CBTNuggets ITCA-Cybersecurity Fundamentals Online Training - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: CBTNuggets ITCA-Cybersecurity Fundamentals Online Training (/Thread-CBTNuggets-ITCA-Cybersecurity-Fundamentals-Online-Training) |
CBTNuggets ITCA-Cybersecurity Fundamentals Online Training - AD-TEAM - 11-17-2024 36.07 GB | 00:19:32 | mp4 | 1920X1080 | 16:9 Genre:eLearning |Language:English
Files Included :
1 What is ISACA and the ITCA (220.41 MB) 2 IT Security (304.7 MB) 3 Information and Communications Technology (ICT) (193.5 MB) 4 Network Security (157.51 MB) 5 Cybersecurity (184.18 MB) 6 Specialized Systems (186.58 MB) 7 Validation (85.83 MB) 1 Standards Organizations (107.71 MB) 2 General Data Protection Regulation (109.93 MB) 3 PCI DSS and PSD2 (139.25 MB) 4 HIPPA (107.32 MB) 5 Zero Trust (66.38 MB) 6 The Internal and External Perimeters (187.08 MB) 7 The Internet Perimeter (266.34 MB) 8 Validation (144.53 MB) 1 The Demilitarized Zone (DMZ) (169.7 MB) 2 Virtual Local Area Network (VLAN) (182.18 MB) 3 Switch Communication (140.94 MB) 4 Router Communication (104.31 MB) 5 WiFi Security with Wired Equivalency Protocol (WEP) (119.39 MB) 6 WiFi Protected Access (WPA) WPA2, WPA3 (205.66 MB) 7 Securing a WiFi Access Point (315.59 MB) 8 Validation (86.13 MB) 1 Basic Firewall Functions (289.03 MB) 2 Types of Firewalls (216.51 MB) 3 Hardware Firewalls (220.33 MB) 4 Application Firewalls (114.7 MB) 5 Next Generation Firewalls (NGFW) (206.38 MB) 6 Validation (182.4 MB) 1 Endpoint Protection (100.04 MB) 2 Windows Firewall Default Settings (236.49 MB) 3 Allow an Application Through Windows Firewall (203.02 MB) 4 Configure Specific Firewall Settings (349.69 MB) 5 Use GPO to Apply Firewall Rules (215.19 MB) 6 Validation (184.58 MB) 1 Azure Firewall (245.25 MB) 2 Mac Firewall (214.84 MB) 3 Linux Firewall Configuration (383.94 MB) 4 Overview Intrusion DetectionPrevention System (IDPS) (139.86 MB) 5 Where is IDPS (118 MB) 6 IDPS Detection and Actions (71.5 MB) 7 IDPS Benefits and Products (97.39 MB) 8 Validation (142.09 MB) 1 What Are Endpoint Devices (120.11 MB) 2 Authentication Controls (365.85 MB) 3 Authentication Controls Part 2 (137.44 MB) 4 Authorization Controls (408.09 MB) 5 Authorization Controls Part 2 (291.95 MB) 6 Accounting Controls (365.36 MB) 1 Understand Cloud Computing from a Local Perspective (142.96 MB) 2 CAPEX vs OPEX, and Defining the Cloud (244.97 MB) 3 NIST Cloud Characteristics (245.92 MB) 4 Microsoft Cloud Layout (113.66 MB) 5 Explore Cloud Datacenters (301.16 MB) 6 Validation (206.63 MB) 1 Cloud Security Benefits (112.29 MB) 2 Cloud Security Risks and Recommendations (460.84 MB) 3 IaaS PaaS and SaaS (296.38 MB) 4 Public, Private, Hybrid, Community Cloud (196.91 MB) 5 Create an Azure VM (347.26 MB) 6 Validation (82.54 MB) 1 Database Security (284.98 MB) 2 Database Security Part 2 (265.12 MB) 3 Data Classification (133.93 MB) 4 Data Classification Part 2 (117.66 MB) 5 Data Classification Part 3 (158.15 MB) 6 Data at Rest, in Motion, and in Use (117.75 MB) 7 Protecting Data via Timely Updates (308.23 MB) 8 Validation (64.65 MB) 1 Encryption Introduction (216.57 MB) 2 Where is Your Data (162.96 MB) 3 Symmetric Encryption (126.96 MB) 4 The Case for Symmetric Encryption (271.25 MB) 5 Symmetric Algorithms (248.89 MB) 6 Validation (417.98 MB) 1 Cybersecurity Roles (219.93 MB) 2 Resilience (178.11 MB) 3 Continuity and Recovery (165.95 MB) 4 Recovery Time and Point Objectives (148.7 MB) 5 Backup Location (101.09 MB) 6 Backup Media (205.44 MB) 7 Backup Types (219.93 MB) 8 Validation (190.8 MB) 1 Understand Asymmetric Encryption (151.67 MB) 2 Asymmetric Encryption Flow (56.87 MB) 3 Asymmetric Encryption Algorithms (238.78 MB) 4 Hashing Data (445.7 MB) 5 Digital Signatures (95.76 MB) 6 Validation (142.36 MB) 7 Validation Part 2 (81.11 MB) 1 Public Key Infrastructure (PKI) (240.49 MB) 2 TLS Transaction Flow (243.03 MB) 3 Virtual Private Networks (VPN) (211.41 MB) 4 VPN Features and Disadvantages (261.13 MB) 5 Secure Shell (SSH) (96.2 MB) 6 Validation (226.27 MB) 1 What is a Security Operations Center (SOC) (92.23 MB) 2 SOC Models (163.65 MB) 3 SOC Staff (134.99 MB) 4 SOC Areas of Responsibility (381.68 MB) 5 Vulnerability Management (216.06 MB) 6 Validation (9.54 MB) 1 Penetration Testing Overview (98.5 MB) 2 Pen Test Phase Plan and Discover (408.94 MB) 3 Pen Test Phase Attack and Report (126.35 MB) 4 Dangers of Pen Testing (218.96 MB) 5 Endpoint Detection and Response (205.7 MB) 6 Validation (152.14 MB) 1 SIEM and SOAR (296.28 MB) 2 Incident Response, Handling, and Phases (180.85 MB) 3 Incident Response Plan (168.05 MB) 4 Digital Forensics Investigations (64.85 MB) 5 Where is the Evidence (304.7 MB) 6 Preserving Evidence (328.92 MB) 7 Chain of Custody (118.65 MB) 1 PING (247.73 MB) 2 Traceroute (180.2 MB) 3 ARP (206.97 MB) 4 IPCONFIG, ifconfig and ip addr (166 MB) 5 Route and iptables (269.55 MB) 6 Validation (99.52 MB) 1 nmap (159.61 MB) 2 SSH (156.12 MB) 3 hashcat (215.05 MB) 4 Crack Windows Passwords (275.61 MB) 5 Generate Hashes (105.93 MB) 6 Capture Network Traffic with Wireshark (200.15 MB) 7 Validation (77.53 MB) 1 Netstat and SS (224.39 MB) 2 Pathping and MTR (207.09 MB) 3 Pathping and MTR Part 2 (32.12 MB) 4 NSLOOKUP (119.55 MB) 5 Netcat (291.36 MB) 6 Sysinternals Suite (487.79 MB) 7 Windows god mode (52.36 MB) 8 Validation (141.05 MB) 1 CIA Confidentiality (253.09 MB) 2 CIA Integrity (249.61 MB) 3 CIA Availability (241.81 MB) 4 Principle of Least Privilege (296.1 MB) 5 Personal and Private Info (339.82 MB) 6 Validation (156.82 MB) 1 Threat Risk, Sources, Categories (320.12 MB) 2 Internal Risk (Insider Risk) (196.04 MB) 3 Insider Risk Shadow IT (255.56 MB) 4 Emerging Threats (157.62 MB) 5 Threat Modeling (132.54 MB) 6 Vulnerabilities and Exploits (122.99 MB) 7 Validation (108.24 MB) 1 Motivations and Agents (228.42 MB) 2 Reconnaissance and Entry (533.21 MB) 3 Foothold, Escalation, and Discovery (306.61 MB) 4 Lateral Movement, C2, and Exfiltration (247.11 MB) 5 Validation (49.96 MB) 1 Types of Malware (286.02 MB) 2 Even More Types of Malware! (345.62 MB) 3 Live Discovery of Drive-By Malware (98.04 MB) 4 Camera and Microphone Hijacking (210.56 MB) 5 Symptoms of Malware (401.82 MB) 6 More Symptoms of Malware (275.3 MB) 7 Demonstration of Unauthorized Installation (85.25 MB) 8 Validation (108.45 MB) 1 Advanced Persistent Threat (APT) (235.05 MB) 2 Back Door (163.27 MB) 3 Brute Force (318.93 MB) 4 Rainbow Tables and Password Spraying (144.73 MB) 5 Buffer Overflow (90.4 MB) 6 Covert Channels (149.65 MB) 7 Steganography Demonstration (263.41 MB) 1 Cross-Site Scripting (XSS) (219.98 MB) 2 Denial of Service and Man-in-the-Middle (339.97 MB) 3 Social Engineering (303.59 MB) 4 Additional Attacks (385.43 MB) 5 SQL Injection and Validation (233.91 MB) 1 Addressing Risk and Criteria (309.45 MB) 2 Third-Party Risk (449.84 MB) 3 SolarWinds Case Study Introduction (164.91 MB) 4 SolarWinds Cast Study Attack Details (504.38 MB) 5 Validation (88.64 MB)] Screenshot
FileAxa
RapidGator TurboBit |