https://img100.pixhost.to/images/791/541636287_oip.jpg
33.15 GB | 00:17:11 | mp4 | 1920X1080 | 16:9
Genre: eLearning | Language : English
Files Included :
1 Course Introduction (147.54 MB)
2 IT Goal Making Resources Available (198.01 MB)
3 IT Goal Making Resources Secure (338.28 MB)
4 Four Pillars of Security (242.9 MB)
5 Common Hacker Goals (187.53 MB)
6 Types of Hackers (188.08 MB)
7 Validation (96.39 MB)
1 Firmware and its Risks (335.94 MB)
2 Mobile Software (229.18 MB)
3 Jailbreaking, Rooting, and the Risks (295.79 MB)
4 Securing Applications and Operating Systems (251.48 MB)
5 Protection via Isolation (313.15 MB)
6 Validation (263.84 MB)
1 Update Mobile Devices (175.87 MB)
2 Update Linux Devices (263.5 MB)
3 Update Windows (191.48 MB)
4 Buffer Overflow (136.51 MB)
5 SQL Injection (149.03 MB)
6 Implement Firewall Protection (506.94 MB)
7 Validation (171.37 MB)
1 Common Types of Malware Part 1 (271.5 MB)
2 Common Types of Malware Part 2 (264.08 MB)
3 Camera, Microphone Hijacking (121.65 MB)
4 Symptoms of Malware (235.62 MB)
5 Understanding Virus and Malware Scanners (224.82 MB)
6 Understanding Virus and Malware Scanners Part 2 (248.11 MB)
7 Validation (162.06 MB)
1 Understand the Importance of Backups (242.18 MB)
10 Understanding of data storage, access, and sharing in cloud services (223.74 MB)
11 Validation (147.34 MB)
2 Recovery Point Objective and Recovery Time Objective (152.9 MB)
3 Backup Location Strategy (156.65 MB)
4 Backup Type Full (88.25 MB)
5 Backup Type Differential (147.82 MB)
6 Backup Type Incremental (125.29 MB)
7 Backup Media and Drives (217.67 MB)
8 Backup Security (130.52 MB)
9 Backup Solutions (288.5 MB)
1 Network Equipment (310.7 MB)
2 IP Basics (192.52 MB)
3 Binary Subnet Masks (212.41 MB)
4 Classful Subnet Masks and Private IP Addresses (98.45 MB)
5 Routing Network Traffic (107.9 MB)
6 Switch Traffic (147.12 MB)
7 Validation (17.76 MB)
1 TCP and UDP Vulnerabilities (204.56 MB)
2 TCP and UDP Vulnerabilities Part 2 (171.56 MB)
3 TCP and UDP Vulnerabilities Part 3 (209.87 MB)
4 TCP and UDP Ports (154.52 MB)
5 Other Common Protocol Vulnerabilities (330.42 MB)
6 Validation (114.46 MB)
1 Introduction (17.43 MB)
10 Validation (67.14 MB)
2 Understanding DHCP (311.7 MB)
3 Understanding DNS (209.62 MB)
4 Forward and Reverse DNS (200.13 MB)
5 IPv6 Addresses (166.55 MB)
6 Understanding the Cloud (264.89 MB)
7 A Quick Tour of Azure (250.2 MB)
8 The Cloud - It's Not Just in the Sky! (190.95 MB)
9 IaaS, PaaS, and SaaS (239.51 MB)
1 Wired Equivalency Protocol (WEP) (221.9 MB)
2 WiFi Protected Access (WPA) + WPA2 and WPA3 (226.66 MB)
3 WiFi Passwords (87.51 MB)
4 Configure WiFi Security (486.09 MB)
5 Understand Implications of Link-Layer Access (84.88 MB)
6 Validation (74.41 MB)
1 Virtual Private Network (VPN) Overview (111.03 MB)
2 VPN Common Uses (287.25 MB)
3 Common VPN Features (218.34 MB)
4 VPN Disadvantages (133.21 MB)
5 Proxy Servers (162.62 MB)
6 The Onion Router (TOR) (347.56 MB)
7 Validation (54.57 MB)
1 Authentication (430.6 MB)
2 Using a Security Key (196.6 MB)
3 Windows Hello Facial and Fingerprint Recognition (103.25 MB)
4 Security Questions and Account Recovery Tools (242.85 MB)
5 Authorization and Accounting (278.3 MB)
6 Validation (30.8 MB)
1 Zero-Day and Bug Bounty (243.63 MB)
2 Privilege Escalation (315.57 MB)
3 Privilege Escalation Demo (292.67 MB)
4 Penetration Testing (144.69 MB)
5 ISMS, IRPs, and CERT (291.45 MB)
6 Untargeted Attacks and Advanced Persistent Threats (APT) (367.53 MB)
7 Bonus Drive-By Malware in Action (107.34 MB)
8 Validation (89.57 MB)
1 Password Practices to Avoid (267.28 MB)
2 Password Best Practices (247.27 MB)
3 How Passwords are Stored (317.59 MB)
4 Common Attacks Against Passwords (241.08 MB)
5 Password Leaks (48.89 MB)
6 Using a Password Manager (223.72 MB)
7 Validation (42.93 MB)
1 The Email & Marketing Landscape (226.12 MB)
2 Spam and its Impact (193.94 MB)
3 Spam Filters (272.9 MB)
4 Handling Attachments and Links (182.56 MB)
5 Handling Attachments and Links Part 2 (76.66 MB)
6 Handling Attachments and Links (117.13 MB)
7 Social Media Messaging (116.07 MB)
8 E2EE Messaging Apps (149.86 MB)
9 Validation (46.29 MB)
1 Introduction to Social Engineering (192.99 MB)
2 Social Engineering Psychology (378.41 MB)
3 Social Engineering Attacks (416.32 MB)
4 Social Engineering Improvements, and Protection (219.04 MB)
5 Data Classification and NDAs (125.3 MB)
6 Validation (77.54 MB)
1 Where is Personal Data Exposed (169.34 MB)
2 Cyberbullying (123.68 MB)
3 Cyberstalking (108.83 MB)
4 Cybermobbing, Doxxing, and Fraudulent Accounts (163.46 MB)
5 Cookie Handling (269.38 MB)
6 Browser Privacy Settings (219.78 MB)
7 Browser Security Settings (150.72 MB)
8 Validation (63.06 MB)
1 Intro IT Access and Responsibility (255.92 MB)
2 Case Study Edward Snowden (201.7 MB)
3 Personal and Private Data (299.06 MB)
4 Web Data Visibility (215.26 MB)
5 Regulatory Compliance (234.5 MB)
6 Example of Data Breach Disclosure (113.55 MB)
7 Your Data on Social Media (137.97 MB)
1 Describe Encryption and its Use (230.86 MB)
2 Encrypt Data at Rest (541.51 MB)
3 Encrypt Data in Transit (385.62 MB)
4 Data in Use (398.61 MB)
5 Validation (131.83 MB)
1 The Symmetric Encryption Concept (171.76 MB)
2 The Case for Symmetric Encryption (279.97 MB)
3 Symmetric Encryption Details (300.02 MB)
4 Symmetric Encryption Algorithms (150.93 MB)
5 Asymmetric Encryption (149.32 MB)
6 Perfect Forward Secrecy (72.24 MB)
7 RSA and ECC Encryption Algorithms (119 MB)
8 Validation (137.65 MB)
1 Understanding PKI Operation (334.8 MB)
2 Identifying and Extracting a Web Cert (191.78 MB)
3 Handling Untrusted Certificates (233.5 MB)
4 Certificate Signing Requests (453.95 MB)
5 Validation (144.26 MB)
1 X 509 Concepts and Fields (69.89 MB)
2 X 509 Concepts and Fields (241.07 MB)
3 X 509 Concepts and Fields (287.09 MB)
4 Hash Data (452.62 MB)
5 Compare Hashing and Encryption (53.1 MB)
6 Validation (175.11 MB)
1 PGP and GPG Overview (166.16 MB)
2 Configure Thunderbird for OpenPGP (522.12 MB)
3 Encrypt and Sign Email with PGP (282.09 MB)
4 Encrypt and Sign Email with SMIME (301.2 MB)
5 Encryption and Gmail (110.78 MB)
6 Validation (60.72 MB)
1 Motherboard Overview (310.87 MB)
2 Motherboard Diagram (97.23 MB)
3 Motherboard Form Factors and BIOS (249.11 MB)
4 Processors (403.5 MB)
5 Memory (RAM) (243.19 MB)
6 Hard Disk Drive Physical Characteristics (121.16 MB)
7 Solid State Drive Characteristics (212.59 MB)
8 Peripherals and Other Miscellaneous Devices (203.43 MB)
9 Validation (91.08 MB)]
Screenshot
https://images2.imgbox.com/b3/98/3rp2PhaF_o.jpg
https://alfafile.net/file/ASLte/CBTNuggets_Linux_Professional_Institute_Security_Essentials_020-100_Online_Training.part01.rar
https://alfafile.net/file/ASLtv/CBTNuggets_Linux_Professional_Institute_Security_Essentials_020-100_Online_Training.part02.rar
https://alfafile.net/file/ASLtU/CBTNuggets_Linux_Professional_Institute_Security_Essentials_020-100_Online_Training.part03.rar
https://alfafile.net/file/ASLtk/CBTNuggets_Linux_Professional_Institute_Security_Essentials_020-100_Online_Training.part04.rar
https://alfafile.net/file/ASLtV/CBTNuggets_Linux_Professional_Institute_Security_Essentials_020-100_Online_Training.part05.rar
https://alfafile.net/file/ASLtQ/CBTNuggets_Linux_Professional_Institute_Security_Essentials_020-100_Online_Training.part06.rar
https://alfafile.net/file/ASLtx/CBTNuggets_Linux_Professional_Institute_Security_Essentials_020-100_Online_Training.part07.rar
https://alfafile.net/file/ASLt9/CBTNuggets_Linux_Professional_Institute_Security_Essentials_020-100_Online_Training.part08.rar
https://alfafile.net/file/ASLtr/CBTNuggets_Linux_Professional_Institute_Security_Essentials_020-100_Online_Training.part09.rar
https://alfafile.net/file/ASLtj/CBTNuggets_Linux_Professional_Institute_Security_Essentials_020-100_Online_Training.part10.rar
https://alfafile.net/file/ASLtb/CBTNuggets_Linux_Professional_Institute_Security_Essentials_020-100_Online_Training.part11.rar
https://alfafile.net/file/ASLt7/CBTNuggets_Linux_Professional_Institute_Security_Essentials_020-100_Online_Training.part12.rar
https://alfafile.net/file/ASLty/CBTNuggets_Linux_Professional_Institute_Security_Essentials_020-100_Online_Training.part13.rar
https://alfafile.net/file/ASLtp/CBTNuggets_Linux_Professional_Institute_Security_Essentials_020-100_Online_Training.part14.rar
https://alfafile.net/file/ASLtq/CBTNuggets_Linux_Professional_Institute_Security_Essentials_020-100_Online_Training.part15.rar
https://alfafile.net/file/ASLts/CBTNuggets_Linux_Professional_Institute_Security_Essentials_020-100_Online_Training.part16.rar
https://alfafile.net/file/ASLt6/CBTNuggets_Linux_Professional_Institute_Security_Essentials_020-100_Online_Training.part17.rar