FileMood

Download Lynda - Protecting Your Network with Open-Source Software

Lynda Protecting Your Network with Open Source Software

Name

Lynda - Protecting Your Network with Open-Source Software

 DOWNLOAD Copy Link

Total Size

315.9 MB

Total Files

46

Last Seen

2024-11-19 23:30

Hash

B5DEBAC0A3CC683D353450915B1B6004F0423A8E

/00. Introduction/

00_01 - Welcome.mp4

12.7 MB

00_02 - What you should know before watching this course.mp4

3.3 MB

/01. Understanding Firewalls/

01_01 - What is a firewall.mp4

6.3 MB

01_02 - A host firewall.mp4

8.0 MB

01_03 - A network firewall.mp4

6.7 MB

01_04 - Static packet filtering (SPF) vs. stateful packet inspection (SPI).mp4

5.5 MB

/02. Host as a Router/

02_01 - Netfilter and iptables.mp4

6.0 MB

02_02 - Using iptables to set up a host firewall.mp4

16.3 MB

02_03 - Creating a shell script to automate configuring Netfilter.mp4

13.0 MB

02_04 - Understanding hosts as routers.mp4

4.9 MB

02_05 - Host as a router Including an additional network adapter.mp4

11.7 MB

02_06 - Host as a router Setting up a second host to test the router.mp4

8.1 MB

02_07 - Host as a router Setting up IP forwarding.mp4

7.0 MB

02_08 - Host as a router Configuring the router's Netfilter settings.mp4

11.3 MB

02_09 - Host as a router Testing.mp4

4.5 MB

/03. Host as a Firewall/

03_01 - Understanding using a host as a network firewall.mp4

5.9 MB

03_02 - Setting up a web server to receive forwarded packets.mp4

3.1 MB

03_03 - Configuring port forwarding by adding Netfilter rules.mp4

9.8 MB

03_04 - Testing port forwarding.mp4

3.4 MB

03_05 - Understanding one-legged demilitarized zones (DMZs) using iptables.mp4

5.6 MB

03_06 - Using iptables to set up a one-legged DMZ.mp4

6.4 MB

03_07 - Using iptables to set up a true DMZ.mp4

3.1 MB

03_08 - Understanding Squid, an application proxy firewall.mp4

5.6 MB

03_09 - Setting up Squid.mp4

10.4 MB

03_10 - Fine-tuning the Ubuntu router host.mp4

13.7 MB

/04. Packet Analysis/

04_01 - What is a packet analysis.mp4

5.3 MB

04_02 - Packet-analysis applications in network security ARP poisoning example.mp4

9.8 MB

04_03 - Packet capturing with Wireshark.mp4

10.1 MB

04_04 - Exploring Wireshark's advanced features.mp4

3.1 MB

04_05 - Demonstrating Wireshark's advanced features.mp4

11.6 MB

/05. Intrusion Detection Systems (IDS) and Vulnerability Assessment/

05_01 - What is an IDS.mp4

5.6 MB

05_02 - Introducing Snort.mp4

4.3 MB

05_03 - Snort as a packet sniffer.mp4

8.8 MB

05_04 - Snort as an IDS Establishing rules.mp4

8.1 MB

05_05 - Snort as an IDS Detecting pings.mp4

7.1 MB

05_06 - What is network vulnerability assessment.mp4

7.1 MB

05_07 - Nessus.mp4

3.5 MB

05_08 - Network scanning with Nessus.mp4

4.0 MB

/06. Logging and Monitoring/

06_01 - Logging and its significance.mp4

3.2 MB

06_02 - Syslog-ng.mp4

2.2 MB

06_03 - Log forwarding using syslog-ng Part one.mp4

6.8 MB

06_04 - Log forwarding using syslog-ng Part two.mp4

11.3 MB

06_05 - Kiwi.mp4

4.6 MB

06_06 - Simple Network Management Protocol (SNMP).mp4

4.5 MB

07_01 - Next steps.mp4

2.3 MB

/

Torrent Downloaded From Katcr.co - Kickasstorrents.txt

0.1 KB

 

Total files 46


Copyright © 2024 FileMood.com