2048BT

为您索检到299条磁力链接,耗时0毫秒。

★注意★本站地址随时可能失效

找到本站最新地址的两种方法: 1、记住地址发布页2048bt.cc2048bt.cyoubt搜索.xyzbt搜索.cc 2、发送“地址”到2048bt@gmail.com
【影视】 Cybersecurity and Artificial Intelligence
收录时间:2024-09-27 文档个数:10 文档大小:99.9 MB 最近下载:2024-10-04 人气:39 磁力链接
  • mp401. Cybersecurity and Artificial Intelligence/01. Cybersecurity and AI Overview.mp4 24.4 MB
  • mp401. Cybersecurity and Artificial Intelligence/02. Demo- Importance of Understanding AI in Cybersecurity.mp4 23.9 MB
  • mp401. Cybersecurity and Artificial Intelligence/03. Phishing and BEC Real-world Examples.mp4 10.8 MB
  • mp401. Cybersecurity and Artificial Intelligence/08. Demo- Deepfake.mp4 8.0 MB
  • zipcybersecurity-artificial-intelligence.zip 7.4 MB
  • mp401. Cybersecurity and Artificial Intelligence/04. Voicemail Scams - Examples and How to Avoid.mp4 7.3 MB
  • mp401. Cybersecurity and Artificial Intelligence/05. Adhering to Company Policies and Guidelines.mp4 5.8 MB
  • mp401. Cybersecurity and Artificial Intelligence/06. AI Hallucinations.mp4 5.8 MB
  • mp401. Cybersecurity and Artificial Intelligence/09. Mitigating the AI Threats.mp4 3.3 MB
  • mp401. Cybersecurity and Artificial Intelligence/07. Criminal Usage of AI.mp4 3.3 MB
【影视】 [ FreeCourseWeb.com ] Ace Your Cybersecurity Interview - The Ultimate Crash Course
收录时间:2024-09-22 文档个数:14 文档大小:582.2 MB 最近下载:2024-10-05 人气:213 磁力链接
  • mp4~Get Your Files Here !/1 - Cyber Security Technical Interview Questions Answers/3 - Network security interview questions.mp4 119.8 MB
  • mp4~Get Your Files Here !/1 - Cyber Security Technical Interview Questions Answers/1 - Application Security interview questions.mp4 91.2 MB
  • mp4~Get Your Files Here !/1 - Cyber Security Technical Interview Questions Answers/2 - Penetration Testing Vulnerability assessment interview questions.mp4 68.0 MB
  • mp4~Get Your Files Here !/1 - Cyber Security Technical Interview Questions Answers/4 - Cloud Security Interview questions.mp4 64.6 MB
  • mp4~Get Your Files Here !/3 - Cyber Security Skills Certification for Resume/12 - Role based certification for resume.mp4 54.4 MB
  • mp4~Get Your Files Here !/1 - Cyber Security Technical Interview Questions Answers/8 - Network Security Protocols interview questions.mp4 39.0 MB
  • mp4~Get Your Files Here !/1 - Cyber Security Technical Interview Questions Answers/9 - VPN Interview questions.mp4 35.8 MB
  • mp4~Get Your Files Here !/1 - Cyber Security Technical Interview Questions Answers/7 - Cyber Security Fundamentals interview questions.mp4 29.1 MB
  • mp4~Get Your Files Here !/2 - Cyber Security Soft Skills interview questions/10 - Soft Skills.mp4 24.8 MB
  • mp4~Get Your Files Here !/3 - Cyber Security Skills Certification for Resume/11 - Role based resume skills.mp4 20.1 MB
  • mp4~Get Your Files Here !/1 - Cyber Security Technical Interview Questions Answers/6 - Networking Concepts for Cyber Security.mp4 18.6 MB
  • mp4~Get Your Files Here !/1 - Cyber Security Technical Interview Questions Answers/5 - Hacking Concepts interview questions.mp4 16.8 MB
  • txt~Get Your Files Here !/Bonus Resources.txt 386 Bytes
  • urlGet Bonus Downloads Here.url 183 Bytes
【影视】 [ DevCourseWeb.com ] China's Cybersecurity and Privacy Regulations - Essential Training
收录时间:2024-09-03 文档个数:49 文档大小:237.4 MB 最近下载:2024-09-27 人气:47 磁力链接
  • mp4~Get Your Files Here !/05 - 4.Personal Information Protection Law/01 - Personal Information Protection Law breakdown.mp4 29.7 MB
  • mp4~Get Your Files Here !/05 - 4.Personal Information Protection Law/02 - Legal basis and consent.mp4 16.8 MB
  • mp4~Get Your Files Here !/05 - 4.Personal Information Protection Law/04 - Personal information handler obligations.mp4 15.5 MB
  • mp4~Get Your Files Here !/05 - 4.Personal Information Protection Law/05 - Cross-border data transfer and updates to the regulation.mp4 15.2 MB
  • mp4~Get Your Files Here !/03 - 2. Cybersecurity Law/01 - Cybersecurity Law breakdown.mp4 13.6 MB
  • mp4~Get Your Files Here !/05 - 4.Personal Information Protection Law/03 - Data subject rights.mp4 13.3 MB
  • mp4~Get Your Files Here !/03 - 2. Cybersecurity Law/02 - Multilevel protection scheme.mp4 13.2 MB
  • mp4~Get Your Files Here !/04 - 3. Data Security Law/01 - Data Security Law breakdown.mp4 12.8 MB
  • mp4~Get Your Files Here !/03 - 2. Cybersecurity Law/03 - Multilevel protection scheme technical components.mp4 10.7 MB
  • mp4~Get Your Files Here !/02 - 1. China Regulation Basics/02 - Scope.mp4 10.7 MB
  • mp4~Get Your Files Here !/02 - 1. China Regulation Basics/03 - Important dates.mp4 10.6 MB
  • mp4~Get Your Files Here !/06 - 5. Real-World Guidance/02 - Enforcement action examples.mp4 10.2 MB
  • mp4~Get Your Files Here !/04 - 3. Data Security Law/03 - Key provisions of the Data Security Law.mp4 9.7 MB
  • mp4~Get Your Files Here !/04 - 3. Data Security Law/02 - Data classification and cross-border transfer guidelines.mp4 8.6 MB
  • mp4~Get Your Files Here !/01 - Introduction/03 - Definitions.mp4 7.3 MB
  • mp4~Get Your Files Here !/07 - Conclusion/02 - Additional resources.mp4 6.8 MB
  • mp4~Get Your Files Here !/02 - 1. China Regulation Basics/01 - Overview of the recent cybersecurity and privacy regulations.mp4 6.7 MB
  • mp4~Get Your Files Here !/07 - Conclusion/01 - How to get started.mp4 6.5 MB
  • mp4~Get Your Files Here !/06 - 5. Real-World Guidance/01 - Successful certification examples.mp4 6.0 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Cybersecurity and privacy regulation in China.mp4 4.7 MB
【文档书籍】 Raj P. Leveraging AI Competencies for Next-Generation Cybersecurity Sol. 2024
收录时间:2024-08-30 文档个数:1 文档大小:34.2 MB 最近下载:2024-10-04 人气:317 磁力链接
  • pdfRaj P. Leveraging AI Competencies for Next-Generation Cybersecurity Sol. 2024.pdf 34.2 MB
【文档书籍】 Miller S. Cybersecurity, Ethics, and Collective Responsibility 2024
收录时间:2024-07-25 文档个数:3 文档大小:30.5 MB 最近下载:2024-10-05 人气:753 磁力链接
  • pdfMiller S. Cybersecurity, Ethics, and Collective Responsibility 2024.pdf 21.7 MB
  • pdfPriyadarshini I. Cybersecurity. Ethics, Legal, Risks, and Policies 2021.pdf 8.7 MB
  • txtReadme.txt 957 Bytes
【影视】 sccnc-Cybersecurity
收录时间:2024-07-23 文档个数:8 文档大小:51.0 MB 最近下载:2024-07-31 人气:3 磁力链接
  • movCybersecurity.HD.mov 42.6 MB
  • mp4Cybersecurity.mp4 7.4 MB
  • mp3Cybersecurity.mp3 886.9 kB
  • pngCybersecurity.png 40.9 kB
  • sqlitesccnc-Cybersecurity_meta.sqlite 20.5 kB
  • vttCybersecurity.es.vtt 9.7 kB
  • vttCybersecurity.en.vtt 8.2 kB
  • xmlsccnc-Cybersecurity_meta.xml 1.6 kB
【影视】 Theoretical Foundations of AI in Cybersecurity
收录时间:2024-07-14 文档个数:362 文档大小:6.1 GB 最近下载:2024-10-04 人气:3529 磁力链接
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/3. Fundamental Theories of AI/7. Case Study Revolutionizing Cybersecurity with Natural Language Processing.mp4 57.4 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/7. Deep Learning for Cyber Defense/11. Case Study Unraveling the Challenges of Deploying Deep Learning Models.mp4 52.3 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/7. Deep Learning for Cyber Defense/3. Case Study Enhancing Cybersecurity with Neural Networks.mp4 49.2 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/13. AI in Vulnerability Management/9. Case Study AI-Driven Transformation in Vulnerability Management.mp4 48.5 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/4. Cybersecurity Fundamentals/4. Types of Cyber Threats.mp4 48.4 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/15. AI in Network Security/9. Case Study AI in Network Security.mp4 48.1 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/2. Introduction to Cybersecurity and AI/8. Key Concepts and Terminologies.mp4 47.1 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/10. AI for Intrusion Detection Systems (IDS)/7. Case Study Implementing AI-Based Intrusion Detection Systems.mp4 46.9 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/2. Introduction to Cybersecurity and AI/4. Overview of Cybersecurity.mp4 46.5 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/10. AI for Intrusion Detection Systems (IDS)/9. Case Study Enhancing Cybersecurity with AI-Powered Intrusion Detection Systems.mp4 46.2 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/4. Cybersecurity Fundamentals/11. Case Study Revamping Cybersecurity Strategy at TechNova.mp4 44.9 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/5. Intersection of AI and Cybersecurity/11. Case Study Integrating AI for Enhanced Cybersecurity.mp4 44.4 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/7. Deep Learning for Cyber Defense/2. Neural Networks in Cybersecurity.mp4 44.2 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/11. AI for Threat Hunting/8. Case Studies and Examples.mp4 43.8 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/8. Natural Language Processing in Cybersecurity/3. Case Study Enhancing Cybersecurity Threat Intelligence.mp4 43.7 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/6. Machine Learning in Cybersecurity/2. Supervised Learning for Threat Detection.mp4 43.5 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/8. Natural Language Processing in Cybersecurity/11. Case Study Overcoming NLP Limitations in Cybersecurity.mp4 43.5 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/14. AI and Cyber Threat Intelligence/6. Theoretical Models and Techniques.mp4 43.4 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/9. Reinforcement Learning in Cyber Defense/5. Case Study Revolutionizing Cybersecurity with Reinforcement Learning.mp4 43.2 MB
  • mp4[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/2. Introduction to Cybersecurity and AI/7. Case Study AI in Cybersecurity.mp4 42.9 MB
【文档书籍】 Nichols L. Cybersecurity Architect's Handbook. An end-to-end guide...2024
收录时间:2024-07-11 文档个数:2 文档大小:63.6 MB 最近下载:2024-10-05 人气:1264 磁力链接
  • pdfNichols L. Cybersecurity Architect's Handbook. An end-to-end guide...2024.pdf 46.6 MB
  • pdfNichols L. Cybersecurity Accompaniment. Labs and Exercises.pdf 17.0 MB
【影视】 Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training
收录时间:2024-07-04 文档个数:135 文档大小:2.5 GB 最近下载:2024-10-03 人气:275 磁力链接
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/6. Azure Security Benchmark - Microsoft Certified Cybersecurity-1.mp4 113.5 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/2. Hybrid Environmental Security Strategies - Microsoft Certifi.mp4 63.8 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/1. Specify Priorities for Mitigating Threats to Apps - Microsof-1.mp4 62.3 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/6. Designing a Regulatory Compliance Strategy/4. Implementing Azure Policy - Microsoft Certified Cybersecurit.mp4 59.0 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/7. Evaluating and Managing Security Postures/6. Mitigating Identified Risks - Microsoft Certified Cybersecur-1.mp4 53.6 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/4. Traffic Filtering and Segmentation Strategies - Microsoft Ce-1.mp4 53.4 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/4. Priorities For Mitigating Threats To Data - Microsoft Certif-1.mp4 53.4 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/5. Azure Best Practices for Network Security - Microsoft Certif-1.mp4 52.2 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/5. Hybrid Infrastructure - Microsoft Certified Cybersecurity Ar-1.mp4 50.4 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/6. Designing a Regulatory Compliance Strategy/6. Translating Privacy Requirements - Microsoft Certified Cyber.mp4 49.7 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/9. Designing a Strategy for Securing SaaS, PaaS, and IaaS Services/1. Security Baselines for SaaS, PaaS, and IaaS services - Micro.mp4 48.3 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/3. Translating Business Goals into Security Requirements - Micr.mp4 47.9 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/7. Securing Privileged Access Using RaMP - Microsoft Certified -1.mp4 47.8 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/2. Security Operations - Microsoft Certified Cybersecurity Arch-1.mp4 47.0 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/4. Designing a Security Operations Strategy/5. SIEMSOAR Strategy - Microsoft Certified Cybersecurity Archit.mp4 46.3 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/2. Translating Requirements - Microsoft Certified Cybersecurity.mp4 46.2 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/3. Security Strategy for Applications and APIs - Microsoft Cert-1.mp4 44.6 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/5. Designing an Identity Security Strategy/1. Strategy for Access to Cloud Resources - Microsoft Certified.mp4 43.0 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/7. Evaluating and Managing Security Postures/4. Designing Security for an Azure Landing Zone - Microsoft Cer.mp4 42.8 MB
  • mp4[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/4. Designing a Security Operations Strategy/3. Logging and Auditing Strategy - Microsoft Certified Cybersec.mp4 42.3 MB
【文档书籍】 Kaushik K. Advanced Techniques and Applications of Cybersecurity..Forensics 2025
收录时间:2024-06-23 文档个数:1 文档大小:33.5 MB 最近下载:2024-10-03 人气:1550 磁力链接
  • pdfKaushik K. Advanced Techniques and Applications of Cybersecurity & Forensics 2025.pdf 33.5 MB
【影视】 Coursera - Cybersecurity Operations Fundamentals Specialization 2024
收录时间:2024-06-08 文档个数:1 文档大小:2.0 GB 最近下载:2024-10-04 人气:586 磁力链接
  • Coursera - Cybersecurity Operations Fundamentals Specialization 2024Coursera - Cybersecurity Operations Fundamentals Specialization 2024 2.0 GB
【文档书籍】 Rajesh K. Ultimate Microsoft Cybersecurity Architect SC-100 Exam Guide...2024
收录时间:2024-06-06 文档个数:1 文档大小:39.4 MB 最近下载:2024-10-04 人气:2086 磁力链接
  • pdfRajesh K. Ultimate Microsoft Cybersecurity Architect SC-100 Exam Guide...2024.pdf 39.4 MB
【影视】 Cybersecurity Prevention and Detection 2nd Edition (Video Collection)
收录时间:2024-06-02 文档个数:374 文档大小:3.8 GB 最近下载:2024-10-04 人气:1018 磁力链接
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/007. 1.6 Identity and access management.mp4 120.3 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/003. 1.2 Log ingestion Part 2.mp4 117.9 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/002. 1.1 Log ingestion Part 1.mp4 106.0 MB
  • mp403 Malware and Incident Response/Lesson 1 Threat Landscape/002. 1.1 Malware Threat Landscape.mp4 90.8 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/005. 1.4 Infrastructure concepts.mp4 89.3 MB
  • mp404 Secure Operations and Protections/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/004. 2.3 Technology and tool integration.mp4 87.2 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 2 Analyze Indicators of Potentially Malicious Activity/002. 2.1 Network-related.mp4 77.1 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/008. 1.7 Encryption.mp4 76.0 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/006. 3.5 Common techniques Part 3.mp4 63.7 MB
  • mp403 Malware and Incident Response/Lesson 5 PE File Identification/004. 5.3 Entry Points.mp4 62.4 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/004. 3.3 Common techniques Part 1.mp4 56.9 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/002. 1.1 Threat actors Part 1.mp4 53.5 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/004. 1.3 Operating system (OS) concepts.mp4 52.1 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/005. 3.4 Common techniques Part 2.mp4 51.1 MB
  • mp402 System and Privacy Data Protection/Lesson 4 Analyzing Logs and Impact Analysis/008. 4.7 Impact Analysis.mp4 51.0 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/007. 7.6 SOC and FPGA.mp4 50.5 MB
  • mp404 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/006. 1.5 Network architecture.mp4 50.1 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/010. 7.9 Industrial Control Systems (ICS) and Process Automation.mp4 46.2 MB
  • mp401 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/004. 7.3 Internet of Things (IoT) and Embedded Devices Part 2.mp4 45.3 MB
  • mp404 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/013. 4.12 Threat modeling.mp4 43.6 MB
【文档书籍】 Bodungen Clint - ChatGPT for Cybersecurity Cookbook - 2024
收录时间:2024-05-16 文档个数:2 文档大小:41.3 MB 最近下载:2024-10-04 人气:1178 磁力链接
  • pdfBodungen Clint - ChatGPT for Cybersecurity Cookbook - 2024.pdf 28.5 MB
  • epubBodungen Clint - ChatGPT for Cybersecurity Cookbook - 2024.epub 12.8 MB
【影视】 [ FreeCourseWeb.com ] Translating Cybersecurity for SMBs - Using the NIST Cybersecurity Framework 2.0
收录时间:2024-05-03 文档个数:43 文档大小:127.0 MB 最近下载:2024-10-05 人气:1083 磁力链接
  • mp4~Get Your Files Here !/05 - 4. Identify/01 - Understand what you have.mp4 10.7 MB
  • mp4~Get Your Files Here !/04 - 3. Govern/02 - Roll out your guidance.mp4 8.8 MB
  • mp4~Get Your Files Here !/11 - Conclusion/01 - Build cybersecurity into your business.mp4 8.5 MB
  • mp4~Get Your Files Here !/04 - 3. Govern/01 - Set your cyber strategy.mp4 8.1 MB
  • mp4~Get Your Files Here !/06 - 5. Protect/02 - Guard your network.mp4 7.0 MB
  • mp4~Get Your Files Here !/06 - 5. Protect/01 - Secure your system.mp4 7.0 MB
  • mp4~Get Your Files Here !/07 - 6. Detect/01 - Know when things are off.mp4 6.9 MB
  • mp4~Get Your Files Here !/08 - 7. Respond/01 - Address cyber incidents.mp4 6.7 MB
  • mp4~Get Your Files Here !/08 - 7. Respond/02 - Keep everyone in the loop.mp4 6.7 MB
  • mp4~Get Your Files Here !/09 - 8. Recover/01 - Get back to normal.mp4 6.6 MB
  • mp4~Get Your Files Here !/03 - 2. NIST Cybersecurity Framework 2.0/01 - Cybersecurity framework fundamentals.mp4 6.3 MB
  • mp4~Get Your Files Here !/10 - 9. Build Cyber Capabilities/01 - Determine your tier.mp4 6.2 MB
  • mp4~Get Your Files Here !/02 - 1. Cybersecurity in Your Business/02 - Understand your cyber risks.mp4 6.0 MB
  • mp4~Get Your Files Here !/03 - 2. NIST Cybersecurity Framework 2.0/02 - Leverage the cybersecurity framework.mp4 5.9 MB
  • mp4~Get Your Files Here !/10 - 9. Build Cyber Capabilities/02 - Define your profile.mp4 5.9 MB
  • mp4~Get Your Files Here !/02 - 1. Cybersecurity in Your Business/01 - Cornerstones of cybersecurity.mp4 5.4 MB
  • mp4~Get Your Files Here !/02 - 1. Cybersecurity in Your Business/03 - Prioritize your biggest risks.mp4 4.9 MB
  • mp4~Get Your Files Here !/10 - 9. Build Cyber Capabilities/03 - Create a plan.mp4 3.4 MB
  • mp4~Get Your Files Here !/01 - Introduction/02 - What you should know.mp4 3.0 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Leverage the NIST CSF to protect what matters most.mp4 2.7 MB
【影视】 [Coursera] Python for Cybersecurity Specialization - 5 course series
收录时间:2024-05-03 文档个数:290 文档大小:1.2 GB 最近下载:2024-10-04 人气:2933 磁力链接
  • mp4command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_03_alternative-protocol.mp4 61.8 MB
  • mp4credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_05_network-sniffing.mp4 42.0 MB
  • mp4pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_04_network-scanning.mp4 32.5 MB
  • mp4python-for-active-defense/02_python-for-active-defense-network/01_network/01_05_protocol-decoding.mp4 31.5 MB
  • mp4python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_07_behavioral-analytics.mp4 29.2 MB
  • mp4execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_03_registry-autorun.mp4 29.0 MB
  • mp4execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_05_hijacked-execution-flow.mp4 27.5 MB
  • mp4pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_06_dns-exploration.mp4 27.3 MB
  • mp4python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_05_system-activity-monitoring.mp4 26.6 MB
  • mp4python-for-active-defense/02_python-for-active-defense-network/01_network/01_03_pcap-collection.mp4 26.0 MB
  • mp4command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_03_encrypted-channel.mp4 25.8 MB
  • mp4execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_05_scheduled-execution.mp4 25.8 MB
  • mp4credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_03_user-account-discovery.mp4 25.4 MB
  • mp4execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_03_logon-scripts.mp4 24.6 MB
  • mp4command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_03_data-encryption.mp4 23.6 MB
  • mp4execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_05_alternate-data-streams.mp4 22.4 MB
  • mp4pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_03_default-account-discovery.mp4 21.7 MB
  • mp4pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_05_autorun-scripts.mp4 21.2 MB
  • mp4execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_03_impair-avs.mp4 20.8 MB
  • mp4credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_03_credentials-from-web-browsers.mp4 20.7 MB
【影视】 [Coursera] Advanced Python Scripting for Cybersecurity Specialization - 3 course series
收录时间:2024-05-03 文档个数:97 文档大小:947.7 MB 最近下载:2024-10-04 人气:2723 磁力链接
  • mp4defensive-python/01_defensive-python onehack.us/01_defensive-python/01_04_detecting-ssh-brute-force-with-scapy.mp4 49.7 MB
  • mp4defensive-python/01_defensive-python onehack.us/01_defensive-python/01_07_connection-hijacking-with-scapy.mp4 48.4 MB
  • mp4python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_02_generating-password-variations-with-python.mp4 46.5 MB
  • mp4python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_05_service-detection-with-python.mp4 45.6 MB
  • mp4defensive-python/01_defensive-python onehack.us/01_defensive-python/01_05_feature-selection-for-traffic-analysis.mp4 45.2 MB
  • mp4establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_03_searching-the-registry-with-python.mp4 45.2 MB
  • mp4python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_02_querying-shodan-with-python.mp4 44.0 MB
  • mp4establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_02_traffic-analysis-with-python.mp4 43.7 MB
  • mp4python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_04_network-scanning-with-scapy.mp4 38.8 MB
  • mp4defensive-python/01_defensive-python onehack.us/01_defensive-python/01_02_brute-force-detection-with-windows-events.mp4 38.8 MB
  • mp4defensive-python/01_defensive-python onehack.us/01_defensive-python/01_03_detecting-ftp-brute-force-with-scapy.mp4 35.1 MB
  • mp4establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_04_searching-the-system-with-python.mp4 34.9 MB
  • mp4establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_02_dumping-chrome-credentials-with-python.mp4 34.8 MB
  • mp4establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_06_analyzing-passwords-with-python.mp4 34.5 MB
  • mp4python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_03_dns-queries-with-python.mp4 30.9 MB
  • mp4defensive-python/01_defensive-python onehack.us/01_defensive-python/01_06_detecting-anomalous-network-traffic-with-scapy.mp4 28.8 MB
  • mp4establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_05_building-c2-packets-with-python.mp4 27.1 MB
  • mp4python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_04_automating-brute-force.mp4 25.9 MB
  • mp4establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_05_cracking-the-linux-passwords-with-python.mp4 24.4 MB
  • mp4establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_04_detecting-encodings-with-python.mp4 24.1 MB
【压缩文件】 SEC595 - Applied Data Science and AI Machine Learning for Cybersecurity Professionals
收录时间:2024-05-02 文档个数:7 文档大小:26.1 GB 最近下载:2024-10-04 人气:1707 磁力链接
  • 7zUSB 2021/595.7z 21.3 GB
  • mp4LIVE 2021/5. Day Five.mp4 1.2 GB
  • mp4LIVE 2021/1. Day One.mp4 1.1 GB
  • mp4LIVE 2021/2. Day Two.mp4 903.0 MB
  • mp4LIVE 2021/3. Day Three.mp4 858.8 MB
  • mp4LIVE 2021/4. Day Four.mp4 784.1 MB
  • pdfPDF 2021/SEC595-Applied-Data-Science-and-Machine-Learning-for-Cybersecurity-Professionals.pdf 61.3 MB
【文档书籍】 [ FreeCourseWeb.com ] Cybersecurity Unlocked! - Strategies To Outsmart Hackers, and Online Criminals
收录时间:2024-04-20 文档个数:3 文档大小:95.2 MB 最近下载:2024-10-03 人气:3507 磁力链接
  • pdf~Get Your Files Here !/B0CW1D7MVY.pdf 95.2 MB
  • txt~Get Your Files Here !/Bonus Resources.txt 386 Bytes
  • urlGet Bonus Downloads Here.url 183 Bytes
【文档书籍】 Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection by Shilpa Mahajan EPUB
收录时间:2024-04-18 文档个数:1 文档大小:55.6 MB 最近下载:2024-10-04 人气:1764 磁力链接
  • epubApplying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection by Shilpa Mahajan.epub 55.6 MB
共15页 上一页 1 2 3 4 5 下一页

友情链接