TorBT - Torrents and Magnet Links Search Engine

Lynda - Cybersecurity for IT Professionals

File Name
Size
00. Introduction/00_01 - Welcome.mp4
6.0 MB
00. Introduction/00_02 - What you should know before watching this course.mp4
849 kB
00. Introduction/00_03 - Using the exercise files.mp4
928 kB
01. Why Cybersecurity/01_01 - Hackers and the kill chain.mp4
14 MB
01. Why Cybersecurity/01_02 - The Stuxnet kill chain.mp4
8.5 MB
01. Why Cybersecurity/01_03 - Common forms of cybersecurity attack.mp4
14 MB
02. Antivirus/02_01 - Viruses, spyware, and adware.mp4
3.8 MB
02. Antivirus/02_02 - Using Windows Defender.mp4
3.0 MB
02. Antivirus/02_03 - Setting up real-time protection.mp4
1004 kB
02. Antivirus/02_04 - Scanning with Windows Defender.mp4
4.1 MB
02. Antivirus/02_05 - Modifying antivirus settings in Windows Defender.mp4
5.5 MB
02. Antivirus/02_06 - Scheduling a scan with Windows Defender.mp4
9.2 MB
02. Antivirus/02_07 - Using Windows Defender offline.mp4
1.8 MB
02. Antivirus/02_08 - Exploring antivirus on Linux.mp4
1.7 MB
03. Personal Firewalls/03_01 - Why firewalls.mp4
1.4 MB
03. Personal Firewalls/03_02 - Using the Microsoft Windows Firewall.mp4
12 MB
03. Personal Firewalls/03_03 - Setting up advanced security notifications.mp4
9.1 MB
03. Personal Firewalls/03_04 - Setting up detailed rules.mp4
10 MB
03. Personal Firewalls/03_05 - Managing and analyzing log files with ZedLan.mp4
8.1 MB
03. Personal Firewalls/03_06 - Introducing iptables in Linux.mp4
10 MB
03. Personal Firewalls/03_07 - Building a simple firewall with iptables.mp4
4.6 MB
04. Knowing What Is on Your Network/04_01 - Getting started with Nmap.mp4
1.9 MB
04. Knowing What Is on Your Network/04_02 - Scanning for hosts.mp4
5.0 MB
04. Knowing What Is on Your Network/04_03 - Scanning for services.mp4
4.1 MB
04. Knowing What Is on Your Network/04_04 - Exploring advanced Nmap options.mp4
4.4 MB
04. Knowing What Is on Your Network/04_05 - Scanning in Windows with Zenmap.mp4
8.9 MB
05. Network Communications and Detecting Intruders/05_01 - Getting started with Netcat.mp4
3.1 MB
05. Network Communications and Detecting Intruders/05_02 - Using Netcat for file transfers.mp4
6.0 MB
05. Network Communications and Detecting Intruders/05_03 - Connecting to services.mp4
5.0 MB
05. Network Communications and Detecting Intruders/05_04 - Setting up a honeypot with Netcat.mp4
6.1 MB
06. Checking Hosts for Known Vulnerabilities/06_01 - Introduction to vulnerability scanning.mp4
2.2 MB
06. Checking Hosts for Known Vulnerabilities/06_02 - Getting started with Nessus.mp4
5.6 MB
06. Checking Hosts for Known Vulnerabilities/06_03 - Configuring Nessus.mp4
5.2 MB
06. Checking Hosts for Known Vulnerabilities/06_04 - Running a Nessus scan.mp4
12 MB
06. Checking Hosts for Known Vulnerabilities/06_05 - Scheduling a Nessus scan.mp4
4.2 MB
07. Checking for Common Mistakes in Web Apps/07_01 - Combating application-level threats.mp4
9.1 MB
07. Checking for Common Mistakes in Web Apps/07_02 - Web security scanning.mp4
16 MB
07. Checking for Common Mistakes in Web Apps/07_03 - Using the scanner as a web proxy.mp4
7.3 MB
08. Monitoring Network Activity/08_01 - Using Wireshark to explain packet-level activity.mp4
8.8 MB
08. Monitoring Network Activity/08_02 - How to capture packets from the network to analyze activity.mp4
6.6 MB
08. Monitoring Network Activity/08_03 - Making sense of the TCP IP protocols.mp4
15 MB
08. Monitoring Network Activity/08_04 - Filtering packets to focus on areas of interest.mp4
9.5 MB
08. Monitoring Network Activity/08_05 - Capturing intruders with packets.mp4
9.8 MB
08. Monitoring Network Activity/09_01 - Summary.mp4
4.5 MB
Torrent Downloaded From Katcr.co - Kickasstorrents.txt
52 B