zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
Lynda - SSCP Cert Prep 6 Networks and Communications Security
magnet:?xt=urn:btih:02dc0f6cc39b40e7f14f0c847386a5880e0095b9&dn=Lynda - SSCP Cert Prep 6 Networks and Communications Security
磁力链接详情
文件列表详情
02dc0f6cc39b40e7f14f0c847386a5880e0095b9
infohash:
50
文件数量
351.96 MB
文件大小
2019-5-17 02:33
创建日期
2024-11-22 13:04
最后访问
相关分词
Lynda
-
SSCP
Cert
Prep
6
Networks
and
Communications
Security
1.Introduction/01.Welcome.mp4 5.16 MB
2.1. TCP_IP Networking/02.Introducing TCP_IP.mp4 10.63 MB
2.1. TCP_IP Networking/03.IP addressing.mp4 5.96 MB
2.1. TCP_IP Networking/04.Domain name system (DNS).mp4 7.47 MB
2.1. TCP_IP Networking/05.Network ports.mp4 7.47 MB
2.1. TCP_IP Networking/06.ICMP.mp4 13.18 MB
2.1. TCP_IP Networking/07.Network topologies.mp4 6.8 MB
2.1. TCP_IP Networking/08.Network relationships.mp4 4.39 MB
3.2. Network Security Devices/09.Switches and routers.mp4 6.48 MB
3.2. Network Security Devices/10.Firewalls.mp4 7.46 MB
3.2. Network Security Devices/11.Load balancers, proxies, and web security gateways.mp4 7.06 MB
3.2. Network Security Devices/12.VPNs and VPN concentrators.mp4 4.63 MB
3.2. Network Security Devices/13.Network intrusion detection and prevention.mp4 6.5 MB
3.2. Network Security Devices/14.Protocol analyzers.mp4 21.87 MB
3.2. Network Security Devices/15.Unified threat management.mp4 3.04 MB
3.2. Network Security Devices/16.Content distribution networks.mp4 7.28 MB
3.2. Network Security Devices/17.Traffic shaping and WAN optimization.mp4 4.23 MB
4.3. Designing Secure Networks/18.Public and private addressing.mp4 11 MB
4.3. Designing Secure Networks/19.Subnetting.mp4 6.57 MB
4.3. Designing Secure Networks/20.VLANs and network segmentation.mp4 3.13 MB
4.3. Designing Secure Networks/21.Security device placement.mp4 10.87 MB
4.3. Designing Secure Networks/22.Network access control.mp4 6.96 MB
4.3. Designing Secure Networks/23.RADIUS and TACACS.mp4 6.37 MB
4.3. Designing Secure Networks/24.Remote network access.mp4 9.24 MB
4.3. Designing Secure Networks/25.Desktop and application virtualization.mp4 9 MB
4.3. Designing Secure Networks/26.Software defined networking.mp4 5.49 MB
4.3. Designing Secure Networks/27.Port isolation.mp4 3.84 MB
4.3. Designing Secure Networks/28.Defense in depth.mp4 6.12 MB
5.4. Specialized Networking/29.Telephony.mp4 4.28 MB
5.4. Specialized Networking/30.Multimedia collaboration.mp4 13.05 MB
5.4. Specialized Networking/31.Storage networks.mp4 5.72 MB
6.5. Secure Network Management/32.Firewall rule management.mp4 8.71 MB
6.5. Secure Network Management/33.Router configuration security.mp4 8 MB
6.5. Secure Network Management/34.Switch configuration security.mp4 6.12 MB
6.5. Secure Network Management/35.Maintaining network availability.mp4 4.34 MB
6.5. Secure Network Management/36.Network monitoring.mp4 6.7 MB
6.5. Secure Network Management/37.SNMP.mp4 5.76 MB
7.6. Network Attacks/38.Denial of service attacks.mp4 7.88 MB
7.6. Network Attacks/39.Eavesdropping attacks.mp4 6.86 MB
7.6. Network Attacks/40.Other network attacks.mp4 10.99 MB
8.7. Wireless Networking/41.Understanding wireless networking.mp4 8.52 MB
8.7. Wireless Networking/42.Basic wireless security.mp4 5.46 MB
8.7. Wireless Networking/43.WEP, WPA ,and WPA2.mp4 2.5 MB
8.7. Wireless Networking/44.Wireless authentication.mp4 7.11 MB
8.7. Wireless Networking/45.Wireless signal propagation.mp4 4.41 MB
8.7. Wireless Networking/46.WPA and WPS attacks.mp4 5.96 MB
8.7. Wireless Networking/47.Propagation attacks.mp4 9.57 MB
8.7. Wireless Networking/48.Preventing rogues and evil twins.mp4 5.57 MB
8.7. Wireless Networking/49.Understanding Bluetooth and NFC attacks.mp4 4.14 MB
9.Conclusion/50.What's next.mp4 2.13 MB
其他位置