Tag: Beginners

SSL/TLS for Beginners Securing Network Communications


Free Download SSL/TLS for Beginners Securing Network Communications
Duration: 2h 24m | .MP4 1280×720, 30 fps(r) | AAC, 48000 Hz, 2ch | 290 MB
Level: Beginner | Genre: eLearning | Language: English
Secure Sockets Layer (SSL) and the succeeding Transport Layer Security (TLS) provide the backbone of securing intranet and internet network communications through encryption and authentication. SSL and TLS standards are widely used to secure network communications for services such as websites, VoIP, VPNs, and email messages. In this course, learn the skills you need to plan, implement, and maintain a public key infrastructure (PKI) ecosystem that supports SSL/TLS security certificates. Instructor Daniel Lachance dives into how to install and configure PKI solutions in both Windows and Linux. Learn about how certificates are issued and managed throughout their lifetime; how hashing provides integrity and digital signatures provide authentication; and more.
Homepage

(more…)

The Absolute Beginners Guide to Cyber Security 2023 – Parts 1,2,3,4


Free Download The Absolute Beginners Guide to Cyber Security 2023 – Parts 1,2,3,4
Alexander Oni | Duration: 14:53 h | Video: H264 1920×1080 | Audio: AAC 44,1 kHz 2ch | 6,94 GB | Language: English
Cyber security applies technologies, processes, and controls to protect systems, networks, programs, devices, and data from cyberattacks. It reduces the risk of cyberattacks and protects against the unauthorized exploitation of systems, networks, and technologies.
The first section covers the terminologies and the trinity of IT security and computer protocols. In the second section, we explore the hackers’ world and the methodology. We will look at the different hackers and how they hack. In the next section, the various ways cyber criminals and hackers attack systems and networks are discussed, and you will learn about the popular attack forms, such as phishing, brute force attack, DoS/DDoS attacks, and Bots/Botnets.
We will then explore malware and the various malware, such as viruses, worms, and trojans, and how they differ. You will then learn about cybersecurity professional methods to protect systems and networks from cyberattacks and how antiviruses, firewalls, encryptions, biometrics, and authentication methods work. Finally, you will learn about information and cybersecurity topics, such as the BYOD policy and cyber warfare.

(more…)