[Lynda] Practical Cybersecurity-KTR

seeders: 6
leechers: 39
Added on August 27, 2014 by xKTRxin Other > Tutorials
Torrent verified.



[Lynda] Practical Cybersecurity-KTR (Size: 231.31 MB)
 164982_01_03_XR15_attack.mp48.17 MB
 164982_01_01_XR15_cyber.mp48.04 MB
 164982_01_02_XR15_stuxnet.mp45.04 MB
 164982_02_06_XR15_schedule.mp47.81 MB
 164982_02_05_XR15_avsettings.mp45.2 MB
 164982_02_04_XR15_avscanning.mp43.82 MB
 164982_02_02_XR15_defender.mp43.09 MB
 164982_02_01_XR15_av.mp42.24 MB
 164982_02_07_XR15_avwdo.mp41.54 MB
 164982_02_08_XR15_avlinux.mp41.36 MB
 164982_02_03_XR15_realtime.mp41.3 MB
 164982_03_02_XR15_mswf.mp410.19 MB
 164982_03_06_XR15_iptables.mp49.38 MB
 164982_03_04_XR15_advrules.mp49.02 MB
 164982_03_03_XR15_advfw.mp47.58 MB
 164982_03_05_XR15_zedlan.mp46.43 MB
 164982_03_07_XR15_firewall.mp44.34 MB
 164982_03_01_XR15_firewalls.mp4860.81 KB
 164982_04_05_XR15_zenmap.mp46.05 MB
 164982_04_04_XR15_options.mp44.52 MB
 164982_04_02_XR15_scan.mp44.42 MB
 164982_04_03_XR15_service.mp43.91 MB
 164982_04_01_XR15_nmap.mp41.91 MB
 164982_05_04_XR15_honeypot.mp45.75 MB
 164982_05_02_XR15_filexfer.mp45.54 MB
 164982_05_03_XR15_services.mp44.63 MB
 164982_05_01_XR15_netcat.mp42.89 MB
 164982_06_04_XR15_scan.mp48.19 MB
 164982_06_02_XR15_started.mp44.5 MB
 164982_06_03_XR15_configure.mp43.38 MB
 164982_06_05_XR15_schedule.mp42.69 MB
 164982_06_01_XR15_nessus.mp41.37 MB
 164982_07_02_XR15_scan.mp411.36 MB
 164982_07_01_XR15_intro.mp48.98 MB
 164982_07_03_XR15_proxy.mp44.8 MB
 164982_08_03_XR15_packets.mp412.49 MB
 164982_08_05_XR151_intruder.mp47.89 MB
 164982_08_04_XR15_filters.mp47.84 MB
 164982_08_02_XR15_capture.mp45.3 MB
 164982_08_01_XR15_monitor.mp45.01 MB
 164982_09_01_XR15_summary.mp43.75 MB
 164982_00_01_WX30_welcome.mp46.59 MB
 164982_00_02_XR15_wysk.mp41.37 MB
 164982_00_03_XR15_exfiles.mp4807.58 KB

Description

[Lynda] Practical Cybersecurity-KTR


PUBLISHER....: Lynda
LANGUAGE......: ENGLISH
AUTHOR.......: Malcolm Shore
LEVEL.........: BEGINNER
RELEASE DATE..: 2014.08.27
RUNTIME......: 2.6H 0M
SOFTWARE.....: N-Stalker, Nessus, Nmap, Netcat

Protect your network from cyber attacks. Malcolm Shore shows how to use the latest tools to discourage and combat hackers, phishers, and snoops attempting to infiltrate your Windows and Linux systems. Learn what forms cyber attacks can take, and the two most common types of protection you can build into your system: antivirus protection and firewalls. Then learn how to scan your network for suspicious files, detect intruders with Netcat, and identify vulnerabilities at the host level with Nessus scans Malcolm also shows how to avoid common security mistakes and monitor packet-level activity on your network.



Topics include:

* Hackers and the kill chain

* Viruses, spyware, and adware

* Scanning with Windows Defender

* Building firewalls

* Scanning with Nmap

* Monitoring network communications with Netcat

* Combating application-level threats

* Capturing intruders through packet inspection

Sharing Widget


Download torrent
231.31 MB
seeders:6
leechers:39
[Lynda] Practical Cybersecurity-KTR