搜索
为您找到约
277
个磁力链接/BT种子,耗时 0 毫秒。
排序:
相关程度
热度
文件大小
添加时间
最近访问
[ DevCourseWeb.com ] Udemy - Deepfake Defense for Cybersecurity and GRC Professionals
~Get Your Files Here !/2. Detection & Mitigation/6. 20-Documenting and structuring our Deepfake mitigation strategy Report.mp4
105.7 MB
~Get Your Files Here !/1. Course Foundation/13. 13-Assessing Your organization’s deepfake response capabilities.mp4
99.8 MB
~Get Your Files Here !/2. Detection & Mitigation/8. 22-Action Plan for Deepfake Mitigation Strategy Implementation.mp4
93.6 MB
~Get Your Files Here !/2. Detection & Mitigation/10. 24-Standard Operating Procedure (SOP) for Deepfake Incident Response.mp4
86.6 MB
~Get Your Files Here !/3. Things to consider_Questions to ask/4. 29-Deepfake Mitigation Tools.mp4
80.4 MB
~Get Your Files Here !/2. Detection & Mitigation/5. 19-Developing deepfake mitigation strategy through brainstorming.mp4
79.9 MB
~Get Your Files Here !/1. Course Foundation/11. 11-Identifying Deepfakes.mp4
67.7 MB
~Get Your Files Here !/1. Course Foundation/4. 4-Deepfake Assessment-Can members of your organization identify deepfakes.mp4
63.6 MB
~Get Your Files Here !/1. Course Foundation/5. 5-Course Agenda.mp4
60.7 MB
~Get Your Files Here !/3. Things to consider_Questions to ask/3. 28-Creating a culture of Verefication.mp4
57.2 MB
~Get Your Files Here !/1. Course Foundation/12. 12-Testing for Deepfakes.mp4
57.1 MB
~Get Your Files Here !/2. Detection & Mitigation/1. 15-Intro to section 2_Are there any silver bullets for deepfake mitigation.mp4
51.7 MB
~Get Your Files Here !/1. Course Foundation/3. 3-Possible causes of deepfake Incident-News Brief Postmortem.mp4
50.1 MB
~Get Your Files Here !/2. Detection & Mitigation/3. 17-Important considerations for developing a deepfake defense strategy.mp4
42.4 MB
~Get Your Files Here !/1. Course Foundation/1. 1-Deepfake Defense For Cybersecurity & GRC Professionals.mp4
41.8 MB
~Get Your Files Here !/2. Detection & Mitigation/4. 18-Key components of a deepfake mitigation strategy.mp4
41.2 MB
~Get Your Files Here !/3. Things to consider_Questions to ask/5. 30-The most efficient measures to take against deepfake attacks.mp4
40.7 MB
~Get Your Files Here !/1. Course Foundation/14. 14-End of Section_1.mp4
39.9 MB
~Get Your Files Here !/1. Course Foundation/6. 6-Meet your Instructor.mp4
39.7 MB
~Get Your Files Here !/1. Course Foundation/2. 2-Important Note about course.mp4
38.8 MB
[磁力链接]
添加时间:
2024-03-22
大小:
1.4 GB
最近下载:
2025-03-13
热度:
3354
[ CourseWikia.com ] Cybersecurity at Work (2023)
~Get Your Files Here !/06 - 5. Hybrid Work Security/05 - Scenario Stolen laptop.mp4
18.0 MB
~Get Your Files Here !/05 - 4. Software and Internet Security/05 - The anatomy of a cyber attack.mp4
11.6 MB
~Get Your Files Here !/04 - 3. Account Security/01 - Password security.mp4
11.5 MB
~Get Your Files Here !/06 - 5. Hybrid Work Security/01 - Physical office security.mp4
10.9 MB
~Get Your Files Here !/02 - 1. Social Engineering Scams and Attacks/05 - Scenario Voice phishing.mp4
10.1 MB
~Get Your Files Here !/02 - 1. Social Engineering Scams and Attacks/04 - Counterfeit apps.mp4
10.0 MB
~Get Your Files Here !/06 - 5. Hybrid Work Security/04 - Smartphone and mobile device attacks.mp4
9.4 MB
~Get Your Files Here !/04 - 3. Account Security/02 - Data breaches and compromised passwords.mp4
9.0 MB
~Get Your Files Here !/03 - 2. Wireless Security/01 - Public Wi-Fi.mp4
9.0 MB
~Get Your Files Here !/05 - 4. Software and Internet Security/04 - Malware Ransomware.mp4
9.0 MB
~Get Your Files Here !/06 - 5. Hybrid Work Security/03 - Laptop and desktop security.mp4
8.2 MB
~Get Your Files Here !/05 - 4. Software and Internet Security/01 - Updating software.mp4
8.1 MB
~Get Your Files Here !/02 - 1. Social Engineering Scams and Attacks/03 - Social media information (over)sharing.mp4
7.9 MB
~Get Your Files Here !/08 - Conclusion/01 - You are part of the security team.mp4
7.2 MB
~Get Your Files Here !/06 - 5. Hybrid Work Security/02 - Physical office security best practices.mp4
7.1 MB
~Get Your Files Here !/03 - 2. Wireless Security/02 - Home Wi-Fi.mp4
6.9 MB
~Get Your Files Here !/02 - 1. Social Engineering Scams and Attacks/02 - Email phishing.mp4
6.5 MB
~Get Your Files Here !/02 - 1. Social Engineering Scams and Attacks/01 - Social engineering overview.mp4
6.4 MB
~Get Your Files Here !/07 - 6. Data Security/01 - Intellectual property.mp4
5.6 MB
~Get Your Files Here !/04 - 3. Account Security/03 - Multifactor authentication.mp4
5.1 MB
[磁力链接]
添加时间:
2024-03-22
大小:
199.8 MB
最近下载:
2025-03-06
热度:
371
[ DevCourseWeb.com ] Udemy - Trustee Shield - Cybersecurity Foundation for Kids and Teens
~Get Your Files Here !/5. Internet Cookies/6. Protection against Cookie risks.mp4
147.6 MB
~Get Your Files Here !/7. Phishing/13. Activity Revised.mp4
141.4 MB
~Get Your Files Here !/1. Passwords/5. Making unhackable password.mp4
115.0 MB
~Get Your Files Here !/5. Internet Cookies/5. Cookies Risks for Online Privacy.mp4
106.2 MB
~Get Your Files Here !/5. Internet Cookies/3. Internet Cookies.mp4
96.9 MB
~Get Your Files Here !/3. Malware/7. Trojan Horses.mp4
96.4 MB
~Get Your Files Here !/4. Insecure Websites/5. Search Engine.mp4
95.6 MB
~Get Your Files Here !/6. Online Privacy/13. How To Protect Privacy- Part (2).mp4
94.8 MB
~Get Your Files Here !/2. Multi-Factor Authentication (MFA)/8. Password Managers.mp4
90.9 MB
~Get Your Files Here !/6. Online Privacy/12. How To Protect Privacy- Part (1).mp4
81.2 MB
~Get Your Files Here !/8. Social Engineering/10. Protection against Social Engineering attacks.mp4
80.4 MB
~Get Your Files Here !/8. Social Engineering/9. Ransomwares.mp4
77.5 MB
~Get Your Files Here !/8. Social Engineering/3. What is Social Engineering.mp4
75.1 MB
~Get Your Files Here !/2. Multi-Factor Authentication (MFA)/6. Two-Factor Authentication (2FA).mp4
70.2 MB
~Get Your Files Here !/1. Passwords/3. Password Definition.mp4
68.9 MB
~Get Your Files Here !/8. Social Engineering/4. Hackers Perspective.mp4
68.3 MB
~Get Your Files Here !/3. Malware/12. Defensive Methods against Malware.mp4
62.5 MB
~Get Your Files Here !/4. Insecure Websites/7. Why HTTPS is More Secure than HTTP.mp4
62.5 MB
~Get Your Files Here !/3. Malware/6. Worms.mp4
61.9 MB
~Get Your Files Here !/6. Online Privacy/8. Digital Footprint Impacts.mp4
61.7 MB
[磁力链接]
添加时间:
2024-03-22
大小:
4.3 GB
最近下载:
2025-03-13
热度:
1855
[ DevCourseWeb.com ] Udemy - Mastering Cybersecurity and Supply Chain Risk Management
~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/7. Recover.mp4
205.3 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/4. Network Security Controls.mp4
173.8 MB
~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/5. Incident Analysis.mp4
150.0 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/1. User and Network Infrastructure.mp4
136.2 MB
~Get Your Files Here !/1. Introduction to NIST Framework/3. NIST Framework Core.mp4
130.0 MB
~Get Your Files Here !/5. Effective Supply Chain Risk Management/4. Develop, Assess and Test Supply Chain Risks.mp4
123.4 MB
~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/3. Executable Response Plan.mp4
116.0 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/9. Information Protection.mp4
115.2 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/8. Hardware Integrity.mp4
105.7 MB
~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/1. Developing a Continuity of Operations Plan.mp4
103.2 MB
~Get Your Files Here !/2. Cybersecurity Risk Planning & Management/4. Keeping Hardware Inventory Updated.mp4
102.7 MB
~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/2. Incident Response.mp4
102.1 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/7. Data Security.mp4
101.4 MB
~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/6. Mitigation.mp4
101.0 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/2. Authentication and Access Control.mp4
100.3 MB
~Get Your Files Here !/2. Cybersecurity Risk Planning & Management/7. Personnel Security Requirements.mp4
98.1 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/10. Patch Management.mp4
97.7 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/5. Association and Authentication.mp4
91.7 MB
~Get Your Files Here !/5. Effective Supply Chain Risk Management/1. Supply Chain Risk Management.mp4
90.7 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/12. Protective Technology.mp4
88.5 MB
[磁力链接]
添加时间:
2024-03-23
大小:
3.6 GB
最近下载:
2025-03-13
热度:
1287
[ CourseMega.com ] Udemy - Cybersecurity - Attack & Defense Strategies (Red & Blue Team).zip
[ CourseMega.com ] Udemy - Cybersecurity - Attack & Defense Strategies (Red & Blue Team).zip
3.0 GB
[磁力链接]
添加时间:
2024-03-26
大小:
3.0 GB
最近下载:
2025-03-13
热度:
2792
[ CoursePig.com ] Certificate in Cybersecurity Analysis (IIBA-CCA) - Getting Started
~Get Your Files Here !/Exercise Files/02/defining-
cybersecurity
-for-business-professionals-slides.pdf
42.5 MB
~Get Your Files Here !/03. Defining Cybersecurity in an Organization/04. Introduction to Cybersecurity Frameworks.mp4
20.2 MB
~Get Your Files Here !/Exercise Files/03/defining-
cybersecurity
-in-an-organization-slides.pdf
18.1 MB
~Get Your Files Here !/02. Defining Cybersecurity for Business Professionals/03. Cybersecurity Business Analysis and Building in Security.mp4
14.7 MB
~Get Your Files Here !/04. Describing Key Enterprise Risk Concepts/08. How to Build Disaster Recovery and Business Continuity Plans.mp4
13.7 MB
~Get Your Files Here !/02. Defining Cybersecurity for Business Professionals/02. Understanding the Business Value of Cybersecurity Today.mp4
10.5 MB
~Get Your Files Here !/03. Defining Cybersecurity in an Organization/05. Identifying What an ISMS Is and the Critical Focus on Data Privacy.mp4
9.4 MB
~Get Your Files Here !/04. Describing Key Enterprise Risk Concepts/07. Introduction to Cyber Risk Assessments.mp4
9.4 MB
~Get Your Files Here !/Exercise Files/04/describing-key-enterprise-risk-concepts-slides.pdf
6.3 MB
~Get Your Files Here !/01. Course Overview/01. Course Overview.mp4
4.0 MB
~Get Your Files Here !/03. Defining Cybersecurity in an Organization/06. Defining Data Minimization Activities and Using Security Frameworks.mp4
3.9 MB
~Get Your Files Here !/Bonus Resources.txt
386 Bytes
Get Bonus Downloads Here.url
179 Bytes
[磁力链接]
添加时间:
2024-03-27
大小:
152.9 MB
最近下载:
2025-03-13
热度:
229
[LiveLessons] The Complete Cybersecurity Bootcamp, 2nd Edition [En]
29.2 Hacking iOS.mp4
86.6 MB
17.13 Performing SMTP and DNS Enumeration.mp4
80.0 MB
21.3 Exploring Wireless Threats.mp4
79.0 MB
33.2 Understanding IoT Attacks.mp4
76.8 MB
17.14 Conducting Additional Enumeration Techniques.mp4
75.8 MB
33.1 Introducing IoT Concepts.mp4
74.4 MB
29.1 Understanding Mobile Platform Attack Vectors.mp4
73.4 MB
17.10 Performing SNMP Enumeration.mp4
71.8 MB
17.3 Understanding Host Discovery.mp4
69.7 MB
5.6 Analyzing Computer Incident Response Teams (CSIRTs).mp4
68.5 MB
17.6 Scanning Beyond IDS and Firewall.mp4
68.2 MB
27.5 Cracking Passwords with John the Ripper.mp4
66.1 MB
7.8 Understanding the MITRE ATT&CK Framework.mp4
65.8 MB
29.3 Hacking Android OS.mp4
63.8 MB
20.4 Exploring SQL Injection Tools.mp4
63.3 MB
21.2 Understanding Wireless Encryption.mp4
62.7 MB
17.12 Performing NTP and NFS Enumeration.mp4
61.8 MB
16.10 Performing Footprinting through Social Engineering.mp4
59.1 MB
8.3 Understanding Evidence Collection.mp4
57.2 MB
21.6 Hacking Bluetooth.mp4
52.3 MB
[磁力链接]
添加时间:
2024-03-28
大小:
6.5 GB
最近下载:
2025-03-14
热度:
643
Mastering Cybersecurity
B0CZLYGXLN.pdf
153.1 MB
[磁力链接]
添加时间:
2024-04-03
大小:
153.1 MB
最近下载:
2025-03-12
热度:
4691
Cybersecurity Unlocked
Cybersecurity Unlocked.pdf
95.2 MB
Readme.txt
682 Bytes
[磁力链接]
添加时间:
2024-04-07
大小:
95.2 MB
最近下载:
2025-03-14
热度:
1697
[ DevCourseWeb.com ] Udemy - ChatGPT, ML, and AI for Cybersecurity, SOCs and Business
~Get Your Files Here !/3. AI Tools for Security.mp4
683.8 MB
~Get Your Files Here !/4. Enhancing Search Capabilities with GPT4all Plugins.mp4
576.0 MB
~Get Your Files Here !/2. Fundamentals of ChatGPT and GPT4all.mp4
553.4 MB
~Get Your Files Here !/1. Introduction to Machine Learning and AI for Security.mp4
520.6 MB
~Get Your Files Here !/8. Future Trends and Challenges in AI Security.mp4
452.9 MB
~Get Your Files Here !/6. Evaluating AI Security.mp4
379.7 MB
~Get Your Files Here !/5. Securing AI Models and Data.mp4
280.8 MB
~Get Your Files Here !/7. Case Studies of Real-World AI Applications.mp4
279.0 MB
~Get Your Files Here !/Bonus Resources.txt
386 Bytes
Get Bonus Downloads Here.url
182 Bytes
~Get Your Files Here !/9. Final Exam.html
146 Bytes
~Get Your Files Here !/4.2 Github Plugins (primarily for ChatGPT and Python implementations thereof)..html
124 Bytes
~Get Your Files Here !/4.1 ChatGPT Plugins.html
100 Bytes
~Get Your Files Here !/4.3 GPT4All Website and Downloads.html
90 Bytes
[磁力链接]
添加时间:
2024-04-07
大小:
3.7 GB
最近下载:
2025-03-13
热度:
2117
[ FreeCourseWeb.com ] Cybersecurity Unlocked! - Strategies To Outsmart Hackers, and Online Criminals
~Get Your Files Here !/B0CW1D7MVY.pdf
95.2 MB
~Get Your Files Here !/Bonus Resources.txt
386 Bytes
Get Bonus Downloads Here.url
183 Bytes
[磁力链接]
添加时间:
2024-04-10
大小:
95.2 MB
最近下载:
2025-03-13
热度:
4868
Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection by Shilpa Mahajan EPUB
Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection by Shilpa Mahajan.epub
55.6 MB
[磁力链接]
添加时间:
2024-04-21
大小:
55.6 MB
最近下载:
2025-03-13
热度:
1818
SEC595 - Applied Data Science and AI Machine Learning for Cybersecurity Professionals
USB 2021/595.7z
21.3 GB
LIVE 2021/5. Day Five.mp4
1.2 GB
LIVE 2021/1. Day One.mp4
1.1 GB
LIVE 2021/2. Day Two.mp4
903.0 MB
LIVE 2021/3. Day Three.mp4
858.8 MB
LIVE 2021/4. Day Four.mp4
784.1 MB
PDF 2021/SEC595-Applied-Data-Science-and-Machine-Learning-for-Cybersecurity-Professionals.pdf
61.3 MB
[磁力链接]
添加时间:
2024-05-03
大小:
26.1 GB
最近下载:
2025-03-13
热度:
3741
[ DevCourseWeb.com ] Linkedin - Leveraging ChatGPT for Smarter Cybersecurity
~Get Your Files Here !/03 - 2. ChatGPT and Security Implications/03 - Uncovering NLP-based cyber threats ChatGPT vulnerabilities.mp4
12.1 MB
~Get Your Files Here !/05 - 4. Integrating ChatGPT with Security Systems/02 - Optimizing
cybersecurity
with ChatGPT integration in SIEM.mp4
10.5 MB
~Get Your Files Here !/05 - 4. Integrating ChatGPT with Security Systems/04 - Securing the future with ChatGPT and OpenAI in Microsoft Security Copilot.mp4
10.1 MB
~Get Your Files Here !/05 - 4. Integrating ChatGPT with Security Systems/03 - Enhancing vulnerability management with ChatGPT.mp4
9.0 MB
~Get Your Files Here !/02 - 1. Introduction to ChatGPT and Natural Language Processing/02 - Inside ChatGPT NLP and ML uncovered for enhanced understanding.mp4
8.7 MB
~Get Your Files Here !/04 - 3. ChatGPT for Incident Response/02 - Triage potential incidents, analyze logs, and assist investigations.mp4
8.1 MB
~Get Your Files Here !/03 - 2. ChatGPT and Security Implications/02 - Guarding against NLP-based cyberattacks on ChatGPT.mp4
7.8 MB
~Get Your Files Here !/06 - Conclusion/01 - Stay vigilant, stay curious, and extend your skills.mp4
7.7 MB
~Get Your Files Here !/02 - 1. Introduction to ChatGPT and Natural Language Processing/01 - Unleashing the power of OpenAI's ChatGPT for
cybersecurity
.mp4
7.5 MB
~Get Your Files Here !/04 - 3. ChatGPT for Incident Response/01 - Overview of incident response and forensic analysis.mp4
7.5 MB
~Get Your Files Here !/03 - 2. ChatGPT and Security Implications/01 - Security risks associated with ChatGPT.mp4
7.1 MB
~Get Your Files Here !/05 - 4. Integrating ChatGPT with Security Systems/01 - Advanced threat detection with ChatGPT in SIEM.mp4
6.3 MB
~Get Your Files Here !/02 - 1. Introduction to ChatGPT and Natural Language Processing/03 - Inside ChatGPT Unraveling key concepts and technologies.mp4
5.9 MB
~Get Your Files Here !/01 - Introduction/01 - Leveraging AI for advanced threat detection and prevention.mp4
3.9 MB
~Get Your Files Here !/05 - 4. Integrating ChatGPT with Security Systems/03 - Enhancing vulnerability management with ChatGPT.srt
8.3 kB
~Get Your Files Here !/05 - 4. Integrating ChatGPT with Security Systems/02 - Optimizing
cybersecurity
with ChatGPT integration in SIEM.srt
6.4 kB
~Get Your Files Here !/03 - 2. ChatGPT and Security Implications/03 - Uncovering NLP-based cyber threats ChatGPT vulnerabilities.srt
6.4 kB
~Get Your Files Here !/04 - 3. ChatGPT for Incident Response/01 - Overview of incident response and forensic analysis.srt
6.2 kB
~Get Your Files Here !/02 - 1. Introduction to ChatGPT and Natural Language Processing/01 - Unleashing the power of OpenAI's ChatGPT for
cybersecurity
.srt
6.1 kB
~Get Your Files Here !/02 - 1. Introduction to ChatGPT and Natural Language Processing/02 - Inside ChatGPT NLP and ML uncovered for enhanced understanding.srt
6.0 kB
[磁力链接]
添加时间:
2024-05-07
大小:
112.3 MB
最近下载:
2025-03-13
热度:
452
DIY Cybersecurity Degree
100 Days of Code The Complete Python Pro Bootcamp for 2023/101 - Final Stretch/002 Study With Me.mp4
1.9 GB
100 Days of Code The Complete Python Pro Bootcamp for 2023/101 - Final Stretch/001 Recording of our Live AMA (aka AAA - Ask Angela Anything).mp4
713.4 MB
CompTIA/CompTIA A+ Core 1 (220-1101)/5. Troubleshooting Hardware and Networking/5.2 Troubleshooting PC Components.mp4
697.8 MB
CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.1 Network Cables.mp4
637.3 MB
CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.4 Random-access Memory.mp4
579.5 MB
Job Tips/Behavioral Interview Prep/03. General Tips.mp4
571.0 MB
CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.4 Technical Controls - The Basics.mp4
551.2 MB
CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.6 Motherboards.mp4
540.8 MB
CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.5 Storage Devices.mp4
527.8 MB
CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.3 Non-Technical Controls - The Rest.mp4
526.4 MB
CompTIA/CompTIA A+ Core 1 (220-1101)/1. Mobile Devices/1.2 Laptop Hardware and Components.mp4
525.8 MB
CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.8 How do we Analyze Risk.mp4
509.3 MB
CompTIA/CompTIA PenTest + (PT0-002)/3. Attacks and Exploits/3.23 Social Engineering and Physical Attacks.mp4
498.2 MB
CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.2 Non-Technical Controls - The Basics.mp4
486.5 MB
CompTIA/CompTIA A+ Core 1 (220-1101)/3. Hardware/3.2 Peripheral and Video Cables.mp4
485.9 MB
CompTIA/CompTIA PenTest + (PT0-002)/4. Reporting and Communication/4.3 Communication During a Pentest.mp4
478.0 MB
CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.14 Frameworks, Audits and Policy.mp4
473.1 MB
CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.10 How do we Document and Train for Risk.mp4
472.2 MB
CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.15 IAM Policies and Procedures.mp4
463.2 MB
CompTIA/CompTIA CySA+ (CS0-002)/5. Compliance and Assessment/5.9 How do we Prioritize, Communicate Risk.mp4
460.5 MB
[磁力链接]
添加时间:
2024-05-07
大小:
233.4 GB
最近下载:
2025-03-13
热度:
1438
[ FreeCourseWeb.com ] Linkedin - The Future of Work and Cybersecurity on the Metaverse
~Get Your Files Here !/03 - 2. The Essentials/03 - The future of work potential risk categories.mp4
6.9 MB
~Get Your Files Here !/03 - 2. The Essentials/02 - The impact of cyber threats on your business or industry.mp4
6.7 MB
~Get Your Files Here !/04 - 3. Threats/10 - Does metaverse-based work need an HR redesign.mp4
6.5 MB
~Get Your Files Here !/05 - Conclusion/01 - The future of the metaverse of work.mp4
6.4 MB
~Get Your Files Here !/04 - 3. Threats/11 - Decoupling business units and needs.mp4
6.2 MB
~Get Your Files Here !/02 - 1. Defining the Metaverse/01 - What is the metaverse today.mp4
5.6 MB
~Get Your Files Here !/01 - Introduction/02 - What to know before starting this course.mp4
5.5 MB
~Get Your Files Here !/04 - 3. Threats/09 - Regulations for metaverse-based work.mp4
5.2 MB
~Get Your Files Here !/04 - 3. Threats/02 - Threats to your brand.mp4
4.9 MB
~Get Your Files Here !/04 - 3. Threats/08 - Identity theft threats.mp4
4.8 MB
~Get Your Files Here !/03 - 2. The Essentials/01 - Understanding the metaverse environment and its suitability for your industry.mp4
4.7 MB
~Get Your Files Here !/04 - 3. Threats/07 - Cybersecurity threats.mp4
4.6 MB
~Get Your Files Here !/04 - 3. Threats/03 - Threats to your job profile or role.mp4
4.6 MB
~Get Your Files Here !/04 - 3. Threats/04 - Platform-specific threats.mp4
4.6 MB
~Get Your Files Here !/04 - 3. Threats/06 - Regulatory professional threats.mp4
4.5 MB
~Get Your Files Here !/02 - 1. Defining the Metaverse/02 - The various ways in which the metaverse can impact work.mp4
4.4 MB
~Get Your Files Here !/04 - 3. Threats/01 - Threats to the profession.mp4
4.4 MB
~Get Your Files Here !/04 - 3. Threats/05 - Hardware equipment-specific threats.mp4
4.3 MB
~Get Your Files Here !/01 - Introduction/01 - Why discuss the future of work and the metaverse.mp4
3.9 MB
~Get Your Files Here !/05 - Conclusion/02 - Where to begin.mp4
2.4 MB
[磁力链接]
添加时间:
2024-05-07
大小:
101.1 MB
最近下载:
2025-03-14
热度:
219
[Coursera] Python for Cybersecurity Specialization - 5 course series
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_03_alternative-protocol.mp4
61.8 MB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_05_network-sniffing.mp4
42.0 MB
pythonfor
cybersecurity
-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_04_network-scanning.mp4
32.5 MB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_05_protocol-decoding.mp4
31.5 MB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_07_behavioral-analytics.mp4
29.2 MB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_03_registry-autorun.mp4
29.0 MB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_05_hijacked-execution-flow.mp4
27.5 MB
pythonfor
cybersecurity
-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_06_dns-exploration.mp4
27.3 MB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_05_system-activity-monitoring.mp4
26.6 MB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_03_pcap-collection.mp4
26.0 MB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_03_encrypted-channel.mp4
25.8 MB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_05_scheduled-execution.mp4
25.8 MB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_03_user-account-discovery.mp4
25.4 MB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_03_logon-scripts.mp4
24.6 MB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_03_data-encryption.mp4
23.6 MB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_05_alternate-data-streams.mp4
22.4 MB
pythonfor
cybersecurity
-introduction/03_python-for-initial-access/01_python-for-initial-access/01_03_default-account-discovery.mp4
21.7 MB
pythonfor
cybersecurity
-introduction/03_python-for-initial-access/01_python-for-initial-access/01_05_autorun-scripts.mp4
21.2 MB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_03_impair-avs.mp4
20.8 MB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_03_credentials-from-web-browsers.mp4
20.7 MB
[磁力链接]
添加时间:
2024-05-20
大小:
1.2 GB
最近下载:
2025-03-13
热度:
4460
[Coursera] Advanced Python Scripting for Cybersecurity Specialization - 3 course series
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_04_detecting-ssh-brute-force-with-scapy.mp4
49.7 MB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_07_connection-hijacking-with-scapy.mp4
48.4 MB
python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_02_generating-password-variations-with-python.mp4
46.5 MB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_05_service-detection-with-python.mp4
45.6 MB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_05_feature-selection-for-traffic-analysis.mp4
45.2 MB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_03_searching-the-registry-with-python.mp4
45.2 MB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_02_querying-shodan-with-python.mp4
44.0 MB
establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_02_traffic-analysis-with-python.mp4
43.7 MB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_04_network-scanning-with-scapy.mp4
38.8 MB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_02_brute-force-detection-with-windows-events.mp4
38.8 MB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_03_detecting-ftp-brute-force-with-scapy.mp4
35.1 MB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_04_searching-the-system-with-python.mp4
34.9 MB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_02_dumping-chrome-credentials-with-python.mp4
34.8 MB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_06_analyzing-passwords-with-python.mp4
34.5 MB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_03_dns-queries-with-python.mp4
30.9 MB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_06_detecting-anomalous-network-traffic-with-scapy.mp4
28.8 MB
establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_05_building-c2-packets-with-python.mp4
27.1 MB
python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_04_automating-brute-force.mp4
25.9 MB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_05_cracking-the-linux-passwords-with-python.mp4
24.4 MB
establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_04_detecting-encodings-with-python.mp4
24.1 MB
[磁力链接]
添加时间:
2024-05-24
大小:
947.7 MB
最近下载:
2025-03-13
热度:
4045
[ CoursePig.com ] Linkedin - The Cybersecurity Threat Landscape (2022)
~Get Your Files Here !/10 - 9. Supply Chain Attacks and Third-Party Risks/01 - The threat of supply chain attacks and third-party risks.mp4
16.2 MB
~Get Your Files Here !/05 - 4. Botnets and DDoS attacks/02 - Protect against botnets and DDoS threats.mp4
15.8 MB
~Get Your Files Here !/08 - 7. Unmanaged IoT Devices/01 - Explore the threat of unmanaged IoT devices.mp4
14.4 MB
~Get Your Files Here !/09 - 8. Shadow IT/01 - Explore the threat of shadow IT.mp4
14.2 MB
~Get Your Files Here !/08 - 7. Unmanaged IoT Devices/02 - Protect against unmanaged IoT devices.mp4
12.4 MB
~Get Your Files Here !/09 - 8. Shadow IT/02 - Protect against shadow IT.mp4
12.4 MB
~Get Your Files Here !/06 - 5. Deepfakes/02 - Protect against deepfakes.mp4
12.1 MB
~Get Your Files Here !/03 - 2. Phishing and Smishing/02 - Protect against phishing and smishing.mp4
12.0 MB
~Get Your Files Here !/11 - Conclusion/01 - Stay up to date on
cybersecurity
.mp4
11.8 MB
~Get Your Files Here !/02 - 1. Malware and Ransomware/02 - Protect against malware and ransomware.mp4
11.7 MB
~Get Your Files Here !/02 - 1. Malware and Ransomware/01 - Explore the threat of malware and ransomware.mp4
11.6 MB
~Get Your Files Here !/03 - 2. Phishing and Smishing/01 - Explore the threat of phishing and smishing.mp4
11.3 MB
~Get Your Files Here !/05 - 4. Botnets and DDoS attacks/01 - Explore the threat of botnets and DDoS attacks.mp4
11.1 MB
~Get Your Files Here !/07 - 6. Insider Threats/01 - Explore the risk of insider threats.mp4
10.9 MB
~Get Your Files Here !/10 - 9. Supply Chain Attacks and Third-Party Risks/02 - Protect against supply chain attacks and third-party risks.mp4
10.5 MB
~Get Your Files Here !/04 - 3. Business Email Compromise/01 - Explore the threat of business email compromise.mp4
9.4 MB
~Get Your Files Here !/01 - Introduction/01 - Examine the
cybersecurity
threat landscape.mp4
9.4 MB
~Get Your Files Here !/04 - 3. Business Email Compromise/02 - Protect against business email compromise.mp4
9.2 MB
~Get Your Files Here !/06 - 5. Deepfakes/01 - Explore the threat of deepfakes.mp4
9.0 MB
~Get Your Files Here !/07 - 6. Insider Threats/02 - Protect against insider threats.mp4
7.0 MB
[磁力链接]
添加时间:
2024-05-29
大小:
232.7 MB
最近下载:
2025-02-25
热度:
165
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/007. 1.6 Identity and access management.mp4
120.3 MB
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/003. 1.2 Log ingestion Part 2.mp4
117.9 MB
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/002. 1.1 Log ingestion Part 1.mp4
106.0 MB
03 Malware and Incident Response/Lesson 1 Threat Landscape/002. 1.1 Malware Threat Landscape.mp4
90.8 MB
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/005. 1.4 Infrastructure concepts.mp4
89.3 MB
04 Secure Operations and Protections/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/004. 2.3 Technology and tool integration.mp4
87.2 MB
01 Threat Intelligence and Threat Hunting/Lesson 2 Analyze Indicators of Potentially Malicious Activity/002. 2.1 Network-related.mp4
77.1 MB
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/008. 1.7 Encryption.mp4
76.0 MB
01 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/006. 3.5 Common techniques Part 3.mp4
63.7 MB
03 Malware and Incident Response/Lesson 5 PE File Identification/004. 5.3 Entry Points.mp4
62.4 MB
01 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/004. 3.3 Common techniques Part 1.mp4
56.9 MB
01 Threat Intelligence and Threat Hunting/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/002. 1.1 Threat actors Part 1.mp4
53.5 MB
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/004. 1.3 Operating system (OS) concepts.mp4
52.1 MB
01 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/005. 3.4 Common techniques Part 2.mp4
51.1 MB
02 System and Privacy Data Protection/Lesson 4 Analyzing Logs and Impact Analysis/008. 4.7 Impact Analysis.mp4
51.0 MB
01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/007. 7.6 SOC and FPGA.mp4
50.5 MB
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/006. 1.5 Network architecture.mp4
50.1 MB
01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/010. 7.9 Industrial Control Systems (ICS) and Process Automation.mp4
46.2 MB
01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/004. 7.3 Internet of Things (IoT) and Embedded Devices Part 2.mp4
45.3 MB
04 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/013. 4.12 Threat modeling.mp4
43.6 MB
[磁力链接]
添加时间:
2024-05-31
大小:
3.8 GB
最近下载:
2025-03-13
热度:
3200
共14页
上一页
8
9
10
11
12
13
14
下一页