https://img87.pixhost.to/images/599/359020115_tuto.jpg
36.07 GB | 00:19:32 | mp4 | 1920X1080  | 16:9
Genre:eLearning |Language:English


Files Included :
1  What is ISACA and the ITCA  (220.41 MB)
2  IT Security  (304.7 MB)
3  Information and Communications Technology (ICT)  (193.5 MB)
4  Network Security  (157.51 MB)
5  Cybersecurity  (184.18 MB)
6  Specialized Systems  (186.58 MB)
7  Validation  (85.83 MB)
1  Standards Organizations  (107.71 MB)
2  General Data Protection Regulation  (109.93 MB)
3  PCI DSS and PSD2  (139.25 MB)
4  HIPPA  (107.32 MB)
5  Zero Trust  (66.38 MB)
6  The Internal and External Perimeters  (187.08 MB)
7  The Internet Perimeter  (266.34 MB)
8  Validation  (144.53 MB)
1  The Demilitarized Zone (DMZ)  (169.7 MB)
2  Virtual Local Area Network (VLAN)  (182.18 MB)
3  Switch Communication  (140.94 MB)
4  Router Communication  (104.31 MB)
5  WiFi Security with Wired Equivalency Protocol (WEP)  (119.39 MB)
6  WiFi Protected Access (WPA) WPA2, WPA3  (205.66 MB)
7  Securing a WiFi Access Point  (315.59 MB)
8  Validation  (86.13 MB)
1  Basic Firewall Functions  (289.03 MB)
2  Types of Firewalls  (216.51 MB)
3  Hardware Firewalls  (220.33 MB)
4  Application Firewalls  (114.7 MB)
5  Next Generation Firewalls (NGFW)  (206.38 MB)
6  Validation  (182.4 MB)
1  Endpoint Protection  (100.04 MB)
2  Windows Firewall Default Settings  (236.49 MB)
3  Allow an Application Through Windows Firewall  (203.02 MB)
4  Configure Specific Firewall Settings  (349.69 MB)
5  Use GPO to Apply Firewall Rules  (215.19 MB)
6  Validation  (184.58 MB)
1  Azure Firewall  (245.25 MB)
2  Mac Firewall  (214.84 MB)
3  Linux Firewall Configuration  (383.94 MB)
4  Overview Intrusion DetectionPrevention System (IDPS)  (139.86 MB)
5  Where is IDPS  (118 MB)
6  IDPS Detection and Actions  (71.5 MB)
7  IDPS Benefits and Products  (97.39 MB)
8  Validation  (142.09 MB)
1  What Are Endpoint Devices  (120.11 MB)
2  Authentication Controls  (365.85 MB)
3  Authentication Controls Part 2  (137.44 MB)
4  Authorization Controls  (408.09 MB)
5  Authorization Controls Part 2  (291.95 MB)
6  Accounting Controls  (365.36 MB)
1  Understand Cloud Computing from a Local Perspective  (142.96 MB)
2  CAPEX vs OPEX, and Defining the Cloud  (244.97 MB)
3  NIST Cloud Characteristics  (245.92 MB)
4  Microsoft Cloud Layout  (113.66 MB)
5  Explore Cloud Datacenters  (301.16 MB)
6  Validation  (206.63 MB)
1  Cloud Security Benefits  (112.29 MB)
2  Cloud Security Risks and Recommendations  (460.84 MB)
3  IaaS PaaS and SaaS  (296.38 MB)
4  Public, Private, Hybrid, Community Cloud  (196.91 MB)
5  Create an Azure VM  (347.26 MB)
6  Validation  (82.54 MB)
1  Database Security  (284.98 MB)
2  Database Security Part 2  (265.12 MB)
3  Data Classification  (133.93 MB)
4  Data Classification Part 2  (117.66 MB)
5  Data Classification Part 3  (158.15 MB)
6  Data at Rest, in Motion, and in Use  (117.75 MB)
7  Protecting Data via Timely Updates  (308.23 MB)
8  Validation  (64.65 MB)
1  Encryption Introduction  (216.57 MB)
2  Where is Your Data  (162.96 MB)
3  Symmetric Encryption  (126.96 MB)
4  The Case for Symmetric Encryption  (271.25 MB)
5  Symmetric Algorithms  (248.89 MB)
6  Validation  (417.98 MB)
1  Cybersecurity Roles  (219.93 MB)
2  Resilience  (178.11 MB)
3  Continuity and Recovery  (165.95 MB)
4  Recovery Time and Point Objectives  (148.7 MB)
5  Backup Location  (101.09 MB)
6  Backup Media  (205.44 MB)
7  Backup Types  (219.93 MB)
8  Validation  (190.8 MB)
1  Understand Asymmetric Encryption  (151.67 MB)
2  Asymmetric Encryption Flow  (56.87 MB)
3  Asymmetric Encryption Algorithms  (238.78 MB)
4  Hashing Data  (445.7 MB)
5  Digital Signatures  (95.76 MB)
6  Validation  (142.36 MB)
7  Validation Part 2  (81.11 MB)
1  Public Key Infrastructure (PKI)  (240.49 MB)
2  TLS Transaction Flow  (243.03 MB)
3  Virtual Private Networks (VPN)  (211.41 MB)
4  VPN Features and Disadvantages  (261.13 MB)
5  Secure Shell (SSH)  (96.2 MB)
6  Validation  (226.27 MB)
1  What is a Security Operations Center (SOC)  (92.23 MB)
2  SOC Models  (163.65 MB)
3  SOC Staff  (134.99 MB)
4  SOC Areas of Responsibility  (381.68 MB)
5  Vulnerability Management  (216.06 MB)
6  Validation  (9.54 MB)
1  Penetration Testing Overview  (98.5 MB)
2  Pen Test Phase Plan and Discover  (408.94 MB)
3  Pen Test Phase Attack and Report  (126.35 MB)
4  Dangers of Pen Testing  (218.96 MB)
5  Endpoint Detection and Response  (205.7 MB)
6  Validation  (152.14 MB)
1  SIEM and SOAR  (296.28 MB)
2  Incident Response, Handling, and Phases  (180.85 MB)
3  Incident Response Plan  (168.05 MB)
4  Digital Forensics Investigations  (64.85 MB)
5  Where is the Evidence  (304.7 MB)
6  Preserving Evidence  (328.92 MB)
7  Chain of Custody  (118.65 MB)
1  PING  (247.73 MB)
2  Traceroute  (180.2 MB)
3  ARP  (206.97 MB)
4  IPCONFIG, ifconfig and ip addr  (166 MB)
5  Route and iptables  (269.55 MB)
6  Validation  (99.52 MB)
1  nmap  (159.61 MB)
2  SSH  (156.12 MB)
3  hashcat  (215.05 MB)
4  Crack Windows Passwords  (275.61 MB)
5  Generate Hashes  (105.93 MB)
6  Capture Network Traffic with Wireshark  (200.15 MB)
7  Validation  (77.53 MB)
1  Netstat and SS  (224.39 MB)
2  Pathping and MTR  (207.09 MB)
3  Pathping and MTR Part 2  (32.12 MB)
4  NSLOOKUP  (119.55 MB)
5  Netcat  (291.36 MB)
6  Sysinternals Suite  (487.79 MB)
7  Windows god mode  (52.36 MB)
8  Validation  (141.05 MB)
1  CIA Confidentiality  (253.09 MB)
2  CIA Integrity  (249.61 MB)
3  CIA Availability  (241.81 MB)
4  Principle of Least Privilege  (296.1 MB)
5  Personal and Private Info  (339.82 MB)
6  Validation  (156.82 MB)
1  Threat Risk, Sources, Categories  (320.12 MB)
2  Internal Risk (Insider Risk)  (196.04 MB)
3  Insider Risk Shadow IT  (255.56 MB)
4  Emerging Threats  (157.62 MB)
5  Threat Modeling  (132.54 MB)
6  Vulnerabilities and Exploits  (122.99 MB)
7  Validation  (108.24 MB)
1  Motivations and Agents  (228.42 MB)
2  Reconnaissance and Entry  (533.21 MB)
3  Foothold, Escalation, and Discovery  (306.61 MB)
4  Lateral Movement, C2, and Exfiltration  (247.11 MB)
5  Validation  (49.96 MB)
1  Types of Malware  (286.02 MB)
2  Even More Types of Malware!  (345.62 MB)
3  Live Discovery of Drive-By Malware  (98.04 MB)
4  Camera and Microphone Hijacking  (210.56 MB)
5  Symptoms of Malware  (401.82 MB)
6  More Symptoms of Malware  (275.3 MB)
7  Demonstration of Unauthorized Installation  (85.25 MB)
8  Validation  (108.45 MB)
1  Advanced Persistent Threat (APT)  (235.05 MB)
2  Back Door  (163.27 MB)
3  Brute Force  (318.93 MB)
4  Rainbow Tables and Password Spraying  (144.73 MB)
5  Buffer Overflow  (90.4 MB)
6  Covert Channels  (149.65 MB)
7  Steganography Demonstration  (263.41 MB)
1  Cross-Site Scripting (XSS)  (219.98 MB)
2  Denial of Service and Man-in-the-Middle  (339.97 MB)
3  Social Engineering  (303.59 MB)
4  Additional Attacks  (385.43 MB)
5  SQL Injection and Validation  (233.91 MB)
1  Addressing Risk and Criteria  (309.45 MB)
2  Third-Party Risk  (449.84 MB)
3  SolarWinds Case Study Introduction  (164.91 MB)
4  SolarWinds Cast Study Attack Details  (504.38 MB)
5  Validation  (88.64 MB)]
Screenshot
https://images2.imgbox.com/c5/28/3EAJOrGQ_o.jpg


FileAxa

Код:
https://fileaxa.com/8vtp0o0jdzza/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part01.rar
https://fileaxa.com/lm6jv2149f9u/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part02.rar
https://fileaxa.com/q1vxezbrma9g/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part03.rar
https://fileaxa.com/gh82csqgmnv4/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part04.rar
https://fileaxa.com/352zlg6adqox/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part05.rar
https://fileaxa.com/k7f4hoc4oxac/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part06.rar
https://fileaxa.com/vcruwaill2ju/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part07.rar
https://fileaxa.com/qy2jhqj9hbja/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part08.rar
https://fileaxa.com/cgizaugf88d3/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part09.rar
https://fileaxa.com/mwzovzci5x3i/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part10.rar
https://fileaxa.com/o4e0pp0jat41/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part11.rar
https://fileaxa.com/nuri1kstui5i/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part12.rar
https://fileaxa.com/o496hwlr3led/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part13.rar
https://fileaxa.com/xd1b26alt8mh/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part14.rar
https://fileaxa.com/cndlrsfj427j/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part15.rar
https://fileaxa.com/n2k94lnkwf1r/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part16.rar
https://fileaxa.com/iov8u57ou5v6/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part17.rar
https://fileaxa.com/9i2sdyo23kd9/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part18.rar
https://fileaxa.com/r3zf6rozddqc/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part19.rar

RapidGator

Код:
https://rapidgator.net/file/eec3a098287939bd698be324b99c14f3/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part01.rar
https://rapidgator.net/file/12c954f85bc98059da1b19004ed22a96/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part02.rar
https://rapidgator.net/file/39e047c0c324fc989b4ee464ba9e35b9/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part03.rar
https://rapidgator.net/file/2e395b9458287aced72eebd1a34b133c/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part04.rar
https://rapidgator.net/file/669897f898b6945c81aaf60f44c7203e/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part05.rar
https://rapidgator.net/file/abb8b9ef191aa28e947ce3557ce79b04/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part06.rar
https://rapidgator.net/file/7ec63b224b002249287f94f0d25cd9a7/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part07.rar
https://rapidgator.net/file/d51ba78d8fac51ea7e2a5b0db324ead2/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part08.rar
https://rapidgator.net/file/4bcd3f34de0eb48f150ae3bbeb986640/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part09.rar
https://rapidgator.net/file/2cb18d7ee8fbee6cc40b3283c6bd0da6/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part10.rar
https://rapidgator.net/file/68cbc854ad67fee8448bcc500632c5d4/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part11.rar
https://rapidgator.net/file/cdebf6bad779b3dc77bcf9c1422858e8/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part12.rar
https://rapidgator.net/file/801[цензура]86a5b9082240ad6fc18f1b2876/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part13.rar
https://rapidgator.net/file/eb20ce06528e400dd6fae74d0ca5e105/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part14.rar
https://rapidgator.net/file/34cd7459e0cce557240264c7ba441ef4/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part15.rar
https://rapidgator.net/file/db17e6796fc94036b6fb374e4582832c/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part16.rar
https://rapidgator.net/file/157885d8366e0ded05513be1c43219da/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part17.rar
https://rapidgator.net/file/e628494321643a20517549e550a9905b/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part18.rar
https://rapidgator.net/file/3065294dc0dc7454bed320b1c550e3c2/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part19.rar

TurboBit

Код:
https://turbobit.net/1oizqota25i7/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part01.rar.html
https://turbobit.net/gx3mu1pbd776/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part02.rar.html
https://turbobit.net/iby16jfathtz/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part03.rar.html
https://turbobit.net/vb1kegzioy5c/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part04.rar.html
https://turbobit.net/jsycj25wuzbl/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part05.rar.html
https://turbobit.net/msywfzz6cn7u/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part06.rar.html
https://turbobit.net/q30d2nh0iqlb/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part07.rar.html
https://turbobit.net/tgp612mkcr84/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part08.rar.html
https://turbobit.net/acu303r65fv0/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part09.rar.html
https://turbobit.net/cysoxkdnrpkb/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part10.rar.html
https://turbobit.net/i6aywzw46lp0/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part11.rar.html
https://turbobit.net/5idnan1p3sc3/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part12.rar.html
https://turbobit.net/50nsd0zv1y1t/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part13.rar.html
https://turbobit.net/0vbkv1zb5hev/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part14.rar.html
https://turbobit.net/i9xnq65e49b5/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part15.rar.html
https://turbobit.net/idhxyxjebzq7/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part16.rar.html
https://turbobit.net/tskvad78irgb/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part17.rar.html
https://turbobit.net/v8e5bdw8meez/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part18.rar.html
https://turbobit.net/bt75bf78db6z/CBTNuggets_ITCA-Cybersecurity_Fundamentals_Online_Training.part19.rar.html