搜索
[CourseClub.Me] Coursera – IT Security Defense against the digital dark arts
磁力链接/BT种子名称
[CourseClub.Me] Coursera – IT Security Defense against the digital dark arts
磁力链接/BT种子简介
种子哈希:
1053f9302071a2fee45f858a2154faf05cc6b1e5
文件大小:
2.41G
已经下载:
346
次
下载速度:
极快
收录时间:
2024-01-29
最近下载:
2025-02-17
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:1053F9302071A2FEE45F858A2154FAF05CC6B1E5
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
暗网禁地
91短视频
TikTok成人版
PornHub
草榴社区
乱伦社区
少女初夜
萝莉岛
最近搜索
16 horsepower
【白菜妹妹】
asw ai remaster
anissa kate
queen rock montreal
福田由贵
信长协奏曲
60
珍藏
推特+桃仙小妖精
边倒立
咬一口小樱奈
香香公主
sparrows 2015
电话第一人
marx
摄像破解
丝袜美腿
taylor+swift
law and order svu 1
the circle
韩国伪娘suhyun
假面舞团
乱伦 妈妈
aiss
纳粹荒淫史
vita 合集
姬子猫 hime tsu
+探花+合集
情趣圆桌
文件列表
03_aaa-security-not-roadside-assistance/01_authentication/02_multifactor-authentication.mp4
104.5 MB
04_securing-your-networks/02_wireless-security/03_lets-get-rid-of-wep-wpa-wpa2.mp4
87.4 MB
06_creating-a-company-culture-for-security/01_risk-in-the-workplace/01_security-goals.mp4
78.6 MB
02_pelcgbybtl-cryptology/01_symmetric-encryption/04_symmetric-encryption-algorithms.mp4
74.3 MB
06_creating-a-company-culture-for-security/03_incident-handling/02_incident-response-and-recovery.mp4
64.5 MB
06_creating-a-company-culture-for-security/03_incident-handling/01_incident-reporting-and-analysis.mp4
63.8 MB
02_pelcgbybtl-cryptology/02_public-key-or-asymmetric-encryption/01_asymmetric-cryptography.mp4
59.5 MB
06_creating-a-company-culture-for-security/02_users/01_user-habits.mp4
59.4 MB
05_defense-in-depth/01_system-hardening/04_logging-and-auditing.mp4
58.8 MB
02_pelcgbybtl-cryptology/04_cryptography-applications/01_public-key-infrastructure.mp4
58.5 MB
03_aaa-security-not-roadside-assistance/01_authentication/07_kerberos.mp4
58.0 MB
04_securing-your-networks/01_secure-network-architecture/01_network-hardening-best-practices.mp4
57.8 MB
02_pelcgbybtl-cryptology/01_symmetric-encryption/01_cryptography.mp4
56.7 MB
02_pelcgbybtl-cryptology/04_cryptography-applications/03_cryptography-in-action.mp4
55.7 MB
05_defense-in-depth/01_system-hardening/06_antimalware-protection.mp4
55.5 MB
05_defense-in-depth/02_application-hardening/01_software-patch-management.mp4
54.4 MB
02_pelcgbybtl-cryptology/04_cryptography-applications/07_cryptographic-hardware.mp4
53.7 MB
04_securing-your-networks/01_secure-network-architecture/03_network-hardware-hardening.mp4
52.6 MB
01_understanding-security-threats/01_introduction-to-it-security/01_course-introduction.mp4
49.2 MB
03_aaa-security-not-roadside-assistance/01_authentication/01_authentication-best-practices.mp4
48.6 MB
04_securing-your-networks/02_wireless-security/01_wep-encryption-and-why-you-shouldn-t-use-it.mp4
47.3 MB
06_creating-a-company-culture-for-security/01_risk-in-the-workplace/02_measuring-and-assessing-risk.mp4
44.9 MB
05_defense-in-depth/01_system-hardening/08_disk-encryption.mp4
44.5 MB
02_pelcgbybtl-cryptology/03_hashing/02_hashing-algorithms.mp4
43.9 MB
04_securing-your-networks/03_network-monitoring/04_intrusion-detection-prevention-systems.mp4
42.7 MB
02_pelcgbybtl-cryptology/03_hashing/04_hashing-algorithms-continued.mp4
42.4 MB
03_aaa-security-not-roadside-assistance/02_authorization/02_access-control.mp4
42.1 MB
06_creating-a-company-culture-for-security/02_users/03_third-party-security.mp4
41.7 MB
02_pelcgbybtl-cryptology/02_public-key-or-asymmetric-encryption/02_asymmetric-encryption-algorithms.mp4
41.5 MB
02_pelcgbybtl-cryptology/04_cryptography-applications/05_securing-network-traffic.mp4
39.9 MB
06_creating-a-company-culture-for-security/03_incident-handling/08_interview-role-play-security.mp4
37.6 MB
03_aaa-security-not-roadside-assistance/01_authentication/04_certificates.mp4
37.3 MB
02_pelcgbybtl-cryptology/01_symmetric-encryption/03_symmetric-cryptography.mp4
37.2 MB
01_understanding-security-threats/02_malicious-software/03_malicious-software.mp4
37.0 MB
06_creating-a-company-culture-for-security/02_users/05_security-training.mp4
35.7 MB
06_creating-a-company-culture-for-security/01_risk-in-the-workplace/04_privacy-policy.mp4
35.3 MB
05_defense-in-depth/01_system-hardening/02_disabling-unnecessary-components.mp4
34.7 MB
04_securing-your-networks/03_network-monitoring/02_wireshark-and-tcpdump.mp4
32.8 MB
03_aaa-security-not-roadside-assistance/01_authentication/05_ldap.mp4
29.6 MB
01_understanding-security-threats/02_malicious-software/02_essential-security-terms.mp4
28.6 MB
05_defense-in-depth/02_application-hardening/02_application-policies.mp4
28.6 MB
04_securing-your-networks/03_network-monitoring/01_sniffing-the-network.mp4
28.5 MB
01_understanding-security-threats/03_network-attacks/01_network-attacks.mp4
27.9 MB
05_defense-in-depth/01_system-hardening/03_host-based-firewall.mp4
27.8 MB
04_securing-your-networks/01_secure-network-architecture/05_network-software-hardening.mp4
27.1 MB
03_aaa-security-not-roadside-assistance/01_authentication/09_single-sign-on.mp4
26.0 MB
01_understanding-security-threats/04_other-attacks/03_deceptive-attacks.mp4
23.6 MB
06_creating-a-company-culture-for-security/03_incident-handling/03_mobile-security-and-privacy.mp4
23.5 MB
01_understanding-security-threats/03_network-attacks/03_denial-of-service.mp4
22.7 MB
03_aaa-security-not-roadside-assistance/03_accounting/01_tracking-usage-and-access.mp4
22.0 MB
02_pelcgbybtl-cryptology/03_hashing/01_hashing.mp4
20.9 MB
01_understanding-security-threats/02_malicious-software/01_the-cia-triad.mp4
19.0 MB
01_understanding-security-threats/02_malicious-software/04_malware-continued.mp4
18.0 MB
03_aaa-security-not-roadside-assistance/03_accounting/03_rob-important-skills-in-security.mp4
17.9 MB
03_aaa-security-not-roadside-assistance/01_authentication/11_rob-path-to-it.mp4
16.7 MB
01_understanding-security-threats/04_other-attacks/02_password-attacks.mp4
16.5 MB
04_securing-your-networks/02_wireless-security/05_wireless-hardening.mp4
16.4 MB
02_pelcgbybtl-cryptology/01_symmetric-encryption/07_rob-what-a-security-engineer-does.mp4
15.2 MB
06_creating-a-company-culture-for-security/02_users/07_alex-grit-story.mp4
14.9 MB
01_understanding-security-threats/04_other-attacks/01_client-side-attacks.mp4
14.7 MB
06_creating-a-company-culture-for-security/03_incident-handling/06_amir-interview.mp4
13.7 MB
03_aaa-security-not-roadside-assistance/01_authentication/06_radius.mp4
13.7 MB
06_creating-a-company-culture-for-security/03_incident-handling/07_ari-interview.mp4
13.0 MB
03_aaa-security-not-roadside-assistance/01_authentication/08_tacacs.mp4
11.9 MB
05_defense-in-depth/01_system-hardening/11_heather-self-learning.mp4
11.4 MB
03_aaa-security-not-roadside-assistance/02_authorization/01_authorization-and-access-control-methods.mp4
10.8 MB
04_securing-your-networks/02_wireless-security/07_heather-social-engineering.mp4
10.5 MB
03_aaa-security-not-roadside-assistance/02_authorization/04_access-control-list.mp4
9.9 MB
05_defense-in-depth/01_system-hardening/01_intro-to-defense-in-depth.mp4
8.7 MB
06_creating-a-company-culture-for-security/05_course-wrap-up/01_framing-yourself.mp4
8.3 MB
06_creating-a-company-culture-for-security/05_course-wrap-up/04_congratulations.mp4
8.0 MB
04_securing-your-networks/01_secure-network-architecture/08_joe-personal-obstacle.mp4
6.0 MB
06_creating-a-company-culture-for-security/04_graded-assessments/01_final-assessment.mp4
5.1 MB
02_pelcgbybtl-cryptology/04_cryptography-applications/09_rejection.mp4
4.8 MB
03_aaa-security-not-roadside-assistance/01_authentication/02_multifactor-authentication.en.srt
19.7 kB
04_securing-your-networks/02_wireless-security/03_lets-get-rid-of-wep-wpa-wpa2.en.srt
19.5 kB
04_securing-your-networks/01_secure-network-architecture/01_network-hardening-best-practices.en.srt
13.7 kB
02_pelcgbybtl-cryptology/01_symmetric-encryption/04_symmetric-encryption-algorithms.en.srt
13.6 kB
02_pelcgbybtl-cryptology/04_cryptography-applications/01_public-key-infrastructure.en.srt
13.6 kB
04_securing-your-networks/01_secure-network-architecture/03_network-hardware-hardening.en.srt
12.7 kB
02_pelcgbybtl-cryptology/02_public-key-or-asymmetric-encryption/01_asymmetric-cryptography.en.srt
12.6 kB
02_pelcgbybtl-cryptology/04_cryptography-applications/03_cryptography-in-action.en.srt
12.6 kB
04_securing-your-networks/02_wireless-security/01_wep-encryption-and-why-you-shouldn-t-use-it.en.srt
12.2 kB
04_securing-your-networks/02_wireless-security/03_lets-get-rid-of-wep-wpa-wpa2.en.txt
12.2 kB
02_pelcgbybtl-cryptology/01_symmetric-encryption/01_cryptography.en.srt
12.1 kB
03_aaa-security-not-roadside-assistance/01_authentication/02_multifactor-authentication.en.txt
12.1 kB
05_defense-in-depth/01_system-hardening/06_antimalware-protection.en.srt
11.5 kB
05_defense-in-depth/01_system-hardening/04_logging-and-auditing.en.srt
11.2 kB
06_creating-a-company-culture-for-security/01_risk-in-the-workplace/01_security-goals.en.srt
11.1 kB
03_aaa-security-not-roadside-assistance/01_authentication/07_kerberos.en.srt
10.9 kB
06_creating-a-company-culture-for-security/03_incident-handling/01_incident-reporting-and-analysis.en.srt
10.8 kB
04_securing-your-networks/03_network-monitoring/04_intrusion-detection-prevention-systems.en.srt
10.4 kB
02_pelcgbybtl-cryptology/04_cryptography-applications/07_cryptographic-hardware.en.srt
10.4 kB
03_aaa-security-not-roadside-assistance/01_authentication/01_authentication-best-practices.en.srt
10.1 kB
05_defense-in-depth/01_system-hardening/08_disk-encryption.en.srt
9.9 kB
05_defense-in-depth/02_application-hardening/01_software-patch-management.en.srt
9.7 kB
01_understanding-security-threats/01_introduction-to-it-security/01_course-introduction.en.srt
9.6 kB
04_securing-your-networks/03_network-monitoring/02_wireshark-and-tcpdump.en.srt
9.5 kB
06_creating-a-company-culture-for-security/02_users/01_user-habits.en.srt
9.5 kB
06_creating-a-company-culture-for-security/03_incident-handling/02_incident-response-and-recovery.en.srt
9.4 kB
02_pelcgbybtl-cryptology/03_hashing/04_hashing-algorithms-continued.en.srt
9.1 kB
02_pelcgbybtl-cryptology/04_cryptography-applications/05_securing-network-traffic.en.srt
8.9 kB
02_pelcgbybtl-cryptology/01_symmetric-encryption/04_symmetric-encryption-algorithms.en.txt
8.6 kB
02_pelcgbybtl-cryptology/04_cryptography-applications/01_public-key-infrastructure.en.txt
8.6 kB
04_securing-your-networks/01_secure-network-architecture/01_network-hardening-best-practices.en.txt
8.5 kB
02_pelcgbybtl-cryptology/02_public-key-or-asymmetric-encryption/02_asymmetric-encryption-algorithms.en.srt
8.4 kB
02_pelcgbybtl-cryptology/01_symmetric-encryption/03_symmetric-cryptography.en.srt
8.2 kB
06_creating-a-company-culture-for-security/01_risk-in-the-workplace/02_measuring-and-assessing-risk.en.srt
8.2 kB
04_securing-your-networks/03_network-monitoring/01_sniffing-the-network.en.srt
8.0 kB
02_pelcgbybtl-cryptology/04_cryptography-applications/03_cryptography-in-action.en.txt
8.0 kB
04_securing-your-networks/01_secure-network-architecture/03_network-hardware-hardening.en.txt
8.0 kB
02_pelcgbybtl-cryptology/02_public-key-or-asymmetric-encryption/01_asymmetric-cryptography.en.txt
7.8 kB
01_understanding-security-threats/02_malicious-software/03_malicious-software.en.srt
7.7 kB
02_pelcgbybtl-cryptology/03_hashing/02_hashing-algorithms.en.srt
7.7 kB
03_aaa-security-not-roadside-assistance/02_authorization/02_access-control.en.srt
7.7 kB
02_pelcgbybtl-cryptology/01_symmetric-encryption/01_cryptography.en.txt
7.7 kB
04_securing-your-networks/02_wireless-security/01_wep-encryption-and-why-you-shouldn-t-use-it.en.txt
7.7 kB
06_creating-a-company-culture-for-security/03_incident-handling/08_interview-role-play-security.en.srt
7.5 kB
04_securing-your-networks/01_secure-network-architecture/05_network-software-hardening.en.srt
7.3 kB
05_defense-in-depth/01_system-hardening/06_antimalware-protection.en.txt
7.3 kB
05_defense-in-depth/01_system-hardening/02_disabling-unnecessary-components.en.srt
7.1 kB
06_creating-a-company-culture-for-security/01_risk-in-the-workplace/01_security-goals.en.txt
7.0 kB
01_understanding-security-threats/02_malicious-software/02_essential-security-terms.en.srt
7.0 kB
05_defense-in-depth/01_system-hardening/04_logging-and-auditing.en.txt
6.9 kB
03_aaa-security-not-roadside-assistance/01_authentication/07_kerberos.en.txt
6.8 kB
06_creating-a-company-culture-for-security/03_incident-handling/01_incident-reporting-and-analysis.en.txt
6.7 kB
06_creating-a-company-culture-for-security/02_users/03_third-party-security.en.srt
6.6 kB
02_pelcgbybtl-cryptology/04_cryptography-applications/07_cryptographic-hardware.en.txt
6.4 kB
01_understanding-security-threats/04_other-attacks/03_deceptive-attacks.en.srt
6.4 kB
04_securing-your-networks/03_network-monitoring/04_intrusion-detection-prevention-systems.en.txt
6.3 kB
05_defense-in-depth/02_application-hardening/02_application-policies.en.srt
6.3 kB
03_aaa-security-not-roadside-assistance/01_authentication/01_authentication-best-practices.en.txt
6.2 kB
05_defense-in-depth/01_system-hardening/08_disk-encryption.en.txt
6.2 kB
06_creating-a-company-culture-for-security/03_incident-handling/03_mobile-security-and-privacy.en.srt
6.2 kB
05_defense-in-depth/02_application-hardening/01_software-patch-management.en.txt
6.2 kB
05_defense-in-depth/01_system-hardening/03_host-based-firewall.en.srt
6.1 kB
06_creating-a-company-culture-for-security/03_incident-handling/02_incident-response-and-recovery.en.txt
6.0 kB
04_securing-your-networks/03_network-monitoring/02_wireshark-and-tcpdump.en.txt
6.0 kB
06_creating-a-company-culture-for-security/02_users/01_user-habits.en.txt
5.9 kB
06_creating-a-company-culture-for-security/01_risk-in-the-workplace/04_privacy-policy.en.srt
5.9 kB
01_understanding-security-threats/01_introduction-to-it-security/01_course-introduction.en.txt
5.9 kB
02_pelcgbybtl-cryptology/03_hashing/04_hashing-algorithms-continued.en.txt
5.7 kB
02_pelcgbybtl-cryptology/04_cryptography-applications/05_securing-network-traffic.en.txt
5.6 kB
01_understanding-security-threats/03_network-attacks/01_network-attacks.en.srt
5.6 kB
06_creating-a-company-culture-for-security/02_users/05_security-training.en.srt
5.5 kB
02_pelcgbybtl-cryptology/03_hashing/01_hashing.en.srt
5.4 kB
02_pelcgbybtl-cryptology/02_public-key-or-asymmetric-encryption/02_asymmetric-encryption-algorithms.en.txt
5.4 kB
03_aaa-security-not-roadside-assistance/01_authentication/09_single-sign-on.en.srt
5.3 kB
03_aaa-security-not-roadside-assistance/01_authentication/04_certificates.en.srt
5.3 kB
02_pelcgbybtl-cryptology/01_symmetric-encryption/03_symmetric-cryptography.en.txt
5.2 kB
06_creating-a-company-culture-for-security/01_risk-in-the-workplace/02_measuring-and-assessing-risk.en.txt
5.1 kB
04_securing-your-networks/03_network-monitoring/01_sniffing-the-network.en.txt
5.1 kB
03_aaa-security-not-roadside-assistance/01_authentication/05_ldap.en.srt
5.0 kB
01_understanding-security-threats/03_network-attacks/03_denial-of-service.en.srt
5.0 kB
01_understanding-security-threats/02_malicious-software/03_malicious-software.en.txt
4.9 kB
03_aaa-security-not-roadside-assistance/02_authorization/02_access-control.en.txt
4.9 kB
02_pelcgbybtl-cryptology/03_hashing/02_hashing-algorithms.en.txt
4.8 kB
06_creating-a-company-culture-for-security/03_incident-handling/08_interview-role-play-security.en.txt
4.5 kB
04_securing-your-networks/01_secure-network-architecture/05_network-software-hardening.en.txt
4.5 kB
03_aaa-security-not-roadside-assistance/03_accounting/01_tracking-usage-and-access.en.srt
4.4 kB
05_defense-in-depth/01_system-hardening/02_disabling-unnecessary-components.en.txt
4.4 kB
01_understanding-security-threats/02_malicious-software/02_essential-security-terms.en.txt
4.3 kB
01_understanding-security-threats/02_malicious-software/04_malware-continued.en.srt
4.3 kB
04_securing-your-networks/02_wireless-security/05_wireless-hardening.en.srt
4.2 kB
06_creating-a-company-culture-for-security/02_users/03_third-party-security.en.txt
4.1 kB
05_defense-in-depth/02_application-hardening/02_application-policies.en.txt
4.1 kB
01_understanding-security-threats/02_malicious-software/01_the-cia-triad.en.srt
4.0 kB
05_defense-in-depth/01_system-hardening/03_host-based-firewall.en.txt
4.0 kB
01_understanding-security-threats/04_other-attacks/03_deceptive-attacks.en.txt
3.9 kB
06_creating-a-company-culture-for-security/03_incident-handling/03_mobile-security-and-privacy.en.txt
3.9 kB
06_creating-a-company-culture-for-security/01_risk-in-the-workplace/04_privacy-policy.en.txt
3.7 kB
01_understanding-security-threats/04_other-attacks/01_client-side-attacks.en.srt
3.7 kB
01_understanding-security-threats/03_network-attacks/01_network-attacks.en.txt
3.5 kB
06_creating-a-company-culture-for-security/02_users/05_security-training.en.txt
3.5 kB
02_pelcgbybtl-cryptology/03_hashing/01_hashing.en.txt
3.5 kB
03_aaa-security-not-roadside-assistance/01_authentication/04_certificates.en.txt
3.4 kB
06_creating-a-company-culture-for-security/02_users/07_alex-grit-story.en.srt
3.4 kB
03_aaa-security-not-roadside-assistance/01_authentication/09_single-sign-on.en.txt
3.3 kB
03_aaa-security-not-roadside-assistance/01_authentication/05_ldap.en.txt
3.3 kB
01_understanding-security-threats/04_other-attacks/02_password-attacks.en.srt
3.2 kB
01_understanding-security-threats/03_network-attacks/03_denial-of-service.en.txt
3.1 kB
03_aaa-security-not-roadside-assistance/03_accounting/03_rob-important-skills-in-security.en.srt
3.1 kB
06_creating-a-company-culture-for-security/03_incident-handling/07_ari-interview.en.srt
2.8 kB
03_aaa-security-not-roadside-assistance/03_accounting/01_tracking-usage-and-access.en.txt
2.7 kB
04_securing-your-networks/02_wireless-security/05_wireless-hardening.en.txt
2.7 kB
01_understanding-security-threats/02_malicious-software/04_malware-continued.en.txt
2.7 kB
01_understanding-security-threats/02_malicious-software/01_the-cia-triad.en.txt
2.4 kB
06_creating-a-company-culture-for-security/05_course-wrap-up/01_framing-yourself.en.srt
2.4 kB
03_aaa-security-not-roadside-assistance/01_authentication/06_radius.en.srt
2.4 kB
03_aaa-security-not-roadside-assistance/02_authorization/01_authorization-and-access-control-methods.en.srt
2.3 kB
01_understanding-security-threats/04_other-attacks/01_client-side-attacks.en.txt
2.3 kB
03_aaa-security-not-roadside-assistance/01_authentication/11_rob-path-to-it.en.srt
2.2 kB
02_pelcgbybtl-cryptology/01_symmetric-encryption/07_rob-what-a-security-engineer-does.en.srt
2.1 kB
06_creating-a-company-culture-for-security/02_users/07_alex-grit-story.en.txt
2.0 kB
01_understanding-security-threats/04_other-attacks/02_password-attacks.en.txt
2.0 kB
03_aaa-security-not-roadside-assistance/01_authentication/08_tacacs.en.srt
1.9 kB
03_aaa-security-not-roadside-assistance/02_authorization/04_access-control-list.en.srt
1.9 kB
04_securing-your-networks/02_wireless-security/07_heather-social-engineering.en.srt
1.9 kB
03_aaa-security-not-roadside-assistance/03_accounting/03_rob-important-skills-in-security.en.txt
1.9 kB
06_creating-a-company-culture-for-security/03_incident-handling/06_amir-interview.en.srt
1.9 kB
05_defense-in-depth/01_system-hardening/11_heather-self-learning.en.srt
1.8 kB
06_creating-a-company-culture-for-security/03_incident-handling/07_ari-interview.en.txt
1.8 kB
05_defense-in-depth/01_system-hardening/01_intro-to-defense-in-depth.en.srt
1.7 kB
06_creating-a-company-culture-for-security/05_course-wrap-up/04_congratulations.en.srt
1.6 kB
03_aaa-security-not-roadside-assistance/01_authentication/06_radius.en.txt
1.5 kB
03_aaa-security-not-roadside-assistance/02_authorization/01_authorization-and-access-control-methods.en.txt
1.5 kB
03_aaa-security-not-roadside-assistance/01_authentication/11_rob-path-to-it.en.txt
1.4 kB
04_securing-your-networks/01_secure-network-architecture/08_joe-personal-obstacle.en.srt
1.3 kB
02_pelcgbybtl-cryptology/01_symmetric-encryption/07_rob-what-a-security-engineer-does.en.txt
1.3 kB
06_creating-a-company-culture-for-security/05_course-wrap-up/01_framing-yourself.en.txt
1.3 kB
03_aaa-security-not-roadside-assistance/01_authentication/08_tacacs.en.txt
1.2 kB
03_aaa-security-not-roadside-assistance/02_authorization/04_access-control-list.en.txt
1.2 kB
06_creating-a-company-culture-for-security/03_incident-handling/06_amir-interview.en.txt
1.2 kB
05_defense-in-depth/01_system-hardening/11_heather-self-learning.en.txt
1.1 kB
04_securing-your-networks/02_wireless-security/07_heather-social-engineering.en.txt
1.1 kB
02_pelcgbybtl-cryptology/04_cryptography-applications/09_rejection.en.srt
1.1 kB
05_defense-in-depth/01_system-hardening/01_intro-to-defense-in-depth.en.txt
1.1 kB
06_creating-a-company-culture-for-security/05_course-wrap-up/04_congratulations.en.txt
849 Bytes
04_securing-your-networks/01_secure-network-architecture/08_joe-personal-obstacle.en.txt
830 Bytes
06_creating-a-company-culture-for-security/04_graded-assessments/01_final-assessment.en.srt
578 Bytes
02_pelcgbybtl-cryptology/04_cryptography-applications/09_rejection.en.txt
558 Bytes
06_creating-a-company-culture-for-security/04_graded-assessments/01_final-assessment.en.txt
348 Bytes
[CourseClub.Me].url
66 Bytes
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!
>