资源详情

返回首页 | 相关搜索
Lynda - SSCP Cert Prep 6 Networks and Communications Security
大小 352.27 MB
文件数 101
Info Hash: 02DC0F6CC39B40E7F14F0C847386A5880E0095B9
收录时间 2025-12-21 21:10:16
更新时间 2025-12-21 21:10:16
文件列表 (101)
1.Introduction/01.Welcome.en.srt
1.97 KB
1.Introduction/01.Welcome.mp4
5.16 MB
2.1. TCP_IP Networking/02.Introducing TCP_IP.en.srt
10.15 KB
2.1. TCP_IP Networking/02.Introducing TCP_IP.mp4
10.63 MB
2.1. TCP_IP Networking/03.IP addressing.en.srt
5.61 KB
2.1. TCP_IP Networking/03.IP addressing.mp4
5.96 MB
2.1. TCP_IP Networking/04.Domain name system (DNS).en.srt
6.85 KB
2.1. TCP_IP Networking/04.Domain name system (DNS).mp4
7.47 MB
2.1. TCP_IP Networking/05.Network ports.en.srt
5.3 KB
2.1. TCP_IP Networking/05.Network ports.mp4
7.47 MB
2.1. TCP_IP Networking/06.ICMP.en.srt
9.69 KB
2.1. TCP_IP Networking/06.ICMP.mp4
13.18 MB
2.1. TCP_IP Networking/07.Network topologies.en.srt
6.31 KB
2.1. TCP_IP Networking/07.Network topologies.mp4
6.8 MB
2.1. TCP_IP Networking/08.Network relationships.en.srt
5.34 KB
2.1. TCP_IP Networking/08.Network relationships.mp4
4.39 MB
3.2. Network Security Devices/09.Switches and routers.en.srt
4.68 KB
3.2. Network Security Devices/09.Switches and routers.mp4
6.48 MB
3.2. Network Security Devices/10.Firewalls.en.srt
7.58 KB
3.2. Network Security Devices/10.Firewalls.mp4
7.46 MB
3.2. Network Security Devices/11.Load balancers, proxies, and web security gateways.en.srt
6.69 KB
3.2. Network Security Devices/11.Load balancers, proxies, and web security gateways.mp4
7.06 MB
3.2. Network Security Devices/12.VPNs and VPN concentrators.en.srt
5.04 KB
3.2. Network Security Devices/12.VPNs and VPN concentrators.mp4
4.63 MB
3.2. Network Security Devices/13.Network intrusion detection and prevention.en.srt
6.4 KB
3.2. Network Security Devices/13.Network intrusion detection and prevention.mp4
6.5 MB
3.2. Network Security Devices/14.Protocol analyzers.en.srt
12.27 KB
3.2. Network Security Devices/14.Protocol analyzers.mp4
21.87 MB
3.2. Network Security Devices/15.Unified threat management.en.srt
2.97 KB
3.2. Network Security Devices/15.Unified threat management.mp4
3.04 MB
3.2. Network Security Devices/16.Content distribution networks.en.srt
7.61 KB
3.2. Network Security Devices/16.Content distribution networks.mp4
7.28 MB
3.2. Network Security Devices/17.Traffic shaping and WAN optimization.en.srt
3.54 KB
3.2. Network Security Devices/17.Traffic shaping and WAN optimization.mp4
4.23 MB
4.3. Designing Secure Networks/18.Public and private addressing.en.srt
10.28 KB
4.3. Designing Secure Networks/18.Public and private addressing.mp4
11 MB
4.3. Designing Secure Networks/19.Subnetting.en.srt
5.61 KB
4.3. Designing Secure Networks/19.Subnetting.mp4
6.57 MB
4.3. Designing Secure Networks/20.VLANs and network segmentation.en.srt
3.52 KB
4.3. Designing Secure Networks/20.VLANs and network segmentation.mp4
3.13 MB
4.3. Designing Secure Networks/21.Security device placement.en.srt
11.57 KB
4.3. Designing Secure Networks/21.Security device placement.mp4
10.87 MB
4.3. Designing Secure Networks/22.Network access control.en.srt
7.4 KB
4.3. Designing Secure Networks/22.Network access control.mp4
6.96 MB
4.3. Designing Secure Networks/23.RADIUS and TACACS.en.srt
5.91 KB
4.3. Designing Secure Networks/23.RADIUS and TACACS.mp4
6.37 MB
4.3. Designing Secure Networks/24.Remote network access.en.srt
9.44 KB
4.3. Designing Secure Networks/24.Remote network access.mp4
9.24 MB
4.3. Designing Secure Networks/25.Desktop and application virtualization.en.srt
8.37 KB
4.3. Designing Secure Networks/25.Desktop and application virtualization.mp4
9 MB
4.3. Designing Secure Networks/26.Software defined networking.en.srt
6.34 KB
4.3. Designing Secure Networks/26.Software defined networking.mp4
5.49 MB
4.3. Designing Secure Networks/27.Port isolation.en.srt
3.05 KB
4.3. Designing Secure Networks/27.Port isolation.mp4
3.84 MB
4.3. Designing Secure Networks/28.Defense in depth.en.srt
5.64 KB
4.3. Designing Secure Networks/28.Defense in depth.mp4
6.12 MB
5.4. Specialized Networking/29.Telephony.en.srt
4.24 KB
5.4. Specialized Networking/29.Telephony.mp4
4.28 MB
5.4. Specialized Networking/30.Multimedia collaboration.en.srt
8.52 KB
5.4. Specialized Networking/30.Multimedia collaboration.mp4
13.05 MB
5.4. Specialized Networking/31.Storage networks.en.srt
5.34 KB
5.4. Specialized Networking/31.Storage networks.mp4
5.72 MB
6.5. Secure Network Management/32.Firewall rule management.en.srt
7.36 KB
6.5. Secure Network Management/32.Firewall rule management.mp4
8.71 MB
6.5. Secure Network Management/33.Router configuration security.en.srt
7.54 KB
6.5. Secure Network Management/33.Router configuration security.mp4
8 MB
6.5. Secure Network Management/34.Switch configuration security.en.srt
6.66 KB
6.5. Secure Network Management/34.Switch configuration security.mp4
6.12 MB
6.5. Secure Network Management/35.Maintaining network availability.en.srt
4.67 KB
6.5. Secure Network Management/35.Maintaining network availability.mp4
4.34 MB
6.5. Secure Network Management/36.Network monitoring.en.srt
7.44 KB
6.5. Secure Network Management/36.Network monitoring.mp4
6.7 MB
6.5. Secure Network Management/37.SNMP.en.srt
5.52 KB
6.5. Secure Network Management/37.SNMP.mp4
5.76 MB
7.6. Network Attacks/38.Denial of service attacks.en.srt
7.3 KB
7.6. Network Attacks/38.Denial of service attacks.mp4
7.88 MB
7.6. Network Attacks/39.Eavesdropping attacks.en.srt
6.86 KB
7.6. Network Attacks/39.Eavesdropping attacks.mp4
6.86 MB
7.6. Network Attacks/40.Other network attacks.en.srt
11.13 KB
7.6. Network Attacks/40.Other network attacks.mp4
10.99 MB
8.7. Wireless Networking/41.Understanding wireless networking.en.srt
6.21 KB
8.7. Wireless Networking/41.Understanding wireless networking.mp4
8.52 MB
8.7. Wireless Networking/42.Basic wireless security.en.srt
6.59 KB
8.7. Wireless Networking/42.Basic wireless security.mp4
5.46 MB
8.7. Wireless Networking/43.WEP, WPA ,and WPA2.en.srt
2.74 KB
8.7. Wireless Networking/43.WEP, WPA ,and WPA2.mp4
2.5 MB
8.7. Wireless Networking/44.Wireless authentication.en.srt
7.46 KB
8.7. Wireless Networking/44.Wireless authentication.mp4
7.11 MB
8.7. Wireless Networking/45.Wireless signal propagation.en.srt
4.66 KB
8.7. Wireless Networking/45.Wireless signal propagation.mp4
4.41 MB
8.7. Wireless Networking/46.WPA and WPS attacks.en.srt
6.12 KB
8.7. Wireless Networking/46.WPA and WPS attacks.mp4
5.96 MB
8.7. Wireless Networking/47.Propagation attacks.en.srt
6.55 KB
8.7. Wireless Networking/47.Propagation attacks.mp4
9.57 MB
8.7. Wireless Networking/48.Preventing rogues and evil twins.en.srt
5.82 KB
8.7. Wireless Networking/48.Preventing rogues and evil twins.mp4
5.57 MB
8.7. Wireless Networking/49.Understanding Bluetooth and NFC attacks.en.srt
4.42 KB
8.7. Wireless Networking/49.Understanding Bluetooth and NFC attacks.mp4
4.14 MB
9.Conclusion/50.What's next.en.srt
1.23 KB
9.Conclusion/50.What's next.mp4
2.13 MB
More Downloads!.url
104 B

免责声明

本网站仅提供DHT网络资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 fuckatgfw@protonmail.com。