[ TutGee.com ] Linkedin - Practical Cybersecurity for IT Professionals
File List
- ~Get Your Files Here !/04 - 3. Firewalls/03 - Advanced Windows Firewall.mp4 25.8 MB
- ~Get Your Files Here !/05 - 4. Network Scanning/01 - Getting started with Nmap.mp4 21.0 MB
- ~Get Your Files Here !/02 - 1. Why Cybersecurity/07 - Emerging trends in cybersecurity.mp4 19.4 MB
- ~Get Your Files Here !/02 - 1. Why Cybersecurity/01 - A history of hackers.mp4 16.7 MB
- ~Get Your Files Here !/04 - 3. Firewalls/05 - Introducing Linux iptables.mp4 15.4 MB
- ~Get Your Files Here !/04 - 3. Firewalls/02 - Windows Firewall basics.mp4 13.8 MB
- ~Get Your Files Here !/09 - 8. Network Protocols/02 - Capturing packets with Wireshark.mp4 13.7 MB
- ~Get Your Files Here !/04 - 3. Firewalls/04 - ZedLan firewall log analyser.mp4 12.8 MB
- ~Get Your Files Here !/02 - 1. Why Cybersecurity/04 - Common forms of cyberattack.mp4 12.5 MB
- ~Get Your Files Here !/09 - 8. Network Protocols/03 - Making sense of the protocols.mp4 12.4 MB
- ~Get Your Files Here !/02 - 1. Why Cybersecurity/02 - The cyber kill chain.mp4 11.5 MB
- ~Get Your Files Here !/03 - 2. Antivirus/01 - Introducing Microsoft Defender Antivirus.mp4 11.1 MB
- ~Get Your Files Here !/07 - 6. Vulnerability Scanning/01 - Preparing Nessus.mp4 10.0 MB
- ~Get Your Files Here !/08 - 7. Web Applications/02 - Running an SQL injection attack.mp4 9.6 MB
- ~Get Your Files Here !/05 - 4. Network Scanning/02 - Advanced Nmap options.mp4 9.6 MB
- ~Get Your Files Here !/02 - 1. Why Cybersecurity/03 - Stuxnet and the kill chain.mp4 9.3 MB
- ~Get Your Files Here !/03 - 2. Antivirus/02 - Detecting malware with Microsoft Defender.mp4 9.1 MB
- ~Get Your Files Here !/04 - 3. Firewalls/06 - Setting up a simple iptables firewall.mp4 8.9 MB
- ~Get Your Files Here !/06 - 5. Network Connections/02 - Transferring files using netcat.mp4 8.8 MB
- ~Get Your Files Here !/06 - 5. Network Connections/04 - Setting up a netcat honeypot.mp4 8.5 MB
- ~Get Your Files Here !/04 - 3. Firewalls/01 - Why firewalls.mp4 8.2 MB
- ~Get Your Files Here !/07 - 6. Vulnerability Scanning/03 - Running a Nessus scan.mp4 8.2 MB
- ~Get Your Files Here !/03 - 2. Antivirus/03 - Automating scans with Task Scheduler.mp4 7.9 MB
- ~Get Your Files Here !/08 - 7. Web Applications/05 - Using a proxy to manipulate web traffic.mp4 7.5 MB
- ~Get Your Files Here !/08 - 7. Web Applications/03 - Cross-site scripting.mp4 7.4 MB
- ~Get Your Files Here !/02 - 1. Why Cybersecurity/06 - Cybercrime and ransomware.mp4 7.4 MB
- ~Get Your Files Here !/07 - 6. Vulnerability Scanning/02 - Setting up a Nessus policy.mp4 6.9 MB
- ~Get Your Files Here !/06 - 5. Network Connections/01 - Getting started with netcat.mp4 6.9 MB
- ~Get Your Files Here !/09 - 8. Network Protocols/01 - Explaining data communications.mp4 6.9 MB
- ~Get Your Files Here !/08 - 7. Web Applications/01 - Combating application level threats.mp4 6.5 MB
- ~Get Your Files Here !/06 - 5. Network Connections/03 - Connecting to services.mp4 6.3 MB
- ~Get Your Files Here !/08 - 7. Web Applications/04 - Scanning with ZAP.mp4 6.1 MB
- ~Get Your Files Here !/01 - Introduction/02 - What you should know.mp4 5.3 MB
- ~Get Your Files Here !/01 - Introduction/01 - Understanding cybersecurity.mp4 4.6 MB
- ~Get Your Files Here !/02 - 1. Why Cybersecurity/05 - Viruses, spyware, and adware.mp4 4.2 MB
- ~Get Your Files Here !/03 - 2. Antivirus/04 - Other antivirus solutions.mp4 3.0 MB
- ~Get Your Files Here !/07 - 6. Vulnerability Scanning/04 - Running an exploit.mp4 2.5 MB
- ~Get Your Files Here !/01 - Introduction/03 - Disclaimer.mp4 2.1 MB
- ~Get Your Files Here !/10 - Conclusion/01 - What's next.mp4 2.0 MB
- ~Get Your Files Here !/Ex_Files_Practical_Cybersecurity_for_IT_Pros/Exercise Files/00_02_configuration.pdf 40.2 KB
- ~Get Your Files Here !/02 - 1. Why Cybersecurity/07 - Emerging trends in cybersecurity.srt 12.6 KB
- ~Get Your Files Here !/04 - 3. Firewalls/03 - Advanced Windows Firewall.srt 12.4 KB
- ~Get Your Files Here !/02 - 1. Why Cybersecurity/04 - Common forms of cyberattack.srt 11.1 KB
- ~Get Your Files Here !/02 - 1. Why Cybersecurity/02 - The cyber kill chain.srt 10.5 KB
- ~Get Your Files Here !/05 - 4. Network Scanning/01 - Getting started with Nmap.srt 8.0 KB
- ~Get Your Files Here !/04 - 3. Firewalls/05 - Introducing Linux iptables.srt 8.0 KB
- ~Get Your Files Here !/02 - 1. Why Cybersecurity/01 - A history of hackers.srt 7.7 KB
- ~Get Your Files Here !/04 - 3. Firewalls/02 - Windows Firewall basics.srt 7.1 KB
- ~Get Your Files Here !/06 - 5. Network Connections/04 - Setting up a netcat honeypot.srt 6.5 KB
- ~Get Your Files Here !/07 - 6. Vulnerability Scanning/01 - Preparing Nessus.srt 6.4 KB
- ~Get Your Files Here !/02 - 1. Why Cybersecurity/03 - Stuxnet and the kill chain.srt 6.3 KB
- ~Get Your Files Here !/04 - 3. Firewalls/04 - ZedLan firewall log analyser.srt 6.3 KB
- ~Get Your Files Here !/06 - 5. Network Connections/02 - Transferring files using netcat.srt 6.3 KB
- ~Get Your Files Here !/08 - 7. Web Applications/02 - Running an SQL injection attack.srt 6.1 KB
- ~Get Your Files Here !/03 - 2. Antivirus/01 - Introducing Microsoft Defender Antivirus.srt 6.1 KB
- ~Get Your Files Here !/09 - 8. Network Protocols/01 - Explaining data communications.srt 6.0 KB
- ~Get Your Files Here !/03 - 2. Antivirus/02 - Detecting malware with Microsoft Defender.srt 5.4 KB
- ~Get Your Files Here !/02 - 1. Why Cybersecurity/06 - Cybercrime and ransomware.srt 5.3 KB
- ~Get Your Files Here !/09 - 8. Network Protocols/02 - Capturing packets with Wireshark.srt 5.0 KB
- ~Get Your Files Here !/03 - 2. Antivirus/03 - Automating scans with Task Scheduler.srt 4.7 KB
- ~Get Your Files Here !/01 - Introduction/02 - What you should know.srt 4.5 KB
- ~Get Your Files Here !/06 - 5. Network Connections/01 - Getting started with netcat.srt 4.4 KB
- ~Get Your Files Here !/05 - 4. Network Scanning/02 - Advanced Nmap options.srt 4.3 KB
- ~Get Your Files Here !/07 - 6. Vulnerability Scanning/03 - Running a Nessus scan.srt 4.1 KB
- ~Get Your Files Here !/04 - 3. Firewalls/01 - Why firewalls.srt 3.8 KB
- ~Get Your Files Here !/04 - 3. Firewalls/06 - Setting up a simple iptables firewall.srt 3.8 KB
- ~Get Your Files Here !/08 - 7. Web Applications/05 - Using a proxy to manipulate web traffic.srt 3.7 KB
- ~Get Your Files Here !/07 - 6. Vulnerability Scanning/02 - Setting up a Nessus policy.srt 3.7 KB
- ~Get Your Files Here !/09 - 8. Network Protocols/03 - Making sense of the protocols.srt 3.5 KB
- ~Get Your Files Here !/06 - 5. Network Connections/03 - Connecting to services.srt 3.4 KB
- ~Get Your Files Here !/08 - 7. Web Applications/03 - Cross-site scripting.srt 3.2 KB
- ~Get Your Files Here !/02 - 1. Why Cybersecurity/05 - Viruses, spyware, and adware.srt 3.0 KB
- ~Get Your Files Here !/08 - 7. Web Applications/04 - Scanning with ZAP.srt 2.8 KB
- ~Get Your Files Here !/03 - 2. Antivirus/04 - Other antivirus solutions.srt 2.3 KB
- ~Get Your Files Here !/08 - 7. Web Applications/01 - Combating application level threats.srt 2.2 KB
- ~Get Your Files Here !/01 - Introduction/03 - Disclaimer.srt 1.7 KB
- ~Get Your Files Here !/07 - 6. Vulnerability Scanning/04 - Running an exploit.srt 1.5 KB
- ~Get Your Files Here !/01 - Introduction/01 - Understanding cybersecurity.srt 1.3 KB
- ~Get Your Files Here !/10 - Conclusion/01 - What's next.srt 1.3 KB
- ~Get Your Files Here !/Bonus Resources.txt 386 bytes
- Get Bonus Downloads Here.url 176 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.