Lynda - Ethical Hacking Perimeter Defenses
File List
- 020 Protecting API services with the WSO2 gateway.mp4 29.2 MB
- 010 Managing rules with Firewall Builder.mp4 21.1 MB
- 017 Simulating the ASA firewall.mp4 20.0 MB
- 006 Using advanced features in the Windows Firewall.mp4 20.0 MB
- 023 Detecting intrusions with Security Onion.mp4 17.0 MB
- 014 Installing GNS3.mp4 16.0 MB
- 016 Setting up a network.mp4 14.8 MB
- 018 Integrating Kali into GNS3.mp4 14.0 MB
- 021 Understanding honeypots.mp4 13.0 MB
- 019 Understanding web application firewalls.mp4 10.8 MB
- 008 Understanding Linux IPTables.mp4 10.6 MB
- 012 Setting up a Cisco PIX firewall.mp4 9.0 MB
- 022 Running the Cowrie honeypot.mp4 8.9 MB
- 007 Reviewing firewall logs.mp4 8.9 MB
- 013 Creating a secure enclave.mp4 8.8 MB
- 001 Welcome.mp4 8.7 MB
- 005 Applying the basics of the Windows Firewall.mp4 7.0 MB
- 009 Setting up an IPTable firewall.mp4 7.0 MB
- 015 Obtaining network device images.mp4 5.5 MB
- 024 Summary.mp4 3.5 MB
- 003 Course disclaimer.mp4 2.7 MB
- 004 Understanding firewalls.mp4 2.5 MB
- 011 Port testing.mp4 2.1 MB
- 002 What you should know before watching this course.mp4 1.7 MB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.