本站已收录 番号和无损神作磁力链接/BT种子 

[ FreeCourseWeb.com ] PluralSight - Wireshark Configuration for Cyber Security Analysis

种子简介

种子名称: [ FreeCourseWeb.com ] PluralSight - Wireshark Configuration for Cyber Security Analysis
文件类型: 视频
文件数目: 26个文件
文件大小: 319.86 MB
收录时间: 2021-10-27 05:44
已经下载: 3
资源热度: 175
最近下载: 2024-11-21 07:09

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:96c99fcf8af750104b241ceb78a88c4ebe9c18b6&dn=[ FreeCourseWeb.com ] PluralSight - Wireshark Configuration for Cyber Security Analysis 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

[ FreeCourseWeb.com ] PluralSight - Wireshark Configuration for Cyber Security Analysis.torrent
  • ~Get Your Files Here !/01. Course Overview/01. Course Overview.mp43.37MB
  • ~Get Your Files Here !/02. Top Five Wireshark Features for Forensic Analysis/02. Introduction to Cyber Security Analysis with Wireshark.mp45.18MB
  • ~Get Your Files Here !/02. Top Five Wireshark Features for Forensic Analysis/03. Lab 1 - Creating a Security Profile.mp426.29MB
  • ~Get Your Files Here !/02. Top Five Wireshark Features for Forensic Analysis/04. Lab 2 - The Statistics View.mp422.1MB
  • ~Get Your Files Here !/02. Top Five Wireshark Features for Forensic Analysis/05. Lab 3 - Configuring GeoIP Location Resolution.mp417.38MB
  • ~Get Your Files Here !/02. Top Five Wireshark Features for Forensic Analysis/06. Lab 4 - Configuring Custom Columns.mp420.81MB
  • ~Get Your Files Here !/02. Top Five Wireshark Features for Forensic Analysis/07. Lab 5 - Configuring Name Resolution.mp423.35MB
  • ~Get Your Files Here !/02. Top Five Wireshark Features for Forensic Analysis/08. Lab 6 - Exporting HTTP Objects and Files.mp413.65MB
  • ~Get Your Files Here !/02. Top Five Wireshark Features for Forensic Analysis/09. Lab 7 - Reassembling and Exporting FTP Files.mp418.26MB
  • ~Get Your Files Here !/02. Top Five Wireshark Features for Forensic Analysis/10. Module Summary.mp4832.65KB
  • ~Get Your Files Here !/03. Filters and Coloring Rules for Spotting Suspect Traffic/11. Intro to Filters and Coloring Rules in Wireshark.mp42.43MB
  • ~Get Your Files Here !/03. Filters and Coloring Rules for Spotting Suspect Traffic/12. Analyzing Unusual DNS Activity.mp42.6MB
  • ~Get Your Files Here !/03. Filters and Coloring Rules for Spotting Suspect Traffic/13. Lab 7 - Part 1 - Filtering for Unusual DNS Activity.mp434.53MB
  • ~Get Your Files Here !/03. Filters and Coloring Rules for Spotting Suspect Traffic/14. Lab 7 - Part 2 - Filtering for Unusual DNS Activity.mp48.03MB
  • ~Get Your Files Here !/03. Filters and Coloring Rules for Spotting Suspect Traffic/15. Analyzing Traffic from Unusual Country Codes.mp41.48MB
  • ~Get Your Files Here !/03. Filters and Coloring Rules for Spotting Suspect Traffic/16. Lab 8 - Filtering for Traffic Based on Country Location.mp425.45MB
  • ~Get Your Files Here !/03. Filters and Coloring Rules for Spotting Suspect Traffic/17. Analyzing Suspect TCP Behavior and Flags.mp43.65MB
  • ~Get Your Files Here !/03. Filters and Coloring Rules for Spotting Suspect Traffic/18. Lab 9 - Part 1 - Filtering for Suspect TCP Behavior.mp424.51MB
  • ~Get Your Files Here !/03. Filters and Coloring Rules for Spotting Suspect Traffic/19. Lab 9 - Part 2 - Filtering for Suspect SSH Traffic.mp45.41MB
  • ~Get Your Files Here !/03. Filters and Coloring Rules for Spotting Suspect Traffic/20. Lab 10 - Filtering for Executable Files.mp418.78MB
  • ~Get Your Files Here !/03. Filters and Coloring Rules for Spotting Suspect Traffic/21. Lab 11 - Analyzing Traffic over Non-standard Ports.mp425.77MB
  • ~Get Your Files Here !/03. Filters and Coloring Rules for Spotting Suspect Traffic/22. Summary.mp4745.67KB
  • ~Get Your Files Here !/04. Configuring Wireshark for Decrypting Traffic/23. Module Introduction.mp42.02MB
  • ~Get Your Files Here !/04. Configuring Wireshark for Decrypting Traffic/24. Capturing the TLS Session Keys.mp43.73MB
  • ~Get Your Files Here !/04. Configuring Wireshark for Decrypting Traffic/25. Lab 12 - Decrypting TLS Traffic in Wireshark.mp48.03MB
  • ~Get Your Files Here !/04. Configuring Wireshark for Decrypting Traffic/26. Course Summary.mp41.51MB