Lynda - Cybersecurity for IT Professionals/00. Introduction/00_01 - Welcome.mp4 |
6 MB |
Lynda - Cybersecurity for IT Professionals/00. Introduction/00_02 - What you should know before watching this course.mp4 |
849 KB |
Lynda - Cybersecurity for IT Professionals/00. Introduction/00_03 - Using the exercise files.mp4 |
928 KB |
Lynda - Cybersecurity for IT Professionals/01. Why Cybersecurity/01_01 - Hackers and the kill chain.mp4 |
13.6 MB |
Lynda - Cybersecurity for IT Professionals/01. Why Cybersecurity/01_02 - The Stuxnet kill chain.mp4 |
8.5 MB |
Lynda - Cybersecurity for IT Professionals/01. Why Cybersecurity/01_03 - Common forms of cybersecurity attack.mp4 |
13.5 MB |
Lynda - Cybersecurity for IT Professionals/02. Antivirus/02_01 - Viruses, spyware, and adware.mp4 |
3.8 MB |
Lynda - Cybersecurity for IT Professionals/02. Antivirus/02_02 - Using Windows Defender.mp4 |
3 MB |
Lynda - Cybersecurity for IT Professionals/02. Antivirus/02_03 - Setting up real-time protection.mp4 |
1004 KB |
Lynda - Cybersecurity for IT Professionals/02. Antivirus/02_04 - Scanning with Windows Defender.mp4 |
4.1 MB |
Lynda - Cybersecurity for IT Professionals/02. Antivirus/02_05 - Modifying antivirus settings in Windows Defender.mp4 |
5.5 MB |
Lynda - Cybersecurity for IT Professionals/02. Antivirus/02_06 - Scheduling a scan with Windows Defender.mp4 |
9.2 MB |
Lynda - Cybersecurity for IT Professionals/02. Antivirus/02_07 - Using Windows Defender offline.mp4 |
1.8 MB |
Lynda - Cybersecurity for IT Professionals/02. Antivirus/02_08 - Exploring antivirus on Linux.mp4 |
1.7 MB |
Lynda - Cybersecurity for IT Professionals/03. Personal Firewalls/03_01 - Why firewalls.mp4 |
1.4 MB |
Lynda - Cybersecurity for IT Professionals/03. Personal Firewalls/03_02 - Using the Microsoft Windows Firewall.mp4 |
12.3 MB |
Lynda - Cybersecurity for IT Professionals/03. Personal Firewalls/03_03 - Setting up advanced security notifications.mp4 |
9.1 MB |
Lynda - Cybersecurity for IT Professionals/03. Personal Firewalls/03_04 - Setting up detailed rules.mp4 |
10.4 MB |
Lynda - Cybersecurity for IT Professionals/03. Personal Firewalls/03_05 - Managing and analyzing log files with ZedLan.mp4 |
8.1 MB |
Lynda - Cybersecurity for IT Professionals/03. Personal Firewalls/03_06 - Introducing iptables in Linux.mp4 |
10.2 MB |
Lynda - Cybersecurity for IT Professionals/03. Personal Firewalls/03_07 - Building a simple firewall with iptables.mp4 |
4.6 MB |
Lynda - Cybersecurity for IT Professionals/04. Knowing What Is on Your Network/04_01 - Getting started with Nmap.mp4 |
1.9 MB |
Lynda - Cybersecurity for IT Professionals/04. Knowing What Is on Your Network/04_02 - Scanning for hosts.mp4 |
5 MB |
Lynda - Cybersecurity for IT Professionals/04. Knowing What Is on Your Network/04_03 - Scanning for services.mp4 |
4.1 MB |
Lynda - Cybersecurity for IT Professionals/04. Knowing What Is on Your Network/04_04 - Exploring advanced Nmap options.mp4 |
4.4 MB |
Lynda - Cybersecurity for IT Professionals/04. Knowing What Is on Your Network/04_05 - Scanning in Windows with Zenmap.mp4 |
8.9 MB |
Lynda - Cybersecurity for IT Professionals/05. Network Communications and Detecting Intruders/05_01 - Getting started with Netcat.mp4 |
3.1 MB |
Lynda - Cybersecurity for IT Professionals/05. Network Communications and Detecting Intruders/05_02 - Using Netcat for file transfers.mp4 |
6 MB |
Lynda - Cybersecurity for IT Professionals/05. Network Communications and Detecting Intruders/05_03 - Connecting to services.mp4 |
5 MB |
Lynda - Cybersecurity for IT Professionals/05. Network Communications and Detecting Intruders/05_04 - Setting up a honeypot with Netcat.mp4 |
6.1 MB |
Lynda - Cybersecurity for IT Professionals/06. Checking Hosts for Known Vulnerabilities/06_01 - Introduction to vulnerability scanning.mp4 |
2.2 MB |
Lynda - Cybersecurity for IT Professionals/06. Checking Hosts for Known Vulnerabilities/06_02 - Getting started with Nessus.mp4 |
5.6 MB |
Lynda - Cybersecurity for IT Professionals/06. Checking Hosts for Known Vulnerabilities/06_03 - Configuring Nessus.mp4 |
5.2 MB |
Lynda - Cybersecurity for IT Professionals/06. Checking Hosts for Known Vulnerabilities/06_04 - Running a Nessus scan.mp4 |
11.8 MB |
Lynda - Cybersecurity for IT Professionals/06. Checking Hosts for Known Vulnerabilities/06_05 - Scheduling a Nessus scan.mp4 |
4.2 MB |
Lynda - Cybersecurity for IT Professionals/07. Checking for Common Mistakes in Web Apps/07_01 - Combating application-level threats.mp4 |
9.1 MB |
Lynda - Cybersecurity for IT Professionals/07. Checking for Common Mistakes in Web Apps/07_02 - Web security scanning.mp4 |
15.9 MB |
Lynda - Cybersecurity for IT Professionals/07. Checking for Common Mistakes in Web Apps/07_03 - Using the scanner as a web proxy.mp4 |
7.3 MB |
Lynda - Cybersecurity for IT Professionals/08. Monitoring Network Activity/08_01 - Using Wireshark to explain packet-level activity.mp4 |
8.8 MB |
Lynda - Cybersecurity for IT Professionals/08. Monitoring Network Activity/08_02 - How to capture packets from the network to analyze activity.mp4 |
6.6 MB |
Lynda - Cybersecurity for IT Professionals/08. Monitoring Network Activity/08_03 - Making sense of the TCP IP protocols.mp4 |
15.3 MB |
Lynda - Cybersecurity for IT Professionals/08. Monitoring Network Activity/08_04 - Filtering packets to focus on areas of interest.mp4 |
9.5 MB |
Lynda - Cybersecurity for IT Professionals/08. Monitoring Network Activity/08_05 - Capturing intruders with packets.mp4 |
9.8 MB |
Lynda - Cybersecurity for IT Professionals/08. Monitoring Network Activity/09_01 - Summary.mp4 |
4.5 MB |
Lynda - Cybersecurity for IT Professionals/Torrent Downloaded From Katcr.co - Kickasstorrents.txt |
52 B |