Download link
File List
-
1_Introduction/01_Welcome.mp4 8.12 MB
1_Introduction/02_Preparing_for_MTA_Exam_98-367.mp4 7.99 MB
2_1._Understanding_User_Authentication/03_Creating_strong_passwords.mp4 9.92 MB
2_1._Understanding_User_Authentication/04_Using_smart_cards_tokens_and_multifactor_authentication.mp4 10.13 MB
2_1._Understanding_User_Authentication/05_Understanding_biometric_security.mp4 13.04 MB
2_1._Understanding_User_Authentication/06_Introducing_RADIUS.mp4 9.84 MB
3_2._Understanding_Permissions/07_Exploring_NTFS_file_share_and_registry_security.mp4 12.07 MB
3_2._Understanding_Permissions/08_Understanding_permission_behavior.mp4 13.98 MB
3_2._Understanding_Permissions/09_Diving_into_Active_Directory_-_Structure.mp4 6.51 MB
3_2._Understanding_Permissions/10_Dissecting_Active_Directory_-_Components.mp4 7.43 MB
4_3._Understanding_Audit_Policies/11_Enabling_auditing.mp4 10.22 MB
4_3._Understanding_Audit_Policies/12_Determining_what_to_audit.mp4 6.54 MB
4_3._Understanding_Audit_Policies/13_Saving_and_securing_audit_files.mp4 8.61 MB
5_4._Protecting_the_Server/14_Isolating_the_server.mp4 9.57 MB
5_4._Protecting_the_Server/15_Hardening_-_Updates_and_patching.mp4 10.63 MB
5_4._Protecting_the_Server/16_Protocol_good_practices.mp4 11.48 MB
5_4._Protecting_the_Server/17_Using_the_Microsoft_Baseline_Security_Analyzer_MBSA.mp4 9.41 MB
6_5._Understanding_Email_Protection/18_Protecting_the_email_client.mp4 10.02 MB
6_5._Understanding_Email_Protection/19_Protecting_the_email_server.mp4 13.77 MB
6_5._Understanding_Email_Protection/20_Using_Sender_Policy_Framework_SPF_records.mp4 12.9 MB
6_5._Understanding_Email_Protection/21_Understanding_PTR_records.mp4 10 MB
7_Conclusion/22_Next_steps.mp4 2.39 MB
Download Info
-
Tips
“IT_Security_Foundations_-_Operating_System_Security” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.
-
DMCA Notice and Takedown Procedure
If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.