搜索
为您找到约
275
个磁力链接/BT种子,耗时 0 毫秒。
排序:
相关程度
热度
文件大小
添加时间
最近访问
[ CourseLala.com ] Linkedin - IT and Cybersecurity Risk Management Essential Training
~Get Your Files Here !/4. IT Risk Management in Practice/019. IT risk management techniques.mp4
60.9 MB
~Get Your Files Here !/3. IT Risk Management in Context/009. IT risk management in medium companies.mp4
58.5 MB
~Get Your Files Here !/3. IT Risk Management in Context/010. IT risk management in large companies.mp4
57.2 MB
~Get Your Files Here !/5. IT Risk Management on the Job/020. Choosing the right IT risk management technique.mp4
52.4 MB
~Get Your Files Here !/5. IT Risk Management on the Job/023. Operating controls.mp4
47.2 MB
~Get Your Files Here !/2. What Is IT Risk Management/002. What is IT risk.mp4
42.6 MB
~Get Your Files Here !/4. IT Risk Management in Practice/014. Performing the IT risk assessment.mp4
41.3 MB
~Get Your Files Here !/4. IT Risk Management in Practice/018. Using an IT risk register.mp4
40.9 MB
~Get Your Files Here !/4. IT Risk Management in Practice/015. Choosing an IT risk management framework.mp4
40.0 MB
~Get Your Files Here !/3. IT Risk Management in Context/008. IT risk management in small companies.mp4
39.5 MB
~Get Your Files Here !/5. IT Risk Management on the Job/022. Implementing controls.mp4
35.1 MB
~Get Your Files Here !/2. What Is IT Risk Management/006. IT risk management roles and responsibilities.mp4
34.9 MB
~Get Your Files Here !/5. IT Risk Management on the Job/021. Choosing controls.mp4
34.4 MB
~Get Your Files Here !/2. What Is IT Risk Management/007. Making an IT risk decision.mp4
33.9 MB
~Get Your Files Here !/2. What Is IT Risk Management/005. Types of IT risks.mp4
33.3 MB
~Get Your Files Here !/3. IT Risk Management in Context/013. The minimum viable approach.mp4
32.7 MB
~Get Your Files Here !/3. IT Risk Management in Context/011. Quantitative vs. qualitative risk assessments.mp4
32.6 MB
~Get Your Files Here !/4. IT Risk Management in Practice/017. Determining an acceptable level of IT risk.mp4
30.3 MB
~Get Your Files Here !/5. IT Risk Management on the Job/024. Validating controls.mp4
29.9 MB
~Get Your Files Here !/2. What Is IT Risk Management/004. What is IT risk tolerance.mp4
28.4 MB
[磁力链接]
添加时间:
2022-02-10
大小:
904.4 MB
最近下载:
2025-03-01
热度:
1767
[ CourseHulu.com ] Linkedin - Building an ISO 27001-Compliant Cybersecurity Program - Getting Started
~Get Your Files Here !/6. Planning (Clause 6)/016. Information security risk assessment (Clause 6.1.2).mp4
55.1 MB
~Get Your Files Here !/2. ISO 27001 Overview/003. What is the ISO 27001 standard.mp4
45.1 MB
~Get Your Files Here !/3. Complying with ISO 27001/009. Building your ISO 27001 compliance plan.mp4
41.8 MB
~Get Your Files Here !/3. Complying with ISO 27001/008. What to expect when getting ISO 27001 certified.mp4
38.6 MB
~Get Your Files Here !/8. Performance Evaluation and Improvement (Clauses 9 and 10)/024. Internal audit (Clause 9.2).mp4
34.2 MB
~Get Your Files Here !/2. ISO 27001 Overview/004. Breaking down the ISO 27001 standard.mp4
32.4 MB
~Get Your Files Here !/7. Support and Operation (Clauses 7 and 8)/021. Documented information (Clause 7.5).mp4
32.4 MB
~Get Your Files Here !/5. Leadership (Clause 5)/014. Policy (Clause 5.2).mp4
32.3 MB
~Get Your Files Here !/2. ISO 27001 Overview/006. ISO 27001 gaps and criticisms.mp4
31.3 MB
~Get Your Files Here !/3. Complying with ISO 27001/007. ISO 27001 compliance and certification.mp4
30.8 MB
~Get Your Files Here !/5. Leadership (Clause 5)/013. Leadership and commitment (Clause 5.1).mp4
29.4 MB
~Get Your Files Here !/6. Planning (Clause 6)/017. Information security risk treatment (Clause 6.1.3).mp4
27.9 MB
~Get Your Files Here !/2. ISO 27001 Overview/005. Why build an ISO 27001-compliant
cybersecurity
program.mp4
27.0 MB
~Get Your Files Here !/5. Leadership (Clause 5)/015. Organizational roles, responsibilities, and authorities (Clause 5.3).mp4
26.6 MB
~Get Your Files Here !/6. Planning (Clause 6)/018. Information security objectives and planning to achieve them (Clause 6.2).mp4
23.8 MB
~Get Your Files Here !/8. Performance Evaluation and Improvement (Clauses 9 and 10)/025. Management review (Clause 9.3).mp4
20.6 MB
~Get Your Files Here !/7. Support and Operation (Clauses 7 and 8)/020. Communication (Clause 7.4).mp4
19.7 MB
~Get Your Files Here !/9. Conclusion/027. Next steps to take with ISO 27001.mp4
11.6 MB
~Get Your Files Here !/1. Introduction/001. The international standard for information security.mp4
10.1 MB
~Get Your Files Here !/1. Introduction/002. Who this course is for and prerequisites.mp4
9.0 MB
[磁力链接]
添加时间:
2022-02-18
大小:
580.9 MB
最近下载:
2025-02-27
热度:
3087
Palo Alto Networks Cybersecurity Fundamentals (PCCSA)
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/2. Identify Computing and Networking Trends.mp4
269.3 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/12. Identify Networking Security Technologies.mp4
267.8 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/3. Describe Cybersecurity Threats.mp4
243.2 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/5. Identify Wi-Fi Vulnerabilities and Attacks.mp4
231.3 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/10. Review Network Addressing.mp4
228.2 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/4. Describe Common Cyberattack Techniques.mp4
217.8 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/17. Endpoint Security.mp4
206.1 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/7. Identify Basic Internet and Network Operations.mp4
204.7 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/8. Describe Routing Protocols.mp4
196.9 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/15. Learn Basic Virtualization Security Concepts.mp4
190.8 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/9. Review Networking Models.mp4
190.3 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/18. Server and System Administration.mp4
186.8 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/26. Describe Cortex XSOAR and AutoFocus.mp4
177.9 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/16. Learn Basic DevOps Security Concepts.mp4
176.4 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/14. Learn Basic Cloud Security Concepts.mp4
169.8 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/11. Learn Networking Security Models.mp4
169.5 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/20. Identify Palo Alto Networks Security Solutions.mp4
168.8 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/21. Describe Basic NGFW Components and Functions.mp4
146.3 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/13. Learn Basic Data Center Security Concepts.mp4
134.9 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/22. Learn Basic Prisma Cloud.mp4
134.6 MB
[磁力链接]
添加时间:
2022-02-19
大小:
4.5 GB
最近下载:
2025-03-01
热度:
6838
[TutorialPace.com] Lynda - Cybersecurity with Cloud Computing - [TP]
00. Introduction/00_01 - Welcome.mp4
17.4 MB
00. Introduction/00_03 - Reference sites.mp4
16.6 MB
01. Cloud Fundamentals/01_01 - Defining the essential characteristics of cloud.mp4
15.8 MB
02. Cloud Security Guidance/02_03 - Managing information and data security.mp4
15.6 MB
03. Architecting Security/03_05 - Introducing cloud attribute taxonomy.mp4
15.5 MB
03. Architecting Security/03_01 - Introducing SABSA.mp4
15.3 MB
01. Cloud Fundamentals/01_06 - Identifying cloud incidents.mp4
15.2 MB
01. Cloud Fundamentals/01_09 - Defining trust models for cloud.mp4
14.0 MB
02. Cloud Security Guidance/02_16 - Solution Cloud security knowledge.mp4
13.8 MB
02. Cloud Security Guidance/02_02 - Complying with legal and audit requrements.mp4
13.1 MB
02. Cloud Security Guidance/02_11 - Verifying identity in the cloud.mp4
13.1 MB
02. Cloud Security Guidance/02_07 - Managing incident response.mp4
12.9 MB
02. Cloud Security Guidance/02_13 - Implementing virtualization.mp4
12.9 MB
02. Cloud Security Guidance/02_12 - Controlling cloud access.mp4
12.5 MB
02. Cloud Security Guidance/02_08 - Maximizing application security.mp4
12.3 MB
03. Architecting Security/03_02 - Using Fast Tracker.mp4
12.0 MB
02. Cloud Security Guidance/02_05 - Comparing traditional IT, BCP, and DR.mp4
12.0 MB
01. Cloud Fundamentals/01_02 - Understanding infrastructure as a service.mp4
11.9 MB
01. Cloud Fundamentals/01_05 - Discovering deployment models.mp4
11.4 MB
02. Cloud Security Guidance/02_10 - Managing encryption and keys.mp4
10.8 MB
[磁力链接]
添加时间:
2022-02-20
大小:
371.6 MB
最近下载:
2025-03-01
热度:
1692
[ FreeCourseWeb.com ] Udemy - The Complete Cybersecurity Awareness Course For Employees
~Get Your Files Here !/4. Social Engineering and Countermeasures/3. Types of Social Engineering Attacks.mp4
92.1 MB
~Get Your Files Here !/1. Introduction to the Cybersecurity Space/1. Cybersecurity Introduction and Trends.mp4
81.4 MB
~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/7. Malware and Types of Malware.mp4
78.6 MB
~Get Your Files Here !/1. Introduction to the Cybersecurity Space/3. Definitions and Key Terms in Cybersecurity.mp4
74.9 MB
~Get Your Files Here !/2. Cybersecurity Roles and Actors/1. Cybersecurity Roles.mp4
72.2 MB
~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/12. Anti-Malware Protection.mp4
68.9 MB
~Get Your Files Here !/2. Cybersecurity Roles and Actors/4. Security Operations Center.mp4
56.2 MB
~Get Your Files Here !/4. Social Engineering and Countermeasures/5. Social Engineering Countermeasures.mp4
50.8 MB
~Get Your Files Here !/5. Cybersecurity Internal Affairs and Controls/11. Cybersecurity Organizations That Are Resourceful.mp4
44.7 MB
~Get Your Files Here !/5. Cybersecurity Internal Affairs and Controls/1. Privacy Policy.mp4
41.7 MB
~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/19. More Countermeasures - Vulnerability Assessments.mp4
41.1 MB
~Get Your Files Here !/5. Cybersecurity Internal Affairs and Controls/7. Incident Handling.mp4
38.9 MB
~Get Your Files Here !/5. Cybersecurity Internal Affairs and Controls/9. IT Governance.mp4
36.1 MB
~Get Your Files Here !/2. Cybersecurity Roles and Actors/7. The Different Types of Cybersecurity Actors.mp4
33.5 MB
~Get Your Files Here !/1. Introduction to the Cybersecurity Space/6. Cybersecurity and Social Media.mp4
33.5 MB
~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/17. More Countermeasures -Digital Forensics.mp4
30.5 MB
~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/23. More on Tech and Admin Controls.mp4
30.3 MB
~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/1. Security Threats.mp4
28.4 MB
~Get Your Files Here !/3. Cybersecurity Threats and Countermeasures/21. How To Start and Cybersecurity Program.mp4
27.4 MB
~Get Your Files Here !/5. Cybersecurity Internal Affairs and Controls/3. Good User Habits.mp4
27.0 MB
[磁力链接]
添加时间:
2022-02-21
大小:
1.1 GB
最近下载:
2025-03-01
热度:
1303
Cybersecurity Hacker - Linux With Little Trouble Cybercrime And The Dark Net {BooksHash}
Cybersecurity.Hacker.Linux.With.Little.Trouble.pdf
71.8 MB
Downloaded from BooksHash.com.txt
318 Bytes
[磁力链接]
添加时间:
2022-02-22
大小:
71.8 MB
最近下载:
2025-02-28
热度:
1510
Pluralsight - Cybersecurity Threats: Ransomware
5. Incident Response - Eradication and Recovery/29. NoMoreRansom.org.mp4
71.4 MB
2. What Is Ransomware/09. Demo of Real World Ransomware Attack.mp4
52.0 MB
5. Incident Response - Eradication and Recovery/30. Paying the Ransom.mp4
22.3 MB
2. What Is Ransomware/03. Definition and Types of Ransomware.mp4
20.3 MB
2. What Is Ransomware/04. The Ransomware Timeline.mp4
15.2 MB
5. Incident Response - Eradication and Recovery/27. Recovery Cloud Storage Files, Dropbox, and OneDrive.mp4
15.1 MB
2. What Is Ransomware/06. How Big Is the Problem.mp4
15.1 MB
2. What Is Ransomware/07. Ransomware Victims.mp4
11.7 MB
6. Countermeasures and Preparing Your Incident Response/33. Defending a Ransomware Attack.mp4
11.4 MB
6. Countermeasures and Preparing Your Incident Response/36. Lessons Learned and Your Incident Response Plan.mp4
10.9 MB
3. Ransomware Entry Points/14. Phishing and Email Attachments.mp4
10.6 MB
4. Incident Response - Detection and Containment/22. Containing the Attack.mp4
9.0 MB
6. Countermeasures and Preparing Your Incident Response/34. Protecting a Windows Network.mp4
8.0 MB
4. Incident Response - Detection and Containment/21. Detecting an Attack.mp4
7.3 MB
5. Incident Response - Eradication and Recovery/26. Recovery Local and Network Files.mp4
7.3 MB
3. Ransomware Entry Points/17. Command and Callback (C&C) and Indicators of Compromise.mp4
7.0 MB
5. Incident Response - Eradication and Recovery/28. Tools and Resources.mp4
6.7 MB
2. What Is Ransomware/10. Variations of Ransomware.mp4
6.4 MB
3. Ransomware Entry Points/15. Embedded Hyperlinks, Websites_downloads, and Drive-by Infections.mp4
6.2 MB
5. Incident Response - Eradication and Recovery/31. Summary.mp4
6.0 MB
[磁力链接]
添加时间:
2022-02-22
大小:
388.1 MB
最近下载:
2025-01-10
热度:
15
[ FreeCourseWeb.com ] Linkedin - Cybersecurity Awareness - Phishing Attacks
~Get Your Files Here !/4. How to Catch a Phish/012. Catch a phish red-handed Common indicators of a phish.mp4
48.9 MB
~Get Your Files Here !/3. Different Types of Phishing Attacks/010. Other notable methods of phishing.mp4
47.3 MB
~Get Your Files Here !/2. An Overview of Phishing/004. How does phishing affect us.mp4
46.9 MB
~Get Your Files Here !/2. An Overview of Phishing/005. A review of the psychology behind social engineering attacks.mp4
45.0 MB
~Get Your Files Here !/5. How to Defend against Phishing Attacks/015. How technology helps with the fight against phishing attacks.mp4
41.6 MB
~Get Your Files Here !/4. How to Catch a Phish/013. Is this a phish Real-world examples of phishing attacks.mp4
38.5 MB
~Get Your Files Here !/3. Different Types of Phishing Attacks/007. Unfriended How to spot a social media phish.mp4
38.5 MB
~Get Your Files Here !/4. How to Catch a Phish/011. What makes phishing attacks successful.mp4
36.9 MB
~Get Your Files Here !/3. Different Types of Phishing Attacks/008. Getting specific with targeted phishing attacks.mp4
34.9 MB
~Get Your Files Here !/3. Different Types of Phishing Attacks/006. Is it a harmless unknown caller or vishing.mp4
34.6 MB
~Get Your Files Here !/6. What Happens If You Fall for a Phish/018. Falling for a phishing attack at home.mp4
34.5 MB
~Get Your Files Here !/2. An Overview of Phishing/003. Money is the motive The reason behind phishing.mp4
34.1 MB
~Get Your Files Here !/5. How to Defend against Phishing Attacks/016. Practice makes perfect An overview of phishing simulations.mp4
32.6 MB
~Get Your Files Here !/2. An Overview of Phishing/002. Phishing The dangers of email.mp4
32.3 MB
~Get Your Files Here !/3. Different Types of Phishing Attacks/009. SMS phishing A text-based attack.mp4
31.8 MB
~Get Your Files Here !/6. What Happens If You Fall for a Phish/017. Responding to a phishing attack at work.mp4
23.4 MB
~Get Your Files Here !/5. How to Defend against Phishing Attacks/014. The most common ways to defend against a phish.mp4
23.1 MB
~Get Your Files Here !/1. Introduction/001. About phishing attacks.mp4
9.8 MB
~Get Your Files Here !/7. Conclusion/019. Next steps and takeaways.mp4
7.8 MB
~Get Your Files Here !/Ex_Files_Cybersecurity_Awareness_Phishing_Attacks/Exercise Files/Additional Resources.pdf
47.6 kB
[磁力链接]
添加时间:
2022-03-04
大小:
642.7 MB
最近下载:
2025-02-26
热度:
1420
Trust Genics - 2020 - Cybersecurity (Technology)
Cybersecurity.mp3
109.7 MB
Cybersecurity.jpg
52.5 kB
Cybersecurity - Trust Genics - 2020.txt
2.1 kB
Downloaded From TorrentGalaxy.txt
583 Bytes
Downloaded From Glodls.txt
237 Bytes
Downloaded From ETTV.txt
138 Bytes
Downloaded From ProStyleX.txt
101 Bytes
Downloaded From 1337X.txt
96 Bytes
Downloaded From Demonoid.txt
50 Bytes
Downloaded From Katcr.co.txt
43 Bytes
[磁力链接]
添加时间:
2022-03-05
大小:
109.7 MB
最近下载:
2025-03-02
热度:
1049
[ FreeCourseWeb.com ] Udemy - Cybersecurity fundamentals.zip
[ FreeCourseWeb.com ] Udemy - Cybersecurity fundamentals.zip
568.6 MB
[磁力链接]
添加时间:
2022-03-07
大小:
568.6 MB
最近下载:
2025-02-12
热度:
205
[ FreeCourseWeb.com ] Udemy - Master Cybersecurity,Ethical Hacking and Penetrating Testing
~Get Your Files Here !/04 Exposing Hackers - Know Your Enemy/002 Why You Need Security _.mp4
189.8 MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/011 Setting up Labs.mp4
169.5 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/003 What is Privacy, Anonymity and Pseudonymity _.mp4
158.8 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/006 Threat Modelling And Risk Assessment.mp4
158.3 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/008 Confidentiality, Integrity and Availability - (Security Attributes).mp4
141.8 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/004 Security, Vulnerabilities, Threats and Adversaries.mp4
117.8 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/005 Asset Selection.mp4
94.5 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/002 Protect What You Value.mp4
93.7 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/010 Zero Trust Model.mp4
85.7 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/007 Security,Anonymity and Privacy.mp4
59.8 MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/001 What is Cybersecurity _.mp4
34.8 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/009 Defence in Depth.mp4
34.2 MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/008 Who Conduct it _.mp4
26.4 MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/002 What is Ethical Hacking _.mp4
25.8 MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/005 Purpose of Studying Ethical Hacking and Penetrating Testing.mp4
24.3 MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/010 Closure.mp4
23.6 MB
~Get Your Files Here !/04 Exposing Hackers - Know Your Enemy/001 Goals and Learning Objectives - Know Your Enemy.mp4
21.8 MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/009 Who should You Choose _.mp4
20.6 MB
~Get Your Files Here !/03 Exposing Hackers - Know Yourself/001 Goals and Learning Objectives.mp4
19.7 MB
~Get Your Files Here !/02 Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/006 Scope For Ethical Hackers and Penetrating Testers.mp4
18.5 MB
[磁力链接]
添加时间:
2022-03-15
大小:
1.6 GB
最近下载:
2025-03-02
热度:
1883
[ DevCourseWeb.com ] Udemy - Cybersecurity Threat Hunting Professional
~Get Your Files Here !/2. Time to hunt/2. Practical Threat hunting Demo.mp4
121.9 MB
~Get Your Files Here !/2. Time to hunt/1. Case Base Threat Hunting.mp4
93.6 MB
~Get Your Files Here !/2. Time to hunt/3. Indicators of threat attacksIoC.mp4
86.1 MB
~Get Your Files Here !/1. Introduction/11. 7 Effective Threat Hunting Tips.mp4
81.5 MB
~Get Your Files Here !/1. Introduction/10. Hypothesis Testing & Sources of Hypothesis.mp4
78.6 MB
~Get Your Files Here !/4. Course Resources/1. Course Resources.mp4
72.6 MB
~Get Your Files Here !/3. Course Conclusion/1. Course Review.mp4
72.6 MB
~Get Your Files Here !/1. Introduction/8. What is Required for Successful Threat Hunting.mp4
71.2 MB
~Get Your Files Here !/1. Introduction/6. Terms associated with Threat Hunting.mp4
70.5 MB
~Get Your Files Here !/1. Introduction/4. Why threat hunt and attributes of an effective threat hunter.mp4
56.2 MB
~Get Your Files Here !/1. Introduction/9. Threat Hunting Approaches.mp4
55.0 MB
~Get Your Files Here !/1. Introduction/5. Threat Hunting Skillset Requirements.mp4
40.0 MB
~Get Your Files Here !/1. Introduction/7. Threat Hunting Loop.mp4
38.6 MB
~Get Your Files Here !/1. Introduction/2. What is Threat Hunting & Its Primary objective.mp4
35.9 MB
~Get Your Files Here !/1. Introduction/1. Introduction.mp4
29.5 MB
~Get Your Files Here !/1. Introduction/3. What is Threat Hunting & Its Primary objective..mp4
23.3 MB
~Get Your Files Here !/4. Course Resources/1.1 Network Threat Hunting with Tim Crothers.mp4
10.6 MB
~Get Your Files Here !/4. Course Resources/1.2 Resources Links for Threat Hunting Course.pdf
435.7 kB
~Get Your Files Here !/2. Time to hunt/2. Practical Threat hunting Demo.srt
11.9 kB
~Get Your Files Here !/2. Time to hunt/3. Indicators of threat attacksIoC.srt
8.3 kB
[磁力链接]
添加时间:
2022-03-20
大小:
1.0 GB
最近下载:
2025-03-02
热度:
1993
[ CourseMega.com ] Linkedin - Building an ISO 27001-Compliant Cybersecurity Program - The Annex A Controls
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/013. Access control User access management.mp4
60.8 MB
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/028. System lifecycle Security in d.mp4
57.3 MB
~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/017. Physical and environmental security Equipme.mp4
57.2 MB
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/014. Access control System and application.mp4
55.8 MB
~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/032. Management of information security.mp4
54.7 MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/018. Operations security Operational procedures and responsibili.mp4
47.1 MB
~Get Your Files Here !/12. Compliance (Clause A.18)/034. Compliance Compliance with legal and contractual requirements (Claus.mp4
46.5 MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/021. Operations security Logging and monitoring (Clause A.12.4).mp4
45.6 MB
~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/033. Information security continuity an.mp4
45.5 MB
~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/016. Physical and environmental security Secure.mp4
44.8 MB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/004. Contact with auth.mp4
42.7 MB
~Get Your Files Here !/08. Communications Security (Clause A.13)/026. Communications security Information transfer (Clause A..mp4
40.7 MB
~Get Your Files Here !/04. Asset Management (Clause A.8)/010. Asset management Information classification (Clause A.8.2).mp4
40.5 MB
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/027. System lifecycle Security requ.mp4
37.2 MB
~Get Your Files Here !/03. Human Resources Security (Clause A.7)/007. Human resources security During employment (Clause A.7..mp4
34.4 MB
~Get Your Files Here !/08. Communications Security (Clause A.13)/025. Communications security Network security management (Cl.mp4
34.1 MB
~Get Your Files Here !/04. Asset Management (Clause A.8)/009. Asset management Responsibility for assets (Clause A.8.1).mp4
33.3 MB
~Get Your Files Here !/10. Supplier Relationships (Clause A.15)/030. Supplier relationships Information security in supplier.mp4
31.4 MB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/002. Management direct.mp4
31.1 MB
~Get Your Files Here !/04. Asset Management (Clause A.8)/011. Asset management Media handling (Clause A.8.3).mp4
30.4 MB
[磁力链接]
添加时间:
2022-03-29
大小:
1.2 GB
最近下载:
2025-03-02
热度:
5320
[ FreeCourseWeb.com ] Udemy - Cybersecurity Data Science.zip
[ FreeCourseWeb.com ] Udemy - Cybersecurity Data Science.zip
349.0 MB
[磁力链接]
添加时间:
2022-04-08
大小:
349.0 MB
最近下载:
2025-02-26
热度:
157
[ FreeCourseWeb.com ] Udemy - Cybersecurity Habits Masterclass
~Get Your Files Here !/3. Skepticism/4. Slow Down And Frown.mp4
73.5 MB
~Get Your Files Here !/11. Conclusion/1. Well Awareiors.mp4
71.5 MB
~Get Your Files Here !/1. Introduction/1. Introduction.mp4
67.0 MB
~Get Your Files Here !/4. Vigilance/2. The Only Thing We Have To Fear.mp4
66.7 MB
~Get Your Files Here !/4. Vigilance/1. The Face Of The Enemy.mp4
66.5 MB
~Get Your Files Here !/5. Secrecy/2. Making It Personal.mp4
65.7 MB
~Get Your Files Here !/2. Literacy/5. Habits And Recipes.mp4
64.7 MB
~Get Your Files Here !/3. Skepticism/1. Zero Trust.mp4
64.5 MB
~Get Your Files Here !/8. Community/4. Habits And Recipes.mp4
57.4 MB
~Get Your Files Here !/8. Community/1. United We Stand.mp4
54.0 MB
~Get Your Files Here !/7. Diligence/3. Random Acts of Security.mp4
53.4 MB
~Get Your Files Here !/7. Diligence/2. Journaling.mp4
53.4 MB
~Get Your Files Here !/9. Mirroring/5. Habits And Recipes.mp4
52.0 MB
~Get Your Files Here !/6. Culture/1. Culture Eats Cybersecurity For Breakfast.mp4
51.4 MB
~Get Your Files Here !/10. Deception/1. Know Thy Enemy.mp4
49.4 MB
~Get Your Files Here !/9. Mirroring/3. Blindspots.mp4
49.1 MB
~Get Your Files Here !/3. Skepticism/2. The Pygmailion Effect.mp4
48.9 MB
~Get Your Files Here !/6. Culture/5. Habits And Recipes.mp4
48.0 MB
~Get Your Files Here !/2. Literacy/1. Fearless Learning.mp4
47.9 MB
~Get Your Files Here !/6. Culture/2. The Hermit Crab Shell.mp4
46.7 MB
[磁力链接]
添加时间:
2022-04-10
大小:
2.1 GB
最近下载:
2025-03-01
热度:
1284
[ CourseLala.com ] Udemy - Personal Digital Security Everyone Must Have - Cybersecurity
~Get Your Files Here !/02 - Secure your computer from unauthorized access/001 Social Engineering.mp4
157.3 MB
~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/007 Secure your Wi-Fi at Home (Video HD).mp4
103.2 MB
~Get Your Files Here !/02 - Secure your computer from unauthorized access/003 Use strong passwords.mp4
93.7 MB
~Get Your Files Here !/03 - What is Malware and its types/003 Spyware.mp4
66.9 MB
~Get Your Files Here !/06 - Secure your Smartphone/003 Communicating Securely with your Smartphone.mp4
64.7 MB
~Get Your Files Here !/03 - What is Malware and its types/002 Adware.mp4
63.9 MB
~Get Your Files Here !/05 - Email Security/002 Fishing.mp4
57.8 MB
~Get Your Files Here !/02 - Secure your computer from unauthorized access/012 Be cautious.mp4
54.8 MB
~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/002 Tips for buying online.mp4
46.0 MB
~Get Your Files Here !/06 - Secure your Smartphone/001 Purses, Wallets, Smartphones.mp4
43.1 MB
~Get Your Files Here !/03 - What is Malware and its types/001 Trojan Horse.mp4
39.6 MB
~Get Your Files Here !/03 - What is Malware and its types/007 Scareware.mp4
39.5 MB
~Get Your Files Here !/03 - What is Malware and its types/004 Browser Hijacking Software.mp4
37.3 MB
~Get Your Files Here !/02 - Secure your computer from unauthorized access/008 Use a VPN.mp4
36.0 MB
~Get Your Files Here !/03 - What is Malware and its types/005 Viruses.mp4
35.6 MB
~Get Your Files Here !/01 - Introduction to Personal Digital Security/003 Some statistics.mp4
35.0 MB
~Get Your Files Here !/02 - Secure your computer from unauthorized access/004 Use password manager.mp4
33.8 MB
~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/001 Safe browsing.mp4
31.8 MB
~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/008 Safe browsing in Social Networks.mp4
31.7 MB
~Get Your Files Here !/01 - Introduction to Personal Digital Security/001 Introduction to Personal Digital Security.mp4
30.4 MB
[磁力链接]
添加时间:
2022-04-12
大小:
1.5 GB
最近下载:
2025-03-01
热度:
690
[ FreeCourseWeb.com ] Udemy - Intoduction to Cybersecurity !From beginner level to PRO !.zip
[ FreeCourseWeb.com ] Udemy - Intoduction to Cybersecurity !From beginner level to PRO !.zip
503.9 MB
[磁力链接]
添加时间:
2022-04-24
大小:
503.9 MB
最近下载:
2025-02-26
热度:
356
Cybersecurity Threat Hunting for SOC Analysts
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/10. Adversary Emulation Caldera.mp4
359.9 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/12. Enhanced Lab Realism Bad Blood + Microsoft ATA + Bloodhound!.mp4
338.8 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/1. Threat Hunting with Splunk + Zeek.mp4
243.3 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/7. Adversary Emulation Atomic Red Team + MITRE ATT&CK.mp4
242.7 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/6. Purple Team Scenario Meterpreter + MSFVenom + Process Injection + Velociraptor!.mp4
225.7 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/3. The Modern Threat Hunting Mindset.mp4
225.3 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/5. The Methodical Guide to Effective Threat Hunting/1. Finding Beacons Long and Cumulative Connections.mp4
201.8 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/6. Proofs Detecting False Negatives/2. Suricata vs RITA Zeus Malware.mp4
195.4 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/5. The Methodical Guide to Effective Threat Hunting/5. Finding Beacons Business Need Analysis (Part 4).mp4
194.3 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/2. Threat Hunting with Splunk + Sysmon.mp4
153.3 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/5. The Methodical Guide to Effective Threat Hunting/4. Finding Beacons Business Need Analysis (Part 3).mp4
139.4 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/5. Beaconing DNS.mp4
135.2 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/8. Beaconing Detection Session Size Analysis.mp4
133.5 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/6. Proofs Detecting False Negatives/1. Suricata Capabilities + Installation!.mp4
129.8 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/3. Tools and resources/8. zeek.mp4
126.9 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/2. The Broken Threat Hunting Mindset.mp4
126.1 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/3. Tools and resources/9. Using zeek + Rita to find Evil!.mp4
118.9 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/1. Understanding the New Adversary.mp4
118.7 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/6. Beaconing CDN.mp4
117.8 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/5. Purple Team Scenario Mimikatz.mp4
115.6 MB
[磁力链接]
添加时间:
2022-05-05
大小:
6.2 GB
最近下载:
2025-03-02
热度:
8952
[ FreeCourseWeb.com ] Udemy - Increasing Business Cybersecurity Standards immediately!
~Get Your Files Here !/03 Understanding Hacking Strategies/001 How does a Hacker look like_.mp4
151.3 MB
~Get Your Files Here !/03 Understanding Hacking Strategies/005 Trends & Outlook.mp4
148.7 MB
~Get Your Files Here !/07 Team Organisation/003 Sharing Files & Accounts.mp4
126.8 MB
~Get Your Files Here !/07 Team Organisation/002 Communication Channels.mp4
116.3 MB
~Get Your Files Here !/07 Team Organisation/001 Cybersecurity Awareness Communication.mp4
115.8 MB
~Get Your Files Here !/10 ADDITIONAL CONTENT/003 Kids & the digital World.mp4
113.9 MB
~Get Your Files Here !/07 Team Organisation/004 Login & Password Management.mp4
73.1 MB
~Get Your Files Here !/10 ADDITIONAL CONTENT/002 Creating safe, secure and Data Protection compliant Products.mp4
72.3 MB
~Get Your Files Here !/10 ADDITIONAL CONTENT/001 Security Standards.mp4
72.2 MB
~Get Your Files Here !/06 Admin Duties/001 ToDo List.mp4
48.8 MB
~Get Your Files Here !/02 The Data Processing Triangle/002 Data Protection.mp4
35.1 MB
~Get Your Files Here !/02 The Data Processing Triangle/001 Overview.mp4
35.1 MB
~Get Your Files Here !/09 The End/001 Closing Statement.mp4
31.3 MB
~Get Your Files Here !/01 Introduction/001 Welcome!.mp4
28.6 MB
~Get Your Files Here !/03 Understanding Hacking Strategies/004 War Stories.mp4
26.9 MB
~Get Your Files Here !/08 Managing Client Data/003 Data Science Projects.mp4
24.7 MB
~Get Your Files Here !/04 Securing Hardware/004 Your invisible Devices.mp4
21.1 MB
~Get Your Files Here !/05 Securing Software & Accounts/002 Service Providers.mp4
19.1 MB
~Get Your Files Here !/01 Introduction/002 Disclaimer.mp4
18.6 MB
~Get Your Files Here !/05 Securing Software & Accounts/001 Daily used Accounts.mp4
18.0 MB
[磁力链接]
添加时间:
2022-05-11
大小:
1.4 GB
最近下载:
2025-03-02
热度:
587
Practical Cybersecurity for IT Professionals
[TutsNode.com] - Practical Cybersecurity for IT Professionals/04 - 3. Firewalls/03 - Advanced Windows Firewall.mp4
27.1 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/05 - 4. Network Scanning/01 - Getting started with Nmap.mp4
22.0 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/02 - 1. Why Cybersecurity/07 - Emerging trends in
cybersecurity
.mp4
20.4 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/02 - 1. Why Cybersecurity/01 - A history of hackers.mp4
17.5 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/04 - 3. Firewalls/05 - Introducing Linux iptables.mp4
16.1 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/04 - 3. Firewalls/02 - Windows Firewall basics.mp4
14.5 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/09 - 8. Network Protocols/02 - Capturing packets with Wireshark.mp4
14.3 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/04 - 3. Firewalls/04 - ZedLan firewall log analyser.mp4
13.4 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/02 - 1. Why Cybersecurity/04 - Common forms of cyberattack.mp4
13.1 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/09 - 8. Network Protocols/03 - Making sense of the protocols.mp4
13.0 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/02 - 1. Why Cybersecurity/02 - The cyber kill chain.mp4
12.0 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/03 - 2. Antivirus/01 - Introducing Microsoft Defender Antivirus.mp4
11.7 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/07 - 6. Vulnerability Scanning/01 - Preparing Nessus.mp4
10.5 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/08 - 7. Web Applications/02 - Running an SQL injection attack.mp4
10.1 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/05 - 4. Network Scanning/02 - Advanced Nmap options.mp4
10.0 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/02 - 1. Why Cybersecurity/03 - Stuxnet and the kill chain.mp4
9.8 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/03 - 2. Antivirus/02 - Detecting malware with Microsoft Defender.mp4
9.5 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/04 - 3. Firewalls/06 - Setting up a simple iptables firewall.mp4
9.3 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/06 - 5. Network Connections/02 - Transferring files using netcat.mp4
9.2 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/06 - 5. Network Connections/04 - Setting up a netcat honeypot.mp4
8.9 MB
[磁力链接]
添加时间:
2023-12-17
大小:
392.7 MB
最近下载:
2025-02-28
热度:
253
共14页
上一页
2
3
4
5
6
7
8
9
10
下一页