Torrent details for "Securing Your Network from Attacks [CoursesGhar]"    Log in to bookmark

wide
Torrent details
Cover
Download
Torrent rating (0 rated)
Controls:
Category:
Language:
English English
Total Size:
2.25 GB
Info Hash:
4e27cddc53e83f3056f013ce7ab57468a9345eba
Added By:
Added:  
03-07-2021 21:37
Views:
484
Health:
Seeds:
0
Leechers:
0
Completed:
6
wide




Description
wide
Securing Your Network from Attacks [CoursesGhar]

Duration: 6h 2m | Author(s): Jeff Minakata | Video: 1920x1080, 48kHz | 2.3 GB
Genre: eLearning | Language: English

Attacks on enterprise networks and home networks are a growing problem with daily targeted attacks that can result in crippling results.
These attacks have become more aggressive, sophisticated, and more dangerous over the years.

This course is designed to give you the knowledge and skills to identify, mitigate, and prevent these attacks and help you secure your network. The course is a practical course and designed to follow along at home or at work.

By the end of this course, you will have a solid understanding of a wide variety of cybersecurity-related areas for home and work.

Table of contents

Chapter 1: Introduction to Network Threats

Course Overview

Yes, You Are a Target

Typical Attacks Against a Network

DOS/DDOS Attacks

Chapter 2: How a Malicious Hacker Goes About Breaking into Your Network

A Malicious Hacker's Methodology

What We Can Learn from Malicious Hackers

Scanning Tools and Methodology
Securing Your Network from Attacks [CoursesGhar]
Social Eeering

Physical Attacks

Getting Sneaky with MiTM and DDOS Attacks

ExploidDB

Chapter 3: Securing Your Network Through Your Users

What is an Insider Threat

Why Employee Training is Important and Some Tips

Why You Need to Strike a Balance Between Security and Ease of Use

Employee Reporting

Chapter 4: Securing Your Machines

Patching Everything

Antivirus and Console Tools

Fake Error Messages, a Look at Scareware and What it is

Limiting User Rights

Application Reduction, Why You Should Slim It Down

VPN (What it is, Why They are Important)

Chapter 5: Logs and Auditing

System Log Files

Monitoring Software

Snort (IDS)

Network Alert Software and Monitoring (Meraki)

IP (What is IP Addresses, Why They are Important)

Chapter 6: Phishing and Spear Phishing Attacks

About Phishing Emails

Identifying Phishing Emails

Running a Phishing Campaign

Chapter 7: Red Teams and Blue Team Approach

What is a Red Team

What is a Blue Team

In-house or Contracted

Chapter 8: Tracking the Attacker (OSINT)

What is OSINT

Trace Labs OSINT VM

Tracking by IP

Canary Tokens

Bitcoin Tracking

Chapter 9: Recovering from an Attack

Damage Control and Assessment

Backup and Recovery

Developing and Learning from Your Attack

  User comments    Sort newest first

No comments have been posted yet.



Post anonymous comment
  • Comments need intelligible text (not only emojis or meaningless drivel).
  • No upload requests, visit the forum or message the uploader for this.
  • Use common sense and try to stay on topic.

  • :) :( :D :P :-) B) 8o :? 8) ;) :-* :-( :| O:-D Party Pirates Yuk Facepalm :-@ :o) Pacman Shit Alien eyes Ass Warn Help Bad Love Joystick Boom Eggplant Floppy TV Ghost Note Msg


    CAPTCHA Image 

    Anonymous comments have a moderation delay and show up after 15 minutes