种子简介
种子名称:
Pluralsight - Security Concepts for CCNA Security (210-260) IINS
文件类型:
视频
文件数目:
45个文件
文件大小:
317.61 MB
收录时间:
2022-6-1 01:50
已经下载:
3次
资源热度:
255
最近下载:
2024-12-24 21:40
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:356a80ade6617a12c2c3ef14f30f13f5ee364a8c&dn=Pluralsight - Security Concepts for CCNA Security (210-260) IINS
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
Pluralsight - Security Concepts for CCNA Security (210-260) IINS.torrent
01. Course Introduction and CCNA Security Overview/01_01-Course Introduction.mp42.81MB
01. Course Introduction and CCNA Security Overview/01_02-Course Overview.mp48.42MB
01. Course Introduction and CCNA Security Overview/01_03-CCNA Security Overview.mp412.03MB
02. Common Security Principles/02_01-Module Overview.mp41.45MB
02. Common Security Principles/02_02-Confidentiality.mp45.9MB
02. Common Security Principles/02_03-Integrity.mp46.59MB
02. Common Security Principles/02_04-Availability.mp42.59MB
02. Common Security Principles/02_05-SIEM Technology.mp412.83MB
02. Common Security Principles/02_06-Security Terms.mp49.54MB
02. Common Security Principles/02_07-Common Security Zones.mp412.42MB
02. Common Security Principles/02_08-Module Summary.mp44.33MB
03. Common Security Threats/03_01-Common Security Threats Module Overview.mp41.47MB
03. Common Security Threats/03_02-DoS and DDoS.mp421.08MB
03. Common Security Threats/03_03-Spoofing.mp49.5MB
03. Common Security Threats/03_04-Reflection and Amplification Attacks.mp417.02MB
03. Common Security Threats/03_05-Social Engineering.mp420.42MB
03. Common Security Threats/03_06-Attacks on Passwords.mp41.79MB
03. Common Security Threats/03_07-Reconnaissance Attacks.mp43.7MB
03. Common Security Threats/03_08-Buffer Overflows.mp42.25MB
03. Common Security Threats/03_09-MITM Attacks.mp46.24MB
03. Common Security Threats/03_10-Malware.mp42.72MB
03. Common Security Threats/03_11-Data Loss.mp42.98MB
03. Common Security Threats/03_12-Tools Used to Hack.mp414.85MB
04. Cryptography Concepts/04_01-Module Introduction.mp4836.64KB
04. Cryptography Concepts/04_02-Cryptography Overview.mp42.51MB
04. Cryptography Concepts/04_03-History of Cryptography Substitution Ciphers.mp44.93MB
04. Cryptography Concepts/04_04-History of Cryptography Viginere and Hebern.mp47.13MB
04. Cryptography Concepts/04_05-History of Cryptography The Engigma Machine.mp48.68MB
04. Cryptography Concepts/04_06-Hash Algorithms.mp44.24MB
04. Cryptography Concepts/04_07-Crypto Authentication with Hashes.mp49.13MB
04. Cryptography Concepts/04_08-Comparing Hash Algorithms.mp42.49MB
04. Cryptography Concepts/04_09-How Encryption Works.mp47.43MB
04. Cryptography Concepts/04_10-Cryptanalysis.mp47.98MB
04. Cryptography Concepts/04_11-Encryption and Keys.mp411.16MB
04. Cryptography Concepts/04_12-Digital Signatures.mp412.19MB
04. Cryptography Concepts/04_13-Module Summary.mp41.51MB
05. Network Topologies/05_01-Network Topologies Introduction.mp41.42MB
05. Network Topologies/05_02-Firewall Overview.mp47.32MB
05. Network Topologies/05_03-IPS Overview.mp46.06MB
05. Network Topologies/05_04-Content Security Overview.mp48.53MB
05. Network Topologies/05_05-Remote Access VPN Overview.mp45.81MB
05. Network Topologies/05_06-DMVPN Overview.mp45.06MB
05. Network Topologies/05_07-Endpoint Security Overview.mp48.09MB
05. Network Topologies/05_08-Network Topologies Summary.mp4999.59KB
06. Course Summary/06_01-Course Summary.mp411.2MB