Udemy - ITS-102 - Information Technology Specialist Network Security

Torrent Details

Udemy - ITS-102 - Information Technology Specialist Network SecurityUdemy - ITS-102 - Information Technology Specialist Network Security

NAME
Udemy - ITS-102 - Information Technology Specialist Network Security.torrent
CATEGORY
Other
INFOHASH
6c32fd96fbfd5c79f335806f19dbf06d4919f832
SIZE
1.1 GB in 56 files
ADDED
Uploaded on 07-05-2022 by our crawler pet called "Spidey".
SWARM
0 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description

ITS-102: Information Technology Specialist Network Security



https://DevCourseWeb.com

Published 04/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + srt | Duration: 27 lectures (2h 48m) | Size: 1.13 GB

Internet Security, viruses & spyware, firewalls, password security, wireless security, remote access, and more

What you'll learn
Master all IT security concepts
Learn about on-line threats and malware
Understand permissions, passwords, and security policies
Physical Security and Data Centers
Understand wired and wireless security
Configure pfSense - an open source firewall
Get ready to take the ITS 102 exam

Requirements
General IT knowledge
Understand basic networking commands (e.g. ipconfig, ping)

Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
~Get Your Files Here !/1. Defense in Depth/1. Tools that we will use.mp423.9 MB
~Get Your Files Here !/1. Defense in Depth/1. Tools that we will use.srt4.7 KB
~Get Your Files Here !/1. Defense in Depth/10. Identify attack types - DoS.mp417.3 MB
~Get Your Files Here !/1. Defense in Depth/10. Identify attack types - DoS.srt6.4 KB
~Get Your Files Here !/1. Defense in Depth/11. DoS - our lab.mp429.9 MB
~Get Your Files Here !/1. Defense in Depth/11. DoS - our lab.srt5.4 KB
~Get Your Files Here !/1. Defense in Depth/12. Malware - part 1.mp440.5 MB
~Get Your Files Here !/1. Defense in Depth/12. Malware - part 1.srt7.1 KB
~Get Your Files Here !/1. Defense in Depth/13. Malware and network attacks - part 2.mp465.4 MB
~Get Your Files Here !/1. Defense in Depth/13. Malware and network attacks - part 2.srt11.3 KB
~Get Your Files Here !/1. Defense in Depth/14. Recoviring a password for a zip archive - a lab.mp442.6 MB
~Get Your Files Here !/1. Defense in Depth/14. Recoviring a password for a zip archive - a lab.srt4 KB
~Get Your Files Here !/1. Defense in Depth/15. Backups.mp444 MB
~Get Your Files Here !/1. Defense in Depth/15. Backups.srt10.9 KB
~Get Your Files Here !/1. Defense in Depth/16. Quiz.html209 B
~Get Your Files Here !/1. Defense in Depth/2. The CIA model - part 1.mp428.1 MB
~Get Your Files Here !/1. Defense in Depth/2. The CIA model - part 1.srt10.1 KB
~Get Your Files Here !/1. Defense in Depth/3. The CIA model - part 2.mp435.7 MB
~Get Your Files Here !/1. Defense in Depth/3. The CIA model - part 2.srt6.5 KB
~Get Your Files Here !/1. Defense in Depth/4. The CIA model - part 3.mp430.5 MB
~Get Your Files Here !/1. Defense in Depth/4. The CIA model - part 3.srt6.9 KB
~Get Your Files Here !/1. Defense in Depth/5. The principle of least privilege.mp423.6 MB
~Get Your Files Here !/1. Defense in Depth/5. The principle of least privilege.srt6.1 KB
~Get Your Files Here !/1. Defense in Depth/6. Identify security policy types.mp421.7 MB
~Get Your Files Here !/1. Defense in Depth/6. Identify security policy types.srt6.3 KB
~Get Your Files Here !/1. Defense in Depth/7. Configuring an access control list (ACL) on a firewall - pfSense.mp431.7 MB
~Get Your Files Here !/1. Defense in Depth/7. Configuring an access control list (ACL) on a firewall - pfSense.srt6 KB
~Get Your Files Here !/1. Defense in Depth/8. Define and enforce physical security.mp4153.2 MB
~Get Your Files Here !/1. Defense in Depth/8. Define and enforce physical security.srt8.4 KB
~Get Your Files Here !/1. Defense in Depth/9. Hardware and Software security.mp423.1 MB
~Get Your Files Here !/1. Defense in Depth/9. Hardware and Software security.srt6.4 KB
~Get Your Files Here !/2. Operating System Security/1. Identify client and server protection.mp490.2 MB
~Get Your Files Here !/2. Operating System Security/1. Identify client and server protection.srt13.9 KB
~Get Your Files Here !/2. Operating System Security/10. VPNs.mp455.5 MB
~Get Your Files Here !/2. Operating System Security/11. Quiz.html209 B
~Get Your Files Here !/2. Operating System Security/2. Active Directory and GPO.mp433.1 MB
~Get Your Files Here !/2. Operating System Security/2. Active Directory and GPO.srt6 KB
~Get Your Files Here !/2. Operating System Security/3. Authentication.mp423 MB
~Get Your Files Here !/2. Operating System Security/3. Authentication.srt6.4 KB
~Get Your Files Here !/2. Operating System Security/4. User accounts and passwords.mp417.5 MB
~Get Your Files Here !/2. Operating System Security/4. User accounts and passwords.srt4.6 KB
~Get Your Files Here !/2. Operating System Security/5. MFA.mp452.4 MB
~Get Your Files Here !/2. Operating System Security/5. MFA.srt9.4 KB
~Get Your Files Here !/2. Operating System Security/6. Audits and logs.mp436.7 MB
~Get Your Files Here !/2. Operating System Security/6. Audits and logs.srt8.5 KB
~Get Your Files Here !/2. Operating System Security/7. Encryption symmetric and asymmetric.mp421.5 MB
~Get Your Files Here !/2. Operating System Security/7. Encryption symmetric and asymmetric.srt7.9 KB
~Get Your Files Here !/2. Operating System Security/8. Encryption and hashing.mp439.8 MB
~Get Your Files Here !/2. Operating System Security/8. Encryption and hashing.srt8.8 KB
~Get Your Files Here !/2. Operating System Security/9. VeraCrypt in action.mp436.6 MB
~Get Your Files Here !/2. Operating System Security/9. VeraCrypt in action.srt6.1 KB
~Get Your Files Here !/3. pfSense - extra lectures/1. Installing PfSense.mp446.5 MB
~Get Your Files Here !/3. pfSense - extra lectures/1. Installing PfSense.srt9.2 KB
~Get Your Files Here !/3. pfSense - extra lectures/2. Basic config of pfSense.mp464.1 MB
~Get Your Files Here !/3. pfSense - extra lectures/2. Basic config of pfSense.srt8.9 KB
~Get Your Files Here !/Bonus Resources.txt386 B

Alternative Torrents for 'Udemy ITS Information Technology Specialist Network Security'.

There are no alternative torrents found.