36.07 GB | 00:19:32 | mp4 | 1920X1080 | 16:9
Genre:eLearning |Language:English
Files Included :
1 What is ISACA and the ITCA (220.41 MB)
2 IT Security (304.7 MB)
3 Information and Communications Technology (ICT) (193.5 MB)
4 Network Security (157.51 MB)
5 Cybersecurity (184.18 MB)
6 Specialized Systems (186.58 MB)
7 Validation (85.83 MB)
1 Standards Organizations (107.71 MB)
2 General Data Protection Regulation (109.93 MB)
3 PCI DSS and PSD2 (139.25 MB)
4 HIPPA (107.32 MB)
5 Zero Trust (66.38 MB)
6 The Internal and External Perimeters (187.08 MB)
7 The Internet Perimeter (266.34 MB)
8 Validation (144.53 MB)
1 The Demilitarized Zone (DMZ) (169.7 MB)
2 Virtual Local Area Network (VLAN) (182.18 MB)
3 Switch Communication (140.94 MB)
4 Router Communication (104.31 MB)
5 WiFi Security with Wired Equivalency Protocol (WEP) (119.39 MB)
6 WiFi Protected Access (WPA) WPA2, WPA3 (205.66 MB)
7 Securing a WiFi Access Point (315.59 MB)
8 Validation (86.13 MB)
1 Basic Firewall Functions (289.03 MB)
2 Types of Firewalls (216.51 MB)
3 Hardware Firewalls (220.33 MB)
4 Application Firewalls (114.7 MB)
5 Next Generation Firewalls (NGFW) (206.38 MB)
6 Validation (182.4 MB)
1 Endpoint Protection (100.04 MB)
2 Windows Firewall Default Settings (236.49 MB)
3 Allow an Application Through Windows Firewall (203.02 MB)
4 Configure Specific Firewall Settings (349.69 MB)
5 Use GPO to Apply Firewall Rules (215.19 MB)
6 Validation (184.58 MB)
1 Azure Firewall (245.25 MB)
2 Mac Firewall (214.84 MB)
3 Linux Firewall Configuration (383.94 MB)
4 Overview Intrusion DetectionPrevention System (IDPS) (139.86 MB)
5 Where is IDPS (118 MB)
6 IDPS Detection and Actions (71.5 MB)
7 IDPS Benefits and Products (97.39 MB)
8 Validation (142.09 MB)
1 What Are Endpoint Devices (120.11 MB)
2 Authentication Controls (365.85 MB)
3 Authentication Controls Part 2 (137.44 MB)
4 Authorization Controls (408.09 MB)
5 Authorization Controls Part 2 (291.95 MB)
6 Accounting Controls (365.36 MB)
1 Understand Cloud Computing from a Local Perspective (142.96 MB)
2 CAPEX vs OPEX, and Defining the Cloud (244.97 MB)
3 NIST Cloud Characteristics (245.92 MB)
4 Microsoft Cloud Layout (113.66 MB)
5 Explore Cloud Datacenters (301.16 MB)
6 Validation (206.63 MB)
1 Cloud Security Benefits (112.29 MB)
2 Cloud Security Risks and Recommendations (460.84 MB)
3 IaaS PaaS and SaaS (296.38 MB)
4 Public, Private, Hybrid, Community Cloud (196.91 MB)
5 Create an Azure VM (347.26 MB)
6 Validation (82.54 MB)
1 Database Security (284.98 MB)
2 Database Security Part 2 (265.12 MB)
3 Data Classification (133.93 MB)
4 Data Classification Part 2 (117.66 MB)
5 Data Classification Part 3 (158.15 MB)
6 Data at Rest, in Motion, and in Use (117.75 MB)
7 Protecting Data via Timely Updates (308.23 MB)
8 Validation (64.65 MB)
1 Encryption Introduction (216.57 MB)
2 Where is Your Data (162.96 MB)
3 Symmetric Encryption (126.96 MB)
4 The Case for Symmetric Encryption (271.25 MB)
5 Symmetric Algorithms (248.89 MB)
6 Validation (417.98 MB)
1 Cybersecurity Roles (219.93 MB)
2 Resilience (178.11 MB)
3 Continuity and Recovery (165.95 MB)
4 Recovery Time and Point Objectives (148.7 MB)
5 Backup Location (101.09 MB)
6 Backup Media (205.44 MB)
7 Backup Types (219.93 MB)
8 Validation (190.8 MB)
1 Understand Asymmetric Encryption (151.67 MB)
2 Asymmetric Encryption Flow (56.87 MB)
3 Asymmetric Encryption Algorithms (238.78 MB)
4 Hashing Data (445.7 MB)
5 Digital Signatures (95.76 MB)
6 Validation (142.36 MB)
7 Validation Part 2 (81.11 MB)
1 Public Key Infrastructure (PKI) (240.49 MB)
2 TLS Transaction Flow (243.03 MB)
3 Virtual Private Networks (VPN) (211.41 MB)
4 VPN Features and Disadvantages (261.13 MB)
5 Secure Shell (SSH) (96.2 MB)
6 Validation (226.27 MB)
1 What is a Security Operations Center (SOC) (92.23 MB)
2 SOC Models (163.65 MB)
3 SOC Staff (134.99 MB)
4 SOC Areas of Responsibility (381.68 MB)
5 Vulnerability Management (216.06 MB)
6 Validation (9.54 MB)
1 Penetration Testing Overview (98.5 MB)
2 Pen Test Phase Plan and Discover (408.94 MB)
3 Pen Test Phase Attack and Report (126.35 MB)
4 Dangers of Pen Testing (218.96 MB)
5 Endpoint Detection and Response (205.7 MB)
6 Validation (152.14 MB)
1 SIEM and SOAR (296.28 MB)
2 Incident Response, Handling, and Phases (180.85 MB)
3 Incident Response Plan (168.05 MB)
4 Digital Forensics Investigations (64.85 MB)
5 Where is the Evidence (304.7 MB)
6 Preserving Evidence (328.92 MB)
7 Chain of Custody (118.65 MB)
1 PING (247.73 MB)
2 Traceroute (180.2 MB)
3 ARP (206.97 MB)
4 IPCONFIG, ifconfig and ip addr (166 MB)
5 Route and iptables (269.55 MB)
6 Validation (99.52 MB)
1 nmap (159.61 MB)
2 SSH (156.12 MB)
3 hashcat (215.05 MB)
4 Crack Windows Passwords (275.61 MB)
5 Generate Hashes (105.93 MB)
6 Capture Network Traffic with Wireshark (200.15 MB)
7 Validation (77.53 MB)
1 Netstat and SS (224.39 MB)
2 Pathping and MTR (207.09 MB)
3 Pathping and MTR Part 2 (32.12 MB)
4 NSLOOKUP (119.55 MB)
5 Netcat (291.36 MB)
6 Sysinternals Suite (487.79 MB)
7 Windows god mode (52.36 MB)
8 Validation (141.05 MB)
1 CIA Confidentiality (253.09 MB)
2 CIA Integrity (249.61 MB)
3 CIA Availability (241.81 MB)
4 Principle of Least Privilege (296.1 MB)
5 Personal and Private Info (339.82 MB)
6 Validation (156.82 MB)
1 Threat Risk, Sources, Categories (320.12 MB)
2 Internal Risk (Insider Risk) (196.04 MB)
3 Insider Risk Shadow IT (255.56 MB)
4 Emerging Threats (157.62 MB)
5 Threat Modeling (132.54 MB)
6 Vulnerabilities and Exploits (122.99 MB)
7 Validation (108.24 MB)
1 Motivations and Agents (228.42 MB)
2 Reconnaissance and Entry (533.21 MB)
3 Foothold, Escalation, and Discovery (306.61 MB)
4 Lateral Movement, C2, and Exfiltration (247.11 MB)
5 Validation (49.96 MB)
1 Types of Malware (286.02 MB)
2 Even More Types of Malware! (345.62 MB)
3 Live Discovery of Drive-By Malware (98.04 MB)
4 Camera and Microphone Hijacking (210.56 MB)
5 Symptoms of Malware (401.82 MB)
6 More Symptoms of Malware (275.3 MB)
7 Demonstration of Unauthorized Installation (85.25 MB)
8 Validation (108.45 MB)
1 Advanced Persistent Threat (APT) (235.05 MB)
2 Back Door (163.27 MB)
3 Brute Force (318.93 MB)
4 Rainbow Tables and Password Spraying (144.73 MB)
5 Buffer Overflow (90.4 MB)
6 Covert Channels (149.65 MB)
7 Steganography Demonstration (263.41 MB)
1 Cross-Site Scripting (XSS) (219.98 MB)
2 Denial of Service and Man-in-the-Middle (339.97 MB)
3 Social Engineering (303.59 MB)
4 Additional Attacks (385.43 MB)
5 SQL Injection and Validation (233.91 MB)
1 Addressing Risk and Criteria (309.45 MB)
2 Third-Party Risk (449.84 MB)
3 SolarWinds Case Study Introduction (164.91 MB)
4 SolarWinds Cast Study Attack Details (504.38 MB)
5 Validation (88.64 MB)]
Screenshot
FileAxa
https://fileaxa.com/8vtp0o0jdzza/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part01.rar https://fileaxa.com/lm6jv2149f9u/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part02.rar https://fileaxa.com/q1vxezbrma9g/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part03.rar https://fileaxa.com/gh82csqgmnv4/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part04.rar https://fileaxa.com/352zlg6adqox/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part05.rar https://fileaxa.com/k7f4hoc4oxac/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part06.rar https://fileaxa.com/vcruwaill2ju/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part07.rar https://fileaxa.com/qy2jhqj9hbja/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part08.rar https://fileaxa.com/cgizaugf88d3/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part09.rar https://fileaxa.com/mwzovzci5x3i/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part10.rar https://fileaxa.com/o4e0pp0jat41/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part11.rar https://fileaxa.com/nuri1kstui5i/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part12.rar https://fileaxa.com/o496hwlr3led/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part13.rar https://fileaxa.com/xd1b26alt8mh/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part14.rar https://fileaxa.com/cndlrsfj427j/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part15.rar https://fileaxa.com/n2k94lnkwf1r/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part16.rar https://fileaxa.com/iov8u57ou5v6/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part17.rar https://fileaxa.com/9i2sdyo23kd9/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part18.rar https://fileaxa.com/r3zf6rozddqc/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part19.rar
RapidGator
https://rapidgator.net/file/eec3a098287939bd698be324b99c14f3/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part01.rar https://rapidgator.net/file/12c954f85bc98059da1b19004ed22a96/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part02.rar https://rapidgator.net/file/39e047c0c324fc989b4ee464ba9e35b9/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part03.rar https://rapidgator.net/file/2e395b9458287aced72eebd1a34b133c/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part04.rar https://rapidgator.net/file/669897f898b6945c81aaf60f44c7203e/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part05.rar https://rapidgator.net/file/abb8b9ef191aa28e947ce3557ce79b04/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part06.rar https://rapidgator.net/file/7ec63b224b002249287f94f0d25cd9a7/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part07.rar https://rapidgator.net/file/d51ba78d8fac51ea7e2a5b0db324ead2/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part08.rar https://rapidgator.net/file/4bcd3f34de0eb48f150ae3bbeb986640/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part09.rar https://rapidgator.net/file/2cb18d7ee8fbee6cc40b3283c6bd0da6/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part10.rar https://rapidgator.net/file/68cbc854ad67fee8448bcc500632c5d4/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part11.rar https://rapidgator.net/file/cdebf6bad779b3dc77bcf9c1422858e8/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part12.rar https://rapidgator.net/file/801[цензура]86a5b9082240ad6fc18f1b2876/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part13.rar https://rapidgator.net/file/eb20ce06528e400dd6fae74d0ca5e105/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part14.rar https://rapidgator.net/file/34cd7459e0cce557240264c7ba441ef4/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part15.rar https://rapidgator.net/file/db17e6796fc94036b6fb374e4582832c/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part16.rar https://rapidgator.net/file/157885d8366e0ded05513be1c43219da/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part17.rar https://rapidgator.net/file/e628494321643a20517549e550a9905b/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part18.rar https://rapidgator.net/file/3065294dc0dc7454bed320b1c550e3c2/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part19.rar
TurboBit
https://turbobit.net/1oizqota25i7/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part01.rar.html https://turbobit.net/gx3mu1pbd776/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part02.rar.html https://turbobit.net/iby16jfathtz/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part03.rar.html https://turbobit.net/vb1kegzioy5c/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part04.rar.html https://turbobit.net/jsycj25wuzbl/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part05.rar.html https://turbobit.net/msywfzz6cn7u/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part06.rar.html https://turbobit.net/q30d2nh0iqlb/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part07.rar.html https://turbobit.net/tgp612mkcr84/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part08.rar.html https://turbobit.net/acu303r65fv0/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part09.rar.html https://turbobit.net/cysoxkdnrpkb/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part10.rar.html https://turbobit.net/i6aywzw46lp0/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part11.rar.html https://turbobit.net/5idnan1p3sc3/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part12.rar.html https://turbobit.net/50nsd0zv1y1t/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part13.rar.html https://turbobit.net/0vbkv1zb5hev/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part14.rar.html https://turbobit.net/i9xnq65e49b5/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part15.rar.html https://turbobit.net/idhxyxjebzq7/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part16.rar.html https://turbobit.net/tskvad78irgb/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part17.rar.html https://turbobit.net/v8e5bdw8meez/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part18.rar.html https://turbobit.net/bt75bf78db6z/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part19.rar.html