zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
Lynda - Foundations of Cybersecurity
magnet:?xt=urn:btih:035B2BFFD82E49CA2DCCDA11BD9E0241BB0C56D2&dn=Lynda - Foundations of Cybersecurity
磁力链接详情
文件列表详情
035B2BFFD82E49CA2DCCDA11BD9E0241BB0C56D2
infohash:
27
文件数量
286.92 MB
文件大小
2015-10-5 18:42
创建日期
2024-12-24 12:44
最后访问
相关分词
Lynda
-
Foundations
of
Cybersecurity
021 Managing user access and identity.mp4 19.71 MB
022 Implementing preventative security.mp4 17.89 MB
023 Monitoring and alerts.mp4 14.95 MB
018 Describing security requirements.mp4 14.21 MB
008 Dissecting the payment card industry and PCI DSS.mp4 13.94 MB
007 Implementing control frameworks.mp4 13.64 MB
025 Preparing for an incident.mp4 13.53 MB
019 Architecting security risk.mp4 12.86 MB
016 Understanding advanced persistent threats (APTs).mp4 12.86 MB
004 Dissecting cyber risk.mp4 12.53 MB
003 Understanding the NIST cybersecurity framework.mp4 12.04 MB
011 Dissecting security threats.mp4 11.04 MB
026 Responding to an incident.mp4 10.95 MB
005 Unpacking COBIT 5.mp4 9.84 MB
012 Exploring cybercrime as an industry.mp4 9.46 MB
014 Using callbacks to capture keystrokes.mp4 9.37 MB
015 Hiding malware with rootkits.mp4 9.34 MB
009 Exploring the Cyber Essentials framework.mp4 8.83 MB
013 Hiding malware through cloaking and alternate data streams.mp4 8.61 MB
020 Selecting security controls.mp4 8.14 MB
024 Managing incident response.mp4 8.11 MB
017 Exploring ransomware.mp4 8.01 MB
006 Looking closer at DSS05.mp4 7.76 MB
010 Breaking down the cybersecurity kill chain.mp4 7.71 MB
001 Welcome.mp4 6.21 MB
027 Next steps.mp4 3.44 MB
002 What you should know.mp4 1.95 MB
其他位置