Udemy - ITS-102 - Information Technology Specialist Network Security

Photo unavailable
Category:
Date:
05/07/22 at 9:50pm GMT+1
Submitter:
Seeders:
1
Leechers:
1
File size:
1.1 GB in 56 files

Torrent Status:
  This torrent has been verified.

Infohash:
6c32fd96fbfd5c79f335806f19dbf06d4919f832


File list

  • Udemy - ITS-102 - Information Technology Specialist Network Security
  • icon ~Get Your Files Here !/1. Defense in Depth/1. Tools that we will use.mp4 23.9 MB
    icon ~Get Your Files Here !/1. Defense in Depth/1. Tools that we will use.srt 4.7 KB
    icon ~Get Your Files Here !/1. Defense in Depth/10. Identify attack types - DoS.mp4 17.3 MB
    icon ~Get Your Files Here !/1. Defense in Depth/10. Identify attack types - DoS.srt 6.4 KB
    icon ~Get Your Files Here !/1. Defense in Depth/11. DoS - our lab.mp4 29.9 MB
    icon ~Get Your Files Here !/1. Defense in Depth/11. DoS - our lab.srt 5.4 KB
    icon ~Get Your Files Here !/1. Defense in Depth/12. Malware - part 1.mp4 40.5 MB
    icon ~Get Your Files Here !/1. Defense in Depth/12. Malware - part 1.srt 7.1 KB
    icon ~Get Your Files Here !/1. Defense in Depth/13. Malware and network attacks - part 2.mp4 65.4 MB
    icon ~Get Your Files Here !/1. Defense in Depth/13. Malware and network attacks - part 2.srt 11.3 KB
    icon ~Get Your Files Here !/1. Defense in Depth/14. Recoviring a password for a zip archive - a lab.mp4 42.6 MB
    icon ~Get Your Files Here !/1. Defense in Depth/14. Recoviring a password for a zip archive - a lab.srt 4 KB
    icon ~Get Your Files Here !/1. Defense in Depth/15. Backups.mp4 44 MB
    icon ~Get Your Files Here !/1. Defense in Depth/15. Backups.srt 10.9 KB
    icon ~Get Your Files Here !/1. Defense in Depth/16. Quiz.html 209 B
    icon ~Get Your Files Here !/1. Defense in Depth/2. The CIA model - part 1.mp4 28.1 MB
    icon ~Get Your Files Here !/1. Defense in Depth/2. The CIA model - part 1.srt 10.1 KB
    icon ~Get Your Files Here !/1. Defense in Depth/3. The CIA model - part 2.mp4 35.7 MB
    icon ~Get Your Files Here !/1. Defense in Depth/3. The CIA model - part 2.srt 6.5 KB
    icon ~Get Your Files Here !/1. Defense in Depth/4. The CIA model - part 3.mp4 30.5 MB
    icon ~Get Your Files Here !/1. Defense in Depth/4. The CIA model - part 3.srt 6.9 KB
    icon ~Get Your Files Here !/1. Defense in Depth/5. The principle of least privilege.mp4 23.6 MB
    icon ~Get Your Files Here !/1. Defense in Depth/5. The principle of least privilege.srt 6.1 KB
    icon ~Get Your Files Here !/1. Defense in Depth/6. Identify security policy types.mp4 21.7 MB
    icon ~Get Your Files Here !/1. Defense in Depth/6. Identify security policy types.srt 6.3 KB
    icon ~Get Your Files Here !/1. Defense in Depth/7. Configuring an access control list (ACL) on a firewall - pfSense.mp4 31.7 MB
    icon ~Get Your Files Here !/1. Defense in Depth/7. Configuring an access control list (ACL) on a firewall - pfSense.srt 6 KB
    icon ~Get Your Files Here !/1. Defense in Depth/8. Define and enforce physical security.mp4 153.2 MB
    icon ~Get Your Files Here !/1. Defense in Depth/8. Define and enforce physical security.srt 8.4 KB
    icon ~Get Your Files Here !/1. Defense in Depth/9. Hardware and Software security.mp4 23.1 MB
    icon ~Get Your Files Here !/1. Defense in Depth/9. Hardware and Software security.srt 6.4 KB
    icon ~Get Your Files Here !/2. Operating System Security/1. Identify client and server protection.mp4 90.2 MB
    icon ~Get Your Files Here !/2. Operating System Security/1. Identify client and server protection.srt 13.9 KB
    icon ~Get Your Files Here !/2. Operating System Security/10. VPNs.mp4 55.5 MB
    icon ~Get Your Files Here !/2. Operating System Security/11. Quiz.html 209 B
    icon ~Get Your Files Here !/2. Operating System Security/2. Active Directory and GPO.mp4 33.1 MB
    icon ~Get Your Files Here !/2. Operating System Security/2. Active Directory and GPO.srt 6 KB
    icon ~Get Your Files Here !/2. Operating System Security/3. Authentication.mp4 23 MB
    icon ~Get Your Files Here !/2. Operating System Security/3. Authentication.srt 6.4 KB
    icon ~Get Your Files Here !/2. Operating System Security/4. User accounts and passwords.mp4 17.5 MB
    icon ~Get Your Files Here !/2. Operating System Security/4. User accounts and passwords.srt 4.6 KB
    icon ~Get Your Files Here !/2. Operating System Security/5. MFA.mp4 52.4 MB
    icon ~Get Your Files Here !/2. Operating System Security/5. MFA.srt 9.4 KB
    icon ~Get Your Files Here !/2. Operating System Security/6. Audits and logs.mp4 36.7 MB
    icon ~Get Your Files Here !/2. Operating System Security/6. Audits and logs.srt 8.5 KB
    icon ~Get Your Files Here !/2. Operating System Security/7. Encryption symmetric and asymmetric.mp4 21.5 MB
    icon ~Get Your Files Here !/2. Operating System Security/7. Encryption symmetric and asymmetric.srt 7.9 KB
    icon ~Get Your Files Here !/2. Operating System Security/8. Encryption and hashing.mp4 39.8 MB
    icon ~Get Your Files Here !/2. Operating System Security/8. Encryption and hashing.srt 8.8 KB
    icon ~Get Your Files Here !/2. Operating System Security/9. VeraCrypt in action.mp4 36.6 MB
    icon ~Get Your Files Here !/2. Operating System Security/9. VeraCrypt in action.srt 6.1 KB
    icon ~Get Your Files Here !/3. pfSense - extra lectures/1. Installing PfSense.mp4 46.5 MB
    icon ~Get Your Files Here !/3. pfSense - extra lectures/1. Installing PfSense.srt 9.2 KB
    icon ~Get Your Files Here !/3. pfSense - extra lectures/2. Basic config of pfSense.mp4 64.1 MB
    icon ~Get Your Files Here !/3. pfSense - extra lectures/2. Basic config of pfSense.srt 8.9 KB
    icon ~Get Your Files Here !/Bonus Resources.txt 386 B

Similar Torrents