Lynda - Practical Cybersecurity

seeders: 52
leechers: 19
Added on January 25, 2015 by Bazxin Other > Tutorials
Torrent verified.



Lynda - Practical Cybersecurity (Size: 233.49 MB)
 Exercise Files.zip2.18 MB
 164982_00_01_WX30_welcome.mp46.59 MB
 164982_00_02_XR15_wysk.mp41.37 MB
 164982_00_03_XR15_exfiles.mp4807.58 KB
 164982_01_03_XR15_attack.mp48.17 MB
 164982_01_01_XR15_cyber.mp48.04 MB
 164982_01_02_XR15_stuxnet.mp45.04 MB
 164982_02_06_XR15_schedule.mp47.81 MB
 164982_02_05_XR15_avsettings.mp45.2 MB
 164982_02_04_XR15_avscanning.mp43.82 MB
 164982_02_02_XR15_defender.mp43.09 MB
 164982_02_01_XR15_av.mp42.24 MB
 164982_02_07_XR15_avwdo.mp41.54 MB
 164982_02_08_XR15_avlinux.mp41.36 MB
 164982_02_03_XR15_realtime.mp41.3 MB
 164982_03_02_XR15_mswf.mp410.19 MB
 164982_03_06_XR15_iptables.mp49.38 MB
 164982_03_04_XR15_advrules.mp49.02 MB
 164982_03_03_XR15_advfw.mp47.58 MB
 164982_03_05_XR15_zedlan.mp46.43 MB
 164982_03_07_XR15_firewall.mp44.34 MB
 164982_03_01_XR15_firewalls.mp4860.81 KB
 164982_04_05_XR15_zenmap.mp46.05 MB
 164982_04_04_XR15_options.mp44.52 MB
 164982_04_02_XR15_scan.mp44.42 MB
 164982_04_03_XR15_service.mp43.91 MB
 164982_04_01_XR15_nmap.mp41.91 MB
 164982_05_04_XR15_honeypot.mp45.75 MB
 164982_05_02_XR15_filexfer.mp45.54 MB
 164982_05_03_XR15_services.mp44.63 MB
 164982_05_01_XR15_netcat.mp42.89 MB
 164982_06_04_XR15_scan.mp48.19 MB
 164982_06_02_XR15_started.mp44.5 MB
 164982_06_03_XR15_configure.mp43.38 MB
 164982_06_05_XR15_schedule.mp42.69 MB
 164982_06_01_XR15_nessus.mp41.37 MB
 164982_07_02_XR15_scan.mp411.36 MB
 164982_07_01_XR15_intro.mp48.98 MB
 164982_07_03_XR15_proxy.mp44.8 MB
 164982_08_03_XR15_packets.mp412.49 MB
 164982_08_05_XR151_intruder.mp47.89 MB
 164982_08_04_XR15_filters.mp47.84 MB
 164982_08_02_XR15_capture.mp45.3 MB
 164982_08_01_XR15_monitor.mp45.01 MB
 164982_09_01_XR15_summary.mp43.75 MB


Description

Protect your network from cyber attacks. Malcolm Shore shows how to use the latest tools to discourage and combat hackers, phishers, and snoops attempting to infiltrate your Windows and Linux systems. Learn what forms cyber attacks can take, and the two most common types of protection you can build into your system: antivirus protection and firewalls. Then learn how to scan your network for suspicious files, detect intruders with Netcat, and identify vulnerabilities at the host level with Nessus scans. Malcolm also shows how to avoid common security mistakes and monitor packet-level activity on your network.

Topics include:
Hackers and the kill chain
Viruses, spyware, and adware
Scanning with Windows Defender
Building firewalls
Scanning with Nmap
Monitoring network communications with Netcat
Combating application-level threats
Capturing intruders through packet inspection

Once you have downloaded, seed it please!!!





Related Torrents

torrent name size seed leech

Sharing Widget


Download torrent
233.49 MB
seeders:52
leechers:19
Lynda - Practical Cybersecurity