Language:
Lynda - Cybersecurity for IT Professionals
Download from Usenet.nl
Lista de arquivos
00. Introduction/00_01 - Welcome.mp4 5.97 MB
00. Introduction/00_02 - What you should know before watching this course.mp4 848.81 KB
00. Introduction/00_03 - Using the exercise files.mp4 928.38 KB
01. Why Cybersecurity/01_01 - Hackers and the kill chain.mp4 13.63 MB
01. Why Cybersecurity/01_02 - The Stuxnet kill chain.mp4 8.53 MB
01. Why Cybersecurity/01_03 - Common forms of cybersecurity attack.mp4 13.48 MB
02. Antivirus/02_01 - Viruses, spyware, and adware.mp4 3.82 MB
02. Antivirus/02_02 - Using Windows Defender.mp4 2.99 MB
02. Antivirus/02_03 - Setting up real-time protection.mp4 0.98 MB
02. Antivirus/02_04 - Scanning with Windows Defender.mp4 4.11 MB
02. Antivirus/02_05 - Modifying antivirus settings in Windows Defender.mp4 5.49 MB
02. Antivirus/02_06 - Scheduling a scan with Windows Defender.mp4 9.24 MB
02. Antivirus/02_07 - Using Windows Defender offline.mp4 1.84 MB
02. Antivirus/02_08 - Exploring antivirus on Linux.mp4 1.65 MB
03. Personal Firewalls/03_01 - Why firewalls.mp4 1.45 MB
03. Personal Firewalls/03_02 - Using the Microsoft Windows Firewall.mp4 12.34 MB
03. Personal Firewalls/03_03 - Setting up advanced security notifications.mp4 9.06 MB
03. Personal Firewalls/03_04 - Setting up detailed rules.mp4 10.36 MB
03. Personal Firewalls/03_05 - Managing and analyzing log files with ZedLan.mp4 8.06 MB
03. Personal Firewalls/03_06 - Introducing iptables in Linux.mp4 10.17 MB
03. Personal Firewalls/03_07 - Building a simple firewall with iptables.mp4 4.56 MB
04. Knowing What Is on Your Network/04_01 - Getting started with Nmap.mp4 1.87 MB
04. Knowing What Is on Your Network/04_02 - Scanning for hosts.mp4 4.95 MB
04. Knowing What Is on Your Network/04_03 - Scanning for services.mp4 4.05 MB
04. Knowing What Is on Your Network/04_04 - Exploring advanced Nmap options.mp4 4.39 MB
04. Knowing What Is on Your Network/04_05 - Scanning in Windows with Zenmap.mp4 8.88 MB
05. Network Communications and Detecting Intruders/05_01 - Getting started with Netcat.mp4 3.05 MB
05. Network Communications and Detecting Intruders/05_02 - Using Netcat for file transfers.mp4 6.04 MB
05. Network Communications and Detecting Intruders/05_03 - Connecting to services.mp4 4.96 MB
05. Network Communications and Detecting Intruders/05_04 - Setting up a honeypot with Netcat.mp4 6.09 MB
06. Checking Hosts for Known Vulnerabilities/06_01 - Introduction to vulnerability scanning.mp4 2.25 MB
06. Checking Hosts for Known Vulnerabilities/06_02 - Getting started with Nessus.mp4 5.63 MB
06. Checking Hosts for Known Vulnerabilities/06_03 - Configuring Nessus.mp4 5.21 MB
06. Checking Hosts for Known Vulnerabilities/06_04 - Running a Nessus scan.mp4 11.77 MB
06. Checking Hosts for Known Vulnerabilities/06_05 - Scheduling a Nessus scan.mp4 4.18 MB
07. Checking for Common Mistakes in Web Apps/07_01 - Combating application-level threats.mp4 9.08 MB
07. Checking for Common Mistakes in Web Apps/07_02 - Web security scanning.mp4 15.91 MB
07. Checking for Common Mistakes in Web Apps/07_03 - Using the scanner as a web proxy.mp4 7.32 MB
08. Monitoring Network Activity/08_01 - Using Wireshark to explain packet-level activity.mp4 8.76 MB
08. Monitoring Network Activity/08_02 - How to capture packets from the network to analyze activity.mp4 6.60 MB
08. Monitoring Network Activity/08_03 - Making sense of the TCP IP protocols.mp4 15.34 MB
08. Monitoring Network Activity/08_04 - Filtering packets to focus on areas of interest.mp4 9.48 MB
08. Monitoring Network Activity/08_05 - Capturing intruders with packets.mp4 9.77 MB
08. Monitoring Network Activity/09_01 - Summary.mp4 4.48 MB
Torrent Downloaded From Katcr.co - Kickasstorrents.txt 52.00 B
Relacionados
Lynda - Cybersecurity for IT Professionals.mp4 506.17 MB
Lynda - Cybersecurity for IT Professionals.pdf 21.26 MB
Lynda - Cybersecurity for IT Professionals.mp4 994.01 MB
Lynda - Cybersecurity for IT Professionals.pdf 8.44 MB
Lynda - Cybersecurity for IT Professionals.mp4 2.42 GB
Quem somos : Nós somos um motor de busca de recurso DHT baseado no protocolo Torrents, todos os recursos vêm de rastreador da web do DHT por 24 horas. Todos os dados é gerado automaticamente pelo programa. Nós não armazenamos qualquer arquivos de Torrents, só para indexar as informações de meta de Torrents e prestação de serviços de pesquisa e recursos.
Magnet Link É uma nova forma de partilha, cada link correspondente para um arquivo de sementes BT. Você pode baixar no link magnético para recursos através de software, tais como µTorrent
Magnet Links & Torrents © 2010-2018 Privacy policy - DMCA Policy - Contact Us
简体中文 繁體中文 हिन्दी Español العربية Русский Indonesia Portuguese Italiano Deutsch Français 日本語 Tiếng Việt 한국어 ภาษาไทย Türkçe Polski Magyar Svenska Melayu Română Nederlands Čeština