zhongziso种子搜
首页
功能
磁力转BT
BT转磁力
使用教程
免责声明
关于
zhongziso
搜索
[FreeCoursesOnline.Me] [LYNDA] Ethical Hacking - Evading IDS, Firewalls, and Honeypots [FCO]
magnet:?xt=urn:btih:5bacfaaee3bcffdf060e03a5495d8805febd3bc9&dn=[FreeCoursesOnline.Me] [LYNDA] Ethical Hacking - Evading IDS, Firewalls, and Honeypots [FCO]
磁力链接详情
Hash值:
5bacfaaee3bcffdf060e03a5495d8805febd3bc9
点击数:
215
文件大小:
317.49 MB
文件数量:
29
创建日期:
2019-8-27 15:12
最后访问:
2024-12-29 02:29
访问标签:
FreeCoursesOnline
Me
LYNDA
Ethical
Hacking
-
Evading
IDS
Firewalls
and
Honeypots
FCO
文件列表详情
01.Introduction/01.01.Find weaknesses in the perimeter.mp4 18.8 MB
01.Introduction/01.02.What you should know.mp4 1.95 MB
01.Introduction/01.03.Course disclaimer.mp4 2.15 MB
02.Firewalls/02.04.Understanding Firewalls.mp4 1.83 MB
02.Firewalls/02.05.Apply the basics of the Windows firewall.mp4 13.02 MB
02.Firewalls/02.06.Use advanced features in the Windows Firewall.mp4 23.44 MB
02.Firewalls/02.07.Review firewall logs.mp4 10.01 MB
02.Firewalls/02.08.Understand Linux IPTables.mp4 11.32 MB
02.Firewalls/02.09.Set up an IPTables firewall.mp4 7.43 MB
02.Firewalls/02.10.Manage rules with Firewall Builder.mp4 19.82 MB
02.Firewalls/02.11.Port testing.mp4 2 MB
03.Hardware Firewalls/03.12.Set up a Cisco PIX firewall.mp4 8.44 MB
03.Hardware Firewalls/03.13.Create a secure enclave.mp4 8.6 MB
04.Network Simulation Using GNS3/04.14.Install GNS3.mp4 13.68 MB
04.Network Simulation Using GNS3/04.15.Obtain network device images.mp4 5.89 MB
04.Network Simulation Using GNS3/04.16.Set up a network.mp4 13.07 MB
04.Network Simulation Using GNS3/04.17.Simulate the ASA firewall.mp4 18.41 MB
04.Network Simulation Using GNS3/04.18.Integrate Kali into GNS3.mp4 13.54 MB
05.Purpose Perimeter Devices/05.19.Understand Web Application Firewalls.mp4 10.76 MB
05.Purpose Perimeter Devices/05.20.Protect API services with the WSO2 gateway.mp4 29.16 MB
05.Purpose Perimeter Devices/05.21.Understand honeypots.mp4 11.53 MB
05.Purpose Perimeter Devices/05.22.Run the Cowrie honeypot.mp4 8.91 MB
06.Protection from Intrusion/06.23.Intrusion response techniques.mp4 8.82 MB
06.Protection from Intrusion/06.24.xListing sites.mp4 1.84 MB
06.Protection from Intrusion/06.25.Snort rules.mp4 14.18 MB
06.Protection from Intrusion/06.26.Detect intrusions with Security Onion.mp4 16.88 MB
06.Protection from Intrusion/06.27.Extend IDS with reputation.mp4 5.98 MB
06.Protection from Intrusion/06.28.EINSTEIN.mp4 8.8 MB
07.Conclusion/07.29.Next steps.mp4 7.25 MB
其他位置