:Search:

Industrial SCADA and ITOT from Cyber Security and Zero Trust DevCourseWeb

Torrent:
Info Hash: 22176A8269930EAAE91A0D8DFDD4800EBADD9D64
Thumbnail:
Similar Posts:
Uploader: FreeCourseWeb
Source: T Logo Torrent Galaxy
Downloads: 153
Language: English
Category: Other
Size: 664.4 MB
Added: Dec. 14, 2023, 5:02 p.m.
Peers: Seeders: 5, Leechers: 1 (Last updated: 11 months ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://open.stealth.si:80/announce 0 0 0
udp://exodus.desync.com:6969/announce 1 0 9
udp://tracker.cyberia.is:6969/announce 0 0 0
udp://tracker.opentrackr.org:1337/announce 2 0 139
udp://tracker.torrent.eu.org:451/announce 0 0 0
udp://explodie.org:6969/announce 1 0 0
udp://tracker.birkenwald.de:6969/announce 0 1 0
udp://tracker.moeking.me:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://ipv4.tracker.harry.lu:80/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.tiny-vps.com:6969/announce 1 0 5
udp://tracker.rarbg.torrentbay.st:6969/announce 0 0 0
Files:
  1. Get Bonus Downloads Here.url 182 bytes
  2. 1. Introduction and About me, the trainer.mp4 23.0 MB
  3. 1.1 LinkedIn Profile.html 116 bytes
  4. 1. Platform Backup.mp4 11.3 MB
  5. 1. Sandboxing.mp4 9.2 MB
  6. 2. Air Gapped Systems.mp4 14.6 MB
  7. 2.1 Stuxnet on Wikipedia.html 98 bytes
  8. 3. PKI and Certification Authorities.mp4 4.0 MB
  9. 4. Physical Security.mp4 25.8 MB
  10. 5. Procedures and Protocols.mp4 5.4 MB
  11. 1. This is Just the Beginning.mp4 4.0 MB
  12. 1. Overview on SCADA and Cyber Security.mp4 25.9 MB
  13. 2. Components of SCADA platform.mp4 17.9 MB
  14. 3. SCADA vs ITOT.mp4 17.9 MB
  15. 4. Standards.mp4 8.4 MB
  16. 1. Basic concepts when you plan the design of an ITOT.mp4 8.1 MB
  17. 2. Redundancy.mp4 16.8 MB
  18. 3. Single point of failure examples.mp4 7.6 MB
  19. 4. How to use maintenance windows for redundant units.mp4 24.5 MB
  20. 1. CIA Triad.mp4 3.6 MB
  21. 2. Zero trust and defense in depth.mp4 8.0 MB
  22. 3. Least privilege - using LDAP and Active Directory.mp4 14.1 MB
  23. 4. Multi-factor authentication (MFA).mp4 13.4 MB
  24. 5. Endpoints.mp4 7.6 MB
  25. 6. 802.1x Network Protocol.mp4 16.8 MB
  26. 7. Network access control.mp4 6.2 MB
  27. 8. Defense-in-depth.mp4 14.1 MB
  28. 9. Encryption.mp4 28.6 MB
  29. 1. Network Segmentation.mp4 5.2 MB
  30. 10. Remote Devices and Industrial Communication Protocols.mp4 9.7 MB
  31. 2. Segmentation Based on Role.mp4 7.9 MB
  32. 3. Segmentation Based on Risk.mp4 14.5 MB
  33. 4. Computer Network Switches.mp4 15.7 MB
  34. 5. Computer Network Firewalls.mp4 7.2 MB
  35. 6. IPSIDS.mp4 8.1 MB
  36. 7. Encryption.mp4 8.8 MB
  37. 8. Remote Access.mp4 21.7 MB
  38. 9. VPN and Corporate Access.mp4 9.7 MB
  39. 1. Physical servers.mp4 17.6 MB
  40. 2. Cloud servers.mp4 13.1 MB
  41. 3. Virtualization layer.mp4 11.4 MB
  42. 4. Operating Systems.mp4 5.2 MB
  43. 5. Other Infrastructure.mp4 8.0 MB
  44. 1. Defense In Depth.mp4 19.9 MB
  45. 2. Patching.mp4 13.8 MB
  46. 3. Fighting Malware.mp4 8.6 MB
  47. 4. Out Of Band Connections.mp4 5.7 MB
  48. 5. Centralized Management and Control.mp4 7.0 MB
  49. 6. Securing Common Network Protocols.mp4 13.9 MB
  50. 7. Vulnerability Testing and Assessment.mp4 15.5 MB
  51. 1. Monitoring.mp4 21.1 MB
  52. 2. Asset Management and Inventory.mp4 8.0 MB
  53. 3. Syslog.mp4 12.4 MB
  54. 1. Mirror Traffic and Network Taps.mp4 13.4 MB
  55. 2. NetFLOW and SFLOW.mp4 8.1 MB
  56. 3. Decrypting traffic for analysis.mp4 8.2 MB
  57. 4. SIEM.mp4 8.7 MB
  58. Bonus Resources.txt 386 bytes

Discussion