首页
磁力链接怎么用
한국어
English
日本語
简体中文
繁體中文
[Tutorialsplanet.NET] Udemy - The Complete Cyber Security Course Network Security!
文件类型
收录时间
最后活跃
资源热度
文件大小
文件数量
视频
2020-7-12 17:24
2024-12-15 11:12
131
3.19 GB
104
磁力链接
magnet:?xt=urn:btih:8879676368f7d6c120c316cc1a4cb80c8ffb0663
迅雷链接
thunder://QUFtYWduZXQ6P3h0PXVybjpidGloOjg4Nzk2NzYzNjhmN2Q2YzEyMGMzMTZjYzFhNGNiODBjOGZmYjA2NjNaWg==
二维码链接
种子下载(838888不存储任何种子文件)
种子下载线路1(迅雷)--推荐
种子下载线路2(比特彗星)
种子下载线路3(torcache)
3条线路均为国内外知名下载网站种子链接,内容跟本站无关!
相关链接
Tutorialsplanet
NET
Udemy
-
The
Complete
Cyber
Security
Course
Network
Security!
文件列表
1. Introduction/1. Welcome to Volume 2.mp4
2.75MB
1. Introduction/2. Introduction to the Instructor!.mp4
17.13MB
1. Introduction/3. Security Quick Win!.mp4
44.61MB
1. Introduction/4. Target Audience.mp4
8.67MB
1. Introduction/5. Study Recommendations.mp4
27.9MB
1. Introduction/6. Course updates.mp4
2.56MB
10. Browser Security and Tracking Prevention/1. Goals and Learning Objectives.mp4
1.85MB
10. Browser Security and Tracking Prevention/10. ABP, Privacy badger, WOT - HTTP Filters, ad and track blockers.mp4
27.63MB
10. Browser Security and Tracking Prevention/11. No-script - HTTP Filters, ad and track blockers.mp4
23.09MB
10. Browser Security and Tracking Prevention/12. Policeman and others - HTTP Filters, ad and track blockers.mp4
17.67MB
10. Browser Security and Tracking Prevention/13. History, Cookies and Super cookies Part 1.mp4
66.67MB
10. Browser Security and Tracking Prevention/14. History, Cookies and Super cookies Part 2.mp4
66.03MB
10. Browser Security and Tracking Prevention/15. HTTP Referer.mp4
7.56MB
10. Browser Security and Tracking Prevention/16. Browser Fingerprinting.mp4
98.01MB
10. Browser Security and Tracking Prevention/17. Certificates and Encryption.mp4
55.51MB
10. Browser Security and Tracking Prevention/18. Firefox Hardening.mp4
142.28MB
10. Browser Security and Tracking Prevention/2. Which Browser – Choice of Browser.mp4
16.96MB
10. Browser Security and Tracking Prevention/3. Reducing the Browser Attack Surface.mp4
87.75MB
10. Browser Security and Tracking Prevention/4. Browser Hacking Demo.mp4
46.75MB
10. Browser Security and Tracking Prevention/5. Browser Isolation and Compartmentalization.mp4
24.85MB
10. Browser Security and Tracking Prevention/6. Firefox Security, Privacy and Tracking.mp4
41.11MB
10. Browser Security and Tracking Prevention/7. uBlock origin - HTTP Filters, ad and track blockers.mp4
86.32MB
10. Browser Security and Tracking Prevention/8. uMatrix - HTTP Filters, ad and track blockers.mp4
29.37MB
10. Browser Security and Tracking Prevention/9. Disconnect, Ghostery, Request policy - HTTP Filters, ad and track blockers.mp4
24.6MB
11. Passwords and Authentication Methods/1. Goals and Learning Objectives.mp4
2.6MB
11. Passwords and Authentication Methods/10. Password Managers - Hardening Lastpass.mp4
15.56MB
11. Passwords and Authentication Methods/11. Creating a Strong Password That You Can Remember - Part 1.mp4
22.14MB
11. Passwords and Authentication Methods/12. Creating a Strong Password That You Can Remember - Part 2.mp4
22.55MB
11. Passwords and Authentication Methods/13. Multi-Factor Authentication - Soft Tokens - Google Authenticator and Authy.mp4
24.9MB
11. Passwords and Authentication Methods/14. Multi-Factor Authentication - Hard Tokens - 2FA Dongles.mp4
13.62MB
11. Passwords and Authentication Methods/15. Choosing a Method of Multi-Factor Authentication.mp4
6.24MB
11. Passwords and Authentication Methods/16. Multi-Factor Authentication - Strengths and Weaknesses.mp4
5.11MB
11. Passwords and Authentication Methods/17. The Future of Password and Authentication.mp4
4.05MB
11. Passwords and Authentication Methods/2. Password Attacks.mp4
7.49MB
11. Passwords and Authentication Methods/3. How Passwords are Cracked - Hashes - Part 1.mp4
41.14MB
11. Passwords and Authentication Methods/4. How Passwords are Cracked - Hashcat - Part 2.mp4
24.16MB
11. Passwords and Authentication Methods/5. Operating System Passwords.mp4
7.02MB
11. Passwords and Authentication Methods/6. Password Managers - An Introduction.mp4
4.16MB
11. Passwords and Authentication Methods/7. Password Managers - Master Password.mp4
11.5MB
11. Passwords and Authentication Methods/8. Password Managers - KeePass, KeePassX and KeyPassXC.mp4
15.6MB
11. Passwords and Authentication Methods/9. Password Managers - LastPass.mp4
26.48MB
12. Wrap Up/1. Congratulations.mp4
11.54MB
12. Wrap Up/2. Certificate Of Completion for CPEs.mp4
2.06MB
12. Wrap Up/3. Which VPN protocol is best to use and why.mp4
34.61MB
12. Wrap Up/4. Email Tracking and Hacking.mp4
26.78MB
12. Wrap Up/5. Security Vulnerabilities, Threats and Adversaries.mp4
11.83MB
2. Goals and Learning Objectives - Volume 2/1. Goals and Learning Objectives - Volume 2.mp4
15.92MB
3. Routers - Port and Vulnerability scanning/1. Goals and Learning Objectives.mp4
2.32MB
3. Routers - Port and Vulnerability scanning/2. The Home Router.mp4
60.63MB
3. Routers - Port and Vulnerability scanning/3. External Vulnerability Scanning - Shodan, Qualys & Nmap.mp4
93.44MB
3. Routers - Port and Vulnerability scanning/4. Internal Vulnerability Scanning - MBSA, Nmap, Nessus, Fing & Superscan & OpenVAS.mp4
96.47MB
3. Routers - Port and Vulnerability scanning/5. Open Source Custom Router Firmware.mp4
56MB
4. Firewalls/1. Goals and Learning Objectives.mp4
2.27MB
4. Firewalls/10. Mac - Host based Firewalls - pflist, Icefloor & Murus.mp4
38.14MB
4. Firewalls/11. Mac - Host based Firewalls - Little Snitch.mp4
25.2MB
4. Firewalls/12. Network based firewalls - Routers - DD-WRT.mp4
15.08MB
4. Firewalls/13. Network based firewalls - Hardware.mp4
19.7MB
4. Firewalls/14. Network based firewalls - pfSense, Smoothwall and Vyos.mp4
28.56MB
4. Firewalls/2. Firewalls – Host-based, network-based and virtual Part 1.mp4
44.79MB
4. Firewalls/3. Firewalls – Host-based, network-based and virtual Part 2.mp4
16.34MB
4. Firewalls/4. Windows - Host Based Firewalls - Windows Firewall.mp4
62.67MB
4. Firewalls/5. Windows - Host Based Firewalls - Windows Firewall Control (WFC).mp4
35.68MB
4. Firewalls/6. Windows - Host Based Firewalls - Third Party.mp4
35.26MB
4. Firewalls/7. Linux - Host Based Firewalls - iptables.mp4
60.79MB
4. Firewalls/8. Linux - Host Based Firewalls - UFW, gufw & nftables.mp4
49.5MB
4. Firewalls/9. Mac - Host based Firewalls - Application Firewall & PF.mp4
43.19MB
5. Network Attacks, Architecture and Isolation/1. Goals and Learning Objectives.mp4
1.58MB
5. Network Attacks, Architecture and Isolation/2. Network Attacks and Network Isolation - Introduction and IOT.mp4
15.32MB
5. Network Attacks, Architecture and Isolation/3. Network Attacks and Network Isolation - Arp Spoofing and Switches.mp4
17.68MB
5. Network Attacks, Architecture and Isolation/4. Effective Network Isolation Part 1.mp4
34.98MB
5. Network Attacks, Architecture and Isolation/5. Effective Network Isolation Part 2.mp4
23.78MB
6. Wireless and Wi-Fi Security/1. Goals and Learning Objectives.mp4
2.1MB
6. Wireless and Wi-Fi Security/2. Wi-Fi Weaknesses - WEP.mp4
8.15MB
6. Wireless and Wi-Fi Security/3. Wi-Fi Weaknesses - WPA, WPA2, TKIP and CCMP.mp4
37MB
6. Wireless and Wi-Fi Security/4. Wi-Fi Weaknesses - Wi-Fi Protected Setup WPS, Evil Twin and Rouge AP.mp4
15.94MB
6. Wireless and Wi-Fi Security/5. Wi-Fi Security Testing.mp4
21.72MB
6. Wireless and Wi-Fi Security/6. Wireless Security - Secure Configuration and Network Isolation.mp4
31.61MB
6. Wireless and Wi-Fi Security/7. Wireless security - RF Isolation and Reduction.mp4
9.42MB
6. Wireless and Wi-Fi Security/8. Wireless security - Who is on my Wi-Fi Network.mp4
11.7MB
7. Network Monitoring for Threats/1. Goals and Learning Objectives.mp4
1.38MB
7. Network Monitoring for Threats/2. Syslog.mp4
80.08MB
7. Network Monitoring for Threats/3. Network Monitoring - Wireshark, tcpdump, tshark, iptables Part 1.mp4
44.59MB
7. Network Monitoring for Threats/4. Network Monitoring - Wireshark, tcpdump, tshark, iptables Part 2.mp4
26.47MB
7. Network Monitoring for Threats/5. Wireshark - Finding malware and hackers - Part 1.mp4
91.01MB
7. Network Monitoring for Threats/6. Wireshark - Finding malware and hackers - Part 2.mp4
56.04MB
7. Network Monitoring for Threats/7. Network Monitoring - Wincap, NST, Netminer and NetWorx.mp4
18.82MB
8. How We Are Tracked Online/1. Goals and Learning Objectives.mp4
1.98MB
8. How We Are Tracked Online/10. More Tracking.mp4
52.06MB
8. How We Are Tracked Online/11. Browser and Internet Profiling.mp4
41.77MB
8. How We Are Tracked Online/2. Types of Tracking.mp4
89.85MB
8. How We Are Tracked Online/3. IP Address.mp4
46.36MB
8. How We Are Tracked Online/4. 3rd Party Connections.mp4
36.56MB
8. How We Are Tracked Online/5. HTTP Referer.mp4
14.42MB
8. How We Are Tracked Online/6. Cookies and Scripts.mp4
33.75MB
8. How We Are Tracked Online/7. Super Cookies.mp4
28.72MB
8. How We Are Tracked Online/8. Browser Fingerprinting and Browser Volunteered Information.mp4
37.15MB
8. How We Are Tracked Online/9. Browser and Browser Functionality.mp4
12.99MB
9. Search Engines and Privacy/1. Goals and Learning Objectives.mp4
1.63MB
9. Search Engines and Privacy/2. Search Engine Tracking, Censorship and Privacy.mp4
53.64MB
9. Search Engines and Privacy/3. Ixquick and Startpage.mp4
33.71MB
9. Search Engines and Privacy/4. DuckDuckGo.mp4
11.95MB
9. Search Engines and Privacy/5. Disconnect search.mp4
16.44MB
9. Search Engines and Privacy/6. YaCy.mp4
42.15MB
9. Search Engines and Privacy/7. Private and Anonymous Searching.mp4
54.34MB
友情提示
不会用的朋友看这里 把磁力链接复制到离线下载,或者bt下载软件里即可下载文件,或者直接复制迅雷链接到迅雷里下载! 亲,你造吗?将网页分享给您的基友,下载的人越多速度越快哦!
违规内容投诉邮箱:
[email protected]
概述 838888磁力搜索是一个磁力链接搜索引擎,是学术研究的副产品,用于解决资源过度分散的问题 它通过BitTorrent协议加入DHT网络,实时的自动采集数据,仅存储文件的标题、大小、文件列表、文件标识符(磁力链接)等基础信息 838888磁力搜索不下载任何真实资源,无法判断资源的合法性及真实性,使用838888磁力搜索服务的用户需自行鉴别内容的真伪 838888磁力搜索不上传任何资源,不提供Tracker服务,不提供种子文件的下载,这意味着838888磁力搜索 838888磁力搜索是一个完全合法的系统