搜索
为您找到约
290
个磁力链接/BT种子,耗时 0 毫秒。
排序:
相关程度
热度
文件大小
添加时间
最近访问
[Coursera] Python for Cybersecurity Specialization - 5 course series
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_03_alternative-protocol.mp4
61.8 MB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_05_network-sniffing.mp4
42.0 MB
pythonfor
cybersecurity
-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_04_network-scanning.mp4
32.5 MB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_05_protocol-decoding.mp4
31.5 MB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_07_behavioral-analytics.mp4
29.2 MB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_03_registry-autorun.mp4
29.0 MB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_05_hijacked-execution-flow.mp4
27.5 MB
pythonfor
cybersecurity
-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_06_dns-exploration.mp4
27.3 MB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_05_system-activity-monitoring.mp4
26.6 MB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_03_pcap-collection.mp4
26.0 MB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_03_encrypted-channel.mp4
25.8 MB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_05_scheduled-execution.mp4
25.8 MB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_03_user-account-discovery.mp4
25.4 MB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_03_logon-scripts.mp4
24.6 MB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_03_data-encryption.mp4
23.6 MB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_05_alternate-data-streams.mp4
22.4 MB
pythonfor
cybersecurity
-introduction/03_python-for-initial-access/01_python-for-initial-access/01_03_default-account-discovery.mp4
21.7 MB
pythonfor
cybersecurity
-introduction/03_python-for-initial-access/01_python-for-initial-access/01_05_autorun-scripts.mp4
21.2 MB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_03_impair-avs.mp4
20.8 MB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_03_credentials-from-web-browsers.mp4
20.7 MB
[磁力链接]
添加时间:
2024-05-20
大小:
1.2 GB
最近下载:
2024-11-29
热度:
3088
[Coursera] Advanced Python Scripting for Cybersecurity Specialization - 3 course series
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_04_detecting-ssh-brute-force-with-scapy.mp4
49.7 MB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_07_connection-hijacking-with-scapy.mp4
48.4 MB
python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_02_generating-password-variations-with-python.mp4
46.5 MB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_05_service-detection-with-python.mp4
45.6 MB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_05_feature-selection-for-traffic-analysis.mp4
45.2 MB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_03_searching-the-registry-with-python.mp4
45.2 MB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_02_querying-shodan-with-python.mp4
44.0 MB
establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_02_traffic-analysis-with-python.mp4
43.7 MB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_04_network-scanning-with-scapy.mp4
38.8 MB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_02_brute-force-detection-with-windows-events.mp4
38.8 MB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_03_detecting-ftp-brute-force-with-scapy.mp4
35.1 MB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_04_searching-the-system-with-python.mp4
34.9 MB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_02_dumping-chrome-credentials-with-python.mp4
34.8 MB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_06_analyzing-passwords-with-python.mp4
34.5 MB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_03_dns-queries-with-python.mp4
30.9 MB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_06_detecting-anomalous-network-traffic-with-scapy.mp4
28.8 MB
establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_05_building-c2-packets-with-python.mp4
27.1 MB
python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_04_automating-brute-force.mp4
25.9 MB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_05_cracking-the-linux-passwords-with-python.mp4
24.4 MB
establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_04_detecting-encodings-with-python.mp4
24.1 MB
[磁力链接]
添加时间:
2024-05-24
大小:
947.7 MB
最近下载:
2024-12-01
热度:
3218
[ DevCourseWeb.com ] Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities
~Get Your Files Here !/2022BookRoboticsAndAIForCybersecurityA.epub
40.2 MB
~Get Your Files Here !/2022BookRoboticsAndAIForCybersecurityA.pdf
7.9 MB
~Get Your Files Here !/Bonus Resources.txt
386 Bytes
Get Bonus Downloads Here.url
182 Bytes
[磁力链接]
添加时间:
2024-05-27
大小:
48.1 MB
最近下载:
2024-12-01
热度:
233
[ CoursePig.com ] Linkedin - The Cybersecurity Threat Landscape (2022)
~Get Your Files Here !/10 - 9. Supply Chain Attacks and Third-Party Risks/01 - The threat of supply chain attacks and third-party risks.mp4
16.2 MB
~Get Your Files Here !/05 - 4. Botnets and DDoS attacks/02 - Protect against botnets and DDoS threats.mp4
15.8 MB
~Get Your Files Here !/08 - 7. Unmanaged IoT Devices/01 - Explore the threat of unmanaged IoT devices.mp4
14.4 MB
~Get Your Files Here !/09 - 8. Shadow IT/01 - Explore the threat of shadow IT.mp4
14.2 MB
~Get Your Files Here !/08 - 7. Unmanaged IoT Devices/02 - Protect against unmanaged IoT devices.mp4
12.4 MB
~Get Your Files Here !/09 - 8. Shadow IT/02 - Protect against shadow IT.mp4
12.4 MB
~Get Your Files Here !/06 - 5. Deepfakes/02 - Protect against deepfakes.mp4
12.1 MB
~Get Your Files Here !/03 - 2. Phishing and Smishing/02 - Protect against phishing and smishing.mp4
12.0 MB
~Get Your Files Here !/11 - Conclusion/01 - Stay up to date on
cybersecurity
.mp4
11.8 MB
~Get Your Files Here !/02 - 1. Malware and Ransomware/02 - Protect against malware and ransomware.mp4
11.7 MB
~Get Your Files Here !/02 - 1. Malware and Ransomware/01 - Explore the threat of malware and ransomware.mp4
11.6 MB
~Get Your Files Here !/03 - 2. Phishing and Smishing/01 - Explore the threat of phishing and smishing.mp4
11.3 MB
~Get Your Files Here !/05 - 4. Botnets and DDoS attacks/01 - Explore the threat of botnets and DDoS attacks.mp4
11.1 MB
~Get Your Files Here !/07 - 6. Insider Threats/01 - Explore the risk of insider threats.mp4
10.9 MB
~Get Your Files Here !/10 - 9. Supply Chain Attacks and Third-Party Risks/02 - Protect against supply chain attacks and third-party risks.mp4
10.5 MB
~Get Your Files Here !/04 - 3. Business Email Compromise/01 - Explore the threat of business email compromise.mp4
9.4 MB
~Get Your Files Here !/01 - Introduction/01 - Examine the
cybersecurity
threat landscape.mp4
9.4 MB
~Get Your Files Here !/04 - 3. Business Email Compromise/02 - Protect against business email compromise.mp4
9.2 MB
~Get Your Files Here !/06 - 5. Deepfakes/01 - Explore the threat of deepfakes.mp4
9.0 MB
~Get Your Files Here !/07 - 6. Insider Threats/02 - Protect against insider threats.mp4
7.0 MB
[磁力链接]
添加时间:
2024-05-29
大小:
232.7 MB
最近下载:
2024-12-01
热度:
102
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/007. 1.6 Identity and access management.mp4
120.3 MB
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/003. 1.2 Log ingestion Part 2.mp4
117.9 MB
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/002. 1.1 Log ingestion Part 1.mp4
106.0 MB
03 Malware and Incident Response/Lesson 1 Threat Landscape/002. 1.1 Malware Threat Landscape.mp4
90.8 MB
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/005. 1.4 Infrastructure concepts.mp4
89.3 MB
04 Secure Operations and Protections/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/004. 2.3 Technology and tool integration.mp4
87.2 MB
01 Threat Intelligence and Threat Hunting/Lesson 2 Analyze Indicators of Potentially Malicious Activity/002. 2.1 Network-related.mp4
77.1 MB
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/008. 1.7 Encryption.mp4
76.0 MB
01 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/006. 3.5 Common techniques Part 3.mp4
63.7 MB
03 Malware and Incident Response/Lesson 5 PE File Identification/004. 5.3 Entry Points.mp4
62.4 MB
01 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/004. 3.3 Common techniques Part 1.mp4
56.9 MB
01 Threat Intelligence and Threat Hunting/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/002. 1.1 Threat actors Part 1.mp4
53.5 MB
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/004. 1.3 Operating system (OS) concepts.mp4
52.1 MB
01 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/005. 3.4 Common techniques Part 2.mp4
51.1 MB
02 System and Privacy Data Protection/Lesson 4 Analyzing Logs and Impact Analysis/008. 4.7 Impact Analysis.mp4
51.0 MB
01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/007. 7.6 SOC and FPGA.mp4
50.5 MB
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/006. 1.5 Network architecture.mp4
50.1 MB
01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/010. 7.9 Industrial Control Systems (ICS) and Process Automation.mp4
46.2 MB
01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/004. 7.3 Internet of Things (IoT) and Embedded Devices Part 2.mp4
45.3 MB
04 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/013. 4.12 Threat modeling.mp4
43.6 MB
[磁力链接]
添加时间:
2024-05-31
大小:
3.8 GB
最近下载:
2024-12-01
热度:
2128
[ DevCourseWeb.com ] Udemy - Crush Any Cybersecurity Exam!
~Get Your Files Here !/2. The Blue Print/9. Exam Tips.mp4
247.1 MB
~Get Your Files Here !/2. The Blue Print/2. Soft Commit & Motivation.mp4
59.0 MB
~Get Your Files Here !/2. The Blue Print/1. Do This First!.mp4
35.4 MB
~Get Your Files Here !/1. Introduction/1. Welcome!.mp4
29.1 MB
~Get Your Files Here !/1. Introduction/3. What you'll learn in this course.mp4
25.9 MB
~Get Your Files Here !/2. The Blue Print/4. Must Have Tools.mp4
12.8 MB
~Get Your Files Here !/2. The Blue Print/8. Practice Tests (Gamify).mp4
9.5 MB
~Get Your Files Here !/2. The Blue Print/5. Study Plan & Schedule.mp4
9.5 MB
~Get Your Files Here !/2. The Blue Print/11. Beyond The Exam.mp4
9.2 MB
~Get Your Files Here !/2. The Blue Print/10. Exam Tips - Continued.mp4
7.3 MB
~Get Your Files Here !/2. The Blue Print/6. Hard Commit ($$$).mp4
3.7 MB
~Get Your Files Here !/1. Introduction/3.1 What you'll learn in this course.pdf
271.1 kB
~Get Your Files Here !/2. The Blue Print/2.1 CertificationNameHere_Study Matrix-Template.xlsx
12.8 kB
~Get Your Files Here !/2. The Blue Print/9. Exam Tips.srt
12.1 kB
~Get Your Files Here !/2. The Blue Print/2. Soft Commit & Motivation.srt
10.0 kB
~Get Your Files Here !/2. The Blue Print/1. Do This First!.srt
8.4 kB
~Get Your Files Here !/2. The Blue Print/4. Must Have Tools.srt
3.7 kB
~Get Your Files Here !/2. The Blue Print/11. Beyond The Exam.srt
2.8 kB
~Get Your Files Here !/1. Introduction/3. What you'll learn in this course.srt
2.2 kB
~Get Your Files Here !/1. Introduction/1. Welcome!.srt
1.6 kB
[磁力链接]
添加时间:
2024-06-02
大小:
448.8 MB
最近下载:
2024-11-30
热度:
161
Coursera - Cybersecurity Operations Fundamentals Specialization 2024
Coursera - Security Operations Center (SOC) 2024-1/01_introduction-to-security-operations-center/03_soc-environment-today/01_soc-environment-today.mp4
32.8 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/04_linux-file-system-overview/01_linux-file-system-overview.mp4
26.4 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/15_linux-command-shell-concepts/01_linux-command-shell-concepts.mp4
25.9 MB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/16_controlling-services-and-processes/01_controlling-services-and-processes.mp4
22.4 MB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/08_packet-capture-using-tcpdump/01_packet-capture-using-tcpdump.mp4
19.3 MB
Coursera - Security Operations Center (SOC) 2024-1/04_staffing-an-effective-soc-team/03_interaction-of-different-roles-within-the-soc/02_interaction-of-various-roles-within-the-soc.mp4
18.9 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/21_viewing-running-network-services/01_viewing-running-network-services.mp4
18.0 MB
Coursera - Security Operations Center (SOC) 2024-1/03_soc-deployment-models-and-types/02_soc-types-and-staffing-considerations/02_soc-types-and-staffing-considerations.mp4
17.8 MB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/20_windows-netstat-command/01_windows-netstat-command.mp4
17.7 MB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/04_ip-vulnerabilities/02_ip-vulnerabilities.mp4
16.6 MB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/02_host-based-personal-firewall/01_host-based-personal-firewall.mp4
16.3 MB
Coursera - Security Operations Center (SOC) 2024-1/03_soc-deployment-models-and-types/03_soc-models-and-their-consumers/02_soc-models-and-their-consumers.mp4
16.1 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/13_system-processes/01_system-processes.mp4
15.9 MB
Coursera - Security Operations Center (SOC) 2024-1/06_developing-key-relationships-with-internal-and-external-stakeholders/03_external-stakeholders/02_external-stakeholders.mp4
15.3 MB
Coursera - Security Operations Center (SOC) 2024-1/01_introduction-to-security-operations-center/04_goal-of-a-soc/01_goal-of-a-soc.mp4
15.0 MB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/05_http-operations/02_http-operations.mp4
14.5 MB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/16_netflow-as-a-security-tool/01_netflow-as-a-security-tool.mp4
14.5 MB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/08_windows-file-system-structure/01_windows-file-system-structure.mp4
14.3 MB
Coursera - Security Operations Center (SOC) 2024-1/05_security-events-data-and-soc-analyst-tools/02_soc-relevant-data-and-security-event-data/01_soc-relevant-data-and-security-event-data-introduction.mp4
14.0 MB
Coursera - Security Operations Center (SOC) 2024-1/06_developing-key-relationships-with-internal-and-external-stakeholders/02_internal-stakeholders/02_internal-stakeholders.mp4
13.7 MB
[磁力链接]
添加时间:
2024-06-03
大小:
2.0 GB
最近下载:
2024-12-01
热度:
455
Rajesh K. Ultimate Microsoft Cybersecurity Architect SC-100 Exam Guide...2024
Rajesh K. Ultimate Microsoft Cybersecurity Architect SC-100 Exam Guide...2024.pdf
39.4 MB
[磁力链接]
添加时间:
2024-06-04
大小:
39.4 MB
最近下载:
2024-12-02
热度:
3577
Cybersecurity - Attack and Defense Strategies - Second Edition.mobi
Cybersecurity - Attack and Defense Strategies - Second Edition.mobi
141.0 MB
[磁力链接]
添加时间:
2024-06-05
大小:
141.0 MB
最近下载:
2024-12-01
热度:
141
Kaushik K. Advanced Techniques and Applications of Cybersecurity..Forensics 2025
Kaushik K. Advanced Techniques and Applications of Cybersecurity & Forensics 2025.pdf
33.5 MB
[磁力链接]
添加时间:
2024-06-22
大小:
33.5 MB
最近下载:
2024-12-01
热度:
2172
Adedoyin F. Handbook of Research on Cybersecurity Risk...Business Systems 2023
Adedoyin F. Handbook of Research on Cybersecurity Risk...Business Systems 2023.pdf
31.6 MB
[磁力链接]
添加时间:
2024-07-03
大小:
31.6 MB
最近下载:
2024-11-29
热度:
370
[ FreeCourseWeb.com ] Oreilly - Cybersecurity and Cloud Computing Challenges
~Get Your Course Here !/08 - Technology Services.mp4
25.6 MB
~Get Your Course Here !/12 - Cloud Attack Vectors and Security Considerations by Service Model.mp4
17.2 MB
~Get Your Course Here !/04 - Cloud Service Models.mp4
14.6 MB
~Get Your Course Here !/10 - STRIDE Threat Model and Top Threats.mp4
13.7 MB
~Get Your Course Here !/09 - Notional Cloud Service Provide.mp4
11.4 MB
~Get Your Course Here !/01 - Cloud Data Security.mp4
9.9 MB
~Get Your Course Here !/05 - NIST Cloud Reference Model and Key Ecosystem Roles.mp4
9.1 MB
~Get Your Course Here !/07 - Cloud Cross-cutting Aspects.mp4
8.8 MB
~Get Your Course Here !/03 - Cloud Deployment Models.mp4
8.1 MB
~Get Your Course Here !/06 - Cloud Computing Team Functions.mp4
7.4 MB
~Get Your Course Here !/11 - Treacherous 12.mp4
6.2 MB
~Get Your Course Here !/02 - Transparency Reports Database.mp4
3.9 MB
How to Support [ FreeCourseWeb.com ] for Free.txt
450 Bytes
~Get Your Course Here !/How to Support [ FreeCourseWeb.com ] for Free.txt
450 Bytes
Get More App Tips and Secrets!.url
177 Bytes
~Get Your Course Here !/Resources.url
177 Bytes
~Get All Courses Here !.url
175 Bytes
~Get Your Course Here !/Bonus Courses + Project Files.url
173 Bytes
[磁力链接]
添加时间:
2024-07-03
大小:
135.9 MB
最近下载:
2024-10-18
热度:
176
Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/6. Azure Security Benchmark - Microsoft Certified Cybersecurity-1.mp4
113.5 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/2. Hybrid Environmental Security Strategies - Microsoft Certifi.mp4
63.8 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/1. Specify Priorities for Mitigating Threats to Apps - Microsof-1.mp4
62.3 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/6. Designing a Regulatory Compliance Strategy/4. Implementing Azure Policy - Microsoft Certified Cybersecurit.mp4
59.0 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/7. Evaluating and Managing Security Postures/6. Mitigating Identified Risks - Microsoft Certified Cybersecur-1.mp4
53.6 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/4. Traffic Filtering and Segmentation Strategies - Microsoft Ce-1.mp4
53.4 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/4. Priorities For Mitigating Threats To Data - Microsoft Certif-1.mp4
53.4 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/5. Azure Best Practices for Network Security - Microsoft Certif-1.mp4
52.2 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/5. Hybrid Infrastructure - Microsoft Certified Cybersecurity Ar-1.mp4
50.4 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/6. Designing a Regulatory Compliance Strategy/6. Translating Privacy Requirements - Microsoft Certified Cyber.mp4
49.7 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/9. Designing a Strategy for Securing SaaS, PaaS, and IaaS Services/1. Security Baselines for SaaS, PaaS, and IaaS services - Micro.mp4
48.3 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/3. Translating Business Goals into Security Requirements - Micr.mp4
47.9 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/7. Securing Privileged Access Using RaMP - Microsoft Certified -1.mp4
47.8 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/2. Security Operations - Microsoft Certified Cybersecurity Arch-1.mp4
47.0 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/4. Designing a Security Operations Strategy/5. SIEMSOAR Strategy - Microsoft Certified Cybersecurity Archit.mp4
46.3 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/2. Translating Requirements - Microsoft Certified Cybersecurity.mp4
46.2 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/3. Security Strategy for Applications and APIs - Microsoft Cert-1.mp4
44.6 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/5. Designing an Identity Security Strategy/1. Strategy for Access to Cloud Resources - Microsoft Certified.mp4
43.0 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/7. Evaluating and Managing Security Postures/4. Designing Security for an Azure Landing Zone - Microsoft Cer.mp4
42.8 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/4. Designing a Security Operations Strategy/3. Logging and Auditing Strategy - Microsoft Certified Cybersec.mp4
42.3 MB
[磁力链接]
添加时间:
2024-07-04
大小:
2.5 GB
最近下载:
2024-11-30
热度:
476
Theoretical Foundations of AI in Cybersecurity
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/3. Fundamental Theories of AI/7. Case Study Revolutionizing Cybersecurity with Natural Language Processing.mp4
57.4 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/7. Deep Learning for Cyber Defense/11. Case Study Unraveling the Challenges of Deploying Deep Learning Models.mp4
52.3 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/7. Deep Learning for Cyber Defense/3. Case Study Enhancing Cybersecurity with Neural Networks.mp4
49.2 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/13. AI in Vulnerability Management/9. Case Study AI-Driven Transformation in Vulnerability Management.mp4
48.5 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/4. Cybersecurity Fundamentals/4. Types of Cyber Threats.mp4
48.4 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/15. AI in Network Security/9. Case Study AI in Network Security.mp4
48.1 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/2. Introduction to Cybersecurity and AI/8. Key Concepts and Terminologies.mp4
47.1 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/10. AI for Intrusion Detection Systems (IDS)/7. Case Study Implementing AI-Based Intrusion Detection Systems.mp4
46.9 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/2. Introduction to Cybersecurity and AI/4. Overview of Cybersecurity.mp4
46.5 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/10. AI for Intrusion Detection Systems (IDS)/9. Case Study Enhancing Cybersecurity with AI-Powered Intrusion Detection Systems.mp4
46.2 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/4. Cybersecurity Fundamentals/11. Case Study Revamping Cybersecurity Strategy at TechNova.mp4
44.9 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/5. Intersection of AI and Cybersecurity/11. Case Study Integrating AI for Enhanced Cybersecurity.mp4
44.4 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/7. Deep Learning for Cyber Defense/2. Neural Networks in Cybersecurity.mp4
44.2 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/11. AI for Threat Hunting/8. Case Studies and Examples.mp4
43.8 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/8. Natural Language Processing in Cybersecurity/3. Case Study Enhancing Cybersecurity Threat Intelligence.mp4
43.7 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/6. Machine Learning in Cybersecurity/2. Supervised Learning for Threat Detection.mp4
43.5 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/8. Natural Language Processing in Cybersecurity/11. Case Study Overcoming NLP Limitations in Cybersecurity.mp4
43.5 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/14. AI and Cyber Threat Intelligence/6. Theoretical Models and Techniques.mp4
43.4 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/9. Reinforcement Learning in Cyber Defense/5. Case Study Revolutionizing Cybersecurity with Reinforcement Learning.mp4
43.2 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/2. Introduction to Cybersecurity and AI/7. Case Study AI in Cybersecurity.mp4
42.9 MB
[磁力链接]
添加时间:
2024-07-08
大小:
6.1 GB
最近下载:
2024-12-01
热度:
6552
Nichols L. Cybersecurity Architect's Handbook. An end-to-end guide...2024
Nichols L. Cybersecurity Architect's Handbook. An end-to-end guide...2024.pdf
46.6 MB
Nichols L. Cybersecurity Accompaniment. Labs and Exercises.pdf
17.0 MB
[磁力链接]
添加时间:
2024-07-10
大小:
63.6 MB
最近下载:
2024-12-01
热度:
1784
sccnc-Cybersecurity
Cybersecurity.HD.mov
42.6 MB
Cybersecurity.mp4
7.4 MB
Cybersecurity.mp3
886.9 kB
Cybersecurity.png
40.9 kB
sccnc-Cybersecurity_meta.sqlite
20.5 kB
Cybersecurity.es.vtt
9.7 kB
Cybersecurity.en.vtt
8.2 kB
sccnc-Cybersecurity_meta.xml
1.6 kB
[磁力链接]
添加时间:
2024-07-12
大小:
51.0 MB
最近下载:
2024-07-24
热度:
4
[ CourseLala.com ] Linkedin - Cybersecurity Awareness - Web3, Crypto, and NFTs
~Get Your Files Here !/02 - 1. CYA Cover Your Assets/04 - Thinking like an attacker.mp4
8.7 MB
~Get Your Files Here !/03 - 2. Wallet Security/01 - Custodial wallets.mp4
7.7 MB
~Get Your Files Here !/03 - 2. Wallet Security/04 - Hardware wallets.mp4
7.3 MB
~Get Your Files Here !/03 - 2. Wallet Security/02 - Hot wallets.mp4
6.9 MB
~Get Your Files Here !/05 - 4. Traditional Web2 Attacks Used in Web3/02 - Website hijacking Spoofing.mp4
6.2 MB
~Get Your Files Here !/06 - Conclusion/01 - Key takeaways.mp4
5.7 MB
~Get Your Files Here !/02 - 1. CYA Cover Your Assets/02 - Digital assets, part 2 NFTs.mp4
5.5 MB
~Get Your Files Here !/04 - 3. Blockchain Specific AttacksScams/02 - Interacting with scam dappssmart contracts, part 2.mp4
5.5 MB
~Get Your Files Here !/05 - 4. Traditional Web2 Attacks Used in Web3/01 - Phishing.mp4
5.4 MB
~Get Your Files Here !/03 - 2. Wallet Security/03 - Demo Installing a hot wallet.mp4
5.4 MB
~Get Your Files Here !/02 - 1. CYA Cover Your Assets/03 - Crypto wallets.mp4
5.2 MB
~Get Your Files Here !/04 - 3. Blockchain Specific AttacksScams/01 - Interacting with scam dappssmart contracts, part 1.mp4
4.6 MB
~Get Your Files Here !/01 - Introduction/01 - Staying safe on your journey into Web3.mp4
3.4 MB
~Get Your Files Here !/02 - 1. CYA Cover Your Assets/01 - Digital assets, part 1 Cryptocurrencies.mp4
3.3 MB
~Get Your Files Here !/01 - Introduction/02 - What to know before you begin.mp4
2.6 MB
~Get Your Files Here !/06 - Conclusion/02 - Next steps.mp4
1.7 MB
~Get Your Files Here !/03 - 2. Wallet Security/02 - Hot wallets.srt
6.2 kB
~Get Your Files Here !/03 - 2. Wallet Security/04 - Hardware wallets.srt
6.1 kB
~Get Your Files Here !/03 - 2. Wallet Security/01 - Custodial wallets.srt
5.1 kB
~Get Your Files Here !/04 - 3. Blockchain Specific AttacksScams/02 - Interacting with scam dappssmart contracts, part 2.srt
4.9 kB
[磁力链接]
添加时间:
2024-07-23
大小:
85.2 MB
最近下载:
2024-11-29
热度:
251
Miller S. Cybersecurity, Ethics, and Collective Responsibility 2024
Miller S. Cybersecurity, Ethics, and Collective Responsibility 2024.pdf
21.7 MB
Priyadarshini I. Cybersecurity. Ethics, Legal, Risks, and Policies 2021.pdf
8.7 MB
Readme.txt
957 Bytes
[磁力链接]
添加时间:
2024-07-25
大小:
30.5 MB
最近下载:
2024-12-02
热度:
1344
[ FreeCourseWeb.com ] Udemy - Cybersecurity Assessment For Small And Mid Size Business
~Get Your Files Here !/2 - Physical Security HardwareSoftware Personnel/5 - Is there an inventory of all equipment.mp4
66.2 MB
~Get Your Files Here !/5 - Website Social Media/17 - Do all employees have web access and is it monitored.mp4
64.1 MB
~Get Your Files Here !/4 - Login Password/12 - Can employees reset passwords lock out owners.mp4
64.1 MB
~Get Your Files Here !/2 - Physical Security HardwareSoftware Personnel/3 - Is hardware software maintained internally.mp4
57.0 MB
~Get Your Files Here !/8 - Conclusion whats next/21 - Conclusion.mp4
51.8 MB
~Get Your Files Here !/3 - Mobile Devices BYOD/8 - Who owns the mobile devices used within the company.mp4
50.3 MB
~Get Your Files Here !/2 - Physical Security HardwareSoftware Personnel/6 - Does the company know who report an incident to and the procedure to do so.mp4
50.1 MB
~Get Your Files Here !/2 - Physical Security HardwareSoftware Personnel/4 - Hardware or software older than 5 years old.mp4
49.2 MB
~Get Your Files Here !/7 - Analyze the risk/20 - What are the threats you face.mp4
40.2 MB
~Get Your Files Here !/3 - Mobile Devices BYOD/11 - VPN solution.mp4
37.1 MB
~Get Your Files Here !/4 - Login Password/15 - Is there a strict password creation and update policy in place.mp4
35.9 MB
~Get Your Files Here !/6 - Data Storage Backup/18 - Does the company use cloud based backup services.mp4
33.8 MB
~Get Your Files Here !/5 - Website Social Media/16 - Who has access and authorization to distribute websocial media content.mp4
33.8 MB
~Get Your Files Here !/4 - Login Password/13 - Does someone monitor login activity.mp4
33.2 MB
~Get Your Files Here !/4 - Login Password/14 - SEIM solution for SMB.mp4
30.7 MB
~Get Your Files Here !/6 - Data Storage Backup/19 - Are regulatory guidelines being followed HIPPA DoD PCI.mp4
28.1 MB
~Get Your Files Here !/3 - Mobile Devices BYOD/9 - Are devices set to auto connect to Bluetooth and WiFi networks.mp4
25.2 MB
~Get Your Files Here !/3 - Mobile Devices BYOD/10 - Is a VPN being used for remote access.mp4
23.8 MB
~Get Your Files Here !/1 - Introduction/2 - Frameworks.mp4
23.2 MB
~Get Your Files Here !/2 - Physical Security HardwareSoftware Personnel/7 - A possible solution.mp4
11.0 MB
[磁力链接]
添加时间:
2024-07-26
大小:
824.7 MB
最近下载:
2024-12-01
热度:
416
Raj P. Leveraging AI Competencies for Next-Generation Cybersecurity Sol. 2024
Raj P. Leveraging AI Competencies for Next-Generation Cybersecurity Sol. 2024.pdf
34.2 MB
[磁力链接]
添加时间:
2024-08-28
大小:
34.2 MB
最近下载:
2024-11-29
热度:
1091
共15页
上一页
10
11
12
13
14
15
下一页