搜索
为您找到约
290
个磁力链接/BT种子,耗时 1 毫秒。
排序:
相关程度
热度
文件大小
添加时间
最近访问
[ TutPig.com ] Linkedin - Cybersecurity Awareness - Cybersecurity Terminology
~Get Your Files Here !/04 - 3. Process/01 - Understanding processes and documentation.mp4
10.5 MB
~Get Your Files Here !/05 - 4. Technology/01 - Secure practices, terms, and exercises.mp4
10.1 MB
~Get Your Files Here !/06 - 5. Threat Actors and Risks/02 - Technical risks.mp4
8.8 MB
~Get Your Files Here !/03 - 2. People/01 - Security awareness and leadership.mp4
8.6 MB
~Get Your Files Here !/03 - 2. People/04 - Understanding privacy.mp4
8.3 MB
~Get Your Files Here !/06 - 5. Threat Actors and Risks/03 - Threats that target the human element.mp4
7.7 MB
~Get Your Files Here !/04 - 3. Process/02 - Technical controls.mp4
7.3 MB
~Get Your Files Here !/05 - 4. Technology/02 - Network controls.mp4
7.1 MB
~Get Your Files Here !/05 - 4. Technology/03 - Advancements in technology.mp4
7.1 MB
~Get Your Files Here !/06 - 5. Threat Actors and Risks/01 - Threat actors and definitions.mp4
7.1 MB
~Get Your Files Here !/02 - 1. Defining Cybersecurity and People, Process, and Technology/01 - What is
cybersecurity
.mp4
6.0 MB
~Get Your Files Here !/01 - Introduction/01 - Welcome to Cybersecurity Terminology 101.mp4
5.7 MB
~Get Your Files Here !/03 - 2. People/02 - Red vs. blue vs. purple teams.mp4
5.0 MB
~Get Your Files Here !/03 - 2. People/03 - Who are the adversaries.mp4
4.7 MB
~Get Your Files Here !/02 - 1. Defining Cybersecurity and People, Process, and Technology/02 - People, process, and technology.mp4
2.9 MB
~Get Your Files Here !/07 - Conclusion/01 - Apply
cybersecurity
terminology.mp4
2.8 MB
~Get Your Files Here !/04 - 3. Process/01 - Understanding processes and documentation.srt
6.2 kB
~Get Your Files Here !/06 - 5. Threat Actors and Risks/01 - Threat actors and definitions.srt
6.1 kB
~Get Your Files Here !/06 - 5. Threat Actors and Risks/03 - Threats that target the human element.srt
5.7 kB
~Get Your Files Here !/04 - 3. Process/02 - Technical controls.srt
5.7 kB
[磁力链接]
添加时间:
2023-12-19
大小:
109.8 MB
最近下载:
2024-11-27
热度:
428
[ DevCourseWeb.com ] Cybersecurity - The Beginner's Guide - A comprehensive guide to getting started in
cybersecurity
.zip
[ DevCourseWeb.com ] Cybersecurity - The Beginner's Guide - A comprehensive guide to getting started in
cybersecurity
.zip
114.6 MB
[磁力链接]
添加时间:
2024-01-24
大小:
114.6 MB
最近下载:
2024-11-18
热度:
609
[ FreeCourseWeb.com ] Cybersecurity Careers - Build Your Brand in Cybersecurity
~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/04 - Optimizing your LinkedIn profile.mp4
18.6 MB
~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/05 - Five tips for using LinkedIn effectively.mp4
17.3 MB
~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/02 - Speaking at events and conferences.mp4
16.1 MB
~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/01 - Creating and sharing content.mp4
16.0 MB
~Get Your Files Here !/02 - 1. Personal Branding in Cybersecurity/03 - Benefits of building your personal brand in
cybersecurity
.mp4
13.9 MB
~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/03 - Building an online presence.mp4
13.6 MB
~Get Your Files Here !/02 - 1. Personal Branding in Cybersecurity/02 - Elements of a strong personal brand.mp4
13.1 MB
~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/02 - Developing a personal brand statement.mp4
11.7 MB
~Get Your Files Here !/05 - 4. Networking for Cybersecurity Professionals/03 - Staying up-to-date with industry trends.mp4
11.6 MB
~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/03 - Contributing to open-source projects.mp4
11.0 MB
~Get Your Files Here !/05 - 4. Networking for Cybersecurity Professionals/01 - Networking and nurturing professional relationships.mp4
10.4 MB
~Get Your Files Here !/02 - 1. Personal Branding in Cybersecurity/01 - What is personal branding.mp4
10.1 MB
~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/01 - Identifying your unique value proposition.mp4
10.0 MB
~Get Your Files Here !/05 - 4. Networking for Cybersecurity Professionals/02 - Effective networking strategies.mp4
8.0 MB
~Get Your Files Here !/01 - Introduction/01 - Grow your
cybersecurity
career with personal branding.mp4
3.9 MB
~Get Your Files Here !/06 - Conclusion/01 - Next steps.mp4
3.9 MB
~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/02 - Speaking at events and conferences.srt
8.6 kB
~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/01 - Creating and sharing content.srt
7.9 kB
~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/04 - Optimizing your LinkedIn profile.srt
7.5 kB
~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/03 - Building an online presence.srt
7.5 kB
[磁力链接]
添加时间:
2024-03-28
大小:
189.3 MB
最近下载:
2024-11-28
热度:
558
[ FreeCourseWeb.com ] Translating Cybersecurity for SMBs - Using the NIST Cybersecurity Framework 2.0
~Get Your Files Here !/05 - 4. Identify/01 - Understand what you have.mp4
10.7 MB
~Get Your Files Here !/04 - 3. Govern/02 - Roll out your guidance.mp4
8.8 MB
~Get Your Files Here !/11 - Conclusion/01 - Build
cybersecurity
into your business.mp4
8.5 MB
~Get Your Files Here !/04 - 3. Govern/01 - Set your cyber strategy.mp4
8.1 MB
~Get Your Files Here !/06 - 5. Protect/02 - Guard your network.mp4
7.0 MB
~Get Your Files Here !/06 - 5. Protect/01 - Secure your system.mp4
7.0 MB
~Get Your Files Here !/07 - 6. Detect/01 - Know when things are off.mp4
6.9 MB
~Get Your Files Here !/08 - 7. Respond/01 - Address cyber incidents.mp4
6.7 MB
~Get Your Files Here !/08 - 7. Respond/02 - Keep everyone in the loop.mp4
6.7 MB
~Get Your Files Here !/09 - 8. Recover/01 - Get back to normal.mp4
6.6 MB
~Get Your Files Here !/03 - 2. NIST Cybersecurity Framework 2.0/01 - Cybersecurity framework fundamentals.mp4
6.3 MB
~Get Your Files Here !/10 - 9. Build Cyber Capabilities/01 - Determine your tier.mp4
6.2 MB
~Get Your Files Here !/02 - 1. Cybersecurity in Your Business/02 - Understand your cyber risks.mp4
6.0 MB
~Get Your Files Here !/03 - 2. NIST Cybersecurity Framework 2.0/02 - Leverage the
cybersecurity
framework.mp4
5.9 MB
~Get Your Files Here !/10 - 9. Build Cyber Capabilities/02 - Define your profile.mp4
5.9 MB
~Get Your Files Here !/02 - 1. Cybersecurity in Your Business/01 - Cornerstones of
cybersecurity
.mp4
5.4 MB
~Get Your Files Here !/02 - 1. Cybersecurity in Your Business/03 - Prioritize your biggest risks.mp4
4.9 MB
~Get Your Files Here !/10 - 9. Build Cyber Capabilities/03 - Create a plan.mp4
3.4 MB
~Get Your Files Here !/01 - Introduction/02 - What you should know.mp4
3.0 MB
~Get Your Files Here !/01 - Introduction/01 - Leverage the NIST CSF to protect what matters most.mp4
2.7 MB
[磁力链接]
添加时间:
2024-05-28
大小:
127.0 MB
最近下载:
2024-11-28
热度:
858
Lynda - Foundations of Cybersecurity
021 Managing user access and identity.mp4
20.7 MB
022 Implementing preventative security.mp4
18.8 MB
023 Monitoring and alerts.mp4
15.7 MB
018 Describing security requirements.mp4
14.9 MB
008 Dissecting the payment card industry and PCI DSS.mp4
14.6 MB
007 Implementing control frameworks.mp4
14.3 MB
025 Preparing for an incident.mp4
14.2 MB
019 Architecting security risk.mp4
13.5 MB
016 Understanding advanced persistent threats (APTs).mp4
13.5 MB
004 Dissecting cyber risk.mp4
13.1 MB
003 Understanding the NIST
cybersecurity
framework.mp4
12.6 MB
011 Dissecting security threats.mp4
11.6 MB
026 Responding to an incident.mp4
11.5 MB
005 Unpacking COBIT 5.mp4
10.3 MB
012 Exploring cybercrime as an industry.mp4
9.9 MB
014 Using callbacks to capture keystrokes.mp4
9.8 MB
015 Hiding malware with rootkits.mp4
9.8 MB
009 Exploring the Cyber Essentials framework.mp4
9.3 MB
013 Hiding malware through cloaking and alternate data streams.mp4
9.0 MB
020 Selecting security controls.mp4
8.5 MB
[磁力链接]
添加时间:
2017-02-08
大小:
300.9 MB
最近下载:
2024-04-21
热度:
252
Lynda - Foundations of Cybersecurity
01. Introduction/01_01-Welcome.mp4
6.5 MB
01. Introduction/01_02-What you should know.mp4
2.0 MB
02. Cybersecurity Foundations/02_01-Understanding the NIST
cybersecurity
framework.mp4
12.6 MB
02. Cybersecurity Foundations/02_02-Dissecting cyber risk.mp4
13.1 MB
02. Cybersecurity Foundations/02_03-Unpacking COBIT 5.mp4
10.3 MB
02. Cybersecurity Foundations/02_04-Looking closer at DSS05.mp4
8.1 MB
02. Cybersecurity Foundations/02_05-Implementing control frameworks.mp4
14.3 MB
02. Cybersecurity Foundations/02_06-Dissecting the payment card industry and PCI DSS.mp4
14.6 MB
02. Cybersecurity Foundations/02_07-Exploring the Cyber Essentials framework.mp4
9.3 MB
03. Cybersecurity Threats/03_01-Breaking down the
cybersecurity
kill chain.mp4
8.1 MB
03. Cybersecurity Threats/03_02-Dissecting security threats.mp4
11.6 MB
03. Cybersecurity Threats/03_03-Exploring cybercrime as an industry.mp4
9.9 MB
03. Cybersecurity Threats/03_04-Hiding malware through cloaking and alternate data streams.mp4
9.0 MB
03. Cybersecurity Threats/03_05-Using callbacks to capture keystrokes.mp4
9.8 MB
03. Cybersecurity Threats/03_06-Hiding malware with rootkits.mp4
9.8 MB
03. Cybersecurity Threats/03_07-Understanding advanced persistent threats APTs.mp4
13.5 MB
03. Cybersecurity Threats/03_08-Exploring ransomware.mp4
8.4 MB
04. Security Architecture/04_01-Describing security requirements.mp4
14.9 MB
04. Security Architecture/04_02-Architecting security risk.mp4
13.5 MB
04. Security Architecture/04_03-Selecting security controls.mp4
8.5 MB
[磁力链接]
添加时间:
2017-02-08
大小:
300.9 MB
最近下载:
2024-11-28
热度:
1096
Lynda - Practical Cybersecurity
8. Monitoring Network Activity/164982_08_03_XR15_packets.mp4
13.1 MB
7. Checking for Common Mistakes in Web Apps/164982_07_02_XR15_scan.mp4
11.9 MB
3. Personal Firewalls/164982_03_02_XR15_mswf.mp4
10.7 MB
3. Personal Firewalls/164982_03_06_XR15_iptables.mp4
9.8 MB
3. Personal Firewalls/164982_03_04_XR15_advrules.mp4
9.5 MB
7. Checking for Common Mistakes in Web Apps/164982_07_01_XR15_intro.mp4
9.4 MB
6. Checking Hosts for Known Vulnerabilities/164982_06_04_XR15_scan.mp4
8.6 MB
1. Why Cybersecurity/164982_01_03_XR15_attack.mp4
8.6 MB
1. Why Cybersecurity/164982_01_01_XR15_cyber.mp4
8.4 MB
8. Monitoring Network Activity/164982_08_05_XR151_intruder.mp4
8.3 MB
8. Monitoring Network Activity/164982_08_04_XR15_filters.mp4
8.2 MB
2. Antivirus/164982_02_06_XR15_schedule.mp4
8.2 MB
3. Personal Firewalls/164982_03_03_XR15_advfw.mp4
7.9 MB
0. Introduction/164982_00_01_WX30_welcome.mp4
6.9 MB
3. Personal Firewalls/164982_03_05_XR15_zedlan.mp4
6.7 MB
4. Knowing What Is on Your Network/164982_04_05_XR15_zenmap.mp4
6.3 MB
5. Network Communications and Detecting Intruders/164982_05_04_XR15_honeypot.mp4
6.0 MB
5. Network Communications and Detecting Intruders/164982_05_02_XR15_filexfer.mp4
5.8 MB
8. Monitoring Network Activity/164982_08_02_XR15_capture.mp4
5.6 MB
2. Antivirus/164982_02_05_XR15_avsettings.mp4
5.5 MB
[磁力链接]
添加时间:
2017-02-10
大小:
244.8 MB
最近下载:
2024-11-29
热度:
1247
ESET NOD32 CyberSecurity For Mac
ECS_reg_keys_17.12.2010.rtfd/TXT.rtf
1.3 kB
eset_
cybersecurity
_en.dmg
38.2 MB
[磁力链接]
添加时间:
2017-02-10
大小:
38.2 MB
最近下载:
2024-11-29
热度:
1627
TTC - Thinking about Cybersecurity
TGC_9523_Lect18_Cybersecurity.wmv
509.4 MB
TGC_9523_Lect01_Cybersecurity.wmv
509.0 MB
TGC_9523_Lect13_Cybersecurity.wmv
508.9 MB
TGC_9523_Lect17_Cybersecurity.wmv
494.7 MB
TGC_9523_Lect08_Cybersecurity.wmv
493.5 MB
TGC_9523_Lect14_Cybersecurity.wmv
486.8 MB
TGC_9523_Lect10_Cybersecurity.wmv
486.1 MB
TGC_9523_Lect04_Cybersecurity.wmv
480.1 MB
TGC_9523_Lect15_Cybersecurity.wmv
474.7 MB
TGC_9523_Lect09_Cybersecurity.wmv
473.9 MB
TGC_9523_Lect05_Cybersecurity.wmv
472.8 MB
TGC_9523_Lect07_Cybersecurity.wmv
470.4 MB
TGC_9523_Lect06_Cybersecurity.wmv
467.2 MB
TGC_9523_Lect16_Cybersecurity.wmv
460.0 MB
TGC_9523_Lect11_Cybersecurity.wmv
453.2 MB
TGC_9523_Lect12_Cybersecurity.wmv
449.4 MB
TGC_9523_Lect03_Cybersecurity.wmv
438.7 MB
TGC_9523_Lect02_Cybersecurity.wmv
378.9 MB
DG9523_98F12.PDF
4.7 MB
[磁力链接]
添加时间:
2017-02-10
大小:
8.5 GB
最近下载:
2024-11-29
热度:
4714
Cybersecurity {AM}
0 Introduction/369625_00_03_XR15_Reference.mp4
10.2 MB
3 Architecting Security/369625_03_05_XR15_Cloud_Attribute_Taxonomy.mp4
10.1 MB
3 Architecting Security/369625_03_01_XR15_Introduction_to_SABSA.mp4
9.9 MB
2 Cloud Security Guidance/369625_02_16_SO30_XR30_Solution.mp4
9.9 MB
2 Cloud Security Guidance/369625_02_03_XR15_Information_Management.mp4
9.8 MB
1 Cloud Fundamentals/369625_01_01_XR15_Essential_Characteristics.mp4
9.6 MB
1 Cloud Fundamentals/369625_01_06_XR15_Cloud_Incidents.mp4
9.4 MB
2 Cloud Security Guidance/369625_02_02_XR15_Legal_Compliance_and_Audit.mp4
8.9 MB
1 Cloud Fundamentals/369625_01_09_XR15_Cloud_Trust.mp4
8.8 MB
2 Cloud Security Guidance/369625_02_07_XR15_Incident_Response.mp4
8.8 MB
2 Cloud Security Guidance/369625_02_11_XR15_Identity_in_the_Cloud.mp4
8.4 MB
2 Cloud Security Guidance/369625_02_08_XR15_Application_Security.mp4
8.3 MB
2 Cloud Security Guidance/369625_02_13_XR15_Virtualisation.mp4
8.2 MB
2 Cloud Security Guidance/369625_02_05_XR15_Traditional_Security_BCP_and_DR.mp4
8.2 MB
2 Cloud Security Guidance/369625_02_12_XR15_Cloud_Access_Control.mp4
7.9 MB
1 Cloud Fundamentals/369625_01_02_XR15_Infrastructure_as_a_Service.mp4
7.6 MB
3 Architecting Security/369625_03_02_XR15_Fast_Tracker.mp4
7.4 MB
1 Cloud Fundamentals/369625_01_05_XR151_Deployment_Models.mp4
6.7 MB
2 Cloud Security Guidance/369625_02_10_XR15_Encryption_and_Key_Management.mp4
6.6 MB
3 Architecting Security/369625_03_03_XR15_SABSA_Attributes.mp4
6.3 MB
[磁力链接]
添加时间:
2017-02-11
大小:
230.5 MB
最近下载:
2024-11-29
热度:
1453
CRC.Introduction.to.Computer.Networks.and.Cybersecurity.1466572132
CRC.Introduction.to.Computer.Networks.and.Cybersecurity.1466572132.pdf
42.0 MB
[磁力链接]
添加时间:
2017-02-12
大小:
42.0 MB
最近下载:
2024-10-05
热度:
926
Lynda - Foundations of Cybersecurity
021 Managing user access and identity.mp4
20.7 MB
022 Implementing preventative security.mp4
18.8 MB
023 Monitoring and alerts.mp4
15.7 MB
018 Describing security requirements.mp4
14.9 MB
008 Dissecting the payment card industry and PCI DSS.mp4
14.6 MB
007 Implementing control frameworks.mp4
14.3 MB
025 Preparing for an incident.mp4
14.2 MB
019 Architecting security risk.mp4
13.5 MB
016 Understanding advanced persistent threats (APTs).mp4
13.5 MB
004 Dissecting cyber risk.mp4
13.1 MB
003 Understanding the NIST
cybersecurity
framework.mp4
12.6 MB
011 Dissecting security threats.mp4
11.6 MB
026 Responding to an incident.mp4
11.5 MB
005 Unpacking COBIT 5.mp4
10.3 MB
012 Exploring cybercrime as an industry.mp4
9.9 MB
014 Using callbacks to capture keystrokes.mp4
9.8 MB
015 Hiding malware with rootkits.mp4
9.8 MB
009 Exploring the Cyber Essentials framework.mp4
9.3 MB
013 Hiding malware through cloaking and alternate data streams.mp4
9.0 MB
020 Selecting security controls.mp4
8.5 MB
[磁力链接]
添加时间:
2017-02-19
大小:
300.9 MB
最近下载:
2024-11-28
热度:
2497
Cybersecurity-The Real Agenda.wmv
Cybersecurity-The Real Agenda.wmv
148.0 MB
[磁力链接]
添加时间:
2017-02-21
大小:
148.0 MB
最近下载:
2024-11-02
热度:
1547
Lynda Cybersecurity with Cloud Computing tutorialkhan.com.iso
Lynda Cybersecurity with Cloud Computing tutorialkhan.com.iso
359.3 MB
[磁力链接]
添加时间:
2017-02-22
大小:
359.3 MB
最近下载:
2021-05-18
热度:
279
LYNDA FOUNDATIONS OF CYBERSECURITY TUTORIAL
01. Introduction/01_01-Welcome.mp4
6.5 MB
01. Introduction/01_02-What you should know.mp4
2.0 MB
02. Cybersecurity Foundations/02_06-Dissecting the payment card industry and PCI DSS.mp4
14.6 MB
02. Cybersecurity Foundations/02_05-Implementing control frameworks.mp4
14.3 MB
02. Cybersecurity Foundations/02_02-Dissecting cyber risk.mp4
13.1 MB
02. Cybersecurity Foundations/02_01-Understanding the NIST
cybersecurity
framework.mp4
12.6 MB
02. Cybersecurity Foundations/02_03-Unpacking COBIT 5.mp4
10.3 MB
02. Cybersecurity Foundations/02_07-Exploring the Cyber Essentials framework.mp4
9.3 MB
02. Cybersecurity Foundations/02_04-Looking closer at DSS05.mp4
8.1 MB
03. Cybersecurity Threats/03_07-Understanding advanced persistent threats APTs.mp4
13.5 MB
03. Cybersecurity Threats/03_02-Dissecting security threats.mp4
11.6 MB
03. Cybersecurity Threats/03_03-Exploring cybercrime as an industry.mp4
9.9 MB
03. Cybersecurity Threats/03_05-Using callbacks to capture keystrokes.mp4
9.8 MB
03. Cybersecurity Threats/03_06-Hiding malware with rootkits.mp4
9.8 MB
03. Cybersecurity Threats/03_04-Hiding malware through cloaking and alternate data streams.mp4
9.0 MB
03. Cybersecurity Threats/03_08-Exploring ransomware.mp4
8.4 MB
03. Cybersecurity Threats/03_01-Breaking down the
cybersecurity
kill chain.mp4
8.1 MB
04. Security Architecture/04_04-Managing user access and identity.mp4
20.7 MB
04. Security Architecture/04_05-Implementing preventative security.mp4
18.8 MB
04. Security Architecture/04_06-Monitoring and alerts.mp4
15.7 MB
[磁力链接]
添加时间:
2017-02-24
大小:
300.9 MB
最近下载:
2024-09-26
热度:
1087
Eset.Cybersecurity.Pro.v6.3.70.1
Torrent downloaded from www.DNoid.me - Demonoid (1).txt
56 Bytes
Serials.txt
438 Bytes
Eset.Cybersecurity.Pro.v6.3.70.1..nfo
1.5 kB
eset_
cybersecurity
_pro_.dmg.exe
98.7 MB
[磁力链接]
添加时间:
2017-02-25
大小:
98.7 MB
最近下载:
2024-02-20
热度:
90
[Lynda] Practical Cybersecurity-KTR
8. Monitoring Network Activity/164982_08_03_XR15_packets.mp4
13.1 MB
7. Checking for Common Mistakes in Web Apps/164982_07_02_XR15_scan.mp4
11.9 MB
3. Personal Firewalls/164982_03_02_XR15_mswf.mp4
10.7 MB
3. Personal Firewalls/164982_03_06_XR15_iptables.mp4
9.8 MB
3. Personal Firewalls/164982_03_04_XR15_advrules.mp4
9.5 MB
7. Checking for Common Mistakes in Web Apps/164982_07_01_XR15_intro.mp4
9.4 MB
6. Checking Hosts for Known Vulnerabilities/164982_06_04_XR15_scan.mp4
8.6 MB
1. Why Cybersecurity/164982_01_03_XR15_attack.mp4
8.6 MB
1. Why Cybersecurity/164982_01_01_XR15_cyber.mp4
8.4 MB
8. Monitoring Network Activity/164982_08_05_XR151_intruder.mp4
8.3 MB
8. Monitoring Network Activity/164982_08_04_XR15_filters.mp4
8.2 MB
2. Antivirus/164982_02_06_XR15_schedule.mp4
8.2 MB
3. Personal Firewalls/164982_03_03_XR15_advfw.mp4
7.9 MB
0. Introduction/164982_00_01_WX30_welcome.mp4
6.9 MB
3. Personal Firewalls/164982_03_05_XR15_zedlan.mp4
6.7 MB
4. Knowing What Is on Your Network/164982_04_05_XR15_zenmap.mp4
6.3 MB
5. Network Communications and Detecting Intruders/164982_05_04_XR15_honeypot.mp4
6.0 MB
5. Network Communications and Detecting Intruders/164982_05_02_XR15_filexfer.mp4
5.8 MB
8. Monitoring Network Activity/164982_08_02_XR15_capture.mp4
5.6 MB
2. Antivirus/164982_02_05_XR15_avsettings.mp4
5.5 MB
[磁力链接]
添加时间:
2017-02-26
大小:
242.5 MB
最近下载:
2024-11-24
热度:
1052
TTC - Thinking about Cybersecurity audio book - sup3r edition
Lect.10 International Governance and the Internet.m4a
8.3 MB
Lect.01 Stuxnet—The First Cyber Guided Missile.m4a
7.8 MB
Lect.02 The Incredible Scope of Cyberspace.m4a
7.3 MB
Lect.03 The Five Gateways of Internet Vulnerability.m4a
7.2 MB
Lect.04 Of Viruses, Botnets, and Logic Bombs .m4a
7.7 MB
Lect.05 The Problem of Identity on the Network.m4a
7.9 MB
Lect.06 Cyber Fraud, Theft, and Organized Crime.m4a
7.5 MB
Lect.07 Hacktivists and Insurgency.m4a
7.5 MB
Lect.08 Nations at Cyber War.m4a
7.9 MB
Lect.09 Government Regulation of Cyberspace.m4a
7.6 MB
Course Guidebook.pdf
4.7 MB
Lect.11 The Constitution and Cyberspace.m4a
7.8 MB
Lect.12 Big Data—''They'' Know Everything about You.m4a
7.6 MB
Lect.13 Privacy for the Cyber Age.m4a
7.9 MB
Lect.14 Listening In and Going Dark.m4a
8.2 MB
Lect.15 The Devil in the Chips-Hardware Failures.m4a
7.6 MB
Lect.16 Protecting Yourself in Cyberspace.m4a
7.5 MB
Lect.17 Critical Infrastructure and Resiliency.m4a
7.8 MB
Lect.18 Looking Forward-What Does the Future Hold.m4a
8.2 MB
[磁力链接]
添加时间:
2017-03-17
大小:
143.9 MB
最近下载:
2024-11-24
热度:
562
TTC - Thinking about Cybersecurity
TGC_9523_Lect10_Cybersecurity.mp3
24.9 MB
TGC_9523_Lect14_Cybersecurity.mp3
24.7 MB
TGC_9523_Lect18_Cybersecurity.mp3
24.6 MB
TGC_9523_Lect08_Cybersecurity.mp3
23.8 MB
TGC_9523_Lect05_Cybersecurity.mp3
23.8 MB
TGC_9523_Lect13_Cybersecurity.mp3
23.6 MB
TGC_9523_Lect11_Cybersecurity.mp3
23.5 MB
TGC_9523_Lect17_Cybersecurity.mp3
23.4 MB
TGC_9523_Lect01_Cybersecurity.mp3
23.4 MB
TGC_9523_Lect04_Cybersecurity.mp3
23.2 MB
TGC_9523_Lect09_Cybersecurity.mp3
22.9 MB
TGC_9523_Lect12_Cybersecurity.mp3
22.7 MB
TGC_9523_Lect15_Cybersecurity.mp3
22.7 MB
TGC_9523_Lect16_Cybersecurity.mp3
22.6 MB
TGC_9523_Lect06_Cybersecurity.mp3
22.5 MB
TGC_9523_Lect07_Cybersecurity.mp3
22.4 MB
TGC_9523_Lect02_Cybersecurity.mp3
21.9 MB
TGC_9523_Lect03_Cybersecurity.mp3
21.5 MB
Course Guidebook.pdf
4.7 MB
[磁力链接]
添加时间:
2017-03-26
大小:
422.8 MB
最近下载:
2024-11-28
热度:
1591
Cybersecurity Threats Ransomware
01. Course Overview/01. Intro.mp4
5.4 MB
02. What Is Ransomware/01. Overview.mp4
4.1 MB
02. What Is Ransomware/02. Definition and Types of Ransomware.mp4
20.3 MB
02. What Is Ransomware/03. The Ransomware Timeline.mp4
15.2 MB
02. What Is Ransomware/04. What Is Ransomware 30,000 ft. View.mp4
5.9 MB
02. What Is Ransomware/05. How Big Is the Problem.mp4
15.1 MB
02. What Is Ransomware/06. Ransomware Victims.mp4
11.7 MB
02. What Is Ransomware/07. Module Progress Checkpoint.mp4
617.9 kB
02. What Is Ransomware/08. Demo of Real World Ransomware Attack.mp4
52.0 MB
02. What Is Ransomware/09. Variations of Ransomware.mp4
6.4 MB
02. What Is Ransomware/10. Summary.mp4
2.5 MB
03. Ransomware Entry Points/01. Overview.mp4
2.7 MB
03. Ransomware Entry Points/02. The 5 Classic Infection Vectors.mp4
3.1 MB
03. Ransomware Entry Points/03. Phishing and Email Attachments.mp4
10.6 MB
03. Ransomware Entry Points/04. Embedded Hyperlinks, Websitesdownloads, and Drive-by Infections.mp4
6.2 MB
03. Ransomware Entry Points/05. Why Common Exploit Kits Are Used.mp4
5.4 MB
03. Ransomware Entry Points/06. Command and Callback (C&C) and Indicators of Compromise.mp4
7.0 MB
03. Ransomware Entry Points/07. Summary.mp4
2.8 MB
04. Incident Response Detection and Containment/01. Overview.mp4
2.6 MB
04. Incident Response Detection and Containment/02. Indicators of Compromise.mp4
5.3 MB
[磁力链接]
添加时间:
2017-04-29
大小:
405.4 MB
最近下载:
2024-11-26
热度:
2648
共15页
上一页
1
2
3
4
5
下一页