2048BT

为您索检到299条磁力链接,耗时0毫秒。

★注意★本站地址随时可能失效

找到本站最新地址的两种方法: 1、记住地址发布页2048bt.cc2048bt.cyoubt搜索.xyzbt搜索.cc 2、发送“地址”到2048bt@gmail.com
【音乐】 TTC - Thinking about Cybersecurity
收录时间:2020-03-27 文档个数:19 文档大小:422.8 MB 最近下载:2024-09-28 人气:3268 磁力链接
  • mp3TGC_9523_Lect10_Cybersecurity.mp3 24.9 MB
  • mp3TGC_9523_Lect14_Cybersecurity.mp3 24.7 MB
  • mp3TGC_9523_Lect18_Cybersecurity.mp3 24.6 MB
  • mp3TGC_9523_Lect08_Cybersecurity.mp3 23.8 MB
  • mp3TGC_9523_Lect05_Cybersecurity.mp3 23.8 MB
  • mp3TGC_9523_Lect13_Cybersecurity.mp3 23.6 MB
  • mp3TGC_9523_Lect11_Cybersecurity.mp3 23.5 MB
  • mp3TGC_9523_Lect17_Cybersecurity.mp3 23.4 MB
  • mp3TGC_9523_Lect01_Cybersecurity.mp3 23.4 MB
  • mp3TGC_9523_Lect04_Cybersecurity.mp3 23.2 MB
  • mp3TGC_9523_Lect09_Cybersecurity.mp3 22.9 MB
  • mp3TGC_9523_Lect12_Cybersecurity.mp3 22.7 MB
  • mp3TGC_9523_Lect15_Cybersecurity.mp3 22.7 MB
  • mp3TGC_9523_Lect16_Cybersecurity.mp3 22.6 MB
  • mp3TGC_9523_Lect06_Cybersecurity.mp3 22.5 MB
  • mp3TGC_9523_Lect07_Cybersecurity.mp3 22.4 MB
  • mp3TGC_9523_Lect02_Cybersecurity.mp3 21.9 MB
  • mp3TGC_9523_Lect03_Cybersecurity.mp3 21.5 MB
  • pdfCourse Guidebook.pdf 4.7 MB
【影视】 Cybersecurity Careers and Certifications
收录时间:2023-02-10 文档个数:150 文档大小:414.1 MB 最近下载:2024-10-05 人气:5277 磁力链接
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 05 - 4. Cybersecurity Careers/17 - Cybersecurity careers overview.mp4.mp4 51.0 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 06 - 5. Cybersecurity Certifications/27 - Cybersecurity certifications overview.mp4.mp4 23.7 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 01 - Introduction/01 - Cybersecurity careers and certifications.mp4.mp4 21.7 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 02 - 1. Understanding the Cybersecurity Career Field/05 - An overview of cybersecurity key concepts.mp4.mp4 15.4 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 02 - 1. Understanding the Cybersecurity Career Field/04 - A brief history of cybersecurity.mp4.mp4 9.8 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 02 - 1. Understanding the Cybersecurity Career Field/06 - Enabling technologies for cybersecurity.mp4.mp4 8.8 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 07 - 6. Your Cybersecurity Career Path/39 - How to get cybersecurity experience.mp4.mp4 8.7 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 07 - 6. Your Cybersecurity Career Path/38 - Prerequisites.mp4.mp4 8.5 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 05 - 4. Cybersecurity Careers/19 - Cybersecurity career: Analyst.mp4.mp4 8.5 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 06 - 5. Cybersecurity Certifications/37 - Choose a cybersecurity certification.mp4.mp4 8.3 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 08 - 7. Cybersecurity Career Advice/44 - Begin with the end in mind.mp4.mp4 8.2 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 04 - 3. Cybersecurity Success Traits/14 - Analytical and technology savvy.mp4.mp4 8.1 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 05 - 4. Cybersecurity Careers/26 - Cybersecurity career: Director.mp4.mp4 8.0 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 07 - 6. Your Cybersecurity Career Path/40 - Getting started: Get certified.mp4.mp4 7.9 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 05 - 4. Cybersecurity Careers/22 - Cybersecurity career: Engineer.mp4.mp4 7.8 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 01 - Introduction/03 - Why start a career in cybersecurity?.mp4.mp4 7.8 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 03 - 2. Cybersecurity Marketplace/13 - Retail (PCI DSS).mp4.mp4 7.7 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 02 - 1. Understanding the Cybersecurity Career Field/08 - Cybersecurity career resources.mp4.mp4 7.5 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 03 - 2. Cybersecurity Marketplace/11 - Healthcare (HIPAA).mp4.mp4 7.5 MB
  • mp4[TutsNode.net] - Cybersecurity Careers and Certifications/ 05 - 4. Cybersecurity Careers/20 - Cybersecurity career: Auditor.mp4.mp4 7.4 MB
【影视】 [ CourseWikia.com ] Linkedin - Cybersecurity Careers and Certifications
收录时间:2023-01-28 文档个数:125 文档大小:408.1 MB 最近下载:2024-10-02 人气:4536 磁力链接
  • mp4~Get Your Files Here !/05 - 4. Cybersecurity Careers/17 - Cybersecurity careers overview.mp4.mp4 51.0 MB
  • mp4~Get Your Files Here !/06 - 5. Cybersecurity Certifications/27 - Cybersecurity certifications overview.mp4.mp4 23.7 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Cybersecurity careers and certifications.mp4.mp4 21.7 MB
  • mp4~Get Your Files Here !/02 - 1. Understanding the Cybersecurity Career Field/05 - An overview of cybersecurity key concepts.mp4.mp4 15.4 MB
  • mp4~Get Your Files Here !/02 - 1. Understanding the Cybersecurity Career Field/04 - A brief history of cybersecurity.mp4.mp4 9.8 MB
  • mp4~Get Your Files Here !/02 - 1. Understanding the Cybersecurity Career Field/06 - Enabling technologies for cybersecurity.mp4.mp4 8.8 MB
  • mp4~Get Your Files Here !/07 - 6. Your Cybersecurity Career Path/39 - How to get cybersecurity experience.mp4.mp4 8.7 MB
  • mp4~Get Your Files Here !/07 - 6. Your Cybersecurity Career Path/38 - Prerequisites.mp4.mp4 8.5 MB
  • mp4~Get Your Files Here !/05 - 4. Cybersecurity Careers/19 - Cybersecurity career: Analyst.mp4.mp4 8.5 MB
  • mp4~Get Your Files Here !/06 - 5. Cybersecurity Certifications/37 - Choose a cybersecurity certification.mp4.mp4 8.3 MB
  • mp4~Get Your Files Here !/08 - 7. Cybersecurity Career Advice/44 - Begin with the end in mind.mp4.mp4 8.2 MB
  • mp4~Get Your Files Here !/04 - 3. Cybersecurity Success Traits/14 - Analytical and technology savvy.mp4.mp4 8.1 MB
  • mp4~Get Your Files Here !/05 - 4. Cybersecurity Careers/26 - Cybersecurity career: Director.mp4.mp4 8.0 MB
  • mp4~Get Your Files Here !/07 - 6. Your Cybersecurity Career Path/40 - Getting started: Get certified.mp4.mp4 7.9 MB
  • mp4~Get Your Files Here !/05 - 4. Cybersecurity Careers/22 - Cybersecurity career: Engineer.mp4.mp4 7.8 MB
  • mp4~Get Your Files Here !/01 - Introduction/03 - Why start a career in cybersecurity?.mp4.mp4 7.8 MB
  • mp4~Get Your Files Here !/03 - 2. Cybersecurity Marketplace/13 - Retail (PCI DSS).mp4.mp4 7.7 MB
  • mp4~Get Your Files Here !/02 - 1. Understanding the Cybersecurity Career Field/08 - Cybersecurity career resources.mp4.mp4 7.5 MB
  • mp4~Get Your Files Here !/03 - 2. Cybersecurity Marketplace/11 - Healthcare (HIPAA).mp4.mp4 7.5 MB
  • mp4~Get Your Files Here !/05 - 4. Cybersecurity Careers/20 - Cybersecurity career: Auditor.mp4.mp4 7.4 MB
【影视】 [ CourseMega.com ] Udemy - Interview Skills - How To Interview For Cybersecurity Jobs
收录时间:2023-04-20 文档个数:25 文档大小:406.9 MB 最近下载:2024-10-04 人气:2825 磁力链接
  • mp4~Get Your Files Here !/5 - Unpacking Interview Bias Understanding Its Impact and How to Overcome It/5 - Unpacking Interview Bias Understanding Its Impact and How to Overcome It.mp4 154.0 MB
  • mp4~Get Your Files Here !/4 - Inside the Interviewers Mind Exploring Their Biggest Fears/4 - Inside the Interviewers Mind Exploring Their Biggest Fears.mp4 108.3 MB
  • mp4~Get Your Files Here !/6 - Mastering Behavioral Interview Questions Tips for Crafting Effective Responses/6 - Mastering Behavioral Interview Questions Tips for Crafting Effective Responses.mp4 55.8 MB
  • mp4~Get Your Files Here !/2 - Decoding the Mystery Behind a WorldFamous Question/2 - Decoding the Mystery Behind a WorldFamous Question.mp4 27.5 MB
  • mp4~Get Your Files Here !/3 - Mastering the Mental Game/3 - Mastering the Mental Game.mp4 26.3 MB
  • mp4~Get Your Files Here !/1 - Course Introduction/1 - Introduction to this course.mp4 15.0 MB
  • mp4~Get Your Files Here !/7 - Avoiding SelfSabotage Tips to Enhance Your Job Interview/7 - Avoiding SelfSabotage Tips to Enhance Your Job Interview.mp4 15.0 MB
  • pdf~Get Your Files Here !/1 - Course Introduction/1 - hackthecybersecurityinterview.pdf 3.7 MB
  • pdf~Get Your Files Here !/5 - Unpacking Interview Bias Understanding Its Impact and How to Overcome It/5 - 5-Interview-Bias-Transcript.pdf 346.1 kB
  • pdf~Get Your Files Here !/4 - Inside the Interviewers Mind Exploring Their Biggest Fears/4 - 4-Interviewer-Mind-Transcript.pdf 289.2 kB
  • pdf~Get Your Files Here !/6 - Mastering Behavioral Interview Questions Tips for Crafting Effective Responses/6 - 6-Behavioral-Interview-Questions-Transcript.pdf 174.9 kB
  • pdf~Get Your Files Here !/3 - Mastering the Mental Game/3 - 3-Mental-Game-Mastery-Transcript.pdf 128.8 kB
  • pdf~Get Your Files Here !/1 - Course Introduction/1 - Complete-List-of-Behavioral-Interview-Questions.pdf 127.3 kB
  • pdf~Get Your Files Here !/2 - Decoding the Mystery Behind a WorldFamous Question/2 - 2-Famous-Question-Transcript.pdf 75.2 kB
  • pdf~Get Your Files Here !/7 - Avoiding SelfSabotage Tips to Enhance Your Job Interview/7 - 7-Self-Sabotage-Transcript.pdf 54.5 kB
  • vtt~Get Your Files Here !/5 - Unpacking Interview Bias Understanding Its Impact and How to Overcome It/5 - Unpacking Interview Bias Understanding Its Impact and How to Overcome It English.vtt 49.3 kB
  • pdf~Get Your Files Here !/1 - Course Introduction/1 - 1-Introduction-Transcript.pdf 41.9 kB
  • vtt~Get Your Files Here !/4 - Inside the Interviewers Mind Exploring Their Biggest Fears/4 - Inside the Interviewers Mind Exploring Their Biggest Fears English.vtt 41.0 kB
  • vtt~Get Your Files Here !/6 - Mastering Behavioral Interview Questions Tips for Crafting Effective Responses/6 - Mastering Behavioral Interview Questions Tips for Crafting Effective Responses English.vtt 24.5 kB
  • vtt~Get Your Files Here !/3 - Mastering the Mental Game/3 - Mastering the Mental Game English.vtt 17.2 kB
【影视】 Cybersecurity Threats Ransomware
收录时间:2020-02-17 文档个数:39 文档大小:405.4 MB 最近下载:2024-10-04 人气:3773 磁力链接
  • mp405. Incident Response Eradication and Recovery/06. NoMoreRansom.org.mp4 71.4 MB
  • mp402. What Is Ransomware/08. Demo of Real World Ransomware Attack.mp4 52.0 MB
  • mp405. Incident Response Eradication and Recovery/07. Paying the Ransom.mp4 22.3 MB
  • mp402. What Is Ransomware/02. Definition and Types of Ransomware.mp4 20.3 MB
  • zipcybersecurity-threats-ransomware.zip 17.2 MB
  • mp402. What Is Ransomware/03. The Ransomware Timeline.mp4 15.2 MB
  • mp405. Incident Response Eradication and Recovery/04. Recovery Cloud Storage Files, Dropbox, and OneDrive.mp4 15.1 MB
  • mp402. What Is Ransomware/05. How Big Is the Problem.mp4 15.1 MB
  • mp402. What Is Ransomware/06. Ransomware Victims.mp4 11.7 MB
  • mp406. Countermeasures and Preparing Your Incident Response/02. Defending a Ransomware Attack.mp4 11.4 MB
  • mp406. Countermeasures and Preparing Your Incident Response/05. Lessons Learned and Your Incident Response Plan.mp4 10.9 MB
  • mp403. Ransomware Entry Points/03. Phishing and Email Attachments.mp4 10.6 MB
  • mp404. Incident Response Detection and Containment/04. Containing the Attack.mp4 9.0 MB
  • mp406. Countermeasures and Preparing Your Incident Response/03. Protecting a Windows Network.mp4 8.0 MB
  • mp404. Incident Response Detection and Containment/03. Detecting an Attack.mp4 7.3 MB
  • mp405. Incident Response Eradication and Recovery/03. Recovery Local and Network Files.mp4 7.3 MB
  • mp403. Ransomware Entry Points/06. Command and Callback (C&C) and Indicators of Compromise.mp4 7.0 MB
  • mp405. Incident Response Eradication and Recovery/05. Tools and Resources.mp4 6.7 MB
  • mp402. What Is Ransomware/09. Variations of Ransomware.mp4 6.4 MB
  • mp403. Ransomware Entry Points/04. Embedded Hyperlinks, Websitesdownloads, and Drive-by Infections.mp4 6.2 MB
【影视】 Practical Cybersecurity for IT Professionals
收录时间:2022-06-25 文档个数:119 文档大小:392.7 MB 最近下载:2024-09-22 人气:1588 磁力链接
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/04 - 3. Firewalls/03 - Advanced Windows Firewall.mp4 27.1 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/05 - 4. Network Scanning/01 - Getting started with Nmap.mp4 22.0 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/02 - 1. Why Cybersecurity/07 - Emerging trends in cybersecurity.mp4 20.4 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/02 - 1. Why Cybersecurity/01 - A history of hackers.mp4 17.5 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/04 - 3. Firewalls/05 - Introducing Linux iptables.mp4 16.1 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/04 - 3. Firewalls/02 - Windows Firewall basics.mp4 14.5 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/09 - 8. Network Protocols/02 - Capturing packets with Wireshark.mp4 14.3 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/04 - 3. Firewalls/04 - ZedLan firewall log analyser.mp4 13.4 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/02 - 1. Why Cybersecurity/04 - Common forms of cyberattack.mp4 13.1 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/09 - 8. Network Protocols/03 - Making sense of the protocols.mp4 13.0 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/02 - 1. Why Cybersecurity/02 - The cyber kill chain.mp4 12.0 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/03 - 2. Antivirus/01 - Introducing Microsoft Defender Antivirus.mp4 11.7 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/07 - 6. Vulnerability Scanning/01 - Preparing Nessus.mp4 10.5 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/08 - 7. Web Applications/02 - Running an SQL injection attack.mp4 10.1 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/05 - 4. Network Scanning/02 - Advanced Nmap options.mp4 10.0 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/02 - 1. Why Cybersecurity/03 - Stuxnet and the kill chain.mp4 9.8 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/03 - 2. Antivirus/02 - Detecting malware with Microsoft Defender.mp4 9.5 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/04 - 3. Firewalls/06 - Setting up a simple iptables firewall.mp4 9.3 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/06 - 5. Network Connections/02 - Transferring files using netcat.mp4 9.2 MB
  • mp4[TutsNode.com] - Practical Cybersecurity for IT Professionals/06 - 5. Network Connections/04 - Setting up a netcat honeypot.mp4 8.9 MB
【影视】 Pluralsight Cybersecurity Threats Ransomware
收录时间:2020-02-03 文档个数:38 文档大小:388.1 MB 最近下载:2024-10-04 人气:2330 磁力链接
  • mp45. Incident Response - Eradication and Recovery/29. NoMoreRansom.org.mp4 71.4 MB
  • mp42. What Is Ransomware/09. Demo of Real World Ransomware Attack.mp4 52.0 MB
  • mp45. Incident Response - Eradication and Recovery/30. Paying the Ransom.mp4 22.3 MB
  • mp42. What Is Ransomware/03. Definition and Types of Ransomware.mp4 20.3 MB
  • mp42. What Is Ransomware/04. The Ransomware Timeline.mp4 15.2 MB
  • mp45. Incident Response - Eradication and Recovery/27. Recovery Cloud Storage Files, Dropbox, and OneDrive.mp4 15.1 MB
  • mp42. What Is Ransomware/06. How Big Is the Problem.mp4 15.1 MB
  • mp42. What Is Ransomware/07. Ransomware Victims.mp4 11.7 MB
  • mp46. Countermeasures and Preparing Your Incident Response/33. Defending a Ransomware Attack.mp4 11.4 MB
  • mp46. Countermeasures and Preparing Your Incident Response/36. Lessons Learned and Your Incident Response Plan.mp4 10.9 MB
  • mp43. Ransomware Entry Points/14. Phishing and Email Attachments.mp4 10.6 MB
  • mp44. Incident Response - Detection and Containment/22. Containing the Attack.mp4 9.0 MB
  • mp46. Countermeasures and Preparing Your Incident Response/34. Protecting a Windows Network.mp4 8.0 MB
  • mp44. Incident Response - Detection and Containment/21. Detecting an Attack.mp4 7.3 MB
  • mp45. Incident Response - Eradication and Recovery/26. Recovery Local and Network Files.mp4 7.3 MB
  • mp43. Ransomware Entry Points/17. Command and Callback (C&C) and Indicators of Compromise.mp4 7.0 MB
  • mp45. Incident Response - Eradication and Recovery/28. Tools and Resources.mp4 6.7 MB
  • mp42. What Is Ransomware/10. Variations of Ransomware.mp4 6.4 MB
  • mp43. Ransomware Entry Points/15. Embedded Hyperlinks, Websites_downloads, and Drive-by Infections.mp4 6.2 MB
  • mp45. Incident Response - Eradication and Recovery/31. Summary.mp4 6.0 MB
【影视】 Pluralsight - Cybersecurity Threats: Ransomware
收录时间:2020-02-10 文档个数:37 文档大小:388.1 MB 最近下载:2024-10-04 人气:2591 磁力链接
  • mp45. Incident Response - Eradication and Recovery/29. NoMoreRansom.org.mp4 71.4 MB
  • mp42. What Is Ransomware/09. Demo of Real World Ransomware Attack.mp4 52.0 MB
  • mp45. Incident Response - Eradication and Recovery/30. Paying the Ransom.mp4 22.3 MB
  • mp42. What Is Ransomware/03. Definition and Types of Ransomware.mp4 20.3 MB
  • mp42. What Is Ransomware/04. The Ransomware Timeline.mp4 15.2 MB
  • mp45. Incident Response - Eradication and Recovery/27. Recovery Cloud Storage Files, Dropbox, and OneDrive.mp4 15.1 MB
  • mp42. What Is Ransomware/06. How Big Is the Problem.mp4 15.1 MB
  • mp42. What Is Ransomware/07. Ransomware Victims.mp4 11.7 MB
  • mp46. Countermeasures and Preparing Your Incident Response/33. Defending a Ransomware Attack.mp4 11.4 MB
  • mp46. Countermeasures and Preparing Your Incident Response/36. Lessons Learned and Your Incident Response Plan.mp4 10.9 MB
  • mp43. Ransomware Entry Points/14. Phishing and Email Attachments.mp4 10.6 MB
  • mp44. Incident Response - Detection and Containment/22. Containing the Attack.mp4 9.0 MB
  • mp46. Countermeasures and Preparing Your Incident Response/34. Protecting a Windows Network.mp4 8.0 MB
  • mp44. Incident Response - Detection and Containment/21. Detecting an Attack.mp4 7.3 MB
  • mp45. Incident Response - Eradication and Recovery/26. Recovery Local and Network Files.mp4 7.3 MB
  • mp43. Ransomware Entry Points/17. Command and Callback (C&C) and Indicators of Compromise.mp4 7.0 MB
  • mp45. Incident Response - Eradication and Recovery/28. Tools and Resources.mp4 6.7 MB
  • mp42. What Is Ransomware/10. Variations of Ransomware.mp4 6.4 MB
  • mp43. Ransomware Entry Points/15. Embedded Hyperlinks, Websites_downloads, and Drive-by Infections.mp4 6.2 MB
  • mp45. Incident Response - Eradication and Recovery/31. Summary.mp4 6.0 MB
【影视】 Pluralsight - Cybersecurity Threats: Ransomware
收录时间:2020-10-28 文档个数:37 文档大小:388.1 MB 最近下载:2024-05-18 人气:292 磁力链接
  • mp45. Incident Response - Eradication and Recovery/29. NoMoreRansom.org.mp4 71.4 MB
  • mp42. What Is Ransomware/09. Demo of Real World Ransomware Attack.mp4 52.0 MB
  • mp45. Incident Response - Eradication and Recovery/30. Paying the Ransom.mp4 22.3 MB
  • mp42. What Is Ransomware/03. Definition and Types of Ransomware.mp4 20.3 MB
  • mp42. What Is Ransomware/04. The Ransomware Timeline.mp4 15.2 MB
  • mp45. Incident Response - Eradication and Recovery/27. Recovery Cloud Storage Files, Dropbox, and OneDrive.mp4 15.1 MB
  • mp42. What Is Ransomware/06. How Big Is the Problem.mp4 15.1 MB
  • mp42. What Is Ransomware/07. Ransomware Victims.mp4 11.7 MB
  • mp46. Countermeasures and Preparing Your Incident Response/33. Defending a Ransomware Attack.mp4 11.4 MB
  • mp46. Countermeasures and Preparing Your Incident Response/36. Lessons Learned and Your Incident Response Plan.mp4 10.9 MB
  • mp43. Ransomware Entry Points/14. Phishing and Email Attachments.mp4 10.6 MB
  • mp44. Incident Response - Detection and Containment/22. Containing the Attack.mp4 9.0 MB
  • mp46. Countermeasures and Preparing Your Incident Response/34. Protecting a Windows Network.mp4 8.0 MB
  • mp44. Incident Response - Detection and Containment/21. Detecting an Attack.mp4 7.3 MB
  • mp45. Incident Response - Eradication and Recovery/26. Recovery Local and Network Files.mp4 7.3 MB
  • mp43. Ransomware Entry Points/17. Command and Callback (C&C) and Indicators of Compromise.mp4 7.0 MB
  • mp45. Incident Response - Eradication and Recovery/28. Tools and Resources.mp4 6.7 MB
  • mp42. What Is Ransomware/10. Variations of Ransomware.mp4 6.4 MB
  • mp43. Ransomware Entry Points/15. Embedded Hyperlinks, Websites_downloads, and Drive-by Infections.mp4 6.2 MB
  • mp45. Incident Response - Eradication and Recovery/31. Summary.mp4 6.0 MB
【影视】 Linkedin Learning - Practical Cybersecurity for IT Professionals [Malcolm Shore] [En.Sub.]
收录时间:2022-11-07 文档个数:80 文档大小:388.0 MB 最近下载:2023-08-17 人气:9 磁力链接
  • mp404 - 3. Firewalls/03 - Advanced Windows Firewall.mp4 27.1 MB
  • mp405 - 4. Network Scanning/01 - Getting started with Nmap.mp4 22.0 MB
  • mp402 - 1. Why Cybersecurity/07 - Emerging trends in cybersecurity.mp4 20.4 MB
  • mp402 - 1. Why Cybersecurity/01 - A history of hackers.mp4 17.5 MB
  • mp404 - 3. Firewalls/05 - Introducing Linux iptables.mp4 16.1 MB
  • mp404 - 3. Firewalls/02 - Windows Firewall basics.mp4 14.5 MB
  • mp409 - 8. Network Protocols/02 - Capturing packets with Wireshark.mp4 14.3 MB
  • mp404 - 3. Firewalls/04 - ZedLan firewall log analyser.mp4 13.4 MB
  • mp402 - 1. Why Cybersecurity/04 - Common forms of cyberattack.mp4 13.1 MB
  • mp409 - 8. Network Protocols/03 - Making sense of the protocols.mp4 13.0 MB
  • mp402 - 1. Why Cybersecurity/02 - The cyber kill chain.mp4 12.0 MB
  • mp403 - 2. Antivirus/01 - Introducing Microsoft Defender Antivirus.mp4 11.7 MB
  • mp407 - 6. Vulnerability Scanning/01 - Preparing Nessus.mp4 10.5 MB
  • mp408 - 7. Web Applications/02 - Running an SQL injection attack.mp4 10.1 MB
  • mp405 - 4. Network Scanning/02 - Advanced Nmap options.mp4 10.0 MB
  • mp402 - 1. Why Cybersecurity/03 - Stuxnet and the kill chain.mp4 9.8 MB
  • mp403 - 2. Antivirus/02 - Detecting malware with Microsoft Defender.mp4 9.5 MB
  • mp404 - 3. Firewalls/06 - Setting up a simple iptables firewall.mp4 9.3 MB
  • mp406 - 5. Network Connections/02 - Transferring files using netcat.mp4 9.2 MB
  • mp406 - 5. Network Connections/04 - Setting up a netcat honeypot.mp4 8.9 MB
【影视】 [ TutGee.com ] Linkedin - Practical Cybersecurity for IT Professionals
收录时间:2022-05-16 文档个数:81 文档大小:388.0 MB 最近下载:2024-10-05 人气:7742 磁力链接
  • mp4~Get Your Files Here !/04 - 3. Firewalls/03 - Advanced Windows Firewall.mp4 27.1 MB
  • mp4~Get Your Files Here !/05 - 4. Network Scanning/01 - Getting started with Nmap.mp4 22.0 MB
  • mp4~Get Your Files Here !/02 - 1. Why Cybersecurity/07 - Emerging trends in cybersecurity.mp4 20.4 MB
  • mp4~Get Your Files Here !/02 - 1. Why Cybersecurity/01 - A history of hackers.mp4 17.5 MB
  • mp4~Get Your Files Here !/04 - 3. Firewalls/05 - Introducing Linux iptables.mp4 16.1 MB
  • mp4~Get Your Files Here !/04 - 3. Firewalls/02 - Windows Firewall basics.mp4 14.5 MB
  • mp4~Get Your Files Here !/09 - 8. Network Protocols/02 - Capturing packets with Wireshark.mp4 14.3 MB
  • mp4~Get Your Files Here !/04 - 3. Firewalls/04 - ZedLan firewall log analyser.mp4 13.4 MB
  • mp4~Get Your Files Here !/02 - 1. Why Cybersecurity/04 - Common forms of cyberattack.mp4 13.1 MB
  • mp4~Get Your Files Here !/09 - 8. Network Protocols/03 - Making sense of the protocols.mp4 13.0 MB
  • mp4~Get Your Files Here !/02 - 1. Why Cybersecurity/02 - The cyber kill chain.mp4 12.0 MB
  • mp4~Get Your Files Here !/03 - 2. Antivirus/01 - Introducing Microsoft Defender Antivirus.mp4 11.7 MB
  • mp4~Get Your Files Here !/07 - 6. Vulnerability Scanning/01 - Preparing Nessus.mp4 10.5 MB
  • mp4~Get Your Files Here !/08 - 7. Web Applications/02 - Running an SQL injection attack.mp4 10.1 MB
  • mp4~Get Your Files Here !/05 - 4. Network Scanning/02 - Advanced Nmap options.mp4 10.0 MB
  • mp4~Get Your Files Here !/02 - 1. Why Cybersecurity/03 - Stuxnet and the kill chain.mp4 9.8 MB
  • mp4~Get Your Files Here !/03 - 2. Antivirus/02 - Detecting malware with Microsoft Defender.mp4 9.5 MB
  • mp4~Get Your Files Here !/04 - 3. Firewalls/06 - Setting up a simple iptables firewall.mp4 9.3 MB
  • mp4~Get Your Files Here !/06 - 5. Network Connections/02 - Transferring files using netcat.mp4 9.2 MB
  • mp4~Get Your Files Here !/06 - 5. Network Connections/04 - Setting up a netcat honeypot.mp4 8.9 MB
【影视】 Linkedin.Learning.Practical.Cybersecurity.for.IT.Professionals-XQZT
收录时间:2023-05-18 文档个数:41 文档大小:377.4 MB 最近下载:2024-10-04 人气:283 磁力链接
  • mkv04.03-advanced_windows_firewall.mkv 26.5 MB
  • mkv05.01-getting_started_with_nmap.mkv 21.6 MB
  • mkv02.07-emerging_trends_in_cybersecurity.mkv 19.9 MB
  • mkv02.01-a_history_of_hackers.mkv 17.2 MB
  • mkv04.05-introducing_linux_iptables.mkv 15.7 MB
  • mkv04.02-windows_firewall_basics.mkv 14.2 MB
  • mkv09.02-capturing_packets_with_wireshark.mkv 14.0 MB
  • mkv04.04-zedlan_firewall_log_analyser.mkv 13.1 MB
  • mkv09.03-making_sense_of_the_protocols.mkv 12.8 MB
  • mkv02.04-common_forms_of_cyberattack.mkv 12.6 MB
  • mkv02.02-the_cyber_kill_chain.mkv 11.6 MB
  • mkv03.01-introducing_microsoft_defender_antivirus.mkv 11.4 MB
  • mkv07.01-preparing_nessus.mkv 10.2 MB
  • mkv08.02-running_an_sql_injection_attack.mkv 9.8 MB
  • mkv05.02-advanced_nmap_options.mkv 9.8 MB
  • mkv02.03-stuxnet_and_the_kill_chain.mkv 9.5 MB
  • mkv03.02-detecting_malware_with_microsoft_defender.mkv 9.3 MB
  • mkv04.06-setting_up_a_simple_iptables_firewall.mkv 9.0 MB
  • mkv06.02-transferring_files_using_netcat.mkv 8.8 MB
  • mkv06.04-setting_up_a_netcat_honeypot.mkv 8.7 MB
【压缩文件】 [ FreeCourseWeb.com ] PluralSight - Building a CyberSecurity Home Lab Environment.zip
收录时间:2020-12-11 文档个数:1 文档大小:376.0 MB 最近下载:2024-10-03 人气:5246 磁力链接
  • zip[ FreeCourseWeb.com ] PluralSight - Building a CyberSecurity Home Lab Environment.zip 376.0 MB
【压缩文件】 Pluralsight.Cybersecurity.Threats.Ransomware-[www.allfiles.cf]-TPTORRENTS.zip
收录时间:2020-06-04 文档个数:1 文档大小:373.3 MB 最近下载:2024-10-03 人气:3198 磁力链接
  • zipPluralsight.Cybersecurity.Threats.Ransomware-[www.allfiles.cf]-TPTORRENTS.zip 373.3 MB
【影视】 Lynda - Cybersecurity with Cloud Computing
收录时间:2020-02-11 文档个数:39 文档大小:371.6 MB 最近下载:2024-10-05 人气:5993 磁力链接
  • mp400. Introduction/00_01 - Welcome.mp4 17.4 MB
  • mp400. Introduction/00_03 - Reference sites.mp4 16.6 MB
  • mp401. Cloud Fundamentals/01_01 - Defining the essential characteristics of cloud.mp4 15.8 MB
  • mp402. Cloud Security Guidance/02_03 - Managing information and data security.mp4 15.6 MB
  • mp403. Architecting Security/03_05 - Introducing cloud attribute taxonomy.mp4 15.5 MB
  • mp403. Architecting Security/03_01 - Introducing SABSA.mp4 15.3 MB
  • mp401. Cloud Fundamentals/01_06 - Identifying cloud incidents.mp4 15.2 MB
  • mp401. Cloud Fundamentals/01_09 - Defining trust models for cloud.mp4 14.0 MB
  • mp402. Cloud Security Guidance/02_16 - Solution Cloud security knowledge.mp4 13.8 MB
  • mp402. Cloud Security Guidance/02_02 - Complying with legal and audit requrements.mp4 13.1 MB
  • mp402. Cloud Security Guidance/02_11 - Verifying identity in the cloud.mp4 13.1 MB
  • mp402. Cloud Security Guidance/02_07 - Managing incident response.mp4 12.9 MB
  • mp402. Cloud Security Guidance/02_13 - Implementing virtualization.mp4 12.9 MB
  • mp402. Cloud Security Guidance/02_12 - Controlling cloud access.mp4 12.5 MB
  • mp402. Cloud Security Guidance/02_08 - Maximizing application security.mp4 12.3 MB
  • mp403. Architecting Security/03_02 - Using Fast Tracker.mp4 12.0 MB
  • mp402. Cloud Security Guidance/02_05 - Comparing traditional IT, BCP, and DR.mp4 12.0 MB
  • mp401. Cloud Fundamentals/01_02 - Understanding infrastructure as a service.mp4 11.9 MB
  • mp401. Cloud Fundamentals/01_05 - Discovering deployment models.mp4 11.4 MB
  • mp402. Cloud Security Guidance/02_10 - Managing encryption and keys.mp4 10.8 MB
【影视】 [TutorialPace.com] Lynda - Cybersecurity with Cloud Computing - [TP]
收录时间:2020-02-15 文档个数:38 文档大小:371.6 MB 最近下载:2024-10-04 人气:3980 磁力链接
  • mp400. Introduction/00_01 - Welcome.mp4 17.4 MB
  • mp400. Introduction/00_03 - Reference sites.mp4 16.6 MB
  • mp401. Cloud Fundamentals/01_01 - Defining the essential characteristics of cloud.mp4 15.8 MB
  • mp402. Cloud Security Guidance/02_03 - Managing information and data security.mp4 15.6 MB
  • mp403. Architecting Security/03_05 - Introducing cloud attribute taxonomy.mp4 15.5 MB
  • mp403. Architecting Security/03_01 - Introducing SABSA.mp4 15.3 MB
  • mp401. Cloud Fundamentals/01_06 - Identifying cloud incidents.mp4 15.2 MB
  • mp401. Cloud Fundamentals/01_09 - Defining trust models for cloud.mp4 14.0 MB
  • mp402. Cloud Security Guidance/02_16 - Solution Cloud security knowledge.mp4 13.8 MB
  • mp402. Cloud Security Guidance/02_02 - Complying with legal and audit requrements.mp4 13.1 MB
  • mp402. Cloud Security Guidance/02_11 - Verifying identity in the cloud.mp4 13.1 MB
  • mp402. Cloud Security Guidance/02_07 - Managing incident response.mp4 12.9 MB
  • mp402. Cloud Security Guidance/02_13 - Implementing virtualization.mp4 12.9 MB
  • mp402. Cloud Security Guidance/02_12 - Controlling cloud access.mp4 12.5 MB
  • mp402. Cloud Security Guidance/02_08 - Maximizing application security.mp4 12.3 MB
  • mp403. Architecting Security/03_02 - Using Fast Tracker.mp4 12.0 MB
  • mp402. Cloud Security Guidance/02_05 - Comparing traditional IT, BCP, and DR.mp4 12.0 MB
  • mp401. Cloud Fundamentals/01_02 - Understanding infrastructure as a service.mp4 11.9 MB
  • mp401. Cloud Fundamentals/01_05 - Discovering deployment models.mp4 11.4 MB
  • mp402. Cloud Security Guidance/02_10 - Managing encryption and keys.mp4 10.8 MB
【影视】 Lynda - Cybersecurity for Small and Medium Businesses Essential Training
收录时间:2020-03-10 文档个数:66 文档大小:358.3 MB 最近下载:2024-10-04 人气:3616 磁力链接
  • mp42.1. The Basics/03.Why you should care.mp4 31.6 MB
  • mp41.Introduction/01.Welcome.mp4 21.9 MB
  • mp44.3. Protect/16.Technology solutions to protect a business.mp4 20.2 MB
  • mp47.6. Recover/28.Cybersecurity insurance.mp4 15.8 MB
  • mp44.3. Protect/15.Sharing online - How to prevent a phish.mp4 15.0 MB
  • mp42.1. The Basics/07.What are the cybersecurity threats.mp4 14.6 MB
  • mp44.3. Protect/18.Culture of security - Policies, procedures, and attitude.mp4 14.3 MB
  • mp46.5. Respond/24.Key elements of a cyber incident response.mp4 13.6 MB
  • mp44.3. Protect/17.Passphrases and authentication.mp4 13.3 MB
  • mp43.2. Identify/11.Account access best practices.mp4 12.9 MB
  • mp45.4. Detect/21.Cybersecurity assessments and detection technology solutions.mp4 12.8 MB
  • mp48.7. Resources/32.Scam and threat alerts.mp4 11.7 MB
  • mp48.7. Resources/31.More cybersecurity resources.mp4 11.5 MB
  • mp43.2. Identify/12.What about the cloud.mp4 11.3 MB
  • mp46.5. Respond/26.State breach response laws.mp4 9.6 MB
  • mp43.2. Identify/09.Step #1 - Identify key assets.mp4 9.5 MB
  • mp46.5. Respond/22.Step #4 - Respond to a cyber breach.mp4 9.3 MB
  • mp45.4. Detect/19.Step #3 - Detect a breach.mp4 9.3 MB
  • mp42.1. The Basics/05.Anyone can improve the cybersecurity of a business.mp4 9.1 MB
  • mp49.Conclusion/33.Next steps.mp4 9.0 MB
【影视】 Cybersecurity for Small and Medium Businesses - Essential Training
收录时间:2021-02-01 文档个数:66 文档大小:358.3 MB 最近下载:2024-10-04 人气:3081 磁力链接
  • mp42.1. The Basics/03.Why you should care.mp4 31.6 MB
  • mp41.Introduction/01.Welcome.mp4 21.9 MB
  • mp44.3. Protect/16.Technology solutions to protect a business.mp4 20.2 MB
  • mp47.6. Recover/28.Cybersecurity insurance.mp4 15.8 MB
  • mp44.3. Protect/15.Sharing online - How to prevent a phish.mp4 15.0 MB
  • mp42.1. The Basics/07.What are the cybersecurity threats.mp4 14.6 MB
  • mp44.3. Protect/18.Culture of security - Policies, procedures, and attitude.mp4 14.3 MB
  • mp46.5. Respond/24.Key elements of a cyber incident response.mp4 13.6 MB
  • mp44.3. Protect/17.Passphrases and authentication.mp4 13.3 MB
  • mp43.2. Identify/11.Account access best practices.mp4 12.9 MB
  • mp45.4. Detect/21.Cybersecurity assessments and detection technology solutions.mp4 12.8 MB
  • mp48.7. Resources/32.Scam and threat alerts.mp4 11.7 MB
  • mp48.7. Resources/31.More cybersecurity resources.mp4 11.5 MB
  • mp43.2. Identify/12.What about the cloud.mp4 11.3 MB
  • mp46.5. Respond/26.State breach response laws.mp4 9.6 MB
  • mp43.2. Identify/09.Step #1 - Identify key assets.mp4 9.5 MB
  • mp46.5. Respond/22.Step #4 - Respond to a cyber breach.mp4 9.3 MB
  • mp45.4. Detect/19.Step #3 - Detect a breach.mp4 9.3 MB
  • mp42.1. The Basics/05.Anyone can improve the cybersecurity of a business.mp4 9.1 MB
  • mp49.Conclusion/33.Next steps.mp4 9.0 MB
【音乐】 TTC - Thinking about Cybersecurity
收录时间:2020-04-03 文档个数:19 文档大小:353.5 MB 最近下载:2024-10-03 人气:6775 磁力链接
  • mp3TGC_9523_Lect18_Cybersecurity.mp3 21.3 MB
  • mp3TGC_9523_Lect10_Cybersecurity.mp3 20.8 MB
  • mp3TGC_9523_Lect14_Cybersecurity.mp3 20.6 MB
  • mp3TGC_9523_Lect08_Cybersecurity.mp3 19.8 MB
  • mp3TGC_9523_Lect05_Cybersecurity.mp3 19.8 MB
  • mp3TGC_9523_Lect13_Cybersecurity.mp3 19.7 MB
  • mp3TGC_9523_Lect11_Cybersecurity.mp3 19.5 MB
  • mp3TGC_9523_Lect17_Cybersecurity.mp3 19.5 MB
  • mp3TGC_9523_Lect01_Cybersecurity.mp3 19.5 MB
  • mp3TGC_9523_Lect04_Cybersecurity.mp3 19.3 MB
  • mp3TGC_9523_Lect09_Cybersecurity.mp3 19.1 MB
  • mp3TGC_9523_Lect12_Cybersecurity.mp3 18.9 MB
  • mp3TGC_9523_Lect15_Cybersecurity.mp3 18.9 MB
  • mp3TGC_9523_Lect16_Cybersecurity.mp3 18.8 MB
  • mp3TGC_9523_Lect06_Cybersecurity.mp3 18.7 MB
  • mp3TGC_9523_Lect07_Cybersecurity.mp3 18.7 MB
  • mp3TGC_9523_Lect02_Cybersecurity.mp3 18.2 MB
  • mp3TGC_9523_Lect03_Cybersecurity.mp3 17.9 MB
  • PDFDG9523_98F12.PDF 4.7 MB
【影视】 [FreeCoursesOnline.Me] [Skillshare] Cybersecurity Data Science [FCO]
收录时间:2020-04-27 文档个数:32 文档大小:353.4 MB 最近下载:2024-09-25 人气:1745 磁力链接
  • mp42-Obtaining a malware dataset.mp4 37.9 MB
  • mp48-Tfidf.mp4 25.9 MB
  • mp41-Downloading and installing virtual box and windows image.mp4 24.9 MB
  • mp416-Malconv.mp4 23.7 MB
  • mp415-Ngram classifier.mp4 22.9 MB
  • mp44-Static and dynamic analysis.mp4 21.3 MB
  • mp414-Hash grams.mp4 18.3 MB
  • mp40-Course introduction.mp4 15.7 MB
  • mp47-Dumping using pefile.mp4 14.3 MB
  • mp419-Isolation forest.mp4 13.3 MB
  • mp417-Section 1 end.mp4 12.7 MB
  • mp420-Section 2 end.mp4 12.4 MB
  • mp49-Train test split.mp4 11.7 MB
  • mp413-N gram background.mp4 11.4 MB
  • mp410-Training a classifier.mp4 10.3 MB
  • mp412-Thresholding.mp4 10.0 MB
  • mp43-Obtaining a benign dataset.mp4 9.5 MB
  • mp423-CAPTCHA recognizer.mp4 9.3 MB
  • mp418-Kdd cup dataset.mp4 8.4 MB
  • mp424-Course end.mp4 8.4 MB
共15页 上一页 5 6 7 8 9 10 11 12 13 下一页

友情链接