kingers Posted Wednesday at 09:46 PM Report Share Posted Wednesday at 09:46 PM 464.02 MB | 00:08:16 | mp4 | 1280X720 | 16:9Genre:eLearning |Language:EnglishFiles Included :01 welcome-to-the-course-network-security-database-vulnerabilities.mp4 (7.44 MB)04 welcome-to-introduction-to-tcp-ip-framework.mp4 (3.29 MB)05 stateless-inspection.mp4 (5.86 MB)06 stateful-inspection.mp4 (5.82 MB)07 firewall-filters-ids-and-ips-systems.mp4 (6.81 MB)08 the-difference-between-ids-and-ips-systems.mp4 (3.09 MB)09 network-address-translation.mp4 (6.15 MB)01 an-introduction-to-local-area-networks.mp4 (9.82 MB)02 ethernet-and-lan-ethernet-operations.mp4 (6.93 MB)03 ethernet-and-lan-network-devices.mp4 (6.47 MB)01 introduction-to-basic-network-routing.mp4 (1.18 MB)02 layer-2-and-layer-3-network-addressing.mp4 (9.22 MB)03 address-resolution-protocol.mp4 (12.88 MB)04 routers-and-routing-tables-part-1.mp4 (3.87 MB)05 routers-and-routing-tables-part-2.mp4 (2.96 MB)06 routers-and-routing-tables-part-3.mp4 (11.89 MB)01 welcome-to-the-basics-of-ip-addressing-and-the-osi-model.mp4 (3.37 MB)02 ip-addressing-the-basics-of-binary.mp4 (11.5 MB)03 ip-address-structure-and-network-classes.mp4 (7.01 MB)04 ip-protocol-and-traffic-routing.mp4 (10.52 MB)05 introduction-to-the-ipv6-address-schema.mp4 (6.87 MB)01 application-and-transport-protocols-udp-and-tcp-part-1.mp4 (6.51 MB)02 application-and-transport-protocols-udp-and-tcp-part-2.mp4 (13.59 MB)01 using-your-windows-lab-workspace.mp4 (8.29 MB)02 dns-and-dhcp.mp4 (7.54 MB)03 syslog-message-logging-protocol.mp4 (6.57 MB)04 flows-and-network-analysis.mp4 (2.88 MB)05 port-mirroring-and-promiscuous-mode.mp4 (3.9 MB)01 next-generation-firewalls-overview.mp4 (5.7 MB)02 ngfw-and-the-osi-model.mp4 (3.89 MB)03 ngfw-packet-flow-example-and-ngfw-comparisons.mp4 (10.35 MB)04 intrusion-detection-and-intrusion-prevention-systems.mp4 (7.37 MB)01 high-availability-and-clustering.mp4 (13.4 MB)01 welcome-to-introduction-to-databases.mp4 (7.24 MB)02 data-source-types-part-1.mp4 (6.51 MB)03 data-source-types-part-2.mp4 (9.05 MB)04 data-model-types.mp4 (8.1 MB)05 structured-data.mp4 (12.62 MB)01 securing-the-crown-jewels.mp4 (14.27 MB)02 leveraging-security-industry-best-practices.mp4 (1.99 MB)03 structured-data-and-relational-databases.mp4 (2.88 MB)04 anatomy-of-a-vulnerability-assessment-test-report.mp4 (4.9 MB)05 securing-data-sources-by-type.mp4 (12.27 MB)06 securing-databases-wrap-up.mp4 (3.53 MB)01 data-monitoring.mp4 (10.58 MB)02 data-alerts.mp4 (8.86 MB)03 data-activity-reporting.mp4 (15.95 MB)04 attributes-to-include-in-logging.mp4 (10.58 MB)05 failed-access-monitoring.mp4 (4.54 MB)06 suspicious-access-events-part-1.mp4 (9.52 MB)07 suspicious-access-events-part-2.mp4 (12.72 MB)01 welcome-to-deep-dive-injection-vulnerability.mp4 (1.93 MB)02 introduction-to-injection-flaws.mp4 (5.43 MB)03 os-command-injection-part-1.mp4 (13.11 MB)04 os-command-injection-part-2.mp4 (8.03 MB)05 os-command-injection-part-3.mp4 (11.45 MB)01 sql-injection-part-1.mp4 (12.32 MB)02 sql-injection-part-2.mp4 (8.79 MB)01 other-types-of-injection.mp4 (6.8 MB)]Screenshot https://rapidgator.net/file/f2f8de7a31eb16fd93bffe01634180d4/Coursera.-.Computer.Networks.and.Network.Security.rar https://nitroflare.com/view/5329B6E698D528F/Coursera.-.Computer.Networks.and.Network.Security.rar Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now