IT_Security_Foundations_-_Network_Security

mp4   Hot:174   Size:273.25 MB   Created:2017-09-08 07:48:02   Update:2017-10-23 05:48:52  

File List

  • 1_Introduction/01_Welcome.mp4 21.5 MB
    1_Introduction/02_Preparing_for_MTA_Exam_98-367.mp4 1.86 MB
    2_1._Security_Devices/03_Exploring_different_types_of_firewalls.mp4 7.81 MB
    2_1._Security_Devices/04_Implementing_SCM_and_UTM.mp4 9.1 MB
    2_1._Security_Devices/05_Network_Access_Protection_NAP.mp4 15.72 MB
    3_2._Network_Isolation/06_Introducing_VLANS.mp4 15.28 MB
    3_2._Network_Isolation/07_Providing_server_and_domain_isolation.mp4 10.57 MB
    3_2._Network_Isolation/08_Implementing_a_honeypot.mp4 12.53 MB
    3_2._Network_Isolation/09_Perimeter_networks.mp4 4.94 MB
    3_2._Network_Isolation/10_Network_Address_Translation_NAT.mp4 16.71 MB
    4_3._Protocol_Security/11_Introducing_protocol_spoofing.mp4 15.66 MB
    4_3._Protocol_Security/12_Understanding_DNSSEC.mp4 14.75 MB
    4_3._Protocol_Security/13_Exploring_network_sniffing.mp4 14.65 MB
    4_3._Protocol_Security/14_Surveying_common_attack_methods.mp4 11.82 MB
    4_3._Protocol_Security/15_Understanding_the_threat_of_password_attacks.mp4 8.58 MB
    4_3._Protocol_Security/16_Introducing_IPsec.mp4 12.77 MB
    5_4._Client_Protection/17_Protecting_systems_with_antivirus_software.mp4 15.78 MB
    5_4._Client_Protection/18_Exploring_User_Account_Control_UAC.mp4 17.26 MB
    5_4._Client_Protection/19_Encrypting_offline_folders_and_software_restriction_policies.mp4 8.12 MB
    6_5._Physical_Security_Concepts/20_Ensuring_physical_protection_of_buildings_and_hardware.mp4 12.69 MB
    6_5._Physical_Security_Concepts/21_Understanding_the_importance_of_physical_computer_security.mp4 5.2 MB
    6_5._Physical_Security_Concepts/22_Exploring_access_control.mp4 8.64 MB
    6_5._Physical_Security_Concepts/23_Securing_mobile_devices.mp4 9.01 MB
    7_Conclusion/24_Next_steps.mp4 2.3 MB

Download Info

  • Tips

    “IT_Security_Foundations_-_Network_Security” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.

  • DMCA Notice and Takedown Procedure

    If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.