Lynda - Cybersecurity For IT Professionals

Torrent Details

Lynda - Cybersecurity for IT ProfessionalsLynda - Cybersecurity for IT Professionals

NAME
Lynda - Cybersecurity for IT Professionals.torrent
CATEGORY
eBooks
INFOHASH
4d055d6d19a880f89c642ad6995fe5bf6aa11584
SIZE
290 MB in 44 files
ADDED
Uploaded on 19-07-2017 by our crawler pet called "Spidey".
SWARM
0 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description

Protect your network from cyber attacks. Malcolm Shore shows how to use the latest tools to discourage and combat hackers, phishers, and snoops attempting to infiltrate your Windows and Linux systems. Learn what forms cyber attacks can take, and the two most common types of protection you can build into your system: antivirus protection and firewalls. Then learn how to scan your network for suspicious files, detect intruders with Netcat, and identify vulnerabilities at the host level with Nessus scans. Malcolm also shows how to avoid common security mistakes and monitor packet-level activity on your network.
Topics include:
Hackers and the kill chain
Viruses, spyware, and adware
Scanning with Windows Defender
Building firewalls
Scanning with Nmap
Monitoring network communications with Netcat
Combating application-level threats
Capturing intruders through packet inspection

Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
00. Introduction/00_01 - Welcome.mp46 MB
00. Introduction/00_02 - What you should know before watching this course.mp4848.8 KB
00. Introduction/00_03 - Using the exercise files.mp4928.4 KB
01. Why Cybersecurity/01_01 - Hackers and the kill chain.mp413.6 MB
01. Why Cybersecurity/01_02 - The Stuxnet kill chain.mp48.5 MB
01. Why Cybersecurity/01_03 - Common forms of cybersecurity attack.mp413.5 MB
02. Antivirus/02_01 - Viruses, spyware, and adware.mp43.8 MB
02. Antivirus/02_02 - Using Windows Defender.mp43 MB
02. Antivirus/02_03 - Setting up real-time protection.mp41004.4 KB
02. Antivirus/02_04 - Scanning with Windows Defender.mp44.1 MB
02. Antivirus/02_05 - Modifying antivirus settings in Windows Defender.mp45.5 MB
02. Antivirus/02_06 - Scheduling a scan with Windows Defender.mp49.2 MB
02. Antivirus/02_07 - Using Windows Defender offline.mp41.8 MB
02. Antivirus/02_08 - Exploring antivirus on Linux.mp41.7 MB
03. Personal Firewalls/03_01 - Why firewalls.mp41.4 MB
03. Personal Firewalls/03_02 - Using the Microsoft Windows Firewall.mp412.3 MB
03. Personal Firewalls/03_03 - Setting up advanced security notifications.mp49.1 MB
03. Personal Firewalls/03_04 - Setting up detailed rules.mp410.4 MB
03. Personal Firewalls/03_05 - Managing and analyzing log files with ZedLan.mp48.1 MB
03. Personal Firewalls/03_06 - Introducing iptables in Linux.mp410.2 MB
03. Personal Firewalls/03_07 - Building a simple firewall with iptables.mp44.6 MB
04. Knowing What Is on Your Network/04_01 - Getting started with Nmap.mp41.9 MB
04. Knowing What Is on Your Network/04_02 - Scanning for hosts.mp45 MB
04. Knowing What Is on Your Network/04_03 - Scanning for services.mp44.1 MB
04. Knowing What Is on Your Network/04_04 - Exploring advanced Nmap options.mp44.4 MB
04. Knowing What Is on Your Network/04_05 - Scanning in Windows with Zenmap.mp48.9 MB
05. Network Communications and Detecting Intruders/05_01 - Getting started with Netcat.mp43.1 MB
05. Network Communications and Detecting Intruders/05_02 - Using Netcat for file transfers.mp46 MB
05. Network Communications and Detecting Intruders/05_03 - Connecting to services.mp45 MB
05. Network Communications and Detecting Intruders/05_04 - Setting up a honeypot with Netcat.mp46.1 MB
06. Checking Hosts for Known Vulnerabilities/06_01 - Introduction to vulnerability scanning.mp42.2 MB
06. Checking Hosts for Known Vulnerabilities/06_02 - Getting started with Nessus.mp45.6 MB
06. Checking Hosts for Known Vulnerabilities/06_03 - Configuring Nessus.mp45.2 MB
06. Checking Hosts for Known Vulnerabilities/06_04 - Running a Nessus scan.mp411.8 MB
06. Checking Hosts for Known Vulnerabilities/06_05 - Scheduling a Nessus scan.mp44.2 MB
07. Checking for Common Mistakes in Web Apps/07_01 - Combating application-level threats.mp49.1 MB
07. Checking for Common Mistakes in Web Apps/07_02 - Web security scanning.mp415.9 MB
07. Checking for Common Mistakes in Web Apps/07_03 - Using the scanner as a web proxy.mp47.3 MB
08. Monitoring Network Activity/08_01 - Using Wireshark to explain packet-level activity.mp48.8 MB
08. Monitoring Network Activity/08_02 - How to capture packets from the network to analyze activity.mp46.6 MB
08. Monitoring Network Activity/08_03 - Making sense of the TCP IP protocols.mp415.3 MB
08. Monitoring Network Activity/08_04 - Filtering packets to focus on areas of interest.mp49.5 MB
08. Monitoring Network Activity/08_05 - Capturing intruders with packets.mp49.8 MB
08. Monitoring Network Activity/09_01 - Summary.mp44.5 MB

Alternative Torrents for 'Lynda Cybersecurity for IT Professionals'.

There are no alternative torrents found.