Lynda – Securing the IoT – Introduction

Lynda – Securing the IoT – Introduction
English | Size: 236.44 MB
Category: Tutorial

The Internet of Things (IoT) represents the concept of a massive system where things on the Internet communicate through omnipresent sensors. Since the inception of the Internet of Things, consumers have connected smart devices to the network at an exponential rate, bringing us closer to a future where everyday things all interconnect. In this course-the first in a series that focuses on securing the Internet of Things-get started with this essential concept.
[Read more…]

Lynda – Learning Secure Sockets Layer

Lynda – Learning Secure Sockets Layer
English | Size: 286.94 MB
Category: CBTs

Secure Sockets Layer (SSL) is a cryptography protocol to protect web communication. Understanding Secure Sockets Layer takes the complicated subject of using TLS/SSL with public key infrastructure (PKI) for trusted encryption and identity verification, and breaks it down into easy-to-understand components that entry-level IT technicians, consultants, and support staff need to know-regardless of the types of computers, users, or networks supported.
[Read more…]

Lynda – Learning Computer Security Investigation and Response

Lynda – Learning Computer Security Investigation and Response
English | Size: 273.02 MB
Category: Tutorial

Cybersecurity is a growing area of IT. Qualified computer forensics techs are in demand. But even if you aren’t a forensics specialist, it can be useful to know how to collect evidence of harassment, hacking, and identity theft on your own computer or mobile phone.
[Read more…]

Lynda – IT Security Foundations – Network Security

Lynda – IT Security Foundations – Network Security
English | Size: 273.40 MB
Category: CBTs

Network security is the keystone of IT security, and an important component of the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). In this installment of Foundations of IT Security, series creator Lisa Bock will cover one of the main topics of the exam: securing an organization’s network to keep interconnected systems and data safe. The course introduces security devices such as firewalls and packet inspectors, network isolation, and common security protocols. She also provides an overview of how to protect clients with antivirus software, encrypt offline files, and implement software restriction policies. Finally, she looks at the often-overlooked topics of mobile device and physical security, which includes securing a building’s perimeter and the hardware within.
[Read more…]

Lynda – IT Security Foundations – Core Concepts

Lynda – IT Security Foundations – Core Concepts
English | Size: 202.18 MB
Category: Tutorial

Computing and Internet security are everyone’s business, but it’s especially critical for information technology specialists. Learning the core concepts of operating-system and network-level security helps avoid ongoing threats and eliminate system vulnerabilities. This beginner-level course covers core security concepts and introduces risks such as social engineering, malware, and spyware. Foundations of IT Security series creator Lisa Bock will also go over some basic wireless security best practices, tips for beefing up browser security, and techniques for implementing encryption.
[Read more…]

Lynda – Ethical Hacking – Overview

Lynda – Ethical Hacking – Overview
English | Size: 133.07 MB
Category: CBTs

What is ethical hacking? When it comes to cybersecurity, hacking comes in many colors: white, grey, black, and shades in between. White hat hackers use their skills for good. They practice ethical hacking: involved testing to see if an organization’s network is vulnerable to outside attacks. Ethical hacking is key to strengthening network security, and it’s one of the most desired stills for any IT security professional. If you’re interested in becoming an ethical hacker, or getting started securing your own network, this introduction is for you. [Read more…]

Lynda – Cybersecurity with Cloud Computing

Lynda – Cybersecurity with Cloud Computing
English | Size: 355.18 MB
Category: CBTs

How do you keep your organization’s files, applications, and accounts safe on the cloud? It starts with a considered design approach. In these videos, Malcolm Shore outlines the major cloud security risks, some of which have resulted in service disruptions at companies like Azure, Dropbox, Google, and Amazon, and shows how to plan for and minimize risk when it comes to your own cloud deployments. He introduces concepts such as software as a service (SaaS) and infrastructure as a service, and the differences between public and private clouds. Then, after reviewing the cloud security best practices from the Cloud Security Alliance and the European Network and Information Security Agency (ENISA), Malcolm shows how to use SABSA, a popular security requirements mapping approach, to figure out the business requirements for a successful and secure cloud deployment of your own. [Read more…]

Lynda – Cybersecurity for IT Professionals

Lynda – Cybersecurity for IT Professionals
English | Size: 292.61 MB
Category: CBTs

Protect your network from cyber attacks. Malcolm Shore shows how to use the latest tools to discourage and combat hackers, phishers, and snoops attempting to infiltrate your Windows and Linux systems. Learn what forms cyber attacks can take, and the two most common types of protection you can build into your system: antivirus protection and firewalls. Then learn how to scan your network for suspicious files, detect intruders with Netcat, and identify vulnerabilities at the host level with Nessus scans. Malcolm also shows how to avoid common security mistakes and monitor packet-level activity on your network. [Read more…]

Lynda – Cybersecurity Foundations

Lynda – Cybersecurity Foundations
English | Size: 288.60 MB
Category: CBTs

Set a rock solid foundation for your network, users, and data by learning about the basics of cybersecurity. Security expert Malcolm Shore shows how to assess and mitigate risks using various cybersecurity frameworks and control standards, such as NIST, COBIT 5, ISO 27000, and the Payment Card Industry Data Security Standard (PCI DSS). He’ll also show how to detect hidden and cloaked files, evaluate and avoid threats such as malware, architect security to align with business needs using SABSA, manage user access, and prepare for and respond to cybersecurity incidents when they do occur.
[Read more…]

Career Academy Certified Information Systems Security Officer CISSO Series

Career Academy Certified Information Systems Security Officer CISSO Series
English | Size: 2.94 GB
Category: Tutorial

This series covers everything you need to know about becoming a Certified Information Systems Security Officer. Students will learn about risk management, security management, authentication, access control, security models, operations security, symmetric cryptography and hashing, asymmetric cryptography and PKI, network connections, network protocols and devices, telephony, VPNs and wireless, security architecture, software development security, database security and system development, business continuity, disaster recovery, incident management, law, and ethics, and physical security.
[Read more…]