Cyber Security Intelligence

Cyber Security Threat Intelligence Researcher  eBooks & eLearning

Posted by FenixN at June 14, 2016
Cyber Security Threat Intelligence Researcher

Cyber Security Threat Intelligence Researcher
HDRips | MP4/AVC, ~1387 kb/s | 1280x720 | Duration: 6 hours | English: AAC, 160 kb/s (2 ch) | 2.25 GB
Genre: Development / Programming / Security / Hacking

It’s time to put in practice your detective skills! By using Virustotal Intelligence, we teach you how to hunt for malware, how to decompile VBA macros with Didier Steven tools to identify C&C Servers, how to cluster similar samples by running retrohunt, ssdeep or vthash scans, then we introduce Viper framework that help us to correlate and document the full attack flow, finally we walk you through techniques to identify the threat actors behind the attack and how to track their future movements! And finally how to take down the domain by using a technique called Sinkholing!
Computational Intelligence, Cyber Security and Computational Models [Repost]

G. Sai Sundara Krishnan, R. Anitha, R. S. Lekshmi, M. Senthil Kumar, Anthony Bonato, Manuel Graña - Computational Intelligence, Cyber Security and Computational Models
Published: 2013-12-31 | ISBN: 8132216792 | PDF | 300 pages | 9 MB
The Economist (Intelligence Unit) - Politics, cyber-security, trade and the future of ICT supply chains (February 2014)

The Economist (Intelligence Unit) - Politics, cyber-security, trade and the future of ICT supply chains (February 2014)
English | 66 pages | True PDF | 12.42 Mb
Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3, 2013

G Sai Sundara Krishnan, "Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3, 2013 (Advances in Intelligent Systems and Computing)"
ISBN: 8132216792 | 2013 | PDF | 401 pages | 9.7 MB
Digital Security: Cyber Terror and Cyber Security (repost)

Ananda, Ph.d. Mitra, "Digital Security: Cyber Terror and Cyber Security"
English | 2010 | ISBN: 0816067910 | 120 pages | PDF | 13,2 MB

Since the advent of widespread Internet use, digital technology has been used for criminal intent. From computer viruses capable of shutting down and destroying infected computers to recruiting members online for hate groups, the ways the Internet can be used for nefarious purposes is practically limitless. But there is hope. Those in the digital industry are working to increase safeguards from cyber terrorists, such as heading off viruses before they can infect computers, and increasing cyber security. Digital Security: Cyber Terror and Cyber Security describes how computers are used both to commit crimes and to prevent them and concludes with a discussion of the future of digital crime and stopping its spread.

Cyber Security Awareness: Electronic Commerce Security  eBooks & eLearning

Posted by naag at Dec. 2, 2016
Cyber Security Awareness: Electronic Commerce Security

Cyber Security Awareness: Electronic Commerce Security
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 47M | 113 MB
Genre: eLearning | Language: English

With e-commerce gaining ground as the preferred means of business, learn the dos and don'ts of e-commerce. This course will give you a great foundation in e-commerce cyber-security.

Cyber Security Awareness: The Importance of Identity Protection (2016)  eBooks & eLearning

Posted by naag at Nov. 22, 2016
Cyber Security Awareness: The Importance of Identity Protection (2016)

Cyber Security Awareness: The Importance of Identity Protection
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hours 12M | 152 MB
Genre: eLearning | Language: English

This course explores the basics of identity protection in the modern world.

Cyber Security Awareness: Phishing and Whaling (2016)  eBooks & eLearning

Posted by naag at Nov. 21, 2016
Cyber Security Awareness: Phishing and Whaling (2016)

Cyber Security Awareness: Phishing and Whaling
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hours | 82 MB
Genre: eLearning | Language: English

This course covers whaling and phishing attacks and how to protect yourself against them.

Cyber Security Engineering: A Practical Approach for Systems and Software Assurance  eBooks & eLearning

Posted by AlenMiler at Nov. 16, 2016
Cyber Security Engineering: A Practical Approach for Systems and Software Assurance

Cyber Security Engineering: A Practical Approach for Systems and Software Assurance (SEI Series in Software Engineering) by Nancy Mead
English | 1 Nov. 2016 | ISBN: 0134189809 | 331 Pages | MOBI/EPUB/PDF | 43.47 MB

This book brings together comprehensive best practices for building software systems that exhibit superior operational security, and for considering security early and throughout the full lifecycles of both system development and acquisition.

Cyber Security Awareness: Pairing Physical and Digital Security (2016)  eBooks & eLearning

Posted by naag at Nov. 11, 2016
Cyber Security Awareness: Pairing Physical and Digital Security (2016)

Cyber Security Awareness: Pairing Physical and Digital Security
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 50M | 101 MB
Genre: eLearning | Language: English

Defense in Depth is an easy way to discuss layers of security. The military strategy can be applied in both physical and digital realms. The integration of physical and digital security is what provides the most effective layered capabilities.