0. Websites you may like/How you can help Team-FTU.txt 237 B 01.Introduction/01.01.Find weaknesses in the perimeter.mp4 18.8 MB 01.Introduction/01.01.Find weaknesses in the perimeter.srt 2.7 KB 01.Introduction/01.02.What you should know.mp4 1.9 MB 01.Introduction/01.02.What you should know.srt 1.3 KB 01.Introduction/01.03.Course disclaimer.mp4 2.1 MB 01.Introduction/01.03.Course disclaimer.srt 2.3 KB 02.Firewalls/02.04.Understanding Firewalls.mp4 1.8 MB 02.Firewalls/02.04.Understanding Firewalls.srt 2.1 KB 02.Firewalls/02.05.Apply the basics of the Windows firewall.mp4 13 MB 02.Firewalls/02.05.Apply the basics of the Windows firewall.srt 7.1 KB 02.Firewalls/02.06.Use advanced features in the Windows Firewall.mp4 23.4 MB 02.Firewalls/02.06.Use advanced features in the Windows Firewall.srt 11.1 KB 02.Firewalls/02.07.Review firewall logs.mp4 10 MB 02.Firewalls/02.07.Review firewall logs.srt 5.8 KB 02.Firewalls/02.08.Understand Linux IPTables.mp4 11.3 MB 02.Firewalls/02.08.Understand Linux IPTables.srt 5.8 KB 02.Firewalls/02.09.Set up an IPTables firewall.mp4 7.4 MB 02.Firewalls/02.09.Set up an IPTables firewall.srt 3.4 KB 02.Firewalls/02.10.Manage rules with Firewall Builder.mp4 19.8 MB 02.Firewalls/02.10.Manage rules with Firewall Builder.srt 11.9 KB 02.Firewalls/02.11.Port testing.mp4 2 MB 02.Firewalls/02.11.Port testing.srt 1.7 KB 03.Hardware Firewalls/03.12.Set up a Cisco PIX firewall.mp4 8.4 MB 03.Hardware Firewalls/03.12.Set up a Cisco PIX firewall.srt 5.1 KB 03.Hardware Firewalls/03.13.Create a secure enclave.mp4 8.6 MB 03.Hardware Firewalls/03.13.Create a secure enclave.srt 5.3 KB 04.Network Simulation Using GNS3/04.14.Install GNS3.mp4 13.7 MB 04.Network Simulation Using GNS3/04.14.Install GNS3.srt 9.6 KB 04.Network Simulation Using GNS3/04.15.Obtain network device images.mp4 5.9 MB 04.Network Simulation Using GNS3/04.15.Obtain network device images.srt 3.9 KB 04.Network Simulation Using GNS3/04.16.Set up a network.mp4 13.1 MB 04.Network Simulation Using GNS3/04.16.Set up a network.srt 5.7 KB 04.Network Simulation Using GNS3/04.17.Simulate the ASA firewall.mp4 18.4 MB 04.Network Simulation Using GNS3/04.17.Simulate the ASA firewall.srt 8.5 KB 04.Network Simulation Using GNS3/04.18.Integrate Kali into GNS3.mp4 13.5 MB 04.Network Simulation Using GNS3/04.18.Integrate Kali into GNS3.srt 6.1 KB 05.Purpose Perimeter Devices/05.19.Understand Web Application Firewalls.mp4 10.8 MB 05.Purpose Perimeter Devices/05.19.Understand Web Application Firewalls.srt 6.5 KB 05.Purpose Perimeter Devices/05.20.Protect API services with the WSO2 gateway.mp4 29.2 MB 05.Purpose Perimeter Devices/05.20.Protect API services with the WSO2 gateway.srt 13.1 KB 05.Purpose Perimeter Devices/05.21.Understand honeypots.mp4 11.5 MB 05.Purpose Perimeter Devices/05.21.Understand honeypots.srt 7.6 KB 05.Purpose Perimeter Devices/05.22.Run the Cowrie honeypot.mp4 8.9 MB 05.Purpose Perimeter Devices/05.22.Run the Cowrie honeypot.srt 2.6 KB 06.Protection from Intrusion/06.23.Intrusion response techniques.mp4 8.8 MB 06.Protection from Intrusion/06.23.Intrusion response techniques.srt 8.2 KB 06.Protection from Intrusion/06.24.xListing sites.mp4 1.8 MB 06.Protection from Intrusion/06.24.xListing sites.srt 1.8 KB 06.Protection from Intrusion/06.25.Snort rules.mp4 14.2 MB 06.Protection from Intrusion/06.25.Snort rules.srt 7.9 KB 06.Protection from Intrusion/06.26.Detect intrusions with Security Onion.mp4 16.9 MB 06.Protection from Intrusion/06.26.Detect intrusions with Security Onion.srt 7 KB 06.Protection from Intrusion/06.27.Extend IDS with reputation.mp4 6 MB 06.Protection from Intrusion/06.27.Extend IDS with reputation.srt 4.4 KB 06.Protection from Intrusion/06.28.EINSTEIN.mp4 8.8 MB 06.Protection from Intrusion/06.28.EINSTEIN.srt 4.1 KB 07.Conclusion/07.29.Next steps.mp4 7.2 MB 07.Conclusion/07.29.Next steps.srt 2 KB Exercise Files.zip 334 KB