FileMood

Download UD344

UD344

Name

UD344

 DOWNLOAD Copy Link

Total Size

5.3 GB

Total Files

204

Hash

548F9F168B583FD16E6127725299A659A57D7899

/01 Course Introduction/

001 Welcome to the Course (Updated August E9).mp4

18.7 MB

002 E9 Course Update Informational.html

2.0 KB

003 What This Course Is What It Isnt.mp4

34.4 MB

004 Instructor Introduction (Updated August E9).mp4

141.0 MB

005 Course Curriculum Overview (Added August E9).mp4

38.2 MB

005 Course-Curriculum-Overview.pdf

129.6 KB

006 Udemy Mobile App for iOS Android - Download Take Course Videos On the Go.html

2.1 KB

007 QA Discussion Board Activity Introduce Yourself.mp4

9.3 MB

/02 Getting Started In Information Security/

008 The Many Areas of Information Security (Updated August E9).mp4

109.6 MB

008 The-Many-Areas-of-Information-Security.pdf

149.6 KB

009 Most Valuable IT Security Certifications (Added August E9).mp4

94.9 MB

010 Accenture-Cost-Cyber-Crime-Infographic.pdf

122.2 KB

010 Cybersecurity-Workforce-Demand.pdf

641.6 KB

010 The State of Cybersecurity in E8 and Beyond (Added August E9).mp4

109.0 MB

external-assets-links.txt

0.1 KB

/03 Core Information Security Principles/

011 Section Introduction (Updated August E9).mp4

12.9 MB

012 The CIA Triad.mp4

42.8 MB

012 The-CIA-Triad.pdf

159.5 KB

013 AAA.pdf

111.0 KB

013 Authentication Authorization and Accounting (AAA) - (Added August E9).mp4

21.4 MB

014 Least Privilege (Added August E9).mp4

20.6 MB

014 Least-Privilege.pdf

84.4 KB

015 More Concepts.mp4

32.9 MB

015 More-Concepts.pdf

121.0 KB

016 Legal and Regulatory Issues (Added August E9).mp4

54.2 MB

016 Legal-and-Regulatory-Issues.pdf

125.3 KB

017 Information Security Governance (Added August E9).mp4

66.9 MB

017 InfoSec-Governance.pdf

121.4 KB

018 Authentication Basics.mp4

95.7 MB

018 Authentication-Basics.pdf

290.4 KB

019 Identify Proofing.mp4

23.9 MB

019 Identity-Proofing.pdf

116.8 KB

020 General Password Rules.mp4

57.0 MB

020 General-Password-Rules.pdf

135.9 KB

021 Designing an Authentication Strategy with Microsoft Technet.mp4

92.0 MB

external-assets-links.txt

0.2 KB

/04 Risk Management (Added August E9)/

022 Section Introduction (Added August E9).mp4

25.3 MB

023 Introduction to Risk Management (Added August E9).mp4

130.8 MB

023 Risk-Management.pdf

141.8 KB

024 Exploring Risks and Threats (Added August E9).mp4

27.5 MB

024 Exploring-Risks-and-Threats.pdf

90.3 KB

025 Quantitative Risk Analysis (Added August E9).mp4

64.9 MB

025 Quantitative-Risk-Analysis.pdf

143.5 KB

026 Attack Surface Analysis (Added August E9).mp4

52.8 MB

026 Attack-Surface-Analysis.pdf

126.3 KB

/05 Asset Management (Added August E9)/

027 Section Introduction (Added August E9).mp4

21.4 MB

028 Identifying and Classifying Assets (Added August E9).mp4

28.0 MB

028 Identifying-and-Classifying-Assets.pdf

104.8 KB

029 Asset-Lifecycle.pdf

109.1 KB

029 Understanding the Asset Lifecycle (Added August E9).mp4

42.7 MB

030 Data Retention (Added August E9).mp4

33.3 MB

030 Data-Retention.pdf

102.5 KB

031 Data-States.pdf

95.7 KB

031 Understanding Data States (Added August E9).mp4

36.4 MB

/06 Access Control/

032 Section Introduction (Updated August E9).mp4

20.3 MB

033 Access Control.mp4

94.6 MB

033 Controlling-Access.pdf

163.8 KB

034 Physical and Logical Access Controls.mp4

114.8 MB

034 Physical-and-Logical-Access-Control.pdf

141.2 KB

035 Defense in Depth.mp4

58.0 MB

035 Defense-in-Depth.pdf

261.9 KB

036 Access Control Models.mp4

91.9 MB

036 Access-Control-Models.pdf

146.6 KB

037 Student Activity Analyzing Your Organizations Access Control.mp4

16.4 MB

037 Student-Exercise.pdf

65.9 KB

/07 Security Malware Threats/

038 Intro-to-Malware.pdf

90.9 KB

038 Introduction to Malware (Updated August E9).mp4

4.8 MB

039 Buffer Overflows (Added August E9).mp4

53.0 MB

039 Buffer-Overflows.pdf

154.3 KB

040 Viruses and Polymorphic Viruses (Updated August E9).mp4

23.4 MB

040 Viruses-Polymorphic-Viruses.pdf

122.7 KB

041 Worms (Updated August E9).mp4

12.8 MB

041 Worms.pdf

117.6 KB

042 Trojan Horses (Updated August E9).mp4

16.0 MB

042 Trojan-Horses.pdf

146.2 KB

043 Logic Bombs.mp4

20.0 MB

043 Logic-Bombs.pdf

107.2 KB

044 Spyware and Adware (Updated August E9).mp4

18.7 MB

044 Spyware-and-Adware.pdf

117.1 KB

045 Ransomware (Added August E9).mp4

50.9 MB

046 Rootkit.pdf

84.3 KB

046 Rootkits (Added August E9).mp4

26.0 MB

047 Backdoors (Added August E9).mp4

41.7 MB

048 Zero Day Attacks (Added August E9).mp4

16.3 MB

048 Zero-Day-Attacks.pdf

107.9 KB

049 Protecting Against Malware.mp4

44.2 MB

049 Protecting-Against-Malware.pdf

115.0 KB

/08 Additional Threats Vulnerabilities/

050 Section Introduction (Added August E9).mp4

14.4 MB

051 Social Engineering (Updated August E9).mp4

53.4 MB

051 Social-Engineering.pdf

130.3 KB

052 Email Spam Spoofing Phishing and Pharming (Added August E9).mp4

140.7 MB

052 Spam-Spoofing-Phishing-and-Pharming.pdf

286.4 KB

053 Protocol Spoofing (Added August E9).mp4

54.0 MB

053 Protocol-Spoofing.pdf

227.3 KB

054 Common Attack Methods (Added August E9).mp4

87.5 MB

054 Common-Attack-Methods.pdf

157.7 KB

055 Transmission Media Security Concerns.mp4

106.5 MB

055 Transmission-Media-Security-Issues.pdf

209.4 KB

056 Course Review Request.mp4

15.3 MB

/09 Basic Network Zones/

057 Basic Network Zones.mp4

5.9 MB

057 Basic-Network-Zones.pdf

155.1 KB

058 Internet.mp4

11.8 MB

058 Internet.pdf

134.0 KB

059 DMZ.mp4

27.2 MB

059 DMZ.pdf

143.2 KB

060 Extranet.mp4

25.9 MB

060 Extranet.pdf

140.9 KB

061 Intranet.mp4

25.3 MB

061 Intranet.pdf

139.8 KB

062 Mini-Case Scenario Secure Network Design.mp4

163.4 MB

062 Mini-Case-Scenario-Secure-Network-Design.pdf

503.6 KB

/10 Network Security/

063 Section Introduction (Updated August E9).mp4

24.1 MB

064 Hardware Firewalls (Updated August E9).mp4

87.9 MB

064 Hardware-Firewalls.pdf

226.5 KB

065 IDS-and-IPS.pdf

138.8 KB

065 Intrusion Detection Prevention Systems.mp4

63.8 MB

066 Virtual Private Networks.mp4

126.3 MB

/11 Network Isolation (Added August E9)/

067 Introduction to Network Isolation (Added August E9).mp4

7.2 MB

067 Network-Isolation.pdf

90.6 KB

068 Switch VLANs (Added August E9).mp4

46.5 MB

068 VLANs.pdf

145.4 KB

069 Routers (Added August E9).mp4

26.3 MB

069 Routers.pdf

128.6 KB

070 Honeypots (Added August E9).mp4

18.4 MB

070 Honeypots.pdf

122.1 KB

071 NAT.pdf

256.3 KB

071 Network Address Translation (NAT).mp4

72.4 MB

/12 Wireless Security (Added August E9)/

072 Section Introduction (Added August E9).mp4

16.0 MB

073 Wireless Encryption Standards (Added August E9).mp4

14.4 MB

073 Wireless-Encryption-Standards.pdf

170.4 KB

074 Wireless Equivalent Privacy (WEP) (Added August E9).mp4

27.9 MB

075 Wi-Fi Protected Access (WPA) (Added August E9).mp4

21.7 MB

076 Wi-Fi Protected Access 2 (WPA2) (Added August E9).mp4

28.2 MB

077 Wi-Fi Protected Access 3 (WPA3) (Added August E9).mp4

20.1 MB

078 WPA Enterprise vs. Personal Mode (Added August E9).mp4

23.7 MB

079 Common Wireless Security Threats (Added August E9).mp4

40.6 MB

079 Common-Wireless-Security-Threats.pdf

116.5 KB

/13 Security Assessment and Testing (Added August E9)/

080 Section Introduction (Added August E9).mp4

23.8 MB

081 Vulnerability Assessments (Added August E9).mp4

71.3 MB

081 Vulnerability-Assessments.pdf

163.8 KB

082 Penetration Testing (Added August E9).mp4

70.9 MB

082 Penetration-Testing.pdf

194.5 KB

083 Security Assessments (Added August E9).mp4

18.0 MB

083 Security-Assessments.pdf

88.4 KB

/14 Network Scanning Tools/

084 Section Introduction (Added August E9).mp4

25.3 MB

085 Wireshark Network Sniffing (Added August E9).mp4

74.8 MB

086 SuperScan Port Scanner.mp4

54.7 MB

087 Nmap Zenmap Network Scanner.mp4

62.4 MB

088 Tenable Nessus Vulnerability Scanner.mp4

74.4 MB

external-assets-links.txt

0.2 KB

/15 Hardening End-User Systems and Servers/

089 Section Introduction (Added August E9).mp4

13.0 MB

090 Hardening End-User Systems (Updated August E9).mp4

48.4 MB

090 System-Hardening.pdf

143.8 KB

091 Hardening Servers (Added August E9).mp4

25.4 MB

091 Server-Hardening.pdf

150.7 KB

092 Separation of Services (Added August E9).mp4

17.8 MB

092 Separation-of-Services.pdf

152.0 KB

093 Patch and Change Management.mp4

41.3 MB

093 Patch-and-Change-Management.pdf

105.1 KB

/16 Introduction to Cryptography/

094 Section Introduction (Added August E9).mp4

21.6 MB

095 Intro-to-Cryptography.pdf

133.8 KB

095 Introduction to Crytography (Updated August E9).mp4

37.3 MB

096 Symmetric Encryption (Updated August E9).mp4

75.1 MB

096 Symmetric-Encryption.pdf

190.9 KB

097 Asymmetric Encryption (Updated August E9).mp4

37.2 MB

097 Asymmetric-Encryption.pdf

217.9 KB

098 Hashing Algorithms (Updated August E9).mp4

64.9 MB

098 Hashing.pdf

94.5 KB

099 Digital Certificates and Certificate Authorities (Added August E9).mp4

74.6 MB

099 Digital-Certificates-and-Certificate-Authorities.pdf

204.4 KB

100 Email Encryption Use Cases (Added August E6).mp4

87.9 MB

100 Email-Encryption-Use-Cases.pdf

325.0 KB

101 Windows Encrypted File System Use Case (Added August E9).mp4

58.5 MB

101 Windows-EFS-Overview.pdf

178.0 KB

102 Revisiting VPN (Added August E9).mp4

41.1 MB

102 Revisiting-VPN.pdf

163.6 KB

103 Hardware versus Software Encryption (Added August E9).mp4

42.0 MB

103 SW-vs-HW-Based-Encryption.pdf

277.5 KB

/17 Incident Response Disaster Recovery and Business Continuity (Added August E9)/

104 Section Introduction (Added August E9).mp4

22.3 MB

105 Understanding Incidents and Disasters (Added August E9).mp4

20.3 MB

105 Understanding-Incidents-and-Disasters.pdf

117.9 KB

106 Incident Response (Added August E9).mp4

46.7 MB

106 Incident-Response.pdf

111.2 KB

107 Disaster Recovery and Business Continuity (Added August E9).mp4

136.1 MB

107 DR-adn-BC.pdf

150.2 KB

/18 Personnel Policies/

108 Section Introduction (Updated August E9).mp4

23.4 MB

109 Acceptable Use.mp4

26.4 MB

109 Acceptable-Use.pdf

83.6 KB

110 Code of Ethics.mp4

28.7 MB

110 Code-of-Ethics.pdf

84.0 KB

111 Mandatory Vacations.mp4

23.8 MB

111 Mandatory-Vacations.pdf

84.8 KB

112 Separation of Duties.mp4

31.5 MB

112 Separation-of-Duties.pdf

80.4 KB

113 Job Rotation.mp4

16.9 MB

113 Job-Rotation.pdf

83.4 KB

114 Education and Training.mp4

27.6 MB

114 Education-and-Training.pdf

103.0 KB

/19 Class Mini-Case Scenarios (Updated August E9)/

115 Mini-Case Scenarios Overview (Added August E9).mp4

41.1 MB

116 Class Mini-Case Scenario 1 Small Tax Accounting Office (Updated August E9).html

2.5 KB

116 Class-Mini-Case-Scenario-1.pdf

123.1 KB

117 Class Mini-Case Scenario 2 Growing Marketing Business (Added August E9).html

4.7 KB

117 Class-Mini-Case-Scenario-2.pdf

155.0 KB

/20 Congratulations/

118 Congratulations (Updated August E9).mp4

21.4 MB

 

Total files 204


Copyright © 2024 FileMood.com