Lynda - Foundations of IT Security - Network Security

mp4   Hot:530   Size:275.01 MB   Created:2017-08-29 05:12:05   Update:2021-12-10 05:22:45  

File List

  • 01. Introduction/01_01-Welcome.mp4 22.32 MB
    01. Introduction/01_02-Preparing for MTA Exam 98367.mp4 1.87 MB
    02. Security Devices/02_01-Exploring different types of firewalls.mp4 7.9 MB
    02. Security Devices/02_02-Implementing SCM and UTM.mp4 9.11 MB
    02. Security Devices/02_03-Network Access Protection NAP.mp4 15.84 MB
    03. Network Isolation/03_01-Introducing VLANS.mp4 15.34 MB
    03. Network Isolation/03_02-Providing server and domain isolation.mp4 10.57 MB
    03. Network Isolation/03_03-Implementing a honeypot.mp4 12.6 MB
    03. Network Isolation/03_04-Perimeter networks.mp4 4.95 MB
    03. Network Isolation/03_05-Network Address Translation NAT.mp4 16.72 MB
    04. Protocol Security/04_01-Introducing protocol spoofing.mp4 15.8 MB
    04. Protocol Security/04_02-Understanding DNSSEC.mp4 14.66 MB
    04. Protocol Security/04_03-Exploring network sniffing.mp4 14.67 MB
    04. Protocol Security/04_04-Surveying common attack methods.mp4 11.82 MB
    04. Protocol Security/04_05-Understanding the threat of password attacks.mp4 8.74 MB
    04. Protocol Security/04_06-Introducing IPsec.mp4 12.81 MB
    05. Client Protection/05_01-Protecting systems with antivirus software.mp4 15.92 MB
    05. Client Protection/05_02-Exploring User Account Control UAC.mp4 17.32 MB
    05. Client Protection/05_03-Encrypting offline folders and software restriction policies.mp4 8 MB
    06. Physical Security Concepts/06_01-Ensuring physical protection of buildings and hardware.mp4 12.72 MB
    06. Physical Security Concepts/06_02-Understanding the importance of physical computer security.mp4 5.23 MB
    06. Physical Security Concepts/06_03-Exploring access control.mp4 8.66 MB
    06. Physical Security Concepts/06_04-Securing mobile devices.mp4 9.1 MB
    07. Conclusion/07_01-Next steps.mp4 2.32 MB

Download Info

  • Tips

    “Lynda - Foundations of IT Security - Network Security” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.

  • DMCA Notice and Takedown Procedure

    If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.