589689.xyz

[] Coursera - Computer Security and Systems Management Specialization

  • 收录时间:2023-07-08 07:33:59
  • 文件大小:2GB
  • 下载次数:1
  • 最近下载:2023-07-08 07:33:59
  • 磁力链接:

文件列表

  1. enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/01_welcome/05_about-the-instructor.mp4 155MB
  2. linux-server-management-security/01_introduction-to-practical-linux-system-management/01_welcome/04_about-the-instructor.mp4 155MB
  3. planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/01_welcome/04_about-the-instructor.mp4 155MB
  4. windows-server-management-security/01_introduction-to-practical-windows-system-management/01_welcome/04_about-the-instructor.mp4 155MB
  5. linux-server-management-security/04_securing-linux-in-the-enterprise/01_linux-security/03_linux-security.mp4 61MB
  6. enterprise-system-management-security/04_isn-t-my-computer-already-protected-good-system-management-starts-with-knowing/01_security/04_risk-in-system-management.mp4 54MB
  7. enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/03_what-is-enterprise-computing.mp4 52MB
  8. linux-server-management-security/01_introduction-to-practical-linux-system-management/02_about-linux/02_about-linux-and-distributions.mp4 47MB
  9. enterprise-system-management-security/04_isn-t-my-computer-already-protected-good-system-management-starts-with-knowing/01_security/05_confidentiality-integrity-and-availability.mp4 47MB
  10. enterprise-system-management-security/02_doesn-t-everything-work-on-wireless-an-introduction-to-enterprise-networking/01_an-introduction-to-networking/01_why-do-we-need-to-learn-networking.mp4 46MB
  11. linux-server-management-security/03_users-authentication-and-authorization-in-a-linux-environment/01_users-authentication-and-authorization-in-a-linux-environment/06_working-with-other-systems.mp4 45MB
  12. linux-server-management-security/01_introduction-to-practical-linux-system-management/02_about-linux/01_linux-in-the-enterprise.mp4 44MB
  13. planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/07_if-you-build-it-they-will-get-around-it.mp4 42MB
  14. planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/02_critical-first-steps/01_security-at-the-forefront.mp4 42MB
  15. planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/02_critical-first-steps/02_attack-surfaces.mp4 42MB
  16. planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/06_planning-for-disaster.mp4 41MB
  17. planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/01_policies-part-1-organizational-policies.mp4 40MB
  18. windows-server-management-security/04_securing-windows-in-the-enterprise/01_securing-windows/01_built-in-security-controls.mp4 40MB
  19. windows-server-management-security/03_users-and-authorization-in-a-windows-environment/01_users-and-authorization-within-windows/01_what-is-authorization.mp4 39MB
  20. enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/01_don-t-i-just-trust-what-apple-microsoft-and-the-other-guys-tell-me.mp4 39MB
  21. windows-server-management-security/04_securing-windows-in-the-enterprise/01_securing-windows/05_security-considerations-for-windows-systems.mp4 39MB
  22. enterprise-system-management-security/03_what-is-virtualization/01_fundamentals-of-virtualization/02_types-of-virtualization.mp4 38MB
  23. enterprise-system-management-security/03_what-is-virtualization/01_fundamentals-of-virtualization/01_what-is-virtualization.mp4 38MB
  24. linux-server-management-security/04_securing-linux-in-the-enterprise/01_linux-security/01_selinux.mp4 38MB
  25. planning-auditing-maintaining-enterprise-systems/04_maintaining-systems-in-the-enterprise/01_maintain/02_when-something-goes-wrong.mp4 38MB
  26. planning-auditing-maintaining-enterprise-systems/03_auditing-systems-in-the-enterprise/01_audit/01_strategies-for-monitoring.mp4 37MB
  27. planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/05_separation-of-duties.mp4 37MB
  28. enterprise-system-management-security/02_doesn-t-everything-work-on-wireless-an-introduction-to-enterprise-networking/01_an-introduction-to-networking/05_osi-model.mp4 37MB
  29. planning-auditing-maintaining-enterprise-systems/04_maintaining-systems-in-the-enterprise/01_maintain/01_updating-systems-in-the-enterprise.mp4 36MB
  30. enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/05_what-is-going-to-prepare-me-for-practical-system-management.mp4 35MB
  31. enterprise-system-management-security/03_what-is-virtualization/01_fundamentals-of-virtualization/04_your-computer-vs-an-enterprise-system.mp4 34MB
  32. enterprise-system-management-security/03_what-is-virtualization/01_fundamentals-of-virtualization/03_when-to-use-and-not-use-virtualization.mp4 33MB
  33. planning-auditing-maintaining-enterprise-systems/04_maintaining-systems-in-the-enterprise/01_maintain/03_baselining-and-assessment.mp4 32MB
  34. enterprise-system-management-security/04_isn-t-my-computer-already-protected-good-system-management-starts-with-knowing/01_security/01_why-information-security-in-the-first-place.mp4 32MB
  35. windows-server-management-security/01_introduction-to-practical-windows-system-management/02_introduction-to-windows/02_windows-in-the-enterprise.mp4 30MB
  36. planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/02_critical-first-steps/03_integrity.mp4 30MB
  37. planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/03_policies-part-2-technical-policies.mp4 29MB
  38. enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/02_what-is-personal-computing.mp4 29MB
  39. enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/04_what-roles-are-there-in-system-management.mp4 28MB
  40. enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/01_welcome/04_introduction.mp4 26MB
  41. linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/06_ssh.mp4 25MB
  42. windows-server-management-security/01_introduction-to-practical-windows-system-management/01_welcome/01_welcome.mp4 24MB
  43. windows-server-management-security/02_users-and-authentication-in-a-windows-environment/01_enterprise-user-management/04_active-directory.mp4 24MB
  44. enterprise-system-management-security/04_isn-t-my-computer-already-protected-good-system-management-starts-with-knowing/01_security/03_what-is-a-secure-computer.mp4 22MB
  45. linux-server-management-security/01_introduction-to-practical-linux-system-management/01_welcome/01_introduction.mp4 22MB
  46. planning-auditing-maintaining-enterprise-systems/03_auditing-systems-in-the-enterprise/01_audit/04_auditing.mp4 22MB
  47. planning-auditing-maintaining-enterprise-systems/03_auditing-systems-in-the-enterprise/01_audit/07_syslog.mp4 21MB
  48. windows-server-management-security/04_securing-windows-in-the-enterprise/01_securing-windows/03_restricting-access-to-software-and-resources.mp4 19MB
  49. planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/01_welcome/01_introduction.mp4 17MB
  50. linux-server-management-security/04_securing-linux-in-the-enterprise/01_linux-security/04_software-firewalls-in-linux.mp4 17MB
  51. linux-server-management-security/04_securing-linux-in-the-enterprise/01_linux-security/05_services-within-linux.mp4 16MB
  52. windows-server-management-security/01_introduction-to-practical-windows-system-management/02_introduction-to-windows/05_networking-in-windows.mp4 15MB
  53. linux-server-management-security/03_users-authentication-and-authorization-in-a-linux-environment/01_users-authentication-and-authorization-in-a-linux-environment/03_securing-users.mp4 15MB
  54. linux-server-management-security/03_users-authentication-and-authorization-in-a-linux-environment/01_users-authentication-and-authorization-in-a-linux-environment/05_access-control.mp4 14MB
  55. linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/05_sudo.mp4 13MB
  56. windows-server-management-security/02_users-and-authentication-in-a-windows-environment/01_enterprise-user-management/05_group-policy.mp4 12MB
  57. linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/03_networking-in-linux.mp4 11MB
  58. windows-server-management-security/03_users-and-authorization-in-a-windows-environment/01_users-and-authorization-within-windows/04_managing-users-on-an-enterprise-level.mp4 11MB
  59. windows-server-management-security/03_users-and-authorization-in-a-windows-environment/01_users-and-authorization-within-windows/02_rights-and-permissions.mp4 11MB
  60. windows-server-management-security/03_users-and-authorization-in-a-windows-environment/01_users-and-authorization-within-windows/03_access-control.mp4 10MB
  61. windows-server-management-security/04_securing-windows-in-the-enterprise/01_securing-windows/06_windows-and-encryption.mp4 10MB
  62. planning-auditing-maintaining-enterprise-systems/03_auditing-systems-in-the-enterprise/01_audit/02_splunk.mp4 9MB
  63. planning-auditing-maintaining-enterprise-systems/05_organizational-policies-project/01_final-video/01_congratulations.mp4 9MB
  64. windows-server-management-security/02_users-and-authentication-in-a-windows-environment/01_enterprise-user-management/01_windows-logon-process.mp4 9MB
  65. linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/01_enterprise-install-of-centos.mp4 9MB
  66. windows-server-management-security/01_introduction-to-practical-windows-system-management/02_introduction-to-windows/03_windows-server-install.mp4 8MB
  67. linux-server-management-security/03_users-authentication-and-authorization-in-a-linux-environment/01_users-authentication-and-authorization-in-a-linux-environment/01_adding-users.mp4 8MB
  68. linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/08_cron.mp4 7MB
  69. windows-server-management-security/02_users-and-authentication-in-a-windows-environment/01_enterprise-user-management/04_active-directory.en.srt 16KB
  70. linux-server-management-security/04_securing-linux-in-the-enterprise/01_linux-security/03_linux-security.en.srt 13KB
  71. linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/06_ssh.en.srt 13KB
  72. enterprise-system-management-security/04_isn-t-my-computer-already-protected-good-system-management-starts-with-knowing/01_security/04_risk-in-system-management.en.srt 13KB
  73. planning-auditing-maintaining-enterprise-systems/03_auditing-systems-in-the-enterprise/01_audit/04_auditing.en.srt 13KB
  74. enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/03_what-is-enterprise-computing.en.srt 12KB
  75. planning-auditing-maintaining-enterprise-systems/03_auditing-systems-in-the-enterprise/01_audit/07_syslog.en.srt 12KB
  76. planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/01_welcome/04_about-the-instructor.en.srt 11KB
  77. linux-server-management-security/01_introduction-to-practical-linux-system-management/02_about-linux/02_about-linux-and-distributions.en.srt 11KB
  78. windows-server-management-security/01_introduction-to-practical-windows-system-management/02_introduction-to-windows/05_networking-in-windows.en.srt 11KB
  79. linux-server-management-security/04_securing-linux-in-the-enterprise/01_linux-security/05_services-within-linux.en.srt 11KB
  80. linux-server-management-security/01_introduction-to-practical-linux-system-management/01_welcome/04_about-the-instructor.en.srt 11KB
  81. windows-server-management-security/01_introduction-to-practical-windows-system-management/01_welcome/04_about-the-instructor.en.srt 11KB
  82. planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/07_if-you-build-it-they-will-get-around-it.en.srt 10KB
  83. enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/01_welcome/05_about-the-instructor.en.srt 10KB
  84. linux-server-management-security/01_introduction-to-practical-linux-system-management/02_about-linux/01_linux-in-the-enterprise.en.srt 10KB
  85. windows-server-management-security/04_securing-windows-in-the-enterprise/01_securing-windows/03_restricting-access-to-software-and-resources.en.srt 10KB
  86. planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/02_critical-first-steps/01_security-at-the-forefront.en.srt 10KB
  87. linux-server-management-security/03_users-authentication-and-authorization-in-a-linux-environment/01_users-authentication-and-authorization-in-a-linux-environment/06_working-with-other-systems.en.srt 10KB
  88. planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/06_planning-for-disaster.en.srt 10KB
  89. enterprise-system-management-security/04_isn-t-my-computer-already-protected-good-system-management-starts-with-knowing/01_security/05_confidentiality-integrity-and-availability.en.srt 10KB
  90. windows-server-management-security/02_users-and-authentication-in-a-windows-environment/01_enterprise-user-management/04_active-directory.en.txt 10KB
  91. enterprise-system-management-security/02_doesn-t-everything-work-on-wireless-an-introduction-to-enterprise-networking/01_an-introduction-to-networking/01_why-do-we-need-to-learn-networking.en.srt 10KB
  92. planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/01_policies-part-1-organizational-policies.en.srt 9KB
  93. planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/02_critical-first-steps/02_attack-surfaces.en.srt 9KB
  94. windows-server-management-security/04_securing-windows-in-the-enterprise/01_securing-windows/01_built-in-security-controls.en.srt 9KB
  95. linux-server-management-security/04_securing-linux-in-the-enterprise/01_linux-security/01_selinux.en.srt 9KB
  96. linux-server-management-security/04_securing-linux-in-the-enterprise/01_linux-security/04_software-firewalls-in-linux.en.srt 9KB
  97. linux-server-management-security/03_users-authentication-and-authorization-in-a-linux-environment/01_users-authentication-and-authorization-in-a-linux-environment/05_access-control.en.srt 9KB
  98. windows-server-management-security/04_securing-windows-in-the-enterprise/01_securing-windows/05_security-considerations-for-windows-systems.en.srt 9KB
  99. enterprise-system-management-security/03_what-is-virtualization/01_fundamentals-of-virtualization/02_types-of-virtualization.en.srt 9KB
  100. enterprise-system-management-security/02_doesn-t-everything-work-on-wireless-an-introduction-to-enterprise-networking/01_an-introduction-to-networking/05_osi-model.en.srt 9KB
  101. planning-auditing-maintaining-enterprise-systems/04_maintaining-systems-in-the-enterprise/01_maintain/02_when-something-goes-wrong.en.srt 8KB
  102. planning-auditing-maintaining-enterprise-systems/03_auditing-systems-in-the-enterprise/01_audit/01_strategies-for-monitoring.en.srt 8KB
  103. windows-server-management-security/02_users-and-authentication-in-a-windows-environment/01_enterprise-user-management/05_group-policy.en.srt 8KB
  104. planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/05_separation-of-duties.en.srt 8KB
  105. linux-server-management-security/03_users-authentication-and-authorization-in-a-linux-environment/01_users-authentication-and-authorization-in-a-linux-environment/03_securing-users.en.srt 8KB
  106. enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/05_what-is-going-to-prepare-me-for-practical-system-management.en.srt 8KB
  107. linux-server-management-security/04_securing-linux-in-the-enterprise/01_linux-security/03_linux-security.en.txt 8KB
  108. enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/01_don-t-i-just-trust-what-apple-microsoft-and-the-other-guys-tell-me.en.srt 8KB
  109. planning-auditing-maintaining-enterprise-systems/04_maintaining-systems-in-the-enterprise/01_maintain/01_updating-systems-in-the-enterprise.en.srt 8KB
  110. enterprise-system-management-security/03_what-is-virtualization/01_fundamentals-of-virtualization/04_your-computer-vs-an-enterprise-system.en.srt 8KB
  111. enterprise-system-management-security/04_isn-t-my-computer-already-protected-good-system-management-starts-with-knowing/01_security/04_risk-in-system-management.en.txt 8KB
  112. windows-server-management-security/03_users-and-authorization-in-a-windows-environment/01_users-and-authorization-within-windows/01_what-is-authorization.en.srt 8KB
  113. enterprise-system-management-security/04_isn-t-my-computer-already-protected-good-system-management-starts-with-knowing/01_security/01_why-information-security-in-the-first-place.en.srt 8KB
  114. planning-auditing-maintaining-enterprise-systems/03_auditing-systems-in-the-enterprise/01_audit/04_auditing.en.txt 8KB
  115. enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/03_what-is-enterprise-computing.en.txt 7KB
  116. planning-auditing-maintaining-enterprise-systems/03_auditing-systems-in-the-enterprise/01_audit/07_syslog.en.txt 7KB
  117. planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/02_critical-first-steps/03_integrity.en.srt 7KB
  118. linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/06_ssh.en.txt 7KB
  119. enterprise-system-management-security/03_what-is-virtualization/01_fundamentals-of-virtualization/01_what-is-virtualization.en.srt 7KB
  120. linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/03_networking-in-linux.en.srt 7KB
  121. windows-server-management-security/03_users-and-authorization-in-a-windows-environment/01_users-and-authorization-within-windows/02_rights-and-permissions.en.srt 7KB
  122. enterprise-system-management-security/03_what-is-virtualization/01_fundamentals-of-virtualization/03_when-to-use-and-not-use-virtualization.en.srt 7KB
  123. windows-server-management-security/01_introduction-to-practical-windows-system-management/02_introduction-to-windows/02_windows-in-the-enterprise.en.srt 7KB
  124. windows-server-management-security/03_users-and-authorization-in-a-windows-environment/01_users-and-authorization-within-windows/04_managing-users-on-an-enterprise-level.en.srt 7KB
  125. linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/05_sudo.en.srt 7KB
  126. enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/02_what-is-personal-computing.en.srt 7KB
  127. planning-auditing-maintaining-enterprise-systems/04_maintaining-systems-in-the-enterprise/01_maintain/03_baselining-and-assessment.en.srt 7KB
  128. windows-server-management-security/01_introduction-to-practical-windows-system-management/02_introduction-to-windows/05_networking-in-windows.en.txt 7KB
  129. windows-server-management-security/04_securing-windows-in-the-enterprise/01_securing-windows/06_windows-and-encryption.en.srt 6KB
  130. enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/04_what-roles-are-there-in-system-management.en.srt 6KB
  131. linux-server-management-security/01_introduction-to-practical-linux-system-management/02_about-linux/01_linux-in-the-enterprise.en.txt 6KB
  132. linux-server-management-security/01_introduction-to-practical-linux-system-management/02_about-linux/02_about-linux-and-distributions.en.txt 6KB
  133. planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/01_welcome/04_about-the-instructor.en.txt 6KB
  134. planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/02_critical-first-steps/01_security-at-the-forefront.en.txt 6KB
  135. planning-auditing-maintaining-enterprise-systems/03_auditing-systems-in-the-enterprise/01_audit/02_splunk.en.srt 6KB
  136. linux-server-management-security/01_introduction-to-practical-linux-system-management/01_welcome/04_about-the-instructor.en.txt 6KB
  137. windows-server-management-security/04_securing-windows-in-the-enterprise/01_securing-windows/03_restricting-access-to-software-and-resources.en.txt 6KB
  138. windows-server-management-security/01_introduction-to-practical-windows-system-management/02_introduction-to-windows/03_windows-server-install.en.srt 6KB
  139. planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/03_policies-part-2-technical-policies.en.srt 6KB
  140. windows-server-management-security/01_introduction-to-practical-windows-system-management/01_welcome/04_about-the-instructor.en.txt 6KB
  141. enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/01_welcome/05_about-the-instructor.en.txt 6KB
  142. planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/07_if-you-build-it-they-will-get-around-it.en.txt 6KB
  143. linux-server-management-security/03_users-authentication-and-authorization-in-a-linux-environment/01_users-authentication-and-authorization-in-a-linux-environment/06_working-with-other-systems.en.txt 6KB
  144. windows-server-management-security/03_users-and-authorization-in-a-windows-environment/01_users-and-authorization-within-windows/03_access-control.en.srt 6KB
  145. linux-server-management-security/04_securing-linux-in-the-enterprise/01_linux-security/05_services-within-linux.en.txt 6KB
  146. enterprise-system-management-security/04_isn-t-my-computer-already-protected-good-system-management-starts-with-knowing/01_security/05_confidentiality-integrity-and-availability.en.txt 6KB
  147. enterprise-system-management-security/02_doesn-t-everything-work-on-wireless-an-introduction-to-enterprise-networking/01_an-introduction-to-networking/01_why-do-we-need-to-learn-networking.en.txt 6KB
  148. planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/06_planning-for-disaster.en.txt 6KB
  149. planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/01_policies-part-1-organizational-policies.en.txt 6KB
  150. enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/01_welcome/04_introduction.en.srt 6KB
  151. windows-server-management-security/02_users-and-authentication-in-a-windows-environment/01_enterprise-user-management/01_windows-logon-process.en.srt 6KB
  152. linux-server-management-security/01_introduction-to-practical-linux-system-management/01_welcome/01_introduction.en.srt 6KB
  153. planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/02_critical-first-steps/02_attack-surfaces.en.txt 6KB
  154. enterprise-system-management-security/03_what-is-virtualization/01_fundamentals-of-virtualization/02_types-of-virtualization.en.txt 6KB
  155. windows-server-management-security/04_securing-windows-in-the-enterprise/01_securing-windows/01_built-in-security-controls.en.txt 6KB
  156. linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/08_cron.en.srt 5KB
  157. linux-server-management-security/03_users-authentication-and-authorization-in-a-linux-environment/01_users-authentication-and-authorization-in-a-linux-environment/01_adding-users.en.srt 5KB
  158. windows-server-management-security/04_securing-windows-in-the-enterprise/01_securing-windows/05_security-considerations-for-windows-systems.en.txt 5KB
  159. linux-server-management-security/03_users-authentication-and-authorization-in-a-linux-environment/01_users-authentication-and-authorization-in-a-linux-environment/05_access-control.en.txt 5KB
  160. linux-server-management-security/04_securing-linux-in-the-enterprise/01_linux-security/01_selinux.en.txt 5KB
  161. enterprise-system-management-security/04_isn-t-my-computer-already-protected-good-system-management-starts-with-knowing/01_security/03_what-is-a-secure-computer.en.srt 5KB
  162. enterprise-system-management-security/02_doesn-t-everything-work-on-wireless-an-introduction-to-enterprise-networking/01_an-introduction-to-networking/05_osi-model.en.txt 5KB
  163. enterprise-system-management-security/03_what-is-virtualization/01_fundamentals-of-virtualization/04_your-computer-vs-an-enterprise-system.en.txt 5KB
  164. planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/05_separation-of-duties.en.txt 5KB
  165. planning-auditing-maintaining-enterprise-systems/03_auditing-systems-in-the-enterprise/01_audit/01_strategies-for-monitoring.en.txt 5KB
  166. linux-server-management-security/04_securing-linux-in-the-enterprise/01_linux-security/04_software-firewalls-in-linux.en.txt 5KB
  167. windows-server-management-security/01_introduction-to-practical-windows-system-management/01_welcome/01_welcome.en.srt 5KB
  168. windows-server-management-security/02_users-and-authentication-in-a-windows-environment/01_enterprise-user-management/05_group-policy.en.txt 5KB
  169. enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/05_what-is-going-to-prepare-me-for-practical-system-management.en.txt 5KB
  170. planning-auditing-maintaining-enterprise-systems/04_maintaining-systems-in-the-enterprise/01_maintain/02_when-something-goes-wrong.en.txt 5KB
  171. linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/01_enterprise-install-of-centos.en.srt 5KB
  172. planning-auditing-maintaining-enterprise-systems/04_maintaining-systems-in-the-enterprise/01_maintain/01_updating-systems-in-the-enterprise.en.txt 5KB
  173. enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/01_don-t-i-just-trust-what-apple-microsoft-and-the-other-guys-tell-me.en.txt 5KB
  174. linux-server-management-security/03_users-authentication-and-authorization-in-a-linux-environment/01_users-authentication-and-authorization-in-a-linux-environment/03_securing-users.en.txt 5KB
  175. enterprise-system-management-security/04_isn-t-my-computer-already-protected-good-system-management-starts-with-knowing/01_security/01_why-information-security-in-the-first-place.en.txt 5KB
  176. windows-server-management-security/03_users-and-authorization-in-a-windows-environment/01_users-and-authorization-within-windows/01_what-is-authorization.en.txt 5KB
  177. enterprise-system-management-security/03_what-is-virtualization/01_fundamentals-of-virtualization/01_what-is-virtualization.en.txt 5KB
  178. windows-server-management-security/03_users-and-authorization-in-a-windows-environment/01_users-and-authorization-within-windows/02_rights-and-permissions.en.txt 4KB
  179. linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/03_networking-in-linux.en.txt 4KB
  180. planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/02_critical-first-steps/03_integrity.en.txt 4KB
  181. planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/01_welcome/01_introduction.en.srt 4KB
  182. planning-auditing-maintaining-enterprise-systems/04_maintaining-systems-in-the-enterprise/01_maintain/03_baselining-and-assessment.en.txt 4KB
  183. enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/02_what-is-personal-computing.en.txt 4KB
  184. windows-server-management-security/01_introduction-to-practical-windows-system-management/02_introduction-to-windows/02_windows-in-the-enterprise.en.txt 4KB
  185. enterprise-system-management-security/03_what-is-virtualization/01_fundamentals-of-virtualization/03_when-to-use-and-not-use-virtualization.en.txt 4KB
  186. windows-server-management-security/03_users-and-authorization-in-a-windows-environment/01_users-and-authorization-within-windows/04_managing-users-on-an-enterprise-level.en.txt 4KB
  187. linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/05_sudo.en.txt 4KB
  188. windows-server-management-security/04_securing-windows-in-the-enterprise/01_securing-windows/06_windows-and-encryption.en.txt 4KB
  189. enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/04_what-roles-are-there-in-system-management.en.txt 4KB
  190. windows-server-management-security/01_introduction-to-practical-windows-system-management/02_introduction-to-windows/03_windows-server-install.en.txt 4KB
  191. planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/03_policies-part-2-technical-policies.en.txt 4KB
  192. planning-auditing-maintaining-enterprise-systems/03_auditing-systems-in-the-enterprise/01_audit/02_splunk.en.txt 4KB
  193. enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/01_welcome/04_introduction.en.txt 4KB
  194. windows-server-management-security/02_users-and-authentication-in-a-windows-environment/01_enterprise-user-management/01_windows-logon-process.en.txt 4KB
  195. windows-server-management-security/03_users-and-authorization-in-a-windows-environment/01_users-and-authorization-within-windows/03_access-control.en.txt 4KB
  196. linux-server-management-security/01_introduction-to-practical-linux-system-management/01_welcome/01_introduction.en.txt 3KB
  197. linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/08_cron.en.txt 3KB
  198. enterprise-system-management-security/04_isn-t-my-computer-already-protected-good-system-management-starts-with-knowing/01_security/03_what-is-a-secure-computer.en.txt 3KB
  199. linux-server-management-security/03_users-authentication-and-authorization-in-a-linux-environment/01_users-authentication-and-authorization-in-a-linux-environment/01_adding-users.en.txt 3KB
  200. linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/01_enterprise-install-of-centos.en.txt 3KB
  201. windows-server-management-security/01_introduction-to-practical-windows-system-management/01_welcome/01_welcome.en.txt 3KB
  202. planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/01_welcome/01_introduction.en.txt 3KB
  203. planning-auditing-maintaining-enterprise-systems/05_organizational-policies-project/01_final-video/01_congratulations.en.srt 2KB
  204. planning-auditing-maintaining-enterprise-systems/05_organizational-policies-project/01_final-video/01_congratulations.en.txt 1KB
  205. 0. Websites you may like/[CourserHub.com].url 123B
  206. linux-server-management-security/0. Websites you may like/[CourserHub.com].url 123B
  207. Readme.txt 51B
  208. linux-server-management-security/Readme.txt 51B