CBTNuggets - ISACA ICTA Computing Fundamentals Online Training - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: CBTNuggets - ISACA ICTA Computing Fundamentals Online Training (/Thread-CBTNuggets-ISACA-ICTA-Computing-Fundamentals-Online-Training) |
CBTNuggets - ISACA ICTA Computing Fundamentals Online Training - AD-TEAM - 09-08-2024 15.56 GB | 00:16:36 | mp4 | 1920X1080 | 16:9 Genre:eLearning |Language:English
Files Included :
1 Binary Data (153.89 MB) 2 Understand Binary Values (349.39 MB) 3 Understand Binary Values Part 2 (45.59 MB) 4 Units of Measure (239.28 MB) 5 Hex Numbers (191.18 MB) 6 Base64 Numbering (153.14 MB) 7 ASCII (83.42 MB) 1 Machine Addressing (133.64 MB) 2 Machine Addressing Part 2 (30.26 MB) 3 Understanding IP Addresses (125.11 MB) 4 Review Binary to Decimal Conversion (112.32 MB) 5 Perform ANDing (152.54 MB) 6 Implement the Default Gateway (88.38 MB) 7 Private IP Addresses (196.67 MB) 8 Subnet Classes (185.26 MB) 9 Validation (68.79 MB) 1 Why Virtualize Servers (169.35 MB) 2 Why Virtualize Desktops (155.45 MB) 3 Virtualization Products (70.18 MB) 4 Cloud Computing (63.84 MB) 5 Cloud Computing Part 2 (90.37 MB) 6 Virtualization Demo and Validation (166.22 MB) 1 Confidentiality (288.23 MB) 2 Integrity (354.68 MB) 3 Availability (126.28 MB) 4 The Threat Landscape (192.19 MB) 5 Validation (72.96 MB) 1 Zero-Day and Bug Bounty (202.07 MB) 2 Backdoor (108.85 MB) 3 Brute Force (202.07 MB) 4 Buffer Overflow (95.23 MB) 5 Denial of Service (86.35 MB) 6 Side-Channel, MitM, and Spoofing (164.88 MB) 7 Social Engineering (144.9 MB) 8 Bonus Attacks (147.49 MB) 9 Validation (127.83 MB) 1 Emergency Power (162.62 MB) 2 Specialty Cable (41.93 MB) 3 Fire Suppression (96.07 MB) 4 Facility Safeguards (86.04 MB) 5 Identity and Access Management (143.3 MB) 6 Validation (37.38 MB) 1 Log Overview (54.26 MB) 2 Explore Event Logs (68.14 MB) 3 Antimalware Overview (81.73 MB) 4 Microsoft Defender Demo (114.01 MB) 5 Configure Microsoft Firewall (127.67 MB) 6 Using Whole Disk Encryption (73.38 MB) 7 Validation (65.62 MB) 1 Keyboards (347.55 MB) 2 Keyboard Sizes (267.29 MB) 3 Pointing Devices (329.09 MB) 4 Additional Input Devices (303.68 MB) 5 Validation (156.4 MB) 1 Four Types of Data Storage (54.9 MB) 2 Internal Processor and Cache (229.84 MB) 3 Random Access Memory (RAM) (219.8 MB) 4 Secondary Memory (154.24 MB) 5 Tertiary Storage (391.55 MB) 6 Validation (88.3 MB) 1 Data Processing Essentials (122.04 MB) 2 Data Processing (127.92 MB) 3 CPU Flow of Data (118.48 MB) 4 Clock Cycle (150.11 MB) 5 Obtaining CPU Info (119.93 MB) 6 Data Output Monitors (234.58 MB) 7 Data Output Printers (209.35 MB) 8 Validation (66.34 MB) 1 Electronic Components (172.32 MB) 2 The Integrated Circuit (177.05 MB) 3 Memory (232.73 MB) 4 Storage Connections (277.88 MB) 5 Motherboard Overview (168.33 MB) 6 A Tour of a High-End Motherboard (268.74 MB) 7 Power Supply (192.97 MB) 1 BIOS and UEFI (451.21 MB) 2 The Operating System (221.35 MB) 3 Types of Operating Systems (281.21 MB) 4 Clustered Operating Systems (164.42 MB) 5 Validation (93.29 MB) 1 Mobile Operating Systems (153.39 MB) 2 Linux History (149.28 MB) 3 A Comparison of Windows and Linux (216.45 MB) 4 A Quick Look at Linux (287.2 MB) 5 A Quick Look at MacOS (248.7 MB) 6 Validation (73.74 MB) 1 Software Overview (136.08 MB) 2 Open and Closed Source Software (141.28 MB) 3 Additional Software Licenses (84.3 MB) 4 What is a File System (114.7 MB) 5 FAT File Systems (119.46 MB) 6 Other File Systems (74.41 MB) 7 File Types (222.23 MB) 8 Validation (180.7 MB) 1 Introduction to the OSI Model (79.61 MB) 2 The Seven Layers of the OSI Model (223.77 MB) 3 The Seven Layers of the OSI Model Part 2 (24.92 MB) 4 Network Topologies Bus (146.55 MB) 5 Network Topologies Ring (46.07 MB) 6 Network Topology Star (123.91 MB) 7 Network Topology Others (138.84 MB) 8 Challenge (66.63 MB)
Screenshot
|