Introduction To Cybersecurity


 


Introduction To Cybersecurity
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 48000 Hz, 2ch | Size: 1.05 GB
Genre: eLearning Video | Duration: 25 lectures (1 hour, 42 mins) | Language: English

Cybersecurity for Beginners


user Broknote     

Ethical Hacking: Vulnerability Analysis (Updated)


Ethical Hacking: Vulnerability Analysis
https://www.lynda.com/IT-tutorials/Ethical-Hacking-Vulnerability-Analysis/5026555-2.html

In order to assess—and ultimately, decrease—an organization's risk, IT security professionals must first evaluate and reduce existing vulnerabilities. If you're working to strengthen network security at your organization, it's essential to have a solid grasp of the processes, methodologies, and tools needed to assess vulnerabilities. In this course, security expert Lisa Bock takes a deep dive into the topic of vulnerability scanning, covering what you need to know to find and address weaknesses that attackers might exploit. Lisa goes over the basics of managing organizational risk, discusses vulnerability analysis methodologies, and shows how to work with vulnerability assessment tools, including Nikto and OpenVAS. Plus, she shares tools and strategies for defending the LAN. Lisa also includes challenge chapters to test your knowledge of each section, along with solutions videos for each challenge.


user Gamystyle     

Learning Google Cloud Security


Learning Google Cloud Security
https://www.lynda.com/Google-Cloud-tutorials/Learning-Google-Cloud-Security/2875060-2.html

If you’re new to cloud security, or if you’re an administrator looking to learn about best practices to create and manage data and assets in the cloud, join Dominique West in this course as she teaches the basics of properly securing your Google Cloud environment. Dominique starts with the basics of cloud computing and general security


user Gamystyle     


Active Directory Pentesting With Kali Linux - Read Team


 


Active Directory Pentesting With Kali Linux - Read Team
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 48000 Hz, 2ch | Size: 7.66 GB
Genre: eLearning Video | Duration: 105 lectures (17 hour, 23 mins) | Language: English

Attacking and Hacking Active Directory With Kali Linux Full Course - Read Team Hacking Pentesting


user Broknote     

Ethical Hacking: System Hacking (Updated 04.2021)


Ethical Hacking: System Hacking (Updated 04.2021)
https://www.lynda.com/IT-Infrastructure-tutorials/Ethical-Hacking-System-Hacking/476620-2.html

System hacking is the way hackers get access to individual computers on a network. Ethical hackers learn system hacking to detect, prevent, and counter these types of attacks. This course explains the main methods of system hacking—password cracking, privilege escalation, spyware installation, and keylogging—and the countermeasures IT security professionals can take to fight these attacks. Security expert Lisa Bock also covers steganography, spyware on a cell phone, and tactics for hiding files and tools.


user Gamystyle     

Protecting Your Network with Open Source Software


Protecting Your Network with Open Source Software


https://www.lynda.com/Nessus-tutorials/Protecting-Your-Network-Open-Source-Software-2021-Revision/2871211-2.html
Network protection is vital to organizations big and small, but it doesn't have to be an expensive proposition. Learn how to protect your network with open-source tools, and do it completely free. Jungwoo Ryoo shows how to set up firewalls, investigate network traffic with a packet analyzer, detect threats and malicious activity with an intrusion-detection system, and enable network logging and monitoring. Start here for a low-cost route to a more secure network


user Gamystyle     

Ethical Hacking: Introduction to Ethical Hacking (Updated)


Ethical Hacking: Introduction to Ethical Hacking (Updated)


https://www.linkedin.com/learning/ethical-hacking-introduction-to-ethical-hacking/
What is ethical hacking? When it comes to cybersecurity, hacking comes in many colors: white, grey, black, and shades in between. White hat hackers use their skills for good. They practice ethical hacking: involved testing to see if an organization's network is vulnerable to outside attacks. Ethical hacking is key to strengthening network security, and it's one of the most desired skills for any IT security professional. If you're interested in becoming an ethical hacker, or getting started securing your own network, this introduction is for you. Security expert Lisa Bock explores today's threat landscape, dissecting the top attack vectors and motives for attacks. Lisa identifies a variety of ways to secure an organization, explores policies that help enforce security objectives, and more.


user Gamystyle     

Network Address Translation Operation and Configuration


Network Address Translation Operation and Configuration

https://www.pluralsight.com/courses/network-address-translation-operation-configuration

Network address translation is used to allow devices on a private network and access resources on the global Internet. This course introduces you to NAT, examines different types of NAT, and teaches you how to implement and troubleshoot them.


user Gamystyle     

Foundational TCP Analysis with Wireshark


Foundational TCP Analysis with Wireshark

https://www.pluralsight.com/courses/foundational-tcp-analysis-wireshark

TCP is a core protocol driving business applications, but is often a blind spot in IT organizations. A thorough understanding of TCP can speed up network and application troubleshooting, empowering engineers to quickly resolve problems.


user Gamystyle     

Networking Foundations: IP Addressing


Networking Foundations: IP Addressing
https://www.linkedin.com/learning/networking-foundations-ip-addressing-2020

The IP address is a fundamental building block for a functioning modern network. In this course, instructor Anthony Sequeira explains the basics of IP addressing, the components of an IP address, aggregation, and more. Anthony begins by describing what the IP address does and why it is critical in a successful network. He goes into the structure of IPv4 and IPv6 addresses. Anthony shows you how to work with the classful addressing system for IP addresses, then goes over subnet masks and subnet addressing. He covers how variable length subnet masking (VLSM) permits the creation of optimal "right-sized" network segments. Anthony walks you through CIDR and IP address aggregation. He explains special use addresses, then concludes with how IP services such as DHCP, DNS, and NAT can benefit your network.


user Gamystyle     

Networking Foundations: Servers


Networking Foundations: Servers

https://www.lynda.com/Windows-Server-tutorials/Networking-Foundations-Servers-REVISION-2020/2876331-2.html

Servers are the heavy lifters of IT. They power the internet, email, enterprise-level applications, databases, local networks, and more. While most users have a superficial understanding of servers, system administrators and IT pros must know them intimately. You must be prepared to configure, deploy, and maintain a variety of servers—with high availability and scalability. This course covers the fundamentals of servers, including popular server operating systems such as Windows Server and Linux. It's designed for the entry-level IT student who needs a basic understanding of server architecture, user administration, virtualization, storage, security, networking, and disaster recovery. Instructor Ed Liberman, an IT consultant and trainer for over 20 years, also reviews troubleshooting theory and tools, so you can understand common problems that can arise with servers and how to solve them.


user Gamystyle     

Lynda - Wireshark: Malware and Forensics


Lynda - Wireshark: Malware and Forensics


https://www.lynda.com/Wireshark-tutorials/Wireshark-Malware-Forensics/624305-2.html
Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic.


user Gamystyle     


Lynda - Ethical Hacking: The Complete Malware Analysis Process


Lynda - Ethical Hacking: The Complete Malware Analysis Process
https://www.lynda.com/IT-tutorials/Ethical-Hacking-2019-Complete-Malware-Analysis-Process/5043083-2.html

The key to effectively protecting your systems is understanding the attacks you have to defend them against. This course introduces the different types of malware (malicious software) that can be used to exploit a target computer. It covers viruses and worms—malware which can propagate itself onto other computers through removable media or networks—as well as Trojans and backdoors. Instructor Malcolm Shore explains where malware hides, and how you can detect it to protect your networks and systems against cyberattack. He reverse-engineers malware so you can see how it operates, and explains how attackers create malware using automated malware construction kits called “botnets.” Along the way, Malcolm introduces malware analysis tools that are useful for the career of any IT professional.



user Gamystyle     

Scrum Master Certification Training & PSM1 Sample Exams

Scrum Master Certification Training & PSM1 Sample Exams
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + .srt | Duration: 57 lectures (4h 12m) | Size: 3.33 GB

user nomaher     

 

Scrum Product Owner Certification Training & Two PSPO1 Exams
Scrum Product Owner Certification Training & Two PSPO1 Exams
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + .srt | Duration: 71 lectures (5h 25m) | Size: 3.14 GB

 

 


user nomaher     

Temel Network(Ağ) Eğitimi-1
Temel Network(Ağ) Eğitimi-1
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Language: Turkish | Duration: 1hr 36min | Size: 539 MB

user nomaher     

IT Networking Fundamentals with Lab Practicals

IT Networking Fundamentals with Lab Practicals
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Language: English + .srt | Duration: 6 lectures (6h 35m) | Size: 2.8 GB

user nomaher     

Windows Command Line Complete Course(CMD, Batch Script) 2021

Windows Command Line Complete Course(CMD, Batch Script) 2021

MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch |  English | Duration: 24 lectures (2h 41m) | Size: 2 GB


user nomaher     

Sistema de control de Asistencias en Visual basic.Net (2020)

Sistema de control de Asistencias en Visual basic.Net (2020)

 Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: aac, 44100 Hz | Language: Spanish | VTT | Size: 3.60 GB | Duration: 4h 41m


user nomaher     

 Learn the right way to hack wifi - Beginner to Advanced(2020)


Learn the right way to hack wifi - Beginner to Advanced(2020)
https://www.udemy.com/course/wifihacking2018/
Learn the easy way to hack WiFi from the latest WiFi hacking course.


 


user Gamystyle     

WiFi Hacking: Wireless Penetration and Security MasterClass

WiFi Hacking: Wireless Penetration and Security MasterClass
https://www.udemy.com/course/wireless-security-masterclass/
Learn How to Hack All Types of Wireless Networks. Complete Series From Very Basic to Highly Advance Wireless Hacking.




user Gamystyle     

Ethical Hacking: Advance MITM Attacks Using Raspberry PI

Ethical Hacking: Advance MITM Attacks Using Raspberry PI
https://www.udemy.com/course/ethical-hacking-advance-mitm-attacks-using-raspberry-pi/
In this course we are going to look real world hacking scenarios and how to deal with it we will be doing Scenario based MitM attacks using Raspberry PI as our Attacking device. We will start this course by installing Kali Linux on Raspberry PI then we will look how we can create Remote Based Connection on Raspberry PI without using any keyboard mouse or monitor.

user Gamystyle     


Kali Linux hacker tools, tricks and techniques for beginners

Kali Linux hacker tools, tricks and techniques for beginners
https://www.udemy.com/course/kali-linux-hacker-tools-tricks-and-techniques/
Kali Linux for new comer in cyber security field, is the most important course for you if you are going to make your career in cybersecurity. Because, Kali Linux is most advanced and foremost used platform for the Penetration testers, ethical hackers, security analysts, bug bounty hunters, security administrators and so on.


user Gamystyle     

Lynda - Networking Foundations: Networking Basics (Rev 2020)


Lynda - Networking Foundations: Networking Basics


https://www.lynda.com/IT-tutorials/Networking-Foundations-Networking-Basics-Revision/2822680-2.html
When someone begins to study networking, they’re challenged with knowing where to start. This is due to the wide spectrum of technologies falling under the umbrella of networking. This course provides an overview of the foundational topics any networking professional should know, as well as an introduction to emerging technologies. Instructor Kevin Wallace delves into the purpose of networks, as well as how networking technologies benefit us in both our personal and business lives. He covers network addresses, including the structures of Internet Protocol (IP) version 4 and version 6 addresses. Plus, learn about switches, routers, fiber-optic cabling, and other essential pieces and parts that make networks work; the OSI model; common network services; wireless networks; and more.


user Gamystyle     


Udemy - Turkce Gorsel Ogrenme Setleri - Part 2
Udemy - Turkce Gorsel Ogrenme Setleri
Videohive Wow Pack Series


rss