Computer Privacy and Security Essential Training


بالطبع لكل ما يهتم بالامان في عالم الحاسب وعالم الانترنت والخصوصه التي يجب ان يحصل كل منا عليها , هذا المنهج يعتبر حل مناسب لمن يريد ذالك
المنهج عباره عن اسطوانتين تحتويان على التالي

Introduction
Welcome 0:53 4.3 MB

1. Getting Started
The basics 7:50 10.5 MB
The threats 6:59 9.9 MB
The impact of security and privacy breaches 6:24 8.5 MB
Microsoft's 10 immutable laws of security 4:14 5.7 MB

2. Firewall Essentials
What are firewalls and how do they work? 9:17 13.6 MB
What firewalls can't do 2:52 3.9 MB
Hardware versus software firewalls 4:45 6.7 MB
Setting up and securing a hardware firewall/router 11:30 18.2 MB
Configuring and using the firewall in Windows XP 4:03 5.8 MB
Configuring and using the firewall in Windows XP SP2 3:23 3.8 MB
Configuring and using the firewall in Mac OS X 3:40 3 MB
Commercial and free software firewalls pt 1 7:45 11.9 MB
Commercial and free software firewalls pt 2 7:15 8.6 MB
Testing your firewalls 1:25 1.9 MB
Sygate Online Services 14:36 24.2 MB
Shields Up 7:00 15 MB

3. Wireless Security Essentials
How wireless networks work and how to secure them 20:53 29.2 MB
Wireless encryption 101 11:10 15.1 MB
Securing a Linksys wireless router 16:05 23.8 MB
Securing a D-Link wireless router 8:26 15 MB
Securing a NETGEAR wireless router 9:18 17.5 MB
Securing an Apple Airport 11:30 18.5 MB
Connecting your PC to a secure wireless network 8:41 9.6 MB

4. Patch Management Essentials
Why patch? 10:42 14.2 MB
What is patch management? 3:52 5.5 MB
Running Microsoft Update 9:15 15.4 MB
Running Apple Software Update 2:07 2.8 MB
Patching other software 6:51 13.3 MB
Dealing with exploits on unpatched computers 6:43 12.2 MB
Patch hoaxes 4:23 5.5 MB

5. Antivirus Essentials
Definitions 12:06 14 MB
Why is antivirus software necessary? 5:53 7.7 MB
Picking an antivirus solution 5:16 8.5 MB
Configuring your antivirus 7:06 5.9 MB
Updating your antivirus definitions 2:29 3 MB
Renew or uninstall? 1:10 0.9 MB
Virus hoaxes 5:12 11.2 MB

6. Antispyware Essentials
Definitions, damage, and how spyware gets installed 9:15 12.5 MB
Spyware detection and removal 4:37 5.7 MB
****ies 4:18 5.7 MB
How to download and run Spybot Search and Destroy 6:18 8.4 MB
How to download and run Lavasoft Ad-Aware 6:29 8 MB
How to run Hijack This and post a log 8:03 17 MB
How to download and run MacScan 5:14 8.7 MB
Fake antispyware 4:53 10.6 MB

7. Safe Surf
What is safe surf? 8:37 11 MB
Ditch or secure Internet Explorer 11:24 16.3 MB
Why P2P is so dangerous 8:48 12.7 MB

8. Backup Essentials
The implications of MTBF 4:48 6.5 MB
What to back up and how 14:25 16.3 MB
The myth of the 100 year CD 3:12 3.8 MB

9. The Weekly Fab Five
What is the 'Weekly Fab Five'? 1:33 2 MB
One: Update your antivirus/antispyware 3:27 3.4 MB
Two (PC): Update your OS (Windows Update) 3:14 3.4 MB
Two (Mac): Update your OS (Apple Software Update) 1:54 2.3 MB
Three (PC): Check your hard drive (Windows) 4:56 3.4 MB
Three (Mac): Check your hard drive (Macintosh) 4:29 6.8 MB
Four: Defragment your hard drive 3:49 3 MB
Five: Back up your data 2:07 2.8 MB

10. Additional Computer Privacy and Security
Extra stuff? 2:35 3.3 MB
Displaying hidden file extensions on a PC 4:10 4.9 MB
Disabling Auto-Run on a PC 3:30 5.5 MB
Removing private information from Microsoft Office documents 4:55 10 MB
Creating secure documents with Adobe Acrobat 5:22 8.8 MB
Disabling universal plug and play 3:58 8 MB

11. Safe, Secure, and Private Browsing
Protecting your children online 11:45 25.3 MB
Safe online purchasing 9:06 17 MB
Best practices for creating secure passwords 8:16 11 MB
Clearing your tracks in Internet Explorer 6.x 7:06 14.1 MB
Clearing your tracks in Firefox 1.x 5:29 8.5 MB
Clearing your tracks in Safari 3:19 5.3 MB

12. Email Security Essentials
Web bugs and HTML mail 8:22 10 MB
How to safely handle email attachments 2:55 3.4 MB
How to spot phishing scams 10:07 18.3 MB

13. Media Wiping
How to deep clean your computer before you give it away 5:27 8.1 MB
How to destroy media backups 3:35 4.7 MB

14. Conclusion
Where to get more information on security training and certification 2:53 4.5 MB
Goodbye 0:16 1.1 MB


لتحميل هذه الأسطوانتين تحتاج الى برنامج eMule

الأسطوانه الأولى 557 ميقا
كود:
ed2k://|file|[Computer.Privacy.and.Security.Essential.Training].Lynda.com.Computer.Privacy.and.Security.Essential.Training-CFE-CD1.bin|584770704|6E81A18536BF4AC9F3402EED62815B9E|h=IUHF6NGJ7QGTLWK3JSBGGJNUBLSFNPNE|/
الأسطوانه الثانية 306 ميقا
كود:
ed2k://|file|[Computer.Privacy.and.Security.Essential.Training].Lynda.com.Computer.Privacy.and.Security.Essential.Training-CFE-CD2.bin|324693600|4BF0398E57003D6878E43C2C73EFFC8A|h=NCJORVEJ4L3S5BKZXXNMUZAM5W2TPAQL|/

ملفات CUE الاول
ed2k://|file|[Computer.Privacy.and.Security.Essential.Training].Lynda.com.Computer.Privacy.and.Security.Essential .Training-CFE-CD1.cue|150|946BEE1880A57DE857DBA010B7EB857C|h=PKP 2XCCV33ZFRVIZFCOKHNA5ADP6P6GA|/
ملف CUE الثاني
كود:
ed2k://|file|[Computer.Privacy.and.Security.Essential.Training].Lynda.com.Computer.Privacy.and.Security.Essential.Training-CFE-CD2.cue|150|9F4B0CC5373E362B412C1197CB815AA0|h=XM63UNNCKQH3352DHAQCU3QGLIQJPMDG|/
أجمالي الحجم هو 867 ميقا

للأخوه الذين يريدون متابعه بعض الاجزاء قبل التحميل
يمكنهم ذالك عبر الدخول الى موقع الشركه وتشغيل
بعض الاجزاء والتي تظهر باللون الاسود
يتطلب برنامج كويك تايم


تحياتي لكم


TeT_TaT