Information Security Foundations

seeders: 52
leechers: 41
updated:
Added by tutsnode in Other > Tutorials

Download Fast Safe Anonymous
movies, software, shows...
  • Downloads: 112
  • Language: English

Files

Information Security Foundations [TutsNode.net] - Information Security Foundations 1 - Course
  • 7 - Denial of Service Attacks and Man in Middle Attacks.mp4 (403.3 MB)
  • 7 - Denial of Service Attacks and Man in Middle Attacks English.vtt (62.7 KB)
  • 11 - Cryptography basics Stegnography for beginners English.vtt (60.8 KB)
  • 16 - IAAA and Identity Access Management English.vtt (46.1 KB)
  • 6 - Malware and how to stay protected against it English.vtt (43.1 KB)
  • 13 - Understand Datalink Mac address IPv4 addresses and Subnet Mask English.vtt (40.3 KB)
  • 15 - Hardening Systems and Networks English.vtt (40.1 KB)
  • 9 - Security Controls Policies Standards English.vtt (40.1 KB)
  • 8 - Exploitation of System Vulnerability using Kali Linux English.vtt (39.6 KB)
  • 24 - Business Continuity DRP BCP English.vtt (37.7 KB)
  • 20 - Physical Security English.vtt (34.4 KB)
  • 21 - Basics of Virtualization Cloud Contnainers English.vtt (33.9 KB)
  • 4 - Understand Basic security concepts Asset Risk Impact Vulnerabilitiy English.vtt (33.5 KB)
  • 12 - IT Networking Basics for beginners English.vtt (29.7 KB)
  • 17 - Web Application pentesting OWASP ASVS and GHDB English.vtt (29.0 KB)
  • 18 - Cross site scripting XSS InfoSec Basics English.vtt (25.8 KB)
  • 25 - Security Frameworks Regulation Challenges English.vtt (24.7 KB)
  • 19 - SQL Injection Attack Lab InfoSec Basics English.vtt (24.5 KB)
  • 14 - Basics of Infrastructure Servers RAID and Infra Services English.vtt (22.1 KB)
  • 22 - Social Engineering English.vtt (22.1 KB)
  • 5 - Understand System Vulnerabilities and CVE CVSS English.vtt (22.1 KB)
  • 3 - Securing Systems Understand Normal system components English.vtt (15.9 KB)
  • 11 - Cryptography basics Stegnography for beginners.mp4 (319.1 MB)
  • 10 - Risk Management concept and its relation to Security English.vtt (19.4 KB)
  • 23 - Incident Response and Incident Management English.vtt (10.2 KB)
  • 1 - Introduction English.vtt (9.1 KB)
  • 2 - CIA Concept English.vtt (7.4 KB)
  • 8 - Exploitation of System Vulnerability using Kali Linux.mp4 (284.9 MB)
  • 16 - IAAA and Identity Access Management.mp4 (250.9 MB)
  • 17 - Web Application pentesting OWASP ASVS and GHDB.mp4 (236.9 MB)
  • 13 - Understand Datalink Mac address IPv4 addresses and Subnet Mask.mp4 (228.1 MB)
  • 9 - Security Controls Policies Standards.mp4 (212.2 MB)
  • 21 - Basics of Virtualization Cloud Contnainers.mp4 (204.9 MB)
  • 6 - Malware and how to stay protected against it.mp4 (202.0 MB)
  • 15 - Hardening Systems and Networks.mp4 (198.5 MB)
  • 5 - Understand System Vulnerabilities and CVE CVSS.mp4 (196.1 MB)
  • 4 - Understand Basic security concepts Asset Risk Impact Vulnerabilitiy.mp4 (194.1 MB)
  • 18 - Cross site scripting XSS InfoSec Basics.mp4 (190.8 MB)
  • 12 - IT Networking Basics for beginners.mp4 (183.1 MB)
  • 20 - Physical Security.mp4 (174.6 MB)
  • 24 - Business Continuity DRP BCP.mp4 (168.0 MB)
  • 22 - Social Engineering.mp4 (153.5 MB)
  • 14 - Basics of Infrastructure Servers RAID and Infra Services.mp4 (153.5 MB)
  • 25 - Security Frameworks Regulation Challenges.mp4 (134.6 MB)
  • 19 - SQL Injection Attack Lab InfoSec Basics.mp4 (129.6 MB)
  • 3 - Securing Systems Understand Normal system components.mp4 (110.4 MB)
  • 10 - Risk Management concept and its relation to Security.mp4 (109.2 MB)
  • 23 - Incident Response and Incident Management.mp4 (40.8 MB)
  • 2 - CIA Concept.mp4 (40.7 MB)
  • 1 - Introduction.mp4 (20.5 MB)
  • TutsNode.net.txt (0.1 KB)
  • [TGx]Downloaded from torrentgalaxy.to .txt (0.6 KB)
  • .pad
    • 0 (0.5 KB)
    • 1 (853.5 KB)
    • 2 (77.4 KB)
    • 3 (53.9 KB)
    • 4 (153.5 KB)
    • 5 (946.5 KB)
    • 6 (790.6 KB)
    • 7 (73.0 KB)
    • 8 (981.3 KB)
    • 9 (489.7 KB)
    • 10 (949.4 KB)
    • 11 (961.5 KB)
    • 12 (246.4 KB)
    • 13 (936.0 KB)
    • 14 (456.0 KB)
    • 15 (2.4 KB)
    • 16 (487.9 KB)
    • 17 (494.3 KB)
    • 18 (458.7 KB)
    • 19 (379.2 KB)
    • 20 (616.7 KB)
    • 21 (783.1 KB)
    • 22 (182.5 KB)
    • 23 (297.4 KB)

Description


Description

In this training, we provide you with all needed information to master cybersecurity and information security from scratch, this course includes very wealthy information that cover information security dimensions and provide in-depth overview about the key topics that you are expected as Information Security officer to master. during this training the instructor will illustrate in every possible way the different security term and how to relate it from practical point of view, we will do labs and we will understand a lot of interesting information.

we will start in discussing basic information security concepts, going through different attack techniques, and differences between different malware variants, we will discuss risk management, cryptography, physical security as well as business continuity and incident management, social engineering and trends related to information security in the modern era and possible ways to counter it.

Also, this course will be full of labs, the labs give you overview about the different types of attacks that you are expected to encounter in real life and you need to make your envirnoment secured from.

This course is must in case you pursue on the following certifications

– ISACA CISA

– ISACA CISM

– ISC2 CISSP

– ISACA CRISC

– E-COUNCIL CEH

– ISC2 SSCP

– COMPTIA SECURITY+

what are you waiting for, it is money back guaranteed if the content does not meet your expectations?
Who this course is for:

Beginners in Cyber security and Information Security
Whoever interested in the content of the training
Whoever need to learn and explore new opportunities for career growth

Requirements

No thing, all will be discussed from scratch ~ in case you are missing some point, drop me a message and I will upload a video explaining it.

Last Updated 6/2022



Download torrent
4.4 GB
seeders:52
leechers:41
Information Security Foundations


Trackers

tracker name
udp://open.stealth.si:80/announce
udp://tracker.tiny-vps.com:6969/announce
udp://fasttracker.foreverpirates.co:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://explodie.org:6969/announce
udp://tracker.cyberia.is:6969/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://tracker.uw0.xyz:6969/announce
udp://opentracker.i2p.rocks:6969/announce
udp://tracker.birkenwald.de:6969/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.moeking.me:6969/announce
udp://tracker.dler.org:6969/announce
udp://9.rarbg.me:2970/announce
µTorrent compatible trackers list

Download torrent
4.4 GB
seeders:52
leechers:41
Information Security Foundations


Torrent hash: 684935353836597FF66507DFA60E2EDDF3472972