Home » Tag cloud » Protection
Category: Tutorial
Cyber Security - Endpoint protectionEnglish | Size: 2.83 GB Category: CBTs
Endpoint security or endpoint protection is an approach to the protection of computer networks that are remotely bridged to client devices. The connection of laptops, tablets, mobile phones and other wireless devices to corporate networks creates attack paths for security threats.[1][2] Endpoint security attempts to ensure that such devices follow a definite level of compliance to standards.[3]
Download Now
Read More
Category: Software
Symantec Endpoint Protection 14.2 MP1 Build 14.2.1031.0100 (macOS  Linux)

Symantec Endpoint Protection 14.2 MP1 Build 14.2.1031.0100 (macOS / Linux) | 97.8 MB
Languages: English, 中文, Español, Français, Deutsch, Italiano,
日本語, 한국어, Português, Português do Brasil

The world's most advanced single-agent endpoint security with prevention, detection and response, deception and adaptation. Symantec is positioned by Gartner as the highest in execution and furthest in vision in the Endpoint Protection Platforms Magic Quadrant.
Download Now
Read More
Category: Tutorial
Network Foundation Protection Management PlaneEnglish | Size: 3.25 GB Category: Tutorial
Network Foundation Protection is a security framework that provides strategies to protect three functional areas of a device: Management Plane, Control Plane, and Data Plane. In this course we will focus on the Management Plane functionality and we will look at ways to protect and secure management access to network devices. We will compare the pros and cons of using an in-band vs an out-of-band management network and we will learn how to use network management protocols such as SNMP, NTP, SCP, RADIUS, TACACS+, Telnet, SSH, HTTP, and HTTPS to name a few. We will also learn the difference between the Cisco ACS and ISE servers and configure TACACS+ on ISE and an IOS device to provide with AAA for device administration. As a bonus, we will look at commonly used tools that can help you determine Cisco product vulnerabilities, best recommended software, and how to search bugs.
Download Now
Read More
Category: E-Book

Decoherence, Entanglement and Information Protection in Complex Quantum Systems

Vladimir M. Akulin, A. Sarfati, G. Kurizki, "Decoherence, Entanglement and Information Protection in Complex Quantum Systems"
2005 | pages: 704 | ISBN: 1402032811 | DJVU | 8,1 mb

Download Now
Read More
Category: Software
Symantec Endpoint Protection 14.0.1904.0000 (Win/Mac/Lnx) 190303

Symantec Endpoint Protection 14.0.1904.0000 (Win/Mac/Lnx) 190303

Symantec Endpoint Protection 14.0.1904.0000 (Win/Mac/Lnx) | 304 MB | 27.5 MB | 67 MB

Symantec Endpoint Protection - Proactively detect and block today's most advanced threats with an endpoint protection solution that goes beyond antivirus. Unrivaled Security - Stop advanced threats with intelligent security!

Download Now
Read More
Category: Tutorial
General Data Protection Regulation Foundation (GDPR F)

General Data Protection Regulation Foundation (GDPR F)
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 5 Hours 47M | 1.32 GB
Genre: eLearning | Language: English

Download Now
Read More
Category: Tutorial
How to Succeed in a Data Privacy & Protection Career (GDPR)
How to succeed in a Data Privacy & Protection Career (GDPR)
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + .VTT | Duration: 5 hours | Size: 2.12 GB


Download Now
Read More
Category: Tutorial
General Data Protection Regulation Practitioner (GDPR P)

General Data Protection Regulation Practitioner (GDPR P)
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 8 Hours | 1.79 GB
Genre: eLearning | Language: English

Download Now
Read More
Category: Software
RDS-Knight 3.7.2.11 Ultimate Protection

RDS-Knight 3.7.2.11 Ultimate Protection Multilingual | 5.6 Mb

When it comes to exposing Remote Desktop Protocol to direct connections, you need a solid secure server to protect your systems against remote attackers. Due to the innovative techniques available for modern cyber-criminals and a use-after-free vulnerability in the WeiRuan-->WeiRuan solution, hackers from all across the globe can easily access login credentials anywhere at all, carry out ransomware attacks and run arbitrary code on the targeted systems.
Download Now
Read More
Category: Tutorial
GDPR & PSD2 Data Protection Compliance for Financial Sector
GDPR & PSD2 data protection compliance for financial sector
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 6.5 Hours | Lec: 60 | 1.28 GB
Genre: eLearning | Language: English


Download Now
Read More