Coursera - IT Security Defense against the digital dark arts
Language: English | Size:1.97 GB
Genre:eLearning
Files Included :
1 Course Introduction.mp4 (43.03 MB)
MP4
1 The CIA Triad.mp4 (14.69 MB)
MP4
2 Essential Security Terms.mp4 (24.1 MB)
MP4
3 Malicious Software.mp4 (26.04 MB)
MP4
5 Malware Continued.mp4 (14.3 MB)
MP4
1 Network Attacks.mp4 (17.84 MB)
MP4
3 DenialofService.mp4 (19.01 MB)
MP4
1 ClientSide Attacks.mp4 (12.67 MB)
MP4
2 Password Attacks.mp4 (12.26 MB)
MP4
3 Deceptive Attacks.mp4 (16.8 MB)
MP4
1 Cryptography.mp4 (43.62 MB)
MP4
3 Symmetric Cryptography.mp4 (27.48 MB)
MP4
4 Symmetric Encryption Algorithms.mp4 (41.18 MB)
MP4
6 Rob The work of a security engineer.mp4 (11.23 MB)
MP4
1 Asymmetric Cryptography.mp4 (20.88 MB)
MP4
2 Symmetric Cryptography Part Two.mp4 (25.17 MB)
MP4
3 Asymmetric Encryption Algorithms.mp4 (28.59 MB)
MP4
1 Hashing.mp4 (16.26 MB)
MP4
2 Hashing Algorithms.mp4 (32.71 MB)
MP4
4 Hashing Algorithms continued.mp4 (32.91 MB)
MP4
1 Public Key Infrastructure.mp4 (35.08 MB)
MP4
10 Rejection.mp4 (4.62 MB)
MP4
2 Certificates.mp4 (15.09 MB)
MP4
4 Cryptography in Action.mp4 (42.66 MB)
MP4
6 Securing Network Traffic.mp4 (30.3 MB)
MP4
8 Cryptographic Hardware.mp4 (37.75 MB)
MP4
1 Best practices for authentication.mp4 (38.33 MB)
MP4
10 Single SignOn.mp4 (21.04 MB)
MP4
11 Rob My path to IT.mp4 (10.26 MB)
MP4
2 Multifactor Authentication.mp4 (35.74 MB)
MP4
3 Multifactor Authentication Options.mp4 (39.5 MB)
MP4
6 Certificates Part Two.mp4 (26.17 MB)
MP4
7 RADIUS.mp4 (10.63 MB)
MP4
8 Kerberos.mp4 (47.04 MB)
MP4
9 TACACS.mp4 (9.78 MB)
MP4
1 Authorization and Access Control Methods.mp4 (8.36 MB)
MP4
3 Access Control.mp4 (34.67 MB)
MP4
5 Access Control List.mp4 (7.22 MB)
MP4
1 Tracking Usage and Access.mp4 (14.08 MB)
MP4
2 Rob Important skills in security.mp4 (11.76 MB)
MP4
1 Network Hardening Best Practices.mp4 (44.04 MB)
MP4
3 Network Hardware Hardening.mp4 (38.88 MB)
MP4
5 Network Software Hardening.mp4 (23.68 MB)
MP4
7 Joe My personal obstacle.mp4 (5.04 MB)
MP4
1 WEP Encryption and Why You Shouldnt Use It.mp4 (43.7 MB)
MP4
3 Lets Get Rid of WEP.mp4 (38.89 MB)
MP4
4 WPA2.mp4 (33.01 MB)
MP4
6 Wireless Hardening.mp4 (15.75 MB)
MP4
7 Heather The impact of social engineering.mp4 (8.46 MB)
MP4
1 Sniffing the Network.mp4 (28.68 MB)
MP4
2 Wireshark and tcpdump.mp4 (31.52 MB)
MP4
4 Intrusion DetectionPrevention Systems.mp4 (34.02 MB)
MP4
1 Intro to Defense in Depth.mp4 (7.06 MB)
MP4
11 Heather Selflearning is the key to success.mp4 (8.32 MB)
MP4
2 Disabling Unnecessary Components.mp4 (28.23 MB)
MP4
3 HostBased Firewall.mp4 (22.3 MB)
MP4
4 Logging and Auditing.mp4 (36.93 MB)
MP4
7 Antimalware Protection.mp4 (43.64 MB)
MP4
9 Disk Encryption.mp4 (33 MB)
MP4
1 Software Patch Management.mp4 (39.65 MB)
MP4
3 Application Policies.mp4 (21.06 MB)
MP4
1 Security Goals.mp4 (65.46 MB)
MP4
2 Measuring and Assessing Risk.mp4 (37.16 MB)
MP4
4 Privacy Policy.mp4 (32.3 MB)
MP4
1 User Habits.mp4 (50.58 MB)
MP4
3 ThirdParty Security.mp4 (36.56 MB)
MP4
5 Security Training.mp4 (31.71 MB)
MP4
6 Alex Qualities of an IT candidate.mp4 (12.43 MB)
MP4
1 Incident Reporting and Analysis.mp4 (57.93 MB)
MP4
3 Incident Response and Recovery.mp4 (57.91 MB)
MP4
4 Mobile Security and Privacy.mp4 (15.99 MB)
MP4
7 Amir Tips for interviews.mp4 (11.07 MB)
MP4
8 Ari Tips for interviews.mp4 (10.12 MB)
MP4
9 Interview Role Play Security.mp4 (31.13 MB)
MP4
1 Final Assessment.mp4 (4.08 MB)
MP4
1 Framing yourself.mp4 (7.94 MB)
MP4
6 Congratulations.mp4 (6.66 MB)
MP4
Coursera - IT Security Defense against the digital dark arts.z01
https://1dl.net/3ujaypc6eifi/Coursera_-_IT_Security_Defense_against_the_digital_dark_arts.z01
Coursera - IT Security Defense against the digital dark arts.z02
https://1dl.net/ct82h6r24xce/Coursera_-_IT_Security_Defense_against_the_digital_dark_arts.z02
Coursera - IT Security Defense against the digital dark arts.z03
https://1dl.net/yuj851hedsip/Coursera_-_IT_Security_Defense_against_the_digital_dark_arts.z03
Coursera - IT Security Defense against the digital dark arts.z04
https://1dl.net/9yqrysm5zpzz/Coursera_-_IT_Security_Defense_against_the_digital_dark_arts.z04
Coursera - IT Security Defense against the digital dark arts.zip
https://1dl.net/x5qk3ixve9zj/Coursera_-_IT_Security_Defense_against_the_digital_dark_arts.zip
Coursera - IT Security Defense against the digital dark arts.z01
https://rapidgator.net/file/cd33693f3690798300c6c0d27df3f214/Coursera_-_IT_Security_Defense_against_the_digital_dark_arts.z01
Coursera - IT Security Defense against the digital dark arts.z02
https://rapidgator.net/file/70b69b174d443b394556b2dbce8a183d/Coursera_-_IT_Security_Defense_against_the_digital_dark_arts.z02
Coursera - IT Security Defense against the digital dark arts.z03
https://rapidgator.net/file/63506f1660d1dd50d1f4f05c50a34fd9/Coursera_-_IT_Security_Defense_against_the_digital_dark_arts.z03
Coursera - IT Security Defense against the digital dark arts.z04
https://rapidgator.net/file/193e370c53e092c48e45e4e0af15eda3/Coursera_-_IT_Security_Defense_against_the_digital_dark_arts.z04
Coursera - IT Security Defense against the digital dark arts.zip
https://rapidgator.net/file/dbc00c95968b544dfb8c988684522e5d/Coursera_-_IT_Security_Defense_against_the_digital_dark_arts.zip