Lynda - IT Security Foundations Core Concepts
- Type:
- Other > Other
- Files:
- 26
- Size:
- 202.17 MiB (211991625 Bytes)
- Uploaded:
- 2017-07-16 14:52:12 GMT
- By:
- sumi
- Seeders:
- 0
- Leechers:
- 2
- Comments
- 0
- Info Hash: FED25EB2ABA4E3D2C38EBA852D2DB7D6B3717C9E
(Problems with magnets links are fixed by upgrading your torrent client!)
Computing and Internet security are everyone's business, but it's especially critical for information technology specialists. Learning the core concepts of operating-system and network-level security helps avoid ongoing threats and eliminate system vulnerabilities. This beginner-level course covers core security concepts and introduces risks such as social engineering, malware, and spyware. Foundations of IT Security series creator Lisa Bock will also go over some basic wireless security best practices, tips for beefing up browser security, and techniques for implementing encryption
00. Introduction/00_01 - Welcome.mp4 | 17.42 MiB |
00. Introduction/00_02 - Preparing for MTA Exam 98-367.mp4 | 1.85 MiB |
01. Core Security Principles/01_01 - Introducing the CIA triad.mp4 | 14.2 MiB |
01. Core Security Principles/01_02 - Evaluating risks, threats, and vulnerabilities.mp4 | 9.3 MiB |
01. Core Security Principles/01_03 - Adhering to the principle of least privilege.mp4 | 5.54 MiB |
01. Core Security Principles/01_04 - Recognizing social engineering.mp4 | 11.18 MiB |
01. Core Security Principles/01_05 - Minimizing the attack surface.mp4 | 11.96 MiB |
02. Spyware, Malware, Worms, and Viruses/02_01 - Understanding buffer overflows.mp4 | 9.56 MiB |
02. Spyware, Malware, Worms, and Viruses/02_02 - Avoiding worms and viruses.mp4 | 8.58 MiB |
02. Spyware, Malware, Worms, and Viruses/02_03 - Understanding Trojans.mp4 | 6.23 MiB |
02. Spyware, Malware, Worms, and Viruses/02_04 - Protecting your system from spyware.mp4 | 4.12 MiB |
03. Browser Security/03_01 - Modifying browser settings.mp4 | 9.57 MiB |
03. Browser Security/03_02 - Navigating security zones.mp4 | 10.94 MiB |
03. Browser Security/03_03 - Recognizing secure websites.mp4 | 9.98 MiB |
04. Wireless Security Basics/04_01 - Securing wireless transmissions.mp4 | 7.38 MiB |
04. Wireless Security Basics/04_02 - Understanding PSK authentication.mp4 | 5.08 MiB |
04. Wireless Security Basics/04_03 - Filtering SSIDs and MAC addresses.mp4 | 5.72 MiB |
05. Encryption's Role in Security/05_01 - Exploring encryption and cryptographic techniques.mp4 | 7.76 MiB |
05. Encryption's Role in Security/05_02 - Differentiating between public and private key encryption.mp4 | 5.94 MiB |
05. Encryption's Role in Security/05_03 - Building a PKI certificate services infrastructure.mp4 | 6.81 MiB |
05. Encryption's Role in Security/05_04 - Encrypting files, folders, and drives.mp4 | 11.61 MiB |
05. Encryption's Role in Security/05_05 - Securing email.mp4 | 8.79 MiB |
05. Encryption's Role in Security/05_06 - Using virtual private networks.mp4 | 10.11 MiB |
05. Encryption's Role in Security/06_01 - Next steps.mp4 | 2.48 MiB |
Ex_Files_FoIT_Security_CC.zip | 47.28 KiB |
Torrent Downloaded From Katcr.co - Kickasstorrents.txt | 52 B |