搜索
为您找到约
290
个磁力链接/BT种子,耗时 0 毫秒。
排序:
相关程度
热度
文件大小
添加时间
最近访问
[ DevCourseWeb.com ] China's Cybersecurity and Privacy Regulations - Essential Training
~Get Your Files Here !/05 - 4.Personal Information Protection Law/01 - Personal Information Protection Law breakdown.mp4
29.7 MB
~Get Your Files Here !/05 - 4.Personal Information Protection Law/02 - Legal basis and consent.mp4
16.8 MB
~Get Your Files Here !/05 - 4.Personal Information Protection Law/04 - Personal information handler obligations.mp4
15.5 MB
~Get Your Files Here !/05 - 4.Personal Information Protection Law/05 - Cross-border data transfer and updates to the regulation.mp4
15.2 MB
~Get Your Files Here !/03 - 2. Cybersecurity Law/01 - Cybersecurity Law breakdown.mp4
13.6 MB
~Get Your Files Here !/05 - 4.Personal Information Protection Law/03 - Data subject rights.mp4
13.3 MB
~Get Your Files Here !/03 - 2. Cybersecurity Law/02 - Multilevel protection scheme.mp4
13.2 MB
~Get Your Files Here !/04 - 3. Data Security Law/01 - Data Security Law breakdown.mp4
12.8 MB
~Get Your Files Here !/03 - 2. Cybersecurity Law/03 - Multilevel protection scheme technical components.mp4
10.7 MB
~Get Your Files Here !/02 - 1. China Regulation Basics/02 - Scope.mp4
10.7 MB
~Get Your Files Here !/02 - 1. China Regulation Basics/03 - Important dates.mp4
10.6 MB
~Get Your Files Here !/06 - 5. Real-World Guidance/02 - Enforcement action examples.mp4
10.2 MB
~Get Your Files Here !/04 - 3. Data Security Law/03 - Key provisions of the Data Security Law.mp4
9.7 MB
~Get Your Files Here !/04 - 3. Data Security Law/02 - Data classification and cross-border transfer guidelines.mp4
8.6 MB
~Get Your Files Here !/01 - Introduction/03 - Definitions.mp4
7.3 MB
~Get Your Files Here !/07 - Conclusion/02 - Additional resources.mp4
6.8 MB
~Get Your Files Here !/02 - 1. China Regulation Basics/01 - Overview of the recent
cybersecurity
and privacy regulations.mp4
6.7 MB
~Get Your Files Here !/07 - Conclusion/01 - How to get started.mp4
6.5 MB
~Get Your Files Here !/06 - 5. Real-World Guidance/01 - Successful certification examples.mp4
6.0 MB
~Get Your Files Here !/01 - Introduction/01 - Cybersecurity and privacy regulation in China.mp4
4.7 MB
[磁力链接]
添加时间:
2024-09-02
大小:
237.4 MB
最近下载:
2024-12-10
热度:
229
The Cybersecurity Threat Landscape
[TutsNode.net] - The Cybersecurity Threat Landscape/10 - 9. Supply Chain Attacks and Third-Party Risks/01 - The threat of supply chain attacks and third-party risks.mp4
16.2 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/05 - 4. Botnets and DDoS attacks/02 - Protect against botnets and DDoS threats.mp4
15.8 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/08 - 7. Unmanaged IoT Devices/01 - Explore the threat of unmanaged IoT devices.mp4
14.4 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/09 - 8. Shadow IT/01 - Explore the threat of shadow IT.mp4
14.2 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/08 - 7. Unmanaged IoT Devices/02 - Protect against unmanaged IoT devices.mp4
12.4 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/09 - 8. Shadow IT/02 - Protect against shadow IT.mp4
12.4 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/06 - 5. Deepfakes/02 - Protect against deepfakes.mp4
12.1 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/03 - 2. Phishing and Smishing/02 - Protect against phishing and smishing.mp4
12.0 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/11 - Conclusion/01 - Stay up to date on
cybersecurity
.mp4
11.8 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/02 - 1. Malware and Ransomware/02 - Protect against malware and ransomware.mp4
11.7 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/02 - 1. Malware and Ransomware/01 - Explore the threat of malware and ransomware.mp4
11.6 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/03 - 2. Phishing and Smishing/01 - Explore the threat of phishing and smishing.mp4
11.3 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/05 - 4. Botnets and DDoS attacks/01 - Explore the threat of botnets and DDoS attacks.mp4
11.1 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/07 - 6. Insider Threats/01 - Explore the risk of insider threats.mp4
10.9 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/10 - 9. Supply Chain Attacks and Third-Party Risks/02 - Protect against supply chain attacks and third-party risks.mp4
10.5 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/04 - 3. Business Email Compromise/01 - Explore the threat of business email compromise.mp4
9.4 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/01 - Introduction/01 - Examine the
cybersecurity
threat landscape.mp4
9.4 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/04 - 3. Business Email Compromise/02 - Protect against business email compromise.mp4
9.2 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/06 - 5. Deepfakes/01 - Explore the threat of deepfakes.mp4
9.0 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/07 - 6. Insider Threats/02 - Protect against insider threats.mp4
7.0 MB
[磁力链接]
添加时间:
2023-12-17
大小:
235.6 MB
最近下载:
2024-12-09
热度:
814
[ CoursePig.com ] Linkedin - The Cybersecurity Threat Landscape (2022)
~Get Your Files Here !/10 - 9. Supply Chain Attacks and Third-Party Risks/01 - The threat of supply chain attacks and third-party risks.mp4
16.2 MB
~Get Your Files Here !/05 - 4. Botnets and DDoS attacks/02 - Protect against botnets and DDoS threats.mp4
15.8 MB
~Get Your Files Here !/08 - 7. Unmanaged IoT Devices/01 - Explore the threat of unmanaged IoT devices.mp4
14.4 MB
~Get Your Files Here !/09 - 8. Shadow IT/01 - Explore the threat of shadow IT.mp4
14.2 MB
~Get Your Files Here !/08 - 7. Unmanaged IoT Devices/02 - Protect against unmanaged IoT devices.mp4
12.4 MB
~Get Your Files Here !/09 - 8. Shadow IT/02 - Protect against shadow IT.mp4
12.4 MB
~Get Your Files Here !/06 - 5. Deepfakes/02 - Protect against deepfakes.mp4
12.1 MB
~Get Your Files Here !/03 - 2. Phishing and Smishing/02 - Protect against phishing and smishing.mp4
12.0 MB
~Get Your Files Here !/11 - Conclusion/01 - Stay up to date on
cybersecurity
.mp4
11.8 MB
~Get Your Files Here !/02 - 1. Malware and Ransomware/02 - Protect against malware and ransomware.mp4
11.7 MB
~Get Your Files Here !/02 - 1. Malware and Ransomware/01 - Explore the threat of malware and ransomware.mp4
11.6 MB
~Get Your Files Here !/03 - 2. Phishing and Smishing/01 - Explore the threat of phishing and smishing.mp4
11.3 MB
~Get Your Files Here !/05 - 4. Botnets and DDoS attacks/01 - Explore the threat of botnets and DDoS attacks.mp4
11.1 MB
~Get Your Files Here !/07 - 6. Insider Threats/01 - Explore the risk of insider threats.mp4
10.9 MB
~Get Your Files Here !/10 - 9. Supply Chain Attacks and Third-Party Risks/02 - Protect against supply chain attacks and third-party risks.mp4
10.5 MB
~Get Your Files Here !/04 - 3. Business Email Compromise/01 - Explore the threat of business email compromise.mp4
9.4 MB
~Get Your Files Here !/01 - Introduction/01 - Examine the
cybersecurity
threat landscape.mp4
9.4 MB
~Get Your Files Here !/04 - 3. Business Email Compromise/02 - Protect against business email compromise.mp4
9.2 MB
~Get Your Files Here !/06 - 5. Deepfakes/01 - Explore the threat of deepfakes.mp4
9.0 MB
~Get Your Files Here !/07 - 6. Insider Threats/02 - Protect against insider threats.mp4
7.0 MB
[磁力链接]
添加时间:
2024-05-29
大小:
232.7 MB
最近下载:
2024-12-06
热度:
116
Lynda.com.Practical.Cybersecurity-ELOHiM
e-lprecybs.r00
15.0 MB
e-lprecybs.r01
15.0 MB
e-lprecybs.r02
15.0 MB
e-lprecybs.r03
15.0 MB
e-lprecybs.r04
15.0 MB
e-lprecybs.r05
15.0 MB
e-lprecybs.r06
15.0 MB
e-lprecybs.r07
15.0 MB
e-lprecybs.r08
15.0 MB
e-lprecybs.r09
15.0 MB
e-lprecybs.r10
15.0 MB
e-lprecybs.r11
15.0 MB
e-lprecybs.r12
15.0 MB
e-lprecybs.r13
15.0 MB
e-lprecybs.r14
7.2 MB
e-lprecybs.rar
15.0 MB
e-lprecybs.sfv
400 Bytes
elohim.nfo
2.6 kB
[磁力链接]
添加时间:
2017-05-15
大小:
232.2 MB
最近下载:
2018-12-01
热度:
142
Cybersecurity {AM}
0 Introduction/369625_00_03_XR15_Reference.mp4
10.2 MB
3 Architecting Security/369625_03_05_XR15_Cloud_Attribute_Taxonomy.mp4
10.1 MB
3 Architecting Security/369625_03_01_XR15_Introduction_to_SABSA.mp4
9.9 MB
2 Cloud Security Guidance/369625_02_16_SO30_XR30_Solution.mp4
9.9 MB
2 Cloud Security Guidance/369625_02_03_XR15_Information_Management.mp4
9.8 MB
1 Cloud Fundamentals/369625_01_01_XR15_Essential_Characteristics.mp4
9.6 MB
1 Cloud Fundamentals/369625_01_06_XR15_Cloud_Incidents.mp4
9.4 MB
2 Cloud Security Guidance/369625_02_02_XR15_Legal_Compliance_and_Audit.mp4
8.9 MB
1 Cloud Fundamentals/369625_01_09_XR15_Cloud_Trust.mp4
8.8 MB
2 Cloud Security Guidance/369625_02_07_XR15_Incident_Response.mp4
8.8 MB
2 Cloud Security Guidance/369625_02_11_XR15_Identity_in_the_Cloud.mp4
8.4 MB
2 Cloud Security Guidance/369625_02_08_XR15_Application_Security.mp4
8.3 MB
2 Cloud Security Guidance/369625_02_13_XR15_Virtualisation.mp4
8.2 MB
2 Cloud Security Guidance/369625_02_05_XR15_Traditional_Security_BCP_and_DR.mp4
8.2 MB
2 Cloud Security Guidance/369625_02_12_XR15_Cloud_Access_Control.mp4
7.9 MB
1 Cloud Fundamentals/369625_01_02_XR15_Infrastructure_as_a_Service.mp4
7.6 MB
3 Architecting Security/369625_03_02_XR15_Fast_Tracker.mp4
7.4 MB
1 Cloud Fundamentals/369625_01_05_XR151_Deployment_Models.mp4
6.7 MB
2 Cloud Security Guidance/369625_02_10_XR15_Encryption_and_Key_Management.mp4
6.6 MB
3 Architecting Security/369625_03_03_XR15_SABSA_Attributes.mp4
6.3 MB
[磁力链接]
添加时间:
2017-02-11
大小:
230.5 MB
最近下载:
2024-12-11
热度:
1480
Cybersecurity
Cybersecurity The Hacker Proof Guide to Cybersecurity.m4b
217.4 MB
Cybersecurity The Hacker Proof Guide to Cybersecurity.jpg
52.2 kB
Cybersecurity The Hacker Proof Guide to Cybersecurity.cue
1.7 kB
Cybersecurity The Hacker Proof Guide to Cybersecurity.nfo
1.3 kB
Trust Genics - Cybersecurity The Hacker Proof Guide to Cybersecurity.txt
0 Bytes
[磁力链接]
添加时间:
2021-03-08
大小:
217.5 MB
最近下载:
2024-12-10
热度:
194
Developing a Cybersecurity Immune System for Industry 4.0 by Sergei Petrenko PDF
Developing a Cybersecurity Immune System for Industry 4.0 by Sergei Petrenko.pdf
207.7 MB
more books, audiobooks, magazines etc..txt
932 Bytes
[磁力链接]
添加时间:
2022-01-30
大小:
207.7 MB
最近下载:
2024-12-09
热度:
1090
[ CourseWikia.com ] Cybersecurity at Work (2023)
~Get Your Files Here !/06 - 5. Hybrid Work Security/05 - Scenario Stolen laptop.mp4
18.0 MB
~Get Your Files Here !/05 - 4. Software and Internet Security/05 - The anatomy of a cyber attack.mp4
11.6 MB
~Get Your Files Here !/04 - 3. Account Security/01 - Password security.mp4
11.5 MB
~Get Your Files Here !/06 - 5. Hybrid Work Security/01 - Physical office security.mp4
10.9 MB
~Get Your Files Here !/02 - 1. Social Engineering Scams and Attacks/05 - Scenario Voice phishing.mp4
10.1 MB
~Get Your Files Here !/02 - 1. Social Engineering Scams and Attacks/04 - Counterfeit apps.mp4
10.0 MB
~Get Your Files Here !/06 - 5. Hybrid Work Security/04 - Smartphone and mobile device attacks.mp4
9.4 MB
~Get Your Files Here !/04 - 3. Account Security/02 - Data breaches and compromised passwords.mp4
9.0 MB
~Get Your Files Here !/03 - 2. Wireless Security/01 - Public Wi-Fi.mp4
9.0 MB
~Get Your Files Here !/05 - 4. Software and Internet Security/04 - Malware Ransomware.mp4
9.0 MB
~Get Your Files Here !/06 - 5. Hybrid Work Security/03 - Laptop and desktop security.mp4
8.2 MB
~Get Your Files Here !/05 - 4. Software and Internet Security/01 - Updating software.mp4
8.1 MB
~Get Your Files Here !/02 - 1. Social Engineering Scams and Attacks/03 - Social media information (over)sharing.mp4
7.9 MB
~Get Your Files Here !/08 - Conclusion/01 - You are part of the security team.mp4
7.2 MB
~Get Your Files Here !/06 - 5. Hybrid Work Security/02 - Physical office security best practices.mp4
7.1 MB
~Get Your Files Here !/03 - 2. Wireless Security/02 - Home Wi-Fi.mp4
6.9 MB
~Get Your Files Here !/02 - 1. Social Engineering Scams and Attacks/02 - Email phishing.mp4
6.5 MB
~Get Your Files Here !/02 - 1. Social Engineering Scams and Attacks/01 - Social engineering overview.mp4
6.4 MB
~Get Your Files Here !/07 - 6. Data Security/01 - Intellectual property.mp4
5.6 MB
~Get Your Files Here !/04 - 3. Account Security/03 - Multifactor authentication.mp4
5.1 MB
[磁力链接]
添加时间:
2024-03-22
大小:
199.8 MB
最近下载:
2024-12-10
热度:
333
[ FreeCourseWeb.com ] Cybersecurity Careers - Build Your Brand in Cybersecurity
~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/04 - Optimizing your LinkedIn profile.mp4
18.6 MB
~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/05 - Five tips for using LinkedIn effectively.mp4
17.3 MB
~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/02 - Speaking at events and conferences.mp4
16.1 MB
~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/01 - Creating and sharing content.mp4
16.0 MB
~Get Your Files Here !/02 - 1. Personal Branding in Cybersecurity/03 - Benefits of building your personal brand in
cybersecurity
.mp4
13.9 MB
~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/03 - Building an online presence.mp4
13.6 MB
~Get Your Files Here !/02 - 1. Personal Branding in Cybersecurity/02 - Elements of a strong personal brand.mp4
13.1 MB
~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/02 - Developing a personal brand statement.mp4
11.7 MB
~Get Your Files Here !/05 - 4. Networking for Cybersecurity Professionals/03 - Staying up-to-date with industry trends.mp4
11.6 MB
~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/03 - Contributing to open-source projects.mp4
11.0 MB
~Get Your Files Here !/05 - 4. Networking for Cybersecurity Professionals/01 - Networking and nurturing professional relationships.mp4
10.4 MB
~Get Your Files Here !/02 - 1. Personal Branding in Cybersecurity/01 - What is personal branding.mp4
10.1 MB
~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/01 - Identifying your unique value proposition.mp4
10.0 MB
~Get Your Files Here !/05 - 4. Networking for Cybersecurity Professionals/02 - Effective networking strategies.mp4
8.0 MB
~Get Your Files Here !/01 - Introduction/01 - Grow your
cybersecurity
career with personal branding.mp4
3.9 MB
~Get Your Files Here !/06 - Conclusion/01 - Next steps.mp4
3.9 MB
~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/02 - Speaking at events and conferences.srt
8.6 kB
~Get Your Files Here !/04 - 3. Showcasing Your Expertise in Cybersecurity/01 - Creating and sharing content.srt
7.9 kB
~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/04 - Optimizing your LinkedIn profile.srt
7.5 kB
~Get Your Files Here !/03 - 2. Crafting Your Cybersecurity Brand/03 - Building an online presence.srt
7.5 kB
[磁力链接]
添加时间:
2024-03-28
大小:
189.3 MB
最近下载:
2024-12-05
热度:
559
Cybersecurity Essentials
Cybersecurity Essentials.rar
182.5 MB
[磁力链接]
添加时间:
2018-11-26
大小:
182.5 MB
最近下载:
2024-12-06
热度:
25
[ FreeCourseWeb.com ] Designing a Machine Learning Intrusion Detection System - Defend Your Network from Cybersecurity Threats.zip
[ FreeCourseWeb.com ] Designing a Machine Learning Intrusion Detection System - Defend Your Network from Cybersecurity Threats.zip
182.3 MB
[磁力链接]
添加时间:
2021-05-05
大小:
182.3 MB
最近下载:
2024-12-08
热度:
882
Cybersecurity Essentials
Cybersecurity.rar
182.1 MB
[磁力链接]
添加时间:
2021-06-07
大小:
182.1 MB
最近下载:
2024-12-05
热度:
370
[ FreeCourseWeb.com ] Cybersecurity Attacks - Red Team Strategies- A guide to building a pentest program and elevating your red teaming skills.zip
[ FreeCourseWeb.com ] Cybersecurity Attacks - Red Team Strategies- A guide to building a pentest program and elevating your red teaming skills.zip
171.8 MB
[磁力链接]
添加时间:
2021-03-14
大小:
171.8 MB
最近下载:
2024-12-10
热度:
1237
[ CoursePig.com ] Linkedin - Microsoft Cybersecurity Architect Expert (SC-100) Cert Prep - 4 Design Strategy for Data and Applications
~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/02 - Design a strategy to identify and protect sensitive data.mp4
27.6 MB
~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/03 - Specify a security strategy for applications and APIs.mp4
24.9 MB
~Get Your Files Here !/01 - Introduction/01 - Prepping for the SC-100 exam.mp4
22.5 MB
~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/02 - Specify a security standard for onboarding a new application.mp4
18.4 MB
~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/03 - Specify an encryption standard for data at rest and in motion.mp4
16.3 MB
~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/01 - Specify priorities for mitigating threats to applications.mp4
14.2 MB
~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/01 - Specify priorities for mitigating threats to data.mp4
13.9 MB
~Get Your Files Here !/01 - Introduction/02 - What you should know.mp4
6.8 MB
~Get Your Files Here !/04 - Conclusion/01 - Next steps.mp4
5.0 MB
~Get Your Files Here !/01 - Introduction/03 - Lab setup.mp4
3.4 MB
~Get Your Files Here !/Ex_Files_MSFT_Cybersecurity_Arch_Expert_SC_100_Cert_Prep_4/Exercise Files/Sign up for a free trial.pdf
338.4 kB
~Get Your Files Here !/Ex_Files_MSFT_Cybersecurity_Arch_Expert_SC_100_Cert_Prep_4/Exercise Files/SC-100 Exam Study Guide Course 4.pdf
47.8 kB
~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/02 - Design a strategy to identify and protect sensitive data.srt
18.1 kB
~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/03 - Specify a security strategy for applications and APIs.srt
15.6 kB
~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/02 - Specify a security standard for onboarding a new application.srt
9.7 kB
~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/03 - Specify an encryption standard for data at rest and in motion.srt
9.2 kB
~Get Your Files Here !/03 - 2. Design a Strategy for Securing Data/01 - Specify priorities for mitigating threats to data.srt
9.0 kB
~Get Your Files Here !/02 - 1. Specify Security Requirements for Applications/01 - Specify priorities for mitigating threats to applications.srt
7.7 kB
~Get Your Files Here !/01 - Introduction/02 - What you should know.srt
3.4 kB
~Get Your Files Here !/04 - Conclusion/01 - Next steps.srt
2.6 kB
[磁力链接]
添加时间:
2024-02-06
大小:
153.6 MB
最近下载:
2024-12-09
热度:
1024
Mastering Cybersecurity
B0CZLYGXLN.pdf
153.1 MB
[磁力链接]
添加时间:
2024-04-03
大小:
153.1 MB
最近下载:
2024-12-10
热度:
4423
[ CoursePig.com ] Certificate in Cybersecurity Analysis (IIBA-CCA) - Getting Started
~Get Your Files Here !/Exercise Files/02/defining-
cybersecurity
-for-business-professionals-slides.pdf
42.5 MB
~Get Your Files Here !/03. Defining Cybersecurity in an Organization/04. Introduction to Cybersecurity Frameworks.mp4
20.2 MB
~Get Your Files Here !/Exercise Files/03/defining-
cybersecurity
-in-an-organization-slides.pdf
18.1 MB
~Get Your Files Here !/02. Defining Cybersecurity for Business Professionals/03. Cybersecurity Business Analysis and Building in Security.mp4
14.7 MB
~Get Your Files Here !/04. Describing Key Enterprise Risk Concepts/08. How to Build Disaster Recovery and Business Continuity Plans.mp4
13.7 MB
~Get Your Files Here !/02. Defining Cybersecurity for Business Professionals/02. Understanding the Business Value of Cybersecurity Today.mp4
10.5 MB
~Get Your Files Here !/03. Defining Cybersecurity in an Organization/05. Identifying What an ISMS Is and the Critical Focus on Data Privacy.mp4
9.4 MB
~Get Your Files Here !/04. Describing Key Enterprise Risk Concepts/07. Introduction to Cyber Risk Assessments.mp4
9.4 MB
~Get Your Files Here !/Exercise Files/04/describing-key-enterprise-risk-concepts-slides.pdf
6.3 MB
~Get Your Files Here !/01. Course Overview/01. Course Overview.mp4
4.0 MB
~Get Your Files Here !/03. Defining Cybersecurity in an Organization/06. Defining Data Minimization Activities and Using Security Frameworks.mp4
3.9 MB
~Get Your Files Here !/Bonus Resources.txt
386 Bytes
Get Bonus Downloads Here.url
179 Bytes
[磁力链接]
添加时间:
2024-03-27
大小:
152.9 MB
最近下载:
2024-12-04
热度:
162
Cybersecurity-The Real Agenda.wmv
Cybersecurity-The Real Agenda.wmv
148.0 MB
[磁力链接]
添加时间:
2017-02-21
大小:
148.0 MB
最近下载:
2024-11-02
热度:
1547
TTC - Thinking about Cybersecurity audio book - sup3r edition
Lect.10 International Governance and the Internet.m4a
8.3 MB
Lect.01 Stuxnet—The First Cyber Guided Missile.m4a
7.8 MB
Lect.02 The Incredible Scope of Cyberspace.m4a
7.3 MB
Lect.03 The Five Gateways of Internet Vulnerability.m4a
7.2 MB
Lect.04 Of Viruses, Botnets, and Logic Bombs .m4a
7.7 MB
Lect.05 The Problem of Identity on the Network.m4a
7.9 MB
Lect.06 Cyber Fraud, Theft, and Organized Crime.m4a
7.5 MB
Lect.07 Hacktivists and Insurgency.m4a
7.5 MB
Lect.08 Nations at Cyber War.m4a
7.9 MB
Lect.09 Government Regulation of Cyberspace.m4a
7.6 MB
Course Guidebook.pdf
4.7 MB
Lect.11 The Constitution and Cyberspace.m4a
7.8 MB
Lect.12 Big Data—''They'' Know Everything about You.m4a
7.6 MB
Lect.13 Privacy for the Cyber Age.m4a
7.9 MB
Lect.14 Listening In and Going Dark.m4a
8.2 MB
Lect.15 The Devil in the Chips-Hardware Failures.m4a
7.6 MB
Lect.16 Protecting Yourself in Cyberspace.m4a
7.5 MB
Lect.17 Critical Infrastructure and Resiliency.m4a
7.8 MB
Lect.18 Looking Forward-What Does the Future Hold.m4a
8.2 MB
[磁力链接]
添加时间:
2017-03-17
大小:
143.9 MB
最近下载:
2024-12-10
热度:
565
Cybersecurity - Attack and Defense Strategies - Second Edition
Cybersecurity - Attack and Defense Strategies - Second Edition.mobi
141.0 MB
Visit us on volno.org.url
108 Bytes
[磁力链接]
添加时间:
2021-04-20
大小:
141.0 MB
最近下载:
2024-12-07
热度:
543
Cybersecurity - Attack and Defense Strategies - Second Edition.mobi
Cybersecurity - Attack and Defense Strategies - Second Edition.mobi
141.0 MB
[磁力链接]
添加时间:
2024-06-05
大小:
141.0 MB
最近下载:
2024-12-03
热度:
142
共15页
上一页
7
8
9
10
11
12
13
14
15
下一页