Search Torrents
|
Browse Torrents
|
48 Hour Uploads
|
TV shows
|
Music
|
Top 100
Audio
Video
Applications
Games
Porn
Other
All
Music
Audio books
Sound clips
FLAC
Other
Movies
Movies DVDR
Music videos
Movie clips
TV shows
Handheld
HD - Movies
HD - TV shows
3D
Other
Windows
Mac
UNIX
Handheld
IOS (iPad/iPhone)
Android
Other OS
PC
Mac
PSx
XBOX360
Wii
Handheld
IOS (iPad/iPhone)
Android
Other
Movies
Movies DVDR
Pictures
Games
HD - Movies
Movie clips
Other
E-books
Comics
Pictures
Covers
Physibles
Other
Details for:
Lynda - Cybersecurity for IT Professionals
lynda cybersecurity professionals
Type:
Other
Files:
45
Size:
289.5 MB
Uploaded On:
July 16, 2017, 12:47 p.m.
Added By:
sumi
Seeders:
4
Leechers:
0
Info Hash:
4D055D6D19A880F89C642AD6995FE5BF6AA11584
Get This Torrent
Protect your network from cyber attacks. Malcolm Shore shows how to use the latest tools to discourage and combat hackers, phishers, and snoops attempting to infiltrate your Windows and Linux systems. Learn what forms cyber attacks can take, and the two most common types of protection you can build into your system: antivirus protection and firewalls. Then learn how to scan your network for suspicious files, detect intruders with Netcat, and identify vulnerabilities at the host level with Nessus scans. Malcolm also shows how to avoid common security mistakes and monitor packet-level activity on your network. Topics include: Hackers and the kill chain Viruses, spyware, and adware Scanning with Windows Defender Building firewalls Scanning with Nmap Monitoring network communications with Netcat Combating application-level threats Capturing intruders through packet inspection
Get This Torrent
00. Introduction/00_01 - Welcome.mp4
6.0 MB
00. Introduction/00_02 - What you should know before watching this course.mp4
848.8 KB
00. Introduction/00_03 - Using the exercise files.mp4
928.4 KB
01. Why Cybersecurity/01_01 - Hackers and the kill chain.mp4
13.6 MB
01. Why Cybersecurity/01_02 - The Stuxnet kill chain.mp4
8.5 MB
01. Why Cybersecurity/01_03 - Common forms of cybersecurity attack.mp4
13.5 MB
02. Antivirus/02_01 - Viruses, spyware, and adware.mp4
3.8 MB
02. Antivirus/02_02 - Using Windows Defender.mp4
3.0 MB
02. Antivirus/02_03 - Setting up real-time protection.mp4
1004.4 KB
02. Antivirus/02_04 - Scanning with Windows Defender.mp4
4.1 MB
02. Antivirus/02_05 - Modifying antivirus settings in Windows Defender.mp4
5.5 MB
02. Antivirus/02_06 - Scheduling a scan with Windows Defender.mp4
9.2 MB
02. Antivirus/02_07 - Using Windows Defender offline.mp4
1.8 MB
02. Antivirus/02_08 - Exploring antivirus on Linux.mp4
1.7 MB
03. Personal Firewalls/03_01 - Why firewalls.mp4
1.4 MB
03. Personal Firewalls/03_02 - Using the Microsoft Windows Firewall.mp4
12.3 MB
03. Personal Firewalls/03_03 - Setting up advanced security notifications.mp4
9.1 MB
03. Personal Firewalls/03_04 - Setting up detailed rules.mp4
10.4 MB
03. Personal Firewalls/03_05 - Managing and analyzing log files with ZedLan.mp4
8.1 MB
03. Personal Firewalls/03_06 - Introducing iptables in Linux.mp4
10.2 MB
03. Personal Firewalls/03_07 - Building a simple firewall with iptables.mp4
4.6 MB
04. Knowing What Is on Your Network/04_01 - Getting started with Nmap.mp4
1.9 MB
04. Knowing What Is on Your Network/04_02 - Scanning for hosts.mp4
5.0 MB
04. Knowing What Is on Your Network/04_03 - Scanning for services.mp4
4.1 MB
04. Knowing What Is on Your Network/04_04 - Exploring advanced Nmap options.mp4
4.4 MB
04. Knowing What Is on Your Network/04_05 - Scanning in Windows with Zenmap.mp4
8.9 MB
05. Network Communications and Detecting Intruders/05_01 - Getting started with Netcat.mp4
3.1 MB
05. Network Communications and Detecting Intruders/05_02 - Using Netcat for file transfers.mp4
6.0 MB
05. Network Communications and Detecting Intruders/05_03 - Connecting to services.mp4
5.0 MB
05. Network Communications and Detecting Intruders/05_04 - Setting up a honeypot with Netcat.mp4
6.1 MB
06. Checking Hosts for Known Vulnerabilities/06_01 - Introduction to vulnerability scanning.mp4
2.2 MB
06. Checking Hosts for Known Vulnerabilities/06_02 - Getting started with Nessus.mp4
5.6 MB
06. Checking Hosts for Known Vulnerabilities/06_03 - Configuring Nessus.mp4
5.2 MB
06. Checking Hosts for Known Vulnerabilities/06_04 - Running a Nessus scan.mp4
11.8 MB
06. Checking Hosts for Known Vulnerabilities/06_05 - Scheduling a Nessus scan.mp4
4.2 MB
07. Checking for Common Mistakes in Web Apps/07_01 - Combating application-level threats.mp4
9.1 MB
07. Checking for Common Mistakes in Web Apps/07_02 - Web security scanning.mp4
15.9 MB
07. Checking for Common Mistakes in Web Apps/07_03 - Using the scanner as a web proxy.mp4
7.3 MB
08. Monitoring Network Activity/08_01 - Using Wireshark to explain packet-level activity.mp4
8.8 MB
08. Monitoring Network Activity/08_02 - How to capture packets from the network to analyze activity.mp4
6.6 MB
08. Monitoring Network Activity/08_03 - Making sense of the TCP IP protocols.mp4
15.3 MB
08. Monitoring Network Activity/08_04 - Filtering packets to focus on areas of interest.mp4
9.5 MB
08. Monitoring Network Activity/08_05 - Capturing intruders with packets.mp4
9.8 MB
08. Monitoring Network Activity/09_01 - Summary.mp4
4.5 MB
Torrent Downloaded From Katcr.co - Kickasstorrents.txt
52 bytes
Similar Posts:
Category
Name
Uploaded
Other
Lynda - Foundations of Cybersecurity
Feb. 4, 2023, 12:02 p.m.
Other
Lynda - Cybersecurity Foundations
Feb. 3, 2023, 4:54 p.m.
Other
Lynda - Cybersecurity for IT Professionals
Feb. 3, 2023, 4:54 p.m.
Other
Lynda - Cybersecurity with Cloud Computing
Feb. 3, 2023, 4:54 p.m.