搜索
为您找到约
290
个磁力链接/BT种子,耗时 0 毫秒。
排序:
相关程度
热度
文件大小
添加时间
最近访问
[ DevCourseWeb.com ] Udemy - MS Cybersecurity Pro Track - Enterprise Security Fundamentals.zip
[ DevCourseWeb.com ] Udemy - MS Cybersecurity Pro Track - Enterprise Security Fundamentals.zip
963.9 MB
[磁力链接]
添加时间:
2022-01-13
大小:
963.9 MB
最近下载:
2024-10-02
热度:
174
[ DevCourseWeb.com ] Udemy - Intro To Cybersecurity In Healthcare (2 Of 2),Plain and Simple
~Get Your Files Here !/3 - Ransomware and Cryptocurrency.mp4
309.9 MB
~Get Your Files Here !/7 - Testing Your Vulnerabilities.mp4
150.2 MB
~Get Your Files Here !/2 - Malware.mp4
136.5 MB
~Get Your Files Here !/5 - Boston Childrens Hack The Response.mp4
123.0 MB
~Get Your Files Here !/8 - HIPAA.mp4
70.3 MB
~Get Your Files Here !/4 - Boston Childrens Hack The Issue.mp4
52.4 MB
~Get Your Files Here !/6 - Boston Childrens Hack Lessons Learned.mp4
50.7 MB
~Get Your Files Here !/1 - Introduction.mp4
49.6 MB
~Get Your Files Here !/9 - Conclusions.mp4
10.9 MB
~Get Your Files Here !/3 - Ransomware and Cryptocurrency English.vtt
24.5 kB
~Get Your Files Here !/7 - Testing Your Vulnerabilities English.vtt
12.5 kB
~Get Your Files Here !/13 - IN THE NEWS Some Straight Talk on Ransomware in Health Care.html
11.3 kB
~Get Your Files Here !/2 - Malware English.vtt
10.7 kB
~Get Your Files Here !/5 - Boston Childrens Hack The Response English.vtt
10.1 kB
~Get Your Files Here !/8 - HIPAA English.vtt
5.9 kB
~Get Your Files Here !/12 - IN THE NEWS.html
5.8 kB
~Get Your Files Here !/6 - Boston Childrens Hack Lessons Learned English.vtt
4.6 kB
~Get Your Files Here !/1 - Introduction English.vtt
4.5 kB
~Get Your Files Here !/4 - Boston Childrens Hack The Issue English.vtt
4.3 kB
~Get Your Files Here !/10 - IN THE NEWS Cyberattacks hit midsize hospitals hardest.html
4.2 kB
[磁力链接]
添加时间:
2024-02-03
大小:
953.6 MB
最近下载:
2024-12-03
热度:
867
[Coursera] Advanced Python Scripting for Cybersecurity Specialization - 3 course series
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_04_detecting-ssh-brute-force-with-scapy.mp4
49.7 MB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_07_connection-hijacking-with-scapy.mp4
48.4 MB
python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_02_generating-password-variations-with-python.mp4
46.5 MB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_05_service-detection-with-python.mp4
45.6 MB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_05_feature-selection-for-traffic-analysis.mp4
45.2 MB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_03_searching-the-registry-with-python.mp4
45.2 MB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_02_querying-shodan-with-python.mp4
44.0 MB
establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_02_traffic-analysis-with-python.mp4
43.7 MB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_04_network-scanning-with-scapy.mp4
38.8 MB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_02_brute-force-detection-with-windows-events.mp4
38.8 MB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_03_detecting-ftp-brute-force-with-scapy.mp4
35.1 MB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_04_searching-the-system-with-python.mp4
34.9 MB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_02_dumping-chrome-credentials-with-python.mp4
34.8 MB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_06_analyzing-passwords-with-python.mp4
34.5 MB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_03_dns-queries-with-python.mp4
30.9 MB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_06_detecting-anomalous-network-traffic-with-scapy.mp4
28.8 MB
establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_05_building-c2-packets-with-python.mp4
27.1 MB
python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_04_automating-brute-force.mp4
25.9 MB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_05_cracking-the-linux-passwords-with-python.mp4
24.4 MB
establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_04_detecting-encodings-with-python.mp4
24.1 MB
[磁力链接]
添加时间:
2024-05-24
大小:
947.7 MB
最近下载:
2024-12-04
热度:
3231
[ FreeCourseWeb.com ] Udemy - The Complete Cybersecurity with Cloud Computing.zip
[ FreeCourseWeb.com ] Udemy - The Complete Cybersecurity with Cloud Computing.zip
911.6 MB
[磁力链接]
添加时间:
2021-03-28
大小:
911.6 MB
最近下载:
2024-11-23
热度:
449
[ CourseLala.com ] Linkedin - IT and Cybersecurity Risk Management Essential Training
~Get Your Files Here !/4. IT Risk Management in Practice/019. IT risk management techniques.mp4
60.9 MB
~Get Your Files Here !/3. IT Risk Management in Context/009. IT risk management in medium companies.mp4
58.5 MB
~Get Your Files Here !/3. IT Risk Management in Context/010. IT risk management in large companies.mp4
57.2 MB
~Get Your Files Here !/5. IT Risk Management on the Job/020. Choosing the right IT risk management technique.mp4
52.4 MB
~Get Your Files Here !/5. IT Risk Management on the Job/023. Operating controls.mp4
47.2 MB
~Get Your Files Here !/2. What Is IT Risk Management/002. What is IT risk.mp4
42.6 MB
~Get Your Files Here !/4. IT Risk Management in Practice/014. Performing the IT risk assessment.mp4
41.3 MB
~Get Your Files Here !/4. IT Risk Management in Practice/018. Using an IT risk register.mp4
40.9 MB
~Get Your Files Here !/4. IT Risk Management in Practice/015. Choosing an IT risk management framework.mp4
40.0 MB
~Get Your Files Here !/3. IT Risk Management in Context/008. IT risk management in small companies.mp4
39.5 MB
~Get Your Files Here !/5. IT Risk Management on the Job/022. Implementing controls.mp4
35.1 MB
~Get Your Files Here !/2. What Is IT Risk Management/006. IT risk management roles and responsibilities.mp4
34.9 MB
~Get Your Files Here !/5. IT Risk Management on the Job/021. Choosing controls.mp4
34.4 MB
~Get Your Files Here !/2. What Is IT Risk Management/007. Making an IT risk decision.mp4
33.9 MB
~Get Your Files Here !/2. What Is IT Risk Management/005. Types of IT risks.mp4
33.3 MB
~Get Your Files Here !/3. IT Risk Management in Context/013. The minimum viable approach.mp4
32.7 MB
~Get Your Files Here !/3. IT Risk Management in Context/011. Quantitative vs. qualitative risk assessments.mp4
32.6 MB
~Get Your Files Here !/4. IT Risk Management in Practice/017. Determining an acceptable level of IT risk.mp4
30.3 MB
~Get Your Files Here !/5. IT Risk Management on the Job/024. Validating controls.mp4
29.9 MB
~Get Your Files Here !/2. What Is IT Risk Management/004. What is IT risk tolerance.mp4
28.4 MB
[磁力链接]
添加时间:
2022-02-10
大小:
904.4 MB
最近下载:
2024-12-03
热度:
1548
[ FreeCourseWeb.com ] Udemy - Cybersecurity For Beginners - Network Attacks
~Get Your Files Here !/7. Lab Demonstration - Scanning Networks with NMAP Pt. 1/1. Lab Demonstration - Scanning Networks with NMAP Pt. 1.mp4
477.1 MB
~Get Your Files Here !/8. Lab Demonstration - Scanning Networks with NMAP Pt. 2/1. Lab Demonstration - Scanning Networks with NMAP Pt. 2.mp4
331.8 MB
~Get Your Files Here !/1. Denial-of-Service Attack (DoS) Attack/2. The 5 Principal Differences Between DoS & DDoS Attacks.mp4
14.1 MB
~Get Your Files Here !/1. Denial-of-Service Attack (DoS) Attack/6. Common DoS Attack Pt. 2.mp4
9.8 MB
~Get Your Files Here !/1. Denial-of-Service Attack (DoS) Attack/5. Common DoS Attack Pt. 1.mp4
6.9 MB
~Get Your Files Here !/4. DNS Attacks/1. DNS Attacks.mp4
6.4 MB
~Get Your Files Here !/1. Denial-of-Service Attack (DoS) Attack/1. DoS Vs. DDoS.mp4
6.0 MB
~Get Your Files Here !/5. Footprinting/3. Footprinting Helps To.mp4
5.4 MB
~Get Your Files Here !/5. Footprinting/4. Footprinting Methodology.mp4
5.4 MB
~Get Your Files Here !/1. Denial-of-Service Attack (DoS) Attack/7. Three-Way-Handshake Importance To Network Attacks (SYN Flood).mp4
5.2 MB
~Get Your Files Here !/1. Denial-of-Service Attack (DoS) Attack/4. Botnets, Controllers, and Bot Herders.mp4
4.1 MB
~Get Your Files Here !/5. Footprinting/1. What is Footprinting.mp4
3.8 MB
~Get Your Files Here !/6. What is Sniffing/1. What is Sniffing.mp4
3.3 MB
~Get Your Files Here !/6. What is Sniffing/2. Passive & Active Sniffing.mp4
3.3 MB
~Get Your Files Here !/4. DNS Attacks/2. Homograph Attack.mp4
3.2 MB
~Get Your Files Here !/4. DNS Attacks/3. Hyperlink Spoofing.mp4
3.1 MB
~Get Your Files Here !/2. Eavesdropping/1. Eavesdropping.mp4
3.0 MB
~Get Your Files Here !/5. Footprinting/2. What Types of Information to Look For.mp4
2.8 MB
~Get Your Files Here !/1. Denial-of-Service Attack (DoS) Attack/3. DoS & DDoS Countermeasures.mp4
2.6 MB
~Get Your Files Here !/3. Impersonation/2. Impersonation Pt. 2.mp4
2.5 MB
[磁力链接]
添加时间:
2022-01-18
大小:
901.0 MB
最近下载:
2024-12-03
热度:
515
[ CourseLala.com ] Linkedin - Cybersecurity Careers - Getting Started as a CISO
~Get Your Files Here !/01 - Introduction/02 - You need a foundational knowledge of cyber security.mp4
76.1 MB
~Get Your Files Here !/05 - 4. CISO Best Practices/01 - Relationship building.mp4
73.1 MB
~Get Your Files Here !/03 - 2. Getting Hired and Getting Started/04 - First 90 days.mp4
70.3 MB
~Get Your Files Here !/03 - 2. Getting Hired and Getting Started/03 - The CISO interview.mp4
68.6 MB
~Get Your Files Here !/04 - 3. Building Your Strategic Plan/03 - Prioritize areas for improvement.mp4
66.4 MB
~Get Your Files Here !/03 - 2. Getting Hired and Getting Started/01 - Before the interview.mp4
66.0 MB
~Get Your Files Here !/04 - 3. Building Your Strategic Plan/01 - Select a security framework.mp4
62.2 MB
~Get Your Files Here !/04 - 3. Building Your Strategic Plan/02 - Complete an assessment.mp4
61.5 MB
~Get Your Files Here !/02 - 1. About the Role/02 - What type of CISO do you want to be.mp4
61.2 MB
~Get Your Files Here !/05 - 4. CISO Best Practices/02 - PRIME framework.mp4
56.9 MB
~Get Your Files Here !/02 - 1. About the Role/01 - What does a CISO do.mp4
54.6 MB
~Get Your Files Here !/04 - 3. Building Your Strategic Plan/05 - Put it on paper and socialize.mp4
48.5 MB
~Get Your Files Here !/06 - Conclusion/01 - Make the CISO dream come true.mp4
46.4 MB
~Get Your Files Here !/03 - 2. Getting Hired and Getting Started/02 - The CISO resume.mp4
39.6 MB
~Get Your Files Here !/04 - 3. Building Your Strategic Plan/04 - Set a mission and vision for your department.mp4
27.7 MB
~Get Your Files Here !/01 - Introduction/01 - So you want to be a CISO.mp4
14.5 MB
~Get Your Files Here !/04 - 3. Building Your Strategic Plan/01 - Select a security framework.srt
8.2 kB
~Get Your Files Here !/03 - 2. Getting Hired and Getting Started/01 - Before the interview.srt
7.4 kB
~Get Your Files Here !/01 - Introduction/02 - You need a foundational knowledge of cyber security.srt
6.5 kB
~Get Your Files Here !/02 - 1. About the Role/02 - What type of CISO do you want to be.srt
6.5 kB
[磁力链接]
添加时间:
2023-12-18
大小:
893.5 MB
最近下载:
2024-12-04
热度:
922
Microsoft Cybersecurity Pro Track Managing Identity
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/03 Securing Active Directory/006 Active Directory Security.mp4
212.7 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/05 Active Directory & Kerberos Protocol/009 Authentication and Authorization in Active Directory.mp4
155.1 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/04 Azure Active Directory (AAD)/008 Azure Security Architecture.mp4
122.3 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/01 Introduction/003 Preparing the Lab Environment.mp4
92.3 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/02 Managing Identity/005 Security Privileged Access Roadmap Stage 2.mp4
81.3 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/02 Managing Identity/004 Identity as a Service, the new Control Plane.mp4
76.2 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/04 Azure Active Directory (AAD)/007 Identity Federation and Access Solutions for the Cloud.mp4
63.6 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/01 Introduction/002 About the Course.mp4
33.8 MB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/01 Introduction/001 Instructor Introduction.mp4
11.0 MB
.pad/3
488.8 kB
.pad/4
442.3 kB
.pad/2
358.5 kB
.pad/6
355.4 kB
.pad/5
338.9 kB
.pad/7
245.6 kB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/03 Securing Active Directory/006 Active Directory Security.en.srt
56.2 kB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/05 Active Directory & Kerberos Protocol/009 Authentication and Authorization in Active Directory.en.srt
53.0 kB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/04 Azure Active Directory (AAD)/008 Azure Security Architecture.en.srt
37.5 kB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/02 Managing Identity/005 Security Privileged Access Roadmap Stage 2.en.srt
26.4 kB
[TutsNode.com] - Microsoft Cybersecurity Pro Track Managing Identity/01 Introduction/003 Preparing the Lab Environment.en.srt
24.9 kB
[磁力链接]
添加时间:
2021-03-09
大小:
850.9 MB
最近下载:
2024-12-02
热度:
1442
[FreeCoursesOnline.Me] O`REILLY - Building a Career in Cybersecurity
Lesson 1 Getting Started in the Cybersecurity Field/005. 1.4 Cybersecurity Skills.mp4
65.3 MB
Lesson 2 Planning Your Cybersecurity Career/004. 2.3 The Value of Professional Certifications.mp4
60.1 MB
Lesson 3 Creating Your Own Lab/003. 3.2 Foundational Lab.mp4
48.0 MB
Lesson 5 Preparing for Your Interview/005. 5.4 Final Tips.mp4
44.9 MB
Lesson 6 Using Continuous Improvement Strategy/007. 6.6 Growing Your Career as a Remote Worker.mp4
40.3 MB
Lesson 2 Planning Your Cybersecurity Career/003. 2.2 Creating and Tracking Your Plan.mp4
36.8 MB
Lesson 5 Preparing for Your Interview/003. 5.2 Preparing for the Interview.mp4
35.5 MB
Lesson 1 Getting Started in the Cybersecurity Field/006. 1.5 Navigating through the Industry.mp4
31.9 MB
Lesson 2 Planning Your Cybersecurity Career/002. 2.1 Establishing a Plan.mp4
31.3 MB
Lesson 6 Using Continuous Improvement Strategy/008. 6.7 What’s Next.mp4
31.0 MB
Lesson 1 Getting Started in the Cybersecurity Field/004. 1.3 Cybersecurity Jobs.mp4
30.3 MB
Lesson 5 Preparing for Your Interview/004. 5.3 Advancing in the Interview Process.mp4
29.3 MB
Lesson 6 Using Continuous Improvement Strategy/006. 6.5 Keeping a Good Work-life Balance.mp4
28.2 MB
Lesson 3 Creating Your Own Lab/005. 3.4 Enabling and Using Microsoft Defender for Cloud.mp4
27.7 MB
Introduction/001. Building a Career in Cybersecurity Introduction.mp4
25.1 MB
Lesson 6 Using Continuous Improvement Strategy/003. 6.2 Responsibilities and Expectations.mp4
24.6 MB
Lesson 4 Expanding Your Networking/005. 4.4 Using LinkedIn to Expand Your Network.mp4
24.5 MB
Lesson 1 Getting Started in the Cybersecurity Field/003. 1.2 Roles and Responsibilities.mp4
22.1 MB
Lesson 4 Expanding Your Networking/002. 4.1 Understanding the Cybersecurity Community.mp4
21.9 MB
Lesson 4 Expanding Your Networking/003. 4.2 Identifying Opportunities to Contribute with the Cybersecurity Community.mp4
19.3 MB
[磁力链接]
添加时间:
2023-12-18
大小:
847.7 MB
最近下载:
2024-12-04
热度:
3533
[FreeCoursesOnline.Me] O`REILLY - Building a Career in Cybersecurity
Lesson 1 Getting Started in the Cybersecurity Field/005. 1.4 Cybersecurity Skills.mp4
65.3 MB
Lesson 2 Planning Your Cybersecurity Career/004. 2.3 The Value of Professional Certifications.mp4
60.1 MB
Lesson 3 Creating Your Own Lab/003. 3.2 Foundational Lab.mp4
48.0 MB
Lesson 5 Preparing for Your Interview/005. 5.4 Final Tips.mp4
44.9 MB
Lesson 6 Using Continuous Improvement Strategy/007. 6.6 Growing Your Career as a Remote Worker.mp4
40.3 MB
Lesson 2 Planning Your Cybersecurity Career/003. 2.2 Creating and Tracking Your Plan.mp4
36.8 MB
Lesson 5 Preparing for Your Interview/003. 5.2 Preparing for the Interview.mp4
35.5 MB
Lesson 1 Getting Started in the Cybersecurity Field/006. 1.5 Navigating through the Industry.mp4
31.9 MB
Lesson 2 Planning Your Cybersecurity Career/002. 2.1 Establishing a Plan.mp4
31.3 MB
Lesson 6 Using Continuous Improvement Strategy/008. 6.7 What’s Next.mp4
31.0 MB
Lesson 1 Getting Started in the Cybersecurity Field/004. 1.3 Cybersecurity Jobs.mp4
30.3 MB
Lesson 5 Preparing for Your Interview/004. 5.3 Advancing in the Interview Process.mp4
29.3 MB
Lesson 6 Using Continuous Improvement Strategy/006. 6.5 Keeping a Good Work-life Balance.mp4
28.2 MB
Lesson 3 Creating Your Own Lab/005. 3.4 Enabling and Using Microsoft Defender for Cloud.mp4
27.7 MB
Introduction/001. Building a Career in Cybersecurity Introduction.mp4
25.1 MB
Lesson 6 Using Continuous Improvement Strategy/003. 6.2 Responsibilities and Expectations.mp4
24.6 MB
Lesson 4 Expanding Your Networking/005. 4.4 Using LinkedIn to Expand Your Network.mp4
24.5 MB
Lesson 1 Getting Started in the Cybersecurity Field/003. 1.2 Roles and Responsibilities.mp4
22.1 MB
Lesson 4 Expanding Your Networking/002. 4.1 Understanding the Cybersecurity Community.mp4
21.9 MB
Lesson 4 Expanding Your Networking/003. 4.2 Identifying Opportunities to Contribute with the Cybersecurity Community.mp4
19.3 MB
[磁力链接]
添加时间:
2024-03-05
大小:
847.7 MB
最近下载:
2024-11-08
热度:
427
[ FreeCourseWeb.com ] Building a Career in Cybersecurity
~Get Your Files Here !/Lesson 1 Getting Started in the Cybersecurity Field/005. 1.4 Cybersecurity Skills.mp4
65.3 MB
~Get Your Files Here !/Lesson 2 Planning Your Cybersecurity Career/004. 2.3 The Value of Professional Certifications.mp4
60.1 MB
~Get Your Files Here !/Lesson 3 Creating Your Own Lab/003. 3.2 Foundational Lab.mp4
48.0 MB
~Get Your Files Here !/Lesson 5 Preparing for Your Interview/005. 5.4 Final Tips.mp4
44.9 MB
~Get Your Files Here !/Lesson 6 Using Continuous Improvement Strategy/007. 6.6 Growing Your Career as a Remote Worker.mp4
40.3 MB
~Get Your Files Here !/Lesson 2 Planning Your Cybersecurity Career/003. 2.2 Creating and Tracking Your Plan.mp4
36.8 MB
~Get Your Files Here !/Lesson 5 Preparing for Your Interview/003. 5.2 Preparing for the Interview.mp4
35.5 MB
~Get Your Files Here !/Lesson 1 Getting Started in the Cybersecurity Field/006. 1.5 Navigating through the Industry.mp4
31.9 MB
~Get Your Files Here !/Lesson 2 Planning Your Cybersecurity Career/002. 2.1 Establishing a Plan.mp4
31.3 MB
~Get Your Files Here !/Lesson 6 Using Continuous Improvement Strategy/008. 6.7 What’s Next.mp4
31.0 MB
~Get Your Files Here !/Lesson 1 Getting Started in the Cybersecurity Field/004. 1.3 Cybersecurity Jobs.mp4
30.3 MB
~Get Your Files Here !/Lesson 5 Preparing for Your Interview/004. 5.3 Advancing in the Interview Process.mp4
29.3 MB
~Get Your Files Here !/Lesson 6 Using Continuous Improvement Strategy/006. 6.5 Keeping a Good Work-life Balance.mp4
28.2 MB
~Get Your Files Here !/Lesson 3 Creating Your Own Lab/005. 3.4 Enabling and Using Microsoft Defender for Cloud.mp4
27.7 MB
~Get Your Files Here !/Introduction/001. Building a Career in Cybersecurity Introduction.mp4
25.1 MB
~Get Your Files Here !/Lesson 6 Using Continuous Improvement Strategy/003. 6.2 Responsibilities and Expectations.mp4
24.6 MB
~Get Your Files Here !/Lesson 4 Expanding Your Networking/005. 4.4 Using LinkedIn to Expand Your Network.mp4
24.5 MB
~Get Your Files Here !/Lesson 1 Getting Started in the Cybersecurity Field/003. 1.2 Roles and Responsibilities.mp4
22.1 MB
~Get Your Files Here !/Lesson 4 Expanding Your Networking/002. 4.1 Understanding the Cybersecurity Community.mp4
21.9 MB
~Get Your Files Here !/Lesson 4 Expanding Your Networking/003. 4.2 Identifying Opportunities to Contribute with the Cybersecurity Community.mp4
19.3 MB
[磁力链接]
添加时间:
2023-12-22
大小:
847.7 MB
最近下载:
2024-12-04
热度:
1535
[ CourseBoat.com ] Linkedin - Building the Next Generation of Cybersecurity Professionals
~Get Your Files Here !/04 - 3. Dispelling Common Myths in Cybersecurity/02 - Myth number two Cybersecurity is difficult to learn.mp4
53.8 MB
~Get Your Files Here !/03 - 2. Discovering Hidden Potential to Find Your Next Superstars/03 - Ask better questions to get better answers.mp4
52.0 MB
~Get Your Files Here !/03 - 2. Discovering Hidden Potential to Find Your Next Superstars/01 - Unconventional talent is everywhere.mp4
49.8 MB
~Get Your Files Here !/02 - 1. Why We Need to Rethink Cybersecurity Hiring and Team Building/01 - Why the war on cybercrime is being lost.mp4
48.1 MB
~Get Your Files Here !/02 - 1. Why We Need to Rethink Cybersecurity Hiring and Team Building/02 - The role and roles of the modern
cybersecurity
team.mp4
47.9 MB
~Get Your Files Here !/06 - 5. Rethinking Technical Interviews to Assess Hands-on Ability and Not Book Knowledge/01 - The purpose of technical interviews.mp4
45.4 MB
~Get Your Files Here !/05 - 4. Writing Foolproof Job Descriptions that Appeal to Great Candidates/02 - What great candidates look for.mp4
45.1 MB
~Get Your Files Here !/03 - 2. Discovering Hidden Potential to Find Your Next Superstars/02 - Hire for potential.mp4
43.1 MB
~Get Your Files Here !/02 - 1. Why We Need to Rethink Cybersecurity Hiring and Team Building/03 - Determine how important security is at your company.mp4
41.4 MB
~Get Your Files Here !/04 - 3. Dispelling Common Myths in Cybersecurity/01 - Myth number one You must have years of experience first.mp4
40.7 MB
~Get Your Files Here !/05 - 4. Writing Foolproof Job Descriptions that Appeal to Great Candidates/01 - Job descriptions that get you what you want.mp4
40.6 MB
~Get Your Files Here !/04 - 3. Dispelling Common Myths in Cybersecurity/04 - Challenge What other myths exist.mp4
40.4 MB
~Get Your Files Here !/02 - 1. Why We Need to Rethink Cybersecurity Hiring and Team Building/04 - Start building trust today.mp4
39.0 MB
~Get Your Files Here !/06 - 5. Rethinking Technical Interviews to Assess Hands-on Ability and Not Book Knowledge/02 - Take-home projects A better way.mp4
38.6 MB
~Get Your Files Here !/07 - 6. Setting Up New Hires for Future Success and Beyond/01 - The first 90 days The most important period.mp4
38.1 MB
~Get Your Files Here !/04 - 3. Dispelling Common Myths in Cybersecurity/03 - Myth number three You need IT fundamentals.mp4
36.0 MB
~Get Your Files Here !/07 - 6. Setting Up New Hires for Future Success and Beyond/02 - Three habits of the highly effective
cybersecurity
manager.mp4
32.2 MB
~Get Your Files Here !/05 - 4. Writing Foolproof Job Descriptions that Appeal to Great Candidates/03 - Challenge Review your most recent job description.mp4
31.1 MB
~Get Your Files Here !/08 - Conclusion/01 - Next steps.mp4
29.0 MB
~Get Your Files Here !/03 - 2. Discovering Hidden Potential to Find Your Next Superstars/04 - Challenge Reflect on your interview questions.mp4
28.5 MB
[磁力链接]
添加时间:
2023-12-19
大小:
836.2 MB
最近下载:
2024-12-04
热度:
987
[ FreeCourseWeb.com ] Udemy - Microsoft Cybersecurity Pro Track - Managing Identity.zip
[ FreeCourseWeb.com ] Udemy - Microsoft Cybersecurity Pro Track - Managing Identity.zip
828.1 MB
[磁力链接]
添加时间:
2021-04-20
大小:
828.1 MB
最近下载:
2024-11-21
热度:
684
[ FreeCourseWeb.com ] Udemy - Cybersecurity Assessment For Small And Mid Size Business
~Get Your Files Here !/2 - Physical Security HardwareSoftware Personnel/5 - Is there an inventory of all equipment.mp4
66.2 MB
~Get Your Files Here !/5 - Website Social Media/17 - Do all employees have web access and is it monitored.mp4
64.1 MB
~Get Your Files Here !/4 - Login Password/12 - Can employees reset passwords lock out owners.mp4
64.1 MB
~Get Your Files Here !/2 - Physical Security HardwareSoftware Personnel/3 - Is hardware software maintained internally.mp4
57.0 MB
~Get Your Files Here !/8 - Conclusion whats next/21 - Conclusion.mp4
51.8 MB
~Get Your Files Here !/3 - Mobile Devices BYOD/8 - Who owns the mobile devices used within the company.mp4
50.3 MB
~Get Your Files Here !/2 - Physical Security HardwareSoftware Personnel/6 - Does the company know who report an incident to and the procedure to do so.mp4
50.1 MB
~Get Your Files Here !/2 - Physical Security HardwareSoftware Personnel/4 - Hardware or software older than 5 years old.mp4
49.2 MB
~Get Your Files Here !/7 - Analyze the risk/20 - What are the threats you face.mp4
40.2 MB
~Get Your Files Here !/3 - Mobile Devices BYOD/11 - VPN solution.mp4
37.1 MB
~Get Your Files Here !/4 - Login Password/15 - Is there a strict password creation and update policy in place.mp4
35.9 MB
~Get Your Files Here !/6 - Data Storage Backup/18 - Does the company use cloud based backup services.mp4
33.8 MB
~Get Your Files Here !/5 - Website Social Media/16 - Who has access and authorization to distribute websocial media content.mp4
33.8 MB
~Get Your Files Here !/4 - Login Password/13 - Does someone monitor login activity.mp4
33.2 MB
~Get Your Files Here !/4 - Login Password/14 - SEIM solution for SMB.mp4
30.7 MB
~Get Your Files Here !/6 - Data Storage Backup/19 - Are regulatory guidelines being followed HIPPA DoD PCI.mp4
28.1 MB
~Get Your Files Here !/3 - Mobile Devices BYOD/9 - Are devices set to auto connect to Bluetooth and WiFi networks.mp4
25.2 MB
~Get Your Files Here !/3 - Mobile Devices BYOD/10 - Is a VPN being used for remote access.mp4
23.8 MB
~Get Your Files Here !/1 - Introduction/2 - Frameworks.mp4
23.2 MB
~Get Your Files Here !/2 - Physical Security HardwareSoftware Personnel/7 - A possible solution.mp4
11.0 MB
[磁力链接]
添加时间:
2024-07-26
大小:
824.7 MB
最近下载:
2024-12-04
热度:
428
[ DevCourseWeb.com ] Udemy - Python for Computer Networks and
cybersecurity
~Get Your Files Here !/3. Network Scanning for Defenders/1. Network Scanning for Defenders.mp4
369.1 MB
~Get Your Files Here !/2. Fulfilling Pre-ATT&CK Objectives/1. Implementing a SYN Scan in scapy.mp4
278.3 MB
~Get Your Files Here !/4. Gaining Initial Access_part3/1. Gaining Initial Access.mp4
127.2 MB
~Get Your Files Here !/5. File Transfer and Plotting_E1/1. File Transfer and Plotting.mp4
21.8 MB
~Get Your Files Here !/6. File Transfer and Plotting_Exercise2/1. File Transfer and Plotting_E1.mp4
13.4 MB
~Get Your Files Here !/3. Network Scanning for Defenders/1.1 DNSExploration.py
1.6 kB
~Get Your Files Here !/4. Gaining Initial Access_part3/1.1 TestDefaultCredentials.py
1.5 kB
~Get Your Files Here !/2. Fulfilling Pre-ATT&CK Objectives/1.1 HoneyScan.py
1.2 kB
~Get Your Files Here !/3. Network Scanning for Defenders/1.2 HoneyResolver.py
1.1 kB
~Get Your Files Here !/5. File Transfer and Plotting_E1/1.2 Example 6.1.py
1.0 kB
~Get Your Files Here !/1. Введение/1. Introduction.html
908 Bytes
~Get Your Files Here !/2. Fulfilling Pre-ATT&CK Objectives/1.2 PortScan.py
789 Bytes
~Get Your Files Here !/Bonus Resources.txt
386 Bytes
~Get Your Files Here !/6. File Transfer and Plotting_Exercise2/1.2 download.py
262 Bytes
~Get Your Files Here !/6. File Transfer and Plotting_Exercise2/1.3 upload.py
256 Bytes
~Get Your Files Here !/5. File Transfer and Plotting_E1/1.1 desktop.ini
244 Bytes
~Get Your Files Here !/6. File Transfer and Plotting_Exercise2/1.1 desktop.ini
244 Bytes
Get Bonus Downloads Here.url
182 Bytes
[磁力链接]
添加时间:
2023-12-19
大小:
809.9 MB
最近下载:
2024-12-04
热度:
2189
Joseph Steinberg - Cybersecurity All-in-One for Dummies
Cybersecurity All-in-One for Dummies.m4b
752.7 MB
Cybersecurity All-In-One for Dummies by Joseph Steinberg.epub
8.1 MB
Cybersecurity All-in-One for Dummies.jpg
33.6 kB
[磁力链接]
添加时间:
2023-12-17
大小:
760.9 MB
最近下载:
2024-12-04
热度:
3953
CYBERSECURITY COSE NELL'ALTRO MONDO - SPECIALE TG5.mkv
CYBERSECURITY COSE NELL'ALTRO MONDO - SPECIALE TG5.mkv
733.6 MB
[磁力链接]
添加时间:
2018-04-09
大小:
733.6 MB
最近下载:
2024-11-08
热度:
1198
Cybersecurity Basics Securing your life in the digital age
Course/8. Email/2. Creating your email.mp4
58.6 MB
Course/5. Securing your computer/1. The basics of securing your computer.mp4
46.3 MB
Course/4. Securing your Phone/4. Walkthrough Steps to take when downloading an app.mp4
41.6 MB
Course/7. Surfing the Internet Securely/2. Google, Search, and Cookies.mp4
34.8 MB
Course/5. Securing your computer/4. Non-obvious basic essentials for securing your computer.mp4
34.0 MB
Course/6. Password and Accounts/4. Security questions & Birthday for your accounts.mp4
33.8 MB
Course/7. Surfing the Internet Securely/3. Drive by downloads, HTTPs, and Internet Trackers.mp4
31.7 MB
Course/4. Securing your Phone/9. Phishing attacks on your phone.mp4
29.3 MB
Course/8. Email/4. Email activity.mp4
28.6 MB
Course/5. Securing your computer/3. Protecting your home internet.mp4
26.0 MB
Course/7. Surfing the Internet Securely/5. Google Maps and Child Filters.mp4
25.6 MB
Course/3. Cyber Attacks/2. PhishingWhaling.mp4
24.6 MB
Course/3. Cyber Attacks/4. Ransomware.mp4
24.0 MB
Course/6. Password and Accounts/1. Rules for creating passwords.mp4
23.8 MB
Course/4. Securing your Phone/3. Downloading Apps.mp4
23.2 MB
Course/2. Mindset of Cybersecurity Professional/3. Convenience vs Friction.mp4
22.5 MB
Course/2. Mindset of Cybersecurity Professional/5. Classifying your data.mp4
22.3 MB
Course/4. Securing your Phone/7. Mobile Carrier Security.mp4
21.9 MB
Course/4. Securing your Phone/6. Two Factor Authentication.mp4
19.2 MB
Course/1. Introduction/1. Introduction - Getting Startaed.mp4
18.4 MB
[磁力链接]
添加时间:
2021-03-08
大小:
718.3 MB
最近下载:
2024-12-03
热度:
1030
Joseph Steinberg - 2023 - Cybersecurity All-in-One for Dummies (Technology)
Cybersecurity All-in-One for Dummies.mp3
715.6 MB
Cybersecurity All-in-One for Dummies.jpg
42.5 kB
Cybersecurity All-in-One for Dummies - Joseph Steinberg - 2023.txt
1.7 kB
Downloaded From TorrentGalaxy.txt
583 Bytes
Downloaded From Glodls.txt
237 Bytes
Downloaded From 1337X.txt
96 Bytes
Downloaded From Demonoid.txt
50 Bytes
Downloaded From AngieTorrents.txt
41 Bytes
[磁力链接]
添加时间:
2023-12-18
大小:
715.6 MB
最近下载:
2024-12-03
热度:
10260
AI-Enabled Programming, Networking, and Cybersecurity
Lesson 2 Using AI for Cybersecurity/004. 2.3 Securing AI Implementations.mp4
66.1 MB
Lesson 1 Introduction to AI-powered Tools/007. 1.6 Introducing Embedding Models.mp4
41.5 MB
Lesson 1 Introduction to AI-powered Tools/006. 1.5 Introducing Retrieval Augmented Generation (RAG).mp4
39.5 MB
Lesson 2 Using AI for Cybersecurity/005. 2.4 Exploring Network Security Processes Incorporating AI Tools.mp4
33.3 MB
Lesson 1 Introduction to AI-powered Tools/003. 1.2 Large Language Models (LLMs) and Small Language Models (SLMs).mp4
31.4 MB
Lesson 3 Using AI for Software Development/008. 3.7 Prompt Engineering for Software Development.mp4
31.0 MB
Lesson 1 Introduction to AI-powered Tools/004. 1.3 Introducing LangChain, LangGraph, Llama Index, and Other Orchestration Frameworks.mp4
28.4 MB
Lesson 4 Using AI for Networking/002. 4.1 Exploring how AI is Revolutionizing Networking.mp4
26.9 MB
Lesson 1 Introduction to AI-powered Tools/009. 1.8 Introducing Semantic Search.mp4
25.6 MB
Lesson 4 Using AI for Networking/003. 4.2 Using GitHub Copilot for Programming Tasks Related to Networking.mp4
23.8 MB
Lesson 4 Using AI for Networking/005. 4.4 Prompt Engineering for Networking.mp4
23.6 MB
Lesson 5 Future Trends and Additional Emerging Technologies/003. 5.2 Regulatory and Policy Frameworks.mp4
23.0 MB
Lesson 3 Using AI for Software Development/005. 3.4 Generating Code from a Prompt.mp4
22.0 MB
Introduction/001. AI-Enabled Programming, Networking, and Cybersecurity Introduction.mp4
21.4 MB
Lesson 1 Introduction to AI-powered Tools/001. Learning objectives.mp4
19.7 MB
Lesson 1 Introduction to AI-powered Tools/008. 1.7 Introducing Vector Databases - pgvector, Chroma, MongoDB Atlas Vector Search, and others.mp4
18.5 MB
Lesson 1 Introduction to AI-powered Tools/002. 1.1 Overview of the Evolution of AI-driven Tools.mp4
18.4 MB
Summary/001. AI-Enabled Programming, Networking, and Cybersecurity Summary.mp4
18.1 MB
Lesson 1 Introduction to AI-powered Tools/005. 1.4 An Overview of Open-source AI Models and Hugging Face.mp4
17.9 MB
Lesson 5 Future Trends and Additional Emerging Technologies/002. 5.1 Exploring Additional Applications of AI in Emerging Technologies.mp4
16.9 MB
[磁力链接]
添加时间:
2024-11-28
大小:
690.1 MB
最近下载:
2024-12-02
热度:
71
共15页
上一页
3
4
5
6
7
8
9
10
11
下一页