Linkedin Learning – CompTIA IT Fundamentals FC0-U61 Cert Prep 2 Files and Applications Networking and Security

Linkedin Learning – CompTIA IT Fundamentals FC0-U61 Cert Prep 2 Files and Applications Networking and Security-ZH
English | Size: 1.04 GB
Category: Tutorial

Learn the fundamentals you need to ace the CompTIA IT Fundamentals (FC0-U61) exam. Passing the exam earns you the ITF certification, designed for advanced users considering a career in IT. This certification is a great entry point for novices transitioning to IT pros and this three-part cert prep series provides "self-help" style guidance that you can use to study for the exam. The second course covers files and applications, networking, and security. Instructor Scott Jernigan helps you understand the ins and outs of mobile devices and then shows how to manage files, manage applications, configure networks for Wi-Fi connectivity and printing, and mitigate the most critical IT security threats

Skillshare – Ultimate Ethical Hacking & Cyber Security Course – 2020

Skillshare – Ultimate Ethical Hacking & Cyber Security Course – 2020
English | Size: 1.11 GB
Category: Tutorial

Learn ethical hacking, penetration testing and cyber security with this complete course for 2020!
This tutorial was designed for absolute beginners, and before you know it you will be coding your own apps to pentest.

Udemy – The Absolute Tools Guide to Cyber Security and Hacking

The Absolute Tools Guide to Cyber Security and Hacking
English | Size: 673.43 MB
Category: Tutorial

What you’ll learn
You will go through a demo on SYN flooding attach using hping3 command
You will go through a demo on Metasploit test. Metasploit is a penetration testing framework that makes hacking simple. It’s an essential tool for many attackers and defenders.

PluralSight – Security Event Triage Leveraging Existing Security Device Alerts

PluralSight – Security Event Triage Leveraging Existing Security Device Alerts-JGTiSO
English | Size: 167.70 MB
Category: Tutorial

Identifying suspicious network activity can prevent serious security breaches. By monitoring centralized device logs you can catch potential security problems in a timely manner.

Cloud Academy – Azure Active Directory Security

Cloud Academy – Azure Active Directory Security-STM
English | Size: 314.47 MB
Category: Tutorial

Azure Active Directory Security
Azure Active Directory, commonly referred to as Azure AD is Microsoft s Identity and Access Management service in the Cloud. It manages users, groups, and applications along with their access to other applications and resources running in the cloud. This is exactly what we have with traditional on-premises Active Directory. Azure AD runs as a cloud service and thus can be thought of as Identity and Access Management as a Service. This course is an introduction to Azure AD security and covers topics related to securing users, groups, devices and applications as well as cover hybrid identity infrastructure solutions and much more!