IT Security Foundations: Core Concepts

seeders: 12
leechers: 26
updated:
Added by tutsnode in Other > Tutorials

Download Fast Safe Anonymous
movies, software, shows...
  • Downloads: 37
  • Language: English

Files

IT Security Foundations Core Concepts [TutsNode.net] - IT Security Foundations Core Concepts 05 - 4. Investigating Internet Security
  • 01 - Accessing cloud resources.mp4 (15.3 MB)
  • 05 - Ensuring browser privacy.srt (6.3 KB)
  • 03 - Accepting cookies.srt (5.9 KB)
  • 02 - Using a secure connection.srt (5.9 KB)
  • 04 - Blocking malicious content.srt (5.1 KB)
  • 01 - Accessing cloud resources.srt (3.8 KB)
  • 03 - Accepting cookies.mp4 (13.1 MB)
  • 04 - Blocking malicious content.mp4 (12.9 MB)
  • 02 - Using a secure connection.mp4 (12.5 MB)
  • 05 - Ensuring browser privacy.mp4 (11.9 MB)
  • Glossary_IT_Security_Foundations_Core_Concepts.zip (27.8 KB)
  • 06 - 5. Mobile and Wireless Security
    • 04 - Protecting mobile devices.srt (6.7 KB)
    • 01 - Securing your Wi-Fi.srt (6.0 KB)
    • 01 - Securing your Wi-Fi.mp4 (13.7 MB)
    • 02 - Sharing a secret.srt (5.3 KB)
    • 03 - Concealing your access point.srt (4.5 KB)
    • 04 - Protecting mobile devices.mp4 (13.2 MB)
    • 02 - Sharing a secret.mp4 (11.5 MB)
    • 03 - Concealing your access point.mp4 (7.4 MB)
  • Ex_Files_IT_Security_Foundations_Core_Concepts.zip (94.3 KB)
  • 01 - Introduction
    • 01 - Tech savvy, tech safe.srt (1.6 KB)
    • 02 - Discovering resources.srt (1.7 KB)
    • 01 - Tech savvy, tech safe.mp4 (8.2 MB)
    • 02 - Discovering resources.mp4 (4.0 MB)
    03 - 2. Understanding Malware
    • 05 - Holding data hostage.srt (6.5 KB)
    • 04 - Defending the OS.srt (6.3 KB)
    • 05 - Holding data hostage.mp4 (13.5 MB)
    • 04 - Defending the OS.mp4 (13.2 MB)
    • 02 - Explaining viruses and worms.srt (4.4 KB)
    • 03 - Eliminating unwanted surveillance.srt (4.4 KB)
    • 01 - Comparing malicious programs.srt (4.3 KB)
    • 01 - Comparing malicious programs.mp4 (13.0 MB)
    • 02 - Explaining viruses and worms.mp4 (10.4 MB)
    • 03 - Eliminating unwanted surveillance.mp4 (8.9 MB)
    07 - 6. Secure Devices and Applications
    • 02 - Ensuring data integrity.srt (5.8 KB)
    • 04 - Securing email.srt (5.5 KB)
    • 01 - Providing data confidentiality.srt (5.0 KB)
    • 03 - Using cryptographic techniques.srt (4.5 KB)
    • 03 - Using cryptographic techniques.mp4 (11.9 MB)
    • 02 - Ensuring data integrity.mp4 (11.8 MB)
    • 01 - Providing data confidentiality.mp4 (10.6 MB)
    • 04 - Securing email.mp4 (10.2 MB)
    04 - 3. Breaching Your System
    • 03 - Exploiting the unknown.srt (5.6 KB)
    • 02 - Getting in the backdoor.srt (5.2 KB)
    • 05 - Solution Recognizing IoT threats.srt (1.8 KB)
    • 04 - Challenge Recognizing IoT threats.srt (1.2 KB)
    • 01 - Stopping the imposters.srt (4.7 KB)
    • 03 - Exploiting the unknown.mp4 (10.8 MB)
    • 01 - Stopping the imposters.mp4 (8.8 MB)
    • 02 - Getting in the backdoor.mp4 (8.6 MB)
    • 05 - Solution Recognizing IoT threats.mp4 (4.6 MB)
    • 04 - Challenge Recognizing IoT threats.mp4 (3.9 MB)
    08 - Conclusion
    • 01 - Next steps.srt (1.8 KB)
    • 01 - Next steps.mp4 (3.2 MB)
    02 - 1. Core Security Principles
    • 05 - Avoiding scam artists.srt (5.2 KB)
    • 06 - Recognizing the Internet of Things.srt (5.2 KB)
    • 01 - Providing a secure system.srt (5.0 KB)
    • 02 - Keeping information safe.srt (4.1 KB)
    • 03 - Managing risk.srt (3.3 KB)
    • 04 - Analyzing risk.srt (3.1 KB)
    • 06 - Recognizing the Internet of Things.mp4 (11.9 MB)
    • 01 - Providing a secure system.mp4 (11.2 MB)
    • 05 - Avoiding scam artists.mp4 (10.4 MB)
    • 02 - Keeping information safe.mp4 (10.0 MB)
    • 04 - Analyzing risk.mp4 (8.1 MB)
    • 03 - Managing risk.mp4 (5.4 MB)
    • TutsNode.net.txt (0.1 KB)
    • .pad
      • 0 (0.5 KB)
      • 1 (0.4 KB)
      • 2 (0.7 KB)
      • 3 (0.6 KB)
      • 4 (52.2 KB)
      • 5 (185.0 KB)
      • 6 (250.7 KB)
      • 7 (119.8 KB)
      • 8 (205.0 KB)
      • 9 (73.7 KB)
      • 10 (88.7 KB)
      • 11 (141.5 KB)
      • 12 (245.7 KB)
      • 13 (235.2 KB)
      • 14 (8.2 KB)
      • 15 (232.7 KB)
      • 16 (171.3 KB)
      • 17 (103.7 KB)
      • 18 (123.8 KB)
      • 19 (67.3 KB)
      • 20 (205.7 KB)
      • 21 (61.2 KB)
      • 22 (180.7 KB)
      • 23 (111.4 KB)
      • 24 (73.7 KB)
      • 25 (141.7 KB)
      • 26 (99.8 KB)
      • 27 (69.8 KB)
      • 28 (194.3 KB)
      • 29 (49.2 KB)
      • 30 (119.8 KB)
    • [TGx]Downloaded from torrentgalaxy.to .txt (0.6 KB)

Description


Description

Every day, we interact with our digital devices. At the same time, we’re faced with the threat of cyberattacks that can compromise our privacy and security. Learning the basics of how to secure our digital world will help avoid becoming a victim of a cyberattack. This beginner-level course covers basic security concepts. You’ll learn strategies malicious actors use to gain access to your system using social engineering, malware, and spyware. IT Security Foundations series creator Lisa Bock also goes over some basic wireless security best practices, tips for beefing up browser security, and techniques for implementing encryption. Additionally, learn how to manage cookies when using a browser and discover best practices on how to secure your devices and applications.

Released 11/2022



Download torrent
327.9 MB
seeders:12
leechers:26
IT Security Foundations: Core Concepts


Trackers

tracker name
udp://open.stealth.si:80/announce
udp://tracker.tiny-vps.com:6969/announce
udp://fasttracker.foreverpirates.co:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://explodie.org:6969/announce
udp://tracker.cyberia.is:6969/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://tracker.uw0.xyz:6969/announce
udp://opentracker.i2p.rocks:6969/announce
udp://tracker.birkenwald.de:6969/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.moeking.me:6969/announce
udp://tracker.dler.org:6969/announce
udp://9.rarbg.me:2970/announce
µTorrent compatible trackers list

Download torrent
327.9 MB
seeders:12
leechers:26
IT Security Foundations: Core Concepts


Torrent hash: E3C37D1E858CD9088C5056751EAFD4F54E1E8E5A