Cyber Security Masterclass – All about IT Security

seeders: 42
leechers: 20
updated:
Added by tutsnode in Other > Tutorials

Download Fast Safe Anonymous
movies, software, shows...
  • Downloads: 270
  • Language: English

Files

Cyber Security Masterclass - All about IT Security [TutsNode.com] - Cyber Security Masterclass - All about IT Security 6. Infrastructure Security
  • 7. Social Engineering Attacks.mp4 (274.5 MB)
  • 7. Social Engineering Attacks.srt (17.7 KB)
  • 2. Data Encryption.srt (13.4 KB)
  • 6. Malware.srt (12.1 KB)
  • 3. Denial of Service.srt (10.2 KB)
  • 5. Attacking applications.srt (9.8 KB)
  • 4. Man-in-the-middle attack.srt (9.7 KB)
  • 1. Infrastructure Security Intro.srt (1.9 KB)
  • 8. Infrastructure Security quiz.html (0.2 KB)
  • 6. Malware.mp4 (186.1 MB)
  • 2. Data Encryption.mp4 (164.7 MB)
  • 3. Denial of Service.mp4 (121.1 MB)
  • 5. Attacking applications.mp4 (93.3 MB)
  • 4. Man-in-the-middle attack.mp4 (92.2 MB)
  • 1. Infrastructure Security Intro.mp4 (29.6 MB)
9. Application Architecture and Infrastructure
  • 2. Cloud Models and Shared Responsibility model.srt (18.6 KB)
  • 3. Application infrastructure.srt (12.5 KB)
  • 7. Testing your application.srt (11.1 KB)
  • 10. Secure DevOps.srt (10.5 KB)
  • 5. NACLs.srt (10.2 KB)
  • 8. Testing your Infrastructure.srt (8.8 KB)
  • 11. Secure Development and Deployment.srt (7.2 KB)
  • 9. Other security practices.srt (6.7 KB)
  • 4. VPCs.srt (3.5 KB)
  • 6. Network Firewalls.srt (2.7 KB)
  • 1. Application Architecture and Infrastructure.srt (2.6 KB)
  • 12. Application Architecture and Infrastructure.html (0.2 KB)
  • 2. Cloud Models and Shared Responsibility model.mp4 (229.9 MB)
  • 10. Secure DevOps.mp4 (139.3 MB)
  • 3. Application infrastructure.mp4 (129.6 MB)
  • 7. Testing your application.mp4 (120.6 MB)
  • 8. Testing your Infrastructure.mp4 (101.1 MB)
  • 5. NACLs.mp4 (76.4 MB)
  • 11. Secure Development and Deployment.mp4 (72.2 MB)
  • 9. Other security practices.mp4 (69.2 MB)
  • 1. Application Architecture and Infrastructure.mp4 (38.8 MB)
  • 6. Network Firewalls.mp4 (35.1 MB)
  • 4. VPCs.mp4 (34.9 MB)
7. Logging and Monitoring
  • 1. Logging and Monitoring.srt (14.2 KB)
  • 2. Logging and Monitoring Quiz.html (0.2 KB)
  • 1. Logging and Monitoring.mp4 (197.1 MB)
1. Cyber Security Masterclass - Course Intro
  • 2. Course housekeeping.srt (2.1 KB)
  • 1. Course Introduction.srt (3.8 KB)
  • 1. Course Introduction.mp4 (69.5 MB)
  • 2. Course housekeeping.mp4 (31.7 MB)
4. Secure Protocols
  • 2. Secure Protocols.srt (13.7 KB)
  • 6. Application protocols.srt (12.0 KB)
  • 3. Network Models.srt (10.9 KB)
  • 1. Secure Protocols Intro.srt (2.3 KB)
  • 7. Secure protocols quiz.html (0.2 KB)
  • 4. TLS.srt (5.2 KB)
  • 5. IP Models.srt (4.5 KB)
  • 2. Secure Protocols.mp4 (158.9 MB)
  • 3. Network Models.mp4 (106.4 MB)
  • 6. Application protocols.mp4 (79.7 MB)
  • 4. TLS.mp4 (58.8 MB)
  • 5. IP Models.mp4 (47.9 MB)
  • 1. Secure Protocols Intro.mp4 (43.6 MB)
2. Cybersecurity Principles
  • 1. Cybersecurity Principles Intro.srt (1.3 KB)
  • 3. Non-repudiation.srt (2.7 KB)
  • 5. How to measure risk (part II).srt (11.8 KB)
  • 7. Cybersecurity Principles Quiz.html (0.2 KB)
  • 4. How to measure risk.srt (11.0 KB)
  • 2. The CIA of Cybersecurity.srt (10.8 KB)
  • 6. Governance and Procurement.srt (7.8 KB)
  • 5. How to measure risk (part II).mp4 (209.8 MB)
  • 4. How to measure risk.mp4 (176.1 MB)
  • 2. The CIA of Cybersecurity.mp4 (139.2 MB)
  • 6. Governance and Procurement.mp4 (105.8 MB)
  • 3. Non-repudiation.mp4 (45.5 MB)
  • 1. Cybersecurity Principles Intro.mp4 (21.8 MB)
8. System Resilience
  • 1. System Resilience Intro.srt (12.9 KB)
  • 2. Infrastructure hardening.srt (4.2 KB)
  • 3. System Resilience quiz.html (0.2 KB)
  • 1. System Resilience Intro.mp4 (223.9 MB)
  • 2. Infrastructure hardening.mp4 (76.5 MB)
3. IAM - Identity an Access Management
  • 3. Authorization and Permissions.srt (12.1 KB)
  • 4. Permissioned and Permissionless.srt (2.8 KB)
  • 5. ALCs.srt (3.0 KB)
  • 1. IAM and IAA - Identity and Access Management.srt (9.6 KB)
  • 8. User Authentication Methods.srt (9.4 KB)
  • 9. IAM Quiz.html (0.2 KB)
  • 7. Password Security.srt (8.0 KB)
  • 2. MFA - Multi Factor Authentication.srt (6.0 KB)
  • 6. Least Privilege and Segregation of Duties.srt (5.2 KB)
  • 3. Authorization and Permissions.mp4 (172.8 MB)
  • 1. IAM and IAA - Identity and Access Management.mp4 (148.4 MB)
  • 8. User Authentication Methods.mp4 (132.9 MB)
  • 7. Password Security.mp4 (124.2 MB)
  • 2. MFA - Multi Factor Authentication.mp4 (106.9 MB)
  • 6. Least Privilege and Segregation of Duties.mp4 (88.3 MB)
  • 5. ALCs.mp4 (56.9 MB)
  • 4. Permissioned and Permissionless.mp4 (45.1 MB)
5. Cryptography, Hashing and Digital Signatures
  • 4. Hash functions characteristics.srt (11.5 KB)
  • 10. RSA.srt (9.9 KB)
  • 3. Hashing.srt (9.8 KB)
  • 8. Random numbers.srt (9.4 KB)
  • 2. Consensus Mechanisms.srt (9.3 KB)
  • 9. Prime numbers.srt (7.7 KB)
  • 6. Cryptography Basics.srt (7.6 KB)
  • 11. ECDSA.srt (7.1 KB)
  • 7. Cryptography Methods.srt (6.7 KB)
  • 12. Quantum Computing.srt (5.6 KB)
  • 1. Cryptography, Hashing and Digital Signatures Intro.srt (2.5 KB)
  • 5. Digital Signatures.srt (2.3 KB)
  • 13. Cryptography, Hashing and Digital Signatures.html (0.2 KB)
  • 4. Hash functions characteristics.mp4 (127.1 MB)
  • 7. Cryptography Methods.mp4 (119.1 MB)
  • 3. Hashing.mp4 (116.9 MB)

Description


Description

The objective of this course is to turn you into a cyber security specialist in under 8 hours.

Do you want to start a cyber security career?

Do you want to improve your cyber security skills?

Do you want to improve the IT security of your organization?

Do you want to review and pass the Comptia Security+ exam?

THIS IS THE RIGHT CYBER SECURITY COURSE FOR YOU!

Learn what are the Cyber Security principles
How to measure security risks
The best Identity and Access Management to keep your users safe
Improve your password management and keep your passwords secure
Learn what is MFA
Learn how to keep away hackers and social engineering from getting sensitive files, emails, or access to your computer or network
Learn about cyber security awareness
Apply the most secure IT protocols and encryption methods
Keep your data protected with encryption
Learn about network models and IP models
Learn everything about Cryptography, Hashing and Digital Signatures
Learn how RSA and ECDSA works
Keep your infrastructure more secure
Data encryption
Prevent DDoS attacks
Learn about the different types of malware
Social engineering attacks and hot to prevent them
Phishing
Logging and monitoring tools
Improve your system resilience
Application Architecture and Infrastructure
The different types of cloud models: IaaS, PaaS, FaaS and SaaS
What is a VPC
Firewalls
Testing your applications for security
Learn how to securely develop an application
Learn how to respond to incidents

This course has over 6 hours of video plus 55 questions that will help you to better understand Cyber Security. If you are looking to take the Comptia Security+ exam, this will also be a good help.

This complete Cyber Security Course includes the following topics:

Cybersecurity Principles
The CIA triad
The AAA of security
Non-repudiation
Measuring risks
Governance and Procurement
Secure Protocols
Network Models
OSI vs TCP/IP Model
TCP/IP Model
Transport Protocols
IP Models
Application protocols and ports
Cryptography, hashing and digital signatures
Consensus mechanisms
Hashing
Digital signatures
Multi-signatures
Random numbers
Prime numbers
RSA
ECDSA
Quantum Computing
Infrastructure Security
Data Encryption
Denial of Service
Man-in-the-middle attack
Attacking applications
Malware
Virus
Adware
Spyware
Trojan horses
Ransomware
Logic Bombs
Rootkit and backdoors
Polymorphic Malware, Keyloggers and Armored Viruses
Social engineering attacks
Logging and Monitoring
System Resiliency
Redundancy
Backups
Snapshots
High Availability
Disaster Recovery
Infrastructure hardening
Application Architecture and Infrastructure
Cloud models
VPCs
NACLs
Network Firewalls
Testing your application
Testing your infrastructure
Other security practices
Secure DevOps
Secure Development and Deployment
Incident Detection and Response
Contingency Planning

Who this course is for:

Anyone interested in learning more about cybersecurity
Anyone looking to review Comptia Security+ Concepts

Requirements

Basic IT knowledge
Curiosity about Cybersecurity

Last Updated 10/2021



Download torrent
5.9 GB
seeders:42
leechers:20
Cyber Security Masterclass – All about IT Security


Trackers

tracker name
udp://open.stealth.si:80/announce
udp://tracker.tiny-vps.com:6969/announce
udp://fasttracker.foreverpirates.co:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://explodie.org:6969/announce
udp://tracker.cyberia.is:6969/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://tracker.uw0.xyz:6969/announce
udp://opentracker.i2p.rocks:6969/announce
udp://tracker.birkenwald.de:6969/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.moeking.me:6969/announce
udp://tracker.dler.org:6969/announce
udp://9.rarbg.me:2970/announce
µTorrent compatible trackers list

Download torrent
5.9 GB
seeders:42
leechers:20
Cyber Security Masterclass – All about IT Security


Torrent hash: DF454C9F7C7D58FCD7E6A1CBADFB27B7A4D9D074