[ DevCourseWeb.com ] Udemy - Industrial SCADA and ITOT from Cyber Security and Zero Trust

File Type Create Time File Size Seeders Leechers Updated
Movie 2023-12-11 664.44MB 2 0 2 weeks ago
Download
Magnet link   or   Save Instantly without Torrenting   or   Torrent download

To download this file, you need a free bitTorrent client such as qBittorrent.

Report Abuse
Tags
DevCourseWeb  com  Udemy  Industrial  SCADA  and  ITOT  from  Cyber  Security  and  Zero  Trust  
Related Torrents
  1. [ DevCourseWeb.com ] Udemy - Introduction To Ethical Hacking and Cyber Security 844.95MB
  2. [ DevCourseWeb.com ] Udemy - The Complete Networkx Course - From Zero To Expert! 1.64GB
  3. [ DevCourseWeb.com ] Udemy - Sports Massage And Aromatherapy Certification 3.27GB
  4. [ DevCourseWeb.com ] Udemy - Energy Cleanse and Re-Boot Ritual 2.70GB
  5. [ DevCourseWeb.com ] Udemy - Mastering Financial and Inventory Management using Tally Prime 1.59GB
  6. [ DevCourseWeb.com ] Udemy - Azure Data Engineering with ADF, ADB, Synapse and PowerBI 1.62GB
  7. [ DevCourseWeb.com ] Udemy - Professional Agile Leadership Course 101 - Pal-E and Pal I 1.02GB
  8. [ DevCourseWeb.com ] Udemy - Mastering HTML5 and CSS3 (Part 1 - Beginner Level) 1016.20MB
  9. [ DevCourseWeb.com ] Udemy - Team Building And Collaboration Skills For Managers 1.18GB
  10. [ DevCourseWeb.com ] Udemy - Ai-Powered Travel Writing - Master Manual Writing and Vlogging 3.31GB
Files
  1. Get Bonus Downloads Here.url 182B
  2. ~Get Your Files Here !/1. Introduction/1. Introduction and About me, the trainer.mp4 23.02MB
  3. ~Get Your Files Here !/1. Introduction/1.1 LinkedIn Profile.html 116B
  4. ~Get Your Files Here !/10. Platform Backup/1. Platform Backup.mp4 11.32MB
  5. ~Get Your Files Here !/11. Best Practices/1. Sandboxing.mp4 9.18MB
  6. ~Get Your Files Here !/11. Best Practices/2. Air Gapped Systems.mp4 14.58MB
  7. ~Get Your Files Here !/11. Best Practices/2.1 Stuxnet on Wikipedia.html 98B
  8. ~Get Your Files Here !/11. Best Practices/3. PKI and Certification Authorities.mp4 4.00MB
  9. ~Get Your Files Here !/11. Best Practices/4. Physical Security.mp4 25.81MB
  10. ~Get Your Files Here !/11. Best Practices/5. Procedures and Protocols.mp4 5.42MB
  11. ~Get Your Files Here !/12. Closing Thoughts/1. This is Just the Beginning.mp4 4.01MB
  12. ~Get Your Files Here !/2. Introduction on SCADA and why Cyber Security topic is so important/1. Overview on SCADA and Cyber Security.mp4 25.86MB
  13. ~Get Your Files Here !/2. Introduction on SCADA and why Cyber Security topic is so important/2. Components of SCADA platform.mp4 17.92MB
  14. ~Get Your Files Here !/2. Introduction on SCADA and why Cyber Security topic is so important/3. SCADA vs ITOT.mp4 17.93MB
  15. ~Get Your Files Here !/2. Introduction on SCADA and why Cyber Security topic is so important/4. Standards.mp4 8.38MB
  16. ~Get Your Files Here !/3. Basic concepts when you plan the design of an ITOT/1. Basic concepts when you plan the design of an ITOT.mp4 8.08MB
  17. ~Get Your Files Here !/3. Basic concepts when you plan the design of an ITOT/2. Redundancy.mp4 16.76MB
  18. ~Get Your Files Here !/3. Basic concepts when you plan the design of an ITOT/3. Single point of failure examples.mp4 7.55MB
  19. ~Get Your Files Here !/3. Basic concepts when you plan the design of an ITOT/4. How to use maintenance windows for redundant units.mp4 24.49MB
  20. ~Get Your Files Here !/4. Cyber Security for a SCADA system/1. CIA Triad.mp4 3.62MB
  21. ~Get Your Files Here !/4. Cyber Security for a SCADA system/2. Zero trust and defense in depth.mp4 7.99MB
  22. ~Get Your Files Here !/4. Cyber Security for a SCADA system/3. Least privilege - using LDAP and Active Directory.mp4 14.06MB
  23. ~Get Your Files Here !/4. Cyber Security for a SCADA system/4. Multi-factor authentication (MFA).mp4 13.37MB
  24. ~Get Your Files Here !/4. Cyber Security for a SCADA system/5. Endpoints.mp4 7.60MB
  25. ~Get Your Files Here !/4. Cyber Security for a SCADA system/6. 802.1x Network Protocol.mp4 16.81MB
  26. ~Get Your Files Here !/4. Cyber Security for a SCADA system/7. Network access control.mp4 6.17MB
  27. ~Get Your Files Here !/4. Cyber Security for a SCADA system/8. Defense-in-depth.mp4 14.13MB
  28. ~Get Your Files Here !/4. Cyber Security for a SCADA system/9. Encryption.mp4 28.58MB
  29. ~Get Your Files Here !/5. Computer Network Design and Considerations/1. Network Segmentation.mp4 5.17MB
  30. ~Get Your Files Here !/5. Computer Network Design and Considerations/10. Remote Devices and Industrial Communication Protocols.mp4 9.65MB
  31. ~Get Your Files Here !/5. Computer Network Design and Considerations/2. Segmentation Based on Role.mp4 7.92MB
  32. ~Get Your Files Here !/5. Computer Network Design and Considerations/3. Segmentation Based on Risk.mp4 14.51MB
  33. ~Get Your Files Here !/5. Computer Network Design and Considerations/4. Computer Network Switches.mp4 15.72MB
  34. ~Get Your Files Here !/5. Computer Network Design and Considerations/5. Computer Network Firewalls.mp4 7.19MB
  35. ~Get Your Files Here !/5. Computer Network Design and Considerations/6. IPSIDS.mp4 8.05MB
  36. ~Get Your Files Here !/5. Computer Network Design and Considerations/7. Encryption.mp4 8.77MB
  37. ~Get Your Files Here !/5. Computer Network Design and Considerations/8. Remote Access.mp4 21.74MB
  38. ~Get Your Files Here !/5. Computer Network Design and Considerations/9. VPN and Corporate Access.mp4 9.66MB
  39. ~Get Your Files Here !/6. Servers and Other Infrastructure/1. Physical servers.mp4 17.56MB
  40. ~Get Your Files Here !/6. Servers and Other Infrastructure/2. Cloud servers.mp4 13.14MB
  41. ~Get Your Files Here !/6. Servers and Other Infrastructure/3. Virtualization layer.mp4 11.38MB
  42. ~Get Your Files Here !/6. Servers and Other Infrastructure/4. Operating Systems.mp4 5.18MB
  43. ~Get Your Files Here !/6. Servers and Other Infrastructure/5. Other Infrastructure.mp4 7.95MB
  44. ~Get Your Files Here !/7. Securing The Platform/1. Defense In Depth.mp4 19.85MB
  45. ~Get Your Files Here !/7. Securing The Platform/2. Patching.mp4 13.80MB
  46. ~Get Your Files Here !/7. Securing The Platform/3. Fighting Malware.mp4 8.59MB
  47. ~Get Your Files Here !/7. Securing The Platform/4. Out Of Band Connections.mp4 5.67MB
  48. ~Get Your Files Here !/7. Securing The Platform/5. Centralized Management and Control.mp4 7.04MB
  49. ~Get Your Files Here !/7. Securing The Platform/6. Securing Common Network Protocols.mp4 13.93MB
  50. ~Get Your Files Here !/7. Securing The Platform/7. Vulnerability Testing and Assessment.mp4 15.54MB
  51. ~Get Your Files Here !/8. Logging and monitoring/1. Monitoring.mp4 21.10MB
  52. ~Get Your Files Here !/8. Logging and monitoring/2. Asset Management and Inventory.mp4 7.97MB
  53. ~Get Your Files Here !/8. Logging and monitoring/3. Syslog.mp4 12.39MB
  54. ~Get Your Files Here !/9. Data Analysis/1. Mirror Traffic and Network Taps.mp4 13.35MB
  55. ~Get Your Files Here !/9. Data Analysis/2. NetFLOW and SFLOW.mp4 8.07MB
  56. ~Get Your Files Here !/9. Data Analysis/3. Decrypting traffic for analysis.mp4 8.21MB
  57. ~Get Your Files Here !/9. Data Analysis/4. SIEM.mp4 8.67MB
  58. ~Get Your Files Here !/Bonus Resources.txt 386B