本站已收录 番号和无损神作磁力链接/BT种子 

Pluralsight - SSCP Network and Communications Security

种子简介

种子名称: Pluralsight - SSCP Network and Communications Security
文件类型: 视频
文件数目: 37个文件
文件大小: 341.25 MB
收录时间: 2016-10-13 13:06
已经下载: 3
资源热度: 198
最近下载: 2024-12-14 06:47

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:849484bfb41e458f7343963cad8e8f781a7bfb3a&dn=Pluralsight - SSCP Network and Communications Security 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

Pluralsight - SSCP Network and Communications Security.torrent
  • 1 - Introduction/Introduction.mp47.63MB
  • 2 - Understand Security Issues Related to Networks/1 - Introduction.mp46.08MB
  • 2 - Understand Security Issues Related to Networks/2 - OSI and TCP:IP Models - TCP:IP Model.mp49.61MB
  • 2 - Understand Security Issues Related to Networks/3 - OSI and TCP:IP Models- IPv4 and IPv6 Addressing.mp412.94MB
  • 2 - Understand Security Issues Related to Networks/4 - OSI and TCP:IP Models- OSI Model.mp46.92MB
  • 2 - Understand Security Issues Related to Networks/5 - OSI and TCP:IP Models- Layers.mp424.63MB
  • 2 - Understand Security Issues Related to Networks/6 - Network Topographies and Relationships.mp415.03MB
  • 2 - Understand Security Issues Related to Networks/7 - Network Topographies and Relationships- Ring.mp48.93MB
  • 2 - Understand Security Issues Related to Networks/8 - Commonly Used Ports and Protocols.mp47.11MB
  • 2 - Understand Security Issues Related to Networks/9 - What This Module Covered.mp42.34MB
  • 3 - Protect Telecommunications Technologies/1 - Introduction.mp42.9MB
  • 3 - Protect Telecommunications Technologies/2 - Converge Communications.mp46.94MB
  • 3 - Protect Telecommunications Technologies/3 - Attacks and Countermeasures- Network Monitoring.mp416.8MB
  • 3 - Protect Telecommunications Technologies/4 - What This Module Covered.mp41.96MB
  • 4 - Control Network Access/1 - Introduction.mp42.5MB
  • 4 - Control Network Access/2 - Access Control and Monitoring.mp414.04MB
  • 4 - Control Network Access/3 - Access Control Standards and Protocols.mp46.21MB
  • 4 - Control Network Access/4 - Remote Access Operation and Configuration.mp412.38MB
  • 4 - Control Network Access/5 - What This Module Covered.mp41.8MB
  • 5 - Manage LAN-based Security/1 - Introduction.mp43.43MB
  • 5 - Manage LAN-based Security/2 - Routers and Switches Layer 2 Switch.mp45.73MB
  • 5 - Manage LAN-based Security/3 - Routers and Switches - Switches.mp410.46MB
  • 5 - Manage LAN-based Security/4 - Separation of Data Plane and Control Plane.mp44.84MB
  • 5 - Manage LAN-based Security/5 - Segmentation.mp423.33MB
  • 5 - Manage LAN-based Security/6 - Secure Device Management.mp411.43MB
  • 5 - Manage LAN-based Security/7 - What This Module Covered.mp42.8MB
  • 6 - Operate and Configure Network-based Security Devices/1 - Introduction.mp44.06MB
  • 6 - Operate and Configure Network-based Security Devices/2 - Firewalls and Proxies.mp426.27MB
  • 6 - Operate and Configure Network-based Security Devices/3 - Network Intrusion Detection:Prevention Systems.mp422.31MB
  • 6 - Operate and Configure Network-based Security Devices/4 - Traffic Shaping Devices.mp49.54MB
  • 6 - Operate and Configure Network-based Security Devices/5 - What This Module Covered.mp42.49MB
  • 7 - Implement and Operate Wireless Technologies/1 - Introduction.mp43.42MB
  • 7 - Implement and Operate Wireless Technologies/2 - Transmission Security - Wireless Networks.mp410.01MB
  • 7 - Implement and Operate Wireless Technologies/3 - Transmission Security - Wireless Protocols and Standards.mp411.66MB
  • 7 - Implement and Operate Wireless Technologies/4 - Wireless Security Devices.mp46.72MB
  • 7 - Implement and Operate Wireless Technologies/5 - Attacks and Countermeasures.mp414.19MB
  • 7 - Implement and Operate Wireless Technologies/6 - What This Module Covered.mp41.82MB