磁力搜索 BT种子搜索利器 免费下载BT种子,超4000万条种子数据
为您找到约 283 个磁力链接/BT种子,耗时 0 毫秒。
排序: 相关程度 热度 文件大小 添加时间 最近访问

[ TutPig.com ] Linkedin - Cybersecurity Awareness - Cybersecurity Terminology

  • ~Get Your Files Here !/04 - 3. Process/01 - Understanding processes and documentation.mp4 10.5 MB
  • ~Get Your Files Here !/05 - 4. Technology/01 - Secure practices, terms, and exercises.mp4 10.1 MB
  • ~Get Your Files Here !/06 - 5. Threat Actors and Risks/02 - Technical risks.mp4 8.8 MB
  • ~Get Your Files Here !/03 - 2. People/01 - Security awareness and leadership.mp4 8.6 MB
  • ~Get Your Files Here !/03 - 2. People/04 - Understanding privacy.mp4 8.3 MB
  • ~Get Your Files Here !/06 - 5. Threat Actors and Risks/03 - Threats that target the human element.mp4 7.7 MB
  • ~Get Your Files Here !/04 - 3. Process/02 - Technical controls.mp4 7.3 MB
  • ~Get Your Files Here !/05 - 4. Technology/02 - Network controls.mp4 7.1 MB
  • ~Get Your Files Here !/05 - 4. Technology/03 - Advancements in technology.mp4 7.1 MB
  • ~Get Your Files Here !/06 - 5. Threat Actors and Risks/01 - Threat actors and definitions.mp4 7.1 MB
  • ~Get Your Files Here !/02 - 1. Defining Cybersecurity and People, Process, and Technology/01 - What is cybersecurity.mp4 6.0 MB
  • ~Get Your Files Here !/01 - Introduction/01 - Welcome to Cybersecurity Terminology 101.mp4 5.7 MB
  • ~Get Your Files Here !/03 - 2. People/02 - Red vs. blue vs. purple teams.mp4 5.0 MB
  • ~Get Your Files Here !/03 - 2. People/03 - Who are the adversaries.mp4 4.7 MB
  • ~Get Your Files Here !/02 - 1. Defining Cybersecurity and People, Process, and Technology/02 - People, process, and technology.mp4 2.9 MB
  • ~Get Your Files Here !/07 - Conclusion/01 - Apply cybersecurity terminology.mp4 2.8 MB
  • ~Get Your Files Here !/04 - 3. Process/01 - Understanding processes and documentation.srt 6.2 kB
  • ~Get Your Files Here !/06 - 5. Threat Actors and Risks/01 - Threat actors and definitions.srt 6.1 kB
  • ~Get Your Files Here !/06 - 5. Threat Actors and Risks/03 - Threats that target the human element.srt 5.7 kB
  • ~Get Your Files Here !/04 - 3. Process/02 - Technical controls.srt 5.7 kB
[磁力链接] 添加时间:2023-12-19 大小:109.8 MB 最近下载:2025-12-07 热度:508

[ FreeCourseWeb.com ] Cybersecurity Careers - Build Your Brand in Cybersecurity

  • ~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/04 - Optimizing your LinkedIn profile.mp4 18.6 MB
  • ~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/05 - Five tips for using LinkedIn effectively.mp4 17.3 MB
  • ~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/02 - Speaking at events and conferences.mp4 16.1 MB
  • ~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/01 - Creating and sharing content.mp4 16.0 MB
  • ~Get Your Files Here !/02 - 1. Personal Branding in Cybersecurity/03 - Benefits of building your personal brand in cybersecurity.mp4 13.9 MB
  • ~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/03 - Building an online presence.mp4 13.6 MB
  • ~Get Your Files Here !/02 - 1. Personal Branding in Cybersecurity/02 - Elements of a strong personal brand.mp4 13.1 MB
  • ~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/02 - Developing a personal brand statement.mp4 11.7 MB
  • ~Get Your Files Here !/05 - 4. Networking for Cybersecurity Professionals/03 - Staying up-to-date with industry trends.mp4 11.6 MB
  • ~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/03 - Contributing to open-source projects.mp4 11.0 MB
  • ~Get Your Files Here !/05 - 4. Networking for Cybersecurity Professionals/01 - Networking and nurturing professional relationships.mp4 10.4 MB
  • ~Get Your Files Here !/02 - 1. Personal Branding in Cybersecurity/01 - What is personal branding.mp4 10.1 MB
  • ~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/01 - Identifying your unique value proposition.mp4 10.0 MB
  • ~Get Your Files Here !/05 - 4. Networking for Cybersecurity Professionals/02 - Effective networking strategies.mp4 8.0 MB
  • ~Get Your Files Here !/01 - Introduction/01 - Grow your cybersecurity career with personal branding.mp4 3.9 MB
  • ~Get Your Files Here !/06 - Conclusion/01 - Next steps.mp4 3.9 MB
  • ~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/02 - Speaking at events and conferences.srt 8.6 kB
  • ~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/01 - Creating and sharing content.srt 7.9 kB
  • ~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/04 - Optimizing your LinkedIn profile.srt 7.5 kB
  • ~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/03 - Building an online presence.srt 7.5 kB
[磁力链接] 添加时间:2024-03-28 大小:189.3 MB 最近下载:2025-12-31 热度:740

[ FreeCourseWeb.com ] Translating Cybersecurity for SMBs - Using the NIST Cybersecurity Framework 2.0

  • ~Get Your Files Here !/05 - 4. Identify/01 - Understand what you have.mp4 10.7 MB
  • ~Get Your Files Here !/04 - 3. Govern/02 - Roll out your guidance.mp4 8.8 MB
  • ~Get Your Files Here !/11 - Conclusion/01 - Build cybersecurity into your business.mp4 8.5 MB
  • ~Get Your Files Here !/04 - 3. Govern/01 - Set your cyber strategy.mp4 8.1 MB
  • ~Get Your Files Here !/06 - 5. Protect/02 - Guard your network.mp4 7.0 MB
  • ~Get Your Files Here !/06 - 5. Protect/01 - Secure your system.mp4 7.0 MB
  • ~Get Your Files Here !/07 - 6. Detect/01 - Know when things are off.mp4 6.9 MB
  • ~Get Your Files Here !/08 - 7. Respond/01 - Address cyber incidents.mp4 6.7 MB
  • ~Get Your Files Here !/08 - 7. Respond/02 - Keep everyone in the loop.mp4 6.7 MB
  • ~Get Your Files Here !/09 - 8. Recover/01 - Get back to normal.mp4 6.6 MB
  • ~Get Your Files Here !/03 - 2. NIST Cybersecurity Framework 2.0/01 - Cybersecurity framework fundamentals.mp4 6.3 MB
  • ~Get Your Files Here !/10 - 9. Build Cyber Capabilities/01 - Determine your tier.mp4 6.2 MB
  • ~Get Your Files Here !/02 - 1. Cybersecurity in Your Business/02 - Understand your cyber risks.mp4 6.0 MB
  • ~Get Your Files Here !/03 - 2. NIST Cybersecurity Framework 2.0/02 - Leverage the cybersecurity framework.mp4 5.9 MB
  • ~Get Your Files Here !/10 - 9. Build Cyber Capabilities/02 - Define your profile.mp4 5.9 MB
  • ~Get Your Files Here !/02 - 1. Cybersecurity in Your Business/01 - Cornerstones of cybersecurity.mp4 5.4 MB
  • ~Get Your Files Here !/02 - 1. Cybersecurity in Your Business/03 - Prioritize your biggest risks.mp4 4.9 MB
  • ~Get Your Files Here !/10 - 9. Build Cyber Capabilities/03 - Create a plan.mp4 3.4 MB
  • ~Get Your Files Here !/01 - Introduction/02 - What you should know.mp4 3.0 MB
  • ~Get Your Files Here !/01 - Introduction/01 - Leverage the NIST CSF to protect what matters most.mp4 2.7 MB
[磁力链接] 添加时间:2024-05-28 大小:127.0 MB 最近下载:2026-01-05 热度:1249

[ WebToolTip.com ] Udemy - Cybersecurity Engineer - Domain 1 - Cybersecurity Fundamentals

  • ~Get Your Files Here !/3 - Network Fundamentals Design/2 -Network Security Tools VPNs, VLANs, MAC Filtering, Protocols & More.mp4 481.4 MB
  • ~Get Your Files Here !/1 - Introduction to Cybersecurity Engineer/1 -Cybersecurity Engineer.mp4 375.5 MB
  • ~Get Your Files Here !/3 - Network Fundamentals Design/1 -Network Traffic Analysis Wireshark, Tcpdump, DNS Tools & Packet Replay.mp4 353.9 MB
  • ~Get Your Files Here !/2 - Cybersecurity Fundamentals/1 -Cybersecurity Fundamentals.mp4 321.2 MB
  • ~Get Your Files Here !/4 - Security Architecture/1 -Implement and Manage Engineering Processes.mp4 262.2 MB
  • ~Get Your Files Here !/3 - Network Fundamentals Design/3 -IP Addressing Fundamentals Subnet Masking & Internet Protocol Basics.mp4 253.8 MB
  • ~Get Your Files Here !/4 - Security Architecture/2 -Security Models.mp4 199.8 MB
  • ~Get Your Files Here !/4 - Security Architecture/3 -Assess and Mitigate Security Vulnerabilities.mp4 189.3 MB
  • ~Get Your Files Here !/5 - Practice Exam, Mock Exam and Flashcards/1 -CCSE Flash Cards Certcop.pdf 4.0 MB
  • Get Bonus Downloads Here.url 180 Bytes
  • ~Get Your Files Here !/Bonus Resources.txt 70 Bytes
  • ~Get Your Files Here !/5 - Practice Exam, Mock Exam and Flashcards/1 - Flashcards.html 41 Bytes
[磁力链接] 添加时间:2025-05-31 大小:2.4 GB 最近下载:2025-12-21 热度:558

Lynda - Foundations of Cybersecurity

  • 021 Managing user access and identity.mp4 20.7 MB
  • 022 Implementing preventative security.mp4 18.8 MB
  • 023 Monitoring and alerts.mp4 15.7 MB
  • 018 Describing security requirements.mp4 14.9 MB
  • 008 Dissecting the payment card industry and PCI DSS.mp4 14.6 MB
  • 007 Implementing control frameworks.mp4 14.3 MB
  • 025 Preparing for an incident.mp4 14.2 MB
  • 019 Architecting security risk.mp4 13.5 MB
  • 016 Understanding advanced persistent threats (APTs).mp4 13.5 MB
  • 004 Dissecting cyber risk.mp4 13.1 MB
  • 003 Understanding the NIST cybersecurity framework.mp4 12.6 MB
  • 011 Dissecting security threats.mp4 11.6 MB
  • 026 Responding to an incident.mp4 11.5 MB
  • 005 Unpacking COBIT 5.mp4 10.3 MB
  • 012 Exploring cybercrime as an industry.mp4 9.9 MB
  • 014 Using callbacks to capture keystrokes.mp4 9.8 MB
  • 015 Hiding malware with rootkits.mp4 9.8 MB
  • 009 Exploring the Cyber Essentials framework.mp4 9.3 MB
  • 013 Hiding malware through cloaking and alternate data streams.mp4 9.0 MB
  • 020 Selecting security controls.mp4 8.5 MB
[磁力链接] 添加时间:2017-02-08 大小:300.9 MB 最近下载:2025-03-22 热度:383

Lynda - Foundations of Cybersecurity

  • 01. Introduction/01_01-Welcome.mp4 6.5 MB
  • 01. Introduction/01_02-What you should know.mp4 2.0 MB
  • 02. Cybersecurity Foundations/02_01-Understanding the NIST cybersecurity framework.mp4 12.6 MB
  • 02. Cybersecurity Foundations/02_02-Dissecting cyber risk.mp4 13.1 MB
  • 02. Cybersecurity Foundations/02_03-Unpacking COBIT 5.mp4 10.3 MB
  • 02. Cybersecurity Foundations/02_04-Looking closer at DSS05.mp4 8.1 MB
  • 02. Cybersecurity Foundations/02_05-Implementing control frameworks.mp4 14.3 MB
  • 02. Cybersecurity Foundations/02_06-Dissecting the payment card industry and PCI DSS.mp4 14.6 MB
  • 02. Cybersecurity Foundations/02_07-Exploring the Cyber Essentials framework.mp4 9.3 MB
  • 03. Cybersecurity Threats/03_01-Breaking down the cybersecurity kill chain.mp4 8.1 MB
  • 03. Cybersecurity Threats/03_02-Dissecting security threats.mp4 11.6 MB
  • 03. Cybersecurity Threats/03_03-Exploring cybercrime as an industry.mp4 9.9 MB
  • 03. Cybersecurity Threats/03_04-Hiding malware through cloaking and alternate data streams.mp4 9.0 MB
  • 03. Cybersecurity Threats/03_05-Using callbacks to capture keystrokes.mp4 9.8 MB
  • 03. Cybersecurity Threats/03_06-Hiding malware with rootkits.mp4 9.8 MB
  • 03. Cybersecurity Threats/03_07-Understanding advanced persistent threats APTs.mp4 13.5 MB
  • 03. Cybersecurity Threats/03_08-Exploring ransomware.mp4 8.4 MB
  • 04. Security Architecture/04_01-Describing security requirements.mp4 14.9 MB
  • 04. Security Architecture/04_02-Architecting security risk.mp4 13.5 MB
  • 04. Security Architecture/04_03-Selecting security controls.mp4 8.5 MB
[磁力链接] 添加时间:2017-02-08 大小:300.9 MB 最近下载:2026-01-04 热度:2383

Lynda - Practical Cybersecurity

  • 8. Monitoring Network Activity/164982_08_03_XR15_packets.mp4 13.1 MB
  • 7. Checking for Common Mistakes in Web Apps/164982_07_02_XR15_scan.mp4 11.9 MB
  • 3. Personal Firewalls/164982_03_02_XR15_mswf.mp4 10.7 MB
  • 3. Personal Firewalls/164982_03_06_XR15_iptables.mp4 9.8 MB
  • 3. Personal Firewalls/164982_03_04_XR15_advrules.mp4 9.5 MB
  • 7. Checking for Common Mistakes in Web Apps/164982_07_01_XR15_intro.mp4 9.4 MB
  • 6. Checking Hosts for Known Vulnerabilities/164982_06_04_XR15_scan.mp4 8.6 MB
  • 1. Why Cybersecurity/164982_01_03_XR15_attack.mp4 8.6 MB
  • 1. Why Cybersecurity/164982_01_01_XR15_cyber.mp4 8.4 MB
  • 8. Monitoring Network Activity/164982_08_05_XR151_intruder.mp4 8.3 MB
  • 8. Monitoring Network Activity/164982_08_04_XR15_filters.mp4 8.2 MB
  • 2. Antivirus/164982_02_06_XR15_schedule.mp4 8.2 MB
  • 3. Personal Firewalls/164982_03_03_XR15_advfw.mp4 7.9 MB
  • 0. Introduction/164982_00_01_WX30_welcome.mp4 6.9 MB
  • 3. Personal Firewalls/164982_03_05_XR15_zedlan.mp4 6.7 MB
  • 4. Knowing What Is on Your Network/164982_04_05_XR15_zenmap.mp4 6.3 MB
  • 5. Network Communications and Detecting Intruders/164982_05_04_XR15_honeypot.mp4 6.0 MB
  • 5. Network Communications and Detecting Intruders/164982_05_02_XR15_filexfer.mp4 5.8 MB
  • 8. Monitoring Network Activity/164982_08_02_XR15_capture.mp4 5.6 MB
  • 2. Antivirus/164982_02_05_XR15_avsettings.mp4 5.5 MB
[磁力链接] 添加时间:2017-02-10 大小:244.8 MB 最近下载:2025-09-24 热度:1513

TTC - Thinking about Cybersecurity

  • TGC_9523_Lect18_Cybersecurity.wmv 509.4 MB
  • TGC_9523_Lect01_Cybersecurity.wmv 509.0 MB
  • TGC_9523_Lect13_Cybersecurity.wmv 508.9 MB
  • TGC_9523_Lect17_Cybersecurity.wmv 494.7 MB
  • TGC_9523_Lect08_Cybersecurity.wmv 493.5 MB
  • TGC_9523_Lect14_Cybersecurity.wmv 486.8 MB
  • TGC_9523_Lect10_Cybersecurity.wmv 486.1 MB
  • TGC_9523_Lect04_Cybersecurity.wmv 480.1 MB
  • TGC_9523_Lect15_Cybersecurity.wmv 474.7 MB
  • TGC_9523_Lect09_Cybersecurity.wmv 473.9 MB
  • TGC_9523_Lect05_Cybersecurity.wmv 472.8 MB
  • TGC_9523_Lect07_Cybersecurity.wmv 470.4 MB
  • TGC_9523_Lect06_Cybersecurity.wmv 467.2 MB
  • TGC_9523_Lect16_Cybersecurity.wmv 460.0 MB
  • TGC_9523_Lect11_Cybersecurity.wmv 453.2 MB
  • TGC_9523_Lect12_Cybersecurity.wmv 449.4 MB
  • TGC_9523_Lect03_Cybersecurity.wmv 438.7 MB
  • TGC_9523_Lect02_Cybersecurity.wmv 378.9 MB
  • DG9523_98F12.PDF 4.7 MB
[磁力链接] 添加时间:2017-02-10 大小:8.5 GB 最近下载:2026-01-05 热度:6267

Cybersecurity {AM}

  • 0 Introduction/369625_00_03_XR15_Reference.mp4 10.2 MB
  • 3 Architecting Security/369625_03_05_XR15_Cloud_Attribute_Taxonomy.mp4 10.1 MB
  • 3 Architecting Security/369625_03_01_XR15_Introduction_to_SABSA.mp4 9.9 MB
  • 2 Cloud Security Guidance/369625_02_16_SO30_XR30_Solution.mp4 9.9 MB
  • 2 Cloud Security Guidance/369625_02_03_XR15_Information_Management.mp4 9.8 MB
  • 1 Cloud Fundamentals/369625_01_01_XR15_Essential_Characteristics.mp4 9.6 MB
  • 1 Cloud Fundamentals/369625_01_06_XR15_Cloud_Incidents.mp4 9.4 MB
  • 2 Cloud Security Guidance/369625_02_02_XR15_Legal_Compliance_and_Audit.mp4 8.9 MB
  • 1 Cloud Fundamentals/369625_01_09_XR15_Cloud_Trust.mp4 8.8 MB
  • 2 Cloud Security Guidance/369625_02_07_XR15_Incident_Response.mp4 8.8 MB
  • 2 Cloud Security Guidance/369625_02_11_XR15_Identity_in_the_Cloud.mp4 8.4 MB
  • 2 Cloud Security Guidance/369625_02_08_XR15_Application_Security.mp4 8.3 MB
  • 2 Cloud Security Guidance/369625_02_13_XR15_Virtualisation.mp4 8.2 MB
  • 2 Cloud Security Guidance/369625_02_05_XR15_Traditional_Security_BCP_and_DR.mp4 8.2 MB
  • 2 Cloud Security Guidance/369625_02_12_XR15_Cloud_Access_Control.mp4 7.9 MB
  • 1 Cloud Fundamentals/369625_01_02_XR15_Infrastructure_as_a_Service.mp4 7.6 MB
  • 3 Architecting Security/369625_03_02_XR15_Fast_Tracker.mp4 7.4 MB
  • 1 Cloud Fundamentals/369625_01_05_XR151_Deployment_Models.mp4 6.7 MB
  • 2 Cloud Security Guidance/369625_02_10_XR15_Encryption_and_Key_Management.mp4 6.6 MB
  • 3 Architecting Security/369625_03_03_XR15_SABSA_Attributes.mp4 6.3 MB
[磁力链接] 添加时间:2017-02-11 大小:230.5 MB 最近下载:2026-01-03 热度:2074

Lynda - Foundations of Cybersecurity

  • 021 Managing user access and identity.mp4 20.7 MB
  • 022 Implementing preventative security.mp4 18.8 MB
  • 023 Monitoring and alerts.mp4 15.7 MB
  • 018 Describing security requirements.mp4 14.9 MB
  • 008 Dissecting the payment card industry and PCI DSS.mp4 14.6 MB
  • 007 Implementing control frameworks.mp4 14.3 MB
  • 025 Preparing for an incident.mp4 14.2 MB
  • 019 Architecting security risk.mp4 13.5 MB
  • 016 Understanding advanced persistent threats (APTs).mp4 13.5 MB
  • 004 Dissecting cyber risk.mp4 13.1 MB
  • 003 Understanding the NIST cybersecurity framework.mp4 12.6 MB
  • 011 Dissecting security threats.mp4 11.6 MB
  • 026 Responding to an incident.mp4 11.5 MB
  • 005 Unpacking COBIT 5.mp4 10.3 MB
  • 012 Exploring cybercrime as an industry.mp4 9.9 MB
  • 014 Using callbacks to capture keystrokes.mp4 9.8 MB
  • 015 Hiding malware with rootkits.mp4 9.8 MB
  • 009 Exploring the Cyber Essentials framework.mp4 9.3 MB
  • 013 Hiding malware through cloaking and alternate data streams.mp4 9.0 MB
  • 020 Selecting security controls.mp4 8.5 MB
[磁力链接] 添加时间:2017-02-19 大小:300.9 MB 最近下载:2026-01-05 热度:3271

Cybersecurity-The Real Agenda.wmv

  • Cybersecurity-The Real Agenda.wmv 148.0 MB
[磁力链接] 添加时间:2017-02-21 大小:148.0 MB 最近下载:2025-09-27 热度:1562

Lynda Cybersecurity with Cloud Computing tutorialkhan.com.iso

  • Lynda Cybersecurity with Cloud Computing tutorialkhan.com.iso 359.3 MB
[磁力链接] 添加时间:2017-02-22 大小:359.3 MB 最近下载:2021-05-18 热度:279

LYNDA FOUNDATIONS OF CYBERSECURITY TUTORIAL

  • 01. Introduction/01_01-Welcome.mp4 6.5 MB
  • 01. Introduction/01_02-What you should know.mp4 2.0 MB
  • 02. Cybersecurity Foundations/02_06-Dissecting the payment card industry and PCI DSS.mp4 14.6 MB
  • 02. Cybersecurity Foundations/02_05-Implementing control frameworks.mp4 14.3 MB
  • 02. Cybersecurity Foundations/02_02-Dissecting cyber risk.mp4 13.1 MB
  • 02. Cybersecurity Foundations/02_01-Understanding the NIST cybersecurity framework.mp4 12.6 MB
  • 02. Cybersecurity Foundations/02_03-Unpacking COBIT 5.mp4 10.3 MB
  • 02. Cybersecurity Foundations/02_07-Exploring the Cyber Essentials framework.mp4 9.3 MB
  • 02. Cybersecurity Foundations/02_04-Looking closer at DSS05.mp4 8.1 MB
  • 03. Cybersecurity Threats/03_07-Understanding advanced persistent threats APTs.mp4 13.5 MB
  • 03. Cybersecurity Threats/03_02-Dissecting security threats.mp4 11.6 MB
  • 03. Cybersecurity Threats/03_03-Exploring cybercrime as an industry.mp4 9.9 MB
  • 03. Cybersecurity Threats/03_05-Using callbacks to capture keystrokes.mp4 9.8 MB
  • 03. Cybersecurity Threats/03_06-Hiding malware with rootkits.mp4 9.8 MB
  • 03. Cybersecurity Threats/03_04-Hiding malware through cloaking and alternate data streams.mp4 9.0 MB
  • 03. Cybersecurity Threats/03_08-Exploring ransomware.mp4 8.4 MB
  • 03. Cybersecurity Threats/03_01-Breaking down the cybersecurity kill chain.mp4 8.1 MB
  • 04. Security Architecture/04_04-Managing user access and identity.mp4 20.7 MB
  • 04. Security Architecture/04_05-Implementing preventative security.mp4 18.8 MB
  • 04. Security Architecture/04_06-Monitoring and alerts.mp4 15.7 MB
[磁力链接] 添加时间:2017-02-24 大小:300.9 MB 最近下载:2025-06-26 热度:1106

[Lynda] Practical Cybersecurity-KTR

  • 8. Monitoring Network Activity/164982_08_03_XR15_packets.mp4 13.1 MB
  • 7. Checking for Common Mistakes in Web Apps/164982_07_02_XR15_scan.mp4 11.9 MB
  • 3. Personal Firewalls/164982_03_02_XR15_mswf.mp4 10.7 MB
  • 3. Personal Firewalls/164982_03_06_XR15_iptables.mp4 9.8 MB
  • 3. Personal Firewalls/164982_03_04_XR15_advrules.mp4 9.5 MB
  • 7. Checking for Common Mistakes in Web Apps/164982_07_01_XR15_intro.mp4 9.4 MB
  • 6. Checking Hosts for Known Vulnerabilities/164982_06_04_XR15_scan.mp4 8.6 MB
  • 1. Why Cybersecurity/164982_01_03_XR15_attack.mp4 8.6 MB
  • 1. Why Cybersecurity/164982_01_01_XR15_cyber.mp4 8.4 MB
  • 8. Monitoring Network Activity/164982_08_05_XR151_intruder.mp4 8.3 MB
  • 8. Monitoring Network Activity/164982_08_04_XR15_filters.mp4 8.2 MB
  • 2. Antivirus/164982_02_06_XR15_schedule.mp4 8.2 MB
  • 3. Personal Firewalls/164982_03_03_XR15_advfw.mp4 7.9 MB
  • 0. Introduction/164982_00_01_WX30_welcome.mp4 6.9 MB
  • 3. Personal Firewalls/164982_03_05_XR15_zedlan.mp4 6.7 MB
  • 4. Knowing What Is on Your Network/164982_04_05_XR15_zenmap.mp4 6.3 MB
  • 5. Network Communications and Detecting Intruders/164982_05_04_XR15_honeypot.mp4 6.0 MB
  • 5. Network Communications and Detecting Intruders/164982_05_02_XR15_filexfer.mp4 5.8 MB
  • 8. Monitoring Network Activity/164982_08_02_XR15_capture.mp4 5.6 MB
  • 2. Antivirus/164982_02_05_XR15_avsettings.mp4 5.5 MB
[磁力链接] 添加时间:2017-02-26 大小:242.5 MB 最近下载:2026-01-05 热度:1952

TTC - Thinking about Cybersecurity

  • TGC_9523_Lect10_Cybersecurity.mp3 24.9 MB
  • TGC_9523_Lect14_Cybersecurity.mp3 24.7 MB
  • TGC_9523_Lect18_Cybersecurity.mp3 24.6 MB
  • TGC_9523_Lect08_Cybersecurity.mp3 23.8 MB
  • TGC_9523_Lect05_Cybersecurity.mp3 23.8 MB
  • TGC_9523_Lect13_Cybersecurity.mp3 23.6 MB
  • TGC_9523_Lect11_Cybersecurity.mp3 23.5 MB
  • TGC_9523_Lect17_Cybersecurity.mp3 23.4 MB
  • TGC_9523_Lect01_Cybersecurity.mp3 23.4 MB
  • TGC_9523_Lect04_Cybersecurity.mp3 23.2 MB
  • TGC_9523_Lect09_Cybersecurity.mp3 22.9 MB
  • TGC_9523_Lect12_Cybersecurity.mp3 22.7 MB
  • TGC_9523_Lect15_Cybersecurity.mp3 22.7 MB
  • TGC_9523_Lect16_Cybersecurity.mp3 22.6 MB
  • TGC_9523_Lect06_Cybersecurity.mp3 22.5 MB
  • TGC_9523_Lect07_Cybersecurity.mp3 22.4 MB
  • TGC_9523_Lect02_Cybersecurity.mp3 21.9 MB
  • TGC_9523_Lect03_Cybersecurity.mp3 21.5 MB
  • Course Guidebook.pdf 4.7 MB
[磁力链接] 添加时间:2017-03-26 大小:422.8 MB 最近下载:2026-01-06 热度:2513

Cybersecurity Threats Ransomware

  • 01. Course Overview/01. Intro.mp4 5.4 MB
  • 02. What Is Ransomware/01. Overview.mp4 4.1 MB
  • 02. What Is Ransomware/02. Definition and Types of Ransomware.mp4 20.3 MB
  • 02. What Is Ransomware/03. The Ransomware Timeline.mp4 15.2 MB
  • 02. What Is Ransomware/04. What Is Ransomware 30,000 ft. View.mp4 5.9 MB
  • 02. What Is Ransomware/05. How Big Is the Problem.mp4 15.1 MB
  • 02. What Is Ransomware/06. Ransomware Victims.mp4 11.7 MB
  • 02. What Is Ransomware/07. Module Progress Checkpoint.mp4 617.9 kB
  • 02. What Is Ransomware/08. Demo of Real World Ransomware Attack.mp4 52.0 MB
  • 02. What Is Ransomware/09. Variations of Ransomware.mp4 6.4 MB
  • 02. What Is Ransomware/10. Summary.mp4 2.5 MB
  • 03. Ransomware Entry Points/01. Overview.mp4 2.7 MB
  • 03. Ransomware Entry Points/02. The 5 Classic Infection Vectors.mp4 3.1 MB
  • 03. Ransomware Entry Points/03. Phishing and Email Attachments.mp4 10.6 MB
  • 03. Ransomware Entry Points/04. Embedded Hyperlinks, Websitesdownloads, and Drive-by Infections.mp4 6.2 MB
  • 03. Ransomware Entry Points/05. Why Common Exploit Kits Are Used.mp4 5.4 MB
  • 03. Ransomware Entry Points/06. Command and Callback (C&C) and Indicators of Compromise.mp4 7.0 MB
  • 03. Ransomware Entry Points/07. Summary.mp4 2.8 MB
  • 04. Incident Response Detection and Containment/01. Overview.mp4 2.6 MB
  • 04. Incident Response Detection and Containment/02. Indicators of Compromise.mp4 5.3 MB
[磁力链接] 添加时间:2017-04-29 大小:405.4 MB 最近下载:2025-12-24 热度:3341

Pluralsight.Cybersecurity.Threats.Ransomware-[www.allfiles.cf]-TPTORRENTS.zip

  • Pluralsight.Cybersecurity.Threats.Ransomware-[www.allfiles.cf]-TPTORRENTS.zip 373.3 MB
[磁力链接] 添加时间:2017-04-29 大小:373.3 MB 最近下载:2026-01-07 热度:1731

Pluralsight Cybersecurity Threats Ransomware

  • 1. Course Overview/01. Course Overview.mp4 5.4 MB
  • 2. What Is Ransomware/09. Demo of Real World Ransomware Attack.mp4 52.0 MB
  • 2. What Is Ransomware/03. Definition and Types of Ransomware.mp4 20.3 MB
  • 2. What Is Ransomware/04. The Ransomware Timeline.mp4 15.2 MB
  • 2. What Is Ransomware/06. How Big Is the Problem.mp4 15.1 MB
  • 2. What Is Ransomware/07. Ransomware Victims.mp4 11.7 MB
  • 2. What Is Ransomware/10. Variations of Ransomware.mp4 6.4 MB
  • 2. What Is Ransomware/05. What Is Ransomware 30,000 ft. View.mp4 5.9 MB
  • 2. What Is Ransomware/02. Overview.mp4 4.1 MB
  • 2. What Is Ransomware/11. Summary.mp4 2.5 MB
  • 2. What Is Ransomware/08. Module Progress Checkpoint.mp4 617.9 kB
  • 3. Ransomware Entry Points/14. Phishing and Email Attachments.mp4 10.6 MB
  • 3. Ransomware Entry Points/17. Command and Callback (C&C) and Indicators of Compromise.mp4 7.0 MB
  • 3. Ransomware Entry Points/15. Embedded Hyperlinks, Websites_downloads, and Drive-by Infections.mp4 6.2 MB
  • 3. Ransomware Entry Points/16. Why Common Exploit Kits Are Used.mp4 5.4 MB
  • 3. Ransomware Entry Points/13. The 5 Classic Infection Vectors.mp4 3.1 MB
  • 3. Ransomware Entry Points/18. Summary.mp4 2.8 MB
  • 3. Ransomware Entry Points/12. Overview.mp4 2.7 MB
  • 4. Incident Response - Detection and Containment/22. Containing the Attack.mp4 9.0 MB
  • 4. Incident Response - Detection and Containment/21. Detecting an Attack.mp4 7.3 MB
[磁力链接] 添加时间:2017-05-13 大小:388.1 MB 最近下载:2025-12-12 热度:1780

Lynda.com.Practical.Cybersecurity-ELOHiM

  • e-lprecybs.r00 15.0 MB
  • e-lprecybs.r01 15.0 MB
  • e-lprecybs.r02 15.0 MB
  • e-lprecybs.r03 15.0 MB
  • e-lprecybs.r04 15.0 MB
  • e-lprecybs.r05 15.0 MB
  • e-lprecybs.r06 15.0 MB
  • e-lprecybs.r07 15.0 MB
  • e-lprecybs.r08 15.0 MB
  • e-lprecybs.r09 15.0 MB
  • e-lprecybs.r10 15.0 MB
  • e-lprecybs.r11 15.0 MB
  • e-lprecybs.r12 15.0 MB
  • e-lprecybs.r13 15.0 MB
  • e-lprecybs.r14 7.2 MB
  • e-lprecybs.rar 15.0 MB
  • e-lprecybs.sfv 400 Bytes
  • elohim.nfo 2.6 kB
[磁力链接] 添加时间:2017-05-15 大小:232.2 MB 最近下载:2018-12-01 热度:142

Pluralsight - Cybersecurity Threats: Ransomware

  • 3. Ransomware Entry Points/15. Embedded Hyperlinks, Websites_downloads, and Drive-by Infections.mp4 6.2 MB
  • 3. Ransomware Entry Points/16. Why Common Exploit Kits Are Used.mp4 5.4 MB
  • 3. Ransomware Entry Points/14. Phishing and Email Attachments.mp4 10.6 MB
  • 3. Ransomware Entry Points/18. Summary.mp4 2.8 MB
  • 3. Ransomware Entry Points/12. Overview.mp4 2.7 MB
  • 3. Ransomware Entry Points/13. The 5 Classic Infection Vectors.mp4 3.1 MB
  • 3. Ransomware Entry Points/17. Command and Callback (C&C) and Indicators of Compromise.mp4 7.0 MB
  • 4. Incident Response - Detection and Containment/21. Detecting an Attack.mp4 7.3 MB
  • 4. Incident Response - Detection and Containment/20. Indicators of Compromise.mp4 5.3 MB
  • 4. Incident Response - Detection and Containment/23. Summary.mp4 1.7 MB
  • 4. Incident Response - Detection and Containment/19. Overview.mp4 2.6 MB
  • 4. Incident Response - Detection and Containment/22. Containing the Attack.mp4 9.0 MB
  • 6. Countermeasures and Preparing Your Incident Response/35. Next Generation Anti-virus_Anti-malware.mp4 5.6 MB
  • 6. Countermeasures and Preparing Your Incident Response/37. Summary.mp4 5.5 MB
  • 6. Countermeasures and Preparing Your Incident Response/33. Defending a Ransomware Attack.mp4 11.4 MB
  • 6. Countermeasures and Preparing Your Incident Response/34. Protecting a Windows Network.mp4 8.0 MB
  • 6. Countermeasures and Preparing Your Incident Response/32. Overview.mp4 5.5 MB
  • 6. Countermeasures and Preparing Your Incident Response/36. Lessons Learned and Your Incident Response Plan.mp4 10.9 MB
  • 2. What Is Ransomware/06. How Big Is the Problem.mp4 15.1 MB
  • 2. What Is Ransomware/02. Overview.mp4 4.1 MB
[磁力链接] 添加时间:2017-06-08 大小:388.1 MB 最近下载:2026-01-01 热度:3157


共15页 上一页 1 2 3 4 5 下一页