Skocz do zawartości

Aktywacja nowych użytkowników
Zakazane produkcje

Znajdź zawartość

Wyświetlanie wyników dla tagów 'Cybersecurity' .



Więcej opcji wyszukiwania

  • Wyszukaj za pomocą tagów

    Wpisz tagi, oddzielając je przecinkami.
  • Wyszukaj przy użyciu nazwy użytkownika

Typ zawartości


Forum

  • DarkSiders
    • Regulamin
    • Dołącz do Ekipy forum jako
    • Ogłoszenia
    • Propozycje i pytania
    • Szukam
    • Help
    • Poradniki / Tutoriale
    • Wszystko o nas
  • Hydepark
    • Newsy
    • Niezwykłe zjawiska
    • Rozrywka
    • Rozmowy...
    • hakerskie nowinki
    • Hardware
    • Webmasters
    • Grafika
    • Telefony i Komunikacja
    • Sport
    • Kulinaria
    • Forum Lady
    • Ciekawe Strony
  • DSTeam no Limits (serwery bez limitów!)
    • FILMY
    • GRY
    • MUZYKA
    • PROGRAMY
    • Ebooki
  • Download
  • Archiwum

Szukaj wyników w...

Znajdź wyniki, które zawierają...


Data utworzenia

  • Od tej daty

    Do tej daty


Ostatnia aktualizacja

  • Od tej daty

    Do tej daty


Filtruj po ilości...

Dołączył

  • Od tej daty

    Do tej daty


Grupa podstawowa


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Gadu Gadu


Skąd


Interests


Interests


Polecający

Znaleziono 6 wyników

  1. Free Download Cybersecurity First Principles: A Reboot of Strategy and Tactics - [AUDIOBOOK] pdf, m4b | 272.77 MB | N/A | Isbn:1394173091 | Author: Rick Howard | Year: 2023 Description: Download Link: https://rapidgator.net/file/ac40645b4280f73967ce858029f4417e/Rick.Howard.-.Cybersecurity.First.Principles-.A.Reboot.of.Strategy.and.Tactics.rar https://ddownload.com/av88z3o45bb7/Rick.Howard.-.Cybersecurity.First.Principles-.A.Reboot.of.Strategy.and.Tactics.rar
  2. Free Download Cybersecurity All-in-One For Dummies - [AUDIOBOOK] epub, m4b | 725.6 MB | English | Isbn:139415285X | Author: Joseph Steinberg, Kevin Beaver, Ted Coombs, Ira Winkler | Year: 2023 Description: Download Link: https://rapidgator.net/file/107500abbd4e919f927f1c73eab4226b/Joseph.Steinberg.-.Cybersecurity.All-in-One.for.Dummies.rar https://nitroflare.com/view/7502B4AD8F208D6/Joseph.Steinberg.-.Cybersecurity.All-in-One.for.Dummies.rar
  3. Cybersecurity Analyst+ (CS0-001) Cert Prep: First Look Size: 250 MB | Duration: 0h 38m | Video: AVC (.mp4) 1280x720 30fps | Audio: AAC 48KHz 2ch Genre: eLearning | Level: Beginner | Language: English Demonstrate your understanding of how to prevent, detect, and combat cybersecurity threats by earning the CompTIA Cybersecurity Analyst (CSA+) certification. In this course, cybersecurity expert Mike Chapple provides a high-level overview of the CompTIA Cybersecurity Analyst (CSA+) certification exam. Mike discusses the various careers in IT security and the value of certification. He covers the four domains that make up the CSA+ exam objective blueprint: threat management, vulnerability management, cyber incident response, and security architecture and tool sets. He also provides a general overview of the exam, including the exam environment and question types. Finally, he discusses the continuing education requirements for CompTIA. Topics include: * Careers in information security * Exploring the CSA+ domains * Threat management * Vulnerability management * Cyber incident response * Security architecture and tool sets * Reviewing the CSA+ exam environment and question types * Passing the CSA+ exam Download From UploadGig https://uploadgig.com/file/download/e482b1b21B7E7998/LyndaCybersecurityAnalystCS0001CertPrep.rar Download From NitroFlare http://nitroflare.com/view/2B66EA6B44AC7AB/LyndaCybersecurityAnalystCS0001CertPrep.rar Download From Rapidgator http://rapidgator.net/file/320bc67fb033fdefa84ed2fc9b0f83f5/LyndaCybersecurityAnalystCS0001CertPrep.rar.html
  4. Lynda - Foundations of Cybersecurity English | 2h 26m | AVC (.mp4) 1280x720 15fps | AAC 48KHz 2ch | 289 Mb Genre: eLearning Set a rock solid foundation for your network, users, and data by learning about the basics of cybersecurity. Security expert Malcolm Shore shows how to assess and mitigate risks using various cybersecurity frameworks and control standards, such as NIST, COBIT 5, ISO 27000, and the Payment Card Industry Data Security Standard (PCI DSS). He'll also show how to detect hidden and cloaked files, evaluate and avoid threats such as malware, architect security to align with business needs using SABSA, manage user access, and prepare for and respond to cybersecurity incidents when they do occur. By the end of this course, you'll have a greater understanding of the threats that affect private, corporate, and government networks, and the knowledge to prevent attacks and defeat them. Topics include: * Dissecting cyber risk * Working with NIST, COBIT 5, DSS05, and other frameworks * Exploring cybercrime * Understanding how malware hides * Selecting security controls * Managing user access and identity * Monitoring your network * Managing incident response DOWNLOAD http://uploaded.net/file/qfo217vj/7Cybersecurity.part1.rar http://uploaded.net/file/jbihx130/7Cybersecurity.part2.rar http://uploaded.net/file/hbw98gg4/7Cybersecurity.part3.rar http://rapidgator.net/file/7e493af503c81e036c378385e52e997d/7Cybersecurity.part1.rar.html http://rapidgator.net/file/c78d32541d900c35c858fd6317edac66/7Cybersecurity.part2.rar.html http://rapidgator.net/file/726f315087fdbc3d144859e5881d150b/7Cybersecurity.part3.rar.html https://www.uploadable.ch/file/y4GgkXFwjXqe/7Cybersecurity.part1.rar https://www.uploadable.ch/file/uj98NXT9ajZt/7Cybersecurity.part2.rar https://www.uploadable.ch/file/5Bf9ekbTnbaQ/7Cybersecurity.part3.rar
  5. Cybersecurity with Cloud Computing English | 2h 25m | AVC (.mp4) 1280x720 15&30fps | AAC 48KHz 2ch | 345 Mb Genre: eLearning How do you keep your organization's files, applications, and accounts safe on the cloud? It starts with a considered design approach. In these videos, Malcolm Shore outlines the major cloud security risks, some of which have resulted in service disruptions at companies like Azure, Dropbox, Google, and Amazon, and shows how to plan for and minimize risk when it comes to your own cloud deployments. He introduces concepts such as software as a service (SaaS) and infrastructure as a service, and the differences between public and private clouds. Then, after reviewing the cloud security best practices from the Cloud Security Alliance and the European Network and Information Security Agency (ENISA), Malcolm shows how to use SABSA, a popular security requirements mapping approach, to figure out the business requirements for a successful and secure cloud deployment of your own. Topics include: *Essential cloud concepts: infrastructure, deployment models, and more *Defining trust models for clouds *Identifying governance and risk *Complying with legal and audit requirements *Managing incident response *Maximizing application security *Managing encryption and keys *Implementing virtualization *Introducing SABSA and the cloud attribute taxonomy DOWNLOAD http://rapidgator.net/file/36d8bc29ad6b5ffdc81b6f8bc6aa1efa/8Cybersecurity.part1.rar.html http://rapidgator.net/file/1c4cb8703cf369eb5ce67d26f55aee42/8Cybersecurity.part2.rar.html http://rapidgator.net/file/a5c92e64521bb8397be6d82d4741ea44/8Cybersecurity.part3.rar.html http://uploaded.net/file/aalgjm9t/8Cybersecurity.part1.rar http://uploaded.net/file/op6e89ef/8Cybersecurity.part2.rar http://uploaded.net/file/gyhe6wnn/8Cybersecurity.part3.rar http://www.uploadable.ch/file/vN8nhUu3KZGf/8Cybersecurity.part1.rar http://www.uploadable.ch/file/ncTeDKK8f948/8Cybersecurity.part2.rar http://www.uploadable.ch/file/DPhefutZs6ae/8Cybersecurity.part3.rar
  6. Cybersecurity with Cloud Computing With Malcolm Shore Size: 345MB | Duration: 2h 25m | Video: AVC (.mp4) 1280x720 15&30fps | Audio: AAC 48KHz 2ch Genre: eLearning | Level: Intermediate | Language: English How do you keep your organization's files, applications, and accounts safe on the cloud? It starts with a considered design approach. In these videos, Malcolm Shore outlines the major cloud security risks, some of which have resulted in service disruptions at companies like Azure, Dropbox, Google, and Amazon, and shows how to plan for and minimize risk when it comes to your own cloud deployments. He introduces concepts such as software as a service (SaaS) and infrastructure as a service, and the differences between public and private clouds. Then, after reviewing the cloud security best practices from the Cloud Security Alliance and the European Network and Information Security Agency (ENISA), Malcolm shows how to use SABSA, a popular security requirements mapping approach, to figure out the business requirements for a successful and secure cloud deployment of your own. Topics include: * Essential cloud concepts: infrastructure, deployment models, and more * Defining trust models for clouds * Identifying governance and risk * Complying with legal and audit requirements * Managing incident response * Maximizing application security * Managing encryption and keys * Implementing virtualization * Introducing SABSA and the cloud attribute taxonomy Download From NitroFlare http://www.nitroflare.com/view/3F3556836006B13/cybersec.part1.rar http://www.nitroflare.com/view/D06596F6AF450B7/cybersec.part2.rar http://www.nitroflare.com/view/43FE2DD67E8168A/cybersec.part3.rar http://www.nitroflare.com/view/FFAA1CEB1F77650/cybersec.part4.rar Download From Keep2share http://k2s.cc/file/c568b34c18811/cybersec.part1.rar http://k2s.cc/file/b2d97518660b9/cybersec.part2.rar http://k2s.cc/file/20b186efc24ef/cybersec.part3.rar http://k2s.cc/file/3bb5e574eaa08/cybersec.part4.rar Download From Rapidgator http://rapidgator.net/file/09519a86caa8a5f91e342ea10fda489c/cybersec.part1.rar.html http://rapidgator.net/file/6a2363dc964988afc729a5d489cf6d09/cybersec.part2.rar.html http://rapidgator.net/file/604f771f9f0d389f76428f55d0cf2472/cybersec.part3.rar.html http://rapidgator.net/file/f4f69160dbdaec2bd13cfd12755b2168/cybersec.part4.rar.html
×
×
  • Dodaj nową pozycję...

Powiadomienie o plikach cookie

Korzystając z tej witryny, wyrażasz zgodę na nasze Warunki użytkowania.