本站已收录 番号和无损神作磁力链接/BT种子 

Lynda - SSCP Cert Prep 6 Networks and Communications Security

种子简介

种子名称: Lynda - SSCP Cert Prep 6 Networks and Communications Security
文件类型: 视频
文件数目: 50个文件
文件大小: 351.96 MB
收录时间: 2019-5-17 02:33
已经下载: 3
资源热度: 181
最近下载: 2024-7-4 16:34

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:02dc0f6cc39b40e7f14f0c847386a5880e0095b9&dn=Lynda - SSCP Cert Prep 6 Networks and Communications Security 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

Lynda - SSCP Cert Prep 6 Networks and Communications Security.torrent
  • 1.Introduction/01.Welcome.mp45.16MB
  • 2.1. TCP_IP Networking/02.Introducing TCP_IP.mp410.63MB
  • 2.1. TCP_IP Networking/03.IP addressing.mp45.96MB
  • 2.1. TCP_IP Networking/04.Domain name system (DNS).mp47.47MB
  • 2.1. TCP_IP Networking/05.Network ports.mp47.47MB
  • 2.1. TCP_IP Networking/06.ICMP.mp413.18MB
  • 2.1. TCP_IP Networking/07.Network topologies.mp46.8MB
  • 2.1. TCP_IP Networking/08.Network relationships.mp44.39MB
  • 3.2. Network Security Devices/09.Switches and routers.mp46.48MB
  • 3.2. Network Security Devices/10.Firewalls.mp47.46MB
  • 3.2. Network Security Devices/11.Load balancers, proxies, and web security gateways.mp47.06MB
  • 3.2. Network Security Devices/12.VPNs and VPN concentrators.mp44.63MB
  • 3.2. Network Security Devices/13.Network intrusion detection and prevention.mp46.5MB
  • 3.2. Network Security Devices/14.Protocol analyzers.mp421.87MB
  • 3.2. Network Security Devices/15.Unified threat management.mp43.04MB
  • 3.2. Network Security Devices/16.Content distribution networks.mp47.28MB
  • 3.2. Network Security Devices/17.Traffic shaping and WAN optimization.mp44.23MB
  • 4.3. Designing Secure Networks/18.Public and private addressing.mp411MB
  • 4.3. Designing Secure Networks/19.Subnetting.mp46.57MB
  • 4.3. Designing Secure Networks/20.VLANs and network segmentation.mp43.13MB
  • 4.3. Designing Secure Networks/21.Security device placement.mp410.87MB
  • 4.3. Designing Secure Networks/22.Network access control.mp46.96MB
  • 4.3. Designing Secure Networks/23.RADIUS and TACACS.mp46.37MB
  • 4.3. Designing Secure Networks/24.Remote network access.mp49.24MB
  • 4.3. Designing Secure Networks/25.Desktop and application virtualization.mp49MB
  • 4.3. Designing Secure Networks/26.Software defined networking.mp45.49MB
  • 4.3. Designing Secure Networks/27.Port isolation.mp43.84MB
  • 4.3. Designing Secure Networks/28.Defense in depth.mp46.12MB
  • 5.4. Specialized Networking/29.Telephony.mp44.28MB
  • 5.4. Specialized Networking/30.Multimedia collaboration.mp413.05MB
  • 5.4. Specialized Networking/31.Storage networks.mp45.72MB
  • 6.5. Secure Network Management/32.Firewall rule management.mp48.71MB
  • 6.5. Secure Network Management/33.Router configuration security.mp48MB
  • 6.5. Secure Network Management/34.Switch configuration security.mp46.12MB
  • 6.5. Secure Network Management/35.Maintaining network availability.mp44.34MB
  • 6.5. Secure Network Management/36.Network monitoring.mp46.7MB
  • 6.5. Secure Network Management/37.SNMP.mp45.76MB
  • 7.6. Network Attacks/38.Denial of service attacks.mp47.88MB
  • 7.6. Network Attacks/39.Eavesdropping attacks.mp46.86MB
  • 7.6. Network Attacks/40.Other network attacks.mp410.99MB
  • 8.7. Wireless Networking/41.Understanding wireless networking.mp48.52MB
  • 8.7. Wireless Networking/42.Basic wireless security.mp45.46MB
  • 8.7. Wireless Networking/43.WEP, WPA ,and WPA2.mp42.5MB
  • 8.7. Wireless Networking/44.Wireless authentication.mp47.11MB
  • 8.7. Wireless Networking/45.Wireless signal propagation.mp44.41MB
  • 8.7. Wireless Networking/46.WPA and WPS attacks.mp45.96MB
  • 8.7. Wireless Networking/47.Propagation attacks.mp49.57MB
  • 8.7. Wireless Networking/48.Preventing rogues and evil twins.mp45.57MB
  • 8.7. Wireless Networking/49.Understanding Bluetooth and NFC attacks.mp44.14MB
  • 9.Conclusion/50.What's next.mp42.13MB