种子简介
种子名称:
Lynda - Protect Your Network with Open-Source Software
文件类型:
文件数目:
45个文件
文件大小:
282.42 MB
收录时间:
2015-9-18 07:48
已经下载:
3次
资源热度:
162
最近下载:
2025-3-31 07:57
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:22459D614239F4949C9D1CF9B00FB71A287D3BDE&dn=Lynda - Protect Your Network with Open-Source Software
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
Lynda - Protect Your Network with Open-Source Software.torrent
001 Welcome.mp47.58MB
002 What you should know before watching this course.mp42.36MB
003 What is a firewall.mp43.61MB
004 A host firewall.mp45.8MB
005 A network firewall.mp43.75MB
006 Static packet filtering (SPF) vs. stateful packet inspection (SPI).mp46.17MB
007 Netfilter and iptables.mp46.67MB
008 Using iptables to set up a host firewall.mp424.48MB
009 Creating a shell script to automate configuring Netfilter.mp418.37MB
010 Understanding hosts as routers.mp45.59MB
011 Host as a router - Including an additional network adapter.mp417.81MB
012 Host as a router - Setting up a second host to test the router.mp411.79MB
013 Host as a router - Setting up IP forwarding.mp49.96MB
014 Host as a router - Configuring the router`s Netfilter settings.mp415.9MB
015 Host as a router - Testing.mp46.18MB
016 Understanding using a host as a network firewall.mp46.7MB
017 Setting up a web server to receive forwarded packets.mp44.33MB
018 Configuring port forwarding by adding Netfilter rules.mp47.17MB
019 Testing port forwarding.mp42.35MB
020 Understanding one-legged demilitarized zones (DMZs) using iptables.mp43.35MB
021 Using iptables to set up a one-legged DMZ.mp45.02MB
022 Using iptables to set up a true DMZ.mp41.85MB
023 Understanding Squid, an application proxy firewall.mp43.15MB
024 Setting up Squid.mp47.75MB
025 Fine-tuning the Ubuntu router host.mp410.22MB
026 What is a packet analysis.mp43.2MB
027 Packet-analysis applications in network security - ARP poisoning example.mp45.72MB
028 Packet capturing with Wireshark.mp47.28MB
029 Exploring Wireshark`s advanced features.mp41.65MB
030 Demonstrating Wireshark`s advanced features.mp49.56MB
031 What is an IDS.mp43.44MB
032 Introducing Snort.mp42.74MB
033 Snort as a packet sniffer.mp46.54MB
034 Snort as an IDS - Establishing rules.mp45.82MB
035 Snort as an IDS - Detecting pings.mp45.28MB
036 What is network vulnerability assessment.mp43.93MB
037 Nessus.mp42.64MB
038 Network scanning with Nessus.mp42.81MB
039 Logging and its significance.mp41.94MB
040 Syslog-ng.mp41.2MB
041 Log forwarding using syslong-ng - Part one.mp44.85MB
042 Log forwarding using syslong-ng - Part two.mp47.94MB
043 Kiwi.mp43.53MB
044 Simple Network Management Protocol (SNMP).mp42.57MB
045 Next steps.mp41.91MB