[LinkedIn Learning] Lisa Bock - IT Security Foundations Core Concepts
- 收录时间:2021-11-29 01:22:02
- 文件大小:265MB
- 下载次数:1
- 最近下载:2021-11-29 01:22:02
- 磁力链接:
-
文件列表
- 2. Core Security Principles/3. Avoiding scam artists.mp4 26MB
- 2. Core Security Principles/4. Analyzing the attack surface.mp4 16MB
- 2. Core Security Principles/1. Keeping information safe.mp4 14MB
- 3. Understanding Malware/1. Explaining viruses and worms.mp4 14MB
- 5. Investigating Internet Security/3. Blocking malicious content.mp4 14MB
- 6. Mobile and Wireless Security/2. Sharing a secret.mp4 13MB
- 2. Core Security Principles/5. Modeling threats.mp4 12MB
- 6. Mobile and Wireless Security/4. Protecting mobile devices.mp4 12MB
- 6. Mobile and Wireless Security/1. Securing your Wi-Fi.mp4 12MB
- 4. Getting Into Your System/4. Exploiting the unknown.mp4 11MB
- 3. Understanding Malware/3. Holding data hostage.mp4 11MB
- 5. Investigating Internet Security/1. Using secure websites.mp4 11MB
- 4. Getting Into Your System/1. Stopping the imposters.mp4 10MB
- 2. Core Security Principles/2. Managing risk.mp4 10MB
- 4. Getting Into Your System/3. Overflowing the buffer.mp4 10MB
- 5. Investigating Internet Security/2. Accepting cookies.mp4 9MB
- 5. Investigating Internet Security/4. Avoiding browser threats.mp4 9MB
- 7. Secure Devices and Applications/2. Understanding cryptography.mp4 9MB
- 4. Getting Into Your System/2. Getting in the backdoor.mp4 8MB
- 3. Understanding Malware/2. Eliminating unwanted surveillance.mp4 7MB
- 1. Introduction/1. Tech savvy, tech safe.mp4 6MB
- 7. Secure Devices and Applications/1. Keeping data private.mp4 6MB
- 6. Mobile and Wireless Security/3. Concealing your access point.mp4 6MB
- 7. Secure Devices and Applications/3. Email security.mp4 4MB
- 1. Introduction/2. Prepare for MTA Exam 98-367.mp4 3MB
- 8. Conclusion/Next steps.mp4 2MB
- Glossary_IT_Security_CoreConcepts/Glossary_IT_Security_CoreConcepts.pdf 84KB
- ReadMe.txt 2KB