资源详情

返回首页 | 相关搜索
[ TutPig.com ] Linkedin - Cybersecurity Awareness - Cybersecurity Terminology
大小 104.67 MB
文件数 34
Info Hash: 9503C155C486F066AF9B9AD7EEE0B70CE23C7ECD
收录时间 2026-01-16 18:55:00
更新时间 2026-01-16 18:55:00
文件列表 (34)
Get Bonus Downloads Here.url
176 B
~Get Your Files Here !/01 - Introduction/01 - Welcome to Cybersecurity Terminology 101.mp4
5.41 MB
~Get Your Files Here !/01 - Introduction/01 - Welcome to Cybersecurity Terminology 101.srt
1.91 KB
~Get Your Files Here !/02 - 1. Defining Cybersecurity and People, Process, and Technology/01 - What is cybersecurity.mp4
5.71 MB
~Get Your Files Here !/02 - 1. Defining Cybersecurity and People, Process, and Technology/01 - What is cybersecurity.srt
4.17 KB
~Get Your Files Here !/02 - 1. Defining Cybersecurity and People, Process, and Technology/02 - People, process, and technology.mp4
2.76 MB
~Get Your Files Here !/02 - 1. Defining Cybersecurity and People, Process, and Technology/02 - People, process, and technology.srt
2.36 KB
~Get Your Files Here !/03 - 2. People/01 - Security awareness and leadership.mp4
8.17 MB
~Get Your Files Here !/03 - 2. People/01 - Security awareness and leadership.srt
5.09 KB
~Get Your Files Here !/03 - 2. People/02 - Red vs. blue vs. purple teams.mp4
4.81 MB
~Get Your Files Here !/03 - 2. People/02 - Red vs. blue vs. purple teams.srt
4.18 KB
~Get Your Files Here !/03 - 2. People/03 - Who are the adversaries.mp4
4.5 MB
~Get Your Files Here !/03 - 2. People/03 - Who are the adversaries.srt
4.36 KB
~Get Your Files Here !/03 - 2. People/04 - Understanding privacy.mp4
7.89 MB
~Get Your Files Here !/03 - 2. People/04 - Understanding privacy.srt
4.87 KB
~Get Your Files Here !/04 - 3. Process/01 - Understanding processes and documentation.mp4
10.01 MB
~Get Your Files Here !/04 - 3. Process/01 - Understanding processes and documentation.srt
6.05 KB
~Get Your Files Here !/04 - 3. Process/02 - Technical controls.mp4
6.94 MB
~Get Your Files Here !/04 - 3. Process/02 - Technical controls.srt
5.53 KB
~Get Your Files Here !/05 - 4. Technology/01 - Secure practices, terms, and exercises.mp4
9.65 MB
~Get Your Files Here !/05 - 4. Technology/01 - Secure practices, terms, and exercises.srt
4.64 KB
~Get Your Files Here !/05 - 4. Technology/02 - Network controls.mp4
6.8 MB
~Get Your Files Here !/05 - 4. Technology/02 - Network controls.srt
5.15 KB
~Get Your Files Here !/05 - 4. Technology/03 - Advancements in technology.mp4
6.77 MB
~Get Your Files Here !/05 - 4. Technology/03 - Advancements in technology.srt
4.31 KB
~Get Your Files Here !/06 - 5. Threat Actors and Risks/01 - Threat actors and definitions.mp4
6.73 MB
~Get Your Files Here !/06 - 5. Threat Actors and Risks/01 - Threat actors and definitions.srt
5.92 KB
~Get Your Files Here !/06 - 5. Threat Actors and Risks/02 - Technical risks.mp4
8.41 MB
~Get Your Files Here !/06 - 5. Threat Actors and Risks/02 - Technical risks.srt
5.32 KB
~Get Your Files Here !/06 - 5. Threat Actors and Risks/03 - Threats that target the human element.mp4
7.36 MB
~Get Your Files Here !/06 - 5. Threat Actors and Risks/03 - Threats that target the human element.srt
5.56 KB
~Get Your Files Here !/07 - Conclusion/01 - Apply cybersecurity terminology.mp4
2.69 MB
~Get Your Files Here !/07 - Conclusion/01 - Apply cybersecurity terminology.srt
2.26 KB
~Get Your Files Here !/Bonus Resources.txt
386 B

免责声明

本网站仅提供DHT网络资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 fuckatgfw@protonmail.com。