搜索
为您找到约
290
个磁力链接/BT种子,耗时 0 毫秒。
排序:
相关程度
热度
文件大小
添加时间
最近访问
[ DevCourseWeb.com ] Udemy - Cybersecurity Fundamentals For End Users
~Get Your Files Here !/5 - Protecting Your Personal Data/5 - Protecting Personal Data.mp4
140.0 MB
~Get Your Files Here !/4 - Email and Internet Security/4 - Email and Internet Security.mp4
132.0 MB
~Get Your Files Here !/3 - Physical Security for Your Computer Equipment/3 - Physical Security.mp4
125.5 MB
~Get Your Files Here !/2 - Securing Your Accounts and Passwords/2 - Securing Your Accounts and Passwords.mp4
125.3 MB
~Get Your Files Here !/6 - Updates and Keeping Current/6 - Updates and Keeping Current.mp4
79.4 MB
~Get Your Files Here !/1 - Welcome to the Course/1 - Welcome to the Course.mp4
77.7 MB
~Get Your Files Here !/5 - Protecting Your Personal Data/5 - Protecting Personal Data English.vtt
8.6 kB
~Get Your Files Here !/4 - Email and Internet Security/4 - Email and Internet Security English.vtt
8.1 kB
~Get Your Files Here !/3 - Physical Security for Your Computer Equipment/3 - Physical Security English.vtt
8.0 kB
~Get Your Files Here !/2 - Securing Your Accounts and Passwords/2 - Securing Your Accounts and Passwords English.vtt
8.0 kB
~Get Your Files Here !/1 - Welcome to the Course/1 - Welcome to the Course English.vtt
4.7 kB
~Get Your Files Here !/6 - Updates and Keeping Current/6 - Updates and Keeping Current English.vtt
4.6 kB
~Get Your Files Here !/6 - Updates and Keeping Current/7 - Congratulations.html
470 Bytes
~Get Your Files Here !/Bonus Resources.txt
386 Bytes
Get Bonus Downloads Here.url
182 Bytes
~Get Your Files Here !/4 - Email and Internet Security/4 - What should I be doing to keep my email secure.txt
96 Bytes
~Get Your Files Here !/5 - Protecting Your Personal Data/5 - Credit reporting agency Experian offers some excellent tips to avoid identity theft.txt
88 Bytes
~Get Your Files Here !/4 - Email and Internet Security/4 - Test Your Knowledge.html
53 Bytes
~Get Your Files Here !/5 - Protecting Your Personal Data/5 - Test Your Knowledge.html
50 Bytes
~Get Your Files Here !/1 - Welcome to the Course/1 - Test Your Knowledge.html
48 Bytes
[磁力链接]
添加时间:
2023-12-22
大小:
680.0 MB
最近下载:
2024-11-30
热度:
1339
Pós Graduação em Ethical Hacking e CyberSecurity
05 - Análise Forense Computacional/Conteudo de forense-026.rar
5.6 GB
01 - Introdução à Segurança Ofensiva/maquinas virtuais-027.rar
3.6 GB
13 - Introdução à Eletrônica e Hardware Hacking/EHC Introdução à Eletrônica e Hardware Hacking aula 4.7.mp4
1.7 GB
07 - Introdução à Segurança da Informação/Modulo 05 - Criptografia e Esteganografia-015.mp4
1.2 GB
13 - Introdução à Eletrônica e Hardware Hacking/EHC Introdução à Eletrônica e Hardware Hacking aula 4.3.mp4
946.0 MB
07 - Introdução à Segurança da Informação/Modulo 02 - Definicoes sobre a Seguranca da Informacao-014.mp4
895.3 MB
12 - Exploração de Software/EXPS - UN01 - 01.mp4
878.8 MB
07 - Introdução à Segurança da Informação/Modulo 03 - Criminosos e a Legislacao no mundo digital-010.mp4
736.4 MB
06 - Teste de Invasão em Redes e Sistemas/Teste de Invasão em Redes e Sistemas - Aula 3 - Metasploit Nessus Meterpreter John.mp4
710.4 MB
07 - Introdução à Segurança da Informação/Modulo 04 - Politica de Seguranca.mp4
668.0 MB
13 - Introdução à Eletrônica e Hardware Hacking/EHC Introdução à Eletrônica e Hardware Hacking aula 5.2.mp4
598.9 MB
13 - Introdução à Eletrônica e Hardware Hacking/#04 -Gadgets para Pentesters-.mp4
585.5 MB
13 - Introdução à Eletrônica e Hardware Hacking/[SecurityCast] WebCast #54 - Hardware Hacking.mp4
574.7 MB
13 - Introdução à Eletrônica e Hardware Hacking/EHC Introdução à Eletrônica e Hardware Hacking aula 4.6.mp4
553.0 MB
04 - Fundamentos de Redes de Computadores/EHC Introdução à Redes de Computadores Aula 4.3.mp4
524.2 MB
13 - Introdução à Eletrônica e Hardware Hacking/20º Hangout - Gadgets Malignos para -Hackers do Bem- - Jullio Della Flora.mp4
509.6 MB
10 - Administração de Sistemas Operacionais Linux/Administração de Sistemas Linux - Aula 6.mp4
504.4 MB
05 - Análise Forense Computacional/Análise Forense Computacional - 10 - Forense em Windows - ARTEFATOS.mp4
484.1 MB
13 - Introdução à Eletrônica e Hardware Hacking/EHC Introdução à Eletrônica e Hardware Hacking aula 1.2.mp4
478.2 MB
10 - Administração de Sistemas Operacionais Linux/Administração de Sistemas Linux - Aula 2.mp4
463.4 MB
[磁力链接]
添加时间:
2023-12-22
大小:
59.4 GB
最近下载:
2024-12-01
热度:
10804
SC-100 Microsoft Cybersecurity Architect
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/32. Another example on Application Objects.mp4
143.6 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/17. Lab - Microsoft Sentinel - Generating Incidents.mp4
127.1 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/29. Building a Docker Image.mp4
119.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/31. Deploying the container.mp4
113.6 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/15. Review of the Azure Firewall service.mp4
107.9 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/23. Microsoft Sentinel - Automation.mp4
107.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/32.1 AuthApp.zip
106.5 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/18. Example on using Azure Blueprints.mp4
95.8 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/7. Microsoft Defender for Cloud - Secure Management Ports.mp4
93.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/6. Microsoft Defender for Cloud - Servers.mp4
93.0 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/30. Example on using Application Objects.mp4
90.8 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/24. Storing Azure Cosmos DB keys.mp4
89.3 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/14. Microsoft Defender for Cloud - AWS resources.mp4
88.7 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/25. NSG Flow logs.mp4
86.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/15. Lab - Microsoft Sentinel - Data connectors.mp4
80.0 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/39. Review - Azure AD Privileged Identity Management.mp4
77.7 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/35. Example on Enterprise Applications.mp4
77.1 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/6. Azure Storage Accounts - Azure AD Authentication.mp4
75.1 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/3. Lab - Azure SQL database - Dynamic data masking.mp4
74.2 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/16. Lab - Microsoft Sentinel - Azure Activity.mp4
64.7 MB
[磁力链接]
添加时间:
2023-12-22
大小:
4.6 GB
最近下载:
2024-12-01
热度:
4561
Google Cybersecurity Professional Certificate
[TutsNode.net] - Google Cybersecurity Professional Certificate/foundations-of-
cybersecurity
/01_welcome-to-the-exciting-world-of-
cybersecurity
/01_get-started-with-the-certificate-program/01_welcome-to-the-google-
cybersecurity
-certificate.mp4
49.6 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/01_flaws-in-the-system/04_common-vulnerabilities-and-exposures.mp4
29.2 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/foundations-of-
cybersecurity
/02_the-evolution-of-
cybersecurity
/01_the-history-of-
cybersecurity
/03_attacks-in-the-digital-age.mp4
26.8 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/02_protect-organizational-assets/03_authentication-authorization-and-accounting/03_the-mechanisms-of-authorization.mp4
26.4 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/04_threats-to-asset-security/02_malware/01_malicious-software.mp4
25.7 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/manage-security-risks/04_use-playbooks-to-respond-to-incidents/01_phases-of-incident-response-playbooks/02_phases-of-an-incident-response-playbook.mp4
25.5 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/04_threats-to-asset-security/01_social-engineering/04_phishing-for-information.mp4
25.2 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/04_threats-to-asset-security/02_malware/03_the-rise-of-cryptojacking.mp4
24.8 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/foundations-of-
cybersecurity
/03_protect-against-threats-risks-and-vulnerabilities/01_frameworks-and-controls/02_introduction-to-security-frameworks-and-controls.mp4
24.5 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/foundations-of-
cybersecurity
/01_welcome-to-the-exciting-world-of-
cybersecurity
/02_introduction-to-
cybersecurity
/01_introduction-to-
cybersecurity
.mp4
24.2 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/automate-
cybersecurity
-tasks-with-python/04_python-in-practice/03_debug-python-code/01_debugging-strategies.mp4
24.2 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/02_protect-organizational-assets/02_encryption-methods/01_fundamentals-of-cryptography.mp4
23.7 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/03_cyber-attacker-mindset/01_protect-all-entry-points.mp4
23.6 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/foundations-of-
cybersecurity
/03_protect-against-threats-risks-and-vulnerabilities/02_ethics-in-
cybersecurity
/01_ethics-in-
cybersecurity
.mp4
23.6 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/03_cyber-attacker-mindset/05_pathways-through-defenses.mp4
23.5 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/foundations-of-
cybersecurity
/02_the-evolution-of-
cybersecurity
/01_the-history-of-
cybersecurity
/02_past-
cybersecurity
-attacks.mp4
23.1 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/01_flaws-in-the-system/02_vulnerability-management.mp4
23.0 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/networks-and-network-security/04_security-hardening/04_cloud-hardening/02_kelsey-cloud-security-explained.mp4
23.0 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/automate-
cybersecurity
-tasks-with-python/03_work-with-strings-and-lists/03_regular-expressions/01_regular-expressions-in-python.mp4
22.9 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/04_threats-to-asset-security/01_social-engineering/02_the-criminal-art-of-persuasion.mp4
22.7 MB
[磁力链接]
添加时间:
2023-12-22
大小:
4.3 GB
最近下载:
2024-12-02
热度:
1649
Microsoft Cybersecurity Architect SC 100 Exam Prep
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/21 - CAF Governance.mp4
293.3 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/19 - CAF Landing Zone Deployment Lab Step By StepII.mp4
286.7 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/16 - CAF Readyness Azure setup guide.mp4
231.2 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/41 - SecOps Best practices for SIEM SOAR.mp4
202.4 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/12 - MCRA IoT and IT Security II.mp4
161.1 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/78 - Pass Through Authentication PTA.mp4
160.2 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/4 - Design security for infrastructure/103 - Plan and Implement a security strategy across teams.mp4
157.6 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/17 - CAF Readyness Azure Landing Zone.mp4
154.3 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/72 - Zero trust Security strategy for Identities.mp4
152.4 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/27 - SC 100 Case Study.mp4
149.8 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/11 - MCRA People Security.mp4
141.5 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/3 - Evaluate Governance Risk Compliance GRCstrategies/93 - Encryption Support for various services.mp4
137.3 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/79 - Azure AD Roles Best Practices.mp4
136.1 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/35 - Recommendations for Designing a logging and auditing security strategy.mp4
133.8 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/4 - Design security for infrastructure/124 - Securing Domain Controllers.mp4
127.6 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/4 - Design security for infrastructure/118 - Securing Member Servers.mp4
124.1 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/40 - Azure Tools for SecOps.mp4
123.5 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/48 - Incident Management process Overview.mp4
122.3 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/82 - Develop a Roadmap Explained.mp4
119.6 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/74 - Conditional Access Personas.mp4
118.4 MB
[磁力链接]
添加时间:
2023-12-23
大小:
10.3 GB
最近下载:
2024-12-02
热度:
6579
[CourseClub.Me] O`REILLY - The Complete Cybersecurity Bootcamp, 2nd Edition
Lesson 29 Hacking Mobile Platforms/003. 29.2 Hacking iOS.mp4
86.6 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/014. 17.13 Performing SMTP and DNS Enumeration.mp4
80.0 MB
Lesson 21 Fundamentals of Wireless Hacking/004. 21.3 Exploring Wireless Threats.mp4
79.0 MB
Lesson 33 Fundamentals of IoT Security/003. 33.2 Understanding IoT Attacks.mp4
76.8 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/015. 17.14 Conducting Additional Enumeration Techniques.mp4
75.8 MB
Lesson 33 Fundamentals of IoT Security/002. 33.1 Introducing IoT Concepts.mp4
74.4 MB
Lesson 29 Hacking Mobile Platforms/002. 29.1 Understanding Mobile Platform Attack Vectors.mp4
73.4 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/011. 17.1 Performing SNMP Enumeration.mp4
71.8 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/004. 17.3 Understanding Host Discovery.mp4
69.7 MB
Lesson 5 Fundamentals of Incident Response/007. 5.6 Analyzing Computer Incident Response Teams (CSIRTs).mp4
68.5 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/007. 17.6 Scanning Beyond IDS and Firewall.mp4
68.2 MB
Lesson 27 Hacking User Credentials/006. 27.5 Cracking Passwords with John the Ripper.mp4
66.1 MB
Lesson 7 Intrusion Event Categories/009. 7.8 Understanding the MITRE ATT&CK Framework.mp4
65.8 MB
Lesson 29 Hacking Mobile Platforms/004. 29.3 Hacking Android OS.mp4
63.8 MB
Lesson 20 SQL Injection/005. 20.4 Exploring SQL Injection Tools.mp4
63.3 MB
Lesson 21 Fundamentals of Wireless Hacking/003. 21.2 Understanding Wireless Encryption.mp4
62.7 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/013. 17.12 Performing NTP and NFS Enumeration.mp4
61.8 MB
Lesson 16 Information Gathering and Passive Reconnaissance/011. 16.10 Performing Footprinting through Social Engineering.mp4
59.1 MB
Lesson 8 Digital Forensics Fundamentals/004. 8.3 Understanding Evidence Collection.mp4
57.2 MB
Lesson 21 Fundamentals of Wireless Hacking/007. 21.6 Hacking Bluetooth.mp4
52.3 MB
[磁力链接]
添加时间:
2023-12-23
大小:
6.7 GB
最近下载:
2024-11-29
热度:
1738
Pascal Ackerman - Industrial Cybersecurity - 2017
Pascal Ackerman - Industrial Cybersecurity - 2017.mobi
64.3 MB
Pascal Ackerman - Industrial Cybersecurity - 2017.pdf
26.8 MB
Pascal Ackerman - Industrial Cybersecurity - 2017.epub
26.1 MB
[磁力链接]
添加时间:
2023-12-23
大小:
117.2 MB
最近下载:
2024-12-01
热度:
2211
Cybersecurity and Cyberwar.m4b
Cybersecurity and Cyberwar.m4b
328.4 MB
[磁力链接]
添加时间:
2023-12-23
大小:
328.4 MB
最近下载:
2024-12-02
热度:
3787
podcast_leetspeak-with-alissa-knight_women-
cybersecurity
-leaders_1000414303772
podcast_leetspeak-with-alissa-knight_women-
cybersecurity
-leaders_1000414303772.mp3
32.0 MB
podcast_leetspeak-with-alissa-knight_women-
cybersecurity
-leaders_1000414303772_itemimage.png
1.9 MB
podcast_leetspeak-with-alissa-knight_women-
cybersecurity
-leaders_1000414303772_meta.sqlite
21.5 kB
podcast_leetspeak-with-alissa-knight_women-
cybersecurity
-leaders_1000414303772_meta.xml
2.0 kB
podcast_leetspeak-with-alissa-knight_women-
cybersecurity
-leaders_1000414303772_itunes.json
1.6 kB
[磁力链接]
添加时间:
2023-12-23
大小:
34.0 MB
最近下载:
2024-04-27
热度:
317
[ FreeCourseWeb.com ] The CISO Evolution - Business Knowledge for Cybersecurity Executives (True PDF, EPUB)
~Get Your Files Here !/The CISO Evolution.pdf
45.7 MB
~Get Your Files Here !/The CISO Evolution.epub
6.9 MB
~Get Your Files Here !/Bonus Resources.txt
386 Bytes
Get Bonus Downloads Here.url
183 Bytes
[磁力链接]
添加时间:
2023-12-23
大小:
52.6 MB
最近下载:
2024-12-01
热度:
646
Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/6. Azure Security Benchmark - Microsoft Certified Cybersecurity-1.mp4
113.5 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/2. Hybrid Environmental Security Strategies - Microsoft Certifi.mp4
63.8 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/1. Specify Priorities for Mitigating Threats to Apps - Microsof-1.mp4
62.3 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/6. Designing a Regulatory Compliance Strategy/4. Implementing Azure Policy - Microsoft Certified Cybersecurit.mp4
59.0 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/7. Evaluating and Managing Security Postures/6. Mitigating Identified Risks - Microsoft Certified Cybersecur-1.mp4
53.6 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/4. Traffic Filtering and Segmentation Strategies - Microsoft Ce-1.mp4
53.4 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/4. Priorities For Mitigating Threats To Data - Microsoft Certif-1.mp4
53.4 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/5. Azure Best Practices for Network Security - Microsoft Certif-1.mp4
52.2 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/5. Hybrid Infrastructure - Microsoft Certified Cybersecurity Ar-1.mp4
50.4 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/6. Designing a Regulatory Compliance Strategy/6. Translating Privacy Requirements - Microsoft Certified Cyber.mp4
49.7 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/9. Designing a Strategy for Securing SaaS, PaaS, and IaaS Services/1. Security Baselines for SaaS, PaaS, and IaaS services - Micro.mp4
48.3 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/3. Translating Business Goals into Security Requirements - Micr.mp4
47.9 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/7. Securing Privileged Access Using RaMP - Microsoft Certified -1.mp4
47.8 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/2. Security Operations - Microsoft Certified Cybersecurity Arch-1.mp4
47.0 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/4. Designing a Security Operations Strategy/5. SIEMSOAR Strategy - Microsoft Certified Cybersecurity Archit.mp4
46.3 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/2. Translating Requirements - Microsoft Certified Cybersecurity.mp4
46.2 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/3. Security Strategy for Applications and APIs - Microsoft Cert-1.mp4
44.6 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/5. Designing an Identity Security Strategy/1. Strategy for Access to Cloud Resources - Microsoft Certified.mp4
43.0 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/7. Evaluating and Managing Security Postures/4. Designing Security for an Azure Landing Zone - Microsoft Cer.mp4
42.8 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/4. Designing a Security Operations Strategy/3. Logging and Auditing Strategy - Microsoft Certified Cybersec.mp4
42.3 MB
[磁力链接]
添加时间:
2023-12-24
大小:
2.5 GB
最近下载:
2024-12-01
热度:
6219
Advanced Cybersecurity and Ethical Hacking with ChatGPT
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/15 - CTF Challenges and Capture The Flag Events/48 - Introduction to Capture The Flag CTF Challenges.mp4
50.2 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/16 - Final Projects and Practical Assessments/52 - Building a Security Automation Workflow with ChatGPT.mp4
48.9 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/17 - Professional Development and Career Insights/55 - Navigating the Job Market and Advancing Your Cybersecurity Career.mp4
44.4 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/16 - Final Projects and Practical Assessments/53 - Penetration Testing Report Compilation with ChatGPT.mp4
39.3 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/17 - Professional Development and Career Insights/54 - Resume Building and Interview Preparation for Ethical Hackers.mp4
38.3 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/2 - Foundations of Cybersecurity and Hacking/7 - Operating System Fundamentals for Hacking and Penetration Testing.mp4
37.8 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/15 - CTF Challenges and Capture The Flag Events/49 - Solving CTF Challenges Using ChatGPT.mp4
37.3 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/5 - Vulnerability Identification and Assessment/17 - Network Vulnerability Scanning and Analysis with ChatGPT.mp4
36.8 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/1 - Section 1 Introduction to Cybersecurity and Ethical Hacking/4 - Understanding the Role of Ethical Hackers and Penetration Testers.mp4
36.4 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/11 - Case Studies and RealWorld Scenarios/36 - Ethical Hacking Case Studies Using ChatGPT.mp4
36.0 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/6 - Exploitation and Penetration Testing/21 - Penetration Testing Methodologies and Reporting.mp4
35.7 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/6 - Exploitation and Penetration Testing/20 - PostExploitation Techniques and Privilege Escalation.mp4
34.6 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/14 - Ethical Hacking in Cloud Environments/46 - Securing Containers and Serverless Architectures.mp4
34.5 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/3 - Getting Started with ChatGPT/10 - Setting Up and Configuring ChatGPT for Hacking Tasks.mp4
34.3 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/10 - Emerging Trends and Future of Cybersecurity/32 - Blockchain Security and Decentralized Technologies.mp4
33.2 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/13 - Cybersecurity Regulations and Compliance/43 - Conducting Compliance Audits with ChatGPT.mp4
33.0 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/7 - Advanced Ethical Hacking Techniques/24 - Wireless Network Hacking and Countermeasures Using ChatGPT.mp4
31.7 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/5 - Vulnerability Identification and Assessment/16 - Web Application Vulnerability Assessment Using ChatGPT.mp4
30.5 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/9 - ChatGPT for Security Innovation/28 - Leveraging ChatGPT for Threat Hunting and Analysis.mp4
30.1 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/3 - Getting Started with ChatGPT/11 - Navigating the ChatGPT Interface for Cybersecurity Analysis.mp4
28.8 MB
[磁力链接]
添加时间:
2023-12-25
大小:
1.5 GB
最近下载:
2024-12-01
热度:
10260
[ TutGee.com ] Linkedin - Practical Cybersecurity for IT Professionals
~Get Your Files Here !/04 - 3. Firewalls/03 - Advanced Windows Firewall.mp4
27.1 MB
~Get Your Files Here !/05 - 4. Network Scanning/01 - Getting started with Nmap.mp4
22.0 MB
~Get Your Files Here !/02 - 1. Why Cybersecurity/07 - Emerging trends in
cybersecurity
.mp4
20.4 MB
~Get Your Files Here !/02 - 1. Why Cybersecurity/01 - A history of hackers.mp4
17.5 MB
~Get Your Files Here !/04 - 3. Firewalls/05 - Introducing Linux iptables.mp4
16.1 MB
~Get Your Files Here !/04 - 3. Firewalls/02 - Windows Firewall basics.mp4
14.5 MB
~Get Your Files Here !/09 - 8. Network Protocols/02 - Capturing packets with Wireshark.mp4
14.3 MB
~Get Your Files Here !/04 - 3. Firewalls/04 - ZedLan firewall log analyser.mp4
13.4 MB
~Get Your Files Here !/02 - 1. Why Cybersecurity/04 - Common forms of cyberattack.mp4
13.1 MB
~Get Your Files Here !/09 - 8. Network Protocols/03 - Making sense of the protocols.mp4
13.0 MB
~Get Your Files Here !/02 - 1. Why Cybersecurity/02 - The cyber kill chain.mp4
12.0 MB
~Get Your Files Here !/03 - 2. Antivirus/01 - Introducing Microsoft Defender Antivirus.mp4
11.7 MB
~Get Your Files Here !/07 - 6. Vulnerability Scanning/01 - Preparing Nessus.mp4
10.5 MB
~Get Your Files Here !/08 - 7. Web Applications/02 - Running an SQL injection attack.mp4
10.1 MB
~Get Your Files Here !/05 - 4. Network Scanning/02 - Advanced Nmap options.mp4
10.0 MB
~Get Your Files Here !/02 - 1. Why Cybersecurity/03 - Stuxnet and the kill chain.mp4
9.8 MB
~Get Your Files Here !/03 - 2. Antivirus/02 - Detecting malware with Microsoft Defender.mp4
9.5 MB
~Get Your Files Here !/04 - 3. Firewalls/06 - Setting up a simple iptables firewall.mp4
9.3 MB
~Get Your Files Here !/06 - 5. Network Connections/02 - Transferring files using netcat.mp4
9.2 MB
~Get Your Files Here !/06 - 5. Network Connections/04 - Setting up a netcat honeypot.mp4
8.9 MB
[磁力链接]
添加时间:
2023-12-26
大小:
388.0 MB
最近下载:
2024-12-01
热度:
1409
Cybersecurity Architecture Fundamentals
Chapter 1 Introduction/006. Security Principles and Approaches.mp4
272.7 MB
Chapter 1 Introduction/003. The Problem with Security Today.mp4
236.8 MB
Chapter 1 Introduction/009. Understanding Residual Risk.mp4
120.0 MB
Chapter 4 Cyber Architecture for Enterprise Security/006. Vulnerability, Patch, and Availability Management.mp4
102.8 MB
Chapter 1 Introduction/008. Risk Management.mp4
99.6 MB
Chapter 1 Introduction/005. Who Is a Security Architect.mp4
98.0 MB
Chapter 2 Threat Modelling/006. PASTA.mp4
94.3 MB
Chapter 4 Cyber Architecture for Enterprise Security/001. Network Security.mp4
80.3 MB
Chapter 6 Case Study/001. Case Study Preview.mp4
78.0 MB
Chapter 2 Threat Modelling/002. Threat Modelling Versus Risk Assessment.mp4
75.6 MB
Chapter 2 Threat Modelling/001. Threat Modelling - Part 1.mp4
70.2 MB
Chapter 2 Threat Modelling/009. Attack Trees.mp4
68.7 MB
Chapter 4 Cyber Architecture for Enterprise Security/005. Data Protection.mp4
56.7 MB
Chapter 5 Designing for Security/003. Reference Security Architectures.mp4
52.0 MB
Chapter 2 Threat Modelling/003. Threat Modelling - Part 2.mp4
50.8 MB
Chapter 3 Enterprise Architecture Frameworks/003. Zachman Framework.mp4
44.9 MB
Chapter 5 Designing for Security/002. Security Design Pattern Example.mp4
44.6 MB
Chapter 1 Introduction/004. Introduction to Security Architecture.mp4
42.6 MB
Chapter 5 Designing for Security/001. Security Design Patterns.mp4
41.8 MB
Chapter 3 Enterprise Architecture Frameworks/004. SABSA Framework.mp4
37.0 MB
[磁力链接]
添加时间:
2023-12-26
大小:
2.4 GB
最近下载:
2024-11-30
热度:
4562
[CourserHub.com] Coursera - Google Cybersecurity Professional Certificate
foundations-of-
cybersecurity
/01_welcome-to-the-exciting-world-of-
cybersecurity
/01_get-started-with-the-certificate-program/01_welcome-to-the-google-
cybersecurity
-certificate.mp4
49.6 MB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/01_flaws-in-the-system/04_common-vulnerabilities-and-exposures.mp4
29.2 MB
foundations-of-
cybersecurity
/02_the-evolution-of-
cybersecurity
/01_the-history-of-
cybersecurity
/03_attacks-in-the-digital-age.mp4
26.8 MB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/03_authentication-authorization-and-accounting/03_the-mechanisms-of-authorization.mp4
26.4 MB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/02_malware/01_malicious-software.mp4
25.7 MB
manage-security-risks/04_use-playbooks-to-respond-to-incidents/01_phases-of-incident-response-playbooks/02_phases-of-an-incident-response-playbook.mp4
25.5 MB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/01_social-engineering/04_phishing-for-information.mp4
25.2 MB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/02_malware/03_the-rise-of-cryptojacking.mp4
24.8 MB
foundations-of-
cybersecurity
/03_protect-against-threats-risks-and-vulnerabilities/01_frameworks-and-controls/02_introduction-to-security-frameworks-and-controls.mp4
24.5 MB
foundations-of-
cybersecurity
/01_welcome-to-the-exciting-world-of-
cybersecurity
/02_introduction-to-
cybersecurity
/01_introduction-to-
cybersecurity
.mp4
24.2 MB
automate-
cybersecurity
-tasks-with-python/04_python-in-practice/03_debug-python-code/01_debugging-strategies.mp4
24.2 MB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/02_encryption-methods/01_fundamentals-of-cryptography.mp4
23.7 MB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/03_cyber-attacker-mindset/01_protect-all-entry-points.mp4
23.6 MB
foundations-of-
cybersecurity
/03_protect-against-threats-risks-and-vulnerabilities/02_ethics-in-
cybersecurity
/01_ethics-in-
cybersecurity
.mp4
23.6 MB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/03_cyber-attacker-mindset/05_pathways-through-defenses.mp4
23.5 MB
foundations-of-
cybersecurity
/02_the-evolution-of-
cybersecurity
/01_the-history-of-
cybersecurity
/02_past-
cybersecurity
-attacks.mp4
23.1 MB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/01_flaws-in-the-system/02_vulnerability-management.mp4
23.0 MB
networks-and-network-security/04_security-hardening/04_cloud-hardening/02_kelsey-cloud-security-explained.mp4
23.0 MB
automate-
cybersecurity
-tasks-with-python/03_work-with-strings-and-lists/03_regular-expressions/01_regular-expressions-in-python.mp4
22.9 MB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/01_social-engineering/02_the-criminal-art-of-persuasion.mp4
22.7 MB
[磁力链接]
添加时间:
2023-12-26
大小:
4.1 GB
最近下载:
2024-12-01
热度:
7987
[ DevCourseWeb.com ] Udemy - The Cybersecurity Consultant Mindset
~Get Your Files Here !/3. Risk Management and Assessment/2. Introduction to Risk Management.mp4
222.8 MB
~Get Your Files Here !/2. Introduction to Cybersecurity Consulting/3. Understanding the Role of a Cyber Consultant.mp4
212.8 MB
~Get Your Files Here !/7. Developing Soft Skills for Your Career/2. Communication and Interpersonal Skills.mp4
211.5 MB
~Get Your Files Here !/3. Risk Management and Assessment/3. Compliance Requirements.mp4
204.7 MB
~Get Your Files Here !/2. Introduction to Cybersecurity Consulting/2. Overview of Cybersecurity.mp4
198.8 MB
~Get Your Files Here !/2. Introduction to Cybersecurity Consulting/5. Preparing for a Career in Cyber Consulting.mp4
196.6 MB
~Get Your Files Here !/3. Risk Management and Assessment/5. Security Documentation Development.mp4
178.0 MB
~Get Your Files Here !/4. Tools and Technologies/3. Vulnerability Assessment and Pentesting.mp4
177.6 MB
~Get Your Files Here !/3. Risk Management and Assessment/4. Risk Assessment and Analysis.mp4
158.0 MB
~Get Your Files Here !/4. Tools and Technologies/6. Cybersecurity Frameworks Selection.mp4
146.1 MB
~Get Your Files Here !/5. Incident Response/3. Developing an Incident Response Plan.mp4
123.8 MB
~Get Your Files Here !/4. Tools and Technologies/2. Network Scanning and Monitoring.mp4
115.2 MB
~Get Your Files Here !/2. Introduction to Cybersecurity Consulting/4. Benefits of Cyber Consulting and Cons.mp4
102.7 MB
~Get Your Files Here !/4. Tools and Technologies/5. Security Information and Event Management Systems.mp4
99.4 MB
~Get Your Files Here !/6. Cybersecurity Auditing and Frameworks/4. Cybersecurity Frameworks - Implementation.mp4
81.3 MB
~Get Your Files Here !/4. Tools and Technologies/4. Intrusion Detection and Prevention Systems.mp4
73.6 MB
~Get Your Files Here !/6. Cybersecurity Auditing and Frameworks/3. Auditing Standards and Requirements.mp4
73.1 MB
~Get Your Files Here !/6. Cybersecurity Auditing and Frameworks/2. Overview of IT Auditing.mp4
72.9 MB
~Get Your Files Here !/7. Developing Soft Skills for Your Career/5. Practical Exercises and Resources.mp4
68.0 MB
~Get Your Files Here !/5. Incident Response/2. Defining a Security Incident.mp4
67.7 MB
[磁力链接]
添加时间:
2023-12-26
大小:
3.1 GB
最近下载:
2024-12-01
热度:
1994
[FreeCoursesOnline.Me] O`REILLY - The Complete Cybersecurity Bootcamp, 2nd Edition
Lesson 29 Hacking Mobile Platforms/003. 29.2 Hacking iOS.mp4
86.6 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/014. 17.13 Performing SMTP and DNS Enumeration.mp4
80.0 MB
Lesson 21 Fundamentals of Wireless Hacking/004. 21.3 Exploring Wireless Threats.mp4
79.0 MB
Lesson 33 Fundamentals of IoT Security/003. 33.2 Understanding IoT Attacks.mp4
76.8 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/015. 17.14 Conducting Additional Enumeration Techniques.mp4
75.8 MB
Lesson 33 Fundamentals of IoT Security/002. 33.1 Introducing IoT Concepts.mp4
74.4 MB
Lesson 29 Hacking Mobile Platforms/002. 29.1 Understanding Mobile Platform Attack Vectors.mp4
73.4 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/011. 17.1 Performing SNMP Enumeration.mp4
71.8 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/004. 17.3 Understanding Host Discovery.mp4
69.7 MB
Lesson 5 Fundamentals of Incident Response/007. 5.6 Analyzing Computer Incident Response Teams (CSIRTs).mp4
68.5 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/007. 17.6 Scanning Beyond IDS and Firewall.mp4
68.2 MB
Lesson 27 Hacking User Credentials/006. 27.5 Cracking Passwords with John the Ripper.mp4
66.1 MB
Lesson 7 Intrusion Event Categories/009. 7.8 Understanding the MITRE ATT&CK Framework.mp4
65.8 MB
Lesson 29 Hacking Mobile Platforms/004. 29.3 Hacking Android OS.mp4
63.8 MB
Lesson 20 SQL Injection/005. 20.4 Exploring SQL Injection Tools.mp4
63.3 MB
Lesson 21 Fundamentals of Wireless Hacking/003. 21.2 Understanding Wireless Encryption.mp4
62.7 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/013. 17.12 Performing NTP and NFS Enumeration.mp4
61.8 MB
Lesson 16 Information Gathering and Passive Reconnaissance/011. 16.10 Performing Footprinting through Social Engineering.mp4
59.1 MB
Lesson 8 Digital Forensics Fundamentals/004. 8.3 Understanding Evidence Collection.mp4
57.2 MB
Lesson 21 Fundamentals of Wireless Hacking/007. 21.6 Hacking Bluetooth.mp4
52.3 MB
[磁力链接]
添加时间:
2023-12-27
大小:
6.7 GB
最近下载:
2024-12-01
热度:
8282
[ DevCourseWeb.com ] CyberSecurity in a DevOps Environment
~Get Your Files Here !/978-3-031-42212-6.pdf
21.5 MB
~Get Your Files Here !/978-3-031-42212-6.epub
20.2 MB
~Get Your Files Here !/Bonus Resources.txt
386 Bytes
Get Bonus Downloads Here.url
182 Bytes
[磁力链接]
添加时间:
2023-12-27
大小:
41.6 MB
最近下载:
2024-12-02
热度:
1097
[ DevCourseWeb.com ] Cfe 101 - Cybersecurity For Everyone
~Get Your Files Here !/3 - Password Email Security/6 - Password Security.mp4
149.2 MB
~Get Your Files Here !/5 - Mobile Device Remote Working Security/12 - Keeping Your Mobile Safe.mp4
132.7 MB
~Get Your Files Here !/1 - Introduction Threats to Information Security/3 - Everyday Information Security Threats.mp4
112.7 MB
~Get Your Files Here !/7 - Network Security/17 - Keep Your Network Safe.mp4
92.3 MB
~Get Your Files Here !/1 - Introduction Threats to Information Security/1 - Cybersecurity for Everyone.mp4
90.0 MB
~Get Your Files Here !/9 - Incident Response/19 - Incident Response.mp4
86.4 MB
~Get Your Files Here !/5 - Mobile Device Remote Working Security/13 - Keeping Your Work Safe While Working Remotely.mp4
78.6 MB
~Get Your Files Here !/6 - Physical Security/16 - When Safety Fails in the Real World.mp4
77.3 MB
~Get Your Files Here !/3 - Password Email Security/7 - Securing Your Email Communications.mp4
74.6 MB
~Get Your Files Here !/2 - Malware Security Policies/4 - Understanding Malware.mp4
70.1 MB
~Get Your Files Here !/8 - Generative AI/18 - Generative AI.mp4
70.1 MB
~Get Your Files Here !/4 - Social Engineering Phishing/11 - Spotting Dodging Phishing Scams.mp4
64.9 MB
~Get Your Files Here !/2 - Malware Security Policies/5 - Why Security Policies Procedures Matter.mp4
62.2 MB
~Get Your Files Here !/6 - Physical Security/15 - Staying Safe in the Real World.mp4
59.6 MB
~Get Your Files Here !/4 - Social Engineering Phishing/10 - Understanding Combatting Phishing Attacks.mp4
55.8 MB
~Get Your Files Here !/4 - Social Engineering Phishing/8 - Guarding Against Social Engineering.mp4
53.9 MB
~Get Your Files Here !/4 - Social Engineering Phishing/9 - Staying Ahead of Social Engineering Scams.mp4
40.6 MB
~Get Your Files Here !/10 - Conclusion/20 - Course Recap Next Steps.mp4
30.6 MB
~Get Your Files Here !/5 - Mobile Device Remote Working Security/14 - Attacks on Remote Workers.mp4
29.5 MB
~Get Your Files Here !/1 - Introduction Threats to Information Security/2 - Making the Most of This Course.mp4
21.3 MB
[磁力链接]
添加时间:
2023-12-29
大小:
1.5 GB
最近下载:
2024-11-29
热度:
1711
Humble Bundle - Cybersecurity (2023) by Packt
supplement/practical_hardware_pentesting_supplement.zip
98.3 MB
cybersecurity
_attack_and_defense_strategies.pdf
84.2 MB
network_protocols_for_security_professionals.pdf
66.6 MB
ultimate_kali_linux_book.pdf
53.0 MB
mastering_kali_linux_for_advanced_penetration_testing.pdf
48.7 MB
mastering_malware_analysis.pdf
41.1 MB
practical_threat_intelligence_and_data-driven_threat_hunting.pdf
34.0 MB
mastering_defensive_security.pdf
31.9 MB
mastering_windows_security_and_hardening.pdf
28.8 MB
learn_wireshark.pdf
24.4 MB
purple_team_strategies.pdf
20.6 MB
vulnerability_researcher_s_handbook.pdf
18.2 MB
cybersecurity
_career_masterplan.pdf
17.8 MB
privilege_escalation_techniques.pdf
15.7 MB
malware_analysis_techniques.pdf
15.4 MB
certified_ethical_hacker_ceh_v12312-50_exam_guide.pdf
15.1 MB
mastering_palo_alto_networks.pdf
13.6 MB
comptia_security_plus_sy0-601_certification_guide.pdf
9.8 MB
practical_hardware_pentesting.pdf
8.4 MB
supplement/malware_analysis_techniques_supplement.zip
5.8 MB
[磁力链接]
添加时间:
2023-12-29
大小:
673.5 MB
最近下载:
2024-12-01
热度:
2463
共15页
上一页
6
7
8
9
10
11
12
13
14
下一页