搜索
为您找到约
277
个磁力链接/BT种子,耗时 0 毫秒。
排序:
相关程度
热度
文件大小
添加时间
最近访问
[ WebToolTip.com ] Udemy - Essential Cybersecurity For Everyone - Stay Safe Online
~Get Your Files Here !/4 - Creating Strong Passwords and Enhancing Overall Security/9 - Password Security.mp4
250.4 MB
~Get Your Files Here !/11 - IoT Security/16 - Securing Smart Devices in the Digital Age.mp4
235.4 MB
~Get Your Files Here !/7 - Data Backup and Recovery Essentials/12 - Safeguarding Your Data Backup and Restoration.mp4
209.9 MB
~Get Your Files Here !/9 - Cybersecurity for Travelers/14 - Staying Secure While Traveling Online.mp4
191.8 MB
~Get Your Files Here !/6 - Email Security Essentials/11 - Protecting Your Email from Threats.mp4
175.4 MB
~Get Your Files Here !/10 - Social Media Security/15 - Protecting Your Privacy on Social Media.mp4
172.2 MB
~Get Your Files Here !/5 - Safe Internet Browsing/10 - Safe Internet Browsing.mp4
126.9 MB
~Get Your Files Here !/12 - Steps to Take After a Cybersecurity Breach/17 - What to Do After a Cybersecurity Breach.mp4
116.9 MB
~Get Your Files Here !/1 - Introduction Essential Cybersecurity for everyone stay safe online/1 - Introduction.mp4
107.3 MB
~Get Your Files Here !/2 - Understanding Cyber Threats/2 - Understanding Cyber threats.mp4
98.9 MB
~Get Your Files Here !/8 - Securing Your Online Accounts/13 - Best Practices for Protecting Online Accounts.mp4
94.5 MB
~Get Your Files Here !/3 - Protecting Personal Devices/3 - Introduction to protecting personal devices.mp4
76.2 MB
~Get Your Files Here !/3 - Protecting Personal Devices/6 - Keeping Software Operating Systems Updated Strengthening Your Digital Defense.mp4
58.9 MB
~Get Your Files Here !/3 - Protecting Personal Devices/4 - Securing Computers and Laptops.mp4
43.3 MB
~Get Your Files Here !/3 - Protecting Personal Devices/7 - Configuring Firewalls Securing Your Devices and Home Network.mp4
36.6 MB
~Get Your Files Here !/3 - Protecting Personal Devices/5 - Securing Smartphones and Laptops.mp4
30.1 MB
~Get Your Files Here !/3 - Protecting Personal Devices/8 - Ensuring Safe and Secure WiFi Connections.mp4
27.5 MB
Get Bonus Downloads Here.url
180 Bytes
~Get Your Files Here !/Bonus Resources.txt
70 Bytes
[磁力链接]
添加时间:
2025-03-13
大小:
2.1 GB
最近下载:
2025-03-13
热度:
2
[ WebToolTip.com ] Udemy - ISACA Cybersecurity Fundamentals - Complete Training Course
~Get Your Files Here !/2 - Types of Security/4 -Cybersecurity.mp4
38.9 MB
~Get Your Files Here !/3 - Governance, Risk Management and Compliance/5 -Risk Analysis Approaches.mp4
36.9 MB
~Get Your Files Here !/4 - Common Types of Malware/6 -Trojan Horses.mp4
34.2 MB
~Get Your Files Here !/4 - Common Types of Malware/5 -Ransomware.mp4
34.1 MB
~Get Your Files Here !/4 - Common Types of Malware/3 -Worms.mp4
33.9 MB
~Get Your Files Here !/5 - Security Controls/2 -Control Functions and Types.mp4
32.8 MB
~Get Your Files Here !/4 - Common Types of Malware/2 -Viruses.mp4
31.7 MB
~Get Your Files Here !/2 - Types of Security/5 -Physical Security.mp4
31.6 MB
~Get Your Files Here !/3 - Governance, Risk Management and Compliance/4 -Risk Governance.mp4
29.0 MB
~Get Your Files Here !/4 - Common Types of Malware/8 -Adware.mp4
28.9 MB
~Get Your Files Here !/6 - OWASP Top 10/11 -Server-Side Request Forgery.mp4
28.7 MB
~Get Your Files Here !/6 - OWASP Top 10/9 -Software and Data Integrity Failures.mp4
28.1 MB
~Get Your Files Here !/6 - OWASP Top 10/10 -Security Logging and Monitoring Failures.mp4
28.0 MB
~Get Your Files Here !/6 - OWASP Top 10/3 -Cryptographic Failures.mp4
27.0 MB
~Get Your Files Here !/6 - OWASP Top 10/7 -Vulnerable and Outdated Components.mp4
27.0 MB
~Get Your Files Here !/1 - Introduction/3 -Integrity.mp4
26.2 MB
~Get Your Files Here !/4 - Common Types of Malware/7 -Rootkit.mp4
25.7 MB
~Get Your Files Here !/2 - Types of Security/3 -Information Security.mp4
23.5 MB
~Get Your Files Here !/1 - Introduction/4 -Availability.mp4
22.1 MB
~Get Your Files Here !/4 - Common Types of Malware/4 -Keyloggers.mp4
21.6 MB
[磁力链接]
添加时间:
2025-03-07
大小:
858.9 MB
最近下载:
2025-03-14
热度:
978
[ DevCourseWeb.com ] Udemy - Cybersecurity Freelancer - Become A Free Agent In 2025
~Get Your Files Here !/3 - Pricing Your Services Creating Your Service Package/4 - Pricing Your Cybsersecurity Consultancy Services.mp4
433.8 MB
~Get Your Files Here !/2 - Becoming A Cybersecurity Enterpreneur Establishing Your Product Market Fit/3 - Establishing Your Product Market Fit.mp4
380.4 MB
~Get Your Files Here !/3 - Pricing Your Services Creating Your Service Package/5 - Creating Your Service Package.mp4
365.0 MB
~Get Your Files Here !/4 - Perfect Elevator Pitch Market Yourself To Sell Your Business/8 - Earn Your Expert Status To Sell.mp4
100.4 MB
~Get Your Files Here !/6 - Course Conclusion/10 - Course Outro.mp4
86.7 MB
~Get Your Files Here !/4 - Perfect Elevator Pitch Market Yourself To Sell Your Business/7 - The Difference Between Marketing Selling.mp4
75.1 MB
~Get Your Files Here !/1 - Course Introduction/1 - Course Introduction.mp4
66.6 MB
~Get Your Files Here !/4 - Perfect Elevator Pitch Market Yourself To Sell Your Business/6 - Perfect Your Elevator Pitch.mp4
42.1 MB
~Get Your Files Here !/5 - Course Project/9 - Project Video.mp4
39.8 MB
~Get Your Files Here !/2 - Becoming A Cybersecurity Enterpreneur Establishing Your Product Market Fit/2 - Becoming A Cybersecurity Entrepreneur.mp4
32.8 MB
Get Bonus Downloads Here.url
182 Bytes
~Get Your Files Here !/Bonus Resources.txt
70 Bytes
[磁力链接]
添加时间:
2025-02-24
大小:
1.6 GB
最近下载:
2025-03-14
热度:
305
[ FreeCourseWeb.com ] Linkedin - Cybersecurity For Musicians, Producers, And Studios
~Get Your Files Here !/4 - Leveraging Technology for IP Protection/11 - Antipiracy software and techniques Royalty Management.mp4
173.2 MB
~Get Your Files Here !/4 - Leveraging Technology for IP Protection/8 - Using blockchain for music rights management.mp4
123.5 MB
~Get Your Files Here !/4 - Leveraging Technology for IP Protection/9 - Antipiracy software and techniques AI Protection Content ID Watermarking.mp4
112.9 MB
~Get Your Files Here !/1 - Introduction/1 - Welcome and introduction.mp4
101.3 MB
~Get Your Files Here !/4 - Leveraging Technology for IP Protection/10 - Antipiracy software and techniques Copyright PROs.mp4
95.2 MB
~Get Your Files Here !/4 - Leveraging Technology for IP Protection/13 - Antipiracy software and techniques Direct Fan Engagement.mp4
93.6 MB
~Get Your Files Here !/2 - Protecting Digital Assets/4 - Tools for secure data storage and sharing.mp4
70.3 MB
~Get Your Files Here !/5 - Action Plan for Musicians and Businesses/14 - Building a
cybersecurity
strategy.mp4
68.4 MB
~Get Your Files Here !/2 - Protecting Digital Assets/5 - Backup regularly.mp4
67.4 MB
~Get Your Files Here !/4 - Leveraging Technology for IP Protection/12 - Antipiracy software and techniques Secure Distribution Platforms.mp4
57.2 MB
~Get Your Files Here !/3 - Secure Music Streaming and Distribution/7 - Risks and best practices in streaming distribution platforms and sharing music.mp4
54.4 MB
~Get Your Files Here !/2 - Protecting Digital Assets/3 - Steps to safeguard recordings intellectual property and creative works.mp4
49.6 MB
~Get Your Files Here !/6 - Conclusion and Wrap Up/15 - Conclusion.mp4
48.1 MB
~Get Your Files Here !/2 - Protecting Digital Assets/6 - Access control.mp4
35.3 MB
~Get Your Files Here !/1 - Introduction/2 - Understanding Cybersecurity Threats in Music.mp4
25.4 MB
Get Bonus Downloads Here.url
183 Bytes
~Get Your Files Here !/Bonus Resources.txt
70 Bytes
[磁力链接]
添加时间:
2025-02-24
大小:
1.2 GB
最近下载:
2025-03-13
热度:
223
Enterprise Cybersecurity Study Guide How to Build a Successful Cyberdefense Program Against Advanced Threats-PeroAp-
1484232577.pdf
57.0 MB
1484232577.epub
21.5 MB
th_Eg4UvzELVT9peA55IEiJAp4oRRfniZiW.jpg
26.9 kB
Enterprise Cybersecurity Study Guide How to Build a Successful Cyberdefense Program Against Advanced Threat
13.0 kB
Downloaded from {1337x.to}.txt
860 Bytes
[磁力链接]
添加时间:
2025-02-23
大小:
78.5 MB
最近下载:
2025-03-14
热度:
702
[ FreeCourseWeb.com ] AI Cybersecurity with DeepSeek R1 - Protect Your Digital Life
~Get Your Files Here !/5 - Digital Forensics & Investigations/2 -Analyzing Suspicious Software.mp4
46.2 MB
~Get Your Files Here !/4 - OSINT – How Scammers Gather Your Data/3 -Romance Scams How They Manipulate Victims.mp4
43.4 MB
~Get Your Files Here !/1 - Introduction to AI and Cybersecurity/1 -What Are Artificial Intelligence & Cybersecurity.mp4
37.4 MB
~Get Your Files Here !/3 - Ethical Hacking Real-World Demonstrations/3 -Hacking with Advanced Malware A Demonstration.mp4
27.7 MB
~Get Your Files Here !/7 - Final Thoughts & Cybersecurity Mindset/1 -Psychological Tricks Hackers Use & How to Avoid Scams.mp4
26.1 MB
~Get Your Files Here !/6 - Leveraging AI for Profit and Cybersecurity/1 -Qwen 2.5 AI Video Generation.mp4
25.8 MB
~Get Your Files Here !/3 - Ethical Hacking Real-World Demonstrations/2 -Why Do Experts Say Don't Click the Link.mp4
23.4 MB
~Get Your Files Here !/4 - OSINT – How Scammers Gather Your Data/1 -How Scammers Steal Your Personal Data.mp4
22.6 MB
~Get Your Files Here !/4 - OSINT – How Scammers Gather Your Data/2 -Job Scams Be Careful Where You Apply.mp4
19.7 MB
~Get Your Files Here !/4 - OSINT – How Scammers Gather Your Data/4 -OSINT Tools SearchPeopleFree, WhitePages.mp4
15.5 MB
~Get Your Files Here !/5 - Digital Forensics & Investigations/3 -Investigating Malicious Links.mp4
13.4 MB
~Get Your Files Here !/5 - Digital Forensics & Investigations/4 -Verifying Email Sources for Cyber Threats.mp4
10.8 MB
~Get Your Files Here !/3 - Ethical Hacking Real-World Demonstrations/4 -Key Takeaways & How to Protect Yourself.mp4
10.7 MB
~Get Your Files Here !/3 - Ethical Hacking Real-World Demonstrations/1 -Advanced Phishing Attacks How They Work.mp4
9.4 MB
~Get Your Files Here !/1 - Introduction to AI and Cybersecurity/2 -Who Is This Course For.mp4
8.7 MB
~Get Your Files Here !/5 - Digital Forensics & Investigations/1 -Introduction to Digital Forensics.mp4
8.0 MB
~Get Your Files Here !/2 - Cybersecurity Myths vs. Reality/2 -Why Antivirus Alone Won't Keep You Safe.mp4
7.9 MB
~Get Your Files Here !/2 - Cybersecurity Myths vs. Reality/1 -What Are the Risks of Downloading Unknown Apps.mp4
6.7 MB
~Get Your Files Here !/6 - Leveraging AI for Profit and Cybersecurity/2 - Use Google Ai studio to generate script for a video.html
11.3 kB
~Get Your Files Here !/6 - Leveraging AI for Profit and Cybersecurity/2 - Whisper Free Audio Transcription for Security Experts.html
5.3 kB
[磁力链接]
添加时间:
2025-02-23
大小:
363.3 MB
最近下载:
2025-03-13
热度:
507
CBTNuggets - Microsoft Certified Cybersecurity Architect Expert (SC-100) Online Training 2023-2
2. Translating Security Requirements/6. Azure Security Benchmark - Microsoft Certified Cybersecurity-1.mp4
113.5 MB
3. Designing Security Strategies/2. Hybrid Environmental Security Strategies - Microsoft Certifi.mp4
63.8 MB
10. Design a security strategy for data and applications/1. Specify Priorities for Mitigating Threats to Apps - Microsof-1.mp4
62.3 MB
6. Designing a Regulatory Compliance Strategy/4. Implementing Azure Policy - Microsoft Certified Cybersecurit.mp4
59.0 MB
7. Evaluating and Managing Security Postures/6. Mitigating Identified Risks - Microsoft Certified Cybersecur-1.mp4
53.6 MB
3. Designing Security Strategies/4. Traffic Filtering and Segmentation Strategies - Microsoft Ce-1.mp4
53.4 MB
10. Design a security strategy for data and applications/4. Priorities For Mitigating Threats To Data - Microsoft Certif-1.mp4
53.4 MB
3. Designing Security Strategies/5. Azure Best Practices for Network Security - Microsoft Certif-1.mp4
52.2 MB
1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/5. Hybrid Infrastructure - Microsoft Certified Cybersecurity Ar-1.mp4
50.4 MB
6. Designing a Regulatory Compliance Strategy/6. Translating Privacy Requirements - Microsoft Certified Cyber.mp4
49.7 MB
9. Designing a Strategy for Securing SaaS, PaaS, and IaaS Services/1. Security Baselines for SaaS, PaaS, and IaaS services - Micro.mp4
48.3 MB
2. Translating Security Requirements/3. Translating Business Goals into Security Requirements - Micr.mp4
47.9 MB
2. Translating Security Requirements/7. Securing Privileged Access Using RaMP - Microsoft Certified -1.mp4
47.8 MB
1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/2. Security Operations - Microsoft Certified Cybersecurity Arch-1.mp4
47.0 MB
4. Designing a Security Operations Strategy/5. SIEMSOAR Strategy - Microsoft Certified Cybersecurity Archit.mp4
46.3 MB
2. Translating Security Requirements/2. Translating Requirements - Microsoft Certified Cybersecurity.mp4
46.2 MB
10. Design a security strategy for data and applications/3. Security Strategy for Applications and APIs - Microsoft Cert-1.mp4
44.6 MB
5. Designing an Identity Security Strategy/1. Strategy for Access to Cloud Resources - Microsoft Certified.mp4
43.0 MB
7. Evaluating and Managing Security Postures/4. Designing Security for an Azure Landing Zone - Microsoft Cer.mp4
42.8 MB
4. Designing a Security Operations Strategy/3. Logging and Auditing Strategy - Microsoft Certified Cybersec.mp4
42.3 MB
[磁力链接]
添加时间:
2025-02-15
大小:
2.5 GB
最近下载:
2025-03-14
热度:
84
Cybersecurity Closer Look Labs
004. 03 00 Digital Certificates.mp4
46.0 MB
019. 18 00 Risk Terminology.mp4
45.9 MB
020. 19 00 SSL and TLS Packet Capture.mp4
35.4 MB
013. 12 00 Powershell.mp4
29.1 MB
021. 20 00 Star and Simple Properties.mp4
27.5 MB
023. 22 00 Wireless Heat Maps.mp4
26.8 MB
015. 14 00 Pwned Passwords.mp4
26.6 MB
007. 06 00 IPv6 Addressing.mp4
23.9 MB
008. 07 00 Log Files.mp4
21.7 MB
012. 11 00 Policies and Standards.mp4
21.3 MB
010. 09 00 Passive Reconnaissance.mp4
19.3 MB
024. 23 00 ZenMap.mp4
18.2 MB
006. 05 00 Honeypots.mp4
18.0 MB
009. 08 00 Malware Analysis.mp4
17.7 MB
002. 01 00 Cloud Controls.mp4
17.3 MB
016. 15 00 Quantitative Risk Analysis.mp4
14.3 MB
003. 02 00 Constructing Error Messages.mp4
13.8 MB
017. 16 00 RAID.mp4
11.8 MB
025. 24 00 Zero-day Vulnerabilities.mp4
11.3 MB
005. 04 00 Hashing and HMACS.mp4
10.6 MB
[磁力链接]
添加时间:
2025-02-05
大小:
502.3 MB
最近下载:
2025-03-14
热度:
577
Mastering Cybersecurity with Python - From Basics to Advanced Defense
Chapter 01 Introduction/001. Introduction.mp4
51.5 MB
Chapter 10 Mini Project - File Encryption & Decryption Tool/004. Task 3 - Adding the User Interface.mp4
51.0 MB
Chapter 12 Python Project - Build an Extensive Authentication System and Password Checker/005. Part 4 - Adding the Password Strength Checker Tool.mp4
50.0 MB
Chapter 04 Control Flow & Loops/008. Programming Challenge.mp4
43.8 MB
Chapter 12 Python Project - Build an Extensive Authentication System and Password Checker/007. Part 6 - Adding the Audit Tool.mp4
39.5 MB
Chapter 06 Data Structures/008. Programming Challenge Part 2 - Dictionaries & Loops.mp4
36.7 MB
Chapter 11 Object-Oriented Programming (OOP)/003. Creating a Basic Class.mp4
35.4 MB
Chapter 04 Control Flow & Loops/007. The BREAK Statement.mp4
34.5 MB
Chapter 12 Python Project - Build an Extensive Authentication System and Password Checker/006. Part 5 - Hashing the User Passwords.mp4
33.6 MB
Chapter 12 Python Project - Build an Extensive Authentication System and Password Checker/009. Part 8 - Adding the Post Login Menu.mp4
32.5 MB
Chapter 07 Mini Project - Build a Basic User Authentication System/004. Step 3 - Build the Authentication System.mp4
31.8 MB
Chapter 10 Mini Project - File Encryption & Decryption Tool/003. Task 2 - Creating the Encryption & Decryption Keys.mp4
28.7 MB
Chapter 04 Control Flow & Loops/003. IF ELSE Statements.mp4
27.4 MB
Chapter 07 Mini Project - Build a Basic User Authentication System/003. Step 2 - Build the Login Function.mp4
26.9 MB
Chapter 09 Libraries & Modules/007. Working with an External Library.mp4
26.6 MB
Chapter 02 Variables & Data Types/002. Working with Strings.mp4
26.0 MB
Chapter 12 Python Project - Build an Extensive Authentication System and Password Checker/001. Final Project Preview.mp4
26.0 MB
Chapter 01 Introduction/002. Important Note about Replit.mp4
23.5 MB
Chapter 12 Python Project - Build an Extensive Authentication System and Password Checker/008. Part 7 - Adding the View Logs Function.mp4
23.0 MB
Chapter 04 Control Flow & Loops/009. Try & Except Error Handling.mp4
22.6 MB
[磁力链接]
添加时间:
2025-01-27
大小:
1.5 GB
最近下载:
2025-03-13
热度:
340
Cybersecurity in the Transportation Industry.pdf
Cybersecurity in the Transportation Industry.pdf
56.5 MB
[磁力链接]
添加时间:
2025-01-17
大小:
56.5 MB
最近下载:
2025-03-13
热度:
379
[CourserHub.com] Coursera - IT Fundamentals for Cybersecurity Specialization
[CourserHub.com] Coursera - IT Fundamentals for Cybersecurity Specialization.part1.rar
1.1 GB
[CourserHub.com] Coursera - IT Fundamentals for Cybersecurity Specialization.part2.rar
403.0 MB
[磁力链接]
添加时间:
2025-01-06
大小:
1.5 GB
最近下载:
2025-03-11
热度:
66
Coursera - IBM and ISC2 Cybersecurity Specialist Professional Certificate 2024
Coursera - Introduction to Cloud Computing 2024-4/05_cloud-security-monitoring-case-studies-jobs/02_case-studies-and-jobs/01_case-studies-in-different-industry-verticals.mp4
64.0 MB
Coursera - Introduction to Cybersecurity Careers 2024-4/04_final-project-and-assessment/02_course-wrap-up/03_
cybersecurity
-career-faq.mp4
62.1 MB
Coursera - Introduction to Cloud Computing 2024-4/04_emergent-trends-and-practices/02_cloud-native-applications-devops-and-application-modernization/04_application-modernization.mp4
54.2 MB
Coursera - Introduction to Cloud Computing 2024-4/03_components-of-cloud-computing/01_cloud-infrastructure/06_containers.mp4
45.8 MB
Coursera - Introduction to Cloud Computing 2024-4/04_emergent-trends-and-practices/01_hybrid-multi-cloud-microservices-and-serverless/01_hybrid-multi-cloud.mp4
40.6 MB
Coursera - Introduction to Cloud Computing 2024-4/02_cloud-computing-models/02_deployment-models/03_hybrid-cloud.mp4
39.0 MB
Coursera - Introduction to Cybersecurity Careers 2024-4/04_final-project-and-assessment/02_course-wrap-up/01_landing-your-first-job-in-
cybersecurity
.mp4
30.6 MB
Coursera - Introduction to Cloud Computing 2024-4/01_overview-of-cloud-computing/04_emerging-technologies-accelerated-by-cloud/03_blockchain-and-analytics-in-the-cloud.mp4
27.7 MB
Coursera - Introduction to Cloud Computing 2024-4/03_components-of-cloud-computing/01_cloud-infrastructure/02_virtualization-and-virtual-machines-explained.mp4
25.9 MB
Coursera - Incident Response, BC, and DR Concepts 2024-4/02_incident-response-ir/01_incident-response-ir/01_incident-response.mp4
25.3 MB
Coursera - Introduction to Cloud Computing 2024-4/03_components-of-cloud-computing/02_cloud-storage-and-content-delivery-networks/03_block-storage.mp4
23.8 MB
Coursera - Introduction to Cloud Computing 2024-4/01_overview-of-cloud-computing/04_emerging-technologies-accelerated-by-cloud/01_internet-of-things-in-the-cloud.mp4
23.6 MB
Coursera - Introduction to Cloud Computing 2024-4/03_components-of-cloud-computing/02_cloud-storage-and-content-delivery-networks/06_cdn-content-delivery-networks.mp4
23.5 MB
Coursera - Introduction to Cloud Computing 2024-4/03_components-of-cloud-computing/02_cloud-storage-and-content-delivery-networks/07_expert-viewpoints-cloud-storage.mp4
23.4 MB
Coursera - Introduction to Cloud Computing 2024-4/04_emergent-trends-and-practices/02_cloud-native-applications-devops-and-application-modernization/05_expert-viewpoints-cloud-native-and-emergent-cloud-trends.mp4
23.1 MB
Coursera - Introduction to Cloud Computing 2024-4/04_emergent-trends-and-practices/02_cloud-native-applications-devops-and-application-modernization/01_cloud-native-applications.mp4
21.1 MB
Coursera - Cybersecurity Capstone Breach Response Case Studies 2024-4/01_incident-management-response-and-cyberattack-frameworks/02_cyberattack-frameworks/01_ibm-x-force-iris-cyberattack-framework.mp4
20.3 MB
Coursera - Introduction to Cloud Computing 2024-4/04_emergent-trends-and-practices/01_hybrid-multi-cloud-microservices-and-serverless/02_microservices.mp4
20.2 MB
Coursera - Access Control Concepts 2024-4/02_key-concepts/01_key-concepts/05_user-life-cycle-management.mp4
20.0 MB
Coursera - Security Principles 2024-4/04_security-controls/01_security-controls/01_security-controls.mp4
19.4 MB
[磁力链接]
添加时间:
2025-01-05
大小:
3.6 GB
最近下载:
2025-03-13
热度:
334
Coursera - Microsoft Cybersecurity Analyst Professional Certificate 2024
Coursera - Advanced Cybersecurity Concepts and Capstone Project 2024-1/03_security-conscious-modeling/03_mitigation-strategies/06_network-security.mp4
78.1 MB
Coursera - Cybersecurity Solutions and Microsoft Defender 2024-1/01_azure-basic-security-capabilities/03_azure-firewall-protection/11_hackers-and-firewalls.mp4
49.8 MB
Coursera - Cybersecurity Tools and Technologies 2024-1/03_azure-penetration-testing/03_running-the-test/06_cold-wars-at-sams-scoops.mp4
38.4 MB
Coursera - Cybersecurity Identity and Access Solutions using Azure AD 2024-1/03_active-directory-access-protection-and-governance-management/02_roles-and-role-based-access/04_roles-in-action.mp4
38.0 MB
Coursera - Cybersecurity Solutions and Microsoft Defender 2024-1/03_microsoft-365-defender-threat-protection/03_identity-defense/07_identity-theft.mp4
33.2 MB
Coursera - Introduction to Computers and Operating Systems and Security 2024-1/01_introduction-to-computers-and-operating-systems/01_course-introduction/01_introduction-to-the-program-microsoft-
cybersecurity
-analyst.mp4
33.1 MB
Coursera - Cybersecurity Management and Compliance 2024-1/02_compliance-solutions/03_information-protection-and-data-lifecycle/03_data-concerns.mp4
30.3 MB
Coursera - Advanced Cybersecurity Concepts and Capstone Project 2024-1/02_advanced-threats-and-mitigation/01_susceptible-infrastructure-and-types-of-attack/06_attack-techniques.mp4
30.0 MB
Coursera - Advanced Cybersecurity Concepts and Capstone Project 2024-1/01_threat-modeling/03_threat-modeling-strategies/08_visual-agile-and-simple-threat-vast.mp4
26.3 MB
Coursera - Introduction to Networking and Cloud Computing 2024-1/04_cloud-computing-and-networking/02_virtual-environments/03_virtual-world.mp4
26.1 MB
Coursera - Introduction to Computers and Operating Systems and Security 2024-1/03_business-systems-applications/03_storage-solutions/06_artificial-intelligence-and-machine-learning.mp4
25.9 MB
Coursera - Microsoft SC-900 Exam Preparation and Practice 2024-1/01_concepts-of-security-compliance-and-identity/04_identity-concepts/06_id-and-active-directory.mp4
24.6 MB
Coursera - Cybersecurity Solutions and Microsoft Defender 2024-1/03_microsoft-365-defender-threat-protection/01_defender-services/01_introduction-to-microsoft-365-defender.mp4
23.4 MB
Coursera - Cybersecurity Tools and Technologies 2024-1/03_azure-penetration-testing/01_the-command-line-and-windows-powershell/01_introduction-to-command-line.mp4
23.3 MB
Coursera - Microsoft SC-900 Exam Preparation and Practice 2024-1/04_the-capabilities-of-microsoft-compliance-solutions/03_information-protection-and-data-lifecycle-management-capabilities-of-microsoft/09_module-summary-capabilities-of-microsoft-compliance-solutions.mp4
23.3 MB
Coursera - Advanced Cybersecurity Concepts and Capstone Project 2024-1/01_threat-modeling/03_threat-modeling-strategies/04_process-for-attack-simulation-and-threat-analysis-pasta.mp4
23.2 MB
Coursera - Advanced Cybersecurity Concepts and Capstone Project 2024-1/04_capstone-project/01_capstone-project/01_course-recap-advanced-
cybersecurity
-concepts.mp4
23.0 MB
Coursera - Microsoft SC-900 Exam Preparation and Practice 2024-1/02_the-capabilities-of-microsoft-azure-active-directory/03_identity-protection-and-governance-capabilities-of-azure-ad/01_identity-governance-in-azure-ad.mp4
22.4 MB
Coursera - Advanced Cybersecurity Concepts and Capstone Project 2024-1/01_threat-modeling/04_azure-and-threat-modeling/02_threat-modeling-for-azure-virtual-networks.mp4
22.3 MB
Coursera - Cybersecurity Solutions and Microsoft Defender 2024-1/01_azure-basic-security-capabilities/02_distributed-denial-of-service-ddos-protection/01_azure-ddos-protection-overview.mp4
22.3 MB
[磁力链接]
添加时间:
2025-01-02
大小:
6.5 GB
最近下载:
2025-03-13
热度:
439
The Personal Cybersecurity Manual
The Personal Cybersecurity Manual.m4b
125.8 MB
cover.jpg
33.6 kB
[磁力链接]
添加时间:
2024-12-31
大小:
125.8 MB
最近下载:
2025-03-14
热度:
97
Lynda - Risk Management for IT and Cybersecurity Managers
02 What Is Risk_/002 Types of risk.mp4
77.3 MB
01 Introduction/001 Risk management for IT and security managers.mp4
71.2 MB
04 Calculating Risk/003 Quantitative risk measurement.mp4
45.5 MB
02 What Is Risk_/001 What is risk_.mp4
41.2 MB
04 Calculating Risk/004 Case study_ Equifax.mp4
33.7 MB
02 What Is Risk_/003 Types of threats.mp4
30.6 MB
04 Calculating Risk/002 Qualitative risk measurement.mp4
29.9 MB
03 What Can You Do with Risk_/007 Risk responses.mp4
25.1 MB
03 What Can You Do with Risk_/006 Risk controls.mp4
24.4 MB
03 What Can You Do with Risk_/002 Risk mitigation.mp4
23.5 MB
02 What Is Risk_/004 When risk management fails.mp4
21.4 MB
03 What Can You Do with Risk_/005 Risk acceptance.mp4
20.3 MB
04 Calculating Risk/001 Calculating risk.mp4
17.8 MB
03 What Can You Do with Risk_/004 Risk avoidance.mp4
15.3 MB
03 What Can You Do with Risk_/003 Risk transference.mp4
14.1 MB
05 Conclusion/001 Next steps.mp4
10.5 MB
03 What Can You Do with Risk_/001 What can you do with risk_.mp4
7.1 MB
Ex_Files_Risk_Management_IT_Cybersecurity.zip
705.0 kB
0. Websites you may like/0. (1Hack.Us) Premium Tutorials-Guides-Articles _ Community based Forum.url
377 Bytes
0. Websites you may like/1. (FreeCoursesOnline.Me) Download Udacity, Masterclass, Lynda, PHLearn, Pluralsight Free.url
286 Bytes
[磁力链接]
添加时间:
2024-12-28
大小:
509.8 MB
最近下载:
2025-03-12
热度:
126
Lynda - Cybersecurity for Small and Medium Businesses Essential Training
2.1. The Basics/03.Why you should care.mp4
31.6 MB
1.Introduction/01.Welcome.mp4
21.9 MB
4.3. Protect/16.Technology solutions to protect a business.mp4
20.2 MB
7.6. Recover/28.Cybersecurity insurance.mp4
15.8 MB
4.3. Protect/15.Sharing online - How to prevent a phish.mp4
15.0 MB
2.1. The Basics/07.What are the
cybersecurity
threats.mp4
14.6 MB
4.3. Protect/18.Culture of security - Policies, procedures, and attitude.mp4
14.3 MB
6.5. Respond/24.Key elements of a cyber incident response.mp4
13.6 MB
4.3. Protect/17.Passphrases and authentication.mp4
13.3 MB
3.2. Identify/11.Account access best practices.mp4
12.9 MB
5.4. Detect/21.Cybersecurity assessments and detection technology solutions.mp4
12.8 MB
8.7. Resources/32.Scam and threat alerts.mp4
11.7 MB
8.7. Resources/31.More
cybersecurity
resources.mp4
11.5 MB
3.2. Identify/12.What about the cloud.mp4
11.3 MB
6.5. Respond/26.State breach response laws.mp4
9.6 MB
3.2. Identify/09.Step #1 - Identify key assets.mp4
9.5 MB
6.5. Respond/22.Step #4 - Respond to a cyber breach.mp4
9.3 MB
5.4. Detect/19.Step #3 - Detect a breach.mp4
9.3 MB
2.1. The Basics/05.Anyone can improve the
cybersecurity
of a business.mp4
9.1 MB
9.Conclusion/33.Next steps.mp4
9.0 MB
[磁力链接]
添加时间:
2024-12-25
大小:
358.3 MB
最近下载:
2025-03-14
热度:
277
O`REILLY - The Complete Cybersecurity Bootcamp, 2nd Edition
Lesson 29 Hacking Mobile Platforms/003. 29.2 Hacking iOS.mp4
86.6 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/014. 17.13 Performing SMTP and DNS Enumeration.mp4
80.0 MB
Lesson 21 Fundamentals of Wireless Hacking/004. 21.3 Exploring Wireless Threats.mp4
79.0 MB
Lesson 33 Fundamentals of IoT Security/003. 33.2 Understanding IoT Attacks.mp4
76.8 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/015. 17.14 Conducting Additional Enumeration Techniques.mp4
75.8 MB
Lesson 33 Fundamentals of IoT Security/002. 33.1 Introducing IoT Concepts.mp4
74.4 MB
Lesson 29 Hacking Mobile Platforms/002. 29.1 Understanding Mobile Platform Attack Vectors.mp4
73.4 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/011. 17.1 Performing SNMP Enumeration.mp4
71.8 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/004. 17.3 Understanding Host Discovery.mp4
69.7 MB
Lesson 5 Fundamentals of Incident Response/007. 5.6 Analyzing Computer Incident Response Teams (CSIRTs).mp4
68.5 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/007. 17.6 Scanning Beyond IDS and Firewall.mp4
68.2 MB
Lesson 27 Hacking User Credentials/006. 27.5 Cracking Passwords with John the Ripper.mp4
66.1 MB
Lesson 7 Intrusion Event Categories/009. 7.8 Understanding the MITRE ATT&CK Framework.mp4
65.8 MB
Lesson 29 Hacking Mobile Platforms/004. 29.3 Hacking Android OS.mp4
63.8 MB
Lesson 20 SQL Injection/005. 20.4 Exploring SQL Injection Tools.mp4
63.3 MB
Lesson 21 Fundamentals of Wireless Hacking/003. 21.2 Understanding Wireless Encryption.mp4
62.7 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/013. 17.12 Performing NTP and NFS Enumeration.mp4
61.8 MB
Lesson 16 Information Gathering and Passive Reconnaissance/011. 16.10 Performing Footprinting through Social Engineering.mp4
59.1 MB
Lesson 8 Digital Forensics Fundamentals/004. 8.3 Understanding Evidence Collection.mp4
57.2 MB
Lesson 21 Fundamentals of Wireless Hacking/007. 21.6 Hacking Bluetooth.mp4
52.3 MB
[磁力链接]
添加时间:
2024-12-25
大小:
6.7 GB
最近下载:
2025-03-07
热度:
114
[ DevCourseWeb.com ] Udemy - Cybersecurity Meets Ai - Essentials For 2024
~Get Your Files Here !/4 - AI in Cybersecurity/26 - AI for Automating Incident Response Case Study.mp4
47.6 MB
~Get Your Files Here !/4 - AI in Cybersecurity/25 - AIPowered Threat Detection Case Study.mp4
21.6 MB
~Get Your Files Here !/6 - AI and Cybersecurity in Action/29 - Practical Demonstration Threat Detection Using AI.mp4
21.1 MB
~Get Your Files Here !/5 - Cybersecurity for AI Systems/28 - Ethical Considerations.mp4
20.2 MB
~Get Your Files Here !/5 - Cybersecurity for AI Systems/27 - Protecting AI Models.mp4
18.0 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals/24 - Key Cybersecurity Practices.mp4
17.0 MB
~Get Your Files Here !/2 - Basics of Cybersecurity and AI/7 - Cybersecurity Basics.mp4
5.7 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals/16 - Ransomware.mp4
5.6 MB
~Get Your Files Here !/2 - Basics of Cybersecurity and AI/9 - Basics of AI Key AI Concepts.mp4
5.1 MB
~Get Your Files Here !/1 - Introduction/2 - Course Objectives.mp4
3.7 MB
~Get Your Files Here !/2 - Basics of Cybersecurity and AI/11 - Cybersecurity for AI Systems.mp4
3.7 MB
~Get Your Files Here !/2 - Basics of Cybersecurity and AI/10 - AIs Role in Cybersecurity.mp4
3.6 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals/12 - Part 1 What Are Cyber Threats.mp4
3.4 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals/23 - Summary.mp4
3.3 MB
~Get Your Files Here !/1 - Introduction/3 - Course Layout.mp4
3.1 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals/15 - Phishing.mp4
2.4 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals/20 - Part 3 How Cyber Threats Work.mp4
2.1 MB
~Get Your Files Here !/1 - Introduction/1 - Introduction.mp4
1.9 MB
~Get Your Files Here !/3 - Cybersecurity Fundamentals/22 - Part 5 Mitigating Cyber Threats.mp4
1.9 MB
~Get Your Files Here !/2 - Basics of Cybersecurity and AI/8 - Why Cybersecurity Matters.mp4
1.8 MB
[磁力链接]
添加时间:
2024-12-23
大小:
205.7 MB
最近下载:
2025-03-13
热度:
487
AI-Enabled Programming, Networking, and Cybersecurity
Lesson 2 Using AI for Cybersecurity/004. 2.3 Securing AI Implementations.mp4
66.1 MB
Lesson 1 Introduction to AI-powered Tools/007. 1.6 Introducing Embedding Models.mp4
41.5 MB
Lesson 1 Introduction to AI-powered Tools/006. 1.5 Introducing Retrieval Augmented Generation (RAG).mp4
39.5 MB
Lesson 2 Using AI for Cybersecurity/005. 2.4 Exploring Network Security Processes Incorporating AI Tools.mp4
33.3 MB
Lesson 1 Introduction to AI-powered Tools/003. 1.2 Large Language Models (LLMs) and Small Language Models (SLMs).mp4
31.4 MB
Lesson 3 Using AI for Software Development/008. 3.7 Prompt Engineering for Software Development.mp4
31.0 MB
Lesson 1 Introduction to AI-powered Tools/004. 1.3 Introducing LangChain, LangGraph, Llama Index, and Other Orchestration Frameworks.mp4
28.4 MB
Lesson 4 Using AI for Networking/002. 4.1 Exploring how AI is Revolutionizing Networking.mp4
26.9 MB
Lesson 1 Introduction to AI-powered Tools/009. 1.8 Introducing Semantic Search.mp4
25.6 MB
Lesson 4 Using AI for Networking/003. 4.2 Using GitHub Copilot for Programming Tasks Related to Networking.mp4
23.8 MB
Lesson 4 Using AI for Networking/005. 4.4 Prompt Engineering for Networking.mp4
23.6 MB
Lesson 5 Future Trends and Additional Emerging Technologies/003. 5.2 Regulatory and Policy Frameworks.mp4
23.0 MB
Lesson 3 Using AI for Software Development/005. 3.4 Generating Code from a Prompt.mp4
22.0 MB
Introduction/001. AI-Enabled Programming, Networking, and Cybersecurity Introduction.mp4
21.4 MB
Lesson 1 Introduction to AI-powered Tools/001. Learning objectives.mp4
19.7 MB
Lesson 1 Introduction to AI-powered Tools/008. 1.7 Introducing Vector Databases - pgvector, Chroma, MongoDB Atlas Vector Search, and others.mp4
18.5 MB
Lesson 1 Introduction to AI-powered Tools/002. 1.1 Overview of the Evolution of AI-driven Tools.mp4
18.4 MB
Summary/001. AI-Enabled Programming, Networking, and Cybersecurity Summary.mp4
18.1 MB
Lesson 1 Introduction to AI-powered Tools/005. 1.4 An Overview of Open-source AI Models and Hugging Face.mp4
17.9 MB
Lesson 5 Future Trends and Additional Emerging Technologies/002. 5.1 Exploring Additional Applications of AI in Emerging Technologies.mp4
16.9 MB
[磁力链接]
添加时间:
2024-11-28
大小:
690.1 MB
最近下载:
2025-03-14
热度:
866
[ DevCourseWeb.com ] Udemy - Trustee Shield - Cybersecurity Foundation for Kids and Teens
~Get Your Files Here !/5. Internet Cookies/6. Protection against Cookie risks.mp4
147.6 MB
~Get Your Files Here !/7. Phishing/13. Activity Revised.mp4
141.4 MB
~Get Your Files Here !/1. Passwords/5. Making unhackable password.mp4
115.0 MB
~Get Your Files Here !/5. Internet Cookies/5. Cookies Risks for Online Privacy.mp4
106.2 MB
~Get Your Files Here !/5. Internet Cookies/3. Internet Cookies.mp4
96.9 MB
~Get Your Files Here !/3. Malware/7. Trojan Horses.mp4
96.4 MB
~Get Your Files Here !/4. Insecure Websites/5. Search Engine.mp4
95.6 MB
~Get Your Files Here !/6. Online Privacy/13. How To Protect Privacy- Part (2).mp4
94.8 MB
~Get Your Files Here !/2. Multi-Factor Authentication (MFA)/8. Password Managers.mp4
90.9 MB
~Get Your Files Here !/6. Online Privacy/12. How To Protect Privacy- Part (1).mp4
81.2 MB
~Get Your Files Here !/8. Social Engineering/10. Protection against Social Engineering attacks.mp4
80.4 MB
~Get Your Files Here !/8. Social Engineering/9. Ransomwares.mp4
77.5 MB
~Get Your Files Here !/8. Social Engineering/3. What is Social Engineering.mp4
75.1 MB
~Get Your Files Here !/2. Multi-Factor Authentication (MFA)/6. Two-Factor Authentication (2FA).mp4
70.2 MB
~Get Your Files Here !/1. Passwords/3. Password Definition.mp4
68.9 MB
~Get Your Files Here !/8. Social Engineering/4. Hackers Perspective.mp4
68.3 MB
~Get Your Files Here !/3. Malware/12. Defensive Methods against Malware.mp4
62.5 MB
~Get Your Files Here !/4. Insecure Websites/7. Why HTTPS is More Secure than HTTP.mp4
62.5 MB
~Get Your Files Here !/3. Malware/6. Worms.mp4
61.9 MB
~Get Your Files Here !/6. Online Privacy/8. Digital Footprint Impacts.mp4
61.7 MB
[磁力链接]
添加时间:
2024-11-03
大小:
4.3 GB
最近下载:
2024-11-18
热度:
39
共14页
上一页
1
2
3
4
5
下一页