搜索
为您找到约
290
个磁力链接/BT种子,耗时 0 毫秒。
排序:
相关程度
热度
文件大小
添加时间
最近访问
Cybersecurity Prevention and Detection 2nd Edition (Video Collection)
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/007. 1.6 Identity and access management.mp4
120.3 MB
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/003. 1.2 Log ingestion Part 2.mp4
117.9 MB
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/002. 1.1 Log ingestion Part 1.mp4
106.0 MB
03 Malware and Incident Response/Lesson 1 Threat Landscape/002. 1.1 Malware Threat Landscape.mp4
90.8 MB
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/005. 1.4 Infrastructure concepts.mp4
89.3 MB
04 Secure Operations and Protections/Lesson 2 Importance of Efficiency and Process Improvement in Security Operations/004. 2.3 Technology and tool integration.mp4
87.2 MB
01 Threat Intelligence and Threat Hunting/Lesson 2 Analyze Indicators of Potentially Malicious Activity/002. 2.1 Network-related.mp4
77.1 MB
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/008. 1.7 Encryption.mp4
76.0 MB
01 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/006. 3.5 Common techniques Part 3.mp4
63.7 MB
03 Malware and Incident Response/Lesson 5 PE File Identification/004. 5.3 Entry Points.mp4
62.4 MB
01 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/004. 3.3 Common techniques Part 1.mp4
56.9 MB
01 Threat Intelligence and Threat Hunting/Lesson 1 Threat-Intelligence and Threat-Hunting Concepts/002. 1.1 Threat actors Part 1.mp4
53.5 MB
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/004. 1.3 Operating system (OS) concepts.mp4
52.1 MB
01 Threat Intelligence and Threat Hunting/Lesson 3 Tools or Techniques to Determine Malicious Activity/005. 3.4 Common techniques Part 2.mp4
51.1 MB
02 System and Privacy Data Protection/Lesson 4 Analyzing Logs and Impact Analysis/008. 4.7 Impact Analysis.mp4
51.0 MB
01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/007. 7.6 SOC and FPGA.mp4
50.5 MB
04 Secure Operations and Protections/Lesson 1 Importance of System and Network Architecture Concepts in Security Operations/006. 1.5 Network architecture.mp4
50.1 MB
01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/010. 7.9 Industrial Control Systems (ICS) and Process Automation.mp4
46.2 MB
01 Threat Intelligence and Threat Hunting/Lesson 7 Threats and Vulnerabilities Associated with Specialized Technology/004. 7.3 Internet of Things (IoT) and Embedded Devices Part 2.mp4
45.3 MB
04 Secure Operations and Protections/Lesson 4 Analyze Data to Prioritize Vulnerabilities/013. 4.12 Threat modeling.mp4
43.6 MB
[磁力链接]
添加时间:
2024-05-31
大小:
3.8 GB
最近下载:
2024-12-03
热度:
2131
[ DevCourseWeb.com ] Udemy - ChatGPT, ML, and AI for Cybersecurity, SOCs and Business
~Get Your Files Here !/3. AI Tools for Security.mp4
683.8 MB
~Get Your Files Here !/4. Enhancing Search Capabilities with GPT4all Plugins.mp4
576.0 MB
~Get Your Files Here !/2. Fundamentals of ChatGPT and GPT4all.mp4
553.4 MB
~Get Your Files Here !/1. Introduction to Machine Learning and AI for Security.mp4
520.6 MB
~Get Your Files Here !/8. Future Trends and Challenges in AI Security.mp4
452.9 MB
~Get Your Files Here !/6. Evaluating AI Security.mp4
379.7 MB
~Get Your Files Here !/5. Securing AI Models and Data.mp4
280.8 MB
~Get Your Files Here !/7. Case Studies of Real-World AI Applications.mp4
279.0 MB
~Get Your Files Here !/Bonus Resources.txt
386 Bytes
Get Bonus Downloads Here.url
182 Bytes
~Get Your Files Here !/9. Final Exam.html
146 Bytes
~Get Your Files Here !/4.2 Github Plugins (primarily for ChatGPT and Python implementations thereof)..html
124 Bytes
~Get Your Files Here !/4.1 ChatGPT Plugins.html
100 Bytes
~Get Your Files Here !/4.3 GPT4All Website and Downloads.html
90 Bytes
[磁力链接]
添加时间:
2024-04-07
大小:
3.7 GB
最近下载:
2024-12-03
热度:
1765
[ FreeCourseWeb.com ] Pluralsight CySA+ (CompTIA Cybersecurity Analyst) CS0-001.zip
[ FreeCourseWeb.com ] Pluralsight CySA+ (CompTIA Cybersecurity Analyst) CS0-001.zip
3.7 GB
[磁力链接]
添加时间:
2021-03-11
大小:
3.7 GB
最近下载:
2024-12-01
热度:
3809
[FreeCoursesOnline.Me] ZeroToMastery - Complete Cybersecurity Bootcamp
8-Network Security/052-Network Security With Nmap.mp4
169.9 MB
5-Security Bugs & Vulnerabilities/020-Buffer Overflow Demonstration.mp4
136.7 MB
12-Appendix - Ethical Hacking/087-Msfconsole Basic Commands.mp4
97.5 MB
8-Network Security/059-Wireless Attack Demonstration.mp4
93.4 MB
7-End-Point Protection/034-Password Security and Password Managers.mp4
84.2 MB
12-Appendix - Ethical Hacking/093-Meterpreter Basic Commands Part 1.mp4
78.5 MB
7-End-Point Protection/038-Process Explorer.mp4
75.8 MB
1-Introduction/001-Cybersecurity Bootcamp - Zero to Mastery.mp4
72.4 MB
8-Network Security/057-Secure Network Architecture.mp4
66.8 MB
12-Appendix - Ethical Hacking/094-Meterpreter Basic Commands Part 2.mp4
65.7 MB
7-End-Point Protection/033-Bitdefender, Kaspersky, McAfee, Malwarebytes.mp4
63.9 MB
4-Understanding Hackers - The Biggest Threat/012-Most Common Attacks Demonstration.mp4
63.5 MB
8-Network Security/060-Network Monitoring With TCPDump.mp4
62.7 MB
8-Network Security/058-Wireless Security.mp4
59.6 MB
5-Security Bugs & Vulnerabilities/017-Unpatched Machine Exploitation Demonstration.mp4
59.1 MB
12-Appendix - Ethical Hacking/080-Whatweb Stealthy Scan.mp4
58.1 MB
12-Appendix - Ethical Hacking/091-Advance Msfvenom Usage.mp4
51.4 MB
7-End-Point Protection/043-Iptables.mp4
50.9 MB
7-End-Point Protection/028-Brave Browser Security and Privacy.mp4
50.6 MB
12-Appendix - Ethical Hacking/089-Software Vulnerability - Samba Exploitation.mp4
49.5 MB
[磁力链接]
添加时间:
2023-12-20
大小:
3.6 GB
最近下载:
2024-11-30
热度:
5641
[GigaCourse.Com] ZeroToMastery - Complete Cybersecurity Bootcamp
8-Network Security/052-Network Security With Nmap.mp4
169.9 MB
5-Security Bugs & Vulnerabilities/020-Buffer Overflow Demonstration.mp4
136.7 MB
12-Appendix - Ethical Hacking/087-Msfconsole Basic Commands.mp4
97.5 MB
8-Network Security/059-Wireless Attack Demonstration.mp4
93.4 MB
7-End-Point Protection/034-Password Security and Password Managers.mp4
84.2 MB
12-Appendix - Ethical Hacking/093-Meterpreter Basic Commands Part 1.mp4
78.5 MB
7-End-Point Protection/038-Process Explorer.mp4
75.8 MB
1-Introduction/001-Cybersecurity Bootcamp - Zero to Mastery.mp4
72.4 MB
8-Network Security/057-Secure Network Architecture.mp4
66.8 MB
12-Appendix - Ethical Hacking/094-Meterpreter Basic Commands Part 2.mp4
65.7 MB
7-End-Point Protection/033-Bitdefender, Kaspersky, McAfee, Malwarebytes.mp4
63.9 MB
4-Understanding Hackers - The Biggest Threat/012-Most Common Attacks Demonstration.mp4
63.5 MB
8-Network Security/060-Network Monitoring With TCPDump.mp4
62.7 MB
8-Network Security/058-Wireless Security.mp4
59.6 MB
5-Security Bugs & Vulnerabilities/017-Unpatched Machine Exploitation Demonstration.mp4
59.1 MB
12-Appendix - Ethical Hacking/080-Whatweb Stealthy Scan.mp4
58.1 MB
12-Appendix - Ethical Hacking/091-Advance Msfvenom Usage.mp4
51.4 MB
7-End-Point Protection/043-Iptables.mp4
50.9 MB
7-End-Point Protection/028-Brave Browser Security and Privacy.mp4
50.6 MB
12-Appendix - Ethical Hacking/089-Software Vulnerability - Samba Exploitation.mp4
49.5 MB
[磁力链接]
添加时间:
2024-02-21
大小:
3.6 GB
最近下载:
2024-11-27
热度:
1047
[CourseClub.Me] ZeroToMastery - Complete Cybersecurity Bootcamp
8-Network Security/052-Network Security With Nmap.mp4
169.9 MB
5-Security Bugs & Vulnerabilities/020-Buffer Overflow Demonstration.mp4
136.7 MB
12-Appendix - Ethical Hacking/087-Msfconsole Basic Commands.mp4
97.5 MB
8-Network Security/059-Wireless Attack Demonstration.mp4
93.4 MB
7-End-Point Protection/034-Password Security and Password Managers.mp4
84.2 MB
12-Appendix - Ethical Hacking/093-Meterpreter Basic Commands Part 1.mp4
78.5 MB
7-End-Point Protection/038-Process Explorer.mp4
75.8 MB
1-Introduction/001-Cybersecurity Bootcamp - Zero to Mastery.mp4
72.4 MB
8-Network Security/057-Secure Network Architecture.mp4
66.8 MB
12-Appendix - Ethical Hacking/094-Meterpreter Basic Commands Part 2.mp4
65.7 MB
7-End-Point Protection/033-Bitdefender, Kaspersky, McAfee, Malwarebytes.mp4
63.9 MB
4-Understanding Hackers - The Biggest Threat/012-Most Common Attacks Demonstration.mp4
63.5 MB
8-Network Security/060-Network Monitoring With TCPDump.mp4
62.7 MB
8-Network Security/058-Wireless Security.mp4
59.6 MB
5-Security Bugs & Vulnerabilities/017-Unpatched Machine Exploitation Demonstration.mp4
59.1 MB
12-Appendix - Ethical Hacking/080-Whatweb Stealthy Scan.mp4
58.1 MB
12-Appendix - Ethical Hacking/091-Advance Msfvenom Usage.mp4
51.4 MB
7-End-Point Protection/043-Iptables.mp4
50.9 MB
7-End-Point Protection/028-Brave Browser Security and Privacy.mp4
50.6 MB
12-Appendix - Ethical Hacking/089-Software Vulnerability - Samba Exploitation.mp4
49.5 MB
[磁力链接]
添加时间:
2023-12-17
大小:
3.6 GB
最近下载:
2024-11-28
热度:
1121
ZeroToMastery - Complete Cybersecurity Bootcamp
8-Network Security/052-Network Security With Nmap.mp4
169.9 MB
5-Security Bugs & Vulnerabilities/020-Buffer Overflow Demonstration.mp4
136.7 MB
12-Appendix - Ethical Hacking/087-Msfconsole Basic Commands.mp4
97.5 MB
8-Network Security/059-Wireless Attack Demonstration.mp4
93.4 MB
7-End-Point Protection/034-Password Security and Password Managers.mp4
84.2 MB
12-Appendix - Ethical Hacking/093-Meterpreter Basic Commands Part 1.mp4
78.5 MB
7-End-Point Protection/038-Process Explorer.mp4
75.8 MB
1-Introduction/001-Cybersecurity Bootcamp - Zero to Mastery.mp4
72.4 MB
8-Network Security/057-Secure Network Architecture.mp4
66.8 MB
12-Appendix - Ethical Hacking/094-Meterpreter Basic Commands Part 2.mp4
65.7 MB
7-End-Point Protection/033-Bitdefender, Kaspersky, McAfee, Malwarebytes.mp4
63.9 MB
4-Understanding Hackers - The Biggest Threat/012-Most Common Attacks Demonstration.mp4
63.5 MB
8-Network Security/060-Network Monitoring With TCPDump.mp4
62.7 MB
8-Network Security/058-Wireless Security.mp4
59.6 MB
5-Security Bugs & Vulnerabilities/017-Unpatched Machine Exploitation Demonstration.mp4
59.1 MB
12-Appendix - Ethical Hacking/080-Whatweb Stealthy Scan.mp4
58.1 MB
12-Appendix - Ethical Hacking/091-Advance Msfvenom Usage.mp4
51.4 MB
7-End-Point Protection/043-Iptables.mp4
50.9 MB
7-End-Point Protection/028-Brave Browser Security and Privacy.mp4
50.6 MB
12-Appendix - Ethical Hacking/089-Software Vulnerability - Samba Exploitation.mp4
49.5 MB
[磁力链接]
添加时间:
2024-01-09
大小:
3.6 GB
最近下载:
2024-12-03
热度:
2340
[FreeTutorials.Us]
cybersecurity
-ultimate-ethical-hacking-boot-camp
01 Introduction to the Ultimate Ethical Hacking Boot Camp/attached_files/001 Welcome to the Ultimate Ethical Hacking Boot Camp/Equipment.pdf
131.3 kB
02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/Kali.Backgrounds.jpg
478.6 kB
02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/Server.2008.Backgrounds.jpg
480.5 kB
02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/win7.Backgrounds.jpg
480.5 kB
02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/win8.Backgrounds.jpg
480.2 kB
02 Hacking Lab Setup - Windows Mac Instructions/attached_files/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines/winxp.Backgrounds.jpg
480.2 kB
08 Password Cracking/attached_files/037 Windows Password Cracking/Wordlist-Resources.pdf
59.0 kB
01 Introduction to the Ultimate Ethical Hacking Boot Camp/001 Welcome to the Ultimate Ethical Hacking Boot Camp.mp4
71.7 MB
01 Introduction to the Ultimate Ethical Hacking Boot Camp/002 What is Ethical Hacking.mp4
149.9 MB
01 Introduction to the Ultimate Ethical Hacking Boot Camp/003 Careers for Ethical Hackers.mp4
48.9 MB
01 Introduction to the Ultimate Ethical Hacking Boot Camp/004 Wireless Lab Setup Hack.mp4
62.6 MB
01 Introduction to the Ultimate Ethical Hacking Boot Camp/005 Wireless Hacking Module Disclaimer.mp4
38.8 MB
01 Introduction to the Ultimate Ethical Hacking Boot Camp/006 Interview Oracle Shodan CNN.mp4
278.0 MB
02 Hacking Lab Setup - Windows Mac Instructions/007 Introduction to Lab Setup.mp4
31.3 MB
02 Hacking Lab Setup - Windows Mac Instructions/008 Vmware Lab Settings - BONUS CUSTOM Backgrounds for your virtual machines..mp4
20.7 MB
02 Hacking Lab Setup - Windows Mac Instructions/009 Installing Windows XP.mp4
133.1 MB
02 Hacking Lab Setup - Windows Mac Instructions/010 Installing Server 2008.mp4
7.7 MB
02 Hacking Lab Setup - Windows Mac Instructions/011 Installing Kali Linux from ISO.mp4
33.5 MB
02 Hacking Lab Setup - Windows Mac Instructions/012 Installing Kali Linux Prebuild Virtual Machine.mp4
29.4 MB
02 Hacking Lab Setup - Windows Mac Instructions/013 Installing Windows 7.mp4
9.8 MB
[磁力链接]
添加时间:
2017-08-24
大小:
3.6 GB
最近下载:
2024-12-02
热度:
2720
Demystifying Cybersecurity Fundamentals-Learning with Demos
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/1. Introduction/1. Top 10 Cyber Attacks of 21st Century.mp4
106.2 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/5. Deep Dive into Various Algorithms/9. What is Deffie-Hellman Algorithm .mp4
100.7 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/5. Deep Dive into Various Algorithms/7. Understanding RSA Algorithm with Example.mp4
94.6 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/7. Networking Basics/15. How a Packet Travels from Source to Destination.mp4
88.0 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/5. Deep Dive into Various Algorithms/6. What is the RSA Algorithm .mp4
82.1 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/6. Public Key Infrastructure - PKI/2. What is PKI .mp4
76.1 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/7. Networking Basics/9. Understanding an IP address.mp4
69.7 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/3. Types of Hackers/5. Hacktivist.mp4
67.5 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/3. Types of Hackers/6. Script Kiddie.mp4
66.2 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/2. Types of Cyber Attacks/6. Demo A Dictionary Attack - Password Attack.mp4
62.2 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/5. Deep Dive into Various Algorithms/10. Understanding DH Algorithm with an Example.mp4
59.6 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/5. Deep Dive into Various Algorithms/2. What is Cipher Algorithm & Key.mp4
59.3 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/2. Types of Cyber Attacks/8. Demo MITM Attack using ARP Poisoning.mp4
54.4 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/1. Introduction/4. What is Cybersecurity .mp4
54.3 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/5. Deep Dive into Various Algorithms/12. What is Elliptic Curve Algorithm .mp4
53.6 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/4. Basics of Cryptography/11. DemoAsymmetric encryption using openssl.mp4
53.1 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/5. Deep Dive into Various Algorithms/8. What is DSA Algorithm .mp4
51.7 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/4. Basics of Cryptography/8. What is Asymmetric Encryption.mp4
50.9 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/3. Types of Hackers/3. Black Hat Hacker.mp4
50.7 MB
[TutsNode.net] - Demystifying Cybersecurity Fundamentals-Learning with Demos/2. Types of Cyber Attacks/4. Demo How attackers use Phishing Attack .mp4
50.5 MB
[磁力链接]
添加时间:
2023-12-18
大小:
3.6 GB
最近下载:
2024-12-03
热度:
6354
[ DevCourseWeb.com ] Udemy - Mastering Cybersecurity and Supply Chain Risk Management
~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/7. Recover.mp4
205.3 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/4. Network Security Controls.mp4
173.8 MB
~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/5. Incident Analysis.mp4
150.0 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/1. User and Network Infrastructure.mp4
136.2 MB
~Get Your Files Here !/1. Introduction to NIST Framework/3. NIST Framework Core.mp4
130.0 MB
~Get Your Files Here !/5. Effective Supply Chain Risk Management/4. Develop, Assess and Test Supply Chain Risks.mp4
123.4 MB
~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/3. Executable Response Plan.mp4
116.0 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/9. Information Protection.mp4
115.2 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/8. Hardware Integrity.mp4
105.7 MB
~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/1. Developing a Continuity of Operations Plan.mp4
103.2 MB
~Get Your Files Here !/2. Cybersecurity Risk Planning & Management/4. Keeping Hardware Inventory Updated.mp4
102.7 MB
~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/2. Incident Response.mp4
102.1 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/7. Data Security.mp4
101.4 MB
~Get Your Files Here !/4. Business Continuity and Incident Response Strategies/6. Mitigation.mp4
101.0 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/2. Authentication and Access Control.mp4
100.3 MB
~Get Your Files Here !/2. Cybersecurity Risk Planning & Management/7. Personnel Security Requirements.mp4
98.1 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/10. Patch Management.mp4
97.7 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/5. Association and Authentication.mp4
91.7 MB
~Get Your Files Here !/5. Effective Supply Chain Risk Management/1. Supply Chain Risk Management.mp4
90.7 MB
~Get Your Files Here !/3. Comprehensive Network Security and Data Protection/12. Protective Technology.mp4
88.5 MB
[磁力链接]
添加时间:
2024-03-23
大小:
3.6 GB
最近下载:
2024-12-01
热度:
1069
[ DevCourseWeb.com ] Udemy - Ultimate Cybersecurity - Uncovering Hacker Strategies
~Get Your Files Here !/8 - Conclusion/56 - 82 Staying Informed and UptoDate.mp4
99.4 MB
~Get Your Files Here !/8 - Conclusion/57 - 83 Next Steps for Advancing Your Cybersecurity Knowledge.mp4
91.7 MB
~Get Your Files Here !/6 - Cybersecurity Laws Regulations and Compliance/40 - Cybersecurity Laws Regulations and Compliance Video.mp4
84.9 MB
~Get Your Files Here !/4 - Cybersecurity Best Practices/33 - 452 Intrusion Detection and Prevention Systems IDPS.mp4
82.9 MB
~Get Your Files Here !/6 - Cybersecurity Laws Regulations and Compliance/42 - 62 Compliance with Industry Standards.mp4
82.9 MB
~Get Your Files Here !/7 - Cybersecurity Tools and Resources/52 - 73 Monitoring and Logging Tools.mp4
81.4 MB
~Get Your Files Here !/4 - Cybersecurity Best Practices/34 - 453 Virtual Private Networks VPNs.mp4
80.2 MB
~Get Your Files Here !/5 - Incident Response and Recovery/37 - 52 Identifying and Analyzing Security Incidents.mp4
80.2 MB
~Get Your Files Here !/4 - Cybersecurity Best Practices/32 - 451 Firewalls.mp4
80.1 MB
~Get Your Files Here !/5 - Incident Response and Recovery/35 - Incident Response and Recovery Video.mp4
79.6 MB
~Get Your Files Here !/6 - Cybersecurity Laws Regulations and Compliance/46 - 63 Cybersecurity Frameworks.mp4
79.3 MB
~Get Your Files Here !/7 - Cybersecurity Tools and Resources/50 - 71 Security Assessment and Testing Tools.mp4
79.1 MB
~Get Your Files Here !/7 - Cybersecurity Tools and Resources/49 - Cybersecurity Tools and Resources Video.mp4
79.1 MB
~Get Your Files Here !/7 - Cybersecurity Tools and Resources/51 - 72 OpenSource Security Tools.mp4
78.3 MB
~Get Your Files Here !/8 - Conclusion/55 - 81 Course Summary.mp4
78.1 MB
~Get Your Files Here !/4 - Cybersecurity Best Practices/31 - 45 Network Security Measures.mp4
77.8 MB
~Get Your Files Here !/6 - Cybersecurity Laws Regulations and Compliance/41 - 61 Understanding Data Privacy Laws.mp4
77.5 MB
~Get Your Files Here !/4 - Cybersecurity Best Practices/30 - 44 Data Encryption and Secure Communication.mp4
77.1 MB
~Get Your Files Here !/8 - Conclusion/54 - Conclusion Video.mp4
77.0 MB
~Get Your Files Here !/4 - Cybersecurity Best Practices/29 - 43 MultiFactor Authentication MFA.mp4
71.9 MB
[磁力链接]
添加时间:
2023-12-20
大小:
3.4 GB
最近下载:
2024-12-03
热度:
4136
[ DevCourseWeb.com ] Udemy - Master ICS - OT Cybersecurity - Fundamental to Advanced-Part 2
~Get Your Files Here !/01 - Introduction/002 Filesystem.mp4
154.3 MB
~Get Your Files Here !/03 - Network Architecture Design Considerations/005 Reference Architecture-2.mp4
127.4 MB
~Get Your Files Here !/04 - OT Cybersecurity Management/003 Manufacturing Impact Levels.mp4
124.9 MB
~Get Your Files Here !/02 - Cryptography -Lab/011 Cyberland Usecase-OpenSSL.mp4
123.1 MB
~Get Your Files Here !/02 - Cryptography -Lab/004 Hashing.mp4
120.2 MB
~Get Your Files Here !/02 - Cryptography -Lab/002 Symmetric.mp4
112.3 MB
~Get Your Files Here !/03 - Network Architecture Design Considerations/004 Reference Architecture-1.mp4
110.3 MB
~Get Your Files Here !/06 - Contingency & Continuity Planning/005 Disaster Recovery Plan.mp4
106.3 MB
~Get Your Files Here !/04 - OT Cybersecurity Management/002 Industry Profiling.mp4
103.1 MB
~Get Your Files Here !/01 - Introduction/001 Linux.mp4
100.8 MB
~Get Your Files Here !/02 - Cryptography -Lab/010 Binwalk Firmware Analysis.mp4
99.1 MB
~Get Your Files Here !/02 - Cryptography -Lab/006 Cyberchef-1-Basic.mp4
98.9 MB
~Get Your Files Here !/06 - Contingency & Continuity Planning/001 Types of Plan.mp4
94.8 MB
~Get Your Files Here !/04 - OT Cybersecurity Management/004 Cybersecurity Framework.mp4
94.8 MB
~Get Your Files Here !/02 - Cryptography -Lab/001 Cryptography.mp4
92.1 MB
~Get Your Files Here !/03 - Network Architecture Design Considerations/006 Reference Architecture-3.mp4
89.4 MB
~Get Your Files Here !/01 - Introduction/003 Filesystem Lab.mp4
86.1 MB
~Get Your Files Here !/01 - Introduction/007 Linux File Ownership Lab-4.mp4
84.3 MB
~Get Your Files Here !/03 - Network Architecture Design Considerations/001 Functional Difference.mp4
82.0 MB
~Get Your Files Here !/04 - OT Cybersecurity Management/001 NIST Cybersecurity Program.mp4
81.7 MB
[磁力链接]
添加时间:
2023-12-20
大小:
3.2 GB
最近下载:
2024-12-01
热度:
1446
[ DevCourseWeb.com ] Udemy - The Cybersecurity Consultant Mindset
~Get Your Files Here !/3. Risk Management and Assessment/2. Introduction to Risk Management.mp4
222.8 MB
~Get Your Files Here !/2. Introduction to Cybersecurity Consulting/3. Understanding the Role of a Cyber Consultant.mp4
212.8 MB
~Get Your Files Here !/7. Developing Soft Skills for Your Career/2. Communication and Interpersonal Skills.mp4
211.5 MB
~Get Your Files Here !/3. Risk Management and Assessment/3. Compliance Requirements.mp4
204.7 MB
~Get Your Files Here !/2. Introduction to Cybersecurity Consulting/2. Overview of Cybersecurity.mp4
198.8 MB
~Get Your Files Here !/2. Introduction to Cybersecurity Consulting/5. Preparing for a Career in Cyber Consulting.mp4
196.6 MB
~Get Your Files Here !/3. Risk Management and Assessment/5. Security Documentation Development.mp4
178.0 MB
~Get Your Files Here !/4. Tools and Technologies/3. Vulnerability Assessment and Pentesting.mp4
177.6 MB
~Get Your Files Here !/3. Risk Management and Assessment/4. Risk Assessment and Analysis.mp4
158.0 MB
~Get Your Files Here !/4. Tools and Technologies/6. Cybersecurity Frameworks Selection.mp4
146.1 MB
~Get Your Files Here !/5. Incident Response/3. Developing an Incident Response Plan.mp4
123.8 MB
~Get Your Files Here !/4. Tools and Technologies/2. Network Scanning and Monitoring.mp4
115.2 MB
~Get Your Files Here !/2. Introduction to Cybersecurity Consulting/4. Benefits of Cyber Consulting and Cons.mp4
102.7 MB
~Get Your Files Here !/4. Tools and Technologies/5. Security Information and Event Management Systems.mp4
99.4 MB
~Get Your Files Here !/6. Cybersecurity Auditing and Frameworks/4. Cybersecurity Frameworks - Implementation.mp4
81.3 MB
~Get Your Files Here !/4. Tools and Technologies/4. Intrusion Detection and Prevention Systems.mp4
73.6 MB
~Get Your Files Here !/6. Cybersecurity Auditing and Frameworks/3. Auditing Standards and Requirements.mp4
73.1 MB
~Get Your Files Here !/6. Cybersecurity Auditing and Frameworks/2. Overview of IT Auditing.mp4
72.9 MB
~Get Your Files Here !/7. Developing Soft Skills for Your Career/5. Practical Exercises and Resources.mp4
68.0 MB
~Get Your Files Here !/5. Incident Response/2. Defining a Security Incident.mp4
67.7 MB
[磁力链接]
添加时间:
2023-12-26
大小:
3.1 GB
最近下载:
2024-12-01
热度:
1994
[ CourseMega.com ] Udemy - Cybersecurity - Attack & Defense Strategies (Red & Blue Team).zip
[ CourseMega.com ] Udemy - Cybersecurity - Attack & Defense Strategies (Red & Blue Team).zip
3.0 GB
[磁力链接]
添加时间:
2024-03-26
大小:
3.0 GB
最近下载:
2024-12-01
热度:
2364
Aerospace Cybersecurity - Satellite Hacking (W53)
Module 1 - Satellite Reconnaissance/7. (W53M01) Python Programs for Satellite Reconnaissance.mp4
303.7 MB
Module 1 - Satellite Reconnaissance/6. (W53M01) OSINT Tools for Satellite Data Extraction.mp4
253.1 MB
Module 1 - Satellite Reconnaissance/4. (W53M01) Satellite Subsystems and Attack Surfaces.mp4
206.3 MB
Module 3 - Reverse Engineering and Decoding Communication/4. (W53M03) Decoding Satellite Communications Using SatNogs and Reverse Engineering.mp4
176.2 MB
Module 4 - Vulnerabilities and Attacks/4. (W53M04) Dive Further Into Attacks and More CTF Practice.mp4
174.4 MB
Module 3 - Reverse Engineering and Decoding Communication/1. (W53M03) Overview of Satellite Communications.mp4
168.9 MB
Module 1 - Satellite Reconnaissance/2. (W53M01) Satellites and Ground Stations.mp4
168.2 MB
Module 2 - Communication Analysis and Eavesdropping/3. (W53M02) Command & Data Handling & Payloads.mp4
162.6 MB
Module 1 - Satellite Reconnaissance/5. (W53M01) Spherical Grid System.mp4
161.0 MB
Module 3 - Reverse Engineering and Decoding Communication/3. (W53M03) Decoding Communications Using Wireshark and GNU Radio.mp4
148.0 MB
Module 4 - Vulnerabilities and Attacks/1. (W53M04) Common Attacks and Interactive Labs.mp4
137.0 MB
Module 2 - Communication Analysis and Eavesdropping/1. (W53M02) Communication Foundations.mp4
135.6 MB
Module 3 - Reverse Engineering and Decoding Communication/2. (W53M03) Analyzing Satellite Communication Using gpredict, SatDump, & WXtolMG.mp4
135.3 MB
Module 4 - Vulnerabilities and Attacks/3. (W53M04) Detecting Attacks and Mitigation Strategies.mp4
128.6 MB
Module 2 - Communication Analysis and Eavesdropping/2. (W53M02) Link Design & Protocols.mp4
113.8 MB
Module 2 - Communication Analysis and Eavesdropping/4. (W53M02) Satellite Networks & Vulnerabilities.mp4
89.2 MB
Module 4 - Vulnerabilities and Attacks/2. (W53M04) Future of Satellite Security and Next Steps.mp4
85.1 MB
Module 1 - Satellite Reconnaissance/1. (W53M01) Introduction.mp4
79.1 MB
Module 1 - Satellite Reconnaissance/3. (W53M01) Information Extraction Methods.mp4
78.3 MB
Module 1 - Satellite Reconnaissance/4. (W53M01) Satellite Subsystems and Attack Surfaces.vtt
45.2 kB
[磁力链接]
添加时间:
2024-01-09
大小:
2.9 GB
最近下载:
2024-07-14
热度:
100
ICOLLEGE.COMPTIA.CYBERSECURITY.ANALYST.CSA.PLUS-iLLiTERATE
icollege.comptia.
cybersecurity
.analyst.csa.plus-illiterate.r00
50.0 MB
icollege.comptia.
cybersecurity
.analyst.csa.plus-illiterate.r01
50.0 MB
icollege.comptia.
cybersecurity
.analyst.csa.plus-illiterate.r02
50.0 MB
icollege.comptia.
cybersecurity
.analyst.csa.plus-illiterate.r03
50.0 MB
icollege.comptia.
cybersecurity
.analyst.csa.plus-illiterate.r04
50.0 MB
icollege.comptia.
cybersecurity
.analyst.csa.plus-illiterate.r05
50.0 MB
icollege.comptia.
cybersecurity
.analyst.csa.plus-illiterate.r06
50.0 MB
icollege.comptia.
cybersecurity
.analyst.csa.plus-illiterate.r07
50.0 MB
icollege.comptia.
cybersecurity
.analyst.csa.plus-illiterate.r08
50.0 MB
icollege.comptia.
cybersecurity
.analyst.csa.plus-illiterate.r09
50.0 MB
icollege.comptia.
cybersecurity
.analyst.csa.plus-illiterate.r10
50.0 MB
icollege.comptia.
cybersecurity
.analyst.csa.plus-illiterate.r11
50.0 MB
icollege.comptia.
cybersecurity
.analyst.csa.plus-illiterate.r12
50.0 MB
icollege.comptia.
cybersecurity
.analyst.csa.plus-illiterate.r13
50.0 MB
icollege.comptia.
cybersecurity
.analyst.csa.plus-illiterate.r14
50.0 MB
icollege.comptia.
cybersecurity
.analyst.csa.plus-illiterate.r15
50.0 MB
icollege.comptia.
cybersecurity
.analyst.csa.plus-illiterate.r16
50.0 MB
icollege.comptia.
cybersecurity
.analyst.csa.plus-illiterate.r17
50.0 MB
icollege.comptia.
cybersecurity
.analyst.csa.plus-illiterate.r18
50.0 MB
icollege.comptia.
cybersecurity
.analyst.csa.plus-illiterate.r19
50.0 MB
[磁力链接]
添加时间:
2018-11-17
大小:
2.8 GB
最近下载:
2024-08-30
热度:
96
Cybersecurity Monitoring & Detection Lab
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/28. Attacks and Monitor in Splunk.mp4
216.4 MB
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/26. Attacks & Security Onion Monitoring.mp4
213.9 MB
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/27. Introduction to Splunk.mp4
147.7 MB
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/25. Introduction to Security Onion.mp4
134.2 MB
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/9. Install Security Onion.mp4
127.0 MB
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/1. Introduction to Cybersecurity/2. Cyber Security Monitoring & Detection.mp4
108.8 MB
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/8. Install Ubuntu Server.mp4
108.1 MB
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/1. Introduction to Cybersecurity/1. Introduction Cyber Security.mp4
108.0 MB
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/5. PfSense Firewall Wizard, Naming & Rules.mp4
98.8 MB
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/30. Configure WAZUH Agent on Windows.mp4
85.7 MB
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/4. PfSense Firewall Initial Configuration.mp4
84.5 MB
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/29. Install WAZUH Manager.mp4
76.9 MB
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/12. Install Windows Server 2019 Advanced Method.mp4
73.6 MB
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/2. Install Windows 11.mp4
72.7 MB
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/21. Setting IP Address on Ubuntu Server.mp4
70.4 MB
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/18. Install Splunk on Linux Ubuntu Server.mp4
68.9 MB
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/19. Install Splunk on Linux CentOS.mp4
67.3 MB
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/1. Introduction to Cybersecurity/3. Cyber Security Monitoring & Detection Lab.mp4
66.9 MB
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/13. Configure Active Directory AD.mp4
65.8 MB
[TutsNode.net] - Cybersecurity Monitoring & Detection Lab/2. LAB Setup/11. Install Windows Server 2019 Typical Method.mp4
64.3 MB
[磁力链接]
添加时间:
2023-12-20
大小:
2.7 GB
最近下载:
2024-12-01
热度:
7723
[ FreeCourseWeb.com ] Udemy - Master Cybersecurity,Ethical Hacking and Penetrating Testing (Updated 09 - 2021)
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/8. What is Phishing, Vishing and SMShing.mp4
247.1 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/2. Why You Need Security .mp4
189.8 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4
180.0 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/7. Spyware, Adware, Scareware, PUPs & Browser hijacking.mp4
178.9 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/11. Setting up Labs.mp4
169.5 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/9. Spamming & Doxing.mp4
168.1 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/10. Social Engineering - Scams, Cons, Tricks and Fraud.mp4
163.0 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/3. What is Privacy, Anonymity and Pseudonymity .mp4
158.8 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/6. Threat Modelling And Risk Assessment.mp4
158.3 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/6. Malware, Viruses, Root kits and RATs.mp4
152.7 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/5. Hackers, crackers and cyber criminals.mp4
146.5 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/8. Confidentiality, Integrity and Availability - (Security Attributes).mp4
141.8 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/4. Security, Vulnerabilities, Threats and Adversaries.mp4
117.8 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/2. Protect What You Value.mp4
93.7 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/10. Zero Trust Model.mp4
85.7 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/7. Security,Anonymity and Privacy.mp4
59.8 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/1. What is Cybersecurity .mp4
34.8 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/9. Defence in Depth.mp4
34.2 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/8. Who Conduct it .mp4
26.4 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/5. Purpose of Studying Ethical Hacking and Penetrating Testing.mp4
24.3 MB
[磁力链接]
添加时间:
2022-02-08
大小:
2.7 GB
最近下载:
2024-12-02
热度:
1003
[ DevCourseWeb.com ] Udemy - Cybersecurity and Kali Linux - Hands-on course by TechLatest
~Get Your Files Here !/7. Module 7 - Wireless Fortification Pentesting Mastery/2. Web App Pentesting Practical.mp4
636.4 MB
~Get Your Files Here !/10. Module 10 - Communicating Findings Reporting Mastery/2. Reporting Practical + Conclusion.mp4
283.4 MB
~Get Your Files Here !/6. Module 6 - Crack the Code Password Mastery/2. Password Cracking Practical.mp4
265.1 MB
~Get Your Files Here !/5. Module 5 - Hacking Mastery Strategic Exploitation/2. Exploitation Practical.mp4
222.1 MB
~Get Your Files Here !/9. Module 9 - Human Manipulation Social Engineering/2. Social Engineering Practical.mp4
198.1 MB
~Get Your Files Here !/8. Module 8 - Wireless Fortification Pentesting Mastery/2. Wireless Pentesting Practical.mp4
194.1 MB
~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/3. Social Media Reconnaissance.mp4
142.0 MB
~Get Your Files Here !/4. Module 4 - Infiltration Techniques Mastering Active Reconnaissance/2. Vulnerability Assessment.mp4
121.4 MB
~Get Your Files Here !/5. Module 5 - Hacking Mastery Strategic Exploitation/1. Exploitation Introduction.mp4
84.3 MB
~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/3. Microsoft Azure Guide..mp4
54.4 MB
~Get Your Files Here !/6. Module 6 - Crack the Code Password Mastery/1. Password Cracking Introduction.mp4
48.2 MB
~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/2. Google Cloud Platform(GCP) Guide..mp4
47.9 MB
~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/1. Amazon Web Services(AWS) Guide..mp4
46.0 MB
~Get Your Files Here !/4. Module 4 - Infiltration Techniques Mastering Active Reconnaissance/3. Scanning.mp4
44.9 MB
~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/4. Unveiling the Secrets of OS Fingerprinting in Cybersecurity with Kali Linux.mp4
44.7 MB
~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/5. Target Validation in Cybersecurity with Kali Linux.mp4
39.9 MB
~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/1. Reconnaissance — First Phase of Hacking.mp4
30.0 MB
~Get Your Files Here !/1. Module 1 - Course Introduction & Teaser/2. Course Introduction.mp4
28.4 MB
~Get Your Files Here !/8. Module 8 - Wireless Fortification Pentesting Mastery/1. Wireless Pentesting Introduction.mp4
24.5 MB
~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/6. Subdomain Discovery in Cybersecurity with Kali Linux.mp4
24.5 MB
[磁力链接]
添加时间:
2023-12-29
大小:
2.6 GB
最近下载:
2024-12-03
热度:
4556
MalTrak - Cybersecurity ATTACK & DEFENSE The Foundations
Module 01 - ATTACK/01 - Targeted Attack Real Scenario.mp4
423.3 MB
Module 01 - ATTACK/02 - Advanced Penetration Testing & Red Team Operations (Hands-On).mp4
362.7 MB
Bonus Module - Advanced Attacks/Fileless Attacks and Targeted Ransomware Attacks.mp4
339.9 MB
Module 02 - RESPOND/02 - Log Analysis With Splunk (Hands-On).mp4
255.3 MB
Module 03 - INVESTIGATE/05 - Behavioral and Code Analysis.mp4
242.3 MB
Module 02 - RESPOND/01 - Incident Response Process & Log Analysis.mp4
224.2 MB
Module 03 - INVESTIGATE/04 - Basic Static Analysis - PE Headers.mp4
215.0 MB
Module 02 - RESPOND/03 - Live Forensics and System Triage (Hands-On).mp4
212.1 MB
Module 03 - INVESTIGATE/01 - Malware Analysis Intro.mp4
124.1 MB
Module 03 - INVESTIGATE/03 - Basic Static Analysis (Hands-On).mp4
89.5 MB
Module 03 - INVESTIGATE/02 - Basic Static Analysis - Finding Clues in Text.mp4
67.8 MB
Module 01 - ATTACK/Resources/Module01 - Real Attack Scenario.pptx
5.6 MB
Module 03 - INVESTIGATE/Resources/Module03 - Malware Analysis.pptx
4.1 MB
Module 03 - INVESTIGATE/Resources/Module03 - Malware Analysis.pdf
3.0 MB
Module 03 - INVESTIGATE/Resources/iranian_apt_docx_with_macro.zip
2.7 MB
Module 01 - ATTACK/Resources/Module01 - Real Attack Scenario.pdf
2.6 MB
Module 02 - RESPOND/Resources/Module02 - Incident Response & Forensics.pptx
1.8 MB
Bonus Module - Advanced Attacks/Resources/Module04 - Fileless Attacks, Targeted Ransomware & Yara Rules.pptx
1.7 MB
Module 02 - RESPOND/Resources/drupal_webattack.log
1.4 MB
Bonus Module - Advanced Attacks/Resources/Module04 - Fileless Attacks, Targeted Ransomware & Yara Rules.pdf
1.2 MB
[磁力链接]
添加时间:
2023-12-18
大小:
2.6 GB
最近下载:
2024-12-03
热度:
86
共15页
上一页
1
2
3
4
5
6
7
下一页