Create Tool:
Create Time:1970-01-01 08:00:00
File Size:202.50 MB
File Count:54
File Hash:4ce3d840f35e6d8710597a8a590e1a63ca41eabf
1.Introduction/01.Welcome.en.srt | 1.22 KB |
1.Introduction/01.Welcome.mp4 | 4.76 MB |
1.Introduction/02.What you need to know.en.srt | 1.18 KB |
1.Introduction/02.What you need to know.mp4 | 1.97 MB |
1.Introduction/03.Packet Tracer and exercise files.en.srt | 1.04 KB |
1.Introduction/03.Packet Tracer and exercise files.mp4 | 3.16 MB |
1.Introduction/04.Prepare for the CCNA Security Exam (210-260).en.srt | 895 B |
1.Introduction/04.Prepare for the CCNA Security Exam (210-260).mp4 | 1.77 MB |
2.1. IDS and IPS Overview/05.Managing the threat landscape.en.srt | 4.15 KB |
2.1. IDS and IPS Overview/05.Managing the threat landscape.mp4 | 7.39 MB |
2.1. IDS and IPS Overview/06.Overview and benefits of IDS and IPS.en.srt | 4.68 KB |
2.1. IDS and IPS Overview/06.Overview and benefits of IDS and IPS.mp4 | 10.52 MB |
2.1. IDS and IPS Overview/07.IPS versus IDS.en.srt | 3.96 KB |
2.1. IDS and IPS Overview/07.IPS versus IDS.mp4 | 6.57 MB |
2.1. IDS and IPS Overview/08.Host-based versus network IDS.en.srt | 6.50 KB |
2.1. IDS and IPS Overview/08.Host-based versus network IDS.mp4 | 11.20 MB |
2.1. IDS and IPS Overview/09.Prerequisites and restrictions for IPS.en.srt | 4.04 KB |
2.1. IDS and IPS Overview/09.Prerequisites and restrictions for IPS.mp4 | 7.06 MB |
3.2. Detection and Signature Engines/10.Monitoring the network.en.srt | 4.27 KB |
3.2. Detection and Signature Engines/10.Monitoring the network.mp4 | 10.47 MB |
3.2. Detection and Signature Engines/11.Signature-based IDS.en.srt | 6.41 KB |
3.2. Detection and Signature Engines/11.Signature-based IDS.mp4 | 11.73 MB |
3.2. Detection and Signature Engines/12.Sweep scan.en.srt | 4.28 KB |
3.2. Detection and Signature Engines/12.Sweep scan.mp4 | 10.31 MB |
3.2. Detection and Signature Engines/13.Anomaly-based IDS.en.srt | 5.22 KB |
3.2. Detection and Signature Engines/13.Anomaly-based IDS.mp4 | 9.11 MB |
3.2. Detection and Signature Engines/14.Reputation-based IDS.en.srt | 3.12 KB |
3.2. Detection and Signature Engines/14.Reputation-based IDS.mp4 | 5.09 MB |
3.2. Detection and Signature Engines/15.Policy-based IDS.en.srt | 4.38 KB |
3.2. Detection and Signature Engines/15.Policy-based IDS.mp4 | 6.64 MB |
4.3. Decisions and Actions/16.IDS signature files.en.srt | 3.94 KB |
4.3. Decisions and Actions/16.IDS signature files.mp4 | 6.31 MB |
4.3. Decisions and Actions/17.Trigger actions and responses.en.srt | 5.79 KB |
4.3. Decisions and Actions/17.Trigger actions and responses.mp4 | 9.16 MB |
4.3. Decisions and Actions/18.Blacklist and whitelist.en.srt | 5.31 KB |
4.3. Decisions and Actions/18.Blacklist and whitelist.mp4 | 9.52 MB |
4.3. Decisions and Actions/19.Managing IPS alarms.en.srt | 3.43 KB |
4.3. Decisions and Actions/19.Managing IPS alarms.mp4 | 5.57 MB |
5.4. Deploying an IOS-Based IPS/20.Analyze the flow.en.srt | 5.31 KB |
5.4. Deploying an IOS-Based IPS/20.Analyze the flow.mp4 | 10.87 MB |
5.4. Deploying an IOS-Based IPS/21.Implementing an IPS.en.srt | 3.80 KB |
5.4. Deploying an IOS-Based IPS/21.Implementing an IPS.mp4 | 7.03 MB |
5.4. Deploying an IOS-Based IPS/22.Configure an IPS.en.srt | 5.21 KB |
5.4. Deploying an IOS-Based IPS/22.Configure an IPS.mp4 | 15.57 MB |
6.5. Practical Applications/23.Monitoring and analyzing.en.srt | 3.91 KB |
6.5. Practical Applications/23.Monitoring and analyzing.mp4 | 6.31 MB |
6.5. Practical Applications/24.Syslog.en.srt | 1.69 KB |
6.5. Practical Applications/24.Syslog.mp4 | 4.76 MB |
6.5. Practical Applications/25.Using IDS and honeypots.en.srt | 5.89 KB |
6.5. Practical Applications/25.Using IDS and honeypots.mp4 | 10.47 MB |
6.5. Practical Applications/26.The EINSTEIN system.en.srt | 3.65 KB |
6.5. Practical Applications/26.The EINSTEIN system.mp4 | 6.44 MB |
7.Conclusion/27.Summary.en.srt | 1.57 KB |
7.Conclusion/27.Summary.mp4 | 2.65 MB |
udp://exodus.desync.com:6969 |
udp://open.demonii.com:1337 |
udp://tracker.coppersurfer.tk:6969 |
udp://tracker.leechers-paradise.org:6969 |
udp://zer0day.ch:1337 |
TorrentBank
Copyright © 2024