Ethical_Hacking_-_Perimeter_Defenses

mp4   Hot:315   Size:262.82 MB   Created:2017-08-27 18:29:17   Update:2021-09-13 06:08:22  

Download link

File List

  • 1_Introduction/01_Welcome.mp4 8.71 MB
    1_Introduction/02_What_you_should_know_before_watching_this_course.mp4 1.71 MB
    1_Introduction/03_Course_disclaimer.mp4 2.69 MB
    2_1._Firewalls/04_Understanding_firewalls.mp4 2.52 MB
    2_1._Firewalls/05_Applying_the_basics_of_the_Windows_Firewall.mp4 7.03 MB
    2_1._Firewalls/06_Using_advanced_features_in_the_Windows_Firewall.mp4 19.99 MB
    2_1._Firewalls/07_Reviewing_firewall_logs.mp4 8.9 MB
    2_1._Firewalls/08_Understanding_Linux_IPTables.mp4 10.57 MB
    2_1._Firewalls/09_Setting_up_an_IPTable_firewall.mp4 6.98 MB
    2_1._Firewalls/10_Managing_rules_with_Firewall_Builder.mp4 21.1 MB
    2_1._Firewalls/11_Port_testing.mp4 2.12 MB
    3_2._Hardware_Firewalls/12_Setting_up_a_Cisco_PIX_firewall.mp4 8.98 MB
    3_2._Hardware_Firewalls/13_Creating_a_secure_enclave.mp4 8.79 MB
    4_3._Network_Simulation_Using_GNS3/14_Installing_GNS3.mp4 15.95 MB
    4_3._Network_Simulation_Using_GNS3/15_Obtaining_network_device_images.mp4 5.52 MB
    4_3._Network_Simulation_Using_GNS3/16_Setting_up_a_network.mp4 14.79 MB
    4_3._Network_Simulation_Using_GNS3/17_Simulating_the_ASA_firewall.mp4 19.99 MB
    4_3._Network_Simulation_Using_GNS3/18_Integrating_Kali_into_GNS3.mp4 13.97 MB
    5_4._Special-Purpose_Perimeter_Devices/19_Understanding_web_application_firewalls.mp4 10.76 MB
    5_4._Special-Purpose_Perimeter_Devices/20_Protecting_API_services_with_the_WSO2_gateway.mp4 29.24 MB
    5_4._Special-Purpose_Perimeter_Devices/21_Understanding_honeypots.mp4 13.04 MB
    5_4._Special-Purpose_Perimeter_Devices/22_Running_the_Cowrie_honeypot.mp4 8.93 MB
    5_4._Special-Purpose_Perimeter_Devices/23_Detecting_intrusions_with_Security_Onion.mp4 17.02 MB
    6_Conclusion/24_Summary.mp4 3.51 MB

Download Info

  • Tips

    “Ethical_Hacking_-_Perimeter_Defenses” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.

  • DMCA Notice and Takedown Procedure

    If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.