磁力搜索 BT种子搜索利器 免费下载BT种子,超4000万条种子数据
为您找到约 18782 个磁力链接/BT种子,耗时 38 毫秒。
排序: 相关程度 热度 文件大小 添加时间 最近访问

Five Nights at Freddy's - Security Breach [FitGirl Repack]

  • fg-01.bin 27.0 GB
  • fg-02.bin 2.7 GB
  • fg-optional-videos.bin 2.2 GB
  • Setup.exe 79.8 MB
  • fg-03.bin 73.2 MB
  • data0.bin 4.0 MB
  • MD5/QuickSFV.EXE 103.4 kB
  • MD5/fitgirl-bins.md5 257 Bytes
  • MD5/QuickSFV.ini 155 Bytes
  • Verify BIN files before installation.bat 69 Bytes
[磁力链接] 添加时间:2025-07-01 大小:32.1 GB 最近下载:2025-12-26 热度:137

[TutsNode.org] - CompTIA Security+ (SY0-701) Complete Course & Exam

  • 28 - Conclusion/001 Conclusion.mp4 294.3 MB
  • 08 - Cryptographic Solutions/001 Cryptographic Solutions (OBJ 1.4, 2.3, & 2.4).mp4 269.7 MB
  • 02 - Fundamentals of Security/001 Fundamentals of Security.mp4 204.1 MB
  • 06 - Malware/001 Malware (OBJ 2.4).mp4 195.3 MB
  • 16 - Security Infrastructure/008 Securing Network Communications (OBJ 3.2).mp4 192.3 MB
  • 22 - Vulnerability Management/006 Conducting Vulnerability Scans (OBJ 4.3).mp4 170.9 MB
  • 01 - Introduction/002 Exam Tips.mp4 165.3 MB
  • 13 - Audits and Assessments/008 Performing a Basic PenTest (OBJ 5.5).mp4 161.5 MB
  • 26 - Automation and Orchestration/001 Automation and Orchestration (OBJ 4.7).mp4 147.6 MB
  • 18 - Vulnerabilities and Attacks/001 Vulnerabilities and Attacks (OBJ 2.2, 2.3, 2.4, 2.5, & 4.1).mp4 146.3 MB
  • 04 - Physical Security/007 Door Locks (OBJ 1.2).mp4 141.8 MB
  • 24 - Incident Response/006 Digital Forensic Procedures (OBJ 4.8).mp4 140.6 MB
  • 18 - Vulnerabilities and Attacks/009 XSS and XSRF (OBJ 2.3 & 2.4).mp4 138.7 MB
  • 17 - Identity and Access Management (IAM) Solutions/004 Password Security (OBJ 4.6).mp4 129.3 MB
  • 05 - Social Engineering/002 Motivational Triggers (OBJ 5.6).mp4 126.1 MB
  • 23 - Alerting and Monitoring/001 Alerting and Monitoring (OBJ 4.4).mp4 125.6 MB
  • 21 - Security Techniques/010 Selecting Secure Protocols (OBJ 4.5).mp4 121.3 MB
  • 17 - Identity and Access Management (IAM) Solutions/003 Multifactor Authentication (OBJ 4.6).mp4 116.2 MB
  • 14 - Cyber Resilience and Redundancy/009 Redundant Site Considerations (OBJ 3.4).mp4 114.2 MB
  • 08 - Cryptographic Solutions/008 Digital Certificates (OBJ 1.4).mp4 113.7 MB
[磁力链接] 添加时间:2025-06-29 大小:17.9 GB 最近下载:2025-12-23 热度:150

Tomorrows.World.Today.S04E16.Cyber.Security.480p.x264-mSD[eztv.re].mkv

  • Tomorrows.World.Today.S04E16.Cyber.Security.480p.x264-mSD[eztv.re].mkv 72.9 MB
[磁力链接] 添加时间:2025-06-26 大小:72.9 MB 最近下载:2025-09-27 热度:37

[ WebToolTip.com ] Udemy - Hybrid Warfare And National Security

  • ~Get Your Files Here !/2 - Section 2 Historical Evolution and Key Concepts/4 - Lecture 21 The Evolution of Hybrid Warfare Through History.mkv 149.3 MB
  • ~Get Your Files Here !/7 - Section 7 Capstone Assignment and Course Conclusion/19 - Lecture 71 Capstone Assignment Guidelines.mkv 119.1 MB
  • ~Get Your Files Here !/4 - Section 4 Case Studies in Hybrid Warfare/11 - Lecture 42 Chinas Gray Zone Tactics in the South China Sea.mkv 110.3 MB
  • ~Get Your Files Here !/6 - Section 6 Future Trends and Challenges/16 - Lecture 61 The Role of Artificial Intelligence in Hybrid Warfare.mkv 104.6 MB
  • ~Get Your Files Here !/2 - Section 2 Historical Evolution and Key Concepts/6 - Lecture 23 Legal and Ethical Implications.mkv 97.8 MB
  • ~Get Your Files Here !/6 - Section 6 Future Trends and Challenges/18 - Lecture 63 Strategic Adaptations for Future Conflicts.mkv 85.1 MB
  • ~Get Your Files Here !/1 - Section 1 Introduction to Hybrid Warfare and Gray Zone Tactics/1 - Lecture 10 Course Introduction and Learning Objectives.mkv 83.9 MB
  • ~Get Your Files Here !/1 - Section 1 Introduction to Hybrid Warfare and Gray Zone Tactics/2 - Lecture 11 Defining Hybrid Warfare and Gray Zone Tactics.mkv 80.8 MB
  • ~Get Your Files Here !/3 - Section 3 Tools of Hybrid Warfare/8 - Lecture 32 Economic Coercion and Proxy Warfare.mkv 79.5 MB
  • ~Get Your Files Here !/5 - Section 5 Strategies for Countering Hybrid Threats/13 - Lecture 51 Strengthening National Resilience.mkv 69.0 MB
  • ~Get Your Files Here !/5 - Section 5 Strategies for Countering Hybrid Threats/14 - Lecture 52 Military and NonMilitary Countermeasures.mkv 39.7 MB
  • ~Get Your Files Here !/4 - Section 4 Case Studies in Hybrid Warfare/10 - Lecture 41 Russia in Ukraine A Playbook for Hybrid Operations.mkv 36.6 MB
  • ~Get Your Files Here !/4 - Section 4 Case Studies in Hybrid Warfare/12 - Lecture 43 Cyber and Election Interference in Western Democracies.mkv 35.7 MB
  • ~Get Your Files Here !/6 - Section 6 Future Trends and Challenges/17 - Lecture 62 Emerging Threats in the Gray Zone.mkv 31.5 MB
  • ~Get Your Files Here !/1 - Section 1 Introduction to Hybrid Warfare and Gray Zone Tactics/3 - Lecture 12 Key Characteristics and Importance in Modern Conflict.mkv 30.5 MB
  • ~Get Your Files Here !/2 - Section 2 Historical Evolution and Key Concepts/5 - Lecture 22 The Role of State and NonState Actors in the Gray Zone.mkv 28.0 MB
  • ~Get Your Files Here !/5 - Section 5 Strategies for Countering Hybrid Threats/15 - Lecture 53 Multilateral Approaches NATO EU and Beyond.mkv 24.4 MB
  • ~Get Your Files Here !/3 - Section 3 Tools of Hybrid Warfare/9 - Lecture 33 Psychological and Propaganda Campaigns.mkv 13.8 MB
  • ~Get Your Files Here !/3 - Section 3 Tools of Hybrid Warfare/7 - Lecture 31 Cyber Operations From Hacking to Disinformation.mkv 11.9 MB
  • Get Bonus Downloads Here.url 180 Bytes
[磁力链接] 添加时间:2025-06-25 大小:1.2 GB 最近下载:2025-12-26 热度:665

SCADA Security Analyst.7z

  • SCADA Security Analyst.7z 1.3 GB
[磁力链接] 添加时间:2025-06-25 大小:1.3 GB 最近下载:2025-11-25 热度:9

SCADA Security Fundamentals.7z

  • SCADA Security Fundamentals.7z 686.5 MB
[磁力链接] 添加时间:2025-06-25 大小:686.5 MB 最近下载:2025-10-28 热度:47

[ WebToolTip.com ] Udemy - Blue Team Defense - Security Operations and Incident Response

  • ~Get Your Files Here !/1 - Introduction to Blue team/2 -Blue team Methodology.mp4 391.9 MB
  • ~Get Your Files Here !/5 - Digital Forensics/1 -Digital Forensics.mp4 308.3 MB
  • ~Get Your Files Here !/2 - Security Information and Event Management (SIEM)/1 -Security Information and Event Management (SIEM).mp4 300.1 MB
  • ~Get Your Files Here !/4 - SOAR – Security Orchestration Automation Response/1 -SOAR – Security Orchestration Automation Response.mp4 288.8 MB
  • ~Get Your Files Here !/1 - Introduction to Blue team/1 -Introduction to Blue team.mp4 247.4 MB
  • ~Get Your Files Here !/3 - Incident Response ToolkitProcess/1 -Incident Response ToolkitProcess.mp4 195.9 MB
  • ~Get Your Files Here !/6 - Practice Exam, Mock Exam And Flashcards/1 -blue team Flash Crads certcop.pdf 2.4 MB
  • Get Bonus Downloads Here.url 180 Bytes
  • ~Get Your Files Here !/Bonus Resources.txt 70 Bytes
  • ~Get Your Files Here !/6 - Practice Exam, Mock Exam And Flashcards/1 - Flashcards.html 41 Bytes
[磁力链接] 添加时间:2025-06-24 大小:1.7 GB 最近下载:2025-12-25 热度:212

[ WebToolTip.com ] Udemy - Conquer Check Point Certified Security Administrator (CCSA)

  • ~Get Your Files Here !/3 - Security Policies and Rule Base/2 -Rule Matching, Layers, and Order of Evaluation.mp4 30.7 MB
  • ~Get Your Files Here !/5 - Security Management Overview/2 -Security Policy Installation & Versioning.mp4 30.4 MB
  • ~Get Your Files Here !/4 - Network Address Translation (NAT)/1 -NAT Concepts in Check Point.mp4 29.3 MB
  • ~Get Your Files Here !/9 - High Availability and Clustering/1 -Introduction to ClusterXL and HA Concepts.mp4 27.7 MB
  • ~Get Your Files Here !/11 - VPN Technologies/1 -VPN Fundamentals in Check Point.mp4 24.0 MB
  • ~Get Your Files Here !/3 - Security Policies and Rule Base/1 -Security Policy Fundamentals.mp4 23.4 MB
  • ~Get Your Files Here !/11 - VPN Technologies/3 -Remote Access VPN Concepts.mp4 22.9 MB
  • ~Get Your Files Here !/8 - Licensing and System Management/1 -Check Point Licensing Explained.mp4 22.2 MB
  • ~Get Your Files Here !/2 - Security Architecture and Core Technologies/1 -Check Point Security Architecture Essentials.mp4 22.1 MB
  • ~Get Your Files Here !/6 - Logging and Monitoring/1 -Logging Architecture and Concepts.mp4 21.8 MB
  • ~Get Your Files Here !/5 - Security Management Overview/1 -SmartConsole Overview and Architecture.mp4 21.6 MB
  • ~Get Your Files Here !/7 - Identity Awareness/1 -Identity Awareness Fundamentals.mp4 21.1 MB
  • ~Get Your Files Here !/10 - Threat Prevention Overview/1 -Threat Prevention Blades Overview.mp4 19.6 MB
  • ~Get Your Files Here !/2 - Security Architecture and Core Technologies/2 -Understanding Check Point Processes and Modes.mp4 19.3 MB
  • ~Get Your Files Here !/8 - Licensing and System Management/2 -Software Updates and Upgrade Concepts.mp4 19.1 MB
  • ~Get Your Files Here !/1 - Introduction to Check Point & the CCSA Certification/1 -Introduction to Check Point and CCSA Certification.mp4 17.5 MB
  • ~Get Your Files Here !/11 - VPN Technologies/2 -VPN Communities and Policy Structure.mp4 17.4 MB
  • ~Get Your Files Here !/12 - Troubleshooting and Diagnostics/1 -Troubleshooting Methodologies in Check Point.mp4 15.8 MB
  • ~Get Your Files Here !/6 - Logging and Monitoring/2 -SmartLog and SmartEvent in Theory.mp4 15.6 MB
  • ~Get Your Files Here !/10 - Threat Prevention Overview/2 -Detection Techniques and Workflow.mp4 15.4 MB
[磁力链接] 添加时间:2025-06-24 大小:491.8 MB 最近下载:2025-12-23 热度:210

[ WebToolTip.com ] Security for CompTIA A + Core 2 (220-1202)

  • ~Get Your Files Here !/1-Security Measures and Purposes/1 -Physical Security Principles.mp4 30.5 MB
  • ~Get Your Files Here !/1-Security Measures and Purposes/3 -Ingress and Egress Security.mp4 29.0 MB
  • ~Get Your Files Here !/4-Malware Prevention/18 -Types of Malware.mp4 28.7 MB
  • ~Get Your Files Here !/2-Security Settings in Windows/11 -Permissions.mp4 28.5 MB
  • ~Get Your Files Here !/2-Security Settings in Windows/15 -Active Directory.mp4 26.8 MB
  • ~Get Your Files Here !/01/security-measures-and-purposes-slides.pdf 25.1 MB
  • ~Get Your Files Here !/7-Workstation Security Best Practices/28 -Platform Hardening.mp4 24.8 MB
  • ~Get Your Files Here !/10-SOHO Network Security/36 -Router and Firewall Settings.mp4 24.4 MB
  • ~Get Your Files Here !/02/security-settings-in-windows-slides.pdf 23.4 MB
  • ~Get Your Files Here !/1-Security Measures and Purposes/5 -Authentication.mp4 23.0 MB
  • ~Get Your Files Here !/8-Mobile Device Security/33 -Special Considerations.mp4 22.8 MB
  • ~Get Your Files Here !/2-Security Settings in Windows/10 -Passwordless Login.mp4 21.8 MB
  • ~Get Your Files Here !/5-Social Engineering, Threats, and Vulnerabilities/22 -Social Engineering Attacks Part 1.mp4 21.0 MB
  • ~Get Your Files Here !/11-Browser Security/39 -Secure Connections.mp4 20.9 MB
  • ~Get Your Files Here !/4-Malware Prevention/21 -Antimalware Techniques.mp4 20.2 MB
  • ~Get Your Files Here !/2-Security Settings in Windows/14 -Antivirus and Firewall.mp4 20.1 MB
  • ~Get Your Files Here !/3-Wireless Protocols and Authentication/16 -Wireless Protocols.mp4 19.9 MB
  • ~Get Your Files Here !/1-Security Measures and Purposes/4 -Physical Access Security.mp4 19.1 MB
  • ~Get Your Files Here !/9-Data Destruction and Disposal Methods/34 -Recycling and Repurposing.mp4 19.0 MB
  • ~Get Your Files Here !/4-Malware Prevention/20 -Antimalware Tools.mp4 19.0 MB
[磁力链接] 添加时间:2025-06-23 大小:888.9 MB 最近下载:2025-12-22 热度:573

SCADA Security Architect CSSA.7z

  • SCADA Security Architect CSSA.7z 1.3 GB
[磁力链接] 添加时间:2025-06-23 大小:1.3 GB 最近下载:2025-12-20 热度:119

[ WebToolTip.com ] Corporate Security Policies by Infosec

  • ~Get Your Files Here !/02 - 1. Business Needs for Security Policies/04 - Ethics, business, security, and policies.mp4 62.4 MB
  • ~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/04 - Cybersecurity frameworks.mp4 56.9 MB
  • ~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/09 - Reading, writing, technical writing, and editing.mp4 56.8 MB
  • ~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/03 - Introduction to law and regulation.mp4 53.3 MB
  • ~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/10 - Tracking changes within documents and version control.mp4 53.2 MB
  • ~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/07 - When and how to seek legal review.mp4 44.0 MB
  • ~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/05 - Cybersecurity laws and regulations, part 1.mp4 42.9 MB
  • ~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/02 - Project management basics.mp4 41.4 MB
  • ~Get Your Files Here !/02 - 1. Business Needs for Security Policies/02 - The business mission is always first.mp4 39.6 MB
  • ~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/03 - Overview of all steps and phases.mp4 38.5 MB
  • ~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/08 - Resolving differences of opinion.mp4 38.0 MB
  • ~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/06 - Tools to assist with creating and managing policies.mp4 38.0 MB
  • ~Get Your Files Here !/02 - 1. Business Needs for Security Policies/06 - Synchronizing business needs and priorities.mp4 34.9 MB
  • ~Get Your Files Here !/05 - 4. Planning the Security Document Project/04 - Where are we now, and where do we want to go.mp4 34.6 MB
  • ~Get Your Files Here !/05 - 4. Planning the Security Document Project/03 - Planning, scoping, and selling (evangelizing) the project.mp4 34.0 MB
  • ~Get Your Files Here !/06 - 5. Managing and Executing the Security Document Project/04 - Review your project's scope and avoid scope creep.mp4 34.0 MB
  • ~Get Your Files Here !/04 - 3. External Guidance to Assist with Security Policies/02 - Government regulatory guidance.mp4 33.9 MB
  • ~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/09 - Effective governance documents look like this.mp4 33.9 MB
  • ~Get Your Files Here !/01 - A Framework for Better Corporate Security Policy Foundations/08 - Building internal rules conceptually.mp4 33.3 MB
  • ~Get Your Files Here !/03 - 2. Incorporating Legal Requirements into Security Policies/06 - Cybersecurity laws and regulations, part 2.mp4 33.0 MB
[磁力链接] 添加时间:2025-06-23 大小:1.6 GB 最近下载:2025-12-22 热度:469

[ WebToolTip.com ] Laravel API Development and Security

  • ~Get Your Files Here !/4. Implementing Authentication and Authorization/4. Implementing and Testing API Token Abilities.mp4 19.7 MB
  • ~Get Your Files Here !/4. Implementing Authentication and Authorization/2. API Tokens and the AuthController Implementation.mp4 17.5 MB
  • ~Get Your Files Here !/4. Implementing Authentication and Authorization/5. Implementing Laravel Gates.mp4 13.6 MB
  • ~Get Your Files Here !/6. Testing and Deploying the Laravel API/4. Implementing Authentication Tests.mp4 13.1 MB
  • ~Get Your Files Here !/4. Implementing Authentication and Authorization/8. Implementing and Testing Laravel Policies.mp4 12.2 MB
  • ~Get Your Files Here !/5. Securing the API Against Common Threats/5. Implementing Rate Limiting via Throttling.mp4 11.5 MB
  • ~Get Your Files Here !/6. Testing and Deploying the Laravel API/6. Implementing Tests for the Deck Endpoint.mp4 11.2 MB
  • ~Get Your Files Here !/3. Building the RESTful API – CRUD Operations/4. Implementing Controller Logic for RESTful Endpoints.mp4 10.5 MB
  • ~Get Your Files Here !/6. Testing and Deploying the Laravel API/8. Deploying the Laravel Project with Docker.mp4 10.4 MB
  • ~Get Your Files Here !/5. Securing the API Against Common Threats/4. JSON Responses and Exception with Less Detail.mp4 10.2 MB
  • ~Get Your Files Here !/5. Securing the API Against Common Threats/3. Data Validation and the Unauthenticated Route in Laravel.mp4 9.6 MB
  • ~Get Your Files Here !/5. Securing the API Against Common Threats/6. Implementing Logging in Laravel.mp4 9.3 MB
  • ~Get Your Files Here !/3. Building the RESTful API – CRUD Operations/3. HTTP Status Codes and Our Project Endpoints.mp4 8.8 MB
  • ~Get Your Files Here !/4. Implementing Authentication and Authorization/7. Introduction to Laravel Policies.mp4 8.6 MB
  • ~Get Your Files Here !/1. Introduction to Laravel API Development/2. Create Your Laravel API Project.mp4 8.1 MB
  • ~Get Your Files Here !/2. Setting up the Laravel API Project/1. Prepare Our Project Environment for Laravel.mp4 8.1 MB
  • ~Get Your Files Here !/5. Securing the API Against Common Threats/2. Hiding Resources and Implementing Common HTTP Status Codes.mp4 7.6 MB
  • ~Get Your Files Here !/2. Setting up the Laravel API Project/5. Implementing Our Models.mp4 7.4 MB
  • ~Get Your Files Here !/6. Testing and Deploying the Laravel API/2. Feature vs. Unit Tests and Testing Conventions in Laravel.mp4 6.7 MB
  • ~Get Your Files Here !/2. Setting up the Laravel API Project/4. Configuring the Project and Creating Our Models.mp4 6.4 MB
[磁力链接] 添加时间:2025-06-22 大小:289.7 MB 最近下载:2025-12-27 热度:240

In Security.2013. WEBRip.1400MB.avi

  • In Security.2013. WEBRip.1400MB.avi 1.5 GB
[磁力链接] 添加时间:2025-06-22 大小:1.5 GB 最近下载:2025-10-28 热度:41

Avast Premium Security 25.2.9898 (build 25.2.9898.915)[sat99]

  • Avast Premium Security 25.2.9898 (build 25.2.9898.915)/Setup/avast_premier_antivirus_setup_offline.exe 648.1 MB
  • Avast Premium Security 25.2.9898 (build 25.2.9898.915)/Patch/Patch_FIX.zip 4.9 MB
  • Avast Premium Security 25.2.9898 (build 25.2.9898.915)/Read Me.txt 721 Bytes
  • Avast Premium Security 25.2.9898 (build 25.2.9898.915)/Patch/Password is 123.txt 270 Bytes
  • Avast Premium Security 25.2.9898 (build 25.2.9898.915)/HaxNode.Net.url 120 Bytes
  • Downloaded from HaxNode.net.txt 87 Bytes
[磁力链接] 添加时间:2025-06-21 大小:653.0 MB 最近下载:2025-12-05 热度:81

Bitdefender Total Security 2021 v25.0.14.58 (32-64 Bit) Multi

  • Bitdefender Total Security 2021 v25.0.14.58 (32-64 Bit) Multi.exe 997.1 MB
  • www.limetorrents.com.jpg 131.5 kB
  • Keys.url 936 Bytes
  • Torrent downloaded from extremlymtorrents.me.txt 96 Bytes
[磁力链接] 添加时间:2025-06-21 大小:997.3 MB 最近下载:2025-06-21 热度:4

[ WebToolTip.com ] Udemy - Data Security Fundamentals

  • ~Get Your Files Here !/1 - Introduction/2 -Data Security Masterclass.pdf 76.4 MB
  • ~Get Your Files Here !/10 - Security Operations & Incident Response/6 -Data Disaster Recovery.mp4 63.4 MB
  • ~Get Your Files Here !/2 - Data Security Foundations/2 -Importance of Data Protection - real examples.mp4 53.5 MB
  • ~Get Your Files Here !/9 - Data Loss Prevention/2 -Key Components of a DLP Solution.mp4 51.7 MB
  • ~Get Your Files Here !/4 - Data Security Documents - templates to use included for download/3 -Data Security Risk Register.mp4 51.1 MB
  • ~Get Your Files Here !/4 - Data Security Documents - templates to use included for download/1 -Data Security Policy.mp4 49.1 MB
  • ~Get Your Files Here !/3 - Threats and Vulnerabilities/13 -AI-based Attacks.mp4 45.0 MB
  • ~Get Your Files Here !/10 - Security Operations & Incident Response/4 -Digital Forensics Fundamentals.mp4 38.3 MB
  • ~Get Your Files Here !/4 - Data Security Documents - templates to use included for download/2 -Data Classification Policy.mp4 37.1 MB
  • ~Get Your Files Here !/11 - Human Factors & Security Culture/4 -Creating a Security-Aware Culture.mp4 36.7 MB
  • ~Get Your Files Here !/10 - Security Operations & Incident Response/3 -Incident Response Planning.mp4 32.5 MB
  • ~Get Your Files Here !/2 - Data Security Foundations/5 -Data states at rest, in transit, in processing.mp4 32.2 MB
  • ~Get Your Files Here !/5 - PRACTICE Data Security Tasks/2 -Solution Classify different types of organizational data.mp4 31.2 MB
  • ~Get Your Files Here !/11 - Human Factors & Security Culture/3 -Measuring Security Awareness.mp4 29.6 MB
  • ~Get Your Files Here !/9 - Data Loss Prevention/3 -Data Loss Prevention Policy - template included for download.mp4 29.1 MB
  • ~Get Your Files Here !/1 - Introduction/1 -Introduction.mp4 28.8 MB
  • ~Get Your Files Here !/13 - Data Security Standards/1 -Intro to Data Security Standards.mp4 28.5 MB
  • ~Get Your Files Here !/4 - Data Security Documents - templates to use included for download/4 -Data Retention Policy.mp4 28.1 MB
  • ~Get Your Files Here !/10 - Security Operations & Incident Response/5 -Business Continuity.mp4 28.1 MB
  • ~Get Your Files Here !/3 - Threats and Vulnerabilities/3 -Malware.mp4 27.4 MB
[磁力链接] 添加时间:2025-06-20 大小:1.8 GB 最近下载:2025-12-20 热度:745

Bitdefender Total Security 2021 v25.0.14.58 (32-64 Bit) Multi

  • Bitdefender Total Security 2021 v25.0.14.58 (32-64 Bit) Multi.exe 997.1 MB
  • www.limetorrents.com.jpg 131.5 kB
  • Keys.url 936 Bytes
  • Torrent downloaded from extremlymtorrents.me.txt 96 Bytes
[磁力链接] 添加时间:2025-06-20 大小:997.3 MB 最近下载:2025-06-20 热度:1

[ WebToolTip.com ] Security Analysis - Monitoring Network Applications

  • ~Get Your Files Here !/1. Monitoring Network Application Services/4. Demo - Utilize Wireshark for Network Monitoring.mp4 30.9 MB
  • ~Get Your Files Here !/1. Monitoring Network Application Services/5. Demo - Identify Typical Web and Email Traffic.mp4 30.2 MB
  • ~Get Your Files Here !/3. Identifying DNS Traffic/4. Demo - Detecting DNS Exfiltration Attempts.mp4 23.2 MB
  • ~Get Your Files Here !/2. Detecting Covert Channels in Network Traffic/6. Demo - Identifying DNS Tunneling Traffic.mp4 21.8 MB
  • ~Get Your Files Here !/2. Detecting Covert Channels in Network Traffic/5. Demo - Recognizing HTTP Tunneling.mp4 18.5 MB
  • ~Get Your Files Here !/3. Identifying DNS Traffic/3. Demo - Analyzing Normal DNS Traffic Patterns.mp4 18.0 MB
  • ~Get Your Files Here !/2. Detecting Covert Channels in Network Traffic/7. Demo - Implementing Anomaly Detection Methods.mp4 14.3 MB
  • ~Get Your Files Here !/1. Monitoring Network Application Services/3. Tools for Network Monitoring.mp4 6.7 MB
  • ~Get Your Files Here !/1. Monitoring Network Application Services/1. What Is Network Monitoring.mp4 6.2 MB
  • ~Get Your Files Here !/3. Identifying DNS Traffic/2. DNS Analysis Tools.mp4 4.2 MB
  • ~Get Your Files Here !/3. Identifying DNS Traffic/1. Introduction to DNS Traffic Analysis.mp4 3.9 MB
  • ~Get Your Files Here !/1. Monitoring Network Application Services/2. Monitoring Metrics.mp4 3.7 MB
  • ~Get Your Files Here !/2. Detecting Covert Channels in Network Traffic/3. Common Protocols Exploited.mp4 3.5 MB
  • ~Get Your Files Here !/2. Detecting Covert Channels in Network Traffic/1. What Are Covert Channels.mp4 2.1 MB
  • ~Get Your Files Here !/2. Detecting Covert Channels in Network Traffic/4. Detection and Mitigation.mp4 2.0 MB
  • ~Get Your Files Here !/2. Detecting Covert Channels in Network Traffic/2. Why Are Covert Channels Dangerous.mp4 940.6 kB
  • ~Get Your Files Here !/1. Monitoring Network Application Services/5. Demo - Identify Typical Web and Email Traffic.vtt 13.8 kB
  • ~Get Your Files Here !/3. Identifying DNS Traffic/4. Demo - Detecting DNS Exfiltration Attempts.vtt 12.9 kB
  • ~Get Your Files Here !/1. Monitoring Network Application Services/4. Demo - Utilize Wireshark for Network Monitoring.vtt 12.0 kB
  • ~Get Your Files Here !/3. Identifying DNS Traffic/3. Demo - Analyzing Normal DNS Traffic Patterns.vtt 9.3 kB
[磁力链接] 添加时间:2025-06-18 大小:190.2 MB 最近下载:2025-12-15 热度:172

2025-05-13 Scarlett Alexis (Please, Don't Call Security! Scarlett Alexis Caught Red-Handed) 1080p.mkv

  • 2025-05-13 Scarlett Alexis (Please, Don't Call Security! Scarlett Alexis Caught Red-Handed) 1080p.mkv 1.3 GB
[磁力链接] 添加时间:2025-06-16 大小:1.3 GB 最近下载:2025-12-25 热度:824

[Voodooed] Eden Ivy - Security voodoo 4K.mp4

  • [Voodooed] Eden Ivy - Security voodoo 4K.mp4 3.4 GB
[磁力链接] 添加时间:2025-06-15 大小:3.4 GB 最近下载:2025-12-24 热度:337


共940页 上一页 8 9 10 11 12 13 14 15 16 下一页