CBTNuggets ITCA - Cybersecurity Fundamentals Online Training

0dayddl

U P L O A D E R
359020115_tuto.jpg

36.07 GB | 00:19:32 | mp4 | 1920X1080 | 16:9
Genre:eLearning |Language:English


Files Included :
1 What is ISACA and the ITCA (220.41 MB)
2 IT Security (304.7 MB)
3 Information and Communications Technology (ICT) (193.5 MB)
4 Network Security (157.51 MB)
5 Cybersecurity (184.18 MB)
6 Specialized Systems (186.58 MB)
7 Validation (85.83 MB)
1 Standards Organizations (107.71 MB)
2 General Data Protection Regulation (109.93 MB)
3 PCI DSS and PSD2 (139.25 MB)
4 HIPPA (107.32 MB)
5 Zero Trust (66.38 MB)
6 The Internal and External Perimeters (187.08 MB)
7 The Internet Perimeter (266.34 MB)
8 Validation (144.53 MB)
1 The Demilitarized Zone (DMZ) (169.7 MB)
2 Virtual Local Area Network (VLAN) (182.18 MB)
3 Switch Communication (140.94 MB)
4 Router Communication (104.31 MB)
5 WiFi Security with Wired Equivalency Protocol (WEP) (119.39 MB)
6 WiFi Protected Access (WPA) WPA2, WPA3 (205.66 MB)
7 Securing a WiFi Access Point (315.59 MB)
8 Validation (86.13 MB)
1 Basic Firewall Functions (289.03 MB)
2 Types of Firewalls (216.51 MB)
3 Hardware Firewalls (220.33 MB)
4 Application Firewalls (114.7 MB)
5 Next Generation Firewalls (NGFW) (206.38 MB)
6 Validation (182.4 MB)
1 Endpoint Protection (100.04 MB)
2 Windows Firewall Default Settings (236.49 MB)
3 Allow an Application Through Windows Firewall (203.02 MB)
4 Configure Specific Firewall Settings (349.69 MB)
5 Use GPO to Apply Firewall Rules (215.19 MB)
6 Validation (184.58 MB)
1 Azure Firewall (245.25 MB)
2 Mac Firewall (214.84 MB)
3 Linux Firewall Configuration (383.94 MB)
4 Overview Intrusion DetectionPrevention System (IDPS) (139.86 MB)
5 Where is IDPS (118 MB)
6 IDPS Detection and Actions (71.5 MB)
7 IDPS Benefits and Products (97.39 MB)
8 Validation (142.09 MB)
1 What Are Endpoint Devices (120.11 MB)
2 Authentication Controls (365.85 MB)
3 Authentication Controls Part 2 (137.44 MB)
4 Authorization Controls (408.09 MB)
5 Authorization Controls Part 2 (291.95 MB)
6 Accounting Controls (365.36 MB)
1 Understand Cloud Computing from a Local Perspective (142.96 MB)
2 CAPEX vs OPEX, and Defining the Cloud (244.97 MB)
3 NIST Cloud Characteristics (245.92 MB)
4 Microsoft Cloud Layout (113.66 MB)
5 Explore Cloud Datacenters (301.16 MB)
6 Validation (206.63 MB)
1 Cloud Security Benefits (112.29 MB)
2 Cloud Security Risks and Recommendations (460.84 MB)
3 IaaS PaaS and SaaS (296.38 MB)
4 Public, Private, Hybrid, Community Cloud (196.91 MB)
5 Create an Azure VM (347.26 MB)
6 Validation (82.54 MB)
1 Database Security (284.98 MB)
2 Database Security Part 2 (265.12 MB)
3 Data Classification (133.93 MB)
4 Data Classification Part 2 (117.66 MB)
5 Data Classification Part 3 (158.15 MB)
6 Data at Rest, in Motion, and in Use (117.75 MB)
7 Protecting Data via Timely Updates (308.23 MB)
8 Validation (64.65 MB)
1 Encryption Introduction (216.57 MB)
2 Where is Your Data (162.96 MB)
3 Symmetric Encryption (126.96 MB)
4 The Case for Symmetric Encryption (271.25 MB)
5 Symmetric Algorithms (248.89 MB)
6 Validation (417.98 MB)
1 Cybersecurity Roles (219.93 MB)
2 Resilience (178.11 MB)
3 Continuity and Recovery (165.95 MB)
4 Recovery Time and Point Objectives (148.7 MB)
5 Backup Location (101.09 MB)
6 Backup Media (205.44 MB)
7 Backup Types (219.93 MB)
8 Validation (190.8 MB)
1 Understand Asymmetric Encryption (151.67 MB)
2 Asymmetric Encryption Flow (56.87 MB)
3 Asymmetric Encryption Algorithms (238.78 MB)
4 Hashing Data (445.7 MB)
5 Digital Signatures (95.76 MB)
6 Validation (142.36 MB)
7 Validation Part 2 (81.11 MB)
1 Public Key Infrastructure (PKI) (240.49 MB)
2 TLS Transaction Flow (243.03 MB)
3 Virtual Private Networks (VPN) (211.41 MB)
4 VPN Features and Disadvantages (261.13 MB)
5 Secure Shell (SSH) (96.2 MB)
6 Validation (226.27 MB)
1 What is a Security Operations Center (SOC) (92.23 MB)
2 SOC Models (163.65 MB)
3 SOC Staff (134.99 MB)
4 SOC Areas of Responsibility (381.68 MB)
5 Vulnerability Management (216.06 MB)
6 Validation (9.54 MB)
1 Penetration Testing Overview (98.5 MB)
2 Pen Test Phase Plan and Discover (408.94 MB)
3 Pen Test Phase Attack and Report (126.35 MB)
4 Dangers of Pen Testing (218.96 MB)
5 Endpoint Detection and Response (205.7 MB)
6 Validation (152.14 MB)
1 SIEM and SOAR (296.28 MB)
2 Incident Response, Handling, and Phases (180.85 MB)
3 Incident Response Plan (168.05 MB)
4 Digital Forensics Investigations (64.85 MB)
5 Where is the Evidence (304.7 MB)
6 Preserving Evidence (328.92 MB)
7 Chain of Custody (118.65 MB)
1 PING (247.73 MB)
2 Traceroute (180.2 MB)
3 ARP (206.97 MB)
4 IPCONFIG, ifconfig and ip addr (166 MB)
5 Route and iptables (269.55 MB)
6 Validation (99.52 MB)
1 nmap (159.61 MB)
2 SSH (156.12 MB)
3 hashcat (215.05 MB)
4 Crack Windows Passwords (275.61 MB)
5 Generate Hashes (105.93 MB)
6 Capture Network Traffic with Wireshark (200.15 MB)
7 Validation (77.53 MB)
1 Netstat and SS (224.39 MB)
2 Pathping and MTR (207.09 MB)
3 Pathping and MTR Part 2 (32.12 MB)
4 NSLOOKUP (119.55 MB)
5 Netcat (291.36 MB)
6 Sysinternals Suite (487.79 MB)
7 Windows god mode (52.36 MB)
8 Validation (141.05 MB)
1 CIA Confidentiality (253.09 MB)
2 CIA Integrity (249.61 MB)
3 CIA Availability (241.81 MB)
4 Principle of Least Privilege (296.1 MB)
5 Personal and Private Info (339.82 MB)
6 Validation (156.82 MB)
1 Threat Risk, Sources, Categories (320.12 MB)
2 Internal Risk (Insider Risk) (196.04 MB)
3 Insider Risk Shadow IT (255.56 MB)
4 Emerging Threats (157.62 MB)
5 Threat Modeling (132.54 MB)
6 Vulnerabilities and Exploits (122.99 MB)
7 Validation (108.24 MB)
1 Motivations and Agents (228.42 MB)
2 Reconnaissance and Entry (533.21 MB)
3 Foothold, Escalation, and Discovery (306.61 MB)
4 Lateral Movement, C2, and Exfiltration (247.11 MB)
5 Validation (49.96 MB)
1 Types of Malware (286.02 MB)
2 Even More Types of Malware! (345.62 MB)
3 Live Discovery of Drive-By Malware (98.04 MB)
4 Camera and Microphone Hijacking (210.56 MB)
5 Symptoms of Malware (401.82 MB)
6 More Symptoms of Malware (275.3 MB)
7 Demonstration of Unauthorized Installation (85.25 MB)
8 Validation (108.45 MB)
1 Advanced Persistent Threat (APT) (235.05 MB)
2 Back Door (163.27 MB)
3 Brute Force (318.93 MB)
4 Rainbow Tables and Password Spraying (144.73 MB)
5 Buffer Overflow (90.4 MB)
6 Covert Channels (149.65 MB)
7 Steganography Demonstration (263.41 MB)
1 Cross-Site Scripting (XSS) (219.98 MB)
2 Denial of Service and Man-in-the-Middle (339.97 MB)
3 Social Engineering (303.59 MB)
4 Additional Attacks (385.43 MB)
5 SQL Injection and Validation (233.91 MB)
1 Addressing Risk and Criteria (309.45 MB)
2 Third-Party Risk (449.84 MB)
3 SolarWinds Case Study Introduction (164.91 MB)
4 SolarWinds Cast Study Attack Details (504.38 MB)
5 Validation (88.64 MB)
]
Screenshot
3EAJOrGQ_o.jpg


FileAxa
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
RapidGator
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
TurboBit
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
 
Kommentar

In der Börse ist nur das Erstellen von Download-Angeboten erlaubt! Ignorierst du das, wird dein Beitrag ohne Vorwarnung gelöscht. Ein Eintrag ist offline? Dann nutze bitte den Link  Offline melden . Möchtest du stattdessen etwas zu einem Download schreiben, dann nutze den Link  Kommentieren . Beide Links findest du immer unter jedem Eintrag/Download.

Data-Load.me | Data-Load.ing | Data-Load.to | Data-Load.in

Auf Data-Load.me findest du Links zu kostenlosen Downloads für Filme, Serien, Dokumentationen, Anime, Animation & Zeichentrick, Audio / Musik, Software und Dokumente / Ebooks / Zeitschriften. Wir sind deine Boerse für kostenlose Downloads!

Ist Data-Load legal?

Data-Load ist nicht illegal. Es werden keine zum Download angebotene Inhalte auf den Servern von Data-Load gespeichert.
Oben Unten