[LinkedIn Learning] Lisa Bock - IT Security Foundations Core Concepts

  • CategoryOther
  • TypeTutorials
  • LanguageEnglish
  • Total size265.1 MB
  • Uploaded Bytutuploader
  • Downloads253
  • Last checkedApr. 05th '21
  • Date uploadedApr. 02nd '21
  • Seeders 19
  • Leechers1

Infohash : 068D291820D50017F63664690A6AA604F63FF898

===========================================================================
by tutuploader*
===========================================================================
INSTRUCTOR

Lisa Bock
Security ambassador with a broad range of IT skills and knowledge
Follow on LinkedIn

Course details

1h 35m
Beginner
Released: 10/11/2019
Video Resolution - 1280 X 720

Computing and internet security are everyone's business, but it's especially critical for information technology specialists. Learning the core concepts of operating-system and network-level security helps avoid ongoing threats and eliminate system vulnerabilities. These topics are also key components of the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). This beginner-level, Windows-based course covers core security concepts and introduces risks such as social engineering, malware, and spyware as it prepares you for exam 98-367. IT Security Foundations series creator Lisa Bock also goes over some basic wireless security best practices, tips for beefing up browser security, and techniques for implementing encryption.

Learning objectives

-Explain the main elements of the CIA triad: confidentiality, integrity, and availability.
-Differentiate between risks, threats, and vulnerabilities.
-Identify ways to minimize the various attack surfaces.
-Recognize the different types of malware.
-List several good practice techniques to avoid malware
-Understand how to manage cookies when using a browser.
-Discuss methods to ensure safe browsing habits.
-Summarize the various ways to secure your Wi-Fi connection.
-Cite the differences between public and private key encryption.
-Outline common cryptographic techniques used to secure digital data.

Skills covered

-Windows System Administration
-Information Security
-Network Security

Screenshot-


===========================================================================
by tutuploader* (pls seed)
===========================================================================

Files:

[LinkedIn Learning] Lisa Bock - IT Security Foundations Core Concepts
  • ReadMe.txt (2.1 KB)
  • Glossary_IT_Security_CoreConcepts
    • Glossary_IT_Security_CoreConcepts.pdf (84.1 KB)
    8. Conclusion
    • Next steps.mp4 (1.8 MB)
    1. Introduction
    • 2. Prepare for MTA Exam 98-367.mp4 (3.4 MB)
    • 1. Tech savvy, tech safe.mp4 (6.4 MB)
    7. Secure Devices and Applications
    • 3. Email security.mp4 (4.5 MB)
    • 1. Keeping data private.mp4 (6.1 MB)
    • 2. Understanding cryptography.mp4 (8.8 MB)
    6. Mobile and Wireless Security
    • 3. Concealing your access point.mp4 (5.8 MB)
    • 1. Securing your Wi-Fi.mp4 (11.5 MB)
    • 4. Protecting mobile devices.mp4 (11.5 MB)
    • 2. Sharing a secret.mp4 (12.7 MB)
    3. Understanding Malware
    • 2. Eliminating unwanted surveillance.mp4 (7.0 MB)
    • 3. Holding data hostage.mp4 (10.8 MB)
    • 1. Explaining viruses and worms.mp4 (13.6 MB)
    4. Getting Into Your System
    • 2. Getting in the backdoor.mp4 (8.3 MB)
    • 3. Overflowing the buffer.mp4 (10.2 MB)
    • 1. Stopping the imposters.mp4 (10.4 MB)
    • 4. Exploiting the unknown.mp4 (10.9 MB)
    5. Investigating Internet Security
    • 4. Avoiding browser threats.mp4 (9.0 MB)
    • 2. Accepting cookies.mp4 (9.3 MB)
    • 1. Using secure websites.mp4 (10.5 MB)
    • 3. Blocking malicious content.mp4 (13.5 MB)
    2. Core Security Principles
    • 2. Managing risk.mp4 (10.4 MB)
    • 5. Modeling threats.mp4 (12.0 MB)
    • 1. Keeping information safe.mp4 (13.9 MB)
    • 4. Analyzing the attack surface.mp4 (16.2 MB)
    • 3. Avoiding scam artists.mp4 (26.4 MB)

Code:

  • udp://tracker.openbittorrent.com:80/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://tracker.leechers-paradise.org:6969/announce
  • udp://tracker.internetwarriors.net:1337/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://exodus.desync.com:6969/announce
  • udp://www.torrent.eu.org:451/announce
  • udp://tracker.torrent.eu.org:451/announce
  • udp://tracker.tiny-vps.com:6969/announce
  • udp://retracker.lanta-net.ru:2710/announce
  • udp://open.stealth.si:80/announce
  • udp://valakas.rollo.dnsabr.com:2710/announce
  • udp://tracker.moeking.me:6969/announce
  • udp://tracker.cyberia.is:6969/announce
  • udp://opentor.org:2710/announce
  • udp://wassermann.online:6969/announce
  • udp://vibe.community:6969/announce
  • udp://u.wwwww.wtf:1/announce
  • udp://tracker.zerobytes.xyz:1337/announce
  • udp://tracker.v6speed.org:6969/announce
  • udp://tracker.uw0.xyz:6969/announce
  • udp://tracker.shkinev.me:6969/announce
  • udp://tracker.edkj.club:6969/announce