Cybersecurity (Attacks Red Team Activity) | Packt Publishing

Cybersecurity (Attacks Red Team Activity) | Packt Publishing
English | Size: 934.14 MB
Category: CBTs

There is only way to become really good at cybersecurity: you must know both how to attack and how to defend. First of all, you have to learn to think like a hacker, so you deeply understand what the threats are. Then you’ll need to know how to protect yourself from the attacks. We start with precise descriptions and examples of network attacks to show you how the malicious hackers can break into your network-and what harm they can do. Then we’ll look at another attack vector: websites and web-applications. You’ll see the most vulnerable places and understand what cybercriminals will do if they find them.Then we’ll discover the third vector of attacks: humans. [Read more…]

Cybersecurity (Attacks Red Team Activity)

Cybersecurity (Attacks Red Team Activity)
English | Size: 934.14 MB
Category: CBTs

There is only way to become really good at cybersecurity: you must know both how to attack and how to defend. First of all, you have to learn to think like a hacker, so you deeply understand what the threats are. Then you’ll need to know how to protect yourself from the attacks. We start with precise descriptions and examples of network attacks to show you how the malicious hackers can break into your network-and what harm they can do. Then we’ll look at another attack vector: websites and web-applications. You’ll see the most vulnerable places and understand what cybercriminals will do if they find them.Then we’ll discover the third vector of attacks: humans.
[Read more…]

Packt Publishing – CompTIA Cybersecurity Analyst CSA+ CS0-001


Packt Publishing – CompTIA Cybersecurity Analyst CSA+ CS0-001
English | Size: 2.26 GB
Genre: eLearning

[Read more…]

Lynda – Cybersecurity Awareness – The Internet of Things (IoT)

Lynda – Cybersecurity Awareness – The Internet of Things (IoT)
English | Size: 95.88 MB
Category: IOT

The Internet of Things (IoT) will change our personal and professional lives forever. By 2020, there are expected to be over 50 billion devices communicating through the internet, ranging from doorbells and thermostats, to cars and washing machines. These devices can make our lives easier and more efficient, but the technology may put our safety and privacy at risk. Knowing about the how the Internet of Things works and what we can do to be safe is important. In this course, Tom Tobiassen provides a basic understanding of IoT, including robots, wearable tech, smart cars, and drones. He discusses the security and privacy implications as well as protective countermeasures that even casual IoT users should know. [Read more…]

Lynda – Cybersecurity Awareness – Security for Cloud Services

Lynda – Cybersecurity Awareness – Security for Cloud Services
English | Size: 111.34 MB
Category: Tutorial

Many organizations are abandoning on-premises hosting in favor of cloud services-however, cloud computing is still a mystery to many. By becoming better acquainted with the various types of cloud offerings-as well as the general security risks involved with each option-companies and organizations can determine if cloud services are right for them. This course covers the different types of cloud service offerings, and presents security advantages and disadvantages as well. Plus, learn about the risks associated with using Skype and Dropbox, as well as risk mitigation strategies. [Read more…]

Lynda – Cybersecurity Awareness – Identifying Personally Identifiable Information

Lynda – Cybersecurity Awareness – Identifying Personally Identifiable Information
English | Size: 144.27 MB
Category: CBTs

As we use our computers to play games, pay for goods and services, and apply for jobs, our online identity is constructed from bits of information that we may or may not be conscious of revealing or sharing. This course discusses different information sources about who we are, what we do, where we are, and with whom we are associated-and how we can protect that information from misuse or corruption. Instructor Jennifer Kurtz explains how personally identifiable information (PII) is formed, and how it is valued and used in the marketplace by legitimate and criminal actors. She also covers the formal and informal capture of PII; goes into the legal and regulatory properties of PII; dives into breach case studies in the medical, financial, educational, government, and commercial sectors; and offers PII protection practices for both individuals and organizations. [Read more…]

Lynda – Cybersecurity Awareness – Cybersecurity While Traveling

Lynda – Cybersecurity Awareness – Cybersecurity While Traveling
English | Size: 86.66 MB
Category: CBTs

Tightly controlled security is a lot tougher when you are on the road. Learn about the various cybersecurity situations you will run into while traveling, and the technology that can be used to help keep you safe. This course reviews the triangle of security, as well as wireless and wired threats and countermeasures. Instructor Jordan Scott designed the training primarily to raise awareness of travel situations commonly encountered while trying to maintain connectivity. This includes accessing open Wi-Fi networks securely, using SSL, setting up VPNs, and more. [Read more…]

Lynda – Cybersecurity Awareness – Building Your Cybersecurity Vocabulary

Lynda – Cybersecurity Awareness – Building Your Cybersecurity Vocabulary
English | Size: 99.57 MB
Category: Tutorial

Cybersecurity can be an intimidating world to navigate. To speak intelligently on the subject, one must have a basic understanding of certain acronyms and terminology-much of which isn’t immediately easy to decode. This practical course was designed to help beginners build their cybersecurity vocabulary, and give them the foundational knowledge they need to approach this subject with confidence. Here, instructor Serge Borso breaks down the vocabulary heard in the cybersecurity industry, and presents scenarios where those words, phrases, and acronyms are used. Upon wrapping up this course, you should have a solid foundation of what cybersecurity is, and what it entails. [Read more…]

Livelessons – CompTIA Cybersecurity Analyst CSA+ (CS0-001)

Livelessons – CompTIA Cybersecurity Analyst CSA+ (CS0-001)
English | Size: 9.18 GB
Category: Tutorial

The CompTIA Cybersecurity Analyst CSA+ (CS0-001) Complete Video Course is an engaging, self-paced video training solution that provides learners with 12 hours of personal, visual instruction from two cybersecurity expert trainers. Through the use of topic-focused instructional videos, you will gain an in-depth understanding of each objective in the CompTIA CSA+ exam as well as a deeper understanding of cyber security foundations and principles. [Read more…]

Livelessons – CompTIA Cybersecurity Analyst CSA+ (CS0-001) Complete – All Lessons

Livelessons – CompTIA Cybersecurity Analyst CSA+ (CS0-001) Complete – All Lessons
English | Size: 10.39 GB
Category: CBTs

12 hours of deep-dive training covering every objective in the CompTIA Cybersecurity Analyst CSA+ (CS0-001) exam

The CompTIA Cybersecurity Analyst CSA+ (CS0-001) Complete Video Course is an engaging, self-paced video training solution that provides learners with 12 hours of personal, visual instruction from two cybersecurity expert trainers. Through the use of topic-focused instructional videos, you will gain an in-depth understanding of each objective in the CompTIA CSA+ exam as well as a deeper understanding of cyber security foundations and principles.
[Read more…]