搜索
为您找到约
189
个磁力链接/BT种子,耗时 3 毫秒。
排序:
相关程度
热度
文件大小
添加时间
最近访问
[ DevCourseWeb.com ] Udemy - Artificial Intelligence and ChatGPT for Cyber Security 2024
~Get Your Files Here !/7. AI In Network Security/2. [AT] Introduction To Network Security.mp4
145.9 MB
~Get Your Files Here !/11. Appendix A Introduction To Cyber Security/4. Cyber Security Tools and Technologies.mp4
125.5 MB
~Get Your Files Here !/4. Where Is AI Used In Cyber Security Today/6. [AT] IDSIPS With AI.mp4
125.0 MB
~Get Your Files Here !/11. Appendix A Introduction To Cyber Security/2. Categories Of Cyber Attacks.mp4
123.3 MB
~Get Your Files Here !/3. New Age Of Social Engineering/2. [AT] What Is Social Engineering .mp4
110.8 MB
~Get Your Files Here !/11. Appendix A Introduction To Cyber Security/1. Evolution Of Cyber Security.mp4
109.9 MB
~Get Your Files Here !/9. AI Security Risks/4. [AT] What are general AI Model Vulnerabilities.mp4
108.0 MB
~Get Your Files Here !/5. Building An Email Filtering System With AI/12. [AP] Creating Spam Detection system using OpenAI API and GPT-4.mp4
108.0 MB
~Get Your Files Here !/8. AI For Malware Detection/3. [AT] How Traditional Systems For Malware Detection work.mp4
100.7 MB
~Get Your Files Here !/4. Where Is AI Used In Cyber Security Today/5. [AT] AI In Identity And Access Management.mp4
99.5 MB
~Get Your Files Here !/4. Where Is AI Used In Cyber Security Today/2. [AT] What are AI Based SIEM Systems.mp4
98.5 MB
~Get Your Files Here !/5. Building An Email Filtering System With AI/10. [AP] Intuition lecture K Nearest Neighbors (KNN) algorithm.mp4
98.3 MB
~Get Your Files Here !/5. Building An Email Filtering System With AI/6. [AP] Analyzing email spam dataset.mp4
97.9 MB
~Get Your Files Here !/5. Building An Email Filtering System With AI/2. [AT] Introduction To Email Security And Filtering.mp4
93.8 MB
~Get Your Files Here !/3. New Age Of Social Engineering/7. [APT] How To Recognize These Type Of Scams.mp4
93.6 MB
~Get Your Files Here !/5. Building An Email Filtering System With AI/3. [AT] What Are Spam Filters And How Do They Work .mp4
92.7 MB
~Get Your Files Here !/4. Where Is AI Used In Cyber Security Today/3. [AT] Is there a Firewall With AI.mp4
86.6 MB
~Get Your Files Here !/8. AI For Malware Detection/2. [AT] What Is Malware & Different Types Of Malware.mp4
84.9 MB
~Get Your Files Here !/5. Building An Email Filtering System With AI/9. [AP] How to transform email data from text to numbers - Vectorization.mp4
83.4 MB
~Get Your Files Here !/11. Appendix A Introduction To Cyber Security/6. Cyber Security Best Practices.mp4
80.4 MB
[磁力链接]
添加时间:
2024-02-01
大小:
4.1 GB
最近下载:
2025-01-02
热度:
5065
[ DevCourseWeb.com ] Udemy - Introduction To Ethical Hacking and Cyber Security
~Get Your Files Here !/3 - Principles of Information Security/10 - Integrity Practical.mp4
170.3 MB
~Get Your Files Here !/2 - Introduction to Hacking/5 - Have I been pwned.mp4
90.6 MB
~Get Your Files Here !/4 - Dive in Hacking/14 - Fork Bomb Practical.mp4
55.4 MB
~Get Your Files Here !/4 - Dive in Hacking/12 - Zip Bomb.mp4
46.0 MB
~Get Your Files Here !/2 - Introduction to Hacking/8 - Not Being a Noob.mp4
42.0 MB
~Get Your Files Here !/2 - Introduction to Hacking/2 - What is Hacking.mp4
39.9 MB
~Get Your Files Here !/5 - Ports and Protocols/18 - Secure Shell.mp4
39.8 MB
~Get Your Files Here !/2 - Introduction to Hacking/4 - More Types of Hackers.mp4
39.4 MB
~Get Your Files Here !/2 - Introduction to Hacking/3 - What are the types of hackers.mp4
37.7 MB
~Get Your Files Here !/5 - Ports and Protocols/17 - File Transfer Protocol.mp4
37.5 MB
~Get Your Files Here !/3 - Principles of Information Security/9 - CIA Triad.mp4
35.9 MB
~Get Your Files Here !/6 - Communication Models/21 - OSI Model in day to day Life.mp4
34.4 MB
~Get Your Files Here !/5 - Ports and Protocols/16 - Hyper Text Transfer Protocol HTTP & HTTPS.mp4
33.2 MB
~Get Your Files Here !/1 - Introduction/1 - Introduction to the course.mp4
23.9 MB
~Get Your Files Here !/4 - Dive in Hacking/13 - Fork Bombs.mp4
22.2 MB
~Get Your Files Here !/4 - Dive in Hacking/11 - USB Stealer.mp4
21.5 MB
~Get Your Files Here !/2 - Introduction to Hacking/7 - Breaking the Myth.mp4
18.8 MB
~Get Your Files Here !/5 - Ports and Protocols/19 - Telnet RDP and Telnet vs SSH.mp4
15.6 MB
~Get Your Files Here !/5 - Ports and Protocols/15 - What are Ports & Protocols.mp4
15.3 MB
~Get Your Files Here !/6 - Communication Models/20 - TCP IP and OSI Model.mp4
13.3 MB
[磁力链接]
添加时间:
2024-04-28
大小:
886.0 MB
最近下载:
2025-01-02
热度:
4430
[ DevCourseWeb.com ] Udemy - Python For Ethical Hackers and Cyber Security Engineers
~Get Your Files Here !/6. Cryptography and Password Hash Cracking/7. Building a Password Hash Cracker using python - Part 4.mp4
141.5 MB
~Get Your Files Here !/6. Cryptography and Password Hash Cracking/8. Building a Password Hash Cracker using python - Part 5.mp4
136.6 MB
~Get Your Files Here !/6. Cryptography and Password Hash Cracking/11. AES Encryption using python - Part 3.mp4
108.1 MB
~Get Your Files Here !/3. Trace route an IP Address using python and hacking the IP & ICMP Protocols/8. Trace routing an IP Address using python - Part 3.mp4
80.4 MB
~Get Your Files Here !/4. Discovering open ports using python and hacking the TCP Protocol/10. Discovering open ports using python - Part 3.mp4
78.9 MB
~Get Your Files Here !/6. Cryptography and Password Hash Cracking/5. Building a Password Hash Cracker using python - Part 2.mp4
73.8 MB
~Get Your Files Here !/4. Discovering open ports using python and hacking the TCP Protocol/9. Discovering open ports using python - Part 2.mp4
71.8 MB
~Get Your Files Here !/4. Discovering open ports using python and hacking the TCP Protocol/14. Discovering open ports using python - Part 7.mp4
58.9 MB
~Get Your Files Here !/2. Building a network scanner in Python and hacking the ARP Protocol/5. Spoofing our MAC address using python.mp4
58.1 MB
~Get Your Files Here !/2. Building a network scanner in Python and hacking the ARP Protocol/6. Scanning the network and discovering live hosts using python.mp4
55.2 MB
~Get Your Files Here !/6. Cryptography and Password Hash Cracking/15. Hybrid Encryption (AES & RSA) using python - Part 4.mp4
48.8 MB
~Get Your Files Here !/6. Cryptography and Password Hash Cracking/10. AES Encryption using python - Part 2.mp4
48.2 MB
~Get Your Files Here !/6. Cryptography and Password Hash Cracking/6. Building a Password Hash Cracker using python - Part 3.mp4
46.3 MB
~Get Your Files Here !/5. Bind Shell and Reverse Shell/3. Write a Bind Shell using python.mp4
45.9 MB
~Get Your Files Here !/4. Discovering open ports using python and hacking the TCP Protocol/3. TCP Port Scanning Techniques - Part 1.mp4
40.6 MB
~Get Your Files Here !/2. Building a network scanner in Python and hacking the ARP Protocol/4. Hacking the ARP Header.mp4
40.5 MB
~Get Your Files Here !/4. Discovering open ports using python and hacking the TCP Protocol/4. TCP Port Scanning Techniques - Part 2.mp4
39.8 MB
~Get Your Files Here !/6. Cryptography and Password Hash Cracking/14. Hybrid Encryption (AES & RSA) using python - Part 3.mp4
37.9 MB
~Get Your Files Here !/4. Discovering open ports using python and hacking the TCP Protocol/8. Discovering open ports using python - Part 1.mp4
36.9 MB
~Get Your Files Here !/4. Discovering open ports using python and hacking the TCP Protocol/13. Discovering open ports using python - Part 6.mp4
34.1 MB
[磁力链接]
添加时间:
2023-12-22
大小:
2.0 GB
最近下载:
2025-01-02
热度:
4241
[FreeTutorials.Eu] [UDEMY] The Complete Cyber Security Course Hackers Exposed! [FTU]
4. Encryption Crash Course/10. Certificate Authorities and HTTPS.mp4
209.0 MB
4. Encryption Crash Course/6. Secure Sockets Layer (SSL) and Transport layer security (TLS).mp4
168.7 MB
5. Setting up a Testing Environment Using Virtual Machines (Lab)/4. Virtual box.mp4
151.2 MB
4. Encryption Crash Course/7. SSL Stripping.mp4
120.1 MB
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2. Introduction to Setting up a Testing Environment Using Virtual Machines.mp4
118.9 MB
5. Setting up a Testing Environment Using Virtual Machines (Lab)/3. Vmware.mp4
115.9 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/11. Windows 7, 8 and 8.1 - Privacy & Tracking.mp4
110.7 MB
4. Encryption Crash Course/12. Steganography.mp4
109.4 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/7. Windows 10 - Tool Disable Windows 10 Tracking.mp4
103.2 MB
4. Encryption Crash Course/4. Hash Functions.mp4
93.6 MB
11. Security Through Isolation and Compartmentalization/15. Whonix OS - Anonymous Operating system.mp4
93.0 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/9. Windows 10 – Privacy Settings.mp4
90.7 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/3. Security Bugs and Vulnerabilities.mp4
88.0 MB
9. Social Engineering and Social Media Offence and Defence/2. Information Disclosure and Identity Strategies for Social Media.mp4
87.9 MB
4. Encryption Crash Course/9. Digital Certificates.mp4
85.9 MB
4. Encryption Crash Course/8. HTTPS (HTTP Secure).mp4
85.9 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/5. Windows 10 - Privacy & Tracking.mp4
83.8 MB
11. Security Through Isolation and Compartmentalization/17. Qubes OS.mp4
82.6 MB
4. Encryption Crash Course/3. Asymmetric Encryption.mp4
75.8 MB
1. Introduction/5. Study Recommendations.mp4
74.1 MB
[磁力链接]
添加时间:
2021-03-19
大小:
4.5 GB
最近下载:
2025-01-02
热度:
4239
[ DevCourseWeb.com ] Udemy - The Complete Cyber Security Awareness Training 2024
~Get Your Files Here !/2. Social EngineeringPhishing and How To Prevent It/1. Email Phishing.mp4
217.4 MB
~Get Your Files Here !/5. Policies/5. Remote Work Security.mp4
156.7 MB
~Get Your Files Here !/5. Policies/3. OnboardOffboard.mp4
152.2 MB
~Get Your Files Here !/2. Social EngineeringPhishing and How To Prevent It/2. Vishing.mp4
147.2 MB
~Get Your Files Here !/5. Policies/2. Password Policies.mp4
143.5 MB
~Get Your Files Here !/4. Endpoint Device Protection/2. MacOS Protection.mp4
136.2 MB
~Get Your Files Here !/5. Policies/4. BYOD.mp4
114.7 MB
~Get Your Files Here !/5. Policies/1. Security Policies.mp4
114.0 MB
~Get Your Files Here !/1. Introduction To Cyber Security/3. How People Get Hacked.mp4
109.6 MB
~Get Your Files Here !/1. Introduction To Cyber Security/2. CIA Triangle & Why Is Cyber Security Important .mp4
109.6 MB
~Get Your Files Here !/6. Web Browsing Security/2. Best Browser Settings.mp4
105.5 MB
~Get Your Files Here !/2. Social EngineeringPhishing and How To Prevent It/4. Social Engineering Awareness Training.mp4
93.9 MB
~Get Your Files Here !/5. Policies/6. Reporting Procedures.mp4
91.4 MB
~Get Your Files Here !/2. Social EngineeringPhishing and How To Prevent It/5. Reporting Procedures.mp4
91.4 MB
~Get Your Files Here !/3. Malware/1. Malware Infection & Types of Malware.mp4
90.5 MB
~Get Your Files Here !/8. Data Handling/3. Data Privacy Regulations (GDPR, CCPA, HIPPA).mp4
90.1 MB
~Get Your Files Here !/4. Endpoint Device Protection/3. Smartphone Protection.mp4
85.9 MB
~Get Your Files Here !/9. Additional Things To Keep Yourself Safe/1. Physical Security.mp4
83.9 MB
~Get Your Files Here !/9. Additional Things To Keep Yourself Safe/2. Finding Out About Emerging ThreatsVulnerabilities.mp4
73.5 MB
~Get Your Files Here !/6. Web Browsing Security/1. Choosing Best Browser.mp4
72.6 MB
[磁力链接]
添加时间:
2024-05-25
大小:
2.9 GB
最近下载:
2025-01-02
热度:
3649
GetFreeCourses.Co-Udemy-The Complete Cyber Security Course Hackers Exposed!
4. Encryption Crash Course/10. Certificate Authorities and HTTPS.mp4
209.0 MB
4. Encryption Crash Course/6. Secure Sockets Layer (SSL) and Transport layer security (TLS).mp4
168.7 MB
5. Setting up a Testing Environment Using Virtual Machines (Lab)/4. Virtual box.mp4
151.2 MB
4. Encryption Crash Course/7. SSL Stripping.mp4
120.1 MB
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2. Introduction to Setting up a Testing Environment Using Virtual Machines.mp4
118.9 MB
5. Setting up a Testing Environment Using Virtual Machines (Lab)/3. Vmware.mp4
115.9 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/11. Windows 7, 8 and 8.1 - Privacy & Tracking.mp4
110.7 MB
4. Encryption Crash Course/12. Steganography.mp4
109.4 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/7. Windows 10 - Tool Disable Windows 10 Tracking.mp4
103.2 MB
4. Encryption Crash Course/4. Hash Functions.mp4
93.6 MB
11. Security Through Isolation and Compartmentalization/15. Whonix OS - Anonymous Operating system.mp4
93.0 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/9. Windows 10 – Privacy Settings.mp4
90.7 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/3. Security Bugs and Vulnerabilities.mp4
88.0 MB
9. Social Engineering and Social Media Offence and Defence/2. Information Disclosure and Identity Strategies for Social Media.mp4
87.9 MB
4. Encryption Crash Course/9. Digital Certificates.mp4
85.9 MB
4. Encryption Crash Course/8. HTTPS (HTTP Secure).mp4
85.9 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/5. Windows 10 - Privacy & Tracking.mp4
83.8 MB
11. Security Through Isolation and Compartmentalization/17. Qubes OS.mp4
82.6 MB
4. Encryption Crash Course/3. Asymmetric Encryption.mp4
75.8 MB
11. Security Through Isolation and Compartmentalization/9. Windows - Sandboxes and Application Isolation - Sandboxie.mp4
73.5 MB
[磁力链接]
添加时间:
2022-01-09
大小:
4.5 GB
最近下载:
2025-01-03
热度:
3644
[ FreeCourseWeb.com ] Udemy - The Complete Cyber Security & Hacking Course - For beginners.zip
[ FreeCourseWeb.com ] Udemy - The Complete Cyber Security & Hacking Course - For beginners.zip
995.7 MB
[磁力链接]
添加时间:
2021-03-14
大小:
995.7 MB
最近下载:
2025-01-02
热度:
3472
[FreeCourseSite.com] Udemy - The Complete Cyber Security Course Hackers Exposed!
4. Encryption Crash Course/10. Certificate Authorities and HTTPS.mp4
209.0 MB
4. Encryption Crash Course/6. Secure Sockets Layer (SSL) and Transport layer security (TLS).mp4
168.7 MB
5. Setting up a Testing Environment Using Virtual Machines (Lab)/4. Virtual box.mp4
151.2 MB
4. Encryption Crash Course/7. SSL Stripping.mp4
120.1 MB
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2. Introduction to Setting up a Testing Environment Using Virtual Machines.mp4
118.9 MB
5. Setting up a Testing Environment Using Virtual Machines (Lab)/3. Vmware.mp4
115.9 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/11. Windows 7, 8 and 8.1 - Privacy & Tracking.mp4
110.7 MB
4. Encryption Crash Course/12. Steganography.mp4
109.4 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/7. Windows 10 - Tool Disable Windows 10 Tracking.mp4
103.2 MB
4. Encryption Crash Course/4. Hash Functions.mp4
93.6 MB
11. Security Through Isolation and Compartmentalization/15. Whonix OS - Anonymous Operating system.mp4
93.0 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/9. Windows 10 – Privacy Settings.mp4
90.7 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/3. Security Bugs and Vulnerabilities.mp4
88.0 MB
9. Social Engineering and Social Media Offence and Defence/2. Information Disclosure and Identity Strategies for Social Media.mp4
87.9 MB
4. Encryption Crash Course/9. Digital Certificates.mp4
85.9 MB
4. Encryption Crash Course/8. HTTPS (HTTP Secure).mp4
85.9 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/5. Windows 10 - Privacy & Tracking.mp4
83.8 MB
11. Security Through Isolation and Compartmentalization/17. Qubes OS.mp4
82.6 MB
4. Encryption Crash Course/3. Asymmetric Encryption.mp4
75.8 MB
11. Security Through Isolation and Compartmentalization/9. Windows - Sandboxes and Application Isolation - Sandboxie.mp4
73.5 MB
[磁力链接]
添加时间:
2021-03-15
大小:
4.5 GB
最近下载:
2025-01-03
热度:
3441
[DesireCourse.Net] Udemy - The Complete Cyber Security Course Network Security!
10 Browser Security and Tracking Prevention/082 Firefox Hardening.mp4
149.2 MB
10 Browser Security and Tracking Prevention/080 Browser Fingerprinting.mp4
102.8 MB
03 Routers - Port and Vulnerability scanning/011 Internal Vulnerability Scanning - MBSA Nmap Nessus Fing Superscan OpenVAS.mp4
101.1 MB
03 Routers - Port and Vulnerability scanning/010 External Vulnerability Scanning - Shodan Qualys Nmap.mp4
98.0 MB
07 Network Monitoring for Threats/044 Wireshark - Finding malware and hackers - Part 1.mp4
95.4 MB
08 How We Are Tracked Online/048 Types of Tracking.mp4
94.2 MB
10 Browser Security and Tracking Prevention/067 Reducing the Browser Attack Surface.mp4
92.0 MB
10 Browser Security and Tracking Prevention/071 uBlock origin - HTTP Filters ad and track blockers.mp4
90.5 MB
07 Network Monitoring for Threats/041 Syslog.mp4
84.0 MB
10 Browser Security and Tracking Prevention/077 History Cookies and Super cookies Part 1.mp4
69.9 MB
10 Browser Security and Tracking Prevention/078 History Cookies and Super cookies Part 2.mp4
69.2 MB
04 Firewalls/016 Windows - Host Based Firewalls - Windows Firewall.mp4
65.7 MB
04 Firewalls/019 Linux - Host Based Firewalls - iptables.mp4
63.7 MB
03 Routers - Port and Vulnerability scanning/009 The Home Router.mp4
63.6 MB
07 Network Monitoring for Threats/045 Wireshark - Finding malware and hackers - Part 2.mp4
58.7 MB
03 Routers - Port and Vulnerability scanning/012 Open Source Custom Router Firmware.mp4
58.7 MB
10 Browser Security and Tracking Prevention/081 Certificates and Encryption.mp4
58.2 MB
09 Search Engines and Privacy/064 Private and Anonymous Searching.mp4
57.0 MB
09 Search Engines and Privacy/059 Search Engine Tracking Censorship and Privacy.mp4
56.2 MB
08 How We Are Tracked Online/056 More Tracking.mp4
54.6 MB
[磁力链接]
添加时间:
2021-03-18
大小:
3.4 GB
最近下载:
2025-01-02
热度:
3321
[FreeCourseSite.com] Udemy - The Complete Cyber Security Course End Point Protection!
8. Malware and Hacker Hunting on the End-Point/11. Windows - Malware Seek & Destroy - Process Monitor.mp4
79.9 MB
7. Threat Detection and Monitoring/4. CanaryTokens.mp4
73.7 MB
11. Email Security, Privacy and Anonymity/6. Windows - PGP & GPG.mp4
61.1 MB
8. Malware and Hacker Hunting on the End-Point/6. Windows - Malware Seek & Destroy - Process Explorer - Part 1.mp4
60.6 MB
13. Wrap Up/3. Qubes OS.mp4
59.0 MB
8. Malware and Hacker Hunting on the End-Point/10. Windows - Malware Seek & Destroy - Autoruns.mp4
50.6 MB
8. Malware and Hacker Hunting on the End-Point/7. Windows - Malware Seek & Destroy - Process Explorer - Part 2.mp4
49.0 MB
9. Operating System and Application Hardening/7. Windows - Security Compliance Manager (SCM).mp4
47.0 MB
1. Introduction/3. Security Quick Win!.mp4
46.8 MB
8. Malware and Hacker Hunting on the End-Point/15. Linux - Seek & Destroy Malware and Hackers - Csysdig.mp4
45.8 MB
8. Malware and Hacker Hunting on the End-Point/26. Mac, Linux & Windows - OSquery.mp4
44.4 MB
9. Operating System and Application Hardening/3. Hardening Standards.mp4
43.5 MB
8. Malware and Hacker Hunting on the End-Point/4. Automated Malware Removal Tools.mp4
41.9 MB
7. Threat Detection and Monitoring/5. OpenCanary.mp4
40.7 MB
3. File and Disk Encryption/4. Disk Encryption Attacks - Physical.mp4
40.2 MB
11. Email Security, Privacy and Anonymity/2. Clients, Protocols and Authentication.mp4
40.0 MB
8. Malware and Hacker Hunting on the End-Point/3. Windows - Farbar Recovery Scanner.mp4
39.9 MB
11. Email Security, Privacy and Anonymity/16. Choosing an Email Provider.mp4
39.2 MB
6. End-Point-Protection Technology/9. Windows - Exploitation Prevention - EMET.mp4
39.2 MB
4. Anti-Virus and End-Point-Protection/3. Is Anti-Virus dead - Protection Methods.mp4
38.4 MB
[磁力链接]
添加时间:
2021-03-15
大小:
3.0 GB
最近下载:
2025-01-02
热度:
3215
[FreeTutorials.Eu] [UDEMY] SOC Analyst Cyber Security Intrusion Training from Scratch - [FTU]
16. Module 16 Attacking Phases/4. Attacking Phase 4 Maintaining Access.mp4
320.9 MB
16. Module 16 Attacking Phases/2. Attacking Phase 2 Scanning.mp4
292.9 MB
17. SIEM Solution/4. SIEM Dashboard Usage & Creation.mp4
279.6 MB
14. Module 14 IDS - Working, Detection & Evasion/1. Working, Detection & Evasion.mp4
213.6 MB
16. Module 16 Attacking Phases/3. Attacking Phase 3 Attacking.mp4
210.6 MB
16. Module 16 Attacking Phases/1. Attacking Phase 1 Reconnaissance.mp4
144.7 MB
17. SIEM Solution/3. SIEM Hunting For Logs.mp4
139.2 MB
7. Module 7 Windows & Linux/4. Windows Authentication.mp4
122.4 MB
3. Module 3 Internet Layer & Transport Layer/2. What are the IP Header Fields.mp4
120.3 MB
17. SIEM Solution/2. Logs Forwarding to SIEM.mp4
103.7 MB
6. Module 6 UseCases/6. DOSDDOS Attack and Remediation.mp4
88.4 MB
13. Module 13 Antivirus Working, Types & UseCase/2. USECASE - Virus Outbreak.mp4
85.2 MB
17. SIEM Solution/1. SIEM Installation.mp4
84.2 MB
8. Module 8 System Hacking/1. System Exploitation.mp4
83.7 MB
2. Module 2 Foundation of BitBytes in Packets/5. Basics of Wireshark & Tshark.mp4
82.4 MB
8. Module 8 System Hacking/3. Brute Force Attack.mp4
79.7 MB
15. Module 15 Firewall Working, Types & Reporting/1. Working, Types and Reporting.mp4
78.0 MB
9. Module 9 UseCases/1. Brute Force Attack - Part 1 & Remediation.mp4
76.4 MB
10. Module 10 Web Application/2. Web Application Working.mp4
74.8 MB
3. Module 3 Internet Layer & Transport Layer/5. What are the common attacks performed with Transport Layer.mp4
71.3 MB
[磁力链接]
添加时间:
2021-04-01
大小:
4.6 GB
最近下载:
2025-01-01
热度:
3151
[ FreeCourseWeb.com ] Udemy - Introduction to Cyber Security- ISO 27001 ISMS.zip
[ FreeCourseWeb.com ] Udemy - Introduction to Cyber Security- ISO 27001 ISMS.zip
556.9 MB
[磁力链接]
添加时间:
2021-03-19
大小:
556.9 MB
最近下载:
2025-01-02
热度:
3028
Udemy - A scuola di Cyber Security [Ita]
6. Parte 5/1. Virus.mp4
274.3 MB
1. Introduzione/1. Introduzione.mp4
255.9 MB
12. Parte 11/1. Diritto all'Oblio.mp4
222.6 MB
10. Parte 9/1. Foto, selfie come proteggere le nostre immagini digitali.mp4
165.7 MB
2. Secondo fattore di autenticazione/1. Secondo fattore di autenticazione.mp4
162.8 MB
5. Parte 4/1. Malware.mp4
139.0 MB
9. Parte 8/1. Strumenti per la denuncia.mp4
138.8 MB
3. Parte 3/1. La password a prova di Hacker.mp4
124.3 MB
11. Parte 10/1. Revenge Porn.mp4
116.3 MB
8. Parte 7/1. Social Hacking.mp4
106.2 MB
4. parte 4/1. Oscurare la web cam.mp4
97.5 MB
7. Parte 6/1. Antivirus.mp4
90.3 MB
6. Parte 5/1.1 Parte 5 Virus .pdf.pdf
7.4 MB
2. Secondo fattore di autenticazione/1.1 parte 1 Cyber Security secondo fattore di autenticazione .pdf.pdf
7.2 MB
1. Introduzione/1.1 Introduzione Cyber Security.pdf.pdf
6.6 MB
12. Parte 11/1.1 Parte 11 Diritto all'Oblio .pdf.pdf
5.5 MB
3. Parte 3/1.1 parte 2 Cyber Security Crea una password perfetta aprova di Hacker.pdf.pdf
5.3 MB
9. Parte 8/1.1 Parte 8 Strumenti per la denuncia .pdf.pdf
4.5 MB
4. parte 4/1.1 Parte 3 Cyber Security Oscurare la webcam .pdf.pdf
4.0 MB
8. Parte 7/1.1 Parte 7 Social Hacking.pdf.pdf
3.7 MB
[磁力链接]
添加时间:
2021-03-10
大小:
1.9 GB
最近下载:
2024-12-31
热度:
2943
[ FreeCourseWeb.com ] Udemy - Cryptography in Cyber Security.zip
[ FreeCourseWeb.com ] Udemy - Cryptography in Cyber Security.zip
2.1 GB
[磁力链接]
添加时间:
2021-05-27
大小:
2.1 GB
最近下载:
2025-01-02
热度:
2817
[ DevCourseWeb.com ] Udemy - Comprehensive Introduction to Cyber Security
~Get Your Files Here !/4. Understanding the Attackers/2. Cyber Threat Intelligence and APTs - Homework.mp4
488.3 MB
~Get Your Files Here !/6. Study of real-life Attacks Scenarios/2. Spear-Phishing.mp4
136.3 MB
~Get Your Files Here !/2. Understanding the Landscape/4. Massive and growing threats.mp4
122.0 MB
~Get Your Files Here !/6. Study of real-life Attacks Scenarios/4. Browser Exploitation.mp4
95.0 MB
~Get Your Files Here !/6. Study of real-life Attacks Scenarios/5. Exposed service compromise.mp4
85.4 MB
~Get Your Files Here !/6. Study of real-life Attacks Scenarios/3. Infected USB drive.mp4
84.3 MB
~Get Your Files Here !/5. Understanding the Attacks/4. The Diamond Model - Homework.mp4
82.9 MB
~Get Your Files Here !/2. Understanding the Landscape/2. Well-funded states are able to breach anything.mp4
76.1 MB
~Get Your Files Here !/2. Understanding the Landscape/1. Rise in sophisticated and targeted attacks.mp4
61.8 MB
~Get Your Files Here !/5. Understanding the Attacks/2. The “MITRE ATT&CK” framework.mp4
57.9 MB
~Get Your Files Here !/2. Understanding the Landscape/6. Zero-days are a juicy (dark) business.mp4
49.4 MB
~Get Your Files Here !/3. Understanding the Threats/1. The security Threats.mp4
38.0 MB
~Get Your Files Here !/4. Understanding the Attackers/1. Who are they What are their motivations and targets.mp4
37.6 MB
~Get Your Files Here !/5. Understanding the Attacks/1. The “Intrusion Kill Chain” model.mp4
37.1 MB
~Get Your Files Here !/8. Working in ITCyber Security/1. Working in ITCyber Security.mp4
31.3 MB
~Get Your Files Here !/2. Understanding the Landscape/7. Cybercriminals will stop at nothing for profit.mp4
26.7 MB
~Get Your Files Here !/2. Understanding the Landscape/3. Theft and resale of data on the rise.mp4
22.3 MB
~Get Your Files Here !/1. Course Introduction/1. Introduction.mp4
12.7 MB
~Get Your Files Here !/6. Study of real-life Attacks Scenarios/7. Notes on detection and mitigation.mp4
12.5 MB
~Get Your Files Here !/6. Study of real-life Attacks Scenarios/6. Real APT study case.mp4
11.7 MB
[磁力链接]
添加时间:
2022-02-05
大小:
1.6 GB
最近下载:
2025-01-03
热度:
2719
[DesireCourse.Net] Udemy - The Complete Cyber Security Course End Point Protection!
[DesireCourse.Net] Udemy - The Complete Cyber Security Course End Point Protection!.zip
2.9 GB
[DesireCourse.Net].url
51 Bytes
[CourseClub.Me].url
48 Bytes
[磁力链接]
添加时间:
2021-05-28
大小:
2.9 GB
最近下载:
2024-12-31
热度:
2672
GetFreeCourses.Co-Udemy-Cyber Security - Go From Zero to Hero (2020)
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/19. PRACTICAL HOW TO FIND OUT USERNAMES AND PASSWORDS USING SOCIAL ENGINEERING.mp4
89.7 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/13. Have you ever heard about a Ransomware.mp4
85.1 MB
1. FUNDAMENTALS OF NETWORKING/11. Introduction to TCPIP Model.mp4
79.7 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/15. PRACTICAL INFORMATION GATHERING USING SHODAN.mp4
78.0 MB
7. FIREWALLS AND ANTIVIRUS/9. Antivirus Detection Techniques.mp4
76.2 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/2. Different types of Actors in Cyber Security.mp4
67.6 MB
4. DIVING DEEP INTO CYBER SECURITY/15. Hashing.mp4
65.1 MB
2. GETTING STARTED WITH CYBER SECURITY/4. History of Cyber Security.mp4
63.0 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/11. Types of Virus.mp4
62.2 MB
7. FIREWALLS AND ANTIVIRUS/2. Intrusion Detection System.mp4
62.0 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/18. Types of Social Engineering.mp4
60.4 MB
6. KEY SECURITY CONCEPTS/3. Integrity, Authentication, Access Control and Non-Repudiation.mp4
58.6 MB
1. FUNDAMENTALS OF NETWORKING/17. Classes of IP Address.mp4
57.5 MB
1. FUNDAMENTALS OF NETWORKING/14. Addressing in Computer Networks.mp4
56.2 MB
7. FIREWALLS AND ANTIVIRUS/3. Introduction to Firewalls.mp4
55.9 MB
1. FUNDAMENTALS OF NETWORKING/22. Address Resolution Protocol (ARP).mp4
53.0 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/8. Everything about Trojans.mp4
52.6 MB
5. TYPES OF ACTORS, ATTACKS, MALWARE AND RESOURCES/9. Types of Trojans.mp4
52.0 MB
3. LET'S BEGIN - THE FUNDAMENTALS OF CYBER SECURITY/7. Roles in Cyber Security Part 1.mp4
51.3 MB
6. KEY SECURITY CONCEPTS/9. How to carry out an Internal Audit.mp4
50.9 MB
[磁力链接]
添加时间:
2021-03-09
大小:
3.7 GB
最近下载:
2025-01-02
热度:
2612
[ DevCourseWeb.com ] Udemy - ITAM - Cyber Security Workshop
~Get Your Files Here !/1. Welcome to the Workshop!/1. Welcome to the Workshop!.mp4
91.1 MB
~Get Your Files Here !/13. How to Get the Most from the Mapping/1. How to Get the Most from the Mapping.mp4
91.0 MB
~Get Your Files Here !/2. Introduction/1. Introduction.mp4
85.3 MB
~Get Your Files Here !/3. The ITAM Program and Scope/1. The ITAM Program and Scope.mp4
46.6 MB
~Get Your Files Here !/14. The End. Or Is It/1. The End. Or Is It.mp4
45.5 MB
~Get Your Files Here !/4. ITAM Tools/1. ITAM Tools.mp4
39.3 MB
~Get Your Files Here !/8. Acquire and Receive Processes/1. Acquire and Receive Processes.mp4
36.5 MB
~Get Your Files Here !/6. IT Users/1. IT Users.mp4
36.2 MB
~Get Your Files Here !/9. Deploy, In-Use, Recover/1. Deploy, In-Use, Recover.mp4
32.1 MB
~Get Your Files Here !/12. Conclusion/1. Conclusion.mp4
29.1 MB
~Get Your Files Here !/5. Policies/1. Policies.mp4
27.6 MB
~Get Your Files Here !/10. Dispose/1. Dispose.mp4
24.1 MB
~Get Your Files Here !/7. Vendor Management/1. Vendor Management.mp4
21.5 MB
~Get Your Files Here !/11. Moving the ITAM Program Forward/1. Moving the ITAM Program Forward.mp4
20.6 MB
~Get Your Files Here !/1. Welcome to the Workshop!/4.1 Workshop-Mapping-Presentation.pdf
2.2 MB
~Get Your Files Here !/13. How to Get the Most from the Mapping/1.1 Workshop-Mapping-Spreadsheet.xlsx
660.5 kB
~Get Your Files Here !/1. Welcome to the Workshop!/4.2 Workshop-Mapping-Textbook.pdf
576.6 kB
~Get Your Files Here !/1. Welcome to the Workshop!/2. Terms of Use.html
1.3 kB
~Get Your Files Here !/1. Welcome to the Workshop!/4. Course Materials.html
422 Bytes
~Get Your Files Here !/Bonus Resources.txt
386 Bytes
[磁力链接]
添加时间:
2024-01-02
大小:
630.1 MB
最近下载:
2025-01-02
热度:
2609
[ DevCourseWeb.com ] Udemy - Cyber Security for Absolute Beginners - Essential Concepts
~Get Your Files Here !/8. Core Cyber Security Principles/5. Risk Management.mp4
84.3 MB
~Get Your Files Here !/1. Course Introduction/5. Familiarizing Yourself with Udemy's Course Taking Interface.mp4
65.8 MB
~Get Your Files Here !/2. Introduction to Cyber Security/4. The Current State of Cybersecurity in 2021 & 2022.mp4
58.4 MB
~Get Your Files Here !/9. Fundamental Threat Countermeasures/12. Student Exercise #3 Exploring the Built-In Firewall (Windows and Mac OS).mp4
52.0 MB
~Get Your Files Here !/7. Social Engineering & Email Based Threats/6. Email Spam, Spoofing, Phishing, and Pharming.mp4
47.9 MB
~Get Your Files Here !/3. Understanding Hackers/2. What Hacking Isn’t.mp4
42.2 MB
~Get Your Files Here !/7. Social Engineering & Email Based Threats/5. Social Engineering Phone Call Example #2.mp4
37.0 MB
~Get Your Files Here !/4. Networking 101/10. Student Exercise 2 Identifying your MAC and IP Address (Windows and Mac OS).mp4
35.8 MB
~Get Your Files Here !/10. Cyber Security in the Workplace/4. Application Development Security.mp4
32.6 MB
~Get Your Files Here !/6. Additional Threats & Vulnerabilities/4. Protocol Spoofing.mp4
32.6 MB
~Get Your Files Here !/9. Fundamental Threat Countermeasures/11. Wireless Networking Security.mp4
32.6 MB
~Get Your Files Here !/10. Cyber Security in the Workplace/3. Incident Response.mp4
31.7 MB
~Get Your Files Here !/9. Fundamental Threat Countermeasures/5. Encryption.mp4
31.7 MB
~Get Your Files Here !/7. Social Engineering & Email Based Threats/4. Social Engineering Phone Call Example #1.mp4
31.4 MB
~Get Your Files Here !/10. Cyber Security in the Workplace/6. Risk Management Program.mp4
30.2 MB
~Get Your Files Here !/5. Malware Threats/5. Ransomware and Rootkits.mp4
29.9 MB
~Get Your Files Here !/4. Networking 101/7. Switches versus Routers.mp4
29.2 MB
~Get Your Files Here !/4. Networking 101/9. How the Internet Works (Simplified).mp4
28.1 MB
~Get Your Files Here !/6. Additional Threats & Vulnerabilities/8. Evil Twin and Rogue Access Points.mp4
28.0 MB
~Get Your Files Here !/7. Social Engineering & Email Based Threats/3. Social Engineering Scenarios Overview.mp4
27.8 MB
[磁力链接]
添加时间:
2022-05-16
大小:
1.7 GB
最近下载:
2025-01-02
热度:
2599
[ FreeCourseWeb.com ] Udemy - Learn cyber security attacks - (beginners)
~Get Your Files Here !/05 practice cyber security attacks/016 Practice Social Engineering attack part2.mp4
119.4 MB
~Get Your Files Here !/05 practice cyber security attacks/014 DNS spoofing.mp4
113.7 MB
~Get Your Files Here !/05 practice cyber security attacks/018 practice code execution attack.mp4
97.6 MB
~Get Your Files Here !/05 practice cyber security attacks/009 practice malicious payload attack (reverse TCP) part1.mp4
95.9 MB
~Get Your Files Here !/03 building your lab/002 download and install virtual box.mp4
95.6 MB
~Get Your Files Here !/05 practice cyber security attacks/026 practice SQL injection attack part4.mp4
95.2 MB
~Get Your Files Here !/05 practice cyber security attacks/019 practice File inclusion attack part1.mp4
92.3 MB
~Get Your Files Here !/05 practice cyber security attacks/022 practice xss attack part2.mp4
89.5 MB
~Get Your Files Here !/02 Networking basics/001 Networking basics part1.mp4
86.7 MB
~Get Your Files Here !/05 practice cyber security attacks/021 Practice XSS attack part1.mp4
82.7 MB
~Get Your Files Here !/05 practice cyber security attacks/013 practice Arp poising attack part2.mp4
82.3 MB
~Get Your Files Here !/05 practice cyber security attacks/004 Practice smurf attack.mp4
80.6 MB
~Get Your Files Here !/04 essentials system commands/002 essential system commands part2.mp4
79.6 MB
~Get Your Files Here !/05 practice cyber security attacks/020 practice File inclusion attack part2.mp4
78.3 MB
~Get Your Files Here !/03 building your lab/003 download and install kali linux.mp4
77.8 MB
~Get Your Files Here !/05 practice cyber security attacks/006 practice land attack.mp4
74.9 MB
~Get Your Files Here !/03 building your lab/006 download and install metasploitable2.mp4
74.0 MB
~Get Your Files Here !/05 practice cyber security attacks/001 Practice ICMP flooding attack.mp4
73.4 MB
~Get Your Files Here !/05 practice cyber security attacks/003 Practice Ping of death attack.mp4
69.4 MB
~Get Your Files Here !/05 practice cyber security attacks/015 Practice Social Engineering attack part1.mp4
68.8 MB
[磁力链接]
添加时间:
2022-03-23
大小:
2.8 GB
最近下载:
2025-01-02
热度:
2505
共10页
上一页
1
2
3
4
5
下一页