Udemy - Cybersecurity 360 - A Defense in Depth Approach

  • Category Other
  • Type Tutorials
  • Language English
  • Total size 3.5 GB
  • Uploaded By freecoursewb
  • Downloads 4
  • Last checked 2 hours ago
  • Date uploaded 3 hours ago
  • Seeders 1
  • Leechers 9

Infohash : 8A49F06E28A13AF402799B7862459A9BCF2BA9AF



Cybersecurity 360° — A Defense in Depth Approach

https://WebToolTip.com

Published 1/2026
Created by Stefan Sales
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz, 2 Ch
Level: All | Genre: eLearning | Language: English | Duration: 124 Lectures ( 5h 22m ) | Size: 3.54 GB

How to simulate attacks, protect against, prevent, monitor, and respond to cyberattacks.

What you'll learn
Be introduced to and understand the core principles and fundamentals of Cybersecurity.
Learn about a wide range of Cybersecurity technologies, controls and practices.
Learn about personal cyber safety tips
Learn about Dark Web, history and evolution of cybercrime
Understand the world, mechanisms and lifecycle of cyberattacks
Psychological and behavioral aspects of hackers
Design secure architectures based on the defense-in-depth concept
Learn how cybersecurity governance and monitoring functions are designed and operate
Learn about Cybersecurity frameworks and best practices
Gain a broad understanding of how to work in and be part of Cybersecurity teams
Receive guidance to build a strong career path and transition into cybersecurity

Requirements
Basic understanding of Information Technology concepts.

Files:

[ WebToolTip.com ] Udemy - Cybersecurity 360 - A Defense in Depth Approach
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here ! 1 - Introdution to Cybersecurity
    • 1. Test 1.html (5.0 KB)
    • 1. What is Cybersecurity.mp4 (30.8 MB)
    • 2. Real time Cyberattack map.mp4 (66.0 MB)
    • 3. Current scenario in Information Technology.mp4 (29.4 MB)
    • 4. Main challenges for maintaining Cybersecurity.mp4 (22.8 MB)
    • 5. The mindset of a good Cybersecurity professional.mp4 (35.7 MB)
    • 6. Top tip.mp4 (3.7 MB)
    • 6. Top tip_Resource_Cybersecurity Glossary pdf.pdf (103.5 KB)
    • 7. Summary and Achievement Unlocked.mp4 (41.8 MB)
    10 - Application Layer Protections
    • 68. Application layer protections.en_US.srt (1.6 KB)
    • 68. Application layer protections.mp4 (14.0 MB)
    • 69. Layered application development.mp4 (41.8 MB)
    • 70. WAF Web Application Firewall.mp4 (33.3 MB)
    • 71. Code review.mp4 (33.3 MB)
    • 72. DevSecOps.mp4 (20.1 MB)
    • 73. MFA Multi Factor Authentication.mp4 (24.8 MB)
    • 74. Summary and Achievement Unlocked.mp4 (32.2 MB)
    • 9. Test 9.html (6.1 KB)
    11 - Data Layer Protections
    • 10. Test 10.html (6.0 KB)
    • 75. Data layer protections.mp4 (11.7 MB)
    • 76. Data classification.mp4 (19.1 MB)
    • 77. Data protection Backup and restore.mp4 (21.7 MB)
    • 78. Top tip.mp4 (4.4 MB)
    • 79. Data wiping.mp4 (22.2 MB)
    • 80. DLP Data Leak Prevention.mp4 (30.5 MB)
    • 81. PAM Privileged Access Management.mp4 (23.6 MB)
    • 82. PKI Public Key Infrastructure.mp4 (16.6 MB)
    • 83. Top tip.mp4 (3.9 MB)
    • 84. Summary and Achievement Unlocked.mp4 (34.1 MB)
    12 - Public Cloud Layer Protections
    • 11. Test 11.html (6.1 KB)
    • 85. Public cloud layer protections.mp4 (11.2 MB)
    • 86. CASB.mp4 (24.7 MB)
    • 87. IAM Identity Access Management.mp4 (24.3 MB)
    • 88. KMS and Vaults.mp4 (31.5 MB)
    • 89. Summary and Achievement Unlocked.mp4 (32.0 MB)
    13 - Prevention policies and compliance
    • 100. Summary and Achievement Unlocked.mp4 (38.4 MB)
    • 12. Test 12.html (10.7 KB)
    • 90. Prevention policies and compliance.mp4 (13.4 MB)
    • 91. Risk management.mp4 (26.0 MB)
    • 92. Top tip.mp4 (5.4 MB)
    • 93. Security and compliance policies.mp4 (29.3 MB)
    • 94. Information Security Governance.mp4 (43.9 MB)
    • 95. Training and Awareness.mp4 (44.1 MB)
    • 96. Information security architecture.mp4 (19.7 MB)
    • 97. Vulnerability management.mp4 (30.5 MB)
    • 98. Penetration test.mp4 (17.0 MB)
    • 99. Cyber Threat Intelligence.mp4 (25.0 MB)
    14 - Operations and Incident Response
    • 101. Operations monitoring and incident response.mp4 (13.5 MB)
    • 102. SIEM.mp4 (22.5 MB)
    • 103. SOC Security Operation Center.mp4 (40.6 MB)
    • 104. CIRT.mp4 (35.0 MB)
    • 105. BAS.mp4 (20.9 MB)
    • 106. Summary and Achievement Unlocked.mp4 (34.2 MB)
    • 13. Test 13.html (6.0 KB)
    15 - Cybersecurity carrer and leadership
    • 107. Certifications in Cybersecurity.mp4 (37.5 MB)
    • 108. How to Stay Informed on Cybersecurity Threats.mp4 (27.4 MB)
    • 109. Cybersecurity Color Team Operating Model.mp4 (28.9 MB)
    • 110. Engaging and Raising Awareness with the C level for Cybersecurity.mp4 (38.6 MB)
    • 111. The role of the CISO or Manager in Cybersecurity.mp4 (67.7 MB)
    • 112. Summary and Achievement Unlocked.mp4 (34.2 MB)
    16 - Additional Lessons
    • 113. Emerging technologies and their threats.mp4 (26.4 MB)
    • 114. Shadow IT and its risks.mp4 (31.4 MB)
    • 115. How to evaluate a cybersecurity solution.mp4 (33.3 MB)
    • 116. Information Security Certifications for companies.mp4 (23.8 MB)
    • 117. Cyber Insurance.mp4 (37.0 MB)
    • 118. Public cloud security assessment.mp4 (30.8 MB)
    • 119. Tokenization.mp4 (14.0 MB)
    • 120. Configuring Apache Tomcat Our Target.mp4 (74.8 MB)
    • 121. VirtualBox and Kali Linux Configuration.mp4 (57.6 MB)
    • 122. Attacking Apache Tomcat.mp4 (124.0 MB)
    • 123. Course E book.mp4 (13.4 MB)
    • 123. Course E book_Resource_Ebook Cybersecurity 360 pdf.pdf (290.4 KB)
    • 124. Summary and Achievement Unlocked.mp4 (63.4 MB)
    2 - Cybersecurity Principles
    • 10. Encryption.mp4 (60.5 MB)
    • 11. Hashing.mp4 (19.4 MB)
    • 12. Salt.mp4 (16.5 MB)
    • 13. Top tip.mp4 (4.6 MB)
    • 14. Summary and Achievement Unlocked.mp4 (43.4 MB)
    • 2. Test 2.html (6.2 KB)
    • 8. CIA Triad.mp4 (26.7 MB)
    • 9. Threads and Vulnerabilities.mp4 (16.4 MB)
    3 - Cybersecurity Fundamentals
    • 15. Main objectives of cyberattacks.mp4 (18.0 MB)
    • 16. Security best practice frameworks.mp4 (24.3 MB)
    • 17. Security Maturity Assessment.mp4 (27.9 MB)
    • 18. Company Security Posture.mp4 (32.2 MB)
    • 19. Summary and Achievement Unlocked.mp4 (39.9 MB)
    • 3. Test 3.html (6.1 KB)
    4 - The world of cyberattacks
    • 20. Evolution of cyberattacks.mp4 (26.8 MB)
    • 21. Famous Cyberattacks.mp4 (19.5 MB)
    • 22. Who is behind cyberattacks.mp4 (19.9 MB)
    • 23. Attacker Profile.mp4 (36.1 MB)
    • 24. How leaked data is traded.mp4 (17.8 MB)
    • 25. Dark Web.mp4 (47.2 MB)
    • 26. Means used in cyberattacks.mp4 (55.3 MB)
    • 27. Mitre Att&ck Tactics and Techniques used in cyberattacks.mp4 (36.5 MB)
    • 28. Signs that could indicate a cyberattack.mp4 (24.0 MB)
    • 29. Summary and Achievement Unlocked.mp4 (44.4 MB)
    • 4. Test 4.html (4.9 KB)
    5 - Main cyberattacks and threats
    • 30. Malwares.mp4 (24.3 MB)
    • 31. Phishing.mp4 (19.4 MB)
    • 32. Top tip.mp4 (5.6 MB)
    • 33. Ransomware.mp4 (28.8 MB)
    • 34. Brute force.mp4 (23.2 MB)
    • 35. SQL injection.mp4 (22.2 MB)
    • 36. Cross site scripting XSS.mp4 (29.9 MB)
    • 37. Crypto mining.mp4 (28.2 MB)
    • 38. DDoS.mp4 (22.7 MB)
    • 39. Man in the middle.mp4 (28.7 MB)
    • 40. Internal threats.mp4 (26.3 MB)
    • 41. Impacts of a cyberattack.mp4 (16.1 MB)
    • 42. Summary and Achievement Unlocked.mp4 (40.9 MB)
    • 5. Test 5.html (6.1 KB)
    6 - Course Framework
    • 43. Course Framework.mp4 (70.2 MB)
    7 - Perimeter Layer Protections
    • 44. Perimeter layer protections.mp4 (12.5 MB)
    • 45. DMZ Demilitarized Zone.mp4 (19.2 MB)
    • 46. Firewall.mp4 (17.4 MB)
    • 47. DNS filtering.mp4 (26.2 MB)
    • 48. Top tip.mp4 (4.5 MB)
    • 49. Antiphishing.mp4 (43.5 MB)
    • 50. Remote access security.mp4 (33.6 MB)
    • 51. Honeypot.mp4 (14.6 MB)
    • 52. SBC.mp4 (19.1 MB)
    • 53. Physical security.mp4 (19.8 MB)
    • 54. Summary and Achievement Unlocked.mp4 (38.5 MB)
    • 6. Test 6.html (7.1 KB)
    8 - Network Layer Protections
    • 55. Network layer protections.mp4 (10.1 MB)
    • 56. NAC Network Access Control.mp4 (38.3 MB)
    • 57. IDS IPS.mp4 (35.1 MB)
    • 58. Wireless security.mp4 (32.7 MB)
    • 59. Content filtering proxy.mp4 (39.4 MB)
    • 60. Summary and Achievement Unlocked.mp4 (33.5 MB)
    • 7. Test 7.html (5.9 KB)
    9 - Endpoint Layer Protections
    • 61. Endpoint layer protections.mp4 (13.4 MB)
    • 62. EPP EndPoint Protection.mp4 (26.2 MB)
    • 63. MDM Mobile Security.mp4 (18.8 MB)
    • 64. Patch management.mp4 (23.4 MB)
    • 65. Sandbox Malware analysis.mp4 (36.4 MB)
    • 66. Security enforcement.mp4 (25.9 MB)
    • 67. Summary and Achievement Unlocked.mp4 (37.0 MB)
    • 8. Test 8.html (6.0 KB)
    • Bonus Resources.txt (0.1 KB)

There are currently no comments. Feel free to leave one :)

Code:

  • udp://tracker.torrent.eu.org:451/announce
  • udp://tracker.tiny-vps.com:6969/announce
  • http://tracker.foreverpirates.co:80/announce
  • udp://tracker.cyberia.is:6969/announce
  • udp://exodus.desync.com:6969/announce
  • udp://explodie.org:6969/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://9.rarbg.to:2780/announce
  • udp://tracker.internetwarriors.net:1337/announce
  • udp://ipv4.tracker.harry.lu:80/announce
  • udp://open.stealth.si:80/announce
  • udp://9.rarbg.to:2900/announce
  • udp://9.rarbg.me:2720/announce
  • udp://opentor.org:2710/announce
EDGE-CACHE ⚡ EC (hit) 📄 torrent 🕐 10 Jan 2026, 11:33:59 pm IST ⏰ 04 Feb 2026, 11:33:59 pm IST ✅ Valid for 17d 5h 🔄 Refresh Cache