ExtraTorrent.ee - The Largest Bittorent System

ExtraTorrent.ee > Categories > Other torrents > Training torrents

Browse Other torrents

Lynda - Practical Cybersecurity with Malcolm Shore - 2014 torrent


Download torrent: Lynda - Practical Cybersecurity with Malcolm Shore - 2014 torrent
Category: Categories > Other torrents > Training torrents
Trackers:
2    View all torrent trackers >
Seeds: ---
Leechers: ---
Health:
Torrent language: English English
Total Size: 233.49 MB
Number of files:
45     View torrent files >
Uploader: RocknBass
Torrent added: 2015-01-26 07:17:14





Torrent Info URL
http://www.lynda.com/N-Stalker-tutorials/Practical-Cybersecurity/164982-2.html


Torrent Description
Protect your network from cyber attacks. Malcolm Shore shows how to use the latest tools to discourage and combat hackers, phishers, and snoops attempting to infiltrate your Windows and Linux systems. Learn what forms cyber attacks can take, and the two most common types of protection you can build into your system: antivirus protection and firewalls. Then learn how to scan your network for suspicious files, detect intruders with Netcat, and identify vulnerabilities at the host level with Nessus scans. Malcolm also shows how to avoid common security mistakes and monitor packet-level activity on your network.
Topics include:
Hackers and the kill chain
Viruses, spyware, and adware
Scanning with Windows Defender
Building firewalls
Scanning with Nmap
Monitoring network communications with Netcat
Combating application-level threats
Capturing intruders through packet inspection


Introduction 2m 10s
Welcome 1m 2S
What you Should know before watching this course 38s
Using the exercise Files 30s
1. Cybersecurity why? 14m 54s
Hackers and the Kill Chain 5m 46s
The Stuxnet Kill Chain 3m 38s
Common Forms of Cybersecurity Attack 5m 30s
2. Antivirus 14m 8s
Viruses, Spyware, adware and 1m 37s
Using Windows Defender 1m 30s
Setting up Real-time protection 37s
Scanning with Windows Defender 2m 13s
Modifying antivirus settings in Windows Defender 2m 53s
Scheduling A scan with Windows Defender 3m 54s
Using Windows Defender offline 48s
exploring antivirus on Linux 36s
3. Personal Firewalls 24m 8s
Why firewalls? 38s
Using the Microsoft Windows Firewall 5m 15s
Setting up advanced Security Notifications 3m 37s
Setting up Detailed rules 3m 18s
Managing and Analyzing log Files with ZedLan 3m 25s
Introducing iptables in Linux 5m 5s
Building A simple Firewall with iptables 2m 50s
4. Knowing What Is on Your Network 11m 35s
Getting Started with Nmap 1m 7s
Scanning for hosts 2m 31s
Scanning Services for 2m 2S
Exploring advanced Nmap options 2m 36s
Scanning in Windows with Zenmap 3m 19s
5. Network Communications and Detecting Intruders 11m 34s
Getting Started with Netcat 2m 8s
Using Netcat for file transfers 3m 23s
Connecting to Services 2m 35s
Setting up A honeypot with Netcat 3m 28s
6. Hosts for checking Known Vulnerabilities 11m 31s
Introduction to Vulnerability scanning 52s
Getting Started with Nessus 1m 38s
Configuring Nessus 2m 24s
Running A Nessus scan 4m 43s
Scheduling A Nessus scan 1m 54s
7. Checking for Common Mistakes in Web Apps 12m 58s
Combating Application-Level Threats 4m 33s
Web Security scanning 5m 32s
Using the scanner as A Web proxy 2m 53s
8. Monitoring Network Activity 16m 19s
Using Wireshark to explain packet-Level Activity 3m 49s
How to Capture packets from the network to analyze Activity 2m 11s
Making sense of the TCP / IP protocols 4m 37s
Filtering packets to focus on Areas of Interest 2m 32s
Capturing Intruders with packets 3m 10s
Conclusion 1m 21s
Summary 1m 21s

81dcb0518629b3e6c5f1a27749e952e0.jpeg 0b446fb0d42986929f81f600a8dfa145.jpeg c80a94d0e408f387a04e5c0b4e3d567d.jpeg 4952088df69b6c7c4c3ea19121fa2f90.jpeg 46d9ef89fcd8be19fd8c71ffd6b3afec.jpeg





Comments 
1
posted by (2015-01-26 09:07:29)
kING_kONG avatarTVVVM :}


2
posted by (2015-01-26 10:26:15)
santosh_extra avatarthq