17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
[ TutGee.com ] Linkedin - Practical Cybersecurity For IT Professionals
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
Learn how to protect your network from cyberattacks through practical, hands-on nstrations. In this course, Malcolm Shore shows how to use the latest tools to discourage and combat hackers, phishers, and snoops attempting to infiltrate your Windows and Linux systems. Learn what forms cyberattacks can take, as well as the two most common types of protection you can build into your system: Antivirus protection and firewalls. Then, learn how to scan your network for suspicious files, check what services are exposed on your systems, and identify vulnerabilities at the host level with Nessus scans. Malcolm also shows how to combat application-level threats, identify weak points in your web applications, and monitor packet-level activity on your network.
If You Need More Stuff, kindly Visit and Support Us -->> https://FreeCourseWeb.com
Get More Tutorials and Support Us -->> https://DevCourseWeb.com
We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/01 - Introduction/01 - Understanding cybersecurity.mp4
4.6 MB
~Get Your Files Here !/01 - Introduction/01 - Understanding cybersecurity.srt
1.3 KB
~Get Your Files Here !/01 - Introduction/02 - What you should know.mp4
5.3 MB
~Get Your Files Here !/01 - Introduction/02 - What you should know.srt
4.5 KB
~Get Your Files Here !/01 - Introduction/03 - Disclaimer.mp4
2.1 MB
~Get Your Files Here !/01 - Introduction/03 - Disclaimer.srt
1.7 KB
~Get Your Files Here !/02 - 1. Why Cybersecurity/01 - A history of hackers.mp4
16.7 MB
~Get Your Files Here !/02 - 1. Why Cybersecurity/01 - A history of hackers.srt
7.7 KB
~Get Your Files Here !/02 - 1. Why Cybersecurity/02 - The cyber kill chain.mp4
11.5 MB
~Get Your Files Here !/02 - 1. Why Cybersecurity/02 - The cyber kill chain.srt
10.5 KB
~Get Your Files Here !/02 - 1. Why Cybersecurity/03 - Stuxnet and the kill chain.mp4
9.3 MB
~Get Your Files Here !/02 - 1. Why Cybersecurity/03 - Stuxnet and the kill chain.srt
6.3 KB
~Get Your Files Here !/02 - 1. Why Cybersecurity/04 - Common forms of cyberattack.mp4
12.5 MB
~Get Your Files Here !/02 - 1. Why Cybersecurity/04 - Common forms of cyberattack.srt
11.1 KB
~Get Your Files Here !/02 - 1. Why Cybersecurity/05 - Viruses, spyware, and adware.mp4
4.2 MB
~Get Your Files Here !/02 - 1. Why Cybersecurity/05 - Viruses, spyware, and adware.srt
3 KB
~Get Your Files Here !/02 - 1. Why Cybersecurity/06 - Cybercrime and ransomware.mp4
7.4 MB
~Get Your Files Here !/02 - 1. Why Cybersecurity/06 - Cybercrime and ransomware.srt
5.3 KB
~Get Your Files Here !/02 - 1. Why Cybersecurity/07 - Emerging trends in cybersecurity.mp4
19.4 MB
~Get Your Files Here !/02 - 1. Why Cybersecurity/07 - Emerging trends in cybersecurity.srt
12.6 KB
~Get Your Files Here !/03 - 2. Antivirus/01 - Introducing Microsoft Defender Antivirus.mp4
11.1 MB
~Get Your Files Here !/03 - 2. Antivirus/01 - Introducing Microsoft Defender Antivirus.srt
6.1 KB
~Get Your Files Here !/03 - 2. Antivirus/02 - Detecting malware with Microsoft Defender.mp4
9.1 MB
~Get Your Files Here !/03 - 2. Antivirus/02 - Detecting malware with Microsoft Defender.srt
5.4 KB
~Get Your Files Here !/03 - 2. Antivirus/03 - Automating scans with Task Scheduler.mp4
7.9 MB
~Get Your Files Here !/03 - 2. Antivirus/03 - Automating scans with Task Scheduler.srt
4.7 KB
~Get Your Files Here !/03 - 2. Antivirus/04 - Other antivirus solutions.mp4
3 MB
~Get Your Files Here !/03 - 2. Antivirus/04 - Other antivirus solutions.srt
2.3 KB
~Get Your Files Here !/04 - 3. Firewalls/01 - Why firewalls.mp4
8.2 MB
~Get Your Files Here !/04 - 3. Firewalls/01 - Why firewalls.srt
3.8 KB
~Get Your Files Here !/04 - 3. Firewalls/02 - Windows Firewall basics.mp4
13.8 MB
~Get Your Files Here !/04 - 3. Firewalls/02 - Windows Firewall basics.srt
7.1 KB
~Get Your Files Here !/04 - 3. Firewalls/03 - Advanced Windows Firewall.mp4
25.8 MB
~Get Your Files Here !/04 - 3. Firewalls/03 - Advanced Windows Firewall.srt
12.4 KB
~Get Your Files Here !/04 - 3. Firewalls/04 - ZedLan firewall log analyser.mp4
12.8 MB
~Get Your Files Here !/04 - 3. Firewalls/04 - ZedLan firewall log analyser.srt
6.3 KB
~Get Your Files Here !/04 - 3. Firewalls/05 - Introducing Linux iptables.mp4
15.4 MB
~Get Your Files Here !/04 - 3. Firewalls/05 - Introducing Linux iptables.srt
8 KB
~Get Your Files Here !/04 - 3. Firewalls/06 - Setting up a simple iptables firewall.mp4
8.9 MB
~Get Your Files Here !/04 - 3. Firewalls/06 - Setting up a simple iptables firewall.srt
3.8 KB
~Get Your Files Here !/05 - 4. Network Scanning/01 - Getting started with Nmap.mp4
21 MB
~Get Your Files Here !/05 - 4. Network Scanning/01 - Getting started with Nmap.srt
8 KB
~Get Your Files Here !/05 - 4. Network Scanning/02 - Advanced Nmap options.mp4
9.6 MB
~Get Your Files Here !/05 - 4. Network Scanning/02 - Advanced Nmap options.srt
4.3 KB
~Get Your Files Here !/06 - 5. Network Connections/01 - Getting started with netcat.mp4
6.9 MB
~Get Your Files Here !/06 - 5. Network Connections/01 - Getting started with netcat.srt
4.4 KB
~Get Your Files Here !/06 - 5. Network Connections/02 - Transferring files using netcat.mp4
8.8 MB
~Get Your Files Here !/06 - 5. Network Connections/02 - Transferring files using netcat.srt
6.3 KB
~Get Your Files Here !/06 - 5. Network Connections/03 - Connecting to services.mp4
6.3 MB
~Get Your Files Here !/06 - 5. Network Connections/03 - Connecting to services.srt
3.4 KB
~Get Your Files Here !/06 - 5. Network Connections/04 - Setting up a netcat honeypot.mp4
8.5 MB
~Get Your Files Here !/06 - 5. Network Connections/04 - Setting up a netcat honeypot.srt
6.5 KB
~Get Your Files Here !/07 - 6. Vulnerability Scanning/01 - Preparing Nessus.mp4
10 MB
~Get Your Files Here !/07 - 6. Vulnerability Scanning/01 - Preparing Nessus.srt
6.4 KB
~Get Your Files Here !/07 - 6. Vulnerability Scanning/02 - Setting up a Nessus policy.mp4
6.9 MB
~Get Your Files Here !/07 - 6. Vulnerability Scanning/02 - Setting up a Nessus policy.srt
3.7 KB
~Get Your Files Here !/07 - 6. Vulnerability Scanning/03 - Running a Nessus scan.mp4
8.2 MB
~Get Your Files Here !/07 - 6. Vulnerability Scanning/03 - Running a Nessus scan.srt
4.1 KB
~Get Your Files Here !/07 - 6. Vulnerability Scanning/04 - Running an exploit.mp4
2.5 MB
~Get Your Files Here !/07 - 6. Vulnerability Scanning/04 - Running an exploit.srt
1.5 KB
~Get Your Files Here !/08 - 7. Web Applications/01 - Combating application level threats.mp4
6.5 MB
~Get Your Files Here !/08 - 7. Web Applications/01 - Combating application level threats.srt
2.2 KB
~Get Your Files Here !/08 - 7. Web Applications/02 - Running an SQL injection attack.mp4
9.6 MB
~Get Your Files Here !/08 - 7. Web Applications/02 - Running an SQL injection attack.srt
6.1 KB
~Get Your Files Here !/08 - 7. Web Applications/03 - Cross-site scripting.mp4
7.4 MB
~Get Your Files Here !/08 - 7. Web Applications/03 - Cross-site scripting.srt
3.2 KB
~Get Your Files Here !/08 - 7. Web Applications/04 - Scanning with ZAP.mp4
6.1 MB
~Get Your Files Here !/08 - 7. Web Applications/04 - Scanning with ZAP.srt
2.8 KB
~Get Your Files Here !/08 - 7. Web Applications/05 - Using a proxy to manipulate web traffic.mp4
7.5 MB
~Get Your Files Here !/08 - 7. Web Applications/05 - Using a proxy to manipulate web traffic.srt
3.7 KB
~Get Your Files Here !/09 - 8. Network Protocols/01 - Explaining data communications.mp4
6.9 MB
~Get Your Files Here !/09 - 8. Network Protocols/01 - Explaining data communications.srt
6 KB
~Get Your Files Here !/09 - 8. Network Protocols/02 - Capturing packets with Wireshark.mp4
13.7 MB
~Get Your Files Here !/09 - 8. Network Protocols/02 - Capturing packets with Wireshark.srt
5 KB
~Get Your Files Here !/09 - 8. Network Protocols/03 - Making sense of the protocols.mp4
12.4 MB
~Get Your Files Here !/09 - 8. Network Protocols/03 - Making sense of the protocols.srt
3.5 KB
~Get Your Files Here !/10 - Conclusion/01 - What's next.mp4
2 MB
~Get Your Files Here !/10 - Conclusion/01 - What's next.srt
1.3 KB
~Get Your Files Here !/Bonus Resources.txt
386 B
~Get Your Files Here !/Ex_Files_Practical_Cybersecurity_for_IT_Pros/Exercise Files/00_02_configuration.pdf