|  

IT Security Foundations: Core Concepts



Size :327.9 MB
Peers : Seeders : 0      Leechers : 0
Added : 1 year ago » by tutsnode » in Other
Language : English
Last Updated :6 months ago
Info_Hash :E3C37D1E858CD9088C5056751EAFD4F54E1E8E5A

Torrent File Contents

IT Security Foundations: Core Concepts
  [TutsNode.net] - 05 - 4. Investigating Internet Security/01 - Accessing cloud resources.mp4
  -  15.32 MB

  TutsNode.net.txt
  -  63 Bytes

  [TutsNode.net] - Glossary_IT_Security_Foundations_Core_Concepts.zip
  -  27.84 KB

  [TutsNode.net] - 06 - 5. Mobile and Wireless Security/04 - Protecting mobile devices.srt
  -  6.75 KB

  [TutsNode.net] - Ex_Files_IT_Security_Foundations_Core_Concepts.zip
  -  94.35 KB

  [TutsNode.net] - 01 - Introduction/01 - Tech savvy, tech safe.srt
  -  1.65 KB

  [TutsNode.net] - 03 - 2. Understanding Malware/05 - Holding data hostage.srt
  -  6.55 KB

  [TutsNode.net] - 01 - Introduction/02 - Discovering resources.srt
  -  1.7 KB

  [TutsNode.net] - 05 - 4. Investigating Internet Security/05 - Ensuring browser privacy.srt
  -  6.33 KB

  [TutsNode.net] - 03 - 2. Understanding Malware/04 - Defending the OS.srt
  -  6.27 KB

  [TutsNode.net] - 06 - 5. Mobile and Wireless Security/01 - Securing your Wi-Fi.srt
  -  5.96 KB

  [TutsNode.net] - 05 - 4. Investigating Internet Security/03 - Accepting cookies.srt
  -  5.94 KB

  [TutsNode.net] - 05 - 4. Investigating Internet Security/02 - Using a secure connection.srt
  -  5.93 KB

  [TutsNode.net] - 07 - 6. Secure Devices and Applications/02 - Ensuring data integrity.srt
  -  5.76 KB

  [TutsNode.net] - 04 - 3. Breaching Your System/03 - Exploiting the unknown.srt
  -  5.61 KB

  [TutsNode.net] - 08 - Conclusion/01 - Next steps.srt
  -  1.85 KB

  .pad/0
  -  469 Bytes

  [TutsNode.net] - 06 - 5. Mobile and Wireless Security/01 - Securing your Wi-Fi.mp4
  -  13.72 MB

  [TutsNode.net] - 07 - 6. Secure Devices and Applications/04 - Securing email.srt
  -  5.47 KB

  [TutsNode.net] - 06 - 5. Mobile and Wireless Security/02 - Sharing a secret.srt
  -  5.34 KB

  [TutsNode.net] - 02 - 1. Core Security Principles/05 - Avoiding scam artists.srt
  -  5.22 KB

  [TutsNode.net] - 04 - 3. Breaching Your System/02 - Getting in the backdoor.srt
  -  5.2 KB

  [TutsNode.net] - 02 - 1. Core Security Principles/06 - Recognizing the Internet of Things.srt
  -  5.18 KB

  [TutsNode.net] - 04 - 3. Breaching Your System/05 - Solution Recognizing IoT threats.srt
  -  1.84 KB

  [TGx]Downloaded from torrentgalaxy.buzz .txt
  -  585 Bytes

  .pad/1
  -  359 Bytes

  [TutsNode.net] - 03 - 2. Understanding Malware/05 - Holding data hostage.mp4
  -  13.5 MB

  [TutsNode.net] - 04 - 3. Breaching Your System/04 - Challenge Recognizing IoT threats.srt
  -  1.15 KB

  .pad/2
  -  698 Bytes

  [TutsNode.net] - 03 - 2. Understanding Malware/04 - Defending the OS.mp4
  -  13.2 MB

  [TutsNode.net] - 05 - 4. Investigating Internet Security/04 - Blocking malicious content.srt
  -  5.08 KB

  [TutsNode.net] - 02 - 1. Core Security Principles/01 - Providing a secure system.srt
  -  5.04 KB

  [TutsNode.net] - 07 - 6. Secure Devices and Applications/01 - Providing data confidentiality.srt
  -  5.02 KB

  [TutsNode.net] - 04 - 3. Breaching Your System/01 - Stopping the imposters.srt
  -  4.69 KB

  [TutsNode.net] - 06 - 5. Mobile and Wireless Security/03 - Concealing your access point.srt
  -  4.49 KB

  [TutsNode.net] - 07 - 6. Secure Devices and Applications/03 - Using cryptographic techniques.srt
  -  4.46 KB

  [TutsNode.net] - 03 - 2. Understanding Malware/02 - Explaining viruses and worms.srt
  -  4.45 KB

  [TutsNode.net] - 03 - 2. Understanding Malware/03 - Eliminating unwanted surveillance.srt
  -  4.39 KB

  [TutsNode.net] - 03 - 2. Understanding Malware/01 - Comparing malicious programs.srt
  -  4.31 KB

  [TutsNode.net] - 02 - 1. Core Security Principles/02 - Keeping information safe.srt
  -  4.08 KB

  [TutsNode.net] - 05 - 4. Investigating Internet Security/01 - Accessing cloud resources.srt
  -  3.81 KB

  [TutsNode.net] - 02 - 1. Core Security Principles/03 - Managing risk.srt
  -  3.31 KB

  .pad/3
  -  583 Bytes

  [TutsNode.net] - 06 - 5. Mobile and Wireless Security/04 - Protecting mobile devices.mp4
  -  13.2 MB

  [TutsNode.net] - 02 - 1. Core Security Principles/04 - Analyzing risk.srt
  -  3.11 KB

  .pad/4
  -  52.23 KB

  [TutsNode.net] - 05 - 4. Investigating Internet Security/03 - Accepting cookies.mp4
  -  13.07 MB

  .pad/5
  -  185 KB

  [TutsNode.net] - 03 - 2. Understanding Malware/01 - Comparing malicious programs.mp4
  -  13.01 MB

  .pad/6
  -  250.67 KB

  [TutsNode.net] - 05 - 4. Investigating Internet Security/04 - Blocking malicious content.mp4
  -  12.88 MB

  .pad/7
  -  119.83 KB

  [TutsNode.net] - 05 - 4. Investigating Internet Security/02 - Using a secure connection.mp4
  -  12.55 MB

  .pad/8
  -  205 KB

  [TutsNode.net] - 02 - 1. Core Security Principles/06 - Recognizing the Internet of Things.mp4
  -  11.93 MB

  .pad/9
  -  73.67 KB

  [TutsNode.net] - 05 - 4. Investigating Internet Security/05 - Ensuring browser privacy.mp4
  -  11.91 MB

  .pad/10
  -  88.67 KB

  [TutsNode.net] - 07 - 6. Secure Devices and Applications/03 - Using cryptographic techniques.mp4
  -  11.86 MB

  .pad/11
  -  141.5 KB

  [TutsNode.net] - 07 - 6. Secure Devices and Applications/02 - Ensuring data integrity.mp4
  -  11.76 MB

  .pad/12
  -  245.67 KB

  [TutsNode.net] - 06 - 5. Mobile and Wireless Security/02 - Sharing a secret.mp4
  -  11.52 MB

  .pad/13
  -  235.17 KB

  [TutsNode.net] - 02 - 1. Core Security Principles/01 - Providing a secure system.mp4
  -  11.24 MB

  .pad/14
  -  8.17 KB

  [TutsNode.net] - 04 - 3. Breaching Your System/03 - Exploiting the unknown.mp4
  -  10.77 MB

  .pad/15
  -  232.67 KB

  [TutsNode.net] - 07 - 6. Secure Devices and Applications/01 - Providing data confidentiality.mp4
  -  10.58 MB

  .pad/16
  -  171.33 KB

  [TutsNode.net] - 03 - 2. Understanding Malware/02 - Explaining viruses and worms.mp4
  -  10.4 MB

  .pad/17
  -  103.67 KB

  [TutsNode.net] - 02 - 1. Core Security Principles/05 - Avoiding scam artists.mp4
  -  10.38 MB

  .pad/18
  -  123.83 KB

  [TutsNode.net] - 07 - 6. Secure Devices and Applications/04 - Securing email.mp4
  -  10.18 MB

  .pad/19
  -  67.33 KB

  [TutsNode.net] - 02 - 1. Core Security Principles/02 - Keeping information safe.mp4
  -  10.05 MB

  .pad/20
  -  205.67 KB

  [TutsNode.net] - 03 - 2. Understanding Malware/03 - Eliminating unwanted surveillance.mp4
  -  8.94 MB

  .pad/21
  -  61.17 KB

  [TutsNode.net] - 04 - 3. Breaching Your System/01 - Stopping the imposters.mp4
  -  8.82 MB

  .pad/22
  -  180.67 KB

  [TutsNode.net] - 04 - 3. Breaching Your System/02 - Getting in the backdoor.mp4
  -  8.64 MB

  .pad/23
  -  111.43 KB

  [TutsNode.net] - 01 - Introduction/01 - Tech savvy, tech safe.mp4
  -  8.18 MB

  .pad/24
  -  73.67 KB

  [TutsNode.net] - 02 - 1. Core Security Principles/04 - Analyzing risk.mp4
  -  8.11 MB

  .pad/25
  -  141.67 KB

  [TutsNode.net] - 06 - 5. Mobile and Wireless Security/03 - Concealing your access point.mp4
  -  7.4 MB

  .pad/26
  -  99.83 KB

  [TutsNode.net] - 02 - 1. Core Security Principles/03 - Managing risk.mp4
  -  5.43 MB

  .pad/27
  -  69.83 KB

  [TutsNode.net] - 04 - 3. Breaching Your System/05 - Solution Recognizing IoT threats.mp4
  -  4.56 MB

  .pad/28
  -  194.33 KB

  [TutsNode.net] - 01 - Introduction/02 - Discovering resources.mp4
  -  3.95 MB

  .pad/29
  -  49.17 KB

  [TutsNode.net] - 04 - 3. Breaching Your System/04 - Challenge Recognizing IoT threats.mp4
  -  3.88 MB

  .pad/30
  -  119.83 KB

  [TutsNode.net] - 08 - Conclusion/01 - Next steps.mp4
  -  3.19 MB



Torrent Description


Description

Every day, we interact with our digital devices. At the same time, we’re faced with the threat of cyberattacks that can compromise our privacy and security. Learning the basics of how to secure our digital world will help avoid becoming a victim of a cyberattack. This beginner-level course covers basic security concepts. You’ll learn strategies malicious actors use to gain access to your system using social engineering, malware, and spyware. IT Security Foundations series creator Lisa Bock also goes over some basic wireless security best practices, tips for beefing up browser security, and techniques for implementing encryption. Additionally, learn how to manage cookies when using a browser and discover best practices on how to secure your devices and applications.

Released 11/2022