首页
磁力链接怎么用
한국어
English
日本語
简体中文
繁體中文
GetFreeCourses.Co-Udemy-The Complete Cyber Security Course End Point Protection!
文件类型
收录时间
最后活跃
资源热度
文件大小
文件数量
视频
2021-11-28 05:26
2024-12-20 23:28
199
2.84 GB
175
磁力链接
magnet:?xt=urn:btih:14c404f2b86b9a24964c1eb42bcadd26358da50c
迅雷链接
thunder://QUFtYWduZXQ6P3h0PXVybjpidGloOjE0YzQwNGYyYjg2YjlhMjQ5NjRjMWViNDJiY2FkZDI2MzU4ZGE1MGNaWg==
二维码链接
种子下载(838888不存储任何种子文件)
种子下载线路1(迅雷)--推荐
种子下载线路2(比特彗星)
种子下载线路3(torcache)
3条线路均为国内外知名下载网站种子链接,内容跟本站无关!
相关链接
GetFreeCourses
Co-Udemy-The
Complete
Cyber
Security
Course
End
Point
Protection!
文件列表
1. Introduction/1. Welcome to Volume 4.mp4
7.19MB
1. Introduction/2. Introduction to the Instructor!.mp4
17.14MB
1. Introduction/3. Security Quick Win!.mp4
44.61MB
1. Introduction/4. Target Audience.mp4
7.33MB
1. Introduction/5. Study Recommendations.mp4
27.89MB
1. Introduction/6. Course updates.mp4
2.56MB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/1. Goals and Learning Objectives.mp4
6.49MB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/10. Scrubbing EXIF & Metadata Part 2 - Tools.mp4
20.44MB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/11. Scrubbing EXIF & Metadata Part 3 - Guidance.mp4
8.41MB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/12. Sensor Noise Camera Identification.mp4
9.01MB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/2. Secure File Deletion - Mechanical drives.mp4
19.68MB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/3. Secure File Deletion - Solid Sate Drives.mp4
12.1MB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/4. Evidence Elimination & Anti-Forensics - An Introduction.mp4
8.27MB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/5. Evidence Elimination - CCleaner and Bleachit.mp4
18.26MB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/6. Evidence Elimination - Virtual Memory, Swap, RAM Memory Cache and Buffer.mp4
14.19MB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/7. Disk Wiping - Mechanical Drives.mp4
11.43MB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/8. Disk Wiping - Solid State Drives (SSD).mp4
23.12MB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/9. Scrubbing EXIF & Metadata Part 1 - Introduction.mp4
16.24MB
11. Email Security, Privacy and Anonymity/1. Goals and Learning Objectives.mp4
9.5MB
11. Email Security, Privacy and Anonymity/10. Improving OpenPGP Security - Primary and Subkeys - Part 2.mp4
28.7MB
11. Email Security, Privacy and Anonymity/11. Improving OpenPGP Security - SmartcardsYubikey - Part 3.mp4
22.15MB
11. Email Security, Privacy and Anonymity/12. Email Tracking & Exploits.mp4
26.78MB
11. Email Security, Privacy and Anonymity/13. Email Anonymity & Pseudonymity.mp4
15.9MB
11. Email Security, Privacy and Anonymity/14. TorBirdy.mp4
21.52MB
11. Email Security, Privacy and Anonymity/15. Remailers.mp4
19.54MB
11. Email Security, Privacy and Anonymity/16. Choosing an Email Provider.mp4
37.38MB
11. Email Security, Privacy and Anonymity/17. Email Alternatives.mp4
7.41MB
11. Email Security, Privacy and Anonymity/2. Clients, Protocols and Authentication.mp4
38.19MB
11. Email Security, Privacy and Anonymity/3. Email Weaknesses.mp4
30.77MB
11. Email Security, Privacy and Anonymity/4. PGP, GPG & Privacy.mp4
12.98MB
11. Email Security, Privacy and Anonymity/5. PGP & GPG Clients.mp4
15.03MB
11. Email Security, Privacy and Anonymity/6. Windows - PGP & GPG.mp4
58.3MB
11. Email Security, Privacy and Anonymity/7. Tail - PGP & GPG.mp4
9.66MB
11. Email Security, Privacy and Anonymity/8. PGP & GPG Weaknesses.mp4
14.71MB
11. Email Security, Privacy and Anonymity/9. Improving OpenPGP Security - Best Practices - Part 1.mp4
5.58MB
12. Messengers - Security, Privacy and Anonymity/1. Goals and Learning Objectives.mp4
2.81MB
12. Messengers - Security, Privacy and Anonymity/10. Video and Voice Messengers - Other.mp4
2.64MB
12. Messengers - Security, Privacy and Anonymity/2. An Introduction to Instant Messengers.mp4
25.19MB
12. Messengers - Security, Privacy and Anonymity/3. Instant Messenger - Signal.mp4
5.88MB
12. Messengers - Security, Privacy and Anonymity/4. Instant Messengers - Chatsecure.mp4
4MB
12. Messengers - Security, Privacy and Anonymity/5. Instant Messengers - Cryptocat.mp4
1.46MB
12. Messengers - Security, Privacy and Anonymity/6. Instant Messengers - Ricochet.mp4
1.47MB
12. Messengers - Security, Privacy and Anonymity/7. Instant Messengers - Other.mp4
1.54MB
12. Messengers - Security, Privacy and Anonymity/8. Video and Voice Messengers - Linphone.mp4
11.5MB
12. Messengers - Security, Privacy and Anonymity/9. Video and Voice Messengers - Jitsi.mp4
3.74MB
13. Wrap Up/1. Congratulations!!.mp4
4.3MB
13. Wrap Up/2. Certificate Of Completion for CPEs.mp4
2.21MB
13. Wrap Up/3. Qubes OS.mp4
56.31MB
13. Wrap Up/4. Effective Network Isolation.mp4
28.05MB
13. Wrap Up/5. Socks5 proxy tunneling.mp4
22.99MB
2. Goals and Learning Objectives - Volume 4/1. What is End Point Protection and why is it important.mp4
34.32MB
2. Goals and Learning Objectives - Volume 4/2. Goals and Learning Objectives - Volume 4.mp4
25.39MB
3. File and Disk Encryption/1. Goals and Learning Objectives.mp4
7.2MB
3. File and Disk Encryption/10. Windows - Disk Encryption - CipherShed, Diskcryptor, Symantec and Bestcrypt.mp4
6.76MB
3. File and Disk Encryption/11. Windows, Mac & Linux - Setting up VeraCrypt.mp4
29.81MB
3. File and Disk Encryption/12. Mac - Filevault2.mp4
13.16MB
3. File and Disk Encryption/13. Mac - Setting up Filevault2.mp4
19.72MB
3. File and Disk Encryption/14. Linux Whole Disk Encryption - Dm-crypt and LUKS.mp4
13.76MB
3. File and Disk Encryption/15. Linux - Setting up DMCryptLUKS.mp4
13.19MB
3. File and Disk Encryption/16. Linux - Encrypting the boot partition with Grub2.mp4
11.71MB
3. File and Disk Encryption/17. Self Encrypting Drives (SEDs).mp4
3.16MB
3. File and Disk Encryption/18. Defense Against Disk Decryption Attacks.mp4
20.86MB
3. File and Disk Encryption/19. File Encryption.mp4
11.11MB
3. File and Disk Encryption/2. Disk Encryption – What is it good for.mp4
21.72MB
3. File and Disk Encryption/20. Mandatory Key Disclosure & Plausible Deniability.mp4
20.54MB
3. File and Disk Encryption/21. Nesting Crypto Systems & Obfuscation.mp4
8.89MB
3. File and Disk Encryption/22. Case Studies in Disk Decryption.mp4
5.87MB
3. File and Disk Encryption/3. Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks & Implementation.mp4
16.79MB
3. File and Disk Encryption/4. Disk Encryption Attacks - Physical.mp4
38.32MB
3. File and Disk Encryption/5. Disk Encryption Attacks - Containers, Volumes and Partitions.mp4
7.19MB
3. File and Disk Encryption/6. Windows - Disk Encryption - An Introduction.mp4
7.52MB
3. File and Disk Encryption/7. Windows - Disk Encryption - Bitlocker.mp4
30.2MB
3. File and Disk Encryption/8. Windows - Setting Up BitLocker.mp4
23.64MB
3. File and Disk Encryption/9. Windows - Disk Encryption - VeraCrypt.mp4
25.05MB
4. Anti-Virus and End-Point-Protection/1. Goals and Learning Objectives.mp4
5.62MB
4. Anti-Virus and End-Point-Protection/10. Mac - XProtect.mp4
13.5MB
4. Anti-Virus and End-Point-Protection/11. Mac - The Best of Anti-Virus and End-Point-Protection.mp4
6.53MB
4. Anti-Virus and End-Point-Protection/12. Linux - The Best of Anti-Virus and End-Point-Protection.mp4
6.17MB
4. Anti-Virus and End-Point-Protection/13. Online and Second Opinion - Anti-Virus and End-Point-Protection.mp4
9.96MB
4. Anti-Virus and End-Point-Protection/14. Is Anti-Virus and End-Point-Protection Dangerous.mp4
13.32MB
4. Anti-Virus and End-Point-Protection/2. Is Anti-Virus dead - The Threat Landscape.mp4
11.34MB
4. Anti-Virus and End-Point-Protection/3. Is Anti-Virus dead - Protection Methods.mp4
36.61MB
4. Anti-Virus and End-Point-Protection/4. Ransomware.mp4
8.49MB
4. Anti-Virus and End-Point-Protection/5. Anti-Virus and End-Point-Protection Testing.mp4
12.9MB
4. Anti-Virus and End-Point-Protection/6. The Problem With AV and EPP Testing.mp4
6.66MB
4. Anti-Virus and End-Point-Protection/7. The Best of Business End-Point-Protection (EPP).mp4
9.4MB
4. Anti-Virus and End-Point-Protection/8. Windows - The Best of Anti-Virus and End-Point-Protection.mp4
10.29MB
4. Anti-Virus and End-Point-Protection/9. Business End Point Protection (EPP).mp4
5.15MB
5. Next Generation - Anti-Virus, End-Point-Protection, Detection & Response (EDR)/1. Goals and Learning Objectives.mp4
5.09MB
5. Next Generation - Anti-Virus, End-Point-Protection, Detection & Response (EDR)/2. Next Generation - Anti-Virus (NG-AV) & End-Point-Protection (NG-EPP).mp4
10.65MB
5. Next Generation - Anti-Virus, End-Point-Protection, Detection & Response (EDR)/3. End Point Detection and Response (EDR).mp4
13.81MB
5. Next Generation - Anti-Virus, End-Point-Protection, Detection & Response (EDR)/4. End-Point-Protection How it works together in layers.mp4
12.86MB
6. End-Point-Protection Technology/1. Goals and Learning Objectives.mp4
5.79MB
6. End-Point-Protection Technology/10. Windows - Exploitation Prevention - Traps, MBEA and HMPA.mp4
11.24MB
6. End-Point-Protection Technology/11. Windows 10 - Device Guard.mp4
27.85MB
6. End-Point-Protection Technology/12. Windows - Defender Application Guard for Microsoft Edge.mp4
9.07MB
6. End-Point-Protection Technology/13. Linux - Access Control Models.mp4
13.35MB
6. End-Point-Protection Technology/14. Linux - Security frameworks - AppArmor.mp4
4.39MB
6. End-Point-Protection Technology/15. Linux - Security frameworks - SElinux.mp4
6.68MB
6. End-Point-Protection Technology/16. Linux - Security frameworks - Grsecurity.mp4
12.78MB
6. End-Point-Protection Technology/17. Linux - Security frameworks - PaX and more.mp4
3.85MB
6. End-Point-Protection Technology/18. Linux & Mac - File permissions, POSIX and ACLs.mp4
19.03MB
6. End-Point-Protection Technology/19. Mac - Application control - Parental controls.mp4
8.01MB
6. End-Point-Protection Technology/2. What is application and execution control.mp4
20.96MB
6. End-Point-Protection Technology/20. Mac - Application control - Gatekeeper.mp4
10.2MB
6. End-Point-Protection Technology/21. Mac - Application control - System Integrity Protection.mp4
12.02MB
6. End-Point-Protection Technology/22. Mac - Application control - Santa.mp4
7.04MB
6. End-Point-Protection Technology/23. Mac - Application control - Xfence (Previously Little Flocker).mp4
20.39MB
6. End-Point-Protection Technology/24. Mac - Other Stuff!.mp4
3.69MB
6. End-Point-Protection Technology/25. The New Normal For End-Point-Protection Technology.mp4
22.42MB
6. End-Point-Protection Technology/26. Cylance.mp4
9.55MB
6. End-Point-Protection Technology/3. Windows - Application control - ACLs, Windows Permission Identifier & Accessenum.mp4
16.27MB
6. End-Point-Protection Technology/4. Windows - Application control - User Account Control (UAC).mp4
15.36MB
6. End-Point-Protection Technology/5. Windows - Application control - Software Restriction Policies.mp4
11.3MB
6. End-Point-Protection Technology/6. Windows - Application control - AppLocker.mp4
32.15MB
6. End-Point-Protection Technology/7. Windows - Application Control - Parental controls.mp4
4.87MB
6. End-Point-Protection Technology/8. Windows - Third Party App Control – AV, Appguard, VoodooShield, NoVirusThanks.mp4
12.92MB
6. End-Point-Protection Technology/9. Windows - Exploitation Prevention - EMET.mp4
37.37MB
7. Threat Detection and Monitoring/1. Goals and Learning Objectives.mp4
7.15MB
7. Threat Detection and Monitoring/10. Host-Based Intrusion Detection - OSSEC.mp4
17.68MB
7. Threat Detection and Monitoring/11. Network Analysis - Sguil, Xplico & NetworkMiner.mp4
8.85MB
7. Threat Detection and Monitoring/12. File Integrity Monitoring (FIM) and Checking Part 1.mp4
7.74MB
7. Threat Detection and Monitoring/13. File Integrity Monitoring (FIM) and Checking Part 2 - Tripwire and El Jefe.mp4
6.26MB
7. Threat Detection and Monitoring/14. Network Security Toolkit (NST).mp4
4.81MB
7. Threat Detection and Monitoring/15. Security Onion.mp4
5.78MB
7. Threat Detection and Monitoring/16. Security Information and Event Management Software (SIEM).mp4
6.16MB
7. Threat Detection and Monitoring/2. A Complete Failure to Detect Threats.mp4
11.44MB
7. Threat Detection and Monitoring/3. Rethinking Honeypots.mp4
8.9MB
7. Threat Detection and Monitoring/4. CanaryTokens.mp4
70.27MB
7. Threat Detection and Monitoring/5. OpenCanary.mp4
38.79MB
7. Threat Detection and Monitoring/6. Artillery - Binary Defense.mp4
11.1MB
7. Threat Detection and Monitoring/7. Honey Drive.mp4
2.52MB
7. Threat Detection and Monitoring/8. Intrusion Detection Systems (IDS) Part 1 - Methods.mp4
13.24MB
7. Threat Detection and Monitoring/9. Intrusion Detection Systems (IDS) Part 2 - Snort, Suricata, Bro IDS & OpenWIPS-n.mp4
9.23MB
8. Malware and Hacker Hunting on the End-Point/1. Goals and Learning Objectives.mp4
7.2MB
8. Malware and Hacker Hunting on the End-Point/10. Windows - Malware Seek & Destroy - Autoruns.mp4
48.3MB
8. Malware and Hacker Hunting on the End-Point/11. Windows - Malware Seek & Destroy - Process Monitor.mp4
76.22MB
8. Malware and Hacker Hunting on the End-Point/12. Windows - Malware Seek & Destroy - Network Connections.mp4
23.96MB
8. Malware and Hacker Hunting on the End-Point/13. Malware Seek & Destroy - Networkx.mp4
5.41MB
8. Malware and Hacker Hunting on the End-Point/14. Linux - Malware Seek & Destroy - Sysdig.mp4
29.65MB
8. Malware and Hacker Hunting on the End-Point/15. Linux - Seek & Destroy Malware and Hackers - Csysdig.mp4
43.66MB
8. Malware and Hacker Hunting on the End-Point/16. Linux - Seek & Destroy Malware and Hackers - debsums & unhide.mp4
4.71MB
8. Malware and Hacker Hunting on the End-Point/17. Linux & Mac OS X - Malware Seek & Destroy - netstat.mp4
15.29MB
8. Malware and Hacker Hunting on the End-Point/18. Linux & Mac OS X - Malware Seek & Destroy - lsof.mp4
22.23MB
8. Malware and Hacker Hunting on the End-Point/19. Linux - Malware Seek & Destroy - rkhunter.mp4
17.23MB
8. Malware and Hacker Hunting on the End-Point/2. Introduction to Malware and Hacker Hunting.mp4
16.34MB
8. Malware and Hacker Hunting on the End-Point/20. Linux - Malware Seek & Destroy - Linux - Chkrootkit, Tiger, Clamav & LMD.mp4
6.19MB
8. Malware and Hacker Hunting on the End-Point/21. Linux - Malware Seek & Destroy - Linux - Persistence Part 1.mp4
9.21MB
8. Malware and Hacker Hunting on the End-Point/22. Linux - Malware Seek & Destroy - Linux - Persistence Part 2.mp4
27.6MB
8. Malware and Hacker Hunting on the End-Point/23. Linux - Malware Seek & Destroy - Linux - Persistence Part 3.mp4
5.22MB
8. Malware and Hacker Hunting on the End-Point/24. Mac - Malware Seek & Destroy - Task Explorer.mp4
15.02MB
8. Malware and Hacker Hunting on the End-Point/25. Mac - Malware Seek & Destroy KnockKnock, BlockBlock & KextViewer.mp4
20.47MB
8. Malware and Hacker Hunting on the End-Point/26. Mac, Linux & Windows - OSquery.mp4
42.3MB
8. Malware and Hacker Hunting on the End-Point/27. Firmware Rootkits – Seek and Destroy Part 1.mp4
15.95MB
8. Malware and Hacker Hunting on the End-Point/28. Firmware Rootkits – Seek and Destroy Part 2.mp4
8.88MB
8. Malware and Hacker Hunting on the End-Point/29. End-Point-Protection Recovery and Remediation Technology.mp4
10.49MB
8. Malware and Hacker Hunting on the End-Point/3. Windows - Farbar Recovery Scanner.mp4
38.06MB
8. Malware and Hacker Hunting on the End-Point/30. Encrypted Backup and Cloud Storage.mp4
14.14MB
8. Malware and Hacker Hunting on the End-Point/4. Automated Malware Removal Tools.mp4
39.98MB
8. Malware and Hacker Hunting on the End-Point/5. Live Rescue Operating Systems, CDs, and USBs.mp4
18.33MB
8. Malware and Hacker Hunting on the End-Point/6. Windows - Malware Seek & Destroy - Process Explorer - Part 1.mp4
57.78MB
8. Malware and Hacker Hunting on the End-Point/7. Windows - Malware Seek & Destroy - Process Explorer - Part 2.mp4
46.71MB
8. Malware and Hacker Hunting on the End-Point/8. Windows - Malware Seek & Destroy - Process Tools.mp4
8.78MB
8. Malware and Hacker Hunting on the End-Point/9. Windows - Malware Seek & Destroy - Sigcheck.mp4
4.55MB
9. Operating System and Application Hardening/1. Goals and Learning Objectives.mp4
7.18MB
9. Operating System and Application Hardening/10. Security Focused Operating Systems.mp4
9.84MB
9. Operating System and Application Hardening/11. Monitoring for Security Drift.mp4
2.54MB
9. Operating System and Application Hardening/2. An Introduction to Hardening.mp4
8.9MB
9. Operating System and Application Hardening/3. Hardening Standards.mp4
41.52MB
9. Operating System and Application Hardening/4. OpenSCAP.mp4
31.26MB
9. Operating System and Application Hardening/5. Baseline Auditing.mp4
12.42MB
9. Operating System and Application Hardening/6. Windows - Hardening.mp4
9.31MB
9. Operating System and Application Hardening/7. Windows - Security Compliance Manager (SCM).mp4
44.87MB
9. Operating System and Application Hardening/8. Mac – Hardening.mp4
3.51MB
9. Operating System and Application Hardening/9. Linux – Hardening.mp4
9.03MB
友情提示
不会用的朋友看这里 把磁力链接复制到离线下载,或者bt下载软件里即可下载文件,或者直接复制迅雷链接到迅雷里下载! 亲,你造吗?将网页分享给您的基友,下载的人越多速度越快哦!
违规内容投诉邮箱:
[email protected]
概述 838888磁力搜索是一个磁力链接搜索引擎,是学术研究的副产品,用于解决资源过度分散的问题 它通过BitTorrent协议加入DHT网络,实时的自动采集数据,仅存储文件的标题、大小、文件列表、文件标识符(磁力链接)等基础信息 838888磁力搜索不下载任何真实资源,无法判断资源的合法性及真实性,使用838888磁力搜索服务的用户需自行鉴别内容的真伪 838888磁力搜索不上传任何资源,不提供Tracker服务,不提供种子文件的下载,这意味着838888磁力搜索 838888磁力搜索是一个完全合法的系统