IT Security Foundations: Core Concepts

  • Category Other
  • Type Tutorials
  • Language English
  • Total size 327.9 MB
  • Uploaded By tutsnode
  • Downloads 252
  • Last checked 2 weeks ago
  • Date uploaded 3 years ago
  • Seeders 17
  • Leechers 1

Infohash : E3C37D1E858CD9088C5056751EAFD4F54E1E8E5A




Description

Every day, we interact with our digital devices. At the same time, we’re faced with the threat of cyberattacks that can compromise our privacy and security. Learning the basics of how to secure our digital world will help avoid becoming a victim of a cyberattack. This beginner-level course covers basic security concepts. You’ll learn strategies malicious actors use to gain access to your system using social engineering, malware, and spyware. IT Security Foundations series creator Lisa Bock also goes over some basic wireless security best practices, tips for beefing up browser security, and techniques for implementing encryption. Additionally, learn how to manage cookies when using a browser and discover best practices on how to secure your devices and applications.

Released 11/2022

Files:

IT Security Foundations Core Concepts [TutsNode.net] - IT Security Foundations Core Concepts 05 - 4. Investigating Internet Security
  • 01 - Accessing cloud resources.mp4 (15.3 MB)
  • 05 - Ensuring browser privacy.srt (6.3 KB)
  • 03 - Accepting cookies.srt (5.9 KB)
  • 02 - Using a secure connection.srt (5.9 KB)
  • 04 - Blocking malicious content.srt (5.1 KB)
  • 01 - Accessing cloud resources.srt (3.8 KB)
  • 03 - Accepting cookies.mp4 (13.1 MB)
  • 04 - Blocking malicious content.mp4 (12.9 MB)
  • 02 - Using a secure connection.mp4 (12.5 MB)
  • 05 - Ensuring browser privacy.mp4 (11.9 MB)
  • Glossary_IT_Security_Foundations_Core_Concepts.zip (27.8 KB)
  • 06 - 5. Mobile and Wireless Security
    • 04 - Protecting mobile devices.srt (6.7 KB)
    • 01 - Securing your Wi-Fi.srt (6.0 KB)
    • 01 - Securing your Wi-Fi.mp4 (13.7 MB)
    • 02 - Sharing a secret.srt (5.3 KB)
    • 03 - Concealing your access point.srt (4.5 KB)
    • 04 - Protecting mobile devices.mp4 (13.2 MB)
    • 02 - Sharing a secret.mp4 (11.5 MB)
    • 03 - Concealing your access point.mp4 (7.4 MB)
  • Ex_Files_IT_Security_Foundations_Core_Concepts.zip (94.3 KB)
  • 01 - Introduction
    • 01 - Tech savvy, tech safe.srt (1.6 KB)
    • 02 - Discovering resources.srt (1.7 KB)
    • 01 - Tech savvy, tech safe.mp4 (8.2 MB)
    • 02 - Discovering resources.mp4 (4.0 MB)
    03 - 2. Understanding Malware
    • 05 - Holding data hostage.srt (6.5 KB)
    • 04 - Defending the OS.srt (6.3 KB)
    • 05 - Holding data hostage.mp4 (13.5 MB)
    • 04 - Defending the OS.mp4 (13.2 MB)
    • 02 - Explaining viruses and worms.srt (4.4 KB)
    • 03 - Eliminating unwanted surveillance.srt (4.4 KB)
    • 01 - Comparing malicious programs.srt (4.3 KB)
    • 01 - Comparing malicious programs.mp4 (13.0 MB)
    • 02 - Explaining viruses and worms.mp4 (10.4 MB)
    • 03 - Eliminating unwanted surveillance.mp4 (8.9 MB)
    07 - 6. Secure Devices and Applications
    • 02 - Ensuring data integrity.srt (5.8 KB)
    • 04 - Securing email.srt (5.5 KB)
    • 01 - Providing data confidentiality.srt (5.0 KB)
    • 03 - Using cryptographic techniques.srt (4.5 KB)
    • 03 - Using cryptographic techniques.mp4 (11.9 MB)
    • 02 - Ensuring data integrity.mp4 (11.8 MB)
    • 01 - Providing data confidentiality.mp4 (10.6 MB)
    • 04 - Securing email.mp4 (10.2 MB)
    04 - 3. Breaching Your System
    • 03 - Exploiting the unknown.srt (5.6 KB)
    • 02 - Getting in the backdoor.srt (5.2 KB)
    • 05 - Solution Recognizing IoT threats.srt (1.8 KB)
    • 04 - Challenge Recognizing IoT threats.srt (1.2 KB)
    • 01 - Stopping the imposters.srt (4.7 KB)
    • 03 - Exploiting the unknown.mp4 (10.8 MB)
    • 01 - Stopping the imposters.mp4 (8.8 MB)
    • 02 - Getting in the backdoor.mp4 (8.6 MB)
    • 05 - Solution Recognizing IoT threats.mp4 (4.6 MB)
    • 04 - Challenge Recognizing IoT threats.mp4 (3.9 MB)
    08 - Conclusion
    • 01 - Next steps.srt (1.8 KB)
    • 01 - Next steps.mp4 (3.2 MB)
    02 - 1. Core Security Principles
    • 05 - Avoiding scam artists.srt (5.2 KB)
    • 06 - Recognizing the Internet of Things.srt (5.2 KB)
    • 01 - Providing a secure system.srt (5.0 KB)
    • 02 - Keeping information safe.srt (4.1 KB)
    • 03 - Managing risk.srt (3.3 KB)
    • 04 - Analyzing risk.srt (3.1 KB)
    • 06 - Recognizing the Internet of Things.mp4 (11.9 MB)
    • 01 - Providing a secure system.mp4 (11.2 MB)
    • 05 - Avoiding scam artists.mp4 (10.4 MB)
    • 02 - Keeping information safe.mp4 (10.0 MB)
    • 04 - Analyzing risk.mp4 (8.1 MB)
    • 03 - Managing risk.mp4 (5.4 MB)
    • TutsNode.net.txt (0.1 KB)
    • .pad
      • 0 (0.5 KB)
      • 1 (0.4 KB)
      • 2 (0.7 KB)
      • 3 (0.6 KB)
      • 4 (52.2 KB)
      • 5 (185.0 KB)
      • 6 (250.7 KB)
      • 7 (119.8 KB)
      • 8 (205.0 KB)
      • 9 (73.7 KB)
      • 10 (88.7 KB)
      • 11 (141.5 KB)
      • 12 (245.7 KB)
      • 13 (235.2 KB)
      • 14 (8.2 KB)
      • 15 (232.7 KB)
      • 16 (171.3 KB)
      • 17 (103.7 KB)
      • 18 (123.8 KB)
      • 19 (67.3 KB)
      • 20 (205.7 KB)
      • 21 (61.2 KB)
      • 22 (180.7 KB)
      • 23 (111.4 KB)
      • 24 (73.7 KB)
      • 25 (141.7 KB)
      • 26 (99.8 KB)
      • 27 (69.8 KB)
      • 28 (194.3 KB)
      • 29 (49.2 KB)
      • 30 (119.8 KB)
    • [TGx]Downloaded from torrentgalaxy.to .txt (0.6 KB)

There are currently no comments. Feel free to leave one :)

Code:

  • udp://open.stealth.si:80/announce
  • udp://tracker.tiny-vps.com:6969/announce
  • udp://fasttracker.foreverpirates.co:6969/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://explodie.org:6969/announce
  • udp://tracker.cyberia.is:6969/announce
  • udp://ipv4.tracker.harry.lu:80/announce
  • udp://tracker.uw0.xyz:6969/announce
  • udp://opentracker.i2p.rocks:6969/announce
  • udp://tracker.birkenwald.de:6969/announce
  • udp://tracker.torrent.eu.org:451/announce
  • udp://tracker.moeking.me:6969/announce
  • udp://tracker.dler.org:6969/announce
  • udp://9.rarbg.me:2970/announce
REVERSE-PROXY πŸ”„ RP (success) | 1499ms πŸ“„ torrent πŸ• 17 Jan 2026, 06:36:34 am IST ⏰ 11 Feb 2026, 06:36:34 am IST βœ… Valid for 24d 23h πŸ”„ Wait 10m