23 OCT 2025 - We are back! If you have been following us over the last few years, you will know that the last 2 months have been rough. We website was practically not loading. Sorry for the mess. We are back though and everything should run smoothly now. New servers. Updated domains. And new owners. We invite you all to start uploading torrents again!
TORRENT DETAILS
Lynda - Cybersecurity For IT Professionals
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
Protect your network from cyber attacks. Malcolm Shore shows how to use the latest tools to discourage and combat hackers, phishers, and snoops attempting to infiltrate your Windows and Linux systems. Learn what forms cyber attacks can take, and the two most common types of protection you can build into your system: antivirus protection and firewalls. Then learn how to scan your network for suspicious files, detect intruders with Netcat, and identify vulnerabilities at the host level with Nessus scans. Malcolm also shows how to avoid common security mistakes and monitor packet-level activity on your network.
Topics include:
Hackers and the kill chain
Viruses, spyware, and adware
Scanning with Windows Defender
Building firewalls
Scanning with Nmap
Monitoring network communications with Netcat
Combating application-level threats
Capturing intruders through packet inspection
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
00. Introduction/00_01 - Welcome.mp4
6 MB
00. Introduction/00_02 - What you should know before watching this course.mp4
848.8 KB
00. Introduction/00_03 - Using the exercise files.mp4
928.4 KB
01. Why Cybersecurity/01_01 - Hackers and the kill chain.mp4
13.6 MB
01. Why Cybersecurity/01_02 - The Stuxnet kill chain.mp4
8.5 MB
01. Why Cybersecurity/01_03 - Common forms of cybersecurity attack.mp4
13.5 MB
02. Antivirus/02_01 - Viruses, spyware, and adware.mp4
3.8 MB
02. Antivirus/02_02 - Using Windows Defender.mp4
3 MB
02. Antivirus/02_03 - Setting up real-time protection.mp4
1004.4 KB
02. Antivirus/02_04 - Scanning with Windows Defender.mp4
4.1 MB
02. Antivirus/02_05 - Modifying antivirus settings in Windows Defender.mp4
5.5 MB
02. Antivirus/02_06 - Scheduling a scan with Windows Defender.mp4
9.2 MB
02. Antivirus/02_07 - Using Windows Defender offline.mp4
1.8 MB
02. Antivirus/02_08 - Exploring antivirus on Linux.mp4
1.7 MB
03. Personal Firewalls/03_01 - Why firewalls.mp4
1.4 MB
03. Personal Firewalls/03_02 - Using the Microsoft Windows Firewall.mp4
12.3 MB
03. Personal Firewalls/03_03 - Setting up advanced security notifications.mp4
9.1 MB
03. Personal Firewalls/03_04 - Setting up detailed rules.mp4
10.4 MB
03. Personal Firewalls/03_05 - Managing and analyzing log files with ZedLan.mp4
8.1 MB
03. Personal Firewalls/03_06 - Introducing iptables in Linux.mp4
10.2 MB
03. Personal Firewalls/03_07 - Building a simple firewall with iptables.mp4
4.6 MB
04. Knowing What Is on Your Network/04_01 - Getting started with Nmap.mp4
1.9 MB
04. Knowing What Is on Your Network/04_02 - Scanning for hosts.mp4
5 MB
04. Knowing What Is on Your Network/04_03 - Scanning for services.mp4
4.1 MB
04. Knowing What Is on Your Network/04_04 - Exploring advanced Nmap options.mp4
4.4 MB
04. Knowing What Is on Your Network/04_05 - Scanning in Windows with Zenmap.mp4
8.9 MB
05. Network Communications and Detecting Intruders/05_01 - Getting started with Netcat.mp4
3.1 MB
05. Network Communications and Detecting Intruders/05_02 - Using Netcat for file transfers.mp4
6 MB
05. Network Communications and Detecting Intruders/05_03 - Connecting to services.mp4
5 MB
05. Network Communications and Detecting Intruders/05_04 - Setting up a honeypot with Netcat.mp4
6.1 MB
06. Checking Hosts for Known Vulnerabilities/06_01 - Introduction to vulnerability scanning.mp4
2.2 MB
06. Checking Hosts for Known Vulnerabilities/06_02 - Getting started with Nessus.mp4
5.6 MB
06. Checking Hosts for Known Vulnerabilities/06_03 - Configuring Nessus.mp4
5.2 MB
06. Checking Hosts for Known Vulnerabilities/06_04 - Running a Nessus scan.mp4
11.8 MB
06. Checking Hosts for Known Vulnerabilities/06_05 - Scheduling a Nessus scan.mp4
4.2 MB
07. Checking for Common Mistakes in Web Apps/07_01 - Combating application-level threats.mp4
9.1 MB
07. Checking for Common Mistakes in Web Apps/07_02 - Web security scanning.mp4
15.9 MB
07. Checking for Common Mistakes in Web Apps/07_03 - Using the scanner as a web proxy.mp4
7.3 MB
08. Monitoring Network Activity/08_01 - Using Wireshark to explain packet-level activity.mp4
8.8 MB
08. Monitoring Network Activity/08_02 - How to capture packets from the network to analyze activity.mp4
6.6 MB
08. Monitoring Network Activity/08_03 - Making sense of the TCP IP protocols.mp4
15.3 MB
08. Monitoring Network Activity/08_04 - Filtering packets to focus on areas of interest.mp4
9.5 MB
08. Monitoring Network Activity/08_05 - Capturing intruders with packets.mp4