Download link
File List
-
1_Introduction/01_Welcome.mp4 21.5 MB
1_Introduction/02_Preparing_for_MTA_Exam_98-367.mp4 1.86 MB
2_1._Security_Devices/03_Exploring_different_types_of_firewalls.mp4 7.81 MB
2_1._Security_Devices/04_Implementing_SCM_and_UTM.mp4 9.1 MB
2_1._Security_Devices/05_Network_Access_Protection_NAP.mp4 15.72 MB
3_2._Network_Isolation/06_Introducing_VLANS.mp4 15.28 MB
3_2._Network_Isolation/07_Providing_server_and_domain_isolation.mp4 10.57 MB
3_2._Network_Isolation/08_Implementing_a_honeypot.mp4 12.53 MB
3_2._Network_Isolation/09_Perimeter_networks.mp4 4.94 MB
3_2._Network_Isolation/10_Network_Address_Translation_NAT.mp4 16.71 MB
4_3._Protocol_Security/11_Introducing_protocol_spoofing.mp4 15.66 MB
4_3._Protocol_Security/12_Understanding_DNSSEC.mp4 14.75 MB
4_3._Protocol_Security/13_Exploring_network_sniffing.mp4 14.65 MB
4_3._Protocol_Security/14_Surveying_common_attack_methods.mp4 11.82 MB
4_3._Protocol_Security/15_Understanding_the_threat_of_password_attacks.mp4 8.58 MB
4_3._Protocol_Security/16_Introducing_IPsec.mp4 12.77 MB
5_4._Client_Protection/17_Protecting_systems_with_antivirus_software.mp4 15.78 MB
5_4._Client_Protection/18_Exploring_User_Account_Control_UAC.mp4 17.26 MB
5_4._Client_Protection/19_Encrypting_offline_folders_and_software_restriction_policies.mp4 8.12 MB
6_5._Physical_Security_Concepts/20_Ensuring_physical_protection_of_buildings_and_hardware.mp4 12.69 MB
6_5._Physical_Security_Concepts/21_Understanding_the_importance_of_physical_computer_security.mp4 5.2 MB
6_5._Physical_Security_Concepts/22_Exploring_access_control.mp4 8.64 MB
6_5._Physical_Security_Concepts/23_Securing_mobile_devices.mp4 9.01 MB
7_Conclusion/24_Next_steps.mp4 2.3 MB
Download Info
-
Tips
“IT_Security_Foundations_-_Network_Security” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.
-
DMCA Notice and Takedown Procedure
If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.