[ TutGee.Com ] Linkedin - Practical Cybersecurity For IT Professionals

Torrent Details


[ TutGee.com ] Linkedin - Practical Cybersecurity for IT Professionals

NAME
[ TutGee.com ] Linkedin - Practical Cybersecurity for IT Professionals.torrent
CATEGORY
Other
INFOHASH
521f1fe5376f1c55fecb6c3e752e49f2fc570ccb
SIZE
370 MB in 80 files
ADDED
Uploaded on 10-05-2022 by our crawler pet called "Spidey".
SWARM
0 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description

[ CourseWikia.com ] Practical Cybersecurity for IT Professionals



If You Need More Stuff, kindly Visit and Support Us -->> https://CourseWikia.com







Released 05/2022

MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch

Skill Level: Beginner | Genre: eLearning | Language: English + srt | Duration: 2h 26m | Size: 370 MB



Learn how to protect your network from cyberattacks through practical, hands-on nstrations. In this course, Malcolm Shore shows how to use the latest tools to discourage and combat hackers, phishers, and snoops attempting to infiltrate your Windows and Linux systems. Learn what forms cyberattacks can take, as well as the two most common types of protection you can build into your system: Antivirus protection and firewalls. Then, learn how to scan your network for suspicious files, check what services are exposed on your systems, and identify vulnerabilities at the host level with Nessus scans. Malcolm also shows how to combat application-level threats, identify weak points in your web applications, and monitor packet-level activity on your network.



If You Need More Stuff, kindly Visit and Support Us -->> https://FreeCourseWeb.com



Get More Tutorials and Support Us -->> https://DevCourseWeb.com



We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...



Image error



Image error

Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
~Get Your Files Here !/01 - Introduction/01 - Understanding cybersecurity.mp44.6 MB
~Get Your Files Here !/01 - Introduction/01 - Understanding cybersecurity.srt1.3 KB
~Get Your Files Here !/01 - Introduction/02 - What you should know.mp45.3 MB
~Get Your Files Here !/01 - Introduction/02 - What you should know.srt4.5 KB
~Get Your Files Here !/01 - Introduction/03 - Disclaimer.mp42.1 MB
~Get Your Files Here !/01 - Introduction/03 - Disclaimer.srt1.7 KB
~Get Your Files Here !/02 - 1. Why Cybersecurity/01 - A history of hackers.mp416.7 MB
~Get Your Files Here !/02 - 1. Why Cybersecurity/01 - A history of hackers.srt7.7 KB
~Get Your Files Here !/02 - 1. Why Cybersecurity/02 - The cyber kill chain.mp411.5 MB
~Get Your Files Here !/02 - 1. Why Cybersecurity/02 - The cyber kill chain.srt10.5 KB
~Get Your Files Here !/02 - 1. Why Cybersecurity/03 - Stuxnet and the kill chain.mp49.3 MB
~Get Your Files Here !/02 - 1. Why Cybersecurity/03 - Stuxnet and the kill chain.srt6.3 KB
~Get Your Files Here !/02 - 1. Why Cybersecurity/04 - Common forms of cyberattack.mp412.5 MB
~Get Your Files Here !/02 - 1. Why Cybersecurity/04 - Common forms of cyberattack.srt11.1 KB
~Get Your Files Here !/02 - 1. Why Cybersecurity/05 - Viruses, spyware, and adware.mp44.2 MB
~Get Your Files Here !/02 - 1. Why Cybersecurity/05 - Viruses, spyware, and adware.srt3 KB
~Get Your Files Here !/02 - 1. Why Cybersecurity/06 - Cybercrime and ransomware.mp47.4 MB
~Get Your Files Here !/02 - 1. Why Cybersecurity/06 - Cybercrime and ransomware.srt5.3 KB
~Get Your Files Here !/02 - 1. Why Cybersecurity/07 - Emerging trends in cybersecurity.mp419.4 MB
~Get Your Files Here !/02 - 1. Why Cybersecurity/07 - Emerging trends in cybersecurity.srt12.6 KB
~Get Your Files Here !/03 - 2. Antivirus/01 - Introducing Microsoft Defender Antivirus.mp411.1 MB
~Get Your Files Here !/03 - 2. Antivirus/01 - Introducing Microsoft Defender Antivirus.srt6.1 KB
~Get Your Files Here !/03 - 2. Antivirus/02 - Detecting malware with Microsoft Defender.mp49.1 MB
~Get Your Files Here !/03 - 2. Antivirus/02 - Detecting malware with Microsoft Defender.srt5.4 KB
~Get Your Files Here !/03 - 2. Antivirus/03 - Automating scans with Task Scheduler.mp47.9 MB
~Get Your Files Here !/03 - 2. Antivirus/03 - Automating scans with Task Scheduler.srt4.7 KB
~Get Your Files Here !/03 - 2. Antivirus/04 - Other antivirus solutions.mp43 MB
~Get Your Files Here !/03 - 2. Antivirus/04 - Other antivirus solutions.srt2.3 KB
~Get Your Files Here !/04 - 3. Firewalls/01 - Why firewalls.mp48.2 MB
~Get Your Files Here !/04 - 3. Firewalls/01 - Why firewalls.srt3.8 KB
~Get Your Files Here !/04 - 3. Firewalls/02 - Windows Firewall basics.mp413.8 MB
~Get Your Files Here !/04 - 3. Firewalls/02 - Windows Firewall basics.srt7.1 KB
~Get Your Files Here !/04 - 3. Firewalls/03 - Advanced Windows Firewall.mp425.8 MB
~Get Your Files Here !/04 - 3. Firewalls/03 - Advanced Windows Firewall.srt12.4 KB
~Get Your Files Here !/04 - 3. Firewalls/04 - ZedLan firewall log analyser.mp412.8 MB
~Get Your Files Here !/04 - 3. Firewalls/04 - ZedLan firewall log analyser.srt6.3 KB
~Get Your Files Here !/04 - 3. Firewalls/05 - Introducing Linux iptables.mp415.4 MB
~Get Your Files Here !/04 - 3. Firewalls/05 - Introducing Linux iptables.srt8 KB
~Get Your Files Here !/04 - 3. Firewalls/06 - Setting up a simple iptables firewall.mp48.9 MB
~Get Your Files Here !/04 - 3. Firewalls/06 - Setting up a simple iptables firewall.srt3.8 KB
~Get Your Files Here !/05 - 4. Network Scanning/01 - Getting started with Nmap.mp421 MB
~Get Your Files Here !/05 - 4. Network Scanning/01 - Getting started with Nmap.srt8 KB
~Get Your Files Here !/05 - 4. Network Scanning/02 - Advanced Nmap options.mp49.6 MB
~Get Your Files Here !/05 - 4. Network Scanning/02 - Advanced Nmap options.srt4.3 KB
~Get Your Files Here !/06 - 5. Network Connections/01 - Getting started with netcat.mp46.9 MB
~Get Your Files Here !/06 - 5. Network Connections/01 - Getting started with netcat.srt4.4 KB
~Get Your Files Here !/06 - 5. Network Connections/02 - Transferring files using netcat.mp48.8 MB
~Get Your Files Here !/06 - 5. Network Connections/02 - Transferring files using netcat.srt6.3 KB
~Get Your Files Here !/06 - 5. Network Connections/03 - Connecting to services.mp46.3 MB
~Get Your Files Here !/06 - 5. Network Connections/03 - Connecting to services.srt3.4 KB
~Get Your Files Here !/06 - 5. Network Connections/04 - Setting up a netcat honeypot.mp48.5 MB
~Get Your Files Here !/06 - 5. Network Connections/04 - Setting up a netcat honeypot.srt6.5 KB
~Get Your Files Here !/07 - 6. Vulnerability Scanning/01 - Preparing Nessus.mp410 MB
~Get Your Files Here !/07 - 6. Vulnerability Scanning/01 - Preparing Nessus.srt6.4 KB
~Get Your Files Here !/07 - 6. Vulnerability Scanning/02 - Setting up a Nessus policy.mp46.9 MB
~Get Your Files Here !/07 - 6. Vulnerability Scanning/02 - Setting up a Nessus policy.srt3.7 KB
~Get Your Files Here !/07 - 6. Vulnerability Scanning/03 - Running a Nessus scan.mp48.2 MB
~Get Your Files Here !/07 - 6. Vulnerability Scanning/03 - Running a Nessus scan.srt4.1 KB
~Get Your Files Here !/07 - 6. Vulnerability Scanning/04 - Running an exploit.mp42.5 MB
~Get Your Files Here !/07 - 6. Vulnerability Scanning/04 - Running an exploit.srt1.5 KB
~Get Your Files Here !/08 - 7. Web Applications/01 - Combating application level threats.mp46.5 MB
~Get Your Files Here !/08 - 7. Web Applications/01 - Combating application level threats.srt2.2 KB
~Get Your Files Here !/08 - 7. Web Applications/02 - Running an SQL injection attack.mp49.6 MB
~Get Your Files Here !/08 - 7. Web Applications/02 - Running an SQL injection attack.srt6.1 KB
~Get Your Files Here !/08 - 7. Web Applications/03 - Cross-site scripting.mp47.4 MB
~Get Your Files Here !/08 - 7. Web Applications/03 - Cross-site scripting.srt3.2 KB
~Get Your Files Here !/08 - 7. Web Applications/04 - Scanning with ZAP.mp46.1 MB
~Get Your Files Here !/08 - 7. Web Applications/04 - Scanning with ZAP.srt2.8 KB
~Get Your Files Here !/08 - 7. Web Applications/05 - Using a proxy to manipulate web traffic.mp47.5 MB
~Get Your Files Here !/08 - 7. Web Applications/05 - Using a proxy to manipulate web traffic.srt3.7 KB
~Get Your Files Here !/09 - 8. Network Protocols/01 - Explaining data communications.mp46.9 MB
~Get Your Files Here !/09 - 8. Network Protocols/01 - Explaining data communications.srt6 KB
~Get Your Files Here !/09 - 8. Network Protocols/02 - Capturing packets with Wireshark.mp413.7 MB
~Get Your Files Here !/09 - 8. Network Protocols/02 - Capturing packets with Wireshark.srt5 KB
~Get Your Files Here !/09 - 8. Network Protocols/03 - Making sense of the protocols.mp412.4 MB
~Get Your Files Here !/09 - 8. Network Protocols/03 - Making sense of the protocols.srt3.5 KB
~Get Your Files Here !/10 - Conclusion/01 - What's next.mp42 MB
~Get Your Files Here !/10 - Conclusion/01 - What's next.srt1.3 KB
~Get Your Files Here !/Bonus Resources.txt386 B
~Get Your Files Here !/Ex_Files_Practical_Cybersecurity_for_IT_Pros/Exercise Files/00_02_configuration.pdf40.2 KB

Alternative Torrents for 'TutGee.com Linkedin Practical Cybersecurity for IT Professionals'.

There are no alternative torrents found.