2048BT

为您索检到172条磁力链接,耗时0毫秒。

★注意★本站地址随时可能失效

找到本站最新地址的两种方法: 1、记住地址发布页2048bt.cc2048bt.cyoubt搜索.xyzbt搜索.cc 2、发送“地址”到2048bt@gmail.com
【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity Essentials - Stay Safe and Secure Online
收录时间:2024-02-04 文档个数:39 文档大小:1.2 GB 最近下载:2024-10-01 人气:2922 磁力链接
  • mp4~Get Your Files Here !/6. Device Security/1. Introduction to Device Security.mp4 79.4 MB
  • mp4~Get Your Files Here !/2. Password Security/2. What Makes a Good Password.mp4 70.5 MB
  • mp4~Get Your Files Here !/6. Device Security/3. Mobile Security Best Practices.mp4 69.8 MB
  • mp4~Get Your Files Here !/4. Phishing/1. Introduction to Phishing.mp4 63.3 MB
  • mp4~Get Your Files Here !/5. Staying Safe on the Web/3. Identifying Suspicious Downloads.mp4 59.6 MB
  • mp4~Get Your Files Here !/6. Device Security/2. Choosing and Using an Antivirus.mp4 58.4 MB
  • mp4~Get Your Files Here !/2. Password Security/1. Introduction to Passwords.mp4 57.7 MB
  • mp4~Get Your Files Here !/5. Staying Safe on the Web/2. Inspecting URLs.mp4 57.6 MB
  • mp4~Get Your Files Here !/2. Password Security/5. Using a Password Manager.mp4 56.2 MB
  • mp4~Get Your Files Here !/7. Virtual Private Networks/4. Choosing a VPN Solution.mp4 55.5 MB
  • mp4~Get Your Files Here !/4. Phishing/4. Phishing Without Email.mp4 54.3 MB
  • mp4~Get Your Files Here !/4. Phishing/2. The Psychology of Phishing.mp4 52.3 MB
  • mp4~Get Your Files Here !/5. Staying Safe on the Web/4. Managing Trackers and Cookies.mp4 48.2 MB
  • mp4~Get Your Files Here !/3. Multi-Factor Authentication (MFA)/3. Choosing a Strong Authentication Factor.mp4 45.8 MB
  • mp4~Get Your Files Here !/7. Virtual Private Networks/2. Why Use a VPN.mp4 45.5 MB
  • mp4~Get Your Files Here !/3. Multi-Factor Authentication (MFA)/5. Identifying MFA Phishing Attacks.mp4 41.4 MB
  • mp4~Get Your Files Here !/7. Virtual Private Networks/3. How VPNs Work.mp4 38.0 MB
  • mp4~Get Your Files Here !/4. Phishing/3. Examining a Phishing Email.mp4 35.7 MB
  • mp4~Get Your Files Here !/2. Password Security/4. Checking for Compromised Accounts.mp4 33.5 MB
  • mp4~Get Your Files Here !/4. Phishing/5. Phishing Using the Cloud.mp4 31.6 MB
【影视】 Python for Cybersecurity Specialization
收录时间:2023-10-18 文档个数:366 文档大小:1.2 GB 最近下载:2024-10-05 人气:14862 磁力链接
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/03_alternative-protocol.mp4 61.8 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/05_network-sniffing.mp4 42.0 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/04_network-scanning.mp4 32.5 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/05_protocol-decoding.mp4 31.5 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/07_behavioral-analytics.mp4 29.2 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/03_registry-autorun.mp4 29.0 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/05_hijacked-execution-flow.mp4 27.5 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/06_dns-exploration.mp4 27.3 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/05_system-activity-monitoring.mp4 26.6 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/python-for-active-defense/02_python-for-active-defense-network/01_network/03_pcap-collection.mp4 26.0 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/03_encrypted-channel.mp4 25.8 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/05_scheduled-execution.mp4 25.8 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/03_user-account-discovery.mp4 25.4 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/03_logon-scripts.mp4 24.6 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/03_data-encryption.mp4 23.6 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/05_alternate-data-streams.mp4 22.4 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/03_default-account-discovery.mp4 21.7 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/05_autorun-scripts.mp4 21.2 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/03_impair-avs.mp4 20.8 MB
  • mp4[TutsNode.org] - Python for Cybersecurity Specialization/credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/03_credentials-from-web-browsers.mp4 20.7 MB
【影视】 [ CourseMega.com ] Linkedin - Building an ISO 27001-Compliant Cybersecurity Program - The Annex A Controls
收录时间:2022-04-03 文档个数:110 文档大小:1.2 GB 最近下载:2024-10-04 人气:11455 磁力链接
  • mp4~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/013. Access control User access management.mp4 60.8 MB
  • mp4~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/028. System lifecycle Security in d.mp4 57.3 MB
  • mp4~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/017. Physical and environmental security Equipme.mp4 57.2 MB
  • mp4~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/014. Access control System and application.mp4 55.8 MB
  • mp4~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/032. Management of information security.mp4 54.7 MB
  • mp4~Get Your Files Here !/07. Operations Security (Clause A.12)/018. Operations security Operational procedures and responsibili.mp4 47.1 MB
  • mp4~Get Your Files Here !/12. Compliance (Clause A.18)/034. Compliance Compliance with legal and contractual requirements (Claus.mp4 46.5 MB
  • mp4~Get Your Files Here !/07. Operations Security (Clause A.12)/021. Operations security Logging and monitoring (Clause A.12.4).mp4 45.6 MB
  • mp4~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/033. Information security continuity an.mp4 45.5 MB
  • mp4~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/016. Physical and environmental security Secure.mp4 44.8 MB
  • mp4~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/004. Contact with auth.mp4 42.7 MB
  • mp4~Get Your Files Here !/08. Communications Security (Clause A.13)/026. Communications security Information transfer (Clause A..mp4 40.7 MB
  • mp4~Get Your Files Here !/04. Asset Management (Clause A.8)/010. Asset management Information classification (Clause A.8.2).mp4 40.5 MB
  • mp4~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/027. System lifecycle Security requ.mp4 37.2 MB
  • mp4~Get Your Files Here !/03. Human Resources Security (Clause A.7)/007. Human resources security During employment (Clause A.7..mp4 34.4 MB
  • mp4~Get Your Files Here !/08. Communications Security (Clause A.13)/025. Communications security Network security management (Cl.mp4 34.1 MB
  • mp4~Get Your Files Here !/04. Asset Management (Clause A.8)/009. Asset management Responsibility for assets (Clause A.8.1).mp4 33.3 MB
  • mp4~Get Your Files Here !/10. Supplier Relationships (Clause A.15)/030. Supplier relationships Information security in supplier.mp4 31.4 MB
  • mp4~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/002. Management direct.mp4 31.1 MB
  • mp4~Get Your Files Here !/04. Asset Management (Clause A.8)/011. Asset management Media handling (Clause A.8.3).mp4 30.4 MB
【影视】 [Coursera] Python for Cybersecurity Specialization - 5 course series
收录时间:2024-05-03 文档个数:290 文档大小:1.2 GB 最近下载:2024-10-04 人气:2933 磁力链接
  • mp4command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_03_alternative-protocol.mp4 61.8 MB
  • mp4credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_05_network-sniffing.mp4 42.0 MB
  • mp4pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_04_network-scanning.mp4 32.5 MB
  • mp4python-for-active-defense/02_python-for-active-defense-network/01_network/01_05_protocol-decoding.mp4 31.5 MB
  • mp4python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_07_behavioral-analytics.mp4 29.2 MB
  • mp4execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_03_registry-autorun.mp4 29.0 MB
  • mp4execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_05_hijacked-execution-flow.mp4 27.5 MB
  • mp4pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_06_dns-exploration.mp4 27.3 MB
  • mp4python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_05_system-activity-monitoring.mp4 26.6 MB
  • mp4python-for-active-defense/02_python-for-active-defense-network/01_network/01_03_pcap-collection.mp4 26.0 MB
  • mp4command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_03_encrypted-channel.mp4 25.8 MB
  • mp4execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_05_scheduled-execution.mp4 25.8 MB
  • mp4credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_03_user-account-discovery.mp4 25.4 MB
  • mp4execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_03_logon-scripts.mp4 24.6 MB
  • mp4command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_03_data-encryption.mp4 23.6 MB
  • mp4execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_05_alternate-data-streams.mp4 22.4 MB
  • mp4pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_03_default-account-discovery.mp4 21.7 MB
  • mp4pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_05_autorun-scripts.mp4 21.2 MB
  • mp4execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_03_impair-avs.mp4 20.8 MB
  • mp4credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_03_credentials-from-web-browsers.mp4 20.7 MB
【影视】 Certified in Cybersecurity 2023 - ISC2-CC Complete Training
收录时间:2023-09-04 文档个数:51 文档大小:1.2 GB 最近下载:2024-10-04 人气:17112 磁力链接
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/9. Security Controls Examples.mp4 119.4 MB
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/3. Domain 2 Business Continuity (BC), Disaster Recovery (DR) & Incident Response/1. Cyber Threats.mp4 109.6 MB
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/4. Risk Analaysis.mp4 106.8 MB
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/7. Risk Monitoring.mp4 91.3 MB
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/3. Risk Management Overview.mp4 68.8 MB
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/3. Domain 2 Business Continuity (BC), Disaster Recovery (DR) & Incident Response/2. Cyber Attacks 1.mp4 67.5 MB
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/12. Governance Overview.mp4 57.5 MB
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/8. Security Controls.mp4 56.7 MB
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/2. Privacy.mp4 55.2 MB
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/6. Risk Response.mp4 52.3 MB
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/20. Laws and Regulations in Cybersecurity.mp4 46.8 MB
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/10. Defense in Depth.mp4 42.9 MB
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/14. Policies.mp4 42.3 MB
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/19. Procedures and Guidelines.mp4 38.5 MB
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/1. CIA Triad and Security Objectives.mp4 35.6 MB
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/15. Policies Examples.mp4 33.0 MB
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/5. Types of Risk.mp4 29.0 MB
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/18. Standards.mp4 27.4 MB
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/16. Acceptable use policy.mp4 22.7 MB
  • mp4[TutsNode.net] - Certified in Cybersecurity 2023 - ISC2-CC Complete Training/2. Domain 1 Security Principles - 26% - 20 Questions in the Exam/13. Information Security Governance.mp4 18.1 MB
【影视】 [ DevCourseWeb.com ] Udemy - Intro To Cybersecurity In Healthcare (1 Of 2),Plain and Simple
收录时间:2022-10-10 文档个数:19 文档大小:1.2 GB 最近下载:2024-10-03 人气:2949 磁力链接
  • mp4~Get Your Files Here !/5 - Something You Own FOB MFA.mp4 258.8 MB
  • mp4~Get Your Files Here !/6 - Something You Are Biometrics.mp4 227.0 MB
  • mp4~Get Your Files Here !/7 - Authenticating Access FIDO.mp4 184.5 MB
  • mp4~Get Your Files Here !/2 - Overview of Cyber Security.mp4 182.9 MB
  • mp4~Get Your Files Here !/8 - Phishing & Spam.mp4 145.1 MB
  • mp4~Get Your Files Here !/4 - Something You Know Passwords.mp4 70.9 MB
  • mp4~Get Your Files Here !/3 - Authenticating Mechanisms.mp4 61.8 MB
  • mp4~Get Your Files Here !/1 - Introduction.mp4 49.6 MB
  • vtt~Get Your Files Here !/5 - Something You Own FOB MFA English.vtt 22.0 kB
  • vtt~Get Your Files Here !/6 - Something You Are Biometrics English.vtt 18.2 kB
  • vtt~Get Your Files Here !/7 - Authenticating Access FIDO English.vtt 17.5 kB
  • vtt~Get Your Files Here !/2 - Overview of Cyber Security English.vtt 13.9 kB
  • vtt~Get Your Files Here !/8 - Phishing & Spam English.vtt 12.3 kB
  • vtt~Get Your Files Here !/4 - Something You Know Passwords English.vtt 6.0 kB
  • vtt~Get Your Files Here !/3 - Authenticating Mechanisms English.vtt 6.0 kB
  • vtt~Get Your Files Here !/1 - Introduction English.vtt 4.5 kB
  • txt~Get Your Files Here !/Bonus Resources.txt 386 Bytes
  • html~Get Your Files Here !/9 - BONUS SECTION.html 243 Bytes
  • urlGet Bonus Downloads Here.url 182 Bytes
【影视】 [ FreeCourseWeb.com ] EC-Council - Introduction to Cybersecurity
收录时间:2021-09-27 文档个数:49 文档大小:1.2 GB 最近下载:2024-10-03 人气:6069 磁力链接
  • mp4~Get Your Files Here !/38 - Know Your Options for Data Encryption.mp4 63.3 MB
  • mp4~Get Your Files Here !/35 - Looking at an Application Designed to Help Secure Your Phone.mp4 39.8 MB
  • mp4~Get Your Files Here !/9 - Using a Password Manager.mp4 39.7 MB
  • mp4~Get Your Files Here !/40 - Checking if Your Cloud Server is Leaking Data.mp4 39.5 MB
  • mp4~Get Your Files Here !/23 - Understanding How Computers Can Become Infected.mp4 38.9 MB
  • mp4~Get Your Files Here !/26 - Being Careful of What You Post.mp4 36.8 MB
  • mp4~Get Your Files Here !/19 - Looking at Fake Error Messages (Scareware).mp4 35.8 MB
  • mp4~Get Your Files Here !/14 - USB Safety with Examples.mp4 34.9 MB
  • mp4~Get Your Files Here !/20 - Exploring Useful Browser Plugins.mp4 34.2 MB
  • mp4~Get Your Files Here !/41 - Getting to Know Everything about VPN.mp4 34.0 MB
  • mp4~Get Your Files Here !/8 - Exploring What Makes a Good Password.mp4 34.0 MB
  • mp4~Get Your Files Here !/25 - What to Do If You Are Infected with Cryptoware.mp4 34.0 MB
  • mp4~Get Your Files Here !/42 - Changing Your DNS Connection to Avoid ISP Snooping.mp4 33.5 MB
  • mp4~Get Your Files Here !/32 - Understanding Best Practices for Unusual E-mails.mp4 31.1 MB
  • mp4~Get Your Files Here !/31 - Learning How to Identify and Find Phishing E-mails.mp4 30.9 MB
  • mp4~Get Your Files Here !/44 - Learning How to Use TorGhost.mp4 30.3 MB
  • mp4~Get Your Files Here !/18 - Downloading Precautions and Hash Checking.mp4 30.3 MB
  • mp4~Get Your Files Here !/24 - Learning Best Practices for Antivirus Software and Malware Scanners.mp4 27.8 MB
  • mp4~Get Your Files Here !/37 - Additional Settings.mp4 27.6 MB
  • mp4~Get Your Files Here !/47 - Understanding Backup Methods.mp4 26.3 MB
【影视】 [FreeCoursesOnline.Me] PacktPub - Cybersecurity Attacks (Red Team Activity) [Video]
收录时间:2020-03-12 文档个数:41 文档大小:1.1 GB 最近下载:2024-10-04 人气:12568 磁力链接
  • mp41 - Building Our Lab/Getting Acquainted with Kali Linux Easy Way.mp4 121.1 MB
  • mp41 - Building Our Lab/Getting Acquainted with Terminal Commands.mp4 105.8 MB
  • mp44 - Breaking the Human in a Cyber Crime Attack/Playing on Human Emotions and Weaknesses to Get the Information.mp4 76.7 MB
  • mp42 - Attacking a Network/Taking Control Over Target Browser with BeEf.mp4 46.7 MB
  • mp42 - Attacking a Network/Creating Reverse Shell with Metasploit.mp4 42.0 MB
  • mp44 - Breaking the Human in a Cyber Crime Attack/Social Engineering Techniques.mp4 41.3 MB
  • mp43 - Website and Web-Application Attacks#/Proxy Attack with Burp Suite.mp4 38.5 MB
  • mp42 - Attacking a Network/Hidden Scanning Ports with Nmap.mp4 37.1 MB
  • mp41 - Building Our Lab/Installing Metasploitable 2 on Virtual Machine.mp4 34.5 MB
  • mp43 - Website and Web-Application Attacks#/Manual Testing for SQL Injection.mp4 34.3 MB
  • mp43 - Website and Web-Application Attacks#/Executing a Session Hijacking.mp4 32.0 MB
  • mp44 - Breaking the Human in a Cyber Crime Attack/How to Hack Without Getting in Touch with a Target.mp4 30.3 MB
  • mp43 - Website and Web-Application Attacks#/Exploring Target with Browser.mp4 28.8 MB
  • mp44 - Breaking the Human in a Cyber Crime Attack/Making a Phishing Email with SET.mp4 28.4 MB
  • mp41 - Building Our Lab/The Course Overview.mp4 27.1 MB
  • mp42 - Attacking a Network/Advance-Level Hacking - Scanning Hosts with Python Script.mp4 27.0 MB
  • mp42 - Attacking a Network/Intercepting Traffic with Wireshark.mp4 26.9 MB
  • mp43 - Website and Web-Application Attacks#/Infecting Website with Stored XSS.mp4 26.7 MB
  • mp44 - Breaking the Human in a Cyber Crime Attack/Looking for Secrets in Social Media with Online Tools.mp4 26.1 MB
  • mp43 - Website and Web-Application Attacks#/Scanning Web-Application with OWASP ZAP.mp4 25.5 MB
【影视】 [ DevCourseWeb.com ] Udemy - Ccsa - Certified Cybersecurity Analyst
收录时间:2023-01-17 文档个数:18 文档大小:1.1 GB 最近下载:2024-10-02 人气:2976 磁力链接
  • mp4~Get Your Files Here !/2 - Blue Team Principles/2 - Blue Team Principles.mp4 196.8 MB
  • mp4~Get Your Files Here !/3 - Digital Forensics/3 - Digital Forensics.mp4 172.5 MB
  • mp4~Get Your Files Here !/4 - Malware Analysis/4 - Malware Analysis.mp4 154.1 MB
  • mp4~Get Your Files Here !/7 - Leveraging SIEM for Advanced Analytics/7 - Leveraging SIEM for Advanced Analytics.mp4 134.1 MB
  • mp4~Get Your Files Here !/5 - Traffic Analysis/5 - Traffic Analysis.mp4 131.1 MB
  • mp4~Get Your Files Here !/8 - Defeating the Red Team with Purple Team Tactics/8 - Defeating the Red Team with Purple Team Tactics.mp4 129.3 MB
  • mp4~Get Your Files Here !/6 - Assessing the Current State of Defense within the Organization/6 - Assessing the Current State of Defense within the Organization.mp4 123.7 MB
  • mp4~Get Your Files Here !/1 - Introduction/1 - Introduction.mp4 87.0 MB
  • srt~Get Your Files Here !/2 - Blue Team Principles/2 - Blue Team Principles English.srt 39.2 kB
  • srt~Get Your Files Here !/3 - Digital Forensics/3 - Digital Forensics English.srt 37.2 kB
  • srt~Get Your Files Here !/4 - Malware Analysis/4 - Malware Analysis English.srt 32.9 kB
  • srt~Get Your Files Here !/5 - Traffic Analysis/5 - Traffic Analysis English.srt 26.1 kB
  • srt~Get Your Files Here !/7 - Leveraging SIEM for Advanced Analytics/7 - Leveraging SIEM for Advanced Analytics English.srt 26.0 kB
  • srt~Get Your Files Here !/1 - Introduction/1 - Introduction English.srt 22.7 kB
  • srt~Get Your Files Here !/6 - Assessing the Current State of Defense within the Organization/6 - Assessing the Current State of Defense within the Organization English.srt 18.8 kB
  • srt~Get Your Files Here !/8 - Defeating the Red Team with Purple Team Tactics/8 - Defeating the Red Team with Purple Team Tactics English.srt 18.8 kB
  • txt~Get Your Files Here !/Bonus Resources.txt 386 Bytes
  • urlGet Bonus Downloads Here.url 182 Bytes
【影视】 [ FreeCourseWeb.com ] Udemy - The Complete Cybersecurity Awareness Course For Employees
收录时间:2021-12-08 文档个数:26 文档大小:1.1 GB 最近下载:2024-10-04 人气:2497 磁力链接
  • mp4~Get Your Files Here !/4. Social Engineering and Countermeasures/3. Types of Social Engineering Attacks.mp4 92.1 MB
  • mp4~Get Your Files Here !/1. Introduction to the Cybersecurity Space/1. Cybersecurity Introduction and Trends.mp4 81.4 MB
  • mp4~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/7. Malware and Types of Malware.mp4 78.6 MB
  • mp4~Get Your Files Here !/1. Introduction to the Cybersecurity Space/3. Definitions and Key Terms in Cybersecurity.mp4 74.9 MB
  • mp4~Get Your Files Here !/2. Cybersecurity Roles and Actors/1. Cybersecurity Roles.mp4 72.2 MB
  • mp4~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/12. Anti-Malware Protection.mp4 68.9 MB
  • mp4~Get Your Files Here !/2. Cybersecurity Roles and Actors/4. Security Operations Center.mp4 56.2 MB
  • mp4~Get Your Files Here !/4. Social Engineering and Countermeasures/5. Social Engineering Countermeasures.mp4 50.8 MB
  • mp4~Get Your Files Here !/5. Cybersecurity Internal Affairs and Controls/11. Cybersecurity Organizations That Are Resourceful.mp4 44.7 MB
  • mp4~Get Your Files Here !/5. Cybersecurity Internal Affairs and Controls/1. Privacy Policy.mp4 41.7 MB
  • mp4~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/19. More Countermeasures - Vulnerability Assessments.mp4 41.1 MB
  • mp4~Get Your Files Here !/5. Cybersecurity Internal Affairs and Controls/7. Incident Handling.mp4 38.9 MB
  • mp4~Get Your Files Here !/5. Cybersecurity Internal Affairs and Controls/9. IT Governance.mp4 36.1 MB
  • mp4~Get Your Files Here !/2. Cybersecurity Roles and Actors/7. The Different Types of Cybersecurity Actors.mp4 33.5 MB
  • mp4~Get Your Files Here !/1. Introduction to the Cybersecurity Space/6. Cybersecurity and Social Media.mp4 33.5 MB
  • mp4~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/17. More Countermeasures -Digital Forensics.mp4 30.5 MB
  • mp4~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/23. More on Tech and Admin Controls.mp4 30.3 MB
  • mp4~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/1. Security Threats.mp4 28.4 MB
  • mp4~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/21. How To Start and Cybersecurity Program.mp4 27.4 MB
  • mp4~Get Your Files Here !/5. Cybersecurity Internal Affairs and Controls/3. Good User Habits.mp4 27.0 MB
【影视】 MS Cybersecurity Pro Track Windows 10 Security Features
收录时间:2021-01-16 文档个数:58 文档大小:1.1 GB 最近下载:2024-10-03 人气:4254 磁力链接
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/1. Introduction/3. Preparing the Lab Environment.mp4 99.9 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/4. Windows 10 software security features - Part 1/1. Windows Defender Firewall and Virtual Secure Mode.mp4 95.3 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/4. Windows 10 software security features - Part 1/2. Credential Guard and Bitlocker.mp4 91.4 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/6. Windows 10 New Security Features and Capabilities/3. Ransomware Case Study.mp4 87.4 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/6. Windows 10 New Security Features and Capabilities/2. Other Security Features and Capabilities.mp4 77.3 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/3. How Windows 10 uses modern hardware features for security/3. Additional Hardware Security.mp4 76.7 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/6. Windows 10 New Security Features and Capabilities/1. Windows Hello and Hello for Business.mp4 68.3 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/5. Windows 10 software security features - Part 2/3. AppLocker with Device Guard.mp4 67.5 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/4. Windows 10 software security features - Part 1/3. Antivirus and WIndows Information Protection.mp4 67.5 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/5. Windows 10 software security features - Part 2/4. Windows Defender SmartScreen and WIndows 10 Telemetry.mp4 60.0 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/3. How Windows 10 uses modern hardware features for security/1. Secure Boot Process.mp4 58.6 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/3. How Windows 10 uses modern hardware features for security/2. Secure Boot to Trusted Boot.mp4 52.0 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/5. Windows 10 software security features - Part 2/2. Device Guard.mp4 46.9 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/5. Windows 10 software security features - Part 2/1. Windows Defender Remote Credential Guard.mp4 44.0 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/1. Introduction/2. About the Course.mp4 34.8 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/2. Built-in Windows 10 defenses/1. Evolution of attacks.mp4 24.7 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/1. Introduction/1. Instructor Introduction.mp4 10.7 MB
  • pdf[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/4. Windows 10 software security features - Part 1/1.2 Windows PowerShell networking cmdlets.pdf 405.1 kB
  • srt[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/6. Windows 10 New Security Features and Capabilities/1. Windows Hello and Hello for Business.srt 23.8 kB
  • srt[TutsNode.com] - MS Cybersecurity Pro Track Windows 10 Security Features/4. Windows 10 software security features - Part 1/1. Windows Defender Firewall and Virtual Secure Mode.srt 23.3 kB
【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity Threat Hunting Professional
收录时间:2022-03-18 文档个数:36 文档大小:1.0 GB 最近下载:2024-10-04 人气:7106 磁力链接
  • mp4~Get Your Files Here !/2. Time to hunt/2. Practical Threat hunting Demo.mp4 121.9 MB
  • mp4~Get Your Files Here !/2. Time to hunt/1. Case Base Threat Hunting.mp4 93.6 MB
  • mp4~Get Your Files Here !/2. Time to hunt/3. Indicators of threat attacksIoC.mp4 86.1 MB
  • mp4~Get Your Files Here !/1. Introduction/11. 7 Effective Threat Hunting Tips.mp4 81.5 MB
  • mp4~Get Your Files Here !/1. Introduction/10. Hypothesis Testing & Sources of Hypothesis.mp4 78.6 MB
  • mp4~Get Your Files Here !/4. Course Resources/1. Course Resources.mp4 72.6 MB
  • mp4~Get Your Files Here !/3. Course Conclusion/1. Course Review.mp4 72.6 MB
  • mp4~Get Your Files Here !/1. Introduction/8. What is Required for Successful Threat Hunting.mp4 71.2 MB
  • mp4~Get Your Files Here !/1. Introduction/6. Terms associated with Threat Hunting.mp4 70.5 MB
  • mp4~Get Your Files Here !/1. Introduction/4. Why threat hunt and attributes of an effective threat hunter.mp4 56.2 MB
  • mp4~Get Your Files Here !/1. Introduction/9. Threat Hunting Approaches.mp4 55.0 MB
  • mp4~Get Your Files Here !/1. Introduction/5. Threat Hunting Skillset Requirements.mp4 40.0 MB
  • mp4~Get Your Files Here !/1. Introduction/7. Threat Hunting Loop.mp4 38.6 MB
  • mp4~Get Your Files Here !/1. Introduction/2. What is Threat Hunting & Its Primary objective.mp4 35.9 MB
  • mp4~Get Your Files Here !/1. Introduction/1. Introduction.mp4 29.5 MB
  • mp4~Get Your Files Here !/1. Introduction/3. What is Threat Hunting & Its Primary objective..mp4 23.3 MB
  • mp4~Get Your Files Here !/4. Course Resources/1.1 Network Threat Hunting with Tim Crothers.mp4 10.6 MB
  • pdf~Get Your Files Here !/4. Course Resources/1.2 Resources Links for Threat Hunting Course.pdf 435.7 kB
  • srt~Get Your Files Here !/2. Time to hunt/2. Practical Threat hunting Demo.srt 11.9 kB
  • srt~Get Your Files Here !/2. Time to hunt/3. Indicators of threat attacksIoC.srt 8.3 kB
【影视】 [ TutSala.com ] Udemy - Cybersecurity For Beginners - Network Architecture
收录时间:2021-10-06 文档个数:124 文档大小:1.0 GB 最近下载:2024-10-05 人气:7156 磁力链接
  • mp4~Get Your Files Here !/17. Lab Demonstration - Scanning Networks with NMAP Pt. 1/1. Lab Demonstration - Scanning Networks with NMAP Pt. 1.mp4 477.0 MB
  • mp4~Get Your Files Here !/18. Lab Demonstration - Scanning Networks with NMAP Pt. 2/1. Lab Demonstration - Scanning Networks with NMAP Pt. 2.mp4 331.7 MB
  • mp4~Get Your Files Here !/11. Denial-of-Service Attack (DoS) Attack/2. The 5 Principal Differences Between DoS & DDoS Attacks.mp4 14.1 MB
  • mp4~Get Your Files Here !/11. Denial-of-Service Attack (DoS) Attack/6. Common DoS Attack Pt. 2.mp4 9.8 MB
  • mp4~Get Your Files Here !/7. Network Devices/1. Common Network Devices.mp4 8.9 MB
  • mp4~Get Your Files Here !/1. The OSI Model/1. The OSI Model.mp4 7.8 MB
  • mp4~Get Your Files Here !/11. Denial-of-Service Attack (DoS) Attack/5. Common DoS Attack Pt. 1.mp4 6.9 MB
  • mp4~Get Your Files Here !/14. DNS Attacks/1. DNS Attacks.mp4 6.4 MB
  • mp4~Get Your Files Here !/7. Network Devices/2. More Common Network Devices.mp4 6.2 MB
  • mp4~Get Your Files Here !/11. Denial-of-Service Attack (DoS) Attack/1. DoS Vs. DDoS.mp4 6.0 MB
  • mp4~Get Your Files Here !/4. IPv4 Vs. IPv6/1. IPv4.mp4 5.7 MB
  • mp4~Get Your Files Here !/1. The OSI Model/3. Data Link Layer.mp4 5.7 MB
  • mp4~Get Your Files Here !/10. Intrusion Detection Systems (IDS) & Intrusion Prevention Systems (IPS)/2. Behavior Based IDS Vs. Knowledge Based IDS.mp4 5.5 MB
  • mp4~Get Your Files Here !/15. What is Footprinting/3. Footprinting Helps To.mp4 5.4 MB
  • mp4~Get Your Files Here !/15. What is Footprinting/4. Footprinting Methodology.mp4 5.4 MB
  • mp4~Get Your Files Here !/11. Denial-of-Service Attack (DoS) Attack/7. Three-Way-Handshake Importance To Network Attacks (SYN Flood).mp4 5.2 MB
  • mp4~Get Your Files Here !/9. Types of Firewalls/2. Types of Firewalls Pt. 2.mp4 5.1 MB
  • mp4~Get Your Files Here !/1. The OSI Model/2. Physical Layer.mp4 4.8 MB
  • mp4~Get Your Files Here !/9. Types of Firewalls/1. Types of Firewalls Pt. 1.mp4 4.6 MB
  • mp4~Get Your Files Here !/1. The OSI Model/4. Network Layer.mp4 4.5 MB
【影视】 MS Cybersecurity Pro Track Enterprise Security Fundamentals
收录时间:2021-04-25 文档个数:91 文档大小:1.0 GB 最近下载:2024-10-04 人气:3832 磁力链接
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/02 Understanding the cybersecurity landscape/003 Current Cybersecurity Landscape.mp4 169.2 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/03 Red Team_ Penetration, lateral movement, escalation, and exfiltration/008 Red Team Kill Chain.mp4 142.4 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/014 Attack Detection.mp4 89.9 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/011 Blue Team Kill Chain.mp4 70.3 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/05 Beyond The Breach/016 Organization Preparations.mp4 68.5 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/012 Restrict Privilege Escalation.mp4 59.9 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/02 Understanding the cybersecurity landscape/005 Cost of Breach.mp4 59.5 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/03 Red Team_ Penetration, lateral movement, escalation, and exfiltration/007 The Attacker's Objective.mp4 55.8 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/02 Understanding the cybersecurity landscape/004 Assume Compromise Philosophy.mp4 53.5 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/05 Beyond The Breach/017 Developing and Maintaining Policies.mp4 50.7 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/013 Restrict Lateral Movement.mp4 43.0 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/05 Beyond The Breach/015 CIA Triad.mp4 30.7 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/03 Red Team_ Penetration, lateral movement, escalation, and exfiltration/006 Red Team versus Blue Team exercises.mp4 30.4 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/01 Introduction/002 Course overview.mp4 25.3 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/010 Blue Team.mp4 22.9 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/03 Red Team_ Penetration, lateral movement, escalation, and exfiltration/009 Document Vulnerabilities.mp4 10.6 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/01 Introduction/001 Instructor introduction.mp4 9.3 MB
  • mp4[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/07 Conclusion/018 Bonus Lecture_ What Next_.mp4 3.2 MB
  • pdf[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/014 AttackDetection.pdf 709.3 kB
  • pdf[TutsNode.com] - MS Cybersecurity Pro Track Enterprise Security Fundamentals/04 Blue Team Detection, Investigation, Response and Mitigation/011 BlueTeamKillChain.pdf 695.5 kB
【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity Management for New Managers
收录时间:2023-11-19 文档个数:46 文档大小:982.3 MB 最近下载:2024-10-04 人气:5287 磁力链接
  • mp4~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/5. Cyber Incident & Data Breach Response planning ( Video from IT Web Conference ).mp4 372.8 MB
  • mp4~Get Your Files Here !/2. Module 2 NIST Cybersecurity Framework (CSF)/4. Implementing the NIST CSF in your organisation.mp4 72.3 MB
  • mp4~Get Your Files Here !/5. Module 5 Incident Response and Recovery/1. Creating cybersecurity strategies and action plans.mp4 52.2 MB
  • mp4~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/4. Data Breaches.mp4 51.6 MB
  • mp4~Get Your Files Here !/5. Module 5 Incident Response and Recovery/3. Incident detection and analysis.mp4 48.3 MB
  • mp4~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/1. Understanding the importance of cybersecurity management.mp4 47.9 MB
  • mp4~Get Your Files Here !/4. Module 4 Scenario Planning and Strategy/2. Identifying threats and vulnerabilities.mp4 42.2 MB
  • mp4~Get Your Files Here !/5. Module 5 Incident Response and Recovery/2. Incident Response Planning.mp4 40.1 MB
  • mp4~Get Your Files Here !/3. Module 3 NICE Cybersecurity Workforce Framework/3. Knowledge, skills, and abilities (KSAs).mp4 34.2 MB
  • mp4~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/2. Roles and responsibilities of a cybersecurity manager.mp4 33.1 MB
  • mp4~Get Your Files Here !/2. Module 2 NIST Cybersecurity Framework (CSF)/3. Tiers and profiles.mp4 32.6 MB
  • mp4~Get Your Files Here !/1. Module 1 Introduction to Cybersecurity Management/3. NIST and NICE frameworks overview.mp4 29.3 MB
  • mp4~Get Your Files Here !/2. Module 2 NIST Cybersecurity Framework (CSF)/5. Challenges of Implementing the NIST Framework.mp4 22.4 MB
  • mp4~Get Your Files Here !/2. Module 2 NIST Cybersecurity Framework (CSF)/2. Core functions Identify, Protect, Detect, Respond, and Recover.mp4 18.8 MB
  • mp4~Get Your Files Here !/3. Module 3 NICE Cybersecurity Workforce Framework/4. Integrating the NICE Framework into workforce development and management.mp4 18.3 MB
  • mp4~Get Your Files Here !/3. Module 3 NICE Cybersecurity Workforce Framework/2. Workforce categories and specialty areas.mp4 15.7 MB
  • mp4~Get Your Files Here !/5. Module 5 Incident Response and Recovery/5. Post Incident Activities and Lessons learned.mp4 14.2 MB
  • mp4~Get Your Files Here !/8. Module 8 Course Wrap-up and Next Steps/1. Review of key concepts and frameworks.mp4 9.9 MB
  • mp4~Get Your Files Here !/6. Module 6 Cybersecurity Metrics and Reporting/1. Selecting meaningful cybersecurity metrics.mp4 9.5 MB
  • mp4~Get Your Files Here !/8. Module 8 Course Wrap-up and Next Steps/2. Developing a personal action plan for implementing cyber management practices.mp4 7.8 MB
【影视】 [ FreeCourseWeb.com ] Udemy - Cybersecurity For Beginners - Network Devices
收录时间:2021-10-08 文档个数:79 文档大小:980.5 MB 最近下载:2024-09-29 人气:2992 磁力链接
  • mp4~Get Your Files Here !/12. Lab Demonstration - Scanning Networks with NMAP/1. Lab Demonstration - Scanning Networks with NMAP Pt. 1.mp4 477.1 MB
  • mp4~Get Your Files Here !/12. Lab Demonstration - Scanning Networks with NMAP/2. Lab Demonstration - Scanning Networks with NMAP Pt. 2.mp4 331.7 MB
  • mp4~Get Your Files Here !/6. Denial-of-Service Attack (DoS) Attack/2. The 5 Principal Differences Between DoS & DDoS Attacks.mp4 14.1 MB
  • mp4~Get Your Files Here !/6. Denial-of-Service Attack (DoS) Attack/6. Common DoS Attack Pt. 2.mp4 9.8 MB
  • mp4~Get Your Files Here !/2. Network Devices/1. Common Network Devices.mp4 8.9 MB
  • mp4~Get Your Files Here !/1. The OSI Model/1. The OSI Model.mp4 7.8 MB
  • mp4~Get Your Files Here !/6. Denial-of-Service Attack (DoS) Attack/5. Common DoS Attack Pt. 1.mp4 6.9 MB
  • mp4~Get Your Files Here !/9. DNS Attacks/1. DNS Attacks.mp4 6.4 MB
  • mp4~Get Your Files Here !/2. Network Devices/2. More Common Network Devices.mp4 6.2 MB
  • mp4~Get Your Files Here !/6. Denial-of-Service Attack (DoS) Attack/1. DoS Vs. DDoS.mp4 6.0 MB
  • mp4~Get Your Files Here !/1. The OSI Model/3. Data Link Layer.mp4 5.7 MB
  • mp4~Get Your Files Here !/5. Intrusion Detection Systems (IDS) & Intrusion Prevention Systems (IPS)/2. Behavior Based IDS Vs. Knowledge Based IDS.mp4 5.5 MB
  • mp4~Get Your Files Here !/10. Footprinting/3. Footprinting Helps To.mp4 5.4 MB
  • mp4~Get Your Files Here !/10. Footprinting/4. Footprinting Methodology.mp4 5.4 MB
  • mp4~Get Your Files Here !/6. Denial-of-Service Attack (DoS) Attack/7. Three-Way-Handshake Importance To Network Attacks (SYN Flood).mp4 5.2 MB
  • mp4~Get Your Files Here !/4. Types of Firewalls/2. Types of Firewalls Pt. 2.mp4 5.1 MB
  • mp4~Get Your Files Here !/1. The OSI Model/2. Physical Layer.mp4 4.8 MB
  • mp4~Get Your Files Here !/4. Types of Firewalls/1. Types of Firewalls Pt. 1.mp4 4.6 MB
  • mp4~Get Your Files Here !/1. The OSI Model/4. Network Layer.mp4 4.5 MB
  • mp4~Get Your Files Here !/3. LAN & WAN Technologies/1. LAN & WAN Technologies.mp4 4.2 MB
【影视】 [ DevCourseWeb.com ] Udemy - Intro To Cybersecurity In Healthcare (2 Of 2),Plain and Simple
收录时间:2022-10-11 文档个数:26 文档大小:953.6 MB 最近下载:2024-10-03 人气:3458 磁力链接
  • mp4~Get Your Files Here !/3 - Ransomware and Cryptocurrency.mp4 309.9 MB
  • mp4~Get Your Files Here !/7 - Testing Your Vulnerabilities.mp4 150.2 MB
  • mp4~Get Your Files Here !/2 - Malware.mp4 136.5 MB
  • mp4~Get Your Files Here !/5 - Boston Childrens Hack The Response.mp4 123.0 MB
  • mp4~Get Your Files Here !/8 - HIPAA.mp4 70.3 MB
  • mp4~Get Your Files Here !/4 - Boston Childrens Hack The Issue.mp4 52.4 MB
  • mp4~Get Your Files Here !/6 - Boston Childrens Hack Lessons Learned.mp4 50.7 MB
  • mp4~Get Your Files Here !/1 - Introduction.mp4 49.6 MB
  • mp4~Get Your Files Here !/9 - Conclusions.mp4 10.9 MB
  • vtt~Get Your Files Here !/3 - Ransomware and Cryptocurrency English.vtt 24.5 kB
  • vtt~Get Your Files Here !/7 - Testing Your Vulnerabilities English.vtt 12.5 kB
  • html~Get Your Files Here !/13 - IN THE NEWS Some Straight Talk on Ransomware in Health Care.html 11.3 kB
  • vtt~Get Your Files Here !/2 - Malware English.vtt 10.7 kB
  • vtt~Get Your Files Here !/5 - Boston Childrens Hack The Response English.vtt 10.1 kB
  • vtt~Get Your Files Here !/8 - HIPAA English.vtt 5.9 kB
  • html~Get Your Files Here !/12 - IN THE NEWS.html 5.8 kB
  • vtt~Get Your Files Here !/6 - Boston Childrens Hack Lessons Learned English.vtt 4.6 kB
  • vtt~Get Your Files Here !/1 - Introduction English.vtt 4.5 kB
  • vtt~Get Your Files Here !/4 - Boston Childrens Hack The Issue English.vtt 4.3 kB
  • html~Get Your Files Here !/10 - IN THE NEWS Cyberattacks hit midsize hospitals hardest.html 4.2 kB
【影视】 [Coursera] Advanced Python Scripting for Cybersecurity Specialization - 3 course series
收录时间:2024-05-03 文档个数:97 文档大小:947.7 MB 最近下载:2024-10-04 人气:2723 磁力链接
  • mp4defensive-python/01_defensive-python onehack.us/01_defensive-python/01_04_detecting-ssh-brute-force-with-scapy.mp4 49.7 MB
  • mp4defensive-python/01_defensive-python onehack.us/01_defensive-python/01_07_connection-hijacking-with-scapy.mp4 48.4 MB
  • mp4python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_02_generating-password-variations-with-python.mp4 46.5 MB
  • mp4python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_05_service-detection-with-python.mp4 45.6 MB
  • mp4defensive-python/01_defensive-python onehack.us/01_defensive-python/01_05_feature-selection-for-traffic-analysis.mp4 45.2 MB
  • mp4establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_03_searching-the-registry-with-python.mp4 45.2 MB
  • mp4python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_02_querying-shodan-with-python.mp4 44.0 MB
  • mp4establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_02_traffic-analysis-with-python.mp4 43.7 MB
  • mp4python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_04_network-scanning-with-scapy.mp4 38.8 MB
  • mp4defensive-python/01_defensive-python onehack.us/01_defensive-python/01_02_brute-force-detection-with-windows-events.mp4 38.8 MB
  • mp4defensive-python/01_defensive-python onehack.us/01_defensive-python/01_03_detecting-ftp-brute-force-with-scapy.mp4 35.1 MB
  • mp4establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_04_searching-the-system-with-python.mp4 34.9 MB
  • mp4establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_02_dumping-chrome-credentials-with-python.mp4 34.8 MB
  • mp4establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_06_analyzing-passwords-with-python.mp4 34.5 MB
  • mp4python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_03_dns-queries-with-python.mp4 30.9 MB
  • mp4defensive-python/01_defensive-python onehack.us/01_defensive-python/01_06_detecting-anomalous-network-traffic-with-scapy.mp4 28.8 MB
  • mp4establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_05_building-c2-packets-with-python.mp4 27.1 MB
  • mp4python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_04_automating-brute-force.mp4 25.9 MB
  • mp4establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_05_cracking-the-linux-passwords-with-python.mp4 24.4 MB
  • mp4establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_04_detecting-encodings-with-python.mp4 24.1 MB
【影视】 [ CourseLala.com ] Linkedin - IT and Cybersecurity Risk Management Essential Training
收录时间:2022-03-25 文档个数:52 文档大小:904.4 MB 最近下载:2024-10-05 人气:2748 磁力链接
  • mp4~Get Your Files Here !/4. IT Risk Management in Practice/019. IT risk management techniques.mp4 60.9 MB
  • mp4~Get Your Files Here !/3. IT Risk Management in Context/009. IT risk management in medium companies.mp4 58.5 MB
  • mp4~Get Your Files Here !/3. IT Risk Management in Context/010. IT risk management in large companies.mp4 57.2 MB
  • mp4~Get Your Files Here !/5. IT Risk Management on the Job/020. Choosing the right IT risk management technique.mp4 52.4 MB
  • mp4~Get Your Files Here !/5. IT Risk Management on the Job/023. Operating controls.mp4 47.2 MB
  • mp4~Get Your Files Here !/2. What Is IT Risk Management/002. What is IT risk.mp4 42.6 MB
  • mp4~Get Your Files Here !/4. IT Risk Management in Practice/014. Performing the IT risk assessment.mp4 41.3 MB
  • mp4~Get Your Files Here !/4. IT Risk Management in Practice/018. Using an IT risk register.mp4 40.9 MB
  • mp4~Get Your Files Here !/4. IT Risk Management in Practice/015. Choosing an IT risk management framework.mp4 40.0 MB
  • mp4~Get Your Files Here !/3. IT Risk Management in Context/008. IT risk management in small companies.mp4 39.5 MB
  • mp4~Get Your Files Here !/5. IT Risk Management on the Job/022. Implementing controls.mp4 35.1 MB
  • mp4~Get Your Files Here !/2. What Is IT Risk Management/006. IT risk management roles and responsibilities.mp4 34.9 MB
  • mp4~Get Your Files Here !/5. IT Risk Management on the Job/021. Choosing controls.mp4 34.4 MB
  • mp4~Get Your Files Here !/2. What Is IT Risk Management/007. Making an IT risk decision.mp4 33.9 MB
  • mp4~Get Your Files Here !/2. What Is IT Risk Management/005. Types of IT risks.mp4 33.3 MB
  • mp4~Get Your Files Here !/3. IT Risk Management in Context/013. The minimum viable approach.mp4 32.7 MB
  • mp4~Get Your Files Here !/3. IT Risk Management in Context/011. Quantitative vs. qualitative risk assessments.mp4 32.6 MB
  • mp4~Get Your Files Here !/4. IT Risk Management in Practice/017. Determining an acceptable level of IT risk.mp4 30.3 MB
  • mp4~Get Your Files Here !/5. IT Risk Management on the Job/024. Validating controls.mp4 29.9 MB
  • mp4~Get Your Files Here !/2. What Is IT Risk Management/004. What is IT risk tolerance.mp4 28.4 MB
【影视】 [ FreeCourseWeb.com ] Udemy - Cybersecurity For Beginners - Network Attacks
收录时间:2021-09-18 文档个数:44 文档大小:901.0 MB 最近下载:2024-09-29 人气:2230 磁力链接
  • mp4~Get Your Files Here !/7. Lab Demonstration - Scanning Networks with NMAP Pt. 1/1. Lab Demonstration - Scanning Networks with NMAP Pt. 1.mp4 477.1 MB
  • mp4~Get Your Files Here !/8. Lab Demonstration - Scanning Networks with NMAP Pt. 2/1. Lab Demonstration - Scanning Networks with NMAP Pt. 2.mp4 331.8 MB
  • mp4~Get Your Files Here !/1. Denial-of-Service Attack (DoS) Attack/2. The 5 Principal Differences Between DoS & DDoS Attacks.mp4 14.1 MB
  • mp4~Get Your Files Here !/1. Denial-of-Service Attack (DoS) Attack/6. Common DoS Attack Pt. 2.mp4 9.8 MB
  • mp4~Get Your Files Here !/1. Denial-of-Service Attack (DoS) Attack/5. Common DoS Attack Pt. 1.mp4 6.9 MB
  • mp4~Get Your Files Here !/4. DNS Attacks/1. DNS Attacks.mp4 6.4 MB
  • mp4~Get Your Files Here !/1. Denial-of-Service Attack (DoS) Attack/1. DoS Vs. DDoS.mp4 6.0 MB
  • mp4~Get Your Files Here !/5. Footprinting/3. Footprinting Helps To.mp4 5.4 MB
  • mp4~Get Your Files Here !/5. Footprinting/4. Footprinting Methodology.mp4 5.4 MB
  • mp4~Get Your Files Here !/1. Denial-of-Service Attack (DoS) Attack/7. Three-Way-Handshake Importance To Network Attacks (SYN Flood).mp4 5.2 MB
  • mp4~Get Your Files Here !/1. Denial-of-Service Attack (DoS) Attack/4. Botnets, Controllers, and Bot Herders.mp4 4.1 MB
  • mp4~Get Your Files Here !/5. Footprinting/1. What is Footprinting.mp4 3.8 MB
  • mp4~Get Your Files Here !/6. What is Sniffing/1. What is Sniffing.mp4 3.3 MB
  • mp4~Get Your Files Here !/6. What is Sniffing/2. Passive & Active Sniffing.mp4 3.3 MB
  • mp4~Get Your Files Here !/4. DNS Attacks/2. Homograph Attack.mp4 3.2 MB
  • mp4~Get Your Files Here !/4. DNS Attacks/3. Hyperlink Spoofing.mp4 3.1 MB
  • mp4~Get Your Files Here !/2. Eavesdropping/1. Eavesdropping.mp4 3.0 MB
  • mp4~Get Your Files Here !/5. Footprinting/2. What Types of Information to Look For.mp4 2.8 MB
  • mp4~Get Your Files Here !/1. Denial-of-Service Attack (DoS) Attack/3. DoS & DDoS Countermeasures.mp4 2.6 MB
  • mp4~Get Your Files Here !/3. Impersonation/2. Impersonation Pt. 2.mp4 2.5 MB
共9页 上一页 1 2 3 4 5 6 7 8 9 下一页

友情链接