本站已收录 番号和无损神作磁力链接/BT种子 

Pluralsight - Security Concepts for CCNA Security (210-260) IINS

种子简介

种子名称: Pluralsight - Security Concepts for CCNA Security (210-260) IINS
文件类型: 视频
文件数目: 45个文件
文件大小: 317.61 MB
收录时间: 2022-6-1 01:50
已经下载: 3
资源热度: 176
最近下载: 2024-5-19 10:19

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:356a80ade6617a12c2c3ef14f30f13f5ee364a8c&dn=Pluralsight - Security Concepts for CCNA Security (210-260) IINS 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

Pluralsight - Security Concepts for CCNA Security (210-260) IINS.torrent
  • 01. Course Introduction and CCNA Security Overview/01_01-Course Introduction.mp42.81MB
  • 01. Course Introduction and CCNA Security Overview/01_02-Course Overview.mp48.42MB
  • 01. Course Introduction and CCNA Security Overview/01_03-CCNA Security Overview.mp412.03MB
  • 02. Common Security Principles/02_01-Module Overview.mp41.45MB
  • 02. Common Security Principles/02_02-Confidentiality.mp45.9MB
  • 02. Common Security Principles/02_03-Integrity.mp46.59MB
  • 02. Common Security Principles/02_04-Availability.mp42.59MB
  • 02. Common Security Principles/02_05-SIEM Technology.mp412.83MB
  • 02. Common Security Principles/02_06-Security Terms.mp49.54MB
  • 02. Common Security Principles/02_07-Common Security Zones.mp412.42MB
  • 02. Common Security Principles/02_08-Module Summary.mp44.33MB
  • 03. Common Security Threats/03_01-Common Security Threats Module Overview.mp41.47MB
  • 03. Common Security Threats/03_02-DoS and DDoS.mp421.08MB
  • 03. Common Security Threats/03_03-Spoofing.mp49.5MB
  • 03. Common Security Threats/03_04-Reflection and Amplification Attacks.mp417.02MB
  • 03. Common Security Threats/03_05-Social Engineering.mp420.42MB
  • 03. Common Security Threats/03_06-Attacks on Passwords.mp41.79MB
  • 03. Common Security Threats/03_07-Reconnaissance Attacks.mp43.7MB
  • 03. Common Security Threats/03_08-Buffer Overflows.mp42.25MB
  • 03. Common Security Threats/03_09-MITM Attacks.mp46.24MB
  • 03. Common Security Threats/03_10-Malware.mp42.72MB
  • 03. Common Security Threats/03_11-Data Loss.mp42.98MB
  • 03. Common Security Threats/03_12-Tools Used to Hack.mp414.85MB
  • 04. Cryptography Concepts/04_01-Module Introduction.mp4836.64KB
  • 04. Cryptography Concepts/04_02-Cryptography Overview.mp42.51MB
  • 04. Cryptography Concepts/04_03-History of Cryptography Substitution Ciphers.mp44.93MB
  • 04. Cryptography Concepts/04_04-History of Cryptography Viginere and Hebern.mp47.13MB
  • 04. Cryptography Concepts/04_05-History of Cryptography The Engigma Machine.mp48.68MB
  • 04. Cryptography Concepts/04_06-Hash Algorithms.mp44.24MB
  • 04. Cryptography Concepts/04_07-Crypto Authentication with Hashes.mp49.13MB
  • 04. Cryptography Concepts/04_08-Comparing Hash Algorithms.mp42.49MB
  • 04. Cryptography Concepts/04_09-How Encryption Works.mp47.43MB
  • 04. Cryptography Concepts/04_10-Cryptanalysis.mp47.98MB
  • 04. Cryptography Concepts/04_11-Encryption and Keys.mp411.16MB
  • 04. Cryptography Concepts/04_12-Digital Signatures.mp412.19MB
  • 04. Cryptography Concepts/04_13-Module Summary.mp41.51MB
  • 05. Network Topologies/05_01-Network Topologies Introduction.mp41.42MB
  • 05. Network Topologies/05_02-Firewall Overview.mp47.32MB
  • 05. Network Topologies/05_03-IPS Overview.mp46.06MB
  • 05. Network Topologies/05_04-Content Security Overview.mp48.53MB
  • 05. Network Topologies/05_05-Remote Access VPN Overview.mp45.81MB
  • 05. Network Topologies/05_06-DMVPN Overview.mp45.06MB
  • 05. Network Topologies/05_07-Endpoint Security Overview.mp48.09MB
  • 05. Network Topologies/05_08-Network Topologies Summary.mp4999.59KB
  • 06. Course Summary/06_01-Course Summary.mp411.2MB