种子简介
种子名称:
Lynda - Cybersecurity for IT Professionals
文件类型:
视频
文件数目:
44个文件
文件大小:
289.5 MB
收录时间:
2017-10-6 20:03
已经下载:
3次
资源热度:
127
最近下载:
2024-10-31 21:39
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:4d055d6d19a880f89c642ad6995fe5bf6aa11584&dn=Lynda - Cybersecurity for IT Professionals
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
Lynda - Cybersecurity for IT Professionals.torrent
00. Introduction/00_01 - Welcome.mp45.97MB
00. Introduction/00_02 - What you should know before watching this course.mp4848.81KB
00. Introduction/00_03 - Using the exercise files.mp4928.38KB
01. Why Cybersecurity/01_01 - Hackers and the kill chain.mp413.63MB
01. Why Cybersecurity/01_02 - The Stuxnet kill chain.mp48.53MB
01. Why Cybersecurity/01_03 - Common forms of cybersecurity attack.mp413.48MB
02. Antivirus/02_01 - Viruses, spyware, and adware.mp43.82MB
02. Antivirus/02_02 - Using Windows Defender.mp42.99MB
02. Antivirus/02_03 - Setting up real-time protection.mp41004.42KB
02. Antivirus/02_04 - Scanning with Windows Defender.mp44.11MB
02. Antivirus/02_05 - Modifying antivirus settings in Windows Defender.mp45.49MB
02. Antivirus/02_06 - Scheduling a scan with Windows Defender.mp49.24MB
02. Antivirus/02_07 - Using Windows Defender offline.mp41.84MB
02. Antivirus/02_08 - Exploring antivirus on Linux.mp41.65MB
03. Personal Firewalls/03_01 - Why firewalls.mp41.45MB
03. Personal Firewalls/03_02 - Using the Microsoft Windows Firewall.mp412.34MB
03. Personal Firewalls/03_03 - Setting up advanced security notifications.mp49.06MB
03. Personal Firewalls/03_04 - Setting up detailed rules.mp410.36MB
03. Personal Firewalls/03_05 - Managing and analyzing log files with ZedLan.mp48.06MB
03. Personal Firewalls/03_06 - Introducing iptables in Linux.mp410.17MB
03. Personal Firewalls/03_07 - Building a simple firewall with iptables.mp44.56MB
04. Knowing What Is on Your Network/04_01 - Getting started with Nmap.mp41.87MB
04. Knowing What Is on Your Network/04_02 - Scanning for hosts.mp44.95MB
04. Knowing What Is on Your Network/04_03 - Scanning for services.mp44.05MB
04. Knowing What Is on Your Network/04_04 - Exploring advanced Nmap options.mp44.39MB
04. Knowing What Is on Your Network/04_05 - Scanning in Windows with Zenmap.mp48.88MB
05. Network Communications and Detecting Intruders/05_01 - Getting started with Netcat.mp43.05MB
05. Network Communications and Detecting Intruders/05_02 - Using Netcat for file transfers.mp46.04MB
05. Network Communications and Detecting Intruders/05_03 - Connecting to services.mp44.96MB
05. Network Communications and Detecting Intruders/05_04 - Setting up a honeypot with Netcat.mp46.09MB
06. Checking Hosts for Known Vulnerabilities/06_01 - Introduction to vulnerability scanning.mp42.25MB
06. Checking Hosts for Known Vulnerabilities/06_02 - Getting started with Nessus.mp45.63MB
06. Checking Hosts for Known Vulnerabilities/06_03 - Configuring Nessus.mp45.21MB
06. Checking Hosts for Known Vulnerabilities/06_04 - Running a Nessus scan.mp411.77MB
06. Checking Hosts for Known Vulnerabilities/06_05 - Scheduling a Nessus scan.mp44.18MB
07. Checking for Common Mistakes in Web Apps/07_01 - Combating application-level threats.mp49.08MB
07. Checking for Common Mistakes in Web Apps/07_02 - Web security scanning.mp415.91MB
07. Checking for Common Mistakes in Web Apps/07_03 - Using the scanner as a web proxy.mp47.32MB
08. Monitoring Network Activity/08_01 - Using Wireshark to explain packet-level activity.mp48.76MB
08. Monitoring Network Activity/08_02 - How to capture packets from the network to analyze activity.mp46.6MB
08. Monitoring Network Activity/08_03 - Making sense of the TCP IP protocols.mp415.34MB
08. Monitoring Network Activity/08_04 - Filtering packets to focus on areas of interest.mp49.48MB
08. Monitoring Network Activity/08_05 - Capturing intruders with packets.mp49.77MB
08. Monitoring Network Activity/09_01 - Summary.mp44.48MB