Lynda - Cybersecurity Foundations/00. Introduction/00_01 - Welcome.mp4 |
5.5 MB |
Lynda - Cybersecurity Foundations/00. Introduction/00_02 - What you should know.mp4 |
1.9 MB |
Lynda - Cybersecurity Foundations/01. Cybersecurity Foundations/01_01 - Understanding the NIST cybersecurity framework.mp4 |
12.2 MB |
Lynda - Cybersecurity Foundations/01. Cybersecurity Foundations/01_02 - Dissecting cyber risk.mp4 |
12.7 MB |
Lynda - Cybersecurity Foundations/01. Cybersecurity Foundations/01_03 - Unpacking COBIT 5.mp4 |
10.1 MB |
Lynda - Cybersecurity Foundations/01. Cybersecurity Foundations/01_04 - Looking closer at DSS05.mp4 |
7.8 MB |
Lynda - Cybersecurity Foundations/01. Cybersecurity Foundations/01_05 - Implementing control frameworks.mp4 |
14 MB |
Lynda - Cybersecurity Foundations/01. Cybersecurity Foundations/01_06 - Dissecting the payment card industry and PCI DSS.mp4 |
14 MB |
Lynda - Cybersecurity Foundations/01. Cybersecurity Foundations/01_07 - Exploring the Cyber Essentials framework.mp4 |
8.9 MB |
Lynda - Cybersecurity Foundations/02. Cybersecurity Threats/02_01 - Breaking down the cybersecurity kill chain.mp4 |
7.8 MB |
Lynda - Cybersecurity Foundations/02. Cybersecurity Threats/02_02 - Dissecting security threats.mp4 |
11.2 MB |
Lynda - Cybersecurity Foundations/02. Cybersecurity Threats/02_03 - Exploring cybercrime as an industry.mp4 |
9.6 MB |
Lynda - Cybersecurity Foundations/02. Cybersecurity Threats/02_04 - Hiding malware through cloaking and alternate data streams.mp4 |
8.6 MB |
Lynda - Cybersecurity Foundations/02. Cybersecurity Threats/02_05 - Using callbacks to capture keystrokes.mp4 |
9.3 MB |
Lynda - Cybersecurity Foundations/02. Cybersecurity Threats/02_06 - Hiding malware with rootkits.mp4 |
9.4 MB |
Lynda - Cybersecurity Foundations/02. Cybersecurity Threats/02_07 - Understanding advanced persistent threats (APTs).mp4 |
12.9 MB |
Lynda - Cybersecurity Foundations/02. Cybersecurity Threats/02_08 - Exploring ransomware.mp4 |
8 MB |
Lynda - Cybersecurity Foundations/03. Security Architecture/03_01 - Describing security requirements.mp4 |
14.3 MB |
Lynda - Cybersecurity Foundations/03. Security Architecture/03_02 - Architecting security risk.mp4 |
12.8 MB |
Lynda - Cybersecurity Foundations/03. Security Architecture/03_03 - Selecting security controls.mp4 |
8.1 MB |
Lynda - Cybersecurity Foundations/03. Security Architecture/03_04 - Managing user access and identity.mp4 |
19.7 MB |
Lynda - Cybersecurity Foundations/03. Security Architecture/03_05 - Implementing preventative security.mp4 |
18 MB |
Lynda - Cybersecurity Foundations/03. Security Architecture/03_06 - Monitoring and alerts.mp4 |
15 MB |
Lynda - Cybersecurity Foundations/04. Incident Management/04_01 - Managing incident response.mp4 |
8.1 MB |
Lynda - Cybersecurity Foundations/04. Incident Management/04_02 - Preparing for an incident.mp4 |
12.9 MB |
Lynda - Cybersecurity Foundations/04. Incident Management/04_03 - Responding to an incident.mp4 |
11.1 MB |
Lynda - Cybersecurity Foundations/04. Incident Management/05_01 - Next steps.mp4 |
3.4 MB |
Lynda - Cybersecurity Foundations/Torrent Downloaded From Katcr.co - Kickasstorrents.txt |
52 B |