Details for this torrent 

Lynda - Foundations of IT Security: Network Security
Type:
Other > Other
Files:
25
Size:
275.07 MiB (288427566 Bytes)
Uploaded:
2015-11-29 07:26:41 GMT
By:
2boweb VIP
Seeders:
0
Leechers:
1
Comments
0  

Info Hash:
E2EBB49F6CDBF1813B43917370B1FA9A8B3697E4




(Problems with magnets links are fixed by upgrading your torrent client!)
Lynda - Foundations of IT Security: Network Security

This Course will be good to the Best for DL within 30 days after has been post, after that it might not be good DL already, please do me favour to continue seeding to keep this torrent alive.

1h 37m Beginner Oct 27, 2015 | Uploaded in Nov 29, 2015 by 2boweb
Subject: IT 
Software: Security 
Author: Lisa Bock 

Network security is the keystone of IT security, and an important component of the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). In this installment of Foundations of IT Security, series creator Lisa Bock will cover one of the main topics of the exam: securing an organization's network to keep interconnected systems and data safe. The course introduces security devices such as firewalls and packet inspectors, network isolation, and common security protocols. She also provides an overview of how to protect clients with antivirus software, encrypt offline files, and implement software restriction policies. Finally, she looks at the often-overlooked topics of mobile device and physical security, which includes securing a building's perimeter and the hardware within.

Note: This training maps to a number of the exam topics on the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). See https://www.microsoft.com/learning/en-us/exam-98-367.aspx for more information.
Topics include:
	•	Implementing secure content management (SCM) 
	•	Implementing unified threat management (UTM)
	•	Introducing VLANs
	•	NAT addressing
	•	Network sniffing
	•	Understanding common attack methods, such as password attacks
	•	Protecting clients with antivirus software
	•	Implementing physical security


/////////////////////////////////////////////////////////////////////////////////////

001 Welcome.mp422.32 MiB
018 Exploring User Account Control (UAC).mp417.32 MiB
010 Network Address Translation (NAT).mp416.72 MiB
017 Protecting systems with antivirus software.mp415.92 MiB
005 Network Access Protection (NAP).mp415.84 MiB
011 Introducing protocol spoofing.mp415.8 MiB
006 Introducing VLANS.mp415.34 MiB
013 Exploring network sniffing.mp414.67 MiB
012 Understanding DNSSEC.mp414.66 MiB
016 Introducing IPsec.mp412.81 MiB
020 Ensuring physical protection of buildings and hardware.mp412.72 MiB
008 Implementing a honeypot.mp412.6 MiB
014 Surveying common attack methods.mp411.82 MiB
007 Providing server and domain isolation.mp410.57 MiB
004 Implementing SCM and UTM.mp49.11 MiB
023 Securing mobile devices.mp49.1 MiB
015 Understanding the threat of password attacks.mp48.74 MiB
022 Exploring access control.mp48.66 MiB
019 Encrypting offline folders and software restriction policies.mp48 MiB
003 Exploring different types of firewalls.mp47.9 MiB
021 Understanding the importance of physical computer security.mp45.23 MiB
009 Perimeter networks.mp44.95 MiB
024 Next steps.mp42.32 MiB
002 Preparing for MTA Exam 98-367.mp41.87 MiB
Exercise Files/FoITS_Network.pdf54.36 KiB