本站已收录 番号和无损神作磁力链接/BT种子 

Cyber Security For beginners™ 2020Cyber Security 0 to Hero

种子简介

种子名称: Cyber Security For beginners™ 2020Cyber Security 0 to Hero
文件类型: 视频
文件数目: 53个文件
文件大小: 1.81 GB
收录时间: 2021-12-31 00:55
已经下载: 3
资源热度: 118
最近下载: 2025-1-3 01:04

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:591a982804dfc6f179b9d28304fbd5a0541e430e&dn=Cyber Security For beginners™ 2020Cyber Security 0 to Hero 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

Cyber Security For beginners™ 2020Cyber Security 0 to Hero.torrent
  • 1. Introduction to Cyber Space/2. History OF Internet.mp485.43MB
  • 1. Introduction to Cyber Space/1. Internet.mp443.95MB
  • 10. Firewall/1. Firewall.mp48.7MB
  • 10. Firewall/5. Proxy Firewall.mp46.32MB
  • 10. Firewall/8. Hardware Firewall.mp44.18MB
  • 10. Firewall/9. Cloud Firewall.mp43.99MB
  • 10. Firewall/2. Packet Filtering Firewall.mp43.62MB
  • 10. Firewall/6. Next-Generation Firewall.mp43.15MB
  • 10. Firewall/7. Software Firewall.mp43.03MB
  • 10. Firewall/4. State Inspection Firewall.mp42.86MB
  • 10. Firewall/3. Circuit-Level Gateways.mp42.26MB
  • 11. Computer Forensic/1. Computer Forensic.mp499.91MB
  • 12. Conclusion/2. Certified Ethical Hacker.mp47.56MB
  • 12. Conclusion/3. Comptia Security+.mp46.32MB
  • 12. Conclusion/5. Conclusion.mp44.46MB
  • 12. Conclusion/1. Certification.mp43.64MB
  • 12. Conclusion/4. CISSP.mp43.53MB
  • 2. Security Model/2. Confidentiality.mp430.96MB
  • 2. Security Model/4. Availability.mp425.1MB
  • 2. Security Model/3. Integrity.mp420.42MB
  • 2. Security Model/1. Introduction.mp45.6MB
  • 3. Cyber Attack/1. Cyber Attacks.mp446.91MB
  • 3. Cyber Attack/2. Internal Attack.mp432.35MB
  • 3. Cyber Attack/3. External Attack.mp417.12MB
  • 4. Hackers and Their Job/1. What is Hacking.mp433.13MB
  • 4. Hackers and Their Job/3. WhiteHat Hacker.mp429.09MB
  • 4. Hackers and Their Job/2. BlackHat Hacker.mp427.44MB
  • 4. Hackers and Their Job/4. GrayHat Hacker.mp415.08MB
  • 5. Malware And Its Types/3. Spyware.mp458.04MB
  • 5. Malware And Its Types/7. Trojan Horse.mp454.46MB
  • 5. Malware And Its Types/5. Computer Browser.mp442.34MB
  • 5. Malware And Its Types/6. Computer Worm.mp436.3MB
  • 5. Malware And Its Types/2. Adware.mp422.19MB
  • 5. Malware And Its Types/1. Malware.mp412.48MB
  • 5. Malware And Its Types/4. Browser Hijacking.mp45.5MB
  • 6. Cyber Crime/2. Cyber Stalking.mp497.08MB
  • 6. Cyber Crime/3. Software Piracy.mp491.08MB
  • 6. Cyber Crime/6. Computer Virus Spreading.mp490.52MB
  • 6. Cyber Crime/7. Spamming.mp462.54MB
  • 6. Cyber Crime/1. Cyber Crime.mp444.43MB
  • 6. Cyber Crime/5. Computer Hacking.mp443.8MB
  • 6. Cyber Crime/4. Phishing.mp437.48MB
  • 7. Cyber Attacks/5. DDOS Attack.mp4125.61MB
  • 7. Cyber Attacks/4. Social Engineering.mp479.18MB
  • 7. Cyber Attacks/1. Salami Attack.mp468.51MB
  • 7. Cyber Attacks/7. Email Spoofing.mp461.17MB
  • 7. Cyber Attacks/2. Cross-site Scripting.mp434.54MB
  • 7. Cyber Attacks/3. SQL Injection.mp433.75MB
  • 7. Cyber Attacks/6. MITM Attack.mp428.02MB
  • 8. How to defence against Attacks/1. Authentication.mp444.5MB
  • 8. How to defence against Attacks/2. Encryption.mp428.04MB
  • 8. How to defence against Attacks/3. Digital Signature.mp411.75MB
  • 9. Antivirus/1. Antivirus and it's Working.mp461.42MB