Companies Home Search Profile

Practical Cybersecurity for IT Professionals

Focused View

Malcolm Shore

2:26:08

122 View
  • 01 - Understanding cybersecurity.mp4
    00:46
  • 02 - What you should know.mp4
    02:34
  • 03 - Disclaimer.mp4
    00:56
  • 01 - A history of hackers.mp4
    04:55
  • 02 - The cyber kill chain.mp4
    06:19
  • 03 - Stuxnet and the kill chain.mp4
    04:11
  • 04 - Common forms of cyberattack.mp4
    06:37
  • 05 - Viruses, spyware, and adware.mp4
    01:53
  • 06 - Cybercrime and ransomware.mp4
    03:27
  • 07 - Emerging trends in cybersecurity.mp4
    07:28
  • 01 - Introducing Microsoft Defender Antivirus.mp4
    04:08
  • 02 - Detecting malware with Microsoft Defender.mp4
    03:25
  • 03 - Automating scans with Task Scheduler.mp4
    03:03
  • 04 - Other antivirus solutions.mp4
    01:23
  • 01 - Why firewalls.mp4
    02:19
  • 02 - Windows Firewall basics.mp4
    05:05
  • 03 - Advanced Windows Firewall.mp4
    08:54
  • 04 - ZedLan firewall log analyser.mp4
    04:13
  • 05 - Introducing Linux iptables.mp4
    06:38
  • 06 - Setting up a simple iptables firewall.mp4
    04:41
  • 01 - Getting started with Nmap.mp4
    06:01
  • 02 - Advanced Nmap options.mp4
    04:02
  • 01 - Getting started with netcat.mp4
    03:10
  • 02 - Transferring files using netcat.mp4
    05:08
  • 03 - Connecting to services.mp4
    02:58
  • 04 - Setting up a netcat honeypot.mp4
    04:16
  • 01 - Preparing Nessus.mp4
    04:34
  • 02 - Setting up a Nessus policy.mp4
    02:53
  • 03 - Running a Nessus scan.mp4
    03:20
  • 04 - Running an exploit.mp4
    01:08
  • 01 - Combating application level threats.mp4
    01:25
  • 02 - Running an SQL injection attack.mp4
    04:18
  • 03 - Cross-site scripting.mp4
    03:11
  • 04 - Scanning with ZAP.mp4
    02:05
  • 05 - Using a proxy to manipulate web traffic.mp4
    03:02
  • 01 - Explaining data communications.mp4
    03:53
  • 02 - Capturing packets with Wireshark.mp4
    04:04
  • 03 - Making sense of the protocols.mp4
    03:01
  • 01 - What's next.mp4
    00:44
  • Description


    Learn how to protect your network from cyberattacks through practical, hands-on demonstrations. In this course, Malcolm Shore shows how to use the latest tools to discourage and combat hackers, phishers, and snoops attempting to infiltrate your Windows and Linux systems. Learn what forms cyberattacks can take, as well as the two most common types of protection you can build into your system: Antivirus protection and firewalls. Then, learn how to scan your network for suspicious files, check what services are exposed on your systems, and identify vulnerabilities at the host level with Nessus scans. Malcolm also shows how to combat application-level threats, identify weak points in your web applications, and monitor packet-level activity on your network.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Malcolm Shore
    Malcolm Shore
    Instructor's Courses
    Wide range of IT experience ranging from systems programming to policy and strategic planning. Strong expertise in applied IT security, focused on policy and governance. Teaching post graduate security (forensics, information warfare, security management, applied cryptography) Past interests include virtual worlds and web3d developments. Current work focusing on Cloud, security architectures, and national-level cybersecurity Specialties: SABSA, Cloud, Cryptography, Cybersecurity Strategy, Network Survivability
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 39
    • duration 2:26:08
    • Release Date 2023/01/19

    Courses related to Cyber Security