搜索
为您找到约
277
个磁力链接/BT种子,耗时 0 毫秒。
排序:
相关程度
热度
文件大小
添加时间
最近访问
[ FreeCourseWeb.com ] Udemy - Master Cybersecurity,Ethical Hacking and Penetrating Testing (Updated 09 - 2021)
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/8. What is Phishing, Vishing and SMShing.mp4
247.1 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/2. Why You Need Security .mp4
189.8 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4
180.0 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/7. Spyware, Adware, Scareware, PUPs & Browser hijacking.mp4
178.9 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/11. Setting up Labs.mp4
169.5 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/9. Spamming & Doxing.mp4
168.1 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/10. Social Engineering - Scams, Cons, Tricks and Fraud.mp4
163.0 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/3. What is Privacy, Anonymity and Pseudonymity .mp4
158.8 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/6. Threat Modelling And Risk Assessment.mp4
158.3 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/6. Malware, Viruses, Root kits and RATs.mp4
152.7 MB
~Get Your Files Here !/4. Exposing Hackers - Know Your Enemy/5. Hackers, crackers and cyber criminals.mp4
146.5 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/8. Confidentiality, Integrity and Availability - (Security Attributes).mp4
141.8 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/4. Security, Vulnerabilities, Threats and Adversaries.mp4
117.8 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/2. Protect What You Value.mp4
93.7 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/10. Zero Trust Model.mp4
85.7 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/7. Security,Anonymity and Privacy.mp4
59.8 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/1. What is Cybersecurity .mp4
34.8 MB
~Get Your Files Here !/3. Exposing Hackers - Know Yourself/9. Defence in Depth.mp4
34.2 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/8. Who Conduct it .mp4
26.4 MB
~Get Your Files Here !/2. Introduction To Cybersecurity, Ethical Hacking And Penetrating Testing/5. Purpose of Studying Ethical Hacking and Penetrating Testing.mp4
24.3 MB
[磁力链接]
添加时间:
2022-02-08
大小:
2.7 GB
最近下载:
2025-03-12
热度:
1295
[ DevCourseWeb.com ] Udemy - Cybersecurity and Kali Linux - Hands-on course by TechLatest
~Get Your Files Here !/7. Module 7 - Wireless Fortification Pentesting Mastery/2. Web App Pentesting Practical.mp4
636.4 MB
~Get Your Files Here !/10. Module 10 - Communicating Findings Reporting Mastery/2. Reporting Practical + Conclusion.mp4
283.4 MB
~Get Your Files Here !/6. Module 6 - Crack the Code Password Mastery/2. Password Cracking Practical.mp4
265.1 MB
~Get Your Files Here !/5. Module 5 - Hacking Mastery Strategic Exploitation/2. Exploitation Practical.mp4
222.1 MB
~Get Your Files Here !/9. Module 9 - Human Manipulation Social Engineering/2. Social Engineering Practical.mp4
198.1 MB
~Get Your Files Here !/8. Module 8 - Wireless Fortification Pentesting Mastery/2. Wireless Pentesting Practical.mp4
194.1 MB
~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/3. Social Media Reconnaissance.mp4
142.0 MB
~Get Your Files Here !/4. Module 4 - Infiltration Techniques Mastering Active Reconnaissance/2. Vulnerability Assessment.mp4
121.4 MB
~Get Your Files Here !/5. Module 5 - Hacking Mastery Strategic Exploitation/1. Exploitation Introduction.mp4
84.3 MB
~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/3. Microsoft Azure Guide..mp4
54.4 MB
~Get Your Files Here !/6. Module 6 - Crack the Code Password Mastery/1. Password Cracking Introduction.mp4
48.2 MB
~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/2. Google Cloud Platform(GCP) Guide..mp4
47.9 MB
~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/1. Amazon Web Services(AWS) Guide..mp4
46.0 MB
~Get Your Files Here !/4. Module 4 - Infiltration Techniques Mastering Active Reconnaissance/3. Scanning.mp4
44.9 MB
~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/4. Unveiling the Secrets of OS Fingerprinting in Cybersecurity with Kali Linux.mp4
44.7 MB
~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/5. Target Validation in Cybersecurity with Kali Linux.mp4
39.9 MB
~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/1. Reconnaissance — First Phase of Hacking.mp4
30.0 MB
~Get Your Files Here !/1. Module 1 - Course Introduction & Teaser/2. Course Introduction.mp4
28.4 MB
~Get Your Files Here !/8. Module 8 - Wireless Fortification Pentesting Mastery/1. Wireless Pentesting Introduction.mp4
24.5 MB
~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/6. Subdomain Discovery in Cybersecurity with Kali Linux.mp4
24.5 MB
[磁力链接]
添加时间:
2023-12-29
大小:
2.6 GB
最近下载:
2025-03-13
热度:
5470
MalTrak - Cybersecurity ATTACK & DEFENSE The Foundations
Module 01 - ATTACK/01 - Targeted Attack Real Scenario.mp4
423.3 MB
Module 01 - ATTACK/02 - Advanced Penetration Testing & Red Team Operations (Hands-On).mp4
362.7 MB
Bonus Module - Advanced Attacks/Fileless Attacks and Targeted Ransomware Attacks.mp4
339.9 MB
Module 02 - RESPOND/02 - Log Analysis With Splunk (Hands-On).mp4
255.3 MB
Module 03 - INVESTIGATE/05 - Behavioral and Code Analysis.mp4
242.3 MB
Module 02 - RESPOND/01 - Incident Response Process & Log Analysis.mp4
224.2 MB
Module 03 - INVESTIGATE/04 - Basic Static Analysis - PE Headers.mp4
215.0 MB
Module 02 - RESPOND/03 - Live Forensics and System Triage (Hands-On).mp4
212.1 MB
Module 03 - INVESTIGATE/01 - Malware Analysis Intro.mp4
124.1 MB
Module 03 - INVESTIGATE/03 - Basic Static Analysis (Hands-On).mp4
89.5 MB
Module 03 - INVESTIGATE/02 - Basic Static Analysis - Finding Clues in Text.mp4
67.8 MB
Module 01 - ATTACK/Resources/Module01 - Real Attack Scenario.pptx
5.6 MB
Module 03 - INVESTIGATE/Resources/Module03 - Malware Analysis.pptx
4.1 MB
Module 03 - INVESTIGATE/Resources/Module03 - Malware Analysis.pdf
3.0 MB
Module 03 - INVESTIGATE/Resources/iranian_apt_docx_with_macro.zip
2.7 MB
Module 01 - ATTACK/Resources/Module01 - Real Attack Scenario.pdf
2.6 MB
Module 02 - RESPOND/Resources/Module02 - Incident Response & Forensics.pptx
1.8 MB
Bonus Module - Advanced Attacks/Resources/Module04 - Fileless Attacks, Targeted Ransomware & Yara Rules.pptx
1.7 MB
Module 02 - RESPOND/Resources/drupal_webattack.log
1.4 MB
Bonus Module - Advanced Attacks/Resources/Module04 - Fileless Attacks, Targeted Ransomware & Yara Rules.pdf
1.2 MB
[磁力链接]
添加时间:
2023-12-18
大小:
2.6 GB
最近下载:
2024-12-31
热度:
123
[DesireCourse.Com] Udemy - A Hacker's Guide to Internet Safety and Cybersecurity
[DesireCourse.Com] Udemy - A Hacker's Guide to Internet Safety and Cybersecurity.zip
2.5 GB
[DesireCourse.Com].txt
828 Bytes
[DesireCourse.Com].url
51 Bytes
[磁力链接]
添加时间:
2018-08-02
大小:
2.5 GB
最近下载:
2025-03-11
热度:
1222
A Hacker's Guide to Internet Safety and Cybersecurity
TutsGalaxy.com.txt
41 Bytes
Torrent_downloaded_from_Demonoid_-_www.demonoid.pw_.txt
59 Bytes
Read Me.txt
80 Bytes
A Hacker's Guide to Internet Safety and Cybersecurity.zip
2.5 GB
[磁力链接]
添加时间:
2018-07-25
大小:
2.5 GB
最近下载:
2025-03-13
热度:
2384
[ DevCourseWeb.com ] Udemy - Cybersecurity Exam Fundamentals
~Get Your Files Here !/05 - Nmap/001 Video and Lab - Introduction to NMap.mp4
220.2 MB
~Get Your Files Here !/05 - Nmap/006 Video and lab - NMap Scripting Engine (NSE).mp4
209.4 MB
~Get Your Files Here !/08 - Privilege Escalation/003 Video and Lab - Windows Privilege Escalation Unquoted Service Path.mp4
134.3 MB
~Get Your Files Here !/07 - Reverse Shells and Persistant Connections/002 Video and Lab - Service Persistence.mp4
121.9 MB
~Get Your Files Here !/08 - Privilege Escalation/002 Video and Lab - Verify Windows Privilege Escalation Unquoted Service Path.mp4
117.8 MB
~Get Your Files Here !/07 - Reverse Shells and Persistant Connections/001 Video and Lab - Establish a Meterpreter Session with Windows 10 Pro.mp4
111.6 MB
~Get Your Files Here !/09 - OWASP top 10 Mitigations/003 Video and Lab - Identify Active Network Hosts and Services Using Nmap.mp4
99.0 MB
~Get Your Files Here !/02 - Virtual Lab Build/001 Video and Lab - Create a Virtual Install of Kali Linux.mp4
97.9 MB
~Get Your Files Here !/02 - Virtual Lab Build/002 Video and Lab - Creating a Virtual Install of Metasploitable2 Using VirtualBox.mp4
87.9 MB
~Get Your Files Here !/06 - 2.0 Information Gathering and Vulnerability Identification Labs/002 Video and Lab - Enumerating Windows 10 Using WinPEAS.mp4
75.0 MB
~Get Your Files Here !/03 - Documentation/005 Video and PPT - Pentesting Final Report.mp4
65.4 MB
~Get Your Files Here !/10 - Web Applications Penetration Testing/001 Video and Lab - Configuring BurpSuite as a Proxy.pdf.mp4
65.1 MB
~Get Your Files Here !/09 - OWASP top 10 Mitigations/001 Video and PPT - Overview of OWASP Top 10.mp4
62.5 MB
~Get Your Files Here !/05 - Nmap/007 Video - Analyzing NMap Results.mp4
61.0 MB
~Get Your Files Here !/05 - Nmap/003 Video - Nmap OS Detection.mp4
59.8 MB
~Get Your Files Here !/09 - OWASP top 10 Mitigations/004 Video and Lab - Perform a Vulnerability Scan Using OWASP Zed Attack Proxy.mp4
56.5 MB
~Get Your Files Here !/09 - OWASP top 10 Mitigations/002 Video and Lab - Spoof Fake TCPIP Packets Using Hping3.mp4
56.2 MB
~Get Your Files Here !/11 - Program Scripting/001 Video and Lab - Create a Windows Reverse Shell Using the PowerShell.mp4
55.9 MB
~Get Your Files Here !/07 - Reverse Shells and Persistant Connections/003 Video and Lab - Create a Windows Reverse Shell Using PowerShell.mp4
55.9 MB
~Get Your Files Here !/06 - 2.0 Information Gathering and Vulnerability Identification Labs/001 Video and lab - Using Banner Grabbing to Aid in Reconnaissance.mp4
55.8 MB
[磁力链接]
添加时间:
2024-01-01
大小:
2.5 GB
最近下载:
2025-03-09
热度:
1398
Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/6. Azure Security Benchmark - Microsoft Certified Cybersecurity-1.mp4
113.5 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/2. Hybrid Environmental Security Strategies - Microsoft Certifi.mp4
63.8 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/1. Specify Priorities for Mitigating Threats to Apps - Microsof-1.mp4
62.3 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/6. Designing a Regulatory Compliance Strategy/4. Implementing Azure Policy - Microsoft Certified Cybersecurit.mp4
59.0 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/7. Evaluating and Managing Security Postures/6. Mitigating Identified Risks - Microsoft Certified Cybersecur-1.mp4
53.6 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/4. Traffic Filtering and Segmentation Strategies - Microsoft Ce-1.mp4
53.4 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/4. Priorities For Mitigating Threats To Data - Microsoft Certif-1.mp4
53.4 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/5. Azure Best Practices for Network Security - Microsoft Certif-1.mp4
52.2 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/5. Hybrid Infrastructure - Microsoft Certified Cybersecurity Ar-1.mp4
50.4 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/6. Designing a Regulatory Compliance Strategy/6. Translating Privacy Requirements - Microsoft Certified Cyber.mp4
49.7 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/9. Designing a Strategy for Securing SaaS, PaaS, and IaaS Services/1. Security Baselines for SaaS, PaaS, and IaaS services - Micro.mp4
48.3 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/3. Translating Business Goals into Security Requirements - Micr.mp4
47.9 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/7. Securing Privileged Access Using RaMP - Microsoft Certified -1.mp4
47.8 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/2. Security Operations - Microsoft Certified Cybersecurity Arch-1.mp4
47.0 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/4. Designing a Security Operations Strategy/5. SIEMSOAR Strategy - Microsoft Certified Cybersecurity Archit.mp4
46.3 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/2. Translating Requirements - Microsoft Certified Cybersecurity.mp4
46.2 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/3. Security Strategy for Applications and APIs - Microsoft Cert-1.mp4
44.6 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/5. Designing an Identity Security Strategy/1. Strategy for Access to Cloud Resources - Microsoft Certified.mp4
43.0 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/7. Evaluating and Managing Security Postures/4. Designing Security for an Azure Landing Zone - Microsoft Cer.mp4
42.8 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/4. Designing a Security Operations Strategy/3. Logging and Auditing Strategy - Microsoft Certified Cybersec.mp4
42.3 MB
[磁力链接]
添加时间:
2023-12-24
大小:
2.5 GB
最近下载:
2025-03-13
热度:
9065
Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/6. Azure Security Benchmark - Microsoft Certified Cybersecurity-1.mp4
113.5 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/2. Hybrid Environmental Security Strategies - Microsoft Certifi.mp4
63.8 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/1. Specify Priorities for Mitigating Threats to Apps - Microsof-1.mp4
62.3 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/6. Designing a Regulatory Compliance Strategy/4. Implementing Azure Policy - Microsoft Certified Cybersecurit.mp4
59.0 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/7. Evaluating and Managing Security Postures/6. Mitigating Identified Risks - Microsoft Certified Cybersecur-1.mp4
53.6 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/4. Traffic Filtering and Segmentation Strategies - Microsoft Ce-1.mp4
53.4 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/4. Priorities For Mitigating Threats To Data - Microsoft Certif-1.mp4
53.4 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/3. Designing Security Strategies/5. Azure Best Practices for Network Security - Microsoft Certif-1.mp4
52.2 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/5. Hybrid Infrastructure - Microsoft Certified Cybersecurity Ar-1.mp4
50.4 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/6. Designing a Regulatory Compliance Strategy/6. Translating Privacy Requirements - Microsoft Certified Cyber.mp4
49.7 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/9. Designing a Strategy for Securing SaaS, PaaS, and IaaS Services/1. Security Baselines for SaaS, PaaS, and IaaS services - Micro.mp4
48.3 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/3. Translating Business Goals into Security Requirements - Micr.mp4
47.9 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/7. Securing Privileged Access Using RaMP - Microsoft Certified -1.mp4
47.8 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/2. Security Operations - Microsoft Certified Cybersecurity Arch-1.mp4
47.0 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/4. Designing a Security Operations Strategy/5. SIEMSOAR Strategy - Microsoft Certified Cybersecurity Archit.mp4
46.3 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/2. Translating Security Requirements/2. Translating Requirements - Microsoft Certified Cybersecurity.mp4
46.2 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/10. Design a security strategy for data and applications/3. Security Strategy for Applications and APIs - Microsoft Cert-1.mp4
44.6 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/5. Designing an Identity Security Strategy/1. Strategy for Access to Cloud Resources - Microsoft Certified.mp4
43.0 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/7. Evaluating and Managing Security Postures/4. Designing Security for an Azure Landing Zone - Microsoft Cer.mp4
42.8 MB
[TutsNode.net] - Microsoft Certified Cybersecurity Architect Expert - SC-100 - Microsoft Certification Training/4. Designing a Security Operations Strategy/3. Logging and Auditing Strategy - Microsoft Certified Cybersec.mp4
42.3 MB
[磁力链接]
添加时间:
2024-07-04
大小:
2.5 GB
最近下载:
2025-03-13
热度:
745
CBTNuggets - Microsoft Certified Cybersecurity Architect Expert (SC-100) Online Training 2023-2
2. Translating Security Requirements/6. Azure Security Benchmark - Microsoft Certified Cybersecurity-1.mp4
113.5 MB
3. Designing Security Strategies/2. Hybrid Environmental Security Strategies - Microsoft Certifi.mp4
63.8 MB
10. Design a security strategy for data and applications/1. Specify Priorities for Mitigating Threats to Apps - Microsof-1.mp4
62.3 MB
6. Designing a Regulatory Compliance Strategy/4. Implementing Azure Policy - Microsoft Certified Cybersecurit.mp4
59.0 MB
7. Evaluating and Managing Security Postures/6. Mitigating Identified Risks - Microsoft Certified Cybersecur-1.mp4
53.6 MB
3. Designing Security Strategies/4. Traffic Filtering and Segmentation Strategies - Microsoft Ce-1.mp4
53.4 MB
10. Design a security strategy for data and applications/4. Priorities For Mitigating Threats To Data - Microsoft Certif-1.mp4
53.4 MB
3. Designing Security Strategies/5. Azure Best Practices for Network Security - Microsoft Certif-1.mp4
52.2 MB
1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/5. Hybrid Infrastructure - Microsoft Certified Cybersecurity Ar-1.mp4
50.4 MB
6. Designing a Regulatory Compliance Strategy/6. Translating Privacy Requirements - Microsoft Certified Cyber.mp4
49.7 MB
9. Designing a Strategy for Securing SaaS, PaaS, and IaaS Services/1. Security Baselines for SaaS, PaaS, and IaaS services - Micro.mp4
48.3 MB
2. Translating Security Requirements/3. Translating Business Goals into Security Requirements - Micr.mp4
47.9 MB
2. Translating Security Requirements/7. Securing Privileged Access Using RaMP - Microsoft Certified -1.mp4
47.8 MB
1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/2. Security Operations - Microsoft Certified Cybersecurity Arch-1.mp4
47.0 MB
4. Designing a Security Operations Strategy/5. SIEMSOAR Strategy - Microsoft Certified Cybersecurity Archit.mp4
46.3 MB
2. Translating Security Requirements/2. Translating Requirements - Microsoft Certified Cybersecurity.mp4
46.2 MB
10. Design a security strategy for data and applications/3. Security Strategy for Applications and APIs - Microsoft Cert-1.mp4
44.6 MB
5. Designing an Identity Security Strategy/1. Strategy for Access to Cloud Resources - Microsoft Certified.mp4
43.0 MB
7. Evaluating and Managing Security Postures/4. Designing Security for an Azure Landing Zone - Microsoft Cer.mp4
42.8 MB
4. Designing a Security Operations Strategy/3. Logging and Auditing Strategy - Microsoft Certified Cybersec.mp4
42.3 MB
[磁力链接]
添加时间:
2025-02-15
大小:
2.5 GB
最近下载:
2025-03-14
热度:
84
Cybersecurity Architecture Fundamentals
Chapter 1 Introduction/006. Security Principles and Approaches.mp4
272.7 MB
Chapter 1 Introduction/003. The Problem with Security Today.mp4
236.8 MB
Chapter 1 Introduction/009. Understanding Residual Risk.mp4
120.0 MB
Chapter 4 Cyber Architecture for Enterprise Security/006. Vulnerability, Patch, and Availability Management.mp4
102.8 MB
Chapter 1 Introduction/008. Risk Management.mp4
99.6 MB
Chapter 1 Introduction/005. Who Is a Security Architect.mp4
98.0 MB
Chapter 2 Threat Modelling/006. PASTA.mp4
94.3 MB
Chapter 4 Cyber Architecture for Enterprise Security/001. Network Security.mp4
80.3 MB
Chapter 6 Case Study/001. Case Study Preview.mp4
78.0 MB
Chapter 2 Threat Modelling/002. Threat Modelling Versus Risk Assessment.mp4
75.6 MB
Chapter 2 Threat Modelling/001. Threat Modelling - Part 1.mp4
70.2 MB
Chapter 2 Threat Modelling/009. Attack Trees.mp4
68.7 MB
Chapter 4 Cyber Architecture for Enterprise Security/005. Data Protection.mp4
56.7 MB
Chapter 5 Designing for Security/003. Reference Security Architectures.mp4
52.0 MB
Chapter 2 Threat Modelling/003. Threat Modelling - Part 2.mp4
50.8 MB
Chapter 3 Enterprise Architecture Frameworks/003. Zachman Framework.mp4
44.9 MB
Chapter 5 Designing for Security/002. Security Design Pattern Example.mp4
44.6 MB
Chapter 1 Introduction/004. Introduction to Security Architecture.mp4
42.6 MB
Chapter 5 Designing for Security/001. Security Design Patterns.mp4
41.8 MB
Chapter 3 Enterprise Architecture Frameworks/004. SABSA Framework.mp4
37.0 MB
[磁力链接]
添加时间:
2023-12-26
大小:
2.4 GB
最近下载:
2025-03-14
热度:
5935
[ FreeCourseWeb.com ] Udemy - Cybersecurity Foundation
~Get Your Files Here !/6. Continuous Risk Awareness and Monitoring/2. Malware Attacks and Defenses.mp4
328.2 MB
~Get Your Files Here !/4. Identify and Access Management & Data Security/3. User Identification, Authentication, and Session Protection.mp4
259.5 MB
~Get Your Files Here !/6. Continuous Risk Awareness and Monitoring/1. Risk Management.mp4
235.0 MB
~Get Your Files Here !/8. Cloud Platforms and Data Management/1. Cloud Computing.mp4
228.7 MB
~Get Your Files Here !/7. Cyber Hygiene/1. Cyber Hygiene.mp4
179.6 MB
~Get Your Files Here !/4. Identify and Access Management & Data Security/1. Business, Governance.mp4
166.2 MB
~Get Your Files Here !/5. Data and Information Lifecycle Process/2. Data and Information Lifecycle Process - Part 2.mp4
159.0 MB
~Get Your Files Here !/5. Data and Information Lifecycle Process/1. Data and Information Lifecycle Process - Part 1.mp4
158.9 MB
~Get Your Files Here !/4. Identify and Access Management & Data Security/4. Access Control Authorization Systems.mp4
143.3 MB
~Get Your Files Here !/8. Cloud Platforms and Data Management/2. Leveraging the Cloud for Business and Traffic Light Protocol.mp4
133.7 MB
~Get Your Files Here !/4. Identify and Access Management & Data Security/2. Access control concepts.mp4
116.0 MB
~Get Your Files Here !/2. Confidentiality, Integrity, and Availability (CIA)/1. Confidentiality, Integrity, and Availability (CIA).mp4
83.3 MB
~Get Your Files Here !/9. Summary/1. Summary.mp4
65.3 MB
~Get Your Files Here !/3. Information security and Cybersecurity Definitions/1. Information security and Cybersecurity Definitions.mp4
60.1 MB
~Get Your Files Here !/1. Introduction/1. Introduction.mp4
8.7 MB
~Get Your Files Here !/2. Data and Information Lifecycle Process - Part 2.jpeg
197.8 kB
~Get Your Files Here !/Bonus Resources.txt
357 Bytes
Get Bonus Downloads Here.url
183 Bytes
[磁力链接]
添加时间:
2022-01-09
大小:
2.3 GB
最近下载:
2025-03-11
热度:
1251
[ DevCourseWeb.com ] Udemy - Modern Cybersecurity Fundamentals
~Get Your Files Here !/2. History of Cybersecurity/1. History of Cybersecurity.mp4
478.1 MB
~Get Your Files Here !/3. Cybersecurity Risk Management/1. Cybersecurity Risk Management.mp4
265.3 MB
~Get Your Files Here !/13. The Future of Cybersecurity/1. The Future of Cybersecurity.mp4
186.8 MB
~Get Your Files Here !/7. Understanding Networks Part 3/1. Understanding Networks Part 3.mp4
176.6 MB
~Get Your Files Here !/11. Ransomware/1. Ransomware.mp4
159.6 MB
~Get Your Files Here !/8. Understanding Networks Part 4/1. Understanding Networks Part 4.mp4
158.3 MB
~Get Your Files Here !/12. Internet of Things (IoT)/1. Internet of Things (IoT).mp4
154.5 MB
~Get Your Files Here !/9. Domain Name System (DNS)/1. Domain Name System (DNS).mp4
145.9 MB
~Get Your Files Here !/5. Understanding Networks Part 1/1. Understanding Networks Part 1.mp4
137.5 MB
~Get Your Files Here !/4. Intrusion Detection/1. Intrusion Detection.mp4
136.3 MB
~Get Your Files Here !/6. Understanding Networks Part 2/1. Understanding Networks Part 2.mp4
126.6 MB
~Get Your Files Here !/10. Dynamic Host Configuration Protocol (DHCP)/1. Dynamic Host Configuration Protocol (DHCP).mp4
112.7 MB
~Get Your Files Here !/1. Introduction/1. Introduction.mp4
28.1 MB
~Get Your Files Here !/5. Understanding Networks Part 1/1.1 Understanding-Networks.pdf
3.5 MB
~Get Your Files Here !/6. Understanding Networks Part 2/1.1 Understanding-Networks.pdf
3.5 MB
~Get Your Files Here !/7. Understanding Networks Part 3/1.1 Understanding-Networks.pdf
3.5 MB
~Get Your Files Here !/8. Understanding Networks Part 4/1.1 Understanding-Networks.pdf
3.5 MB
~Get Your Files Here !/3. Cybersecurity Risk Management/1.1 Cybersecurity-Risk-Management.pdf
1.8 MB
~Get Your Files Here !/12. Internet of Things (IoT)/1.1 IoT.pdf
1.8 MB
~Get Your Files Here !/2. History of Cybersecurity/1.1 HISTORY-OF-CYBERSECURITY.pdf
1.7 MB
[磁力链接]
添加时间:
2023-12-17
大小:
2.3 GB
最近下载:
2025-03-12
热度:
1895
[ FreeCourseWeb.com ] Udemy - Cybersecurity Habits Masterclass
~Get Your Files Here !/3. Skepticism/4. Slow Down And Frown.mp4
73.5 MB
~Get Your Files Here !/11. Conclusion/1. Well Awareiors.mp4
71.5 MB
~Get Your Files Here !/1. Introduction/1. Introduction.mp4
67.0 MB
~Get Your Files Here !/4. Vigilance/2. The Only Thing We Have To Fear.mp4
66.7 MB
~Get Your Files Here !/4. Vigilance/1. The Face Of The Enemy.mp4
66.5 MB
~Get Your Files Here !/5. Secrecy/2. Making It Personal.mp4
65.7 MB
~Get Your Files Here !/2. Literacy/5. Habits And Recipes.mp4
64.7 MB
~Get Your Files Here !/3. Skepticism/1. Zero Trust.mp4
64.5 MB
~Get Your Files Here !/8. Community/4. Habits And Recipes.mp4
57.4 MB
~Get Your Files Here !/8. Community/1. United We Stand.mp4
54.0 MB
~Get Your Files Here !/7. Diligence/3. Random Acts of Security.mp4
53.4 MB
~Get Your Files Here !/7. Diligence/2. Journaling.mp4
53.4 MB
~Get Your Files Here !/9. Mirroring/5. Habits And Recipes.mp4
52.0 MB
~Get Your Files Here !/6. Culture/1. Culture Eats Cybersecurity For Breakfast.mp4
51.4 MB
~Get Your Files Here !/10. Deception/1. Know Thy Enemy.mp4
49.4 MB
~Get Your Files Here !/9. Mirroring/3. Blindspots.mp4
49.1 MB
~Get Your Files Here !/3. Skepticism/2. The Pygmailion Effect.mp4
48.9 MB
~Get Your Files Here !/6. Culture/5. Habits And Recipes.mp4
48.0 MB
~Get Your Files Here !/2. Literacy/1. Fearless Learning.mp4
47.9 MB
~Get Your Files Here !/6. Culture/2. The Hermit Crab Shell.mp4
46.7 MB
[磁力链接]
添加时间:
2022-04-10
大小:
2.1 GB
最近下载:
2025-03-12
热度:
1307
[ DevCourseWeb.com ] CBTNuggets - (ISC)2 CC - Certified in Cybersecurity - (ISC)2 Certification Training
~Get Your Files Here !/1. Understanding Information Assurance/1. Understanding Information Assurance - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
69.9 MB
~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/1. Power - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
65.3 MB
~Get Your Files Here !/7. Discussing Network Security Infrastructure/1. Network Segmentation - (ISC)² CC – Certified in Cybersecurity CBT Nuggets-1.mp4
58.2 MB
~Get Your Files Here !/8. Exploring Network Threats and Attacks/6. Firewalls - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
54.7 MB
~Get Your Files Here !/8. Exploring Network Threats and Attacks/3. Intrusion Detection Prevention Systems (IDSIPS) - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
54.0 MB
~Get Your Files Here !/5. Exploring Security Policies and Training/7. Security Awareness Training - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
52.0 MB
~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/3. Heating, Ventilation and Air Conditioning (HVAC) - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
48.1 MB
~Get Your Files Here !/9. Understanding Computer Networking/4. IP Addresses - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
47.5 MB
~Get Your Files Here !/6. Understanding Data Security and System Hardening/2. Types of Encryption - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
46.4 MB
~Get Your Files Here !/7. Discussing Network Security Infrastructure/7. The Cloud - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
45.7 MB
~Get Your Files Here !/8. Exploring Network Threats and Attacks/5. Vulnerability Scanning - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
45.5 MB
~Get Your Files Here !/9. Understanding Computer Networking/3. TCPIP Model - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
42.9 MB
~Get Your Files Here !/6. Understanding Data Security and System Hardening/7. Configuration Management - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
41.6 MB
~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/2. Data Centers and Closets - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
40.4 MB
~Get Your Files Here !/1. Understanding Information Assurance/2. Methods of Authentication - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
40.0 MB
~Get Your Files Here !/2. Discussing Risk Management, Controls, Ethics and Governance/4. Security Control Categories - (ISC)² CC – Certified in Cybersecurity CBT Nuggets-1.mp4
39.3 MB
~Get Your Files Here !/6. Understanding Data Security and System Hardening/3. Data Hashing with Encryption - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
38.3 MB
~Get Your Files Here !/10. Exploring On-Premise Network Infrastructure/5. Redundancy - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
38.2 MB
~Get Your Files Here !/3. Exploring BC, DR & IR Concepts/6. Incident Response - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
37.9 MB
~Get Your Files Here !/4. Reviewing Access Control Concepts/6. Types of Access Control - (ISC)² CC – Certified in Cybersecurity CBT Nuggets.mp4
36.8 MB
[磁力链接]
添加时间:
2023-12-17
大小:
2.1 GB
最近下载:
2025-03-13
热度:
5544
[ WebToolTip.com ] Udemy - Essential Cybersecurity For Everyone - Stay Safe Online
~Get Your Files Here !/4 - Creating Strong Passwords and Enhancing Overall Security/9 - Password Security.mp4
250.4 MB
~Get Your Files Here !/11 - IoT Security/16 - Securing Smart Devices in the Digital Age.mp4
235.4 MB
~Get Your Files Here !/7 - Data Backup and Recovery Essentials/12 - Safeguarding Your Data Backup and Restoration.mp4
209.9 MB
~Get Your Files Here !/9 - Cybersecurity for Travelers/14 - Staying Secure While Traveling Online.mp4
191.8 MB
~Get Your Files Here !/6 - Email Security Essentials/11 - Protecting Your Email from Threats.mp4
175.4 MB
~Get Your Files Here !/10 - Social Media Security/15 - Protecting Your Privacy on Social Media.mp4
172.2 MB
~Get Your Files Here !/5 - Safe Internet Browsing/10 - Safe Internet Browsing.mp4
126.9 MB
~Get Your Files Here !/12 - Steps to Take After a Cybersecurity Breach/17 - What to Do After a Cybersecurity Breach.mp4
116.9 MB
~Get Your Files Here !/1 - Introduction Essential Cybersecurity for everyone stay safe online/1 - Introduction.mp4
107.3 MB
~Get Your Files Here !/2 - Understanding Cyber Threats/2 - Understanding Cyber threats.mp4
98.9 MB
~Get Your Files Here !/8 - Securing Your Online Accounts/13 - Best Practices for Protecting Online Accounts.mp4
94.5 MB
~Get Your Files Here !/3 - Protecting Personal Devices/3 - Introduction to protecting personal devices.mp4
76.2 MB
~Get Your Files Here !/3 - Protecting Personal Devices/6 - Keeping Software Operating Systems Updated Strengthening Your Digital Defense.mp4
58.9 MB
~Get Your Files Here !/3 - Protecting Personal Devices/4 - Securing Computers and Laptops.mp4
43.3 MB
~Get Your Files Here !/3 - Protecting Personal Devices/7 - Configuring Firewalls Securing Your Devices and Home Network.mp4
36.6 MB
~Get Your Files Here !/3 - Protecting Personal Devices/5 - Securing Smartphones and Laptops.mp4
30.1 MB
~Get Your Files Here !/3 - Protecting Personal Devices/8 - Ensuring Safe and Secure WiFi Connections.mp4
27.5 MB
Get Bonus Downloads Here.url
180 Bytes
~Get Your Files Here !/Bonus Resources.txt
70 Bytes
[磁力链接]
添加时间:
2025-03-13
大小:
2.1 GB
最近下载:
2025-03-13
热度:
2
[ DevCourseWeb.com ] Udemy - Selection and Implementation of Cybersecurity Risks Controls
~Get Your Files Here !/2. SECTION-2/8. 19- The role of governance in the effective selection and implementation of cybe.mp4
142.9 MB
~Get Your Files Here !/2. SECTION-2/14. 23-Selecting and implementing
cybersecurity
controls based on NIST CSF PT2.mp4
122.4 MB
~Get Your Files Here !/2. SECTION-2/16. 25- Measuring the effectiveness of implemented controls.mp4
117.4 MB
~Get Your Files Here !/2. SECTION-2/17. Putting it all together-The Selection and Implementation of Cyber Risks controls.mp4
115.7 MB
~Get Your Files Here !/1. Introduction/10. 9-Key considerations for the identification- selection & implementation of contr.mp4
101.8 MB
~Get Your Files Here !/1. Introduction/7. 6-Approach to Control Selection_ pt2.mp4
94.1 MB
~Get Your Files Here !/2. SECTION-2/9. 20-Why not implement frameworks that already have recommended controls.mp4
90.3 MB
~Get Your Files Here !/2. SECTION-2/15. 24-Implementation Plan for selected controls.mp4
87.1 MB
~Get Your Files Here !/2. SECTION-2/11. 21-Challenges, & considerations associated with implementing frameworks-pt2.mp4
82.9 MB
~Get Your Files Here !/1. Introduction/11. 10-Risk Assessment-BIA, Control Selection, Cost Benefit Analysis.mp4
81.1 MB
~Get Your Files Here !/1. Introduction/9. 8-Introduction to security controls.mp4
77.4 MB
~Get Your Files Here !/2. SECTION-2/7. 18-Documenting Cybersecurity Risk Assessment Report-Pt2.mp4
75.5 MB
~Get Your Files Here !/2. SECTION-2/5. 17-Determine likelihood, Impact, Calculate risk.mp4
72.4 MB
~Get Your Files Here !/2. SECTION-2/13. 23-Selecting and implementing
cybersecurity
controls based on NIST CSF PT1.mp4
62.9 MB
~Get Your Files Here !/1. Introduction/12. 11-Cost Benefit Analysis associated with controls selection.mp4
58.3 MB
~Get Your Files Here !/2. SECTION-2/3. 15-Steps involved in assessing the identified cyber risks in web server.mp4
55.0 MB
~Get Your Files Here !/2. SECTION-2/1. 14-High-level process of selecting controls to protect ecommerce web server-Pt1.mp4
54.5 MB
~Get Your Files Here !/1. Introduction/14. 13-Regulatory Compliance, Incident Response Planning.mp4
53.9 MB
~Get Your Files Here !/1. Introduction/13. 12- Technology integration, operational impact, continuous monitoring, employee.mp4
52.8 MB
~Get Your Files Here !/2. SECTION-2/6. 18- Documenting Cybersecurity Risk Assessment Report-Pt1.mp4
50.4 MB
[磁力链接]
添加时间:
2024-01-05
大小:
2.0 GB
最近下载:
2025-03-13
热度:
2396
Palo Alto Networks Cybersecurity Fundamentals (PCCSA)
Chapter 1 Cybersecurity Fundamentals and Threat Landscape/002. Identify Computing and Networking Trends.mp4
118.2 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/006. Identify Networking Security Technologies.mp4
114.7 MB
Chapter 1 Cybersecurity Fundamentals and Threat Landscape/003. Describe Cybersecurity Threats.mp4
108.3 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/004. Review Network Addressing.mp4
105.2 MB
Chapter 1 Cybersecurity Fundamentals and Threat Landscape/005. Identify Wi-Fi Vulnerabilities and Attacks.mp4
100.1 MB
Chapter 1 Cybersecurity Fundamentals and Threat Landscape/004. Describe Common Cyberattack Techniques.mp4
96.3 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/011. Endpoint Security.mp4
95.3 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/002. Describe Routing Protocols.mp4
91.8 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/001. Identify Basic Internet and Network Operations.mp4
90.7 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/012. Server and System Administration.mp4
90.3 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/003. Review Networking Models.mp4
88.4 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/009. Learn Basic Virtualization Security Concepts.mp4
83.8 MB
Chapter 3 Palo Alto Networks Security Solutions and Technologies/007. Describe Cortex XSOAR and AutoFocus.mp4
79.5 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/008. Learn Basic Cloud Security Concepts.mp4
75.4 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/010. Learn Basic DevOps Security Concepts.mp4
75.3 MB
Chapter 3 Palo Alto Networks Security Solutions and Technologies/001. Identify Palo Alto Networks Security Solutions.mp4
74.3 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/005. Learn Networking Security Models.mp4
72.6 MB
Chapter 3 Palo Alto Networks Security Solutions and Technologies/002. Describe Basic NGFW Components and Functions.mp4
67.1 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/007. Learn Basic Data Center Security Concepts.mp4
60.2 MB
Chapter 3 Palo Alto Networks Security Solutions and Technologies/003. Learn Basic Prisma Cloud.mp4
59.7 MB
[磁力链接]
添加时间:
2024-02-29
大小:
2.0 GB
最近下载:
2025-03-12
热度:
4722
[ CourseWikia.com ] Udemy - Fundamentals of OT Cybersecurity (ICS - SCADA).zip
[ CourseWikia.com ] Udemy - Fundamentals of OT Cybersecurity (ICS - SCADA).zip
2.0 GB
[磁力链接]
添加时间:
2021-03-09
大小:
2.0 GB
最近下载:
2025-03-12
热度:
1142
Coursera - Cybersecurity Operations Fundamentals Specialization 2024
Coursera - Security Operations Center (SOC) 2024-1/01_introduction-to-security-operations-center/03_soc-environment-today/01_soc-environment-today.mp4
32.8 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/04_linux-file-system-overview/01_linux-file-system-overview.mp4
26.4 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/15_linux-command-shell-concepts/01_linux-command-shell-concepts.mp4
25.9 MB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/16_controlling-services-and-processes/01_controlling-services-and-processes.mp4
22.4 MB
Coursera - Data Security 2024-1/01_exploring-data-type-categories/08_packet-capture-using-tcpdump/01_packet-capture-using-tcpdump.mp4
19.3 MB
Coursera - Security Operations Center (SOC) 2024-1/04_staffing-an-effective-soc-team/03_interaction-of-different-roles-within-the-soc/02_interaction-of-various-roles-within-the-soc.mp4
18.9 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/21_viewing-running-network-services/01_viewing-running-network-services.mp4
18.0 MB
Coursera - Security Operations Center (SOC) 2024-1/03_soc-deployment-models-and-types/02_soc-types-and-staffing-considerations/02_soc-types-and-staffing-considerations.mp4
17.8 MB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/20_windows-netstat-command/01_windows-netstat-command.mp4
17.7 MB
Coursera - Network Security 2024-1/02_understanding-common-tcp-ip-attacks/04_ip-vulnerabilities/02_ip-vulnerabilities.mp4
16.6 MB
Coursera - Endpoints and Systems 2024-1/03_understanding-endpoint-security-technologies/02_host-based-personal-firewall/01_host-based-personal-firewall.mp4
16.3 MB
Coursera - Security Operations Center (SOC) 2024-1/03_soc-deployment-models-and-types/03_soc-models-and-their-consumers/02_soc-models-and-their-consumers.mp4
16.1 MB
Coursera - Endpoints and Systems 2024-1/02_understanding-linux-operating-system-basics/13_system-processes/01_system-processes.mp4
15.9 MB
Coursera - Security Operations Center (SOC) 2024-1/06_developing-key-relationships-with-internal-and-external-stakeholders/03_external-stakeholders/02_external-stakeholders.mp4
15.3 MB
Coursera - Security Operations Center (SOC) 2024-1/01_introduction-to-security-operations-center/04_goal-of-a-soc/01_goal-of-a-soc.mp4
15.0 MB
Coursera - Threat Analysis 2024-1/02_identifying-common-attack-vectors/05_http-operations/02_http-operations.mp4
14.5 MB
Coursera - Threat Analysis 2024-1/03_identifying-malicious-activity/16_netflow-as-a-security-tool/01_netflow-as-a-security-tool.mp4
14.5 MB
Coursera - Endpoints and Systems 2024-1/01_understanding-windows-operating-system-basics/08_windows-file-system-structure/01_windows-file-system-structure.mp4
14.3 MB
Coursera - Security Operations Center (SOC) 2024-1/05_security-events-data-and-soc-analyst-tools/02_soc-relevant-data-and-security-event-data/01_soc-relevant-data-and-security-event-data-introduction.mp4
14.0 MB
Coursera - Security Operations Center (SOC) 2024-1/06_developing-key-relationships-with-internal-and-external-stakeholders/02_internal-stakeholders/02_internal-stakeholders.mp4
13.7 MB
[磁力链接]
添加时间:
2024-06-03
大小:
2.0 GB
最近下载:
2025-03-13
热度:
569
Cybersecurity and Ethical Hacking bundle
Hacking 3 Books in 1.mp3
550.5 MB
Hacking! 3 Books in 1 A Guide to Ethical Hacking, Penetration Testing and Wireless Penetration with Kali Linux.mp3
412.3 MB
Cybersecurity Bible Security Threats, Frameworks, Cryptography & Network Security 4 Books in 1.mp3
411.1 MB
Deep Web The Complete Guide to the Dark Net, with Tor, Kali Linux, and Bitcoin.mp3
277.5 MB
Cybersecurity and Ethical Hacking Playbook A Comprehensive Guide to Protect Your Family and Business from Cybercrime. Includes H.mp3
255.8 MB
Hacking.torrent
19.1 kB
[磁力链接]
添加时间:
2021-03-26
大小:
1.9 GB
最近下载:
2025-03-14
热度:
4762
共14页
上一页
1
2
3
4
5
6
7
8
下一页