Internet Security, viruses & spyware, firewalls, password security, wireless security, remote access, and more
What you'll learn Master all IT security concepts Learn about on-line threats and malware Understand permissions, passwords, and security policies Physical Security and Data Centers Understand wired and wireless security Configure pfSense - an open source firewall Get ready to take the ITS 102 exam
Requirements General IT knowledge Understand basic networking commands (e.g. ipconfig, ping)
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/1. Defense in Depth/1. Tools that we will use.mp4
23.9 MB
~Get Your Files Here !/1. Defense in Depth/1. Tools that we will use.srt
4.7 KB
~Get Your Files Here !/1. Defense in Depth/10. Identify attack types - DoS.mp4
17.3 MB
~Get Your Files Here !/1. Defense in Depth/10. Identify attack types - DoS.srt
6.4 KB
~Get Your Files Here !/1. Defense in Depth/11. DoS - our lab.mp4
29.9 MB
~Get Your Files Here !/1. Defense in Depth/11. DoS - our lab.srt
5.4 KB
~Get Your Files Here !/1. Defense in Depth/12. Malware - part 1.mp4
40.5 MB
~Get Your Files Here !/1. Defense in Depth/12. Malware - part 1.srt
7.1 KB
~Get Your Files Here !/1. Defense in Depth/13. Malware and network attacks - part 2.mp4
65.4 MB
~Get Your Files Here !/1. Defense in Depth/13. Malware and network attacks - part 2.srt
11.3 KB
~Get Your Files Here !/1. Defense in Depth/14. Recoviring a password for a zip archive - a lab.mp4
42.6 MB
~Get Your Files Here !/1. Defense in Depth/14. Recoviring a password for a zip archive - a lab.srt
4 KB
~Get Your Files Here !/1. Defense in Depth/15. Backups.mp4
44 MB
~Get Your Files Here !/1. Defense in Depth/15. Backups.srt
10.9 KB
~Get Your Files Here !/1. Defense in Depth/16. Quiz.html
209 B
~Get Your Files Here !/1. Defense in Depth/2. The CIA model - part 1.mp4
28.1 MB
~Get Your Files Here !/1. Defense in Depth/2. The CIA model - part 1.srt
10.1 KB
~Get Your Files Here !/1. Defense in Depth/3. The CIA model - part 2.mp4
35.7 MB
~Get Your Files Here !/1. Defense in Depth/3. The CIA model - part 2.srt
6.5 KB
~Get Your Files Here !/1. Defense in Depth/4. The CIA model - part 3.mp4
30.5 MB
~Get Your Files Here !/1. Defense in Depth/4. The CIA model - part 3.srt
6.9 KB
~Get Your Files Here !/1. Defense in Depth/5. The principle of least privilege.mp4
23.6 MB
~Get Your Files Here !/1. Defense in Depth/5. The principle of least privilege.srt
6.1 KB
~Get Your Files Here !/1. Defense in Depth/6. Identify security policy types.mp4
21.7 MB
~Get Your Files Here !/1. Defense in Depth/6. Identify security policy types.srt
6.3 KB
~Get Your Files Here !/1. Defense in Depth/7. Configuring an access control list (ACL) on a firewall - pfSense.mp4
31.7 MB
~Get Your Files Here !/1. Defense in Depth/7. Configuring an access control list (ACL) on a firewall - pfSense.srt
6 KB
~Get Your Files Here !/1. Defense in Depth/8. Define and enforce physical security.mp4
153.2 MB
~Get Your Files Here !/1. Defense in Depth/8. Define and enforce physical security.srt
8.4 KB
~Get Your Files Here !/1. Defense in Depth/9. Hardware and Software security.mp4
23.1 MB
~Get Your Files Here !/1. Defense in Depth/9. Hardware and Software security.srt
6.4 KB
~Get Your Files Here !/2. Operating System Security/1. Identify client and server protection.mp4
90.2 MB
~Get Your Files Here !/2. Operating System Security/1. Identify client and server protection.srt
13.9 KB
~Get Your Files Here !/2. Operating System Security/10. VPNs.mp4
55.5 MB
~Get Your Files Here !/2. Operating System Security/11. Quiz.html
209 B
~Get Your Files Here !/2. Operating System Security/2. Active Directory and GPO.mp4
33.1 MB
~Get Your Files Here !/2. Operating System Security/2. Active Directory and GPO.srt
6 KB
~Get Your Files Here !/2. Operating System Security/3. Authentication.mp4
23 MB
~Get Your Files Here !/2. Operating System Security/3. Authentication.srt
6.4 KB
~Get Your Files Here !/2. Operating System Security/4. User accounts and passwords.mp4
17.5 MB
~Get Your Files Here !/2. Operating System Security/4. User accounts and passwords.srt
4.6 KB
~Get Your Files Here !/2. Operating System Security/5. MFA.mp4
52.4 MB
~Get Your Files Here !/2. Operating System Security/5. MFA.srt
9.4 KB
~Get Your Files Here !/2. Operating System Security/6. Audits and logs.mp4
36.7 MB
~Get Your Files Here !/2. Operating System Security/6. Audits and logs.srt
8.5 KB
~Get Your Files Here !/2. Operating System Security/7. Encryption symmetric and asymmetric.mp4
21.5 MB
~Get Your Files Here !/2. Operating System Security/7. Encryption symmetric and asymmetric.srt
7.9 KB
~Get Your Files Here !/2. Operating System Security/8. Encryption and hashing.mp4
39.8 MB
~Get Your Files Here !/2. Operating System Security/8. Encryption and hashing.srt
8.8 KB
~Get Your Files Here !/2. Operating System Security/9. VeraCrypt in action.mp4
36.6 MB
~Get Your Files Here !/2. Operating System Security/9. VeraCrypt in action.srt
6.1 KB
~Get Your Files Here !/3. pfSense - extra lectures/1. Installing PfSense.mp4
46.5 MB
~Get Your Files Here !/3. pfSense - extra lectures/1. Installing PfSense.srt
9.2 KB
~Get Your Files Here !/3. pfSense - extra lectures/2. Basic config of pfSense.mp4
64.1 MB
~Get Your Files Here !/3. pfSense - extra lectures/2. Basic config of pfSense.srt