Enterprise Security Essentials
Language: English | Size:41.95 GB
Genre:eLearning
Files Included :
1 Access Control Fundamentals.mp4 (82.99 MB)
MP4
2 Boundary Defense.mp4 (77.68 MB)
MP4
3 Controlled Access Based on Need to Know.mp4 (115.88 MB)
MP4
4 Limitation and Control of Network Ports.mp4 (44.17 MB)
MP4
5 Wireless Access Control.mp4 (113.05 MB)
MP4
6 Secure Configuration for Network Devices.mp4 (214.57 MB)
MP4
7 Email and Web Browser Protections.mp4 (111.71 MB)
MP4
8 Account Monitoring and Control.mp4 (127.63 MB)
MP4
1 Introduction.mp4 (42.07 MB)
MP4
2 VLAN Structure.mp4 (210.03 MB)
MP4
3 DMZ Structure.mp4 (185.37 MB)
MP4
4 Monitoring the Network.mp4 (392.07 MB)
MP4
5 Honeypot and Honeynet.mp4 (313.96 MB)
MP4
6 Passive Network Monitoring.mp4 (174.03 MB)
MP4
1 Introduction.mp4 (16.91 MB)
MP4
2 Physical Security.mp4 (142.09 MB)
MP4
3 System Security.mp4 (196.23 MB)
MP4
4 Security Operation Centers.mp4 (365.33 MB)
MP4
5 The Different Tiers of SOC Analyst.mp4 (295.3 MB)
MP4
6 SOC Challenges.mp4 (236.3 MB)
MP4
1 Introduction.mp4 (47.99 MB)
MP4
2 Enforcing Domain Membership.mp4 (609.12 MB)
MP4
3 Group Policy Application.mp4 (316.05 MB)
MP4
4 Protocol Hardening.mp4 (372.14 MB)
MP4
5 Standardized Images.mp4 (257.76 MB)
MP4
1 Introducing Kali.mp4 (48.86 MB)
MP4
2 What is Kali.mp4 (264.9 MB)
MP4
3 Recon the network.mp4 (481.88 MB)
MP4
4 Move in for the attack.mp4 (550.19 MB)
MP4
5 Wrapping Up.mp4 (91.1 MB)
MP4
1 Introduction.mp4 (55.56 MB)
MP4
2 Core Definitions.mp4 (129.07 MB)
MP4
3 Incident detection.mp4 (209.61 MB)
MP4
4 Speed of the attack.mp4 (262.37 MB)
MP4
5 Incident Response Policies.mp4 (363.69 MB)
MP4
6 Incident Response Tools.mp4 (294.78 MB)
MP4
7 Endpoints.mp4 (58.41 MB)
MP4
1 Introduction.mp4 (109.5 MB)
MP4
2 Mobile Device Management.mp4 (277.37 MB)
MP4
3 Needed Security Features for Mobile Devices.mp4 (398.14 MB)
MP4
4 Protect the device.mp4 (397.5 MB)
MP4
5 iPhone Security.mp4 (467.14 MB)
MP4
6 Android Security.mp4 (69.18 MB)
MP4
1 Introduction.mp4 (137.17 MB)
MP4
2 Linux File Systems.mp4 (257.5 MB)
MP4
3 File permissions.mp4 (399.97 MB)
MP4
4 Network Settings.mp4 (447.56 MB)
MP4
5 Talking with other Operating Systems.mp4 (273.23 MB)
MP4
6 Linux Resources.mp4 (184.1 MB)
MP4
1 Linux Security and Hardening.mp4 (29.12 MB)
MP4
2 Network protection with iptables.mp4 (209.77 MB)
MP4
3 Configuring iptables.mp4 (294.72 MB)
MP4
4 iptables demonstration.mp4 (429.64 MB)
MP4
5 shadow and passwd files.mp4 (175.06 MB)
MP4
6 proc the kernel.mp4 (192.64 MB)
MP4
7 Using the knowledge to watch a system.mp4 (168.95 MB)
MP4
1 Introduction.mp4 (36.97 MB)
MP4
2 Windows logs.mp4 (243.77 MB)
MP4
3 Capturing Windows Logs remotely.mp4 (504.59 MB)
MP4
4 Linux logs.mp4 (450.34 MB)
MP4
5 SIEMs.mp4 (295.34 MB)
MP4
1 Malicious Code and Exploit Mitigation.mp4 (22.26 MB)
MP4
2 What is Malicious Code.mp4 (415.92 MB)
MP4
3 How to Sniff Them Out.mp4 (401.53 MB)
MP4
4 The Usual Suspects.mp4 (726.41 MB)
MP4
5 Find the Exploits on Our Own.mp4 (164.48 MB)
MP4
1 Password Management Overview.mp4 (155.11 MB)
MP4
2 Attacks Against Passwords.mp4 (156.84 MB)
MP4
3 Hashing Examples with Common Passwords.mp4 (118.6 MB)
MP4
4 Implementing AAA.mp4 (117.09 MB)
MP4
5 Windows Password Management.mp4 (124.01 MB)
MP4
6 Protecting SAM.mp4 (100.47 MB)
MP4
7 John The Ripper (Hash Suite).mp4 (139.93 MB)
MP4
8 Linux Password Management.mp4 (72.85 MB)
MP4
1 Exploitation Introduction.mp4 (128.48 MB)
MP4
2 Compare to Known Attacks.mp4 (357.05 MB)
MP4
3 Threat Scanning and Assessment.mp4 (338.85 MB)
MP4
4 Looking Around Metasploit.mp4 (269.83 MB)
MP4
5 Let's Leverage.mp4 (239.27 MB)
MP4
1 Network Security Devices.mp4 (18.66 MB)
MP4
2 Hardware Security Devices.mp4 (163.26 MB)
MP4
3 Software Security Devices.mp4 (211.77 MB)
MP4
4 Network Security Monitoring.mp4 (150.52 MB)
MP4
5 Looking At The Packets.mp4 (498.55 MB)
MP4
6 Next Generation Firewalls.mp4 (98.07 MB)
MP4
1 Networking and Protocols.mp4 (38.05 MB)
MP4
2 Full Packet Capturing.mp4 (218.62 MB)
MP4
3 Full Packet Capturing Examples.mp4 (461.83 MB)
MP4
4 The Flow Of The Packet.mp4 (250.22 MB)
MP4
5 Applicability To System And Network Security.mp4 (602.32 MB)
MP4
1 Security Frameworks and CIS Controls.mp4 (163.14 MB)
MP4
2 Policy.mp4 (268.41 MB)
MP4
3 Auditing.mp4 (292.36 MB)
MP4
4 Critical Security Controls - Basic.mp4 (371.73 MB)
MP4
5 Critical Security Controls – Foundational.mp4 (459.65 MB)
MP4
6 Critical Security Controls – Organizational.mp4 (292.68 MB)
MP4
1 Wireless Network Security.mp4 (57.59 MB)
MP4
2 Faraday Cages.mp4 (204.48 MB)
MP4
3 Robbery In Plain Site.mp4 (542.88 MB)
MP4
4 Weak Encryption.mp4 (617.46 MB)
MP4
5 Breaking the Wi-Fi.mp4 (201.23 MB)
MP4
1 Virtualization and Cloud Security.mp4 (16.37 MB)
MP4
2 Knowing What Virtualization is Being Used.mp4 (169.04 MB)
MP4
3 Installing and Configuring Hyper-V and VM Workstation.mp4 (592.76 MB)
MP4
4 Virtualization Can Mess With Inventory.mp4 (226.41 MB)
MP4
5 Escaping the Machine.mp4 (521.5 MB)
MP4
6 Virtual Review.mp4 (104.92 MB)
MP4
1 Vulnerability Scanning and Pen Testing.mp4 (143.59 MB)
MP4
2 Using nMap to find the Target.mp4 (664.11 MB)
MP4
3 Installing and Configuring Nessus.mp4 (532.19 MB)
MP4
4 Scanning with Nessus.mp4 (306.51 MB)
MP4
1 Web Communication Security.mp4 (13.61 MB)
MP4
2 The Basics of SSL and TLS.mp4 (351.15 MB)
MP4
3 Knowing the Traffic.mp4 (455.33 MB)
MP4
4 Ingredients of a Cookie.mp4 (345.12 MB)
MP4
5 Local and External Web.mp4 (206.21 MB)
MP4
6 Secure Traffic Within the Organization.mp4 (266.18 MB)
MP4
1 Picking the Attack Vector.mp4 (187.14 MB)
MP4
2 Using Scan Results to Pick the Attack Vector.mp4 (452.58 MB)
MP4
3 Picking the Attack Tool.mp4 (318.17 MB)
MP4
4 Presenting Your Findings.mp4 (355.56 MB)
MP4
5 Review.mp4 (35.15 MB)
MP4
1 Windows Access Controls.mp4 (131.54 MB)
MP4
2 Local Security Policy.mp4 (404.07 MB)
MP4
3 Group Policy.mp4 (370.88 MB)
MP4
4 Windows Defender.mp4 (282.97 MB)
MP4
5 Control the CLI.mp4 (283.4 MB)
MP4
1 AWS Fundamentals and Security Introduction.mp4 (77.3 MB)
MP4
2 AWS Identity and Access Management.mp4 (40.52 MB)
MP4
3 AWS CloudTrail and CloudWatch.mp4 (51.1 MB)
MP4
4 AWS Inspector and CloudFront.mp4 (50.81 MB)
MP4
5 AWS Shield.mp4 (114.91 MB)
MP4
6 AWS Route53 and KMS.mp4 (64.1 MB)
MP4
7 CloudFlare Overview.mp4 (134.02 MB)
MP4
1 Windows as a Service.mp4 (68.54 MB)
MP4
2 Software as a Service in Windows.mp4 (155.95 MB)
MP4
3 Platform as a Service in Windows.mp4 (217.43 MB)
MP4
4 Infrastructure as a Service in Windows.mp4 (106.6 MB)
MP4
5 Visualize the Service.mp4 (255.69 MB)
MP4
6 Windows Services.mp4 (367.62 MB)
MP4
7 Configuring Services in the GPO.mp4 (163.06 MB)
MP4
1 Windows Security Infrastructure.mp4 (61.31 MB)
MP4
2 Windows Security.mp4 (391.46 MB)
MP4
3 Application Control.mp4 (189.34 MB)
MP4
4 File System Security.mp4 (342.87 MB)
MP4
5 Register the Security.mp4 (370.91 MB)
MP4
6 Backup from the Incident.mp4 (169.97 MB)
MP4
1 Windows Automation, Auditing, and Forensics.mp4 (50.64 MB)
MP4
2 Automation.mp4 (481.83 MB)
MP4
3 Auditing.mp4 (333.68 MB)
MP4
4 Forensics.mp4 (846.27 MB)
MP4
1 Containers and MacOS Security Overview.mp4 (58.95 MB)
MP4
2 Containers (and their security concerns).mp4 (210.56 MB)
MP4
3 MacOS.mp4 (241.74 MB)
MP4
4 MacOS Security (overview).mp4 (172.42 MB)
MP4
5 Container and MacOS Review.mp4 (235.01 MB)
MP4
1 Active Defense Overview.mp4 (27.3 MB)
MP4
2 Honeypots and Decoys.mp4 (239.87 MB)
MP4
3 Tripwire.mp4 (174.85 MB)
MP4
4 Security Through Obscurity.mp4 (186.2 MB)
MP4
5 nMap and Logging.mp4 (79.95 MB)
MP4
1 Cryptography Overview.mp4 (120.74 MB)
MP4
2 Synchronous Crypto.mp4 (213.01 MB)
MP4
3 Synchronous Crypto Examples.mp4 (224.45 MB)
MP4
4 Asynchronous Crypto.mp4 (207.43 MB)
MP4
5 Asynchronous Crypto Example.mp4 (187.65 MB)
MP4
6 Cryptography Review.mp4 (22.87 MB)
MP4
1 Cryptography Algorithms & Deployment Overview.mp4 (37.15 MB)
MP4
2 Synchronous Algorithms.mp4 (249.89 MB)
MP4
3 Synchronous Algorithms Applications.mp4 (271.14 MB)
MP4
4 Asynchronous Algorithms.mp4 (45.95 MB)
MP4
5 Asynchronous Algorithms Applications.mp4 (100.14 MB)
MP4
1 Data Loss Prevention Overview.mp4 (11.65 MB)
MP4
2 Data Classification.mp4 (126.16 MB)
MP4
3 Data Protection -2.mp4 (206.22 MB)
MP4
4 Prevention at the Perimeter.mp4 (130.89 MB)
MP4
5 Back ups.mp4 (217.51 MB)
MP4
6 Regulatory Requirements.mp4 (96.23 MB)
MP4
7 Data Recovery.mp4 (204.78 MB)
MP4
8 Virtual Protection.mp4 (82.19 MB)
MP4
1 Defense in Depth.mp4 (18.37 MB)
MP4
2 Physical Controls.mp4 (248.06 MB)
MP4
3 Technical Controls.mp4 (305.47 MB)
MP4
4 Administrative controls.mp4 (207.61 MB)
MP4
5 Sandboxing on the Network.mp4 (230.99 MB)
MP4
6 Sandboxing on the Host.mp4 (163.68 MB)
MP4