本站已收录 番号和无损神作磁力链接/BT种子 

[FreeCoursesOnline.Me] [LYNDA] Ethical Hacking - Evading IDS, Firewalls, and Honeypots [FCO]

种子简介

种子名称: [FreeCoursesOnline.Me] [LYNDA] Ethical Hacking - Evading IDS, Firewalls, and Honeypots [FCO]
文件类型: 视频
文件数目: 29个文件
文件大小: 317.49 MB
收录时间: 2019-8-27 15:12
已经下载: 3
资源热度: 164
最近下载: 2024-8-14 13:03

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:5bacfaaee3bcffdf060e03a5495d8805febd3bc9&dn=[FreeCoursesOnline.Me] [LYNDA] Ethical Hacking - Evading IDS, Firewalls, and Honeypots [FCO] 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

[FreeCoursesOnline.Me] [LYNDA] Ethical Hacking - Evading IDS, Firewalls, and Honeypots [FCO].torrent
  • 01.Introduction/01.01.Find weaknesses in the perimeter.mp418.8MB
  • 01.Introduction/01.02.What you should know.mp41.95MB
  • 01.Introduction/01.03.Course disclaimer.mp42.15MB
  • 02.Firewalls/02.04.Understanding Firewalls.mp41.83MB
  • 02.Firewalls/02.05.Apply the basics of the Windows firewall.mp413.02MB
  • 02.Firewalls/02.06.Use advanced features in the Windows Firewall.mp423.44MB
  • 02.Firewalls/02.07.Review firewall logs.mp410.01MB
  • 02.Firewalls/02.08.Understand Linux IPTables.mp411.32MB
  • 02.Firewalls/02.09.Set up an IPTables firewall.mp47.43MB
  • 02.Firewalls/02.10.Manage rules with Firewall Builder.mp419.82MB
  • 02.Firewalls/02.11.Port testing.mp42MB
  • 03.Hardware Firewalls/03.12.Set up a Cisco PIX firewall.mp48.44MB
  • 03.Hardware Firewalls/03.13.Create a secure enclave.mp48.6MB
  • 04.Network Simulation Using GNS3/04.14.Install GNS3.mp413.68MB
  • 04.Network Simulation Using GNS3/04.15.Obtain network device images.mp45.89MB
  • 04.Network Simulation Using GNS3/04.16.Set up a network.mp413.07MB
  • 04.Network Simulation Using GNS3/04.17.Simulate the ASA firewall.mp418.41MB
  • 04.Network Simulation Using GNS3/04.18.Integrate Kali into GNS3.mp413.54MB
  • 05.Purpose Perimeter Devices/05.19.Understand Web Application Firewalls.mp410.76MB
  • 05.Purpose Perimeter Devices/05.20.Protect API services with the WSO2 gateway.mp429.16MB
  • 05.Purpose Perimeter Devices/05.21.Understand honeypots.mp411.53MB
  • 05.Purpose Perimeter Devices/05.22.Run the Cowrie honeypot.mp48.91MB
  • 06.Protection from Intrusion/06.23.Intrusion response techniques.mp48.82MB
  • 06.Protection from Intrusion/06.24.xListing sites.mp41.84MB
  • 06.Protection from Intrusion/06.25.Snort rules.mp414.18MB
  • 06.Protection from Intrusion/06.26.Detect intrusions with Security Onion.mp416.88MB
  • 06.Protection from Intrusion/06.27.Extend IDS with reputation.mp45.98MB
  • 06.Protection from Intrusion/06.28.EINSTEIN.mp48.8MB
  • 07.Conclusion/07.29.Next steps.mp47.25MB