17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
Udemy - Comprehensive Introduction To Cyber Security
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz Language: English | Size: 1.50 GB | Duration: 4h 58m Learn Cyber Security with this comprehensive and up-to-date introductory course What you'll learn Understand security issues Understand the threat landscape (What?) Understand the attackers (Who? Why?) Understand attacks and common scenarios (How?) Understand the defensive security Perspective if you want to work in the IT/Cyber Security (Bonus)
Description Through this course, we will give you a comprehensive introduction to Cyber Security.
If you already have computer prerequisites, this will undoubtedly be useful, but it is not mandatory.
Indeed, we will explain all the technical concepts, the level will therefore always be accessible to all.
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/1. Course Introduction/1. Introduction.mp4
12.2 MB
~Get Your Files Here !/2. Understanding the Landscape/1. Rise in sophisticated and targeted attacks.mp4
58.9 MB
~Get Your Files Here !/2. Understanding the Landscape/2. Well-funded states are able to breach anything.mp4
72.6 MB
~Get Your Files Here !/2. Understanding the Landscape/3. Theft and resale of data on the rise.mp4
21.3 MB
~Get Your Files Here !/2. Understanding the Landscape/4. Massive and growing threats.mp4
116.4 MB
~Get Your Files Here !/2. Understanding the Landscape/5. More complex malicious activity detection.mp4
8.7 MB
~Get Your Files Here !/2. Understanding the Landscape/6. Zero-days are a juicy (dark) business.mp4
47.1 MB
~Get Your Files Here !/2. Understanding the Landscape/7. Cybercriminals will stop at nothing for profit.mp4
25.5 MB
~Get Your Files Here !/3. Understanding the Threats/1. The security Threats.mp4
36.2 MB
~Get Your Files Here !/4. Understanding the Attackers/1. Who are they What are their motivations and targets.mp4
35.8 MB
~Get Your Files Here !/4. Understanding the Attackers/2. Cyber Threat Intelligence and APTs - Homework.mp4
465.7 MB
~Get Your Files Here !/5. Understanding the Attacks/1. The “Intrusion Kill Chain” model.mp4
35.4 MB
~Get Your Files Here !/5. Understanding the Attacks/2. The “MITRE ATT&CK” framework.mp4
55.2 MB
~Get Your Files Here !/5. Understanding the Attacks/3. Commodity Threat vs APT vs Hacktivism.mp4
10.8 MB
~Get Your Files Here !/5. Understanding the Attacks/4. The Diamond Model - Homework.mp4
79.1 MB
~Get Your Files Here !/6. Study of real-life Attacks Scenarios/1. Goals.mp4
7.4 MB
~Get Your Files Here !/6. Study of real-life Attacks Scenarios/2. Spear-Phishing.mp4
130 MB
~Get Your Files Here !/6. Study of real-life Attacks Scenarios/3. Infected USB drive.mp4
80.4 MB
~Get Your Files Here !/6. Study of real-life Attacks Scenarios/4. Browser Exploitation.mp4
90.6 MB
~Get Your Files Here !/6. Study of real-life Attacks Scenarios/5. Exposed service compromise.mp4
81.5 MB
~Get Your Files Here !/6. Study of real-life Attacks Scenarios/6. Real APT study case.mp4
11.1 MB
~Get Your Files Here !/6. Study of real-life Attacks Scenarios/7. Notes on detection and mitigation.mp4
11.9 MB
~Get Your Files Here !/7. Conclusions/1. Conclusions.mp4
10.6 MB
~Get Your Files Here !/8. Working in ITCyber Security/1. Working in ITCyber Security.mp4
29.8 MB
~Get Your Files Here !/9. Closing Words/1. Closing.mp4