搜索
为您找到约
275
个磁力链接/BT种子,耗时 0 毫秒。
排序:
相关程度
热度
文件大小
添加时间
最近访问
[FreeCoursesOnline.Me] O`REILLY - Building a Career in Cybersecurity
Lesson 1 Getting Started in the Cybersecurity Field/005. 1.4 Cybersecurity Skills.mp4
65.3 MB
Lesson 2 Planning Your Cybersecurity Career/004. 2.3 The Value of Professional Certifications.mp4
60.1 MB
Lesson 3 Creating Your Own Lab/003. 3.2 Foundational Lab.mp4
48.0 MB
Lesson 5 Preparing for Your Interview/005. 5.4 Final Tips.mp4
44.9 MB
Lesson 6 Using Continuous Improvement Strategy/007. 6.6 Growing Your Career as a Remote Worker.mp4
40.3 MB
Lesson 2 Planning Your Cybersecurity Career/003. 2.2 Creating and Tracking Your Plan.mp4
36.8 MB
Lesson 5 Preparing for Your Interview/003. 5.2 Preparing for the Interview.mp4
35.5 MB
Lesson 1 Getting Started in the Cybersecurity Field/006. 1.5 Navigating through the Industry.mp4
31.9 MB
Lesson 2 Planning Your Cybersecurity Career/002. 2.1 Establishing a Plan.mp4
31.3 MB
Lesson 6 Using Continuous Improvement Strategy/008. 6.7 What’s Next.mp4
31.0 MB
Lesson 1 Getting Started in the Cybersecurity Field/004. 1.3 Cybersecurity Jobs.mp4
30.3 MB
Lesson 5 Preparing for Your Interview/004. 5.3 Advancing in the Interview Process.mp4
29.3 MB
Lesson 6 Using Continuous Improvement Strategy/006. 6.5 Keeping a Good Work-life Balance.mp4
28.2 MB
Lesson 3 Creating Your Own Lab/005. 3.4 Enabling and Using Microsoft Defender for Cloud.mp4
27.7 MB
Introduction/001. Building a Career in Cybersecurity Introduction.mp4
25.1 MB
Lesson 6 Using Continuous Improvement Strategy/003. 6.2 Responsibilities and Expectations.mp4
24.6 MB
Lesson 4 Expanding Your Networking/005. 4.4 Using LinkedIn to Expand Your Network.mp4
24.5 MB
Lesson 1 Getting Started in the Cybersecurity Field/003. 1.2 Roles and Responsibilities.mp4
22.1 MB
Lesson 4 Expanding Your Networking/002. 4.1 Understanding the Cybersecurity Community.mp4
21.9 MB
Lesson 4 Expanding Your Networking/003. 4.2 Identifying Opportunities to Contribute with the Cybersecurity Community.mp4
19.3 MB
[磁力链接]
添加时间:
2023-12-18
大小:
847.7 MB
最近下载:
2025-02-27
热度:
3900
Cybersecurity and Ethical Hacking bundle
Hacking 3 Books in 1.mp3
550.5 MB
Hacking! 3 Books in 1 A Guide to Ethical Hacking, Penetration Testing and Wireless Penetration with Kali Linux.mp3
412.3 MB
Cybersecurity Bible Security Threats, Frameworks, Cryptography & Network Security 4 Books in 1.mp3
411.1 MB
Deep Web The Complete Guide to the Dark Net, with Tor, Kali Linux, and Bitcoin.mp3
277.5 MB
Cybersecurity and Ethical Hacking Playbook A Comprehensive Guide to Protect Your Family and Business from Cybercrime. Includes H.mp3
255.8 MB
Hacking.torrent
19.1 kB
[磁力链接]
添加时间:
2021-03-26
大小:
1.9 GB
最近下载:
2025-02-27
热度:
4545
Humble Bundle - Cybersecurity (2023) by Packt
supplement/practical_hardware_pentesting_supplement.zip
98.3 MB
cybersecurity
_attack_and_defense_strategies.pdf
84.2 MB
network_protocols_for_security_professionals.pdf
66.6 MB
ultimate_kali_linux_book.pdf
53.0 MB
mastering_kali_linux_for_advanced_penetration_testing.pdf
48.7 MB
mastering_malware_analysis.pdf
41.1 MB
practical_threat_intelligence_and_data-driven_threat_hunting.pdf
34.0 MB
mastering_defensive_security.pdf
31.9 MB
mastering_windows_security_and_hardening.pdf
28.8 MB
learn_wireshark.pdf
24.4 MB
purple_team_strategies.pdf
20.6 MB
vulnerability_researcher_s_handbook.pdf
18.2 MB
cybersecurity
_career_masterplan.pdf
17.8 MB
privilege_escalation_techniques.pdf
15.7 MB
malware_analysis_techniques.pdf
15.4 MB
certified_ethical_hacker_ceh_v12312-50_exam_guide.pdf
15.1 MB
mastering_palo_alto_networks.pdf
13.6 MB
comptia_security_plus_sy0-601_certification_guide.pdf
9.8 MB
practical_hardware_pentesting.pdf
8.4 MB
supplement/malware_analysis_techniques_supplement.zip
5.8 MB
[磁力链接]
添加时间:
2023-12-29
大小:
673.5 MB
最近下载:
2025-02-27
热度:
2885
Pós Graduação em Ethical Hacking e CyberSecurity
05 - Análise Forense Computacional/Conteudo de forense-026.rar
5.6 GB
01 - Introdução à Segurança Ofensiva/maquinas virtuais-027.rar
3.6 GB
13 - Introdução à Eletrônica e Hardware Hacking/EHC Introdução à Eletrônica e Hardware Hacking aula 4.7.mp4
1.7 GB
07 - Introdução à Segurança da Informação/Modulo 05 - Criptografia e Esteganografia-015.mp4
1.2 GB
13 - Introdução à Eletrônica e Hardware Hacking/EHC Introdução à Eletrônica e Hardware Hacking aula 4.3.mp4
946.0 MB
07 - Introdução à Segurança da Informação/Modulo 02 - Definicoes sobre a Seguranca da Informacao-014.mp4
895.3 MB
12 - Exploração de Software/EXPS - UN01 - 01.mp4
878.8 MB
07 - Introdução à Segurança da Informação/Modulo 03 - Criminosos e a Legislacao no mundo digital-010.mp4
736.4 MB
06 - Teste de Invasão em Redes e Sistemas/Teste de Invasão em Redes e Sistemas - Aula 3 - Metasploit Nessus Meterpreter John.mp4
710.4 MB
07 - Introdução à Segurança da Informação/Modulo 04 - Politica de Seguranca.mp4
668.0 MB
13 - Introdução à Eletrônica e Hardware Hacking/EHC Introdução à Eletrônica e Hardware Hacking aula 5.2.mp4
598.9 MB
13 - Introdução à Eletrônica e Hardware Hacking/#04 -Gadgets para Pentesters-.mp4
585.5 MB
13 - Introdução à Eletrônica e Hardware Hacking/[SecurityCast] WebCast #54 - Hardware Hacking.mp4
574.7 MB
13 - Introdução à Eletrônica e Hardware Hacking/EHC Introdução à Eletrônica e Hardware Hacking aula 4.6.mp4
553.0 MB
04 - Fundamentos de Redes de Computadores/EHC Introdução à Redes de Computadores Aula 4.3.mp4
524.2 MB
13 - Introdução à Eletrônica e Hardware Hacking/20º Hangout - Gadgets Malignos para -Hackers do Bem- - Jullio Della Flora.mp4
509.6 MB
10 - Administração de Sistemas Operacionais Linux/Administração de Sistemas Linux - Aula 6.mp4
504.4 MB
05 - Análise Forense Computacional/Análise Forense Computacional - 10 - Forense em Windows - ARTEFATOS.mp4
484.1 MB
13 - Introdução à Eletrônica e Hardware Hacking/EHC Introdução à Eletrônica e Hardware Hacking aula 1.2.mp4
478.2 MB
10 - Administração de Sistemas Operacionais Linux/Administração de Sistemas Linux - Aula 2.mp4
463.4 MB
[磁力链接]
添加时间:
2023-12-22
大小:
59.4 GB
最近下载:
2025-02-27
热度:
11596
[ CourseLala.com ] Udemy - Personal Digital Security Everyone Must Have - Cybersecurity
~Get Your Files Here !/02 - Secure your computer from unauthorized access/001 Social Engineering.mp4
157.3 MB
~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/007 Secure your Wi-Fi at Home (Video HD).mp4
103.2 MB
~Get Your Files Here !/02 - Secure your computer from unauthorized access/003 Use strong passwords.mp4
93.7 MB
~Get Your Files Here !/03 - What is Malware and its types/003 Spyware.mp4
66.9 MB
~Get Your Files Here !/06 - Secure your Smartphone/003 Communicating Securely with your Smartphone.mp4
64.7 MB
~Get Your Files Here !/03 - What is Malware and its types/002 Adware.mp4
63.9 MB
~Get Your Files Here !/05 - Email Security/002 Fishing.mp4
57.8 MB
~Get Your Files Here !/02 - Secure your computer from unauthorized access/012 Be cautious.mp4
54.8 MB
~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/002 Tips for buying online.mp4
46.0 MB
~Get Your Files Here !/06 - Secure your Smartphone/001 Purses, Wallets, Smartphones.mp4
43.1 MB
~Get Your Files Here !/03 - What is Malware and its types/001 Trojan Horse.mp4
39.6 MB
~Get Your Files Here !/03 - What is Malware and its types/007 Scareware.mp4
39.5 MB
~Get Your Files Here !/03 - What is Malware and its types/004 Browser Hijacking Software.mp4
37.3 MB
~Get Your Files Here !/02 - Secure your computer from unauthorized access/008 Use a VPN.mp4
36.0 MB
~Get Your Files Here !/03 - What is Malware and its types/005 Viruses.mp4
35.6 MB
~Get Your Files Here !/01 - Introduction to Personal Digital Security/003 Some statistics.mp4
35.0 MB
~Get Your Files Here !/02 - Secure your computer from unauthorized access/004 Use password manager.mp4
33.8 MB
~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/001 Safe browsing.mp4
31.8 MB
~Get Your Files Here !/04 - Safe Web-surfing the World Wide Web/008 Safe browsing in Social Networks.mp4
31.7 MB
~Get Your Files Here !/01 - Introduction to Personal Digital Security/001 Introduction to Personal Digital Security.mp4
30.4 MB
[磁力链接]
添加时间:
2022-04-12
大小:
1.5 GB
最近下载:
2025-02-27
热度:
685
[FreeCoursesOnline.Me] [Packtpub.Com] Cybersecurity - Methods of Protection (Blue Team Activity) - [FCO]
01.Securing Your Network/0101.The Course Overview.mp4
22.8 MB
01.Securing Your Network/0102.Understanding Firewalls and Tuning Them Up.mp4
28.7 MB
01.Securing Your Network/0103.How to Work with IDSIPS.mp4
24.0 MB
01.Securing Your Network/0104.Securing Your Wi-Fi Network.mp4
90.9 MB
01.Securing Your Network/0105.Ferreting out a Hacker by IP.mp4
101.3 MB
01.Securing Your Network/0106.Analyzing Traffic Wireshark.mp4
25.3 MB
01.Securing Your Network/0107.The Fastest Way to Detect ARP Poisoning Attack.mp4
21.8 MB
01.Securing Your Network/0108.Analyzing Your Traffic to Catch a Spy with Wireshark.mp4
35.4 MB
01.Securing Your Network/0109.Looking for Spies with a Python Script.mp4
50.2 MB
01.Securing Your Network/0110.How to Outfox Ransomware.mp4
28.9 MB
01.Securing Your Network/0111.Advanced-level Techniques What to Do If Hackers Already in Your Network.mp4
40.3 MB
02.Securing Your Website/0201.Brute-Forcing Website Passwords with OWASP ZAP.mp4
45.6 MB
02.Securing Your Website/0202.How to Create a Bulletproof Password in a Second.mp4
68.9 MB
02.Securing Your Website/0203.Testing a Website for SQL Injection with Burp Suite.mp4
30.9 MB
02.Securing Your Website/0204.Testing a Website for XSS Vulnerability.mp4
29.8 MB
02.Securing Your Website/0205.Building Fortifications – Input Validation and Whitelisting.mp4
99.3 MB
02.Securing Your Website/0206.Testing Your SSLTLS Connection.mp4
21.2 MB
02.Securing Your Website/0207.Scanning Your Website for Malicious Scripts.mp4
91.1 MB
02.Securing Your Website/0208.Protecting from a Session Hijacking Attack.mp4
27.7 MB
02.Securing Your Website/0209.The Big Strategy – Three Shortcuts to Secure a Web Application.mp4
68.6 MB
[磁力链接]
添加时间:
2018-11-13
大小:
1.3 GB
最近下载:
2025-02-27
热度:
1311
[CourseClub.Me] ITProTV - NIST Cybersecurity And Risk Management Frameworks
2. NIST Cybersecurity and Publications.mp4
298.0 MB
26. Response Training and Testing.mp4
288.9 MB
24. Incident Response Plan Examples.mp4
279.3 MB
43. Documentation and Approval.mp4
277.5 MB
20. System Auditing and Logging.mp4
258.9 MB
23. Response Planning.mp4
255.7 MB
29. Backup and Recovery.mp4
251.4 MB
9. Inventory of Critical Assets.mp4
247.4 MB
46. Documenting Controls.mp4
246.5 MB
21. Monitoring and Alerting.mp4
238.7 MB
22. Assessments.mp4
238.7 MB
42. Control Allocation and Monitoring.mp4
234.0 MB
10. Business Impact Assessment.mp4
231.6 MB
40. NIST Control Documents.mp4
230.2 MB
36. Establishing Scope.mp4
227.5 MB
44. Security Control Implementation.mp4
225.8 MB
3. NIST Relationships.mp4
222.6 MB
6. The Vocabulary of Risk.mp4
222.0 MB
25. Digital Forensics.mp4
219.4 MB
51. Assessment Documentation.mp4
219.2 MB
[磁力链接]
添加时间:
2024-01-03
大小:
11.3 GB
最近下载:
2025-02-27
热度:
2948
The Cybersecurity Threat Landscape
[TutsNode.net] - The Cybersecurity Threat Landscape/10 - 9. Supply Chain Attacks and Third-Party Risks/01 - The threat of supply chain attacks and third-party risks.mp4
16.2 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/05 - 4. Botnets and DDoS attacks/02 - Protect against botnets and DDoS threats.mp4
15.8 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/08 - 7. Unmanaged IoT Devices/01 - Explore the threat of unmanaged IoT devices.mp4
14.4 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/09 - 8. Shadow IT/01 - Explore the threat of shadow IT.mp4
14.2 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/08 - 7. Unmanaged IoT Devices/02 - Protect against unmanaged IoT devices.mp4
12.4 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/09 - 8. Shadow IT/02 - Protect against shadow IT.mp4
12.4 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/06 - 5. Deepfakes/02 - Protect against deepfakes.mp4
12.1 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/03 - 2. Phishing and Smishing/02 - Protect against phishing and smishing.mp4
12.0 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/11 - Conclusion/01 - Stay up to date on
cybersecurity
.mp4
11.8 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/02 - 1. Malware and Ransomware/02 - Protect against malware and ransomware.mp4
11.7 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/02 - 1. Malware and Ransomware/01 - Explore the threat of malware and ransomware.mp4
11.6 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/03 - 2. Phishing and Smishing/01 - Explore the threat of phishing and smishing.mp4
11.3 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/05 - 4. Botnets and DDoS attacks/01 - Explore the threat of botnets and DDoS attacks.mp4
11.1 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/07 - 6. Insider Threats/01 - Explore the risk of insider threats.mp4
10.9 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/10 - 9. Supply Chain Attacks and Third-Party Risks/02 - Protect against supply chain attacks and third-party risks.mp4
10.5 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/04 - 3. Business Email Compromise/01 - Explore the threat of business email compromise.mp4
9.4 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/01 - Introduction/01 - Examine the
cybersecurity
threat landscape.mp4
9.4 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/04 - 3. Business Email Compromise/02 - Protect against business email compromise.mp4
9.2 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/06 - 5. Deepfakes/01 - Explore the threat of deepfakes.mp4
9.0 MB
[TutsNode.net] - The Cybersecurity Threat Landscape/07 - 6. Insider Threats/02 - Protect against insider threats.mp4
7.0 MB
[磁力链接]
添加时间:
2023-12-17
大小:
235.6 MB
最近下载:
2025-02-27
热度:
877
Cybersecurity in the Transportation Industry.pdf
Cybersecurity in the Transportation Industry.pdf
56.5 MB
[磁力链接]
添加时间:
2025-01-17
大小:
56.5 MB
最近下载:
2025-02-27
热度:
294
[ DevCourseWeb.com ] Udemy - Microsoft Cybersecurity Pro Track - Security in Office 365.zip
[ DevCourseWeb.com ] Udemy - Microsoft Cybersecurity Pro Track - Security in Office 365.zip
1.5 GB
[磁力链接]
添加时间:
2021-04-19
大小:
1.5 GB
最近下载:
2025-02-27
热度:
1074
[FreeCoursesOnline.Me] O`REILLY - The Complete Cybersecurity Bootcamp, 2nd Edition
Lesson 29 Hacking Mobile Platforms/003. 29.2 Hacking iOS.mp4
86.6 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/014. 17.13 Performing SMTP and DNS Enumeration.mp4
80.0 MB
Lesson 21 Fundamentals of Wireless Hacking/004. 21.3 Exploring Wireless Threats.mp4
79.0 MB
Lesson 33 Fundamentals of IoT Security/003. 33.2 Understanding IoT Attacks.mp4
76.8 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/015. 17.14 Conducting Additional Enumeration Techniques.mp4
75.8 MB
Lesson 33 Fundamentals of IoT Security/002. 33.1 Introducing IoT Concepts.mp4
74.4 MB
Lesson 29 Hacking Mobile Platforms/002. 29.1 Understanding Mobile Platform Attack Vectors.mp4
73.4 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/011. 17.1 Performing SNMP Enumeration.mp4
71.8 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/004. 17.3 Understanding Host Discovery.mp4
69.7 MB
Lesson 5 Fundamentals of Incident Response/007. 5.6 Analyzing Computer Incident Response Teams (CSIRTs).mp4
68.5 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/007. 17.6 Scanning Beyond IDS and Firewall.mp4
68.2 MB
Lesson 27 Hacking User Credentials/006. 27.5 Cracking Passwords with John the Ripper.mp4
66.1 MB
Lesson 7 Intrusion Event Categories/009. 7.8 Understanding the MITRE ATT&CK Framework.mp4
65.8 MB
Lesson 29 Hacking Mobile Platforms/004. 29.3 Hacking Android OS.mp4
63.8 MB
Lesson 20 SQL Injection/005. 20.4 Exploring SQL Injection Tools.mp4
63.3 MB
Lesson 21 Fundamentals of Wireless Hacking/003. 21.2 Understanding Wireless Encryption.mp4
62.7 MB
Lesson 17 Active Reconnaissance, Scanning, and Enumeration/013. 17.12 Performing NTP and NFS Enumeration.mp4
61.8 MB
Lesson 16 Information Gathering and Passive Reconnaissance/011. 16.10 Performing Footprinting through Social Engineering.mp4
59.1 MB
Lesson 8 Digital Forensics Fundamentals/004. 8.3 Understanding Evidence Collection.mp4
57.2 MB
Lesson 21 Fundamentals of Wireless Hacking/007. 21.6 Hacking Bluetooth.mp4
52.3 MB
[磁力链接]
添加时间:
2023-12-27
大小:
6.7 GB
最近下载:
2025-02-27
热度:
9074
Rick Howard - Cybersecurity First Principles- A Reboot of Strategy and Tactics
Cybersecurity First Principles.m4b
277.0 MB
Rick Howard - Cybersecurity First Principles- A Reboot of Strategy and Tactics.pdf
9.0 MB
Cybersecurity First Principles.jpg
24.9 kB
[磁力链接]
添加时间:
2024-01-06
大小:
286.0 MB
最近下载:
2025-02-27
热度:
8671
Palo Alto Networks Cybersecurity Fundamentals (PCCSA)
Chapter 1 Cybersecurity Fundamentals and Threat Landscape/002. Identify Computing and Networking Trends.mp4
118.2 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/006. Identify Networking Security Technologies.mp4
114.7 MB
Chapter 1 Cybersecurity Fundamentals and Threat Landscape/003. Describe Cybersecurity Threats.mp4
108.3 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/004. Review Network Addressing.mp4
105.2 MB
Chapter 1 Cybersecurity Fundamentals and Threat Landscape/005. Identify Wi-Fi Vulnerabilities and Attacks.mp4
100.1 MB
Chapter 1 Cybersecurity Fundamentals and Threat Landscape/004. Describe Common Cyberattack Techniques.mp4
96.3 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/011. Endpoint Security.mp4
95.3 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/002. Describe Routing Protocols.mp4
91.8 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/001. Identify Basic Internet and Network Operations.mp4
90.7 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/012. Server and System Administration.mp4
90.3 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/003. Review Networking Models.mp4
88.4 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/009. Learn Basic Virtualization Security Concepts.mp4
83.8 MB
Chapter 3 Palo Alto Networks Security Solutions and Technologies/007. Describe Cortex XSOAR and AutoFocus.mp4
79.5 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/008. Learn Basic Cloud Security Concepts.mp4
75.4 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/010. Learn Basic DevOps Security Concepts.mp4
75.3 MB
Chapter 3 Palo Alto Networks Security Solutions and Technologies/001. Identify Palo Alto Networks Security Solutions.mp4
74.3 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/005. Learn Networking Security Models.mp4
72.6 MB
Chapter 3 Palo Alto Networks Security Solutions and Technologies/002. Describe Basic NGFW Components and Functions.mp4
67.1 MB
Chapter 2 Networking Fundamentals and Cybersecurity Practices/007. Learn Basic Data Center Security Concepts.mp4
60.2 MB
Chapter 3 Palo Alto Networks Security Solutions and Technologies/003. Learn Basic Prisma Cloud.mp4
59.7 MB
[磁力链接]
添加时间:
2024-02-29
大小:
2.0 GB
最近下载:
2025-02-27
热度:
4565
Cybersecurity Program Development for Business The Essential Planning Guide.m4b
Cybersecurity Program Development for Business The Essential Planning Guide.m4b
261.8 MB
[磁力链接]
添加时间:
2018-11-03
大小:
261.8 MB
最近下载:
2025-02-27
热度:
1174
Cybersecurity Threat Hunting for SOC Analysts
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/10. Adversary Emulation Caldera.mp4
359.9 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/12. Enhanced Lab Realism Bad Blood + Microsoft ATA + Bloodhound!.mp4
338.8 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/1. Threat Hunting with Splunk + Zeek.mp4
243.3 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/7. Adversary Emulation Atomic Red Team + MITRE ATT&CK.mp4
242.7 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/6. Purple Team Scenario Meterpreter + MSFVenom + Process Injection + Velociraptor!.mp4
225.7 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/3. The Modern Threat Hunting Mindset.mp4
225.3 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/5. The Methodical Guide to Effective Threat Hunting/1. Finding Beacons Long and Cumulative Connections.mp4
201.8 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/6. Proofs Detecting False Negatives/2. Suricata vs RITA Zeus Malware.mp4
195.4 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/5. The Methodical Guide to Effective Threat Hunting/5. Finding Beacons Business Need Analysis (Part 4).mp4
194.3 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/2. Threat Hunting with Splunk + Sysmon.mp4
153.3 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/5. The Methodical Guide to Effective Threat Hunting/4. Finding Beacons Business Need Analysis (Part 3).mp4
139.4 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/5. Beaconing DNS.mp4
135.2 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/8. Beaconing Detection Session Size Analysis.mp4
133.5 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/6. Proofs Detecting False Negatives/1. Suricata Capabilities + Installation!.mp4
129.8 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/3. Tools and resources/8. zeek.mp4
126.9 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/2. The Broken Threat Hunting Mindset.mp4
126.1 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/3. Tools and resources/9. Using zeek + Rita to find Evil!.mp4
118.9 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/1. Understanding the New Adversary.mp4
118.7 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/4. Threat Hunting Concepts/6. Beaconing CDN.mp4
117.8 MB
[TutsNode.com] - Cybersecurity Threat Hunting for SOC Analysts/8. Threat Hunting Hands on Practice/5. Purple Team Scenario Mimikatz.mp4
115.6 MB
[磁力链接]
添加时间:
2022-05-05
大小:
6.2 GB
最近下载:
2025-02-27
热度:
8847
Cybersecurity and Cyberwar.m4b
Cybersecurity and Cyberwar.m4b
328.4 MB
[磁力链接]
添加时间:
2023-12-23
大小:
328.4 MB
最近下载:
2025-02-27
热度:
4265
Trust Genics - 2020 - Cybersecurity (Technology)
Cybersecurity.mp3
109.7 MB
Cybersecurity.jpg
52.5 kB
Cybersecurity - Trust Genics - 2020.txt
2.1 kB
Downloaded From TorrentGalaxy.txt
583 Bytes
Downloaded From Glodls.txt
237 Bytes
Downloaded From ETTV.txt
138 Bytes
Downloaded From ProStyleX.txt
101 Bytes
Downloaded From 1337X.txt
96 Bytes
Downloaded From Demonoid.txt
50 Bytes
Downloaded From Katcr.co.txt
43 Bytes
[磁力链接]
添加时间:
2022-03-05
大小:
109.7 MB
最近下载:
2025-02-27
热度:
1030
SC-100 Microsoft Cybersecurity Architect
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/32. Another example on Application Objects.mp4
143.6 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/17. Lab - Microsoft Sentinel - Generating Incidents.mp4
127.1 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/29. Building a Docker Image.mp4
119.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/31. Deploying the container.mp4
113.6 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/15. Review of the Azure Firewall service.mp4
107.9 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/23. Microsoft Sentinel - Automation.mp4
107.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/32.1 AuthApp.zip
106.5 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/18. Example on using Azure Blueprints.mp4
95.8 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/7. Microsoft Defender for Cloud - Secure Management Ports.mp4
93.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/6. Microsoft Defender for Cloud - Servers.mp4
93.0 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/30. Example on using Application Objects.mp4
90.8 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/24. Storing Azure Cosmos DB keys.mp4
89.3 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/14. Microsoft Defender for Cloud - AWS resources.mp4
88.7 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/25. NSG Flow logs.mp4
86.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/15. Lab - Microsoft Sentinel - Data connectors.mp4
80.0 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/39. Review - Azure AD Privileged Identity Management.mp4
77.7 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/35. Example on Enterprise Applications.mp4
77.1 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/6. Azure Storage Accounts - Azure AD Authentication.mp4
75.1 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/3. Lab - Azure SQL database - Dynamic data masking.mp4
74.2 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/16. Lab - Microsoft Sentinel - Azure Activity.mp4
64.7 MB
[磁力链接]
添加时间:
2023-12-22
大小:
4.6 GB
最近下载:
2025-02-27
热度:
4988
[ FreeCourseWeb.com ] PluralSight - Building a CyberSecurity Home Lab Environment.zip
[ FreeCourseWeb.com ] PluralSight - Building a CyberSecurity Home Lab Environment.zip
376.0 MB
[磁力链接]
添加时间:
2021-04-12
大小:
376.0 MB
最近下载:
2025-02-27
热度:
2815
CBTNuggets - Microsoft Certified Cybersecurity Architect Expert (SC-100) Online Training 2023-2
2. Translating Security Requirements/6. Azure Security Benchmark - Microsoft Certified Cybersecurity-1.mp4
113.5 MB
3. Designing Security Strategies/2. Hybrid Environmental Security Strategies - Microsoft Certifi.mp4
63.8 MB
10. Design a security strategy for data and applications/1. Specify Priorities for Mitigating Threats to Apps - Microsof-1.mp4
62.3 MB
6. Designing a Regulatory Compliance Strategy/4. Implementing Azure Policy - Microsoft Certified Cybersecurit.mp4
59.0 MB
7. Evaluating and Managing Security Postures/6. Mitigating Identified Risks - Microsoft Certified Cybersecur-1.mp4
53.6 MB
3. Designing Security Strategies/4. Traffic Filtering and Segmentation Strategies - Microsoft Ce-1.mp4
53.4 MB
10. Design a security strategy for data and applications/4. Priorities For Mitigating Threats To Data - Microsoft Certif-1.mp4
53.4 MB
3. Designing Security Strategies/5. Azure Best Practices for Network Security - Microsoft Certif-1.mp4
52.2 MB
1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/5. Hybrid Infrastructure - Microsoft Certified Cybersecurity Ar-1.mp4
50.4 MB
6. Designing a Regulatory Compliance Strategy/6. Translating Privacy Requirements - Microsoft Certified Cyber.mp4
49.7 MB
9. Designing a Strategy for Securing SaaS, PaaS, and IaaS Services/1. Security Baselines for SaaS, PaaS, and IaaS services - Micro.mp4
48.3 MB
2. Translating Security Requirements/3. Translating Business Goals into Security Requirements - Micr.mp4
47.9 MB
2. Translating Security Requirements/7. Securing Privileged Access Using RaMP - Microsoft Certified -1.mp4
47.8 MB
1. Examining the Microsoft Cybersecurity Reference Architecture (MCRA)/2. Security Operations - Microsoft Certified Cybersecurity Arch-1.mp4
47.0 MB
4. Designing a Security Operations Strategy/5. SIEMSOAR Strategy - Microsoft Certified Cybersecurity Archit.mp4
46.3 MB
2. Translating Security Requirements/2. Translating Requirements - Microsoft Certified Cybersecurity.mp4
46.2 MB
10. Design a security strategy for data and applications/3. Security Strategy for Applications and APIs - Microsoft Cert-1.mp4
44.6 MB
5. Designing an Identity Security Strategy/1. Strategy for Access to Cloud Resources - Microsoft Certified.mp4
43.0 MB
7. Evaluating and Managing Security Postures/4. Designing Security for an Azure Landing Zone - Microsoft Cer.mp4
42.8 MB
4. Designing a Security Operations Strategy/3. Logging and Auditing Strategy - Microsoft Certified Cybersec.mp4
42.3 MB
[磁力链接]
添加时间:
2025-02-15
大小:
2.5 GB
最近下载:
2025-02-27
热度:
72
共14页
上一页
1
2
3
4
5
下一页