[LinkedIn Learning] Lisa Bock - IT Security Foundations Core Concepts

File Information:
  1. Magnet Link:Magnet LinkMagnet Link
  2. File Size:271.42 MB
  3. Creat Time:2024-07-22
  4. Active Degree:5
  5. Last Active:2024-10-04
  6. File Tags:LinkedIn  Learning  Lisa  Bock  IT  Security  Foundations  Core  Concepts  
  7. Statement:This site does not provide download links, only text displays, and does not contain any infringement.
File List:

    [LinkedIn Learning] Lisa Bock - IT Security Foundations Core Concepts

  1. 2. Core Security Principles/3. Avoiding scam artists.mp4 26.99 MB
  2. 2. Core Security Principles/4. Analyzing the attack surface.mp4 16.60 MB
  3. 2. Core Security Principles/1. Keeping information safe.mp4 14.19 MB
  4. 3. Understanding Malware/1. Explaining viruses and worms.mp4 13.92 MB
  5. 5. Investigating Internet Security/3. Blocking malicious content.mp4 13.86 MB
  6. 6. Mobile and Wireless Security/2. Sharing a secret.mp4 13.05 MB
  7. 2. Core Security Principles/5. Modeling threats.mp4 12.28 MB
  8. 6. Mobile and Wireless Security/4. Protecting mobile devices.mp4 11.80 MB
  9. 6. Mobile and Wireless Security/1. Securing your Wi-Fi.mp4 11.80 MB
  10. 4. Getting Into Your System/4. Exploiting the unknown.mp4 11.17 MB
  11. 3. Understanding Malware/3. Holding data hostage.mp4 11.07 MB
  12. 5. Investigating Internet Security/1. Using secure websites.mp4 10.80 MB
  13. 4. Getting Into Your System/1. Stopping the imposters.mp4 10.66 MB
  14. 2. Core Security Principles/2. Managing risk.mp4 10.63 MB
  15. 4. Getting Into Your System/3. Overflowing the buffer.mp4 10.45 MB
  16. 5. Investigating Internet Security/2. Accepting cookies.mp4 9.54 MB
  17. 5. Investigating Internet Security/4. Avoiding browser threats.mp4 9.20 MB
  18. 7. Secure Devices and Applications/2. Understanding cryptography.mp4 9.05 MB
  19. 4. Getting Into Your System/2. Getting in the backdoor.mp4 8.46 MB
  20. 3. Understanding Malware/2. Eliminating unwanted surveillance.mp4 7.12 MB
  21. 1. Introduction/1. Tech savvy, tech safe.mp4 6.58 MB
  22. 7. Secure Devices and Applications/1. Keeping data private.mp4 6.26 MB
  23. 6. Mobile and Wireless Security/3. Concealing your access point.mp4 5.92 MB
  24. 7. Secure Devices and Applications/3. Email security.mp4 4.60 MB
  25. 1. Introduction/2. Prepare for MTA Exam 98-367.mp4 3.44 MB
  26. 8. Conclusion/Next steps.mp4 1.88 MB
  27. Glossary_IT_Security_CoreConcepts/Glossary_IT_Security_CoreConcepts.pdf 86 KB
  28. ReadMe.txt 2 KB