本站已收录 番号和无损神作磁力链接/BT种子 

[FreeTutorials.Eu] [UDEMY] Cyber Security Fundamentals 2019 [FTU]

种子简介

种子名称: [FreeTutorials.Eu] [UDEMY] Cyber Security Fundamentals 2019 [FTU]
文件类型: 视频
文件数目: 17个文件
文件大小: 935.72 MB
收录时间: 2019-12-16 02:05
已经下载: 3
资源热度: 123
最近下载: 2025-2-21 02:21

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:a474ea7d94b33db02390d609bf1c90742651f4b4&dn=[FreeTutorials.Eu] [UDEMY] Cyber Security Fundamentals 2019 [FTU] 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

[FreeTutorials.Eu] [UDEMY] Cyber Security Fundamentals 2019 [FTU].torrent
  • 1. Introduction/1. Instructor introduction.mp44.13MB
  • 1. Introduction/2. Course overview.mp418.73MB
  • 2. Understanding the cybersecurity landscape/1. Current Cybersecurity Landscape.mp4161.4MB
  • 2. Understanding the cybersecurity landscape/2. Assume Compromise Philosophy.mp451MB
  • 2. Understanding the cybersecurity landscape/3. Cost of Breach.mp456.71MB
  • 3. Red Team Penetration, lateral movement, escalation, and exfiltration/1. Red Team versus Blue Team exercises.mp428.96MB
  • 3. Red Team Penetration, lateral movement, escalation, and exfiltration/2. The Attacker's Objective.mp453.23MB
  • 3. Red Team Penetration, lateral movement, escalation, and exfiltration/3. Red Team Kill Chain.mp4135.84MB
  • 3. Red Team Penetration, lateral movement, escalation, and exfiltration/4. Document Vulnerabilities.mp410.13MB
  • 4. Blue Team Detection, Investigation, Response and Mitigation/1. Blue Team.mp421.84MB
  • 4. Blue Team Detection, Investigation, Response and Mitigation/2. Blue Team Kill Chain.mp467.02MB
  • 4. Blue Team Detection, Investigation, Response and Mitigation/3. Restrict Privilege Escalation.mp457.09MB
  • 4. Blue Team Detection, Investigation, Response and Mitigation/4. Restrict Lateral Movement.mp440.99MB
  • 4. Blue Team Detection, Investigation, Response and Mitigation/5. Attack Detection.mp485.72MB
  • 5. Beyond The Breach/1. CIA Triad.mp429.25MB
  • 5. Beyond The Breach/2. Organization Preparations.mp465.36MB
  • 5. Beyond The Breach/3. Developing and Maintaining Policies.mp448.31MB