搜索
为您找到约
275
个磁力链接/BT种子,耗时 0 毫秒。
排序:
相关程度
热度
文件大小
添加时间
最近访问
[ FreeCourseWeb.com ] AI Cybersecurity with DeepSeek R1 - Protect Your Digital Life
~Get Your Files Here !/5 - Digital Forensics & Investigations/2 -Analyzing Suspicious Software.mp4
46.2 MB
~Get Your Files Here !/4 - OSINT – How Scammers Gather Your Data/3 -Romance Scams How They Manipulate Victims.mp4
43.4 MB
~Get Your Files Here !/1 - Introduction to AI and Cybersecurity/1 -What Are Artificial Intelligence & Cybersecurity.mp4
37.4 MB
~Get Your Files Here !/3 - Ethical Hacking Real-World Demonstrations/3 -Hacking with Advanced Malware A Demonstration.mp4
27.7 MB
~Get Your Files Here !/7 - Final Thoughts & Cybersecurity Mindset/1 -Psychological Tricks Hackers Use & How to Avoid Scams.mp4
26.1 MB
~Get Your Files Here !/6 - Leveraging AI for Profit and Cybersecurity/1 -Qwen 2.5 AI Video Generation.mp4
25.8 MB
~Get Your Files Here !/3 - Ethical Hacking Real-World Demonstrations/2 -Why Do Experts Say Don't Click the Link.mp4
23.4 MB
~Get Your Files Here !/4 - OSINT – How Scammers Gather Your Data/1 -How Scammers Steal Your Personal Data.mp4
22.6 MB
~Get Your Files Here !/4 - OSINT – How Scammers Gather Your Data/2 -Job Scams Be Careful Where You Apply.mp4
19.7 MB
~Get Your Files Here !/4 - OSINT – How Scammers Gather Your Data/4 -OSINT Tools SearchPeopleFree, WhitePages.mp4
15.5 MB
~Get Your Files Here !/5 - Digital Forensics & Investigations/3 -Investigating Malicious Links.mp4
13.4 MB
~Get Your Files Here !/5 - Digital Forensics & Investigations/4 -Verifying Email Sources for Cyber Threats.mp4
10.8 MB
~Get Your Files Here !/3 - Ethical Hacking Real-World Demonstrations/4 -Key Takeaways & How to Protect Yourself.mp4
10.7 MB
~Get Your Files Here !/3 - Ethical Hacking Real-World Demonstrations/1 -Advanced Phishing Attacks How They Work.mp4
9.4 MB
~Get Your Files Here !/1 - Introduction to AI and Cybersecurity/2 -Who Is This Course For.mp4
8.7 MB
~Get Your Files Here !/5 - Digital Forensics & Investigations/1 -Introduction to Digital Forensics.mp4
8.0 MB
~Get Your Files Here !/2 - Cybersecurity Myths vs. Reality/2 -Why Antivirus Alone Won't Keep You Safe.mp4
7.9 MB
~Get Your Files Here !/2 - Cybersecurity Myths vs. Reality/1 -What Are the Risks of Downloading Unknown Apps.mp4
6.7 MB
~Get Your Files Here !/6 - Leveraging AI for Profit and Cybersecurity/2 - Use Google Ai studio to generate script for a video.html
11.3 kB
~Get Your Files Here !/6 - Leveraging AI for Profit and Cybersecurity/2 - Whisper Free Audio Transcription for Security Experts.html
5.3 kB
[磁力链接]
添加时间:
2025-02-23
大小:
363.3 MB
最近下载:
2025-03-01
热度:
220
Lynda Cybersecurity with Cloud Computing tutorialkhan.com.iso
Lynda Cybersecurity with Cloud Computing tutorialkhan.com.iso
359.3 MB
[磁力链接]
添加时间:
2017-02-22
大小:
359.3 MB
最近下载:
2021-05-18
热度:
279
Lynda - Cybersecurity for Small and Medium Businesses Essential Training
1.Introduction/01.Welcome.en.srt
2.1 kB
1.Introduction/01.Welcome.mp4
21.9 MB
1.Introduction/02.What you should know.en.srt
1.5 kB
1.Introduction/02.What you should know.mp4
5.0 MB
2.1. The Basics/03.Why you should care.en.srt
6.7 kB
2.1. The Basics/03.Why you should care.mp4
31.6 MB
2.1. The Basics/04.Physical security vs.
cybersecurity
.en.srt
1.9 kB
2.1. The Basics/04.Physical security vs.
cybersecurity
.mp4
4.8 MB
2.1. The Basics/05.Anyone can improve the
cybersecurity
of a business.en.srt
3.4 kB
2.1. The Basics/05.Anyone can improve the
cybersecurity
of a business.mp4
9.1 MB
2.1. The Basics/06.What are the
cybersecurity
threat actions facing businesses.en.srt
4.5 kB
2.1. The Basics/06.What are the
cybersecurity
threat actions facing businesses.mp4
6.9 MB
2.1. The Basics/07.What are the
cybersecurity
threats.en.srt
6.4 kB
2.1. The Basics/07.What are the
cybersecurity
threats.mp4
14.6 MB
2.1. The Basics/08.A five-step process to improve
cybersecurity
.en.srt
3.9 kB
2.1. The Basics/08.A five-step process to improve
cybersecurity
.mp4
7.2 MB
3.2. Identify/09.Step #1 - Identify key assets.en.srt
3.1 kB
3.2. Identify/09.Step #1 - Identify key assets.mp4
9.5 MB
3.2. Identify/10.Inventory sheet - Data and devices.en.srt
1.9 kB
3.2. Identify/10.Inventory sheet - Data and devices.mp4
3.1 MB
[磁力链接]
添加时间:
2018-07-25
大小:
358.3 MB
最近下载:
2025-03-01
热度:
1385
Cybersecurity for Small and Medium Businesses - Essential Training
2.1. The Basics/03.Why you should care.mp4
31.6 MB
1.Introduction/01.Welcome.mp4
21.9 MB
1.Introduction/02.What you should know.en.srt
1.5 kB
1.Introduction/02.What you should know.mp4
5.0 MB
2.1. The Basics/03.Why you should care.en.srt
6.7 kB
1.Introduction/01.Welcome.en.srt
2.1 kB
2.1. The Basics/04.Physical security vs.
cybersecurity
.en.srt
1.9 kB
2.1. The Basics/04.Physical security vs.
cybersecurity
.mp4
4.8 MB
2.1. The Basics/05.Anyone can improve the
cybersecurity
of a business.en.srt
3.4 kB
2.1. The Basics/05.Anyone can improve the
cybersecurity
of a business.mp4
9.1 MB
2.1. The Basics/06.What are the
cybersecurity
threat actions facing businesses.en.srt
4.5 kB
2.1. The Basics/06.What are the
cybersecurity
threat actions facing businesses.mp4
6.9 MB
2.1. The Basics/07.What are the
cybersecurity
threats.en.srt
6.4 kB
2.1. The Basics/07.What are the
cybersecurity
threats.mp4
14.6 MB
2.1. The Basics/08.A five-step process to improve
cybersecurity
.en.srt
3.9 kB
2.1. The Basics/08.A five-step process to improve
cybersecurity
.mp4
7.2 MB
3.2. Identify/09.Step #1 - Identify key assets.en.srt
3.1 kB
3.2. Identify/09.Step #1 - Identify key assets.mp4
9.5 MB
3.2. Identify/10.Inventory sheet - Data and devices.en.srt
1.9 kB
3.2. Identify/10.Inventory sheet - Data and devices.mp4
3.1 MB
[磁力链接]
添加时间:
2018-09-09
大小:
358.3 MB
最近下载:
2025-02-28
热度:
1649
Lynda - Cybersecurity for Small and Medium Businesses Essential Training
2.1. The Basics/03.Why you should care.mp4
31.6 MB
1.Introduction/01.Welcome.mp4
21.9 MB
4.3. Protect/16.Technology solutions to protect a business.mp4
20.2 MB
7.6. Recover/28.Cybersecurity insurance.mp4
15.8 MB
4.3. Protect/15.Sharing online - How to prevent a phish.mp4
15.0 MB
2.1. The Basics/07.What are the
cybersecurity
threats.mp4
14.6 MB
4.3. Protect/18.Culture of security - Policies, procedures, and attitude.mp4
14.3 MB
6.5. Respond/24.Key elements of a cyber incident response.mp4
13.6 MB
4.3. Protect/17.Passphrases and authentication.mp4
13.3 MB
3.2. Identify/11.Account access best practices.mp4
12.9 MB
5.4. Detect/21.Cybersecurity assessments and detection technology solutions.mp4
12.8 MB
8.7. Resources/32.Scam and threat alerts.mp4
11.7 MB
8.7. Resources/31.More
cybersecurity
resources.mp4
11.5 MB
3.2. Identify/12.What about the cloud.mp4
11.3 MB
6.5. Respond/26.State breach response laws.mp4
9.6 MB
3.2. Identify/09.Step #1 - Identify key assets.mp4
9.5 MB
6.5. Respond/22.Step #4 - Respond to a cyber breach.mp4
9.3 MB
5.4. Detect/19.Step #3 - Detect a breach.mp4
9.3 MB
2.1. The Basics/05.Anyone can improve the
cybersecurity
of a business.mp4
9.1 MB
9.Conclusion/33.Next steps.mp4
9.0 MB
[磁力链接]
添加时间:
2024-12-25
大小:
358.3 MB
最近下载:
2025-03-02
热度:
222
TTC - Thinking about Cybersecurity
TGC_9523_Lect18_Cybersecurity.mp3
21.3 MB
TGC_9523_Lect10_Cybersecurity.mp3
20.8 MB
TGC_9523_Lect14_Cybersecurity.mp3
20.6 MB
TGC_9523_Lect08_Cybersecurity.mp3
19.8 MB
TGC_9523_Lect05_Cybersecurity.mp3
19.8 MB
TGC_9523_Lect13_Cybersecurity.mp3
19.7 MB
TGC_9523_Lect11_Cybersecurity.mp3
19.5 MB
TGC_9523_Lect17_Cybersecurity.mp3
19.5 MB
TGC_9523_Lect01_Cybersecurity.mp3
19.5 MB
TGC_9523_Lect04_Cybersecurity.mp3
19.3 MB
TGC_9523_Lect09_Cybersecurity.mp3
19.1 MB
TGC_9523_Lect12_Cybersecurity.mp3
18.9 MB
TGC_9523_Lect15_Cybersecurity.mp3
18.9 MB
TGC_9523_Lect16_Cybersecurity.mp3
18.8 MB
TGC_9523_Lect06_Cybersecurity.mp3
18.7 MB
TGC_9523_Lect07_Cybersecurity.mp3
18.7 MB
TGC_9523_Lect02_Cybersecurity.mp3
18.2 MB
TGC_9523_Lect03_Cybersecurity.mp3
17.9 MB
DG9523_98F12.PDF
4.7 MB
[磁力链接]
添加时间:
2021-03-26
大小:
353.5 MB
最近下载:
2025-02-28
热度:
2370
[FreeCoursesOnline.Me] [Skillshare] Cybersecurity Data Science [FCO]
2-Obtaining a malware dataset.mp4
37.9 MB
8-Tfidf.mp4
25.9 MB
1-Downloading and installing virtual box and windows image.mp4
24.9 MB
16-Malconv.mp4
23.7 MB
15-Ngram classifier.mp4
22.9 MB
4-Static and dynamic analysis.mp4
21.3 MB
14-Hash grams.mp4
18.3 MB
0-Course introduction.mp4
15.7 MB
7-Dumping using pefile.mp4
14.3 MB
19-Isolation forest.mp4
13.3 MB
17-Section 1 end.mp4
12.7 MB
20-Section 2 end.mp4
12.4 MB
9-Train test split.mp4
11.7 MB
13-N gram background.mp4
11.4 MB
10-Training a classifier.mp4
10.3 MB
12-Thresholding.mp4
10.0 MB
3-Obtaining a benign dataset.mp4
9.5 MB
23-CAPTCHA recognizer.mp4
9.3 MB
18-Kdd cup dataset.mp4
8.4 MB
24-Course end.mp4
8.4 MB
[磁力链接]
添加时间:
2021-05-07
大小:
353.4 MB
最近下载:
2025-02-27
热度:
768
[ FreeCourseWeb.com ] Udemy - Cybersecurity Data Science.zip
[ FreeCourseWeb.com ] Udemy - Cybersecurity Data Science.zip
349.0 MB
[磁力链接]
添加时间:
2022-04-08
大小:
349.0 MB
最近下载:
2025-02-26
热度:
157
[ FreeCourseWeb.com ] CompTIA Cybersecurity Analyst + (CySA + ) (CS0-003) - 3 Incident Response and Management
~Get Your Files Here !/05 - 4. Forensic Techniques/09 - Password forensics.mp4
19.8 MB
~Get Your Files Here !/05 - 4. Forensic Techniques/08 - Operating system analysis.mp4
15.5 MB
~Get Your Files Here !/05 - 4. Forensic Techniques/11 - Software forensics.mp4
15.2 MB
~Get Your Files Here !/05 - 4. Forensic Techniques/05 - File carving.mp4
13.1 MB
~Get Your Files Here !/05 - 4. Forensic Techniques/10 - Network forensics.mp4
11.3 MB
~Get Your Files Here !/02 - 1. Incident Response Programs/08 - Incident eradication and recovery.mp4
11.2 MB
~Get Your Files Here !/02 - 1. Incident Response Programs/01 - Build an incident response program.mp4
10.7 MB
~Get Your Files Here !/07 - 6. Disaster Recovery/01 - Disaster recovery.mp4
10.7 MB
~Get Your Files Here !/06 - 5. Business Continuity/03 - High availability and fault tolerance.mp4
10.4 MB
~Get Your Files Here !/04 - 3. Incident Investigation/01 - Logging security information.mp4
10.2 MB
~Get Your Files Here !/05 - 4. Forensic Techniques/04 - System and file forensics.mp4
10.0 MB
~Get Your Files Here !/05 - 4. Forensic Techniques/06 - Creating forensic images.mp4
10.0 MB
~Get Your Files Here !/03 - 2. Attack Frameworks/01 - MITRE ATT&CK.mp4
9.9 MB
~Get Your Files Here !/04 - 3. Incident Investigation/03 - Cloud audits and investigations.mp4
9.9 MB
~Get Your Files Here !/02 - 1. Incident Response Programs/10 - Post-incident activities.mp4
9.4 MB
~Get Your Files Here !/02 - 1. Incident Response Programs/04 - Incident identification.mp4
9.3 MB
~Get Your Files Here !/07 - 6. Disaster Recovery/04 - Disaster recovery sites.mp4
9.3 MB
~Get Your Files Here !/05 - 4. Forensic Techniques/15 - Ediscovery and evidence production.mp4
8.2 MB
~Get Your Files Here !/06 - 5. Business Continuity/02 - Business continuity controls.mp4
8.0 MB
~Get Your Files Here !/04 - 3. Incident Investigation/02 - Security information and event management.mp4
7.9 MB
[磁力链接]
添加时间:
2023-12-17
大小:
348.1 MB
最近下载:
2025-03-01
热度:
4430
P. W. Singer, Allan Friedman - 2016 - Cybersecurity and Cyberwar (Technology)
Cybersecurity and Cyberwar (01).mp3
13.6 MB
Cybersecurity and Cyberwar (57).mp3
12.5 MB
Cybersecurity and Cyberwar (46).mp3
11.2 MB
Cybersecurity and Cyberwar (48).mp3
9.6 MB
Cybersecurity and Cyberwar (31).mp3
9.3 MB
Cybersecurity and Cyberwar (49).mp3
8.5 MB
Cybersecurity and Cyberwar (19).mp3
8.5 MB
Cybersecurity and Cyberwar (51).mp3
8.5 MB
Cybersecurity and Cyberwar (09).mp3
8.4 MB
Cybersecurity and Cyberwar (33).mp3
8.3 MB
Cybersecurity and Cyberwar (56).mp3
7.7 MB
Cybersecurity and Cyberwar (52).mp3
7.6 MB
Cybersecurity and Cyberwar (32).mp3
7.1 MB
Cybersecurity and Cyberwar (15).mp3
6.9 MB
Cybersecurity and Cyberwar (55).mp3
6.8 MB
Cybersecurity and Cyberwar (20).mp3
6.8 MB
Cybersecurity and Cyberwar (05).mp3
6.6 MB
Cybersecurity and Cyberwar (50).mp3
6.3 MB
Cybersecurity and Cyberwar (12).mp3
6.3 MB
Cybersecurity and Cyberwar (45).mp3
6.2 MB
[磁力链接]
添加时间:
2022-01-19
大小:
336.6 MB
最近下载:
2025-03-01
热度:
1920
Cybersecurity and Cyberwar.m4b
Cybersecurity and Cyberwar.m4b
328.4 MB
[磁力链接]
添加时间:
2023-12-23
大小:
328.4 MB
最近下载:
2025-03-01
热度:
4276
[ FreeCourseWeb.com ] ISO 27001 - 2022-Compliant Cybersecurity - The Annex A Controls
~Get Your Files Here !/13 - 12. Threat and Vulnerability Management and Secure Configuration/02 - Secure configuration (Controls 8.9, 8.19, and 8.24).mp4
14.2 MB
~Get Your Files Here !/07 - 6. Information Security Event Management/01 - Information security incident management (Controls 5.24–5.28, and 6.8).mp4
13.3 MB
~Get Your Files Here !/05 - 4. Identity and Access Management/01 - Access management (Controls 5.15–5.18).mp4
12.9 MB
~Get Your Files Here !/04 - 3. Information Protection/02 - Deletion, masking, DLP, and test data (Controls 8.10–8.12, and 8.33).mp4
12.7 MB
~Get Your Files Here !/08 - 7. Continuity/01 - Continuity (Controls 5.29, 5.30, and 8.13).mp4
12.4 MB
~Get Your Files Here !/14 - 13. Application Security/01 - Secure development (Controls 8.25–8.28).mp4
12.4 MB
~Get Your Files Here !/10 - 9. Human Resource Security/02 - During employment (Controls 6.3–6.6).mp4
12.3 MB
~Get Your Files Here !/12 - 11. System and Network Security/01 - Network security management (Controls 8.20–8.23).mp4
12.1 MB
~Get Your Files Here !/12 - 11. System and Network Security/02 - Protection of information systems (Controls 8.7, 8.18, 8.30, and 8.34).mp4
11.8 MB
~Get Your Files Here !/14 - 13. Application Security/02 - Testing, separate environments, and change management (Controls 8.29, 8.31, and 8.32).mp4
11.7 MB
~Get Your Files Here !/05 - 4. Identity and Access Management/02 - System and application access control (Controls 8.2–8.5).mp4
11.6 MB
~Get Your Files Here !/02 - 1. Governance/03 - Contacts and project management (Controls 5.5, 5.6, and 5.8).mp4
11.0 MB
~Get Your Files Here !/03 - 2. Asset Management/01 - Responsibility for information assets (Controls 5.9, 5.10, 6.7, and 8.1).mp4
10.8 MB
~Get Your Files Here !/04 - 3. Information Protection/01 - Classification, labeling, and privacy (Controls 5.12, 5.13, and 5.34).mp4
10.8 MB
~Get Your Files Here !/02 - 1. Governance/02 - Roles, responsibilities, and duties (Controls 5.2–5.4).mp4
10.4 MB
~Get Your Files Here !/02 - 1. Governance/01 - Policies for information security (Control 5.1).mp4
10.1 MB
~Get Your Files Here !/07 - 6. Information Security Event Management/02 - Logging and monitoring (Controls 8.15–8.17).mp4
9.9 MB
~Get Your Files Here !/06 - 5. Supplier Relationships Security/01 - Supplier relationships security (Controls 5.19–5.21).mp4
9.6 MB
~Get Your Files Here !/06 - 5. Supplier Relationships Security/02 - Managing supplier service delivery and cloud services security (Controls 5.22 and 5.23).mp4
9.6 MB
~Get Your Files Here !/13 - 12. Threat and Vulnerability Management and Secure Configuration/01 - Threat and vulnerability management (Controls 5.7 and 8.8).mp4
9.5 MB
[磁力链接]
添加时间:
2024-01-12
大小:
310.4 MB
最近下载:
2025-03-01
热度:
9443
Lynda - Cybersecurity for IT Professionals
00. Introduction/00_01 - Welcome.mp4
6.3 MB
00. Introduction/00_02 - What you should know before watching this course.mp4
869.2 kB
00. Introduction/00_03 - Using the exercise files.mp4
950.7 kB
01. Why Cybersecurity/01_01 - Hackers and the kill chain.mp4
14.3 MB
01. Why Cybersecurity/01_02 - The Stuxnet kill chain.mp4
8.9 MB
01. Why Cybersecurity/01_03 - Common forms of
cybersecurity
attack.mp4
14.1 MB
02. Antivirus/02_01 - Viruses, spyware, and adware.mp4
4.0 MB
02. Antivirus/02_02 - Using Windows Defender.mp4
3.1 MB
02. Antivirus/02_03 - Setting up real-time protection.mp4
1.0 MB
02. Antivirus/02_04 - Scanning with Windows Defender.mp4
4.3 MB
02. Antivirus/02_05 - Modifying antivirus settings in Windows Defender.mp4
5.8 MB
02. Antivirus/02_06 - Scheduling a scan with Windows Defender.mp4
9.7 MB
02. Antivirus/02_07 - Using Windows Defender offline.mp4
1.9 MB
02. Antivirus/02_08 - Exploring antivirus on Linux.mp4
1.7 MB
03. Personal Firewalls/03_01 - Why firewalls.mp4
1.5 MB
03. Personal Firewalls/03_02 - Using the Microsoft Windows Firewall.mp4
12.9 MB
03. Personal Firewalls/03_03 - Setting up advanced security notifications.mp4
9.5 MB
03. Personal Firewalls/03_04 - Setting up detailed rules.mp4
10.9 MB
03. Personal Firewalls/03_05 - Managing and analyzing log files with ZedLan.mp4
8.4 MB
03. Personal Firewalls/03_06 - Introducing iptables in Linux.mp4
10.7 MB
[磁力链接]
添加时间:
2017-07-25
大小:
303.6 MB
最近下载:
2025-03-02
热度:
4376
CyberRange : la solution de cyber-entraînement et de tests Cyber d’Airbus Cybersecurity - Fabien Lorc’h 1080p.mp4
CyberRange : la solution de cyber-entraînement et de tests Cyber d’Airbus Cybersecurity - Fabien Lorc’h 1080p.mp4
301.1 MB
[磁力链接]
添加时间:
2018-10-31
大小:
301.1 MB
最近下载:
2018-11-01
热度:
4
Lynda - Cybersecurity Foundations
00. Introduction/00_01 - Welcome.mp4
5.8 MB
00. Introduction/00_02 - What you should know.mp4
2.0 MB
01. Cybersecurity Foundations/01_01 - Understanding the NIST
cybersecurity
framework.mp4
12.8 MB
01. Cybersecurity Foundations/01_02 - Dissecting cyber risk.mp4
13.3 MB
01. Cybersecurity Foundations/01_03 - Unpacking COBIT 5.mp4
10.5 MB
01. Cybersecurity Foundations/01_04 - Looking closer at DSS05.mp4
8.2 MB
01. Cybersecurity Foundations/01_05 - Implementing control frameworks.mp4
14.6 MB
01. Cybersecurity Foundations/01_06 - Dissecting the payment card industry and PCI DSS.mp4
14.7 MB
01. Cybersecurity Foundations/01_07 - Exploring the Cyber Essentials framework.mp4
9.4 MB
02. Cybersecurity Threats/02_01 - Breaking down the
cybersecurity
kill chain.mp4
8.2 MB
02. Cybersecurity Threats/02_02 - Dissecting security threats.mp4
11.7 MB
02. Cybersecurity Threats/02_03 - Exploring cybercrime as an industry.mp4
10.1 MB
02. Cybersecurity Threats/02_04 - Hiding malware through cloaking and alternate data streams.mp4
9.0 MB
02. Cybersecurity Threats/02_05 - Using callbacks to capture keystrokes.mp4
9.7 MB
02. Cybersecurity Threats/02_06 - Hiding malware with rootkits.mp4
9.8 MB
02. Cybersecurity Threats/02_07 - Understanding advanced persistent threats (APTs).mp4
13.5 MB
02. Cybersecurity Threats/02_08 - Exploring ransomware.mp4
8.4 MB
03. Security Architecture/03_01 - Describing security requirements.mp4
14.9 MB
03. Security Architecture/03_02 - Architecting security risk.mp4
13.4 MB
03. Security Architecture/03_03 - Selecting security controls.mp4
8.5 MB
[磁力链接]
添加时间:
2017-07-23
大小:
301.1 MB
最近下载:
2025-02-22
热度:
1650
Lynda - Foundations of Cybersecurity
021 Managing user access and identity.mp4
20.7 MB
022 Implementing preventative security.mp4
18.8 MB
023 Monitoring and alerts.mp4
15.7 MB
018 Describing security requirements.mp4
14.9 MB
008 Dissecting the payment card industry and PCI DSS.mp4
14.6 MB
007 Implementing control frameworks.mp4
14.3 MB
025 Preparing for an incident.mp4
14.2 MB
019 Architecting security risk.mp4
13.5 MB
016 Understanding advanced persistent threats (APTs).mp4
13.5 MB
004 Dissecting cyber risk.mp4
13.1 MB
003 Understanding the NIST
cybersecurity
framework.mp4
12.6 MB
011 Dissecting security threats.mp4
11.6 MB
026 Responding to an incident.mp4
11.5 MB
005 Unpacking COBIT 5.mp4
10.3 MB
012 Exploring cybercrime as an industry.mp4
9.9 MB
014 Using callbacks to capture keystrokes.mp4
9.8 MB
015 Hiding malware with rootkits.mp4
9.8 MB
009 Exploring the Cyber Essentials framework.mp4
9.3 MB
013 Hiding malware through cloaking and alternate data streams.mp4
9.0 MB
020 Selecting security controls.mp4
8.5 MB
[磁力链接]
添加时间:
2017-02-08
大小:
300.9 MB
最近下载:
2025-02-26
热度:
350
Lynda - Foundations of Cybersecurity
021 Managing user access and identity.mp4
20.7 MB
022 Implementing preventative security.mp4
18.8 MB
023 Monitoring and alerts.mp4
15.7 MB
018 Describing security requirements.mp4
14.9 MB
008 Dissecting the payment card industry and PCI DSS.mp4
14.6 MB
007 Implementing control frameworks.mp4
14.3 MB
025 Preparing for an incident.mp4
14.2 MB
019 Architecting security risk.mp4
13.5 MB
016 Understanding advanced persistent threats (APTs).mp4
13.5 MB
004 Dissecting cyber risk.mp4
13.1 MB
003 Understanding the NIST
cybersecurity
framework.mp4
12.6 MB
011 Dissecting security threats.mp4
11.6 MB
026 Responding to an incident.mp4
11.5 MB
005 Unpacking COBIT 5.mp4
10.3 MB
012 Exploring cybercrime as an industry.mp4
9.9 MB
014 Using callbacks to capture keystrokes.mp4
9.8 MB
015 Hiding malware with rootkits.mp4
9.8 MB
009 Exploring the Cyber Essentials framework.mp4
9.3 MB
013 Hiding malware through cloaking and alternate data streams.mp4
9.0 MB
020 Selecting security controls.mp4
8.5 MB
[磁力链接]
添加时间:
2017-02-19
大小:
300.9 MB
最近下载:
2025-03-01
热度:
2703
Lynda - Foundations of Cybersecurity
01. Introduction/01_01-Welcome.mp4
6.5 MB
01. Introduction/01_02-What you should know.mp4
2.0 MB
02. Cybersecurity Foundations/02_01-Understanding the NIST
cybersecurity
framework.mp4
12.6 MB
02. Cybersecurity Foundations/02_02-Dissecting cyber risk.mp4
13.1 MB
02. Cybersecurity Foundations/02_03-Unpacking COBIT 5.mp4
10.3 MB
02. Cybersecurity Foundations/02_04-Looking closer at DSS05.mp4
8.1 MB
02. Cybersecurity Foundations/02_05-Implementing control frameworks.mp4
14.3 MB
02. Cybersecurity Foundations/02_06-Dissecting the payment card industry and PCI DSS.mp4
14.6 MB
02. Cybersecurity Foundations/02_07-Exploring the Cyber Essentials framework.mp4
9.3 MB
03. Cybersecurity Threats/03_01-Breaking down the
cybersecurity
kill chain.mp4
8.1 MB
03. Cybersecurity Threats/03_02-Dissecting security threats.mp4
11.6 MB
03. Cybersecurity Threats/03_03-Exploring cybercrime as an industry.mp4
9.9 MB
03. Cybersecurity Threats/03_04-Hiding malware through cloaking and alternate data streams.mp4
9.0 MB
03. Cybersecurity Threats/03_05-Using callbacks to capture keystrokes.mp4
9.8 MB
03. Cybersecurity Threats/03_06-Hiding malware with rootkits.mp4
9.8 MB
03. Cybersecurity Threats/03_07-Understanding advanced persistent threats APTs.mp4
13.5 MB
03. Cybersecurity Threats/03_08-Exploring ransomware.mp4
8.4 MB
04. Security Architecture/04_01-Describing security requirements.mp4
14.9 MB
04. Security Architecture/04_02-Architecting security risk.mp4
13.5 MB
04. Security Architecture/04_03-Selecting security controls.mp4
8.5 MB
[磁力链接]
添加时间:
2017-02-08
大小:
300.9 MB
最近下载:
2025-02-28
热度:
1386
LYNDA FOUNDATIONS OF CYBERSECURITY TUTORIAL
01. Introduction/01_01-Welcome.mp4
6.5 MB
01. Introduction/01_02-What you should know.mp4
2.0 MB
02. Cybersecurity Foundations/02_06-Dissecting the payment card industry and PCI DSS.mp4
14.6 MB
02. Cybersecurity Foundations/02_05-Implementing control frameworks.mp4
14.3 MB
02. Cybersecurity Foundations/02_02-Dissecting cyber risk.mp4
13.1 MB
02. Cybersecurity Foundations/02_01-Understanding the NIST
cybersecurity
framework.mp4
12.6 MB
02. Cybersecurity Foundations/02_03-Unpacking COBIT 5.mp4
10.3 MB
02. Cybersecurity Foundations/02_07-Exploring the Cyber Essentials framework.mp4
9.3 MB
02. Cybersecurity Foundations/02_04-Looking closer at DSS05.mp4
8.1 MB
03. Cybersecurity Threats/03_07-Understanding advanced persistent threats APTs.mp4
13.5 MB
03. Cybersecurity Threats/03_02-Dissecting security threats.mp4
11.6 MB
03. Cybersecurity Threats/03_03-Exploring cybercrime as an industry.mp4
9.9 MB
03. Cybersecurity Threats/03_05-Using callbacks to capture keystrokes.mp4
9.8 MB
03. Cybersecurity Threats/03_06-Hiding malware with rootkits.mp4
9.8 MB
03. Cybersecurity Threats/03_04-Hiding malware through cloaking and alternate data streams.mp4
9.0 MB
03. Cybersecurity Threats/03_08-Exploring ransomware.mp4
8.4 MB
03. Cybersecurity Threats/03_01-Breaking down the
cybersecurity
kill chain.mp4
8.1 MB
04. Security Architecture/04_04-Managing user access and identity.mp4
20.7 MB
04. Security Architecture/04_05-Implementing preventative security.mp4
18.8 MB
04. Security Architecture/04_06-Monitoring and alerts.mp4
15.7 MB
[磁力链接]
添加时间:
2017-02-24
大小:
300.9 MB
最近下载:
2024-09-26
热度:
1087
Cybersecurity for Executives
5.4. Stop Malicious Code/20.How to avoid malicious code.mp4
12.5 MB
1.Introduction/01.Cybersecurity for executives.mp4
4.3 MB
1.Introduction/02.What you should know.en.srt
1.4 kB
1.Introduction/02.What you should know.mp4
1.2 MB
1.Introduction/03.How this course is organized.en.srt
1.7 kB
1.Introduction/03.How this course is organized.mp4
2.3 MB
2.1. Understand the Big Picture/04.Understand the big picture overview.en.srt
2.1 kB
2.1. Understand the Big Picture/04.Understand the big picture overview.mp4
4.8 MB
2.1. Understand the Big Picture/05.Why are you a target.en.srt
4.0 kB
2.1. Understand the Big Picture/05.Why are you a target.mp4
8.1 MB
2.1. Understand the Big Picture/06.Example - Organized crime.en.srt
4.5 kB
2.1. Understand the Big Picture/06.Example - Organized crime.mp4
9.7 MB
2.1. Understand the Big Picture/07.Why are you in the line of fire.en.srt
3.5 kB
2.1. Understand the Big Picture/07.Why are you in the line of fire.mp4
7.1 MB
2.1. Understand the Big Picture/08.Example - Cyberwar cross-fire.en.srt
3.3 kB
2.1. Understand the Big Picture/08.Example - Cyberwar cross-fire.mp4
7.6 MB
2.1. Understand the Big Picture/09.Insider threat - Cyber failure.en.srt
4.4 kB
2.1. Understand the Big Picture/09.Insider threat - Cyber failure.mp4
7.6 MB
3.2. How to Think about Cybersecurity/10.Think about
cybersecurity
summary.en.srt
1.7 kB
3.2. How to Think about Cybersecurity/10.Think about
cybersecurity
summary.mp4
2.9 MB
[磁力链接]
添加时间:
2018-10-13
大小:
300.7 MB
最近下载:
2025-03-01
热度:
2780
共14页
上一页
6
7
8
9
10
11
12
13
14
下一页