Introduction To Cybersecurity
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 48000 Hz, 2ch | Size: 1.05 GB
Genre: eLearning Video | Duration: 25 lectures (1 hour, 42 mins) | Language: English
Cybersecurity for Beginners
In order to assess—and ultimately, decrease—an organization's risk, IT security professionals must first evaluate and reduce existing vulnerabilities. If you're working to strengthen network security at your organization, it's essential to have a solid grasp of the processes, methodologies, and tools needed to assess vulnerabilities. In this course, security expert Lisa Bock takes a deep dive into the topic of vulnerability scanning, covering what you need to know to find and address weaknesses that attackers might exploit. Lisa goes over the basics of managing organizational risk, discusses vulnerability analysis methodologies, and shows how to work with vulnerability assessment tools, including Nikto and OpenVAS. Plus, she shares tools and strategies for defending the LAN. Lisa also includes challenge chapters to test your knowledge of each section, along with solutions videos for each challenge.
If you’re new to cloud security, or if you’re an administrator looking to learn about best practices to create and manage data and assets in the cloud, join Dominique West in this course as she teaches the basics of properly securing your Google Cloud environment. Dominique starts with the basics of cloud computing and general security
Active Directory Pentesting With Kali Linux - Read Team
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 48000 Hz, 2ch | Size: 7.66 GB
Genre: eLearning Video | Duration: 105 lectures (17 hour, 23 mins) | Language: English
Attacking and Hacking Active Directory With Kali Linux Full Course - Read Team Hacking Pentesting
System hacking is the way hackers get access to individual computers on a network. Ethical hackers learn system hacking to detect, prevent, and counter these types of attacks. This course explains the main methods of system hacking—password cracking, privilege escalation, spyware installation, and keylogging—and the countermeasures IT security professionals can take to fight these attacks. Security expert Lisa Bock also covers steganography, spyware on a cell phone, and tactics for hiding files and tools.
Protecting Your Network with Open Source Software
Network protection is vital to organizations big and small, but it doesn't have to be an expensive proposition. Learn how to protect your network with open-source tools, and do it completely free. Jungwoo Ryoo shows how to set up firewalls, investigate network traffic with a packet analyzer, detect threats and malicious activity with an intrusion-detection system, and enable network logging and monitoring. Start here for a low-cost route to a more secure network
Ethical Hacking: Introduction to Ethical Hacking (Updated)
What is ethical hacking? When it comes to cybersecurity, hacking comes in many colors: white, grey, black, and shades in between. White hat hackers use their skills for good. They practice ethical hacking: involved testing to see if an organization's network is vulnerable to outside attacks. Ethical hacking is key to strengthening network security, and it's one of the most desired skills for any IT security professional. If you're interested in becoming an ethical hacker, or getting started securing your own network, this introduction is for you. Security expert Lisa Bock explores today's threat landscape, dissecting the top attack vectors and motives for attacks. Lisa identifies a variety of ways to secure an organization, explores policies that help enforce security objectives, and more.
Network address translation is used to allow devices on a private network and access resources on the global Internet. This course introduces you to NAT, examines different types of NAT, and teaches you how to implement and troubleshoot them.
TCP is a core protocol driving business applications, but is often a blind spot in IT organizations. A thorough understanding of TCP can speed up network and application troubleshooting, empowering engineers to quickly resolve problems.
The IP address is a fundamental building block for a functioning modern network. In this course, instructor Anthony Sequeira explains the basics of IP addressing, the components of an IP address, aggregation, and more. Anthony begins by describing what the IP address does and why it is critical in a successful network. He goes into the structure of IPv4 and IPv6 addresses. Anthony shows you how to work with the classful addressing system for IP addresses, then goes over subnet masks and subnet addressing. He covers how variable length subnet masking (VLSM) permits the creation of optimal "right-sized" network segments. Anthony walks you through CIDR and IP address aggregation. He explains special use addresses, then concludes with how IP services such as DHCP, DNS, and NAT can benefit your network.
Servers are the heavy lifters of IT. They power the internet, email, enterprise-level applications, databases, local networks, and more. While most users have a superficial understanding of servers, system administrators and IT pros must know them intimately. You must be prepared to configure, deploy, and maintain a variety of servers—with high availability and scalability. This course covers the fundamentals of servers, including popular server operating systems such as Windows Server and Linux. It's designed for the entry-level IT student who needs a basic understanding of server architecture, user administration, virtualization, storage, security, networking, and disaster recovery. Instructor Ed Liberman, an IT consultant and trainer for over 20 years, also reviews troubleshooting theory and tools, so you can understand common problems that can arise with servers and how to solve them.
Lynda - Wireshark: Malware and Forensics
Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.
The key to effectively protecting your systems is understanding the attacks you have to defend them against. This course introduces the different types of malware (malicious software) that can be used to exploit a target computer. It covers viruses and worms—malware which can propagate itself onto other computers through removable media or networks—as well as Trojans and backdoors. Instructor Malcolm Shore explains where malware hides, and how you can detect it to protect your networks and systems against cyberattack. He reverse-engineers malware so you can see how it operates, and explains how attackers create malware using automated malware construction kits called “botnets.” Along the way, Malcolm introduces malware analysis tools that are useful for the career of any IT professional.
Windows Command Line Complete Course(CMD, Batch Script) 2021
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch | English | Duration: 24 lectures (2h 41m) | Size: 2 GB
Sistema de control de Asistencias en Visual basic.Net (2020)
Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: aac, 44100 Hz | Language: Spanish | VTT | Size: 3.60 GB | Duration: 4h 41m
Learn How to Hack All Types of Wireless Networks. Complete Series From Very Basic to Highly Advance Wireless Hacking.
In this course we are going to look real world hacking scenarios and how to deal with it we will be doing Scenario based MitM attacks using Raspberry PI as our Attacking device. We will start this course by installing Kali Linux on Raspberry PI then we will look how we can create Remote Based Connection on Raspberry PI without using any keyboard mouse or monitor.
Kali Linux for new comer in cyber security field, is the most important course for you if you are going to make your career in cybersecurity. Because, Kali Linux is most advanced and foremost used platform for the Penetration testers, ethical hackers, security analysts, bug bounty hunters, security administrators and so on.
Lynda - Networking Foundations: Networking Basics
When someone begins to study networking, they’re challenged with knowing where to start. This is due to the wide spectrum of technologies falling under the umbrella of networking. This course provides an overview of the foundational topics any networking professional should know, as well as an introduction to emerging technologies. Instructor Kevin Wallace delves into the purpose of networks, as well as how networking technologies benefit us in both our personal and business lives. He covers network addresses, including the structures of Internet Protocol (IP) version 4 and version 6 addresses. Plus, learn about switches, routers, fiber-optic cabling, and other essential pieces and parts that make networks work; the OSI model; common network services; wireless networks; and more.