589689.xyz

Lynda - SSCP Cert Prep 6 Networks and Communications Security

  • 收录时间:2018-08-22 12:02:35
  • 文件大小:352MB
  • 下载次数:165
  • 最近下载:2021-01-23 11:18:51
  • 磁力链接:

文件列表

  1. 3.2. Network Security Devices/14.Protocol analyzers.mp4 22MB
  2. 2.1. TCP_IP Networking/06.ICMP.mp4 13MB
  3. 5.4. Specialized Networking/30.Multimedia collaboration.mp4 13MB
  4. 4.3. Designing Secure Networks/18.Public and private addressing.mp4 11MB
  5. 7.6. Network Attacks/40.Other network attacks.mp4 11MB
  6. 4.3. Designing Secure Networks/21.Security device placement.mp4 11MB
  7. 2.1. TCP_IP Networking/02.Introducing TCP_IP.mp4 11MB
  8. 8.7. Wireless Networking/47.Propagation attacks.mp4 10MB
  9. 4.3. Designing Secure Networks/24.Remote network access.mp4 9MB
  10. 4.3. Designing Secure Networks/25.Desktop and application virtualization.mp4 9MB
  11. 6.5. Secure Network Management/32.Firewall rule management.mp4 9MB
  12. 8.7. Wireless Networking/41.Understanding wireless networking.mp4 9MB
  13. 6.5. Secure Network Management/33.Router configuration security.mp4 8MB
  14. 7.6. Network Attacks/38.Denial of service attacks.mp4 8MB
  15. 2.1. TCP_IP Networking/05.Network ports.mp4 7MB
  16. 2.1. TCP_IP Networking/04.Domain name system (DNS).mp4 7MB
  17. 3.2. Network Security Devices/10.Firewalls.mp4 7MB
  18. 3.2. Network Security Devices/16.Content distribution networks.mp4 7MB
  19. 8.7. Wireless Networking/44.Wireless authentication.mp4 7MB
  20. 3.2. Network Security Devices/11.Load balancers, proxies, and web security gateways.mp4 7MB
  21. 4.3. Designing Secure Networks/22.Network access control.mp4 7MB
  22. 7.6. Network Attacks/39.Eavesdropping attacks.mp4 7MB
  23. 2.1. TCP_IP Networking/07.Network topologies.mp4 7MB
  24. 6.5. Secure Network Management/36.Network monitoring.mp4 7MB
  25. 4.3. Designing Secure Networks/19.Subnetting.mp4 7MB
  26. 3.2. Network Security Devices/13.Network intrusion detection and prevention.mp4 6MB
  27. 3.2. Network Security Devices/09.Switches and routers.mp4 6MB
  28. 4.3. Designing Secure Networks/23.RADIUS and TACACS.mp4 6MB
  29. 6.5. Secure Network Management/34.Switch configuration security.mp4 6MB
  30. 4.3. Designing Secure Networks/28.Defense in depth.mp4 6MB
  31. 8.7. Wireless Networking/46.WPA and WPS attacks.mp4 6MB
  32. 2.1. TCP_IP Networking/03.IP addressing.mp4 6MB
  33. 6.5. Secure Network Management/37.SNMP.mp4 6MB
  34. 5.4. Specialized Networking/31.Storage networks.mp4 6MB
  35. 8.7. Wireless Networking/48.Preventing rogues and evil twins.mp4 6MB
  36. 4.3. Designing Secure Networks/26.Software defined networking.mp4 5MB
  37. 8.7. Wireless Networking/42.Basic wireless security.mp4 5MB
  38. 1.Introduction/01.Welcome.mp4 5MB
  39. 3.2. Network Security Devices/12.VPNs and VPN concentrators.mp4 5MB
  40. 8.7. Wireless Networking/45.Wireless signal propagation.mp4 4MB
  41. 2.1. TCP_IP Networking/08.Network relationships.mp4 4MB
  42. 6.5. Secure Network Management/35.Maintaining network availability.mp4 4MB
  43. 5.4. Specialized Networking/29.Telephony.mp4 4MB
  44. 3.2. Network Security Devices/17.Traffic shaping and WAN optimization.mp4 4MB
  45. 8.7. Wireless Networking/49.Understanding Bluetooth and NFC attacks.mp4 4MB
  46. 4.3. Designing Secure Networks/27.Port isolation.mp4 4MB
  47. 4.3. Designing Secure Networks/20.VLANs and network segmentation.mp4 3MB
  48. 3.2. Network Security Devices/15.Unified threat management.mp4 3MB
  49. 8.7. Wireless Networking/43.WEP, WPA ,and WPA2.mp4 3MB
  50. 9.Conclusion/50.What's next.mp4 2MB
  51. 3.2. Network Security Devices/14.Protocol analyzers.en.srt 12KB
  52. 4.3. Designing Secure Networks/21.Security device placement.en.srt 12KB
  53. 7.6. Network Attacks/40.Other network attacks.en.srt 11KB
  54. 4.3. Designing Secure Networks/18.Public and private addressing.en.srt 10KB
  55. 2.1. TCP_IP Networking/02.Introducing TCP_IP.en.srt 10KB
  56. 2.1. TCP_IP Networking/06.ICMP.en.srt 10KB
  57. 4.3. Designing Secure Networks/24.Remote network access.en.srt 9KB
  58. 5.4. Specialized Networking/30.Multimedia collaboration.en.srt 9KB
  59. 4.3. Designing Secure Networks/25.Desktop and application virtualization.en.srt 8KB
  60. 3.2. Network Security Devices/16.Content distribution networks.en.srt 8KB
  61. 3.2. Network Security Devices/10.Firewalls.en.srt 8KB
  62. 6.5. Secure Network Management/33.Router configuration security.en.srt 8KB
  63. 8.7. Wireless Networking/44.Wireless authentication.en.srt 7KB
  64. 6.5. Secure Network Management/36.Network monitoring.en.srt 7KB
  65. 4.3. Designing Secure Networks/22.Network access control.en.srt 7KB
  66. 6.5. Secure Network Management/32.Firewall rule management.en.srt 7KB
  67. 7.6. Network Attacks/38.Denial of service attacks.en.srt 7KB
  68. 7.6. Network Attacks/39.Eavesdropping attacks.en.srt 7KB
  69. 2.1. TCP_IP Networking/04.Domain name system (DNS).en.srt 7KB
  70. 3.2. Network Security Devices/11.Load balancers, proxies, and web security gateways.en.srt 7KB
  71. 6.5. Secure Network Management/34.Switch configuration security.en.srt 7KB
  72. 8.7. Wireless Networking/42.Basic wireless security.en.srt 7KB
  73. 8.7. Wireless Networking/47.Propagation attacks.en.srt 7KB
  74. 3.2. Network Security Devices/13.Network intrusion detection and prevention.en.srt 6KB
  75. 4.3. Designing Secure Networks/26.Software defined networking.en.srt 6KB
  76. 2.1. TCP_IP Networking/07.Network topologies.en.srt 6KB
  77. 8.7. Wireless Networking/41.Understanding wireless networking.en.srt 6KB
  78. 8.7. Wireless Networking/46.WPA and WPS attacks.en.srt 6KB
  79. 4.3. Designing Secure Networks/23.RADIUS and TACACS.en.srt 6KB
  80. 8.7. Wireless Networking/48.Preventing rogues and evil twins.en.srt 6KB
  81. 4.3. Designing Secure Networks/28.Defense in depth.en.srt 6KB
  82. 2.1. TCP_IP Networking/03.IP addressing.en.srt 6KB
  83. 4.3. Designing Secure Networks/19.Subnetting.en.srt 6KB
  84. 6.5. Secure Network Management/37.SNMP.en.srt 6KB
  85. 5.4. Specialized Networking/31.Storage networks.en.srt 5KB
  86. 2.1. TCP_IP Networking/08.Network relationships.en.srt 5KB
  87. 2.1. TCP_IP Networking/05.Network ports.en.srt 5KB
  88. 3.2. Network Security Devices/12.VPNs and VPN concentrators.en.srt 5KB
  89. 3.2. Network Security Devices/09.Switches and routers.en.srt 5KB
  90. 6.5. Secure Network Management/35.Maintaining network availability.en.srt 5KB
  91. 8.7. Wireless Networking/45.Wireless signal propagation.en.srt 5KB
  92. 8.7. Wireless Networking/49.Understanding Bluetooth and NFC attacks.en.srt 4KB
  93. 5.4. Specialized Networking/29.Telephony.en.srt 4KB
  94. 3.2. Network Security Devices/17.Traffic shaping and WAN optimization.en.srt 4KB
  95. 4.3. Designing Secure Networks/20.VLANs and network segmentation.en.srt 4KB
  96. 4.3. Designing Secure Networks/27.Port isolation.en.srt 3KB
  97. 3.2. Network Security Devices/15.Unified threat management.en.srt 3KB
  98. 8.7. Wireless Networking/43.WEP, WPA ,and WPA2.en.srt 3KB
  99. 1.Introduction/01.Welcome.en.srt 2KB
  100. 9.Conclusion/50.What's next.en.srt 1KB
  101. More Downloads!.url 104B