首页
磁力链接怎么用
한국어
English
日本語
简体中文
繁體中文
Cyber Security - VOLUME 1
文件类型
收录时间
最后活跃
资源热度
文件大小
文件数量
视频
2020-8-7 13:22
2024-10-28 16:24
74
3.4 GB
99
磁力链接
magnet:?xt=urn:btih:86c0410359f1d54ac2b8e31327bc094bd790ba16
迅雷链接
thunder://QUFtYWduZXQ6P3h0PXVybjpidGloOjg2YzA0MTAzNTlmMWQ1NGFjMmI4ZTMxMzI3YmMwOTRiZDc5MGJhMTZaWg==
二维码链接
种子下载(838888不存储任何种子文件)
种子下载线路1(迅雷)--推荐
种子下载线路2(比特彗星)
种子下载线路3(torcache)
3条线路均为国内外知名下载网站种子链接,内容跟本站无关!
相关链接
Cyber
Security
-
VOLUME
1
文件列表
4. Encryption Crash Course/10. Certificate Authorities and HTTPS.mp4
199.31MB
1. Introduction/2. Security Quick Win!.mp4
43.19MB
1. Introduction/3. Goals and Learning Objectives - Volume 1.mp4
16.11MB
1. Introduction/4. Target Audience.mp4
7.34MB
1. Introduction/5. Study Recommendations.mp4
17.95MB
1. Introduction/6. Course updates.mp4
4.4MB
2. know Yourself - The Threat and Vulnerability Landscape/1. Theory and Practical.mp4
2.25MB
2. know Yourself - The Threat and Vulnerability Landscape/2. Goals and Learning Objectives.mp4
2.71MB
2. know Yourself - The Threat and Vulnerability Landscape/3. Protect What You Value.mp4
8.94MB
2. know Yourself - The Threat and Vulnerability Landscape/4. What is Privacy, Anonymity and Pseudonymity.mp4
11.88MB
2. know Yourself - The Threat and Vulnerability Landscape/5. Security, Vulnerabilities, Threats and Adversaries.mp4
11.24MB
2. know Yourself - The Threat and Vulnerability Landscape/6. Asset Selection.mp4
7.69MB
2. know Yourself - The Threat and Vulnerability Landscape/7. Threat Modeling and Risk Assessments.mp4
18.04MB
2. know Yourself - The Threat and Vulnerability Landscape/8. Security vs Privacy vs Anonymity - Can we have it all.mp4
5.44MB
2. know Yourself - The Threat and Vulnerability Landscape/10. Defense In Depth.mp4
2.99MB
2. know Yourself - The Threat and Vulnerability Landscape/11. The Zero Trust Model.mp4
10.28MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/1. Goals and Learning Objectives.mp4
2.89MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/2. Why You Need Security – The Value Of A Hack.mp4
28.93MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/3. The Top 3 Things You Need To Stay Safe Online.mp4
2.51MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/5. Hackers, crackers and cyber criminals.mp4
7.71MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/6. Malware, viruses, rootkits and RATs.mp4
12.15MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/8. What is Phishing, Vishing and SMShing.mp4
25.99MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/9. Spamming & Doxing.mp4
4.79MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/12. Darknets, Dark Markets and Exploit kits.mp4
32.43MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/13. Governments, spies and secret stuff part I.mp4
27.03MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14. Governments, spies and secret stuff part II.mp4
30.24MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16. Trust & Backdoors.mp4
24.49MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/17. Censorship.mp4
6.49MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/18. Cyber Threat Intelligence – Stay Informed.mp4
2.62MB
4. Encryption Crash Course/1. Goals and Learning Objectives.mp4
1.63MB
4. Encryption Crash Course/2. Symmetric Encryption.mp4
32.3MB
4. Encryption Crash Course/3. Asymmetric Encryption.mp4
72.32MB
4. Encryption Crash Course/4. Hash Functions.mp4
89.24MB
4. Encryption Crash Course/5. Digital Signatures.mp4
42.74MB
4. Encryption Crash Course/6. Secure Sockets Layer (SSL) and Transport layer security (TLS).mp4
160.85MB
4. Encryption Crash Course/7. SSL Stripping.mp4
114.52MB
4. Encryption Crash Course/8. HTTPS (HTTP Secure).mp4
81.9MB
4. Encryption Crash Course/9. Digital Certificates.mp4
81.97MB
1. Introduction/1. Welcome and Introduction to the Instructor!.mp4
19.9MB
4. Encryption Crash Course/11. End-to-End Encryption (E2EE).mp4
8.19MB
4. Encryption Crash Course/12. Steganography.mp4
104.31MB
4. Encryption Crash Course/13. How Security and Encryption is Really Attacked.mp4
17.37MB
5. Setting up a Testing Environment Using Virtual Machines (Lab)/1. Goals and Learning Objectives.mp4
1.84MB
5. Setting up a Testing Environment Using Virtual Machines (Lab)/3. Vmware.mp4
110.48MB
5. Setting up a Testing Environment Using Virtual Machines (Lab)/4. Virtual box.mp4
144.16MB
5. Setting up a Testing Environment Using Virtual Machines (Lab)/5. Kali Linux 2018.mp4
59.62MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/1. Goals and Learning Objectives.mp4
2.44MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/2. Security Features and Functionality.mp4
57.9MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/3. Security Bugs and Vulnerabilities.mp4
83.9MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/4. Usage Share.mp4
34.29MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/5. Windows 10 - Privacy & Tracking.mp4
79.95MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/6. Windows 10 - Disable tracking automatically.mp4
67.88MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/7. Windows 10 - Tool Disable Windows 10 Tracking.mp4
98.43MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/8. Windows 10 – Cortana.mp4
41.03MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/9. Windows 10 – Privacy Settings.mp4
86.47MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/10. Windows 10 - WiFi Sense.mp4
59.76MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/11. Windows 7, 8 and 8.1 - Privacy & Tracking.mp4
105.53MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/12. Mac - Privacy & Tracking.mp4
57.98MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/13. Linux and Unix “like” Operating systems.mp4
46.23MB
7. Security Bugs and Vulnerabilities/1. Goals and Learning Objectives.mp4
1.66MB
7. Security Bugs and Vulnerabilities/2. The Importance of Patching.mp4
11.66MB
7. Security Bugs and Vulnerabilities/3. Windows 7 - Auto Update.mp4
4.95MB
7. Security Bugs and Vulnerabilities/4. Windows 8 & 8.1 - Auto Update.mp4
6.55MB
7. Security Bugs and Vulnerabilities/5. Windows 10 - Auto Update.mp4
4.94MB
7. Security Bugs and Vulnerabilities/6. Windows - Criticality and Patch Tuesday.mp4
41.82MB
7. Security Bugs and Vulnerabilities/7. Windows 7, 8, 8.1 & 10 - Automate the pain away from patching.mp4
19.36MB
7. Security Bugs and Vulnerabilities/8. Linux - Debian - Patching.mp4
38.5MB
7. Security Bugs and Vulnerabilities/9. Mac - Patching.mp4
55.59MB
7. Security Bugs and Vulnerabilities/10. Firefox - Browser and extension updates.mp4
34.02MB
7. Security Bugs and Vulnerabilities/11. Chrome - Browser and extension updates.mp4
3.57MB
7. Security Bugs and Vulnerabilities/12. IE and Edge - Browser and extention updates.mp4
5.64MB
7. Security Bugs and Vulnerabilities/13. Auto updates - The Impact to privacy and anonymity.mp4
4.31MB
8. Reducing Threat Privilege/1. Goals and Learning Objectives - Removing Privilege.mp4
13.59MB
8. Reducing Threat Privilege/2. Windows 7 - Not using admin.mp4
11MB
8. Reducing Threat Privilege/3. Windows 8 and 8.1 - Not using admin.mp4
18.25MB
8. Reducing Threat Privilege/4. Windows 10 - Not using admin.mp4
14.15MB
9. Social Engineering and Social Media Offence and Defence/1. Goals and Learning Objectives.mp4
1.73MB
9. Social Engineering and Social Media Offence and Defence/3. Identify Verification and Registration.mp4
23.4MB
10. Security Domains/1. Goals and Learning Objectives.mp4
1.43MB
10. Security Domains/2. Security Domains.mp4
21.85MB
11. Security Through Isolation and Compartmentalization/1. Goals and Learning Objectives.mp4
2.3MB
11. Security Through Isolation and Compartmentalization/2. Introduction to Isolation and Compartmentalization.mp4
5.67MB
11. Security Through Isolation and Compartmentalization/3. Physical and Hardware Isolation - How to change the Mac Address.mp4
25.58MB
11. Security Through Isolation and Compartmentalization/4. Physical and Hardware Isolation - Hardware Serials.mp4
50.25MB
11. Security Through Isolation and Compartmentalization/5. Virtual Isolation.mp4
57.32MB
11. Security Through Isolation and Compartmentalization/6. Dual Boot.mp4
7.93MB
11. Security Through Isolation and Compartmentalization/7. Built-in Sandboxes and Application Isolation.mp4
10.41MB
11. Security Through Isolation and Compartmentalization/8. Windows - Sandboxes and Application Isolation.mp4
26.37MB
11. Security Through Isolation and Compartmentalization/9. Windows - Sandboxes and Application Isolation - Sandboxie.mp4
70.12MB
11. Security Through Isolation and Compartmentalization/10. Linux - Sandboxes and Application Isolation.mp4
13.86MB
11. Security Through Isolation and Compartmentalization/11. Mac - Sandboxes and Application Isolation.mp4
23.8MB
11. Security Through Isolation and Compartmentalization/12. Virtual Machines.mp4
44.44MB
11. Security Through Isolation and Compartmentalization/13. Virtual Machine Weaknesses.mp4
22.74MB
11. Security Through Isolation and Compartmentalization/14. Virtual Machine Hardening.mp4
36.97MB
11. Security Through Isolation and Compartmentalization/15. Whonix OS - Anonymous Operating system.mp4
88.64MB
11. Security Through Isolation and Compartmentalization/16. Whonix OS - Weaknesses.mp4
15.79MB
11. Security Through Isolation and Compartmentalization/17. Qubes OS.mp4
78.73MB
11. Security Through Isolation and Compartmentalization/18. Security Domains, Isolation and Compartmentalization.mp4
14.98MB
12. Wrap Up/1. Congratulations.mp4
5.29MB
友情提示
不会用的朋友看这里 把磁力链接复制到离线下载,或者bt下载软件里即可下载文件,或者直接复制迅雷链接到迅雷里下载! 亲,你造吗?将网页分享给您的基友,下载的人越多速度越快哦!
违规内容投诉邮箱:
[email protected]
概述 838888磁力搜索是一个磁力链接搜索引擎,是学术研究的副产品,用于解决资源过度分散的问题 它通过BitTorrent协议加入DHT网络,实时的自动采集数据,仅存储文件的标题、大小、文件列表、文件标识符(磁力链接)等基础信息 838888磁力搜索不下载任何真实资源,无法判断资源的合法性及真实性,使用838888磁力搜索服务的用户需自行鉴别内容的真伪 838888磁力搜索不上传任何资源,不提供Tracker服务,不提供种子文件的下载,这意味着838888磁力搜索 838888磁力搜索是一个完全合法的系统