Pluralsight – Threat Intelligence: The Big Picture

Pluralsight – Threat Intelligence: The Big Picture
English | Size: 159.46 MB
Category: Tutorial

Security incidents have become harder to detect, mostly because of the increase in malware complexity and variety. In this course, Threat Intelligence: The Big Picture, you’ll learn the foundational knowledge of Cyber Threat Intelligence. First, you’ll explore how to classify indicators of compromise using industry standard methodologies. Next, you’ll discover how to search for and consume existing intelligence about the threats that you’re dealing with. Finally, you’ll cover how to maintain the quality of malware detections with a solid set of best practices. When you’re finished with this course, you’ll have the skills and the knowledge of threat intelligence to implement it into your current incident handline process.
[Read more…]

Pluralsight – Information Security Manager Information Security Governance

Pluralsight – Information Security Manager: Information Security Governance
English | Size: 457.34 MB
Category: CBTS

While protecting information assets is the primary goal of an information security program, governance sets the requirements for how the program must function within the compliance context. Organizations must operate their security programs in compliance with laws, regulations, policies, and standards. In this course, Information Security Manager: Information Security Governance, you’ll gain solid foundational knowledge on the governance aspect of security, as well as skills you can use to effectively manage security compliance in your organization. First, you’ll explore how both internal and external governance affect the organization, how information security strategy supports the mission and overall organizational strategy, and the different roles and responsibilities involved in the security program. Next, you’ll learn how to write business cases to support security budgets and investments. Finally, you’ll cover stakeholders and how to communicate the security strategy to them and gain their commitment to it. By the end of this course, you’ll be well-versed in information security governance and how it affects an information security program. [Read more…]

ITPro.tv – CompTIA Security+ (SY0-401) (2017)

ITPro.tv – CompTIA Security+ (SY0-401) (2017)
English | Size: 22.73 GB
Category: CBTs

Contents:
./0 – Overview of CompTIA Security+ (SY0-401):
0.0 – Introduction to Security+

./1 – Network Security:
1.0 – Network Design
1.1 – Protocols and Services
[Read more…]

ITPro TV – FirePOWER with Advanced FireSIGHT Administration


ITPro TV – FirePOWER with Advanced FireSIGHT Administration
English | Size: 5 GB
Genre: eLearning

[Read more…]

ITPro TV – CCNP Routing and Switching – TSHOOT


ITPro TV – CCNP Routing and Switching – TSHOOT
English | Size: 8 GB
Genre: eLearning

[Read more…]

ITPro TV – CCNP Routing and Switching – SWITCH


ITPro TV – CCNP Routing and Switching – SWITCH
English | Size: 7 GB
Genre: eLearning

[Read more…]

Hakin9 Collection 2003-2017

Hakin9 Collection 2003-2017
English | Size: 1.58 GB
Category: CBTS

Here is a collection I made of the Hakin9 magazine. These files are retrieved directly from
It contains all the magazines from 2003 until May 2017.
Good download and good reading [Read more…]

ITPro TV – CCNP Routing and Switching – ROUTE


ITPro TV – CCNP Routing and Switching – ROUTE
English | Size: 19 GB
Genre: eLearning

[Read more…]

Pluralsight – Advanced Persistent Threats: The Big Picture

Pluralsight – Advanced Persistent Threats: The Big Picture
English | Size: 184.25 MB
Category: CBTs

Whether you’ve been in the information security field or not, you’ve definitely heard of them. Advanced Persistent Threats (APT), are responsible for some of the largest cyber-attacks in history. How do you defend against these threats? Where do you even begin? In this course, Advanced Persistent Threats: The Big Picture, you’ll learn everything that you might want to know about APTs. First, you’ll develop an understanding of their motives and identities. Next, you’ll explore when to classify a threat as an APT, and more importantly, when not to. Then, you’ll learn how to assess your own risk and set up a system to detect these threats before it’s too late. Finally, you’ll finish up with implementing practical defense mechanisms. By the end of this course, you’ll understand where APTs come from, what their goals are, how to detect and classify them, and minimize risk of threat from APTs.
[Read more…]

Livelessons – Network Programmability Fundamentals


Livelessons – Network Programmability Fundamentals
English | Size: 7.41 GB
Genre: eLearning

[Read more…]