搜索
为您找到约
277
个磁力链接/BT种子,耗时 0 毫秒。
排序:
相关程度
热度
文件大小
添加时间
最近访问
Implementing the NIST Cybersecurity Framework
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/2. Using the NIST Cybersecurity Framework/5. Finding the Controls.mp4
307.2 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/6. Five Functions.mp4
231.8 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/7. Controls and Outcomes.mp4
205.8 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/5. Framework Components.mp4
197.5 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/3. Value Proposition.mp4
181.0 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/1. Welcome.mp4
161.5 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/5. Generate Questionnaire.mp4
153.5 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/2. Using the NIST Cybersecurity Framework/1. Using the Core.mp4
149.0 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/2. Intel (Microchip Manufacturing).mp4
143.5 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/5. Implementing Phase Two of the CR-MAP/4. Business Value Analysis.mp4
139.8 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/4. DOE (Energy Industry).mp4
139.0 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/7. Conduct Interviews.mp4
136.2 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/7. Conclusion/1. BONUS - Conclusion.mp4
126.4 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/3. Cimpress (Promotional Products).mp4
123.9 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/6. Saudi Aramco (Oil Industry).mp4
118.9 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/4. Intended Audience.mp4
112.2 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/5. Western Australia (Local Government).mp4
112.1 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/6. Choose Target Scores.mp4
100.5 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/6. Implementing Phase Three of the CR-MAP/3. Quarterly Reviews.mp4
99.8 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/1. Phase One.mp4
93.8 MB
[磁力链接]
添加时间:
2024-01-10
大小:
4.3 GB
最近下载:
2025-03-11
热度:
790
[ FreeCourseWeb.com ] ISO 27001 - 2022-Compliant Cybersecurity - The Annex A Controls
~Get Your Files Here !/13 - 12. Threat and Vulnerability Management and Secure Configuration/02 - Secure configuration (Controls 8.9, 8.19, and 8.24).mp4
14.2 MB
~Get Your Files Here !/07 - 6. Information Security Event Management/01 - Information security incident management (Controls 5.24–5.28, and 6.8).mp4
13.3 MB
~Get Your Files Here !/05 - 4. Identity and Access Management/01 - Access management (Controls 5.15–5.18).mp4
12.9 MB
~Get Your Files Here !/04 - 3. Information Protection/02 - Deletion, masking, DLP, and test data (Controls 8.10–8.12, and 8.33).mp4
12.7 MB
~Get Your Files Here !/08 - 7. Continuity/01 - Continuity (Controls 5.29, 5.30, and 8.13).mp4
12.4 MB
~Get Your Files Here !/14 - 13. Application Security/01 - Secure development (Controls 8.25–8.28).mp4
12.4 MB
~Get Your Files Here !/10 - 9. Human Resource Security/02 - During employment (Controls 6.3–6.6).mp4
12.3 MB
~Get Your Files Here !/12 - 11. System and Network Security/01 - Network security management (Controls 8.20–8.23).mp4
12.1 MB
~Get Your Files Here !/12 - 11. System and Network Security/02 - Protection of information systems (Controls 8.7, 8.18, 8.30, and 8.34).mp4
11.8 MB
~Get Your Files Here !/14 - 13. Application Security/02 - Testing, separate environments, and change management (Controls 8.29, 8.31, and 8.32).mp4
11.7 MB
~Get Your Files Here !/05 - 4. Identity and Access Management/02 - System and application access control (Controls 8.2–8.5).mp4
11.6 MB
~Get Your Files Here !/02 - 1. Governance/03 - Contacts and project management (Controls 5.5, 5.6, and 5.8).mp4
11.0 MB
~Get Your Files Here !/03 - 2. Asset Management/01 - Responsibility for information assets (Controls 5.9, 5.10, 6.7, and 8.1).mp4
10.8 MB
~Get Your Files Here !/04 - 3. Information Protection/01 - Classification, labeling, and privacy (Controls 5.12, 5.13, and 5.34).mp4
10.8 MB
~Get Your Files Here !/02 - 1. Governance/02 - Roles, responsibilities, and duties (Controls 5.2–5.4).mp4
10.4 MB
~Get Your Files Here !/02 - 1. Governance/01 - Policies for information security (Control 5.1).mp4
10.1 MB
~Get Your Files Here !/07 - 6. Information Security Event Management/02 - Logging and monitoring (Controls 8.15–8.17).mp4
9.9 MB
~Get Your Files Here !/06 - 5. Supplier Relationships Security/01 - Supplier relationships security (Controls 5.19–5.21).mp4
9.6 MB
~Get Your Files Here !/06 - 5. Supplier Relationships Security/02 - Managing supplier service delivery and cloud services security (Controls 5.22 and 5.23).mp4
9.6 MB
~Get Your Files Here !/13 - 12. Threat and Vulnerability Management and Secure Configuration/01 - Threat and vulnerability management (Controls 5.7 and 8.8).mp4
9.5 MB
[磁力链接]
添加时间:
2024-01-12
大小:
310.4 MB
最近下载:
2025-03-14
热度:
9551
[FreeCoursesOnline.Me] Coursera - Python for Cybersecurity Specialization
5. Python for Active Defense.zip
268.9 MB
2. Execution, Persistence, Privilege escalation and Evasion.zip
251.2 MB
3. Credential Access, Discovery, Lateral Movement & Collection.zip
225.7 MB
4. Python for Command-and-Control, Exfiltration and Impact.zip
203.8 MB
1. Introduction to Python for Cybersecurity.zip
185.2 MB
0. Websites you may like/1. OneHack.us Premium Cracked Accounts-Tutorials-Guides-Articles Community Based Forum.url
377 Bytes
FreeCoursesOnline.me Download Udacity, Masterclass, Lynda, PHLearn, etc Free.url
290 Bytes
Content Info.txt
284 Bytes
0. Websites you may like/2. FTUApps.com Download Cracked Developers Applications For Free.url
239 Bytes
[磁力链接]
添加时间:
2024-01-14
大小:
1.1 GB
最近下载:
2025-03-13
热度:
528
[ FreeCourseWeb.com ] EC-Council - Introduction to Cybersecurity
~Get Your Files Here !/38 - Know Your Options for Data Encryption.mp4
63.3 MB
~Get Your Files Here !/35 - Looking at an Application Designed to Help Secure Your Phone.mp4
39.8 MB
~Get Your Files Here !/9 - Using a Password Manager.mp4
39.7 MB
~Get Your Files Here !/40 - Checking if Your Cloud Server is Leaking Data.mp4
39.5 MB
~Get Your Files Here !/23 - Understanding How Computers Can Become Infected.mp4
38.9 MB
~Get Your Files Here !/26 - Being Careful of What You Post.mp4
36.8 MB
~Get Your Files Here !/19 - Looking at Fake Error Messages (Scareware).mp4
35.8 MB
~Get Your Files Here !/14 - USB Safety with Examples.mp4
34.9 MB
~Get Your Files Here !/20 - Exploring Useful Browser Plugins.mp4
34.2 MB
~Get Your Files Here !/41 - Getting to Know Everything about VPN.mp4
34.0 MB
~Get Your Files Here !/8 - Exploring What Makes a Good Password.mp4
34.0 MB
~Get Your Files Here !/25 - What to Do If You Are Infected with Cryptoware.mp4
34.0 MB
~Get Your Files Here !/42 - Changing Your DNS Connection to Avoid ISP Snooping.mp4
33.5 MB
~Get Your Files Here !/32 - Understanding Best Practices for Unusual E-mails.mp4
31.1 MB
~Get Your Files Here !/31 - Learning How to Identify and Find Phishing E-mails.mp4
30.9 MB
~Get Your Files Here !/44 - Learning How to Use TorGhost.mp4
30.3 MB
~Get Your Files Here !/18 - Downloading Precautions and Hash Checking.mp4
30.3 MB
~Get Your Files Here !/24 - Learning Best Practices for Antivirus Software and Malware Scanners.mp4
27.8 MB
~Get Your Files Here !/37 - Additional Settings.mp4
27.6 MB
~Get Your Files Here !/47 - Understanding Backup Methods.mp4
26.3 MB
[磁力链接]
添加时间:
2024-01-16
大小:
1.2 GB
最近下载:
2025-03-12
热度:
1459
Pós Graduação em Ethical Hacking e CyberSecurity - Julio Della Flora
05 - Análise Forense Computacional/Conteudo de forense-026.rar
5.6 GB
01 - Introdução à Segurança Ofensiva/maquinas virtuais-027.rar
3.6 GB
13 - Introdução à Eletrônica e Hardware Hacking/EHC Introdução à Eletrônica e Hardware Hacking aula 4.7.mp4
1.7 GB
07 - Introdução à Segurança da Informação/Modulo 05 - Criptografia e Esteganografia-015.mp4
1.2 GB
13 - Introdução à Eletrônica e Hardware Hacking/EHC Introdução à Eletrônica e Hardware Hacking aula 4.3.mp4
946.0 MB
12 - Exploração de Software/EXPS - UN01 - 01.mp4
878.8 MB
06 - Teste de Invasão em Redes e Sistemas/Teste de Invasão em Redes e Sistemas - Aula 3 - Metasploit Nessus Meterpreter John.mp4
710.4 MB
13 - Introdução à Eletrônica e Hardware Hacking/EHC Introdução à Eletrônica e Hardware Hacking aula 5.2.mp4
598.9 MB
13 - Introdução à Eletrônica e Hardware Hacking/#04 -Gadgets para Pentesters-.mp4
585.5 MB
13 - Introdução à Eletrônica e Hardware Hacking/[SecurityCast] WebCast #54 - Hardware Hacking.mp4
574.7 MB
13 - Introdução à Eletrônica e Hardware Hacking/EHC Introdução à Eletrônica e Hardware Hacking aula 4.6.mp4
553.0 MB
04 - Fundamentos de Redes de Computadores/EHC Introdução à Redes de Computadores Aula 4.3.mp4
524.2 MB
13 - Introdução à Eletrônica e Hardware Hacking/20º Hangout - Gadgets Malignos para -Hackers do Bem- - Jullio Della Flora.mp4
509.6 MB
10 - Administração de Sistemas Operacionais Linux/Administração de Sistemas Linux - Aula 6.mp4
504.4 MB
05 - Análise Forense Computacional/Análise Forense Computacional - 10 - Forense em Windows - ARTEFATOS.mp4
484.1 MB
13 - Introdução à Eletrônica e Hardware Hacking/EHC Introdução à Eletrônica e Hardware Hacking aula 1.2.mp4
478.2 MB
10 - Administração de Sistemas Operacionais Linux/Administração de Sistemas Linux - Aula 2.mp4
463.4 MB
05 - Análise Forense Computacional/Análise Forense Computacional - aula 9.mp4
463.0 MB
10 - Administração de Sistemas Operacionais Linux/Administração de Sistemas Linux - Aula 3.mp4
435.1 MB
13 - Introdução à Eletrônica e Hardware Hacking/Fault Injection Attacks com Enfase em Ultrassom Julio Della Flora H2HC University 2018 1080p 30f_2.mp4
427.8 MB
[磁力链接]
添加时间:
2024-01-27
大小:
57.7 GB
最近下载:
2025-03-13
热度:
162
[ DevCourseWeb.com ] Udemy - Industrial Cybersecurity Controls As per IEC62443
~Get Your Files Here !/2. Authentication & Authorization Technologies/3. Password Authentication.mp4
269.6 MB
~Get Your Files Here !/1. IEC 62443 Basic Introduction/1. Introduction About IEC.mp4
214.6 MB
~Get Your Files Here !/2. Authentication & Authorization Technologies/2. Role Based Access Control.mp4
200.8 MB
~Get Your Files Here !/2. Authentication & Authorization Technologies/4. Challengeresponse Authentication.mp4
199.5 MB
~Get Your Files Here !/2. Authentication & Authorization Technologies/5. Physical Token Authentication.mp4
182.0 MB
~Get Your Files Here !/2. Authentication & Authorization Technologies/6. Smart Card Authentication.mp4
181.6 MB
~Get Your Files Here !/2. Authentication & Authorization Technologies/7. Biometric Authentication.mp4
178.0 MB
~Get Your Files Here !/2. Authentication & Authorization Technologies/9. Password Distribution & Management.mp4
131.1 MB
~Get Your Files Here !/2. Authentication & Authorization Technologies/8. Location Based Authentication.mp4
101.2 MB
~Get Your Files Here !/2. Authentication & Authorization Technologies/1. Authentication & Authorization Briefing.mp4
99.7 MB
~Get Your Files Here !/2. Authentication & Authorization Technologies/10. Device to Device Authentication.mp4
57.7 MB
~Get Your Files Here !/2. Authentication & Authorization Technologies/3. Password Authentication.srt
22.9 kB
~Get Your Files Here !/2. Authentication & Authorization Technologies/9. Password Distribution & Management.srt
22.1 kB
~Get Your Files Here !/2. Authentication & Authorization Technologies/6. Smart Card Authentication.srt
17.2 kB
~Get Your Files Here !/2. Authentication & Authorization Technologies/7. Biometric Authentication.srt
14.9 kB
~Get Your Files Here !/2. Authentication & Authorization Technologies/4. Challengeresponse Authentication.srt
13.8 kB
~Get Your Files Here !/1. IEC 62443 Basic Introduction/1. Introduction About IEC.srt
13.5 kB
~Get Your Files Here !/2. Authentication & Authorization Technologies/8. Location Based Authentication.srt
13.1 kB
~Get Your Files Here !/2. Authentication & Authorization Technologies/2. Role Based Access Control.srt
13.0 kB
~Get Your Files Here !/2. Authentication & Authorization Technologies/5. Physical Token Authentication.srt
11.9 kB
[磁力链接]
添加时间:
2024-01-31
大小:
1.8 GB
最近下载:
2025-03-12
热度:
1226
[ DevCourseWeb.com ] Udemy - Intro To Cybersecurity In Healthcare (2 Of 2),Plain and Simple
~Get Your Files Here !/3 - Ransomware and Cryptocurrency.mp4
309.9 MB
~Get Your Files Here !/7 - Testing Your Vulnerabilities.mp4
150.2 MB
~Get Your Files Here !/2 - Malware.mp4
136.5 MB
~Get Your Files Here !/5 - Boston Childrens Hack The Response.mp4
123.0 MB
~Get Your Files Here !/8 - HIPAA.mp4
70.3 MB
~Get Your Files Here !/4 - Boston Childrens Hack The Issue.mp4
52.4 MB
~Get Your Files Here !/6 - Boston Childrens Hack Lessons Learned.mp4
50.7 MB
~Get Your Files Here !/1 - Introduction.mp4
49.6 MB
~Get Your Files Here !/9 - Conclusions.mp4
10.9 MB
~Get Your Files Here !/3 - Ransomware and Cryptocurrency English.vtt
24.5 kB
~Get Your Files Here !/7 - Testing Your Vulnerabilities English.vtt
12.5 kB
~Get Your Files Here !/13 - IN THE NEWS Some Straight Talk on Ransomware in Health Care.html
11.3 kB
~Get Your Files Here !/2 - Malware English.vtt
10.7 kB
~Get Your Files Here !/5 - Boston Childrens Hack The Response English.vtt
10.1 kB
~Get Your Files Here !/8 - HIPAA English.vtt
5.9 kB
~Get Your Files Here !/12 - IN THE NEWS.html
5.8 kB
~Get Your Files Here !/6 - Boston Childrens Hack Lessons Learned English.vtt
4.6 kB
~Get Your Files Here !/1 - Introduction English.vtt
4.5 kB
~Get Your Files Here !/4 - Boston Childrens Hack The Issue English.vtt
4.3 kB
~Get Your Files Here !/10 - IN THE NEWS Cyberattacks hit midsize hospitals hardest.html
4.2 kB
[磁力链接]
添加时间:
2024-02-03
大小:
953.6 MB
最近下载:
2025-03-10
热度:
1058
[ CourseBoat.com ] Cybersecurity in the Age of Smart Societies
~Get Your Files Here !/978-3-031-20160-8.epub
51.2 MB
~Get Your Files Here !/978-3-031-20160-8.pdf
9.4 MB
~Get Your Files Here !/Bonus Resources.txt
386 Bytes
Get Bonus Downloads Here.url
180 Bytes
[磁力链接]
添加时间:
2024-02-04
大小:
60.6 MB
最近下载:
2025-02-19
热度:
448
[ FreeCourseWeb.com ] Linkedin - Cybersecurity Careers - Become a Security Engineer
~Get Your Files Here !/05 - Conclusion/01 - The fun doesn't end.mp4
8.3 MB
~Get Your Files Here !/03 - 2. How to Become a Security Engineer/03 - Certification options.mp4
8.3 MB
~Get Your Files Here !/04 - 3. Day in the Life/01 - Day in the life of a cloud security engineer.mp4
7.7 MB
~Get Your Files Here !/02 - 1. Security Engineering Career Basics/03 - Why pursue a career in
cybersecurity
.mp4
7.4 MB
~Get Your Files Here !/02 - 1. Security Engineering Career Basics/02 - What's the difference.mp4
7.4 MB
~Get Your Files Here !/02 - 1. Security Engineering Career Basics/01 - What is a security engineer.mp4
7.4 MB
~Get Your Files Here !/03 - 2. How to Become a Security Engineer/04 - Benefits of networking.mp4
7.1 MB
~Get Your Files Here !/04 - 3. Day in the Life/02 - Common challenges.mp4
5.8 MB
~Get Your Files Here !/03 - 2. How to Become a Security Engineer/02 - Develop your skill set.mp4
5.3 MB
~Get Your Files Here !/04 - 3. Day in the Life/03 - Solving problems.mp4
5.2 MB
~Get Your Files Here !/03 - 2. How to Become a Security Engineer/05 - Interviewing for a security engineering position.mp4
5.0 MB
~Get Your Files Here !/03 - 2. How to Become a Security Engineer/01 - Do your research.mp4
4.8 MB
~Get Your Files Here !/01 - 0. Introduction/01 - Becoming a security engineer.mp4
3.7 MB
~Get Your Files Here !/03 - 2. How to Become a Security Engineer/03 - Certification options.srt
8.1 kB
~Get Your Files Here !/03 - 2. How to Become a Security Engineer/04 - Benefits of networking.srt
7.7 kB
~Get Your Files Here !/03 - 2. How to Become a Security Engineer/05 - Interviewing for a security engineering position.srt
6.5 kB
~Get Your Files Here !/02 - 1. Security Engineering Career Basics/02 - What's the difference.srt
6.3 kB
~Get Your Files Here !/04 - 3. Day in the Life/02 - Common challenges.srt
5.7 kB
~Get Your Files Here !/04 - 3. Day in the Life/03 - Solving problems.srt
5.3 kB
~Get Your Files Here !/02 - 1. Security Engineering Career Basics/01 - What is a security engineer.srt
5.3 kB
[磁力链接]
添加时间:
2024-02-04
大小:
83.4 MB
最近下载:
2025-03-06
热度:
289
[ DevCourseWeb.com ] Udemy - Cybersecurity Essentials - Stay Safe and Secure Online
~Get Your Files Here !/6. Device Security/1. Introduction to Device Security.mp4
79.4 MB
~Get Your Files Here !/2. Password Security/2. What Makes a Good Password.mp4
70.5 MB
~Get Your Files Here !/6. Device Security/3. Mobile Security Best Practices.mp4
69.8 MB
~Get Your Files Here !/4. Phishing/1. Introduction to Phishing.mp4
63.3 MB
~Get Your Files Here !/5. Staying Safe on the Web/3. Identifying Suspicious Downloads.mp4
59.6 MB
~Get Your Files Here !/6. Device Security/2. Choosing and Using an Antivirus.mp4
58.4 MB
~Get Your Files Here !/2. Password Security/1. Introduction to Passwords.mp4
57.7 MB
~Get Your Files Here !/5. Staying Safe on the Web/2. Inspecting URLs.mp4
57.6 MB
~Get Your Files Here !/2. Password Security/5. Using a Password Manager.mp4
56.2 MB
~Get Your Files Here !/7. Virtual Private Networks/4. Choosing a VPN Solution.mp4
55.5 MB
~Get Your Files Here !/4. Phishing/4. Phishing Without Email.mp4
54.3 MB
~Get Your Files Here !/4. Phishing/2. The Psychology of Phishing.mp4
52.3 MB
~Get Your Files Here !/5. Staying Safe on the Web/4. Managing Trackers and Cookies.mp4
48.2 MB
~Get Your Files Here !/3. Multi-Factor Authentication (MFA)/3. Choosing a Strong Authentication Factor.mp4
45.8 MB
~Get Your Files Here !/7. Virtual Private Networks/2. Why Use a VPN.mp4
45.5 MB
~Get Your Files Here !/3. Multi-Factor Authentication (MFA)/5. Identifying MFA Phishing Attacks.mp4
41.4 MB
~Get Your Files Here !/7. Virtual Private Networks/3. How VPNs Work.mp4
38.0 MB
~Get Your Files Here !/4. Phishing/3. Examining a Phishing Email.mp4
35.7 MB
~Get Your Files Here !/2. Password Security/4. Checking for Compromised Accounts.mp4
33.5 MB
~Get Your Files Here !/4. Phishing/5. Phishing Using the Cloud.mp4
31.6 MB
[磁力链接]
添加时间:
2024-02-04
大小:
1.2 GB
最近下载:
2025-03-13
热度:
2265
[ CoursePig.com ] Linkedin - Microsoft Cybersecurity Architect Expert (SC-100) Cert Prep - 4 Design Strategy for Data and Applications
~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/02 - Design a strategy to identify and protect sensitive data.mp4
27.6 MB
~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/03 - Specify a security strategy for applications and APIs.mp4
24.9 MB
~Get Your Files Here !/01 - Introduction/01 - Prepping for the SC-100 exam.mp4
22.5 MB
~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/02 - Specify a security standard for onboarding a new application.mp4
18.4 MB
~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/03 - Specify an encryption standard for data at rest and in motion.mp4
16.3 MB
~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/01 - Specify priorities for mitigating threats to applications.mp4
14.2 MB
~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/01 - Specify priorities for mitigating threats to data.mp4
13.9 MB
~Get Your Files Here !/01 - Introduction/02 - What you should know.mp4
6.8 MB
~Get Your Files Here !/04 - Conclusion/01 - Next steps.mp4
5.0 MB
~Get Your Files Here !/01 - Introduction/03 - Lab setup.mp4
3.4 MB
~Get Your Files Here !/Ex_Files_MSFT_Cybersecurity_Arch_Expert_SC_100_Cert_Prep_4/Exercise Files/Sign up for a free trial.pdf
338.4 kB
~Get Your Files Here !/Ex_Files_MSFT_Cybersecurity_Arch_Expert_SC_100_Cert_Prep_4/Exercise Files/SC-100 Exam Study Guide Course 4.pdf
47.8 kB
~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/02 - Design a strategy to identify and protect sensitive data.srt
18.1 kB
~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/03 - Specify a security strategy for applications and APIs.srt
15.6 kB
~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/02 - Specify a security standard for onboarding a new application.srt
9.7 kB
~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/03 - Specify an encryption standard for data at rest and in motion.srt
9.2 kB
~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/01 - Specify priorities for mitigating threats to data.srt
9.0 kB
~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/01 - Specify priorities for mitigating threats to applications.srt
7.7 kB
~Get Your Files Here !/01 - Introduction/02 - What you should know.srt
3.4 kB
~Get Your Files Here !/04 - Conclusion/01 - Next steps.srt
2.6 kB
[磁力链接]
添加时间:
2024-02-06
大小:
153.6 MB
最近下载:
2025-03-13
热度:
1207
The Personal Cybersecurity Manual A.m4b
The Personal Cybersecurity Manual A.m4b
125.7 MB
[磁力链接]
添加时间:
2024-02-13
大小:
125.7 MB
最近下载:
2025-03-13
热度:
3911
Udemy Cybersecurity Collection
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/3. Cross-Site-Scripting/1. Cross-Site-Scripting - Lecture.mp4
748.2 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/8. Cross Site Request Forgery/1. CSRF - Techniques.mp4
695.8 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/2. All Interesting Tools/1. Tools I Use.mp4
632.4 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/1. Introduction/3. Recon with.mp4
608.7 MB
Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/18. Reconnaissance/8. Active Recon - Port Scanning.mp4
436.1 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/7. Open Redirect Vulnerability/1. Open Redirect Vulnerability with @hemanth1261.mp4
435.9 MB
Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/19. Exploitation/11. SQL Injection _ SQLMap.mp4
417.9 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/1. Introduction/5. Another Recon Video.mp4
398.8 MB
Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/2. Walkthrough - Legacy.mp4
348.0 MB
Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/16. Assembly Course/5. Arithmetic.mp4
331.0 MB
Udemy - The Complete Ethical Hacking Course, by Gerri Banfield _ Erman Kirkpatrick/05 How to create a bootable USB of Kali Linux ( optional )/025 How to create a bootable USB of Kali with persistent storage _ 4 GB part 4.mp4
328.9 MB
Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/6. Walkthrough - Jerry.mp4
320.2 MB
Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/25. Job Hunting/6. Analyzing the Job Post.mp4
312.1 MB
Udemy - The Complete Ethical Hacking Course, by Gerri Banfield _ Erman Kirkpatrick/04 Set up instructions for Mac users ONLY/021 Kali Linux Live USB on a MacBook Pro part 3 ( OPTIONAL ).mp4
302.6 MB
Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/7. Walkthrough - Nibbles.mp4
299.2 MB
Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/4. Walkthrough - Blue.mp4
298.0 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/6. Server Side Request Forgery/2. SSRF - Advanced Techniques.mp4
294.3 MB
Udemy - Practical Ethical Hacking, by Heath Adams/13. Mid-Course Capstone/3. Walkthrough - Lame.mp4
293.6 MB
Udemy - RedTeam Blueprint - A Unique Guide To Ethical Hacking, by Brennan Dennis/20. Post Exploitation/1. Stabilizing Shells.mp4
285.1 MB
Udemy - Practical Bug Hunting - A Practical Guide, by Hema Kumar/6. Server Side Request Forgery/1. SSRF - Basic Techniques.mp4
282.4 MB
[磁力链接]
添加时间:
2024-02-17
大小:
115.9 GB
最近下载:
2025-03-14
热度:
5251
[ TutPig.com ] Udemy - Cybersecurity for Artificial Intelligence (A.I).zip
[ TutPig.com ] Udemy - Cybersecurity for Artificial Intelligence (A.I).zip
280.8 MB
[磁力链接]
添加时间:
2024-02-20
大小:
280.8 MB
最近下载:
2025-03-01
热度:
281
[GigaCourse.Com] ZeroToMastery - Complete Cybersecurity Bootcamp
8-Network Security/052-Network Security With Nmap.mp4
169.9 MB
5-Security Bugs & Vulnerabilities/020-Buffer Overflow Demonstration.mp4
136.7 MB
12-Appendix - Ethical Hacking/087-Msfconsole Basic Commands.mp4
97.5 MB
8-Network Security/059-Wireless Attack Demonstration.mp4
93.4 MB
7-End-Point Protection/034-Password Security and Password Managers.mp4
84.2 MB
12-Appendix - Ethical Hacking/093-Meterpreter Basic Commands Part 1.mp4
78.5 MB
7-End-Point Protection/038-Process Explorer.mp4
75.8 MB
1-Introduction/001-Cybersecurity Bootcamp - Zero to Mastery.mp4
72.4 MB
8-Network Security/057-Secure Network Architecture.mp4
66.8 MB
12-Appendix - Ethical Hacking/094-Meterpreter Basic Commands Part 2.mp4
65.7 MB
7-End-Point Protection/033-Bitdefender, Kaspersky, McAfee, Malwarebytes.mp4
63.9 MB
4-Understanding Hackers - The Biggest Threat/012-Most Common Attacks Demonstration.mp4
63.5 MB
8-Network Security/060-Network Monitoring With TCPDump.mp4
62.7 MB
8-Network Security/058-Wireless Security.mp4
59.6 MB
5-Security Bugs & Vulnerabilities/017-Unpatched Machine Exploitation Demonstration.mp4
59.1 MB
12-Appendix - Ethical Hacking/080-Whatweb Stealthy Scan.mp4
58.1 MB
12-Appendix - Ethical Hacking/091-Advance Msfvenom Usage.mp4
51.4 MB
7-End-Point Protection/043-Iptables.mp4
50.9 MB
7-End-Point Protection/028-Brave Browser Security and Privacy.mp4
50.6 MB
12-Appendix - Ethical Hacking/089-Software Vulnerability - Samba Exploitation.mp4
49.5 MB
[磁力链接]
添加时间:
2024-02-21
大小:
3.6 GB
最近下载:
2025-03-13
热度:
1136
Palo Alto Networks Cybersecurity Fundamentals (PCCSA)
Chapter 1 Cybersecurity Fundamentals and Threat Landscape/002. Identify Computing and Networking Trends.mp4
118.2 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/006. Identify Networking Security Technologies.mp4
114.7 MB
Chapter 1 Cybersecurity Fundamentals and Threat Landscape/003. Describe Cybersecurity Threats.mp4
108.3 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/004. Review Network Addressing.mp4
105.2 MB
Chapter 1 Cybersecurity Fundamentals and Threat Landscape/005. Identify Wi-Fi Vulnerabilities and Attacks.mp4
100.1 MB
Chapter 1 Cybersecurity Fundamentals and Threat Landscape/004. Describe Common Cyberattack Techniques.mp4
96.3 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/011. Endpoint Security.mp4
95.3 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/002. Describe Routing Protocols.mp4
91.8 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/001. Identify Basic Internet and Network Operations.mp4
90.7 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/012. Server and System Administration.mp4
90.3 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/003. Review Networking Models.mp4
88.4 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/009. Learn Basic Virtualization Security Concepts.mp4
83.8 MB
Chapter 3 Palo Alto Networks Security Solutions and Technologies/007. Describe Cortex XSOAR and AutoFocus.mp4
79.5 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/008. Learn Basic Cloud Security Concepts.mp4
75.4 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/010. Learn Basic DevOps Security Concepts.mp4
75.3 MB
Chapter 3 Palo Alto Networks Security Solutions and Technologies/001. Identify Palo Alto Networks Security Solutions.mp4
74.3 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/005. Learn Networking Security Models.mp4
72.6 MB
Chapter 3 Palo Alto Networks Security Solutions and Technologies/002. Describe Basic NGFW Components and Functions.mp4
67.1 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/007. Learn Basic Data Center Security Concepts.mp4
60.2 MB
Chapter 3 Palo Alto Networks Security Solutions and Technologies/003. Learn Basic Prisma Cloud.mp4
59.7 MB
[磁力链接]
添加时间:
2024-02-29
大小:
2.0 GB
最近下载:
2025-03-12
热度:
4722
The Complete Ethical Hacking Course Bundle This Book Includes Python Machine Learning, SQL, Linux, Hacking with Kali Linux, Hack Websites, Smartphones, Coding, and Cybersecurity Fundamentals
TheCompleteEthicalHackingCourseBundleThisBookIncludesPythonMachineLearningSQLLinuxHacki_ep6.m4b
1.4 GB
[磁力链接]
添加时间:
2024-03-01
大小:
1.4 GB
最近下载:
2025-03-12
热度:
11764
[ TutGee.com ] Linux Essentials for Cybersecurity
~Get Your Files Here !/0789759357.epub
55.0 MB
~Get Your Files Here !/Bonus Resources.txt
386 Bytes
Get Bonus Downloads Here.url
176 Bytes
[磁力链接]
添加时间:
2024-03-05
大小:
55.0 MB
最近下载:
2025-02-10
热度:
1188
[FreeCoursesOnline.Me] O`REILLY - Building a Career in Cybersecurity
Lesson 1 Getting Started in the Cybersecurity Field/005. 1.4 Cybersecurity Skills.mp4
65.3 MB
Lesson 2 Planning Your Cybersecurity Career/004. 2.3 The Value of Professional Certifications.mp4
60.1 MB
Lesson 3 Creating Your Own Lab/003. 3.2 Foundational Lab.mp4
48.0 MB
Lesson 5 Preparing for Your Interview/005. 5.4 Final Tips.mp4
44.9 MB
Lesson 6 Using Continuous Improvement Strategy/007. 6.6 Growing Your Career as a Remote Worker.mp4
40.3 MB
Lesson 2 Planning Your Cybersecurity Career/003. 2.2 Creating and Tracking Your Plan.mp4
36.8 MB
Lesson 5 Preparing for Your Interview/003. 5.2 Preparing for the Interview.mp4
35.5 MB
Lesson 1 Getting Started in the Cybersecurity Field/006. 1.5 Navigating through the Industry.mp4
31.9 MB
Lesson 2 Planning Your Cybersecurity Career/002. 2.1 Establishing a Plan.mp4
31.3 MB
Lesson 6 Using Continuous Improvement Strategy/008. 6.7 What’s Next.mp4
31.0 MB
Lesson 1 Getting Started in the Cybersecurity Field/004. 1.3 Cybersecurity Jobs.mp4
30.3 MB
Lesson 5 Preparing for Your Interview/004. 5.3 Advancing in the Interview Process.mp4
29.3 MB
Lesson 6 Using Continuous Improvement Strategy/006. 6.5 Keeping a Good Work-life Balance.mp4
28.2 MB
Lesson 3 Creating Your Own Lab/005. 3.4 Enabling and Using Microsoft Defender for Cloud.mp4
27.7 MB
Introduction/001. Building a Career in Cybersecurity Introduction.mp4
25.1 MB
Lesson 6 Using Continuous Improvement Strategy/003. 6.2 Responsibilities and Expectations.mp4
24.6 MB
Lesson 4 Expanding Your Networking/005. 4.4 Using LinkedIn to Expand Your Network.mp4
24.5 MB
Lesson 1 Getting Started in the Cybersecurity Field/003. 1.2 Roles and Responsibilities.mp4
22.1 MB
Lesson 4 Expanding Your Networking/002. 4.1 Understanding the Cybersecurity Community.mp4
21.9 MB
Lesson 4 Expanding Your Networking/003. 4.2 Identifying Opportunities to Contribute with the Cybersecurity Community.mp4
19.3 MB
[磁力链接]
添加时间:
2024-03-05
大小:
847.7 MB
最近下载:
2025-03-11
热度:
436
[CourserHub.com] Coursera - Cybersecurity Specialization
[CourserHub.com] Coursera - Cybersecurity Specialization.part1.rar
3.2 GB
[CourserHub.com] Coursera - Cybersecurity Specialization.part2.rar
2.7 GB
[磁力链接]
添加时间:
2024-03-21
大小:
5.9 GB
最近下载:
2025-03-14
热度:
266
共14页
上一页
7
8
9
10
11
12
13
14
下一页