Cyber Security – Steps to prevent a web hacker

Cyber Security – Steps to prevent a web hacker
English | Size: 946.94 MB
Category: Udemy


Description
This course is for everyone who uses a computer. With cybercriminals lurking and almost invisible until you are someone you know have been affected. Just like most crimes you still have the upper hand. With the computers, you have to be educated about the tricks that will appear. It’s like you’re sitting in front of your door that you open and close, you can see who comes through it. And you have control over when to open it. Likewise, you control who is allowed to enter your computer. Are you leaving the door to you computer open?. The tactic of Social Engineering and the many phishing and spoofing tricks can be rebutted. This course is design to perk up you eye and so to not fall for the scams of the perpetrators. [Read more…]

SKILLSHARE CYBER SECURITY FUNDAMENTALS 2019

SKILLSHARE CYBER SECURITY FUNDAMENTALS 2019
English | Size: 447.05 MB
Category: Tutorial


What you’ll learn

Describe the current cybersecurity landscape
Explain the Assume Compromise approach to security
Red team versus Blue team exercises
Red team kill chain, including: Reconnaissance Beachhead Persistence Lateral movement Elevation Exfiltration.
Blue team kill chain, including Gathering baseline data Detection Alerting Investigation Response Execution
Organizational preparation, security processes, and responses
[Read more…]

Fundamentals of Pentest, Ethical Hacking and Cyber Security

Fundamentals of Pentest, Ethical Hacking and Cyber Security
English | Size: 2.22 GB
Category: Tutorial

Gain the ability to do ethical hacking and penetration testing by taking this course! Get answers from an experienced IT expert to every single question you have related to the learning you do in this course including installing Kali Linux, installing Metasploitable, installing Windows, How to use Virtual Machine Workstation or Oracle VirtualBox, basics of Linux and Distributions, VPN, Macchanger, Nmap, cracking wifi, aircrack, DoS attacks, SLL strip, known vulnerabilities, SQL injections, cracking Linux passwords, and much much more topics that are added regularly!
[Read more…]

Oreilly – Cyber Security Analyst and Enterprise Architecture

Oreilly – Cyber Security Analyst and Enterprise Architecture
English | Size: 8.68 GB
Category: E-learning | Security

The CompTIACSA (cySa)Bootcamp is geared towards experienced ITSecurity pros to prepare for the CyberSecurity Analyst exam .
This is an Intermediate level course and not meant for inexperienced ITSecurity professionals.
CompTIA Cybersecurity Analyst (CSA+)is an international, vendor-neutral cybersecurity certification that applies behavioral analytics to improve the overall state of IT security.
CSA+ validates critical knowledge and skills that are required to prevent, detect and combat cybersecurity threats.As attackers have learned to evade traditional signature-based solutions such as firewalls, an analytics-based approach within the IT securityindustry is increasingly important for most organizations.
The behavioral analytics skills covered by CSA+ identify and combat malware, and advanced persistent threats (APTs), resulting in enhanced threat visibility across a broad attack surface.
[Read more…]

Packt Cyber Threat Hunting

Packt Cyber Threat Hunting
English | Size: 978.12 MB
Category: Tutorial

Threat hunting is the proactive technique that focuses on the pursuit of attacks and the evidence that attackers leave behind when they conduct reconnaissance, attack with malware, or exfiltrate sensitive data. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able to carry out their attacks and take illegal advantage of them. [Read more…]

Blue Team Training – Cyber Security and Incident Response

Blue Team Training – Cyber Security and Incident Response
English | Size: 603.55 MB
Category: CBTs

Blue Team Training – Cyber Security and Incident Response
For security analysts that want to detect more threats and sharpen their cyber hunting skills [Read more…]

Cyber Security – Endpoint protection

Cyber Security – Endpoint protection
English | Size: 2.83 GB
Category: CBTs

Endpoint security or endpoint protection is an approach to the protection of computer networks that are remotely bridged to client devices. The connection of laptops, tablets, mobile phones and other wireless devices to corporate networks creates attack paths for security threats.[1][2] Endpoint security attempts to ensure that such devices follow a definite level of compliance to standards.[3]
[Read more…]

The Absolute Beginners Guide to Cyber Security 2019 – Part 3

The Absolute Beginners Guide to Cyber Security 2019 – Part 3
English | Size: 1.74 GB
Category: Tutorial

** PART 3 OF THE BEST SELLING CYBER SECURITY GUIDE FOR BEGINNERS SERIES **

In a world where smartphones and other mobile devices generate over 52% of all internet traffic, the security of such mobile devices has never been more important.

Welcome to the complete 2019 cyber security guide for mobile devices. In this short but intensive course, you are going to learn practical skills and techniques to protect your mobile device against hackers and malware.
[Read more…]

The Absolute Beginners Guide to Cyber Security 2019 – Part 2

The Absolute Beginners Guide to Cyber Security 2019 – Part 2
English | Size: 5.03 GB
Category: CBTs

Take your basic knowledge of cyber security to a whole new level with this exciting course that promises to be educational, informative and fun filled.

Build upon a basic foundation in Cyber Security with a strong focus on the following core topics.

Networking [Read more…]

The Absolute Beginners Guide to Cyber Security 2019 – Part 1

The Absolute Beginners Guide to Cyber Security 2019 – Part 1
English | Size: 2.45 GB
Category: Tutorial

Have you ever wondered exactly how hackers ‘hack’? Do words like firewalls, encryption, bio-metrics and malware sound confusing to you? Have you been looking for a course that teaches you all the basics of both information and cyber security in a fun relaxed manner? If so then you are going to find this course absolutely perfect for you.
[Read more…]

Skip to toolbar