fileLynda-Foundations-of-Cyb-xuvj

Lynda Founions Cybersecurity
  • MP401. Introduction\\/01_01-Welcome.mp46.21MB
  • MP401. Introduction\\/01_02-What you should know.mp41.95MB
  • MP402. Cybersecurity Foundations\\/02_01-Understanding the NIST cybersecurity fr< x> amework.mp412.04MB
  • MP402. Cybersecurity Foundations\\/02_02-Dissecting cyber risk.mp412.53MB
  • MP402. Cybersecurity Foundations\\/02_03-Unpacking COBIT 5.mp49.84MB
  • MP402. Cybersecurity Foundations\\/02_04-Looking closer at DSS05.mp47.76MB
  • MP402. Cybersecurity Foundations\\/02_05-Implementing control fr< x> ameworks.mp413.64MB
  • MP402. Cybersecurity Foundations\\/02_06-Dissecting the payment card industry and PCI DSS.mp413.94MB
  • MP402. Cybersecurity Foundations\\/02_07-Exploring the Cyber Essentials fr< x> amework.mp48.83MB
  • MP403. Cybersecurity Threats\\/03_01-Breaking down the cybersecurity kill chain.mp47.71MB
  • MP403. Cybersecurity Threats\\/03_02-Dissecting security threats.mp411.04MB
  • MP403. Cybersecurity Threats\\/03_03-Exploring cybercrime as an industry.mp49.46MB
  • MP403. Cybersecurity Threats\\/03_04-Hiding lware through cloaking and alternate data streams.mp48.61MB
  • MP403. Cybersecurity Threats\\/03_05-Using callbacks to capture keystrokes.mp49.37MB
  • MP403. Cybersecurity Threats\\/03_06-Hiding lware with rootkits.mp49.34MB
  • MP403. Cybersecurity Threats\\/03_07-Understanding advanced persistent threats APTs.mp412.86MB
  • MP403. Cybersecurity Threats\\/03_08-Exploring ransomware.mp48.01MB
  • MP404. Security Architecture\\/04_01-Descng security requirements.mp414.21MB
  • MP404. Security Architecture\\/04_02-Architecting security risk.mp412.86MB
  • MP404. Security Architecture\\/04_03-Selecting security controls.mp48.14MB
  • MP404. Security Architecture\\/04_04-naging user access and identity.mp419.71MB
  • MP404. Security Architecture\\/04_05-Implementing preventative security.mp417.89MB
  • MP404. Security Architecture\\/04_06-Monitoring and alerts.mp414.95MB
  • MP405. Incident nagement\\/05_01-Managing incident response.mp48.11MB
  • MP405. Incident nagement\\/05_02-Preparing for an incident.mp413.53MB
  • MP405. Incident nagement\\/05_03-Responding to an incident.mp410.95MB
  • MP406. Conclusion\\/06_01-Next steps.mp43.44MB
Latest Search: 1.AAJ-028   2.BJYG-020   3.NTRD-016   4.MKCK-026   5.KWBD-059   6.HITMA-118   7.ASW-073   8.MIBD-543   9.EMAC-026   10.CWM-102   11.ID-19020   12.ARMM-038   13.EDGE-211   14.QEDZ-037   15.SUVM-005   16.PBD-160   17.KISD-023   18.IDBD-280   19.ONSD-566   20.DAZD-024   21.ONSD-671   22.REAL-014   23.ADD-005   24.NOV-8406   25.EMAS-005   26.MIBD-648   27.IDBD-069   28.MIBD-548   29.DSE-120   30.GYAZ-053   31.ONSD-633   32.KIBD-050   33.BNDV-00827   34.JBOX-419   35.HIB-01   36.ABS-166   37.ARM-0244   38.DSE-1019   39.MAC-17   40.URAB-011   41.IPTD-226   42.KBKD-844   43.MIYA-019   44.RKI-204   45.DVS-134   46.PBD-210   47.CADV-407   48.KOCH-003   49.CJ-023   50.CO-4702   51.CAV-3900041   52.ALD-432   53.BR-098   54.HS-192D   55.XTLD-001   56.RDD-053   57.DKSW-256   58.ID-010   59.LMHH-018   60.ID-024   61.MDI-160   62.PUROD-063   63.TSP-032   64.EMBW-062   65.KGDV-035   66.AGD-15   67.SINO-290   68.PL-020   69.SFNA-002   70.CJV-013   71.224   72.405   73.00828   74.262   75.014   76.034   77.006   78.175   79.14   80.069   81.24   82.536   83.004   84.087   85.253   86.628   87.480   88.319   89.171   90.03   91.213   92.445   93.26   94.20867   95.32   96.029   97.028   98.665   99.319   100.08   101.091   102.400   103.279   104.470   105.336   106.410   107.110   108.002   109.017   110.26   111.363   112.607   113.060   114.001   115.555   116.111   117.02   118.012   119.030   120.158   121.4104   122.011   123.038   124.606   125.101   126.534   127.010   128.004   129.376   130.043   131.292   132.002   133.073   134.197   135.024   136.260   137.035   138.079   139.003   140.212