[LinkedIn Learning] Lisa Bock - IT Security Foundations Core Concepts
File Information:
- Magnet Link:Magnet Link
- File Size:271.42 MB
- Creat Time:2024-07-22
- Active Degree:5
- Last Active:2024-10-04
- File Tags:LinkedIn Learning Lisa Bock IT Security Foundations Core Concepts
- Statement:This site does not provide download links, only text displays, and does not contain any infringement.
File List:
- 2. Core Security Principles/3. Avoiding scam artists.mp4 26.99 MB
- 2. Core Security Principles/4. Analyzing the attack surface.mp4 16.60 MB
- 2. Core Security Principles/1. Keeping information safe.mp4 14.19 MB
- 3. Understanding Malware/1. Explaining viruses and worms.mp4 13.92 MB
- 5. Investigating Internet Security/3. Blocking malicious content.mp4 13.86 MB
- 6. Mobile and Wireless Security/2. Sharing a secret.mp4 13.05 MB
- 2. Core Security Principles/5. Modeling threats.mp4 12.28 MB
- 6. Mobile and Wireless Security/4. Protecting mobile devices.mp4 11.80 MB
- 6. Mobile and Wireless Security/1. Securing your Wi-Fi.mp4 11.80 MB
- 4. Getting Into Your System/4. Exploiting the unknown.mp4 11.17 MB
- 3. Understanding Malware/3. Holding data hostage.mp4 11.07 MB
- 5. Investigating Internet Security/1. Using secure websites.mp4 10.80 MB
- 4. Getting Into Your System/1. Stopping the imposters.mp4 10.66 MB
- 2. Core Security Principles/2. Managing risk.mp4 10.63 MB
- 4. Getting Into Your System/3. Overflowing the buffer.mp4 10.45 MB
- 5. Investigating Internet Security/2. Accepting cookies.mp4 9.54 MB
- 5. Investigating Internet Security/4. Avoiding browser threats.mp4 9.20 MB
- 7. Secure Devices and Applications/2. Understanding cryptography.mp4 9.05 MB
- 4. Getting Into Your System/2. Getting in the backdoor.mp4 8.46 MB
- 3. Understanding Malware/2. Eliminating unwanted surveillance.mp4 7.12 MB
- 1. Introduction/1. Tech savvy, tech safe.mp4 6.58 MB
- 7. Secure Devices and Applications/1. Keeping data private.mp4 6.26 MB
- 6. Mobile and Wireless Security/3. Concealing your access point.mp4 5.92 MB
- 7. Secure Devices and Applications/3. Email security.mp4 4.60 MB
- 1. Introduction/2. Prepare for MTA Exam 98-367.mp4 3.44 MB
- 8. Conclusion/Next steps.mp4 1.88 MB
- Glossary_IT_Security_CoreConcepts/Glossary_IT_Security_CoreConcepts.pdf 86 KB
- ReadMe.txt 2 KB
[LinkedIn Learning] Lisa Bock - IT Security Foundations Core Concepts
Hot Tags: