep Web com Tor Browser.mp4 62.9 MB
  • mp402. Fundamentos de cibersegurança/04. Deep Web e Anonimização/04. Instalando o T A I L S Linux no Virtual Box.mp4 62.9 MB
  • mp404. Exploração e Pós-Exploração/04. Criando um Ransomware com Python/01. Desafio de Projeto Criando um Ransomware em Python.mp4 61.2 MB
  • mp402. Fundamentos de cibersegurança/03. Fundamentos de Redes de Computadores/02. Conceitos de redes de computadores.mp4 58.1 MB
  • mp402. Fundamentos de cibersegurança/01. Iniciando no Mundo da Cibersegurança/04. Principais tipos de ameaças.mp4 56.8 MB
  • mp403. Pentest e busca de vulnerabilidades/02. OSINT/05. Shodan.mp4 56.5 MB
  • mp402. Fundamentos de cibersegurança/02. Trabalhando com Sistemas Operacionais/02. Conceitos base sobre sistemas operacionais.mp4 56.1 MB
  • mp403. Pentest e busca de vulnerabilidades/01. Fundamentos de Pentest/02. O que é Pentest-.mp4 54.5 MB
  • mp403. Pentest e busca de vulnerabilidades/05. Enumeração/04. Utilizando Scripts no NMap NSE.mp4 53.5 MB
  • mp403. Pentest e busca de vulnerabilidades/06. Criando um Phishing no Kali Linux/02. Resolução.mp4 52.4 MB
  • mp404. Exploração e Pós-Exploração/02. Pós Exploração/03. Extração de dados com Metasploit.mp4 52.2 MB
【影视】 Cybersecurity Monitoring & Detection Lab
收录时间:2023-07-18 文档个数:71 文档大小:2.7 GB 最近下载:2024-10-04 人气:13460 磁力链接
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/28. Attacks and Monitor in Splunk.mp4 216.4 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/26. Attacks & Security Onion Monitoring.mp4 213.9 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/27. Introduction to Splunk.mp4 147.7 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/25. Introduction to Security Onion.mp4 134.2 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/9. Install Security Onion.mp4 127.0 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/1. Introduction to Cybersecurity/2. Cyber Security Monitoring & Detection.mp4 108.8 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/8. Install Ubuntu Server.mp4 108.1 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/1. Introduction to Cybersecurity/1. Introduction Cyber Security.mp4 108.0 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/5. PfSense Firewall Wizard, Naming & Rules.mp4 98.8 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/30. Configure WAZUH Agent on Windows.mp4 85.7 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/4. PfSense Firewall Initial Configuration.mp4 84.5 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/29. Install WAZUH Manager.mp4 76.9 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/12. Install Windows Server 2019 Advanced Method.mp4 73.6 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/2. Install Windows 11.mp4 72.7 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/21. Setting IP Address on Ubuntu Server.mp4 70.4 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/18. Install Splunk on Linux Ubuntu Server.mp4 68.9 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/19. Install Splunk on Linux CentOS.mp4 67.3 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/1. Introduction to Cybersecurity/3. Cyber Security Monitoring & Detection Lab.mp4 66.9 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/13. Configure Active Directory AD.mp4 65.8 MB
  • mp4[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/11. Install Windows Server 2019 Typical Method.mp4 64.3 MB
共15页 上一页 1 2 3 4 5 6 7 下一页

友情链接