zhongziso种子搜
首页
功能
磁力转BT
BT转磁力
使用教程
免责声明
关于
zhongziso
搜索
Lynda - Ethical Hacking Perimeter Defenses
magnet:?xt=urn:btih:5369d0ec48ac00a4bfb6b15abef401db3f2a390b&dn=Lynda - Ethical Hacking Perimeter Defenses
磁力链接详情
Hash值:
5369d0ec48ac00a4bfb6b15abef401db3f2a390b
点击数:
146
文件大小:
262.82 MB
文件数量:
24
创建日期:
2018-1-27 21:35
最后访问:
2024-10-2 09:27
访问标签:
Lynda
-
Ethical
Hacking
Perimeter
Defenses
文件列表详情
001 Welcome.mp4 8.71 MB
002 What you should know before watching this course.mp4 1.71 MB
003 Course disclaimer.mp4 2.69 MB
004 Understanding firewalls.mp4 2.52 MB
005 Applying the basics of the Windows Firewall.mp4 7.03 MB
006 Using advanced features in the Windows Firewall.mp4 19.99 MB
007 Reviewing firewall logs.mp4 8.9 MB
008 Understanding Linux IPTables.mp4 10.57 MB
009 Setting up an IPTable firewall.mp4 6.98 MB
010 Managing rules with Firewall Builder.mp4 21.1 MB
011 Port testing.mp4 2.12 MB
012 Setting up a Cisco PIX firewall.mp4 8.98 MB
013 Creating a secure enclave.mp4 8.79 MB
014 Installing GNS3.mp4 15.95 MB
015 Obtaining network device images.mp4 5.52 MB
016 Setting up a network.mp4 14.79 MB
017 Simulating the ASA firewall.mp4 19.99 MB
018 Integrating Kali into GNS3.mp4 13.97 MB
019 Understanding web application firewalls.mp4 10.76 MB
020 Protecting API services with the WSO2 gateway.mp4 29.24 MB
021 Understanding honeypots.mp4 13.04 MB
022 Running the Cowrie honeypot.mp4 8.93 MB
023 Detecting intrusions with Security Onion.mp4 17.02 MB
024 Summary.mp4 3.51 MB
其他位置