[ CourseLala.com ] Udemy - Computer Network Security Protocols And Techniques (Updated 02 - 2021)


[ CourseLala.com ] Udemy - Computer Network Security Protocols And Techniques (Updated 02 - 2021)
Category:
Date:
10/09/21 at 4:49am GMT+1
Submitter:
Seeders:
0
Leechers:
1
File size:
1.1 GB in 98 files

Torrent Status:
  This torrent has been verified.

Infohash:
e61a36939c3573f1f6bf3efe38ac6238b103d934


File list

  • [ CourseLala.com ] Udemy - Computer Network Security Protocols And Techniques (Updated 02 - 2021)
  • icon ~Get Your Files Here !/1. Introduction/1. What is Computer Network Security.mp4 16.5 MB
    icon ~Get Your Files Here !/1. Introduction/1. What is Computer Network Security.srt 2.7 KB
    icon ~Get Your Files Here !/1. Introduction/2. Friends And Enemies Alice, Bob and Eve.mp4 22.1 MB
    icon ~Get Your Files Here !/1. Introduction/2. Friends And Enemies Alice, Bob and Eve.srt 4.1 KB
    icon ~Get Your Files Here !/10. Firewalls/1. What is Firewall.mp4 20.7 MB
    icon ~Get Your Files Here !/10. Firewalls/1. What is Firewall.srt 3.1 KB
    icon ~Get Your Files Here !/10. Firewalls/2. Why Firewalls are used.mp4 19.1 MB
    icon ~Get Your Files Here !/10. Firewalls/2. Why Firewalls are used.srt 2.2 KB
    icon ~Get Your Files Here !/10. Firewalls/3. Types of Firewalls 1) Stateless Packet Filtering.mp4 51.1 MB
    icon ~Get Your Files Here !/10. Firewalls/3. Types of Firewalls 1) Stateless Packet Filtering.srt 7.1 KB
    icon ~Get Your Files Here !/10. Firewalls/4. Network Security Policy For Packet Filtering.mp4 53.5 MB
    icon ~Get Your Files Here !/10. Firewalls/4. Network Security Policy For Packet Filtering.srt 6.3 KB
    icon ~Get Your Files Here !/10. Firewalls/5. Stateless Packet Filtering Implementation as Access Control List.mp4 37.7 MB
    icon ~Get Your Files Here !/10. Firewalls/5. Stateless Packet Filtering Implementation as Access Control List.srt 5.4 KB
    icon ~Get Your Files Here !/10. Firewalls/6. Drawback Of Stateless Packet Filtering.mp4 23.8 MB
    icon ~Get Your Files Here !/10. Firewalls/6. Drawback Of Stateless Packet Filtering.srt 3 KB
    icon ~Get Your Files Here !/10. Firewalls/7. 2) Stateful Packet Filtering.mp4 11.9 MB
    icon ~Get Your Files Here !/10. Firewalls/7. 2) Stateful Packet Filtering.srt 1.8 KB
    icon ~Get Your Files Here !/10. Firewalls/8. Stateful Packet Filtering Implementation in Access Control List.mp4 9.7 MB
    icon ~Get Your Files Here !/10. Firewalls/8. Stateful Packet Filtering Implementation in Access Control List.srt 1.5 KB
    icon ~Get Your Files Here !/10. Firewalls/9. 3) Application Gateways.mp4 21.1 MB
    icon ~Get Your Files Here !/10. Firewalls/9. 3) Application Gateways.srt 2.8 KB
    icon ~Get Your Files Here !/2. Principles Of Cryptography/1. The Terminologies Of Cryptography.mp4 7.3 MB
    icon ~Get Your Files Here !/2. Principles Of Cryptography/1. The Terminologies Of Cryptography.srt 1.2 KB
    icon ~Get Your Files Here !/2. Principles Of Cryptography/2. Two Domains Of Cryptography-Symmetric Key Cryptography & Public Key Cryptography.mp4 6 MB
    icon ~Get Your Files Here !/2. Principles Of Cryptography/2. Two Domains Of Cryptography-Symmetric Key Cryptography & Public Key Cryptography.srt 3 KB
    icon ~Get Your Files Here !/2. Principles Of Cryptography/3. Traditional Ciphers and its Types.mp4 25.1 MB
    icon ~Get Your Files Here !/2. Principles Of Cryptography/3. Traditional Ciphers and its Types.srt 5.7 KB
    icon ~Get Your Files Here !/2. Principles Of Cryptography/4. Example Of Shift Cipher-Caesar Cipher.mp4 20.5 MB
    icon ~Get Your Files Here !/2. Principles Of Cryptography/4. Example Of Shift Cipher-Caesar Cipher.srt 3.9 KB
    icon ~Get Your Files Here !/2. Principles Of Cryptography/5. Example of Transposition Cipher.mp4 15.8 MB
    icon ~Get Your Files Here !/2. Principles Of Cryptography/5. Example of Transposition Cipher.srt 2.6 KB
    icon ~Get Your Files Here !/3. The Modern Ciphers/1. The Modern Ciphers.mp4 29.6 MB
    icon ~Get Your Files Here !/3. The Modern Ciphers/1. The Modern Ciphers.srt 7.4 KB
    icon ~Get Your Files Here !/3. The Modern Ciphers/2. Modern round ciphers DES and triple DES.mp4 45.1 MB
    icon ~Get Your Files Here !/3. The Modern Ciphers/2. Modern round ciphers DES and triple DES.srt 9.1 KB
    icon ~Get Your Files Here !/3. The Modern Ciphers/3. Modern Round Ciphers Advanced Encryption Standard (AES).mp4 8.5 MB
    icon ~Get Your Files Here !/3. The Modern Ciphers/3. Modern Round Ciphers Advanced Encryption Standard (AES).srt 1.7 KB
    icon ~Get Your Files Here !/3. The Modern Ciphers/4. Modes of Operation for block cipher ECB, CBC,CFB, OFB.mp4 36.2 MB
    icon ~Get Your Files Here !/3. The Modern Ciphers/4. Modes of Operation for block cipher ECB, CBC,CFB, OFB.srt 8.5 KB
    icon ~Get Your Files Here !/4. Asymmetric key cryptography/1. Rivest, Shamir, Adleman (RSA) Algorithm.mp4 43.8 MB
    icon ~Get Your Files Here !/4. Asymmetric key cryptography/1. Rivest, Shamir, Adleman (RSA) Algorithm.srt 8.6 KB
    icon ~Get Your Files Here !/4. Asymmetric key cryptography/2. Diffie-Hellman Key Exchange Algorithm.mp4 17.6 MB
    icon ~Get Your Files Here !/4. Asymmetric key cryptography/2. Diffie-Hellman Key Exchange Algorithm.srt 4.2 KB
    icon ~Get Your Files Here !/4. Asymmetric key cryptography/3. Diffie-Hellman Idea and Man In The Middle Attack.mp4 18.3 MB
    icon ~Get Your Files Here !/4. Asymmetric key cryptography/3. Diffie-Hellman Idea and Man In The Middle Attack.srt 3.9 KB
    icon ~Get Your Files Here !/5. Message AuthenticationIntegrity Protection/1. Message Authentication-Integrity Protection Using Digital Signatures.mp4 33.3 MB
    icon ~Get Your Files Here !/5. Message AuthenticationIntegrity Protection/1. Message Authentication-Integrity Protection Using Digital Signatures.srt 5.9 KB
    icon ~Get Your Files Here !/5. Message AuthenticationIntegrity Protection/2. Hash Functions-MD5 and SHA-1.mp4 12.2 MB
    icon ~Get Your Files Here !/5. Message AuthenticationIntegrity Protection/2. Hash Functions-MD5 and SHA-1.srt 2.4 KB
    icon ~Get Your Files Here !/5. Message AuthenticationIntegrity Protection/3. Role Of Certification Authorities in Public Key Encryption.mp4 15.6 MB
    icon ~Get Your Files Here !/5. Message AuthenticationIntegrity Protection/3. Role Of Certification Authorities in Public Key Encryption.srt 3 KB
    icon ~Get Your Files Here !/6. End Point Authentication/1. End Point Authentication Scenarios to avoid man in the middle attack.mp4 54.9 MB
    icon ~Get Your Files Here !/6. End Point Authentication/1. End Point Authentication Scenarios to avoid man in the middle attack.srt 10.1 KB
    icon ~Get Your Files Here !/7. Securing The E-mail/1. Mechanism to secure e-mail.mp4 29.4 MB
    icon ~Get Your Files Here !/7. Securing The E-mail/1. Mechanism to secure e-mail.srt 5.2 KB
    icon ~Get Your Files Here !/7. Securing The E-mail/2. Pretty Good Privacy (PGP) to secure e-mail.mp4 6.2 MB
    icon ~Get Your Files Here !/7. Securing The E-mail/2. Pretty Good Privacy (PGP) to secure e-mail.srt 2.8 KB
    icon ~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/1. Introduction to Transport Layer Security (TLS).mp4 8.7 MB
    icon ~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/1. Introduction to Transport Layer Security (TLS).srt 1.8 KB
    icon ~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/10. Actual TLS-SSL Cipher Suite.mp4 23.2 MB
    icon ~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/10. Actual TLS-SSL Cipher Suite.srt 3.6 KB
    icon ~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/11. Four protocols used in actual TLS.mp4 16.6 MB
    icon ~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/11. Four protocols used in actual TLS.srt 2.4 KB
    icon ~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/12. Handshake in Actual TLS.mp4 17.9 MB
    icon ~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/12. Handshake in Actual TLS.srt 3.3 KB
    icon ~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/13. Actual TLS Record Protocol.mp4 12.9 MB
    icon ~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/13. Actual TLS Record Protocol.srt 3.2 KB
    icon ~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/14. Actual TLS Flow Diagram.mp4 25.9 MB
    icon ~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/14. Actual TLS Flow Diagram.srt 5.9 KB
    icon ~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/2. TLS Security Services (TLS) Services.mp4 6.8 MB
    icon ~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/2. TLS Security Services (TLS) Services.srt 2.1 KB
    icon ~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/3. The bigger picture-Toy TLSSSL Example.mp4 12.9 MB
    icon ~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/3. The bigger picture-Toy TLSSSL Example.srt 2.1 KB
    icon ~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/4. Toy TLS-Handshake and key derivation.mp4 9.4 MB
    icon ~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/4. Toy TLS-Handshake and key derivation.srt 2.3 KB
    icon ~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/5. Toy TLS-Data Transfer Using Data Records.mp4 13.9 MB
    icon ~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/5. Toy TLS-Data Transfer Using Data Records.srt 2.4 KB
    icon ~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/6. Toy TLS-Sequence Number To Prevent Replay Attack.mp4 32.2 MB
    icon ~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/6. Toy TLS-Sequence Number To Prevent Replay Attack.srt 5.4 KB
    icon ~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/7. Toy TLS-Control Information In Header.mp4 31.1 MB
    icon ~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/7. Toy TLS-Control Information In Header.srt 5 KB
    icon ~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/8. Toy TLS-Summary.mp4 19.8 MB
    icon ~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/8. Toy TLS-Summary.srt 4.4 KB
    icon ~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/9. Toy TLS Is Not Complete.mp4 5.6 MB
    icon ~Get Your Files Here !/8. Transport Layer Security Using TLSSSL/9. Toy TLS Is Not Complete.srt 1.2 KB
    icon ~Get Your Files Here !/9. Virtual Private Networks/1. Introduction To Virtual Private Networks (VPNs).mp4 16.7 MB
    icon ~Get Your Files Here !/9. Virtual Private Networks/1. Introduction To Virtual Private Networks (VPNs).srt 2.4 KB
    icon ~Get Your Files Here !/9. Virtual Private Networks/10. Transport Versus Tunnel Mode.mp4 11.3 MB
    icon ~Get Your Files Here !/9. Virtual Private Networks/10. Transport Versus Tunnel Mode.srt 1.7 KB
    icon ~Get Your Files Here !/9. Virtual Private Networks/11. Authentication Header (AH) Protocol.mp4 16.7 MB
    icon ~Get Your Files Here !/9. Virtual Private Networks/11. Authentication Header (AH) Protocol.srt 2.2 KB
    icon ~Get Your Files Here !/9. Virtual Private Networks/12. Encapsulating Security Payload (ESP).mp4 17.8 MB
    icon ~Get Your Files Here !/9. Virtual Private Networks/12. Encapsulating Security Payload (ESP).srt 2.2 KB
    icon ~Get Your Files Here !/9. Virtual Private Networks/13. Four Modes Of IPsec.mp4 3 MB
    icon ~Get Your Files Here !/9. Virtual Private Networks/13. Four Modes Of IPsec.srt 992 B
    icon ~Get Your Files Here !/9. Virtual Private Networks/2. IPsec Protocol in VPNs.mp4 22.7 MB
    icon ~Get Your Files Here !/9. Virtual Private Networks/2. IPsec Protocol in VPNs.srt 4 KB

Similar Torrents