搜索
为您找到约
290
个磁力链接/BT种子,耗时 0 毫秒。
排序:
相关程度
热度
文件大小
添加时间
最近访问
[ DevCourseWeb.com ] Udemy - Cybersecurity Threat Hunting Professional
~Get Your Files Here !/2. Time to hunt/2. Practical Threat hunting Demo.mp4
121.9 MB
~Get Your Files Here !/2. Time to hunt/1. Case Base Threat Hunting.mp4
93.6 MB
~Get Your Files Here !/2. Time to hunt/3. Indicators of threat attacksIoC.mp4
86.1 MB
~Get Your Files Here !/1. Introduction/11. 7 Effective Threat Hunting Tips.mp4
81.5 MB
~Get Your Files Here !/1. Introduction/10. Hypothesis Testing & Sources of Hypothesis.mp4
78.6 MB
~Get Your Files Here !/4. Course Resources/1. Course Resources.mp4
72.6 MB
~Get Your Files Here !/3. Course Conclusion/1. Course Review.mp4
72.6 MB
~Get Your Files Here !/1. Introduction/8. What is Required for Successful Threat Hunting.mp4
71.2 MB
~Get Your Files Here !/1. Introduction/6. Terms associated with Threat Hunting.mp4
70.5 MB
~Get Your Files Here !/1. Introduction/4. Why threat hunt and attributes of an effective threat hunter.mp4
56.2 MB
~Get Your Files Here !/1. Introduction/9. Threat Hunting Approaches.mp4
55.0 MB
~Get Your Files Here !/1. Introduction/5. Threat Hunting Skillset Requirements.mp4
40.0 MB
~Get Your Files Here !/1. Introduction/7. Threat Hunting Loop.mp4
38.6 MB
~Get Your Files Here !/1. Introduction/2. What is Threat Hunting & Its Primary objective.mp4
35.9 MB
~Get Your Files Here !/1. Introduction/1. Introduction.mp4
29.5 MB
~Get Your Files Here !/1. Introduction/3. What is Threat Hunting & Its Primary objective..mp4
23.3 MB
~Get Your Files Here !/4. Course Resources/1.1 Network Threat Hunting with Tim Crothers.mp4
10.6 MB
~Get Your Files Here !/4. Course Resources/1.2 Resources Links for Threat Hunting Course.pdf
435.7 kB
~Get Your Files Here !/2. Time to hunt/2. Practical Threat hunting Demo.srt
11.9 kB
~Get Your Files Here !/2. Time to hunt/3. Indicators of threat attacksIoC.srt
8.3 kB
[磁力链接]
添加时间:
2022-03-20
大小:
1.0 GB
最近下载:
2024-11-30
热度:
1773
[ FreeCourseWeb.com ] Engineering Trustworthy Systems- Get Cybersecurity Design Right the First Time (EPUB).zip
[ FreeCourseWeb.com ] Engineering Trustworthy Systems- Get Cybersecurity Design Right the First Time (EPUB).zip
38.4 MB
[磁力链接]
添加时间:
2022-03-28
大小:
38.4 MB
最近下载:
2024-11-22
热度:
116
[ CourseMega.com ] Linkedin - Building an ISO 27001-Compliant Cybersecurity Program - The Annex A Controls
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/013. Access control User access management.mp4
60.8 MB
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/028. System lifecycle Security in d.mp4
57.3 MB
~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/017. Physical and environmental security Equipme.mp4
57.2 MB
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/014. Access control System and application.mp4
55.8 MB
~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/032. Management of information security.mp4
54.7 MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/018. Operations security Operational procedures and responsibili.mp4
47.1 MB
~Get Your Files Here !/12. Compliance (Clause A.18)/034. Compliance Compliance with legal and contractual requirements (Claus.mp4
46.5 MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/021. Operations security Logging and monitoring (Clause A.12.4).mp4
45.6 MB
~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/033. Information security continuity an.mp4
45.5 MB
~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/016. Physical and environmental security Secure.mp4
44.8 MB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/004. Contact with auth.mp4
42.7 MB
~Get Your Files Here !/08. Communications Security (Clause A.13)/026. Communications security Information transfer (Clause A..mp4
40.7 MB
~Get Your Files Here !/04. Asset Management (Clause A.8)/010. Asset management Information classification (Clause A.8.2).mp4
40.5 MB
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/027. System lifecycle Security requ.mp4
37.2 MB
~Get Your Files Here !/03. Human Resources Security (Clause A.7)/007. Human resources security During employment (Clause A.7..mp4
34.4 MB
~Get Your Files Here !/08. Communications Security (Clause A.13)/025. Communications security Network security management (Cl.mp4
34.1 MB
~Get Your Files Here !/04. Asset Management (Clause A.8)/009. Asset management Responsibility for assets (Clause A.8.1).mp4
33.3 MB
~Get Your Files Here !/10. Supplier Relationships (Clause A.15)/030. Supplier relationships Information security in supplier.mp4
31.4 MB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/002. Management direct.mp4
31.1 MB
~Get Your Files Here !/04. Asset Management (Clause A.8)/011. Asset management Media handling (Clause A.8.3).mp4
30.4 MB
[磁力链接]
添加时间:
2022-03-29
大小:
1.2 GB
最近下载:
2024-12-01
热度:
4615
[ CourseMega.com ] Cybersecurity, Privacy and Freedom Protection in the Connected World (EPUB).zip
[ CourseMega.com ] Cybersecurity, Privacy and Freedom Protection in the Connected World (EPUB).zip
39.5 MB
[磁力链接]
添加时间:
2022-04-05
大小:
39.5 MB
最近下载:
2024-11-23
热度:
149
[ FreeCourseWeb.com ] Udemy - Cybersecurity Data Science.zip
[ FreeCourseWeb.com ] Udemy - Cybersecurity Data Science.zip
349.0 MB
[磁力链接]
添加时间:
2022-04-08
大小:
349.0 MB
最近下载:
2024-11-26
热度:
139
[ FreeCourseWeb.com ] Udemy - Cybersecurity Habits Masterclass
~Get Your Files Here !/3. Skepticism/4. Slow Down And Frown.mp4
73.5 MB
~Get Your Files Here !/11. Conclusion/1. Well Awareiors.mp4
71.5 MB
~Get Your Files Here !/1. Introduction/1. Introduction.mp4
67.0 MB
~Get Your Files Here !/4. Vigilance/2. The Only Thing We Have To Fear.mp4
66.7 MB
~Get Your Files Here !/4. Vigilance/1. The Face Of The Enemy.mp4
66.5 MB
~Get Your Files Here !/5. Secrecy/2. Making It Personal.mp4
65.7 MB
~Get Your Files Here !/2. Literacy/5. Habits And Recipes.mp4
64.7 MB
~Get Your Files Here !/3. Skepticism/1. Zero Trust.mp4
64.5 MB
~Get Your Files Here !/8. Community/4. Habits And Recipes.mp4
57.4 MB
~Get Your Files Here !/8. Community/1. United We Stand.mp4
54.0 MB
~Get Your Files Here !/7. Diligence/3. Random Acts of Security.mp4
53.4 MB
~Get Your Files Here !/7. Diligence/2. Journaling.mp4
53.4 MB
~Get Your Files Here !/9. Mirroring/5. Habits And Recipes.mp4
52.0 MB
~Get Your Files Here !/6. Culture/1. Culture Eats Cybersecurity For Breakfast.mp4
51.4 MB
~Get Your Files Here !/10. Deception/1. Know Thy Enemy.mp4
49.4 MB
~Get Your Files Here !/9. Mirroring/3. Blindspots.mp4
49.1 MB
~Get Your Files Here !/3. Skepticism/2. The Pygmailion Effect.mp4
48.9 MB
~Get Your Files Here !/6. Culture/5. Habits And Recipes.mp4
48.0 MB
~Get Your Files Here !/2. Literacy/1. Fearless Learning.mp4
47.9 MB
~Get Your Files Here !/6. Culture/2. The Hermit Crab Shell.mp4
46.7 MB
[磁力链接]
添加时间:
2022-04-10
大小:
2.1 GB
最近下载:
2024-11-29
热度:
1056
[ CourseLala.com ] Udemy - Personal Digital Security Everyone Must Have - Cybersecurity
~Get Your Files Here !/02 - Secure your computer from unauthorized access/001 Social Engineering.mp4
157.3 MB
~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/007 Secure your Wi-Fi at Home (Video HD).mp4
103.2 MB
~Get Your Files Here !/02 - Secure your computer from unauthorized access/003 Use strong passwords.mp4
93.7 MB
~Get Your Files Here !/03 - What is Malware and its types/003 Spyware.mp4
66.9 MB
~Get Your Files Here !/06 - Secure your Smartphone/003 Communicating Securely with your Smartphone.mp4
64.7 MB
~Get Your Files Here !/03 - What is Malware and its types/002 Adware.mp4
63.9 MB
~Get Your Files Here !/05 - Email Security/002 Fishing.mp4
57.8 MB
~Get Your Files Here !/02 - Secure your computer from unauthorized access/012 Be cautious.mp4
54.8 MB
~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/002 Tips for buying online.mp4
46.0 MB
~Get Your Files Here !/06 - Secure your Smartphone/001 Purses, Wallets, Smartphones.mp4
43.1 MB
~Get Your Files Here !/03 - What is Malware and its types/001 Trojan Horse.mp4
39.6 MB
~Get Your Files Here !/03 - What is Malware and its types/007 Scareware.mp4
39.5 MB
~Get Your Files Here !/03 - What is Malware and its types/004 Browser Hijacking Software.mp4
37.3 MB
~Get Your Files Here !/02 - Secure your computer from unauthorized access/008 Use a VPN.mp4
36.0 MB
~Get Your Files Here !/03 - What is Malware and its types/005 Viruses.mp4
35.6 MB
~Get Your Files Here !/01 - Introduction to Personal Digital Security/003 Some statistics.mp4
35.0 MB
~Get Your Files Here !/02 - Secure your computer from unauthorized access/004 Use password manager.mp4
33.8 MB
~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/001 Safe browsing.mp4
31.8 MB
~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/008 Safe browsing in Social Networks.mp4
31.7 MB
~Get Your Files Here !/01 - Introduction to Personal Digital Security/001 Introduction to Personal Digital Security.mp4
30.4 MB
[磁力链接]
添加时间:
2022-04-12
大小:
1.5 GB
最近下载:
2024-11-30
热度:
533
[ FreeCourseWeb.com ] Udemy - Intoduction to Cybersecurity !From beginner level to PRO !.zip
[ FreeCourseWeb.com ] Udemy - Intoduction to Cybersecurity !From beginner level to PRO !.zip
503.9 MB
[磁力链接]
添加时间:
2022-04-24
大小:
503.9 MB
最近下载:
2024-11-28
热度:
108
Cybersecurity Threat Hunting for SOC Analysts
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/10. Adversary Emulation Caldera.mp4
359.9 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/12. Enhanced Lab Realism Bad Blood + Microsoft ATA + Bloodhound!.mp4
338.8 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/1. Threat Hunting with Splunk + Zeek.mp4
243.3 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/7. Adversary Emulation Atomic Red Team + MITRE ATT&CK.mp4
242.7 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/6. Purple Team Scenario Meterpreter + MSFVenom + Process Injection + Velociraptor!.mp4
225.7 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/3. The Modern Threat Hunting Mindset.mp4
225.3 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/5. The Methodical Guide to Effective Threat Hunting/1. Finding Beacons Long and Cumulative Connections.mp4
201.8 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/6. Proofs Detecting False Negatives/2. Suricata vs RITA Zeus Malware.mp4
195.4 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/5. The Methodical Guide to Effective Threat Hunting/5. Finding Beacons Business Need Analysis (Part 4).mp4
194.3 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/2. Threat Hunting with Splunk + Sysmon.mp4
153.3 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/5. The Methodical Guide to Effective Threat Hunting/4. Finding Beacons Business Need Analysis (Part 3).mp4
139.4 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/5. Beaconing DNS.mp4
135.2 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/8. Beaconing Detection Session Size Analysis.mp4
133.5 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/6. Proofs Detecting False Negatives/1. Suricata Capabilities + Installation!.mp4
129.8 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/3. Tools and resources/8. zeek.mp4
126.9 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/2. The Broken Threat Hunting Mindset.mp4
126.1 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/3. Tools and resources/9. Using zeek + Rita to find Evil!.mp4
118.9 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/1. Understanding the New Adversary.mp4
118.7 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/6. Beaconing CDN.mp4
117.8 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/5. Purple Team Scenario Mimikatz.mp4
115.6 MB
[磁力链接]
添加时间:
2022-05-05
大小:
6.2 GB
最近下载:
2024-11-30
热度:
7505
[ FreeCourseWeb.com ] Udemy - Increasing Business Cybersecurity Standards immediately!
~Get Your Files Here !/03 Understanding Hacking Strategies/001 How does a Hacker look like_.mp4
151.3 MB
~Get Your Files Here !/03 Understanding Hacking Strategies/005 Trends & Outlook.mp4
148.7 MB
~Get Your Files Here !/07 Team Organisation/003 Sharing Files & Accounts.mp4
126.8 MB
~Get Your Files Here !/07 Team Organisation/002 Communication Channels.mp4
116.3 MB
~Get Your Files Here !/07 Team Organisation/001 Cybersecurity Awareness Communication.mp4
115.8 MB
~Get Your Files Here !/10 ADDITIONAL CONTENT/003 Kids & the digital World.mp4
113.9 MB
~Get Your Files Here !/07 Team Organisation/004 Login & Password Management.mp4
73.1 MB
~Get Your Files Here !/10 ADDITIONAL CONTENT/002 Creating safe, secure and Data Protection compliant Products.mp4
72.3 MB
~Get Your Files Here !/10 ADDITIONAL CONTENT/001 Security Standards.mp4
72.2 MB
~Get Your Files Here !/06 Admin Duties/001 ToDo List.mp4
48.8 MB
~Get Your Files Here !/02 The Data Processing Triangle/002 Data Protection.mp4
35.1 MB
~Get Your Files Here !/02 The Data Processing Triangle/001 Overview.mp4
35.1 MB
~Get Your Files Here !/09 The End/001 Closing Statement.mp4
31.3 MB
~Get Your Files Here !/01 Introduction/001 Welcome!.mp4
28.6 MB
~Get Your Files Here !/03 Understanding Hacking Strategies/004 War Stories.mp4
26.9 MB
~Get Your Files Here !/08 Managing Client Data/003 Data Science Projects.mp4
24.7 MB
~Get Your Files Here !/04 Securing Hardware/004 Your invisible Devices.mp4
21.1 MB
~Get Your Files Here !/05 Securing Software & Accounts/002 Service Providers.mp4
19.1 MB
~Get Your Files Here !/01 Introduction/002 Disclaimer.mp4
18.6 MB
~Get Your Files Here !/05 Securing Software & Accounts/001 Daily used Accounts.mp4
18.0 MB
[磁力链接]
添加时间:
2022-05-11
大小:
1.4 GB
最近下载:
2024-11-23
热度:
512
Practical Cybersecurity for IT Professionals
[TutsNode.com] - Practical Cybersecurity for IT Professionals/04 - 3. Firewalls/03 - Advanced Windows Firewall.mp4
27.1 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/05 - 4. Network Scanning/01 - Getting started with Nmap.mp4
22.0 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/02 - 1. Why Cybersecurity/07 - Emerging trends in
cybersecurity
.mp4
20.4 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/02 - 1. Why Cybersecurity/01 - A history of hackers.mp4
17.5 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/04 - 3. Firewalls/05 - Introducing Linux iptables.mp4
16.1 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/04 - 3. Firewalls/02 - Windows Firewall basics.mp4
14.5 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/09 - 8. Network Protocols/02 - Capturing packets with Wireshark.mp4
14.3 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/04 - 3. Firewalls/04 - ZedLan firewall log analyser.mp4
13.4 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/02 - 1. Why Cybersecurity/04 - Common forms of cyberattack.mp4
13.1 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/09 - 8. Network Protocols/03 - Making sense of the protocols.mp4
13.0 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/02 - 1. Why Cybersecurity/02 - The cyber kill chain.mp4
12.0 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/03 - 2. Antivirus/01 - Introducing Microsoft Defender Antivirus.mp4
11.7 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/07 - 6. Vulnerability Scanning/01 - Preparing Nessus.mp4
10.5 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/08 - 7. Web Applications/02 - Running an SQL injection attack.mp4
10.1 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/05 - 4. Network Scanning/02 - Advanced Nmap options.mp4
10.0 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/02 - 1. Why Cybersecurity/03 - Stuxnet and the kill chain.mp4
9.8 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/03 - 2. Antivirus/02 - Detecting malware with Microsoft Defender.mp4
9.5 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/04 - 3. Firewalls/06 - Setting up a simple iptables firewall.mp4
9.3 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/06 - 5. Network Connections/02 - Transferring files using netcat.mp4
9.2 MB
[TutsNode.com] - Practical Cybersecurity for IT Professionals/06 - 5. Network Connections/04 - Setting up a netcat honeypot.mp4
8.9 MB
[磁力链接]
添加时间:
2023-12-17
大小:
392.7 MB
最近下载:
2024-11-26
热度:
149
[FreeCoursesOnline.Me] Coursera - Cybersecurity Attack and Defense Fundamentals Specialization (by EC-Council)
2. Network Defense Essentials (NDE).zip
2.2 GB
1. Ethical Hacking Essentials (EHE).zip
2.1 GB
3. Digital Forensics Essentials (DFE).zip
1.7 GB
0. Websites you may like/1. OneHack.us Premium Cracked Accounts-Tutorials-Guides-Articles Community Based Forum.url
377 Bytes
FreeCoursesOnline.me Download Udacity, Masterclass, Lynda, PHLearn, etc Free.url
290 Bytes
Content Info.txt
285 Bytes
0. Websites you may like/2. FTUApps.com Download Cracked Developers Applications For Free.url
239 Bytes
[磁力链接]
添加时间:
2023-12-17
大小:
6.1 GB
最近下载:
2024-11-30
热度:
5259
[ DevCourseWeb.com ] CBTNuggets - (ISC)2 CC - Certified in Cybersecurity - (ISC)2 Certification Training
~Get Your Files Here !/1. Understanding Information Assurance/1. Understanding Information Assurance - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
69.9 MB
~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/1. Power - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
65.3 MB
~Get Your Files Here !/7. Discussing Network Security Infrastructure/1. Network Segmentation - (ISC)² CC – Certified in Cybersecurity CBT Nuggets-1.mp4
58.2 MB
~Get Your Files Here !/8. Exploring Network Threats and Attacks/6. Firewalls - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
54.7 MB
~Get Your Files Here !/8. Exploring Network Threats and Attacks/3. Intrusion Detection Prevention Systems (IDSIPS) - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
54.0 MB
~Get Your Files Here !/5. Exploring Security Policies and Training/7. Security Awareness Training - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
52.0 MB
~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/3. Heating, Ventilation and Air Conditioning (HVAC) - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
48.1 MB
~Get Your Files Here !/9. Understanding Computer Networking/4. IP Addresses - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
47.5 MB
~Get Your Files Here !/6. Understanding Data Security and System Hardening/2. Types of Encryption - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
46.4 MB
~Get Your Files Here !/7. Discussing Network Security Infrastructure/7. The Cloud - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
45.7 MB
~Get Your Files Here !/8. Exploring Network Threats and Attacks/5. Vulnerability Scanning - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
45.5 MB
~Get Your Files Here !/9. Understanding Computer Networking/3. TCPIP Model - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
42.9 MB
~Get Your Files Here !/6. Understanding Data Security and System Hardening/7. Configuration Management - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
41.6 MB
~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/2. Data Centers and Closets - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
40.4 MB
~Get Your Files Here !/1. Understanding Information Assurance/2. Methods of Authentication - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
40.0 MB
~Get Your Files Here !/2. Discussing Risk Management, Controls, Ethics and Governance/4. Security Control Categories - (ISC)² CC – Certified in Cybersecurity CBT Nuggets-1.mp4
39.3 MB
~Get Your Files Here !/6. Understanding Data Security and System Hardening/3. Data Hashing with Encryption - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
38.3 MB
~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/5. Redundancy - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
38.2 MB
~Get Your Files Here !/3. Exploring BC, DR & IR Concepts/6. Incident Response - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
37.9 MB
~Get Your Files Here !/4. Reviewing Access Control Concepts/6. Types of Access Control - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
36.8 MB
[磁力链接]
添加时间:
2023-12-17
大小:
2.1 GB
最近下载:
2024-11-30
热度:
4134
[ FreeCourseWeb.com ] CompTIA Cybersecurity Analyst + (CySA + ) (CS0-003) - 3 Incident Response and Management
~Get Your Files Here !/05 - 4. Forensic Techniques/09 - Password forensics.mp4
19.8 MB
~Get Your Files Here !/05 - 4. Forensic Techniques/08 - Operating system analysis.mp4
15.5 MB
~Get Your Files Here !/05 - 4. Forensic Techniques/11 - Software forensics.mp4
15.2 MB
~Get Your Files Here !/05 - 4. Forensic Techniques/05 - File carving.mp4
13.1 MB
~Get Your Files Here !/05 - 4. Forensic Techniques/10 - Network forensics.mp4
11.3 MB
~Get Your Files Here !/02 - 1. Incident Response Programs/08 - Incident eradication and recovery.mp4
11.2 MB
~Get Your Files Here !/02 - 1. Incident Response Programs/01 - Build an incident response program.mp4
10.7 MB
~Get Your Files Here !/07 - 6. Disaster Recovery/01 - Disaster recovery.mp4
10.7 MB
~Get Your Files Here !/06 - 5. Business Continuity/03 - High availability and fault tolerance.mp4
10.4 MB
~Get Your Files Here !/04 - 3. Incident Investigation/01 - Logging security information.mp4
10.2 MB
~Get Your Files Here !/05 - 4. Forensic Techniques/04 - System and file forensics.mp4
10.0 MB
~Get Your Files Here !/05 - 4. Forensic Techniques/06 - Creating forensic images.mp4
10.0 MB
~Get Your Files Here !/03 - 2. Attack Frameworks/01 - MITRE ATT&CK.mp4
9.9 MB
~Get Your Files Here !/04 - 3. Incident Investigation/03 - Cloud audits and investigations.mp4
9.9 MB
~Get Your Files Here !/02 - 1. Incident Response Programs/10 - Post-incident activities.mp4
9.4 MB
~Get Your Files Here !/02 - 1. Incident Response Programs/04 - Incident identification.mp4
9.3 MB
~Get Your Files Here !/07 - 6. Disaster Recovery/04 - Disaster recovery sites.mp4
9.3 MB
~Get Your Files Here !/05 - 4. Forensic Techniques/15 - Ediscovery and evidence production.mp4
8.2 MB
~Get Your Files Here !/06 - 5. Business Continuity/02 - Business continuity controls.mp4
8.0 MB
~Get Your Files Here !/04 - 3. Incident Investigation/02 - Security information and event management.mp4
7.9 MB
[磁力链接]
添加时间:
2023-12-17
大小:
348.1 MB
最近下载:
2024-12-01
热度:
4030
[ DevCourseWeb.com ] Udemy - Modern Cybersecurity Fundamentals
~Get Your Files Here !/2. History of Cybersecurity/1. History of Cybersecurity.mp4
478.1 MB
~Get Your Files Here !/3. Cybersecurity Risk Management/1. Cybersecurity Risk Management.mp4
265.3 MB
~Get Your Files Here !/13. The Future of Cybersecurity/1. The Future of Cybersecurity.mp4
186.8 MB
~Get Your Files Here !/7. Understanding Networks Part 3/1. Understanding Networks Part 3.mp4
176.6 MB
~Get Your Files Here !/11. Ransomware/1. Ransomware.mp4
159.6 MB
~Get Your Files Here !/8. Understanding Networks Part 4/1. Understanding Networks Part 4.mp4
158.3 MB
~Get Your Files Here !/12. Internet of Things (IoT)/1. Internet of Things (IoT).mp4
154.5 MB
~Get Your Files Here !/9. Domain Name System (DNS)/1. Domain Name System (DNS).mp4
145.9 MB
~Get Your Files Here !/5. Understanding Networks Part 1/1. Understanding Networks Part 1.mp4
137.5 MB
~Get Your Files Here !/4. Intrusion Detection/1. Intrusion Detection.mp4
136.3 MB
~Get Your Files Here !/6. Understanding Networks Part 2/1. Understanding Networks Part 2.mp4
126.6 MB
~Get Your Files Here !/10. Dynamic Host Configuration Protocol (DHCP)/1. Dynamic Host Configuration Protocol (DHCP).mp4
112.7 MB
~Get Your Files Here !/1. Introduction/1. Introduction.mp4
28.1 MB
~Get Your Files Here !/5. Understanding Networks Part 1/1.1 Understanding-Networks.pdf
3.5 MB
~Get Your Files Here !/6. Understanding Networks Part 2/1.1 Understanding-Networks.pdf
3.5 MB
~Get Your Files Here !/7. Understanding Networks Part 3/1.1 Understanding-Networks.pdf
3.5 MB
~Get Your Files Here !/8. Understanding Networks Part 4/1.1 Understanding-Networks.pdf
3.5 MB
~Get Your Files Here !/3. Cybersecurity Risk Management/1.1 Cybersecurity-Risk-Management.pdf
1.8 MB
~Get Your Files Here !/12. Internet of Things (IoT)/1.1 IoT.pdf
1.8 MB
~Get Your Files Here !/2. History of Cybersecurity/1.1 HISTORY-OF-CYBERSECURITY.pdf
1.7 MB
[磁力链接]
添加时间:
2023-12-17
大小:
2.3 GB
最近下载:
2024-11-29
热度:
1641
The Absolute Beginners Guide to Cybersecurity
Part 04 July 2023/Chapter 06 Conclusion/001. You Have Been HACKED - Now What.mp4
193.9 MB
Part 04 July 2023/Chapter 01 Introduction/002. Personal Cybersecurity - What I Do.mp4
193.1 MB
Part 01 December 2022/Chapter 07 Cyber Warfare and Cyber Attacks Against Companies/002. The Attack Against Estonia.mp4
187.3 MB
Part 01 December 2022/Chapter 05 Defenses/009. Password Management.mp4
133.9 MB
Part 03 June 2023/Chapter 03 Mobile Threats and Countermeasures/007. How to Use Malwarebytes.mp4
126.9 MB
Part 01 December 2022/Chapter 02 Hackers - Who Are They/002. What Is NOT Hacking.mp4
118.6 MB
Part 04 July 2023/Chapter 05 Mobile Security/003. Checking Default App Permissions - Android.mp4
115.6 MB
Part 03 June 2023/Chapter 02 Understanding Applications/007. Checking Default App Permissions - Android.mp4
115.4 MB
Part 02 December 2022/Chapter 01 Introduction/001. Welcome to the Course.mp4
115.3 MB
Part 04 July 2023/Chapter 01 Introduction/001. Welcome to the Course.mp4
106.5 MB
Part 01 December 2022/Chapter 07 Cyber Warfare and Cyber Attacks Against Companies/003. Stuxnet and the Attack Against Iran.mp4
105.1 MB
Part 03 June 2023/Chapter 04 Mobile Security Apps/002. How to Use NordVPN.mp4
101.4 MB
Part 02 December 2022/Chapter 07 Social Engineering - Scams, Cons, Tricks, and Fraud/003. Reconnaissance Methods.mp4
94.3 MB
Part 04 July 2023/Chapter 03 Personal Security/005. Protecting Yourself Against SIM Card Swap Fraud.mp4
93.5 MB
Part 01 December 2022/Chapter 02 Hackers - Who Are They/006. Social Engineering.mp4
89.9 MB
Part 01 December 2022/Chapter 06 Cyber Security at the Workplace/005. The Security Versus Ease of Access Paradox.mp4
88.6 MB
Part 01 December 2022/Chapter 06 Cyber Security at the Workplace/003. BYOD Management.mp4
87.6 MB
Part 04 July 2023/Chapter 05 Mobile Security/005. How to Identify Legit Apps.mp4
86.0 MB
Part 01 December 2022/Chapter 01 General Introduction to IT and Cyber Security/002. Difference Between Information Security and Cyber Security.mp4
84.6 MB
Part 03 June 2023/Chapter 02 Understanding Applications/003. How to Identify Legit Apps and Spot Fake Apps.mp4
83.4 MB
[磁力链接]
添加时间:
2023-12-17
大小:
7.5 GB
最近下载:
2024-12-01
热度:
4891
Cybersecurity Lab Environment in EVE NG
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/5. Cyberattacks Lab Setup/1. Cyberattacks Lab in EVE NG.mp4
431.1 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/1. Reconnaissance Attack.mp4
351.9 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/4. Attacker OS Setup/1. Kali Linux Setup.mp4
263.4 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/12. Password Attack.mp4
261.2 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/5. Cyberattacks Lab Setup/3. Vulnerable Servers -Configuration.mp4
259.5 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/9. ARP Spoofing Attack.mp4
240.8 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/2. EVE NG Setup/5. EVE NG Qemu Image Naming.mp4
223.9 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/10. DHCP Starvation Attack.mp4
195.3 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/1. Introduction to Cybersecurity/9. Layers of the Web Terms.mp4
192.1 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/4. Attacker OS Setup/3. Parrot OS Setup.mp4
184.7 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/1. Introduction to Cybersecurity/8. Layers of the Web.mp4
170.7 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/3. Vulnerable Web Setup/2. Metasploitable Setup.mp4
164.7 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/6. Smurf Attack.mp4
162.1 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/14. SQL Injection Attack.mp4
162.0 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/1. Introduction to Cybersecurity/12. OWASP Top Ten 10.mp4
160.9 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/2. EVE NG Setup/8. EVE-NG Networks Clouds.mp4
155.5 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/5. SYN Flooding Attack.mp4
150.9 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/1. Introduction to Cybersecurity/2. Introduction to Cybersecurity.mp4
146.1 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/4. ICMP Flooding Attack.mp4
144.8 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/3. Vulnerable Web Setup/1. bWAPP Server Setup.mp4
144.8 MB
[磁力链接]
添加时间:
2023-12-17
大小:
6.4 GB
最近下载:
2024-11-29
热度:
4394
[ DevCourseWeb.com ] Udemy - Python for Cybersecurity
~Get Your Files Here !/6. Sockets/7. Part 3 - Sending, Receiving, and Closing the Connection.mp4
179.3 MB
~Get Your Files Here !/4. Object Oriented Programming/2. Creating Our First Object.mp4
97.9 MB
~Get Your Files Here !/6. Sockets/5. Part 1 - Socket, Bind, Listen Accept.mp4
81.1 MB
~Get Your Files Here !/6. Sockets/6. Part 2 - Socket, Connect.mp4
74.5 MB
~Get Your Files Here !/6. Sockets/4. Why Encode.mp4
71.2 MB
~Get Your Files Here !/6. Sockets/3. How Sockets Will Work.mp4
68.7 MB
~Get Your Files Here !/3. The Fundamentals/6. If Statements.mp4
64.8 MB
~Get Your Files Here !/5. Let's Make API Requests/5. Consuming an API - Complex.mp4
62.7 MB
~Get Your Files Here !/3. The Fundamentals/12. Dictionaries.mp4
51.7 MB
~Get Your Files Here !/3. The Fundamentals/13. Functions.mp4
49.3 MB
~Get Your Files Here !/3. The Fundamentals/3. Variables.mp4
42.2 MB
~Get Your Files Here !/3. The Fundamentals/7. Error Handling Part 1.mp4
40.5 MB
~Get Your Files Here !/2. Environment Setup/2. Installing VS Code and Extensions.mp4
37.6 MB
~Get Your Files Here !/6. Sockets/2. What is a Socket.mp4
35.1 MB
~Get Your Files Here !/3. The Fundamentals/11. Lists.mp4
35.1 MB
~Get Your Files Here !/3. The Fundamentals/4. f Strings.mp4
32.8 MB
~Get Your Files Here !/4. Object Oriented Programming/3. Importing Packages.mp4
31.4 MB
~Get Your Files Here !/1. Getting Started/1. IMPORTANT!!!.mp4
30.9 MB
~Get Your Files Here !/5. Let's Make API Requests/4. Consuming an API - Simple.mp4
26.2 MB
~Get Your Files Here !/3. The Fundamentals/8. While Loop.mp4
21.6 MB
[磁力链接]
添加时间:
2023-12-17
大小:
1.3 GB
最近下载:
2024-12-01
热度:
3123
[CourseClub.Me] ZeroToMastery - Complete Cybersecurity Bootcamp
8-Network Security/052-Network Security With Nmap.mp4
169.9 MB
5-Security Bugs & Vulnerabilities/020-Buffer Overflow Demonstration.mp4
136.7 MB
12-Appendix - Ethical Hacking/087-Msfconsole Basic Commands.mp4
97.5 MB
8-Network Security/059-Wireless Attack Demonstration.mp4
93.4 MB
7-End-Point Protection/034-Password Security and Password Managers.mp4
84.2 MB
12-Appendix - Ethical Hacking/093-Meterpreter Basic Commands Part 1.mp4
78.5 MB
7-End-Point Protection/038-Process Explorer.mp4
75.8 MB
1-Introduction/001-Cybersecurity Bootcamp - Zero to Mastery.mp4
72.4 MB
8-Network Security/057-Secure Network Architecture.mp4
66.8 MB
12-Appendix - Ethical Hacking/094-Meterpreter Basic Commands Part 2.mp4
65.7 MB
7-End-Point Protection/033-Bitdefender, Kaspersky, McAfee, Malwarebytes.mp4
63.9 MB
4-Understanding Hackers - The Biggest Threat/012-Most Common Attacks Demonstration.mp4
63.5 MB
8-Network Security/060-Network Monitoring With TCPDump.mp4
62.7 MB
8-Network Security/058-Wireless Security.mp4
59.6 MB
5-Security Bugs & Vulnerabilities/017-Unpatched Machine Exploitation Demonstration.mp4
59.1 MB
12-Appendix - Ethical Hacking/080-Whatweb Stealthy Scan.mp4
58.1 MB
12-Appendix - Ethical Hacking/091-Advance Msfvenom Usage.mp4
51.4 MB
7-End-Point Protection/043-Iptables.mp4
50.9 MB
7-End-Point Protection/028-Brave Browser Security and Privacy.mp4
50.6 MB
12-Appendix - Ethical Hacking/089-Software Vulnerability - Samba Exploitation.mp4
49.5 MB
[磁力链接]
添加时间:
2023-12-17
大小:
3.6 GB
最近下载:
2024-11-28
热度:
1121
[ TutSala.com ] Linkedin - Crisis Communication Planning After a Ransomware or Other Cybersecurity Attack
~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/02 - Prepare your team to address a crisis.mp4
14.0 MB
~Get Your Files Here !/02 - 1. The Impact of Cyberattacks/02 - Determining who is on your team when a cyberattack occurs.mp4
11.4 MB
~Get Your Files Here !/02 - 1. The Impact of Cyberattacks/01 - Why cyberattacks impact every organization.mp4
11.1 MB
~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/01 - What to say and to whom at onset.mp4
10.7 MB
~Get Your Files Here !/04 - 3. Evaluate and Train/01 - Continue to evaluate after a training.mp4
9.1 MB
~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/04 - What to tell people after the attack.mp4
7.4 MB
~Get Your Files Here !/04 - 3. Evaluate and Train/02 - Design crisis scenario-based training for higher retention.mp4
6.8 MB
~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/03 - Practice to improve crisis communications.mp4
5.3 MB
~Get Your Files Here !/01 - Introduction/01 - Anyone can suffer a ransomware or other cyberattack.mp4
5.0 MB
~Get Your Files Here !/05 - Conclusion/01 - You can do this.mp4
2.3 MB
~Get Your Files Here !/Ex_Files_Crisis_Communication_Planning_Cybersecurity/Exercise Files/Questions to Ask Your Team.pdf
31.1 kB
~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/02 - Prepare your team to address a crisis.srt
10.6 kB
~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/01 - What to say and to whom at onset.srt
8.6 kB
~Get Your Files Here !/02 - 1. The Impact of Cyberattacks/02 - Determining who is on your team when a cyberattack occurs.srt
7.3 kB
~Get Your Files Here !/02 - 1. The Impact of Cyberattacks/01 - Why cyberattacks impact every organization.srt
7.0 kB
~Get Your Files Here !/04 - 3. Evaluate and Train/02 - Design crisis scenario-based training for higher retention.srt
6.3 kB
~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/04 - What to tell people after the attack.srt
5.5 kB
~Get Your Files Here !/04 - 3. Evaluate and Train/01 - Continue to evaluate after a training.srt
5.2 kB
~Get Your Files Here !/03 - 2. The Cyberattack Crisis Communications Phases/03 - Practice to improve crisis communications.srt
3.8 kB
~Get Your Files Here !/01 - Introduction/01 - Anyone can suffer a ransomware or other cyberattack.srt
2.5 kB
[磁力链接]
添加时间:
2023-12-17
大小:
83.2 MB
最近下载:
2024-12-01
热度:
322
共15页
上一页
3
4
5
6
7
8
9
10
11
下一页