TorBT - Torrents and Magnet Links Search Engine

Pluralsight - Zero Trust Network Security By owen-dubiel

File Name
Size
3. Continuous Monitoring and Analytics/4. Case Studies and Challenge Questions.mp4
21 MB
playlist.m3u
860 B
1. Network Segmentation and Micro-segmentation/1. Introduction to Network Segmentation.mp4
17 MB
1. Network Segmentation and Micro-segmentation/1. Introduction to Network Segmentation.vtt
12 kB
1. Network Segmentation and Micro-segmentation/2. Micro-segmentation Techniques.mp4
15 MB
1. Network Segmentation and Micro-segmentation/2. Micro-segmentation Techniques.vtt
12 kB
1. Network Segmentation and Micro-segmentation/3. Case Studies and Quiz.mp4
16 MB
1. Network Segmentation and Micro-segmentation/3. Case Studies and Quiz.vtt
9.0 kB
2. Secure Remote Access Technologies/1. Introduction to Secure Remote Access.mp4
14 MB
2. Secure Remote Access Technologies/1. Introduction to Secure Remote Access.vtt
10 kB
2. Secure Remote Access Technologies/2. Zero Trust Network Access (ZTNA).mp4
5.4 MB
2. Secure Remote Access Technologies/2. Zero Trust Network Access (ZTNA).vtt
5.4 kB
2. Secure Remote Access Technologies/3. Software-defined Perimeters (SDPs).mp4
20 MB
2. Secure Remote Access Technologies/3. Software-defined Perimeters (SDPs).vtt
13 kB
2. Secure Remote Access Technologies/4. Real-world Applications.mp4
12 MB
2. Secure Remote Access Technologies/4. Real-world Applications.vtt
8.8 kB
3. Continuous Monitoring and Analytics/1. Introduction to Continuous Monitoring.mp4
16 MB
3. Continuous Monitoring and Analytics/1. Introduction to Continuous Monitoring.vtt
12 kB
3. Continuous Monitoring and Analytics/2. Threat Detection and Response.mp4
15 MB
3. Continuous Monitoring and Analytics/2. Threat Detection and Response.vtt
9.4 kB
3. Continuous Monitoring and Analytics/3. Analytics Tools.mp4
14 MB
3. Continuous Monitoring and Analytics/3. Analytics Tools.vtt
12 kB
exercise.zip
9.1 MB
3. Continuous Monitoring and Analytics/4. Case Studies and Challenge Questions.vtt
14 kB