TorBT - Torrents and Magnet Links Search Engine

Lynda - Foundations of IT Security Core Concepts

File Name
Size
001 Welcome.mp4
18 MB
003 Introducing the CIA triad.mp4
14 MB
007 Minimizing the attack surface.mp4
12 MB
021 Encrypting files, folders, and drives.mp4
12 MB
006 Recognizing social engineering.mp4
11 MB
013 Navigating security zones.mp4
11 MB
023 Using virtual private networks.mp4
10 MB
014 Recognizing secure websites.mp4
9.9 MB
012 Modifying browser settings.mp4
9.5 MB
008 Understanding buffer overflows.mp4
9.5 MB
004 Evaluating risks, threats, and vulnerabilities.mp4
9.4 MB
022 Securing email.mp4
8.8 MB
009 Avoiding worms and viruses.mp4
8.6 MB
018 Exploring encryption and cryptographic techniques.mp4
7.8 MB
015 Securing wireless transmissions.mp4
7.5 MB
020 Building a PKI-certificate services infrastructure.mp4
6.8 MB
010 Understanding Trojans.mp4
6.2 MB
017 Filtering SSIDs and MAC addresses.mp4
5.8 MB
019 Differentiating between public and private key encryption.mp4
5.7 MB
005 Adhering to the principle of least privilege.mp4
5.6 MB
016 Understanding PSK authentication.mp4
5.1 MB
011 Protecting your system from spyware.mp4
4.2 MB
024 Next steps.mp4
2.5 MB
002 Preparing for MTA Exam 98-367.mp4
1.9 MB
Exercise Files/FoITS_CORE.pdf
57 kB
Exercise Files/FoITS_Operating System.pdf
55 kB
Exercise Files/FoITS_Network.pdf
54 kB