Общая информация
Название [ DevCourseWeb.com ] Udemy - Master Cyber Security A Step-by-Step Guide for 2022
Тип
Размер 638.18Мб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
1. 100 Multiple Choice Questions on Cyber Security.html 202б
1. Awareness.mp4 7.99Мб
1. Awareness.srt 1.30Кб
1. Backup and Data Recovery.mp4 9.39Мб
1. Backup and Data Recovery.srt 1.51Кб
1. BluVector.mp4 7.72Мб
1. BluVector.srt 1.39Кб
1. Expensive for businesses.mp4 3.90Мб
1. Expensive for businesses.srt 770б
1. Incident Response Analyst.mp4 10.17Мб
1. Incident Response Analyst.srt 1.67Кб
1. Introduction.mp4 25.26Мб
1. Introduction.srt 3.94Кб
1. Keylogging.mp4 5.75Мб
1. Keylogging.srt 1.02Кб
1. Malware.mp4 6.88Мб
1. Malware.srt 1.14Кб
1. Recap.mp4 5.82Мб
1. Recap.srt 1.15Кб
1. What is Cyber Security.mp4 23.83Мб
1. What is Cyber Security.srt 3.61Кб
1. What is Data Science.mp4 24.98Мб
1. What is Data Science.srt 3.90Кб
10. Vulnerability Assessments and Security Training.mp4 5.53Мб
10. Vulnerability Assessments and Security Training.srt 942б
2. 100 Multiple Choice Questions on Cyber Security.html 202б
2. Bricata.mp4 10.18Мб
2. Bricata.srt 1.75Кб
2. Complicated for businesses.mp4 3.85Мб
2. Complicated for businesses.srt 684б
2. History of Cyber Security.mp4 22.56Мб
2. History of Cyber Security.srt 3.81Кб
2. History of Data Science.mp4 26.27Мб
2. History of Data Science.srt 3.77Кб
2. Packet Sniffing.mp4 9.20Мб
2. Packet Sniffing.srt 1.62Кб
2. Physical Access Controls.mp4 5.09Мб
2. Physical Access Controls.srt 829б
2. Ransomware Attacks.mp4 13.57Мб
2. Ransomware Attacks.srt 2.40Кб
2. Risk Analyst.mp4 9.02Мб
2. Risk Analyst.srt 1.55Кб
2. Threat Reduction.mp4 9.13Мб
2. Threat Reduction.srt 1.45Кб
3. Avoid Downtime.mp4 3.79Мб
3. Avoid Downtime.srt 700б
3. Benefits of Cyber Security.mp4 14.45Мб
3. Benefits of Cyber Security.srt 2.37Кб
3. Benefits of Data Science.mp4 19.96Мб
3. Benefits of Data Science.srt 3.19Кб
3. Bug Bounties.mp4 5.76Мб
3. Bug Bounties.srt 1.02Кб
3. Cloud Defender.mp4 9.69Мб
3. Cloud Defender.srt 1.69Кб
3. Logical Access Controls.mp4 7.96Мб
3. Logical Access Controls.srt 1.18Кб
3. Man in the Middle Attacks.mp4 7.93Мб
3. Man in the Middle Attacks.srt 1.45Кб
3. Penetration Tester.mp4 8.94Мб
3. Penetration Tester.srt 1.41Кб
3. Requires constant monitoring.mp4 2.67Мб
3. Requires constant monitoring.srt 504б
4. Breaking Caesar Cipher.mp4 6.27Мб
4. Breaking Caesar Cipher.srt 994б
4. Careers in Cyber Security.mp4 20.19Мб
4. Careers in Cyber Security.srt 3.29Кб
4. Careers in Data Science.mp4 25.09Мб
4. Careers in Data Science.srt 4.07Кб
4. Cofense Triage.mp4 11.06Мб
4. Cofense Triage.srt 1.69Кб
4. Compliance.mp4 9.54Мб
4. Compliance.srt 1.52Кб
4. Distributed Denial of Service (DDoS).mp4 10.44Мб
4. Distributed Denial of Service (DDoS).srt 1.42Кб
4. Not a one-time thing.mp4 3.76Мб
4. Not a one-time thing.srt 693б
4. Securely Configured and Encrypted Devices.mp4 7.49Мб
4. Securely Configured and Encrypted Devices.srt 1.14Кб
4. Security Engineer.mp4 8.62Мб
4. Security Engineer.srt 1.51Кб
5. Contrast Security.mp4 6.73Мб
5. Contrast Security.srt 1.14Кб
5. Forensics Analyst.mp4 10.60Мб
5. Forensics Analyst.srt 1.70Кб
5. Future of Cyber Security.mp4 28.91Мб
5. Future of Cyber Security.srt 4.43Кб
5. Future of Data Science.mp4 20.54Мб
5. Future of Data Science.srt 3.32Кб
5. Increase Customer Confidence.mp4 10.29Мб
5. Increase Customer Confidence.srt 1.56Кб
5. Password Attacks.mp4 15.67Мб
5. Password Attacks.srt 2.32Кб
5. Risky for businesses.mp4 2.95Мб
5. Risky for businesses.srt 583б
5. Securely Configured Network Components.mp4 3.87Мб
5. Securely Configured Network Components.srt 661б
5. SQL Injection.mp4 5.99Мб
5. SQL Injection.srt 1.07Кб
6. Chief information security officer (CISO).mp4 12.45Мб
6. Chief information security officer (CISO).srt 1.85Кб
6. Digital Gaurdian.mp4 10.60Мб
6. Digital Gaurdian.srt 1.69Кб
6. Drive-By Download Attacks.mp4 10.19Мб
6. Drive-By Download Attacks.srt 1.82Кб
6. Network segmentation.mp4 3.10Мб
6. Network segmentation.srt 607б
6. Removing and Retrieving Files.mp4 5.20Мб
6. Removing and Retrieving Files.srt 946б
7. Chief Information Officers (CIO).mp4 13.17Мб
7. Chief Information Officers (CIO).srt 2.12Кб
7. Email and Online Protection.mp4 7.44Мб
7. Email and Online Protection.srt 1.32Кб
7. Mantix4.mp4 6.31Мб
7. Mantix4.srt 1.03Кб
7. Password Strength.mp4 6.64Мб
7. Password Strength.srt 1.12Кб
8. Blocking RFID.mp4 5.71Мб
8. Blocking RFID.srt 978б
8. SecBI.mp4 9.90Мб
8. SecBI.srt 1.64Кб
8. Wireless security.mp4 4.14Мб
8. Wireless security.srt 810б
9. Maintenance, Monitoring and Patching.mp4 7.94Мб
9. Maintenance, Monitoring and Patching.srt 1.27Кб
Bonus Resources.txt 386б
Get Bonus Downloads Here.url 182б
Статистика распространения по странам
Всего 0
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент