2048BT

为您索检到172条磁力链接,耗时0毫秒。

★注意★本站地址随时可能失效

找到本站最新地址的两种方法: 1、记住地址发布页2048bt.cc2048bt.cyoubt搜索.xyzbt搜索.cc 2、发送“地址”到2048bt@gmail.com
【影视】 [ FreeCourseWeb.com ] Udemy - Cybersecurity Habits Masterclass
收录时间:2021-08-03 文档个数:93 文档大小:2.1 GB 最近下载:2024-10-01 人气:1509 磁力链接
  • mp4~Get Your Files Here !/3. Skepticism/4. Slow Down And Frown.mp4 73.5 MB
  • mp4~Get Your Files Here !/11. Conclusion/1. Well Awareiors.mp4 71.5 MB
  • mp4~Get Your Files Here !/1. Introduction/1. Introduction.mp4 67.0 MB
  • mp4~Get Your Files Here !/4. Vigilance/2. The Only Thing We Have To Fear.mp4 66.7 MB
  • mp4~Get Your Files Here !/4. Vigilance/1. The Face Of The Enemy.mp4 66.5 MB
  • mp4~Get Your Files Here !/5. Secrecy/2. Making It Personal.mp4 65.7 MB
  • mp4~Get Your Files Here !/2. Literacy/5. Habits And Recipes.mp4 64.7 MB
  • mp4~Get Your Files Here !/3. Skepticism/1. Zero Trust.mp4 64.5 MB
  • mp4~Get Your Files Here !/8. Community/4. Habits And Recipes.mp4 57.4 MB
  • mp4~Get Your Files Here !/8. Community/1. United We Stand.mp4 54.0 MB
  • mp4~Get Your Files Here !/7. Diligence/3. Random Acts of Security.mp4 53.4 MB
  • mp4~Get Your Files Here !/7. Diligence/2. Journaling.mp4 53.4 MB
  • mp4~Get Your Files Here !/9. Mirroring/5. Habits And Recipes.mp4 52.0 MB
  • mp4~Get Your Files Here !/6. Culture/1. Culture Eats Cybersecurity For Breakfast.mp4 51.4 MB
  • mp4~Get Your Files Here !/10. Deception/1. Know Thy Enemy.mp4 49.4 MB
  • mp4~Get Your Files Here !/9. Mirroring/3. Blindspots.mp4 49.1 MB
  • mp4~Get Your Files Here !/3. Skepticism/2. The Pygmailion Effect.mp4 48.9 MB
  • mp4~Get Your Files Here !/6. Culture/5. Habits And Recipes.mp4 48.0 MB
  • mp4~Get Your Files Here !/2. Literacy/1. Fearless Learning.mp4 47.9 MB
  • mp4~Get Your Files Here !/6. Culture/2. The Hermit Crab Shell.mp4 46.7 MB
【影视】 [ DevCourseWeb.com ] CBTNuggets - (ISC)2 CC - Certified in Cybersecurity - (ISC)2 Certification Training
收录时间:2023-07-04 文档个数:68 文档大小:2.1 GB 最近下载:2024-10-05 人气:7132 磁力链接
  • mp4~Get Your Files Here !/1. Understanding Information Assurance/1. Understanding Information Assurance - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 69.9 MB
  • mp4~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/1. Power - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 65.3 MB
  • mp4~Get Your Files Here !/7. Discussing Network Security Infrastructure/1. Network Segmentation - (ISC)² CC – Certified in Cybersecurity CBT Nuggets-1.mp4 58.2 MB
  • mp4~Get Your Files Here !/8. Exploring Network Threats and Attacks/6. Firewalls - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 54.7 MB
  • mp4~Get Your Files Here !/8. Exploring Network Threats and Attacks/3. Intrusion Detection Prevention Systems (IDSIPS) - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 54.0 MB
  • mp4~Get Your Files Here !/5. Exploring Security Policies and Training/7. Security Awareness Training - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 52.0 MB
  • mp4~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/3. Heating, Ventilation and Air Conditioning (HVAC) - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 48.1 MB
  • mp4~Get Your Files Here !/9. Understanding Computer Networking/4. IP Addresses - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 47.5 MB
  • mp4~Get Your Files Here !/6. Understanding Data Security and System Hardening/2. Types of Encryption - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 46.4 MB
  • mp4~Get Your Files Here !/7. Discussing Network Security Infrastructure/7. The Cloud - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 45.7 MB
  • mp4~Get Your Files Here !/8. Exploring Network Threats and Attacks/5. Vulnerability Scanning - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 45.5 MB
  • mp4~Get Your Files Here !/9. Understanding Computer Networking/3. TCPIP Model - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 42.9 MB
  • mp4~Get Your Files Here !/6. Understanding Data Security and System Hardening/7. Configuration Management - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 41.6 MB
  • mp4~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/2. Data Centers and Closets - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 40.4 MB
  • mp4~Get Your Files Here !/1. Understanding Information Assurance/2. Methods of Authentication - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 40.0 MB
  • mp4~Get Your Files Here !/2. Discussing Risk Management, Controls, Ethics and Governance/4. Security Control Categories - (ISC)² CC – Certified in Cybersecurity CBT Nuggets-1.mp4 39.3 MB
  • mp4~Get Your Files Here !/6. Understanding Data Security and System Hardening/3. Data Hashing with Encryption - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 38.3 MB
  • mp4~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/5. Redundancy - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 38.2 MB
  • mp4~Get Your Files Here !/3. Exploring BC, DR & IR Concepts/6. Incident Response - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 37.9 MB
  • mp4~Get Your Files Here !/4. Reviewing Access Control Concepts/6. Types of Access Control - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4 36.8 MB
【影视】 [ DevCourseWeb.com ] Udemy - Selection and Implementation of Cybersecurity Risks Controls
收录时间:2023-12-25 文档个数:36 文档大小:2.0 GB 最近下载:2024-10-05 人气:4991 磁力链接
  • mp4~Get Your Files Here !/2. SECTION-2/8. 19- The role of governance in the effective selection and implementation of cybe.mp4 142.9 MB
  • mp4~Get Your Files Here !/2. SECTION-2/14. 23-Selecting and implementing cybersecurity controls based on NIST CSF PT2.mp4 122.4 MB
  • mp4~Get Your Files Here !/2. SECTION-2/16. 25- Measuring the effectiveness of implemented controls.mp4 117.4 MB
  • mp4~Get Your Files Here !/2. SECTION-2/17. Putting it all together-The Selection and Implementation of Cyber Risks controls.mp4 115.7 MB
  • mp4~Get Your Files Here !/1. Introduction/10. 9-Key considerations for the identification- selection & implementation of contr.mp4 101.8 MB
  • mp4~Get Your Files Here !/1. Introduction/7. 6-Approach to Control Selection_ pt2.mp4 94.1 MB
  • mp4~Get Your Files Here !/2. SECTION-2/9. 20-Why not implement frameworks that already have recommended controls.mp4 90.3 MB
  • mp4~Get Your Files Here !/2. SECTION-2/15. 24-Implementation Plan for selected controls.mp4 87.1 MB
  • mp4~Get Your Files Here !/2. SECTION-2/11. 21-Challenges, & considerations associated with implementing frameworks-pt2.mp4 82.9 MB
  • mp4~Get Your Files Here !/1. Introduction/11. 10-Risk Assessment-BIA, Control Selection, Cost Benefit Analysis.mp4 81.1 MB
  • mp4~Get Your Files Here !/1. Introduction/9. 8-Introduction to security controls.mp4 77.4 MB
  • mp4~Get Your Files Here !/2. SECTION-2/7. 18-Documenting Cybersecurity Risk Assessment Report-Pt2.mp4 75.5 MB
  • mp4~Get Your Files Here !/2. SECTION-2/5. 17-Determine likelihood, Impact, Calculate risk.mp4 72.4 MB
  • mp4~Get Your Files Here !/2. SECTION-2/13. 23-Selecting and implementing cybersecurity controls based on NIST CSF PT1.mp4 62.9 MB
  • mp4~Get Your Files Here !/1. Introduction/12. 11-Cost Benefit Analysis associated with controls selection.mp4 58.3 MB
  • mp4~Get Your Files Here !/2. SECTION-2/3. 15-Steps involved in assessing the identified cyber risks in web server.mp4 55.0 MB
  • mp4~Get Your Files Here !/2. SECTION-2/1. 14-High-level process of selecting controls to protect ecommerce web server-Pt1.mp4 54.5 MB
  • mp4~Get Your Files Here !/1. Introduction/14. 13-Regulatory Compliance, Incident Response Planning.mp4 53.9 MB
  • mp4~Get Your Files Here !/1. Introduction/13. 12- Technology integration, operational impact, continuous monitoring, employee.mp4 52.8 MB
  • mp4~Get Your Files Here !/2. SECTION-2/6. 18- Documenting Cybersecurity Risk Assessment Report-Pt1.mp4 50.4 MB
【影视】 Palo Alto Networks Cybersecurity Fundamentals (PCCSA)
收录时间:2024-03-15 文档个数:52 文档大小:2.0 GB 最近下载:2024-10-05 人气:2428 磁力链接
  • mp4Chapter 1 Cybersecurity Fundamentals and Threat Landscape/002. Identify Computing and Networking Trends.mp4 118.2 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/006. Identify Networking Security Technologies.mp4 114.7 MB
  • mp4Chapter 1 Cybersecurity Fundamentals and Threat Landscape/003. Describe Cybersecurity Threats.mp4 108.3 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/004. Review Network Addressing.mp4 105.2 MB
  • mp4Chapter 1 Cybersecurity Fundamentals and Threat Landscape/005. Identify Wi-Fi Vulnerabilities and Attacks.mp4 100.1 MB
  • mp4Chapter 1 Cybersecurity Fundamentals and Threat Landscape/004. Describe Common Cyberattack Techniques.mp4 96.3 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/011. Endpoint Security.mp4 95.3 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/002. Describe Routing Protocols.mp4 91.8 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/001. Identify Basic Internet and Network Operations.mp4 90.7 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/012. Server and System Administration.mp4 90.3 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/003. Review Networking Models.mp4 88.4 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/009. Learn Basic Virtualization Security Concepts.mp4 83.8 MB
  • mp4Chapter 3 Palo Alto Networks Security Solutions and Technologies/007. Describe Cortex XSOAR and AutoFocus.mp4 79.5 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/008. Learn Basic Cloud Security Concepts.mp4 75.4 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/010. Learn Basic DevOps Security Concepts.mp4 75.3 MB
  • mp4Chapter 3 Palo Alto Networks Security Solutions and Technologies/001. Identify Palo Alto Networks Security Solutions.mp4 74.3 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/005. Learn Networking Security Models.mp4 72.6 MB
  • mp4Chapter 3 Palo Alto Networks Security Solutions and Technologies/002. Describe Basic NGFW Components and Functions.mp4 67.1 MB
  • mp4Chapter 2 Networking Fundamentals and Cybersecurity Practices/007. Learn Basic Data Center Security Concepts.mp4 60.2 MB
  • mp4Chapter 3 Palo Alto Networks Security Solutions and Technologies/003. Learn Basic Prisma Cloud.mp4 59.7 MB
【影视】 Coursera - Cybersecurity Operations Fundamentals Specialization 2024
收录时间:2024-06-08 文档个数:1 文档大小:2.0 GB 最近下载:2024-10-04 人气:586 磁力链接
  • Coursera - Cybersecurity Operations Fundamentals Specialization 2024Coursera - Cybersecurity Operations Fundamentals Specialization 2024 2.0 GB
【影视】 [ DevCourseWeb.com ] Udemy - Industrial Cybersecurity Controls As per IEC62443
收录时间:2022-05-03 文档个数:24 文档大小:1.8 GB 最近下载:2024-10-04 人气:3417 磁力链接
  • mp4~Get Your Files Here !/2. Authentication & Authorization Technologies/3. Password Authentication.mp4 269.6 MB
  • mp4~Get Your Files Here !/1. IEC 62443 Basic Introduction/1. Introduction About IEC.mp4 214.6 MB
  • mp4~Get Your Files Here !/2. Authentication & Authorization Technologies/2. Role Based Access Control.mp4 200.8 MB
  • mp4~Get Your Files Here !/2. Authentication & Authorization Technologies/4. Challengeresponse Authentication.mp4 199.5 MB
  • mp4~Get Your Files Here !/2. Authentication & Authorization Technologies/5. Physical Token Authentication.mp4 182.0 MB
  • mp4~Get Your Files Here !/2. Authentication & Authorization Technologies/6. Smart Card Authentication.mp4 181.6 MB
  • mp4~Get Your Files Here !/2. Authentication & Authorization Technologies/7. Biometric Authentication.mp4 178.0 MB
  • mp4~Get Your Files Here !/2. Authentication & Authorization Technologies/9. Password Distribution & Management.mp4 131.1 MB
  • mp4~Get Your Files Here !/2. Authentication & Authorization Technologies/8. Location Based Authentication.mp4 101.2 MB
  • mp4~Get Your Files Here !/2. Authentication & Authorization Technologies/1. Authentication & Authorization Briefing.mp4 99.7 MB
  • mp4~Get Your Files Here !/2. Authentication & Authorization Technologies/10. Device to Device Authentication.mp4 57.7 MB
  • srt~Get Your Files Here !/2. Authentication & Authorization Technologies/3. Password Authentication.srt 22.9 kB
  • srt~Get Your Files Here !/2. Authentication & Authorization Technologies/9. Password Distribution & Management.srt 22.1 kB
  • srt~Get Your Files Here !/2. Authentication & Authorization Technologies/6. Smart Card Authentication.srt 17.2 kB
  • srt~Get Your Files Here !/2. Authentication & Authorization Technologies/7. Biometric Authentication.srt 14.9 kB
  • srt~Get Your Files Here !/2. Authentication & Authorization Technologies/4. Challengeresponse Authentication.srt 13.8 kB
  • srt~Get Your Files Here !/1. IEC 62443 Basic Introduction/1. Introduction About IEC.srt 13.5 kB
  • srt~Get Your Files Here !/2. Authentication & Authorization Technologies/8. Location Based Authentication.srt 13.1 kB
  • srt~Get Your Files Here !/2. Authentication & Authorization Technologies/2. Role Based Access Control.srt 13.0 kB
  • srt~Get Your Files Here !/2. Authentication & Authorization Technologies/5. Physical Token Authentication.srt 11.9 kB
【影视】 [ DevCourseWeb.com ] Udemy - Find Cybersecurity Jobs Using LinkedIn
收录时间:2021-12-31 文档个数:29 文档大小:1.7 GB 最近下载:2024-09-30 人气:2150 磁力链接
  • mp4~Get Your Files Here !/02 - Reviewing Cybersecurity Jobs/001 Reviewing a Junior Penetration Testing (Ethical Hacking) Job.mp4 398.9 MB
  • mp4~Get Your Files Here !/05 - Personal Branding/001 Personal Branding.mp4 397.6 MB
  • mp4~Get Your Files Here !/02 - Reviewing Cybersecurity Jobs/002 Reviewing a GRC Analyst and Auditor Role.mp4 333.9 MB
  • mp4~Get Your Files Here !/03 - Your LinkedIn Profile/001 LinkedIn Profile Overview.mp4 183.6 MB
  • mp4~Get Your Files Here !/06 - LinkedIn Messaging and the Power of Networking/001 LinkedIn Messaging and the Power of Proper Networking.mp4 89.5 MB
  • mp4~Get Your Files Here !/07 - What did you learn in this course_/001 What did you learn in this course_.mp4 80.3 MB
  • mp3~Get Your Files Here !/05 - Personal Branding/37808632-Personal-Branding.mp3 55.3 MB
  • mp3~Get Your Files Here !/02 - Reviewing Cybersecurity Jobs/37807394-Pentester-search.mp3 48.8 MB
  • mp3~Get Your Files Here !/02 - Reviewing Cybersecurity Jobs/37807890-GRC-1.mp3 44.6 MB
  • mp4~Get Your Files Here !/04 - Using Canva for Your Cover Photo/001 How to use Canva for your LinkedIn cover photo.mp4 41.1 MB
  • mp4~Get Your Files Here !/01 - Introduction/001 Welcome and What You Will Learn in this Course.mp4 29.2 MB
  • mp3~Get Your Files Here !/04 - Using Canva for Your Cover Photo/37808202-Canva-audio-file.mp3 4.5 MB
  • mp3~Get Your Files Here !/01 - Introduction/37806270-Course-Introduction-1.mp3 1.2 MB
  • vtt~Get Your Files Here !/05 - Personal Branding/001 Personal Branding_en.vtt 95.6 kB
  • vtt~Get Your Files Here !/02 - Reviewing Cybersecurity Jobs/001 Reviewing a Junior Penetration Testing (Ethical Hacking) Job_en.vtt 85.1 kB
  • docx~Get Your Files Here !/05 - Personal Branding/37808618-Personal-Branding-1.mp4.docx 82.5 kB
  • vtt~Get Your Files Here !/02 - Reviewing Cybersecurity Jobs/002 Reviewing a GRC Analyst and Auditor Role_en.vtt 77.3 kB
  • docx~Get Your Files Here !/02 - Reviewing Cybersecurity Jobs/37807406-Pentester-search-1.mp4.docx 74.7 kB
  • docx~Get Your Files Here !/02 - Reviewing Cybersecurity Jobs/37807876-GRC.mp4.docx 68.1 kB
  • vtt~Get Your Files Here !/03 - Your LinkedIn Profile/001 LinkedIn Profile Overview_en.vtt 53.7 kB
【影视】 Cyber Security 2023 Bundle Fundamentals of Cybersecurity
收录时间:2023-03-28 文档个数:177 文档大小:1.6 GB 最近下载:2024-10-05 人气:15001 磁力链接
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/4 - Cyber Security Networking 101/15 - Networking 03.mp4 86.7 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/10 - Web Attack 101/64 - Web Application Attack 02.mp4 62.7 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/7 - Network Security 101/42 - Network Pentesting 13.mp4 51.6 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/9 - Web Application 101/53 - Web App 02.mp4 48.5 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/8 - Security Technologies/49 - Tech 02.mp4 48.5 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/5 - Kali Linux 101/22 - Linux 03.mp4 43.9 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/7 - Network Security 101/39 - Network Pentesting 10.mp4 43.8 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/7 - Network Security 101/38 - Network Pentesting 09.mp4 39.9 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/10 - Web Attack 101/74 - Web Application Attack 12.mp4 39.8 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/7 - Network Security 101/34 - Network Pentesting 05.mp4 36.3 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/5 - Kali Linux 101/21 - Linux 02.mp4 33.9 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/4 - Cyber Security Networking 101/17 - Networking 05.mp4 31.8 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/10 - Web Attack 101/73 - Web Application Attack 11.mp4 31.4 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/7 - Network Security 101/47 - Network Pentesting 18.mp4 31.4 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/10 - Web Attack 101/68 - Web Application Attack 06.mp4 29.8 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/7 - Network Security 101/37 - Network Pentesting 08.mp4 29.1 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/7 - Network Security 101/31 - Network Pentesting 02.mp4 28.7 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/3 - Cyber Lab Environment/6 - TOOL 01.mp4 28.0 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/10 - Web Attack 101/67 - Web Application Attack 05.mp4 25.5 MB
  • mp4[TutsNode.net] - Cyber Security 2023 Bundle Fundamentals of Cybersecurity/10 - Web Attack 101/71 - Web Application Attack 09.mp4 25.2 MB
【影视】 [ FreeCourseWeb.com ] Cisco Certified Support Technician (CCST) - Cybersecurity
收录时间:2023-08-31 文档个数:40 文档大小:1.6 GB 最近下载:2024-10-04 人气:4829 磁力链接
  • mp4~Get Your Files Here !/4. Endpoint Security Concepts/3. NTFS and share permissions.mp4 152.4 MB
  • mp4~Get Your Files Here !/4. Endpoint Security Concepts/7. Patches and updates.mp4 84.6 MB
  • mp4~Get Your Files Here !/2. Essential Security Principles/5. Secure passwords.mp4 74.3 MB
  • mp4~Get Your Files Here !/4. Endpoint Security Concepts/4. Netstat, nslookup, tcpdump.mp4 70.3 MB
  • mp4~Get Your Files Here !/4. Endpoint Security Concepts/5. Verify that endpoint systems meet security policies and standards.mp4 66.6 MB
  • mp4~Get Your Files Here !/3. Basic network security concepts/11. VPN - lab.mp4 61.4 MB
  • mp4~Get Your Files Here !/4. Endpoint Security Concepts/1. Windows Firewall.mp4 60.7 MB
  • mp4~Get Your Files Here !/3. Basic network security concepts/8. IPS and IDS.mp4 57.8 MB
  • mp4~Get Your Files Here !/3. Basic network security concepts/6. IP addresses and NAT.mp4 53.6 MB
  • mp4~Get Your Files Here !/2. Essential Security Principles/1. Basic terms.mp4 50.7 MB
  • mp4~Get Your Files Here !/2. Essential Security Principles/3. RADIUS.mp4 50.4 MB
  • mp4~Get Your Files Here !/5. Incident Handling/3. Malware.mp4 45.2 MB
  • mp4~Get Your Files Here !/3. Basic network security concepts/2. MAC and ARP.mp4 45.0 MB
  • mp4~Get Your Files Here !/3. Basic network security concepts/1. Describe TCPIP protocol vulnerabilities.mp4 44.0 MB
  • mp4~Get Your Files Here !/2. Essential Security Principles/8. Hashing.mp4 43.3 MB
  • mp4~Get Your Files Here !/5. Incident Handling/2. Encryption.mp4 43.2 MB
  • mp4~Get Your Files Here !/2. Essential Security Principles/7. Encryption.mp4 43.2 MB
  • mp4~Get Your Files Here !/2. Essential Security Principles/9. Certificates.mp4 42.7 MB
  • mp4~Get Your Files Here !/2. Essential Security Principles/2. Authentication, authorization, and accounting (AAA).mp4 39.6 MB
  • mp4~Get Your Files Here !/5. Incident Handling/5. Confidentiality integrity availability.mp4 39.5 MB
【影视】 [ FreeCourseWeb.com ] Udemy - Master Cybersecurity,Ethical Hacking and Penetrating Testing
收录时间:2021-09-04 文档个数:50 文档大小:1.6 GB 最近下载:2024-10-03 人气:4902 磁力链接
  • mp4~Get Your Files Here !/04 Exposing Hackers - Know Your Enemy/002 Why You Need Security _.mp4 189.8 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/011 Setting up Labs.mp4 169.5 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/003 What is Privacy, Anonymity and Pseudonymity _.mp4 158.8 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/006 Threat Modelling And Risk Assessment.mp4 158.3 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/008 Confidentiality, Integrity and Availability - (Security Attributes).mp4 141.8 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/004 Security, Vulnerabilities, Threats and Adversaries.mp4 117.8 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/005 Asset Selection.mp4 94.5 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/002 Protect What You Value.mp4 93.7 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/010 Zero Trust Model.mp4 85.7 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/007 Security,Anonymity and Privacy.mp4 59.8 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/001 What is Cybersecurity _.mp4 34.8 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/009 Defence in Depth.mp4 34.2 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/008 Who Conduct it _.mp4 26.4 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/002 What is Ethical Hacking _.mp4 25.8 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/005 Purpose of Studying Ethical Hacking and Penetrating Testing.mp4 24.3 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/010 Closure.mp4 23.6 MB
  • mp4~Get Your Files Here !/04 Exposing Hackers - Know Your Enemy/001 Goals and Learning Objectives - Know Your Enemy.mp4 21.8 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/009 Who should You Choose _.mp4 20.6 MB
  • mp4~Get Your Files Here !/03 Exposing Hackers - Know Yourself/001 Goals and Learning Objectives.mp4 19.7 MB
  • mp4~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/006 Scope For Ethical Hackers and Penetrating Testers.mp4 18.5 MB
【影视】 Microsoft Cybersecurity Pro Track Security in Office 365
收录时间:2021-01-11 文档个数:91 文档大小:1.5 GB 最近下载:2024-10-04 人气:7926 磁力链接
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/2. Introduction to Security in Office 365/1. Threat Vectors and Data Breaches.mp4 185.5 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/5. Implementing auditing, insights and alerts/3. Audit Log Investigations.mp4 155.5 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/3. Implementing and Managinng Microsoft Defender for Office 365 (Office 365 ATP)/1. Introduction to Exchange Online Protection.mp4 132.0 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/6. Advanced Security Management/1. Deploy Cloud Application Security.mp4 109.2 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/5. Implementing auditing, insights and alerts/5. Managing insights and alerts in the Security & Compliance Center.mp4 101.2 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/4. Using Office 365 Threat Intelligence/3. Threat Investigation and Response.mp4 91.3 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/3. Implementing and Managinng Microsoft Defender for Office 365 (Office 365 ATP)/3. Managing Safe Attachments.mp4 90.4 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/2. Introduction to Security in Office 365/3. Introduction to Secure Score.mp4 78.1 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/3. Implementing and Managinng Microsoft Defender for Office 365 (Office 365 ATP)/4. Managing Safe Links.mp4 75.1 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/3. Implementing and Managinng Microsoft Defender for Office 365 (Office 365 ATP)/2. Overview of Microsoft Defender for Office 365 (former named Office 365 ATP).mp4 64.5 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/6. Advanced Security Management/2. Use Cloud Application Security.mp4 63.1 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/4. Using Office 365 Threat Intelligence/2. Security (Threat) Dashboard.mp4 61.0 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/3. Implementing and Managinng Microsoft Defender for Office 365 (Office 365 ATP)/5. Monitoring and Reports.mp4 56.6 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/4. Using Office 365 Threat Intelligence/1. Overview of Office 365 Threat Intelligence.mp4 53.0 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/5. Implementing auditing, insights and alerts/2. Enabling mailbox auditing in Exchange Online.mp4 44.4 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/2. Introduction to Security in Office 365/2. Security Solutions in Office 365.mp4 37.2 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/5. Implementing auditing, insights and alerts/1. Overview of auditing in the Security & Compliance Center.mp4 34.8 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/1. Introduction/2. About the Course.mp4 32.8 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/5. Implementing auditing, insights and alerts/4. Enabling sharing auditing for SharePoint and OneDrive.mp4 30.7 MB
  • mp4[TutsNode.com] - Microsoft Cybersecurity Pro Track Security in Office 365/1. Introduction/3. Preparing the Lab Environment.mp4 25.1 MB
【影视】 Advanced Cybersecurity and Ethical Hacking with ChatGPT
收录时间:2023-12-22 文档个数:185 文档大小:1.5 GB 最近下载:2024-10-04 人气:13646 磁力链接
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/15 - CTF Challenges and Capture The Flag Events/48 - Introduction to Capture The Flag CTF Challenges.mp4 50.2 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/16 - Final Projects and Practical Assessments/52 - Building a Security Automation Workflow with ChatGPT.mp4 48.9 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/17 - Professional Development and Career Insights/55 - Navigating the Job Market and Advancing Your Cybersecurity Career.mp4 44.4 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/16 - Final Projects and Practical Assessments/53 - Penetration Testing Report Compilation with ChatGPT.mp4 39.3 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/17 - Professional Development and Career Insights/54 - Resume Building and Interview Preparation for Ethical Hackers.mp4 38.3 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/2 - Foundations of Cybersecurity and Hacking/7 - Operating System Fundamentals for Hacking and Penetration Testing.mp4 37.8 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/15 - CTF Challenges and Capture The Flag Events/49 - Solving CTF Challenges Using ChatGPT.mp4 37.3 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/5 - Vulnerability Identification and Assessment/17 - Network Vulnerability Scanning and Analysis with ChatGPT.mp4 36.8 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/1 - Section 1 Introduction to Cybersecurity and Ethical Hacking/4 - Understanding the Role of Ethical Hackers and Penetration Testers.mp4 36.4 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/11 - Case Studies and RealWorld Scenarios/36 - Ethical Hacking Case Studies Using ChatGPT.mp4 36.0 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/6 - Exploitation and Penetration Testing/21 - Penetration Testing Methodologies and Reporting.mp4 35.7 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/6 - Exploitation and Penetration Testing/20 - PostExploitation Techniques and Privilege Escalation.mp4 34.6 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/14 - Ethical Hacking in Cloud Environments/46 - Securing Containers and Serverless Architectures.mp4 34.5 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/3 - Getting Started with ChatGPT/10 - Setting Up and Configuring ChatGPT for Hacking Tasks.mp4 34.3 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/10 - Emerging Trends and Future of Cybersecurity/32 - Blockchain Security and Decentralized Technologies.mp4 33.2 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/13 - Cybersecurity Regulations and Compliance/43 - Conducting Compliance Audits with ChatGPT.mp4 33.0 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/7 - Advanced Ethical Hacking Techniques/24 - Wireless Network Hacking and Countermeasures Using ChatGPT.mp4 31.7 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/5 - Vulnerability Identification and Assessment/16 - Web Application Vulnerability Assessment Using ChatGPT.mp4 30.5 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/9 - ChatGPT for Security Innovation/28 - Leveraging ChatGPT for Threat Hunting and Analysis.mp4 30.1 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/3 - Getting Started with ChatGPT/11 - Navigating the ChatGPT Interface for Cybersecurity Analysis.mp4 28.8 MB
【影视】 [ CourseLala.com ] Udemy - Personal Digital Security Everyone Must Have - Cybersecurity
收录时间:2021-11-27 文档个数:76 文档大小:1.5 GB 最近下载:2024-09-30 人气:2320 磁力链接
  • mp4~Get Your Files Here !/02 - Secure your computer from unauthorized access/001 Social Engineering.mp4 157.3 MB
  • mp4~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/007 Secure your Wi-Fi at Home (Video HD).mp4 103.2 MB
  • mp4~Get Your Files Here !/02 - Secure your computer from unauthorized access/003 Use strong passwords.mp4 93.7 MB
  • mp4~Get Your Files Here !/03 - What is Malware and its types/003 Spyware.mp4 66.9 MB
  • mp4~Get Your Files Here !/06 - Secure your Smartphone/003 Communicating Securely with your Smartphone.mp4 64.7 MB
  • mp4~Get Your Files Here !/03 - What is Malware and its types/002 Adware.mp4 63.9 MB
  • mp4~Get Your Files Here !/05 - Email Security/002 Fishing.mp4 57.8 MB
  • mp4~Get Your Files Here !/02 - Secure your computer from unauthorized access/012 Be cautious.mp4 54.8 MB
  • mp4~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/002 Tips for buying online.mp4 46.0 MB
  • mp4~Get Your Files Here !/06 - Secure your Smartphone/001 Purses, Wallets, Smartphones.mp4 43.1 MB
  • mp4~Get Your Files Here !/03 - What is Malware and its types/001 Trojan Horse.mp4 39.6 MB
  • mp4~Get Your Files Here !/03 - What is Malware and its types/007 Scareware.mp4 39.5 MB
  • mp4~Get Your Files Here !/03 - What is Malware and its types/004 Browser Hijacking Software.mp4 37.3 MB
  • mp4~Get Your Files Here !/02 - Secure your computer from unauthorized access/008 Use a VPN.mp4 36.0 MB
  • mp4~Get Your Files Here !/03 - What is Malware and its types/005 Viruses.mp4 35.6 MB
  • mp4~Get Your Files Here !/01 - Introduction to Personal Digital Security/003 Some statistics.mp4 35.0 MB
  • mp4~Get Your Files Here !/02 - Secure your computer from unauthorized access/004 Use password manager.mp4 33.8 MB
  • mp4~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/001 Safe browsing.mp4 31.8 MB
  • mp4~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/008 Safe browsing in Social Networks.mp4 31.7 MB
  • mp4~Get Your Files Here !/01 - Introduction to Personal Digital Security/001 Introduction to Personal Digital Security.mp4 30.4 MB
【影视】 [ DevCourseWeb.com ] Cfe 101 - Cybersecurity For Everyone
收录时间:2023-09-25 文档个数:31 文档大小:1.5 GB 最近下载:2024-10-04 人气:2629 磁力链接
  • mp4~Get Your Files Here !/3 - Password Email Security/6 - Password Security.mp4 149.2 MB
  • mp4~Get Your Files Here !/5 - Mobile Device Remote Working Security/12 - Keeping Your Mobile Safe.mp4 132.7 MB
  • mp4~Get Your Files Here !/1 - Introduction Threats to Information Security/3 - Everyday Information Security Threats.mp4 112.7 MB
  • mp4~Get Your Files Here !/7 - Network Security/17 - Keep Your Network Safe.mp4 92.3 MB
  • mp4~Get Your Files Here !/1 - Introduction Threats to Information Security/1 - Cybersecurity for Everyone.mp4 90.0 MB
  • mp4~Get Your Files Here !/9 - Incident Response/19 - Incident Response.mp4 86.4 MB
  • mp4~Get Your Files Here !/5 - Mobile Device Remote Working Security/13 - Keeping Your Work Safe While Working Remotely.mp4 78.6 MB
  • mp4~Get Your Files Here !/6 - Physical Security/16 - When Safety Fails in the Real World.mp4 77.3 MB
  • mp4~Get Your Files Here !/3 - Password Email Security/7 - Securing Your Email Communications.mp4 74.6 MB
  • mp4~Get Your Files Here !/2 - Malware Security Policies/4 - Understanding Malware.mp4 70.1 MB
  • mp4~Get Your Files Here !/8 - Generative AI/18 - Generative AI.mp4 70.1 MB
  • mp4~Get Your Files Here !/4 - Social Engineering Phishing/11 - Spotting Dodging Phishing Scams.mp4 64.9 MB
  • mp4~Get Your Files Here !/2 - Malware Security Policies/5 - Why Security Policies Procedures Matter.mp4 62.2 MB
  • mp4~Get Your Files Here !/6 - Physical Security/15 - Staying Safe in the Real World.mp4 59.6 MB
  • mp4~Get Your Files Here !/4 - Social Engineering Phishing/10 - Understanding Combatting Phishing Attacks.mp4 55.8 MB
  • mp4~Get Your Files Here !/4 - Social Engineering Phishing/8 - Guarding Against Social Engineering.mp4 53.9 MB
  • mp4~Get Your Files Here !/4 - Social Engineering Phishing/9 - Staying Ahead of Social Engineering Scams.mp4 40.6 MB
  • mp4~Get Your Files Here !/10 - Conclusion/20 - Course Recap Next Steps.mp4 30.6 MB
  • mp4~Get Your Files Here !/5 - Mobile Device Remote Working Security/14 - Attacks on Remote Workers.mp4 29.5 MB
  • mp4~Get Your Files Here !/1 - Introduction Threats to Information Security/2 - Making the Most of This Course.mp4 21.3 MB
【影视】 [ FreeCourseWeb.com ] Udemy - Increasing Business Cybersecurity Standards immediately!
收录时间:2021-08-18 文档个数:66 文档大小:1.4 GB 最近下载:2024-09-29 人气:2628 磁力链接
  • mp4~Get Your Files Here !/03 Understanding Hacking Strategies/001 How does a Hacker look like_.mp4 151.3 MB
  • mp4~Get Your Files Here !/03 Understanding Hacking Strategies/005 Trends & Outlook.mp4 148.7 MB
  • mp4~Get Your Files Here !/07 Team Organisation/003 Sharing Files & Accounts.mp4 126.8 MB
  • mp4~Get Your Files Here !/07 Team Organisation/002 Communication Channels.mp4 116.3 MB
  • mp4~Get Your Files Here !/07 Team Organisation/001 Cybersecurity Awareness Communication.mp4 115.8 MB
  • mp4~Get Your Files Here !/10 ADDITIONAL CONTENT/003 Kids & the digital World.mp4 113.9 MB
  • mp4~Get Your Files Here !/07 Team Organisation/004 Login & Password Management.mp4 73.1 MB
  • mp4~Get Your Files Here !/10 ADDITIONAL CONTENT/002 Creating safe, secure and Data Protection compliant Products.mp4 72.3 MB
  • mp4~Get Your Files Here !/10 ADDITIONAL CONTENT/001 Security Standards.mp4 72.2 MB
  • mp4~Get Your Files Here !/06 Admin Duties/001 ToDo List.mp4 48.8 MB
  • mp4~Get Your Files Here !/02 The Data Processing Triangle/002 Data Protection.mp4 35.1 MB
  • mp4~Get Your Files Here !/02 The Data Processing Triangle/001 Overview.mp4 35.1 MB
  • mp4~Get Your Files Here !/09 The End/001 Closing Statement.mp4 31.3 MB
  • mp4~Get Your Files Here !/01 Introduction/001 Welcome!.mp4 28.6 MB
  • mp4~Get Your Files Here !/03 Understanding Hacking Strategies/004 War Stories.mp4 26.9 MB
  • mp4~Get Your Files Here !/08 Managing Client Data/003 Data Science Projects.mp4 24.7 MB
  • mp4~Get Your Files Here !/04 Securing Hardware/004 Your invisible Devices.mp4 21.1 MB
  • mp4~Get Your Files Here !/05 Securing Software & Accounts/002 Service Providers.mp4 19.1 MB
  • mp4~Get Your Files Here !/01 Introduction/002 Disclaimer.mp4 18.6 MB
  • mp4~Get Your Files Here !/05 Securing Software & Accounts/001 Daily used Accounts.mp4 18.0 MB
【影视】 [ DevCourseWeb.com ] Udemy - Deepfake Defense for Cybersecurity and GRC Professionals
收录时间:2024-03-22 文档个数:38 文档大小:1.4 GB 最近下载:2024-10-03 人气:1930 磁力链接
  • mp4~Get Your Files Here !/2. Detection & Mitigation/6. 20-Documenting and structuring our Deepfake mitigation strategy Report.mp4 105.7 MB
  • mp4~Get Your Files Here !/1. Course Foundation/13. 13-Assessing Your organization’s deepfake response capabilities.mp4 99.8 MB
  • mp4~Get Your Files Here !/2. Detection & Mitigation/8. 22-Action Plan for Deepfake Mitigation Strategy Implementation.mp4 93.6 MB
  • mp4~Get Your Files Here !/2. Detection & Mitigation/10. 24-Standard Operating Procedure (SOP) for Deepfake Incident Response.mp4 86.6 MB
  • mp4~Get Your Files Here !/3. Things to consider_Questions to ask/4. 29-Deepfake Mitigation Tools.mp4 80.4 MB
  • mp4~Get Your Files Here !/2. Detection & Mitigation/5. 19-Developing deepfake mitigation strategy through brainstorming.mp4 79.9 MB
  • mp4~Get Your Files Here !/1. Course Foundation/11. 11-Identifying Deepfakes.mp4 67.7 MB
  • mp4~Get Your Files Here !/1. Course Foundation/4. 4-Deepfake Assessment-Can members of your organization identify deepfakes.mp4 63.6 MB
  • mp4~Get Your Files Here !/1. Course Foundation/5. 5-Course Agenda.mp4 60.7 MB
  • mp4~Get Your Files Here !/3. Things to consider_Questions to ask/3. 28-Creating a culture of Verefication.mp4 57.2 MB
  • mp4~Get Your Files Here !/1. Course Foundation/12. 12-Testing for Deepfakes.mp4 57.1 MB
  • mp4~Get Your Files Here !/2. Detection & Mitigation/1. 15-Intro to section 2_Are there any silver bullets for deepfake mitigation.mp4 51.7 MB
  • mp4~Get Your Files Here !/1. Course Foundation/3. 3-Possible causes of deepfake Incident-News Brief Postmortem.mp4 50.1 MB
  • mp4~Get Your Files Here !/2. Detection & Mitigation/3. 17-Important considerations for developing a deepfake defense strategy.mp4 42.4 MB
  • mp4~Get Your Files Here !/1. Course Foundation/1. 1-Deepfake Defense For Cybersecurity & GRC Professionals.mp4 41.8 MB
  • mp4~Get Your Files Here !/2. Detection & Mitigation/4. 18-Key components of a deepfake mitigation strategy.mp4 41.2 MB
  • mp4~Get Your Files Here !/3. Things to consider_Questions to ask/5. 30-The most efficient measures to take against deepfake attacks.mp4 40.7 MB
  • mp4~Get Your Files Here !/1. Course Foundation/14. 14-End of Section_1.mp4 39.9 MB
  • mp4~Get Your Files Here !/1. Course Foundation/6. 6-Meet your Instructor.mp4 39.7 MB
  • mp4~Get Your Files Here !/1. Course Foundation/2. 2-Important Note about course.mp4 38.8 MB
【影视】 Microsoft Cybersecurity Pro Track PowerShell Security
收录时间:2020-11-11 文档个数:58 文档大小:1.4 GB 最近下载:2024-10-04 人气:9025 磁力链接
  • mp4Course/3. PowerShell Operational Security/2. Managing Remote Execution Capabilities of Windows PowerShell.mp4 192.7 MB
  • mp4Course/4. Implementing PowerShell-based Security/1. Windows Powershell DSC.mp4 146.7 MB
  • mp4Course/5. Windows PowerShell-based Exploits and their Mitigation/1. Windows PowerShell-based Attacks.mp4 134.1 MB
  • mp4Course/4. Implementing PowerShell-based Security/2. Just Enough Administration (JEA).mp4 123.4 MB
  • mp4Course/3. PowerShell Operational Security/1. Managing Local Script Execution Policy with Windows PowerShell Execution.mp4 116.8 MB
  • mp4Course/1. Introduction/3. Preparing the Lab Environment.mp4 95.2 MB
  • mp4Course/2. Windows PowerShell Fundamentals/2. PowerShell Editions and Versions.mp4 88.2 MB
  • mp4Course/4. Implementing PowerShell-based Security/3. Windows PowerShell Auditing and Logging.mp4 86.9 MB
  • mp4Course/3. PowerShell Operational Security/4. Language Mode.mp4 79.5 MB
  • mp4Course/2. Windows PowerShell Fundamentals/1. Windows PowerShell Architecture.mp4 66.6 MB
  • mp4Course/5. Windows PowerShell-based Exploits and their Mitigation/3. Summary of Windows PowerShell-based Security-Related Technologies.mp4 55.5 MB
  • mp4Course/2. Windows PowerShell Fundamentals/3. Running Windows Powershell.mp4 53.4 MB
  • mp4Course/5. Windows PowerShell-based Exploits and their Mitigation/2. Windows PowerShell-based Security Tools.mp4 50.7 MB
  • mp4Course/3. PowerShell Operational Security/5. Anti-Malware SCan Interface (AMSI).mp4 39.1 MB
  • mp4Course/1. Introduction/2. About the Course.mp4 25.1 MB
  • mp4Course/3. PowerShell Operational Security/3. Constrained Endpoints.mp4 24.2 MB
  • mp4Course/1. Introduction/1. Instructor Introduction.mp4 10.9 MB
  • srtCourse/3. PowerShell Operational Security/2. Managing Remote Execution Capabilities of Windows PowerShell.srt 43.0 kB
  • srtCourse/4. Implementing PowerShell-based Security/1. Windows Powershell DSC.srt 37.5 kB
  • srtCourse/4. Implementing PowerShell-based Security/2. Just Enough Administration (JEA).srt 35.1 kB
【影视】 [FreeCoursesOnline.Me] [Packtpub.Com] Cybersecurity - Methods of Protection (Blue Team Activity) - [FCO]
收录时间:2020-02-20 文档个数:35 文档大小:1.3 GB 最近下载:2024-10-01 人气:4128 磁力链接
  • mp401.Securing Your Network/0105.Ferreting out a Hacker by IP.mp4 101.3 MB
  • mp402.Securing Your Website/0205.Building Fortifications – Input Validation and Whitelisting.mp4 99.3 MB
  • mp402.Securing Your Website/0207.Scanning Your Website for Malicious Scripts.mp4 91.1 MB
  • mp401.Securing Your Network/0104.Securing Your Wi-Fi Network.mp4 90.9 MB
  • mp402.Securing Your Website/0202.How to Create a Bulletproof Password in a Second.mp4 68.9 MB
  • mp402.Securing Your Website/0209.The Big Strategy – Three Shortcuts to Secure a Web Application.mp4 68.6 MB
  • mp403.Defending from Social Engineering Attacks/0309.The Final Game Building the Anti-Social-Engineering Strategy.mp4 62.6 MB
  • mp403.Defending from Social Engineering Attacks/0304.Anti-Whaling How to Prevent Yourself from Spear-phishing.mp4 58.0 MB
  • mp403.Defending from Social Engineering Attacks/0301.The Rule of Thumb to Fight Back Social Engineering Attacks.mp4 57.3 MB
  • mp401.Securing Your Network/0109.Looking for Spies with a Python Script.mp4 50.2 MB
  • mp403.Defending from Social Engineering Attacks/0302.Discovering a Phishing Link.mp4 46.4 MB
  • mp402.Securing Your Website/0201.Brute-Forcing Website Passwords with OWASP ZAP.mp4 45.6 MB
  • mp401.Securing Your Network/0111.Advanced-level Techniques What to Do If Hackers Already in Your Network.mp4 40.3 MB
  • mp401.Securing Your Network/0108.Analyzing Your Traffic to Catch a Spy with Wireshark.mp4 35.4 MB
  • mp402.Securing Your Website/0203.Testing a Website for SQL Injection with Burp Suite.mp4 30.9 MB
  • mp402.Securing Your Website/0204.Testing a Website for XSS Vulnerability.mp4 29.8 MB
  • mp403.Defending from Social Engineering Attacks/0305.How to Prevent Password Stealers.mp4 29.7 MB
  • mp401.Securing Your Network/0110.How to Outfox Ransomware.mp4 28.9 MB
  • mp401.Securing Your Network/0102.Understanding Firewalls and Tuning Them Up.mp4 28.7 MB
  • mp402.Securing Your Website/0208.Protecting from a Session Hijacking Attack.mp4 27.7 MB
【影视】 [CourseClub.NET] Packtpub - Cybersecurity - Methods of Protection (Blue Team Activity)
收录时间:2020-03-28 文档个数:31 文档大小:1.3 GB 最近下载:2024-10-01 人气:4310 磁力链接
  • mp401.Securing Your Network/0105.Ferreting out a Hacker by IP.mp4 101.3 MB
  • mp402.Securing Your Website/0205.Building Fortifications – Input Validation and Whitelisting.mp4 99.3 MB
  • mp402.Securing Your Website/0207.Scanning Your Website for Malicious Scripts.mp4 91.1 MB
  • mp401.Securing Your Network/0104.Securing Your Wi-Fi Network.mp4 90.9 MB
  • mp402.Securing Your Website/0202.How to Create a Bulletproof Password in a Second.mp4 68.9 MB
  • mp402.Securing Your Website/0209.The Big Strategy – Three Shortcuts to Secure a Web Application.mp4 68.6 MB
  • mp403.Defending from Social Engineering Attacks/0309.The Final Game Building the Anti-Social-Engineering Strategy.mp4 62.6 MB
  • mp403.Defending from Social Engineering Attacks/0304.Anti-Whaling How to Prevent Yourself from Spear-phishing.mp4 58.0 MB
  • mp403.Defending from Social Engineering Attacks/0301.The Rule of Thumb to Fight Back Social Engineering Attacks.mp4 57.3 MB
  • mp401.Securing Your Network/0109.Looking for Spies with a Python Script.mp4 50.2 MB
  • mp403.Defending from Social Engineering Attacks/0302.Discovering a Phishing Link.mp4 46.4 MB
  • mp402.Securing Your Website/0201.Brute-Forcing Website Passwords with OWASP ZAP.mp4 45.6 MB
  • mp401.Securing Your Network/0111.Advanced-level Techniques What to Do If Hackers Already in Your Network.mp4 40.3 MB
  • mp401.Securing Your Network/0108.Analyzing Your Traffic to Catch a Spy with Wireshark.mp4 35.4 MB
  • mp402.Securing Your Website/0203.Testing a Website for SQL Injection with Burp Suite.mp4 30.9 MB
  • mp402.Securing Your Website/0204.Testing a Website for XSS Vulnerability.mp4 29.8 MB
  • mp403.Defending from Social Engineering Attacks/0305.How to Prevent Password Stealers.mp4 29.7 MB
  • mp401.Securing Your Network/0110.How to Outfox Ransomware.mp4 28.9 MB
  • mp401.Securing Your Network/0102.Understanding Firewalls and Tuning Them Up.mp4 28.7 MB
  • mp402.Securing Your Website/0208.Protecting from a Session Hijacking Attack.mp4 27.7 MB
【影视】 [ DevCourseWeb.com ] Udemy - Python for Cybersecurity
收录时间:2023-01-04 文档个数:73 文档大小:1.3 GB 最近下载:2024-10-04 人气:6999 磁力链接
  • mp4~Get Your Files Here !/6. Sockets/7. Part 3 - Sending, Receiving, and Closing the Connection.mp4 179.3 MB
  • mp4~Get Your Files Here !/4. Object Oriented Programming/2. Creating Our First Object.mp4 97.9 MB
  • mp4~Get Your Files Here !/6. Sockets/5. Part 1 - Socket, Bind, Listen Accept.mp4 81.1 MB
  • mp4~Get Your Files Here !/6. Sockets/6. Part 2 - Socket, Connect.mp4 74.5 MB
  • mp4~Get Your Files Here !/6. Sockets/4. Why Encode.mp4 71.2 MB
  • mp4~Get Your Files Here !/6. Sockets/3. How Sockets Will Work.mp4 68.7 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/6. If Statements.mp4 64.8 MB
  • mp4~Get Your Files Here !/5. Let's Make API Requests/5. Consuming an API - Complex.mp4 62.7 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/12. Dictionaries.mp4 51.7 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/13. Functions.mp4 49.3 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/3. Variables.mp4 42.2 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/7. Error Handling Part 1.mp4 40.5 MB
  • mp4~Get Your Files Here !/2. Environment Setup/2. Installing VS Code and Extensions.mp4 37.6 MB
  • mp4~Get Your Files Here !/6. Sockets/2. What is a Socket.mp4 35.1 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/11. Lists.mp4 35.1 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/4. f Strings.mp4 32.8 MB
  • mp4~Get Your Files Here !/4. Object Oriented Programming/3. Importing Packages.mp4 31.4 MB
  • mp4~Get Your Files Here !/1. Getting Started/1. IMPORTANT!!!.mp4 30.9 MB
  • mp4~Get Your Files Here !/5. Let's Make API Requests/4. Consuming an API - Simple.mp4 26.2 MB
  • mp4~Get Your Files Here !/3. The Fundamentals/8. While Loop.mp4 21.6 MB
共9页 上一页 1 2 3 4 5 6 7 8 下一页

友情链接