2048BT

为您索检到172条磁力链接,耗时0毫秒。

★注意★本站地址随时可能失效

找到本站最新地址的两种方法: 1、记住地址发布页2048bt.cc2048bt.cyoubt搜索.xyzbt搜索.cc 2、发送“地址”到2048bt@gmail.com
【影视】 LYNDA FOUNDATIONS OF CYBERSECURITY TUTORIAL
收录时间:2020-04-27 文档个数:27 文档大小:300.9 MB 最近下载:2024-04-30 人气:257 磁力链接
  • mp404. Security Architecture/04_04-Managing user access and identity.mp4 20.7 MB
  • mp404. Security Architecture/04_05-Implementing preventative security.mp4 18.8 MB
  • mp404. Security Architecture/04_06-Monitoring and alerts.mp4 15.7 MB
  • mp404. Security Architecture/04_01-Describing security requirements.mp4 14.9 MB
  • mp402. Cybersecurity Foundations/02_06-Dissecting the payment card industry and PCI DSS.mp4 14.6 MB
  • mp402. Cybersecurity Foundations/02_05-Implementing control frameworks.mp4 14.3 MB
  • mp405. Incident Management/05_02-Preparing for an incident.mp4 14.2 MB
  • mp404. Security Architecture/04_02-Architecting security risk.mp4 13.5 MB
  • mp403. Cybersecurity Threats/03_07-Understanding advanced persistent threats APTs.mp4 13.5 MB
  • mp402. Cybersecurity Foundations/02_02-Dissecting cyber risk.mp4 13.1 MB
  • mp402. Cybersecurity Foundations/02_01-Understanding the NIST cybersecurity framework.mp4 12.6 MB
  • mp403. Cybersecurity Threats/03_02-Dissecting security threats.mp4 11.6 MB
  • mp405. Incident Management/05_03-Responding to an incident.mp4 11.5 MB
  • mp402. Cybersecurity Foundations/02_03-Unpacking COBIT 5.mp4 10.3 MB
  • mp403. Cybersecurity Threats/03_03-Exploring cybercrime as an industry.mp4 9.9 MB
  • mp403. Cybersecurity Threats/03_05-Using callbacks to capture keystrokes.mp4 9.8 MB
  • mp403. Cybersecurity Threats/03_06-Hiding malware with rootkits.mp4 9.8 MB
  • mp402. Cybersecurity Foundations/02_07-Exploring the Cyber Essentials framework.mp4 9.3 MB
  • mp403. Cybersecurity Threats/03_04-Hiding malware through cloaking and alternate data streams.mp4 9.0 MB
  • mp404. Security Architecture/04_03-Selecting security controls.mp4 8.5 MB
【影视】 Linkedin Learning - Cybersecurity for Executives [Kip Boyle]
收录时间:2021-11-04 文档个数:87 文档大小:300.8 MB 最近下载:2022-05-19 人气:4 磁力链接
  • mp44. Stop Malicious Code/20.How to avoid malicious code.mp4 12.5 MB
  • mp48. Special Topics/41.Cybersecurity-related sales objectives.mp4 11.4 MB
  • mp45. Avoid Identity Theft/24.How to avoid identity theft.mp4 11.4 MB
  • mp42. How to Think about Cybersecurity/13.Where to get IT support.mp4 11.0 MB
  • mp42. How to Think about Cybersecurity/11.Not what you buy, how you travel.mp4 11.0 MB
  • mp48. Special Topics/35.Reasonable cybersecurity.mp4 10.5 MB
  • mp43. Avoid Phishing Attacks/15.What are phishing attacks.mp4 10.1 MB
  • mp41. Understand the Big Picture/06.Example - Organized crime.mp4 9.7 MB
  • mp46. Avoid Financial Cybertheft/27.What is financial cybertheft.mp4 9.6 MB
  • mp45. Avoid Identity Theft/23.What is identity theft.mp4 8.6 MB
  • mp46. Avoid Financial Cybertheft/28.How to avoid financial cybertheft.mp4 8.5 MB
  • mp44. Stop Malicious Code/19.What is malicious code.mp4 8.5 MB
  • mp45. Avoid Identity Theft/25.Organizational response to identity theft.mp4 8.5 MB
  • mp47. Avoid Cyberattacks on Long Trips/31.What are cyberattacks on long trips.mp4 8.5 MB
  • mp48. Special Topics/36.Cyber insurance.mp4 8.4 MB
  • mp43. Avoid Phishing Attacks/16.How to avoid phishing attacks.mp4 8.4 MB
  • mp41. Understand the Big Picture/05.Why are you a target.mp4 8.1 MB
  • mp42. How to Think about Cybersecurity/12.Germ theory.mp4 8.0 MB
  • mp48. Special Topics/40.Third-party cyber risk management.mp4 8.0 MB
  • mp46. Avoid Financial Cybertheft/29.Organizational response to financial cybertheft.mp4 7.8 MB
【影视】 Cybersecurity for Executives
收录时间:2020-01-31 文档个数:86 文档大小:300.7 MB 最近下载:2024-10-04 人气:6251 磁力链接
  • mp45.4. Stop Malicious Code/20.How to avoid malicious code.mp4 12.5 MB
  • mp49.8. Special Topics/41.Cybersecurity-related sales objectives.mp4 11.4 MB
  • mp46.5. Avoid Identity Theft/24.How to avoid identity theft.mp4 11.4 MB
  • mp43.2. How to Think about Cybersecurity/13.Where to get IT support.mp4 11.0 MB
  • mp43.2. How to Think about Cybersecurity/11.Not what you buy, how you travel.mp4 11.0 MB
  • mp49.8. Special Topics/35.Reasonable cybersecurity.mp4 10.5 MB
  • mp44.3. Avoid Phishing Attacks/15.What are phishing attacks.mp4 10.1 MB
  • mp42.1. Understand the Big Picture/06.Example - Organized crime.mp4 9.7 MB
  • mp47.6. Avoid Financial Cybertheft/27.What is financial cybertheft.mp4 9.6 MB
  • mp46.5. Avoid Identity Theft/23.What is identity theft.mp4 8.6 MB
  • mp47.6. Avoid Financial Cybertheft/28.How to avoid financial cybertheft.mp4 8.5 MB
  • mp45.4. Stop Malicious Code/19.What is malicious code.mp4 8.5 MB
  • mp46.5. Avoid Identity Theft/25.Organizational response to identity theft.mp4 8.5 MB
  • mp48.7. Avoid Cyberattacks on Long Trips/31.What are cyberattacks on long trips.mp4 8.5 MB
  • mp49.8. Special Topics/36.Cyber insurance.mp4 8.4 MB
  • mp44.3. Avoid Phishing Attacks/16.How to avoid phishing attacks.mp4 8.4 MB
  • mp42.1. Understand the Big Picture/05.Why are you a target.mp4 8.1 MB
  • mp43.2. How to Think about Cybersecurity/12.Germ theory.mp4 8.0 MB
  • mp49.8. Special Topics/40.Third-party cyber risk management.mp4 8.0 MB
  • mp47.6. Avoid Financial Cybertheft/29.Organizational response to financial cybertheft.mp4 7.8 MB
【影视】 Udemy.Learn.Cybersecurity.Python.Programming.In.One.Day.BOOKWARE-SOFTiMAGE
收录时间:2023-04-28 文档个数:47 文档大小:298.4 MB 最近下载:2024-05-10 人气:125 磁力链接
  • mp41 - Introduction/3 - Demo Installing Python.mp4 18.6 MB
  • mp46 - Cyber Security Scenarios Using Python/43 - Demo Cyber Threat Intelligence.mp4 17.1 MB
  • mp44 - Database Operations/33 - Demo Database Operations 1.mp4 16.0 MB
  • mp46 - Cyber Security Scenarios Using Python/39 - Demo Penetration Testing.mp4 15.4 MB
  • mp46 - Cyber Security Scenarios Using Python/40 - Demo Incident Response.mp4 12.2 MB
  • mp42 - Python Primer/7 - Methods and Functions.mp4 11.9 MB
  • mp44 - Database Operations/35 - Demo Database Operations 2.mp4 10.2 MB
  • mp46 - Cyber Security Scenarios Using Python/41 - Demo Digital Forensics.mp4 10.1 MB
  • mp46 - Cyber Security Scenarios Using Python/44 - Demo Malware Analysis.mp4 9.4 MB
  • mp43 - File Operations/27 - Demo File Operations 3.mp4 8.4 MB
  • mp43 - File Operations/29 - Demo File Operations 4.mp4 8.0 MB
  • mp43 - File Operations/31 - Demo Adding Arguments.mp4 8.0 MB
  • mp44 - Database Operations/32 - Opening and Writing to a Database.mp4 7.8 MB
  • mp43 - File Operations/25 - Demo File Operations 2.mp4 7.7 MB
  • mp41 - Introduction/1 - Introduction.mp4 7.1 MB
  • mp42 - Python Primer/18 - Lists.mp4 7.0 MB
  • mp43 - File Operations/30 - Adding Arguments.mp4 6.7 MB
  • mp42 - Python Primer/20 - Error Handling.mp4 6.4 MB
  • mp46 - Cyber Security Scenarios Using Python/42 - Demo Security Engineering.mp4 6.3 MB
  • mp42 - Python Primer/6 - Data Types.mp4 6.1 MB
【影视】 [ CourseWikia.com ] Linkedin - Landing Your First Cybersecurity Job
收录时间:2022-06-22 文档个数:44 文档大小:292.1 MB 最近下载:2024-09-26 人气:2867 磁力链接
  • mp4~Get Your Files Here !/02 - 1. Cybersecurity Careers/04 - PIVOT into cyber A framework to live by.mp4 36.8 MB
  • mp4~Get Your Files Here !/05 - 4. The Power of Networking/02 - Mentoring with a purpose.mp4 35.2 MB
  • mp4~Get Your Files Here !/06 - 5. Landing the Role/03 - Negotiating your benefits.mp4 34.8 MB
  • mp4~Get Your Files Here !/03 - 2. Basic Steps to Launching Your Career/02 - Your current skill set has value.mp4 25.8 MB
  • mp4~Get Your Files Here !/04 - 3. Building Your Brand in Cyber/01 - Marketing your skills.mp4 25.8 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Your future in cybersecurity.mp4 23.0 MB
  • mp4~Get Your Files Here !/07 - Conclusion/01 - Continue to grow.mp4 16.0 MB
  • mp4~Get Your Files Here !/04 - 3. Building Your Brand in Cyber/02 - Volunteering for success.mp4 11.2 MB
  • mp4~Get Your Files Here !/05 - 4. The Power of Networking/01 - Building your network.mp4 10.8 MB
  • mp4~Get Your Files Here !/03 - 2. Basic Steps to Launching Your Career/05 - Create your cyber roadmap.mp4 10.4 MB
  • mp4~Get Your Files Here !/03 - 2. Basic Steps to Launching Your Career/03 - Which roles map to your skill sets.mp4 8.6 MB
  • mp4~Get Your Files Here !/02 - 1. Cybersecurity Careers/02 - Popular roles in cyber.mp4 8.4 MB
  • mp4~Get Your Files Here !/03 - 2. Basic Steps to Launching Your Career/01 - Why do you want to be a cyber professional.mp4 8.0 MB
  • mp4~Get Your Files Here !/06 - 5. Landing the Role/02 - Acing your interview.mp4 7.9 MB
  • mp4~Get Your Files Here !/02 - 1. Cybersecurity Careers/03 - Cyberseek demo.mp4 7.9 MB
  • mp4~Get Your Files Here !/02 - 1. Cybersecurity Careers/01 - Cyber domains explained.mp4 7.5 MB
  • mp4~Get Your Files Here !/06 - 5. Landing the Role/01 - Finding a role that fits your skills and goals.mp4 7.5 MB
  • mp4~Get Your Files Here !/03 - 2. Basic Steps to Launching Your Career/04 - What are you missing.mp4 6.4 MB
  • pdf~Get Your Files Here !/Ex_Files_Landing_Your_First_Cybersecurity_Job/Exercise Files/Personal Skills Inventory.pdf 93.0 kB
  • pdf~Get Your Files Here !/Ex_Files_Landing_Your_First_Cybersecurity_Job/Exercise Files/Roadmap Form.pdf 31.9 kB
【影视】 [ TutGator.com ] Udemy - Cybersecurity For Beginners - MAC and IP Addressing
收录时间:2021-12-23 文档个数:66 文档大小:263.9 MB 最近下载:2024-10-01 人气:4673 磁力链接
  • mp4~Get Your Files Here !/5. MAC & IP Addressing Lab Demonstration/1. Lab Demonstration - MAC & IP Addressing.mp4 159.2 MB
  • mp4~Get Your Files Here !/7. Network Devices/1. Common Network Devices.mp4 8.9 MB
  • mp4~Get Your Files Here !/1. The OSI Model/1. The OSI Model.mp4 7.8 MB
  • mp4~Get Your Files Here !/7. Network Devices/2. Common Network Devices Pt. 2.mp4 6.2 MB
  • mp4~Get Your Files Here !/4. IPv4 Vs. IPv6/1. IPv4.mp4 5.7 MB
  • mp4~Get Your Files Here !/1. The OSI Model/3. Data Link Layer.mp4 5.7 MB
  • mp4~Get Your Files Here !/1. The OSI Model/2. Physical Layer.mp4 4.8 MB
  • mp4~Get Your Files Here !/1. The OSI Model/4. Network Layer.mp4 4.5 MB
  • mp4~Get Your Files Here !/8. LAN & WAN Technologies/1. LAN & WAN Technologies.mp4 4.2 MB
  • mp4~Get Your Files Here !/3. MAC Address/1. MAC Address.mp4 4.0 MB
  • mp4~Get Your Files Here !/6. TCP & UDP/6. Telnet.mp4 4.0 MB
  • mp4~Get Your Files Here !/1. The OSI Model/5. Transport Layer.mp4 3.6 MB
  • mp4~Get Your Files Here !/4. IPv4 Vs. IPv6/2. IPv6.mp4 3.6 MB
  • mp4~Get Your Files Here !/6. TCP & UDP/7. FTP.mp4 3.5 MB
  • mp4~Get Your Files Here !/1. The OSI Model/8. Application Layer.mp4 3.3 MB
  • mp4~Get Your Files Here !/6. TCP & UDP/8. SSH.mp4 3.2 MB
  • mp4~Get Your Files Here !/1. The OSI Model/7. Presentation Layer.mp4 3.1 MB
  • mp4~Get Your Files Here !/6. TCP & UDP/4. ICMP.mp4 3.0 MB
  • mp4~Get Your Files Here !/8. LAN & WAN Technologies/2. LAN & WAN Technologies Packet-Switching Technologies.mp4 3.0 MB
  • mp4~Get Your Files Here !/6. TCP & UDP/2. TCP Ports.mp4 2.9 MB
【影视】 Lynda - Practical Cybersecurity
收录时间:2020-03-12 文档个数:45 文档大小:244.8 MB 最近下载:2024-10-04 人气:2360 磁力链接
  • mp48. Monitoring Network Activity/164982_08_03_XR15_packets.mp4 13.1 MB
  • mp47. Checking for Common Mistakes in Web Apps/164982_07_02_XR15_scan.mp4 11.9 MB
  • mp43. Personal Firewalls/164982_03_02_XR15_mswf.mp4 10.7 MB
  • mp43. Personal Firewalls/164982_03_06_XR15_iptables.mp4 9.8 MB
  • mp43. Personal Firewalls/164982_03_04_XR15_advrules.mp4 9.5 MB
  • mp47. Checking for Common Mistakes in Web Apps/164982_07_01_XR15_intro.mp4 9.4 MB
  • mp46. Checking Hosts for Known Vulnerabilities/164982_06_04_XR15_scan.mp4 8.6 MB
  • mp41. Why Cybersecurity/164982_01_03_XR15_attack.mp4 8.6 MB
  • mp41. Why Cybersecurity/164982_01_01_XR15_cyber.mp4 8.4 MB
  • mp48. Monitoring Network Activity/164982_08_05_XR151_intruder.mp4 8.3 MB
  • mp48. Monitoring Network Activity/164982_08_04_XR15_filters.mp4 8.2 MB
  • mp42. Antivirus/164982_02_06_XR15_schedule.mp4 8.2 MB
  • mp43. Personal Firewalls/164982_03_03_XR15_advfw.mp4 7.9 MB
  • mp40. Introduction/164982_00_01_WX30_welcome.mp4 6.9 MB
  • mp43. Personal Firewalls/164982_03_05_XR15_zedlan.mp4 6.7 MB
  • mp44. Knowing What Is on Your Network/164982_04_05_XR15_zenmap.mp4 6.3 MB
  • mp45. Network Communications and Detecting Intruders/164982_05_04_XR15_honeypot.mp4 6.0 MB
  • mp45. Network Communications and Detecting Intruders/164982_05_02_XR15_filexfer.mp4 5.8 MB
  • mp48. Monitoring Network Activity/164982_08_02_XR15_capture.mp4 5.6 MB
  • mp42. Antivirus/164982_02_05_XR15_avsettings.mp4 5.5 MB
【影视】 [Lynda] Practical Cybersecurity-KTR
收录时间:2020-02-02 文档个数:44 文档大小:242.5 MB 最近下载:2024-10-04 人气:1669 磁力链接
  • mp48. Monitoring Network Activity/164982_08_03_XR15_packets.mp4 13.1 MB
  • mp47. Checking for Common Mistakes in Web Apps/164982_07_02_XR15_scan.mp4 11.9 MB
  • mp43. Personal Firewalls/164982_03_02_XR15_mswf.mp4 10.7 MB
  • mp43. Personal Firewalls/164982_03_06_XR15_iptables.mp4 9.8 MB
  • mp43. Personal Firewalls/164982_03_04_XR15_advrules.mp4 9.5 MB
  • mp47. Checking for Common Mistakes in Web Apps/164982_07_01_XR15_intro.mp4 9.4 MB
  • mp46. Checking Hosts for Known Vulnerabilities/164982_06_04_XR15_scan.mp4 8.6 MB
  • mp41. Why Cybersecurity/164982_01_03_XR15_attack.mp4 8.6 MB
  • mp41. Why Cybersecurity/164982_01_01_XR15_cyber.mp4 8.4 MB
  • mp48. Monitoring Network Activity/164982_08_05_XR151_intruder.mp4 8.3 MB
  • mp48. Monitoring Network Activity/164982_08_04_XR15_filters.mp4 8.2 MB
  • mp42. Antivirus/164982_02_06_XR15_schedule.mp4 8.2 MB
  • mp43. Personal Firewalls/164982_03_03_XR15_advfw.mp4 7.9 MB
  • mp40. Introduction/164982_00_01_WX30_welcome.mp4 6.9 MB
  • mp43. Personal Firewalls/164982_03_05_XR15_zedlan.mp4 6.7 MB
  • mp44. Knowing What Is on Your Network/164982_04_05_XR15_zenmap.mp4 6.3 MB
  • mp45. Network Communications and Detecting Intruders/164982_05_04_XR15_honeypot.mp4 6.0 MB
  • mp45. Network Communications and Detecting Intruders/164982_05_02_XR15_filexfer.mp4 5.8 MB
  • mp48. Monitoring Network Activity/164982_08_02_XR15_capture.mp4 5.6 MB
  • mp42. Antivirus/164982_02_05_XR15_avsettings.mp4 5.5 MB
【影视】 [ DevCourseWeb.com ] Linkedin - Exam Tips - CompTIA Cybersecurity Analyst + (CySA + ) (CS0-003)
收录时间:2023-05-13 文档个数:38 文档大小:240.4 MB 最近下载:2024-10-05 人气:2151 磁力链接
  • mp4~Get Your Files Here !/02 - 1. Exploring the CySA+ Domains/01 - Careers in information security.mp4 36.3 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - About the CYSA+ exam.mp4 33.6 MB
  • mp4~Get Your Files Here !/03 - 2. Exploring the CySA+ Domains/01 - Security Operations.mp4 28.6 MB
  • mp4~Get Your Files Here !/03 - 2. Exploring the CySA+ Domains/02 - Vulnerability Management.mp4 17.7 MB
  • mp4~Get Your Files Here !/02 - 1. Exploring the CySA+ Domains/02 - Value of certification.mp4 14.4 MB
  • mp4~Get Your Files Here !/02 - 1. Exploring the CySA+ Domains/03 - Stackable certifications.mp4 13.1 MB
  • mp4~Get Your Files Here !/03 - 2. Exploring the CySA+ Domains/03 - Incident Response Management.mp4 12.5 MB
  • mp4~Get Your Files Here !/01 - Introduction/02 - What's new in CS0-003.mp4 12.2 MB
  • mp4~Get Your Files Here !/03 - 2. Exploring the CySA+ Domains/04 - Reporting and Communication.mp4 11.0 MB
  • mp4~Get Your Files Here !/04 - 3. Inside the CySA+ Exam/02 - CySA+ in-person exam environment.mp4 10.5 MB
  • mp4~Get Your Files Here !/04 - 3. Inside the CySA+ Exam/01 - The CySA+ exam.mp4 8.4 MB
  • mp4~Get Your Files Here !/04 - 3. Inside the CySA+ Exam/05 - Passing the CySA+ exam.mp4 8.2 MB
  • mp4~Get Your Files Here !/04 - 3. Inside the CySA+ Exam/04 - CySA+ question types.mp4 7.8 MB
  • mp4~Get Your Files Here !/05 - 4. Preparing for the CySA+ Exam/01 - Study resources.mp4 6.7 MB
  • mp4~Get Your Files Here !/06 - Conclusion/01 - Continuing education requirements.mp4 6.0 MB
  • mp4~Get Your Files Here !/05 - 4. Preparing for the CySA+ Exam/02 - Exam tips.mp4 4.7 MB
  • mp4~Get Your Files Here !/06 - Conclusion/02 - Next steps.mp4 4.3 MB
  • mp4~Get Your Files Here !/04 - 3. Inside the CySA+ Exam/03 - At-home testing.mp4 4.2 MB
  • srt~Get Your Files Here !/01 - Introduction/02 - What's new in CS0-003.srt 7.4 kB
  • srt~Get Your Files Here !/02 - 1. Exploring the CySA+ Domains/01 - Careers in information security.srt 6.7 kB
【影视】 Cybersecurity Career Become a Security Auditor
收录时间:2023-02-20 文档个数:41 文档大小:238.6 MB 最近下载:2024-10-02 人气:4188 磁力链接
  • mp4[TutsNode.net] - Cybersecurity Career Become a Security Auditor/ 03 - 2. Security Frameworks/06 - NIST security framework.mp4.mp4 35.7 MB
  • mp4[TutsNode.net] - Cybersecurity Career Become a Security Auditor/ 01 - Start a Fulfilling Career in Security Auditing and Compliance/01 - Helping organizations stay secure through auditing.mp4.mp4 22.0 MB
  • mp4[TutsNode.net] - Cybersecurity Career Become a Security Auditor/ 02 - 1. Security Auditing Basics/02 - What are security auditing and compliance?.mp4.mp4 21.2 MB
  • mp4[TutsNode.net] - Cybersecurity Career Become a Security Auditor/ 02 - 1. Security Auditing Basics/04 - Who can be a security auditor?.mp4.mp4 20.3 MB
  • mp4[TutsNode.net] - Cybersecurity Career Become a Security Auditor/ 04 - 3. Gaining Employment in Security Auditing/08 - How to land your first security auditing position.mp4.mp4 20.3 MB
  • mp4[TutsNode.net] - Cybersecurity Career Become a Security Auditor/ 05 - 4. Roadmap to Success as a Security Auditor/11 - How to communicate effectively as a security auditor.mp4.mp4 19.3 MB
  • mp4[TutsNode.net] - Cybersecurity Career Become a Security Auditor/ 05 - 4. Roadmap to Success as a Security Auditor/10 - Be a successful team auditor.mp4.mp4 17.8 MB
  • mp4[TutsNode.net] - Cybersecurity Career Become a Security Auditor/ 03 - 2. Security Frameworks/07 - PCI security frameworks.mp4.mp4 17.7 MB
  • mp4[TutsNode.net] - Cybersecurity Career Become a Security Auditor/ 06 - Conclusion/13 - Continuing on with security auditing.mp4.mp4 15.2 MB
  • mp4[TutsNode.net] - Cybersecurity Career Become a Security Auditor/ 06 - Conclusion/12 - Security auditing leads to many opportunities.mp4.mp4 15.1 MB
  • mp4[TutsNode.net] - Cybersecurity Career Become a Security Auditor/ 04 - 3. Gaining Employment in Security Auditing/09 - How to level up in security auditing.mp4.mp4 14.9 MB
  • mp4[TutsNode.net] - Cybersecurity Career Become a Security Auditor/ 02 - 1. Security Auditing Basics/03 - Why do organizations need to be audited?.mp4.mp4 12.4 MB
  • mp4[TutsNode.net] - Cybersecurity Career Become a Security Auditor/ 03 - 2. Security Frameworks/05 - Overview of common security frameworks.mp4.mp4 4.3 MB
  • pad/2.pad/2 258.8 kB
  • pad/1.pad/1 258.6 kB
  • pad/10.pad/10 257.0 kB
  • pad/6.pad/6 248.1 kB
  • pad/8.pad/8 245.1 kB
  • pad/11.pad/11 165.3 kB
  • pad/9.pad/9 148.1 kB
【影视】 [ DevCourseWeb.com ] China's Cybersecurity and Privacy Regulations - Essential Training
收录时间:2024-09-03 文档个数:49 文档大小:237.4 MB 最近下载:2024-09-27 人气:47 磁力链接
  • mp4~Get Your Files Here !/05 - 4.Personal Information Protection Law/01 - Personal Information Protection Law breakdown.mp4 29.7 MB
  • mp4~Get Your Files Here !/05 - 4.Personal Information Protection Law/02 - Legal basis and consent.mp4 16.8 MB
  • mp4~Get Your Files Here !/05 - 4.Personal Information Protection Law/04 - Personal information handler obligations.mp4 15.5 MB
  • mp4~Get Your Files Here !/05 - 4.Personal Information Protection Law/05 - Cross-border data transfer and updates to the regulation.mp4 15.2 MB
  • mp4~Get Your Files Here !/03 - 2. Cybersecurity Law/01 - Cybersecurity Law breakdown.mp4 13.6 MB
  • mp4~Get Your Files Here !/05 - 4.Personal Information Protection Law/03 - Data subject rights.mp4 13.3 MB
  • mp4~Get Your Files Here !/03 - 2. Cybersecurity Law/02 - Multilevel protection scheme.mp4 13.2 MB
  • mp4~Get Your Files Here !/04 - 3. Data Security Law/01 - Data Security Law breakdown.mp4 12.8 MB
  • mp4~Get Your Files Here !/03 - 2. Cybersecurity Law/03 - Multilevel protection scheme technical components.mp4 10.7 MB
  • mp4~Get Your Files Here !/02 - 1. China Regulation Basics/02 - Scope.mp4 10.7 MB
  • mp4~Get Your Files Here !/02 - 1. China Regulation Basics/03 - Important dates.mp4 10.6 MB
  • mp4~Get Your Files Here !/06 - 5. Real-World Guidance/02 - Enforcement action examples.mp4 10.2 MB
  • mp4~Get Your Files Here !/04 - 3. Data Security Law/03 - Key provisions of the Data Security Law.mp4 9.7 MB
  • mp4~Get Your Files Here !/04 - 3. Data Security Law/02 - Data classification and cross-border transfer guidelines.mp4 8.6 MB
  • mp4~Get Your Files Here !/01 - Introduction/03 - Definitions.mp4 7.3 MB
  • mp4~Get Your Files Here !/07 - Conclusion/02 - Additional resources.mp4 6.8 MB
  • mp4~Get Your Files Here !/02 - 1. China Regulation Basics/01 - Overview of the recent cybersecurity and privacy regulations.mp4 6.7 MB
  • mp4~Get Your Files Here !/07 - Conclusion/01 - How to get started.mp4 6.5 MB
  • mp4~Get Your Files Here !/06 - 5. Real-World Guidance/01 - Successful certification examples.mp4 6.0 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Cybersecurity and privacy regulation in China.mp4 4.7 MB
【影视】 The Cybersecurity Threat Landscape
收录时间:2022-10-05 文档个数:61 文档大小:235.6 MB 最近下载:2024-10-03 人气:2161 磁力链接
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/10 - 9. Supply Chain Attacks and Third-Party Risks/01 - The threat of supply chain attacks and third-party risks.mp4 16.2 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/05 - 4. Botnets and DDoS attacks/02 - Protect against botnets and DDoS threats.mp4 15.8 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/08 - 7. Unmanaged IoT Devices/01 - Explore the threat of unmanaged IoT devices.mp4 14.4 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/09 - 8. Shadow IT/01 - Explore the threat of shadow IT.mp4 14.2 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/08 - 7. Unmanaged IoT Devices/02 - Protect against unmanaged IoT devices.mp4 12.4 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/09 - 8. Shadow IT/02 - Protect against shadow IT.mp4 12.4 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/06 - 5. Deepfakes/02 - Protect against deepfakes.mp4 12.1 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/03 - 2. Phishing and Smishing/02 - Protect against phishing and smishing.mp4 12.0 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/11 - Conclusion/01 - Stay up to date on cybersecurity.mp4 11.8 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/02 - 1. Malware and Ransomware/02 - Protect against malware and ransomware.mp4 11.7 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/02 - 1. Malware and Ransomware/01 - Explore the threat of malware and ransomware.mp4 11.6 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/03 - 2. Phishing and Smishing/01 - Explore the threat of phishing and smishing.mp4 11.3 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/05 - 4. Botnets and DDoS attacks/01 - Explore the threat of botnets and DDoS attacks.mp4 11.1 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/07 - 6. Insider Threats/01 - Explore the risk of insider threats.mp4 10.9 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/10 - 9. Supply Chain Attacks and Third-Party Risks/02 - Protect against supply chain attacks and third-party risks.mp4 10.5 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/04 - 3. Business Email Compromise/01 - Explore the threat of business email compromise.mp4 9.4 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/01 - Introduction/01 - Examine the cybersecurity threat landscape.mp4 9.4 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/04 - 3. Business Email Compromise/02 - Protect against business email compromise.mp4 9.2 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/06 - 5. Deepfakes/01 - Explore the threat of deepfakes.mp4 9.0 MB
  • mp4[TutsNode.net] - The Cybersecurity Threat Landscape/07 - 6. Insider Threats/02 - Protect against insider threats.mp4 7.0 MB
【影视】 [ CoursePig.com ] Linkedin - The Cybersecurity Threat Landscape (2022)
收录时间:2023-04-11 文档个数:42 文档大小:232.7 MB 最近下载:2024-09-30 人气:730 磁力链接
  • mp4~Get Your Files Here !/10 - 9. Supply Chain Attacks and Third-Party Risks/01 - The threat of supply chain attacks and third-party risks.mp4 16.2 MB
  • mp4~Get Your Files Here !/05 - 4. Botnets and DDoS attacks/02 - Protect against botnets and DDoS threats.mp4 15.8 MB
  • mp4~Get Your Files Here !/08 - 7. Unmanaged IoT Devices/01 - Explore the threat of unmanaged IoT devices.mp4 14.4 MB
  • mp4~Get Your Files Here !/09 - 8. Shadow IT/01 - Explore the threat of shadow IT.mp4 14.2 MB
  • mp4~Get Your Files Here !/08 - 7. Unmanaged IoT Devices/02 - Protect against unmanaged IoT devices.mp4 12.4 MB
  • mp4~Get Your Files Here !/09 - 8. Shadow IT/02 - Protect against shadow IT.mp4 12.4 MB
  • mp4~Get Your Files Here !/06 - 5. Deepfakes/02 - Protect against deepfakes.mp4 12.1 MB
  • mp4~Get Your Files Here !/03 - 2. Phishing and Smishing/02 - Protect against phishing and smishing.mp4 12.0 MB
  • mp4~Get Your Files Here !/11 - Conclusion/01 - Stay up to date on cybersecurity.mp4 11.8 MB
  • mp4~Get Your Files Here !/02 - 1. Malware and Ransomware/02 - Protect against malware and ransomware.mp4 11.7 MB
  • mp4~Get Your Files Here !/02 - 1. Malware and Ransomware/01 - Explore the threat of malware and ransomware.mp4 11.6 MB
  • mp4~Get Your Files Here !/03 - 2. Phishing and Smishing/01 - Explore the threat of phishing and smishing.mp4 11.3 MB
  • mp4~Get Your Files Here !/05 - 4. Botnets and DDoS attacks/01 - Explore the threat of botnets and DDoS attacks.mp4 11.1 MB
  • mp4~Get Your Files Here !/07 - 6. Insider Threats/01 - Explore the risk of insider threats.mp4 10.9 MB
  • mp4~Get Your Files Here !/10 - 9. Supply Chain Attacks and Third-Party Risks/02 - Protect against supply chain attacks and third-party risks.mp4 10.5 MB
  • mp4~Get Your Files Here !/04 - 3. Business Email Compromise/01 - Explore the threat of business email compromise.mp4 9.4 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Examine the cybersecurity threat landscape.mp4 9.4 MB
  • mp4~Get Your Files Here !/04 - 3. Business Email Compromise/02 - Protect against business email compromise.mp4 9.2 MB
  • mp4~Get Your Files Here !/06 - 5. Deepfakes/01 - Explore the threat of deepfakes.mp4 9.0 MB
  • mp4~Get Your Files Here !/07 - 6. Insider Threats/02 - Protect against insider threats.mp4 7.0 MB
【影视】 Cybersecurity {AM}
收录时间:2020-02-10 文档个数:39 文档大小:230.5 MB 最近下载:2024-10-03 人气:1140 磁力链接
  • mp40 Introduction/369625_00_03_XR15_Reference.mp4 10.2 MB
  • mp43 Architecting Security/369625_03_05_XR15_Cloud_Attribute_Taxonomy.mp4 10.1 MB
  • mp43 Architecting Security/369625_03_01_XR15_Introduction_to_SABSA.mp4 9.9 MB
  • mp42 Cloud Security Guidance/369625_02_16_SO30_XR30_Solution.mp4 9.9 MB
  • mp42 Cloud Security Guidance/369625_02_03_XR15_Information_Management.mp4 9.8 MB
  • mp41 Cloud Fundamentals/369625_01_01_XR15_Essential_Characteristics.mp4 9.6 MB
  • mp41 Cloud Fundamentals/369625_01_06_XR15_Cloud_Incidents.mp4 9.4 MB
  • mp42 Cloud Security Guidance/369625_02_02_XR15_Legal_Compliance_and_Audit.mp4 8.9 MB
  • mp41 Cloud Fundamentals/369625_01_09_XR15_Cloud_Trust.mp4 8.8 MB
  • mp42 Cloud Security Guidance/369625_02_07_XR15_Incident_Response.mp4 8.8 MB
  • mp42 Cloud Security Guidance/369625_02_11_XR15_Identity_in_the_Cloud.mp4 8.4 MB
  • mp42 Cloud Security Guidance/369625_02_08_XR15_Application_Security.mp4 8.3 MB
  • mp42 Cloud Security Guidance/369625_02_13_XR15_Virtualisation.mp4 8.2 MB
  • mp42 Cloud Security Guidance/369625_02_05_XR15_Traditional_Security_BCP_and_DR.mp4 8.2 MB
  • mp42 Cloud Security Guidance/369625_02_12_XR15_Cloud_Access_Control.mp4 7.9 MB
  • mp41 Cloud Fundamentals/369625_01_02_XR15_Infrastructure_as_a_Service.mp4 7.6 MB
  • mp43 Architecting Security/369625_03_02_XR15_Fast_Tracker.mp4 7.4 MB
  • mp41 Cloud Fundamentals/369625_01_05_XR151_Deployment_Models.mp4 6.7 MB
  • mp42 Cloud Security Guidance/369625_02_10_XR15_Encryption_and_Key_Management.mp4 6.6 MB
  • mp43 Architecting Security/369625_03_03_XR15_SABSA_Attributes.mp4 6.3 MB
【影视】 [ CourseWikia.com ] Cybersecurity at Work (2023)
收录时间:2023-08-09 文档个数:54 文档大小:199.8 MB 最近下载:2024-10-04 人气:520 磁力链接
  • mp4~Get Your Files Here !/06 - 5. Hybrid Work Security/05 - Scenario Stolen laptop.mp4 18.0 MB
  • mp4~Get Your Files Here !/05 - 4. Software and Internet Security/05 - The anatomy of a cyber attack.mp4 11.6 MB
  • mp4~Get Your Files Here !/04 - 3. Account Security/01 - Password security.mp4 11.5 MB
  • mp4~Get Your Files Here !/06 - 5. Hybrid Work Security/01 - Physical office security.mp4 10.9 MB
  • mp4~Get Your Files Here !/02 - 1. Social Engineering Scams and Attacks/05 - Scenario Voice phishing.mp4 10.1 MB
  • mp4~Get Your Files Here !/02 - 1. Social Engineering Scams and Attacks/04 - Counterfeit apps.mp4 10.0 MB
  • mp4~Get Your Files Here !/06 - 5. Hybrid Work Security/04 - Smartphone and mobile device attacks.mp4 9.4 MB
  • mp4~Get Your Files Here !/04 - 3. Account Security/02 - Data breaches and compromised passwords.mp4 9.0 MB
  • mp4~Get Your Files Here !/03 - 2. Wireless Security/01 - Public Wi-Fi.mp4 9.0 MB
  • mp4~Get Your Files Here !/05 - 4. Software and Internet Security/04 - Malware Ransomware.mp4 9.0 MB
  • mp4~Get Your Files Here !/06 - 5. Hybrid Work Security/03 - Laptop and desktop security.mp4 8.2 MB
  • mp4~Get Your Files Here !/05 - 4. Software and Internet Security/01 - Updating software.mp4 8.1 MB
  • mp4~Get Your Files Here !/02 - 1. Social Engineering Scams and Attacks/03 - Social media information (over)sharing.mp4 7.9 MB
  • mp4~Get Your Files Here !/08 - Conclusion/01 - You are part of the security team.mp4 7.2 MB
  • mp4~Get Your Files Here !/06 - 5. Hybrid Work Security/02 - Physical office security best practices.mp4 7.1 MB
  • mp4~Get Your Files Here !/03 - 2. Wireless Security/02 - Home Wi-Fi.mp4 6.9 MB
  • mp4~Get Your Files Here !/02 - 1. Social Engineering Scams and Attacks/02 - Email phishing.mp4 6.5 MB
  • mp4~Get Your Files Here !/02 - 1. Social Engineering Scams and Attacks/01 - Social engineering overview.mp4 6.4 MB
  • mp4~Get Your Files Here !/07 - 6. Data Security/01 - Intellectual property.mp4 5.6 MB
  • mp4~Get Your Files Here !/04 - 3. Account Security/03 - Multifactor authentication.mp4 5.1 MB
【影视】 [ FreeCourseWeb.com ] Cybersecurity Careers - Build Your Brand in Cybersecurity
收录时间:2024-03-28 文档个数:34 文档大小:189.3 MB 最近下载:2024-10-04 人气:752 磁力链接
  • mp4~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/04 - Optimizing your LinkedIn profile.mp4 18.6 MB
  • mp4~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/05 - Five tips for using LinkedIn effectively.mp4 17.3 MB
  • mp4~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/02 - Speaking at events and conferences.mp4 16.1 MB
  • mp4~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/01 - Creating and sharing content.mp4 16.0 MB
  • mp4~Get Your Files Here !/02 - 1. Personal Branding in Cybersecurity/03 - Benefits of building your personal brand in cybersecurity.mp4 13.9 MB
  • mp4~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/03 - Building an online presence.mp4 13.6 MB
  • mp4~Get Your Files Here !/02 - 1. Personal Branding in Cybersecurity/02 - Elements of a strong personal brand.mp4 13.1 MB
  • mp4~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/02 - Developing a personal brand statement.mp4 11.7 MB
  • mp4~Get Your Files Here !/05 - 4. Networking for Cybersecurity Professionals/03 - Staying up-to-date with industry trends.mp4 11.6 MB
  • mp4~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/03 - Contributing to open-source projects.mp4 11.0 MB
  • mp4~Get Your Files Here !/05 - 4. Networking for Cybersecurity Professionals/01 - Networking and nurturing professional relationships.mp4 10.4 MB
  • mp4~Get Your Files Here !/02 - 1. Personal Branding in Cybersecurity/01 - What is personal branding.mp4 10.1 MB
  • mp4~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/01 - Identifying your unique value proposition.mp4 10.0 MB
  • mp4~Get Your Files Here !/05 - 4. Networking for Cybersecurity Professionals/02 - Effective networking strategies.mp4 8.0 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Grow your cybersecurity career with personal branding.mp4 3.9 MB
  • mp4~Get Your Files Here !/06 - Conclusion/01 - Next steps.mp4 3.9 MB
  • srt~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/02 - Speaking at events and conferences.srt 8.6 kB
  • srt~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/01 - Creating and sharing content.srt 7.9 kB
  • srt~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/04 - Optimizing your LinkedIn profile.srt 7.5 kB
  • srt~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/03 - Building an online presence.srt 7.5 kB
【影视】 [ CoursePig.com ] Linkedin - Microsoft Cybersecurity Architect Expert (SC-100) Cert Prep - 4 Design Strategy for Data and Applications
收录时间:2022-11-01 文档个数:24 文档大小:153.6 MB 最近下载:2024-10-04 人气:2696 磁力链接
  • mp4~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/02 - Design a strategy to identify and protect sensitive data.mp4 27.6 MB
  • mp4~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/03 - Specify a security strategy for applications and APIs.mp4 24.9 MB
  • mp4~Get Your Files Here !/01 - Introduction/01 - Prepping for the SC-100 exam.mp4 22.5 MB
  • mp4~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/02 - Specify a security standard for onboarding a new application.mp4 18.4 MB
  • mp4~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/03 - Specify an encryption standard for data at rest and in motion.mp4 16.3 MB
  • mp4~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/01 - Specify priorities for mitigating threats to applications.mp4 14.2 MB
  • mp4~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/01 - Specify priorities for mitigating threats to data.mp4 13.9 MB
  • mp4~Get Your Files Here !/01 - Introduction/02 - What you should know.mp4 6.8 MB
  • mp4~Get Your Files Here !/04 - Conclusion/01 - Next steps.mp4 5.0 MB
  • mp4~Get Your Files Here !/01 - Introduction/03 - Lab setup.mp4 3.4 MB
  • pdf~Get Your Files Here !/Ex_Files_MSFT_Cybersecurity_Arch_Expert_SC_100_Cert_Prep_4/Exercise Files/Sign up for a free trial.pdf 338.4 kB
  • pdf~Get Your Files Here !/Ex_Files_MSFT_Cybersecurity_Arch_Expert_SC_100_Cert_Prep_4/Exercise Files/SC-100 Exam Study Guide Course 4.pdf 47.8 kB
  • srt~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/02 - Design a strategy to identify and protect sensitive data.srt 18.1 kB
  • srt~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/03 - Specify a security strategy for applications and APIs.srt 15.6 kB
  • srt~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/02 - Specify a security standard for onboarding a new application.srt 9.7 kB
  • srt~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/03 - Specify an encryption standard for data at rest and in motion.srt 9.2 kB
  • srt~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/01 - Specify priorities for mitigating threats to data.srt 9.0 kB
  • srt~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/01 - Specify priorities for mitigating threats to applications.srt 7.7 kB
  • srt~Get Your Files Here !/01 - Introduction/02 - What you should know.srt 3.4 kB
  • srt~Get Your Files Here !/04 - Conclusion/01 - Next steps.srt 2.6 kB
【影视】 Cybersecurity-The Real Agenda.wmv
收录时间:2021-01-14 文档个数:1 文档大小:148.0 MB 最近下载:2024-08-19 人气:5056 磁力链接
  • wmvCybersecurity-The Real Agenda.wmv 148.0 MB
【影视】 [ FreeCourseWeb.com ] Oreilly - Cybersecurity and Cloud Computing Challenges
收录时间:2020-04-12 文档个数:18 文档大小:135.9 MB 最近下载:2024-10-01 人气:1307 磁力链接
  • mp4~Get Your Course Here !/08 - Technology Services.mp4 25.6 MB
  • mp4~Get Your Course Here !/12 - Cloud Attack Vectors and Security Considerations by Service Model.mp4 17.2 MB
  • mp4~Get Your Course Here !/04 - Cloud Service Models.mp4 14.6 MB
  • mp4~Get Your Course Here !/10 - STRIDE Threat Model and Top Threats.mp4 13.7 MB
  • mp4~Get Your Course Here !/09 - Notional Cloud Service Provide.mp4 11.4 MB
  • mp4~Get Your Course Here !/01 - Cloud Data Security.mp4 9.9 MB
  • mp4~Get Your Course Here !/05 - NIST Cloud Reference Model and Key Ecosystem Roles.mp4 9.1 MB
  • mp4~Get Your Course Here !/07 - Cloud Cross-cutting Aspects.mp4 8.8 MB
  • mp4~Get Your Course Here !/03 - Cloud Deployment Models.mp4 8.1 MB
  • mp4~Get Your Course Here !/06 - Cloud Computing Team Functions.mp4 7.4 MB
  • mp4~Get Your Course Here !/11 - Treacherous 12.mp4 6.2 MB
  • mp4~Get Your Course Here !/02 - Transparency Reports Database.mp4 3.9 MB
  • txtHow to Support [ FreeCourseWeb.com ] for Free.txt 450 Bytes
  • txt~Get Your Course Here !/How to Support [ FreeCourseWeb.com ] for Free.txt 450 Bytes
  • urlGet More App Tips and Secrets!.url 177 Bytes
  • url~Get Your Course Here !/Resources.url 177 Bytes
  • url~Get All Courses Here !.url 175 Bytes
  • url~Get Your Course Here !/Bonus Courses + Project Files.url 173 Bytes
【影视】 Linkedin.Learning.Advance.Your.Cybersecurity.Career-XQZT
收录时间:2023-05-21 文档个数:14 文档大小:133.1 MB 最近下载:2024-08-12 人气:154 磁力链接
  • mkv02.03-review_your_cybersecurity_documentation.mkv 20.8 MB
  • mkv04.01-improve_your_soft_skills.mkv 19.7 MB
  • mkv02.01-self-evaluate_your_cybersecurity_career.mkv 18.9 MB
  • mkv03.01-continuously_learn_new_skills.mkv 18.3 MB
  • mkv01.01-to_maintain_longevity_you_need_to_keep_learning.mkv 13.8 MB
  • mkv03.03-become_a_sme_for_your_role.mkv 11.6 MB
  • mkv03.02-complete_cybersecurity_projects_to_advance_your_career.mkv 10.8 MB
  • mkv05.01-excel_and_advance_in_your_career.mkv 6.5 MB
  • mkv04.02-networking_soft_skills.mkv 4.0 MB
  • mkv02.02-ask_questions_that_align_with_your_organizations_mission.mkv 3.9 MB
  • mkv02.04-learn_the_importance_of_kpis_and_metrics_in_cybersecurity.mkv 2.4 MB
  • mkv03.04-engage_in_meetings_to_stand_out.mkv 2.3 MB
  • nfolinkedin.learning.advance.your.cybersecurity.career-xqzt.nfo 600 Bytes
  • sfvlinkedin.learning.advance.your.cybersecurity.career-xqzt.sfv 213 Bytes
共9页 上一页 4 5 6 7 8 9 下一页

友情链接