种子简介
种子名称:
[FreeCoursesOnline.Me] [LYNDA] Ethical Hacking - Evading IDS, Firewalls, and Honeypots [FCO]
文件类型:
视频
文件数目:
29个文件
文件大小:
317.49 MB
收录时间:
2019-8-27 15:12
已经下载:
3次
资源热度:
221
最近下载:
2025-1-6 10:11
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:5bacfaaee3bcffdf060e03a5495d8805febd3bc9&dn=[FreeCoursesOnline.Me] [LYNDA] Ethical Hacking - Evading IDS, Firewalls, and Honeypots [FCO]
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
[FreeCoursesOnline.Me] [LYNDA] Ethical Hacking - Evading IDS, Firewalls, and Honeypots [FCO].torrent
01.Introduction/01.01.Find weaknesses in the perimeter.mp418.8MB
01.Introduction/01.02.What you should know.mp41.95MB
01.Introduction/01.03.Course disclaimer.mp42.15MB
02.Firewalls/02.04.Understanding Firewalls.mp41.83MB
02.Firewalls/02.05.Apply the basics of the Windows firewall.mp413.02MB
02.Firewalls/02.06.Use advanced features in the Windows Firewall.mp423.44MB
02.Firewalls/02.07.Review firewall logs.mp410.01MB
02.Firewalls/02.08.Understand Linux IPTables.mp411.32MB
02.Firewalls/02.09.Set up an IPTables firewall.mp47.43MB
02.Firewalls/02.10.Manage rules with Firewall Builder.mp419.82MB
02.Firewalls/02.11.Port testing.mp42MB
03.Hardware Firewalls/03.12.Set up a Cisco PIX firewall.mp48.44MB
03.Hardware Firewalls/03.13.Create a secure enclave.mp48.6MB
04.Network Simulation Using GNS3/04.14.Install GNS3.mp413.68MB
04.Network Simulation Using GNS3/04.15.Obtain network device images.mp45.89MB
04.Network Simulation Using GNS3/04.16.Set up a network.mp413.07MB
04.Network Simulation Using GNS3/04.17.Simulate the ASA firewall.mp418.41MB
04.Network Simulation Using GNS3/04.18.Integrate Kali into GNS3.mp413.54MB
05.Purpose Perimeter Devices/05.19.Understand Web Application Firewalls.mp410.76MB
05.Purpose Perimeter Devices/05.20.Protect API services with the WSO2 gateway.mp429.16MB
05.Purpose Perimeter Devices/05.21.Understand honeypots.mp411.53MB
05.Purpose Perimeter Devices/05.22.Run the Cowrie honeypot.mp48.91MB
06.Protection from Intrusion/06.23.Intrusion response techniques.mp48.82MB
06.Protection from Intrusion/06.24.xListing sites.mp41.84MB
06.Protection from Intrusion/06.25.Snort rules.mp414.18MB
06.Protection from Intrusion/06.26.Detect intrusions with Security Onion.mp416.88MB
06.Protection from Intrusion/06.27.Extend IDS with reputation.mp45.98MB
06.Protection from Intrusion/06.28.EINSTEIN.mp48.8MB
07.Conclusion/07.29.Next steps.mp47.25MB