Linux Professional Institute Security Essentials 020-100 Online Training - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Linux Professional Institute Security Essentials 020-100 Online Training (/Thread-Linux-Professional-Institute-Security-Essentials-020-100-Online-Training) |
Linux Professional Institute Security Essentials 020-100 Online Training - AD-TEAM - 01-31-2025 33.15 GB | 00:17:11 | mp4 | 1920X1080 | 16:9 Genre:eLearning |Language:English
Files Included :
1 Course Introduction (147.54 MB) 2 IT Goal Making Resources Available (198.01 MB) 3 IT Goal Making Resources Secure (338.28 MB) 4 Four Pillars of Security (242.9 MB) 5 Common Hacker Goals (187.53 MB) 6 Types of Hackers (188.08 MB) 7 Validation (96.39 MB) 1 Firmware and its Risks (335.94 MB) 2 Mobile Software (229.18 MB) 3 Jailbreaking, Rooting, and the Risks (295.79 MB) 4 Securing Applications and Operating Systems (251.48 MB) 5 Protection via Isolation (313.15 MB) 6 Validation (263.84 MB) 1 Update Mobile Devices (175.87 MB) 2 Update Linux Devices (263.5 MB) 3 Update Windows (191.48 MB) 4 Buffer Overflow (136.51 MB) 5 SQL Injection (149.03 MB) 6 Implement Firewall Protection (506.94 MB) 7 Validation (171.37 MB) 1 Common Types of Malware Part 1 (271.5 MB) 2 Common Types of Malware Part 2 (264.08 MB) 3 Camera, Microphone Hijacking (121.65 MB) 4 Symptoms of Malware (235.62 MB) 5 Understanding Virus and Malware Scanners (224.82 MB) 6 Understanding Virus and Malware Scanners Part 2 (248.11 MB) 7 Validation (162.06 MB) 1 Understand the Importance of Backups (242.18 MB) 10 Understanding of data storage, access, and sharing in cloud services (223.74 MB) 11 Validation (147.34 MB) 2 Recovery Point Objective and Recovery Time Objective (152.9 MB) 3 Backup Location Strategy (156.65 MB) 4 Backup Type Full (88.25 MB) 5 Backup Type Differential (147.82 MB) 6 Backup Type Incremental (125.29 MB) 7 Backup Media and Drives (217.67 MB) 8 Backup Security (130.52 MB) 9 Backup Solutions (288.5 MB) 1 Network Equipment (310.7 MB) 2 IP Basics (192.52 MB) 3 Binary Subnet Masks (212.41 MB) 4 Classful Subnet Masks and Private IP Addresses (98.45 MB) 5 Routing Network Traffic (107.9 MB) 6 Switch Traffic (147.12 MB) 7 Validation (17.76 MB) 1 TCP and UDP Vulnerabilities (204.56 MB) 2 TCP and UDP Vulnerabilities Part 2 (171.56 MB) 3 TCP and UDP Vulnerabilities Part 3 (209.87 MB) 4 TCP and UDP Ports (154.52 MB) 5 Other Common Protocol Vulnerabilities (330.42 MB) 6 Validation (114.46 MB) 1 Introduction (17.43 MB) 10 Validation (67.14 MB) 2 Understanding DHCP (311.7 MB) 3 Understanding DNS (209.62 MB) 4 Forward and Reverse DNS (200.13 MB) 5 IPv6 Addresses (166.55 MB) 6 Understanding the Cloud (264.89 MB) 7 A Quick Tour of Azure (250.2 MB) 8 The Cloud - It's Not Just in the Sky! (190.95 MB) 9 IaaS, PaaS, and SaaS (239.51 MB) 1 Wired Equivalency Protocol (WEP) (221.9 MB) 2 WiFi Protected Access (WPA) + WPA2 and WPA3 (226.66 MB) 3 WiFi Passwords (87.51 MB) 4 Configure WiFi Security (486.09 MB) 5 Understand Implications of Link-Layer Access (84.88 MB) 6 Validation (74.41 MB) 1 Virtual Private Network (VPN) Overview (111.03 MB) 2 VPN Common Uses (287.25 MB) 3 Common VPN Features (218.34 MB) 4 VPN Disadvantages (133.21 MB) 5 Proxy Servers (162.62 MB) 6 The Onion Router (TOR) (347.56 MB) 7 Validation (54.57 MB) 1 Authentication (430.6 MB) 2 Using a Security Key (196.6 MB) 3 Windows Hello Facial and Fingerprint Recognition (103.25 MB) 4 Security Questions and Account Recovery Tools (242.85 MB) 5 Authorization and Accounting (278.3 MB) 6 Validation (30.8 MB) 1 Zero-Day and Bug Bounty (243.63 MB) 2 Privilege Escalation (315.57 MB) 3 Privilege Escalation Demo (292.67 MB) 4 Penetration Testing (144.69 MB) 5 ISMS, IRPs, and CERT (291.45 MB) 6 Untargeted Attacks and Advanced Persistent Threats (APT) (367.53 MB) 7 Bonus Drive-By Malware in Action (107.34 MB) 8 Validation (89.57 MB) 1 Password Practices to Avoid (267.28 MB) 2 Password Best Practices (247.27 MB) 3 How Passwords are Stored (317.59 MB) 4 Common Attacks Against Passwords (241.08 MB) 5 Password Leaks (48.89 MB) 6 Using a Password Manager (223.72 MB) 7 Validation (42.93 MB) 1 The Email & Marketing Landscape (226.12 MB) 2 Spam and its Impact (193.94 MB) 3 Spam Filters (272.9 MB) 4 Handling Attachments and Links (182.56 MB) 5 Handling Attachments and Links Part 2 (76.66 MB) 6 Handling Attachments and Links (117.13 MB) 7 Social Media Messaging (116.07 MB) 8 E2EE Messaging Apps (149.86 MB) 9 Validation (46.29 MB) 1 Introduction to Social Engineering (192.99 MB) 2 Social Engineering Psychology (378.41 MB) 3 Social Engineering Attacks (416.32 MB) 4 Social Engineering Improvements, and Protection (219.04 MB) 5 Data Classification and NDAs (125.3 MB) 6 Validation (77.54 MB) 1 Where is Personal Data Exposed (169.34 MB) 2 Cyberbullying (123.68 MB) 3 Cyberstalking (108.83 MB) 4 Cybermobbing, Doxxing, and Fraudulent Accounts (163.46 MB) 5 Cookie Handling (269.38 MB) 6 Browser Privacy Settings (219.78 MB) 7 Browser Security Settings (150.72 MB) 8 Validation (63.06 MB) 1 Intro IT Access and Responsibility (255.92 MB) 2 Case Study Edward Snowden (201.7 MB) 3 Personal and Private Data (299.06 MB) 4 Web Data Visibility (215.26 MB) 5 Regulatory Compliance (234.5 MB) 6 Example of Data Breach Disclosure (113.55 MB) 7 Your Data on Social Media (137.97 MB) 1 Describe Encryption and its Use (230.86 MB) 2 Encrypt Data at Rest (541.51 MB) 3 Encrypt Data in Transit (385.62 MB) 4 Data in Use (398.61 MB) 5 Validation (131.83 MB) 1 The Symmetric Encryption Concept (171.76 MB) 2 The Case for Symmetric Encryption (279.97 MB) 3 Symmetric Encryption Details (300.02 MB) 4 Symmetric Encryption Algorithms (150.93 MB) 5 Asymmetric Encryption (149.32 MB) 6 Perfect Forward Secrecy (72.24 MB) 7 RSA and ECC Encryption Algorithms (119 MB) 8 Validation (137.65 MB) 1 Understanding PKI Operation (334.8 MB) 2 Identifying and Extracting a Web Cert (191.78 MB) 3 Handling Untrusted Certificates (233.5 MB) 4 Certificate Signing Requests (453.95 MB) 5 Validation (144.26 MB) 1 X 509 Concepts and Fields (69.89 MB) 2 X 509 Concepts and Fields (241.07 MB) 3 X 509 Concepts and Fields (287.09 MB) 4 Hash Data (452.62 MB) 5 Compare Hashing and Encryption (53.1 MB) 6 Validation (175.11 MB) 1 PGP and GPG Overview (166.16 MB) 2 Configure Thunderbird for OpenPGP (522.12 MB) 3 Encrypt and Sign Email with PGP (282.09 MB) 4 Encrypt and Sign Email with SMIME (301.2 MB) 5 Encryption and Gmail (110.78 MB) 6 Validation (60.72 MB) 1 Motherboard Overview (310.87 MB) 2 Motherboard Diagram (97.23 MB) 3 Motherboard Form Factors and BIOS (249.11 MB) 4 Processors (403.5 MB) 5 Memory (RAM) (243.19 MB) 6 Hard Disk Drive Physical Characteristics (121.16 MB) 7 Solid State Drive Characteristics (212.59 MB) 8 Peripherals and Other Miscellaneous Devices (203.43 MB) 9 Validation (91.08 MB)] Screenshot |