Companies Home Search Profile

The Complete Cybersecurity Bootcamp (Video Collection) Pearson IT Certification

Focused View

26:12:00

8 View
  • 00001 Learning objectives.mp4
    00:36
  • 00002 1.1 Reviewing the OSI Model.mp4
    04:53
  • 00003 1.2 Reviewing the TCP IP Network Models.mp4
    01:28
  • 00004 1.3 Surveying Common Networking Protocols - DHCP.mp4
    02:58
  • 00005 1.4 Surveying Common Networking Protocols - Routing Protocols.mp4
    13:07
  • 00006 1.5 Surveying Common Networking Protocols - ICMP.mp4
    03:13
  • 00007 1.6 Surveying Common Networking Protocols - DNS.mp4
    09:07
  • 00008 1.7 Identifying Networking Device Types.mp4
    03:54
  • 00009 1.8 Understanding IP Subnets.mp4
    03:28
  • 00010 1.9 Examining VLANs and Data Visibility.mp4
    06:54
  • 00011 Learning objectives.mp4
    00:52
  • 00012 3.1 Understanding Defense-in-Depth.mp4
    04:08
  • 00013 3.2 Identifying Threats Vulnerabilities and Exploits and Their Associated Risk.mp4
    07:51
  • 00014 3.3 Identifying Threat Actors.mp4
    03:08
  • 00015 3.4 Understanding Reverse Engineering.mp4
    04:14
  • 00016 3.5 Understanding Chain of Custody.mp4
    06:55
  • 00017 3.6 Examining Run Books.mp4
    02:13
  • 00018 3.7 Introducing PII and PHI.mp4
    03:29
  • 00019 3.8 Understanding Principle of Least Privilege.mp4
    04:08
  • 00020 3.9 Performing Risk Assessment.mp4
    07:42
  • 00021 Learning objectives.mp4
    00:31
  • 00022 4.1 Understanding Confidentiality Integrity and Availability.mp4
    03:00
  • 00023 4.2 Understanding Authentication Authorization and Accounting.mp4
    03:09
  • 00024 4.3 Examining the Access Control Process - Terminology and Data Classification.mp4
    03:23
  • 00025 4.4 Examining the Access Control Process - Data States and Policy Roles.mp4
    06:02
  • 00026 4.5 Examining the Access Control Process - Security and Access Control Classification.mp4
    08:16
  • 00027 4.6 Understanding Discretionary Access Control.mp4
    04:21
  • 00028 4.7 Understanding Mandatory Access Control.mp4
    04:19
  • 00029 4.8 Understanding Role Based Access Control.mp4
    02:56
  • 00030 4.9 Understanding Attribute Based Access Control.mp4
    02:44
  • 00031 Learning objectives.mp4
    00:32
  • 00032 6.1 Understanding the Basic Components of Cryptography.mp4
    05:50
  • 00033 6.2 Introducing Public Key Infrastructure.mp4
    03:39
  • 00034 6.3 Deciphering Encryption Algorithms.mp4
    03:33
  • 00035 6.4 Understanding Hashing Algorithms.mp4
    05:58
  • 00036 6.5 Examining Secure Socket Layer and Transport Layer Security.mp4
    04:18
  • 00037 6.6 Examining Digital Certificates.mp4
    07:17
  • 00038 Learning objectives.mp4
    00:35
  • 00039 7.1 Introducing VPNs and Why We Use Them.mp4
    02:26
  • 00040 7.2 Examining Remote Access VPNs.mp4
    02:40
  • 00041 7.3 Examining Site-to-Site VPNs.mp4
    02:16
  • 00042 7.4 Understanding IPsec Concepts Components and Operations.mp4
    10:16
  • 00043 7.5 Surveying Cisco VPN Solutions - Traditional IPsec DMVPN FlexVPN.mp4
    12:37
  • 00044 7.6 Surveying Cisco VPN Solutions - Clientless SSL and AnyConnect.mp4
    07:10
  • 00045 Learning objectives.mp4
    00:29
  • 00046 9.1 Examining Host-Based Intrusion Detection.mp4
    03:34
  • 00047 9.2 Exploring Antimalware and Antivirus.mp4
    05:42
  • 00048 9.3 Understanding Host-based Firewalls.mp4
    04:03
  • 00049 9.4 Exploring Application-level Whitelisting Blacklisting.mp4
    07:20
  • 00050 9.5 Exploring Systems-based Sandboxing.mp4
    03:21
  • 00051 Learning objectives.mp4
    01:02
  • 00052 12.1 Surveying Types of Vulnerabilities.mp4
    12:39
  • 00053 12.2 Understanding Passive Reconnaissance and Social Engineering.mp4
    12:26
  • 00054 12.3 Understanding Active Reconnaissance Port Scanning and Host Profiling.mp4
    11:43
  • 00055 12.4 Understanding Privilege Escalation and Code Execution Attacks.mp4
    02:04
  • 00056 12.5 Understanding Backdoors and Man-in-the Middle Attacks.mp4
    05:44
  • 00057 12.6 Understanding Denial of Service Attacks.mp4
    05:34
  • 00058 12.7 Surveying Attack Methods for Data Exfiltration.mp4
    02:32
  • 00059 12.8 Understanding ARP Cache Poisoning and Route Manipulation Attacks.mp4
    07:07
  • 00060 12.9 Understanding Password Attacks.mp4
    04:13
  • 00061 12.10 Understanding Wireless Attacks.mp4
    04:19
  • 00062 12.11 Exploring Security Evasion Techniques.mp4
    07:44
  • 00063 Learning objectives.mp4
    00:24
  • 00064 1.1 Understanding Risk Analysis.mp4
    03:29
  • 00065 1.2 Understanding the Common Vulnerability Scoring System CVSS.mp4
    10:10
  • 00066 1.3 Interpreting Malware Analysis Tool Output.mp4
    05:26
  • 00067 Learning objectives.mp4
    00:36
  • 00068 5.1 Surveying Asset Management.mp4
    12:40
  • 00069 5.2 Surveying Configuration Management.mp4
    12:05
  • 00070 5.3 Surveying Mobile Device Management.mp4
    15:18
  • 00071 5.4 Surveying Patch Management.mp4
    10:29
  • 00072 5.5 Surveying Vulnerability Management.mp4
    16:54
  • 00073 5.6 Understanding Network and Host Antivirus.mp4
    09:26
  • 00074 5.7 Understanding SEIM and Log Collection.mp4
    12:07
  • 00075 Learning objectives.mp4
    00:27
  • 00076 8.1 Understanding Windows Forensics Basics.mp4
    14:32
  • 00077 8.2 Understanding Linux and MAC OS X Forensics Basics.mp4
    13:00
  • 00078 8.3 Examining Web Server Logs.mp4
    06:06
  • 00079 Learning objectives.mp4
    00:34
  • 00080 10.1 Introducing NetFlow.mp4
    09:10
  • 00081 10.2 Surveying Commercial and Open Source NetFlow Tools.mp4
    06:52
  • 00082 10.3 Understanding Flexible NetFlow.mp4
    02:42
  • 00083 10.4 Examining Firewall Logs.mp4
    13:13
  • 00084 10.5 Understanding Application Visibility and Control.mp4
    02:03
  • 00085 10.6 Examining Web and Email Content Filtering Logs.mp4
    01:55
  • 00086 10.7 Exploring Full Packet Capture.mp4
    04:20
  • 00087 10.8 Surveying IPS Events.mp4
    04:38
  • 00088 10.9 Surveying Host or Endpoint Events.mp4
    04:42
  • 00089 Learning objectives.mp4
    00:44
  • 00090 1.1 Introduction to NetFlow.mp4
    04:43
  • 00091 1.2 The Attack Continuum.mp4
    03:30
  • 00092 1.3 The Network as a Sensor and as an Enforcer.mp4
    02:27
  • 00093 1.4 What Is a Flow.mp4
    04:35
  • 00094 1.5 NetFlow Versus IP Accounting and Billing.mp4
    01:50
  • 00095 1.6 NetFlow for Network Security.mp4
    12:42
  • 00096 1.7 Traffic Engineering and Network Planning.mp4
    01:39
  • 00097 1.8 Introduction to IP Flow Information Export IPFIX.mp4
    10:24
  • 00098 1.9 Cisco Supported Platforms for NetFlow.mp4
    02:03
  • 00099 1.10 NetFlow Versions and History.mp4
    03:56
  • 00100 Learning objectives.mp4
    00:42
  • 00101 2.1 Introduction to Cisco Cyber Threat Defense.mp4
    08:51
  • 00102 2.2 Deployment Scenario - User Access Layer.mp4
    01:31
  • 00103 2.3 Deployment Scenario - Wireless LAN.mp4
    00:57
  • 00104 2.4 Deployment Scenario - Internet Edge.mp4
    01:06
  • 00105 2.5 Deployment Scenario - Data Center.mp4
    03:36
  • 00106 2.6 Deployment Scenario - NetFlow in Site-to-Site and Remote VPNs.mp4
    04:04
  • 00107 2.7 NetFlow Collection Considerations and Best Practices.mp4
    04:05
  • 00108 2.8 Determining the Flows per Second and Scalability.mp4
    02:54
  • 00109 Learning objectives.mp4
    00:43
  • 00110 4.1 Commercial NetFlow Monitoring and Analysis Software Packages.mp4
    05:54
  • 00111 4.2 NFdump.mp4
    04:05
  • 00112 4.3 NfSen.mp4
    00:37
  • 00113 4.4 SiLK.mp4
    04:32
  • 00114 4.5 Elasticsearch Logstash and Kibana Stack ELK - Overview and Architecture.mp4
    04:10
  • 00115 4.6 ELK - Installation and Configuration Files.mp4
    08:34
  • 00116 Learning objectives.mp4
    00:34
  • 00117 2.1 Examining Types of Evidence.mp4
    07:40
  • 00118 2.2 Surveying Windows Forensics - Application Processes Threads and Vulnerabilities.mp4
    03:36
  • 00119 2.3 Surveying Windows Forensics - Memory.mp4
    05:55
  • 00120 2.4 Surveying Windows Forensics - The Windows Registry.mp4
    07:15
  • 00121 2.5 Surveying Windows Forensics - Hard Drives FAT and NTFS.mp4
    08:17
  • 00122 2.6 Surveying Linux Forensics.mp4
    11:18
  • 00123 2.7 Understanding Evidence Collection.mp4
    13:48
  • 00124 2.8 Handling Evidence.mp4
    04:38
  • 00125 2.9 Examining Asset and Threat Actor Attribution.mp4
    05:24
  • 00126 Learning objectives.mp4
    00:31
  • 00127 3.1 Introducing Intrusion Analysis Fundamentals.mp4
    08:12
  • 00128 3.2 Examining Packet Captures.mp4
    05:36
  • 00129 3.3 Examining Protocol Headers.mp4
    02:18
  • 00130 3.4 Analyzing Security Device Data.mp4
    05:22
  • 00131 3.5 Differentiating False Positives False Negatives True Positives and True Negatives.mp4
    02:50
  • 00132 Learning objectives.mp4
    00:25
  • 00133 5.1 Scoping the Incident Response Plan and Process.mp4
    11:34
  • 00134 5.2 Understanding Information Sharing and Coordination.mp4
    02:54
  • 00135 5.3 Identifying the Incident Response Team Structure.mp4
    01:51
  • 00136 Learning objectives.mp4
    00:27
  • 00137 6.1 Analyzing Computer Incident Response Teams CSIRTs.mp4
    08:25
  • 00138 6.2 Analyzing Product Security Incident Response Teams PSIRTs.mp4
    10:50
  • 00139 6.3 Surveying Coordination Centers.mp4
    03:40
  • 00140 6.4 Analyzing Managed Security Service Providers Incident Response Teams.mp4
    03:00
  • 00141 Learning objectives.mp4
    00:18
  • 00142 8.1 Understanding Network Profiling.mp4
    07:32
  • 00143 8.2 Understanding Host Profiling.mp4
    06:25
  • 00144 Learning objectives.mp4
    00:34
  • 00145 9.1 Understanding Data Normalization.mp4
    03:00
  • 00146 9.2 Deconstructing Universal Data Formats.mp4
    03:07
  • 00147 9.3 Understanding the 5-tuple Correlation.mp4
    02:09
  • 00148 9.4 Performing DNS Analysis.mp4
    01:31
  • 00149 9.5 Performing Web Log Analysis.mp4
    04:20
  • 00150 9.6 Performing Deterministic and Probabilistic Analysis.mp4
    01:59
  • 00151 Learning objectives.mp4
    00:34
  • 00152 10.1 Identifying and Mitigating Reconnaissance.mp4
    08:33
  • 00153 10.2 Identifying and Mitigating Weaponization.mp4
    02:34
  • 00154 10.3 Identifying and Mitigating Delivery.mp4
    02:05
  • 00155 10.4 Identifying and Mitigating Exploitation.mp4
    01:02
  • 00156 10.5 Identifying and Mitigating Installation.mp4
    02:50
  • 00157 10.6 Identifying and Mitigating Command and Control.mp4
    01:39
  • 00158 10.7 Understanding Action on Objectives.mp4
    02:18
  • 00159 Learning objectives.mp4
    00:48
  • 00160 11.1 Introducing the Vocabulary for Event Recording and Incident Sharing VERIS.mp4
    02:13
  • 00161 11.2 Applying the VERIS Schema to Incident Handling.mp4
    04:28
  • 00162 11.3 Surveying the VERIS Incident Recording Tool and Other VERIS Resources.mp4
    01:31
  • 00163 Learning objectives.mp4
    01:03
  • 00164 1.1 Introducing Ethical Hacking and Pen Testing.mp4
    03:55
  • 00165 1.2 Getting Started with Ethical Hacking and Pen Testing.mp4
    06:26
  • 00166 1.3 Understanding the Legal Aspects of Penetration Testing.mp4
    07:33
  • 00167 1.4 Exploring Penetration Testing Methodologies.mp4
    03:39
  • 00168 1.5 Exploring Penetration Testing and other Cyber Security Certifications.mp4
    08:19
  • 00169 1.6 Building Your Own Lab - Overview.mp4
    07:54
  • 00170 1.7 Building Your Own Lab - VIRL and Operating System Software.mp4
    09:20
  • 00171 1.8 Understanding Vulnerabilities Threats and Exploits.mp4
    02:54
  • 00172 1.9 Understanding the Current Threat Landscape.mp4
    07:06
  • 00173 Learning objectives.mp4
    00:31
  • 00174 3.1 Understanding Passive Reconnaissance.mp4
    04:55
  • 00175 3.2 Exploring Passive Reconnaissance Methodologies - Discovering Host and Port Information.mp4
    12:25
  • 00176 3.3 Exploring Passive Reconnaissance Methodologies - Searching for Files.mp4
    07:20
  • 00177 3.4 Exploring Passive Reconnaissance Methodologies - Searching for Names Passwords and Sensitive Information.mp4
    05:53
  • 00178 3.5 Surveying Essential Tools for Passive Reconnaissance - SpiderFoot theHarvester and Discover.mp4
    09:07
  • 00179 3.6 Surveying Essential Tools for Passive Reconnaissance - Recon-ng.mp4
    20:33
  • 00180 Learning objectives.mp4
    00:32
  • 00181 4.1 Understanding Active Reconnaissance.mp4
    02:26
  • 00182 4.2 Exploring Active Reconnaissance Methodologies from an Ethical Hacker Perspective.mp4
    01:59
  • 00183 4.3 Surveying Essential Tools for Active Reconnaissance - Port Scanning and Web Service Review.mp4
    12:41
  • 00184 4.4 Surveying Essential Tools for Active Reconnaissance - Network and Web Vulnerability Scanners.mp4
    06:02
  • 00185 Learning objectives.mp4
    00:39
  • 00186 5.1 Understanding Web Applications.mp4
    05:24
  • 00187 5.2 Understanding Web Architectures.mp4
    01:54
  • 00188 5.3 Uncovering Web Vulnerabilities.mp4
    08:24
  • 00189 5.4 Testing Web Applications - Methodology.mp4
    01:54
  • 00190 5.5 Testing Web Applications - Reconnaissance.mp4
    05:11
  • 00191 5.6 Testing Web Applications - Mapping.mp4
    05:44
  • 00192 5.7 Testing Web Applications - Vulnerability Discovery.mp4
    11:54
  • 00193 5.8 Understanding the Exploitation of Web Applications.mp4
    10:12
  • 00194 5.9 Surveying Defenses to Mitigate Web Application Hacking.mp4
    03:13
  • 00195 Learning objectives.mp4
    01:05
  • 00196 8.1 Understanding the Reasons for and the Steps to Hacking a Network.mp4
    05:56
  • 00197 8.2 Reviewing Networking Technology Fundamentals - OSI and DoD Internet Models.mp4
    05:02
  • 00198 8.3 Reviewing Networking Technology Fundamentals - Forwarding Device Architecture and Communication.mp4
    06:18
  • 00199 8.4 Building an Internetwork Topology Using VIRL.mp4
    05:42
  • 00200 8.5 Hacking Switches - Reviewing Ethernet Fundamentals.mp4
    15:10
  • 00201 8.6 Hacking Switches - Demo.mp4
    06:23
  • 00202 8.7 Hacking Switches - ARP Vulnerabilities and ARP Cache Poisoning.mp4
    06:47
  • 00203 8.8 Reviewing Router Fundamentals.mp4
    16:18
  • 00204 8.9 Examining ICMP First Hop Redundancy and Routing Protocol Attacks.mp4
    11:57
  • 00205 8.10 Hacking the Management Plane.mp4
    19:56
  • 00206 8.11 Understanding Firewall Fundamentals and Levels of Inspection.mp4
    10:45
  • 00207 8.12 Performing Firewall Reconnaissance and Tunneling.mp4
    05:50
  • 00208 8.13 Surveying Essential Tools for Hacking Network Devices - Packet Capture.mp4
    09:36
  • 00209 8.14 Surveying Essential Tools for Hacking Network Devices - Switch and Router Hacking Tools.mp4
    05:04
  • 00210 8.15 Surveying Essential Tools for Hacking Network Devices - ARP Spoofing Tools.mp4
    09:35
  • 00211 8.16 Surveying Essential Tools for Hacking Network Devices - MiTM Tools.mp4
    02:51
  • 00212 8.17 Surveying Essential Tools for Hacking Network Devices - Linux Tools.mp4
    03:52
  • 00213 8.18 Using Network Device Hacking Tools to Perform a MiTM Attack.mp4
    03:53
  • 00214 Learning objectives.mp4
    00:34
  • 00215 9.1 Reviewing Wireless Technology Fundamentals.mp4
    09:04
  • 00216 9.2 Surveying Wireless Hacking Tools - Wireless Adapters.mp4
    07:51
  • 00217 9.3 Surveying Wireless Hacking Tools - Software.mp4
    05:50
  • 00218 9.4 Hacking WEP WPA and Other Protocols.mp4
    13:03
  • 00219 9.5 Understanding Hacking Wireless Clients.mp4
    15:22
  • 00220 Learning objectives.mp4
    00:34
  • 00221 10.1 Understanding Buffer Overflows.mp4
    08:22
  • 00222 10.2 Exploiting Buffer Overflows.mp4
    06:30
  • 00223 10.3 Overcoming Defenses for Buffer Overflow Vulnerabilities.mp4
    02:41
  • 00224 10.4 Understanding Fuzzing.mp4
    03:25
  • 00225 10.5 Creating a Fuzzing Strategy.mp4
    07:47
  • 00226 10.6 Exploring Mutation-based Generation-based and Evolutionary Fuzzers.mp4
    05:20
  • 00227 10.7 Surveying Tools to Find and Exploit Buffer Overflows.mp4
    09:28
  • 00228 Learning objectives.mp4
    00:27
  • 00229 6.1 Understanding Authentication and Authorization Mechanisms.mp4
    02:57
  • 00230 6.2 Understanding Authentication and Authorization Attacks.mp4
    05:42
  • 00231 6.3 Exploring Password Storage Mechanisms.mp4
    02:55
  • 00232 6.4 Understanding Password Storage Vulnerability.mp4
    03:40
  • 00233 6.5 Cracking Passwords with John the Ripper.mp4
    12:52
  • 00234 6.6 Cracking Passwords with hashcat.mp4
    09:19
  • 00235 6.7 Improving Password Security.mp4
    02:12
  • 00236 Learning objectives.mp4
    00:33
  • 00237 13.1 Understanding Social Engineering.mp4
    15:23
  • 00238 13.2 Exploring the Social Engineering Toolkit SET.mp4
    08:38
  • 00239 13.3 Exploring Maltego.mp4
    07:51
  • 00240 13.4 Surveying Social Engineering Case Studies.mp4
    15:54
  • 00241 Learning objectives.mp4
    00:39
  • 00242 15.1 Understanding Pen Test Reports and How They Are Used.mp4
    01:42
  • 00243 15.2 Planning and Organizing Your Report.mp4
    06:57
  • 00244 15.3 Understanding the Pen Test Report Format.mp4
    03:10
  • 00245 15.4 Exploring Risk Ratings.mp4
    03:38
  • 00246 15.5 Distributing Pen Test Reports.mp4
    02:57
  • 00247 Learning objectives.mp4
    00:47
  • 00248 2.1 Understanding Wireless Client Attacks and Their Motives.mp4
    05:19
  • 00249 2.2 Learning Packet Injection Attacks.mp4
    01:54
  • 00250 2.3 Eavesdropping and Manipulating Unencrypted Wi-Fi Communications.mp4
    04:26
  • 00251 2.4 Attacking Publicly Secure Packet Forwarding PSPF.mp4
    03:24
  • 00252 2.5 Attacking the Preferred Network List PNL.mp4
    02:04
  • 00253 Learning objectives.mp4
    00:25
  • 00254 3.1 Understanding Wireless Antennas.mp4
    02:26
  • 00255 3.2 Surveying Wi-Fi Devices Like the Pinneaple.mp4
    06:19
  • 00256 3.3 Building Your Own Lab.mp4
    03:00
  • 00257 Learning objectives.mp4
    00:32
  • 00258 4.1 Introducing the Aircrack-ng Suite.mp4
    05:52
  • 00259 4.2 Introducing Airmon-ng.mp4
    01:45
  • 00260 4.3 Understanding Airodump-ng.mp4
    03:12
  • 00261 4.4 Introducing Aireplay-ng.mp4
    02:32
  • 00262 4.5 Introducing Airdecap-ng.mp4
    01:43
  • 00263 4.6 Introducing Airserv-ng.mp4
    02:34
  • 00264 4.7 Introducing Airtun-ng.mp4
    01:34
  • 00265 Learning objectives.mp4
    00:23
  • 00266 5.1 Understanding WEP Fundamentals.mp4
    01:46
  • 00267 5.2 Learning How to Crack WEP.mp4
    05:21
  • 00268 Learning objectives.mp4
    00:33
  • 00269 6.1 Understanding WPA Fundamentals.mp4
    02:20
  • 00270 6.2 Surveying Attacks Against WPA2-PSK Networks.mp4
    03:25
  • 00271 6.3 Using coWPAtty.mp4
    05:35
  • 00272 6.4 Using Pyrit.mp4
    02:46
  • 00273 6.5 Exploring WPA Enterprise Hacking.mp4
    02:49
  • 00274 Learning objectives.mp4
    00:26
  • 00275 7.1 Using Kismet.mp4
    03:59
  • 00276 7.2 Using Wireshark.mp4
    01:56
  • 00277 7.3 Learning How to Hack Default Configurations.mp4
    03:03
  • 00278 Learning objectives.mp4
    00:28
  • 00279 8.1 Defining Evil Twin Attacks.mp4
    01:19
  • 00280 8.2 Performing Evil Twin Attacks.mp4
    08:37
  • 00281 8.3 Using Karmetasploit.mp4
    03:17
  • 00282 8.4 Exploring the WiFi Pineapple.mp4
    14:07
  • 00283 Learning objectives.mp4
    00:39
  • 00284 13.1 Understanding OWASP Mobile Device Vulnerabilities.mp4
    04:32
  • 00285 13.2 Wrestling with the BYOD Dilemma.mp4
    02:10
  • 00286 13.3 Understanding Mobile Device Management MDM.mp4
    02:19
  • 00287 13.4 Understanding Mobile Device Security Policies.mp4
    01:49
  • 00288 Learning objectives.mp4
    00:32
  • 00289 14.1 Exploring The Android Security Model.mp4
    16:46
  • 00290 14.2 Exploring Android Emulators and SDK.mp4
    03:41
  • 00291 14.3 Understanding Android Hacking Tools and Methodologies.mp4
    16:11
  • 00292 Learning objectives.mp4
    00:25
  • 00293 15.1 Introducing iOS Security.mp4
    02:23
  • 00294 15.2 Exploring Jailbraking iOS.mp4
    02:52
  • 00295 15.3 Surveying Tools for Dissasembling iOS Applications.mp4
    01:27
  • 00296 Learning objectives.mp4
    00:26
  • 00297 12.1 Understanding IoT Fundamentals.mp4
    04:41
  • 00298 12.2 Exploring ZigBee and IEEE 802.15.4.mp4
    05:27
  • 00299 12.3 Exploring INSTEON.mp4
    05:00
  • 00300 12.4 Exploring ZWave.mp4
    12:04
  • 00301 12.5 Exploring LoRA.mp4
    06:52
  • 00302 Learning objectives.mp4
    00:26
  • 00303 9.1 Understanding Bluetooth Vulnerabilities.mp4
    02:09
  • 00304 9.2 Surveying Tools for Bluetooth Monitoring.mp4
    04:43
  • 00305 Learning objectives.mp4
    00:37
  • 00306 10.1 Understanding NFC Vulnerabilities.mp4
    03:14
  • 00307 10.2 Exploring NFC Attacks and Case Studies.mp4
    06:34
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Pearson's video training library is an indispensable learning tool for today's competitive job market. Having essential technology training and certifications can open doors for career advancement and life enrichment. We take learning personally. We've published hundreds of up-to-date videos on wide variety of key topics for Professionals and IT Certification candidates. Now you can learn from renowned industry experts from anywhere in the world, without leaving home.
    • language english
    • Training sessions 307
    • duration 26:12:00
    • Release Date 2024/02/15