搜索
为您找到约
277
个磁力链接/BT种子,耗时 0 毫秒。
排序:
相关程度
热度
文件大小
添加时间
最近访问
[FreeCoursesOnline.Me] O`REILLY - The Complete Cybersecurity Bootcamp, 2nd Edition
Lesson 29 Hacking Mobile Platforms/003. 29.2 Hacking iOS.mp4
86.6 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/014. 17.13 Performing SMTP and DNS Enumeration.mp4
80.0 MB
Lesson 21 Fundamentals of Wireless Hacking/004. 21.3 Exploring Wireless Threats.mp4
79.0 MB
Lesson 33 Fundamentals of IoT Security/003. 33.2 Understanding IoT Attacks.mp4
76.8 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/015. 17.14 Conducting Additional Enumeration Techniques.mp4
75.8 MB
Lesson 33 Fundamentals of IoT Security/002. 33.1 Introducing IoT Concepts.mp4
74.4 MB
Lesson 29 Hacking Mobile Platforms/002. 29.1 Understanding Mobile Platform Attack Vectors.mp4
73.4 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/011. 17.1 Performing SNMP Enumeration.mp4
71.8 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/004. 17.3 Understanding Host Discovery.mp4
69.7 MB
Lesson 5 Fundamentals of Incident Response/007. 5.6 Analyzing Computer Incident Response Teams (CSIRTs).mp4
68.5 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/007. 17.6 Scanning Beyond IDS and Firewall.mp4
68.2 MB
Lesson 27 Hacking User Credentials/006. 27.5 Cracking Passwords with John the Ripper.mp4
66.1 MB
Lesson 7 Intrusion Event Categories/009. 7.8 Understanding the MITRE ATT&CK Framework.mp4
65.8 MB
Lesson 29 Hacking Mobile Platforms/004. 29.3 Hacking Android OS.mp4
63.8 MB
Lesson 20 SQL Injection/005. 20.4 Exploring SQL Injection Tools.mp4
63.3 MB
Lesson 21 Fundamentals of Wireless Hacking/003. 21.2 Understanding Wireless Encryption.mp4
62.7 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/013. 17.12 Performing NTP and NFS Enumeration.mp4
61.8 MB
Lesson 16 Information Gathering and Passive Reconnaissance/011. 16.10 Performing Footprinting through Social Engineering.mp4
59.1 MB
Lesson 8 Digital Forensics Fundamentals/004. 8.3 Understanding Evidence Collection.mp4
57.2 MB
Lesson 21 Fundamentals of Wireless Hacking/007. 21.6 Hacking Bluetooth.mp4
52.3 MB
[磁力链接]
添加时间:
2023-12-27
大小:
6.7 GB
最近下载:
2025-03-12
热度:
9192
O`REILLY - The Complete Cybersecurity Bootcamp, 2nd Edition
Lesson 29 Hacking Mobile Platforms/003. 29.2 Hacking iOS.mp4
86.6 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/014. 17.13 Performing SMTP and DNS Enumeration.mp4
80.0 MB
Lesson 21 Fundamentals of Wireless Hacking/004. 21.3 Exploring Wireless Threats.mp4
79.0 MB
Lesson 33 Fundamentals of IoT Security/003. 33.2 Understanding IoT Attacks.mp4
76.8 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/015. 17.14 Conducting Additional Enumeration Techniques.mp4
75.8 MB
Lesson 33 Fundamentals of IoT Security/002. 33.1 Introducing IoT Concepts.mp4
74.4 MB
Lesson 29 Hacking Mobile Platforms/002. 29.1 Understanding Mobile Platform Attack Vectors.mp4
73.4 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/011. 17.1 Performing SNMP Enumeration.mp4
71.8 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/004. 17.3 Understanding Host Discovery.mp4
69.7 MB
Lesson 5 Fundamentals of Incident Response/007. 5.6 Analyzing Computer Incident Response Teams (CSIRTs).mp4
68.5 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/007. 17.6 Scanning Beyond IDS and Firewall.mp4
68.2 MB
Lesson 27 Hacking User Credentials/006. 27.5 Cracking Passwords with John the Ripper.mp4
66.1 MB
Lesson 7 Intrusion Event Categories/009. 7.8 Understanding the MITRE ATT&CK Framework.mp4
65.8 MB
Lesson 29 Hacking Mobile Platforms/004. 29.3 Hacking Android OS.mp4
63.8 MB
Lesson 20 SQL Injection/005. 20.4 Exploring SQL Injection Tools.mp4
63.3 MB
Lesson 21 Fundamentals of Wireless Hacking/003. 21.2 Understanding Wireless Encryption.mp4
62.7 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/013. 17.12 Performing NTP and NFS Enumeration.mp4
61.8 MB
Lesson 16 Information Gathering and Passive Reconnaissance/011. 16.10 Performing Footprinting through Social Engineering.mp4
59.1 MB
Lesson 8 Digital Forensics Fundamentals/004. 8.3 Understanding Evidence Collection.mp4
57.2 MB
Lesson 21 Fundamentals of Wireless Hacking/007. 21.6 Hacking Bluetooth.mp4
52.3 MB
[磁力链接]
添加时间:
2024-12-25
大小:
6.7 GB
最近下载:
2025-03-07
热度:
114
[CourseClub.Me] O`REILLY - The Complete Cybersecurity Bootcamp, 2nd Edition
Lesson 29 Hacking Mobile Platforms/003. 29.2 Hacking iOS.mp4
86.6 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/014. 17.13 Performing SMTP and DNS Enumeration.mp4
80.0 MB
Lesson 21 Fundamentals of Wireless Hacking/004. 21.3 Exploring Wireless Threats.mp4
79.0 MB
Lesson 33 Fundamentals of IoT Security/003. 33.2 Understanding IoT Attacks.mp4
76.8 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/015. 17.14 Conducting Additional Enumeration Techniques.mp4
75.8 MB
Lesson 33 Fundamentals of IoT Security/002. 33.1 Introducing IoT Concepts.mp4
74.4 MB
Lesson 29 Hacking Mobile Platforms/002. 29.1 Understanding Mobile Platform Attack Vectors.mp4
73.4 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/011. 17.1 Performing SNMP Enumeration.mp4
71.8 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/004. 17.3 Understanding Host Discovery.mp4
69.7 MB
Lesson 5 Fundamentals of Incident Response/007. 5.6 Analyzing Computer Incident Response Teams (CSIRTs).mp4
68.5 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/007. 17.6 Scanning Beyond IDS and Firewall.mp4
68.2 MB
Lesson 27 Hacking User Credentials/006. 27.5 Cracking Passwords with John the Ripper.mp4
66.1 MB
Lesson 7 Intrusion Event Categories/009. 7.8 Understanding the MITRE ATT&CK Framework.mp4
65.8 MB
Lesson 29 Hacking Mobile Platforms/004. 29.3 Hacking Android OS.mp4
63.8 MB
Lesson 20 SQL Injection/005. 20.4 Exploring SQL Injection Tools.mp4
63.3 MB
Lesson 21 Fundamentals of Wireless Hacking/003. 21.2 Understanding Wireless Encryption.mp4
62.7 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/013. 17.12 Performing NTP and NFS Enumeration.mp4
61.8 MB
Lesson 16 Information Gathering and Passive Reconnaissance/011. 16.10 Performing Footprinting through Social Engineering.mp4
59.1 MB
Lesson 8 Digital Forensics Fundamentals/004. 8.3 Understanding Evidence Collection.mp4
57.2 MB
Lesson 21 Fundamentals of Wireless Hacking/007. 21.6 Hacking Bluetooth.mp4
52.3 MB
[磁力链接]
添加时间:
2023-12-23
大小:
6.7 GB
最近下载:
2025-03-12
热度:
2054
Cybersecurity Fundamentals - Become a Security Expert
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/3. Passwords, MFA and Good Practices/2. Password Security.mp4
337.8 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/11. Test Your Environment/2. Penetration Testing Fundamentals.mp4
297.2 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/5. Protecting Servers, Computers + Smart Devices/1. Protect Your Device - Server Security.mp4
264.2 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/9. Get Compliant/1. Cybersecurity Regulations and Standards.mp4
252.5 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/6. Security When Online/3. Cloud Security.mp4
245.8 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/5. Protecting Servers, Computers + Smart Devices/4. Protect Your Device - iPhone Security.mp4
245.2 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/4. Using Firewalls, VPN, IDS/1. Network Security Top Tips.mp4
243.1 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/3. Passwords, MFA and Good Practices/1. Software Updates.mp4
234.8 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/5. Protecting Servers, Computers + Smart Devices/2. Protect Your Device - Desktop + Laptop Security.mp4
230.4 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/5. Protecting Servers, Computers + Smart Devices/5. 03 Protect Your Device - iPad Security.mp4
228.5 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/10. Training and Certifications/2. Cybersecurity Awareness and Training.mp4
227.9 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/10. Training and Certifications/1. Cybersecurity Certifications.mp4
214.9 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/2. Cybersecurity Threats and Attacks/4. Social Engineering.mp4
207.5 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/2. Cybersecurity Threats and Attacks/1. Threat and Attack Types.mp4
204.6 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/9. Get Compliant/2. Disaster Recovery and Business Continuity Planning.mp4
178.0 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/5. Protecting Servers, Computers + Smart Devices/3. Protect Your Device - macOS Security.mp4
169.2 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/6. Security When Online/1. Best Ways to Stay Safe Online.mp4
165.0 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/2. Cybersecurity Threats and Attacks/2. Malware.mp4
149.8 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/3. Passwords, MFA and Good Practices/4. Multi-Factor Authentication.mp4
145.9 MB
[TutsNode.net] - Cybersecurity Fundamentals - Become a Security Expert/3. Passwords, MFA and Good Practices/6. Setting up Data Encryption on Windows and Mac.mp4
143.8 MB
[磁力链接]
添加时间:
2023-12-18
大小:
6.5 GB
最近下载:
2025-03-14
热度:
7440
[LiveLessons] The Complete Cybersecurity Bootcamp, 2nd Edition [En]
29.2 Hacking iOS.mp4
86.6 MB
17.13 Performing SMTP and DNS Enumeration.mp4
80.0 MB
21.3 Exploring Wireless Threats.mp4
79.0 MB
33.2 Understanding IoT Attacks.mp4
76.8 MB
17.14 Conducting Additional Enumeration Techniques.mp4
75.8 MB
33.1 Introducing IoT Concepts.mp4
74.4 MB
29.1 Understanding Mobile Platform Attack Vectors.mp4
73.4 MB
17.10 Performing SNMP Enumeration.mp4
71.8 MB
17.3 Understanding Host Discovery.mp4
69.7 MB
5.6 Analyzing Computer Incident Response Teams (CSIRTs).mp4
68.5 MB
17.6 Scanning Beyond IDS and Firewall.mp4
68.2 MB
27.5 Cracking Passwords with John the Ripper.mp4
66.1 MB
7.8 Understanding the MITRE ATT&CK Framework.mp4
65.8 MB
29.3 Hacking Android OS.mp4
63.8 MB
20.4 Exploring SQL Injection Tools.mp4
63.3 MB
21.2 Understanding Wireless Encryption.mp4
62.7 MB
17.12 Performing NTP and NFS Enumeration.mp4
61.8 MB
16.10 Performing Footprinting through Social Engineering.mp4
59.1 MB
8.3 Understanding Evidence Collection.mp4
57.2 MB
21.6 Hacking Bluetooth.mp4
52.3 MB
[磁力链接]
添加时间:
2024-03-28
大小:
6.5 GB
最近下载:
2025-03-14
热度:
643
Coursera - Microsoft Cybersecurity Analyst Professional Certificate 2024
Coursera - Advanced Cybersecurity Concepts and Capstone Project 2024-1/03_security-conscious-modeling/03_mitigation-strategies/06_network-security.mp4
78.1 MB
Coursera - Cybersecurity Solutions and Microsoft Defender 2024-1/01_azure-basic-security-capabilities/03_azure-firewall-protection/11_hackers-and-firewalls.mp4
49.8 MB
Coursera - Cybersecurity Tools and Technologies 2024-1/03_azure-penetration-testing/03_running-the-test/06_cold-wars-at-sams-scoops.mp4
38.4 MB
Coursera - Cybersecurity Identity and Access Solutions using Azure AD 2024-1/03_active-directory-access-protection-and-governance-management/02_roles-and-role-based-access/04_roles-in-action.mp4
38.0 MB
Coursera - Cybersecurity Solutions and Microsoft Defender 2024-1/03_microsoft-365-defender-threat-protection/03_identity-defense/07_identity-theft.mp4
33.2 MB
Coursera - Introduction to Computers and Operating Systems and Security 2024-1/01_introduction-to-computers-and-operating-systems/01_course-introduction/01_introduction-to-the-program-microsoft-
cybersecurity
-analyst.mp4
33.1 MB
Coursera - Cybersecurity Management and Compliance 2024-1/02_compliance-solutions/03_information-protection-and-data-lifecycle/03_data-concerns.mp4
30.3 MB
Coursera - Advanced Cybersecurity Concepts and Capstone Project 2024-1/02_advanced-threats-and-mitigation/01_susceptible-infrastructure-and-types-of-attack/06_attack-techniques.mp4
30.0 MB
Coursera - Advanced Cybersecurity Concepts and Capstone Project 2024-1/01_threat-modeling/03_threat-modeling-strategies/08_visual-agile-and-simple-threat-vast.mp4
26.3 MB
Coursera - Introduction to Networking and Cloud Computing 2024-1/04_cloud-computing-and-networking/02_virtual-environments/03_virtual-world.mp4
26.1 MB
Coursera - Introduction to Computers and Operating Systems and Security 2024-1/03_business-systems-applications/03_storage-solutions/06_artificial-intelligence-and-machine-learning.mp4
25.9 MB
Coursera - Microsoft SC-900 Exam Preparation and Practice 2024-1/01_concepts-of-security-compliance-and-identity/04_identity-concepts/06_id-and-active-directory.mp4
24.6 MB
Coursera - Cybersecurity Solutions and Microsoft Defender 2024-1/03_microsoft-365-defender-threat-protection/01_defender-services/01_introduction-to-microsoft-365-defender.mp4
23.4 MB
Coursera - Cybersecurity Tools and Technologies 2024-1/03_azure-penetration-testing/01_the-command-line-and-windows-powershell/01_introduction-to-command-line.mp4
23.3 MB
Coursera - Microsoft SC-900 Exam Preparation and Practice 2024-1/04_the-capabilities-of-microsoft-compliance-solutions/03_information-protection-and-data-lifecycle-management-capabilities-of-microsoft/09_module-summary-capabilities-of-microsoft-compliance-solutions.mp4
23.3 MB
Coursera - Advanced Cybersecurity Concepts and Capstone Project 2024-1/01_threat-modeling/03_threat-modeling-strategies/04_process-for-attack-simulation-and-threat-analysis-pasta.mp4
23.2 MB
Coursera - Advanced Cybersecurity Concepts and Capstone Project 2024-1/04_capstone-project/01_capstone-project/01_course-recap-advanced-
cybersecurity
-concepts.mp4
23.0 MB
Coursera - Microsoft SC-900 Exam Preparation and Practice 2024-1/02_the-capabilities-of-microsoft-azure-active-directory/03_identity-protection-and-governance-capabilities-of-azure-ad/01_identity-governance-in-azure-ad.mp4
22.4 MB
Coursera - Advanced Cybersecurity Concepts and Capstone Project 2024-1/01_threat-modeling/04_azure-and-threat-modeling/02_threat-modeling-for-azure-virtual-networks.mp4
22.3 MB
Coursera - Cybersecurity Solutions and Microsoft Defender 2024-1/01_azure-basic-security-capabilities/02_distributed-denial-of-service-ddos-protection/01_azure-ddos-protection-overview.mp4
22.3 MB
[磁力链接]
添加时间:
2025-01-02
大小:
6.5 GB
最近下载:
2025-03-13
热度:
439
Cybersecurity Lab Environment in EVE NG
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/5. Cyberattacks Lab Setup/1. Cyberattacks Lab in EVE NG.mp4
431.1 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/1. Reconnaissance Attack.mp4
351.9 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/4. Attacker OS Setup/1. Kali Linux Setup.mp4
263.4 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/12. Password Attack.mp4
261.2 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/5. Cyberattacks Lab Setup/3. Vulnerable Servers -Configuration.mp4
259.5 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/9. ARP Spoofing Attack.mp4
240.8 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/2. EVE NG Setup/5. EVE NG Qemu Image Naming.mp4
223.9 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/10. DHCP Starvation Attack.mp4
195.3 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/1. Introduction to Cybersecurity/9. Layers of the Web Terms.mp4
192.1 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/4. Attacker OS Setup/3. Parrot OS Setup.mp4
184.7 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/1. Introduction to Cybersecurity/8. Layers of the Web.mp4
170.7 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/3. Vulnerable Web Setup/2. Metasploitable Setup.mp4
164.7 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/6. Smurf Attack.mp4
162.1 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/14. SQL Injection Attack.mp4
162.0 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/1. Introduction to Cybersecurity/12. OWASP Top Ten 10.mp4
160.9 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/2. EVE NG Setup/8. EVE-NG Networks Clouds.mp4
155.5 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/5. SYN Flooding Attack.mp4
150.9 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/1. Introduction to Cybersecurity/2. Introduction to Cybersecurity.mp4
146.1 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/6. Cyber Attackes/4. ICMP Flooding Attack.mp4
144.8 MB
[TutsNode.net] - Cybersecurity Lab Environment in EVE NG/3. Vulnerable Web Setup/1. bWAPP Server Setup.mp4
144.8 MB
[磁力链接]
添加时间:
2023-12-17
大小:
6.4 GB
最近下载:
2025-03-13
热度:
5200
Cybersecurity Threat Hunting for SOC Analysts
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/10. Adversary Emulation Caldera.mp4
359.9 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/12. Enhanced Lab Realism Bad Blood + Microsoft ATA + Bloodhound!.mp4
338.8 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/1. Threat Hunting with Splunk + Zeek.mp4
243.3 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/7. Adversary Emulation Atomic Red Team + MITRE ATT&CK.mp4
242.7 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/6. Purple Team Scenario Meterpreter + MSFVenom + Process Injection + Velociraptor!.mp4
225.7 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/3. The Modern Threat Hunting Mindset.mp4
225.3 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/5. The Methodical Guide to Effective Threat Hunting/1. Finding Beacons Long and Cumulative Connections.mp4
201.8 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/6. Proofs Detecting False Negatives/2. Suricata vs RITA Zeus Malware.mp4
195.4 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/5. The Methodical Guide to Effective Threat Hunting/5. Finding Beacons Business Need Analysis (Part 4).mp4
194.3 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/2. Threat Hunting with Splunk + Sysmon.mp4
153.3 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/5. The Methodical Guide to Effective Threat Hunting/4. Finding Beacons Business Need Analysis (Part 3).mp4
139.4 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/5. Beaconing DNS.mp4
135.2 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/8. Beaconing Detection Session Size Analysis.mp4
133.5 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/6. Proofs Detecting False Negatives/1. Suricata Capabilities + Installation!.mp4
129.8 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/3. Tools and resources/8. zeek.mp4
126.9 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/2. The Broken Threat Hunting Mindset.mp4
126.1 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/3. Tools and resources/9. Using zeek + Rita to find Evil!.mp4
118.9 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/1. Understanding the New Adversary.mp4
118.7 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/6. Beaconing CDN.mp4
117.8 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/5. Purple Team Scenario Mimikatz.mp4
115.6 MB
[磁力链接]
添加时间:
2022-05-05
大小:
6.2 GB
最近下载:
2025-03-13
热度:
9068
Theoretical Foundations of AI in Cybersecurity
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/3. Fundamental Theories of AI/7. Case Study Revolutionizing Cybersecurity with Natural Language Processing.mp4
57.4 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/7. Deep Learning for Cyber Defense/11. Case Study Unraveling the Challenges of Deploying Deep Learning Models.mp4
52.3 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/7. Deep Learning for Cyber Defense/3. Case Study Enhancing Cybersecurity with Neural Networks.mp4
49.2 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/13. AI in Vulnerability Management/9. Case Study AI-Driven Transformation in Vulnerability Management.mp4
48.5 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/4. Cybersecurity Fundamentals/4. Types of Cyber Threats.mp4
48.4 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/15. AI in Network Security/9. Case Study AI in Network Security.mp4
48.1 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/2. Introduction to Cybersecurity and AI/8. Key Concepts and Terminologies.mp4
47.1 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/10. AI for Intrusion Detection Systems (IDS)/7. Case Study Implementing AI-Based Intrusion Detection Systems.mp4
46.9 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/2. Introduction to Cybersecurity and AI/4. Overview of Cybersecurity.mp4
46.5 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/10. AI for Intrusion Detection Systems (IDS)/9. Case Study Enhancing Cybersecurity with AI-Powered Intrusion Detection Systems.mp4
46.2 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/4. Cybersecurity Fundamentals/11. Case Study Revamping Cybersecurity Strategy at TechNova.mp4
44.9 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/5. Intersection of AI and Cybersecurity/11. Case Study Integrating AI for Enhanced Cybersecurity.mp4
44.4 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/7. Deep Learning for Cyber Defense/2. Neural Networks in Cybersecurity.mp4
44.2 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/11. AI for Threat Hunting/8. Case Studies and Examples.mp4
43.8 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/8. Natural Language Processing in Cybersecurity/3. Case Study Enhancing Cybersecurity Threat Intelligence.mp4
43.7 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/6. Machine Learning in Cybersecurity/2. Supervised Learning for Threat Detection.mp4
43.5 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/8. Natural Language Processing in Cybersecurity/11. Case Study Overcoming NLP Limitations in Cybersecurity.mp4
43.5 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/14. AI and Cyber Threat Intelligence/6. Theoretical Models and Techniques.mp4
43.4 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/9. Reinforcement Learning in Cyber Defense/5. Case Study Revolutionizing Cybersecurity with Reinforcement Learning.mp4
43.2 MB
[TutsNode.org] - Theoretical Foundations of AI in Cybersecurity/2. Introduction to Cybersecurity and AI/7. Case Study AI in Cybersecurity.mp4
42.9 MB
[磁力链接]
添加时间:
2024-07-08
大小:
6.1 GB
最近下载:
2025-03-13
热度:
8946
[FreeCoursesOnline.Me] Coursera - Cybersecurity Attack and Defense Fundamentals Specialization (by EC-Council)
2. Network Defense Essentials (NDE).zip
2.2 GB
1. Ethical Hacking Essentials (EHE).zip
2.1 GB
3. Digital Forensics Essentials (DFE).zip
1.7 GB
0. Websites you may like/1. OneHack.us Premium Cracked Accounts-Tutorials-Guides-Articles Community Based Forum.url
377 Bytes
FreeCoursesOnline.me Download Udacity, Masterclass, Lynda, PHLearn, etc Free.url
290 Bytes
Content Info.txt
285 Bytes
0. Websites you may like/2. FTUApps.com Download Cracked Developers Applications For Free.url
239 Bytes
[磁力链接]
添加时间:
2023-12-17
大小:
6.1 GB
最近下载:
2025-03-14
热度:
6627
[CourserHub.com] Coursera - Cybersecurity Specialization
[CourserHub.com] Coursera - Cybersecurity Specialization.part1.rar
3.2 GB
[CourserHub.com] Coursera - Cybersecurity Specialization.part2.rar
2.7 GB
[磁力链接]
添加时间:
2024-03-21
大小:
5.9 GB
最近下载:
2025-03-14
热度:
266
[FreeCourseSite.com] Udemy - The Complete Certified in Cybersecurity (CC) course ISC2 '23
07 - Domain recaps/004 Domain 4 recap Certified in Cybersecurity (CC).mp4
427.8 MB
07 - Domain recaps/005 Domain 5 recap Certified in Cybersecurity (CC).mp4
169.4 MB
07 - Domain recaps/001 Domain 1 recap Certified in Cybersecurity (CC).mp4
126.1 MB
08 - The study process, material, tips, tricks and practice tests!/006 How to approach practice questions.mp4
124.3 MB
05 - Domain 4 Network Security/004 The OSI Model - Part 1.mp4
105.9 MB
07 - Domain recaps/003 Domain 3 recap Certified in Cybersecurity (CC).mp4
92.9 MB
06 - Domain 5 Security Operations/013 Administrative (Directive) Controls.mp4
92.2 MB
07 - Domain recaps/002 Domain 2 recap Certified in Cybersecurity (CC).mp4
91.8 MB
05 - Domain 4 Network Security/038 Virtualization, Cloud, and Distributed Computing - Part 5.mp4
91.7 MB
04 - Domain 3 Access Controls Concepts/011 Logical Access Control - Part 5.mp4
85.1 MB
04 - Domain 3 Access Controls Concepts/009 Logical Access Control - Part 3.mp4
82.3 MB
02 - Domain 1 Security Principles/024 Laws and regulations - part 1.mp4
81.2 MB
08 - The study process, material, tips, tricks and practice tests!/007 How to design your career and certification path.mp4
78.0 MB
02 - Domain 1 Security Principles/011 IAAA -Identification, Authentication, Authorization, and Accountability - part 4.mp4
71.2 MB
05 - Domain 4 Network Security/025 Attacks and attackers - Part 3.mp4
67.7 MB
03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/008 DRP - Disaster Recovery Planning - Part 4.mp4
67.6 MB
02 - Domain 1 Security Principles/026 Security governance principles.mp4
63.2 MB
05 - Domain 4 Network Security/037 Virtualization, Cloud, and Distributed Computing - Part 4.mp4
61.4 MB
05 - Domain 4 Network Security/041 Electricity.mp4
61.0 MB
05 - Domain 4 Network Security/049 Secure design principles - Part 1.mp4
60.1 MB
[磁力链接]
添加时间:
2023-12-18
大小:
5.8 GB
最近下载:
2025-03-13
热度:
9067
Cybersecurity Foundations From Zero to Pro - Bootcamp
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/7. PCAP Or It Didn't Happen/2. Module 7.2 Header Analysis.mp4
422.2 MB
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/3. Introduction to Networking/3. Module 3.3 Network Protocols.mp4
366.7 MB
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/8. Blue Team Operations/3. Module 8.3 Network, Encryption, and PKI.mp4
315.3 MB
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/3. Introduction to Networking/2. Module 3.2 Devices and IPs.mp4
313.0 MB
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/4. The Beast That Is The Windows Operating System/5. Module 4.5 Active Directory and Commands.mp4
312.3 MB
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/1. How Computers Function/3. Module 1.3 Hardware and Memory.mp4
265.3 MB
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/2. Computers and their Operating Systems/4. Module 2.4 The Linux Operating System.mp4
253.5 MB
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/6. Back to Networking/4. Module 6.4 How to Subnet.mp4
220.3 MB
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/3. Introduction to Networking/1. Module 3.1 Network Organization.mp4
217.5 MB
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/6. Back to Networking/1. Module 6.1 Routers and Switches, Again.mp4
213.9 MB
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/5. Hooked on Unix/2. Module 5.2 PIDs, Variables, and File System.mp4
204.3 MB
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/8. Blue Team Operations/2. Module 8.2 Methodology and Terminology.mp4
201.7 MB
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/3. Introduction to Networking/4. Module 3.4 Network Concepts.mp4
199.6 MB
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/4. The Beast That Is The Windows Operating System/1. Module 4.1 Users, Logging, and the Registry.mp4
184.9 MB
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/8. Blue Team Operations/1. Module 8.1 Vulnerability Management.mp4
171.6 MB
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/7. PCAP Or It Didn't Happen/4. Module 7.4 Attacks in PCAP.mp4
143.7 MB
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/4. The Beast That Is The Windows Operating System/2. Module 4.2 Windows Processes and Logon Activity.mp4
136.9 MB
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/4. The Beast That Is The Windows Operating System/3. Module 4.3 Windows File System.mp4
136.0 MB
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/1. How Computers Function/1. Module 1.1 Numbers.mp4
129.6 MB
[TutsNode.net] - Cybersecurity Foundations From Zero to Pro - Bootcamp/2. Computers and their Operating Systems/3. Module 2.3 The Windows Operating System.mp4
128.6 MB
[磁力链接]
添加时间:
2023-12-18
大小:
5.6 GB
最近下载:
2025-03-13
热度:
10360
[Tutorialsplanet.NET] Udemy - Real-World Ethical Hacking Hands-on Cybersecurity
13. Bonus Videos National Cyber Warrior Academy, Interviews and More/3. NCWA 2017 Facebook Live Video on Car Hacking and Drone Programming.mp4
441.0 MB
13. Bonus Videos National Cyber Warrior Academy, Interviews and More/5. Dr. Payne's TEDx Talk on Coding and Cyber as the New Literacy.mp4
320.7 MB
7. BONUS Section Car Hacking in Kali Linux!/9. Car Hacking LIVE on Dr. Payne's VW Jetta Facebook Live Video from NCWA 2017.mp4
168.6 MB
3. Important Linux and Windows Terminal Commands/5. BONUS Fun Linux Terminal Commands (Optional).mp4
166.3 MB
6. Recon Information Gathering, Scanning and Enumeration/3. theHarvester How hackers find users and email information for phishing.mp4
157.5 MB
6. Recon Information Gathering, Scanning and Enumeration/6. Legion Active network and vulnerability scanning with LEGION GUI.mp4
149.2 MB
4. Create a Virtual Network for Ethical Hacking!/3. Connecting Your VMs to the Host-Only Network.mp4
148.8 MB
6. Recon Information Gathering, Scanning and Enumeration/5. nmap Active Scanning with nmap.mp4
148.0 MB
2. Create Your Own Virtual Hacking Lab!/4. Create an Android PhoneTablet VM for Mobile Hacking!.mp4
142.1 MB
3. Important Linux and Windows Terminal Commands/2. Basic Linux Commands.mp4
112.6 MB
4. Create a Virtual Network for Ethical Hacking!/4. Creating and Using a Public NAT Network in VBox.mp4
112.5 MB
4. Create a Virtual Network for Ethical Hacking!/5. Updating Kali and Windows VMs.mp4
110.5 MB
4. Create a Virtual Network for Ethical Hacking!/2. Creating the Private, Host-Only 10.0.3.x Network.mp4
105.2 MB
2. Create Your Own Virtual Hacking Lab!/3. Create a Windows 10 VM.mp4
104.9 MB
3. Important Linux and Windows Terminal Commands/4. More Helpful Linux Commands.mp4
100.4 MB
6. Recon Information Gathering, Scanning and Enumeration/4. Recon-ng Enumeration of servershosts with Recon-ng.mp4
91.4 MB
2. Create Your Own Virtual Hacking Lab!/2. Building a Kali Linux Virtual Machine.mp4
88.0 MB
6. Recon Information Gathering, Scanning and Enumeration/2. OSINT (Open-Source INTelligence) Framework Domain Dossier.mp4
76.8 MB
2. Create Your Own Virtual Hacking Lab!/5. The Ultimately Hackable Metasploitable!.mp4
70.2 MB
2. Create Your Own Virtual Hacking Lab!/1. Virtual Lab Intro and VirtualBox Installation.mp4
66.7 MB
[磁力链接]
添加时间:
2021-05-01
大小:
4.7 GB
最近下载:
2025-02-25
热度:
165
SC-100 Microsoft Cybersecurity Architect
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/32. Another example on Application Objects.mp4
143.6 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/17. Lab - Microsoft Sentinel - Generating Incidents.mp4
127.1 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/29. Building a Docker Image.mp4
119.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/31. Deploying the container.mp4
113.6 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/15. Review of the Azure Firewall service.mp4
107.9 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/23. Microsoft Sentinel - Automation.mp4
107.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/32.1 AuthApp.zip
106.5 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/18. Example on using Azure Blueprints.mp4
95.8 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/7. Microsoft Defender for Cloud - Secure Management Ports.mp4
93.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/6. Microsoft Defender for Cloud - Servers.mp4
93.0 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/30. Example on using Application Objects.mp4
90.8 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/24. Storing Azure Cosmos DB keys.mp4
89.3 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/14. Microsoft Defender for Cloud - AWS resources.mp4
88.7 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/25. NSG Flow logs.mp4
86.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/15. Lab - Microsoft Sentinel - Data connectors.mp4
80.0 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/39. Review - Azure AD Privileged Identity Management.mp4
77.7 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/35. Example on Enterprise Applications.mp4
77.1 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/6. Azure Storage Accounts - Azure AD Authentication.mp4
75.1 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/3. Lab - Azure SQL database - Dynamic data masking.mp4
74.2 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/16. Lab - Microsoft Sentinel - Azure Activity.mp4
64.7 MB
[磁力链接]
添加时间:
2023-12-22
大小:
4.6 GB
最近下载:
2025-03-11
热度:
5035
Palo Alto Networks Cybersecurity Fundamentals (PCCSA)
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/2. Identify Computing and Networking Trends.mp4
269.3 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/12. Identify Networking Security Technologies.mp4
267.8 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/3. Describe Cybersecurity Threats.mp4
243.2 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/5. Identify Wi-Fi Vulnerabilities and Attacks.mp4
231.3 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/10. Review Network Addressing.mp4
228.2 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/4. Describe Common Cyberattack Techniques.mp4
217.8 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/17. Endpoint Security.mp4
206.1 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/7. Identify Basic Internet and Network Operations.mp4
204.7 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/8. Describe Routing Protocols.mp4
196.9 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/15. Learn Basic Virtualization Security Concepts.mp4
190.8 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/9. Review Networking Models.mp4
190.3 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/18. Server and System Administration.mp4
186.8 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/26. Describe Cortex XSOAR and AutoFocus.mp4
177.9 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/16. Learn Basic DevOps Security Concepts.mp4
176.4 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/14. Learn Basic Cloud Security Concepts.mp4
169.8 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/11. Learn Networking Security Models.mp4
169.5 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/20. Identify Palo Alto Networks Security Solutions.mp4
168.8 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/21. Describe Basic NGFW Components and Functions.mp4
146.3 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/13. Learn Basic Data Center Security Concepts.mp4
134.9 MB
[TutsNode.com] - Palo Alto Networks Cybersecurity Fundamentals (PCCSA)/22. Learn Basic Prisma Cloud.mp4
134.6 MB
[磁力链接]
添加时间:
2022-02-19
大小:
4.5 GB
最近下载:
2025-03-11
热度:
7230
CompTIA CySA+ Cybersecurity Analyst (CS0-003)
Chapter 06 Techniques for Malicious Activity Analysis/003. A Day in the Life of a Cybersecurity Analyst.mp4
157.6 MB
Chapter 10 Vulnerability Scanning Methods and Concepts/002. Industry Frameworks.mp4
149.6 MB
Chapter 10 Vulnerability Scanning Methods and Concepts/001. Asset Discovery.mp4
133.9 MB
Chapter 01 About the CySA Exam/003. How to Take Your CompTIA CySA+ Exam.mp4
125.1 MB
Chapter 02 System and Network Architectures/002. Operating System Concepts.mp4
108.3 MB
Chapter 02 System and Network Architectures/001. Logging.mp4
104.1 MB
Chapter 09 Applying Threat Intelligence in Support of Organizational Security/002. Threat Modeling.mp4
97.3 MB
Chapter 06 Techniques for Malicious Activity Analysis/002. Log Analysis (SIEM and SOAR).mp4
94.0 MB
Chapter 06 Techniques for Malicious Activity Analysis/005. File Analysis.mp4
85.6 MB
Chapter 05 Analyzing Potentially Malicious Activity/003. Application Symptoms.mp4
75.8 MB
Chapter 03 Threat Intelligence in Support of Organizational Security/001. Standardized Processes.mp4
70.1 MB
Chapter 16 Post-Incident Response Activities/002. Reporting and Communication.mp4
69.7 MB
Chapter 14 Vulnerability Handling and Response/009. Vulnerability Management.mp4
68.7 MB
Chapter 10 Vulnerability Scanning Methods and Concepts/004. Vulnerability Identification and Scanning.mp4
68.4 MB
Chapter 08 Fundamentals of Threat Intelligence/002. Supply, TTP, and Intelligence.mp4
68.1 MB
Chapter 09 Applying Threat Intelligence in Support of Organizational Security/005. Integrating Vulnerability Management with Threat Hunting.mp4
68.1 MB
Chapter 14 Vulnerability Handling and Response/012. Inhibitors to Remediation.mp4
67.9 MB
Chapter 05 Analyzing Potentially Malicious Activity/001. Network Symptoms.mp4
66.7 MB
Chapter 09 Applying Threat Intelligence in Support of Organizational Security/004. Threat Hunting.mp4
64.1 MB
Chapter 10 Vulnerability Scanning Methods and Concepts/003. Critical Infrastructure.mp4
63.2 MB
[磁力链接]
添加时间:
2024-09-27
大小:
4.4 GB
最近下载:
2025-03-13
热度:
1669
Implementing the NIST Cybersecurity Framework
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/2. Using the NIST Cybersecurity Framework/5. Finding the Controls.mp4
307.2 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/6. Five Functions.mp4
231.8 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/7. Controls and Outcomes.mp4
205.8 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/5. Framework Components.mp4
197.5 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/3. Value Proposition.mp4
181.0 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/1. Welcome.mp4
161.5 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/5. Generate Questionnaire.mp4
153.5 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/2. Using the NIST Cybersecurity Framework/1. Using the Core.mp4
149.0 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/2. Intel (Microchip Manufacturing).mp4
143.5 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/5. Implementing Phase Two of the CR-MAP/4. Business Value Analysis.mp4
139.8 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/4. DOE (Energy Industry).mp4
139.0 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/7. Conduct Interviews.mp4
136.2 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/7. Conclusion/1. BONUS - Conclusion.mp4
126.4 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/3. Cimpress (Promotional Products).mp4
123.9 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/6. Saudi Aramco (Oil Industry).mp4
118.9 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/4. Intended Audience.mp4
112.2 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/5. Western Australia (Local Government).mp4
112.1 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/6. Choose Target Scores.mp4
100.5 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/6. Implementing Phase Three of the CR-MAP/3. Quarterly Reviews.mp4
99.8 MB
[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/1. Phase One.mp4
93.8 MB
[磁力链接]
添加时间:
2024-01-10
大小:
4.3 GB
最近下载:
2025-03-11
热度:
790
[ DevCourseWeb.com ] Udemy - Trustee Shield - Cybersecurity Foundation for Kids and Teens
~Get Your Files Here !/5. Internet Cookies/6. Protection against Cookie risks.mp4
147.6 MB
~Get Your Files Here !/7. Phishing/13. Activity Revised.mp4
141.4 MB
~Get Your Files Here !/1. Passwords/5. Making unhackable password.mp4
115.0 MB
~Get Your Files Here !/5. Internet Cookies/5. Cookies Risks for Online Privacy.mp4
106.2 MB
~Get Your Files Here !/5. Internet Cookies/3. Internet Cookies.mp4
96.9 MB
~Get Your Files Here !/3. Malware/7. Trojan Horses.mp4
96.4 MB
~Get Your Files Here !/4. Insecure Websites/5. Search Engine.mp4
95.6 MB
~Get Your Files Here !/6. Online Privacy/13. How To Protect Privacy- Part (2).mp4
94.8 MB
~Get Your Files Here !/2. Multi-Factor Authentication (MFA)/8. Password Managers.mp4
90.9 MB
~Get Your Files Here !/6. Online Privacy/12. How To Protect Privacy- Part (1).mp4
81.2 MB
~Get Your Files Here !/8. Social Engineering/10. Protection against Social Engineering attacks.mp4
80.4 MB
~Get Your Files Here !/8. Social Engineering/9. Ransomwares.mp4
77.5 MB
~Get Your Files Here !/8. Social Engineering/3. What is Social Engineering.mp4
75.1 MB
~Get Your Files Here !/2. Multi-Factor Authentication (MFA)/6. Two-Factor Authentication (2FA).mp4
70.2 MB
~Get Your Files Here !/1. Passwords/3. Password Definition.mp4
68.9 MB
~Get Your Files Here !/8. Social Engineering/4. Hackers Perspective.mp4
68.3 MB
~Get Your Files Here !/3. Malware/12. Defensive Methods against Malware.mp4
62.5 MB
~Get Your Files Here !/4. Insecure Websites/7. Why HTTPS is More Secure than HTTP.mp4
62.5 MB
~Get Your Files Here !/3. Malware/6. Worms.mp4
61.9 MB
~Get Your Files Here !/6. Online Privacy/8. Digital Footprint Impacts.mp4
61.7 MB
[磁力链接]
添加时间:
2024-03-22
大小:
4.3 GB
最近下载:
2025-03-13
热度:
1855
[ DevCourseWeb.com ] Udemy - Trustee Shield - Cybersecurity Foundation for Kids and Teens
~Get Your Files Here !/5. Internet Cookies/6. Protection against Cookie risks.mp4
147.6 MB
~Get Your Files Here !/7. Phishing/13. Activity Revised.mp4
141.4 MB
~Get Your Files Here !/1. Passwords/5. Making unhackable password.mp4
115.0 MB
~Get Your Files Here !/5. Internet Cookies/5. Cookies Risks for Online Privacy.mp4
106.2 MB
~Get Your Files Here !/5. Internet Cookies/3. Internet Cookies.mp4
96.9 MB
~Get Your Files Here !/3. Malware/7. Trojan Horses.mp4
96.4 MB
~Get Your Files Here !/4. Insecure Websites/5. Search Engine.mp4
95.6 MB
~Get Your Files Here !/6. Online Privacy/13. How To Protect Privacy- Part (2).mp4
94.8 MB
~Get Your Files Here !/2. Multi-Factor Authentication (MFA)/8. Password Managers.mp4
90.9 MB
~Get Your Files Here !/6. Online Privacy/12. How To Protect Privacy- Part (1).mp4
81.2 MB
~Get Your Files Here !/8. Social Engineering/10. Protection against Social Engineering attacks.mp4
80.4 MB
~Get Your Files Here !/8. Social Engineering/9. Ransomwares.mp4
77.5 MB
~Get Your Files Here !/8. Social Engineering/3. What is Social Engineering.mp4
75.1 MB
~Get Your Files Here !/2. Multi-Factor Authentication (MFA)/6. Two-Factor Authentication (2FA).mp4
70.2 MB
~Get Your Files Here !/1. Passwords/3. Password Definition.mp4
68.9 MB
~Get Your Files Here !/8. Social Engineering/4. Hackers Perspective.mp4
68.3 MB
~Get Your Files Here !/3. Malware/12. Defensive Methods against Malware.mp4
62.5 MB
~Get Your Files Here !/4. Insecure Websites/7. Why HTTPS is More Secure than HTTP.mp4
62.5 MB
~Get Your Files Here !/3. Malware/6. Worms.mp4
61.9 MB
~Get Your Files Here !/6. Online Privacy/8. Digital Footprint Impacts.mp4
61.7 MB
[磁力链接]
添加时间:
2024-11-03
大小:
4.3 GB
最近下载:
2024-11-18
热度:
39
共14页
上一页
1
2
3
4
5
6
下一页