种子简介
种子名称:
[Coursera] Python for Cybersecurity Specialization - 5 course series
文件类型:
视频
文件数目:
90个文件
文件大小:
1.12 GB
收录时间:
2025-5-1 06:10
已经下载:
3次
资源热度:
4
最近下载:
2025-5-2 05:30
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:1c7d77a44a6fee4baceaf1bd7278a0ea9fc4dc51&dn=[Coursera] Python for Cybersecurity Specialization - 5 course series
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
[Coursera] Python for Cybersecurity Specialization - 5 course series.torrent
pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_01_introduction-to-python-for-cybersecurity.mp43.87MB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_01_monitoring-for-active-defense.mp44.36MB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_02_introduction-to-user-execution.mp44.77MB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_01_active-defense-on-the-network.mp44.87MB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_01_mitre-att-ck-collection.mp45MB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_01_mitre-att-ck-lateral-movement.mp45.15MB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_01_mitre-att-ck-impact.mp45.75MB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_04_introduction-to-file-and-directory-discovery.mp45.79MB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_02_introduction-to-exfiltration-over-alternative-protocols.mp45.81MB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_01_mitre-att-ck-privilege-escalation.mp45.84MB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_02_introduction-to-data-encrypted-for-impact.mp45.95MB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_01_mitre-att-ck-exfiltration.mp45.98MB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_02_introduction-to-remote-services.mp46.09MB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_01_mitre-att-ck-execution.mp46.1MB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_02_introduction-to-boot-or-logon-autostart-execution.mp46.19MB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_01_mitre-att-ck-persistence.mp46.21MB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_02_pcap-collection-for-active-defense.mp46.27MB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_04_introduction-to-scheduled-tasks-and-jobs.mp46.28MB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_01_mitre-att-ck-discovery.mp46.28MB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_01_mitre-att-ck-defense-evasion.mp46.45MB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_04_introduction-to-non-application-layer-protocol.mp46.53MB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_02_introduction-to-credentials-from-password-stores.mp46.63MB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_01_mitre-att-ck-initial-access.mp46.65MB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_05_non-application-layer-protocol.mp46.8MB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_04_protocol-decoding-for-active-defense.mp46.85MB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_02_network-monitoring-for-active-defense.mp46.89MB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_06_burn-in-for-active-defense.mp47.09MB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_02_introduction-to-boot-or-logon-autostart-execution.mp47.13MB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_01_mitre-att-ck onehack.us.mp47.28MB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_05_local-email-collection.mp47.3MB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_02_introduction-to-account-discovery.mp47.37MB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_01_mitre-att-ck-credential-access.mp47.38MB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_04_introduction-to-account-access-removal.mp47.41MB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_04_introduction-to-protocol-tunneling.mp47.45MB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_04_introduction-to-email-collection.mp47.53MB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_04_introduction-to-network-sniffing.mp47.58MB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_04_introduction-to-hijack-execution-flow.mp47.7MB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_05_introduction-to-open-technical-databases.mp47.7MB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_06_decoy-credentials-for-active-defense.mp47.75MB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_02_introduction-to-encrypted-channels.mp47.82MB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_04_decoy-content-for-active-defense.mp47.84MB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_02_introduction-to-network-scanning.mp48.01MB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_02_introduction-to-clipboard-data.mp48.05MB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_01_introduction-to-decoys.mp48.09MB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_04_introduction-to-replication-through-removable-media.mp48.13MB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_02_introduction-to-valid-accounts.mp48.22MB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_02_decoy-processes-for-active-defense.mp48.23MB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_04_system-activity-monitoring-for-active-defense.mp48.37MB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_04_introduction-to-hide-artifacts.mp48.38MB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_02_introduction-to-impair-defenses.mp48.42MB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_04_introduction-to-use-alternative-authentication-material.mp48.56MB
pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_02_introduction-to-python.mp48.83MB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_06_behavioral-analytics-for-active-defense.mp49MB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_01_mitre-pre-att-ck.mp49.32MB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_05_decoy-content.mp49.52MB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_04_introduction-to-process-injection.mp49.64MB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_03_smb-windows-admin-shares.mp411.6MB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_03_clipboard-data.mp412.65MB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_03_malicious-links.mp413.13MB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_03_introduction-to-scapy.mp413.52MB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_05_python-library-injection.mp413.62MB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_05_web-session-cookie.mp414.31MB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_05_account-access-removal.mp414.4MB
pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_03_introduction-to-mitre-att-ck-and-shield.mp415.63MB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_03_network-monitoring.mp415.72MB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_05_file-and-directory-discovery.mp415.95MB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_07_burn-in.mp416.43MB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_05_protocol-tunneling.mp417.36MB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_03_decoy-processes.mp417.6MB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_07_decoy-credentials.mp418.83MB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_03_credentials-from-web-browsers.mp419.74MB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_03_impair-avs.mp419.8MB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_05_autorun-scripts.mp420.21MB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_03_default-account-discovery.mp420.73MB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_05_alternate-data-streams.mp421.33MB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_03_data-encryption.mp422.52MB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_03_logon-scripts.mp423.44MB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_03_user-account-discovery.mp424.22MB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_05_scheduled-execution.mp424.61MB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_03_encrypted-channel.mp424.62MB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_03_pcap-collection.mp424.78MB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_05_system-activity-monitoring.mp425.34MB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_06_dns-exploration.mp426.07MB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_05_hijacked-execution-flow.mp426.22MB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_03_registry-autorun.mp427.61MB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_07_behavioral-analytics.mp427.87MB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_05_protocol-decoding.mp430.03MB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_04_network-scanning.mp431.04MB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_05_network-sniffing.mp440.04MB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_03_alternative-protocol.mp458.97MB