LinkedIn Learning Cybersecurity for IT Professionals\01.Introduction\01.01.Learn the basics and common tools of cybersecurity.mp4
[ecaec58c5f71475e]
|
4,624,864 |
23878788 |
LinkedIn Learning Cybersecurity for IT Professionals\01.Introduction\01.01.Learn the basics and common tools of cybersecurity.srt |
1,289 |
0D3B7136 |
LinkedIn Learning Cybersecurity for IT Professionals\01.Introduction\01.02.What you should know.mp4
[62fb986d505a05a2]
|
3,013,077 |
6F7A7AAA |
LinkedIn Learning Cybersecurity for IT Professionals\01.Introduction\01.02.What you should know.srt |
3,652 |
E1F7F186 |
LinkedIn Learning Cybersecurity for IT Professionals\01.Introduction\01.03.Disclaimer.mp4
[7855318d04b89149]
|
1,736,448 |
EF90D856 |
LinkedIn Learning Cybersecurity for IT Professionals\01.Introduction\01.03.Disclaimer.srt |
2,280 |
36AE0A8C |
LinkedIn Learning Cybersecurity for IT Professionals\02.Why Cybersecurity\02.04.A history of hackers.mp4
[7e66f96a45b3d8e2]
|
8,033,769 |
3722D77E |
LinkedIn Learning Cybersecurity for IT Professionals\02.Why Cybersecurity\02.04.A history of hackers.srt |
8,169 |
F1303573 |
LinkedIn Learning Cybersecurity for IT Professionals\02.Why Cybersecurity\02.05.The cyber kill chain.mp4
[8f7eda7c4a64e5c0]
|
9,661,710 |
D23A7893 |
LinkedIn Learning Cybersecurity for IT Professionals\02.Why Cybersecurity\02.05.The cyber kill chain.srt |
9,763 |
E124123F |
LinkedIn Learning Cybersecurity for IT Professionals\02.Why Cybersecurity\02.06.Stuxnet and the kill chain.mp4
[b8dcdffc651ff540]
|
5,488,348 |
89B8F549 |
LinkedIn Learning Cybersecurity for IT Professionals\02.Why Cybersecurity\02.06.Stuxnet and the kill chain.srt |
6,506 |
ED74F66C |
LinkedIn Learning Cybersecurity for IT Professionals\02.Why Cybersecurity\02.07.Common forms of cyber attack.mp4
[3eec0b6bde6be260]
|
9,913,843 |
41D8BB74 |
LinkedIn Learning Cybersecurity for IT Professionals\02.Why Cybersecurity\02.07.Common forms of cyber attack.srt |
11,707 |
113401E7 |
LinkedIn Learning Cybersecurity for IT Professionals\03.Antivirus\03.08.Viruses, spyware, and adware.mp4
[b5fd852e9ec005a9]
|
2,722,224 |
DBA6F3CA |
LinkedIn Learning Cybersecurity for IT Professionals\03.Antivirus\03.08.Viruses, spyware, and adware.srt |
2,922 |
029926F4 |
LinkedIn Learning Cybersecurity for IT Professionals\03.Antivirus\03.09.Introducing Microsoft Windows Defender.mp4
[9e0cda729fe97193]
|
7,008,842 |
6FAE4BD9 |
LinkedIn Learning Cybersecurity for IT Professionals\03.Antivirus\03.09.Introducing Microsoft Windows Defender.srt |
5,359 |
B495FB55 |
LinkedIn Learning Cybersecurity for IT Professionals\03.Antivirus\03.10.Detecting malware with Defender.mp4
[2873b6317989a043]
|
6,281,724 |
F518057E |
LinkedIn Learning Cybersecurity for IT Professionals\03.Antivirus\03.11.Defender advanced settings.mp4
[639acab5f085cd28]
|
5,798,076 |
266DF363 |
LinkedIn Learning Cybersecurity for IT Professionals\03.Antivirus\03.11.Defender advanced settings.srt |
2,618 |
CB639E75 |
LinkedIn Learning Cybersecurity for IT Professionals\03.Antivirus\03.12.Automating scans with task scheduler.mp4
[6d5841eca63909f9]
|
8,826,816 |
357889BE |
LinkedIn Learning Cybersecurity for IT Professionals\03.Antivirus\03.12.Automating scans with task scheduler.srt |
5,781 |
EE6664C4 |
LinkedIn Learning Cybersecurity for IT Professionals\03.Antivirus\03.13.Other antivirus solutions.mp4
[bb57fb1575606618]
|
4,070,058 |
3ABCF3A5 |
LinkedIn Learning Cybersecurity for IT Professionals\03.Antivirus\03.13.Other antivirus solutions.srt |
2,779 |
58341905 |
LinkedIn Learning Cybersecurity for IT Professionals\04.Firewalls\04.14.Why firewalls.mp4
[e4dc1419d7a6f776]
|
3,545,513 |
3D57199E |
LinkedIn Learning Cybersecurity for IT Professionals\04.Firewalls\04.14.Why firewalls.srt |
3,923 |
C94AB514 |
LinkedIn Learning Cybersecurity for IT Professionals\04.Firewalls\04.15.Windows firewall basics.mp4
[244aefe05b0b834]
|
11,596,506 |
34E6EF28 |
LinkedIn Learning Cybersecurity for IT Professionals\04.Firewalls\04.15.Windows firewall basics.srt |
7,475 |
9AC61716 |
LinkedIn Learning Cybersecurity for IT Professionals\04.Firewalls\04.16.Advanced Windows firewall.mp4
[7794c632e350ceec]
|
20,178,160 |
1C2344A8 |
LinkedIn Learning Cybersecurity for IT Professionals\04.Firewalls\04.16.Advanced Windows firewall.srt |
11,821 |
44B2CC4C |
LinkedIn Learning Cybersecurity for IT Professionals\04.Firewalls\04.17.ZedLan firewall log analyzer.mp4
[f01e53abe1d737aa]
|
9,958,840 |
AA0BAF32 |
LinkedIn Learning Cybersecurity for IT Professionals\04.Firewalls\04.17.ZedLan firewall log analyzer.srt |
6,679 |
199A26B8 |
LinkedIn Learning Cybersecurity for IT Professionals\04.Firewalls\04.18.Introducing Linux iptables.mp4
[454a84ffc84051c5]
|
17,726,781 |
4D913CF9 |
LinkedIn Learning Cybersecurity for IT Professionals\04.Firewalls\04.18.Introducing Linux iptables.srt |
6,936 |
997C82EF |
LinkedIn Learning Cybersecurity for IT Professionals\04.Firewalls\04.19.Setting up a simple iptables firewall.mp4
[511b4fbe47b614f2]
|
7,831,972 |
BB7022DA |
LinkedIn Learning Cybersecurity for IT Professionals\04.Firewalls\04.19.Setting up a simple iptables firewall.srt |
2,728 |
19E0EFE6 |
LinkedIn Learning Cybersecurity for IT Professionals\05.Network Scanning\05.20.Getting started with Nmap.mp4
[f41351dfad5f5cf1]
|
24,750,337 |
C17E9C31 |
LinkedIn Learning Cybersecurity for IT Professionals\05.Network Scanning\05.20.Getting started with Nmap.srt |
10,152 |
BB78E0D3 |
LinkedIn Learning Cybersecurity for IT Professionals\05.Network Scanning\05.21.Advanced Nmap options.mp4
[2ecb1fb8c1fcbfea]
|
10,930,591 |
3C27841C |
LinkedIn Learning Cybersecurity for IT Professionals\05.Network Scanning\05.21.Advanced Nmap options.srt |
4,922 |
76AFD929 |
LinkedIn Learning Cybersecurity for IT Professionals\05.Network Scanning\05.22.GUI scanning with Zenmap.mp4
[f45995aef4e91680]
|
9,993,182 |
E14879A0 |
LinkedIn Learning Cybersecurity for IT Professionals\05.Network Scanning\05.22.GUI scanning with Zenmap.srt |
4,391 |
56E6C8AB |
LinkedIn Learning Cybersecurity for IT Professionals\06.Network Connections\06.23.Getting started with netcat.mp4
[ffc7501fbb108853]
|
8,015,482 |
9B574CEA |
LinkedIn Learning Cybersecurity for IT Professionals\06.Network Connections\06.23.Getting started with netcat.srt |
4,533 |
230F2319 |
LinkedIn Learning Cybersecurity for IT Professionals\06.Network Connections\06.24.Transferring files using netcat.mp4
[b19b9e080172d6f9]
|
11,259,776 |
30BEFBCA |
LinkedIn Learning Cybersecurity for IT Professionals\06.Network Connections\06.24.Transferring files using netcat.srt |
5,157 |
D4D9B51F |
LinkedIn Learning Cybersecurity for IT Professionals\06.Network Connections\06.25.Connecting to services.mp4
[94f2b71c9a97f3ac]
|
9,646,449 |
756723F0 |
LinkedIn Learning Cybersecurity for IT Professionals\06.Network Connections\06.25.Connecting to services.srt |
3,869 |
37B65797 |
LinkedIn Learning Cybersecurity for IT Professionals\06.Network Connections\06.26.Setting up a netcat honeypot.mp4
[c0ccb22c5f96dfad]
|
10,109,069 |
5D167C4C |
LinkedIn Learning Cybersecurity for IT Professionals\06.Network Connections\06.26.Setting up a netcat honeypot.srt |
5,165 |
B38D813A |
LinkedIn Learning Cybersecurity for IT Professionals\07.Vulnerability Scanning\07.27.Preparing Nessus to do scanning.mp4
[807664ea624c5b6]
|
12,444,260 |
60715185 |
LinkedIn Learning Cybersecurity for IT Professionals\07.Vulnerability Scanning\07.27.Preparing Nessus to do scanning.srt |
8,992 |
B99960CA |
LinkedIn Learning Cybersecurity for IT Professionals\07.Vulnerability Scanning\07.28.Setting up a Nessus policy.mp4
[fae063b9ad70c384]
|
5,483,138 |
450ECDA6 |
LinkedIn Learning Cybersecurity for IT Professionals\07.Vulnerability Scanning\07.28.Setting up a Nessus policy.srt |
3,860 |
7D6D957C |
LinkedIn Learning Cybersecurity for IT Professionals\07.Vulnerability Scanning\07.29.Running a Nessus scan.mp4
[8963e5a286bdf49]
|
10,034,374 |
F91D8348 |
LinkedIn Learning Cybersecurity for IT Professionals\07.Vulnerability Scanning\07.30.Scheduling scans.mp4
[5607e615726fbd35]
|
2,509,264 |
5A4B65A2 |
LinkedIn Learning Cybersecurity for IT Professionals\07.Vulnerability Scanning\07.30.Scheduling scans.srt |
2,260 |
0D4C7AA7 |
LinkedIn Learning Cybersecurity for IT Professionals\08.Web Applications\08.31.Combating application level threats.mp4
[8f6fc91b050ed84]
|
2,979,544 |
4BD94D9A |
LinkedIn Learning Cybersecurity for IT Professionals\08.Web Applications\08.31.Combating application level threats.srt |
1,611 |
67258D18 |
LinkedIn Learning Cybersecurity for IT Professionals\08.Web Applications\08.32.Running an SQL injection attack.mp4
[e25ab3613e17415e]
|
9,974,418 |
57F14CCD |
LinkedIn Learning Cybersecurity for IT Professionals\08.Web Applications\08.33.Cross-site scripting.mp4
[b1bc837f819fcc5f]
|
3,929,799 |
44CC2EE7 |
LinkedIn Learning Cybersecurity for IT Professionals\08.Web Applications\08.33.Cross-site scripting.srt |
2,556 |
7E8981BD |
LinkedIn Learning Cybersecurity for IT Professionals\08.Web Applications\08.34.Installing a web scanner.mp4
[b0c9a453025ecd38]
|
7,027,273 |
EDD41B9A |
LinkedIn Learning Cybersecurity for IT Professionals\08.Web Applications\08.34.Installing a web scanner.srt |
2,954 |
41486DC7 |
LinkedIn Learning Cybersecurity for IT Professionals\08.Web Applications\08.35.Scanning a website.mp4
[5127017a187afd95]
|
13,170,963 |
5B188807 |
LinkedIn Learning Cybersecurity for IT Professionals\08.Web Applications\08.35.Scanning a website.srt |
9,898 |
9B800EA8 |
LinkedIn Learning Cybersecurity for IT Professionals\08.Web Applications\08.36.Using a web proxy to inspect traffic.mp4
[259be0173496ebd5]
|
8,510,890 |
BFA37931 |
LinkedIn Learning Cybersecurity for IT Professionals\08.Web Applications\08.36.Using a web proxy to inspect traffic.srt |
5,915 |
2DC35089 |
LinkedIn Learning Cybersecurity for IT Professionals\09.Monitoring Packets\09.37.Explaining networks.mp4
[f8c406ab1a6a6318]
|
8,311,426 |
8B56BCE7 |
LinkedIn Learning Cybersecurity for IT Professionals\09.Monitoring Packets\09.37.Explaining networks.srt |
8,864 |
D506523A |
LinkedIn Learning Cybersecurity for IT Professionals\09.Monitoring Packets\09.38.Capturing packets with Wireshark.mp4
[8dfa50d0e83c3647]
|
9,861,083 |
BDB9C9C8 |
LinkedIn Learning Cybersecurity for IT Professionals\09.Monitoring Packets\09.38.Capturing packets with Wireshark.srt |
4,625 |
0F2C1234 |
LinkedIn Learning Cybersecurity for IT Professionals\09.Monitoring Packets\09.39.Making sense of the protocols.mp4
[d91a1e46a293c1ac]
|
12,708,009 |
7B8415F1 |
LinkedIn Learning Cybersecurity for IT Professionals\09.Monitoring Packets\09.39.Making sense of the protocols.srt |
6,212 |
683EAD6D |
LinkedIn Learning Cybersecurity for IT Professionals\09.Monitoring Packets\09.40.Using Wireshark filters.mp4
[383ace26ed3bd492]
|
10,767,095 |
DAD59CDB |
LinkedIn Learning Cybersecurity for IT Professionals\09.Monitoring Packets\09.40.Using Wireshark filters.srt |
3,921 |
9EDA1277 |
LinkedIn Learning Cybersecurity for IT Professionals\09.Monitoring Packets\09.41.Capturing intruders with packets.mp4
[a084ab8a5a2da40d]
|
7,440,639 |
CF41044B |
LinkedIn Learning Cybersecurity for IT Professionals\09.Monitoring Packets\09.41.Capturing intruders with packets.srt |
5,004 |
BAC0D046 |
LinkedIn Learning Cybersecurity for IT Professionals\10.Conclusion\10.42.Next steps.mp4
[a83705e04b75cf8e]
|
2,935,325 |
9FB5B87C |
LinkedIn Learning Cybersecurity for IT Professionals\10.Conclusion\10.42.Next steps.srt |
2,600 |
683A4660 |
LinkedIn Learning Cybersecurity for IT Professionals\Ex_Files_Cybersecurity_IT_Professionals.zip |
48,116 |
5E6FCD1B |
LinkedIn Learning Cybersecurity for IT Professionals\01.Introduction |
0 |
00000000 |
LinkedIn Learning Cybersecurity for IT Professionals\02.Why Cybersecurity |
0 |
00000000 |
LinkedIn Learning Cybersecurity for IT Professionals\03.Antivirus |
0 |
00000000 |
LinkedIn Learning Cybersecurity for IT Professionals\04.Firewalls |
0 |
00000000 |
LinkedIn Learning Cybersecurity for IT Professionals\05.Network Scanning |
0 |
00000000 |
LinkedIn Learning Cybersecurity for IT Professionals\06.Network Connections |
0 |
00000000 |
LinkedIn Learning Cybersecurity for IT Professionals\07.Vulnerability Scanning |
0 |
00000000 |
LinkedIn Learning Cybersecurity for IT Professionals\08.Web Applications |
0 |
00000000 |
LinkedIn Learning Cybersecurity for IT Professionals\09.Monitoring Packets |
0 |
00000000 |
LinkedIn Learning Cybersecurity for IT Professionals\10.Conclusion |
0 |
00000000 |
LinkedIn Learning Cybersecurity for IT Professionals |
0 |
00000000 |
|
Total size: |
361,067,921 |
|