Old Search System: cyber sports




  • MotionArray - Cyberpunk Intro - 430071

    MotionArray - Cyberpunk Intro - 430071 After Effects CC 2019 | 1920x1080 (HD) | No...


    Cyberpunk Intro is an advanced looking After Effects template with a bright and dynamically animated logo reveal. It's so easy to use with 2 editable text layers and 1 logo placeholder. A wicked intro or opener to your electronic reviews, gaming highlights, new products, promotions and upcoming events videos. Impress...


  • AudioJungle - Cyberpunk Ambient - 26693584

    AudioJungle - Cyberpunk Ambient - 26693584 0:55 MINUTE | 320 kbps | 16-Bit Stereo, 44.1...





  • MotionArray - Cyberpunk Titles - 103826

    MotionArray - Cyberpunk Titles - 103826 After Effects CC 2017 | 1920x1080 (HD) | No...


    Cyberpunk Titles is a cool futuristic title sequence for After Effects. It features colorful glitching titles in a rainy cyberpunk city environment. The project includes 16 text placeholders with an editable gradient controller. The text is reflected into the wet pavement below. There is also one logo placeholder for the...


  • Videohive Cybernetic Tunnel 04 19508869

    Videohive Cybernetic Tunnel 04 19508869 Alpha Channel : No | Looped Video : Yes |...





  • Videohive Cybernetic Kaleida 14287995

    Videohive Cybernetic Kaleida 14287995 Alpha Channel : No | Looped Video : Yes | Frame...





  • MotionArray Cyberpunk Logo 323575

    MotionArray Cyberpunk Logo 323575 After Effects CS6+ | 3840x2160 (4K) | No Plug-Ins Cyberpunk Logo...





  • Videohive Cybernetic Tunnel 01 19468820

    Videohive Cybernetic Tunnel 01 19468820 Alpha Channel : No | Looped Video : Yes |...





  • Emblem gaming mascot design cybersport illustration 22

    Emblem gaming mascot design cybersport illustration 22EPS * JPEG






  • Cyber Security Stories

    Cyber Security StoriesVideo: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100 Hz, 2ch | Size:...


    What you\'ll learn
    Different types of viruses
    Not To Dos
    To Dos
    Requirements
    Absolute Curiosity is required
    Description
    Welcome to the series of computer viruses!
    This is NOT a conventional cyber security course.
    There are a lot of terminologies that scare people away from learning cyber security.
    Not on our course!
    This course assumes you have zero...


  • AudioJungle - Industrial Cyberpunk - 26405818

    AudioJungle - Industrial Cyberpunk - 26405818 1:07 MINUTE | 320 kbps | 16-Bit Stereo, 44.1...





  • Risk Management for IT and Cybersecurity Managers

    Risk Management for IT and Cybersecurity Managers https://www.lynda.com/course-tutorials/Risk-Management-IT-Cybersecurity-Managers/2252221-2.html Curious about why leaders at your organization...


    Introduction1. What Is Risk?2. What Can You Do with Risk?3. Calculating RiskConclusion

  • Cyber Immunity

    Broknote

    Cyber Immunity

    Cyber ImmunityVideo: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100 Hz, 2ch | Size: 762...


    What you'll learn
    Differences between Cyber security and Cyber immunity
    What kind of cyber threats currently exist
    What it takes from organization to prepare better IT security
    How to response IT security threats
    How machine learning can be used to enhance immunity
    Requirements
    Basic knowledge about IT security
    Interest to take...


  • Emblem gaming mascot design cybersport illustration 20

    Emblem gaming mascot design cybersport illustration 20EPS * JPEG






  • Cyber Princess Font

    Cyber Princess FontCyber Princess is an original display font. It has a futuristic look that...





  • Lynda - Microsoft Cybersecurity Stack: Securing Enterprise Infrastructure

    Lynda - Microsoft Cybersecurity Stack: Securing Enterprise Infrastructure The rise of the hybrid cloud has...


    Table of ContentsIntroduction1. Implementing Guarded Fabric in Windows Server 20162. Shielding Virtual Machine Data3. Preventing, Detecting, and Responding to Threats4. Encrypting Data in Azure VMsConclusion


  • Cybersecurity Ethics

    Cybersecurity Ethics English | ISBN-10: 1138717525 | ISBN-13: 978-1138717527 https://www.amazon.com/Cybersecurity-Ethics-Mary-Manjikian/dp/1138717525





  • Lynda - Microsoft Cybersecurity Stack: Securing Enterprise Information

    Lynda - Microsoft Cybersecurity Stack: Securing Enterprise Information Today's users expect to be productive wherever...


    Table of ContentsIntroduction1. Securing Corporate Information on Any Device2. Securing Corporate Data on Mobile Devices3. Identifying and Controlling Shadow IT4. Securing Collaboration and DLP5. Securing Structured (SQL) DataConclusion


  • AudioJungle - Chinese Cyberpunk - 26222873

    AudioJungle - Chinese Cyberpunk - 26222873 1:46 MINUTE | 320 kbps | 16-Bit Stereo, 44.1...





  • Videohive Cybernetic Kaleida 2 14293119

    Videohive Cybernetic Kaleida 2 14293119 Alpha Channel : No | Looped Video : Yes |...





  • MotionElements Cybersphere - Hi-Tech polygon Spheres logo opener 9172934

    MotionElements Cybersphere - Hi-Tech polygon Spheres logo opener 9172934 Required Version: CS3 and above |...