Magnetic link has been copied to the cutting board

Name [ TutGee.com ] Linkedin - Practical Cybersecurity for IT Professionals

File Type video

Size 369.99MB

UpdateDate 2024-10-27

hash *****FE5376F1C55FECB6C3E752E49F2FC570CC

Hot 1

Files Get Bonus Downloads Here.url | 176B ~Get Your Files Here !/01 - Introduction/01 - Understanding cybersecurity.mp4 | 4.58MB ~Get Your Files Here !/01 - Introduction/01 - Understanding cybersecurity.srt | 1.33KB ~Get Your Files Here !/01 - Introduction/02 - What you should know.mp4 | 5.31MB ~Get Your Files Here !/01 - Introduction/02 - What you should know.srt | 4.53KB ~Get Your Files Here !/01 - Introduction/03 - Disclaimer.mp4 | 2.08MB ~Get Your Files Here !/01 - Introduction/03 - Disclaimer.srt | 1.71KB ~Get Your Files Here !/02 - 1. Why Cybersecurity/01 - A history of hackers.mp4 | 16.72MB ~Get Your Files Here !/02 - 1. Why Cybersecurity/01 - A history of hackers.srt | 7.73KB ~Get Your Files Here !/02 - 1. Why Cybersecurity/02 - The cyber kill chain.mp4 | 11.47MB ~Get Your Files Here !/02 - 1. Why Cybersecurity/02 - The cyber kill chain.srt | 10.47KB ~Get Your Files Here !/02 - 1. Why Cybersecurity/03 - Stuxnet and the kill chain.mp4 | 9.30MB ~Get Your Files Here !/02 - 1. Why Cybersecurity/03 - Stuxnet and the kill chain.srt | 6.35KB ~Get Your Files Here !/02 - 1. Why Cybersecurity/04 - Common forms of cyberattack.mp4 | 12.46MB ~Get Your Files Here !/02 - 1. Why Cybersecurity/04 - Common forms of cyberattack.srt | 11.14KB ~Get Your Files Here !/02 - 1. Why Cybersecurity/05 - Viruses, spyware, and adware.mp4 | 4.19MB ~Get Your Files Here !/02 - 1. Why Cybersecurity/05 - Viruses, spyware, and adware.srt | 3.05KB ~Get Your Files Here !/02 - 1. Why Cybersecurity/06 - Cybercrime and ransomware.mp4 | 7.40MB ~Get Your Files Here !/02 - 1. Why Cybersecurity/06 - Cybercrime and ransomware.srt | 5.30KB ~Get Your Files Here !/02 - 1. Why Cybersecurity/07 - Emerging trends in cybersecurity.mp4 | 19.45MB ~Get Your Files Here !/02 - 1. Why Cybersecurity/07 - Emerging trends in cybersecurity.srt | 12.55KB ~Get Your Files Here !/03 - 2. Antivirus/01 - Introducing Microsoft Defender Antivirus.mp4 | 11.15MB ~Get Your Files Here !/03 - 2. Antivirus/01 - Introducing Microsoft Defender Antivirus.srt | 6.11KB ~Get Your Files Here !/03 - 2. Antivirus/02 - Detecting malware with Microsoft Defender.mp4 | 9.11MB ~Get Your Files Here !/03 - 2. Antivirus/02 - Detecting malware with Microsoft Defender.srt | 5.44KB ~Get Your Files Here !/03 - 2. Antivirus/03 - Automating scans with Task Scheduler.mp4 | 7.85MB ~Get Your Files Here !/03 - 2. Antivirus/03 - Automating scans with Task Scheduler.srt | 4.69KB ~Get Your Files Here !/03 - 2. Antivirus/04 - Other antivirus solutions.mp4 | 2.98MB ~Get Your Files Here !/03 - 2. Antivirus/04 - Other antivirus solutions.srt | 2.33KB ~Get Your Files Here !/04 - 3. Firewalls/01 - Why firewalls.mp4 | 8.24MB ~Get Your Files Here !/04 - 3. Firewalls/01 - Why firewalls.srt | 3.82KB ~Get Your Files Here !/04 - 3. Firewalls/02 - Windows Firewall basics.mp4 | 13.84MB ~Get Your Files Here !/04 - 3. Firewalls/02 - Windows Firewall basics.srt | 7.10KB ~Get Your Files Here !/04 - 3. Firewalls/03 - Advanced Windows Firewall.mp4 | 25.83MB ~Get Your Files Here !/04 - 3. Firewalls/03 - Advanced Windows Firewall.srt | 12.38KB ~Get Your Files Here !/04 - 3. Firewalls/04 - ZedLan firewall log analyser.mp4 | 12.81MB ~Get Your Files Here !/04 - 3. Firewalls/04 - ZedLan firewall log analyser.srt | 6.28KB ~Get Your Files Here !/04 - 3. Firewalls/05 - Introducing Linux iptables.mp4 | 15.40MB ~Get Your Files Here !/04 - 3. Firewalls/05 - Introducing Linux iptables.srt | 7.96KB ~Get Your Files Here !/04 - 3. Firewalls/06 - Setting up a simple iptables firewall.mp4 | 8.91MB ~Get Your Files Here !/04 - 3. Firewalls/06 - Setting up a simple iptables firewall.srt | 3.82KB ~Get Your Files Here !/05 - 4. Network Scanning/01 - Getting started with Nmap.mp4 | 21.01MB ~Get Your Files Here !/05 - 4. Network Scanning/01 - Getting started with Nmap.srt | 7.98KB ~Get Your Files Here !/05 - 4. Network Scanning/02 - Advanced Nmap options.mp4 | 9.58MB ~Get Your Files Here !/05 - 4. Network Scanning/02 - Advanced Nmap options.srt | 4.26KB ~Get Your Files Here !/06 - 5. Network Connections/01 - Getting started with netcat.mp4 | 6.91MB ~Get Your Files Here !/06 - 5. Network Connections/01 - Getting started with netcat.srt | 4.43KB ~Get Your Files Here !/06 - 5. Network Connections/02 - Transferring files using netcat.mp4 | 8.76MB ~Get Your Files Here !/06 - 5. Network Connections/02 - Transferring files using netcat.srt | 6.25KB ~Get Your Files Here !/06 - 5. Network Connections/03 - Connecting to services.mp4 | 6.33MB ~Get Your Files Here !/06 - 5. Network Connections/03 - Connecting to services.srt | 3.42KB ~Get Your Files Here !/06 - 5. Network Connections/04 - Setting up a netcat honeypot.mp4 | 8.53MB ~Get Your Files Here !/06 - 5. Network Connections/04 - Setting up a netcat honeypot.srt | 6.53KB ~Get Your Files Here !/07 - 6. Vulnerability Scanning/01 - Preparing Nessus.mp4 | 10.04MB ~Get Your Files Here !/07 - 6. Vulnerability Scanning/01 - Preparing Nessus.srt | 6.43KB ~Get Your Files Here !/07 - 6. Vulnerability Scanning/02 - Setting up a Nessus policy.mp4 | 6.94MB ~Get Your Files Here !/07 - 6. Vulnerability Scanning/02 - Setting up a Nessus policy.srt | 3.68KB ~Get Your Files Here !/07 - 6. Vulnerability Scanning/03 - Running a Nessus scan.mp4 | 8.16MB ~Get Your Files Here !/07 - 6. Vulnerability Scanning/03 - Running a Nessus scan.srt | 4.06KB ~Get Your Files Here !/07 - 6. Vulnerability Scanning/04 - Running an exploit.mp4 | 2.47MB ~Get Your Files Here !/07 - 6. Vulnerability Scanning/04 - Running an exploit.srt | 1.47KB ~Get Your Files Here !/08 - 7. Web Applications/01 - Combating application level threats.mp4 | 6.46MB ~Get Your Files Here !/08 - 7. Web Applications/01 - Combating application level threats.srt | 2.17KB ~Get Your Files Here !/08 - 7. Web Applications/02 - Running an SQL injection attack.mp4 | 9.61MB ~Get Your Files Here !/08 - 7. Web Applications/02 - Running an SQL injection attack.srt | 6.13KB ~Get Your Files Here !/08 - 7. Web Applications/03 - Cross-site scripting.mp4 | 7.41MB ~Get Your Files Here !/08 - 7. Web Applications/03 - Cross-site scripting.srt | 3.17KB ~Get Your Files Here !/08 - 7. Web Applications/04 - Scanning with ZAP.mp4 | 6.10MB ~Get Your Files Here !/08 - 7. Web Applications/04 - Scanning with ZAP.srt | 2.85KB ~Get Your Files Here !/08 - 7. Web Applications/05 - Using a proxy to manipulate web traffic.mp4 | 7.51MB ~Get Your Files Here !/08 - 7. Web Applications/05 - Using a proxy to manipulate web traffic.srt | 3.70KB ~Get Your Files Here !/09 - 8. Network Protocols/01 - Explaining data communications.mp4 | 6.88MB ~Get Your Files Here !/09 - 8. Network Protocols/01 - Explaining data communications.srt | 6.05KB ~Get Your Files Here !/09 - 8. Network Protocols/02 - Capturing packets with Wireshark.mp4 | 13.66MB ~Get Your Files Here !/09 - 8. Network Protocols/02 - Capturing packets with Wireshark.srt | 5.04KB ~Get Your Files Here !/09 - 8. Network Protocols/03 - Making sense of the protocols.mp4 | 12.37MB ~Get Your Files Here !/09 - 8. Network Protocols/03 - Making sense of the protocols.srt | 3.55KB ~Get Your Files Here !/10 - Conclusion/01 - What's next.mp4 | 1.99MB ~Get Your Files Here !/10 - Conclusion/01 - What's next.srt | 1.28KB ~Get Your Files Here !/Bonus Resources.txt | 386B ~Get Your Files Here !/Ex_Files_Practical_Cybersecurity_for_IT_Pros/Exercise Files/00_02_configuration.pdf | 40.19KB

Recommend

Magnetic link has been copied to the cutting board