[CourserHub.com] Coursera - Connect and Protect Networks and Network Security

mp4   Hot:7   Size:342.71 MB   Created:2024-07-20 00:10:17   Update:2024-11-22 21:49:59  

File List

  • 0. Websites you may like/[CourserHub.com].url 123 B
    01_network-architecture/01_get-started-with-the-course/01_introduction-to-course-3.en.srt 1.75 KB
    01_network-architecture/01_get-started-with-the-course/01_introduction-to-course-3.en.txt 1.1 KB
    01_network-architecture/01_get-started-with-the-course/01_introduction-to-course-3.mp4 3.6 MB
    01_network-architecture/01_get-started-with-the-course/02_course-3-overview_instructions.html 1.22 MB
    01_network-architecture/01_get-started-with-the-course/03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx 879.17 KB
    01_network-architecture/01_get-started-with-the-course/03_helpful-resources-and-tips_instructions.html 11.22 KB
    01_network-architecture/02_introduction-to-networks/01_welcome-to-week-1.en.srt 863 B
    01_network-architecture/02_introduction-to-networks/01_welcome-to-week-1.en.txt 533 B
    01_network-architecture/02_introduction-to-networks/01_welcome-to-week-1.mp4 2.3 MB
    01_network-architecture/02_introduction-to-networks/02_chris-my-path-to-cybersecurity.en.srt 4.91 KB
    01_network-architecture/02_introduction-to-networks/02_chris-my-path-to-cybersecurity.en.txt 2.63 KB
    01_network-architecture/02_introduction-to-networks/02_chris-my-path-to-cybersecurity.mp4 18.89 MB
    01_network-architecture/02_introduction-to-networks/03_what-are-networks.en.srt 2.66 KB
    01_network-architecture/02_introduction-to-networks/03_what-are-networks.en.txt 1.64 KB
    01_network-architecture/02_introduction-to-networks/03_what-are-networks.mp4 6.22 MB
    01_network-architecture/02_introduction-to-networks/04_tina-working-in-network-security.en.srt 3.06 KB
    01_network-architecture/02_introduction-to-networks/04_tina-working-in-network-security.en.txt 1.64 KB
    01_network-architecture/02_introduction-to-networks/04_tina-working-in-network-security.mp4 11.31 MB
    01_network-architecture/02_introduction-to-networks/05_emmanuel-useful-skills-for-network-security.en.srt 4.86 KB
    01_network-architecture/02_introduction-to-networks/05_emmanuel-useful-skills-for-network-security.en.txt 2.51 KB
    01_network-architecture/02_introduction-to-networks/05_emmanuel-useful-skills-for-network-security.mp4 13.44 MB
    01_network-architecture/02_introduction-to-networks/06_network-tools.en.srt 4.48 KB
    01_network-architecture/02_introduction-to-networks/06_network-tools.en.txt 2.44 KB
    01_network-architecture/02_introduction-to-networks/06_network-tools.mp4 7.03 MB
    01_network-architecture/02_introduction-to-networks/07_network-components-devices-and-diagrams_instructions.html 1.68 MB
    01_network-architecture/02_introduction-to-networks/08_cloud-networks.en.srt 3.58 KB
    01_network-architecture/02_introduction-to-networks/08_cloud-networks.en.txt 2.33 KB
    01_network-architecture/02_introduction-to-networks/08_cloud-networks.mp4 8.77 MB
    01_network-architecture/02_introduction-to-networks/09_cloud-computing-and-software-defined-networks_instructions.html 694.11 KB
    01_network-architecture/02_introduction-to-networks/10_test-your-knowledge-introduction-to-networks_quiz.html 3.51 KB
    01_network-architecture/03_network-communication/01_introduction-to-network-communication.en.srt 3.67 KB
    01_network-architecture/03_network-communication/01_introduction-to-network-communication.en.txt 2.35 KB
    01_network-architecture/03_network-communication/01_introduction-to-network-communication.mp4 7.25 MB
    01_network-architecture/03_network-communication/02_the-tcp-ip-model.en.srt 4.42 KB
    01_network-architecture/03_network-communication/02_the-tcp-ip-model.en.txt 2.37 KB
    01_network-architecture/03_network-communication/02_the-tcp-ip-model.mp4 8.96 MB
    01_network-architecture/03_network-communication/03_the-four-layers-of-the-tcp-ip-model.en.srt 3.41 KB
    01_network-architecture/03_network-communication/03_the-four-layers-of-the-tcp-ip-model.en.txt 1.83 KB
    01_network-architecture/03_network-communication/03_the-four-layers-of-the-tcp-ip-model.mp4 6.47 MB
    01_network-architecture/03_network-communication/04_learn-more-about-the-tcp-ip-model_instructions.html 1.53 MB
    01_network-architecture/03_network-communication/05_the-osi-model_instructions.html 302.88 KB
    01_network-architecture/03_network-communication/06_test-your-knowledge-network-communication_quiz.html 4.89 KB
    01_network-architecture/04_local-and-wide-network-communication/01_ip-addresses-and-network-communication.en.srt 4.16 KB
    01_network-architecture/04_local-and-wide-network-communication/01_ip-addresses-and-network-communication.en.txt 2.21 KB
    01_network-architecture/04_local-and-wide-network-communication/01_ip-addresses-and-network-communication.mp4 7.31 MB
    01_network-architecture/04_local-and-wide-network-communication/02_components-of-network-layer-communication_instructions.html 642.17 KB
    01_network-architecture/04_local-and-wide-network-communication/03_test-your-knowledge-local-and-wide-network-communication_quiz.html 3.67 KB
    01_network-architecture/05_review-network-architecture/01_wrap-up.en.srt 1.03 KB
    01_network-architecture/05_review-network-architecture/01_wrap-up.en.txt 620 B
    01_network-architecture/05_review-network-architecture/01_wrap-up.mp4 1.71 MB
    01_network-architecture/05_review-network-architecture/02_glossary-terms-from-week-1_instructions.html 4.49 KB
    01_network-architecture/05_review-network-architecture/03_weekly-challenge-1_exam.html 8.39 KB
    02_network-operations/01_introduction-to-network-protocols/01_welcome-to-week-2.en.srt 1.98 KB
    02_network-operations/01_introduction-to-network-protocols/01_welcome-to-week-2.en.txt 1.09 KB
    02_network-operations/01_introduction-to-network-protocols/01_welcome-to-week-2.mp4 4.6 MB
    02_network-operations/01_introduction-to-network-protocols/02_network-protocols.en.srt 6.01 KB
    02_network-operations/01_introduction-to-network-protocols/02_network-protocols.en.txt 3.27 KB
    02_network-operations/01_introduction-to-network-protocols/02_network-protocols.mp4 11.29 MB
    02_network-operations/01_introduction-to-network-protocols/03_common-network-protocols_instructions.html 8.69 KB
    02_network-operations/01_introduction-to-network-protocols/04_additional-network-protocols_instructions.html 11.08 KB
    02_network-operations/01_introduction-to-network-protocols/05_test-your-knowledge-recognize-different-network-protocols_quiz.html 3.44 KB
    02_network-operations/01_introduction-to-network-protocols/06_wireless-protocols.en.srt 2.12 KB
    02_network-operations/01_introduction-to-network-protocols/06_wireless-protocols.en.txt 1.1 KB
    02_network-operations/01_introduction-to-network-protocols/06_wireless-protocols.mp4 5.11 MB
    02_network-operations/01_introduction-to-network-protocols/07_the-evolution-of-wireless-security-protocols_instructions.html 159.17 KB
    02_network-operations/02_system-identification/01_firewalls-and-network-security-measures.en.srt 7.4 KB
    02_network-operations/02_system-identification/01_firewalls-and-network-security-measures.en.txt 3.95 KB
    02_network-operations/02_system-identification/01_firewalls-and-network-security-measures.mp4 16.81 MB
    02_network-operations/02_system-identification/02_virtual-private-networks-vpns.en.srt 4.3 KB
    02_network-operations/02_system-identification/02_virtual-private-networks-vpns.en.txt 2.28 KB
    02_network-operations/02_system-identification/02_virtual-private-networks-vpns.mp4 8.06 MB
    02_network-operations/02_system-identification/03_security-zones.en.srt 6.05 KB
    02_network-operations/02_system-identification/03_security-zones.en.txt 3.2 KB
    02_network-operations/02_system-identification/03_security-zones.mp4 12 MB
    02_network-operations/02_system-identification/04_subnetting-and-cidr_instructions.html 133.92 KB
    02_network-operations/02_system-identification/05_proxy-servers.en.srt 4.94 KB
    02_network-operations/02_system-identification/05_proxy-servers.en.txt 3.12 KB
    02_network-operations/02_system-identification/05_proxy-servers.mp4 11.21 MB
    02_network-operations/02_system-identification/06_virtual-networks-and-privacy_instructions.html 8.43 KB
    02_network-operations/02_system-identification/07_test-your-knowledge-system-identification_quiz.html 4.29 KB
    02_network-operations/03_review-network-operations/01_wrap-up.en.srt 1.1 KB
    02_network-operations/03_review-network-operations/01_wrap-up.en.txt 727 B
    02_network-operations/03_review-network-operations/01_wrap-up.mp4 2.77 MB
    02_network-operations/03_review-network-operations/02_glossary-terms-from-week-2_instructions.html 5.09 KB
    02_network-operations/03_review-network-operations/03_weekly-challenge-2_exam.html 8.45 KB
    03_secure-against-network-intrusions/01_introduction-to-network-intrusion-tactics/01_welcome-to-week-3.en.srt 710 B
    03_secure-against-network-intrusions/01_introduction-to-network-intrusion-tactics/01_welcome-to-week-3.en.txt 447 B
    03_secure-against-network-intrusions/01_introduction-to-network-intrusion-tactics/01_welcome-to-week-3.mp4 1.32 MB
    03_secure-against-network-intrusions/01_introduction-to-network-intrusion-tactics/02_the-case-for-securing-networks.en.srt 2.2 KB
    03_secure-against-network-intrusions/01_introduction-to-network-intrusion-tactics/02_the-case-for-securing-networks.en.txt 1.41 KB
    03_secure-against-network-intrusions/01_introduction-to-network-intrusion-tactics/02_the-case-for-securing-networks.mp4 5.52 MB
    03_secure-against-network-intrusions/01_introduction-to-network-intrusion-tactics/03_how-intrusions-compromise-your-system_instructions.html 6.62 KB
    03_secure-against-network-intrusions/02_secure-networks-against-denial-of-service-dos-attacks/01_denial-of-service-dos-attacks.en.srt 7.83 KB
    03_secure-against-network-intrusions/02_secure-networks-against-denial-of-service-dos-attacks/01_denial-of-service-dos-attacks.en.txt 4.21 KB
    03_secure-against-network-intrusions/02_secure-networks-against-denial-of-service-dos-attacks/01_denial-of-service-dos-attacks.mp4 18.55 MB
    03_secure-against-network-intrusions/02_secure-networks-against-denial-of-service-dos-attacks/02_read-tcpdump-logs_instructions.html 146.64 KB
    03_secure-against-network-intrusions/02_secure-networks-against-denial-of-service-dos-attacks/03_activity-analyze-network-layer-communication_quiz.html 1.26 KB
    03_secure-against-network-intrusions/02_secure-networks-against-denial-of-service-dos-attacks/04_real-life-ddos-attack_instructions.html 5.12 KB
    03_secure-against-network-intrusions/02_secure-networks-against-denial-of-service-dos-attacks/05_test-your-knowledge-secure-networks-against-denial-of-service-dos-attacks_quiz.html 3.84 KB
    03_secure-against-network-intrusions/03_network-attack-tactics-and-defense/01_malicious-packet-sniffing.en.srt 8.04 KB
    03_secure-against-network-intrusions/03_network-attack-tactics-and-defense/01_malicious-packet-sniffing.en.txt 4.29 KB
    03_secure-against-network-intrusions/03_network-attack-tactics-and-defense/01_malicious-packet-sniffing.mp4 19.32 MB
    03_secure-against-network-intrusions/03_network-attack-tactics-and-defense/02_ip-spoofing.en.srt 5.13 KB
    03_secure-against-network-intrusions/03_network-attack-tactics-and-defense/02_ip-spoofing.en.txt 2.72 KB
    03_secure-against-network-intrusions/03_network-attack-tactics-and-defense/02_ip-spoofing.mp4 11.52 MB
    03_secure-against-network-intrusions/03_network-attack-tactics-and-defense/03_overview-of-interception-tactics_instructions.html 7.19 KB
    03_secure-against-network-intrusions/03_network-attack-tactics-and-defense/04_activity-analyze-network-attacks_quiz.html 1.25 KB
    03_secure-against-network-intrusions/03_network-attack-tactics-and-defense/05_test-your-knowledge-network-interception-attack-tactics_quiz.html 4.01 KB
    03_secure-against-network-intrusions/04_review-secure-against-network-intrusion/01_wrap-up.en.srt 1.35 KB
    03_secure-against-network-intrusions/04_review-secure-against-network-intrusion/01_wrap-up.en.txt 747 B
    03_secure-against-network-intrusions/04_review-secure-against-network-intrusion/01_wrap-up.mp4 2.93 MB
    03_secure-against-network-intrusions/04_review-secure-against-network-intrusion/02_glossary-terms-from-week-3_instructions.html 3.75 KB
    03_secure-against-network-intrusions/04_review-secure-against-network-intrusion/03_weekly-challenge-3_exam.html 9.31 KB
    04_security-hardening/01_introduction-to-security-hardening/01_welcome-to-week-4.en.srt 1.5 KB
    04_security-hardening/01_introduction-to-security-hardening/01_welcome-to-week-4.en.txt 929 B
    04_security-hardening/01_introduction-to-security-hardening/01_welcome-to-week-4.mp4 3.84 MB
    04_security-hardening/01_introduction-to-security-hardening/02_security-hardening.en.srt 4.62 KB
    04_security-hardening/01_introduction-to-security-hardening/02_security-hardening.en.txt 2.93 KB
    04_security-hardening/01_introduction-to-security-hardening/02_security-hardening.mp4 12.25 MB
    04_security-hardening/02_os-hardening/01_os-hardening-practices.en.srt 7.52 KB
    04_security-hardening/02_os-hardening/01_os-hardening-practices.en.txt 3.97 KB
    04_security-hardening/02_os-hardening/01_os-hardening-practices.mp4 18.03 MB
    04_security-hardening/02_os-hardening/02_brute-force-attacks-and-os-hardening_instructions.html 8.12 KB
    04_security-hardening/02_os-hardening/03_activity-apply-os-hardening-techniques_quiz.html 1.26 KB
    04_security-hardening/02_os-hardening/04_test-your-knowledge-os-hardening_quiz.html 3.69 KB
    04_security-hardening/03_network-hardening/01_network-hardening-practices.en.srt 6.19 KB
    04_security-hardening/03_network-hardening/01_network-hardening-practices.en.txt 3.31 KB
    04_security-hardening/03_network-hardening/01_network-hardening-practices.mp4 16.9 MB
    04_security-hardening/03_network-hardening/02_network-security-applications_instructions.html 2.9 MB
    04_security-hardening/03_network-hardening/03_activity-analysis-of-network-hardening_quiz.html 1.23 KB
    04_security-hardening/03_network-hardening/04_test-your-knowledge-network-hardening_quiz.html 3.78 KB
    04_security-hardening/04_cloud-hardening/01_network-security-in-the-cloud.en.srt 2.82 KB
    04_security-hardening/04_cloud-hardening/01_network-security-in-the-cloud.en.txt 1.84 KB
    04_security-hardening/04_cloud-hardening/01_network-security-in-the-cloud.mp4 9.73 MB
    04_security-hardening/04_cloud-hardening/02_kelsey-cloud-security-explained.en.srt 3.79 KB
    04_security-hardening/04_cloud-hardening/02_kelsey-cloud-security-explained.en.txt 2.31 KB
    04_security-hardening/04_cloud-hardening/02_kelsey-cloud-security-explained.mp4 21.94 MB
    04_security-hardening/04_cloud-hardening/03_secure-the-cloud_instructions.html 8.98 KB
    04_security-hardening/04_cloud-hardening/04_test-your-knowledge-cloud-hardening_quiz.html 3.62 KB
    04_security-hardening/05_review-security-hardening/01_wrap-up.en.srt 1.58 KB
    04_security-hardening/05_review-security-hardening/01_wrap-up.en.txt 909 B
    04_security-hardening/05_review-security-hardening/01_wrap-up.mp4 3.14 MB
    04_security-hardening/05_review-security-hardening/02_glossary-terms-from-week-4_instructions.html 2.83 KB
    04_security-hardening/05_review-security-hardening/03_weekly-challenge-4_exam.html 9.52 KB
    04_security-hardening/05_review-security-hardening/04_portfolio-activity-use-the-nist-cybersecurity-framework-to-respond-to-a-security_exam.html 3.46 KB
    04_security-hardening/06_congratulations-on-completing-course-3/01_course-wrap-up.en.srt 2.94 KB
    04_security-hardening/06_congratulations-on-completing-course-3/01_course-wrap-up.en.txt 1.86 KB
    04_security-hardening/06_congratulations-on-completing-course-3/01_course-wrap-up.mp4 6.64 MB
    04_security-hardening/06_congratulations-on-completing-course-3/02_course-3-glossary_Course_3_glossary.docx 857.56 KB
    04_security-hardening/06_congratulations-on-completing-course-3/02_course-3-glossary_instructions.html 6.45 KB
    04_security-hardening/06_congratulations-on-completing-course-3/03_get-started-on-the-next-course_instructions.html 786.47 KB
    05_Resources/01_frequently-asked-questions/01__resources.html 18.56 KB
    05_Resources/02_google-cybersecurity-certificate-glossary/01__Course_5_glossary.docx 862.38 KB
    05_Resources/02_google-cybersecurity-certificate-glossary/01__resources.html 6.53 KB
    05_Resources/03_course-3-glossary/01__Course_3_glossary.docx 857.56 KB
    05_Resources/03_course-3-glossary/01__resources.html 6.45 KB
    05_Resources/04_course-3-resources-and-citations/01__7.1 11.65 KB
    05_Resources/04_course-3-resources-and-citations/01__7.2 7.49 KB
    05_Resources/04_course-3-resources-and-citations/01__aa494182vexchg.140 33.9 KB
    05_Resources/04_course-3-resources-and-citations/01__article.asp 62.82 KB
    05_Resources/04_course-3-resources-and-citations/01__index.html 22.9 KB
    05_Resources/04_course-3-resources-and-citations/01__resources.html 17.59 KB
    05_Resources/04_course-3-resources-and-citations/01__sp800-179r1-draft.pdf 1.82 MB
    05_Resources/04_course-3-resources-and-citations/01__what-is-a-firewall.html 61.21 KB
    05_Resources/05_frequently-asked-questions/01__resources.html 15.95 KB
    05_Resources/06_create-a-cybersecurity-portfolio/01__resources.html 8.76 KB
    Readme.txt 51 B

Download Info

  • Tips

    “[CourserHub.com] Coursera - Connect and Protect Networks and Network Security” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.

  • DMCA Notice and Takedown Procedure

    If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.