|  

[UDEMY] Cyber Security and Information Security Fundamentals - [FTU] GloDLS



Size :2.04 GB
Peers : Seeders : 0      Leechers : 0
Added : 5 years ago » by SaM » in Tutorials
Language : English
Last Updated :8 months ago
Info_Hash :45F66083539E6B153E221895F0EC7C1139AC83B2

Torrent File Contents

[UDEMY] Cyber Security and Information Security Fundamentals - [FTU] GloDLS
  1. Introduction/10. Compliance and Ethics.mp4
  -  21.25 MB

  1. Introduction/10. Compliance and Ethics.vtt
  -  3.71 KB

  1. Introduction/1.10 Notes 5.pdf.pdf
  -  225.15 KB

  1. Introduction/1.11 Notes 7.pdf.pdf
  -  240.17 KB

  1. Introduction/1.12 Notes 8.pdf.pdf
  -  255.67 KB

  1. Introduction/1.13 Notes 12.pdf.pdf
  -  266.76 KB

  1. Introduction/1.14 Notes 2.pdf.pdf
  -  223.23 KB

  1. Introduction/11. Industry Specific Laws.mp4
  -  31.52 MB

  1. Introduction/11. Industry Specific Laws.vtt
  -  4.24 KB

  1. Introduction/1.1 Notes 9.pdf.pdf
  -  241.64 KB

  1. Introduction/12. Computer Crimes.mp4
  -  17.76 MB

  1. Introduction/12. Computer Crimes.vtt
  -  2.78 KB

  1. Introduction/1.2 Notes 4.pdf.pdf
  -  219.31 KB

  1. Introduction/1.3 Notes 14.pdf.pdf
  -  225.99 KB

  1. Introduction/13. Software Licensing.mp4
  -  23.96 MB

  1. Introduction/13. Software Licensing.vtt
  -  4.23 KB

  1. Introduction/14. Data Breaches and Ethics.mp4
  -  15.68 MB

  1. Introduction/14. Data Breaches and Ethics.vtt
  -  2.07 KB

  1. Introduction/1.4 Notes 10.pdf.pdf
  -  236.81 KB

  1. Introduction/1.5 Notes 3.pdf.pdf
  -  303.42 KB

  1. Introduction/15. Security Policy Framework.mp4
  -  18.31 MB

  1. Introduction/15. Security Policy Framework.vtt
  -  3.11 KB

  1. Introduction/16. Common Policies and Key Principles.mp4
  -  27.13 MB

  1. Introduction/16. Common Policies and Key Principles.vtt
  -  5.63 KB

  1. Introduction/1.6 Notes 13.pdf.pdf
  -  246.22 KB

  1. Introduction/17. Business Continuity Planning.mp4
  -  13.56 MB

  1. Introduction/17. Business Continuity Planning.vtt
  -  2.43 KB

  1. Introduction/1.7 Notes 6.pdf.pdf
  -  227.97 KB

  1. Introduction/18. Business Continuity Controls and Key Technical Concepts.mp4
  -  28.66 MB

  1. Introduction/18. Business Continuity Controls and Key Technical Concepts.vtt
  -  4.96 KB

  1. Introduction/1.8 Notes 1.pdf.pdf
  -  227.43 KB

  1. Introduction/1.9 Notes 11.pdf.pdf
  -  254.93 KB

  1. Introduction/19. RAID Technology.mp4
  -  23.88 MB

  1. Introduction/19. RAID Technology.vtt
  -  3.26 KB

  1. Introduction/1. Introduction.mp4
  -  33.25 MB

  1. Introduction/1. Introduction.vtt
  -  2.53 KB

  1. Introduction/20. Risk Management.mp4
  -  22.69 MB

  1. Introduction/20. Risk Management.vtt
  -  4.47 KB

  1. Introduction/21. Risk Assessment Techniques.mp4
  -  23.23 MB

  1. Introduction/21. Risk Assessment Techniques.vtt
  -  3.04 KB

  1. Introduction/22. Quantitative Risk Factors.mp4
  -  31.42 MB

  1. Introduction/22. Quantitative Risk Factors.vtt
  -  5.6 KB

  1. Introduction/23. Risk Management Strategies.mp4
  -  25.61 MB

  1. Introduction/23. Risk Management Strategies.vtt
  -  3.6 KB

  1. Introduction/24. Security Controls.mp4
  -  23.69 MB

  1. Introduction/24. Security Controls.vtt
  -  4.42 KB

  1. Introduction/25. Understanding Data Security.mp4
  -  19.46 MB

  1. Introduction/25. Understanding Data Security.vtt
  -  3.16 KB

  1. Introduction/26. Data Security Policies.mp4
  -  26.04 MB

  1. Introduction/26. Data Security Policies.vtt
  -  3.46 KB

  1. Introduction/27. Data Security Roles.mp4
  -  18.84 MB

  1. Introduction/27. Data Security Roles.vtt
  -  3.35 KB

  1. Introduction/28. Data Privacy.mp4
  -  30.52 MB

  1. Introduction/28. Data Privacy.vtt
  -  4.69 KB

  1. Introduction/29. Developing Security Baselines.mp4
  -  22.82 MB

  1. Introduction/29. Developing Security Baselines.vtt
  -  3.59 KB

  1. Introduction/2. Understanding Information Security.mp4
  -  26.06 MB

  1. Introduction/2. Understanding Information Security.vtt
  -  4.9 KB

  1. Introduction/30. Leveraging Industry Standards.mp4
  -  45.8 MB

  1. Introduction/30. Leveraging Industry Standards.vtt
  -  5.51 KB

  1. Introduction/31. Customizing Security Standards.mp4
  -  22.93 MB

  1. Introduction/31. Customizing Security Standards.vtt
  -  3.35 KB

  1. Introduction/32. Understanding Encryption.mp4
  -  28.65 MB

  1. Introduction/32. Understanding Encryption.vtt
  -  2.98 KB

  1. Introduction/33. Secure Design Principles.mp4
  -  56.29 MB

  1. Introduction/33. Secure Design Principles.vtt
  -  9.31 KB

  1. Introduction/34. Security Models.mp4
  -  43.98 MB

  1. Introduction/34. Security Models.vtt
  -  6.52 KB

  1. Introduction/35. Security Requirements.mp4
  -  74.68 MB

  1. Introduction/35. Security Requirements.vtt
  -  10.78 KB

  1. Introduction/36. Virtualization.mp4
  -  63.48 MB

  1. Introduction/36. Virtualization.vtt
  -  8.98 KB

  1. Introduction/37. Cloud Computing Models.mp4
  -  48.98 MB

  1. Introduction/37. Cloud Computing Models.vtt
  -  7.02 KB

  1. Introduction/38. Public Cloud Tiers.mp4
  -  56.3 MB

  1. Introduction/38. Public Cloud Tiers.vtt
  -  6.97 KB

  1. Introduction/39. Memory Protection.mp4
  -  62.11 MB

  1. Introduction/39. Memory Protection.vtt
  -  7.81 KB

  1. Introduction/3. Hashing.mp4
  -  32.85 MB

  1. Introduction/3. Hashing.vtt
  -  3.03 KB

  1. Introduction/40. Interface Protection.mp4
  -  85.17 MB

  1. Introduction/40. Interface Protection.vtt
  -  10.24 KB

  1. Introduction/41. High Availability and Fault Tolerance.mp4
  -  47.99 MB

  1. Introduction/41. High Availability and Fault Tolerance.vtt
  -  6.55 KB

  1. Introduction/42. OWASP Top 10.mp4
  -  40.41 MB

  1. Introduction/42. OWASP Top 10.vtt
  -  4.14 KB

  1. Introduction/43. SQL Injection Prevention.mp4
  -  26.83 MB

  1. Introduction/43. SQL Injection Prevention.vtt
  -  5.34 KB

  1. Introduction/44. Cross-Site Scripting Prevention.mp4
  -  31.69 MB

  1. Introduction/44. Cross-Site Scripting Prevention.vtt
  -  5.06 KB

  1. Introduction/45. Cross-Site Request Forgery.mp4
  -  21.49 MB

  1. Introduction/45. Cross-Site Request Forgery.vtt
  -  3.46 KB

  1. Introduction/46. Understanding Encryption.mp4
  -  28.66 MB

  1. Introduction/46. Understanding Encryption.vtt
  -  2.98 KB

  1. Introduction/47. Symmetric and Asymmetric Cryptography.mp4
  -  47.79 MB

  1. Introduction/47. Symmetric and Asymmetric Cryptography.vtt
  -  8.23 KB

  1. Introduction/48. Cryptography Goals.mp4
  -  15.95 MB

  1. Introduction/48. Cryptography Goals.vtt
  -  3.06 KB

  1. Introduction/49. Codes and Ciphers.mp4
  -  23.21 MB

  1. Introduction/49. Codes and Ciphers.vtt
  -  3.81 KB

  1. Introduction/4. Digital Signatures and Digital Certificates.mp4
  -  18.63 MB

  1. Introduction/4. Digital Signatures and Digital Certificates.vtt
  -  2.8 KB

  1. Introduction/50. Key Lifecycle Management.mp4
  -  81.71 MB

  1. Introduction/50. Key Lifecycle Management.vtt
  -  13.46 KB

  1. Introduction/51. Data Encryption Standards (DES).mp4
  -  24.69 MB

  1. Introduction/51. Data Encryption Standards (DES).vtt
  -  3.97 KB

  1. Introduction/52. Triple DES (3DES).mp4
  -  32.28 MB

  1. Introduction/52. Triple DES (3DES).vtt
  -  3.93 KB

  1. Introduction/53. AES, Blowfish, and Twofish.mp4
  -  61.15 MB

  1. Introduction/53. AES, Blowfish, and Twofish.vtt
  -  9.39 KB

  1. Introduction/54. RC4.mp4
  -  17.86 MB

  1. Introduction/54. RC4.vtt
  -  3.24 KB

  1. Introduction/55. RSA Encryption.mp4
  -  60.9 MB

  1. Introduction/55. RSA Encryption.vtt
  -  8.08 KB

  1. Introduction/56. Elliptic-Curve Cryptography and Quantum Cryptography.mp4
  -  23.03 MB

  1. Introduction/56. Elliptic-Curve Cryptography and Quantum Cryptography.vtt
  -  4.18 KB

  1. Introduction/57. Key Exchange.mp4
  -  22.75 MB

  1. Introduction/57. Key Exchange.vtt
  -  4.31 KB

  1. Introduction/58. Diffie-Hellman Key Exchange.mp4
  -  54.29 MB

  1. Introduction/58. Diffie-Hellman Key Exchange.vtt
  -  9.51 KB

  1. Introduction/59. Key Escrow.mp4
  -  42.91 MB

  1. Introduction/59. Key Escrow.vtt
  -  4.99 KB

  1. Introduction/5. Availability.mp4
  -  18.86 MB

  1. Introduction/5. Availability.vtt
  -  3.29 KB

  1. Introduction/60. Trust Models.mp4
  -  22.76 MB

  1. Introduction/60. Trust Models.vtt
  -  3.78 KB

  1. Introduction/61. Public Key Infrastructure (PKI) and Digital Certificates.mp4
  -  39.24 MB

  1. Introduction/61. Public Key Infrastructure (PKI) and Digital Certificates.vtt
  -  5.22 KB

  1. Introduction/62. Hash Functions.mp4
  -  32.84 MB

  1. Introduction/62. Hash Functions.vtt
  -  3.03 KB

  1. Introduction/63. Digital Signatures and Digital Certificates.mp4
  -  18.65 MB

  1. Introduction/63. Digital Signatures and Digital Certificates.vtt
  -  2.8 KB

  1. Introduction/6. Security Governance.mp4
  -  15.81 MB

  1. Introduction/6. Security Governance.vtt
  -  3.21 KB

  1. Introduction/7. Organizational Processes.mp4
  -  18.01 MB

  1. Introduction/7. Organizational Processes.vtt
  -  3.94 KB

  1. Introduction/8. Security Roles and Responsibilities.mp4
  -  14.68 MB

  1. Introduction/8. Security Roles and Responsibilities.vtt
  -  2.87 KB

  1. Introduction/9. Control Frameworks.mp4
  -  32.17 MB

  1. Introduction/9. Control Frameworks.vtt
  -  4.61 KB

  Discuss.FreeTutorials.Us.html
  -  165.68 KB

  FreeCoursesOnline.Me.html
  -  108.3 KB

  FreeTutorials.Eu.html
  -  102.23 KB

  How you can help Team-FTU.txt
  -  259 Bytes

  [TGx]Downloaded from torrentgalaxy.org.txt
  -  524 Bytes

  Torrent Downloaded From GloDls.buzz.txt
  -  84 Bytes



Torrent Description

Description:


2019 Introduction to Cyber Security and Information Security!

Created by: e-Learning PRO
Last updated: 1/2019
Language: English
Caption (CC): Included
BestBeller: 4.9 (12 ratings)
Torrent Contains: 146 Files, 1 Folders
Course Source: https://www.udemy.com/the-2019-guide-to-cyber-security-and-information-security/

What you'll learn

• Students who complete this course will go from having no prior knowledge of Cyber Security to having an advanced understanding of core principals, theoretical knowledge, and real world applications.
• Learn Information and Cybersecurity efficiently with my INCLUDED DOWNLOADABLE PDF COURSE NOTES!!!!
• Students will learn about a wide array of topics relating to information and cyber security. Everything from control frameworks to encryption and algorithms.
• Gain a robust understanding of the CIA Triad, Asset Security, Governance, Public Key Infrastructure (PKI), Security Frameworks, and MUCH MORE!
• Learn both practical and theoretical cyber security principles!
• Identify and understand key Security Frameworks!
• Acquire practical and theoretical skills taught to you buy a subject matter expect in the field of information security and cyber security

Requirements

• Everything is taught. No previous experience or knowledge is required. Learn it all in this course!

Description

This course covers everything you've ever wanted to know about information security and cyber security. We'll review the following concepts:  

• Confidentiality
• Integrity
• Availability
• Information      Security
• Control      Frameworks
• Security      Governance
• Risk      Management
• Business      Continuity Planning
• Digital      Signatures
• Digital      Certificates
• Hashing
• Organizational      Processes
• Security      Roles and Responsibilities
• Compliance
• Ethics
• Computer      Crimes
• Software      Licensing
• Export      Controls
• Data      Breaches
• Security      Policies
• RAID      Technology
• Risk      Assessment Techniques
• Quantitative      Risk Factors
• Risk      Management Strategies
• Security      Controls
• Understanding      Data Security
• Security      Policies
• Developing      Security Baselines
• Data      Security Roles
• Customizing      Security Standards
• Data      Privacy
• Customizing      Security Standards
• Leveraging      Industry Standards
• Data      Encryption
• Secure Design Principles  
• Security Models  
• Security Requirements  
• Virtualization  
• Cloud Computing Models  
• Public Cloud Tiers  
• Memory Protection  
• Interface Protection  
• High Availability and Fault Tolerance  
• OWASP Top 10  
• SQL Injections  
• Cross-Site Scripting (XSS)  
• Cross-Request Forgery  
• Understanding Encryption  
• Symmetric vs. Asymmetric Cryptography  
• Goals of Cryptography  
• Codes vs. Ciphers  
• Key Lifecycle Management  
• Data Encryption Standard (DES)  
• Triple DES (3DES)  
• Advanced Encryption Standard (AES)  
• Blowfish  
• Twofish  
• RC4  
• RSA Cryptography  
• Elliptic Curve & Quantum Cryptography  
• Key Exchange  
• Diffie-Hellman Key Exchange  
• Key Escrow  
• Trust Models  
• PKI and Digital Certificates  
• Hash Functions and Digital Certificates  
• Digital Signatures  

These are just a few of the topics covered in this course. Each  lecture is designed to introduce concepts in manner that breaks down  core concepts into fundamental principles. Whether you're a beginner in  the field of information and cybersecurity, or an experience  professional, you will gain valuable knowledge that can be applied in  your personal and professional life.

Who this course is for:

• This course is for anyone interested in information security and cyber security.
• This course is for all levels (beginner, mid-level, and advanced)