FileMood

Download The Absolute Beginners Guide to Cybersecurity

The Absolute Beginners Guide to Cybersecurity

Name

The Absolute Beginners Guide to Cybersecurity

 DOWNLOAD Copy Link

Total Size

7.5 GB

Total Files

185

Last Seen

2024-06-30 02:08

Hash

B78A630C29EA0D5D4678D175875A5937F2BD5296

/.../Chapter 06 Conclusion/

001. You Have Been HACKED - Now What.mp4

193.9 MB

002. Wrap Up.mp4

24.7 MB

/.../Chapter 01 General Introduction to IT and Cyber Security/

002. Difference Between Information Security and Cyber Security.mp4

84.6 MB

003. The Trinity of IT Security - CIA.mp4

9.5 MB

004. Computer Protocols.mp4

34.5 MB

005. The TCPIP.mp4

11.2 MB

001. Welcome to the Course.mp4

35.8 MB

/.../Chapter 02 Hackers - Who Are They/

001. Section Introduction.mp4

17.1 MB

002. What Is NOT Hacking.mp4

118.6 MB

003. Types of Hackers.mp4

35.2 MB

004. The Hacking Methodology.mp4

39.3 MB

005. The WhoIS Query.mp4

30.9 MB

006. Social Engineering.mp4

89.9 MB

/.../Chapter 03 Attacks/

001. Introduction to the Section.mp4

12.9 MB

002. Brute Force Attacks.mp4

17.2 MB

003. Phishing.mp4

78.9 MB

004. Phishing - Part 2.mp4

42.2 MB

005. Bots and Botnets.mp4

13.4 MB

006. DoS and DDoS.mp4

14.1 MB

007. Pings.mp4

24.6 MB

008. Man in the Middle Attacks.mp4

11.1 MB

009. SQL Injections.mp4

16.8 MB

/.../Chapter 04 Malware/

001. Introduction to Malware.mp4

23.5 MB

002. Viruses and Worms.mp4

33.5 MB

003. Trojans.mp4

66.1 MB

004. Adware and Spyware.mp4

21.6 MB

005. Ransomware.mp4

47.5 MB

006. Other Types of Malwares.mp4

22.0 MB

/.../Chapter 05 Defenses/

001. Section Introduction.mp4

15.9 MB

002. Firewalls.mp4

12.8 MB

003. Encryption.mp4

19.1 MB

004. Biometrics.mp4

20.6 MB

005. Antivirus.mp4

14.9 MB

006. Factor Authentication Methods.mp4

29.2 MB

007. Honey Pots and DMZs.mp4

17.1 MB

008. Security for Wireless Networks.mp4

5.9 MB

009. Password Management.mp4

133.9 MB

/.../Chapter 06 Cyber Security at the Workplace/

001. Section Introduction.mp4

38.4 MB

002. Cyber Security Policies.mp4

22.4 MB

003. BYOD Management.mp4

87.6 MB

004. A Sample BYOD Policy.mp4

20.6 MB

005. The Security Versus Ease of Access Paradox.mp4

88.6 MB

006. The Weakest Link and the Disgruntled Employee.mp4

57.1 MB

/.../Chapter 07 Cyber Warfare and Cyber Attacks Against Companies/

001. Introduction to Cyber Warfare.mp4

67.1 MB

002. The Attack Against Estonia.mp4

187.3 MB

003. Stuxnet and the Attack Against Iran.mp4

105.1 MB

004. The Colonial Pipeline Attack.mp4

40.5 MB

005. The Sony Hack.mp4

54.4 MB

/.../Chapter 08 Conclusion/

001. Conclusion.mp4

26.7 MB

/.../Chapter 01 Introduction/

001. Welcome to the Course.mp4

115.3 MB

/.../Chapter 02 Networking 101/

001. Section Preview.mp4

15.4 MB

002. MAC Addresses and IP Addresses.mp4

48.3 MB

003. Hubs, Switches, and Routers.mp4

23.9 MB

004. Ethernet 101.mp4

15.6 MB

005. HTTP, HTTPS, SSL, and TLS.mp4

37.6 MB

006. The Internet Protocol Suite - TCPIP.mp4

22.1 MB

007. Understanding the DNS System.mp4

25.0 MB

/.../Chapter 03 The Internet - Privacy and Survival of the Paranoid/

001. Section Preview.mp4

17.9 MB

002. What are Privacy, Anonymity, and Pseudonymity.mp4

33.1 MB

003. Identity Strategies.mp4

38.3 MB

004. How We Are Tracked Online.mp4

80.6 MB

005. The Facebook Data Mining Scandal.mp4

66.7 MB

006. Five Places You Are Tracked Online.mp4

65.5 MB

007. Browsing in Incognito Mode - The Shocking Truth!.mp4

8.9 MB

008. The Brave Browser.mp4

41.5 MB

009. How to Disappear Online.mp4

32.3 MB

010. Introduction to Stylometry.mp4

58.7 MB

/.../Chapter 04 Anonymizers, Proxies, Virtual Private Networks, and Tor/

001. Section Preview.mp4

15.9 MB

002. Anonymizer.mp4

14.8 MB

003. Introduction to Proxy Servers.mp4

32.9 MB

004. Introduction to VPNs.mp4

38.9 MB

005. Types of VPNs.mp4

25.6 MB

006. NordVPN.mp4

29.9 MB

007. VPN Myths Debunked.mp4

21.3 MB

008. Introduction to Tor.mp4

58.9 MB

009. Tor Weaknesses.mp4

40.5 MB

010. Attacking Tor - The End-to-End Correlation Hack.mp4

32.6 MB

011. Accessing the Dark Web with Tor.mp4

62.1 MB

012. Darknets.mp4

15.1 MB

013. VPN + Tor.mp4

20.0 MB

014. Meet Eldo Kim.mp4

34.8 MB

/.../Chapter 05 Malware, Viruses, Rootkits, Ransomware, and Attacks/

001. Section Preview.mp4

14.2 MB

002. Introduction to Malware.mp4

20.8 MB

003. Choosing the Right Antivirus Software.mp4

72.1 MB

004. Rootkits.mp4

34.8 MB

005. Securing the Windows 10 Boot Process.mp4

41.7 MB

006. Using GMER - Rootkit Scanner.mp4

9.2 MB

007. Ransomware - Cryptolocker, WannaCry, Bad Rabbit.mp4

73.5 MB

008. Using the Inbuilt AntiRansomware Tool.mp4

7.3 MB

009. CC Cleaner.mp4

39.1 MB

010. BleachBit.mp4

29.6 MB

011. Malwarebytes.mp4

29.9 MB

/.../Chapter 06 Backups, Storage, the Cloud, and Encryption/

001. Section Preview.mp4

15.6 MB

002. How to Back Up Your Computer.mp4

18.2 MB

003. What Is the Cloud.mp4

40.5 MB

004. Disk Encryption.mp4

30.3 MB

005. Encrypting with Veracrypt.mp4

69.4 MB

006. Encrypting Windows 10 with Bitlocker.mp4

25.5 MB

007. Encrypting Mac OS with FileVault.mp4

6.2 MB

008. Self-Encrypting Drives.mp4

5.5 MB

009. Attacks Against Encryption.mp4

48.9 MB

/.../Chapter 07 Social Engineering - Scams, Cons, Tricks, and Fraud/

001. Section Preview.mp4

10.8 MB

002. What Is Social Engineering.mp4

62.9 MB

003. Reconnaissance Methods.mp4

94.3 MB

004. Anatomy of a Social Engineering Attack.mp4

64.2 MB

005. The Way Back Machine.mp4

22.7 MB

006. Meet Kevin Mitnick.mp4

8.0 MB

/.../Chapter 08 The World of Electronic Mails – Dangers, Attacks, and Protection/

001. The World of Electronic Mails – Dangers, Attacks, and Protection.mp4

16.5 MB

002. Email Basics, Protocols and Ports.mp4

24.0 MB

003. How to Track Sent Emails.mp4

20.8 MB

004. How to Detect Email Tracking.mp4

20.0 MB

005. Guerrilla Mail.mp4

27.7 MB

006. Introducing Proton Email.mp4

24.9 MB

007. Phishing Attacks.mp4

23.9 MB

008. Scam Email Live Example.mp4

61.8 MB

/.../Chapter 09 Windows 10 Hardening, Privacy, and Security/

001. Section Preview.mp4

7.2 MB

002. Patching and Updates.mp4

29.6 MB

003. Windows 10 Privacy - Turning Off Ad Tracking.mp4

12.8 MB

004. Windows 10 Privacy - Restricting Cortana.mp4

21.0 MB

005. Windows 10 Privacy - Turning Off Location Tracking.mp4

12.6 MB

006. Windows 10 Privacy - Turning Off Peer Updates.mp4

12.0 MB

007. Windows 10 Hardening - The Windows 10 Firewall.mp4

8.9 MB

008. Windows 10 Hardening - Enabling the Smart Screen Filter.mp4

10.6 MB

009. Windows 10 Hardening - Randomizing the MAC Address.mp4

9.3 MB

/.../Chapter 10 Conclusion/

001. Conclusion.mp4

13.9 MB

/.../Chapter 01 The World of the Mobile Device/

001. Welcome to the Course.mp4

21.4 MB

002. Mobile Device Usage - The Astounding Number.mp4

23.3 MB

003. Android Versus Apple Versus Blackberry.mp4

15.2 MB

/.../Chapter 02 Understanding Applications/

001. Introduction.mp4

30.4 MB

002. Google Play Versus the App Store.mp4

74.1 MB

003. How to Identify Legit Apps and Spot Fake Apps.mp4

83.4 MB

004. WhatsApp Scam.mp4

17.8 MB

005. The Truth about Jail Breaking an IOS Device.mp4

42.6 MB

006. Understanding App Permissions.mp4

18.5 MB

007. Checking Default App Permissions - Android.mp4

115.4 MB

008. Checking Default App Permissions - IOS.mp4

39.6 MB

009. 4 Ways to Work Safely with Mobile Applications.mp4

10.7 MB

/.../Chapter 03 Mobile Threats and Countermeasures/

001. Introduction to Mobile Malware.mp4

32.4 MB

002. Mobile Ransomware.mp4

13.5 MB

003. Removing Ransomware.mp4

63.3 MB

004. Trojan.mp4

45.9 MB

005. Viruses and Spyware.mp4

16.2 MB

006. The 4 Main Symptoms of Malware Infection.mp4

12.5 MB

007. How to Use Malwarebytes.mp4

126.9 MB

/.../Chapter 04 Mobile Security Apps/

001. Virtual Private Networks and Why You Need One.mp4

18.7 MB

002. How to Use NordVPN.mp4

101.4 MB

003. How to Safely Access Public Wi-Fi.mp4

56.1 MB

004. Android Security Tweaks.mp4

64.1 MB

005. Find My Device - Android.mp4

23.7 MB

006. Find My iPhone.mp4

42.6 MB

/.../Chapter 05 Conclusion/

001. Top 10 Mobile Security Tips.mp4

32.1 MB

002. Conclusion.mp4

11.9 MB

/.../Chapter 01 Introduction/

001. Welcome to the Course.mp4

106.5 MB

002. Personal Cybersecurity - What I Do.mp4

193.1 MB

/.../Chapter 02 Internet and Browsing Security/

001. Internet Privacy Tools.mp4

33.2 MB

002. Browser Security - Mozilla Firefox.mp4

79.7 MB

003. Browser Security - Brave Browser.mp4

47.7 MB

004. HTTP and HTTPS.mp4

38.1 MB

005. Introduction to Cookies.mp4

47.4 MB

006. Using VPNs.mp4

36.6 MB

007. Creating New Accounts and Logging In (DO NOT DO THIS).mp4

25.5 MB

008. Securing Your Home Router.mp4

11.4 MB

/.../Chapter 03 Personal Security/

001. Understanding Malware and Anti-Malware Products.mp4

64.9 MB

002. Password Management.mp4

72.5 MB

003. Introduction to Password Managers.mp4

21.3 MB

004. Two-Factor Authentications.mp4

32.9 MB

005. Protecting Yourself Against SIM Card Swap Fraud.mp4

93.5 MB

006. Backups.mp4

46.0 MB

007. Creating a Personal Disaster Recovery Plan.mp4

28.8 MB

008. Have I Been Pwned.mp4

33.5 MB

/.../Chapter 04 Social Media Security and Email Security/

001. Social Media Ethics.mp4

69.4 MB

002. Social Media Ethics - Part 2.mp4

26.5 MB

003. How to Secure Your Facebook Account.mp4

38.6 MB

004. How to Secure Your LinkedIn Account.mp4

48.7 MB

005. How to Secure Your Twitter Account.mp4

16.3 MB

006. Phishing Attacks.mp4

36.9 MB

007. Email Data Management.mp4

23.6 MB

008. How to Secure Your Google Account.mp4

15.8 MB

009. How to Secure Your Google Account - Part 2.mp4

11.0 MB

010. How to Set Up a Recovery Email.mp4

16.5 MB

/.../Chapter 05 Mobile Security/

001. Introduction.mp4

50.6 MB

002. Understanding App Permissions.mp4

17.3 MB

003. Checking Default App Permissions - Android.mp4

115.6 MB

004. Checking Default App Permissions - IOS.mp4

39.4 MB

005. How to Identify Legit Apps.mp4

86.0 MB

 

Total files 185


Copyright © 2024 FileMood.com