搜索
为您找到约
277
个磁力链接/BT种子,耗时 0 毫秒。
排序:
相关程度
热度
文件大小
添加时间
最近访问
Thinking about Cybersecurity From Cyber Crime to Cyber Warfare
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/18 Looking Forward-What Does the Future Hold.mp4
535.2 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/10 International Governance and the Internet.mp4
521.6 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/14 Listening In and Going Dark.mp4
516.5 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/08 Nations at Cyber War.mp4
496.5 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/05 The Problem of Identity on the Network.mp4
495.7 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/13 Privacy for the Cyber Age.mp4
494.0 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/11 The Constitution and Cyberspace.mp4
489.6 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/17 Critical Infrastructure and Resiliency.mp4
489.1 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/01 Stuxnet-The First Cyber Guided Missile.mp4
486.4 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/04 Of Viruses, Botnets, and Logic Bombs.mp4
483.5 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/09 Government Regulation of Cyberspace.mp4
478.0 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/12 Big Data- They Know Everything about You.mp4
474.5 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/15 The Devil in the Chips-Hardware Failures.mp4
473.9 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/16 Protecting Yourself in Cyberspace.mp4
471.4 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/06 Cyber Fraud, Theft, and Organized Crime.mp4
470.0 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/07 Hacktivists and Insurgency.mp4
469.1 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/02 The Incredible Scope of Cyberspace.mp4
456.9 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/03 The Five Gateways of Internet Vulnerability.mp4
448.1 MB
[TutsNode.net] - Thinking about Cybersecurity From Cyber Crime to Cyber Warfare/NA NA.mp4
20.8 MB
.pad/9
915.0 kB
[磁力链接]
添加时间:
2023-12-20
大小:
8.8 GB
最近下载:
2025-03-13
热度:
3170
[FreeCoursesOnline.Me] ZeroToMastery - Complete Cybersecurity Bootcamp
8-Network Security/052-Network Security With Nmap.mp4
169.9 MB
5-Security Bugs & Vulnerabilities/020-Buffer Overflow Demonstration.mp4
136.7 MB
12-Appendix - Ethical Hacking/087-Msfconsole Basic Commands.mp4
97.5 MB
8-Network Security/059-Wireless Attack Demonstration.mp4
93.4 MB
7-End-Point Protection/034-Password Security and Password Managers.mp4
84.2 MB
12-Appendix - Ethical Hacking/093-Meterpreter Basic Commands Part 1.mp4
78.5 MB
7-End-Point Protection/038-Process Explorer.mp4
75.8 MB
1-Introduction/001-Cybersecurity Bootcamp - Zero to Mastery.mp4
72.4 MB
8-Network Security/057-Secure Network Architecture.mp4
66.8 MB
12-Appendix - Ethical Hacking/094-Meterpreter Basic Commands Part 2.mp4
65.7 MB
7-End-Point Protection/033-Bitdefender, Kaspersky, McAfee, Malwarebytes.mp4
63.9 MB
4-Understanding Hackers - The Biggest Threat/012-Most Common Attacks Demonstration.mp4
63.5 MB
8-Network Security/060-Network Monitoring With TCPDump.mp4
62.7 MB
8-Network Security/058-Wireless Security.mp4
59.6 MB
5-Security Bugs & Vulnerabilities/017-Unpatched Machine Exploitation Demonstration.mp4
59.1 MB
12-Appendix - Ethical Hacking/080-Whatweb Stealthy Scan.mp4
58.1 MB
12-Appendix - Ethical Hacking/091-Advance Msfvenom Usage.mp4
51.4 MB
7-End-Point Protection/043-Iptables.mp4
50.9 MB
7-End-Point Protection/028-Brave Browser Security and Privacy.mp4
50.6 MB
12-Appendix - Ethical Hacking/089-Software Vulnerability - Samba Exploitation.mp4
49.5 MB
[磁力链接]
添加时间:
2023-12-20
大小:
3.6 GB
最近下载:
2025-03-12
热度:
6367
[ DevCourseWeb.com ] Udemy - Ultimate Cybersecurity - Uncovering Hacker Strategies
~Get Your Files Here !/8 - Conclusion/56 - 82 Staying Informed and UptoDate.mp4
99.4 MB
~Get Your Files Here !/8 - Conclusion/57 - 83 Next Steps for Advancing Your Cybersecurity Knowledge.mp4
91.7 MB
~Get Your Files Here !/6 - Cybersecurity Laws Regulations and Compliance/40 - Cybersecurity Laws Regulations and Compliance Video.mp4
84.9 MB
~Get Your Files Here !/4 - Cybersecurity Best Practices/33 - 452 Intrusion Detection and Prevention Systems IDPS.mp4
82.9 MB
~Get Your Files Here !/6 - Cybersecurity Laws Regulations and Compliance/42 - 62 Compliance with Industry Standards.mp4
82.9 MB
~Get Your Files Here !/7 - Cybersecurity Tools and Resources/52 - 73 Monitoring and Logging Tools.mp4
81.4 MB
~Get Your Files Here !/4 - Cybersecurity Best Practices/34 - 453 Virtual Private Networks VPNs.mp4
80.2 MB
~Get Your Files Here !/5 - Incident Response and Recovery/37 - 52 Identifying and Analyzing Security Incidents.mp4
80.2 MB
~Get Your Files Here !/4 - Cybersecurity Best Practices/32 - 451 Firewalls.mp4
80.1 MB
~Get Your Files Here !/5 - Incident Response and Recovery/35 - Incident Response and Recovery Video.mp4
79.6 MB
~Get Your Files Here !/6 - Cybersecurity Laws Regulations and Compliance/46 - 63 Cybersecurity Frameworks.mp4
79.3 MB
~Get Your Files Here !/7 - Cybersecurity Tools and Resources/50 - 71 Security Assessment and Testing Tools.mp4
79.1 MB
~Get Your Files Here !/7 - Cybersecurity Tools and Resources/49 - Cybersecurity Tools and Resources Video.mp4
79.1 MB
~Get Your Files Here !/7 - Cybersecurity Tools and Resources/51 - 72 OpenSource Security Tools.mp4
78.3 MB
~Get Your Files Here !/8 - Conclusion/55 - 81 Course Summary.mp4
78.1 MB
~Get Your Files Here !/4 - Cybersecurity Best Practices/31 - 45 Network Security Measures.mp4
77.8 MB
~Get Your Files Here !/6 - Cybersecurity Laws Regulations and Compliance/41 - 61 Understanding Data Privacy Laws.mp4
77.5 MB
~Get Your Files Here !/4 - Cybersecurity Best Practices/30 - 44 Data Encryption and Secure Communication.mp4
77.1 MB
~Get Your Files Here !/8 - Conclusion/54 - Conclusion Video.mp4
77.0 MB
~Get Your Files Here !/4 - Cybersecurity Best Practices/29 - 43 MultiFactor Authentication MFA.mp4
71.9 MB
[磁力链接]
添加时间:
2023-12-20
大小:
3.4 GB
最近下载:
2025-03-11
热度:
4667
[ DevCourseWeb.com ] Udemy - Master ICS - OT Cybersecurity - Fundamental to Advanced-Part 2
~Get Your Files Here !/01 - Introduction/002 Filesystem.mp4
154.3 MB
~Get Your Files Here !/03 - Network Architecture Design Considerations/005 Reference Architecture-2.mp4
127.4 MB
~Get Your Files Here !/04 - OT Cybersecurity Management/003 Manufacturing Impact Levels.mp4
124.9 MB
~Get Your Files Here !/02 - Cryptography -Lab/011 Cyberland Usecase-OpenSSL.mp4
123.1 MB
~Get Your Files Here !/02 - Cryptography -Lab/004 Hashing.mp4
120.2 MB
~Get Your Files Here !/02 - Cryptography -Lab/002 Symmetric.mp4
112.3 MB
~Get Your Files Here !/03 - Network Architecture Design Considerations/004 Reference Architecture-1.mp4
110.3 MB
~Get Your Files Here !/06 - Contingency & Continuity Planning/005 Disaster Recovery Plan.mp4
106.3 MB
~Get Your Files Here !/04 - OT Cybersecurity Management/002 Industry Profiling.mp4
103.1 MB
~Get Your Files Here !/01 - Introduction/001 Linux.mp4
100.8 MB
~Get Your Files Here !/02 - Cryptography -Lab/010 Binwalk Firmware Analysis.mp4
99.1 MB
~Get Your Files Here !/02 - Cryptography -Lab/006 Cyberchef-1-Basic.mp4
98.9 MB
~Get Your Files Here !/06 - Contingency & Continuity Planning/001 Types of Plan.mp4
94.8 MB
~Get Your Files Here !/04 - OT Cybersecurity Management/004 Cybersecurity Framework.mp4
94.8 MB
~Get Your Files Here !/02 - Cryptography -Lab/001 Cryptography.mp4
92.1 MB
~Get Your Files Here !/03 - Network Architecture Design Considerations/006 Reference Architecture-3.mp4
89.4 MB
~Get Your Files Here !/01 - Introduction/003 Filesystem Lab.mp4
86.1 MB
~Get Your Files Here !/01 - Introduction/007 Linux File Ownership Lab-4.mp4
84.3 MB
~Get Your Files Here !/03 - Network Architecture Design Considerations/001 Functional Difference.mp4
82.0 MB
~Get Your Files Here !/04 - OT Cybersecurity Management/001 NIST Cybersecurity Program.mp4
81.7 MB
[磁力链接]
添加时间:
2023-12-20
大小:
3.2 GB
最近下载:
2025-03-11
热度:
1731
Cybersecurity Career Become a Security Auditor
[TutsNode.net] - Cybersecurity Career Become a Security Auditor/ 03 - 2. Security Frameworks/06 - NIST security framework.mp4.mp4
35.7 MB
[TutsNode.net] - Cybersecurity Career Become a Security Auditor/ 01 - Start a Fulfilling Career in Security Auditing and Compliance/01 - Helping organizations stay secure through auditing.mp4.mp4
22.0 MB
[TutsNode.net] - Cybersecurity Career Become a Security Auditor/ 02 - 1. Security Auditing Basics/02 - What are security auditing and compliance?.mp4.mp4
21.2 MB
[TutsNode.net] - Cybersecurity Career Become a Security Auditor/ 02 - 1. Security Auditing Basics/04 - Who can be a security auditor?.mp4.mp4
20.3 MB
[TutsNode.net] - Cybersecurity Career Become a Security Auditor/ 04 - 3. Gaining Employment in Security Auditing/08 - How to land your first security auditing position.mp4.mp4
20.3 MB
[TutsNode.net] - Cybersecurity Career Become a Security Auditor/ 05 - 4. Roadmap to Success as a Security Auditor/11 - How to communicate effectively as a security auditor.mp4.mp4
19.3 MB
[TutsNode.net] - Cybersecurity Career Become a Security Auditor/ 05 - 4. Roadmap to Success as a Security Auditor/10 - Be a successful team auditor.mp4.mp4
17.8 MB
[TutsNode.net] - Cybersecurity Career Become a Security Auditor/ 03 - 2. Security Frameworks/07 - PCI security frameworks.mp4.mp4
17.7 MB
[TutsNode.net] - Cybersecurity Career Become a Security Auditor/ 06 - Conclusion/13 - Continuing on with security auditing.mp4.mp4
15.2 MB
[TutsNode.net] - Cybersecurity Career Become a Security Auditor/ 06 - Conclusion/12 - Security auditing leads to many opportunities.mp4.mp4
15.1 MB
[TutsNode.net] - Cybersecurity Career Become a Security Auditor/ 04 - 3. Gaining Employment in Security Auditing/09 - How to level up in security auditing.mp4.mp4
14.9 MB
[TutsNode.net] - Cybersecurity Career Become a Security Auditor/ 02 - 1. Security Auditing Basics/03 - Why do organizations need to be audited?.mp4.mp4
12.4 MB
[TutsNode.net] - Cybersecurity Career Become a Security Auditor/ 03 - 2. Security Frameworks/05 - Overview of common security frameworks.mp4.mp4
4.3 MB
.pad/2
258.8 kB
.pad/1
258.6 kB
.pad/10
257.0 kB
.pad/6
248.1 kB
.pad/8
245.1 kB
.pad/11
165.3 kB
.pad/9
148.1 kB
[磁力链接]
添加时间:
2023-12-21
大小:
238.6 MB
最近下载:
2025-03-13
热度:
1173
[ FreeCourseWeb.com ] Building a Career in Cybersecurity
~Get Your Files Here !/Lesson 1 Getting Started in the Cybersecurity Field/005. 1.4 Cybersecurity Skills.mp4
65.3 MB
~Get Your Files Here !/Lesson 2 Planning Your Cybersecurity Career/004. 2.3 The Value of Professional Certifications.mp4
60.1 MB
~Get Your Files Here !/Lesson 3 Creating Your Own Lab/003. 3.2 Foundational Lab.mp4
48.0 MB
~Get Your Files Here !/Lesson 5 Preparing for Your Interview/005. 5.4 Final Tips.mp4
44.9 MB
~Get Your Files Here !/Lesson 6 Using Continuous Improvement Strategy/007. 6.6 Growing Your Career as a Remote Worker.mp4
40.3 MB
~Get Your Files Here !/Lesson 2 Planning Your Cybersecurity Career/003. 2.2 Creating and Tracking Your Plan.mp4
36.8 MB
~Get Your Files Here !/Lesson 5 Preparing for Your Interview/003. 5.2 Preparing for the Interview.mp4
35.5 MB
~Get Your Files Here !/Lesson 1 Getting Started in the Cybersecurity Field/006. 1.5 Navigating through the Industry.mp4
31.9 MB
~Get Your Files Here !/Lesson 2 Planning Your Cybersecurity Career/002. 2.1 Establishing a Plan.mp4
31.3 MB
~Get Your Files Here !/Lesson 6 Using Continuous Improvement Strategy/008. 6.7 What’s Next.mp4
31.0 MB
~Get Your Files Here !/Lesson 1 Getting Started in the Cybersecurity Field/004. 1.3 Cybersecurity Jobs.mp4
30.3 MB
~Get Your Files Here !/Lesson 5 Preparing for Your Interview/004. 5.3 Advancing in the Interview Process.mp4
29.3 MB
~Get Your Files Here !/Lesson 6 Using Continuous Improvement Strategy/006. 6.5 Keeping a Good Work-life Balance.mp4
28.2 MB
~Get Your Files Here !/Lesson 3 Creating Your Own Lab/005. 3.4 Enabling and Using Microsoft Defender for Cloud.mp4
27.7 MB
~Get Your Files Here !/Introduction/001. Building a Career in Cybersecurity Introduction.mp4
25.1 MB
~Get Your Files Here !/Lesson 6 Using Continuous Improvement Strategy/003. 6.2 Responsibilities and Expectations.mp4
24.6 MB
~Get Your Files Here !/Lesson 4 Expanding Your Networking/005. 4.4 Using LinkedIn to Expand Your Network.mp4
24.5 MB
~Get Your Files Here !/Lesson 1 Getting Started in the Cybersecurity Field/003. 1.2 Roles and Responsibilities.mp4
22.1 MB
~Get Your Files Here !/Lesson 4 Expanding Your Networking/002. 4.1 Understanding the Cybersecurity Community.mp4
21.9 MB
~Get Your Files Here !/Lesson 4 Expanding Your Networking/003. 4.2 Identifying Opportunities to Contribute with the Cybersecurity Community.mp4
19.3 MB
[磁力链接]
添加时间:
2023-12-22
大小:
847.7 MB
最近下载:
2025-03-14
热度:
1788
[ DevCourseWeb.com ] Udemy - Cybersecurity Fundamentals For End Users
~Get Your Files Here !/5 - Protecting Your Personal Data/5 - Protecting Personal Data.mp4
140.0 MB
~Get Your Files Here !/4 - Email and Internet Security/4 - Email and Internet Security.mp4
132.0 MB
~Get Your Files Here !/3 - Physical Security for Your Computer Equipment/3 - Physical Security.mp4
125.5 MB
~Get Your Files Here !/2 - Securing Your Accounts and Passwords/2 - Securing Your Accounts and Passwords.mp4
125.3 MB
~Get Your Files Here !/6 - Updates and Keeping Current/6 - Updates and Keeping Current.mp4
79.4 MB
~Get Your Files Here !/1 - Welcome to the Course/1 - Welcome to the Course.mp4
77.7 MB
~Get Your Files Here !/5 - Protecting Your Personal Data/5 - Protecting Personal Data English.vtt
8.6 kB
~Get Your Files Here !/4 - Email and Internet Security/4 - Email and Internet Security English.vtt
8.1 kB
~Get Your Files Here !/3 - Physical Security for Your Computer Equipment/3 - Physical Security English.vtt
8.0 kB
~Get Your Files Here !/2 - Securing Your Accounts and Passwords/2 - Securing Your Accounts and Passwords English.vtt
8.0 kB
~Get Your Files Here !/1 - Welcome to the Course/1 - Welcome to the Course English.vtt
4.7 kB
~Get Your Files Here !/6 - Updates and Keeping Current/6 - Updates and Keeping Current English.vtt
4.6 kB
~Get Your Files Here !/6 - Updates and Keeping Current/7 - Congratulations.html
470 Bytes
~Get Your Files Here !/Bonus Resources.txt
386 Bytes
Get Bonus Downloads Here.url
182 Bytes
~Get Your Files Here !/4 - Email and Internet Security/4 - What should I be doing to keep my email secure.txt
96 Bytes
~Get Your Files Here !/5 - Protecting Your Personal Data/5 - Credit reporting agency Experian offers some excellent tips to avoid identity theft.txt
88 Bytes
~Get Your Files Here !/4 - Email and Internet Security/4 - Test Your Knowledge.html
53 Bytes
~Get Your Files Here !/5 - Protecting Your Personal Data/5 - Test Your Knowledge.html
50 Bytes
~Get Your Files Here !/1 - Welcome to the Course/1 - Test Your Knowledge.html
48 Bytes
[磁力链接]
添加时间:
2023-12-22
大小:
680.0 MB
最近下载:
2025-03-11
热度:
1515
Pós Graduação em Ethical Hacking e CyberSecurity
05 - Análise Forense Computacional/Conteudo de forense-026.rar
5.6 GB
01 - Introdução à Segurança Ofensiva/maquinas virtuais-027.rar
3.6 GB
13 - Introdução à Eletrônica e Hardware Hacking/EHC Introdução à Eletrônica e Hardware Hacking aula 4.7.mp4
1.7 GB
07 - Introdução à Segurança da Informação/Modulo 05 - Criptografia e Esteganografia-015.mp4
1.2 GB
13 - Introdução à Eletrônica e Hardware Hacking/EHC Introdução à Eletrônica e Hardware Hacking aula 4.3.mp4
946.0 MB
07 - Introdução à Segurança da Informação/Modulo 02 - Definicoes sobre a Seguranca da Informacao-014.mp4
895.3 MB
12 - Exploração de Software/EXPS - UN01 - 01.mp4
878.8 MB
07 - Introdução à Segurança da Informação/Modulo 03 - Criminosos e a Legislacao no mundo digital-010.mp4
736.4 MB
06 - Teste de Invasão em Redes e Sistemas/Teste de Invasão em Redes e Sistemas - Aula 3 - Metasploit Nessus Meterpreter John.mp4
710.4 MB
07 - Introdução à Segurança da Informação/Modulo 04 - Politica de Seguranca.mp4
668.0 MB
13 - Introdução à Eletrônica e Hardware Hacking/EHC Introdução à Eletrônica e Hardware Hacking aula 5.2.mp4
598.9 MB
13 - Introdução à Eletrônica e Hardware Hacking/#04 -Gadgets para Pentesters-.mp4
585.5 MB
13 - Introdução à Eletrônica e Hardware Hacking/[SecurityCast] WebCast #54 - Hardware Hacking.mp4
574.7 MB
13 - Introdução à Eletrônica e Hardware Hacking/EHC Introdução à Eletrônica e Hardware Hacking aula 4.6.mp4
553.0 MB
04 - Fundamentos de Redes de Computadores/EHC Introdução à Redes de Computadores Aula 4.3.mp4
524.2 MB
13 - Introdução à Eletrônica e Hardware Hacking/20º Hangout - Gadgets Malignos para -Hackers do Bem- - Jullio Della Flora.mp4
509.6 MB
10 - Administração de Sistemas Operacionais Linux/Administração de Sistemas Linux - Aula 6.mp4
504.4 MB
05 - Análise Forense Computacional/Análise Forense Computacional - 10 - Forense em Windows - ARTEFATOS.mp4
484.1 MB
13 - Introdução à Eletrônica e Hardware Hacking/EHC Introdução à Eletrônica e Hardware Hacking aula 1.2.mp4
478.2 MB
10 - Administração de Sistemas Operacionais Linux/Administração de Sistemas Linux - Aula 2.mp4
463.4 MB
[磁力链接]
添加时间:
2023-12-22
大小:
59.4 GB
最近下载:
2025-03-14
热度:
11961
SC-100 Microsoft Cybersecurity Architect
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/32. Another example on Application Objects.mp4
143.6 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/17. Lab - Microsoft Sentinel - Generating Incidents.mp4
127.1 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/29. Building a Docker Image.mp4
119.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/31. Deploying the container.mp4
113.6 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/15. Review of the Azure Firewall service.mp4
107.9 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/23. Microsoft Sentinel - Automation.mp4
107.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/32.1 AuthApp.zip
106.5 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/18. Example on using Azure Blueprints.mp4
95.8 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/7. Microsoft Defender for Cloud - Secure Management Ports.mp4
93.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/6. Microsoft Defender for Cloud - Servers.mp4
93.0 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/30. Example on using Application Objects.mp4
90.8 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/24. Storing Azure Cosmos DB keys.mp4
89.3 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/14. Microsoft Defender for Cloud - AWS resources.mp4
88.7 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/25. NSG Flow logs.mp4
86.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/15. Lab - Microsoft Sentinel - Data connectors.mp4
80.0 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/39. Review - Azure AD Privileged Identity Management.mp4
77.7 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/35. Example on Enterprise Applications.mp4
77.1 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/6. Azure Storage Accounts - Azure AD Authentication.mp4
75.1 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/3. Lab - Azure SQL database - Dynamic data masking.mp4
74.2 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/16. Lab - Microsoft Sentinel - Azure Activity.mp4
64.7 MB
[磁力链接]
添加时间:
2023-12-22
大小:
4.6 GB
最近下载:
2025-03-11
热度:
5035
Google Cybersecurity Professional Certificate
[TutsNode.net] - Google Cybersecurity Professional Certificate/foundations-of-
cybersecurity
/01_welcome-to-the-exciting-world-of-
cybersecurity
/01_get-started-with-the-certificate-program/01_welcome-to-the-google-
cybersecurity
-certificate.mp4
49.6 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/01_flaws-in-the-system/04_common-vulnerabilities-and-exposures.mp4
29.2 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/foundations-of-
cybersecurity
/02_the-evolution-of-
cybersecurity
/01_the-history-of-
cybersecurity
/03_attacks-in-the-digital-age.mp4
26.8 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/02_protect-organizational-assets/03_authentication-authorization-and-accounting/03_the-mechanisms-of-authorization.mp4
26.4 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/04_threats-to-asset-security/02_malware/01_malicious-software.mp4
25.7 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/manage-security-risks/04_use-playbooks-to-respond-to-incidents/01_phases-of-incident-response-playbooks/02_phases-of-an-incident-response-playbook.mp4
25.5 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/04_threats-to-asset-security/01_social-engineering/04_phishing-for-information.mp4
25.2 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/04_threats-to-asset-security/02_malware/03_the-rise-of-cryptojacking.mp4
24.8 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/foundations-of-
cybersecurity
/03_protect-against-threats-risks-and-vulnerabilities/01_frameworks-and-controls/02_introduction-to-security-frameworks-and-controls.mp4
24.5 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/foundations-of-
cybersecurity
/01_welcome-to-the-exciting-world-of-
cybersecurity
/02_introduction-to-
cybersecurity
/01_introduction-to-
cybersecurity
.mp4
24.2 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/automate-
cybersecurity
-tasks-with-python/04_python-in-practice/03_debug-python-code/01_debugging-strategies.mp4
24.2 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/02_protect-organizational-assets/02_encryption-methods/01_fundamentals-of-cryptography.mp4
23.7 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/03_cyber-attacker-mindset/01_protect-all-entry-points.mp4
23.6 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/foundations-of-
cybersecurity
/03_protect-against-threats-risks-and-vulnerabilities/02_ethics-in-
cybersecurity
/01_ethics-in-
cybersecurity
.mp4
23.6 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/03_cyber-attacker-mindset/05_pathways-through-defenses.mp4
23.5 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/foundations-of-
cybersecurity
/02_the-evolution-of-
cybersecurity
/01_the-history-of-
cybersecurity
/02_past-
cybersecurity
-attacks.mp4
23.1 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/01_flaws-in-the-system/02_vulnerability-management.mp4
23.0 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/networks-and-network-security/04_security-hardening/04_cloud-hardening/02_kelsey-cloud-security-explained.mp4
23.0 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/automate-
cybersecurity
-tasks-with-python/03_work-with-strings-and-lists/03_regular-expressions/01_regular-expressions-in-python.mp4
22.9 MB
[TutsNode.net] - Google Cybersecurity Professional Certificate/assets-threats-and-vulnerabilities/04_threats-to-asset-security/01_social-engineering/02_the-criminal-art-of-persuasion.mp4
22.7 MB
[磁力链接]
添加时间:
2023-12-22
大小:
4.3 GB
最近下载:
2025-03-13
热度:
1828
Microsoft Cybersecurity Architect SC 100 Exam Prep
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/21 - CAF Governance.mp4
293.3 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/19 - CAF Landing Zone Deployment Lab Step By StepII.mp4
286.7 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/16 - CAF Readyness Azure setup guide.mp4
231.2 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/41 - SecOps Best practices for SIEM SOAR.mp4
202.4 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/12 - MCRA IoT and IT Security II.mp4
161.1 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/78 - Pass Through Authentication PTA.mp4
160.2 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/4 - Design security for infrastructure/103 - Plan and Implement a security strategy across teams.mp4
157.6 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/17 - CAF Readyness Azure Landing Zone.mp4
154.3 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/72 - Zero trust Security strategy for Identities.mp4
152.4 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/27 - SC 100 Case Study.mp4
149.8 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/11 - MCRA People Security.mp4
141.5 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/3 - Evaluate Governance Risk Compliance GRCstrategies/93 - Encryption Support for various services.mp4
137.3 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/79 - Azure AD Roles Best Practices.mp4
136.1 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/35 - Recommendations for Designing a logging and auditing security strategy.mp4
133.8 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/4 - Design security for infrastructure/124 - Securing Domain Controllers.mp4
127.6 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/4 - Design security for infrastructure/118 - Securing Member Servers.mp4
124.1 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/40 - Azure Tools for SecOps.mp4
123.5 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/48 - Incident Management process Overview.mp4
122.3 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/82 - Develop a Roadmap Explained.mp4
119.6 MB
[TutsNode.net] - Microsoft Cybersecurity Architect SC 100 Exam Prep/2 - Design a Zero Trust strategy and architecture/74 - Conditional Access Personas.mp4
118.4 MB
[磁力链接]
添加时间:
2023-12-23
大小:
10.3 GB
最近下载:
2025-03-14
热度:
7492
[CourseClub.Me] O`REILLY - The Complete Cybersecurity Bootcamp, 2nd Edition
Lesson 29 Hacking Mobile Platforms/003. 29.2 Hacking iOS.mp4
86.6 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/014. 17.13 Performing SMTP and DNS Enumeration.mp4
80.0 MB
Lesson 21 Fundamentals of Wireless Hacking/004. 21.3 Exploring Wireless Threats.mp4
79.0 MB
Lesson 33 Fundamentals of IoT Security/003. 33.2 Understanding IoT Attacks.mp4
76.8 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/015. 17.14 Conducting Additional Enumeration Techniques.mp4
75.8 MB
Lesson 33 Fundamentals of IoT Security/002. 33.1 Introducing IoT Concepts.mp4
74.4 MB
Lesson 29 Hacking Mobile Platforms/002. 29.1 Understanding Mobile Platform Attack Vectors.mp4
73.4 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/011. 17.1 Performing SNMP Enumeration.mp4
71.8 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/004. 17.3 Understanding Host Discovery.mp4
69.7 MB
Lesson 5 Fundamentals of Incident Response/007. 5.6 Analyzing Computer Incident Response Teams (CSIRTs).mp4
68.5 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/007. 17.6 Scanning Beyond IDS and Firewall.mp4
68.2 MB
Lesson 27 Hacking User Credentials/006. 27.5 Cracking Passwords with John the Ripper.mp4
66.1 MB
Lesson 7 Intrusion Event Categories/009. 7.8 Understanding the MITRE ATT&CK Framework.mp4
65.8 MB
Lesson 29 Hacking Mobile Platforms/004. 29.3 Hacking Android OS.mp4
63.8 MB
Lesson 20 SQL Injection/005. 20.4 Exploring SQL Injection Tools.mp4
63.3 MB
Lesson 21 Fundamentals of Wireless Hacking/003. 21.2 Understanding Wireless Encryption.mp4
62.7 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/013. 17.12 Performing NTP and NFS Enumeration.mp4
61.8 MB
Lesson 16 Information Gathering and Passive Reconnaissance/011. 16.10 Performing Footprinting through Social Engineering.mp4
59.1 MB
Lesson 8 Digital Forensics Fundamentals/004. 8.3 Understanding Evidence Collection.mp4
57.2 MB
Lesson 21 Fundamentals of Wireless Hacking/007. 21.6 Hacking Bluetooth.mp4
52.3 MB
[磁力链接]
添加时间:
2023-12-23
大小:
6.7 GB
最近下载:
2025-03-12
热度:
2054
Pascal Ackerman - Industrial Cybersecurity - 2017
Pascal Ackerman - Industrial Cybersecurity - 2017.mobi
64.3 MB
Pascal Ackerman - Industrial Cybersecurity - 2017.pdf
26.8 MB
Pascal Ackerman - Industrial Cybersecurity - 2017.epub
26.1 MB
[磁力链接]
添加时间:
2023-12-23
大小:
117.2 MB
最近下载:
2025-03-14
热度:
2726
Cybersecurity and Cyberwar.m4b
Cybersecurity and Cyberwar.m4b
328.4 MB
[磁力链接]
添加时间:
2023-12-23
大小:
328.4 MB
最近下载:
2025-03-11
热度:
4345
[ FreeCourseWeb.com ] The CISO Evolution - Business Knowledge for Cybersecurity Executives (True PDF, EPUB)
~Get Your Files Here !/The CISO Evolution.pdf
45.7 MB
~Get Your Files Here !/The CISO Evolution.epub
6.9 MB
~Get Your Files Here !/Bonus Resources.txt
386 Bytes
Get Bonus Downloads Here.url
183 Bytes
[磁力链接]
添加时间:
2023-12-23
大小:
52.6 MB
最近下载:
2025-03-09
热度:
734
Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/6. Azure Security Benchmark - Microsoft Certified Cybersecurity-1.mp4
113.5 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/2. Hybrid Environmental Security Strategies - Microsoft Certifi.mp4
63.8 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/1. Specify Priorities for Mitigating Threats to Apps - Microsof-1.mp4
62.3 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/6. Designing a Regulatory Compliance Strategy/4. Implementing Azure Policy - Microsoft Certified Cybersecurit.mp4
59.0 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/7. Evaluating and Managing Security Postures/6. Mitigating Identified Risks - Microsoft Certified Cybersecur-1.mp4
53.6 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/4. Traffic Filtering and Segmentation Strategies - Microsoft Ce-1.mp4
53.4 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/4. Priorities For Mitigating Threats To Data - Microsoft Certif-1.mp4
53.4 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/5. Azure Best Practices for Network Security - Microsoft Certif-1.mp4
52.2 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/5. Hybrid Infrastructure - Microsoft Certified Cybersecurity Ar-1.mp4
50.4 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/6. Designing a Regulatory Compliance Strategy/6. Translating Privacy Requirements - Microsoft Certified Cyber.mp4
49.7 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/9. Designing a Strategy for Securing SaaS, PaaS, and IaaS Services/1. Security Baselines for SaaS, PaaS, and IaaS services - Micro.mp4
48.3 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/3. Translating Business Goals into Security Requirements - Micr.mp4
47.9 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/7. Securing Privileged Access Using RaMP - Microsoft Certified -1.mp4
47.8 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/2. Security Operations - Microsoft Certified Cybersecurity Arch-1.mp4
47.0 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/4. Designing a Security Operations Strategy/5. SIEMSOAR Strategy - Microsoft Certified Cybersecurity Archit.mp4
46.3 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/2. Translating Requirements - Microsoft Certified Cybersecurity.mp4
46.2 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/3. Security Strategy for Applications and APIs - Microsoft Cert-1.mp4
44.6 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/5. Designing an Identity Security Strategy/1. Strategy for Access to Cloud Resources - Microsoft Certified.mp4
43.0 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/7. Evaluating and Managing Security Postures/4. Designing Security for an Azure Landing Zone - Microsoft Cer.mp4
42.8 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/4. Designing a Security Operations Strategy/3. Logging and Auditing Strategy - Microsoft Certified Cybersec.mp4
42.3 MB
[磁力链接]
添加时间:
2023-12-24
大小:
2.5 GB
最近下载:
2025-03-13
热度:
9065
Advanced Cybersecurity and Ethical Hacking with ChatGPT
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/15 - CTF Challenges and Capture The Flag Events/48 - Introduction to Capture The Flag CTF Challenges.mp4
50.2 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/16 - Final Projects and Practical Assessments/52 - Building a Security Automation Workflow with ChatGPT.mp4
48.9 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/17 - Professional Development and Career Insights/55 - Navigating the Job Market and Advancing Your Cybersecurity Career.mp4
44.4 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/16 - Final Projects and Practical Assessments/53 - Penetration Testing Report Compilation with ChatGPT.mp4
39.3 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/17 - Professional Development and Career Insights/54 - Resume Building and Interview Preparation for Ethical Hackers.mp4
38.3 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/2 - Foundations of Cybersecurity and Hacking/7 - Operating System Fundamentals for Hacking and Penetration Testing.mp4
37.8 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/15 - CTF Challenges and Capture The Flag Events/49 - Solving CTF Challenges Using ChatGPT.mp4
37.3 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/5 - Vulnerability Identification and Assessment/17 - Network Vulnerability Scanning and Analysis with ChatGPT.mp4
36.8 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/1 - Section 1 Introduction to Cybersecurity and Ethical Hacking/4 - Understanding the Role of Ethical Hackers and Penetration Testers.mp4
36.4 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/11 - Case Studies and RealWorld Scenarios/36 - Ethical Hacking Case Studies Using ChatGPT.mp4
36.0 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/6 - Exploitation and Penetration Testing/21 - Penetration Testing Methodologies and Reporting.mp4
35.7 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/6 - Exploitation and Penetration Testing/20 - PostExploitation Techniques and Privilege Escalation.mp4
34.6 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/14 - Ethical Hacking in Cloud Environments/46 - Securing Containers and Serverless Architectures.mp4
34.5 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/3 - Getting Started with ChatGPT/10 - Setting Up and Configuring ChatGPT for Hacking Tasks.mp4
34.3 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/10 - Emerging Trends and Future of Cybersecurity/32 - Blockchain Security and Decentralized Technologies.mp4
33.2 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/13 - Cybersecurity Regulations and Compliance/43 - Conducting Compliance Audits with ChatGPT.mp4
33.0 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/7 - Advanced Ethical Hacking Techniques/24 - Wireless Network Hacking and Countermeasures Using ChatGPT.mp4
31.7 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/5 - Vulnerability Identification and Assessment/16 - Web Application Vulnerability Assessment Using ChatGPT.mp4
30.5 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/9 - ChatGPT for Security Innovation/28 - Leveraging ChatGPT for Threat Hunting and Analysis.mp4
30.1 MB
[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/3 - Getting Started with ChatGPT/11 - Navigating the ChatGPT Interface for Cybersecurity Analysis.mp4
28.8 MB
[磁力链接]
添加时间:
2023-12-25
大小:
1.5 GB
最近下载:
2025-03-14
热度:
12207
[ TutGee.com ] Linkedin - Practical Cybersecurity for IT Professionals
~Get Your Files Here !/04 - 3. Firewalls/03 - Advanced Windows Firewall.mp4
27.1 MB
~Get Your Files Here !/05 - 4. Network Scanning/01 - Getting started with Nmap.mp4
22.0 MB
~Get Your Files Here !/02 - 1. Why Cybersecurity/07 - Emerging trends in
cybersecurity
.mp4
20.4 MB
~Get Your Files Here !/02 - 1. Why Cybersecurity/01 - A history of hackers.mp4
17.5 MB
~Get Your Files Here !/04 - 3. Firewalls/05 - Introducing Linux iptables.mp4
16.1 MB
~Get Your Files Here !/04 - 3. Firewalls/02 - Windows Firewall basics.mp4
14.5 MB
~Get Your Files Here !/09 - 8. Network Protocols/02 - Capturing packets with Wireshark.mp4
14.3 MB
~Get Your Files Here !/04 - 3. Firewalls/04 - ZedLan firewall log analyser.mp4
13.4 MB
~Get Your Files Here !/02 - 1. Why Cybersecurity/04 - Common forms of cyberattack.mp4
13.1 MB
~Get Your Files Here !/09 - 8. Network Protocols/03 - Making sense of the protocols.mp4
13.0 MB
~Get Your Files Here !/02 - 1. Why Cybersecurity/02 - The cyber kill chain.mp4
12.0 MB
~Get Your Files Here !/03 - 2. Antivirus/01 - Introducing Microsoft Defender Antivirus.mp4
11.7 MB
~Get Your Files Here !/07 - 6. Vulnerability Scanning/01 - Preparing Nessus.mp4
10.5 MB
~Get Your Files Here !/08 - 7. Web Applications/02 - Running an SQL injection attack.mp4
10.1 MB
~Get Your Files Here !/05 - 4. Network Scanning/02 - Advanced Nmap options.mp4
10.0 MB
~Get Your Files Here !/02 - 1. Why Cybersecurity/03 - Stuxnet and the kill chain.mp4
9.8 MB
~Get Your Files Here !/03 - 2. Antivirus/02 - Detecting malware with Microsoft Defender.mp4
9.5 MB
~Get Your Files Here !/04 - 3. Firewalls/06 - Setting up a simple iptables firewall.mp4
9.3 MB
~Get Your Files Here !/06 - 5. Network Connections/02 - Transferring files using netcat.mp4
9.2 MB
~Get Your Files Here !/06 - 5. Network Connections/04 - Setting up a netcat honeypot.mp4
8.9 MB
[磁力链接]
添加时间:
2023-12-26
大小:
388.0 MB
最近下载:
2025-03-13
热度:
1631
Cybersecurity Architecture Fundamentals
Chapter 1 Introduction/006. Security Principles and Approaches.mp4
272.7 MB
Chapter 1 Introduction/003. The Problem with Security Today.mp4
236.8 MB
Chapter 1 Introduction/009. Understanding Residual Risk.mp4
120.0 MB
Chapter 4 Cyber Architecture for Enterprise Security/006. Vulnerability, Patch, and Availability Management.mp4
102.8 MB
Chapter 1 Introduction/008. Risk Management.mp4
99.6 MB
Chapter 1 Introduction/005. Who Is a Security Architect.mp4
98.0 MB
Chapter 2 Threat Modelling/006. PASTA.mp4
94.3 MB
Chapter 4 Cyber Architecture for Enterprise Security/001. Network Security.mp4
80.3 MB
Chapter 6 Case Study/001. Case Study Preview.mp4
78.0 MB
Chapter 2 Threat Modelling/002. Threat Modelling Versus Risk Assessment.mp4
75.6 MB
Chapter 2 Threat Modelling/001. Threat Modelling - Part 1.mp4
70.2 MB
Chapter 2 Threat Modelling/009. Attack Trees.mp4
68.7 MB
Chapter 4 Cyber Architecture for Enterprise Security/005. Data Protection.mp4
56.7 MB
Chapter 5 Designing for Security/003. Reference Security Architectures.mp4
52.0 MB
Chapter 2 Threat Modelling/003. Threat Modelling - Part 2.mp4
50.8 MB
Chapter 3 Enterprise Architecture Frameworks/003. Zachman Framework.mp4
44.9 MB
Chapter 5 Designing for Security/002. Security Design Pattern Example.mp4
44.6 MB
Chapter 1 Introduction/004. Introduction to Security Architecture.mp4
42.6 MB
Chapter 5 Designing for Security/001. Security Design Patterns.mp4
41.8 MB
Chapter 3 Enterprise Architecture Frameworks/004. SABSA Framework.mp4
37.0 MB
[磁力链接]
添加时间:
2023-12-26
大小:
2.4 GB
最近下载:
2025-03-14
热度:
5935
[CourserHub.com] Coursera - Google Cybersecurity Professional Certificate
foundations-of-
cybersecurity
/01_welcome-to-the-exciting-world-of-
cybersecurity
/01_get-started-with-the-certificate-program/01_welcome-to-the-google-
cybersecurity
-certificate.mp4
49.6 MB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/01_flaws-in-the-system/04_common-vulnerabilities-and-exposures.mp4
29.2 MB
foundations-of-
cybersecurity
/02_the-evolution-of-
cybersecurity
/01_the-history-of-
cybersecurity
/03_attacks-in-the-digital-age.mp4
26.8 MB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/03_authentication-authorization-and-accounting/03_the-mechanisms-of-authorization.mp4
26.4 MB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/02_malware/01_malicious-software.mp4
25.7 MB
manage-security-risks/04_use-playbooks-to-respond-to-incidents/01_phases-of-incident-response-playbooks/02_phases-of-an-incident-response-playbook.mp4
25.5 MB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/01_social-engineering/04_phishing-for-information.mp4
25.2 MB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/02_malware/03_the-rise-of-cryptojacking.mp4
24.8 MB
foundations-of-
cybersecurity
/03_protect-against-threats-risks-and-vulnerabilities/01_frameworks-and-controls/02_introduction-to-security-frameworks-and-controls.mp4
24.5 MB
foundations-of-
cybersecurity
/01_welcome-to-the-exciting-world-of-
cybersecurity
/02_introduction-to-
cybersecurity
/01_introduction-to-
cybersecurity
.mp4
24.2 MB
automate-
cybersecurity
-tasks-with-python/04_python-in-practice/03_debug-python-code/01_debugging-strategies.mp4
24.2 MB
assets-threats-and-vulnerabilities/02_protect-organizational-assets/02_encryption-methods/01_fundamentals-of-cryptography.mp4
23.7 MB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/03_cyber-attacker-mindset/01_protect-all-entry-points.mp4
23.6 MB
foundations-of-
cybersecurity
/03_protect-against-threats-risks-and-vulnerabilities/02_ethics-in-
cybersecurity
/01_ethics-in-
cybersecurity
.mp4
23.6 MB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/03_cyber-attacker-mindset/05_pathways-through-defenses.mp4
23.5 MB
foundations-of-
cybersecurity
/02_the-evolution-of-
cybersecurity
/01_the-history-of-
cybersecurity
/02_past-
cybersecurity
-attacks.mp4
23.1 MB
assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/01_flaws-in-the-system/02_vulnerability-management.mp4
23.0 MB
networks-and-network-security/04_security-hardening/04_cloud-hardening/02_kelsey-cloud-security-explained.mp4
23.0 MB
automate-
cybersecurity
-tasks-with-python/03_work-with-strings-and-lists/03_regular-expressions/01_regular-expressions-in-python.mp4
22.9 MB
assets-threats-and-vulnerabilities/04_threats-to-asset-security/01_social-engineering/02_the-criminal-art-of-persuasion.mp4
22.7 MB
[磁力链接]
添加时间:
2023-12-26
大小:
4.1 GB
最近下载:
2025-03-13
热度:
9566
共14页
上一页
5
6
7
8
9
10
11
12
13
下一页