zhongziso种子搜
首页
功能
磁力转BT
BT转磁力
使用教程
免责声明
关于
zhongziso
搜索
Pluralsight - CISSP - Communications and Network Security
magnet:?xt=urn:btih:a222e6bce9a8dc0df6b01ddc647111ba7235bb4c&dn=Pluralsight - CISSP - Communications and Network Security
磁力链接详情
Hash值:
a222e6bce9a8dc0df6b01ddc647111ba7235bb4c
点击数:
158
文件大小:
166.71 MB
文件数量:
106
创建日期:
2017-2-21 04:23
最后访问:
2024-11-2 20:52
访问标签:
Pluralsight
-
CISSP
-
Communications
and
Network
Security
文件列表详情
00.Course Overview/0001.Course Overview.mp4 3.39 MB
01.Introduction/0102.What Is Communications and Network Security and What's Next.mp4 3.03 MB
01.Introduction/0101.CISSP - Communications and Network Security.mp4 1.33 MB
02.Secure Network Architecture and Design/0213.IP Classes and CIDR.mp4 5.29 MB
02.Secure Network Architecture and Design/0217.Common Network Services.mp4 5.13 MB
02.Secure Network Architecture and Design/0212.Internet Protocol (IP) Networking.mp4 3.57 MB
02.Secure Network Architecture and Design/0216.High-level Network Zone Concepts.mp4 2.39 MB
02.Secure Network Architecture and Design/0211.OSI Model vs. TCPIP Model.mp4 2.28 MB
02.Secure Network Architecture and Design/0215.Network Topologies.mp4 2.17 MB
02.Secure Network Architecture and Design/0201.Introduction to Secure Network Architecture and Design.mp4 2.12 MB
02.Secure Network Architecture and Design/0207.Transport Layer.mp4 2.04 MB
02.Secure Network Architecture and Design/0206.Network Layer.mp4 1.84 MB
02.Secure Network Architecture and Design/0214.Ports.mp4 1.82 MB
02.Secure Network Architecture and Design/0202.Network Security Defined.mp4 1.8 MB
02.Secure Network Architecture and Design/0210.Application Layer.mp4 1.7 MB
02.Secure Network Architecture and Design/0205.Data Link Layer.mp4 1.18 MB
02.Secure Network Architecture and Design/0218.Summary and What’s Next.mp4 1.13 MB
02.Secure Network Architecture and Design/0203.The Open System Interconnect (OSI) Model.mp4 1013 KB
02.Secure Network Architecture and Design/0208.Session Layer.mp4 1000.31 KB
02.Secure Network Architecture and Design/0204.Physical Layer.mp4 714.26 KB
02.Secure Network Architecture and Design/0209.Presentation Layer.mp4 702.45 KB
03.Supervisory Control and Data Acquisition (SCADA)/0304.SCADA Security Concerns.mp4 2.14 MB
03.Supervisory Control and Data Acquisition (SCADA)/0302.Supervisory Control and Data Acquisition Defined.mp4 1.65 MB
03.Supervisory Control and Data Acquisition (SCADA)/0301.Introduction to Supervisory Control and Data Acquisition.mp4 1.6 MB
03.Supervisory Control and Data Acquisition (SCADA)/0303.Components of SCADA.mp4 1.51 MB
03.Supervisory Control and Data Acquisition (SCADA)/0305.Summary and What’s Next.mp4 784.55 KB
04.Network Protocols/0406.Wireless Connectivity.mp4 4.71 MB
04.Network Protocols/0408.Forms of Cryptography.mp4 4.1 MB
04.Network Protocols/0412.Certificate Hierarchies and Chains.mp4 2.95 MB
04.Network Protocols/0403.Storage-focused Network Protocols.mp4 2.63 MB
04.Network Protocols/0405.Voice Over Internet Protocol (VoIP).mp4 2.09 MB
04.Network Protocols/0411.Digital Signatures.mp4 1.94 MB
04.Network Protocols/0401.Introduction to Network Protocols.mp4 1.76 MB
04.Network Protocols/0404.Multi-protocol Label Switching (MPLS).mp4 1.72 MB
04.Network Protocols/0410.Public Key Infrastructure (PKI).mp4 1.43 MB
04.Network Protocols/0413.Summary and What’s Next.mp4 1.22 MB
04.Network Protocols/0402.Network Protocols Defined.mp4 880.21 KB
04.Network Protocols/0409.Benefits of Asymmetric Cryptography.mp4 785.11 KB
04.Network Protocols/0407.Cryptography Defined.mp4 769.68 KB
05.Securing Network Components/0506.Virtual Private Network (VPN) Concentrators.mp4 2.12 MB
05.Securing Network Components/0504.Routers.mp4 1.81 MB
05.Securing Network Components/0511.Stateful Inspection Firewalls.mp4 1.8 MB
05.Securing Network Components/0501.Introduction to Securing Network Components.mp4 1.77 MB
05.Securing Network Components/0514.Address Translation.mp4 1.71 MB
05.Securing Network Components/0513.Next Generation' Firewalls.mp4 1.48 MB
05.Securing Network Components/0502.Securing Network Components Defined.mp4 1.46 MB
05.Securing Network Components/0510.Packet Filtering Firewalls.mp4 1.26 MB
05.Securing Network Components/0508.Common Transmission Mediums.mp4 1.25 MB
05.Securing Network Components/0505.Switches.mp4 1.24 MB
05.Securing Network Components/0515.Proxies.mp4 1.2 MB
05.Securing Network Components/0512.Application Firewalls.mp4 1.11 MB
05.Securing Network Components/0516.Summary and What’s Next.mp4 1.08 MB
05.Securing Network Components/0507.Modems.mp4 1.02 MB
05.Securing Network Components/0503.High Security Value Network Components.mp4 275.04 KB
05.Securing Network Components/0509.Common Firewall Types.mp4 197.03 KB
06.Communication Channels/0619.Voice Communication Channel.mp4 3.44 MB
06.Communication Channels/0618.Analog vs. Digital.mp4 2.05 MB
06.Communication Channels/0603.Carrier Sense Multiple Access.mp4 2 MB
06.Communication Channels/0628.Transport Mode vs. Tunnel Mode.mp4 1.98 MB
06.Communication Channels/0610.Integrated Services Digital Network.mp4 1.97 MB
06.Communication Channels/0621.Instant Messaging and Chat Rooms.mp4 1.93 MB
06.Communication Channels/0601.Introduction to Communication Channels.mp4 1.66 MB
06.Communication Channels/0611.Asynchronous Transfer Mode.mp4 1.57 MB
06.Communication Channels/0637.Secondary VLAN Subtypes.mp4 1.55 MB
06.Communication Channels/0622.Peer to Peer Sharing.mp4 1.5 MB
06.Communication Channels/0602.Circuit vs. Packet Networks.mp4 1.48 MB
06.Communication Channels/0620.Email.mp4 1.35 MB
06.Communication Channels/0608.Fiber Distributed Data Interface.mp4 1.25 MB
06.Communication Channels/0638.Summary and What’s Next.mp4 1.21 MB
06.Communication Channels/0612.Digital Subscriber Line.mp4 1.21 MB
06.Communication Channels/0629.Secure Sockets Layering.mp4 1.18 MB
06.Communication Channels/0631.Telnet.mp4 1.16 MB
06.Communication Channels/0623.Virtual Meetings.mp4 1.13 MB
06.Communication Channels/0614.X.25.mp4 1.03 MB
06.Communication Channels/0635.Virtual Local Area Networks.mp4 1.02 MB
06.Communication Channels/0616.T, E, and OC.mp4 1 MB
06.Communication Channels/0627.Internet Protocol Security.mp4 1008.05 KB
06.Communication Channels/0613.Cable Modem.mp4 986.09 KB
06.Communication Channels/0606.Ethernet.mp4 955.37 KB
06.Communication Channels/0633.Secure Shell.mp4 953.51 KB
06.Communication Channels/0634.Terminal Services.mp4 906.58 KB
06.Communication Channels/0615.Frame Relay.mp4 839.14 KB
06.Communication Channels/0607.Token Ring.mp4 729.16 KB
06.Communication Channels/0636.Private VLANs.mp4 656.64 KB
06.Communication Channels/0604.Token Passing.mp4 635.74 KB
06.Communication Channels/0609.Wide Area Networking.mp4 626.37 KB
06.Communication Channels/0626.Layer Two Tunneling Protocol.mp4 620.24 KB
06.Communication Channels/0632.rlogin.mp4 552.58 KB
06.Communication Channels/0625.Point to Point Tunneling Protocol.mp4 551.01 KB
06.Communication Channels/0624.Common Virtual Private Network Methods.mp4 492.08 KB
06.Communication Channels/0617.Common Electronic Communication Methods.mp4 295.7 KB
06.Communication Channels/0605.Common Layer Two Networking Protocols.mp4 287.05 KB
06.Communication Channels/0630.Common Remote Access Methods.mp4 278.75 KB
07.Network Attacks/0708.Denial of Service.mp4 3.82 MB
07.Network Attacks/0710.Intrusion Detection Prevention Systems.mp4 3.21 MB
07.Network Attacks/0711.Security Information and Event Management.mp4 2.49 MB
07.Network Attacks/0712.Vulnerability Management and Penetration Testing.mp4 2.23 MB
07.Network Attacks/0705.Spoofing.mp4 2.21 MB
07.Network Attacks/0706.Packet Manipulation.mp4 1.6 MB
07.Network Attacks/0713.Summary and What’s Next.mp4 1.43 MB
07.Network Attacks/0703.Reconnaissance.mp4 1.38 MB
07.Network Attacks/0707.Session Hijacking.mp4 1.1 MB
07.Network Attacks/0701.Introduction to Network Attacks.mp4 1.09 MB
07.Network Attacks/0704.Spamming.mp4 617.56 KB
07.Network Attacks/0709.Tools and Techniques for Network Defense.mp4 519.66 KB
07.Network Attacks/0702.Themes of Network Attacks.mp4 331.5 KB
其他位置