Login: Password:  Do not remember me

Categories




Video TrainingBlue Team Training - Cyber Security and Incident Response



Blue Team Training - Cyber Security and Incident Response

Blue Team Training - Cyber Security and Incident Response
English | Size: 603.55 MB
Category: CBTs

Blue Team Training - Cyber Security and Incident Response
For security analysts that want to detect more threats and sharpen their cyber hunting skills

      Read more...         

Video TrainingCyber Security - Endpoint protection



Cyber Security - Endpoint protection

Cyber Security - Endpoint protection
English | Size: 2.83 GB
Category: CBTs

Endpoint security or endpoint protection is an approach to the protection of computer networks that are remotely bridged to client devices. The connection of laptops, tablets, mobile phones and other wireless devices to corporate networks creates attack paths for security threats.[1][2] Endpoint security attempts to ensure that such devices follow a definite level of compliance to standards.[3]


      Read more...         

Video TrainingThe Absolute Beginners Guide to Cyber Security 2019 - Part 1



The Absolute Beginners Guide to Cyber Security 2019 - Part 1

The Absolute Beginners Guide to Cyber Security 2019 - Part 1
English | Size: 2.45 GB
Category: Tutorial

Have you ever wondered exactly how hackers 'hack'? Do words like firewalls, encryption, bio-metrics and malware sound confusing to you? Have you been looking for a course that teaches you all the basics of both information and cyber security in a fun relaxed manner? If so then you are going to find this course absolutely perfect for you.


      Read more...         

Video TrainingThe Absolute Beginners Guide to Cyber Security 2019 - Part 2



The Absolute Beginners Guide to Cyber Security 2019 - Part 2

The Absolute Beginners Guide to Cyber Security 2019 - Part 2
English | Size: 5.03 GB
Category: CBTs


Take your basic knowledge of cyber security to a whole new level with this exciting course that promises to be educational, informative and fun filled.

Build upon a basic foundation in Cyber Security with a strong focus on the following core topics.

Networking

      Read more...         

Video TrainingThe Absolute Beginners Guide to Cyber Security 2019 - Part 3



The Absolute Beginners Guide to Cyber Security 2019 - Part 3

The Absolute Beginners Guide to Cyber Security 2019 - Part 3
English | Size: 1.74 GB
Category: Tutorial

** PART 3 OF THE BEST SELLING CYBER SECURITY GUIDE FOR BEGINNERS SERIES **

In a world where smartphones and other mobile devices generate over 52% of all internet traffic, the security of such mobile devices has never been more important.

Welcome to the complete 2019 cyber security guide for mobile devices. In this short but intensive course, you are going to learn practical skills and techniques to protect your mobile device against hackers and malware.


      Read more...         

Video TrainingCyber Security Fundamentals 2019



Cyber Security Fundamentals 2019

Cyber Security Fundamentals 2019
English | Size: 941.81 MB
Category: Tutorial

This course is part of a series of 9 courses which address all aspects to become a Cyber Security Professional . This cyber security track is designed to teach you, or fill in the knowledge gaps, all the aspects and technologies to become a successful cyber security professional. The entire track addresses mostly Microsoft security technologies, including the latest cloud services made available by Microsoft like: Azure ATP, Office 365 security features and services, Microsoft Intelligent Security Graph, Azure Active Directory Security and many more. This is the first course from a series of 9 courses which will be released in the next months, as follows:

      Read more...         

Video TrainingCyber Security to avoid Business Data Breaches



Cyber Security to avoid Business Data Breaches

Cyber Security to avoid Business Data Breaches
English | Size: 1.11 GB
Category: CBTs

Data breaches can occur due to many reasons like hackers gaining access to the information or losing a device which has unencrypted information. It is always better to prevent than to cure.
Let us look into some ways to prevent data security breaches.
1. Protect Information: Sensitive information must be protected wherever it is stored sent or used. Do not reveal personal information inadvertently.

      Read more...         

Video TrainingThe Absolute Beginners Guide to Cyber Security - Part 3



The Absolute Beginners Guide to Cyber Security - Part 3

The Absolute Beginners Guide to Cyber Security - Part 3
English | Size: 1.74 GB
Category: E-learning | Security

** PART 3 OF THE BEST SELLING CYBER SECURITY GUIDE FOR BEGINNERS SERIES **

In a world where smartphones and other mobile devices generate over 52% of all internet traffic, the security of such mobile devices has never been more important.

Welcome to the complete 2019 cyber security guide for mobile devices. In this short but intensive course, you are going to learn practical skills and techniques to protect your mobile device against hackers and malware.


      Read more...         

Video TrainingPackt Cyber Threat Hunting Jan 2019



Packt  Cyber Threat Hunting  Jan 2019

Packt | Cyber Threat Hunting | Jan 2019
English | Size: 978.12 MB
Category: Tutorial

Threat hunting is the proactive technique that focuses on the pursuit of attacks and the evidence that attackers leave behind when they conduct reconnaissance, attack with malware, or exfiltrate sensitive data. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able to carry out their attacks and take illegal advantage of them.

      Read more...         

Video TrainingINTELLEZY CYBER SECURITY FOR THE END USER



INTELLEZY CYBER SECURITY FOR THE END USER

INTELLEZY CYBER SECURITY FOR THE END USER
English | Size: 820.48 MB
Category: Tutorial

By some estimates, over 90% of security breaches can be prevented by simple security awareness. This course is designed for everyday computer users and will help identify and prevent common cyber threats through awareness and the development of basic good habits

      Read more...         

Page:

Search



Updates


«    April 2019    »
MonTueWedThuFriSatSun
1234567
891011121314
15161718192021
22232425262728
2930 


Friend Sites


» ReleaseLog
» Gfxtorrent

Your Link Here ?
(Pagerank 4 or above)