Details for this torrent 

Lynda - IT Security Foundations Core Concepts
Type:
Other > Other
Files:
26
Size:
202.17 MiB (211991625 Bytes)
Uploaded:
2017-07-16 14:52:12 GMT
By:
sumi VIP
Seeders:
0
Leechers:
2
Comments
0  

Info Hash:
FED25EB2ABA4E3D2C38EBA852D2DB7D6B3717C9E




(Problems with magnets links are fixed by upgrading your torrent client!)
Computing and Internet security are everyone's business, but it's especially critical for information technology specialists. Learning the core concepts of operating-system and network-level security helps avoid ongoing threats and eliminate system vulnerabilities. This beginner-level course covers core security concepts and introduces risks such as social engineering, malware, and spyware. Foundations of IT Security series creator Lisa Bock will also go over some basic wireless security best practices, tips for beefing up browser security, and techniques for implementing encryption

00. Introduction/00_01 - Welcome.mp417.42 MiB
00. Introduction/00_02 - Preparing for MTA Exam 98-367.mp41.85 MiB
01. Core Security Principles/01_01 - Introducing the CIA triad.mp414.2 MiB
01. Core Security Principles/01_02 - Evaluating risks, threats, and vulnerabilities.mp49.3 MiB
01. Core Security Principles/01_03 - Adhering to the principle of least privilege.mp45.54 MiB
01. Core Security Principles/01_04 - Recognizing social engineering.mp411.18 MiB
01. Core Security Principles/01_05 - Minimizing the attack surface.mp411.96 MiB
02. Spyware, Malware, Worms, and Viruses/02_01 - Understanding buffer overflows.mp49.56 MiB
02. Spyware, Malware, Worms, and Viruses/02_02 - Avoiding worms and viruses.mp48.58 MiB
02. Spyware, Malware, Worms, and Viruses/02_03 - Understanding Trojans.mp46.23 MiB
02. Spyware, Malware, Worms, and Viruses/02_04 - Protecting your system from spyware.mp44.12 MiB
03. Browser Security/03_01 - Modifying browser settings.mp49.57 MiB
03. Browser Security/03_02 - Navigating security zones.mp410.94 MiB
03. Browser Security/03_03 - Recognizing secure websites.mp49.98 MiB
04. Wireless Security Basics/04_01 - Securing wireless transmissions.mp47.38 MiB
04. Wireless Security Basics/04_02 - Understanding PSK authentication.mp45.08 MiB
04. Wireless Security Basics/04_03 - Filtering SSIDs and MAC addresses.mp45.72 MiB
05. Encryption's Role in Security/05_01 - Exploring encryption and cryptographic techniques.mp47.76 MiB
05. Encryption's Role in Security/05_02 - Differentiating between public and private key encryption.mp45.94 MiB
05. Encryption's Role in Security/05_03 - Building a PKI certificate services infrastructure.mp46.81 MiB
05. Encryption's Role in Security/05_04 - Encrypting files, folders, and drives.mp411.61 MiB
05. Encryption's Role in Security/05_05 - Securing email.mp48.79 MiB
05. Encryption's Role in Security/05_06 - Using virtual private networks.mp410.11 MiB
05. Encryption's Role in Security/06_01 - Next steps.mp42.48 MiB
Ex_Files_FoIT_Security_CC.zip47.28 KiB
Torrent Downloaded From Katcr.co - Kickasstorrents.txt52 B