[FreeCoursesOnline.Me] [LYNDA] Ethical Hacking - Evading IDS, Firewalls, and Honeypots [FCO]

Torrent Hash:
5BACFAAEE3BCFFDF060E03A5495D8805FEBD3BC9
Number of Files:
65
Content Size:
317.98MB
Convert On:
2019-07-19
Magnet Link:
File Name
Size
0. Websites you may like/1. (FreeTutorials.Us) Download Udemy Paid Courses For Free.url
328B
0. Websites you may like/2. (FreeCoursesOnline.Me) Download Udacity, Masterclass, Lynda, PHLearn, Pluralsight Free.url
286B
0. Websites you may like/3. (NulledPremium.com) Download Cracked Website Themes, Plugins, Scripts And Stock Images.url
163B
0. Websites you may like/4. (FTUApps.com) Download Cracked Developers Applications For Free.url
239B
0. Websites you may like/5. (Discuss.FTUForum.com) FTU Discussion Forum.url
294B
0. Websites you may like/How you can help Team-FTU.txt
237B
01.Introduction/01.01.Find weaknesses in the perimeter.mp4
18.8MB
01.Introduction/01.01.Find weaknesses in the perimeter.srt
2.71KB
01.Introduction/01.02.What you should know.mp4
1.95MB
01.Introduction/01.02.What you should know.srt
1.33KB
01.Introduction/01.03.Course disclaimer.mp4
2.15MB
01.Introduction/01.03.Course disclaimer.srt
2.3KB
02.Firewalls/02.04.Understanding Firewalls.mp4
1.83MB
02.Firewalls/02.04.Understanding Firewalls.srt
2.05KB
02.Firewalls/02.05.Apply the basics of the Windows firewall.mp4
13.02MB
02.Firewalls/02.05.Apply the basics of the Windows firewall.srt
7.09KB
02.Firewalls/02.06.Use advanced features in the Windows Firewall.mp4
23.44MB
02.Firewalls/02.06.Use advanced features in the Windows Firewall.srt
11.11KB
02.Firewalls/02.07.Review firewall logs.mp4
10.01MB
02.Firewalls/02.07.Review firewall logs.srt
5.81KB
02.Firewalls/02.08.Understand Linux IPTables.mp4
11.32MB
02.Firewalls/02.08.Understand Linux IPTables.srt
5.78KB
02.Firewalls/02.09.Set up an IPTables firewall.mp4
7.43MB
02.Firewalls/02.09.Set up an IPTables firewall.srt
3.39KB
02.Firewalls/02.10.Manage rules with Firewall Builder.mp4
19.82MB
02.Firewalls/02.10.Manage rules with Firewall Builder.srt
11.95KB
02.Firewalls/02.11.Port testing.mp4
2MB
02.Firewalls/02.11.Port testing.srt
1.68KB
03.Hardware Firewalls/03.12.Set up a Cisco PIX firewall.mp4
8.44MB
03.Hardware Firewalls/03.12.Set up a Cisco PIX firewall.srt
5.14KB
03.Hardware Firewalls/03.13.Create a secure enclave.mp4
8.6MB
03.Hardware Firewalls/03.13.Create a secure enclave.srt
5.29KB
04.Network Simulation Using GNS3/04.14.Install GNS3.mp4
13.68MB
04.Network Simulation Using GNS3/04.14.Install GNS3.srt
9.63KB
04.Network Simulation Using GNS3/04.15.Obtain network device images.mp4
5.89MB
04.Network Simulation Using GNS3/04.15.Obtain network device images.srt
3.88KB
04.Network Simulation Using GNS3/04.16.Set up a network.mp4
13.07MB
04.Network Simulation Using GNS3/04.16.Set up a network.srt
5.65KB
04.Network Simulation Using GNS3/04.17.Simulate the ASA firewall.mp4
18.41MB
04.Network Simulation Using GNS3/04.17.Simulate the ASA firewall.srt
8.5KB
04.Network Simulation Using GNS3/04.18.Integrate Kali into GNS3.mp4
13.54MB
04.Network Simulation Using GNS3/04.18.Integrate Kali into GNS3.srt
6.1KB
05.Purpose Perimeter Devices/05.19.Understand Web Application Firewalls.mp4
10.76MB
05.Purpose Perimeter Devices/05.19.Understand Web Application Firewalls.srt
6.48KB
05.Purpose Perimeter Devices/05.20.Protect API services with the WSO2 gateway.mp4
29.16MB
05.Purpose Perimeter Devices/05.20.Protect API services with the WSO2 gateway.srt
13.08KB
05.Purpose Perimeter Devices/05.21.Understand honeypots.mp4
11.53MB
05.Purpose Perimeter Devices/05.21.Understand honeypots.srt
7.57KB
05.Purpose Perimeter Devices/05.22.Run the Cowrie honeypot.mp4
8.91MB
05.Purpose Perimeter Devices/05.22.Run the Cowrie honeypot.srt
2.62KB
06.Protection from Intrusion/06.23.Intrusion response techniques.mp4
8.82MB
06.Protection from Intrusion/06.23.Intrusion response techniques.srt
8.18KB
06.Protection from Intrusion/06.24.xListing sites.mp4
1.84MB
06.Protection from Intrusion/06.24.xListing sites.srt
1.78KB
06.Protection from Intrusion/06.25.Snort rules.mp4
14.18MB
06.Protection from Intrusion/06.25.Snort rules.srt
7.87KB
06.Protection from Intrusion/06.26.Detect intrusions with Security Onion.mp4
16.88MB
06.Protection from Intrusion/06.26.Detect intrusions with Security Onion.srt
7.01KB
06.Protection from Intrusion/06.27.Extend IDS with reputation.mp4
5.98MB
06.Protection from Intrusion/06.27.Extend IDS with reputation.srt
4.36KB
06.Protection from Intrusion/06.28.EINSTEIN.mp4
8.8MB
06.Protection from Intrusion/06.28.EINSTEIN.srt
4.11KB
07.Conclusion/07.29.Next steps.mp4
7.25MB
07.Conclusion/07.29.Next steps.srt
1.98KB
Exercise Files.zip
333.99KB

Latest Search: