资源详情

返回首页 | 相关搜索
[ WebToolTip.com ] Udemy - Security Blind Spots - What Professionals Miss Every Day
大小 1.39 GB
文件数 41
Info Hash: E88C81D4F111BCD9872359562F9573DB156A5A7C
收录时间 2026-02-17 11:03:05
更新时间 2026-02-17 11:03:05
文件列表 (41)
Get Bonus Downloads Here.url
180 B
~Get Your Files Here !/1 - The Threats Hiding in Plain Sight/1. Cybersecurity Routine Task Risks Quiz Workplace Security Assessment (Description).html
883 B
~Get Your Files Here !/1 - The Threats Hiding in Plain Sight/1. Cybersecurity Routine Task Risks Quiz Workplace Security Assessment.html
16.03 KB
~Get Your Files Here !/1 - The Threats Hiding in Plain Sight/1. Routine Tasks That Open the Door (Description).html
2.38 KB
~Get Your Files Here !/1 - The Threats Hiding in Plain Sight/1. Routine Tasks That Open the Door.mp4
58.01 MB
~Get Your Files Here !/1 - The Threats Hiding in Plain Sight/2. Security Psychology Quiz Cognitive Biases in Cybersecurity (Description).html
863 B
~Get Your Files Here !/1 - The Threats Hiding in Plain Sight/2. Security Psychology Quiz Cognitive Biases in Cybersecurity.html
16.18 KB
~Get Your Files Here !/1 - The Threats Hiding in Plain Sight/2. Why Normal Feels Safe But Isn't (Description).html
2.63 KB
~Get Your Files Here !/1 - The Threats Hiding in Plain Sight/2. Why Normal Feels Safe But Isn't.mp4
99.99 MB
~Get Your Files Here !/2 - Trust as a Weapon/3. How Attackers Research You (Description).html
2.77 KB
~Get Your Files Here !/2 - Trust as a Weapon/3. How Attackers Research You.mp4
73.58 MB
~Get Your Files Here !/2 - Trust as a Weapon/3. OSINT Reconnaissance Quiz How Hackers Research Targets (Description).html
852 B
~Get Your Files Here !/2 - Trust as a Weapon/3. OSINT Reconnaissance Quiz How Hackers Research Targets.html
16.03 KB
~Get Your Files Here !/2 - Trust as a Weapon/4. Social Engineering Tactics Quiz Persuasion Psychology in Cyber Attacks (Description).html
883 B
~Get Your Files Here !/2 - Trust as a Weapon/4. Social Engineering Tactics Quiz Persuasion Psychology in Cyber Attacks.html
16.56 KB
~Get Your Files Here !/2 - Trust as a Weapon/4. The Art of the Believable Request (Description).html
1.53 KB
~Get Your Files Here !/2 - Trust as a Weapon/4. The Art of the Believable Request.mp4
619.89 MB
~Get Your Files Here !/2 - Trust as a Weapon/4. verification protocol template.pdf
325.07 KB
~Get Your Files Here !/3 - Where Security Breaks Down/5. Email Security Threats Quiz Business Email Compromise Prevention (Description).html
868 B
~Get Your Files Here !/3 - Where Security Breaks Down/5. Email Security Threats Quiz Business Email Compromise Prevention.html
16.05 KB
~Get Your Files Here !/3 - Where Security Breaks Down/5. The Email Trap (Description).html
2.83 KB
~Get Your Files Here !/3 - Where Security Breaks Down/5. The Email Trap.mp4
88.65 MB
~Get Your Files Here !/3 - Where Security Breaks Down/6. Cloud File Sharing Security Quiz Access Control Best Practices (Description).html
858 B
~Get Your Files Here !/3 - Where Security Breaks Down/6. Cloud File Sharing Security Quiz Access Control Best Practices.html
16.04 KB
~Get Your Files Here !/3 - Where Security Breaks Down/6. The Collaboration Trap (Description).html
2.04 KB
~Get Your Files Here !/3 - Where Security Breaks Down/6. The Collaboration Trap.mp4
103.67 MB
~Get Your Files Here !/4 - Outside the Office Walls/7. Remote Work Security Quiz Public WiFi and Travel Cyber Risks (Description).html
852 B
~Get Your Files Here !/4 - Outside the Office Walls/7. Remote Work Security Quiz Public WiFi and Travel Cyber Risks.html
16.25 KB
~Get Your Files Here !/4 - Outside the Office Walls/7. Travel Remote Work and the Coffee Shop Problem (Description).html
2.99 KB
~Get Your Files Here !/4 - Outside the Office Walls/7. Travel Remote Work and the Coffee Shop Problem.mp4
86.17 MB
~Get Your Files Here !/4 - Outside the Office Walls/8. BYOD Security Risks Quiz Personal Device Workplace Safety (Description).html
857 B
~Get Your Files Here !/4 - Outside the Office Walls/8. BYOD Security Risks Quiz Personal Device Workplace Safety.html
15.9 KB
~Get Your Files Here !/4 - Outside the Office Walls/8. Personal Devices in Professional Contexts (Description).html
3.1 KB
~Get Your Files Here !/4 - Outside the Office Walls/8. Personal Devices in Professional Contexts.mp4
78.96 MB
~Get Your Files Here !/5 - From Awareness to Instinct/10. Creating Habits that Stick (Description).html
3.27 KB
~Get Your Files Here !/5 - From Awareness to Instinct/10. Creating Habits that Stick.mp4
90.84 MB
~Get Your Files Here !/5 - From Awareness to Instinct/9. Developing Your Security Intuition (Description).html
3.13 KB
~Get Your Files Here !/5 - From Awareness to Instinct/9. Developing Your Security Intuition.mp4
120.6 MB
~Get Your Files Here !/5 - From Awareness to Instinct/9. Security Intuition Development Quiz Building Cyber Threat Awareness (Description).html
883 B
~Get Your Files Here !/5 - From Awareness to Instinct/9. Security Intuition Development Quiz Building Cyber Threat Awareness.html
16.68 KB
~Get Your Files Here !/Bonus Resources.txt
70 B

免责声明

本网站仅提供DHT网络磁力资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 lulutang@protonmail.com。