Details for this torrent 

Lynda - Foundations of IT Security: Core Concepts
Type:
Other > Other
Files:
27
Size:
202.82 MiB (212672200 Bytes)
Uploaded:
2015-10-04 11:01:58 GMT
By:
2boweb VIP
Seeders:
0
Leechers:
1
Comments
0  

Info Hash:
5AC1C721ADD6C7032E714ED325DC318222C0B39F




(Problems with magnets links are fixed by upgrading your torrent client!)
Lynda - Foundations of IT Security: Core Concepts

This Course will be good to the Best for DL withing 30 days after has been post, after that it might not be good DL already, please do me favour to continue seeding to keep this torrent alive.

1h 13m Beginner Aug 28, 2015 | Uploaded in Oct 4, 2015 by 2boweb 

Subject: IT 
Software: Security 
Author: Lisa Bock 

Computing and Internet security are everyone's business, but it's especially critical for information technology specialists. Learning the core concepts of operating-system and network-level security helps avoid ongoing threats and eliminate system vulnerabilities. This beginner-level course covers core security concepts and introduces risks such as social engineering, malware, and spyware. Foundations of IT Security series creator Lisa Bock will also go over some basic wireless security best practices, tips for beefing up browser security, and techniques for implementing encryption.

Note: This course maps to a number of the exam topics on the Microsoft Technology Associate (MTA) Security Fundamentals 98-367 certification exam and is recommended test prep viewing.
Topics include:
	•	Evaluating risks, threats, and vulnerabilities
	•	Minimizing the attack surface
	•	Avoiding worms and viruses
	•	Protecting your system from spyware
	•	Making web browsers more secure
	•	Securing wireless transmissions
	•	Encrypting files, folders, and drives
	•	Using virtual private networks

//////////////////////////////////////////////////////

001 Welcome.mp417.88 MiB
003 Introducing the CIA triad.mp414.32 MiB
007 Minimizing the attack surface.mp412.06 MiB
021 Encrypting files, folders, and drives.mp411.52 MiB
006 Recognizing social engineering.mp411.16 MiB
013 Navigating security zones.mp410.96 MiB
023 Using virtual private networks.mp410.15 MiB
014 Recognizing secure websites.mp49.94 MiB
012 Modifying browser settings.mp49.51 MiB
008 Understanding buffer overflows.mp49.5 MiB
004 Evaluating risks, threats, and vulnerabilities.mp49.36 MiB
022 Securing email.mp48.78 MiB
009 Avoiding worms and viruses.mp48.59 MiB
018 Exploring encryption and cryptographic techniques.mp47.75 MiB
015 Securing wireless transmissions.mp47.47 MiB
020 Building a PKI-certificate services infrastructure.mp46.84 MiB
010 Understanding Trojans.mp46.17 MiB
017 Filtering SSIDs and MAC addresses.mp45.77 MiB
019 Differentiating between public and private key encryption.mp45.68 MiB
005 Adhering to the principle of least privilege.mp45.58 MiB
016 Understanding PSK authentication.mp45.1 MiB
011 Protecting your system from spyware.mp44.2 MiB
024 Next steps.mp42.51 MiB
002 Preparing for MTA Exam 98-367.mp41.86 MiB
Exercise Files/FoITS_CORE.pdf56.57 KiB
Exercise Files/FoITS_Operating System.pdf54.95 KiB
Exercise Files/FoITS_Network.pdf54.35 KiB