Lynda - Learning IT Security

  • Category Other
  • Type Tutorials
  • Language English
  • Total size 2.5 GB
  • Uploaded By sumi1
  • Downloads 3578
  • Last checked 3 days ago
  • Date uploaded 8 years ago
  • Seeders 12
  • Leechers 5

Infohash : 80660C3D72FB5FA681D0DB3389EB1A75FD6CEAE9



Information security is part of every IT professional's job. Hackers are constantly trying to compromise your networks, steal sensitive data, and overwhelm your systems. Planning, implementing, enforcing, or even removing security are tasks we all do to keep users and systems safe. In this IT Security Fundamentals course by Certified Information Systems Security Professional (CISSP) and certified ethical hacker (CEH) Mike Danseglio, you'll learn how to perform these tasks properly and in alignment with industry best practicesโ€”a skill that's critical to virtually every technology role, from decision maker to developer

Files:

Lynda - Learning IT Security 01. Introduction
  • 01_01 - Welcome.mp4 (8.9 MB)
02. Security Modeling
  • 02_01 - Security modeling tools.mp4 (46.0 MB)
03. The CIA Triad
  • 03_01 - The CIA triad confidentiality, integrity, and availability.mp4 (38.4 MB)
  • 03_02 - Confidentiality.mp4 (39.1 MB)
  • 03_03 - Integrity.mp4 (43.4 MB)
  • 03_04 - Availability.mp4 (53.0 MB)
  • 03_05 - Using the triad.mp4 (160.8 MB)
04. Visualizing Security
  • 04_01 - MikeDan's solution matrix.mp4 (125.8 MB)
05. Information Assurance Model
  • 05_01 - The information assurance model.mp4 (58.0 MB)
  • 05_02 - People.mp4 (127.5 MB)
  • 05_03 - Process.mp4 (106.5 MB)
  • 05_04 - Technology.mp4 (119.1 MB)
  • 05_05 - Applying the information assurance model.mp4 (144.1 MB)
06. Defense in Depth
  • 06_01 - Introduction to defense in depth.mp4 (117.4 MB)
  • 06_02 - Data.mp4 (70.9 MB)
  • 06_03 - Application.mp4 (81.9 MB)
  • 06_04 - Host.mp4 (85.0 MB)
  • 06_05 - Internal network.mp4 (76.3 MB)
  • 06_06 - Network perimeter.mp4 (73.4 MB)
  • 06_07 - External network.mp4 (65.2 MB)
  • 06_08 - Physical encompassing.mp4 (79.8 MB)
  • 06_09 - Stewardship encompassing.mp4 (105.9 MB)
07. Scenarios for Using the Defense in Depth Model
  • 07_01 - Using the defense in depth model.mp4 (112.6 MB)
  • 07_02 - The IT desktop PC.mp4 (75.3 MB)
  • 07_03 - The sales user's laptop.mp4 (88.9 MB)
  • 07_04 - The typical user's phone.mp4 (138.1 MB)
  • 07_05 - The CEO's Android tablet.mp4 (116.1 MB)
  • 07_06 - The CEO's iMac.mp4 (133.1 MB)
  • 07_07 - The data center server.mp4 (115.0 MB)
  • Torrent Downloaded From Katcr.co - Kickasstorrents.txt (0.1 KB)

Comments

Code:

  • udp://tracker.opentrackr.org:1337/announce
  • udp://p4p.arenabg.com:1337/announce
  • udp://tracker.zer0day.to:1337/announce
  • udp://tracker.coppersurfer.tk:6969/announce
  • udp://eddie4.nl:6969/announce
  • udp://tracker.internetwarriors.net:1337/announce
  • udp://tracker.leechers-paradise.org:6969/announce
  • udp://tracker.coppersurfer.tk:6969
  • udp://tracker.grepler.com:6969/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://shadowshq.yi.org:6969/announce
R2-CACHE โ˜๏ธ R2 (hit) | CDN: MISS (0s) ๐Ÿ“„ torrent ๐Ÿ• 18 Jan 2026, 07:57:13 pm IST โฐ 12 Feb 2026, 07:57:13 pm IST โœ… Valid for 24d 22h ๐Ÿ”„ Refresh Cache