message

The Absolute Beginners Guide to Cyber Security 2023 - Part 1

Likes 0 Dislikes 0
Seeders 5
Leechers 142
File Size 2.91 GB
Downloads 0
Uploaded Nov 28, 2023
Files
Trackers
More Info
FolderThe Absolute Beginners Guide to Cyber Security 2023 - Part 1
Folder[TutsNode.org] - The Absolute Beginners Guide to Cyber Security 2023 - Part 1
Folder05 - Malware
File005 Ransomware.mp4 - 222 MB
File005 Ransomware_en.srt - 18.6 kB
File003 Trojans_en.srt - 9.55 kB
File002 Viruses & Worms_en.srt - 8 kB
File006 Other Types of Malware_en.srt - 7.55 kB
File004 Adware and Spyware_en.srt - 6.62 kB
File001 Introduction to Malware_en.srt - 2 kB
File003 Trojans.mp4 - 148 MB
File001 Introduction to Malware.mp4 - 24.1 MB
File004 Adware and Spyware.mp4 - 23.5 MB
File002 Viruses & Worms.mp4 - 22.2 MB
File006 Other Types of Malware.mp4 - 11.6 MB
Folder03 - Hackers - Who are They
File007 Social Engineering Tactics - Part 2_en.srt - 26.5 kB
File006 Social Engineering Tactics - Part 1_en.srt - 20.3 kB
File004 The Hacking Methodology_en.srt - 11.3 kB
File003 Types of Hackers_en.srt - 10.4 kB
File005 The WhoIS Query_en.srt - 10.4 kB
File001 Section Intro_en.srt - 1.49 kB
File002 This is NOT Hacking_en.srt - 10.4 kB
File007 Social Engineering Tactics - Part 2.mp4 - 149 MB
File006 Social Engineering Tactics - Part 1.mp4 - 128 MB
File002 This is NOT Hacking.mp4 - 71.8 MB
File004 The Hacking Methodology.mp4 - 56.1 MB
File005 The WhoIS Query.mp4 - 23.8 MB
File003 Types of Hackers.mp4 - 20.6 MB
File001 Section Intro.mp4 - 17.4 MB
Folder04 - Attacks
File003 Phishing_en.srt - 21.3 kB
File004 Phishing - Part 2_en.srt - 19.5 kB
File010 Supply Chain Attacks_en.srt - 15.3 kB
File006 DoS and DDoS_en.srt - 8.61 kB
File009 SQL Injections_en.srt - 8.26 kB
File002 Brute Force Attacks_en.srt - 7.58 kB
File001 Intro to the Section_en.srt - 1.16 kB
File008 Man in the Middle Attacks_en.srt - 7.48 kB
File005 Bots and Botnets_en.srt - 7.45 kB
File007 Pings_en.srt - 5.97 kB
File004 Phishing - Part 2.mp4 - 221 MB
File010 Supply Chain Attacks.mp4 - 170 MB
File003 Phishing.mp4 - 124 MB
File007 Pings.mp4 - 16.3 MB
File001 Intro to the Section.mp4 - 14.7 MB
File002 Brute Force Attacks.mp4 - 14.1 MB
File009 SQL Injections.mp4 - 10.2 MB
File005 Bots and Botnets.mp4 - 9.43 MB
File006 DoS and DDoS.mp4 - 9.01 MB
File008 Man in the Middle Attacks.mp4 - 7.46 MB
Folder01 - Welcome to the Course
File002 Who Am I Meet your Instructor_en.srt - 19.9 kB
File004 Download the Guide Book.html - 89 B
File001 Welcome to the Course_en.srt - 13.7 kB
File003 Connect with Me_en.srt - 4.38 kB
File001 Welcome to the Course.mp4 - 147 MB
File002 Who Am I Meet your Instructor.mp4 - 27.9 MB
File003 Connect with Me.mp4 - 11.9 MB
File004 The-Absolute-Beginners-Guide-to-Cyber-Security-Hand-Book.pdf - 5.55 MB
Folder06 - Defences
File009 Password Management_en.srt - 18.7 kB
File008 Security for Wireless Networks_en.srt - 10.7 kB
File007 Honey Pots and DMZs_en.srt - 9.11 kB
File006 Factor Authentication Methods_en.srt - 9.01 kB
File005 Anti Virus_en.srt - 7.47 kB
File002 Firewalls_en.srt - 7.22 kB
File004 Biometrics_en.srt - 5.81 kB
File003 Encryption_en.srt - 5.45 kB
File001 Section Intro_en.srt - 1.28 kB
File009 Password Management.mp4 - 62.4 MB
File004 Biometrics.mp4 - 28.1 MB
File008 Security for Wireless Networks.mp4 - 21.8 MB
File006 Factor Authentication Methods.mp4 - 19.6 MB
File007 Honey Pots and DMZs.mp4 - 11.7 MB
File003 Encryption.mp4 - 10.6 MB
File002 Firewalls.mp4 - 9.18 MB
File005 Anti Virus.mp4 - 8.9 MB
File001 Section Intro.mp4 - 8.48 MB
Folder09 - Extras and Conclusion
File002 SPECIAL LESSON - How to Launch your Career in Cyber Security_en.srt - 17.1 kB
File005 Course Promo_en.srt - 12.4 kB
File003 Getting your Certificate_en.srt - 6.12 kB
File004 Conclusion_en.srt - 3.14 kB
File001 Actionable Steps for Personal Security.html - 2.56 kB
File002 SPECIAL LESSON - How to Launch your Career in Cyber Security.mp4 - 101 MB
File005 Course Promo.mp4 - 20.7 MB
File004 Conclusion.mp4 - 19.3 MB
File003 Getting your Certificate.mp4 - 12.2 MB
Folder07 - Cyber Security at the Work Place
File004 A Sample BYOD Policy_en.srt - 13.7 kB
File005 The Security vs Ease of Access Paradox_en.srt - 9.73 kB
File002 Cyber Security Policies_en.srt - 6.58 kB
File003 BYOD Management_en.srt - 6.25 kB
File007 Review Update_en.srt - 5.51 kB
File006 The Weakest Link & The Disgruntled Employee_en.srt - 3.66 kB
File001 Section Intro_en.srt - 3.03 kB
File003 BYOD Management.mp4 - 74.8 MB
File005 The Security vs Ease of Access Paradox.mp4 - 63.9 MB
File006 The Weakest Link & The Disgruntled Employee.mp4 - 36.4 MB
File001 Section Intro.mp4 - 21.1 MB
File004 A Sample BYOD Policy.mp4 - 12.2 MB
File002 Cyber Security Policies.mp4 - 11.6 MB
File007 Review Update.mp4 - 8.62 MB
Folder02 - General Introduction to IT & Cyber Security
File003 Basic Terminologies.html - 2.46 kB
File004 Computer Protocols_en.srt - 11.6 kB
File005 Cookies_en.srt - 10.3 kB
File001 Difference Between Information Security and Cyber Security_en.srt - 6.51 kB
File006 The TCPIP_en.srt - 5.66 kB
File002 The Trinity of IT Security - CIA_en.srt - 5.28 kB
File001 Difference Between Information Security and Cyber Security.mp4 - 81.8 MB
File005 Cookies.mp4 - 59.5 MB
File004 Computer Protocols.mp4 - 29 MB
File002 The Trinity of IT Security - CIA.mp4 - 25.4 MB
File006 The TCPIP.mp4 - 6.76 MB
Folder08 - Cyber Warfare and Cyber Attacks Against Companies
File002 The Attack Against Estonia_en.srt - 11.5 kB
File004 The Colonial Pipeline Attack_en.srt - 8.05 kB
File003 Stuxnet and the Attack Against Iran_en.srt - 7.66 kB
File005 The Sony Hack_en.srt - 6.05 kB
File001 Introduction to Cyber Warfare_en.srt - 3.95 kB
File002 The Attack Against Estonia.mp4 - 155 MB
File003 Stuxnet and the Attack Against Iran.mp4 - 106 MB
File005 The Sony Hack.mp4 - 78.9 MB
File001 Introduction to Cyber Warfare.mp4 - 56.1 MB
File004 The Colonial Pipeline Attack.mp4 - 14.1 MB
FileTutsNode.org.txt - 63 B
File[TGx]Downloaded from torrentgalaxy.to .txt - 585 B
Folder.pad
File0 - 74.3 kB
File1 - 17.6 kB
File2 - 473 kB
File3 - 73.5 kB
File4 - 778 kB
File5 - 519 kB
File6 - 139 kB
File7 - 543 kB
File8 - 771 kB
File9 - 586 kB
File10 - 1.02 MB
File11 - 1.03 MB
File12 - 841 kB
File13 - 682 kB
File14 - 578 kB
File15 - 40.7 kB
File16 - 527 kB
File17 - 285 kB
File18 - 489 kB
File19 - 544 kB
File20 - 257 kB
File21 - 394 kB
File22 - 189 kB
File23 - 436 kB
File24 - 840 kB
File25 - 52.8 kB
File26 - 337 kB
File27 - 643 kB
File28 - 836 kB
File29 - 267 kB
File30 - 930 kB
File31 - 272 kB
File32 - 347 kB
File33 - 327 kB
File34 - 666 kB
File35 - 422 kB
File36 - 447 kB
File37 - 1000 kB
File38 - 597 kB
File39 - 613 kB
File40 - 407 kB
File41 - 419 kB
File42 - 728 kB
File43 - 834 kB
File44 - 992 kB
File45 - 1.01 MB
File46 - 895 kB
File47 - 268 kB
File48 - 8.32 kB
File49 - 260 kB
File50 - 426 kB
File51 - 540 kB
File52 - 815 kB
File53 - 956 kB
File54 - 925 kB
File55 - 582 kB
Tracker Seeder Leecher
  • InfoHash: 685CB0D843C9C331EEBA573F7C68F5AD1AC550C6
  • Last Updated: Nov 28, 2023
  • File Count: 174
  • File Category: 9
  • Tags: Other, Tutorials
This Torrent is seen on

The Absolute Beginners Guide to Cyber Security 2023 – Part 1

Source: 1337x

Uploaded By: tutsnode


Description

** PART 1 OF THE CYBER SECURITY GUIDE FOR BEGINNERS SERIES **

** UPDATED JULY 2023 WITH NEW LESSON ON RANSOMWARE **

Have you ever wondered exactly how hackers ‘hack’? Do words like firewalls, encryption, bio-metrics and malware sound confusing to you? Have you been looking for a course that teaches you all the basics of both information and cyber security in a fun relaxed manner? If so then you are going to find this course absolutely perfect for you.

This is a course that is perfect as an introductory one for individuals and students who are interested in becoming cyber security or information security professionals. It is also ideal for students who just want to have a well rounded knowledge about the basic concepts used in the world of information security.

Over 40000 happy students have enrolled in this best seller course which has an average rating of 4.6 due to stellar reviews.

‘An expert with great teaching style: provided clear explanations and concise definitions. Topics were reinforced and made tangible using graphics and real life (or movie) examples. The quizzes helped me retain and feel confident about the material.’  – E. Wolfe

“Great intro to Cyber Security. I currently work in IT and I’m considering transitioning to InfoSec. This course was very informative and it has me motivated to continue exploring and learning more about the field of Cyber Security and InfoSec. I am even going to recommend this to my wife who works in IT management as it would be very useful in helping her understand the different concepts. The instructor is good. Speaks clearly and provides good examples.” – Chris Loyola

PERFECT FOR COMPLETE BEGINNERS

This course is intended primarily for students who have little to no prior background or knowledge about the field of cyber security.

Course Curriculum

In the very first section, we will cover the basic terminologies used and discuss topics like the trinity of IT security and computer protocols.

In section 2, we will explore the world of hackers and the hacking methodology. We will take a look at the different types of hackers and how they actually hack.

Section 3 will introduce you to the various ways how cyber criminals and hackers attack systems and networks. You will learn about the most popular forms of attacks such as

   Phishing
   Brute Force Attack
   DoS & DDoS Attacks
   Bots and Botnets
   and much more

We will then move on to cover everything about malware. You will learn the various forms of malware such as viruses, worms and trojans and how they differ from one another.

In section 4, you will learn about the methods employed by cyber security professionals to protect systems and networks from cyber attacks. You will learn how the following work

   Antivirus
   Firewalls
   Encryption
   Biometrics
   Authentication Methods
   and much more

Finally we will cover and discuss about other topics related to both information and cyber security such as the BYOD policy and cyber warfare.

By the end of this course, you would have gained a lot of knowledge and insights that can help to jump start your career as an information security professional.

What are you waiting for??? Enroll in this best selling course today.

Alex.
Who this course is for:

   Students who want to learn the basics of computer and cyber security
   Students who want to become IT or Cyber Security Experts

Requirements

   You should know how to use a computer
   You should know how to use the internet

Last Updated 11/2023

Comments (0)
 

Write your comment

Did you like this torrent? [Optional]