TorBT - Torrents and Magnet Links Search Engine
Lynda - Ethical Hacking Perimeter Defenses
- Date: 2022-07-03
- Size: 263 MB
- Files: 24
File Name
Size
001 Welcome.mp4
8.7 MB
002 What you should know before watching this course.mp4
1.7 MB
003 Course disclaimer.mp4
2.7 MB
004 Understanding firewalls.mp4
2.5 MB
005 Applying the basics of the Windows Firewall.mp4
7.0 MB
006 Using advanced features in the Windows Firewall.mp4
20 MB
007 Reviewing firewall logs.mp4
8.9 MB
008 Understanding Linux IPTables.mp4
11 MB
009 Setting up an IPTable firewall.mp4
7.0 MB
010 Managing rules with Firewall Builder.mp4
21 MB
011 Port testing.mp4
2.1 MB
012 Setting up a Cisco PIX firewall.mp4
9.0 MB
013 Creating a secure enclave.mp4
8.8 MB
014 Installing GNS3.mp4
16 MB
015 Obtaining network device images.mp4
5.5 MB
016 Setting up a network.mp4
15 MB
017 Simulating the ASA firewall.mp4
20 MB
018 Integrating Kali into GNS3.mp4
14 MB
019 Understanding web application firewalls.mp4
11 MB
020 Protecting API services with the WSO2 gateway.mp4
29 MB
021 Understanding honeypots.mp4
13 MB
022 Running the Cowrie honeypot.mp4
8.9 MB
023 Detecting intrusions with Security Onion.mp4
17 MB
024 Summary.mp4
3.5 MB