zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
Cyber Security For beginners™ 2020Cyber Security 0 to Hero
magnet:?xt=urn:btih:591a982804dfc6f179b9d28304fbd5a0541e430e&dn=Cyber Security For beginners™ 2020Cyber Security 0 to Hero
磁力链接详情
文件列表详情
591a982804dfc6f179b9d28304fbd5a0541e430e
infohash:
53
文件数量
1.81 GB
文件大小
2021-12-31 00:55
创建日期
2024-11-14 13:53
最后访问
相关分词
Cyber
Security
For
beginners™
2020Cyber
Security
0
to
Hero
1. Introduction to Cyber Space/2. History OF Internet.mp4 85.43 MB
1. Introduction to Cyber Space/1. Internet.mp4 43.95 MB
10. Firewall/1. Firewall.mp4 8.7 MB
10. Firewall/5. Proxy Firewall.mp4 6.32 MB
10. Firewall/8. Hardware Firewall.mp4 4.18 MB
10. Firewall/9. Cloud Firewall.mp4 3.99 MB
10. Firewall/2. Packet Filtering Firewall.mp4 3.62 MB
10. Firewall/6. Next-Generation Firewall.mp4 3.15 MB
10. Firewall/7. Software Firewall.mp4 3.03 MB
10. Firewall/4. State Inspection Firewall.mp4 2.86 MB
10. Firewall/3. Circuit-Level Gateways.mp4 2.26 MB
11. Computer Forensic/1. Computer Forensic.mp4 99.91 MB
12. Conclusion/2. Certified Ethical Hacker.mp4 7.56 MB
12. Conclusion/3. Comptia Security+.mp4 6.32 MB
12. Conclusion/5. Conclusion.mp4 4.46 MB
12. Conclusion/1. Certification.mp4 3.64 MB
12. Conclusion/4. CISSP.mp4 3.53 MB
2. Security Model/2. Confidentiality.mp4 30.96 MB
2. Security Model/4. Availability.mp4 25.1 MB
2. Security Model/3. Integrity.mp4 20.42 MB
2. Security Model/1. Introduction.mp4 5.6 MB
3. Cyber Attack/1. Cyber Attacks.mp4 46.91 MB
3. Cyber Attack/2. Internal Attack.mp4 32.35 MB
3. Cyber Attack/3. External Attack.mp4 17.12 MB
4. Hackers and Their Job/1. What is Hacking.mp4 33.13 MB
4. Hackers and Their Job/3. WhiteHat Hacker.mp4 29.09 MB
4. Hackers and Their Job/2. BlackHat Hacker.mp4 27.44 MB
4. Hackers and Their Job/4. GrayHat Hacker.mp4 15.08 MB
5. Malware And Its Types/3. Spyware.mp4 58.04 MB
5. Malware And Its Types/7. Trojan Horse.mp4 54.46 MB
5. Malware And Its Types/5. Computer Browser.mp4 42.34 MB
5. Malware And Its Types/6. Computer Worm.mp4 36.3 MB
5. Malware And Its Types/2. Adware.mp4 22.19 MB
5. Malware And Its Types/1. Malware.mp4 12.48 MB
5. Malware And Its Types/4. Browser Hijacking.mp4 5.5 MB
6. Cyber Crime/2. Cyber Stalking.mp4 97.08 MB
6. Cyber Crime/3. Software Piracy.mp4 91.08 MB
6. Cyber Crime/6. Computer Virus Spreading.mp4 90.52 MB
6. Cyber Crime/7. Spamming.mp4 62.54 MB
6. Cyber Crime/1. Cyber Crime.mp4 44.43 MB
6. Cyber Crime/5. Computer Hacking.mp4 43.8 MB
6. Cyber Crime/4. Phishing.mp4 37.48 MB
7. Cyber Attacks/5. DDOS Attack.mp4 125.61 MB
7. Cyber Attacks/4. Social Engineering.mp4 79.18 MB
7. Cyber Attacks/1. Salami Attack.mp4 68.51 MB
7. Cyber Attacks/7. Email Spoofing.mp4 61.17 MB
7. Cyber Attacks/2. Cross-site Scripting.mp4 34.54 MB
7. Cyber Attacks/3. SQL Injection.mp4 33.75 MB
7. Cyber Attacks/6. MITM Attack.mp4 28.02 MB
8. How to defence against Attacks/1. Authentication.mp4 44.5 MB
8. How to defence against Attacks/2. Encryption.mp4 28.04 MB
8. How to defence against Attacks/3. Digital Signature.mp4 11.75 MB
9. Antivirus/1. Antivirus and it's Working.mp4 61.42 MB
其他位置