Jump to content

Search the Community

Showing results for tags 'cybersecurity'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Announcement
    • WE ARE BACK!!! -- ONLINE
  • TECHNICAL DISCUSSION (No Request Section).
    • CISCO SYSTEMS
    • JUNIPER NETWORKS
    • AWS
    • Microsoft
    • FORTINET
    • COMPTIA
    • Linux
  • TRAINING OFFERS & REQUESTS
    • CISCO SYSTEMS
    • JUNIPER NETWORKS
    • AWS
    • Microsoft
    • COMPTIA
    • LINUX
  • CYBERSECURITY - TRAINING OFFERS & REQUESTS
    • CYBERSECURITY SHARES
  • FINANCE & ACCOUNTS - TRAINING OFFERS & REQUESTS
    • FINANCE & ACCOUNTING SHARES
  • Other Certifications (Share & Request)
    • OTHER SHARES
  • Vouchers
    • Vouchers
  • Job Opportunities
    • Jobs
  • Entertainment & OTT Platform
    • Entertainment & OTT Platform
  • Complain & Suggestions
    • Complain & Suggestions

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 9 results

  1. please anyone can get us this course Implementing IPSec You never know who's listening. Implementing IPsec for encrypting communication between sites is one of the first lines of defense in a Network Security Engineer's toolkit to prevent a data breach. In this course you will learn how to implement LAN-to-LAN IPsec Tunnels on both Cisco IOS and Juniper JunOS to provide secure connectivity between your network sites.
  2. 32 TB (Mega)CYBER SECURITY Courses Including (INFOSEC Institute ,BALCKHAT Ethical Hacking, UDEMY Cybersecurity Courses) READ THE RULES MISSING [Offer] / [Req] in subject
  3. Free Download [OFFER] Cybersecurity Analyst - SIEM Published 1/2024 Created by Kirk Slater MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Genre: eLearning | Language: English | Duration: 5 Lectures ( 1h 11m ) | Size: 526 MB Elastisearch, Discover, Rules and Dashboards What you'll learn: Elastic Discover and searching Elastic Visualizations and Dashboards Creating Elastic rules and Cases Defining roles, users and spaces Requirements: None Description: Basics of Elastic. Starting from Discover. Looking at Rules and Cases, Visualizations and Dashboards.We start with the basics of Elastic Discover, using the KQL search and the fields to filter in and out parts of the documents.The visualizations made are added to a dashboard and saved for use later. Users and roles are made and amended as well as creating a new space with more limited access.We also talk about setting up rules, the rules shown are unfortunately not able to fire due to the setup that i am using, we are able to create a new one and modify a previously made one. WE then talk though the use of cases and how they can be used.Everything in this course is designed to help you use and become proficient in the use of Elastic at the basic level, it will also assist you in the certification exam. Practice makes perfect and the more you use Elastic the better you will get.This is by no means best practice but an insight on how i use Elastic to try and help you use it better.Please do leave feedback and criticism so i can improve and modify the course. Who this course is for: Beginners Homepage Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live [hide] No Password - Links are Interchangeable
  4. Penetration Testing with Kali Linux 2021(PWK) has been overhauled for 2020. It’s bigger and better than ever before. PWK is the foundational penetration testing course here at Offensive Security, and the only official training for the industry-leading OSCP exam. The original version of the course has enabled thousands of information security professionals to build their careers. Updating PWK to integrate the latest technology, tools and processes is critical to continuing to support our students. Our teams have worked hard to not only develop new additions to the content, but also to completely revise all the modules for a better experience. What is found in the books Bash Scripting, Active Directory Attacks, Introduction to Buffer Overflows etc [hide] Download link : https://mega.nz/file/QkF10CDZ key : D36j5U1BcxdIkHHWQxx3birUr3usl2dRgGLUURtTrGE [/hide]
  5. Free Download [OFFER] Transitioning to a Career in Cybersecurity (2024) Released: 01/2024 Duration: 1h 19m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 163 MB Level: Beginner | Genre: eLearning | Language: English Cybersecurity continues to be one of the fastest-growing career fields, with thousands of jobs of all types going unfilled. If you're eager to transition to a career in this vital industry but don't know where to start, then this is the course for you. Instructor Marc Menninger-a cybersecurity director with 20+ years of experience-explains how to use the skills and experience you already have to build a lucrative and successful career in cybersecurity. Whether your background is in IT, security, or another field, Marc can help you identify the right cybersecurity specialization and pinpoint skill gaps. He explains how to update your cybersecurity resume and LinkedIn profile to maximize your visibility and create a strong first impression with potential employers. Marc also shares tips for increasing your chances of success in cybersecurity-both before and after you land your first job-as well as insights that illuminate the average workday of a real-world cybersecurity pro. Homepage Say "Thank You" Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live [hide] No Password - Links are Interchangeable
  6. Free Download [OFFER] Cybersecurity Essentials - Stay Safe and Secure Online Published 1/2024 Created by Simon Sez IT MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Genre: eLearning | Language: English | Duration: 30 Lectures ( 2h 6m ) | Size: 1.14 GB Elevate your cybersecurity knowledge and protect yourself effectively in an ever-evolving online environment. What you'll learn: Create strong passwords using best practices for enhanced online protection. Evaluate accounts for potential compromises, ensuring heightened awareness of security risks. Utilize password managers effectively for efficient and secure password management. Configure and utilize Multi-Factor Authentication (MFA) to enhance account security against unauthorized access. Recognize and identify various forms of phishing attacks, fostering resilience against deceptive online practices. Enhance online security by inspecting URLs, identifying suspicious downloads, and managing trackers and cookies for safer online browsing. Optimize device security with antivirus software and apply mobile security best practices for device protection. Understand Virtual Private Networks (VPNs) functionality, choose an appropriate solution, and safeguard online privacy effectively. Requirements: No prior knowledge required. This course is suitable for beginners. Description: Welcome to the "Cybersecurity Essentials: Stay Safe and Secure Online" course. In today's world, where our reliance on computers and mobile devices is constant, safeguarding your online presence is essential. This course addresses major cybersecurity threats, providing insights into how these threats operate and equipping you with strategies to protect yourself effectively.Throughout the course, you'll explore critical topics such as password security, multi-factor authentication (MFA), phishing, online security, device security, and virtual private networks (VPNs). Learn the fundamentals of creating strong passwords, implementing MFA, recognizing phishing attempts, and managing your online footprint. Understand the importance of device security and explore the benefits of using VPNs to enhance your online privacy.This course will help you gain practical knowledge and skills to minimize cybersecurity risks. Discover the intricacies of password management, learn to identify phishing attacks, and adopt best practices for staying secure on the web. From choosing antivirus solutions to understanding the significance of VPNs, this course empowers you to navigate the digital landscape confidently. Elevate your cybersecurity knowledge and protect yourself effectively in an ever-evolving online environment.By the end of this course, students will be able to:Create strong passwords using best practices for enhanced online protection.Evaluate accounts for potential compromises, ensuring heightened awareness of security risks.Utilize password managers effectively for efficient and secure password management.Configure and utilize Multi-Factor Authentication (MFA) to enhance account security against unauthorized access.Recognize and identify various forms of phishing attacks, fostering resilience against deceptive online practices.Enhance online security by inspecting URLs, identifying suspicious downloads, and managing trackers and cookies for safer online browsing.Optimize device security with antivirus software and apply mobile security best practices for device protection.Understand Virtual Private Networks (VPNs) functionality, choose an appropriate solution, and safeguard online privacy effectively.This course includes:2 hours of video tutorials28 individual video lecturesCertificate of completion Who this course is for: Those who want to learn the essential cybersecurity knowledge and practices. People who want to safeguard their digital data and identity. Those who are new to network security and cybersecurity. Homepage Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live [hide] No Password - Links are Interchangeable
  7. Free Download [OFFER] Qradar Cybersecurity For Dummies 2024 Published 1/2024 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 120.51 MB | Duration: 0h 46m Learn QRadar Stuff Fast What you'll learn Qradar basic information. Getting cybersecurite related education. Getting tips to study better. Improving your QRadar knowledge. Requirements Computer and speakers. Description You are learning QRadar but would like to get some important information about it? Are you into QRadar and wish to get better knowledge? Then, THIS IS THE COURSE FOR YOU! Learning about QRadar is something that anyone can do as long as there is enough will to learn. Remember that the more you learn, the better for you. It is a matter of training as well and you can make it if you are persistent. Never give up, and remember to go forward everyday and you will eventually reach success. Cybersecurity knowledge is not that different, you need to practice, learn and improve your education. Here we will present you some basic ideas related to the world of QRadar and cybersecurity. Hacking is something that could be done in an ethical manner and the fact that you know this skill could be very meaningful for you if you want to be hired by technology companies out there.Sure, it is not that fast but you can make it in the long term at the end of the day. Remember that if you are a person that truly wants to dedicate yourself to something you can do it and at the end of the day the only one who will be able to learn for you that is no one else but yourself. Time to improve and see you in the other side of education. Overview Section 1: Intro Lecture 1 Intro Lecture 2 Work Lecture 3 Also Lecture 4 Improve Lecture 5 Indeed Lecture 6 Continue Lecture 7 Beyond Lecture 8 Unique Lecture 9 Motivation Lecture 10 Advance Lecture 11 Furthermore Lecture 12 QRadar Lecture 13 Technically Lecture 14 Remember Lecture 15 More Lecture 16 Tips Lecture 17 Education Lecture 18 End Anyone who wants to learn QRadar. Homepage Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live [hide] No Password - Links are Interchangeable
×
×
  • Create New...